Adobe Connect. Adobe Connect. Deployment Guide

Similar documents
Splunk. Splunk. Deployment Guide

Epic. Epic Systems. Deployment Guide

Moodle. Moodle. Deployment Guide

LoadMaster VMware Horizon (with View) 6. Deployment Guide

VMware vcenter Log Insight Manager. Deployment Guide

Packet Trace Guide. Packet Trace Guide. Technical Note

RSA Two Factor Authentication

Migration Tool. Migration Tool (Beta) Technical Note

NTLM NTLM. Feature Description

KEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide

LoadMaster VMware Horizon Access Point Gateway

LoadMaster Clustering

Hyper-V - Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

MS Lync MS Lync Deployment Guide

Edge Security Pack (ESP)

MS Skype for Business. Microsoft Skype for Business Deployment Guide

LoadMaster for Azure (Marketplace Classic Interface)

Configuring Real Servers for DSR

SDN Adaptive Load Balancing. Feature Description

LoadMaster Clustering (Beta)

Microsoft Dynamics. Deployment Guide

VMware Horizon Workspace. VMware Horizon Workspace 1.5. Deployment Guide

Health Checking. Health Checking. Feature Description

Web Application Firewall (WAF) Feature Description

DirectAccess. Windows Server 2012 R2 DirectAccess. Deployment Guide

GEO. Feature Description GEO VERSION: 1.4 UPDATED: MARCH Feature Description

Content Switching with Exchange and Lync-related Workloads

Condor for Cisco UCS B-Series Blade Servers

Apache Tomcat Deployment Guide

SSL Accelerated Services. SSL Accelerated Services for the LM FIPS. Feature Description

Pearson PowerSchool. Deployment Guide

Epicor. Deployment Guide. UPDATED: 29 January 2019

Kerberos Constrained Delegation. Kerberos Constrained Delegation. Feature Description

Virtual LoadMaster for Xen (Para Virtualized)

Microsoft Print Server. Deployment Guide

IIS. Deployment Guide

Exchange 2016 Deployment Guide. Exchange Deployment Guide

Virtual LoadMaster for KVM (Para Virtualized)

Web User Interface (WUI) LM5305 FIPS

Open Source Used In Cisco Configuration Professional for Catalyst 1.0

Web User Interface (WUI) LM FIPS

Web User Interface (WUI)

Bar Code Discovery. Administrator's Guide

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008

iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP)

LoadMaster Deployment Guide

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009

Microsoft Exchange Microsoft Exchange Deployment Guide

Enterprise Payment Solutions. Scanner Installation April EPS Scanner Installation: Quick Start for Remote Deposit Complete TM

Ecma International Policy on Submission, Inclusion and Licensing of Software

Open Source Used In TSP

Simba Cassandra ODBC Driver with SQL Connector

Ecma International Policy on Submission, Inclusion and Licensing of Software

Cover Page. Video Manager User Guide 10g Release 3 ( )

Tenable Hardware Appliance Upgrade Guide

Command Line Interface (CLI)

Juniper Networks Steel-Belted Radius Carrier

SkyPilot OS Installation: Fedora Core 5

Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics

SDLC INTELLECTUAL PROPERTY POLICY

AD FS v3. Deployment Guide

XEP-0099: IQ Query Action Protocol

Data Deduplication Metadata Extension

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program )

User Guide. Calibrated Software, Inc.

Trimble. ecognition. Release Notes

ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program )

CA File Master Plus. Release Notes. Version

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Panasonic Audio Player 2 User Guide

Copyright PFU LIMITED

Open Source Used In c1101 and c1109 Cisco IOS XE Fuji

KEMP LoadMaster. KEMP LoadMaster. Product Overview

Windows Server 2012 R2 DirectAccess. Deployment Guide

Technics Audio Player User Guide

Documentation Roadmap for Cisco Prime LAN Management Solution 4.2

Mile Terms of Use. Effective Date: February, Version 1.1 Feb 2018 [ Mile ] Mileico.com

Cover Page. Site Studio Tutorial Setup Guide 10g Release 3 ( )

Fujitsu ScandAll PRO V2.1.5 README

HYDRODESKTOP VERSION 1.4 QUICK START GUIDE

MS Skype For Business. Deployment Guide

MS Lync Deployment Guide

Sophos Endpoint Security and Control standalone startup guide

FOR TCG ACPI Specification

Table of Contents Overview...2 Selecting Post-Processing: ColorMap...3 Overview of Options Copyright, license, warranty/disclaimer...

This file includes important notes on this product and also the additional information not included in the manuals.

Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3)

MyCreditChain Terms of Use

HALCoGen TMS570LS31x Help: example_sci_uart_9600.c

Conettix Universal Dual Path Communicator B465

MagicInfo Express Content Creator

Installing the Shrew Soft VPN Client

Open Source and Standards: A Proposal for Collaboration

Bar Code Discovery. Administrator's Guide

Management Software Web Browser User s Guide

User Manual. Date Aug 30, Enertrax DAS Download Client

JD Edwards World User Reserved Information. Version A9.2

About This Guide. and with the Cisco Nexus 1010 Virtual Services Appliance: N1K-C1010

BlackBerry Enterprise Server Express for Microsoft Exchange

Transcription:

Deployment Guide VERSION: 1.0 UPDATED: MARCH 2016

Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP Technologies, Inc.. KEMP Technologies, Inc. reserves all ownership rights for the LoadMaster product line including software and documentation. The use of the LoadMaster Exchange appliance is subject to the license agreement. Information in this guide may be modified at any time without prior notice. Microsoft Windows is a registered trademarks of Microsoft Corporation in the United States and other countries. All other trademarks and service marks are the property of their respective owners. Limitations: This document and all of its contents are provided as-is. KEMP Technologies has made efforts to ensure that the information presented herein are correct, but makes no warranty, express or implied, about the accuracy of this information. If any material errors or inaccuracies should occur in this document, KEMP Technologies will, if feasible, furnish appropriate correctional notices which Users will accept as the sole and exclusive remedy at law or in equity. Users of the information in this document acknowledge that KEMP Technologies cannot be held liable for any loss, injury or damage of any kind, present or prospective, including without limitation any direct, special, incidental or consequential damages (including without limitation lost profits and loss of damage to goodwill) whether suffered by recipient or third party or from any action or inaction whether or not negligent, in the compiling or in delivering or communicating or publishing this document. Any Internet Protocol (IP) addresses, phone numbers or other data that may resemble actual contact information used in this document are not intended to be actual addresses, phone numbers or contact information. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual addressing or contact information in illustrative content is unintentional and coincidental. Portions of this software are; copyright (c) 2004-2006 Frank Denis. All rights reserved; copyright (c) 2002 Michael Shalayeff. All rights reserved; copyright (c) 2003 Ryan McBride. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE ABOVE COPYRIGHT HOLDERS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE ABOVE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The views and conclusions contained in the software and documentation are those of the authors and should not be interpreted as representing official policies, either expressed or implied, of the above copyright holders.. Portions of the LoadMaster software are copyright (C) 1989, 1991 Free Software Foundation, Inc. -51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA- and KEMP Technologies Inc. is in full compliance of the GNU license requirements, Version 2, June 1991. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 2

Portions of this software are Copyright (C) 1988, Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Portions of this software are Copyright (C) 1998, Massachusetts Institute of Technology Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Portions of this software are Copyright (C) 1995-2004, Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Portions of this software are Copyright (C) 2003, Internet Systems Consortium Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Used, under license, U.S. Patent Nos. 6,473,802, 6,374,300, 8,392,563, 8,103,770, 7,831,712, 7,606,912, 7,346,695, 7,287,084 and 6,970,933 Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 3

Table of Contents 1 Introduction... 5 1.1 Document Purpose... 5 1.2 Intended Audience... 5 1.3 Deployment Architecture... 6 2 Template... 7 3 Enable Subnet Originating Requests Globally... 8 4 Configure Virtual Services... 9 4.1 HTTPS Offloaded... 9 4.2 RTMP... 12 References... 15 Document History... 16 Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 4

Introduction 1 Introduction is a web conferencing solution which enables corporations and government agencies to improve collaboration, webinars and elearning through interactions. It integrates several tools into an online meeting room including: Video conferencing Chat Whiteboards Desktop sharing File sharing offers flexibility to presenters and participants. Numerous tools can be used in any combination to facilitate meetings. is accessible on desktops, tablets and mobile devices with the Mobile application installed. Such a powerful tool requires reliable and powerful support. The KEMP LoadMaster delivers an exceptional, cost-effective and easy to use solution which, by employing Adaptive Load Balancing, balances requests across. When deployed as a pair, two LoadMasters give the security of High Availability (HA). HA allows two physical or virtual machines to become one logical device. Only one of these units is ever handling traffic at any particular moment. One unit is active and the other is a hot standby (passive). This provides redundancy and resiliency, meaning if one LoadMaster goes down for any reason, the hot standby can become active, therefore avoiding any downtime. For more information on HA please refer to the: High Availability (HA), Feature Description. 1.1 Document Purpose This document provides guidance on deploying with a KEMP LoadMaster. The KEMP Support Team is available to provide solutions for scenarios not explicitly defined. The KEMP support site can be found at: https://support.kemptechnologies.com. 1.2 Intended Audience This document is for anyone deploying with a KEMP LoadMaster. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 5

Introduction 1.3 Deployment Architecture Clients Internet Firewall KEMP LoadMasters SQL Server Cluster Figure 1-1: Architecture Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 6

Template 2 Template KEMP has developed a template containing our recommended settings for. This template can be installed on the LoadMaster and used when creating Virtual Services. Using a template automatically populates the settings in the Virtual Services. This is quicker and easier than manually configuring each Virtual Service. If needed, changes can be made to any of the Virtual Service settings after using the template. Download released templates from the Templates section on the KEMP documentation page: http://kemptechnologies.com/documentation/. For more information and steps on how to import and use templates, refer to the Virtual Services and Templates, Feature Description Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 7

