Volume 5: Advanced Networking, Version 5.3.1

Volume 5: Advanced Networking, Version 5.3.1

Blue Coat® Systems ProxySG® Appliance Configuration and Management Suite Volume 5: Advanced Networking Version SGOS 5.3.x Volume 5: Advanced Networking Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contactsupport http://www.bluecoat.com For concerns or feedback about the documentation: [email protected] Copyright© 1999-2008 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of Blue Coat Systems, Inc. All right, title and interest in and to the Software and documentation are and shall remain the exclusive property of Blue Coat Systems, Inc. and its licensors. ProxyAV™, CacheOS™, SGOS™, SG™, Spyware Interceptor™, Scope™, ProxyRA Connector™, ProxyRA Manager™, Remote Access™ and MACH5™ are trademarks of Blue Coat Systems, Inc. and CacheFlow®, Blue Coat®, Accelerating The Internet®, ProxySG®, WinProxy®, AccessNow®, Ositis®, Powering Internet Management®, The Ultimate Internet Sharing Solution®, Cerberian®, Permeo®, Permeo Technologies, Inc.®, and the Cerberian and Permeo logos are registered trademarks of Blue Coat Systems, Inc. All other trademarks contained in this document and in the Software are the property of their respective owners. BLUE COAT SYSTEMS, INC. DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL BLUE COAT SYSTEMS, INC., ITS SUPPLIERS OR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF BLUE COAT SYSTEMS, INC. HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Document Number: 231-03014 Document Revision: SGOS 5.3.1 08/2008 ii Contents Contact Information Chapter 1: About Advanced Networking About This Book................................................................................................................................ 13 Document Conventions ................................................................................................................... 14 Notes and Warnings......................................................................................................................... 14 About Procedures ............................................................................................................................. 14 Illustrations ........................................................................................................................................ 15 Chapter 2: Configuring an Application Delivery Network Section A: ADN Overview About the Application Delivery Network Elements ................................................................... 19 Section B: About ADN Deployment, Compression, and Security Behavior Selecting the Correct Deployment.................................................................................................. 24 Transparent Connections .......................................................................................................... 25 Explicit Connections .................................................................................................................. 26 Combination of Transparent/Explicit Connections.............................................................. 27 Choosing Which Traffic to Optimize....................................................................................... 27 About ADN Compression ............................................................................................................... 27 ADN Security .................................................................................................................................... 28 Authenticating and Authorizing ADN Peers......................................................................... 28 Securing ADN Connections...................................................................................................... 29 Section C: Basic ADN Setup About the ADN Manager ................................................................................................................ 30 ADN Connection Behavior for ADN Managers.................................................................... 31 Configuring the ADN Managers.............................................................................................. 32 Section D: Transparent and Explicit Connection Deployments Configuring a Transparent Deployment ....................................................................................... 34 Transparent Deployment Notes............................................................................................... 34 Transparent Load Balancing..................................................................................................... 35 Configuring an Explicit Deployment.............................................................................................38 Managing Server Subnets and Enabling an Internet Gateway............................................ 38 Preserving the Destination Port ............................................................................................... 41 Explicit Load Balancing............................................................................................................. 41 Configuring a Combined (Transparent and Explicit) Deployment .......................................... 44 iii Volume 5: Advanced Networking Section E: Securing the ADN Network Configuring ADN Security Settings .............................................................................................. 47 Setting Device Security.............................................................................................................. 47 Securing Connections ................................................................................................................ 49 Authorizing Devices to Join the Network .............................................................................. 51 Approved/Pending Notes .............................................................................................................. 53 Section F: ADN Network History, Active Sessions, Byte-Caching Statistics, and Health Metrics Reviewing ADN History ................................................................................................................. 54 Reviewing ADN Active Sessions ...................................................................................................55 Reviewing Byte-Caching Statistics................................................................................................. 57 Reviewing ADN Health Metrics ....................................................................................................57 Section G: Advanced Tunnel Optimization Setting Advanced Tunneling Parameters ..................................................................................... 60 Section H: Byte-Cache Dictionary Sizing Understanding Dictionaries............................................................................................................ 64 Understanding Dictionary Sizing............................................................................................ 64 Ranking Peers ............................................................................................................................. 65 Dictionary Sizing Messages......................................................................................................66 Ranking New Peers .......................................................................................................................... 66 Manually Sizing Peers ............................................................................................................... 66 Section I: Related CLI Syntax to Configure an ADN Network Section J: Policy Section K: Troubleshooting Using the Test ADN Diagnostics Command................................................................................ 73 Transparent ADN: Success ....................................................................................................... 73 Transparent ADN: Success but no Upstream ADN Connection ........................................ 74 Explicit ADN: Success ............................................................................................................... 74 Explicit ADN: The Upstream Device is not Functioning ..................................................... 75 Error Codes ................................................................................................................................. 75 Showing the ADN Configuration .................................................................................................. 76 Byte-Cache Configuration CLI Tables .................................................................................... 77 Chapter 3: Preventing Denial of Service Attacks About Attack Detection ................................................................................................................... 79 Configuring Attack-Detection Mode for the Client..................................................................... 80 Changing Global Settings

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    447 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us