For illustration purposes, the client network will be numbered as N0. The network adjacent to the client network will be numbered as N
1, the next adjacent network as N
2 and so on until the server network. The server network will be numbered as N
n in the following discussions. Replace n with the actual number depending to the network configuration. Also, the internetworking device between network N
n-1 and N
n is numbered as GW
n.
Clients can use different transport types to communicate with servers. Examples of transport types are IIOP, IIOP/SSL, HTTP and HTTPS. For each valid transport type, locate the furthest network that the client message can reach. The client located in network N0 sends a message to network N
0. GW
1 may or may not forward the message to network N
1. The message can reach network N
1 if GW
1 can forward the message from N
0 to N
1. Subsequently, GW
2 may or may not forward the message to network N
2. Traverse the networks starting from the client network, then moving towards the server network. Mark the last network that the message can reach as N
c. In other words, GW
c+1 cannot forward the message to the network N
c+1.
If callback for VisiBroker 3.x style is required, an additional condition is required for Nc and N
s. The callback message from the server (from network N
n) must be able to reach the network N
s. When GateKeeper is used, the client must be able to set up a callback communication channel to network N
c.
If the client cannot send messages using transport type L, deploy GateKeeper on a network within N0 and N
c to proxy client messages of other transport types (M) to transport type L. For example, the server listens to IIOP and the client can only communicate using IIOP over HTTP.
If the server does not listen to the client's message transport type, GateKeeper is required in any network within Ns and N
n. GateKeeper acts as a proxy to relay client messages of type M to one of the server listener types (L). For example, M (client message transport type) is IIOP over HTTP and L (server listener type) is IIOP.
When c >= s, the client transport type (M) and the server listener type (L) must be different. Deploy GateKeeper in any network between Ns and N
c inclusive. In this case, GateKeeper acts as a proxy to relay client messages of type M to the server listener port of type L. As an example, the client's IIOP over HTTP messages can reach the networks up to N
c. IIOP messages sent from any network between N
s and N
n can reach the server. Deploying GateKeeper in between N
s and N
c will help bind the client's IIOP over HTTP messages to the server's IIOP listener port.
Check if GateKeeper chaining is possible or not. See “Chaining of GateKeepers” for details of GateKeeper chaining. GateKeeper chaining is possible only when there is another transport type (K) available for the two GateKeepers to communicate successfully from N
c to N
s. Deploy one GateKeeper on network (N
c) and another GateKeeper on network N
s. After which, chain them together. For example, client sends IIOP over HTTP messages, the server listens to IIOP messages and both GateKeeper instances can use SSL to communicate with each other. The client connects to GateKeeper 1 using HTTP, GateKeeper 1 communicates with GateKeeper 2 using SSL, and GateKeeper 2 communicates with the server using IIOP.
If chaining is not possible, there is no suitable network to deploy GateKeeper. The internetworking devices connecting networks Nc and N
s must be reconfigured so that the appropriate type of messages can be forwarded from N
c to N
s. After which, locate the new N
c and N
s, and refer to the previous cases accordingly.
See “Configuring server properties” for details on how to configure server objects to use TCP firewall with NAT. Be sure that the NAT translation mappings are added into the NAT device for successful communication between client and server objects.
After setting the above properties, GateKeeper activates its interior server engine to receive callback messages from the server. The listener can be configured using the in-iiop and
in-ssl SCMs. In addition, a callback listener is activated for a client to establish an additional communication channel for callback messages. See
“VisiBroker 3.x style callback” for details on specifying the listener port and additional related information. Be sure the selected ports are reachable from the client and the server by ensuring that these ports are not blocked by any firewalls.
If the client requests a pass-through connection, GateKeeper will not examine any messages that pass between the server and client. When the above property is set to false, GateKeeper binds the client to the server using normal (non-pass-through) connections even when the client requests a pass-through connection. In this case, GateKeeper examines the exchanged messages for routing and binding purposes.
See “Support for pass-through connections” for more information about the above properties.
See “Using the Smart Agent” in the VisiBroker Developer's Guide for more details about Smart Agent settings and other methods of setting Smart Agent parameters.
See Using the Object Activation Daemon in the
VisiBroker Developer's Guide for more information about OAD.
However, without transport identity clients configured with peerAuthenticationMode require and
require_and_trust will not connect. Additionally, as an SSL server, if GateKeeper itself does not have a client transport identity, it may not require client transport identities.
Use the peerAuthenticationMode policy as usual. Set the property as follows:
A Java webstart application can run without a web browser because it has its own launcher, which can be launched directly from a command shell on UNIX or by double-clicking on Windows. This launcher is the default mime handler for application/x-java-jnlp-file which is associated automatically when installing JDK/JRE on Windows and by any other means on UNIX. Therefore, clicking a link on a web page that results in any http response with that mime will launch the installed Java webstart launcher for processing the content of that reply. The content is actually an XML containing information about where to locate the required jars and other information pertaining to running the application. For example, the required java security permissions.