Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This tutorial shows how to configure a cluster with two DualShield servers. This cluster is load-balanced by Citrix Netscaler load balancerKemp LoadMaster.

Table of Contents

Import SSL Cert

If you are securing your DualShield Servers va are SSL enabled then you will need to import your the DualShield's SSL certificates to the LoadMaster

Log into Kemp LoadMaster console and Navigate to "Certificate & Security> SSL Certificates" :

Image Modified


Click "AddImport Certificate" button on the toolbar to add a DualShield server:

Image Removed

Repeat the step above to add all DualShueld servers:

Image Removed

top right.

Image Added


Here you can import your private/public key, or upload a PFX file.

Image Added

Once you Save the Certificate file, please select it from the drop down and then click on Use Certificate.

In the example below, a self-signed cert is being used:

Image Added

Create Virtual Services with TLS Termination

...

A DualShield server hosts a number of services. Each services service works on a specific port. Below is a list of DualShield services and their port numbers:

Service NamePortShort Name
Administration8070 
Authentication8071 
Provision8072DPS
Management Console8073DMC
SSO Service8074SSO
SSO Management8075 
Self-Service Console8076DSS
, DSC

In this example, we're going to create a Virtual Service on ports 8073 and 8074 for the Administration/Management Console and Single Sign-on services, respectively. We will create a service in the load balancer for each of the above DualShield service 


Navigate to "Load Balancing > Service Groups", click "AddVirtual Services > View/Modify Services".

Image Removed

As an example, will will create a service for DSS. Enter the name and select "HTTP" as the protocol.

Click "OK".

Now click in the area where it shows "Service Group Member".

Image Removed

We are going to add real servers.

Image Removed

Select a real server, i.e. DualShield-Server_1, enter the port number that the service works on, i.e. 8076 for DSS (DualShield Self-Service Console)

Click "Create" to create the service group. 

Repeat the same step above to add all real servers, i.e. DualShield_Server_2. 

Image Removed

Now, we have create a service group called "DualShield_DSS" for the DualShield Self-Service Console. This group includes 2 real servers: "DualShield-Server_1" and "DualShield-Server_2"

Repeat the same steps above to create service groups for other DualShield services, such as: SSO, DMC, DPS, etc
Image Removed

Create Virtual Servers

Now that we have created all service groups, we will create load balancing virtual servers.

Navigate to "Load Balancing > Virtual Serves", click "Add".
Image Removed

Enter "Name", "IP Address" and "Port" for the virtual server.

Click "OK" to save it.

Now, we need to bind the newly created virtual server to a service group. In this example, we'll bind this virtual server to the DSS service group:

Click "Load Balancing Virtual Service Group Binding"

Image Removed

Click "Add Binding"

Image Removed

Select the "Service Group Name"

...

Click "Bind", and "Done".

Now, a virtual server has been successfully create for the DualShield SSO.

...

Image Added

Click "Add New" from either in the main menu or within View/Modify Services screen

Image Added

Now specify the Virtual IP address you wish to use,  The Port number (In this example we use port 8073) and the Protocal will be TCP

Image Added

Click on Add This Virtual Service on the bottom right.

This will take you to the Layer 7 properties screen...

Image Added

Please select the options as follows

Basic Properties set the Service type to HTTP-HTTPS/2-HTTPS (see picture above)

Standard Options set Mode in Persistence Options to Source IP (See picture below)

Image Added

In the SSL Properties section, enable the SSL Acceleration and Reencrypt option

In the Certificates section, highlight the certificate you imported earlier and move it across to the box on the right, then click Set Certificates.

Image Added


In the Advanced Properties section, select X-Forwarded-For (No Via) From the Add HTTP Headers drop down list

Image Added


In the Real Servers section, click on the Add New Button

Image Added

Type the IPv4 Address of the Primary DualShield Server

Image Added

The Port should have autocompleted with the port number you specified when creating the virtual service (see above)  If it doesn't please add the port number you are referring to.

Click the Add This Real Server button on the right hand side.

Image Added


Click OK on the confirmation message at that appears at the top.  Repeat the process to add the IP address of the Secondary DualShield Server.

The configured Real Servers will appear on the bottom left hand side.


Once completed click on the Back button.  The list of real IP's will appear as below.

Image Added


Click  Virtual Services->View/Modifies Services in the main menu again and Add New.

Repeat the steps above, again to add another Virtual Service tied to another Port.

In this example, we have only added Services for ports 8073 and 8074.

Image Added

Modify DNS

Modify your DNS entry so that the IP for your DualShield Server's FQDN points to the virtual IP you set up in Kemp LoadMaster.

...

Create Persistency Group

The last item we need to create is a Persistency Group.  

Navigate to "Load Balancing > Persistency Group", click "Add".

Image Removed

Enter "Name",  enable "Use vServer Persistence" and add all the virtual servers we have created.

Image Removed