Nortel Networks Network Router 212777 User Manual

Web OS Switch Software  
10.0 Application Guide  
Part Number: 212777, Revision A, February 2002  
50 Great Oaks Boulevard  
San Jose, California 95119  
408-360-5500 Main  
408-360-5501 Fax  
www.nortelnetworks.com  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Preface 21  
What Youll Find in This Guide 21  
Forming BGP Peer Routers 37  
VLAN Tagging 44  
VLANs and the IP Interfaces 45  
VLAN Topologies and Design Issues 45  
Example 1: Multiple VLANS with Tagging Adapters 46  
Example 2: Parallel Links with VLANs 48  
3
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring Bandwidth Management 454  
Additional Configuration Examples 457  
Preferential Services Examples 460  
Glossary 471  
Index 475  
12  
Contents  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 6-7: Direct Server Return 143  
Figure 7-7: Security Topology Example 185  
Figure 7-10: Active FTP for Dynamic NAT 195  
Figure 11-10: Hot-Standby Configuration 275  
Figure 11-11: Loops in Active-Active Configuration 278  
Figure 11-12: Cross-Redundancy Creates Loops, But STP Resolves Them 279  
Figure 11-13: Using VLANs to Create Non-Looping Topologies 279  
Figure 11-14: Stateful Failover Example when the Master Switch Fails 284  
14  
Figures  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 12-2: GSLB Topology Example 294  
Figure 13-6: Four-Subnet FWLB Process 327  
Figure 13-10: Typical Firewall Load-Balancing Topology with DMZ 349  
Figure 15-5: URL-Based Web Cache Redirection 396  
Figure 16-1: Cookie-Based Persistence: How It Works 424  
Figure 16-2: Insert Cookie Mode 427  
Figure 16-3: Passive Cookie Mode 428  
Figure 16-4: Rewrite Cookie Mode 429  
Figure 16-5: SSL Session ID-Based Persistence 438  
Figures  
15  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figure 17-3: Virtual Clocks and TDT 446  
Figure 17-4: URL-Based Bandwidth Management 450  
Figure 17-5: URL-Based Bandwidth Management with Web Cache Redirection 450  
Figure 17-6: Cookie-Based Bandwidth Management 451  
Figure 17-7: Cookie-Based Preferential Services 467  
16  
Figures  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Table 1-4:  
Local Routing Cache Address Ranges 35  
Table 2-2:  
Multiple Spanning Tree Groups per VLAN 54  
Table 7-2:  
Table 7-4:  
Well-Known Application Ports 171  
Web Cache Example: Real Server IP Addresses 186  
Table 8-1:  
Web Cache Example: Real Server IP Addresses 206  
Table 11-1: Active Standby Configuration 252  
Table 11-2: Sharing Active-Active Failover 260  
Table 11-3: VRRP Tracking Parameters 261  
17  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Table 12-1: GSLB Example: California Real Server IP Addresses 296  
Table 12-4: Web Host Example: Alteon 180 Port Usage 301  
Table 16-1: Comparison Among the Three Cookie Modes 427  
Table 17-1: Bandwidth Rate Limits 445  
Table 17-2: Bandwidth Policy Limits 445  
18  
Tables  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
New Features  
The following table lists the new features in Web OS 10.0 and the supported platforms:  
Feature  
Alteon Web Switches Alteon Web Switches  
AD3/180e  
AD4/184  
Vlan-based default gateway  
Vlan Filtering  
No  
Yes  
No  
Yes  
Multiple Instances of Spanning Tree  
Layer 7 deny filter  
Yes  
Yes  
Yes  
Yes  
Increase real server support to 1024  
SYN Attack Detection/Protection  
Enhanced Port Mirroring  
No  
Yes  
Yes  
Yes  
Yes  
Yes  
Reporting Classification Manager: SYSLOG and No  
SNMP  
Yes  
Reporting Classification Manager: Ability to fil- No  
ter SYSLOG based on severity  
Yes  
Yes  
Yes  
Reporting Classification Manager: SNMP traps No  
defined for VRRP state changes  
Reporting Classification Manager: SNMP traps No  
defined for failed login  
Selectable Hash Parameters  
Yes  
Yes  
Yes  
Yes  
Layer 4 DNS Load Balancing (UDP and TCP  
ports)  
L7 DNS Load Balancing  
Enhanced DNS Health Check  
TCP Rate Limiting  
Yes  
Yes  
Yes  
Yes  
Yes  
Yes  
19  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Feature  
Alteon Web Switches Alteon Web Switches  
AD3/180e  
AD4/184  
Hash on any HTTP header  
Increase support of 16 rport to vport  
Yes  
Yes  
No  
Yes  
Increased number of scripted health check to 16 No  
Yes  
Descriptive names for filters  
OSPF  
Yes  
No  
Yes  
Yes  
LDAP health check  
Streaming Cache Redirection  
L7 Parsing of RTSP SLB  
ARP health check  
Yes  
Yes  
Yes  
Yes  
Yes  
Yes  
Yes  
Yes  
Yes  
Yes  
Telnet client  
Yes  
Increase logging buffer  
Yes  
Support of OPER command on Web OS BBI and No  
SNMP  
Yes  
Enhanced Web OS Browser-based Interface  
support  
No  
Yes  
Configurable prompt name  
Bandwidth management  
Yes  
No  
Yes  
Yes  
20  
New Features  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Preface  
This Application Guide describes how to configure and use the Web OS software on the Alteon  
Web switches. For documentation on installing the switches physically, see the Hardware  
Installation Guide for your particular switch model.  
Who Should Use This Guide  
This Application Guide is intended for network installers and system administrators engaged in  
configuring and maintaining a network. The administrator should be familiar with Ethernet  
concepts, IP addressing, Spanning Tree Protocol, and SNMP configuration parameters.  
This guide will help you plan, implement, and administer Web OS software. Where possible,  
each section provides feature overviews, usage examples, and configuration instructions.  
Part 1: Basic Switching & Routing  
n
Chapter 1, Basic IP Routing,describes how to configure the Web switch for IP routing  
using IP subnets, Border Gateway Protocol (BGP), or DHCP Relay.  
n
Chapter 2, VLANs,describes how to configure Virtual Local Area Networks (VLANs)  
for creating separate network segments, including how to use VLAN tagging for devices  
that use multiple VLANs. This chapter also describes how Jumbo frames can be used to  
ease server processing overhead.  
n
n
Chapter 3, Port Trunking,describes how to group multiple physical ports together to  
aggregate the bandwidth between large-scale network devices.  
Chapter 4, OSPF,describes OSPF concepts, how OSPF is implemented in Web OS, and  
four examples of how to configure your switch for OSPF support.  
21  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
n
Chapter 5, Secure Switch Management,describes how to manage the switch using spe-  
cific IP addresses, RADIUS authentication, Secure Shell (SSH), and Secure Copy (SCP).  
Part 2: Web Switching Fundamentals  
n
Chapter 6, Server Load Balancing,describes how to configure the Web switch to bal-  
ance network traffic among a pool of available servers for more efficient, robust, and scal-  
able network services.  
n
n
n
n
Chapter 7, Filtering,describes how to configure and optimize network traffic filters for  
security and Network Address Translation purposes.  
Chapter 8, Application Redirection,describes how to use filters for redirecting traffic to  
such network streamlining devices as Web caches.  
Chapter 9, Virtual Matrix Architecture,describes how to optimize system resources by  
distributing the workload to multiple processors.  
Chapter 10, Health Checking,describes how to configure the Web switch to recognize  
the availability of the various network resources used with the various load-balancing and  
application redirection features.  
n
Chapter 11, High Availability,describes how to use the Virtual Router Redundancy Pro-  
tocol (VRRP) to ensure that network resources remain available if one Web switch fails.  
Part 3: Advanced Web Switching  
n
n
n
n
Chapter 12, Global Server Load Balancing,describes configuring Server Load Balanc-  
ing across multiple geographic sites.  
Chapter 13, Firewall Load Balancing,describes how to combine features to provide a  
scalable solution for load balancing multiple firewalls.  
Chapter 14, Virtual Private Network Load Balancing,describes using your Web switch  
to load balance secure point-to-point links.  
Chapter 15, Content Intelligent Switching,describes how to perform load balancing and  
application redirection based on Layer 7 packet content information (such as URL, HTTP  
Header, browser type, and cookies).  
n
n
Chapter 16, Persistence,describes how to ensure that all connections from a specific cli-  
ent session reach the same server. Persistence can be based on cookies or SSL session ID.  
Chapter 17, Bandwidth Management,describes how to configure the Web switch for  
allocating specific portions of the available bandwidth for specific users or applications.  
22  
Preface  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Typographic Conventions  
The following table describes the typographic styles used in this book.  
Table 1 Typographic Conventions  
Typeface or Meaning  
Symbol  
Example  
AaBbCc123  
This type is used for names of commands,  
files, and directories used within the text.  
View the readme.txtfile.  
It also depicts on-screen computer output and Main#  
prompts.  
AaBbCc123  
This bold type appears in command exam-  
ples. It shows text that must be typed in  
exactly as shown.  
Main# sys  
<AaBbCc123> This italicized type appears in command  
To establish a Telnet session, enter:  
examples as a parameter placeholder. Replace host# telnet <IP address>  
the indicated text with the appropriate real  
name or value when using the command. Do  
not type the brackets.  
This also shows book titles, special terms, or Read your Users Guide thoroughly.  
words to be emphasized.  
[ ]  
Command items shown inside brackets are  
optional and can be used or excluded as the  
situation demands. Do not type the brackets.  
host# ls [-a]  
Preface  
23  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Contacting Us  
For complete product support and sales information, visit the Nortel Networks website at the  
following URL:  
http://www.nortelnetworks.com  
See the contact information on this site for regional support and sales phone numbers and  
e-mail addresses.  
n
n
In North America, dial toll-free 1-800-4NORTEL.  
Outside North America, call 987-288-3700.  
24  
Preface  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Part 1: Basic Switching &  
Routing  
This section discusses basic Layer 1 through Layer 3 switching and routing functions. In addi-  
tion to switching traffic at near line rates, the Web switch can perform multi-protocol routing.  
This section includes the following basic switching and routing topics:  
n
n
n
n
n
n
n
Basic IP Routing  
VLANs  
Jumbo Frames  
Port Trunking  
Border Gateway Protocol (BGP)  
Open Shortest Path First (OSPF)  
Secure Switch Management  
25  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
26  
Basic Switching & Routing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 1  
This chapter provides configuration background and examples for using the Alteon Web switch  
to perform IP routing functions. The following topics are addressed in this chapter:  
n
n
n
n
n
n
Routing Between IP Subnetson page 28  
Example of Subnet Routingon page 31  
Defining IP Address Ranges for the Local Route Cacheon page 35  
Border Gateway Protocol (BGP)on page 36  
DHCP Relayon page 41  
27  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
IP Routing Benefits  
The Alteon Web switch uses a combination of configurable IP switch interfaces and IP routing  
options. The switch IP routing capabilities provide the following benefits:  
n
n
Connects the server IP subnets to the rest of the backbone network.  
Performs server load balancing (using both Layer 3 and Layer 4 switching in combina-  
tion) to server subnets that are separate from backbone subnets.  
n
n
Provides another means to invisibly introduce Jumbo frame technology into the server-  
switched network by automatically fragmenting UDP Jumbo frames when routing to non-  
Jumbo frame VLANs or subnets.  
Provides the ability to route IP traffic between multiple Virtual Local Area Networks  
(VLANs) configured on the switch.  
Routing Between IP Subnets  
The physical layout of most corporate networks has evolved over time. Classic hub/router  
topologies have given way to faster switched topologies, particularly now that switches are  
increasingly intelligent. Alteon Web switches are intelligent and fast enough to perform rout-  
ing functions on a par with wire speed Layer 2 switching.  
The combination of faster routing and switching in a single device provides another service—  
it allows you to build versatile topologies that account for legacy configurations.  
28  
Chapter 1: Basic IP Routing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
For example, consider the following topology migration:  
Admin. Subnet  
Admin/Sales  
Hub  
Switch  
Eng. Subnet  
Hub  
Eng/Staff2/Sales  
Switch  
Staff Subnet  
Hub  
Staff/Eng2  
Switch  
Server  
Subnet  
Server  
Subnet  
Web Switch  
FDDI  
Router  
FDDI  
Internet  
Internet  
Router  
Figure 1-1 The Router Legacy Network  
In this example, a corporate campus has migrated from a router-centric topology to a faster,  
more powerful, switch-based topology. As is often the case, the legacy of network growth and  
redesign has left the system with a mix of illogically distributed subnets.  
This is a situation that switching alone cannot cure. Instead, the router is flooded with cross-  
subnet communication. This compromises efficiency in two ways:  
n
Routers can be slower than switches. The cross-subnet side trip from the switch to the  
router and back again adds two hops for the data, slowing throughput considerably.  
n
Traffic to the router increases, increasing congestion.  
Even if every end-station could be moved to better logical subnets (a daunting task), competi-  
tion for access to common server pools on different subnets still burdens the routers.  
This problem is solved by using Alteon Web switches with built-in IP routing capabilities.  
Cross-subnet LAN traffic can now be routed within the Web switches with wire speed Layer 2  
switching performance. This not only eases the load on the router but saves the network  
administrators from reconfiguring each and every end-station with new IP addresses.  
Chapter 1: Basic IP Routing  
29  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Take a closer look at the Alteon Web switch in the following configuration example:  
First Floor  
Second Floor  
Third Floor  
10/100 Client Subnet 10/100 Client Subnet 10/100 Client Subnet  
100.20.10.1-254  
131.15.15.1-254  
208.31.177.1-254  
Primary Default  
Router: 205.21.17.1  
1000 Mbps  
IF#3  
IF#2  
IF#4  
1000 Mbps  
1000 Mbps  
IF#1  
IF#5  
IP Routing  
Secondary Default  
Server Subnet:  
Alteon Web Switch  
Router: 205.21.17.2  
206.30.15.1-254  
Figure 1-2 Switch-Based Routing Topology  
The Alteon Web switch connects the Gigabit Ethernet and Fast Ethernet trunks from various  
switched subnets throughout one building. Common servers are placed on another subnet  
attached to the switch. A primary and backup router are attached to the switch on yet another  
subnet.  
Without Layer 3 IP routing on the switch, cross-subnet communication is relayed to the default  
gateway (in this case, the router) for the next level of routing intelligence. The router fills in the  
necessary address information and sends the data back to the switch, which then relays the  
packet to the proper destination subnet using Layer 2 switching.  
With Layer 3 IP routing in place on the Alteon Web switch, routing between different IP sub-  
nets can be accomplished entirely within the switch. This leaves the routers free to handle  
inbound and outbound traffic for this group of subnets.  
To make implementation even easier, UDP Jumbo frame traffic is automatically fragmented to  
regular Ethernet frame sizes when routing to non-Jumbo frame VLANS or subnets. This auto-  
matic frame conversion allows servers to communicate using Jumbo frames, all transparently  
to the user.  
30  
Chapter 1: Basic IP Routing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Example of Subnet Routing  
Prior to configuring, you must be connected to the switch Command Line Interface (CLI) as  
the administrator.  
NOTE For details about accessing and using any of the menu commands described in this  
example, see the Web OS Command Reference.  
1. Assign an IP address (or document the existing one) for each real server, router, and cli-  
ent workstation.  
In the example topology in Figure 1-2 on page 30, the following IP addresses are used:  
Table 1-1 Subnet Routing Example: IP Address Assignments  
Subnet  
Devices  
IP Addresses  
1
2
3
4
5
Primary and Secondary Default Routers 205.21.17.1 and 205.21.17.2  
First Floor Client Workstations  
Second Floor Client Workstations  
Third Floor Client Workstations  
Common Servers  
100.20.10.1-254  
131.15.15.1-254  
208.31.177.1-254  
206.30.15.1-254  
2. Assign an IP interface for each subnet attached to the switch.  
Since there are five IP subnets connected to the switch, five IP interfaces are needed:  
Table 1-2 Subnet Routing Example: IP Interface Assignments  
Interface  
IF 1  
Devices  
IP Interface Address  
Primary and Secondary Default Routers 205.21.17.3  
IF 2  
First Floor Client Workstations  
Second Floor Client Workstations  
Third Floor Client Workstations  
Common Servers  
100.20.10.16  
131.15.15.1  
IF 3  
IF 4  
208.31.177.2  
206.30.15.200  
IF 5  
Chapter 1: Basic IP Routing  
31  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
IP interfaces are configured using the following commands at the CLI:  
>> # /cfg/ip/if 1  
(Select IP interface 1)  
>> IP Interface 1# addr 205.21.17.3  
>> IP Interface 1# ena  
(Assign IP address for the interface)  
(Enable IP interface 1)  
>> IP Interface 1# ../if 2  
>> IP Interface 2# addr 100.20.10.16  
>> IP Interface 2# ena  
(Select IP interface 2)  
(Assign IP address for the interface)  
(Enable IP interface 2)  
>> IP Interface 2# ../if 3  
>> IP Interface 3# addr 131.15.15.1  
>> IP Interface 3# ena  
(Select IP interface 3)  
(Assign IP address for the interface)  
(Enable IP interface 3)  
>> IP Interface 3# ../if 4  
>> IP Interface 4# addr 208.31.177.2  
>> IP Interface 4# ena  
(Select IP interface 4)  
(Assign IP address for the interface)  
(Enable IP interface 4)  
>> IP Interface 4# ../if 5  
>> IP Interface 5# addr 206.30.15.200  
>> IP Interface 5# ena  
(Select IP interface 5)  
(Assign IP address for the interface)  
(Enable IP interface 5)  
3. Set each server and workstation’s default gateway to the appropriate switch IP interface  
(the one in the same subnet as the server or workstation).  
4. Configure the default gateways to the routers’ addresses.  
Configuring the default gateways allows the switch to send outbound traffic to the routers:  
>> IP Interface 5# ../gw 1  
>> Default gateway 1# addr 205.21.17.1  
>> Default gateway 1# ena  
>> Default gateway 1# ../gw 2  
>> Default gateway 2# addr 205.21.17.2  
>> Default gateway 2# ena  
(Select primary default gateway)  
(Assign IP address for primary router)  
(Enable primary default gateway)  
(Select secondary default gateway)  
(Assign address for secondary router)  
(Enable secondary default gateway)  
5. Enable, apply, and verify the configuration.  
>> Default gateway 2# ../fwrd  
>> IP Forwarding# on  
(Select the IP Forwarding Menu)  
(Turn IP forwarding on)  
>> IP Forwarding# apply  
>> IP Forwarding# /cfg/ip/cur  
(Make your changes active)  
(View current IP settings)  
Examine the resulting information. If any settings are incorrect, make the appropriate changes.  
6. Save your new configuration changes.  
>> IP# save  
(Save for restore after reboot)  
32  
Chapter 1: Basic IP Routing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Using VLANs to Segregate Broadcast Domains  
In the previous example, devices that share a common IP network are all in the same broadcast  
domain. If you want to limit the broadcasts on your network, you could use VLANs to create  
distinct broadcast domains. For example, as shown in the following procedure, you could cre-  
ate one VLAN for the client trunks, one for the routers, and one for the servers.  
In this example, you are adding to the previous configuration.  
1. Determine which switch ports and IP interfaces belong to which VLANs.  
The following table adds port and VLAN information:  
Table 1-3 Subnet Routing Example: Optional VLAN Ports  
VLAN Devices  
IP Interface Switch Port  
1
First Floor Client Workstations  
2
3
4
1
1
5
5
1
2
3
4
5
6
7
Second Floor Client Workstations  
Third Floor Client Workstations  
Primary Default Router  
Secondary Default Router  
Common Servers 1  
2
3
Common Servers 2  
2. Add the switch ports to their respective VLANs.  
The VLANs shown in Table 1-3 are configured as follows:  
>> # /cfg/vlan 1  
(Select VLAN 1)  
>> VLAN 1# add port 1  
>> VLAN 1# add port 2  
>> VLAN 1# add port 3  
>> VLAN 1# ena  
(Add port for 1st floor to VLAN 1)  
(Add port for 2nd floor to VLAN 1)  
(Add port for 3rd floor to VLAN 1)  
(Enable VLAN 1)  
>> VLAN 1# ../VLAN 2  
>> VLAN 2# add port 4  
>> VLAN 2# add port 5  
>> VLAN 2# ena  
(Select VLAN 2)  
(Add port for default router 1)  
(Add port for default router 2)  
(Enable VLAN 2)  
>> VLAN 2# ../VLAN 3  
>> VLAN 3# add port 6  
>> VLAN 3# add port 7  
>> VLAN 3# ena  
(Add port for default router 3)  
(Select VLAN 3)  
(Select port for common server 1)  
(Enable VLAN 3)  
Chapter 1: Basic IP Routing  
33  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Each time you add a port to a VLAN, you may get the following prompt:  
Port 4 is untagged and VLAN 2 is not a configured PVID for port 4.  
Would you like to change all PVIDS for port 4 to VLAN 2 [y n]?  
Enter yto set the default Port VLAN ID (PVID) for the port.  
3. Add each IP interface to the appropriate VLAN.  
Now that the ports are separated into three VLANs, the IP interface for each subnet must be  
placed in the appropriate VLAN. From Table 1-3 on page 33, the settings are made as follows:  
>> VLAN 3# /cfg/ip/if 1  
>> IP Interface 1# vlan 2  
>> IP Interface 1# ../if 2  
>> IP Interface 2# vlan 1  
>> IP Interface 2# ../if 3  
>> IP Interface 3# vlan 1  
>> IP Interface 3# ../if 4  
>> IP Interface 4# vlan 1  
>> IP Interface 4# ../if 5  
>> IP Interface 5# vlan 3  
(Select IP interface 1 for def. routers)  
(Set to VLAN 2)  
(Select IP interface 2 for first floor)  
(Set to VLAN 1)  
(Select IP interface 3 for second floor)  
(Set to VLAN 1)  
(Select IP interface 4 for third floor)  
(Set to VLAN 1)  
(Select IP interface 5 for servers)  
(Set to VLAN 3)  
4. Apply and verify the configuration.  
>> IP Interface 5# apply  
>> IP Interface 5# /info/vlan  
>> Information# port  
(Make your changes active)  
(View current VLAN information)  
(View current port information)  
Examine the resulting information. If any settings are incorrect, make the appropriate changes.  
5. Save your new configuration changes.  
>> Information# save  
(Save for restore after reboot)  
34  
Chapter 1: Basic IP Routing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Defining IP Address Ranges for the Local  
Route Cache  
A local route cache lets you use switch resources more efficiently. The local network address  
and local network mask parameters (accessed via the /cfg/ip/frwd/local/addcom-  
mand) define a range of addresses that will be cached on the switch. The local network address  
is used to define the base IP address in the range that will be cached. The local network mask is  
applied to produce the range. To determine if a route should be added to the memory cache, the  
destination address is masked (bit-wise AND) with the local network mask and checked  
against the local network address.  
By default, the local network address and local network mask are both set to 0.0.0.0. This pro-  
duces a range that includes all Internet addresses for route caching: 0.0.0.0 through  
255.255.255.255.  
To limit the route cache to your local hosts, you could configure the parameters as shown in the  
following example:  
Table 1-4 Local Routing Cache Address Ranges  
Local Host Address Range  
0.0.0.0 - 127.255.255.255  
Local Network Address Local Network Mask  
0.0.0.0  
128.0.0.0  
128.0.0.0 - 128.255.255.255  
205.32.0.0 - 205.32.255.255  
128.0.0.0  
205.32.0.0  
128.0.0.0 or 255.0.0.0  
255.255.0.0  
NOTE Static routes must be configured within the configured range. All other addresses that  
fall outside the defined range are forwarded to the default gateway.  
Chapter 1: Basic IP Routing  
35  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Border Gateway Protocol (BGP)  
Border Gateway Protocol (BGP) is an Internet protocol that enables routers on a network to  
share and advertise routing information with each other about the segments of the IP address  
space they can access within their network and with routers on external networks. BGP allows  
you to decide what is the bestroute for a packet to take from your network to a destination  
on another network rather than simply setting a default route from your border router(s) to your  
upstream provider(s). BGP is defined in RFC 1771.  
Alteon Web switches can advertise their IP interfaces and virtual server IP addresses using  
BGP and take BGP feeds from as many as four BGP router peers. This allows more resilience  
and flexibility in balancing traffic from the Internet.  
Internal Routing Versus External Routing  
To ensure effective processing of network traffic, every router on your network needs to know  
how to send a packet (directly or indirectly) to any other location/destination in your network.  
This is referred to as internal routing and can be done with static routes or using active, inter-  
nal routing protocols, such as RIP, RIPv2, and OSPF.  
It is also useful to tell routers outside your network (upstream providers or peers) about the  
routes you can access in your network. External networks (those outside your own) that are  
under the same administrative control are referred to as autonomous systems (AS). Sharing of  
routing information between autonomous systems is known as external routing.  
External BGP (eBGP) is used to exchange routes between different autonomous systems  
whereas internal BGP (iBGP) is used to exchange routes within the same autonomous system.  
An iBGP is a type of internal routing protocol you can use to do active routing inside your net-  
work. It also carries AS path information, which is important when you are an ISP or doing  
BGP transit.  
NOTE The iBGP peers must be part of a fully meshed network, as shown in Figure 1-3.  
36  
Chapter 1: Basic IP Routing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
AS 11  
AS 20  
iBGP  
ISP A  
Web  
Switches  
eBGP  
Internet  
AS 50  
ISP B  
Figure 1-3 iBGP and eBGP  
Typically, an AS has one or more multiple border routerspeer routers that exchange routes  
with other ASsand an internal routing scheme that enables routers in that AS to reach every  
other router and destination within that AS. When you advertise routes to border routers on  
other autonomous systems, you are effectively committing to carry data to the IP space repre-  
sented in the route being advertised. For example, if you advertise 192.204.4.0/24, you are  
declaring that if another router sends you data destined for any address in 192.204.4.0/24, you  
know how to carry that data to its destination.  
Forming BGP Peer Routers  
Two BGP routers become peers or neighbors once you establish a TCP connection between  
them. For each new route, if a peer is interested in that route (for example, if a peer would like  
to receive your static routes and the new route is static), an update message is sent to that peer  
containing the new route. For each route removed from the route table, if the route has already  
been sent to a peer, an update message containing the route to withdraw is sent to that peer.  
For each Internet host, you must be able to send a packet to that host, and that host has to have a  
path back to you. This means that whoever provides Internet connectivity to that host must have  
a path to you. Ultimately, this means that they must hear a routewhich covers the section of the  
IP space you are using; otherwise, you will not have connectivity to the host in question.  
BGP Failover Configuration  
Use the following example to create redundant default gateways for an Alteon Web switch at a  
Web Host/ISP site, eliminating the possibility, should one gateway go down, that requests will  
be forwarded to an upstream router unknown to the switch.  
Chapter 1: Basic IP Routing  
37  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
As shown in Figure 1-4, the switch is connected to ISP 1 and ISP 2. The customer negotiates  
with both ISPs to allow the Web switch to use their peer routers as default gateways. The ISP  
peer routers will then need to announce themselves as default gateways to the Web switch.  
ISP 1  
ISP 2  
Peer 1 Router  
(Primary)  
IP: 200.200.200.2  
Peer 2 Router  
(Secondary)  
IP: 210.210.210.2  
AS 100  
AS 200  
Web switch  
announces  
routes with  
metric of "3"  
Alteon metric = AS path  
length (metric of '3' = local  
AS repeated 3 times  
Default gateway,  
with routes having  
shorter AS PATH  
VIP: 200.200.200.200  
Alteon Web switch  
IP: 200.200.200.1  
IP:210.210.210.1  
AS 300  
AS 300  
Real server 1  
IP: 200.200.200.10  
Real server 2  
IP: 200.200.200.11  
Figure 1-4 BGP Failover Configuration Example  
On the Web switch, one peer router (the secondary one) is configured with a longer AS path  
than the other, so that the peer with the shorter AS path will be seen by the switch as the pri-  
mary default gateway. ISP 2, the secondary peer, is configured with a metric of 3,thereby  
appearing to the switch to be three router hops away.  
1. Configure the switch as you normally would for Server Load Balancing (SLB).  
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define each real server.  
Define a real server group.  
Define a virtual server.  
Define the port configuration.  
For more information about SLB configuration, refer to Chapter 6.  
38  
Chapter 1: Basic IP Routing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
2. Define the VLANs.  
For simplicity, both default gateways are configured in the same VLAN in this example. The  
gateways could be in the same VLAN or different VLANs.  
>> # /cfg/vlan 1  
(Select VLAN 1)  
>> vlan 1# add <port number>  
>> vlan 1# ena  
(Add a port to the VLAN membership)  
(Enable VLAN 1)  
3. Define the IP interfaces.  
The switch will need an IP interface for each default gateway to which it will be connected.  
Each interface will need to be placed in the appropriate VLAN. These interfaces will be used  
as the primary and secondary default gateways for the switch.  
>> /cfg/ip/rearp 10  
>> IP# metrc strict  
>> IP# if 1  
>> IP Interface 1# ena  
>> IP Interface 1# addr 200.200.200.1  
>> IP Interface 1# mask 255.255.255.0  
(Set re-ARP period for interface to 10)  
(Set metric for default gateway)  
(Select default gateway interface 1)  
(Enable switch interface 1)  
(Configure IP address of interface 1)  
(Configure IP subnet address mask)  
>> IP Interface 1# broad 200.200.200.255 (Configure IP broadcast address)  
>> IP Interface 1# vlan 1  
>> IP Interface 1# ../ip/if 2  
>> IP Interface 2# ena  
(Configure VLAN # for this interface)  
(Select default gateway interface 2)  
(Enable switch interface 2)  
>> IP Interface 2# addr 210.210.210.1  
>> IP Interface 2# mask 255.255.255.0  
(Configure IP address of interface 2)  
(Configure IP subnet address mask)  
>> IP Interface 2# broad 210.210.210.255 (Configure IP broadcast address)  
>> IP Interface 2# vlan 1  
(Configure VLAN # for this interface)  
4. Enable IP forwarding.  
IP forwarding is used for VLAN-to-VLAN (non-BGP) routing. You need to enable IP forward-  
ing if the default gateways are on different subnets or if the switch is connected to different  
subnets and those subnets need to communicate through the switch (which they almost always  
do).  
>> /cfg/ip/ frwd on  
(Enable IP forwarding)  
NOTE To help eliminate the possibility for a Denial of Service (DoS) attack, the forwarding  
of directed broadcasts is disabled by default.  
Chapter 1: Basic IP Routing  
39  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
5. Configure BGP peer router 1 and 2.  
Peer 1 is the primary gateway router. Peer 2 is configured with a metric of 3.The metric  
option is key to ensuring gateway traffic is directed to Peer 1, as it will make Peer 2 appear to  
be three router hops away from the switch. Thus, the switch should never use it unless Peer 1  
goes down.  
>> # /cfg/ip/bgp/peer 1  
>> BGP Peer 1# ena  
>> BGP Peer 1# addr 200.200.200.2  
>> BGP Peer 1# if 200.200.200.1  
>> BGP Peer 1# las 300  
(Select BGP peer router 1)  
(Enable this peer configuration)  
(Set IP address for peer router 1)  
(Set IP interface for peer router 1)  
(Set local AS number)  
>> BGP Peer 1# ras 100  
(Set remote AS number)  
>> BGP Peer 1# ../peer 2  
>> BGP Peer 2# ena  
>> BGP Peer 2# addr 210.210.210.2  
>> BGP Peer 2# if 210.210.210.1  
>> BGP Peer 2# las 300  
(Select BGP peer router 2)  
(Enable this peer configuration)  
(Set IP address for peer router 2)  
(Set IP interface for peer router 2)  
(Set local AS number)  
>> BGP Peer 2# ras 200  
(Set remote AS number)  
>> BGP Peer 2# metric 3  
(Set AS path length to 3 router hops)  
The metric command in the peer menu tells the Alteon Web switch to create an AS path of 3”  
when advertising via BGP.  
6. On the switch, apply and save your configuration changes.  
>> BGP Peer 2# apply  
>> save  
(Make your changes active)  
(Save for restore after reboot)  
40  
Chapter 1: Basic IP Routing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
DHCP Relay  
Dynamic Host Configuration Protocol (DHCP) is a transport protocol that provides a frame-  
work for automatically assigning IP addresses and configuration information to other IP hosts  
or clients in a large TCP/IP network. Without DHCP, the IP address must be entered manually  
for each network device. DHCP allows a network administrator to distribute IP addresses from  
a central point and automatically send a new IP address when a device is connected to a differ-  
ent place in the network.  
DHCP is an extension of another network IP management protocol, Bootstrap Protocol  
(BOOTP), with an additional capability of being able to dynamically allocate reusable network  
addresses and configuration parameters for client operation.  
Built on the client/server model, DHCP allows hosts or clients on an IP network to obtain their  
configurations from a DHCP server, thereby reducing network administration. The most sig-  
nificant configuration the client receives from the server is its required IP address; (other  
optional parameters include the genericfile name to be booted, the address of the default  
gateway, and so forth).  
Nortel Networks DHCP relay agent eliminates the need to have DHCP/BOOTP servers on  
every subnet. It allows the administrator to reduce the number of DHCP servers deployed on  
the network and to centralize them. Without the DHCP relay agent, there must be at least one  
DHCP server deployed at each subnet that has hosts needing to perform the DHCP request.  
DHCP Overview  
DHCP is described in RFC 2131, and the DHCP relay agent supported on Alteon Web  
switches is described in RFC 1542. DHCP uses UDP as its transport protocol. The client sends  
messages to the server on port 67 and the server sends messages to the client on port 68.  
DHCP defines the methods through which clients can be assigned an IP address for a finite  
lease period and allowing reassignment of the IP address to another client later. Additionally,  
DHCP provides the mechanism for a client to gather other IP configuration parameters it needs  
to operate in the TCP/IP network.  
In the DHCP environment, the Alteon Web switch acts as a relay agent. The DHCP relay fea-  
ture (/cfg/ip/bootp) enables the switch to forward a client request for an IP address to  
two BOOTP servers with IP addresses that have been configured on the switch.  
When a switch receives a UDP broadcast on port 67 from a DHCP client requesting an IP  
address, the switch acts as a proxy for the client, replacing the client source IP (SIP) and desti-  
nation IP (DIP) addresses. The request is then forwarded as a UDP Unicast MAC layer mes-  
sage to two BOOTP servers whose IP addresses are configured on the switch. The servers  
Chapter 1: Basic IP Routing  
41  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
respond as a a UDP Unicast message back to the switch, with the default gateway and IP  
address for the client. The destination IP address in the server response represents the interface  
address on the switch that received the client request. This interface address tells the switch on  
which VLAN to send the server response to the client.  
