Configuring the Brocade ServerIron to Enable Peak Performance of Siemens ComAssistant
|
|
|
- Claude Lee
- 10 years ago
- Views:
Transcription
1 Configuring the Brocade ServerIron to Enable Peak Performance of Siemens ComAssistant Using a Web-based user interface, Siemens OpenScape ComAssistant serves up a suite of PBX and call control features to support enterprise communications. This brief provides guidance for ServerIron configuration in ComAssistant deployments.
2 CONTENTS Introduction...3 Brocade ServerIron...3 Siemens OpenScape ComAssistant...3 Basic Terminology...4 Real Server...4 Virtual Server...4 Virtual Server Port...4 Real Server Port...4 Health Checks...4 Putting It All Together...4 The Basic Topology...5 The Load Balancer...5 Configuration Prerequisites...6 Building the Configuration Configure Basic Network Connectivity and High Availability...8 Load Balancer #1...8 Load Balancer # Configure Global Parameters Configure Real Servers and Real Server Ports Configure Virtual Server and Virtual Server Ports with Bindings Verify functionality...16 Completing the Configuration...18 For Load Balancer # For Load Balancer # Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 2 of 24
3 INTRODUCTION Brocade ServerIron The Brocade ServerIron family of Application Delivery Controllers (ADCs) intelligently balance enduser traffic across server farms to provide high availability, acceleration, security, and scalability for business-critical IP, Web, and Voice over IP (VoIP) applications, ensuring a better end-user experience with IP-based applications. The Brocade ServerIron provides a total solution for server load balancing, application (Layer 7) switching, server farm and application security, SSL acceleration, compression, and multisite redundancy. It offers enterprisesn service providers, and e-commerce data centers, a highly resilient application switch in both stackable and high-port-density, chassis-based configurations to optimize application delivery while decreasing the Total Cost of Ownership (TCO). ServerIron switches are deployed in more than 3,000 of the world s most demanding customer networks, where they support business-critical applications, including financial trading, , DNS, VoIP, Web, CDN, e-commerce, and ERP. The ServerIron family offers the broadest portfolio of Layer 4 7 products and meets a range of needs in the enterprise, service provider, and content provider markets. Siemens OpenScape ComAssistant Modern enterprise communications solutions such as Siemens HiPath are becoming increasingly popular. Siemens OpenScape ComAssistant provides an easy way to enhance the user experience. ComAssistant is a desktop call control interface that provides feature access via a Web browser. Users can initiate and log incoming and outgoing calls, transfer calls, conference calls, and access many other OpenScape telephony features. Additionally, OpenScape ComAssistant offers: One-number-service Journal entries, a speed-dial list, and LDAP search functionality Hotkey functionality enables users to dial numbers directly from Microsoft Office applications Team members can view one another s availability and support each other by handling incoming communications LDAP integration of corporate directories and personal address lists Support for multiple business groups enables large corporations to treat in-house companies separately by providing separate directory access or managed service bill-back models Integrates into business productivity applications such as mysap Portal, IBM WebSphere, and IBM Sametime Support for up to 50,000 users The ComAssistant WebGUI is provided through a Web server and a single server cannot simultaneously support thousands of users. However, ServerIron can distribute the connection load across multiple Web servers, increasing the performance of the solution dramatically by intelligently sharing the load between multiple instances of ComAssistant. This document explains how to load balance multiple ComAssistant front-end servers using the Brocade ServerIron. For configuration information for Siemens ComAssistant, see the product documentation. Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 3 of 24
4 BASIC TERMINOLOGY Real Server One of the functions of an ServerIron ADC is traffic distribution. A real server is a node/host or a physical server/network device that receives traffic from the ServerIron ADC after a load balancing decision has taken place. The server is represented by the IP address to which the ADC directs traffic. In this document the term real server is used to describe the physical ComAssistant front-end Web servers that receive traffic after the load balancing decision at the ADC. Virtual Server A virtual server is a single ADC-owned IP address to which clients connect and from which they are forwarded by the ADC to one of many physical or real servers. A virtual server IP address is commonly referred to as a VIP (Virtual server IP). Virtual Server Port Virtual servers offer services to their clients, such as HTTP, DNS, and others. A virtual server port is a TCP or UDP port that is open for clients to talk to the VIP. The virtual server port for HTTP is usually TCP port 80, and for DNS is typically UDP port 53. This solution uses ports 8443, 7778, 7788, and Real Server Port The Brocade ADC receives traffic on one of its VIPs, and that traffic arrives via a virtual server port (that is, ). A load balancing decision is then made, and after the ADC has selected a real server, the traffic is forwarded to the TCP/UDP port of that real server. That port does not have to be it is possible to forward traffic to port 8080 of a real server even if the client is talking on of the VIP. The destination port of the real server is called the real server port. Health Checks The ADC needs to ensure back-end resources (the ComAssistant front-end servers) are available to receive forwarded traffic. Using health checks the ADC verifies that back-end resources are available. An HTTP health check is basically an HTTP request from the ADC to the real server port, on which the ADC waits to receive an HTTP reply from the HTTP service. The real server port is declared ACTIVE (available) when the real server sends an HTTP response indicating SUCCESS (so called HTTP 2xx OK). Putting It All Together Putting all these things together results in a basic load balancing configuration. The Brocade ADC presents virtual servers to the outside world, and then distributes traffic to its real servers. Clients access the virtual server via defined services (virtual server ports) and the traffic is forwarded to configured real server ports. The Brocade ADC runs health checks to maintain availability of its back end server resources. Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 4 of 24
