当前位置:网站首页>Network device hard core technology insider firewall and security gateway (10)
Network device hard core technology insider firewall and security gateway (10)
2022-07-28 00:49:00 【User 8289326】
Last time when it comes to , Linghuchong developed a new LB equipment , Can install HTTPS certificate , Let users think LB The device itself is real HTTPS The server .
But we actually secretly left a problem :
LB Equipment and vm Between , Do you still need to encrypt ?
Pictured , stay LB End on device HTTPS after , because LB And VM Both are inside the data center , There is no risk of communication being eavesdropped or tampered , It doesn't need to HTTPS encryption ,LB Just go through HTTP Function therefore , In this case ,LB The equipment HTTPS Termination function , Also known as HTTPS Uninstall function .
Specially , because LB The equipment is made by Special materials Made of special processor , therefore , about HTTPS Encryption and decryption work , It is implemented by dedicated hardware .
And in the absence of LB In the case of equipment , Who encrypts and decrypts ? Of course, the server CPU Through software .
Obvious , Special LB In the case of equipment , It can not only make each VM The load of tends to be balanced , It can also reduce the cost of each server CPU The computational burden of . therefore , Load balancing devices are also called application delivery engines (Application Delivery Engine).
However , Reality is not as beautiful as imagined .
When servers enter the 10 Gigabit era from the Gigabit era , General LB equipment , Even with hardware SSL Encryption and decryption function , Its throughput is also insurmountable 10Gbps The gap …
therefore , Engineers invented another method ——LB Triangular deployment .
LB The principle of triangle deployment is shown in the figure below :
In the figure , Every VM Of IP, and LB Upper VIP Is the same IP Address . for fear of IP Address conflict , all VM All keep ARP silent , No response ARP request ( Or configuration FW Intranet interface static ARP, take VIP Of MAC Point to LB The equipment MAC).
come from FW Of HTTP Request in LB On receipt ,LB Modify the purpose of the packet according to the load balancing policy MAC, The switch will according to the purpose MAC Send the data packet to the corresponding VM.
and VM received HTTP After the request , It's OK not to pass LB, Return the data directly to the network exit .
Small traffic requests such as video playback , The field of large traffic response , This networking method is very suitable for .
Careful readers find , In this way, there is no way to unload on load balancing https Of —— Of course , Nor can recognition be achieved https Users inside . Fortunately ,http Long connections can solve this problem , With http After the long connection mechanism , Basically, we can think , Every https Of TCP The connection represents a user . In the case of large-scale public cloud , Based on scalability considerations , Load balancing is generally distributed LB Handle , Such as HA-Proxy and Nginx etc. , Instead of dedicated hardware devices .
The introduction of load balancing is over .
The next issue will bring you a hot topic in the near future —— Telecommuting , Please look at the next breakdown !
边栏推荐
- When Jerry made a phone call, recording to SD card /u disk was not enough [article]
- The program design questions of the 11th national competition of Bluebridge cup single chip microcomputer
- How does JMeter solve the problem of garbled code?
- 数据分析:拆解方法(详情整理)
- Volkswagen China invested 8billion yuan and became the largest shareholder of GuoXuan high tech
- 图片提取文字很神奇?试试三步实现OCR!
- 几行代码轻松实现对于PaddleOCR的实时推理,快来get!
- Jmeter 如何解决乱码问题?
- LeetCode_ Bit operation_ Medium_ 137. Number II that appears only once
- 网络设备硬核技术内幕 防火墙与安全网关篇 (十)
猜你喜欢
![Jerry's prompt sound processing when switching devices [chapter]](/img/b3/38f55143b5ca8c3b2059c5f6f1da37.png)
Jerry's prompt sound processing when switching devices [chapter]
![[bre] software build release automation](/img/c6/daead474a64a9a3c86dd140c097be0.jpg)
[bre] software build release automation

LeetCode 415. 字符串相加 和 43. 字符串相乘

Data visualization - White Snake 2: black snake robbery (3)

The server is poisoned - the dish is the original sin

一文读懂CMake

Rongyun IM & RTC capabilities on new sites

In July, a software testing engineer came to the company. He looked like a hairy boy. He didn't expect to be the new generation of roll King

Recurrence of fastjson historical vulnerabilities

Ali Er Mian: why do we need to separate databases and tables?
随机推荐
Leetcode 415. string addition and 43. string multiplication
mysql数据库的基本操作(二)-——基于数据表
mysql数据库的基本操作(三)-——基于字段
Build Release Blogs
mysql数据库的基本操作(一)-——基于数据库
Yangchuanhui, CTO of oceanbase: some HTAP databases are not real htaps
强强协同,共拓发展!英特尔与太一物联举办 AI 计算盒聚合服务研讨会
In July, a software testing engineer came to the company. He looked like a hairy boy. He didn't expect to be the new generation of roll King
Matlab | those matlab tips you have to know (I)
程序员成长第三十篇:你真的懂反馈吗?
MySQL中的运算符
递归求解迷宫问题
LeetCode 415. 字符串相加 和 43. 字符串相乘
Data analysis: disassembly method (details)
startUMl
Microsoft Amazon layoffs, the economic crisis is getting closer...
Basic operations of MySQL database (3) --- Based on fields
[meetup preview] openmldb + ONEFLOW: link feature engineering to model training to accelerate machine learning model development
自动推理的逻辑07–谓词演算
网络设备硬核技术内幕 防火墙与安全网关篇 (九) 虚拟化神器 (下)