What Secure Excelerator Can Do for Your Network

By adding the Secure Excelerator module to your Excelerator appliances, you can:


Offloading Secure Connection Overhead

Establishing and maintaining secure connections between a Web server and the browsers it services takes more processing power than any other Web server tasks. The work required to encrypt and decrypt data is especially taxing.

As additional browsers request connections, the Web server's processor load increases. When the upper limits of processing resources are reached, requests bog down as they wait their turn. Eventually, as illustrated in Figure 2, the Web server has to refuse browser requests.

Figure 2

Much of the content sent through secure connections is the same for each browser request. This means that a secure Web server must use its processing cycles to repeatedly encrypt the same content.

Just as Excelerator appliances cache content and offload redundant content requests from Web servers, Secure Excelerator offloads the repeated encryption of the content.

As a result, the Web server's processor is freed up for one-time, non-cacheable events, such as finalizing online purchases and providing account or credit balance information.

Secure Excelerator also works with multiple processors on a single appliance. This means that you can scale the appliance to handle very heavy secure-connection loads as the demand for secure content increases.

Figure 3 illustrates how Secure Excelerator offloads the secure connection overhead from the Web server.

Figure 3


Opening Up Firewalls

Companies with enterprise networks have traditionally erected strong firewalls to protect the data on their network.

However, changes in business dynamics have created a need to provide access through the firewall (see Figure 4).

Figure 4


Opening Firewalls Without Secure Excelerator

Opening access through the firewall usually requires that you address the following issues:


Opening Firewalls Using Secure Excelerator

Volera Secure Excelerator doesn't require you to change your existing Web servers or their content to provide secure access through a firewall.


How Secure Excelerator Transforms Links

If you understand the process Secure Excelerator uses to determine which links to transform, you can ensure that:


Only Absolute Links Are Transformed

Only absolute links that include the protocol scheme (HTTP) and a full DNS hostname can be transformed.

For example, Secure Excelerator would rewrite the following link if all other conditions for transforming links are met:

<A HREF="http://Inhouse1.foo.org/products/describe.htm">Click here.</A>

NOTE:  Relative links do not need to be transformed.


Links Must Reference Content on Accelerated Web Servers

If an absolute link references content on a Web server that the Excelerator appliance is securely accelerating, the link can be transformed.

For example, the following table shows which links to Web servers on a given network could be transformed:

Web Server DNS Hostname Is the Excelerator appliance securely accelerating the Web server? Can links to the Web server be transformed?

Inhouse1.foo.org

Yes

Yes

Inhouse2.foo.org

Yes

Yes

Inhouse3.foo.org

No

No


Hostnames and Ports Must Match

If the requirements in Only Absolute Links Are Transformed and Links Must Reference Content on Accelerated Web Servers are met, Secure Excelerator will transform non-secure links that meet the requirements illustrated in Figure 5.

Figure 5

Information on setting the Web Server Address and Port shown in Figure 5 is contained in Configuring the Web Server Acceleration Services .


What Secure Excelerator Does to Link Content

Secure Excelerator does the following to qualified absolute URLs:

Figure 6 illustrates the Secure Excelerator content transformation process.

Figure 6


A Visual Summary

Figure 7 is a visual summary of how Secure Excelerator can connect your internal network to the Web.

Figure 7



  Previous Page: How Secure Excelerator Works  Next Page: Planning Your Secure Excelerator Installation