A. Hot-Standby mode and Active-Standby mode in High Availability
|
|
- Lesley Shaw
- 8 years ago
- Views:
Transcription
1 High Availability (HA) is the feature that ensures the business continuity for your organization. IT staff can take HA as a simple solution for the disaster recovery. DrayTek utilizes the Common Address Redundancy Protocol (CARP) to avoid the system downtime, which could stop the normal operation and then causes considerable lost of the entire organization. As enabling the HA feature, the network administrator can set another Vigor3900(s) as the backup device(s) to deliver full routing services during the downtime of the main Vigor3900. The network administrator can use the Virtual IP (e.g., ) for both master device and backup device HA configurations. During the system uptime, the master device (e.g., ) would offer services and act as the Virtual IP. When the master device is temporarily out-of-service, the backup device(s) (e.g., ) acts the Virtual IP and delivers all routing functions. This document introduces High Availability in 4 parts: A. Hot-Standby method and Active-Standby method B. Advanced parameters C. Configuration for High Availability Hot-Standby scenario D. Configuration for High Availability Active-Standby scenario A. Hot-Standby mode and Active-Standby mode in High Availability Hot-Standby mode: The primary and the secondary devices use the same public IP address for Internet Access. The secondary device will auto-synchronize the configurations from the primary device and cannot have different configurations from the primary device. The secondary device is always idle when the primary device is operating. When the primary device is down or is detecting no active switch port of its LAN or WAN interface, the secondary device will be up and take over the primary role. 1/14
2 Active-Standby mode: The primary and the secondary devices use different public IP address for Internet Access. The secondary device uses its own configuration which can be different from the primary device. The secondary device is also operating while the primary device is up and running. 2/14
3 B. Advanced Parameters 1. Redundant Method: a. Hot-Standby: The secondary Vigor3900 remains idle until detecting the malfunction of the Primary Vigor3900. b. Active-Standby: Primary Vigor3900 and the Secondary Vigor3900 can work simultaneously. 2. Config Synchronization Role: Only for Hot-Standby mode. The secondary Vigor3900 will synchronize the configurations from the Primary Vigor3900 automatically. 3. Config Synchronization IP: The IP address of the Primary Vigor Authentication Key: The key to encrypt the HA session. It prevents the HA system get stopped by attacks from fake HA control packets. Members in the same HA Group/VHID should have the same Authentication Key. 5. Advance Preemption Mode: For Hot-Standby mode only. User can choose it so the Primary Vigor3900 takes back the Master role once it is up again. a. Automatic: Primary Vigor3900 will take back the Master role once it is up from the last failure. b. Automatic Delayed: Add the delay before the Primary Vigor3900 takes back the Master role. c. Manual: The Primary Vigor3900 won t take back the Master role automatically until administrator re-actives it manually. 6. LAN Port Detection Mode: a. At Least One UP: Primary Vigor3900 will detect if the LAN Port Members in HA LAN Profiles are up, and will do HA while detecting none of the LAN Port Members is up. b. All Must Be UP: Primary Vigor3900 will detect if all the LAN Port Members in HA LAN Profiles are up, and will do HA while detecting any LAN Port Member is down. While selecting this mode, it is necessary to remove the LAN ports (for example: the LAN port3/ fiber LAN port.) that are not used from the LAN profile members in LAN >> Switch. C. Configurations High Availability in Hot-Standby method 3/14
4 DO NOT connect Primary Vigor3900 and Secondary Vigor3900 to the same switch before finishing all configurations. It is essential to prevent the auto configuration synchronization work before all configurations are done. The Primary Vigor3900 and the secondary Vigor3900 should have the LAN profiles with the exact same name (for example: lan1, lan2 and lan3) and the same VLAN ID. And the LAN profile IP of the Primary Vigor3900 and the secondary Vigor3900 must NOT be the same. 1. Configurations on the Primary Vigor3900 a. Open Applications >> High Availability >> High Availability Profile Setup, and click Add. Input the Profile name, HA LAN Profile, Virtual IP for Gateway, VHID and Role Primary then click Apply. VHID: VHID is for identifying group. The VHID of the corresponding HA LAN profile of the Primary and the Secondary Vigor3900 should be the same. Virtual IP for Gateway: The Virtual Gateway IP for LAN hosts. b. Open Applications >> High Availability >> High Availability General Setup. Redundant Method: Hot-Standy Config Synchronization Role: Primary 4/14
5 LAN Port Detection Mode: At_Least_One_Up Click Apply. 2. Configurations on the Secondary Vigor3900 a. Open Applications >> High Availability >> High Availability Profile Setup, and click Add. Input the Profile name, HA LAN Profile, Virtual IP for Gateway, VHID and Role as Secondary, and click Apply. VHID: VHID is for identifying group. The VHID of the corresponding HA LAN profile of the Primary and the Secondary Vigor3900 should be the same. Virtual IP for Gateway: The Virtual Gateway IP for LAN hosts. 5/14
6 b. Open Applications >> High Availability >> High Availability General Setup. Redundant Method: Hot-Standy Config Synchronization Role: Secondary Config Synchronization IP: The Primary Vigor3900 s LAN IP Priority ID: 1 (Priority ID means the backup priority for the secondary. There can be several secondary Vigor3900 to back up one primary Vigor3900. ID 1 means the secondary Vigor3900 will have the highest priority.) LAN Port Detection Mode: At_Least_One_Up Enable High Availability Click Apply. 6/14
7 3. After above settings are done, please connect the Primary Vigor3900 and the Secondary Vigor3900 to the same LAN switch for High Availability. 4. Open Applications >> High Availability >> High Availability Profile Setup for checking the HA status. We can see which Vigor3900 is acting as Master and the failed reason of the Primary Vigor /14
8 D. Configurations High Availability in Active-Standby method 1. Configurations on the Primary Vigor3900 a. Open Applications >> High Availability >> High Availability Profile Setup then click Add. Input the Profile name, HA LAN Profile, Virtual IP for Gateway, VHID and Role Primary then click Apply. VHID: VHID is for identifying group. The VHID of the corresponding HA LAN profile of the Primary and the Secondary Vigor3900 should be same. Virtual IP for Gateway: The Virtual Gateway IP for LAN hosts. 8/14
9 b. Open Applications >> High Availability >> High Availability General Setup. Redundant Method: Active-Standy Tick Enable High Availability Click Apply. 9/14
10 2. Configurations on the Secondary Vigor3900 a. Open Applications >> High Availability >> High Availability Profile Setup then click Add. Input the Profile name, HA LAN Profile, Virtual IP for Gateway, VHID and Role as Secondary then click Apply. VHID: VHID is for identifying group. The VHID of the corresponding HA LAN profile of the Primary and the Secondary Vigor3900 should be the same. Virtual IP for Gateway: The Virtual Gateway IP for LAN hosts. 10/14
11 b. Open Applications >> High Availability >> High Availability General Setup. Redundant Method: Active-Standy Tick Enable High Availability Click Apply. 11/14
12 c. Select and Edit the s1 HA profile via Applications >> High Availability >> High Availability Profile Setup. Change the role to Backup and fill in the Master IP and the Priority ID. Click Apply. 12/14
13 3. Open Applications >> High Availability >> High Availability Profile Setup for checking the HA status. 13/14
14 We can see which Vigor3900 is acting as Master. 14/14
Web Authentication Application Note
What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular
More informationHow to access peers with different VPN through IPSec. Tunnel
How to access peers with different VPN through IPSec Tunnel Scenario: Taipei branch and Kaohsiung branch dial to Hsinchu headquarter via IPSec VPN Tunnel respectively. Both Taipei branch and Kaohsiung
More informationUTM10 in multi-ssid, multi-vlan network with WMS5316. Network diagram
UTM10 in multi-ssid, multi-vlan network with WMS5316 This document describes how to use the UTM10 (unified threat management system) and WMS5316 (wireless management system) to create a multi-vlan, multi-ssid
More informationScenario 1: One-pair VPN Trunk
