SlideShare a Scribd company logo
1 of 26
Download to read offline
McAfee Web Gateway
Deployment Guide
v1.0.14

Copyright © 2013 Loadbalancer.org, Inc.

1
Table of Contents
About this Guide............................................................................................................................................... 3
Loadbalancer.org Appliances Supported.......................................................................................................... 3
Loadbalancer.org Software Versions Supported............................................................................................... 3
McAfee Web Gateway Appliances Supported.................................................................................................. 3
Benefits of Implementing a Load Balancer....................................................................................................... 4
Load Balancer Configuration Options............................................................................................................... 4
Layer 4 (Recommended)............................................................................................................................. 4
DR Mode - Direct Server Return Mode (Recommended).......................................................................4
NAT Mode - Network Address Translation Mode....................................................................................4
Layer 7......................................................................................................................................................... 4
SNAT / HAProxy Mode - Source Network Address Translation..............................................................4
Persistence - aka Server Affinity.................................................................................................................. 5
Source IP Address (Recommended)...................................................................................................... 5
Destination Hash.................................................................................................................................... 5
Web Gateway Deployment Modes.................................................................................................................... 5
1 – Proxy Mode (Recommended)................................................................................................................ 5
2 – Transparent Routed Proxy Mode........................................................................................................... 5
Loadbalancer.org Appliance – the Basics......................................................................................................... 6
Network Configuration................................................................................................................................. 6
Accessing the Web User Interface (WUI).................................................................................................... 7
Clustered Pair Configuration........................................................................................................................ 8
Option 1 - Proxy Mode (Recommended).......................................................................................................... 9
Deployment Architecture.............................................................................................................................. 9
Load Balancer Configuration..................................................................................................................... 10
Create the Virtual Server/Service (VIP)................................................................................................ 10
Create the Real Servers (RIPs)............................................................................................................ 11
Web Gateway Configuration...................................................................................................................... 12
Modify the Web Gateways to accept traffic for the VIP.........................................................................12
Concept........................................................................................................................................... 12
Configuring the McAfee Appliance................................................................................................... 12
Web Gateway Operating Mode............................................................................................................. 13
Proxy Port Configuration....................................................................................................................... 13
Client Configuration................................................................................................................................... 14
Option 2 - Transparent (Routed) Proxy Mode................................................................................................. 15
Deployment Architecture............................................................................................................................ 15
Load Balancer Configuration..................................................................................................................... 16
Create the Virtual Server/Service (VIP)................................................................................................ 16
Create the Real Servers (RIPs)............................................................................................................ 18
Web Gateway Configuration...................................................................................................................... 19
Web Gateway Operating Mode............................................................................................................. 19
Router / Default Gateway Configuration.................................................................................................... 21
Client Configuration................................................................................................................................... 21
Testing & Validation......................................................................................................................................... 22
Layer 4 – Current Connections.................................................................................................................. 22
Technical Support........................................................................................................................................... 23
Appendix......................................................................................................................................................... 24
1 – Clustered Pair Configuration – Adding a Slave Unit.............................................................................24
2 – Loadbalancer.org Company Contact Information.................................................................................25
3 – McAfee Company Contact Information................................................................................................ 26

2
About this Guide
This guide details the configuration of Loadbalancer.org appliances for deployment with McAfee's range of
Web Gateway products. It includes recommended deployment topologies and also steps on how to configure
the appliances.
For an introduction on setting up the load balancer as well as more technical information, please also refer to
the quick-start guides and full administration manuals which are available at the following links:
Quickstart guide: http://www.loadbalancer.org/pdf/quickstartguideLBv7.pdf
Administration manual: http://www.loadbalancer.org/pdf/loadbalanceradministrationv7.pdf

Loadbalancer.org Appliances Supported
All our products can be used for load balancing McAfee Web Gateways. The complete list of models is
shown below:

•

Enterprise R16

•

Enterprise

•

Enterprise MAX

•

Enterprise 10G

•

Enterprise VA

•

Enterprise VA R16

For a full specification comparison of these models please refer to: http://www.loadbalancer.org/matrix.php

Loadbalancer.org Software Versions Supported
•

v7.4.3 and later

McAfee Web Gateway Appliances Supported
•

All versions

3
Benefits of Implementing a Load Balancer
Since secure, reliable and available Internet access is essential and not just a luxury, steps must be taken to
ensure 100% up time. Loadbalancer.org appliances provide the perfect solution by allowing multiple Web
Gateway devices to be deployed in a load balanced and highly available cluster. Benefits include:

•
•
•

High-Availability – If a Web Gateway fails, service is not interrupted
Maintenance – Web Gateways can easily be taken out of the cluster for maintenance
Performance – For additional performance simply add more Web Gateways to the cluster

Load Balancer Configuration Options
The following sections describe the various load balancer configuration methods that are possible when load
balancing Web Gateways.

Layer 4 (Recommended)
DR Mode - Direct Server Return Mode (Recommended)
In this mode, traffic from the client to the Web Gateway passes via the load balancer, return traffic passes
directly back to the client which maximizes performance. Direct routing works by changing the destination
MAC address of the incoming packet on the fly which is very fast. This mode is transparent by default
meaning that the Web Gateway sees the real client IP address and not the IP address of the load balancer.
Due to its speed, overall simplicity and effectiveness, Direct Routing (DR) mode with source IP persistence is
our recommended method and can be used in both proxy mode & transparent (routed) proxy mode.

NAT Mode - Network Address Translation Mode
This mode requires the implementation of a two-arm infrastructure with an internal and external subnet to
carry out the translation (the same way a firewall works). The real servers (i.e. the Web Gateways) must
have their default gateway configured to be the load balancer. It offers high performance and like DR mode is
transparent by default.

Layer 7
SNAT / HAProxy Mode - Source Network Address Translation
Using HAProxy in SNAT mode means that the load balancer is acting as a full proxy and therefore it doesn't
have the same raw throughput as the layer 4 methods. Also, this method is not transparent by default so the
real servers will see the source address of each request as the load balancers IP address. This is generally
not desirable although this can be resolved in two ways; either by reading the X-Forwarded-For header that's
included by default when using HAProxy, or by enabling Tproxy on the load balancer. The issues with using
Proxy are that the default gateway on the real servers (i.e. the Web Gateways) must be changed to point as
the load balancer and also it requires a two-arm infrastructure with two subnets which complicates the
deployment.
SNAT mode does not have the raw throughput of the layer 4 solutions and is therefore not normally used for
Web Gateway / Proxy load balancing deployments.

4
Persistence - aka Server Affinity
Persistence may or may not be required and depends on the specific Web Gateway being used. Two
possible methods are described in the following sections.

Source IP Address (Recommended)
Source IP persistence is the standard method and is appropriate for most requirements. When set, clients
connecting from the same source IP address within the persistence timeout period (the default is 5 mins) will
always be sent to the same Web Gateway.

Destination Hash
Another option is to change the load balancing algorithm (i.e. the “scheduler”) to destination hash (DH). This
causes the load balancer to select the proxy based on a hash of the destination IP address. This causes
session requests to be directed at the same server based solely on the destination IP address of a packet
which therefore makes client connections persistent for a particular Internet host.
Since this setting is a scheduler, the way connections are load balanced will also change. However it should
still provide a well balanced distribution of client sessions between Web Gateway servers.

Web Gateway Deployment Modes
There are two implementation methods that are typically used – Proxy Mode & Transparent (Routed) Proxy
Mode.

1 – Proxy Mode (Recommended)
This mode requires the load balancer / proxy address to be defined in users browsers. This allows specific
traffic (typically HTTP & HTTPS) to be handled by the proxy on behalf of the client PCs.

2 – Transparent Routed Proxy Mode
With this mode, client requests must be routed to the load balancer / Web Gateway cluster. This can be
achieved by either setting the default gateway on the client PCs to be the load balancer, or by adding rules to
the default gateway device. Rules would typically be configured for HTTP & HTTPS traffic on ports 80 and
443.

NOTE: In transparent mode, web proxies are unable to filter HTTPS traffic. This is because SSL
cannot be proxied transparently. SSL authenticates both sides of the connection and if a proxy is in
the middle, then both sides try to authenticate to the proxy which is incorrect and therefore the
connection fails. NTLM authentication also fails for similar reasons. For HTTPS & NTLM, either the
proxy server must be explicitly configured or traffic should pass directly from the client to the server.
We recommend using proxy mode rather than transparent proxy mode whenever possible due to
these limitations.

5
Loadbalancer.org Appliance – the Basics
Network Configuration
The IP address, default gateway and DNS settings can be configured in several ways depending on the
version as detailed below.

v7.5 & Later
Configure the IP address, Default Gateway & DNS Settings
Using the Network Setup Wizard at the console:
After boot, follow the console instructions to configure the IP address, gateway and DNS settings..
Using the WUI:
Using a browser, connect to the WUI on the default IP address/port: http://192.168.2.21:9080
to set the IP address use: Local Configuration > Network Interface Configuration
to set the default gateway use: Local Configuration > Routing
to configure DNS settings use: Local Configuration > Hostname & DNS
Using Linux commands:
At the console, set the initial IP address using the following command:
ip addr add <IP address>/<mask> dev eth0
e.g. ip addr add 192.168.2.10/24 dev eth0
At the console, set the initial default gateway using the following command:
route add default gw <IP address> <interface>
e.g. route add default gw 192.168.2.254 eth0
At the console, set the DNS server using the following command:
echo nameserver <IP address> >> /etc/resolv.conf
e.g. echo nameserver 192.168.64.1 >> /etc/resolv.conf
N.B. If this method is used, you must also configure these settings using the WUI, otherwise settings will be
lost after a reboot

v7.4.3
Configure the IP address & Default Gateway
Using the Network Setup Wizard at the console:
After boot, follow the console instructions to configure the IP address and gateway using the Network Setup
Wizard.
N.B. For these software versions the network setup wizard does not support DNS server configuration. DNS
servers must be defined using the WUI or Linux commands as explained below.

6
Configure the IP address, Default Gateway & DNS Settings
Using the WUI:
Using a browser, connect to the WUI on the default IP address:port: http://192.168.2.21:9080
to set the IP address use: Edit Configuration > Network Interface Configuration
to set the default gateway use: Edit Configuration > Routing
to configure DNS settings use: Edit Configuration > Hostname & DNS
Using Linux commands:
At the console, set the initial IP address using the following command:
ip addr add <IP address>/<mask> dev eth0
e.g. ip addr add 192.168.2.10/24 dev eth0
At the console, set the initial default gateway using the following command:
route add default gw <IP address> <interface>
e.g. route add default gw 192.168.2.254 eth0
At the console, set the DNS server using the following command:
echo nameserver <IP address> >> /etc/resolv.conf
e.g. echo nameserver 192.168.64.1 >> /etc/resolv.conf
N.B. If this method is used, you must also configure these settings using the WUI, otherwise settings will be
lost after a reboot

Accessing the Web User Interface (WUI)
The WUI can be accessed from a browser at: http://192.168.2.21:9080/lbadmin
* Note the port number → 9080
(replace 192.168.2.21 with the IP address of your load balancer if its been changed from the default)
Username: loadbalancer
Password: loadbalancer
Once you have entered the logon credentials the Loadbalancer.org Web User Interface will be displayed as
shown below:

The screen shot below shows the v7.5 WUI once logged in:

7
Clustered Pair Configuration
Loadbalancer.org recommend that load balancer appliances are deployed in pairs for high availability. In this
guide s single unit is deployed first, adding a secondary slave unit is covered in section 1 of the Appendix.

NOTE: It's highly recommended that you have a working Web Gateway environment first before
implementing the load balancer.

8
Option 1 - Proxy Mode (Recommended)
Deployment Architecture
Client
PC 1

Client
PC 2

Default
Gateway
Router

Firewall

Internet

Client
PC n
Load Balancer 1
(master)
Heartbeat

Load Balancer 2
(slave)

McAfee
Web Gateway 1
McAfee
Web Gateway 2
Notes

•

Browser settings on client PC's must be changed to point at the Virtual Server/Service (VIP) on the
load balancer

•

The load balancer(s) must be configured in Layer 4 DR mode

•

The McAfee Web Gateways must be configured to accept traffic for the VIP (see page 12)

•

Typically, two loadbalancer.org appliances are deployed for resilience – this is our recommended
configuration

•

For more information on McAfee Web Gateway deployment options please refer to the following
URL:
https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/
PD24047/en_US/mwg_73_pg_product_a_en_us.pdf
9
Load Balancer Configuration
Create the Virtual Server/Service (VIP)
NOTE: Prior to v7.5 a VIP is known as a 'Virtual Server', from v7.5 onwards it's known as a 'Virtual
Service'. For simplicity the configuration steps below refer to 'Virtual Service' for both.

•

v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Virtual Services

•

v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Virtual Servers

•

Click [Add a New Virtual Service]

•

Enter the following details:

•

Enter an appropriate label (name) for the VIP, e.g. Proxy

•

Set the Virtual Service IP address field to the required IP address, e.g. 192.168.2.202

•

Set the Virtual Service Ports field to the required port (the same as the Web Gateways) , e.g. 8080

•

Ensure that Forwarding Method is set to Direct Return

•

Set Persistent to yes

•

Ensure that Protocol is set to TCP

•

Click Update

10
Create the Real Servers (RIPs)

•

v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Real Servers

•

v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Real Servers

•

Click [Add a new Real Server] next to the newly created VIP

•

Enter the following details:

•

Enter an appropriate label (name) for the first Proxy Server, e.g. Proxy1

•

Change the Real Server IP Address field to the required IP address, e.g. 192.168.2.210

•

Click Update

•

Repeat the above steps to add your other Web Gateways

11
Web Gateway Configuration
Modify the Web Gateways to accept traffic for the VIP
Concept

As mentioned previously, DR mode is our recommended load balancer operating mode. To use this mode,
changes are required to the real servers, i.e. the Web Gateways. The real servers must accept traffic for the
VIP, but they must not respond to any ARP requests for that IP, only the VIP should do this.
To configure a Linux based Web Gateway appliance to accept traffic for the VIP the following line must be
added to the rc.local startup script on each Web Gateway appliance:
iptables -t nat -A PREROUTING -p tcp -d <VIP address> -j REDIRECT
e.g.
iptables -t nat -A PREROUTING -p tcp -d 192.168.2.202 -j REDIRECT
i.e. Redirect any incoming packets destined for the VIP to the local address
N.B. For more information please refer to the administration manuals and search for 'ARP Problem'

Configuring the McAfee Appliance

N.B. These steps must be followed on all Gateways
Login as root either at the console or using a remote ssh session
Edit the file /etc/rc.local using vi, vim or a remote editor such as the one included in WinSCP
Then add the following additional line to this file as shown below:
iptables -t nat -A PREROUTING -p tcp -d <VIP address> -j REDIRECT

12
Web Gateway Operating Mode
The McAfee Web Gateway can easily be configured for proxy mode using the WUI option: Configuration >
Proxies (HTTP(S), FTP, ICAP and IM) and selecting the option Proxy (optional WCCP) as shown below:

Proxy Port Configuration
The required proxy port can be set as shown below, simple edit the default entry and change the port as
required:

N.B. The default proxy port for McAfee Web Gateways is 9090

13
Client Configuration
Client browser settings must be set so that browsers connect via the VIP. In a Microsoft based LAN
environment, this is typically achieved using AD group policy.

14
Option 2 - Transparent (Routed) Proxy Mode
Deployment Architecture
Client
PC 1

Client
PC 2

Default
Gateway
(see notes below)
Router

Firewall

Internet

Client
PC n
Load Balancer 1
(master)
Heartbeat

Load Balancer 2
(slave)

McAfee
Web Gateway 1
McAfee
Web Gateway 2
Notes

•

If rules are added to the router so that traffic is sent transparently to the load balancer, no changes
are required to client PC settings
Alternatively, the default gateway on the client PCs should be set to be a floating IP on the load
balancer (to allow master / slave failover)

•

As with non-transparent mode, the load balancer is configured in Layer 4 DR mode

•

Firewall rules must be added to the load balancer to transparently send traffic to the Web Gateways
(see page 17)

•

Typically, two loadbalancer.org appliances are deployed for resilience – this is our recommended
configuration

•

For more information on McAfee Web Gateway deployment options please refer to the following
URL:
https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/
PD24047/en_US/mwg_73_pg_product_a_en_us.pdf
15
Load Balancer Configuration
Create the Virtual Server/Service (VIP)
NOTE: Prior to v7.5 a VIP is known as a 'Virtual Server', from v7.5 onwards it's known as a 'Virtual
Service'. For simplicity the configuration steps below refer to 'Virtual Service' for both.

•

v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Virtual Services

•

v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Virtual Servers

•

Click [Add a New Virtual Service]

•

Enter the following details:

•

Enter an appropriate label (name) for the VIP, e.g. Proxy

•

Change the Virtual Service IP address field to 1
N.B. This is the reference number for the 'Firewall Mark' which is required for VIPs with multiple
ports – in this case, ports 80 & 443 are required. This reference is also used when configuring the
firewall rules.

•

Leave Virtual Service Ports blank

•

Ensure that Forwarding Method is set to Direct Routing

•

Set Persistent to yes

•

Ensure that Protocol is set to Firewall Marks

•

Click Update

•

Now click [Modify] next to the newly created VIP

•

Change Check Type to Ping Server

•

Click Update

16
•

v7.5 & later – Using the WUI, go to Cluster Configuration > Floating IPs

•

v7.4.3 – Using the WUI, go to Edit Configuration > Floating IPs

•

Enter an appropriate IP address for the Virtual Service, e.g. 192.168.2.202

•

Click Update

•

Using the WUI, go to Maintenance > Firewall Script

•

Scroll down to the Firewall Marks section

•

Add the following lines to this section as shown in the screen shot below:
iptables -t mangle -A PREROUTING -p tcp --dport 80 -j MARK --set-mark 1
iptables -t mangle -A PREROUTING -p tcp --dport 443 -j MARK --set-mark 1
ip rule add prio 100 fwmark 1 table 100
ip route add local 0/0 dev lo table 100

•

Click Update

17
Create the Real Servers (RIPs)

•

v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Real Servers

•

v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Real Servers

•

Click [Add a new Real Server] next to the newly created VIP

•

Enter the following details:

•

Enter an appropriate label (name) for the first Proxy Server, e.g. Proxy1

•

Change the Real Server IP Address field to the required IP address, e.g. 192.168.2.210

•

Click Update

•

Repeat the above steps to add your other Web Gateways

18
Web Gateway Configuration
Web Gateway Operating Mode
The McAfee Web Gateway can easily be configured for transparent routed mode using the WUI option:
Configuration > Proxies (HTTP(S), FTP, ICAP and IM)
Configure the following options:
1) Enable transparent router mode
Enable port directs to route all port 80 & 443 traffic to the proxy (default port is 9090) and set the director
priroty to at least 1 make active

2) Enable port redirection so that HTTP ports 80 & 443 are forwarded to the proxy. Also set Director Priority
to at least 1 to enable the director

19
3) enable the HTTP Proxy

NOTE: When using transparent routed mode, it's not necessary to modify the Web Gateway to
accept traffic destined for the VIP, this is only required when using proxy mode.

20
Router / Default Gateway Configuration
N.B. This is required when no changes have been made to the clients gateway settings
Depending on your network configuration, rules must be added to the router/default gateway so that all
HTTP traffic is sent to the VIP on the load balancer. The load balancer then distributes this traffic between
the Web Gateway servers.
Example iptables rules:
CLIENT="192.168.2.0/24"
FWMARK="10"
TABLE="10"
LOADBALANCER ="192.168.2.204"
iptables -t mangle -A PREROUTING -s $CLIENT -p tcp -m tcp --dport 80 -j MARK --set-mark $FWMARK
ip route flush table $TABLE
ip route add default via $LOADBALANCER dev eth3 table $TABLE
ip rule add fwmark $FWMARK table $TABLE
ip route flush cache
ip route show table $TABLE
route add default gw 192.168.2.1
This example uses policy routing via firewall marks. This works by first selecting and marking the packets we
want to be sent to the proxy, i.e. all packets on port 80. Then, when the kernel goes to make a routing
decision, the marked packets aren't routed using the normal routing table, instead via table 10 in this case.
Table 10 has only one entry: route packets to the Web Gateway.

Client Configuration
If rules are configured on the router as described in the section above, no client change are required. If such
rules are not configured, then the default gateway on the client PCs must be modified to be the load
balancer.

21
Testing & Validation
To verify that the traffic is passing through the load balancer correctly the following reporting options can be
used:
System Overview
Reports > Layer 4 Status
Reports > Layer 4 Current Connections
Many reporting and dashboard options are also available in the McAfee user interface. For more details
please refer to the appropriate McAfee documentation

Layer 4 – Current Connections
Proxy Mode
The example screen shot below illustrates that the test client (192.168.64.7) sends requests to the VIP
(192.168.111.88), the load balancer then forwards the request onto the Web Filter / Gateway
(192.168.64.60).

22
Transparent Mode
The example screen shot below illustrates illustrates the difference when running in transparent mode.

Many reporting and dashboard options are also available in the McAfee Web Gateway user interface. For
more details please refer to the appropriate McAfee documentation.

Technical Support
Loadbalancer.org support : support@loadbalancer.org
McAfee support : http://service.mcafee.com/default.aspx

23
Appendix
1 – Clustered Pair Configuration – Adding a Slave Unit
If you initially configured just the master unit and now need to add a slave, please refer the section 'Adding a
slave unit after the master has been configured' in the v7.x administration manual which is available at the
following link: http://www.loadbalancer.org/pdf/loadbalanceradministrationv7.pdf

Don't hesitate to contact our support team if you need any further assistance configuring a slave
appliance: support@loadbalancer.org

24
2 – Loadbalancer.org Company Contact Information

Website

URL : www.loadbalancer.org

North America (US)

Loadbalancer.org, Inc.
270 Presidential Drive
Wilmington,
DE 19807
USA
Tel
Fax
Email (sales)
Email (support)

:
:
:
:

North America (Canada)

+1 866.229.8562 (24x7)
+1 302.213.0122
sales@loadbalancer.org
support@loadbalancer.org

Loadbalancer.org Ltd.
300-422 Richards Street
Vancouver, BC
V6B 2Z4
Canada
Tel
Fax
Email (sales)
Email (support)

:
:
:
:

Europe (UK)

+1 604.629.7575
+1 302.213.0122
sales@loadbalancer.org
support@loadbalancer.org

Loadbalancer.org Ltd.
Portsmouth Technopole
Kingston Crescent
Portsmouth
PO2 8FA
England, UK
Tel
Fax
Email (sales)
Email (support)

:
:
:
:

Europe (Germany)

+44(0)870 4438779 (24x7)
+44(0)870 4327672
sales@loadbalancer.org
support@loadbalancer.org

Loadbalancer.org GmbH
Alt Pempelfort 2
40211 Düsseldorf
Germany
Tel
Fax
Email (sales)
Email (support)

:
:
:
:

+49 (0)221 9793 7203
+49 (0)30 9203 836495
vertrieb@loadbalancer.org
support@loadbalancer.org

25
3 – McAfee Company Contact Information

Website

Worldwide Support
Options

URL : www.mcafee.com

McAfee support:

http://service.mcafee.com/default.aspx

26

More Related Content

What's hot

SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
LINA Korea, A Chubb Company - Insurer transformation Award 2022
LINA Korea, A Chubb Company - Insurer transformation Award 2022LINA Korea, A Chubb Company - Insurer transformation Award 2022
LINA Korea, A Chubb Company - Insurer transformation Award 2022The Digital Insurer
 
The Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerThe Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerBernard Marr
 
Confidential Computing overview
Confidential Computing overviewConfidential Computing overview
Confidential Computing overviewMark Argent
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Cloudera, Inc.
 
