EasyManua.ls Logo

D-Link DFL-1660

D-Link DFL-1660
595 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
9.6. SSL VPN ............................................................................................ 472
9.6.1. Overview ................................................................................. 472
9.6.2. Configuring SSL VPN in NetDefendOS .........................................473
9.6.3. Installing the SSL VPN Client ...................................................... 475
9.6.4. Setup Example .......................................................................... 478
9.7. CA Server Access ................................................................................ 480
9.8. VPN Troubleshooting ...........................................................................483
9.8.1. General Troubleshooting ............................................................. 483
9.8.2. Troubleshooting Certificates ........................................................484
9.8.3. IPsec Troubleshooting Commands ................................................484
9.8.4. Management Interface Failure with VPN ........................................ 485
9.8.5. Specific Error Messages ..............................................................485
9.8.6. Specific Symptoms .................................................................... 488
10. Traffic Management ...................................................................................... 491
10.1. Traffic Shaping .................................................................................. 491
10.1.1. Overview ................................................................................491
10.1.2. Traffic Shaping in NetDefendOS ................................................. 492
10.1.3. Simple Bandwidth Limiting ....................................................... 494
10.1.4. Limiting Bandwidth in Both Directions ........................................ 495
10.1.5. Creating Differentiated Limits Using Chains ................................. 496
10.1.6. Precedences ............................................................................ 498
10.1.7. Pipe Groups ............................................................................502
10.1.8. Traffic Shaping Recommendations .............................................. 505
10.1.9. A Summary of Traffic Shaping ................................................... 506
10.1.10. More Pipe Examples ...............................................................507
10.2. IDP Traffic Shaping ............................................................................ 512
10.2.1. Overview ................................................................................512
10.2.2. Setting Up IDP Traffic Shaping .................................................. 512
10.2.3. Processing Flow ....................................................................... 513
10.2.4. The Importance of Specifying a Network ...................................... 513
10.2.5. A P2P Scenario ........................................................................ 514
10.2.6. Viewing Traffic Shaping Objects ................................................ 515
10.2.7. Guaranteeing Instead of Limiting Bandwidth ................................. 516
10.2.8. Logging ................................................................................. 516
10.3. Threshold Rules ................................................................................. 517
10.4. Server Load Balancing ........................................................................520
10.4.1. Overview ................................................................................520
10.4.2. SLB Distribution Algorithms ...................................................... 521
10.4.3. Selecting Stickiness .................................................................. 522
10.4.4. SLB Algorithms and Stickiness ................................................... 523
10.4.5. Server Health Monitoring ..........................................................524
10.4.6. Setting Up SLB_SAT Rules ........................................................ 525
11. High Availability ..........................................................................................529
11.1. Overview .......................................................................................... 529
11.2. HA Mechanisms ................................................................................. 531
11.3. Setting Up HA ...................................................................................534
11.3.1. HA Hardware Setup ................................................................. 534
11.3.2. NetDefendOS Manual HA Setup .................................................535
11.3.3. Verifying the Cluster Functions ..................................................536
11.3.4. Unique Shared Mac Addresses ................................................... 537
11.4. HA Issues ......................................................................................... 538
11.5. Upgrading an HA Cluster .....................................................................540
11.6. Link Monitoring and HA ...................................................................... 542
11.7. HA Advanced Settings ........................................................................ 543
12. ZoneDefense ................................................................................................ 545
12.1. Overview .......................................................................................... 545
12.2. ZoneDefense Switches ......................................................................... 546
12.3. ZoneDefense Operation ....................................................................... 547
12.3.1. SNMP .................................................................................... 547
12.3.2. Threshold Rules ....................................................................... 547
12.3.3. Manual Blocking and Exclude Lists ............................................. 547
12.3.4. ZoneDefense with Anti-Virus Scanning ........................................549
User Manual
8

Table of Contents

Other manuals for D-Link DFL-1660

Related product manuals