did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781587052132

Designing Content Switching Solutions

by ;
  • ISBN13:

    9781587052132

  • ISBN10:

    158705213X

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2006-01-01
  • Publisher: Cisco Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $60.00

Summary

The definitive guide to designing and deploying content switching solutions in the data centre.

Table of Contents

Foreword xxv
Introduction xxvi
Part I Server Load Balancing (SLB)
3(254)
Introduction to Server Load Balancing
5(22)
Why Load Balance?
5(3)
Scalability
6(1)
Availability and Redundancy
6(1)
Security
7(1)
Cost Effectiveness
8(1)
History of Server Load Balancing
8(4)
First-Generation Load Balancers
8(1)
Dns-Based Load Balancing
9(1)
Ip Anycast
10(1)
Second-Generation Load Balancers
10(1)
Local Director
10(1)
Accelerated SLB
11(1)
Ios Slb
11(1)
Third-Generation Load Balancers
11(1)
Content Services Switch
11(1)
Content Switching Module
11(1)
Characterization of the Application
12(2)
Protocol and Port
12(1)
Sessions per Second
13(1)
Duration of Transaction
13(1)
Concurrent Sessions
13(1)
Idle Timeout
13(1)
Back End Sessions
14(1)
Session Stickiness
14(1)
SLB and SLB Modes
14(3)
Dispatch Mode
15(1)
Directed Mode
16(1)
SLB Designs
17(5)
Layer 2 Design
18(1)
Layer 3 Design
19(1)
One-Armed Design
20(1)
Policy-Based Routing
21(1)
Source NAT
21(1)
Direct Server Return
21(1)
Deciding on a Load Balancer
22
Review of Infrastructure Design Concepts
23(1)
VLANs
23(1)
Stp
23(1)
DotlQ Trunking
24(1)
Dual Homed Servers
24(1)
Summary
24(3)
Introduction to the Cisco Content Services Switch
27(26)
Css 11500 Platforms Overview
27(3)
Css 11501
27(1)
Css 11503
28(1)
Css 11506
29(1)
Css 11500 Architecture
30(3)
Distributed Architecture
30(2)
Css 11500 Modules
32(1)
Switch Control Module for the Cisco 11500
32(1)
Ssl Module for the Cisco 11500
32(1)
I/O Modules for the Cisco 11500
33(1)
Session Accelerator Module for the Cisco 11500
33(1)
Load Balancing with Css 11500
33(6)
Services, Owners, and Content Rules
33(2)
Css 11500 Flow Overview
35(1)
Flow Control Block
36(1)
Persistent Reset Redirect
37(1)
Persistent Reset Remap
38(1)
Flow Cleanup
38(1)
WebNS Software Features
39(5)
Infrastructure-Level Features
39(2)
Load-Balancing Algorithms
41(1)
High Availability
42(1)
Ssl Integration for Security and Performance
42(1)
Local and Global Load Balancing
43(1)
Site and System Security
43(1)
Summary of WebNS Features
43(1)
Case Study: Css-Based Solution
44(7)
Server and Application Requirements
44(1)
Management and Security Requirements
45(1)
Infrastructure Requirements
45(1)
Design Options
46(1)
Http and Https Server Stickiness
47(2)
Traffic Flow
49(1)
Test and Verification
50(1)
Summary
51(2)
Introduction to the Cisco Content Switching Module
53(30)
Benefits of the Content Switch Module
53(1)
Csm Architecture
54(2)
Csm Hardware
54(1)
Csm Configuration Limits
55(1)
Load Balancing with Content Switching Module
56(4)
Real Server, Virtual Server, Slb Policy, and More
56(1)
Load Balancing Methods
57(1)
Vlan Tag
58(1)
Client Group (Access Control List)
59(1)
Ip Protocol Support
59(1)
High Availability
59(1)
Connection Redundancy
59(1)
User Session Persistence
60(1)
A Typical Csm Traffic Flow
60(1)
Routing with Csm
61(2)
Csm Network Integration Options
63(10)
Csm Layer 2 Design---Bridged Mode
63(1)
Csm Layer 3 Design I---Routed Mode with MSFC on the Client Side
64(2)
Csm Layer 3 Design II---Routed Mode with MSFC on the Server Side
66(3)
Csm Layer 3 Design III---One-Armed Csm Design
69(3)
Csm Layer 3 Design IV---Direct Server Return
72(1)
Case Study: Csm-Based Solution
73(8)
Server and Application Requirements
73(1)
Management and Security Requirements
74(1)
Infrastructure Requirements
74(1)
Design Options
75(1)
Csm Configurations
75(4)
Catalyst 6509 Layer 2 Configurations
79(1)
Catalyst 6509 Layer 3 Configurations
79(1)
Traffic Flow
80(1)
Test and Verification
80(1)
Summary
81(2)
Layer 7 Load Balancing and Content Customization
83(40)
Benefits of Layer 7 Load Balancing
83(2)
Scalability and Application Acceleration
84(1)
Session Persistence
84(1)
Content Customization
85(1)
Introduction to Tcp
85(7)
Data Segments
85(1)
Tcp Headers
86(1)
Source and Destination Port
86(1)
Sequence Number
86(1)
Acknowledgement Number
87(1)
Header Length
87(1)
Reserved
87(1)
Control Bits
87(1)
Window
87(1)
Checksum
88(1)
Urgent Pointer
88(1)
Options
88(1)
Padding
89(1)
Tcp Connection Establishment and Termination
89(1)
Tcp Connection Establishment
89(1)
Tcp Connection Termination
90(1)
Tcp Flow Control
91(1)
Tcp Acknowledgements, Retransmission, and Timeout
91(1)
Sliding Window
92(1)
Introduction to Http
92(14)
Protocol Details
93(1)
Http Methods
94(2)
Url
96(1)
Http Cookie
96(2)
Http Cookie Parameters
98(1)
Http Header Fields
99(1)
General Headers
99(1)
Request Headers
100(2)
Response Headers
102(2)
Entity Headers
104(1)
Differences Between Http Versions 1.0 and 1.1
105(1)
Persistent Connections
105(1)
Chunked Messages
105(1)
Hostname
106(1)
Pipelining Requests
106(1)
Layer 7 Load Balancing Mechanisms
106(4)
Http Methods-Based Load Balancing
107(1)
Http Url-Based Load Balancing
107(1)
Http Cookie-Based Load Balancing
108(1)
Http Cookie Passive-Based Persistence
109(1)
Http Cookie Learn-Based Persistence
109(1)
Http Cookie Insert-Based Persistence
110(1)
Case Study: Layer 7-Based Solution
110(10)
Server and Application Requirements
111(1)
Infrastructure Configuration
111(1)
Probe Configuration
112(1)
Online Download Application
113(1)
Online Shop Application
114(1)
Online User Profile Application
115(1)
Maximum Http Request Parse Length
116(1)
Csm Configuration
117(3)
Test and Verification
120(1)
Summary
120(3)
Firewall Load Balancing
123(24)
Reasons for and Benefits of FWLB
123(1)
Scalability
123(1)
Redundancy
124(1)
Manageability
124(1)
Types of Firewalls
124(5)
Packet-Based Firewalls
125(1)
Application-Based Firewalls
126(1)
Application Gateway or Proxy Firewalls
126(2)
Layer 2 or Stealth Firewalls
128(1)
Case Study: Firewall Load Balancing
129(16)
Server and Application Requirements
129(1)
Security Requirements
130(1)
Infrastructure Requirements
130(1)
Fwlb Design Considerations
130(3)
Fwlb Probes
133(1)
Traffic to the Firewalls
134(1)
Traffic from the Firewalls
134(1)
Router or Secure Mode
135(1)
Bridge Mode
135(1)
FWLB Algorithms
136(1)
Configuration Details of the INET Segment
136(1)
Csm Configurations
136(2)
Catalyst 6509 Layer 3 Configurations
138(1)
Configuration Details of the DMZ Segment
139(1)
Csm Configurations
139(2)
Catalyst 6509 Layer 3 Configurations
141(1)
Configuration Details of the LAN Segment
142(1)
Csm Configurations
142(2)
Catalyst 6509 Layer 3 Configurations
144(1)
Test and Verification
144(1)
Summary
145(2)
Transparent and Proxy Cache Load Balancing
147(36)
Benefits of Caching
147(1)
Caching Overview
147(2)
Caching Terminology
148(1)
Mechanics of Http Caching
149(2)
Http Response Status Code
149(1)
Http Request Methods
150(1)
Http Cache-Control Directives
150(1)
Expiration and Validation
150(1)
Request Authentication
151(1)
Cisco Application Content Networking and Caching
151(3)
ACNS Roles
152(1)
