Elfiq Link Load Balancer Frequently Asked Questions (FAQ)

Size: px
Start display at page:

Download "Elfiq Link Load Balancer Frequently Asked Questions (FAQ)"

Transcription

1 lin Elfiq Link Load Balancer Frequently Asked Questions (FAQ) For Elfiq Operating System (EOS) version 3.1.x Document Revision 1.8 May 2006 Elfiq Solutions

2 Page 2 / 14 Table of contents 1 Introduction Advantages Which types of enterprises are aimed by the Elfiq Link Load Balancer? Available modes Return on Investments Scenario #1: A T1 link vs. multiple DSL links (3 Mbps) with Elfiq Link Load Balancer Scenario #2: A T1 link vs. multiple DSL links (4 Mbps) with Elfiq Link Load Balancer Scenario #3: Relative costs to Internet downtime or performance drops Installation and management Installation... 6 Configuration and management Differences Between BGB and the Elfiq Link Load Balancer Technical FAQ Is it possible to balance different types of links through the Elfiq Link Load Balancer? What are the types of connections supported by the Elfiq Link Load Balancer? What happens with links of different speeds? Does the Elfiq Link Load Balancer give me one global link with the total bandwidth of all individual links combined? What is the performance level of the Elfiq Link Load Balancer? How does the Elfiq Link Load Balancer manage link redundancy? Can the Elfiq Link Load Balancer system itself be redundant? Is the Elfiq Link Load Balancer able to detect a link failure? How will we know if there is a failure to one of the WAN/Internet connections? What happens to applications that require persistent sessions (e.g. video streaming)? I have an Alizé Link Load Balancer unit, what is the difference with the Elfiq Link Load (Link LB) Balancer? 11 6 Advanced FAQ How is incoming traffic balanced? How is outgoing traffic balanced? How many WAN/Internet links can an Elfiq Link Load Balancer manage? We have 2 WAN/Internet links but our firewall only supports one default gateway. How does the Elfiq Link Load Balancer manage traffic? Is NAT always required? Does the Elfiq Link Load Balancer support persistent sessions? What does persistence mean? What do PAT and NAT mean? We have multiple links on an Elfiq Link Load Balancer. How can we do maintenance on one of them without affecting all services? What are the available balancing algorithms? Does the Elfiq Link Load Balancer require access to the routers that face the WAN/Internet links? Encapsulation on the WAN link is not the same as that on the LAN. Are utilization estimates still accurate? Which protocols are used for redundancy? When used in redundancy, how much time does a transfer to the slave system take? During the state transfer to the slave system, does the slave system need to reevaluate link utilization? Does the Elfiq Link Load Balancer offer the possibility to filter IP traffic? Can the Elfiq Link Load Balancer block IP addresses in real time? Is it possible to be notified when a WAN/Internet link goes down? Am I required to have an Autonomous System Number (ASN)?... 14

3 Page 3 / Does the Elfiq Link Load Balancer support authentication protocols, such as CHAP, PAP and PPPoE encapsulation? How does the Elfiq Link Load Balancer detect a problem on a WAN/Internet link?... 14

4 Page 4 / 14 1 Introduction The Elfiq Link Load Balancer (or Link LB) guarantees optimal access to your network and applications, while optimizing your network access throughput and reducing the total cost of ownership. Offered at a competitive price, its integration is quick, easy and straightforward. No change on network structure, architecture or IP addressing are required (i.e.: BGP is not required). Operating at the data link layer (layer 2), the Elfiq Link Load Balancer does not require any IP addresses. It s practically invisible to the rest of the network, which makes it a highly secure device. Robust and flexible, it integrates a real time failover engine, allowing the addition of a second load balancer in a fault tolerant configuration. The Elfiq Load Balancer's system and configurations resides in FLASH memory on the device, thus eliminating the use of any mechanical part (e.g. hard disk) and reducing the risk of failure. On top of being able to adapt to any type of link, the ELFIQ Load Balancer uses advanced load balancing algorithms for different protocols. The enterprise model also allows you to create multiple logical groups within the configuration of the Elfiq Link Load Balancer, which makes it possible to have multiple load balancer instances in a single unit. Each group has its own configuration, statistics and priorities. For example, you could have the following situation: One group for the Internet links and another for the private or internal links Different groups for IT and administration, each group associated to a different configuration. 1.1 Advantages The use of the Elfiq Link Load Balancer provides numerous advantages. Among the most important are: Elfiq Link Load Balancer saves time and money while optimizing the use of your WAN/Internet links. Elfiq Link Load Balancer allows the use of multiple WAN links simultaneously in a way that is completely transparent to the users. Elfiq Link Load Balancer optimizes bandwidth usage, therefore eliminating costs related to the failure or lack of performance of WAN/Internet links. Elfiq Link Load Balancer can eliminate the costs of expensive links by replacing them with multiple less expensive links, without reducing your overall performance. In certain cases it could even improve it! As an added value, the use of the Link LB will give you an excellent level of redundancy. See section Return on Investments. 1.2 Which types of enterprises are aimed by the Elfiq Link Load Balancer? If you answer yes to at least one of the following questions, the Elfiq Link Load Balancer is aimed at your company. 1. Is Internet access an important factor for your company? 2. Does your company have more then one WAN/Internet link? 3. Does a rupture of Internet access generate a loss of productivity or revenue in your company? 4. Does a drop in Internet access performance generate a loss of productivity or revenue in your company? 1.3 Available modes The Elfiq Link Load Balancer is offered in both as an optimized 1U rack mountable case, as well as a tabletop unit. The Elfiq Link Load Balancer 2000 and 3000 models can also be coupled in failover mode to provide physical redundancy of the units. In autonomous mode, no fault tolerance is provided. This means that only one Elfiq Link Load Balancer balances all the traffic. In failover mode, the advanced fault tolerance feature is activated. Two Elfiq Link Load Balancer units are required in this configuration. The second Link LB is in standby mode and will take over the tasks of the primary balancer in case of failure. Failover is done in real time and is completely automatic. For the Link LB 2000 and 3000 models, a real time dispersed geographic balancing option is available to balance the load between different sites, such as alternate or replication (mirror) sites.

