Astaro Security Gateway V7 Active/Active-Cluster Licensing Partner FAQ



Similar documents
Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Boston Area Windows Server User Group April 2010

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Astaro Gateway Software Applications

Integrate Astaro Security Gateway

IxLoad-Attack: Network Security Testing

gateprotect Performance Test of xutm Appliances

DOWNTIME CAN SPELL DISASTER

FortiGate High Availability Overview Technical Note

Sophos Certified Architect Course overview

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

White Paper. ZyWALL USG Trade-In Program

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Endian Unified Threat Management

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

HA OVERVIEW. FortiGate FortiOS v3.0 MR5.

Simplifying branch office security

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Results of Testing: Juniper Branch SRX Firewalls

Sophos Roadshow. Complete Security Vision

WATCHGUARD FIREBOX VCLASS

H.I.P.A.A. Compliance Made Easy Products and Services

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

Network Security Market in India CY 2014

Emerging Trends in the Network Security Market in India, CY 2013

Cisco Small Business ISA500 Series Integrated Security Appliances

Funkwerk UTM Release Notes (english)

Electronic Fulfillment of Feature, Capacity and Subscription License Activation Keys via the License Management System (LMS)

PolyServe Understudy QuickStart Guide

Configuring Trend Micro Content Security

VERITAS Cluster Server Traffic Director Option. Product Overview

Sophos UTM Software Appliance

NETASQ MIGRATING FROM V8 TO V9

About the VM-Series Firewall

F-Secure Messaging Security Gateway. Deployment Guide

Kerio Control. Step-by-Step Guide. Kerio Technologies

Answer: Can be used on smart phones/ipad/tablets OR can be used anywhere that has an internet connection. Do not mention anything to do with cost

WatchGuard Certified Training Partner (WCTP) Program

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Cyberoam Anti Virus Implementation Guide Version 9

Volume GAJSHIELD INFOTECH PVT LTD. Wan Failover & Load Balancing. Administrative Guide

ORF ENTERPRISE EDITION 1. Installation Guide FOR ORF ENTERPRISE EDITION 4.2

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)

How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5)

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Chapter 4: Security of the architecture, and lower layer security (network security) 1

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Stonesoft 5.5. Firewall/VPN Reference Guide. Firewall Virtual Private Networks

McAfee Next Generation Firewall (NGFW) Administration Course

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

FortiGate 200A. Administration Guide. FortiGate-200A Administration Guide Version 2.80 MR8 4 February

WatchGuard Certified Training Partner (WCTP) Program

I N S T A L L A T I O N M A N U A L

Security certificate management

If you have questions or find errors in the guide, please, contact us under the following address:

How To Secure Your Business

Evolutionism of Intrusion Detection

Installing GFI MailSecurity

ORF ENTERPRISE EDITION 1. Installation Guide FOR ORF ENTERPRISE EDITION 4.4

Cisco ASA 5500 Series Business Edition

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

F IREWALL/VPN REFERENCE GUIDE

Darstellung Unterschied ZyNOS Firmware Version 4.02 => 4.03

Mail-SeCure Load Balancing

Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 Colin_Wu1@dell.com

How To Protect Your Network From Attack From A Malicious Computer (For A Network) With Juniper Networks)

Firewall Defaults and Some Basic Rules

Web Application Firewall

PRODUCT CATEGORY BROCHURE INTEGRATED FIREWALL/ VPN PLATFORMS

Chapter 11 Cloud Application Development

SSL SSL VPN

10 Cool Things Your Firewall Should Do. A firewall that blocks threats is only the beginning

Configuration Example

Unified Threat Management

Contents. Platform Compatibility. SonicOS

Astaro User Portal: Getting Software and Certificates Astaro IPsec Client: Configuring the Client...14

What is MyUTM? 2. How do I log in to MyUTM? 2. I m logged in, what can I do? 2. What s the Overview section? 2

SoftLayer Fundamentals. Security / Firewalls. August, 2014

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Check Point FireWall-1 HTTP Security Server performance tuning

FortiMail Filtering. Course 221 (for FortiMail v5.0) Course Overview

FortiMail Filtering. Course 221 (for FortiMail v4.2) Course Overview

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA

WatchGuard Training. Introduction to WatchGuard Dimension

Starting a Management Session

A Manager s Guide to Unified Threat Management and Next-Gen Firewalls

Importance of Web Application Firewall Technology for Protecting Web-based Resources

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

The Advantages of Security as a Service versus On-Premise Security

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Network Security Firewall

Quick Setup Guide. 2 System requirements and licensing Kerio Technologies s.r.o. All rights reserved.

