Home

Nortel Networks WEB OS 212777 User's Manual

image

Contents

1. NOTE The deny filter has a higher filter number than the allow filter This is necessary so that the allow filter has the higher order of precedence 3 Add the filters to the traffic ingress ports gt gt Filter 89 port 1 Select the ingress port gt gt SLB Port 1 add 80 Add the allow filter gt gt SLB Port 1 add 89 Add the deny filter 4 Apply and save the configuration changes gt gt SLB Port 1 apply gt gt SLB Port 1 save 350 Chapter 13 Firewall Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Firewall Health Checks Basic FWLB health checking is automatic No special configuration is necessary unless you wish to tune the health checking parameters See Chapter 10 Health Checking for details Firewall Service Monitoring To maintain high availability Web switches monitor firewall health status and send packets only to healthy firewalls There are two methods of firewall service monitoring ICMP and HTTP Each Web switch monitors the health of the firewalls on a regular basis by pinging the IP interfaces configured on its partner Web switch on the other side of the firewall If a Web switch IP interface fails to respond to a user specified number of pings it and by implication the associated firewall is placed in a Server Failed state At this time the partner Web switch stops routing traffic to that I
2. Once you specify cookie as the mode of persistence you will be prompted for the following parameters Enter insert passive rewrite cookie persistence mode i p r p Enter cookie name CookieSession1l Enter starting point of cookie value 1 64 1 Enter number of bytes to extract 0 64 8 Look for cookie in URI eld d Set multiple response count 1 16 1 E Cookie based persistence mode insert passive or rewrite E Cookie name E Starting point of the cookie value E Number of bytes to be extracted E Look for cookie in the URI e Id If you want to look for cookie name Vvalue pair in the URI enter e to enable this option To look for the cookie in the HTTP header enter d to disable this option Alteon WebSystems Chapter 16 Persistence m 431 212777 A February 2002 Web OS 10 0 Application Guide M Set multiple response count This parameter is set for passive mode only Typically the Web switch searches the first HTTP response packet from the server and if a persistence cookie is found sets up a per sistent connection between the server and the client While this approach works for most servers some customers with complex server configurations might send the persistence cookie a few responses later In order to achieve cookie based persistence in such cases Web OS allows the network administrator to configure the switch to look through multiple HTTP responses from the server The switch looks
3. eeeeeeee PUIVALS sissvicccsncuse weiss teusousnssndassuonsanesc ueveusecs PIOXICS eeeseeeeees 122 136 205 208 to 213 real server QrOUPS 0 Tall SEFVELS apoie anios routing example SLB real servers virtual servers IP interfaces configuration example sseeeeeeee 125 295 example configuration ceeee 31 34 60 VLAN 1 default eerren 45 IP proxies for application redirection eeeeee for Global Server Load Balancing for Server Load Balancing seeeseserseeeeeee See also proxies proxy IP address PIP index m 477 Web OS 10 0 Application Guide IP routing sec sie cscauctiiosnesnctivescsavecesscnseceunsessacdespens 123 cross subnet example cceesseeeeeeeceeeeeeeees 28 default gateway configuration 00 32 61 IP interface configuration 31 34 60 IP subnets ieie eienen E aio Ey network diagram Te routing between VLANSG ssseeceeseeeeeeeeeees 64 subnet configuration example sseeeee 31 switch based topology sssceesseceseeceeeseeeeeeees 30 IP subnets routing VLANs ISL Trunking J jumbo frames fragmenting to normal SiZe eeeeeeeeee 28 30 frame SIZE Aegon neen ansien Eees EESE Gigabit adapter isolating with VLANs SONDA AA A E E E T supported duplex modes VILANS nren rr esen EE E Eei L Layer 4 administrator ACCOUNL eseeee
4. 2 Configure the router ID A router ID is required when configuring virtual links Later when configuring the other end of the virtual link on Web Switch 2 the router ID specified here will be used as the target vir tual neighbor nbr address gt gt IP Interface 2 cfg ip ospf rtrid 10 10 10 1 Set static router ID on Web switch 1 3 Enable OSPF gt gt IP cfg ip ospf on Enable OSPF on Web switch 1 86 Chapter 4 OSPF Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide Define the backbone gt gt Open Shortest Path First aindex 0 Select menu for area index 0 gt gt OSPF Area index 0 areaid 0 0 0 0 Set the area ID for backbone area 0 gt gt OSPF Area index 0 type transit Define backbone as transit type gt gt OSPF Area index 0 enable Enable the area Define the transit area The area that contains the virtual link must be configured as a transit area gt gt OSPF Area index 0 aindex 1 gt gt OSPF Area index 1 areaid 0 0 0 1 gt gt OSPF Area index 1 type transit gt gt OSPF Area index 1 enable Select menu for area index 1 Set the area ID for OSPF area 1 Define area as transit type Enable the area Attach the network interface to the backbone gt gt OSPF Area index 1 if 1 gt gt OSPF Interface 1 aindex 0 gt gt OSPF Interface 1 enable Select OSPF
5. Alteon WebSystems Chapter 6 Server Load Balancing 141 212777 A February 2002 Web OS 10 0 Application Guide 4 Turn on multiple rport for Port 80 gt gt cfg slb virt 1 service 80 rport 0 5 Add the ports to which the Web server listens gt gt cfg slb real 1 addport 8001 Add port 8001 to real server 1 gt gt addport 8002 Add port 8002 to real server 1 gt gt real 2 addport 8001 Add port 8001 to real server 2 gt gt addport 8002 Add port 8002 to real server 2 gt gt real 3 addport 8001 Add port 8001 to real server 3 gt gt addport 8002 Add port 8002 to real server 3 gt gt real 4 addport 8001 Add port 8001 to real server 4 gt gt addport 8002 Add port 8002 to real server 4 Direct Server Interaction Direct access to real servers can be provided in the following ways Using Direct Server Return Using Direct Access Mode Assigning Multiple IP Addresses Using Proxy IP Addresses Mapping Ports Monitoring Real Servers Using Direct Server Return Some clients may need direct access to the real servers for example to monitor a real server from a management workstation The Direct Server Return DSR feature allows the server to respond directly to the client This capability is useful for sites where large amounts of data are flowing from servers to clients such as with content providers or portal sites that typically have asymmetric traff
6. VPN Load Balancing Configuration Example The following example uses Alteon Web switches for VPN load balancing The configuration is for four Web switches four subnets and two VPN devices Switch DA i8 a Swi i VPN device 1 Switch CA IF1 192 168 10 10 24 i IF1 30 0 0 10 24 i IF1 10 0 0 101 IF2 10 0 0 10 24 F2 20 0 0101 i 1F2 20 0 0 10 24 i IF3 10 0 0 1182 eit i 1F3 20 0 0 11 32 i Switch i i i t Switch E VIR 192 168 10 50 VIR 10 0 0 1 VIR 20 0 0 1 VIR 30 0 0 50 amp H i Internal A i Network i 30 0 0 0 2 H Default i Gateway i 8 zz ee i WITO Switch DB VPN device 2 e 1F1 30 0 0 11 24 N ean a IF1 10 0 0 102 IF2 20 0 0 20 24 10 0 0 IF2 20 0 0 102 Client IF3 10 0 0 21 32 IF3 20 0 0 21 32 192 168 10 100 VPN Static Routes both M Default i gt Server Gateway 50 Static Routes Both Dirt defaut aa 000 Static Routes Both Clean 30 0 0 100 Alteons 10 0 0 10 via 20 0 0 101 if 2 20 0 0 10 via 10 0 0 101 if2 10 0 0 11 va 20 0 0 102 f3 20 0 0 11 via 10 0 0 102 if 3 TET ETT Ee 20 0 0 20 via 10 0 0 101 if2 20 0 0 21 via 10 0 0 102 if3 ID eke eels Figure 14 2 VPN Load Balancing Configuration Example Build the topology illustrated in Figure 14 2 on page 356 and configure the switches as shown on the following pages 356 m Chapter 14 Virtual Private Network Load Balancing Alteon 2bSystems 212777 A February 2002 Configure the First Clean Side Switch CA 1
7. NOTE Switches peering with each other must have an equal number of ports 4 Turn off STP after verifying that the network is stable gt gt Main cfg stp 1 off Disable STP group gt gt Spanning Tree Group 1 save Enable hot standby gt gt Main boot reset Reset the switch NOTE You must reboot the switch for the hot standby configuration to take effect 276 m Chapter 11 High Availability Alteon e Systems A February Web OS 10 0 Application Guide Virtual Router Deployment Considerations Review the following issues described in this section to prevent network problems when deploying virtual routers Mixing Active Standby and Active Active Virtual Routers Synchronizing Active Active Failover Eliminating Loops with STP and VLANs Assigning VRRP Virtual Router ID Configuring the Switch for Tracking Synchronizing Configurations Mixing Active Standby and Active Active Virtual Routers If the network environment can support sharing enable it for all virtual routers in the LAN If not use active standby for all virtual routers Do not mix active active and active standby vir tual routers in a LAN Mixed configurations have not been tested may result in unexpected operational characteristics and therefore are not recommended Synchronizing Active Active Failover The hot standby failover required the primary and secondary switches to have identical config urations and po
8. ssseeerseeeereeerreeeereer 255 CONFIQUIATION 0 0 eeeeseeesteeceeneeeceeeeeeeeeeeees 265 Server Load Balancing seeeseeeeeeeseeeeees 267 synchronization 00 eeeeeeeeeeteeceeeeeeeneeeeeeeee 277 active standby redundancy ceeeseeeceesseeeeeeees 254 CONFIQUIATION 00 eeeeeeeesteeeeeneeeceeeeeeeeeeeees 263 administrator ACCOUNL sceeeeseeeceeeecesseeeeeneeers 105 allow filtering c cssssececeeesseteceeeeeeeeees 120 170 application health checking esseeeeeeseeeeseeees 231 application ports eeseeeeeesseeeeseeceseeeeeeees 128 171 application redirection ceeeceeesseeeeesneeeeeeeees 203 client IP address authentication 215 example with NAT ceseecessecceceseeeeeneeeees 208 games and real time applications 215 non cacheable sites Alteon Z Systems 212777 A February 2002 backup SELVErS sceri eoviee n nE ESSE bandwidth management eeeeeeeeeeee burst imitinn classification policies eseseseeeeeeeneneneee configuration general seeeeeeeeeeee configuration preferential service configuration security eseseeseesesee configuration user faimess 0 COOK e Dased csisssscics c ussusties cenis doneses Gata PACING ioc accscccnssvnessvcaieeseascdeseseavionboneee HTTP header based eceeeeeeeseseeeseeees Operational keys ceeeeeeeeeeeseseneeeeeneeeneee Prece
9. 2 Select the ports that you want to mirror gt gt Port 5 add 1 gt gt Enter port mirror direction in out gt gt Port 5 add 3 gt gt Enter port mirror direction in out Select port I to mirror or both in Monitor ingress traffic on port 1 Select port 3 to mirror or both out Monitor egress traffic on port 3 3 Enable port mirroring gt gt cfg pmirr mirr ena Enable port mirroring 4 Apply and save the configuration gt gt PortMirroring apply gt gt PortMirroring save Apply the configuration Save the configuration 5 View the current configuration Monitoring Ports O O uma nF WN EF gt gt PortMirroring cur Port mirroring is enabled irrored Ports none none none none 1 in 3 out none none none none Display the current settings 114 m Chapter 5 Secure Switch Management Alteon Z Systems 212777 A February 2002 Part 2 Web Switching Fundamentals Internet traffic consists of myriad ser IP for data delivery IP howe switching goes b ations which use the Internet Protocol for all the various applications Web ces intelligent switching decisions based on the application letails e following fundamental Web switching features oad Balancing Filtering Application Redirection Virtual Matrix Architecture Health Checking High Availability Alteon
10. The AA model is based on a client server model The Remote Access Server RAS the switch is a client to the back end database server A remote user the remote administrator interacts only with the RAS not the back end server and database Two prominent AA protocols used to control dial up access into networks are Cisco s TACACS Terminal Access Controller Access Control System and Livingston Enterprise s RADIUS Remote Authentication Dial In User Service Web OS supports only the RADIUS authentication method Alteon WebSystems Chapter 5 Secure Switch Management m 101 212777 A February 2002 Web OS 10 0 Application Guide Requirements The following components are required for authorization and authentication E A remote administrator E The Web switch with authentication and authorization protocol support acting as a client in the AA model A back end authentication and authorization server that performs the following functions O Authenticates remote administrators O Checks the remote administrator s authorization to access the switch O Optionally tracks and logs the administrator s activity while logging on E An AA database that contains information about authorized administrators and their spe cific capabilities and privileges 102 m Chapter 5 Secure Switch Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide RADIUS Authentication and Authorization RADIUS is an acc
11. The metric command in the peer menu tells the Alteon Web switch to create an AS path of 3 when advertising via BGP 6 On the switch apply and save your configuration changes gt gt save gt gt BGP Peer 2 apply Make your changes active Save for restore after reboot 40 m Chapter 1 Basic IP Routing Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide DHCP Relay Dynamic Host Configuration Protocol DHCP is a transport protocol that provides a frame work for automatically assigning IP addresses and configuration information to other IP hosts or clients in a large TCP IP network Without DHCP the IP address must be entered manually for each network device DHCP allows a network administrator to distribute IP addresses from a central point and automatically send a new IP address when a device is connected to a differ ent place in the network DHCP is an extension of another network IP management protocol Bootstrap Protocol BOOTP with an additional capability of being able to dynamically allocate reusable network addresses and configuration parameters for client operation Built on the client server model DHCP allows hosts or clients on an IP network to obtain their configurations from a DHCP server thereby reducing network administration The most sig nificant configuration the client receives from the server is its required IP address other optional parameters i
12. gt gt cfg slb layer7 1b add Business gt gt add First gt gt add Coach Alteon WebSystems Chapter 17 Bandwidth Management m 465 212777 A February 2002 Web OS 10 0 Application Guide 2 5 Allocate bandwidth for each string To do this assign a BWM contract to each defined string gt gt cfg slb layer7 1b cont lt URL path ID gt lt BWM Contract number gt Configure a real server to handle the cookie To add a defined string gt gt cfg slb real 2 layer7 addlb lt URL path ID gt where URL path ID is the identification number of the defined string Example gt gt cfg slb real 2 layer7 addlb 3 Either enable DAM on the switch or configure a proxy IP address on the client port NOTE If VMA is enabled you need to configure a unique proxy IP address for each port 1 8 To turn on DAM gt gt cfg slb adv direct ena To turn off DAM and configure a Proxy IP address on the client port gt gt cfg slb adv direct dis gt gt port 2 pip 12 12 12 12 gt gt proxy ena NOTE By enabling DAM on the switch or alternatively disabling DAM and configuring a Proxy IP address on the client port port mapping for URL based load balancing can be per formed Enable SLB gt gt cfg slb on 466 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A Februar
13. SSH is a protocol that enables a remote administrator to log securely into another computer over a network to execute management commands All the data sent over the network using SSH is encrypted and secured Using SSH gives administrators an alternate way to manage the switch one that provides strong security SCP is typically used to copy files securely from one machine to another SCP uses SSH for encryption of data on the network On an Alteon Web switch SCP is used to download and upload the switch configuration via secure channels The benefits of using SSH and SCP are listed below Authentication of remote administrators Identifying the administrator using Name Password E Authorization of remote administrators Determining the permitted actions and customizing service for individual administrators E Encryption of management messages Encrypting messages between the remote administrator and switch E Secure copy support NOTE The Web OS implementation of SSH is based on SSH version 1 5 and supports SSH 1 5 1 x xx SSH clients of other versions especially version 2 will not be supported The fol lowing SSH clients have been tested E SSH 1 2 23 and SSH 1 2 27 for Linux freeware M SecureCRT 3 0 2 and SecureCRT 3 0 3 for Windows NT Van Dyke Technologies Inc E F Secure SSH 1 1 for Windows Data Fellows Alteon WebSystems Chapter 5 Secure Switch Management m 107 212777 A February 2002 Web OS 10 0 A
14. gt gt Layer 4 save Save for restore after reboot NOTE You must apply any changes in order for them to take effect and you must save changes if you wish them to remain in effect after switch reboot 9 Check the SLB information gt gt Layer 4 info slb dump View SLB information Check that all SLB parameters are working according to expectation If necessary make any appropriate configuration changes and then check the information again Alteon Z Systems 212777 A February 2002 Chapter 6 Server Load Balancing m 127 Web OS 10 0 Application Guide Additional Server Load Balancing Options In the previous section Configuring Server Load Balancing on page 124 many of the SLB options are left to their default values The following configuration options can be used to cus tomize SLB on your Web switch Supported Services and Applications on page 128 Disabling and Enabling Real Servers on page 129 IP Address Ranges Using imask on page 129 Health Checks for Real Servers on page 130 Configuring Multiple Services on page 130 Metrics for Real Server Groups on page 131 Weights for Real Servers on page 134 Connection Time outs for Real Servers on page 134 Maximum Connections for Real Servers on page 134 Backup Overflow Servers on page 135 Supported Services and Applications Each virtual server can be configured
15. Check that all BWM contract parameters are set correctly If necessary make any appropriate configuration changes and then check the information again 462 Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide URL Based Bandwidth Management Example In this example you will assign bandwidth based on URL paths For URL based server load balancing a user has to first define strings to monitor Each of these strings is attached to real servers and any URL with the string is load balanced across the assigned servers NOTE The complete procedure to configure URL based SLB is described in Chapter 7 Content Intelligent Switching of the Web OS Application Guide The best way to achieve URL based bandwidth management is to assign a contract to each defined string This allocates a percentage of bandwidth to the string or URL containing the string To configure the switch for URL based bandwidth management perform the following steps NOTE Refer to the Web OS Command Reference Chapter 7 for more information on how to create a contract 1 Define a load balancing string for URL based server load balancing For example add the string alteon gt gt cfg slb layer7 1b add alteon To see the URL path ID assigned for the string alteon execute the cur command gt gt Server Load Balance Resource cur Number of entries
16. Each of the modes are explained in detail in the following sections Insert Cookie Mode In the insert cookie mode the Web switch generates the cookie value on behalf of the server Because no cookies are configured at the server the need to install cookie server software on each real server is eliminated In this mode the client sends a request to visit the Web site The Web switch performs load balancing and selects a real server The real server responds without a cookie The Web switch inserts a cookie and forwards the new request with the cookie to the client 1 Configure switch to insert cookie values 3 Switch selects 2 Client visits the Web site via HTTP request fe server via SLB Internet Proxy Firewall Web Switch 5 Web switch inserts a cookie and forwards the 4 Server responds request to the client without any cookie Figure 16 2 Insert Cookie Mode Alteon WebSystems Chapter 16 Persistence m 427 212777 A February 2002 Web OS 10 0 Application Guide Passive Cookie Mode In Passive Cookie mode when the client first makes a request the switch selects the server based on the load balancing metric The real server embeds a cookie in its response to the cli ent The switch records the cookie value and matches it in subsequent requests from the same client NOTE The passive cookie mode is recommended for temporary cookies However you can use this mode for permanent cookies if the server is emb
17. 0 2 IF3 10 10 3 2 32 IF3 10 10 2 2 32 Clean 10 10 3 VIP 10 10 4 100 wo Router 195 1 1 1 Internet 195 1 1 9 10 10 2 9 Router 195 1 1 2 Web Switch 2 Firewall 2 Web Switch 4 10 10 4 22 IF1 195 1 1 11 Dirty 10 10 2 4 IF1 10 10 4 11 TA IF2 10 10 2 11 Clean 10 10 3 4 IF2 10 10 3 11 IF3 10 10 2 12 32 IF3 10 10 3 12 32 VIP 10 10 4 100 Figure 13 9 Four Subnet FWLB Example Network Alteon WebSystems Chapter 13 Firewall Load Balancing 347 212777 A February 2002 Web OS 10 0 Application Guide To use free metric FWLB in this network the following configuration changes are necessary 1 On the clean side Web switches enable RTS on the ports attached to the firewalls port 3 and on the interswitch port port 9 On both clean side switches gt gt cfg slb port 3 rts enable gt gt port 9 rts enable 2 On the clean side Web switches remove the redirection filter from the ports attached to the real servers ports 4 but make sure filter processing is enabled To view the original redirection filters that were configured for the four subnet example see Step 3 on page 343 On both clean side switches gt gt port 4 rem 224 gt gt filt ena 3 On the dirty side Web switches set the FWLB metric On both dirty side Web switches gt gt group 1 gt gt metric lt metric type gt Any of the following load balancing
18. 3 Define the WAN link load balancing redirection filter gt gt Real server group 1 cfg slb filt 1 gt gt Filter 1 ena gt gt Filter 1 action redir gt gt Filter 1 group 1 4 Enable WAN link load balancing for the redirection filter gt gt cfg slb filt 1 adv linklb ena 5 Enable WAN link load balancing proxy for the redirection filter gt gt cfg slb filt 1 adv proxy ena 6 Apply and save your changes gt gt Filter 1 Advanced apply gt gt Filter 1 Advanced save Alteon WebSystems Chapter 6 Server Load Balancing m 167 212777 A February 2002 Web OS 10 0 Application Guide 168 m Chapter 6 Server Load Balancing Alteon 2 systems A February CHAPTER 7 Filtering This chapter provides a conceptual overview of filters and includes configuration examples showing how filters can be used for network security and Network Address Translation NAT The following topics are discussed in this chapter E Overview on page 170 This section describes the benefits and filtering criteria to allow for extensive filtering at the IP and TCP UDP levels Filtering Benefits on page 170 Filtering Criteria on page 170 Stacking Filters on page 172 Overlapping Filters on page 172 The Default Filter on page 173 VLAN based Filtering on page 174 Optimizing Filter Performance on page 176 Filter Logs on
19. gt gt cfg slb port 7 rts ena Enable Return to Sender on port 7 gt gt cfg slb port 8 rts ena Enable Return to Sender on port 8 11 Enable filter processing on the server ports so that the responses from the real server will be looked up in the VPN session table gt gt cfg slb port 1 filter ena 12 Apply and save the configuration and reboot the switch gt gt apply gt gt save gt gt boot reset Alteon WebSystems Chapter 14 Virtual Private Network Load Balancing 359 212777 A February 2002 Web OS 10 0 Application Guide Configure the Second Clean Side Switch CB 1 Turn off bootp gt gt cfg sys bootp dis 2 Define and enable VLAN 2 for ports 7 and 8 gt gt cfg vlan 2 ena def 7 8 3 Turn off Spanning Tree Protocol gt gt cfg stp offt 4 Define the clean side IP interfaces Create one clean side IP interface on a different subnet for each VPN device being load bal anced gt gt cfg ip if 1 ena mask 255 255 255 0 addr 30 0 0 11 gt gt cfg ip if 2 ena mask 255 255 255 0 addr 20 0 0 20 v1 2 gt gt cfg ip if 3 ena mask 255 255 255 255 addr 20 0 0 21 vl1 2 5 Configure routes for each of the IP interfaces you configured in Step 4 using the VPN devices as gateways One static route is required for each VPN device being load balanced gt gt cfg i
20. 2 The RAS establishes a session with the client and sends a RADIUS Accounting Start mes sage with the client IP address to the RADIUS server 3 The switch snoops on the RADIUS accounting packet and adds a session entry if it finds enough information in the packet 4 The switch load balances the WAP traffic to a specific WAP gateway 5 When the client terminates the session the RAS sends an Accounting Stop message to the RADIUS server and the session entry is deleted from the switch 160 Chapter 6 Server Load Balancing Alteon e systems A February Web OS 10 0 Application Guide Preconfiguring WAP Server Load Balancing E Configure WAP server load balancing on Alteon AD4 and Alteon 184 platforms only E Enable Virtual Matrix Architecture VMA gt gt cfg slb adv matrix ena E Disable DAM Direct Access Mode gt gt cfg slb adv direct dis E Disable pbind and enable udp under the WAP services ports 9200 to 9203 menu gt gt cfg slb virt lt number gt service lt namelnumber gt pbind dis gt gt cfg slb virt lt number gt service lt namelnumber gt udp ena E Configure for RADIUS service 1812 and 1645 NOTE The radius service number specified on the switch must match with the service speci fied on the server Enabling Wireless Application Protocol SLB 1 Enable the external notification from WAP gateway to add and delete session request
21. 2 7 BASED ON COOKIE INFORMATION SWITCH ENKELE COM PTESLNBIS TU IBID ANTE REDIRECTS REQUEST TO THE SAME SERVER HANDSHAKE WITH CLIENT OR HASHES ON COOKIE VALUE FORWARDS HTTP REQUEST TO COOKIE SERVER Figure 16 1 Cookie Based Persistence How It Works 424 m Chapter 16 Persistence Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide The following topics discussing cookie based persistence are detailed in this section Permanent and Temporary Cookies on page 425 Cookie Formats on page 425 Cookie Properties on page 426 Client Browsers that Do Not Accept Cookies on page 426 Cookie Modes of Operation on page 427 Configuring Cookie Based Persistence on page 430 Permanent and Temporary Cookies Cookies can either be permanent or temporary A permanent cookie is stored on the client s browser as part of the response from a Web site s server It will be sent by the browser when the client makes subsequent requests to the same site even after the browser has been shut down A temporary cookie is only valid for the current browser session Similar to a SSL Ses sion based ID the temporary cookie expires when you shut down the browser Based on RFC 2109 any cookie without an expiration date is a temporary cookie Cookie Formats A cookie can be defined in the HTTP header the recommended method or placed in the URL for hashing The cookie is defined as a Name Value pa
22. Internet Router Inbound proxy on Real servers public address 10 10 10 x Private network Figure 7 10 Active FTP for Dynamic NAT Alteon WebSystems Chapter 7 Filtering 195 212777 A February 2002 Web OS 10 0 Application Guide Configuring Active FTP Client NAT NOTE The passive mode does not need this feature 1 Make sure that a proxy IP address is enabled on the filter port 2 Make sure that a source NAT filter is set up for the port gt gt cfg slb filt 14 Select the menu for client filter gt gt Filter 14 invert ena Invert the filter logic gt gt Filter 14 dip 10 10 10 0 If the destination is not private gt gt Filter 14 dmask 255 255 255 0 For the entire private subnet range gt gt Filter 14 sip any From any source IP address gt gt Filter 14 action nat Perform NAT on matching traffic gt gt Filter 14 nat source Translate source information gt gt Filter 14 ena Enable the filter gt gt Filter 14 adv proxy enable Allow PIP proxy translation gt gt Filter 14 Advanced cfg slb port 1 Select SLB port 1 gt gt SLB port 1 add 14 Add the filter to port 1 gt gt SLB port 1 pip 205 178 17 12 Set public IP address proxy gt gt SLB port 1 filt enable Enable filtering on port 1 gt gt SLB port 1 proxy ena Enable proxies on this port gt gt SLB port 1 apply Apply configuration changes gt gt SLB port 1 save Save configur
23. One static route is required for each VPN device being load balanced gt gt gt gt gt gt gt gt gt gt cfg ip route add 20 0 0 10 255 255 255 255 10 0 0 101 2 add 20 0 0 11 255 255 255 255 10 0 0 102 3 add 20 0 0 20 255 255 255 255 10 0 0 101 2 add 20 0 0 21 255 255 255 255 10 0 0 102 3 Se E ROSE 362 m Chapter 14 Virtual Private Network Load Balancing Alteon WebSystems 212777 A February 2002 6 Configure VRRP for virtual routers 1 and 2 Web OS 10 0 Application Guide gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt aS gt gt gt gt gt gt gt gt oo gt gt oS gt gt gt gt gt gt Po Vir VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE VRRE pP P pP p p p p p P pP P pP pP P Dp p pP pP p Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual Virtual gt gt cfg vrrp on tual Router Redundancy Protocol cfg vrrp vr 1 Router 1 Router 1 Router 1 Router 1 Router 1 Router 1 Router 1 Router 1 Router Router Router Router Router Router Router Router Router Router Router ena vrid 1 if 1 prio 101 share dis track Priority Tracking 1 Priority Tracking 1 Priority Tracking 2 ena 2
24. Set IP address of virtual router Disable sharing Select Virtual Router Tracking Menu Track VLAN switch ports Apply the configuration Save the configuration 358 m Chapter 14 Virtual Private Network Load Balancing Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide 7 Enable Server Load Balancing SLB on the first clean switch gt gt cfg slb on 8 Configure real servers for health checking VPN devices gt gt cfg slb real 1 ena Enable slb for real server 1 gt gt Real server 1 rip 10 0 0 10 Assign IP address for real server 1 gt gt Real server 1 real 2 ena Enable SLB for real server 2 gt gt Real server 2 rip 10 0 0 11 Assign IP address for real server 2 gt gt Real server 2 real 3 ena Enable SLB for real server 3 gt gt Real server 3 rip 10 0 0 20 Assign IP address for real server 3 gt gt Real server 3 real 4 ena Enable SLB for real server 4 gt gt Real server 4 rip 10 0 0 21 Assign IP address for real server 4 9 Configure real server group 1 and add real servers 1 2 3 and 4 to the group gt gt cfg slb group 1 Configure real server group 1 gt gt Real server group 1 metric hash Select SLB hash metric for group 1 gt gt Real server group 1 add 1 Add real servers 1 4 to group 1 gt gt Real server group 1 add 2 add 3 add 4 10 Enable RTS on the necessary ports
25. Web OS 10 0 Application Guide Domain Name Server DNS Load Balancing In previous releases of Web OS DNS load balancing was based on virtual server IP address and virtual port VPORT only In Web OS 10 0 however DNS load balancing allows you to choose the service based on the two forms of DNS queries UDP and TCP This enables the switch to send TCP DNS queries to one group of real servers and UDP DNS queries to another group of real servers The requests are then load balanced among the real servers in that group Figure 6 11 shows four real servers load balancing UDP and TCP queries between two groups Real servers 2 10 10 10 20 S Group 1 n UDP health udpdns vip 20 20 20 20 Va a me Internet n Client Web Switch Real servers I Group 2 TCP health dns X Figure 6 11 Layer 4 DNS Load Balancing NOTE You can configure both UDP and TCP DNS queries for the same virtual server IP address Alteon 2bSystems Chapter 6 Server Load Balancing 151 212777 A February 2002 Web OS 10 0 Application Guide Preconfiguration Tasks 1 Enable server load balancing gt gt cfg slb ena 2 Configure the four real servers and their real IP addresses gt gt cfg slb real 20 gt gt Real server 20 ena Enable real server 20 gt gt Real server 20 rip 10 10 10 20 Specify the IP address gt gt Real server
26. Web Site Preference Example In the following example there are two Web sites A com and B com BWM is configured to give preference to traffic sent to Web site B com 1 Configure the switch as you normally would for SLB Configuration includes the follow ing tasks E Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server Define a real server group Define a virtual server Define the port configuration For more information about SLB configuration refer to Server Load Balancing on page 117 NOTE Ensure BWM is enabled on the switch c g bwm on 2 Select the first bandwidth policy Each policy must have a number from 1 to 64 gt gt cfg bwm pol 1 Select BWM policy 1 3 Set the hard soft and reserved rate limits for the bandwidth policy in Mbps gt gt Policy 1 hard 10 Set never exceed rate gt gt Policy 1 soft 8 Set desired bandwidth rate gt gt Policy 1 resv 5 Set committed information rate 4 On the switch select a BWM contract and name the contract Each contract must have a unique number from 1 to 256 gt gt Policy 1 cfg bwm cont 1 Select BWM Contract 1 gt gt BWM Contract 1 name a com Assign contract name a com 460 Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Applic
27. When a transfer is being set up it is always initiated by the client However either the client or the server may be the sender of data Along with transferring user requested files the data transfer mechanism is also used for transferring directory listings from server to client NOTE To configure the switch for FTP health checks the FTP server must accept anony mous user Configuring the Switch for FTP Health Checks Create any file name from an FTP server under FTP server directory for example txt exe bin and so forth To configure the switch for FTP health checks 1 Select the real server group gt gt cfg slb group 1 Select a real server group 2 Set the health check type to FTP for the real server group gt gt cfg slb group 1 health ftp 3 Configure the health check content gt gt cfg slb group 1 content lt filename gt 4 Apply and save your configuration gt gt Real server group 1 apply gt gt Real server group 1 save 234 m Chapter 10 Health Checking Alteon 2 Systems A February Web OS 10 0 Application Guide POP3 Server Health Checks The Post Office Protocol Version 3 POP3 is intended to permit a workstation to dynami cally access a maildrop on a server host The POP3 protocol is used to allow a workstation to retrieve mail that the server is holding for it This protocol is documented in RFC 1939
28. 162 m Chapter 6 Server Load Balancing Alteon 2bSystems 212777 A February 2002 Web OS 10 0 Application Guide Intrusion Detection System Server Load Balancing Intrusion Detection System IDS is a type of security management system for computers and networks An Intrusion Detection System gathers and analyzes information from various areas within a computer or a network to identify possible security breaches which include both intrusions attacks from outside the organization and misuse attacks from within the organi zation Intrusion detection functions include Monitoring and analyzing both user and system activities Analyzing system configurations and vulnerabilities Assessing system and file integrity Recognizing patterns typical of attacks Analyzing abnormal activity patterns Tracking user policy violations Intrusion detection devices inspect every packet before it enters a network looking for any signs of an attack The attacks are recorded and logged in an attempt to guard against future attacks and to record the information about the intruders IDS Server Load Balancing helps scale intrusion detection systems since it is not possible for an individual server to scale information being processed at gigabit speeds How Intrusion Detection Server Load Balancing Works Web OS allows the switch to forward the IP packets to an Intrusion Detection server at the end of the filtering process or at the end of client proc
29. Alteon Z Systems 117 212777 A February 2002 Web OS 10 0 Application Guide Understanding Server Load Balancing SLB benefits your network in a number of ways Increased efficiency for server utilization and network bandwidth With SLB your Alteon Web switch is aware of the shared services provided by your server pool and can then balance user session traffic among the available servers Impor tant session traffic gets through more easily reducing user competition for connections on overutilized servers For even greater control traffic is distributed according to a variety of user selectable rules Increased reliability of services to users If any server in a server pool fails the remaining servers continue to provide access to vital applications and data The failed server can be brought back up without interrupting access to services Increased scalability of services As users are added and the server pool s capabilities are saturated new servers can be added to the pool transparently Identifying Your Network Needs SLB may be the right option for addressing these vital network concerns E A single server no longer meets the demand for its particular application E The connection from your LAN to your server overloads the server s capacity E Your NT and UNIX servers hold critical application data and must remain available even in the event of a server failure E Your Web site is being used as a way to do bu
30. The filter must recognize and allow TCP traffic to reach the local client destination IP addresses if traffic originates from any HTTP source port gt gt Filter 3 filt 4 Select the menu for Filter 4 gt gt Filter 4 sip any From any source IP address gt gt Filter 4 dip 205 177 15 0 To base local network dest address gt gt Filter 4 dmask 255 255 255 0 For entire subnet range gt gt Filter 4 proto tcp For TCP protocol traffic gt gt Filter 4 sport http From any source HTTP port gt gt Filter 4 dport any To any destination port gt gt Filter 4 action allow Allow matching traffic to pass gt gt Filter 4 name allow clients Web browse Provide a descriptive name for the filter gt gt Filter 4 ena Enable the filter 6 Create a filter that will allow local clients to Telnet anywhere outside the local intranet The filter must recognize and allow TCP traffic to reach the local client destination IP addresses if originating from a Telnet source port gt gt Filter 4 filt 5 Select the menu for Filter 5 gt gt Filter 5 sip any From any source IP address gt gt Filter 5 dip 205 177 15 0 To base local network dest address gt gt Filter 5 dmask 255 255 255 0 For entire subnet range gt gt Filter 5 proto tcp For TCP protocol traffic gt gt Filter 5 sport telnet From a Telnet port gt gt Filter 5 dport any To any destination port
31. Web OS 10 0 Application Guide 5 Turn on URL based server load balancing on the virtual server Configure everything under the virtual server as in Configuration Example 1 gt gt cfg slb virt 1 service 80 httpslb enable urlslb If the same string is used by more than one service and you want to allocate a certain percent age of bandwidth to this URL string for this service on the virtual server then define a rule using the urlcont command gt gt cfg slb virt 1 service 80 urlcont lt URL pathID gt lt BW Contract number gt This contract is tied to service 1 The urlcont command will overwrite the contract assigned to the URL string ID 6 Enable Server Load Balancing gt gt cfg slb on Cookie Based Bandwidth Management Example In this example you will assign bandwidth based on cookies First configure cookie based server load balancing which is very similar to URL based load balancing Any cookie contain ing the specified string is redirected to the assigned server Scenario 1 In this scenario the Web site has a single virtual server IP address and supports multiple classes of users Turn on cookie parsing for the service on the virtual server gt gt cfg slb virt 1 service 80 gt gt httpslb enabled cookie sid 1 8 disable 1 Define one or more load balancing strings gt gt cfg slb layer7 1b add lt URL path ID gt Example
32. gt gt gt gt gt gt gt gt gt gt gt gt o gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt cfg vrrp on Virtual Router Redundancy Protocol vr 1 VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR VRR P Virtual P Virtual P Virtual P Virtual P Virtual P Virtual P Virtual P VR 1 Priority P VR 1 Priority Tracking apply P VR 1 Priority Tracking save P Virtual P Virtual P Virtual P Virtual P Virtual P Virtual P Virtual P VR 2 Priority P VR 2 Priority Tracking apply P VR 2 Priority Tracking save Router 1 ena Router 1 vrid 1 Router 1 if 1 Router 1 prio 101 Router 1 addr 30 0 0 50 Router 1 share dis Router 1 track Tracking vrs ena P VR 1 Priority Tracking vr 2 Router 2 ena Router 2 vrid 2 Router 2 if 2 Router 2 prio 101 Router 2 addr 20 0 0 1 Router 2 share dis Router 2 track Tracking ports ena Enable VRRP Select virtual router 1 menu Enable the virtual router Assign virtual router ID 1 To interface number 1 Set the renter priority Set IP address of virtual router Disable sharing Select virtual router tracking menu Enable tracking of virtual routers Apply the configuration Save the configuration Select virtual router 2 menu Enable the virtual router Assign virtual router ID 2 To interface number 2 Set the renter priority
33. gt gt gt gt gt gt gt gt 22 gt gt gt gt ae cfg slb filt 1 Filter Filter Filter Filter Filter Filter Filter 1 act dpo rpo adv PRPPPRP PR ion redir proto tcp rt rtsp rt rtsp group 1 Advanced proxy disable Select the menu for filter 1 Set the action for redirection Enter TCP protocol Enter service port for RTSP Enter redirection port for RTSP Select RTSP cache server group 1 Select advanced menu for filter 1 Disable proxy 4 Configure a default allow filter to facilitate traffic 2 gt gt gt gt gt gt gt gt gt cfg slb filt 2048 Filter Filter Filter Filter 2048 2048 2048 2048 sip any dip any ena action allow Select a default allow filter 2048 From any source IP addresses To any destination IP addresses Enable a default allow filter Set the action to allow normal traffic 5 Turn on filtering on the port and add filters to the port to support basic WCR gt gt gt gt gt gt gt gt cfg slb port 1 SLB Port 1 add 1 SLB Port 1 add 2 SLB Port 1 filt ena Select the menu for port 1 Add RTSP filter 1 to port 1 Add RTSP filter 2 to port 1 Enable filtering on port 1 6 Apply and save the configuration gt gt gt gt SLB Port 1 apply SLB Port 1 save 212 m Chapter 8 Application Redirection Alteon Z
34. gt gt Filter 5 action allow Allow matching traffic to pass gt gt Filter 5 ena Enable the filter 7 Create a series of filters to allow Domain Name System DNS traffic DNS traffic requires four filters one pair is needed for UDP traffic incoming and outgoing and another pair for TCP traffic incoming and outgoing 188 m Chapter 7 Filtering Alteon e Systems A February For UDP Web OS 10 0 Application Guide gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil cer Ler cer Ler Cer Ler cer Ler cer Ler Cer Ler cer Ler cer Ler cer gt gt Fil Ler NYA AYHWAYNAYNAYNNYNDDADAAAA AA DAD WH f ilt 6 sip any dip 205 177 15 4 dmask 255 255 255 255 proto udp sport any dport domain action allow ena i1lt 7 sip 205 177 15 4 smask 255 255 255 255 dip any proto udp sport domain dport any action allow ena Select the menu for Filter 6 From any source IP address To local DNS Server Set mask for exact dest address For UDP protocol traffic From any source port To any DNS destination port Allow matching traffic to pass Enable the filter Select the menu for Filter 7 From local DNS Server Set mask for exact source address To any dest
35. gt gt SLB port 2 port 3 client ena Enable client processing on port 3 gt gt SLB port 3 apply Apply the configuration gt gt SLB port 3 save Save the configuration 8 Configure the virtual server that will load balance the real servers gt gt SLB port 3 virt 100 Configure virtual server 100 gt gt Virtual Server 100 vip 20 1 1 10 Assign virtual server 100 IP address gt gt Virtual Server 100 ena Enable the virtual server 9 Configure the real servers to which traffic will be load balanced These are the real servers on the network gt gt Real server group 1 cfg slb real 2 Select real server 2 gt gt Real server 2 rip 20 1 1 2 Assign real server 2 IP address gt gt Real server 2 ena Enable real server 2 gt gt Real server 2 real 3 Select real server 3 gt gt Real server 3 rip 20 1 1 3 Assign real server 3 IP address Alteon WebSystems Chapter 13 Firewall Load Balancing 323 212777 A February 2002 Web OS 10 0 Application Guide 10 Place the real servers into a real server group gt gt Real server 3 group 200 Select real server group 1 gt gt Real server group 200 add 2 Select real server 2 to group 200 gt gt Real server group 200 add 3 Select real server 3 to group 200 11 Configure ports 4 and 5 which are connected to the real servers for server processing gt gt Real server group 200
36. iy Stub Area i Not So Stubby Area No External Routes S NSSA l from Backbone N 7 External LSA nee 7 Routes Sa Stub Area NSSA ABR Area Border Router l or Transit Area ASBR Autonomous System Connected to Backbone Non OSPF Area Boundary Router via Virtual Link RIP BGPAS 7 Lan 7 a a Bs ce ie oe _ a Figure 4 1 OSPF Area Types 70 m Chapter 4 OSPF Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Types of OSPF Routing Devices As shown in Figure 4 2 OSPF uses the following types of routing devices E Internal Router IR a router that has all of its interfaces within the same area IRs main tain LSDBs identical to those of other routing devices within the local area E Area Border Router ABR a router that has interfaces in multiple areas ABRs maintain one LSDB for each connected area and disseminate routing information between areas E Autonomous System Boundary Router ASBR a router that acts as a gateway between the OSPF domain and non OSPF domains such as RIP BGP and static routes BGP External Routes RIP Pid Area 0 ae OSPF Autonomous System ae Backbone J 2 Area3 s 3 S l i l Inter Area Routes 4 SN I ASBR Summary Routes 7 zl N 2 l 1 l ee ee a _e 7 a l 1 N 7 ABR 5 ABR I 1 l i i i Internal ASBR of Router i Area 1 Saca aean s _ Area2 7 j Figure 4
37. on page 298 configure the Denver site as follows 1 On the Denver switch define each remote site When you start configuring at the Denver site Denver is local and California is remote Add and enable the remote switch s IP address interface In this example there is only one remote site California with an IP interface address of 200 200 200 100 The following commands are used gt gt Layer 4 gslb site 1 Select remote site 1 gt gt Remote site 1 prima 200 200 200 100 Define remote IP interface address gt gt Remote site 1 ena Enable remote site 1 Each additional remote site would be configured in the same manner You can enable up to 64 remote sites with a total aggregate of 2048 service site combinations 2 On the Denver switch assign each remote distributed service to a local virtual server In this step the local Denver site is configured to recognize the services offered at the remote California site As before configure one real server entry on the Denver switch for each virtual server located at each remote site Since there is only one remote site California with only one virtual server only one more local real server entry is needed at the Denver site The new real server entry is configured with the IP address of the remote virtual server rather than the usual IP address of a local physical server Do not confuse this value with the IP inter face address on the remote switch Also t
38. s priority will fall by 5 more and Web switch 2 s will rise by 5 because the switches are tracking how many Masters they are running So Web switch 1 s priority will settle out at 112 and Web switch 2 s priority at 125 When both servers are restored to Web switch 1 that switch s priority will rise by 12 2 healthy real servers X 6 per healthy server to 124 Since 124 is less than 125 Web switch 2 will remain the master If at this point a server fails on Web switch 2 its priority will fall by 6 to 119 Since 119 is less than 124 Web switch 1 will become the Master Its priority will settle out at 129 since it s now the master while Web switch 2 s priority will drop by 5 more to 114 As you can see from this example the user s goals were met by the configured tracking param eters NOTE There is no shortcut to setting tracking parameters The goals must first be set and the outcomes of various configurations and scenarios analyzed to find settings that meet the goals Alteon WebSystems Chapter 11 High Availability m 281 212777 A February 2002 Web OS 10 0 Application Guide Synchronizing Configurations As noted above each VRRP capable switch is autonomous Switches in a virtual router need not be identically configured As a result configurations cannot be synchronized automatically For user convenience it is possible to synchronize a configuration from one VRRP capable switch to another using the oper slb s
39. www site b com instead of www hostsite com site a and www hostsite com site b Service providers on the other hand do not want to deplete the pool of unique IP addresses by dedicating an individual IP address for each home page they host By supporting an extension in HTTP 1 1 to include the host header Web OS enables service providers to create a single virtual server IP address to host multiple Web sites per customer each with their own host name NOTE For SLB one HTTP header is supported per virtual server The following list provides more detail on virtual hosting with configuration information E AnHTTP 1 0 request sent to an origin server not a proxy server is a partial URL instead of a full URL An example of the request that the origin server would see as follows GET products 180 HTTP 1 0 User agent Mozilla 3 0 Accept text html image gif image jpeg The GET request does not include the host name From the TCP IP headers the origin server knows the requests host name port number and protocol E With the extension to HTTP 1 1 to include the HTTP HOST header the above request to retrieve the URL www nortelnetworks com products 180 would look like this GET products 180 HTTP 1 1 Host www nortelnetworks com User agent Mozilla 3 0 Accept text html image gif image jpeg The Host header carries the hostname used to generate the IP address of the site E Ba
40. 172 221 164 100 if 4 renter prio 109 master If the switch is a backup gt gt info vrrp View VRRP Information VRRP information 1 vrid Ly Die ede eel ST if 1 renter prio 104 backup server 3 vrid 3 192 168 1 30 if 3 renter prio 104 backup 5 vrid Sp L72 21 16 10 if 1 renter prio 104 backup Alteon Z Systems 286 Chapter 11 High Availability 212777 A February 2002 Part 3 Advanced Web Switching Web OS can parse requests and request can be isolated and tres Web switching R ost tags and cookies so that each This section describes the following advanced oad Balancing irewall Load Balancing M Virtual Private Network Load Balancing H Content Intelligent Switching E Persistence E Bandwidth Management Alteon Systems 287 212777 A February 2002 Web OS 10 0 Application Guide 288 m Advanced Web Switching Alteon systems A February CHAPTER 12 Global Server Load Balancing This chapter provides information for configuring Global Server Load Balancing GSLB across multiple geographic sites The following topics are covered E GSLB Overview on page 290 E Configuring GSLB on page 293 E IP Proxy for Non HTTP Redirects on page 304 E Verifying GSLB Operation on page 308 E Configuring Client Site Preferences on page 308 E Using Border Gateway Protocol for GSLB on page 312 Alteon Systems 212777 A February 2002 289 Web OS 10 0 Applic
41. 2 1 any cont 1024 2 alteon cont 3 2 Allocate bandwidth for each string To implement this assign a BWM contract to a defined string gt gt Server Load Balance Resource cont lt URL path ID gt lt BWM Contract number gt Alteon 2bSystems Chapter 17 Bandwidth Management m 463 212777 A February 2002 Web OS 10 0 Application Guide 3 Configure a real server to handle the URL request To add a defined string gt gt cfg slb real 2 layer7 addlb lt URL path ID gt where URL path ID is the identification number of the defined string as displayed when you enter the cur command Example cf g slb real 2 layer7 addlb 3 4 Either enable Direct Access Mode DAM on the switch or configure a proxy IP address on the client port NOTE If VMA is enabled and you are using a proxy IP address you need to configure proxy IP addresses on ports through 8 To turn on DAM gt gt cfg slb adv direct ena To turn off DAM and configure a proxy IP address on the client port gt gt cfg slb adv direct dis gt gt port 2 pip 12 12 12 12 gt gt proxy ena NOTE By enabling DAM on the switch or alternatively disabling DAM and configuring a proxy IP address on the client port port mapping for URL based server load balancing can be performed 464 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002
42. 2 Systems A February Web OS 10 0 Application Guide Script based health checking is intelligent in that it will only send the appropriate requests to the relevant servers In the example above the first GET statement will only be sent to Real Server and Real Server 2 Going through the health check statements serially will ensure that all content is available by at least one real server on the remote site Configure the remote real server IP address the virtual server IP address of the remote site to accept any URL requests The purpose of the first GET is to check if Real Server 1 or Real Server 2 is up that is to check if the remote site has at least one server for images content Either Real Server 1 or Real Server 2 will respond to the first GET health check If all the real server IP addresses are down Real Server 7 the virtual server IP address of the remote site will respond with an HTTP Redirect respond code 302 to the health check Thus the health check will fail as the expected response code is 200 ensuring that the HTTP Redi rect messages will not cause a loop Verifying Script Based Health Checks If a script fails the expect line in the script that is not succeeding is displayed under the info slb real lt real server number gt command gt gt info slb real 1 1 205 178 13 225 00 00 00 00 00 00 vlan 1 port 0 health 4 FAILED real ports script 2 DOWN current send GET HTTP 1
43. 445 212777 A February 2002 Web OS 10 0 Application Guide Data Pacing The mechanism used to keep the individual traffic flows under control is called data pacing It is based on the concept of a virtual clock and theoretical departure times TDT The actual cal culation of the TDT is based initially on the soft limit rate The soft limit can be thought of as a target limit for the ISP s customer So long as bandwidth is available and the classification queue is not being filled at a rate greater than the soft limit the TDT will be met for both incom ing frames and outgoing frames and no borrowing or bandwidth limitation will be necessary Quevet ff Jf Queue 2 MH p Queue 3 E gt Quene 4 E E E E Time Figure 17 3 Virtual Clocks and TDT If the data is arriving more quickly than it can be transmitted at the soft limit and sufficient bandwidth is still available the rate is adjusted upwards based on the depth of the queue until the rate is fast enough to reduce the queue depth or the hard limit is reached If the data cannot be transmitted at the soft limit then the rate is adjusted downward until the data can be trans mitted or the CIR is hit If the CIR is overcommitted among all the contracts configured for the switch graceful degradation will reduce each CIR until the total bandwidth allocated fits within the total bandwidth available Each BWM contract is assigned a bandwidth policy index and optionally a
44. A February Web OS 10 0 Application Guide To configure RTSP load balancing using pattern matching follow this procedure 1 Add the URL string gt gt cfg slb layer7 slb add lt URL string ID gt Add URL string ID for example g2video rm E You can remove the URL string by performing the following gt gt cfg slb layer7 slb gt gt Server Load Balance Resource rem lt URL string ID gt Remove URL string ID g2video rm E You can rename the URL string by performing the following gt gt cfg slb layer7 slb gt gt Server Load Balance Resource rename lt URL string ID gt Rename URL string g2video rm 2 Assign a URL string ID to a real server gt gt cfg slb real 1 Select the real server gt gt Real Server 1 Layer 7 gt gt Real Server 1 Layer 7 Commands addlb lt URL string ID 1 128 gt Add the string ID for RTSP load balance 3 Enable Layer 7 Parsing for RTSP gt gt cfg slb virt 1 service rtsp gt gt Virtual Server 1 rtsp Service rtspslb Current RTSP URL load balancing disabled Enter new RTSP load balancing method hash pattern disabled pattern 4 Apply and save the configuration gt gt Virtual Server 1 rtsp Service apply gt gt Virtual Server 1 rtsp Service save Alteon WebSystems Chapter 15 Content Intelligent Switching 393 212777 A February 2002 Web OS 10 0 Applicati
45. Figure 12 5 Figure 12 6 Figure 13 1 Figure 13 2 Figure 13 3 Figure 13 4 Figure 13 5 Figure 13 6 Figure 13 7 Figure 13 8 Figure 13 9 Figure 13 10 Figure 14 1 Figure 14 2 Figure 14 3 Figure 15 1 Figure 15 2 Figure 15 3 Figure 15 4 Figure 15 5 Figure 15 6 Figure 15 7 Figure 15 8 Figure 15 9 Figure 16 1 Figure 16 2 Figure 16 3 Figure 16 4 Figure 16 5 Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide DNS Resolution with Global Server Load Balancing 291 GSLB Topology Example 294 HTTP and Non HTTP Redirects 304 POP3 Request Fulfilled via IP Proxy 305 GSLB Proximity Tables How They Work 309 Configuring Client Proximity Table 310 Typical Firewall Configuration Before FWLB 314 Basic FWLB Topology 316 Basic FWLB Process 317 Basic FWLB Example Network 319 Four Subnet FWLB Topology 326 Four Subnet FWLB Process 327 Four Subnet FWLB Example Network 329 Basic FWLB Example Network 346 Four Subnet FWLB Example Network 347 Typical Firewall Load Balancing Topology with DMZ 349 Basic Network Frame Flow and Operation 355 VPN Load Balancing Configuration Example 356 Checkpoint Rules for Both VPN Devices as Seen in the Policy Editor 368 Content Intelligent Load Balancing Example 372 URL Based Server Load Balancing 376 Balancing Nontransparent Caches 387 Load Balancing DNS Queries 390 URL Based Web Cache Redirection 396 URL Hashing for WCR 408 Content
46. How SSL Session ID Based Persistence Works 437 Chapter 17 Bandwidth Management 441 Overview 442 Bandwidth Policies 444 Rate Limits 445 Bandwidth Policy Configuration 445 Data Pacing 446 Classification Criteria 447 Server Output Bandwidth Control 447 Application Bandwidth Control 447 Combinations 448 Precedence 448 Bandwidth Classification Configuration 448 Frame Discard 449 URL Based Bandwidth Management 449 HTTP Header Based Bandwidth Management 451 Cookie Based Bandwidth Management 451 Bandwidth Statistics and History 452 Statistics Maintained 452 Statistics and Management Information Bases 452 Packet Coloring TOS bits for Burst Limit 453 Operational Keys 453 Alteon Systems Contents 11 212777 A February 2002 Web OS 10 0 Application Guide Configuring Bandwidth Management 454 Additional Configuration Examples 457 Preferential Services Examples 460 Glossary 471 Index 475 12 m Contents Alteon Systems 212777 A February 2002 Figures Figure 1 1 Figure 1 2 Figure 1 3 Figure 1 4 Figure 1 5 Figure 2 1 Figure 2 2 Figure 2 3 Figure 2 4 Figure 2 5 Figure 2 6 Figure 2 7 Figure 3 1 Figure 3 2 Figure 4 1 Figure 4 2 Figure 4 3 Figure 4 4 Figure 4 5 Figure 4 6 Figure 4 7 Figure 4 8 Figure 5 1 Figure 5 2 Alteon Z Systems 212777 A February 2002 The Router Legacy Network 29 Switch Based Routing Topology 30 iBGP andeBGP 37 BGP Failover Configuration Exampl
47. In an active active configuration two Web switches provide redundancy for each other with both active at the same time for the same services Web OS has extended VRRP to include virtual servers allowing full active active redundancy between its Layer 4 switches In an active active configuration shown in Figure 11 5 both switches can process traffic for the same service at the same time both switches can be active simultaneously for a given IP routing interface or load balancing virtual server VIP Active VIP 1 VIP 205 178 13 226 Active VIP 2 VIP 205 178 13 240 Active VIP 3 VIP 205 178 13 110 Router Internet Router Active VIP 1 VIP 205 178 13 226 Active VIP 2 VIP 205 178 13 240 Active VIP 3 VIP 205 178 13 110 Figure 11 5 Active Active Redundancy In the example above one switch is still the master router However traffic going through the backup router associated with the same virtual router on the switch that is addressed to the master router will be intercepted and processed by the backup router Alteon WebSystems Chapter 11 High Availability 255 212777 A February 2002 Web OS 10 0 Application Guide Hot Standby Redundancy In a hot standby configuration Spanning Tree Protocol STP is not needed to eliminate bridge loops This speeds up failover when a switch fails The standby switch blocks all ports configured as standby ports whereas the master switch enables these same ports Consequent
48. SIP and desti nation IP DIP addresses The request is then forwarded as a UDP Unicast MAC layer mes sage to two BOOTP servers whose IP addresses are configured on the switch The servers Alteon WebSystems Chapter 1 Basic IP Routing 41 212777 A February 2002 Web OS 10 0 Application Guide respond as aa UDP Unicast message back to the switch with the default gateway and IP address for the client The destination IP address in the server response represents the interface address on the switch that received the client request This interface address tells the switch on which VLAN to send the server response to the client DHCP Relay Agent Configuration To enable the Alteon Web switch to be the BOOTP forwarder you need to configure the DHCP BOOTP server IP addresses on the switch Generally you should configure the com mand on the switch IP interface closest to the client so that the DHCP server knows from which IP subnet the newly allocated IP address should come The following figure shows a basic DHCP network example Boston Atlanta wr 20 1 1 1 DHCP Client Web Switch DHCP Server DHCP Relay Agent Figure 1 5 DHCP Relay Agent Configuration In Alteon Web switch implementation there is no need for primary or secondary servers The client request is forwarded to the BOOTP servers configured on the switch The use of two servers provide failover redundancy However no health checking is supported Use t
49. The maxcon value is specified in units of 10 The value of 3 indicates a total of 30 TCP con nections 180 Chapter 7 Filtering Alteon 2 Systems A February Web OS 10 0 Application Guide 3 Set the timewin parameter and calculate the total time window in seconds gt gt cfg slb adv timewin 3 Set the time window The total time window is a multiple of fast age for information on fastage see the Con figuration chapter in the Web OS 10 0 Command Reference The total time window is calcu lated with the following equation Total Time window timewin x fastage If the default value for fastage is 1 second then the configured total time window is 3 sec onds NOTE From Step 2 and 3 the TCP rate limit defined as the maximum number of connections over a specified time window is 30 TCP connections for every 3 seconds or 10 TCP connec tions per second For a small site 30 TCP connections per second provides a good indication if your site is being attacked The default is 100 TCP connections per second For larger sites TCP rate limit greater than 2550 connection per second indicates the possibility that your switch is under attack 4 Set the holddur parameter and calculate the hold down time in minutes gt gt cfg slb adv holddur 2 Set the hold duration The hold down time is a multiple of s lowage for information on s lowage see the Config uration chapter in the Web OS 10 0 Comm
50. Web OS 10 0 Application Guide 3 Define the backbone The backbone is always configured as a transit area using areaid 0 0 0 0 gt gt Open Shortest Path First aindex 0 Select menu for area index 0 gt gt OSPF Area index 0 areaid 0 0 0 0 Set the ID for backbone area 0 gt gt OSPF Area index 0 type transit Define backbone as transit type gt gt OSPF Area index 0 enable Enable the area 4 Define the stub area gt gt OSPF Area index 0 aindex 1 Select menu for area index 1 gt gt OSPF Area index 1 areaid 0 0 0 1 Set the area ID for OSPF area 1 gt gt OSPF Area index 1 type stub Define area as stub type gt gt OSPF Area index 1 enable Enable the area 5 Attach the network interface to the backbone gt gt OSPF Area 1 if 1 Select OSPF menu for IP interface 1 gt gt OSPF Interface 1 aindex 0 Attach network to backbone index gt gt OSPF Interface 1 enable Enable the backbone interface 6 Attach the network interface to the stub area gt gt OSPF Interface 1 if 2 Select OSPF menu for IP interface 2 gt gt OSPF Interface 2 aindex 1 Attach network to stub area index gt gt OSPF Interface 2 enable Enable the stub area interface 7 Apply and save the configuration changes gt gt OSPF Interface 2 apply Global command to apply all changes gt gt OSPF Interface 2 save Gl
51. Web switch 2 is master for the virtual interface router with VRID 2 and backup for the virtual interface router with VRID 1 In this manner both routers can actively forward traffic at the same time but not for the same interface Router Internet Router VRID 1 Router 1 Master Active VRID 2 Router 1 Backup Standby Host 1 Default Gateway 205 178 13 226 Web Swi Web Switc VRID 1 Default Gateway Router 2 Backup Standby 205 178 13 240 VRID 2 Router 2 Master Active Figure 11 2 Example 2 VRRP Router Table 11 1 Active Standby Configuration VRID 1 VRID 2 Web Switch 1 Router 1 Master Active VR IP address 205 178 13 226 MAC address 00 00 SE 00 01 01 Priority 255 IP interface 205 178 13 226 Router 1 Backup Standby VR IP address 205 178 13 240 MAC address 00 00 SE 00 01 02 Priority 100 IP interface 205 178 13 239 Web Switch 2 Router 2 Backup Standby VR IP address 205 178 13 226 MAC address 00 00 SE 00 01 01 Priority 100 IP interface 205 178 13 225 Router 1 Master Active VR IP address 205 178 13 240 MAC address 00 00 SE 00 01 02 Priority 255 IP interface 205 178 13 240 252 m Chapter 11 High Availability Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide Failover Methods With service availability becoming a major concern on the Internet service providers are increasingly
52. gt OSPF Area index 0 enable Enable the area 4 Define the stub area gt gt OSPF Area index 0 aindex 1 Select menu for area index 1 gt gt OSPF Area index 1 areaid 0 0 0 1 Set the area ID for OSPF area 1 gt gt OSPF Area index 1 type stub Define area as stub type gt gt OSPF Area index 1 enable Enable the area 5 Attach the network interface to the backbone gt gt OSPF Area index 1 if 1 Select OSPF menu for IP interface 1 gt gt OSPF Interface 1 aindex 0 Attach network to backbone index gt gt OSPF Interface 1 enable Enable the backbone interface 6 Attach the network interface to the stub area gt gt OSPF Interface 1 if 2 Select OSPF menu for IP interface 2 gt gt OSPF Interface 2 aindex 1 Attach network to stub area index gt gt OSPF Interface 2 enable Enable the stub area interface 7 Configure route summarization by specifying the starting address and mask of the range of addresses to be summarized gt gt OSPF Interface 2 range 1 Select menu for summary range gt gt OSPF Summary Range 1 addr 36 128 192 0 Set base IP address of summary range gt gt OSPF Summary Range 1 mask 255 255 192 0 Set mask address for summary range gt gt OSPF Summary Range 1 aindex 0 Inject summary route into backbone gt gt OSPF Summary Range 1 enable Enable summary range 8 Use the hide command to prevent a rang
53. gt gt gt gt gt gt oS gt gt Se SE OSE RHE cfg ip route add 20 0 0 10 add 20 0 0 11 add 20 0 0 20 add 20 0 0 21 255 255 255 255 10 0 0 101 2 255 255 255 255 10 0 0 102 3 255 255 255 255 10 0 0 101 2 255 255 255 255 10 0 0 102 3 Alteon Z Systems 212777 A February 2002 Chapter 14 Virtual Private Network Load Balancing m 365 Web OS 10 0 Application Guide 6 Configure VRRP for virtual routers 1 and 2 gt gt 2 gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt 22 gt gt gt gt gt gt gt gt cfg vrrp on cfg vrrp vr ena vrid 1 if 1 addr 192 168 10 50 share dis track vrs ena ports ena cfg vrrp vr ena vrid 2 if 2 addr 10 0 0 1 share dis track vrs ena ports ena 7 Enable SLB gt gt cfg slb on 8 Configure real servers for health checking VPN devices gt gt a gt gt gt gt cfg slb real 1 ena rip 20 0 0 10 cfg slb real 2 ena rip 20 0 0 11 cfg slb real 3 ena rip 20 0 0 20 cfg slb real 4 ena rip 20 0 0 21 9 Enable the real server group and place real servers 1 4 into the real server group gt gt cfg slb group 1 gt gt metric hash gt gt add 1 add 2 add 3 add 4 366 Chapter 14 Virtual Private Network Load Balancing Alteon Z Systems 212777 A February 2002 Web OS 10 0 Applica
54. guaranteed bandwidth rates A bandwidth policy is often based on a rate structure whereby a Web host or co location provider could charge a customer for bandwidth utilization There are three rates that are configured a Committed Information Rate CIR Reserved Limit a Soft Limit and a Hard Limit as described below A queue depth is also associated with a policy A queue depth is the size of the queue that holds the data It can be adjusted to accommodate delay sensitive traffic such as audio versus drop sensitive traffic such as FTP a EENES Hard Limit Soft Limit Reserved Limit Figure 17 2 Bandwidth Rate Limits 444 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Rate Limits A bandwidth policy specifies three limits listed and described in Table 17 1 Table 17 1 Bandwidth Rate Limits Rate Limit Description Committed Information This is a rate that a bandwidth classification is always guaranteed In con Rate CIR figuring BWM contracts ensure that the sum of all committed informa or Reserved Limit tion rates never exceeds the link speeds associated with ports on which the traffic is transmitted In a case where the total CIRs exceed the out bound port bandwidth the switch will perform a graceful degradation of all traffic on the associated ports Soft Limit This is the desired bandwidth rate that is the rate the custom
55. see RTSP Web Cache Redirection on page 211 NOTE This feature is not applicable if the streaming media multimedia servers use HTTP protocol to tunnel RTSP traffic To ensure that RTSP server load balancing works make sure the streaming media server is configured for RTSP protocol In a typical scenario the RTSP client issues several sequences of commands to establish con nections for each component stream of a presentation There are several variations to this pro cedure depending upon the RTSP client and the server involved For example there are two prominent RTSP server and client implementations Real Server marketed by Real Networks Alteon WebSystems Chapter 6 Server Load Balancing 155 212777 A February 2002 Web OS 10 0 Application Guide Corporation and Quicktime Streaming Server marketed by the Apple Inc The RTSP stream setup sequence is different for these two servers and the switch handles each differently Some of these differences are described below Real Server Real Server supports both UDP and TCP transport protocols for the RTSP streams The actual transport is negotiated during the initialization of the connection If TCP transport is selected then all streams of data will flow in the TCP control connection itself If UDP transport is chosen the client and server negotiate a client UDP port which is manually configurable 3 66 The real media files that the Real Server plays have the exte
56. testing images a gif Example 3 String with the Forward Slash Only If a server is configured with the load balance string only it will only handle requests to the root directory For example the server will handle any files in the root directory index htm default asp index shtm Alteon WebSystems Chapter 15 Content Intelligent Switching 377 212777 A February 2002 Web OS 10 0 Application Guide 3 Apply and save your configuration changes 4 Identify the defined string IDs gt gt cfg slb layer7 slb cur For easy configuration and identification each defined string has an ID attached as shown in the following example Number of entries six ID SLB String 1 any 2 gif 3 sales 4 xitami 5 manual 6 Jpg 5 Configure one or more real servers to support URL based load balancing 6 Add the defined string s to the real server using the following command gt gt cfg slb real 2 layer7 addlb lt ID gt where JD is the identification number of the defined string NOTE If you don t add a defined string or add the defined string any the server will han dle any request A server can have multiple defined strings For example E images E sales E gif With these defined strings this particular server can handle requests that start with images or sales and any requests that contain gif 37
57. 1 gt gt Real server 1 rip 200 200 200 2 Assign Server A IP address gt gt Real server 1 ena Enable real server 1 gt gt Real server 1 real 2 Server B is real server 2 gt gt Real server 2 rip 200 200 200 3 Assign Server B IP address gt gt Real server 2 ena Enable real server 2 gt gt Real server 2 real 3 Server C is real server 3 gt gt Real server 3 rip 200 200 200 4 Assign Server C IP address gt gt Real server 3 ena Enable real server 3 5 Define a real server group This places the three Web cache real servers into one service group gt gt Real server 3 group 1 Select real server group 1 gt gt Real server group 1 add 1 Add real server I to group 1 gt gt Real server group 1 add 2 Add real server 2 to group 1 gt gt Real server group 1 add 3 Add real server 3 to group 1 Alteon Z Systems Chapter 8 Application Redirection 207 212777 A February 2002 Web OS 10 0 Application Guide 6 Set the real server group metric to minmisses This setting helps minimize Web cache misses in the event real servers fail or are taken out of service gt gt Real server group 1 metric minmisses Metric for minimum cache misses 7 Verify that server processing is disabled on the ports supporting application redirection NoTE Do not use the server setting on a port with Application Redirection enabled Server processing i
58. 11 High Availability Alteon ebSystems A February Web OS 10 0 Application Guide Active Active Server Load Balancing Configuration In this example you set up four virtual servers each load balancing two servers providing one service for example HTTP per virtual server You are load balancing HTTP HTTPS POP3 SMTP and FTP Each protocol is load balanced via a different virtual server You could load balance all of these services on one VIP but in this example four distinct virtual servers are used to illustrate the benefits of active active failover Set up one switch dump out the configuration script also called a text dump edit it and dump the edited configuration into the peer switch NoTE Configuring the switch for active active failover should take no longer than 15 min utes to complete You can use either the Web OS Browser Based Interface BBI or the Com mand Line Interface CLI for configuration Task 1 Background Configuration 1 Define the IP interfaces The switch will need an IP interface for each subnet to which it will be connected so it can communicate with devices attached to it Each interface will need to be placed in the appropri ate VLAN In our example Interfaces 1 2 3 and 4 will be in VLAN 2 and Interface 5 will be in VLAN 1 NOTE On Alteon Web switches you may configure more than one subnet per VLAN To configure the IP interfaces for this example enter the followin
59. 2 OSPF Domain and an Autonomous System Alteon Systems 212777 A February 2002 Chapter 4 OSPF m 71 Web OS 10 0 Application Guide Neighbors and Adjacencies In areas with two or more routing devices neighbors and adjacencies are formed Neighbors are routing devices that maintain information about each others health To establish neighbor relationships routing devices periodically send hello packets on each of their inter faces All routing devices that share a common network segment appear in the same area and have the same health parameters he 110 and dead intervals and authentication parameters respond to each other s hello packets and become neighbors Neighbors continue to send peri odic hello packets to advertise their health to neighbors In turn they listen to hello packets to determine the health of their neighbors and to establish contact with new neighbors The hello process is used for electing one of the neighbors as the area s Designated Router DR and one as the area s Backup Designated Router BDR The DR is adjacent to all other neighbors and acts as the central contact for database exchanges Each neighbor sends its data base information to the DR which relays the information to the other neighbors The BDR is adjacent to all other neighbors including the DR Each neighbor sends its data base information to the BDR just as with the DR but the BDR merely stores this data and does not distribute i
60. 200 2 Server B 200 200 200 3 2 On the California switch define each local real server For each local real server you must assign a real server number specify its actual IP address and enable the real server For example gt gt Default gateway 1 cfg slb real 1 Server A is real server 1 gt gt Real server 1 rip 200 200 200 2 Assign IP address to server A gt gt Real server 1 ena Enable real server 1 gt gt Real server 1 real 2 Server B is real server 2 gt gt Real server 2 rip 200 200 200 3 Assign IP address to server B gt gt Real server 2 ena Enable real server 2 3 On the California switch define a real server group Combine the real servers into one service group and set the necessary health checking parame ters In this example HTTP health checking is used to ensure that Web content is being served If the index html file is not accessible on a real server during health checks the real server will be marked as down gt gt Real server 2 group 1 Select real server group 1 gt gt Real server group 1 add 1 Add real server I to group 1 gt gt Real server group 1 add 2 Add real server 2 to group 1 gt gt Real server group 1 health http Use HTTP for health checks gt gt Real server group 1 content index html Set URL content for health checks 296 Chapter 12 Global Server Load Balancing Alteon e Systems A February Web OS 10 0 Appl
61. 227 7015 Nov 1995 Nortel Networks Inc reserves the right to change any products described herein at any time and without notice Nortel Networks Inc assumes no responsibility or liability arising from the use of products described herein except as expressly agreed to in writing by Nortel Networks Inc The use and purchase of this product does not convey a license under any patent rights trademark rights or any other intellectual property rights of Nortel Networks Inc Web OS Alteon 180 Alteon 180e Alteon 184 Alteon AD3 Alteon AD4 and ACEswitch are trademarks of Nortel Networks Inc in the United States and certain other countries Cisco and EtherChannel are registered trademarks of Cisco Systems Inc in the United States and certain other countries Check Point and FireWall 1 are trademarks or registered trademarks of Check Point Software Technologies Ltd Any other trademarks appearing in this manual are owned by their respective companies 2 Alteon Systems 212777 A February 2002 Contents Preface 21 Who Should Use This Guide 21 What You ll Find in This Guide 21 Typographic Conventions 23 Contacting Us 24 Part 1 Basic Switching amp Routing Chapter 1 Basic IP Routing 27 IP Routing Benefits 28 Routing Between IP Subnets 28 Example of Subnet Routing 31 Defining IP Address Ranges for the Local Route Cache 35 Border Gateway Protocol BGP 36 Internal Routing Versus External Routing 36 Forming BG
62. 284 m Chapter 11 High Availability Alteon e systems A February Web OS 10 0 Application Guide Stateful Failover Configuration Example After the VRRP setup perform the following additional steps to enable stateful failover on the switches On the Master Switch 1 Enable stateful failover gt gt cfg slb sync state ena 2 Set the update interval gt gt cfg slb sync update 10 The default is 30 On the Backup Switch 1 Turn on stateful failover gt gt cfg slb sync state ena 2 Set the update interval gt gt cfg slb sync update 10 The default is 30 NOTE The update does not have to be the same for both switches Stateful failover supports up to two peer switches Repeat the steps mentioned above to enable stateful failover on all the peer switches Alteon WebSystems Chapter 11 High Availability m 285 212777 A February 2002 Web OS 10 0 Application Guide Viewing Statistics on Persistent Port Sessions You can view Statistics on persistent port sessions using the stats slb ss1 command To determine which switch is the master and which is the backup use the info vrrp command If the switch is a master gt gt info vrrp VRRP information View VRRP Information Le vrid dy 17242116 187 if 4 renter prio 109 master server 3 vrid 3 192 168 1430 if 2 renter prio 109 master 5 vrid 5
63. Active FTP the FTP server initiates the data connection E In Passive FTP the FTP client initiates the data connection Because the client also ini tiates the connection to the control channel the passive FTP mode does not pose a prob lem with firewalls and is the most common mode of operation FTP Network Topology Restrictions FTP network topology restrictions are listed below E FTP uses both a control channel and a data channel both channels need to be bound to the same real server E The FTP server may initiate FTP data sessions E Information exchanged on the control channel is used to determine the IP address and port for data connections between the FTP server and the FTP client Configuring FTP Server Load Balancing 1 Make sure that a proxy IP address is enabled on the client port s or DAM is enabled 2 Make sure the virtual port for FTP is set up for the virtual server gt gt cefg slb virt lt virtual server number gt gt gt Virtual Server 1 service ftp 3 Enable FTP parsing gt gt Virtual Server 1 ftp Service ftpp ena 4 To make your configuration changes active enter apply at any prompt in the CLI gt gt Virtual Server 1 ftp Service apply NOTE You must apply any changes in order for them to take effect and you must save them if you wish them to remain in effect after switch reboot 150 m Chapter 6 Server Load Balancing Alteon 2 Systems A February
64. Add port 1 gt gt VLAN 2 stp Select STP menu gt gt VLAN 2 vlan3 Select VLAN 3 menu gt gt VLAN 3 add 8 Add port 8 gt gt VLAN 3 stp Select STP menu gt gt Enter Spanning Tree group index 1 16 2 Select group 2 gt gt Spanning Tree Group 2 add 2 Add VLAN 3 VLAN 3 is automatically removed from Spanning Tree group 1 and by default VLAN 2 remains in Spanning Tree group 1 NOTE Each instance of Spanning Tree group is enabled by default 56 Chapter 2 VLANs Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide 3 Configure the following on Web switch C Add port 8 to VLAN 3 and define Spanning Tree group 3 for VLAN 3 gt gt cfg vlan3 Select VLAN 3 menu gt gt VLAN 3 add 8 Add port 8 gt gt VLAN 3 stp Select STP menu gt gt Enter Spanning Tree group index 1 16 3 Select group 3 gt gt Spanning Tree Group 2 add 3 Add VLAN 3 VLAN 3 is automatically removed from Spanning Tree group 1 and by default VLAN 2 remains in Spanning Tree Group 1 NOTE Web switch D does not require any special configuration for multiple Spanning Trees because it configured for the default Spanning Tree group STG 1 only Alteon Systems Chapter 2 VLANs 57 212777 A February 2002 Web OS 10 0 Application Guide VLANs and Default Gateways Web OS allows you to assign different default gateways for each VLAN Y
65. Alteon WebSystems Chapter 15 Content Intelligent Switching 391 212777 A February 2002 Web OS 10 0 Application Guide Number of entries five ID SLB String any cont 1024 www abcdefg com cont 1024 www hijklm com cont 1024 www nopqrst com cont 1024 nA AeA U N Fe www uvwxyz com cont 1024 7 Add the defined string IDs to the real server using the following command gt gt cfg slb real 1 layer7 addlb 2 gt gt cfg slb real 2 layer7 addlb 3 gt gt cfg slb real 3 layer7 addlb 4 NOTE If you don t add a defined string or add the defined string any the server will han dle any request Layer 7 RTSP Load Balancing Earlier versions of Web OS supported hashing to bind a client s request to a real server for Layer 7 load balancing As a result all the real servers carried the same content In addition to hashing Web OS 10 0 allows you to segregate the requests based on the string pattern match the strings in the requests and direct the requests to the assigned servers For more information on RTSP refer to Real Time Streaming Protocol SLB on page 155 To configure RTSP load balancing using hash follow this procedure gt gt cfg slb virt 1 service 554 gt gt Virtual Server 1 rtsp Service rtspslb Enter new RTSP load balancing method hash pattern disabled hash 392 m Chapter 15 Content Intelligent Switching Alteon e Systems
66. Arao nN 7 Areal nN 7 0 0 0 0 N 7 0 0 0 1 N I 2 Summary 36 128 192 x to 36 128 254 x 7 Route ABR p S 10 10 7 0 24 gt 36 128 192 0 18 7 s Network _ 1 s Network 1 Figure 4 7 Summarizing Routes NOTE You can specify a range of addresses to prevent advertising by using the hide option In this example routes in the range 36 128 200 0 through 36 128 200 255 are kept private Follow this procedure to configure OSPF support as shown in Figure 4 7 1 Configure IP interfaces for each network which will be attached to OSPF areas gt gt cfg ip if 1 Select menu for IP interface 1 gt gt IP Interface 1 addr 10 10 7 1 Set IP address on backbone network gt gt IP Interface 1 ena Enable IP interface 1 gt gt IP Interface 1 if 2 Select menu for IP interface 2 gt gt IP Interface 2 addr 36 128 192 1 Set IP address on stub area network gt gt IP Interface 2 ena Enable IP interface 2 2 Enable OSPF gt gt IP Interface 2 cfg ip ospf on Enable OSPF on the Web switch 90 Chapter 4 OSPF Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide 3 Define the backbone gt gt Open Shortest Path First aindex 0 Select menu for area index 0 gt gt OSPF Area index 0 areaid 0 0 0 0 Set the ID for backbone area 0 gt gt OSPF Area index 0 type transit Define backbone as transit type gt
67. Assign an IP address or document the existing one for each real server router and cli ent workstation In the example topology in Figure 1 2 on page 30 the following IP addresses are used Table 1 1 Subnet Routing Example IP Address Assignments Subnet Devices IP Addresses 1 Primary and Secondary Default Routers 205 21 17 1 and 205 21 17 2 2 First Floor Client Workstations 100 20 10 1 254 3 Second Floor Client Workstations 131 15 15 1 254 4 Third Floor Client Workstations 208 31 177 1 254 5 Common Servers 206 30 15 1 254 2 Assign an IP interface for each subnet attached to the switch Since there are five IP subnets connected to the switch five IP interfaces are needed Table 1 2 Subnet Routing Example IP Interface Assignments Interface Devices IP Interface Address IF1 Primary and Secondary Default Routers 205 21 17 3 IF2 First Floor Client Workstations 100 20 10 16 IF3 Second Floor Client Workstations 131 15 15 1 IF4 Third Floor Client Workstations 208 31 177 2 IF5 Common Servers 206 30 15 200 Alteon WebSystems Chapter 1 Basic IP Routing 31 212777 A February 2002 Web OS 10 0 Application Guide IP interfaces are configured using the following commands at the CLI gt gt cfg ip if 1 Select IP interface 1 gt gt IP Interface 1 addr 205 21 17 3 Assign IP address for the interface gt gt IP Interface 1 ena Enable IP interface 1 gt gt IP Interface 1 if 2 Select IP in
68. Check Configure the switch to check a series of Web pages HTML or dynamic CGI scripts before it declares a real server is available to receive requests NOTE If you are using the CLI to create a health check script you must use quotes to indicate the beginning and end of each command string cfg slb group x health scriptl content none cfg slb adv scriptl open 80 send GET index html HTTP 1 1 r nHOST www hostname com r n r n expect HTTP 1 1 200 close open 80 send GET script cgi HTTP 1 1 r nHOST www hostname com r n r n expect HTTP 1 1 200 close open 443 close NOTE When you are using the command line interface to enter the send string as an argu ce 199 ment to the send command you must type two s before an n or r If you are instead prompted for the line that is the text string is entered after hitting lt return gt then only one V 6699 ce 99 is needed before the n or r Alteon WebSystems Chapter 10 Health Checking m 227 212777 A February 2002 Web OS 10 0 Application Guide 228 m Script Example 2 GSLB URL Health Check In earlier Web OS releases each remote Global Server Load Balancing site s virtual server IP address was required to be a real server of the local switch Each switch sends a health check request to the other switch s virtual servers that are configured on the local switch The
69. Configure IP interfaces on the primary clean side Web switch gt gt cfg ip if 1 gt gt mask 255 255 255 0 gt gt addr 10 10 4 10 gt gt vlan 4 gt gt ena gt gt Jif 2 gt gt mask 255 255 255 0 gt gt addr 10 10 3 1 gt gt vlan 3 gt gt ena gt gt Jif 3 gt gt mask 255 255 255 255 gt gt addr 10 10 3 2 gt gt vlan 3 gt gt ena 3 Turn STP off for the primary clean side Web switch gt gt cfg stp offt 334 m Chapter 13 Firewall Load Balancing Alteon e systems A February Web OS 10 0 Application Guide 4 Configure static routes on the primary clean side Web switch Four static routes are needed E To primary dirty side IF 2 via Firewall 1 using clean side IF 2 E To primary dirty side IF 3 via Firewall 2 using clean side IF 3 E To secondary dirty side IF 2 via Firewall 1 using clean side IF 2 E To secondary dirty side IF 3 via Firewall 2 using clean side IF 3 Again the static route add command uses the following format add lt destination address gt lt dest mask gt lt gateway address gt lt source interface gt This example requires the following static route configuration gt gt cfg ip frwd route gt gt add 10 10 2 1 255 255 255 255 10 10 3 3 2 gt gt add 10 10 2 2 255 255 255 255 10 10 3 4 3 gt gt add 10 10 2 11 255 255 255 255 10 10 3 3 2 gt gt add 10 10 2 12 255 255 255 255 10 10 3 4 3
70. Configure host routes Host routes are configured just like those on Web switch 1 except their costs are reversed Since virtual server 10 10 10 2 is preferred for Web switch 2 its host route has been given a low cost Because virtual server 10 10 10 1 is used as a backup in case Web switch 1 fails its host route has been given a high cost gt gt gt gt gt gt a gt gt gt gt ao gt gt gt gt gt gt OSPF OSPF OSPF OSPF OSPF OSPF OSPF OSPF OSPF OSPF Interface 2 ost ost ost ost ost ost ost ost ost En En Ent En En Ent En En En try try ry try try ry try try try NNNNRPRPRP RB host 1 addr 10 10 10 1 aindex 0 cost 100 enable host 2 addr 10 10 10 2 aindex 0 cost 1 enable Select menu for host route 1 Set IP address same as virtual server 1 Inject host route into backbone area Set high cost for use as backup path Enable the host route Select menu for host route 2 Set IP address same as virtual server 2 Inject host route into backbone area Set low cost for primary path Enable the host route 10 Apply and save the configuration changes gt gt OSPF Host Entry 2 apply gt gt OSPF Host Entry 2 save Global command to apply all changes Global command to save all changes Verifying OSPF Configuration Use the following commands to verify the OSPF configuration on your
