This appendix describes the properties that may be set on GateKeeper, with the exception of “Server's properties for firewall specifications”, which are properties set on the server.
• Options are in bold; gatekeeper.ior
null - no name is defined <a user defined name> gatekeeper.ior - in the current directory of GateKeeper. <Relative pathname> <Full pathname> Enables or disables the location service using GateKeeper. This service is provided for clients such as applets that are not able to communicate with the Smart Agent (OSAgent) to do the bind. If this property is set to false, the client will get a NO_PERMISSION exception during the binding operation through GateKeeper. 900 <an integer value>
ex-iiop, ex-hiop (default) - ex-iiop and ex-hiop Server connection managers in use. It can also be a list of ex-iiop, ex-hiop, ex-ssl, and ex-hiops separated by commas. null - the primary host is used; that is the IP address of the primary Network Interface Card (NIC). <a host address> <empty> - No proxy host. <a fake host address> Network Address Translation (NAT) devices hide the actual IP address and/or port number in the network by changing the IP address and/or in the IP packet. Set this value to the value defined by the NAT. When you have callback enabled and GateKeeper sits behind a NAT, the callback proxy host (vbroker.
gatekeeper.backcompat.callback.proxyHost) should be set to equal this property. This is used when GateKeeper sits behind a NAT. You can also set this property using the VisiBroker Console. The ex-hiop server connection manager is responsible for servicing HTTP requests on the exterior server engine. Both the listener and dispatcher properties are configured using the property with the vbroker.se.exterior.scm.ex-hiop prefix.The following vbroker.se.exterior.scm.ex-hiop properties specify the behavior of the ex-hiop listener. The ex-hiop listener is an HIOP listener. The default port is 8088. The threading policy is set to ThreadSession.All the properties related to an SCM are defined with the following prefix: vbroker.se.<server engine name>.scm.<server connection manager name>.
8088
<a port number> The proxyPort property is often used in conjunction with the server engine proxyHost property to mask the target port for this listener. If this property is set, the GateKeeper IOR file will contain the proxyPort value in the endpoint information for this listener. It is then the responsibility of the external NAT device to map the proxyPort to the listener's true port. The default is <empty> indicating the feature is disabled (the listener port will not be masked). 0 - incoming connections are unlimited
<an integer value> 0
<an integer value> The ex-iiop server connection manager is responsible for servicing IIOP requests on the exterior sever engine. The listener and dispatcher properties can be configured using properties with the vbroker.se.exterior.scm.ex-iiop prefix. The following vbroker.se.exterior.scm.ex-iiop properties specify the behavior of the ex-iiop listener. The ex-iiop listener is an IIOP listener.
Sets as a default listener port for GateKeeper's client-side IIOP listener. Port 683 is the recommended setting for a deployed application since it is an OMG standard for IIOP and is registered with IANA.
UNIX: On a UNIX platform, the default listener port number is in the range of 0 to 1024 which is reserved for privileged use. When running as a non-privileged user, the listener port can be set to a value greater than 1024 if desired. <empty> - The proxy port feature is disabled.
This indicates the feature is disabled (the listener port will not be masked).
<a fake port number> 0 - incoming connections are unlimited
<an integer value> The ex-hiops server connection manager is responsible for servicing HTTPS requests on the exterior server engine. Both the listener and dispatcher properties are configured using the property with the vbroker.se.exterior.scm.ex-hiops prefix.The following vbroker.se.exterior.scm.ex-hiops properties specify the behavior of the ex-hiops listener. The ex-hiops listener is an HIOPS listener. The default port is 8089. The threading policy must always be ThreadSession.
<empty>
<a fake port number> The proxyPort property is often used in conjunction with the server engine proxyHost property to mask the target port for this listener. If this property is set, the GateKeeper IOR file will contain the proxyPort value in the end point information for this listener. It is then the responsibility of the external NAT device to map the proxyPort to the listener's true port. The default is <empty> indicating the feature is Disabled (the listener port will not be masked). 0 - the cached connections are unlimited
<an integer value> 0
<an integer value> The ex-ssl server connection manager is responsible for servicing SSL requests on the exterior sever engine. The listener and dispatcher properties can be configured using properties with the vbroker.se.exterior.scm.ex-ssl prefix.The following vbroker.se.exterior.scm.ex-ssl properties specify the behavior of the ex-ssl listener. The ex-ssl listener is an ssl listener.
UNIX: On a UNIX platform, the default listener port number is in the range 0 to 1024 which is reserved for privileged use. When running as a non-privileged user, the listener port can be set to a value greater than 1024 if desired. <empty> - The proxy port feature is disabled. This indicates the features is disabled (the listener port will not be masked).
<a fake port number> 0 - cached connections are unlimited.
