Loadbalancing von Trend Micro's InterScan Web Security Web Gateway - das Handbuch
Dieser Guide beschreibt die Konfiguration eines Loadbalancers für Trend Micro's InterScan Web Security Web Gateway bzw Webfilter Solution. Enthalten sind empfohlene Deployment Szenarios und Konfigurationsdetails.
Die Vorteile:
- keine Unterbrechung wenn ein Web Filter ausfällt
- für Wartungsarbeiten können Web Filter einfach ausgetauscht werden
- für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
Dieser Guide beschreibt die Konfiguration eines Loadbalancers in Verbindung mit McAfee's Web Filter Produktpalette, wie dem McAfee Web Gateway. Enthalten sind empfohlene Deployment Szenarios und Konfigurationsdetails.
Die Vorteile der Verwendung eines Loadbalancers mit dem McAfee -Webfilter bzw. -Contentfilter:
Da sicherer, zuverlässiger und verfügbarer Internet Zugang essentiell und nicht nur einen Luxus darstellt, müssen Massnahmen ergriffen werden um 100% Uptime zu gewährleisten. Loadbalancer.org Appliances bieten Ihnen die perfekte Lösung dafür, indem sie das Deployment von mehreren Content Filter Devices in einem lastverteilten Hochverfügbarkeits Cluster ermöglichen.
Die Vorteile beinhalten:
• Hochverfügbarkeit / High-Availability / HA – Keine Service Unterbrechung wenn ein Web Filter versagt
• Maintenance – für Wartungsarbeiten können Web Filter einfach aus dem Cluster herausgenommen werden
• Performance – für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
Loadbalancer Konfigurations Optionen:
Die folgenden Sektionen beschreiben die verschiedenen Load Balancer Konfigurationsmehoden, welche beim Lastverteilen von Web Filtern möglich sind (und auch Sinn machen)....
Dieser Guide beschreibt die Konfiguration eines Loadbalancers für das BLOXX Web Filter bzw Content Filtering Solution. Enthalten sind empfohlene Deployment Szenarios und Konfigurationsdetails.
Die Vorteile:
- keine Unterbrechung wenn ein Web Filter versagt
- für Wartungsarbeiten können Web Filter einfach ausgetauscht werden
- für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
Load Balancer Deployment Guide für Smoothwall Web Filter
Die Vorteile der Verwendung eines Loadbalancers mit dem Web Filter bzw. Web Proxy von Smoothwall:
Da sicherer, zuverlässiger und verfügbarer Internet Zugang essentiell und nicht nur einen Luxus darstellt, müssen Massnahmen ergriffen werden um 100% Uptime zu gewährleisten. Loadbalancer.org Appliances bieten Ihnen die perfekte Lösung dafür, indem sie das Deployment von mehreren Content Filter Devices in einem lastverteilten Hochverfügbarkeits Cluster ermöglichen.
Die Vorteile beinhalten:
• Hochverfügbarkeit / High-Availability / HA – Keine Service Unterbrechung wenn ein Web Filter versagt
• Maintenance – für Wartungsarbeiten können Web Filter einfach aus dem Cluster herausgenommen werden
• Performance – für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
Motorola solutions wing 4.4 ap51xx access point product reference guide (part...Advantec Distribution
This document provides a product reference guide for the Motorola Solutions AP 5131 wireless access point. It includes sections on new features of the AP 5131 such as WIPS support, trusted host management, and adaptive AP functionality. The guide also covers an overview of the AP 5131's features which include dual radio options, separate LAN and WAN ports, mounting options, quality of service support, security, management access and more. It provides information on the device's capabilities and specifications.
This document is the installation and configuration guide for AARRPPMMiinneerr Version 2.2. It describes the system requirements, installation process, and provides instructions for configuring the software's settings, NAT, authentication, and accounting features. The guide also covers users, application logging, customizing the login interface, supported RADIUS attributes, troubleshooting, and starting the TekSpot service.
This document provides an overview of servers, databases, backups, and other administrative tasks for an SAP system consisting of development, test, and production servers. It describes the servers' roles and services, the development process, and procedures for backups, restores, client copying, and other periodic maintenance activities.
Dieses Handbuch beschreibt die Konfiguration der Loadbalancer.org Geräte für den Einsatz mit VMware Horizon View. Es enthält Informationen über zu lastverteilende Ports / Dienste, Topology Überlegungen für die verschiedenen VMware Horizon View Server und zeigt Schritte auf, wie man die Geräte bzw. Appliances am besten konfiguriert. Für eine Einführung zum Einrichten der Appliances sowie weitere technische Informationen lesen Sie bitte auch unsere Schnellstart-Guides und großen Administrationshandbücher, die auf unserer Website verfügbar sind.
Red hat enterprise_linux-7-load_balancer_administration-en-uschakrikolla
This document provides an overview of load balancing technologies in Red Hat Enterprise Linux 7. It discusses the key components of a load balancer including Keepalived and HAProxy. Keepalived performs failover at the transport layer and load balancing using Linux Virtual Server, while HAProxy provides load balancing for HTTP and TCP services at the application layer. The document describes common load balancer configurations including basic and three-tier setups. It also covers load balancing scheduling methods and how Keepalived and HAProxy can work together for high availability.
Dieser Guide beschreibt die Konfiguration eines Loadbalancers in Verbindung mit McAfee's Web Filter Produktpalette, wie dem McAfee Web Gateway. Enthalten sind empfohlene Deployment Szenarios und Konfigurationsdetails.
Die Vorteile der Verwendung eines Loadbalancers mit dem McAfee -Webfilter bzw. -Contentfilter:
Da sicherer, zuverlässiger und verfügbarer Internet Zugang essentiell und nicht nur einen Luxus darstellt, müssen Massnahmen ergriffen werden um 100% Uptime zu gewährleisten. Loadbalancer.org Appliances bieten Ihnen die perfekte Lösung dafür, indem sie das Deployment von mehreren Content Filter Devices in einem lastverteilten Hochverfügbarkeits Cluster ermöglichen.
Die Vorteile beinhalten:
• Hochverfügbarkeit / High-Availability / HA – Keine Service Unterbrechung wenn ein Web Filter versagt
• Maintenance – für Wartungsarbeiten können Web Filter einfach aus dem Cluster herausgenommen werden
• Performance – für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
Loadbalancer Konfigurations Optionen:
Die folgenden Sektionen beschreiben die verschiedenen Load Balancer Konfigurationsmehoden, welche beim Lastverteilen von Web Filtern möglich sind (und auch Sinn machen)....
Dieser Guide beschreibt die Konfiguration eines Loadbalancers für das BLOXX Web Filter bzw Content Filtering Solution. Enthalten sind empfohlene Deployment Szenarios und Konfigurationsdetails.