DHCP Relay Agent Configuration  
To enable the Alteon Web switch to be the BOOTP forwarder, you need to configure the  
DHCP/BOOTP server IP addresses on the switch. Generally, you should configure the com-  
mand on the switch IP interface closest to the client so that the DHCP server knows from  
which IP subnet the newly allocated IP address should come.  
The following figure shows a basic DHCP network example:  
Boston  
Atlanta  
20.1.1.1  
10.1.1.2  
DHCP Client  
Web Switch  
DHCP Server  
DHCP Relay Agent  
Figure 1-5 DHCP Relay Agent Configuration  
In Alteon Web switch implementation, there is no need for primary or secondary servers. The  
client request is forwarded to the BOOTP servers configured on the switch. The use of two  
servers provide failover redundancy. However, no health checking is supported.  
Use the following commands to configure the switch as a DHCP relay agent:  
>> # /cfg/ip/bootp  
>> Bootstrap Protocol Relay# addr  
>> Bootstrap Protocol Relay# addr2  
>> Bootstrap Protocol Relay# on  
>> Bootstrap Protocol Relay# off  
>> Bootstrap Protocol Relay# cur  
(Set IP address of BOOTP server)  
(Set IP address of 2nd BOOTP server)  
(Globally turn BOOTP relay on)  
(Globally turn BOOTP relay off)  
(Display current configuration)  
Additionally, DHCP Relay functionality can be assigned on a per interface basis. Use the fol-  
lowing command to enable the Relay functionality:  
>> # /cfg/ip/if <interface number>/relay ena  
42  
Chapter 1: Basic IP Routing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
CHAPTER 2  
VLANs  
This chapter describes network design and topology considerations for using Virtual Local Area  
Networks (VLANs). VLANs are commonly used to split up groups of network users into man-  
ageable broadcast domains, to create logical segmentation of workgroups, and to enforce security  
policies among logical segments. The following topics are discussed in this chapter:  
n
n
n
VLAN ID Numberson page 44  
VLANs and the IP Interfaceson page 45  
This section briefly describes how management functions can only be accomplished from  
stations on VLANs that include an IP interface to the switch.  
n
VLAN Topologies and Design Issueson page 45  
This section discusses how you can logically connect users and segments to a host that  
supports many logical segments or subnets by using the flexibility of the multiple VLAN  
system.  
n
n
n
VLANs and Spanning Tree Protocolon page 49  
VLANs and Default Gatewayson page 58  
VLANs and Jumbo Frameson page 63  
NOTE Basic VLANs can be configured during initial switch configuration (see Using the  
Setup Utilityin the Web OS Command Reference). More comprehensive VLAN configuration  
can be done from the Command Line Interface (see VLAN Configurationas well as Port  
Configurationin the Web OS Command Reference).  
43  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
VLAN ID Numbers  
Web OS supports up to 246 VLANs per switch. Even though the maximum number of VLANs  
supported at any given time is 246, each can be identified with any number between 1 and  
4094.  
VLANs are defined on a per-port basis. Each port on the switch can belong to one or more  
VLANs, and each VLAN can have any number of switch ports in its membership. Any port  
that belongs to multiple VLANs, however, must have VLAN tagging enabled (see VLAN  
Taggingon page 44).  
Each port in the switch has a configurable default VLAN number, known as its PVID. The fac-  
tory default value of all PVIDs is 1. This places all ports on the same VLAN initially, although  
each ports PVID is configurable to any VLAN number between 1 and 4094.  
Any untagged frames (those with no VLAN specified) are classified with the sending ports  
PVID.  
VLAN Tagging  
Web OS software supports 802.1Q VLAN tagging, providing standards-based VLAN support  
for Ethernet systems.  
Tagging places the VLAN identifier in the frame header, allowing multiple VLANs per port.  
When you configure multiple VLANs on a port, you must also enable tagging on that port.  
Since tagging fundamentally changes the format of frames transmitted on a tagged port, you  
must carefully plan network designs to prevent tagged frames from being transmitted to  
devices that do not support 802.1Q VLAN tags.  
44  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
VLANs and the IP Interfaces  
Carefully consider how you create VLANs within the switch, so that communication with the  
switch Management Processor (MP) remains possible.  
You can access the switch for remote configuration, trap messages, and other management  
functions only from stations on VLANs that include an IP interface to the switch (see IP Inter-  
face Menusection in the Web OS Command Reference). Likewise, you can cut off access to  
management functions to any VLAN by excluding IP interfaces from the VLANs member-  
ship.  
For example, if all IP interfaces are left on VLAN 1 (the default), and all ports are configured  
for VLANs other than VLAN 1, then switch management features are effectively cut off. If an  
IP interface is added to one of the other VLANs, the stations in that VLAN will all have access  
to switch management features.  
VLAN Topologies and Design Issues  
By default, the Web OS software has a single VLAN configured on every port. This configura-  
tion groups all ports into the same broadcast domain. The VLAN has an 802.1Q VLAN PVID  
of 1. VLAN tagging is turned off, because by default only a single VLAN is configured per  
port.  
Since VLANs are most commonly used to create individual broadcast domains and/or separate  
IP subnets, host systems should be present on more than one VLAN simultaneously. Alteon  
Web switches and VLAN-tagging server adapters support multiple VLANS on a per-port or  
per-interface basis, allowing very flexible configurations.  
You can configure multiple VLANs on a single VLAN-tagging server adapter, with each  
VLAN being configured through a logical interface and logical IP address on the host system.  
Each VLAN configured on the server adapter must also be configured on the switch port to  
which it is connected. If multiple VLANs are configured on the port, tagging must be turned  
on.  
Using this flexible multiple VLAN system, you can logically connect users and segments to a  
host with a single VLAN-tagging adapter that supports many logical segments or subnets.  
Chapter 2: VLANs  
45  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Example 1: Multiple VLANS with Tagging Adapters  
Server #1  
VLAN #3  
Server #2  
Gigabit/Tagged  
adapter  
(All VLANs)  
Alteon  
Web Switch  
Shared Media  
PC #1  
VLAN #2  
PC #2  
VLAN #2  
PC #3  
VLAN #1  
PC #4  
VLAN #3  
PC #5  
Gigabit/Tagged  
adapter  
VLANs #1 & #2  
Figure 2-1 Example 1: Multiple VLANs with Tagging Gigabit Adapters  
The features of this VLAN are described below:  
Component  
Description  
Web Switch  
This switch is configured for three VLANs that represent three differ-  
ent IP subnets. Two servers and five clients are attached to the switch.  
Server #1  
Server #2  
This server is part of VLAN 3 and only has presence in one IP subnet.  
The port that the VLAN is attached to is configured only for VLAN 3,  
so VLAN tagging is off.  
This high-use server needs to be accessed from all VLANs and IP sub-  
nets. The server has an VLAN-tagging adapter installed with VLAN  
tagging turned on. The adapter is attached to one of the Web switchs  
Gigabit Ethernet ports, that is configured for VLANs 1, 2, and 3. Tag-  
ging is turned on. Because of the VLAN tagging capabilities of both the  
adapter and the switch, the server is able to communicate on all three IP  
subnets in this network. Broadcast separation between all three VLANs  
and subnets, however, is maintained.  
46  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Component  
Description  
PCs #1 and #2  
These PCs are attached to a shared media hub that is then connected to  
the switch. They belong to VLAN 2 and are logically in the same IP  
subnet as Server 2 and PC 5. Tagging is not enabled on their switch  
port.  
PC #3  
PC #4  
PC #5  
A member of VLAN 1, this PC can only communicate with Server 2  
and PC 5.  
A member of VLAN 3, this PC can only communicate with Server 1  
and Server 2.  
A member of both VLAN 1 and VLAN 2, this PC has VLAN-tagging  
Gigabit Ethernet adapter installed. It can communicate with Server #2  
via VLAN 1, and to PC #1 and PC #2 via VLAN 2. The switch port to  
which it is connected is configured for both VLAN 1 and VLAN 2 and  
has tagging enabled.  
NOTE VLAN tagging is required only on ports that are connected to other Alteon Web  
switches or on ports that connect to tag-capable end-stations, such as servers with VLAN-  
tagging adapters.  
Chapter 2: VLANs  
47  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Example 2: Parallel Links with VLANs  
Web Switch  
Gigabit  
Powered  
10/100/10000 Mbps Ethernet Server Switch  
Data  
Link  
Active  
1
2
3
4
5
6
7
8
Data  
Link  
9
Data  
Link  
Active  
Power  
Console  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
Gigabit Ethernet Port 7  
VLAN #10, VLAN #22  
Gigabit Ethernet Port 8  
VLAN #32, VLAN #109  
Web Switch  
Gigabit  
Powered  
10/100/10000 Mbps Ethernet Server Switch  
Data  
Link  
Active  
1
2
3
4
5
6
7
8
Data  
9
Link  
Data  
Link  
Active  
Power  
Console  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
020  
Figure 2-2 Example 2: Parallel Links with VLANs  
The following items describe the features of this example:  
n
Example 2 shows how it is possible, through the use of VLANs, to create configurations  
where there are multiple links between two switches, without creating broadcast loops.  
n
Two Alteon Web switches are connected with two different Gigabit Ethernet links. With-  
out VLANs, this configuration would create a broadcast loop, but the STP topology reso-  
lution process resolves parallel loop-creating links.  
n
n
n
To prevent broadcast loops, port 7 is on VLAN 10 and VLAN 22, port 8 is on VLAN 32  
and VLAN 109. Both switch-to-switch links are on different VLANs and, thus, are sepa-  
rated into their own broadcast domains.  
Ports 1 and 2 on both switches are on VLAN 10; ports 3 and 4 on both switches are on  
VLAN 22; Ports 5 and 6 on both switches are on VLAN 32; port 9 on both switches are on  
VLAN 109.  
It is necessary to turn on Spanning Tree Protocol (STP) on at least one of the switch-to-  
switch links or, alternately, turned on in both switches. STP Bridge Protocol Data Units  
(BPDUs) will be transmitted out both Gigabit Ethernet ports and interpreted by the switch  
that there is a loop to resolve.  
n
Spanning Tree is VLAN-aware.  
48  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
VLANs and Spanning Tree Protocol  
Spanning Tree Protocol (STP) detects and eliminates logical loops in a bridged or switched  
network. STP forces redundant data paths into a standby (blocked) state. When multiple paths  
exist, Spanning Tree configures the network so that a switch uses only the most efficient path.  
If that path fails, Spanning Tree automatically sets up another active path on the network to  
sustain network operations.  
The relationship between port, trunk groups, VLANs, and Spanning Trees is shown in  
Table 2-1.  
Table 2-1 Ports, Trunk Groups, and VLANs  
Switch Element  
Belongs to  
Port  
Trunk group  
or  
One or more VLANs  
Trunk group  
VLAN  
One or more VLANs  
One Spanning Tree group  
NOTE Due to Spanning Trees sequence of listening, learning, and forwarding or blocking,  
lengthy delays may occur. For more information on using STP in cross-redundant topologies,  
see Eliminating Loops with STP and VLANson page 278.  
Chapter 2: VLANs  
49  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Bridge Protocol Data Units (BPDUs)  
To create a Spanning Tree, the Web switch generates a configuration Bridge Protocol Data  
Unit (BPDU), which it then forwards out of its ports. All switches in the Layer 2 network par-  
ticipating in the Spanning Tree gather information about other switches in the network through  
an exchange of BPDUs.  
A BPDU is a 64-byte packet that is sent out at a configurable interval, which is typically set for  
two seconds. The BPDU is used to establish a path, much like a hellopacket in IP routing.  
BPDUs contain information about the transmitting bridge and its ports, including bridge and  
MAC addresses, bridge priority, port priority, and path cost. If the ports are tagged, each port  
sends out a special BPDU containing the tagged information.  
The generic action of a switch on receiving a BPDU is to compare the received BPDU to its  
own BPDU that it will transmit. If the received BPDU is better than its own BPDU, it will  
replace its BPDU with the received BPDU. Then, the Web switch adds its own bridge ID num-  
ber and increments the path cost of the BPDU. The Web switch uses this information to block  
any necessary ports.  
Determining the Path for Forwarding BPDUs  
When determining which port to use for forwarding and which port to block, Web switches use  
information in the BPDU, including each bridge priority ID. A technique based on the lowest  
root costis then computed to determine the most efficient path for forwarding.  
For more information on bridge priority, port priority, and port cost, refer to the Web OS 10.0  
Command Reference. Much like least-cost routing, root cost assigns lower values to high-  
bandwidth ports, such as Gigabit Ethernet, to encourage their use. For example, a 10-Mbps  
link has a costof 100, a 100-Mbps (Fast Ethernet) link carries a cost of 19, and a 1000-Mbps  
(or Gigabit Ethernet) link has a cost of 4. The objective is to use the fastest links so that the  
route with the lowest cost is chosen.  
50  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Multiple Spanning Trees  
Web OS 10.0 supports up to 16 instances of Spanning Trees or Spanning Tree groups. Each  
VLAN can be placed on a unique Spanning Tree group per switch except for the default Span-  
ning Tree group (STG 1). The default Spanning Tree group (1) can have more than one VLAN.  
All other Spanning Tree groups (2-16) can have only one VLAN associated with it. Spanning  
Tree can be enabled or disabled for each port. Multiple Spanning Trees can be enabled on  
tagged or untagged ports.  
NOTE By default, all newly created VLANs are members of Spanning Tree Group 1.  
Why Do We Need Multiple Spanning Trees?  
Figure 2-3 shows a simple example of why we need multiple Spanning Trees. Two VLANs,  
VLAN 1 and VLAN 100 exist between Web switch A and Web switch B. If you have a single  
Spanning Tree group, the switches see an apparent loop, and one VLAN may become blocked,  
affecting connectivity, even though no actual loop exists.  
If VLAN 1 and VLAN 100 belong to different Spanning Tree Groups, then the two instances  
of Spanning Tree separate the topology without forming a loop. Both VLANs can forward  
packets between the Web switches without losing connectivity.  
VLAN 1  
VLAN 100  
Web Switch A  
Web Switch B  
Spanning Tree Group 1: VLAN 1  
Spanning Tree Group 2: VLAN 100  
Figure 2-3 Using Multiple Instances of Spanning Tree Protocol  
Chapter 2: VLANs  
51  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Example of a Four-Switch Topology with a Single Spanning Tree  
In the four-switch topology example shown in Figure 2-4 on page 52, and assuming Web  
switch A has a higher priority, you can have at least three loops on the network:  
n
n
n
Data flowing from Web switches A to B to C and back to Web switch A.  
Data flowing from Web switches A to C to D and back to Web switch A  
Data flowing from Web switches A to B to C to D and back to Web switch A.  
With a single Spanning Tree environment, as shown in Figure 2-4, you will have two links  
blocked to prevent loops on the network. It is possible that the blocks may be between Web  
switches C and D and between Web switches B and C, depending on the bridge priority, port  
priority, and port cost. The two blocks would prevent looping on the network, but the blocked  
link between Web switches B and C will inadvertently isolate VLAN 3 altogether.  
NOTE For more information on bridge priority, port priority, and port cost see the Web OS  
10.0 Command Reference.  
Web Switch A  
Web Switch B  
Web Switch D  
STG 1  
Blocked Port  
Web Switch C  
Figure 2-4 VLAN 3 Isolated in a Single Spanning Tree Group  
52  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Example of a Four-Switch Topology with Multiple Spanning Trees  
If multiple Spanning Trees are implemented and each VLAN is on a different Spanning Tree,  
elimination of logical loops will not isolate any VLAN.  
Figure 2-5 shows the same four-switch topology as in Figure 2-4 on page 52, but with multiple  
Spanning Trees enabled. The VLANs are identified on each of the three shaded areas connect-  
ing the switches. The port numbers are shown next to each switch. The Spanning Tree Group  
(STG) number for each VLAN is shown at the switch.  
Web Switch A  
STG 1  
STG 2  
Port 8  
Port 1  
Port 2  
VLAN 2  
STG 1  
Port 1  
STG 1  
Web Switch B  
Port 1  
Port 8  
Web Switch D  
VLAN 1  
Port 8  
STG 2  
VLAN 3  
Port 2  
Port 1  
STG 1  
Port 8  
STG 2  
Web Switch C  
Figure 2-5 Implementing Multiple Spanning Tree Groups  
Three instances of Spanning Tree are configured in the example shown in Figure 2-5. Refer to  
Table 2-2 on page 54 to identify the Spanning Tree group a VLAN is participating in for each  
switch.  
Chapter 2: VLANs  
53  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Table 2-2 Multiple Spanning Tree Groups per VLAN  
VLAN 1  
VLAN 2  
VLAN 3  
Web Switch A Spanning Tree Group 1  
Ports 1 and 2  
Spanning Tree Group 2  
Port 8  
Web Switch B  
Spanning Tree Group 1  
Port 1  
Spanning Tree Group 2  
Port 8  
Web Switch C Spanning Tree Group 1  
Ports 1 and 2  
Spanning Tree Group 2  
Port 8  
Web Switch D Spanning Tree Group 1  
Ports 1 and 8  
Switch-Centric Spanning Tree Protocol  
In Figure 2-5 on page 53, VLAN 2 is shared by Web switch A and B on ports 8 and 1 respec-  
tively. Web switch A identifies VLAN 2 in Spanning Tree group 2 and Web switch B identifies  
VLAN 2 in Spanning Tree group 1. Spanning Tree group is switch-centricit is used to iden-  
tify the VLANs participating in the Spanning Tree groups. The Spanning Tree group ID is not  
transmitted in the BPDU. Each Spanning Tree decision is based on the configuration of that  
switch.  
54  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
VLAN Participation in Spanning Tree Groups  
The VLAN participation for each Spanning Tree group in Figure 2-5 on page 53 is discussed in  
the following sections:  
n
VLAN 1 Participation  
If Web switch A is the root bridge, then Web switch A will transmit the BPDU for VLAN  
1 on ports 1 and 2. Web switch C receives the BPDU on its port 2 and Web switch D  
receives the BPDU on its port 1. Web switch D will block port 8 or Web switch C will  
block port 1 depending on the information provided in the BPDU.  
n
VLAN 2 Participation  
Web switch A, the root bridge generates another BPDU for Spanning Tree Group 2 and  
forwards it out from port 8. Web switch B receives this BPDU on its port 1. Port 1 on Web  
switch B is on VLAN 2, Spanning Tree group 1. Because Web switch B has no additional  
ports participating in Spanning Tree group 1, this BPDU is not be forwarded to any addi-  
tional ports and Web switch A remains the designated root.  
n
VLAN 3 Participation  
For VLAN 3 you can have Web switch B or C to be the root bridge. If Web switch B is the  
root bridge for VLAN 3, Spanning Tree group 2, then Web switch B transmits the BPDU  
out from port 8. Web switch C receives this BPDU on port 8 and is identified as participat-  
ing in VLAN 3, Spanning Tree group 2. Since Web switch C has no additional ports par-  
ticipating in Spanning Tree group 2, this BPDU is not forwarded to any additional ports  
and Web switch B remains the designated root.  
Chapter 2: VLANs  
55  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring Multiple Spanning Tree Groups  
This configuration shows how to configure the three instances of Spanning Tree groups on the  
Web switches A, B, C, and D illustrated in Figure 2-5 on page 53.  
By default Spanning Trees 2-15 are empty, and Spanning Tree Group 1 contains all configured  
VLANs until individual VLANs are explicitly assigned to other Spanning Tree groups. You  
can have only one VLAN per Spanning Tree group except for Spanning Tree group 1.  
1. Configure the following on Web switch A:  
Add port 8 to VLAN 2 and define Spanning Tree group 2 for VLAN 2.  
>> # /cfg/vlan2  
>> VLAN 2# add 8  
>> VLAN 2# ../stp  
(Select VLAN 2 menu)  
(Add port 8)  
(Select STP menu)  
>> Enter Spanning Tree group index [1-16]#2 (Select Spanning Tree Group 2)  
>> Spanning Tree Group 2# add 2 (Add VLAN 2)  
VLAN 2 is automatically removed from Spanning Tree Group 1.  
2. Configure the following on Web switch B:  
Add port 1 to VLAN 2, port 8 to VLAN 3 and define Spanning Tree groups 2 for VLAN 3.  
>> # /cfg/vlan2  
(Select VLAN 2 menu)  
(Add port 1)  
(Select STP menu)  
(Select VLAN 3 menu)  
(Add port 8)  
>> VLAN 2# add 1  
>> VLAN 2# ../stp  
>> VLAN 2# ../vlan3  
>> VLAN 3# add 8  
>> VLAN 3# ../stp  
(Select STP menu)  
>> Enter Spanning Tree group index [1-16]#2(Select group 2)  
>> Spanning Tree Group 2# add 2 (Add VLAN 3)  
VLAN 3 is automatically removed from Spanning Tree group 1 and by default VLAN 2  
remains in Spanning Tree group 1.  
NOTE Each instance of Spanning Tree group is enabled by default.  
56  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
3. Configure the following on Web switch C:  
Add port 8 to VLAN 3 and define Spanning Tree group 3 for VLAN 3.  
>> # /cfg/vlan3  
>> VLAN 3# add 8  
>> VLAN 3# ../stp  
(Select VLAN 3 menu)  
(Add port 8)  
(Select STP menu)  
>> Enter Spanning Tree group index [1-16]#3 (Select group 3)  
>> Spanning Tree Group 2# add 3 (Add VLAN 3)  
VLAN 3 is automatically removed from Spanning Tree group 1 and by default VLAN 2  
remains in Spanning Tree Group 1.  
NOTE Web switch D does not require any special configuration for multiple Spanning Trees,  
because it configured for the default Spanning Tree group (STG 1) only.  
Chapter 2: VLANs  
57  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
VLANs and Default Gateways  
Web OS allows you to assign different default gateways for each VLAN. You can effectively  
map multiple customers to specific gateways on a single switch. The benefits of segregating  
customers to different default gateways are:  
n
n
n
Resource optimization  
Enhanced customer segmentation  
Improved service differentiation  
Segregating VLAN Traffic  
Deploy this feature in an environment where you want to segregate VLAN traffic to a config-  
ured default gateway. In Figure 2-6, VLANs 2 and 3 have different routing requirements.  
VLAN 2 is required to route traffic through default gateway 5 and VLAN 3 is required to route  
traffic through default gateway 6.  
Router 1  
VLAN 4  
10.10.1.20  
Gateway 5: 10.10.1.20  
Gateway 6: 10.10.1.30  
Gateway 1: 10.10.4.1  
VLAN 2 using Gateway 5  
172.21.2.1  
nortelnetworks.com  
192.168.20.200  
7
Web Switch  
1
IF 3: 172.21.2.200  
IF 4: 172.21.3.200  
2
Internet  
Router 2  
VLAN 4  
10.10.1.30  
3
8
yahoo.com  
200.1.2.200  
IF 1: 10.10.1.1  
IF 2: 10.10.4.40  
VLAN 3 using Gateway 6  
172.21.3.1  
Router 3  
VLAN 1  
10.10.4.1  
Figure 2-6 Default Gateways per VLAN  
You can configure 246 default gateways per VLAN with values starting from 5 through 250. If  
default gateways per VLAN fail, then traffic is directed to default gateways 1 through 4.  
Default gateways 1 through 4 are used for load balancing session requests and as backup when  
a specific gateway that has been assigned to a VLAN is down.  
58  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
In the example shown in Figure 2-6, if default gateways 5 or 6 fail, then traffic is directed to  
default gateway 1, which is configured with IP address 10.10.4.1. If default gateways 1  
through 4 are not configured on the switch, then packets from VLAN 2 and VLAN 3 are dis-  
carded.  
The route cache table on the switch records each session request by mapping the destination IP  
address with the MAC address of the default gateway. The command /info/arp/dumpon  
the switch command line will display the entries in the route cache similar to those shown in  
Table 2-3. The destination IP addresses (see the last two rows) are associated with the MAC  
addresses of the default gateways.  
Table 2-3 Route Cache Example  
Destination IP  
address  
Flags MAC address  
VLAN Port  
Referenced  
ports  
10.10.1.1  
P
00:60:cf:46:48:60  
00:60:cf:44:cd:a0  
00:60:cf:42:3b:40  
00:60:cf:42:77:e0  
00:60:cf:46:48:60  
00:50:da:17:c8:05  
00:60:cf:46:48:60  
00:c0:4f:09:3e:56  
00:60:cf:46:48:60  
00:60:cf:44:cd:a0  
00:60:cf:42:3b:40  
4
1-9  
empty  
empty  
empty  
1-9  
1
10.10.1.20  
10.10.1.30  
10.10.4.1  
4
4
1
1
2
2
3
3
4
4
1
2
3
10.10.4.40  
172.21.2.27  
172.21.2.200  
172.21.3.14  
172.21.2.200  
192.168.20.200  
200.1.2.200  
P
P
7
8
1-9  
2
1-9  
7
R
R
1
2
8
As shown in Table 2-3, traffic from VLAN 2 uses Gateway 5 to access destination IP address  
192.168.20.200. If traffic from VLAN 3 requests the same destination address, then traffic is  
routed via Gateway 5 instead of Gateway 6, because 192.168.20.200 in the route cache is  
mapped to Gateway 5. If the requested route is not in the route cache, then the switch reads the  
routing table. If the requested route is not in the routing table, then the switch looks at the con-  
figured default Gateway.  
Chapter 2: VLANs  
59  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Configuring the Local Network  
To completely segregate VLAN traffic to its own default gateway, you can configure the local  
network addresses of the VLAN. This will ensure that all traffic from VLAN 2 is forwarded to  
Gateway 5 and all traffic from VLAN 3 is forwarded to Gateway 6.  
Typically, the switch routes traffic based on the routes in the routing table. The routing table  
will contain an entry of the configured local network with the default gateway. The route cache  
will not contain the route entry. This configuration provides a more secure environment, but  
affects performance if the routing table is close to its maximum capacity.  
NOTE Web OS allows you to configure up to five local networks.  
Configuring Default Gateways per VLAN  
Follow this procedure to configure the example shown in Figure 2-6:  
1. Assign an IP address for each router and client workstation.  
2. Assign an IP interface for each subnet attached to the switch.  
>> /cfg/ip/if 1  
(Select IP interface 1 for gateway 5 &  
6 subnet)  
>> IP Interface 1# addr 10.10.1.1  
>> IP Interface 1# mask 255.255.255.0  
>> IP Interface 1# broad 10.10.1.255  
>> IP Interface 1# vlan 4  
(Assign IP address for interface 1)  
(Assign mask for IF 1)  
(Assign broadcast address for IF 1)  
(Assign VLAN 4 to IF 1)  
>> IP Interface 1# ../if 2  
(Select IP interface 2 for gateway 1)  
(Assign IP address for interface 2)  
(Assign mask for IF 2)  
(Assign broadcast address for IF 2)  
(Assign VLAN 1 to IF 2)  
>> IP Interface 2# addr 10.10.4.40  
>> IP Interface 2# mask 255.255.255.0  
>> IP Interface 2# broad 10.10.4.255  
>> IP Interface 2# vlan 1  
>> IP Interface 2# ../if 3  
(Select IP interface 3 for VLAN 2  
subnet)  
>> IP Interface 3# addr 172.21.2.200  
>> IP Interface 3# mask 255.255.255.0  
>> IP Interface 3# broad 172.21.2.255  
>> IP Interface 3# vlan 2  
(Assign IP address for interface 3)  
(Assign mask for IF 3)  
(Assign broadcast address for IF 3)  
(Assign VLAN 2 to IF 3)  
>> IP Interface 3# ../if 4  
(Select IP interface 4 for VLAN 3)  
subnet)  
>> IP Interface 4# addr 172.21.3.200  
>> IP Interface 4# mask 255.255.255.0  
>> IP Interface 4# broad 172.21.3.255  
>> IP Interface 4# vlan 3  
(Assign IP address for interface 4)  
(Assign mask for IF 4)  
(Assign broadcast address for IF 4)  
(Assign VLAN 3 to IF 4)  
60  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
3. Configure the default gateways.  
Configuring default gateways 5 and 6 for VLANs 2 and 3 respectively. Configure default gate-  
way 1 for load balancing session requests and as backup when default gateways 5 and 6 fail.  
>> /cfg/ip/gw 5  
(Select default gateway 5)  
>> Default gateway 5# addr 10.10.1.20  
>> Default gateway 5# ../gw 6  
>> Default gateway 6# addr 10.10.1.30  
>> Default gateway 6# ../gw 1  
>> Default gateway 1# addr 10.10.4.1  
(Assign IP address for gateway 5)  
(Select default gateway 6)  
(Assign IP address for gateway 6)  
(Select default gateway 1)  
(Assign IP address for gateway 1)  
NOTE The IP address for default gateways 1 to 4 must be unique. IP addresses for default  
gateways 5 to 250 can be set to the same IP address as the other gateways (including default  
gateway 1 to 4). For example, you can configure two default gateways with the same IP  
address for two different VLANs.  
4. Add the VLANs to the default gateways and enable them.  
>> /cfg/ip/gw 5  
(Select default gateway 5)  
>> Default gateway 5# vlan 2  
>> Default gateway 5# ena  
>> Default gateway 5# ../ gw 6  
>> Default gateway 6# vlan 3  
>> Default gateway 6# ena  
>> Default gateway 6# ../gw 1  
>> Default gateway 1# ena  
(Add VLAN 2 for default gateway 5)  
(Enable default gateway 5)  
(Select default gateway 6)  
(Add VLAN 3 for default gateway 6)  
(Enable default gateway 6)  
(Select default gateway 1)  
(Enable gateway 1 for all VLAN s)  
5. Apply and verify your configuration.  
>> Default gateway 1# ../cur  
(View current IP settings)  
Examine the results under the gateway section. If any settings are incorrect, make the appropri-  
ate changes.  
Chapter 2: VLANs  
61  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
6. (Optional) Configure the local networks to ensure that the VLANs use the configured  
default gateways.  
>> IP# frwd/local  
>> IP Forwarding# add 10.10.0.0  
(Select the local network Menu)  
(Specify the network for routers 1, 2,  
& 3)  
>> IP Forwarding# mask 255.255.0.0  
>> IP Forwarding# add 172.21.2.0  
>> IP Forwarding# mask 255.255.255.0  
>> IP Forwarding# add 172.21.3.0  
>> IP Forwarding# mask 255.255.255.0  
(Add the mask for the routers)  
(Specify the network for VLAN 2)  
(Add the mask for VLAN 2 network)  
(Specify the network for VLAN 3)  
(Add the mask for VLAN 3)  
7. Apply and save your new configuration changes.  
>> IP Forwarding# apply  
>> IP Forwarding#save  
62  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
VLANs and Jumbo Frames  
To reduce host frame processing overhead, Gigabit network adapters that can handle frame  
sizes of 9K and higher (such as the 3COM PCI-X/PCI Gigabit adapters) and Alteon Web  
switches, both running operating Web OS version 2.0 or later, can receive and transmit frames  
that are far larger than the maximum normal Ethernet frame. By sending one Jumbo frame  
instead of myriad smaller frames, the same task is accomplished with less processing.  
The switches and the adapter should support Jumbo frame sizes up to 9018 octets. Jumbo  
frames can be transmitted and received between Gigabit adapter-enabled hosts through the  
switch across any VLAN that has Jumbo frames enabled.  
Isolating Jumbo Frame Traffic using VLANs  
Jumbo frame traffic must not be used on a VLAN where there is any device that cannot process  
frame sizes larger than Ethernet maximum frame size.  
Additional VLANs can be configured on the adapters and switches to support non-Jumbo  
frame VLANs for servers and workstations that do not support extended frame sizes. End-sta-  
tions installed with Jumbo frames-capable Gigabit adapters, and attached to Web switches can  
communicate across both the Jumbo frame VLANs and regular frame VLANs at the same  
time.  
In the example illustrated in Figure 2-7 on page 64, the two servers can handle Jumbo frames  
but the two clients cannot; therefore Jumbo frames should only be enabled and used on the  
VLAN represented by the solid lines but not for the VLAN with the dashed lines. Jumbo  
frames are not supported on ports that are configured for half-duplex mode.  
Chapter 2: VLANs  
63  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Jumbo Frame  
VLAN  
Normal Frame  
VLAN  
Normal Frame  
VLAN  
Figure 2-7 Jumbo Frame VLANs  
Routing Jumbo Frames to Non-Jumbo Frame VLANs  
When IP routing is used to route traffic between VLANs, the switch will fragment Jumbo UDP  
datagrams when routing from a Jumbo frame VLAN to a non-Jumbo frame VLAN. The result-  
ing Jumbo frame to regular frame conversion makes implementation even easier.  
64  
Chapter 2: VLANs  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
CHAPTER 3  
Port Trunking  
Trunk groups can provide super-bandwidth, multi-link connections between Alteon Web  
switches or other trunk-capable devices. A trunk group is a group of ports that act together,  
combining their bandwidth to create a single, larger virtual link. This chapter provides configu-  
ration background and examples for trunking multiple ports together:  
n
n
Overview  
Port Trunking Exampleon page 67  
Overview  
When using port trunk groups between two Alteon Web switches as shown in Figure 3-1, you  
can create a virtual link between the switches operating up to six gigabits per second, depend-  
ing on how many physical ports are combined. The switch supports up to four trunk groups per  
switch, each with two to six links.  
Web Switch  
Gigabit  
Web Switch  
10/100/10000 Mbps Ethernet Server Switch  
Gigabit  
Powered  
Powered  
10/100/10000 Mbps Ethernet Server Switch  
Data  
Link  
Active  
Data  
Link  
Active  
1
2
3
4
5
6
7
8
Data  
Link  
1
2
3
4
5
6
7
8
Data  
Link  
9
9
Data  
Link  
Data  
Link  
Active  
Active  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
Power  
Console  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
Power  
Console  
041  
Aggregate Port Trunk  
Figure 3-1 Port Trunk Group  
Trunk groups are also useful for connecting an Alteon Web switch to third-party devices that  
support link aggregation, such as Cisco routers and switches with EtherChannel technology  
(not ISL trunking technology) and Sun's Quad Fast Ethernet Adapter. Nortel Networks trunk  
group technology is compatible with these devices when they are configured manually.  
65  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Web OS 10.0 Application Guide  
Statistical Load Distribution  
Network traffic is statistically load balanced between the ports in a trunk group. The Web OS-  
powered switch uses both the Layer 2 MAC address and Layer 3 IP address information  
present in each transmitted frame for determining load distribution.  
The addition of Layer 3 IP address examination is an important advance for traffic distribution  
in trunk groups. In some port trunking systems, only Layer 2 MAC addresses are considered in  
the distribution algorithm. Each packets particular combination of source and destination  
MAC addresses results in selecting one line in the trunk group for data transmission. If there  
are enough Layer 2 devices feeding the trunk lines, then traffic distribution becomes relatively  
even. In some topologies, however, only a limited number of Layer 2 devices (such as a hand-  
ful of routers and servers) feed the trunk lines. When this occurs, the limited number of MAC  
address combinations encountered results in a lopsided traffic distribution, which can reduce  
the effective combined bandwidth of the trunked ports.  