API Integration: Red Hat integration perspective
API Integration: Red Hat integration perspectiveAPI Integration: Red Hat integration perspective
API Integration: Red Hat integration perspectiveJudy Breedlove
 
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...apidays
 
Intro to High Performance Computing in the AWS Cloud
Intro to High Performance Computing in the AWS CloudIntro to High Performance Computing in the AWS Cloud
Intro to High Performance Computing in the AWS CloudAmazon Web Services
 
Augmenting Security Posture and Improving Operational Health with AWS CloudTr...
Augmenting Security Posture and Improving Operational Health with AWS CloudTr...Augmenting Security Posture and Improving Operational Health with AWS CloudTr...
Augmenting Security Posture and Improving Operational Health with AWS CloudTr...Amazon Web Services
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
Quota - InsurTech Innovation Award 2022
Quota - InsurTech Innovation Award 2022Quota - InsurTech Innovation Award 2022
Quota - InsurTech Innovation Award 2022The Digital Insurer
 
How Applied Materials Deploys Faster SAP® Projects and Boosts Quality with Wo...
How Applied Materials Deploys Faster SAP® Projects and Boosts Quality with Wo...How Applied Materials Deploys Faster SAP® Projects and Boosts Quality with Wo...
How Applied Materials Deploys Faster SAP® Projects and Boosts Quality with Wo...Worksoft
 
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNSشناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNSMahdi Sayyad
 
Loyalty Program Management System
Loyalty Program Management SystemLoyalty Program Management System
Loyalty Program Management SystemSimerjeet Singh
 
Real-time personalization at scale by Salesforce CDP and Interaction Studio, ...
Real-time personalization at scale by Salesforce CDP and Interaction Studio, ...Real-time personalization at scale by Salesforce CDP and Interaction Studio, ...
Real-time personalization at scale by Salesforce CDP and Interaction Studio, ...CzechDreamin
 
Immersion Day - Well Architected Workshop - June 2019
Immersion Day - Well Architected Workshop - June 2019Immersion Day - Well Architected Workshop - June 2019
Immersion Day - Well Architected Workshop - June 2019Amazon Web Services
 
Knowledge Graph Generation from Wikipedia in the Age of ChatGPT: Knowledge ...
Knowledge Graph Generation  from Wikipedia in the Age of ChatGPT:  Knowledge ...Knowledge Graph Generation  from Wikipedia in the Age of ChatGPT:  Knowledge ...
Knowledge Graph Generation from Wikipedia in the Age of ChatGPT: Knowledge ...Heiko Paulheim
 
Azure Overview Business Model Overview
Azure Overview Business Model OverviewAzure Overview Business Model Overview
Azure Overview Business Model Overviewrramabad
 

What's hot (20)

SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
LINA Korea, A Chubb Company - Insurer transformation Award 2022
LINA Korea, A Chubb Company - Insurer transformation Award 2022LINA Korea, A Chubb Company - Insurer transformation Award 2022
LINA Korea, A Chubb Company - Insurer transformation Award 2022
 
One Cloud Pitch Deck
One Cloud Pitch DeckOne Cloud Pitch Deck
One Cloud Pitch Deck
 
The Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerThe Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your Career
 
Confidential Computing overview
Confidential Computing overviewConfidential Computing overview
Confidential Computing overview
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning

 
API Integration: Red Hat integration perspective
API Integration: Red Hat integration perspectiveAPI Integration: Red Hat integration perspective
API Integration: Red Hat integration perspective
 
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
 
Intro to High Performance Computing in the AWS Cloud
Intro to High Performance Computing in the AWS CloudIntro to High Performance Computing in the AWS Cloud
Intro to High Performance Computing in the AWS Cloud
 
Augmenting Security Posture and Improving Operational Health with AWS CloudTr...
Augmenting Security Posture and Improving Operational Health with AWS CloudTr...Augmenting Security Posture and Improving Operational Health with AWS CloudTr...
Augmenting Security Posture and Improving Operational Health with AWS CloudTr...
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Quota - InsurTech Innovation Award 2022
Quota - InsurTech Innovation Award 2022Quota - InsurTech Innovation Award 2022
Quota - InsurTech Innovation Award 2022
 
How Applied Materials Deploys Faster SAP® Projects and Boosts Quality with Wo...
How Applied Materials Deploys Faster SAP® Projects and Boosts Quality with Wo...How Applied Materials Deploys Faster SAP® Projects and Boosts Quality with Wo...
How Applied Materials Deploys Faster SAP® Projects and Boosts Quality with Wo...
 
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNSشناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
شناسایی بات نت های Fast-Flux با استفاده از تحلیل ناهنجاری DNS
 
Loyalty Program Management System
Loyalty Program Management SystemLoyalty Program Management System
Loyalty Program Management System
 
Real-time personalization at scale by Salesforce CDP and Interaction Studio, ...
Real-time personalization at scale by Salesforce CDP and Interaction Studio, ...Real-time personalization at scale by Salesforce CDP and Interaction Studio, ...
Real-time personalization at scale by Salesforce CDP and Interaction Studio, ...
 
Immersion Day - Well Architected Workshop - June 2019
Immersion Day - Well Architected Workshop - June 2019Immersion Day - Well Architected Workshop - June 2019
Immersion Day - Well Architected Workshop - June 2019
 
Knowledge Graph Generation from Wikipedia in the Age of ChatGPT: Knowledge ...
Knowledge Graph Generation  from Wikipedia in the Age of ChatGPT:  Knowledge ...Knowledge Graph Generation  from Wikipedia in the Age of ChatGPT:  Knowledge ...
Knowledge Graph Generation from Wikipedia in the Age of ChatGPT: Knowledge ...
 
Azure Overview Business Model Overview
Azure Overview Business Model OverviewAzure Overview Business Model Overview
Azure Overview Business Model Overview
 

Viewers also liked

Load-Balancing-des-Trend-Micro-InterScan-Web-Security-WebGateway-Webfilter-da...
Load-Balancing-des-Trend-Micro-InterScan-Web-Security-WebGateway-Webfilter-da...Load-Balancing-des-Trend-Micro-InterScan-Web-Security-WebGateway-Webfilter-da...
Load-Balancing-des-Trend-Micro-InterScan-Web-Security-WebGateway-Webfilter-da...Loadbalancer_org_Gmbh
 
4. nilai gizi daging ikan
4. nilai gizi daging ikan4. nilai gizi daging ikan
4. nilai gizi daging ikanHeru Pramono
 
Clearswift-Secure-Web-Gateway-Webfilter Load Balancer Handbuch
Clearswift-Secure-Web-Gateway-Webfilter Load Balancer HandbuchClearswift-Secure-Web-Gateway-Webfilter Load Balancer Handbuch
Clearswift-Secure-Web-Gateway-Webfilter Load Balancer HandbuchLoadbalancer_org_Gmbh
 
Load balancer-fuer-bloxx-content-filter-der-deployment-guide
Load balancer-fuer-bloxx-content-filter-der-deployment-guideLoad balancer-fuer-bloxx-content-filter-der-deployment-guide
Load balancer-fuer-bloxx-content-filter-der-deployment-guideLoadbalancer_org_Gmbh
 
Food additive sintesis dan Alami
Food additive sintesis dan AlamiFood additive sintesis dan Alami
Food additive sintesis dan AlamiHeru Pramono
 
A collection of the CTSers' chindogus
A collection of the CTSers' chindogusA collection of the CTSers' chindogus
A collection of the CTSers' chindogusiinoma
 
Hockey, Weather
Hockey, WeatherHockey, Weather
Hockey, WeatherBe Liar
 
Loadbalancer Appliance Administrations Handbuch v7.5 - 215 Seiten
Loadbalancer Appliance Administrations Handbuch v7.5 - 215 SeitenLoadbalancer Appliance Administrations Handbuch v7.5 - 215 Seiten
Loadbalancer Appliance Administrations Handbuch v7.5 - 215 SeitenLoadbalancer_org_Gmbh
 
1.Heat Transfer Theory
1.Heat Transfer Theory1.Heat Transfer Theory
1.Heat Transfer TheoryHeru Pramono
 
komposisi kimiawi daging ikan
komposisi kimiawi daging ikankomposisi kimiawi daging ikan
komposisi kimiawi daging ikanHeru Pramono
 
Teknologi hasil perikanan
Teknologi hasil perikananTeknologi hasil perikanan
Teknologi hasil perikananHeru Pramono
 
3. struktur jaringan daging Ikan
3. struktur jaringan daging Ikan3. struktur jaringan daging Ikan
3. struktur jaringan daging IkanHeru Pramono
 
Load-Balancer-Deployment-Guide-für-Smoothwall-Web-Proxy-Web-Filter
Load-Balancer-Deployment-Guide-für-Smoothwall-Web-Proxy-Web-FilterLoad-Balancer-Deployment-Guide-für-Smoothwall-Web-Proxy-Web-Filter
Load-Balancer-Deployment-Guide-für-Smoothwall-Web-Proxy-Web-FilterLoadbalancer_org_Gmbh
 

Viewers also liked (18)

Hormone's lecture
Hormone's lectureHormone's lecture
Hormone's lecture
 
Load-Balancing-des-Trend-Micro-InterScan-Web-Security-WebGateway-Webfilter-da...
Load-Balancing-des-Trend-Micro-InterScan-Web-Security-WebGateway-Webfilter-da...Load-Balancing-des-Trend-Micro-InterScan-Web-Security-WebGateway-Webfilter-da...
Load-Balancing-des-Trend-Micro-InterScan-Web-Security-WebGateway-Webfilter-da...
 