Die Vorteile:
- keine Unterbrechung wenn ein Web Filter versagt
- für Wartungsarbeiten können Web Filter einfach ausgetauscht werden
- für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
Load Balancer Deployment Guide für Smoothwall Web Filter
Die Vorteile der Verwendung eines Loadbalancers mit dem Web Filter bzw. Web Proxy von Smoothwall:
Da sicherer, zuverlässiger und verfügbarer Internet Zugang essentiell und nicht nur einen Luxus darstellt, müssen Massnahmen ergriffen werden um 100% Uptime zu gewährleisten. Loadbalancer.org Appliances bieten Ihnen die perfekte Lösung dafür, indem sie das Deployment von mehreren Content Filter Devices in einem lastverteilten Hochverfügbarkeits Cluster ermöglichen.
Die Vorteile beinhalten:
• Hochverfügbarkeit / High-Availability / HA – Keine Service Unterbrechung wenn ein Web Filter versagt
• Maintenance – für Wartungsarbeiten können Web Filter einfach aus dem Cluster herausgenommen werden
• Performance – für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
Motorola solutions wing 4.4 ap51xx access point product reference guide (part...Advantec Distribution
This document provides a product reference guide for the Motorola Solutions AP 5131 wireless access point. It includes sections on new features of the AP 5131 such as WIPS support, trusted host management, and adaptive AP functionality. The guide also covers an overview of the AP 5131's features which include dual radio options, separate LAN and WAN ports, mounting options, quality of service support, security, management access and more. It provides information on the device's capabilities and specifications.
This document is the installation and configuration guide for AARRPPMMiinneerr Version 2.2. It describes the system requirements, installation process, and provides instructions for configuring the software's settings, NAT, authentication, and accounting features. The guide also covers users, application logging, customizing the login interface, supported RADIUS attributes, troubleshooting, and starting the TekSpot service.
This document provides an overview of servers, databases, backups, and other administrative tasks for an SAP system consisting of development, test, and production servers. It describes the servers' roles and services, the development process, and procedures for backups, restores, client copying, and other periodic maintenance activities.
Dieses Handbuch beschreibt die Konfiguration der Loadbalancer.org Geräte für den Einsatz mit VMware Horizon View. Es enthält Informationen über zu lastverteilende Ports / Dienste, Topology Überlegungen für die verschiedenen VMware Horizon View Server und zeigt Schritte auf, wie man die Geräte bzw. Appliances am besten konfiguriert. Für eine Einführung zum Einrichten der Appliances sowie weitere technische Informationen lesen Sie bitte auch unsere Schnellstart-Guides und großen Administrationshandbücher, die auf unserer Website verfügbar sind.
Red hat enterprise_linux-7-load_balancer_administration-en-uschakrikolla
This document provides an overview of load balancing technologies in Red Hat Enterprise Linux 7. It discusses the key components of a load balancer including Keepalived and HAProxy. Keepalived performs failover at the transport layer and load balancing using Linux Virtual Server, while HAProxy provides load balancing for HTTP and TCP services at the application layer. The document describes common load balancer configurations including basic and three-tier setups. It also covers load balancing scheduling methods and how Keepalived and HAProxy can work together for high availability.
Case ih axial flow 7230 combine service repair manual instant download (from ...fudjjskekemmme
This document is a service manual that contains sections about the various mechanical and electrical systems of Case IH Axial-Flow combines. The sections cover topics like the engine, transmission, hydrostatic drive, brakes, hydraulic systems, steering, wheels, tracks, cab climate control, electrical systems, attachments/headers, product feeding, threshing, and separation. It is intended to provide technical information and troubleshooting guidance to service technicians for repairs and maintenance.
Case ih axial flow 7230 combine service repair manual (from pin ydg218533 and...jfjskeksemmme
This document is a service manual for Case IH Axial-Flow combines from model years 7230, 8230, and 9230. It contains instructions for maintenance, repair, and servicing of the engine, transmission, axles, hydraulics, electrical systems, attachments, and other components. Safety warnings are provided throughout and personal protective equipment is recommended when working on the machine. The manual is intended solely for qualified service technicians.
Motorola solutions wing 4.4 ap7131 n access point product reference guide (pa...Advantec Distribution
The document provides reference information about the Motorola Solutions AP 7131N product. It includes a revision history and covers new features of the WiNG 4.4 firmware, an overview of the AP's key features such as 802.11n support, sensor capabilities, security features, and management options. The document is intended to help users understand and configure the capabilities of the AP 7131N.
This document is a final year project proposal submitted by three students - Ahmad Faizan, Hassan Ikram, and Waleed Malik - to their advisor Dr. Shahzad Ahmed Butt. The proposal outlines a remote energy monitoring and appliance controlling system using power line communication. The system would collect power usage data from socket boxes, transmit the data over power lines to a centralized location, and display the information and control appliances through a web interface. The goal is to create a reliable and cost-effective home/commercial automation solution using power line communication to reduce overall power consumption.
The document provides an overview and instructions for an AP 7181 Access Point, including:
- Feature overview of the access point's mesh networking, 802.11n support, security, management, and other capabilities.
- Instructions for hardware installation, including placement, mounting, power and antenna options, and physical connections.
- Details on initial setup and staging of the access point prior to field installation.
This document provides an introduction to Actix's Analyzer LTE training course. The course teaches participants how to use Spotlight and Analyzer software to solve common network problems and optimize LTE performance. It introduces key features of the software and provides tutorials on various analysis types including cell coverage, dropped connections, throughput, and more. Participants will learn how to explore data, perform customized queries and analyses, and generate reports. The goal is to help engineers maximize network quality and return on investment.
This document provides guidelines for achieving the 100% Pure Java standard. It discusses the purpose of the standard which is to ensure portability and common behavior across Java platforms. The document outlines rules for developing pure Java programs, including avoiding the use of native code, file paths, or platform-specific behavior. It also provides hints and explanations of potential portability problems to help developers create fully portable Java applications.
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)Advantec Distribution
This document provides a product reference guide for the AP-51xx Access Point. It describes the new features of the access point, including WIPS support, trusted host management, adaptive AP, rogue AP enhancements, and bandwidth management enhancements. It also provides an overview of the key features of the access point, such as single or dual mode radio options, separate LAN and WAN ports, multiple mounting options, antenna support, sixteen configurable WLANs, quality of service support, industry leading data security, and multiple management accessibility options. The document contains detailed information about the capabilities and specifications of the AP-51xx Access Point.
Here are the steps to set up the DAP-2360 in Access Point mode:
1. Connect the Ethernet cable from the LAN port on the DAP-2360 to your router or switch.
2. Log into the web-based configuration by inputting the IP address of the DAP-2360 (default: http://dlinkap.local) in the address bar of your web browser.
3. Under the Basic Settings menu, click the Wireless radio button and select "Access Point" as the Wireless Mode.
4. Configure the remaining wireless settings, security settings, and save your settings.
5. Connect wireless clients to the newly created wireless network using the SSID and
Dokumen tersebut membahas tentang food additive sintesis dan alami, keuntungan dan kerugian penggunaannya, jenis-jenis food additive beserta contohnya, serta penerapan food additive pada pengolahan pangan khususnya ikan.
