GEO. Feature Description GEO VERSION: 1.4 UPDATED: MARCH Feature Description

Size: px
Start display at page:

Download "GEO. Feature Description GEO VERSION: 1.4 UPDATED: MARCH Feature Description"

Transcription

1 GEO VERSION: 1.4 UPDATED: MARCH 2014 Copyright KEMP Technologies, Inc. All Rights Reserved. Page 1 / 21

2 Copyright Notices Copyright KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP Technologies, Inc.. KEMP Technologies, Inc. reserves all ownership rights for the LoadMaster product line including software and documentation. The use of the LoadMaster Exchange appliance is subject to the license agreement. Information in this guide may be modified at any time without prior notice. Microsoft Windows is a registered trademarks of Microsoft Corporation in the United States and other countries. All other trademarks and service marks are the property of their respective owners. Limitations: This document and all of its contents are provided as-is. KEMP Technologies has made efforts to ensure that the information presented herein are correct, but makes no warranty, express or implied, about the accuracy of this information. If any material errors or inaccuracies should occur in this document, KEMP Technologies will, if feasible, furnish appropriate correctional notices which Users will accept as the sole and exclusive remedy at law or in equity. Users of the information in this document acknowledge that KEMP Technologies cannot be held liable for any loss, injury or damage of any kind, present or prospective, including without limitation any direct, special, incidental or consequential damages (including without limitation lost profits and loss of damage to goodwill) whether suffered by recipient or third party or from any action or inaction whether or not negligent, in the compiling or in delivering or communicating or publishing this document. Any Internet Protocol (IP) addresses, phone numbers or other data that may resemble actual contact information used in this document are not intended to be actual addresses, phone numbers or contact information. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual addressing or contact information in illustrative content is unintentional and coincidental. Portions of this software are; copyright (c) Frank Denis. All rights reserved; copyright (c) 2002 Michael Shalayeff. All rights reserved; copyright (c) 2003 Ryan McBride. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE ABOVE COPYRIGHT HOLDERS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The views and conclusions contained in the software and documentation are those of the authors and should not be interpreted as representing official policies, either expressed or implied, of the above copyright holders.. Portions of the LoadMaster software are copyright (C) 1989, 1991 Free Software Foundation, Inc. -51 Franklin Street, Fifth Floor, Boston, MA , USA- and KEMP Technologies Inc. is in full compliance of the GNU license requirements, Version 2, June Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Portions of this software are Copyright (C) 1988, Regents of the University of California. All rights reserved. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 2 / 21

3 Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Portions of this software are Copyright (C) 1998, Massachusetts Institute of Technology Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Portions of this software are Copyright (C) , Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Portions of this software are Copyright (C) 2003, Internet Systems Consortium Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Used, under license, U.S. Patent Nos. 6,473,802, 6,374,300, 8,392,563, 8,103,770, 7,831,712, 7,606,912, 7,346,695, 7,287,084 and 6,970,933 Copyright KEMP Technologies, Inc. All Rights Reserved. Page 3 / 21

4 Table of Contents 1 Introduction Document Purpose Intended Audience GEO Example Deploying GEO Enable/Disable GEO GEO Homepage DNS Responder Client Source IP DNS Integration/Delegation DNS Responder System Configuration Stickiness Fully Qualified Domain Name (FQDN) Add an FQDN Manage Clusters Add a Cluster Modify a Cluster Delete a Cluster IP Range Selection Criteria Certificates Distributed LoadMaster Partners Configuring GEO for Exchange Site Resiliency Delaying a Failover Requiring Manual Intervention Before Failback Occurs Configuring Site Resiliency Options for Exchange References Document History Copyright KEMP Technologies, Inc. All Rights Reserved. Page 4 / 21

5 1 Introduction GEO offers the ability to move past the single data center, allowing for multi data center high availability. Even when a primary site is down, traffic is diverted to the disaster recovery site. Also included in GEO is the ability to ensure clients connect to their fastest performing and geographically closest data center. The GEO product is available in two forms: A standalone GEO product A Global Server Load Balancing (GSLB) Feature Pack that is part of the KEMP load balancer (LoadMaster) product Throughout this document, when we refer to the LoadMaster we are referring to either the GEO LoadMaster or the LoadMaster with the GSLB Feature Pack enabled. GEO has the same management interfaces as KEMP s Server LoadMaster hardware appliances, including all the foundation technology such as syslog logging, notifications, interface bonding, and Gigabit support. GEO provides advanced application health checking, to ensure that unavailable services or data centers are not visible to clients. Health checking can occur at the services level or even the site level, allowing for flexible decision making on when traffic should be diverted per Fully Qualified Domain Name (FQDN). GEO offers Round Robin load balancing for all active data centers, which includes support for weights and a chained failover option for disaster recovery. Regional load balancing allows GEO to direct a client to a data center based on the client's country or continent, as defined by the created policies. Location-based takes Regional one step further and allows for longitude and latitude granularity for definition of proximity. GEO securely and seamlessly integrates with LoadMaster to offer Real Server Load load balancing, in which GEO uses local data center metrics provided by LoadMaster, allowing clients to connect to the least busy data center. GEO can be deployed in a distributed (active/active) high availability configuration, with both appliances securely synchronizing information. Introducing GEO into existing Authoritative Domain Name Services (DNS) requires minimal integration work and risk, allowing you to fully leverage the existing DNS investment. 1.1 Document Purpose The purpose of this document is to describe the functionality of the GEO product. 1.2 Intended Audience This document is intended to be read by anyone who is interested in learning more about KEMP s GEO product and its features. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 5 / 21