<an integer value> 0
<an integer value>
Null - the primary host is used; that is the IP address of the primary Network Interface Card (NIC).
<a host address> <empty> - The proxy port feature is disabled.
<a fake host address> The in-iiop server manager is responsible for servicing IIOP requests on the interior server engine. The listener and dispatcher can be configured using properties with the vbroker.se.interior.scm.in-iiop prefix.The following vbroker.se.interior.scm.in-iiop properties specify the behavior of the in-iiop server connection manager.
0 - pick a random number
<a port number> <empty> - The proxy port feature is disabled.
<a fake port number> 0 - cached connections are unlimited.
<an integer value> The vbroker.se.interior.scm.in-ssl properties listed below specify the behavior of the in-ssl server connection manager.
0 - pick a random number
<a port number> <empty> - The proxy port feature is disabled.
<a fake port number> Specifies the listener type for the in-ssl scm. 0 - incoming connections are unlimited.
<an integer value> Java: The following table lists the administration properties. Note that the default listener port number is 9091.
null - use host address from the system.
<Host address> <empty> - use host address from the system.
<Proxy host address> iiop_tp, hiop_ts <empty>
<a port number> <empty>
<a port number> 9091
<a port number> <empty> - The proxy port feature is disabled
<a fake port number>
null (default) - no default actiondeny - refused entrygrant - permission granted null - no actions specified. See description for additional options. Defines the action for the specific properties for the given rule. The definition is as follows (variables in bold are user-definable):<deny | grant>
[operation=”<operation name>”
[signer by=”<signer's company name>”]
[server host=”<hostname>”]
[client host=”<hostname>”]
[server ip=aa.bb.cc.dd | <sub-mask>]
[client ip=aa.bb.cc.dd | <sub-mask>]
[object type=”<object type>”] ]
<deny | grant> defines the action related to the individual rule. vbroker.gatekeeper.security.accessControllers=default
vbroker.gatekeeper.security.acl.default.rules=rule1,rule2,rule3
vbroker.gatekeeper.security.acl.default.rule1=grant
[operation=\”*”\
[server host=\”borland”\]]
vbroker.gatekeeper.security.acl.default.rule2=deny
[operation=\”*”\
[client ip=192.168.100.40 | 255.255.255.0]]
vbroker.gatekeeper.security.acl.default.rule3=deny
[operation=\”*”\
[server host=\”inprise”\]
[client ip=192.168.100.88 | 255.255.255.0]] Specifies the implementation class to be loaded by GateKeeper for Access Control. Note: User should not change this value. null - no rules specified. See description. where rule1, rule2, rule3 are names defined by the user.
<empty> - the value is set to the primary host IP address and that is the IP address of the primary NIC.
<a host address> This property is often used in conjunction with the server engine proxyPort property to mask the target port for this listener. If this property is set, the callback IOR will contain the proxyHost value in the end point information for this listener. It is then the responsibility of the Network Address Translation (NAT) device to map the proxyHost to the listener's true port. The default is <empty> indicating that the feature is disabled (the listener port will not be masked in the callback IOR). 0-a port picked at random
<port number> 0 - a port number is picked at random.
<a port number> <empty> - no proxy port is used.
<a fake port number> The proxyPort property is often used in conjunction with the server engine proxyHost property to mask the target port for this listener. If this property is set, the callback IOR will contain the proxyPort value in the end point information for this listener. It is then the responsibility of the Network Address Translation (NAT) device to map the proxyPort to the listener's true port. The default is <empty> indicating that the feature is disabled (the listener port will not be masked in the callback IOR).The following table lists the properties that support bidirectional communications. These properties are evaluated only once, when the SCMs are created. In all cases, the exportBiDir and importBiDir properties on the SCMs are given priority over the enableBiDir property. In other words, if both properties are set to conflicting values, the SCM-specific properties will take effect. This allows you to set the enableBiDir property globally, and more importantly, turn off bidirectionality in individual SCMs.
You can selectively make bidirectional connections. If the client defines vbroker.orb.enableBiDir=client, and the server defines vbroker.orb.enableBiDir=server, the value of vbroker.orb.enableBiDir in GateKeeper determines the state of the connection.Note: Just as you can selectively enable bidirectional communication on a per-SCM basis, you can also selectively enable bidirectional communication on GateKeeper. For example, if you set the vbroker.se.exterior.scm.ex--iiop.manager.importBiDir property to true, GateKeeper will accept bidirectional connections from the client. Setting the vbroker.se.exterior.scm.ex--iiop.manager.
exportBiDir property to true causes GateKeeper to request bidirectional connections with the server.The vbroker.gatekeeper.enablePassthru property is the only property that supports pass-through connections.
