WHITE PAPER MICROSOFT LIVE COMMUNICATIONS SERVER 2005 LOAD BALANCING WITH FOUNDRY NETWORKS SERVERIRON PLATFORM



Similar documents
Solution Guide: Load Balancing with the Brocade ServerIron Platform

Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing

Deploying SAP NetWeaver Infrastructure with Foundry Networks ServerIron Deployment Guide

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Brocade SIP-Intelligent Application Switching for IP Communication Services

Deploying Brocade ServerIron ADX to Increase Availability, Scalability, and Security of Microsoft Lync Server 2010 Infrastructure

Transparent Cache Switching Using Brocade ServerIron and Blue Coat ProxySG

DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch

Introduction to ServerIron ADX Application Switching and Load Balancing. Module 5: Server Load Balancing (SLB) Revision 0310

Server Iron Hands-on Training

GLOBAL SERVER LOAD BALANCING WITH SERVERIRON

Networking and High Availability

Deployment Guide July-2014 rev. a. Deploying Array Networks APV Series Application Delivery Controllers for Microsoft Lync Server 2013

Networking and High Availability

Deploying the Brocade ServerIron ADX with Microsoft Exchange Server 2010

AppDirector Load balancing IBM Websphere and AppXcel

Building Trusted VPNs with Multi-VRF

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic

Deployment Guide May-2015 rev. a. APV Oracle PeopleSoft Enterprise 9 Deployment Guide

ServerIron TrafficWorks Firewall Load Balancing Guide

Deployment Guide Microsoft IIS 7.0

Introduction to ServerIron ADX Application Switching and Load Balancing. Module 6: Content Switching (CSW) Revision 0310

Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365

Radware s AppDirector and Microsoft Windows Terminal Services 2008 Integration Guide

CLE202 Introduction to ServerIron ADX Application Switching and Load Balancing

Deployment Guide AX Series with Citrix XenApp 6.5

Firewall Load Balancing

TABLE OF CONTENTS NETWORK SECURITY 2...1

NLoad Balancing Stackable Switch

Deployment Guide. AX Series for Microsoft Lync Server 2010

Availability Digest. Redundant Load Balancing for High Availability July 2013

Brocade One Data Center Cloud-Optimized Networks

SSL Inspection Step-by-Step Guide. June 6, 2016

CAMPUS NETWORK Enhancing the Performance of Microsoft Office SharePoint Server Using Brocade ServerIron and Blue Coat ProxySG

WHITE PAPER. Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager

APPLICATION NOTES High-Availability Load Balancing with the Brocade ServerIron ADX and McAfee Firewall Enterprise (Sidewinder)

Multi-Chassis Trunking for Resilient and High-Performance Network Architectures

Deployment Guide Oracle Siebel CRM

Deployment Guide MobileIron Sentry

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Voice over IP- Session Initiation Protocol (SIP) Load Balancing in the IBM BladeCenter

Securing Networks with PIX and ASA

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Deploying Firewalls Throughout Your Organization

APV9650. Application Delivery Controller

Thunder ADC for SSL Insight and Load Balancing DEPLOYMENT GUIDE

Advanced SLB High Availability and Stateless SLB

Routing Security Server failure detection and recovery Protocol support Redundancy

Deployment Guide AX Series for Palo Alto Networks SSL Intercept and Firewall Load Balancing

7 Easy Steps to Implementing Application Load Balancing For 100% Availability and Accelerated Application Performance

Configuring the Brocade ServerIron to Enable Peak Performance of Siemens ComAssistant

Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide

SAML 2.0 SSO Deployment with Okta

Deployment Guide Jan-2016 rev. a. Deploying Array Networks APV Series Application Delivery Controllers with Oracle WebLogic 12c

Exam Name: Foundry Networks Certified Layer4-7 Professional Exam Type: Foundry Exam Code: FN0-240 Total Questions: 267

What is VLAN Routing?

