2 web caching, 1 configuring web caching, Web caching -17 – Riverstone Networks WICT1-12 User Manual

Page 515: Configuring web caching -17

Advertising
background image

Riverstone Networks RS Switch Router User Guide Release 8.0 22-17

Web Hosting Configuration

Web Caching

The network shown in the example can be created with the following commands:

22.2 WEB CACHING

Web caching provides a way to store frequently accessed Web objects on a cache of local servers. Each HTTP request
is transparently redirected by the RS to a configured cache server. When a user first accesses a Web object, that object
is stored on a cache server. Each subsequent request for the object uses this cached object. Web caching allows multiple
users to access Web objects stored on local servers with a much faster response time than accessing the same objects
over a WAN connection. This can also result in substantial cost savings by reducing the WAN bandwidth usage.

Note

The RS itself does not act as cache for web objects. It redirects HTTP requests to
local servers on which the web objects are cached. One or more local servers are
needed to work as cache servers with the RS’s web caching function.

22.2.1

Configuring Web Caching

The following are the steps in configuring Web caching on the RS:

1.

Create the cache group (a list of cache servers) to cache Web objects.

2.

Specify the hosts whose HTTP requests will be redirected to the cache servers. This step is optional;
if you do not explicitly define these hosts, then all HTTP requests are redirected.

3.

Apply the caching policy to an outbound interface or port to redirect HTTP traffic on that interface
or port to the cache servers.

! create the load balancing group 'service2' with virtual IP address 135.1.1.1

load-balance create group-name service2 virtual-ip 135.1.1.1 protocol udp

load-balance add host-to-group 10.1.1.1-10.1.1.2 group-name service2

load-balance set wildcard-lsnapt-range service2 source-port-range 1024-65535

! traffic from these source ports will not be translated by NAT

acl nat-acl deny tcp any any 53 any

acl nat-acl deny udp any any 53 any

acl nat-acl deny tcp any any 80 any

acl nat-acl deny tcp any any 443 any

! traffic from these source ports will be translated by NAT

acl nat-acl permit tcp 10.1.0.0/16 any 1024-65535 any

acl nat-acl permit udp 10.1.0.0/16 any 1024-65535 any

! requests from 10net servers using ports 1024-65535 are translated to global

! address 136.1.1.100 with PAT, and vice versa

nat set interface 10net inside

nat set interface 136net outside

nat create dynamic local-acl-pool nat-acl global-pool 136.1.1.100 enable-ip-overload

Advertising