You can create an HTTPS application profile for three HTTPS traffic types: SSL passthrough, HTTPS offloading, and HTTPS end-to-end. The workflow for creating the application profile varies for each HTTPS traffic type.
- Starting in NSX 6.4.5, the Application Profile Type drop-down menu contains separate options to create a profile for each of the three HTTPS traffic types.
- In NSX 6.4.4 and earlier, the Type drop-down menu contains only a single HTTPS option. To create a profile for each of the three HTTPS traffic types, you must specify appropriate profile parameters.
- NSX load balancer does not support proxy SSL passthrough.
NSX 6.4.4 and Earlier | NSX 6.4.5 and Later |
---|---|
Virtual Server Certificates | Client SSL |
Pool Certificates | Server SSL |
HTTPS Traffic Type | Description |
---|---|
SSL Passthrough | Application rules related to SSL attributes are allowed without requiring an SSL termination on the load balancer. The traffic pattern is: Client -> HTTPS-> LB (SSL passthrough) -> HTTPS -> Server. |
HTTPS Offloading | HTTP-based load balancing occurs. SSL ends on the load balancer and HTTP is used between the load balancer and the server pool. The traffic pattern is: Client -> HTTPS -> LB (end SSL) -> HTTP -> Server. |
HTTPS End-to-End | HTTP-based load balancing occurs. SSL ends on the load balancer and HTTPS is used between the load balancer and the server pool. The traffic pattern is: Client -> HTTPS -> LB (end SSL) -> HTTPS -> Server. |
Persistence | Description |
---|---|
Source IP | This persistence type tracks sessions based on the source IP address. When a client requests a connection to a virtual server that supports a source IP address persistence, the load balancer checks whether that client was previously connected. If yes, the load balancer returns the client to the same pool member. |
SSL Session ID | This persistence type is available when you create a profile for the SSL passthrough traffic type. SSL Session ID persistence ensures that repeat connections from the same client are sent to the same server. Session ID persistence allows the use of SSL session resumption, which saves processing time for both the client and the server. |
Cookie | This persistence type inserts a unique cookie to identify a session the first time a client accesses the site. The cookie is referred in subsequent requests to persist the connection to the appropriate server. |
- If no new connection requests are received from the same client within the timeout period, the persistence entry expires and is deleted.
- If a new connection request from the same client is received within the timeout period, the timer is reset, and the client request is sent to a sticky pool member.
- After the timeout period has expired, new connection requests will be sent to a pool member allocated by the load balancing algorithm.
For the L7 load balancing TCP source IP persistence scenario, the persistence entry times out if no new TCP connections are made for a period, even if the existing connections are still alive.
The following table lists the approved cipher suites that can be used to negotiate security settings during an SSL or TLS handshake.
Cipher Value | Cipher Name |
---|---|
DEFAULT | DEFAULT |
ECDHE-RSA-AES128-GCM-SHA256 | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 |
ECDHE-RSA-AES256-GCM-SHA384 | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 |
ECDHE-RSA-AES256-SHA | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA |
ECDHE-ECDSA-AES256-SHA | TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA |
ECDH-ECDSA-AES256-SHA | TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA |
ECDH-RSA-AES256-SHA | TLS_ECDH_RSA_WITH_AES_256_CBC_SHA |
AES256-SHA | TLS_RSA_WITH_AES_256_CBC_SHA |
AES128-SHA | TLS_RSA_WITH_AES_128_CBC_SHA |
DES-CBC3-SHA | TLS_RSA_WITH_3DES_EDE_CBC_SHA |
ECDHE-RSA-AES128-SHA | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA |
ECDHE-RSA-AES128-SHA256 | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
ECDHE-RSA-AES256-SHA384 | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
AES128-SHA256 | TLS_RSA_WITH_AES_128_CBC_SHA256 |
AES128-GCM-SHA256 | TLS_RSA_WITH_AES_128_GCM_SHA256 |
AES256-SHA256 | TLS_RSA_WITH_AES_256_CBC_SHA256 |
AES256-GCM-SHA384 | TLS_RSA_WITH_AES_256_GCM_SHA384 |
The following procedure explains the steps to create an application profile for each of the three HTTPS traffic types.