D-Link 210 Network Router User Manual


 
9.7.2. Troubleshooting Certificates ........................................................ 437
9.7.3. IPsec Troubleshooting Commands ................................................ 438
9.7.4. Management Interface Failure with VPN ........................................ 439
9.7.5. Specific Error Messages .............................................................. 439
9.7.6. Specific Symptoms .................................................................... 442
10. Traffic Management ...................................................................................... 444
10.1. Traffic Shaping .................................................................................. 444
10.1.1. Overview ................................................................................ 444
10.1.2. Traffic Shaping in NetDefendOS ................................................. 445
10.1.3. Simple Bandwidth Limiting ....................................................... 447
10.1.4. Limiting Bandwidth in Both Directions ........................................ 448
10.1.5. Creating Differentiated Limits Using Chains ................................. 449
10.1.6. Precedences ............................................................................ 450
10.1.7. Pipe Groups ............................................................................ 455
10.1.8. Traffic Shaping Recommendations .............................................. 458
10.1.9. A Summary of Traffic Shaping ................................................... 459
10.1.10. More Pipe Examples ............................................................... 460
10.2. IDP Traffic Shaping ............................................................................ 465
10.2.1. Overview ................................................................................ 465
10.2.2. Setting Up IDP Traffic Shaping .................................................. 465
10.2.3. Processing Flow ....................................................................... 466
10.2.4. The Importance of Specifying a Network ...................................... 466
10.2.5. A P2P Scenario ........................................................................ 467
10.2.6. Viewing Traffic Shaping Objects ................................................ 468
10.2.7. Guaranteeing Instead of Limiting Bandwidth ................................. 469
10.2.8. Logging ................................................................................. 469
10.3. Threshold Rules ................................................................................. 470
10.3.1. Overview ................................................................................ 470
10.3.2. Limiting the Connection Rate/Total Connections ........................... 470
10.3.3. Grouping ................................................................................ 471
10.3.4. Rule Actions ........................................................................... 471
10.3.5. Multiple Triggered Actions ........................................................ 471
10.3.6. Exempted Connections .............................................................. 471
10.3.7. Threshold Rules and ZoneDefense .............................................. 471
10.3.8. Threshold Rule Blacklisting ....................................................... 471
10.4. Server Load Balancing ........................................................................ 473
10.4.1. Overview ................................................................................ 473
10.4.2. SLB Distribution Algorithms ...................................................... 474
10.4.3. Selecting Stickiness .................................................................. 475
10.4.4. SLB Algorithms and Stickiness ................................................... 476
10.4.5. Server Health Monitoring .......................................................... 477
10.4.6. Setting Up SLB_SAT Rules ........................................................ 478
11. High Availability .......................................................................................... 482
11.1. Overview .......................................................................................... 482
11.2. HA Mechanisms ................................................................................. 484
11.3. Setting Up HA ................................................................................... 487
11.3.1. HA Hardware Setup ................................................................. 487
11.3.2. NetDefendOS Manual HA Setup ................................................. 488
11.3.3. Verifying the Cluster Functions .................................................. 489
11.3.4. Unique Shared Mac Addresses ................................................... 490
11.4. HA Issues ......................................................................................... 491
11.5. Upgrading an HA Cluster ..................................................................... 493
11.6. HA Advanced Settings ........................................................................ 495
12. ZoneDefense ................................................................................................ 497
12.1. Overview .......................................................................................... 497
12.2. ZoneDefense Switches ......................................................................... 498
12.3. ZoneDefense Operation ....................................................................... 499
12.3.1. SNMP .................................................................................... 499
12.3.2. Threshold Rules ....................................................................... 499
12.3.3. Manual Blocking and Exclude Lists ............................................. 499
12.3.4. ZoneDefense with Anti-Virus Scanning ........................................ 501
12.3.5. Limitations ............................................................................. 501
13. Advanced Settings ......................................................................................... 504
User Manual
8