5 Page 5 / 14 2 Return on Investments Usage of the Elfiq Link Load Balancer can reduce bandwidth costs by up to 50%. The simultaneous use of multiple more affordable links eliminates the need for more costly links, such as T1, fiber or T3 links, all the while assuring redundancy and optimizing the bandwidth. The Link LB therefore minimizes the impact on critical applications, since the bandwidth usage is optimized. As mentioned, an advanced real time fault tolerance function is also available. It makes it possible to configure two Elfiq Link Load Balancer systems in a way that the second unit operates in standby mode, ready to automatically take over in case of hardware or software failure on the master unit. In such a case, the load transfer from one unit to the other is completed within a few seconds and completely transparent to the users. As opposed to the vast majority of available load balancers on the market, the Elfiq Link Load Balancer operates at the data link layer of the OSI model (layer 2). This allows it to be very secure and almost invisible on the network, since no IP addresses are required. Its integration is also very simple and only requires a minimal external intervention, or in some cases, none at all. In most cases, the savings realized by the use of the Link LB will make up for its purchase cost in less then a year. Some scenarios are presented in the following paragraphs in order to demonstrate the savings that can be realized thanks to the Link LB. Please note that prices are approximate market prices, in dollars. Many factors can influence real prices (company needs, Internet service provider, terms of contract, geographic location, industry type, etc.). 2.1 Scenario #1: A T1 link vs. multiple DSL links (3 Mbps) with Elfiq Link Load Balancer T1 Link: Speed: Mbps download / Mbps upload Monthly price: 1 250$ DSL/Cable/Satellite Link: Speed: 3 Mbps download / 640 Kbps upload Monthly price: 220$ Annual costs: Download Bandwidth Upload Bandwidth Annual Costs Annual savings 1 T1 Link 1,544 Mbps 1,544 Mbps $ 2 DSL Links 6,000 Mbps 1,280 Mbps 5 820$ 9 720$ 3 DSL Links 9,000 Mbps 1,920 Mbps 7 920$ 7 080$ 2.2 Scenario #2: A T1 link vs. multiple DSL links (4 Mbps) with Elfiq Link Load Balancer T1 Link: Speed: Mbps download / Mbps upload Monthly price: 1 250$ DSL Link: Speed: 4 Mbps download / 800 Kbps upload Monthly price: 320$ Annual costs: Download Bandwidth Upload Bandwidth Annual Costs Annual savings 1 T1 Link 1,544 Mbps 1,544 Mbps $ 2 DSL Links 8,000 Mbps 1,600 Mbps 7 680$ 7 320$ 3 DSL Links 12,000 Mbps 2,400 Mbps $ 3 480$ 2.3 Scenario #3: Relative costs to Internet downtime or performance drops Costs of one hour of downtime: 2 000$ Costs of one hour of performance drops: 1 000$ Yearly hours of downtime: 10 Yearly hours of performance drops: 24 (twice a month) Savings generated by Elfiq Link Load Balancer: 2 000$ x $ x 24 = $

6 Page 6 / 14 3 Installation and management 3.1 Installation Physical installation of the Elfiq Link Load Balancer is the simplest on the market. All you need to do is plug in two Ethernet cables and traffic will automatically start to flow through the balancer. Afterwards, you will be able to create balancing rules to tailor the load balancing to your needs. Since the Link LB operates at the data link level (layer 2) of the OSI model, no IP addresses need to be configured, except for the management interface. The Link LB is installed between Internet/WAN routers and the external firewall. The Elfiq Link Load Balancer is completely independent from the other systems, as well as Internet service provides. The Link LB does not use BGP (Border Gateway Protocol) and does not require an ASN (Autonomous System Numbers) either. Since it operates at the data link layer (layer 2) of the OSI model, no network or sub network changes are required. The Elfiq Link Load Balancer can be perceived as a «black box» that is transparent to the rest of your network.

