SSL Acceleration provides acceleration of SSL encrypted TCP sessions by intercepting SSL connections to configured servers by decrypting these sessions, performing acceleration techniques, and then re-encrypting them. Only traffic to the configured servers is SSL accelerated. Any SSL traffic that the Exinda appliance sees that does not belong to a configured server is ignored.
By configuring the SSL Acceleration Server, you are specifying:
If any CA validation is chosen, then you can choose whether to check if that CA certificate is still valid or whether it has been revoked.
![]() |
Note If the revocation check cannot be done or the certificate has been revoked, then the SSL Acceleration Server is disabled. If the OCSP Responder is offline, the server is disabled. The appliance periodically tests the connection and re-enables the server when it is back up. If the OCSP response verification fails or if the certificate has been revoked, then the connection is reset and the server is disabled. |
---|
![]() |
Note If there are any problems with the certificate or key associated with a configured SSL server (e.g., a missing key, or an expired certificate), then SSL Acceleration ignores that traffic until the issue is resolved. The traffic may still be accelerated, just not SSL-accelerated. |
---|
![]() |
Note The SSL Acceleration service uses port 8018 to communicate between Exinda Appliances. Please ensure this port is open for proper functionality |
---|
![]() |
Important Before a server with an SNI extension can be added to the Exinda appliance, the server must be added to the appliance without the SNI extension. A server without an SNI extension can be used as a fallback in event that the client is unable to process the SSL certificate with SNI. A server with the same IP address and port number can be added to the appliance by specifying a unique SNI extension for each server. |
---|
![]() |
Important A server cannot be deleted if another server with the same IP address and port number, and an SNI extension has been configured on the Exinda appliance. Servers with SNI extensions must be deleted before the server can be deleted. |
---|
If the server has multiple SSL certificates with a Server Name Indication (SNI) specified, type the SNI extension in the field.
The server (without an SNI) must be added before the server with the same IP and port number and an SNI can be added.
Select the Certificate to use for re-encryption of the SSL session.
The certificates available here are those that are configured in the Certificate and Key page.
Select the type of validation to apply to the server's certificate.
Click Add SSL Server.
The servers are displayed at the top of the page, where they can be edited or deleted.
Locate the server in the SSL Acceleration Servers list, and click Edit.
Modify the settings for the server, and click Apply Changes.
The settings for the server are changed.
Locate the server in the SSL Acceleration Servers list, and click Delete.
Servers with SNI extensions must be deleted before the server with the same IP and port number (but without an SNI) can be deleted.
In the confirmation dialog, click OK.
The server is deleted.
If the server is disabled, check the status message in the SSL Acceleration Servers list or Remote SSL Acceleration Servers list. The list will provide feedback on why the server is disabled. Perhaps the certificate validation failed or the OCSP validation failed.
To fix the problem, you can try relaxing the certificate validation a step at a time. For example, turn off OCSP validation and see what happens. Then turn off or broaden the certification validation, such as using ANY, or ANY-CA and see what happens. You can also use the openssl client to check the SSL handshake:
openssl s_client -state -msg -connection <ip:port> -ssl3 -showcerts
openssl s_client -connect <ip:host> -tls1 -showcerts -servername <server-name>
|
|