Brocade Certified Layer 4-7 Professional Version: Demo. Page <<1/8>>

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Building a Systems Infrastructure to Support e- Business

Load Balancing. FortiOS Handbook v3 for FortiOS 4.0 MR3

INTRODUCTION TO FIREWALL SECURITY

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration

VERITAS Cluster Server Traffic Director Option. Product Overview

Managing Virtual Servers

Exam F F5 BIG-IP V9.4 LTM Essentials Version: 5.0 [ Total Questions: 100 ]

Microsoft Lync Server 2010

Deployment Guide July-2014 rev. a. Deploying Array Networks APV Series Application Delivery Controllers with Oracle WebLogic 12c

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Cisco Application Networking for IBM WebSphere

Thunder Series for SAP BusinessObjects (BOE)

5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance

Data Sheet. VLD 500 A Series Viaedge Load Director. VLD 500 A Series: VIAEDGE Load Director

FortiOS Handbook Load Balancing for FortiOS 5.0

WATCHGUARD FIREBOX VCLASS

Implementing the Application Control Engine Service Module

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Microsoft SharePoint 2010 Deployment with Coyote Point Equalizer

FASTIRON II SWITCHES Foundry Networks award winning FastIron II family of switches provides high-density

Deployment Guide Microsoft Exchange 2013

Network Virtualization Network Admission Control Deployment Guide

The Evolution of Application Acceleration:

Starting a Management Session

Creating Web Farms with Linux (Linux High Availability and Scalability)

TESTING & INTEGRATION GROUP SOLUTION GUIDE

Overview of WebMux Load Balancer and Live Communications Server 2005

Multi-layer switch hardware commutation across various layers. Mario Baldi. Politecnico di Torino.

Application Delivery Controller (ADC) Implementation Load Balancing Microsoft SharePoint Servers Solution Guide

BCLP in a Nutshell Study Guide for Exam Exam Preparation Materials

Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication

WhatsUp Gold v16.3 Installation and Configuration Guide

Brocade and EMC Solution for Microsoft Hyper-V and SharePoint Clusters

Cisco Application Networking for BEA WebLogic

SERVERIRON INTERNET TRAFFIC MANAGEMENT

Deployment Guide AX Series for Palo Alto Networks Firewall Load Balancing

Configuring Redundancy

Transcription:

NOTE: Foundry s ServerIron load balancing switches have been certified in Microsoft s load balancing LCS 2005 interoperability labs. Microsoft experts executed a variety of tests against Foundry switches. Contact Foundry Networks for details about the testing, and to learn more about the benefits delivered by ServerIron switches when deployed in a Microsoft application infrastructure. Foundry ServerIron switches, when deployed in front of the Microsoft Live Communications Server 2005 Enterprise Edition, increase application uptime, maximize server farm utilization, and shield the servers and applications from malicious attacks. The switches receive all client requests, and distribute them efficiently to the best server among the available pool. ServerIron switches consider server availability, load, response time, and other user-configured performance metrics when selecting a server for incoming client connections. By performing sophisticated and customizable health checks to the servers and the Microsoft Live Communications Server 2005, the ServerIron switches quickly identify resource outages in real time and re-direct client connections to other available servers. Server capacity can be increased or decreased on demand without impacting the applications and client connections. When demand grows, IT engineers can simply slide in new server resources and configure the ServerIron switch to use the new servers for client connections. ServerIron switches are application aware and can inspect many types of application level content to perform intelligent switching of client requests to appropriate servers. Application switching eliminates the need to replicate content and application functions on all servers, and optimizes overall resource utilization, application performance and availability. ServerIron switches support switching based on broad content types including URL, HTTP headers, HTTP cookies, SSL session IDs, and XML tags. For implementations where session persistence across multiple TCP ports on the same server is a key requirement, the ServerIron switches offer support for the industry s most advanced and easily customizable load balancing interface. In addition, the power of performance delivered by the ServerIron switches ensures that the applications provide the best end-user response time and immense scalability even when enabled for Layer 4 through 7 switching. Using sticky sessions and track-group switching, a group of transactions from a given client are sent to the server originally selected and has the session created when the client first connected. A crucial benefit of using Foundry ServerIron is its ability to ensure the client stays with one real server so all real time information is preserved as the client continues to communicate across several application ports. Another benefit of using the Foundry ServerIron to load balance is its ability to protect server farms and applications from malicious attacks. The ServerIron switches are proven to defeat wire-speed Gigabit rate Denial of Service (DoS) attacks while maintaining peak application performance. Foundry switches also provide high-performance content inspection and filtering for malicious content, including viruses and worms, which are spread through application level messages to cripple the servers and take down applications. Foundry s ServerIron solution provides immediate ROI, and also improves the ROI of Microsoft Live Communications Server 2005. They support significantly higher application traffic and number of users on existing server resources by maximizing utilization. On-demand and unlimited virtual server farm scalability eliminates the need for forklift upgrades, and dramatically improves the ROI on the server infrastructure. Downtime associated with security breaches and scheduled maintenance is eliminated, resulting in improved availability, which results in savings of tens of thousands to millions of dollars a year. December 2004 2004 Foundry Networks, Inc. 1 All Rights Reserved.