6 2 GEO Example This section describes how the GEO functionality typically works. Please note that within this configuration we are depicting the LoadMaster as being located outside the Data Centers. Though this can be the case, typically the LoadMaster would be located within one or more of the Data Centers. Figure 2-1: LoadMaster Overview 1. A client enters a website address, for example into the address bar of their web browser. 2. The resolution request is passed to the Authoritative DNS Server for the domain. 3. Usually the Authoritative DNS Server would resolve the request but in this case the authority has been delegated to the LoadMaster. 4. The Authoritative DNS Server has an A record pointing to the LoadMaster and a corresponding PTR record for the reverse lookup by IP. For each hostname that has been delegated to the LoadMaster, an Name Server (NS) record will have been created and set to the A record created for the LoadMaster, for example: Record Types (A and PTR) lm1.example.com = Record Type (NS) = lm1.example.com 5. The Authoritative DNS Server passes the resolution request to the LoadMaster. 6. The LoadMaster looks up the list of configured FQDNs to decide what IPs the FQDN resolves to. In this case, the FQDN resolves to either Data Center A ( ) or Data Center B ( ). 7. The LoadMaster knows if both of the Data Centers are healthy or not as it is performing regular health checks. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 6 / 21

7 8. The LoadMaster decides which IP address to resolve the request to, based on the Selection Criteria. In this case, we assume that the request is resolved to Data Center A ( ). If, for some reason, Data Center A failed the health check, the request would have resolved to Data Center B. 9. The LoadMaster passes the IP address back to the DNS Server which passes it back to the client. 10. The client connects directly to Data Center A ( ). Copyright KEMP Technologies, Inc. All Rights Reserved. Page 7 / 21

8 3 Deploying GEO The sections below refer to various aspects of GEO deployment. 3.1 Enable/Disable GEO GEO can be enabled or disabled by clicking either the Enable GSLB or Disable GSLB menu option under Global Balancing in the main menu of the LoadMaster WUI. When GEO is enabled, the Packet Routing Filter is enabled by default and cannot be disabled. When GEO is disabled, it is possible to either enable or disable the Packet Routing Filter in System Configuration > Access Control > Packet Filter. 3.2 GEO Homepage Figure 3-1: GEO Homepage When using the standalone GEO product, the homepage will look like the screenshot above. The following information is displayed on this screen: IP address: the IP address of the LoadMaster Machine Identifier: the Media Access Control (MAC) address of the LoadMaster Boot Time: the time of the last server reboot LoadMaster Version: the firmware version of the LoadMaster License: the activation date and end date of the LoadMaster license CPU Load: The percentage of load to the CPU of the LoadMaster appliances and to the CPU running a Virtual LoadMaster (VLM) Net Load: shown for each configured interface. The CPU Load and Net Load data is updated every 5 seconds. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 8 / 21

9 3.3 DNS Responder Before setting up GEO, take a moment to consider how GEO will fit into your network. GEO has been designed for a one armed topology, either behind a firewall which is forwarding (Port Address Translation (PAT)/Network Address Translation (NAT) Overload) DNS traffic to the eth0 (Port 0) of the LoadMaster or at the network edge with no firewall. There is no technical restriction to placing the LoadMaster before or parallel to a firewall and assigning a Public IP to Port 0. GEO is not supported in a two-arm setup. In a one-armed configuration, the DNS responder service can be configured for any subnet. The LoadMaster connects to a Layer 2 network through a single interface, eth0. Throughout this documentation the terms eth0, Port 0 and Network side may be used interchangeably. Figure 3-2: DNS Responder If a firewall is already in place performing PAT to a DMZ in a non-routable (RFC1918) IP space (e.g., x.x or 10.x.x.x), please make sure a 1-to-1 PAT for port 53 UDP/TCP exists to the LoadMaster. KEMP does not recommend a Layer 3 source IP NAT to the LoadMaster as it will mask source IP visibility during geographical coding operations, all devices before the LoadMaster should be transparent. The LoadMaster(s) can be located on the DMZ with no large-scale network changes required. As shown in Figure 3-2 the default gateway of LoadMaster should point to the firewall. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 9 / 21

10 3.4 Client Source IP When referring to client source IP, we are taking about the client resolver of the workstation, not the source IP of the workstation or its corresponding NAT to the Internet. This is an important concept to understand; client IPs are of the corresponding DNS resolver. The LoadMaster s geographical encoding operations are based on this client IP. A common deployment for client DNS resolvers is depicted in the diagram below. Figure 3-3: Client Source IP In the illustration above, the following steps occur: 1. The client workstation asks the local DNS server for a translation of 2. The local DNS server forwards the request to an ISP or Internet DNS server. 3. The ISP/Internet server has the relevant A records and NS records pointing to the LoadMaster. It is important to understand that it is step 3, within the described configuration, which defines the client IP address as presented to the LoadMaster, not step 1 or step DNS Integration/Delegation Integrating the LoadMaster with your Authoritative DNS can be completed with only a few DNS records: 1. Create a new A record which is pointed to the LoadMaster, for example lm1.example.com. Create the corresponding PTR record for the reverse lookup by IP. Forward-confirmed reverse DNS support is required. 2. For each hostname that needs to be delegated to the LoadMaster, create a NS record and set the value to the A record created for the LoadMaster in the previous step, for example to lm1.example.com. 3. For a HA configuration, repeat step 1 for the second LoadMaster using a unique hostname, for example lm2.example.com. Repeat step 2 using the second LoadMaster. This results in 2 NS records for one pointing to lm1.example.com and one to lm2.example.com. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 10 / 21

