Port Following. Port Following. Feature Description

Similar documents
GEO Sticky DNS. GEO Sticky DNS. Feature Description

Microsoft SharePoint

System Center Virtual Machine Manager 2012 R2 Plug-In. Feature Description

RSA Two Factor Authentication

Log Insight Manager. Deployment Guide

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

RSA Two Factor Authentication. Feature Description

Virtual LoadMaster for Microsoft Hyper-V

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

SDN Adaptive Load Balancing. Feature Description

Virtual LoadMaster for VMware ESX, ESXi using vsphere

Remote Desktop Services

Remote Desktop Services

SSL Accelerated Services. SSL Accelerated Services for the LM5305-FIPS. Feature Description

Kerberos Constrained Delegation. Kerberos Constrained Delegation. Feature Description

Windows Server 2012 R2 DirectAccess

Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20

Adobe DNG Flat Field Plug-in (1.0) Software Notices and/or Additional Terms and Conditions

Apache Software Foundation This product includes software developed by the Apache Software Foundation (

Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.

Boost Libraries Boost Software License Version 1.0

Third Party Software Used In PLEK500 (Utility for Win) v1.x.xx.xxx

Open Source Used In Cisco Instant Connect for ios Devices 4.9(1)

RSA Data Security, Inc. Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.

Norton Online Backup Third Party Attribution

NetVault : SmartDisk v1.0.1 Release Notes Contents

Simba ODBC Driver with SQL Connector for Apache Cassandra

BMC Remedy Action Request System 7.0 Open Source License Agreements

Adobe Connect Add-in for Microsoft Outlook Third Party Software Notices and/or Additional Terms and Conditions

Integrated Citrix Servers

8.7. Resource Kit User Guide

Installation Guide Supplement

Fuse MQ Enterprise Broker Administration Tutorials

Open Source Used In Meeting integration for Jabber 9.6

Sophos Anti-Virus for VMware vshield upgrade guide. Product version: 1.1

Mayfair EULA for Journal Office

Open Source Used In Cisco Digital Media Player 4310 Release 5.4.1

Open Source Used In Cisco IronPort Encryption SDK

Self Help Guides. Setup Exchange with Outlook

DOCUMENT VERSION 1.0 RELEASE a

Using SNMP with OnGuard

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

Pulse Redundancy. User Guide

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.

Adobe Connect Collaboration SDK Third Party Notices and/or Additional Terms and Conditions

Open Source Information

Release Notes for CounterPath X-Lite 4 for Windows Version 4.8

HIGHSEC eid App Administration User Manual

8.10. Required Ports

[MD5 Message Digests] derived from the RSA Data Security, Inc. MD5 Message Digest Algorithm

R&S TSMW Radio Network Analyzer Open Source Acknowledgment

Appendix D. Rocks Copyright and Trademark

Advanced Planning PDP Client for Microsoft Excel 1.3 Install PeopleBook

FEM 2D Port Simulation. EMPro 2012 May 2012 FEM 2D Port Simulation

Open Source Software used in the product

Self Help Guides. Create a New User in a Domain

ANZ TRANSACTIVE MOBILE for ipad

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

Sophos Anti-Virus for Linux startup guide. Product version: 9

Citrix ShareFile Sync for Mac

If you are submitting changes to the project, please see CONTRIBUTIONS file for more instructions.

1. Third Party Software or Free Software License Information

Job Status Guide 3.0

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Open Source Used In LDSF 1.7.2

Architecting the Future of Big Data

What are cookies and how does Glendale Career College use them?

Installation and Configuration Guide Simba Technologies Inc.

SOFTWARE SOFTWARE ACKNOWLEDGEMENTS. SecuriSync. SecuriSync

Installing the Shrew Soft VPN Client

How To Use The Programs Of Ancient.Org

Software and Source Code License Agreement

TRITON - SECURITY HELP

Adobe LeanPrint Dashboard Software Notices and/or Additional Terms and Conditions

Decommissioning the original Microsoft Exchange

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

SA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover

Open Source Used In Cisco TelePresence TC Console TC7.1

FRANZ SOFTWARE LICENSE AGREEMENT

AG MacOS Standalone Array Client Administration Guide

This program incorporates work covered by the following copyright and permission notices:

Open Source Licenses and Notices for Polycom HDX Systems

formerly Help Desk Authority HDAccess Administrator Guide

Backup Exec Third-Party Information. Third-Party License Agreements

Google Cloud Print Setup. User s Guide

Open Source Used In AsyncOS 9.7 for Cisco Security Appliances

Configuring IKEv2 VPN for Mac OS X Remote Access to a GTA Firewall

BlackBerry Business Cloud Services. Version: Release Notes

Cisco TelePresence VCR Converter 1.0(1.8)

BlackBerry Desktop Manager Version: User Guide

8.8. Post-Migration Activities

Release Notes for. CounterPath Bria iphone Edition CounterPath Bria ipad Edition Version 3.1.0

