EasyManua.ls Logo

D-Link NetDefendOS - Page 9

D-Link NetDefendOS
912 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
9.5. PPTP/L2TP .......................................................................................... 729
9.5.1. PPTP Servers ............................................................................. 729
9.5.2. L2TP Servers ............................................................................. 730
9.5.3. L2TP/PPTP Server Advanced Settings ............................................ 736
9.5.4. PPTP/L2TP Clients ...................................................................... 737
9.5.5. The l2tp and pptp Commands ..................................................... 739
9.6. L2TP Version 3 ..................................................................................... 741
9.6.1. L2TPv3 Server ........................................................................... 741
9.6.2. L2TPv3 Client ............................................................................ 748
9.7. SSL VPN .............................................................................................. 752
9.7.1. Overview .................................................................................. 752
9.7.2. Configuring SSL VPN in NetDefendOS ........................................... 753
9.7.3. Installing the SSL VPN Client ........................................................ 755
9.7.4. SSL VPN Setup Example .............................................................. 759
9.8. VPN Troubleshooting ............................................................................ 762
9.8.1. General Troubleshooting ............................................................ 762
9.8.2. Troubleshooting Certificates ....................................................... 763
9.8.3. The ike -stat Command ............................................................... 763
9.8.4. The ike -snoop Command ............................................................ 764
9.8.5. Management Interface Failure with VPN ........................................ 771
9.8.6. Specific Error Messages ............................................................... 771
9.8.7. Specific Symptoms ..................................................................... 774
10. Traffic Management ...................................................................................... 776
10.1. Traffic Shaping ................................................................................... 776
10.1.1. Overview ................................................................................ 776
10.1.2. Traffic Shaping in NetDefendOS ................................................. 777
10.1.3. Simple Bandwidth Limiting ....................................................... 780
10.1.4. Limiting Bandwidth in Both Directions ........................................ 781
10.1.5. Creating Differentiated Limits Using Chains ................................. 783
10.1.6. Precedences ............................................................................ 784
10.1.7. Pipe Groups ............................................................................ 788
10.1.8. Traffic Shaping Recommendations ............................................. 791
10.1.9. A Summary of Traffic Shaping .................................................... 793
10.1.10. More Pipe Examples ............................................................... 793
10.2. IDP Traffic Shaping ............................................................................. 798
10.2.1. Overview ................................................................................ 798
10.2.2. Setting Up IDP Traffic Shaping ................................................... 798
10.2.3. Processing Flow ....................................................................... 799
10.2.4. The Importance of Specifying a Network ...................................... 799
10.2.5. A P2P Scenario ......................................................................... 800
10.2.6. Viewing Traffic Shaping Objects ................................................. 801
10.2.7. Guaranteeing Instead of Limiting Bandwidth ................................ 802
10.2.8. Logging .................................................................................. 802
10.3. Threshold Rules .................................................................................. 803
10.4. Server Load Balancing ......................................................................... 807
10.4.1. Overview ................................................................................ 807
10.4.2. SLB Distribution Algorithms ....................................................... 809
10.4.3. Selecting Stickiness .................................................................. 809
10.4.4. SLB Algorithms and Stickiness .................................................... 811
10.4.5. Server Health Monitoring .......................................................... 812
10.4.6. Setting Up SLB_SAT Rules .......................................................... 812
10.4.7. SLB Policy ............................................................................... 816
11. High Availability ........................................................................................... 820
11.1. Overview .......................................................................................... 820
11.2. HA Mechanisms ................................................................................. 823
11.3. Setting Up HA .................................................................................... 827
11.3.1. Hardware Setup ....................................................................... 827
11.3.2. Wizard HA Setup ...................................................................... 829
11.3.3. Manual HA Setup ..................................................................... 831
11.3.4. Verifying that the Cluster Functions Correctly ............................... 832
11.3.5. Unique Shared Mac Addresses ................................................... 833
User Manual
9

Table of Contents

Related product manuals