Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
PROXYSG PERFORMANCE Thank you for joining today’s Blue Coat Customer Support Technical Webcast! • The Webcast will begin just a minute or so after the top of the hour to allow today’s very large audience sufficient time to join • You may join the teleconference through the numbers provided in your invite, or listen through your computer speakers • Audio broadcast will only go live when the Webcast begins – there will be silence until then • The Presentation will run approximately 60 minutes • There will be a 30-minute Q/A session thereafter Please submit questions using the Webex Q/A feature! Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 1 PROXYSG PERFORMANCE WEBCAST PAUL KAO Director Product Management [email protected] December 16, 2014 Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 2 AGENDA ProxySG Overview • Architecture (SGOS, CW, SW, Policy checkpoints) • System resources/metrics Performance Model Factors Impacting Performance • Authentication, ICAP, Policy, SSL, misc. Critical Resource Monitoring • CPU, Memory, CW, network Troubleshooting Performance Problems • Baseline, CPU monitor, Policy trace, Sysinfo Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 3 PROXYSG OVERVIEW Blue Coat Confidential Copyright © 2014 2013 Blue Coat Systems Inc. All Rights Reserved. 4 SGOS OVERVIEW SGOS is a secure, hardened and proprietary OS developed by Blue Coat to be robust and scalable at the highest levels of performance It is unlike other operating systems • Microkernel, message pass architecture using “admin” and “worker” model for processes • Run to completion semantics • Uses an object store (cache engine/cache admin), no file system, no directory structure Policy is deeply integrated into SGOS • Checkpoints at entry/exit of proxy traffic flow to evaluate policy transaction Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 5 SGOS ARCHITECTURE Client Worker (CW) – Processes HTTP session between SG and client Server Worker (SW) – Processes HTTP session between SG and OCS Retrieval Worker (RW) – Pipeline and keeps the content of the cache fresh Specialized Worker – Handles a specific protocol, like streaming, CIFS, etc. Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 6 POLICY CHECKPOINTS server_url.domain= client.address= set(response.header.Set-Cookie, “x") http.response.apparent_data_type= Workers provide available information to policy Policy transaction re-evaluated at each check point Policy decisions are stored a policy ticket Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 7 PROXYSG APPLIANCE PHYSICAL RESOURCES Core appliance resources are: • CPU, Memory, Disk, Network Interface CPU • No CPU throttling - continue to handle more load until appliance is at CPU limit (assuming other resources are available). At this point, requests take longer to process, with longer transaction times. Memory • Threshold Monitor (TM) engages at 80% memory pressure, goes into regulation, which limits HTTP acceptance to reduce rate of processing new incoming connections. Disk • At high disk utilization, back off mechanisms will engage to maintain throughput at the expense of cache efficiency (disk read/writes) Network Interface • Will trigger event log if network interface is saturated (TCP livelock) Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 8 PROXYSG APPLIANCE METRIC USER COUNT & CLIENT WORKER Appliance has fixed CPU/Memory/Disk/Network resources One additional metric – “Licensed Client IP” • From a sizing perspective, “Licensed Client IP” is the maximum unique IPs that a given SG appliance should handle • Usually, Client IP is synonymous with user/employee Licensed Client IP • A “soft” limit on HW appliances • A “hard” limit on Virtual appliances • Performance of appliances constrained by available number of HTTP/TCP-Tunnel “Client Workers” (CW) for processing • Each appliance model has it’s own CW limit CW limit does not limit any other TCP session on SG CW limit is only a count of active client side sessions Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 9 PERFORMANCE MODEL Blue Coat Confidential Copyright © 2014 2013 Blue Coat Systems Inc. All Rights Reserved. 10 PERFORMANCE MODEL Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 11 FACTORS IMPACTING PERFORMANCE 1. 2. Network deployment 3. Authentication mode 4. DNS, Content Filtering 5. ICAP REQMOD (DLP) 6. 7. Client ICAP RESPMOD (CAS) System services, logging 8. 9. Blue Coat Confidential Policy SSL Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 12 PERFORMANCE FACTORS 1. CLIENT Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 13 1. CLIENT SIDE Client to SG connection (client side) • • • • Limited by HTTP/TCP-Tunnel CW User (client IP) is not an enforced metric. User is a model for sizing CW limit does not include other TCP sessions (auth, ICAP, bypass,..) Don’t confuse TCP-Tunnel proxy CW as the TCP connection limit!!! S-Series hardware • S-series models – 5 connections/per user (user = unique client IP) S200-10 S200-20 S200-30 S200-40 S400-20 S400-30 S400-40 S500-10 S500-20 Users Max CW 400 1,200 2,600 5,000 6,000 2,000 6,000 13,000 25,000 30,000 14,000 25,000 30,000 50,000 70,000 125,000 150,000 250,000 Examples: • Financial trader, 50 conns per user • Kiosk, 1 connection per user Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 14 PERFORMANCE FACTORS 2. NETWORK DEPLOYMENT Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 15 2. NETWORK DEPLOYMENT Network 101 • Link/duplex settings WCCP • GRE vs L2 • Set MTU appropriately to avoid fragmentation with GRE Physically Inline (bridging) • Good for smaller sites • Larger sites with significant non web (bypass) traffic that can consume network resources Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 16 PERFORMANCE FACTORS 3. AUTHENTICATION MODE Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 17 3. AUTHENTICATION Evaluated at CI Choice of Authentication mode can impact performance • Explicit proxy with NTLM: SG issues a 407 challenge for each connection • IP Surrogate: After initial authentication, will use authentication cache • Kerberos: credentials validated without need to contact DC NTLM does not scale well • NTLM credential cannot be cached, and must be validated by DC • Default Windows configuration processes only one request at a time via Schannel • Exacerbated by latency and load on DC (SG-DC or SG-BCAA-DC) Kerberos preferred for scalability Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 18 PERFORMANCE FACTORS 4. DNS, CONTENT FILTERING Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 19 4. DNS, CONTENT FILTER DNS • Not a high consumer of CPU, but can be cause of latency • If external DNS servers are slow/overloaded, Proxy will amplify the problem • Use caution for policies/logging that trigger RDNS lookups Content Filtering (evaluated at Client In) • BCWF – Efficient categorization for high performance – Settings for lower memory footprint appliances • Web Pulse DRTR – Minimal overhead Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 20 PERFORMANCE FACTORS 5. ICAP REQMOD (DLP) Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 21 5. ICAP GENERAL & ICAP REQMOD ICAP – Internet Content Adaptation Protocol • Used to vector both REQuest and RESPonse traffic for scanning ICAP – General Performance considerations • • • • • Persistent connection with re-use Sufficient ICAP connections to handle throughput or queuing will occur Relatively “expensive” – content must be sent over ICAP Policy dictates how much content is sent (ICAP best practices) Worst case is all content sent to ICAP ICAP REQMOD evaluated at CI (before Server Out) Scan data on outbound request • Scanning POST body data Incremental cost due to low volume of data (POST body data) Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 22 PERFORMANCE FACTORS 6. ICAP RESPMOD (CAS/AV) Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 23 6. ICAP RESPMOD (CONTENT ANALYSIS) Evaluated at Server In (SI) Higher cost due to volume of incoming request data For ICAP RESPMOD, cache to disk for performance (no need to return payload when response is 204 No Modification) Infinite Streams • ICAP deferred connections • ICAP mirroring (SG6.5) Secure ICAP • SSL cost in initial connection setup • SSL overhead of bulk encryption low Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 24 PERFORMANCE FACTORS 7. SYSTEM SERVICES Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 25 7. SYSTEM SERVICES Access logging • Log entry written when connection is complete • A few percent overhead when enabled • Obviously more overhead if multiple log facilities in use Health Checks SNMP Attack Detection Failover, SGRP (VRRP) Connection Forwarding Scripts, polling of local policy Snapshots, Debug logs Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 26 PERFORMANCE FACTORS 8. POLICY Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 27 8. POLICY AND CPU Policy impact can range from minimal to majority of CPU cost on SG Look for policy best practices • Avoid regexes, order rules most likely to match first, group rules, etc. A point of reference • Policy used for SWG/ICAP/SSL consumes about 15% of total CPU – Scale appropriately for higher/lower policy usage – Variation across platforms – Only use as a rule of thumb – Not guaranteed to be exact – May change in the future Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 28 PERFORMANCE FACTORS 9. SSL Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 29 9. SSL INTERCEPT Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 30 CERTIFICATE EMULATION STATISTICS (SG6.5.5.1) SSL Statistics (in Sysinfo and SSL/Statistics URL) https://SG_IP:8082/SSL/statistics Certificate Emulation SPS51 Total certificates emulated 2,264 SPS52 Total RSA 2048 bit key certificates emulated 2,250 SPS53 Current cached emulated server certificates 1,078 SPS54 Total emulated server certificates added to cache 