Transfer panas merupakan proses penting dalam pengolahan pangan yang terjadi melalui konduksi, radiasi, dan konveksi. Proses ini bergantung pada perbedaan suhu antara sumber dan penerima panas serta hambatan aliran panas di medium. Pemahaman prinsip transfer panas sangat berguna untuk memahami operasi pengolahan pangan seperti pengeringan, pengalengan, dan penggorengan.
The document discusses a submission from the Creative Solvers Team to Venture Lab Stanford University on creativity. In 3 sentences or less, it provides an overview of the high-level topic and essential information contained in the submission without directly copying or paraphrasing the source material.
The document provides a day-by-day account of Marco's experiences leading up to and during his NHL playoff debut with the Minnesota Wild. Some key details:
- Marco gets called up from the AHL's Houston Aeros to join the Wild for the playoffs after they clinch a spot.
- He enjoys the nice weather when he arrives in Minnesota but faces snow storms as well.
- Marco blocks several shots and scores his first playoff goal in the first two games against the Blackhawks, though the Wild lose both games.
- They rebound to win Game 3 on a sunny Sunday in Minnesota before losing Game 4, leaving the series tied 2-2.
Este documento describe las ventajas de los objetos de aprendizaje para estudiantes y profesores, incluyendo la personalización del aprendizaje, la interoperabilidad de los materiales entre plataformas, la inmediatez y accesibilidad de los contenidos, la flexibilidad para adaptarse al ritmo de aprendizaje del estudiante, la posibilidad de reutilizar materiales ya desarrollados, y la durabilidad y capacidad de actualización de los contenidos.
The document summarizes the conjugation of the verb "to be" in English in three tenses: present simple, past simple, and future simple. For each tense, it provides the positive, negative, and interrogative forms for the first, second, and third person singular and plural. The verb "to be" is one of the most important auxiliary verbs in English and it is essential to understand its conjugation in different tenses.
Loadbalancing von Clearswift SECURE Web Gateway - das Handbuch
Dieser Guide beschreibt die Konfiguration eines Loadbalancers für Clearswift's SECURE Web Gateway bzw Webfilter Solution. Enthalten sind empfohlene Deployment Szenarios und Konfigurationsdetails.
Die Vorteile:
- keine Unterbrechung wenn ein Web Filter versagt
- für Wartungsarbeiten können Web Filter einfach ausgetauscht werden
- für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
This presentation is talking about composition of fish meal. Regarding it's change in Protein and lipid we discuss about mechanism of deterioration and processing.
Dokumen tersebut membahas berbagai metode pengolahan ikan tradisional seperti pengeringan, penggaraman, pemindangan, pengasapan, fermentasi, dan pengolahan rumput laut. Juga dibahas faktor-faktor yang mempengaruhi proses pengeringan ikan serta jenis-jenis penggaraman ikan. Metode fermentasi ikan dengan menggunakan ekstrak nenas juga dijelaskan.
Case ih axial flow 7230 combine service repair manual instant download (from ...fudjjskekemmme
This document is a service manual that contains sections about the various mechanical and electrical systems of Case IH Axial-Flow combines. The sections cover topics like the engine, transmission, hydrostatic drive, brakes, hydraulic systems, steering, wheels, tracks, cab climate control, electrical systems, attachments/headers, product feeding, threshing, and separation. It is intended to provide technical information and troubleshooting guidance to service technicians for repairs and maintenance.
Case ih axial flow 7230 combine service repair manual (from pin ydg218533 and...jfjskeksemmme
This document is a service manual for Case IH Axial-Flow combines from model years 7230, 8230, and 9230. It contains instructions for maintenance, repair, and servicing of the engine, transmission, axles, hydraulics, electrical systems, attachments, and other components. Safety warnings are provided throughout and personal protective equipment is recommended when working on the machine. The manual is intended solely for qualified service technicians.
Motorola solutions wing 4.4 ap7131 n access point product reference guide (pa...Advantec Distribution
The document provides reference information about the Motorola Solutions AP 7131N product. It includes a revision history and covers new features of the WiNG 4.4 firmware, an overview of the AP's key features such as 802.11n support, sensor capabilities, security features, and management options. The document is intended to help users understand and configure the capabilities of the AP 7131N.
This document is a final year project proposal submitted by three students - Ahmad Faizan, Hassan Ikram, and Waleed Malik - to their advisor Dr. Shahzad Ahmed Butt. The proposal outlines a remote energy monitoring and appliance controlling system using power line communication. The system would collect power usage data from socket boxes, transmit the data over power lines to a centralized location, and display the information and control appliances through a web interface. The goal is to create a reliable and cost-effective home/commercial automation solution using power line communication to reduce overall power consumption.
The document provides an overview and instructions for an AP 7181 Access Point, including:
- Feature overview of the access point's mesh networking, 802.11n support, security, management, and other capabilities.
- Instructions for hardware installation, including placement, mounting, power and antenna options, and physical connections.
- Details on initial setup and staging of the access point prior to field installation.
This document provides an introduction to Actix's Analyzer LTE training course. The course teaches participants how to use Spotlight and Analyzer software to solve common network problems and optimize LTE performance. It introduces key features of the software and provides tutorials on various analysis types including cell coverage, dropped connections, throughput, and more. Participants will learn how to explore data, perform customized queries and analyses, and generate reports. The goal is to help engineers maximize network quality and return on investment.
This document provides guidelines for achieving the 100% Pure Java standard. It discusses the purpose of the standard which is to ensure portability and common behavior across Java platforms. The document outlines rules for developing pure Java programs, including avoiding the use of native code, file paths, or platform-specific behavior. It also provides hints and explanations of potential portability problems to help developers create fully portable Java applications.
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)Advantec Distribution
This document provides a product reference guide for the AP-51xx Access Point. It describes the new features of the access point, including WIPS support, trusted host management, adaptive AP, rogue AP enhancements, and bandwidth management enhancements. It also provides an overview of the key features of the access point, such as single or dual mode radio options, separate LAN and WAN ports, multiple mounting options, antenna support, sixteen configurable WLANs, quality of service support, industry leading data security, and multiple management accessibility options. The document contains detailed information about the capabilities and specifications of the AP-51xx Access Point.
Here are the steps to set up the DAP-2360 in Access Point mode:
1. Connect the Ethernet cable from the LAN port on the DAP-2360 to your router or switch.
2. Log into the web-based configuration by inputting the IP address of the DAP-2360 (default: http://dlinkap.local) in the address bar of your web browser.
3. Under the Basic Settings menu, click the Wireless radio button and select "Access Point" as the Wireless Mode.
4. Configure the remaining wireless settings, security settings, and save your settings.
5. Connect wireless clients to the newly created wireless network using the SSID and
Dokumen tersebut membahas tentang food additive sintesis dan alami, keuntungan dan kerugian penggunaannya, jenis-jenis food additive beserta contohnya, serta penerapan food additive pada pengolahan pangan khususnya ikan.
Transfer panas merupakan proses penting dalam pengolahan pangan yang terjadi melalui konduksi, radiasi, dan konveksi. Proses ini bergantung pada perbedaan suhu antara sumber dan penerima panas serta hambatan aliran panas di medium. Pemahaman prinsip transfer panas sangat berguna untuk memahami operasi pengolahan pangan seperti pengeringan, pengalengan, dan penggorengan.
