least one rule must be created for traffic shaping to begin to function.
When a Pipe Rule is defined, the pipes to be used with that rule are also specified and they are
placed into one of two lists in the Pipe Rule. These lists are:
•
The Forward Chain
These are the pipes that will be used for outgoing (leaving) traffic from the D-Link Firewall.
One, none or a series of pipes may be specified.
•
The Return Chain
These are the pipes that will be used for incoming (arriving) traffic. One, none or a series of
pipes may be specified.
Figure 10.1. Packet Flow of Pipe Rule Set to Pipe
The pipes that are to be used are specified in a pipe list. If only one pipe is specified then that is the
pipe whose characteristics will be applied to the traffic. If a series of pipes are specified then these
will form a Chain of pipes through which traffic will pass. A chain can be made up of at most 8
pipes.
If no pipe is specified in a list then traffic that matches the rule will not flow through any pipe but it
will also mean that the traffic will not be subject to any other pipe rules found later in the rule set.
Pipes Will Not Work With FwdFast Rules
It is important to understand that traffic shaping will not work with connection that are established
because of a FwdFast rule in the NetDefendOS IP rule set.
The reason for this is that traffic shaping is implemented based on the NetDefendOS state engine
and a FwdFast IP rule does not set up a connection in the state engine. Packets bypass the state
engine and are forwarded to their destination outside the context of a connection. NetDefendOS
traffic shaping only takes account of traffic flowing through a connection.
Figure 10.2. FwdFast Rules Bypass Traffic Shaping
10.1.2. Traffic Shaping in
NetDefendOS
Chapter 10. Traffic Management
380
Содержание 800 - DFL 800 - Security Appliance
Страница 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Страница 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Страница 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Страница 166: ...interfaces without an overriding IGMP Setting Default 1 000 4 6 4 Advanced IGMP Settings Chapter 4 Routing 166 ...
Страница 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Страница 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Страница 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Страница 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Страница 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Страница 303: ... Changed on a regular basis such as every three months 8 1 Overview Chapter 8 User Authentication 303 ...
Страница 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Страница 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Страница 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Страница 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Страница 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Страница 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Страница 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...