End-User Software License Agreement

Sophos Enterprise Console quick startup guide. Product version: 5.1 Document date: June 2012

Web Security Firewall Setup. Administrator Guide

ANZ TRANSACTIVE - MOBILE

2 How to Set the Firewall when Using OptoLyzer Suite?

Activelock Customer Management 1.0

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

Transcription:

Feature Description VERSION: 6.0 UPDATED: MARCH 2016

Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP Technologies, Inc.. KEMP Technologies, Inc. reserves all ownership rights for the LoadMaster product line including software and documentation. The use of the LoadMaster Exchange appliance is subject to the license agreement. Information in this guide may be modified at any time without prior notice. Microsoft Windows is a registered trademarks of Microsoft Corporation in the United States and other countries. All other trademarks and service marks are the property of their respective owners. Limitations: This document and all of its contents are provided as-is. KEMP Technologies has made efforts to ensure that the information presented herein are correct, but makes no warranty, express or implied, about the accuracy of this information. If any material errors or inaccuracies should occur in this document, KEMP Technologies will, if feasible, furnish appropriate correctional notices which Users will accept as the sole and exclusive remedy at law or in equity. Users of the information in this document acknowledge that KEMP Technologies cannot be held liable for any loss, injury or damage of any kind, present or prospective, including without limitation any direct, special, incidental or consequential damages (including without limitation lost profits and loss of damage to goodwill) whether suffered by recipient or third party or from any action or inaction whether or not negligent, in the compiling or in delivering or communicating or publishing this document. Any Internet Protocol (IP) addresses, phone numbers or other data that may resemble actual contact information used in this document are not intended to be actual addresses, phone numbers or contact information. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual addressing or contact information in illustrative content is unintentional and coincidental. Portions of this software are; copyright (c) 2004-2006 Frank Denis. All rights reserved; copyright (c) 2002 Michael Shalayeff. All rights reserved; copyright (c) 2003 Ryan McBride. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE ABOVE COPYRIGHT HOLDERS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The views and conclusions contained in the software and documentation are those of the authors and should not be interpreted as representing official policies, either expressed or implied, of the above copyright holders.. Portions of the LoadMaster software are copyright (C) 1989, 1991 Free Software Foundation, Inc. -51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA- and KEMP Technologies Inc. is in full compliance of the GNU license requirements, Version 2, June 1991. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 2

Portions of this software are Copyright (C) 1988, Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Portions of this software are Copyright (C) 1998, Massachusetts Institute of Technology Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Portions of this software are Copyright (C) 1995-2004, Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Portions of this software are Copyright (C) 2003, Internet Systems Consortium Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Used, under license, U.S. Patent Nos. 6,473,802, 6,374,300, 8,392,563, 8,103,770, 7,831,712, 7,606,912, 7,346,695, 7,287,084 and 6,970,933 Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 3

Table of Contents 1 Introduction... 5 1.1 Document Purpose... 5 1.2 Intended Audience... 5 2... 6 2.1 Configuring... 6 2.1.1 Create the Virtual Service for HTTP... 6 2.1.2 Create the Virtual Service for HTTPS/SSL Offloading... 8 2.1.3 Configure for the HTTPS Virtual Service... 10 2.1.4 Configure for the HTTP Virtual Service... 11 3 References... 13 Document History... 14 Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 4

Introduction 1 Introduction KEMP Technologies leads the industry in driving the price/performance value proposition for application delivery and load balancing to levels that our customers can afford. Our products versatile and powerful architecture provide the highest value, while enabling our customers to optimize their businesses that rely on Internet-based infrastructure to conduct business with their customers, employees and partners. KEMP Technologies products optimize web and application infrastructure as defined by highavailability, high-performance, flexible scalability, security and ease of management. They maximize the total cost-of-ownership for web infrastructure, while enabling flexible and comprehensive deployment options. 1.1 Document Purpose This document describes various aspects of the port following feature of the KEMP LoadMaster. It describes in detail how to configure the port following feature using the LoadMaster Web User Interface (WUI). 1.2 Intended Audience This document is intended to help anyone who wishes to learn about or implement the port following feature within the KEMP LoadMaster. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 5

2 When using shopping cart like services where a user selects items and adds them to a list, any persistence method can be used. When the user decides to pay for the items, this is normally performed using a secure SSL (HTTPS) service. When port following is turned on, the Real Server where the shopping cart connection is active will be selected for the SSL session. This selection will only occur when a connection is still open from the same client (as determined by the source IP address), and if the SSL service has the same IP address as the shopping cart service. For example, if a connection is made to the HTTP service of www.somewebsite.com, and then a new SSL connection is made to the same address, then the SSL session will be directed to the same Real Server as the original HTTP service. 2.1 Configuring Port following is only available if both services have the same set of Real Servers. Both Virtual Services must have the same Layer 7 persistence method enabled. Port following is not available on Sub-Virtual Services. 2.1.1 Create the Virtual Service for HTTP To create an HTTP Virtual Service, follow the steps below: 1. In the main menu of the LoadMaster WUI, select Virtual Services. 2. Select Add New. Figure 2-1: Virtual Service parameters 3. Enter a valid IP address in the Virtual Address text box. 4. Enter 80 in the Port text box. It is possible to use port following with Virtual Services using wildcard ports. 5. Enter a recognizable Service Name. 6. Click the Add this Virtual Service button. 7. Expand the Standard Options section. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 6

