Welcome
About document conventions
About documentation and release notes
Contacting Riverbed
About SteelHead Interceptor Deployments
Interceptor deployment example
Methods for distributing TCP connections
Interceptor and accelerated connections
Support for real-time cluster administration
Interceptors and network interface cards
Interceptor support for system failure recovery
Interceptor throughput
Support for network virtualization
Comparing WCCP, PBR, and Layer-4 redirection without SteelHeads
Behavior of pass-through traffic
Redirector response to a SteelHead failure
Interceptor Deployment Design
Physical in-path Interceptor deployment
Cabling and duplex
IP address and gateway selection
Default gateway and routing configuration
EtherChannel and LACP
802.1Q VLAN trunks
Physical in-path Interceptor failure modes
Interceptor link state propagation
Virtual in-path Interceptor deployment
Overview of virtual in-path Interceptor
Unsupported virtual in-path Interceptor deployment
In-path Interceptor failure modes
Overview of redirection and acceleration
Deployment verification
GRE, MPLS, and VRF
QoS in an Interceptor deployment
IPv6 support for traffic acceleration
Important points about IPv6 single-stack deployments
VLAN bridging deployments
Overview of VLAN bridging deployment
VLAN bridging considerations
VLAN bridging variations
Interceptor Clusters
SteelHead placement and configuration
LAN-side versus WAN-side SteelHead placement
Layer-2 versus Layer-3 connectivity
Multiple SteelHead link support
Multiple SteelHead support
Firewall and monitoring interaction
Relative placement of a firewall, SteelHead, and Interceptor
Disruptive firewall placements
Firewall placement best practices
Interceptor relationships
Deploying failover Interceptors
Deploying Interceptors in clusters
Unsupported deployments
Cluster member failures
Standard cluster types
Deploying series Interceptors
Deploying parallel Interceptors with fail-to-block
Deploying quad Interceptors
Deploying an octal cluster
Deploying a virtual in-path Interceptor cluster
Choosing a cluster type
Connection forwarding settings for allow-failure
Traffic Redirection
Hardware-assisted pass-through (HAP) rules
In-path rules
Load-balancing rules
Rule types and matching
Default rule and pool
Load-balancing rule processing
SteelHead selection
Intra-cluster latency
Interceptor Network Services
Overview of Interceptor network services
Interceptor network services use cases
Feature compatibility, requirements, and limitations
Interceptor network services concepts
Load balancing of redirected connections for network services
Interceptor cluster state
Packet size
Packet processing enhancement
Rule processing
Packet flow
Deploying Interceptor network services
Quad cluster Interceptor network services example
VLAN Segregation
VLAN use cases
VLAN segregation Interceptor cluster virtualization
Feature compatibility and limitations
Deploying VLAN segregation
Single Interceptor in VLAN segregation mode
Interceptor cluster in VLAN segregation mode
Authentication and Security
Overview of security
Vulnerability management
Overview of authentication
Authentication features
Configuring a RADIUS server
Configuring a RADIUS server with FreeRADIUS
Configuring RADIUS authentication in the Interceptor
Configuring RADIUS CHAP authentication
Configuring a TACACS+ server
Configuring TACACS+ with Cisco secure access control servers
Configuring TACACS+ authentication in the Interceptor
Securing Interceptors
Overview of securing Interceptors
Best practices for securing access to Interceptors
Best practices for enabling Interceptor security features
Best practices for security monitoring
Configuring SSL certificates for web user interface
Configuring SNMPv3 authentication and privacy
Best Practices for Interceptor Deployments
General best practices
VLAN segregation best practices
Installation and verification best practices
Installing an Interceptor
Verifying the configuration
SteelHead⢠Interceptor Deployment Guide
Best Practices for Interceptor Deployments