EasyManua.ls Logo

D-Link DFL-260E

D-Link DFL-260E
589 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
9.6.1. Overview ................................................................................. 466
9.6.2. Configuring SSL VPN in NetDefendOS .........................................467
9.6.3. Installing the SSL VPN Client ...................................................... 469
9.6.4. Setup Example .......................................................................... 472
9.7. CA Server Access ................................................................................ 474
9.8. VPN Troubleshooting ...........................................................................477
9.8.1. General Troubleshooting ............................................................. 477
9.8.2. Troubleshooting Certificates ........................................................478
9.8.3. IPsec Troubleshooting Commands ................................................478
9.8.4. Management Interface Failure with VPN ........................................ 479
9.8.5. Specific Error Messages ..............................................................479
9.8.6. Specific Symptoms .................................................................... 482
10. Traffic Management ...................................................................................... 485
10.1. Traffic Shaping .................................................................................. 485
10.1.1. Overview ................................................................................485
10.1.2. Traffic Shaping in NetDefendOS ................................................. 486
10.1.3. Simple Bandwidth Limiting ....................................................... 488
10.1.4. Limiting Bandwidth in Both Directions ........................................ 489
10.1.5. Creating Differentiated Limits Using Chains ................................. 490
10.1.6. Precedences ............................................................................ 492
10.1.7. Pipe Groups ............................................................................496
10.1.8. Traffic Shaping Recommendations .............................................. 499
10.1.9. A Summary of Traffic Shaping ................................................... 500
10.1.10. More Pipe Examples ...............................................................501
10.2. IDP Traffic Shaping ............................................................................ 506
10.2.1. Overview ................................................................................506
10.2.2. Setting Up IDP Traffic Shaping .................................................. 506
10.2.3. Processing Flow ....................................................................... 507
10.2.4. The Importance of Specifying a Network ...................................... 507
10.2.5. A P2P Scenario ........................................................................ 508
10.2.6. Viewing Traffic Shaping Objects ................................................ 509
10.2.7. Guaranteeing Instead of Limiting Bandwidth ................................. 510
10.2.8. Logging ................................................................................. 510
10.3. Threshold Rules ................................................................................. 511
10.4. Server Load Balancing ........................................................................514
10.4.1. Overview ................................................................................514
10.4.2. SLB Distribution Algorithms ...................................................... 515
10.4.3. Selecting Stickiness .................................................................. 516
10.4.4. SLB Algorithms and Stickiness ................................................... 517
10.4.5. Server Health Monitoring ..........................................................518
10.4.6. Setting Up SLB_SAT Rules ........................................................ 519
11. High Availability ..........................................................................................523
11.1. Overview .......................................................................................... 523
11.2. HA Mechanisms ................................................................................. 525
11.3. Setting Up HA ...................................................................................528
11.3.1. HA Hardware Setup ................................................................. 528
11.3.2. NetDefendOS Manual HA Setup .................................................529
11.3.3. Verifying the Cluster Functions ..................................................530
11.3.4. Unique Shared Mac Addresses ................................................... 531
11.4. HA Issues ......................................................................................... 532
11.5. Upgrading an HA Cluster .....................................................................534
11.6. Link Monitoring and HA ...................................................................... 536
11.7. HA Advanced Settings ........................................................................ 537
12. ZoneDefense ................................................................................................ 539
12.1. Overview .......................................................................................... 539
12.2. ZoneDefense Switches ......................................................................... 540
12.3. ZoneDefense Operation ....................................................................... 541
12.3.1. SNMP .................................................................................... 541
12.3.2. Threshold Rules ....................................................................... 541
12.3.3. Manual Blocking and Exclude Lists ............................................. 541
12.3.4. ZoneDefense with Anti-Virus Scanning ........................................543
12.3.5. Limitations .............................................................................543
User Manual
8

Table of Contents

Other manuals for D-Link DFL-260E

Related product manuals