5 THE BASIC TOPOLOGY Cluster-ID Back-end server PBX CAP HBR CA - MGMT CA Cluster-ID Port X Port Y Admin client (browser) Front-end servers with Web engines ADC 1 ADC 2 Users Port 8443 (SSL) or Port 7789 (HTTP) 1 50,000 Figure 1. The basic topology NOTE: The solution is set up with HTTPS access to the ComAssistant WebGUI only (via ). The HTTP port 7789 is not used, but if it were, it would be configured in the same way as is configured. The Load Balancer For this setup, a Brocade ServerIron 4G (non-ssl and without PREM license) is used and it has the following specifications: Dedicated management processor Dedicated traffic processor Dedicated acceleration ASIC 4 x Gigabit combo-ports (copper or fiber (via SFP)) Up to 1.5 Gigabits per second (Gbps) application level throughput Up to 5,000,000 concurrent sessions Up to 40,000 Layer 4 connections per second Up to 15,000 Layer 7connections per second Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 5 of 24
6 Configuration Prerequisites Before beginning the setup you need to record the following information: ComAssistant real server names ComAssistant real server ports (8443, 7778, 7788, and 7780) ComAssistant real server IP addresses Virtual Server IP address (VIP) Virtual Server ports (8443, 7778, 7788, and 7780) Content to use for health checks Table 1. Example of a setup with eight real servers Real Server Name Real Server IP Address Real Server Ports sg ,7778,7780,7788 sg ,7778,7780,7788 sg ,7778,7780,7788 sg ,7778,7780,7788 sg ,7778,7780,7788 sg ,7778,7780,7788 sg ,7778,7780,7788 sg ,7778,7780,7788 The health check for each of the real servers needs to ask for the URL: /tweb/public/req?ping&returntype=text via The reply to this request needs to contain the content : PortalGUI is alive which asserts that the front-end server is up and running. The virtual server IP should be and the virtual server should offer the following virtual server ports: 8443,7778,7780, and ADC #1 will use IP address ADC #2 will use IP address The ADC default gateway is Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 6 of 24
7 The solution uses a single multi-link trunk only. Traffic from the client to the virtual server and traffic from the load balancer to the real servers crosses the same link, which requires source-nat to force the traffic from the real servers back to the load balancer. Otherwise the real servers would reply via the router, which would result in communication problems. The load balancer needs to see all replies to keep its session table entries up-to-date and to do the reverse address translations. The IP addresses which are getting used for source-nat are and Port #1 of the load balancer is the client facing port and port #2 is a special port used for synchronization between the load balancer pair. ADC 1 ADC 2 Physical IP: Port 4 Physical IP: Source NAT IPs : /139 Gateway: VIRTUAL SERVER IP: Source NAT IPs : /139 Gateway: Sync VIRTUAL SERVER IP: Port 1 Port x / 2 Back-end subnet ComAssistant back-end server IP: Intranet IN TRANET ComAssistant front-end servers IP addresses: Default gateway s: Various client subnets Users 1-50,000 Figure 2. Front-end and back-end servers, clients, and the load balancer BUILDING THE CONFIGURATION The following high-level tasks are required: 1. Configure basic network connectivity and High Availability (HA) 2. Configure global parameters 3. Configure real servers and real server ports 4. Configure a virtual server and virtual server ports with bindings 5. Verify functionality Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 7 of 24
8 1. Configure Basic Network Connectivity and High Availability The load balancers must be configured. Connect a laptop to load balancer #1 using a serial straight-through cable (an EIA/TIA DB-9 serial cable (M/F) is shipped with the device). Use the following terminal settings: Baud: 9600 bps Data bits: 8 Parity: None Stop bits: 1 Flow control: None The following prompt appears: ServerIron> Establish physical connectivity (ensure load balancer #2 is still powered off). Connect port #1 of both load balancers to the router/client facing the subnet. Load Balancer #1 Get the load balancer s MAC address and configure the IP address and default gateway using the Command-Line Interface (CLI). Verify IP connectivity using PING. Save the configuration. ServerIron 4G>ena No password has been assigned yet... ServerIron 4G#show chassis power supply 1 failed power supply 2 failed power supply 1 to 2 from left to right fan 1 ok fan 2 ok fan speed set to high Current temperature : 39.0 C degrees Warning level : 65 C degrees, shutdown level : 75 C degrees Boot Prom MAC: 0012.f288.4a41 ServerIron 4G#conf t ServerIron 4G(config)#ip address ServerIron 4G(config)#ip default-gateway ServerIron 4G(config)#exit ServerIron 4G#ping Sending 1, 16-byte ICMP Echo to , timeout 5000 msec, TTL 64 Type Control-c to abort Reply from : bytes=16 time=4ms TTL=255 Success rate is 100 percent (1/1), round-trip min/avg/max=4/4/4 ms. ServerIron4G#write memory.write startup-config in progress..write startup-config done. ServerIron 4G# Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 8 of 24