French
FrenchFrench
French
 
4. nilai gizi daging ikan
4. nilai gizi daging ikan4. nilai gizi daging ikan
4. nilai gizi daging ikan
 
To be1
To be1To be1
To be1
 
Aporte
Aporte Aporte
Aporte
 
Clearswift-Secure-Web-Gateway-Webfilter Load Balancer Handbuch
Clearswift-Secure-Web-Gateway-Webfilter Load Balancer HandbuchClearswift-Secure-Web-Gateway-Webfilter Load Balancer Handbuch
Clearswift-Secure-Web-Gateway-Webfilter Load Balancer Handbuch
 
Load balancer-fuer-bloxx-content-filter-der-deployment-guide
Load balancer-fuer-bloxx-content-filter-der-deployment-guideLoad balancer-fuer-bloxx-content-filter-der-deployment-guide
Load balancer-fuer-bloxx-content-filter-der-deployment-guide
 
Food additive sintesis dan Alami
Food additive sintesis dan AlamiFood additive sintesis dan Alami
Food additive sintesis dan Alami
 
A collection of the CTSers' chindogus
A collection of the CTSers' chindogusA collection of the CTSers' chindogus
A collection of the CTSers' chindogus
 
Hockey, Weather
Hockey, WeatherHockey, Weather
Hockey, Weather
 
Loadbalancer Appliance Administrations Handbuch v7.5 - 215 Seiten
Loadbalancer Appliance Administrations Handbuch v7.5 - 215 SeitenLoadbalancer Appliance Administrations Handbuch v7.5 - 215 Seiten
Loadbalancer Appliance Administrations Handbuch v7.5 - 215 Seiten
 
1.Heat Transfer Theory
1.Heat Transfer Theory1.Heat Transfer Theory
1.Heat Transfer Theory
 
komposisi kimiawi daging ikan
komposisi kimiawi daging ikankomposisi kimiawi daging ikan
komposisi kimiawi daging ikan
 
Teknologi hasil perikanan
Teknologi hasil perikananTeknologi hasil perikanan
Teknologi hasil perikanan
 
3. struktur jaringan daging Ikan
3. struktur jaringan daging Ikan3. struktur jaringan daging Ikan
3. struktur jaringan daging Ikan
 
Portfolio Software Engineer
Portfolio Software EngineerPortfolio Software Engineer
Portfolio Software Engineer
 
Load-Balancer-Deployment-Guide-für-Smoothwall-Web-Proxy-Web-Filter
Load-Balancer-Deployment-Guide-für-Smoothwall-Web-Proxy-Web-FilterLoad-Balancer-Deployment-Guide-für-Smoothwall-Web-Proxy-Web-Filter
Load-Balancer-Deployment-Guide-für-Smoothwall-Web-Proxy-Web-Filter
 

Similar to Deploy McAfee Web Gateway with Load Balancer

Load-Balancing-Smoothwall-Web-Proxy-Deployment-Guide
Load-Balancing-Smoothwall-Web-Proxy-Deployment-GuideLoad-Balancing-Smoothwall-Web-Proxy-Deployment-Guide
Load-Balancing-Smoothwall-Web-Proxy-Deployment-GuideLoadbalancer_org_Gmbh
 
Load-Balancer-Deployment-Handbuch-für-Trend-Micro-inter-scan-Web-Gateway
Load-Balancer-Deployment-Handbuch-für-Trend-Micro-inter-scan-Web-GatewayLoad-Balancer-Deployment-Handbuch-für-Trend-Micro-inter-scan-Web-Gateway
Load-Balancer-Deployment-Handbuch-für-Trend-Micro-inter-scan-Web-GatewayLoadbalancer_org_Gmbh
 
Load-Balancer-Deployment-Guide-für-McAfee-Web-Proxies-bzw-WebFilter
Load-Balancer-Deployment-Guide-für-McAfee-Web-Proxies-bzw-WebFilterLoad-Balancer-Deployment-Guide-für-McAfee-Web-Proxies-bzw-WebFilter
Load-Balancer-Deployment-Guide-für-McAfee-Web-Proxies-bzw-WebFilterLoadbalancer_org_Gmbh
 
connectivity_service.pdf
connectivity_service.pdfconnectivity_service.pdf
connectivity_service.pdfJagadish Babu
 
Handbuch-zum-Load-Balancing-des-Barracuda-Webfilters
Handbuch-zum-Load-Balancing-des-Barracuda-WebfiltersHandbuch-zum-Load-Balancing-des-Barracuda-Webfilters
Handbuch-zum-Load-Balancing-des-Barracuda-WebfiltersLoadbalancer_org_Gmbh
 
GoldenGate Whitepaper Oracle 8i 9i to 10g 11g Database Migration
GoldenGate Whitepaper Oracle 8i 9i to 10g 11g Database MigrationGoldenGate Whitepaper Oracle 8i 9i to 10g 11g Database Migration
GoldenGate Whitepaper Oracle 8i 9i to 10g 11g Database MigrationFumiko Yamashita
 
Load balancing VMware Horizon View Deployment Handbuch
Load balancing VMware Horizon View Deployment HandbuchLoad balancing VMware Horizon View Deployment Handbuch
Load balancing VMware Horizon View Deployment HandbuchLoadbalancer_org_Gmbh
 
B28654oas10g best pracitice
B28654oas10g best praciticeB28654oas10g best pracitice
B28654oas10g best praciticeCaipei Chen
 
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperDeployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperMicrosoft Private Cloud
 
Motorola solutions wing 4.4 ap51xx access point product reference guide (part...
Motorola solutions wing 4.4 ap51xx access point product reference guide (part...Motorola solutions wing 4.4 ap51xx access point product reference guide (part...
Motorola solutions wing 4.4 ap51xx access point product reference guide (part...Advantec Distribution
 
Motorola ws2000 wireless switch system reference guide
Motorola ws2000 wireless switch system reference guideMotorola ws2000 wireless switch system reference guide
Motorola ws2000 wireless switch system reference guideAdvantec Distribution
 
Motorola ws2000 wireless switch system reference guide
Motorola ws2000 wireless switch system reference guideMotorola ws2000 wireless switch system reference guide
Motorola ws2000 wireless switch system reference guideAdvantec Distribution
 
Integrating SDN into the Data Center
Integrating SDN into the Data CenterIntegrating SDN into the Data Center
Integrating SDN into the Data CenterJuniper Networks
 
Teamviewer manual
Teamviewer manualTeamviewer manual
Teamviewer manualjeetjsr11
 

Similar to Deploy McAfee Web Gateway with Load Balancer (20)

Load-Balancing-Smoothwall-Web-Proxy-Deployment-Guide
Load-Balancing-Smoothwall-Web-Proxy-Deployment-GuideLoad-Balancing-Smoothwall-Web-Proxy-Deployment-Guide
Load-Balancing-Smoothwall-Web-Proxy-Deployment-Guide
 
Load-Balancer-Deployment-Handbuch-für-Trend-Micro-inter-scan-Web-Gateway
Load-Balancer-Deployment-Handbuch-für-Trend-Micro-inter-scan-Web-GatewayLoad-Balancer-Deployment-Handbuch-für-Trend-Micro-inter-scan-Web-Gateway
Load-Balancer-Deployment-Handbuch-für-Trend-Micro-inter-scan-Web-Gateway
 
Load-Balancer-Deployment-Guide-für-McAfee-Web-Proxies-bzw-WebFilter
Load-Balancer-Deployment-Guide-für-McAfee-Web-Proxies-bzw-WebFilterLoad-Balancer-Deployment-Guide-für-McAfee-Web-Proxies-bzw-WebFilter
Load-Balancer-Deployment-Guide-für-McAfee-Web-Proxies-bzw-WebFilter
 
Open acc.1.0
Open acc.1.0Open acc.1.0
Open acc.1.0
 
connectivity_service.pdf
connectivity_service.pdfconnectivity_service.pdf
connectivity_service.pdf
 
Ppm7.5 web services
Ppm7.5 web servicesPpm7.5 web services
Ppm7.5 web services
 
UsersGuide
UsersGuideUsersGuide
UsersGuide
 
UsersGuide
UsersGuideUsersGuide
UsersGuide
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Handbuch-zum-Load-Balancing-des-Barracuda-Webfilters
Handbuch-zum-Load-Balancing-des-Barracuda-WebfiltersHandbuch-zum-Load-Balancing-des-Barracuda-Webfilters
Handbuch-zum-Load-Balancing-des-Barracuda-Webfilters
 
