SSL Acceleration provides acceleration of SSL encrypted TCP sessions by intercepting SSL connections to configured servers and decrypting them, performing acceleration techniques, then re-encrypting them again. Only traffic to servers that are explicitly configured is SSL accelerated. Any SSL traffic that the Exinda appliance sees that does not belong to a configured server is ignored.
By configuring the SSL Acceleration Server, you are specifying:
if any CA validation is chosen, then you can choose whether to check if that CA certificate is still valid or whether it has been revoked.
Note that if the revocation check cannot be done or the certificate has been revoked, then the SSL Acceleration Server will be disabled. If the OCSP Responder is offline, the server will be disabled. Note the appliance periodically tests the connection and re-enables the server when it's back up. If the OCSP response verification fails or if the certificate has been revoked, then the connection will be reset and the server will be disabled.
| 
                         | 
                    
                         Note: If there are any problems with the certificate or key associated with a configured SSL server (E.g. missing key, expired certificate), then SSL Acceleration will ignore that traffic until the issue is resolved. The traffic may still be accelerated, just not SSL accelerated.  | 
                
|---|
| 
                         | 
                    
                         Caution: Before a server with an SNI extension can be added to the Exinda appliance, the server must be added to the appliance without the SNI extension. The server without the SNI extension is used as a fallback in case the client is unable to process the SSL certificate with SNI. A server with the same IP address and port number can be added to the appliance by specifying a unique SNI extension for each server. Caution: A server cannot be deleted if another server with the same IP address and port number and an Server Name Indication (SNI) extension has been configured on the Exinda appliance. Servers with SNI extensions must be deleted before the server can be deleted.  | 
                
|---|
If the server has multiple SSL certificates with a Server Name Indication (SNI) specified, type the SNI extension in the field.
The server (without an SNI) must be added before the server with the same IP and port number and an SNI can be added.
Select the Certificate to use for re-encryption of the SSL session.
The certificates available here are those that are configured in the Certificate and Key page.
Select the type of validation to apply to the server's certificate.
Click Add SSL Server.
The servers are displayed at the top of the page, where they can be edited or deleted.
Locate the server in the SSL Acceleration Servers list, and click Edit.
Modify the settings for the server, and click Apply Changes.
The settings for the server are changed.
Locate the server in the SSL Acceleration Servers list, and click Delete.
Servers with SNI extensions must be deleted before the server with the same IP and port number (but without an SNI) can be deleted.
In the confirmation dialog, click OK.
The server is deleted.
If the server is disabled, check the status message in the SSL Acceleration Servers list or Remote SSL Acceleration Servers list. The list will provide feedback on why the server is disabled. Perhaps the certificate validation failed or the OCSP validation failed.
To fix the problem, you can try relaxing the certificate validation a step at a time. For example, turn off OCSP validation and see what happens. Then turn off or broaden the certification validation, such as using ANY, or ANY-CA and see what happens. You can also use the openssl client to check the SSL handshake:
openssl s_client -state -msg -connection <ip:port> -ssl3 -showcerts
openssl s_client -connect <ip:host> -tls1 -showcerts -servername <server-name>
| 
                         | 
                |