VPN Trunk Load-Balance between Vigor3200 and Other Vigor Router This section will discuss how to build VPN Trunk with load-balance between Vigor3200 and other router (e.g., Vigor3300). Scenario 1: One-pair
More informationConfiguring High Availability for Embedded NGX Gateways in SmartCenter
Configuring High Availability for Embedded NGX Gateways in SmartCenter February 2008 Active and Passive Gateway States Contents Introduction...1 High Availability Basics and Terminology...2 Active and
More informationVolume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS )
Open-E Data Storage Server (DSS ) Volume Replication INSTALATION GUIDE Enterprise-class Volume Replication helps ensure non-stop access to critical business data. Open-E DSS Volume Replication Open-E Data
More informationLayer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation
Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a Layer 2/Layer 3 switch (in this document a FMS7382S
More informationISG50 Application Note Version 1.0 June, 2011
ISG50 Application Note Version 1.0 June, 2011 Scenario 1 - ISG50 is placed behind an existing ZyWALL 1.1 Application Scenario For companies with existing network infrastructures and demanding VoIP requirements,
More informationHigh-Availability User s Guide v2.00
Intended Audience The information presented in this manual is written for storage administrators to build Thecus High-Availability system. Requirement Two Thecus NAS with High-Availability Firmware 2.00.00
More informationNote: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
More informationLinkProof And VPN Load Balancing
LinkProof And Load Balancing Technical Application Note May 2008 North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg
More informationData Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS ) Integrated Data Replication reduces business downtime.
Open-E Data Storage Server (DSS ) Data Replication INSTALATION GUIDE Integrated Data Replication reduces business downtime. Open-E DSS Data Replication Open-E Data Server Storage (DSS) offers enterprise-class
More informationDATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch
DATA CENTER Best Practices for High Availability Deployment for the Brocade ADX Switch CONTENTS Contents... 2 Executive Summary... 3 Introduction... 3 Brocade ADX HA Overview... 3 Hot-Standby HA... 4 Active-Standby
More informationFirewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
More information2.0 Dual WAN Select Dual-WAN, you will see the following screen shot, Figure 0.1(Dual-WAN Screen Shot) Figure 0.1(Dual-WAN Screen Shot)
Dual WAN Configuration 1.0 Login First login to Management UI, (192.168.1.1) default router IP You will be requiring entering the user name and password, which are both admin by default. Select System
More informationRedundancy Design Best Practices
Redundancy Design Best Practices Revision 1.1 June 13, 2005 Aruba Networks 1322 Crossman Ave Sunnyvale, CA 94089 +1 408 227 4500 http://www.arubanetworks.com - 1 - Table of Contents Introduction... 3 Relevant
More informationSQL Server Mirroring. Introduction. Setting up the databases for Mirroring
SQL Server Mirroring The purpose of this document is to describe in detail the process of configuring Secret Server and SQL Server 2008 for a high-availability environment using Mirroring. The contents
More informationDMH remote access. Table of Contents. Project : remote_access_dmh Date: 29/05/12 pg. 1
pg. 1 DMH remote access Table of Contents 1 Remote access description... 2 1.1 Single module remote access... 3 1.2 Multiple modules remote access... 6 1.3 REMARKS/PITFALLS... 10 2 Dynamic DNS... 9 pg.
More informationThis techno knowledge paper can help you if: You need to setup a WAN connection between a Patton Router and a NetGuardian.
Problem: Patton / 240T WAN Setup Platform: NetGuardian 240T This TKP is a guide to setting up a PPP to T1 WAN connection between a Patton Model 2603 Router and a NetGuardian 240T. The example in this guide
More informationHow To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication
How To Configure Windows Server 2008 as a How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication RADIUS Server with MS-CHAP v2 Authentication Applicable Version: 10.00 onwards
More informationCisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)
Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched
More informationQuick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.
Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...
More informationTotal Business Continuity with Cyberoam High Availability
White paper Cyberoam UTM Total Business Continuity with Cyberoam High Availability Companies, big and small, must ensure constant availability of their company's network and data and prepare themselves
More informationSmart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
More informationVPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets
VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets The following is a typical gateway-to-gateway VPN that uses a preshared secret for authentication. Figure 4-5: VPN Consortium Scenario
More informationConfiguring IPsec VPN with a FortiGate and a Cisco ASA
Configuring IPsec VPN with a FortiGate and a Cisco ASA The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site
More informationLAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
More informationConfigure VPN between ProSafe VPN Client Software and FVG318
Configure VPN between ProSafe VPN Client Software and FVG318 The following configuration is tested with: NETGEAR FVG318 with firmware version 1.0.41 NETGEAR ProSafe VPN Client Software version 10.5.1 Configure
More informationVLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port
1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application
More informationVersion : 2.0 Date : 2006/6/12
Version : 2.0 Date : 2006/6/12 i Table of Contents Chapter 1. High Availability Function... 1 1.1 Introduction... 1 1.2 Examples and Web Configurations... 2 Chapter 2. VPN Function... 4 2.1 VPN Dial-in
More informationConfiguration Notes 0215
Mediatrix Digital and Analog VoIP Gateways DNS SRV Configuration for a Redundant Server Solution (SIP) Introduction... 2 Deployment Scenario... 2 DNS SRV (RFC 2782)... 3 Microsoft Server Configuration...
More informationConfiguring TheGreenBow VPN Client with a TP-LINK VPN Router
Configuring TheGreenBow VPN Client with a TP-LINK VPN Router This chapter describes how to configure TheGreenBow VPN Client with a TP-LINK router. This chapter includes the following sections: Example
More informationSIP Internet Telephony Gateway
SIP Internet Telephony Gateway VIP - 2 / 4 / 8 / 16 / 24 Series Peer-to-Peer Quick Configuration for VIP-450 Copyright PLANET Technology Corporation. All rights reserved. Scenarios explain: Peer-to-Peer
More informationThinkTel ITSP with Registration Setup Quick Start Guide
January 13 ThinkTel ITSP with Registration Setup Quick Start Guide Author: Zultys Technical Support This configuration guide was created to assist knowledgeable vendors with configuring the Zultys MX Phone
More informationPlease enter the Network WAN page and click the Edit icon of WAN1. Figure 15-1. The WAN setting of Network
15. WAN Setup Vigor 3300Bplus has 3 WAN interfaces, Vigor 3300 and Vigor 3300V both have 4 WAN interfaces. Below we will take Vigor 3300V for an example and introduce the settings for different types of
More informationMcAfee Endpoint Encryption Hot Backup Implementation
McAfee Endpoint Encryption Hot Backup Implementation 1 Endpoint Encryption Hot Backup Implementation Planning, Implementing and Managing SafeBoot Enterprise Systems SafeBoot Hot Backup Implementation Having
More informationV310 Support Note Version 1.0 November, 2011
1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6
More informationFSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall
FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall This document describes how to: - Create multiple routing VLANs - Obtain Internet access on
More informationMulti-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
More informationDraytek Vigor 2820/2830 Configuration. A guide for Exa Resellers and IT Contractors
Draytek Vigor 2820/2830 Configuration A guide for Exa Resellers and IT Contractors Contents About this guide...3 Vigor Router Configuration (ADSL)...4 Vigor Router Configuration (FTTC)...4 Vigor Router
More informationA Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
More informationRouting Security Server failure detection and recovery Protocol support Redundancy
Cisco IOS SLB and Exchange Director Server Load Balancing for Cisco Mobile SEF The Cisco IOS SLB and Exchange Director software features provide a rich set of server load balancing (SLB) functions supporting
More informationBased on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.