71. DNS server that has the requested IP address information on hand or the request reaches one of the Foo Corporation s DNS servers 3 The Foo Corporation s California DNS has been configured to use the local Web switch with GSLB software as the authoritative name server for www foocorp com Alteon WebSystems Chapter 12 Global Server Load Balancing 291 212777 A February 2002 Web OS 10 0 Application Guide 4 The California Web switch responds to the DNS request listing the IP address with the current best service Each switch with GSLB software is capable of responding to the client s name resolution request Since each switch regularly checks and communicates health and performance infor mation with its peers either switch can determine which site s are best able to serve the cli ent s Web access needs It can respond with a list of IP addresses for the Foo Corporation s distributed sites which are prioritized by performance geography and other criteria In this case the California Web switch knows that Foo Corp Denver currently provides better service and lists Foo Corp Denver s virtual server IP address first when responding to the DNS request 5 The client connects to Foo Corp Denver for the best service The client s Web browser will use the IP address information obtained from the DNS request to open a connection to the best available site The IP addresses represent virtual servers at any site
72. February 2002 Web OS 10 0 Application Guide 3 Configure the clean side IP interface as if they were real servers on the dirty side Later in this procedure you ll configure one clean side IP interface on a different subnet for each firewall path being load balanced On the dirty side Web switch create two real servers using the IP address of each clean side IP interface used for FWLB gt gt IP Interface 3 cfg slb real 1 Select real server 1 gt gt Real server 1 rip 10 1 3 1 Assign clean side IF 2 address gt gt Real server 1 ena Enable real server 1 gt gt Real server 1 real 2 Select real server 2 gt gt Real server 2 rip 10 1 4 1 Assign clean side IF 3 address gt gt Real server 2 ena Enable real server 1 NOTE Each of the four interfaces used for FWLB two on each Web switch in this example must be configured for a different IP subnet 4 Place the IP interface real servers into a real server group gt gt Real server 2 cfg slb group 1 Select real server group 1 gt gt Real server group 1 add 1 Add real server I to group 1 gt gt Real server group 1 add 2 Add real server 2 to group 1 5 Set the health check type for the real server group to ICMP gt gt Real server group 1 health icmp Select ICMP as health check type 6 Set the load balancing metric for the real server group to hash gt gt Real server group 1 metric ha
73. Filter 1 The smallest area is assigned to Filter 4 Overlapping Filters Filters are permitted to overlap although special care should be taken to ensure the proper order of precedence When overlapping filters are present the more specific filters those that target fewer addresses or ports should be applied before the generalized filters Example Filtering by Destination IP Address Ranges 0 0 0 0 2 see se eee ee eee ee eee eee pe 255 255 255 255 Deny Redirect Allow Filter 3 Filter 2 Filter 1 Figure 7 2 Assigning Filters to Overlapping Ranges In this example Filter 2 must be processed prior to Filter 3 If Filter 3 was permitted to take precedence Filter 2 could never be triggered 172 m Chapter 7 Filtering Alteon 2 Systems A February Web OS 10 0 Application Guide The Default Filter Before filtering can be enabled on any given port a default filter should be configured This filter handles any traffic not covered by any other filter All the criteria in the default filter must be set to the full range possible any For example Filtering by Destination IP Address Ranges 00 0 0 sha oe bee eee ee ee ee ee p gt 255 255 255 255 Deny Allow Redirect Filter 224 Filter 2 Filter 1 Figure 7 3 Assigning a Default Filter In this example the default filter is defined as Filter 224 in order to give it the lowest order of precedence All matching criteria in Filt
74. High Availability m 275 212777 A February 2002 Web OS 10 0 Application Guide By reducing complexity to a single subnet and not requiring routing L3 hot standby can be used The key to hot standby is that the interswitch link the link between switches does NOT participate in STP so there are no loops in the topology see Figure 11 10 STP does not need to be enabled and the switch will have failover times similar to what would be the case with VRRP Configuration Procedure Configuration takes place after configuring SLB and VRRP with STP enabled 1 From the SLB menu enable a hot standby link on the Layer 4 ports then enable inter switch link on the crosslink gt gt Main cfg slb port 1 Select port 1 gt gt SLB Port 1 server ena Enable the server gt gt SLB Port 1 hotstan ena Enable hot standby gt gt SLB Port 1 port 3 Select port 3 gt gt SLB Port 3 intersw ena Enable inter switch processing gt gt SLB Port 3 port 7 Select port 7 gt gt SLB Port 7 client ena Enable the client gt gt SLB Port 7 hotstan ena Enable hot standby 2 From the VRRP menu enable VRRP group mode then enable hot standby gt gt Main cfg vrrp on Enable VRRP gt gt VRRP hotstan ena Enable hot standby gt gt VRRP group ena Enable VR group 3 Sync the VRRP SLB and filter settings to the other switch same ports gt gt Main oper slb syne
75. If IP interfaces are configured none should use the virtual server IP address described in Step 4 2 Define all filters required for your network configuration Filters may be configured on one switch and synchronized with settings on the other switch see Step 5 below 3 Configure all required SLB parameters on Web switch 1 For the purposes of this example assume that Web switch in Figure 11 8 is configured in this step Required Layer 4 parameters include a VIP 205 178 13 226 and one real server group with four real servers RIP 205 178 13 101 RIP 205 178 13 102 RIP 205 178 13 103 and RIP 205 178 13 104 4 Configure the VRRP parameters on Web switch 1 This configuration includes VRID 2 VIP 205 178 13 226 and the priority Enable tracking and set the parameters appropriately refer to Configuring the Switch for Tracking on page 280 Make sure to disable sharing 5 Synchronize the SLB and VRRP configurations by synchronizing the configuration from Web switch 1 to Web switch 2 Use the oper slb synch command see Synchronizing Configurations on page 282 6 Change the real servers in the Web switch 2 configuration to RIP 205 178 13 105 RIP 205 178 13 106 RIP 205 178 13 107 and RIP 205 178 13 108 Adjust Web switch 2 s priority see Configuring the Switch for Tracking on page 280 In this example with Web switch as the master if a link between Web switch 1 and a server
76. Match acknowledgments only 3 A filter that allows trusted HTTP traffic from the Internet to pass through the switch to the Web servers Ze gt gt oe gt gt gt gt gt gt gt gt gt gt gt gt Fil Fil Fil Fil Fil Fil Fil Fil Fil Cer L cer L Cer iL Cer L Ler 3 cer Lt Ler ot cer 4 Cer 4 Advanced cfg slb filt 16 Select a filter for incoming HTTP traffic sip any sport http proto tcp dip 203 122 186 0 dmask 255 255 255 0 dport http action allow ena From any source IP address From well known source HTTP port For TCP traffic To the Web servers IP address To the entire subnet range To well known destination HTTP port Allow matching traffic to pass Enable the filter 4 A filter that allows HTTP responses from the Web servers to pass through the switch to the Internet gt gt oo gt gt oS gt gt gt gt gt gt gt gt oF Fil Fil Fil Fil Fil Fil Fil Fil Fil cer L cer L cer 4 Ler 4 cer Cer l Cer 4 Cer 4 Cer L S ns ony ilt 17 sip 203 122 186 0 smask 255 255 255 0 sport http proto tcp dip any dport http action allow ena Select a filter for outgoing HTTP traffic From the Web servers source IP address From the entire subnet range From well known source HTTP port For TCP traffic To any destination IP address To well known destination
77. Network To use free metric FWLB in this network the following configuration changes are necessary 1 On the clean side Web switch enable RTS on the ports attached to firewalls ports 2 and 3 gt gt cfg slb port 2 rts enable gt gt port 3 rts enable 2 On the dirty side Web switch remove the redirection filter from the ports attached to the real servers ports 4 and 5 but make sure filter processing is enabled gt gt port 4 rem 224 gt gt ilt ena gt gt port 5 rem 224 gt gt filt ena 346 m Chapter 13 Firewall Load Balancing Alteon e Systems A February Web OS 10 0 Application Guide 3 On the dirty side Web switch set the FWLB metric gt gt group 1 gt gt metric lt metric type gt Any of the following load balancing metrics can be used hash leastconns roun drobin minmiss response and bandwidth See Metrics for Real Server Groups on page 131 for details on using each metric NOTE Some metrics allow other options such as weights to be configured Free Metric with Four Subnet FWLB For this example review the four subnet example network Dirty Side Clean Side Subnet 1 VLAN 1 Subnet 2 VLAN 2 Subnet 3 VLAN 3 Subnet 4 VLAN 4 195 1 1 0 24 10 10 2 0 24 10 10 3 0 24 10 10 4 0 24 Web Switch 3 Web Switch 1 IF1 10 10 4 10 IF1 195 1 1 10 Firewall 1 IF2 10 10 3 1 wo IF2 10 10 2 1 Dirty 10 10
78. O Variable length RADIUS secret password Supports less than 16 octets and up to 32 octets E The secret value is a field of up to 32 alphanumeric characters used by the switch to encrypt a password during the RSA Message Digest Algorithm MD5 and by the RADIUS server to decrypt the password during verification E The content option specifies the wsername password value that the server tries to match in its user database In addition to verifying the user name and password the data base may specify the client s or port s the user is allowed to access NOTE Network attached storage NAS is hard disk storage that is set up with its own net work address rather than being attached to the department computer that is serving applications to a network s workstation users By removing storage access and its management from the department server both application programming and files can be served faster because they are not competing for the same processor resources The network attached storage device is attached to a local area network typically an Ethernet network and assigned an IP address File requests are mapped by the main server to the NAS file server Configuring the Switch for RADIUS Server Content Health Checks The Alteon Web switch will provide the NAS IP parameter while performing RADIUS content health checks The switch uses the IP address of the IP interface that is on the same subnet as the RADIUS server or the defau
79. Precedence Lookup Protectors Example 415 Content Precedence Lookup Multiple Strings Example 416 Configuring Layer 7 Deny Filter 417 Cookie Based Persistence How It Works 424 Insert Cookie Mode 427 Passive Cookie Mode 428 Rewrite Cookie Mode 429 SSL Session ID Based Persistence 438 Figures m 15 Web OS 10 0 Application Guide Figure 17 1 Bandwidth Management How It Works 442 Figure 17 2 Bandwidth Rate Limits 444 Figure 17 3 Virtual Clocks and TDT 446 Figure 17 4 URL Based Bandwidth Management 450 Figure 17 5 URL Based Bandwidth Management with Web Cache Redirection 450 Figure 17 6 Cookie Based Bandwidth Management 451 Figure 17 7 Cookie Based Preferential Services 467 16 m Figures Alteon 2 Systems 212777 A February 2002 Tables Table 1 1 Table 1 2 Table 1 3 Table 1 4 Table 2 1 Table 2 2 Table 2 3 Table 5 1 Table 5 2 Table 6 1 Table 6 2 Table 6 3 Table 6 4 Table 7 1 Table 7 2 Table 7 3 Table 7 4 Table 7 5 Table 7 6 Table 8 1 Table 11 1 Table 11 2 Table 11 3 Alteon Z Systems 212777 A February 2002 Subnet Routing Example IP Address Assignments 31 Subnet Routing Example IP Interface Assignments 31 Subnet Routing Example Optional VLAN Ports 33 Local Routing Cache Address Ranges 35 Ports Trunk Groups and VLANs 49 Multiple Spanning Tree Groups per VLAN 54 Route Cache Example 59 User Access Levels 105 Web OS Alteon Levels 106 Web Host Example Real
80. RTSP is used to control the flow of these multimedia streams Each presentation uses one RTSP control connection and several other connections to carry the audio video text multimedia streams In this document the term RTSP server refers to any multimedia server that implements the RTSP protocol for multimedia presentation How RTSP Server Load Balancing Works The objective of RTSP server load balancing is to intelligently switch an RTSP request and the other media streams associated with a presentation to a suitable RTSP server based on the configured load balancing metric Web OS supports one Layer 7 metric URL hashing and URL pattern matching and all Layer 4 load balancing metrics RTSP load balancing with the URL hash metric can be used to load balance cache servers that cache multimedia presentations Since multimedia presentations consume a large amount of Internet bandwidth and their correct presentation depends upon the real time delivery of the data over the Internet several caching servers cache the multimedia data As a result the data is available quickly from the cache when required The Layer 7 metric of URL hashing directs all requests with the same URL to the same cache server ensuring that no data is duplicated across the cache servers Typically an RTSP client establishes a control connection to an RTSP server over TCP port 554 and the data flows over UDP or TCP For information on using RTSP with Web cache redi rection
81. Redirection filters are needed on all the ingress ports on the clean side Web switch Ingress ports are any that attach to real servers or internal clients on the clean side of the network In this case two real servers are attached to the clean side Web switch on port 4 and port 5 gt gt Filter 15 port 4 Select ingress port 4 gt gt SLB Port 4 add 10 Add the filter to the ingress port gt gt SLB Port 4 add 15 Add the filter to the ingress port gt gt SLB Port 4 filt ena Enable filtering on the port gt gt SLB Port 4 port 5 Select ingress port 5 gt gt SLB Port 5 add 10 Add the filter to the ingress port gt gt SLB Port 5 add 15 Add the filter to the ingress port gt gt SLB Port 5 filt ena Enable filtering on the port 16 Define static routes to the dirty side IP interfaces using the firewalls as gateways One static route is required for each firewall path being load balanced In this case two paths are required one that leads to dirty side IF 2 10 1 1 1 through the first firewall 10 1 3 10 as its gateway and one that leads to dirty side IF 3 10 1 2 1 through the second firewall 10 1 4 10 as its gateway gt gt SLB Port 5 cfg ip route gt gt IP Static Route add 10 1 1 1 255 255 255 255 10 1 3 10 gt gt IP Static Route add 10 1 2 1 255 255 255 255 10 1 4 10 NOTE Configuring static routes for FWLB does not require IP forwarding to be
82. Server IP Addresses 124 Web Host Example Port Usage 126 Well Known Application Ports 128 Proxy Example Port Usage 137 Well Known Protocol Types 171 Well Known Application Ports 171 Filtering IP Address Ranges 178 Web Cache Example Real Server IP Addresses 186 TCP Flags 197 ICMP Message Types 201 Web Cache Example Real Server IP Addresses 206 Active Standby Configuration 252 Sharing Active Active Failover 260 VRRP Tracking Parameters 261 17 Web OS 10 0 Application Guide 18 m Tables Table 12 1 Table 12 2 Table 12 3 Table 12 4 Table 12 5 Table 15 1 Table 15 2 Table 16 1 Table 17 1 Table 17 2 GSLB Example California Real Server IP Addresses 296 GSLB Example California Alteon 180 Port Usage 297 Denver Real Server IP Addresses 300 Web Host Example Alteon 180 Port Usage 301 HTTP Versus Non HTTP Redirects 305 Standard Regular Expression Special Characters 412 Real Server Content 416 Comparison Among the Three Cookie Modes 427 Bandwidth Rate Limits 445 Bandwidth Policy Limits 445 Alteon Z Systems 212777 A February 2002 New Features The following table lists the new features in Web OS 10 0 and the supported platforms Feature Alteon Web Switches Alteon Web Switches AD3 180e AD4 184 Vlan based default gateway No Yes Vlan Filtering No Yes Multiple Instances of Spanning Tree Yes Yes Layer 7 deny filter Yes Yes Inc
83. Service Provider ISP The Web content is relatively static and is kept on a single NFS server for easy administration As the customer base increases the num ber of simultaneous Web connection requests also increases Web Server As clients increase the server becomes overloaded a0 a0 a0 ar a Web Clients NFS Server Internet Web Host Router Figure 6 2 Web Hosting Configuration Without SLB Such a company has three primary needs E Increased server availability E Server performance scalable to match new customer demands E Easy administration of network and servers Web Clients Layer 4 Switching amp Web Server Farm Server Load Balancing Ea Switch gt CC ar Web Host Routers Layer 2 Layer 2 Switching Switching NFS Server Figure 6 3 Web Hosting with SLB Solutions Alteon WebSystems Chapter 6 Server Load Balancing m 121 212777 A February 2002 Web OS 10 0 Application Guide All of the above issues can be addressed by adding an Alteon Web switch with SLB software Reliability is increased by providing multiple paths from the clients to the Web switch and by accessing a pool of servers with identical content If one server fails the others can take up the additional load Performance is improved by balancing the Web request load across multiple servers More servers can be added at any time to increase processing power For ease of maintenance servers can be added or removed d
84. Systems 212777 A February 2002 Web OS 10 0 Application Guide IP Proxy Addresses for NAT Transparent proxies provide the benefits listed below when used with application redirection Application redirection is automatically enabled when a filter with the redir action is applied on a port E With proxies IP addresses configured on redirected ports the Web switch can redirect cli ent requests to servers located on any subnet anywhere E The Web switch can perform transparent substitution for all source and destination addresses including destination port remapping This provides support for comprehen sive fully transparent proxies These proxies are transparent to the user No additional cli ent configuration is needed The following procedure can be used for configuring proxy IP addresses 1 Add proxy IP addresses to the redirection ports Each of the ports using redirection filters require proxy IP addresses to be configured Each proxy IP address must be unique on your network These are configured as follows gt gt SLB port 3 cfg slb port 5 Select network port 5 gt gt SLB port 5 pip 200 200 200 68 Set proxy IP address for port 5 gt gt SLB port 5 proxy ena Enable proxy port 5 gt gt SLB port 5 port 6 Select network port 6 gt gt SLB port 6 pip 200 200 200 69 Set proxy IP address for port 6 gt gt SLB port 6 proxy ena Enable proxy port 6 2 If VMA is enabled add pr
85. Turn off BOOTP Web OS 10 0 Application Guide gt gt cfg sys bootp dis 2 Define and enable VLAN 2 for ports 7 and 8 gt gt cfg vlan 2 ena def 7 8 3 Turn off Spanning Tree Protocol STP gt gt cfg stp offt 4 Define the clean side IP interfaces Create one clean side IP interface on a different subnet for each VPN device being load bal anced oo gt gt gt gt gt gt gt gt oS gt gt gt gt gt gt gt gt gt gt IP IP IP IP TE IP LP IP IP IP IP In In In In In In In In In In In gt gt efg ip if terface terface terface terface terface terface terface terface terface terface terface 1 ena 1 mask 255 255 255 0 1 addr 30 0 0 10 1 vlan 1 1 if 2 ena 2 mask 255 255 255 0 2 addr 20 0 0 10 2 vlan 2 2 if 3 ena 3 mask 255 255 255 255 3 addr 20 0 0 11 3 vlan 2 Select IP interface 1 and enable Set subnet mask for interface 1 Set IP address for interface 1 For VLAN 1 Select IP interface 2 and enable Set subnet mask for interface 2 Set IP address for interface 2 For VLAN 2 Select IP interface 3 and enable Set subnet mask for interface 3 Set IP address for interface 3 For VLAN 2 5 Configure routes for each of the IP interfaces you configured in Step 4 using the VPN devices as gateways Alteon Z Systems 2127
86. Under Max Length Virtual server hostname hname cfg slb virt service 9 characters Domain name dname cfg slb virt 35 characters Server group health check field content cf g slb group 34 characters If the HOST header is required an HTTP 1 1 GET will occur Otherwise an HTTP 1 0 GET will occur HTTP health check is successful if you get a return code of 200 Example 1 hname everest dname alteonwebsystems com content index html Health check is performed using GET index html HTTP 1 1 Host everest alteonwebsystems com NOTE If the content is not specified the health check will revert back to TCP on the port that is being load balanced Example 2 hname none dname raleighduram cityguru com content page gen _template alteon Health check is performed using GET page gen _template alteon HTTP 1 1 Host raleighduram cityguru com Example 3 hname none dname Jansus content index html Alteon WebSystems Chapter 10 Health Checking 231 212777 A February 2002 Web OS 10 0 Application Guide Health check is performed using GET index html HTTP 1 1 Host jansus Example 4 hname none dname none content index html Health check is performed using GET index html HTTP 1 0 since no HTTP HOST header is required Example 5 hname none dname none content everest index html Health check is performed using GET index html HTT
87. Web OS 10 0 Application Guide The following procedure explains the three way handshake between the two sites and the cli ent for a non HTTP application POP3 When POP3 processes at Site 1 terminate because of operator error the following events occur to allow POP3 requests to be fulfilled 1 A user POP3 TCP SYN request is received by the virtual server at Site 1 The switch at that site determines that there are no local resources to handle the request 2 The Site 1 switch rewrites the request such that it now contains a client proxy IP address as the source IP address and the virtual server IP address at Site 2 as the destination IP address 3 The switch at Site 2 receives the POP3 TCP SYN request to its virtual server The request looks like a normal SYN frame so it performs normal local load balancing 4 Internally at Site 2 the switch and the real servers exchange information The TCP SYN ACK from Site 2 s local real server is sent back to the IP address specified by the proxy IP address 5 The Site 2 switch sends the TCP SYN ACK frame to Site 1 with Site 2 s virtual server IP address as the source IP address and Site 1 s proxy IP address as the destination IP address 6 The switch at Site 1 receives the frame and translates it using Site 1 s virtual server IP address as the source IP address and the client s IP address as the destination IP address This cycle continues for the remaining frames to transmit all
88. When using DNS to select the site a single packet is used to make the decision so that the request will not be split to different locations Through the response to the DNS packet a client is locked in to a particular site resulting in efficient consistent service that cannot be achieved when the content itself is shared For example in multi homing you can connect a data center to three different Internet provid ers and have one DNS server that has the IP address 1 1 1 1 In this case all requests can be received via any given feed but are funneled to the same server on the local network In BGP based GSLB the DNS server with the IP address 1 1 1 1 is duplicated and placed local to the peering point instead of having a local network direct traffic to one server When a particular DNS server receives a request for a record in this case the Web switch it returns with the IP address of a virtual server at the same site This can be achieved using the local option cf g slb gslb local ena in the GSLB configuration If one site is saturated then the switch will failover and deliver the IP address of a more available site For more information on configuring your switch to support BGP routing see Border Gate way Protocol BGP on page 36 312 m Chapter 12 Global Server Load Balancing Alteon 2 Systems A February CHAPTER 13 Firewall Load Balancing Firewall Load Balancing FWLB with Alteon Web switches allows multipl
89. a VPN Gateway or other compatible VPN Gateway you will not see load balancing across those clients Each SecuRemote client will be treated differ ently but each VPN 1 Gateway will be treated as one client each that is one Client IP address VPN Device 1 and VPN Device 2 belong to one cluster IP 370 m Chapter 14 Virtual Private Network Load Balancing Alteon WebSystems 212777 A February 2002 CHAPTER 15 Content Intelligent Switching This chapter discusses advanced load balancing solutions utilizing Layer 7 content switching Inspecting HTTP headers examining content identifiers such as URLs and cookies and pars ing content requests are discussed in the following topics Overview on page 372 Content Intelligent Server Load Balancing on page 375 Content Intelligent Web Cache Redirection on page 394 Regular Expression Matching on page 412 a a a E Exclusionary String Matching for Real Servers on page 410 a E Content Precedence Lookup on page 414 a Layer 7 Deny Filter on page 417 NOTE Direct Access Mode DAM must be enabled or configure a proxy IP address on all switch ports except port 9 for all content intelligent switching features Alteon Systems 371 212777 A February 2002 Web OS 10 0 Application Guide Overview Alteon Web switches performs content intelligent switching by processing numerous tasks for each incoming session including connect
90. a switch port to filter Add the filter to the switch port Enable filtering on the switch port Apply the configuration changes Save the configuration changes When applied to one or more switch ports this simple filter rule will produce log messages that show when the filter is triggered and what the IP source and destination addresses were for the ICMP frames traversing those ports Example Filter log message output is shown below displaying the filter number port source IP address and destination IP address slb filter 15 fired on port 7 206 118 93 110 gt 20 10 1 10 Alteon Z Systems 212777 A February 2002 Chapter 7 Filtering m 177 Web OS 10 0 Application Guide IP Address Ranges You can specify a range of IP addresses for filtering both the source and or destination IP address for traffic When a range of IP addresses is needed the source IP sip address or des tination IP dip address defines the base IP address in the desired range The source mask smask or destination mask dmask is the mask that is applied to produce the range For example to determine if a client request s destination IP address should be redirected to the cache servers attached to a particular switch the destination IP address is masked bit wise AND with the dmask and then compared to the destination IP address As another example the switch could be configured with two filters so that each w
91. add test gt gt Server Loadbalance Resource add images gt gt Server Loadbalance Resource add product 3 Apply and save the configuration 4 Identify the IDs of the defined strings gt gt Server Loadbalance Resource cur Number of entries three ID SLB String 1 any 2 test 3 images 4 product 5 Assign the URL string ID to the real server gt gt Real Server 1 Layer 7 commands addlb 2 gt gt Real Server 1 Layer 7 commands addlb 3 gt gt Real Server 1 Layer 7 commands addlb 4 6 Enable the exclusionary string matching option gt gt Real Server 1 Layer 7 commands exclude enable If you configured a string any and enabled the exclusion option the server will not handle any requests This has the same effect as disabling the server Alteon WebSystems Chapter 15 Content Intelligent Switching m 411 212777 A February 2002 Web OS 10 0 Application Guide Regular Expression Matching Regular expressions are used to describe patterns for string matching They enable you to match the exact string such as URLs host names or IP addresses It is a powerful and effec tive way to express complex rules for Layer 7 string matching Both Layer 7 HTTP SLB and Web Cache Redirection can use regular expressions as a resource Configuring for regular expressions can enhance content based switching in the following areas HTTP header
92. address such as 224 0 0 18 With VRRP one switch is considered the master and the other the backup The master is always advertising via the broadcasts The backup switch is always listening for the broad casts Should the master stop advertising the backup will take over ownership of the VRRP IP and MAC addresses as defined by the specification The switch announces this change in ownership to the devices around it by way of a Gratuitous ARP and advertise ments If the backup switch didnt do the Gratuitous ARP the Layer 2 devices attached to the switch would not know that the MAC address had moved in the network For a more detailed description refer to RFC 2338 A VRRP address that is a shared Virtual Server IP address VSR is Web OS proprietary extension to the VRRP specification The switches must be able to share Virtual Server IP addresses as well as IP interfaces If they didn t the two switches would fight for owner ship of the Virtual Server IP address and the ARP tables in the devices around them would have two ARP entries with the same IP address but different MAC addresses Glossary m 473 Web OS 10 0 Application Guide 474 m Glossary Alteon Systems 212777 A February 2002 Index Symbols i E E EE EEE EEN ES E E EN 23 Numerics BO WORE EE AAPEEE E AEE E E E 295 802 1Q VLAN tagging eeeeerreereeeeee 44 45 A active cookie mode esesseeesseesrreesrerrerersreresses 429 active active redundancy
93. addressed to a virtual server IP address on a virtual server defined on the switch Clients acquire the virtual server IP address through normal DNS resolution In this example HTTP is configured as the only service running on this virtual server and this service is associated with the real server group For example gt gt oe gt gt gt gt gt gt Real server group 1 cfg slb virt 1 Select virtual server 1 Virtual server 1 vip 200 200 200 1 Assign a virtual server IP address Virtual server 1 ena Enable the virtual server Virtual server 1 service http Select the HTTP service menu Virtual server 1 http Service group 1 Associate virtual port to real group NOTE This configuration is not limited to HTTP Web service Other TCP IP services can be configured in a similar fashion For a list of other well known services and ports see Well Known Application Ports on page 128 To configure multiple services see Configuring Mul tiple Services on page 130 6 Define the port settings In this example the following ports are being used on the Web switch Table 6 2 Web Host Example Port Usage Port Host L4 Processing 1 Server A serves SLB requests Server 2 Server B serves SLB requests Server 3 Server C serves SLB requests Server 4 Back end NFS server provides centralized Web content for all three None real servers This port does not require Web switching features 5 Clien
94. area Set high cost for use as backup path Enable the host route 13 Apply and save the configuration changes gt gt OSPF Host Entry 2 apply gt gt OSPF Host Entry 2 save Global command to apply all changes Global command to save all changes Alteon Z Systems 212777 A February 2002 Chapter 4 OSPF m 95 Web OS 10 0 Application Guide Configuring OSPF for Host Routes on Web Switch 2 1 Configure basic SLB parameters Web switch 2 is connected to two real servers Each real server is given an IP address and is placed in the same real server group 2 gt gt gt gt gt gt gt gt 2S gt gt gt gt gt gt gt gt ie cfg slb real 1 Real Real Real Real Real Real Real Real Real Real server server server server server server server server server server 1 NNN FH Se OE OSE rip 100 100 100 27 enable real 2 rip 100 100 10 28 enable group 1 group 1 add 1 group 1 add 2 group 1 enable group 1 on Select menu for real server 1 Set the IP address for real server 1 Enable the real server Select menu for real server 2 Set the IP address for real server 2 Enable the real server Select menu for real server group 1 Add real server 1 to group Add real server 2 to group Enable the group Turn SLB on 2 Configure the virtual server parameters The same virtua
95. as the packet traverses from the dirty side switches to clean side switches and back To support VPN load balancing the Alteon Web switch records state on frames entering the switch to and from the VPNs This session table ensures that the same VPN server handles all the traffic between an inside host and an outside client for a particular session NOTE VPN load balancing is supported for connecting from remote sites to the network behind the VPN cluster IP address Connection initiated from clients internal to the VPN gate ways is not supported Basic frame flow from the dirty side of the network to the clean side is shown in Figure 5 1 An external client is accessing an internal server No Network Address Translation NAT is performed by the VPN devices 354 m Chapter 14 Virtual Private Network Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide a SMAC DMAC SIP DIP AEN DAAA aD X1 CAMAC 1D MAC xA cA Dz E10 I gt Encryptedc 10553 D 10 ES F 10 A D 1 Internet es gt aay APETA a Zg sie DIP Sea a SMAC DMAC sip DIP D Pome ome 02 Jen SMAC DMAC SIP DIP ome fmc oz en SMAC DMAC SIP__DIP amp a Ope Frome xa Ter J o2 jem Encrypted D 2 Client IP address X 1 IP address use by the VPN client SW E 10 IP address of the server C1 Cluster IP address of the VPN devices Figure 14 1 Basic Network Frame Flow and Operation The basic s
96. based health check mechanism where customized WSP pack ets can be sent to the gateways and the switch can verify the expected response in a manner similar to scriptable health checks The content of the WSP UDP packet that is sent to the gateway can be configured as a hexa decimal string which is encapsulated in a UDP packet and shipped to the server Hence this byte string should include all applicable WSP headers The content that the switch expects to receive from the gateway is also specified in the form of hexadecimal byte string The switch matches each byte of this string with the received content If there is a mismatch of even a single byte on the received content the gateway fails the health check The user can also configure an offset for the received WSP packet a byte index to the WSP response content from where the byte match can be performed Configuring the Switch for WSP Content Health Checks 1 Select the WAP Health Check Menu gt gt cfg slb adv waphe 2 Use the sndcnt command to enter the content to be sent to the WSP gateway gt gt WAP Health Check sndent Current Send content Enter new Send content 01 42 15 68 74 74 70 3a 2f 77 77 77 2e 6e 6f 6b 61 6d 00 3 Enter the content that the switch expects to receive from the WSP gateway gt gt WAP Health Check revent Current Receive content Enter new Receive content 01 04 60 Oe 03 94 NOTE A ma
97. because extra apply and save commands are usually required after a put cfg however an SCP session is not in an interactive mode at all 108 Chapter 5 Secure Switch Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide RSA Host and Server Keys To support the SSH server feature two sets of RSA keys host and server keys are required The host key is 1024 bits and is used to identify the Web switch The server key is 768 bits and is used to make it impossible to decipher a captured session by breaking into the Web switch at a later time When the SSH server is first enabled and applied the switch will automatically generate the host and server keys and will then store them into the FLASH memory NOTE The Web switch will perform only one session of key cipher generation at a time Thus an SSH SCP client will not be able to log in if the switch is performing key generation at that time or if another client has logged in immediately prior Also key generation will fail if an SSH SCP client is logging in at that time E To generate a host key gt gt cfg sys sshd hkeygen E To generate a server key gt gt cfg sys sshd skeygen Again the host and server key are automatically stored in FLASH memory when generated NOTE For security reasons the SSHD menu options are available via the console port only and not via Telnet SNMP or the Browser Based
98. can be given a precedence value from 1 256 The higher the number the higher the precedence If a frame is applicable to different classifications then the contract with higher precedence will be assigned to the frame If the precedence is the same for the applica ble contracts then the following order will be used to assign the contract to the frame 1 Incoming port 2 VLAN 3 Filter 4 Service on the Virtual server 5 URL Cookie gt gt BWM Contract 1 prec 1 Sets contract precedence value to 1 Alteon WebSystems Chapter 17 Bandwidth Management m 455 212777 A February 2002 Web OS 10 0 Application Guide 9 10 11 12 13 14 15 Optional Enable TOS overwriting for the BWM contract gt gt BWM Contract 1 wtos ena Enables overwriting for contract Set the bandwidth policy for this contract Each bandwidth management contract must be assigned a bandwidth policy gt gt BWM Contract 1 pol 1 Assign policy 1 to BWM contract 1 Enable the BWM contract gt gt BWM Contract 1 ena Enables this BWM contract Classify the frames for this contract and assign the BWM contract to the filter Each BWM contract must be assigned a classification policy The classification can be based on a filter or service s on the Virtual server Filters are used to create classification policies based on the IP source address IP destination address TCP port
99. cer L Ler 1 cer L Ler 4 cer 1 Ler 1 cer L Ler tL ter 10 NNN NF FP FB action nat nat source sip 10 10 10 0 smask 255 255 255 0 dip 205 178 13 0 dmask 255 255 255 0 ena adv proxy disable Advanced cfg slb filt 11 action nat nat dest sip 10 10 10 0 smask 255 255 255 0 dip 205 178 13 0 dmask 255 255 255 0 ena adv proxy disable Advanced cfg slb port 1 add 10 filt enable port 2 add 11 filt enable apply save Select the menu for outbound filter Perform NAT on matching traffic Translate source information From the clients private IP address For the entire private subnet range To the public network address For the same subnet range Enable the filter Override any proxy IP settings Select the menu for inbound filter Use the same settings as outbound Reverse the translation direction Use the same settings as outbound Use the same settings as outbound Use the same settings as outbound Use the same settings as outbound Enable the filter Override any proxy IP settings Select server side port Add the outbound filter Enable filtering on port 1 Select the client side port Add the inbound filter Enable filtering on port 2 Apply configuration changes Save configuration changes 192 m Chapter 7 Filtering Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide Note the following important points about thi
100. configuration and identification each defined string has an ID attached as shown in the following example Number of entries six ID SLB String 1 any 2 gif 3 sales 4 xitami 5 manual 6 jpg 7 Configure the real server s to support WCR NOTE If you don t add a defined string or add the defined string any the server will han dle any request Add the defined string s to the real servers gt gt cfg slb real 2 layer7 addlb lt ID gt where ZD is the identification number of the defined string 3 66 The server can have multiple defined strings For example images sales gif With these defined strings the server can handle requests that begin with images or sales and any requests that contain gif 8 Define a real server group and add real servers to the group The following configuration combines three real servers into a group gt gt cfg slb group 1 Select real server group 1 gt gt Real server group 1 add 1 Add real server I to group 1 gt gt Real server group 1 add 2 Add real server 2 to group 1 gt gt Real server group 1 add 3 Add real server 3 to group 1 400 Chapter 15 Content Intelligent Switching Alteon 2bSystems 212777 A February 2002 Web OS 10 0 Application Guide 9 Configure a filter to support basic WCR The filter must be able to intercept all TCP traffic for t
101. configures and manages Web servers and other Internet services and their loads In addition to SLB Operator functions the SLB Administrator can configure param eters on the SLB menus with the exception of not being able to configure filters or bandwidth management slbadmin Layer 4 Administrator The Layer 4 Administrator configures and manages traffic on the lines leading to the shared Internet services In addition to SLB Administrator functions the Layer 4 Administrator can config ure all parameters on the SLB menus including filters and band width management 14admin Administrator The super user Administrator has complete access to all menus information and configuration commands on the switch includ ing the ability to change both the user and administrator pass words admin Alteon Z Systems 212777 A February 2002 Chapter 5 Secure Switch Management m 105 Web OS 10 0 Application Guide When the user logs in the switch authenticates his her level of access by sending the RADIUS access request that is the client authentication request to the RADIUS authentication server If the remote user is successfully authenticated by the authentication server the switch will verify the privileges of the remote user and authorize the appropriate access When both the primary and secondary authentication servers are not reachable the administrator has an option to allow backdoor access via the console only
102. congestion dur ing peak loads by accessing locally cached information This section also discusses how performance is improved by balancing cached Web requests across multiple servers Web Cache Configuration Example on page 206 This section provides a step by step procedure on how to intercept all Internet bound HTTP requests on default TCP port 80 and redirect them to the Web cache servers RTSP Web Cache Redirection on page 211 This section explains how to configure the switch to redirect data multimedia presentations to the cache servers and how to balance the load among the cache servers IP Proxy Addresses for NAT on page 213 This section discusses the benefits of trans parent proxies when used with application redirection Excluding Noncacheable Sites on page 215 This section describes how to filter out applications that keep real time session information from being redirected to cache serv ers NOTE To access Application Redirection functionality the optional Layer 4 software must be enabled on the Web switch see Filtering and Layer 4 in Chapter 8 of the Web OS Com mand Reference Alteon Z Systems 203 212777 A February 2002 Web OS 10 0 Application Guide Overview Most of the information downloaded from the Internet is not unique as clients will often access the Web page many times for additional information or to explore other links Duplicate information also gets
103. cost route load balancing Using OSPF to forward multicast routes Configuring OSPF on non broadcast multi access networks such as frame relay X 25 and ATM 82 m Chapter 4 OSPF Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide OSPF Configuration Examples A summary of the basic steps for configuring OSPF on the Web switch is listed here Detailed instructions for each of the steps is covered in the following sections 1 Configure IP interfaces One IP interface is required for each desired network range of IP addresses being assigned to an OSPF area on the Web switch 2 Optional Configure the router ID The router ID is required only when configuring virtual links on the Web switch 3 Enable OSPF on the switch 4 Define the OSPF areas 5 Configure OSPF interface parameters IP interfaces are used for attaching networks to the various areas 6 Optional Configure route summarization between OSPF areas 7 Optional Configure virtual links 8 Optional Configure host routes Alteon Z Systems Chapter 4 OSPF 83 212777 A February 2002 Web OS 10 0 Application Guide Example 1 Simple OSPF Domain In this example two OSPF areas are defined one area is the backbone and the other is a stub area A stub area does not allow advertisements of external routes thus reducing the size of the database Instead a default summary route of IP address 0 0 0 0 is automatically inserted in
104. deploying Internet traffic control devices such as Web switches in redundant configurations Traditionally these configurations have been hot standby configurations where one switch is active and the other is in a standby mode A non VRRP hot standby con figuration is shown in the figure below Intranet Clients Primary Web Switch Active Links Intranet Servers IP 200 200 200 100 Inter switch Link XN r a ao eee a Client Switches 5 Xe a Secondary Web Switch a i IP 200 200 200 101 Backup Links NFS Server Figure 11 3 A Non VRRP Hot Standby Configuration While hot standby configurations increase site availability by removing single points of fail ure service providers increasingly view them as an inefficient use of network resources because one functional Web switch sits by idly until a failure calls it into action Service pro viders now demand that vendors equipment support redundant configurations where all devices can process traffic when they are healthy increasing site throughput and decreasing user response times when no device has failed Web OS high availability configurations are based on VRRP The Web OS implementation of VRRP includes proprietary extensions to accommodate Layer 4 though Layer 7 Web switching features The Web OS implementation of VRRP supports three modes of high availability E Active Standby E Active Active E Hot Standby The first mode active standby
105. devices have become indispensable for protecting network resources from unautho rized access Prior to FWLB however firewalls could become critical bottlenecks or single points of failure for your network As an example consider the following network Dirty Public Network Firewall Clean Private Network 5 EEr sa O O O Private Internet Nenvark DMZ Figure 13 1 Typical Firewall Configuration Before FWLB One network interface card on the firewall is connected to the public side of the network often to an Internet router This is known as the dirty or untrusted side of the firewall Another net work interface card on the firewall is connected to the side of the network with the resources that must be protected This is known as the clean or trusted side of the firewall In this simple example all traffic passing between the dirty clean and DMZ networks must traverse the firewall which examines each individual packet The firewall is configured with a detailed set of rules that determine which types of traffic are allowed and which types are denied Heavy traffic can turn the firewall into a serious bottleneck The firewall is also a sin gle point of failure device If it goes out of service external clients can no longer reach your services and internal clients can no longer reach the Internet Sometimes a Demilitarized Zone DMZ is attached to the firewall or between the Internet and the firewall Typically a D
106. do an ACE Server client proxy The pass word is the PIN number plus the token code of the SecurID card 104 m Chapter 5 Secure Switch Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Web Switch User Accounts The user accounts listed in Table 5 1 can be defined in the RADIUS server dictionary file Table 5 1 User Access Levels User Account Description and Tasks Performed Password User The User has no direct responsibility for switch management He she can view all switch status information and statistics but cannot make any configuration changes to the switch user SLB Operator The SLB Operator manages Web servers and other Internet ser vices and their loads In addition to being able to view all switch information and statistics the SLB Operator can enable disable servers using the SLB operation menu slboper Layer 4 Operator The Layer 4 Operator manages traffic on the lines leading to the shared Internet services This user currently has the same access level as the SLB operator This level is reserved for future use to provide access to operational commands for operators managing traffic on the line leading to the shared Internet services 14oper Operator The Operator manages all functions of the switch In addition to SLB Operator functions the Operator can reset ports or the entire switch oper SLB Administrator The SLB Administrator
107. e ANAE ESKERA 82 hostname for HTTP health checks 231 299 hot standby redundancy ssesessseeeeesseeeeeeees 256 CONFIQUIATION 0 eeeeeeeeeseeeeeeeeeeeeeeeeeeeeees 275 Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide HTTP application health checks esceeeesseeeeeees 231 redirects Global SLB option 006 292 HTTP header HASHING secssseccscesisendcsessssvebbaceseesesdes Gooessceess HTTP URL request ve HTTPS SSL health checks ccscceeceeeeesteeees 240 ICMP oeiee eeen sencoheeconaceaevesongectnees 171 IEEE 802 1Q VLAN tagging csssssessssseessseeeeee 45 IF See IP interfaces IGMP seeen ere SEE OEEO 171 IMAP server health checks ccccccccecceeeeeeeees 237 TASK cee sea EE E 129 ingress ttaffiC 3 s asvecssviecivassivendoonessstesoadetecsneess 354 insert cookie mode cccesessececeeessseceeecesenseeeees 427 expiration tiMer eeeeeeeeeeeeeerererrrrererrrreee 432 internal routing sseeeseeeereesreesreresrrrerrrersreere 36 73 Internet Service Provider ISP SLB example 121 inter switch port states for hot standby redundancy 257 Intrusion Detection System IDS eeeeeeee 163 load balancing Metrics eseeeeeeeseeeeeeeeeees 164 IP address CONSETVALON vi ps cscecectvenscosescevesveveszetsuaseoeses filter TANGES pens wcdscvcecsineseveesiessceconneseses local route cache ranges
108. elimination of logical loops will not isolate any VLAN Figure 2 5 shows the same four switch topology as in Figure 2 4 on page 52 but with multiple Spanning Trees enabled The VLANs are identified on each of the three shaded areas connect ing the switches The port numbers are shown next to each switch The Spanning Tree Group STG number for each VLAN is shown at the switch Web Switch A Web Switch D Web Switch C Figure 2 5 Implementing Multiple Spanning Tree Groups Three instances of Spanning Tree are configured in the example shown in Figure 2 5 Refer to Table 2 2 on page 54 to identify the Spanning Tree group a VLAN is participating in for each switch Alteon Z Systems Chapter 2 VLANs 53 212777 A February 2002 Web OS 10 0 Application Guide Table 2 2 Multiple Spanning Tree Groups per VLAN VLAN 1 VLAN 2 VLAN 3 Web Switch A Spanning Tree Group 1 Spanning Tree Group 2 Ports 1 and 2 Port 8 Web Switch B Spanning Tree Group 1 Spanning Tree Group 2 Port 1 Port 8 Web Switch C Spanning Tree Group 1 Spanning Tree Group 2 Ports 1 and 2 Port 8 Web Switch D Spanning Tree Group 1 Ports 1 and 8 Switch Centric Spanning Tree Protocol In Figure 2 5 on page 53 VLAN 2 is shared by Web switch A and B on ports 8 and 1 respec tively Web switch A identifies VLAN 2 in Spanning Tree group 2 and Web switch B identifies VLAN 2 in Spanning Tree group 1 Spanning Tree group is switch centric it is used to iden
109. ena Enable real server 1 gt gt Real server 1 real 2 Select real server 2 gt gt Real server 2 rip 10 1 2 1 Assign dirty side IF 2 address gt gt Real server 2 ena Enable real server 2 NOTE Each of the four IP interfaces two on each Web switch in this example must be con figured for a different IP subnet 3 Place the real servers into a real server group gt gt Real server 2 group 1 Select real server group 1 gt gt Real server group 1 add 1 Select real server 1 to group 1 gt gt Real server group 1 add 2 Select real server 2 to group 1 322 m Chapter 13 Firewall Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide 4 Set the health check type for the real server group to ICMP gt gt Real server group 1 health icmp Select ICMP as health check type 5 Set the load balancing metric for the real server group to hash gt gt Real server group 1 metric hash Select SLB hash metric for group 1 NOTE The clean side Web switch must use the same metric as defined on the dirty side 6 Enable server load balancing on the switch gt gt Real server group 1 cfg slb on 7 Configure ports 2 and 3 which are connected to the clean side of the firewalls for client processing gt gt Real server group 1 port 2 client ena Enable client processing on port 2
110. fails the server will fail health checks and be taken out of the load balancing algorithm If track ing is enabled and is configured to take into account the number of healthy real servers for the Virtual Router s VIP address Web switch 1 s priority will be reduced If it is reduced to a value lower than Web switch 2 s priority then Web switch 2 will assume the role of master In this case all active connections serviced by Web switch 1 s virtual server IP address are severed If the link between Web switch 1 and its Internet router fails the protocol used to distribute traffic between the routers for example Open Shortest Path First OSPF will reroute traffic to the other router Web switch 2 backup will act as a Layer 2 3 switch and forward all traffic destined to the virtual server IP address to Web switch 1 If the entire Web switch master fails the protocol used to distribute traffic between the routers such as OSPF will reroute traffic to Web switch 2 Web switch 2 backup detects that the master has failed because it will stop receiving advertisements The backup then assumes the master s responsibility of responding to ARP requests and issuing advertisements 264 m Chapter 11 High Availability Alteon 2 Systems A February Web OS 10 0 Application Guide Active Active VIR and VSR Configuration Figure 11 9 two Alteon Web switches are used as VRRP routers in an active active configura tion implementing a virtual
111. for Client Server Port Configuration 123 Basic Virtual Port to Real Port Mapping Configuration 140 Direct Server Return 143 Mapped and Nonmapped Server Access 144 DoS SYN Attacks without Delayed Binding 146 Repelling DoS SYN Attacks With Delayed Binding 147 Layer 4 DNS Load Balancing 151 Assigning Filters According to Range of Coverage 172 Assigning Filters to Overlapping Ranges 172 Assigning a Default Filter 173 VLAN based Filtering 174 Configuring Clients with Different Rates 180 Limiting User Access to Server 183 Security Topology Example 185 Static Network Address Translation 192 Dynamic Network Address Translation 193 Active FTP for Dynamic NAT 195 TCP ACK Matching Network 197 Traditional Network Without Web Cache Redirection 204 Network with Web Cache Redirection 205 Example 1 VRRP Router 250 Example 2 VRRP Router 252 A Non VRRP Hot Standby Configuration 253 Active Standby Redundancy 254 Active Active Redundancy 255 Hot Standby Redundancy 256 Active Active High Availability 260 Active Standby High Availability Configuration 263 Active Active High Availability Configuration 265 Hot Standby Configuration 275 Loops in Active Active Configuration 278 Cross Redundancy Creates Loops But STP Resolves Them 279 Using VLANs to Create Non Looping Topologies 279 Stateful Failover Example when the Master Switch Fails 284 Alteon Z Systems 212777 A February 2002 Figure 12 1 Figure 12 2 Figure 12 3 Figure 12 4
112. for the persistence cookie in the speci fied number of responses each of them can be multi frame from the server Setting Expiration Timer for Insert Cookie If you configure for insert cookie persistence mode then you will be prompted for cookie expi ration timer The expiration timer specifies a date string that defines the valid life time of that cookie The expiration timer for insert cookie can be of the following types E Absolute timer The syntax for the absolute timer is MM dd yy hh mm The date and time is based on RFC 822 RFC 850 RFC 1036 and RFC 1123 with the variations that the only legal time zone is GMT Once the expiration date is met the cookie is not stored or given out For example Enter cookie expiration 12 31 01 11 59 Current persistent binding for http disabled New persistent binding for http cookie New cookie persistence mode insert Inserted cookie expires on Mon 12 31 01 at 11 59 E Relative timer This timer defines the elapsed time from when the cookie was created The syntax for the rela tive timer is days hours minutes For example Enter cookie expiration 32 25 61 Current persistent binding for http disabled New persistent binding for http cookie New cookie persistence mode insert Inserted cooki xpires after 33 days 2 hours 1 minutes NOTE If the cookie expiration timer is not specified the cookie will expire when the user
113. gt gt cfg slb adv tpcp ena 2 Enable TPCP for adding and deleting WAP sessions gt gt cfg slb wap tpcp ena Configuring RADIUS Snooping Consider the following items before configuring RADIUS snooping E The same virtual server IP address must be used when load balancing both the RADIUS accounting traffic and WAP traffic E All the RADIUS servers must use the same UDP port for RADIUS accounting services E Before a session entry is recorded on the switch WAP packets for a user can go to any of the real WAP gateways Alteon WebSystems Chapter 6 Server Load Balancing m 161 212777 A February 2002 Web OS 10 0 Application Guide If a session entry for a client cannot be added because of resource constraints the subse quent WAP packets for that client will not be load balanced correctly and the client will need to drop the connection and then reconnect to his wireless service The persistence of a session cannot be maintained if the number of healthy real WAP gate ways changes during the session For example if a new WAP server comes into service or some of the existing WAP servers are down the number of healthy WAP gateway changes and in this case the persistence for a user cannot be maintained Persistence cannot be maintained if the user moves from one ISP to another or if the base of the user s session changes that is from CALLING_STATION_ID to USER_NAME or vice versa For example if a user moves
114. gt gt Filter 15 sip any From any source IP address gt gt Filter 15 dip any To any destination IP address gt gt Filter 15 proto any For any protocol gt gt Filter 15 action redir Perform redirection gt gt Filter 15 group 1 To real server group 1 gt gt Filter 15 ena Enable the filter 10 Add filters to the ingress port gt gt Filter 15 port 1 Select the ingress port gt gt SLB Port 1 add 10 Add the filter to the ingress port gt gt SLB Port 1 add 15 Add the filter to the ingress port gt gt SLB Port 1 filt ena Enable filtering on the port 11 Define static routes to the clean side IP interfaces using the firewalls as gateways One static route is required for each firewall path being load balanced In this case two paths are required one that leads to clean side IF 2 10 1 3 1 through the first firewall 10 1 1 10 as its gateway and one that leads to clean side IF 3 10 1 4 1 through the second firewall 10 1 2 10 as its gateway gt gt SLB Port 5 cfg ip route gt gt IP Static Route add 10 1 3 1 255 255 255 255 10 1 1 10 gt gt IP Static Route add 10 1 4 1 255 255 255 255 10 1 2 10 12 Apply and save the configuration changes gt gt apply gt gt save Alteon WebSystems Chapter 13 Firewall Load Balancing 321 212777 A February 2002 Web OS 10 0 Application Guide Configure the Clean Side Web Switch 1 Define the clean side IP interfaces Create one clean sid
115. health check is successful if there is at least one real server on the remote switch that is up If all real servers on the remote switch are down the remote real server a virtual server of a remote switch will respond with an HTTP Redirect message to the health check Using the scriptable health check feature you can set up health check statements to check all the substrings involved in all the real servers Site 1 with Virtual Server and the following real servers E Real Server 1 and Real Server 2 images E Real Server 3 and Real Server 4 html E Real Server 5 and Real Server 6 cgi and bin E Real Server 7 which is Virtual Server 2 any Site 2 with Virtual Server 2 and the following real servers E Real Server 1 and Real Server 2 images E Real Server 3 and Real Server 4 html E Real Server 5 and Real Server 6 cgi and bin E Real Server 7 which is Virtual Server 2 any A sample script is shown below cfg slb group x health script2 content none cfg slb adv script2 open 80 send GET images default asp HTTP 1 1 r nHOST 192 192 1 2 r n r n expect HTTP 1 1 200 close open 80 send GET install default html HTTP 1 1 r nHOST 192 192 1 2 r n r n expect HTTP 1 1 200 close open 80 send GET script cgi HTTP 1 1 r nHOST www myurl com r n r n expect HTTP 1 1 200 close Chapter 10 Health Checking Alteon
116. health checks O SMTP Server Health Checks on page 236 This section explains how to use Simple Mail Transfer Protocol SMTP mail server to perform health checks between a client system and a mail server and how to configure the switch for SMTP health checks O IMAP Server Health Checks on page 237 This section describes how the mail server Internet Message Access Protocol IMAP protocol is used to perform health checks between a client system and a mail server O NNTP Server Health Checks on page 238 This section explains how to use Net work News Transfer Protocol NNTP server to perform health checks between a cli ent system and a mail server and how to configure the switch for NNTP health checks O RADIUS Server Health Checks on page 239 This section explains how the RADIUS protocol is used to authenticate dial up users to Remote Access Servers RASs O HTTPS SSL Server Health Checks on page 240 This section explains how the switch queries the health of the SSL servers by sending an SSL client Hello packet and then verifies the contents of the server s Hello response O WAP Gateway Health Checks on page 240 This section discusses how the Web switch provides a connectionless WSP health check for WAP gateways O LDAP Health Checks on page 243 This section describes how to configure the switch to perform Lightweight Directory Access Protocol LDAP health checks for the switc
117. interface using the first firewall as the next hop The second static route would lead to the second dirty side IP interface using the second firewall as the next hop and so on Since Web switches intelligently maintain state information all traffic between specific IP source destination addresses flows through the same firewall maintaining session persistence NOTE If Network Address Translation NAT software is used on the firewalls FWLB ses sion persistence requires the RTS option to be enabled on the Web switch see Free Metric FWLB on page 346 9 The firewall decides if it should allow the packet and if so forwards it to the dirty side Web switch Each firewall forwards or discards the server responses according to the rules that are config ured for it Forwarded packets are sent to the dirty side Web switch and out to the Internet 10 The client receives the server response 318 m Chapter 13 Firewall Load Balancing Alteon 2 Systems A February Web OS 10 0 Application Guide Configuring Basic FWLB The steps for configuring basic FWLB are provided below While two or four switches can be used the following procedure assumes a simple network topology with only two Web switches one on each side of the firewalls as shown in Figure 13 4 Firewall 1 Web Switch 2 Dirty Side jess Clean Side IF1 20 1 1 1 Servers Web Switch 1 10 1 1 10 seme 10 1 3 10 Virtual Server IF1 192 16 1
118. is based on standard VRRP as defined in RFC 2338 The sec ond and third modes active active and hot standby are based on proprietary Web OS exten sions to VRRP Each mode is described in detail in the following sections Alteon WebSystems Chapter 11 High Availability m 253 212777 A February 2002 Web OS 10 0 Application Guide Active Standby Redundancy In an active standby configuration shown in Figure 11 4 two Web switches are used Both switches support active traffic but are configured so that they do not simultaneously support the same service Each switch is active for its own set of services such as IP routing interfaces or load balancing virtual server IP addresses and acts as a standby for other services on the other switch If either switch fails the remaining switch takes over processing for all services The backup switch may forward Layer 2 and Layer 3 traffic as appropriate NOTE In an active standby configuration the same service cannot be active simultaneously on both switches Standby VIP 1 VIP 205 178 13 226 Active VIP 2 VIP 205 178 13 240 Standby VIP 3 VIP 205 178 13 110 Router Internet Router Active VIP 1 VIP 205 178 13 226 Standby VIP 2 VIP 205 178 13 240 Active VIP 3 VIP 205 178 13 110 Figure 11 4 Active Standby Redundancy 254 m Chapter 11 High Availability Alteon 2 systems A February Web OS 10 0 Application Guide Active Active Redundancy
119. jo cescnetniedsseseeuntevassspeebesvs maximum CONNECTIONS eeeeeeeeeeeeeeee n SLB configuration example sesseseessesseeresee WEISS EE E E redirect HTTP eresas iesnas osia rie aetas redirecting filters tunable hashista ae nE EEE redirecting non HTTP applications redirection See application redirection redundancy dotiyesacti Ve orie EErEE 255 active standby 00 eeeeeeeesseeecesneeeeeeeeeeeneeees 254 hot standby eeececesseceeeseeeseeeeeesaeeeeneeees 256 remote Global SLB real server property 298 roundrobin SLB Real Server metric cseceeeesseeeeeeeees 132 route cache sample scecesseeecsseeeesseeesenaeeeseeees 59 Router ID TOULETS ss EE A A border PEEP siiin POrt trUNKINY irase i switch based routing topology using redirection to reduce Internet congestion 203 web cache redirection example routes advertising eee eeeeeeeeeeeeeeseeeeeeeeeeeeeeeeeeees TOW UN T AAE E EE E EE EE internal and external COMM QUTING seier aE Ee eee E EE SE SEN 157 Layer 7 load balancing sseeeeeeeeeeeeeeeeeeee eee 392 server load balancing seeesseeerereeeereereeeree 155 Web cache redirection sseeeceeeeeeeseeeeeees 211 S scalability SETV CE i cisssscecissscssessvicsesgvatleesteevagvoess 118 SCP SEL VICES 22355 eecrcssssecsteisesstastaceeeecsstesseeeasveeess 108 script based health checks eeeeeeee 225 to 229 searching for coo
120. lt portnumber gt add lt filter number gt 15 Enable Direct Access Mode DAM on the switch gt gt SLB lt portnumber gt adv gt gt Layer 4 Advanced direct ena 16 Enable apply and verify the configuration gt gt cfg slb Select the SLB Menu gt gt on Turn SLB on gt gt apply Make your changes active gt gt cur View current settings Viewing Statistics for URL Based Web Cache Redirection To show the number of hits to the cache server or origin server use this command gt gt stats slb layer7 redir Total URL based Web cache redirection stats Total cache server hits 73942 Total origin server hits 2244 Total none GETs hits 53467 Total Cookie hits 729 Total no cache hits 43 402 Chapter 15 Content Intelligent Switching Alteon Z systems 212777 A February 2002 Web OS 10 0 Application Guide HTTP Header Based Web Cache Redirection To configure the switch for WCR based on the Host header use the following procedure 1 Configure basic SLB Before you can configure header based cache redirection ensure that the switch has already been configured for basic SLB see Server Load Balancing on page 117 with the following tasks E Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server Assign servers to real server groups Defi
121. matching URL matching Standard Regular Expression Characters The following is a list of standard regular expression special characters that are supported in Web OS Table 15 1 Standard Regular Expression Special Characters Construction Description Matches any string of zero or more characters Matches any single character Matches one or more occurrences of the pattern it follows Matches zero or one occurrences of its followed pattern Matches the end of a line Escape the following special character abc Matches any of the single character inside the bracket abc Matches any single character except those inside the bracket Use the following rules to describe patterns for string matching E Supports one layer of parenthesis E Supports only single match at end of line which must appear at the end of the string For example abc def is not supported E Size of the user input string must be 40 characters or less 412 m Chapter 15 Content Intelligent Switching Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide E Size of the regular expression structure after compilation cannot exceed 43 bytes for load balancing strings and 23 bytes for Web Cache Redirection The size of regular expression after compilation varies based on regular expression characters used in the user input string E Use at the beginning of the regular expression O
122. mode operation 1 Configure switch to rewrite cookie values Web Server Farm Internet Client Proxy Firewall Web Switch Figure 16 4 Rewrite Cookie Mode NOTE When the Web switch rewrites the value of the cookie the rewritten value represents the responding server that is the value can be used for hashing into a real server ID or it can be the real server IP address The rewritten cookie value is encoded Alteon WebSystems Chapter 16 Persistence m 429 212777 A February 2002 Web OS 10 0 Application Guide Configuring Cookie Based Persistence 1 Before you can configure cookie based persistence you need to configure the switch for basic SLB This includes the following tasks Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Configure each real server with its IP address name weight and so forth Assign servers to real server groups Define virtual servers and services For information see Server Load Balancing on page 117 2 Either enable Direct Access Mode DAM or disable DAM and specify proxy IP address es on the client port s E Enable DAM for the switch gt gt cfg slb adv direct ena Enable Direct Access Mode on switch E Disable DAM and specify proxy IP address es on the client port s gt gt cfg slb adv direct disable Disable DAM on the switch gt gt cfg slb port 1 Select
123. network port 1 gt gt pip 200 200 200 68 Set proxy IP address for port 1 NOTE If Virtual Matrix Architecture VMA is enabled on the switch you must configure a unique proxy IP address for every port except port 9 3 If proxy IP addresses are used make sure server processing is disabled on the server port gt gt cfg slb port 1 Select switch port 1 gt gt server dis Disable server processing on port 1 430 Chapter 16 Persistence Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide 4 Select the appropriate load balancing metric for the real server group gt gt cfg slb group 2 metric hash Select hash as server group metric E If embedding an IP address in the cookie select roundrobin or leastconns as the metric E If you are not embedding the IP address in the cookie select hash as the metric in con junction with a cookie assignment server While you may experience traffic concentration using the hash metric with a cookie assignment server using a hash metric without a cookie assignment server will cause traffic concentration on your real servers 5 Enable cookie based persistence on the virtual server service In this example cookie based persistence is enabled for service 80 HTTP gt gt cfg slb virt 1 service 80 pbind Current persistent binding mode disabled Enter cookie sslid disable persistence mode cookie
124. number Specify the transit area for the virtual link Specify the router ID of the recipient Enable the virtual link 10 Apply and save the configuration changes gt gt OSPF Interface 2 apply gt gt OSPF Interface 2 save Global command to apply all changes Global command to save all changes Other Virtual Link Options E You can use redundant paths by configuring multiple virtual links E Only the endpoints of the virtual link are configured The virtual link path may traverse multiple routers in an area as long as there is a routable path between the endpoints Alteon Z5Systems 212777 A February 2002 Chapter 4 OSPF m 89 Web OS 10 0 Application Guide Example 3 Summarizing Routes By default ABRs advertise all the network addresses from one area into another area Route summarization can be used for consolidating advertised addresses and reducing the perceived complexity of the network If the network IP addresses in an area are assigned to a contiguous subnet range you can con figure the ABR to advertise a single summary route that includes all the individual IP addresses within the area The following example shows one summary route from area 1 stub area injected into area 0 the backbone The summary route consists of all IP addresses from 36 128 0 0 through 36 128 254 255 except for the routes in the range 36 128 200 0 through 36 128 200 255 Backbone Stub Area 77
125. of all switches in the virtual router be identical that is each switch should be the same model have the same line cards in the same slots if modular and have the same ports connected to the same external network devices Otherwise unexpected results may occur when the oper slb synch command attempts to configure a non existent port or applies an inappropriate configuration to a port 282 m Chapter 11 High Availability Alteon 2 Systems A February Web OS 10 0 Application Guide Stateful Failover of Layer 4 and Layer 7 Persistent Sessions Web OS provides stateful failover of content intelligent persistent session state and Layer 7 persistent session state This includes the following E SSL session state E HTTP cookie state E Layer 4 persistent E FTP session state Providing stateful failover enables network administrators to mirror their Layer 7 and Layer 4 persistent transactional state on the peer switch NOTE Stateful failover does not synchronize all sessions except persistent sessions Make sure Direct Access Mode DAM is enabled when you configure stateful failover for Layer 7 persistency for example SSL session ID persistence based server load balancing URL and cookie based server load balancing To provide stateful failover the state of the connection and session table must be shared between the switches in high availability configurations With Virtual Matrix Architecture VMA enabled all URL and
126. of the packet size gt gt Policy 1 buffer 68192 Set policy buffer limit of 8192 bytes 5 On the switch select a BWM contract and name the contract Each contract must have a unique number from 1 to 256 gt gt Bandwidth Management cfg bwm cont 1 Select BWM contract 1 gt gt BWM Contract 1 name icmp Select contract name icmp 468 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide 6 Set the bandwidth policy for the contract Each BWM contract must be assigned a bandwidth policy gt gt BWM Contract 1 pol 1 Assign policy 1 to BWM contract 1 7 Enable the BWM contract gt gt BWM Contract 1 ena Enables this BWM contract 8 Create a filter that will be used to classify the frames for this contract and assign the BWM contract to the filter The classification policy for this BWM contract is based on a filter configured to match ICMP traffic The contract will be applied to any frames that match this filter gt gt BW Contract 1 cfg slb filt 1 proto icmp Define protocol affected by filter gt gt Filter 1 adv icmp any Set the ICMP message type gt gt Filter 1 Advanced cont 1 Assign BWM contract 1 to this filter gt gt Filter 1 Advanced cfg slb filt 1 ena Enable this filter gt gt Filter 1 apply Port and enable filtering 9 On the switch
127. on 10 10 24 0 24 gt gt cfg ip if 1 Select menu for IP interface 1 gt gt IP Interface 1 addr 10 10 12 2 Set IP address on transit area network gt gt IP Interface 1 enable Enable IP interface 1 gt gt IP Interface 1 if 2 Select menu for IP interface 2 gt gt IP Interface 2 addr 10 10 24 1 Set IP address on stub area network gt gt IP Interface 2 enable Enable IP interface 2 2 Configure the router ID A router ID is required when configuring virtual links This router ID should be the same one specified as the target virtual neighbor nbr on Web switch in Step 8 on page 87 gt gt IP Interface 2 cfg ip rtrid 10 10 14 1 Set static router ID on Web switch 2 3 Enable OSPF gt gt IP cfg ip ospf on Enable OSPF on Web switch 2 4 Define the backbone This version of Web OS 10 0 requires that a backbone index be configured on the non back bone end of the virtual link as follows gt gt Open Shortest Path First aindex 0 Select the menu for area index 0 gt gt OSPF Area index 0 areaid 0 0 0 0 Set the area ID for OSPF area 0 gt gt OSPF Area index 0 enable Enable the area 5 Define the transit area gt gt OSPF Area index 0 aindex 1 Select menu for area index 1 gt gt OSPF Area index 1 areaid 0 0 0 1 Set the area ID for OSPF area 1 gt gt OSPF Area index 1 type transit Def
128. out of a roaming area it is possible that his her CALLING_STATION_ID is not available in the RADIUS Accounting packets In such a case the switch uses USER_NAME to choose a WAP server instead of CALLING_STATION_ID Thus persistence cannot be maintained Configure the following filter on the switch to examine a RADIUS accounting packet 1 Set the basic filter parameters gt gt gt gt gt gt gt gt gt gt 22 gt gt gt gt cfg slb filt 1 Select the filter Filter 1 dip 10 10 10 100 Set the destination IP address Filter 1 dmask 255 255 255 255 Set the destination IP mask Filter 1 proto udp Set the protocol to UDP Filter 1 dport 1813 Set the destination port Filter 1 action redir Set the action to redirect Filter 1 group 1 Set the group for redirection Filter 1 rport 1813 Set server port for redirection 2 Turn on proxy and RADIUS snooping gt gt gt gt gt gt Filter 1 adv Select the advance filter menu Filter 1 Advanced proxy ena Enable proxy Filter 1 Advanced rdsnp ena Enable RADIUS snooping 3 Apply and save your configuration gt gt gt gt Filter 1 Advanced apply Filter 1 Advanced save NOTE Web OS supports Virtual Router Redundancy Protocol VRRP and stateful failover using both static session entries and RADIUS snooping However active active configuration with Stateful Failover is not supported
129. peer gt gt cfg vrrp on gt gt cfg slb gt gt on gt gt sync peer 1 gt gt addr 10 10 4 10 gt gt ena gt gt apply gt gt save Alteon WebSystems Chapter 13 Firewall Load Balancing 337 212777 A February 2002 Web OS 10 0 Application Guide Complete the Configuration of the Primary Dirty Side Web Switch 1 Create an FWLB real server group on the primary dirty side Web switch A real server group is used as the target for the FWLB redirection filter Each IP address that is assigned to the group represents a path through a different firewall In this case since two fire walls are used two addresses are added to the group Earlier it was stated that this example uses IF 2 on all Web switches whenever routing through the top firewall and IF 3 on all Web switches whenever routing through the lower firewall Therefore the first address will represent the primary clean side IF 2 and the second repre sents the primary clean side IF 3 gt gt cfg slb gt gt on gt gt real 1 gt gt rip 10 10 3 1 gt gt ena gt gt real 2 gt gt rip 10 10 3 2 gt gt ena gt gt group 1 gt gt add 1 gt gt add 2 gt gt metric hash Using the hash metric all traffic between specific IP source destination address pairs flows through the same firewall ensuring that sessions established by the firewalls are maintained for their duration pe
130. performance benchmark tool to determine how many connections your real servers can handle When a server reaches its maxcon limit the switch no longer sends new connections to the server When the server drops back below the maxcon limit new sessions are again allowed 134 m Chapter 6 Server Load Balancing Alteon e Systems A February Web OS 10 0 Application Guide Backup Overflow Servers A real server can backup other real servers and can handle overflow traffic when the maximum connection limit is reached Each backup real server must be assigned a real server number and real server IP address It must then be enabled Finally the backup server must be assigned to each real server that it will back up The following defines real server 4 as a backup for real servers and 2 gt gt cfg slb real 4 Select real server 4 as backup gt gt Real server 4 rip 200 200 200 5 Assign backup IP address gt gt Real server 4 ena Enable real server 4 gt gt Real server 4 cfg slb real 1 Select real server 1 gt gt Real server 1 backup 4 Real server 4 is backup for 1 gt gt Real server 1 cfg slb real 2 Select real server 2 gt gt Real server 2 backup 4 Real server 4 is backup for 2 In a similar fashion a backup overflow server can be assigned to a real server group If all real servers in a real server group fail or overflow the backup comes online gt gt cfg slb group lt real serve
131. port 4 server ena gt gt SLB port 4 port 5 server ena 12 Enable server load balancing on the switch gt gt Real server group 1 cfg slb on 13 Create a filter to prevent server to server traffic from being redirected gt gt Layer 4 cfg slb filt 10 Select filter 10 gt gt Filter 10 sip any From any source IP address gt gt Filter 10 dip 20 1 1 0 To base IP address for IF 5 gt gt Filter 10 dmask 255 255 255 0 For the range of addresses gt gt Filter 10 proto any For any protocol gt gt Filter 10 action allow Allow traffic gt gt Filter 10 ena Enable the filter 14 Create the redirection filter This filter will redirect outbound traffic load balancing it among the defined real servers in the group In this case the real servers represent IP interfaces on the dirty side switch gt gt Filter 10 filt 15 Select filter 15 gt gt Filter 15 sip any From any source IP address gt gt Filter 15 dip any To any destination IP address gt gt Filter 15 proto any For any protocol gt gt Filter 15 action redir Perform redirection gt gt Filter 15 group 1 To real server group 1 gt gt Filter 15 ena Enable the filter 324 m Chapter 13 Firewall Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide 15 Add the filters to the ingress ports for the outbound packets
132. prio 102 gt gt share dis gt gt ena gt gt track gt gt ifs ena gt gt ports ena 344 m Chapter 13 Firewall Load Balancing Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide 5 Configure the peer on the primary clean side Web switch gt gt cfg slb sync gt gt prios d gt gt peer 1 gt gt ena gt gt addr 10 10 4 11 6 Apply and save your configuration changes gt gt apply gt gt save 7 Synchronize primary and secondary dirty side Web switches gt gt oper slb sync Alteon WebSystems Chapter 13 Firewall Load Balancing m 345 212777 A February 2002 Web OS 10 0 Application Guide Advanced FWLB Concepts Free Metric FWLB Free metric FWLB allows to you use load balancing metrics other than hash such as leastconns roundrobin minmiss response and bandwidth for more versatile FWLB The free metric method uses the Return to Sender RTS option RTS can be used with basic FWLB or four subnet FWLB networks Free Metric with Basic FWLB For this example review the basic FWLB example network Firewall 1 Web Switch 2 Dirty Side jjsess Clean Side IF1 20 1 1 1 Servers Web Switch 1 10 1 1 10 feet 10 1 3 10 Virtual Server eo IF1 192 16 12 1 20 1 1 10 Internet i 20 1 1 2 Dirty Side 10 1 2 10 Clean Side 10 1 4 10 Figure 13 8 Basic FWLB Example
133. related configuration gt gt cfg sys sshd cur View current SSH SCP settings gt gt diff View pending changes To apply the pending changes from the new configuration use this command gt gt apply NOTE If SSH SCP is enabled and an apply command is issued the switch will automati cally generate the RSA host and server keys if they are not available It will take several min utes to complete this process Alteon WebSystems Chapter 5 Secure Switch Management m 111 212777 A February 2002 Web OS 10 0 Application Guide To save the current configuration to FLASH use this command gt gt save Usually there will be no need to generate manually the RSA host and server keys However you may still do so by using the following commands gt gt cfg sys sshd hkeygen Generates the host key gt gt cfg sys sshd skeygen Generates the server key NOTE These two commands will take effect immediately without the need of an apply command being issued Some Supported Client Commands Up to four simultaneous Telnet SSH SCP connections are supported on a switch E To log in to the switch ssh lt switch IP address gt or ssh 1 lt username gt lt switch IP address gt E To download the switch configuration using SCP scp lt switch IP address gt getcfg lt local filename gt E To upload the configuration to the switch scp lt
134. s session ends 432 m Chapter 16 Persistence Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Example 1 Setting the Cookie Location In this example the client request has two different cookies labeled UID One exists in the HTTP header and the other appears in the URI GET product switch UID 12345678 ck 1234 Host www alteonwebsystems com Cookie UID 87654321 E Look for the cookie in the HTTP header gt gt cfg slb virt 1 service 80 pbind cookie passive UID 1 8 dis The last parameter in this command answers the Look for cookie in URI prompt If you set this parameter to disable the Web switch will use UID 87654321 as the cookie E Look for the cookie in the URI gt gt cfg slb virt 1 service 80 pbind cookie passive UID 1 8 ena The last Look for cookie in URI parameter is set to enable Therefore the Web switch will use UID 12345678 as the cookie Alteon WebSystems Chapter 16 Persistence m 433 212777 A February 2002 Web OS 10 0 Application Guide Example 2 Parsing the Cookie This example shows three configurations where the switch uses the hashing key or wild cards to determine which part of the cookie value should be used for determining the real server For example the value of the cookie is defined as follows Cookie sid 0123456789abcdef namel valuel E Select the entire value of the sid cookie as a hashing key for selecting
135. server IP addresses and real server IP addresses are on different subnets or if the switch is connected to different subnets and those subnets need to communicate through the switch If you are in doubt as to whether or not to enable IP forwarding enable it In this example the virtual server IP addresses and real server IP addresses are on different subnets so enable this feature using the following command gt gt Main cfg ip frwd on Enable IP forwarding 268 m Chapter 11 High Availability Alteon e systems A February Web OS 10 0 Application Guide Task 2 SLB Configuration 1 Define the Real Servers The real server IP addresses are defined and put into four groups depending on the service they are running Notice that RIPs 7 and 8 are on routable subnets in order to support passive FTP For each real server you must assign a real server number specify its actual IP address and enable the real server For example gt gt Main cfg slb real 1 Server A is real server 1 gt gt Real server 1 rip 10 10 10 5 24 Assign Server A IP address gt gt Real server 1 ena Enable real server 1 Repeat this sequence of commands for the following real servers RIP 2 10 10 10 6 24 RIP 3 20 10 10 5 24 RIP 4 20 10 10 6 24 RIP 5 30 10 10 5 24 RIP 6 30 10 10 6 24 RIP 7 200 1 1 5 24 RIP 8 200 1 1 6 24 2 Define the real server groups adding the appropriate real servers This combines the th
136. servers gt gt cfg slb adv direct ena 3 Select session ID based persistence as the persistent binding option for the virtual port gt gt cfg slb virt lt virtual server number gt service lt virtual port gt pbind sslid 4 Enable client processing on the client port gt gt cefg slb port lt portnumber gt client ena Alteon WebSystems Chapter 16 Persistence m 439 212777 A February 2002 Web OS 10 0 Application Guide 440 m Chapter 16 Persistence Alteon WebSystems 212777 A February 2002 CHAPTER 17 Bandwidth Management Bandwidth Management BWM enables Web site managers to allocate a certain portion of the available bandwidth for specific users or applications It allows companies to guarantee that critical business traffic such as e commerce transactions receive higher priority versus non critical traffic Traffic classification can be based on user or application information BWM policies can be configured to set lower and upper bounds on the bandwidth allocation The following topics are addressed in this chapter Overview on page 442 Bandwidth Policies on page 444 Data Pacing on page 446 Classification Criteria on page 447 Bandwidth Statistics and History on page 452 Packet Coloring TOS bits for Burst Limit on page 453 Operational Keys on page 453 Configuring Bandwidth Management on page 454 Alteon Sys
137. source IP address is directed to a specific server the source IP address itself is ran domly selected thereby making it impossible to predict which server will receive the request SLB is supported but without persistence for any given client 422 m Chapter 16 Persistence Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Using Cookies Cookies are strings passed via HTTP from servers to browsers Based on the mode of opera tion cookies are inserted by either the Web switch or the server After a client receives a cookie a server can poll that cookie with a GET command which allows the querying server to positively identify the client as the one that received the cookie earlier The cookie based persistence feature solves the proxy server problem and gives better load distribution at the server site In the Web switch cookies are used to route client traffic back to the same physical server to maintain session persistence Using SSL Session ID The SSL session ID is effective only when the server is running SSL transactions Because of the heavy processing load required to maintain SSL connections most network configurations use SSL only when it is necessary Persistence based on SSL Session ID ensures completion of complex transactions in proxy server environments However this type of persistence does not scale on servers because of their computational requirements Alteon WebSystems Chapter 16 Persistence
138. switch directs requests to one of the Servers 1 through 4 E If the host header is www company b com the switch directs requests to one of the Servers 5 through 8 Alteon WebSystems Chapter 15 Content Intelligent Switching 381 212777 A February 2002 Web OS 10 0 Application Guide Configuring the Host Header for Virtual Hosting To support virtual hosting configure the switch for Host header based load balancing with the following procedure 1 Before you can configure header based server load balancing ensure that the switch has already been configured for basic SLB with the following tasks Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch fH E E Define each real server E Assign servers to real server groups a Define virtual servers and services For information on how to configure your network for server load balancing see Server Load Balancing on page 117 2 Turn on URL parsing for the virtual server for virtual hosting gt gt cfg slb virt 1 Select the virtual IP for host header based SLB gt gt Virtual Server 1 service 80 Select the HTTP service gt gt Virtual Server 1 http Service httpslb host 3 Define the host names gt gt cfg slb layer7 slb add www customer1 com gt gt Server Loadbalance Resource add www customer2 com gt gt Server Loadbalance Resource add www customer3 c
139. that the user fills in or custom Web based applications typically created using cgi bin scripts Connections for these types of ser vices must be configured as persistent see Chapter 16 Persistence or must use the minmisses or hash metrics see Metrics for Real Server Groups on page 131 E Clients and servers can be connected through the same switch port Each port in use on the switch can be configured to process client requests server traffic or both You can enable or disable processing on a port independently for each type of Layer 4 traffic O Layer 4 client processing Ports that are configured to process client request traffic provide address translation from the virtual server IP to the real server IP address O Layer 4 server processing Ports that are configured to process server responses to cli ent requests provide address translation from the real server IP address to the virtual server IP address These ports require real servers to be connected to the Web switch directly or through a hub router or another switch NOTE Switch ports configured for Layer 4 client server processing can simultaneously pro vide Layer 2 switching and IP routing functions Consider the following network topology c Client Processing Web servers initiate DNS requests i which are load balanced s Server Processing to DNS servers Web Switch Router 1 Internet Clients on the Interne