GoldenGate Whitepaper Oracle 8i 9i to 10g 11g Database Migration
GoldenGate Whitepaper Oracle 8i 9i to 10g 11g Database MigrationGoldenGate Whitepaper Oracle 8i 9i to 10g 11g Database Migration
GoldenGate Whitepaper Oracle 8i 9i to 10g 11g Database Migration
 
Load balancing VMware Horizon View Deployment Handbuch
Load balancing VMware Horizon View Deployment HandbuchLoad balancing VMware Horizon View Deployment Handbuch
Load balancing VMware Horizon View Deployment Handbuch
 
B28654oas10g best pracitice
B28654oas10g best praciticeB28654oas10g best pracitice
B28654oas10g best pracitice
 
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: WhitepaperDeployment Guide for Business Productivity Online Standard Suite: Whitepaper
Deployment Guide for Business Productivity Online Standard Suite: Whitepaper
 
Motorola solutions wing 4.4 ap51xx access point product reference guide (part...
Motorola solutions wing 4.4 ap51xx access point product reference guide (part...Motorola solutions wing 4.4 ap51xx access point product reference guide (part...
Motorola solutions wing 4.4 ap51xx access point product reference guide (part...
 
Motorola ws2000 wireless switch system reference guide
Motorola ws2000 wireless switch system reference guideMotorola ws2000 wireless switch system reference guide
Motorola ws2000 wireless switch system reference guide
 
Motorola ws2000 wireless switch system reference guide
Motorola ws2000 wireless switch system reference guideMotorola ws2000 wireless switch system reference guide
Motorola ws2000 wireless switch system reference guide
 
Integrating SDN into the Data Center
Integrating SDN into the Data CenterIntegrating SDN into the Data Center
Integrating SDN into the Data Center
 
Cloud gateway v1.6
Cloud gateway v1.6Cloud gateway v1.6
Cloud gateway v1.6
 
Teamviewer manual
Teamviewer manualTeamviewer manual
Teamviewer manual
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Deploy McAfee Web Gateway with Load Balancer

