A10 outbound decryption using l3 path
Why an alternative L3 path
Client had this set of "explicit" proxies server behind a load balancer [purple one], and a pac file to point this LB whenever an access is needed to internet
Security policy mandates deep packet inspection for outgoing traffic.
The proxies and the load balancer was not a physical node as weel as the clients which are vdi nodes.
With this type of topology, we created an alternative l3 path which is health checked by load balancer and auto-bypassed in case of a failure within decryption solution.
How
Using an alternative entrypoint and added as a 4th proxy to lb's server farm, our explicit and decrypted path acted as antoher proxy. And an active healthcheck on load balancer continously did checks in case any security solution between decrpyt and encrypt path creates a problem.
Timeline
Project took 6 months to poc and implenet
Current status
more than 1500 users are actively decrypted and deep packet inspection is online
No Comments