By adding Layer 3 IP address information to the distribution algorithm, a far wider variety of  
address combinations is seen. Even with just a few routers feeding the trunk, the normal  
source/destination IP address combinations (even within a single LAN) can be widely varied.  
This results in a wider statistical load distribution and maximizes the use of the combined  
bandwidth available to trunked ports.  
Built-In Fault Tolerance  
Since each trunk group is comprised of multiple physical links, the trunk group is inherently  
fault tolerant. As long as one connection between the switches is available, the trunk remains  
active.  
Statistical load balancing is maintained whenever a port in a trunk group is lost or returned to  
service.  
66  
Chapter 3: Port Trunking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Port Trunking Example  
In the example below, three ports will be trunked between two Alteon Web switches.  
Switch #1  
Switch #2  
Web Switch  
Gigabit  
Web Switch  
10/100/10000 Mbps Ethernet Server Switch  
Gigabit  
Powered  
Powered  
10/100/10000 Mbps Ethernet Server Switch  
Data  
Link  
Active  
Data  
Link  
Active  
1
2
3
4
5
6
7
8
Data  
Link  
1
2
3
4
5
6
7
8
Data  
Link  
9
9
9
Data  
Link  
Active  
Data  
Link  
Active  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
Power  
Console  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
Power  
Console  
2
4 5  
4
6
042  
Trunk 1: Ports 2, 4, and 5 on Switch 1  
Trunk 3: Ports 4, 6, and 9 on Switch 2  
Figure 3-2 Port Trunk Group Configuration Example  
Prior to configuring each switch in the above example, you must connect to the appropriate  
switchs Command Line Interface (CLI) as the administrator.  
NOTE For details about accessing and using any of the menu commands described in this  
example, see the Web OS Command Reference.  
1. Connect the switch ports that will be involved in the trunk group.  
2. Follow these steps on Web switch 1:  
(a) Define a trunk group.  
>> # /cfg/trunk 1  
(Select trunk group 1)  
>> Trunk group 1# add 2  
>> Trunk group 1# add 4  
>> Trunk group 1# add 5  
>> Trunk group 1# ena  
(Add port 2 to trunk group 1)  
(Add port 4 to trunk group 1)  
(Add port 5 to trunk group 1)  
(Enable trunk group 1)  
(b) Apply and verify the configuration.  
>> Trunk group 1# apply  
(Make your changes active)  
>> Trunk group 1# cur  
(View current trunking configuration)  
Examine the resulting information. If any settings are incorrect, make appropriate changes.  
(c) Save your new configuration changes.  
>> Trunk group 1# save  
(Save for restore after reboot)  
Chapter 3: Port Trunking  
67  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
3. Repeat the process on Web switch 2.  
>> # /cfg/trunk 3  
(Select trunk group 3)  
>> Trunk group 3# add 4  
>> Trunk group 3# add 6  
>> Trunk group 3# add 9  
>> Trunk group 3# ena  
>> Trunk group 3# apply  
>> Trunk group 3# cur  
>> Trunk group 3# save  
(Add port 4 to trunk group 3)  
(Add port 6 to trunk group 3)  
(Add port 9 to trunk group 3)  
(Enable trunk group 3)  
(Make your changes active)  
(View current trunking configuration)  
(Save for restore after reboot)  
Trunk group 1 (on Web switch 1) is now connected to trunk group 3 (on Web switch 2).  
NOTE In this example, two Alteon Web switches are used. If a third-party device supporting  
link aggregation is used (such as Cisco routers and switches with EtherChannel technology or  
Suns Quad Fast Ethernet Adapter), trunk groups on the third-party device should be config-  
ured manually. Connection problems could arise when using automatic trunk group negotia-  
tion on the third-party device.  
4. Examine the trunking information on each switch.  
>> /info/trunk  
(View trunking information)  
Information about each port in each configured trunk group will be displayed. Make sure that  
trunk groups consist of the expected ports and that each port is in the expected state.  
The following restrictions apply:  
n
n
n
Any physical switch port can belong to only one trunk group.  
Up to four ports can belong to the same trunk group.  
Best performance is achieved when all ports in any given trunk group are configured for  
the same speed.  
n
Trunking from non-Alteon devices must comply with Cisco® EtherChannel® technology.  
68  
Chapter 3: Port Trunking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 4  
OSPF  
Web OS 10.0 supports the Open Shortest Path First (OSPF) routing protocol. The Web OS  
implementation conforms to the OSPF version 2 specifications detailed in Internet RFC 1583.  
The following sections discuss OSPF support for the Alteon AD4/184 Web switches:  
n
n
n
OSPF Overviewon page 69. This section provides information on OSPF concepts, such  
as types of OSPF areas, types of routing devices, neighbors, adjacencies, link state data-  
base, authentication, and internal versus external routing.  
OSPF Implementation in Web OSon page 74. This section describes how OSPF is  
implemented in Web OS, such as configuration parameters, electing the designated router,  
summarizing routes, defining route maps and so forth.  
OSPF Configuration Exampleson page 83. This section provides step-by-step instruc-  
tions on configuring four different configuration examples:  
Creating a simple OSPF domain  
Creating virtual links  
Summarizing routes  
Creating host routes  
OSPF Overview  
OSPF is designed for routing traffic within a single IP domain called an Autonomous System  
(AS). The AS can be divided into smaller logical units known as areas.  
All routing devices maintain link information in their own Link State Database (LSDB). The  
LSDB for all routing devices within an area is identical but is not exchanged between different  
areas. Only routing updates are exchanged between areas, thereby significantly reducing the  
overhead for maintaining routing information on a large, dynamic network.  
The following sections describe key OSPF concepts.  
69  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Types of OSPF Areas  
An AS can be broken into logical units known as areas. In any AS with multiple areas, one  
area must be designated as area 0, known as the backbone. The backbone acts as the central  
OSPF area. All other areas in the AS must be connected to the backbone. Areas inject sum-  
mary routing information into the backbone, which then distributes it to other areas as needed.  
As shown in Figure 4-1, OSPF defines the following types of areas:  
n
Stub Areaan area that is connected to only one other area. External route information is  
not distributed into stub areas.  
n
Not-So-Stubby-Area (NSSA)similar to a stub area with additional capabilities. Routes  
originating from within the NSSA can be propagated to adjacent transit and backbone  
areas. External routes from outside the AS can be advertised within the NSSA but are not  
distributed into other areas.  
n
Transit Areaan area that allows area summary information to be exchanged between  
routing devices. The backbone (area 0), any area that contains a virtual link to connect two  
areas, and any area that is not a stub area or an NSSA are considered transit areas.  
Backbone  
Area 0  
(Also a Transit Area)  
ABR  
ABR  
ABR  
Internal LSA  
Routes  
Virtual  
Link  
Transit Area  
Stub Area  
No External Routes  
from Backbone  
Not-So-Stubby Area  
(NSSA)  
ABR  
External LSA  
Routes  
ASBR  
Stub Area, NSSA,  
ABR = Area Border Router  
or Transit Area  
ASBR = Autonomous System  
Boundary Router  
Connected to Backbone  
via Virtual Link  
Non-OSPF Area  
RIP/BGP AS  
Figure 4-1 OSPF Area Types  
70  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Types of OSPF Routing Devices  
As shown in Figure 4-2, OSPF uses the following types of routing devices:  
n
n
n
Internal Router (IR)a router that has all of its interfaces within the same area. IRs main-  
tain LSDBs identical to those of other routing devices within the local area.  
Area Border Router (ABR)a router that has interfaces in multiple areas. ABRs maintain  
one LSDB for each connected area and disseminate routing information between areas.  
Autonomous System Boundary Router (ASBR)a router that acts as a gateway between  
the OSPF domain and non-OSPF domains, such as RIP, BGP, and static routes.  
OSPF Autonomous System  
Backbone  
Area 0  
BGP  
Area 3  
Inter-Area Routes  
(Summary Routes)  
ABR  
External  
Routes  
ASBR  
ASBR  
RIP  
ABR  
ABR  
Internal  
Router  
Area 1  
Area 2  
Figure 4-2 OSPF Domain and an Autonomous System  
Chapter 4: OSPF  
71  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Neighbors and Adjacencies  
In areas with two or more routing devices, neighbors and adjacencies are formed.  
Neighbors are routing devices that maintain information about each othershealth. To establish  
neighbor relationships, routing devices periodically send hello packets on each of their inter-  
faces. All routing devices that share a common network segment, appear in the same area, and  
have the same health parameters (helloand deadintervals) and authentication parameters  
respond to each others hello packets and become neighbors. Neighbors continue to send peri-  
odic hello packets to advertise their health to neighbors. In turn, they listen to hello packets to  
determine the health of their neighbors and to establish contact with new neighbors.  
The hello process is used for electing one of the neighbors as the areas Designated Router  
(DR) and one as the areas Backup Designated Router (BDR). The DR is adjacent to all other  
neighbors and acts as the central contact for database exchanges. Each neighbor sends its data-  
base information to the DR, which relays the information to the other neighbors.  
The BDR is adjacent to all other neighbors (including the DR). Each neighbor sends its data-  
base information to the BDR just as with the DR, but the BDR merely stores this data and does  
not distribute it. If the DR fails, the BDR will take over the task of distributing database infor-  
mation to the other neighbors.  
The Link-State Database  
OSPF is a link-state routing protocol. A link represents an interface (or routable path) from the  
routing device. By establishing an adjacency with the DR, each routing device in an OSPF area  
maintains an identical Link-State Database (LSDB) describing the network topology for its  
area.  
Each routing device transmits a Link-State Advertisement (LSA) on each of its interfaces.  
LSAs are entered into the LSDB of each routing device. OSPF uses flooding to distribute  
LSAs between routing devices.  
When LSAs result in changes to the routing devices LSDB, the routing device forwards the  
changes to the adjacent neighbors (the DR and BDR) for distribution to the other neighbors.  
OSPF routing updates occur only when changes occur, instead of periodically. For each new  
route, if an adjacency is interested in that route (for example, if configured to receive static  
routes and the new route is indeed static), an update message containing the new route is sent  
to the adjacency. For each route removed from the route table, if the route has already been  
sent to an adjacency, an update message containing the route to withdraw is sent.  
72  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
The Shortest Path First Tree  
The routing devices use a link-state algorithm (Dijkstras algorithm) to calculate the shortest  
path to all known destinations, based on the cumulative cost required to reach the destination.  
The cost of an individual interface in OSPF is an indication of the overhead required to send  
packets across it. The cost is inversely proportional to the bandwidth of the interface. A lower  
cost indicates a higher bandwidth.  
Internal Versus External Routing  
To ensure effective processing of network traffic, every routing device on your network needs  
to know how to send a packet (directly or indirectly) to any other location/destination in your  
network. This is referred to as internal routing and can be done with static routes or using  
active internal routing protocols, such as OSPF, RIP, or RIPv2.  
It is also useful to tell routers outside your network (upstream providers or peers) about the  
routes you have access to in your network. Sharing of routing information between autono-  
mous systems is known as external routing.  
Typically, an AS will have one or more border routers (peer routers that exchange routes with  
other OSPF networks) as well as an internal routing system enabling every router in that AS to  
reach every other router and destination within that AS.  
When a routing device advertises routes to boundary routers on other autonomous systems, it  
is effectively committing to carry data to the IP space represented in the route being advertised.  
For example, if the routing device advertises 192.204.4.0/24, it is declaring that if another  
router sends data destined for any address in the 192.204.4.0/24 range, it will carry that data to  
its destination.  
Chapter 4: OSPF  
73  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Web OS 10.0 supports a single instance of OSPF and up to 1K routes on the network. The fol-  
n
n
n
n
n
n
n
n
n
n
n
Electing the Designated Router and Backupon page 77  
Virtual Linkson page 79  
Router IDon page 80  
Authenticationon page 80  
Host Routes for Load Balancingon page 82  
OSPF Features Not Supported in This Releaseon page 82  
Configurable Parameters  
In Web OS 10.0, OSPF parameters can be configured through the Command Line Interface  
(CLI), Web OS Browser-Based Interface (BBI) for Alteon AD4 and 184 switches, or through  
SNMP.  
The CLI supports the following parameters: interface output cost, interface priority, dead and  
hello intervals, retransmission interval, and interface transmit delay.  
In addition to the above parameters, you can also specify the following:  
n
Shortest Path First (SPF) intervalTime interval between successive calculations of the  
shortest path tree using the Dijkstras algorithm.  
n
Stub area metricA stub area can be configured to send a numeric metric value such that  
all routes received via that stub area carry the configured metric to potentially influence  
routing decisions.  
n
Default routesDefault routes with weight metrics can be manually injected into transit  
areas. This helps establish a preferred route when multiple routing devices exist between  
two areas. It also helps route traffic to external networks.  
74  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Defining Areas  
If you are configuring multiple areas in your OSPF domain, one of the areas must be desig-  
nated as area 0, known as the backbone. The backbone is the central OSPF area and is usually  
physically connected to all other areas. The areas inject routing information into the backbone  
which, in turn, disseminates the information into other areas.  
Since the backbone connects the areas in your network, it must be a contiguous area. If the  
backbone is partitioned (possibly as a result of joining separate OSPF networks), parts of the  
AS will be unreachable, and you will need to configure virtual links to reconnect the parti-  
tioned areas (see Virtual Linkson page 79).  
Up to three OSPF areas can be connected to a Web switch with Web OS 10.0 software. To con-  
figure an area, the OSPF number must be defined and then attached to a network interface on  
the Web switch. The full process is explained in the following sections.  
An OSPF area is defined by assigning two pieces of informationan area index and an area  
ID. The command to define an OSPF area is as follows:  
>> # /cfg/ip/ospf/aindex <area index>/areaid <n.n.n.n>  
NOTE The aindexoption above is an arbitrary index used only on the switch and does not  
represent the actual OSPF area number. The actual OSPF area number is defined in the  
areaidportion of the command as explained in the following sections.  
Assigning the Area Index  
The aindex<area index> option is actually just an arbitrary index (0-2) used only by the  
Web switch. This index does not necessarily represent the OSPF area number, though for con-  
figuration simplicity, it should where possible.  
For example, both of the following sets of commands define OSPF area 0 (the backbone) and  
area 1 because that information is held in the area ID portion of the command. However, the  
first set of commands is easier to maintain because the arbitrary area indexes agree with the  
area IDs:  
n
Area index and area ID agree  
/cfg/ip/ospf/aindex 0/areaid 0.0.0.0 (Use index 0 to set area 0 in ID octet format)  
/cfg/ip/ospf/aindex 1/areaid 0.0.0.1 (Use index 1 to set area 1 in ID octet format)  
n
Area index set to an arbitrary value  
/cfg/ip/ospf/aindex 1/areaid 0.0.0.0 (Use index 1 to set area 0 in ID octet format)  
/cfg/ip/ospf/aindex 2/areaid 0.0.0.1 (Use index 2 to set area 1 in ID octet format)  
Chapter 4: OSPF  
75  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Using the Area ID to Assign the OSPF Area Number  
The OSPF area number is defined in the areaid<IP address> option. The octet format is  
used in order to be compatible with two different systems of notation used by other OSPF net-  
work vendors. There are two valid ways to designate an area ID:  
n
Placing the area number in the last octet (0.0.0.n)  
Most common OSPF vendors express the area ID number as a single number. For exam-  
ple, the Cisco IOS-based router command network1.1.1.00.0.0.255area1”  
defines the area number simply as area1.On the Web switch, using the last octet in  
the area ID, area1is equivalent to areaid0.0.0.1.  
n
Multi-octet (IP address)  
Some OSPF vendors express the area ID number in multi-octet format. For example,  
area2.2.2.2represents OSPF area 2 and can be specified directly on the Web  
switch as areaid2.2.2.2.  
NOTE Although both types of area ID formats are supported, be sure that the area IDs are in  
the same format throughout an area.  
Attaching an Area to a Network  
Once an OSPF area has been defined, it must be associated with a network. To attach the area  
to a network, you must assign the OSPF area index to an IP interface that participates in the  
area. The format for the command is as follows:  
>> # /cfg/ip/ospf/if <interface number>/aindex <area index>  
For example, the following commands could be used to configure IP interface 14 for a pres-  
ence on the 10.10.10.1/24 network, to define OSPF area 1, and to attach the area to the net-  
work:  
>> # /cfg/ip/if 14  
>> IP Interface 14# addr 10.10.10.1  
(Select menu for IP interface 14)  
(Define IP address on backbone  
network)  
>> IP Interface 14# mask 255.255.255.0  
>> IP Interface 14# ena  
(Define IP mask on backbone)  
(Enable IP interface 14)  
>> IP Interface 14# ../ospf/aindex 1  
>> OSPF Area (index) 1 # areaid 0.0.0.1  
>> OSPF Area (index) 1 # ena  
(Select menu for area index 1)  
(Define area ID as OSPF area 1)  
(Enable area index 1)  
>> OSPF Area (index) 1 # ../if 14  
>> OSPF Interface 14# aindex 1  
(Select OSPF menu for interface 14)  
(Attach area to network on interface  
14)  
>> OSPF Interface 14# enable  
(Enable interface 14 for area index 1)  
76  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Interface Cost  
The OSPF link-state algorithm (Dijkstras algorithm) places each routing device at the root of a  
tree and determines the cumulative cost required to reach each destination. Usually, the cost is  
inversely proportional to the bandwidth of the interface. Low cost indicates high bandwidth.  
You can manually enter the cost for the output route with the following command:  
>> # /cfg/ip/ospf/if <OSPF interface number>/cost <cost value (1-65535)>  
Electing the Designated Router and Backup  
In any area with more than two routing devices, a Designated Router (DR) is elected as the  
central contact for database exchanges among neighbors, and a Backup Designated Router  
(BDR) is elected in case the DR fails.  
DR and BDR elections are made through the hello process. The election can be influenced by  
assigning a priority value to the Web switchs OSPF interfaces. The command is as follows:  
>> # /cfg/ip/ospf/if <OSPF interface number>/prio <priority value (0-127)>  
A priority value of 127 is the highest, and 1 is the lowest. A priority value of 0 specifies that  
the interface cannot be used as a DR or BDR. In case of a tie, the routing device with the low-  
est router ID wins.  
Summarizing Routes  
Route summarization condenses routing information. Without summarization, each routing  
device in an OSPF network would retain a route to every subnet in the network. With summa-  
rization, routing devices can reduce some sets of routes to a single advertisement, reducing  
both the load on the routing device and the perceived complexity of the network. The impor-  
tance of route summarization increases with network size.  
Summary routes can be defined for up to 16 IP address ranges using the following command:  
<mask>  
where <range number> is a number 1 to 16, <IP address> is the base IP address for the range,  
and <mask> is the IP address mask for the range. For a detailed configuration example, see  
Example 3: Summarizing Routeson page 90.  
Chapter 4: OSPF  
77  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Default Routes  
When an OSPF routing device encounters traffic for a destination address it does not recog-  
nize, it forwards that traffic along the default route. Typically, the default route leads upstream  
toward the backbone until it reaches the intended area or an external router.  
Each Web switch acting as an ABR automatically inserts a default route into each attached  
area. In simple OSPF stub areas or NSSAs with only one ABR leading upstream (see Area 1 in  
Figure 4-3), any traffic for IP address destinations outside the area is forwarded to the switchs  
IP interface, and then into the connected transit area (usually the backbone). Since this is auto-  
matic, no further configuration is required for such areas.  
Stub Area  
Area 1  
Backbone  
Area 0  
Stub Area  
Area 2  
ABR  
IR  
IR  
Metric:  
IF 1  
IF 1  
IF 2  
Priority  
Default  
Route  
201  
Metric:  
900  
Priority  
Default  
Route  
IF 2  
IF 1  
Default  
Route  
Metric:  
200  
IF 2  
ABR  
Metric:  
10  
ABR  
ASBR to  
External Networks  
Figure 4-3 Injecting Default Routes  
In more complex OSPF areas with multiple ABRs or ASBRs (such as area 0 and area 2 in Fig-  
ure 4-3), there are multiple routes leading from the area. In such areas, traffic for unrecognized  
destinations cannot tell which route leads upstream without further configuration.  
To resolve the situation and select one default route among multiple choices in an area, you can  
manually configure a metric value on each ABR. The metric assigns a priority to the ABR for  
its selection as the priority default route in an area. The following command is used for setting  
the metric value:  
>> # /cfg/ip/ospf/default <metric value> <metric type (1 or 2)>  
where <metric value> sets the priority for choosing this switch for default route. The value  
nonesets no default and 1 sets the highest priority for default route. Metric type determines  
the method for influencing routing decisions for external routes.  
To clear a default route metric from the switch, use the following command:  
>> # /cfg/ip/ospf/default none  
78  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Virtual Links  
Usually, all areas in an OSPF AS are physically connected to the backbone. In some cases  
where this is not possible, you can use a virtual link. Virtual links are created to connect one  
area to the backbone through another non-backbone area (see Figure 4-1 on page 70).  
The area which contains a virtual link must be a transit area and have full routing information.  
Virtual links cannot be configured inside a stub area or NSSA. The area type must be defined  
as transitusing the following command:  
>> # /cfg/ip/ospf/aindex <area index>/type transit  
The virtual link must be configured on the routing devices at each endpoint of the virtual link,  
though they may traverse multiple routing devices. To configure an Alteon Web switch as one  
endpoint of a virtual link, use the following command:  
>> # /cfg/ip/ospf/virt <link number>/aindex <area index>/nbr <router  
ID>  
where <link number> is a value between 1 and 3, <area index> is the OSPF area index of the  
transit area, and <router ID> is the IP address of the virtual neighbor (nbr), the routing device  
at the target endpoint. Another router ID is needed when configuring a virtual link in the other  
direction. To provide the Alteon Web switch with a router ID, see the following section Router  
ID.  
For a detailed configuration example on Virtual Links, see Example 2: Virtual Linkson page  
86.  
Chapter 4: OSPF  
79  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Router ID  
Routing devices in OSPF areas are identified by a router ID. The router ID is expressed in IP  
address format. The IP address of the router ID is not required to be included in any IP inter-  
face range or in any OSPF area.  
The router ID can be configured in one of the following two ways:  
n
DynamicallyOSPF protocol configures the lowest IP interface IP address as the router  
ID. This is the default.  
n
StaticallyUse the following command to manually configure the router ID:  
>> # /cfg/ip/ospf/rtrid <IP address>  
n
To modify the router ID from static to dynamic, set the router ID to 0.0.0.0, save the con-  
figuration, and reboot the Web switch. To view the router ID, enter:  
>> # /info/ospf/gen  
Authentication  
OSPF protocol exchanges are authenticated so that only trusted routing devices can participate.  
This ensures less processing on routing devices that are not listening to OSPF packets.  
OSPF allows packet authentication and uses IP multicast when sending and receiving packets.  
Routers participate in routing domains based on predefined passwords. Web OS 10.0 supports  
simple password authentication (type 1 plain text passwords) only. This type of authentication  
allows a password to be configured per area.  
Figure 4-4 shows authentication configured for area 0 with the password test. Simple authenti-  
cation is also configured for the virtual link between area 2 and area 0. Area 1 is not configured  
for OSPF authentication.  
Area 0  
Simple authentication  
key=test  
Area 1  
ABR  
ABR  
IF 1  
IF 2  
IF 4  
Web switch 2  
Web switch 3  
Web switch 1  
IF 3  
Web switch 4  
IF 5  
Virtual link  
key=alteon  
Area 2  
ASBR to  
External Networks  
Web switch 5  
Figure 4-4 OSPF Authentication  
Chapter 4: OSPF  
80  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
To configure OSPF passwords on the Web switches shown in Figure 4-4 use the following  
commands:  
1. Enable OSPF authentication for Area 0 on Web switches 1, 2, and 3.  
>> # /cfg/ip/ospf/aindex 0/auth password  
(Turn on OSPF password authenti-  
cation)  
2. Configure a simple text password up to eight characters for each OSPF IP interface in  
Area 0 on Web switches 1, 2, and 3.  
>> # /cfg/ip/ospf/if 1  
>> OSPF Interface 1 # key test  
>> OSPF Interface 1 # ../if 2  
>> OSPF Interface 2 # key test  
>> OSPF Interface 1 # ../if 3  
>> OSPF Interface 3 # key test  
3. Enable OSPF authentication for Area 2 on Web switch 4.  
>> # /cfg/ip/ospf/aindex 2/auth password  
(Turn on OSPF password authenti-  
cation)  
4. Configure a simple text password up to eight characters for the virtual link between Area  
2 and Area 0 on Web switches 2 and 4.  
>> # /cfg/ip/ospf/virt 1/key alteon  
Chapter 4: OSPF  
81  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Host Routes for Load Balancing  
Web OS 10.0 implementation of OSPF includes host routes. Host routes are used for advertis-  
ing network device IP addresses to external networks, accomplishing the following goals:  
n
Server Load Balancing (SLB) within OSPF  
Host routes advertise virtual server IP addresses to external networks. This allows stan-  
dard SLB between the Web switch and the server pools in an OSPF environment. For  
more information on SLB, see Chapter 6, Server Load Balancing and your Web OS 10.0  
Command Reference.  
n
ABR Load Sharing  
As a second form of load balancing, host routes can be used for dividing OSPF traffic  
among multiple ABRs. To accomplish this, each Web switch provides identical services  
but advertises a host route for a different virtual server IP address to the external network.  
If each virtual server IP address serves a different and equal portion of the external world,  
incoming traffic from the upstream router should be split evenly among ABRs.  
n
ABR Failover  
Complementing ABR load sharing, identical host routes can be configured on each ABR.  
These host routes can be given different costs so that a different ABR is selected as the  
preferred route for each virtual server and the others are available as backups for failover  
purposes.  
If redundant routes via multiple routing processes (such as OSPF, RIP, BGP, or static routes)  
exist on your network, the Web switch defaults to the OSPF-derived route.  
For a configuration example, see Example 4: Host Routeson page 92.  
OSPF Features Not Supported in This Release  
The following OSPF features are not supported in this release:  
n
Redistributing routes into OSPF (Web OS 10.0 does not allow your switch to emulate an  
ASBR)  
n
n
n
n
n
Summarizing external routes  
Filtering OSPF routes  
Configuring equal cost route load balancing  
Using OSPF to forward multicast routes  
Configuring OSPF on non-broadcast multi-access networks (such as frame relay, X.25,  
and ATM)  
82  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
OSPF Configuration Examples  
A summary of the basic steps for configuring OSPF on the Web switch is listed here. Detailed  
instructions for each of the steps is covered in the following sections:  
1. Configure IP interfaces.  
One IP interface is required for each desired network (range of IP addresses) being assigned to  
an OSPF area on the Web switch.  
2. (Optional) Configure the router ID.  
The router ID is required only when configuring virtual links on the Web switch.  
3. Enable OSPF on the switch.  
4. Define the OSPF areas.  
5. Configure OSPF interface parameters.  
IP interfaces are used for attaching networks to the various areas.  
6. (Optional) Configure route summarization between OSPF areas.  
7. (Optional) Configure virtual links.  
8. (Optional) Configure host routes.  
Chapter 4: OSPF  
83  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Example 1: Simple OSPF Domain  
In this example, two OSPF areas are definedone area is the backbone and the other is a stub  
area. A stub area does not allow advertisements of external routes, thus reducing the size of the  
database. Instead, a default summary route of IP address 0.0.0.0 is automatically inserted into  
the stub area. Any traffic for IP address destinations outside the stub area will be forwarded to  
the stub areas IP interface, and then into the backbone.  
Backbone  
Stub Area  
Area 0  
(0.0.0.0)  
Area 1  
(0.0.0.1)  
IF 1  
10.10.7.1  
IF 2  
10.10.12.1  
Network  
Network  
10.10.7.0/24  
10.10.12.0/24  
Figure 4-5 A Simple OSPF Domain  
Follow this procedure to configure OSPF support as shown in Figure 4-5:  
1. Configure IP interfaces on each network that will be attached to OSPF areas.  
In this example, two IP interfaces are needed: one for the backbone network on 10.10.7.0/24  
and one for the stub area network on 10.10.12.0/24.  
>> # /cfg/ip/if 1  
(Select menu for IP interface 1)  
(Set IP address on backbone network)  
(Set IP mask on backbone network)  
(Set the broadcast address)  
>> IP Interface 1 # addr 10.10.7.1  
>> IP Interface 1 # mask 255.255.255.0  
>> IP Interface 1 # broad 10.10.7.255  
>> IP Interface 1 # enable  
(Enable IP interface 1)  
>> IP Interface 1 # ../if 2  
>> IP Interface 2 # addr 10.10.12.1  
>> IP Interface 2 # enable  
(Select menu for IP interface 2)  
(Set IP address on stub area network)  
(Enable IP interface 2)  
>> IP Interface 1 # mask 255.255.255.0  
(Set IP mask on backbone network)  
2. Enable OSPF.  
>> IP Interface 2 # /cfg/ip/ospf/on  
(Enable OSPF on the Web switch)  
84  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
3. Define the backbone.  
The backbone is always configured as a transit area using areaid0.0.0.0.  
>> Open Shortest Path First # aindex 0  
>> OSPF Area (index) 0 # areaid 0.0.0.0  
>> OSPF Area (index) 0 # type transit  
>> OSPF Area (index) 0 # enable  
(Select menu for area index 0)  
(Set the ID for backbone area 0)  
(Define backbone as transit type)  
(Enable the area)  
4. Define the stub area.  
>> OSPF Area (index) 0 # ../aindex 1  
>> OSPF Area (index) 1 # areaid 0.0.0.1  
>> OSPF Area (index) 1 # type stub  
>> OSPF Area (index) 1 # enable  
(Select menu for area index 1)  
(Set the area ID for OSPF area 1)  
(Define area as stub type)  
(Enable the area)  
5. Attach the network interface to the backbone.  
>> OSPF Area 1 # ../if 1  
>> OSPF Interface 1 # aindex 0  
>> OSPF Interface 1 # enable  
(Select OSPF menu for IP interface 1)  
(Attach network to backbone index)  
(Enable the backbone interface)  
6. Attach the network interface to the stub area.  
>> OSPF Interface 1 # ../if 2  
>> OSPF Interface 2 # aindex 1  
>> OSPF Interface 2 # enable  
(Select OSPF menu for IP interface 2)  
(Attach network to stub area index)  
(Enable the stub area interface)  
7. Apply and save the configuration changes.  
>> OSPF Interface 2 # apply  
>> OSPF Interface 2 # save  
(Global command to apply all changes)  
(Global command to save all changes)  
Chapter 4: OSPF  
85  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Example 2: Virtual Links  
In the example shown in Figure 4-6, area 2 is not physically connected to the backbone as is  
usually required. Instead, area 2 will be connected to the backbone via a virtual link through  
area 1. The virtual link must be configured at each endpoint.  
Backbone  
Transit Area  
Stub Area  
Area 0  
(0.0.0.0)  
Area 1  
(0.0.0.1)  
Area 2  
(0.0.0.2)  
Switch #1  
Switch #2  
IF 1  
10.10.7.1  
IF 2  
10.10.12.1  
IF 1  
10.10.12.2  
IF 2  
10.10.24.1  
Virtual Link 1  
10.10.7.0/24  
Network  
10.10.12.0/24  
Network  
10.10.24.0/24  
Network  
Router ID:  
10.10.10.1  
Router ID:  
10.10.14.1  
Figure 4-6 Configuring a Virtual Link  
Configuring OSPF for a Virtual Link on Switch #1  
1. Configure IP interfaces on each network that will be attached to the switch.  
In this example, two IP interfaces are needed on Switch #1: one for the backbone network on  
10.10.7.0/24 and one for the transit area network on 10.10.12.0/24.  
>> # /cfg/ip/if 1  
(Select menu for IP interface 1)  
(Set IP address on backbone network)  
(Enable IP interface 1)  
(Select menu for IP interface 2)  
(Set IP address on transit area network  
(Enable interface 2)  
>> IP Interface 1 # addr 10.10.7.1  
>> IP Interface 1 # enable  
>> IP Interface 1 # ../if 2  
>> IP Interface 2 # addr 10.10.12.0  
>> IP Interface 2 # enable  
)
2. Configure the router ID.  
A router ID is required when configuring virtual links. Later, when configuring the other end  
of the virtual link on Web Switch 2, the router ID specified here will be used as the target vir-  
tual neighbor (nbr) address.  
>> IP Interface 2 # /cfg/ip/ospf/rtrid 10.10.10.1(Set static router ID on Web switch 1)  
3. Enable OSPF.  
>> IP # /cfg/ip/ospf/on  
(Enable OSPF on Web switch 1)  
86  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
4. Define the backbone.  
>> Open Shortest Path First # aindex 0  
>> OSPF Area (index) 0 # areaid 0.0.0.0  
>> OSPF Area (index) 0 # type transit  
>> OSPF Area (index) 0 # enable  
(Select menu for area index 0)  
(Set the area ID for backbone area 0)  
(Define backbone as transit type)  
(Enable the area)  
5. Define the transit area.  
The area that contains the virtual link must be configured as a transit area.  
>> OSPF Area (index) 0 # ../aindex 1  
>> OSPF Area (index) 1 # areaid 0.0.0.1  
>> OSPF Area (index) 1 # type transit  
>> OSPF Area (index) 1 # enable  
(Select menu for area index 1)  
(Set the area ID for OSPF area 1)  
(Define area as transit type)  
(Enable the area)  
6. Attach the network interface to the backbone.  
>> OSPF Area (index) 1 # ../if 1  
>> OSPF Interface 1 # aindex 0  
>> OSPF Interface 1 # enable  
(Select OSPF menu for IP interface 1)  
(Attach network to backbone index)  
(Enable the backbone interface)  
7. Attach the network interface to the transit area.  
>> OSPF Interface 1 # ../if 2  
>> OSPF Interface 2 # aindex 1  
>> OSPF Interface 2 # enable  
(Select OSPF menu for IP interface 2)  
(Attach network to transit area index)  
(Enable the transit area interface)  
8. Configure the virtual link.  
The nbrrouter ID configured in this step must be the same as the router ID that will be config-  
ured for Switch #2 in Step 2 on page 88.  
>> OSPF Interface 2 # ../virt 1  
>> OSPF Virtual Link 1 # aindex 1  
>> OSPF Virtual Link 1 # nbr 10.10.14.1  
>> OSPF Virtual Link 1 # enable  
(Specify a virtual link number)  
(Specify the transit area for the virtual link)  
(Specify the router ID of the recipient)  
(Enable the virtual link)  
9. Apply and save the configuration changes.  
>> OSPF Interface 2 # apply  
>> OSPF Interface 2 # save  
(Global command to apply all changes)  
(Global command to save all changes)  
Chapter 4: OSPF  
87  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Configuring OSPF for a Virtual Link on Switch #2  
1. Configure IP interfaces on each network that will be attached to OSPF areas.  
Two IP interfaces are needed on Switch #2: one for the transit area network on 10.10.12.0/24  
and one for the stub area network on 10.10.24.0/24.  
