Alteon Application Switch Operating System Application Guide
Table of Contents
Document ID: RDWR-ALOS-V2900_AG1302 35
Viewing DoS Statistics ...................................................................................................... 604
Viewing DoS Statistics Per Port ........................................................................................ 606
Understanding the Types of DoS Attacks ......................................................................... 606
DoS Attack Prevention Configuration ............................................................................... 610
Preventing Other Types of DoS Attacks ........................................................................... 611
Protocol-Based Rate Limiting ................................................................................... 611
Time Windows and Rate Limits ........................................................................................ 612
Holddown Periods ............................................................................................................. 612
UDP and ICMP Rate Limiting ........................................................................................... 613
TCP Rate Limiting ............................................................................................................. 613
Configuring Protocol-Based Rate Limiting Filters ............................................................. 614
Protection Against UDP Blast Attacks ...................................................................... 617
TCP or UDP Pattern Matching ................................................................................. 618
Pattern Criteria .................................................................................................................. 618
Matching Groups of Patterns ............................................................................................ 620
FlexiRules for SIP over UDP Traffic ................................................................................. 626
Chapter 22 – WAN Link Load Balancing............................................................. 631
Multi-homing ............................................................................................................. 631
Benefits of WAN Link Load Balancing .............................................................................. 632
Identifying Your Network Needs ....................................................................................... 632
What is Load Balancing? .................................................................................................. 633
How WAN Link Load Balancing Works .................................................................... 633
Outbound Traffic ............................................................................................................... 633
Inbound Traffic .................................................................................................................. 634
Configuring WAN Link Load Balancing .................................................................... 637
Before You Begin .............................................................................................................. 637
Configuration Summary .................................................................................................... 638
WAN Link Load Balancing Examples ............................................................................... 639
Health Checking and Multi-homing ................................................................................... 655
Chapter 23 – Firewall Load Balancing ................................................................ 657
Firewall Overview ..................................................................................................... 657
Basic FWLB .............................................................................................................. 658
Basic FWLB Implementation ............................................................................................ 659
Configuring Basic FWLB ................................................................................................... 661
Four-Subnet FWLB ................................................................................................... 668
Four-Subnet FWLB Implementation ................................................................................. 669
Configuring Four-Subnet FWLB ....................................................................................... 670
Advanced FWLB Concepts ...................................................................................... 683
Free-Metric FWLB ............................................................................................................ 683
Adding a Demilitarized Zone (DMZ) ................................................................................. 686
Firewall Health Checks ..................................................................................................... 687