140. the Basics at the Denver Site Following the same procedure described for California see Example GSLB Topology on page 294 configure the Denver site as follows 1 Ifthe Web OS BBI is to be used for managing the Denver switch change its service port gt gt cfg sys Select the System menu gt gt System wport 8080 Set service port 8080 for BBI Alteon WebSystems Chapter 12 Global Server Load Balancing m 299 212777 A February 2002 Web OS 10 0 Application Guide 2 On the Denver switch define an IP interface gt gt cfg ip if 1 Select IP interface 1 gt gt IP Interface 1 addr 174 14 70 100 Assign IP address for the interface gt gt IP Interface 1 ena Enable IP interface 1 3 On the Denver switch define the default gateway gt gt IP Interface 1 gw 1 Select default gateway 1 gt gt Default gateway 1 addr 174 14 70 101 Assign IP address for the gateway gt gt Default gateway 1 ena Enable default gateway 1 4 Configure the local DNS server to recognize the local GSLB switch as the authoritative name server for the hosted services The Denver DNS server is configured to recognize 174 14 70 100 the IP interface of the Den ver GSLB switch as the authoritative name server for www foocorp com Task 5 Configure the Denver Switch for Standard SLB 1 Assign an IP address to each of the real servers in the local Denver server pool Table
141. the client s mail until a FIN frame is received 306 Chapter 12 Global Server Load Balancing Alteon 2 Systems A February Web OS 10 0 Application Guide Configuring Proxy IP Addresses Refer to the example starting on page 294 and Figure 12 4 the switch at Site 1 in California is configured with switch port 6 connecting to the default gateway and real server 3 represents the remote server in Denver The following commands are used at Site 1 in California to configure the proxy IP address for the remote server in Denver NOTE If any port is configured with a proxy IP address then all ports except port 9 must be configured with a unique proxy IP address prior to enabling Virtual Matrix Architecture VMA Once they are configured proxy IP addresses not in use can be disabled oo gt gt gt gt gt gt gt gt gt gt gt gt gt gt cfg slb port 6 SLB port 6 Real server 1 Real server 2 SLB port 6 pip 200 200 200 4 Set unique proxy IP address SLB port 6 proxy enable real 1 proxy disable Disable local real server proxy real 2 proxy disable Disable proxy for local server real 3 proxy enable Enable proxy for remote server Real server 3 apply Real server 3 save Select port to default gateway Enable proxy for switch port 6 Apply configuration changes Save configuration changes If you want to configure proxy IP addresses on Site 2 t
142. the master and it has one active server fewer than Web switch 1 then Web switch becomes the master The user can implement this behavior by configuring the switch for tracking as follows 1 Set the priority for Web switch 1 to the default value of 100 2 Set the priority for Web switch 2 to 96 3 On both switches enable tracking based on the number of virtual routers in master mode on the switch and set the value 5 4 On both switches enable tracking based on the number of healthy real servers behind the VIP address that is the same as the IP address of the virtual server router on the switch and set the value 6 Initially Web switch 1 Figure 11 8 will have a priority of 100 base value 5 since it will initially be the master 24 4 active real servers x 6 per real server 129 Web switch 2 will have a priority of 96 base value 24 4 active real servers X 6 per real server 120 280 m Chapter 11 High Availability Alteon 2 Systems A February Web OS 10 0 Application Guide If one server attached to Web switch 1 fails then Web switch 1 s priority will be reduced by 6 to 123 Since 123 is greater than 120 Web switch 2 s priority Web switch 1 will remain the master If a second server attached to Web switch 1 fails then Web switch 1 s priority will be reduced by 6 more to 117 Since 117 is less than 120 Web switch 2 s priority then Web switch 2 will become the Master At this point Web switch 1
143. the real server gt gt cfg slb virt 1 service 80 pbind cookie passive sid 1 16 dis This command directs the switch to use the sid cookie starting with the first byte in the value and using the full 16 bytes E Select a specific portion of the sid cookie as a hashing key for selecting the real server gt gt cfg slb virt 1 service 80 pbind cookie passive sid 8 4 dis This command directs the switch to use the sid cookie starting with the eight byte in the value and using only four bytes This uses 78 9a as a hashing key M Using wildcards for selecting cookie names gt gt cfg slb virt 1 service 80 pbind cookie passive ASPSESSIONID 1 16 dis With this configuration the switch will look for a cookie name that starts with ASPSES SIONID ASPSESSIONID123 ASPSESSIONID456 and ASPSESSIONID789 will all be seen by the switch as the same cookie name If more than one cookie matches only the first one will be used Example 3 Using Passive Cookie Mode If you are using passive cookie mode the Web switch examines the server s Set Cookie value and directs all subsequent connections to the server that assigned the cookie For example if Server 1 sets the cookie as Set Cookie sid 12345678 then all traf fic from a particular client with cookie sid 12345678 will be directed to Server 1 The following command is used on the Web switch gt gt cfg slb vi
144. the secondary dirty side Web switch gt gt gt gt gt gt gt gt o gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt cfg ip if 1 mask 255 255 255 0 addr 195 1 1 11 ena if 2 mask 255 255 255 0 addr 10 10 2 11 vlan 2 ena if 3 mask 255 255 255 255 addr 10 10 2 12 vlan 2 ena 3 Turn STP off for the secondary dirty side Web switch gt gt cfg stp offt 4 Configure static routes on the secondary dirty side Web switch gt gt gt gt gt gt gt gt gt gt Se SE SER HE cfg ip frwd route add 10 10 3 1 255 255 255 255 10 10 2 3 2 add 10 10 3 2 255 255 255 255 10 10 2 4 3 add 10 10 3 11 255 255 255 255 10 10 2 3 2 add 10 10 3 12 255 255 255 255 10 10 2 4 3 5 Apply and save your configuration gt gt apply gt gt save gt gt boot reset Alteon WebSystems Chapter 13 Firewall Load Balancing 333 212777 A February 2002 Web OS 10 0 Application Guide Configure Connectivity for the Primary Clean Side Web Switch 1 Configure VLANs on the primary clean side Web switch Two VLANs are required VLAN 3 includes the firewall port and interswitch connection port VLAN 4 includes the port that attaches to the real servers gt gt cfg vlan 3 gt gt add 3 gt gt add 9 gt gt ena gt gt vlan 4 gt gt add 4 gt gt ena 2
145. they are in the same subnet This example assumes that all ports and IP interfaces use default VLAN 1 requiring no special VLAN configuration for the ports or IP interface 3 Define each real server For each real server you must assign a real server number specify its actual IP address and enable the real server For example gt gt IP Interface 1 cfg slb real 1 Server A is real server 1 gt gt Real server 1 rip 200 200 200 2 Assign Server A IP address gt gt Real server 1 ena Enable real server 1 gt gt Real server 1 real 2 Server B is real server 2 gt gt Real server 2 rip 200 200 200 3 Assign Server B IP address gt gt Real server 2 ena Enable real server 2 gt gt Real server 2 real 3 Server C is real server 3 gt gt Real server 3 rip 200 200 200 4 Assign Server C IP address gt gt Real server 3 ena Enable real server 3 4 Define a real server group and add the three real servers to the service group gt gt Real server 3 cfg slb group 1 Select real server group 1 gt gt Real server group 1 add 1 Add real server I to group 1 gt gt Real server group 1 add 2 Add real server 2 to group 1 gt gt Real server group 1 add 3 Add real server 3 to group 1 Alteon WebSystems Chapter 6 Server Load Balancing m 125 212777 A February 2002 Web OS 10 0 Application Guide 5 Define a virtual server All client requests will be
146. tify the VLANs participating in the Spanning Tree groups The Spanning Tree group ID is not transmitted in the BPDU Each Spanning Tree decision is based on the configuration of that switch 54 Chapter 2 VLANs Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide VLAN Participation in Spanning Tree Groups The VLAN participation for each Spanning Tree group in Figure 2 5 on page 53 is discussed in the following sections VLAN 1 Participation If Web switch A is the root bridge then Web switch A will transmit the BPDU for VLAN 1 on ports 1 and 2 Web switch C receives the BPDU on its port 2 and Web switch D receives the BPDU on its port 1 Web switch D will block port 8 or Web switch C will block port 1 depending on the information provided in the BPDU VLAN 2 Participation Web switch A the root bridge generates another BPDU for Spanning Tree Group 2 and forwards it out from port 8 Web switch B receives this BPDU on its port 1 Port 1 on Web switch B is on VLAN 2 Spanning Tree group 1 Because Web switch B has no additional ports participating in Spanning Tree group 1 this BPDU is not be forwarded to any addi tional ports and Web switch A remains the designated root VLAN 3 Participation For VLAN 3 you can have Web switch B or C to be the root bridge If Web switch B is the root bridge for VLAN 3 Spanning Tree group 2 then Web switch B transmits the BPDU out from port 8 Web switch C receives this BPDU on p
147. time window for the session gt gt Layer 4 Advanced holddur 5 Set the hold duration for the session Fastage and slowage are set at their default values Fastage 0 1 sec slowage 0 2 minutes Time window timewin x fastage 1x 1 second 1 second Hold down time holddur x slowage 5 x 2 minutes 10 minutes Max rate maxcon time window 150 connections 1 second 150 connections second Any client with source IP address equal to 30 30 30 x is allowed to make 150 new TCP con nections per second to any single destination When the rate limit of 150 is met the hold down time takes effect and the client is not allowed to make any new TCP connections to the same destination for 10 minutes 182 m Chapter 7 Filtering Alteon e systems A February Web OS 10 0 Application Guide TCP Rate Limiting Filter Based on Virtual Server IP Address This example defines a filter that limits clients to 100 TCP connections per second to a specific destination VIP 10 10 10 100 Once a client exceeds that limit the client is not allowed to make any new TCP connection request to that destination for 40 minutes Figure 7 6 shows how to use this feature to limit client access to a specific destination Clients Real servers Client 1 2 3 and 4 are limited wr to 100 conn sec to virtual IP address Web Switch Figure 7 6 Limiting User Access to Server Configure the following on the switch gt gt cf
148. trunk group 3 gt gt Trunk group 3 ena Enable trunk group 3 gt gt Trunk group 3 apply Make your changes active gt gt Trunk group 3 cur View current trunking configuration gt gt Trunk group 3 save Save for restore after reboot Trunk group 1 on Web switch 1 is now connected to trunk group 3 on Web switch 2 NOTE In this example two Alteon Web switches are used If a third party device supporting link aggregation is used such as Cisco routers and switches with EtherChannel technology or Sun s Quad Fast Ethernet Adapter trunk groups on the third party device should be config ured manually Connection problems could arise when using automatic trunk group negotia tion on the third party device 4 Examine the trunking information on each switch gt gt info trunk View trunking information Information about each port in each configured trunk group will be displayed Make sure that trunk groups consist of the expected ports and that each port is in the expected state The following restrictions apply E Any physical switch port can belong to only one trunk group E Up to four ports can belong to the same trunk group E Best performance is achieved when all ports in any given trunk group are configured for the same speed E Trunking from non Alteon devices must comply with Cisco EtherChannel technology 68 Chapter 3 Port Trunking Alteon e systems A F
149. turned on 17 Apply and save the configuration changes gt gt apply gt gt save Alteon WebSystems Chapter 13 Firewall Load Balancing 325 212777 A February 2002 Web OS 10 0 Application Guide Four Subnet FWLB The four subnet FWLB method is often deployed in large networks that require high availabil ity solutions This method uses filtering static routing and Virtual Router Redundancy Proto col VRRP to provide parallel firewall operation between redundant Web switches Figure 13 5 shows one possible network topology using the four subnet method Dirty Side Clean Side Subnet 1 Subnet 2 Subnet 3 Subnet 4 Primary Primary Internet Routers Simple Simple Switches Switches Secondary Firewalls Secondary Web Switch Web Switch Servers Figure 13 5 Four Subnet FWLB Topology This network is classified as a high availability network because no single component or link failure could cause network resources to become unavailable Simple switches and vertical block interswitch connections are used to provide multiple paths for network failover Nor mally the interswitch link between the primary and secondary Web switches is configured on port 9 of the Web switch However the interswitch links may trunked together with multiple ports for additional protection from failure NOTE Other topologies that use internal hubs or diagonal cross connections between the Web s
150. vrid 2 2 if 2 2 prio 101 2 2 2 2 2 addr 10 0 0 1 share dis track Priority Priority Tracking Tracking addr 192 168 10 50 vrs ena ports ena cfg vrrp vr 2 vrs ena ports ena 7 Enable SLB gt gt VRRP Virtual Router 1 Priority Tracking cfg slb on 8 Configure real servers for health checking VPN devices gt gt oS oe gt gt Layer 4 real 1 ena rip 20 0 0 10 Real server 1 Real server 2 Real server 3 real 2 ena rip 20 0 0 11 real 3 ena rip 20 0 0 20 real 4 ena rip 20 0 0 21 9 Enable the real server group gt gt Real server 1 gt gt Real server group 1 metric hash gt gt Real server group 1 add 1 add 2 add 3 add 4 group 1 Alteon Z Systems 212777 A February 2002 Chapter 14 Virtual Private Network Load Balancing m 363 Web OS 10 0 Application Guide 10 Configure the filters to allow local subnet traffic on the dirty side of the VPN device to reach the VPN device interfaces erd gt gt 22 gt gt oe gt gt gt gt gt gt gt gt gt gt ilt 100 ena sip any dip 192 168 10 0 dmask 255 255 255 0 action allow filt 110 ena sip any dip 224 0 0 0 dmask 255 0 0 0 action allow 11 Create a filter to allow the management firewall Policy Server to reach the VPN firewall gt gt gt gt gt gt gt gt gt gt Se E OS
151. yet been sent and the buffer size set for the queue is full any new frames attempting to be placed in the queue will be discarded URL Based Bandwidth Management URL based BWM allows the network administrator or Web site manager to control bandwidth based on URLs HTTP headers or cookies All three types of BWM are accomplished by following the configuration guidelines on con tent switching described in Chapter 15 Content Intelligent Switching You would also need to assign a contract to each defined string where the string is contained in a URL an HTTP header or a cookie BWM based on URLs gives Web site managers the following capabilities E Ability to allocate bandwidth based on the type of request The switch allocates bandwidth based on certain strings in the incoming URL request For example as shown in Figure 17 4 if a Web site has 1OMbs of bandwidth the site manager can allocate 1 Mbs of bandwidth for static HTML content 3Mbs of bandwidth for graphic content and 4Mbs of bandwidth for dynamic transactions such as URLs with cgi bin requests and asp requests Ability to prioritize transactions or applications By allocating bandwidth the Web switch can guarantee that certain applications and trans actions get better response time Ability to allocate a certain amount of bandwidth for requests that can be cached As shown in Figure 17 5 on page 450 users will be able to allocate a certain percentage of
152. 0 RISP eee a TA 155 392 topology considerations ccssceesseeeeeees 122 virtual IP address VIP sscececeeees 120 122 Virtual SCrVeTrs scsssessesssseeeeeeeeeeeeees 120 126 WANIINKS Sirise tesos ceesre ea 166 a E E E 158 WEISS ieie ERRE EEE 134 S ryer POOL svi secueescvas esene iaaea 118 server port processing 123 SERVICE Taute esarion rnia ee a E A R 246 Alteon Z Systems 212777 A February 2002 SELVICE O o E E 128 171 setting multiple response count eeseeeeeeeeeereeeeee 432 shared SETVICES css sccnnscinsoceeedstteseetedednnocesrocndedeeoess 118 SIP source IP address for filtering 008 178 smask source mask for filtering eeeeeeeeeeeeeeeee 178 SMTP persente E Or EEEE T EEES 304 SNMP aoea EENE TE 74 Spanning Tree Protocol eliminating bridge loops with VRRP 279 multiple instances eeeeeceeseeeeseeeeeeneeeeeeaes 51 replacing with hot standby failover 275 WLANS voren siaina RE eonecthieds 48 49 spoofing prevention Of eeseseessseeerrerererereeeereee 99 sport filtering option seeeeseeeereeeereerne 186 209 SSH RSA host and server keys ceeeseeeeeseeeees 109 SSH SCP CONFIQUIING sececeeseeseteeceseeeceeeeeeeeseeeees 111 supported client commands esseceeeeees 112 stateful failover sccsiascsssocs eeuieversscecdensnes vongeescaaness 283 Static NAT ccosa e E E E 191 Static session
153. 0 r n r n expect HTTP 1 0 200 The server is not responding to the get with the expect string When the script succeeds in determining the health of a real server the following information is displayed gt gt info slb real 1 1 205 178 13 223 00 00 5e 00 01 24 vlan 1 port 2 health 4 up real ports script 2 up current Alteon WebSystems Chapter 10 Health Checking m 229 212777 A February 2002 Web OS 10 0 Application Guide Application Specific Health Checks Application specific health checks include the following applications HTTP Health Checks on page 231 UDP Based DNS Health Checks on page 233 FTP Server Health Checks on page 234 POP3 Server Health Checks on page 235 SMTP Server Health Checks on page 236 IMAP Server Health Checks on page 237 NNTP Server Health Checks on page 238 RADIUS Server Health Checks on page 239 HTTPS SSL Server Health Checks on page 240 WAP Gateway Health Checks on page 240 O WSP Content Health Checks on page 241 O WTLS Health Checks on page 242 E LDAP Health Checks on page 243 230 Chapter 10 Health Checking Alteon systems A February Web OS 10 0 Application Guide HTTP Health Checks HTTP based health checks can include the hostname for HOST headers The HOST header and health check URL are constructed from the following components Item Option Configured
154. 1 High Availability m 271 212777 A February 2002 Web OS 10 0 Application Guide 3 Set the renter priority for each virtual router Since you want Switch 1 to be the master router you need to bump the default virtual router priorities which are 100 to 101 on virtual routers 1 4 to force switch 1 to be the master for these virtual routers Use the following sequence of commands gt gt Virtual server 4 cfg vrrp vr 1 Select virtual router 1 gt gt Virtual router 1 prio 101 Set virtual router priority Apply this sequence of commands to the following virtual routers assigning each a priority of 101 E VR 2 Priority 101 E VR 3 Priority 101 E VR 4 Priority 101 4 Configure priority tracking parameters for each virtual router For this example the best parameter s on which to track is Layer 4 ports 14pts Use the following command gt gt Virtual server 4 cfg vrrp vr 1 track 14pts This command sets the priority tracking parameter for virtual router 1 electing the virtual router with the most available ports as the master router Repeat this command for the follow ing virtual routers E VR 2 Track l4pts VR 6 Track l4pts E VR 3 Track l4pts VR 7 Track 4pts E VR 4 Track l4pts VR 8 Track 4pts Switch 1 configuration is complete 272 m Chapter 11 High Availability Alteon e systems A February Web OS 10 0 Application Guide Task 4 Configuring Switch 2 Use the fol
155. 10 10 10 2 All four host routes are injected into the upstream router and advertised externally Traffic comes in for both virtual server IP addresses 10 10 10 1 and 10 10 10 2 The upstream router sees that both addresses exist on both Web switches and uses the host route with the lowest cost for each Traffic for 10 10 10 1 goes to Web switch 1 because its host route has the low est cost for that address Traffic for 10 10 10 2 goes to Web switch 2 because its host route has the lowest cost This effectively shares the load among ABRs Both Web switches then use standard Server Load Balancing SLB to distribute traffic among available real servers In addition if one of the Web switches were to fail the upstream routing device would forward the traffic to the ABR whose host route has the next lowest cost In this example the remaining Web switch would assume the entire load for both virtual servers Web Switch 1 Backbone een i poures Stub Area Area0 1010102 Cost100 7 Area p 7 Preferred path Pag Pi lowest cost to Host Route 3 N 10 10 10 1 s N I sT aT 5 Real Servers with Identical _ Content Preferred path X lowest cost T 7 X b Host Route 7 Pid Ss ee E eo Virtual Servers Host Routes 10 10 10 1 Cost 100 10 10 10 2 Cost 1 ABR Load Sharing Standard SLB Figure 4 8 Configuring OSPF Host Routes 92 m Chapter 4 OSPF Alteon WebSystems 212777 A February 2002 We
156. 12 3 Denver Real Server IP Addresses Real Server IP address Server C 179 14 70 2 Server D 179 14 70 2 2 On the Denver switch define each local real server gt gt Default gateway 1 cfg slb real 1 Server C is real server 1 gt gt Real server 1 rip 179 14 70 2 Assign IP address for Server C gt gt Real server 1 ena Enable real server 1 gt gt Real server 1 real 2 Server D is real server 2 gt gt Real server 2 rip 179 14 70 3 Assign IP address for Server D gt gt Real server 2 ena Enable real server 2 300 Chapter 12 Global Server Load Balancing Alteon WebSystems 212777 A February 2002 3 On the Denver switch define a real server group Web OS 10 0 Application Guide gt gt 2S gt gt gt gt gt gt Real Real Real Real Real server Server Server server server 2 gro group 1 group 1 group 1 group 1 up 1 add 1 add 2 health http content index html Set URL content for health checks Select real server group 1 Add real server 1 to group 1 Add real server 2 to group 1 Use HTTP for health checks 4 On the Denver switch define a virtual server oe gt gt gt gt gt gt Virt Virt Virt Virt gt gt Real server group 1 virt 1 ual server 1 vip 179 14 70 1 ual server 1 service http Select virtual server 1 Assign IP address Select the HTTP service menu ual server 1 http se
157. 12777 A February 2002 Web OS 10 0 Application Guide To configure OSPF passwords on the Web switches shown in Figure 4 4 use the following commands 1 Enable OSPF authentication for Area 0 on Web switches 1 2 and 3 gt gt cfg ip ospf aindex 0 auth password Turn on OSPF password authenti cation 2 Configure a simple text password up to eight characters for each OSPF IP interface in Area 0 on Web switches 1 2 and 3 gt gt cfg ip ospf if 1 gt gt OSPF Interface 1 key test gt gt OSPF Interface 1 if 2 gt gt OSPF Interface 2 key test gt gt OSPF Interface 1 if 3 gt gt OSPF Interface 3 key test 3 Enable OSPF authentication for Area 2 on Web switch 4 gt gt cfg ip ospf aindex 2 auth password Turn on OSPF password authenti cation 4 Configure a simple text password up to eight characters for the virtual link between Area 2 and Area 0 on Web switches 2 and 4 gt gt cfg ip ospf virt 1 key alteon Alteon Systems Chapter 4 OSPF 81 212777 A February 2002 Web OS 10 0 Application Guide Host Routes for Load Balancing Web OS 10 0 implementation of OSPF includes host routes Host routes are used for advertis ing network device IP addresses to external networks accomplishing the following goals Server Load Balancing SLB within OSPF Host routes advertise virtual server IP addresses to external networks Thi
158. 12777 A February 2002 Web OS 10 0 Application Guide 4 The firewalls decide if they should allow the packets and if so forwards them to a virtual server on the clean side Web switch Client requests are forwarded or discarded according to rules configured for each firewall NOTE Rule sets must be consistent across all firewalls 5 The clean side Web switch performs normal SLB functions Packets forwarded from the firewalls are sent to the original destination address that is the vir tual server on the clean side Web switch There they are load balanced to the real servers using standard SLB configuration 6 The real server responds to the client request 7 Redirection filters on the clean side Web switch balance responses among different IP addresses Redirection filters are needed on all ports on the clean side Web switch that attach to real serv ers or internal clients on the clean side of the network Filters on these ports redirect the Inter net bound traffic to a real server group that consists of a number of different IP addresses Each IP address represents an IP interface on a different subnet on the dirty side Web switch 8 Outbound traffic is routed to the firewalls Static routes are configured on the clean side switch One static route is needed for each stream that was configured on the dirty side Web switch For instance the first static route would be configured to lead to the first dirty side IP
159. 178 13 110 MAC address 00 00 5E OO 01 02 MAC address 00 00 5E OO 01 04 MAC address 00 00 5E OO 01 06 Web Switch 2 Backup Active VR 1 Master Active VR 2 Backup Active VR 3 VRID 2 VRID 4 VRID 6 VIP 205 178 13 226 VIP 205 178 13 240 VIP 205 178 13 110 MAC address 00 00 5E OO 01 02 MAC address 00 00 5E OO 01 04 MAC address 00 00 5E OO 01 06 When sharing is used incoming packets are processed by the switch on which they enter the virtual router The ingress switch is determined by external factors such as routing and Span ning Tree configuration NOTE Sharing cannot be used in configurations where incoming packets have more than one entry point into the virtual router for example where a hub is used to connect the switches 260 Chapter 11 High Availability Alteon e systems A February Web OS 10 0 Application Guide When sharing is enabled the master election process still occurs Although the process does not affect which switch processes packets that must be routed or that are destined for the vir tual server IP address it does determine which switch sends advertisements and responds to ARP requests sent to the virtual router s IP address Web OS strongly recommends that sharing rather than active standby configurations be used whenever possible Sharing offers both better performance and fewer service interruptions in the face of fault conditions than active standby configurations Tracking VRRP Router Prio
160. 2 Web OS 10 0 Application Guide VRRP Overview In a high availability network topology no device can create a single point of failure for the network or force a single point of failure to any other part of the network This means that your network will remain in service despite the failure of any single device To achieve this usually requires redundancy for all vital network components VRRP enables redundant router configurations within a LAN providing alternate router paths for a host to eliminate single points of failure within a network Each participating VRRP capable routing device is configured with the same virtual router IP address and ID number One of the virtual routers is elected as the master based on a number of priority criteria and assumes control of the shared virtual router IP address If the master fails one of the backup virtual routers will take control of the virtual router IP address and actively process traffic addressed to it Because the router associated with a given alternate path supported by VRRP uses the same IP address and MAC address as the routers for other paths the host s gateway information does not change no matter what path is used A VRRP based redundancy schema reduces adminis trative overhead because hosts need not be configured with multiple default gateways VRRP Components Each physical router running VRRP is known as a VRRP router Virtual Interface Router Two or more VRRP rout
161. 2 Configure IP interfaces on the primary dirty side Web switch Three IP interfaces IF s are used IF 1 is on placed on Subnet 1 IF 2 will be used for routing traffic through the top firewall IF 3 will be used for routing traffic through the lower firewall To avoid confusion IF 2 and IF 3 will be used in the same way on all Web switches gt gt cfg ip if 1 gt gt mask 255 255 255 0 gt gt addr 195 1 1 10 gt gt ena gt gt if 2 gt gt mask 255 255 255 0 gt gt addr 10 10 2 1 gt gt vlan 2 gt gt ena gt gt if 3 gt gt mask 255 255 255 255 gt gt addr 10 10 2 2 gt gt vlan 2 gt gt ena NOTE By configuring the IP interface mask prior to the IP address the broadcast address is automatically calculated Also only the first IP interface in a given subnet is given the full sub net range mask Subsequent IP interfaces such as IF 3 are given individual masks 3 Turn Spanning Tree Protocol STP off for the primary dirty side Web switch gt gt cfg stp offt Alteon WebSystems Chapter 13 Firewall Load Balancing 331 212777 A February 2002 Web OS 10 0 Application Guide 4 Configure static routes on the primary dirty side Web switch Four static routes are required E To primary clean side IF 2 via Firewall 1 using dirty side IF 2 E To primary clean side IF 3 via Firewall 2 using dirty side IF 3 E To secondary clean side IF 2 via Fir
162. 2 VLAN 3 Gigabit Tagged adapter All VLANs Shared Media PC 1 PC 2 PC 3 PC 4 PC 5 VLAN 2 VLAN 2 VLAN 1 VLAN 3 Gigabit Tagged adapter VLANs 1 amp 2 Figure 2 1 Example 1 Multiple VLANs with Tagging Gigabit Adapters The features of this VLAN are described below Component Description Web Switch This switch is configured for three VLANs that represent three differ ent IP subnets Two servers and five clients are attached to the switch Server 1 This server is part of VLAN 3 and only has presence in one IP subnet The port that the VLAN is attached to is configured only for VLAN 3 so VLAN tagging is off Server 2 This high use server needs to be accessed from all VLANs and IP sub nets The server has an VLAN tagging adapter installed with VLAN tagging turned on The adapter is attached to one of the Web switch s Gigabit Ethernet ports that is configured for VLANs 1 2 and 3 Tag ging is turned on Because of the VLAN tagging capabilities of both the adapter and the switch the server is able to communicate on all three IP subnets in this network Broadcast separation between all three VLANs and subnets however is maintained 46 m Chapter 2 VLANs Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Component Description PCs 1 and 2 These PCs are attached to a shared media hub that is then connected to the switch They belong to VLAN 2 and are
163. 2 1 20 1 1 10 Internet y 20 1 1 2 Dirty Side 10 1 2 10 Figure 13 4 Basic FWLB Example Network Configure the Dirty Side Web Switch 1 Configure VLANs NOTE Alternately if using hubs between the switches and firewalls and you do not wish to configure VLANs you must enable Spanning Tree Protocol to prevent broadcast loops 2 Define the dirty side IP interface In addition to one IP interface for general switch management there must be one dirty side IP interface for each firewall path being load balanced Each must be on a different subnet gt gt cfg ip if 1 Select IP interface 1 gt gt IP Interface 1 addr 192 16 12 1 Set address for switch management gt gt IP Interface 1 mask 255 255 255 0 Set subnet mask for interface 1 gt gt IP Interface 1 ena Enable IP interface 1 gt gt IP Interface 1 if 2 Select IP interface 2 gt gt IP Interface 2 addr 10 1 1 1 Set the IP address for interface 2 gt gt IP Interface 2 mask 255 255 255 0 Set subnet mask for interface 2 gt gt IP Interface 2 ena Enable IP interface 2 gt gt IP Interface 2 if 3 Select IP interface 3 gt gt IP Interface 3 addr 10 1 2 1 Set the IP address for interface 3 gt gt IP Interface 3 mask 255 255 255 0 Set subnet mask for interface 3 gt gt IP Interface 3 ena Enable IP interface 3 Alteon Z Systems Chapter 13 Firewall Load Balancing 319 212777 A
164. 20 real 21 gt gt Real server 21 ena Enable real server 21 gt gt Real server 21 rip 10 10 10 21 Specify the IP address gt gt Real server 20 real 22 gt gt Real server 22 ena Enable real server 22 gt gt Real server 22 rip 10 10 10 22 Specify the IP address gt gt Real server 20 real 26 gt gt Real server 26 ena Enable real server 26 gt gt Real server 26 rip 10 10 10 26 Specify the IP address 3 Configure group 1 for UDP and group 2 for TCP gt gt cfg slb group 1 Select real server group 1 gt gt Real server group 1 metric roundrobin Specify the load balancing metric for group 1 gt gt Real server group 1 health udpdns Set the health check to UDP gt gt Real server group 1 add 20 Add real server 20 gt gt Real server group 1 add 21 Add real server 21 gt gt Real server group 1 group 2 gt gt Real server group 2 metric roundrobin Specify the load balancing metric for group 2 gt gt Real server group 2 health dns Set the health check to TCP gt gt Real server group 2 add 22 Add real server 22 gt gt Real server group 2 add 26 Add real server 26 For more information on configuring health check see UDP Based DNS Health Checks on page 233 4 Define and enable the server ports and the client ports For more information see Step 6 Define the port settings on page 126 Some DNS servers in
165. 200 200 104 will load balance FTP Ports 20 21 to Group 4 4 Define the client and server port states Defining a client port state tells that port to watch for any frames destined for the VIP and to load balance them if they are destined for a load balanced service Defining a server port state tells the port to the do the remapping NAT of the real server IP address back to the virtual server IP address Note the following E The ports connected to the upstream switches the ones connected to the routers will need to be in the client port state E The ports connected to the downstream switches the ones providing fan out for the serv ers will need to be in the server port state Configure the ports using the following sequence of commands gt gt Virtual server 4 cfg slb port 1 Select physical switch port 1 gt gt SLB port Al client ena Enable client processing on port 1 gt gt SLB port Al port 2 Select physical switch port 2 gt gt SLB port A2 server ena Enable server processing on port 2 270 m Chapter 11 High Availability Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide Task 3 Virtual Router Redundancy Configuration 1 Configure virtual routers 2 4 6 and 8 These virtual routers will have the same IP addresses as the virtual server IP address This is what tells the switch that these are virtual service routers VSRs In this example Layer 3 bind
166. 200 200 200 200 Alteon Web switch IP 200 200 200 1 IP 210 210 210 1 Real server 1 Real server 2 IP 200 200 200 10 IP 200 200 200 11 Figure 1 4 BGP Failover Configuration Example On the Web switch one peer router the secondary one is configured with a longer AS path than the other so that the peer with the shorter AS path will be seen by the switch as the pri mary default gateway ISP 2 the secondary peer is configured with a metric of 3 thereby appearing to the switch to be three router hops away 1 Configure the switch as you normally would for Server Load Balancing SLB Assign an IP address to each of the real servers in the server pool Define each real server Define a real server group Define a virtual server Define the port configuration For more information about SLB configuration refer to Chapter 6 38 m Chapter 1 Basic IP Routing Alteon eLSystems A February Web OS 10 0 Application Guide 2 Define the VLANs For simplicity both default gateways are configured in the same VLAN in this example The gateways could be in the same VLAN or different VLANs gt gt cfg vlan 1 Select VLAN 1 gt gt vlan 1 add lt port number gt Add a port to the VLAN membership gt gt vlan 1 ena Enable VLAN 1 3 Define the IP interfaces The switch will need an IP interface for each default gateway to which it will be connected Each interface will need to be placed in the
167. 22 186 0 From the Web servers source IP address gt gt Filter 10 smask 255 255 255 0 For the entire subnet range gt gt Filter 10 sport any From any source port gt gt Filter 10 proto tcp For TCP traffic gt gt Filter 10 dip any To any destination IP address gt gt Filter 10 dport smtp To well known destination SMTP port gt gt Filter 10 action allow Allow matching traffic to pass gt gt Filter 10 ena Enable the filter 198 m Chapter 7 Filtering Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide 2 A filter that allows SMTP traffic from the Internet to pass through the switch only if the destination is one of the Web servers and the frame is an acknowledgment ACK of a TCP session gt gt gt gt gt gt gt gt gt gt oe gt gt ae gt gt gt gt gt gt Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil cer L cer L cer L Cer L cer cer L Cer Cer L CEF Cer l CEE L ilt 15 sip any sport smtp proto tcp dip 203 122 186 0 dmask 255 255 255 0 dport any action allow ena adv tcp Advanced ack ena Select a filter for Internet SMTP ACKs From any source IP address From well known source SMTP port For TCP traffic To the Web servers IP address To the entire subnet range To any destination port Allow matching traffic to pass Enable the filter Select the advanced TCP menu
168. 3 2 Primary Default Router 1 4 Secondary Default Router 1 5 3 Common Servers 1 5 6 Common Servers 2 5 7 2 Add the switch ports to their respective VLANs The VLANs shown in Table 1 3 are configured as follows gt gt cfg vlan 1 Select VLAN 1 gt gt VLAN 1 add port 1 Add port for Ist floor to VLAN 1 gt gt VLAN 1 add port 2 Add port for 2nd floor to VLAN 1 gt gt VLAN 1 add port 3 Add port for 3rd floor to VLAN 1 gt gt VLAN 1 ena Enable VLAN 1 gt gt VLAN 1 VLAN 2 Select VLAN 2 gt gt VLAN 2 add port 4 Add port for default router 1 gt gt VLAN 2 add port 5 Add port for default router 2 gt gt VLAN 2 ena Enable VLAN 2 gt gt VLAN 2 VLAN 3 Add port for default router 3 gt gt VLAN 3 add port 6 Select VLAN 3 gt gt VLAN 3 add port 7 Select port for common server 1 gt gt VLAN 3 ena Enable VLAN 3 Alteon WebSystems Chapter 1 Basic IP Routing 33 212777 A February 2002 Web OS 10 0 Application Guide Each time you add a port toa VLAN you may get the following prompt Port 4 is untagged and VLAN 2 is not a configured PVID for port 4 Would you like to change all PVIDS for port 4 to VLAN 2 y n Enter y to set the default Port VLAN ID PVID for the port 3 Add each IP interface to the appropriate VLAN Now that the ports are separated into three VLANs the IP interface for each subnet must be placed in the appropriate VLAN From Table 1 3 on page 33 t
169. 5 Apply and save your changes gt gt apply gt gt save gt gt boot reset Configure Connectivity for the Secondary Clean Side Web Switch 1 Configure VLANs on the secondary clean side Web switch gt gt cfg vlan 3 gt gt add 3 gt gt add 9 gt gt ena gt gt vlan 4 gt gt add 4 gt gt ena Alteon Z Systems Chapter 13 Firewall Load Balancing 335 212777 A February 2002 Web OS 10 0 Application Guide 2 Configure IP interfaces on the secondary clean side Web switch gt gt cfg ip if 1 S gt mask 255 255 255 0 gt gt addr 10 10 4 11 gt gt vlan 4 gt gt ena gt gt Jif 2 gt gt mask 255 255 255 0 gt gt addr 10 10 3 11 gt gt vlan 3 gt gt ena gt gt if 3 gt gt mask 255 255 255 255 gt gt addr 10 10 3 12 gt gt vlan 3 gt gt ena 3 Turn STP off for the secondary clean side Web switch gt gt cfg stp offt 4 Configure static routes on the secondary clean side Web switch gt gt cfg ip frwd route gt gt add 10 10 2 1 255 255 255 255 10 10 3 3 2 gt gt add 10 10 2 2 255 255 255 255 10 10 3 4 3 gt gt add 10 10 2 11 255 255 255 255 10 10 3 3 2 gt gt add 10 10 2 12 255 255 255 255 10 10 3 4 3 5 Apply and save your changes gt gt apply gt gt save gt gt boot reset 336 Chapter 13 Firewall Load Bal
170. 77 A February 2002 Chapter 14 Virtual Private Network Load Balancing m 357 Web OS 10 0 Application Guide One static route is required for each VPN device being load balanced 2 gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt 2 gt gt gt gt gt gt gt gt 23 gt gt gt IP IP IP EP IP iP IP IP IP IP IP IP IP IP IP IP Static Static Static Static Static Static Static Static Static Static Static Static Static Static Static Static Rou Rou Rou Rou Rou Rou Rou Rou Rou Rou Rou Rou Rou Rou Rou Rou gt gt cfg ip route te add 10 0 0 10 te 255 255 255 255 te 20 0 0 101 te 2 te add 10 0 0 11 te 255 255 255 255 te 20 0 0 102 te 3 te add 10 0 0 20 te 255 255 255 255 te 20 0 0 101 te 2 te add 10 0 0 21 te 255 255 255 255 te 20 0 0 102 te 3 Static route destination IP address Destination subnet mask Enter gateway IP address For interface 2 Enter destination IP address Destination subnet mask Enter gateway IP address For interface 3 Enter destination IP address Destination subnet mask Enter gateway IP address For interface 2 Static route destination IP address Destination subnet mask Enter gateway IP address For interface 3 6 Configure VRRP for virtual routers 1 and 2 22 gt gt gt gt gt gt 22 gt gt gt gt gt gt gt
171. 777 A February 2002 Web OS 10 0 Application Guide 4 Enable OSPF on Web switch 2 gt gt IP Interface 2 ospf on Enable OSPF on Web switch 2 5 Define the backbone gt gt Open Shortest Path First aindex 0 Select menu for area index 0 gt gt OSPF Area index 0 areaid 0 0 0 0 Set the ID for backbone area 0 gt gt OSPF Area index 0 type transit Define backbone as transit type gt gt OSPF Area index 0 enable Enable the area 6 Define the stub area gt gt OSPF Area index 0 aindex 1 Select menu for area index 1 gt gt OSPF Area index 1 areaid 0 0 0 1 Set the ID for stub area 1 gt gt OSPF Area index 1 type stub Define area as stub type gt gt OSPF Area index 1 enable Enable the area 7 Attach the network interface to the backbone gt gt OSPF Area index 1 if 1 Select OSPF menu for IP interface 1 gt gt OSPF Interface 1 aindex 0 Attach network to backbone index gt gt OSPF Interface 1 enable Enable the backbone interface 8 Attach the network interface to the stub area gt gt OSPF Interface 1 if 2 Select OSPF menu for IP interface 2 gt gt OSPF Interface 2 aindex 1 Attach network to stub area index gt gt OSPF Interface 2 enable Enable the stub area interface Alteon Systems Chapter 4 OSPF 97 212777 A February 2002 Web OS 10 0 Application Guide 9
172. 78 13 226 Web Switch Virtual Interface Router Internet r 3 Host 1 Default Gateway 205 178 13 226 lt ii VRRP Router VRID 1 Router 2 Backup Standby VR IP address 205 178 13 226 MAC address 00 00 SE 00 01 01 Priority 100 IP interface 205 178 13 225 Router Figure 11 1 Example 1 VRRP Router Web switch 1 in Figure 11 1 has its real interface configured with the IP address of the virtual interface router and is therefore the IP address owner It also becomes the virtual router mas ter Web switch 2 is a virtual router backup Its real interface is configured with an IP address that is on the same subnet as the virtual interface router but is not the IP address of the virtual interface router The virtual interface router has been assigned a VRID 1 Therefore both of the VRRP rout ers have a MAC address 00 00 5E 00 01 01 250 Chapter 11 High Availability Alteon e systems A February Web OS 10 0 Application Guide VRRP Operation The host shown in Figure 11 1 is configured with the virtual interface router s IP address as its default gateway The master forwards packets destined to remote subnets and responds to ARP requests In this example the master is also the virtual interface router s IP address owner therefore it also responds to ICMP ping requests and IP datagrams destined for the virtual interface router s IP address The backup does not forward any traffic on beha
173. 8 m Chapter 15 Content Intelligent Switching Alteon e systems A February Web OS 10 0 Application Guide 7 Enable SLB on the switch gt gt cfg slb on Turn SLB on 8 Enable DAM on the switch or configure a proxy IP address on the client port E To turn on DAM gt gt cfg slb adv direct ena E To turn off DAM and configure a proxy IP address on the client port gt gt cfg slb direct dis gt gt port 2 pip 12 12 12 12 gt gt proxy ena NOTE By enabling DAM on the switch or alternatively disabling DAM and configuring a Proxy IP address on the client port port mapping for URL load balancing can be performed 9 Enable URL based SLB on the virtual server s gt gt cfg slb virt lt virtual server number gt service 80 httpslb urlslb Statistics for URL Based Server Load Balancing To show the number of hits to the SLB or cache server use this command gt gt stats slb layer7 1b Sample Statistics ID SLB String Hits 1 any 73881 2 gif 0 3 sales 0 4 xitami 162102 5 manual 0 6 jpg 0 Alteon Z Systems Chapter 15 Content Intelligent Switching 379 212777 A February 2002 Web OS 10 0 Application Guide Virtual Hosting Web OS allows individuals and companies to have a presence on the Internet in the form of a dedicated Web site address For example you can have a www site a com and
174. B 155 Wireless Application Protocol SLB 158 Intrusion Detection System Server Load Balancing 163 WAN Link Load Balancing 166 Chapter 7 Filtering 169 Overview 170 Filtering Benefits 170 Filtering Criteria 170 Stacking Filters 172 Overlapping Filters 172 The Default Filter 173 VLAN based Filtering 174 Optimizing Filter Performance 176 Filter Logs 176 IP Address Ranges 178 Cache Enabled versus Cache Disabled Filters 178 TCP Rate Limiting 179 Configuring TCP Rate Limiting Filters 180 Tunable Hash for Filter Redirection 184 Filter based Security 185 Network Address Translation 191 Static NAT 191 Dynamic NAT 193 FTP Client NAT 195 Matching TCP Flags 197 Matching ICMP Message Types 201 6 Contents Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide Chapter 8 Application Redirection 203 Overview 204 Web Cache Redirection Environment 204 Additional Application Redirection Options 205 RTSP Web Cache Redirection 211 IP Proxy Addresses for NAT 213 Excluding Noncacheable Sites 215 Chapter 9 Virtual Matrix Architecture 217 Chapter 10 Health Checking 219 Real Server Health Checks 221 DSR Health Checks 222 Link Health Checks 223 Configuring the Switch for Link Health Checks 223 TCP Health Checks 224 ICMP Health Checks 224 Script Based Health Checks 225 Configuring the Switch for Script Based Health Checks 225 Script Format 226 Scripting Guidelines 227 Script Configuration Examples 227 Application Spe
175. Command Line Interface CLI as the administrator E Optional Layer 4 software must be enabled NOTE For details about the procedures above and about any of the menu commands described in this example see the Web OS Command Reference In this example an Alteon Web switch is placed between the clients and the border gateway to the Internet The Web switch will be configured to intercept all Internet bound HTTP requests on default TCP port 80 and redirect them to the Web cache servers The Web switch will distribute HTTP requests equally to the Web cache servers based on the destination IP address of the requests Also filters are not limited to the few protocols and TCP or UDP applications shown in this example See Table 6 3 on page 128 and Table 7 2 on page 171 for a list of other well known protocols and services 1 Assign an IP address to each of the Web cache servers Similar to server load balancing the Web cache real servers are assigned an IP address and placed into a real server group The real servers must be in the same VLAN and must have an IP route to the Web switch that will perform the Web cache redirection In addition the path from the Web switch to the real servers must not contain a router The router would stop HTTP requests from reaching the Web cache servers and instead directing them back out to the Internet More complex network topologies can be used if configuring IP proxy addresses see IP Pr
176. E HEE ilt 120 ena sip 192 168 10 120 smask 255 255 255 255 dip 10 0 0 0 dmask 255 255 255 0 12 Create the redirection filter and enable firewall load balancing This filter will redirect inbound traffic redirecting it among the defined real servers in the group gt gt ae gt gt gt gt gt gt gt gt 22 Se OSH OR OS ERE ilt 224 ena sip any dip any action redir filt 224 adv fwlb ena 13 Add filters to the ingress port gt gt port 1 gt gt filt ena gt gt add 100 add 110 add 224 14 Apply and save the configuration and reboot the switch gt gt apply gt gt save gt gt boot reset 364 m Chapter 14 Virtual Private Network Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Configure the Second Dirty Side WebSwitch DB 1 Turn off BOOTP gt gt cfg sys bootp dis 2 Define and enable VLAN 2 for ports 7 and 8 gt gt cfg vlan 2 ena def 7 8 3 Turn off STP gt gt cfg stp offt 4 Configure IP interfaces 1 2 and 3 gt gt cfg ip if 1 ena mask 255 255 255 0 addr 192 168 10 11 gt gt cfg ip if 2 ena mask 255 255 255 0 addr 10 0 0 20 v1 2 gt gt cfg ip if 3 ena mask 255 255 255 255 addr 10 0 0 21 vl1 2 5 Configure routes for each of the IP interfaces you configured in Step 4
177. Figure 12 6 on page 310 shows how to add entries into a GSLB proximity table Two client networks A and B are configured in the proximity table on the master switch at Site 4 Client A with a subnet address of 205 178 13 0 is configured with static entries for preferred Sites 1 and 3 Client B with a subnet address of 204 165 0 0 is con figured with static entries for preferred Sites 2 and 4 Alteon WebSystems Chapter 12 Global Server Load Balancing m 309 212777 A February 2002 Web OS 10 0 Application Guide Client A with a source IP address of 205 178 13 10 initiates a request that is sent to the local DNS server The local DNS server is configured to forward requests to the DNS server at Site 4 The Web switch at Site 4 looks up its proximity table and finds Client A prefers to connect to Sites 1 or 3 Similarly Client B s requests are always forwarded to Sites 2 or 4 1 Client sites A and B send requests to their DNS servers which are forwarded to the master switch at Site 4 2 The master switch looks through its proximity table and responds to the DNS request by providing the virtual IP address of the preferred site 3 The client sends out a new request and connects to the preferred site Web Servers Master switch returns Client s request with the VIP of the preferred site Web _ IF 2 2 2 2 24 F 3 3 3 3 16 Web Servers P 2 2 2 100 3 3 3 100 Servers Figure 12 6 Configuring Client Proxim
178. For more information on how to map a virtual server port to a real server port see Mapping Ports on page 139 144 m Chapter 6 Server Load Balancing Alteon 2 Systems A February Web OS 10 0 Application Guide Monitoring Real Servers Typically the management network is used by network administrators to monitor real servers and services By configuring the mnet and mmask options of the SLB Configuration Menu cf g slb adv you can access the real services being load balanced NOTE Clients on the management network do not have access to SLB services and cannot access the virtual services being load balanced The mnet and mmask options are described below E mnet If defined management traffic with this source IP address is allowed direct non SLB access to the real servers Only specify an IP address in dotted decimal notation A range of IP addresses is produced when used with the mmask option E mmask This IP address mask is used with mnet to select management traffic that is allowed direct real server access only Alteon WebSystems Chapter 6 Server Load Balancing m 145 212777 A February 2002 Web OS 10 0 Application Guide Delayed Binding The delayed binding feature on the switch prevents SYN Denial of Service DoS attacks on the server DoS occurs when the server or switch is denied servicing the client because it is sat urated with invalid traffic Typically a three way handshake occurs before a
179. HTTP port Allow matching traffic to pass Enable the filter Alteon Z Systems 212777 A February 2002 Chapter 7 Filtering m 199 Web OS 10 0 Application Guide 5 A default filter is required to deny all other traffic gt gt 2 gt gt gt gt gt gt gt gt Fil Fil Fil Fil Fil Fil cer cer cer cer cer Cer 17 224 224 224 224 224 filt 224 Select a default filter sip any From any source IP address dip any To any destination IP address action deny Block matching traffic name deny matching traffic Provide a descriptive name for the filter ena Enable the filter 6 Apply the filters to the appropriate switch ports gt gt Filter 224 port 1 Select the Internet side port gt gt SLB port 1 add 15 Add the SMTP ACK filter to the port gt gt SLB port 1 add 16 Add the incoming HTTPS filter gt gt SLB port 1 add 224 Add the default filter to the port gt gt SLB port 1 filt ena Enable filtering on the port gt gt SLB port 1 port 2 Select the first Web server port gt gt SLB port 2 add 10 Add the outgoing SMTP filter to the port gt gt SLB port 2 add 17 Add the outgoing HTTP filter to the port gt gt SLB port 2 add 224 Add the default filter to the port gt gt SLB port 2 filt ena Enable filtering on the port gt gt SLB port 2 port 3 Select the other Web server port gt
180. Host was specified and matched first E HTTP Host and URL SLB The HTTP Host header takes precedence because it is specified first Because and is the operator both a Host Header and URL string are required If either is not available the request is dropped oOo Ifa request from a client contains a URL string such as gold but not a Host Header it is not served by any real server oO Ifa request from a client contains a URL string such as gold and Host Header it is served only by real server 3 Alteon WebSystems Chapter 15 Content Intelligent Switching 415 212777 A February 2002 Web OS 10 0 Application Guide Assigning Multiple Strings Figure 15 8 shows an example of a company providing content for two large customers Cus tomers A and B Customer A uses www a com as their domain name and Customer B uses www b com The company has a limited number of public IP addresses and wishes to assign them on a very conservative basis As a result the company implements virtual hosting by advertising a single virtual server IP address that includes both customers Web sites Additionally the hosting company assigns only one service HTTP port 80 to support the virtual server The virtual hosting company wishes to maintain the flexibility to allow different types of con tent to be placed on different servers To make most efficient use of their server resources they separate their servers into two groups usin
181. Hot Standby Configuration A hot standby configuration allows all processes to failover to a backup switch if any type of failure should occur The primary application for hot standby redundancy is to avoid bridging loops when using the Spanning Tree Protocol STP IEEE 802 1d VRRP based hot standby supports the default Spanning Tree only It does not support multiple Spanning Trees Figure 11 10 shows a classic network topology designed with redundancy in mind This topol ogy contains bridging loops that would require the use of STP In the typical network STP failover time is 45 50 seconds much longer than the typical failover rate using VRRP only NOTE To use hot standby redundancy peer switches must have an equal number of ports Active Side Legend 1 L4 ports are configured as Hot Standby 2 Crosslink is configured as Interswitch link Servers Figure 11 10 Hot Standby Configuration NOTE In complex networks STP convergence time can be much higher than 45 50 seconds If VRRP was used in this configuration it would require STP An important factor to consider is that the switch would be affected by the slower failover time of STP even if VRRP were in use While VRRP can be used without STP in this scenario doing so would involve a more com plex network configuration requiring multiple subnets and or VLANs and enabling IP for warding to route between them Alteon WebSystems Chapter 11
182. ID are directed to Server 1 Web Server Farm Figure 16 5 SSL Session ID Based Persistence 5 Client 2 appears to the switch to have the same source IP address as Client 1 because they share the same proxy firewall However the Web switch does not automatically direct Client 2 traffic to Server 1 based on the source IP address Instead an SSL session ID for the new traffic is assigned Based on SLB set tings the connection from Client 2 is spliced to Server 3 As a result subsequent connections from Client 2 with the same SSL session ID are directed to Server 3 438 Chapter 16 Persistence Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Configuring SSL Session ID Based Persistence To configure session ID based persistence for a real server perform the following steps 1 Configure real servers and services for basic SLB as indicated below E Define each real server and assign an IP address to each real server in the server pool E Define a real server group and set up health checks for the group E Define a virtual server on the virtual port for HTTPS for example port 443 and assign a real server group to service it E Enable SLB on the switch E Enable client processing on the port connected to the client For information on how to configure your network for SLB see Server Load Balancing on page 117 2 Ifa proxy IP address is not configured on the client port enable DAM for real
183. Interface BBD When the switch reboots it will retrieve the host and server keys from the FLASH memory If these two keys are not available in the flash and if the SSH server feature is enabled the switch will automatically generate them during the system reboot The switch can also automatically regenerate the RSA server key To set the interval of RSA server key autogeneration use this command gt gt cfg sys sshd intrval lt number of hours 0 24 gt where the number of hours must range between 0 24 and a value of 0 denotes that RSA server key autogeneration is disabled When greater than 0 the switch will autogenerate the RSA server key every specified interval however RSA server key generation will be skipped if the switch is busy doing other key or cipher generation when the timer expires Alteon WebSystems Chapter 5 Secure Switch Management 109 212777 A February 2002 Web OS 10 0 Application Guide Radius Authentication SSH SCP is integrated with RADIUS authentication After the RADIUS server is enabled on the switch all subsequent SSH authentication requests will be redirected to the specified RADIUS servers for authentication The redirection is transparent to the SSH clients SecurlD Support SSH SCP can also work with SecurID a token card based authentication method The use of SecurID requires the interactive mode during login which is not provided by the SSH connec tion NOTE Th
184. JP address owner All virtual server routers are renters All virtual routers whether virtual server routers or virtual interface routers operate indepen dently of one another that is their priority assignments advertisements and master negotia tions are separate For example when you configure a VRRP router s priority in a virtual server router you are not affecting that VRRP router s priority in any virtual interface router or any other virtual server router of which it is a part However because of the requirement that MAC addresses be unique on a LAN VRIDs must be unique among all virtual routers whether virtual interface routers or virtual server routers Alteon WebSystems Chapter 11 High Availability m 259 212777 A February 2002 Web OS 10 0 Application Guide Sharing Active Active Failover Web OS supports sharing of interfaces at both Layer 3 and Layer 4 as shown in Figure 11 7 With sharing an IP interface or a VIP address can be active simultaneously on multiple switches enabling active active operation as shown in Table 11 2 Master Active VR 1 Backup Active VR 2 Master Active VR 3 Router Internet Roer Backup Active VR 1 Master Active VR 2 Backup Active VR 3 Figure 11 7 Active Active High Availability Table 11 2 Sharing Active Active Failover Web Switch 1 Master Active VR 1 Backup Active VR 2 Master Active VR 3 VRID 2 VRID 4 VRID 6 VIP 205 178 13 226 VIP 205 178 13 240 VIP 205
185. LANs 51 212777 A February 2002 Web OS 10 0 Application Guide Example of a Four Switch Topology with a Single Spanning Tree In the four switch topology example shown in Figure 2 4 on page 52 and assuming Web switch A has a higher priority you can have at least three loops on the network E Data flowing from Web switches A to B to C and back to Web switch A E Data flowing from Web switches A to C to D and back to Web switch A E Data flowing from Web switches A to B to C to D and back to Web switch A With a single Spanning Tree environment as shown in Figure 2 4 you will have two links blocked to prevent loops on the network It is possible that the blocks may be between Web switches C and D and between Web switches B and C depending on the bridge priority port priority and port cost The two blocks would prevent looping on the network but the blocked link between Web switches B and C will inadvertently isolate VLAN 3 altogether NOTE For more information on bridge priority port priority and port cost see the Web OS 10 0 Command Reference Web Switch A Web Switch D Web Switch B Web Switch C Figure 2 4 VLAN 3 Isolated in a Single Spanning Tree Group 52 m Chapter 2 VLANs Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Example of a Four Switch Topology with Multiple Spanning Trees If multiple Spanning Trees are implemented and each VLAN is on a different Spanning Tree
186. LB with the following tasks Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server Assign servers to real server groups Define virtual servers and services For information on how to configure your network for SLB see Chapter 6 Server Load Bal ancing 2 Turn on URL parsing for the virtual server gt gt cfg slb virt 1 gt gt Virtual Server 1 service 80 gt gt Virtual Server 1 http Service httpslb cookie Enter Cookie Name sid Enter the starting point of the Cookie value 1 64 1 Enter the number of bytes to extract 1 64 6 Look for Cookie in URI eld d where sid cookie name 1 offset the starting position of the value to be used for hashing 6 length the number of bytes in the cookie value d looks for the cookie in the cookie header instead of the URI disables searching for cookie in the URD 3 Define the cookie values gt gt cfg slb layer7 slb add Gold gt gt add Silver gt gt add Bronze Since a session cookie does not exist in the first request of an HTTP session a default server or any server is needed to assign cookies to a None cookie HTTP request 384 m Chapter 15 Content Intelligent Switching Alteon e Systems A February Web OS 10 0 Application Guide Example E Real Server 1 Gold handles gold requests E Real Se
187. LY PES cs isccceraehiecovstevededvereosnedesessasenbosens authentication configuration examples ceeeeeee 84 to 98 Cefault route ceceesececeeessseeceeesesteeceeeees 78 external rOUteS oirean ireren ndsti Ei 82 filtering Criteria lees ceeseeeeeeeeeeeneeeeees 171 HOStTOUtSs Aane e r a i 82 link state database cccccccssscecssseeeseeeeeees 72 MEISNDOLS EE E E 72 CONA aTa E T 69 redistributing routes seceeseeeceeeeeeeneeeeenes 82 route SUMMAFIZATION ecceeseeceeeeceeseeeeeees 77 router Dns A Ee virtual link overflow servers P parallel Tinks ospis soioinareoi nieis 48 password administrator account sccececceeeeeeeeseeees 105 default PDUS iieo persistence cookie based ienei ieee eena 424 multi reponse cookie search sscceeseeeeees 436 SSL session ID based sseeeeeeee 437 to 439 Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide persistent Pinding Sse aa E eras 123 POLE SESSIONS 5 sc cesereeseovereseasseeesnueednninsoese 286 PIP See proxies proxy IP address port mapping port MAMOTING csecsen nin reser ane anses ar TERESE 113 port processing mode CLE piecsingeinseneeecngsiniss enesis ionsar neeese none server port states port trunking configuration example sscceseeeesseeeeeeees 67 CESCTIPLON ssis isio iero esseri 68 HtherChamnel si c 20cca
188. Load Balancing Before configuring your Web switch for RTSP load balancing do the following E Enable Virtual Matrix Architecture VMA Enable Direct Access Mode DAM E E Disable port based Bandwidth Management E Disable proxy IP addressing 1 To configure a virtual server for Layer 4 load balancing of RTSP select rtsp or port 554 as a service for the virtual server gt gt cfg slb virt lt virtual server number gt service rtsp 2 To configure a virtual server for Layer 7 URL hashing of RTSP select rt sp as a virtual service and enable rt sps1b This command enables URL hashing using the entire URL however any extension of the type xxx occurring at the end of the URL is omitted from hash computation gt gt cfg slb virt 1 service rtsp rtspslb hash pattern dis 3 Apply and save your configuration gt gt Virtual Server 2 rtsp Service apply gt gt Virtual Server 2 rtsp Service save Alteon WebSystems Chapter 6 Server Load Balancing m 157 212777 A February 2002 Web OS 10 0 Application Guide Wireless Application Protocol SLB Wireless Application Protocol WAP is an open global specification for a suite of protocols designed to allow wireless devices to communicate and interact with other devices It empowers mobile users with wireless devices to easily access and interact with information and services instantly by allowing non voice data such as text and images to
189. MZ contains its own servers that provide dirty side clients with access to services making it unnecessary for dirty side traffic to use clean side resources FWLB with Alteon Web switches provides a variety of options that enhance firewall perfor mance and resolve typical firewall problems 314 m Chapter 13 Firewall Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Alteon Web switches support the following methods of FWLB Basic FWLB for simple networks This method uses a combination of static routes and redirection filters and is usually employed in smaller networks A Web switch filter on the dirty side splits incoming traffic into streams headed for differ ent firewalls To ensure persistence of session traffic through the same firewall distribu tion is based on a mathematical hash of the IP source and destination addresses For more information about basic FWLB see Basic FWLB on page 316 Four Subnet FWLB for larger networks Although similar to basic FWLB the four subnet method is more often deployed in larger networks that require high availability solutions This method adds Virtual Router Redun dancy Protocol VRRP to the configuration Just as with the basic method four subnet FWLB uses the hash metric to distribute fire wall traffic and maintain persistence For more information see Four Subnet FWLB on page 326 Each method is described in more detail in th
190. OS 10 0 Application Guide Configuring a Filter Based Security Solution Before you begin you must be connected to the switch CLI as the administrator In this example all filters are applied only to the switch port that connects to the Internet If intranet restrictions are required filters can be placed on switch ports connecting to local devices Also filtering is not limited to the few protocols and TCP or UDP applications shown in this example See Table 7 1 on page 171 and Table 7 2 on page 171 for a list of other well known protocols and applications 1 Assign an IP address to each of the network devices For this example the network devices have the following IP addresses on the same IP subnet Table 7 4 Web Cache Example Real Server IP Addresses Network Device IP address Local Subnet 205 177 15 0 205 177 15 255 Web Server 205 177 15 2 Mail Server 205 177 15 3 Domain Name Server 205 177 15 4 2 Create a default filter that will deny and log unwanted traffic The default filter is defined as Filter 224 in order to give it the lowest order of precedence gt gt cfg slb filt 224 Select the default filter gt gt Filter 224 sip any From any source IP addresses gt gt Filter 224 dip any To any destination IP addresses gt gt Filter 224 proto any For any protocols gt gt Filter 224 action deny Deny matching traffic gt gt Filter 224 name deny unwanted traffic Provide a descri
191. P 1 1 Host everest Configuring the Switch for HTTP Health Checks Perform the following on the switch to configure the switch for HTTP health checks 1 Select the real server group gt gt cfg slb group 1 Select a real server group 2 Set the health check type to FTP for the real server group gt gt cfg slb group 1 health http 3 Configure the health check content gt gt cfg slb group 1 content lt filename gt 4 Apply and save your configuration gt gt Real server group 1 apply gt gt Real server group 1 save 232 m Chapter 10 Health Checking Alteon 2bSystems A February Web OS 10 0 Application Guide UDP Based DNS Health Checks Web OS 10 0 supports UDP based health checks along with TCP health checks and performs load balancing based on TCP and UDP protocols DNS servers can be based on both TCP and UDP protocols With UDP based DNS health checks enabled you can send TCP based queries to one real server group and UDP based que ries to another real server group The health check may be performed by sending a UDP based query for example for www nortelnetworks com and watching for the server s reply The domain name to be que ried may be modified by specifying the content command if you need to change the domain name Configuring the Switch for UDP based Health Checks Configure the switch to verify if the DNS server is ali
192. P Interface 1 gw 1 Select default gateway 1 gt gt Default gateway 1 addr 200 200 200 101 Assign IP address for the gateway gt gt Default gateway 1 ena Enable default gateway 1 4 Configure the local DNS server to recognize the local GSLB switch as the authoritative name server for the hosted services Determine the domain name that will be distributed to both sites and the host name for each distributed service In this example the California DNS server is configured to recognize 200 200 200 100 the IP interface of the California GSLB switch as the authoritative name server for www foocorp com Alteon WebSystems Chapter 12 Global Server Load Balancing 295 212777 A February 2002 Web OS 10 0 Application Guide Task 2 Configure the California Switch for Standard SLB 1 Assign an IP address to each of the real servers in the local California server pool The real servers in any real server group must have an IP route to the switch that will perform the SLB functions This is most easily accomplished by placing the switches and servers on the same IP subnet although advanced routing techniques can be used as long as they do not vio late the topology rules outlined in Network Topology Requirements on page 122 For this example the host real servers have IP addresses on the same IP subnet Table 12 1 GSLB Example California Real Server IP Addresses Real Server IP address Server A 200 200
193. P Peer Routers 37 BGP Failover Configuration 37 DHCP Relay 41 DHCP Overview 41 DHCP Relay Agent Configuration 42 Chapter 2 VLANs 43 VLAN ID Numbers 44 VLAN Tagging 44 VLANs and the IP Interfaces 45 VLAN Topologies and Design Issues 45 Example 1 Multiple VLANS with Tagging Adapters 46 Example 2 Parallel Links with VLANs 48 Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide 4 Contents VLANs and Spanning Tree Protocol 49 Bridge Protocol Data Units BPDUs 50 Multiple Spanning Trees 51 VLANs and Default Gateways 58 Segregating VLAN Traffic 58 Configuring the Local Network 60 Configuring Default Gateways per VLAN 60 VLANs and Jumbo Frames 63 Isolating Jumbo Frame Traffic using VLANs 63 Routing Jumbo Frames to Non Jumbo Frame VLANs 64 Chapter 3 Port Trunking 65 Overview 65 Statistical Load Distribution 66 Built In Fault Tolerance 66 Port Trunking Example 67 Chapter 4 OSPF 69 OSPF Overview 69 Types of OSPF Areas 70 Types of OSPF Routing Devices 71 Neighbors and Adjacencies 72 The Link State Database 72 The Shortest Path First Tree 73 Internal Versus External Routing 73 OSPF Implementation in Web OS 74 Configurable Parameters 74 Defining Areas 75 Interface Cost 77 Electing the Designated Router and Backup 77 Summarizing Routes 77 Default Routes 78 Virtual Links 79 Router ID 80 Authentication 80 Host Routes for Load Balancing 82 OSPF Features Not Supported in This Release 82 Alteon Z
194. P Rate Limiting Web OS 10 0 allows you to prevent a client or a group of clients from claiming all the TCP resources on the servers This is done by monitoring the rate of incoming TCP connection requests to a virtual IP address and limiting the client requests with a known set of IP addresses TCP rate limiting is similar to bandwidth management In both features you configure filters to limit the TCP connection requests but in bandwidth management the limiting factor is port based and in TCP rate limit it is user based The TCP rate limit is defined as the maximum number of TCP connection requests within a configured time window The switch monitors the number of new TCP connections and when it exceeds the configured limit any new TCP connection request is blocked When this occurs the client is said to be held down The client is held down for a specified duration of time after which new TCP connection requests from the client are allowed to pass through again Figure 7 5 on page 180 shows four clients configured for TCP rate limits based on source IP address Clients 1 and 4 have the same TCP rate limit of 10 connections per second Client 2 has a TCP rate limit of 20 connections per second Client 3 has a TCP rate limit of 30 connec tions per second When the rate of new TCP connections from clients 1 2 3 and 4 reach a pre determined threshold any new connection request from the client is blocked for a pre determined amount of
195. P address when the server is in Direct Server Return DSR mode Link Health Checks on page 223 This section describes how to perform Layer 1 health checking on an Intrusion Detection Server IDS TCP Health Checks on page 224 TCP health checks help verify the TCP applications that cannot be scripted ICMP Health Checks on page 224 This section explains how ICMP health checks are used for UDP services Script Based Health Checks on page 225 This section describes how to configure the switch to send a series of health check requests to real servers or real server groups and monitor the responses Application based health checks O HTTP Health Checks on page 231 This section provides examples of HTTP based health checks using hostnames O UDP Based DNS Health Checks on page 233 This section explains the functional ity of the DNS Health Checks using UDP packets Alteon Z Systems 219 212777 A February 2002 Web OS 10 0 Application Guide O FTP Server Health Checks on page 234 This section describes how the File Trans fer Protocol FTP server is used to perform health checks and explains how to con figure the switch to perform FTP health checks O POP3 Server Health Checks on page 235 This section explains how to use Post Office Protocol Version 3 POP3 mail server to perform health checks between a cli ent system and a mail server and how to configure the switch for POP3
196. P interface and instead distributes it across the remaining healthy Web switch IP interfaces and firewalls When a Web switch IP interface is in the Server Failed state its partner Web switch continues to send pings to it at user configurable intervals After a specified number of successful pings the IP interface and its associated firewall is brought back into service For example to configure the switch to allow one second intervals between health checks or pings two failed health checks to remove the firewall and four successful health checks to restore the firewall to the real server group use the following command gt gt cfg slb real lt real server number gt inter 1 retry 2 restr 4 Physical Link Monitoring Web switches also monitor physical link status of switch ports connected to firewalls If the physical link to a firewall goes down that firewall is placed immediately in the Server Failed state When a Web switch detects that a failed physical link to a firewall has been restored it brings the firewall back into service Alteon WebSystems Chapter 13 Firewall Load Balancing m 351 212777 A February 2002 Web OS 10 0 Application Guide Using HTTP Health Checks For those firewalls that do not permit ICMP pings to pass through Web switches can be con figured to perform HTTP health checks as described below 1 Set the health check type to HTTP instead of ICMP gt gt cfg slb group 1 hea
197. S 10 0 Application Guide 3 Configure Filter 7 to deny traffic and then assign VLAN 70 to the filter As a result ingress traffic from VLAN 70 is denied entry to the switch gt gt cfg slb filt 7 Select the menu for Filter 7 gt gt Filter 7 sip any From any source IP address gt gt Filter 7 dip 205 177 15 0 To base local network dest address gt gt Filter 7 dmask 255 255 255 0 For entire subnet range gt gt Filter 7 proto tcp For TCP protocol traffic gt gt Filter 7 sport http From a Telnet port gt gt Filter 7 dport any To any destination port gt gt Filter 7 action deny Allow matching traffic to pass gt gt Filter 7 vlan 70 Assign VLAN 70 to Filter 7 gt gt Filter 7 ena Enable the filter Optimizing Filter Performance Filter efficiency can be increased by placing filters that are used most often near the beginning of the filtering list It is arecommended practice to number filters in small increments 5 10 15 20 etc to make it easier to insert filters into the list at a later time However as the number of filters increases you can improve performance by minimizing the increment between filters For example fil ters numbered 2 4 6 and 8 are more efficient than filters numbered 20 40 60 and 80 Peak processing efficiency is achieved when filters are numbered sequentially beginning with 1 Filter Logs To provide enhanced troubleshooting an
198. SLB is done on the ingress port that is the port on which the frame is received not the client port or the server port If the traffic classification is filter based or SLB traffic then the classification occurs on the designated port NOTE VMA is recommended when Bandwidth Management is enabled Bandwidth management occurs on the egress port of the switch that is the port from which the frame is leaving However in the case of multiple routes or trunk groups the egress port can actually be one of several ports from the point of view of where the queues are located Rate management is controlled by using queues for each contract and by scheduling when frames are sent from each queue Each frame is put into a managed buffer and placed on a contract queue The time that the next frame is supposed to be transmitted for the contract queue is calculated according to the configured rate of the contract the current egress rate of the ports and the buffer size set for the contract queue The scheduler then organizes all the frames to be sent according to their time based ordering and meters them out to the port NOTE Bandwidth management and port mirroring cannot be enabled at the same time Alteon Z Systems Chapter 17 Bandwidth Management 443 212777 A February 2002 Web OS 10 0 Application Guide Bandwidth Policies Bandwidth policies are bandwidth limitations defined for any set of frames specifying the
199. SYN request before it reaches the server The Web switch responds to the client with a SYN ACK that contains embedded client information The Web switch does not allocate a session until a valid SYN ACK is received from the client or the three way handshake is complete 146 m Chapter 6 Server Load Balancing Alteon 2 Systems A February Web OS 10 0 Application Guide Normal Request with Delayed Binding Client Web Switch Server Client sends a SYN request gt Switch responds with special SYN ACK Client sends an ACK or DATA REQ gt Switch recognizes valid three way handshake Switch sends a SYN request to server gt 4 Server responds with SYN ACK k Switch sends ACK or DATA REQ gt Server responds with DATA and switch splices connection to client wW y DoS SYN Attack with Delayed Binding Client Web Switch Server Ci Client sends a SYN request gt Switch responds with special SYN ACK Client sends new SYN requests gt No session entry is made until a valid Switch responds with another SYN ACK three way handshake is complete o e Switch and server resources are e protected for legitimate requests Figure 6 10 Repelling DoS SYN Attacks With Delayed Binding Once the Web switch receives a valid ACK or DATA REQ from the client the Web switch sends a SYN request to the server on behalf of the client waits for the server to respond with a SYN ACK and then fo
200. Security Policy VPN LAB CONFIG1 j5 Address Translation VPN No Source Destination Service Action LIGOS Install On FD FD PAT VPN connection establishment traffic 8 any amp custerP 8 Ft topo accept BI Ep Long E Gateways E Any sec H Switches s Switches IS icmp proto Be ow o Figure 14 3 Checkpoint Rules for Both VPN Devices as Seen in the Policy Editor Health checki do not los A accept oa Gateways checking pings do g ma El ann E RR E all dude e E vpnusers Any E intranet Any E Client Encrypt E3 Long fe Gateways pone 1 Disconnect the cables cause failures to change the available servers that are up gt gt info slb dump Verify which servers are up This should change the VRRP preferences You can view VRRP preferences using the CLI command info vrrp 2 Use the Checkpoint Log Viewer to watch for accepted and dropped traffic In the tool bar above click on Window then Log Viewer NOTE To help simplify the logs the health checks are not logged 368 Chapter 14 Virtual Private Network Load Balancing Alteon 2bSystems 212777 A February 2002 Web OS 10 0 Application Guide Test the VPN 1 Launch the SecuRemote client on the dirty side of the network 2 Add a new site Create New Site Eg Ej l 3 Enter the policy server IP address 192 168 10 120 You have the option of adding a nickname 4 Lau
201. Select the menu for Filter 2 From any source IP address To base local network dest address For entire subnet range For TCP protocol traffic From any source HTTP port To any destination port Allow matching traffic to pass Assign VLAN 20 to Filter 2 Enable the filter All clients from other VLANs will be ignored 2 Configure filter 3 to allow local clients to Telnet anywhere outside the local intranet and then assign VLAN 30 to the filter The filter must recognize and allow TCP traffic to reach the local client destination IP addresses if originating from a Telnet source port gt gt gt gt gt gt oe gt gt gt gt gt gt oo gt gt gt gt gt gt cfg slb filt 3 Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil cer Ler cer cer cer cer cer cer cer cer 3 WWW WW WwW Ww Ww sip any dip 205 177 15 0 dmask 255 255 255 0 proto tcp sport telnet dport any action allow name allow clients to telnet vlan 30 ena Select the menu for Filter 3 From any source IP address To base local network dest address For entire subnet range For TCP protocol traffic From a Telnet port To any destination port Allow matching traffic to pass Provide a descriptive name for the filter Assign VLAN 30 to Filter 3 Enable the filter Alteon Z Systems 212777 A February 2002 Chapter 7 Filtering m 175 Web O
202. Ss have two physical interfaces One is used to detect intrusions and the other is used to generate logging The first interface detects intrusions but it does not have TCP IP stack So it is not possible to perform any health check other than Layer 1 health checking on the IDS As long as the physical link between the switch and the IDS is up it indicates the IDS is alive To perform this health check a link option has been added to the real server group health com mand The real server number is used to determine which port the server is connected to For example real server 1 is assumed to be connected to port 1 The valid IDS real server numbers are from to 9 when health check is in use Configuring the Switch for Link Health Checks Configure the switch to verify if the IDS server is alive by performing the following tasks 1 Select the health check menu for real server group 1 gt gt cfg slb group 1 2 Set the health check type to link for real server group 1 gt gt Real server group 1 health Current health check type tep Enter health check type link 3 Apply and save your configuration gt gt Real server group 1 apply gt gt Real server group 1 save Alteon WebSystems Chapter 10 Health Checking m 223 212777 A February 2002 Web OS 10 0 Application Guide TCP Health Checks TCP health checks are useful in verifying user specific TCP applications that canno
203. Systems 212777 A February 2002 Web OS 10 0 Application Guide OSPF Configuration Examples 83 Example 1 Simple OSPF Domain 84 Example 2 Virtual Links 86 Example 3 Summarizing Routes 90 Example 4 Host Routes 92 Verifying OSPF Configuration 98 Chapter 5 Secure Switch Management 99 Setting Allowable Source IP Address Ranges 100 Secure Switch Management 101 Authentication and Authorization 101 Requirements 102 RADIUS Authentication and Authorization 103 RADIUS Authentication Features in Web OS 104 Web Switch User Accounts 105 Secure Shell and Secure Copy 107 Encryption of Management Messages 108 SCP Services 108 RSA Host and Server Keys 109 Radius Authentication 110 SecurID Support 110 Port Mirroring 113 Part 2 Web Switching Fundamentals Chapter 6 Server Load Balancing 117 Understanding Server Load Balancing 118 Identifying Your Network Needs 118 How Server Load Balancing Works 119 Implementing Basic Server Load Balancing 121 Network Topology Requirements 122 Configuring Server Load Balancing 124 Additional Server Load Balancing Options 128 Extending SLB Topologies 136 Proxy IP Addresses 136 Mapping Ports 139 Direct Server Interaction 142 Delayed Binding 146 Alteon Systems Contents 5 212777 A February 2002 Web OS 10 0 Application Guide Load Balancing Special Services 149 IP Server Load Balancing 149 FTP Server Load Balancing 150 Domain Name Server DNS Load Balancing 151 Real Time Streaming Protocol SL
204. Systems Chapter 15 Content Intelligent Switching 405 212777 A February 2002 Web OS 10 0 Application Guide 7 Add the defined string IDs to configure the real server s to handle the appropriate load balance string s gt gt cfg slb real 2 layer7 addlb lt D gt where ID is the identification number of the defined string NOTE If you don t add a defined string or add the ID 1 the server will handle any request URL Hashing for Web Cache Redirection By default hashing algorithms use the source IP address and or destination IP address depending on the application area to determine content location For example firewall load balancing uses both source and destination IP addresses WCR uses only the destination IP address and SLB uses only the source IP address Hashing is based on the URL including the HTTP Host header if present up to a maximum of 255 bytes You can optimize cache hits by using the hashing algorithm to redirect client requests going to the same page of an origin server to a specific cache server For example the switch could use the string nortelnetworks com products 180 for hashing the following request GET http products 180 HTTP 1 0 HOST www nortelnetworks com To configure the switch for WCR based on a hash key use the following procedure 1 Configure basic SLB Before you can configure header based cache redirection ensure that the switch has a
205. Systems Chapter 4 OSPF 75 212777 A February 2002 Web OS 10 0 Application Guide Using the Area ID to Assign the OSPF Area Number The OSPF area number is defined in the areaid lt P address gt option The octet format is used in order to be compatible with two different systems of notation used by other OSPF net work vendors There are two valid ways to designate an area ID E Placing the area number in the last octet 0 0 0 7 Most common OSPF vendors express the area ID number as a single number For exam ple the Cisco IOS based router command network 1 1 1 00 0 0 255 area 1 defines the area number simply as area 1 On the Web switch using the last octet in the area ID area 1 is equivalent to areaid 0 0 0 1 BH Miulti octet UP address Some OSPF vendors express the area ID number in multi octet format For example area 2 2 2 2 represents OSPF area 2 and can be specified directly on the Web switch as areaid 2 2 2 2 NOTE Although both types of area ID formats are supported be sure that the area IDs are in the same format throughout an area Attaching an Area to a Network Once an OSPF area has been defined it must be associated with a network To attach the area to a network you must assign the OSPF area index to an IP interface that participates in the area The format for the command is as follows gt gt cfg ip ospf if lt interface number gt aindex lt area inde
206. Take care to note where each configured value originates or this step can result in improper configuration 298 Chapter 12 Global Server Load Balancing Alteon e Systems A February Web OS 10 0 Application Guide 3 On the California switch define the domain name and host name for each service hosted on each virtual server In this example the domain name for the Foo Corporation is foocorp com and the host name for the only service HTTP is www These values are configured as follows gt gt Real server group 1 virt 1 Select virtual server 1 gt gt Virtual server 1 dname foocorp com Define domain name gt gt Virtual server 1 service 80 hname www Define HTTP host name To define other services such as FTP make additional hostname entries 4 On the California switch turn on GSLB gt gt Virtual server 1 gslb Select the GSLB Menu gt gt Global SLB on Activate GSLB for the switch 5 Apply and verify the configuration gt gt Global SLB apply Make your changes active gt gt Global SLB cur View current GSLB settings gt gt Global SLB cfg slb cur View current SLB settings Examine the resulting information If any settings are incorrect make and apply any appropri ate changes and then check again 6 Save your new configuration changes gt gt Layer 4 save Save for restore after reboot Task 4 Configure
207. The design of WAN link load balancing is identical to standard redirection except that it substitutes the source IP address of each frame with the proxy IP address of the port to which the WAN link is connected Configuring WAN Link Load Balancing Before configuring the Web switch for WAN Link load balancing make sure of the following E Disable NAT Web Cache Redirection WAN Link load balancing and NAT Web Cache Redirection cannot be configured on the same switch E Configure the load balancing metric for response time only E Do not configure your ports into trunk groups E Do not configure WAN link load balancing with two or more WAN links connected through the same switch port This feature uses the proxy IP address of the destination port when translating the source IP address of the requests 166 m Chapter 6 Server Load Balancing Alteon 2 Systems A February Web OS 10 0 Application Guide To configure the switch for WAN link load balancing 1 Define a real server with proxy disabled gt gt cfg slb real 1 Select the real server menu gt gt Real server 1 ena Enable real server 1 gt gt Real server 1 rip lt IP address gt Set the real server IP address gt gt Real server 1 proxy dis Disable proxy 2 Add the real server to a real server group using the response metric gt gt cfg slb group 1 gt gt Real server group 1 add 1 gt gt Real server group 1 metric response
208. Then assign the BWM contract to the vir tual server Repeat this procedure for a second virtual server NOTE This classification applies to the services within the virtual server and not to the virtual server itself The classification policy for these BWM contracts is based on a virtual server One of the BWM contracts will be applied to any frames that are sent to the virtual server associated with that contract gt gt BWM Contract 2 cfg slb virt 1 cont 1 Assign contract to virtual server 1 gt gt Virtual Server 1 vip 100 2 16 2 Set virtual server VIP address gt gt Virtual Server 1 ena Enable this virtual server gt gt Virtual Server 1 cfg slb virt 2 cont 2 Assign contract to virtual server gt gt Virtual Server 2 vip 100 2 16 3 Set virtual server IP address gt gt Virtual Server 2 ena Enable this virtual server On the switch apply and verify the configuration gt gt Virtual Server 2 apply Make your changes active gt gt Virtual Server 2 cfg bwm cur View current BWM settings Examine the resulting information If any settings are incorrect make the appropriate changes On the switch save your new configuration changes gt gt Bandwidth Management save Save for restore after reboot On the switch check the bandwidth management information gt gt Bandwidth Management info bwm lt contract number gt View BWM information
