D-Link DFL-800-AV-12 User Manual - Page 7

L2TP Roaming Clients with Pre-Shared Keys, 4.2. LAN to LAN Tunnels with Pre-shared Keys

Page 7 highlights

User Manual 9.2.3. IPsec Roaming Clients with Certificates 234 9.2.4. L2TP Roaming Clients with Pre-Shared Keys 234 9.2.5. L2TP Roaming Clients with Certificates 236 9.2.6. PPTP Roaming Clients 236 9.2.7. VPN Troubleshooting 237 9.3. IPsec 240 9.3.1. Overview 240 9.3.2. Internet Key Exchange (IKE 240 9.3.3. IKE Authentication 245 9.3.4. IPsec Protocols (ESP/AH 247 9.3.5. NAT Traversal 248 9.3.6. Proposal Lists 249 9.3.7. Pre-shared Keys 250 9.3.8. Identification Lists 251 9.4. IPsec Tunnels 253 9.4.1. Overview 253 9.4.2. LAN to LAN Tunnels with Pre-shared Keys 253 9.4.3. Roaming Clients 253 9.4.4. Fetching CRLs from an alternate LDAP server 259 9.5. PPTP/L2TP 260 9.5.1. PPTP 260 9.5.2. L2TP 261 10. Traffic Management 267 10.1. Traffic Shaping 267 10.1.1. Introduction 267 10.1.2. Traffic Shaping in NetDefendOS 268 10.1.3. Simple Bandwidth Limiting 269 10.1.4. Limiting Bandwidth in Both Directions 270 10.1.5. Creating Differentiated Limits with Chains 271 10.1.6. Precedences 272 10.1.7. Guarantees 274 10.1.8. Differentiated Guarantees 274 10.1.9. Groups 275 10.1.10. Recommendations 276 10.1.11. A Summary of Traffic Shaping 277 10.2. Threshold Rules 279 10.2.1. Overview 279 10.2.2. Connection Rate/Total Connection Limiting 279 10.2.3. Grouping 279 10.2.4. Rule Actions 279 10.2.5. Multiple Triggered Actions 280 10.2.6. Exempted Connections 280 10.2.7. Threshold Rules and ZoneDefense 280 10.2.8. Threshold Rule Blacklisting 280 10.3. Server Load Balancing 281 10.3.1. Overview 281 10.3.2. Identifying the Servers 282 10.3.3. The Load Distribution Mode 282 10.3.4. The Distribution Algorithm 282 10.3.5. Server Health Monitoring 284 10.3.6. SLB_SAT Rules 284 11. High Availability 289 11.1. Overview 289 11.2. High Availability Mechanisms 291 11.3. High Availability Setup 293 11.3.1. Hardware Setup 293 11.3.2. NetDefendOS Setup 294 11.3.3. Verifying Cluster Functioning 294 11.4. High Availability Issues 296 12. ZoneDefense 298 12.1. Overview 298 12.2. ZoneDefense Switches 299 12.3. ZoneDefense Operation 300 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

9.2.3. IPsec Roaming Clients with Certificates
.........................................
234
9.2.4. L2TP Roaming Clients with Pre-Shared Keys
.................................
234
9.2.5. L2TP Roaming Clients with Certificates
........................................
236
9.2.6. PPTP Roaming Clients
...............................................................
236
9.2.7. VPN Troubleshooting
.................................................................
237
9.3. IPsec
..................................................................................................
240
9.3.1. Overview
.................................................................................
240
9.3.2. Internet Key Exchange (IKE)
.......................................................
240
9.3.3. IKE Authentication
....................................................................
245
9.3.4. IPsec Protocols (ESP/AH)
...........................................................
247
9.3.5. NAT Traversal
..........................................................................
248
9.3.6. Proposal Lists
...........................................................................
249
9.3.7. Pre-shared Keys
........................................................................
250
9.3.8. Identification Lists
.....................................................................
251
9.4. IPsec Tunnels
......................................................................................
253
9.4.1. Overview
.................................................................................
253
9.4.2. LAN to LAN Tunnels with Pre-shared Keys
...................................
253
9.4.3. Roaming Clients
........................................................................
253
9.4.4. Fetching CRLs from an alternate LDAP server
................................
259
9.5. PPTP/L2TP
.........................................................................................
260
9.5.1. PPTP
.......................................................................................
260
9.5.2. L2TP
.......................................................................................
261
10. Traffic Management
......................................................................................
267
10.1. Traffic Shaping
..................................................................................
267
10.1.1. Introduction
............................................................................
267
10.1.2. Traffic Shaping in NetDefendOS
.................................................
268
10.1.3. Simple Bandwidth Limiting
.......................................................
269
10.1.4. Limiting Bandwidth in Both Directions
........................................
270
10.1.5. Creating Differentiated Limits with Chains
...................................
271
10.1.6. Precedences
............................................................................
272
10.1.7. Guarantees
..............................................................................
274
10.1.8. Differentiated Guarantees
..........................................................
274
10.1.9. Groups
...................................................................................
275
10.1.10. Recommendations
..................................................................
276
10.1.11. A Summary of Traffic Shaping
.................................................
277
10.2. Threshold Rules
.................................................................................
279
10.2.1. Overview
................................................................................
279
10.2.2. Connection Rate/Total Connection Limiting
..................................
279
10.2.3. Grouping
................................................................................
279
10.2.4. Rule Actions
...........................................................................
279
10.2.5. Multiple Triggered Actions
........................................................
280
10.2.6. Exempted Connections
..............................................................
280
10.2.7. Threshold Rules and ZoneDefense
..............................................
280
10.2.8. Threshold Rule Blacklisting
.......................................................
280
10.3. Server Load Balancing
........................................................................
281
10.3.1. Overview
................................................................................
281
10.3.2. Identifying the Servers
..............................................................
282
10.3.3. The Load Distribution Mode
......................................................
282
10.3.4. The Distribution Algorithm
........................................................
282
10.3.5. Server Health Monitoring
..........................................................
284
10.3.6. SLB_SAT Rules
......................................................................
284
11. High Availability
..........................................................................................
289
11.1. Overview
..........................................................................................
289
11.2. High Availability Mechanisms
..............................................................
291
11.3. High Availability Setup
.......................................................................
293
11.3.1. Hardware Setup
.......................................................................
293
11.3.2. NetDefendOS Setup
.................................................................
294
11.3.3. Verifying Cluster Functioning
....................................................
294
11.4. High Availability Issues
.......................................................................
296
12. ZoneDefense
................................................................................................
298
12.1. Overview
..........................................................................................
298
12.2. ZoneDefense Switches
.........................................................................
299
12.3. ZoneDefense Operation
.......................................................................
300
User Manual
7