Exit Print View

Oracle Secure Global Desktop Gateway Administration Guide for Version 4.6

Document Information

Preface

1.  Installing the SGD Gateway

2.  Configuring the SGD Gateway

A.  SGD Gateway Architecture Overview

B.  Command-Line Reference

C.  Advanced Configuration

Tuning the SGD Gateway

Changing the Maximum Number of AIP Connections

Calculating the Number of AIP Connections

Changing the Maximum Number of HTTP Connections

Changing the JVM Memory Size

Calculating the JVM Memory Size

Configuring HTTP Redirection

Changing the Binding Port for the SGD Gateway

Using Unencrypted Connections to the SGD Array

Using External SSL Accelerators

How to Enable External SSL Accelerator Support

Using Client Certificates With the SGD Gateway

How to Configure the SGD Gateway to Use Client Certificates

Enabling the Balancer Manager Application

The Reflection Service

Enabling the Reflection Service

How to Enable Unauthorized Access to the Reflection Service

How to Enable Authorized Access to the Reflection Service

Using the Reflection Service

About the RESTful Web Services

Examples of Using the Reflection Service

D.  Troubleshooting the SGD Gateway

Using Unencrypted Connections to the SGD Array

By default, connections between the SGD Gateway and the SGD servers in the array are secured using Secure Sockets Layer (SSL). This means that AIP over SSL data uses TCP port 5307, and HTTPS data uses TCP port 443.

To use unencrypted connections between the SGD Gateway and the SGD servers in the array, run the following command:

# gateway config create

When prompted whether to use secure connections to the SGD server, type n.


Note - Ensure that the SGD servers in the array are configured to use standard, unencrypted connections. To do this, run tarantella security stop on each SGD server in the array to turn off SGD security services.


For unencrypted connections, AIP data uses TCP port 3144, and HTTP data uses TCP port 80.