209. VLANs configured on the switch Routing Between IP Subnets The physical layout of most corporate networks has evolved over time Classic hub router topologies have given way to faster switched topologies particularly now that switches are increasingly intelligent Alteon Web switches are intelligent and fast enough to perform rout ing functions on a par with wire speed Layer 2 switching The combination of faster routing and switching in a single device provides another service it allows you to build versatile topologies that account for legacy configurations 28 m Chapter 1 Basic IP Routing Alteon 2 Systems A February Web OS 10 0 Application Guide For example consider the following topology migration oo Admin Sales Jus z a x w w Hub Switch Eng Subnet M Eng Staff2 Sales LJ ua ma SIL war Hub Switch Staff Subnet S w Hub Server Subnet Server Staff Eng2 E a Mie x s Switch Internet Internet Router Figure 1 1 The Router Legacy Network In this example a corporate campus has migrated from a router centric topology to a faster more powerful switch based topology As is often the case the legacy of network growth and redesign has left the system with a mix of illogically distributed subnets This is a situation that switching alone cannot cure Instead the router is flooded with cross subnet communication This c
210. Web OS 10 0 Application Guide 5 Optional Set the TOS byte value between 0 255 for the policy underlimit and over limit There are two parameters for specifying the TOS bits underlimit utos and overlimit otos These TOS values are used to overwrite the TOS values of IP packets if the traffic for a contract is under or over the soft limit respectively These values only have significance to a contract if TOS overwrite is enabled in the Bandwidth Management Contract Menu cfg bwm cont x wtos ena The administrator has to be very careful in selecting the TOS values because of their greater impact on the downstream routers gt gt Policy 1 utos 204 Set BWM policy underlimit gt gt Policy 1 otos 192 Set BWM policy overlimit 6 Set the buffer limit for the policy Set a value between 8192 128000 bytes The buffer depth fora BWM contract should be set to a multiple of the packet size NOTE Keep in mind that the total buffer limit for the Bandwidth Management policy is 128K gt gt Policy 1 buffer 16320 Set BWM policy buffer limit 7 On the switch select a BWM contract and optional a name for the contract Each contract must have a unique number from to 256 gt gt Policy 1 cfg bwm cont 1 Select BWM contract 1 gt gt BWM Contract 1 name BigCorp Assign contract name BigCorp 8 Optional Set a precedence value for the BWM contract Each contract
211. Web OS 10 0 Application Guide The network needs a solution that addresses the following key concerns E The solution must be readily scalable E The administrator should not need to reconfigure all the clients browsers to use proxy servers HTTP requests are redirected HTTP Client Switch Requests Clients Cache farm proxies client requests G Internet Client Switch Router _ Figure 8 2 Network with Web Cache Redirection Adding an Alteon Web switch with optional Layer 4 software addresses these issues m Web cache servers can be added or removed dynamically without interrupting services E Performance is improved by balancing the cached Web request load across multiple serv ers More servers can be added at any time to increase processing power E The proxy is transparent to the client E Frames that are not associated with HTTP requests are normally passed to the router Additional Application Redirection Options Application redirection can be used in combination with other Layer 4 options such as load balancing metrics health checks real server group backups and more See Additional Server Load Balancing Options on page 128 for details Alteon WebSystems Chapter 8 Application Redirection m 205 212777 A February 2002 Web OS 10 0 Application Guide Web Cache Configuration Example The following is required prior to configuration E You must connect to the Web switch
212. Web OS Switch Software 10 0 Application Guide Part Number 212777 Revision A February 2002 NORTEL NETWORKS 50 Great Oaks Boulevard San Jose California 95119 408 360 5500 Main 408 360 5501 Fax hh www nortelnetworks com S gt Alteon Systems Intelligent Webworking Web OS 10 0 Application Guide Copyright 2002 Nortel Networks Inc 50 Great Oaks Boulevard San Jose California 95119 USA All rights reserved Part Number 212777 Revision A This document is protected by copyright and distributed under licenses restricting its use copying distribution and decompilation No part of this document may be reproduced in any form by any means without prior written authorization of Nortel Networks Inc Documentation is provided as is without warranty of any kind either express or implied including any kind of implied or express warranty of non infringement or the implied warranties of merchantability or fitness for a particular purpose U S Government End Users This document is provided with a commercial item as defined by FAR 2 101 Oct 1995 and contains commercial technical data and commercial software documentation as those terms are used in FAR 12 211 12 212 Oct 1995 Government End Users are authorized to use this documentation only in accordance with those rights and restrictions set forth herein consistent with FAR 12 211 12 212 Oct 1995 DFARS 227 7202 JUN 1995 and DFARS 252
213. Web switch and are configured as if they are real servers NOTE Remember that IF 2 is used on all Web switches whenever routing through the top firewall and IF 3 is used on all Web switches whenever routing through the lower firewall gt gt oo gt gt oS gt gt gt gt gt gt oS gt gt gt gt gt gt gt gt cfg slb on real 1 rip 10 10 2 1 IF2 of the primary dirty side Web switch ena real 2 rip 10 10 2 2 IF2 of the primary dirty side Web switch ena group 1 add 1 add 2 metric hash NOTE The clean side Web switch must use the same metric as defined on the dirty side For information on using metrics other than hash see Free Metric FWLB on page 346 Alteon WebSystems Chapter 13 Firewall Load Balancing 341 212777 A February 2002 Web OS 10 0 Application Guide 2 Create an SLB real server group on the primary clean side Web switch to which traffic will be load balanced The external clients intend to connect to HTTP services at a publicly advertised IP address The servers on this network are load balanced by a virtual server on the clean side Web switch SLB options are configured as follows gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt 22 gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt Pa gt gt gt gt gt gt gt gt cfg slb r
214. When the user on a client host wants to enter a message into the transport system it establishes an SMTP connection to its relay host and sends all mail to it Initially the server host starts the POP3 service by listening on TCP port 110 When a client host wants to make use of the service it establishes a TCP connection with the server host Configuring the Switch for POP3 Health Checks To support health checking on the UNIX POP3 server the network administrator must config ure a username password value in the switch using the content option on the SLB real server group menu cfg slb group To configure the switch for POP3 health checks 1 Select the real server group gt gt cfg slb group 1 Select a real server group 2 Set the health check type to POP3 for the real server group gt gt cfg slb group 1 health pop3 3 Configure the health check content gt gt cfg slb group 1 content lt username gt lt password gt 4 Apply and save your configuration gt gt Real server group 1 apply gt gt Real server group 1 save Alteon WebSystems Chapter 10 Health Checking 235 212777 A February 2002 Web OS 10 0 Application Guide SMTP Server Health Checks Simple Mail Transfer Protocol is a protocol to transfer e mail messages between servers reli ably and efficiently This protocol traditionally operates over TCP port 25 and is documented
215. Z Systems 115 212777 A February 2002 Web OS 10 0 Application Guide 116 m Web Switching Fundamentals Alteon WebSystems 212777 A February 2002 CHAPTER 6 Server Load Balancing Server Load Balancing SLB allows you to configure the Alteon Web switch to balance user session traffic among a pool of available servers that provide shared services The following sections in this chapter describe how to configure and use SLB E Understanding Server Load Balancing on page 118 This section discusses the benefits of server load balancing and how it works E Implementing Basic Server Load Balancing on page 121 This section discusses how implementing SLB provides reliability performance and ease of maintenance on your network O Network Topology Requirements on page 122 This section provides key require ments to consider before deploying server load balancing O Configuring Server Load Balancing on page 124 O Additional Server Load Balancing Options on page 128 m Extending SLB Topologies on page 136 This section discusses proxy IP addresses mapping a virtual port to real ports monitoring real server ports and delayed binding E Load Balancing Special Services on page 149 This section discusses load balancing based on special services such as source IP addresses FTP RTSP DNS WAP IDS and WAN link For additional information about the SLB feature see your Web OS Command Reference
216. a EEE 171 188 189 datagrams meere ee e ea E E EET 64 jumbo frame traffic fragmentation 0 0 30 server status USING eeeeeeceeseeeceeeceseeeeeenees 130 URL based 00 ee user account Using proxy IP GSLBisw wee oe eos 304 V yirtual CLOCKS scjs ssecscsswesssncceseccencasceteniptesstnsexessens 446 virtual interface router VIR cceceeeeeeeceeeeeeees 248 virtual IP address VIP s ssssccsseeceeeeees 120 122 virtual link OSPF csceeceecceeceeeeeeeeeeeeeseeeeees 79 Virtual Local Area Networks See VLANS virtual port mapping to multiple real ports 139 to 142 virtual router ID numbering 2 2266 ssoseeuvccandctovecdycesascneve 280 virtual router group eeseeeeeeeeeesseresrrrerreresresrreee 257 Virtual Router Redundancy Protocol HACKING E EAA A E caaes virtual server router Virtual SEPVETSii c scsceseidcce beebssveeeielenceeseses configuration example seseeeseeeeeteee IPiaddtess ie5 s4isvccscbesgescueatessawvunctovees Virus attacks preventing ceceeeeecececececeeeeeeerees Index m 481 Web OS 10 0 Application Guide VLANs broadcast domains cceeeeeeeee Pefatilt PVID cc ssenecvetesstacscacssensesvestonnssevesces example showing multiple VLANs filtering 9 lt sscecsnen dooce sbadacducersnndcscedecnesetes gateway default ID pumpet s s casastencsccbecceecsceds batacstaeeveda nei IP interface configuration esee
217. a group Once hot standby is globally enabled the virtual router group must be enabled The virtual router group aggregates all of the virtual routers as a single entity If the virtual router group is master on one switch it means the switch is master otherwise the switch is backup However Layer 4 processing is still enabled If a virtual server is not a vir tual router the backup switch can still process traffic addressed to that virtual server IP address Filtering is also still functional Only traffic addressed to virtual server routers is not processed VRRP actually contains support for virtual router groups Each advertisement is not limited to a single virtual router IP address and can include up to 256 addresses This means that all vir tual routers are advertised in the same packet conserving processing and buffering resources However the advertisements are also used to help bridges learn the virtual router MAC address Since all of the virtual routers can have different virtual router identifiers VRIDs you must rotate the MAC source address of the advertisement to ensure that the bridges learn all of the virtual router MAC addresses Hot Standby and Inter Switch Port States The second part of the solution involves introducing two additional Layer 4 port states hot standby and inter switch E Links that attach to the standby switch must be configured as hot standby using cfg slb port x hotstan E Links that are used
218. a metric A stub area can be configured to send a numeric metric value such that all routes received via that stub area carry the configured metric to potentially influence routing decisions Default routes Default routes with weight metrics can be manually injected into transit areas This helps establish a preferred route when multiple routing devices exist between two areas It also helps route traffic to external networks 74 m Chapter 4 OSPF Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Defining Areas If you are configuring multiple areas in your OSPF domain one of the areas must be desig nated as area 0 known as the backbone The backbone is the central OSPF area and is usually physically connected to all other areas The areas inject routing information into the backbone which in turn disseminates the information into other areas Since the backbone connects the areas in your network it must be a contiguous area If the backbone is partitioned possibly as a result of joining separate OSPF networks parts of the AS will be unreachable and you will need to configure virtual links to reconnect the parti tioned areas see Virtual Links on page 79 Up to three OSPF areas can be connected to a Web switch with Web OS 10 0 software To con figure an area the OSPF number must be defined and then attached to a network interface on the Web switch The full process is explained in the following se
219. address is used All requests for a specific IP destination address is sent to the same server This metric is particularly useful in caching applications helping to maximize successful cache hits Best statistical load balancing is achieved when the IP address destinations of load balanced frames are spread across a broad range of IP subnets E For SLB the client source IP address and real server IP address are used All requests from a specific client are sent to the same server This metric is useful for applications where client information must be retained on the server between sessions With this met ric server load becomes most evenly balanced as the number of active clients with differ ent source or destination addresses increases When selecting a server the switch calculates a score for each available real server based on the relevant IP address information The server that scores the highest is assigned the connec tion This metric attempts to minimize the disruption of persistency when servers are removed from service This metric should be used only when persistence is a must NOTE The minmisses metric cannot be used for firewall load balancing since the real server IP addresses used in calculating the score for this metric are different on each side of the firewall Alteon WebSystems Chapter 6 Server Load Balancing 131 212777 A February 2002 Web OS 10 0 Application Guide Hash The hash metric uses IP addres
220. ader criteria and load balances it Filters can be configured to filter on the SIP Range via netmask DIP Range via net mask Protocol SPort Range or DPort Range The action on a filter can be Allow Deny Redirect to a Server Group or NAT translation of either the source IP or destination IP address In redirection based load balancing the destination IP address is not translated to that of one of the real servers Therefore redirection based load balancing is designed to load balance devices that normally operate transparently in your network such as a fire wall spam filter or transparent Web cache Real Server IP Address An IP addresses that the switch load balances to when requests are made to a Virtual Server IP address VIP 471 SIP Source IP Address SPort Source Port Tracking VIP Virtual Server IP Address VIR Virtual Interface Router Virtual Router Virtual Server Load Balancing VRID Virtual Router Identifier 472 Glossary Web OS 10 0 Application Guide The source IP address of a frame The source port application socket for example HTTP 80 HTTPS 443 DNS 53 In VRRP a method to increase the priority of a virtual router and thus master designation with preemption enabled Tracking can be very valuable in an active active configura tion You can track the following E Vrs Virtual Routers in Master Mode increments priority by 2 for each m Ifs Active IP interfaces on
221. ady been sent to a peer an update message containing the route to withdraw is sent to that peer For each Internet host you must be able to send a packet to that host and that host has to have a path back to you This means that whoever provides Internet connectivity to that host must have a path to you Ultimately this means that they must hear a route which covers the section of the IP space you are using otherwise you will not have connectivity to the host in question BGP Failover Configuration Use the following example to create redundant default gateways for an Alteon Web switch at a Web Host ISP site eliminating the possibility should one gateway go down that requests will be forwarded to an upstream router unknown to the switch Alteon WebSystems Chapter 1 Basic IP Routing 37 212777 A February 2002 Web OS 10 0 Application Guide As shown in Figure 1 4 the switch is connected to ISP 1 and ISP 2 The customer negotiates with both ISPs to allow the Web switch to use their peer routers as default gateways The ISP peer routers will then need to announce themselves as default gateways to the Web switch Peer 1 Router ee ISP 2 Peer 2 Router Primary AS 100 AS 200 Secondary IP 200 200 200 2 _ IP 210 210 210 2 Web switch Default gateway announces Alteon metric AS path with routes having routes with length metric of 3 local shorter AS PATH metric of 3 AS repeated 3 times VIP
222. aiabls ote te rtr Ve Aggregate Port Trunk Figure 3 1 Port Trunk Group Trunk groups are also useful for connecting an Alteon Web switch to third party devices that support link aggregation such as Cisco routers and switches with EtherChannel technology not ISL trunking technology and Sun s Quad Fast Ethernet Adapter Nortel Networks trunk group technology is compatible with these devices when they are configured manually Alteon Z Systems 65 212777 A February 2002 Web OS 10 0 Application Guide Statistical Load Distribution Network traffic is statistically load balanced between the ports in a trunk group The Web OS powered switch uses both the Layer 2 MAC address and Layer 3 IP address information present in each transmitted frame for determining load distribution The addition of Layer 3 IP address examination is an important advance for traffic distribution in trunk groups In some port trunking systems only Layer 2 MAC addresses are considered in the distribution algorithm Each packet s particular combination of source and destination MAC addresses results in selecting one line in the trunk group for data transmission If there are enough Layer 2 devices feeding the trunk lines then traffic distribution becomes relatively even In some topologies however only a limited number of Layer 2 devices such as a hand ful of routers and servers feed the trunk lines When this occurs the limited nu
223. al hosting or User Agent for browser smart load balancing URL Based Server Load Balancing on this page Virtual Hosting on page 380 Cookie Based Preferential Load Balancing on page 383 E E E E URL Hashing for Server Load Balancing on page 387 E Header Hash Load Balancing on page 389 E DNS Load Balancing on page 390 Layer 7 RTSP Load Balancing on page 392 URL Based Server Load Balancing URL based SLB allows you to optimize resource access and server performance Content dis persion can be optimized by making load balancing decisions on the entire path and filename of each URL NOTE Both HTTP 1 0 and HTTP 1 1 requests are supported For URL matching you can configure up to 128 strings comprised of 40 bytes each Each URL Web request is then examined against the URL strings defined for each real server URL requests are load balanced among multiple servers matching the URL according to the load balancing metric configured for the real server group leastConns is the default In Figure 15 2 the following criteria are specified for content load balancing M Requests with cgi in the URL are forwarded to real servers 3 and 4 E Requests with the string images in the URL are sent to real servers 1 and 2 E Requests with URLs starting with product are sent to real servers 2 3 and 5 Requests containing URLs with anything else are sent to real servers 1 2 3 a
224. al server IP address as required in DSR config urations To perform this function the real server IP address is replaced with the virtual server IP address in the health check packets that are forwarded to the real servers for health check ing With this feature enabled the health check will fail if the real server is not properly config ured with the virtual server IP address NOTE viph1th is enabled by default This has no effect on the health check unless the real server is configured with DSR Configuring the Switch for DSR Health Checks 1 Select the health check menu for a real server group gt gt cfg slb group 1 Select the Real Server Group 1 menu 2 Enable DSR VIP health checks for a real server group For more information on DSR see Using Direct Server Return on page 142 gt gt Real server group 1 viphlth enable disable 3 Apply and save your configuration gt gt DSR VIP Health Check apply 222 m Chapter 10 Health Checking Alteon e systems A February Web OS 10 0 Application Guide Link Health Checks Link health check is performed at the Layer 1 physical level The server is considered to be up when the link connection is present and the server is considered to be down when the link is absent These checks are used on servers that do not respond to any other health checks Intrusion Detection Servers IDSs fall into this category Many ID
225. al server using different types of cookies Server Side Multi Response Cookie Search on page 436 This section explains how to configure the switch to look through multiple HTTP responses from the server to achieve cookie based persistence SSL Session ID Based Persistence on page 437 This section explains how an applica tion server and client communicate over an encrypted HTTP session Alteon Z Systems 421 212777 A February 2002 Web OS 10 0 Application Guide Overview of Persistence In a typical SLB environment traffic comes from various client networks across the Internet to the virtual server IP address on the Web switch The switch then load balances this traffic among the available real servers In any authenticated Web based application it is necessary to provide a persistent connection between a client and the Web server to which it is connected Because HTTP does not carry any state information for these applications it is important for the browser to be mapped to the same real server for each HTTP request until the transaction is complete This ensures that the client traffic is not load balanced mid session to a different real server forcing the user to restart the entire transaction Persistence based SLB enables the network administrator to configure the network to redirect requests from a client to the same real server that initially handled the request Persistence is an important consideration for ad
226. allows incoming mail to reach the mail server and Filter 3 allows outgoing mail to reach the Internet gt gt o gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt oS gt gt gt gt gt gt gt gt gt gt gt gt Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Cer cer cer Ler cer Cer cer Ler Ler Ler cer Ler cer Ler Cer Ler Cer Ler WWWWWWWWonN NNN NN NHN DN EF f ilt 2 sip any dip 205 177 15 3 dmask 255 255 255 255 proto tcp sport any dport smtp action allow ena f ilt 3 sip 205 177 15 3 smask 255 255 255 255 dip any proto tcp sport smtp dport any action allow ena Select the menu for filter 2 From any source IP address To mail server dest IP address Set mask for exact dest address For TCP protocol traffic From any source port To a SMTP destination port Allow matching traffic to pass Enable the filter Select the menu for filter 3 From mail server source IP address Set mask for exact source address To any destination IP address For TCP protocol traffic From a SMTP port To any destination port Allow matching traffic to pass Enable the filter Alteon Z Systems 212777 A February 2002 Chapter 7 Filtering 187 Web OS 10 0 Application Guide 5 Create a filter that will allow local clients to browse the Web
227. ame KS ANS 7 89 112 icmp igmp tcp udp ospf virp Web OS 10 0 Application Guide E sport TCP UDP application or source port as shown in Table 7 2 or source port range such as 31000 33000 Table 7 2 Well Known Application Ports Number TCP UDP Number TCP UDP Number TCP UDP Application Application Application 20 ftp data 79 finger 179 bgp 21 ftp 80 http 194 irc 22 ssh 109 pop2 220 imap3 23 telnet 110 pop3 389 ldap 25 smtp 111 sunrpc 443 https 37 time 119 nntp 520 rip 42 name 123 ntp 554 rtsp 43 whois 143 imap 1645 1812 Radius 53 domain 144 news 1813 Radius Accounting 69 tftp 161 snmp 1985 hsrp 70 gopher 162 snmptrap NOTE The service number specified on the switch must match the service specified on the server E dport TCP UDP application or destination port as shown in Table 7 2 or destination port range such as 31000 33000 E invert reverse the filter logic in order to activate the filter whenever the specified condi tions are not met E Advanced filtering options such as TCP flags page 197 or ICMP message types page 201 are also available Using these filter criteria you can create a single filter that blocks external Telnet traffic to your main server except from a trusted IP address Another filter could warn you if FTP access is attempted from a specific IP address Another filter could redirect all incoming e mail traffic to a server where it can be analyzed for s
228. ame autonomous system An iBGP is a type of internal routing protocol you can use to do active routing inside your net work It also carries AS path information which is important when you are an ISP or doing BGP transit NOTE The iBGP peers must be part of a fully meshed network as shown in Figure 1 3 36 m Chapter 1 Basic IP Routing Alteon 2 Systems A February Web OS 10 0 Application Guide Internet Figure 1 3 iBGP and eBGP Typically an AS has one or more multiple border routers peer routers that exchange routes with other ASs and an internal routing scheme that enables routers in that AS to reach every other router and destination within that AS When you advertise routes to border routers on other autonomous systems you are effectively committing to carry data to the IP space repre sented in the route being advertised For example if you advertise 192 204 4 0 24 you are declaring that if another router sends you data destined for any address in 192 204 4 0 24 you know how to carry that data to its destination Forming BGP Peer Routers Two BGP routers become peers or neighbors once you establish a TCP connection between them For each new route if a peer is interested in that route for example if a peer would like to receive your static routes and the new route is static an update message is sent to that peer containing the new route For each route removed from the route table if the route has alre
229. an define separate filters for Customers A and B on the same Web switch on two different VLANs If VLANs are assigned based on data traffic for example ingress traffic on VLAN 1 egress traffic on VLAN 2 and management traffic on VLAN 3 filters can be applied accordingly to the different VLANs In the following example shown in Figure 7 4 Filter 2 is configured to allow local clients on VLAN 20 to browse the Web and Filter 3 is configured to allow local clients on VLAN 30 to Telnet anywhere outside the local intranet Filter 7 is configured to deny ingress traffic from VLAN 70 Unique Filters per VLAN up to 2048 Internet Web Switch Figure 7 4 VLAN based Filtering 174 m Chapter 7 Filtering Alteon Z Systems 212777 A February 2002 Configuring VLAN based Filtering Web OS 10 0 Application Guide 1 Configure filter 2 to allow local clients to browse the Web and then assign VLAN 20 to the filter The filter must recognize and allow TCP traffic from VLAN 20 to reach the local client destina tion IP addresses if originating from any HTTP source port gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt oe gt gt cfg slb filt 2 Fil Fil Fil Fil Fil Fil Fil Fil Fil cer cer Cer cer cer cer Ler cer cer 2 NNN NNN DN ND sip any dip 205 177 15 0 dmask 255 255 255 0 proto tcp sport http dport any action allow vlan 20 ena
230. ancing describes configuring Server Load Balanc ing across multiple geographic sites Chapter 13 Firewall Load Balancing describes how to combine features to provide a scalable solution for load balancing multiple firewalls Chapter 14 Virtual Private Network Load Balancing describes using your Web switch to load balance secure point to point links Chapter 15 Content Intelligent Switching describes how to perform load balancing and application redirection based on Layer 7 packet content information such as URL HTTP Header browser type and cookies Chapter 16 Persistence describes how to ensure that all connections from a specific cli ent session reach the same server Persistence can be based on cookies or SSL session ID Chapter 17 Bandwidth Management describes how to configure the Web switch for allocating specific portions of the available bandwidth for specific users or applications Alteon Z Systems 212777 A February 2002 Typographic Conventions Web OS 10 0 Application Guide The following table describes the typographic styles used in this book Table 1 Typographic Conventions Typeface or Meaning Symbol Example AaBbCc123 This type is used for names of commands files and directories used within the text It also depicts on screen computer output and prompts View the readme txt file Main AaBbCc123 This bold type appears in command exam p
231. ancing IP server load balancing allows you to configure your Web switch for server load balancing based on client s IP address only Typically the client IP address is used with the client port number to produce a session identifier When the Layer 3 option is enabled the switch uses only the client IP address as the session identifier To configure the switch for IP load balancing gt gt cfg slb virt lt virtual server number gt gt gt Virtual Server 1 layr3 ena gt gt Virtual Server 1 service ip gt gt Virtual Server 1 IP Service group lt group number gt IP server load balancing must be used if IP traffic is totally encrypted and you do not have access to the content Alteon WebSystems Chapter 6 Server Load Balancing 149 212777 A February 2002 Web OS 10 0 Application Guide FTP Server Load Balancing As defined in RFC 959 FTP uses two connections one for control information and another for data Each connection is unique Unless the client requests a change the server always uses TCP port 21 a well known port for control information and TCP port 20 as the default data port FTP uses TCP for transport After the initial three way handshake a connection is established When the client requests any data information from the server it will issue a PORT command such as 1s dir get put mget and mput via the control port There are two modes of FTP operation active and passive E In
232. ancing Alteon e systems A February Web OS 10 0 Application Guide Verify Proper Connectivity To verify proper configuration up to this point use the ping option to test network connectiv ity At each Web switch you should receive a valid response when pinging the destination addresses established in the static routes For example on the secondary clean side Web switch the following commands should receive a valid response gt gt ping 10 10 2 Response 10 10 2 2 2 1 OK R 1 msec NER gt gt ping 10 10 Response 10 10 2 2 1 OK R 1 msec gt gt ping 10 10 2 11 Response 10 10 2 11 1 OK R 1 msec gt gt ping 10 10 2 12 Response 10 10 2 12 1 OK R 1 msec Configure VRRP Support on the Secondary Dirty Side Web Switch The secondary dirty side Web switch must be configured with the primary as its peer Once this is done the secondary Web switch will get the remainder of its configuration from the pri mary when synchronized in a later step In this example the secondary Web switch is configured to use primary dirty side interface 1 as its peer gt gt cfg vrrp on gt gt cfg slb gt gt on gt gt sync peer 1 gt gt addr 195 1 1 10 gt gt ena gt gt apply gt gt save Configure VRRP Support on the Secondary Clean Side Web Switch In this example the secondary Web switch uses primary clean side interface 1 as its
233. and Reference The hold down time is calculated with the following equation Hold down time holddur x slowage If slowage is set to the default value of 0 2 minutes then the configured value for hold down time is Hold down time 2 x 2 4 minutes If a client exceeds the TCP rate limit then the client is not allowed to make any new TCP con nections for 4 minutes The following two configuration examples illustrate how to use TCP rate limiting to limit user access based on source IP address and virtual IP address Alteon Z Systems Chapter 7 Filtering m 181 212777 A February 2002 Web OS 10 0 Application Guide TCP Rate Limiting Filter Based on Source IP Address This example shows how to define a filter that limits clients with IP address 30 30 30 x to 150 TCP connections per second Once a user exceeds that limit they are not allowed any new TCP connections for 10 minutes Configure the following on the switch gt gt cfg slb filt 100 ena Enable the filter gt gt Filter 100 sip 30 30 30 0 Specify the source IP address gt gt Filter 100 smask 255 255 255 0 Specify the source IP address mask gt gt Filter 100 adv tcp Select the advanced filter menu gt gt TCP advanced teplim en Enable TCP rate limiting gt gt TCP advanced maxconn 15 Specify the maximum connections gt gt TCP advanced cfg slb adv Select the Layer 4 advanced menu gt gt Layer 4 Advanced timewin 1 Set the
234. andwidth Management m 467 212777 A February 2002 Web OS 10 0 Application Guide Security Management Example BWM can be used to prevent Denial of Service DoS attacks by a flooding of necessary evil packets and limiting the rate of TCP SYN ping other disruptive packets and alerting logging the network manager when soft limits are exceeded In the following example a filter is configured to match ping packets and BWM is configured to prevent DoS attacks by limiting the bandwidth policy rate of those packets 1 Configure the switch as usual for SLB see Server Load Balancing on page 117 Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server Define a real server group Define a virtual server Define the port configuration NOTE Ensure BWM is enabled on the switch cfg bwm on 2 Select a bandwidth policy Each policy must have a number from to 64 gt gt cfg bwm pol 1 Select BWM policy 1 3 Set the hard soft and reserved rate limits for this policy in Kilobytes gt gt Policy 1 hard 250k Set never exceed rate gt gt Policy 1 soft 250k Set desired bandwidth rate gt gt Policy 1 resv 250k Set committed information rate 4 Set the buffer limit for the policy Set a parameter between 8192 and 128000 bytes The buffer depth fora BWM contract should be set to a multiple
235. ant checksums and forwards the frame to the server for which it is now destined This process of replacing the destina tion IP VIP with one of the real server addresses is called half NAT If the frames were not half NAT ed to the address of one of the RIPs a server would receive the frame that was destined for it s MAC address forcing the packet up to Layer 3 The server would then drop the frame since the packet would have the DIP of the VIP and not that of the server RIP In VRRP a value between 1 and 255 that is used by each virtual router to create its MAC address and identify its peer for which it is sharing this VRRP address The VRRP MAC address as defined in the RFC is 00 00 5E 00 01 VRID If you have a VRRP address that two switches are sharing then the VRID number needs to be identical on both switches so each virtual router on each switch knows whom to share with Alteon Z Systems 212777 A February 2002 VRRP Virtual Router Redundancy Protocol VSR Virtual Server Router Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide A protocol that acts very similarly to Cisco s proprietary HSRP address sharing protocol The reason for both of these protocols is so devices have a next hop or default gateway that is always available Two or more devices sharing an IP interface are either advertising or listening for advertisements These advertisements are sent via a broadcast message to an
236. apply and verify the configuration gt gt Filter 1 Advanced apply Make your changes active gt gt Filter 1 Advanced cfg bwm cur View current BWM settings Examine the resulting information If any settings are incorrect make the appropriate changes 10 On the switch save your new configuration changes gt gt Bandwidth Management save Save for restore after reboot 11 On the switch check the BWM information gt gt Bandwidth Management info bwm lt contract number gt View BWM information Check that all BWM contract parameters are set correctly If necessary make any appropriate configuration changes and then check the information again Alteon WebSystems Chapter 17 Bandwidth Management m 469 212777 A February 2002 Web OS 10 0 Application Guide 470 Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Glossary DIP Destination IP Address Dport Destination Port NAT Network Address Translation Preemption Priority Proto Protocol Real Server Group Redirection or Filter Based Load Balancing RIP Real Server Alteon Z Systems 212777 A February 2002 The destination IP address of a frame The destination port application socket for example http 80 https 443 DNS 53 Any time an IP address is changed from one source IP or destination IP address to another address network address translation can be said to have taken place In general half NAT is w
237. appropriate VLAN These interfaces will be used as the primary and secondary default gateways for the switch gt gt cfg ip rearp 10 Set re ARP period for interface to 10 gt gt IP metre strict Set metric for default gateway gt gt IP if 1 Select default gateway interface 1 gt gt IP Interface 1 ena Enable switch interface 1 gt gt IP Interface 1 addr 200 200 200 1 Configure IP address of interface 1 gt gt IP Interface 1 mask 255 255 255 0 Configure IP subnet address mask gt gt IP Interface 1 broad 200 200 200 255 Configure IP broadcast address gt gt IP Interface 1 vlan 1 Configure VLAN for this interface gt gt IP Interface 1 ip if 2 Select default gateway interface 2 gt gt IP Interface 2 ena Enable switch interface 2 gt gt IP Interface 2 addr 210 210 210 1 Configure IP address of interface 2 gt gt IP Interface 2 mask 255 255 255 0 Configure IP subnet address mask gt gt IP Interface 2 broad 210 210 210 255 Configure IP broadcast address gt gt IP Interface 2 vlan 1 Configure VLAN for this interface 4 Enable IP forwarding IP forwarding is used for VLAN to VLAN non BGP routing You need to enable IP forward ing if the default gateways are on different subnets or if the switch is connected to different subnets and those subnets need to communicate through the switch which they almost always do gt gt cfg ip frwd on Enable IP
238. ary default gateway 5 Enable apply and verify the configuration gt gt Default gateway 2 fwrd Select the IP Forwarding Menu gt gt IP Forwarding on Turn IP forwarding on gt gt IP Forwarding apply Make your changes active gt gt IP Forwarding cfg ip cur View current IP settings Examine the resulting information If any settings are incorrect make the appropriate changes 6 Save your new configuration changes gt gt IP save Save for restore after reboot 32 m Chapter 1 Basic IP Routing Alteon e Systems A February Web OS 10 0 Application Guide Using VLANs to Segregate Broadcast Domains In the previous example devices that share a common IP network are all in the same broadcast domain If you want to limit the broadcasts on your network you could use VLANs to create distinct broadcast domains For example as shown in the following procedure you could cre ate one VLAN for the client trunks one for the routers and one for the servers In this example you are adding to the previous configuration 1 Determine which switch ports and IP interfaces belong to which VLANs The following table adds port and VLAN information Table 1 3 Subnet Routing Example Optional VLAN Ports VLAN Devices IP Interface Switch Port 1 First Floor Client Workstations 2 1 Second Floor Client Workstations 3 2 Third Floor Client Workstations 4
239. ash metric to distribute firewall traffic and maintain persistence though other load balancing metrics can be used by configur ing an additional Return to Sender RTS option see Free Metric FWLB on page 346 Four Subnet FWLB Implementation In this example traffic between the redundant Web switches is load balanced among the avail able firewalls Dirty Side Clean Side Subnet 1 Subnet 2 Subnet 3 Subnet 4 Primary Routers Simple Simple Switches i Switches Secondary Firewalls Secondary Servers Web Switch Web Switch 1 VRRP forces incoming traffic to converge on primary dirty side Web switch 2 Firewall load balancing occurs between primary Web switches 3 Primary clean side Web switch performs standard SLB Figure 13 6 Four Subnet FWLB Process Alteon WebSystems Chapter 13 Firewall Load Balancing 327 212777 A February 2002 Web OS 10 0 Application Guide 1 Incoming traffic converges on the primary dirty side Web switch External traffic arrives through redundant routers A set of interconnected switches ensures that both routers have a path to each dirty side Web switch VRRP is configured on each dirty side Web switch so that one acts as the primary routing switch If the primary fails the secondary takes over 2 FWLB is performed between primary Web switches Just as with basic FWLB filters on the ingress ports of the dirty side Web switch redirect traf fic to a real server group composed
240. at connects to the Internet gt gt Filter 9 port 5 Select the SLB port 5 to the Internet gt gt SLB Port 5 add 1 9 Add filters 1 9 to port 5 gt gt SLB Port 5 add 224 Add the default filter to port 5 gt gt SLB Port 5 filt enable Enable filtering for port 5 Web OS allows you to add and remove a contiguous block of filters with a single command 9 Apply and verify the configuration gt gt SLB Port 5 apply Make your changes active gt gt SLB Port 5 cur View current settings Examine the resulting information If any settings are incorrect make appropriate changes 10 Save your new configuration changes gt gt SLB Port 5 save Save for restore after reboot 11 Check the server load balancing information gt gt SLB Port 5 info slb dump View SLB information Check that all SLB parameters are working according to expectation If necessary make any appropriate configuration changes and then check the information again NoTE Changes to filters on a given port do not take effect until the port s session information is updated every two minutes or so To make filter changes take effect immediately clear the session binding table for the port see the oper slb clear command in the Web OS 10 0 Command Reference 190 m Chapter 7 Filtering Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide Network Address Translation Network Address Translation NAT is an Internet standard
241. ation Guide 5 Set the bandwidth policy for this contract Each BWM contract must be assigned a bandwidth policy gt gt BWM Contract 1 pol 1 Assign policy 1 to BWM contract 1 6 Enable this BWM contract gt gt BWM Contract 1 ena Enables this BWM contract 7 Select the second bandwidth policy gt gt BWM Contract 1 cfg bwm policy 2 Select BWM policy 2 8 Set the hard soft and reserved rate limits for this policy in Mbps gt gt Policy 2 hard 18 Set never exceed rate gt gt Policy 2 soft 15 Set desired bandwidth rate gt gt Policy 2 resv 10 Set committed information rate 9 On the switch select the second BWM contract and name the contract gt gt Policy 2 cfg bwm cont 2 Select BWM contract 2 gt gt BWM Contract 2 name b com Assign contract name b com 10 Set the bandwidth policy for this contract Each BWM contract must be assigned a bandwidth policy gt gt BWM Contract 2 pol 2 Assign policy 2 to BWM contract 2 11 Enable this BWM contract gt gt BWM Contract 2 ena Enables this BWM contract Alteon WebSystems Chapter 17 Bandwidth Management m 461 212777 A February 2002 Web OS 10 0 Application Guide 12 13 14 15 Create a virtual server that will be used to classify the frames for contract 1 and assign the Virtual server IP address for this server
242. ation Guide GSLB Overview GSLB allows balancing server traffic load across multiple physical sites The Alteon GSLB implementation takes into account an individual site s health response time and geographic location to smoothly integrate the resources of the dispersed server sites for complete global performance Benefits GSLB meets the following demands for distributed network services High content availability is achieved through distributed content and distributed decision making If one site becomes disabled the others become aware of it and take up the load There is no latency during client connection set up Instant site hand off decisions can be made by any distributed switch The best performing sites receive a majority of traffic over a given period of time but are not overwhelmed Switches at different sites regularly exchange information through the Distributed Site State Protocol DSSP and can trigger exchanges when any site s health status changes This ensures that each active site has valid state knowledge and statistics GSLB implementation takes geography as well as network topology into account Creative control is given to the network administrator or Webmaster to build and control content by user location target application and more GSLB is easy to deploy manage and scale Switch configuration is straightforward There are no complex system topologies involving routers protocols and so fort
243. ation changes 3 Enable active FTP NAT using the following command gt gt cfg slb filt lt filternumber gt adv ftpa ena 4 Apply and save the switch configuration 196 Chapter 7 Filtering Alteon 2 Systems A February Web OS 10 0 Application Guide Matching TCP Flags Web OS supports packet filtering based on any of the following TCP flags Table 7 5 TCP Flags Flag Description URG Urgent ACK Acknowledgement PSH Push RST Reset SYN Synchronize FIN Finish Any filter may be set to match against more than one TCP flag at the same time If there is more than one flag enabled the flags are applied with a logical AND operator For example by setting the switch to filter SYN and ACK the switch filters all SYN ACK frames NOTE TCP flag filters must be cache disabled Exercise caution when applying cache enabled and cache disabled filters to the same switch port For more information see Cache Enabled versus Cache Disabled Filters on page 178 Configuring the TCP Flag Filter NOTE By default all TCP filter options are disabled TCP flags will not be inspected unless one or more TCP options are enabled Consider the following network Web Switch 1 3 Inside Internet i i Trusted LAN Router 2 SMTP Web Servers Mail Server 203 122 186 Figure 7 11 TCP ACK Matching Network Alteon Z Systems Chapter 7 Filtering 197 212777 A Feb
244. ator and or for their evaluation The following Layer 7 content types can be specified URL SLB HTTP Host Cookie Browsers User agent URL hash Header hash Using the above content types with the and and or operators the Web switch is configured to refine HTTP based server load balancing multiple times on a single client HTTP request in order to bind it to an appropriate server Typically when you combine two content types with an operator and or URL hash and Header hash are used in combination with Host Cookie or Browser content types For example the following types of load balancing can be configured using the Content Prece dence Lookup feature E Virtual host and or URL based load balancing Cookie persistence and URL based load balancing Cookie load balancing and or URL based load balancing Cookie persistence and HTTP SLB together in the same service Multiple HTTP SLB process type on the same service NOTE Cookie persistence can also be combined with the Layer 7 content types For more information on cookie persistence see Chapter 16 Persistence For example the Content Precedence Lookup feature can be used in the following scenarios E If the client request is sent without a cookie and if no HTTP SLB is configured then the switch binds the request to the real server using normal SLB E If the client request is sent without a cookie but HTTP SLB is configured on the switch then the reques
245. ave Determining the Version of LDAP 1 Select the Advanced Menu gt gt Real server group 1 cfg slb adv 2 Set the version of LDAP The default version is 2 gt gt Real server group 1 ldap lt 2 3 gt Select the desired LDAP version 3 Apply and save your configuration gt gt LDAP Health Check apply gt gt LDAP Health Check save 244 m Chapter 10 Health Checking Alteon e systems A February Web OS 10 0 Application Guide ARP Health Checks Address Resolution Protocol ARP is the TCP IP protocol that resides within the Internet layer ARP resolves a physical address from an IP address ARP queries machines on the local network for their physical addresses ARP also maintains IP to physical address pairs in its cache memory In any IP communication the ARP cache is consulted to see if the IP address of the computer or the router is present in the ARP cache Then the corresponding physical address is used to send a packet In the switch this features allows the user to health check the Intrusion Detection Server IDS by sending an ARP query The health check consists of the following sequence of actions 1 Accessing the ARP table 2 Looking for the session entry in the ARP table If the entry exists in the table that means the real server is up otherwise the health check has failed 3 Ifthe entry is present then check the timestamp to find out
246. average of response time In such a scenario a server with half the response time as another server will receive a weight twice as large NOTE The effects of the response weighting apply directly to the real servers and are not necessarily confined to the real server group When response time metered real servers are also used in other real server groups that use the leastconns or roundrobin metrics the response weights are applied on top of the least conns or roundrobin calculations for the affected real servers Since the response weight changes dynamically this can pro duce fluctuations in traffic distribution for the real server groups that use the least conns or roundrobin metrics Bandwidth The bandwidth metric uses real server octet counts to assign sessions to a server The switch monitors the number of octets sent between the server and the switch Then the real server weights are adjusted so they are inversely proportional to the number of octets that the real server processes during the last interval Servers that process more octets are considered to have less available bandwidth than servers that have processed fewer octets For example the server that processes half the amount of octets over the last interval receives twice the weight of the other servers The higher the band width used the smaller the weight assigned to the server Based on this weighting the subse quent requests go to the server with the highest am
247. b OS 10 0 Application Guide Configuring OSPF for Host Routes on Web Switch 1 1 Configure basic SLB parameters Web switch is connected to two real servers Each real server is given an IP address and is placed in the same real server group gt gt eo gt gt oF gt gt gt gt gt gt oo gt gt gt gt gt gt cfg slb real 1 1 rip 100 100 100 25 Real Real Real Real Real Real Real Real Real Real server server server server server server server server server server YN MN FF Se OE OSE group group group group rip 100 100 10 26 ena group 1 ena real 2 1 add 1 1 add 2 1 enable 1 on Select menu for real server 1 Set the IP address for real server 1 Enable the real server Select menu for real server 2 Set the IP address for real server 2 Enable the real server Select menu for real server group 1 Add real server 1 to group Add real server 2 to group Enable the group Turn SLB on 2 Configure client and server processing on specific ports gt gt gt gt gt gt gt gt Layer 4 port 4 SLB Port 4 client ena port 5 SLB Port 5 server ena SLB Port 4 Select switch port 4 Enable client processing on Port 4 Select switch Port 5 Enable server processing on Port 5 3 Enable direct access mode gt gt Layer 4 Port 5 gt gt Layer 4 Advanced dire
248. bandwidth for Web cache requests by using the URL parsing and bandwidth management feature Alteon WebSystems Chapter 17 Bandwidth Management m 449 212777 A February 2002 Web OS 10 0 Application Guide Sub string matching for images gif Jpg we x a ee Mbs of bandwidth z006 p7 Sub string matching for we Pa ps cgi ce bin ae exe ti ee Ta GET www foo com event reg bin ny 4 Mbs of bandwidth ay Fa Petia Be htm Sub string be lt i a4 matching for e html Rg na a 1 Mbs of bandwidth 2 Mbs of bandwidth Figure 17 4 URL Based Bandwidth Management product information GET company information html oe Ger leo m Pany jn a f ee lias Cache servers Ti Allocate 7 Mbps for requests with amagar l gif and html tags images l Implicit M Load Balancing within the group Figure 17 5 URL Based Bandwidth Management with Web Cache Redirection 450 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide HTTP Header Based Bandwidth Management HTTP header based BWM allows Web site managers to allocate bandwidth based on header value Thus they can allocate bandwidth based on browser type cookie value and so forth Cookie Based Bandwidth Management Cookie based BWM enables Web site managers to prevent network abuse by bandwidth hog ging user
249. ber of connections NOTE Weights are not applied when using the hash or minmisses metrics Connection Time outs for Real Servers In some cases open TCP IP sessions might not be closed properly for example the switch receives the SYN for the session but no F IN is sent If a session is inactive for 10 minutes the default it is removed from the session table in the switch To change the time out period enter the following gt gt cfg slb real lt real server number gt Select the real server gt gt Real server tmout 4 Specify an even numbered interval The example above would change the time out period of all connections on the designated real server to four minutes Maximum Connections for Real Servers You can set the number of open connections each real server is allowed to handle for SLB To set the connection limit enter the following gt gt cfg slb real lt real server number gt Select the real server gt gt Real server maxcon 1600 Allow 1600 connections maximum Values average from approximately 500 HTTP connections for slower servers to 1500 for quicker multiprocessor servers The appropriate value also depends on the duration of each session and how much CPU capacity is occupied by processing each session Connections that use a lot of Java or CGI scripts for forms or searches require more server resources and thus a lower maxcon limit You may wish to use a
250. ble at Site 2 Resources are available at Site 1 Site 2 sends a request to Site 1 with Site 2 s Site 1 returns request to proxy IP port on Site 2 proxy IP address as the source IP address and Site 2 completes the three way handshake with the virtual server IP address of Site 1 as the des Client tination IP address How IP Proxy Works Figure 12 4 shows examples of two GSLB sites deployed in California and Denver The appli cations being load balanced are HTTP and POP3 Any request that cannot be serviced locally is sent to the peer site HTTP requests are sent to the peer site using HTTP Redirect Any other application request will be sent to the peer site using the IP proxy feature California Site 1 Denver Site 2 200 200 200 X Network 174 14 70 X Network Service requests are always served by IJS BEE Te ely local real servers if available Local Real Servers Proxy Disabled For Local Real Servers Proxy IP Address Proxy IP Address 174 14 70 4 HTTP POP3 Virtual Server Virtual Server HTTP POP3 Local Servers 200 200 200 1 174 14 70 1 Local Servers 200 200 200 2 174 14 70 2 ae Remote Server Proxy Enabled For Remote Server Remote Server Remote Server 174 14 70 1 If local real servers cannot service the request 200 2002001 the remote server is used via proxy Figure 12 4 POP3 Request Fulfilled via IP Proxy Alteon WebSystems Chapter 12 Global Server Load Balancing m 305 212777 A February 2002
251. bnet range From any source IP address For TCP traffic To an HTTP destination port From any source port Allow matching traffic to pass Enable the filter Select SLB port 5 Add the filter to port 5 Select SLB port 6 Add the filter to port 6 Apply configuration changes Save configuration changes Alteon Z Systems 212777 A February 2002 Chapter 8 Application Redirection m 215 Web OS 10 0 Application Guide 216 Chapter 8 Application Redirection Alteon WebSystems 212777 A February 2002 CHAPTER 9 Virtual Matrix Architecture Virtual Matrix Architecture VMA is a hybrid architecture that takes full advantage of the dis tributed processing capability in Alteon Web switches With VMA the switch makes optimal use of system resources by distributing the workload to multiple processors thereby improving switch performance and increasing session capacity VMA also removes the topology con straints introduced by using Direct Access Mode DAM The number of concurrent sessions per switch with VMA enabled is given below E AD4 and A184 512K E AD3 and A180E 336K E AD2 256K For better switch performance and higher session capacities it is recommended that you enable VMA especially when using Bandwidth Management and Content Intelligent Switch ing for multiple frames processing up to 4500 bytes Proxy IP Addresses and VMA By default VMA is enabled on the Web switch cfg slb adv ma
252. bruary 2002 Web OS 10 0 Application Guide Jumbo Frame Normal Frame VLAN Normal Frame VLAN Figure 2 7 Jumbo Frame VLANs Routing Jumbo Frames to Non Jumbo Frame VLANs When IP routing is used to route traffic between VLANs the switch will fragment Jumbo UDP datagrams when routing from a Jumbo frame VLAN to a non Jumbo frame VLAN The result ing Jumbo frame to regular frame conversion makes implementation even easier Alteon WebSystems 64 m Chapter 2 VLANs 212777 A February 2002 CHAPTER 3 Port Trunking Trunk groups can provide super bandwidth multi link connections between Alteon Web switches or other trunk capable devices A trunk group is a group of ports that act together combining their bandwidth to create a single larger virtual link This chapter provides configu ration background and examples for trunking multiple ports together E Overview E Port Trunking Example on page 67 Overview When using port trunk groups between two Alteon Web switches as shown in Figure 3 1 you can create a virtual link between the switches operating up to six gigabits per second depend ing on how many physical ports are combined The switch supports up to four trunk groups per switch each with two to six links itch ssi Web Switch ved Swi net Server Switch 10100 10000 Mbps Ethernet Server Switch SE E aap Er sak sk sy E Ee SiE Sp feb sta sik E sea ic Efaataabaabalabl tie te He gt 2 ot Epcabalabiaapi
253. but does not require the users to enter the IP address of the redundant switch for each synchronization NOTE When using both VRRP and GSLB you must change the cfg sys wport Browser Based Interface port value of the target switch the switch that is being synchro nized to to a port other than port 80 before VRRP synchronization begins For more information on synchronizing configurations between two switches see Synchro nizing Configurations on page 282 258 m Chapter 11 High Availability Alteon e Systems A February Web OS 10 0 Application Guide Web OS Extensions to VRRP This section describes the following VRRP enhancements that are implemented in Web OS E Virtual Server Routers E Sharing Active Active Failover E Tracking VRRP Router Priority Virtual Server Routers Web OS supports virtual server routers which extend the benefits of VRRP to virtual server IP addresses that are used to perform SLB Virtual server routers operate for virtual server IP addresses in much the same manner as Vir tual Interface Routers operate for IP interfaces A master is negotiated via a bidding process during which information about each VRRP router s priority is exchanged Only the master can process packets that are destined for the virtual server IP address and respond to ARP requests One difference between virtual server routers and virtual interface routers is that a virtual server router cannot be an
254. by VRRP to deliver updates are configured as int ersw or inter switch links not to be confused with Cisco s ISL The command to configure one or more ports as interswitch links is c g slb port lt port number gt intersw NOTE A port cannot be configured to support both hot standby and interswitch link The hot standby switch listens to the master s VRRP updates After an interval period has expired without receiving a update the backup switch will take over The forwarding states of hot standby ports are controlled much like the forwarding states of the old hot standby approach Enabling hot standby on a switch port allows the hot standby algorithm to control the forwarding state of the port If a switch is master the forwarding states of the hot standby ports are enabled If a switch is backup the hot standby ports are blocked from forwarding or receiving traffic Alteon Z Systems Chapter 11 High Availability m 257 212777 A February 2002 Web OS 10 0 Application Guide When the hot stan option cfg slb port x hotstan is enabled and all hot standby ports have link the virtual router group s priority is automatically incremented by the track other virtual routers value This action allows the switches to failover when a hot standby port loses link Other enabled tracking features only have affect when all hot standby ports on a switch have link The default virtual routers tracking value is 2 seconds Keep in mind t
255. cache servers as shown below E Client 1 request http www nortelnetworks com is directed to cache server 1 E Client 2 request http www nortelnetworks com is directed to cache server 2 E Client 3 request http www nortelnetworks com is directed to cache server 3 408 Chapter 15 Content Intelligent Switching Alteon e Systems A February Web OS 10 0 Application Guide Layer 7 RTSP Streaming Cache Redirection This section explains Layer 7 support for RTSP Streaming Cache Redirection For conceptual information on RTSP Streaming Cache Redirection see RTSP Web Cache Redirection on page 211 For detailed information on two prominent commercial RTSP servers Real Player and QuickTime see Real Time Streaming Protocol SLB on page 155 To configure RTSP for Streaming Cache Redirection follow this procedure 1 Enable URL parsing for the redirection filter gt gt Main cfg slb filt lt filter number gt adv Select the filtering advanced menu gt gt Filter 1 Advanced urlp ena Enable URL parsing 2 Configure the parameters and file extensions that will bypass RTSP streaming cache redirection This is the user defined non cacheable content You can add or remove RTSP files like mov smil rm and so forth gt gt cfg slb layer7 rtspred Select the RTSP cache redirection menu gt gt Web Cache Redirection add rem lt expression gt Add non cacheable RTSP URL expression fo
256. ch Internet g 8002 ar Web Host r Routers oa 192 168 2 3 Z0 8001 r 8002 Ti 192 168 2 4 8001 8002 Figure 6 6 Basic Virtual Port to Real Port Mapping Configuration Domain Name virtual server IP Ports Activated Port Mapping Real Server IP address Address www right com 192 168 2 100 80 HTTP 8001 rport 1 192 168 2 1 RIP 1 8002 rport 2 192 168 2 2 RIP 2 192 168 2 3 RIP 3 192 168 2 4 RIP 4 In this example four real servers are used to support a single service HTTP Clients access this service through a virtual server with IP address 192 168 2 100 on virtual port 80 Since each real server uses two ports 8001 and 8002 for HTTP services the logical real servers are 192 168 2 1 8001 192 168 2 1 8002 192 168 2 2 8001 192 168 2 2 8002 192 168 2 3 8001 192 168 2 3 8002 192 168 2 4 8001 192 168 2 4 8002 140 m Chapter 6 Server Load Balancing Alteon systems A February Web OS 10 0 Application Guide Load Balancing Metric For each service a real server is selected using the configured load balancing metric hash leastconns minmisses or roundrobin To ensure even distribution once an avail able server is selected the switch will use the roundrobin metric to choose a real port to receive the incoming connection If the algorithm is least conns the switch sends the incoming connections to the logical real server real server IP address port combination with the least n
257. ch switch in the above example you must connect to the appropriate switch s Command Line Interface CLI as the administrator NOTE For details about accessing and using any of the menu commands described in this example see the Web OS Command Reference 1 Connect the switch ports that will be involved in the trunk group 2 Follow these steps on Web switch 1 a Define a trunk group gt gt cfg trunk 1 Select trunk group 1 gt gt Trunk group 1 add 2 Add port 2 to trunk group 1 gt gt Trunk group 1 add 4 Add port 4 to trunk group 1 gt gt Trunk group 1 add 5 Add port 5 to trunk group 1 gt gt Trunk group 1 ena Enable trunk group 1 b Apply and verify the configuration gt gt Trunk group 1 apply Make your changes active gt gt Trunk group 1 cur View current trunking configuration Examine the resulting information If any settings are incorrect make appropriate changes c Save your new configuration changes gt gt Trunk group 1 save Save for restore after reboot Alteon WebSystems Chapter 3 Port Trunking m 67 212777 A February 2002 Web OS 10 0 Application Guide 3 Repeat the process on Web switch 2 gt gt cfg trunk 3 Select trunk group 3 gt gt Trunk group 3 add 4 Add port 4 to trunk group 3 gt gt Trunk group 3 add 6 Add port 6 to trunk group 3 gt gt Trunk group 3 add 9 Add port 9 to
258. cific Health Checks 230 HTTP Health Checks 231 UDP Based DNS Health Checks 233 FTP Server Health Checks 234 POP3 Server Health Checks 235 SMTP Server Health Checks 236 IMAP Server Health Checks 237 NNTP Server Health Checks 238 RADIUS Server Health Checks 239 HTTPS SSL Server Health Checks 240 WAP Gateway Health Checks 240 LDAP Health Checks 243 ARP Health Checks 245 Failure Types 246 Service Failure 246 Server Failure 246 Alteon Systems Contents 7 212777 A February 2002 Web OS 10 0 Application Guide Chapter 11 High Availability 247 VRRP Overview 248 VRRP Components 248 VRRP Operation 251 Selecting the Master VRRP Router 251 Active Standby Failover 252 Failover Methods 253 Active Standby Redundancy 254 Active Active Redundancy 255 Hot Standby Redundancy 256 Synchronizing Configurations 258 Web OS Extensions to VRRP 259 Virtual Server Routers 259 Sharing Active Active Failover 260 Tracking VRRP Router Priority 261 High Availability Configurations 263 Active Standby Virtual Server Router Configuration 263 Active Active VIR and VSR Configuration 265 Active Active Server Load Balancing Configuration 267 VRRP Based Hot Standby Configuration 275 Virtual Router Deployment Considerations 277 Mixing Active Standby and Active Active Virtual Routers 277 Synchronizing Active Active Failover 277 Eliminating Loops with STP and VLANs 278 Assigning VRRP Virtual Router ID 280 Configuring the Switch for Tracking 280 Synchronizing Conf
259. client connects to a server The client sends out a synchronization SYN request to the server The server allocates an area to process the client requests and acknowledges the client by sending a SYN ACK The client then acknowl edges the SYN ACK by sending an acknowledgement ACK back to the server thus complet ing the three way handshake Figure 6 9 on page 146 illustrates a classic type of SYN DoS attack If the client does not acknowledge the server s SYN ACK with a data request REQ and instead sends another SYN request the server gets saturated with SYN requests As a result all of the servers resources are consumed and it can no longer service legitimate client requests Normal Request Client sends a SYN request Server Server reserves session and sends SYN ACK Client sends an ACK or DATA REQ gt elem ae DoS SYN Attack Client sends a SYN request Server Server reserves session and sends SYN ACK jh Client ignores SYN ACK and continues to send new SYN requests gt es Sey responds with DAA Client ar eS e Server continues reserving sessions 4 Server is eventually saturated and cannot process legitimate requests Figure 6 9 DoS SYN Attacks without Delayed Binding Using an Alteon Web switch with delayed binding as illustrated in Figure 6 10 on page 147 the Web switch intercepts the client
260. configuration from Web switch 1 to Web switch 2 Use the oper slb sync command 6 Reverse the roles of the real servers and their backups in Web switch 2 s configuration Configure RIP 205 178 13 103 and RIP 205 178 13 104 as the real servers Configure RIP 205 178 13 101 and RIP 205 178 13 102 as their backups respectively In this configuration if a link between a switch and a server fails the server will fail health checks and its backup attached to the other switch will be brought online If a link between a switch and its Internet router fails the protocol used to distribute traffic between the routers for example OSPF will reroute traffic to the other router Since all traffic now enters the vir tual server router on one switch that switch will process all incoming connections If an entire master switch fails the backup will detect this failure because it will stop receiving advertisements The backup will assume the master s responsibility of responding to ARP requests and issuing advertisements Be cautious before setting the maximum connections maxconn metric in this configuration The maxcon number is not shared between switches Therefore if a server is used for normal operation by one switch and is activated simultaneously as a backup by the other switch the total number of possible connections to that server will be the sum of the maximum connection limits defined for it on both switches 266 m Chapter
261. cookie parsing information is stored in the session table on port 9 Sharing this information between switches is necessary to ensure the persistent session goes back to the same server NOTE Stateful failover is only supported in active standby mode with VMA enabled Alteon WebSystems Chapter 11 High Availability m 283 212777 A February 2002 Web OS 10 0 Application Guide What Happens When a Switch Fails Assume that the user performing an e commerce transaction has selected a number of items and placed them in the shopping cart The user has already established a persistent session on the top server in Figure 11 14 The user then clicks the Submit button to purchase the items At this time the active switch fails With stateful failover the following sequence of events occurs 1 The backup switch Switch 2 becomes active 2 The incoming request is redirected to Switch 2 3 When the user clicks Submit again the request is forwarded to the correct server Even though Switch 1 has failed the stateful failover feature prevents the client from having to re establish a secure session The server that stores the secure session now returns a response to the client via Switch 2 Clients St Web Switch 1 Internet Failed Servers Layer 2 Switch Router IP A Traffic is redirected to Switch 2 Web Switch 2 Active IP B Figure 11 14 Stateful Failover Example when the Master Switch Fails
262. ct 1 name dial up Assign contract name dial up 4 Set the bandwidth policy for this contract Each BWM contract must be assigned a bandwidth policy gt gt BWM Contract 1 pol 1 Assign policy 1 to BWM Contract 1 5 Enable this BWM contract gt gt BWM Contract 1 ena Enables this BWM contract 6 Select the second bandwidth policy gt gt BWM Contract 1 cfg bwm pol 2 Select bandwidth policy 2 7 Set the hard soft and reserved rate limits for this policy in Mbps gt gt Policy 2 hard 30 Set never exceed rate gt gt Policy 2 soft 25 Set desired bandwidth rate gt gt Policy 2 resv 20 Set committed information rate 8 On the switch select the second BWM contract and name the contract gt gt Policy 2 cfg bwm cont 2 Select BWM contract 2 gt gt BWM Contract 2 name broadband Assign contract name broadband 9 Set the bandwidth policy for this contract Each BWM contract must be assigned a bandwidth policy gt gt BWM Contract 2 pol 2 Assign policy 2 to BWM contract 2 10 Enable this BWM contract gt gt BWM Contract 2 ena Enables this BWM contract 458 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide 11 Assign the BWM contracts to different switch ports Physical switch ports are used to classify w
263. ct ena gt gt Layer 4 Advanced adv Select the SLB advance menu Enable DAM Return to the SLB menu 4 Configure the primary virtual server Alteon Web Switch 1 will be preferred for virtual server 10 10 10 1 gt gt gt gt gt gt gt gt gt gt Layer 4 virt Virtual server Virtual server Virtual server Virtual server 1 1 vip 10 10 10 1 1 ena 1 service http 1 http service group 1 Select menu for virtual server 1 Set the IP address for virtual server 1 Enable the virtual server Select menu for service on virtual server Use real server group I for http service Alteon Z Systems 212777 A February 2002 Chapter 4 OSPF m 93 Web OS 10 0 Application Guide 5 Configure the backup virtual server Alteon Web switch 1 will act as a backup for virtual server 10 10 10 2 Both virtual servers in this example are configured with the same real server group and provide identical services gt gt gt Pog gt gt gt gt Virtual server 2 http service cfg slb virt 2 Select menu for virtual server 2 Virtual server 1 vip 10 10 10 2 Virtual server 1 ena Virtual server 1 service http Virtual server 1 group 1 Set the IP address for virtual server 2 Enable the virtual server Select menu for service on virtual server Use real server group I for http service 6 Configure IP interfaces for each network that wi
264. ctions An OSPF area is defined by assigning two pieces of information an area index and an area ID The command to define an OSPF area is as follows gt gt cfg ip ospf aindex lt area index gt areaid lt n n n n gt NOTE The aindex option above is an arbitrary index used only on the switch and does not represent the actual OSPF area number The actual OSPF area number is defined in the areaid portion of the command as explained in the following sections Assigning the Area Index The aindex lt area index gt option is actually just an arbitrary index 0 2 used only by the Web switch This index does not necessarily represent the OSPF area number though for con figuration simplicity it should where possible For example both of the following sets of commands define OSPF area 0 the backbone and area because that information is held in the area ID portion of the command However the first set of commands is easier to maintain because the arbitrary area indexes agree with the area IDs E Area index and area ID agree cfg ip osp aindex 0 areaid 0 0 0 0 Use index 0 to set area 0 in ID octet format cfg ip osp aindex 1 areaid 0 0 0 1 Use index I to set area I in ID octet format E Area index set to an arbitrary value cfg ip osp aindex 1 areaid 0 0 0 0 Use index l to set area 0 in ID octet format cfg ip osp aindex 2 areaid 0 0 0 1 Use index 2 to set area l in ID octet format Alteon Z
265. curity Management page 468 User Application Fairness Example Bandwidth Management can be applied to prevent heavy bursters from locking out other users such as in preventing the following E Customers using broadband access such as DSL from blocking dial up customers E Customers from the same hosting facility locking out each other because of flash crowd E FTP from locking out Telnet E Rate limit particular applications In the following example BWM is configured to prevent broadband customers from affecting dial up customer access This is accomplished by setting higher bandwidth policy rate limits for the port processing broadband traffic 1 Select the first bandwidth policy Each policy must have a number from to 64 NOTE Ensure BWM is enabled on the switch cf g bwm on gt gt cfg bwm pol 1 Select BWM policy 1 2 Set the hard soft and reserved rate limits for the bandwidth policy in Mbps gt gt Policy 1 hard 5 Set never exceed rate gt gt Policy 1 soft 4 Set desired bandwidth rate gt gt Policy 1 resv 3 Set committed information rate Alteon Z Systems Chapter 17 Bandwidth Management m 457 212777 A February 2002 Web OS 10 0 Application Guide 3 On the switch select a BWM contract and name the contract Each contract must have a unique number from to 256 gt gt Policy 1 cfg bwm cont 1 Select BWM contract 1 gt gt BWM Contra
266. d session inspection capability packet source and des tination IP addresses are included in filter log messages Filter log messages are generated when a Layer 3 Layer 4 filter is triggered and has logging enabled The messages are output to the console port system host log syslog and the Web based interface message window 176 Chapter 7 Filtering Alteon e systems A February Web OS 10 0 Application Guide Example A network administrator has noticed a significant number of ICMP frames on one portion of the network and wants to determine the specific sources of the ICMP messages The administrator uses the Command Line Interface CLI to create and apply the following filter gt gt gt gt gt gt gt gt 22 gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt aS cfg slb filt 15 Fil Fil Fil Fil Fil Fil Fil Fil S S S S Cer cer L cer L cer L cer L cer L cer L Ler LB port LB port LB port LB port ala ao ul 7 7 7 7 sip any dip any action allow name allow matching traffic proto icmp ena adv log enable Advanced cfg slb port 7 add 15 filt ena apply save Select filter 15 From any source IP address To any destination IP address Allows matching traffic to pass Provide a descriptive name for the filter For the ICMP protocol Enable the filter Log matching traffic to syslog Select
267. d to enable the real server gt gt Joper slb ena lt real server number gt IP Address Ranges Using imask The imask option lets you define a range of IP addresses for the real and virtual servers con figured under SLB By default the imask setting is 255 255 255 255 which means that each real and virtual server represents a single IP address An imask setting of 255 255 255 0 would mean that each real and virtual server represents 256 IP addresses Consider the following example A virtual server is configured with an IP address of 172 16 10 1 M Real servers 172 16 20 1 and 172 16 30 1 are assigned to service the virtual server E The imask is set to 255 255 255 0 If the client request was sent to virtual server IP address 172 16 10 45 the unmasked portion of the address 0 0 0 45 gets mapped directly to whichever real server IP address is selected by the SLB algorithm Thus the request would be sent to either 172 16 20 45 or 172 16 30 45 Alteon WebSystems Chapter 6 Server Load Balancing 129 212777 A February 2002 Web OS 10 0 Application Guide Health Checks for Real Servers Determining health for each real server is a necessary function for SLB By default for TCP services the switch checks health by opening a TCP connection to each service port config ured as part of each service For more information see Configuring Multiple Services on page 130 For UDP services the switch pings servers to
268. dant data paths into a standby blocked state When multiple paths exist Spanning Tree configures the network so that a switch uses only the most efficient path If that path fails Spanning Tree automatically sets up another active path on the network to sustain network operations The relationship between port trunk groups VLANs and Spanning Trees is shown in Table 2 1 Table 2 1 Ports Trunk Groups and VLANs Switch Element Belongs to Port Trunk group or One or more VLANs Trunk group One or more VLANs VLAN One Spanning Tree group NOTE Due to Spanning Tree s sequence of listening learning and forwarding or blocking lengthy delays may occur For more information on using STP in cross redundant topologies see Eliminating Loops with STP and VLANs on page 278 Alteon Systems Chapter 2 VLANs m 49 212777 A February 2002 Web OS 10 0 Application Guide Bridge Protocol Data Units BPDUs To create a Spanning Tree the Web switch generates a configuration Bridge Protocol Data Unit BPDU which it then forwards out of its ports All switches in the Layer 2 network par ticipating in the Spanning Tree gather information about other switches in the network through an exchange of BPDUs A BPDU is a 64 byte packet that is sent out at a configurable interval which is typically set for two seconds The BPDU is used to establish a path much like a hello packet in IP routing BPDUs contain inf
269. ddstr addstr amp WDdD Add the code red virus string Add the code blue virus string Add the code blue virus string Add the offending URL request 9 Apply and save the configuration 10 Apply the filter to the client port If the incoming client requests are on port 3 then add the filter to the port gt gt cfg slb port 3 gt gt SLB Port 3 filt ena gt gt SLB Port 3 add 1 Select the client port Enable filtering on the port Add the Layer 7 filter to the port Alteon Z Systems 212777 A February 2002 Chapter 15 Content Intelligent Switching m 419 Web OS 10 0 Application Guide 420 Chapter 15 Content Intelligent Switching Alteon systems A February CHAPTER 16 Persistence The Web OS persistence feature ensures that all connections from a specific client session reach the same real server even when Server Load Balancing SLB is used The following topics are addressed in this chapter Overview of Persistence on page 422 This section gives an overview of persistence and the different types of persistence methods implemented in Web OS Cookie Based Persistence on page 424 The use of cookie persistence provides a mech anism for inserting a unique key for each client of a virtual server This feature is only used in nonsecure socket layer non SSL connections This section discusses in detail how persistence is maintained between a client and a re
270. declaring that if another router sends data destined for any address in the 192 204 4 0 24 range it will carry that data to its destination Alteon Z Systems Chapter 4 OSPF 73 212777 A February 2002 Web OS 10 0 Application Guide OSPF Implementation in Web OS Web OS 10 0 supports a single instance of OSPF and up to 1K routes on the network The fol lowing sections describe OSPF implementation in Web OS Configurable Parameters on page 74 Defining Areas on page 75 Interface Cost on page 77 Electing the Designated Router and Backup on page 77 Summarizing Routes on page 77 Default Routes on page 78 Virtual Links on page 79 Router ID on page 80 Authentication on page 80 Host Routes for Load Balancing on page 82 OSPF Features Not Supported in This Release on page 82 Configurable Parameters In Web OS 10 0 OSPF parameters can be configured through the Command Line Interface CLD Web OS Browser Based Interface BBI for Alteon AD4 and 184 switches or through SNMP The CLI supports the following parameters interface output cost interface priority dead and hello intervals retransmission interval and interface transmit delay In addition to the above parameters you can also specify the following Shortest Path First SPF interval Time interval between successive calculations of the shortest path tree using the Dijkstra s algorithm Stub are
271. ded over multiple lines by preceding each extra line with at least one space Some customer applications of HTTP header inspection are listed below E Redirection based on domain name Cachability based on domain name Virtual hosting Redirection based on browser type Cookie based preferential redirection Buffering Content with Multiple Frames To handle the overall length of HTTP headers including request headers containing multiple cookies and the Maximum Segment Size MSS of dial up connections Web OS software provides the following support E HTTP GET Request Headers NOTE In addition to the URL path which generally is less than 300 bytes the HTTP GET requests also include general headers and request headers O Parsing GET requests to match URL path and HTTP header beyond the first frame while performing delayed binding O Processing multiple frames from a single HTTP GET request using a TCP stack on the switch E HTTP Cookie Request Headers Buffering a maximum of 4500 bytes for a single GET request across multiple frames A single GET request can include multiple cookies 374 m Chapter 15 Content Intelligent Switching Alteon e systems A February Web OS 10 0 Application Guide Content Intelligent Server Load Balancing Web OS allows you to load balance HTTP requests based on different HTTP header informa tion such as Cookie header for persistent load balancing Host header for virtu
272. dence i sees ceesconessvedsroces cases SES Statistics and history s s s Border Gateway Protocol BGP eseeeeeeeeeee use with GSLB sssececeececeeceaeeanesseeees Bridge Protocol Data Unit BPDU broadcast domains scseseseseseeeeees 33 43 45 48 Browser Based Interface ccccssssececessrseeeeeeees 74 C CGE bin SCLIPts ss csiesces ccocccsaascsstecdeascssubeaseees Cisco EtherChannel ccsecccccccececeeceeeeeeeenenenene client traffic processing ceeeeceeeeeceecececeeeeeeeeees SLB web balancing example command ConventiOns scceceeseeeeseeeees Command Line Interface cc ceeeceeeeeeeeeeeneeenees 475 Web OS 10 0 Application Guide configuring cookie based persistence seeseeeeeeeeeneee FTP Server Load Balancing multi response cookie search 000008 stateful failover CONTACHING US ve sipe euere eE eners orie content intelligent server load balancing seeeeseeeeeereeerreererenee 375 Web cache redirection sseeeeseeeeeeeeeeee eseese 394 cookie TES A AA E TE A T TATT different types cicccscsscssescsesecsensses cases niece expiration timer PASSIVE MOE ci ele ce eveacceveed tebe sevens tesedeseaes permanent temporary VANUCS E EE E E cookie based persistence sceeeeeeeseeeeeeeteeeee customer SUPPONE i ecicssescishie
273. desired If the load balancing statistics with minmi sses indicate that one server is processing significantly more requests over time than other servers consider using the hash metric Least Connections With the leastconns metric the number of connections currently open on each real server is measured in real time The server with the fewest current connections is considered to be the best choice for the next client connection request This option is the most self regulating with the fastest servers typically getting the most con nections over time Round Robin With the roundrobin metric new connections are issued to each server in turn that is the first real server in the group gets the first connection the second real server gets the next con nection followed by the third real server and so on When all the real servers in this group have received at least one connection the issuing process starts over with the first real server 132 m Chapter 6 Server Load Balancing Alteon 2 Systems A February Web OS 10 0 Application Guide Response Time The response metric uses real server response time to assign sessions to servers The response time between the servers and the switch is used as the weighting factor The switch monitors and records the amount of time it takes for each real server to reply to a health check to adjust the real server weights The weights are adjusted so they are inversely proportional to a moving
274. determine their status By default the switch checks each service on each real server every two seconds If the real server is busy processing connections it may not respond to a health check By default if a service does not respond to four consecutive health checks the switch declares the service unavailable As shown below the health check interval and the number of retries can be changed gt gt cfg slb real lt real server number gt Select the real server gt gt Real server inter 4 Check real server every 4 seconds gt gt Real server retry 6 Declare down after 6 checks fail For more complex health checking strategies see Chapter 10 Health Checking Configuring Multiple Services When you configure multiple services in a group their health checks will be dependent on each other If a real server fails a health check for a service then the status of the real server for the second service appears as blocked If you are configuring two independent services such as FTP and SMTP where the real server failure on one service does not affect other services that the real server supports then configure two groups with the same real servers but different services If a real server config ured for both FTP and SMTP fails FTP the real server is still available for SMTP This allows the services to act independently even though they are using the same real servers If you are configuring two depende
275. dia data of a customer site locally Since the requests for this data are directed to the local cache they are served faster You can also configure certain URL content to be non cacheable The requests for non cacheable URLs will bypass the cache server and be sent across the Internet to the origin server The client packets are relayed to the server by using Layer 4 server load balancing For a detailed information on load balancing two prominent commercial RTSP servers Real Player and QuickTime see Real Time Streaming Protocol SLB on page 155 RTSP Web Cache Redirection Example To configure RTSP for web cache redirection follow this procedure 1 Define RTSP WCR cache servers for RTSP WCR load balancing gt gt cfg slb real 1 gt gt Real server 1 rip 1 1 1 1 Enter an IP address for example 1 1 1 1 for RTSP cache Server 1 gt gt cfg slb real 2 gt gt Real server 2 rip 1 1 1 2 Enter an IP address for example 1 1 1 2 for RTSP cache Server 2 2 Define RTSP cache server groups for RTSP WCR load balancing gt gt cfg slb group 1 gt gt Group 1 add 1 Add RTSP cache server 1 to group 1 gt gt Group 1 add 2 Add RTSP cache server 2 to group 1 Alteon WebSystems Chapter 8 Application Redirection m 211 212777 A February 2002 Web OS 10 0 Application Guide 3 Configure an RTSP redirection filter to cache data and balance the load among the cache servers
276. dwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Packet Coloring TOS bits for Burst Limit Whenever the soft limit is exceeded optional packet coloring can be done to allow down stream routers to use diff serv mechanisms that is writing the Type Of Service TOS byte of the IP header to delay or discard these out of profile frames Frames that are not out of pro file are marked with a different higher priority value This feature can be enabled or disabled on a per contract basis using the wt os option under the contract menu cfg bwm cont x wtos to enable disable overwriting IP TOS The actual values used by the switch for overwriting TOS values depending on whether traffic is over or under the soft TOS limit are set in the bandwidth policy menu cfg bwm pol x with the utos and otos options The values allowed are 0 255 Typically the values spec ified should match the appropriate di f f serv specification but could be different depend ing on the customer environment Operational Keys There are two operational keys for BWM a standard key and a demo key The demo key auto matically expires after a demo time period These keys may only be enabled if Layer 4 services have been enabled Alteon WebSystems Chapter 17 Bandwidth Management m 453 212777 A February 2002 Web OS 10 0 Application Guide Configuring Bandwidth Management The following procedure provides ge