8. Select an L7 persistence mode. 9. Expand the Real Servers section. Figure 2-2: Standard Options 10. Click the Add New button. Figure 2-3: Real Servers section Figure 2-4: Real Server parameters 11. Enter the relevant IP address in the Real Server Address text box. 12. Click Add This Real Server. 13. Click OK. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 7

Figure 2-5: Real Server parameters 14. For the second Real Server, enter the IP address in the Real Server Address text box. 15. Click Add This Real Server. 16. Select Super HTTP as the persistence mode (in the Standard Options section). 17. Click View/Modify Services in the main menu. 18. Check that the Virtual Service has the correct Virtual IP Address, port number and Real Servers and that the Status is Up. 2.1.2 Create the Virtual Service for HTTPS/SSL Offloading To create a HTTPS Virtual Service with SSL offloading, follow the steps below: 1. In the main menu pane, select Virtual Services. 2. Select Add New. Figure 2-6: Virtual Service parameters 3. Enter the IP address in the Virtual Address text box. 4. Enter a recognizable Service Name. 5. Enter 443 as the Port. It is possible to use port following with Virtual Services using wildcard ports. 6. Click the Add this Virtual Service button. 7. Expand the SSL Properties section. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 8

8. Select Enable. 9. Click OK. 10. Expand the Standard Options section. Figure 2-7: SSL Properties Figure 2-8: Standard Options 11. Select the same L7 persistence mode that was selected in the HTTP Virtual Service. 12. Expand the Real Servers section. Figure 2-9: Real Servers section Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 9

13. Click Add New. Figure 2-10: Real Server parameters 14. Enter the relevant IP address in the Real Server Address text box. 15. Enter 80 as the Port. 16. Click Add This Real Server. 17. Click OK. Figure 2-11: Real Server parameters 18. For the second Real Server, enter the IP address in the Real Server Address text box. 19. Enter 80 as the Port. 20. Click Add This Real Server. 21. Click OK. 22. Click Back. 23. In the Standard Options section, select Super HTTP as the persistence mode. 24. Select View/Modify Services under Virtual Services in the main menu. 25. Check that the Virtual Service has the correct Virtual IP Address, port number and Real Servers and that the Status is Up. 2.1.3 Configure for the HTTPS Virtual Service To configure port following for the HTTPS Virtual Service, follow the steps below: 1. In the main menu, select Virtual Services. 2. Select View/Modify Services. 3. Click the Modify button for the Virtual Service with port 443. 4. Expand the Advanced Properties section. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 10

Figure 2-12: Advanced Properties section 5. Select the port 80 Virtual Service from the drop-down list. If the drop-down list is not visible remember that port following can only be switched on if there is a HTTPS service and a HTTP service with the same IP address. Both Virtual Services must have the same set of Real Servers and both Virtual Services should have a Layer 7 persistence method enabled. 6. Wait 10 seconds, or uncheck and check the Activate or Deactivate Service checkbox in the Basic Properties section for immediate activation. 2.1.4 Configure for the HTTP Virtual Service To configure port following for the HTTPS Virtual Service, follow the steps below: 1. In the main menu, select Virtual Services. 2. Select View/Modify Services. 3. Click the Modify button for the Virtual Service with port 80. 4. Expand the Advanced Properties section. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 11

Figure 2-13: Advanced Properties 5. Select the port 443 Virtual Service from the drop-down list. If the drop-down list is not visible remember that port following can only be switched on if there is a HTTPS service and a HTTP service with the same IP address. Both Virtual Services must have the same set of Real Servers and both Virtual Services should have a Layer 7 persistence method enabled. 6. Wait 10 seconds, or uncheck and check the Activate or Deactivate Service check box in the Basic Properties section for immediate activation. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 12

References 3 References Unless otherwise specified, the following documents can be found at http://kemptechnologies.com/documentation. Web User Interface (WUI), Configuration Guide KEMP LoadMaster, Product Overview Virtual Services and Templates, Feature Description Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 13

Document History Document History Date Change Reason for Change Ver. Resp. Apr 2014 Release updates Updates for 7.1-16 release 1.6 LB May 2014 Minor changes Defects resolved 1.7 LB Nov 2014 Minor changes Defects resolved 1.8 LB Apr 2015 Release updates Updates for 7.1-26 release 1.9 LB Oct 2015 Release updates Updates for 7.1-30 release 3.0 LB Dec 2015 Release updates Updates for 7.1-32 release 4.0 LB Jan 2016 Minor changes Updated Copyright Notices 5.0 LB Mar 2016 Release updates Updates for 7.1-34 release 6.0 LB Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 14