Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Note

This section describes the add-on products that are only available to Armor's private cloud users.

Networking - Load Balancer


Step 1: Review product information

Use the Load Balancer add-on product to distribute workloads to multiple web front-end servers to expand capacity for an application with the following add-on product options:

Product Name

Bandwidth

CPU

Memory

Storage

1x2 - Virtual Load Balancer (100 Mbps) - v17.x

100 Mbps

1

2 GB

16 GB Fluid

1x2 - Virtual Load Balancer with SSL Certificate (1 Gbps) - v17.x

1 Gbps

1

2 GB

16 GB Fluid

1x2 - Virtual Load Balancer with SSL Certificate (100 Mbps) - v17.x

100 Mbps

1

2 GB

16 GB Fluid

1x2 - Virtual Load Balancer with Traffic Script (1 Gbps) - v17.x

1 Gbps

1

2 GB

16 GB Fluid

1x2 - Virtual Load Balance with Traffic Script (200 Mbps) - v17.x

200 Mbps

1

2 GB

16 GB Fluid

Step 2: Order load balancer

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Marketplace.

  2. Locate and select Load Balancer.

  3. Locate and select the desired add-on option.

  4. In Name, enter a descriptive name to label the add-on product option.

  5. In Workload, you can select an existing workload or a new workload.

    • If you select a new workload, then in New Workload Name, enter a descriptive name.

  6. In In Workload Tier, you can select an existing tier or a new tier.

    • If you select a new tier, then in New Tier Name, enter a descriptive name.

  7. In Location, select a data center location.

  8. In Password, copy and store the password in a secure location. This password lets you access the virtual machine.

    • You can click Generate to have Armor create a new password.

    • You can also enter your own password. This password must follow the rules listed in the user interface.

  9. Click Purchase.

  10. A ticket will be automatically created and sent to Armor Support. To see the status of this ticket, in the left-side navigation, click Support, and then click Tickets. Armor will use this ticket to communicate with you about the status of your order and to inquire about your specific configuration requests.

...

For users leveraging Armor's Advanced Web Access Firewall, the tables below include the 'Elliptic Curve' ciphers added starting in vTM version 20.1 and was taken from a vTM running 20.1. The cipher suites in Version 20.1 are referred to as 'ssl!cipher_suites' and it includes SSLv3 and TLS.

The default order is:

1

TLS_AES_128_GCM_SHA256 (0x13, 0x01)

2

TLS_AES_256_GCM_SHA384 (0x13, 0x02)

3

SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xC0, 0x2B)

4

SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xC0, 0x23)

5

SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xC0, 0x09)

6

SSL_RSA_WITH_AES_128_GCM_SHA256 (0x00, 0x9C)

7

SSL_RSA_WITH_AES_128_CBC_SHA256 (0x00, 0x3C)

8

SSL_DHE_DSS_WITH_AES_128_CBC_SHA256 (0x00, 0x40)

9

SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xC0, 0x2F)

10

SSL_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x00, 0x9E)

11

SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xC0, 0x27)

12

SSL_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x00, 0x67)

13

SSL_RSA_WITH_AES_128_CBC_SHA (0x00, 0x2F)

14

SSL_DHE_DSS_WITH_AES_128_CBC_SHA (0x00, 0x32)

15

SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xC0, 0x13)

16

SSL_DHE_RSA_WITH_AES_128_CBC_SHA (0x00, 0x33)

17

SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xC0, 0x2C)

18

SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xC0, 0x0A)

19

SSL_RSA_WITH_AES_256_GCM_SHA384 (0x00, 0x9D)

20

SSL_RSA_WITH_AES_256_CBC_SHA256 (0x00, 0x3D)

21

SSL_DHE_DSS_WITH_AES_256_CBC_SHA256 (0x00, 0x6A)

22

SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xC0, 0x30)

23

SSL_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x00, 0x9F)

24

SSL_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x00, 0x6B)

25

SSL_RSA_WITH_AES_256_CBC_SHA (0x00, 0x35)

26

SSL_DHE_DSS_WITH_AES_256_CBC_SHA (0x00, 0x38)

27

SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xC0, 0x14)

28

SSL_DHE_RSA_WITH_AES_256_CBC_SHA (0x00, 0x39)

Note

The number in parentheses refers to the IANA registered value.

In addition, the following cipher suites are supported but disabled by default

1

SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xC0, 0x24)

2

SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xC0, 0x28)

3

SSL_RSA_WITH_3DES_EDE_CBC_SHA (0x00, 0x0a)

4

SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x00, 0x13)

5

SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x00, 0x16)

6

SSL_RSA_WITH_RC4_128_SHA (0x00, 0x05)

7

SSL_RSA_WITH_RC4_128_MD5 (0x00, 0x04)

8

SSL_RSA_WITH_DES_CBC_SHA (0x00, 0x09)

9

SSL_DHE_DSS_WITH_DES_CBC_SHA (0x00, 0x12)

10

SSL_DHE_RSA_WITH_DES_CBC_SHA (0x00, 0x15)

11

SSL_RSA_WITH_NULL_SHA256 (0x00, 0x3B)

12

SSL_RSA_WITH_NULL_SHA (0x00, 0x02)

13

SSL_RSA_WITH_NULL_MD5 (0x00, 0x01)

Topics Discussed

Table of Contents
minLevel2
maxLevel2
outlinefalse
typelist
printablefalse