9 Create a special sync VLAN (here VLAN #99) using port 4, disable spanning tree globally, activate HA, (using the MAC address from above), and set the pointer to the router/client facing port: ServerIron 4G#conf t ServerIron 4G(config)#vlan 99 ServerIron 4G(config-vlan-99)#untagged eth 4 ServerIron 4G(config-vlan-99)#exit ServerIron 4G(config)#no spanning-tree ServerIron 4G(config)#server backup ethe f288.4a41 vlan-id 99 ServerIron 4G(config)#server router-ports ethernet 1 Configure source-nat IPs and enable source-nat, and save the configuration: (config)#server source-nat-ip port-range 2 (config)#server source-nat-ip port-range 2 (config)#server source-nat (config)#write memory.write startup-config in progress..write startup-config done. (config) Load Balancer #2 Power on load balancer #2. Its configuration is very similar to load balancer #1, however the physical IP is different and the port range is 1 instead of 2. The MAC address stays the same as well as the other parameters. Establish a serial connection to load balancer #2 and follow these configuration instructions: ServerIron 4G>ena No password has been assigned yet... ServerIron 4G#conf t ServerIron 4G(config)#ip address ServerIron 4G(config)#ip default-gateway ServerIron 4G(config)#exit ServerIron 4G#ping Sending 1, 16-byte ICMP Echo to , timeout 5000 msec, TTL 64 Type Control-c to abort Reply from : bytes=16 time=4ms TTL=255 Success rate is 100 percent (1/1), round-trip min/avg/max=4/4/4 ms. ServerIron4G#write memory.write startup-config in progress..write startup-config done. ServerIron 4G#conf t ServerIron 4G(config)#vlan 99 ServerIron 4G(config-vlan-99)#untagged eth 4 ServerIron 4G(config-vlan-99)#exit ServerIron 4G(config)#no spanning-tree ServerIron 4G(config)#server backup ethe f288.4a41 vlan-id 99 ServerIron 4G(config)#server router-ports ethernet 1 (config)#server source-nat-ip port-range 1 (config)#server source-nat-ip port-range 1 (config)#server source-nat (config)#write memory.write startup-config in progress..write startup-config done. (config) Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 9 of 24
10 Connect the load balancers using port #4. Ensure HA (High Availability) comes up between them using the command show server backup on BOTH load balancers: (config)#show server backup Server Backup port = 4 Backup group id = 0 Switch state = Standby SLB state = 0 Peer sync state = 0 SLB Partner MAC valid= 1 SLB Partner MAC = 0012.f27c.a580 SLB Partner VLAN ID = 99 SLB Partner port cnt = 64 SLB Backup preference = 0 minutes SLB Backup timer = 1000 milliseconds [ ] Routers ports = 1, Partner Router ports= 1 Server ports = 0, Partner Server ports= 0 The switch state of one of the ServerIrons should be Standby and the other Active. The SLB state of both ServerIrons should be 0. Both ServerIrons should show the MAC address of the partner behind SLB Partner MAC (check via show chassis ) at both ServerIrons. The VLAN ID used for HA is Configure Global Parameters Begin to configure some global parameters on load balancer #1. A few settings must be changed, and the most important are the port profiles for all real server ports being used. The port profiles define: Protocol type (UDP/TCP) Health check interval (health check every x seconds) and regularity of health checks Number of unsuccessful health checks before declaring a real server port is down Number of successful health checks before declaring a real server port is up Four virtual server/real server ports are used in this example: 8443, 7778, 7780,and Therefore a port profile needs to be defined for each of these ports. All traffic is TCP traffic The load balancer should check the server status every 10 seconds A real server port will be declared as down as soon as the health check goes wrong twice in a row; and the session timeout from the load balancer point of view should be 60 minutes Three successful health checks in a row will result in the real server being declared up again Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 10 of 24
11 Table 2. Health check settings server no-fast-bringup Ensures that health checks are successful up to Layer 7 before declaring a server as available no server use-simple-ssl-health-check SSL health checks are based on content as well and not only the SSL handshake server Profile for port 80 tcp 60 tcp keepalive 10 2 bringup-retries 3 Timeout of 60 minutes It is TCP and the health check is every 10 seconds 2 failed means that the server is down 3 successful health checks in a row to declare the server up The configuration instructions to do this for all virtual/real server ports are as follows: (config)#server no-fast-bringup (config)#no server use-simple-ssl-health-check (config)#server (config-port-8443)#tcp 60 (config-port-8443)#tcp keepalive 10 2 (config-port-8443)#bringup-retries 3 (config-port-8443)#server (config-port-7778)#tcp 60 (config-port-7778)#tcp keepalive 10 2 (config-port-7778)#bringup-retries 3 (config-)#server (config-port-7780)#tcp 60 (config-port-7780)#tcp keepalive 10 2 (config-port-7780)#bringup-retries 3 (config-port-7780)#server (config-port-7788)#tcp 60 (config-port-7788)#tcp keepalive 10 2 (config-port-7788)#bringup-retries 3 (config-port-7788)#exit (config)# You can also configure other global settings: Users with passwords Authentication using these users Host name for the load balancer Domain name for the load balancer SNTP server Syslog server Time zone Health check for the ComAssistant front-end Web servers Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 11 of 24
