Hi friends, I just want to make sure I am clear on the concepts. I was studying a bit and I find myself with doubt because in one article it says one thing and in another, it says the opposite.
In the first article, it says that SSL Bridging and SSL Terminations are the same terms.
Description
BIG-IP is built to handle SSL traffic in load balancing scenario and meet most of the security requirements effectively. The 3 common SSL configurations that can be set up on LTM device are:
- SSL Offloading
- SSL Passthrough
- Full SSL Proxy / SSL Re-Encryption / SSL Bridging / SSL Terminations
Environment
- Configuration objects and settings: Virtual Server, Client SSL and Server SSL profiles
- BIG-IP, LTM
Additional Information
Typical load balancing infrastructure setup would be Client--->BIG-IP VIP ---->Servers hosting applications i.e. client traffic will be directed to a load balancer like BIG-IP which in return (using complex algorithm) send the traffic to an appropriate server.
SSL Offloading - In this method the client traffic to BIG-IP is sent as encrypted. Instead of the server decrypting and re-encrypting the traffic BIG-IP would handle that part. So the client traffic is decrypted by the BIG-IP and the decrypted traffic is sent to the server. The return communication from the server to client is encrypted by the BIG-IP and sent back to the client. Thus sparing the server additional load of encryption and decryption. All the server resources can now be fully utilized to serve the application content or any other purpose they are built to do.
Note:
- The communication between the server BIG-IP and server is in clear txt.
- Servers are setup to listen on unsecure ports ex Port 80.
- Since the BIG-IP decrypts the HTTP traffic it has now the ability to read the content (header, txt, cookies etc.) and all the persistence options can be applied. (Source address, Destination address, Cookies, SSL, SIP, Universal, MSRDP)
Note -
- Since it’s just pass through LTM cannot read the headers which introduces limitations on persistence. Only non SSL information in the packet can be used to maintain persistence like source ip address, destination ip address.
Note –
- The communication between the server LTM and server is secure.
- Servers are setup to listen on secure ports ex Port 443.
- Since the LTM initially decrypts the HTTP traffic it still has the ability to read the content (header, txt, cookies etc.) and all the persistence options can be applied same as SSL Offloading. (Source address, Destination address, Cookies, SSL, SIP, Universal, MSRDP)
No comments:
Post a Comment