The document discusses a submission from the Creative Solvers Team to Venture Lab Stanford University on creativity. In 3 sentences or less, it provides an overview of the high-level topic and essential information contained in the submission without directly copying or paraphrasing the source material.
The document provides a day-by-day account of Marco's experiences leading up to and during his NHL playoff debut with the Minnesota Wild. Some key details:
- Marco gets called up from the AHL's Houston Aeros to join the Wild for the playoffs after they clinch a spot.
- He enjoys the nice weather when he arrives in Minnesota but faces snow storms as well.
- Marco blocks several shots and scores his first playoff goal in the first two games against the Blackhawks, though the Wild lose both games.
- They rebound to win Game 3 on a sunny Sunday in Minnesota before losing Game 4, leaving the series tied 2-2.
Este documento describe las ventajas de los objetos de aprendizaje para estudiantes y profesores, incluyendo la personalización del aprendizaje, la interoperabilidad de los materiales entre plataformas, la inmediatez y accesibilidad de los contenidos, la flexibilidad para adaptarse al ritmo de aprendizaje del estudiante, la posibilidad de reutilizar materiales ya desarrollados, y la durabilidad y capacidad de actualización de los contenidos.
The document summarizes the conjugation of the verb "to be" in English in three tenses: present simple, past simple, and future simple. For each tense, it provides the positive, negative, and interrogative forms for the first, second, and third person singular and plural. The verb "to be" is one of the most important auxiliary verbs in English and it is essential to understand its conjugation in different tenses.
Loadbalancing von Clearswift SECURE Web Gateway - das Handbuch
Dieser Guide beschreibt die Konfiguration eines Loadbalancers für Clearswift's SECURE Web Gateway bzw Webfilter Solution. Enthalten sind empfohlene Deployment Szenarios und Konfigurationsdetails.
Die Vorteile:
- keine Unterbrechung wenn ein Web Filter versagt
- für Wartungsarbeiten können Web Filter einfach ausgetauscht werden
- für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
This presentation is talking about composition of fish meal. Regarding it's change in Protein and lipid we discuss about mechanism of deterioration and processing.
Dokumen tersebut membahas berbagai metode pengolahan ikan tradisional seperti pengeringan, penggaraman, pemindangan, pengasapan, fermentasi, dan pengolahan rumput laut. Juga dibahas faktor-faktor yang mempengaruhi proses pengeringan ikan serta jenis-jenis penggaraman ikan. Metode fermentasi ikan dengan menggunakan ekstrak nenas juga dijelaskan.
This document contains an application portfolio for Android & Java developer Adriyadi Savana. It lists contact information and summaries of several mobile and web applications developed using technologies like Java, Android SDK, Retrofit, Picasso, RxAndroid, Spring MVC, Hibernate and more. The applications include e-commerce platforms, payment systems, inventory and sales management tools for various companies.
Load Balancer Deployment Guide für Smoothwall Web Filter
Die Vorteile der Verwendung eines Loadbalancers mit dem Web Filter bzw. Web Proxy von Smoothwall:
Da sicherer, zuverlässiger und verfügbarer Internet Zugang essentiell und nicht nur einen Luxus darstellt, müssen Massnahmen ergriffen werden um 100% Uptime zu gewährleisten. Loadbalancer.org Appliances bieten Ihnen die perfekte Lösung dafür, indem sie das Deployment von mehreren Content Filter Devices in einem lastverteilten Hochverfügbarkeits Cluster ermöglichen.
Die Vorteile beinhalten:
• Hochverfügbarkeit / High-Availability / HA – Keine Service Unterbrechung wenn ein Web Filter versagt
• Maintenance – für Wartungsarbeiten können Web Filter einfach aus dem Cluster herausgenommen werden
• Performance – für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
Dieser Guide beschreibt die Konfiguration eines Loadbalancers in Verbindung mit McAfee's Web Filter Produktpalette. Enthalten sind empfohlene Deployment Szenarios und Konfigurationsdetails.
Die Vorteile der Verwendung eines Loadbalancers mit dem McAfee -Webfilter bzw. -Contentfilter:
Da sicherer, zuverlässiger und verfügbarer Internet Zugang essentiell und nicht nur einen Luxus darstellt, müssen Massnahmen ergriffen werden um 100% Uptime zu gewährleisten. Loadbalancer.org Appliances bieten Ihnen die perfekte Lösung dafür, indem sie das Deployment von mehreren Content Filter Devices in einem lastverteilten Hochverfügbarkeits Cluster ermöglichen.
Die Vorteile beinhalten:
• Hochverfügbarkeit / High-Availability / HA – Keine Service Unterbrechung wenn ein Web Filter versagt
• Maintenance – für Wartungsarbeiten können Web Filter einfach aus dem Cluster herausgenommen werden
• Performance – für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
Loadbalancer Konfigurations Optionen:
Die folgenden Sektionen beschreiben die verschiedenen Load Balancer Konfigurationsmehoden, welche beim Lastverteilen von Web Filtern möglich sind (und auch Sinn machen)....
LoadRunner enables you to test your system under controlled and peak load conditions. To generate load, LoadRunner runs thousands of Virtual Users that are distributed over a network.
This document provides a user guide for Cambium Wireless Manager (WM) System Release 4.0. It describes launching and using the WM client application, including supported device types, configuring proxies and passwords, using the client window and toolbar, alarm views, applications tree, search utility, and performing operations in table views. The guide also covers help menu options, managing multiple client windows, and references other important WM documents.
This document discusses considerations for business managers regarding the total cost of ownership of SOA gateways. It covers factors like cost of implementation, which can be impacted by a gateway's deployability across hardware, software, and virtual form factors, as well as its extensibility through SDKs and standards support. The cost of ongoing operation is also discussed, including manageability, scalability, reliability, and costs associated with updating and upgrading gateways over time. Layer 7 Technologies is highlighted as offering multiple deployment options and a focus on avoiding vendor lock-in.
Code Collaborator is a code review tool that integrates with version control systems. It allows users to perform reviews of code changes and track issues. The document provides instructions for administrators to install, configure, and manage the Code Collaborator server and for users to conduct reviews through the web interface or client tools. It also describes how to integrate Code Collaborator with various version control systems and other tools.
Code Collaborator is a tool for reviewing code changes. This document provides instructions for administrators on installing, configuring, and maintaining a Code Collaborator server. It also gives developers information for getting started using Code Collaborator. The document covers installing Code Collaborator and supported databases, upgrading servers, configuring security, licensing, and troubleshooting. It provides details on general server settings, user management, and using groups.
The document provides guidance on conducting a proof of concept deployment of Citrix CloudGateway in 3 phases:
1. Deploying AppController and the Citrix Receiver to test application delivery internally without external access.
2. Adding Access Gateway to allow secure external access to the applications already tested internally, which introduces additional configuration challenges.
3. Integrating an existing XenDesktop or XenApp deployment by configuring the Receiver to connect to the existing Web Interface server or by deploying StoreFront for a single unified experience. Each phase is designed to isolate issues to minimize delays or failures in the proof of concept.
Loadbalancing von Barracuda's Web Gateway - das Handbuch
Dieser Guide beschreibt die Konfiguration eines Loadbalancers für Barracuda's Web Gateway bzw Webfilter. Enthalten sind empfohlene Deployment Szenarios und Konfigurationsdetails.
Die Vorteile:
- keine Unterbrechung wenn ein Web Filter ausfällt
- für Wartungsarbeiten können Web Filter einfach ausgetauscht werden
- für zusätzliche Leistung können einfach weitere Content Filter zum Cluster hinzugefügt werden
This document provides an overview of upgrading from Windows 2000 to Windows Server 2003. It discusses choosing the best edition of Windows Server 2003 based on equivalent Windows 2000 editions. It also covers verifying system requirements and hardware compatibility. Additional topics include deciding between upgrade, clean installation, or migration and considerations for Active Directory, applications, and server roles.
This document describes the OpenACC API, which allows programmers to offload compute intensive regions of CPU code to attached accelerators like GPUs. It defines OpenACC directives, runtime routines, and environment variables. Directives are used to specify regions for offloading and augment compiler information. Runtime routines control device behavior and query properties. Environment variables also control device behavior.
This document provides an overview of SAP BTP Connectivity for applications in the Cloud Foundry environment. It describes the Connectivity and Destination services that provide connectivity functionality, connectivity scenarios including connecting applications and HANA databases to on-premise systems, and user roles. The document also references sections on initial setup, developing applications, monitoring, security and the Cloud Connector component.
This document provides best practices for managing and monitoring Oracle Application Server 10g Release 2 (10.1.2) using Oracle Enterprise Manager 10g and Oracle Process Manager and Notification Server (OPMN). It recommends using the deployment wizard and clusters to simplify application deployment and configuration management. It also recommends monitoring application performance and server health metrics to identify bottlenecks and availability issues.
In a vSphere 5.0 environment, virtual network switches provide connectivity for virtual machines running on VMware® ESXi™ hosts to communicate with each other as well as connectivity to the external physical infrastructure. Network administrators want more visibility into this traffic that is flowing in the virtual infrastructure. This visibility will help them monitor and troubleshoot network issues. VMware vSphere 5.0 introduces two new features in the Distributed Switch that provide the required monitoring and troubleshooting capability to the virtual infrastructure.
This document provides a user's guide for MS CRM Connector Release 3.0.3. It discusses what MS CRM Connector is, its system requirements, how to install and configure it, how to operate it, and how to customize the MS CRM server. Key information includes how to configure MS CRM Connector via its interface or configuration file, how to start MS CRM Connector and MS CRM, and how to perform call-related tasks from within MS CRM like calling contacts, answering calls, and more. The document also provides licensing information and discusses error logging.
This document provides an overview and guide to the web services functionality of HP Project and Portfolio Management Center (PPM Center) Software Version 7.5. It describes the available web service operations and special commands across various PPM Center application modules. It also provides information on accessing web services definition files, tools, and configuring web services security on the PPM server.
Intel and Siveo wrote this content which explain how their Cloud Orchestrator is working. You will learn how to configure it, benefit from automatical workload placement feature and manage multiple hypervisors transparently.
This document is an installation and setup guide for the AlarmNet! 7847i/7847i-E Internet/Intranet Communication Modules. The guide contains information on mounting and wiring the module, programming it using different methods like the AlarmNet Direct website or a 7720P programming tool, registering the module, and running network diagnostics. It provides instructions for setting up the module to operate in different modes like ECP, Zone Trigger, 4204, and Two-4204 modes.
This document provides help and documentation for SAP Cloud Integration for data services. It includes information on initial setup such as enabling licenses, creating projects, and moving data. It also describes datastores for connecting to different data sources, how to create and run tasks and processes, and available actions for tasks and processes. The document is a comprehensive guide for getting started with and using SAP Cloud Integration for data services.
This document provides help and documentation for SAP Cloud Integration for data services. It includes information on initial setup such as enabling licenses and creating projects. It also describes key concepts like datastores, tasks, processes and available actions. Specific datastore types and their properties are defined. Guidelines are provided for importing metadata, viewing data, and enabling secure network communications for SAP BW datastores.
Similar to Load-Balancing-des-Trend-Micro-InterScan-Web-Security-WebGateway-Webfilter-das-Handbuch (20)
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
2. Table of Contents
About this Guide............................................................................................................................................... 3
Loadbalancer.org Appliances Supported.......................................................................................................... 3
Loadbalancer.org Software Versions Supported............................................................................................... 3
Trend Micro Web InterScan Gateway Appliances Supported...........................................................................3
Benefits of Implementing a Load Balancer....................................................................................................... 4
Load Balancer Configuration Options............................................................................................................... 4
Layer 4 (Recommended)............................................................................................................................. 4
DR Mode - Direct Server Return Mode (Recommended).......................................................................4
NAT Mode - Network Address Translation Mode....................................................................................4
Layer 7......................................................................................................................................................... 4
SNAT / HAProxy Mode - Source Network Address Translation..............................................................4
Persistence - aka Server Affinity.................................................................................................................. 5
Source IP Address (Recommended)...................................................................................................... 5
Destination Hash.................................................................................................................................... 5
InterScan Gateway Deployment Modes............................................................................................................ 5
1 – Proxy Mode (Recommended)................................................................................................................ 5
2 – Transparent Routed Proxy Mode........................................................................................................... 5
Loadbalancer.org Appliance – the Basics......................................................................................................... 6
Network Configuration................................................................................................................................. 6
Accessing the Web User Interface (WUI).................................................................................................... 7
Clustered Pair Configuration........................................................................................................................ 8
Option 1 - Proxy Mode (Recommended).......................................................................................................... 9
Deployment Architecture.............................................................................................................................. 9
Load Balancer Configuration..................................................................................................................... 10
Create the Virtual Server/Service (VIP)................................................................................................ 10
Create the Real Servers (RIPs)............................................................................................................ 11
InterScan Gateway Configuration.............................................................................................................. 12
Modify the InterScan Gateways to accept traffic for the VIP.................................................................12
Concept........................................................................................................................................... 12
Configuring the Trend Micro Appliance............................................................................................ 12
InterScan Gateway Operating Mode..................................................................................................... 13
Proxy Port Configuration....................................................................................................................... 13
Client Configuration................................................................................................................................... 14
Option 2 - Transparent (Routed) Proxy Mode................................................................................................. 15
Deployment Architecture............................................................................................................................ 15
Load Balancer Configuration..................................................................................................................... 16
Create the Virtual Server/Service (VIP)................................................................................................ 16
Create the Real Servers (RIPs)............................................................................................................ 18
InterScan Gateway Configuration.............................................................................................................. 19
InterScan Gateway Operating Mode..................................................................................................... 19
Router / Default Gateway Configuration.................................................................................................... 20
Client Configuration................................................................................................................................... 20
Testing & Validation......................................................................................................................................... 21
Layer 4 – Current Connections.................................................................................................................. 21
Technical Support........................................................................................................................................... 22
Appendix......................................................................................................................................................... 23
1 – Clustered Pair Configuration – Adding a Slave Unit.............................................................................23
2 – Loadbalancer.org Company Contact Information.................................................................................24
3 – Trend Micro Company Contact Information......................................................................................... 25
2
3. About this Guide
This guide details the configuration of Loadbalancer.org appliances for deployment with Trend Micro's range
of InterScan Gateway products. It includes recommended deployment topologies and also steps on how to
configure the appliances.