  • 1. McAfee Web Gateway Deployment Guide v1.0.14 Copyright © 2013 Loadbalancer.org, Inc. 1
  • 2. Table of Contents About this Guide............................................................................................................................................... 3 Loadbalancer.org Appliances Supported.......................................................................................................... 3 Loadbalancer.org Software Versions Supported............................................................................................... 3 McAfee Web Gateway Appliances Supported.................................................................................................. 3 Benefits of Implementing a Load Balancer....................................................................................................... 4 Load Balancer Configuration Options............................................................................................................... 4 Layer 4 (Recommended)............................................................................................................................. 4 DR Mode - Direct Server Return Mode (Recommended).......................................................................4 NAT Mode - Network Address Translation Mode....................................................................................4 Layer 7......................................................................................................................................................... 4 SNAT / HAProxy Mode - Source Network Address Translation..............................................................4 Persistence - aka Server Affinity.................................................................................................................. 5 Source IP Address (Recommended)...................................................................................................... 5 Destination Hash.................................................................................................................................... 5 Web Gateway Deployment Modes.................................................................................................................... 5 1 – Proxy Mode (Recommended)................................................................................................................ 5 2 – Transparent Routed Proxy Mode........................................................................................................... 5 Loadbalancer.org Appliance – the Basics......................................................................................................... 6 Network Configuration................................................................................................................................. 6 Accessing the Web User Interface (WUI).................................................................................................... 7 Clustered Pair Configuration........................................................................................................................ 8 Option 1 - Proxy Mode (Recommended).......................................................................................................... 9 Deployment Architecture.............................................................................................................................. 9 Load Balancer Configuration..................................................................................................................... 10 Create the Virtual Server/Service (VIP)................................................................................................ 10 Create the Real Servers (RIPs)............................................................................................................ 11 Web Gateway Configuration...................................................................................................................... 12 Modify the Web Gateways to accept traffic for the VIP.........................................................................12 Concept........................................................................................................................................... 12 Configuring the McAfee Appliance................................................................................................... 12 Web Gateway Operating Mode............................................................................................................. 13 Proxy Port Configuration....................................................................................................................... 13 Client Configuration................................................................................................................................... 14 Option 2 - Transparent (Routed) Proxy Mode................................................................................................. 15 Deployment Architecture............................................................................................................................ 15 Load Balancer Configuration..................................................................................................................... 16 Create the Virtual Server/Service (VIP)................................................................................................ 16 Create the Real Servers (RIPs)............................................................................................................ 18 Web Gateway Configuration...................................................................................................................... 19 Web Gateway Operating Mode............................................................................................................. 19 Router / Default Gateway Configuration.................................................................................................... 21 Client Configuration................................................................................................................................... 21 Testing & Validation......................................................................................................................................... 22 Layer 4 – Current Connections.................................................................................................................. 22 Technical Support........................................................................................................................................... 23 Appendix......................................................................................................................................................... 24 1 – Clustered Pair Configuration – Adding a Slave Unit.............................................................................24 2 – Loadbalancer.org Company Contact Information.................................................................................25 3 – McAfee Company Contact Information................................................................................................ 26 2
  • 3. About this Guide This guide details the configuration of Loadbalancer.org appliances for deployment with McAfee's range of Web Gateway products. It includes recommended deployment topologies and also steps on how to configure the appliances. For an introduction on setting up the load balancer as well as more technical information, please also refer to the quick-start guides and full administration manuals which are available at the following links: Quickstart guide: http://www.loadbalancer.org/pdf/quickstartguideLBv7.pdf Administration manual: http://www.loadbalancer.org/pdf/loadbalanceradministrationv7.pdf Loadbalancer.org Appliances Supported All our products can be used for load balancing McAfee Web Gateways. The complete list of models is shown below: • Enterprise R16 • Enterprise • Enterprise MAX • Enterprise 10G • Enterprise VA • Enterprise VA R16 For a full specification comparison of these models please refer to: http://www.loadbalancer.org/matrix.php Loadbalancer.org Software Versions Supported • v7.4.3 and later McAfee Web Gateway Appliances Supported • All versions 3
  • 4. Benefits of Implementing a Load Balancer Since secure, reliable and available Internet access is essential and not just a luxury, steps must be taken to ensure 100% up time. Loadbalancer.org appliances provide the perfect solution by allowing multiple Web Gateway devices to be deployed in a load balanced and highly available cluster. Benefits include: • • • High-Availability – If a Web Gateway fails, service is not interrupted Maintenance – Web Gateways can easily be taken out of the cluster for maintenance Performance – For additional performance simply add more Web Gateways to the cluster Load Balancer Configuration Options The following sections describe the various load balancer configuration methods that are possible when load balancing Web Gateways. Layer 4 (Recommended) DR Mode - Direct Server Return Mode (Recommended) In this mode, traffic from the client to the Web Gateway passes via the load balancer, return traffic passes directly back to the client which maximizes performance. Direct routing works by changing the destination MAC address of the incoming packet on the fly which is very fast. This mode is transparent by default meaning that the Web Gateway sees the real client IP address and not the IP address of the load balancer. Due to its speed, overall simplicity and effectiveness, Direct Routing (DR) mode with source IP persistence is our recommended method and can be used in both proxy mode & transparent (routed) proxy mode. NAT Mode - Network Address Translation Mode This mode requires the implementation of a two-arm infrastructure with an internal and external subnet to carry out the translation (the same way a firewall works). The real servers (i.e. the Web Gateways) must have their default gateway configured to be the load balancer. It offers high performance and like DR mode is transparent by default. Layer 7 SNAT / HAProxy Mode - Source Network Address Translation Using HAProxy in SNAT mode means that the load balancer is acting as a full proxy and therefore it doesn't have the same raw throughput as the layer 4 methods. Also, this method is not transparent by default so the real servers will see the source address of each request as the load balancers IP address. This is generally not desirable although this can be resolved in two ways; either by reading the X-Forwarded-For header that's included by default when using HAProxy, or by enabling Tproxy on the load balancer. The issues with using Proxy are that the default gateway on the real servers (i.e. the Web Gateways) must be changed to point as the load balancer and also it requires a two-arm infrastructure with two subnets which complicates the deployment. SNAT mode does not have the raw throughput of the layer 4 solutions and is therefore not normally used for Web Gateway / Proxy load balancing deployments. 4
  • 5. Persistence - aka Server Affinity Persistence may or may not be required and depends on the specific Web Gateway being used. Two possible methods are described in the following sections. Source IP Address (Recommended) Source IP persistence is the standard method and is appropriate for most requirements. When set, clients connecting from the same source IP address within the persistence timeout period (the default is 5 mins) will always be sent to the same Web Gateway. Destination Hash Another option is to change the load balancing algorithm (i.e. the “scheduler”) to destination hash (DH). This causes the load balancer to select the proxy based on a hash of the destination IP address. This causes session requests to be directed at the same server based solely on the destination IP address of a packet which therefore makes client connections persistent for a particular Internet host. Since this setting is a scheduler, the way connections are load balanced will also change. However it should still provide a well balanced distribution of client sessions between Web Gateway servers. Web Gateway Deployment Modes There are two implementation methods that are typically used – Proxy Mode & Transparent (Routed) Proxy Mode. 1 – Proxy Mode (Recommended) This mode requires the load balancer / proxy address to be defined in users browsers. This allows specific traffic (typically HTTP & HTTPS) to be handled by the proxy on behalf of the client PCs. 2 – Transparent Routed Proxy Mode With this mode, client requests must be routed to the load balancer / Web Gateway cluster. This can be achieved by either setting the default gateway on the client PCs to be the load balancer, or by adding rules to the default gateway device. Rules would typically be configured for HTTP & HTTPS traffic on ports 80 and 443. NOTE: In transparent mode, web proxies are unable to filter HTTPS traffic. This is because SSL cannot be proxied transparently. SSL authenticates both sides of the connection and if a proxy is in the middle, then both sides try to authenticate to the proxy which is incorrect and therefore the connection fails. NTLM authentication also fails for similar reasons. For HTTPS & NTLM, either the proxy server must be explicitly configured or traffic should pass directly from the client to the server. We recommend using proxy mode rather than transparent proxy mode whenever possible due to these limitations. 5
  • 6. Loadbalancer.org Appliance – the Basics Network Configuration The IP address, default gateway and DNS settings can be configured in several ways depending on the version as detailed below. v7.5 & Later Configure the IP address, Default Gateway & DNS Settings Using the Network Setup Wizard at the console: After boot, follow the console instructions to configure the IP address, gateway and DNS settings.. Using the WUI: Using a browser, connect to the WUI on the default IP address/port: http://192.168.2.21:9080 to set the IP address use: Local Configuration > Network Interface Configuration to set the default gateway use: Local Configuration > Routing to configure DNS settings use: Local Configuration > Hostname & DNS Using Linux commands: At the console, set the initial IP address using the following command: ip addr add <IP address>/<mask> dev eth0 e.g. ip addr add 192.168.2.10/24 dev eth0 At the console, set the initial default gateway using the following command: route add default gw <IP address> <interface> e.g. route add default gw 192.168.2.254 eth0 At the console, set the DNS server using the following command: echo nameserver <IP address> >> /etc/resolv.conf e.g. echo nameserver 192.168.64.1 >> /etc/resolv.conf N.B. If this method is used, you must also configure these settings using the WUI, otherwise settings will be lost after a reboot v7.4.3 Configure the IP address & Default Gateway Using the Network Setup Wizard at the console: After boot, follow the console instructions to configure the IP address and gateway using the Network Setup Wizard. N.B. For these software versions the network setup wizard does not support DNS server configuration. DNS servers must be defined using the WUI or Linux commands as explained below. 6