277. e 4 Configure the real server s to handle the appropriate load balancing string s NOTE If you don t add a defined string or add the defined string any the server will han dle any request Use the following command to add a defined string gt gt cfg slb real 2 layer7 addlb lt ID gt where JD is the identification number of the defined string 386 m Chapter 15 Content Intelligent Switching Alteon e Systems A February Web OS 10 0 Application Guide URL Hashing for Server Load Balancing By default hashing algorithms use the IP source address and or IP destination address depending on the application area to determine content location The default hashing algo rithm for SLB is the IP source address By enabling URL hashing requests going to the same page of an origin server are redirected to the same real server or cache server Virtual Server Load Balancing of Nontransparent Caches You can deploy a cluster of non transparent proxy caches and use the virtual server to load bal ance requests to the cache servers The client s browser is configured to send Web requests to a nontransparent cache the IP address of the configured virtual server If hash is selected as the load balancing algorithm the switch hashes the source IP address to select the server for SLB Under this condition the switch may not send Web requests for the same origin server to the same proxy cache se
278. e 38 DHCP Relay Agent Configuration 42 Example 1 Multiple VLANs with Tagging Gigabit Adapters 46 Example 2 Parallel Links with VLANs 48 Using Multiple Instances of Spanning Tree Protocol 51 VLAN 3 Isolated in a Single Spanning Tree Group 52 Implementing Multiple Spanning Tree Groups 53 Default Gateways per VLAN 58 Jumbo Frame VLANs 64 Port Trunk Group 65 Port Trunk Group Configuration Example 67 OSPF Area Types 70 OSPF Domain and an Autonomous System 71 Injecting Default Routes 78 OSPF Authentication 80 A Simple OSPF Domain 84 Configuring a Virtual Link 86 Summarizing Routes 90 Configuring OSPF Host Routes 92 Authentication and Authorization How It Works 103 Monitoring Ports 113 13 Web OS 10 0 Application Guide 14 m Figures Figure 6 1 Figure 6 2 Figure 6 3 Figure 6 4 Figure 6 5 Figure 6 6 Figure 6 7 Figure 6 8 Figure 6 9 Figure 6 10 Figure 6 11 Figure 7 1 Figure 7 2 Figure 7 3 Figure 7 4 Figure 7 5 Figure 7 6 Figure 7 7 Figure 7 8 Figure 7 9 Figure 7 10 Figure 7 11 Figure 8 1 Figure 8 2 Figure 11 1 Figure 11 2 Figure 11 3 Figure 11 4 Figure 11 5 Figure 11 6 Figure 11 7 Figure 11 8 Figure 11 9 Figure 11 10 Figure 11 11 Figure 11 12 Figure 11 13 Figure 11 14 Traditional Versus SLB Network Configurations 119 Web Hosting Configuration Without SLB 121 Web Hosting with SLB Solutions 121 SLB Client Server Traffic Routing 122 Example Network
279. e IP interface on a different subnet for each firewall being load balanced NOTE An extra IP interface IF 1 prevents server to server traffic from being redirected gt gt cfg ip if 1 Select IP interface 1 gt gt IP Interface 1 addr 20 1 1 1 Set the IP address for interface 1 gt gt IP Interface 1 mask 255 255 255 0 Set subnet mask for interface 1 gt gt IP Interface 1 ena Enable IP interface 1 gt gt IP Interface 1 if 2 Select IP interface 2 gt gt IP Interface 2 addr 10 1 3 1 Set the IP address for interface 2 gt gt IP Interface 2 mask 255 255 255 0 Set subnet mask for interface 2 gt gt IP Interface 2 ena Enable IP interface 2 gt gt IP Interface 2 if 3 Select IP interface 3 gt gt IP Interface 3 addr 10 1 4 1 Set the IP address for interface 3 gt gt IP Interface 3 mask 255 255 255 0 Set subnet mask for interface 3 gt gt IP Interface 3 ena Enable IP interface 3 2 Configure the dirty side IP interfaces as if they were real servers on the clean side You should already have configured a dirty side IP interface on a different subnet for each fire wall path being load balanced Create two real servers on the clean side switch using the IP address of each dirty side IP interface gt gt IP Interface 5 cfg slb real 1 Select real server 1 gt gt Real server 1 rip 10 1 1 1 Assign dirty side IF 1 address gt gt Real server 1
280. e active firewalls to operate in parallel Parallel operation allows users to maximize firewall productivity scale firewall performance without forklift upgrades and eliminate the firewall as a single point of failure This chapter presents the following material E Firewall Overview on page 314 An overview of firewalls and the various FWLB solutions supported by Alteon Web switches E Basic FWLB on page 316 Explanation and example configuration for FWLB in simple networks using two parallel firewalls and two Web switches The basic FWLB method combines redirection filters and static routing for FWLB E Four Subnet FWLB on page 326 Explanation and example configuration for FWLB in a large scale high availability net work with redundant firewalls and Web switches This method combines redirection fil ters static routing and Virtual Router Redundancy Protocol VRRP E Advanced FWLB Concepts on page 346 O Free Metric FWLB on page 346 Using other load balancing metrics besides hash by enabling the Return to Sender RTS option O Adding a Demilitarized Zone DMZ on page 349 Adding a DMZ for servers that attach to the Web switch between the Internet and the firewalls O Firewall Health Checks on page 351 Methods for fine tuning the health checks performed for FWLB Alteon Z Systems 313 212777 A February 2002 Web OS 10 0 Application Guide Firewall Overview Firewall
281. e clients For information on how to configure your network for SLB see Server Load Balancing on page 117 376 m Chapter 15 Content Intelligent Switching Alteon 2bSystems 212777 A February 2002 Web OS 10 0 Application Guide 2 Define the string s to be used for URL load balancing gt gt cfg slb layer7 slb add rem lt string gt E add Add string or a path E rem Remove string or a path A default string any indicates that the particular server can handle all URL or Web cache requests Refer to the following examples given below Example 1 String with the Forward Slash A string that starts with a forward slash such as images indicates that the server will process requests that start out with the images string only For example with the images string the server will handle these requests images product b gif images company a gif images testing c jpg The server will not handle these requests company images b gif product images c gif testing images a gif Example 2 String without the Forward Slash A string that does not start out with a forward slash indicates that the server will process any requests that contain the defined string For example with the images string the server will process these requests images product b gif images company a gif images testing c jpg company images b gif product images c gif
282. e encrypted real server IP address and virtual server IP address Set Cookie sid cdb20f 04cdb20 0a All subsequent traffic from a specific client to the particular virtual server IP address with this cookie will be directed to the same real server Alteon WebSystems Chapter 16 Persistence m 435 212777 A February 2002 Web OS 10 0 Application Guide Server Side Multi Response Cookie Search Cookie based persistence requires the switch to search the HTTP response packet from the server and if a persistence cookie is found sets up a persistence connection between the server and the client The Alteon switch looks through the first HTTP response from the server While this approach works for most servers some customers with complex server configurations might send the persistence cookie a few responses later In order to achieve cookie based per sistence in such cases Web OS 10 0 allows the network administrator to configure the switch to look through multiple HTTP responses from the server In Web OS 10 0 the network administrator can modify a response counter to a value from 1 16 The switch will look for the persistence cookie in this number of responses each of them can be multi frame from the server Configuring Server Side Multi Response Cookie Search Configure the server side multi response cookie search by using the following command gt gt cfg slb virt lt virtual server gt service lt virtual port numb
283. e following sections Alteon WebSystems Chapter 13 Firewall Load Balancing 315 212777 A February 2002 Web OS 10 0 Application Guide Basic FWLB The basic FWLB method uses a combination of static routes and redirection filters to allow multiple active firewalls to operate in parallel Figure 13 2 shows a basic FWLB topology SS i gt SS Dirty Side of Network _ ss Clean Side of Network gt Internal Internet Nenvark Web Switch Web Switch Firewalls Figure 13 2 Basic FWLB Topology The firewalls being load balanced are in the middle of the network separating the dirty side from the clean side This configuration requires a minimum of two Web switches one on the dirty side of the firewalls and one on the clean side A redirection filter on the dirty side Web switch splits incoming client traffic into multiple streams Each stream is routed through a different firewall The valid client traffic in each stream is forwarded to a virtual server on the clean side Web switch The clean side Web switch uses Server Load Balancing SLB settings to select a real server on the internal net work for each incoming request The same process is used for outbound server responses a redirection filter on the clean side Web switch splits the traffic and static routes forward each stream through a different firewall and then back to the client Although other metrics can be used in some configurations
284. e it for proper processing Host headers were optional in HTTP 1 0 but are required when you use HTTP 1 1 E In order to tell the Web server you have finished entering header information a blank line of input is needed after all headers At this point the URL will be processed and the results returned to you NOTE If you make an error enter rem to remove the last typed script line entered If you need to remove more than one line enter rem for each line that needs to be removed E The switch provides the prompt which is one enter key stroke When using the send command note what happens when you type the send command with the command string When you type send press enter and allow the switch to format the command string that is versus 226 m Chapter 10 Health Checking Alteon e Systems A February Web OS 10 0 Application Guide Scripting Guidelines E Use generic result codes that are standard and defined by the RFC as applicable This helps ensure that if the customer changes server software the servers won t start failing unexpectedly Search only for the smallest and most concise piece of information possible Each script cannot exceed IK in size so use the space wisely E Avoid tasks that may take a long time to perform or the health check will fail For exam ple avoid tasks that exceed the interval for load balancing Script Configuration Examples Script Example 1 A Basic Health
285. e of addresses from advertising to the backbone gt gt OSPF Interface 2 range 2 Select menu for summary range gt gt OSPF Summary Range 2 addr 36 128 200 0 Set base IP address gt gt OSPF Summary Range 2 mask 255 255 200 255 Set mask address gt gt OSPF Summary Range 2 hide enable Hide the range of addresses 9 Apply and save the configuration changes gt gt OSPF Summary Range 2 apply Global command to apply all changes gt gt OSPF Summary Range 2 save Global command to save all changes Alteon Systems Chapter 4 OSPF 91 212777 A February 2002 Web OS 10 0 Application Guide Example 4 Host Routes The Web OS 10 0 implementation of OSPF includes host routes Host routes are used for advertising network device IP addresses to external networks and allows for Server Load Bal ancing SLB within OSPF It also makes ABR load sharing and failover possible Consider the example network in Figure 4 8 Both Web switches have access to servers with identical content and are configured with the same virtual server IP addresses 10 10 10 1 and 10 10 10 2 Web switch 1 is given a host route with a low cost for virtual server 10 10 10 1 and another host route with a high cost for virtual server 10 10 10 2 Web switch 2 is config ured with the same hosts but with the costs reversed one host route has a high cost for virtual server 10 10 10 1 and another has a low cost for virtual server
286. e ports on the same VLAN Helps elect the virtual routers with the most available cfg vrrp track ports ports as the master This parameter influences the VRRP router s priority in both virtual interface routers and virtual server routers Alteon Z Systems Chapter 11 High Availability m 261 212777 A February 2002 Web OS 10 0 Application Guide Table 11 3 VRRP Tracking Parameters Parameter Description Number of physical switch ports that have active Layer 4 processing on the switch cfg vrrp track 1l4pts Helps elect the main Layer 4 switch as the master This parameter influences the VRRP router s prior ity in both virtual interface routers and virtual server routers Number of healthy real servers behind the virtual server IP address that is the same as the IP address of the virtual server router on the switch cfg vrrp track reals Helps elect the switch with the largest server pool as the master increasing Layer 4 efficiency This parameter influences the VRRP router s priority in virtual server routers only In networks where the Hot Standby Router Protocol HSRP is used for establishing router failover the num ber of Layer 4 client only ports that receive HSRP advertisements cfg vrrp track hsrp Helps elect the switch closest to the master HSRP router as the master optimizing routing efficiency This parameter influences the VRRP router s prior ity in both virtual interface routers and virt
287. eal 20 rip 10 10 4 20 ena real 21 rip 10 10 4 21 ena real 22 rip 10 10 4 22 ena group 2 add 20 add 21 add 22 metric leastconns virt 1 vip 10 10 4 100 service http group 2 ena port 4 server ena port 3 client ena port 9 client ena Select the SLB menu Select real server 20 Set IP address of real server 20 Enable Select real server 21 Set IP address of real server 21 Enable Select real server 22 Set IP address of real server 22 Enable Select real server group 2 Add the real servers to the group Select least connections as the load balancing metric Select the virtual server 1 menu Set the virtual server IP address Select HTTP for load balancing Add real server group 2 Enable the virtual server Enable server processing on the port connected to the real servers Enable client processing on the port connected to the firewall Enable client processing on the inter switch connection NOTE The virtual server IP address configured in this step will also be configured as a Vir tual Server Router VSR when VRRP is configured in a later step 342 m Chapter 13 Firewall Load Balancing Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide 3 Create the FWLB filters on the primary clean side Web switch Three filters are required on the port attaching to the real servers E Filter 10 prevents
288. eal servers This port does not require Web switching features 5 Client router A connects the switch to the Internet where all client Client requests originate 6 Client router B also connects the switch to the Internet where all client Client requests originate The following commands are used to disable server processing on ports 1 3 gt gt cfg slb port 1 Select switch port 1 gt gt SLB port 1 server dis Disable server processing on port 1 gt gt SLB port 1 port 2 Select switch port 2 gt gt SLB port 2 server dis Disable server processing on port 2 gt gt SLB port 2 port 3 Select switch port 3 gt gt SLB port 3 server dis Disable server processing on port 3 2 Add proxy IP addresses to the client ports Each client port requires a proxy IP address Each proxy IP address must be unique on your network The following commands are used to configure client proxies gt gt cfg slb port 5 Select network port 5 gt gt SLB port 5 pip 200 200 200 68 Set proxy IP address for client port 5 gt gt SLB port 5 port 6 Select network port 6 gt gt SLB port 6 pip 200 200 200 69 Set proxy IP address for client port 6 The proxies are transparent to the user Alteon Z Systems 212777 A February 2002 Chapter 6 Server Load Balancing m 137 Web OS 10 0 Application Guide 3 Ifthe Virtual Matrix Architecture VMA feature is enabled add proxy IP addre
289. eb aih can perform multi protocol routing s Switching and routing topics 25 Web OS 10 0 Application Guide 26 Basic Switching amp Routing Alteon Z systems A February CHAPTER 1 Basic IP Routing This chapter provides configuration background and examples for using the Alteon Web switch to perform IP routing functions The following topics are addressed in this chapter E IP Routing Benefits on page 28 Routing Between IP Subnets on page 28 Example of Subnet Routing on page 31 Defining IP Address Ranges for the Local Route Cache on page 35 Border Gateway Protocol BGP on page 36 DHCP Relay on page 41 Alteon Systems 27 212777 A February 2002 Web OS 10 0 Application Guide IP Routing Benefits The Alteon Web switch uses a combination of configurable IP switch interfaces and IP routing options The switch IP routing capabilities provide the following benefits E Connects the server IP subnets to the rest of the backbone network E Performs server load balancing using both Layer 3 and Layer 4 switching in combina tion to server subnets that are separate from backbone subnets E Provides another means to invisibly introduce Jumbo frame technology into the server switched network by automatically fragmenting UDP Jumbo frames when routing to non Jumbo frame VLANs or subnets Provides the ability to route IP traffic between multiple Virtual Local Area Networks
290. ebruary CHAPTER 4 OSPF Web OS 10 0 supports the Open Shortest Path First OSPF routing protocol The Web OS implementation conforms to the OSPF version 2 specifications detailed in Internet RFC 1583 The following sections discuss OSPF support for the Alteon AD4 184 Web switches mM OSPF Overview on page 69 This section provides information on OSPF concepts such as types of OSPF areas types of routing devices neighbors adjacencies link state data base authentication and internal versus external routing E OSPF Implementation in Web OS on page 74 This section describes how OSPF is implemented in Web OS such as configuration parameters electing the designated router summarizing routes defining route maps and so forth E OSPF Configuration Examples on page 83 This section provides step by step instruc tions on configuring four different configuration examples O Creating a simple OSPF domain O Creating virtual links O Summarizing routes oO Creating host routes OSPF Overview OSPF is designed for routing traffic within a single IP domain called an Autonomous System AS The AS can be divided into smaller logical units known as areas All routing devices maintain link information in their own Link State Database LSDB The LSDB for all routing devices within an area is identical but is not exchanged between different areas Only routing updates are exchanged between areas thereby significantl
291. edding an IP address The following figure shows passive cookie mode operation 1 Configure server to send cookies 2 Configure switch to record cookie values Sommemtemioe Aan Web Server s internet Farm Proxy Firewall Web Switch Client Figure 16 3 Passive Cookie Mode Subsequent requests from Client 1 with the same cookie value will be sent to the same real server RIP 1 in this example 428 m Chapter 16 Persistence Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Rewrite Cookie Mode In rewrite cookie mode the Web switch generates the cookie value on behalf of the server eliminating the need for the server to generate cookies for each client Instead the server is configured to return a special persistence cookie which the switch is con figured to recognize The switch then intercepts this persistence cookie and rewrites the value to include server specific information before sending it on to the client Subsequent requests from the same client with the same cookie value are sent to the same real server Rewrite cookie mode requires at least eight bytes in the cookie header An additional eight bytes must be reserved if you are using cookie based persistence with Global Server Load Bal ancing GSLB NOTE Rewrite cookie mode only works for cookies defined in the HTTP header not cookies defined in the URL Example The following figure shows rewrite cookie
292. eeeeeeeeeeceeeeeeeeeeee mapping virtual ports to real ports MAXCONS LMI tis si ssssetiecds seusscersastvonnoessgsvbonce MAXIMUM connections cceeseeseeeeeeeeeeees minimum misses SLB real server metric 131 MUTTOTING POTTS eee seeeeeeecesseceeesneecnteeeeeaeeeeees 113 MP Management Processor s ssseceeeeeseeeeees 45 MUIti HOMING eee eeeeeeeeeeeesteeceeneeeceeeeeesneeeeees 312 multi links between switches using port trunking 00 0 eee ee eseeeeeeeeeeeseeeeees 65 USNS VILANS sss sessccesvernsnaveceessonaverntersnancstes 48 multimedia SCrverS ccccceeseseseeeesessnsaeaeeeeees 155 multiple spanning tree groups ee eeeeeeeseeeeeeeees 31 Alteon Z Systems 212777 A February 2002 N name servers Global SLB configuration example 291 Network Address Translation NAT e006 208 configuration example 191 to 193 filt r examiples si saccissctssievasssvsnesnsseeveessitevess 194 1060 A E E ce peartrcre rre 194 static example o siscevasscsessiacsesesvenisucesancvsteees 191 network performance statistics with use of proxy addresses 136 NeW eianieeieccctatece NFS server non cacheable sites in application redirection 215 none port processing mode example 126 non HTTP redirects for GSLB eeeeseeeeeeeees 304 O optional software eeeeeeeeeeseeeereeesrreerreeessessreeee 203 OSPF ATE
293. eeeeeeeseteeeeeee server load balancing seeeeeeeeeee Web cache redirection Layer 7 deny filter oses ee nE E E Ei 417 precedence lookup ccssseceeseseeesteeeseeeees 414 regular expression matching c0cceseeee 412 server load balancing esseeeesesseeeeeeeeee 375 string Matching eeseeeeceeeseeeeeeseeeeeeeeees 410 Web cache redirection cccessseeeeeeeeeeeees 394 least connections SLB Real Server metric 132 limiting TCP sessions eeeseceeeeseeeseneeeesteeeeenes 179 Imask local route cache parameter ccsceee 35 Inet local route cache parameter cc eeeeee 35 478 m Index load balancing TCP based DNS queries TYPES Of c H sveccieassesgavdaeenccucveaseweeses UDP based DNS queries sseceesseeeeeees 151 WAN ttaffie cs 65 cccseccusdchssectceccdsnconsnctestessnaets WAP traffic ceninin ina local route cache address range local route cache parameters VIM SKC ae E E T 35 The aE AE E E 35 log filtering option sseeseeeeeeeeereeerrerrrrerrrerree 170 log filtering option ssseseseseessresseeererrereereeresreee 185 logical segment See IP subnets TSAS aeae as ESTEE EVE E EEE 72 M MAC address visu ccincnensnasinvelieieeie Management Processor MP sseseeeeeeeeeeeeee use in switch security eseese eseese manual style conventions sseeeeeeeeeeeeeeeeeee mapping ports se ee
294. eeeeeneeeee TP ifterfaces eean a A EER Management Processol s seseeeeeee multiple links s cccsecscsesesesssnsses cess csess multiple spanning trees eeeeeeeeeeeeeeeeneeee multiple VLANS ccccccccececeeeeceeeeeetenens parallel links example eeeeeeseeeeeeeeeneeeee routing security Spanning Tree Protocol ccccsseeeeeeeees LAR SING vos chased ocscersscdeseosnasusenensapsusncness topologis eree aE emia 45 VLAN 1 default 44 to 45 125 207 295 VLAN tagging adapter support for 60 5 45 VPN cluster VPN Load Balancing Overview esseere 354 VRRP Virtual Router Redundancy Protocol active active redundancy ssecesssseeeeeeeees 255 active standby redundancy seseeeseeeeeseeees 254 hot standby redundancy secesesseeeeeeeees 256 inter switch port states eeeeeeeseeeeeeeeees 257 OVEIVIEW synchronization synchronizing configurations eeeeeeeees 257 virtual interface router s 248 virtual router ID numbering eeeeeeeee 280 virtual server rOULCT ceeeeeeeseeeeeenneeeeeeeees 259 482 m Index WwW WAP WSP content health check WTLS health check eee bas WAP Gate Way i sccccccececcecetecsssevesseesesensusnecoscnecnces WAP load balancing RADIUS snooping eeeeeeececesseeeeeseeeeeenees 160 Static session entries eceeceeeeeeceeeeeeeeeeeees 158 Web cac
295. efault gateways 5 or 6 fail then traffic is directed to default gateway 1 which is configured with IP address 10 10 4 1 If default gateways 1 through 4 are not configured on the switch then packets from VLAN 2 and VLAN 3 are dis carded The route cache table on the switch records each session request by mapping the destination IP address with the MAC address of the default gateway The command info arp dump on the switch command line will display the entries in the route cache similar to those shown in Table 2 3 The destination IP addresses see the last two rows are associated with the MAC addresses of the default gateways Table 2 3 Route Cache Example Alteon Z Systems Destination IP Flags MAC address VLAN Port Referenced address ports 10 10 1 1 P 00 60 cf 46 48 60 4 1 9 10 10 1 20 00 60 cf 44 cd a0 4 1 empty 10 10 1 30 00 60 cf 42 3b 40 4 2 empty 10 10 4 1 00 60 cf 42 77 e0 1 3 empty 10 10 4 40 P 00 60 cf 46 48 60 1 1 9 172 21 2 27 00 50 da 17 c8 05 2 7 1 172 21 2 200 P 00 60 cf 46 48 60 2 1 9 172 21 3 14 00 c0 4 09 3e 56 3 8 2 172 21 2 200 00 60 cf 46 48 60 3 1 9 192 168 20 200 00 60 cf 44 cd a0 4 1 7 200 1 2 200 00 60 cf 42 3b 40 4 2 8 As shown in Table 2 3 traffic from VLAN 2 uses Gateway 5 to access destination IP address 192 168 20 200 If traffic from VLAN 3 requests the same destination address then traffic is routed via Gateway 5 instead of Gateway 6 because 192 168 20 200 in t
296. em to a particular server Serve content based on user identity Prioritize access to scarce resources on a Web site Provide better services to repeat customers based on access count Clients that receive preferential service can be distinguished from other users by one of the fol lowing methods E Individual User Specific individual user could be distinguished by IP address login authentication or per manent HTTP cookie E User Communities Some set of users such as Premium Users for service providers who pay higher mem bership fees than Normal Users could be identified by source address range login authentication or permanent HTTP cookie E Applications Users could be identified by the specific application they are using For example priority can be given to HTTPS traffic that is performing credit card transactions versus HTTP browsing traffic E Content Users could be identified by the specific content they are accessing Based on one or more of the criteria above you can load balance requests to different server groups Alteon WebSystems Chapter 15 Content Intelligent Switching m 383 212777 A February 2002 Web OS 10 0 Application Guide Configuring Cookie Based Preferential Load Balancing To configure cookie based preferential load balancing perform the following procedure 1 Before you can configure header based load balancing ensure that the switch has already been configured for basic S
297. en enter the following command gt gt cfg slb layer7 redir add net uk 404 Chapter 15 Content Intelligent Switching Alteon 2 Systems A February Web OS 10 0 Application Guide Browser Based Web Cache Redirection Browser based Web cache redirection uses the User agent header To configure browser based WCR perform the following procedure 1 Before you can configure header based WCR ensure that the switch is already config ured for basic SLB with the following tasks Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server Assign servers to real server groups Define virtual servers and services 2 Turn on URL parsing for the filter gt gt cfg slb filt 1 adv urlp enable 3 Enable header load balancing for User Agent header gt gt cfg slb layer7 redir header ena useragent 4 Define the host names gt gt cfg slb layer7 slb add Mozilla gt gt Server Load Balance Resource add Internet Explorer gt gt Server Load Balance Resource add Netscape 5 Apply and save your configuration changes 6 Identify the string ID numbers with this command gt gt cfg slb layer7 slb cur Each defined string has an ID number Number of entries four ID SLB String 1 any 2 Mozilla 3 Internet Explorer 4 Netscape Alteon Z
298. enable SLB Port 5 port 6 SLB Port 6 add 2 SLB Port 6 add 224 SLB Port 6 filt enable Select the SLB port 5 Add filter 1 to port 5 Add the default filter to port 5 Enable filtering for port 5 Select the SLB port 6 Add filter 1 to port 6 Add the default filter to port 6 Enable filtering for port 6 11 Enable apply and verify the configuration oe gt gt gt gt gt gt SLB Port 6 cfg slb Layer 4 on Layer 4 apply Layer 4 cur Select Server Load Balancing Menu Activate Layer 4 software services Make your changes active View current settings NOTE SLB must be turned on in order for application redirection to work properly The on command is valid only if the optional Layer 4 software is enabled on your Web switch see Activating Optional Software in the Web OS Command Reference 12 Examine the resulting information from the cur command If any settings are incorrect make appropriate changes Alteon Z Systems 212777 A February 2002 Chapter 8 Application Redirection 209 Web OS 10 0 Application Guide 13 Save your new configuration changes gt gt Layer 4 save Save for restore after reboot 14 Check the SLB information gt gt Layer 4 info slb View SLB information Check that all SLB parameters are working according to expectation If necessary make any appropriate configuratio
299. entries eeseesseeerrresrereereeereresees 158 statistical load distribution seeeseeeeeeeeeeeeeeeeee 66 STP bridge PD USisssscessesciveiveetescevesancesvends even seias 48 streaming media ssseeeeeeesseeesseesrrresreerereesreeeeses 155 SUMMAr Z Nng rOUtES eceeeeceeeececesseeeceseeeesneeeeees 77 SWitch failOVer iss ororsrrisesroied noiris pores sesasi 253 switch management SECUTI eeen o rran rner EEEE EEEE EES 99 via IP interface cc sses soers2dteseerscednssasssensctees 45 switch ports VLANs membership ceesc00 44 syslog T eA E E E E 170 T tagging See VLANs tagging TOP sk ores bio r EN health checking using POT BO ereenn bentsevewetevtdesvestanbevessusoesan teens rate limiting TCP UDP port numbers TDT Theoretical Departure Times 06 446 POMC tes scc6ccdescicsees anossegusecaudescnasvcagevocseesdecteegensss 185 text GONVENEIONS iisen ines ririri tE E E ERES ees 23 Theoretical Departure Times TDT 06 446 timeouts for real server connnections 66 134 TOS burst limit for bandwidth management 453 Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide transparent proxies ee 136 205 208 to 213 tunable hashing eeeseeceeseeeceececeeneeeeceseeeeenes 184 tunneling sieni sesen orisa reee ai rae Sieso 354 typographic CONVENTIONS sessssseessseeereeerrerrereeee 23 U WDP ere
300. ephone system WANs can also be con nected through leased lines and satellites WANs are typically composed of powerful routers and switches that link business enterprises universities remote offices and so on around the world To handle the high volume of data on the Internet some corporations are using more than one Internet Service provider ISP as a way to increase reliability of Internet connections Such enterprises with more than one ISP are referred to as being multi homed In addition to reliabil ity a multi homed network architecture enables enterprises to distribute load among multiple connections and to provide more optimal routing The WAN link load balancing feature introduces additional resilience for networks in multi homed environment When users want to control which WAN link the traffic traverses WAN link load balancing can be used to steer requests initiated within the user s network and his her responses over the appropriate link at that moment in time How WAN Link Load Balancing Works The Web switch uses redirection filters to redirect traffic initiated from within the user s net work to a group of devices that exist at the other end of the WAN link routers for example These filters determine which link is the best at the time the request is generated To ensure that the responses traverse the same link the source IP address of the request is translated to one of the addresses that the selected ISP owns
301. er 224 are set to the any state If no other filter acts on the traffic Filter 224 processes it denying and logging unwanted traffic gt gt cfg slb filt 224 Select the default filter gt gt Filter 224 sip any From any source IP addresses gt gt Filter 224 dip any To any destination IP addresses gt gt Filter 224 proto any For any protocols gt gt Filter 224 action deny Deny matching traffic gt gt Filter 224 name deny unwanted traffic Provide a descriptive name for the filter gt gt Filter 224 ena Enable the default filter gt gt Filter 224 adv Select the advanced menu gt gt Filter 224 Advanced log enable Log matching traffic to syslog Default filters are recommended but not required when configuring filters for IP traffic con trol and redirection Using default filters can increase session performance but takes some of the session binding resources If you experience an unacceptable number of binding failures as shown in the Server Load Balancing Maintenance Statistics stats slb maint you may wish to remove some of the default filters Alteon Z Systems Chapter 7 Filtering m 173 212777 A February 2002 Web OS 10 0 Application Guide VLAN based Filtering Filters are applied per switch per port or per VLAN VLAN based filtering allows a single Web switch to provide differentiated services for multiple customers groups or departments For example you c
302. er gt rcount Current Cookie search response count Enter new Cookie search response count 1 16 436 m Chapter 16 Persistence Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide SSL Session ID Based Persistence SSL is a set of protocols built on top of TCP IP that allows an application server and client to communicate over an encrypted HTTP session providing authentication non repudiation and security The SSL protocol handshake is performed using clear unencrypted text The content data is then encrypted using an algorithm exchanged during the handshake prior to being transmitted Using the SSL session ID the switch forwards the client request to the same real server to which it was bound during the last session Because SSL protocol allows many TCP connec tions to use the same session ID from the same client to a server key exchange needs to be done only when the session ID expires This reduces server overhead and provides a mecha nism even when the client IP address changes to send all sessions to the same real server NOTE The destination port number to monitor for SSL traffic is user configurable How SSL Session ID Based Persistence Works E ALI SSL sessions that present the same session ID 32 random bytes chosen by the SSL server will be directed to the same real server NOTE The SSL session ID can only be read by the switch after the TCP three way hand sha
303. er has agreed to pay on a regular basis When output bandwidth is available a bandwidth class will be allowed to send data at this rate No exceptional condition will be reported when the data rate does not exceed this limit Hard Limit This is a never exceed rate A bandwidth class is never allowed to trans mit above this rate Typically traffic bursts between the soft limit and the hard limit are charged a premium The maximum hard limit for a band width policy is 1 Gbps even when multiple Gigabit ports are trunked Bandwidth Policy Configuration Each bandwidth policy comprised of the reserved soft and hard limits is assigned an index These policies can be found under the cfg bwm menu Up to 64 bandwidth policies can be defined Bandwidth limits are usually entered in Mbps NOTE For better granularity rates can be entered in Kbps by appending K to the entered number For example 1 Mbps can be entered as either 1 or as 1024k Table 17 2 lists the granularity of policy limits Table 17 2 Bandwidth Policy Limits Bandwidth Range Interval Bandwidth Range Interval 250 Kbps to 5000 Kbps 250 Kbps 50 Mbps to 150 Mbps 10 Kbps 1 Mbps to 20 Mbps 1 Mbps 150 Mbps to 500 Mbps 25 Mbps 20 Mbps to 50 Mbps 5 Mbps 500 Mbps to 1000 Mbps 50 Mbps In addition a queue size is associated with each policy The queue size is measured in bytes Alteon Z5Systems Chapter 17 Bandwidth Management
304. ere is no SNMP or Browser Based Interface BBI support for SecurID because the SecurID server ACE is a one time password authentication and requires an interactive ses sion To log in using SSH without difficulties you need to use a special username ace to log in and bypass the SSH authentication After an SSH connection is established you will then be prompted to enter the username and password the SecurID authentication is being performed now You will need to provide your actual username and the token in your SecurID card as a regular Telnet user would do in order to log in To use SCP you need to use the SCP only administrator s password that is the scpadm option under the c g sys sshd menu to bypass the checking of SecurID Alternately you can configure a regular administrator with a fixed password in the RADIUS server if it can be supported A regular administrator with a fixed password in the RADIUS server can per form both SSH and SCP with no additional authentication required A SCP only administrator s password is typically used when SecurID is used For example it can be used in an automation program in which the tokens of SecurID are not available to back up download the switch configurations each day NOTE The SCP only administrator s password must be different from the regular administra tor s password If the two passwords are the same the administrator using that password will not be al
305. ers can be configured to form a virtual interface router VIR RFC 2338 calls this entity a virtual router The term virtual interface router will be used to distin guish this type of entity from a virtual server router VSR as described in Web OS Exten sions to VRRP on page 259 When the term virtual router is used herein the concept applies to both virtual interface routers and virtual server routers Each VRRP router may participate in one or more virtual interface routers A virtual interface router acts as a default or next hop gateway for hosts on a LAN Each vir tual interface router consists of a user configured virtual router identifier VRID and an IP address 248 m Chapter 11 High Availability Alteon e Systems A February Web OS 10 0 Application Guide Virtual Router MAC Address The VRID is used to build the virtual router MAC Address The five highest order octets of the virtual router MAC Address are the standard MAC prefix 00 00 5E 00 01 defined in RFC 2338 The VRID is used to form the lowest order octet Owners and Renters Only one of the VRRP routers in a virtual interface router may be configured as the IP address owner This router has the virtual interface router s IP address as its real interface address This router responds to packets addressed to the virtual interface router s IP address for ICMP pings TCP connections and so on There is no requirement for any VRRP router to be the IP addre
306. es Table 2 Four Subnet Firewall IP Address Configuration Item Address Firewall 1 Dirty side IP interface 10 10 2 3 Clean side IP interface 10 10 3 3 Default Gateway 10 10 2 9 Subnet 2 VIR Route Added 10 10 4 100 virtual server via 10 10 3 9 Subnet 3 VIR Firewall 2 Dirty side IP interface 10 10 2 4 Clean side IP interface 10 10 3 4 Default Gateway 10 10 2 9 dirty side VIR Route Added 10 10 4 100 virtual server via 10 10 3 9 Subnet 3 VIR The firewalls must also be configured with rules that determine which types of traffic will be forwarded through the firewall and which will be dropped All firewalls participating in FWLB must be configured with the same set of rules NOTE It is important to test the behavior of the firewalls prior to adding FWLB 330 m Chapter 13 Firewall Load Balancing Alteon e Systems A February Web OS 10 0 Application Guide Configure Connectivity for the Primary Dirty Side Web Switch 1 Configure VLANs on the primary dirty side Web switch Two VLANS are required VLAN 1 includes port 1 for the Internet connection VLAN 2 includes port 2 for the firewall connection and port 9 for the interswitch connection gt gt cfg vlan 2 gt gt add 2 Port 2 connects to the firewall gt gt add 9 Port 9 is the inter switch connection gt gt ena NOTE Port 1 is part of VLAN 1 by default and does not require manual configuration
307. es each for URL string matching on each switch As each URL Web request is examined noncacheable items are forwarded to the origin server while requests with matching strings are redirected to the appropriate cache server Examples of matching string expressions are E product Any URL that starts with product including any information in the product direc tory E product Any URL that has the string product Alteon WebSystems Chapter 15 Content Intelligent Switching m 395 212777 A February 2002 Web OS 10 0 Application Guide The switch is preconfigured with a list of 13 noncacheable items that you can add to delete or modify These items are either known dynamic content file extensions or dynamic URL parameters as described below E Dynamic content files O Common gateway interface files cgi cold fusion files cfm ASP files asp BIN directory CGI BIN directory SHTML scripted html Microsoft HTML extension files htx O executable files exe OoOddao oa E Dynamic URL parameters amp Host A Host C GET product Webswitch html GET company information html product information gt SET Bany Yima Sa Sa SWito gif Implicit load balancing within the group Figure 15 5 URL Based Web Cache Redirection Requests matching the URL are load balanced among the multiple servers depending on the metric specified for the real server gr
308. ess space they can access within their network and with routers on external networks BGP allows you to decide what is the best route for a packet to take from your network to a destination on another network rather than simply setting a default route from your border router s to your upstream provider s BGP is defined in RFC 1771 Alteon Web switches can advertise their IP interfaces and virtual server IP addresses using BGP and take BGP feeds from as many as four BGP router peers This allows more resilience and flexibility in balancing traffic from the Internet Internal Routing Versus External Routing To ensure effective processing of network traffic every router on your network needs to know how to send a packet directly or indirectly to any other location destination in your network This is referred to as internal routing and can be done with static routes or using active inter nal routing protocols such as RIP RIPv2 and OSPF It is also useful to tell routers outside your network upstream providers or peers about the routes you can access in your network External networks those outside your own that are under the same administrative control are referred to as autonomous systems AS Sharing of routing information between autonomous systems is known as external routing External BGP eBGP is used to exchange routes between different autonomous systems whereas internal BGP iBGP is used to exchange routes within the s
309. ess server authentication authorization and accounting protocol used to secure remote access to networks and network services against unauthorized access RADIUS consists of three components E A protocol with a frame format that utilizes UDP over IP based on RFC 2138 and 2866 E A centralized server that stores all the user authorization information E A client in this case the switch The operation of RADIUS authentication and authorization protocol is based on the AA model described previously The switch acting as the RADIUS client will communicate to the RADIUS server to authenticate and authorize a remote administrator using the protocol defini tions specified in RFC 2138 and 2866 Transactions between the client and RADIUS server are authenticated through the use of a shared secret which is never sent over the network In addi tion the remote administrator passwords are sent encrypted between the RADIUS client the switch and the back end RADIUS server 1 Remote administrator connects to 2 Using Authentication Authorization switch and provides user name protocol the switch sends request and password to authentication server oT Internet Alteon Web Switch 4 Using RADIUS protocol 3 Authentication server the authentication server checks request against instructs the switch to the user ID database grant or deny admim access Figure 5 1 Authentication and Authorization How It Works Alteon WebSystems Chapte
310. essing when filtering is not enabled The user must enable IDS SLB on the port and allocate a real server group for IDS Server Load Balancing The IDS SLB enabled switch copies all incoming packets to this group of intrusion detection servers For each session entry created on the switch an IDS server is selected based on the IDS server load balancing metric The IDS server receives copies of all the processed frames that are forwarded to the destination devices Session entries are maintained so that all the frames of a given session are forwarded to the same IDS server Each IDS server must be connected directly to a different switch port or VLAN because no field in the packet header can be substituted Substituting a field would corrupt the packet that must also be forwarded to its real destination Alteon WebSystems Chapter 6 Server Load Balancing 163 212777 A February 2002 Web OS 10 0 Application Guide Load Balancing Metrics for IDS The following metrics are supported in IDS load balancing E minmisses E roundrobin Disable delayed binding if you select this metric E hash To select a real server Web OS allows you to implement the hash metric in two ways O Client processing on port If the port is configured for client processing only then the switch hashes on the source IP address O Filter processing on the port If a filter is configured on the port then the switch allows you to hash with source IP address destina
311. est 16 inforep ICMP information reply 17 maskreq ICMP address mask request 18 maskrep ICMP address mask reply Alteon WebSystems Chapter 7 Filtering m 201 212777 A February 2002 Web OS 10 0 Application Guide The command to enable or disable ICMP message type filtering is entered from the Advanced Filtering menu as follows gt gt cfg slb filt lt filter number gt adv gt gt Filter 1 Advanced icmp lt message typelnumberlany list gt For any given filter only one ICMP message type can be set at any one time The any option disables ICMP message type filtering The 1ist option displays a list of the available ICMP message types that can be entered NOTE ICMP message type filters must be cache disabled Exercise caution when applying cache enabled and cache disabled filters to the same switch port For more information see Cache Enabled versus Cache Disabled Filters on page 178 202 m Chapter 7 Filtering Alteon e systems A February CHAPTER 8 Application Redirection Application Redirection improves network bandwidth and provides unique network solutions Filters can be created to redirect traffic to cache and application servers improving speed of access to repeated client access to common Web or application content and freeing valuable network bandwidth The following topics are discussed in this chapter Overview on page 204 Application redirection helps reduce the traffic
312. ewall 1 using dirty side IF 2 E To secondary clean side IF 3 via Firewall 2 using dirty side IF 3 NOTE Remember IF 2 is being used on all Web switches whenever routing through the top firewall and IF 3 is being used on all Web switches whenever routing through the lower fire wall The static route add command uses the following format add lt destination address gt lt dest mask gt lt gateway address gt lt source interface gt This example requires the following static route configuration gt gt cfg ip frwd route gt gt add 10 10 3 1 255 255 255 255 10 10 2 3 2 gt gt add 10 10 3 2 255 255 255 255 10 10 2 4 3 gt gt add 10 10 3 11 255 255 255 255 10 10 2 3 2 gt gt add 10 10 3 12 255 255 255 255 10 10 2 4 3 NOTE When defining static routes for FWLB it is important to specify the source IP inter face numbers 5 Make your changes take effect gt gt apply gt gt save gt gt boot reset 332 m Chapter 13 Firewall Load Balancing Alteon e systems A February Web OS 10 0 Application Guide Configure Connectivity for the Secondary Dirty Side Web Switch Except for the IP interfaces this configuration is identical to the primary dirty side Web switch 1 Configure VLANs on the secondary dirty side Web switch gt gt gt gt gt gt gt gt cfg vlan 2 add 2 add 9 ena 2 Configure IP interfaces on
313. examples Example 1 String Starting with the Forwardslash A string that starts with a forwardslash such as images indicates that the server will process requests that start out with the images string only For example with the images string the server will handle these requests images product b gif images company a gif images testing c jpg The server will not handle these requests company images b gif product images c gif testing images a gif Example 2 String without the Forwardslash A string that does not start out with a forwardslash indicates that the server will process any requests that contain the defined string For example with the images string the server will process these requests images product b gif images company a gif images testing c jpg company images b gif product images c gif testing images a gif Example 3 String with the Forwardslash Only If a server is configured with the load balance string only it will only handle requests to the root directory For example the server will handle any files in the ROOT directory index htm default asp index shtm Alteon WebSystems Chapter 15 Content Intelligent Switching 399 212777 A February 2002 Web OS 10 0 Application Guide 5 Apply and save your configuration changes 6 Identify the defined string IDs gt gt cfg slb layer7 slb cur For easy
314. f addresses defined with a subnet mask M Switch services on the virtual servers The following are various Layer 4 groupings O A single virtual server A group of virtual servers oO O A service for a particular virtual server oO Select a particular port number service on the virtual server within a particular vir tual server IP address The following are various Layer 7 groupings O A single URL path O A group of URL paths O A single cookie Application Bandwidth Control Classification policies allow bandwidth limitations to be applied to particular applications that is they allow applications to be identified and grouped Classification can be based on any fil tering rule including those listed below E TCP Port Number All frames with a specific TCP source or destination port number E UDP All UDP frames E UDP Port Number All frames with a specific UDP source or destination port number Alteon WebSystems Chapter 17 Bandwidth Management m 447 212777 A February 2002 Web OS 10 0 Application Guide Combinations Combinations of classifications are limited to grouping items together into a contract For example if you wanted to have three different virtual servers associated with a contract you would specify the same contract index on each of the three virtual server IP addresses You can also combine filters in this manner Precedence If a frame qualifies for different classifications it is important to be ab
315. for SLB see Chapter 6 Server Load Balancing E Define server port and client port 2 Enable URL hashing gt gt cfg slb virt 1 gt gt Virtual Server 1 service 80 gt gt Virtual Server 1 http Service httpslb urlhash Enter new hash length 1 255 25 Hashing is based on the URL including the HTTP Host header if present up to a maximum of 255 bytes 3 Set the metric for the real server group to minmisses or hash gt gt cfg slb group 1 metric lt hashlminmiss gt 388 m Chapter 15 Content Intelligent Switching Alteon e systems A February Web OS 10 0 Application Guide Header Hash Load Balancing Web OS allows you to hash on any selected HTTP header To configure the Web switch for load balancing based on header hash perform the following procedure 1 Ensure that the switch has already been configured for basic SLB Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch E E E Define each real server E Assign servers to real server groups E Define virtual servers and services For information on how to configure your network for SLB see Chapter 6 Server Load Bal ancing 2 Enable header hashing gt gt cfg slb virt 1 gt gt Virtual Server 1 service 80 gt gt Virtual Server 1 http Service httpslb headerhash Select Operation none Enter new HTTP header name User age
316. forwarding NOTE To help eliminate the possibility for a Denial of Service DoS attack the forwarding of directed broadcasts is disabled by default Alteon WebSystems Chapter 1 Basic IP Routing 39 212777 A February 2002 Web OS 10 0 Application Guide 5 Configure BGP peer router 1 and 2 Peer is the primary gateway router Peer 2 is configured with a metric of 3 The metric option is key to ensuring gateway traffic is directed to Peer 1 as it will make Peer 2 appear to be three router hops away from the switch Thus the switch should never use it unless Peer 1 goes down gt gt BGP Peer 1 gt gt BGP Peer gt gt BGP Peer gt gt BGP Peer gt gt BGP Peer gt gt BGP Peer gt gt BGP Peer gt gt BGP Peer gt gt BGP Peer gt gt BGP Peer gt gt BGP Peer gt gt BGP Peer NONNNNNEF FEHR EF EF gt gt cfg ip bgp peer 1 ena addr 200 200 200 2 if 200 200 200 1 las 300 ras 100 peer 2 ena addr 210 210 210 2 if 210 210 210 1 las 300 ras 200 metric 3 Select BGP peer router 1 Enable this peer configuration Set IP address for peer router 1 Set IP interface for peer router 1 Set local AS number Set remote AS number Select BGP peer router 2 Enable this peer configuration Set IP address for peer router 2 Set IP interface for peer router 2 Set local AS number Set remote AS number Set AS path length to 3 router hops
317. fy the virt server IP address gt gt Virtual Server 2 ena Enable the virtual server 2 Set up the DNS service for virtual server and select real server group 2 gt gt Virtual Server 2 service dns Specify the DNS service gt gt Virtual Server 2 DNS Service group 2 Select the real server group 3 Enable delayed binding gt gt Virtual Server 2 DNS Service dbind ena Enable delayed binding 4 As this is TCP based load balancing make sure to disable UDP DNS queries gt gt Virtual Server 2 DNS Service udp dis Disable UDP balancing 5 Apply and save your configuration gt gt Virtual Server 2 DNS Service apply gt gt Virtual Server 2 DNS Service save 154 m Chapter 6 Server Load Balancing Alteon e systems A February Web OS 10 0 Application Guide Real Time Streaming Protocol SLB Real Time Streaming Protocol RTSP is an application level protocol for control over the delivery of data with real time properties as documented in RFC 2326 RTSP is used as a network remote control for multimedia servers Typically a multimedia presentation consists of several streams of data for example video stream audio stream and text that must be presented in a synchronized fashion A multimedia client like Real Player or Quick Time Player downloads these multiple streams of data from the multimedia servers and presents them on the player screen
318. g g _ De gt T EREE o or 0 BH co ERSE l li i Retail f Trading Clients Clients Figure 6 1 Traditional Versus SLB Network Configurations To provide load balancing for any particular type of service each server in the pool must have access to identical content either directly duplicated on each server or through a back end network mounting the same file system or database server Alteon WebSystems Chapter 6 Server Load Balancing m 119 212777 A February 2002 Web OS 10 0 Application Guide The Web switch with SLB software acts as a front end to the servers interpreting user session requests and distributing them among the available servers Load balancing in Web OS can be done in the following ways E Virtual server based load balancing This is the traditional load balancing method The switch is configured to act as a virtual server and is given a virtual server IP address or range of addresses for each collection of services it will distribute Depending on your switch model there can be as many as 256 virtual servers on the switch each distributing up to eight different services up to a total of 2048 services Each virtual server is assigned a list of the IP addresses or range of addresses of the real servers in the pool where its services reside When the user stations request connections to a service they will communicate with a virtual server on the switch When the switch receives the
319. g HTTP URL request to be blocked gt gt cfg slb layer7 slb add ida Define the code red virus string gt gt Server Loadbalance resource add c1 9c Define the code blue virus string gt gt Server Loadbalance resource add c0 af Define the code blue virus string gt gt Server Loadbalance resource add playdog com Define the offending URL request 3 Apply and save the configuration 4 Identify the IDs of the defined strings gt gt Server Loadbalance resource cur Number of entries four ID SLB String 1 ida 2 C1 S9c 3 c0 af 4 playdog com 5 Select the filter and enable the filter action to deny gt gt cfg slb filt 1 Select the filter gt gt Filter 1 action deny Set the filter action to deny 6 Enable URL parsing gt gt Filter 1 adv gt gt Filter 1 Advanced urlp ena Enable URL parsing 418 m Chapter 15 Content Intelligent Switching Alteon ebSystems A February 7 Enable the Layer 7 deny option Web OS 10 0 Application Guide gt gt Filter 1 Advanced 17deny gt gt Filter 1 Advanced L7deny ena Select the Layer 7 deny menu Enable Layer 7 deny filter 8 Assign the URL string ID from Step 4 to the filter gt gt Filter gt gt Filter gt gt Filter gt gt Filter 1 Advanced 1 Advanced 1 Advanced 1 Advanced Li7deny Lideny Lideny Lideny addstr addstr a
320. g an anonymous bind request to the server E Bind response On receiving the bind request the server sends a bind response to the switch If the result code indicates that the server is alive the switch marks the server as up Otherwise the switch marks the server as down even if the switch did this because the server did not respond within the timeout window E Unbind request If the server is alive the switch sends a request to unbind the server This request does not require a response It is necessary to send an unbind request as the LDAP server may crash if too many protocol sessions are active If the server is up the switch closes the TCP connection after sending the unbind request If the server is down the connection is torn down after the bind response if one arrives The connec tion will also be torn down if it crosses the timeout limit irrespective of the server s condition Alteon WebSystems Chapter 10 Health Checking m 243 212777 A February 2002 Web OS 10 0 Application Guide Configuring the Switch for LDAP Health Checks Configure the switch to verify if the LDAP server is alive 1 Select the health check menu for the real server group gt gt cfg slb group 1 2 Set the health check type to LDAP for the real server group gt gt Real server group 1 health ldap 3 Apply and save your configuration gt gt Real server group 1 apply gt gt Real server group 1 s
321. g commands from the CLI gt gt Main cfg ip if 1 Select IP interface 1 gt gt IP Interface 1 addr 10 10 10 10 Assign IP address for the interface gt gt IP Interface 1 vlan 2 Assign VLAN for the interface gt gt IP Interface 1 ena Enable IP interface 1 Repeat the commands for each interface listed below mM IF220 10 10 10 E IF330 10 10 10 E IF4 40 10 10 10 mM IF5200 1 1 10 Alteon WebSystems Chapter 11 High Availability m 267 212777 A February 2002 Web OS 10 0 Application Guide 2 Define the VLANs In this configuration set up two VLANs One for the outside world the ports connected to the upstream switches toward the routers and one for the inside the ports connected to the down stream switches toward the servers gt gt Main cfg vlan lt VLAN number gt Select VLAN 1 gt gt vlan 1 add lt port number gt Add a port to the VLAN membership gt gt vlan 1 ena Enable VLAN 1 Repeat this command for the second VLAN E VLAN IF 5 physical ports connected to upstream switches E VLAN 2 IFs 1 2 3 4 physical ports connected to downstream switches 3 Disable Spanning Tree gt gt Main cfg stp 1 Select the STP Group number gt gt Main cfg stp off Disable STP gt gt Main cfg stp apply Make your changes active 4 Enable IP forwarding IP forwarding is enabled by default Make sure IP forwarding is enabled if the virtual
322. g slb filt 100 ena Enable the filter gt gt Filter 100 dip 10 10 10 100 dmask 255 255 255 0 Specify the virtual server IP address gt gt Filter 100 adv tcp Select the advanced filter menu gt gt TCP advanced teplim en Enable TCP rate limiting gt gt TCP advanced maxconn 20 Specify the maximum connections gt gt TCP advanced cfg slb adv Select the Layer 4 advanced menu gt gt Layer 4 Advanced timewin 1 Set the time window for the session gt gt Layer 4 Advanced holddur 5 Set the hold duration for the session Fastage and slowage are set to 2 seconds and 8 minutes as follows cfg slb adv fastage 1 Fastage is set to 2 seconds cfg slb adv slowage 2 Slowage is set to 8 minutes time window timewin x fastage 1 x 2 seconds 2 seconds hold down time holddur x slowage 5 x 8 minutes 40 minutes max rate maxcon time window 200 connections 2 seconds 100 connections second Alteon Z Systems Chapter 7 Filtering 183 212777 A February 2002 Web OS 10 0 Application Guide All clients are limited to 100 new TCP connections second to the server If a client exceeds this rate then the client is not allowed to make any new TCP connections to the server for 40 min utes NOTE All SLB sessions on the switch are affected when you make changes to the fastage or slowage parameters Tunable Hash for Filter Redirection Web OS 10 0 allows you to choose a number of opt
323. g their fastest servers to process dynamic content such as cgi files and their slower servers to process all static content such as jpg files eS io Web Switch D Internet Client Real Servers Host www a com Host www a com Host www a com Host www b com Host www b com URL jpg URL jpg URL cgi URL jpg URL cgi Figure 15 8 Content Precedence Lookup Multiple Strings Example To configure content precedence lookup for the example in Figure 15 8 the hosting company groups all the real servers into one real server group even though different servers provide ser vices for different customers and different types of content In this case the servers are set up for the following purpose Table 15 2 Real Server Content Server Customer Content Server 1 Customer A Static jpg files Server 2 Customer A Static jpg files Server 3 Customer A Dynamic cgi files Server 4 Customer B Static jpg files Server 5 Customer B Dynamic cgi files 416 Chapter 15 Content Intelligent Switching Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide When a client request is received with www a com in the Host Header and jpg in the URL the request will be load balanced between Server and Server 2 To accomplish this configuration you must assign multiple strings a Host Header string and a URL string for each real server Layer 7 Deny Filter Web OS allows you
324. gorithm to calculate the shortest path to all known destinations based on the cumulative cost required to reach the destination The cost of an individual interface in OSPF is an indication of the overhead required to send packets across it The cost is inversely proportional to the bandwidth of the interface A lower cost indicates a higher bandwidth Internal Versus External Routing To ensure effective processing of network traffic every routing device on your network needs to know how to send a packet directly or indirectly to any other location destination in your network This is referred to as internal routing and can be done with static routes or using active internal routing protocols such as OSPF RIP or RIPv2 It is also useful to tell routers outside your network upstream providers or peers about the routes you have access to in your network Sharing of routing information between autono mous systems is known as external routing Typically an AS will have one or more border routers peer routers that exchange routes with other OSPF networks as well as an internal routing system enabling every router in that AS to reach every other router and destination within that AS When a routing device advertises routes to boundary routers on other autonomous systems it is effectively committing to carry data to the IP space represented in the route being advertised For example if the routing device advertises 192 204 4 0 24 it is
325. gt gt gt 22 gt gt 22 gt gt gt F gt gt gt gt gt gt gt gt gt gt gt 22 gt gt gt gt gt gt cfg vrrp on vr 1 vrid 1 Configure virtual router 1 addr 195 1 1 9 For the subnet attached to the routers if 1 prio 101 share dis ena track ifs ena ports ena cfg vrrp vr 2 vrid 2 Configure virtual router 2 addr 10 10 2 9 For the subnet attached to the firewall if 2 prio 101 share dis ena track ifs ena ports ena 4 Configure the VRRP peer on the primary dirty side Web switch gt gt gt gt gt gt 22 gt gt Se OS ROSE cfg slb sync prios d peer 1 ena addr 195 1 1 11 5 Apply and save your configuration changes gt gt apply gt gt save 6 Synchronize primary and secondary dirty side Web switches gt gt oper slb sync 340 Chapter 13 Firewall Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Complete the Configuration of the Primary Clean Side Web Switch 1 Create an FWLB real server group on the primary clean side Web switch A real server group is used as the target for the FWLB redirection filter Each IP address assigned to the group represents a return path through a different firewall In this case since two firewalls are used two addresses are added to the group The two addresses are the inter faces of the dirty side
326. gt SLB port 3 add 10 Add the outgoing SMTP filter to the port gt gt SLB port 3 add 17 Add the outgoing HTTP filter to the port gt gt SLB port 3 add 224 Add the default filter to the port gt gt SLB port 3 filt ena Enable filtering on the port gt gt SLB port 3 apply Apply the configuration changes gt gt SLB port 3 save Save the configuration changes 200 Chapter 7 Filtering Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide Matching ICMP Message Types Internet Control Message Protocol ICMP is used for reporting TCP IP processing errors There are numerous types of ICMP messages as shown in Table 7 6 Although ICMP packets can be filtered using the proto icmp option by default the Web switch ignores the ICMP message type when matching a packet to a filter To perform filtering based on specific ICMP message types ICMP message type filtering must be enabled Web OS software supports filtering on the following ICMP message types Table 7 6 ICMP Message Types Type Message Type Description 0 echorep ICMP echo reply 3 destun ICMP destination unreachable 4 quench ICMP source quench 5 redir ICMP redirect 8 echoreq ICMP echo request 9 rtradv ICMP router advertisement 10 rtrsol ICMP router solicitation 11 timex ICMP time exceeded 12 param ICMP parameter problem 13 timereq ICMP timestamp request 14 timerep ICMP timestamp reply 15 inforeq ICMP information requ
327. gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP In In In In In In In In In In In In In In In In In In In gt gt cfg ip if 1 terface terface terface terface terface terface terface terface terface terface terface terface terface terface terface terface terface terface terface NO NMNN NFR RF FP WWW WwW WwW BP PD addr 10 10 1 1 mask 255 255 255 0 broad 10 10 1 255 vlan 4 if 2 addr 10 10 4 40 mask 255 255 255 0 broad 10 10 4 255 vlan 1 if 3 addr 172 21 2 200 mask 255 255 255 0 broad 172 21 2 255 vlan 2 if 4 addr 172 21 3 200 mask 255 255 255 0 broad 172 21 3 255 vlan 3 Select IP interface 1 for gateway 5 amp 6 subnet Assign IP address for interface 1 Assign mask for IF 1 Assign broadcast address for IF 1 Assign VLAN 4 to IF 1 Select IP interface 2 for gateway 1 Assign IP address for interface 2 Assign mask for IF 2 Assign broadcast address for IF 2 Assign VLAN I to IF 2 Select IP interface 3 for VLAN 2 subnet Assign IP address for interface 3 Assign mask for IF 3 Assign broadcast address for IF 3 Assign VLAN 2 to IF 3 Select IP interface 4 for VLAN 3 subnet Assign IP address for interface 4 Assign mask for IF 4 Assign broadcast address for IF 4 Assign VLAN 3 to IF 4 60 m Chapter 2 VLANs Alteon Z Systems 212777 A February 2002 3 Configure the default ga
328. h Flexible design options are provided All IP protocols are supported Compatibility with Other Web OS Features E URL based server load balancing is compatible with GSLB E Cookie based persistence is compatible with GSLB cookie rewrite and cookie insert modes 290 Chapter 12 Global Server Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide How GSLB Works GSLB is based on the Domain Name System DNS and proximity by source IP address In the example in Figure 12 1 a client is using a browser to view the Web site for the Foo Corporation at www foocorp com The Foo Corporation has two Web sites one in California and one in Denver each with identical content and available services Both Web sites have an Alteon Web switch configured for GSLB These switches are also configured as the Authoritative Name Servers for www foocorp com Client Site Internet Switches regularly exchange performance information Web Servers lists best site s Servers IP address first DNS response Figure 12 1 DNS Resolution with Global Server Load Balancing The DNS resolution for GSLB is described in detail in the following procedure 1 The client Web browser requests the www foocorp com IP address from the local DNS 2 Client s DNS asks its upstream DNS which in turn asks the next and so on until the address is resolved Eventually the request reaches an upstream
329. h Multiple Frames 374 Content Intelligent Server Load Balancing 375 URL Based Server Load Balancing 375 Virtual Hosting 380 Cookie Based Preferential Load Balancing 383 Browser Smart Load Balancing 386 URL Hashing for Server Load Balancing 387 Header Hash Load Balancing 389 DNS Load Balancing 390 Layer 7 RTSP Load Balancing 392 Content Intelligent Web Cache Redirection 394 URL Based Web Cache Redirection 395 HTTP Header Based Web Cache Redirection 403 Browser Based Web Cache Redirection 405 URL Hashing for Web Cache Redirection 406 Layer 7 RTSP Streaming Cache Redirection 409 Exclusionary String Matching for Real Servers 410 Configuring for Exclusionary URL String Matching 410 Regular Expression Matching 412 Standard Regular Expression Characters 412 Configuring Regular Expressions 413 Content Precedence Lookup 414 Requirements 415 Using the or and and Operators 415 Assigning Multiple Strings 416 Layer 7 Deny Filter 417 10 m Contents Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide Chapter 16 Persistence 421 Overview of Persistence 422 Using Source IP Address 422 Using Cookies 423 Using SSL Session ID 423 Cookie Based Persistence 424 Permanent and Temporary Cookies 425 Cookie Formats 425 Cookie Properties 426 Client Browsers that Do Not Accept Cookies 426 Cookie Modes of Operation 427 Configuring Cookie Based Persistence 430 Server Side Multi Response Cookie Search 436 SSL Session ID Based Persistence 437
330. h to determine whether or not the LDAP server is running E ARP Health Checks on page 245 This section describes how to perform health checks on Intrusion Detection Servers IDS that do not have full TCP IP stack support m Failure Types on page 246 This section explains the service failed and server failed states 220 m Chapter 10 Health Checking Alteon e systems A February Web OS 10 0 Application Guide Real Server Health Checks Alteon Web switches running Server Load Balancing SLB monitor the servers in the real server group and the load balanced application s running on them If a switch detects that a server or application has failed it will not direct any new connection requests to that server When a service fails an Alteon Web switch can remove the individual service from the load balancing algorithm without affecting other services provided by that server By default the Web switch checks the status of each service on each real server every two sec onds Sometimes the real server may be too busy processing connections to respond to health checks If a service does not respond to four consecutive health checks the switch by default declares the service unavailable You can modify both the health check interval and the number of retries gt gt cfg slb real lt real server number gt Select the real server gt gt Real server inter 4 Check real server every 4 seconds gt gt Real serve
331. hat this is an automatic process that cannot be turned off NOTE The VRRP hot standby approach does not support single link failover If one hot standby port loses link the entire switch must become master to eliminate loss of connectivity The forwarding states of non hot standby ports are not controlled via the hot standby algo rithm allowing the additional ports on the switches to provide added port density The client ports on both switches should be able to process or forward traffic to the master switch The inter switch port state is only a place holder Its presence forces the user to configure a inter switch link when hot standby is globally enabled and prohibits the inter switch link from also being a hot standby link for VRRP advertisements These advertisements must be able to reach the backup switch Synchronizing Configurations The final piece in configuring a high availability solution includes the addition of synchroniza tion options to simplify the manual configuration Configuration options have been added to refine what is synchronized to whom and to disable synchronizing certain configurations These options include proxy IP addresses Layer 4 port configuration filter configuration and virtual router priorities Also a peer menu c fg slb sync peer has been added to allow the user to configure the IP addresses of the switches that should be synchronized This provides added synchroni zation validation
332. he HTTP destination port and must redi rect it to the proper port in the real server group gt gt oe gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt cfg slb filt lt filter number gt Fil Fil Fil Fil Fil Fil Fil Fil Fil cer cer cer cer cer cer cer cer cer lt filter number gt lt filter number gt lt filter number gt lt filter number gt lt filter number gt lt filter number gt lt filter number gt lt filter number gt lt filter number gt Select the menu for Filter x sip any From any source IP addresses dip any To any destination IP addresses proto tcp For TCP protocol traffic sport any From any source port dport http To an HTTP destination port action redir Set the action for redirection rport http Set the redirection port group 1 Select real server group 1 ena Enable the filter 10 Enable URL based WCR on the same filter gt gt cfg slb filt lt filter number gt adv urlp ena 11 Select the appropriate NAT option The three NAT options are listed below For more information about each option see Net work Address Translation Options on page 397 Alteon Z Systems 212777 A February 2002 No NAT option gt gt cfg slb filter lt filter number gt adv proxy dis Half NAT option gt gt cfg slb filter lt filter number gt adv proxy ena Fu
333. he following commands are issued on the Denver switch gt gt gt gt gt gt gt gt gt gt Po gt gt SLB port 5 SLB port 5 SLB port 5 Real server Real server Real server Real server gt gt cfg slb port 5 pip 174 14 17 4 proxy enable real 1 proxy disable Disable local real server proxy 1 real 2 proxy disable Disable local real server proxy 2 real 3 proxy enable Enable proxy for remote server 3 apply Apply configuration changes 3 save Select port to default gateway Set unique proxy IP address Enable proxy for switch port 5 Save configuration changes Alteon Z Systems 212777 A February 2002 Chapter 12 Global Server Load Balancing m 307 Web OS 10 0 Application Guide Verifying GSLB Operation E Use your browser to request the configured service www foocorp com in the previous example E Examine the info s1b information on each switch Check to see that all SLB parameters are working according to expectation If necessary make any appropriate configuration changes and then check the information again E Examine the following statistics on each switch O stats slb gslb virt lt virtual server number gt O stats slb gslb group lt real server group number gt O stats slb maint Configuring Client Site Preferences Internet Assigned Numbers Authority IANA the central coordinator for the assignment of unique parameter values f
334. he following commands to configure the switch as a DHCP relay agent gt gt cfg ip bootp gt gt Bootstrap Protocol Relay addr Set IP address of BOOTP server gt gt Bootstrap Protocol Relay addr2 Set IP address of 2nd BOOTP server gt gt Bootstrap Protocol Relay on Globally turn BOOTP relay on gt gt Bootstrap Protocol Relay off Globally turn BOOTP relay off gt gt Bootstrap Protocol Relay cur Display current configuration Additionally DHCP Relay functionality can be assigned on a per interface basis Use the fol lowing command to enable the Relay functionality gt gt cfg ip if lt interface number gt relay ena 42 m Chapter 1 Basic IP Routing Alteon e Systems A February CHAPTER 2 VLANs This chapter describes network design and topology considerations for using Virtual Local Area Networks VLANs VLANs are commonly used to split up groups of network users into man ageable broadcast domains to create logical segmentation of workgroups and to enforce security policies among logical segments The following topics are discussed in this chapter VLAN ID Numbers on page 44 VLAN Tagging on page 44 VLANs and the IP Interfaces on page 45 This section briefly describes how management functions can only be accomplished from stations on VLANs that include an IP interface to the switch VLAN Topologies and Design Issues on page 45 This section discu
335. he redirection browser based n delayed binding r 21 1010 e ere eee eee ee HTTP header based ccceesseseceeeeeseeens 403 layer 7 tattic icseisseciis seessndeceessesccevneaseestens 394 RTSP oeann n T E ieee 211 409 See application redirection SELVETS E 204 to 206 207 URE Bashing sii cccosscces csiescewisesesacastsvennesineees 406 UR Labased casini eea a 395 Web hosting sirieni sses iaeei 121 WISHES AE E E A E O 134 Wide Area Networking WAN CONT SUING sc csccecstucess teei dnns iess a nana 166 load balanci g ssssssisnosicesisirsisoinessssersenss 166 Wireless Application Protocol essceeseeeeeeee 158 World Wide Web client security for browsing 185 WSP health check ccccessseeececeeeseneceeeeesenees 241 WSP health checks ccecssseeeeeeeeeeees 240 to 242 WTLS health check ccceesececeeeseteceeeeeseees 242 Alteon Z Systems 212777 A February 2002
336. he remote parameter is enabled and the real server entry is added to the real server group under the local virtual server for the intended service Finally since the real server health checks are headed across the Internet the health checking interval should be increased to 30 or 60 seconds to avoid generating excess traffic 302 Chapter 12 Global Server Load Balancing Alteon 2 systems A February Web OS 10 0 Application Guide For example gt gt Remote site 1 cfg slb real 3 Create an entry for real server 3 gt gt Real server 3 rip 200 200 200 1 Set remote virtual server IP address gt gt Real server 3 remote enable Define the real server as remote gt gt Real server 3 inter 60 Set a high health check interval gt gt Real server 3 ena Enable the real server entry gt gt Real server 3 group 1 Select appropriate real server group gt gt Real server group 1 add 3 Add real server 3 to group 1 NOTE Take care to note where each configured value originates or this step can result in improper configuration 3 On the Denver switch define the domain name and host name for each service hosted on each virtual server These will be the same as for the California switch the domain name is foocorp com and the host name for the HTTP service is www These values are configured as follows gt gt Real server group 1 virt 1 Select virtual server 1 g
337. he route cache is mapped to Gateway 5 If the requested route is not in the route cache then the switch reads the routing table If the requested route is not in the routing table then the switch looks at the con figured default Gateway Chapter 2 VLANs m 59 212777 A February 2002 Web OS 10 0 Application Guide Configuring the Local Network To completely segregate VLAN traffic to its own default gateway you can configure the local network addresses of the VLAN This will ensure that all traffic from VLAN 2 is forwarded to Gateway 5 and all traffic from VLAN 3 is forwarded to Gateway 6 Typically the switch routes traffic based on the routes in the routing table The routing table will contain an entry of the configured local network with the default gateway The route cache will not contain the route entry This configuration provides a more secure environment but affects performance if the routing table is close to its maximum capacity NOTE Web OS allows you to configure up to five local networks Configuring Default Gateways per VLAN Follow this procedure to configure the example shown in Figure 2 6 1 Assign an IP address for each router and client workstation 2 Assign an IP interface for each subnet attached to the switch gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP gt gt IP
338. he settings are made as follows gt gt VLAN 3 cfg ip if 1 Select IP interface I for def routers gt gt IP Interface 1 vlan 2 Set to VLAN 2 gt gt IP Interface 1 if 2 Select IP interface 2 for first floor gt gt IP Interface 2 vlan 1 Set to VLAN 1 gt gt IP Interface 2 if 3 Select IP interface 3 for second floor gt gt IP Interface 3 vlan 1 Set to VLAN 1 gt gt IP Interface 3 if 4 Select IP interface 4 for third floor gt gt IP Interface 4 vlan 1 Set to VLAN 1 gt gt IP Interface 4 if 5 Select IP interface 5 for servers gt gt IP Interface 5 vlan 3 Set to VLAN 3 4 Apply and verify the configuration gt gt IP Interface 5 apply Make your changes active gt gt IP Interface 5 info vlan View current VLAN information gt gt Information port View current port information Examine the resulting information If any settings are incorrect make the appropriate changes 5 Save your new configuration changes gt gt Information save Save for restore after reboot 34 m Chapter 1 Basic IP Routing Alteon 2 Systems A February Web OS 10 0 Application Guide Defining IP Address Ranges for the Local Route Cache A local route cache lets you use switch resources more efficiently The local network address and local network mask parameters accessed via the cfg ip frwd local add com mand define a range of addre
339. heccssnsecetecntersnconedseede ios 65 fault tolerance eesseeesseceeeseeceeeeeeeseeeeenes 66 ports FOF SCLVICES c ececeeeeeeeeeeeeeeeeceeeeeeen ones 128 171 physical See switch ports SLB configuration example eeseeeeees 126 precedence in bandwidth classifications 448 private IP address seceeseeeceseeeeeneeecesseeeeeens 191 private network protocol types PLORICS cos covet a oean configuration example seceeesseeeeeeeees 194 NAD DA E E E 193 proxy IP address PIP 122 136 144 213 DIORY SELVETS vecsctsssscsissnseseassdensneeedscresonssncasssonss 205 PVID port VLAN ID v sseccssecsseeecsseessreeesseeseseeees 44 Q QuickTime Streaming Server 156 R RADIUS health Cheeks sessar entsperren 239 port 1812 and 1645 128 159 161 171 POMAGT3 ARE Hhatenite 128 162 171 Server parameters cesses eseeeeseeeeeees we 239 SSHS CP 2 aossieacsCineshiecvecwbowierouces meostaas 110 RADIUS snooping eeeeeeeeeceeseeeceneeeeeeneeeeenees 160 RADIUS static session entries ceceeeeeeeeeeees 158 real server groups configuration example 269 296 400 Index m 479 Web OS 10 0 Application Guide TOAll SCRVELS er eor oiken oen a AEE AOE 122 backup overflow Servers sesesseeseereeseereeee configuration example cceeeeeeeeeeeeeeeeees connection tiMEeouts sssessseseseeeeereeeeee health CHECKS
340. hen the destination IP or source IP address is changed from one address to another Full NAT is when both addresses are changed from one address to another No NAT is when neither source nor destination IP addresses are translated Virtual server based load balancing uses half NAT by design because it translates the destination IP address from the Virtual Server IP address to that of one of the real servers In VRRP preemption will cause a Virtual Router that has a lower priority to go into backup should a peer Virtual Router start advertising with a higher priority In VRRP the value given to a Virtual Router to determine its ranking with its peer s Min imum value is 1 and maximum value is 254 Default is 100 A higher number will win out for master designation The protocol of a frame Can be any value represented by a 8 bit value in the IP header adherent to the IP specification for example TCP UDP OSPF ICMP and so on A group of real servers that are associated with a Virtual Server IP address or a filter A type of load balancing that operates differently from virtual server based load balancing With this type of load balancing requests are transparently intercepted and redirected to a server group Transparently means that requests are not specifically destined for a Vir tual Server IP address that the switch owns Instead a filter is configured in the switch This filter intercepts traffic based on certain IP he
341. hich frames are managed by each contract that is one BWM contract will be applied to all frames from a specific port The second contract will be applied to all frames from another specified port gt gt BWM Contract 2 cfg port 1 cont 1 Assign contract I to port 1 gt gt Port 1 port 2 cont 2 Assign contract 2 to port 2 12 On the switch apply and verify the configuration gt gt Port 2 apply Make your changes active gt gt Port 2 cfg bwm cur View current BWM settings Examine the resulting information If any settings are incorrect make any appropriate changes 13 On the switch save your new configuration changes gt gt Bandwidth Management save Save for restore after reboot 14 On the switch check the BWM information gt gt Bandwidth Management info bwm lt contract number gt View BWM information Check that all BWM contract parameters are set correctly If necessary make any appropriate configuration changes and then check the information again Alteon WebSystems Chapter 17 Bandwidth Management m 459 212777 A February 2002 Web OS 10 0 Application Guide Preferential Services Examples BWM can be used to provide preferential treatment to certain traffic based on source IP blocks applications URL paths or cookies You may find it useful to configure higher policy rate limits for specific sites for example those used for e commerce
342. how to configure and use the Web OS software on the Alteon Web switches For documentation on installing the switches physically see the Hardware Installation Guide for your particular switch model Who Should Use This Guide This Application Guide is intended for network installers and system administrators engaged in configuring and maintaining a network The administrator should be familiar with Ethernet concepts IP addressing Spanning Tree Protocol and SNMP configuration parameters What You ll Find in This Guide This guide will help you plan implement and administer Web OS software Where possible each section provides feature overviews usage examples and configuration instructions Part 1 Basic Switching amp Routing E Chapter 1 Basic IP Routing describes how to configure the Web switch for IP routing using IP subnets Border Gateway Protocol BGP or DHCP Relay E Chapter 2 VLANs describes how to configure Virtual Local Area Networks VLANs for creating separate network segments including how to use VLAN tagging for devices that use multiple VLANs This chapter also describes how Jumbo frames can be used to ease server processing overhead E Chapter 3 Port Trunking describes how to group multiple physical ports together to aggregate the bandwidth between large scale network devices E Chapter 4 OSPF describes OSPF concepts how OSPF is implemented in Web OS and four examples of ho
343. ic NAT The static NAT non proxy example requires two filters one for the external client side switch port and one for the internal server side switch port The client side filter translates incoming requests for the publicly advertised server IP address to the server s internal private network address The filter for the server side switch port reverses the process translating the server s private address information to a valid public address Alteon Z Systems Chapter 7 Filtering 191 212777 A February 2002 Web OS 10 0 Application Guide In this example clients on the Internet require access to servers on the private network 10 10 10 1 Private network Outbound filter NAT source info to public address Public IP Address 205 178 13 x Figure 7 8 Static Network Address Translation Configuring Static NAT Inbound filter NAT destination to private address External Clients Internet gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt aS gt gt gt gt gt gt gt gt ei gt gt gt gt 2 gt gt gt gt gt gt cfg slb filt 10 Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil SLB LB LB LB LB LB LB NnNnNnNnN NN port port port port port port port CEE a cer L cer L cer L cer L cer L cer tL cer L Ler L
344. ic patterns DSR and content intelligent Layer 7 switching cannot be performed at the same time because content intelligent switching requires that all frames go back to the switch for connection splic ing NoTE DSR requires that the server be set up to receive frames that have a destination IP address that is equal to the virtual server IP address 142 m Chapter 6 Server Load Balancing Alteon e Systems A February Web OS 10 0 Application Guide The sequence of steps that are executed in this scenario are shown in Figure 6 7 Web Switch a Server farm Client Internet Layer 2 Switch Figure 6 7 Direct Server Return 1 A client request is forwarded to the Web switch 2 Because only MAC addresses are substituted the switch forwards the request to the best server based on the configured load balancing policy 3 The server responds directly to the client bypassing the switch and using the virtual server IP address as the source IP address To set up DSR use the following commands gt gt cfg slb real lt real server number gt submac ena gt gt efg slb virt lt virtual server number gt service lt service number gt nonat ena Using Direct Access Mode When Direct Access Mode DAM cfg slb direct is enabled on a switch any client can communicate with any real server s load balanced service Also with DAM enabled any number of virtual services can be configu
345. ication Guide 4 On the California switch define a virtual server All client requests will be addressed to a virtual server IP address defined on the switch Cli ents acquire the virtual server IP address through normal DNS resolution HTTP uses well known TCP port 80 In this example HTTP is configured as the only service running on this virtual server IP address and is associated with the real server group For example gt gt Real server group 1 virt 1 Select virtual server 1 gt gt Virtual server 1 vip 200 200 200 1 Assign a virtual server IP address gt gt Virtual Server 1 service 80 gt gt Virtual server 1 http Service group 1 Associate virtual port to real group gt gt Virtual server 1 http Service ena Enable virtual server NoTE This configuration is not limited to HTTP services For a list of other well known TCP IP services and ports see Table 6 3 on page 128 5 On the California switch define the type of Layer 4 traffic processing each port must support In this example the following ports are being used on the Web switch Table 12 2 GSLB Example California Alteon 180 Port Usage Port Host Layer 4 Processing 1 Server A Server 2 Server B Server 6 Default Gateway Router This connects the switch to the Internet Client where all client requests originate The ports are configured as follows gt gt Virtual server 1 cfg slb port 1 Select physica
