Kemp Technologies LoadMaster 5300 review

Kemp’s flagship load balancing appliance comes with beefed up Intel Xeon processors, 8GB of RAM and 10-Gigabit support. It's also unmatched when it comes to value for money.

Load balancing schedules

The web interface is the same as previous editions and could do with some graphical refreshment as it's looking dated. Even so, it is simple to use and provides easy access to each feature.

For testing, we fired up a Dell PowerEdge R515 rack server running Windows Server 2008 R2 and the Hyper-V role. We created multiple Server 2008 R2 VMs all running IIS web services.

To create virtual servers, you provide an IP address, port number and protocol and then you can add physical servers to your farm. Kemp now offers eight load balancing, or scheduling schemes with it defaulting to round robin mode which distributes client requests to each server in strict rotation.

Weighted round robin allows priorities to be assigned to each server in the farm to ensure better specified servers get the lion's share of the work. Servers with the least number of connections can be prioritised and you can apply weighting to control which are used the most.

Weighted response time dynamically adjusts weights for each server based on their response times and the new source IP hash schedule ensures the same real server is always used for a specific client. Load balancing can be adapted to server performance using a local agent on each physical server. This presents a web page with a numerical value between 1 and 100 to a LoadMaster query that defines how busy the server is.

Kemp Technologies - Performance

Statistics screens keep you posted on throughput and load balancing performance for the virtual and real servers

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
iPhone 12 lineup official with A14 Bionic chip and 5G support
Mobile Phones

iPhone 12 lineup official with A14 Bionic chip and 5G support

13 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020