Pipe Rules
One or more Pipe Rules make up the NetDefendOS Pipe Rule set which determine what traffic will
flow through which pipes.
Each pipe rule is defined like other NetDefendOS secuirity policies: by specifying the
source/destination interface/network as well as the service to which the rule is to apply. Once a new
connection is permitted by the IP rule set, the pipe rule set is then checked for any matching pipe
rules.
Pipe rules are checked in the same way as IP rules, by going from top to bottom (first to last) in the
rule set. The first matching rule, if any, decides if the connection is subject to traffic shaping. Keep
in mind that any connection that does not trigger a pipe rule will not be subject to traffic shaping and
could potentially use as much bandwidth as it wants.
Note: No pipe rules are defined by default
The rule set for pipe rules is initially empty with no rules being defined by default. At
least one rule must be created for traffic shaping to begin to function.
Pipe Rule Chains
When a pipe rule is defined, the pipes to be used with that rule are also specified and they are placed
into one of two lists in the pipe rule. These lists are:
•
The Forward Chain
These are the pipe or pipes that will be used for outgoing (leaving) traffic from the NetDefend
Firewall. One, none or a series of pipes may be specified.
•
The Return Chain
These are the pipe or pipes that will be used for incoming (arriving) traffic. One, none or a series
of pipes may be specified.
Figure 10.1. Pipe Rules Determine Pipe Usage
The pipes that are to be used are specified in a pipe list. If only one pipe is specified then that is the
pipe whose characteristics will be applied to the traffic. If a series of pipes are specified then these
will form a Chain of pipes through which traffic will pass. A chain can be made up of a maximum
10.1.2. Traffic Shaping in
NetDefendOS
Chapter 10. Traffic Management
453
Summary of Contents for DFL-1600 - Security Appliance
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27 ...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79 ...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146 ...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227 ...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241 ...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339 ...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360 ...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382 ...
Page 386: ... The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386 ...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439 ...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450 ...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488 ...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503 ...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510 ...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533 ...