11 3.6 DNS Responder System Configuration Configuration of global parameters controls the behavior of the entire LoadMaster. The Source of Authority information is not required for basic functionality; however this metadata should be populated to accurately represent the LoadMaster DNS server. Resource Check Parameters define the global health checking that occurs from LoadMaster to Clusters and Real Servers. Stickiness defines how long persistence will exist and the Location Data Patch defines the version of the GEO data files being used by the LoadMaster and allows updates to be installed. The options can be found by selecting the Global Balancing > Miscellaneous Params option in the main menu of the Web User Interface (WUI). For more information on what each of the fields in this menu option mean, refer to the Web User Interface (WUI), Configuration Guide Stickiness Figure 3-4: Stickiness Global Server Load Balancing Persistence, also known as Stickiness, is the property that enables all name resolution requests from an individual client to be sent to the same set of resources until a specified period of time has elapsed. This ensures that users are able to retrieve and interact with session-specific data. For further information, refer to the GEO Sticky DNS,. 3.7 Fully Qualified Domain Name (FQDN) A Fully Qualified Domain Name (FQDN) is the hostname in which you need to perform load balancing. The FQDN can be any hostname in the top-level domain or a hostname that is nested as a sub-domain. Each FQDN is considered an A record. Each distinct hostname must be configured in the LoadMaster individually. You can create an FQDN for and also Domainless hostnames are also supported, such as mail Add an FQDN To add an FQDN, follow the steps below: 1. In the main menu, select Global Balancing and Manage FQDNs. Figure 3-5: Configure FQDN Copyright KEMP Technologies, Inc. All Rights Reserved. Page 11 / 21

12 2. Click the Add FQDN button. Figure 3-6: Add an FQDN 3. Enter an FQDN name, for example in the New Fully Qualified Domain Name textbox. Wildcards are supported here, for example *.example.com matches anything with.example.com ending. 4. Click the Add FQDN button. 5. Click OK on the message that appears. Figure 3-7: Configure FQDN 6. Select the relevant load balancing algorithm from the Selection Criteria drop-down list. For more information on the selection criteria, refer to the GEO, Product Overview. 7. Enter the IP address of the domain in the IP address text box. 8. If needed, select the Cluster name. 9. Click the Add Address button. Figure 3-8: Configure FQDN 10. Select the type of health checking to be performed from the Checker drop-down list. For further information regarding health checking options, refer to the GEO, Product Overview document. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 12 / 21

13 3.8 Manage Clusters A cluster is a group of LoadMasters working in conjunction. Clusters can be added, modified and deleted from the Global Balancing > Manage Clusters menu option Add a Cluster To add a cluster, follow the steps below: 1. Click the Add Cluster button. Figure 3-9: Add Cluster 2. Enter the IP address of the cluster. 3. Enter a Name for the cluster. 4. Click the Add Cluster button Modify a Cluster Figure 3-10: Add a Cluster Figure 3-11: Configured Clusters To modify an existing cluster, follow the steps below: 1. Click the Modify button on the relevant cluster. 2. Change the settings as needed. The Type can be Default, Remote LM or Local LM. Figure 3-12: Modify Cluster Copyright KEMP Technologies, Inc. All Rights Reserved. Page 13 / 21

14 When Default is selected, either Icmp Ping or Tcp Connect can be selected as the health check type in the Checkers drop-down list. When Remote LM or Local LM is selected, no health check options are available. Local LM is required if a LoadMaster is co-located with the GSLB Feature Pack. If needed, click the Show Locations button to enter the latitude and longitude of the location of the IP address Delete a Cluster To delete a cluster, click the Delete button in the Configured Clusters screen. There is no undo function here. Delete with care. 3.9 IP Range Selection Criteria In the IP Range Selection Criteria menu option you can specify a location or country that apply to an IP address or range. To do this, follow the steps below: 1. In the main menu of the LoadMaster WUI, select Global Balancing. 2. Select IP Range Selection Criteria. 3. Click Add IP. Figure 3-13: IP Range Selection Figure 3-14: Add a new IP address 4. Enter the IP Address or network. Valid entries here are either a single IP, for example , or a network in Classless Inter-Domain Routing (CIDR) format, for example / Click Add Address. Figure 3-15: IP address configured 6. Click Modify. 7. Specify the location by entering the coordinates and click Save. Alternatively, select the country from the Countries drop-down list. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 14 / 21

15 Figure 3-16: Modify/Delete buttons The existing IP ranges can be modified or deleted via the buttons provided on the IP Range Selection Criteria screen. 8. In the main menu of the LoadMaster WUI, select Manage FQDNs. 9. Click Modify on the relevant FQDN. Figure 3-17: Configured FQDNs Figure 3-18: Selection Criteria 10. If you entered a Location via the coordinates in the IP Range Selection Criteria screen, select Location Based in the Selection Criteria drop-down list. If you selected a country, select Regional Certificates The Certificates option in the main menu of the LoadMaster WUI allows you to import and manage SSL certificates. It also gives the ability to generate a Certificate Signing Request (CSR). For more information and step-by-step instructions relating to the Certificates screens, refer to the SSL Accelerated Services, Distributed LoadMaster Partners When there are multiple LoadMaster boxes, where each box could be a single LoadMaster or a HA pair, they can be linked together to act as a single resource, similar to a cluster. All the boxes remain synchronized with each other and share their DNS Configurations, FQDN information, Stickiness information and health checking updates. Any updates are automatically shared with all the other Distributed Partners. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 15 / 21

16 Figure 3-19: Distributed GEO Partners The Geographical IP Database used for the Location and Regional load balancing methods is not distributed between the LoadMaster partners. Any updates to the Geographical IP Database must be configured on each LoadMaster individually. To configure LoadMaster partners: 1. Select the System Configuration > Miscellaneous Options > Remote Access option from the main menu. Figure 3-20: Remote Access 2. In the GEO LoadMaster Partners text box, enter the IP address of the LoadMaster to partner with. If there is more than one box, enter the IP addresses but separate them with a space. 3. Click the Set GEO LoadMaster access button. 4. Enter the port number that the LoadMasters will use to communicate in the GEO LoadMaster Port text box. 5. Click Set GEO LoadMaster Port. 6. In the GEO update interface drop-down list, select the GEO interface that the GEO partners will communicate through. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 16 / 21

17 4 Configuring GEO for Exchange Site Resiliency Microsoft Exchange data center or site failures require a combination of both automatic and manual steps to be completed before client service is fully restored and for the outage to end. The manual steps, mainly centred on the administration of the mailbox databases, pose some unique issues regarding an Exchange data center failover which are not found in other types of site failures. GEO functionality provides options to Exchange administrators to assist in dealing with the unique issues posed by an Exchange data center failover. 4.1 Delaying a Failover Implementing an Exchange data center failover is not a trivial event - it is not recommended to automatically failover upon detection of a site failure. Delaying the failover for a short period ensures that failovers do not occur because of trivial and temporary failures. Delaying the failover can also provide the Exchange administrators time to ensure that the secondary site is ready to provide the requisite levels of service. The LoadMaster provides a Failure Delay option which, when enabled, delays a failover occurring for a configurable period of time after a site failure has been detected. If, after the delay, the site has recovered, the failover is not initiated. If the site has not recovered, the failover is initiated as per normal. 4.2 Requiring Manual Intervention Before Failback Occurs It is recommended that, when a failed data center recovers, attempting to restore services to the recovered data center is not initiated (a failback) before the initial failover process is complete and until the recovered data center is deemed to be healthy and the mailbox databases are ready for use. If the failback is initiated before these are complete then issues may arise with the mailbox databases and prolong the outage. KEMP strongly recommended not to allow automatic failbacks when a failed data center recovers. Requiring some manual intervention before a recovered data center is deemed available for a failback means that administrators can ensure that the optimal conditions exist before a failback occurs. The LoadMaster provides Site Recovery Mode options which determine how a failed data center becomes available for failback upon recovery. Selecting the manual option configures the LoadMaster to administratively disable the failed data center upon the initiation of a failover. This ensures that, even if the failed data center recovers, administrator intervention would be required before the data center is available for a failback to occur. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 17 / 21

18 4.3 Configuring Site Resiliency Options for Exchange GEO functionality provides options to Exchange administrators to assist in dealing with the unique issues posed by an Exchange data center failover. These options can be found within the Site Failure Handling section of the FQDN configuration page which is accessed as follows: 1. In the main menu, go to Global Balancing > Manage FQDNs. Figure 4-1: Configured Fully Qualified Names 2. Click the Modify button for the relevant FQDN. Failure Delay Figure 4-2: Configure FQDN This setting determines how long (in minutes) the LoadMaster will wait until it designates a site as having failed, thereby initiating a site failover. It is recommended that this setting is enabled when configuring multi-site Exchange deployments. The optimal value given to the delay will depend on the configuration of the Exchange deployment. Site Recovery Mode This determines what recovery options are implemented when a failed site recovers. Automatic - when the data center recovers, the LoadMaster automatically performs a failback (restores services to the recovered data center) Manual - upon failure, the data center is administratively disabled and is not available for a failback until the admin clicks the Enable button for the relevant data center The Manual option is recommended for multi-site Exchange deployments to ensure that failbacks do not occur until the administrators ensure that the optimal conditions for a failback exist. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 18 / 21

19 The Lockdown option has been deprecated and will only be available to people who upgrade with this configuration enabled. If you do not have the configuration enabled or if you change any of the Site Failure Handling options then it will not be available. The Lockdown option is not recommended as a Site Recovery Mode option. Copyright KEMP Technologies, Inc. All Rights Reserved. Page 19 / 21

20 References Unless otherwise specified, the following documents can be found at Web User Interface (WUI), Configuration Guide GEO Sticky DNS, GEO, Product Overview SSL Accelerated Services, Copyright KEMP Technologies, Inc. All Rights Reserved. Page 20 / 21

21 Document History Date Change Reason for Change Version Resp. Sep 2013 Initial draft Initial draft of document 1.0 LB Oct 2013 Minor changes Minor aesthetic changes 1.1 LB Jan 2014 Release updates Updates for release 1.2 LB Feb 2014 Release updates Updates for release 1.3 LB Mar 2014 Release updates Updates for release 1.4 LB Copyright KEMP Technologies, Inc. All Rights Reserved. Page 21 / 21

Splunk. Splunk. Deployment Guide

Splunk. Splunk. Deployment Guide Deployment Guide VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

LoadMaster VMware Horizon (with View) 6. Deployment Guide

LoadMaster VMware Horizon (with View) 6. Deployment Guide LoadMaster VMware Horizon (with View) 6 Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the

More information

VMware vcenter Log Insight Manager. Deployment Guide

VMware vcenter Log Insight Manager. Deployment Guide VMware vcenter Log Insight Manager Deployment Guide VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Adobe Connect. Adobe Connect. Deployment Guide