346. if the last used time is greater than the ARP health check interval If it is then delete the query as this means that the health check has failed 4 Send another ARP request and repeat the above process until the timestamp shows the last used time smaller than the ARP health check interval Configuring the Switch for ARP Health Checks 1 Select the SLB group from the health check menu gt gt cfg slb group 1 2 Select the type of health check to use gt gt Real server group 1 health arp 3 Enable ARP health checks for group 1 gt gt Real server group 1 arp enable 4 Apply and save your configuration gt gt Real server group 1 apply Alteon WebSystems Chapter 10 Health Checking m 245 212777 A February 2002 Web OS 10 0 Application Guide Failure Types Service Failure If a certain number of connection requests for a particular service fail the session switch places the service into the service failed state While in this state no new connection requests are sent to the server for this service however if graceful real server failure is enabled cf g slb adv grace ena state information about existing sessions is maintained and traffic associated with existing sessions continues to be sent to the server Connection requests to and traffic associated with other load balanced services continue to be processed by the server Example A real server i
347. igurations 282 Stateful Failover of Layer 4 and Layer 7 Persistent Sessions 283 What Happens When a Switch Fails 284 Viewing Statistics on Persistent Port Sessions 286 8 Contents Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide Part 3 Advanced Web Switching Chapter 12 Global Server Load Balancing 289 GSLB Overview 290 Benefits 290 Compatibility with Other Web OS Features 290 How GSLB Works 291 Configuring GSLB 293 IP Proxy for Non HTTP Redirects 304 How IP Proxy Works 305 Configuring Proxy IP Addresses 307 Verifying GSLB Operation 308 Configuring Client Site Preferences 308 Using Border Gateway Protocol for GSLB 312 Chapter 13 Firewall Load Balancing 313 Firewall Overview 314 Basic FWLB 316 Basic FWLB Implementation 317 Configuring Basic FWLB 319 Four Subnet FWLB 326 Four Subnet FWLB Implementation 327 Configuring Four Subnet FWLB 329 Advanced FWLB Concepts 346 Free Metric FWLB 346 Adding a Demilitarized Zone DMZ 349 Firewall Health Checks 351 Chapter 14 Virtual Private Network Load Balancing 353 Overview 354 Virtual Private Networks 354 How VPN Load Balancing Works 354 VPN Load Balancing Configuration 356 Requirements 356 VPN Load Balancing Configuration Example 356 Alteon Systems Contents 9 212777 A February 2002 Web OS 10 0 Application Guide Chapter 15 Content Intelligent Switching 371 Overview 372 Parsing Content 373 HTTP Header Inspection 374 Buffering Content wit
348. in Fig ure 4 3 there are multiple routes leading from the area In such areas traffic for unrecognized destinations cannot tell which route leads upstream without further configuration To resolve the situation and select one default route among multiple choices in an area you can manually configure a metric value on each ABR The metric assigns a priority to the ABR for its selection as the priority default route in an area The following command is used for setting the metric value gt gt cfg ip ospf default lt metric value gt lt metric type 1 or 2 gt where lt metric value gt sets the priority for choosing this switch for default route The value none sets no default and 1 sets the highest priority for default route Metric type determines the method for influencing routing decisions for external routes To clear a default route metric from the switch use the following command gt gt cfg ip ospf default none 78 Chapter 4 OSPF Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide Virtual Links Usually all areas in an OSPF AS are physically connected to the backbone In some cases where this is not possible you can use a virtual link Virtual links are created to connect one area to the backbone through another non backbone area see Figure 4 1 on page 70 The area which contains a virtual link must be a transit area and have full routing information Virtual l
349. in RFC 821 Most e mail systems that send mail over the Internet use SMTP to send messages from one server to another the messages can then be retrieved with an e mail client using either POP or IMAP Configuring the Switch for SMTP Health Checks To support SMTP health checking the network administrator must configure a username pass word value in the switch using the content option on the SLB real server group menu cfg slb group To configure the switch for SMTP health checks 1 Select the health check menu for the real server group gt gt cfg slb group 1 Select a real server group 2 Set the health check type to SMTP for the real server group gt gt cfg slb group 1 health smtp 3 Configure the health check content gt gt cfg slb group 1 content lt username gt 4 Apply and save your configuration gt gt Real server group 1 apply gt gt Real server group 1 save 236 m Chapter 10 Health Checking Alteon e systems A February Web OS 10 0 Application Guide IMAP Server Health Checks Internet Message Access Protocol IMAP is a mail server protocol used between a client sys tem and a mail server that allows a user to retrieve and manipulate mail messages IMAP is not used for mail transfers between mail servers IMAP servers listen to TCP port 143 Configuring the Switch for IMAP Health Check To support IMAP health checking the net
350. ination IP address For UDP protocol traffic From a DNS source port To any destination port Allow matching traffic to pass Enable the filter Similarly for TCP gt gt Filter 7 filt 8 Select the menu for Filter 8 gt gt Filter 8 sip any From any source IP address gt gt Filter 8 dip 205 177 15 4 To local DNS Server gt gt Filter 8 dmask 255 255 255 255 Set mask for exact dest address gt gt Filter 8 proto tcp For TCP protocol traffic gt gt Filter 8 sport any From any source port gt gt Filter 8 dport domain To any DNS destination port gt gt Filter 8 action allow Allow matching traffic to pass gt gt Filter 8 ena Enable the filter gt gt Filter 8 filt 9 Select the menu for Filter 9 gt gt Filter 9 sip 205 177 15 4 From local DNS Server gt gt Filter 9 smask 255 255 255 255 Set mask for exact source address gt gt Filter 9 dip any To any destination IP address gt gt Filter 9 proto tcp For TCP protocol traffic gt gt Filter 9 sport domain From a DNS source port gt gt Filter 9 dport any To any destination port gt gt Filter 9 action allow Allow matching traffic to pass gt gt Filter 9 ena Enable the filter Alteon WebSystems Chapter 7 Filtering 189 212777 A February 2002 Web OS 10 0 Application Guide 8 Assign the filters to the switch port th
351. ine area as transit type gt gt OSPF Area index 1 enable Enable the area 88 Chapter 4 OSPF Alteon Systems 212777 A February 2002 6 Define the stub area Web OS 10 0 Application Guide gt gt OSPF Area gt gt OSPF Area gt gt OSPF Area gt gt OSPF Area index 1 aindex 2 index 2 areaid 0 0 0 2 index 2 type stub index 2 enable Select the menu for area index 2 Set the area ID for OSPF area 2 Define area as stub type Enable the area 7 Attach the network interface to the backbone gt gt OSPF Area index 2 if 1 gt gt OSPF Interface 1 aindex 1 gt gt OSPF Interface 1 enable Select OSPF menu for IP interface 1 Attach network to transit area index Enable the transit area interface 8 Attach the network interface to the transit area gt gt OSPF Interface 1 if 2 gt gt OSPF Interface 2 aindex 2 gt gt OSPF Interface 2 enable Select OSPF menu for IP interface 2 Attach network to stub area index Enable the stub area interface 9 Configure the virtual link The nbr router ID configured in this step must be the same as the router ID that was config ured for Web switch 1 in Step 2 on page 86 gt gt OSPF Interface 2 virt 1 gt gt OSPF Virtual Link 1 aindex 1 gt gt OSPF Virtual Link 1 nbr 10 10 10 1 gt gt OSPF Virtual Link 1 enable Specify a virtual link
352. ine which real server should receive the request An asterisk in cookie names for wildcards For example Cookie name ASPsession Client Browsers that Do Not Accept Cookies Under normal conditions most browsers are configured to accept cookies However if a client browser is not configured to accept cookies you must use hash as the load balancing metric to maintain session persistence With cookie based persistence enabled session persistence for browsers that do not accept cookies will be based on the source IP address However individual client requests coming from a proxy firewall will appear to be coming from the same source IP address Therefore the requests will be directed to a single server resulting in traffic being concentrated on a single real server instead of load balanced across the available real servers 426 m Chapter 16 Persistence Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Cookie Modes of Operation Web OS supports the following modes of operation for cookie based session persistence insert passive and rewrite mode The following table shows the differences among the modes Table 16 1 Comparison Among the Three Cookie Modes Cookie Mode Configuration Required Cookie Location Uses Switch Session Entry Insert Cookie Switch only HTTP Header No Passive Cookie Server and Switch HTTP Header or URL Yes Rewrite Cookie Server and Switch HTTP Header No
353. ing this configuration the DNS request nortelnetworks com from 205 178 13 0 will get a DNS response with only the virtual server IP address of Site 1 if Site 1 has less load than Site 3 Alteon Z Systems 212777 A February 2002 Chapter 12 Global Server Load Balancing m 311 Web OS 10 0 Application Guide Using Border Gateway Protocol for GSLB Border Gateway Protocol BGP based GSLB utilizes the Internet s routing protocols to local ize content delivery to the most efficient and consistent site It does so by using a shared IP block that co exists in each Internet Service Provider s ISP s network and is then advertised using BGP throughout the Internet Because of the way IP routing works BGP based GSLB allows for the routing protocols to route DNS requests to the closest location which then returns IP addresses of that particular site locking in the requests to that site In effect the Internet is making the decision of the best location for you avoiding the need for advanced GSLB Some corporations use more than one ISP as a way to increase the reliability and bandwidth of their Internet connection Enterprises with more than one ISP are referred to as being multi homed Instead of multi homing a network to several other networks BGP based GSLB enables you to multi home a particular piece of content DNS information to the Internet by distributing the IP blocks that contain that content to several sites
354. ings are left in their default configuration which is disabled Configure a virtual router using the following sequence of commands gt gt Virtual server 4 cfg vrrp vr 2 Select virtual router 2 gt gt Virtual router 2 vrid 2 Set virtual router ID gt gt Virtual router 2 addr 200 200 200 100 Assign virtual router IP address 2 2 gt gt Virtual router if 5 Assign virtual router interface gt gt Virtual router ena Enable virtual router 2 Repeat this sequence of commands for the following virtual routers E VR4 VRID 4 IF 5 associate with IP interface 5 Address 200 200 200 101 E VR6 VRID 6 IF 5 associate with IP interface 5 Address 200 200 200 103 E VR 8 VRID 8 IF 5 associate with IP interface 5 Address 200 200 200 104 2 Configure virtual routers 1 3 5 and 7 These virtual routers will act as the default gateways for the servers on each respective subnet Because these virtual routers are survivable next hop default gateways they are called virtual interface routers VIRs Configure each virtual router listed below using the sequence of commands in Step 1 E VR 1 VRID 1 IF 1 associate with IP interface 1 Address 10 10 10 1 E VR3 VRID 3 IF 2 associate with IP interface 2 Address 20 10 10 1 E VR5 VRID 5 IF 3 associate with IP interface 3 Address 30 10 10 1 E VR7 VRID 7 IF 4 associate with IP interface 4 Address 40 10 10 1 Alteon Z Systems Chapter 1
355. inks cannot be configured inside a stub area or NSSA The area type must be defined as transit using the following command gt gt cfg ip ospf aindex lt area index gt type transit The virtual link must be configured on the routing devices at each endpoint of the virtual link though they may traverse multiple routing devices To configure an Alteon Web switch as one endpoint of a virtual link use the following command gt gt cfg ip ospf virt lt link number gt aindex lt area index gt nbr lt router ID gt where lt link number gt is a value between 1 and 3 lt area index gt is the OSPF area index of the transit area and lt router D gt is the IP address of the virtual neighbor nbr the routing device at the target endpoint Another router ID is needed when configuring a virtual link in the other direction To provide the Alteon Web switch with a router ID see the following section Router ID For a detailed configuration example on Virtual Links see Example 2 Virtual Links on page 86 Alteon Z Systems Chapter 4 OSPF 79 212777 A February 2002 Web OS 10 0 Application Guide Router ID Routing devices in OSPF areas are identified by a router ID The router ID is expressed in IP address format The IP address of the router ID is not required to be included in any IP inter face range or in any OSPF area The router ID can be configured in one of the following two ways E Dyna
356. ion setup traffic parsing applying server selection algorithms splicing connections and translating session addresses metering and controlling server bandwidth usage processing traffic filters collecting statistics and so on Figure 15 1 illustrates the process of content intelligent switching in the Web switch 1 Client requests 2 Switch completes 3 way Requests for static a Web page handshake with client data go to caches i a File types 3 Client sends an C 4 Switch parses the HTTP request images HTTP request and forwards based on header gif and URL information gt jpg html Requests for dynamic data go to servers L eo Internet Fe _ Fs 6 Switch gets response File types os o vV adjusts the Sequence _ cgi numbers in the TCP Header bin and forwards the packet exe to the client 5 Web server receives the HTTP request and responds Figure 15 1 Content Intelligent Load Balancing Example 372 m Chapter 15 Content Intelligent Switching Alteon systems A February Web OS 10 0 Application Guide Parsing Content Examining session content places heavier demands upon the Web switch than examining TCP IP headers for the following reasons E Content is non deterministic Content identifiers such as URLs and cookies can be of varying lengths and can appear at unpredictable locations within a request Scanning ses sion traffic for a specific string is far more
357. ions when using the hash parameter for fil ter redirection Hashing can be based on source IP address destination IP address both or source IP address and source port For example 1 Configure hashing based on source IP address gt gt cfg slb filt 10 ena Enable the filter gt gt Filter 10 action redir Specify the redir action gt gt Filter 10 proto tcp Specify the protocol gt gt Filter 10 group 1 Specify the group of real servers gt gt Filter 10 rport 3128 Specify the redirection port gt gt Filter 10 vlan any Specify the VLAN gt gt Filter 10 adv Select the advanced filter menu gt gt TCP advanced menu thash sip Select source IP address for hashing Hashing on the 24 bit source IP address ensures that client requests access the same cache 2 Set the metric for the real server group to minmisses or hash The source IP address is passed to the real server group for either of the two metrics gt gt cfg slb group 1 Select the group of real servers gt gt Real server group 1 metric minmiss Set the metric to minmiss or hash NOTE If firewall load balancing is enabled on the switch the firewall load balancing filter which hashes on source and destination IP addresses will override the tunable hash filter 184 m Chapter 7 Filtering Alteon e Systems A February Web OS 10 0 Application Guide Filter based Security This sectio
358. ir and can appear along with other parameters and cookies For example the cookie SessionID 1234 can be represented in one of the following ways E Inthe HTTP Header Cookie SesssionID 1234 Cookie ASP_SESSTONID POIUHKJHLKHD Cookie name john_smith The second cookie represents an Active Server Page ASP session ID The third cookie represents an application specific cookie that records the name of the client E Within the URL http www mysite com reservations SessionID 1234 Alteon WebSystems Chapter 16 Persistence m 425 212777 A February 2002 Web OS 10 0 Application Guide Cookie Properties Cookies are configured on the Web switch by defining the following properties Cookie names of up to 20 bytes The offset of the cookie value within the cookie string For security the real cookie value can be embedded somewhere within a longer string The offset directs the Web switch to the starting point of the real cookie value within the longer cookie string Length of the cookie value This defines the number of bytes to extract for the cookie value within a longer cookie string Whether to find the cookie value in the HTTP header the default or the URL Cookie values of up to 64 bytes for hashing Hashing on cookie values is used only with the passive cookie mode Passive Cookie Mode on page 428 using a temporary cookie The switch mathematically calculates the cookie value using a hash algorithm to determ
359. is disabled you need only one proxy IP address Enable proxy load balancing on the port used for cookie based preferential load balancing If Virtual Matrix Architecture VMA is enabled on the switch you can choose to configure the remaining ports with proxy IP disabled Alteon WebSystems Chapter 15 Content Intelligent Switching 385 212777 A February 2002 Web OS 10 0 Application Guide Browser Smart Load Balancing HTTP requests can be directed to different servers based on browser type by inspecting the User Agent header For example GET products 180 HTTP 1 0 User agent Mozilla 3 0 Accept text html image gif image jpeg To allow the switch to perform browser smart load balancing perform the following proce dure 1 Before you can configure browser based load balancing ensure that the switch has already been configured for basic SLB with the following tasks E Assign an IP address to each of the real servers in the server pool E Define an IP interface on the switch E Define each real server E Assign servers to real server groups E Define virtual servers and services 2 Turn on URL parsing for the virtual server for User Agent header gt gt cfg slb virt 1 service 80 httpslb browser 3 Define the host names gt gt cfg slb layer7 slb add Mozilla gt gt Server Loadbalance Resource add Internet Explorer gt gt Server Loadbalance Resource add Netscap
360. is added to one of the other VLANs the stations in that VLAN will all have access to switch management features VLAN Topologies and Design Issues By default the Web OS software has a single VLAN configured on every port This configura tion groups all ports into the same broadcast domain The VLAN has an 802 1Q VLAN PVID of 1 VLAN tagging is turned off because by default only a single VLAN is configured per port Since VLANs are most commonly used to create individual broadcast domains and or separate IP subnets host systems should be present on more than one VLAN simultaneously Alteon Web switches and VLAN tagging server adapters support multiple VLANS on a per port or per interface basis allowing very flexible configurations You can configure multiple VLANs on a single VLAN tagging server adapter with each VLAN being configured through a logical interface and logical IP address on the host system Each VLAN configured on the server adapter must also be configured on the switch port to which it is connected If multiple VLANs are configured on the port tagging must be turned on Using this flexible multiple VLAN system you can logically connect users and segments to a host with a single VLAN tagging adapter that supports many logical segments or subnets Alteon Systems Chapter 2 VLANs 45 212777 A February 2002 Web OS 10 0 Application Guide Example 1 Multiple VLANS with Tagging Adapters Server 1 Server
361. it adapters and Alteon Web switches both running operating Web OS version 2 0 or later can receive and transmit frames that are far larger than the maximum normal Ethernet frame By sending one Jumbo frame instead of myriad smaller frames the same task is accomplished with less processing The switches and the adapter should support Jumbo frame sizes up to 9018 octets Jumbo frames can be transmitted and received between Gigabit adapter enabled hosts through the switch across any VLAN that has Jumbo frames enabled Isolating Jumbo Frame Traffic using VLANs Jumbo frame traffic must not be used on a VLAN where there is any device that cannot process frame sizes larger than Ethernet maximum frame size Additional VLANs can be configured on the adapters and switches to support non Jumbo frame VLANs for servers and workstations that do not support extended frame sizes End sta tions installed with Jumbo frames capable Gigabit adapters and attached to Web switches can communicate across both the Jumbo frame VLANs and regular frame VLANs at the same time In the example illustrated in Figure 2 7 on page 64 the two servers can handle Jumbo frames but the two clients cannot therefore Jumbo frames should only be enabled and used on the VLAN represented by the solid lines but not for the VLAN with the dashed lines Jumbo frames are not supported on ports that are configured for half duplex mode Alteon Systems Chapter 2 VLANs m 63 212777 A Fe
362. itiate upstream requests and must be configured both as server and client Alteon Z Systems 212777 A February 2002 152 m Chapter 6 Server Load Balancing Web OS 10 0 Application Guide Configuring UDP based DNS Load Balancing 1 Configure and enable a virtual server IP address 1 on the switch gt gt efg slb virt 1 vip 20 20 20 20 Specify the virt server IP address gt gt Virtual Server 1 ena Enable the virtual server 2 Set up the DNS service for the virtual server and add real server group 1 gt gt Virtual Server 1 service dns Specify the DNS service gt gt Virtual Server 1 DNS Service group 1 Select the real server group 3 Disable delayed binding Delayed binding is not required because UDP does not process session requests with a TCP three way handshake gt gt Virtual Server 1 DNS Service dbind dis Disable delayed binding 4 Enable UDP DNS queries gt gt Virtual Server 1 DNS Service udp ena Enable UDP balancing 5 Apply and save your configuration gt gt Virtual Server 1 DNS Service apply gt gt Virtual Server 1 DNS Service save Alteon WebSystems Chapter 6 Server Load Balancing m 153 212777 A February 2002 Web OS 10 0 Application Guide Configuring TCP based DNS Load Balancing 1 Configure and enable the virtual server IP address 2 on the switch gt gt efg slb virt 2 vip 20 20 20 20 Speci
363. ity Table You can add static entries in the proximity table for up to 128 client networks NOTE Web OS allows you to configure a single domain only and for each client subnet you can configure up to two preferred sites The Web switch forwards the client request based on the minimum available sessions and response time between the two preferred sites 310 Chapter 12 Global Server Load Balancing Alteon systems A February Web OS 10 0 Application Guide Use the following commands to configure a proximity table on the Web switch at Site 4 gt gt gt gt gt gt F gt gt oS gt gt a gt gt oS gt gt gt gt cfg slb gslb lookup lookups ena dname nortelnetworks com network 1 sip 205 178 13 0 mask 255 255 255 0 vipl1 lt virtual server IP addr of Site 3 gt vip2 lt virtual server IP addr of Site 1 gt network 2 sip 204 165 0 0 mask 255 255 0 0 vip1l lt virtual server IP add of Site 4 gt vip2 lt virtual server IP add of Site 2 gt Enable the lookup or proximity table Select the domain name Select Client A subnet Assign source address for Client A Assign the mask for Client A Select preferred Site 3 Select preferred Site 1 Select Client B subnet Assign source address for Client B Assign the mask for Client B Select preferred Site 4 Select preferred Site 2 NoTE For each client subnet add only one static entry Us
364. k the IDS server number can be between and 31 gt gt cfg slb group lt group number gt gt gt Real Server Group add 1 gt gt Real Server Group add 2 Define a group Add IDS server 1 Add IDS server 2 3 Define the IDS server load balancing group gt gt cfg slb adv idslb lt group number gt Select the group with the IDS servers 4 Enable the IDS ports for the clients aS gt gt gt gt O UO cfg slb port 5 LB port 5 idslb ena LB port 5 port 6 LB port 6 idslb ena Select IDS port 1 Enable IDS on port 1 Select IDS port 2 Enable IDS on port 2 5 Define the group health check If you implemented IDS without an IP address link health check is specifically developed for IDS load balancing Use ICMP health check if your IDS servers are configured with an IP address gt gt cfg slb group lt group number gt health link 6 Apply and save your changes gt gt Real server group 1 apply gt gt Real server group 1 save Alteon Z Systems 212777 A February 2002 Chapter 6 Server Load Balancing m 165 Web OS 10 0 Application Guide WAN Link Load Balancing Wide Area Networking WAN is a telecommunications network system spread across a broad geographic area A WAN may be privately owned or rented but the term usually means the inclusion of public shared user networks such as the tel
365. k interval con figurable between 1 and 60 seconds with a default of 2 seconds Alteon WebSystems Chapter 11 High Availability m 279 212777 A February 2002 Web OS 10 0 Application Guide Assigning VRRP Virtual Router ID During the software upgrade process VRRP virtual router IDs will be automatically assigned if failover is enabled on the switch When configuring virtual routers at any point after upgrade virtual router ID numbers cfg vrrp vr vrid must be assigned The virtual router ID may be configured as any number between and 255 Configuring the Switch for Tracking Tracking configuration largely depends on user preferences and network environment Con sider the configuration shown in Figure 11 8 on page 263 Assume that the user wants the fol lowing behavior on the network E Web switch 1 is the master router upon initialization E If Web switch 1 is the master and it has one active server fewer than Web switch 2 it remains the master E The user wants this behavior because running one server down is less disruptive than bringing a new master online and severing all active connections in the process E If Web switch 1 is the master and it has two or more active servers fewer than Web switch 2 then Web switch 2 becomes the master E If Web switch 2 is the master it remains the master even if servers are restored on Web switch 1 such that it has one fewer or an equal number of servers E If Web switch 2 is
366. ke In order to make a forwarding decision the switch must terminate the TCP connection to examine the request E New sessions are sent to the real server based on the metric selected hash roundrobin leastconns minmisses response and bandwidth E If no session ID is presented by the client the switch picks a real server based on the met ric for the real server group and waits until a connection is established with the real server and a session ID is received E The session ID is stored in a session hash table Subsequent connections with the same session ID are sent to the same real server This binding is preserved even if the server changes the session ID mid stream A change of session ID in the SSL protocol will cause a full three way handshake to occur E Session IDs are kept on the switch until an idle time equal to the configured server time out a default of 10 minutes for the selected real server has expired Alteon 2bSystems Chapter 16 Persistence m 437 212777 A February 2002 Web OS 10 0 Application Guide Figure 16 5 illustrates persistence based on SSL session ID as follows 1 An SSL Hello handshake occurs between Client 1 and Server 1 via the Web switch 2 An SSL session ID is assigned to Client 1 by Server 1 3 The Web switch records the SSL session ID 4 The Web switch selects a real server based on the existing SLB settings As a result subsequent connections from Client 1 with the same SSL session
367. kie eeeseeeeeseeeeseeeeeeneeeeeenees 432 searching for cookies eesseeceeseeeeseeeeeeseeeeeenees 432 480 m Index SO CULIDD ceccssssuse xcogsececs sdoesceeee T 110 security PUSHIN goier orite rekene ie firewalls from viruses layer 7 deny filter A Port MITTOTING eee ee eeeeeeceececeeceeeeeeeeeeeeeens private MetWOFKS 0 0 ee eeeeeeeeeeeeeeeeeeeeeeeees switch ManageMeNt sseeeeseeeesneeeeeneeeeeees 99 segmentation See IP subnets segments See IP subnets server port processing mode example 126 server FailUre ss eo meeer eim EE EERE 246 Server Load Balancing across subnets direct real Server access s ssssseeeeeseeeeseee e e 142 distrib ted sit s sirenen asi 290 DNS eein e EE aS 151 390 failed server protection eeeeeeeereeeeereeeee 118 fault tolerance PUP eiis health checks DS EEEE E E E E EE maximum connections Overflow SErVErS eeeeeeeececececeececeeeeceeeeeees OVETV CW sis ssscsssvdoasnds rondesonte TEESE E EEEE i persistent bindings port processing modes ssseseeseeeeee ee 123 126 PIONIE S ed seis sd cones socesnvauceeeesnez R ERRE NEEE 122 136 proxy IP addresses cccsscceeseseeessseeeseeees 144 real server group seeeeeseceeeeeees 125 269 400 real server IP address RIP s0seeeeeeees 120 real SCTVETS ccccesesceceesececeececeseeeesesseeesenees 122 remote Sites aseina e eene erar 29
368. kie 432 external routing eee eeeeeeeeeeeeeeeseeceeneeeeeeees 36 73 F failed server protection SLB seeeeeeeesseeeeees 118 failover acti veachi VEspoir e aE aE 260 active standby css css csser sessssensnseesssssseresssre 252 OVETVIEW oe reaa E E A Ea ESER 253 st teful ciadccscdeaccsosexcngacedes traesvstetcuaianesescaceees 283 fault tolerance port trunking oo eeeeee ee eseeecenteeeeeeeeeeeeeeeees 66 Server Load Balancing ceeeeeeeseeeeeseeeees 122 filter redirection tunable hashis 184 filtering configuration example sseeeeesseeeeeeees 186 default filter ccccccssesssserstseeeeeeees 173 186 TP address ranges eseceseececesseeeeesneeeeeeees 178 layer 7 deny enia aei 417 NAT configuration example 191 to 193 HUDENS ve vse snc ineine aisea aiii order of precedence sesseesesseeresserrreresreee proto Option ssssssssssesesesesreerreesessses security example eseeeseeesrssssseserererererene filtering based VLANG eseseeeeseseseeneeeeees firewalls esnin fragmenting jumbo frames frame processing s ssesessssessssrererrrerrererersressese frame tagging See VLANs tagging PIP ieren e n E a ETATER 304 FTP Server Load Balancing sseeeseeceesseeeeees 150 COMPSUTING 25 2 selsdeceescasadibeceteateevees 150 151 Alteon Z Systems 212777 A February 2002 G gateway See default gateway Gigabit adapters j
369. ks with VLANs The following items describe the features of this example E Example 2 shows how it is possible through the use of VLANs to create configurations where there are multiple links between two switches without creating broadcast loops E Two Alteon Web switches are connected with two different Gigabit Ethernet links With out VLANs this configuration would create a broadcast loop but the STP topology reso lution process resolves parallel loop creating links E To prevent broadcast loops port 7 is on VLAN 10 and VLAN 22 port 8 is on VLAN 32 and VLAN 109 Both switch to switch links are on different VLANs and thus are sepa rated into their own broadcast domains E Ports 1 and 2 on both switches are on VLAN 10 ports 3 and 4 on both switches are on VLAN 22 Ports 5 and 6 on both switches are on VLAN 32 port 9 on both switches are on VLAN 109 E Itis necessary to turn on Spanning Tree Protocol STP on at least one of the switch to switch links or alternately turned on in both switches STP Bridge Protocol Data Units BPDUs will be transmitted out both Gigabit Ethernet ports and interpreted by the switch that there is a loop to resolve E Spanning Tree is VLAN aware 48 Chapter 2 VLANs Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide VLANs and Spanning Tree Protocol Spanning Tree Protocol STP detects and eliminates logical loops in a bridged or switched network STP forces redun
370. l Matrix Architecture on page 217 of this manual and for information on using the commands see the Web OS Command Reference c g slb adv matrix for more information 4 Apply and save your changes NOTE Remember that you must apply any changes in order for them to take effect and you must save them if you wish them to remain in effect after switch reboot Also the info slb command is useful for checking the state of Server Load Balancing operations 138 m Chapter 6 Server Load Balancing Alteon e Systems A February Web OS 10 0 Application Guide Mapping Ports An Alteon Web switch allows you to hide the identity of a port for security by mapping a vir tual server port to a different real server port Mapping a Virtual Server Port to a Real Server Port In addition to providing direct real server access in some situations see Mapping Ports on page 144 mapping is required when administrators choose to execute their real server pro cesses on different ports than the well known TCP UDP ports Otherwise virtual server ports are mapped directly to real server ports by default and require no mapping configuration Port mapping is configured from the Virtual Server Services menu For example to map the virtual server TCP UDP port 80 to real server TCP UDP port 8004 you could enter the follow ing gt gt cfg slb virt 1 service 80 Select virtual server port 80 gt gt Virtual Server 1 http Service
371. l servers are configured as on Web switch 1 ard gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt Layer 4 virt vir vir vir vir vir vir vir vir vir cual cual cual cual cual cual tual cual cual server server 1 server 1 server 1 server 1 server 1 server 1 server 1 server 1 vip 10 10 10 1 enable service http http service group 1 2 http service cfg slb virt 2 Select menu for virtual server 2 vip 10 10 10 2 enable service http group 1 Select menu for virtual server 1 Set the IP address for virtual server 1 Enable the virtual server Select menu for service on virtual server Use real server group I for http service Set the IP address for virtual server 2 Enable the virtual server Select menu for service on virtual server Use real server group I for http service 3 Configure IP interfaces for each network that will be attached to OSPF areas gt gt Virtual server 1 cfg ip if 1 Select menu for IP Interface 1 gt gt IP Interface 1 addr 10 10 7 2 Set IP address on backbone network gt gt IP Interface 1 enable Enable IP interface 1 gt gt IP Interface 1 if 2 Select menu for IP Interface 2 gt gt IP Interface 2 addr 10 10 10 41 Set IP address on stub area network gt gt IP Interface 2 enable Enable IP interface 2 96 Chapter 4 OSPF Alteon Systems 212
372. l switch port 1 gt gt SLB port 1 server ena Enable server processing on port 1 gt gt SLB port 1 port 2 Select physical switch port 2 gt gt SLB port 2 server ena Enable server processing on port 2 gt gt SLB port 2 port 6 Select physical switch port 6 gt gt SLB port 6 client ena Enable client processing on port 6 6 On the California switch enable SLB gt gt SLB port 6 cfg slb Select the SLB Menu gt gt Layer 4 on Turn SLB on Alteon WebSystems Chapter 12 Global Server Load Balancing 297 212777 A February 2002 Web OS 10 0 Application Guide Task 3 Configure the California Site for GSLB 1 On the California switch define each remote site When you start configuring at the California site California is local and Denver is remote Add and enable the remote switch s IP address interface In this example there is only one remote site Denver with an IP interface address of 174 14 70 100 The following commands are used gt gt Layer 4 gslb site 1 Select remote site 1 gt gt Remote site 1 prima 174 14 70 100 Define remote interface gt gt Remote site 1 ena Enable remote site 1 Each additional remote site would be configured in the same manner You can enable up to 64 remote sites with a total aggregate of 2048 service site combinations 2 On the California switch assign each remote distributed service to a local virtual server Configu
373. le cache redirection of requests that contain cookie in the HTTP header gt gt cfg slb layer7 redir cookie ena dis O Ena The switch redirects all requests that contain cookie in the HTTP header to the origin server O Dis The switch compares the URL against the expression table to determine whether the request should be redirected to a cache server or the origin server Enable disable cache redirection of requests that contain Cache control no cache in the HTTP 1 1 header or Pragma no cache in the HTTP 1 0 header to the origin server gt gt cfg slb layer7 redir nocache ena dis O Ena The switch redirects all requests that contain Cache control no cache in the HTTP 1 1 header or Pragma no cache inthe HTTP 1 0 header to the origin server O Dis The switch compares the URL against the expression table to determine whether the request should be redirected to a cache server or the origin server 398 m Chapter 15 Content Intelligent Switching Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide 4 Define the string s to be used for Web cache SLB Refer to the parameters listed below gt gt cfg slb layer7 slb add rem lt string gt E add Add a string or a path E rem Remove string or a path A default string any indicates that the particular server can handle all URL or Web cache requests Refer to the following
374. le to specify the classifi cation with which it should be associated There are two mechanisms to address classifica tion a per contract precedence value and a default ordering If a contract does not have an assigned precedence value then the ordering is as follows 1 Layer 7 applications for example URL HTTP headers cookies and so forth 2 Layer 4 services on the virtual server 3 Filter 4 VLAN 5 Source Port Default Assignment Bandwidth Classification Configuration Any item that is configured with a filter can be used for BWM Bandwidth classification is per formed using the following menus E cfg slb filt is used to configure classifications based on the IP destination address IP source address TCP port number UDP UDP port number or any filter rule E cfg slb virt is used to configure classifications based on virtual servers E cfg port is used to configure classifications based on physical ports In case of trunking use cfg trunk E cfg vlan is used to configure classifications based on VLANS E cfg slb layer7 1b is used to configure classification based on URL paths To associate a particular classification with a contract enter the contract index into the cont menu option under the applicable configuration menus 448 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Frame Discard When packets in a contract queue have not
375. les It shows text that must be typed in exactly as shown Main sys lt AaBbCc123 gt _ This italicized type appears in command examples as a parameter placeholder Replace the indicated text with the appropriate real name or value when using the command Do not type the brackets This also shows book titles special terms or words to be emphasized To establish a Telnet session enter host telnet lt P address gt Read your User s Guide thoroughly Command items shown inside brackets are optional and can be used or excluded as the situation demands Do not type the brackets host ls a Alteon Z5Systems 212777 A February 2002 Preface m 23 Web OS 10 0 Application Guide Contacting Us For complete product support and sales information visit the Nortel Networks website at the following URL http www nortelnetworks com See the contact information on this site for regional support and sales phone numbers and e mail addresses E In North America dial toll free 1 800 4NORTEL E Outside North America call 987 288 3700 24 m Preface Alteon Systems 212777 A February 2002 Routing This section discusses basic Laye tion to switching traffic a This section in Jumbo Frames Port Trunking Border Gateway Protocol BGP Open Shortest Path First OSPF Secure Switch Management Alteon Z Systems 212777 A February 2002 S ing and routing functions In addi N
376. lf of the virtual interface router nor does it respond to ARP requests If the owner is not available the backup becomes the master and takes over responsibility for packet forwarding and responding to ARP requests However because this switch is not the owner it does not have a real interface configured with the virtual interface router s IP address Selecting the Master VRRP Router Each VRRP router that is not an owner is configured with a priority between 1 254 According to the VRRP standard an owner has a priority of 255 A bidding process determines which VRRP router is or becomes the master the VRRP router with the highest priority Owners have a higher priority than the range permitted for non owners If there is an IP address owner it is always the master for the virtual interface router as long as it is available The master periodically sends advertisements to an IP multicast address As long as the back ups receive these advertisements they remain in the backup state If a backup does not receive an advertisement for three advertisement intervals it initiates a bidding process to determine which VRRP router has the highest priority and takes over as master If at any time a backup determines that it has higher priority than the current master does it can preempt the master and become the master itself unless configured not to do so In pre emption the backup assumes the role of master and begins to send its own advertise
377. lity network using block rather than diagonal interconnections between switches Dirty Side Clean Side Subnet 1 VLAN 1 Subnet 2 VLAN 2 Subnet 3 VLAN 3 Subnet 4 VLAN 4 195 1 1 0 24 10 10 2 0 24 10 10 3 0 24 10 10 4 0 24 Web Switch 3 Web Switch 1 IF1 10 10 4 10 IF1 195 1 1 10 Firewall 1 IF2 10 10 3 1 IF2 10 10 2 1 Dirty 10 10 IF3 10 10 3 2 32 IF3 10 10 2 2 32 Clean 10 1 VIP 10 10 4 100 Internet Router m 195 1 1 2 Web Switch 2 Firewall 2 Web Switch 4 10 10 4 22 IF1 195 1 1 11 Dirty 10 10 2 4 IF1 10 10 4 11 eens IF2 10 10 2 11 Clean 10 10 3 4 IF2 10 10 3 11 IF3 10 10 2 12 32 IF3 10 10 3 12 32 VIP 10 10 4 100 Figure 13 7 Four Subnet FWLB Example Network NoTE The port designations of both dirty side Web switches are identical as are the port designations of both clean side Web switches This simplifies configuration by allowing you to synchronize each primary Web switch s configuration with the secondary Four subnet FWLB configuration is summarized as follows Configure routers and firewalls and test them for proper operation Configure VLANs IP interfaces and static routes on all Web switches and test them Configure secondary web switches with VRRP support settings Configure FWLB groups and redirection filters on the primary dirty side Web switch Configure and synchronize VRRP on the primary dirty side Web switch Configure FWLB and SLB gr
378. ll NAT option gt gt gt gt gt gt gt gt gt gt gt gt cfg slb port lt port number gt SLB port lt port Filter lt filter Filter lt filter Filter lt filter SLB port lt port number gt pip 12 12 12 12 Configure proxy IP address on the physical port number gt filt lt filter number gt number gt rport 3128 Specify redirection port number gt adv Select the advance menu number gt Advanced proxy ena Enable proxy IP address Chapter 15 Content Intelligent Switching m 401 Web OS 10 0 Application Guide 12 Create a default filter for noncached traffic on the switch gt gt cfg slb filt lt filter number gt Select the default filter gt gt Filter lt filter number gt sip any From any source IP addresses gt gt Filter lt filter number gt dip any To any destination IP addresses gt gt Filter lt filternumber gt proto any For any protocol traffic gt gt Filter lt filter number gt action allow Set the action to allow traffic gt gt Filter lt filternumber gt ena Enable the default filter gt gt Filter lt filternumber gt port lt port number gt Assign the default filter to a port NOTE When the proto parameter is not tcp or udp then sport and dport are ignored 13 Turn on filtering for the port gt gt SLB lt portnumber gt filt ena 14 Add the filters to the client port gt gt SLB
379. ll be attached to OSPF areas gt gt gt gt gt gt gt gt gt gt gt gt Virtual server IP IP IP IP IP 1 cfg ip if 1 Interface 1 addr 10 10 7 1 Interface Interface Interface enable 1 1 if 2 Interface 2 addr 10 10 10 40 2 enable Select menu for IP interface 1 Set IP address on backbone network Enable IP interface 1 Select menu for IP interface 2 Set IP address on stub area network Enable IP interface 2 7 Enable OSPF on Web switch 1 gt gt IP Interface 2 ospf on Enable OSPF on Web switch 1 8 Define the backbone gt gt Open Shortest Path First aindex 0 Select menu for area index 0 gt gt OSPF Area index 0 areaid 0 0 0 0 Set the ID for backbone area 0 gt gt OSPF Area index 0 type transit Define backbone as transit type gt gt OSPF Area index 0 enable Enable the area 9 Define the stub area gt gt OSPF Area index 0 aindex 1 Select menu for area index 1 gt gt OSPF Area index 1 areaid 0 0 0 1 Set the ID for stub area 1 gt gt OSPF Area index 1 type stub Define area as stub type gt gt OSPF Area index 1 enable Enable the area 94 m Chapter 4 OSPF Alteon Z Systems 212777 A February 2002 10 Attach the network interface to the backbone Web OS 10 0 Application Guide gt gt OSPF Area index gt gt OSPF Inte
380. ll initiate a redirect only if resources are unavailable at the first site NOTE This feature should be used as a method of last resort for GSLB implementations in topologies where the remote servers are usually virtual server IP addresses in other Alteon Web switches Figure 12 3 illustrates the packet flow of HTTP and non HTTP redirects in a GSLB environ ment Client Site HTTP Applications Non HTTP Applications Web Servers Web Internet Proxy IP address is Servers p configured on Client n port for non HTTP applications Figure 12 3 HTTP and Non HTTP Redirects 304 m Chapter 12 Global Server Load Balancing AlteonkbSystems A February Web OS 10 0 Application Guide Table 12 5 explains the packet flow process in detail In this example the initial DNS request from the client reaches Site 2 but Site 2 has no available services Table 12 5 HTTP Versus Non HTTP Redirects Site 2 Web switch Site 1 Web switch HTTP application la Client DNS request reaches Site 2 1b Client resends request to Site 1 built in redirection Resources are unavailable at Site 2 Resources are available at Site 1 Site 2 sends a response to Client with Site 1 s Site 1 completes TCP three way handshake with virtual server IP address client Non HTTP application 2a Client DNS request reaches Site 2 2b Site 1 processes the client proxy IP request no redirection Resources are unavaila
381. local filename gt lt switch IP address gt putcfg Some examples are listed below gt gt ssh 205 178 15 157 gt gt ssh 1 dleu 205 178 15 157 gt gt scp 205 178 15 157 getcfg ad4 cfg gt gt scp ad4 cfg 205 178 15 157 putcfg where 205 178 15 157 is the IP address of the example switch Please also note that apply and save commands are still needed after the last command scp ad4 cfg 205 178 15 157 putcfg is issued Or instead you can use the fol lowing commands gt gt scp ad4 cfg 205 178 15 157 putcfg_apply gt gt scp ad4 cfg 205 178 15 157 putcfg_apply save 112 m Chapter 5 Secure Switch Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Port Mirroring Port mirroring is implemented to enhance the security of your network For example an IDS server can be connected to the monitor port to detect intruders attacking the network The port mirroring feature in Web OS 10 0 allows you to attach a sniffer to a monitoring port that is configured to receive a copy of every single packet that is forwarded from the mirrored port Web OS enables you to mirror port traffic for all layers Layer 2 7 As shown in Figure 5 2 port 5 is monitoring ingress traffic traffic entering the switch on port 1 and egress traffic traffic leaving the switch on port 3 You can attach a device to port 5 to monitor the traffic on ports 1 and 3 Mirrored ports Monitoring por
382. local traffic from being redirected E Filter 20 prevents VRRP traffic from being redirected E Filter 224 redirects the remaining traffic to the firewall group gt gt cfg slb filt 10 gt gt dip 10 10 4 0 gt gt dmask 255 255 255 0 gt gt ena gt gt ilt 20 gt gt dip 224 0 0 0 gt gt damask 255 255 255 0 gt gt ena gt gt ilt 224 gt gt action redir gt gt group 1 gt gt ena gt gt port 4 gt gt filt ena gt gt add 10 gt gt add 20 gt gt add 224 Alteon WebSystems Chapter 13 Firewall Load Balancing 343 212777 A February 2002 Web OS 10 0 Application Guide 4 Configure VRRP on the primary clean side Web switch VRRP in this example requires two virtual routers to be configured one for the subnet attached to the real servers and one for the subnet attached to the firewalls gt gt cfg vrrp gt gt on gt gt vr 1 gt gt vrid 3 gt gt addr 10 10 4 9 gt gt if 1 gt gt prio 100 gt gt share dis gt gt ena gt gt track gt ifs ena gt gt ports ena gt gt cfg vrrp vr 2 gt gt vrid 4 gt gt addr 10 10 3 9 gt gt if 2 gt gt prio 101 gt gt share dis SS ena gt gt track gt gt ifs ena gt gt ports ena A third virtual router is required for the virtual server used for optional SLB gt gt cfg vrrp vr 3 gt gt vrid 5 gt gt addr 10 10 4 100 gt gt
383. logically in the same IP subnet as Server 2 and PC 5 Tagging is not enabled on their switch port PC 3 A member of VLAN 1 this PC can only communicate with Server 2 and PC 5 PC 4 A member of VLAN 3 this PC can only communicate with Server 1 and Server 2 PC 5 A member of both VLAN 1 and VLAN 2 this PC has VLAN tagging Gigabit Ethernet adapter installed It can communicate with Server 2 via VLAN 1 and to PC 1 and PC 2 via VLAN 2 The switch port to which it is connected is configured for both VLAN 1 and VLAN 2 and has tagging enabled NoTE VLAN tagging is required only on ports that are connected to other Alteon Web switches or on ports that connect to tag capable end stations such as servers with VLAN tagging adapters Alteon Z Systems 212777 A February 2002 Chapter 2 VLANs m 47 Web OS 10 0 Application Guide Example 2 Parallel Links with VLANs Web Switch 10 100 10000 Mbps Ethernet Server Switch m e T Gigabit Ethernet Port 7 Gigabit Ethernet Port 8 VLAN 10 VLAN 22 VLAN 32 VLAN 109 Web Switch 10 100 10000 Mbps Ethernet Server S era 8 SIE 8 Figure 2 2 Example 2 Parallel Lin
384. lowable number of characters that a script supports NOTE Health check scripts can only be set up via the command line interface but once entered can be assigned as the health check method using SNMP or the Browser Based Inter face BBI Alteon WebSystems Chapter 10 Health Checking m 225 212777 A February 2002 Web OS 10 0 Application Guide Script Format The general format for health check scripts is shown below open application_port e g 80 for HTTP 23 for Telnet etc send requestl expect responsel send request2 expect response2 send request3 expect response3 close NOTE If you are doing HTTP 1 1 pipelining you need to individually open and close each response in the script E Each script should start with the command open port lt protocol port number gt The next line can be either a send or expect E The first word is the method This is usually get however HTTP supports several other commands including put and head The second word indicates the content desired or request URL and the third word represents the version of the protocol used by the client If you supplied HTTP 1 1 for the protocol version you would also have to add in the fol lowing line Host www hostname com Example GET index html HTTP 1 1 press Enter key Host www hostname com press Enter key twice This is known as a host header It is important to include because most Web sites now requir
385. lowed to log in as a SSH user because the switch will recognize him as the SCP only administrator and only allow the administrator access to SCP commands 110 Chapter 5 Secure Switch Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Configuring SSH SCP SSH SCP parameters can be configured only via the console port using the CLI The switch SSH daemon uses TCP port 22 only and is not configurable To enable or disable the SSH SCP feature use the following commands gt gt cfg sys sshd on Turn SSH SCP on gt gt cfg sys sshd off Turn SSH SCP off To set the interval of RSA server key autogeneration use this command gt gt cfg sys sshd intrval lt number of hours 0 24 gt where the number of hours must range between 0 24 and a value of 0 denotes that RSA server key autogeneration is disabled When greater than 0 the switch will auto generate the RSA server key every interval specified however RSA server key generation will be skipped if the switch is busy doing other key or cipher generation when the timer expires To enable or disable the SCP apply and save SCP putcfg_apply and putcfg_apply_save commands use these commands gt gt cfg sys sshd ena Enable SSH SCP apply and save gt gt cfg sys sshd dis Disable SSH SCP apply and save The following commands are useful for obtaining information about the current SSH SCP
386. lowing procedure to dump the configuration script text dump out of Switch 1 E Using the Browser Based Interface BBD a You need a serial cable that is a DB 9 Male to DB 9 Female straight through not a null modem cable b Connect the cable from a COM port on your computer to the console port on switch 1 c Open HyperTerminal or the terminal program of your choice and connect to the switch using the following parameters Baud 9600 Data Bits 8 Parity None Stop Bits 1 Flow Control None E Using HyperTerminal a Only the Baud Rate and Flow Control options need to be changed from the default set tings b Once you connect to the switch start logging your session in HyperTerminal trans fer capture text c Save the file as Customer Name Switch 1 then type the following command in the switch command line interface cfg dump A script will be dumped out d Stop logging your session transfer capture text stop Modify the script as follows 1 Open the text file that you just created and change the following E Delete anything above Script Start E Delete the two lines directly below Script Start These two lines identify the switch from which the dump was taken and the date and time If these two lines are left in it will con fuse Web switch 2 when you dump in the file E Change the last octet in all the IP interfaces from 10 to 11 Find this in line cfg ip if 1 addr 10 10 10 10 Sim
387. lready been configured for basic SLB see Server Load Balancing on page 117 with the following tasks E Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server Assign servers to real server groups Define virtual servers and services Configure the load balancing algorithm to hash or minmiss 406 Chapter 15 Content Intelligent Switching Alteon 2 systems A February Web OS 10 0 Application Guide 2 Turn on URL parsing for the filter gt gt cfg slb filt 1 adv urlp ena 3 Enable hash to direct a cacheable URL request to a specific cache server By default the host header field is used to calculate the hash key and URL hashing is disabled E hash ena Enables hashing based on the URL and the host header if it is present Specify the length of the URL to hash into the cache server gt gt cfg slb layer7 redir hash ena Enter new hash length 1 255 24 hash disable Disables hashing based on the URL Instead the host header field to calcu late the hash key If the host header field does not exist in the HTTP header then the switch uses the source IP address as the hash key Example 1 Hashing on the URL In this example URL hashing is enabled If the Host field does not exist the specified length of the URL is used to hash into the cache server as shown in Figure 15 6 on page 408 If the H
388. lt gateway 6 Enable default gateway 6 Select default gateway 1 Enable gateway I for all VLAN s 5 Apply and verify your configuration gt gt Default gateway 1 cur View current IP settings Examine the results under the gateway section If any settings are incorrect make the appropri ate changes Alteon Z Systems 212777 A February 2002 Chapter 2 VLANs m 61 Web OS 10 0 Application Guide 6 Optional Configure the local networks to ensure that the VLANs use the configured default gateways gt gt IP frwd local Select the local network Menu gt gt IP Forwarding add 10 10 0 0 Specify the network for routers 1 2 amp 3 gt gt IP Forwarding mask 255 255 0 0 Add the mask for the routers gt gt IP Forwarding add 172 21 2 0 Specify the network for VLAN 2 gt gt IP Forwarding mask 255 255 255 0 Add the mask for VLAN 2 network gt gt IP Forwarding add 172 21 3 0 Specify the network for VLAN 3 gt gt IP Forwarding mask 255 255 255 0 Add the mask for VLAN 3 7 Apply and save your new configuration changes gt gt IP Forwarding apply gt gt IP Forwarding save 62 Chapter 2 VLANs Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide VLANs and Jumbo Frames To reduce host frame processing overhead Gigabit network adapters that can handle frame sizes of 9K and higher such as the 3COM PCI X PCI Gigab
389. lt gateway as the NAS IP The RADIUS health check is performed using the configured real server port rport To configure RADIUS health checks use the cfg slb virt lt gt service menu Alteon WebSystems Chapter 10 Health Checking m 239 212777 A February 2002 Web OS 10 0 Application Guide Configuring the Switch for RADIUS Secret and Password RADIUS is stateless and uses UDP as its transport protocol To support RADIUS health checking the network administrator must configure two parameters on the switch E the cfg slb secret value E the content parameter with a username password value gt gt cfg slb group lt real server group number gt Select the real server group gt gt health radius Specify the type of health checking gt gt content lt username gt lt password gt Specify the RADIUS username pass word value gt gt cfg slb adv secret lt RADIUS coded value gt Enter up to 32 alphanumeric charac ters used to encrypt and decrypt pass word HTTPS SSL Server Health Checks The ss1h health check option on the Real Server Group Menu cfg slb group lt gt allows the switch to query the health of the SSL servers by sending an SSL client Hello packet and then verify the contents of the server s Hello response SSL health check is per formed using the real server port configured that is the rport The SSL enhanced health check behavior is summarized below E The
390. lt range number gt is a number 1 to 16 lt IP address gt is the base IP address for the range and lt mask gt is the IP address mask for the range For a detailed configuration example see Example 3 Summarizing Routes on page 90 Alteon Systems Chapter 4 OSPF 77 212777 A February 2002 Web OS 10 0 Application Guide Default Routes When an OSPF routing device encounters traffic for a destination address it does not recog nize it forwards that traffic along the default route Typically the default route leads upstream toward the backbone until it reaches the intended area or an external router Each Web switch acting as an ABR automatically inserts a default route into each attached area In simple OSPF stub areas or NSSAs with only one ABR leading upstream see Area 1 in Figure 4 3 any traffic for IP address destinations outside the area is forwarded to the switch s IP interface and then into the connected transit area usually the backbone Since this is auto matic no further configuration is required for such areas Stub Area _ Backbone Stub Area 7 a Area0 ABR rea2 gt o IR N ie Metric Priority F aA Fo Default au R gt F i _ Route Priority Default je E i Default Route i ETE Route oak ii 200 N Metric N m s lt 10 1 ASBR to External Networks Figure 4 3 Injecting Default Routes In more complex OSPF areas with multiple ABRs or ASBRs such as area 0 and area 2
391. lth http Select HTTP health checks 2 Configure a dummy redirect filter as the last filter after the redirect all filter to force the HTTP health checks to activate as shown below gt gt gt gt gt gt gt gt gt gt gt gt cfg slb filt 225 Filter Filter Filter Filter Filter 224 proto tcp 224 action redir 224 group 1 224 rport http 224 ena Select filter 225 For TCP protocol traffic Redirect the traffic Set real server group for redirection Set real server port for redirection Enable the filter NOTE Make sure that the number of each real filter is lower than the number of the dummy redirect filter 352 m Chapter 13 Firewall Load Balancing Alteon Z Systems 212777 A February 2002 CHAPTER 14 Virtual Private Network Load Balancing The VPN Virtual Private Network load balancing feature in Web OS 10 0 allows the switch to load balance simultaneously up to 255 VPN devices The switch records from which VPN server a session was initiated and ensures that the traffic returns back to the same VPN server from which the session started The following topics are addressed in this chapter E Overview on page 354 E VPN Load Balancing Configuration on page 356 Alteon Systems 353 212777 A February 2002 Web OS 10 0 Application Guide Overview Virtual Private Networks A VPN is aconnection that has the a
392. ly on a given switch all virtual routers are either master or backup they cannot change state individually To provide as much flexibility as possible the old hot standby approach has been modified to eliminate the problems previously associated with it and is now based on VRRP In a hot standby configuration two or more switches provide redundancy for each other One switch is elected master and actively processes Layer 4 traffic The other switches the backups assume the master role should the master fail The backups may forward Layer 2 and Layer 3 traffic as appropriate There are three components to the VRRP based hot standby model the virtual router group additional Layer 4 port states and configuration synchronization options The hot standby model is shown in Figure 11 6 Active VIP 1 VIP 205 178 13 226 Active VIP 2 VIP 205 178 13 240 Active VIP 3 VIP 205 178 13 110 Router Internet a a outer Standby VIP 1 VIP 205 178 13 226 Standby VIP 2 VIP 205 178 13 240 Standby VIP 3 VIP 205 178 13 110 Figure 11 6 Hot Standby Redundancy 256 m Chapter 11 High Availability AlteonkbSystems A February Web OS 10 0 Application Guide Virtual Router Group The virtual router group ties all of the virtual routers together as a single entity and is central to the hot standby configuration All virtual routers on a given switch must all be either master or backup They cannot failover individually only as
393. m 423 212777 A February 2002 Web OS 10 0 Application Guide Cookie Based Persistence Cookies are a mechanism for maintaining state between clients and servers When the server receives a client request the server issues a cookie or token to the client which the client then sends to the server on all subsequent requests Using cookies the server does not require authentication the client IP address or any other time consuming mechanism to determine that the user is the same user that sent the original request In the simplest case the cookie may be just a customer ID assigned to the user It may be a token of trust allowing the user to skip authentication while his or her cookie is valid It may also be a key that associates the user with additional state data that is kept on the server such as a shopping cart and its contents In a more complex application the cookie may be encoded so that it actually contains more data than just a single key or an identification number The cookie may contain the user s preferences for a site that allows their pages to be customized 3 WEB SERVER DESIGNATED TO SERVE COOKIES RECORDS INFORMATION AND 1 user recistERs To Buy SENDS THE CLIENT A COOKIE AN ITEM 5 4 swrrcu rEcorps or REWRITES COO SW SOLD ON CHT COOKIE INFORMATION BASED ON MACHINE CONFIGURATION 6 CLIENT DECIDES TO BUY AN ITEM THE COOKIE INFORMATION IS SENT AS ja PART OF THE HTTP Sis REQUEST R SS E ans
394. mber gt filter lt filter number gt 214 m Chapter 8 Application Redirection Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Excluding Noncacheable Sites Some Web sites provide content that is not well suited for redirection to cache servers Such sites might provide browser based games or applications that keep real time session informa tion or authenticate by client IP address To prevent such sites from being redirected to cache servers create a filter which allows this specific traffic to pass normally through the Web switch This filter must have a higher prece dence a lower filter number than the application redirection filter For example if you wished to prevent a popular Web based game site on subnet 200 10 10 from being redirected you could add the following to the previous example configuration gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil gt gt Fil LB LB LB LB LB gt gt gt gt gt gt oo Nnnnnn gt gt ter 1 ter ter ter ter ter ter ter PPRPRPPrRP Pe ter port port port port port gt gt cfg slb filt 1 dip 200 10 10 0 dmask 255 255 255 0 sip any proto tcp dport http sport any action allow ena port 5 5 add 1 5 port 6 6 add 1 6 apply 6 save Select the menu for filter 1 To the site s destination IP address For entire su
395. mber of MAC address combinations encountered results in a lopsided traffic distribution which can reduce the effective combined bandwidth of the trunked ports By adding Layer 3 IP address information to the distribution algorithm a far wider variety of address combinations is seen Even with just a few routers feeding the trunk the normal source destination IP address combinations even within a single LAN can be widely varied This results in a wider statistical load distribution and maximizes the use of the combined bandwidth available to trunked ports Built In Fault Tolerance Since each trunk group is comprised of multiple physical links the trunk group is inherently fault tolerant As long as one connection between the switches is available the trunk remains active Statistical load balancing is maintained whenever a port in a trunk group is lost or returned to service 66 Chapter 3 Port Trunking Alteon 2 Systems A February Web OS 10 0 Application Guide Port Trunking Example In the example below three ports will be trunked between two Alteon Web switches Switch 1 Switch 2 Web Switch Web Swit 10 100 10000 Mbps Ethernet Server Switch Pasco nett 10 100 10000 Mbps Ethernet Ser Me Sei oy z deol gt Laal 4 E 5 Laekentanl Trunk 1 Ports 2 4 and 5 on Switch 1 Trunk 3 Ports 4 6 and 9 on Switch 2 Figure 3 2 Port Trunk Group Configuration Example Prior to configuring ea
396. ments The current master sees that the backup has higher priority and will stop functioning as the master A backup router can stop receiving advertisements for one of two reasons the master can be down or all communications links between the master and the backup can be down If the master has failed it is clearly desirable for the backup or one of the backups if there is more than one to become the master NOTE If the master is healthy but communication between the master and the backup has failed there will then be two masters within the virtual router To prevent this from happening configure redundant links to be used between the switches that form a virtual router Alteon WebSystems Chapter 11 High Availability m 251 212777 A February 2002 Web OS 10 0 Application Guide Active Standby Failover The previous text described the use of a group of VRRP routers to form a single virtual inter face router It implements a traditional hot standby configuration in which the backup router only functions when the active router has failed VRRP can also be used to implement active standby configurations In an active standby configuration both switches support active traf fic but are configured so that they do not simultaneously support the same service In the example shown in Figure 11 2 Web switch 1 is the master for the virtual interface router with VRID 1 and its backup for the virtual interface router with VRID 2
397. menu for IP interface 1 Attach network to backbone index Enable the backbone interface Attach the network interface to the transit area gt gt OSPF Interface 1 if 2 gt gt OSPF Interface 2 aindex 1 gt gt OSPF Interface 2 enable Select OSPF menu for IP interface 2 Attach network to transit area index Enable the transit area interface Configure the virtual link The nbr router ID configured in this step must be the same as the router ID that will be config ured for Switch 2 in Step 2 on page 88 gt gt OSPF Interface 2 virt 1 gt gt OSPF Virtual Link 1 aindex 1 gt gt OSPF Virtual Link 1 nbr 10 10 14 1 gt gt OSPF Virtual Link 1 enable Specify a virtual link number Specify the transit area for the virtual link Specify the router ID of the recipient Enable the virtual link Apply and save the configuration changes gt gt OSPF Interface 2 apply gt gt OSPF Interface 2 save Global command to apply all changes Global command to save all changes Alteon Z Systems 212777 A February 2002 Chapter 4 OSPF m 87 Web OS 10 0 Application Guide Configuring OSPF for a Virtual Link on Switch 2 1 Configure IP interfaces on each network that will be attached to OSPF areas Two IP interfaces are needed on Switch 2 one for the transit area network on 10 10 12 0 24 and one for the stub area network
398. metrics can be used hash leastconns roun drobin minmiss response and bandwidth See Metrics for Real Server Groups on page 131 for details on using each metric NOTE Some metrics allow other options such as weights to be configured 348 m Chapter 13 Firewall Load Balancing Alteon e systems A February Web OS 10 0 Application Guide Adding a Demilitarized Zone DMZ Implementing a DMZ in conjunction with firewall load balancing enables the Web switch to do the traffic filtering off loading this task from the firewall A DMZ is created by configuring FWLB with another real server group and a redirection filter towards the DMZ subnets The DMZ servers can be connected to the Web switch on the dirty side of the firewall A typi cal firewall load balancing configuration with a DMZ is shown in Figure 13 10 DMZ Note There can be one or two DMZs yi Oia Private a Network Web Switches Internet Web Switches Firewalls Figure 13 10 Typical Firewall Load Balancing Topology with DMZ The DMZ servers can be attached to the Web switch directly or through an intermediate hub or switch The Web switch is then configured with filters to permit or deny access to the DMZ servers In this manner two levels of security are implemented one that restricts access to the DMZ through the use of Web switch filters and another that restricts access to the clean net work through the use of stateful in
399. mically OSPF protocol configures the lowest IP interface IP address as the router ID This is the default E Statically Use the following command to manually configure the router ID gt gt cfg ip ospf rtrid lt IP address gt E To modify the router ID from static to dynamic set the router ID to 0 0 0 0 save the con figuration and reboot the Web switch To view the router ID enter gt gt info ospf gen Authentication OSPF protocol exchanges are authenticated so that only trusted routing devices can participate This ensures less processing on routing devices that are not listening to OSPF packets OSPF allows packet authentication and uses IP multicast when sending and receiving packets Routers participate in routing domains based on predefined passwords Web OS 10 0 supports simple password authentication type plain text passwords only This type of authentication allows a password to be configured per area Figure 4 4 shows authentication configured for area 0 with the password test Simple authenti cation is also configured for the virtual link between area 2 and area 0 Area 1 is not configured for OSPF authentication 27 BES 7 AreaQ TS j Area1 N 7 Simple authentication T ABR Web switch 1 Wel switch 3 7 gt I pen Cai Area 2 ASBR to External Networks Web switch5 7 a A Figure 4 4 OSPF Authentication 80 Chapter 4 OSPF Alteon Systems 2
400. ministrators of e commerce Web sites where a server may have data associated with a specific user that is not dynamically shared with other servers at the site In Web OS persistence can be based on the following characteristics source IP address cook ies and Secure Sockets Layer SSL session ID Using Source IP Address Until recently the only way to achieve TCP IP session persistence was to use the source IP address as the key identifier There are two major conditions which cause problems when ses sion persistence is based on a packet s IP source address E Many clients sharing the same source IP address proxied clients Proxied clients appear to the switch as a single source IP address and do not take advantage of SLB on the switch When many individual clients behind a firewall use the same proxied source IP address requests are directed to the same server without the benefit of load balancing the traffic across multiple servers Persistence is supported without the capability of effec tively distributing traffic load Also persistence is broken if you have multiple proxy servers behind the Web switch per forming SLB The Web switch changes the client s address to different proxy addresses as attempts are made to load balance client requests E Single client sharing a pool of source IP addresses When individual clients share a pool of source IP addresses persistence for any given request cannot be assured Although each
401. n IP route to the switch that per forms the SLB functions This IP routing is most easily accomplished by placing the switches and servers on the same IP subnet although advanced routing techniques can be used as long as they do not violate the topology rules outlined in Network Topology Requirements on page 122 For this example the three Web host real servers have been given the following IP addresses on the same IP subnet Table 6 1 Web Host Example Real Server IP Addresses Real Server IP address Server A 200 200 200 2 Server B 200 200 200 3 Server C 200 200 200 4 NOTE An imask option can be used to define a range of IP addresses for real and virtual servers see IP Address Ranges Using imask on page 129 124 m Chapter 6 Server Load Balancing Alteon 2 Systems A February Web OS 10 0 Application Guide 2 Define an IP interface on the switch The switch must have an IP route to all of the real servers that receive Web switching services For SLB the switch uses this path to determine the level of TCP IP reach of the real servers To configure an IP interface for this example enter these commands from the CLI gt gt cfg ip if 1 gt gt IP Interface 1 addr 200 200 200 100 gt gt IP Interface 1 ena Select IP interface 1 Assign IP address for the interface Enable IP interface 1 NOTE The IP interface and the real servers must belong to the same VLAN if
402. n an IP address to each of the real servers in the server pool E Define an IP interface on the switch E Define each real server For information on how to configure your network for SLB see Server Load Balancing on page 117 2 Configure the switch to support basic WCR For information on WCR refer to Application Redirection on page 203 Alteon WebSystems Chapter 15 Content Intelligent Switching 397 212777 A February 2002 Web OS 10 0 Application Guide 3 Configure the parameters and file extensions that bypass WCR The switch is preconfigured with a list of 13 noncacheable items a b c d Dynamic content files Common gateway interface files cgi cold fusion files cfm ASP files asp BIN directory CGI BIN directory SHTML scripted html Microsoft HTML extension files htx executable files exe Dynamic URL parameters amp Add or remove expressions that should not be cacheable gt gt cfg slb layer7 redir add remove lt expression gt Enable disable ALLOW for non GETS such as HEAD POST and PUT to the ori gin server as described below gt gt cfg slb layer7 redir urlal ena dis O Ena The switch allows all non GET requests to the origin server O Dis The switch compares all requests against the expression table to determine whether the request should be redirected to a cache server or the origin server Enable disab
403. n changes and then check the information again NoTE Changes to filters on a given port only effect new sessions To make filter changes take effect immediately clear the session binding table for the port see the oper slb clear command in the Web OS Command Reference Delayed Binding for Web Cache Redirection To configure delayed binding on your Web switch for WCR only use the following command gt gt cfg slb filt lt filternumber gt adv urlp ena For more conceptual information on delayed binding see Delayed Binding on page 146 210 Chapter 8 Application Redirection Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide RTSP Web Cache Redirection Web OS 10 0 supports Web Cache Redirection WCR for Real Time Streaming Protocol RTSP RTSP WCR is similar to HTTP WCR in configuration and in concept Multimedia presentations consume a lot of Internet bandwidth The quality of these presentations depends upon the real time delivery of the data To ensure the high quality of multimedia presentations several caching servers are needed to cache the multimedia data locally This data is then made available quickly from the cache memory as required RTSP WCR redirects cached data transparently and balances the load among the cache servers If there is no cache server the request is directed to the origin server Internet Service Provid ers use this feature to cache the multime
404. n provides an example of configuring filters for providing the best security It is generally recommended that you configure filters to deny all traffic except for those services that you specifically wish to allow Consider the following sample network Alteon Web Switch L A Internet K ir Client Switch Router a Local Clients Web Server Mail Server DNS 205 177 15 2 205 177 15 3 205 177 15 4 Figure 7 7 Security Topology Example In this example the network is made of local clients on a collector switch a Web server a mail server a domain name server and a connection to the Internet All the local devices are on the same subnet For best security it is generally recommended that you configure filters to deny all traffic except for those services that you specifically wish to allow In this example the administrator wishes to install basic security filters to allow only the following traffic External HTTP access to the local Web server External SMTP mail access to the local mail server Local clients browsing the World Wide Web Local clients using Telnet to access sites outside the intranet DNS traffic All other traffic is denied and logged by the default filter NOTE Since IP address and port information can be manipulated by external sources filter ing does not replace the necessity for a well constructed network firewall Alteon Z Systems Chapter 7 Filtering 185 212777 A February 2002 Web
405. n to be healthy 246 m Chapter 10 Health Checking Alteon 2 Systems A February CHAPTER 11 High Availability Alteon Web switches support high availability network topologies through an enhanced imple mentation of the Virtual Router Redundancy Protocol VRRP The following topics are discussed in this chapter E VRRP Overview on page 248 This section discusses VRRP operation and Web OS redundancy configurations E Failover Methods on page 253 This section describes the three modes of high availabil ity m Web OS Extensions to VRRP on page 259 This section describes VRRP enhancements implemented in Web OS M High Availability Configurations on page 263 This section discusses a few of the more useful and easily deployed redundant configurations O Active Standby Virtual Server Router Configuration on page 263 O Active Active VIR and VSR Configuration on page 265 O Active Active Server Load Balancing Configuration on page 267 O VRRP Based Hot Standby Configuration on page 275 E Virtual Router Deployment Considerations on page 277 This section describes issues to consider when deploying virtual routers E Stateful Failover of Layer 4 and Layer 7 Persistent Sessions on page 283 This section describes how to enable stateful failover by mirroring Layer 7 and Layer 4 persistent transactional states on the peer switch Alteon Z Systems 247 212777 A February 200
406. na rip 10 0 0 21 9 Enable the real server group gt gt Real server 4 group 1 gt gt Real server group 1 metric hash gt gt Real server group 1 add 1 add 2 add 3 add 4 10 Enable RTS on the necessary ports gt gt Real server group 1 port 7 rts ena gt gt SLB port 7 port 8 rts ena Alteon WebSystems Chapter 14 Virtual Private Network Load Balancing m 361 212777 A February 2002 Web OS 10 0 Application Guide 11 12 Enable filter processing on the server ports so that the response from the real server will be looked up in VPN session table gt gt SLB port 8 port 1 filter ena Apply and save the configuration and reboot the switch gt gt SLB port 8 apply gt gt SLB port 8 save gt gt SLB port 8 boot reset Configure the First Dirty Side WebSwitch DA Turn off BOOTP gt gt cfg sys bootp dis Define and enable VLAN 2 for ports 7 and 8 gt gt cfg vlan 2 ena def 7 8 Turn off STP gt gt cfg stp offt Configure IP interfaces 1 2 and 3 gt gt cfg ip if 1 ena mask 255 255 255 0 addr 192 168 10 10 gt gt cfg ip if 2 ena mask 255 255 255 0 addr 10 0 0 10 vl1 2 gt gt cfg ip if 3 ena mask 255 255 255 255 addr 10 0 0 11 vl1 2 Define static routes for each of the IP interfaces you configured in Step 4 using the VPN devices as gateways
407. nal server load balancing methods the entries will continue to age out Since TPCP is UDP based the Add Delete Session requests may get lost during trans mission The WAP gateway issues another Add Session request on detecting that it has lost a request The WAP gateway detects this situation when it receives WAP traffic that does not belong to that WAP gateway Ifa Delete Session request is lost it will be overwritten by another Add Session request How WAP SLB Works Using Static Session Entries 1 On dialing the user is first authenticated by the Remote Access Server RAS 2 The RAS sends a RADIUS authentication request to one of the RADIUS servers which can be integrated with a WAP gateway 3 If the user is accepted the RADIUS server determines which WAP gateway is right for this user and informs the switch of the decision via TPCP 4 The switch receives an Add Session request from the RADIUS server and adds a ses sion entry to its session table to bind a WAP gateway with that user 5 A response RADIUS Accept packet is sent back to the RAS by the RADIUS server 6 The RAS receives a RADIUS Accept packet and allows the WAP traffic for that user 7 Ifthe user disconnects the RAS detects it and sends a RADIUS Accounting Stop message to the RADIUS server 8 The RADIUS server sends a Delete session message and removes the session entry for that user Alteon WebSystems Chapter 6 Server Load Balancing m 159 212777 A Feb
408. name This index can be viewed using the cfg bwm cont menu Contracts can be enabled and disabled The set of classifications associated with each contract can be viewed using the info bwm menu For frames qualifying for multiple classifications precedence of contracts is also specified per contract If no precedence is specified the default order is used see Precedence on page 448 E When both filter Types Of Service TOS and BWM TOS are applied BWM TOS has precedence E BWM configurations will optionally be synchronized during VRRP synchronization except the port contracts and VLAN contracts which will not be synchronized 446 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Classification Criteria The frames associated with a particular BWM contract are specified using the parameters listed below All of these classifications are aimed at limiting the traffic outbound from the server farm for bandwidth measurement and control Server Output Bandwidth Control E Physical Port All frames are from a specified physical port E VLAN All frames are from a specified VLAN Even if a VLAN translation occurs the bandwidth policy is based on the ingress VLAN m IP Source Address All frames have a specified IP source address or range of addresses defined with a subnet mask E IP Destination Address All frames have a specified IP destination address or range o
409. nch a browser such as Netscape or Internet Explorer and go to http 30 0 0 100 5 You will be asked to authenticate yourself 6 Enter vpnuser for user name and alteon for the password Y PN 1 SecuRemote Authentication VPN 1 SecuRemote Alteon WebSystems Chapter 14 Virtual Private Network Load Balancing m 369 212777 A February 2002 Web OS 10 0 Application Guide 7 You will see a message verifying that you were authenticated Secured VPN 1 SecuRemote User successfully authenticated by YPN 1 CHECK POINT eS Software Technologies Lid www checkpoint com 8 Browse to the Web site If there are other services running on other servers in the internal network you should also be able to reach those services All of this traffic is traveling over the VPN and is being decrypted at the VPN device You can verify which VPN device is being used by looking at the Log Viewer You should also be able to see the client authentication as well as the decrypted traffic To verify that the FWLB and hash metric is working correctly on the dirty side switches that is hashed on client IP address Destination IP address you can configure your current client with an IP address one higher or lower in the last octet and try to reestablish the VPN con nection Or add another PC on the dirty side and connect NOTE When many clients are coming from behind a VPN gateway for example not using the SecuRemote clients but using
410. nclude the generic file name to be booted the address of the default gateway and so forth Nortel Networks DHCP relay agent eliminates the need to have DHCP BOOTP servers on every subnet It allows the administrator to reduce the number of DHCP servers deployed on the network and to centralize them Without the DHCP relay agent there must be at least one DHCP server deployed at each subnet that has hosts needing to perform the DHCP request DHCP Overview DHCP is described in RFC 2131 and the DHCP relay agent supported on Alteon Web switches is described in RFC 1542 DHCP uses UDP as its transport protocol The client sends messages to the server on port 67 and the server sends messages to the client on port 68 DHCP defines the methods through which clients can be assigned an IP address for a finite lease period and allowing reassignment of the IP address to another client later Additionally DHCP provides the mechanism for a client to gather other IP configuration parameters it needs to operate in the TCP IP network In the DHCP environment the Alteon Web switch acts as a relay agent The DHCP relay fea ture cfg ip bootp enables the switch to forward a client request for an IP address to two BOOTP servers with IP addresses that have been configured on the switch When a switch receives a UDP broadcast on port 67 from a DHCP client requesting an IP address the switch acts as a proxy for the client replacing the client source IP
411. nd 4 These serv ers have been defined with the any string Alteon WebSystems Chapter 15 Content Intelligent Switching 375 212777 A February 2002 Web OS 10 0 Application Guide GET www foo com images abc gif String matching for SS Se images GET www foo com event reg bin s SS gi GET www foo com product abc html Jpg 7 String matching for 2 4 product Alteon Web Switch cgi a bin ras exe 0 gt si s String matching for product In groups with multiple servers html traffic is distributed within the group via standard SLB metric or URL hashing Figure 15 2 URL Based Server Load Balancing Configuring URL Based Server Load Balancing To configure URL based SLB perform the following steps 1 Before you can configure URL based load balancing ensure that the switch has already been configured for basic SLB with the following tasks NOTE When URL based SLB is used in an active active redundant setup use a proxy IP address instead of Direct Access Mode DAM to enable the URL parsing feature Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server Define a real server group and set up health checks for the group Define a virtual server on virtual port 80 HTTP and assign the real server group to service it Enable SLB on the switch Enable client processing on the port connected to th
412. ne virtual servers and services 2 Turn on URL parsing for the filter gt gt cfg slb filt 1 adv urlp ena 3 Enable header load balancing for the Host header gt gt cfg slb layer7 redir header ena host 4 Define the host names gt gt cfg slb layer7 slb add com gt gt Server Load Balance Resource add org gt gt Server Load Balance Resource add net 5 Apply and save your configuration changes 6 Identify the string ID numbers with this command gt gt cfg slb layer7 slb cur Each defined string has an associated ID number Number of entries four ID SLB String 1 any 2 com 3 org 4 net Alteon Z Systems Chapter 15 Content Intelligent Switching 403 212777 A February 2002 Web OS 10 0 Application Guide 7 Configure the real server s to handle the appropriate load balance string s Add the defined string IDs to the real servers gt gt cfg slb real 2 layer7 addlb lt ID gt where ID is the identification number of the defined string NOTE If you don t add a defined string or add ID 1 the server will handle any request 8 If Host header filtering is enabled Step 3 you can configure the switch to use the host header field to determine whether requests are cacheable or noncacheable For example if you want all domain names that end with net or uk not to go to a cache server th
413. neral instructions for configuring BWM on the switch Specific configuration examples begin on page 457 1 Configure the switch as you normally would for SLB Configuration includes the follow ing tasks E Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server Define a real server group Define a virtual server Define the port configuration For more information about SLB configuration see Server Load Balancing on page 117 2 Enable BWM on the switch NOTE If you purchased the Bandwidth Management option make sure you enable it by typ ing oper swkey and entering its software key gt gt cfg bwm on Turn BWM on 3 Select a bandwidth policy Each policy must have a unique number from 1 to 64 gt gt Bandwidth Management pol 1 Select bandwidth policy 1 4 Set the hard soft and reserved rate limits for the policy in Mbps Typically charges are applied for burst rates between the soft and hard limit Each limit must be set between 256K 1000M NOTE For rates less than 1 Mbps append a K suffix to the number gt gt Policy 1 hard 6 Set never exceed rate gt gt Policy 1 soft 5 Set desired bandwidth rate gt gt Policy 1 resv 4 Set committed information rate 454 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002
414. nfigure the switch for DNS load balancing perform the following procedure 1 Before you can configure DNS load balancing ensure that the switch has already been configured for basic SLB with the following tasks Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server DNS server address Assign servers to real server groups Define virtual servers and services Enable SLB For information on how to configure your network for SLB see Chapter 6 Server Load Balancing E Define server port and client port 2 Enable DNS load balancing gt gt cefg slb virt 1 Select the virtual server gt gt Virtual Server 1 service 53 Select the DNS service gt gt Virtual Server 1 DNS Service dnsslb ena Enable DNS SLB 3 Enable delayed binding gt gt Virtual Server 1 DNS Service dbind ena 4 Define the host names gt gt cfg slb layer7 slb add www abcdefg com gt gt Server Loadbalance Resource add www hijklm com gt gt Server Loadbalance Resource add www nopqrst com gt gt Server Loadbalance Resource add www uvwxyz com 5 Apply and save your configuration changes 6 Identify the defined string IDs gt gt cfg slb layer7 slb cur For easy configuration and identification each defined string has an ID attached as shown in the following example
