A P P E N D I X  E

SSL Statistics

This appendix lists and describes the key SSL statistics. The following topics are addressed:


Persistence of Statistics Counters

The statistics counter on the SSL proxy blade system are persistent. Thus, the statistics counters are not cleared on power-off or reboot. All statistics are accumulated since the last statistics reset. The reset stats command resets all statistics counters to zero.

Persistent statistics have better diagnostics value and provide better tracking and auditing because valuable information is not lost with power-off or reboot. To fully update counters on power-down, use the shutdown command. However, the counters are also updated every time the config save command is used.


Statistics Counters Important to SSL Proxy Blade

Performance

The SSL proxy blade exhibits very high performance in SSL handshakes per second, number of concurrent connections, and encrypted data throughput. To provide the best value, the SSL proxy blade comes in various models that exhibit different performance. These models can be upgraded by means of software. Thus, SSL proxy blade statistics counters include measures of the above performance figures. This is useful, both to display the value provided by the SSL proxy blade, and to determine when to upgrade to a higher performance model. Some counters are provided both as an average and as a maximum value reached, to facilitate decisions about model capacity required in installations with variable load. Variable loads can occur during the day, as a result of promotions, or seasonally.

SSL Connection vs. SSL Session

An SSL connection is the same as an TCP connection that uses SSL. An SSL session can include many connections if the SSL session ID is reused. When this happens, it is said that the SSL session was resumed. For example, the counter for concurrent SSL connections refers to the SSL connection and session concepts.

Session ID Reuse

Some statistics are associated with SSL session ID reuse. SSL can reuse an SSL session ID that was negotiated through a previous full handshake. When a session ID is reused, the handshake can be processed more quickly. Reuse of sessions ID is commonly used by the browser to retrieve objects on a given web page. Reuse is typically not extended to other pages because to much reuse can weaken the security associated with encryption.

To support reuse, the reuse IDs must be cached in the Reuse ID Cache. a cache miss is a rejection of a session that was not found in the cache. Rejections can also occur when the cache is full. In some types of traffic, reuse rejections can occur; for example, if more than 32,000 sessions are pending reuse. In most cases, reuse rejections due to cache full are not an indication of a problem, because those sessions are negotiated as new, which actually increases the security. The SSL proxy blade can process a new session almost as fast as a reuse session, unlike most other implementations of SSL acceleration.


Variable Descriptions

Up Time

Transactions Per Second (TPS)

Concurrent Connections

Throughput

SSL Handshakes

SSL Handshakes With Reused Session IDs

Statistics display: SSL requests/ Reuse 2,500,000

Description:

Number of SSL Handshake requests with a reused ID, accumulated since last statistics reset. This counter includes only reused handshakes. Reuse SSL handshakes completed, and also those not completed, are counted.

Number of Dropped Reuse ID Requests (Persistent)