>> # /cfg/ip/if 1  
(Select menu for IP interface 1)  
(Set IP address on transit area network  
(Enable IP interface 1)  
(Select menu for IP interface 2)  
(Set IP address on stub area network)  
(Enable IP interface 2)  
>> IP Interface 1 # addr 10.10.12.2  
>> IP Interface 1 # enable  
>> IP Interface 1 # ../if 2  
>> IP Interface 2 # addr 10.10.24.1  
>> IP Interface 2 # enable  
)
2. Configure the router ID.  
A router ID is required when configuring virtual links. This router ID should be the same one  
specified as the target virtual neighbor (nbr) on Web switch 1 in Step 8 on page 87.  
>> IP Interface 2 # /cfg/ip/rtrid 10.10.14.1 (Set static router ID on Web switch 2)  
3. Enable OSPF.  
>> IP# /cfg/ip/ospf/on  
(Enable OSPF on Web switch 2)  
4. Define the backbone.  
This version of Web OS 10.0 requires that a backbone index be configured on the non-back-  
bone end of the virtual link as follows:  
>> Open Shortest Path First # aindex 0  
>> OSPF Area (index) 0 # areaid 0.0.0.0  
>> OSPF Area (index) 0 # enable  
(Select the menu for area index 0)  
(Set the area ID for OSPF area 0)  
(Enable the area)  
5. Define the transit area.  
>> OSPF Area (index) 0 # ../aindex 1  
>> OSPF Area (index) 1 # areaid 0.0.0.1  
>> OSPF Area (index) 1 # type transit  
>> OSPF Area (index) 1 # enable  
(Select menu for area index 1)  
(Set the area ID for OSPF area 1)  
(Define area as transit type)  
(Enable the area)  
88  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
6. Define the stub area.  
>> OSPF Area (index) 1 # ../aindex 2  
>> OSPF Area (index) 2 # areaid 0.0.0.2  
>> OSPF Area (index) 2 # type stub  
>> OSPF Area (index) 2 # enable  
(Select the menu for area index 2)  
(Set the area ID for OSPF area 2)  
(Define area as stub type)  
(Enable the area)  
7. Attach the network interface to the backbone.  
>> OSPF Area (index) 2 # ../if 1  
>> OSPF Interface 1 # aindex 1  
>> OSPF Interface 1 # enable  
(Select OSPF menu for IP interface 1)  
(Attach network to transit area index)  
(Enable the transit area interface)  
8. Attach the network interface to the transit area.  
>> OSPF Interface 1 # ../if 2  
>> OSPF Interface 2 # aindex 2  
>> OSPF Interface 2 # enable  
(Select OSPF menu for IP interface 2)  
(Attach network to stub area index)  
(Enable the stub area interface)  
9. Configure the virtual link.  
The nbrrouter ID configured in this step must be the same as the router ID that was config-  
ured for Web switch #1 in Step 2 on page 86.  
>> OSPF Interface 2 # ../virt 1  
>> OSPF Virtual Link 1 # aindex 1  
>> OSPF Virtual Link 1 # nbr 10.10.10.1  
>> OSPF Virtual Link 1 # enable  
(Specify a virtual link number)  
(Specify the transit area for the virtual link)  
(Specify the router ID of the recipient)  
(Enable the virtual link)  
10. Apply and save the configuration changes.  
>> OSPF Interface 2 # apply  
>> OSPF Interface 2 # save  
(Global command to apply all changes)  
(Global command to save all changes)  
Other Virtual Link Options  
n
n
You can use redundant paths by configuring multiple virtual links.  
Only the endpoints of the virtual link are configured. The virtual link path may traverse  
multiple routers in an area as long as there is a routable path between the endpoints.  
Chapter 4: OSPF  
89  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Example 3: Summarizing Routes  
By default, ABRs advertise all the network addresses from one area into another area. Route  
summarization can be used for consolidating advertised addresses and reducing the perceived  
complexity of the network.  
If the network IP addresses in an area are assigned to a contiguous subnet range, you can con-  
figure the ABR to advertise a single summary route that includes all the individual IP  
addresses within the area.  
The following example shows one summary route from area 1 (stub area) injected into area 0  
(the backbone). The summary route consists of all IP addresses from 36.128.0.0 through  
36.128.254.255 except for the routes in the range 36.128.200.0 through 36.128.200.255.  
Backbone  
Stub Area  
Area 0  
(0.0.0.0)  
Area 1  
(0.0.0.1)  
IF 1  
10.10.7.1  
IF 2  
36.128.192.1  
36.128.192.x to  
36.128.254.x  
Summary  
Route  
ABR  
10.10.7.0/24  
Network  
36.128.192.0/18  
Network  
Figure 4-7 Summarizing Routes  
NOTE You can specify a range of addresses to prevent advertising by using the hideoption.  
In this example, routes in the range 36.128.200.0 through 36.128.200.255 are kept private.  
Follow this procedure to configure OSPF support as shown in Figure 4-7:  
1. Configure IP interfaces for each network which will be attached to OSPF areas.  
>> # /cfg/ip/if 1  
>> IP Interface 1 # addr 10.10.7.1  
>> IP Interface 1 # ena  
(Select menu for IP interface 1)  
(Set IP address on backbone network)  
(Enable IP interface 1)  
>> IP Interface 1 # ../if 2  
>> IP Interface 2 # addr 36.128.192.1  
>> IP Interface 2 # ena  
(Select menu for IP interface 2)  
(Set IP address on stub area network)  
(Enable IP interface 2)  
2. Enable OSPF.  
>> IP Interface 2 # /cfg/ip/ospf/on  
(Enable OSPF on the Web switch)  
90  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
3. Define the backbone.  
>> Open Shortest Path First # aindex 0  
(Select menu for area index 0)  
>> OSPF Area (index) 0 # areaid 0.0.0.0 (Set the ID for backbone area 0)  
>> OSPF Area (index) 0 # type transit  
>> OSPF Area (index) 0 # enable  
(Define backbone as transit type)  
(Enable the area)  
4. Define the stub area.  
>> OSPF Area (index) 0 # ../aindex 1  
(Select menu for area index 1)  
>> OSPF Area (index) 1 # areaid 0.0.0.1 (Set the area ID for OSPF area 1)  
>> OSPF Area (index) 1 # type stub  
>> OSPF Area (index) 1 # enable  
(Define area as stub type)  
(Enable the area)  
5. Attach the network interface to the backbone.  
>> OSPF Area (index) 1 # ../if 1  
>> OSPF Interface 1 # aindex 0  
>> OSPF Interface 1 # enable  
(Select OSPF menu for IP interface 1)  
(Attach network to backbone index)  
(Enable the backbone interface)  
6. Attach the network interface to the stub area.  
>> OSPF Interface 1 # ../if 2  
>> OSPF Interface 2 # aindex 1  
>> OSPF Interface 2 # enable  
(Select OSPF menu for IP interface 2)  
(Attach network to stub area index)  
(Enable the stub area interface)  
7. Configure route summarization by specifying the starting address and mask of the range  
of addresses to be summarized.  
>> OSPF Interface 2 # ../range 1  
(Select menu for summary range)  
(Set base IP address of summary range)  
(Set mask address for summary range)  
(Inject summary route into backbone)  
(Enable summary range)  
>> OSPF Summary Range 1 # addr 36.128.192.0  
>> OSPF Summary Range 1 # mask 255.255.192.0  
>> OSPF Summary Range 1 # aindex 0  
>> OSPF Summary Range 1 # enable  
8. Use the hide command to prevent a range of addresses from advertising to the backbone.  
>> OSPF Interface 2 # ../range 2  
>> OSPF Summary Range 2 # addr 36.128.200.0  
(Select menu for summary range)  
(Set base IP address)  
>> OSPF Summary Range 2 # mask 255.255.200.255 (Set mask address)  
>> OSPF Summary Range 2 # hide enable  
(Hide the range of addresses)  
9. Apply and save the configuration changes.  
>> OSPF Summary Range 2 # apply  
>> OSPF Summary Range 2 # save  
(Global command to apply all changes)  
(Global command to save all changes)  
Chapter 4: OSPF  
91  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Example 4: Host Routes  
The Web OS 10.0 implementation of OSPF includes host routes. Host routes are used for  
advertising network device IP addresses to external networks and allows for Server Load Bal-  
ancing (SLB) within OSPF. It also makes ABR load sharing and failover possible.  
Consider the example network in Figure 4-8. Both Web switches have access to servers with  
identical content and are configured with the same virtual server IP addresses: 10.10.10.1 and  
10.10.10.2. Web switch #1 is given a host route with a low cost for virtual server 10.10.10.1  
and another host route with a high cost for virtual server 10.10.10.2. Web switch #2 is config-  
ured with the same hosts but with the costs reversed; one host route has a high cost for virtual  
server 10.10.10.1 and another has a low cost for virtual server 10.10.10.2.  
All four host routes are injected into the upstream router and advertised externally. Traffic  
comes in for both virtual server IP addresses (10.10.10.1 and 10.10.10.2). The upstream router  
sees that both addresses exist on both Web switches and uses the host route with the lowest  
cost for each. Traffic for 10.10.10.1 goes to Web switch #1 because its host route has the low-  
est cost for that address. Traffic for 10.10.10.2 goes to Web switch #2 because its host route has  
the lowest cost. This effectively shares the load among ABRs. Both Web switches then use  
standard Server Load Balancing (SLB) to distribute traffic among available real servers.  
In addition, if one of the Web switches were to fail, the upstream routing device would forward  
the traffic to the ABR whose host route has the next lowest cost. In this example, the remaining  
Web switch would assume the entire load for both virtual servers.  
Web Switch #1  
Virtual Servers/Host Routes:  
Backbone  
Area 0  
Stub Area  
Area 1  
10.10.10.1, Cost 1  
10.10.10.2, Cost 100  
Preferred path  
(lowest cost)  
to Host Route  
10.10.10.1  
Real Servers  
with Identical  
Content  
Preferred path  
(lowest cost)  
to Host Route  
10.10.10.2  
Web Switch #2  
Virtual Servers/Host Routes:  
10.10.10.1, Cost 100  
10.10.10.2, Cost 1  
ABR Load Sharing  
Standard SLB  
Figure 4-8 Configuring OSPF Host Routes  
92  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Configuring OSPF for Host Routes on Web Switch #1  
1. Configure basic SLB parameters.  
Web switch 1 is connected to two real servers. Each real server is given an IP address and is  
placed in the same real server group.  
>> # /cfg/slb/real 1  
>> Real server 1 # rip 100.100.100.25  
>> Real server 1 # ena  
(Select menu for real server 1)  
(Set the IP address for real server 1)  
(Enable the real server)  
>> Real server 1 # ../real 2  
>> Real server 2 # rip 100.100.10.26  
>> Real server 2 # ena  
(Select menu for real server 2)  
(Set the IP address for real server 2)  
(Enable the real server)  
>> Real server 2 # ../group 1  
>> Real server group 1 # add 1  
>> Real server group 1 # add 2  
>> Real server group 1 # enable  
>> Real server group 1 # ../on  
(Select menu for real server group 1)  
(Add real server 1 to group)  
(Add real server 2 to group)  
(Enable the group)  
(Turn SLB on)  
2. Configure client and server processing on specific ports.  
>> Layer 4# port 4  
(Select switch port 4)  
>> SLB Port 4 # client ena  
>> SLB Port 4 # ../port 5  
>> SLB Port 5 # server ena  
(Enable client processing on Port 4)  
(Select switch Port 5)  
(Enable server processing on Port 5)  
3. Enable direct access mode.  
>> Layer 4 Port 5# ../adv  
>> Layer 4 Advanced# direct ena  
>> Layer 4 Advanced# ..  
(Select the SLB advance menu)  
(Enable DAM)  
(Return to the SLB menu)  
4. Configure the primary virtual server.  
Alteon Web Switch # 1 will be preferred for virtual server 10.10.10.1.  
>> Layer 4 # virt 1  
(Select menu for virtual server 1)  
>> Virtual server 1 # vip 10.10.10.1  
>> Virtual server 1 # ena  
(Set the IP address for virtual server 1)  
(Enable the virtual server)  
>> Virtual server 1 # service http  
>> Virtual server 1 http service # group 1  
(Select menu for service on virtual server)  
(Use real server group 1 for http service)  
Chapter 4: OSPF  
93  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
5. Configure the backup virtual server.  
Alteon Web switch # 1 will act as a backup for virtual server 10.10.10.2. Both virtual servers in  
this example are configured with the same real server group and provide identical services.  
>> Virtual server 2 http service # /cfg/slb/virt 2 (Select menu for virtual server 2)  
>> Virtual server 1 # vip 10.10.10.2  
>> Virtual server 1 # ena  
(Set the IP address for virtual server 2)  
(Enable the virtual server)  
>> Virtual server 1 # service http  
>> Virtual server 1 # group 1  
(Select menu for service on virtual server)  
(Use real server group 1 for http service)  
6. Configure IP interfaces for each network that will be attached to OSPF areas.  
>> Virtual server 1 # /cfg/ip/if 1  
>> IP Interface 1 # addr 10.10.7.1  
>> IP Interface 1 # enable  
(Select menu for IP interface 1)  
(Set IP address on backbone network)  
(Enable IP interface 1)  
>> IP Interface 1 # ../if 2  
>> IP Interface 2 # addr 10.10.10.40  
>> IP Interface 2 # enable  
(Select menu for IP interface 2)  
(Set IP address on stub area network)  
(Enable IP interface 2)  
7. Enable OSPF on Web switch 1.  
>> IP Interface 2 # ../ospf/on  
(Enable OSPF on Web switch 1)  
8. Define the backbone.  
>> Open Shortest Path First # aindex 0  
>> OSPF Area (index) 0 # areaid 0.0.0.0  
>> OSPF Area (index) 0 # type transit  
>> OSPF Area (index) 0 # enable  
(Select menu for area index 0)  
(Set the ID for backbone area 0)  
(Define backbone as transit type)  
(Enable the area)  
9. Define the stub area.  
>> OSPF Area (index) 0 # ../aindex 1  
>> OSPF Area (index) 1 # areaid 0.0.0.1  
>> OSPF Area (index) 1 # type stub  
>> OSPF Area (index) 1 # enable  
(Select menu for area index 1)  
(Set the ID for stub area 1)  
(Define area as stub type)  
(Enable the area)  
94  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
10. Attach the network interface to the backbone.  
>> OSPF Area (index) 1 # ../if 1  
>> OSPF Interface 1 # aindex 0  
>> OSPF Interface 1 # enable  
(Select OSPF menu for IP interface 1)  
(Attach network to backbone index)  
(Enable the backbone interface)  
11. Attach the network interface to the stub area.  
>> OSPF Interface 1 # ../if 2  
>> OSPF Interface 2 # aindex 1  
>> OSPF Interface 2 # enable  
(Select OSPF menu for IP interface 2)  
(Attach network to stub area index)  
(Enable the stub area interface)  
12. Configure host routes.  
One host route is needed for each virtual server on Web switch 1. Since virtual server  
10.10.10.1 is preferred for Web switch 1, its host route has a low cost. Because virtual server  
10.10.10.2 is used as a backup in case Web switch 2 fails, its host route has a high cost.  
>> OSPF Interface 2 # ../host 1  
>> OSPF Host Entry 1 # addr 10.10.10.1  
>> OSPF Host Entry 1 # aindex 0  
>> OSPF Host Entry 1 # cost 1  
>> OSPF Host Entry 1 # enable  
>> OSPF Host Entry 1 # ../host 2  
>> OSPF Host Entry 2 # addr 10.10.10.2  
>> OSPF Host Entry 2 # aindex 0  
>> OSPF Host Entry 2 # cost 100  
>> OSPF Host Entry 2 # enable  
(Select menu for host route 1)  
(Set IP address same as virtual server 1)  
(Inject host route into backbone area)  
(Set low cost for preferred path)  
(Enable the host route)  
(Select menu for host route 2)  
(Set IP address same as virtual server 2)  
(Inject host route into backbone area)  
(Set high cost for use as backup path)  
(Enable the host route)  
13. Apply and save the configuration changes.  
>> OSPF Host Entry 2 # apply  
>> OSPF Host Entry 2 # save  
(Global command to apply all changes)  
(Global command to save all changes)  
Chapter 4: OSPF  
95  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring OSPF for Host Routes on Web Switch 2  
1. Configure basic SLB parameters.  
Web switch 2 is connected to two real servers. Each real server is given an IP address and is  
placed in the same real server group.  
>> # /cfg/slb/real 1  
>> Real server 1 # rip 100.100.100.27  
>> Real server 1 # enable  
(Select menu for real server 1)  
(Set the IP address for real server 1)  
(Enable the real server)  
>> Real server 1 # ../real 2  
>> Real server 2 # rip 100.100.10.28  
>> Real server 2 # enable  
(Select menu for real server 2)  
(Set the IP address for real server 2)  
(Enable the real server)  
>> Real server 2 # ../group 1  
>> Real server group 1 # add 1  
>> Real server group 1 # add 2  
>> Real server group 1 # enable  
>> Real server group 1 # ../on  
(Select menu for real server group 1)  
(Add real server 1 to group)  
(Add real server 2 to group)  
(Enable the group)  
(Turn SLB on)  
2. Configure the virtual server parameters.  
The same virtual servers are configured as on Web switch 1.  
>> Layer 4 # virt 1  
(Select menu for virtual server 1)  
>> Virtual server 1 # vip 10.10.10.1  
>> Virtual server 1 # enable  
(Set the IP address for virtual server 1)  
(Enable the virtual server)  
>> Virtual server 1 # service http  
>> Virtual server 1 http service # group 1  
(Select menu for service on virtual server)  
(Use real server group 1 for http service)  
>> Virtual server 2 http service # /cfg/slb/virt 2 (Select menu for virtual server 2)  
>> Virtual server 1 # vip 10.10.10.2  
>> Virtual server 1 # enable  
(Set the IP address for virtual server 2)  
(Enable the virtual server)  
>> Virtual server 1 # service http  
>> Virtual server 1 # group 1  
(Select menu for service on virtual server)  
(Use real server group 1 for http service)  
3. Configure IP interfaces for each network that will be attached to OSPF areas.  
>> Virtual server 1 # /cfg/ip/if 1  
>> IP Interface 1 # addr 10.10.7.2  
>> IP Interface 1 # enable  
(Select menu for IP Interface 1)  
(Set IP address on backbone network)  
(Enable IP interface 1)  
>> IP Interface 1 # ../if 2  
>> IP Interface 2 # addr 10.10.10.41  
>> IP Interface 2 # enable  
(Select menu for IP Interface 2)  
(Set IP address on stub area network)  
(Enable IP interface 2)  
96  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
4. Enable OSPF on Web switch #2.  
>> IP Interface 2 # ../ospf/on  
(Enable OSPF on Web switch #2)  
5. Define the backbone.  
>> Open Shortest Path First # aindex 0  
>> OSPF Area (index) 0 # areaid 0.0.0.0  
>> OSPF Area (index) 0 # type transit  
>> OSPF Area (index) 0 # enable  
(Select menu for area index 0)  
(Set the ID for backbone area 0)  
(Define backbone as transit type)  
(Enable the area)  
6. Define the stub area.  
>> OSPF Area (index) 0 # ../aindex 1  
>> OSPF Area (index) 1 # areaid 0.0.0.1  
>> OSPF Area (index) 1 # type stub  
>> OSPF Area (index) 1 # enable  
(Select menu for area index 1)  
(Set the ID for stub area 1)  
(Define area as stub type)  
(Enable the area)  
7. Attach the network interface to the backbone.  
>> OSPF Area (index) 1 # ../if 1  
>> OSPF Interface 1 # aindex 0  
>> OSPF Interface 1 # enable  
(Select OSPF menu for IP interface 1)  
(Attach network to backbone index)  
(Enable the backbone interface)  
8. Attach the network interface to the stub area.  
>> OSPF Interface 1 # ../if 2  
>> OSPF Interface 2 # aindex 1  
>> OSPF Interface 2 # enable  
(Select OSPF menu for IP interface 2)  
(Attach network to stub area index)  
(Enable the stub area interface)  
Chapter 4: OSPF  
97  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
9. Configure host routes.  
Host routes are configured just like those on Web switch 1, except their costs are reversed.  
Since virtual server 10.10.10.2 is preferred for Web switch 2, its host route has been given a  
low cost. Because virtual server 10.10.10.1 is used as a backup in case Web switch 1 fails, its  
host route has been given a high cost.  
>> OSPF Interface 2 # ../host 1  
>> OSPF Host Entry 1 # addr 10.10.10.1  
>> OSPF Host Entry 1 # aindex 0  
>> OSPF Host Entry 1 # cost 100  
>> OSPF Host Entry 1 # enable  
>> OSPF Host Entry 1 # ../host 2  
>> OSPF Host Entry 2 # addr 10.10.10.2  
>> OSPF Host Entry 2 # aindex 0  
>> OSPF Host Entry 2 # cost 1  
>> OSPF Host Entry 2 # enable  
(Select menu for host route 1)  
(Set IP address same as virtual server 1)  
(Inject host route into backbone area)  
(Set high cost for use as backup path)  
(Enable the host route)  
(Select menu for host route 2)  
(Set IP address same as virtual server 2)  
(Inject host route into backbone area)  
(Set low cost for primary path)  
(Enable the host route)  
10. Apply and save the configuration changes.  
>> OSPF Host Entry 2 # apply  
>> OSPF Host Entry 2 # save  
(Global command to apply all changes)  
(Global command to save all changes)  
Verifying OSPF Configuration  
Use the following commands to verify the OSPF configuration on your switch:  
n /info/ospf/general  
n /info/ospf/nbr  
n /info/ospf/dbase/dbsum  
n /info/ospf/route  
n /stats/route  
Refer to the Web OS 10.0 Command Reference for information on the above commands.  
98  
Chapter 4: OSPF  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CHAPTER 5  
Secure Switch Management  
This chapter discusses the use of secure tunnels so that the data on the network is encrypted  
and secured for messages between a remote administrator and the switch.  
each switch port, you can set a source IP address (or range) that will be allowed to connect to  
the switch IP interface through Telnet, SSH, SNMP, or the Web OS Browser-Based Interface  
lowing sections are addressed in this chapter:  
n
n
n
n
n
Setting Allowable Source IP Address Rangeson page 100  
Secure Switch Managementon page 101  
RADIUS Authentication and Authorizationon page 103  
Secure Shell and Secure Copyon page 107  
Port Mirroringon page 113  
99  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Setting Allowable Source IP Address  
Ranges  
The allowable management IP address range is configured using the system mnetand mmask  
options available on the Command Line Interface (CLI) System Menu (/cfg/sys).  
NOTE The mnetand mmaskcommands in the /cfg/slb/advmenu are used for a differ-  
ent purpose.  
When an IP packet reaches the Management Processor, the source IP address is checked  
against the range of addresses defined by mnet and mmask. If the source IP address of the host  
or hosts are within this range, they are allowed to attempt to log in. Any packet addressed to a  
switch IP interface with a source IP address outside this range is discarded silently.  
Example: Assume that the mnetis set to 192.192.192.0 and the mmaskis set to  
255.255.255.128. This defines the following range of allowed IP addresses: 192.192.192.1 to  
192.192.192.127.  
n
A host with a source IP address of 192.192.192.21 falls within the defined range and  
would be allowed to access the switch Management Processor.  
n
A host with a source IP address of 192.192.192.192 falls outside the defined range and is  
not granted access. To make this source IP address valid, you would need to shift the host  
to an IP address within the valid range specified by the mnetand mmaskor modify the  
mnetto be 192.192.192.128 and the mmaskto be 255.255.255.128. This would put the  
192.192.192.192 host within the valid range allowed by the mnetand mmask  
(192.192.192.128-255).  
NOTE When the mnetand mmaskManagement Processor filter is applied, Routing Inter-  
face Protocol (RIP) updates received by the switch will be discarded if the source IP address of  
the RIP packet(s) falls outside the specified range. You can correct this by configuring static  
routes.  
100  
Chapter 5: Secure Switch Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Secure Switch Management  
Secure switch management is needed for environments that perform significant management  
functions across the Internet. The following are some of the functions for secured manage-  
ment:  
n
n
n
Authentication of remote administrators  
Authentication is the action of determining and verifying who the administrator is; it usu-  
ally involves a name and a password. The password can be either a fixed password or a  
challenge-response query.  
Authorization of remote administrators  
Once an administrator has been authenticated, authorization is the action of determining  
what that user is allowed to do. Authorization does not merely provide yes or no answers  
but may also customize the service for a particular administrator.  
Encryption of management information exchanged between the remote administrator and  
the switch  
Examples of protocols to encrypt management information are SSH (Secure Shell) and  
SCP (Secure Copy).  
Authentication and Authorization  
NOTE While authentication and authorization (AA) protocols and servers are designed to  
authenticate remote dial-up users (in addition to authorizing remote access capabilities to  
users), this overview is focused on using the AA model to authenticate and authorize remote  
administrators for managing a switch.  
The AA model is based on a client/server model. The Remote Access Server (RAS)the  
switchis a client to the back-end database server. A remote user (the remote administrator)  
interacts only with the RAS, not the back-end server and database.  
Two prominent AA protocols used to control dial-up access into networks are Ciscos  
TACACS+ (Terminal Access Controller Access Control System) and Livingston Enterprises  
RADIUS (Remote Authentication Dial-In User Service). Web OS supports only the RADIUS  
authentication method.  
Chapter 5: Secure Switch Management  
101  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Requirements  
The following components are required for authorization and authentication:  
n
n
A remote administrator  
The Web switch with authentication and authorization protocol support, acting as a client  
in the AA model  
n
n
A back-end authentication and authorization server that performs the following functions:  
Authenticates remote administrators  
Checks the remote administrators authorization to access the switch  
Optionally, tracks and logs the administrators activity while logging on  
An AA database that contains information about authorized administrators and their spe-  
cific capabilities and privileges  
102  
Chapter 5: Secure Switch Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
RADIUS Authentication and Authorization  
RADIUS is an access server authentication, authorization, and accounting protocol used to  
secure remote access to networks and network services against unauthorized access.  
RADIUS consists of three components:  
n
n
n
A protocol with a frame format that utilizes UDP over IP (based on RFC 2138 and 2866)  
A centralized server that stores all the user authorization information  
A client, in this case, the switch  
The operation of RADIUS authentication and authorization protocol is based on the AA model  
described previously. The switchacting as the RADIUS clientwill communicate to the  
RADIUS server to authenticate and authorize a remote administrator using the protocol defini-  
tions specified in RFC 2138 and 2866. Transactions between the client and RADIUS server are  
authenticated through the use of a shared secret, which is never sent over the network. In addi-  
tion, the remote administrator passwords are sent encrypted between the RADIUS client (the  
switch) and the back-end RADIUS server.  
2. Using Authentication/Authorization  
protocol, the switch sends request  
to authentication server  
1. Remote administrator connects to  
switch and provides user name  
and password  
Authentication  
Servers  
Internet  
Alteon Web Switch  
3. Authentication server  
checks request against  
the user ID database  
4. Using RADIUS protocol,  
the authentication server  
instructs the switch to  
grant or deny admim access  
Figure 5-1 Authentication and Authorization: How It Works  
Chapter 5: Secure Switch Management  
103  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
RADIUS Authentication Features in Web OS  
The following Radius Authentication features are supported in Web OS:  
n
Supports RADIUS client on the switch, based on the protocol definitions in RFC 2138 and  
2866.  
n
Enables/disables support of RADIUS authentication and authorization.  
The default disables the use of RADIUS for authentication and authorization.  
n
n
Allows RADIUS secret password up to 32 bytes and less than 16 octets.  
Supports secondary authentication server so that when the primary authentication server  
is unreachable, the switch can send client authentication requests to the secondary authen-  
tication server.  
Use the /cfg/sys/radius/curcommand to show the currently active RADIUS  
authentication server.  
n
Supports user-configurable RADIUS server retry and time-out values.  
The parameters are:  
Time-out value = 1-10 seconds  
Retries = 1-3  
The switch will time out if it does not receive a response from the RADIUS server in 1-3  
retries. The switch will also automatically retry connecting to the RADIUS server before it  
declares the server down.  
n
Supports user-configurable RADIUS application port.  
The default is 1645/UDP based on RFC 2138. Port 1812 is also supported.  
n
n
Allows network administrator to define privileges for one or more specific users to access  
the switch at the RADIUS user database.  
SecurID is supported if the RADIUS server can do an ACE/Server client proxy. The pass-  
word is the PIN number, plus the token code of the SecurID card.  
104  
Chapter 5: Secure Switch Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Web Switch User Accounts  
The user accounts listed in Table 5-1 can be defined in the RADIUS server dictionary file.  
Table 5-1 User Access Levels  
User Account  
Description and Tasks Performed  
Password  
User  
The User has no direct responsibility for switch management.  
He/she can view all switch status information and statistics but  
cannot make any configuration changes to the switch.  
user  
SLB Operator  
The SLB Operator manages Web servers and other Internet ser- slboper  
vices and their loads. In addition to being able to view all switch  
information and statistics, the SLB Operator can enable/disable  
servers using the SLB operation menu.  
Layer 4 Operator  
The Layer 4 Operator manages traffic on the lines leading to the l4oper  
shared Internet services. This user currently has the same access  
level as the SLB operator. This level is reserved for future use, to  
provide access to operational commands for operators managing  
traffic on the line leading to the shared Internet services.  
Operator  
The Operator manages all functions of the switch. In addition to oper  
SLB Operator functions, the Operator can reset ports or the  
entire switch.  
SLB Administrator  
The SLB Administrator configures and manages Web servers  
and other Internet services and their loads. In addition to SLB  
Operator functions, the SLB Administrator can configure param-  
eters on the SLB menus, with the exception of not being able to  
configure filters or bandwidth management.  
slbadmin  
Layer 4 Administrator The Layer 4 Administrator configures and manages traffic on the l4admin  
lines leading to the shared Internet services. In addition to SLB  
Administrator functions, the Layer 4 Administrator can config-  
ure all parameters on the SLB menus, including filters and band-  
width management.  
Administrator  
The super-user Administrator has complete access to all menus, admin  
information, and configuration commands on the switch, includ-  
ing the ability to change both the user and administrator pass-  
words.  
Chapter 5: Secure Switch Management  
105  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
When the user logs in, the switch authenticates his/her level of access by sending the RADIUS  
access request, that is, the client authentication request, to the RADIUS authentication server.  
If the remote user is successfully authenticated by the authentication server, the switch will  
verify the privileges of the remote user and authorize the appropriate access. When both the  
primary and secondary authentication servers are not reachable, the administrator has an  
option to allow backdoor access via the console only or console and telnet access. The default  
is disable for telnet access and enable for console access.  
All user privileges, other than those assigned to the Administrator, have to be defined in the  
RADIUS dictionary. Radius attribute 6 which is built into all Radius servers defines the admin-  
istrator. The file name of the dictionary is RADIUS vendor-dependent. The following user  
privileges are Web OS-proprietary definitions.  
Table 5-2 Web OS Alteon Levels  
User Name/Access  
User  
User-Service-Type  
Vendor-supplied  
Vendor-supplied  
Vendor-supplied  
Vendor-supplied  
Vendor-supplied  
Vendor-supplied  
Value  
255  
254  
253  
252  
251  
250  
SLB Operator  
Layer 4 Operator  
Operator  
SLB Administrator  
Layer 4 Administrator  
106  
Chapter 5: Secure Switch Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Secure Shell and Secure Copy  
Although a remote network administrator can manage the configuration of an Alteon Web  
switch via Telnet, this method does not provide a secure connection. Using Secure Shell (SSH)  
and Secure Copy (SCP), messages between a remote administrator and the switch use secure  
tunnels so that the data on the network is encrypted and secured. Figure 5-1 on page 103 illus-  
trates secure switch management.  
NOTE SSH/SCP features are configured via the console port, using the CLI. However, SCP  
putcfgand TFTP getcfgcan also change the SSH/SCP configuration.When SSH is  
enabled, SCP is also enabled.  
SSH is a protocol that enables a remote administrator to log securely into another computer  
over a network to execute management commands. All the data sent over the network using  
SSH is encrypted and secured. Using SSH gives administrators an alternate way to manage the  
switch, one that provides strong security.  
SCP is typically used to copy files securely from one machine to another. SCP uses SSH for  
encryption of data on the network. On an Alteon Web switch, SCP is used to download and  
upload the switch configuration via secure channels.  
The benefits of using SSH and SCP are listed below:  
n
n
n
n
Authentication of remote administrators  
Identifying the administrator using Name/Password  
Authorization of remote administrators  
Determining the permitted actions and customizing service for individual administrators  
Encryption of management messages  
Encrypting messages between the remote administrator and switch  
Secure copy support  
NOTE The Web OS implementation of SSH is based on SSH version 1.5 and supports SSH-  
1.5-1.x.xx. SSH clients of other versions (especially version 2) will not be supported. The fol-  
lowing SSH clients have been tested:  
n
n
n
SSH 1.2.23 and SSH 1.2.27 for Linux (freeware)  
SecureCRT 3.0.2 and SecureCRT 3.0.3 for Windows NT (Van Dyke Technologies, Inc.)  
F-Secure SSH 1.1 for Windows (Data Fellows)  
Chapter 5: Secure Switch Management  
107  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
NOTE There can be a maximum number of four simultaneous Telnet/SSH/SCP connections  
at one time. The /cfg/sys/radius/telnetcommand also applies to SSH/SCP connec-  
tions.  
Encryption of Management Messages  
The supported encryption and authentication methods for both SSH and SCP are listed below:  
Server Host Authentication:  
Client RSA authenticates the switch at the beginning of  
every connection  
Key Exchange:  
Encryption:  
RSA  
3DES-CBC, DES  
User Authentication:  
Local password authentication, RADIUS, SecurID(via  
RADIUS, for SSH onlydoes not apply to SCP)  
SCP Services  
Administrator privileges are required to perform SCP commands. Set the SCP admin password  
(this password must be different from the admin password).  
The following SCP commands are supported in this service. These commands are entered  
using the CLI on the client that is running the SCP application:  
n getcfgis used to download the switch's configuration to the remote host via SCP.  
n putcfgis used to upload the switch's configuration from a remote host to the switch; the  
diffcommand will be automatically executed at the end of putcfgto notify the remote  
client of the difference between the new and the current configurations.  
n putcfg_applywill run the apply commandafter the putcfgis done.  
n putcfg_apply_savesaves the new configuration to the flash after putcfg_apply  
is done.  
The putcfg_applyand putcfg_apply_savecommands are provided because extra  
applyand savecommands are usually required after a putcfg; however, an SCP session  
is not in an interactive mode at all.  
108  
Chapter 5: Secure Switch Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
RSA Host and Server Keys  
To support the SSH server feature, two sets of RSA keys (host and server keys) are required.  