For an introduction on setting up the load balancer as well as more technical information, please also refer to
the quick-start guides and full administration manuals which are available at the following links:
Quickstart guide: http://www.loadbalancer.org/pdf/quickstartguideLBv7.pdf
Administration manual: http://www.loadbalancer.org/pdf/loadbalanceradministrationv7.pdf
Loadbalancer.org Appliances Supported
All our products can be used for load balancing Trend Micro InterScan Gateways. The complete list of
models is shown below:
•
Enterprise R16
•
Enterprise
•
Enterprise MAX
•
Enterprise 10G
•
Enterprise R320
•
Enterprise VA
•
Enterprise VA R16
For a full specification comparison of these models please refer to: http://www.loadbalancer.org/matrix.php
Loadbalancer.org Software Versions Supported
•
v7.4.3 and later
Trend Micro Web InterScan Gateway Appliances Supported
•
All versions
N.B. The Trend Micro InterScan Web Security Virtual Appliance (v6.0) was used in the test
environment for this guide.
3
4. Benefits of Implementing a Load Balancer
Since secure, reliable and available Internet access is essential and not just a luxury, steps must be taken to
ensure 100% up time. Loadbalancer.org appliances provide the perfect solution by allowing multiple
InterScan Gateway devices to be deployed in a load balanced and highly available cluster. Benefits include:
•
•
•
High-Availability – If an InterScan Gateway fails, service is not interrupted
Maintenance – InterScan Gateways can easily be taken out of the cluster for maintenance
Performance – For additional performance simply add more InterScan Gateways to the cluster
Load Balancer Configuration Options
The following sections describe the various load balancer configuration methods that are possible when load
balancing InterScan Gateways.
Layer 4 (Recommended)
DR Mode - Direct Server Return Mode (Recommended)
In this mode, traffic from the client to the InterScan Gateway passes via the load balancer, return traffic
passes directly back to the client which maximizes performance. Direct routing works by changing the
destination MAC address of the incoming packet on the fly which is very fast. This mode is transparent by
default meaning that the InterScan Gateway sees the real client IP address and not the IP address of the
load balancer.
Due to its speed, overall simplicity and effectiveness, Direct Routing (DR) mode with source IP persistence is
our recommended method and can be used in both proxy mode & transparent (routed) proxy mode.
NAT Mode - Network Address Translation Mode
This mode requires the implementation of a two-arm infrastructure with an internal and external subnet to
carry out the translation (the same way a firewall works). The real servers (i.e. the InterScan Gateways) must
have their default gateway configured to be the load balancer. It offers high performance and like DR mode is
transparent by default.
Layer 7
SNAT / HAProxy Mode - Source Network Address Translation
Using HAProxy in SNAT mode means that the load balancer is acting as a full proxy and therefore it doesn't
have the same raw throughput as the layer 4 methods. Also, this method is not transparent by default so the
real servers will see the source address of each request as the load balancers IP address. This is generally
not desirable although this can be resolved in two ways; either by reading the X-Forwarded-For header that's
included by default when using HAProxy, or by enabling Tproxy on the load balancer. The issues with using
Proxy are that the default gateway on the real servers (i.e. the InterScan Gateways) must be changed to
point as the load balancer and also it requires a two-arm infrastructure with two subnets which complicates
the deployment.
SNAT mode does not have the raw throughput of the layer 4 solutions and is therefore not normally used for
InterScan Gateway load balancing deployments.
4
5. Persistence - aka Server Affinity
Persistence may or may not be required and depends on the specific InterScan Gateway being used. Two
possible methods are described in the following sections.
Source IP Address (Recommended)
Source IP persistence is the standard method and is appropriate for most requirements. When set, clients
connecting from the same source IP address within the persistence timeout period (the default is 5 mins) will
always be sent to the same InterScan Gateway.
Destination Hash
Another option is to change the load balancing algorithm (i.e. the “scheduler”) to destination hash (DH). This
causes the load balancer to select the proxy based on a hash of the destination IP address. This causes
session requests to be directed at the same server based solely on the destination IP address of a packet
which therefore makes client connections persistent for a particular Internet host.
Since this setting is a scheduler, the way connections are load balanced will also change. However it should
still provide a well balanced distribution of client sessions between InterScan Gateway servers.
InterScan Gateway Deployment Modes
There are two implementation methods that are typically used – Proxy Mode & Transparent (Routed) Proxy
Mode.
1 – Proxy Mode (Recommended)
This mode requires the load balancers VIP address to be defined in users browsers. This means that the
load balancer will receive client requests and distribute these requests across the back-end Web Gateways.
2 – Transparent Routed Proxy Mode
With this mode, client requests must be routed to the load balancer / InterScan Gateway cluster. This can be
achieved by adding rules to the default gateway device. Rules are configured for HTTP traffic on port 80.
NOTE: In transparent mode, web proxies are unable to filter HTTPS traffic. This is because SSL
cannot be proxied transparently. SSL authenticates both sides of the connection and if a proxy is in
the middle, then both sides try to authenticate to the proxy which is incorrect and therefore the
connection fails. NTLM authentication also fails for similar reasons. For HTTPS & NTLM, either the
proxy server must be explicitly configured or traffic should pass directly from the client to the server.
We recommend using proxy mode rather than transparent proxy mode whenever possible due to
these limitations.
5
6. Loadbalancer.org Appliance – the Basics
Network Configuration
The IP address, default gateway and DNS settings can be configured in several ways depending on the
version as detailed below.
v7.5 & Later
Configure the IP address, Default Gateway & DNS Settings
Using the Network Setup Wizard at the console:
After boot, follow the console instructions to configure the IP address, gateway and DNS settings..
Using the WUI:
Using a browser, connect to the WUI on the default IP address/port: http://192.168.2.21:9080
to set the IP address use: Local Configuration > Network Interface Configuration
to set the default gateway use: Local Configuration > Routing
to configure DNS settings use: Local Configuration > Hostname & DNS
Using Linux commands:
At the console, set the initial IP address using the following command:
ip addr add <IP address>/<mask> dev eth0
e.g. ip addr add 192.168.2.10/24 dev eth0
At the console, set the initial default gateway using the following command:
route add default gw <IP address> <interface>
e.g. route add default gw 192.168.2.254 eth0
At the console, set the DNS server using the following command:
echo nameserver <IP address> >> /etc/resolv.conf
e.g. echo nameserver 192.168.64.1 >> /etc/resolv.conf
N.B. If this method is used, you must also configure these settings using the WUI, otherwise settings will be
lost after a reboot
v7.4.3
Configure the IP address & Default Gateway
Using the Network Setup Wizard at the console:
After boot, follow the console instructions to configure the IP address and gateway using the Network Setup
Wizard.
