Exinda How to Guide: SSL Acceleration



Similar documents
MAPI Acceleration. Exinda ExOS Version Exinda, Inc

SPAN and Mirror Port Monitoring

KeySecure CUSTOMER RELEASE NOTES. Contents. Version: Issue Date: 2 February 2015 Document Part Number: , Rev A.

Deployment Guide Jan-2016 rev. a. Deploying Array Networks APV Series Application Delivery Controllers with Oracle WebLogic 12c

Integrated SSL Scanning

Payius. Guide to SSL certicates in ecommerce

Configure Web Conference Parameters Through The Web Conference Administration User Interface.

How to Optimize MS Outlook Exchange Traffic Over SSL

SSL Accelerated Services. SSL Accelerated Services for the LM5305-FIPS. Feature Description

Step by Step Bandwidth Management

Integrated SSL Scanning

WXOS 5.5 SSL Optimization Implementation Guide for Configuration and Basic Troubleshooting

TruePort Windows 2000/Server 2003/XP User Guide Chapter

DMH remote access. Table of Contents. Project : remote_access_dmh Date: 29/05/12 pg. 1

Secure Web Appliance. SSL Intercept

Encryption. Administrator Guide

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

SSL Offload and Acceleration

SonicOS Enhanced Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007

Deployment Guide May-2015 rev. a. APV Oracle PeopleSoft Enterprise 9 Deployment Guide

Rocket UniVerse. Security Features. Version April 2014 UNV-1123-SECU-1

Monitor Print Popup for Mac. Product Manual.

Cisco 7940 How To. (c) Bicom Systems

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

Veeam Cloud Connect. Version 8.0. Administrator Guide

HP Device Manager 4.6

How to configure SSL proxying in Zorp 6

Enprise License Management. Online and Manual License Management. May Enprise Enprise Job

AIMMS The Network License Server

mguard Device Manager Release Notes Version 1.6.1

Agent Configuration Guide

McAfee Firewall Enterprise 8.3.1

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

Automated Vulnerability Scan Results

Deployment Guide May-2015 rev. A. Deploying Array Networks APV Series Application Delivery Controllers with Microsoft Exchange 2013

SSL Inspection Step-by-Step Guide. June 6, 2016

How to Configure Captive Portal

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Getting Started with PRTG Network Monitor 2012 Paessler AG

Use Enterprise SSO as the Credential Server for Protected Sites

vcenter Support Assistant User's Guide

FUJITSU Cloud IaaS Trusted Public S5 Configuring a Server Load Balancer

McAfee Firewall Enterprise 8.2.1

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations

Utilities ComCash

Aastra 55i How To. (c) Bicom Systems

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Contact Information. Document Number: Document Revision: SSL Proxy Deployment Guide SGOS 5.1.4

How to configure SSL proxying in Zorp 3 F5

Managing Software and Configurations

BEA Weblogic Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

Cyber-Ark Software. Version 4.5

McAfee SMC Installation Guide 5.7. Security Management Center

WS_FTP Pro. Addendum to User s Guide. Software Version 6.6. Ipswitch, Inc.

Security Guide vcenter Operations Manager for Horizon View 1.5 TECHNICAL WHITE PAPER

Aspera Connect User Guide

Deploying F5 for Microsoft Office Web Apps Server 2013

Installing and Configuring vcenter Multi-Hypervisor Manager

Deploying F5 with Microsoft Active Directory Federation Services

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Configuring Secure Socket Layer HTTP

WebMarshal User Guide

Marco A. M. de Melo & Fernando S. P. Gonçalves MANAGER

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Zimbra Open Source and Collaboration Suite

PrintFleet Enterprise Security Overview

EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support

TIBCO Managed File Transfer Platform Server for UNIX Release Notes

Microsoft SharePoint 2010 Deployment with Coyote Point Equalizer

Deployment Guide AX Series with Citrix XenApp 6.5

LinkProof And VPN Load Balancing

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

SSL Interception on Proxy SG

Configuring Digital Certificates

Snapt Redundancy Manual

Adeptia Suite LDAP Integration Guide

Dell One Identity Cloud Access Manager How to Configure for High Availability

Security certificate management

Deploying the BIG-IP System with Oracle E-Business Suite 11i

Exinda How to Guide: Virtual Appliance. Exinda ExOS Version Exinda, Inc

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0

How To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For

Deploying the BIG-IP System for LDAP Traffic Management

ios Team Administration Guide (Legacy)

