9.7.2. Troubleshooting Certificates
........................................................
437
9.7.3. IPsec Troubleshooting Commands
................................................
438
9.7.4. Management Interface Failure with VPN
........................................
439
9.7.5. Specific Error Messages
..............................................................
439
9.7.6. Specific Symptoms
....................................................................
442
10. Traffic Management
......................................................................................
444
10.1. Traffic Shaping
..................................................................................
444
10.1.1. Overview
................................................................................
444
10.1.2. Traffic Shaping in NetDefendOS
.................................................
445
10.1.3. Simple Bandwidth Limiting
.......................................................
447
10.1.4. Limiting Bandwidth in Both Directions
........................................
448
10.1.5. Creating Differentiated Limits Using Chains
.................................
449
10.1.6. Precedences
............................................................................
450
10.1.7. Pipe Groups
............................................................................
455
10.1.8. Traffic Shaping Recommendations
..............................................
458
10.1.9. A Summary of Traffic Shaping
...................................................
459
10.1.10. More Pipe Examples
...............................................................
460
10.2. IDP Traffic Shaping
............................................................................
465
10.2.1. Overview
................................................................................
465
10.2.2. Setting Up IDP Traffic Shaping
..................................................
465
10.2.3. Processing Flow
.......................................................................
466
10.2.4. The Importance of Specifying a Network
......................................
466
10.2.5. A P2P Scenario
........................................................................
467
10.2.6. Viewing Traffic Shaping Objects
................................................
468
10.2.7. Guaranteeing Instead of Limiting Bandwidth
.................................
469
10.2.8. Logging
.................................................................................
469
10.3. Threshold Rules
.................................................................................
470
10.3.1. Overview
................................................................................
470
10.3.2. Limiting the Connection Rate/Total Connections
...........................
470
10.3.3. Grouping
................................................................................
471
10.3.4. Rule Actions
...........................................................................
471
10.3.5. Multiple Triggered Actions
........................................................
471
10.3.6. Exempted Connections
..............................................................
471
10.3.7. Threshold Rules and ZoneDefense
..............................................
471
10.3.8. Threshold Rule Blacklisting
.......................................................
471
10.4. Server Load Balancing
........................................................................
473
10.4.1. Overview
................................................................................
473
10.4.2. SLB Distribution Algorithms
......................................................
474
10.4.3. Selecting Stickiness
..................................................................
475
10.4.4. SLB Algorithms and Stickiness
...................................................
476
10.4.5. Server Health Monitoring
..........................................................
477
10.4.6. Setting Up
SLB_SAT
Rules
........................................................
478
11. High Availability
..........................................................................................
482
11.1. Overview
..........................................................................................
482
11.2. HA Mechanisms
.................................................................................
484
11.3. Setting Up HA
...................................................................................
487
11.3.1. HA Hardware Setup
.................................................................
487
11.3.2. NetDefendOS Manual HA Setup
.................................................
488
11.3.3. Verifying the Cluster Functions
..................................................
489
11.3.4. Unique Shared Mac Addresses
...................................................
490
11.4. HA Issues
.........................................................................................
491
11.5. Upgrading an HA Cluster
.....................................................................
493
11.6. HA Advanced Settings
........................................................................
495
12. ZoneDefense
................................................................................................
497
12.1. Overview
..........................................................................................
497
12.2. ZoneDefense Switches
.........................................................................
498
12.3. ZoneDefense Operation
.......................................................................
499
12.3.1. SNMP
....................................................................................
499
12.3.2. Threshold Rules
.......................................................................
499
12.3.3. Manual Blocking and Exclude Lists
.............................................
499
12.3.4. ZoneDefense with Anti-Virus Scanning
........................................
501
12.3.5. Limitations
.............................................................................
501
13. Advanced Settings
.........................................................................................
504
User Manual
8