SlideShare a Scribd company logo
1 of 15

Data Power User Group
Agenda (prepared by Jagadish Vemugunta – Technical Architect at Availity)
• Data Power Architecture patterns
• Data Power Service Level Monitoring (SLM) and Peering
• Feedback from users on the interested topics

Data Power Architecture patterns
Data Power Role in an enterprise
• Hardware appliance
• Inbuilt hardened security
• Wire speed performance (~ 20 times faster than software based applications)
• Multi protocol support
• XML centric. Starting from 7.0 , java script is supported
• Any-to-any transform ( can work great with web sphere transformation
extender)

Data Power Architecture patterns
Data Power product line
WebSphere DataPower B2B Appliance XB62: provides business-to-business (B2B) connectivity for applications including
cloud and mobile. The gateway consolidates B2B trading partner connectivity and transaction management.
WebSphere DataPower Integration Appliance XI50: provides security and integration gateway capabilities in convenient
form factors for blade and IBM System z environments.
WebSphere DataPower Integration Appliance XI52: a security and integration gateway appliance built for simplified
deployment and hardened security, bridging multiple protocols and performing conversions at wire speed.
WebSphere DataPower Integration Appliance XI52 Virtual Edition: a purpose-built, virtual appliance that delivers rapid
data transformations for cloud and mobile applications.
WebSphere DataPower Service Gateway XG45: a lightweight platform that provides rapid cloud and mobile services
deployments, governance and integration. It also serves as an edge-of-network security gateway.
WebSphere DataPower Service Gateway XG45 Virtual Edition: a purpose-built, virtual appliance. It delivers rapid cloud and
mobile services deployments, governance, light-weight integration and edge of network security gateway.
WebSphere DataPower XC10 Appliance: a caching platform that supports data-oriented, distributed caching scenarios with
little or no changes to existing applications.

Data Power Architecture patterns
Deployment topology
DMZ DMZ
federated extranet internet intranet
XI52
XS40
internet
user
internal
user
XS40
XI52
firewall
firewall
firewall
firewall
3.internal
security
4. web services
management
legacy
application
XS40
SOA platform
SOA enabled
enterprise
application
5.legacy
transformation
1.Helps protect against incoming
attacks
2.outbound messages

Data Power Architecture patterns
Data Power Services
• Multi-protocol gateway
• Web Service Proxy
• XML firewall
• Web application firewall
• XSL Accelerator (Proxy)

Data Power Architecture patterns
Services offered on each appliance
Core Services offered Data Power appliances Typical usage scenarios
Multi-protocol gateway XS40, XI50, XI52 Bridge request and response protocol
differences. Multiple transports in and out.
WS-Proxy XS40, XI50 , XI52 Process WSDL described services.
XML firewall XS40, XI50 , XI52 Send and receive XML traffic over HTTP to
and from XML-based applications.
Web application firewall XS40, XI50 , XI52 Protect heritage XML, SOAP, and B2B
messages, non WSDL based Web services
and non Web service applications.
XSL accelerator XA35 Optimize XML/XSLT transformations.

Data Power Architecture patterns
Configuration architecture
DataPower device
Service
Processing Policy
Rule
Action
Filter
XSLT

Data Power Architecture patterns
Typical Multi-Protocol use case
XML
Text
Binary
Other
Input/Output
Message
Formatting
Transform
ODBC
MQ
IMS ON Z/
OS
HTTP
CICS

Data Power Architecture patterns
Web Service proxy policy model
Abstract Model WSDL Concerete Model
Service
Port Binding Binding
Operation Operation Message
Service
Policy
Subject
End Point
Policy
Subject
Operation
Policy
Subject
Message
Policy
Subject
Inheritance

Data Power Architecture patterns
Web Service proxy conformance policy
Setting a conformance policy object validates incoming requests against back-end server responses against the WS-I Basic Profile and
WS-I Basic Security Profile standards.
The highlights of the key constraints imposed by the profile are:
Precludes the use of SOAP encoding
Requires the use of HTTP binding for SOAP
Requires the use of the HTTP 500 status response for SOAP fault messages
Requires the use of the HTTP POST method
Requires the use of WSDL1.1 to describe the interface of a Web service
Requires the use of rpc/literal or document/literal forms of the WSDL SOAP binding
Precludes the use of solicit-response and notification-style operations
Requires the use of WSDL SOAP binding extension with HTTP as the required transport
Requires the use of WSDL1.1 descriptions for UDDI Model elements representing a Web service

SLM Peering
Service Level Monitoring
SLM stands for service level monitoring, and is the primary means within Data
Power to do things like throttling and shaping incoming message traffic based on
some configured criteria

SLM Peering
SLM multicast peering
• A new configuration option for SLM peering that uses IP multicast packets as its means
of communications.
• Customers who require very accurate SLM enforcement when using SLM peering, or
use SLM peering with high incoming data rates.
• SLM peering can achieve global connection pool across the cluster of Data Power
servers. SLM peering allows multiple data power boxes to be grouped together which is
referred to as peer group and each peer in the group is referred as an identical SLM
policy.

SLM Peering
SLM multicast peering

SLM Peering
IP multicast

SLM Peering
Troubleshooting
Known limitations
– The local interfaces used for the IP multicast traffic between the peers must be in the
same subnet. The IP multicast interfaces are connected on a dedicated subnet.
Troubleshooting
– The IP multicast status provider will show whether the multicast packets successfully
reach each peer in the peer group. The presence of sent/received NAKs or lost packets
indicates either a network problem that should be resolved, or a poor configuration of
the IP multicast objects. All peers within the peer group must have the identical
SLM/peer/IP multicast configuration (except for the local interface of the IP multicast
object).

More Related Content

What's hot

Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
sflynn073
 

What's hot (20)

How to create a User Defined Policy with IBM APIc (v10)
How to create a User Defined Policy with IBM APIc (v10)How to create a User Defined Policy with IBM APIc (v10)
How to create a User Defined Policy with IBM APIc (v10)
 
What's new in API Connect and DataPower - 2019
What's new in API Connect and DataPower - 2019What's new in API Connect and DataPower - 2019
What's new in API Connect and DataPower - 2019
 
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparisonIBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparison
 
Intorduction to Datapower
Intorduction to DatapowerIntorduction to Datapower
Intorduction to Datapower
 
IBM WebSphere application server
IBM WebSphere application serverIBM WebSphere application server
IBM WebSphere application server
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
(NET406) Deep Dive: AWS Direct Connect and VPNs
(NET406) Deep Dive: AWS Direct Connect and VPNs(NET406) Deep Dive: AWS Direct Connect and VPNs
(NET406) Deep Dive: AWS Direct Connect and VPNs
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
Amazon Virtual Private Cloud
Amazon Virtual Private CloudAmazon Virtual Private Cloud
Amazon Virtual Private Cloud
 
#APIOps- Agile API Development powered by API Connect
#APIOps- Agile API Development powered by API Connect#APIOps- Agile API Development powered by API Connect
#APIOps- Agile API Development powered by API Connect
 
IBM MQ High Availability 2019
IBM MQ High Availability 2019IBM MQ High Availability 2019
IBM MQ High Availability 2019
 
IBM Cloud Integration Platform Introduction - Integration Tech Conference
IBM Cloud Integration Platform Introduction - Integration Tech ConferenceIBM Cloud Integration Platform Introduction - Integration Tech Conference
IBM Cloud Integration Platform Introduction - Integration Tech Conference
 
Introduction to ibm cloud paks concept license and minimum config public
Introduction to ibm cloud paks concept license and minimum config publicIntroduction to ibm cloud paks concept license and minimum config public
Introduction to ibm cloud paks concept license and minimum config public
 
DataPower Security Hardening
DataPower Security HardeningDataPower Security Hardening
DataPower Security Hardening
 
REST APIs and MQ
REST APIs and MQREST APIs and MQ
REST APIs and MQ
 
Executing a Large-Scale Migration to AWS
Executing a Large-Scale Migration to AWSExecuting a Large-Scale Migration to AWS
Executing a Large-Scale Migration to AWS
 
The Fundamentals of Networking in AWS: VPC and Connectivity Options - Business
The Fundamentals of Networking in AWS: VPC and Connectivity Options - BusinessThe Fundamentals of Networking in AWS: VPC and Connectivity Options - Business
The Fundamentals of Networking in AWS: VPC and Connectivity Options - Business
 
Cloud Security (AWS)
Cloud Security (AWS)Cloud Security (AWS)
Cloud Security (AWS)
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
 

Similar to Data Power Architectural Patterns - Jagadish Vemugunta

Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
sflynn073
 

Similar to Data Power Architectural Patterns - Jagadish Vemugunta (20)

Cisco’s Cloud Ready Infrastructure
Cisco’s Cloud Ready InfrastructureCisco’s Cloud Ready Infrastructure
Cisco’s Cloud Ready Infrastructure
 
Miracle Smart Grid Value Add Xcel
Miracle Smart Grid   Value Add XcelMiracle Smart Grid   Value Add Xcel
Miracle Smart Grid Value Add Xcel
 
IBM WebSphere Appliance Overview
IBM WebSphere Appliance OverviewIBM WebSphere Appliance Overview
IBM WebSphere Appliance Overview
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
 
How to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderHow to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service Provider
 
iWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience SolutioniWAN - Cisco Application Experience Solution
iWAN - Cisco Application Experience Solution
 
Hybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerůHybridní cloud s F5 v prostředí kontejnerů
Hybridní cloud s F5 v prostředí kontejnerů
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Intelligence at the Edge: How SD-WAN can Enable a Smarter Network
Intelligence at the Edge: How SD-WAN can Enable a Smarter NetworkIntelligence at the Edge: How SD-WAN can Enable a Smarter Network
Intelligence at the Edge: How SD-WAN can Enable a Smarter Network
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
Как повысить доступность ЦОД? Введение в балансировщики трафика. Часть 2
 
Miracle Smart Grid
Miracle Smart GridMiracle Smart Grid
Miracle Smart Grid
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
 
Datapower Steven Cawn
Datapower Steven CawnDatapower Steven Cawn
Datapower Steven Cawn
 
E2EVC 2014 building clouds with Microsoft Cloud OS and System Center
E2EVC 2014 building clouds with Microsoft Cloud OS and System CenterE2EVC 2014 building clouds with Microsoft Cloud OS and System Center
E2EVC 2014 building clouds with Microsoft Cloud OS and System Center
 
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
 
azure track -06- cloud integration patterns for it-pros - itproceed
azure track -06- cloud integration patterns for it-pros - itproceedazure track -06- cloud integration patterns for it-pros - itproceed
azure track -06- cloud integration patterns for it-pros - itproceed
 
Cloud integration patterns for it pros - itprceed
Cloud integration patterns for it pros - itprceedCloud integration patterns for it pros - itprceed
Cloud integration patterns for it pros - itprceed
 
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
 
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
IBM Software Defined Networking for Virtual Environments (IBM SDN VE)
 

Recently uploaded

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Data Power Architectural Patterns - Jagadish Vemugunta

  • 1.  Data Power User Group Agenda (prepared by Jagadish Vemugunta – Technical Architect at Availity) • Data Power Architecture patterns • Data Power Service Level Monitoring (SLM) and Peering • Feedback from users on the interested topics
  • 2.  Data Power Architecture patterns Data Power Role in an enterprise • Hardware appliance • Inbuilt hardened security • Wire speed performance (~ 20 times faster than software based applications) • Multi protocol support • XML centric. Starting from 7.0 , java script is supported • Any-to-any transform ( can work great with web sphere transformation extender)
  • 3.  Data Power Architecture patterns Data Power product line WebSphere DataPower B2B Appliance XB62: provides business-to-business (B2B) connectivity for applications including cloud and mobile. The gateway consolidates B2B trading partner connectivity and transaction management. WebSphere DataPower Integration Appliance XI50: provides security and integration gateway capabilities in convenient form factors for blade and IBM System z environments. WebSphere DataPower Integration Appliance XI52: a security and integration gateway appliance built for simplified deployment and hardened security, bridging multiple protocols and performing conversions at wire speed. WebSphere DataPower Integration Appliance XI52 Virtual Edition: a purpose-built, virtual appliance that delivers rapid data transformations for cloud and mobile applications. WebSphere DataPower Service Gateway XG45: a lightweight platform that provides rapid cloud and mobile services deployments, governance and integration. It also serves as an edge-of-network security gateway. WebSphere DataPower Service Gateway XG45 Virtual Edition: a purpose-built, virtual appliance. It delivers rapid cloud and mobile services deployments, governance, light-weight integration and edge of network security gateway. WebSphere DataPower XC10 Appliance: a caching platform that supports data-oriented, distributed caching scenarios with little or no changes to existing applications.
  • 4.  Data Power Architecture patterns Deployment topology DMZ DMZ federated extranet internet intranet XI52 XS40 internet user internal user XS40 XI52 firewall firewall firewall firewall 3.internal security 4. web services management legacy application XS40 SOA platform SOA enabled enterprise application 5.legacy transformation 1.Helps protect against incoming attacks 2.outbound messages
  • 5.  Data Power Architecture patterns Data Power Services • Multi-protocol gateway • Web Service Proxy • XML firewall • Web application firewall • XSL Accelerator (Proxy)
  • 6.  Data Power Architecture patterns Services offered on each appliance Core Services offered Data Power appliances Typical usage scenarios Multi-protocol gateway XS40, XI50, XI52 Bridge request and response protocol differences. Multiple transports in and out. WS-Proxy XS40, XI50 , XI52 Process WSDL described services. XML firewall XS40, XI50 , XI52 Send and receive XML traffic over HTTP to and from XML-based applications. Web application firewall XS40, XI50 , XI52 Protect heritage XML, SOAP, and B2B messages, non WSDL based Web services and non Web service applications. XSL accelerator XA35 Optimize XML/XSLT transformations.
  • 7.  Data Power Architecture patterns Configuration architecture DataPower device Service Processing Policy Rule Action Filter XSLT
  • 8.  Data Power Architecture patterns Typical Multi-Protocol use case XML Text Binary Other Input/Output Message Formatting Transform ODBC MQ IMS ON Z/ OS HTTP CICS
  • 9.  Data Power Architecture patterns Web Service proxy policy model Abstract Model WSDL Concerete Model Service Port Binding Binding Operation Operation Message Service Policy Subject End Point Policy Subject Operation Policy Subject Message Policy Subject Inheritance
  • 10.  Data Power Architecture patterns Web Service proxy conformance policy Setting a conformance policy object validates incoming requests against back-end server responses against the WS-I Basic Profile and WS-I Basic Security Profile standards. The highlights of the key constraints imposed by the profile are: Precludes the use of SOAP encoding Requires the use of HTTP binding for SOAP Requires the use of the HTTP 500 status response for SOAP fault messages Requires the use of the HTTP POST method Requires the use of WSDL1.1 to describe the interface of a Web service Requires the use of rpc/literal or document/literal forms of the WSDL SOAP binding Precludes the use of solicit-response and notification-style operations Requires the use of WSDL SOAP binding extension with HTTP as the required transport Requires the use of WSDL1.1 descriptions for UDDI Model elements representing a Web service
  • 11.  SLM Peering Service Level Monitoring SLM stands for service level monitoring, and is the primary means within Data Power to do things like throttling and shaping incoming message traffic based on some configured criteria
  • 12.  SLM Peering SLM multicast peering • A new configuration option for SLM peering that uses IP multicast packets as its means of communications. • Customers who require very accurate SLM enforcement when using SLM peering, or use SLM peering with high incoming data rates. • SLM peering can achieve global connection pool across the cluster of Data Power servers. SLM peering allows multiple data power boxes to be grouped together which is referred to as peer group and each peer in the group is referred as an identical SLM policy.
  • 15.  SLM Peering Troubleshooting Known limitations – The local interfaces used for the IP multicast traffic between the peers must be in the same subnet. The IP multicast interfaces are connected on a dedicated subnet. Troubleshooting – The IP multicast status provider will show whether the multicast packets successfully reach each peer in the peer group. The presence of sent/received NAKs or lost packets indicates either a network problem that should be resolved, or a poor configuration of the IP multicast objects. All peers within the peer group must have the identical SLM/peer/IP multicast configuration (except for the local interface of the IP multicast object).

Editor's Notes

  1. Could be exclusively used as the security gateway in the DMZ XML Denial-of-Service (XDoS) attack Can reject large payloads. These are all out-of-box support from the device