12 The examples above are covered here, but there are additional settings you might use. For more information, contact your Brocade Systems Engineer. Table 3. Global setting commands with explanations username XYZ password MYPASS Creates a new user with the username XYZ and password MYPASS aaa authentication web-server default local hostname NAME Log in via ssh and WebGui will use the local user DB Changes host name to NAME ip dns domain-name domain.com Changes domain to domain.com sntp server a.b.c.d Sets SNTP server to a.b.c.d logging q.w.e.r Sets syslog server to q.w.e.r clock timezone gmt GMT-08 clock summertime http match-list Alive GMT-08, summertime Content match rule with the name Alive default down Real server is down by default up simple "PortalGUI is alive" server port-policy HTTPS-HC protocol ssl protocol ssl url "GET /tweb/public/req?ping&returntype=t ext HTTP/1.1\r\nHost: \r\n\r\n" protocol ssl content-match Alive Real server is declared as up when the health check answer contains the string in double quotes A port-policy with the name HTTPS-HC is declared to use the SSL protocol and will send an HTTP request as specified Expected answer (see above) The health check will send the virtual server IP as host-header, and this is necessary so that it looks like it is coming from a request to the virtual server. NOTE: Be careful with the question mark (?) inside the URL string in the second-to-last (config-portpolicy-https-hc) statement. You need to escape it using a backslash as shown. (config)#username test password test123 (config)#aaa authentication web-server default local (config)#aaa authentication login default local (config)#hostname myhost (config)#ip dns domain-name domain.com (config)#sntp server (config)#logging (config)#clock timezone gmt GMT+01 Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 12 of 24
13 (config)#clock summertime (config)#http match-list Alive (config-http-ml-alive)#default down (config-http-ml-alive)#up simple PortalGUI is alive (config-http-ml-alive)#server port-policy HTTPS-HC (config-port-policy-https-hc)#protocol ssl (config-port-policy-https-hc)#protocol ssl url GET /tweb/public/req\?ping&returntype=test HTTP/1.1\r\nHost: \r\n\r\n (config-port-policy-https-hc)#protocol ssl content-match Alive 3. Configure Real Servers and Real Server Ports Begin to create the real servers with the real server port at load balancer #1. They all look the same except for their IP addresses and the real server name. The real server IP addresses are through 108. The ports needed are 8443, 7780, 7788, and Table 4. Creating real server ports server real sg Creates a real server with the name sg and the IP address Real server will be used later and is getting a health check using the port policy with the name HTTPS-HC These three additional ports which will be used later These four ports are part of the same health check group, so the load balancer will take them all down as soon as one of them has a problem This needs to be repeated for all the real servers: (config)#server real sg (config-rs-sg016101)# (config-rs-sg016101)# (config-rs-sg016101)# (config-rs-sg016101)# (config-rs-sg016101)# (config-rs-sg016101)# (config-rs-sg016101)#server real sg (config-rs-sg016102)# (config-rs-sg016102)# (config-rs-sg016102)# (config-rs-sg016102)# (config-rs-sg016102)# (config-rs-sg016102)# (config-rs-sg016102)#server real sg (config-rs-sg016103)# (config-rs-sg016103)# (config-rs-sg016103)# (config-rs-sg016103)# (config-rs-sg016103)# (config-real-sg016103)# Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 13 of 24
14 (config-real-sg016103#server real sg (config-real-sg016104)# (config-real-sg016104)# (config-real-sg016104)# (config-real-sg016104)# (config-real-sg016104)# (config-real-sg016104)# (config-real-sg016104)#server real sg (config-real-sg016105)# (config-rs-sg016105)# (config-rs-sg016105)# (config-rs-sg016105)# (config-rs-sg016105)# (config-rs-sg016105)# (config-rs-sg016105)#server real sg (config-rs-sg016106)# (config-rs-sg016106)# (config-rs-sg016106)# (config-rs-sg016106)# (config-rs-sg016106)# (config-rs-sg016106)# (config-rs-sg016106)#server real sg (config-rs-sg016107)# (config-rs-sg016107)# (config-rs-sg016107)# (config-rs-sg016107)# (config-rs-sg016107)# (config-rs-sg016107)# (config-rs-sg016107)#server real sg (config-rs-sg016108)# (config-rs-sg016108)# (config-rs-sg016108)# (config-rs-sg016108)# (config-rs-sg016108)# (config-rs-sg016108)# (config-rs-sg016108)# exit (config)# Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 14 of 24
15 4. Configure Virtual Server and Virtual Server Ports with Bindings Begin by creating a virtual server with the IP address The ports accessible from the client (virtual server ports) are 8443, 7780, 7788, and All ports need to be sticky, because ServerIron needs to remember the server assigned to a client during the first request so that subsequent requests will be sent to the same real server. This needs to happen independently from the port. Table 5. Creating Virtual Server Ports server virtual sg sticky-age 60 sticky-age-multiplier 96 sticky sticky sticky sticky track-group bind 8443 sg sg sg sg bind 8443 sg sg sg sg bind 7780 sg sg sg sg bind 7780 sg sg sg sg bind 7788 sg sg sg sg bind 7788 sg sg sg sg bind 7778 sg sg sg sg bind 7778 sg sg sg sg Creates a virtual server with the name sg and the IP address Clients need to stick to the server selected for them and this needs to be the case over a period of days, such as the weekend, in this example, 96 * 60 minutes = 4 days. Stickiness is important for all ports Stickiness across different ports Binds the real server ports together with the virtual server ports (config)#server virtual sg (config-vs-sg016137)#sticky-age 60 (config-vs-sg016137)#sticky-age-multiplier 96 (config-vs-sg016137)# sticky (config-vs-sg016137)# sticky (config-vs-sg016137)# sticky (config-vs-sg016137)# sticky (config-vs-sg016137)#track-group (config-vs-sg016137)#bind 8443 sg sg sg sg (config-vs-sg016137)#bind 8443 sg sg sg sg (config-vs-sg016137)#bind 7780 sg sg sg sg (config-vs-sg016137)#bind 7780 sg sg sg sg (config-vs-sg016137)#bind 7788 sg sg sg sg (config-vs-sg016137)#bind 7788 sg sg sg sg (config-vs-sg016137)#bind 7778 sg sg sg sg (config-vs-sg016137)#bind 7778 sg sg sg sg Now return to Step 2 and repeat Steps 2, 3 and 4 for load balancer #2. Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 15 of 24
