Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication



Similar documents
Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication

Secure VoIP for optimal business communication

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Configuring and Implementing A10

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions

Secure Access Gateway 3000er Serie

Windows Embedded Security and Surveillance Solutions

Security Gateway 10er Serie

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for BEA WebLogic

Contents. Load balancing and high availability

axsguard Gatekeeper Internet Redundancy How To v1.2

Load Balancing using Pramati Web Load Balancer

MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic

AppDirector Load balancing IBM Websphere and AppXcel

Cisco ASA 5500 Series VPN Edition for the Enterprise

The Application Front End Understanding Next-Generation Load Balancing Appliances

Deployment Guide July-2014 rev. a. Deploying Array Networks APV Series Application Delivery Controllers with Oracle WebLogic 12c

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise

Avaya P333R-LB. Load Balancing Stackable Switch. Load Balancing Application Guide

Internet Redundancy How To. Version 8.0.0

WHITE PAPER. Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager

Cisco Application Networking Manager Version 2.0

Check Point taps the power of virtualization to simplify security for private clouds

Lucent VPN Firewall Security in x Wireless Networks

Netsweeper Whitepaper

Firewall and UTM Solutions Guide

Monitoring Traffic manager

Radware s AppDirector and Microsoft Windows Terminal Services 2008 Integration Guide

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

IRENE. Intelligence between POS terminal and authorization system. Gateway. Increased security, availability and transparency.

Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.

Building a Systems Infrastructure to Support e- Business

Optimal Network Connectivity Reliable Network Access Flexible Network Management

Load Balancing Security Gateways WHITE PAPER

AscenLink. Aggregating links for maximum performance. WAN Traffic Management

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Installation and configuration guide

VMware vcloud Networking and Security Overview

PART D NETWORK SERVICES

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Deployment Guide May-2015 rev. a. APV Oracle PeopleSoft Enterprise 9 Deployment Guide

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Gigabit Content Security Router

How Cisco IT Protects Against Distributed Denial of Service Attacks

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Online Transaction Processing in SQL Server 2008

Gigabit Multi-Homing VPN Security Router

Networking and High Availability

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Integrate Astaro Security Gateway

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Installation and configuration guide

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

High Availability Configuration Guide Version 9

Firewall Defaults and Some Basic Rules

Firewalls Overview and Best Practices. White Paper

Achieve Deeper Network Security

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB _v02

Load Balancing 101: Firewall Sandwiches

FortiGate High Availability Overview Technical Note

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Enterprise Buyer Guide

T E C H N I C A L S A L E S S O L U T I O N

DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch

White Paper. Complementing or Migrating MPLS Networks

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

Business Case for a DDoS Consolidated Solution

Denial of Service (DOS) Testing IxChariot

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

PRODUCT CATEGORY BROCHURE. Juniper Networks Integrated

A Layperson s Guide To DoS Attacks

Array Networks & Microsoft Exchange Server 2010

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Business Case for Data Center Network Consolidation

WHITE PAPER MICROSOFT LIVE COMMUNICATIONS SERVER 2005 LOAD BALANCING WITH FOUNDRY NETWORKS SERVERIRON PLATFORM

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Kronos Workforce Central 6.1 with Microsoft SQL Server: Performance and Scalability for the Enterprise

Secure Cloud-Ready Data Centers Juniper Networks

Deploying Firewalls Throughout Your Organization

4 Delivers over 20,000 SSL connections per second (cps), which

Managed Security Services for Data

Assuring Your Business Continuity

HUAWEI OceanStor Load Balancing Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

EMC PowerPath Family

Server Consolidation with SQL Server 2008

Achieve Deeper Network Security and Application Control

Transcription:

Feature Brief Policy-Based Server Load Balancing March 2007 Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication Protecting Values

