The request slammed in: Kerberos had to authenticate thousands of users behind a wall of traffic. The external load balancer stood between trust and chaos. One wrong packet and the whole flow collapsed.
Kerberos External Load Balancer design starts with the handshake. A ticket-granting ticket is issued by the Key Distribution Center (KDC). The load balancer—whether hardware or software—must keep that transaction intact. If the balancer rewrites source addresses or drops TCP sessions midstream, tickets fail and clients hit dead ends.
High-availability is non-negotiable. Place multiple KDCs behind the balancer. Use layer 4 routing for simplicity, or layer 7 inspection if policy demands. Avoid cookie-based affinity; Kerberos does not need it. Stick to IP hash or direct source mapping to keep tickets tied to the right KDC.
TLS offload changes nothing for Kerberos unless you bundle it with SPNEGO in HTTP. But if you do, the balancer’s SSL termination must preserve the GSSAPI flow end-to-end. Any break in the negotiation means failed windows logons, broken SSH tunnels, or expired service tickets.