16 5. Verify functionality Verify again that the master and backup status of the ServerIrons is correct, using the command show server backup at both ServerIrons. One ServerIron needs to be Active and the other Standby. The Server Backup Port should be 4 and the SLB Partner VLAN ID should be 99. The number of router ports and partner router ports should be 1, whereas the number of server ports and partner server ports should be 0. SLB-ServerIron 4G#show server backup Server Backup port = 4 Backup group id = 0 Switch state = Active SLB state = 0 Peer sync state = 0 SLB Partner MAC valid = 1 SLB Partner MAC = 0012.f27c.3f60 SLB Partner VLAN ID = 99 SLB Partner port cnt = 64 SLB Backup preference = 0 minutes [ ] Router ports = 1, Partner Router ports = 1 Server ports = 0, Partner Server ports = 0 Verify that all real servers are up and running by using the command show server bind at both ServerIrons. ServerIron 4G(config)#show server bind Bind info Virtual server: sg Status: enabled IP: > sg016101: , 8443 (Active) sg016102: , 8443 (Active) sg016103: , 8443 (Active) sg016104: , 8443 (Active) sg016105: , 8443 (Active) sg016106: , 8443 (Active) sg016107: , 8443 (Active) sg016108: , 8443 (Active) > sg016101: , 7780 (Active) sg016102: , 7780 (Active) sg016103: , 7780 (Active) sg016104: , 7780 (Active) sg016105: , 7780 (Active) sg016106: , 7780 (Active) sg016107: , 7780 (Active) sg016108: , 7780 (Active) > sg016101: , 7788 (Active) sg016102: , 7788 (Active) sg016103: , 7788 (Active) sg016104: , 7788 (Active) sg016105: , 7788 (Active) sg016106: , 7788 (Active) sg016107: , 7788 (Active) sg016108: , 7788 (Active) Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 16 of 24
17 > sg016101: , 7778 (Active) sg016102: , 7778 (Active) sg016103: , 7778 (Active) sg016104: , 7778 (Active) sg016105: , 7778 (Active) sg016106: , 7778 (Active) sg016107: , 7778 (Active) sg016108: , 7778 (Active) 4G(config)# Check the virtual server statistics all counters should be 0 (no testing done so far): ServerIron 4G(config)#show server virtual Virtual Servers Info Name: sg State: Enabled IP: : 1 Pred: least-conn ACL-Id: 0 TotalConn: 0 VIP state: healthy Port State Sticky Concur Proxy DSR CurConn TotConn PeakConn default enabled NO NO NO NO enabled YES NO NO NO enabled YES NO NO NO enabled YES NO NO NO enabled YES NO NO NO ServerIron 4G(config)# Establish connections to the ComAssistant WebGUI using some clients (connecting to :8443 ). Counters should begin to increase: ServerIron 4G(config)#show server virtual Virtual Servers Info Name: sg State: Enabled IP: : 1 Pred: least-conn ACL-Id: 0 TotalConn: 0 VIP state: healthy Port State Sticky Concur Proxy DSR CurConn TotConn PeakConn default enabled NO NO NO NO enabled YES NO NO NO enabled YES NO NO NO enabled YES NO NO NO enabled YES NO NO NO ServerIron 4G(config)# Failover test: Get the output of show server backup at both ServerIrons. Unplug the cable connected to port 1 at the ServerIron showing Active. The active box should move to Standby status and the old Standby ServerIron to Active status. Ensure that it is still possible to connect to the virtual sever using the virtual service. Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 17 of 24
18 COMPLETING THE CONFIGURATION For Load Balancer #1 Building configuration... Current configuration : 6093 bytes ver eTI2 server backup ethe f27c.0983 vlan-id 99 server no-fast-bringup no server use-simple-ssl-health-check server tcp 60 tcp keepalive 10 2 bringup-retries 3 server tcp 60 tcp keepalive 10 2 bringup-retries 3 server tcp 60 tcp keepalive 10 2 bringup-retries 3 server tcp 60 tcp keepalive 10 2 bringup-retries 3 server source-nat server source-nat-ip port-range 2 server source-nat-ip port-range 2 server router-ports ethernet 1 context default server port-policy HTTPS-HC protocol ssl protocol ssl url "GET /tweb/public/req?ping&returntype=text HTTP/1.1\r\nHost: \r\n\r\n" protocol ssl content-match Alive server real sg Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 18 of 24
19 server real sg server real sg server real sg server real sg server real sg server real sg Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 19 of 24
20 server real sg server virtual sg sticky-age 60 sticky-age-multiplier 96 sticky sticky sticky sticky track-group bind 8443 sg sg sg sg bind 8443 sg sg sg sg bind 7780 sg sg sg sg bind 7780 sg sg sg sg bind 7788 sg sg sg sg bind 7788 sg sg sg sg bind 7778 sg sg sg sg bind 7778 sg sg sg sg vlan 1 name DEFAULT-VLAN by port no spanning-tree vlan 99 by port untagged ethe 4 no spanning-tree http match-list Alive default down up simple "PortalGUI is alive" aaa authentication web-server default local aaa authentication login default local enable telnet password... no enable aaa console hostname myhost ip address ip default-gateway ip dns domain-name domain.com logging telnet server username test password... clock summer-time clock timezone gmt GMT+01 sntp server Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 20 of 24
21 For Load Balancer #2 Building configuration... Current configuration : 6093 bytes ver eTI2 server backup ethe f27c.0983 vlan-id 99 server no-fast-bringup no server use-simple-ssl-health-check server tcp 60 tcp keepalive 10 2 bringup-retries 3 server tcp 60 tcp keepalive 10 2 bringup-retries 3 server tcp 60 tcp keepalive 10 2 bringup-retries 3 server tcp 60 tcp keepalive 10 2 bringup-retries 3 server source-nat server source-nat-ip port-range 1 server source-nat-ip port-range 1 server router-ports ethernet 1 context default server port-policy HTTPS-HC protocol ssl protocol ssl url "GET /tweb/public/req?ping&returntype=text HTTP/1.1\r\nHost: \r\n\r\n" protocol ssl content-match Alive server real sg Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 21 of 24
22 server real sg server real sg server real sg server real sg server real sg server real sg server real sg Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 22 of 24
23 server virtual sg sticky-age 60 sticky-age-multiplier 96 sticky sticky sticky sticky track-group bind 8443 sg sg sg sg bind 8443 sg sg sg sg bind 7780 sg sg sg sg bind 7780 sg sg sg sg bind 7788 sg sg sg sg bind 7788 sg sg sg sg bind 7778 sg sg sg sg bind 7778 sg sg sg sg vlan 1 name DEFAULT-VLAN by port no spanning-tree vlan 99 by port untagged ethe 4 no spanning-tree http match-list Alive default down up simple "PortalGUI is alive" aaa authentication web-server default local aaa authentication login default local enable telnet password... no enable aaa console hostname myhost ip address ip default-gateway ip dns domain-name domain.com logging telnet server username test password... clock summer-time clock timezone gmt GMT+01 sntp server Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 23 of 24