30. VoIP Example 3 (VoIP over VPN) Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. In this example 3300V
More informationBasic IPv6 WAN and LAN Configuration
Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration
More informationVPN Configuration of ProSafe VPN Lite software and NETGEAR ProSafe Router:
Page 1 of 8 VPN Configuration of ProSafe VPN Lite software and NETGEAR ProSafe Router: This document will guide you on how to create IKE and auto-vpn policies for your ProSafe NETGEAR Router, as well as
More informationIntroduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console
Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring
More informationSAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of
More informationVPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
More informationHow to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.
Note: DIR-130 FW: 1.21 How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. This setup example uses the following network settings: D-Link Technical Support PPTP VPN Between Windows PPTP
More information2012A Toshiba UCS IPedge Training UCS Website. IPedge Version 1.1 Calvin Lee
2012A Toshiba UCS IPedge Training UCS Website July 2012 IPedge Version 1.1 Calvin Lee Agenda IPT Survivability IPT Auto Config T.38 Fax EC RAID 1 EM RAID 5 Hard Drive Redundancy Follow Me Enhancement IPedge
More informationDOWNTIME CAN SPELL DISASTER
DOWNTIME CAN SPELL DISASTER Technical Brief Ensure Network Uptime: High Availability with XTM FireCluster August 2010 Network downtime is expensive for businesses in today s 24/7 global economy. Any malfunctions
More informationSharing ManagePro Databases in a Small Workgroup from your local PC without a server
Sharing ManagePro Databases in a Small Workgroup from your local PC without a server This document describes how to setup a pc to function like a server and enable sharing of your ManagePro 11 database
More informationDigi Certified Transport Technician Training Course (DCTT)
1 2 A roadblock to this might be if dynamic routing using proprietary protocols, like EIGRP, are required. 3 (VRRP Can also be used over FDDI/Token Ring) HSRP (Hot Standby Router Protocol) is the Cisco
More informationCreating a VPN Using Windows 2003 Server and XP Professional
Creating a VPN Using Windows 2003 Server and XP Professional Recommended Instructor Preparation for Learning Activity Instructor Notes: There are two main types of VPNs: User-to-Network This type of VPN
More informationAstaro Deployment Guide High Availability Options Clustering and Hot Standby
Connect With Confidence Astaro Deployment Guide Clustering and Hot Standby Table of Contents Introduction... 2 Active/Passive HA (Hot Standby)... 2 Active/Active HA (Cluster)... 2 Astaro s HA Act as One...
More informationConfiguration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview
Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall Overview This document describes how to implement IPSec with pre-shared secrets establishing
More informationCCNP Switch 642-813 Questions/Answers Implementing High Availability and Redundancy
Which Catalyst 6500 switch component integrates on individual line modules as well as on the supervisor engine? A. CPU B. Flash C. ASIC D. NVRAM Answer: C Cisco Catalyst 6500 Series with Cisco IOS Software
More information24 Port Gigabit Ethernet Web Smart Switch. Users Manual
24 Port Gigabit Ethernet Web Smart Switch Users Manual Content Web Smart Switch Configure login -------------------------------- 2 Configuration System Configuration ---------------------------------------------------
More informationReduce your downtime to the minimum with a multi-data centre concept
Put your business-critical activities in good hands If your income depends on the continuous availability of your servers, you should ask your hosting provider for a high availability solution. You may
More informationChapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
More informationVPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets
VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets The following is a typical gateway-to-gateway VPN that uses a preshared secret for authentication. Figure 4-5: VPN Consortium Scenario
More informationCitrix NetScaler 10 Essentials and Networking
Citrix NetScaler 10 Essentials and Networking CNS205 Rev 04.13 5 days Description The objective of the Citrix NetScaler 10 Essentials and Networking course is to provide the foundational concepts and advanced
More informationQuick Installation Guide
Quick Installation Guide PRI Gateway Version 2.4 Table of Contents Hardware Setup... 1 Accessing the WEB GUI... 2 Notification LEDs (On the Front Panel of the Gateway)... 3 Creating SIP Trunks... 4 Creating
More informationNetSpective Global Proxy Configuration Guide
NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a
More informationConfiguring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
More informationHow To Load Balance On A Cisco Cisco Cs3.X With A Csono Css 3.X And Csonos 3.5.X (Cisco Css) On A Powerline With A Powerpack (C
esafe Gateway/Mail v. 3.x Load Balancing for esafe Gateway 3.x with Cisco Web NS and CSS Switches Design and implementation guide esafe Gateway provides fast and transparent real-time inspection of Internet
More informationOvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6
WL/IP-8000VPN VPN Setup Guide Version 0.6 Document Revision Version Date Note 0.1 11/10/2005 First version with four VPN examples 0.2 11/15/2005 1. Added example 5: dynamic VPN using TheGreenBow VPN client
More informationSupporting Multiple Firewalled Subnets on SonicOS Enhanced
SONICOS ENHANCED Supporting Multiple Firewalled Subnets on SonicOS Enhanced Introduction This tech note describes how to configure secondary subnets with static ARP which allows multiple subnets to be
More informationHow to Create VLANs Within a Virtual Switch in VMware ESXi
How to Create VLANs Within a Virtual Switch in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support
More informationIP Office Technical Tip
IP Office Technical Tip Tip no: 188 Release Date: September 27, 2007 Region: GLOBAL Verifying IP Office SIP Trunk Operation IP Office back-to-back SIP Line testing IP Office Release 4.0 supports SIP trunking.
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager
More informationWave SIP Trunk Configuration Guide FOR BROADVOX
Wave SIP Trunk Configuration Guide FOR BROADVOX Last updated 1/7/2014 Contents Overview... 1 Special Notes... 1 Before you begin... 1 Required SIP trunk provisioning and configuration information... 1
More informationBalancing and Gateway Failover
How To Add Active How or To Backup Add Gateway Active for Load or Backup Balancing and Gateway for Failover Load Balancing and Gateway Failover Applicable versions: 9.5.3 build 18 onwards Today organizations
More informationRemote Access via VPN Configuration (May 2011)
Remote Access via VPN Configuration (May 2011) Contents Copyright...2 Important Considerations...3 Introduction...4 Supported router models... 4 Installation Topology... 4 Dynamic IP Configuration (DynDNS)...5
More informationWorkflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015
Workflow Guide Establish Site-to-Site VPN Connection using RSA Keys For Customers with Sophos Firewall Document Date: November 2015 November 2015 Page 1 of 10 Establish Site-to-Site VPN Connection using
More informationHow To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip
WINXP VPN to ZyWALL Tunneling 1. Setup WINXP VPN 2. Setup ZyWALL VPN This page guides us to setup a VPN connection between the WINXP VPN software and ZyWALL router. There will be several devices we need
More informationTotalCloud Phone System
TotalCloud Phone System Adtran Netvanta 1234P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Adtran Netvanta
More informationVPN PPTP Application. Installation Guide
VPN PPTP Application Installation Guide 1 Configuring a Remote Access PPTP VPN Dial-in Connection A remote worker establishes a PPTP VPN connection with the head office using Microsoft's VPN Adapter (included
More informationExamPDF. Higher Quality,Better service!