7 Page 7 / 14 Configuration and management The configuration and management of an Elfiq Link Load Balancer system can be done through secured SSH console access or through a graphical management tool available under Windows or X-Windows. Link LB events and alerts are sent to a remote syslog server on your network through the management interface. A basic syslog server has been included in the graphical user interface management console, should you need one. All Elfiq Link Load Balancer statistics are also available via SNMP from the management interface. Elfiq is a registered organization at the Internet Assigned Numbers Authority, (IANA, at the MIBS SNMP enterprise level. The OID number reserved to Elfiq is A simple to use application programming interface (API) is also available (XML API) for the configuration and management of your Link LB.

8 Page 8 / 14 4 Differences Between BGB and the Elfiq Link Load Balancer The following grid compares the implementation of an Elfiq Link Load Balancer compared to a typical use of BGP protocol: Traffic Management Choice of best link Flexibility in the use of links Parallel use of multiple links Link redundancy Bandwidth increase Traffic prioritization Alerts and notifications Statistics DRP (Disaster Recovery Plan) and geographic balancing Elfiq Link Load Balancer Yes. This is done in real time according to the configured algorithm. Yes. Through the use of the user interface, it is possible to change the chosen algorithms according to business needs and politics within a few minutes. Yes. The Elfiq Link Load Balancer supports over 64 simultaneous links, including asymmetric links. Yes. The redundancy is done in real time (a few seconds) and is fully dynamic. Moreover, no manual intervention is needed. Yes. The Elfiq Link Load Balancer uses the bandwidth of all the links in parallel. Yes. With the Elfiq Link Load Balancer, it is possible to prioritize the traffic of chosen protocols, applications or even departments within the enterprise. It s also possible to prioritize incoming traffic to chosen services or systems. Yes. Through the user interface and the syslog on the management LAN. Yes. Real time graphics are available through the user interface. Yes. The Elfiq Link Load Balancer supports geographical redundancy, which consists of balancing two geographically distinct sites. Installation and Maintenance Installation Simple. Local installation can be completed within a few hours. Does not require any changes to the current network infrastructure. Only minimal external intervention is needed. Configuration changes Physical redundancy Simple. Most modifications can be performed internally via an easy to use user interface. Available. It is possible to install a second Elfiq Link Load Balancer unit in failover mode. This second unit takes over in real time in case of failure from the first unit. No. No. BGP No. The second link can only be use in case of failure from the primary link. Yes. However, in case of failure, you have to wait for propagation which can take up to 30 minutes to complete. No. No. Yes. However, in certain cases of outsourcing, the router might be difficult to access. No. Extremely complex. Complex. Requires the cooperation of both a BGP expert and service providers. Requires an often lengthy planning. In certain cases, it can be very difficult to get proper collaboration between service providers. Complex. Require a BGP expert. None

9 Page 9 / 14 Link failure management Transparent. The Elfiq Link Load Balancer detects link failures in real time and automatically redirects traffic on the other available links. No downtime is experienced. The only effect is that certain sessions will be affected by the link failure and will need to be reestablished. In case of failure, you have to wait for the propagation of routing tables, which can take up to 30 minutes. In certain cases, the intervention of a BGP expert is required, which can increase the costs related to the failure. Need of an AS number No. Yes, with justification and must contain IP classes. Security Since the Elfiq Link Load Balancer acts at the data link layer of the OSI model, it does not require an IP address and is therefore completely transparent to the network. TCP sessions are exposed to possible attacks. Costs Hardware Around 12000$ In the case of a router paid by the client : $ In the case of an outsourcing: no initial costs. Installation A few hours from an Elfiq Link Load Balancer expert or from the client with the help of the user guide. A BGP expert as well as the collaboration of two service providers is required. Long and therefore expensive process. Changes and modifications In case of a link failure Links No costs, in the majority of cases can be completed within a few minutes from an internal technician. No costs. The Elfiq Link Load Balancer guarantees the parallel use of all links. No loss of bandwidth. All the bandwidth that is paid for is always fully available in real time. A BGP expert is required, which needs to be either an employee or a consultant. In both cases it is very expensive. The downtime can sometimes last for a few hours, which can be extremely expensive for an enterprise. A second link needs to be paid but can only be used in case of a failure on the first link, which generates a loss of potential bandwidth. Outsourcing No costs Monthly costs. The provider can also ask for a long term contract. Extended warranty About 20% of the initial cost None Others No other costs AS Number