24 2009 Brocade Communications Systems, Inc. All Rights Reserved. 07/09 GA-SG Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronPoint, IronShield, IronView, IronWare, JetCore, NetIron, SecureIron, ServerIron, StorageX, and TurboIron are registered trademarks, and DCFM and SAN Health are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands, products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of their respective owners. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. Configuring the Brocade ServerIron to Enable Peak Performance of the Siemens ComAssistant 24 of 24
Transparent Cache Switching Using Brocade ServerIron and Blue Coat ProxySG
Transparent Cache Switching Using Brocade ServerIron and Blue Coat ProxySG This document provides best-practice guidance for Brocade ServerIron ADC deployments using Transparent Cache Switching (TCS) with
Configuring Highly Available OracleAS Infrastructure with Brocade ServerIron Application Delivery Controllers
Configuring Highly Available OracleAS Infrastructure with Brocade ServerIron Application Delivery Controllers An Oracle-Brocade White Paper Configuring Highly Available OracleAS Infrastructure with Brocade
CAMPUS NETWORK Enhancing the Performance of Microsoft Office SharePoint Server Using Brocade ServerIron and Blue Coat ProxySG
Enhancing the Performance of Microsoft Office SharePoint Server Using Brocade ServerIron and Blue Coat ProxySG This document provides best-practice guidance using the Microsoft Office SharePoint Server
DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch
DATA CENTER Best Practices for High Availability Deployment for the Brocade ADX Switch CONTENTS Contents... 2 Executive Summary... 3 Introduction... 3 Brocade ADX HA Overview... 3 Hot-Standby HA... 4 Active-Standby
WHITE PAPER MICROSOFT LIVE COMMUNICATIONS SERVER 2005 LOAD BALANCING WITH FOUNDRY NETWORKS SERVERIRON PLATFORM
NOTE: Foundry s ServerIron load balancing switches have been certified in Microsoft s load balancing LCS 2005 interoperability labs. Microsoft experts executed a variety of tests against Foundry switches.
Deploying SAP NetWeaver Infrastructure with Foundry Networks ServerIron Deployment Guide
Deplloyiing SAP NetWeaver Inffrastructure s wiith Foundry Networks ServerIron Deployment Guide July 2008 Copyright Foundry Networks Page 1 Table of Contents Executive Overview... 3 Deployment Architecture...
CLE202 Introduction to ServerIron ADX Application Switching and Load Balancing
Introduction to ServerIron ADX Application Switching and Load Balancing Student Guide Revision : Introduction to ServerIron ADX Application Switching and Load Balancing Corporate Headquarters - San
Solution Guide: Load Balancing with the Brocade ServerIron Platform
Solution Guide: Load Balancing with the Brocade ServerIron Platform Brocade ServerIron switches, when deployed in front of the Microsoft Office Communications Server 2007, increase application uptime,
Deploying the Brocade ServerIron ADX with Microsoft Exchange Server 2010
Deploying the Brocade ServerIron ADX with Microsoft Exchange Server 2010 Provides reference architecture and procedures for deploying the Brocade ServerIron ADX Series switches with Microsoft Exchange
ServerIron TrafficWorks Firewall Load Balancing Guide
ServerIron TrafficWorks Firewall Load Balancing Guide ServerIron 4G Series ServerIronGT C Series ServerIronGT E Series ServerIron 350 & 350-PLUS ServerIron 350 & 350-PLUS ServerIron 450 & 450-PLUS Release
APPLICATION NOTES High-Availability Load Balancing with the Brocade ServerIron ADX and McAfee Firewall Enterprise (Sidewinder)
High-Availability Load Balancing with the Brocade ServerIron ADX and McAfee Firewall Enterprise (Sidewinder) This solution leverages interoperable and best-of-breed networking and security products, tailored
Server Iron Hands-on Training
Server Iron Hands-on Training Training Session Agenda Server Iron L4 Solutions Server Iron L7 Solutions Server Iron Security Solutions High Availability Server Iron Designs 2 Four Key Reasons for Server
APPLICATION NOTES Seamless Integration of LAN and WLAN through Brocade mobility products and
Seamless Integration of LAN and WLAN through Brocade mobility products and ShoreTel VoIP Phones This solution leverages interoperable and best-of-breed networking and security products, tailored to fit
150-420. Brocade Certified Layer 4-7 Professional 2010. Version: Demo. Page <<1/8>>
150-420 Brocade Certified Layer 4-7 Professional 2010 Version: Demo Page QUESTION NO: 1 Given the command shown below, which statement is true? aaa authentication enable default radius local A.
Deployment Guide Oracle Siebel CRM
Deployment Guide Oracle Siebel CRM DG_ OrSCRM_032013.1 TABLE OF CONTENTS 1 Introduction...4 2 Deployment Topology...4 2.1 Deployment Prerequisites...6 2.2 Siebel CRM Server Roles...7 3 Accessing the AX
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure
Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure When installed in front of Microsoft Lync Server 2010 Enterprise Edition,
Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365
Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365 DG_ADFS20_120907.1 TABLE OF CONTENTS 1 Overview... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites...
Deployment Guide AX Series with Citrix XenApp 6.5
Deployment Guide AX Series with Citrix XenApp 6.5 DG_XenApp_052012.1 TABLE OF CONTENTS 1 Introduction... 4 1 Deployment Guide Overview... 4 2 Deployment Guide Prerequisites... 4 3 Accessing the AX Series
QUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
Deployment Guide. AX Series for Microsoft Lync Server 2010
Deployment Guide AX Series for Microsoft Lync Server 2010 TABLE OF CONTENTS Introduction... 3 Deployment Guide Overview... 5 Deployment Prerequisites and Assumptions... 7 AX Deployment for Lync Server
Deployment Guide Microsoft IIS 7.0
Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...