Certificate Management

Enterprise Content Management System Monitor 5.1 Security Considerations Revision CENIT AG Brandner, Marc

Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4

Sophos Anti-Virus for NetApp Storage Systems startup guide

Configuring SSL Termination

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: Document Version:

Feature Brief. FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

SuperLumin Nemesis. Administration Guide. February 2011

CASHNet Secure File Transfer Instructions

Sophos Mobile Control Installation guide. Product version: 3.5

Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365

Transcription:

Exinda How to Guide: SSL Acceleration Exinda Firmware Version 6.1

2 SSL Acceleration Table of Contents Part I Introduction 4 1 Using... this Guide 4 2 Further... Reading 5 Part II Overview 7 Part III Configuring SSL Acceleration 9 1 Certificate... and Key Management 9 2 Configuring... Servers 11 3 Creating... Policies 12 Part IV Appendix A: Supported Ciphers Index 15 16

Part I

4 1 SSL Acceleration Introduction SSL Acceleration Exinda Firmware Version: 6.1 All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. 1.1 Using this Guide Throughout the manual the following text styles are used to highlight important points: Useful features, hints and important issues are called "notes" and they are identified in a light blue background. Note: This is a note. Practical examples are presented throughout the manual for deeper understanding of specific concepts. These are called "examples" and are identified with a light green background. This is an example. Warnings that can cause damage to the device are included when necessary. These are indicated by the word "caution" and are highlighted in yellow. Caution: This is a caution.

Introduction 1.2 5 Further Reading In addition to this How to Guide, the following relevant user documentation is available and should be read in conjunction with this guide: Exinda User Manual Please visit http://www.exinda.com for more information.

Part II

Overview 2 7 Overview Exinda's Application Acceleration technology transparently intercepts TCP connections and terminates them on the appliances closest to the client and closest to the server. Acceleration techniques such as TCP Acceleration and WAN Memory are then applied to the TCP connection that exists between the 2 terminating Exinda appliances. If the connection between the client and the server uses SSL to encrypt the payload, then the benefits that can be gained by Application Acceleration are limited. For example, Exinda's WAN Memory technology will achieve higher reduction on clear text rather than encrypted data. SSL Acceleration is designed to overcome these limitations by transparently decrypting accelerated traffic, performing the relevant Application Acceleration techniques, then reencrypting the traffic again. This means Exinda can perform apply all Application Acceleration technologies to the traffic as if it were clear text, while still maintaining SSL connections. Note: SSL Acceleration requires an additional, optional license before this feature can be configured and used. Please contact Exinda TAC or your local Exinda representative if you do not have this license and you wish to use this feature.

Part III

Configuring SSL Acceleration 3 9 Configuring SSL Acceleration SSL Acceleration can be configured in 3 easy steps. Only Exinda appliances with a valid SSL Acceleration license will be able to configure SSL Acceleration. 1. Configure SSL Certificates and Private Keys to use for SSL Acceleration. 2. Configure the Servers to use for SSL Acceleration. 3. Create Optimizer Policies that allow SSL traffic to be accelerated. Note: Currently, it is a requirement that SSL Acceleration settings on each Exinda appliance be configured exactly the same. 3.1 Certificate and Key Management The first step to configuring SSL Acceleration is to load Certificates and Keys, to be used for SSL Acceleration, onto the Exinda appliances. This can be done using the form on the System Certificates page on the Web UI, advanced mode. There are 2 choices at this point: 1. Load the real certificate and private key from the server that is hosting the accelerated SSL application. Advantage: The end user will see the real certificate when they access the accelerated SSL application. Disadvantage: The private key of the accelerated SSL application needs to be loaded on ALL Exinda appliances. 2. Load different or self-signed certificate and private key. Advantage: Private keys never leave the server, a different set of private keys are installed on the Exinda appliances. Disadvantage: End users will receive a warning notifying them that that certificate is invalid unless the common name (CN) in the certificate loaded on the Exinda appliances matches the common name of the accelerated SSL application AND the enduser trusts the certificate loaded on the Exinda appliances. Regardless of which option is chosen, the certificate and private key can be imported onto the Exinda appliances using the form below.

