D-Link DFL-260E User Manual page 469

Network security firewall netdefendos version 2.27.03
Hide thumbs Also See for DFL-260E:
Table of Contents

Advertisement

10.1.10. More Pipe Examples
Rule
Name
voip
citrix
other
These rules are processed from top to bottom and force different kinds of traffic into precedences
based on the Service. Customized service objects may need to be first created in order to identify
particular types of traffic. The all service at the end, catches anything that falls through from earlier
rules since it is important that no traffic bypasses the pipe rule set otherwise using pipes will not
work.
Pipe Chaining
Suppose the requirement now is to limit the precedence 2 capacity (other traffic) to 1000 kbps so
that it does not spill over into precedence 0. This is done with pipe chaining where we create new
pipes called in-other and out-other both with a Pipe Limit of 1000. The other pipe rule is then
modified to use these:
Rule
Name
other
Note that in-other and out-other are first in the pipe chain in both directions. This is because we
want to limit the traffic immediately, before it enters the in-pipe and out-pipe and competes with
VoIP, Citrix and Web-surfing traffic.
A VPN Scenario
In the cases discussed so far, all traffic shaping is occurring inside a single NetDefend Firewall.
VPN is typically used for communication between a headquarters and branch offices in which case
pipes can control traffic flow in both directions. With VPN it is the tunnel which is the source and
destination interface for the pipe rules.
An important consideration which has been discussed previously, is allowance in the Pipe Total
values for the overhead used by VPN protocols. As a rule of thumb, a pipe total of 1700 bps is
reasonable for a VPN tunnel where the underlying physical connection capacity is 2 Mbps.
It is also important to remember to insert into the pipe all non-VPN traffic using the same physical
link.
The pipe chaining can be used as a solution to the problem of VPN overhead. A limit which allows
for this overhead is placed on the VPN tunnel traffic and non-VPN traffic is inserted into a pipe that
matches the speed of the physical link.
To do this we first create separate pipes for the outgoing traffic and the incoming traffic. VoIP
traffic will be sent over a VPN tunnel that will have a high priority. All other traffic will be sent at
the best effort priority (see above for an explanation of this term). Again, we will assume a 2/2
Mbps symmetric link.
The pipes required will be:
vpn-in
Priority 6: VoIP 500 kpbs
Priority 0: Best effort
Forward
Return
Source
Pipes
Pipes
Interface
out-pipe
in-pipe
out-pipe
in-pipe
out-pipe
in-pipe
Forward
Return
Source
Pipes
Pipes
Interface
out-other
in-other
out-pipe
in-pipe
Source
Dest
Network
Interface
lan
lannet
wan
lan
lannet
wan
lan
lannet
wan
Source
Dest
Network
Interface
lan
lannet
wan
469
Chapter 10. Traffic Management
Dest
Selected
Network
Service
all-nets
H323
all-nets
citrix
all-nets
All
Dest
Selected
Network
Service
all-nets
All
Prece
dence
6
4
2
Prece
dence
2

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents