Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Section
id83138828
Section
id83138839
Section
background-color$lightGrayColor
id83138826

Topics Discussed

Table of Contents
maxLevel3
minLevel3

Section
id83138829

Anchor
Armor Complete
Armor Complete

Note

This section describes the add-on products that are only available to Armor's private cloud users.


Networking - Load Balancer



Step 1: Review product information

Use the Load Balancer add-on product to distribute workloads to multiple web front-end servers to expand capacity for an application with the following add-on product options:

Product NameBandwidthCPUMemoryStorage
1x2 - Virtual Load Balancer (100 Mbps) - v17.x100 Mbps12 GB16 GB Fluid
1x2 - Virtual Load Balancer with SSL Certificate (1 Gbps) - v17.x1 Gbps12 GB16 GB Fluid
1x2 - Virtual Load Balancer with SSL Certificate (100 Mbps) - v17.x100 Mbps12 GB16 GB Fluid
1x2 - Virtual Load Balancer with Traffic Script (1 Gbps) - v17.x1 Gbps12 GB16 GB Fluid
1x2 - Virtual Load Balance with Traffic Script (200 Mbps) - v17.x200 Mbps12 GB16 GB Fluid


Step 2: Order load balancer

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Marketplace.
  2. Locate and select Load Balancer.
  3. Locate and select the desired add-on option.
  4. In Name, enter a descriptive name to label the add-on product option.
  5. In Workload, you can select an existing workload or a new workload.
    • If you select a new workload, then in New Workload Name, enter a descriptive name.
  6. In In Workload Tier, you can select an existing tier or a new tier.
    • If you select a new tier, then in New Tier Name, enter a descriptive name.
  7. In Location, select a data center location.
  8. In Password, copy and store the password in a secure location. This password lets you access the virtual machine.
    • You can click Generate to have Armor create a new password.
    • You can also enter your own password. This password must follow the rules listed in the user interface.
  9. Click Purchase.
  10. A ticket will be automatically created and sent to Armor Support. To see the status of this ticket, in the left-side navigation, click Support, and then click Tickets. Armor will use this ticket to communicate with you about the status of your order and to inquire about your specific configuration requests.
Note

After you purchase a load balancer, you can also purchase a recovery virtual machine to complement the load balancer.

After provisioning, you can navigate to theMarketplacescreen to purchase Continuous Server Replication from Zerto.

This option will only appear if you use theDFW01, ORD01, LHR01, or AMS0 data centers.

To purchase a recovery virtual machine for your load balancer, see Continuous Server Replication - Disaster Recovery.


Advanced WAF Supported Ciphers


For users leveraging Armor's Advanced Web Access Firewall, the tables below include the 'Elliptic Curve' ciphers added starting in vTM version 20.1 and was taken from a vTM running 20.1. The cipher suites in Version 20.1 are referred to as 'ssl!cipher_suites' and it includes SSLv3 and TLS.

The default order is:

1TLS_AES_128_GCM_SHA256 (0x13, 0x01)
2TLS_AES_256_GCM_SHA384 (0x13, 0x02)
3SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xC0, 0x2B)
4SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xC0, 0x23)
5SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xC0, 0x09)
6SSL_RSA_WITH_AES_128_GCM_SHA256 (0x00, 0x9C)
7SSL_RSA_WITH_AES_128_CBC_SHA256 (0x00, 0x3C)
8SSL_DHE_DSS_WITH_AES_128_CBC_SHA256 (0x00, 0x40)
9SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xC0, 0x2F)
10SSL_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x00, 0x9E)
11SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xC0, 0x27)
12SSL_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x00, 0x67)
13SSL_RSA_WITH_AES_128_CBC_SHA (0x00, 0x2F)
14SSL_DHE_DSS_WITH_AES_128_CBC_SHA (0x00, 0x32)
15SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xC0, 0x13)
16SSL_DHE_RSA_WITH_AES_128_CBC_SHA (0x00, 0x33)
17SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xC0, 0x2C)
18SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xC0, 0x0A)
19SSL_RSA_WITH_AES_256_GCM_SHA384 (0x00, 0x9D)
20SSL_RSA_WITH_AES_256_CBC_SHA256 (0x00, 0x3D)
21SSL_DHE_DSS_WITH_AES_256_CBC_SHA256 (0x00, 0x6A)
22SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xC0, 0x30)
23SSL_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x00, 0x9F)
24SSL_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x00, 0x6B)
25SSL_RSA_WITH_AES_256_CBC_SHA (0x00, 0x35)
26SSL_DHE_DSS_WITH_AES_256_CBC_SHA (0x00, 0x38)
27SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xC0, 0x14)
28SSL_DHE_RSA_WITH_AES_256_CBC_SHA (0x00, 0x39)
Note

The number in parentheses refers to the IANA registered value.


In addition, the following cipher suites are supported but disabled by default

1SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xC0, 0x24)
2SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xC0, 0x28)
3SSL_RSA_WITH_3DES_EDE_CBC_SHA (0x00, 0x0a)
4SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x00, 0x13)
5SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x00, 0x16)
6SSL_RSA_WITH_RC4_128_SHA (0x00, 0x05)
7SSL_RSA_WITH_RC4_128_MD5 (0x00, 0x04)
8SSL_RSA_WITH_DES_CBC_SHA (0x00, 0x09)
9SSL_DHE_DSS_WITH_DES_CBC_SHA (0x00, 0x12)
10SSL_DHE_RSA_WITH_DES_CBC_SHA (0x00, 0x15)
11SSL_RSA_WITH_NULL_SHA256 (0x00, 0x3B)
12SSL_RSA_WITH_NULL_SHA (0x00, 0x02)
13SSL_RSA_WITH_NULL_MD5 (0x00, 0x01)


Was this helpful?