9.7.2. Troubleshooting Certificates ........................................................ 443
9.7.3. IPsec Troubleshooting Commands ................................................ 444
9.7.4. Management Interface Failure with VPN ........................................ 445
9.7.5. Specific Error Messages .............................................................. 445
9.7.6. Specific Symptoms .................................................................... 448
10. Traffic Management ...................................................................................... 451
10.1. Traffic Shaping .................................................................................. 451
10.1.1. Overview ................................................................................ 451
10.1.2. Traffic Shaping in NetDefendOS ................................................. 452
10.1.3. Simple Bandwidth Limiting ....................................................... 454
10.1.4. Limiting Bandwidth in Both Directions ........................................ 455
10.1.5. Creating Differentiated Limits Using Chains ................................. 456
10.1.6. Precedences ............................................................................ 457
10.1.7. Pipe Groups ............................................................................ 462
10.1.8. Traffic Shaping Recommendations .............................................. 465
10.1.9. A Summary of Traffic Shaping ................................................... 466
10.1.10. More Pipe Examples ............................................................... 467
10.2. IDP Traffic Shaping ............................................................................ 472
10.2.1. Overview ................................................................................ 472
10.2.2. Setting Up IDP Traffic Shaping .................................................. 472
10.2.3. Processing Flow ....................................................................... 473
10.2.4. The Importance of Specifying a Network ...................................... 473
10.2.5. A P2P Scenario ........................................................................ 474
10.2.6. Viewing Traffic Shaping Objects ................................................ 475
10.2.7. Guaranteeing Instead of Limiting Bandwidth ................................. 476
10.2.8. Logging ................................................................................. 476
10.3. Threshold Rules ................................................................................. 477
10.3.1. Overview ................................................................................ 477
10.3.2. Limiting the Connection Rate/Total Connections ........................... 477
10.3.3. Grouping ................................................................................ 478
10.3.4. Rule Actions ........................................................................... 478
10.3.5. Multiple Triggered Actions ........................................................ 478
10.3.6. Exempted Connections .............................................................. 478
10.3.7. Threshold Rules and ZoneDefense .............................................. 478
10.3.8. Threshold Rule Blacklisting ....................................................... 478
10.4. Server Load Balancing ........................................................................ 480
10.4.1. Overview ................................................................................ 480
10.4.2. SLB Distribution Algorithms ...................................................... 481
10.4.3. Selecting Stickiness .................................................................. 482
10.4.4. SLB Algorithms and Stickiness ................................................... 483
10.4.5. Server Health Monitoring .......................................................... 484
10.4.6. Setting Up SLB_SAT Rules ........................................................ 485
11. High Availability .......................................................................................... 489
11.1. Overview .......................................................................................... 489
11.2. HA Mechanisms ................................................................................. 491
11.3. Setting Up HA ................................................................................... 494
11.3.1. HA Hardware Setup ................................................................. 494
11.3.2. NetDefendOS Manual HA Setup ................................................. 495
11.3.3. Verifying the Cluster Functions .................................................. 496
11.3.4. Unique Shared Mac Addresses ................................................... 497
11.4. HA Issues ......................................................................................... 498
11.5. Upgrading an HA Cluster ..................................................................... 500
11.6. HA Advanced Settings ........................................................................ 502
12. ZoneDefense ................................................................................................ 504
12.1. Overview .......................................................................................... 504
12.2. ZoneDefense Switches ......................................................................... 505
12.3. ZoneDefense Operation ....................................................................... 506
12.3.1. SNMP .................................................................................... 506
12.3.2. Threshold Rules ....................................................................... 506
12.3.3. Manual Blocking and Exclude Lists ............................................. 506
12.3.4. ZoneDefense with Anti-Virus Scanning ........................................ 508
12.3.5. Limitations ............................................................................. 508
13. Advanced Settings ......................................................................................... 511
User Manual
8
Summary of Contents for NetDefend DFL-260E
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382...
Page 386: ...The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533...