The host key is 1024 bits and is used to identify the Web switch. The server key is 768 bits and  
is used to make it impossible to decipher a captured session by breaking into the Web switch at  
a later time.  
When the SSH server is first enabled and applied, the switch will automatically generate the  
host and server keys and will then store them into the FLASH memory.  
NOTE The Web switch will perform only one session of key/cipher generation at a time.  
Thus, an SSH/SCP client will not be able to log in if the switch is performing key generation at  
that time, or if another client has logged in immediately prior. Also, key generation will fail if  
an SSH/SCP client is logging in at that time.  
n
To generate a host key:  
>> # /cfg/sys/sshd/hkeygen  
n
To generate a server key:  
>> # /cfg/sys/sshd/skeygen  
Again, the host and server key are automatically stored in FLASH memory when generated.  
NOTE For security reasons, the SSHD menu options are available via the console port only  
and not via Telnet, SNMP, or the Browser-Based Interface (BBI).  
When the switch reboots, it will retrieve the host and server keys from the FLASH memory. If  
these two keys are not available in the flash and if the SSH server feature is enabled, the switch  
will automatically generate them during the system reboot.  
The switch can also automatically regenerate the RSA server key. To set the interval of RSA  
server key autogeneration, use this command:  
>> # /cfg/sys/sshd/intrval <number of hours (0-24)>  
where the number of hours must range between 024, and a value of 0 denotes that RSA server  
key autogeneration is disabled. When greater than 0, the switch will autogenerate the RSA  
server key every specified interval; however, RSA server key generation will be skipped if the  
switch is busy doing other key or cipher generation when the timer expires.  
Chapter 5: Secure Switch Management  
109  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Radius Authentication  
SSH/SCP is integrated with RADIUS authentication. After the RADIUS server is enabled on  
the switch, all subsequent SSH authentication requests will be redirected to the specified  
RADIUS servers for authentication. The redirection is transparent to the SSH clients.  
SecurID Support  
SSH/SCP can also work with SecurID, a token card-based authentication method. The use of  
SecurID requires the interactive mode during login, which is not provided by the SSH connec-  
tion.  
NOTE There is no SNMP or Browser-Based Interface (BBI) support for SecurID because the  
SecurID server, ACE, is a one-time password authentication and requires an interactive ses-  
sion.  
To log in using SSH without difficulties, you need to use a special username, ace,to log in  
and bypass the SSH authentication. After an SSH connection is established, you will then be  
prompted to enter the username and password (the SecurID authentication is being performed  
now). You will need to provide your actual username and the token in your SecurID card as a  
regular Telnet user would do in order to log in.  
To use SCP, you need to use the SCP-only administrators password (that is, the scpadm  
option under the /cfg/sys/sshdmenu) to bypass the checking of SecurID. Alternately,  
you can configure a regular administrator with a fixed password in the RADIUS server if it can  
be supported. A regular administrator with a fixed password in the RADIUS server can per-  
form both SSH and SCP with no additional authentication required.  
A SCP-only administrators password is typically used when SecurID is used. For example, it  
can be used in an automation program (in which the tokens of SecurID are not available) to  
back up (download) the switch configurations each day.  
NOTE The SCP-only administrators password must be different from the regular administra-  
tors password. If the two passwords are the same, the administrator using that password will  
not be allowed to log in as a SSH user because the switch will recognize him as the SCP-only  
administrator and only allow the administrator access to SCP commands.  
110  
Chapter 5: Secure Switch Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Configuring SSH/SCP  
SSH/SCP parameters can be configured only via the console port, using the CLI. The switch  
SSH daemon uses TCP port 22 only and is not configurable.  
To enable or disable the SSH/SCP feature, use the following commands:  
>> # /cfg/sys/sshd/on  
>> # /cfg/sys/sshd/off  
(Turn SSH/SCP on)  
(Turn SSH/SCP off)  
To set the interval of RSA server key autogeneration, use this command:  
>> # /cfg/sys/sshd/intrval <number of hours (0-24)>  
where the number of hours must range between 024, and a value of 0 denotes that RSA server  
key autogeneration is disabled. When greater than 0, the switch will auto-generate the RSA  
server key every interval specified; however, RSA server key generation will be skipped if the  
switch is busy doing other key or cipher generation when the timer expires.  
To enable or disable the SCP apply and save (SCP putcfg_applyand  
putcfg_apply_savecommands), use these commands:  
>> # /cfg/sys/sshd/ena  
>> # /cfg/sys/sshd/dis  
(Enable SSH/SCP apply and save)  
(Disable SSH/SCP apply and save)  
The following commands are useful for obtaining information about the current SSH/SCP-  
related configuration:  
>> # /cfg/sys/sshd/cur  
>> # diff  
(View current SSH/SCP settings)  
(View pending changes)  
To apply the pending changes from the new configuration, use this command:  
>> # apply  
NOTE If SSH/SCP is enabled and an applycommand is issued, the switch will automati-  
cally generate the RSA host and server keys if they are not available. It will take several min-  
utes to complete this process.  
Chapter 5: Secure Switch Management  
111  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
To save the current configuration to FLASH, use this command:  
>> # save  
Usually, there will be no need to generate manually the RSA host and server keys. However,  
you may still do so by using the following commands:  
>> # /cfg/sys/sshd/hkeygen  
>> # /cfg/sys/sshd/skeygen  
(Generates the host key)  
(Generates the server key)  
NOTE These two commands will take effect immediately without the need of an apply  
command being issued.  
Some Supported Client Commands  
Up to four simultaneous Telnet/SSH/SCP connections are supported on a switch.  
n
n
n
To log in to the switch:  
ssh <switch IP address> or ssh-l <username> <switch IP address>  
To download the switch configuration using SCP:  
scp <switch IP address>:getcfg <local filename>  
To upload the configuration to the switch:  
scp <local filename> <switch IP address>:putcfg  
Some examples are listed below:  
>> # ssh 205.178.15.157  
>> # ssh -l dleu 205.178.15.157  
>> # scp 205.178.15.157:getcfg ad4.cfg  
>> # scp ad4.cfg 205.178.15.157:putcfg  
where 205.178.15.157 is the IP address of the example switch.  
Please also note that applyand savecommands are still needed after the last command  
(scp ad4.cfg 205.178.15.157:putcfg) is issued. Or, instead, you can use the fol-  
lowing commands:  
>> # scp ad4.cfg 205.178.15.157:putcfg_apply  
>> # scp ad4.cfg 205.178.15.157:putcfg_apply_save  
112  
Chapter 5: Secure Switch Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Port Mirroring  
Port mirroring is implemented to enhance the security of your network. For example, an IDS  
server can be connected to the monitor port to detect intruders attacking the network.  
The port mirroring feature in Web OS 10.0 allows you to attach a sniffer to a monitoring port  
that is configured to receive a copy of every single packet that is forwarded from the mirrored  
port. Web OS enables you to mirror port traffic for all layers (Layer 2 - 7).  
As shown in Figure 5-2, port 5 is monitoring ingress traffic (traffic entering the switch) on port  
1 and egress traffic (traffic leaving the switch) on port 3. You can attach a device to port 5 to  
monitor the traffic on ports 1 and 3.  
Mirrored ports  
Monitoring port  
Gigabit  
Powered  
Data  
Link  
Active  
1
2
3
4
5
6
7
8
Data  
Link  
9
Data  
Link  
Active  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
TX  
RX  
Power  
Console  
Ingress traffic  
Egress traffic  
Figure 5-2 Monitoring Ports  
Figure 5-2 shows two mirrored ports monitored by a single port. Similarly, you can have a sin-  
gle or groups of  
n
n
a mirrored port to a monitored port  
many mirrored ports to one monitored port  
Web OS 10.0 does not support a single port being monitored by multiple ports.  
Packets are duplicated and sent to the mirrored ports after client or server port processing is  
completed. Data packets sent from a client to a virtual server are seen at the mirrored port as  
follows:  
n
n
source IP address = client IP address  
destination IP address = real server IP address rather than the virtual server IP address.  
Conversely, the response from the server to the client will be seen as follows:  
n
n
source IP address =virtual server IP address  
destination IP address=client IP address  
Chapter 5: Secure Switch Management  
113  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
NOTE Port mirroring and bandwidth management cannot be enabled at the same time.  
To configure port mirroring for the example shown in Figure 5-2,  
1. Specify the monitoring port.  
>> # /cfg/pmirr/monport 5  
(Select port 5 for monitoring)  
2. Select the ports that you want to mirror.  
>> Port 5 # add 1  
(Select port 1 to mirror)  
>> Enter port mirror direction [in, out, or both]: in  
(Monitor ingress traffic on port 1)  
(Select port 3 to mirror)  
>> Enter port mirror direction [in, out, or both]: out  
(Monitor egress traffic on port 3)  
>> Port 5 # add 3  
3. Enable port mirroring.  
>> # /cfg/pmirr/mirr ena  
(Enable port mirroring)  
4. Apply and save the configuration.  
>> PortMirroring# apply  
>> PortMirroring# save  
(Apply the configuration)  
(Save the configuration)  
5. View the current configuration.  
>> PortMirroring# cur  
(Display the current settings)  
Port mirroring is enabled  
Monitoring Ports  
Mirrored Ports  
1
2
3
4
5
6
7
8
9
none  
none  
none  
none  
(1, in) (3, out)  
none  
none  
none  
none  
114  
Chapter 5: Secure Switch Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Part 2: Web Switching  
Fundamentals  
Internet traffic consists of myriad services and applications which use the Internet Protocol  
(IP) for data delivery. IP, however, is not optimized for all the various applications. Web  
switching goes beyond IP and makes intelligent switching decisions based on the application  
and its data. This sections details the following fundamental Web switching features:  
n
n
n
n
n
n
Server Load Balancing  
Filtering  
Application Redirection  
Virtual Matrix Architecture  
Health Checking  
High Availability  
115  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
116  
Web Switching Fundamentals  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 6  
Server Load Balancing  
Server Load Balancing (SLB) allows you to configure the Alteon Web switch to balance user  
sections in this chapter describe how to configure and use SLB:  
n
Understanding Server Load Balancingon page 118. This section discusses the benefits  
of server load balancing and how it works.  
n
Implementing Basic Server Load Balancingon page 121. This section discusses how  
implementing SLB provides reliability, performance, and ease of maintenance on your  
network.  
Network Topology Requirementson page 122. This section provides key require-  
ments to consider before deploying server load balancing.  
Additional Server Load Balancing Optionson page 128.  
n
n
Extending SLB Topologieson page 136. This section discusses proxy IP addresses,  
mapping a virtual port to real ports, monitoring real server ports, and delayed binding.  
Load Balancing Special Serviceson page 149. This section discusses load balancing  
based on special services, such as source IP addresses, FTP, RTSP, DNS, WAP, IDS, and  
WAN link.  
For additional information about the SLB feature, see your Web OS Command Reference.  
117  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Understanding Server Load Balancing  
SLB benefits your network in a number of ways:  
n
Increased efficiency for server utilization and network bandwidth  
With SLB, your Alteon Web switch is aware of the shared services provided by your  
server pool and can then balance user session traffic among the available servers. Impor-  
tant session traffic gets through more easily, reducing user competition for connections on  
overutilized servers. For even greater control, traffic is distributed according to a variety  
of user-selectable rules.  
n
n
Increased reliability of services to users  
If any server in a server pool fails, the remaining servers continue to provide access to  
vital applications and data. The failed server can be brought back up without interrupting  
access to services.  
Increased scalability of services  
As users are added and the server pools capabilities are saturated, new servers can be  
added to the pool transparently.  
Identifying Your Network Needs  
SLB may be the right option for addressing these vital network concerns:  
n
n
n
A single server no longer meets the demand for its particular application.  
The connection from your LAN to your server overloads the servers capacity.  
Your NT and UNIX servers hold critical application data and must remain available even  
in the event of a server failure.  
n
Your Web site is being used as a way to do business and for taking orders from customers.  
It must not become overloaded or unavailable.  
n
n
n
You want to use multiple servers or hot-standby servers for maximum server uptime.  
You must be able to scale your applications to meet client and LAN request capacity.  
You cant afford to continue using an inferior load-balancing technique, such as DNS  
round robin or a software-only system.  
118  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
How Server Load Balancing Works  
In an average network that employs multiple servers without server load balancing, each server  
usually specializes in providing one or two unique services. If one of these servers provides  
access to applications or data that is in high demand, it can become overutilized. Placing this  
kind of strain on a server can decrease the performance of the entire network as user requests are  
rejected by the server and then resubmitted by the user stations. Ironically, over-utilization of  
key servers often happens in networks where other servers are actually available.  
The solution to getting the most from your servers is SLB. With this software feature, the  
switch is aware of the services provided by each server. The switch can direct user session traf-  
fic to an appropriate server, based on a variety of load-balancing algorithms.  
Retail  
Trading  
Lending  
Retail  
Trading  
Lending  
Retail  
Trading  
Lending  
Trading  
Retail  
Lending  
Retail Trading  
Clients  
Clients  
Figure 6-1 Traditional Versus SLB Network Configurations  
To provide load balancing for any particular type of service, each server in the pool must have  
access to identical content, either directly (duplicated on each server) or through a back-end  
network (mounting the same file system or database server).  
Chapter 6: Server Load Balancing  
119  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
The Web switch, with SLB software, acts as a front-end to the servers, interpreting user session  
requests and distributing them among the available servers. Load balancing in Web OS can be  
done in the following ways:  
n
Virtual server-based load balancing  
This is the traditional load balancing method. The switch is configured to act as a virtual  
server and is given a virtual server IP address (or range of addresses) for each collection of  
services it will distribute. Depending on your switch model, there can be as many as 256  
virtual servers on the switch, each distributing up to eight different services (up to a total  
of 2048 services).  
Each virtual server is assigned a list of the IP addresses (or range of addresses) of the real  
servers in the pool where its services reside. When the user stations request connections to  
a service, they will communicate with a virtual server on the switch. When the switch  
receives the request, it binds the session to the IP address of the best available real server  
and remaps the fields in each frame from virtual addresses to real addresses.  
IP, FTP, RTSP, IDS, and static session WAP are examples of some of the services that use  
virtual servers for load balancing.  
n
Filtered-based load balancing  
A filter allows you to control the types of traffic permitted through the switch. Filters are  
configured to allow, deny, or redirect traffic according to the IP address, protocol, or Layer  
4 port criteria. In filtered-based load balancing, a filter is used to redirect traffic to a real  
server group. If the group is configured with more than one real server entry, redirected  
traffic is load balanced among the available real servers in the group.  
Firewalls, WAP with RADIUS snooping, IDS, and WAN links use redirection filters to  
load balance traffic.  
n
Content-based load balancing  
Content-based load balancing uses Layer 7 application data (such as URL, cookies, and  
Host Headers) to make intelligent load balancing decisions.  
URL-based load balancing, browser-smart load balancing, and cookie-based preferential  
load balancing are a few examples of content-based load balancing.  
120  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Implementing Basic Server Load Balancing  
Consider a situation where customer Web sites are being hosted by a popular Web hosting  
company and/or Internet Service Provider (ISP). The Web content is relatively static and is  
kept on a single NFS server for easy administration. As the customer base increases, the num-  
ber of simultaneous Web connection requests also increases.  
Web Server  
Web Clients  
As clients increase, the server becomes overloaded  
NFS Server  
Internet  
Web Host  
Router  
Figure 6-2 Web Hosting Configuration Without SLB  
Such a company has three primary needs:  
n
n
n
Increased server availability  
Server performance scalable to match new customer demands  
Easy administration of network and servers  
Web Clients  
Layer 4 Switching &  
Web Server Farm  
Server Load Balancing  
A
B
Web Switch  
C
Internet  
Web Host  
Routers  
Layer 2  
Switching  
Layer 2  
Switching  
NFS Server  
Figure 6-3 Web Hosting with SLB Solutions  
Chapter 6: Server Load Balancing  
121  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
All of the above issues can be addressed by adding an Alteon Web switch with SLB software.  
n
Reliability is increased by providing multiple paths from the clients to the Web switch and  
by accessing a pool of servers with identical content. If one server fails, the others can take  
up the additional load.  
n
n
Performance is improved by balancing the Web request load across multiple servers. More  
servers can be added at any time to increase processing power.  
For ease of maintenance, servers can be added or removed dynamically, without interrupt-  
ing shared services.  
Network Topology Requirements  
n
In standard SLB, all client requests to a virtual server IP address and all responses from the  
real servers must pass through the switch, as shown in Figure 6-4. If there is a path between  
the client and the real servers that does not pass through the switch, the Web switch can be  
configured to proxy requests in order to guarantee that responses use the correct path (see  
Proxy IP Addresseson page 136).  
Router  
Internet  
NFS Server  
Server Pool #1  
Server Pool #2  
Web  
Switch  
Router  
Switch  
Clients  
Switch  
Alternate path is not valid with  
Layer 4 services. IP proxy  
addresses must be used on the  
Alteon Web switch  
Figure 6-4 SLB Client/Server Traffic Routing  
n
Identical content must be available to each server in the same pool. Either of these meth-  
ods can be used:  
Static applications and data are duplicated on each real server in the pool.  
Each real server in the pool has access to the same data through use of a shared file  
system or back-end database server.  
122  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
n
n
Some services require that a series of client requests go to the same real server so that ses-  
sion-specific state data can be retained between connections. Services of this nature  
include Web search results, multi-page forms that the user fills in, or custom Web-based  
applications typically created using cgi-binscripts. Connections for these types of ser-  
vices must be configured as persistent (see Chapter 16, Persistence) or must use the  
minmissesor hashmetrics (see Metrics for Real Server Groupson page 131).  
Clients and servers can be connected through the same switch port. Each port in use on the  
switch can be configured to process client requests, server traffic, or both. You can enable  
or disable processing on a port independently for each type of Layer 4 traffic.  
Layer 4 client processing: Ports that are configured to process client request traffic  
provide address translation from the virtual server IP to the real server IP address.  
Layer 4 server processing: Ports that are configured to process server responses to cli-  
ent requests provide address translation from the real server IP address to the virtual  
server IP address. These ports require real servers to be connected to the Web switch  
directly or through a hub, router, or another switch.  
NOTE Switch ports configured for Layer 4 client/server processing can simultaneously pro-  
vide Layer 2 switching and IP routing functions.  
Consider the following network topology:  
Web servers initiate DNS requests  
which are load balanced  
to DNS servers  
C
S
Client Processing  
Server Processing  
Web Switch  
DNS  
Server  
Pool  
Router  
1
A
S
Internet  
C
3
C
S
2
Web  
Server  
Pool  
Clients on the Internet  
initiate HTTP sessions which  
are load balanced to Web servers  
B
Figure 6-5 Example Network for Client/Server Port Configuration  
In Figure 6-5, the switch load balances traffic to a Web server pool and to a Domain Name  
System (DNS) server pool. The switch port connected to the Web server pool (port 2) is  
asked to perform both server and client processing.  
Some topologies require special configuration. For example, if clients were added to Switch B  
as shown in Figure 6-5, these clients could not access the Web server pool using SLB services,  
except through a proxy IP address that is configured on port 2 of the Alteon Web switch.  
Chapter 6: Server Load Balancing  
123  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Configuring Server Load Balancing  
This section describes the steps for configuring an SLB Web hosting solution. In the following  
procedure, many of the SLB options are left to their default values. See Additional Server  
Load Balancing Optionson page 128 for more options.  
The following is required prior to configuration:  
n
n
You must be connected to the switch Command Line Interface (CLI) as the administrator.  
The SLB software must be enabled.  
NOTE For details about any of the menu commands described in this example, see your  
Web OS Command Reference.  
1. Assign an IP address to each of the real servers in the server pool.  
The real servers in any given real server group must have an IP route to the switch that per-  
forms the SLB functions. This IP routing is most easily accomplished by placing the switches  
and servers on the same IP subnet, although advanced routing techniques can be used as long  
as they do not violate the topology rules outlined in Network Topology Requirementson  
page 122.  
For this example, the three Web-host real servers have been given the following IP addresses  
on the same IP subnet:  
Table 6-1 Web Host Example: Real Server IP Addresses  
Real Server  
Server A  
IP address  
200.200.200.2  
200.200.200.4  
Server B  
Server C  
NOTE An imaskoption can be used to define a range of IP addresses for real and virtual  
servers (see IP Address Ranges Using imaskon page 129).  
124  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
2. Define an IP interface on the switch.  
The switch must have an IP route to all of the real servers that receive Web switching services.  
For SLB, the switch uses this path to determine the level of TCP/IP reach of the real servers.  
To configure an IP interface for this example, enter these commands from the CLI:  
>> # /cfg/ip/if 1  
(Select IP interface 1)  
>> IP Interface 1# addr 200.200.200.100  
>> IP Interface 1# ena  
(Assign IP address for the interface)  
(Enable IP interface 1)  
NOTE The IP interface and the real servers must belong to the same VLAN, if they are in the  
same subnet. This example assumes that all ports and IP interfaces use default VLAN 1,  
requiring no special VLAN configuration for the ports or IP interface.  
3. Define each real server.  
For each real server, you must assign a real server number, specify its actual IP address, and  
enable the real server. For example:  
>> IP Interface 1# /cfg/slb/real 1  
>> Real server 1# rip 200.200.200.2  
>> Real server 1# ena  
(Server A is real server 1)  
(Assign Server A IP address)  
(Enable real server 1)  
>> Real server 1# ../real 2  
>> Real server 2# rip 200.200.200.3  
>> Real server 2# ena  
(Server B is real server 2)  
(Assign Server B IP address)  
(Enable real server 2)  
>> Real server 2# ../real 3  
>> Real server 3# rip 200.200.200.4  
>> Real server 3# ena  
(Server C is real server 3)  
(Assign Server C IP address)  
(Enable real server 3)  
4. Define a real server group and add the three real servers to the service group.  
>> Real server 3# /cfg/slb/group 1  
>> Real server group 1# add 1  
>> Real server group 1# add 2  
>> Real server group 1# add 3  
(Select real server group 1)  
(Add real server 1 to group 1)  
(Add real server 2 to group 1)  
(Add real server 3 to group 1)  
Chapter 6: Server Load Balancing  
125  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
5. Define a virtual server.  
All client requests will be addressed to a virtual server IP address on a virtual server defined on  
the switch. Clients acquire the virtual server IP address through normal DNS resolution. In this  
example, HTTP is configured as the only service running on this virtual server, and this service  
is associated with the real server group. For example:  
>> Real server group 1# /cfg/slb/virt 1  
>> Virtual server 1# vip 200.200.200.1  
>> Virtual server 1# ena  
(Select virtual server 1)  
(Assign a virtual server IP address)  
(Enable the virtual server)  
(Select the HTTP service menu)  
>> Virtual server 1 http Service# group 1 (Associate virtual port to real group)  
NOTE This configuration is not limited to HTTP Web service. Other TCP/IP services can be  
configured in a similar fashion. For a list of other well-known services and ports, see Well-  
Known Application Portson page 128. To configure multiple services, see Configuring Mul-  
tiple Serviceson page 130.  
6. Define the port settings.  
In this example, the following ports are being used on the Web switch:  
Table 6-2 Web Host Example: Port Usage  
Port  
Host  
L4 Processing  
Server  
1
2
3
4
Server A serves SLB requests.  
Server B serves SLB requests.  
Server C serves SLB requests.  
Server  
Server  
Back-end NFS server provides centralized Web content for all three None  
real servers. This port does not require Web switching features.  
5
6
Client router A connects the switch to the Internet where client  
requests originate.  
Client  
Client router B connects the switch to the Internet where client  
requests originate.  
Client  
126  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
The ports are configured as follows:  
>> Virtual server 1# /cfg/slb/port 1  
>> SLB port 1# server ena  
>> SLB port 1# ../port 2  
>> SLB port 2# server ena  
>> SLB port 2# ../port 3  
>> SLB port 3# server ena  
>> SLB port 3# ../port 5  
>> SLB port 5# client ena  
>> SLB port 5# ../port 6  
>> SLB port 6# client ena  
(Select physical switch port 1)  
(Enable server processing on port 1)  
(Select physical switch port 2)  
(Enable server processing on port 2)  
(Select physical switch port 3)  
(Enable server processing on port 3)  
(Select physical switch port 5)  
(Enable client processing on port 5)  
(Select physical switch port 6)  
(Enable client processing on port 6)  
7. Enable, apply, and verify the configuration.  
>> SLB port 6# ..  
>> Layer 4# on  
>> Layer 4# apply  
>> Layer 4# cur  
(Select the SLB Menu)  
(Turn Server Load Balancing on)  
(Make your changes active)  
(View current settings)  
Examine the resulting information. If any settings are incorrect, make the appropriate changes.  
8. Save your new configuration changes.  
>> Layer 4# save  
(Save for restore after reboot)  
NOTE You must applyany changes in order for them to take effect, and you must save  
changes if you wish them to remain in effect after switch reboot.  
9. Check the SLB information.  
>> Layer 4# /info/slb/dump  
(View SLB information)  
Check that all SLB parameters are working according to expectation. If necessary, make any  
appropriate configuration changes and then check the information again.  
Chapter 6: Server Load Balancing  
127  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
In the previous section (Configuring Server Load Balancingon page 124), many of the SLB  
options are left to their default values. The following configuration options can be used to cus-  
n
n
n
n
n
n
n
n
n
n
Metrics for Real Server Groupson page 131  
Weights for Real Serverson page 134  
Connection Time-outs for Real Serverson page 134  
Maximum Connections for Real Serverson page 134  
Backup/Overflow Serverson page 135  
Supported Services and Applications  
Each virtual server can be configured to support up to eight services, limited to a total of 256  
services per switch. Using the /cfg/slb/virt<virtual server number>/service  
option, the following TCP/UDP applications can be specified:  
NOTE The service number specified on the switch must match the service specified on the server.  
Table 6-3 Well-Known Application Ports  
Number TCP/UDP  
Application  
Number TCP/UDP  
Application  
Number  
TCP/UDP  
Application  
20  
21  
22  
23  
25  
37  
42  
43  
53  
69  
70  
ftp-data  
ftp  
ssh  
telnet  
smtp  
time  
name  
whois  
tftp  
79  
80  
finger  
http  
pop2  
pop3  
sunrpc  
nntp  
179  
194  
220  
389  
443  
520  
554  
bgp  
irc  
imap3  
ldap  
https  
rip  
109  
110  
111  
119  
123  
143  
161  
162  
ntp  
rtsp  
imap  
snmp  
snmptrap  
1645, 1812 Radius  
1813  
1985  
Radius Accounting  
hsrp  
gopher  
NOTE Load balancing some applications (such as FTP and RTSP) require special attention.  
See Load Balancing Special Serviceson page 149 for more information.  
128  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Web OS 10.0 Application Guide  
Disabling and Enabling Real Servers  
If you need to reboot a server, you must make sure that new sessions are not sent to the real  
server and that old sessions are not discarded. When the session count gets to zero, you may  
shut down the server. Use the following command to disable real servers:  
>> # /oper/slb/dis <real server number>  
When maintenance is complete, use the following command to enable the real server:  
>> # /oper/slb/ena <real server number>  
IP Address Ranges Using imask  
The imaskoption lets you define a range of IP addresses for the real and virtual servers con-  
figured under SLB. By default, the imasksetting is 255.255.255.255, which means that each  
real and virtual server represents a single IP address. An imask setting of 255.255.255.0 would  
mean that each real and virtual server represents 256 IP addresses. Consider the following  
example:  
n
n
n
A virtual server is configured with an IP address of 172.16.10.1.  
Real servers 172.16.20.1 and 172.16.30.1 are assigned to service the virtual server.  
The imask is set to 255.255.255.0.  
If the client request was sent to virtual server IP address 172.16.10.45, the unmasked portion of  
the address (0.0.0.45) gets mapped directly to whichever real server IP address is selected by  
the SLB algorithm. Thus, the request would be sent to either 172.16.20.45 or 172.16.30.45.  
Chapter 6: Server Load Balancing  
129  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Health Checks for Real Servers  
Determining health for each real server is a necessary function for SLB. By default for TCP  
services, the switch checks health by opening a TCP connection to each service port config-  
ured as part of each service. For more information, see Configuring Multiple Serviceson  
page 130. For UDP services, the switch pings servers to determine their status.  
By default, the switch checks each service on each real server every two seconds. If the real  
server is busy processing connections, it may not respond to a health check. By default, if a  
service does not respond to four consecutive health checks, the switch declares the service  
unavailable. As shown below, the health check interval and the number of retries can be  
changed:  
>> # /cfg/slb/real <real server number>  
>> Real server# inter 4  
>> Real server# retry 6  
(Select the real server)  
(Check real server every 4 seconds)  
(Declare down after 6 checks fail)  
For more complex health-checking strategies, see Chapter 10, Health Checking.”  
Configuring Multiple Services  
When you configure multiple services in a group, their health checks will be dependent on  
each other. If a real server fails a health check for a service, then the status of the real server for  
the second service appears as blocked.”  
If you are configuring two independent services such as FTP and SMTPwhere the real  
server failure on one service does not affect other services that the real server supports, then  
configure two groups with the same real servers but different services. If a real server config-  
ured for both FTP and SMTP fails FTP, the real server is still available for SMTP. This allows  
the services to act independently even though they are using the same real servers.  
If you are configuring two dependent services such as HTTP and HTTPSwhere the real  
server failure on one service blocks the real server for other services, then configure a single  
group with multiple services. If a real server configured for both HTTP and HTTPS fails for  
the HTTP service, then the server is blocked from supporting any HTTPS requests. The switch  
will block HTTPS requests, (even though HTTPS has not failed) until the HTTP service  
becomes available again. This helps in troubleshooting so you know which service has failed.  
130  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Metrics for Real Server Groups  
Metrics are used for selecting which real server in a group will receive the next client connec-  
tion. The available metrics minmisses(minimum misses), hash, leastconns(least con-  
nections), roundrobin, bandwidth, and response(response time) are explained in  
detail below. The default metric is leastconns.  
To change a real server group metric to minmisses, for example, enter:  
>> # /cfg/slb/group <group number>  
>> Real server group# metric minmisses  
(Select the real server group)  
(Use minmisses metric)  
Minimum Misses  
The minmissesmetric is optimized for Application Redirection. It uses IP address informa-  
tion in the client request to select a server. The specific IP address information used depends on  
the application:  
n
n
For Application Redirection, the client destination IP address is used. All requests for a  
specific IP destination address is sent to the same server. This metric is particularly useful  
in caching applications, helping to maximize successful cache hits. Best statistical load  
balancing is achieved when the IP address destinations of load-balanced frames are spread  
across a broad range of IP subnets.  
For SLB, the client source IP address and real server IP address are used. All requests  
from a specific client are sent to the same server. This metric is useful for applications  
where client information must be retained on the server between sessions. With this met-  
ric, server load becomes most evenly balanced as the number of active clients with differ-  
ent source or destination addresses increases.  
When selecting a server, the switch calculates a score for each available real server based on  
the relevant IP address information. The server that scores the highest is assigned the connec-  
tion. This metric attempts to minimize the disruption of persistency when servers are removed  
from service. This metric should be used only when persistence is a must.  
NOTE The minmissesmetric cannot be used for firewall load balancing, since the real  
server IP addresses used in calculating the score for this metric are different on each side of the  
firewall.  
Chapter 6: Server Load Balancing  
131  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Hash  
The hashmetric uses IP address information in the client request to select a server. The spe-  
cific IP address information used depends on the application:  
n
n
n
For Application Redirection, the client destination IP address is used. All requests for a  
specific IP destination address will be sent to the same server. This is particularly useful  
for maximizing successful cache hits.  
For SLB, the client source IP address is used. All requests from a specific client will be  
sent to the same server. This option is useful for applications where client information  
must be retained between sessions.  
For FWLB, both the source and destination IP addresses are used to ensure that the two  
unidirectional flows of a given session are redirected to the same firewall.  
When selecting a server, a mathematical hash of the relevant IP address information is used as  
an index into the list of currently available servers. Any given IP address information will  
always have the same hash result, providing natural persistence, as long as the server list is sta-  
ble. However, if a server is added to or leaves the mix, then a different server might be  
assigned to a subsequent session with the same IP address information even though the original  
server is still available. Open connections are not cleared.  
NOTE The hashmetric provides more distributed load balancing than minmissesat any  
given instant. It should be used if the statistical load balancing achieved using minmissesis  
not as optimal as desired. If the load balancing statistics with minmissesindicate that one  
server is processing significantly more requests over time than other servers, consider using  
the hashmetric.  
Least Connections  
With the leastconnsmetric, the number of connections currently open on each real server  
is measured in real time. The server with the fewest current connections is considered to be the  
best choice for the next client connection request.  
This option is the most self-regulating, with the fastest servers typically getting the most con-  
nections over time.  
Round Robin  
With the roundrobinmetric, new connections are issued to each server in turn; that is, the  
first real server in the group gets the first connection, the second real server gets the next con-  
nection, followed by the third real server, and so on. When all the real servers in this group  
have received at least one connection, the issuing process starts over with the first real server.  
132  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Response Time  
The responsemetric uses real server response time to assign sessions to servers. The  
response time between the servers and the switch is used as the weighting factor. The switch  
monitors and records the amount of time it takes for each real server to reply to a health check  
to adjust the real server weights. The weights are adjusted so they are inversely proportional to  
a moving average of response time. In such a scenario, a server with half the response time as  
another server will receive a weight twice as large.  
NOTE The effects of the responseweighting apply directly to the real servers and are not  
necessarily confined to the real server group. When response time-metered real servers are also  
used in other real server groups that use the leastconnsor roundrobinmetrics, the  
responseweights are applied on top of the leastconnsor roundrobincalculations  
for the affected real servers. Since the responseweight changes dynamically, this can pro-  
duce fluctuations in traffic distribution for the real server groups that use the leastconnsor  
roundrobinmetrics.  
Bandwidth  
The bandwidthmetric uses real server octet counts to assign sessions to a server. The switch  
monitors the number of octets sent between the server and the switch. Then, the real server  
weights are adjusted so they are inversely proportional to the number of octets that the real  
server processes during the last interval.  
Servers that process more octets are considered to have less available bandwidth than servers  
that have processed fewer octets. For example, the server that processes half the amount of  
octets over the last interval receives twice the weight of the other servers. The higher the band-  
width used, the smaller the weight assigned to the server. Based on this weighting, the subse-  
quent requests go to the server with the highest amount of free bandwidth. These weights are  
automatically assigned.  
The bandwidth metric requires identical servers with identical connections.  
NOTE The effects of the bandwidthweighting apply directly to the real servers and are not  
necessarily confined to the real server group. When bandwidth-metered real servers are also  
used in other real server groups that use the leastconnsor roundrobinmetrics, the  
bandwidthweights are applied on top of the leastconnsor round-robincalculations  
for the affected real servers. Since the bandwidthweight changes dynamically, this can pro-  
duce fluctuations in traffic distribution for the real server groups that use the leastconnsor  
roundrobinmetrics.  
Chapter 6: Server Load Balancing  
133  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Weights for Real Servers  
Weights can be assigned to each real server. These weights bias load balancing to give the fast-  
est real servers a larger share of connections. Weight is specified as a number from 1 to 48.  
Each increment increases the number of connections the real server gets. By default, each real  
server is given a weight setting of 1. A setting of 10 would assign the server roughly 10 times  
the number of connections as a server with a weight of 1. To set weights, enter the following  
commands:  
>> # /cfg/slb/real <real server number>  
(Select the real server)  
>> Real server# weight 10  
(10 times the number of connections)  
NOTE Weights are not applied when using the hashor minmissesmetrics.  
Connection Time-outs for Real Servers  
In some cases, open TCP/IP sessions might not be closed properly (for example, the switch  
receives the SYNfor the session, but no FINis sent). If a session is inactive for 10 minutes (the  
default), it is removed from the session table in the switch. To change the time-out period,  
enter the following:  
>> # /cfg/slb/real <real server number>  
(Select the real server)  
>> Real server# tmout 4  
(Specify an even numbered interval)  
The example above would change the time-out period of all connections on the designated real  
server to four minutes.  
Maximum Connections for Real Servers  
You can set the number of open connections each real server is allowed to handle for SLB. To  
set the connection limit, enter the following:  
>> # /cfg/slb/real <real server number>  
(Select the real server)  
>> Real server# maxcon 1600  
(Allow 1600 connections maximum)  
Values average from approximately 500 HTTP connections for slower servers to 1500 for  
quicker, multiprocessor servers. The appropriate value also depends on the duration of each  
session and how much CPU capacity is occupied by processing each session. Connections that  
use a lot of Java or CGIscripts for forms or searches require more server resources and thus a  
lower maxconlimit. You may wish to use a performance benchmark tool to determine how  
many connections your real servers can handle.  
When a server reaches its maxconlimit, the switch no longer sends new connections to the  
server. When the server drops back below the maxconlimit, new sessions are again allowed.  
134  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Backup/Overflow Servers  
A real server can backup other real servers and can handle overflow traffic when the maximum  
connection limit is reached. Each backup real server must be assigned a real server number and  
real server IP address. It must then be enabled. Finally, the backup server must be assigned to  
each real server that it will back up. The following defines real server 4 as a backup for real  
servers 1 and 2:  
>> # /cfg/slb/real 4  
>> Real server 4# rip 200.200.200.5  
>> Real server 4# ena  
(Select real server 4 as backup)  
(Assign backup IP address)  
(Enable real server 4)  
>> Real server 4# /cfg/slb/real 1  
>> Real server 1# backup 4  
>> Real server 1# /cfg/slb/real 2  
>> Real server 2# backup 4  
(Select real server 1)  
(Real server 4 is backup for 1)  
(Select real server 2)  
(Real server 4 is backup for 2)  
In a similar fashion, a backup/overflow server can be assigned to a real server group. If all real  
servers in a real server group fail or overflow, the backup comes online.  
>> # /cfg/slb/group <real server group number>  
(Select real server group)  
>> Real server group# backup r4  
(Assign real server 4 as backup)  
Real server groups can also use another real server group for backup/overflow:  
>> # /cfg/slb/group <real server group number>  
>> Real server group# backup g2  
(Select real server group)  
(Assign real server group 2 as  
backup)  
Chapter 6: Server Load Balancing  
135  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
For standard SLB, all client-to-server requests to a particular virtual server and all related  
server-to-client responses must pass through the same Web switch. In complex network topol-  
ogies, routers and other devices can create alternate paths around the Web switch managing  
SLB functions (see Figure 6-4 on page 122). Under such conditions, the Web switch with  
Web OS provides the following solutions:  
n
n
n
n
Proxy IP Addresses  
Mapping Ports  
Direct Server Interaction  
Delayed Binding  
Proxy IP Addresses  
In complex network topologies (see Figure 6-4 on page 122), SLB functions can be managed  
using a proxy IP address on the client switch ports.  
When the client requests services from the switchs virtual server, the client sends its own IP  
address for use as a return address. If a proxy IP address is configured for the client port on the  
switch, the switch replaces the clients source IP address with the switchs own proxy IP  
address before sending the request to the real server. This creates the illusion that the switch  
originated the request.  
The real server uses the switchs proxy IP address as the destination address for any response.  
SLB traffic is forced to return through the proper switch, regardless of alternate paths. Once  
the switch receives the proxied data, it puts the original client IP address into the destination  
address and sends the packet to the client. This process is transparent to the client.  
NOTE Because requests appear to come from the switch proxy IP address rather than the cli-  
ent source IP address, the network administrator should be aware of this behavior during  
debugging and statistics collection.  
The proxy IP address can also be used for direct access to the real servers (see Direct Server  
Interactionon page 142).  
136  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
The following procedure can be used for configuring proxy IP addresses:  
1. Disable server processing on affected switch ports.  
When implementing proxies, switch ports can be reconfigured to disable server processing.  
Referring to the Table 6-2 on page 126, the following revised port conditions are used:  
Table 6-4 Proxy Example: Port Usage  
Port  
Host  
L4 Processing  
None  
1
2
3
4
Server A  
Server B  
Server C  
None  
None  
Back-end NFS server provides centralized Web content for all three  
real servers. This port does not require Web switching features.  
None  
5
6
Client router A connects the switch to the Internet where all client  
requests originate.  
Client  
Client router B also connects the switch to the Internet where all client Client  
requests originate.  
The following commands are used to disable server processing on ports 1-3:  
>> # /cfg/slb/port 1  
(Select switch port 1)  
>> SLB port 1# server dis  
>> SLB port 1# ../port 2  
>> SLB port 2# server dis  
>> SLB port 2# ../port 3  
>> SLB port 3# server dis  
(Disable server processing on port 1)  
(Select switch port 2)  
(Disable server processing on port 2)  
(Select switch port 3)  
(Disable server processing on port 3)  
2. Add proxy IP addresses to the client ports.  
Each client port requires a proxy IP address. Each proxy IP address must be unique on your  
network. The following commands are used to configure client proxies:  
>> # /cfg/slb/port 5  
(Select network port 5)  
>> SLB port 5# pip 200.200.200.68  
>> SLB port 5# ../port 6  
(Set proxy IP address for client port 5)  
(Select network port 6)  
>> SLB port 6# pip 200.200.200.69  
(Set proxy IP address for client port 6)  
The proxies are transparent to the user.  
Chapter 6: Server Load Balancing  
137  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
3. If the Virtual Matrix Architecture (VMA) feature is enabled, add proxy IP addresses for  
all other switch ports (except port 9).  
VMA is normally enabled on the switch. In addition to enhanced resource management, VMA  
eliminates many of the restrictions found in earlier versions of the Web OS. VMA does  
require, that when any switch port is configured with a proxy IP address, all ports must be con-  
figured with unique proxy IP addresses. If VMA is disabled, only the client port needs a proxy  
IP address and this step can be skipped.  
The following commands can be used for configuring the additional unique proxy IP  
addresses:  
>> SLB port 6# /cfg/slb/port 1  
>> SLB port 1# pip 200.200.200.70  
>> SLB port 1# ../port 2  
(Select network port 1)  
(Set proxy IP address for port 1)  
(Select network port 2)  
>> SLB port 2# pip 200.200.200.71  
>> SLB port 2# ../port 3  
(Set proxy IP address for port)  
(Select network port 3)  
>> SLB port 3# pip 200.200.200.72  
>> SLB port 3# ../port 4  
(Set proxy IP address for port 3)  
(Select network port 4)  
>> SLB port 4# pip 200.200.200.73  
>> SLB port 4# ../port 7  
(Set proxy IP address for port 4)  
(Select network port 7)  
>> SLB port 7# pip 200.200.200.74  
>> SLB port 7# ../port 8  
(Set proxy IP address for port 7)  
(Select network port 8)  
>> SLB port 8# pip 200.200.200.75  
NOTE Port 9 does not require a proxy IP address under VMA.  
For conceptual information, see Virtual Matrix Architectureon page 217 of this manual and  
for information on using the commands, see the Web OS Command Reference  
(/cfg/slb/adv/matrix) for more information.  
4. Apply and save your changes.  
NOTE Remember that you must applyany changes in order for them to take effect, and you  
must savethem if you wish them to remain in effect after switch reboot. Also, the  
/info/slbcommand is useful for checking the state of Server Load Balancing operations.  
138  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Mapping Ports  
An Alteon Web switch allows you to hide the identity of a port for security by mapping a vir-  
tual server port to a different real server port.  
Mapping a Virtual Server Port to a Real Server Port  
In addition to providing direct real server access in some situations (see Mapping Portson  
page 144), mapping is required when administrators choose to execute their real server pro-  
cesses on different ports than the well-known TCP/UDP ports. Otherwise, virtual server ports  
are mapped directly to real server ports by default and require no mapping configuration.  
Port mapping is configured from the Virtual Server Services menu. For example, to map the  
virtual server TCP/UDP port 80 to real server TCP/UDP port 8004, you could enter the follow-  
ing:  
>> # /cfg/slb/virt 1/service 80  
>> Virtual Server 1 http Service# rport 8004 (Map to real port 8004)  
NOTE If filtering is enabled, a proxy IP address is configured, or URL parsing is enabled on  
any switch port, then port mapping is supported with Direct Access Mode (DAM). For infor-  
mation about DAM, refer to Using Direct Access Modeon page 143.  
Mapping a Single Virtual Server Port to Multiple Real Server Ports  
To take advantage of multi-CPU or multi-process servers, Web OS can be configured to map a  
single virtual port to multiple real ports. This capability allows the Web site managers, for  
example, to differentiate users of a service by using multiple service ports to process client  
requests.  
An Alteon Web switch supports up to 16 real ports per server when multiple rportsare  
enabled. This feature allows the network administrator to configure up to 16 real ports for a  
single service port. This feature is supported in Layer 4 and Layer 7 and in cookie-based and  
SSL persistence switching environments.  
When multiple real ports on each real server are mapped to a virtual port, the Web switch treats  
the real server IP address/port mapping combination as a distinct real server.  
NOTE For each real server, you can only configure one service with multiple real ports.  
Chapter 6: Server Load Balancing  
139  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Consider the following network:  
Real Servers  
192.168.2.1  
Web Clients  
8001  
8002  
Web Switch  
192.168.2.2  
Internet  
8001  
8002  
Web Host  
Routers  
192.168.2.3  
8001  
8002  
192.168.2.4  
8001  
8002  
Figure 6-6 Basic Virtual Port to Real Port Mapping Configuration  
Domain Name virtual server IP Ports Activated Port Mapping  
address  
Real Server IP  
Address  
www.right.com  
192.168.2.100  
80 (HTTP)  
8001 (rport 1) 192.168.2.1 (RIP 1)  
8002 (rport 2) 192.168.2.2 (RIP 2)  
192.168.2.3 (RIP 3)  
192.168.2.4 (RIP 4)  
In this example, four real servers are used to support a single service (HTTP). Clients access  
this service through a virtual server with IP address 192.168.2.100 on virtual port 80. Since  
each real server uses two ports (8001 and 8002) for HTTP services, the logical real servers are:  
n
n
n
n
n
n
n
n
192.168.2.1/8001  
192.168.2.1/8002  
192.168.2.2/8001  
192.168.2.2/8002  
192.168.2.3/8001  
192.168.2.3/8002  
192.168.2.4/8001  
192.168.2.4/8002  
140  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Load Balancing Metric  
For each service, a real server is selected using the configured load balancing metric (hash,  
leastconns, minmisses, or roundrobin). To ensure even distribution, once an avail-  
able server is selected, the switch will use the roundrobinmetric to choose a real port to  
receive the incoming connection.  
If the algorithm is leastconns, the switch sends the incoming connections to the logical  
real server (real server IP address/port combination) with the least number of connections.  
The /cfg/slb/virtcommand defines the real server TCP or UDP port assigned to a ser-  
vice. By default, this is the same as the virtual port (service virtual port). If rportis config-  
ured to be different from the virtual port defined in /cfg/slb/virt<virtual server  
number>/service<virtual port>, the switch maps the virtual port to the real port.  
NOTE To use the single virtual port to multiple rportfeature, configure this real server port  
option to be a value of 0. However, note that you cannot configure multiple services with mul-  
tiple rportsin the same server if the multiple rportfeature is enabled.  
Configuring Multiple Service Ports  
Two commands, addportand remport, under the real server menu allow users to add or  
remove multiple service ports associated with a particular server. (A service port is a TCP or  
UDP port number.) For example: addport8001and remport8001.  
1. Configure the real servers.  
>> # /cfg/slb/real 1/rip 192.168.2.1/ena  
>> # ../real 2/rip 192.168.2.2/ena  
>> # ../real 3/rip 192.168.2.3/ena  
>> # ../real 4/rip 192.168.2.4/ena  
2. Add all four servers to a group.  
>> # /cfg/slb/group 1  
>> Real server Group 1# add 1  
>> Real server Group 1# add 2  
>> Real server Group 1# add 3  
>> Real server Group 1# add 4  
3. Configure a virtual server IP address.  
>> # /cfg/slb/virt 1/vip 192.168.2.100/ena  
Chapter 6: Server Load Balancing  
141  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
4. Turn on multiple rportfor Port 80.  
>> # /cfg/slb/virt 1/service 80/rport 0  
5. Add the ports to which the Web server listens.  
>> # /cfg/slb/real 1/addport 8001  
>> # addport 8002  
>> # ../real 2/addport 8001  
>> # addport 8002  
>> # ../real 3/addport 8001  
>> # addport 8002  
>> # ../real 4/addport 8001  
>> # addport 8002  
(Add port 8001 to real server 1)  
(Add port 8002 to real server 1)  
(Add port 8001 to real server 2)  
(Add port 8002 to real server 2)  
(Add port 8001 to real server 3)  
(Add port 8002 to real server 3)  
(Add port 8001 to real server 4)  
(Add port 8002 to real server 4)  
Direct access to real servers can be provided in the following ways:  
n
n
n
n
n
n
Using Direct Access Mode  
Assigning Multiple IP Addresses  
Using Proxy IP Addresses  
Mapping Ports  
Monitoring Real Servers  
Using Direct Server Return  
Some clients may need direct access to the real servers (for example, to monitor a real server  
from a management workstation). The Direct Server Return (DSR) feature allows the server to  
respond directly to the client. This capability is useful for sites where large amounts of data are  
flowing from servers to clients, such as with content providers or portal sites that typically  
have asymmetric traffic patterns.  
DSR and content-intelligent Layer 7 switching cannot be performed at the same time because  
content intelligent switching requires that all frames go back to the switch for connection splic-  
ing.  
NOTE DSR requires that the server be set up to receive frames that have a destination IP  
address that is equal to the virtual server IP address.  
142  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
The sequence of steps that are executed in this scenario are shown in Figure 6-7:  
Web Switch  
Server farm  
2
Client  
1
Internet  
Layer 2 Switch  
3
Figure 6-7 Direct Server Return  
1. A client request is forwarded to the Web switch.  
2. Because only MAC addresses are substituted, the switch forwards the request to the best  
server, based on the configured load-balancing policy.  
3. The server responds directly to the client, bypassing the switch, and using the virtual  
server IP address as the source IP address.  
To set up DSR, use the following commands:  
>> # /cfg/slb/real <real server number>/submac ena  
>> # /cfg/slb/virt <virtual server number>/service <service number>/nonat ena  
Using Direct Access Mode  
When Direct Access Mode (DAM) (/cfg/slb/direct) is enabled on a switch, any client  
can communicate with any real servers load-balanced service. Also, with DAM enabled, any  
number of virtual services can be configured to load balance a real service.  
Traffic sent directly to real server IP addresses is excluded from load-balancing decisions. The  
same clients may also communicate to the virtual server IP address for load-balanced requests.  
NOTE When DAM is enabled on a switch, port mapping and default gateway load balancing  
is supported only when filtering is enabled, a proxy IP address is configured, or URL parsing is  
enabled on any switch port.  
Assigning Multiple IP Addresses  
One way to provide both SLB access and direct access to a real server is to assign multiple IP  
addresses to the real server. For example, one IP address could be established exclusively for  
SLB and another could be used for direct access needs.  
Chapter 6: Server Load Balancing  
143  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Using Proxy IP Addresses  
Proxy IP addresses are used primarily to eliminate SLB topology restrictions in complex net-  
works (see Proxy IP Addresseson page 136). Proxy IP addresses can also provide direct  
access to real servers.  
If the switch port to the client is configured with a proxy IP address, the client can access each  
real server directly using the real servers IP address. The switch port must be connected to the  
real server and client processing must be disabled (see the serverandclientoptions  
under the /cfg/slb/portcommand in your Web OS Command Reference).  
SLB is still accessed using the virtual server IP address.  
Mapping Ports  
When SLB is used without proxy IP addresses and without DAM, the Web switch must pro-  
cess the server-to-client responses. If a client were to access the real server IP address and port  
directly, bypassing client processing, the server-to-client response could be mishandled by  
SLB processing as it returns through the Web switch, with the real server IP address getting  
remapped back to the virtual server IP address on the Web switch.  
First, two port processes must be executed on the real server. One real server port will handle  
the direct traffic, and the other will handle SLB traffic. Then, the virtual server port on the Web  
switch must be mapped to the proper real server port.  
In Figure 6-8, clients can access SLB services through well-known TCP port 80 at the virtual  
servers IP address. The Web switch behaving like a virtual server is mapped to TCP port 8000  
on the real server. For direct access that bypasses the virtual server and SLB, clients can spec-  
ify well-known TCP port 80 as the real servers IP address.  
Direct Access  
via Real Server IP & Port  
80  
80  
Client  
Network  
8000  
Virtual Server on the  
Alteon Web Switch  
Real  
Server  
Layer 4 Mapped Access  
via Virtual Server IP & Port  
Figure 6-8 Mapped and Nonmapped Server Access  
NOTE Port mapping is supported with DAM when filtering is enabled, a proxy IP address is  
configured, or URL parsing is enabled on any switch port.  
For more information on how to map a virtual server port to a real server port, see Mapping  
Portson page 139.  
144  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Monitoring Real Servers  
Typically, the management network is used by network administrators to monitor real servers  
and services. By configuring the mnetand mmaskoptions of the SLB Configuration Menu  
(/cfg/slb/adv), you can access the real services being load balanced.  
NOTE Clients on the management network do not have access to SLB services and cannot  
access the virtual services being load balanced.  
The mnetand mmaskoptions are described below:  
n mnet: If defined, management traffic with this source IP address is allowed direct (non-  
SLB) access to the real servers. Only specify an IP address in dotted decimal notation. A  
range of IP addresses is produced when used with the mmask option.  
n mmask: This IP address mask is used with mnet to select management traffic that is  
allowed direct real server access only.  
Chapter 6: Server Load Balancing  
145  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Delayed Binding  
The delayed binding feature on the switch prevents SYN Denial-of-Service (DoS) attacks on  
the server. DoS occurs when the server or switch is denied servicing the client because it is sat-  
urated with invalid traffic.  
Typically, a three-way handshake occurs before a client connects to a server. The client sends  
out a synchronization (SYN) request to the server. The server allocates an area to process the  
client requests, and acknowledges the client by sending a SYN ACK. The client then acknowl-  
edges the SYN ACK by sending an acknowledgement (ACK) back to the server, thus complet-  
ing the three-way handshake.  
Figure 6-9 on page 146 illustrates a classic type of SYN DoS attack. If the client does not  
acknowledge the servers SYN ACK with a data request (REQ) and, instead, sends another  
SYN request, the server gets saturated with SYN requests. As a result, all of the servers  
resources are consumed and it can no longer service legitimate client requests.  
Normal Request  
Server  
Client sends a SYN request  
Server reserves session and sends SYN ACK  
Client  
Client sends an ACK or DATA REQ  
Server responds with DATA  
DoS SYN Attack  
Server  
Client sends a SYN request  
Client  
Server reserves session and sends SYN ACK  
Client ignores SYN ACK and continues to send new SYN requests  
Server continues reserving sessions.  
Server is eventually saturated and  
cannot process legitimate requests.  
Figure 6-9 DoS SYN Attacks without Delayed Binding  
Using an Alteon Web switch with delayed binding, as illustrated in Figure 6-10 on page 147,  
the Web switch intercepts the client SYN request before it reaches the server. The Web switch  
responds to the client with a SYN ACK that contains embedded client information. The Web  
switch does not allocate a session until a valid SYN ACK is received from the client or the  
three-way handshake is complete.  
146  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Normal Request with Delayed Binding  
Server  
Web Switch  
Client  
Internet  
Client sends a SYN request  
Switch responds with special SYN ACK  
Client sends an ACK or DATA REQ  
Switch recognizes valid three-way handshake  
Switch sends a SYN request to server  
Server responds with SYN ACK  
Switch sends ACK or DATA REQ  
Server responds with DATA and switch splices connection to client  
DoS SYN Attack with Delayed Binding  
Server  
Web Switch  
Client  
Internet  
Client sends a SYN request  
Switch responds with special SYN ACK  
Client sends new SYN requests  
No session entry is made until a valid  
three-way handshake is complete.  
Switch responds with another SYN ACK  
Switch and server resources are  
protected for legitimate requests  
Figure 6-10 Repelling DoS SYN Attacks With Delayed Binding  
Once the Web switch receives a valid ACK or DATA REQ from the client, the Web switch  
sends a SYN request to the server on behalf of the client, waits for the server to respond with a  
SYN ACK, and then forwards the clients DATA REQ to the server. Basically, the Web switch  
delays binding the client session to the server until the proper handshakes are complete.  
Thus, with delayed binding, two independent TCP connections span a Web session: one from  
the client to the Web switch and the second from the Web switch to the selected server. The  
switch temporarily terminates each TCP connection until content has been received, thus pre-  
venting the server from being inundated with SYN requests.  
NOTE Delayed binding is automatically enabled when content intelligent switching features  
are used. However, if you are not parsing content, you must explicitly enable delayed binding  
if desired.  
Chapter 6: Server Load Balancing  
147  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Configuring Delayed Binding  
To configure your switch for delayed binding, use the following command:  
>> # /cfg/slb/virt <virtual server number>/service <service type>/dbind  
NOTE Enable delayed binding without configuring any HTTP SLB processing or persistent  
binding types.  
To configure delayed binding for Web cache redirection, see Delayed Binding for Web Cache  
Redirectionon page 210.  
Detecting SYN Attacks  
In Web OS, SYN attack detection is enabled by default, whenever delayed binding is enabled.  
SYN attack detection:  
n
n
n
n
n
Provides a way to track half open connections  
Activates a trap notifying that the configured threshold is exceeded  
Monitors DoS attacks and proactively signals alarm  
Provides enhanced security  
Improves visibility and protection for DoS attacks  
The probability of a SYN attack is higher if excessive half-open sessions are being generated  
on the Web switch. Half-open sessions show an incomplete three-way handshake between the  
server and the client. You can view the total number of half-open sessions from the  
/stat/slb/layer7/maintmenu.  
To detect SYN attacks, the Web switch keeps track of the number of new half-open sessions  
for a set period of time. If the value exceeds the threshold, then a syslog message and an  
SNMP trap are generated.  
You can change the default parameters for detecting SYN attacks in the  
/cfg/slb/adv/synatkmenu. You can specify how frequently you want to check for  
SYN attacks, from 2 seconds to a minute and modify the default threshold representing the  
number of new half-open sessions per second.  
148  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Load Balancing Special Services  
This section discusses load balancing based on special services, such as  
n
n
n
n
n
n
n
Domain Name Server (DNS) Load Balancing  
Real Time Streaming Protocol SLB  
Wireless Application Protocol SLB  
Intrusion Detection System Server Load Balancing  
WAN Link Load Balancing  
IP Server Load Balancing  
IP server load balancing allows you to configure your Web switch for server load balancing  
based on clients IP address only. Typically, the client IP address is used with the client port  
number to produce a session identifier. When the Layer 3 option is enabled, the switch uses  
only the client IP address as the session identifier.  
To configure the switch for IP load balancing:  
>> # /cfg/slb/virt <virtual server number>  
>> Virtual Server 1# layr3 ena  
>> Virtual Server 1# service ip  
>> Virtual Server 1 IP Service# group <group number >  
IP server load balancing must be used if IP traffic is totally encrypted and you do not have  
access to the content.  
Chapter 6: Server Load Balancing  
149  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
FTP Server Load Balancing  
As defined in RFC 959, FTP uses two connectionsone for control information and another for  
data. Each connection is unique. Unless the client requests a change, the server always uses TCP  
port 21 (a well-known port) for control information, and TCP port 20 as the default data port.  
FTP uses TCP for transport. After the initial three-way handshake, a connection is established.  
When the client requests any data information from the server, it will issue a PORTcommand  
(such as ls, dir, get, put, mgetand mput) via the control port.  
There are two modes of FTP operation, active and passive:  
n
n
In Active FTP, the FTP server initiates the data connection.  
In Passive FTP, the FTP client initiates the data connection. Because the client also ini-  
tiates the connection to the control channel, the passive FTP mode does not pose a prob-  
lem with firewalls and is the most common mode of operation.  
FTP Network Topology Restrictions  
FTP network topology restrictions are listed below:  
n
FTP uses both a control channel and a data channel; both channels need to be bound to the  
same real server.  
n
n
The FTP server may initiate FTP data sessions.  
Information exchanged on the control channel is used to determine the IP address and port  
for data connections between the FTP server and the FTP client.  
Configuring FTP Server Load Balancing  
1. Make sure that a proxy IP address is enabled on the client port(s) or DAM is enabled.  
2. Make sure the virtual port for FTP is set up for the virtual server.  
>> # /cfg/slb/virt <virtual server number>  
>> Virtual Server 1# service ftp  
3. Enable FTP parsing.  
>> Virtual Server 1 ftp Service# ftpp ena  
4. To make your configuration changes active, enter applyat any prompt in the CLI.  
>> Virtual Server 1 ftp Service# apply  
NOTE You must applyany changes in order for them to take effect, and you must save  
them if you wish them to remain in effect after switch reboot.  
150  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Domain Name Server (DNS) Load Balancing  
In previous releases of Web OS, DNS load balancing was based on virtual server IP address  
and virtual port (VPORT) only. In Web OS 10.0 however, DNS load balancing allows you to  
choose the service based on the two forms of DNS queries: UDP and TCP. This enables the  
switch to send TCP DNS queries to one group of real servers and UDP DNS queries to another  
group of real servers. The requests are then load balanced among the real servers in that group.  
Figure 6-11 shows four real servers load balancing UDP and TCP queries between two groups.  
Real servers  
10.10.10.20  
Group 1  
20  
10.10.10.21  
UDP  
health udpdns  
21  
vip 20.20.20.20  
Internet  
Web Switch  
Real servers  
22  
Client  
26  
10.10.10.22  
Group 2  
TCP  
health dns  
10.10.10.26  
Figure 6-11 Layer 4 DNS Load Balancing  
NOTE You can configure both UDP and TCP DNS queries for the same virtual server  
IP address.  
Chapter 6: Server Load Balancing  
151  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Preconfiguration Tasks  
1. Enable server load balancing.  
>> # /cfg/slb/ena  
2. Configure the four real servers and their real IP addresses.  
>> # /cfg/slb/real 20  
>> Real server 20 # ena  
(Enable real server 20)  
(Specify the IP address)  
>> Real server 20 # rip 10.10.10.20  
>> Real server 20 # ../real 21  
>> Real server 21 # ena  
>> Real server 21 # rip 10.10.10.21  
>> Real server 20 # ../real 22  
>> Real server 22 # ena  
>> Real server 22 # rip 10.10.10.22  
>> Real server 20 # ../real 26  
>> Real server 26 # ena  
(Enable real server 21)  
(Specify the IP address)  
(Enable real server 22)  
(Specify the IP address)  
(Enable real server 26)  
(Specify the IP address)  
>> Real server 26 # rip 10.10.10.26  
3. Configure group 1 for UDP and group 2 for TCP.  
>> # /cfg/slb/group 1  
>> Real server group 1 # metric roundrobin  
(Select real server group 1)  
(Specify the load balancing  
metric for group 1)  
>> Real server group 1 # health udpdns  
>> Real server group 1 # add 20  
(Set the health check to UDP)  
(Add real server 20)  
>> Real server group 1 # add 21  
(Add real server 21)  
>> Real server group 1 # ../group 2  
>> Real server group 2 # metric roundrobin  
metric for group 2)  
>> Real server group 2 # health dns  
>> Real server group 2 # add 22  
>> Real server group 2 # add 26  
(Set the health check to TCP)  
(Add real server 22)  
(Add real server 26)  
For more information on configuring health check, see UDP-Based DNS Health Checkson  
page 233.  
4. Define and enable the server ports and the client ports.  
For more information, see Step 6 Define the port settings.on page 126. Some DNS servers  
initiate upstream requests and must be configured both as server and client.  
152  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring UDP-based DNS Load Balancing  
1. Configure and enable a virtual server IP address 1 on the switch.  
>> # /cfg/slb/virt 1/vip 20.20.20.20  
>> Virtual Server 1# ena  
(Specify the virt server IP address)  
(Enable the virtual server)  
2. Set up the DNS service for the virtual server, and add real server group 1.  
>> Virtual Server 1# service dns (Specify the DNS service)  
>> Virtual Server 1 DNS Service# group 1 (Select the real server group)  
3. Disable delayed binding.  
Delayed binding is not required because UDP does not process session requests with a TCP  
three-way handshake.  
>> Virtual Server 1 DNS Service# dbind dis(Disable delayed binding)  
4. Enable UDP DNS queries.  
>> Virtual Server 1 DNS Service# udp ena (Enable UDP balancing)  
5. Apply and save your configuration.  
>> Virtual Server 1 DNS Service# apply  
>> Virtual Server 1 DNS Service# save  
Chapter 6: Server Load Balancing  
153  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring TCP-based DNS Load Balancing  
1. Configure and enable the virtual server IP address 2 on the switch.  
>> # /cfg/slb/virt 2/vip 20.20.20.20  
>> Virtual Server 2# ena  
(Specify the virt server IP address)  
(Enable the virtual server)  
2. Set up the DNS service for virtual server, and select real server group 2.  
>> Virtual Server 2# service dns  
(Specify the DNS service)  
>> Virtual Server 2 DNS Service# group 2 (Select the real server group)  
3. Enable delayed binding.  
>> Virtual Server 2 DNS Service# dbind ena(Enable delayed binding)  
4. As this is TCP-based load balancing, make sure to disable UDP DNS queries.  
>> Virtual Server 2 DNS Service# udp dis (Disable UDP balancing)  
5. Apply and save your configuration.  
>> Virtual Server 2 DNS Service# apply  
>> Virtual Server 2 DNS Service# save  
154  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Real Time Streaming Protocol SLB  
Real Time Streaming Protocol (RTSP) is an application-level protocol for control over the  
delivery of data with real-time properties as documented in RFC 2326.  
RTSP is used as a network remote controlfor multimedia servers. Typically, a multimedia  
presentation consists of several streams of data (for example, video stream, audio stream, and  
text) that must be presented in a synchronized fashion. A multimedia client like Real Player or  
Quick Time Player downloads these multiple streams of data from the multimedia servers and  
presents them on the player screen.  
RTSP is used to control the flow of these multimedia streams. Each presentation uses one  
RTSP control connection and several other connections to carry the audio/video/text  
multimedia streams. In this document, the term RTSP server refers to any multimedia server  
that implements the RTSP protocol for multimedia presentation.  
How RTSP Server Load Balancing Works  
The objective of RTSP server load balancing is to intelligently switch an RTSP request, and the  
other media streams associated with a presentation, to a suitable RTSP server based on the  
configured load-balancing metric. Web OS supports one Layer 7 metric (URL hashing and  
URL pattern matching) and all Layer 4 load-balancing metrics.  
RTSP load balancing with the URL hashmetric can be used to load balance cache servers  
that cache multimedia presentations. Since multimedia presentations consume a large amount  
of Internet bandwidth, and their correct presentation depends upon the real time delivery of the  
data over the Internet, several caching servers cache the multimedia data. As a result, the data  
is available quickly from the cache, when required. The Layer 7 metric of URL hashing directs  
all requests with the same URL to the same cache server, ensuring that no data is duplicated  
across the cache servers.  
Typically, an RTSP client establishes a control connection to an RTSP server over TCP port  
554 and the data flows over UDP or TCP. For information on using RTSP with Web cache redi-  
rection, see RTSP Web Cache Redirectionon page 211.  
NOTE This feature is not applicable if the streaming media (multimedia) servers use HTTP  
protocol to tunnel RTSP traffic. To ensure that RTSP server load balancing works, make sure  
the streaming media server is configured for RTSP protocol.  
In a typical scenario, the RTSP client issues several sequences of commands to establish con-  
nections for each component stream of a presentation. There are several variations to this pro-  
cedure, depending upon the RTSP client and the server involved. For example, there are two  
prominent RTSP server and client implementations: Real Server marketed by Real Networks  
Chapter 6: Server Load Balancing  
155  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Corporation, and Quicktime Streaming Server marketed by the Apple Inc. The RTSP stream  
setup sequence is different for these two servers, and the switch handles each differently. Some  
of these differences are described below.  
n
Real Server  
Real Server supports both UDP and TCP transport protocols for the RTSP streams. The  
actual transport is negotiated during the initialization of the connection. If TCP transport is  
selected, then all streams of data will flow in the TCP control connection itself. If UDP  
transport is chosen, the client and server negotiate a client UDP port, which is manually  
configurable.  
The real media files that the Real Server plays have the extension .rm, .ramor .smil.  
n
QuickTime Streaming Server  
Apple Inc.s QuickTime Streaming Server typically runs on the Apple platforms. Quick-  
Time files that can be played over the Internet using RTSP are specially formatted and are  
called hinted QuickTime files.Normal QuickTime files cannot be used for streaming.  
The QuickTime files have the extension .mov.  
QuickTime uses UDP protocol exclusively for transport and TCP for control connection.  
Each stream of a QuickTime presentation sends Real Time Protocol (RTP), and Real Time  
Control Protocol (RTCP) data using two UDP connections. Typically, a QuickTime pre-  
sentation has two streams and therefore uses four UDP connections and one TCP control  
connection. QuickTime clients use a UDP port, which is manually configurable.  
RTSP Implementation  
RTSP implementation in Web OS supports the following:  
n
n
n
Alteon AD3, Alteon AD4, Alteon 180e, and Alteon 184 platforms  
Private addressing on the server side  
Layer 7 URL-hashing metric, URL pattern matching, and all Layer 4 metrics for load bal-  
ancing.  
n
n
All the stream connections and the control connections are switched to the same cache  
server to facilitate caching of entire presentations.  
RTSP-compliant applications (excludes Windows Media Player because it is not RTSP  
compliant).  
156  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring RTSP Load Balancing  
Before configuring your Web switch for RTSP load balancing, do the following:  
n
n
n
n
Enable Virtual Matrix Architecture (VMA)  
Enable Direct Access Mode (DAM)  
Disable port-based Bandwidth Management  
Disable proxy IP addressing  
1. To configure a virtual server for Layer 4 load balancing of RTSP, select rtspor port  
554as a service for the virtual server.  
>> # /cfg/slb/virt <virtual server number>/service rtsp  
2. To configure a virtual server for Layer 7 URL hashing of RTSP, select rtspas a virtual  
service and enable rtspslb.  
This command enables URL hashing using the entire URL; however, any extension of the type  
(.xxx) occurring at the end of the URL is omitted from hashcomputation.  
>> # /cfg/slb/virt 1/service rtsp/rtspslb hash|pattern|dis  
3. Apply and save your configuration.  
>> Virtual Server 2 rtsp Service# apply  
>> Virtual Server 2 rtsp Service# save  
Chapter 6: Server Load Balancing  
157  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Wireless Application Protocol SLB  
Wireless Application Protocol (WAP) is an open, global specification for a suite of protocols  
designed to allow wireless devices to communicate and interact with other devices. It  
empowers mobile users with wireless devices to easily access and interact with information  
and services instantly by allowing non-voice data, such as text and images, to pass between  
these devices and the Internet. Wireless devices include cellular phones, pagers, Personal  
Digital Assistants (PDAs), and other hand-held devices.  
WAP supports most wireless networks and is supported by all operating systemswith the  
goal of inter-operability. A WAP Gateway translates Wireless Markup Language (WML)—  
which is a WAP version of HTMLinto HTML/HTTP so that requests for information can be  
serviced by traditional Web servers.  
To load balance WAP traffic among available parallel servers, the switch must provide persis-  
tency so that the clients can always go to the same WAP gateway to perform WAP operation.  
Web OS allows the Web switch to decide which real gateway the request should go. WAP SLB  
is based on RADIUS static session entry or RADIUS snooping.  
The following topics are discussed in this section:  
n
n
n
n
n
Using RADIUS Snooping  
Preconfiguring WAP Server Load Balancing  
Enabling Wireless Application Protocol SLB  
Configuring RADIUS Snooping  
Using RADIUS Static Session Entries  
RADIUS is a client/server protocol and software that enables remote access servers to commu-  
nicate with a central server to authenticate dial-in users and authorize their access to the  
requested network or service. RADIUS allows a company to maintain user profiles in a central  
database that all remote servers can share. It provides better security, allowing a company to  
set up a policy that can be applied at a single administered network point. RADIUS is an indus-  
try standard used by network product companies and is a proposed IETF standard.  
The RADIUS server uses a static session entry to determine which real WAP gateway should  
receive the users sessions. Typically, each WAP gateway is integrated with a RADIUS server  
on the same host, and a RADIUS request packet is allowed to go to any of the RADIUS  
servers. Upon receiving a request from a client, the RADIUS server instructs the switch to  
create a static session entry in the switch via Transparent Proxy Control Protocol (TPCP).  
158  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
TPCP is Alteons proprietary protocol that is used to establish communication between the  
RADIUS servers and the Alteon Web switch. It is UDP-based and uses ports 3121, 1812, and  
1645.  
Using TPCP, a static session entry is added or removed by the external devices, such as the  
RADIUS servers. A regular session entry is usually added or removed by the switch itself. A  
static session entry, like a regular session entry, contains information such as the client IP  
address, the client port number, real port number, virtual (destination) IP address, virtual (des-  
tination) port number.  
A static session entry added via TPCP to the switch does not age out. The entry will only be  
deleted by another TPCP Delete Sessionrequest. If the user adds session entries using  
the traditional server load balancing methods, the entries will continue to age out.  
Since TPCP is UDP-based, the Add/Delete Session requests may get lost during trans-  
mission. The WAP gateway issues another Add Sessionrequest on detecting that it has lost  
a request. The WAP gateway detects this situation when it receives WAP traffic that does not  
belong to that WAP gateway. If a Delete Sessionrequest is lost, it will be overwritten by  
another Add Sessionrequest.  
How WAP SLB Works Using Static Session Entries  
1. On dialing, the user is first authenticated by the Remote Access Server (RAS).  
2. The RAS sends a RADIUS authentication request to one of the RADIUS servers, which  
can be integrated with a WAP gateway.  
3. If the user is accepted, the RADIUS server determines which WAP gateway is right for  
this user and informs the switch of the decision via TPCP.  
4. The switch receives an Add Sessionrequest from the RADIUS server and adds a ses-  
sion entry to its session table to bind a WAP gateway with that user.  
5. A response (RADIUS Accept) packet is sent back to the RAS by the RADIUS server.  
6. The RAS receives a RADIUSAcceptpacket and allows the WAP traffic for that user.  
7. If the user disconnects, the RAS detects it and sends a RADIUS Accounting Stop  
message to the RADIUS server.  
8. The RADIUS server sends a Deletesessionmessage and removes the session entry  
for that user.  
Chapter 6: Server Load Balancing  
159  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Using RADIUS Snooping  
Radius snooping allows the Alteon Web switch to examine RADIUS accounting packets for  
client information. This information is needed to add to or delete static session entries to the  
session table of the switch so that it can perform the required persistency for load balancing. A  
static session entry does not age out. Such an entry, added using RADIUS Snooping, will only  
be deleted using RADIUS Snooping. The switch load balances both the RADIUS and WAP  
gateway traffic using the same virtual server IP address.  
How WAP SLB Works Using RADIUS Snooping  
Before the RAS allows the WAP traffic for a user to pass in and out of the gateway, it sends a  
RADIUS Accounting Startmessage to one of the RADIUS Servers. The switch then  
snoops on the packet to extract the information it needs. It needs to know the type of the  
RADIUS Accountingmessage, the client IP address, the caller ID, and the users name. If it  
finds this information, the switch adds a session entry to its session table. If any of this infor-  
mation is missing, the switch will not take any action to handle the session entry.  
When the client ends the WAP connection, RAS sends RADIUS Accounting Stop  
packet. If the switch finds the needed information in a RADIUS Accounting Stoppacket,  
it removes the corresponding session entry from its table. The following steps occur for  
RADIUS snooping:  
1. The user is authenticated on dialing.  
2. The RAS establishes a session with the client and sends a RADIUS Accounting Start mes-  
sage with the client IP address to the RADIUS server.  
3. The switch snoops on the RADIUS accounting packet and adds a session entry if it finds  
enough information in the packet.  
4. The switch load balances the WAP traffic to a specific WAP gateway.  
5. When the client terminates the session, the RAS sends an Accounting Stop message to the  
RADIUS server, and the session entry is deleted from the switch.  
160  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Preconfiguring WAP Server Load Balancing  
n
Configure WAP server load balancing on Alteon AD4 and Alteon 184 platforms only.  
n
Enable Virtual Matrix Architecture (VMA).  
>> # /cfg/slb/adv/matrix ena  
n
n
Disable DAM (Direct Access Mode).  
>> # /cfg/slb/adv/direct dis  
Disable pbindand enable udpunder the WAP services (ports 9200 to 9203) menu.  
>> # /cfg/slb/virt <number>/service <name|number>/pbind dis  
>> # /cfg/slb/virt <number>/service <name|number>/udp ena  
n
Configure for RADIUS service 1812 and 1645.  
NOTE The radius service number specified on the switch must match with the service speci-  
fied on the server.  
Enabling Wireless Application Protocol SLB  
1. Enable the external notification from WAP gateway to add and delete session request.  
>> # cfg/slb/adv/tpcp ena  
2. Enable TPCP for adding and deleting WAP sessions.  
>> # cfg/slb/wap/tpcp ena  
Configuring RADIUS Snooping  
Consider the following items before configuring RADIUS snooping:  
n
The same virtual server IP address must be used when load balancing both the RADIUS  
accounting traffic and WAP traffic.  
n
n
All the RADIUS servers must use the same UDP port for RADIUS accounting services.  
Before a session entry is recorded on the switch, WAP packets for a user can go to any of  
the real WAP gateways.  
Chapter 6: Server Load Balancing  
161  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
n
n
If a session entry for a client cannot be added because of resource constraints, the subse-  
quent WAP packets for that client will not be load balanced correctly; and the client will  
need to drop the connection and then reconnect to his wireless service.  
The persistence of a session cannot be maintained if the number of healthy real WAP gate-  
ways changes during the session. For example, if a new WAP server comes into service or  
some of the existing WAP servers are down, the number of healthy WAP gateway changes  
and, in this case, the persistence for a user cannot be maintained.  
n
Persistence cannot be maintained if the user moves from one ISP to another, or if the base  
of the users session changes (that is, from CALLING_STATION_ID to USER_NAME, or  
vice versa). For example, if a user moves out of a roaming area, it is possible that his/her  
CALLING_STATION_ID is not available in the RADIUS Accounting packets. In such a  
case, the switch uses USER_NAME to choose a WAP server instead of  
CALLING_STATION_ID. Thus, persistence cannot be maintained.  
Configure the following filter on the switch to examine a RADIUS accounting packet:  
1. Set the basic filter parameters.  
>> # /cfg/slb/filt 1  
(Select the filter)  
>> Filter 1 # dip 10.10.10.100  
>> Filter 1 # dmask 255.255.255.255  
>> Filter 1 # proto udp  
>> Filter 1 # dport 1813  
>> Filter 1 # action redir  
>> Filter 1 # group 1  
(Set the destination IP address)  
(Set the destination IP mask)  
(Set the protocol to UDP)  
(Set the destination port)  
(Set the action to redirect)  
(Set the group for redirection)  
(Set server port for redirection)  
>> Filter 1 # rport 1813  
2. Turn on proxy and RADIUS snooping.  
>> Filter 1 # adv  
>> Filter 1 Advanced# proxy ena  
>> Filter 1 Advanced# rdsnp ena  
(Select the advance filter menu)  
(Enable proxy)  
(Enable RADIUS snooping)  
3. Apply and save your configuration.  
>> Filter 1 Advanced# apply  
>> Filter 1 Advanced# save  
NOTE Web OS supports Virtual Router Redundancy Protocol (VRRP) and stateful failover,  
using both static session entries and RADIUS snooping. However, active-active configuration  
with Stateful Failover is not supported.  
162  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Intrusion Detection System Server Load Balancing  
Intrusion Detection System (IDS) is a type of security management system for computers and  
networks. An Intrusion Detection System gathers and analyzes information from various areas  
within a computer or a network to identify possible security breaches, which include both  
intrusions (attacks from outside the organization) and misuse (attacks from within the organi-  
zation).  
Intrusion detection functions include:  
n
n
n
n
n
n
Monitoring and analyzing both user and system activities  
Analyzing system configurations and vulnerabilities  
Assessing system and file integrity  
Recognizing patterns typical of attacks  
Analyzing abnormal activity patterns  
Tracking user policy violations  
Intrusion detection devices inspect every packet before it enters a network, looking for any  
signs of an attack. The attacks are recorded and logged in an attempt to guard against future  
attacks and to record the information about the intruders.  
IDS Server Load Balancing helps scale intrusion detection systems since it is not possible for  
an individual server to scale information being processed at gigabit speeds.  
How Intrusion Detection Server Load Balancing Works  
Web OS allows the switch to forward the IP packets to an Intrusion Detection server at the end  
of the filtering process or at the end of client processing (when filtering is not enabled). The  
user must enable IDS SLB on the port and allocate a real server group for IDS Server Load  
Balancing. The IDS SLB-enabled switch copies all incoming packets to this group of intrusion  
detection servers. For each session entry created on the switch, an IDS server is selected based  
on the IDS server load-balancing metric.  
The IDS server receives copies of all the processed frames that are forwarded to the destination  
devices. Session entries are maintained so that all the frames of a given session are forwarded  
to the same IDS server.  
Each IDS server must be connected directly to a different switch port or VLAN because no  
field in the packet header can be substituted. Substituting a field would corrupt the packet that  
must also be forwarded to its real destination.  
Chapter 6: Server Load Balancing  
163  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Load Balancing Metrics for IDS  
The following metrics are supported in IDS load balancing:  
n minmisses  
n roundrobin  
Disable delayed binding if you select this metric.  
n hash  
To select a real server, Web OS allows you to implement the hashmetric in two ways:  
Client processing on port  
If the port is configured for client processing only, then the switch hashes on the  
source IP address.  
Filter processing on the port  
If a filter is configured on the port, then the switch allows you to hash with source IP  
address, destination IP address, or both.  
NOTE The leastconns, bandwidth, and responsemetrics are not applicable to IDS  
server load balancing.  
Configuring IDS Server Load Balancing  
To configure your switch for IDS, do the following:  
NOTE IDS SLB is supported only when RTSP SLB or WAP RADIUS Snooping are disabled  
on the Web switch.  
1. Configure real servers on the switch that correspond to your IDS servers.  
NOTE Real servers are configured by providing the IP address of the actual server. If your  
IDS servers are implemented without an IP address then you should configure a dummy  
address for the real server. Also, set the health check of the IDS group to link health check as  
shown in Step 5 of this procedure.  
For example, if your IDS servers are connected to port 1 and port 2 on the switch and are not  
using IP addresses, you could configure dummy addresses as follows:  
>> # /cfg/slb/real 1/rip 1.1.1.1/ena  
>> # /cfg/slb/real 2/rip 2.2.2.2/ena  
(Define a dummy address)  
(Define a dummy address)  
164  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
2. Create a group and add IDS servers to the group.  
Each IDS server must be connected directly to a different switch port or VLAN. If the IDS  
group will be configured for link health check, match the IDS server number to the physical  
port number (1 to 9) to which it is connected. For ICMP health check, the IDS server number  
can be between 1 and 31.  
>> # /cfg/slb/group <group number>  
>>Real Server Group # add 1  
>>Real Server Group # add 2  
(Define a group)  
(Add IDS server 1)  
(Add IDS server 2)  
3. Define the IDS server load balancing group.  
>> # /cfg/slb/adv/idslb <group number>  
(Select the group with the IDS servers)  
4. Enable the IDS ports for the clients.  
>> # /cfg/slb/port 5  
(Select IDS port 1)  
>> SLB port 5# idslb ena  
>> SLB port 5# ../port 6  
>> SLB port 6# idslb ena  
(Enable IDS on port 1)  
(Select IDS port 2)  
(Enable IDS on port 2)  
5. Define the group health check.  
If you implemented IDS without an IP address, link health check is specifically developed for  
IDS load balancing. Use ICMP health check if your IDS servers are configured with an IP  
address.  
>> # /cfg/slb/group <group number>/health link  
6. Apply and save your changes.  
>> Real server group 1# apply  
>> Real server group 1# save  
Chapter 6: Server Load Balancing  
165  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
WAN Link Load Balancing  
Wide Area Networking (WAN) is a telecommunications network system spread across a broad  
geographic area. A WAN may be privately owned or rented, but the term usually means the  
inclusion of public (shared user) networks, such as the telephone system. WANs can also be con-  
nected through leased lines and satellites. WANs are typically composed of powerful routers and  
switches that link business enterprises, universities, remote offices, and so on, around the world.  
To handle the high volume of data on the Internet, some corporations are using more than one  
Internet Service provider (ISP) as a way to increase reliability of Internet connections. Such  
enterprises with more than one ISP are referred to as being multi-homed. In addition to reliabil-  
ity, a multi-homed network architecture enables enterprises to distribute load among multiple  
connections and to provide more optimal routing.  
The WAN link load-balancing feature introduces additional resilience for networks in multi-  
homed environment. When users want to control which WAN link the traffic traverses, WAN  
link load balancing can be used to steer requests initiated within the users network and his/her  
responses over the appropriate link at that moment in time.  
How WAN Link Load Balancing Works  
The Web switch uses redirection filters to redirect traffic initiated from within the users net-  
work to a group of devices that exist at the other end of the WAN link (routers, for example).  
These filters determine which link is the best at the time the request is generated. To ensure  
that the responses traverse the same link, the source IP address of the request is translated to  
one of the addresses that the selected ISP owns.  
The design of WAN link load balancing is identical to standard redirection, except that it  
substitutes the source IP address of each frame with the proxy IP address of the port to which  
the WAN link is connected.  
Configuring WAN Link Load Balancing  
Before configuring the Web switch for WAN Link load balancing, make sure of the following:  
n
Disable NAT Web Cache Redirection. WAN Link load balancing and NAT Web Cache  
Redirection cannot be configured on the same switch.  
n
n
n
Configure the load balancing metric for responsetime only.  
Do not configure your ports into trunk groups.  
Do not configure WAN link load balancing with two or more WAN links connected  
through the same switch port. This feature uses the proxy IP address of the destination port  
when translating the source IP address of the requests.  
166  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
To configure the switch for WAN link load balancing:  
1. Define a real server with proxy disabled.  
>> # /cfg/slb/real 1  
>> Real server 1# ena  
(Select the real server menu)  
(Enable real server 1)  
>> Real server 1# rip <IP address>  
>> Real server 1# proxy dis  
(Set the real server IP address)  
(Disable proxy)  
2. Add the real server to a real server group using the responsemetric.  
>> # /cfg/slb/group 1  
>> Real server group 1# add 1  
>> Real server group 1# metric response  
3. Define the WAN link load balancing redirection filter.  
>> Real server group 1# /cfg/slb/filt 1  
>> Filter 1# ena  
>> Filter 1# action redir  
>> Filter 1# group 1  
4. Enable WAN link load balancing for the redirection filter.  
>> # /cfg/slb/filt 1/adv/linklb ena  
5. Enable WAN link load balancing proxy for the redirection filter.  
>> # /cfg/slb/filt 1/adv/proxy ena  
6. Apply and save your changes.  
>> Filter 1 Advanced# apply  
>> Filter 1 Advanced# save  
Chapter 6: Server Load Balancing  
167  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
168  
Chapter 6: Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 7  
Filtering  
This chapter provides a conceptual overview of filters and includes configuration examples  
showing how filters can be used for network security and Network Address Translation (NAT).  
n
Overviewon page 170. This section describes the benefits and filtering criteria to allow  
Filter Logson page 176  
IP Address Rangeson page 178  
n
n
n
n
n
TCP Rate Limitingon page 179. This section explains how TCP rate limiting allows  
you to monitor the number of new TCP connections within a configurable time window.  
Tunable Hash for Filter Redirectionon page 184 allows you to select any hash parame-  
Filter-based Securityon page 185. This section provides an example of configuring fil-  
ters for providing the best security.  
Network Address Translationon page 191. This section provides two examples: Internal  
client access to the Internet and external client access to the server.  
Matching TCP Flagson page 197 and Matching ICMP Message Typeson page 201.  
Describes the ACK filter criteria which provides greater filtering flexibility and lists  
ICMP message types that can be filtered respectively.  
169  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Overview  
Alteon Web switches are used to deliver content efficiently and secure your servers from unau-  
thorized intrusion, probing, and Denial-of-Service (DoS) attacks. Web OS includes extensive  
filtering capabilities at the IP and TCP/UDP levels.  
Filtering Benefits  
Layer 3 (IP) and Layer 4 (application) filtering give the network administrator a powerful tool  
with the following benefits:  
n
Increased security for server networks  
Filters can be configured to allow or deny traffic according to various IP address, protocol,  
and Layer 4 port criteria. You can also secure your switch from further virus attacks by  
allowing you to configure the switch with a list of potential offending string patterns. For  
more information, see Layer 7 Deny Filteron page 417.  
This gives the administrator control over the types of traffic permitted through the switch.  
Any filter can be optionally configured to generate system log messages for increased  
security visibility.  
n
Used to map the source or destination IP addresses and ports  
Generic Network Address Translation (NAT) can be used to map the source or destination  
IP addresses and the ports of private network traffic to or from advertised network IP  
addresses and ports.  
Filtering Criteria  
Up to 2048 filters can be configured on Alteon 184 and Alteon AD4 Web switches. Up to 224  
filters are supported on other Alteon Web switches. Descriptive names can be used to define  
filters. Each filter can be set to allow, deny, redirect, or translate traffic based on any combina-  
tion of the following filter options:  
n sip: source IP address or range (see IP Address Rangeson page 178)  
n dip: destination IP address or range (dipand dmask)  
170  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
n proto: protocol number or name as shown in Table 7-1  
Table 7-1 Well-Known Protocol Types  
Number Protocol Name  
1
2
6
icmp  
igmp  
tcp  
17  
89  
112  
udp  
ospf  
vrrp  
n sport: TCP/UDP application or source port as shown in Table 7-2, or source port range  
(such as 31000-33000)  
Table 7-2 Well-Known Application Ports  
Number TCP/UDP  
Application  
Number TCP/UDP  
Application  
Number  
TCP/UDP  
Application  
20  
21  
22  
23  
25  
37  
42  
43  
53  
69  
70  
ftp-data  
ftp  
ssh  
telnet  
smtp  
time  
name  
whois  
domain  
tftp  
79  
80  
finger  
http  
pop2  
pop3  
sunrpc  
nntp  
179  
194  
220  
389  
443  
520  
554  
bgp  
irc  
imap3  
ldap  
https  
rip  
109  
110  
111  
119  
123  
143  
144  
161  
162  
ntp  
rtsp  
imap  
news  
snmp  
snmptrap  
1645, 1812 Radius  
1813  
1985  
Radius Accounting  
hsrp  
gopher  
NOTE The service number specified on the switch must match the service specified on the server.  
n dport: TCP/UDP application or destination port as shown in Table 7-2, or destination port  
range (such as 31000-33000)  
n invert: reverse the filter logic in order to activate the filter whenever the specified condi-  
tions are not met.  
n
Advanced filtering options such as TCP flags (page 197) or ICMP message types (page 201)  
are also available.  
Using these filter criteria, you can create a single filter that blocks external Telnet traffic to  
your main server except from a trusted IP address. Another filter could warn you if FTP access  
is attempted from a specific IP address. Another filter could redirect all incoming e-mail traffic  
to a server where it can be analyzed for spam. The options are nearly endless.  
Chapter 7: Filtering  
171  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Stacking Filters  
Stacking filters are assigned and enabled on a per-port basis. Each filter can be used by itself or  
in combination with any other filter on any given switch port. The filters are numbered 1  
through 2048 on Alteon 184 and Alteon AD4 Web switches, and 1 though 224 on other Alteon  
Web switches. When multiple filters are stacked together on a port, the filters number deter-  
mines its order of precedence: the filter with the lowest number is checked first. When traffic is  
encountered at the switch port, if the filter matches, its configured action takes place and the  
rest of the filters are ignored. If the filter criteria doesnt match, the next filter is tried.  
As long as the filters do not overlap, you can improve filter performance by making sure that  
the most heavily utilized filters are applied first. For example, consider a filter system where  
the Internet is divided according to destination IP address:  
Filtering by Destination IP Address Ranges  
0.0.0.0  
Deny  
255.255.255.255  
Allow Deny  
Redirect  
Filter 2  
Filter 4 Filter 3 Filter 1  
Figure 7-1 Assigning Filters According to Range of Coverage  
Assuming that traffic is distributed evenly across the Internet, the largest area would be the  
most utilized and is assigned to Filter 1. The smallest area is assigned to Filter 4.  
Overlapping Filters  
Filters are permitted to overlap, although special care should be taken to ensure the proper  
order of precedence. When overlapping filters are present, the more specific filters (those that  
target fewer addresses or ports) should be applied before the generalized filters.  
Example:  
Filtering by Destination IP Address Ranges  
0.0.0.0  
Deny  
255.255.255.255  
Redirect  
Allow  
Filter 3  
Filter 2  
Filter 1  
Figure 7-2 Assigning Filters to Overlapping Ranges  
In this example, Filter 2 must be processed prior to Filter 3. If Filter 3 was permitted to take  
precedence, Filter 2 could never be triggered.  
172  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Web OS 10.0 Application Guide  
The Default Filter  
Before filtering can be enabled on any given port, a default filter should be configured. This  
filter handles any traffic not covered by any other filter. All the criteria in the default filter must  
be set to the full range possible (any). For example:  
Filtering by Destination IP Address Ranges  
0.0.0.0  
Deny  
255.255.255.255  
Allow  
Redirect  
Filter 224  
Filter 2  
Filter 1  
Figure 7-3 Assigning a Default Filter  
In this example, the default filter is defined as Filter 224 in order to give it the lowest order of  
precedence. All matching criteria in Filter 224 are set to the anystate. If no other filter acts on  
the traffic, Filter 224 processes it, denying and logging unwanted traffic.  
>> # /cfg/slb/filt 224  
>> Filter 224# sip any  
>> Filter 224# dip any  
>> Filter 224# proto any  
>> Filter 224# action deny  
(Select the default filter)  
(From any source IP addresses)  
(To any destination IP addresses)  
(For any protocols)  
(Deny matching traffic)  
>> Filter 224# name deny unwanted traffic (Provide a descriptive name for the  
filter)  
>> Filter 224# ena  
(Enable the default filter)  
>> Filter 224# adv  
>> Filter 224 Advanced# log enable  
(Select the advanced menu)  
(Log matching traffic to syslog)  
Default filters are recommended (but not required) when configuring filters for IP traffic con-  
trol and redirection. Using default filters can increase session performance but takes some of  
the session binding resources. If you experience an unacceptable number of binding failures, as  
shown in the Server Load Balancing Maintenance Statistics (/stats/slb/maint), you  
may wish to remove some of the default filters.  
Chapter 7: Filtering  
173  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
VLAN-based Filtering  
Filters are applied per switch, per port, or per VLAN. VLAN-based filtering allows a single  
Web switch to provide differentiated services for multiple customers, groups, or departments.  
For example, you can define separate filters for Customers A and B on the same Web switch  
on two different VLANs. If VLANs are assigned based on data traffic, for example, ingress  
traffic on VLAN 1, egress traffic on VLAN 2, and management traffic on VLAN 3, filters can  
be applied accordingly to the different VLANs.  
In the following example shown in Figure 7-4, Filter 2 is configured to allow local clients on  
VLAN 20 to browse the Web, and Filter 3 is configured to allow local clients on VLAN 30 to  
Telnet anywhere outside the local intranet. Filter 7 is configured to deny ingress traffic from  
VLAN 70.  
VLAN 20  
Unique Filters per  
VLAN (up to 2048)  
VLAN 30  
Filter 3  
Internet  
Web Switch  
STOP  
VLAN 70  
Figure 7-4 VLAN-based Filtering  
174  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Configuring VLAN-based Filtering  
1. Configure filter 2 to allow local clients to browse the Web and then assign VLAN 20 to  
the filter.  
The filter must recognize and allow TCP traffic from VLAN 20 to reach the local client destina-  
tion IP addresses if originating from any HTTP source port:  
>> # /cfg/slb/filt 2  
>> Filter 2# sip any  
(Select the menu for Filter 2)  
(From any source IP address)  
(To base local network dest. address)  
(For entire subnet range)  
(For TCP protocol traffic)  
(From any source HTTP port)  
(To any destination port)  
(Allow matching traffic to pass)  
(Assign VLAN 20 to Filter 2)  
(Enable the filter)  
>> Filter 2# dip 205.177.15.0  
>> Filter 2# dmask 255.255.255.0  
>> Filter 2# proto tcp  
>> Filter 2# sport http  
>> Filter 2# dport any  
>> Filter 2# action allow  
>> Filter 2# vlan 20  
>> Filter 2# ena  
All clients from other VLANs will be ignored.  
2. Configure filter 3 to allow local clients to Telnet anywhere outside the local intranet and  
then assign VLAN 30 to the filter.  
The filter must recognize and allow TCP traffic to reach the local client destination IP  
addresses if originating from a Telnet source port:  
>> # /cfg/slb/filt 3  
>> Filter 3# sip any  
(Select the menu for Filter 3)  
(From any source IP address)  
(To base local network dest. address)  
(For entire subnet range)  
(For TCP protocol traffic)  
(From a Telnet port)  
>> Filter 3# dip 205.177.15.0  
>> Filter 3# dmask 255.255.255.0  
>> Filter 3# proto tcp  
>> Filter 3# sport telnet  
>> Filter 3# dport any  
(To any destination port)  
>> Filter 3# action allow  
(Allow matching traffic to pass)  
>> Filter 3# name allow clients to telnet (Provide a descriptive name for the  
filter)  
>> Filter 3# vlan 30  
>> Filter 3# ena  
(Assign VLAN 30 to Filter 3)  
(Enable the filter)  
Chapter 7: Filtering  
175  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
3. Configure Filter 7 to deny traffic and then assign VLAN 70 to the filter.  
As a result, ingress traffic from VLAN 70 is denied entry to the switch.  
>> # /cfg/slb/filt 7  
(Select the menu for Filter 7)  
>> Filter 7# sip any  
(From any source IP address)  
(To base local network dest. address)  
(For entire subnet range)  
(For TCP protocol traffic)  
(From a Telnet port)  
(To any destination port)  
(Allow matching traffic to pass)  
(Assign VLAN 70 to Filter 7)  
(Enable the filter)  
>> Filter 7# dip 205.177.15.0  
>> Filter 7# dmask 255.255.255.0  
>> Filter 7# proto tcp  
>> Filter 7# sport http  
>> Filter 7# dport any  
>> Filter 7# action deny  
>> Filter 7# vlan 70  
>> Filter 7# ena  
Optimizing Filter Performance  
Filter efficiency can be increased by placing filters that are used most often near the beginning  
of the filtering list.  
It is a recommended practice to number filters in small increments (5, 10, 15, 20, etc.) to make  
it easier to insert filters into the list at a later time. However, as the number of filters increases,  
you can improve performance by minimizing the increment between filters. For example, fil-  
ters numbered 2, 4, 6, and 8 are more efficient than filters numbered 20, 40, 60, and 80. Peak  
processing efficiency is achieved when filters are numbered sequentially beginning with 1.  
Filter Logs  
To provide enhanced troubleshooting and session inspection capability, packet source and des-  
tination IP addresses are included in filter log messages. Filter log messages are generated  
when a Layer 3/Layer 4 filter is triggered and has logging enabled. The messages are output to  
the console port, system host log (syslog), and the Web-based interface message window.  
176  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Example: A network administrator has noticed a significant number of ICMP frames on one  
portion of the network and wants to determine the specific sources of the ICMP messages. The  
administrator uses the Command Line Interface (CLI) to create and apply the following filter:  
>> # /cfg/slb/filt 15  
>> Filter 15# sip any  
>> Filter 15# dip any  
>> Filter 15# action allow  
(Select filter 15)  
(From any source IP address)  
(To any destination IP address)  
(Allows matching traffic to pass)  
>> Filter 15# name allow matching traffic (Provide a descriptive name for the  
filter)  
>> Filter 15# proto icmp  
>> Filter 15# ena  
(For the ICMP protocol)  
(Enable the filter)  
>> Filter 15# adv/log enable  
>> Filter 15 Advanced# /cfg/slb/port 7  
>> SLB port 7# add 15  
>> SLB port 7# filt ena  
>> SLB port 7# apply  
(Log matching traffic to syslog)  
(Select a switch port to filter)  
(Add the filter to the switch port)  
(Enable filtering on the switch port)  
(Apply the configuration changes)  
(Save the configuration changes)  
>> SLB port 7# save  
When applied to one or more switch ports, this simple filter rule will produce log messages  
that show when the filter is triggered, and what the IP source and destination addresses were  
for the ICMP frames traversing those ports.  
Example: Filter log message output is shown below, displaying the filter number, port, source  
IP address, and destination IP address:  
slb: filter 15 fired on port 7, 206.118.93.110 -> 20.10.1.10  
Chapter 7: Filtering  
177  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
IP Address Ranges  
You can specify a range of IP addresses for filtering both the source and/or destination IP  
address for traffic. When a range of IP addresses is needed, the source IP (sip) address or des-  
tination IP (dip) address defines the base IP address in the desired range. The source mask  
(smask) or destination mask (dmask) is the mask that is applied to produce the range.  
For example, to determine if a client requests destination IP address should be redirected to  
the cache servers attached to a particular switch, the destination IP address is masked (bit-wise  
AND) with the dmaskand then compared to the destination IP address.  
As another example, the switch could be configured with two filters so that each would handle  
traffic filtering for one half of the Internet. To do this, you could define the following parameters:  
Table 7-3 Filtering IP Address Ranges  
Filter  
Internet Address Range  
0.0.0.0 - 127.255.255.255  
128.0.0.0 - 255.255.255.255  
dip  
dmask  
1
2
0.0.0.0  
128.0.0.0  
128.0.0.0  
128.0.0.0  
Cache-Enabled versus Cache-Disabled Filters  
To improve efficiency, by default, the Web switch performs filter processing only the first  
frame in each session. Subsequent frames in the session are assumed to match the same criteria  
and are automatically treated in the same fashion as the initial frame. These filters create a ses-  
sion entry in the Web switch and are known as cache-enabled.  
Some types of filtering (TCP flag and ICMP message type filtering) require each frame in the  
session to be filtered separately. These filters are known as cache-disabled.  
All filters are cache-enabled by default. To change the status of a filter, use the following com-  
mands:  
>> # /cfg/slb/filt <filter number>/adv  
>> Filter 1 Advanced # cache ena|dis  
(Select the advanced filter menu)  
(Enable or disable filter caching)  
NOTE Cache-enabled filters should not be applied to the same ports as cache-disabled filters.  
Otherwise, the cache-disabled filters could potentially be bypassed for frames matching the  
cache-enabled criteria.  
178  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
TCP Rate Limiting  
Web OS 10.0 allows you to prevent a client or a group of clients from claiming all the TCP  
resources on the servers. This is done by monitoring the rate of incoming TCP connection  
requests to a virtual IP address and limiting the client requests with a known set of IP  
addresses.  
TCP rate limiting is similar to bandwidth management. In both features, you configure filters  
to limit the TCP connection requests; but in bandwidth management the limiting factor is port-  
based, and in TCP rate limit it is user-based.  
The TCP rate limit is defined as the maximum number of TCP connection requests within a  
configured time window. The switch monitors the number of new TCP connections and when it  
exceeds the configured limit, any new TCP connection request is blocked. When this occurs,  
the client is said to be held down. The client is held down for a specified duration of time, after  
which new TCP connection requests from the client are allowed to pass through again.  
Figure 7-5 on page 180 shows four clients configured for TCP rate limits based on source IP  
address. Clients 1 and 4 have the same TCP rate limit of 10 connections per second. Client 2  
has a TCP rate limit of 20 connections per second. Client 3 has a TCP rate limit of 30 connec-  
tions per second.  
When the rate of new TCP connections from clients 1, 2, 3, and 4 reach a pre-determined  
threshold, any new connection request from the client is blocked for a pre-determined amount  
of time. If the clients IP address and the configured filter do not match, then the default filter  
is applied.  
Chapter 7: Filtering  
179  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
In Figure 7-5, the default filter 224 configured for Any is applied for all other connection  
requests.  
