Table of Contents
1 Introduction......................................................................................................................9
Overview.................................................................................................................................................9
2 Virus Throttle.................................................................................................................17
How Virus Throttle works....................................................................................................................17
Installing Virus Throttle........................................................................................................................17
Using Virus Throttle.............................................................................................................................18
Command line syntax......................................................................................................................27
Command line arguments...............................................................................................................27
Return codes....................................................................................................................................28
Command line examples.................................................................................................................28
Advanced team types............................................................................................................................31
Advanced redundancy types................................................................................................................35
Configuring VLAN IDs...................................................................................................................39
5 IGMP support...............................................................................................................47
6 Troubleshooting............................................................................................................49
Using Virus Throttle.............................................................................................................................49
Table of Contents
3