415. nks from various switched subnets throughout one building Common servers are placed on another subnet attached to the switch A primary and backup router are attached to the switch on yet another subnet Without Layer 3 IP routing on the switch cross subnet communication is relayed to the default gateway in this case the router for the next level of routing intelligence The router fills in the necessary address information and sends the data back to the switch which then relays the packet to the proper destination subnet using Layer 2 switching With Layer 3 IP routing in place on the Alteon Web switch routing between different IP sub nets can be accomplished entirely within the switch This leaves the routers free to handle inbound and outbound traffic for this group of subnets To make implementation even easier UDP Jumbo frame traffic is automatically fragmented to regular Ethernet frame sizes when routing to non Jumbo frame VLANS or subnets This auto matic frame conversion allows servers to communicate using Jumbo frames all transparently to the user 30 Chapter 1 Basic IP Routing Alteon e systems A February Web OS 10 0 Application Guide Example of Subnet Routing Prior to configuring you must be connected to the switch Command Line Interface CLI as the administrator NoTE For details about accessing and using any of the menu commands described in this example see the Web OS Command Reference 1
416. nsion rm ram or smil QuickTime Streaming Server Apple Inc s QuickTime Streaming Server typically runs on the Apple platforms Quick Time files that can be played over the Internet using RTSP are specially formatted and are called hinted QuickTime files Normal QuickTime files cannot be used for streaming The QuickTime files have the extension mov QuickTime uses UDP protocol exclusively for transport and TCP for control connection Each stream of a QuickTime presentation sends Real Time Protocol RTP and Real Time Control Protocol RTCP data using two UDP connections Typically a QuickTime pre sentation has two streams and therefore uses four UDP connections and one TCP control connection QuickTime clients use a UDP port which is manually configurable RTSP Implementation RTSP implementation in Web OS supports the following E Alteon AD3 Alteon AD4 Alteon 180e and Alteon 184 platforms E Private addressing on the server side E Layer 7 URL hashing metric URL pattern matching and all Layer 4 metrics for load bal ancing E All the stream connections and the control connections are switched to the same cache server to facilitate caching of entire presentations E RTSP compliant applications excludes Windows Media Player because it is not RTSP compliant 156 m Chapter 6 Server Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Configuring RTSP
417. nt Enter new hash length 1 255 25 3 Set the metric for the real server group to minmisses or hash gt gt cfg slb group 1 metric lt hashlminmiss gt Alteon WebSystems Chapter 15 Content Intelligent Switching m 389 212777 A February 2002 Web OS 10 0 Application Guide DNS Load Balancing The Internet name registry has become so large that a single server cannot keep track of all the entries This is resolved by splitting the registry and saving it on different servers If you have large DNS server farms Web OS allows you to load balance traffic based on DNS names To load balance DNS names the host name is extracted from the query processed by the regular expressions engine and the request is sent to the appropriate real server For example Figure 15 4 shows a DNS server farm load balancing DNS queries based on DNS names Requests with DNS names beginning with A through G are sent to Server 1 DNS names beginning with H through M are sent to Server 2 DNS names beginning with N through T are sent to Server 3 DNS names beginning with U through Z are sent to Server 4 DNS Server Farm Server 1 DNS Queries A G Client Web Switch I Server 2 DNS Queries H M Server 3 Server 4 DNS Queries N T DNS Queries U Z Figure 15 4 Load Balancing DNS Queries 390 m Chapter 15 Content Intelligent Switching Alteon 2 systems A February Web OS 10 0 Application Guide To co
418. nt services such as HTTP and HTTPS where the real server failure on one service blocks the real server for other services then configure a single group with multiple services If a real server configured for both HTTP and HTTPS fails for the HTTP service then the server is blocked from supporting any HTTPS requests The switch will block HTTPS requests even though HTTPS has not failed until the HTTP service becomes available again This helps in troubleshooting so you know which service has failed 130 m Chapter 6 Server Load Balancing Alteon 2 Systems A February Web OS 10 0 Application Guide Metrics for Real Server Groups Metrics are used for selecting which real server in a group will receive the next client connec tion The available metrics minmisses minimum misses hash least conns least con nections roundrobin bandwidth and response response time are explained in detail below The default metric is leastconns To change a real server group metric to minmisses for example enter gt gt cfg slb group lt group number gt Select the real server group gt gt Real server group metric minmisses Use minmisses metric Minimum Misses The minmisses metric is optimized for Application Redirection It uses IP address informa tion in the client request to select a server The specific IP address information used depends on the application E For Application Redirection the client destination IP
419. number UDP and UDP port number gt gt BWM Contract 1 cfg slb virt 1 cont 1 Assign contract to virtual server gt gt Virtual Server 1 filt 1 adv cont 1 Assign contract l to filter 1 In this case all frames that match filter 1 or virtual server 1 will be assigned contract 1 On the switch apply and verify the configuration gt gt Filter 1 Advanced apply Make your changes active gt gt Filter 1 Advanced cfg bwm cur View current settings Examine the resulting information If any settings are incorrect make any appropriate changes On the switch save your new configuration changes gt gt Bandwidth Management save Save for restore after reboot On the switch check the BWM information gt gt Bandwidth Management info bwm lt contract number gt View BWM information gt gt Bandwidth Management stats bwm lt contract number gt View BWM information Check that all BWM contract parameters are set correctly If necessary make any appropriate configuration changes and then check the information again 456 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Additional Configuration Examples Examples are provided for the following Bandwidth Management applications User Application Fairness see next section Preferential Services page 460 URL Based page 463 Cookie Based page 465 Se
420. number gt cost lt cost value 1 65535 gt Electing the Designated Router and Backup In any area with more than two routing devices a Designated Router DR is elected as the central contact for database exchanges among neighbors and a Backup Designated Router BDR is elected in case the DR fails DR and BDR elections are made through the hello process The election can be influenced by assigning a priority value to the Web switch s OSPF interfaces The command is as follows gt gt cfg ip ospf if lt OSPF interface number gt prio lt priority value 0 127 gt A priority value of 127 is the highest and 1 is the lowest A priority value of 0 specifies that the interface cannot be used as a DR or BDR In case of a tie the routing device with the low est router ID wins Summarizing Routes Route summarization condenses routing information Without summarization each routing device in an OSPF network would retain a route to every subnet in the network With summa rization routing devices can reduce some sets of routes to a single advertisement reducing both the load on the routing device and the perceived complexity of the network The impor tance of route summarization increases with network size Summary routes can be defined for up to 16 IP address ranges using the following command gt gt cfg ip ospf range lt range number gt addr lt IP address gt mask lt mask gt where
421. o based health check for connection oriented WTLS traffic on port 9203 The web switch sends a new WTLS Client Hello to the WAP gateway and checks to see if it receives a valid WTLS Server Hello back from the WAP Gateway 242 m Chapter 10 Health Checking Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Configuring the Switch for WTLS Health Checks 1 Select the group with the WAP gateway gt gt Main cfg slb group 1 Select the Real Server Group 1 menu 2 Use the sndcnt command to enter the content to be sent to the WSP gateway gt gt Real server group 1 health wtls 3 Select a port number other than 9203 if you want to change the port number on which your gateway is listening to WTLS traffic gt gt Main cfg slb adv wap gt gt WAP Health Check Menu wtlsprt 10203 4 Apply and save your configuration gt gt WSP Health Check apply LDAP Health Checks Lightweight Directory Access Protocol LDAP health checks enable the switch to determine whether the LDAP server is alive or not LDAP versions 2 and 3 are described in RFC 1777 and RFC 2251 The LDAP health check process consists of three LDAP messages over one TCP connection E Bind request The switch first creates a TCP connection to the LDAP server on port 339 which is the default port After the connection is established the switch initiates an LDAP protocol session by sendin
422. o that real server This means you cannot configure a dedicated server to receive a certain string and at the same time have it exclude other URL strings The exclu sionary feature is enabled per server not per string For example the following strings are assigned to a real server string 1 cgi string 2 NOT cgi form_A string 3 NOT cgi form_B As a result all cgi scripts are matched except form_A and form_B Configuring for Exclusionary URL String Matching This configuration example shows you how to configure a server to handle any requests except requests that contain the string test or requests that start with images or product To configure exclusionary URL string matching perform the following procedure 1 Before you can configure URL string matching ensure that the switch has already been configured for basic SLB Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server Assign servers to real server groups Define virtual servers and services Enable SLB 410 Chapter 15 Content Intelligent Switching Alteon e systems A February Web OS 10 0 Application Guide For information on how to configure your network for server load balancing see Chapter 6 Server Load Balancing 2 Add the load balancing strings for example test images and product to the real server gt gt cfg slb layer7 slb
423. obal command to save all changes Alteon Z Systems Chapter 4 OSPF m 85 212777 A February 2002 Web OS 10 0 Application Guide Example 2 Virtual Links In the example shown in Figure 4 6 area 2 is not physically connected to the backbone as is usually required Instead area 2 will be connected to the backbone via a virtual link through area 1 The virtual link must be configured at each endpoint Backbone Transit Area Stub Area Area 0 Switch 1 ae T Areal Switch 2 7 Area mee Pi 0 0 0 0 N 0 0 0 1 0 0 0 2 ae aia oiim el i Virtual 101122 my 1 A l 10 10 7 0 24 ae N 10 10 12 0 24 7 ON ID _ 10 10 24 0 24 7 N Network 10 10 10 1 Network 10 10 141 Network lt Figure 4 6 Configuring a Virtual Link Configuring OSPF for a Virtual Link on Switch 1 1 Configure IP interfaces on each network that will be attached to the switch In this example two IP interfaces are needed on Switch 1 one for the backbone network on 10 10 7 0 24 and one for the transit area network on 10 10 12 0 24 gt gt cfg ip if 1 Select menu for IP interface 1 gt gt IP Interface 1 addr 10 10 7 1 Set IP address on backbone network gt gt IP Interface 1 enable Enable IP interface 1 gt gt IP Interface 1 if 2 Select menu for IP interface 2 gt gt IP Interface 2 addr 10 10 12 0 Set IP address on transit area network gt gt IP Interface 2 enable Enable interface 2
424. of multiple IP addresses This configuration splits incom ing traffic into multiple streams Each stream is then routed toward the primary clean side Web switch through a different firewall Although other load balancing metrics can be used in some configurations see Free Metric FWLB on page 346 the distribution of traffic within each stream is normally based on a mathematical hash of the IP source and destination addresses Hashing ensures that each request and its related responses will use the same firewall a feature known as persistence and that the streams will be statistically equal in traffic load 3 The primary clean side Web switch forwards the traffic to its destination Once traffic arrives at the primary clean side Web switch it is forwarded to its destination In this example the Web switch uses regular server load balancing settings to select a real server on the internal network for each incoming request The same process is used for outbound server responses a filter on the clean side Web switch splits the traffic and static routes forward each response stream back through the same firewall that forwarded the original request 328 m Chapter 13 Firewall Load Balancing Alteon e systems A February Web OS 10 0 Application Guide Configuring Four Subnet FWLB An example network for four subnet FWLB is illustrated in Figure 13 7 While other complex topologies are possible this example assumes a high availabi
425. om 4 Configure the real server s to handle the appropriate load balancing string s To add a defined string gt gt cfg slb real 2 Select the real server gt gt Real Server 2 Layer 7 gt gt Real Server 2 Layer 7 Commands addlb lt J D gt Specify the string ID where JD is the identification number of the defined string NOTE If you don t add a defined string or add the defined string any the server will han dle any request 382 m Chapter 15 Content Intelligent Switching Alteon 2 Systems A February Web OS 10 0 Application Guide Cookie Based Preferential Load Balancing Cookies can be used to provide preferential services for customers ensuring that certain users are offered better access to resources than other users when site resources are scarce For example a Web server could authenticate a user via a password and then set cookies to identify them as Gold Silver or Bronze customers Using cookies you can distinguish individu als or groups of users and place them into groups or communities that get redirected to better resources and receive better services than all other users NOTE Cookie based persistent load balancing is described in Chapter 16 Persistence Cookie based preferential services enable the following support Redirect higher priority users to a larger server or server group Identify a user group and redirect th
426. ommands in the cf g slb adv menu are used for a differ ent purpose When an IP packet reaches the Management Processor the source IP address is checked against the range of addresses defined by mnet and mmask If the source IP address of the host or hosts are within this range they are allowed to attempt to log in Any packet addressed to a switch IP interface with a source IP address outside this range is discarded silently Example Assume that the mnet is set to 192 192 192 0 and the mmask is set to 255 255 255 128 This defines the following range of allowed IP addresses 192 192 192 1 to 192 192 192 127 E A host with a source IP address of 192 192 192 21 falls within the defined range and would be allowed to access the switch Management Processor E A host with a source IP address of 192 192 192 192 falls outside the defined range and is not granted access To make this source IP address valid you would need to shift the host to an IP address within the valid range specified by the mnet and mmask or modify the mnet to be 192 192 192 128 and the mmask to be 255 255 255 128 This would put the 192 192 192 192 host within the valid range allowed by the mnet and mmask 192 192 192 128 255 NOTE When the mnet and mmask Management Processor filter is applied Routing Inter face Protocol RIP updates received by the switch will be discarded if the source IP address of the RIP packet s falls outside the specified range You can c
427. ompromises efficiency in two ways E Routers can be slower than switches The cross subnet side trip from the switch to the router and back again adds two hops for the data slowing throughput considerably E Traffic to the router increases increasing congestion Even if every end station could be moved to better logical subnets a daunting task competi tion for access to common server pools on different subnets still burdens the routers This problem is solved by using Alteon Web switches with built in IP routing capabilities Cross subnet LAN traffic can now be routed within the Web switches with wire speed Layer 2 switching performance This not only eases the load on the router but saves the network administrators from reconfiguring each and every end station with new IP addresses Alteon WebSystems Chapter 1 Basic IP Routing m 29 212777 A February 2002 Web OS 10 0 Application Guide Take a closer look at the Alteon Web switch in the following configuration example First Floor Second Floor Third Floor 10 100 Client Subnet 10 100 Client Subnet 10 100 Client Subnet 100 20 10 1 254 131 15 15 1 254 208 31 177 1 254 Primary Default Router 205 21 17 1 1000 Mbps 1000 Mbps PZ IP Routing yr re lt Secondary Default Server Subnet Router 205 21 17 2 Alteon Web Switch 206 30 15 1 254 Figure 1 2 Switch Based Routing Topology The Alteon Web switch connects the Gigabit Ethernet and Fast Ethernet tru
428. on Guide Content Intelligent Web Cache Redirection Web OS allows you to redirect Web cache requests based on different HTTP header information such as Host header or User Agent for browser smart load balancing For more information on layer 4 Web cache redirection see Chapter 8 Application Redirection The No Cache Cache Control for Web Cache Redirection WCR feature in Web OS allows you to off load the processing of non cacheable content from cache servers by sending only appropriate requests to the cache server farm When a Cache Control header is present in a HTTP 1 1 request it indicates a client s special request with respect to caching such as to guar antee up to date data from the origin server If this feature Cache Control no cache directive is enabled HTTP 1 1 GET requests are forwarded directly to the origin servers NOTE The term origin server refers to the server originally specified in the request The HTTP 1 0 Pragma no cache header is equivalent to the HTTP 1 1 Cache Con trol header By enabling the Pragma no cache header requests are forwarded to the ori gin server NOTE For WCR at any given time one HTTP header is supported globally for the entire switch This section discusses the following types of Web cache redirection URL Based Web Cache Redirection on page 395 HTTP Header Based Web Cache Redirection on page 403 Browser Based Web Cache Redirec
429. or Internet protocols does not provide sufficient geographic separa tion of client proximity information As a result large ISP partners cannot use their own geo graphic data to determine GSLB site selection based on client location However using static client to site mapping in Web OS software you can configure client proximity tables to select GSLB sites based on client location The use of a static client site database allows you to customize the client environment The proximity database is limited to 128 entries The GSLB client proximity table is supported for HTTP protocol 308 Chapter 12 Global Server Load Balancing Alteon 2 Systems A February Web OS 10 0 Application Guide Figure 12 5 illustrates GSLB proximity tables The client sends a request to the DNS server which is forwarded to the master switch The master switch looks through its proximity table and returns the request to the DNS server with the virtual server IP address of the preferred site The DNS server sends a new request through the Internet and connects the client to the preferred site 4 CLIENT REQUEST FORWARDED TO NEAREST LOCATION fk 1 CLIENT SENDS REQUEST TO LOCAL DNS SERVER DATABASE FIELDS lt IP ADDRESS gt lt NETMASK gt lt VIP gt 3 MASTER SWIT CH LOOKS AT DATABASE AND RESPONDS 2 DNS REQUEST SENT TO MASTER SWIT CH Figure 12 5 GSLB Proximity Tables How They Work The following example illustrated in
430. or console and telnet access The default is disable for telnet access and enable for console access All user privileges other than those assigned to the Administrator have to be defined in the RADIUS dictionary Radius attribute 6 which is built into all Radius servers defines the admin istrator The file name of the dictionary is RADIUS vendor dependent The following user privileges are Web OS proprietary definitions Table 5 2 Web OS Alteon Levels User Name Access User Service Type Value User Vendor supplied 255 SLB Operator Vendor supplied 254 Layer 4 Operator Vendor supplied 253 Operator Vendor supplied 252 SLB Administrator Vendor supplied 251 Layer 4 Administrator Vendor supplied 250 106 Chapter 5 Secure Switch Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Secure Shell and Secure Copy Although a remote network administrator can manage the configuration of an Alteon Web switch via Telnet this method does not provide a secure connection Using Secure Shell SSH and Secure Copy SCP messages between a remote administrator and the switch use secure tunnels so that the data on the network is encrypted and secured Figure 5 1 on page 103 illus trates secure switch management NOTE SSH SCP features are configured via the console port using the CLI However SCP putcfg and TFTP get cfg can also change the SSH SCP configuration When SSH is enabled SCP is also enabled
431. or dynamic NAT should be given a higher numbers than any static NAT filters see Static NAT on page 191 194 m Chapter 7 Filtering Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide FTP Client NAT Alteon Web switches provide NAT services to many clients with private IP addresses In Web OS an FTP enhancement provides the capability to perform true FTP NAT for dynamic NAT Because of the way FTP works in active mode a client sends information on the control chan nel information that reveals their private IP address out to the Internet However the switch filter only performs NAT translation on the TCP IP header portion of the frame preventing a client with a private IP address from doing active FTP The switch can monitor the control channel and replace the client s private IP address with a proxy IP address defined on the switch When a client in active FTP mode sends a port com mand to a remote FTP server the switch will look into the data part of the frame and modify the port command as follows The real server client IP address will be replaced by a public proxy IP address If VMA is enabled a pool 1 8 of proxy IP addresses is used instead of a single one E The real server client port will be replaced with a proxy port j Pool of proxy IP Outbound filter addresses instead AUETA of a single proxy OEC CIES P address Public IP Address 205 178 17 12
432. ormation about the transmitting bridge and its ports including bridge and MAC addresses bridge priority port priority and path cost If the ports are tagged each port sends out a special BPDU containing the tagged information The generic action of a switch on receiving a BPDU is to compare the received BPDU to its own BPDU that it will transmit If the received BPDU is better than its own BPDU it will replace its BPDU with the received BPDU Then the Web switch adds its own bridge ID num ber and increments the path cost of the BPDU The Web switch uses this information to block any necessary ports Determining the Path for Forwarding BPDUs When determining which port to use for forwarding and which port to block Web switches use information in the BPDU including each bridge priority ID A technique based on the lowest root cost is then computed to determine the most efficient path for forwarding For more information on bridge priority port priority and port cost refer to the Web OS 10 0 Command Reference Much like least cost routing root cost assigns lower values to high bandwidth ports such as Gigabit Ethernet to encourage their use For example a 10 Mbps link has a cost of 100 a 100 Mbps Fast Ethernet link carries a cost of 19 and a 1000 Mbps or Gigabit Ethernet link has a cost of 4 The objective is to use the fastest links so that the route with the lowest cost is chosen 50 Chapter 2 VLANs Alteon Sy
433. orrect this by configuring static routes 100 Chapter 5 Secure Switch Management Alteon 2bSystems 212777 A February 2002 Web OS 10 0 Application Guide Secure Switch Management Secure switch management is needed for environments that perform significant management functions across the Internet The following are some of the functions for secured manage ment H Authentication of remote administrators Authentication is the action of determining and verifying who the administrator is it usu ally involves a name and a password The password can be either a fixed password or a challenge response query E Authorization of remote administrators Once an administrator has been authenticated authorization is the action of determining what that user is allowed to do Authorization does not merely provide yes or no answers but may also customize the service for a particular administrator E Encryption of management information exchanged between the remote administrator and the switch Examples of protocols to encrypt management information are SSH Secure Shell and SCP Secure Copy Authentication and Authorization NOTE While authentication and authorization AA protocols and servers are designed to authenticate remote dial up users in addition to authorizing remote access capabilities to users this overview is focused on using the AA model to authenticate and authorize remote administrators for managing a switch
434. ort 8 pip 200 200 200 75 Set proxy IP address for port 8 NOTE Port 9 does not require a proxy IP address with VMA enabled See the Web OS Command Reference for more information cfg slb adv matrix 3 Configure the application redirection filters Once proxy IP addresses are established configure each Application Redirection filter Filter 2 in our example with the real server TCP or UDP port to which redirected traffic will be sent In this case the requests are mapped to a different destination port 8080 You must also enable proxies on the real servers gt gt cfg slb filt 2 Select the menu for Filter 2 gt gt Filter 2 rport 8080 Set proxy redirection port gt gt Filter 2 real 1 proxy enable Enable proxy on real servers gt gt Real server 1 real 2 proxy enable Enable proxy on real servers gt gt Real server 2 real 3 proxy enable Enable proxy on real servers NOTE This configuration is not limited to HTTP Web service Other TCP IP services can be configured in a similar fashion For example if this had been a DNS redirect rport would be sent to well known port 53 or the service port you want to remap to For a list of other well known services and ports see the Web OS Command Reference 4 Apply and save your changes 5 Check server statistics to verify that traffic has been redirected based on filtering criteria gt gt info slb group lt group nu
435. ort 8 and is identified as participat ing in VLAN 3 Spanning Tree group 2 Since Web switch C has no additional ports par ticipating in Spanning Tree group 2 this BPDU is not forwarded to any additional ports and Web switch B remains the designated root Alteon Systems Chapter 2 VLANs 55 212777 A February 2002 Web OS 10 0 Application Guide Configuring Multiple Spanning Tree Groups This configuration shows how to configure the three instances of Spanning Tree groups on the Web switches A B C and D illustrated in Figure 2 5 on page 53 By default Spanning Trees 2 15 are empty and Spanning Tree Group 1 contains all configured VLANs until individual VLANs are explicitly assigned to other Spanning Tree groups You can have only one VLAN per Spanning Tree group except for Spanning Tree group 1 Configure the following on Web switch A Add port 8 to VLAN 2 and define Spanning Tree group 2 for VLAN 2 gt gt cfg vlan2 Select VLAN 2 menu gt gt VLAN 2 add 8 Add port 8 gt gt VLAN 2 stp Select STP menu gt gt Enter Spanning Tree group index 1 16 2 Select Spanning Tree Group 2 gt gt Spanning Tree Group 2 add 2 Add VLAN 2 VLAN 2 is automatically removed from Spanning Tree Group 1 Configure the following on Web switch B Add port 1 to VLAN 2 port 8 to VLAN 3 and define Spanning Tree groups 2 for VLAN 3 gt gt cfg vlan2 Select VLAN 2 menu gt gt VLAN 2 add 1
436. ost field exists the specified length of both the Host field and the URL is used to hash into the cache server The same URL request goes to the same cache server as shown below E Client 1 request http www nortelnetworks com sales index htmis directed to cache server 1 E Client 2 request http www nortelnetworks com sales index htmis directed to cache server 1 E Client 3 request http www nortelnetworks com sales index htmis directed to cache server 1 Alteon WebSystems Chapter 15 Content Intelligent Switching 407 212777 A February 2002 Web OS 10 0 Application Guide http www nortelnetworks com o Cache server farm Clients xar Internet Alteon Web Switch _ Figure 15 6 URL Hashing for WCR Example 2 Hashing on the Host Header Field Only In this example URL hashing is disabled If you use the Host header field to calculate the hash key the same URL request goes to the same cache server E Client 1 request http www nortelnetworks com is directed to cache server 1 E Client 2 request http www nortelnetworks com is directed to cache server 1 E Client 3 request http www nortelnetworks com is directed to cache server 1 Example 3 Hashing on the Source IP address In this example URL hashing is disabled Because the host header field does not exist in the HTTP header the source IP address is used as the hash key and requests from clients 1 2 and 3 are directed to three different
437. ou can effectively map multiple customers to specific gateways on a single switch The benefits of segregating customers to different default gateways are E Resource optimization E Enhanced customer segmentation E Improved service differentiation Segregating VLAN Traffic Deploy this feature in an environment where you want to segregate VLAN traffic to a config ured default gateway In Figure 2 6 VLANs 2 and 3 have different routing requirements VLAN 2 is required to route traffic through default gateway 5 and VLAN 3 is required to route traffic through default gateway 6 Router 1 VLAN 4 10 10 1 20 Gateway 5 10 10 1 20 Gateway 6 10 10 1 30 Gateway 1 10 10 4 1 VLAN 2 using Gateway 5 172 21 2 1 nortelnetworks com 192 168 20 200 Internet Router 2 yahoo com VLAN 4 200 1 2 200 40 10 1 30 if Re VLAN 3 using Gateway 6 172 21 3 1 PVE OLA 1 IF 2 10 10 4 40 Router 3 VLAN 1 10 10 4 1 Figure 2 6 Default Gateways per VLAN You can configure 246 default gateways per VLAN with values starting from 5 through 250 If default gateways per VLAN fail then traffic is directed to default gateways 1 through 4 Default gateways through 4 are used for load balancing session requests and as backup when a specific gateway that has been assigned to a VLAN is down 58 m Chapter 2 VLANs Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide In the example shown in Figure 2 6 if d
438. ould handle traffic filtering for one half of the Internet To do this you could define the following parameters Table 7 3 Filtering IP Address Ranges Filter Internet Address Range dip dmask 1 0 0 0 0 127 255 255 255 0 0 0 0 128 0 0 0 2 128 0 0 0 255 255 255 255 128 0 0 0 128 0 0 0 Cache Enabled versus Cache Disabled Filters To improve efficiency by default the Web switch performs filter processing only the first frame in each session Subsequent frames in the session are assumed to match the same criteria and are automatically treated in the same fashion as the initial frame These filters create a ses sion entry in the Web switch and are known as cache enabled Some types of filtering TCP flag and ICMP message type filtering require each frame in the session to be filtered separately These filters are known as cache disabled All filters are cache enabled by default To change the status of a filter use the following com mands gt gt cfg slb filt lt filter number gt adv Select the advanced filter menu gt gt Filter 1 Advanced cache ena dis Enable or disable filter caching NOTE Cache enabled filters should not be applied to the same ports as cache disabled filters Otherwise the cache disabled filters could potentially be bypassed for frames matching the cache enabled criteria 178 m Chapter 7 Filtering Alteon e Systems A February Web OS 10 0 Application Guide TC
439. ount of free bandwidth These weights are automatically assigned The bandwidth metric requires identical servers with identical connections NOTE The effects of the bandwidth weighting apply directly to the real servers and are not necessarily confined to the real server group When bandwidth metered real servers are also used in other real server groups that use the least conns or roundrobin metrics the bandwidth weights are applied on top of the least conns or round robin calculations for the affected real servers Since the bandwidth weight changes dynamically this can pro duce fluctuations in traffic distribution for the real server groups that use the least conns or roundrobin metrics Alteon WebSystems Chapter 6 Server Load Balancing 133 212777 A February 2002 Web OS 10 0 Application Guide Weights for Real Servers Weights can be assigned to each real server These weights bias load balancing to give the fast est real servers a larger share of connections Weight is specified as a number from 1 to 48 Each increment increases the number of connections the real server gets By default each real server is given a weight setting of 1 A setting of 10 would assign the server roughly 10 times the number of connections as a server with a weight of 1 To set weights enter the following commands gt gt cfg slb real lt real server number gt Select the real server gt gt Real server weight 10 10 times the num
440. oup Leastconns is the default 396 m Chapter 15 Content Intelligent Switching Alteon Lsystems A February Web OS 10 0 Application Guide Network Address Translation Options URL based WCR supports three types of Network Address Translation NAT No NAT Half NAT and Full NAT E NoNAT In this NAT method the traffic is redirected to the Web cache with the destination MAC address replaced by the MAC address of the cache The destination IP address remains unchanged and no modifications are made to the IP address or the MAC address of the source or origin server This works well for transparent cache servers which process traf fic destined to their MAC address but with the IP address of some other device E Half NAT In this most commonly used NAT method the destination IP address is replaced by the IP address of the Web cache and the destination MAC address is replaced by the MAC address of the Web cache Both the IP address and the MAC address of the source remain unchanged E Full NAT In this NAT method the source IP address and the source MAC address are replaced by the IP address and MAC address of the Web cache This method works well for proxy cache servers Configuring URL Based Web Cache Redirection To configure URL based Web Cache Redirection WCR perform the following steps 1 Before you can configure URL based WCR configure the switch for basic Server Load Balancing SLB with the following tasks E Assig
441. oups and add FWLB redirection filters on the primary clean side Web switch E Configure VRRP on the primary clean side Web switch and synchronize the secondary These steps are explained in detail in the following sections Alteon WebSystems Chapter 13 Firewall Load Balancing 329 212777 A February 2002 Web OS 10 0 Application Guide Configure the Routers The routers must be configured with a static route to the destination services being accessed by the external clients In this example the external clients intend to connect to services at a publicly advertised IP address on this network Since the real servers are load balanced behind a virtual server on the clean side Web switch using normal SLB settings the routers require a static route to the vir tual server IP address The next hop for this static route is the Web switch Virtual Interface Router VIR which is in the same subnet as the routers Route Added 10 10 4 100 to clean side virtual server via 195 1 1 9 Subnet 1 VIR Configure the Firewalls Before you configure the Web switches the firewalls must be properly configured For incom ing traffic each firewall must be configured with a static route to the clean side virtual server using the VIR in its clean side subnet as the next hop For outbound traffic each firewall must use the VIR in its dirty side subnet as the default gateway In this example the firewalls are configured with the following IP address
442. oxy Addresses for NAT on page 213 For this example the three Web cache real servers have the following IP addresses on the same IP subnet Table 8 1 Web Cache Example Real Server IP Addresses Web Cache Server IP address Server A 200 200 200 2 Server B 200 200 200 3 Server C 200 200 200 4 206 Chapter 8 Application Redirection Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide 2 Install transparent Web cache software on all three Web cache servers 3 Define an IP interface on the Web switch Since by default the Web switch only remaps destination MAC addresses it must have an IP interface on the same subnet as the three Web cache servers To configure an IP interface for this example enter this command from the CLI gt gt cfg ip if 1 Select IP interface 1 gt gt IP Interface 1 addr 200 200 200 100 Assign IP address for the interface gt gt IP Interface 1 ena Enable IP interface 1 NOTE The IP interface and the real servers must be in the same subnet This example assumes that all ports and IP interfaces use default VLAN 1 requiring no special VLAN con figuration for the ports or IP interface 4 Define each real server on the switch For each Web cache real server you must assign a real server number specify its actual IP address and enable the real server For example gt gt ip cfg slb real 1 Server A is real server
443. oxy IP addresses for all other switch ports except port 9 Virtual Matrix Architecture VMA is normally enabled on the Web switch In addition to enhanced resource management this feature eliminates many of the restrictions found in ear lier versions of the Web OS It does require however that when any switch port is configured with an IP proxy address all ports must be configured with IP proxy addresses Otherwise if VMA is disabled only the client port with filters need proxy IP addresses and this step can be skipped Alteon WebSystems Chapter 8 Application Redirection m 213 212777 A February 2002 Web OS 10 0 Application Guide The following commands can be used to configure the additional unique proxy IP addresses gt gt SLB port 6 port 1 Select network port 1 gt gt SLB port 1 pip 200 200 200 70 Set proxy IP address for port 1 gt gt SLB port 1 port 2 Select network port 2 gt gt SLB port 2 pip 200 200 200 71 Set proxy IP address for port 2 gt gt SLB port 2 port 3 Select network port 3 gt gt SLB port 3 pip 200 200 200 72 Set proxy IP address for port 3 gt gt SLB port 3 port 4 Select network port 4 gt gt SLB port 4 pip 200 200 200 73 Set proxy IP address for port 4 gt gt SLB port 4 port 7 Select network port 7 gt gt SLB port 7 pip 200 200 200 74 Set proxy IP address for port 7 gt gt SLB port 7 port 8 Select network port 8 gt gt SLB p
444. p route gt gt add 10 0 0 10 255 255 255 255 20 0 0 101 2 gt gt add 10 0 0 11 255 255 255 255 20 0 0 102 3 gt gt add 10 0 0 20 255 255 255 255 20 0 0 101 2 gt gt add 10 0 0 21 255 255 255 255 20 0 0 102 3 360 Chapter 14 Virtual Private Network Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide 6 Configure Virtual Router Redundancy Protocol VRRP for virtual routers 1 and 2 gt gt cfg vrrp on gt gt Virtual Router Redundancy Protocol vr 1 gt gt VRRP Virtual Router 1 ena gt gt VRRP Virtual Router 1 vrid 1 addr 20 0 0 1 share dis track ports ena gt gt VRRP Virtual Router gt gt VRRP Virtual Router gt gt VRRP Virtual Router gt gt VRRP Virtual Router 1 if 1 gt gt VRRP Virtual Router 1 addr 30 0 0 50 gt gt VRRP Virtual Router 1 share dis gt gt VRRP Virtual Router 1 track vrs ena gt gt VRRP Virtual Router 1 Priority Tracking cfg vrrp vr 2 gt gt VRRP Virtual Router 2 ena gt gt VRRP Virtual Router 2 vrid 2 gt gt VRRP Virtual Router 2 if 2 2 2 2 7 Enable SLB gt gt VRRP Virtual Router 2 Priority Tracking cfg slb on 8 Configure real servers for health checking VPN devices gt gt Layer 4 cfg slb real 1 ena rip 10 0 0 10 gt gt Real server 1 real 2 ena rip 10 0 0 11 gt gt Real server 2 real 3 ena rip 10 0 0 20 gt gt Real server 3 real 4 e
445. packets will be seen by more than one switch such as instances where a hub is used to connect the switches In this configuration when both switches are healthy only the master responds to packets sent to the virtual server IP address Server 1 RIP 1 205 178 13 101 RIP 2 205 178 13 105 Master Active RID 2 VIP 205 178 13 226 MAC address 00 00 5E 00 01 02 Router Server 2 RIP 1 205 178 13 102 RIP 2 205 178 13 106 Internet itch Dane Server 3 i hee RIP 1 205 178 13 103 all RIP 2 205 178 13 107 Router Backup Standby VRID 2 VIP 205 178 13 226 m MAC address 00 00 5E 00 01 02 Server 4 RIP 1 205 178 13 104 RIP 2 205 178 13 108 Figure 11 8 Active Standby High Availability Configuration Although this example shows only two switches there is no limit on the number of switches used in a redundant configuration It is possible to implement an active standby configuration across all the VRRP capable switches in a LAN Each VRRP capable switch in an active standby configuration is autonomous Switches in a virtual router need not be identically configured Alteon WebSystems Chapter 11 High Availability m 263 212777 A February 2002 Web OS 10 0 Application Guide To implement the active standby example perform the following switch configuration 1 Configure the appropriate Layer 2 and Layer 3 parameters on both switches This includes any required VLANs IP interfaces default gateways and so on
446. page 176 O OF O O 0 0 0 O O IP Address Ranges on page 178 O Cache Enabled versus Cache Disabled Filters on page 178 E TCP Rate Limiting on page 179 This section explains how TCP rate limiting allows you to monitor the number of new TCP connections within a configurable time window E Tunable Hash for Filter Redirection on page 184 allows you to select any hash parame ter for filter redirection E Filter based Security on page 185 This section provides an example of configuring fil ters for providing the best security m Network Address Translation on page 191 This section provides two examples Internal client access to the Internet and external client access to the server E Matching TCP Flags on page 197 and Matching ICMP Message Types on page 201 Describes the ACK filter criteria which provides greater filtering flexibility and lists ICMP message types that can be filtered respectively Alteon Z Systems 169 212777 A February 2002 Web OS 10 0 Application Guide Overview Alteon Web switches are used to deliver content efficiently and secure your servers from unau thorized intrusion probing and Denial of Service DoS attacks Web OS includes extensive filtering capabilities at the IP and TCP UDP levels Filtering Benefits Layer 3 IP and Layer 4 application filtering give the network administrator a powerful tool with the following benefits E Increased securit
447. pam The options are nearly endless Alteon Z Systems 212777 A February 2002 Chapter 7 Filtering m 171 Web OS 10 0 Application Guide Stacking Filters Stacking filters are assigned and enabled on a per port basis Each filter can be used by itself or in combination with any other filter on any given switch port The filters are numbered 1 through 2048 on Alteon 184 and Alteon AD4 Web switches and though 224 on other Alteon Web switches When multiple filters are stacked together on a port the filter s number deter mines its order of precedence the filter with the lowest number is checked first When traffic is encountered at the switch port if the filter matches its configured action takes place and the rest of the filters are ignored If the filter criteria doesn t match the next filter is tried As long as the filters do not overlap you can improve filter performance by making sure that the most heavily utilized filters are applied first For example consider a filter system where the Internet is divided according to destination IP address Filtering by Destination IP Address Ranges 0 0 0 0 Be 255 255 255 255 Deny Allow Deny Redirect Filter 2 Filter 4 Filter 3 Filter 1 Figure 7 1 Assigning Filters According to Range of Coverage Assuming that traffic is distributed evenly across the Internet the largest area would be the most utilized and is assigned to
448. pass between these devices and the Internet Wireless devices include cellular phones pagers Personal Digital Assistants PDAs and other hand held devices WAP supports most wireless networks and is supported by all operating systems with the goal of inter operability A WAP Gateway translates Wireless Markup Language WML which is a WAP version of HTML into HTML HTTP so that requests for information can be serviced by traditional Web servers To load balance WAP traffic among available parallel servers the switch must provide persis tency so that the clients can always go to the same WAP gateway to perform WAP operation Web OS allows the Web switch to decide which real gateway the request should go WAP SLB is based on RADIUS static session entry or RADIUS snooping The following topics are discussed in this section Using RADIUS Static Session Entries Using RADIUS Snooping Preconfiguring WAP Server Load Balancing Enabling Wireless Application Protocol SLB Configuring RADIUS Snooping Using RADIUS Static Session Entries RADIUS is a client server protocol and software that enables remote access servers to commu nicate with a central server to authenticate dial in users and authorize their access to the requested network or service RADIUS allows a company to maintain user profiles in a central database that all remote servers can share It provides better security allowing a company to set up a policy that can be applied a
449. ply delete the 0 and put in a 1 Be sure to do this for all the IP interfaces otherwise you will have duplicate IP addresses in the network 2 Change the virtual router priorities Virtual routers 1 4 need to have their priority set to 100 from 101 and virtual routers 5 7 need to have their priorities set to 101 from 100 You can find this in line cfg vrrp vr 1 vrid 1 if 1 prio 101 Alteon Z Systems Chapter 11 High Availability m 273 212777 A February 2002 Web OS 10 0 Application Guide 3 Scroll to the bottom of the text file and delete anything past Script End 4 Save the changes to the text file as Customer Name Switch 2 Move your serial cable to the console port on the second switch Any configuration on it needs to be deleted by resetting it to factory settings using the following command gt gt Main boot conf factory reset You can tell if the switch is at factory default when you log on because the switch will prompt you if you want to use the step by step configuration process When it does respond No 5 In HyperTerminal go to transfer send text file and send the Switch 2 text file The configu ration will dump into the switch Simply type apply then save When you can type charac ters in the terminal session again reboot the switch boot reset 274 m Chapter 11 High Availability Alteon e systems A February Web OS 10 0 Application Guide VRRP Based
450. ppearance and advantages of a dedicated link but it occurs over a shared network Using a technique called tunneling data packets are transmitted across a routed network such as the Internet in a private tunnel that simulates a point to point connection This approach enables network traffic from many sources to travel via separate tunnels across the infrastructure It also enables traffic from many sources to be differentiated so that it can be directed to specific destinations and receive specific levels of service VPNs provide security features of a firewall network address translation data encryption and authentication and authorization Since most of the data sent between VPN initiators and ter minators is encrypted network devices cannot use information inside the packet to make intel ligent routing decisions How VPN Load Balancing Works VPN load balancing requires that all ingress traffic passing through a particular VPN must traverse the same VPN as it egresses back to the client Traffic ingressing from the Internet is usually addressed to the VPNs with the real destination encrypted inside the datagram Traffic egressing the VPNs into the intranet contains the real destination in the clear Using the hash algorithm on the source and destination address may not be possible in many VPN firewall configurations because the address may be encrypted inside the datagram Also the source destination IP address of the packet may change
451. pplication Guide NOTE There can be a maximum number of four simultaneous Telnet SSH SCP connections at one time The cfg sys radius telnet command also applies to SSH SCP connec tions Encryption of Management Messages The supported encryption and authentication methods for both SSH and SCP are listed below Server Host Authentication Client RSA authenticates the switch at the beginning of every connection Key Exchange RSA Encryption 3DES CBC DES User Authentication Local password authentication RADIUS SecurID via RADIUS for SSH only does not apply to SCP SCP Services Administrator privileges are required to perform SCP commands Set the SCP admin password this password must be different from the admin password The following SCP commands are supported in this service These commands are entered using the CLI on the client that is running the SCP application E getcfg is used to download the switch s configuration to the remote host via SCP E putcfgis used to upload the switch s configuration from a remote host to the switch the diff command will be automatically executed at the end of put cfg to notify the remote client of the difference between the new and the current configurations putcfg_apply will run the apply command after the putcfg is done putcfg_apply_save saves the new configuration to the flash after put cfg_apply is done The putcfg_apply and putcfg_apply_save commands are provided
452. processor intensive than looking at a known location in a session for a specific number of bytes E To parse a content request the Web switch must temporarily terminate the TCP connec tion from the client This temporary termination is called a delayed binding While the connection is suspended the Web switch acknowledges the client connection on behalf of the server buffers and examines the client request and finally opens a connection to an appropriate server based on the requested content For more information on delayed binding see Delayed Binding on page 146 E Delayed binding causes two independent TCP connections to span a Web session one from the client to the Web switch and the second from the Web switch to the selected server The Web switch must modify the TCP header including performing TCP sequence number translation and recalculating checksums on every packet that travels between the client and the server for the duration of the session This function known as TCP connec tion splicing heavily tasks a Web switch particularly when the switch must process thou sands of these sessions simultaneously E In addition to real time traffic and connection processing a content intelligent Web switch must monitor servers to ensure that requests are forwarded to the best performing and healthiest servers This monitoring involves more than simple ICMP or TCP connection tests as servers can continue to process network protocols
453. ptive name for the filter gt gt Filter 224 ena Enable the default filter gt gt Filter 224 adv log enable Log matching traffic to syslog NOTE Because the proto parameter is not tcp or udp the source port sport and desti nation port dport values are ignored and may be excluded from the filter configuration 186 m Chapter 7 Filtering Alteon e Systems A February Web OS 10 0 Application Guide 3 Create a filter that will allow external HTTP requests to reach the Web server The filter must recognize and allow TCP traffic with the Web server s destination IP address and HTTP destination port gt gt oo gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt Fil Fil Fil Fil Fil Fil Fil Fil Fil Fil ter 224 filt 1 ter 1 sip any ter 1 dip 205 177 15 2 ter 1 dmask 255 255 255 255 ter 1 proto tcp ter 1 sport any ter 1 dport http ter 1 action allow ter 1 name allow matching traffic ter 1 ena Select the menu for filter 1 From any source IP address To Web server dest IP address Set mask for exact dest address For TCP protocol traffic From any source port To an HTTP destination port Allow matching traffic to pass Provide a descriptive name for the filter Enable the filter 4 Create a pair of filters to allow incoming and outgoing mail to and from the mail server Filter 2
454. r retry 6 If 6 consecutive health checks fail declare real server down NOTE Health checks are performed sequentially when used in conjunction with a virtual server configured with multiple services and groups As a result the actual health check inter val could vary significantly from the value set for it using the inter parameter Alteon WebSystems Chapter 10 Health Checking m 221 212777 A February 2002 Web OS 10 0 Application Guide DSR Health Checks Direct Server Return DSR health checks are used to verify the existence of a server provided service where the server replies directly back to the client without responding through the vir tual server IP address In this configuration the server will be configured with a real server IP address and virtual server IP address The virtual server IP address is configured to be the same address as the user s virtual server IP address When DSR health checks are selected the spec ified health check is sent originating from one of the switch s configured IP interfaces and is destined to the virtual server IP address with the MAC address that was acquired from the real server IP address s Address Resolution Protocol ARP entry Web OS 10 0 allows you to perform health checks for DSR configurations For more informa tion see Using Direct Server Return on page 142 The switch is able to verify that the server correctly responds to requests made to the virtu
455. r 5 Secure Switch Management 103 212777 A February 2002 Web OS 10 0 Application Guide RADIUS Authentication Features in Web OS The following Radius Authentication features are supported in Web OS Supports RADIUS client on the switch based on the protocol definitions in RFC 2138 and 2866 Enables disables support of RADIUS authentication and authorization The default disables the use of RADIUS for authentication and authorization Allows RADIUS secret password up to 32 bytes and less than 16 octets Supports secondary authentication server so that when the primary authentication server is unreachable the switch can send client authentication requests to the secondary authen tication server Use the cfg sys radius cur command to show the currently active RADIUS authentication server Supports user configurable RADIUS server retry and time out values The parameters are O Time out value 1 10 seconds O Retries 1 3 The switch will time out if it does not receive a response from the RADIUS server in 1 3 retries The switch will also automatically retry connecting to the RADIUS server before it declares the server down Supports user configurable RADIUS application port The default is 1645 UDP based on RFC 2138 Port 1812 is also supported Allows network administrator to define privileges for one or more specific users to access the switch at the RADIUS user database SecurID is supported if the RADIUS server can
456. r group number gt Select real server group gt gt Real server group backup r4 Assign real server 4 as backup Real server groups can also use another real server group for backup overflow gt gt cfg slb group lt real server group number gt Select real server group gt gt Real server group backup g2 Assign real server group 2 as backup Alteon WebSystems Chapter 6 Server Load Balancing 135 212777 A February 2002 Web OS 10 0 Application Guide Extending SLB Topologies For standard SLB all client to server requests to a particular virtual server and all related server to client responses must pass through the same Web switch In complex network topol ogies routers and other devices can create alternate paths around the Web switch managing SLB functions see Figure 6 4 on page 122 Under such conditions the Web switch with Web OS provides the following solutions E Proxy IP Addresses E Mapping Ports E Direct Server Interaction a Delayed Binding Proxy IP Addresses In complex network topologies see Figure 6 4 on page 122 SLB functions can be managed using a proxy IP address on the client switch ports When the client requests services from the switch s virtual server the client sends its own IP address for use as a return address If a proxy IP address is configured for the client port on the switch the switch replaces the client s source IP address with the switch s own pro
457. r load balancing 3 Assign the url string to the real server gt gt cfg slb real 1 Select the real server gt gt Real Server 1 Layer 7 gt gt Real Server 1 Layer 7 Commands addlb lt ID gt Add the URL string ID for RTSP cache redirection where JD is the identification number of the defined string 4 Apply and save the configuration gt gt Real Server 1 Layer 7 Commands apply gt gt Real Server 1 Layer 7 Commands save Alteon WebSystems Chapter 15 Content Intelligent Switching 409 212777 A February 2002 Web OS 10 0 Application Guide Exclusionary String Matching for Real Servers URL based SLB and WCR can match or exclude up to 128 strings Examples of strings are as follows E product matches URLs that starts with product E product matches URLs that have the string product anywhere in the URL You can assign one or more strings to each real server When more than one URL string is assigned to a real server requests matching any string are redirected to that real server There is also a special string known as any that matches all content Web OS also supports exclusionary string matching Using this option you can define a server to accept any requests regardless of the URL except requests with a specific string NOTE Once exclusionary string matching is enabled clients cannot access the URL strings that are added t
458. re the local California site to recognize the services offered at the remote Denver site To do this configure one real server entry on the California switch for each virtual server located at each remote site Since there is only one remote site Denver with only one virtual server only one more local real server entry is needed at the California site The new real server entry is configured with the IP address of the remote virtual server rather than the usual IP address of a local physical server Do not confuse this value with the IP inter face address on the remote switch Also the remote parameter is enabled and the real server entry is added to the real server group under the local virtual server for the intended service Finally since the real server health checks are performed across the Internet the health checking interval should be increased to 30 or 60 seconds to avoid generating excess traffic For example gt gt Remote site 1 cfg slb real 3 Create an entry for real server 3 gt gt Real server 3 rip 174 14 70 1 Set remote virtual server IP address gt gt Real server 3 remote enable Define the real server as remote gt gt Real server 3 inter 60 Set a high health check interval gt gt Real server 3 ena Enable the real server entry gt gt Real server 3 group 1 Select appropriate real server group gt gt Real server group 1 add 3 Add real server 3 to the group 1 NOTE
459. re to use the proper port designation with rport if the transparent proxy operation resides on the host the well known port 80 or http is probably required If the transparent proxy occurs on the Web switch make sure to use the service port required by the specific software package See IP Proxy Addresses for NAT on page 213 for more about IP proxy addresses 208 Chapter 8 Application Redirection Alteon WebSystems 212777 A February 2002 9 Create a default filter Web OS 10 0 Application Guide In this case the default filter will allow all noncached traffic to proceed normally oe gt gt gt gt gt gt oo gt gt Filter Filter Filter Filter Filter Filter 2 filt 224 224 sip any 224 dip any 224 proto any 224 action allow 224 ena Select the default filter From any source IP addresses To any destination IP addresses For any protocols Set the action to allow traffic Enable the default filter NOTE When the proto parameter is not tcp or udp then sport and dport are ignored 10 Assign the filters to the client ports Assuming that the redirected clients are connected to physical switch Ports 5 and 6 both ports are configured to use the previously created filters as follows gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt gt Filter 224 port 5 SLB Port 5 add 2 SLB Port 5 add 224 SLB Port 5 filt
460. rease real server support to 1024 No Yes SYN Attack Detection Protection Yes Yes Enhanced Port Mirroring Yes Yes Reporting Classification Manager SYSLOG and No Yes SNMP Reporting Classification Manager Ability to fil No Yes ter SYSLOG based on severity Reporting Classification Manager SNMP traps No Yes defined for VRRP state changes Reporting Classification Manager SNMP traps No Yes defined for failed login Selectable Hash Parameters Yes Yes Layer 4 DNS Load Balancing UDP and TCP Yes Yes ports L7 DNS Load Balancing Yes Yes Enhanced DNS Health Check Yes Yes TCP Rate Limiting Yes Yes Alteon Systems 19 212777 A February 2002 Web OS 10 0 Application Guide Feature Alteon Web Switches Alteon Web Switches AD3 180e AD4 184 Hash on any HTTP header Yes Yes Increase support of 16 rport to vport No Yes Increased number of scripted health check to 16 No Yes Descriptive names for filters Yes Yes OSPF No Yes LDAP health check Yes Yes Streaming Cache Redirection Yes Yes L7 Parsing of RTSP SLB Yes Yes ARP health check Yes Yes Telnet client Yes Yes Increase logging buffer Yes Yes Support of OPER command on Web OS BBI and No Yes SNMP Enhanced Web OS Browser based Interface No Yes support Configurable prompt name Yes Yes Bandwidth management No Yes 20 m New Features Alteon WebSystems 212777 A February 2002 Preface This Application Guide describes
461. red to load balance a real service Traffic sent directly to real server IP addresses is excluded from load balancing decisions The same clients may also communicate to the virtual server IP address for load balanced requests NOTE When DAM is enabled on a switch port mapping and default gateway load balancing is supported only when filtering is enabled a proxy IP address is configured or URL parsing is enabled on any switch port Assigning Multiple IP Addresses One way to provide both SLB access and direct access to a real server is to assign multiple IP addresses to the real server For example one IP address could be established exclusively for SLB and another could be used for direct access needs Alteon WebSystems Chapter 6 Server Load Balancing 143 212777 A February 2002 Web OS 10 0 Application Guide Using Proxy IP Addresses Proxy IP addresses are used primarily to eliminate SLB topology restrictions in complex net works see Proxy IP Addresses on page 136 Proxy IP addresses can also provide direct access to real servers If the switch port to the client is configured with a proxy IP address the client can access each real server directly using the real server s IP address The switch port must be connected to the real server and client processing must be disabled see the server and client options under the cfg slb port command in your Web OS Command Reference SLB is still accessed using the vir
462. ree real servers into one service group gt gt Real server 8 cfg slb group 1 Select real server group 1 gt gt Real server group 1 add 1 Add real server I to group 1 gt gt Real server group 1 add 2 Add real server 2 to group 1 Repeat this sequence of commands for the following real server groups E Group 2 Add RIP 3 and 4 E Group 3 Add RIP 5 and 6 E Group 4 Add RIP 7 and 8 Alteon Z Systems Chapter 11 High Availability m 269 212777 A February 2002 Web OS 10 0 Application Guide 3 Define the virtual servers After defining the virtual server IP addresses and associating them with a real server group number you must tell the switch which IP ports services sockets you want to load balance on each VIP You can specify the service by either the port number service name or socket num ber gt gt Real server group 4 cfg slb virt 1 Select virtual server 1 gt gt Virtual server 1 vip 200 200 200 100 Assign a virtual server IP address gt gt Virtual Server 1 service 80 Assign HTTP service port 80 gt gt Virtual server 1 http Service group 1 Associate virtual port to real group gt gt Virtual server 1 ena Enable the virtual server Repeat this sequence of commands for the following virtual servers E VIP 2 200 200 200 101 will load balance HTTPS Port 443 to Group 2 E VIP 3 200 200 200 102 will load balance POP SMTP Ports 110 25 to Group 3 E VIP 4 200
463. request it binds the session to the IP address of the best available real server and remaps the fields in each frame from virtual addresses to real addresses IP FTP RTSP IDS and static session WAP are examples of some of the services that use virtual servers for load balancing E Filtered based load balancing A filter allows you to control the types of traffic permitted through the switch Filters are configured to allow deny or redirect traffic according to the IP address protocol or Layer 4 port criteria In filtered based load balancing a filter is used to redirect traffic to a real server group If the group is configured with more than one real server entry redirected traffic is load balanced among the available real servers in the group Firewalls WAP with RADIUS snooping IDS and WAN links use redirection filters to load balance traffic E Content based load balancing Content based load balancing uses Layer 7 application data such as URL cookies and Host Headers to make intelligent load balancing decisions URL based load balancing browser smart load balancing and cookie based preferential load balancing are a few examples of content based load balancing 120 m Chapter 6 Server Load Balancing Alteon e systems A February Web OS 10 0 Application Guide Implementing Basic Server Load Balancing Consider a situation where customer Web sites are being hosted by a popular Web hosting company and or Internet
464. requested as the components that make up Internet data at a particular Web site pictures buttons frames text and so on are reloaded from page to page When you consider this scenario in the context of many clients it becomes apparent that redundant requests can consume a considerable amount of your available bandwidth to the Internet Application redirection can help reduce the traffic congestion during peak loads When Appli cation redirection filters are properly configured for the Web OS powered switch outbound client requests for Internet data are intercepted and redirected to a group of application or Web cache servers on your network The servers duplicate and store inbound Internet data that has been requested by your clients If the servers recognize a client s outbound request as one that can be filled with cached information the servers supply the information rather than send the request across the Internet In addition to increasing the efficiency of your network accessing locally cached information can be much faster than requesting the same information across the Internet Web Cache Redirection Environment Consider a network where client HTTP requests begin to regularly overload the Internet router Router Internet Clients f Tw Congestion _ Targets Router Figure 8 1 Traditional Network Without Web Cache Redirection 204 Chapter 8 Application Redirection Alteon WebSystems 212777 A February 2002
465. restoring the private network addresses on inbound packets Alteon Z Systems Chapter 7 Filtering 193 212777 A February 2002 Web OS 10 0 Application Guide Configuring Dynamic NAT gt gt Filter 1 gt gt Filter 1 gt gt Filter 1 gt gt Filter 1 gt gt Filter 1 gt gt Filter 1 gt gt Filter 1 gt gt Filter 1 gt gt Filter LB port L gt gt S gt gt SLB port 1 gt gt SLB port 1 gt gt SLB port 1 gt gt SLB port 1 gt gt SLB port 1 gt gt cfg slb filt 14 invert ena dip 10 10 10 0 dmask 255 255 255 0 sip any action nat nat source ena adv proxy enable Advanced cfg slb port 1 add 14 pip 205 178 17 12 filt enable proxy ena apply save Se F OSE OSE HE Select the menu for client filter Invert the filter logic If the destination is not private For the entire private subnet range From any source IP address Perform NAT on matching traffic Translate source information Enable the filter Allow PIP proxy translation Select SLB port 1 Add the filter to port 1 Set public IP address proxy Enable filtering on port 1 Enable proxies on this port Apply configuration changes Save configuration changes NOTE The invert option in this example filter makes this specific configuration easier but is not a requirement for dynamic NAT NOTE Dynamic NAT solutions apply only to TCP UDP traffic Also filters f
466. rface 1 aindex 0 gt gt OSPF Interface 1 enable 1 if 1 Select OSPF menu for IP interface 1 Attach network to backbone index Enable the backbone interface 11 Attach the network interface to the stub area gt gt OSPF Interface 1 gt gt OSPF Interface 2 aindex 1 gt gt OSPF Interface 2 enable if 2 Select OSPF menu for IP interface 2 Attach network to stub area index Enable the stub area interface 12 Configure host routes One host route is needed for each virtual server on Web switch 1 Since virtual server 10 10 10 1 is preferred for Web switch 1 its host route has a low cost Because virtual server 10 10 10 2 is used as a backup in case Web switch 2 fails its host route has a high cost gt gt OSPF Host Entry gt gt OSPF Host Entry gt gt OSPF Host Entry gt gt OSPF Host Entry gt gt OSPF Host Entry gt gt OSPF Host Entry gt gt OSPF Host Entry gt gt OSPF Host Entry gt gt OSPF Host Entry gt gt OSPF Interface 2 NNNNPRPRP RB host 1 addr 10 10 10 1 aindex 0 cost 1 enable host 2 addr 10 10 10 2 aindex 0 cost 100 enable Select menu for host route 1 Set IP address same as virtual server 1 Inject host route into backbone area Set low cost for preferred path Enable the host route Select menu for host route 2 Set IP address same as virtual server 2 Inject host route into backbone
467. rity Web OS supports a tracking function that dynamically modifies the priority of a VRRP router based on its current state The objective of tracking is to have whenever possible the master bidding processes for various virtual routers in a LAN converge on the same switch Tracking ensures that the selected switch is the one that offers optimal network performance For track ing to have any effect on virtual router operation preemption must be enabled NOTE Tracking only affects hot standby and active standby configurations It does not have any effect on active active sharing configurations Web OS can track the attributes listed in Table 11 3 Table 11 3 VRRP Tracking Parameters Parameter Description Number of virtual routers in master mode Useful for ensuring that traffic for any particular cli on the switch ent server pair is handled by the same switch increasing cfg vrrp track vrs routing and load balancing efficiency This parameter influences the VRRP router s priority in both virtual inter face routers and virtual server routers Number of IP interfaces active on the Helps elect the virtual routers with the most available switch routes as the master An IP interface is considered active cfg vrrp track ifs when there is at least one active port on the same VLAN This parameter influences the VRRP router s priority in both virtual interface routers and virtual server routers Number of activ
468. rport 8004 Map to real port 8004 NOTE If filtering is enabled a proxy IP address is configured or URL parsing is enabled on any switch port then port mapping is supported with Direct Access Mode DAM For infor mation about DAM refer to Using Direct Access Mode on page 143 Mapping a Single Virtual Server Port to Multiple Real Server Ports To take advantage of multi CPU or multi process servers Web OS can be configured to map a single virtual port to multiple real ports This capability allows the Web site managers for example to differentiate users of a service by using multiple service ports to process client requests An Alteon Web switch supports up to 16 real ports per server when multiple rports are enabled This feature allows the network administrator to configure up to 16 real ports for a single service port This feature is supported in Layer 4 and Layer 7 and in cookie based and SSL persistence switching environments When multiple real ports on each real server are mapped to a virtual port the Web switch treats the real server IP address port mapping combination as a distinct real server NOTE For each real server you can only configure one service with multiple real ports Alteon 2bSystems Chapter 6 Server Load Balancing 139 212777 A February 2002 Web OS 10 0 Application Guide Consider the following network Web Clients Real Servers 192 168 2 1 7 8001 8002 Web Swit
469. rsistence NOTE Other load balancing metrics such as leastconns roundrobin minmiss response and bandwidth can be used when enabling the Return to Sender RTS option For more information see Free Metric FWLB on page 346 338 m Chapter 13 Firewall Load Balancing Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide 2 Create the FWLB filters Three filters are required on the port attaching to the routers E Filter 10 prevents local traffic from being redirected E Filter 20 prevents VRRP traffic and other multicast traffic on the reserved 224 0 0 0 24 network from being redirected E Filter 224 redirects the remaining traffic to the firewall group gt gt cfg slb filt 10 gt gt dip 195 1 1 0 gt gt dmask 255 255 255 0 gt gt ena gt gt ilt 20 gt gt dip 224 0 0 0 gt gt dmask 255 255 255 0 gt gt ena gt gt ilt 224 gt gt action redir gt gt group 1 gt gt ena gt gt port 1 gt gt filt ena gt gt add 10 gt gt add 20 gt gt add 224 Alteon WebSystems Chapter 13 Firewall Load Balancing 339 212777 A February 2002 Web OS 10 0 Application Guide 3 Configure VRRP on the primary dirty side Web switch VRRP in this example requires two virtual routers one for the subnet attached to the routers and one for the subnet attached to the firewalls gt gt gt gt gt gt gt gt gt gt gt
470. rt 1 service 80 pbind cookie passive sid 1 8 dis 434 m Chapter 16 Persistence Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide Example 4 Using Rewrite Cookie Mode M Rewrite server cookie with the encrypted real server IP address In cookie rewrite mode if the cookie length parameter is configured to be eight bytes the switch will rewrite the placeholder cookie value with the encrypted real server IP address gt gt cfg slb virt 1 service 80 pbind cookie rewrite sid 1 8 dis If the server is configured to include a placeholder cookie such as follows Set Cookie sid alteonpersistence then the Web switch will rewrite the first eight bytes of the cookie to include the server s encrypted IP address Set Cookie sid cdb20f04rsistence All subsequent traffic from a specific client with this cookie will be directed to the same real server M Rewrite server cookie with the encrypted real server IP address and virtual server IP address If the cookie length is configured to be 16 bytes the switch will rewrite the cookie value with the encrypted real server IP address and virtual server IP address gt gt cfg slb virt 1 service 80 pbind cookie rewrite sid 1 16 dis If the server is configured to include a placeholder cookie as follows Set Cookie sid alteonwebcookies then the Web switch will rewrite the first 16 bytes of the cookie to include th
471. rt topology With VRRP and active active failover this is optional Each switch can be configured individually with different port topology SLB and filters If you would rather force two active active switches to use identical settings you can synchronize their con figuration using the following command oper slb synch The sync command copies the following settings to the switch at the specified IP interface address E VRRP settings E SLB settings including port settings E Filter settings including filter port settings E Proxy IP settings If you perform the sync command you should check the configuration on the target switch to ensure that the settings are correct For more information on synchronizing configurations between two switches see Synchro nizing Configurations on page 282 Alteon WebSystems Chapter 11 High Availability m 277 212777 A February 2002 Web OS 10 0 Application Guide Eliminating Loops with STP and VLANs VRRP active active failover is significantly different from the hot standby failover method supported in previous releases As shown in Figure 11 11 active active configurations can introduce loops into complex LAN topologies Server Web Switch Router Bridging Loop Internet Router Web Switch Server Figure 11 11 Loops in Active Active Configuration 278 m Chapter 11 High Availability Alteon WebSystems 212777 A February 2002 Web OS 10 0 Applica
472. ruary 2002 Web OS 10 0 Application Guide In this network the Web servers inside the LAN must be able to transfer mail to any SMTP based mail server out on the Internet At the same time you want to prevent access to the LAN from the Internet except for HTTP SMTP traffic uses well known TCP Port 25 The Web servers will originate TCP sessions to the SMTP server using TCP destination Port 25 and the SMTP server will acknowledge each TCP session and data transfer using TCP source Port 25 Creating a filter with the ACK flag closes one potential security hole Without the filter the switch would permit a TCP SYN connection request to reach any listening TCP destination port on the Web servers inside the LAN as long as it originated from TCP source Port 25 The server would listen to the TCP SYN allocate buffer space for the connection and reply to the connect request In some SYN attack scenarios this could cause the server s buffer space to fill crashing the server or at least making it unavailable A filter with the ACK flag enabled prevents external devices from beginning a TCP connection with a TCP SYN from TCP source Port 25 The switch drops any frames that have the ACK flag turned off The following filters are required 1 A filter that allows the Web servers to pass SMTP requests to the Internet gt gt cfg slb filt 10 Select a filter for trusted SMTP requests gt gt Filter 10 sip 203 1
473. ruary 2002 Web OS 10 0 Application Guide Using RADIUS Snooping Radius snooping allows the Alteon Web switch to examine RADIUS accounting packets for client information This information is needed to add to or delete static session entries to the session table of the switch so that it can perform the required persistency for load balancing A static session entry does not age out Such an entry added using RADIUS Snooping will only be deleted using RADIUS Snooping The switch load balances both the RADIUS and WAP gateway traffic using the same virtual server IP address How WAP SLB Works Using RADIUS Snooping Before the RAS allows the WAP traffic for a user to pass in and out of the gateway it sends a RADIUS Accounting Start message to one of the RADIUS Servers The switch then snoops on the packet to extract the information it needs It needs to know the type of the RADIUS Accounting message the client IP address the caller ID and the user s name If it finds this information the switch adds a session entry to its session table If any of this infor mation is missing the switch will not take any action to handle the session entry When the client ends the WAP connection RAS sends RADIUS Accounting Stop packet If the switch finds the needed information ina RADIUS Accounting Stop packet it removes the corresponding session entry from its table The following steps occur for RADIUS snooping 1 The user is authenticated on dialing
474. rver For example requests made from a client to http www nortelnetworks com products from different clients may get sent to different caches Virtual Server IP Address 205 178 13 243 Client s browser is configured to send Web requests to the origin server via the virtual server Non Transparent Cache Farm Figure 15 3 Balancing Nontransparent Caches Configuring URL Hashing You can direct the same URL request to the same cache or proxy server by using a virtual server IP address to load balance proxy requests By configuring hash or minmisses as the metric the switch uses the number of bytes in the URI to calculate the hash key If the host field exists and the switch is configured to look into the Host header the switch uses the Host header field to calculate the hash key Alteon WebSystems Chapter 15 Content Intelligent Switching 387 212777 A February 2002 Web OS 10 0 Application Guide To configure URL hashing perform the following procedure 1 Before you can configure URL hashing ensure that the switch has already been config ured for basic SLB with the following tasks Assign an IP address to each of the real servers in the server pool Define an IP interface on the switch Define each real server Assign servers to real server groups Define virtual servers and services Configure load balancing algorithm for hash or minmiss Enable SLB For information on how to configure your network
475. rver 2 Silver handles silver request E Real Server 3 Bronze handles bronze request E Real Server 4 any handles any request that does not have a cookie or matching cookie With servers defined to handle the requests listed above here is what happens M Request 1 comes in with no cookie it is forwarded to Real Server 4 to get cookie assigned Request 2 comes in with Gold cookie it will be forwarded to Real Server 1 Request 3 comes in with Silver cookie it will be forwarded to Real Server 2 Request 4 comes in with Bronze cookie it will be forwarded to Real Server 3 Request 5 comes in with Titanium cookie it will be forwarded to Real Server 4 since it does not have an exact cookie match matches with any configured at Real Server 4 4 Configure the real server s to handle the appropriate load balance string s To add a defined string gt gt cfg slb real 2 layer7 addlb lt ID gt where JD is the identification number of the defined string NOTE If you don t add a defined string or add the defined string any the server will han dle any request 5 Enable DAM on the switch or configure a proxy IP address on the client port To use cookie based preferential load balancing without DAM you must configure a proxy IP address on the client port NOTE If VMA is enabled you need to configure a proxy IP address on ports 1 8 If VMA
476. rvice group 1 Associate virtual port to real group ual server 1 http service ena Enable the virtual server 5 On the Denver switch define the type of Layer 4 processing each port must support In this example the following ports are being used on the Alteon 180 Web switch Table 12 4 Web Host Example Alteon 180 Port Usage Port Host Layer 4 Processing 3 Server C Server 4 Server D Server 5 Default Gateway Router This connects the switch to the Internet Client where all client requests originate The ports are configured as follows gt gt gt gt gt gt oo gt gt ae Virtual server 1 cfg slb port 3 SLB LB LB LB LB nNnnnn port 3 port 3 port 4 port 4 port 5 server en port 4 server en port 5 client en a a a Select physical switch port 3 Enable server processing on port 3 Select physical switch port 4 Enable server processing on port 4 Select physical switch port 5 Enable client processing on port 5 6 On the Denver switch enable SLB gt gt SLB port 5 cfg slb gt gt Layer 4 on Select the SLB Menu Turn SLB on Alteon Z5Systems 212777 A February 2002 Chapter 12 Global Server Load Balancing m 301 Web OS 10 0 Application Guide Task 6 Configure the Denver Site for GSLB Following the same procedure described for California see Task 3 Configure the California Site for GSLB
477. rwards the clients DATA REQ to the server Basically the Web switch delays binding the client session to the server until the proper handshakes are complete Thus with delayed binding two independent TCP connections span a Web session one from the client to the Web switch and the second from the Web switch to the selected server The switch temporarily terminates each TCP connection until content has been received thus pre venting the server from being inundated with SYN requests NoTE Delayed binding is automatically enabled when content intelligent switching features are used However if you are not parsing content you must explicitly enable delayed binding if desired Alteon WebSystems Chapter 6 Server Load Balancing 147 212777 A February 2002 Web OS 10 0 Application Guide Configuring Delayed Binding To configure your switch for delayed binding use the following command gt gt cfg slb virt lt virtual server number gt service lt service type gt dbind NOTE Enable delayed binding without configuring any HTTP SLB processing or persistent binding types To configure delayed binding for Web cache redirection see Delayed Binding for Web Cache Redirection on page 210 Detecting SYN Attacks In Web OS SYN attack detection is enabled by default whenever delayed binding is enabled SYN attack detection E Provides a way to track half open connections E Activates a trap notif
478. s Using this feature bandwidth can be allocated by type of user or other user specific information available in the cookie Cookie based bandwidth management empowers service providers to create tiered services For example Web site managers can classify users as first class business class and coach and allocate a larger share of the bandwidth for preferred classes vip 172 17 1 1 For VIP 172 17 1 1 First 2Mbs FIRST Business 1 Mbs BUSINESS fi e Client 1 Internet P Proxy Firewall _ a E a 1 N A w Client 2 Figure 17 6 Cookie Based Bandwidth Management NOTE Cookie based BWM does not apply to cookie based persistency or cookie pas sive active mode applications Alteon WebSystems Chapter 17 Bandwidth Management m 451 212777 A February 2002 Web OS 10 0 Application Guide Bandwidth Statistics and History Statistics are maintained in order to allow Web switch owners to bill for bandwidth usage Sta tistics for frequency and count are configurable Statistics are kept in the individual Switch Processors SP and then collected every second by the MP Management Processor The MP then combines the statistics as statistics for some classifications may be spread across multiple SPs The MP maintains some global statistics such as total octets and a window of historical statis tics When the history buffer of 128K is ready to overflow it can be optionally e mailed to a u
479. s services and real server groups O Define the switch port states O Enable SLB E Finally configure each switch so that it recognizes its remote peers O Configure a remote real server entry on each switch for each remote service O Add the remote real server entry to an appropriate real server group O Enable GSLB Alteon WebSystems Chapter 12 Global Server Load Balancing 293 212777 A February 2002 Web OS 10 0 Application Guide Example GSLB Topology Consider the following example network California Site Denver Site 200 200 200 X Network 174 14 70 X Network Internet Figure 12 2 GSLB Topology Example In the following examples many of the options are left to their default values See Additional Server Load Balancing Options on page 128 for more options GSLB Requirements The following is required prior to configuration E You must be connected to the switch Command Line Interface CLI as the administrator E Both of the following optional software keys must be activated O SLB O GSLB NOTE For details about any of the processes or menu commands described in this example see the Web OS Command Reference 294 m Chapter 12 Global Server Load Balancing Alteon systems A February Web OS 10 0 Application Guide Task 1 Configure the Basics at the California Site 1 If the Browser Based Interface BBD is to be used for managing the California switch change its service port GSLB u
480. s allows stan dard SLB between the Web switch and the server pools in an OSPF environment For more information on SLB see Chapter 6 Server Load Balancing and your Web OS 10 0 Command Reference ABR Load Sharing As a second form of load balancing host routes can be used for dividing OSPF traffic among multiple ABRs To accomplish this each Web switch provides identical services but advertises a host route for a different virtual server IP address to the external network If each virtual server IP address serves a different and equal portion of the external world incoming traffic from the upstream router should be split evenly among ABRs ABR Failover Complementing ABR load sharing identical host routes can be configured on each ABR These host routes can be given different costs so that a different ABR is selected as the preferred route for each virtual server and the others are available as backups for failover purposes If redundant routes via multiple routing processes such as OSPF RIP BGP or static routes exist on your network the Web switch defaults to the OSPF derived route For a configuration example see Example 4 Host Routes on page 92 OSPF Features Not Supported in This Release The following OSPF features are not supported in this release Redistributing routes into OSPF Web OS 10 0 does not allow your switch to emulate an ASBR Summarizing external routes Filtering OSPF routes Configuring equal
481. s configuration E Within each filter the smask and dmask values are identical E All parameters for both filters are identical except for the NAT direction For Filter 10 nat source is used For Filter 11 nat dest is used E Filters for static non proxy NAT should take precedence over dynamic NAT filters fol lowing example Static filters should be given lower filter numbers Dynamic NAT Dynamic NAT is a many to one solution multiple clients on the private subnet take advantage of a single external IP address thus conserving valid IP addresses In this example clients on the internal private network require TCP UDP access to the Internet Outbound filter DE a Public IP Address p 205 178 17 12 Internet Router Inbound proxy on Internal Clients 5 public address 10 10 10 x Private network Figure 7 9 Dynamic Network Address Translation NOTE Dynamic NAT can also be used to support ICMP traffic for PING This example requires a NAT filter to be configured on the switch port that is connected to the internal clients When the NAT filter is triggered by outbound client traffic the internal private IP address information on the outbound packets is translated to a valid publicly advertised IP address on the switch In addition the public IP address must be configured as a proxy IP address on the switch port that is connected to the internal clients The proxy performs the reverse translation
482. s configured to support HTTP and FTP within two real server groups If a session switch detects an HTTP service failure on the real server it removes that real server group from the load balancing algorithm for HTTP but keeps the real server in the mix for FTP Removing only the failed service from load balancing allows users access to all healthy servers supporting a given service When a service on a server is in the service failed state the session switch sends Layer 4 connection requests for the failed service to the server When the session switch has successfully established a connection to the failed service the service is restored to the load balancing algorithm Server Failure If all load balanced services supported on a server fail to respond to switch connection requests within the specified number of attempts then the server is placed in the server failed state While in this state no new connection requests are sent to the server however if graceful real server failure is enabled cfg slb adv grace ena state information about existing sessions is maintained and traffic associated with existing sessions continues to be sent to the server NOTE All load balanced services on a server must fail before the switch places the server in the server failed state The server is brought back into service as soon as the first service is proven to be healthy Additional services are brought online as they are subsequently prove