Adobe Connect. Adobe Connect. Deployment Guide Deployment Guide VERSION: 1.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Packet Trace Guide. Packet Trace Guide. Technical Note

Packet Trace Guide. Packet Trace Guide. Technical Note Packet Trace Guide Technical Note VERSION: 2.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

Moodle. Moodle. Deployment Guide

Moodle. Moodle. Deployment Guide Moodle Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

RSA Two Factor Authentication

RSA Two Factor Authentication RSA Two Factor Authentication Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Epic. Epic Systems. Deployment Guide

Epic. Epic Systems. Deployment Guide Epic Systems Deployment Guide VERSION: 1.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are

More information

Migration Tool. Migration Tool (Beta) Technical Note

Migration Tool. Migration Tool (Beta) Technical Note Migration Tool (Beta) Technical Note VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

LoadMaster Clustering

LoadMaster Clustering Introduction LoadMaster Clustering Feature Description VERSION: 9.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

Hyper-V - Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

Hyper-V - Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 5.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc..

More information

NTLM NTLM. Feature Description

NTLM NTLM. Feature Description Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

KEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide

KEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide KEMP LBaaS Red Hat OpenStack Driver Installation Guide VERSION: 2.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

LoadMaster for Azure (Marketplace Classic Interface)

LoadMaster for Azure (Marketplace Classic Interface) LoadMaster for Azure (Marketplace Classic Interface) Feature Description VERSION: 8.0 UPDATED: OCTOBER 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

LoadMaster VMware Horizon Access Point Gateway

LoadMaster VMware Horizon Access Point Gateway LoadMaster VMware Horizon Access Point Gateway Deployment Guide VERSION: 1.0 UPDATED: OCTOBER 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

MS Lync MS Lync Deployment Guide

MS Lync MS Lync Deployment Guide MS Lync 2013 Deployment Guide VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

Edge Security Pack (ESP)

Edge Security Pack (ESP) Edge Security Pack (ESP) VERSION: 1.2 UPDATED: SEPTEMBER 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 22 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..

More information

MS Skype for Business. Microsoft Skype for Business Deployment Guide

MS Skype for Business. Microsoft Skype for Business Deployment Guide Microsoft Skype for Business 2015 Deployment Guide VERSION: 7.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

SDN Adaptive Load Balancing. Feature Description

SDN Adaptive Load Balancing. Feature Description SDN Adaptive Load Balancing Feature Description VERSION: 5.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

LoadMaster Clustering (Beta)

LoadMaster Clustering (Beta) Introduction LoadMaster Clustering (Beta) Feature Description VERSION: 5.0 UPDATED: OCTOBER 2015 Copyright Notices Copyright 2002-2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and

More information

Configuring Real Servers for DSR

Configuring Real Servers for DSR Configuring Real Servers for DSR VERSION: 1.1 UPDATED: JULY 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 20 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..

More information

VMware Horizon Workspace. VMware Horizon Workspace 1.5. Deployment Guide

VMware Horizon Workspace. VMware Horizon Workspace 1.5. Deployment Guide VMware Horizon Workspace 1.5 Deployment Guide VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

DirectAccess. Windows Server 2012 R2 DirectAccess. Deployment Guide

DirectAccess. Windows Server 2012 R2 DirectAccess. Deployment Guide Windows Server 2012 R2 DirectAccess Deployment Guide VERSION: 9.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

Web Application Firewall (WAF) Feature Description

Web Application Firewall (WAF) Feature Description Web Application Firewall (WAF) Feature Description VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Health Checking. Health Checking. Feature Description

Health Checking. Health Checking. Feature Description Feature Description VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

Condor for Cisco UCS B-Series Blade Servers

Condor for Cisco UCS B-Series Blade Servers Condor for UCS Condor for Cisco UCS B-Series Blade Servers VERSION: 1.3 UPDATED: MARCH 2015 Copyright 2002-2015 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 25 Condor for UCS Copyright Notices

More information

SSL Accelerated Services. SSL Accelerated Services for the LM FIPS. Feature Description

SSL Accelerated Services. SSL Accelerated Services for the LM FIPS. Feature Description SSL Accelerated Services for the LM5305 - FIPS Feature Description VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Content Switching with Exchange and Lync-related Workloads

Content Switching with Exchange and Lync-related Workloads Content Switching with Exchange and Lync-related Workloads Technical Note VERSION: 6.0 UPDATED: JULY 2016 AUTHOR: Michael Van Horenbeek Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All

More information

Kerberos Constrained Delegation. Kerberos Constrained Delegation. Feature Description

Kerberos Constrained Delegation. Kerberos Constrained Delegation. Feature Description Kerberos Constrained Delegation Feature Description VERSION: 9.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Virtual LoadMaster for Xen (Para Virtualized)

Virtual LoadMaster for Xen (Para Virtualized) Virtual LoadMaster for Xen (Para Virtualized) VERSION: 1.10 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 18 Copyright Notices Copyright 2002-2014 KEMP Technologies,

More information

Virtual LoadMaster for KVM (Para Virtualized)

Virtual LoadMaster for KVM (Para Virtualized) Virtual LoadMaster for KVM (Para Virtualized) Installation Guide VERSION: 1.8 UPDATED: SEPTEMBER 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 17 Copyright Notices Copyright

More information

Web User Interface (WUI) LM FIPS

Web User Interface (WUI) LM FIPS Web User Interface (WUI) LM5305 - FIPS Configuration Guide VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the