10 Page 10 / 14 5 Technical FAQ 5.1 Is it possible to balance different types of links through the Elfiq Link Load Balancer? Yes, you can use many possible combinations of links. Some basic examples include: a T1 link from one Internet service provider (ISP) and an xdsl link from another ISP, or two cable links from the same ISP and one xdsl link from a different ISP. 5.2 What are the types of connections supported by the Elfiq Link Load Balancer? The Elfiq Link Load Balancer offers standard Ethernet interfaces as interconnection points. Therefore, dedicated links, xdsl, cable, Frame Relay and ISDN are all supported as long as a router encapsulates or converts the link traffic to Ethernet before it passes through the Link LB. 5.3 What happens with links of different speeds? The Link LB can manage links of equal, different or asymmetric (different download and upload speeds) speeds just as well. Links of different speeds are managed transparently through the Link LB, which also guarantees that the most effective link is used for each given situation. 5.4 Does the Elfiq Link Load Balancer give me one global link with the total bandwidth of all individual links combined? No. The Elfiq Link Load Balancer shares traffic between all available WAN/Internet links. This increases total bandwidth but not the maximum throughput of a single IP session. 5.5 What is the performance level of the Elfiq Link Load Balancer? The Link LB offers a very high level of performance, as it can simultaneously manage multiple 100mbps links. The enterprise model also supports gigabit links. 5.6 How does the Elfiq Link Load Balancer manage link redundancy? Combining WAN/Internet links from multiple providers makes it possible to achieve a redundancy level of nearly 100%. If one of the links should go down, traffic will be automatically and transparently redistributed to the other active links. Additionally, in order to provide optimal link utilization, Elfiq Link Load Balancer can detect network and/or physical failures that might occur on a link. The Link LB also eliminates the use of the BGP protocol for link redundancy, thereby eliminating all the high costs associated with it. Please see section 4, differences between BGP and the Elfiq Link Load Balancer for more information. 5.7 Can the Elfiq Link Load Balancer system itself be redundant? Yes. Two Link LB systems can be used in redundancy. In this scenario, one Elfiq Link Load Balancer system is configured to be the master and the other, the slave. The master system does all the balancing, while the slave system is in standby mode. Should the master system become unavailable because of software or hardware issues, the slave system will automatically take over within a few seconds. The transition from the master system to the slave system is completely transparent and does not require any manual intervention. Once the failed system is replaced (the old master), it will now become the new slave system. It will therefore synchronize itself with the new master and will be in standby mode. In a master/slave configuration, the slave system does not require any system configuration. As soon as it is linked to the master system, the slave will automatically fetch its entire configuration from the master system. No other products on the market offer this level of simplicity. 5.8 Is the Elfiq Link Load Balancer able to detect a link failure? Yes, the Link LB monitors each of the WAN/Internet links in order to detect logical or physical problems. In the case of a failure on one of the links, the traffic will transparently be redistributed to the other links.

11 Page 11 / How will we know if there is a failure to one of the WAN/Internet connections? In the case of a service rupture on one of the links, a syslog event will be sent to the syslog server preconfigured in the Link LB s configuration. Optionally, an SNMP alert can also be sent. When a service rupture occurs, traffic is redirected to the other links. Most TCP applications will automatically retransmit the few packets that were lost during the transition. This will therefore make the loss of a link practically transparent to users and applications What happens to applications that require persistent sessions (e.g. video streaming)? The Elfiq Link Load Balancer natively supports the configuration of persistent sessions. If an application requires the use of the same link for the entire session, the Elfiq Link Load Balancer can ensure that this requirement is met I have an Alizé Link Load Balancer unit, what is the difference with the Elfiq Link Load (Link LB) Balancer? Both are the same product.

