Alteon Application Switch Operating System Application Guide
Table of Contents
30 Document ID: RDWR-ALOS-V2900_AG1302
Limitations for WLM Support ............................................................................................. 336
Chapter 14 – Offloading SSL Encryption and Authentication.......................... 337
SSL Offloading Implementation ................................................................................ 337
SSL Policies ............................................................................................................. 338
Certificate Repository ............................................................................................... 338
Certificate Types in the Certificate Repository .................................................................. 339
Importing and Exporting Certificate Components to and from the Repository .................. 340
SSL Server Certificate Renewal Procedure ...................................................................... 342
Client Authentication Policies ................................................................................... 343
Common SSL Offloading Service Use Cases .......................................................... 343
Chapter 15 – Filtering and Traffic Manipulation................................................. 355
Basic Filtering Features ............................................................................................ 356
Filtering Benefits ............................................................................................................... 356
Filtering Classification Criteria ........................................................................................... 356
Filtering Actions ................................................................................................................. 357
Stacking Filters .................................................................................................................. 358
Overlapping Filters ............................................................................................................ 358
Default Filter ...................................................................................................................... 359
Optimizing Filter Performance ........................................................................................... 359
Filtering with Network Classes .......................................................................................... 360
IP Address Ranges ........................................................................................................... 360
Filter Logs ......................................................................................................................... 361
Cached Versus Non-Cached Filters .................................................................................. 362
Logging Non-Cached Filter Hits ........................................................................................ 362
Filtering Enhancements ............................................................................................ 363
Reverse Session ............................................................................................................... 363
Return to Proxy ................................................................................................................. 363
Layer 7 Invert Filter ........................................................................................................... 363
Load Balancing Modes ............................................................................................. 364
Transparent Load Balancing ............................................................................................. 364
Semi-Transparent Load Balancing .................................................................................... 367
Non-Transparent Load Balancing ..................................................................................... 371
MAC-Based Filters for Layer 2 Traffic ...................................................................... 373
VLAN-Based Filtering ............................................................................................... 373
Filtering on 802.1p Priority Bit in a VLAN Header .................................................... 376
802.1p Priorities ................................................................................................................ 376
Classifying Packets Based on 802.1p Priority Bits ............................................................ 376
Persistence for Filter Redirection ............................................................................. 377
Filter-Based Security ................................................................................................ 379
Network Address Translation ................................................................................... 384
Static NAT ......................................................................................................................... 384