16384
<an integer value> 300000 milliseconds (5 minutes)
<an integer value> 1024
<a port number> Used together with vbroker.gatekeeper.
passthru.inPortMax. It specifies the start of a range of interior port for pass-through incoming connections. 65535
<a port number> Used together with vbroker.gatekeeper.
passthru.inPortMin. It specifies the end of a range of ports for pass-through in-coming connections. 0 - no logging
<an integer value> 0
<a port number> Used together with vbroker.gatekeeper.
passthru.outPortMax. It specifies the start of a range of exterior port for pass-through outgoing connections. 65535
<a port number> Used together with vbroker.gatekeeper.
passthru.outPortMin. It specifies the end of a range of exterior port for pass-through outgoing connections. 2000
<an integer value> If you set this property then you load the appropriate library. See the description of vbroker.orb.dynamicLibs in Miscellaneous ORB properties.
Refer to the VisiBroker Security Guide for more details. Refer to the VisiBroker Security Guide for more details. Refer to the VisiBroker Security Guide for more details. Refer to the VisiBroker Security Guide for more details.See Using the Smart Agent in either the VisiBroker for Java Developer's Guide or the VisiBroker for C++ Developer's Guide for more details of these properties.
null - see description. Specifies the IP address or host name of the host running the Smart Agent (OSAgent). The default value, null, installs VisiBroker applications to use the value from the OSAGENT_ADDR environment variable. If the OSAGENT_ADDR variable is not set, it is assumed that the Smart Agent is running on the local host or will be located by a broadcast message. When set to true, allows a VisiBroker application to failover to another Smart Agent. When set to true, allows VisiBroker applications to cache object references. Setting this property to true improves performance when locating servers, but disables Smart Agent round-robin activity.
Specifies whether GateKeeper is compatible with older VisiBroker versions. Setting the property to false makes GateKeeper compatible with programs developed with VisiBroker 4.5.x onwards. Setting this property to true makes GateKeeper compatible with versions earlier than VisiBroker 4.5.x as well. (See “Appendix GateKeeper deployment scenarios” for more information.)Note: This value is set to true by default in GateKeeper. This value, however, is false by default on the client and server.These properties should only be set in the property file for the server. If you set any of these properties then you load the appropriate library. See the description of vbroker.orb.dynamicLibs (for Java) and vbroker.orb.enableFirewall (for C++) in Miscellaneous ORB properties.The following properties specify the communication paths from the client to the server. See “Specifying communication paths to the server” for examples of its usage.
<empty>
<List of paths> <empty>
<List of components> Specifies the list of components in the firewall path <pathname>. For example, vbroker.
firewall-path.x=a,b vbroker.firewall-path.y=c <empty>
PROXY TCP Specifies the type of the components. For example: vbroker.firewall.a.type = PROXY vbroker.firewall.b.type = TCP Specifies the ior of the component. This is specified together with vbroker.firewall.<component>.type=
PROXY. <empty>
<fake host name> Specifying fake host of the server. This is specified together with vbroker.firewall.<component>.types=TCP and the component is a TCP Firewall with NAT. <empty>
<fake IIOP Port> Specifies a fake IIOP port for the server. This is specified together with vbroker.firewall.<component>.type=TCP and the component is a TCP Firewall with NAT. <empty>
<fake SSL Port> Specifies a fake SSL port for the server. This is specified together with vbroker.firewall.<component>.type=TCP and the component is a TCP Firewall with NAT. <empty>
<fake HIOP Port> Specifies a fake HIOP port for the server. This is specified together with vbroker.firewall.<component>.type=TCP and the component is a TCP Firewall with NAT.
<empty>
<ior filename> Specifies whether the client must always connect to the server via GateKeeper. This property can be set in the client or GateKeeper. If set to true in the client, the client will always connect to the server via GateKeeper. If set to true in GateKeeper, it will connect to the server via another GateKeeper. <empty>
<ior filename> Note: GateKeeper provides limited location services. It cannot forward location requests to another GateKeeper. This is in contrast to the Smart Agent which is able to forward requests to another available Smart Agent. Specifies whether the client must always make HTTP tunnel (IIOP wrapper) connections to the server. When set to true, specifies that the client always make connections to the server using HTTP tunnel (IIOP wrapper). This property can be set in the client or GateKeeper. <empty>
<a list of libraries> If the firewall component is specified, you must set this property in the properties of the Java client and Java server to: Setting this property to true at the C++ client and C++ server loads the required firewall library to enable the firewall feature with Gatekeeper. If this property is set to true, and if the IOR has both IIOP and TCP type firewall components, then if any one of the end points fails, fail-over can occur.Setting vbroker.orb.alwaysProxy=true or a programmatically configured firewall proxy takes precedence.