Volume GAJSHIELD INFOTECH PVT LTD. Wan Failover & Load Balancing. Administrative Guide



Similar documents
Configuring WAN Failover & Load-Balancing

Best Practices: Pass-Through w/bypass (Bridge Mode)

Application Description

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

How do I configure multi-wan in Routing Table mode?

Configuring High Availability for Embedded NGX Gateways in SmartCenter

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

How to set up Inbound Load Balance under Drop-in Mode

Using SonicWALL NetExtender to Access FTP Servers

Networking and High Availability

Firewall Defaults and Some Basic Rules

Supporting Multiple Firewalled Subnets on SonicOS Enhanced

Link Load Balancing :50:44 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Networking and High Availability

Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth.

Total Business Continuity with Cyberoam High Availability

PolyServe Understudy QuickStart Guide

Balancing and Gateway Failover

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

VPN Only Connection Information and Sign up

ASA/PIX: Load balancing between two ISP - options

DSL-G604T Install Guides

Configuring IP Load Sharing in AOS Quick Configuration Guide

SonicOS Enhanced 4.0: NAT Load Balancing

Availability Digest. Redundant Load Balancing for High Availability July 2013

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

Sophos UTM Software Appliance

SonicWALL NAT Load Balancing

How to configure VLAN and route failover

Chapter 3 Security and Firewall Protection

Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall

Internet Services. Amcom. Support & Troubleshooting Guide

Multiple Public IPs (virtual service IPs) are supported either to cover multiple network segments or to increase network performance.

NEFSIS DEDICATED SERVER

Configuration examples for the D-Link NetDefend Firewall series DFL-210/800/1600/2500

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Application Note. Cell Janus Load Balancing Algorithms Technical Overview

Barracuda Link Balancer

LinkProof DNS Quick Start Guide

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

How To Manage Outgoing Traffic On Fireware Xtm

EXINDA NETWORKS. Deployment Topologies

Configuration examples for the D-Link NetDefend Firewall series DFL-210/800/1600/2500

Chapter 2 Connecting the FVX538 to the Internet

LOAD BALANCING WHITE PAPER OPTIONS FOR HANDLING MULTIPLE ISP LINES AT HOTELS

Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy

Gigabit Content Security Router

AVer EVC. Quick Installation Guide. Package Contents. 8. Mini Din 8 pin MIC Cable. 1. Main System. 9. HDMI Cable. 2. Camera. 10.

ExamPDF. Higher Quality,Better service!

DOWNTIME CAN SPELL DISASTER

Using VDOMs to host two FortiOS instances on a single FortiGate unit

How To Load Balance On A Cisco Cisco Cs3.X With A Csono Css 3.X And Csonos 3.5.X (Cisco Css) On A Powerline With A Powerpack (C

2.0 Dual WAN Select Dual-WAN, you will see the following screen shot, Figure 0.1(Dual-WAN Screen Shot) Figure 0.1(Dual-WAN Screen Shot)

Broadband Bonding Network Appliance TRUFFLE BBNA6401

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Application Note: GateManager Internet requirement and port settings

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

nexvortex Setup Template

Layer 2 Networking. Overview. VLANs. Tech Note

Gigabit Multi-Homing VPN Security Router

Using IPsec VPN to provide communication between offices

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Cyberoam Multi link Implementation Guide Version 9

Configuring Static IP for your Pace Devices

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Configuration Example

Appendix C Network Planning for Dual WAN Ports

E2BN Direct - Network Services for Schools and Academies

2. Are explicit proxy connections also affected by the ARM config?

Application Note. Active Directory Federation Services deployment guide

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Edgewater Routers User Guide

Owner of the content within this article is Written by Marc Grote

Active-Active ImageNow Server

Unified Threat Management

Using Multipathing Technology to Achieve a High Availability Solution

Steps for Basic Configuration

Multi-Homing Dual WAN Firewall Router

Port forwarding and viewing your IP camera from the internet

Lab Developing ACLs to Implement Firewall Rule Sets

Inbound Load Balance. User Manual

LOAD BALANCING WHITE PAPER OPTIONS FOR HANDLING MULTIPLE ISP LINES AT HOTELS

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Installing GFI MailSecurity

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

Truffle Broadband Bonding Network Appliance

Edgewater Routers User Guide

SQL Server Mirroring. Introduction. Setting up the databases for Mirroring

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

Chapter 4 Customizing Your Network Settings

ERserver. iseries. TCP/IP routing and workload balancing

Quick Installation Card

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Load Balancing 101: Firewall Sandwiches

Barracuda Load Balancer Administrator s Guide

FioranoMQ 9. High Availability Guide

Cisco ACE Application Control Engine: ACEBC Catalyst 6500 and 4710 Applicance Boot Camp

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide Copyright 2015 Peplink

Barracuda Link Balancer Administrator s Guide

Transcription:

Volume 1 GAJSHIELD INFOTECH PVT LTD Wan Failover & Load Balancing Administrative Guide

WAN FAILOVER & LOAD BALANCING Administrative Guide GajShield Infotech Pvt. Ltd. 4, Peninsula Centre Parel Mumbai India 400010 Phone +91 22 66607450 Fax +91 22 66607454

Configuring WAN Failover & Load-Balancing You will learn to configure Wan Failover and Load Balancing of WAN traffic in this guide. G ajshield is the only security device which supports policy based failovers. You can designate one or more interface on the GajShield appliance to work as primary or backups for each provided services. Each port can be used as a simple active/passive setup, where traffic is routed through the other secondary interfaces of each policy, when the primary link fails i.e. is down or unavailable. You can also configure these ports in active/active mode, where the user can load balance the traffic through each of the interfaces or ports. This would be referred to as load balancing. CAVEAT These concepts and methods apply to all models of GajShield Soft and Hardware appliances. WAN Failover & Load-Balancing applies outbound-initiated traffic only; it cannot be used to perform inbound load-balancing functions such as what a content switch or load-balancing appliance provides. WAN Failover & Load-Balancing will only work in Routing mode and will not work in Transparent or Bridge mode. These concepts and methods apply to all models of GajShield Soft and Hardware appliances. Failover and Load Balancing is supported in GajShield SecureGate 5.4 and above. You can have any number of WAN interfaces for Failover and Load Balancing. Steps To Configure WAN Failover Configure one or more WAN interfaces Configure ping monitoring to detect WAN failures Configure firewall policies for WAN failover Install policies 1

Sample Environment This is a sample environment where GajShield UPTM is connected to two ISPs (ISP1 & ISP2). HTTP traffic is routed through ISP1 and traffic flows through ISP2, when ISP1 fails. Similarly, SMTP traffic is routed through ISP2 and failed over to ISP1 when ISP2 fails. In the above example, we have shown only two ISPs. But you can have more than two ISPs too. It is assumed that the UPTM used has GajShield SecureGate 5.4 firmware and the basic configuration has already been done on the firewall. 2

Steps to Configure Wan Failover On Network -> Basic -> Interfaces page, configure the chosen port for WAN connectivity. Provide a name to this port and configure the IP addresses. To ensure, that this port is visible for failover/load balancing/and source routing, provide the Next HOP IP or the gateway provided to you by your service provider. Go to Network->Advanced->WAN Failover to configure the ping monitoring to detect WAN failures. Configure the Main and Alternate Target IPs, the firewall needs to monitor to detect failures. After configuring the given parameters, start the failover. 3

Go to the policy page to configure auto-failover. On Firewall- add a policy and configure the failover policy for >Policies->Rules, it. Select the primary link as Link 1 in the Failover column. In our example, we have selected ISP1 on interface 2 as our primary link for the HTTP traffic. Similarly, select the other secondary links. The priority is taken from top to bottom, i.e. the traffic will flow through Link 1, if Link 1 fails, it is automatically routed through Link 2 and then to Link 3 and others. Also, ensure that you select Any as the direction and do not NAT the rule. Similarly, we will also create a rule for SMTP with ISP2 as primary and ISP1 as secondary. Once configured, install the policies. The GajShield UPTM will monitor each link and if any link fails, the traffic flowing through that link will be routed through the secondary links 4

Load Balancing GajShield UPTM can also be used to load balance the traffic through multiple links. It can be configured for each service or policy set. If any of the links in the chain fail, the traffic will be folder to the next link in the chain. For example, if there are three links i.e. ISP1, ISP2 and ISP3. If HTTP traffic is load balanced between these 3 links and if ISP2 fails, the traffic which was meant for ISP2 will not get folder to ISP3. If ISP3 fails, the traffic will fold over to ISP1 in round-robin. GajShield UPTM has Auto-Failover on Load Balancing policies too. In our example, we will configure HTTP traffic to be load balanced between ISP1 and ISP2. Configure the interfaces as discussed above, if you have not configured them. Configure WAN failover settings as shown above After the above settings are done, go to Firewall->Policies->Rules and configure the rule as shown in the screen below HTTP traffic will now load balance between ISP1 and ISP2 with auto-failover, if any of the WAN link fails. Conclusion GajShield UPTMs support multiple WAN failover on each policy set. There are no restrictions in the number of ISPs you can use to failover the traffic. Similarly, Load balancing not only load balances the traffic, but also fails it over to the other link 5

6