How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface



Similar documents
This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

How To Configure Syslog over VPN

How To Configure Virtual Host with Load Balancing and Health Checking

Balancing and Gateway Failover

How To - Deploy Cyberoam in Gateway Mode

How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key

Application Description

F-SECURE MESSAGING SECURITY GATEWAY

How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS)

Routing concepts in Cyberoam

Using IPsec VPN to provide communication between offices

How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key

Creating a VPN with overlapping subnets

How To Configure SSL VPN in Cyberoam

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Optional VBP-E at the Headquarters Location

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

What is the Barracuda SSL VPN Server Agent?

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

Chapter 3 Security and Firewall Protection

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

How To Create A Virtual Private Cloud In A Lab On Ec2 (Vpn)

Best Practices: Pass-Through w/bypass (Bridge Mode)

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

How To Configure Apple ipad for Cyberoam L2TP

Configuring IPsec VPN with a FortiGate and a Cisco ASA

For extra services running behind your router. What to do after IP change

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

Configuration Example

Unified Threat Management

How to set up Inbound Load Balance under Drop-in Mode

How to configure VLAN and route failover

Allo PRI Gateway and Elastix Server

How To Establish Site-to-Site VPN Connection. using Preshared Key. Applicable Version: onwards. Overview. Scenario. Site A Configuration

This presentation describes the IBM Tivoli Monitoring 6.1 Firewall Implementation: KDE Gateway Component.

Akixi Installation Requirements (Siemens HiPath 3000)

nexvortex Setup Template

Serial Deployment Quick Start Guide

How To Configure Multiburb Smt On A Sidewinder G2 In A Load Sharing Environment

I N S T A L L A T I O N M A N U A L

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

Supporting Multiple Firewalled Subnets on SonicOS Enhanced

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

Using SonicWALL NetExtender to Access FTP Servers

Core Protection Suite

Firewall Defaults and Some Basic Rules

How To Configure L2TP VPN Connection for MAC OS X client

The Bomgar Appliance in the Network

Configuring IPsec VPN between a FortiGate and Microsoft Azure

F-Secure Messaging Security Gateway. Deployment Guide

Configuring a customer owned router to function as a switch with Ultra TV

Networking Basics for Automation Engineers

How To Configure A Vyatta As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net (Dspv) On A Network With A D

Extending the range of a wireless network by using mesh topology

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

How Subnets Work in Practice. Fred Marshall Coastal Computers & Networks

DIGIPASS Authentication for SonicWALL SSL-VPN

DSL-G604T Install Guides

Configuring Static IP for your Pace Devices

LinkProof DNS Quick Start Guide

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

Knowledgebase Solution

Deploying Silver Peak VXOA Physical And Virtual Appliances with Dell EqualLogic Isolated iscsi SANs including Dell 3-2-1

SSL-VPN 200 Getting Started Guide

Firewall Log Format. Log ID is a Unique 12 characters code (c1c2c3c4c5c6c7c8c9c10c11c12) e.g ,

Abstract. Avaya Solution & Interoperability Test Lab

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

TechNote. Configuring SonicOS for MS Windows Azure

CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks

Digi Connect WAN Application Helper Configuring and Testing the Digi Connect WAN GSM

Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10

Application Note. Connecting Networks

Lab Configuring Access Policies and DMZ Settings

Optimum Business SIP Trunk Set-up Guide

Meraki MX50 Hardware Installation Guide

Configuring WAN Failover & Load-Balancing

1 You will need the following items to get started:

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide

VLSM & IP ADDRESSING EXAMPLE QUESTIONS with answers;

MULTI WAN TECHNICAL OVERVIEW

Using VDOMs to host two FortiOS instances on a single FortiGate unit

Virtual LAN Configuration Guide Version 9

Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015

SIP Trunking using Optimum Business SIP Trunk Adaptor and the Allworx 6x IP PBX

SURF Feed Connection Guide

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario

DRO-210i LOAD BALANCING ROUTER. Review Package Contents

Multi-Homing Security Gateway

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

EXINDA NETWORKS. Deployment Topologies

Load Balancing ContentKeeper With RadWare

PFSENSE Load Balance with Fail Over From Version Beta3

Quick Start Guide. Sendio System Protection Appliance. Sendio 5.0

Service Launch Guide (US Customer) SEG Filtering

How To Guide Edge Network Appliance How To Guide:

Server configuration for layer 4 DSR mode

TechNote. Configuring SonicOS for Amazon VPC

Transcription:

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Configure load sharing and redirect mail server traffic over preferred Gateway Applicable to versions 9.5.3 build 14 or above This article describes a detailed configuration example that demonstrates how to load balance traffic of mail server hosted internally and redirect traffic over preferred interface when multiple WAN links terminating on Cyberoam. Configuration steps are provided assuming that you are using factory default settings of the appliance. If your appliance is not using factory defaults, you can use IP address as per your requirement. Article covers how to Create virtual host Create firewall rule to allow the inbound traffic Configure source based routing to route the request from each private IP address through a particular gateway Sample schema Consider the hypothetical network where Cyberoam is deployed with two WAN interfaces and mail server is having MX records pointed to both the WAN IP addresses. Policies are to be configured to direct traffic to a specific interface. Throughout the article we will use the network parameters displayed in the below given network diagram. Network components Mail server MX IP address IP address (Internal) 203.88.135.208 10.0.0.1 (Mapped) 204.88.135.192 10.0.0.2 (Mapped)

Configuration Entire configuration is to be done from Web Admin Console unless specified. Step 1: Create virtual host that maps WAN IP 203.88.135.208 to internal mail server 10.0.0.1 Go to Firewall Virtual Host Create and create virtual host with the parameters as specified in sample schema

Step 2: Create virtual host that maps WAN IP 204.88.135.192 to internal mail server 10.0.0.2 Go to Firewall Virtual Host Create and create virtual host with the parameters as specified in sample schema

Step 3: Loopback firewall rule Once the virtual host is created successfully, Cyberoam automatically creates a loopback firewall rule for the zone of the mapped IP address. Loopback firewall rule is created for the service specified in virtual host. If port forwarding is not enabled in virtual host then firewall rule with All Services is created. For our example, LAN to LAN firewall rule is created as virtual host (mapped IP address) belongs to LAN interface subnet. Check creation of loopback rule from Firewall Manage Firewall

Step 4: Add Firewall rules for Virtual host (created in step 1) Go to Firewall Create Rule and create two firewall rules with the parameters as displayed in the below given screens. Create WAN to LAN firewall rule with the virtual host (created in Step 1) as the Destination host. This rule will allow external host (from the Internet) to access the mail server with the IP 203.88.135.208. Step 5: Add Firewall rules for Virtual host (created in step 2) Go to Firewall Create Rule and create two firewall rules with the parameters as displayed in the below given screens. Create WAN to LAN firewall rule with the virtual host (created in Step 1) as the Destination host. This rule will allow external host (from the Internet) to access the web server with the IP 204.88.135.192.

Step 6: Define source based routing To redirect traffic over preferred interface, add IP address to the Gateway whose request you want to route through the gateway. To configure outgoing interface as 203.88.135.208 for traffic from 10.0.0.1, add 10.0.0.1 to Gateway1 and 204.88.135.192 for traffic from 10.0.0.2, add 10.0.0.2 to Gateway2 Go to System Gateway Manage Gateway and add IPs to the respective gateways.

Document version -1.0-25/08/2008