Figure 1. Live Communications Server 2005 Enterprise Edition Logical Configuration. December 2004 2

Figure 2. Live Communications Server 2005 Enterprise Edition Logical Network Layout. Follow these steps to configure ServerIron A for Server load balancing. A second configuration has been added at the end of the paper for customers that wish to build Hot standby Server Load Balancing. In a typical hot standby configuration, one ServerIron is the active device and performs all the Layer 2 switching as well as the Layer 4 SLB switching while the other ServerIron monitors the switching activities and remains in a hot standby role. If the active ServerIron becomes unavailable, the standby ServerIron immediately assumes the unavailable ServerIron s responsibilities. The failover from the unavailable ServerIron to the standby ServerIron happens transparently to users. Both ServerIrons share a common MAC address known to the clients. Therefore, if a failover occurs, the clients still know the ServerIron by the same MAC address. The active sessions running on the clients continue and the clients and routers do not need to re- ARP for the ServerIron MAC address. Note: All real servers are connected directly to the ServerIrons with Active Standby NIC configuration where the Active Nic is connected to the active ServerIron. Enterprise Edition Pool: The Enterprise Edition of the Live Communications Server 2005 introduces a couple of new terms Enterprise Edition (EE) Servers and Pool. An EE server provides connection termination, security, authorization, protocol processing and applications. Multiple EEs communicate with a single back-end SQL Server. Pool is the term used to describe this collection of multiple EEs tied to a single backend. Users are now homed on Pools. This allows users to login using any EE December 2004 3

server in a pool. Pools allow flexibility in increasing the capacity of the service by easily adding more EE server. Failure of an EE should not affect service availability. You can manage a Foundry device using the following interfaces: Command Line Interface (CLI) a text-based interface accessible through a direct serial connection or a Telnet session. Web management interface A GUI-based management interface accessible through an HTTP (web browser) connection. To manage the ServerIron via CLI: At the opening CLI prompt, enter enable. ServerIron> enable Access the configuration level of the CLI by entering the following command: ServerIron# configure terminal ServerIron(config)# To Exit from the configuration level of the CLI, enter the following command: ServerIron(config)# end To save the configuration to NVRAM, enter the following command: ServerIron# write memory ServerIronA(config)# vlan 1 ServerIronA(config-vlan-1)# router-interface VE 1 ServerIronA(config-vlan-1)# interface VE 1 ServerIronA(config-vlan-1)# ip standby-address 10.0.0.5 255.255.255.0 ServerIronA(config)# ip forward The ip standby-address command allows the address to be shared by the two ServerIrons so that the standby ServerIron can provide service for the address if the active ServerIron becomes unavailable. ServerIronA(config)# server port 5060 ServerIronA(config)# server port 5061 ServerIronA(config)# server port 135 December 2004 4