Networking and High Availability

About the VM-Series Firewall

Astaro Gateway Software V7.5. What s New

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

TECHNICAL NOTE. FortiGate Traffic Shaping Version

for businesses with more than 25 seats

Transcription:

Active/Active-Cluster Licensing Partner FAQ Author: Udo Kerst (uke) Date: 2007-05-11 Content Page Which applications are being load balanced within an Astaro Security Gateway cluster?...2 Which licenses are required for an Astaro Security Gateway cluster? 2 How do I activate clustering?...3 How can I convert an active/passive HA bundle into a cluster?...3

Which applications are being load balanced within an Astaro Security Gateway cluster? In general the following applications are being load balanced: Network Protection IPSec VPNs Intrusion Protection Web Filtering Antivirus for HTTP and FTP URL Filtering Email Filtering Antivirus for SMTP and POP3 Antispam for SMTP and POP3 The following applications will not be load balanced: Network Protection Packet Filter (Stateful firewall) Email Encryption Which licenses are required for an Astaro Security Gateway cluster? For aggregating several ASG units (either Hardware or Software appliances) into a cluster customers need to buy similar standard base licenses (for ASG software) or ASG hardware appliances (including base licenses) corresponding to the number of units that should be clustered. Secondly customers also need to buy similar subscriptions and maintenance contracts for each unit within the cluster. For instance if customers want to use Antivirus for HTTP and/or FTP within a cluster they need to buy Web Filtering subscriptions for all units within the cluster. If they want to use Antivirus and/or Antispam for SMTP and/or POP3 within a cluster they have to buy Email Filtering subscriptions for all units within the cluster. All applications of the corresponding subscription will then be load balanced automatically. 2007 Astaro AG. Subject to change without notice uke 2

Finally the license on the master node needs to be activated for the number of nodes within the cluster. This activation will be conducted by Astaro order management (as described below). Note: If Email Encryption is enabled on the master node, Email Encryption and all other SMTP applications (like Antivirus and Antispam) will be restricted to the master mode. Hence no SMTP load balancing will be done. However POP3 based applications (like Antivirus or Antispam) can still be load balanced. Hence in that case customers only need to buy Email Encryption and Email Filtering subscriptions for the master node (even if load balancing for POP3 is still possible). How do I activate clustering? In order to activate clustering for a number of interconnected ASGs Astaro partners have to contact Astaro order administration and provide all licenses IDs that their customer has purchased for the cluster (see figure 1). Astaro will then activate one of those base licenses for the corresponding number of cluster nodes and return the license ID which is intended for the master node. The customer can then download this activated license from MyAstaro (the license file should now list the number of cluster nodes at the entry ClusterNodes= in the [LicenseOption] section). After uploading the license to the master node the master will copy the license to all cluster nodes automatically. Hence from now on only this single license is used for the complete cluster. All other licenses that might have been in use for the now clustered Astaro Security Gateway units before will be expired and can no longer be used. Note: As of today Astaro is not issuing specific clustering activation keys in order to activate clustering on a base license via MyAstaro. How can I convert an active/passive HA bundle into a cluster? For an active/passive HA bundle customers only need one base license key with optional subscriptions and maintenance licenses which are activated on the master node only. In order to convert this bundle into an active/active cluster they first need to purchase similar subscriptions and maintenance 2007 Astaro AG. Subject to change without notice uke 3

licenses also for the slave node (see figure 2). When purchasing those licenses customers are getting corresponding activation keys that they should apply to the second (unused) base license that they received when purchasing an appliance bundle. To activate the clustering option, please follow the steps as described in the previous section. Similarly for Astaro Security Gateway Software customers are provided with an HA activation key for activating the HA option of the master node s base license. Hence when contacting Astaro order administration you need to provide the license ID of the master node s base license as well as the activation key(s) for the additional subscription(s) that have been bought for the slave node. 2007 Astaro AG. Subject to change without notice uke 4

Figure 1 Figure 2 This document may not be copied or distributed by any means, electronically or mechanically, in whole or in part, for any reason, without the express written permission of Astaro AG. 2007 Astaro AG. All rights reserved. Astaro Security Gateway, Astaro Command Center and WebAdmin are trademarks of Astaro AG. All further trademarks are the property of their respective owners. No guarantee is given for the correctness of the information contained in this document. 2007 Astaro AG. Subject to change without notice uke 5