We recently added an easy-to-use implementation of DNSSEC in our UI. The currently deployed version in our UI makes it nearly impossible to misconfigure. Every time you make a change, it is queued for review by one of our NOC engineers to ensure that the requested actions will not impact any existing chain of trust. […]
Total Uptime’s Web Application and API Protection (WAAP) is an extremely powerful tool to protect web applications at the edge of the Internet as opposed to right inside your datacenter. The WAF shields your network and applications from the ever increasing number of application-layer attacks and can also aid with compliance, like PCI, by helping […]
The Total Uptime Cloud Platform supports a variety of different protocols for use with the Cloud Load Balancer, Web Application Firewall and other networking solutions. These protocols were created to support additional features and functionality, usually at Layer 7, way beyond the standard TCP and UDP protocols also offered. Before you add a port/protocol combination, […]
Yes, we sure do. We have a REST-style API specifically for this purpose. You can find more information here.
The device “weight” select menu shown at the far right of your server or device within a Server Group allows you to adjust how traffic is distributed by the load balancer when you have two or more devices in a configuration. In essence, the higher the number, the heavier the weight, and the more traffic […]
Total Uptime now supports Single Sign-On (SSO) with Okta®. With SSO you can allow users to access the Total Uptime management panel using third-party accounts created with the Okta SSO IDP. In order to begin using this functionality, some basic configuration is required. This document outlines the steps required for implementation. In order or proceed […]
What is it? And how can you implement it? SHORTCUT: If you just want to get to the part about configuring GSLB in the Total Uptime panel, skip to it here! Global Server Load Balancing (GSLB) or GEO Load Balancing is in hot demand, perhaps now more than ever before. Placing content as close as […]
If you are goal-oriented, you know how important it is to measure success. For network professionals, the goal is usually 99.999% availability (well, 100% in our world). But despite all the counsel we’ve heard about focusing on the positive, sometimes we need to take a closer look at what negative things may affect us. For […]
Method: PUT URI: ALF/Firewall/AccessControl/{IPType}/{ACLID} This method will modify an existing Access Control Group Entry (allow/deny rule) within the specified Access Control Group ID specified. The {IPType} is either “IPv4” or “IPv6” The {ACLID} is the ID of the group […]
Method: POST URI: ALF/Firewall/AccessControl/{IPType}/{ACLID} This method will create a new Access Control Group Entry (allow/deny rule) within the specified Access Control Group ID specified. The {IPType} is either “IPv4” or “IPv6” The {ACLID} is the ID of the group […]