List of Figures
1.1. Packet Flow Schematic Part I
...........................................................................
19
1.2. Packet Flow Schematic Part II
..........................................................................
20
1.3. Packet Flow Schematic Part III
.........................................................................
20
3.1. An Example GRE Scenario
..............................................................................
64
4.1. A Route Failover Scenario for ISP Access
...........................................................
94
4.2. Virtual Links Example 1
................................................................................
106
4.3. Virtual Links Example 2
................................................................................
107
4.4. Multicast Forwarding - No Address Translation
.................................................
111
4.5. Multicast Forwarding - Address Translation
......................................................
112
4.6. Multicast Snoop
...........................................................................................
114
4.7. Multicast Proxy
...........................................................................................
115
4.8. Transparent mode scenario 1
..........................................................................
121
4.9. Transparent mode scenario 2
..........................................................................
122
6.1. DNSBL SPAM Filtering
................................................................................
147
6.2. Dynamic Content Filtering Flow
.....................................................................
172
6.3. IDP Database Updating
.................................................................................
189
9.1. The AH protocol
..........................................................................................
247
9.2. The ESP protocol
.........................................................................................
247
10.1. Pipe rule set to Pipe Packet Flow
...................................................................
269
10.2. The Eight Pipe Precedences
. .........................................................................
272
10.3. Minimum and Maximum Pipe Precedence
. ......................................................
273
10.4. Traffic grouped per IP address
. ......................................................................
275
10.5. A Server Load Balancing configuration
..........................................................
281
10.6. Connections from Three Clients
....................................................................
283
10.7. Stickiness and Round-Robin
.........................................................................
283
10.8. Stickiness and Connection Rate
.....................................................................
284
11.1. High Availability Setup
...............................................................................
293
D.1. The 7 layers of the OSI model
........................................................................
348
9