Enable Subnet Originating Requests Globally 3 Enable Subnet Originating Requests Globally It is best practice to enable the Subnet Originating Requests option globally. In a one-armed setup (where the Virtual Service and Real Servers are on the same network/subnet) Subnet Originating Requests is usually not needed. However, enabling Subnet Originating Requests should not affect the routing in a one-armed setup. In a two-armed setup where the Virtual Service is on network/subnet A, for example, and the Real Servers are on network B - Subnet Originating Requests should be enabled on LoadMasters with firmware version 7.1-16 and above. When Subnet Originating Requests is enabled, the LoadMaster will route traffic so that the Real Server will see traffic arriving from the LoadMaster interface that is in that network/subnet. When Subnet Originating Requests is enabled globally, it is automatically enabled on all Virtual Services. If the Subnet Originating Requests option is disabled globally, you can choose whether or not to enable Subnet Originating Requests on a per-virtual Service basis. To enable Subnet Originating Requests globally, follow the steps below: 1. In the main menu of the LoadMaster WUI, go to System Configuration > Miscellaneous Options > Network Options. Figure 3-1: Subnet Originating Requests 2. Tick the Subnet Originating Requests check box. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 8

Configure Virtual Services 4 Configure Virtual Services The following sections show how to manually configure Virtual Services for. 4.1 HTTPS Offloaded The following are the steps involved and the recommended settings to configure HTTPS Offloaded Virtual Service: 1. In the main menu of the LoadMaster Web User Interface (WUI), go to Virtual Services > Add New. Figure 4-1: Virtual Service Parameters 2. Enter a valid IP address in the Virtual Address text box. 3. Enter 443 in the Port text box. 4. Enter a recognizable Service Name, for example HTTPS Offloaded. 5. Ensure tcp is selected as the Protocol. 6. Click Add this Virtual Service. 7. Expand the SSL Properties section. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 9

Configure Virtual Services Figure 4-2: SSL Properties Section 8. Select the SSL Acceleration check box. 9. Select BestPractices from the Cipher Set drop-down list. 10. Expand the Standard Options section. Figure 4-3: Standard Options Section 11. Deselect the Transparency check box. 12. In the Persistence Options section, select None from the Mode drop-down list. 13. Select round robin from the Scheduling Method drop-down list. 14. Expand the Advanced Properties section. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 10

Configure Virtual Services Figure 4-4: Advanced Properties Section 15. In the Add a Port 80 Redirector VS text box, ensure https://%h%s appears in the Redirection URL: text box and click the Add HTTP Redirector button. This adds a redirect Virtual Service on Port 80. 16. Expand the Real Servers section. Figure 4-5: Real Servers Section 17. Select HTTP Protocol from the Real Server Check Parameters drop-down list. 18. Enter 8443 as the Checked Port and click Set Check Port. 19. Enter /servlet/testbuilder in the URL: text box and click Set URL. 20. Select the Use HTTP/1.1 check box. 21. From the HTTP Method: drop-down list, select GET. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 11

Configure Virtual Services Figure 4-6: Add a Real Server Screen 22. Add Real Servers: a) Click the Add New button. b) Enter the IP address of the server. c) Enter 8443 as the Port. The Forwarding method and Weight values are set by default. An administrator can change these. d) Click Add this Real Server. Click OK to the pop-up message. e) Repeat steps b) to d) above to add more Real Servers as needed, based on the environment. 4.2 RTMP The following are the steps involved and the recommended settings to configure RTMP Virtual Service: 1. In the main menu of the LoadMaster Web User Interface (WUI), go to Virtual Services > Add New. Figure 4-7: Virtual Service Parameters 2. Enter a valid IP address in the Virtual Address text box. 3. Enter 1935 in the Port text box. 4. Enter a recognizable Service Name, for example RTMP. 5. Ensure tcp is selected as the Protocol. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 12

Configure Virtual Services 6. Click Add this Virtual Service. Figure 4-8: Basic Properties Section 7. In the Basic Properties section, select HTTP/HTTPS from the Service Type dropdown list. 8. Expand the Standard Options section. Figure 4-9: Standard Options Section 9. Deselect the Force L7 check box. 10. Ensure Transparency is enabled. 11. Ensure the Persistence Options Mode is set to None. 12. Ensure the Scheduling Method is set to round robin. 13. Expand the Real Servers section. Figure 4-10: Real Servers Section 14. From the Real Server Check Parameters drop-down list, select TCP Connection Only. 15. Enter 1935 in the Checked Port text box and click Set Check Port. 16. Add the Real Servers: Figure 4-11: Add Real Server Screen Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 13

Configure Virtual Services a) Click the Add New button. b) Enter the IP address of the server. c) Enter 1935 as the Port. The Forwarding method and Weight values are set by default. An administrator can change these. d) Click Add this Real Server. Click OK to the pop-up message. e) Repeat steps b) to d) above to add more Real Servers as needed, based on the environment. Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 14

References References Unless otherwise specified, the following documents can be found at: http://kemptechnologies.com/documentation. Virtual Services and Templates, Feature Description High Availability (HA), Feature Description Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 15

Document History Document History Date Change Reason for Change Version Resp. Mar 2016 Initial Draft First draft of document 1.0 KG Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 16