Load Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance
1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation
login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30
logging enable logging console 4 logging timestamp logging trap 5 logging buffered 4 logging device id hostname logging host 10.0.128.240 udp/514 format emblem logging host 10.0.143.24 udp/514 login timeout
Cisco S380 and Cisco S680 Web Security Appliance
QUICK START GUIDE Cisco S380 and Cisco S680 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance in a Rack 6 Plug In the Appliance
Introduction to ServerIron ADX Application Switching and Load Balancing. Module 5: Server Load Balancing (SLB) Revision 0310
Introduction to ServerIron ADX Application Switching and Load Balancing Module 5: Server Load Balancing (SLB) Revision 0310 Objectives Upon completion of this module the student will be able to: Describe
DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD
DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD Configuring the BIG-IP LTM system for use with FirePass controllers Welcome to the Configuring
SAML 2.0 SSO Deployment with Okta
SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment
QUICK START GUIDE Cisco M380 and Cisco M680 Content Security Management Appliance
QUICK START GUIDE Cisco M380 and Cisco M680 Content Security Management Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance in a Rack 6 Plug
Exam Name: Foundry Networks Certified Layer4-7 Professional Exam Type: Foundry Exam Code: FN0-240 Total Questions: 267
Question: 1 SYN-Guard and SYN-Defense can be configured on: A. ServerIron XL B. ServerIron 100 C. ServerIron 400 D. ServerIron 800 E. ServerIron 450 F. ServerIron 850 G. ServerIron GT-E, C, D, E, F, G
Advanced SLB High Availability and Stateless SLB
Advanced SLB High Availability and Stateless SLB Objectives Upon completion of this module, you will be able to: Describe Server Load Balancing (SLB) high availability Distinguish between different high
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
High Availability. PAN-OS Administrator s Guide. Version 7.0
High Availability PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Deployment Guide AX Series for Palo Alto Networks SSL Intercept and Firewall Load Balancing
Deployment Guide AX Series for Palo Alto Networks SSL Intercept and Firewall Load Balancing DG_PA-SSL_Intercept_2012.12.1 Table of Contents 1 Overview... 4 2 Deployment Prerequisites... 4 3 Architecture
Brocade SIP-Intelligent Application Switching for IP Communication Services
WHITE PAPER Application Delivery Brocade SIP-Intelligent Application Switching for IP Communication Services Highlights the value of highly available and scalable application switching and details the
Deployment Guide MobileIron Sentry
Deployment Guide MobileIron Sentry DG_MIS_052013.1 TABLE OF CONTENTS 1 Introduction... 3 2 Deployment Guide Overview... 3 3 Deployment Guide Prerequisites... 3 4 Accessing the AX Series Load Balancer...
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
Deployment Guide AX Series for Palo Alto Networks Firewall Load Balancing
Deployment Guide AX Series for Palo Alto Networks Firewall Load Balancing DG_PAFWLB_120718.1 TABLE OF CONTENTS 1 Overview... 4 2 Deployment Prerequisites... 4 3 Architecture Overview... 5 4 Access Credentials...
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Deploying the BIG-IP System with Oracle E-Business Suite 11i
Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system
Lab 3.5.1: Basic VLAN Configuration (Instructor Version)
(Instructor Version) Topology Diagram Addressing Table Device (Hostname) Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 172.17.99.11 255.255.255.0 N/A S2 VLAN 99 172.17.99.12 255.255.255.0
eprism Email Security Suite
Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered
High Availability. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
High Availability Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Multi-Chassis Trunking for Resilient and High-Performance Network Architectures
WHITE PAPER www.brocade.com IP Network Multi-Chassis Trunking for Resilient and High-Performance Network Architectures Multi-Chassis Trunking is a key Brocade technology in the Brocade One architecture
How to configure MAC authentication on a ProCurve switch
An HP ProCurve Networking Application Note How to configure MAC authentication on a ProCurve switch Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. Configuring the ProCurve
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Configuring VIP and Virtual IP Interface Redundancy
CHAPTER 6 Configuring VIP and Virtual IP Interface Redundancy This chapter describes how to plan for and configure Virtual IP (VIP) and Virtual IP Interface Redundancy on the CSS. Information in this chapter
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Deployment Guide Microsoft Exchange 2013
Deployment Guide Microsoft Exchange 2013 DG_MIS_072013.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Prerequisites... 4 3 Exchange Server 2010 Roles... 5 4 Accessing the ACOS Device... 5 5
Starting a Management Session
Management Software AT-S63 Starting a Management Session AT-S63 Version 2.2.0 for the AT-9400 Layer 2+ Switches AT-S63 Version 3.0.0 for the AT-9400 Basic Layer 3 Switches 613-000817 Rev. A Copyright 2007
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview.
Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2 Organizations can use the Barracuda Load Balancer to enhance the scalability and availability of their Microsoft Office Communications
Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
TotalCloud Phone System
TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power
Radware AppDirector and Juniper Networks Secure Access SSL VPN Solution Implementation Guide
Implementation Guide Radware AppDirector and Juniper Networks Secure Access SSL VPN Solution Implementation Guide Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000
Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide
Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013 Deployment Guide rev. 1.4.2 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances
Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Set Up Panorama Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Dominion KX II-101-V2
Dominion KX II-101-V2 Quick Setup Guide Thank you for your purchase of the Dominion KX II-101-V2, the economical, full-featured, single-port digital KVM-over-IP device. For details on using the KX II-101-V2,
iboss Enterprise Deployment Guide iboss Web Filters
iboss Enterprise Deployment Guide iboss Web Filters Copyright Phantom Technologies, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Installation of the On Site Server (OSS)
Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit
How to Configure Web Authentication on a ProCurve Switch
An HP ProCurve Networking Application Note How to Configure Web Authentication on a ProCurve Switch Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network diagram... 2 4. Configuring the ProCurve
Solution Guide: Brocade Server Application Optimization for a Scalable Oracle Environment
Solution Guide: Brocade Server lication Optimization for a Scalable Oracle Environment Optimize the performance and scalability of Oracle applications and databases running Oracle Enterprise Linux (OEL)
Overview of WebMux Load Balancer and Live Communications Server 2005
AVANU Load Balancing for Microsoft Office Live Communications Server 2005 WebMux Delivers Improved Reliability, Availability and Scalability Overview of WebMux Load Balancer and Live Communications Server
Using the NetVanta 7100 Series
MENU OK CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU MENU OK CANCEL CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU OK CANCEL CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU OK CANCEL CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU OK CANCEL 1 2
Thunder Series for SAP BusinessObjects (BOE)
DEPLOYMENT GUIDE Thunder Series for SAP BusinessObjects (BOE) Table of Contents Introduction... 2 Deployment Guide Prerequisites... 2 Application Specific Deployment Notes... 2 Accessing the Thunder Series
LifeSize Video Communications Systems Administrator Guide
LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX NOTE: This is an advisory document to be used as an aid to resellers and IT staff looking to use the Edgewater 4550 in conjunction with
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
CT5760 Controller and Catalyst 3850 Switch Configuration Example
CT5760 Controller and Catalyst 3850 Switch Configuration Example Document ID: 116342 Contributed by Antoine KMEID and Serge Yasmine, Cisco TAC Engineers. Aug 13, 2013 Contents Introduction Prerequisites
DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform.
