Citrix Systems 4.2 Switch User Manual


 
vii
14.4.8. Volume Deletion and Garbage Collection ...................................................... 138
14.5. Working with Snapshots .......................................................................................... 138
14.5.1. Automatic Snapshot Creation and Retention .................................................. 139
14.5.2. Incremental Snapshots and Backup .............................................................. 139
14.5.3. Volume Status ............................................................................................. 139
14.5.4. Snapshot Restore ........................................................................................ 140
14.5.5. Snapshot Job Throttling ................................................................................ 140
14.5.6. VMware Volume Snapshot Performance ........................................................ 140
15. Working with Usage 141
15.1. Configuring the Usage Server ................................................................................. 141
15.2. Setting Usage Limits ............................................................................................... 143
15.2.1. Globally Configured Limits ............................................................................ 144
15.2.2. Default Account Resource Limits .................................................................. 145
15.2.3. Per-Domain Limits ....................................................................................... 146
16. Managing Networks and Traffic 147
16.1. Guest Traffic .......................................................................................................... 147
16.2. Networking in a Pod ............................................................................................... 147
16.3. Networking in a Zone .............................................................................................. 148
16.4. Basic Zone Physical Network Configuration .............................................................. 149
16.5. Advanced Zone Physical Network Configuration ....................................................... 149
16.5.1. Configuring Isolated Guest Network .............................................................. 149
16.5.2. Configure Public Traffic in an Advanced Zone ................................................ 150
16.5.3. Configuring a Shared Guest Network ............................................................ 151
16.6. Using Security Groups to Control Traffic to VMs ....................................................... 152
16.6.1. About Security Groups ................................................................................. 152
16.6.2. Security Groups in Advanced Zones (KVM Only) ........................................... 152
16.6.3. Enabling Security Groups ............................................................................. 153
16.6.4. Adding a Security Group .............................................................................. 153
16.6.5. Adding Ingress and Egress Rules to a Security Group .................................... 153
16.7. External Firewalls and Load Balancers .................................................................... 154
16.7.1. About Using a NetScaler Load Balancer ........................................................ 155
16.7.2. Configuring SNMPCommunity String on a RHEL Server ................................. 156
16.7.3. Initial Setup of External Firewalls and Load Balancers .................................... 157
16.7.4. Ongoing Configuration of External Firewalls and Load Balancers ..................... 158
16.8. Load Balancer Rules .............................................................................................. 158
16.8.1. Adding a Load Balancer Rule ....................................................................... 158
16.8.2. Configuring AutoScale .................................................................................. 159
16.8.3. Sticky Session Policies for Load Balancer Rules ............................................ 164
16.8.4. Health Checks for Load Balancer Rules ........................................................ 164
16.9. Global Server Load Balancing ................................................................................. 165
16.9.1. About Global Server Load Balancing ............................................................. 165
16.9.2. Configuring GSLB ........................................................................................ 167
16.10. Using Multiple Guest Networks .............................................................................. 172
16.10.1. Adding an Additional Guest Network ........................................................... 172
16.10.2. Reconfiguring Networks in VMs .................................................................. 172
16.11. Guest IP Ranges .................................................................................................. 174
16.12. Acquiring a New IP Address .................................................................................. 174
16.13. Releasing an IP Address ....................................................................................... 174
16.14. Reserving Public IP Addresses and VLANs for Accounts ......................................... 175
16.14.1. Dedicating IP Address Ranges to an Account .............................................. 175
16.14.2. Dedicating VLAN Ranges to an Account ...................................................... 176
16.15. IP Reservation in Isolated Guest Networks ............................................................. 177
16.15.1. IP Reservation Considerations .................................................................... 177