Solved

Kemp Load Balancing -  Reencrypted and Offload

Posted on 2014-12-20
4
257 Views
Last Modified: 2014-12-26
when we configure Kemp with exchange 2013 with template, there are Reencrypted  and Offload.

what is different between Reencrypted and Offload.

Regards
chinthaka
0
Comment
Question by:ucguy
  • 2
4 Comments
 
LVL 31

Expert Comment

by:Gareth Gudger
ID: 40510798
0
 
LVL 63

Accepted Solution

by:
Simon Butler (Sembee) earned 500 total points
ID: 40511169
Short answer
Offload means only the connection between the client and the Kemp is encrypted.
Re-encrypted means that the connection between the Kemp and the Exchange server is also encrypted.
 
Basically offload means taking the encryption overhead away from Exchange. In a large environment that can make a significant difference to performance, particularly when all connections use SSL.

If the Kemp was located in a data centre or separate to the Exchange server for some reason, then you may want to re-encrypt the traffic. Same LAN, probably not necessary. Depends on the kind of data you are moving about.

Simon.
0
 

Author Comment

by:ucguy
ID: 40511543
hi thanks simon,

may i know when we config ESP on KEMP with Subvs, should config it on Parent virtual Service as well ?

regards
CHinthaka
0
 
LVL 63

Expert Comment

by:Simon Butler (Sembee)
ID: 40515711
No idea. I haven't deployed a Kemp in over 18 months. I only deploy JetNexus now.

Simon.
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
The viewer will learn how to create two correlated normally distributed random variables in Excel, use a normal distribution to simulate the return on different levels of investment in each of the two funds over a period of ten years, and, create a …
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question