N.B. For these software versions the network setup wizard does not support DNS server configuration. DNS
servers must be defined using the WUI or Linux commands as explained below.
6
7. Configure the IP address, Default Gateway & DNS Settings
Using the WUI:
Using a browser, connect to the WUI on the default IP address:port: http://192.168.2.21:9080
to set the IP address use: Edit Configuration > Network Interface Configuration
to set the default gateway use: Edit Configuration > Routing
to configure DNS settings use: Edit Configuration > Hostname & DNS
Using Linux commands:
At the console, set the initial IP address using the following command:
ip addr add <IP address>/<mask> dev eth0
e.g. ip addr add 192.168.2.10/24 dev eth0
At the console, set the initial default gateway using the following command:
route add default gw <IP address> <interface>
e.g. route add default gw 192.168.2.254 eth0
At the console, set the DNS server using the following command:
echo nameserver <IP address> >> /etc/resolv.conf
e.g. echo nameserver 192.168.64.1 >> /etc/resolv.conf
N.B. If this method is used, you must also configure these settings using the WUI, otherwise settings will be
lost after a reboot
Accessing the Web User Interface (WUI)
The WUI can be accessed from a browser at: http://192.168.2.21:9080/lbadmin
* Note the port number → 9080
(replace 192.168.2.21 with the IP address of your load balancer if its been changed from the default)
Username: loadbalancer
Password: loadbalancer
Once you have entered the logon credentials the Loadbalancer.org Web User Interface will be displayed as
shown below:
The screen shot below shows the v7.5 WUI once logged in:
7
8. Clustered Pair Configuration
Loadbalancer.org recommend that load balancer appliances are deployed in pairs for high availability. In this
guide s single unit is deployed first, adding a secondary slave unit is covered in section 1 of the Appendix.
NOTE: It's highly recommended that you have a working InterScan Gateway environment first
before implementing the load balancer.
8
9. Option 1 - Proxy Mode (Recommended)
Deployment Architecture
Client
PC 1
Client
PC 2
Default
Gateway
Router
Firewall
Internet
Client
PC n
Load Balancer 1
(master)
Heartbeat
Load Balancer 2
(slave)
Trend Micro
InterScan
Gateway 1
Trend Micro
InterScan
Gateway 2
Notes
•
Browser settings on client PC's must be changed to point at the Virtual Server/Service (VIP) on the
load balancer
•
The load balancer(s) must be configured in Layer 4 DR mode
•
The Trend Micro InterScan Gateways must be configured to accept traffic for the VIP (see page 12)
•
Typically, two loadbalancer.org appliances are deployed for resilience – this is our recommended
configuration
•
For more information on Trend Micro InterScan Gateway deployment options please refer to the
following URL: ftp://ftp.antivirus.com/documentation/guides/IWSVA_IG_GM_Final-6-26-13.pdf
9
10. Load Balancer Configuration
Create the Virtual Server/Service (VIP)
NOTE: Prior to v7.5 a VIP is known as a 'Virtual Server', from v7.5 onwards it's known as a 'Virtual
Service'. For simplicity the configuration steps below refer to 'Virtual Service' for both.
•
v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Virtual Services
•
v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Virtual Servers
•
Click [Add a New Virtual Service]
•
Enter the following details:
•
Enter an appropriate label (name) for the VIP, e.g. Proxy
•
Set the Virtual Service IP address field to the required IP address, e.g. 192.168.2.202
•
Set the Virtual Service Ports field to the required port (the same as the InterScan Gateways) , e.g.
8080
•
Ensure that Forwarding Method is set to Direct Return
•
Set Persistent to yes
•
Ensure that Protocol is set to TCP
•
Click Update
10
11. Create the Real Servers (RIPs)
•
v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Real Servers
•
v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Real Servers
•
Click [Add a new Real Server] next to the newly created VIP
•
Enter the following details:
•
Enter an appropriate label (name) for the first Proxy Server, e.g. Proxy1
•
Change the Real Server IP Address field to the required IP address, e.g. 192.168.2.210
•
Click Update
•
Repeat the above steps to add your other InterScan Gateways
11
12. InterScan Gateway Configuration
Modify the InterScan Gateways to accept traffic for the VIP
Concept
As mentioned previously, DR mode is our recommended load balancer operating mode. To use this mode,
changes are required to the real servers, i.e. the InterScan Gateways. The real servers must accept traffic for
the VIP, but they must not respond to any ARP requests for that IP, only the VIP should do this.
To configure a Linux based InterScan Gateway appliance to accept traffic for the VIP the following line must
be added to the rc.local startup script on each InterScan Gateway appliance:
iptables -t nat -A PREROUTING -p tcp -d <VIP address> -j REDIRECT
e.g.
iptables -t nat -A PREROUTING -p tcp -d 192.168.2.202 -j REDIRECT
i.e. Redirect any incoming packets destined for the VIP to the local address
N.B. For more information please refer to the administration manuals and search for 'ARP Problem'
Configuring the Trend Micro Appliance
N.B. These steps must be followed on all Gateways
Login as root either at the console or using a remote ssh session
Edit the file /etc/rc.local using vi, vim or a remote editor such as the one included in WinSCP
Then add the following additional line to this file as shown below:
iptables -t nat -A PREROUTING -p tcp -d <VIP address> -j REDIRECT
12
13. InterScan Gateway Operating Mode
The Trend Micro InterScan Gateway can easily be configured for proxy mode using the deployment wizard
as shown below:
Proxy Port Configuration
The required proxy port (8080 is the default) can also be set using the deployment wizard as shown below:
13
14. Client Configuration
Client browser settings must be set so that browsers connect via the VIP. In a Microsoft based LAN
environment, this is typically achieved using AD group policy.
14
15. Option 2 - Transparent (Routed) Proxy Mode
Deployment Architecture
Client
PC 1
Client
PC 2
Default
Gateway
(see notes below)
Router
Firewall
Internet
Client
PC n
Load Balancer 1
(master)
Heartbeat
Load Balancer 2
(slave)
Trend Micro
InterScan
Gateway 1
Trend Micro
InterScan
Gateway 2
Notes
•
If rules are added to the router so that traffic is sent transparently to the load balancer, no changes
are required to client PC settings
Alternatively, the default gateway on the client PCs should be set to be a floating IP on the load
balancer (to allow master / slave failover)
•
As with non-transparent mode, the load balancer is configured in Layer 4 DR mode
•
Firewall rules must be added to the load balancer to transparently send traffic to the InterScan
Gateways (see page 17)
•
Typically, two loadbalancer.org appliances are deployed for resilience – this is our recommended
configuration
•
For more information on Trend Micro InterScan Gateway deployment options please refer to the
following URL: ftp://ftp.antivirus.com/documentation/guides/IWSVA_IG_GM_Final-6-26-13.pdf
15
16. Load Balancer Configuration
Create the Virtual Server/Service (VIP)
NOTE: Prior to v7.5 a VIP is known as a 'Virtual Server', from v7.5 onwards it's known as a 'Virtual
Service'. For simplicity the configuration steps below refer to 'Virtual Service' for both.