12 Page 12 / 14 6 Advanced FAQ 6.1 How is incoming traffic balanced? Incoming traffic balancing is based on primary and secondary DNS entries that point to the client s environment. Each session s establishment or incoming protocol transaction will make a name resolution before establishing the session. The role of the Elfiq Link Load Balancer is to intercept those DNS queries and to respond based on link availability and other pre-configured factors. Every service provided over the WAN/Internet links contains virtual DNS entries known as IDNS Resource Records (IDNS RR), and every IDNS RR entry is associated with an outgoing GMAC (WAN router). Many virtual DNS entries can be created in the Link LB in order to answer all incoming DNS queries. 6.2 How is outgoing traffic balanced? Outgoing traffic balancing gives users and systems behind the firewall to have simultaneous access to multiple WAN/Internet links. All outgoing connections exit with addresses that have been translated through NAT or by a predefined address, such as a proxy. With the Elfiq Link Load Balancer, definitions of groups of IP addresses, known as poolips, allow real time dynamic outgoing access to a predefined WAN/Internet link. A network address translation (NAT) is then done intended for WAN/Internet link. 6.3 How many WAN/Internet links can an Elfiq Link Load Balancer manage? The Elfiq Link Load Balancer uses a concept similar to an Ethernet bridge called Virtual Forwarder Interface (VFI). A VFI is an association of an input and output Ethernet interface. The enterprise model can support up to 5 VFI. Each VFI can support between 2 and 64 links depending of the Elfiq Link Load Balancer model. 6.4 We have 2 WAN/Internet links but our firewall only supports one default gateway. How does the Elfiq Link Load Balancer manage traffic? Since the Link LB operates at the data link layer of the OSI model (layer 2), it is practically invisible to the network. It detects, caches and manages the MAC addresses of the different WAN routers. Since the firewall only supports one default gateway, the Link LB will route the appropriate packets to the chosen router. The Link LB registers all the MAC addresses of the external routers and stores each of them under a GMAC. If one of the routers fails to answer ARP requests, the balancer will automatically answer them for it and redirect the packets to one of the available GMACs, as chosen in the configuration. Therefore, everything is transparent to the firewall. 6.5 Is NAT always required? No, it is not always required to use network address translation. In fact, it s possible to prevent the manipulation of certain protocols, such as IPSEC HA. You can also associate multiple IP addresses (aliases) with each server located in the demilitarized zone (DMZ). The remaining problem depends on the complexity of the firewall configuration. 6.6 Does the Elfiq Link Load Balancer support persistent sessions? Yes. Outgoing traffic balancing uses access lists to manage persistent connections. Therefore, it is possible to individually select protocols and destinations that will be treated as persistent. The Elfiq Link Load Balancer manages persistence at the protocol level, from its data link layer (layer 2) position in the OSI model. 6.7 What does persistence mean? Persistence is the ability to use the same link once a session has been established, for a given protocol. For example, the FTP protocol has multiple simultaneous sessions on ports 20 and 21. In those cases, the client will be able to establish other parallel sessions while always using the same link. The Elfiq Link Load Balancer only supports persistence for outgoing connections, as it is impossible to control incoming connections. Please note however that any persistent sessions will need to be reestablished in the case of a link failure.

13 Page 13 / What do PAT and NAT mean? NAT means Network Address Translation. This type of manipulation is used to mask IP addresses so all packets can be redirected to a different destination. The Elfiq Link Load Balancer supports NAT in incoming, outgoing and hybrid mode. PAT is derived from NAT, and means Port Address Translation. Besides being able to translate IP addresses, PAT can also manage port redirection. The Elfiq Link Load Balancer also supports PAT for incoming traffic. The FTP protocol is also supported with the following variants: PORT, PASV and EPASV. 6.9 We have multiple links on an Elfiq Link Load Balancer. How can we do maintenance on one of them without affecting all services? All you need to do is deactivate the corresponding GMAC. This way, your configuration is not unmodified and the Link LB will continue to balance all the traffic on all the other links, except the one that has just been deactivated What are the available balancing algorithms? The Elfiq Link Load Balancer lets you choose a different algorithm for each resource. The following algorithms are available: RR (Round Robin): distribution based on a continuous cycle through all the GMACs. WFA (Weight First Algorithm): distribution based on the weight of each GMAC. LTFA (Least Traffic First Algorithm): distribution based on the selection of the least saturated link. The selection is based on multiple factors, including link speed (capacity), real time utilization, response time, average utilization and weight. ETFA (Equal Traffic First Algorithm): distribution based on link commensuration. The selection is based on various factors, including link speed (capacity), real time utilization, response time, average utilization and weight. OPFA (Ordered Preferred First Algorithm): distribution based on link order. BSFA (Best SitePath First Algorithm): distribution based on the selection of the optimal path between two sites Does the Elfiq Link Load Balancer require access to the routers that face the WAN/Internet links? No, the Elfiq Link Load Balancer manages transmitted packets and estimates link utilization per GMAC by itself since access to the service providers routers in order to read statistics is usually blocked for security reasons Encapsulation on the WAN link is not the same as that on the LAN. Are utilization estimates still accurate? Yes. By default, tests have proved that the link utilization estimates are very accurate. However, if increased accuracy is needed, a setting can be changed at the GMAC level in order to normalize encapsulation according to the type of link Which protocols are used for redundancy? None, since contrary to competing products, the Link LB operates at the data link layer (layer 2) of the OSI model When used in redundancy, how much time does a transfer to the slave system take? The transfer should be completed within four seconds During the state transfer to the slave system, does the slave system need to reevaluate link utilization? No. The state of each GMAC is replicated in real time to the slave system.

