Web OS 10.0 Application GuideFigures n 15212777-A, February 2002Figure 12-1: DNS Resolution with Global Server Load Balancing 291Figure 12-2: GSLB Topology Example 294Figure 12-3: HTTP and Non-HTTP Redirects 304Figure 12-4: POP3 Request Fulfilled via IP Proxy 305Figure 12-5: GSLB Proximity Tables: How They Work 309Figure 12-6: Configuring Client Proximity Table 310Figure 13-1: Typical Firewall Configuration Before FWLB 314Figure 13-2: Basic FWLB Topology 316Figure 13-3: Basic FWLB Process 317Figure 13-4: Basic FWLB Example Network 319Figure 13-5: Four-Subnet FWLB Topology 326Figure 13-6: Four-Subnet FWLB Process 327Figure 13-7: Four-Subnet FWLB Example Network 329Figure 13-8: Basic FWLB Example Network 346Figure 13-9: Four-Subnet FWLB Example Network 347Figure 13-10: Typical Firewall Load-Balancing Topology with DMZ 349Figure 14-1: Basic Network Frame Flow and Operation 355Figure 14-2: VPN Load-Balancing Configuration Example 356Figure 14-3: Checkpoint Rules for Both VPN Devices as Seen in the PolicyEditor 368Figure 15-1: Content Intelligent Load Balancing Example 372Figure 15-2: URL-Based Server Load Balancing 376Figure 15-3: Balancing Nontransparent Caches 387Figure 15-4: Load Balancing DNS Queries 390Figure 15-5: URL-Based Web Cache Redirection 396Figure 15-6: URL Hashing for WCR 408Figure 15-7: Content Precedence Lookup Protectors Example 415Figure 15-8: Content Precedence Lookup Multiple Strings Example 416Figure 15-9: Configuring Layer 7 Deny Filter 417Figure 16-1: Cookie-Based Persistence: How It Works 424Figure 16-2: Insert Cookie Mode 427Figure 16-3: Passive Cookie Mode 428Figure 16-4: Rewrite Cookie Mode 429Figure 16-5: SSL Session ID-Based Persistence 438