•
v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Virtual Services
•
v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Virtual Servers
•
Click [Add a New Virtual Service]
•
Enter the following details:
•
Enter an appropriate label (name) for the VIP, e.g. Proxy
•
Change the Virtual Service IP address field to 1
N.B. This is the reference number for the 'Firewall Mark' which is required for VIPs with multiple
ports – in this case, ports 80 & 443 are required. This reference is also used when configuring the
firewall rules.
•
Leave Virtual Service Ports blank
•
Ensure that Forwarding Method is set to Direct Routing
•
Set Persistent to yes
•
Ensure that Protocol is set to Firewall Marks
•
Click Update
•
Now click [Modify] next to the newly created VIP
•
Change Check Type to Ping Server
•
Click Update
16
17. •
v7.5 & later – Using the WUI, go to Cluster Configuration > Floating IPs
•
v7.4.3 – Using the WUI, go to Edit Configuration > Floating IPs
•
Enter an appropriate IP address for the Virtual Service, e.g. 192.168.2.202
•
Click Update
•
Using the WUI, go to Maintenance > Firewall Script
•
Scroll down to the Firewall Marks section
•
Add the following lines to this section as shown in the screen shot below:
iptables -t mangle -A PREROUTING -p tcp --dport 80 -j MARK --set-mark 1
ip rule add prio 100 fwmark 1 table 100
ip route add local 0/0 dev lo table 100
•
Click Update
17
18. Create the Real Servers (RIPs)
•
v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Real Servers
•
v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Real Servers
•
Click [Add a new Real Server] next to the newly created VIP
•
Enter the following details:
•
Enter an appropriate label (name) for the first Proxy Server, e.g. Proxy1
•
Change the Real Server IP Address field to the required IP address, e.g. 192.168.2.210
•
Click Update
•
Repeat the above steps to add your other InterScan Gateways
18
19. InterScan Gateway Configuration
InterScan Gateway Operating Mode
The Trend Micro InterScan Gateway can easily be configured for Transparent mode by following the steps
below:
N.B. These steps must be followed on all Gateways
Step 1
Use the Deployment Wizard to configure the appliance in Simple transparency mode as shown below:
Step 2
Login as root either at the console or using a remote ssh session
Edit the file /etc/rc.local using vi, vim or a remote editor such as the one included in WinSCP
Then add the following additional line to this file as shown below:
iptables -t nat -A PREROUTING -p tcp --dport 80 -j REDIRECT --to-port 8080
19
20. NOTE: When using transparent routed mode, it's not necessary to modify the InterScan Gateway to
accept traffic destined for the VIP, this is only required when using proxy mode.
Router / Default Gateway Configuration
Rules must be added to the router/default gateway so that all HTTP traffic is sent to the VIP on the load
balancer. The load balancer then distributes this traffic between the InterScan Gateway servers.
Example iptables rules:
CLIENT="192.168.2.0/24"
FWMARK="10"
TABLE="10"
LOADBALANCER ="192.168.2.204"
iptables -t mangle -A PREROUTING -s $CLIENT -p tcp -m tcp --dport 80 -j MARK --set-mark $FWMARK
ip route flush table $TABLE
ip route add default via $LOADBALANCER dev eth3 table $TABLE
ip rule add fwmark $FWMARK table $TABLE
ip route flush cache
ip route show table $TABLE
route add default gw 192.168.2.1
This example uses policy routing via firewall marks. This works by first selecting and marking the packets we
want to be sent to the proxy, i.e. all packets on port 80. Then, when the kernel goes to make a routing
decision, the marked packets aren't routed using the normal routing table, instead via table 10 in this case.
Table 10 has only one entry: route packets to the InterScan Gateway. HTTPS requests will be sent out via
the firewall bypassing the gateway.
Client Configuration
Once rules are configured on the router as described in the section above, no client change are required.
20
21. Testing & Validation
To verify that the traffic is passing through the load balancer correctly the following reporting options can be
used:
System Overview
Reports > Layer 4 Status
Reports > Layer 4 Current Connections
Many reporting and dashboard options are also available in the Trend Micro user interface. For more details
please refer to the appropriate Trend Micro documentation
Layer 4 – Current Connections
Proxy Mode
The example screen shot below illustrates that the test client (192.168.64.7) sends requests to the VIP
(192.168.111.88), the load balancer then forwards the request onto the Gateway (192.168.64.60).
21
22. Transparent Mode
The example screen shot below illustrates illustrates the difference when running in transparent mode.
Many reporting and dashboard options are also available in the Trend Micro InterScan Gateway user
interface. For more details please refer to the appropriate Trend Micro documentation.
Technical Support
Loadbalancer.org support : support@loadbalancer.org
Trend Micro support : support@trendmicro.com
22
23. Appendix
1 – Clustered Pair Configuration – Adding a Slave Unit
If you initially configured just the master unit and now need to add a slave, please refer the section 'Adding a
slave unit after the master has been configured' in the v7.x administration manual which is available at the
following link: http://www.loadbalancer.org/pdf/loadbalanceradministrationv7.pdf
Don't hesitate to contact our support team if you need any further assistance configuring a slave
appliance: support@loadbalancer.org
23
24. 2 – Loadbalancer.org Company Contact Information
Website
URL : www.loadbalancer.org
North America (US)
Loadbalancer.org, Inc.
270 Presidential Drive
Wilmington,
DE 19807
USA
Tel
Fax
Email (sales)
Email (support)
:
:
:
:
North America (Canada)
+1 866.229.8562 (24x7)
+1 302.213.0122
sales@loadbalancer.org
support@loadbalancer.org
Loadbalancer.org Ltd.
300-422 Richards Street
Vancouver, BC
V6B 2Z4
Canada
Tel
Fax
Email (sales)
Email (support)
:
:
:
:
Europe (UK)
+1 604.629.7575
+1 302.213.0122
sales@loadbalancer.org
support@loadbalancer.org
Loadbalancer.org Ltd.
Portsmouth Technopole
Kingston Crescent
Portsmouth
PO2 8FA
England, UK
Tel
Fax
Email (sales)
Email (support)
:
:
:
:
Europe (Germany)
+44(0)870 4438779 (24x7)
+44(0)870 4327672
sales@loadbalancer.org
support@loadbalancer.org
Loadbalancer.org GmbH
Alt Pempelfort 2
40211 Düsseldorf
Germany
Tel
Fax
Email (sales)
Email (support)
:
:
:
:
+49 (0)30 920 383 6494
+49 (0)30 920 383 6495
vertrieb@loadbalancer.org
support@loadbalancer.org
24
25. 3 – Trend Micro Company Contact Information
Website
Worldwide Support
Options
URL : http://www.trendmicro.com/
Trend Micro support:
support@trendmicro.com
25