ServerIronA(config)# server real EEServer1 10.0.0.10 ServerIronA(config)# port 135 ServerIronA(config)# server real EEServer2 10.0.0.20 ServerIronA(config)# port 135 ServerIronA(config)# server virtual EEPool1 10.0.0.100 sticky sticky ServerIronA(config)# port 135 sticky ServerIronA(config)# bind 5060 EEServer1 5060 EEServer2 5060 ServerIronA(config)# bind 5061 EEServer1 5061 EEServer2 5061 ServerIronA(config)# bind 135 EEServer1 135 EEServer2 135 ServerIronA(config)# track-group 5061 135 Access Proxy Array: The Live Communications Server product allows peering between enterprises using the same server product. This feature is enabled using a proxy server called an Access Proxy, on the perimeter network boundary. The Access proxy is used by outside users (employees of an enterprise that access the network remotely) and for interconnecting with other enterprises to exchange instant messages and presence information. An Access Proxy typically has 2 NICs, one for the internal and the other for the external network. ServerIronA(config)# vlan 1 ServerIronA(config-vlan-1)# interface VE 1 ServerIronA(config-vlan-1)# ip standby-address 10.1.0.5 255.255.255.0 ServerIronA(config)# server port 5060 ServerIronA(config)# server port 5061 December 2004 5

ServerIronA(config)# server real APServer1_FromInternal 10.1.0.10 ServerIronA(config)# server real APServer1_FromExternal 10.1.0.11 ServerIronA(config)# server real APServer2_FromInternal 10.1.0.20 ServerIronA(config)# server real APServer2_FromExternal 10.1.0.21 ServerIronA(config)# server virtual APBank1_FromInternal 10.1.0.100 sticky sticky ServerIronA(config)# bind 5060 APServer1_FromInternal 5060 APServer2_FromInternal 5060 ServerIronA(config)# bind 5061 APServer1_FromInternal 5061 APServer2_FromInternal 5061 ServerIronA(config)# track-group 5060 5061 ServerIronA(config)# server virtual APBank1_FromExternal 10.1.0.101 sticky sticky ServerIronA(config)# bind 5060 APServer1_FromExternal 5060 APServer2_FromExternal 5060 ServerIronA(config)# bind 5061 APServer1_FromExternal 5061 APServer2_FromExternal 5061 ServerIronA(config)# track-group 5060 5061 Director Bank: A Director is a Live Communications Server that has no homed users and provides additional security for the internal network and directs client login requests to the appropriate pool or server within the enterprise (assuming that the enterprise has deployed more than one pool/server). The Director authenticates and authorizes external SIP traffic coming from an Access Proxy. ServerIronA(config)# vlan 1 ServerIronA(config-vlan-1)# interface VE 1 ServerIronA(config-vlan-1)# ip standby-address 10.2.0.5 255.255.255.0 December 2004 6

ServerIronA(config)# server port 5060 ServerIronA(config)# server port 5061 ServerIronA(config)# server real DrServer1 10.2.0.10 ServerIronA(config)# server real DrServer2 10.2.0.20 ServerIronA(config)# server virtual DrBank1 10.2.0.100 sticky sticky ServerIronA(config)# bind 5060 DrServer1 5060 DrServer2 5060 ServerIronA(config)# bind 5061 DrServer1 5061 DrServer2 5061 ServerIronA(config)# track-group 5060 5061 Standalone ServerIron Configuration is now completed. Below are the commands for ServerIron B and the steps to complete an Active/ Standby configuration. Foundry Networks, Inc. recommends using the most current Ironware OS to ensure the best possible performance of the Foundry products. Configure port 13 as the hot standby port on both ServerIrons: ServerIronA(config)# vlan 2 ServerIronA(config-vlan-2)# untag ethernet 13 ServerIronA(config-vlan-2)# no spanning-tree ServerIronA(config-vlan-2)# exit ServerIronA(config)# server router-ports 10 ServerIronA(config)# server backup ethernet 13 00e0.5201.0c72 2 ServerIronB(config)# vlan 2 ServerIronB(config-vlan-2)# untag ethernet 4 ServerIronB(config-vlan-2)# no spanning-tree ServerIronB(config-vlan-2)# exit ServerIronB(config)# server router-ports 10 ServerIronB(config)# server backup ethernet 4 00e0.5201.0c72 2 The server router-ports command identifies the port that is connected to the router. This command is required in hot-standby configurations. December 2004 7