More information

Web User Interface (WUI) LM5305 FIPS

Web User Interface (WUI) LM5305 FIPS Web User Interface (WUI) LM5305 FIPS VERSION: 1.1 UPDATED: JULY 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 86 Copyright Notices Copyright 2002-2013 KEMP Technologies,

More information

Web User Interface (WUI)

Web User Interface (WUI) 2201 Web User Interface (WUI) Configuration Guide VERSION: 11.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

LoadMaster Deployment Guide

LoadMaster Deployment Guide LoadMaster Deployment Guide For Microsoft Lync 2010 Version: 1.5 Updated: November 2012 Copyright Notices Copyright 2002-2012 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

Exchange 2016 Deployment Guide. Exchange Deployment Guide

Exchange 2016 Deployment Guide. Exchange Deployment Guide Exchange 2016 Deployment Guide Exchange 2016 Deployment Guide VERSION: 3.0 UPDATED: JULY 2016 Introduction Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Command Line Interface (CLI)

Command Line Interface (CLI) Command Line Interface (CLI) VERSION: 1.1 UPDATED: JULY 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 30 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..

More information

Tenable Hardware Appliance Upgrade Guide

Tenable Hardware Appliance Upgrade Guide Tenable Hardware Appliance Upgrade Guide June 4, 2012 (Revision 3) The newest version of this document is available at the following URL: http://static.tenable.com/prod_docs/tenable_hardware_appliance_upgrade.pdf

More information

Open Source Used In Cisco Configuration Professional for Catalyst 1.0

Open Source Used In Cisco Configuration Professional for Catalyst 1.0 Open Source Used In Cisco Configuration Professional for Catalyst 1.0 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on

More information

iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP)

iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP) iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP) June 11, 2015 Chapter 1 Files This section describes the files iwrite utilizes. 1.1 report files An iwrite report consists

More information

KEMP LoadMaster. KEMP LoadMaster. Product Overview

KEMP LoadMaster. KEMP LoadMaster. Product Overview Product Overview VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Bar Code Discovery. Administrator's Guide

Bar Code Discovery. Administrator's Guide Bar Code Discovery Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring the application...4 Configuring Bar Code Discovery...4

More information

Microsoft Exchange Microsoft Exchange Deployment Guide

Microsoft Exchange Microsoft Exchange Deployment Guide Microsoft Exchange 2010 Deployment Guide VERSION: 8.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Documentation Roadmap for Cisco Prime LAN Management Solution 4.2

Documentation Roadmap for Cisco Prime LAN Management Solution 4.2 Documentation Roadmap for Cisco Prime LAN Thank you for purchasing Cisco Prime LAN Management Solution (LMS) 4.2. This document provides an introduction to the Cisco Prime LMS and lists the contents of

More information

Microsoft Hyper-V Installation Guide

Microsoft Hyper-V Installation Guide Installation Guide VERSION: 11.0 UPDATED: August 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered

More information

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008 IETF TRUST Legal Provisions Relating to IETF Documents Approved November 6, 2008 Effective Date: November 10, 2008 1. Background The IETF Trust was formed on December 15, 2005, for, among other things,

More information

Simba Cassandra ODBC Driver with SQL Connector

Simba Cassandra ODBC Driver with SQL Connector Simba Cassandra ODBC Driver with SQL Connector Last Revised: March 26, 2013 Simba Technologies Inc. Copyright 2012-2013 Simba Technologies Inc. All Rights Reserved. Information in this document is subject

More information

Windows Server 2012 R2 DirectAccess. Deployment Guide

Windows Server 2012 R2 DirectAccess. Deployment Guide Windows Server 2012 R2 DirectAccess Deployment Guide UPDATED: 11 January 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies

More information

Open Source Used In TSP

Open Source Used In TSP Open Source Used In TSP 3.5.11 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.

More information

Disaster Recovery Guide

Disaster Recovery Guide Disaster Recovery Guide BlackBerry UEM Version 12.9 Published: 2018-07-16 SWD-20180628140917721 Contents Overview... 4 Servers and services... 4 About BEMS servers... 4 BlackBerry Proxy... 5 Example of

More information

Installation and Configuration Guide for Visual Voic Release 8.5

Installation and Configuration Guide for Visual Voic Release 8.5 Installation and Configuration Guide for Visual Voicemail Release 8.5 Revised October 08, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009 IETF TRUST Legal Provisions Relating to IETF Documents February 12, 2009 Effective Date: February 15, 2009 1. Background The IETF Trust was formed on December 15, 2005, for, among other things, the purpose

More information

Microsoft Print Server. Deployment Guide

Microsoft Print Server. Deployment Guide Deployment Guide UPDATED: 11 January 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks of

More information

Cover Page. Video Manager User Guide 10g Release 3 ( )

Cover Page. Video Manager User Guide 10g Release 3 ( ) Cover Page Video Manager User Guide 10g Release 3 (10.1.3.3.0) March 2007 Video Manager User Guide, 10g Release 3 (10.1.3.3.0) Copyright 2007, Oracle. All rights reserved. Contributing Authors: Bruce Silver

More information

Management Software Web Browser User s Guide

Management Software Web Browser User s Guide FS900M Series Fast Ethernet Switches Management Software Web Browser User s Guide 613-002073 Rev. A Copyright 2014, Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced

More information

MS Lync Deployment Guide

MS Lync Deployment Guide Deployment Guide UPDATED: 11 January 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks of

More information

Ecma International Policy on Submission, Inclusion and Licensing of Software

Ecma International Policy on Submission, Inclusion and Licensing of Software Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being

