D-Link NetDefend DFL-210 User Manual page 8

Network security firewall ver 2.26.01
Hide thumbs Also See for NetDefend DFL-210:
Table of Contents

Advertisement

10.1.3. Simple Bandwidth Limiting ....................................................... 405
10.1.4. Limiting Bandwidth in Both Directions ........................................ 406
10.1.5. Creating Differentiated Limits with Chains ................................... 407
10.1.6. Precedences ............................................................................ 408
10.1.7. Guarantees .............................................................................. 410
10.1.8. Differentiated Guarantees .......................................................... 410
10.1.9. Groups ................................................................................... 411
10.1.10. Traffic Shaping Recommendations ............................................ 412
10.1.11. A Summary of Traffic Shaping ................................................. 414
10.1.12. More Pipe Examples ............................................................... 414
10.2. IDP Traffic Shaping ............................................................................ 419
10.2.1. Overview ................................................................................ 419
10.2.2. Setup ..................................................................................... 419
10.2.3. Processing Flow ....................................................................... 420
10.2.4. The Importance of Specifying a Network ...................................... 420
10.2.5. A P2P Scenario ........................................................................ 421
10.2.6. Viewing Traffic Shaping Objects ................................................ 421
10.2.7. Guaranteeing Instead of Limiting Bandwidth ................................. 422
10.2.8. Logging ................................................................................. 423
10.3. Threshold Rules ................................................................................. 424
10.3.1. Overview ................................................................................ 424
10.3.3. Grouping ................................................................................ 424
10.3.4. Rule Actions ........................................................................... 425
10.3.5. Multiple Triggered Actions ........................................................ 425
10.3.6. Exempted Connections .............................................................. 425
10.3.7. Threshold Rules and ZoneDefense .............................................. 425
10.3.8. Threshold Rule Blacklisting ....................................................... 425
10.4. Server Load Balancing ........................................................................ 426
10.4.1. Overview ................................................................................ 426
10.4.2. Identifying the Servers .............................................................. 427
10.4.3. The Load Distribution Mode ...................................................... 427
10.4.4. The Distribution Algorithm ........................................................ 428
10.4.5. Server Health Monitoring .......................................................... 430
10.4.6. SLB_SAT Rules ....................................................................... 430
11. High Availability .......................................................................................... 434
11.1. Overview .......................................................................................... 434
11.2. HA Mechanisms ................................................................................. 436
11.3. HA Setup .......................................................................................... 439
11.3.1. HA Hardware Setup ................................................................. 439
11.3.2. NetDefendOS Manual HA Setup ................................................. 440
11.3.3. Verifying the Cluster Functions .................................................. 441
11.3.4. Unique Shared Mac Addresses ................................................... 442
11.4. HA Issues ......................................................................................... 443
11.5. HA Advanced Settings ........................................................................ 444
12. ZoneDefense ................................................................................................ 446
12.1. Overview .......................................................................................... 446
12.2. ZoneDefense Switches ......................................................................... 447
12.3. ZoneDefense Operation ....................................................................... 448
12.3.1. SNMP .................................................................................... 448
12.3.2. Threshold Rules ....................................................................... 448
12.3.3. Manual Blocking and Exclude Lists ............................................. 448
12.3.4. ZoneDefense with Anti-Virus Scanning ........................................ 450
12.3.5. Limitations ............................................................................. 450
13. Advanced Settings ......................................................................................... 453
13.1. IP Level Settings ................................................................................ 453
13.2. TCP Level Settings ............................................................................. 457
13.3. ICMP Level Settings ........................................................................... 462
13.4. State Settings ..................................................................................... 463
13.5. Connection Timeout Settings ................................................................ 465
13.6. Length Limit Settings .......................................................................... 467
13.7. Fragmentation Settings ........................................................................ 469
13.8. Local Fragment Reassembly Settings ..................................................... 473
8
User Manual

Advertisement

Table of Contents
loading

Table of Contents