Alteon Application Switch Operating System Application Guide
Table of Contents
34 Document ID: RDWR-ALOS-V2900_AG1302
What Happens When Alteon Fails .................................................................................... 572
Viewing Statistics on Persistent Port Sessions ................................................................. 573
Service-Based Session Failover ............................................................................... 574
Session Failover for Hot Standby Configurations .............................................................. 574
Operations During Session Mirroring on Reboot ............................................................... 575
Service-based Session Failover (Session Mirroring) Limitations and Recommendations 576
Service-Based Session Failover Commands .................................................................... 576
Automate Session Mirroring .............................................................................................. 577
Session Failover for Active-Standby Configurations ......................................................... 578
Peer Synchronization ............................................................................................... 580
Configuring Peer Synchronization ..................................................................................... 580
Chapter 20 – Persistence ..................................................................................... 583
Overview of Persistence ........................................................................................... 583
Using Source IP Address .................................................................................................. 584
Using Cookies ................................................................................................................... 584
Using SSL Session ID ....................................................................................................... 584
HTTP and HTTPS Persistence Based on Client IP .................................................. 584
Cookie-Based Persistence ....................................................................................... 585
Permanent and Temporary Cookies ................................................................................. 586
Cookie Formats ................................................................................................................. 587
Cookie Properties .............................................................................................................. 587
Client Browsers that Do Not Accept Cookies .................................................................... 587
Cookie Modes of Operation .............................................................................................. 588
Configuring Cookie-Based Persistence ............................................................................. 591
Cookie-Based Persistence Examples ............................................................................... 593
Server-Side Multi-Response Cookie Search ..................................................................... 595
Proxy Support for Insert Cookie ........................................................................................ 596
SSL Session ID-Based Persistence ......................................................................... 596
How SSL Session ID-Based Persistence Works ............................................................... 596
Configuring SSL Session ID-Based Persistence ............................................................... 597
Windows Terminal Server Load Balancing and Persistence .................................... 598
Configuring Windows Terminal Server Load Balancing and Persistence ......................... 600
Chapter 21 – Advanced Denial of Service Protection ....................................... 601
Background .............................................................................................................. 601
Security Inspection Workflow ............................................................................................ 601
Other Types of Security Inspection ................................................................................... 602
IP Address Access Control Lists .............................................................................. 602
Configuring Blocking with IP Access Control Lists ............................................................ 603
Viewing IP ACL Statistics .................................................................................................. 603
Protection Against Common Denial of Service Attacks ............................................ 604
Configuring Ports with DoS Protection .............................................................................. 604