14 Page 14 / Does the Elfiq Link Load Balancer offer the possibility to filter IP traffic? Yes. The Link LB offers filtering on IP, ICMP, TCP and UDP protocols Can the Elfiq Link Load Balancer block IP addresses in real time? Yes, the Link LB allows real time shunning in the enterprise model. However, IDS detections must be done on a separate system. An API is available to integrate Elfiq Link Load Balancer with various Intrusion Detection Systems including Snort, ISS, NetRanger and others. APIs are based on an easy-to-use elementary language based on XML. In this scenario, a port needs to be configured in tapping mode to provide the IDS probe with a copy of the aggregation of all IP packets to monitor Is it possible to be notified when a WAN/Internet link goes down? Yes, by default Elfiq Link Load Balancer will send an alert in real time to the management station as well as to the configured syslog server Am I required to have an Autonomous System Number (ASN)? No. A key factor in the Elfiq Link Load Balancer design is that it is easy to integrate, so, no ASN is required to use the Elfiq Link LB Does the Elfiq Link Load Balancer support authentication protocols, such as CHAP, PAP and PPPoE encapsulation? No, the Link LB is intended to be used for link capacity management. The only layer 2 protocol that is supported is Ethernet. PPPoE authentication and encapsulation must be done by the router, which is usually provided by the service provider. However, this functionality is being evaluated and could be integrated into a future version of Elfiq Link Load Balancer How does the Elfiq Link Load Balancer detect a problem on a WAN/Internet link? The Link LB checks the status of each of the WAN links every 3 seconds. During that time, TCP sessions are conducted for each of the destinations configured using GMAC. Therefore, every 3 seconds a SYN, SYN-ACK, RST sequence is done on each GMAC, to the destination of the next hop for that link. The response time (RTT) to this hop is then calculated. If the first hop does not answer, the Link LB will try to contact the second hop. If the second one does not answer, the GMAC is automatically deactivated and the network traffic is dynamically redistributed to the other links.

A Link Load Balancing Solution for Multi-Homed Networks

A Link Load Balancing Solution for Multi-Homed Networks A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only

More information

Elfiq Link Balancer (Link LB) Quick Web Configuration Guide

Elfiq Link Balancer (Link LB) Quick Web Configuration Guide Elfiq Link Balancer (Link LB) Quick Web Configuration Guide Elfiq Operating System (EOS) - Version 3.5.0 and higher Document Version 2.0 -January 2012 Elfiq Networks (Elfiq Inc.) www.elfiq.com 1. About

More information

MULTI WAN TECHNICAL OVERVIEW

MULTI WAN TECHNICAL OVERVIEW MULTI WAN TECHNICAL OVERVIEW The Multi WAN feature will allow the service provider to load balanced all client TCP and UDP traffic only. It also provides redundancy for HA. Traffic that is load balanced:

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

The Hybrid Enterprise. Enhance network performance and build your hybrid WAN

The Hybrid Enterprise. Enhance network performance and build your hybrid WAN The Hybrid Enterprise Enhance network performance and build your hybrid WAN ABOUT ELFIQ NETWORKS With today s growing Internet demands, Elfiq Networks enhances network performance and business continuity

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications

More information

Layer-2 Design: Link Balancers Simplified

Layer-2 Design: Link Balancers Simplified Technology White Paper Layer-2 Design: Link Balancers Simplified Build Smarter Networks Table of Contents 1. Executive Summary... 3 2. Overview of the Problem... 3 3. Layer-2 Design Principles... 4 4.

More information

FAQ: BroadLink Multi-homing Load Balancers

FAQ: BroadLink Multi-homing Load Balancers FAQ: BroadLink Multi-homing Load Balancers BroadLink Overview Outbound Traffic Inbound Traffic Bandwidth Management Persistent Routing High Availability BroadLink Overview 1. What is BroadLink? BroadLink

More information

Overview... 1. Chapter 1: Initial Setup Quick Install Instructions... 4. Chapter 2: Interfaces LAN... 7 WAN... 8

Overview... 1. Chapter 1: Initial Setup Quick Install Instructions... 4. Chapter 2: Interfaces LAN... 7 WAN... 8 WARP 4.3 User Manual Table of Contents Overview................................................. 1 Chapter 1: Initial Setup Quick Install Instructions...................................... 4 Chapter 2:

More information

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features

More information

WAN Failover Scenarios Using Digi Wireless WAN Routers

WAN Failover Scenarios Using Digi Wireless WAN Routers WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another

More information

Configuring IP Load Sharing in AOS Quick Configuration Guide

Configuring IP Load Sharing in AOS Quick Configuration Guide Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013 the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

FatPipe Networks www.fatpipeinc.com

FatPipe Networks www.fatpipeinc.com WARP WHITE PAPERS FatPipe WARP Reliability, Redundancy and Speed of Bi-directional IP Traffic The implementation of mission critical applications run over wide area networks as a basic communication tool

More information

Application and service delivery with the Elfiq idns module

Application and service delivery with the Elfiq idns module Technical White Paper Application and service delivery with the Elfiq idns module For Elfiq Operating System (EOS) version 3.x Document Revision 1.63 June 2012 Table of Contents 1. The IDNS module... 3

