Section | ||||||
---|---|---|---|---|---|---|
| ||||||
Section | ||||||
|
Section | ||||||
---|---|---|---|---|---|---|
| ||||||
Topics Discussed
|
id | 83138829 |
---|
This section describes the add-on products that are only available to Armor
's private cloudEnterprise Cloud users.
Networking - Load Balancer
Step 1: Review product information
Use the Load Balancer add-on product to distribute workloads to multiple web front-end servers to expand capacity for an application with the following add-on product options:
Product Name | Bandwidth | CPU | Memory | Storage |
---|---|---|---|---|
1x2 - Virtual Load Balancer (100 Mbps) - v17.x | 100 Mbps | 1 | 2 GB | 16 GB Fluid |
1x2 - Virtual Load Balancer with SSL Certificate (1 Gbps) - v17.x | 1 Gbps | 1 | 2 GB | 16 GB Fluid |
1x2 - Virtual Load Balancer with SSL Certificate (100 Mbps) - v17.x | 100 Mbps | 1 | 2 GB | 16 GB Fluid |
1x2 - Virtual Load Balancer with Traffic Script (1 Gbps) - v17.x | 1 Gbps | 1 | 2 GB | 16 GB Fluid |
1x2 - Virtual Load Balance with Traffic Script (200 Mbps) - v17.x | 200 Mbps | 1 | 2 GB | 16 GB Fluid |
Step 2: Order load balancer
In the Armor Management Portal (AMP), in the left-side navigation, click Marketplace.
Locate and select Load Balancer.
Locate and select the desired add-on option.
In Name, enter a descriptive name to label the add-on product option.
In Workload, you can select an existing workload or a new workload.
If you select a new workload, then in New Workload Name, enter a descriptive name.
In In Workload Tier, you can select an existing tier or a new tier.
If you select a new tier, then in New Tier Name, enter a descriptive name.
In Location, select a data center location.
In Password, copy and store the password in a secure location. This password lets you access the virtual machine.
You can click Generate to have Armor create a new password.
You can also enter your own password. This password must follow the rules listed in the user interface.
Click Purchase.
A ticket will be automatically created and sent to Armor Support. To see the status of this ticket, in the left-side navigation, click Support, and then click Tickets. Armor will use this ticket to communicate with you about the status of your order and to inquire about your specific configuration requests.
Note |
---|
After you purchase a load balancer, you can also purchase a recovery virtual machine to complement the load balancer. After provisioning, you can navigate to the Marketplace screen to purchase Continuous Server Replication from Zerto. This option will only appear if you use theDFW01, ORD01, LHR01, or AMS0 data centers. To purchase a recovery virtual machine for your load balancer, see Continuous Server Replication - Disaster Recovery. |
...
Advanced WAF Supported Ciphers
For users leveraging Armor's Advanced Web Access Firewall,
...
the tables below include the 'Elliptic Curve' ciphers added starting in vTM version 20.1 and was taken from a vTM running 20.1. The cipher suites in Version 20.1 are referred to as 'ssl!cipher_suites' and it includes SSLv3 and TLS.
The default order is:
1 | TLS_AES_128_GCM_SHA256 (0x13, 0x01) |
2 | TLS_AES_256_GCM_SHA384 (0x13, 0x02) |
3 | SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xC0, 0x2B) |
4 | SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xC0, 0x23) |
5 | SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xC0, 0x09) |
6 | SSL_RSA_WITH_AES_128_GCM_SHA256 (0x00, 0x9C) |
7 | SSL_RSA_WITH_AES_128_CBC_SHA256 (0x00, 0x3C) |
8 | SSL_DHE_DSS_WITH_AES_128_CBC_SHA256 (0x00, 0x40) |
9 | SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xC0, 0x2F) |
10 | SSL_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x00, 0x9E) |
11 | SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xC0, 0x27) |
12 | SSL_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x00, 0x67) |
13 | SSL_RSA_WITH_AES_128_CBC_SHA (0x00, 0x2F) |
14 | SSL_DHE_DSS_WITH_AES_128_CBC_SHA (0x00, 0x32) |
15 | SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xC0, 0x13) |
16 | SSL_DHE_RSA_WITH_AES_128_CBC_SHA (0x00, 0x33) |
17 | SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xC0, 0x2C) |
18 | SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xC0, 0x0A) |
19 | SSL_RSA_WITH_AES_256_GCM_SHA384 (0x00, 0x9D) |
20 | SSL_RSA_WITH_AES_256_CBC_SHA256 (0x00, 0x3D) |
21 | SSL_DHE_DSS_WITH_AES_256_CBC_SHA256 (0x00, 0x6A) |
22 | SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xC0, 0x30) |
23 | SSL_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x00, 0x9F) |
24 | SSL_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x00, 0x6B) |
25 | SSL_RSA_WITH_AES_256_CBC_SHA (0x00, 0x35) |
26 | SSL_DHE_DSS_WITH_AES_256_CBC_SHA (0x00, 0x38) |
27 | SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xC0, 0x14) |
28 | SSL_DHE_RSA_WITH_AES_256_CBC_SHA (0x00, 0x39) |
Note |
---|
The The number in parentheses refers to the IANA registered value. |
In addition, the following cipher suites are supported but disabled by default
1 | SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xC0, 0x24) |
2 | SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xC0, 0x28) |
3 | SSL_RSA_WITH_3DES_EDE_CBC_SHA (0x00, 0x0a) |
4 | SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x00, 0x13) |
5 | SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x00, 0x16) |
6 | SSL_RSA_WITH_RC4_128_SHA (0x00, 0x05) |
7 | SSL_RSA_WITH_RC4_128_MD5 (0x00, 0x04) |
8 | SSL_RSA_WITH_DES_CBC_SHA (0x00, 0x09) |
9 | SSL_DHE_DSS_WITH_DES_CBC_SHA (0x00, 0x12) |
10 | SSL_DHE_RSA_WITH_DES_CBC_SHA (0x00, 0x15) |
11 | SSL_RSA_WITH_NULL_SHA256 (0x00, 0x3B) |
12 | SSL_RSA_WITH_NULL_SHA (0x00, 0x02) |
13 | SSL_RSA_WITH_NULL_MD5 (0x00, 0x01) |
...
Topics Discussed
Table of Contents | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|