1,390 SPS55 Total emulated server certificates removed from cache due to timeout 0 SPS56 Total emulated server certificates removed from cache due to maxsize 0 SPS57 Total emulated server certificates removed from cache due to signature mismatch 312 SPS58 Total emulated server certificates removed from cache due to config changes 0 SPS59 Total emulated server certificates add to cache failures 874 SPS61 Total server certificate cache successful lookups 42,109 SPS62 Total proxy certificates emulated 5 SPS63 Total certificate emulation failures 0 % certificate emulation change = SPS51 / (SPS51 + SPS61) In steady state, % of new emulations should be very small Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 32 SSL & WILDCARD CERTIFICATES Wildcard certificates (e.g., *.google.com and others) • • • • • Google and other properties starting to use wildcard certificates Wildcards allow certs with the same CN to appear on multiple servers. Different servers have different certs (different expiration, keys, extensions, etc.) SG’s emulated certificates are cached using “CN” as the key value SG is seeing these different certs all with the same CN, causing a collision in the certificate cache and forcing SG to re-emulate certificate • This can lead to high CPU on all SG6.x versions (6.2 through to 6.5) • Future certificate cache enhancement planned, use policy resolution below Wildcard certificates Resolution • Install the following policy (creates a unique instance for each certificate) <ssl-intercept> ssl.forward_proxy(https) ssl.forward_proxy.splash_text("$(xrs-certificate-serial-number)$(x-rs-certificate-validfrom)$(x-rs-certificate-valid-to)") • Monitor efficacy using % certificate emulations (=SPS51 / (SPS51 + SPS61)) Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 33 SSL PROXY CERTIFICATE CACHE Advanced URL https://SG_IP:8082/sslproxy/certcache SSL Proxy Certificate Cache URL_Path /sslproxy/certcache <PRE>Certificate Cache Contents Number of cache entries: 1078 Common Name, Splash Text, Splash URL, Server Keyring rtax.criteo.com,, $(x-rs-certificate-serial-number) cloudfront.net,, www.bgov.com,, s3.wpc.edgecastcdn.net,, www.palottery.state.pa.us,, beacon.walmart.com,, $(x-rs-certificate-valid-from) $(x-rs-certificate-valid-to) *.linkedin.com, 020000000001456FAAB168CFFE4A Apr 17 12:30:30 2014 GMT Apr 17 12:30:30 2015 GMT, beis.cc.iup.edu,, www.syncaccess.net,, *.widget.custhelp.com,062306473BAC372720E3496C661336F0Feb 28 00:00:00 2014 GMTMar 30 23:59:59 2015 GMT, ads.dotomi.com,02F7CASep 3 03:33:55 2014 GMTNov 5 14:50:00 2015 GMT, *.wer.microsoft.com,28DB34EB000100005898Apr 4 17:56:38 2013 GMTApr 4 17:56:38 2015 GMT, *.ebay.com,, *.googleusercontent.com,, *.reson8.com,D3C03378DC74A2ABF36132E69E273C45Jun 2 00:00:00 2014 GMTJul 21 23:59:59 2015 GMT, stage.tracker.springserve.com,, services.addons.mozilla.org,, *.tapad.com,024906Jun 2 08:10:18 2013 GMTSep 3 03:30:13 2016 GMT, *.dropbox.com,, Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 34 WILDCARD CERTIFICATE RESOLUTION VPM From VPM, edit SSL-Intercept layer Click on "Splash Text" and paste the below text in the box: $(x-rs-certificate-serialnumber)$(x-rs-certificate-validfrom)$(x-rs-certificate-valid-to) Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 35 CRITICAL RESOURCE MONITORING & TROUBLESHOOTING PERFORMANCE Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 36 CRITICAL RESOURCE MONITORING What key metrics should be monitored? • • • • • CPU Utilization Memory Pressure Network Throughput Client side HTTP connections (CWs) Response time through ProxySG (and DNS response time) Establish a Baseline and Peak utilization • • • • Beware trend averages over long time intervals that “flatten” peaks Identify true peak CPU utilization in busy hour Peak CPU typically correlates with memory and connections Baseline CPU distribution across components with CPU monitor SNMP MIBs • See BLUECOAT-SG-PROXY-MIB.txt for resource monitoring • Also BLUECOAT-SG-ICAP-MIB.txt has been added in SG6.5 See “Critical Resource Monitoring of the ProxySG” on BTO • Has the connection limit for each platform Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 37 TROUBLESHOOTING PERFORMANCE Common performance issues • High CPU • Slowness Easier to troubleshoot if you have already established a point of reference (baseline) Issue repeatable? Time of occurrence • Over a long period of time? • Over a short period of time? • Intermittent? Tools • CPU Monitor • Sysinfo snapshots • Policy trace Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 38 TROUBLESHOOTING PERFORMANCE HIGH CPU External Network Factors • Typically not going to be cause of high CPU on SG Dependent Factors • Problem with Authentication server or Auth configuration (Kerberos falling back to NTLM) Internal factors • • • • • Audit config changes to SG – complex policy/regexes? Loops – authentication, forwarding loops Upgrade of SG version/bug? Undersized? Self inflicted - enabling snapshots/debug logs too frequently? Traffic patterns that change SG resource utilization • • • • Change in traffic pattern resulted in lack of available resources Change in traffic pattern hitting expensive policy Under attack? – Viruses, rogue apps, open proxy Bug? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 39 TROUBLESHOOTING PERFORMANCE HIGH CPU Data collection • Enable CPU monitor • Create and enable 5 min snapshots • Don’t change the existing daily or hourly snapshot values Is high CPU constant, randomly spiking or just at peak busy hour? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 40 TROUBLESHOOTING PERFORMANCE HIGH CPU EXAMPLE 1 Example-1 >>>> CPU is high for Policy evaluation CPU Monitor Lots of regex rules in policy Very complex policy (lots of rules) Authentication problem High number of transection per sec CPU 0 97% Policy evaluation - HTTP 81% HTTP and FTP 5% Object Store 5% Access Logging 2% Miscellaneous 1% CPU 1 94% Policy evaluation - HTTP 75% TCPIP 11% HTTP and FTP 5% DNS service 1% Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 41 TROUBLESHOOTING PERFORMANCE HIGH CPU EXAMPLE 2 Example-2 >>>> CPU is high in Object Store CPU Monitor System had hard time to read or write anything to disk. Indicate problem with Disk. CPU 0 100% Object Store ce_admin Access Logging CPU 1 98% 97% 1% 19% TCPIP 8% tcpip HTTP and FTP 7% 6% http 1% kernel 1% Policy evaluation - HTTP policy_enforcement Blue Coat Confidential 3% 1% Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 42 TROUBLESHOOTING PERFORMANCE HIGH CPU EXAMPLE 3 Example-3 >>>> CPU is high across multiple components CPU Monitor: Configured interval duration: 5 seconds Current interval complete in: 2 seconds CPU 0 CPU is almost evenly distributed between HTTP and FTP TCPIP Object store Policy evaluation Load/sizing issue 77% TCPIP 31% HTTP and FTP 17% Object Store 13% Policy evaluation - HTTP 7% DNS service 1% Access Logging 1% Miscellaneous 1% Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 43 TROUBLESHOOTING PERFORMANCE HIGH CPU EXAMPLE 4 Example-4 >>>> CPU is high in TCP Configured interval duration: 5 seconds Current interval complete in: 0 seconds CPU 0 Too much bypass traffic. Too many TCP connections. May be a TCP attack. Too many entries in time wait state. 35% Object Store 14% HTTP and FTP 13% Policy evaluation - HTTP 3% Miscellaneous 2% CPU 1 100% TCPIP HTTP and FTP 5% Policy evaluation - HTTP 1% DNS service 1% Blue Coat Confidential 90% Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 44 TROUBLESHOOTING PERFORMANCE SLOWNESS Can be difficult to troubleshoot, especially if intermittent External Network Factors • audit change requests to (upstream) network (over last week) • E.g., new FW installed last weekend • Network: Packet loss, retransmissions, asymmetric routing Dependent Factors • DNS, Authentication, 3rd party ICAP servers Internal factors • Audit config changes to SG, starting with most recent (work backwards to last 2-3 days if intermittent problem) Traffic patterns that change SG resource utilization • SSL ciphers • Attack/bot Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 45 TROUBLESHOOTING PERFORMANCE SLOWNESS Data collection • May require multiple rounds of troubleshooting (PCAP & Sysinfo snapshots) – Easiest to target specific client or server to test – May need to test with different configurations and capture with different filter to narrow down the issue • Important to analyze Snapshots. – Check if resource load are high (e.g. CPU, memory, HTTP worker and etc.) – Check on any priority 1 events & health check occurred during the time of the issue. – Check on the trend of the issue (how frequent it occurs and any correlation with other components or stats) Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 46 SUMMARY ProxySG Architecture • Appliance resources, CW limit Performance Model Factors Impacting Performance • ICAP (built into sizing model/guide) • Policy (sky is the limit) • SSL (SSL traffic mix amount of SSL decryption) Resource and Health Monitoring • Critical resource monitoring • Health monitoring Troubleshooting • Importance of establishing a performance baseline • Tools to troubleshoot performance Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 47 Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 48 THANK YOU FOR JOINING TODAY! Please provide feedback on this webcast and suggestions for future webcasts to: [email protected] Webcast replay and slide deck found here within 48 hours: https://bto.bluecoat.com/training/customersupport-technical-webcasts (Requires BTO log-in) Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 49 BLUE COAT CUSTOMER FORUMS Community where you can learn from and share your valuable knowledge and experience with other Blue Coat customers Research, post and reply to topics relevant to you at your own convenience Blue Coat Moderator Team ready to offer guidance, answer questions, and help get you on the right track Access at forums.bluecoat.com and register for an account today! Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 50 QUICK SURVEY We are truly committed to continuous improvement for these Technical Webcasts. At the end of the event you will be redirected to a very short survey about satisfaction with this Program. Please help us out by taking two minutes to complete it. Thank you! Questions for Paul? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 51 Questions? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 52 PROXYSG PERFORMANCE WEBCAST QUESTIONS Q1:Is a Client Worker (CW) created for every HTTP connection? or a single CW can handle multiple HTTP connections? Q2: The cost with the wildcard certificates -- does that generate a lower "cost" in a reverse proxy model where the wildcard cert is on the proxy, not on the OCS/Internet? Q3: How does Licensed Client IP correlate to Concurrent users? Q4: Is it possible to monitor the number of client connections per IP in the SG? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 53 PROXYSG PERFORMANCE WEBCAST QUESTIONS Q5: So I notice that BC has recommended the S-series to replace many 510/810/300/600 ProxySG's - does this mean the S-series is exactly the same or are they truly an improvement in performance and connection numbers? Q6: In "Critical Resource Monitoring" Guide talks about Connection limit per device... that's the same than CW that has that particular model? Q7: What about multiple users on a single Citrix server? Licenses Q8: Client side, how will you typically handle the reach of TCP limit (65,000) for a specific IP in the larger models that could handle a lot more connections? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 54 PROXYSG PERFORMANCE WEBCAST QUESTIONS Q9: Note: IP surrogate won't work in a NATed load balancer configuration. About IP surrogate, do you have advice about implementation. Especially about the possibility that one IP can be shared between users (hiding IP or Citrix users)? Q10: we are currently logging the category of URLs. What kind of impact can we expect if we add the application field in our logs for BCWF? Q11: where can we view utilization on the proxy like the pie graph like the BC SWG policy pie chart? Q12: Can you talk about ECDHE, from a performance standpoint, what should the default policy be set to? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 55 PROXYSG PERFORMANCE WEBCAST QUESTIONS Q13: for ICAP, will the proxy perform better if a dedicated interface is assigned for ICAP communication versus the same interface for all other user traffic? Q14: Today's sizing guides assumes 15% of SSL traffic. That's not realistic. At least 60% of Web browsing is SSL. Is there any sizing guide that assumes higher SSL percentage use? We're having serious problems sizing the right SG to our customers. Q15: Will be sysinfo "reader" (tool that support rep uses) available for channels? Q16: For troubleshooting we saw recommendations to add snapshots every 5 minutes. How much free CPU resources (%) should be free to enable this without generating a new problem ? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 56 PROXYSG PERFORMANCE WEBCAST QUESTIONS Q17: When the ProxySG is in high CPU/high memory panic mode.. is there anything we can do to bring that down other than reboot the device? Q18: Regarding the CW limit: We've long seen it as our primary bottleneck. Does Bluecoat publish the CW figures publically yet, or do we have to ask our VAR to get the figures on the proxy models at purchase time? Q19: does rebooting the proxy impact performance from a caching standpoint? Q20: Hi, regarding memory pressure - do I understand correctly that while the proxy is in the regulation state, it just regulates NEW client connections but keeps processing the active ones? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 57 PROXYSG PERFORMANCE WEBCAST QUESTIONS Q21: Is it common to see a small amount of traffic bound for blocked URLs on our outside sensors? Is this part of the handshake process before the block is implemented? Q22: Good morning. Regarding the licensed client IP... Is there a way for us to identify the "soft" limit on the ProxySG's GUI or CLI? Q23: Is there a way to monitor the number of CWs in use? Q24: What is the cost of running Trace layers (80 and 443) in the VPM? Q25: What might it indicate if the memory utilization is significantly higher than the cpu utilization on average? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 58 PROXYSG PERFORMANCE WEBCAST QUESTIONS Q26: For bandwidth performance issues. Is there a way to see who is downloading what in real-time? Q27: If the network throughput is above the recommended threshold by bluecoat but CPU is still normal, will this cause any issue on performance? Q28: From a performance standpoint. What are the recommendations around attack detection and delete on abandonment? Blue Coat Confidential Copyright © 2014 Blue Coat Systems Inc. All Rights Reserved. 59