10.4.5. Server Health Monitoring
SLB uses Server Health Monitoring to continuously check the condition of the servers in an SLB
configuration. SLB can monitor different OSI layers to check the condition of each server.
Regardless of the algorithms used, if a server is deemed to have failed, SLB will not open any more
connections to it until the server is restored to full functionality.
D-Link Server Load Balancing provides the following monitoring modes:
ICMP Ping
This works at OSI layer 3. SLB will ping the IP address of each individual
server in the server farm. This will detect any failed servers.
TCP Connection
This works at OSI layer 4. SLB attempts to connect to a specified port on
each server. For example, if a server is specified as running web services on
port 80, the SLB will send a TCP SYN request to that port. If SLB does not
receive a TCP SYN/ACK back, it will mark port 80 on that server as down.
SLB recognizes the conditions no response, normal response or closed port
response from servers.
10.4.6. SLB_SAT Rules
The key component in setting up SLB is the SLB_SAT rule in the IP rule set. The steps that should
be followed are:
1.
Define an Object for each server for which SLB is to be done.
2.
Define a Group which included all these objects.
3.
Define an SLB_SAT Rule in the IP rule set which refers to this Group and where all other SLB
parameters are defined.
4.
Define a further rule that duplicates the source/destination interface/network of the SLB_SAT
rule that allows traffic through. This could be one rule or a combination of:
•
ForwardFast
•
Allow
•
NAT
The table below shows the rules that would be defined for a typical scenario of a set of webservers
behind the D-Link Firewall for which the load is being balanced. The Allow rule allows external
clients to access the webservers.
Rule Name
Rule Type
Src. Interface
Src. Network
Dest. Interface
Dest. Network
WEB_SLB
SLB_SAT
any
all-nets
core
ip_ext
WEB_SLB_ALW
Allow
any
all-nets
core
ip_ext
If there are clients on the same network as the webservers that also need access to those webservers
then an NAT rule would also be used:
Rule Name
Rule Type
Src. Interface
Src. Network
Dest. Interface
Dest. Network
WEB_SLB
SLB_SAT
any
all-nets
core
ip_ext
WEB_SLB_NAT
NAT
lan
lannet
core
ip_ext
WEB_SLB_ALW
Allow
any
all-nets
core
ip_ext
Note that the destination interface is specified as core, meaning NetDefendOS itself deals with this.
The key advantage of having a separate Allow rule is that the webservers can log the exact IP
address that is generating external requests. Using only a NAT rule, which is possible, means that
10.4.6. SLB_SAT Rules
Chapter 10. Traffic Management
405
Содержание 800 - DFL 800 - Security Appliance
Страница 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Страница 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Страница 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Страница 166: ...interfaces without an overriding IGMP Setting Default 1 000 4 6 4 Advanced IGMP Settings Chapter 4 Routing 166 ...
Страница 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Страница 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Страница 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Страница 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Страница 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Страница 303: ... Changed on a regular basis such as every three months 8 1 Overview Chapter 8 User Authentication 303 ...
Страница 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Страница 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Страница 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Страница 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Страница 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Страница 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Страница 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...