More information

Enterprise Payment Solutions. Scanner Installation April EPS Scanner Installation: Quick Start for Remote Deposit Complete TM

Enterprise Payment Solutions. Scanner Installation April EPS Scanner Installation: Quick Start for Remote Deposit Complete TM Enterprise Payment Solutions Complete TM Portions of this software: Copyright 2004-2013 Apache Software Foundation Copyright 2005 Paul Querna Copyright 2008 Marc Gravell Copyright 2000-2007 Niels Provos

More information

Ecma International Policy on Submission, Inclusion and Licensing of Software

Ecma International Policy on Submission, Inclusion and Licensing of Software Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being

More information

SkyPilot OS Installation: Fedora Core 5

SkyPilot OS Installation: Fedora Core 5 SkyPilot OS Installation: Fedora Core 5 PN 671-00024-01 2006 SkyPilot Networks, Inc. All rights reserved This publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose.

More information

Cisco Meeting Management

Cisco Meeting Management Cisco Meeting Management Cisco Meeting Management 1.1 User Guide for Administrators September 19, 2018 Cisco Systems, Inc. www.cisco.com Contents 1 Introduction 4 1.1 The software 4 2 Deployment overview

More information

Remote Desktop Services Deployment Guide

Remote Desktop Services Deployment Guide Deployment Guide VERSION: 10.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Polycom RealPresence Resource Manager System

Polycom RealPresence Resource Manager System Upgrade Guide 8.2.0 July 2014 3725-72106-001E Polycom RealPresence Resource Manager System Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into

More information

Copyright PFU LIMITED

Copyright PFU LIMITED -------------------------------------------------------- PaperStream Capture 1.0.12 README File -------------------------------------------------------- Copyright PFU LIMITED 2013-2015 This file contains

More information

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program )

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program ) PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT

More information

Open Source Used In c1101 and c1109 Cisco IOS XE Fuji

Open Source Used In c1101 and c1109 Cisco IOS XE Fuji Open Source Used In c1101 and c1109 Cisco IOS XE Fuji 16.8.1 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco

More information

Conettix Universal Dual Path Communicator B465

Conettix Universal Dual Path Communicator B465 Conettix Universal Dual Path Communicator B465 en Release Notes Conettix Universal Dual Path Communicator Table of contents en 3 Table of contents 1 Introduction 4 1.1 Requirements 4 2 Version 2.00.000

More information

POWERLINK QUICK START MANUAL V2.8

POWERLINK QUICK START MANUAL V2.8 POWERLINK QUICK START MANUAL V2.8 3500 Holly Lane North, Suite 60 Plymouth, MN 55447 Phone: (800) 669-6242 Fax:(763) 551-0664 www.astrocorp.com TABLE OF CONTENTS POWERLINK... 1 FCC COMPLIANCE STATEMENT...

More information

KEMP 360 Central Activation Server

KEMP 360 Central Activation Server KEMP 360 Central Activation Server Feature Description VERSION: 7.0 UPDATED: JANUARY 2017 Table of Contents 1 Introduction... 3 1.1 Document Purpose... 3 1.2 Intended Audience... 3 1.3 Prerequisites...

More information

Juniper Networks Steel-Belted Radius Carrier

Juniper Networks Steel-Belted Radius Carrier Juniper Networks Steel-Belted Radius Carrier Installation Guide Release 8.3.0 Modified: 2017-03-07 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

User Guide. Calibrated Software, Inc.

User Guide. Calibrated Software, Inc. User Guide Calibrated Software, Inc. Copyright 2008 Calibrated Software, Inc. All rights reserved. www.calibratedsoftware.com Your rights to the software are governed by the accompanying Software License

More information

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program )

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program ) PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT

More information

Nokia Intrusion Prevention with Sourcefire. Appliance Quick Setup Guide

Nokia Intrusion Prevention with Sourcefire. Appliance Quick Setup Guide Nokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide Part Number N450000567 Rev 001 Published September 2007 COPYRIGHT 2007 Nokia. All rights reserved. Rights reserved under the copyright

More information

Documentation Suite. Overview

Documentation Suite. Overview Documentation Suite Overview VERSION: 9.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

Hyperscaler Storage. September 12, 2016

Hyperscaler Storage. September 12, 2016 Storage Networking Industry Association Technical White Paper Hyperscaler Storage Abstract: Hyperscaler storage customers typically build their own storage systems from commodity components. They have

More information

Installing the Shrew Soft VPN Client

Installing the Shrew Soft VPN Client Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

MS Skype For Business. Deployment Guide

MS Skype For Business. Deployment Guide Deployment Guide UPDATED: 11 January 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks of

More information

Release Information. Revision History. Version: build 018 Release Date: 23 rd November 2011

Release Information. Revision History. Version: build 018 Release Date: 23 rd November 2011 Version: 02.00.2 build 018 Release Date: 23 rd November 2011 Release Date Version 02.00.2 Build 018 23 rd November 2011 Release Information Release Type: General Availability Supported Cyberoam Versions:

More information

Fujitsu ScandAll PRO V2.1.5 README

Fujitsu ScandAll PRO V2.1.5 README -------------------------------------------------------- Fujitsu ScandAll PRO V2.1.5 README -------------------------------------------------------- Copyright PFU Limited 2007-2017 This file contains information

More information

SDLC INTELLECTUAL PROPERTY POLICY

SDLC INTELLECTUAL PROPERTY POLICY SDLC INTELLECTUAL PROPERTY POLICY Last Revised: 11/14/17 1. Introduction. This Intellectual Property Policy ( Policy ) governs intellectual property rights of the SDL Consortium ( SDLC ) and its Members

More information

Multi-Tenant LoadMaster

Multi-Tenant LoadMaster Multi-Tenant LoadMaster Feature Description VERSION: 7.0 UPDATED: MARCH 2016 Table of Contents 1 Introduction... 3 1.1 Licensing... 3 1.2 Document Purpose... 3 1.3 Intended Audience... 3 2 Features...

