D-Link NetDefendOS User Manual page 9

Network security firewall
Hide thumbs Also See for NetDefendOS:
Table of Contents

Advertisement

9.5. PPTP/L2TP .......................................................................................... 729
9.5.1. PPTP Servers ............................................................................. 729
9.5.2. L2TP Servers ............................................................................. 730
9.5.3. L2TP/PPTP Server Advanced Settings ............................................ 736
9.5.4. PPTP/L2TP Clients ...................................................................... 737
9.5.5. The l2tp and pptp Commands ..................................................... 739
9.6. L2TP Version 3 ..................................................................................... 741
9.6.1. L2TPv3 Server ........................................................................... 741
9.6.2. L2TPv3 Client ............................................................................ 748
9.7. SSL VPN .............................................................................................. 752
9.7.1. Overview .................................................................................. 752
9.7.2. Configuring SSL VPN in NetDefendOS ........................................... 753
9.7.3. Installing the SSL VPN Client ........................................................ 755
9.7.4. SSL VPN Setup Example .............................................................. 759
9.8. VPN Troubleshooting ............................................................................ 762
9.8.1. General Troubleshooting ............................................................ 762
9.8.2. Troubleshooting Certificates ....................................................... 763
9.8.3. The ike -stat Command ............................................................... 763
9.8.4. The ike -snoop Command ............................................................ 764
9.8.5. Management Interface Failure with VPN ........................................ 771
9.8.6. Specific Error Messages ............................................................... 771
9.8.7. Specific Symptoms ..................................................................... 774
10. Traffic Management ...................................................................................... 776
10.1. Traffic Shaping ................................................................................... 776
10.1.1. Overview ................................................................................ 776
10.1.2. Traffic Shaping in NetDefendOS ................................................. 777
10.1.3. Simple Bandwidth Limiting ....................................................... 780
10.1.4. Limiting Bandwidth in Both Directions ........................................ 781
10.1.5. Creating Differentiated Limits Using Chains ................................. 783
10.1.6. Precedences ............................................................................ 784
10.1.7. Pipe Groups ............................................................................ 788
10.1.8. Traffic Shaping Recommendations ............................................. 791
10.1.9. A Summary of Traffic Shaping .................................................... 793
10.1.10. More Pipe Examples ............................................................... 793
10.2. IDP Traffic Shaping ............................................................................. 798
10.2.1. Overview ................................................................................ 798
10.2.2. Setting Up IDP Traffic Shaping ................................................... 798
10.2.3. Processing Flow ....................................................................... 799
10.2.4. The Importance of Specifying a Network ...................................... 799
10.2.5. A P2P Scenario ......................................................................... 800
10.2.6. Viewing Traffic Shaping Objects ................................................. 801
10.2.7. Guaranteeing Instead of Limiting Bandwidth ................................ 802
10.2.8. Logging .................................................................................. 802
10.3. Threshold Rules .................................................................................. 803
10.4. Server Load Balancing ......................................................................... 807
10.4.1. Overview ................................................................................ 807
10.4.2. SLB Distribution Algorithms ....................................................... 809
10.4.3. Selecting Stickiness .................................................................. 809
10.4.4. SLB Algorithms and Stickiness .................................................... 811
10.4.5. Server Health Monitoring .......................................................... 812
10.4.6. Setting Up SLB_SAT Rules .......................................................... 812
10.4.7. SLB Policy ............................................................................... 816
11. High Availability ........................................................................................... 820
11.1. Overview .......................................................................................... 820
11.2. HA Mechanisms ................................................................................. 823
11.3. Setting Up HA .................................................................................... 827
11.3.1. Hardware Setup ....................................................................... 827
11.3.2. Wizard HA Setup ...................................................................... 829
11.3.3. Manual HA Setup ..................................................................... 831
11.3.4. Verifying that the Cluster Functions Correctly ............................... 832
11.3.5. Unique Shared Mac Addresses ................................................... 833
9
User Manual

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents