Summary


We discussed the need for persistence throughout this chapter and the issues associated with this, particularly in a security environment. The simplest approach is to use the source IP address (or destination) for persistence. The only issue here is what happens when we have many hundreds, if not thousands, of users connecting from behind a proxy. Fixing this problem is what makes working with persistence challenging. We need to move up the protocol stack to achieve this and start to use content. Encrypted sessions again cause persistence problems, and they need a unique approach that can involve additional hardware.

All persistence issues can be resolved; it merely depends on your requirements and how granular you want to be.



Optimizing Network Performance with Content Switching
Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load Balancing
ISBN: 0131014684
EAN: 2147483647
Year: 2003
Pages: 85

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net