Coyote Point Equalizer Extreme with Equalizer XCEL
December 21, 2004
Coyote Point Systems Inc.Product:
- Ease of Use:
- Value for Money:
- Overall Rating:
The fault-tolerance features are simple, but effective.
It requires the addition of the Envoy option to allow devices to be clustered.
A flexible system that can be expanded to handle most requirements.
Coyote Point's Equalizer Extreme is at the high end of its range. Featuring an Intel Xeon processor, redundant power supplies and two 10/100/1000 Base-T Ethernet connections in a standard Dell 1U rack-mountable chassis, the system runs Coyote Point's Equalizer software under a version of the FreeBSD operating system.
The initial setup and configuration tasks need to be performed using a command line interface over a serial connection, but the configuration program is menu-driven and should pose no problems. Most other configuration and management operations can be done with Coyote Point's browser-based management software, which will run with most browsers.
The system would normally be configured as a gateway between internal and external networks, but it can be set up in a single network configuration. Two Equalizers can be configured in a hot, standby pairing with the secondary unit monitoring the primary unit's status, taking over its functions if it fails.
It is not possible to have a cluster of Equalizers without the Envoy software option, which is not supplied. The Equalizer uses a system of virtual server clusters and real servers to handle connections between them and the outside world.
Each virtual server cluster is defined with the required characteristics such as the protocol it will handle, the port it will respond on, and the load-balancing algorithm it will use. Real servers are defined and assigned to the appropriate cluster. A real server can be designated as a hot spare in a cluster and the Equalizer will only send traffic to it if all the other servers in the cluster are not responding.
Apart from the fault-tolerance this can give it could help to reduce the number of licenses needed for a group of servers. Virtual clusters can be configured to do content-sensitive load balancing, using a system of user-defined rules to send traffic to specific servers according to the content of the request. The system can obtain and manage keys and certificates, and can assign them to whichever virtual clusters will be handling the SSL traffic.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry