D-Link DFL-260E User Manual page 8

Network security firewall netdefendos version 2.40.00
Hide thumbs Also See for DFL-260E:
Table of Contents

Advertisement

9.6.1. Overview ................................................................................. 466
9.6.2. Configuring SSL VPN in NetDefendOS ......................................... 467
9.6.3. Installing the SSL VPN Client ...................................................... 469
9.6.4. Setup Example .......................................................................... 472
9.7. CA Server Access ................................................................................ 474
9.8. VPN Troubleshooting ........................................................................... 477
9.8.1. General Troubleshooting ............................................................. 477
9.8.2. Troubleshooting Certificates ........................................................ 478
9.8.3. IPsec Troubleshooting Commands ................................................ 478
9.8.4. Management Interface Failure with VPN ........................................ 479
9.8.5. Specific Error Messages .............................................................. 479
9.8.6. Specific Symptoms .................................................................... 482
10. Traffic Management ...................................................................................... 485
10.1. Traffic Shaping .................................................................................. 485
10.1.1. Overview ................................................................................ 485
10.1.2. Traffic Shaping in NetDefendOS ................................................. 486
10.1.3. Simple Bandwidth Limiting ....................................................... 488
10.1.4. Limiting Bandwidth in Both Directions ........................................ 489
10.1.5. Creating Differentiated Limits Using Chains ................................. 490
10.1.6. Precedences ............................................................................ 492
10.1.7. Pipe Groups ............................................................................ 496
10.1.8. Traffic Shaping Recommendations .............................................. 499
10.1.9. A Summary of Traffic Shaping ................................................... 500
10.1.10. More Pipe Examples ............................................................... 501
10.2. IDP Traffic Shaping ............................................................................ 506
10.2.1. Overview ................................................................................ 506
10.2.2. Setting Up IDP Traffic Shaping .................................................. 506
10.2.3. Processing Flow ....................................................................... 507
10.2.4. The Importance of Specifying a Network ...................................... 507
10.2.5. A P2P Scenario ........................................................................ 508
10.2.6. Viewing Traffic Shaping Objects ................................................ 509
10.2.7. Guaranteeing Instead of Limiting Bandwidth ................................. 510
10.2.8. Logging ................................................................................. 510
10.3. Threshold Rules ................................................................................. 511
10.4. Server Load Balancing ........................................................................ 514
10.4.1. Overview ................................................................................ 514
10.4.2. SLB Distribution Algorithms ...................................................... 515
10.4.3. Selecting Stickiness .................................................................. 516
10.4.4. SLB Algorithms and Stickiness ................................................... 517
10.4.5. Server Health Monitoring .......................................................... 518
10.4.6. Setting Up SLB_SAT Rules ........................................................ 519
11. High Availability .......................................................................................... 523
11.1. Overview .......................................................................................... 523
11.2. HA Mechanisms ................................................................................. 525
11.3. Setting Up HA ................................................................................... 528
11.3.1. HA Hardware Setup ................................................................. 528
11.3.2. NetDefendOS Manual HA Setup ................................................. 529
11.3.3. Verifying the Cluster Functions .................................................. 530
11.3.4. Unique Shared Mac Addresses ................................................... 531
11.4. HA Issues ......................................................................................... 532
11.5. Upgrading an HA Cluster ..................................................................... 534
11.6. Link Monitoring and HA ...................................................................... 536
11.7. HA Advanced Settings ........................................................................ 537
12. ZoneDefense ................................................................................................ 539
12.1. Overview .......................................................................................... 539
12.2. ZoneDefense Switches ......................................................................... 540
12.3. ZoneDefense Operation ....................................................................... 541
12.3.1. SNMP .................................................................................... 541
12.3.2. Threshold Rules ....................................................................... 541
12.3.3. Manual Blocking and Exclude Lists ............................................. 541
12.3.4. ZoneDefense with Anti-Virus Scanning ........................................ 543
12.3.5. Limitations ............................................................................. 543
8
User Manual

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-860eDfl-1660Dfl-2560Dfl-2560g

Table of Contents