Introduction Clavister Security Service Platform (SSP ) is our proven, feature-rich and service-oriented framework for providing best-inclass security solutions. Clavister SSP comprises of Clavister Network Security Elements, Clavister Lifecycle Systems, and Clavister Lifecycle Services. Its combination of precise control, fine-granular administration, and seamless scalability makes it easy to provision the perfect solution for any customer; be it a small organization, a large Internet Service Provider, a Managed Security Service Provider, or a multimedia-ready telecom operator. Clavister Network Security Elements The physical building blocks installed in the network. The major network security element products are the Clavister Security Gateway; pre-packaged solutions in either turn-key appliance format for easy deployment or software-only format for your preferred hardware platform. Clavister Lifecycle Systems A set of software components enabling true network security management throughout the entire lifecycle, including deployment, configuration, integration, monitoring, reporting, and analysis/optimization/troubleshooting. Clavister Lifecycle Services Empowers you and your products with tools, services, and resources that help maximize benefits and eliminate problems, including planning, deployment, optimization, operations and maintenance. Clavister SSP provides a secure environment for your business; as a service provided to you by a Managed Security Service Provider (MSSP) or as systems and services integrated in your own network. For more information about Clavister products and services, please visit us at:. Server Load Balancing Clavister Security Gateway comes with an integrated Server Load Balancing feature, which turns it into an intelligent, high-availability load-balancing device for any company s server farms, no matter if they are public web servers or internal applications. The Server Load Balancing (SLB) feature included in the Clavister Security Gateway is closely integrated with the Clavister Sercurity Gateway core functionality, which is activated/deactivated as a part of a policy set, thus making it highly flexible and configurable. Server Load Balancing in Clavister Security Gateway has the following key features: Load Distribution Server Monitoring Load Distribution The Load Distribution feature is responsible for distributing packets to destination servers/applications according to the chosen distribution method and distribution algorithm. Distribution Modes The mode of distribution controls the way connections are established between the client and the server. There are three distinct distribution modes - Per-State Distribution, IP Address Stickiness, and Network Stickiness. Per-State Distribution This model can record state of every distribution. Based on this state information is possible to transfer complete session to the same server. The Per-State Distribution model guarantees reliable data transmission.

Protecting Values IP Address Stickiness In this mode, all connections from a specific client will be sent to the same server. This is particularly important for SSL services such as HTTPS, which require a consistent connection to the same host. Network Stickiness Essentially the same as IP Stickiness, but the difference is that a netmask is applied to determined the uniqueness of an IP address. Algorithms The Server Load Balancing feature in Clavister Security Gateway use different algorithms to ensure optimal traffic throughput. The goal of these algorithms is to intelligently distribute load and maximize the utilization of all servers within a cluster. Clavister Security Gateway support two algorithms - Round-Robin and Connection-Rate. Round-Robin Algorithm The Round-Robin algorithm redirects the network connections to a different server in a round-robin manner. It treats all real servers as equal regardless of number of connections or response time. This algorithm is suitable when the real server of cluster have equal processing capabilities. Connection-Rate Algorithm The Connection-Rate algorithm redirects a connection to the server with the least number of connections in a predefined timespan. New connections are saved in an array that tracks how many connection was made each second. The array is updated each second. This algorithm is suitable in a heterogeneous server environments, where real servers or cluster have different processing capabilities. Server Monitoring Performing various checks to determine the health of servers and applications is one of the most important benefits of the Server Load Balancing feature. Clavister Security Gateway can perform certain network-level checks at different OSI layer, which makes server monitoring both flexible and powerful. When a server/application fails, it is removed from the active server/application lists and traffic is not routed to it until the server or application is restored. ICMP Ping Clavister Security Gateway pings the real server IP address. A ping is used to check whether the server is available. This is also known as heartbeat. TCP Connection Clavister Security Gateway attempts to connect or bind to configured ports where applications are running. For example, if the server runs a web application on port 80, Clavister Security Gateway attempts to establish a connection or attempts to bind to that port. The Clavister Security Gateway sends a TCP SYN request to port 80 on each physical server and checks for a TCP SYN/ ACK in return. If the connection or bind fails, Clavister Security Gateway marks the port 80 to be down on that server. Load Distribution Scenario Server Load Balancing is very commonly used for distributing HTTP traffic across a farm of web servers to achieve higher performance, shorter response times and increased resiliency.

As most web applications are session based, it is required that the clients connects to the same physical web server during their entire session. Internet xxx.xxx.xxx.x25 xxx.xxx.xxx.x19 SG4200 25% 25% 25% 25%.2.3.4.5 Server Farm 1 HTTP, SMTP Figure 1: Server Load Balancing By configuring the Clavister Security Gateway to run Server Load Balancing with IP Address Stickiness distribution mode, it is possible to achieve powerful load balancing, and at the same time assure that the client will be routed to the same physical server during the entire session. Questions and Answers When does Server Load Balancing in Clavister Security Gateway make sense? Clavister Security Gateway with Server Load Balancing is the answer to three key issues when it comes to server clustering; Availability, Scalability and Simplified Administration. Availability Q: How does Server Load Balancing provide increased availability?

Protecting Values A: Clavister Security Gateway provides increase availability by adding redundancy and eliminating single point of failures. It adds the possibility to guarantee availability to critical systems and services. Q: What happens if the Clavister Security Gateway itself stops functioning for some reason? A: Clavister Security Gateway is built for resilient solutions and provides the capability to have redundant gateways which automatically takes over the role as active gateway in the rare case of hardware failure. Q: How many servers can you add to a cluster provisioned by the Clavister Security Gateway? A: Clavister Security Gateway is built to function even in the extreme scenarios and there is no exact limit to how many servers you can place in a server farm, however there are of course practical limits, such as financial limits. Q: What happens if a server or application in the cluster ceases to work? A: If a server or application provisioned by Clavister Security Gateway ceases to work the Health Monitoring mechanism detects the problem and automatically stops routing traffic to the malfunctioning host and balances the load to the other servers. Scalability Q: In what way does Server Load Balancing provide scalability? A: Clavister Security Gateway increase scalability by allowing the administrator to easily add more servers to a cluster and to expand with the growing need for performance and availability. Q: What value does this scalability provide to our company? A: By enabling your company to easily expand the server farm you can balance the need for performance against current financial means. This type of scalability also makes it possible to purchase less expensive main-stream servers instead of expensive cutting- edge technology servers in order to stay ahead. Simplified Administration Q: Administration is a time-consuming task for us since service availability must be guaranteed at all times, does the Clavister Security Gateway help us simplifying this task? A: Yes, as there are no single points of failure you can easily disable one or more servers to perform maintenance whilst providing the critical service without any interruptions. Conclusion This Feature Brief describes Policy-Based Server Load Balancing and how to use it with your Clavister SSP installation. Below are some key customer benefits: Clavister SSP Key Benefits Robust Security The purpose-built security offering from Clavister provides a complete set of security features, including SPI Firewalling with DoS and DDoS protection, VPN with strong encryption, and User Authentication. Rapid Deployment The Clavister Security Gateway provides effortless and rapid deployment. A trained technician can easily deploy and configure new network security elements within minutes, even across continents. Flexible Traffic Control The highly sophisticated bandwidth management capabilities in the Clavister Security Gateway makes it possible to not only guarantee bandwidth for business critical applications or server, but also to optimize the entire traffic flow in your network and avoid inefficient bandwidth usage. Lowered Costs for Administration The powerful administration system that comes with Clavister Security Gateway enables organizations to lower the costs for administration through centralized management. The administration system makes it possible to deploy and configure all devices across the network, no matter if they are located next door or across the globe. High Performance Scalable performance with unsurpassed maximum bandwidth, concurrent connections and simultaneous VPN tunnels makes the Clavister Security Gateway the ideal choice even in the most demanding environments like Internet Service Provider Networks, Data Centers, and telecom operators.

Low Total Cost of Ownership (TCO) Clavister s goal is to provide complete security solutions more cost efficiently than any competitor. Clavister SSP with its unique combination of integrated features, world-class service and support, and powerful administration system provide the lowest TCO and the best price/performance ratio possible. Load Balancing Unique Benefits Reduced workload on servers and applications Faster responses to users requests Server array scalability Load balancing customizable through several customizable algorithms Increased revenues through prioritization of commercial systems Decreased costs of maintenance and operation Improved fault-tolerance - 24/7 service availability Agent-free technology No need for additional host-based applications Simplified administration without any need for service interruptions during restarts Feedback Clavister Product Marketing is always interested in feedback from our readers. Please direct suggestions, comments or questions regarding this document to product-marketing@clavister.com. Please include the title of the document in your e-mail. About Clavister Clavister - a Swedish privately owned company developing IT security products, including its award-winning Clavister Security Service Platform (SSP ). This serviceoriented framework enables organizations to monitor network traffic, protecting critical business assets and blocking undesirable surfing. It will also protect you against intrusion, viruses, worms, Trojans, and overload attacks. It requires minimal servicing, with central administration, and has exceptionally flexible configuration possibilities. Its seamless scalability makes it easy to provision the perfect solution for any customer; be it small organizations, large Internet Service Providers, Managed Security Service Providers, or multimedia-ready telecom operators. Clavister was founded 1997 in Sweden, with R&D and headquarters based in Örnsköldsvik and Sales and Marketing based in Stockholm. Its solutions are marketed and sold through International sales offices, distributors, and resellers throughout EMEA and Asia. Clavister also offers its technology to OEM manufacturers. For more information, please visit us at http://. Limitation of Responsibilities The information in this document represents the current view of Clavister AB on the issues discussed as of the date of publication. Because Clavister must respond to changing conditions, it should not be considered to be a commitment for Clavister, and Clavister cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. CLAVISTER MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the written permission of Clavister. Clavister may have trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Clavister, the furnishing of this document does not give you any license to these trademarks, copyrights, or other intellectual property.