Web OS 10.0 Application Guide
Chapter 16: Persistence
n
437
212777-A, February 2002
SSL Session ID-Based Persistence
SSL is a set of protocols built on top of TCP/IP that allows an application server and client to
communicate over an encrypted HTTP session, providing authentication, non-repudiation, and
security. The SSL protocol handshake is performed using clear (unencrypted) text. The content
data is then encrypted (using an algorithm exchanged during the handshake) prior to being
transmitted.
Using the SSL session ID, the switch forwards the client request to the same real server to
which it was bound during the last session. Because SSL protocol allows many TCP connec-
tions to use the same session ID from the same client to a server, key exchange needs to be
done only when the session ID expires. This reduces server overhead and provides a mecha-
nism, even when the client IP address changes, to send all sessions to the same real server.
N
OTE
–
The destination port number to monitor for SSL traffic is user-configurable.
How SSL Session ID-Based Persistence Works
n
All SSL sessions that present the same session ID (32 random bytes chosen by the SSL
server) will be directed to the same real server.
N
OTE
–
The SSL session ID can only be read by the switch after the TCP three-way hand-
shake. In order to make a forwarding decision, the switch must terminate the TCP connection
to examine the request.
n
New sessions are sent to the real server based on the metric selected (
hash
,
roundrobin
,
leastconns
,
minmisses
,
response
, and
bandwidth
).
n
If no session ID is presented by the client, the switch picks a real server based on the met-
ric for the real server group and waits until a connection is established with the real server
and a session ID is received.
n
The session ID is stored in a session hash table. Subsequent connections with the same
session ID are sent to the same real server. This binding is preserved even if the server
changes the session ID mid-stream. A change of session ID in the SSL protocol will cause
a full three-way handshake to occur.
n
Session IDs are kept on the switch until an idle time equal to the configured server time-
out (a default of 10 minutes) for the selected real server has expired.
Содержание Web OS 10.0
Страница 26: ...Web OS 10 0 Application Guide 26 n Basic Switching Routing 212777 A February 2002...
Страница 116: ...Web OS 10 0 Application Guide 116 n Web Switching Fundamentals 212777 A February 2002...
Страница 168: ...Web OS 10 0 Application Guide 168 n Chapter 6 Server Load Balancing 212777 A February 2002...
Страница 216: ...Web OS 10 0 Application Guide 216 n Chapter 8 Application Redirection 212777 A February 2002...
Страница 288: ...Web OS 10 0 Application Guide 288 n Advanced Web Switching 212777 A February 2002...
Страница 420: ...Web OS 10 0 Application Guide 420 n Chapter 15 Content Intelligent Switching 212777 A February 2002...
Страница 440: ...Web OS 10 0 Application Guide 440 n Chapter 16 Persistence 212777 A February 2002...
Страница 470: ...Web OS 10 0 Application Guide 470 n Chapter 17 Bandwidth Management 212777 A February 2002...
Страница 474: ...Web OS 10 0 Application Guide 474 n Glossary 212777 A February 2002...