D-Link DFL-860 Инструкция по эксплуатации онлайн [8/552] 17555

D-Link DFL-860 Инструкция по эксплуатации онлайн [8/552] 17555
9.7.2. Troubleshooting Certificates ........................................................443
9.7.3. IPsec Troubleshooting Commands ................................................444
9.7.4. Management Interface Failure with VPN ........................................445
9.7.5. Specific Error Messages ..............................................................445
9.7.6. Specific Symptoms ....................................................................448
10. Traffic Management ...................................................................................... 451
10.1. Traffic Shaping .................................................................................. 451
10.1.1. Overview ................................................................................451
10.1.2. Traffic Shaping in NetDefendOS .................................................452
10.1.3. Simple Bandwidth Limiting .......................................................454
10.1.4. Limiting Bandwidth in Both Directions ........................................455
10.1.5. Creating Differentiated Limits Using Chains .................................456
10.1.6. Precedences ............................................................................457
10.1.7. Pipe Groups ............................................................................462
10.1.8. Traffic Shaping Recommendations ..............................................465
10.1.9. A Summary of Traffic Shaping ...................................................466
10.1.10. More Pipe Examples ...............................................................467
10.2. IDP Traffic Shaping ............................................................................472
10.2.1. Overview ................................................................................472
10.2.2. Setting Up IDP Traffic Shaping .................................................. 472
10.2.3. Processing Flow ....................................................................... 473
10.2.4. The Importance of Specifying a Network ...................................... 473
10.2.5. A P2P Scenario ........................................................................ 474
10.2.6. Viewing Traffic Shaping Objects ................................................475
10.2.7. Guaranteeing Instead of Limiting Bandwidth .................................476
10.2.8. Logging ................................................................................. 476
10.3. Threshold Rules .................................................................................477
10.3.1. Overview ................................................................................477
10.3.2. Limiting the Connection Rate/Total Connections ...........................477
10.3.3. Grouping ................................................................................478
10.3.4. Rule Actions ........................................................................... 478
10.3.5. Multiple Triggered Actions ........................................................478
10.3.6. Exempted Connections ..............................................................478
10.3.7. Threshold Rules and ZoneDefense ..............................................478
10.3.8. Threshold Rule Blacklisting ....................................................... 478
10.4. Server Load Balancing ........................................................................480
10.4.1. Overview ................................................................................480
10.4.2. SLB Distribution Algorithms ......................................................481
10.4.3. Selecting Stickiness ..................................................................482
10.4.4. SLB Algorithms and Stickiness ...................................................483
10.4.5. Server Health Monitoring ..........................................................484
10.4.6. Setting Up SLB_SAT Rules ........................................................ 485
11. High Availability ..........................................................................................489
11.1. Overview ..........................................................................................489
11.2. HA Mechanisms .................................................................................491
11.3. Setting Up HA ................................................................................... 494
11.3.1. HA Hardware Setup .................................................................494
11.3.2. NetDefendOS Manual HA Setup .................................................495
11.3.3. Verifying the Cluster Functions .................................................. 496
11.3.4. Unique Shared Mac Addresses ...................................................497
11.4. HA Issues ......................................................................................... 498
11.5. Upgrading an HA Cluster .....................................................................500
11.6. HA Advanced Settings ........................................................................502
12. ZoneDefense ................................................................................................504
12.1. Overview ..........................................................................................504
12.2. ZoneDefense Switches .........................................................................505
12.3. ZoneDefense Operation .......................................................................506
12.3.1. SNMP ....................................................................................506
12.3.2. Threshold Rules .......................................................................506
12.3.3. Manual Blocking and Exclude Lists .............................................506
12.3.4. ZoneDefense with Anti-Virus Scanning ........................................508
12.3.5. Limitations ............................................................................. 508
13. Advanced Settings ......................................................................................... 511
User Manual
8

Содержание

Скачать