ACNS Content Types
153(1)
Content Engine Architecture
153(1)
Transparent Caching Modes
154(7)
WCCP Protocols
156(1)
WCCP Version 1
156(1)
WCCP Version 2
157(3)
Redirection with the Css
160(1)
Ip Spoofing
161(1)
Proxy Caching Overview
161(2)
Server Proxy (Reverse Proxy Caching)
163(2)
Supported Protocols on the Content Engine
165(1)
Authentication and Management on the Content Engine
165(1)
Content Engine Models
166(1)
Case Study: Content Engine in a Transparent Caching-Based Solution
167(14)
Design Requirements
167(1)
Design Options
168(1)
Layer 2 Redirection
168(2)
Http Configuration
170(6)
Url Filtering Configuration with Local Lists
176(2)
Configuration Details
178(3)
Summary
181(2)
Load Balancing Streaming Video Servers
183(22)
Benefits of Load Balancing Streaming Video Servers
183(1)
Scalability
183(1)
Redundancy
183(1)
Introduction to Streaming
184(2)
Video Streaming Clients and Protocols
184(1)
Methods of Video Stream Initiation
185(1)
Types of Streaming Video Servers
186(2)
Apple QuickTime
186(1)
RealMedia
187(1)
Windows Media Technology
187(1)
Streaming Video Protocols
188(2)
Microsoft Media Server (MMS)
188(1)
Microsoft Media Server - Universal Datagram Protocol (MMSU)
188(1)
Microsoft Media Server - Transmission Control Protocol (MMST)
188(1)
Microsoft Media Server over Http
189(1)
RTP and RTSP
189(1)
Case Study: Load-Balancing Solution for Video Streaming
190(13)
Css-Based Solution
191(1)
QuickTime Video Stream: Session Flow
192(1)
QuickTime Load Balancing: First Failure Scenario
193(1)
QuickTime Load Balancing: Second Failure Scenario
194(2)
QuickTime Load Balancing
196(1)
Css Configuration Details
197(1)
MSFC Configuration Details for the Css-Based Solution
198(1)
HTML Code Used in the Solution
199(1)
Csm-Based Solution
200(1)
QuickTime Load Balancing
201(1)
Csm Configuration Details
201(1)
Msfc Configuration Details for the Csm-Based Solution
202(1)
Summary
203(2)
Virtual Private Network Load Balancing
205(18)
Benefits of VPN Load Balancing
205(2)
Introduction to Virtual Private Networks
207(1)
Virtual Private Network Protocols
208(3)
Internet Key Exchange Protocol (IKE)
209(1)
Esp and Ah
210(1)
Authentication Header (AH)
210(1)
The Encapsulating Security Payload (ESP)
211(1)
Case Study: VPN Load-Balanced Solution
211(10)
Ike Requirements
211(1)
Esp Requirements
212(1)
IPsec over Udp Requirements
212(1)
Design Options
213(1)
Directed Mode Solution
213(1)
Csm Configurations for Directed Mode
214(2)
Csm show Commands for Directed Mode
216(1)
IPsec Router Configurations for Directed Mode
217(1)
Dispatch Mode Solution
217(2)
Csm Configurations for Dispatch Mode
219(1)
Csm Show Commands for Dispatch Mode
220(1)
IPsec Router Configurations for Dispatch Mode
220(1)
Summary
221(2)
Content Switching Device Migrations
223(34)
Motivation Behind Migration
223(3)
Evolution of Load Balancing
223(1)
Advanced Load-Balancing Methods
224(1)
Scalability and Performance
224(1)
Software Features and Functionality
225(1)
Migration Planning
226(10)
Migration Team
226(1)
Project Manager
226(1)
Content Engineer
227(2)
Network Operations Engineer
229(1)
Core (Layer 2/Layer 3) Engineer
229(1)
Application Administrator
229(1)
Fallback Plan
230(1)
Methods and Procedures for the Maintenance Window
231(4)
Application Testing
235(1)
Case Study: Migration from Css to Csm
236(19)
Infrastructure Requirements
237(1)
Css and Csm Mode of Operation
237(1)
Server's Default Gateway
237(1)
Redundancy and Fault Tolerance
237(1)
Server and Application Requirements
238(1)
Migration Configuration and Design Details
238(2)
Css and Csm Mode of Operation
240(1)
Redundancy and Fault Tolerance
241(2)
Ready for Migration
243(2)
Source Ip Sticky Configuration
245(1)
Layer 5 Content Rules
246(1)
Port Mapping or Port Redirection
247(1)
Keepalives
248(2)
Css Configurations
250(2)
Csm Configurations
252(3)
Summary
255(2)
Part II Secure Socket Layer
257(68)
Ssl Offloading
259(34)
Introduction to Ssl
259(9)
Public Key Cryptography
260(1)
Ssl Certificates
261(2)
Ssl Protocol Communication
263(3)
Ssl Protocol Structure
266(1)
Ssl Protocol Versions
267(1)
Introduction to SSLMs
268(7)
Sslm for the Catalyst 6500
269(1)
Sslm Deployments
270(1)
Sslm in Bridge Mode with the Csm
271(1)
Sslm in Routed Mode with the Csm
272(1)
Sslm on the Css
272(2)
Ssl Flows on the Css-Sslm
274(1)
Case Study: Csm and Sslm-Based Solution
275(16)
Design Requirements
275(1)
Design Details of a Csm and an Sslm-Based Solution
276(1)
Sslm Certificate Management
277(4)
Sslm and Csm Flow Overview
281(1)
Client Connection to the Csm
282(1)
Csm Connection to the Sslm
282(2)
Sslm to the Csm
284(1)
Csm Connection to the Server
285(1)
Configuration Details
286(1)
Csm Configuration
286(1)
Sslm Configuration---Primary
287(2)
Sslm Configuration---Secondary
289(2)
Summary
291(2)
Back-End Ssl Offloading
293(32)
Back-End Ssl on Modules
293(11)
Back-End Ssl on the Sslm for the Catalyst 6500
294(6)
Back-End Ssl on the Sslm on the Css
300(4)
Case Study: Back-End Ssl Solution
304(19)
Requirements
304(1)
Design Options
305(1)
Sslm Certificate Management
306(4)
Sslm and Csm Flow Overview
310(2)
Client Connection to the Csm
312(1)
Csm Connection to the Sslm
312(2)
Sslm to the Csm
314(1)
Csm to the Sslm
315(1)
Sslm to the Server (via Csm)
316(2)
Configuration Details
318(5)
Summary
323(2)
Part III Distributed Data Centers
325(90)
Global Server Load Balancing
327(52)
Motivation for Gslb
327(1)
Domain Name System (Dns) Overview
328(6)
Dns Architecture Components
329(1)
Dns Resolution Process
330(1)
Dns Resource Records and Zones
331(1)
Resource Records
331(1)
Zones
331(1)
Types of Dns Queries
332(2)
Global Site Selector
334(19)
Gslb Using Gss
334(2)
Gss Features and Performance
336(1)
Gss Roles
337(2)
Gss Dns Rules
339(2)
Gss Balance Methods
341(2)
Gss Domains
343(1)
Gss Answers
344(3)
Gss Keepalives
347(2)
Gss Resources, Locations, Regions, and Owners
349(3)
Gss Dns Stickiness
352(1)
Gss Network Proximity
352(1)
Case Study: Gslb Solution Using Gss
353(24)
Requirements
354(1)
Topology
354(1)
Gss Network Setup
355(1)
Primary GSSM
356(1)
Secondary GSSM
357(1)
Gss Secondary GSSM Activation
358(1)
Css Setup in Primary Data Center
359(1)
Css Setup in Secondary Data Center
360(1)
Gss Setup for the www.roundrobin.com Domain
360(1)
Gss Dns Rule Configuration for www.roundrobin.com
360(7)
Gss Dns Rule Testing for www.roundrobin.com
367(2)
Gss Tcp Keepalive for the www.roundrobin.com Domain
369(1)
Gss Setup for the www.sticky.com Domain
370(3)
Gss Dns Rule Testing for www.sticky.com
373(1)
Configuration Details
374(3)
Summary
377(2)
Ip-Based Gslb Using RHI
379(36)
Benefits of Using RHI
379(1)
Architecture
379(1)
Active/Standby Site-to-Site Recovery
380(2)
Autonomous System Prepending
381(1)
BGP Conditional Advertisements
381(1)
Design Limitations
382(1)
Implementation Details for Active/Standby Scenarios
382(10)
AS Prepending
383(1)
Primary Site Configuration
384(1)
Standby Site Configuration
385(1)
BGP Conditional Advertisement
386(2)
Primary Site Configuration
388(2)
Standby Site Configuration
390(2)
Active/Active Site-to-Site Load Distribution
392(1)
Implementation Details for Active/Active Scenarios
393(20)
OSPF Route Redistribution and Summarization
394(1)
BGP Route Redistribution and Route Preference
395(1)
BGP Configuration of Primary Site Edge Router
395(1)
BGP Configuration of Secondary Site Edge Router
396(1)
Load Balancing Without IGP Between Sites
397(1)
Routes During Steady State
398(1)
Routes After All Servers on the Primary Site Are Down
398(1)
Limitations and Restrictions
399(1)
Subnet-Based Load Balancing Using IGP Between Sites
400(1)
Changing IGP Cost for Site Maintenance
400(1)
Routes During Steady State
401(2)
Limitations and Restrictions
403(1)
Application-Based Load Balancing Using IGP Between Sites
403(1)
Configuration on Primary Site
404(1)
Configuration on Secondary Site
404(1)
Routes During Steady State
405(1)
Limitations and Restrictions
406(1)
Using NAT in Active/Active Load-Balancing Solutions
406(1)
Primary Site Edge Router Configuration
407(1)
Secondary Site Edge Router Configuration
408(1)
Steady State Routes
409(3)
Routes When Servers in Primary Data Center Goes Down
412(1)
Summary
413(2)
Part IV Data Center Designs
415(64)
Scaling Server Load Balancing within a Data Center
417(26)
Benefits of Scaling Content Switching
417(1)
Scalability
417(1)
Performance
418(1)
Scaling Methodologies
418(1)
Distribution of Applications
419(1)
Using Dns for Application Scalability
419(1)
Using Route Health Injection for Application Scalability
419(1)
Application Distribution Approach
419(1)
Dns-Based Scaling Approach
420(2)
Predictable Traffic Flow
422(1)
Ease of Management and Maintenance
422(1)
RHI-Based Scaling Approach
422(4)
Csm RHI Configuration
424(1)
MSEC RHI Configuration and Routes
425(1)
Scaling Beyond Server Capacity
426(1)
Case Study: Scalable SLB Environment
426(15)
Server and Application Requirements
427(1)
Management and Security Requirements
427(1)
Infrastructure Requirements
427(1)
Dns-Based Design
428(1)
Csm-1 Configuration for Dns-Based Solution
429(2)
Csm-2 Configuration for Dns-Based Solution
431(2)
RHI-Based Design
433(1)
Csm-1 Configuration for RHI-Based Solution
434(1)
Csm-2 Configuration for RHI-Based Solution
435(2)
Testing Maximum Connections
437(1)
Test Case 1
437(1)
Test Case 2
438(1)
Test Case 3
439(2)
Summary
441(2)
Integrated Data Center Designs
443(36)
Motivations Behind Integrated Data Center Designs
443(1)
Data Center Design 1: FWSM in the Core and Layer 3 Csm in Aggregation
444(3)
Design 1 Topology Details
444(2)
Design 1 Details
446(1)
Design 1 Configuration Details
446(1)
Data Center Design 2: Layer 3 FWSM and Layer 2 Csm in Aggregation
447(3)
Design 2 Topology Details
447(2)
Design 2 Caveats
449(1)
Design 2 Configuration Details
450(1)
Data Center Design 3: Layer 3 FWSM and Layer 2 Csm in Aggregation
450(3)
Design
3(448)
Topology Details
451(1)
Design 3 Caveats
452(1)
Design 3 Configuration Details
453(1)
Data Center Design 4: Layer 3 FWSM and Layer 2 Csm in Aggregation
453(4)
Design 4 Topology Details
454(1)
Design 4 Caveats
455(1)
Design 4 Configuration Details
456(1)
Case Study: Integrated Data Center Design
457(20)
Design Details
458(2)
Primary Css (Css 11506--1) Configuration Details
460(5)
Backup Css (Css 11506--2) Configuration Details
465(1)
Catalyst 6509 Configuration Details
465(3)
Layer 2 Port-Channel Configuration Details
468(1)
NAT Configuration Details
468(2)
Policy-Based Routing Configuration Details
470(1)
FWSM Configuration Details
470(2)
DMZWeb Virtual Context
472(1)
DMZApp Virtual Context
473(1)
Outside Virtual Context
474(1)
Inside Virtual Context
475(2)
Summary
477(2)
Index 479

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program