10 SSL Acceleration Name Optionally specify a name to give the certificate. If no name is specified, the filename of the certificate is used. Private keys are stored separately to certificates and are automatically named the same as the certificate, with '_key' appended to the end. Certificate/Key Format Select the certificate/private key format. Currently, PKCS#12 and PEM formats are supported. If PEM is selected, an additional upload field is exposed so that the private key can be uploaded with the certificate. Key Passphrase If the certificate/private key is password protected, specify the password here. Certificate File Select the PKCS#12 certificate to upload to the Exinda appliance. Key File If PEM is selected, select the private key to upload to the Exinda appliance. Once certificates and keys have been uploaded, they are displayed in a table at the top of the page. Here, you can view the certificate contents and also permanently delete them from the Exinda appliance. Note: Certificates and keys are stored securely on the Exinda appliance. It is not possible to export/view the private key once it's been imported. If you loose the configuration, or need to migrate the configuration to another appliance, you will need to manually load the private key again. Certificates and keys can also be configured using the CLI crypto certificate commands.

Configuring SSL Acceleration 3.2 11 Configuring Servers The next step to configuring SSL Acceleration is to specify the SSL accelerated servers. This can be done using the form on the System Acceleration SSL page on the Web UI, advanced mode. Note: Only servers that are explicitly configured will be SSL accelerated. Any SSL traffic that the Exinda appliance sees that does not belong to a configured server will be ignored. Using the form below, you can add SSL Acceleration servers. This will need to be done on all Exinda appliances. Name Specify a name for the server/application you wish to enable for SSL Acceleration. IP Address Specify the IP address of the server running the SSL enabled application. Port Specify the port number running the SSL enabled application on the server. Certificate Select the Certificate to use for re-encryption of the SSL session. The certificates available here are those that are configured in the Certificate and Key Management section. Validation Select the type of validation to apply to the server's certificate. Options are None, Certificate or Reject. None means that SSL Acceleration will accept and process the connection even if the server's SSL certificate is invalid or expired.

12 SSL Acceleration Reject means that SSL Acceleration will not process the connection if the server's SSL certificate is invalid or expired. The connection will still be accelerated, but not SSL accelerated. Certificate means that SSL Acceleration will accept and process the connection only if the server's certificate matches the validation certificate, specified below. Otherwise, the connection is not processed. Validation Certificate If 'Certificate' is selected as the validation method above, this is the certificate that's used to validate against the server's certificate. Once the SSL accelerated servers have been configured, they will be listed in the table at the top of this page. Here you can edit and delete individual servers. Note: If there are any problems with the certificate or key associated with a configured SSL server (E.g. missing key, expired certificate), then SSL Acceleration will ignore that traffic until the issue is resolved. SSL accelerated servers can also be configured using the CLI acceleration 3.3 ssl commands. Creating Policies The final step to configuring SSL Acceleration is to create an acceleration Policy in the Optimizer for the SSL server/application you want to accelerate. By default, SSL traffic is captured by a QoS only Policy, meaning no attempt is made to accelerate any SSL traffic by default. Below is an example of a policy that accelerates an SSL application. This Policy is placed above any other Policy that captures SSL traffic in the policy tree.

Configuring SSL Acceleration 13 Once these desired Policies are in place on all Exinda appliances, restart the Optimizer. Any SSL traffic that matches an acceleration policy will be passed to SSL Acceleration. If a valid certificate and key are configured for that SSL traffic, then SSL Acceleration will occur.

Part IV

Appendix A: Supported Ciphers 4 Appendix A: Supported Ciphers SSL Acceleration supports the following ciphers. Protocol Key Length Cipher Name SSLv3 256 bits AES256-SHA SSLv3 128 bits AES128-SHA SSLv3 168 bits DES-CBC3-SHA SSLv3 128 bits RC4-SHA SSLv3 128 bits RC4-MD5 TLSv1 256 bits AES256-SHA TLSv1 128 bits AES128-SHA TLSv1 168 bits DES-CBC3-SHA TLSv1 128 bits RC4-SHA TLSv1 128 bits RC4-MD5 If the client does not support any of these ciphers, the SSL connection is rejected. If the server does not support and of these ciphers, it is automatically removed from SSL Acceleration and any connections to this server will not be accelerated. 15

16 SSL Acceleration Index -CCertificate and Key Management 9 Configuring Servers 11 Creating Policies 12 -IIntroduction 4 -OOverview 7 -UUsing this Guide 4