483. s information in the client request to select a server The spe cific IP address information used depends on the application E For Application Redirection the client destination IP address is used All requests for a specific IP destination address will be sent to the same server This is particularly useful for maximizing successful cache hits E For SLB the client source IP address is used All requests from a specific client will be sent to the same server This option is useful for applications where client information must be retained between sessions E For FWLB both the source and destination IP addresses are used to ensure that the two unidirectional flows of a given session are redirected to the same firewall When selecting a server a mathematical hash of the relevant IP address information is used as an index into the list of currently available servers Any given IP address information will always have the same hash result providing natural persistence as long as the server list is sta ble However if a server is added to or leaves the mix then a different server might be assigned to a subsequent session with the same IP address information even though the original server is still available Open connections are not cleared NOTE The hash metric provides more distributed load balancing than minmisses at any given instant It should be used if the statistical load balancing achieved using minmisses is not as optimal as
484. s used only with SLB To disable server processing on the port use the commands on the cfg slb port menu as described in Chapter 8 of the Web OS Command Refer ence 8 Create a filter that will intercept and redirect all client HTTP requests The filter must be able to intercept all TCP traffic for the HTTP destination port and must redi rect it to the proper port on the real server group gt gt SLB port 6 cfg slb filt 2 Select the menu for Filter 2 gt gt Filter 2 sip any From any source IP addresses gt gt Filter 2 dip any To any destination IP addresses gt gt Filter 2 proto tcp For TCP protocol traffic gt gt Filter 2 sport any From any source port gt gt Filter 2 dport http To an HTTP destination port gt gt Filter 2 action redir Set the action for redirection gt gt Filter 2 rport http Set the redirection port gt gt Filter 2 group 1 Select real server group 1 gt gt Filter 2 ena Enable the filter The rport parameter must be configured whenever TCP UDP protocol traffic is redirected The rport parameter defines the real server TCP or UDP port to which redirected traffic will be sent The port defined by the rport parameter is used when performing Layer 4 health checks of TCP services Also if NAT and proxy addresses are used on the Web switch see Step 3 on page 207 the rport parameter must be configured for all application redirection filters Take ca
485. sed on the Host header the switch will forward the request to servers representing dif ferent customers Web sites E The network administrator needs to define a domain name as part of the 128 supported URL strings E The switch performs string matching that is the string nortelnetworks com or www nortelnetworks com will match www nortelnetworks com 380 m Chapter 15 Content Intelligent Switching Alteon 2 Systems A February Web OS 10 0 Application Guide Virtual Hosting Configuration Overview The sequence of events for configuring virtual hosting based on HTTP Host headers is described below 1 The network administrator defines a domain name as part of the 128 supported URL strings Both domain names www company a com and www company b com resolve to the same IP address In this example the IP address is for a virtual server on the switch 2 www company a com and www company b com are defined as URL strings 3 Server Group 1 is configured with Servers 1 through 8 Servers 1 through 4 belong to www company a com and Servers 5 through 8 belong to www company b com 4 The network administrator assigns string www company a com to Servers 1 through 4 and string www company b com to Servers 5 through 8 5 The Web switch inspects the HTTP host header in requests received from the client E If the host header is www company a com the
486. see Free Metric FWLB on page 346 the distribution of traffic within each stream is normally based on a mathematical hash of the IP source and destination addresses This ensures that each client request and its related responses will use the same firewall a feature known as persistence and that the streams will be roughly equal in traffic load Although basic firewall load balancing techniques can support more firewalls as well as multi ple switches on the clean and dirty sides for redundancy the configuration complexity increases dramatically The four subnet FWLB solution is usually preferred in larger scale high availability topologies see page 326 316 m Chapter 13 Firewall Load Balancing Alteon e Systems A February Web OS 10 0 Application Guide Basic FWLB Implementation In this example traffic is load balanced among the available firewalls Client Internet 1 Client sends a request 2 Redir filter selects upper or lower path 3 Static route directs request through 7 Redir filter selects reverse path the selected firewall 8 Static route directs response back 4 Firewall forwards valid traffic through the same firewall 5 SLB selects an available server 9 Firewall forwards valid traffic 6 Server responds 10 Client receives response Figure 13 3 Basic FWLB Process 1 The client requests data The external clients intend to connect to services at the publicly advertised IP addre
487. ser for long term storage Additionally the history buffer can be sent to the user when the user enters the command oper bwm sndhist The SMTP protocol is used for this transfer if the SMTP host has been configured c g sys smtp and the user e mail address has been set up c g bwm user To obtain graphs the data must be collected and pro cessed by an external entity through SNMP or through e mailed logs History is maintained only for the contracts for which the history option is enabled cf g bwm cont x hist If SMTP is enabled then the info command info bwm can display when the history sta tistics will be e mailed to a user Statistics Maintained The total number of octets sent octet discards and times over the soft limit are kept for each contract The history buffer maintains the average queue size for the time interval and the aver age rate for the interval Statistics and Management Information Bases E For existing BWM classes As mentioned above the MP maintains per contract rate usage statistics These are obtain able via a private MIB E When BWM services are not enabled Even when BWM is not enforced the MP can still collect classification information and report it allowing the customer to observe a network for a while before deciding how to configure it This feature can be disabled using cfg bwm force dis When this command is used no limits will be applied on any contract 452 m Chapter 17 Ban
488. server router As noted earlier this is the preferred redundant con figuration Server 1 RIP 1 205 178 13 101 Master Active VRID 2 VIP 205 178 13 226 MAC address 00 00 5E 00 01 02 Server 2 RIP 1 205 178 13 102 Router Internet Server 3 RIP 1 205 178 13 103 Router Backup Active VRID 2 VIP 205 178 13 226 MAC address 00 00 5E 00 01 02 Server 4 RIP 1 205 178 13 104 Figure 11 9 Active Active High Availability Configuration Although this example shows only two switches there is no limit on the number of switches used in a high availability configuration It is possible to implement an active active configura tion and perform load sharing between all of the VRRP capable switches in a LAN In this configuration when both switches are healthy the load balanced packets are sent to the virtual server IP address resulting in higher capacity and performance than when the switches are used in an active standby configuration The switch on which a frame enters the virtual server router is the one that processes that frame The ingress switch is determined by external factors such as routing and STP settings NOTE Each VRRP capable switch is autonomous There is no requirement that the switches in a virtual router be identically configured Different switch models with different numbers of ports and different enabled services may be used in a virtual router Alteon WebSystems Chapter 11 High Availabilit
489. ses service port 80 on the IP interface for DSSP updates By default the Web OS Browser Based Interface BBI also uses port 80 Both services cannot use the same port If the BBI is enabled see the cfg sys http command in Chapter 7 of the Web OS Command Reference configure it to use a different port For example enter the following command to change the BBI port to 8080 gt gt cfg sys Select the System menu gt gt System wport 8080 Set service port 8080 for BBI 2 On the California switch define an IP interface The switch IP interface responds when asked to resolve client DNS requests The IP interface must have an IP route to the local real servers The switch uses this path to determine if the real servers can be reached via TCP IP To configure an IP interface for this example enter these commands from the CLI gt gt System cfg ip if 1 Select IP interface 1 gt gt IP Interface 1 addr 200 200 200 100 Assign IP address for the interface gt gt IP Interface 1 ena Enable IP interface 1 NOTE This example assumes that all ports and IP interfaces use default VLAN 1 requiring no special VLAN configuration for the ports or IP interface 3 On the California switch define the default gateway The router at the edge of the site acts as the default gateway to the Internet To configure the default gateway for this example enter these commands from the CLI gt gt I
490. sh Select SLB hash metric for group 1 Using the hash metric all traffic between specific IP source destination address pairs flows through the same firewall This ensures that sessions established by the firewalls are main tained for their duration NOTE Other load balancing metrics such as leastconns roundrobin minmiss response and bandwidth can be used when enabling the Return to Sender RTS option For more information see Free Metric FWLB on page 346 7 Enable SLB on the switch gt gt Real server group 1 cfg slb on 320 m Chapter 13 Firewall Load Balancing Alteon 2 systems A February Web OS 10 0 Application Guide 8 Create a filter to allow local subnet traffic on the dirty side of the firewalls to reach the firewall interfaces gt gt Layer 4 cfg slb filt 10 gt gt Filter 10 sip any gt gt Filter 10 dip 192 16 12 0 gt gt Filter 10 action allow gt gt Filter 10 ena Select filter 10 From any source IP address To this destination IP address Allow frames with this DIP address Enable filter 9 Create the FWLB redirection filter This filter will redirect inbound traffic load balancing it among the defined real servers in the group In this network the real servers represent IP interfaces on the clean side Web switch gt gt Filter 10 filt 15 Select filter 15
491. siness and for taking orders from customers It must not become overloaded or unavailable E You want to use multiple servers or hot standby servers for maximum server uptime E You must be able to scale your applications to meet client and LAN request capacity E You can t afford to continue using an inferior load balancing technique such as DNS round robin or a software only system 118 m Chapter 6 Server Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide How Server Load Balancing Works In an average network that employs multiple servers without server load balancing each server usually specializes in providing one or two unique services If one of these servers provides access to applications or data that is in high demand it can become overutilized Placing this kind of strain on a server can decrease the performance of the entire network as user requests are rejected by the server and then resubmitted by the user stations Ironically over utilization of key servers often happens in networks where other servers are actually available The solution to getting the most from your servers is SLB With this software feature the switch is aware of the services provided by each server The switch can direct user session traf fic to an appropriate server based on a variety of load balancing algorithms Retail Retail Trading Retail _ Trading Trading Lending Trading Retail Lending Lending Lendin
492. smission of news among the ARPA Internet community NNTP is designed so that news articles are stored in a central database allowing a subscriber to select only those items he wishes to read NNTP is documented in RFC977 Articles are transmitted in the form specified by RFC1036 Configuring the Switch for NNTP Health Checks To configure the switch for NNTP health checks 1 Select the real server group gt gt cfg slb group 1 Select a real server group 2 Set the health check type to NNTP for the real server group gt gt cfg slb group 1 health nntp 3 Configure the health check content gt gt cfg slb group 1 content lt nntp newsgroup name gt Create nntp directory from MS Windows Option Pack4 4 Apply and save your configuration gt gt Real server group 1 apply gt gt Real server group 1 save 238 m Chapter 10 Health Checking Alteon e systems A February Web OS 10 0 Application Guide RADIUS Server Health Checks The Remote Authentication Dial In User Service RADIUS protocol is used to authenticate dial up users to Remote Access Servers RASs and the client application they will use during the dial up connection E RADIUS Content Health Check Enhancements O Include the switch IP as the Network attached storage NAS IP parameter in the RADIUS content health check O RADIUS health check using the configured real server port rport
493. spection performed by the firewalls Alteon WebSystems Chapter 13 Firewall Load Balancing 349 212777 A February 2002 Web OS 10 0 Application Guide You could add the filters required for the DMZ to each Web switch as follows 1 On the dirty side Web switch create the filter to allow HTTP traffic to reach the DMZ Web servers In this example the DMZ Web servers use IP addresses 205 178 29 0 24 gt gt cfg slb filt 80 gt gt Filter 80 sip any gt gt Filter 80 dip 205 178 29 0 gt gt Filter 80 dmask 255 255 255 0 gt gt Filter 80 proto tcp Select filter 80 From any source IP address To the DMZ base destination For the range of DMZ addresses For TCP protocol traffic From any source port To an HTTP destination port Allow the traffic Enable the filter gt gt Filter 80 sport any gt gt Filter 80 dport http gt gt Filter 80 action allow gt gt Filter 80 ena 2 Create another filter to deny all other traffic to the DMZ Web servers gt gt Filter 80 filt 89 gt gt Filter 89 sip any gt gt Filter 89 dip 205 178 29 0 gt gt Filter 89 dmask 255 255 255 0 gt gt Filter 89 proto any Select filter 89 From any source IP address To the DMZ base destination For the range of DMZ addresses For TCP protocol traffic Allow the traffic Enable the filter gt gt Filter 89 action deny gt gt Filter 89 ena
494. ss assigned to a virtual server on the clean side Web switch 2 A redirection filter balances incoming requests among different IP addresses When the client request arrives at the dirty side Web switch a filter redirects it to a real server group that consists of a number of different IP addresses This redirection filter splits the traffic into balanced streams one for each IP address in the real server group For FWLB each IP address in the real server group represents an IP Interface IF on a different subnet on the clean side Web switch 3 Requests are routed to the firewalls On the dirty side switch one static route is needed for each traffic stream For instance the first static route will lead to an IP interface on the clean side Web switch using the first firewall as the next hop A second static route will lead to a second clean side IP interface using the second firewall as the next hop and so on By combining the redirection filter and static routes traffic is load balanced among all active firewalls All traffic between specific IP source destination address pairs flows through the same fire wall ensuring that sessions established by the firewalls persist for their duration NOTE More than one stream can be routed though a particular firewall You can weight the load to favor one firewall by increasing the number of static routes that traverse it Alteon WebSystems Chapter 13 Firewall Load Balancing 317 2
495. ss owner Most VRRP installa tions choose not to implement an IP address owner For the purposes of this chapter VRRP routers that are not the IP address owner are called renters Master and Backup Virtual Router Within each virtual router one VRRP router is selected to be the virtual router master See Selecting the Master VRRP Router on page 251 for an explanation of the selection process NOTE If the IP address owner is available it will always become the virtual router master The virtual router master forwards packets sent to the virtual interface router It also responds to Address Resolution Protocol ARP requests sent to the virtual interface router s IP address Finally the virtual router master sends out periodic advertisements to let other VRRP routers know it is alive and its priority Within a virtual router the VRRP routers not selected to be the master are known as virtual router backups Should the virtual router master fail one of the virtual router backups becomes the master and assumes its responsibilities Alteon WebSystems Chapter 11 High Availability m 249 212777 A February 2002 Web OS 10 0 Application Guide The Alteon Web switches in Figure 11 1 have been configured as VRRP routers Together they form a virtual interface router VIR VRRP Router VRID 1 Router 1 Master Active VR IP address 205 178 13 226 MAC address 00 00 SE 00 01 01 Priority 255 IP interface 205 1
496. sscissscieveeseesieeeseettes D d ta pacing scrisese isendit E kaniini en 446 GALA RTAMD sessen eos Era oE Er EEEE raK 354 def ult gateway eee eeeseceeseeecsseeteeseeecesaeeeeneeees 30 configuration example se 32 61 295 MILAN DaS 6d ise scedsaes cc sateveenesveviorevevdeneexseueets 58 default password 0 ceeeeceeeseceseeseeeceeeecesteeeeeees 105 default route OSPF ccccceeseseeeeececeeeeseeeeees 78 delayed binding eeeeeeeeeeeee 146 to 148 373 Web cache redirection cceeceeeeeeeeeeeeeeee deny filtering aeriene ense dip destination IP address for filtering direct real server ACCESS ceeeceeeeeeeeseeeeeeeeeeee Distributed Site State Protocol DSSP dmask destination mask for filtering Domain Name System DNS MIETIN oster oseere tse eeek Global SLB diagram cceeeeeeeceeeeseeeeeee load balancing layer 4 cccceeceeeeeeees load balancing layer 7 ceeeeeeeeeeeeeeeeeees FOUN TODIN 55 6205 ccssecsonctissuscaneuccantsegensdecdateavn dport filtering Option eeeeeeeeeeeeeeeeee DSSP See Distributed Site State Protocol duplex mode for jumbo frames ceesseeeeeeeees 63 dynai NAT os c sccesscessvtessaneeveessseasencnveecnseceove 193 476 m Index E egress traffic encrypt EtherChannel i as used with port trunking ce eeeeeeeeseeeeeeee 68 expiration timer insert coo
497. sses for all other switch ports except port 9 VMA is normally enabled on the switch In addition to enhanced resource management VMA eliminates many of the restrictions found in earlier versions of the Web OS VMA does require that when any switch port is configured with a proxy IP address all ports must be con figured with unique proxy IP addresses If VMA is disabled only the client port needs a proxy IP address and this step can be skipped The following commands can be used for configuring the additional unique proxy IP addresses gt gt SLB port 6 cfg slb port 1 Select network port 1 gt gt SLB port 1 pip 200 200 200 70 Set proxy IP address for port 1 gt gt SLB port 1 port 2 Select network port 2 gt gt SLB port 2 pip 200 200 200 71 Set proxy IP address for port gt gt SLB port 2 port 3 Select network port 3 gt gt SLB port 3 pip 200 200 200 72 Set proxy IP address for port 3 gt gt SLB port 3 port 4 Select network port 4 gt gt SLB port 4 pip 200 200 200 73 Set proxy IP address for port 4 gt gt SLB port 4 port 7 Select network port 7 gt gt SLB port 7 pip 200 200 200 74 Set proxy IP address for port 7 gt gt SLB port 7 port 8 Select network port 8 gt gt SLB port 8 pip 200 200 200 75 Set proxy IP address for port 8 NOTE Port 9 does not require a proxy IP address under VMA For conceptual information see Virtua
498. sses how you can logically connect users and segments to a host that supports many logical segments or subnets by using the flexibility of the multiple VLAN system VLANs and Spanning Tree Protocol on page 49 VLANs and Default Gateways on page 58 VLANs and Jumbo Frames on page 63 NOTE Basic VLANs can be configured during initial switch configuration see Using the Setup Utility in the Web OS Command Reference More comprehensive VLAN configuration can be done from the Command Line Interface see VLAN Configuration as well as Port Configuration in the Web OS Command Reference Alteon Systems 43 212777 A February 2002 Web OS 10 0 Application Guide VLAN ID Numbers Web OS supports up to 246 VLANs per switch Even though the maximum number of VLANs supported at any given time is 246 each can be identified with any number between 1 and 4094 VLANs are defined on a per port basis Each port on the switch can belong to one or more VLANs and each VLAN can have any number of switch ports in its membership Any port that belongs to multiple VLANs however must have VLAN tagging enabled see VLAN Tagging on page 44 Each port in the switch has a configurable default VLAN number known as its PVID The fac tory default value of all PVIDs is 1 This places all ports on the same VLAN initially although each port s PVID is configurable to any VLAN number between 1 and 4094 Any
499. sses that will be cached on the switch The local network address is used to define the base IP address in the range that will be cached The local network mask is applied to produce the range To determine if a route should be added to the memory cache the destination address is masked bit wise AND with the local network mask and checked against the local network address By default the local network address and local network mask are both set to 0 0 0 0 This pro duces a range that includes all Internet addresses for route caching 0 0 0 0 through 255 255 255 255 To limit the route cache to your local hosts you could configure the parameters as shown in the following example Table 1 4 Local Routing Cache Address Ranges Local Host Address Range Local Network Address Local Network Mask 0 0 0 0 127 255 255 255 0 0 0 0 128 0 0 0 128 0 0 0 128 255 255 255 128 0 0 0 128 0 0 0 or 255 0 0 0 205 32 0 0 205 32 255 255 205 32 0 0 255 255 0 0 NOTE Static routes must be configured within the configured range All other addresses that fall outside the defined range are forwarded to the default gateway Alteon WebSystems Chapter 1 Basic IP Routing 35 212777 A February 2002 Web OS 10 0 Application Guide Border Gateway Protocol BGP Border Gateway Protocol BGP is an Internet protocol that enables routers on a network to share and advertise routing information with each other about the segments of the IP addr
500. stems 212777 A February 2002 Web OS 10 0 Application Guide Multiple Spanning Trees Web OS 10 0 supports up to 16 instances of Spanning Trees or Spanning Tree groups Each VLAN can be placed on a unique Spanning Tree group per switch except for the default Span ning Tree group STG 1 The default Spanning Tree group 1 can have more than one VLAN All other Spanning Tree groups 2 16 can have only one VLAN associated with it Spanning Tree can be enabled or disabled for each port Multiple Spanning Trees can be enabled on tagged or untagged ports NOTE By default all newly created VLANs are members of Spanning Tree Group 1 Why Do We Need Multiple Spanning Trees Figure 2 3 shows a simple example of why we need multiple Spanning Trees Two VLANs VLAN 1 and VLAN 100 exist between Web switch A and Web switch B If you have a single Spanning Tree group the switches see an apparent loop and one VLAN may become blocked affecting connectivity even though no actual loop exists If VLAN 1 and VLAN 100 belong to different Spanning Tree Groups then the two instances of Spanning Tree separate the topology without forming a loop Both VLANs can forward packets between the Web switches without losing connectivity NNE a AE gt Web Switch A VLAN 100 Web Switch B Spanning Tree Group 1 VLAN 1 Spanning Tree Group 2 VLAN 100 Figure 2 3 Using Multiple Instances of Spanning Tree Protocol Alteon Systems Chapter 2 V
501. switch info ospf general info ospf nbr info ospf dbase dbsum info ospf route stats route Refer to the Web OS 10 0 Command Reference for information on the above commands 98 m Chapter 4 OSPF Alteon Systems 212777 A February 2002 CHAPTER 5 Secure Switch Management This chapter discusses the use of secure tunnels so that the data on the network is encrypted and secured for messages between a remote administrator and the switch To limit access to the switch s Management Processor without having to configure filters for each switch port you can set a source IP address or range that will be allowed to connect to the switch IP interface through Telnet SSH SNMP or the Web OS Browser Based Interface BBI This will also help prevent spoofing or attacks on the switch s TCP IP stack The fol lowing sections are addressed in this chapter E Setting Allowable Source IP Address Ranges on page 100 E Secure Switch Management on page 101 E RADIUS Authentication and Authorization on page 103 m Secure Shell and Secure Copy on page 107 E Port Mirroring on page 113 Alteon Systems 99 212777 A February 2002 Web OS 10 0 Application Guide Setting Allowable Source IP Address Ranges The allowable management IP address range is configured using the system mnet and mmask options available on the Command Line Interface CLI System Menu cfg sys NOTE The mnet and mmask c
502. switch sends a SSL Hello packet to the SSL server E If it is up and running the SSL server responds with the Server Hello message E The switch verifies fields in the response and marks the service Up if the fields are OK During the handshake the user and server exchange security certificates negotiate an encryp tion and compression method and establish a session ID for each session WAP Gateway Health Checks Wireless Application protocol WAP carries Internet traffic to mobile devices and allows Web services to be delivered to mobile phones and handsets The translation from HTTP HTML to WAP WML Wireless Markup Language is implemented by servers known as WAP gateways on the land based part of the network WAP devices can communicate in two ways M Wireless Session Protocol WSP content health checks the unencrypted mode of sending WML traffic similar to HTTPS E Wireless Transport Layer Security WTLS health checks an encrypted mode of sending WML traffic similar to HTTP 240 m Chapter 10 Health Checking Alteon e Systems A February Web OS 10 0 Application Guide WSP Content Health Checks Wireless Session Protocol content health checks can be configured in two modes connection less and connection oriented Connectionless WSP runs on UDP IP protocol port 9200 Therefore Alteon Web switches can be used to load balance the gateways in this mode of oper ation Web OS 10 0 provides a content
503. t U ooo 000 ooo oo Lee o PIP se a a Ingress traffic Egress traffic Figure 5 2 Monitoring Ports Figure 5 2 shows two mirrored ports monitored by a single port Similarly you can have a sin gle or groups of E a mirrored port to a monitored port E many mirrored ports to one monitored port Web OS 10 0 does not support a single port being monitored by multiple ports Packets are duplicated and sent to the mirrored ports after client or server port processing is completed Data packets sent from a client to a virtual server are seen at the mirrored port as follows E source IP address client IP address E destination IP address real server IP address rather than the virtual server IP address Conversely the response from the server to the client will be seen as follows E source IP address virtual server IP address E destination IP address client IP address Alteon WebSystems Chapter 5 Secure Switch Management m 113 212777 A February 2002 Web OS 10 0 Application Guide NOTE Port mirroring and bandwidth management cannot be enabled at the same time To configure port mirroring for the example shown in Figure 5 2 1 Specify the monitoring port gt gt cfg pmirr monport 5 Select port 5 for monitoring
504. t gt gt cfg slb port gt gt cfg slb port gt gt cfg slb port and so on 1 pip 1 pip 2 pip 3 pip 4 pip 5 pip 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 11 proxy ena 11 proxy dis 12 proxy dis 13 proxy dis 14 proxy dis Proxy IP for NAT etc Turns on address proxying Turns off address proxying NOTE VMA must be enabled if you are setting up Firewall Load Balancing FWLB with clean side switches performing server load balancing SLB or URL based SLB and Direct Access Mode DAM is enabled 218 m Chapter 9 Virtual Matrix Architecture Alteon Systems 212777 A February 2002 CHAPTER 10 Health Checking Content intelligent Web switches allow Web masters to customize server health checks to ver ify content accessibility in large Web sites As the amount of content grows and information is distributed across different server farms flexible customizable content health checks are criti cal to ensure end to end availability The following Web OS health checking topics are described in this chapter Real Server Health Checks on page 221 This section explains the switch s default health check which checks the status of each service on each real server every two seconds DSR Health Checks on page 222 This section describes the servers ability to respond to the client queries made to the Virtual server I
505. t If the DR fails the BDR will take over the task of distributing database infor mation to the other neighbors The Link State Database OSPF is a link state routing protocol A link represents an interface or routable path from the routing device By establishing an adjacency with the DR each routing device in an OSPF area maintains an identical Link State Database LSDB describing the network topology for its area Each routing device transmits a Link State Advertisement LSA on each of its interfaces LSAs are entered into the LSDB of each routing device OSPF uses flooding to distribute LSAs between routing devices When LSAs result in changes to the routing device s LSDB the routing device forwards the changes to the adjacent neighbors the DR and BDR for distribution to the other neighbors OSPF routing updates occur only when changes occur instead of periodically For each new route if an adjacency is interested in that route for example if configured to receive static routes and the new route is indeed static an update message containing the new route is sent to the adjacency For each route removed from the route table if the route has already been sent to an adjacency an update message containing the route to withdraw is sent 72 Chapter 4 OSPF Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide The Shortest Path First Tree The routing devices use a link state algorithm Dijkstra s al
506. t gt Virtual server 1 dname foocorp com Define domain name gt gt Virtual server 1 service 80 Select HTTP for virtual server gt gt Virtual server 1 http hname www Define HTTP hostname 4 On the Denver switch turn on GSLB gt gt Virtual server 1 http cefg slb gslb on Activate GSLB for the switch 5 Apply and verify the configuration gt gt Global SLB apply Make your changes active gt gt Global SLB cur View current GSLB settings gt gt Global SLB cfg slb cur View current SLB settings Examine the resulting information If any settings are incorrect make and apply any appropri ate changes and then check again 6 Save your new configuration changes gt gt Layer 4 save Save for restore after reboot Alteon WebSystems Chapter 12 Global Server Load Balancing 303 212777 A February 2002 Web OS 10 0 Application Guide IP Proxy for Non HTTP Redirects Typically client requests for HTTP applications are automatically redirected to the location with the best response and least load for the requested content This is because the HTTP proto col has a built in redirection function that allows requests to be redirected to an alternate site If a client requests a non HTTP application such as FTP POP3 or SMTP then the lack of a redirection function in these applications requires that a proxy IP address be configured on the client port The client port wi
507. t initiate HTTP sessions which are load balanced to Web servers Figure 6 5 Example Network for Client Server Port Configuration In Figure 6 5 the switch load balances traffic to a Web server pool and to a Domain Name System DNS server pool The switch port connected to the Web server pool port 2 is asked to perform both server and client processing Some topologies require special configuration For example if clients were added to Switch B as shown in Figure 6 5 these clients could not access the Web server pool using SLB services except through a proxy IP address that is configured on port 2 of the Alteon Web switch Alteon WebSystems Chapter 6 Server Load Balancing 123 212777 A February 2002 Web OS 10 0 Application Guide Configuring Server Load Balancing This section describes the steps for configuring an SLB Web hosting solution In the following procedure many of the SLB options are left to their default values See Additional Server Load Balancing Options on page 128 for more options The following is required prior to configuration E You must be connected to the switch Command Line Interface CLT as the administrator E The SLB software must be enabled NOTE For details about any of the menu commands described in this example see your Web OS Command Reference 1 Assign an IP address to each of the real servers in the server pool The real servers in any given real server group must have a
508. t a single administered network point RADIUS is an indus try standard used by network product companies and is a proposed IETF standard The RADIUS server uses a static session entry to determine which real WAP gateway should receive the user s sessions Typically each WAP gateway is integrated with a RADIUS server on the same host and a RADIUS request packet is allowed to go to any of the RADIUS servers Upon receiving a request from a client the RADIUS server instructs the switch to create a static session entry in the switch via Transparent Proxy Control Protocol TPCP 158 m Chapter 6 Server Load Balancing Alteon e systems A February Web OS 10 0 Application Guide TPCP is Alteon s proprietary protocol that is used to establish communication between the RADIUS servers and the Alteon Web switch It is UDP based and uses ports 3121 1812 and 1645 Using TPCP a static session entry is added or removed by the external devices such as the RADIUS servers A regular session entry is usually added or removed by the switch itself A static session entry like a regular session entry contains information such as the client IP address the client port number real port number virtual destination IP address virtual des tination port number A static session entry added via TPCP to the switch does not age out The entry will only be deleted by another TPCP Delete Session request If the user adds session entries using the traditio
509. t be scripted Session switches monitor the health of servers and applications by sending Layer 4 connection requests TCP SYN packets for each load balanced TCP service to each server in the server group on a regular basis The rate at which these connection requests are sent is a user config urable parameter These connection requests identify both failed servers and failed services on a healthy server When a connection request succeeds the session switch quickly closes the connection by sending a TCP FIN finished packet NOTE TCP health check is a default health check after you have configured the switch for a particular service ICMP Health Checks Configure the switch with ICMP health check to verify if the real server is alive The Layer 3 echo echo reply health check is used for UDP services or when ICMP health checks are configured 1 Select the health check menu for group 1 gt gt cfg slb group 1 2 Set the health check type to ICMP for group 1 gt gt Real server group 1 health icmp 3 Apply and save your configuration gt gt Real server group 1 apply 224 m Chapter 10 Health Checking Alteon e systems A February Web OS 10 0 Application Guide Script Based Health Checks The send expect script based health checks dynamically verify application and content availability using scripts These scripts execute a sequence of tests to verif
510. t is bound to real server based on HTTP SLB E If the client request is sent with a cookie and a real server associated to the cookie is found in the local session table then the request will stay bound to that real server 414 m Chapter 15 Content Intelligent Switching Alteon e systems A February Web OS 10 0 Application Guide Requirements E Enable Direct Access Mode DAM or configure proxy IP address if DAM is disabled E Enable delayed binding Using the or and and Operators Figure 15 7 shows a network with real servers 1 and 3 configured for URL SLB and real serv ers 2 and 3 configured for HTTP Host SLB Real Servers URL gold Client Web Switch ar Internet Host www host net Host www host net URL gold Figure 15 7 Content Precedence Lookup Protectors Example If the Content Precedence Lookup feature is configured with the or and and operators the request from the client is as follows E HTTP Host or URL SLB The HTTP Host header takes precedence because it is specified first If there is no Host Header information and because or is the operator the URL string is examined next O Ifa request from a client contains no Host Header but has a URL string such as gold the request is load balanced among Server 1 or Server 3 O Ifa request from a client contains a Host Header then the request is load balanced among Server 2 and Server 3 The URL string is ignored because the HTTP
511. t rix If you are upgrading to Web OS from a previous release however VMA will be initially disabled if a proxy IP address is configured for any port on the switch VMA requires that if any port is con figured with a proxy IP address then all ports except port 9 must be configured with a unique proxy IP address prior to enabling VMA With VMA the concept of a per port session table doesn t apply instead there is a global ses sion table To identify which processor should process responses to proxied requests a unique proxy IP address must be configured on each port except port 9 The action of the unused proxy IP addresses can be disabled using cfg slb port x proxy dis Alteon Z Systems 217 212777 A February 2002 Web OS 10 0 Application Guide Frames ingressing a port that has been configured with a proxy IP address and the proxy option enabled cfg slb port x proxy ena can be processed using a proxy IP address by any switch port The client source address is substituted with the proxy IP address of the port processing the request Frames ingressing switch ports that have been configured with a proxy IP address but do not have the proxy option enabled is processed by other ports that have been configured with a proxy IP address but the client source address will not be replaced with a proxy IP address before it is forwarded to a server gt gt cfg slb port gt gt cfg slb port gt gt cfg slb por
512. t router A connects the switch to the Internet where client Client requests originate 6 Client router B connects the switch to the Internet where client Client requests originate 126 m Chapter 6 Server Load Balancing Alteon WebSystems 212777 A February 2002 The ports are configured as follows Web OS 10 0 Application Guide gt gt SLB port gt gt SLB port gt gt SLB port gt gt SLB port gt gt SLB port gt gt SLB port gt gt SLB port gt gt SLB port gt gt SLB port 1 w o m w w V NY EF gt gt Virtual server 1 cfg slb port 1 server ena port 2 server ena port 3 server ena port 5 client ena port 6 client ena Select physical switch port 1 Enable server processing on port 1 Select physical switch port 2 Enable server processing on port 2 Select physical switch port 3 Enable server processing on port 3 Select physical switch port 5 Enable client processing on port 5 Select physical switch port 6 Enable client processing on port 6 7 Enable apply and verify the configuration gt gt SLB port gt gt Layer 4 gt gt Layer 4 gt gt Layer 4 6t on apply cur Select the SLB Menu Turn Server Load Balancing on Make your changes active View current settings Examine the resulting information If any settings are incorrect make the appropriate changes 8 Save your new configuration changes
513. tems 441 212777 A February 2002 Web OS 10 0 Application Guide Overview To manage bandwidth create one or more bandwidth management contracts The switch uses these contracts to limit individual traffic flows a 2 Administrator configures bandwidth policy and contract 3 Classification is done on ingress port of switch Internet 1 Client buys a contract for example a VIP address 4 Bandwidth management done on egress port of switch Can optionally set TOS values to reflect usage rate 5 TOS value optional affects router bandwidth Figure 17 1 Bandwidth Management How It Works Each contract comprises the following E A classification policy where certain frames are grouped together E A bandwidth policy specifying usage limitations to be applied to these frames NOTE At any given time up to 1024 contracts can be created for a single Alteon AD4 or Alteon 184 Web switch 442 m Chapter 17 Bandwidth Management Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide When Virtual Matrix Architecture VMA is not enabled bandwidth classification is done on the ingress side of the switch at the ingress port or designated port and can be based on the following source port VLAN filters Virtual Internet Protocol VIP address ser vice on the Virtual server URL and so on When VMA is enabled traffic classification that is not based on filters or Server Load Balancing
514. teps that occur at the switches when a request arrives from the Internet are described below 1 The user prepares to send traffic to the destination server 2 The VPN client software encrypts the packet and sends it to the cluster IP address of the VPN devices 3 Switch 1 SW1 makes an entry in the session table and forwards the packet to VPN device 1 The selection of the VPN device is based on the hash load balancing metric 4 The VPN device strips the IP header and decrypts the encrypted IP header 5 Switch 2 SW2 forwards the packet to E 10 If an entry is found the frame is forwarded normally If an entry is not found the switch deter mines which VPN device processed the frame by performing a lookup with the source MAC address of the frame If the MAC address matches a MAC address of a real VPN server the switch adds an entry to the session table so that reverse traffic is redirected to the same VPN server Finally the frame is forwarded normally Alteon WebSystems Chapter 14 Virtual Private Network Load Balancing m 355 212777 A February 2002 Web OS 10 0 Application Guide VPN Load Balancing Configuration Requirements E Configure the switch with firewall load balancing For more information see Firewall Load Balancing on page 313 E Enable the Return to Sender RTS feature on the ports attached to the VPN devices using the following command gt gt cfg slb port lt portnumber gt rts ena
515. terface 2 gt gt IP Interface 2 addr 100 20 10 16 Assign IP address for the interface gt gt IP Interface 2 ena Enable IP interface 2 gt gt IP Interface 2 if 3 Select IP interface 3 gt gt IP Interface 3 addr 131 15 15 1 Assign IP address for the interface gt gt IP Interface 3 ena Enable IP interface 3 gt gt IP Interface 3 if 4 Select IP interface 4 gt gt IP Interface 4 addr 208 31 177 2 Assign IP address for the interface gt gt IP Interface 4 ena Enable IP interface 4 gt gt IP Interface 4 if 5 Select IP interface 5 gt gt IP Interface 5 addr 206 30 15 200 Assign IP address for the interface gt gt IP Interface 5 ena Enable IP interface 5 3 Set each server and workstation s default gateway to the appropriate switch IP interface the one in the same subnet as the server or workstation 4 Configure the default gateways to the routers addresses Configuring the default gateways allows the switch to send outbound traffic to the routers gt gt IP Interface 5 gw 1 Select primary default gateway gt gt Default gateway 1 addr 205 21 17 1 Assign IP address for primary router gt gt Default gateway 1 ena Enable primary default gateway gt gt Default gateway 1 gw 2 Select secondary default gateway gt gt Default gateway 2 addr 205 21 17 2 Assign address for secondary router gt gt Default gateway 2 ena Enable second
516. teways Web OS 10 0 Application Guide Configuring default gateways 5 and 6 for VLANs 2 and 3 respectively Configure default gate way for load balancing session requests and as backup when default gateways 5 and 6 fail aS gt gt gt gt gt gt oe gt gt cfg ip gw 5 Default Default Default Default Default gateway gateway gateway gateway gateway 5 addr 10 10 1 20 5 gw 6 6 addr 10 10 1 30 6 gw 1 1 addr 10 10 4 1 Select default gateway 5 Assign IP address for gateway 5 Select default gateway 6 Assign IP address for gateway 6 Select default gateway 1 Assign IP address for gateway 1 NOTE The IP address for default gateways 1 to 4 must be unique IP addresses for default gateways 5 to 250 can be set to the same IP address as the other gateways including default gateway 1 to 4 For example you can configure two default gateways with the same IP address for two different VLANs 4 Add the VLANs to the default gateways and enable them oe gt gt ao gt gt gt gt gt gt aS gt gt cfg ip gw 5 Default Default Default Default Default Default Default gateway gateway gateway gateway gateway gateway gateway 5 vlan 2 5 ena 5 gw 6 6 vlan 3 6 ena 6 gw 1 1 ena Select default gateway 5 Add VLAN 2 for default gateway 5 Enable default gateway 5 Select default gateway 6 Add VLAN 3 for defau
517. that enables an Alteon Web switch to use one set of IP addresses for internal traffic and a second set of addresses for external traf fic Alteon Web switches use filters to implement NAT NAT serves two main purposes E Provides a type of firewall by hiding internal IP addresses and increases network security E Enables a company to use more internal IP addresses Since they re used internally only there s no possibility of conflict with public IP addresses used by other companies and organizations In the following NAT examples a company has configured its internal network with private IP addresses A private network is one that is isolated from the global Internet and is therefore free from the usual restrictions requiring the use of registered globally unique IP addresses With NAT private networks are not required to remain isolated NAT capabilities within the switch allow internal private network IP addresses to be translated to valid publicly adver tised IP addresses and back again NAT can be configured in one of the following two ways E Static NAT provides a method for direct mapping of one predefined IP address such as a publicly available IP address to another such as a private IP address E Dynamic NAT provides a method for mapping multiple IP addresses such as a group of internal clients to a single IP address to conserve publicly advertised IP addresses Alteon Web switches use filters to implement NAT Stat
518. the Web switch increments priority by 2 for each m Ports Active ports on the same VLAN increments priority by 2 for each l4pts Active Layer 4 Ports client or server designation increments priority by 2 for each reals healthy real servers increments by 2 for each healthy real server m hsrp HSRP announcements heard on a client designated port increments by 10 for each An IP address that the switch owns and uses to load balance particular service requests like HTTP to other servers A VRRP address that is an IP interface address shared between two or more virtual rout ers A shared address between two devices utilizing VRRP as defined in RFC 2338 One vir tual router is associated with an IP interface This is one of the IP interfaces that the switch is assigned All IP interfaces on the Alteon Web switches must be in a VLAN If there is more than one VLAN defined on the Web switch then the VRRP broadcasts will only be sent out on the VLAN of which the associated IP interface is a member Classic load balancing Requests destined for a Virtual Server IP address VIP which is owned by the switch are load balanced to a real server contained in the group associated with the VIP Network address translation is done back and forth by the switch as requests come and go Frames come to the switch destined for the VIP The switch then replaces the VIP and with one of the real server IP addresses RIP s updates the relev
519. therwise a regular expression will have prefixed to it automatically For example html htm appears as html htm E Incorrectly or ambiguously formatted regular expressions are rejected instantly For exam ple O where a or follows a special character like the O A single or sign O Unbalanced brackets and parenthesis Configuring Regular Expressions The regular expression feature is applicable to both URL SLB path strings and URL SLB redi rected expression strings Configure regular expressions at the following CLI prompts cfg slb layer7 slb add or cfg slb layer7 slb redir add As aresult both HTTP SLB and WCR can use regular expression as the resource NOTE The more complex the structure of the string the longer it will take for the server to load balance the incoming packets Alteon WebSystems Chapter 15 Content Intelligent Switching 413 212777 A February 2002 Web OS 10 0 Application Guide Content Precedence Lookup The Layer 7 Precedence Lookup feature in Web OS allows you to give precedence to one Layer 7 parameter over another and selectively decide which parameter should be analyzed first The Content Precedence Lookup feature allows you to combine up to two Layer 7 load balanc ing mechanisms You can specify which types of Layer 7 content to examine the order in which they are examined and a logical oper
520. time If the client s IP address and the configured filter do not match then the default filter is applied Alteon Z Systems Chapter 7 Filtering m 179 212777 A February 2002 Web OS 10 0 Application Guide In Figure 7 5 the default filter 224 configured for Any is applied for all other connection requests Client 1 limit 10 conn sec Client 2 limit 20 conn sec Client 3 limit 30 conn sec Client 4 limit 10 conn sec meal servers Clients eb S Internet Filter 10 10 conn sec Filter 20 20 conn sec Filter 30 30 conn sec Filter 224 Allow Any Figure 7 5 Configuring Clients with Different Rates Configuring TCP Rate Limiting Filters TCP rate limiting can be configured for all filter types allow redir SIP and DIP and parame ters You can specify the source IP address and mask options in the filter configuration menu to monitor a client or a group of clients The destination IP address and mask options are used to monitor connections to a virtual IP address or a group of virtual IP addresses Basic TCP Rate Limiting Filter The following example shows how to configure TCP rate limiting for Filter 10 in Figure 7 5 1 Enable TCP rate limiting for the filter gt gt cfg slb filt 10 adv tcp gt gt TCP Advanced menu teplim ena Enable TCP rate limiting 2 Configure maximum number of TCP connections gt gt TCP Advanced menu maxcon 3 Set the max number of connections
521. tion on page 405 URL Hashing for Web Cache Redirection on page 406 Layer 7 RTSP Streaming Cache Redirection on page 409 394 m Chapter 15 Content Intelligent Switching Alteon 2 Systems A February Web OS 10 0 Application Guide URL Based Web Cache Redirection URL parsing for Web Cache Redirection operates in a manner similar to URL based server load balancing except that in WCR a virtual server on the switch is the target of all IP HTTP requests For information on URL based server load balancing see URL Based Server Load Balancing on page 375 By separating static and dynamic content requests via URL parsing Web OS enables you to send requests with specific URLs or URL strings to designated cache servers The URL based WCR option allows you to off load overhead processing from the cache servers by only send ing appropriate requests to the cache server farm NOTE Both HTTP 1 0 and HTTP 1 1 requests are supported Each request is examined and handled as described below E Ifthe request is anon GET request such as HEAD POST PUT or HTTP with cookies it is not sent to the cache E Ifthe request is an ASP or CGI request or a dynamically generated page it is not sent to the cache E If the request contains a Cookie it can optionally bypass the cache You can configure up to 32 URL expressions each 8 bytes long for noncacheable content types You can use up to 128 strings comprising of 40 byt
522. tion Guide 10 Configure the filters to allow local subnet traffic on the dirty side of the VPN device to reach the VPN device interfaces gt gt cfg slb filt 100 gt gt ena gt gt sip any gt gt dip 192 168 10 0 dmask 255 255 255 0 gt gt ilt 110 gt gt ena gt gt sip any gt gt dip 224 0 0 0 dmask 255 0 0 0 11 Create the redirection filter and enable firewall load balancing This filter will redirect inbound traffic among the defined real servers in the group gt gt cfg slb filt 224 gt gt ena gt gt sip any gt gt dip any gt gt proto any gt gt action redir gt gt ilt 224 adv gt gt fwlb ena 12 Add filters to the ingress port gt gt cfg slb port 1 gt gt filt ena gt gt add 100 add 110 add 224 13 Apply and save the configuration and reboot the switch gt gt apply gt gt save gt gt boot reset Alteon WebSystems Chapter 14 Virtual Private Network Load Balancing 367 212777 A February 2002 Web OS 10 0 Application Guide Test Configurations and General Topology The switches should be able to health check each other and all switches should see four real servers up Rules on the VPN devices permit this see Figure 14 3 on page 368 Fi 30 0 0 100 Check Point Policy Editor File Edit View Manage Policy Window Help HERO B B BSAR Ce SPF aia PBT oe 3
523. tion Guide Using Spanning Tree Protocol to Eliminate Loops VRRP generally requires Spanning Tree Protocol STP to be enabled in order to resolve bridge loops that usually occur in cross redundant topologies as shown in Figure 11 12 In this example a number of loops are wired into the topology STP resolves loops by blocking ports where looping is detected Routers Alteon Web Switches Switches Servers Internet Figure 11 12 Cross Redundancy Creates Loops But STP Resolves Them One drawback to using STP with VRRP is the failover response time STP could take as long as 45 seconds to re establish alternate routes after a switch or link failure Using VLANs to Eliminate Loops When using VRRP you can decrease failover response time by using VLANs instead of STP to separate traffic into non looping broadcast domains An example is shown in Figure 11 13 Routers Alteon Web Switches Switches Servers VLAN 1 is for switch to switch and external routing VLAN 2 groups the first sub eeeeee switch with the Alteon Web Switches VLAN 3 groups the second c g sub switch with the Alteon Web switches Internet Figure 11 13 Using VLANs to Create Non Looping Topologies This topology allows STP to be disabled On the Alteon Web switches IP routing allows traf fic to cross VLAN boundaries The servers use the Alteon Web switches as default gateways For port failure traffic is rerouted to the alternate path within one health chec
524. tion IP address or both NOTE The leastconns bandwidth and response metrics are not applicable to IDS server load balancing Configuring IDS Server Load Balancing To configure your switch for IDS do the following NOTE IDS SLB is supported only when RTSP SLB or WAP RADIUS Snooping are disabled on the Web switch 1 Configure real servers on the switch that correspond to your IDS servers NoTE Real servers are configured by providing the IP address of the actual server If your IDS servers are implemented without an IP address then you should configure a dummy address for the real server Also set the health check of the IDS group to link health check as shown in Step 5 of this procedure For example if your IDS servers are connected to port 1 and port 2 on the switch and are not using IP addresses you could configure dummy addresses as follows gt gt cfg slb real 1 rip 1 1 1 1 ena Define a dummy address gt gt cfg slb real 2 rip 2 2 2 2 ena Define a dummy address 164 m Chapter 6 Server Load Balancing Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide 2 Create a group and add IDS servers to the group Each IDS server must be connected directly to a different switch port or VLAN If the IDS group will be configured for link health check match the IDS server number to the physical port number 1 to 9 to which it is connected For ICMP health chec
525. to the stub area Any traffic for IP address destinations outside the stub area will be forwarded to the stub area s IP interface and then into the backbone Backbone Stub Area 7 AreaQ s 7 Areal s 7 0 0 0 0 N d 0 0 0 1 4 l Network N Network 7 7 N N _10 10 7 0 24 10 10 12 0 24_ 1 Figure 4 5 A Simple OSPF Domain Follow this procedure to configure OSPF support as shown in Figure 4 5 1 Configure IP interfaces on each network that will be attached to OSPF areas In this example two IP interfaces are needed one for the backbone network on 10 10 7 0 24 and one for the stub area network on 10 10 12 0 24 gt gt cfg ip if 1 Select menu for IP interface 1 gt gt IP Interface 1 addr 10 10 7 1 Set IP address on backbone network gt gt IP Interface 1 mask 255 255 255 0 Set IP mask on backbone network gt gt IP Interface 1 broad 10 10 7 255 Set the broadcast address gt gt IP Interface 1 enable Enable IP interface 1 gt gt IP Interface 1 if 2 Select menu for IP interface 2 gt gt IP Interface 2 addr 10 10 12 1 Set IP address on stub area network gt gt IP Interface 2 enable Enable IP interface 2 gt gt IP Interface 1 mask 255 255 255 0 Set IP mask on backbone network 2 Enable OSPF gt gt IP Interface 2 cfg ip ospf on Enable OSPF on the Web switch 84 m Chapter 4 OSPF Alteon Systems 212777 A February 2002
526. to secure your switch from virus attacks by configuring the switch with a list of potential offending string patterns HTTP URL request The switch examines the HTTP content of the incoming client request for the matching string pattern If the matching virus pattern is found then the packet is dropped and a reset frame is sent to the offending client SYSLOG messages and SNMP traps are generated warning operators of a possible attack Figure 15 9 shows an incoming client request with a virus string The Web switch is config ured for Layer 7 deny filter so it blocks the incoming packet with the virus string and prevents it from entering the network 1 Client sends a URL request 2 Switch filter processes the string and denies entry to the network Real servers ae Any virus string www playdog com Web Switch Figure 15 9 Configuring Layer 7 Deny Filter Alteon WebSystems Chapter 15 Content Intelligent Switching m 417 212777 A February 2002 Web OS 10 0 Application Guide Configuring a Layer 7 Deny Filter 1 Before you can configure Layer 7 deny filter ensure that the switch has already been con figured for basic switch functions E Assign an IP address to each of the real servers in the server pool E Define an IP interface on the switch For information on how to configure your network for the above tasks see Chapter 6 Server Load Balancing 2 Define the virus string patterns or offendin
527. to support up to eight services limited to a total of 256 services per switch Using the cfg slb virt lt virtual server number gt service option the following TCP UDP applications can be specified NOTE The service number specified on the switch must match the service specified on the server Table 6 3 Well Known Application Ports Number TCP UDP Number TCP UDP Number TCP UDP Application Application Application 20 ftp data 79 finger 179 bgp 21 ftp 80 http 194 irc 22 ssh 109 pop2 220 imap3 23 telnet 110 pop3 389 Idap 25 smtp 111 sunrpc 443 https 37 time 119 nntp 520 rip 42 name 123 ntp 554 rtsp 43 whois 143 imap 1645 1812 Radius 53 domain 144 news 1813 Radius Accounting 69 tftp 161 snmp 1985 hsrp 70 gopher 162 snmptrap NOTE Load balancing some applications such as FTP and RTSP require special attention See Load Balancing Special Services on page 149 for more information 128 m Chapter 6 Server Load Balancing Alteon e Systems A February Web OS 10 0 Application Guide Disabling and Enabling Real Servers If you need to reboot a server you must make sure that new sessions are not sent to the real server and that old sessions are not discarded When the session count gets to zero you may shut down the server Use the following command to disable real servers gt gt Joper slb dis lt real server number gt When maintenance is complete use the following comman
528. tual server IP address Mapping Ports When SLB is used without proxy IP addresses and without DAM the Web switch must pro cess the server to client responses If a client were to access the real server IP address and port directly bypassing client processing the server to client response could be mishandled by SLB processing as it returns through the Web switch with the real server IP address getting remapped back to the virtual server IP address on the Web switch First two port processes must be executed on the real server One real server port will handle the direct traffic and the other will handle SLB traffic Then the virtual server port on the Web switch must be mapped to the proper real server port In Figure 6 8 clients can access SLB services through well known TCP port 80 at the virtual server s IP address The Web switch behaving like a virtual server is mapped to TCP port 8000 on the real server For direct access that bypasses the virtual server and SLB clients can spec ify well known TCP port 80 as the real server s IP address Direct Access iF via Real Server IP amp Port Client Network Virtual Server on the Alteon Web Switch Real Server Layer 4 Mapped Access via Virtual Server IP amp Port Figure 6 8 Mapped and Nonmapped Server Access NOTE Port mapping is supported with DAM when filtering is enabled a proxy IP address is configured or URL parsing is enabled on any switch port
529. ual server routers Each tracked parameter has a user configurable weight associated with it As the count associ ated with each tracked item increases or decreases so does the VRRP router s priority sub ject to the weighting associated with each tracked item If the priority level of a backup is greater than that of the current master then the backup can assume the role of the master See Configuring the Switch for Tracking on page 280 for an example on how to configure the switch for tracking VRRP priority 262 Chapter 11 High Availability Alteon Z Systems 212777 A February 2002 Web OS 10 0 Application Guide High Availability Configurations Alteon Web switches offer flexibility in implementing redundant configurations This section discusses a few of the more useful and easily deployed configurations E Active Standby Virtual Server Router Configuration on page 263 E Active Active VIR and VSR Configuration on page 265 E Active Active Server Load Balancing Configuration on page 267 E VRRP Based Hot Standby Configuration on page 275 Active Standby Virtual Server Router Configuration Figure 11 8 shows an example configuration where two Alteon Web switches are used as VRRP routers in an active standby configuration implementing a virtual server router Active standby redundancy should be used in configurations that cannot support sharing that is con figurations where incoming
530. umber of connections The cfg slb virt command defines the real server TCP or UDP port assigned to a ser vice By default this is the same as the virtual port service virtual port If rport is config ured to be different from the virtual port defined in cfg slb virt lt virtual server number gt service lt virtual port gt the switch maps the virtual port to the real port NOTE To use the single virtual port to multiple rport feature configure this real server port option to be a value of 0 However note that you cannot configure multiple services with mul tiple rports in the same server if the multiple rport feature is enabled Configuring Multiple Service Ports Two commands addport and remport under the real server menu allow users to add or remove multiple service ports associated with a particular server A service port is a TCP or UDP port number For example addport 8001 and remport 8001 1 Configure the real servers gt gt cfg slb real 1 rip 192 168 2 1 ena gt gt real 2 rip 192 168 2 2 ena gt gt real 3 rip 192 168 2 3 ena gt gt real 4 rip 192 168 2 4 ena 2 Add all four servers to a group gt gt cfg slb group 1 gt gt Real server Group 1 add 1 gt gt Real server Group 1 add 2 gt gt Real server Group 1 add 3 gt gt Real server Group 1 add 4 3 Configure a virtual server IP address gt gt cfg slb virt 1 vip 192 168 2 100 ena
531. umbo frames 0 eee eeeeesseeceeeeeeeneeeeeeeeeeeeaaes 63 Global SLB configuration tutorial eee 294 to 303 Distributed Site State Protocol 290 295 DNS resolution diagram ccceeeseeeees 291 domain name configuration eseeeeeeeees 299 health check interval eeeseeeeeseeeeeeeeeees 298 hostname configuration ceeseeeeeeseeeees 299 HTTP redirect ocenenie reiese kene 292 Port STATES iirin rsss rao srr res ea sakosi 297 real server groups seseessseesrreerrreerreerrreeree 296 TEAl SOLVERS E T 296 remote site configuration seeeeeeeeeeeeeeeeeeee 298 E A A a a hanahak 308 using proxy IP pcssa a ioe 304 H half duplex for jumbo frames ceeeseeeeeeeees 63 hash Metre seere E 132 hashing redirection filters eeeeeeeeeseeeeeeeeeeneeeeees 184 fornat oeer i oaei e RE SNE 226 Global SLB interval eeeeeeeeeeesseeeeeeeees 298 hostname for HTTP content 231 to 232 HTTPS SO eane aeoe Eh 240 IMAP S6rver rcseo ereere nns eas Eiei 237 RADIUS Server i sssecsovectoveccovsssovensavensitee 239 real server paramMeters ceeeeceeeeseeeeeeeeees 231 SCript based i s0cc seceveceucevsredevscoes 225 to 229 verifying SCTIPts eee eeeeeeceeseeeceeeeeeeneeeeees 229 wireless session protocol 6 240 to 242 WSP oecas cates cceeseteteccs A E Sea desedesies WTLS high availability Host routes OSPF aeie
532. untagged frames those with no VLAN specified are classified with the sending port s PVID VLAN Tagging Web OS software supports 802 1Q VLAN tagging providing standards based VLAN support for Ethernet systems Tagging places the VLAN identifier in the frame header allowing multiple VLANs per port When you configure multiple VLANs on a port you must also enable tagging on that port Since tagging fundamentally changes the format of frames transmitted on a tagged port you must carefully plan network designs to prevent tagged frames from being transmitted to devices that do not support 802 1Q VLAN tags 44 m Chapter 2 VLANs Alteon WebSystems 212777 A February 2002 Web OS 10 0 Application Guide VLANs and the IP Interfaces Carefully consider how you create VLANs within the switch so that communication with the switch Management Processor MP remains possible You can access the switch for remote configuration trap messages and other management functions only from stations on VLANs that include an IP interface to the switch see IP Inter face Menu section in the Web OS Command Reference Likewise you can cut off access to management functions to any VLAN by excluding IP interfaces from the VLAN s member ship For example if all IP interfaces are left on VLAN 1 the default and all ports are configured for VLANs other than VLAN 1 then switch management features are effectively cut off If an IP interface
533. ve 1 Select the real server group gt gt cfg slb group 1 2 Set the health check type to UDP for the real server group gt gt Real server group 1 health udpdns 3 Set the content to domain name gt gt Real server group 1 content lt filename gt lt host gt lt filename gt none 4 Apply and save your configuration gt gt Real server group 1 apply gt gt Real server group 1 save NOTE If no host name is configured the health check is performed by sending a UDP based query from a dummy host and watching for the server s reply The reply even though negative for example Server not found since the query is from a dummy host serves the purpose of a health check nonetheless Alteon WebSystems Chapter 10 Health Checking m 233 212777 A February 2002 Web OS 10 0 Application Guide FTP Server Health Checks The Internet File Transfer Protocol FTP provides facilities for transferring files to and from remote computer systems Usually the user transferring a file needs authority to login and access files on the remote system This protocol is documented in RFC 1123 In normal Internet operation the FTP server listens on the well known port number 21 for con trol connection requests The client sends a control message which indicates the port number on which the client is prepared to accept an incoming data connection request
534. w to configure your switch for OSPF support Alteon Z Systems 21 212777 A February 2002 Web OS 10 0 Application Guide 22 m Preface Chapter 5 Secure Switch Management describes how to manage the switch using spe cific IP addresses RADIUS authentication Secure Shell SSH and Secure Copy SCP Part 2 Web Switching Fundamentals Chapter 6 Server Load Balancing describes how to configure the Web switch to bal ance network traffic among a pool of available servers for more efficient robust and scal able network services Chapter 7 Filtering describes how to configure and optimize network traffic filters for security and Network Address Translation purposes Chapter 8 Application Redirection describes how to use filters for redirecting traffic to such network streamlining devices as Web caches Chapter 9 Virtual Matrix Architecture describes how to optimize system resources by distributing the workload to multiple processors Chapter 10 Health Checking describes how to configure the Web switch to recognize the availability of the various network resources used with the various load balancing and application redirection features Chapter 11 High Availability describes how to use the Virtual Router Redundancy Pro tocol VRRP to ensure that network resources remain available if one Web switch fails Part 3 Advanced Web Switching Chapter 12 Global Server Load Bal
535. which are locally load balanced according to regular SLB configuration If the site serving the client HTTP content suddenly experiences a failure no healthy real serv ers or becomes overloaded with traffic all real servers reach their maximum connection limit the switch issues an HTTP Redirect and transparently causes the client to connect to another peer site The end result is that the client gets quick reliable service with no latency and no special cli ent side configuration 292 m Chapter 12 Global Server Load Balancing Alteon e systems A February Web OS 10 0 Application Guide Configuring GSLB Configuring GSLB is simply an extension of the configuration procedure for SLB The process is summarized as follows E Use the administrator login to connect to the switch you want to configure E Activate SLB and GSLB software keys See the Web OS Command Reference for details E Configure the switch at each site with basic attributes O Configure the switch IP interface O Configure the default gateways E Configure the switch at each site to act as the DNS server for each service that is hosted on its virtual servers Also configure the local DNS server to recognize the switch as the authoritative DNS server for the hosted services E Configure the switch at each site for local SLB O Define each local real server O Group local real servers into real server groups O Define the local virtual server with its IP addres
536. while failing to retrieve con tent E If content is segregated in different servers or server farms the Web switch must provide a flexible user customizable mechanism allowing a relevant set of application and content tests to be applied to each server or server farm In addition to implementing content intelligent switching the switch periodically performs background functions such as updating network topology measuring server performance and health checking for servers applications and server sites Alteon WebSystems Chapter 15 Content Intelligent Switching 373 212777 A February 2002 Web OS 10 0 Application Guide HTTP Header Inspection Content intelligent switching is performed by inspecting HTTP headers HTTP headers include additional information about requests and responses The HTTP 1 1 specification defines a total of 46 headers For Web Cache Redirection at any given time one HTTP header is supported globally for the entire switch HTTP headers can be general request response or entity headers General headers may exist in both requests and responses Requests and response headers are specific only to requests and responses respectively Entity headers describe the content of the request body or the content of the response body Each HTTP header field consists of a name followed immediately by a colon a single space character and the field value Field names are case insensitive Header fields can be exten
537. witches and simple switches are also possible While such topologies may resolve net working issues in special circumstances they can make configuration more complex and can cause restrictions on the use of advanced features such as Active Active VRRP free metric FWLB or Content Intelligent Switching Alternate topologies are explored in more detail in Web OS FWLB white papers but are not within the scope of this manual 326 Chapter 13 Firewall Load Balancing Alteon 2 systems A February Web OS 10 0 Application Guide As shown in Figure 13 5 the network is divided into four sections E Subnet 1 includes all equipment between the exterior routers and dirty side Web switches E Subnet 2 includes the dirty side Web switches with their interswitch link and dirty side firewall interfaces E Subnet 3 includes the clean side firewall interfaces and clean side Web switches with their interswitch link E Subnet 4 includes all equipment between the clean side Web switches and their servers In this network external traffic arrives through both routers Since VRRP is enabled one of the dirty side Web switches acts as primary and receives all traffic The dirty side primary Web switch performs FWLB in a fashion similar to basic FWLB a redirection filter splits traffic into multiple streams which are routed through the available firewalls to the primary clean side Web switch Just as with the basic method four subnet FWLB uses the h
538. work administrator must configure a username pass word value in the switch using the content option on the SLB Real Server Group Menu cfg slb group To configure the switch for IMAP health checks 1 Select the health check menu for the real server group gt gt cfg slb group 1 Select a real server group 2 Set the health check type to IMAP for the real server group gt gt cfg slb group 1 health imap 3 Configure the health check content gt gt cfg slb group 1 content lt username gt lt password gt The content option specifies the username password value that the server tries to match in its user database In addition to verifying the user name and password the database may spec ify the client s or port s the user is allowed to access 4 Apply and save your configuration gt gt Real server group 1 apply gt gt Real server group 1 save Alteon WebSystems Chapter 10 Health Checking m 237 212777 A February 2002 Web OS 10 0 Application Guide NNTP Server Health Checks Net News Transfer Protocol NNTP is a TCP IP protocol based upon text strings sent bidirec tionally over 7 bit ASCII TCP channels and listens to port 119 It is used to transfer articles between servers as well as to read and post articles NNTP specifies a protocol for the distribu tion inquiry retrieval and posting of news articles using a reliable stream based tran
539. x gt For example the following commands could be used to configure IP interface 14 for a pres ence on the 10 10 10 1 24 network to define OSPF area 1 and to attach the area to the net work gt gt cfg ip if 14 Select menu for IP interface 14 gt gt IP Interface 14 addr 10 10 10 1 Define IP address on backbone network gt gt IP Interface 14 mask 255 255 255 0 Define IP mask on backbone gt gt IP Interface 14 ena Enable IP interface 14 gt gt IP Interface 14 ospf aindex 1 Select menu for area index 1 gt gt OSPF Area index 1 areaid 0 0 0 1 Define area ID as OSPF area 1 gt gt OSPF Area index 1 ena Enable area index 1 gt gt OSPF Area index 1 if 14 Select OSPF menu for interface 14 gt gt OSPF Interface 14 aindex 1 Attach area to network on interface 14 gt gt OSPF Interface 14 enable Enable interface 14 for area index 1 76 Chapter 4 OSPF Alteon Systems 212777 A February 2002 Web OS 10 0 Application Guide Interface Cost The OSPF link state algorithm Dijkstra s algorithm places each routing device at the root of a tree and determines the cumulative cost required to reach each destination Usually the cost is inversely proportional to the bandwidth of the interface Low cost indicates high bandwidth You can manually enter the cost for the output route with the following command gt gt cfg ip ospf if lt OSPF interface
540. ximum of 255 bytes of input are allowed on the switch command line You may remove spaces in between the numbers to save space on the command line For example type 010203040506 instead of 01 02 03 04 05 06 Alteon WebSystems Chapter 10 Health Checking m 241 212777 A February 2002 Web OS 10 0 Application Guide 4 Enter the WSP port gt gt WAP Health Check wspport 9200 5 Set the offset value gt gt WAP Health Check offset 0 6 Because WAP gateways are UDP based and operate on a UDP port configure UDP ser vice in the virtual server menu gt gt cfg slb virt 1 gt gt Virtual Server 1 service Configure virtual service 1 Enter virtual port 9200 On the default WSP port gt gt Virtual Server 1 9200 Service group 1 Set the real server group number gt gt Virtual Server 1 9200 Service udp ena Enable UDP load balancing gt gt Virtual Server 1 9200 Service apply Apply the configuration 7 Enable WSP health checks for group 1 gt gt cfg slb group 1 Select the Real Server Group 1 menu gt gt Real server group 1 health wsp Set the health check type 8 Apply and save the configuration gt gt Real server group 1 apply WTLS Health Checks Wireless Transport Layer Security WTLS can be configured to use ports 9202 and 9203 in connectionless and connection oriented modes respectively The WTLS health check feature provides a WTLS Hell
541. xy IP address before sending the request to the real server This creates the illusion that the switch originated the request The real server uses the switch s proxy IP address as the destination address for any response SLB traffic is forced to return through the proper switch regardless of alternate paths Once the switch receives the proxied data it puts the original client IP address into the destination address and sends the packet to the client This process is transparent to the client NOTE Because requests appear to come from the switch proxy IP address rather than the cli ent source IP address the network administrator should be aware of this behavior during debugging and statistics collection The proxy IP address can also be used for direct access to the real servers see Direct Server Interaction on page 142 136 m Chapter 6 Server Load Balancing Alteon e Systems A February Web OS 10 0 Application Guide The following procedure can be used for configuring proxy IP addresses 1 Disable server processing on affected switch ports When implementing proxies switch ports can be reconfigured to disable server processing Referring to the Table 6 2 on page 126 the following revised port conditions are used Table 6 4 Proxy Example Port Usage Port Host L4 Processing 1 Server A None 2 Server B None 3 Server C None 4 Back end NFS server provides centralized Web content for all three None r
542. y 2002 Web OS 10 0 Application Guide Scenario 2 In this scenario the Web site has multiple virtual server IP addresses and the same user classification or multiple sites use the same string name In this scenario there are two Virtual IP VIP addresses 172 17 1 1 and 172 17 1 2 Both the virtual servers and sites have first class and business class customers with different bandwidth allocations as shown in Figure 17 7 on page 467 vip 172 17 1 1 For VIP 172 17 1 1 First 2Mbs Business 1 Mbs FIRST VIP 172 17 1 2 XN i FIRST N xr lt i i r Client 2 m A 7 lk Z BUSINESS For VIP 172 17 1 2 First 3Mbs Business 2Mbs Figure 17 7 Cookie Based Preferential Services The configuration to support this scenario is similar to Scenario 1 Note the following 1 Configure the string and assign contracts for the strings and services 2 Ifthe same string is used by more than one service and you want to allocate a certain percentage of bandwidth to a user class for this service on the virtual server then define a rule using the urlcont command gt gt cfg slb virt 1 service 80 urlcont lt URL path ID gt lt BW Contract number gt NOTE When assigning cfg slb virt 1 service 80 urlcont contract 1 and cfg slb layer7 1b cont contract 2 to the same URL urlcont will override contract 2 even if contract 2 has higher precedence Alteon WebSystems Chapter 17 B
543. y application and content availability Configuring the Switch for Script Based Health Checks You can configure the switch to send a series of health check requests to real servers or real server groups and monitor the responses ASCII based scripts can be used to verify application and content availability NOTE Only TCP services can be health checked since UDP protocols are usually not ASCII based The benefits of using script based health checks are listed below Ability to send multiple commands Check for any return string Test availability of different applications Test availability of multiple domains or Web sites Web OS supports the following capacity for a single switch M 1024 bytes per script M 16 scripts per switch E approximately 10 to 15 health check statements HTTP get and expect strings A simple command line interface controls the addition and deletion of ASCII commands to each script New commands are added and removed from the end of the script Commands exist to open a connection to a specific TCP port send an ASCII request to the server expect an ASCII string and close a connection The string configured with an expect command is searched for in each response packet If it is not seen anywhere in any response packet before the real server health check interval expires the server does not pass the expect step and fails the health check A script can contain any number of these commands up to the al
544. y for server networks Filters can be configured to allow or deny traffic according to various IP address protocol and Layer 4 port criteria You can also secure your switch from further virus attacks by allowing you to configure the switch with a list of potential offending string patterns For more information see Layer 7 Deny Filter on page 417 This gives the administrator control over the types of traffic permitted through the switch Any filter can be optionally configured to generate system log messages for increased security visibility E Used to map the source or destination IP addresses and ports Generic Network Address Translation NAT can be used to map the source or destination IP addresses and the ports of private network traffic to or from advertised network IP addresses and ports Filtering Criteria Up to 2048 filters can be configured on Alteon 184 and Alteon AD4 Web switches Up to 224 filters are supported on other Alteon Web switches Descriptive names can be used to define filters Each filter can be set to allow deny redirect or translate traffic based on any combina tion of the following filter options E sip source IP address or range see IP Address Ranges on page 178 E dip destination IP address or range dip and dmask 170 Chapter 7 Filtering Alteon e systems A February E proto protocol number or name as shown in Table 7 1 Table 7 1 Well Known Protocol Types Number Protocol N
545. y m 265 212777 A February 2002 Web OS 10 0 Application Guide To implement this example configure the switches as follows 1 Configure the appropriate Layer 2 and Layer 3 parameters on both switches This configuration includes any required VLANs IP interfaces default gateways and so on If IP interfaces are configured none of them should use the VIP address described in Step 4 2 Define all filters required for your network configuration Filters may be configured on one switch and synchronized with the settings on the other switch see Step 5 below 3 Configure all required SLB parameters on one of the switches For the purposes of this example assume that Web switch 1 see Figure 11 9 on page 265 is configured in this step Required Layer 4 parameters include a VIP 205 178 13 226 and one real server group with two real servers RIP 205 178 13 101 and RIP 205 178 13 102 RIP 205 178 13 103 should be configured as a backup server to RIP 205 178 13 101 RIP 205 178 13 104 should be configured as a backup server to RIP 205 178 13 102 NOTE In this configuration each server s backup is attached to the other switch This ensures that operation will continue if all of the servers attached to a switch fail 4 Configure the VRRP parameters on the switch Configure VRID 2 VIP address 205 178 13 226 and priority Be sure to enable sharing 5 Synchronize the SLB and VRRP configurations by pushing the
546. y reducing the overhead for maintaining routing information on a large dynamic network The following sections describe key OSPF concepts Alteon Z Systems 69 212777 A February 2002 Web OS 10 0 Application Guide Types of OSPF Areas An AS can be broken into logical units known as areas In any AS with multiple areas one area must be designated as area 0 known as the backbone The backbone acts as the central OSPF area All other areas in the AS must be connected to the backbone Areas inject sum mary routing information into the backbone which then distributes it to other areas as needed As shown in Figure 4 1 OSPF defines the following types of areas E Stub Area an area that is connected to only one other area External route information is not distributed into stub areas E Not So Stubby Area NSSA similar to a stub area with additional capabilities Routes originating from within the NSSA can be propagated to adjacent transit and backbone areas External routes from outside the AS can be advertised within the NSSA but are not distributed into other areas E Transit Area an area that allows area summary information to be exchanged between routing devices The backbone area 0 any area that contains a virtual link to connect two areas and any area that is not a stub area or an NSSA are considered transit areas 7 Backbone Area 0 gt S Also a Transit Area internal LSA Routes Z
547. ying that the configured threshold is exceeded E Monitors DoS attacks and proactively signals alarm E Provides enhanced security E Improves visibility and protection for DoS attacks The probability of a SYN attack is higher if excessive half open sessions are being generated on the Web switch Half open sessions show an incomplete three way handshake between the server and the client You can view the total number of half open sessions from the stat slb layer7 maint menu To detect SYN attacks the Web switch keeps track of the number of new half open sessions for a set period of time If the value exceeds the threshold then a syslog message and an SNMP trap are generated You can change the default parameters for detecting SYN attacks in the cfg slb adv synatk menu You can specify how frequently you want to check for SYN attacks from 2 seconds to a minute and modify the default threshold representing the number of new half open sessions per second 148 m Chapter 6 Server Load Balancing Alteon 2 Systems A February Web OS 10 0 Application Guide Load Balancing Special Services This section discusses load balancing based on special services such as IP Server Load Balancing FTP Server Load Balancing Domain Name Server DNS Load Balancing a a E E Real Time Streaming Protocol SLB M Wireless Application Protocol SLB E Intrusion Detection System Server Load Balancing a WAN Link Load Balancing IP Server Load Bal
548. ynamically without interrupt ing shared services Network Topology Requirements When deploying SLB there are a few key aspects to consider E IJn standard SLB all client requests to a virtual server IP address and all responses from the real servers must pass through the switch as shown in Figure 6 4 If there is a path between the client and the real servers that does not pass through the switch the Web switch can be configured to proxy requests in order to guarantee that responses use the correct path see Proxy IP Addresses on page 136 Internet a af Router Switch Server Pool 1 Clients pe Be g a Alternate path is not valid with A Layer 4 services IP proxy addresses must be used on the Server Pool 2 Alteon Web switch Figure 6 4 SLB Client Server Traffic Routing E Identical content must be available to each server in the same pool Either of these meth ods can be used O Static applications and data are duplicated on each real server in the pool O Each real server in the pool has access to the same data through use of a shared file system or back end database server 122 m Chapter 6 Server Load Balancing Alteon 2bSystems 212777 A February 2002 Web OS 10 0 Application Guide E Some services require that a series of client requests go to the same real server so that ses sion specific state data can be retained between connections Services of this nature include Web search results multi page forms
549. ync command However care must be taken when using this command to avoid unexpected results All server load balancing port configu rations filter configurations and VRRP parameters can be synchronized using the oper slb synch command NoTE Before you synchronize the configuration between two switches a peer must be con figured on each switch Switches being synchronized must use the same administrator pass word Configure the two switches as peers to each other From Switch 1 configure Switch 2 as a peer and specify its IP address as follows gt gt Main cfg slb syne Select the synchronization menu gt gt Config Synchronization peer 1 Select a peer gt gt Peer Switch 1 addr lt ip address gt Assign switch 2 IP address gt gt Peer Switch 1 enable Enable peer switch Similarly from switch 2 configure switch 1 as a peer and specify its IP address as follows gt gt Main cfg slb syne Select the synchronization menu gt gt Config Synchronization peer 2 Select a peer gt gt Peer Switch 2 addr lt ip address gt Assign switch I IP address gt gt Peer Switch 2 enable Enable peer switch Port specific parameters such as what filters are applied and enabled on what ports are part of what is pushed by the oper slb synch command Thus if the oper slb synch command is used it is highly recommended that the hardware configurations and network con nections

Download Pdf Manuals

image

Related Search

Related Contents

Philips AVENT SCF260/23  取扱説明書 - 三菱電機  OM Lympha Press Plus  Peavey Forum Plus User's Manual  Stampato - Ricon Corporation  Manual de instruções  換気空清機 VL-08 PSR2-BE-D  ANEXO VII FICHA POR ASIGNATURA  Handbuch WinCE 6.0  KP500D - urmet.si  

Copyright © All rights reserved.
Failed to retrieve file