The server backup command designates port 13 as the hot standby port and specifies the MAC address the port is backing up. To configure a ServerIron in an active-standby pair to always be the active ServerIron, enter the following command at the global CONFIG level of the CLI: ServerIronA(config)# server backup-preference 5 Enterprise Edition Pool: ServerIronB(config)# vlan 1 ServerIronB(config-vlan-1)# router-interface VE 1 ServerIronB(config-vlan-1)# interface VE 1 ServerIronB(config-vlan-1)# ip standby-address 10.0.0.5 255.255.255.0 ServerIronB(config)# ip forward ServerIronB(config)# server port 5060 ServerIronB(config)# server port 5061 ServerIronB(config)# server port 135 ServerIronB(config)# server real EEServer1 10.0.0.10 ServerIronB(config)# port 135 ServerIronB(config)# server real EEServer2 10.0.0.20 ServerIronB(config)# port 135 ServerIronB(config)# server virtual EEPool1 10.0.0.100 sticky sticky ServerIronB(config)# port 135 sticky ServerIronB(config)# bind 5060 EEServer1 5060 EEServer2 5060 ServerIronB(config)# bind 5061 EEServer1 5061 EEServer2 5061 ServerIronB(config)# bind 135 EEServer1 135 EEServer2 135 ServerIronB(config)# track-group 5061 135 December 2004 8

Access Proxy Array: ServerIronB(config)# vlan 1 ServerIronB(config-vlan-1)# interface VE 1 ServerIronB(config-vlan-1)# ip standby-address 10.1.0.5 255.255.255.0 ServerIronB(config)# server port 5060 ServerIronB(config)# server port 5061 ServerIronB(config)# server real APServer1_FromInternal 10.1.0.10 ServerIronB(config)# server real APServer1_FromExternal 10.1.0.11 ServerIronB(config)# server real APServer2_FromInternal 10.1.0.20 ServerIronB(config)# server real APServer2_FromExternal 10.1.0.21 ServerIronB(config)# server virtual APBank1_FromInternal 10.1.0.100 sticky sticky ServerIronB(config)# bind 5060 APServer1_FromInternal 5060 APServer2_FromInternal 5060 ServerIronB(config)# bind 5061 APServer1_FromInternal 5061 APServer2_FromInternal 5061 ServerIronB(config)# track-group 5060 5061 ServerIronB(config)# server virtual APBank1_FromExternal 10.1.0.101 sticky sticky ServerIronB(config)# bind 5060 APServer1_FromExternal 5060 APServer2_FromExternal 5060 ServerIronB(config)# bind 5061 APServer1_FromExternal 5061 APServer2_FromExternal 5061 ServerIronB(config)# track-group 5060 5061 Director Bank: December 2004 9

ServerIronB(config)# vlan 1 ServerIronB(config-vlan-1)# interface VE 1 ServerIronB(config-vlan-1)# ip standby-address 10.2.0.5 255.255.255.0 ServerIronB(config)# server port 5060 ServerIronB(config)# server port 5061 ServerIronB(config)# server real DrServer1 10.0.0.10 ServerIronB(config)# server real DrServer2 10.0.0.20 ServerIronB(config)# server virtual DrBank1 10.2.0.100 sticky sticky ServerIronB(config)# bind 5060 DrServer1 5060 DrServer2 5060 ServerIronB(config)# bind 5061 DrServer1 5061 DrServer2 5061 ServerIronB(config)# track-group 5060 5061 December 2004 10

Although Foundry has attempted to provide accurate information in these materials, Foundry assumes no legal responsibility for the accuracy or completeness of the information. Please note that Foundry s product information does not constitute or contain any guarantee, warranty or legal binding representation, unless expressly identified as such in duly signed writing. 2004 Foundry Networks, Inc. All Rights Reserved. Foundry Networks, IronView, IronShield, ServerIron, and the Iron family of marks are trademarks or registered trademarks of Foundry Networks, Inc. in the United States and other countries. All others are trademarks of their respective owners. Bryan Boretsky Systems Engineer Foundry Networks, Inc. Headquarters 2100 Gold Street P.O. Box 649100 San Jose, CA 95164-9100 December 2004 11