  • 7. Configure the IP address, Default Gateway & DNS Settings Using the WUI: Using a browser, connect to the WUI on the default IP address:port: http://192.168.2.21:9080 to set the IP address use: Edit Configuration > Network Interface Configuration to set the default gateway use: Edit Configuration > Routing to configure DNS settings use: Edit Configuration > Hostname & DNS Using Linux commands: At the console, set the initial IP address using the following command: ip addr add <IP address>/<mask> dev eth0 e.g. ip addr add 192.168.2.10/24 dev eth0 At the console, set the initial default gateway using the following command: route add default gw <IP address> <interface> e.g. route add default gw 192.168.2.254 eth0 At the console, set the DNS server using the following command: echo nameserver <IP address> >> /etc/resolv.conf e.g. echo nameserver 192.168.64.1 >> /etc/resolv.conf N.B. If this method is used, you must also configure these settings using the WUI, otherwise settings will be lost after a reboot Accessing the Web User Interface (WUI) The WUI can be accessed from a browser at: http://192.168.2.21:9080/lbadmin * Note the port number → 9080 (replace 192.168.2.21 with the IP address of your load balancer if its been changed from the default) Username: loadbalancer Password: loadbalancer Once you have entered the logon credentials the Loadbalancer.org Web User Interface will be displayed as shown below: The screen shot below shows the v7.5 WUI once logged in: 7
  • 8. Clustered Pair Configuration Loadbalancer.org recommend that load balancer appliances are deployed in pairs for high availability. In this guide s single unit is deployed first, adding a secondary slave unit is covered in section 1 of the Appendix. NOTE: It's highly recommended that you have a working Web Gateway environment first before implementing the load balancer. 8
  • 9. Option 1 - Proxy Mode (Recommended) Deployment Architecture Client PC 1 Client PC 2 Default Gateway Router Firewall Internet Client PC n Load Balancer 1 (master) Heartbeat Load Balancer 2 (slave) McAfee Web Gateway 1 McAfee Web Gateway 2 Notes • Browser settings on client PC's must be changed to point at the Virtual Server/Service (VIP) on the load balancer • The load balancer(s) must be configured in Layer 4 DR mode • The McAfee Web Gateways must be configured to accept traffic for the VIP (see page 12) • Typically, two loadbalancer.org appliances are deployed for resilience – this is our recommended configuration • For more information on McAfee Web Gateway deployment options please refer to the following URL: https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/ PD24047/en_US/mwg_73_pg_product_a_en_us.pdf 9
  • 10. Load Balancer Configuration Create the Virtual Server/Service (VIP) NOTE: Prior to v7.5 a VIP is known as a 'Virtual Server', from v7.5 onwards it's known as a 'Virtual Service'. For simplicity the configuration steps below refer to 'Virtual Service' for both. • v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Virtual Services • v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Virtual Servers • Click [Add a New Virtual Service] • Enter the following details: • Enter an appropriate label (name) for the VIP, e.g. Proxy • Set the Virtual Service IP address field to the required IP address, e.g. 192.168.2.202 • Set the Virtual Service Ports field to the required port (the same as the Web Gateways) , e.g. 8080 • Ensure that Forwarding Method is set to Direct Return • Set Persistent to yes • Ensure that Protocol is set to TCP • Click Update 10
  • 11. Create the Real Servers (RIPs) • v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Real Servers • v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Real Servers • Click [Add a new Real Server] next to the newly created VIP • Enter the following details: • Enter an appropriate label (name) for the first Proxy Server, e.g. Proxy1 • Change the Real Server IP Address field to the required IP address, e.g. 192.168.2.210 • Click Update • Repeat the above steps to add your other Web Gateways 11
  • 12. Web Gateway Configuration Modify the Web Gateways to accept traffic for the VIP Concept As mentioned previously, DR mode is our recommended load balancer operating mode. To use this mode, changes are required to the real servers, i.e. the Web Gateways. The real servers must accept traffic for the VIP, but they must not respond to any ARP requests for that IP, only the VIP should do this. To configure a Linux based Web Gateway appliance to accept traffic for the VIP the following line must be added to the rc.local startup script on each Web Gateway appliance: iptables -t nat -A PREROUTING -p tcp -d <VIP address> -j REDIRECT e.g. iptables -t nat -A PREROUTING -p tcp -d 192.168.2.202 -j REDIRECT i.e. Redirect any incoming packets destined for the VIP to the local address N.B. For more information please refer to the administration manuals and search for 'ARP Problem' Configuring the McAfee Appliance N.B. These steps must be followed on all Gateways Login as root either at the console or using a remote ssh session Edit the file /etc/rc.local using vi, vim or a remote editor such as the one included in WinSCP Then add the following additional line to this file as shown below: iptables -t nat -A PREROUTING -p tcp -d <VIP address> -j REDIRECT 12
  • 13. Web Gateway Operating Mode The McAfee Web Gateway can easily be configured for proxy mode using the WUI option: Configuration > Proxies (HTTP(S), FTP, ICAP and IM) and selecting the option Proxy (optional WCCP) as shown below: Proxy Port Configuration The required proxy port can be set as shown below, simple edit the default entry and change the port as required: N.B. The default proxy port for McAfee Web Gateways is 9090 13
  • 14. Client Configuration Client browser settings must be set so that browsers connect via the VIP. In a Microsoft based LAN environment, this is typically achieved using AD group policy. 14
  • 15. Option 2 - Transparent (Routed) Proxy Mode Deployment Architecture Client PC 1 Client PC 2 Default Gateway (see notes below) Router Firewall Internet Client PC n Load Balancer 1 (master) Heartbeat Load Balancer 2 (slave) McAfee Web Gateway 1 McAfee Web Gateway 2 Notes • If rules are added to the router so that traffic is sent transparently to the load balancer, no changes are required to client PC settings Alternatively, the default gateway on the client PCs should be set to be a floating IP on the load balancer (to allow master / slave failover) • As with non-transparent mode, the load balancer is configured in Layer 4 DR mode • Firewall rules must be added to the load balancer to transparently send traffic to the Web Gateways (see page 17) • Typically, two loadbalancer.org appliances are deployed for resilience – this is our recommended configuration • For more information on McAfee Web Gateway deployment options please refer to the following URL: https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/ PD24047/en_US/mwg_73_pg_product_a_en_us.pdf 15
  • 16. Load Balancer Configuration Create the Virtual Server/Service (VIP) NOTE: Prior to v7.5 a VIP is known as a 'Virtual Server', from v7.5 onwards it's known as a 'Virtual Service'. For simplicity the configuration steps below refer to 'Virtual Service' for both. • v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Virtual Services • v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Virtual Servers • Click [Add a New Virtual Service] • Enter the following details: • Enter an appropriate label (name) for the VIP, e.g. Proxy • Change the Virtual Service IP address field to 1 N.B. This is the reference number for the 'Firewall Mark' which is required for VIPs with multiple ports – in this case, ports 80 & 443 are required. This reference is also used when configuring the firewall rules. • Leave Virtual Service Ports blank • Ensure that Forwarding Method is set to Direct Routing • Set Persistent to yes • Ensure that Protocol is set to Firewall Marks • Click Update • Now click [Modify] next to the newly created VIP • Change Check Type to Ping Server • Click Update 16
  • 17. • v7.5 & later – Using the WUI, go to Cluster Configuration > Floating IPs • v7.4.3 – Using the WUI, go to Edit Configuration > Floating IPs • Enter an appropriate IP address for the Virtual Service, e.g. 192.168.2.202 • Click Update • Using the WUI, go to Maintenance > Firewall Script • Scroll down to the Firewall Marks section • Add the following lines to this section as shown in the screen shot below: iptables -t mangle -A PREROUTING -p tcp --dport 80 -j MARK --set-mark 1 iptables -t mangle -A PREROUTING -p tcp --dport 443 -j MARK --set-mark 1 ip rule add prio 100 fwmark 1 table 100 ip route add local 0/0 dev lo table 100 • Click Update 17
  • 18. Create the Real Servers (RIPs) • v7.5 & later – using the WUI go to Cluster Configuration > Layer 4 – Real Servers • v7.4.3 – using the WUI go to Edit Configuration > Layer 4 – Real Servers • Click [Add a new Real Server] next to the newly created VIP • Enter the following details: • Enter an appropriate label (name) for the first Proxy Server, e.g. Proxy1 • Change the Real Server IP Address field to the required IP address, e.g. 192.168.2.210 • Click Update • Repeat the above steps to add your other Web Gateways 18
  • 19. Web Gateway Configuration Web Gateway Operating Mode The McAfee Web Gateway can easily be configured for transparent routed mode using the WUI option: Configuration > Proxies (HTTP(S), FTP, ICAP and IM) Configure the following options: 1) Enable transparent router mode Enable port directs to route all port 80 & 443 traffic to the proxy (default port is 9090) and set the director priroty to at least 1 make active 2) Enable port redirection so that HTTP ports 80 & 443 are forwarded to the proxy. Also set Director Priority to at least 1 to enable the director 19
  • 20. 3) enable the HTTP Proxy NOTE: When using transparent routed mode, it's not necessary to modify the Web Gateway to accept traffic destined for the VIP, this is only required when using proxy mode. 20
  • 21. Router / Default Gateway Configuration N.B. This is required when no changes have been made to the clients gateway settings Depending on your network configuration, rules must be added to the router/default gateway so that all HTTP traffic is sent to the VIP on the load balancer. The load balancer then distributes this traffic between the Web Gateway servers. Example iptables rules: CLIENT="192.168.2.0/24" FWMARK="10" TABLE="10" LOADBALANCER ="192.168.2.204" iptables -t mangle -A PREROUTING -s $CLIENT -p tcp -m tcp --dport 80 -j MARK --set-mark $FWMARK ip route flush table $TABLE ip route add default via $LOADBALANCER dev eth3 table $TABLE ip rule add fwmark $FWMARK table $TABLE ip route flush cache ip route show table $TABLE route add default gw 192.168.2.1 This example uses policy routing via firewall marks. This works by first selecting and marking the packets we want to be sent to the proxy, i.e. all packets on port 80. Then, when the kernel goes to make a routing decision, the marked packets aren't routed using the normal routing table, instead via table 10 in this case. Table 10 has only one entry: route packets to the Web Gateway. Client Configuration If rules are configured on the router as described in the section above, no client change are required. If such rules are not configured, then the default gateway on the client PCs must be modified to be the load balancer. 21
  • 22. Testing & Validation To verify that the traffic is passing through the load balancer correctly the following reporting options can be used: System Overview Reports > Layer 4 Status Reports > Layer 4 Current Connections Many reporting and dashboard options are also available in the McAfee user interface. For more details please refer to the appropriate McAfee documentation Layer 4 – Current Connections Proxy Mode The example screen shot below illustrates that the test client (192.168.64.7) sends requests to the VIP (192.168.111.88), the load balancer then forwards the request onto the Web Filter / Gateway (192.168.64.60). 22
  • 23. Transparent Mode The example screen shot below illustrates illustrates the difference when running in transparent mode. Many reporting and dashboard options are also available in the McAfee Web Gateway user interface. For more details please refer to the appropriate McAfee documentation. Technical Support Loadbalancer.org support : support@loadbalancer.org McAfee support : http://service.mcafee.com/default.aspx 23
  • 24. Appendix 1 – Clustered Pair Configuration – Adding a Slave Unit If you initially configured just the master unit and now need to add a slave, please refer the section 'Adding a slave unit after the master has been configured' in the v7.x administration manual which is available at the following link: http://www.loadbalancer.org/pdf/loadbalanceradministrationv7.pdf Don't hesitate to contact our support team if you need any further assistance configuring a slave appliance: support@loadbalancer.org 24
  • 25. 2 – Loadbalancer.org Company Contact Information Website URL : www.loadbalancer.org North America (US) Loadbalancer.org, Inc. 270 Presidential Drive Wilmington, DE 19807 USA Tel Fax Email (sales) Email (support) : : : : North America (Canada) +1 866.229.8562 (24x7) +1 302.213.0122 sales@loadbalancer.org support@loadbalancer.org Loadbalancer.org Ltd. 300-422 Richards Street Vancouver, BC V6B 2Z4 Canada Tel Fax Email (sales) Email (support) : : : : Europe (UK) +1 604.629.7575 +1 302.213.0122 sales@loadbalancer.org support@loadbalancer.org Loadbalancer.org Ltd. Portsmouth Technopole Kingston Crescent Portsmouth PO2 8FA England, UK Tel Fax Email (sales) Email (support) : : : : Europe (Germany) +44(0)870 4438779 (24x7) +44(0)870 4327672 sales@loadbalancer.org support@loadbalancer.org Loadbalancer.org GmbH Alt Pempelfort 2 40211 Düsseldorf Germany Tel Fax Email (sales) Email (support) : : : : +49 (0)221 9793 7203 +49 (0)30 9203 836495 vertrieb@loadbalancer.org support@loadbalancer.org 25
  • 26. 3 – McAfee Company Contact Information Website Worldwide Support Options URL : www.mcafee.com McAfee support: http://service.mcafee.com/default.aspx 26