Pulse Secure Virtual Traffic Manager: User’s Guide Supporting Pulse Secure Virtual Traffic Manager 18.3 Product Release 18.3 Published 26 November, 2018 Document Version 1.0 Pulse Secure Virtual Traffic Manager: User’s Guide Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 www.pulsesecure.net © 2018 by Pulse Secure, LLC. All rights reserved. Pulse Secure and the Pulse Secure logo are trademarks of Pulse Secure, LLC in the United States. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Pulse Secure, LLC assumes no responsibility for any inaccuracies in this document. Pulse Secure, LLC reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Pulse Secure Virtual Traffic Manager: User’s Guide The information in this document is current as of the date on the title page. END USER LICENSE AGREEMENT The Pulse Secure product that is the subject of this technical documentation consists of (or is intended for use with) Pulse Secure software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at http://www.pulsesecure.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that EULA. © 2018 Pulse Secure, LLC. Pulse Secure Virtual Traffic Manager: User’s Guide Contents PREFACE . 1 DOCUMENT CONVENTIONS . 1 TEXT FORMATTING CONVENTIONS . 1 COMMAND SYNTAX CONVENTIONS . 1 NOTES AND WARNINGS. 2 REQUESTING TECHNICAL SUPPORT . 2 SELF-HELP ONLINE TOOLS AND RESOURCES. 2 OPENING A CASE WITH PSGSC . 3 TRAFFIC MANAGER OVERVIEW . 5 ABOUT THIS GUIDE. 5 INTENDED AUDIENCE . 5 INTRODUCING THE TRAFFIC MANAGER . 5 TYPICAL DEPLOYMENT . 7 TRAFFIC MANAGER PRODUCT VARIANTS. 7 THE TRAFFIC MANAGER COMMUNITY EDITION . 8 SUPPORTED PLATFORMS. 8 SUPPORTED CLUSTER COMBINATIONS. 9 CHAPTER OUTLINE. 10 NETWORK LAYOUTS . 13 ESSENTIALS OF NETWORK CONFIGURATION . 13 DEDICATED MANAGEMENT NETWORK. 14 SIZING YOUR CLUSTER . 15 BACK-END SERVERS . 15 CONTENT MANAGEMENT ON BACK ENDS. 15 FRONT-END SERVERS. 15 IP TRANSPARENCY . 17 ROUTING CONFIGURATION. 18 LOCAL ROUTING PROBLEMS . 19 IP TRANSPARENCY AND TRAFFIC MANAGER CLUSTERS . 19 TRAFFIC IP ADDRESSES AND TRAFFIC IP GROUPS . 19 TRAFFIC IP ADDRESS MODES. 20 EXAMPLE CONFIGURATIONS . 21 USING IP TRANSPARENCY WITH A CLUSTER . 24 ROUTE HEALTH INJECTION AND THE NETWORK. 26 INTRODUCTION TO IPV6. 30 © 2018 Pulse Secure, LLC. i Pulse Secure Virtual Traffic Manager: User’s Guide MAIN FEATURES OF IPV6 IN THE TRAFFIC MANAGER . 30 TECHNICAL RESTRICTIONS. 30 INITIAL CONFIGURATION . .33 ARCHITECTURE CONCEPTS . 33 MANAGING YOUR FIRST SERVICE . 35 USING THE WIZARD TO CREATE A VIRTUAL SERVER AND POOL. 35 CREATING A POOL AND VIRTUAL SERVER MANUALLY . 36 CREATING A CLUSTER . .37 JOINING A CLUSTER . 37 JOINING CLUSTERS WITH TRAFFIC IP GROUPS . 40 VIRTUAL SERVERS. 41 INTRODUCTION . 41 USING VIRTUAL SERVERS . 41 SELECTING A PROTOCOL. 42 APPLYING RULES . 43 SSL DECRYPTION. 44 DECRYPTING SSL PASS-THROUGH TRAFFIC . 45 SERVICE PROTECTION CLASSES. 45 BANDWIDTH MANAGEMENT CLASSES . 45 SERVICE LEVEL MONITORING CLASSES . 46 HTTP CONTENT CACHING. 46 WEB ACCELERATOR . 46 HTTP CONTENT COMPRESSION. ..
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages530 Page
-
File Size-