EasyManua.ls Logo

D-Link NetDefend DFL-210

D-Link NetDefend DFL-210
495 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
10.1.3. Simple Bandwidth Limiting ....................................................... 405
10.1.4. Limiting Bandwidth in Both Directions ........................................ 406
10.1.5. Creating Differentiated Limits with Chains ................................... 407
10.1.6. Precedences ............................................................................ 408
10.1.7. Guarantees .............................................................................. 410
10.1.8. Differentiated Guarantees .......................................................... 410
10.1.9. Groups ................................................................................... 411
10.1.10. Traffic Shaping Recommendations ............................................412
10.1.11. A Summary of Traffic Shaping ................................................. 414
10.1.12. More Pipe Examples ...............................................................414
10.2. IDP Traffic Shaping ............................................................................ 419
10.2.1. Overview ................................................................................419
10.2.2. Setup ..................................................................................... 419
10.2.3. Processing Flow ....................................................................... 420
10.2.4. The Importance of Specifying a Network ...................................... 420
10.2.5. A P2P Scenario ........................................................................ 421
10.2.6. Viewing Traffic Shaping Objects ................................................ 421
10.2.7. Guaranteeing Instead of Limiting Bandwidth ................................. 422
10.2.8. Logging ................................................................................. 423
10.3. Threshold Rules ................................................................................. 424
10.3.1. Overview ................................................................................424
10.3.2. Limiting the Connection Rate/Total Connections ........................... 424
10.3.3. Grouping ................................................................................424
10.3.4. Rule Actions ...........................................................................425
10.3.5. Multiple Triggered Actions ........................................................ 425
10.3.6. Exempted Connections ..............................................................425
10.3.7. Threshold Rules and ZoneDefense .............................................. 425
10.3.8. Threshold Rule Blacklisting ....................................................... 425
10.4. Server Load Balancing ........................................................................426
10.4.1. Overview ................................................................................426
10.4.2. Identifying the Servers ..............................................................427
10.4.3. The Load Distribution Mode ......................................................427
10.4.4. The Distribution Algorithm ........................................................ 428
10.4.5. Server Health Monitoring ..........................................................430
10.4.6. SLB_SAT Rules ....................................................................... 430
11. High Availability ..........................................................................................434
11.1. Overview .......................................................................................... 434
11.2. HA Mechanisms ................................................................................. 436
11.3. HA Setup .......................................................................................... 439
11.3.1. HA Hardware Setup ................................................................. 439
11.3.2. NetDefendOS Manual HA Setup .................................................440
11.3.3. Verifying the Cluster Functions ..................................................441
11.3.4. Unique Shared Mac Addresses ................................................... 442
11.4. HA Issues ......................................................................................... 443
11.5. HA Advanced Settings ........................................................................ 444
12. ZoneDefense ................................................................................................ 446
12.1. Overview .......................................................................................... 446
12.2. ZoneDefense Switches ......................................................................... 447
12.3. ZoneDefense Operation ....................................................................... 448
12.3.1. SNMP .................................................................................... 448
12.3.2. Threshold Rules ....................................................................... 448
12.3.3. Manual Blocking and Exclude Lists ............................................. 448
12.3.4. ZoneDefense with Anti-Virus Scanning ........................................450
12.3.5. Limitations .............................................................................450
13. Advanced Settings ......................................................................................... 453
13.1. IP Level Settings ................................................................................ 453
13.2. TCP Level Settings .............................................................................457
13.3. ICMP Level Settings ........................................................................... 462
13.4. State Settings ..................................................................................... 463
13.5. Connection Timeout Settings ................................................................ 465
13.6. Length Limit Settings .......................................................................... 467
13.7. Fragmentation Settings ........................................................................ 469
13.8. Local Fragment Reassembly Settings ..................................................... 473
User Manual
8

Table of Contents

Other manuals for D-Link NetDefend DFL-210

Related product manuals