This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform. Traffic Requirements The Vectra X-series platform detects threats and attacks
Trouble Shooting SiteManager to GateManager access
Trouble Shooting SiteManager to GateManager access If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection issues, this document
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
Exam : EE0-511. : F5 BIG-IP V9 Local traffic Management. Title. Ver : 12.19.05
Exam : EE0-511 Title : F5 BIG-IP V9 Local traffic Management Ver : 12.19.05 QUESTION 1 Which three methods can be used for initial access to a BIG-IP system? (Choose three.) A. serial console access B.
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Savvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
F5 BIG-IP V9 Local Traffic Management EE0-511. Demo Version. ITCertKeys.com
F5 BIG-IP V9 Local Traffic Management EE0-511 Demo Version Question 1. Which three methods can be used for initial access to a BIG-IP system? (Choose three.) A. Serial console access B. SHH access to the
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Command Line Interface User s Guide
Management Software AT-S85 and AT-S97 Command Line Interface User s Guide AT-MCF2000 Media Converter Series Version 1.3.0 613-000789 Rev. A Copyright 2007 Allied Telesis, Inc. All rights reserved. No part
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Thunder ADC for Epic Systems
DEPLOYMENT GUIDE Thunder ADC for Epic Systems Table of Contents Introduction... 2 Deployment Guide Overview... 2 Deployment Guide Prerequisites... 2 Accessing the Thunder Series ADC... 2 Architecture Overview...
USING BROCADE ADX LOAD BALANCER WITH EMC ATMOS
White Paper USING BROCADE ADX LOAD BALANCER WITH EMC ATMOS Best Practices Guide and Online File Sharing Reference Architecture for EMC Syncplicity Michael Wehle, Corporate Systems Engineer, EMC Abstract
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
Management Software. User s Guide AT-S84. For the AT-9000/24 Layer 2 Gigabit Ethernet Switch. Version 1.1. 613-000368 Rev. B
Management Software AT-S84 User s Guide For the AT-9000/24 Layer 2 Gigabit Ethernet Switch Version 1.1 613-000368 Rev. B Copyright 2006 Allied Telesyn, Inc. All rights reserved. No part of this publication
BCLP in a Nutshell Study Guide for Exam 150-420. Exam Preparation Materials
BCLP in a Nutshell Study Guide for Exam 150-420 Exam Preparation Materials Revision August 2010 Corporate Headquarters - San Jose, CA USA T: (408) 333-8000 [email protected] European Headquarters - Geneva,
Resonate Central Dispatch
Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and
Load Balancing Trend Micro InterScan Web Gateway
Load Balancing Trend Micro InterScan Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...
emerge 50P emerge 5000P
emerge 50P emerge 5000P Initial Software Setup Guide May 2013 Linear LLC 1950 Camino Vida Roble Suite 150 Carlsbad, CA 92008 www.linearcorp.com Copyright Linear LLC. All rights reserved. This guide is
Brocade and EMC Solution for Microsoft Hyper-V and SharePoint Clusters
Brocade and EMC Solution for Microsoft Hyper-V and SharePoint Clusters Highlights a Brocade-EMC solution with EMC CLARiiON, EMC Atmos, Brocade Fibre Channel (FC) switches, Brocade FC HBAs, and Brocade
53-1002684-01 17 December 2012. ServerIron ADX. Firewall Load Balancing Guide. Supporting Brocade ServerIron ADX version 12.5.00
17 December 2012 ServerIron ADX Firewall Load Balancing Guide Supporting Brocade ServerIron ADX version 12.5.00 2012 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol,
CounterACT 7.0 Single CounterACT Appliance
CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment
Firewall Load Balancing
CHAPTER 6 This chapter describes the (FWLB) feature. It includes the following sections: FWLB Overview, page 6-1 FWLB Features, page 6-2 FWLB Configuration Tasks, page 6-3 Monitoring and Maintaining FWLB,
How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions
How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Cisco UC500 IP PBX to connect to Integra Telecom SIP Trunks.
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
Managing Virtual Servers
CHAPTER 4 Content Switching Module Device Manager (CVDM-CSM) displays details of existing virtual servers and enables users to perform detailed tasks that include creating or deleting virtual servers,
SANGFOR SSL VPN. Quick Start Guide
SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully
Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0
Sendio Email System Protection Appliance Quick Start Guide Sendio 0 Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +949.274375 www.sendio.com QUICK START GUIDE SENDIO This Quick Start
FortiOS Handbook - Load Balancing VERSION 5.2.2
FortiOS Handbook - Load Balancing VERSION 5.2.2 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-
MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features
