10.4.5. Server Health Monitoring
SLB uses Server Health Monitoring to continuously check the condition of the servers in an SLB
configuration. SLB can monitor different OSI layers to check the condition of each server.
Regardless of the algorithms used, if a server is deemed to have failed, SLB will not open any more
connections to it until the server is restored to full functionality.
D-Link Server Load Balancing provides the following monitoring modes:
ICMP Ping
This works at OSI layer 3. SLB will ping the IP address of each individual
server in the server farm. This will detect any failed servers.
TCP Connection
This works at OSI layer 4. SLB attempts to connect to a specified port on
each server. For example, if a server is specified as running web services on
port 80, the SLB will send a TCP SYN request to that port. If SLB does not
receive a TCP SYN/ACK back, it will mark port 80 on that server as down.
SLB recognizes the conditions no response, normal response or closed port
response from servers.
10.4.6. SLB_SAT Rules
The key component in setting up SLB is the SLB_SAT rule in the IP rule set. The steps that should
be followed are:
1.
Define an Object for each server for which SLB is to be done.
2.
Define a Group which included all these objects.
3.
Define an SLB_SAT Rule in the IP rule set which refers to this Group and where all other SLB
parameters are defined.
4.
Define a further rule that duplicates the source/destination interface/network of the SLB_SAT
rule that allows traffic through. This could be one rule or a combination of:
•
ForwardFast
•
Allow
•
NAT
The table below shows the rules that would be defined for a typical scenario of a set of webservers
behind the D-Link Firewall for which the load is being balanced. The Allow rule allows external
clients to access the webservers.
Rule Name
Rule Type
Src. Interface
Src. Network
Dest. Interface
Dest. Network
WEB_SLB
SLB_SAT
any
all-nets
core
ip_ext
WEB_SLB_ALW
Allow
any
all-nets
core
ip_ext
If there are clients on the same network as the webservers that also need access to those webservers
then an NAT rule would also be used:
Rule Name
Rule Type
Src. Interface
Src. Network
Dest. Interface
Dest. Network
WEB_SLB
SLB_SAT
any
all-nets
core
ip_ext
WEB_SLB_NAT
NAT
lan
lannet
core
ip_ext
WEB_SLB_ALW
Allow
any
all-nets
core
ip_ext
Note that the destination interface is specified as core, meaning NetDefendOS itself deals with this.
The key advantage of having a separate Allow rule is that the webservers can log the exact IP
address that is generating external requests. Using only a NAT rule, which is possible, means that
10.4.6. SLB_SAT Rules
Chapter 10. Traffic Management
405
Summary of Contents for 800 - DFL 800 - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...