Content Switch. Introduction of content web switch.. Some content switch products in the market.. Design of a content switch.

Slides:



Advertisements
Similar presentations
Scheduling in Web Server Clusters CS 260 LECTURE 3 From: IBM Technical Report.
Advertisements

CCNA – Network Fundamentals
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Lecture 7 Transport Layer
Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
Module 8: Concepts of a Network Load Balancing Cluster
Content Switch Design Introduce Linux networking source code. IP Masquerade techniques. LVS(Linux Virtual Server). Design of the Content Switch.
1 Internet Networking Spring 2004 Tutorial 13 LSNAT - Load Sharing NAT (RFC 2391)
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
11/2/2000Weihong Wang/Content Switch Page 1 Content Switch. Introduction of content web switch.. Some content switch products in the market.. Design of.
11/2/2000Weihong Wang/Content Switch Page 1 Content Web Switch Weihong Wang.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
11/2/2000Weihong Wang/Content Switch Page 1 Content Web Switch Weihong Wang.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #12 LSNAT - Load Sharing NAT (RFC 2391)
Technology Integration: RSerPool & Server Load-balancing Curt Kersey, Cisco Systems Aron Silverton, Motorola Labs.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CIS679: RTP and RTCP r Review of Last Lecture r Streaming from Web Server r RTP and RTCP.
OSI Model Routing Connection-oriented/Connectionless Network Services.
Cisco Discovery Working at a Small-to-Medium Business or ISP CHAPTER 7 ISP Services Jr.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Chapter 6: Packet Filtering
NECP: the Network Element Control Protocol IETF WREC Working Group November 11, 1999.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
Web Application Firewall (WAF) RSA ® Conference 2013.
Othman Othman M.M., Koji Okamura Kyushu University 1.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Access Control List (ACL)
Othman Othman M.M., Koji Okamura Kyushu University 1.
Module 10: How Middleboxes Impact Performance
TCP/IP (Transmission Control Protocol / Internet Protocol)
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
LINUX® Netfilter The Linux Firewall Engine. Overview LINUX® Netfilter is a firewall engine built into the Linux kernel Sometimes called “iptables” for.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
© 2001, Cisco Systems, Inc. CSPFA 2.0—5-1 Chapter 5 Cisco PIX Firewall Translations.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Defining Network Infrastructure and Network Security Lesson 8.
1 © 1999, Cisco Systems, Inc. 1293_07F9_c1 LocalDirector Version3.1.
Chapter 7: Transport Layer
Gijeong Kim ,Junho Kim ,Sungwon Lee Kyunghee University
Instructor Materials Chapter 9: Transport Layer
Web acceleration: PoP Infrastructures
Distributed Systems.
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
VIRTUAL SERVERS Presented By: Ravi Joshi IV Year (IT)
Introduction to Networking
* Essential Network Security Book Slides.
دیواره ی آتش.
Firewalls Chapter 8.
Protocol Application TCP/IP Layer Model
INFORMATION FLOW ACROSS THE INTERNET
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

Content Switch. Introduction of content web switch.. Some content switch products in the market.. Design of a content switch.

Introduction of Content Switch (1) What is web server load balancing?. Distribute incoming request to achieve parallel services.. Transport layer load balancing, balancing the incoming request based on address and port number.. Application layer load balancing, redirecting the user request based on the content of the request. (e.g. url, http header…)

Introduction of Content Switch (2) What is Content Switch?. An application layer load distribution.. A network device which routes the unique user request for specific content to the optimal server best able to handle the request.. For example, a Content Switch can classify the incoming request based on its url, http meta header, cookie value and so on.

ArrowPoint Network Services (Support url and cookie-based switching). Who the customer is based on user cookie located within HTTP header.. What information or transaction the customer is requesting.. Where best to service the customers. An example of Content Switch

Component of Content Switch. Defining the rules. Determine the type of web content being request.. Rule matching process Identifying specific type of traffic, then routing that traffic to the location best able to serve the traffic or customer request.

Two different design approach of Content Switch. Process content type classification and routing policy on application level. For example: application level proxies.. Process content type classification and routing policy on tcp/ip level. Need to modify operating system kernel. For example: using NAT to develop a content switch.

Content Switch Products in Market (1) Cisco Content Engine 2.20(CE). Cisco CE supports HTTP and HTTPS proxy server.. CE examines web request and makes the action decision such as block, cache, or proxy.. CE is worked in application level.. An example of the matching rules: rule no-cache url-regex\. *cgi-bin.* This rule configures that the incoming packets with the url matching the pattern “*cgi-bin” will not be forward to the proxy servers.

Content Switch Products in Market (2) Intel Action/Classification Engines(ACEs). ACE classifies incoming packets according to the predefined rule files.. ACE then triggers action in the associated action files.. ACE use Network Classification Language(NCL) to configure rules.. ACE is developed in tcp/ip level.. Example of NCL, Rule check_http{tcp&&(tcp.sport==80)}{action_scan()}. check_http is the name of the rule, {tcp&&(tcp.sport==80)} is class matching condition, and {action_scan()} is action function of this condition.. This rule means that incoming request with protocol=tcp and port=80 will go to action “action_scan()”.. NCL is simple for configuration.

Design of the Content Switch. Architecture of Content Switch.. Matching rules and routing policy.. Flow chart.

TCP/IP level Content Switch Architecture (1) NAT(network address translation). Incoming and out going packets all pass through Content Switch.. Content Switch masquerades the ip address and port number of incoming and out going packets.. Content Switch uses delayed binding to connect with back server.

TCP/IP level Content Switch Architecture (1) NAT Content Switch delayed binding delayed binding graph. Content Switch establishes a connection with client first.. When get data, choose a server to establish another connection, forward original syn msg, discard the ack from back server.. For the following data transmission, Content Switch only forward it after masquerades its ip address and port number.

TCP/IP level Content Switch Architecture (2) IP Tunnel and IP Direct Routing. Content Switch accepts request and forward it to the choosed server.. The server then connects with client directly.. Delayed binding.. Need to modify back end server’s tcp protocol.. Faster than NAT approach.

Content Switch Rules The contents should be covered :. Source IP address and TCP/UDP port number.. URL regular expression.. HTTP meta header.. SSL session ID.. Values of XML tags.

Content Switch Rules (1) Examples of Content Switch Rules Foundry ServerIron ServerIron(config)#url-map gifPolicy ServerIron(config-url-gifPolicy)#method suffix ServerIron(config-url-gifPolicy)#match “gif”1 ServerIron(config-gifPolicy)#default 2 ServerIron(config-gifPolicy)#exit If the suffix of url in the incoming packets is gif, route to server group 1, else route to server group 2. Cisco Network Based Application Recognition Router(config)#class-map match-all http_secure Router(config)#match protocol secure-http Router(ifconfig)#class-map match any audio_video Router(config)#match protocol http mime “audio/*” Router(config)#match protocol http mime “video/*” Router(config)#policy-map e-express Router(config-pmap-c)#class http_secure Router(config-pmap-c)#bandwidth 32 Router(config-pmap-c)#class audio_video Router(config-pmap-c)#bandwidth 10 First define classes for secure http request and audio/video request, and then distribute the outbound bandwidth for each class. Intel IX-API SDK Rule check_src {ip.src== } {action_A()} Rule check_http{tcp&&(tcp.sport==80)}{action_scan()} The meaning of rule check_src is: if source ip address is , then execute the action function “action_A()”.

Content Switch Rules (2). Precompiled Sequential configuration.. Easy to solve conflict problem.. To speed up the process of rule matching, we can do: -. Example,

Flow Chart of Content Switch (1) packet from client input to ip_input connection established? TCP/SYN? create ACK back msg send back ACK to client masquerade ip addr port,seq. forward ib packet return choose server masq SYN msg forward to server choose server masq UDP packet forward to server deliver to upper layer TCP/data/ack UDP? y n y yy nnn

Flow Chart of Content Switch (2) packet from back server Connection established? msaq packet forward it return SYN/ACK? create connection hash table masq ip addr, port,seq. forward saved ip packet forward as normal input to ip_forward