More information

Panasonic Audio Player 2 User Guide

Panasonic Audio Player 2 User Guide Panasonic Audio Player 2 User Guide ASIO is a trademark and software of Steinberg Media Technologies GmbH. Overview Panasonic Audio Player 2 is simple GUI audio player software for Windows and Mac OS with

More information

Recovery Guide for Cisco Digital Media Suite 5.4 Appliances

Recovery Guide for Cisco Digital Media Suite 5.4 Appliances Recovery Guide for Cisco Digital Media Suite 5.4 Appliances September 17, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Mile Terms of Use. Effective Date: February, Version 1.1 Feb 2018 [ Mile ] Mileico.com

Mile Terms of Use. Effective Date: February, Version 1.1 Feb 2018 [ Mile ] Mileico.com Mile Terms of Use Effective Date: February, 2018 Version 1.1 Feb 2018 [ Mile ] Overview The following are the terms of an agreement between you and MILE. By accessing, or using this Web site, you acknowledge

More information

Epicor. Deployment Guide. UPDATED: 29 January 2019

Epicor. Deployment Guide. UPDATED: 29 January 2019 Deployment Guide UPDATED: 29 January 2019 Copyright Notices Copyright 2002-2019 Kemp Technologies, Inc. All rights reserved. Kemp Technologies and the Kemp Technologies logo are registered trademarks of

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Product version: 10.2 Document date: September 2012 Contents 1 Before you begin...3 2 Install Sophos Endpoint Security and Control...4 3 Configure

More information

User Manual. Date Aug 30, Enertrax DAS Download Client

User Manual. Date Aug 30, Enertrax DAS Download Client EnertraxDL - DAS Download Client User Manual Date Aug 30, 2004 Page 1 Copyright Information Copyright 2004, Obvius Holdings, LLC. All rights reserved. Redistribution and use in source and binary forms,

More information

Cluster and SVM Peering Express Guide

Cluster and SVM Peering Express Guide ONTAP 9 Cluster and SVM Peering Express Guide December 2017 215-11182_E0 doccomments@netapp.com Updated for ONTAP 9.3 Table of Contents 3 Contents Deciding whether to use this guide... 4 Prerequisites

More information

Customer Support: For more information or support, please visit or at Product Release Information...

Customer Support: For more information or support, please visit   or  at Product Release Information... Product Release Information Product: Cyberoam Release Number: 9.3.0 build 5 Release Date: 19th July 2006 Compatible versions: 9.2.0 build 2 Upgrade Mode: Manual 1 Important note Upgrade removes all the

More information

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Service Data Objects (SDO) DFED Sample Application README Copyright IBM Corporation, 2012, 2013 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract

More information

This file includes important notes on this product and also the additional information not included in the manuals.

This file includes important notes on this product and also the additional information not included in the manuals. --- fi Series PaperStream IP driver 1.42 README file --- Copyright PFU LIMITED 2013-2016 This file includes important notes on this product and also the additional information not included in the manuals.

More information

HA for Azure Classic Interface. Feature Description

HA for Azure Classic Interface. Feature Description Feature Description UPDATED: 28 March 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

About This Guide. and with the Cisco Nexus 1010 Virtual Services Appliance: N1K-C1010

About This Guide. and with the Cisco Nexus 1010 Virtual Services Appliance: N1K-C1010 This guide describes how to use Cisco Network Analysis Module Traffic Analyzer 4.2 (NAM 4.2) software. This preface has the following sections: Chapter Overview, page xvi Audience, page xvii Conventions,

More information

NetApp SolidFire Element OS. Setup Guide. Version March _A0

NetApp SolidFire Element OS. Setup Guide. Version March _A0 NetApp SolidFire Element OS Setup Guide Version 10.2 March 2018 215-12911_A0 doccomments@netapp.com Table of Contents 3 Contents SolidFire system overview... 4 Configuring a storage node... 5 Configuring

More information

CA File Master Plus. Release Notes. Version

CA File Master Plus. Release Notes. Version CA File Master Plus Release Notes Version 9.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions

ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions Date Generated: 2018/09/10 Apache Tomcat ID: 306 Apache Foundation and Contributors This product includes software

More information

RADIUS Authentication and Authorization Technical Note

RADIUS Authentication and Authorization Technical Note RADIUS Authentication and Authorization Technical Note VERSION: 9.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP

More information

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide The Privileged Appliance and Modules (TPAM) 1.0 Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Application Note: Split Public Addresses between WAN and DMZ

Application Note: Split Public Addresses between WAN and DMZ Application Note: Split Public Addresses between WAN and DMZ This document is intended for the person in charge of configuring and/or installing the Secomea TrustGate, and needs instructions for a specific

More information

FOR TCG ACPI Specification

FOR TCG ACPI Specification ERRATA Errata Version 0.3 August 25, 2017 FOR TCG ACPI Specification Specification Version 1.20 Revision 8 January 19th, 2017 Contact: admin@trustedcomputinggroup.org Copyright TCG 2017 Disclaimers, Notices,

More information