More information

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

White Paper. Complementing or Migrating MPLS Networks

White Paper. Complementing or Migrating MPLS Networks White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

How To Manage Dns On An Elfiq Link Load Balancer (Link Balancer) On A Pcode (Networking) On Ipad Or Ipad (Netware) On Your Ipad On A Ipad At A Pc Or Ipa

How To Manage Dns On An Elfiq Link Load Balancer (Link Balancer) On A Pcode (Networking) On Ipad Or Ipad (Netware) On Your Ipad On A Ipad At A Pc Or Ipa White paper The IDNS module for incoming load balancing For Elfiq Operating System (EOS) version 3.x Document Revision 1.5 October 2007 Elfiq Solutions www.elfiq.com COPYRIGHT The content of this document

More information

Multi-Homing Security Gateway

Multi-Homing Security Gateway Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000

More information

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding

More information

Firewall Defaults and Some Basic Rules

Firewall Defaults and Some Basic Rules Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

WARP 3.0 Table of Contents

WARP 3.0 Table of Contents WARP 3.0 Table of Contents Overview................................................. 1 Chapter 1: Initial Setup Quick Install Instructions......................................4 Chapter 2: Interfaces LAN.....................................................6

More information

Improving Network Efficiency for SMB Through Intelligent Load Balancing

Improving Network Efficiency for SMB Through Intelligent Load Balancing Improving Network Efficiency for SMB Through Intelligent Load Balancing White Paper Series WP100134 Mike Mo, VP of Engineering January 2005 Abstract: As reliable Internet connectivity becomes a daily business

More information

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N

More information

Elfiq Networks Vital for Hospitality

Elfiq Networks Vital for Hospitality Elfiq Networks Vital for Hospitality Contents Elfiq Link Balancer Overview... 3 Internet Continuity... 4 LAN Failsafe... 4 3G/4G Mobile Carrier Support... 4 Bandwidth Management... 5 Time of Day Conditions...

More information

Avaya P330 Load Balancing Manager User Guide

Avaya P330 Load Balancing Manager User Guide Avaya P330 Load Balancing Manager User Guide March 2002 Avaya P330 Load Balancing Manager User Guide Copyright 2002 Avaya Inc. ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 ( UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

Everything You Need to Know About Network Failover

Everything You Need to Know About Network Failover Everything You Need to Know About Network Failover Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Overview Everything You Need to Know

More information

FortiGate High Availability Overview Technical Note

FortiGate High Availability Overview Technical Note FortiGate High Availability Overview Technical Note FortiGate High Availability Overview Technical Note Document Version: 2 Publication Date: 21 October, 2005 Description: This document provides an overview

More information

White Paper. McAfee Multi-Link. Always-on connectivity with significant savings

White Paper. McAfee Multi-Link. Always-on connectivity with significant savings McAfee Multi-Link Always-on connectivity with significant savings Table of Contents Executive Summary...3 How McAfee Multi-Link Works...4 Outbound traffic...4 Load balancing...4 Standby links for high

More information

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual

More information

Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap

Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap Outline Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 2 Qin Yin Fall Semester 2013 More words about VLAN Virtual Routing and Forwarding (VRF) The use of load

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Building a Highly Available and Scalable Web Farm

Building a Highly Available and Scalable Web Farm Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer

More information

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations Cisco PIX Security Appliance provides stateful firewall protection at smaller Internet gateways. Cisco IT Case Study / Security and

More information

FatPipe Networks www.fatpipeinc.com

FatPipe Networks www.fatpipeinc.com XTREME WHITE PAPERS Overview The growing popularity of wide area networks (WANs), as a means by which companies transact vital information with clients, partners, and colleagues, is indisputable. The business

More information

Multi-Link - Firewall Always-on connectivity with significant savings

Multi-Link - Firewall Always-on connectivity with significant savings White Paper Multi-Link - Firewall Always-on connectivity with significant savings multilink.internetworking.ch able of Contents Executive Summary How Multi-Link - Firewalls works Outbound traffic Load

More information

Ranch Networks for Hosted Data Centers

Ranch Networks for Hosted Data Centers Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch

More information

Stretched Active- Active Application Centric Infrastructure (ACI) Fabric

Stretched Active- Active Application Centric Infrastructure (ACI) Fabric Stretched Active- Active Application Centric Infrastructure (ACI) Fabric May 12, 2015 Abstract This white paper illustrates how the Cisco Application Centric Infrastructure (ACI) can be implemented as

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

LAN TCP/IP and DHCP Setup

LAN TCP/IP and DHCP Setup CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are

More information

UTT Technologies offers an effective solution to protect the network against 80 percent of internal attacks:

UTT Technologies offers an effective solution to protect the network against 80 percent of internal attacks: HiPER 840 4-WAN Broadband Gateway/Router Overview HiPER 840 4-WAN Broadband Gateway/Router is a purpose-built solution designed for small-sized Internet cafés, broadband communities and schools which require

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

How To Configure Virtual Host with Load Balancing and Health Checking

How To Configure Virtual Host with Load Balancing and Health Checking How To Configure Virtual Host with Load How To Configure Virtual Host with Load Balancing and Health Checking Balancing and Health Checking Applicable Version: 10.02.0 Build 473 onwards Overview This article

More information

Voice over IP Networks: Ensuring quality through proactive link management

Voice over IP Networks: Ensuring quality through proactive link management White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity

More information

Application Description

Application Description Application Description Firewall in front of LAN Different Servers located behind Firewall Firewall to be accessible from Internet Load Balancer to be installed in a TRANSPARENT MODE between Firewall and

More information

Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy

Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy Objectives The purpose of this lab is to demonstrate both high availability and performance using virtual IPs coupled with DNS round robin

More information

Chapter 2 Connecting the FVX538 to the Internet

Chapter 2 Connecting the FVX538 to the Internet Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02 Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Innominate mguard Version 6

Innominate mguard Version 6 Innominate mguard Version 6 Configuration Examples mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

Common Application Guide

Common Application Guide April 2009 Common Application Guide WAN Failover Using Network Monitor Brief Overview of Application To increase reliability and minimize downtime, many companies are purchasing more than one means of

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Link Controller ENSURES RELIABLE NETWORK CONNECTIVITY

Link Controller ENSURES RELIABLE NETWORK CONNECTIVITY B I G - I P L i n k C o n t r o l l e r High availability and intelligent routing for multi-homed networks As enterprises increase their use of the Internet to deliver their business-critical applications,

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Whitepaper. StoneGate Multi-Link. Ensuring Always-on Connectivity with Significant Savings

Whitepaper. StoneGate Multi-Link. Ensuring Always-on Connectivity with Significant Savings Ensuring Always-on Connectivity with Significant Savings Contents Executive Summary.................................................. 3 How Multi-Link Works................................................

More information

How To Manage A Network On A Network With A Global Server (Networking)

How To Manage A Network On A Network With A Global Server (Networking) HIGH AVAILABILITY STRATEGY - GLOBAL TRAFFIC MANAGEMENT PROTOTYPE REPORT Version 1-00 Document Control Number 2460-00004 11/04/2008 Consortium for Ocean Leadership 1201 New York Ave NW, 4 th Floor, Washington

More information

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,

More information

Enterprise Edge Communications Manager. Data Capabilities

Enterprise Edge Communications Manager. Data Capabilities Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

DOMINO Broadband Bonding Network

DOMINO Broadband Bonding Network 2 DOMINO AGGREGATION DE VOIES ETHERNET N 1 Bridging to the Future par [Hypercable] DOMINO DOMINO Broadband BondingTM Network Appliance With cellular data card failover/aggregation capability DANS CE NUMERO

More information

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Astaro Deployment Guide High Availability Options Clustering and Hot Standby Connect With Confidence Astaro Deployment Guide Clustering and Hot Standby Table of Contents Introduction... 2 Active/Passive HA (Hot Standby)... 2 Active/Active HA (Cluster)... 2 Astaro s HA Act as One...

More information

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Load Balancing for Microsoft Office Communication Server 2007 Release 2 Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks

More information

Application Delivery Networking

Application Delivery Networking Application Delivery Networking. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at: 8-1 Overview

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

GregSowell.com. Mikrotik Basics

GregSowell.com. Mikrotik Basics Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection

More information

How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5)

How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5) FortiGate High Availability Guide FortiGate High Availability Guide Document Version: 5 Publication Date: March 10, 2005 Description: This document describes FortiGate FortiOS v2.80 High Availability.

More information

Networking and High Availability

Networking and High Availability TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Network Security Firewall Manual Building Networks for People

Network Security Firewall Manual Building Networks for People D-Link DFL-700 TM Network Security Firewall Manual Building Networks for People (20031225) Contents Introduction...6 Features and Benefits... 6 Introduction to Firewalls... 6 Introduction to Local Area

More information

Router configuration manual for I3 Micro Vood 322

Router configuration manual for I3 Micro Vood 322 Router configuration manual for I3 Micro Vood 322 v1.0 1 (25) Table of contents 1 LED BEHAVIOUR... 4 1.1 POWER... 4 1.2 STATUS... 4 1.3 WAN... 4 1.4 LAN... 4 1.5 PHONE 1 VOIP... 4 1.6 PHONE 1 HOOK... 4

More information

XRoads Networks, Inc.

XRoads Networks, Inc. Network Load Balancing Overview Revision 3.5.0 March 2006 What Is Network Load Balancing? Network load balancing (aka multihoming, or dual-wan routing) is the ability to aggregate two or more widearea

More information