Sun System Handbook - ISO 3.4 June 2011 Internal/Partner Edition | |||
|
|
Solution Type Technical Instruction Sure Solution 1005035.1 : Setting Up Sun Fire[TM] Blade 1600 for Load Balancing Secure Socket Layer (SSL) Traffic Using VLANs in Blade 10n and 10p
PreviouslyPublishedAs 207085 Description Sun Fire[TM] B1600 blade platform is used for load balancing SSL traffic using blades (B10n and B10p). The steps below explain in detail with an example of configuring SunFire B1600 for load balancing SSL traffic using VLANs in B10n, B10p, B100s and B1600 switch. Steps to Follow Setting up B1600 for load balancing SSL traffic using VLANs in B10n and B10p The following components will be modified to load balance SSL traffic: 1) B10n 1) B10n Setup Some limits: Configuring the network/vlan: - Set the IP address on interface 0 to 192.4.142.79 with a subnet mask of 255.255.255.0 1.2 config data vlan 10 - Set the data/client VLAN to 10. 1.3 config enable vlan data - Enable the data/client VLAN. 1.4 config management vlan 30 - Set the management VLAN to 30 1.5 config enable vlan management - Enable the management VLAN. Configuring B10p's information: - Create an SSL blade entry on B10n with the name "ssl1" and one interface specified at 192.4.142.58. NOTE: The interface IP address should correspond to the one configured on the SSL blade with the "set management" command. 1.7 config ssl port-pair ssl1 secureport 443 clearport 880 - Add a port pair to the entry with the secureport specified at 443 and the clearport specified at 880. NOTE: This should correspond to the same values specified on B10p blade with the "set portpair" command (see section 2 for B10p setup). Verifying B10p configuration on B10n: - Displays basic information about all the SSL blades configured on B10n 1.9 show ssl ssl1 - Displays detailed information about the SSL blade entry "ssl1". Configuring a Layer 7 SSL service on B10n: - Create an SSL service on B10n that is load balanced on layer 7 for the HTTP protocol. The service "svc1" is bound to interface 0 and is offered at the VIP 192.50.50.2, port 443 and TCP protocol. The port specified after the ssl keyword, i.e., 880, is the decrypted port. NOTE: The VIP specified for the service, i.e., 192.50.50.2 in this example should be configured as the server address in the "create service" command on add netmask to VIP: config vip-netmask {ip addr/hostname} mask netmask 1.11 config service lb-group default svc1 server 192.4.142.71:0:tcp:2:1 - Configure the default load balancing group of the service with 5 servers 192.4.142.71, 192.4.142.80, 192.4.142.74, 192.4.142.75 and 192.4.142.77 and the LB scheme specified as weighted round robin. - B10n Management IP address and Server Management IP address should be on the same subnet. 1.12 config service ssl svc1 ssl ssl1:active - Add the SSL blade entry "ssl1" to the service in an active mode. NOTE: An SSL service cannot be enabled until one or more SSL entries are 1.13 config service vlan svc1 vlan 50 - Set the service VLAN to 50. B10n will tag all traffic from this service, destined to the backend servers with the VLAN ID 50 when VLAN is enabled on the service. 1.14 config enable service vlan svc1 - Enable VLAN tagging for the service. 1.15 config enable service name svc1 - Enable the service "svc1" on B10n. 1.16 commit force - Save the configuration changes Checking the service config on B10n: 2) B10p Setup: 2.1 create key Enter key name: key1 - This creates the key "key1" on B10p. Use "show key" to display all the keys configured on the B10p board. 2.2 create certificate Enter key name: key1 - This creates a certificate using the key "key1". Use "show key" to display the certificate along with the key. 2.3 set routed Enter port number (1..2) (1): 1 - This sets the parameters on port 1 for operation of B10p in the routed mode. NOTE: The router inbound IP address corresponds to the management IP address 2.4 set inband Enter port number (1..2) (1): 1 - This sets the inband (data) IP address on port 1 to 192.100.100.205 with a subnet mask of 255.255.255.0. NOTE: This address has to be on the same subnet as the outbound router IP 2.5 set management Enter port number (1..2) (1): 1 - This sets the management parameters on port 1. The management IP is set to 192.4.142.58 with a subnet mask of 255.255.255.0. NOTE: This is the IP used for health checks towards the inbound router, i.e., 2.6 set vlan client 10 - This sets the client VLAN as 10. NOTE: This is the VLAN on which all SSL encrypted traffic (to be load 2.7 set vlan management Enter port number (1..2) (1): 1 - This sets the management VLAN on port 1 to 30 NOTE: 2.8. set vlan inband Enter port number (1..2) (1): 1 - This sets the inband (data) VLAN on port 1 to 10. NOTE: This is the VLAN on which all health check traffic towards the outbound 2.9 set vlan filter enable - This enables the VLAN filtering on B10p. This means that B10p will not process any incoming traffic on the client VLAN (10 in this example). This filtering is a security measure on B10p. NOTE: For B10n load balancing with B10p, the VLAN filter has to be "enabled". 