Nortel Web OS Switch Software manuals
Web OS Switch Software
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- A, February
- Preface
- Typographic Conventions
- Contacting Us
- Chapter 1: Basic IP Routing
- IP Routing Benefits
- Figure 1-1: The Router Legacy Network
- Figure 1-2: Switch-Based Routing Topology
- Example of Subnet Routing
- Table 1-3: Subnet Routing Example: Optional VLAN Ports
- Defining IP Address Ranges for the Local Route Cache
- Border Gateway Protocol (BGP)
- Forming BGP Peer Routers
- Figure 1-4: BGP Failover Configuration Example
- DHCP Relay
- DHCP Relay Agent Configuration
- Chapter 2: VLANs
- VLAN ID Numbers
- VLANs and the IP Interfaces
- Example 1: Multiple VLANS with Tagging Adapters
- Example 2: Parallel Links with VLANs
- VLANs and Spanning Tree Protocol
- Bridge Protocol Data Units (BPDUs)
- Multiple Spanning Trees
- Figure 2-4: VLAN 3 Isolated in a Single Spanning Tree Group
- Figure 2-5: Implementing Multiple Spanning Tree Groups
- Table 2-2: Multiple Spanning Tree Groups per VLAN
- VLANs and Default Gateways
- Table 2-3: Route Cache Example
- Configuring the Local Network
- VLANs and Jumbo Frames
- Routing Jumbo Frames to Non-Jumbo Frame VLANs
- Chapter 3: Port Trunking
- Statistical Load Distribution
- Port Trunking Example
- Chapter 4: OSPF
- Types of OSPF Areas
- Types of OSPF Routing Devices
- Neighbors and Adjacencies
- The Shortest Path First Tree
- OSPF Implementation in Web OS
- Defining Areas
- Interface Cost
- Default Routes
- Virtual Links
- Router ID
- Host Routes for Load Balancing
- OSPF Configuration Examples
- Example 1: Simple OSPF Domain
- Example 2: Virtual Links
- Example 3: Summarizing Routes
- Example 4: Host Routes
- Verifying OSPF Configuration
- Chapter 5: Secure Switch Management
- Setting Allowable Source IP Address Ranges
- Secure Switch Management
- Requirements
- RADIUS Authentication and Authorization
- RADIUS Authentication Features in Web OS
- Web Switch User Accounts
- Table 5-2: Web OS Alteon Levels
- Secure Shell and Secure Copy
- Encryption of Management Messages
- RSA Host and Server Keys
- Radius Authentication
- Port Mirroring
- Chapter 6: Server Load Balancing
- Understanding Server Load Balancing
- How Server Load Balancing Works
- Implementing Basic Server Load Balancing
- Network Topology Requirements
- Figure 6-5: Example Network for Client/Server Port Configuration
- Configuring Server Load Balancing
- Table 6-2: Web Host Example: Port Usage
- Additional Server Load Balancing Options
- Extending SLB Topologies
- Table 6-4: Proxy Example: Port Usage
- Mapping Ports
- Figure 6-6: Basic Virtual Port to Real Port Mapping Configuration
- Direct Server Interaction
- Figure 6-7: Direct Server Return
- Figure 6-8: Mapped and Nonmapped Server Access
- Delayed Binding
- Figure 6-10: Repelling DoS SYN Attacks With Delayed Binding
- Load Balancing Special Services
- FTP Server Load Balancing
- Domain Name Server (DNS) Load Balancing
- preconfiguration tasks
- Real Time Streaming Protocol SLB
- Wireless Application Protocol SLB
- Intrusion Detection System Server Load Balancing
- WAN Link Load Balancing
- Chapter 7: Filtering
- Overview
- Table 7-1: Well-Known Protocol Types
- Stacking Filters
- The Default Filter
- VLAN-based Filtering
- Optimizing Filter Performance
- IP Address Ranges
- TCP Rate Limiting
- Configuring TCP Rate Limiting Filters
- Figure 7-6: Limiting User Access to Server
- Tunable Hash for Filter Redirection
- Filter-based Security
- Table 7-4: Web Cache Example: Real Server IP Addresses
- Network Address Translation
- Figure 7-8: Static Network Address Translation
- Dynamic NAT
- FTP Client NAT
- Matching TCP Flags
- Matching ICMP Message Types
- Chapter 8: Application Redirection
- Web Cache Redirection Environment
- Additional Application Redirection Options
- Table 8-1: Web Cache Example: Real Server IP Addresses
- RTSP Web Cache Redirection
- IP Proxy Addresses for NAT
- Excluding Noncacheable Sites
- Chapter 9: Virtual Matrix Architecture
- Chapter 10: Health Checking
- Real Server Health Checks
- DSR Health Checks
- Link Health Checks
- TCP Health Checks
- Script-Based Health Checks
- Script Format
- Scripting Guidelines
- Application-Specific Health Checks
- HTTP Health Checks
- UDP-Based DNS Health Checks
- FTP Server Health Checks
- POP3 Server Health Checks
- SMTP Server Health Checks
- IMAP Server Health Checks
- NNTP Server Health Checks
- RADIUS Server Health Checks
- HTTPS/SSL Server Health Checks
- LDAP Health Checks
- ARP Health Checks
- Failure Types
- Chapter 11: High Availability
- VRRP Overview
- Figure 11-1: Example 1: VRRP Router
- VRRP Operation
- Active-Standby Failover
- Failover Methods
- Active-Standby Redundancy
- Active-Active Redundancy
- Hot-Standby Redundancy
- Synchronizing Configurations
- Web OS Extensions to VRRP
- Sharing/Active-Active Failover
- Tracking VRRP Router Priority
- High Availability Configurations
- Active-Active VIR and VSR Configuration
- Active/Active Server Load Balancing Configuration
- VRRP-Based Hot-Standby Configuration
- configuration procedure
- Virtual Router Deployment Considerations
- Eliminating Loops with STP and VLANs
- Figure 11-12: Cross-Redundancy Creates Loops, But STP Resolves Them
- Assigning VRRP Virtual Router ID
- Stateful Failover of Layer 4 and Layer 7 Persistent Sessions
- What Happens When a Switch Fails
- Viewing Statistics on Persistent Port Sessions
- Chapter 12: Global Server Load Balancing
- GSLB Overview
- How GSLB Works
- Configuring GSLB
- Figure 12-2: GSLB Topology Example
- Table 12-1: GSLB Example: California Real Server IP Addresses
- Table 12-2: GSLB Example: California Alteon 180 Port Usage
- Table 12-3: Denver Real Server IP Addresses
- Table 12-4: Web Host Example: Alteon 180 Port Usage
- IP Proxy for Non-HTTP Redirects
- How IP Proxy Works
- Configuring Proxy IP Addresses
- Verifying GSLB Operation
- Figure 12-5: GSLB Proximity Tables: How They Work
- Figure 12-6: Configuring Client Proximity Table
- Using Border Gateway Protocol for GSLB
- Chapter 13: Firewall Load Balancing
- Firewall Overview
- Basic FWLB
- Basic FWLB Implementation
- Configuring Basic FWLB
- Four-Subnet FWLB
- Four-Subnet FWLB Implementation
- Configuring Four-Subnet FWLB
- Advanced FWLB Concepts
- Figure 13-9: Four-Subnet FWLB Example Network
- Adding a Demilitarized Zone (DMZ)
- Firewall Health Checks
- Chapter 14: Virtual Private Network Load Balancing
- Virtual Private Networks
- Figure 14-1: Basic Network Frame Flow and Operation
- VPN Load-Balancing Configuration
- Figure 14-3: Checkpoint Rules for Both VPN Devices as Seen in the Policy Editor
- Chapter 15: Content Intelligent Switching
- Figure 15-1: Content Intelligent Load Balancing Example
- Parsing Content
- HTTP Header Inspection
- Content Intelligent Server Load Balancing
- Figure 15-2: URL-Based Server Load Balancing
- Virtual Hosting
- Cookie-Based Preferential Load Balancing
- Browser-Smart Load Balancing
- URL Hashing for Server Load Balancing
- Header Hash Load Balancing
- DNS Load Balancing
- Layer 7 RTSP Load Balancing
- Content Intelligent Web Cache Redirection
- URL-Based Web Cache Redirection
- Figure 15-5: URL-Based Web Cache Redirection
- HTTP Header-Based Web Cache Redirection
- Browser-Based Web Cache Redirection
- URL Hashing for Web Cache Redirection
- Figure 15-6: URL Hashing for WCR
- Layer 7 RTSP Streaming Cache Redirection
- Exclusionary String Matching for Real Servers
- Regular Expression Matching
- Configuring Regular Expressions
- Content Precedence Lookup
- Using the or and and Operators
- Assigning Multiple Strings
- Layer 7 Deny Filter
- Chapter 16: Persistence
- Overview of Persistence
- Using Cookies
- Cookie-Based Persistence
- Permanent and Temporary Cookies
- Cookie Properties
- Cookie Modes of Operation
- Figure 16-3: Passive Cookie Mode
- Figure 16-4: Rewrite Cookie Mode
- Configuring Cookie-Based Persistence
- Server-Side Multi-Response Cookie Search
- SSL Session ID-Based Persistence
- Figure 16-5: SSL Session ID-Based Persistence
- Chapter 17: Bandwidth Management
- Figure 17-1: Bandwidth Management: How It Works
- Bandwidth Policies
- Rate Limits
- Data Pacing
- Classification Criteria
- Combinations
- Frame Discard
- Figure 17-4: URL-Based Bandwidth Management
- HTTP Header-Based Bandwidth Management
- Bandwidth Statistics and History
- Packet Coloring (TOS bits) for Burst Limit
- Configuring Bandwidth Management
- Additional Configuration Examples
- Preferential Services Examples
- Figure 17-7: Cookie-Based Preferential Services
- Glossary
- Index
manualsdatabase
Your AI-powered manual search engine