ExamPDF Higher Quality,Better service! Q&A Exam : 1Y0-A21 Title : Basic Administration for Citrix NetScaler 9.2 Version : Demo 1 / 5 1.Scenario: An administrator is working with a Citrix consultant to
More informationLoad Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
More informationVPN Wizard Default Settings and General Information
1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the IPSec VPN Wizard to configure IPSec VPN tunnels on the ProSecure Unified Threat Management (UTM) Appliance. The IP security
More informationNetgear TA612VMNF & TA612VLD Netgear WGR613VAL. Quality of Service (QOS) function
Netgear TA612VMNF & TA612VLD Netgear WGR613VAL Quality of Service (QOS) function 1 Revision History Date Revision Description July 2007 1.1 Final Draft submission Table of Contents Using QoS on NETGEAR
More informationHow to configure your Thomson SpeedTouch 780WL for ADSL2+
How to configure your Thomson SpeedTouch 780WL for ADSL2+ Connecting up your router This guide assumes that you have successfully: unpacked your router connected it up to your phone socket using the DSL
More informationTechnical Information Sheet Page 1 of 8
Page 1 of 8 TIS#: 293 Date: November 27, 2006 Issued by: Chris Lawlor Subject Serial Talk Through: Configuring a 3508 with itools through a 6000 Series Recorder Definition: Serial talk-through allows a
More informationVirtual FAX Function in Vigor IPPBX 2820 Series
Virtual FAX Function in VigorIPPBX 2820 Series In response to environmental policy of paperless in office, DrayTek introduces a new function of Virtual FAX in VigorIPPBX 2820 series. The built in Virtual
More informationVirtual Private Network and Remote Access
Virtual Private Network and Remote Access Introduction A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. A
More informationSynology Disaster Recovery Deployment Guide Document ID
Document ID Syno_UsersGuide_DisasterRecovery_20111114 Table of Contents Chapter 1: Dual Server Disaster Recovery Plan Back up Primary Server's Configurations... 5 Synchronize Data between Primary and Backup
More informationFirewall Load Balancing
CHAPTER 6 This chapter describes the (FWLB) feature. It includes the following sections: FWLB Overview, page 6-1 FWLB Features, page 6-2 FWLB Configuration Tasks, page 6-3 Monitoring and Maintaining FWLB,
More informationGVRP Overview. Overview
3 GVRP Contents Overview...................................................... 3-2................................................... 3-3 General Operation........................................... 3-4
More informationHow to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client
How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client Make sure your DI-804HV or DI-808HV is running firmware ver.1.40 August 12 or later. You can check firmware version
More informationCyberData VoIP V2 Speaker with VoIP Clock Kit Configuration Guide for OmniPCX Enterprise
CyberData VoIP V2 Speaker with VoIP Clock Kit Configuration Guide for OmniPCX Enterprise CyberData Corporation 2555 Garden Road Monterey, CA 93940 T:831-373-2601 F: 831-373-4193 www.cyberdata.net 2 Introduction
More informationFirewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
More informationInternet Telephony PBX system IPX-1980
Internet Telephony PBX system IPX-1980 Quick Installation Guide Table of Contents 1. Package Contents... 3 2. Hardware Installation... 4 2.1 Safety Instruction... 4 2.2 Front panel... 4 2.3 LED & Button
More informationMN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
More informationHow to configure VPN function on TP-LINK Routers
How to configure VPN function on TP-LINK Routers 1. VPN Overview... 2 2. How to configure LAN-to-LAN IPsec VPN on TP-LINK Router... 3 3. How to configure GreenBow IPsec VPN Client with a TP-LINK VPN Router...
More informationViewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355
VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page
More informationPrestige 623R-T. Quick Start Guide. ADSL Dual-link Router. Version 3.40
Prestige 623R-T ADSL Dual-link Router Quick Start Guide Version 3.40 February 2004 Introducing the Prestige The Prestige 623R-T ADSL Dual-link Router is the ideal all-in-one device for small networks connecting
More informationEnabling NAT and Routing in DGW v2.0 June 6, 2012
Enabling NAT and Routing in DGW v2.0 June 6, 2012 Proprietary 2012 Media5 Corporation Table of Contents Introduction... 3 Starting Services... 4 Distinguishing your WAN and LAN interfaces... 5 Configuring
More informationNetworking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
More information