2.10 set portpair Enter portpair number (1..4) (1): 1 - This configures port pair 1 on B10p with the secure port specified as 443 and the clear port specified as 880. NOTE: Upto 4 such port pairs can be configured on B10p. The maximum value of each port cannot exceed 1000. Each of the 8 ports in the 4 port pairs should be unique. 2.11 create service, e.g., Enter service name: svc1 - This creates a service "svc1" on B10p with the key "key1" associated with it. The service is offered at the IP address 192.50.50.2. The "best" cipher is chosen for this service and port pair 1 (with secure port 443 and clear port 880) is configured for the service. Use "show service" to display all the services configured on the B10p blade. NOTE: Unique keys/certificates should be used for each service configured on a 3) Router Setup (Using a ServerBlade as a router) I) II) 3.1 ifconfig ce0 plumb 192.60.60.254 netmask 255.255.255.0 broadcast + up 3.2 ifconfig ce0 addif 10.4.142.78 netmask 255.255.255.128 broadcast + up 3.3 ifconfig ce10000 plumb 192.50.50.254 netmask 255.255.255.0 broadcast + up 3.4 ifconfig ce10000 addif 192.100.100.254 netmask 255.255.255.0 broadcast + up 3.5 ifconfig ce30000 addif 192.4.142.78 netmask 255.255.255.0 broadcast + up 4) B1600 Switch (SSC0/SWT) Setup: 4.1 Creating VLANs: Console#configure vlan database Console(config-vlan)# Console(config-vlan)#vlan 30 name mgmt-vlan media ethernet - Creates the management VLAN 3o Console(config-vlan)#vlan 10 name client-vlan media ethernet - Creates the client/data VLAN 10 Console(config-vlan)#vlan 50 name service-vlan media ethernet - Creates the service VLAN 50 4.2 Configure slot with B10n (e.g., S15) to allow the management, client and Console#configure Console(config)#interface ethernet SNP15 Console(config-if)# Console(config-if)#switchport allowed vlan add 30 tagged Console(config-if)#switchport allowed vlan add 10 tagged Console(config-if)#switchport allowed vlan add 50 tagged 4.3 Configure slot with B10p to allow the management, client and 4.4 Configure slots with server blades to allow the management, client and 4.5 Configure uplink slot with Router to allow the management and client 4.6 Configure uplink slot with client to allow the management and client 5) Blade Servers' Setup: Note: This example uses SPARC(R) Serverblade ( B100s) 5.1 Download/Install the clbmod packages. 5.2 Configure the interfaces on the server (Assuming, switch 0 is active, so ifconfig ce0 plumb 10.4.142.71 netmask 255.255.255.128 broadcast + up - 10.4.142.71 is assigned to access the server blade from SWAN ifconfig ce30000 plumb 192.4.142.71 netmask 255.255.255.0 up - Configure the real IP on the management vlan 30 - ce3000 will be configured when vlan 30 is used ifconfig ce50000 plumb 188.88.8.5 netmask 255.255.255.0 up - Configure any (unique) IP on the service vlan 50 - There is no use of the 188.88.8.5 IP address ifconfig ce10000 addif 192.100.100.71 netmask 255.255.255.0 up - Configure IP on the client/data vlan 10 to reach the client through the router ifconfig lo0:1 plumb 192.50.50.2 netmask 255.255.255.0 up - Configure the VIP(s) on the loopback interface 5.3 Add the interfaces to the clbmod: 5.4 Load the module: 5.5 Check the interfaces on which the module is plumbed: 5.6 Make sure the servers are not routing, i.e., /etc/notrouter file should 5.7 kstat clbmod 5.8 Configure the bundled Apache Web Server 5.9 Repeat the above steps to configure more ServerBlades (192.4.142.80..74. NOTE: Serverblade sends unencrypted response traffic to B10p blade encryption. 6.) Clients (a ServerBlade can also act as client) - Using external sun machine as a client 6.1) Configure client IP in this example 6.2) Add static route to VIPs 6.3) Launch web browser to access https://192.50.50.2 web page Product Sun Fire B10n Content Load Balancing Blade Sun Fire B10p SSL Proxy Blade Server Sun Fire B1600 Blade System Chassis Sun Fire B100s Blade Server B10n, B10p, VLAN, Load balancer, SSL blade, security Previously Published As 76771 Change History Date: 2004-08-03 User Name: C139400 Action: Approved Comment: added tmarks, expanded acronymns, corrected title, spelling, wording, spacing, format and validation errors, applied KE procedures Version: 2 Attachments This solution has no attachment |
||||||||||||
|