Search the Wiki

Viewing 81 to 100 of 151 items

Universal persistence

Included in Local Traffic Managers Universal Inspection Engine (UIE) is a set of functions that you can specify within BIG-IP system iRules to direct traffic in more granular ways. Using these iRule functions, you can write expressions that direct traffic based on content data, or direct traffic to a specific member of a pool. Universal  Full Article…

Komentáře nejsou povolené u textu s názvem Universal persistence

SSL persistence

SSL persistence is a type of persistence that tracks SSL sessions using the SSL session ID, and it is a property of each individual pool. Using SSL persistence can be particularly important if your clients typically have translated IP addresses or dynamic IP addresses, such as those that Internet service providers typically assign. Even when  Full Article…

Komentáře nejsou povolené u textu s názvem SSL persistence

Source address affinity persistence

Source address affinity persistence, also known as simple persistence, tracks sessions based only on the source IP address. When a client requests a connection to a virtual server that supports source address affinity persistence, Local Traffic Manager checks to see if that client previously connected, and if so, returns the client to the same pool  Full Article…

Komentáře nejsou povolené u textu s názvem Source address affinity persistence

SIP persistence

Session Initiation Protocol is an application-layer protocol that manages sessions consisting of multiple participants, thus enabling real-time messaging, voice, data, and video. A session can be a simple two-way telephone call or Instant Message dialogue, or a complex, collaborative, multi-media conference call that includes voice, data, and video. With SIP, applications can communicate with one  Full Article…

Komentáře nejsou povolené u textu s názvem SIP persistence

Microsoft RDP persistence

Normally, Windows servers running Microsoft Terminal Services can use a session broker (known as Terminal Services Session Directory in Windows Server 2003 and TS Session Broker in Windows Server 2008) to ensure that user sessions are assigned to specific servers. If a client initiates a connection request to the wrong terminal server, that server redirects  Full Article…

Komentáře nejsou povolené u textu s názvem Microsoft RDP persistence

Hash persistence

Hash persistence allows you to create a persistence hash based on an existing iRule that uses the persist iRule command. Using hash persistence is the same as using universal persistence, except that with hash persistence, the resulting persistence key is a hash of the data, rather than the data itself. rule my_persist_irule { when HTTP_REQUEST  Full Article…

Komentáře nejsou povolené u textu s názvem Hash persistence

Destination address affinity persistence

You can optimize your server array with destination address affinity persistence. Destination address affinity persistence, also known as sticky persistence, directs requests for a certain destination IP address to the same server, regardless of which client made the request. This type of persistence provides the most benefits when load balancing caching servers. A caching server  Full Article…

Komentáře nejsou povolené u textu s názvem Destination address affinity persistence

Cookie persistence

Cookie persistence uses an HTTP cookie stored on a clients computer to allow the client to reconnect to the same pool member previously visited at a web site. There are 3 methods of cookie persistence available: HTTP Cookie Insert method HTTP Cookie Rewrite method HTTP Cookie Passive method HTTP Cookie Insert method If you specify  Full Article…

Komentáře nejsou povolené u textu s názvem Cookie persistence

Persistence introduction

Session is a virtual channel created between client and server via which these two communicates. One session can be made of many connections. And some application servers maintain a client state in its memory and thus are session sensitive. For example e-shops app. servers can stores shopping card info in its memory and if we  Full Article…

Komentáře nejsou povolené u textu s názvem Persistence introduction

Profiles

What are profiles? The BIG-IP® local traffic management system can manage application-specific network traffic in a variety of ways, depending on the protocols and services being used. For example, you can configure the BIG-IP system to compress HTTP response data, or you can configure the system to authenticate SSL client certificates before passing requests on  Full Article…

Komentáře nejsou povolené u textu s názvem Profiles

LTM Essentials – LAB

Most important stuff from the LAB are as follows: floating IP address is the shared IP between F5 cluster tried that setup utility but dont know if I gonna use it ever again backups are easy to handle Tmos seems to be very good. From root you can execute tmos commands via „tmsh list /net  Full Article…

Komentáře nejsou povolené u textu s názvem LTM Essentials – LAB

TMOS Shell

TMOS Shell or TMSH is very nice CLI. It is easy to configure and navigate. Below you can find some basic info how to work with tmsh. Tmos works in modular fashion. You can check list of modules by command show /? Yes „?“ works like in Cisco. The „/“ is the root and modules  Full Article…

Komentáře nejsou povolené u textu s názvem TMOS Shell

Load Balancing

BIG-IP LTM offers a many load balancing methods to choose from: Static – these methods do no take into consideration the server performance Round robin Ratio Dynamic – take into consideration server performance Least connections Fastest Observed Predictive Dynamic ratio It is important to note that LB distributes the request on available servers only. Server  Full Article…

Komentáře nejsou povolené u textu s názvem Load Balancing

Where to continue with ACE

You should read wiki for ACE http://docwiki.cisco.com/wiki/Cisco_ACE_4700_Series_Appliance_Quick_Start_Guide,_Release_A3%281.0%29_–_Overview for better understanding.

Komentáře nejsou povolené u textu s názvem Where to continue with ACE

Management and Load balancing

We have many management options for Cisco ACE: telnet/ssh, http tacacs/radius for acces XML API – you can create your own gui or tools for sending commands For ACE4710 a build in gui is available For ACE10/20/30 and ACE4710, ANM (application network monitoring, its just GUI) is available Global server load balancing (GSLB) GSS (global  Full Article…

Komentáře nejsou povolené u textu s názvem Management and Load balancing

LTM essentials

LTM is shiped with OS, you dont need to install it. It has also preconfigured IP address. However you need to active license. License reactivation must be done also after upgrades. LTM does not have pre configured default route. Initial setup consist of couple of steps depending what I need to setup. Basically it is:  Full Article…

Komentáře nejsou povolené u textu s názvem LTM essentials

Virtualization techniques and abilities

Cisco ACE support visualization like in ASA in context behavior. ACE device allows up to 255 contexts to be created. Each context is a sandbox, that means you can restrict amount of resources for each context. Context are allocated resources by the Admin context. Each context has its own FT group and can fail over  Full Article…

Komentáře nejsou povolené u textu s názvem Virtualization techniques and abilities

ACE features and capabilities

L3-L7 load balancing – you can check IP, port, cookie. SSL encryption and decryption in HW – servers in general doesnt have special HW for encryption and decryption. It hits its CPU. thats why its better to put this to LB. HTTP Optimization and Compression – saves bandwidth in HTTP communication, HTTP optimization keeps track  Full Article…

Komentáře nejsou povolené u textu s názvem ACE features and capabilities

Introduction

ACE (Application control engine) is a device that utilizes intelligent NAT to load balance traffic to servers Load balancing decisions can be based on any information within the L3 to L7 data. ACE handles all primary functions in hardware and has many, many hardware processors that are specific to each task it needs to do.  Full Article…

Komentáře nejsou povolené u textu s názvem Introduction

Introduction to IPv6

There are many issues with IPv4 which leads to development of IPv6 protocol. Some of them are: Adress depletion Internet routing table expansion Lack of true end-to-end model (NAT in IPv4 necessary) Features of IPv6 Larger address space – IPv6 addresses are 128 bit. This number is so big that you can allocate every molecule  Full Article…

0