Client 1 limit: 10 conn/sec  
Client 2 limit: 20 conn/sec  
Client 3 limit: 30 conn/sec  
Client 4 limit: 10 conn/sec  
Clients  
1
Real servers  
2
3
Web Switch  
Internet  
Filter 10: 10 conn/sec  
Filter 20: 20 conn/sec  
Filter 30: 30 conn/sec  
Filter 224: Allow Any  
4
Figure 7-5 Configuring Clients with Different Rates  
Configuring TCP Rate Limiting Filters  
TCP rate limiting can be configured for all filter types (allow, redir, SIP, and DIP) and parame-  
ters. You can specify the source IP address and mask options in the filter configuration menu to  
monitor a client or a group of clients. The destination IP address and mask options are used to  
monitor connections to a virtual IP address or a group of virtual IP addresses.  
Basic TCP Rate Limiting Filter  
The following example shows how to configure TCP rate limiting for Filter 10 in Figure 7-5.  
1. Enable TCP rate limiting for the filter.  
>> # /cfg/slb/filt 10/adv/tcp  
>> TCP Advanced menu # tcplim ena  
(Enable TCP rate limiting)  
2. Configure maximum number of TCP connections.  
>> TCP Advanced menu # maxcon 3  
(Set the max. number of connections)  
The maxconvalue is specified in units of 10. The value of 3 indicates a total of 30 TCP con-  
nections.  
180  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
3. Set the timewinparameter and calculate the total time window in seconds.  
>> # /cfg/slb/adv/timewin 3 (Set the time window)  
The total time window is a multiple of fastage(for information on fastage, see the Con-  
figuration chapter in the Web OS 10.0 Command Reference). The total time window is calcu-  
lated with the following equation:  
Total Time window = timewin x fastage  
If the default value for fastageis 1 second, then the configured total time window is 3 sec-  
onds.  
NOTE From Step 2 and 3, the TCP rate limit defined as the maximum number of connections  
over a specified time window is 30 TCP connections for every 3 seconds (or 10 TCP connec-  
tions per second).  
For a small site, 30 TCP connections per second provides a good indication if your site is being  
attacked. The default is 100 TCP connections per second. For larger sites, TCP rate limit  
greater than 2550 connection per second indicates the possibility that your switch is under  
attack.  
4. Set the holddurparameter and calculate the hold down time in minutes.  
>> # /cfg/slb/adv/holddur 2  
(Set the hold duration)  
The hold down time is a multiple of slowage(for information on slowage, see the Config-  
uration chapter in the Web OS 10.0 Command Reference). The hold down time is calculated  
with the following equation:  
Hold down time = holddur x slowage  
If slowageis set to the default value of 0 (2 minutes), then the configured value for hold  
down time is  
Hold down time = 2 x 2 = 4 minutes  
If a client exceeds the TCP rate limit, then the client is not allowed to make any new TCP con-  
nections for 4 minutes.  
The following two configuration examples illustrate how to use TCP rate limiting to limit user  
access based on source IP address and virtual IP address.  
Chapter 7: Filtering  
181  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
TCP Rate Limiting Filter Based on Source IP Address  
This example shows how to define a filter that limits clients with IP address 30.30.30.x to 150  
TCP connections per second. Once a user exceeds that limit, they are not allowed any new  
TCP connections for 10 minutes.  
Configure the following on the switch:  
>> # /cfg/slb/filt 100/ena  
(Enable the filter)  
>> Filter 100 # sip 30.30.30.0  
>> Filter 100 # smask 255.255.255.0  
>> Filter 100 # adv/tcp  
(Specify the source IP address)  
(Specify the source IP address mask)  
(Select the advanced filter menu)  
(Enable TCP rate limiting)  
>> TCP advanced# tcplim en  
>> TCP advanced# maxconn 15  
>> TCP advanced# /cfg/slb/adv  
>> Layer 4 Advanced # timewin 1  
>> Layer 4 Advanced # holddur 5  
(Specify the maximum connections)  
(Select the Layer 4 advanced menu)  
(Set the time window for the session)  
(Set the hold duration for the session)  
Fastageand slowageare set at their default values:  
Fastage= 0 (1 sec) slowage= 0 (2 minutes).  
Time window = timewin x fastage= 1 x 1 second = 1 second  
Hold down time = holddur x slowage= 5 x 2 minutes = 10 minutes  
Max rate = maxcon/time window = 150 connections/1 second = 150 connections/second  
Any client with source IP address equal to 30.30.30.x is allowed to make 150 new TCP con-  
nections per second to any single destination. When the rate limit of 150 is met, the hold down  
time takes effect and the client is not allowed to make any new TCP connections to the same  
destination for 10 minutes.  
182  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
TCP Rate Limiting Filter Based on Virtual Server IP Address  
This example defines a filter that limits clients to 100 TCP connections per second to a specific  
destination (VIP 10.10.10.100). Once a client exceeds that limit, the client is not allowed to  
make any new TCP connection request to that destination for 40 minutes. Figure 7-6 shows  
how to use this feature to limit client access to a specific destination.  
Clients  
1
Real servers  
Client 1, 2, 3, and 4 are limited  
to 100 conn/sec to virtual IP address  
S1  
2
3
Web Switch  
Internet  
VIP: 10.10.10.100  
Filter 100: 100 conn/sec  
S2  
4
Figure 7-6 Limiting User Access to Server  
Configure the following on the switch:  
>> # /cfg/slb/filt 100/ena  
(Enable the filter)  
>> Filter 100 # dip 10.10.10.100/dmask 255.255.255.0  
(Specify the virtual server IP address)  
(Select the advanced filter menu)  
(Enable TCP rate limiting)  
(Specify the maximum connections)  
(Select the Layer 4 advanced menu)  
(Set the time window for the session)  
(Set the hold duration for the session)  
>> Filter 100# adv/tcp  
>> TCP advanced# tcplim en  
>> TCP advanced# maxconn 20  
>> TCP advanced# /cfg/slb/adv  
>> Layer 4 Advanced # timewin 1  
>> Layer 4 Advanced # holddur 5  
Fastageand slowageare set to 2 seconds and 8 minutes as follows:  
/cfg/slb/adv/fastage 1  
/cfg/slb/adv/slowage 2  
(Fastage is set to 2 seconds)  
(Slowage is set to 8 minutes)  
time window = timewin x fastage= 1 x 2 seconds = 2 seconds  
hold down time = holddur x slowage= 5 x 8 minutes = 40 minutes  
max rate = maxcon/time window = 200 connections/2 seconds = 100 connections/second  
Chapter 7: Filtering  
183  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
All clients are limited to 100 new TCP connections/second to the server. If a client exceeds this  
rate, then the client is not allowed to make any new TCP connections to the server for 40 min-  
utes.  
NOTE All SLB sessions on the switch are affected when you make changes to the fastage  
or slowageparameters.  
Tunable Hash for Filter Redirection  
Web OS 10.0 allows you to choose a number of options when using the hash parameter for fil-  
ter redirection. Hashing can be based on source IP address, destination IP address, both, or  
source IP address and source port. For example:  
1. Configure hashing based on source IP address:  
>> # /cfg/slb/filt 10/ena  
>> Filter 10 # action redir  
>> Filter 10 # proto tcp  
>> Filter 10 # group 1  
>> Filter 10 # rport 3128  
>> Filter 10 # vlan any  
>> Filter 10 # adv  
(Enable the filter)  
(Specify the redir action)  
(Specify the protocol)  
(Specify the group of real servers)  
(Specify the redirection port)  
(Specify the VLAN)  
(Select the advanced filter menu)  
(Select source IP address for hashing)  
>> TCP advanced menu # thash sip  
Hashing on the 24-bit source IP address ensures that client requests access the same cache.  
2. Set the metric for the real server group to minmissesor hash.  
The source IP address is passed to the real server group for either of the two metrics.  
>> # /cfg/slb/group 1  
>> Real server group 1 # metric minmiss  
(Select the group of real servers)  
(Set the metric to minmiss or hash)  
NOTE If firewall load balancing is enabled on the switch, the firewall load balancing filter  
which hashes on source and destination IP addresses will override the tunable hash filter.  
184  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Filter-based Security  
This section provides an example of configuring filters for providing the best security. It is  
generally recommended that you configure filters to deny all traffic except for those services  
that you specifically wish to allow. Consider the following sample network:  
Alteon Web Switch  
Internet  
Client Switch  
Router  
Local Clients  
Web Server  
Mail Server  
DNS  
205.177.15.2 205.177.15.3 205.177.15.4  
Figure 7-7 Security Topology Example  
In this example, the network is made of local clients on a collector switch, a Web server, a mail  
server, a domain name server, and a connection to the Internet. All the local devices are on the  
same subnet.  
For best security, it is generally recommended that you configure filters to deny all traffic  
except for those services that you specifically wish to allow. In this example, the administrator  
wishes to install basic security filters to allow only the following traffic:  
n
n
n
n
n
External HTTP access to the local Web server  
External SMTP (mail) access to the local mail server  
Local clients browsing the World Wide Web  
Local clients using Telnet to access sites outside the intranet  
DNS traffic  
All other traffic is denied and logged by the default filter.  
NOTE Since IP address and port information can be manipulated by external sources, filter-  
ing does not replace the necessity for a well-constructed network firewall.  
Chapter 7: Filtering  
185  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Configuring a Filter-Based Security Solution  
Before you begin, you must be connected to the switch CLI as the administrator.  
In this example, all filters are applied only to the switch port that connects to the Internet. If  
intranet restrictions are required, filters can be placed on switch ports connecting to local  
devices.  
Also, filtering is not limited to the few protocols and TCP or UDP applications shown in this  
example. See Table 7-1 on page 171 and Table 7-2 on page 171 for a list of other well-known  
protocols and applications.  
1. Assign an IP address to each of the network devices.  
For this example, the network devices have the following IP addresses on the same IP subnet:  
Table 7-4 Web Cache Example: Real Server IP Addresses  
Network Device  
Local Subnet  
IP address  
205.177.15.0 - 205.177.15.255  
205.177.15.2  
Web Server  
Mail Server  
205.177.15.3  
Domain Name Server  
205.177.15.4  
2. Create a default filter that will deny and log unwanted traffic.  
The default filter is defined as Filter 224 in order to give it the lowest order of precedence:  
>> # /cfg/slb/filt 224  
>> Filter 224# sip any  
>> Filter 224# dip any  
>> Filter 224# proto any  
>> Filter 224# action deny  
(Select the default filter)  
(From any source IP addresses)  
(To any destination IP addresses)  
(For any protocols)  
(Deny matching traffic)  
>> Filter 224# name deny unwanted traffic (Provide a descriptive name for the  
filter)  
>> Filter 224# ena  
(Enable the default filter)  
>> Filter 224# adv/log enable  
(Log matching traffic to syslog)  
NOTE Because the protoparameter is not tcpor udp, the source port (sport) and desti-  
nation port (dport) values are ignored and may be excluded from the filter configuration.  
186  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
3. Create a filter that will allow external HTTP requests to reach the Web server.  
The filter must recognize and allow TCP traffic with the Web servers destination IP address  
and HTTP destination port:  
>> Filter 224# ../filt 1  
>> Filter 1# sip any  
>> Filter 1# dip 205.177.15.2  
>> Filter 1# dmask 255.255.255.255  
>> Filter 1# proto tcp  
(Select the menu for filter 1)  
(From any source IP address)  
(To Web server dest. IP address)  
(Set mask for exact dest. address)  
(For TCP protocol traffic)  
>> Filter 1# sport any  
(From any source port)  
>> Filter 1# dport http  
>> Filter 1# action allow  
(To an HTTP destination port)  
(Allow matching traffic to pass)  
>> Filter 1# name allow matching traffic (Provide a descriptive name for the  
filter)  
>> Filter 1# ena  
(Enable the filter)  
4. Create a pair of filters to allow incoming and outgoing mail to and from the mail server.  
Filter 2 allows incoming mail to reach the mail server, and Filter 3 allows outgoing mail to  
reach the Internet:  
>> Filter 1# ../filt 2  
>> Filter 2# sip any  
(Select the menu for filter 2)  
(From any source IP address)  
(To mail server dest. IP address)  
(Set mask for exact dest. address)  
(For TCP protocol traffic)  
(From any source port)  
(To a SMTP destination port)  
(Allow matching traffic to pass)  
(Enable the filter)  
>> Filter 2# dip 205.177.15.3  
>> Filter 2# dmask 255.255.255.255  
>> Filter 2# proto tcp  
>> Filter 2# sport any  
>> Filter 2# dport smtp  
>> Filter 2# action allow  
>> Filter 2# ena  
>> Filter 2# ../filt 3  
>> Filter 3# sip 205.177.15.3  
>> Filter 3# smask 255.255.255.255  
>> Filter 3# dip any  
>> Filter 3# proto tcp  
>> Filter 3# sport smtp  
>> Filter 3# dport any  
>> Filter 3# action allow  
>> Filter 3# ena  
(Select the menu for filter 3)  
(From mail server source IP address)  
(Set mask for exact source address)  
(To any destination IP address)  
(For TCP protocol traffic)  
(From a SMTP port)  
(To any destination port)  
(Allow matching traffic to pass)  
(Enable the filter)  
Chapter 7: Filtering  
187  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
5. Create a filter that will allow local clients to browse the Web.  
The filter must recognize and allow TCP traffic to reach the local client destination IP addresses  
if traffic originates from any HTTP source port:  
>> Filter 3# ../filt 4  
>> Filter 4# sip any  
>> Filter 4# dip 205.177.15.0  
>> Filter 4# dmask 255.255.255.0  
>> Filter 4# proto tcp  
(Select the menu for Filter 4)  
(From any source IP address)  
(To base local network dest. address)  
(For entire subnet range)  
(For TCP protocol traffic)  
>> Filter 4# sport http  
>> Filter 4# dport any  
(From any source HTTP port)  
(To any destination port)  
>> Filter 4# action allow  
(Allow matching traffic to pass)  
>> Filter 4# name allow clients Web browse(Provide a descriptive name for the  
filter)  
>> Filter 4# ena  
(Enable the filter)  
6. Create a filter that will allow local clients to Telnet anywhere outside the local intranet.  
The filter must recognize and allow TCP traffic to reach the local client destination IP  
addresses if originating from a Telnet source port:  
>> Filter 4# ../filt 5  
>> Filter 5# sip any  
(Select the menu for Filter 5)  
(From any source IP address)  
(To base local network dest. address)  
(For entire subnet range)  
(For TCP protocol traffic)  
(From a Telnet port)  
(To any destination port)  
(Allow matching traffic to pass)  
(Enable the filter)  
>> Filter 5# dip 205.177.15.0  
>> Filter 5# dmask 255.255.255.0  
>> Filter 5# proto tcp  
>> Filter 5# sport telnet  
>> Filter 5# dport any  
>> Filter 5# action allow  
>> Filter 5# ena  
7. Create a series of filters to allow Domain Name System (DNS) traffic.  
DNS traffic requires four filters; one pair is needed for UDP traffic (incoming and outgoing)  
and another pair for TCP traffic (incoming and outgoing).  
188  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
For UDP:  
>> Filter 5# ../filt 6  
>> Filter 6# sip any  
(Select the menu for Filter 6)  
(From any source IP address)  
(To local DNS Server)  
(Set mask for exact dest. address)  
(For UDP protocol traffic)  
(From any source port)  
(To any DNS destination port)  
(Allow matching traffic to pass)  
(Enable the filter)  
>> Filter 6# dip 205.177.15.4  
>> Filter 6# dmask 255.255.255.255  
>> Filter 6# proto udp  
>> Filter 6# sport any  
>> Filter 6# dport domain  
>> Filter 6# action allow  
>> Filter 6# ena  
>> Filter 6# ../filt 7  
>> Filter 7# sip 205.177.15.4  
>> Filter 7# smask 255.255.255.255  
>> Filter 7# dip any  
>> Filter 7# proto udp  
>> Filter 7# sport domain  
>> Filter 7# dport any  
>> Filter 7# action allow  
>> Filter 7# ena  
(Select the menu for Filter 7)  
(From local DNS Server)  
(Set mask for exact source address)  
(To any destination IP address)  
(For UDP protocol traffic)  
(From a DNS source port)  
(To any destination port)  
(Allow matching traffic to pass)  
(Enable the filter)  
Similarly, for TCP:  
>> Filter 7# ../filt 8  
>> Filter 8# sip any  
(Select the menu for Filter 8)  
(From any source IP address)  
(To local DNS Server)  
(Set mask for exact dest. address)  
(For TCP protocol traffic)  
(From any source port)  
(To any DNS destination port)  
(Allow matching traffic to pass)  
(Enable the filter)  
>> Filter 8# dip 205.177.15.4  
>> Filter 8# dmask 255.255.255.255  
>> Filter 8# proto tcp  
>> Filter 8# sport any  
>> Filter 8# dport domain  
>> Filter 8# action allow  
>> Filter 8# ena  
>> Filter 8# ../filt 9  
>> Filter 9# sip 205.177.15.4  
>> Filter 9# smask 255.255.255.255  
>> Filter 9# dip any  
>> Filter 9# proto tcp  
>> Filter 9# sport domain  
>> Filter 9# dport any  
>> Filter 9# action allow  
>> Filter 9# ena  
(Select the menu for Filter 9)  
(From local DNS Server)  
(Set mask for exact source address)  
(To any destination IP address)  
(For TCP protocol traffic)  
(From a DNS source port)  
(To any destination port)  
(Allow matching traffic to pass)  
(Enable the filter)  
Chapter 7: Filtering  
189  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
8. Assign the filters to the switch port that connects to the Internet.  
>> Filter 9# ../port 5  
>> SLB Port 5# add 1-9  
>> SLB Port 5# add 224  
>> SLB Port 5# filt enable  
(Select the SLB port 5 to the Internet)  
(Add filters 1-9 to port 5)  
(Add the default filter to port 5)  
(Enable filtering for port 5)  
Web OS allows you to add and remove a contiguous block of filters with a single command.  
9. Apply and verify the configuration.  
>> SLB Port 5# apply  
>> SLB Port 5# cur  
(Make your changes active)  
(View current settings)  
Examine the resulting information. If any settings are incorrect, make appropriate changes.  
10. Save your new configuration changes.  
>> SLB Port 5# save  
(Save for restore after reboot)  
11. Check the server load balancing information.  
>> SLB Port 5# /info/slb/dump  
(View SLB information)  
Check that all SLB parameters are working according to expectation. If necessary, make any  
appropriate configuration changes and then check the information again.  
NOTE Changes to filters on a given port do not take effect until the ports session information  
is updated (every two minutes or so). To make filter changes take effect immediately, clear the  
session binding table for the port (see the /oper/slb/clearcommand in the Web OS 10.0  
Command Reference).  
190  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Network Address Translation  
Network Address Translation (NAT) is an Internet standard that enables an Alteon Web switch  
to use one set of IP addresses for internal traffic and a second set of addresses for external traf-  
fic. Alteon Web switches use filters to implement NAT.  
NAT serves two main purposes:  
n
n
Provides a type of firewall by hiding internal IP addresses and increases network security.  
Enables a company to use more internal IP addresses. Since theyre used internally only,  
theres no possibility of conflict with public IP addresses used by other companies and  
organizations.  
In the following NAT examples, a company has configured its internal network with private IP  
addresses. A private network is one that is isolated from the global Internet and is, therefore,  
free from the usual restrictions requiring the use of registered, globally unique IP addresses.  
With NAT, private networks are not required to remain isolated. NAT capabilities within the  
switch allow internal, private network IP addresses to be translated to valid, publicly adver-  
tised IP addresses and back again. NAT can be configured in one of the following two ways:  
n
Static NAT provides a method for direct mapping of one predefined IP address (such as a  
publicly available IP address) to another (such as a private IP address)  
n
Dynamic NAT provides a method for mapping multiple IP addresses (such as a group of  
internal clients) to a single IP address (to conserve publicly advertised IP addresses)  
Alteon Web switches use filters to implement NAT.  
Static NAT  
The static NAT (non-proxy) example requires two filters: one for the external client-side  
switch port, and one for the internal, server-side switch port. The client-side filter translates  
incoming requests for the publicly advertised server IP address to the servers internal private  
network address. The filter for the server-side switch port reverses the process, translating the  
servers private address information to a valid public address.  
Chapter 7: Filtering  
191  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
In this example, clients on the Internet require access to servers on the private network:  
Outbound filter:  
NAT source info  
to public address  
Public IP Address:  
205.178.13.x  
External Clients  
Router  
1
2
Internet  
Server:  
10.10.10.1  
(Private network)  
Inbound filter:  
NAT destination  
to private address  
Figure 7-8 Static Network Address Translation  
Configuring Static NAT  
>> # /cfg/slb/filt 10  
>> Filter 10# action nat  
>> Filter 10# nat source  
>> Filter 10# sip 10.10.10.0  
>> Filter 10# smask 255.255.255.0  
>> Filter 10# dip 205.178.13.0  
>> Filter 10# dmask 255.255.255.0  
>> Filter 10# ena  
(Select the menu for outbound filter)  
(Perform NAT on matching traffic)  
(Translate source information)  
(From the clients private IP address)  
(For the entire private subnet range)  
(To the public network address)  
(For the same subnet range)  
(Enable the filter)  
>> Filter 10# adv/proxy disable  
>> Filter 10 Advanced# /cfg/slb/filt 11  
>> Filter 11# action nat  
(Override any proxy IP settings)  
(Select the menu for inbound filter)  
(Use the same settings as outbound)  
(Reverse the translation direction)  
(Use the same settings as outbound)  
(Use the same settings as outbound)  
(Use the same settings as outbound)  
(Use the same settings as outbound)  
(Enable the filter)  
>> Filter 11# nat dest  
>> Filter 11# sip 10.10.10.0  
>> Filter 11# smask 255.255.255.0  
>> Filter 11# dip 205.178.13.0  
>> Filter 11# dmask 255.255.255.0  
>> Filter 11# ena  
>> Filter 11# adv/proxy disable  
>> Filter 11 Advanced# /cfg/slb/port 1  
>> SLB port 1# add 10  
(Override any proxy IP settings)  
(Select server-side port)  
(Add the outbound filter)  
>> SLB port 1# filt enable  
>> SLB port 1# ../port 2  
(Enable filtering on port 1)  
(Select the client-side port)  
>> SLB port 2# add 11  
(Add the inbound filter)  
>> SLB port 2# filt enable  
>> SLB port 2# apply  
>> SLB port 2# save  
(Enable filtering on port 2)  
(Apply configuration changes)  
(Save configuration changes)  
192  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Note the following important points about this configuration:  
n
n
Within each filter, the smaskand dmaskvalues are identical.  
All parameters for both filters are identical except for the NAT direction. For Filter 10,  
natsourceis used. For Filter 11, natdestis used.  
n
Filters for static (non-proxy) NAT should take precedence over dynamic NAT filters (fol-  
lowing example). Static filters should be given lower filter numbers.  
Dynamic NAT  
Dynamic NAT is a many-to-one solution: multiple clients on the private subnet take advantage  
of a single external IP address, thus conserving valid IP addresses. In this example, clients on  
the internal private network require TCP/UDP access to the Internet:  
Outbound filter:  
NAT source info  
Public IP Address:  
to public address  
205.178.17.12  
1
Internet  
Hub  
Router  
Inbound proxy on  
public address  
Internal Clients  
10.10.10.x  
(Private network)  
Figure 7-9 Dynamic Network Address Translation  
NOTE Dynamic NAT can also be used to support ICMP traffic for PING.  
This example requires a NAT filter to be configured on the switch port that is connected to the  
internal clients. When the NAT filter is triggered by outbound client traffic, the internal private  
IP address information on the outbound packets is translated to a valid, publicly advertised IP  
address on the switch. In addition, the public IP address must be configured as a proxy IP  
address on the switch port that is connected to the internal clients. The proxy performs the  
reverse translation, restoring the private network addresses on inbound packets.  
Chapter 7: Filtering  
193  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Configuring Dynamic NAT  
>> # /cfg/slb/filt 14  
(Select the menu for client filter)  
(Invert the filter logic)  
>> Filter 14# invert ena  
>> Filter 14# dip 10.10.10.0  
>> Filter 14# dmask 255.255.255.0  
>> Filter 14# sip any  
>> Filter 14# action nat  
>> Filter 14# nat source  
>> Filter 14# ena  
(If the destination is not private)  
(For the entire private subnet range)  
(From any source IP address)  
(Perform NAT on matching traffic)  
(Translate source information)  
(Enable the filter)  
>> Filter 14# adv/proxy enable  
>> Filter 14 Advanced# /cfg/slb/port 1  
>> SLB port 1# add 14  
(Allow PIP proxy translation)  
(Select SLB port 1)  
(Add the filter to port 1)  
>> SLB port 1# pip 205.178.17.12  
>> SLB port 1# filt enable  
>> SLB port 1# proxy ena  
>> SLB port 1# apply  
(Set public IP address proxy)  
(Enable filtering on port 1)  
(Enable proxies on this port)  
(Apply configuration changes)  
(Save configuration changes)  
>> SLB port 1# save  
NOTE The invertoption in this example filter makes this specific configuration easier but  
is not a requirement for dynamic NAT.  
NOTE Dynamic NAT solutions apply only to TCP/UDP traffic. Also, filters for dynamic  
NAT should be given a higher numbers than any static NAT filters (see Static NATon page  
191).  
194  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
FTP Client NAT  
Alteon Web switches provide NAT services to many clients with private IP addresses. In  
Web OS, an FTP enhancement provides the capability to perform true FTP NAT for dynamic  
NAT.  
Because of the way FTP works in active mode, a client sends information on the control chan-  
nel, information that reveals their private IP address, out to the Internet. However, the switch  
filter only performs NAT translation on the TCP/IP header portion of the frame, preventing a  
client with a private IP address from doing active FTP.  
The switch can monitor the control channel and replace the client s private IP address with a  
proxy IP address defined on the switch. When a client in active FTP mode sends a portcom-  
mand to a remote FTP server, the switch will look into the data part of the frame and modify  
the portcommand as follows:  
n
The real server (client) IP address will be replaced by a public proxy IP address. If VMA  
is enabled, a pool (1-8) of proxy IP addresses is used instead of a single one.  
n
The real server (client) port will be replaced with a proxy port.  
(Pool of proxy IP  
Outbound filter:  
addresses instead  
of a single proxy  
IP address)  
NAT source info  
to public address  
Public IP Address:  
205.178.17.12  
1
Internet  
Hub  
Router  
Inbound proxy on  
public address  
Real servers  
10.10.10.x  
(Private network)  
Figure 7-10 Active FTP for Dynamic NAT  
Chapter 7: Filtering  
195  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Configuring Active FTP Client NAT  
NOTE The passive mode does not need this feature.  
1. Make sure that a proxy IP address is enabled on the filter port.  
2. Make sure that a source NAT filter is set up for the port.:  
>> # /cfg/slb/filt 14  
(Select the menu for client filter)  
>> Filter 14# invert ena  
>> Filter 14# dip 10.10.10.0  
>> Filter 14# dmask 255.255.255.0  
>> Filter 14# sip any  
>> Filter 14# action nat  
>> Filter 14# nat source  
>> Filter 14# ena  
(Invert the filter logic)  
(If the destination is not private)  
(For the entire private subnet range)  
(From any source IP address)  
(Perform NAT on matching traffic)  
(Translate source information)  
(Enable the filter)  
>> Filter 14# adv/proxy enable  
>> Filter 14 Advanced# /cfg/slb/port 1  
>> SLB port 1# add 14  
(Allow PIP proxy translation)  
(Select SLB port 1)  
(Add the filter to port 1)  
>> SLB port 1# pip 205.178.17.12  
>> SLB port 1# filt enable  
>> SLB port 1# proxy ena  
>> SLB port 1# apply  
(Set public IP address proxy)  
(Enable filtering on port 1)  
(Enable proxies on this port)  
(Apply configuration changes)  
(Save configuration changes)  
>> SLB port 1# save  
3. Enable active FTP NAT using the following command:  
>> # /cfg/slb/filt <filter number>/adv/ftpa ena  
4. Apply and save the switch configuration.  
196  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Matching TCP Flags  
Web OS supports packet filtering based on any of the following TCP flags.  
Table 7-5 TCP Flags  
Flag  
URG  
ACK  
PSH  
RST  
SYN  
FIN  
Description  
Urgent  
Acknowledgement  
Push  
Reset  
Synchronize  
Finish  
Any filter may be set to match against more than one TCP flag at the same time. If there is  
setting the switch to filter SYNand ACK, the switch filters all SYN-ACKframes.  
NOTE TCP flag filters must be cache-disabled. Exercise caution when applying cache-  
enabled and cache-disabled filters to the same switch port. For more information, see Cache-  
Enabled versus Cache-Disabled Filterson page 178.  
Configuring the TCP Flag Filter  
NOTE By default, all TCP filter options are disabled. TCP flags will not be inspected unless  
one or more TCP options are enabled.  
Consider the following network:  
Web Switch  
Inside/  
Trusted LAN  
1
3
Internet  
2
Router  
SMTP  
Mail Server  
Web Servers:  
203.122.186.*  
Figure 7-11 TCP ACK Matching Network  
Chapter 7: Filtering  
197  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
In this network, the Web servers inside the LAN must be able to transfer mail to any SMTP-  
based mail server out on the Internet. At the same time, you want to prevent access to the LAN  
from the Internet, except for HTTP.  
SMTP traffic uses well-known TCP Port 25. The Web servers will originate TCP sessions to  
the SMTP server using TCP destination Port 25, and the SMTP server will acknowledge each  
TCP session and data transfer using TCP source Port 25.  
Creating a filter with the ACK flag closes one potential security hole. Without the filter, the  
switch would permit a TCP SYN connection request to reach any listening TCP destination  
port on the Web servers inside the LAN, as long as it originated from TCP source Port 25. The  
server would listen to the TCP SYN, allocate buffer space for the connection, and reply to the  
connect request. In some SYN attack scenarios, this could cause the servers buffer space to  
fill, crashing the server or at least making it unavailable.  
A filter with the ACK flag enabled prevents external devices from beginning a TCP connection  
(with a TCP SYN) from TCP source Port 25. The switch drops any frames that have the ACK  
flag turned off.  
The following filters are required:  
1. A filter that allows the Web servers to pass SMTP requests to the Internet.  
>> # /cfg/slb/filt 10  
(Select a filter for trusted SMTP requests)  
(From the Web serverssource IP address)  
(For the entire subnet range)  
(From any source port)  
>> Filter 10# sip 203.122.186.0  
>> Filter 10# smask 255.255.255.0  
>> Filter 10# sport any  
>> Filter 10# proto tcp  
>> Filter 10# dip any  
>> Filter 10# dport smtp  
>> Filter 10# action allow  
>> Filter 10# ena  
(For TCP traffic)  
(To any destination IP address)  
(To well-known destination SMTP port)  
(Allow matching traffic to pass)  
(Enable the filter)  
198  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
2. A filter that allows SMTP traffic from the Internet to pass through the switch only if the  
destination is one of the Web servers, and the frame is an acknowledgment (ACK) of a  
TCP session.  
>> Filter 10# ../filt 15  
>> Filter 15# sip any  
(Select a filter for Internet SMTP ACKs)  
(From any source IP address)  
(From well-known source SMTP port)  
(For TCP traffic)  
(To the Web serversIP address)  
(To the entire subnet range)  
(To any destination port)  
>> Filter 15# sport smtp  
>> Filter 15# proto tcp  
>> Filter 15# dip 203.122.186.0  
>> Filter 15# dmask 255.255.255.0  
>> Filter 15# dport any  
>> Filter 15# action allow  
>> Filter 15# ena  
(Allow matching traffic to pass)  
(Enable the filter)  
>> Filter 15# adv/tcp  
>> Filter 15 Advanced# ack ena  
(Select the advanced TCP menu)  
(Match acknowledgments only)  
3. A filter that allows trusted HTTP traffic from the Internet to pass through the switch to  
the Web servers.  
>> Filter 15 Advanced# /cfg/slb/filt 16(Select a filter for incoming HTTP traffic)  
>> Filter 16# sip any  
(From any source IP address)  
(From well-known source HTTP port)  
(For TCP traffic)  
(To the Web serversIP address)  
(To the entire subnet range)  
(To well-known destination HTTP port)  
(Allow matching traffic to pass)  
(Enable the filter)  
>> Filter 16# sport http  
>> Filter 16# proto tcp  
>> Filter 16# dip 203.122.186.0  
>> Filter 16# dmask 255.255.255.0  
>> Filter 15# dport http  
>> Filter 16# action allow  
>> Filter 16# ena  
4. A filter that allows HTTP responses from the Web servers to pass through the switch to  
the Internet.  
>> Filter 16# ../filt 17  
>> Filter 17# sip 203.122.186.0  
>> Filter 17# smask 255.255.255.0  
>> Filter 17# sport http  
>> Filter 17# proto tcp  
>> Filter 17# dip any  
>> Filter 17# dport http  
>> Filter 17# action allow  
>> Filter 17# ena  
(Select a filter for outgoing HTTP traffic)  
(From the Web serverssource IP address)  
(From the entire subnet range)  
(From well-known source HTTP port)  
(For TCP traffic)  
(To any destination IP address)  
(To well-known destination HTTP port)  
(Allow matching traffic to pass)  
(Enable the filter)  
Chapter 7: Filtering  
199  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
5. A default filter is required to deny all other traffic.  
>> Filter 17# ../filt 224  
>> Filter 224# sip any  
>> Filter 224# dip any  
>> Filter 224# action deny  
(Select a default filter)  
(From any source IP address)  
(To any destination IP address)  
(Block matching traffic)  
>> Filter 224# name deny matching traffic (Provide a descriptive name for the  
filter)  
>> Filter 224# ena  
(Enable the filter)  
6. Apply the filters to the appropriate switch ports.  
>> Filter 224# ../port 1  
>> SLB port 1# add 15  
>> SLB port 1# add 16  
>> SLB port 1# add 224  
>> SLB port 1# filt ena  
>> SLB port 1# ../port 2  
>> SLB port 2# add 10  
>> SLB port 2# add 17  
>> SLB port 2# add 224  
>> SLB port 2# filt ena  
>> SLB port 2# ../port 3  
>> SLB port 3# add 10  
>> SLB port 3# add 17  
>> SLB port 3# add 224  
>> SLB port 3# filt ena  
>> SLB port 3# apply  
>> SLB port 3# save  
(Select the Internet-side port)  
(Add the SMTP ACK filter to the port)  
(Add the incoming HTTPS filter)  
(Add the default filter to the port)  
(Enable filtering on the port)  
(Select the first Web server port)  
(Add the outgoing SMTP filter to the port)  
(Add the outgoing HTTP filter to the port)  
(Add the default filter to the port)  
(Enable filtering on the port)  
(Select the other Web server port)  
(Add the outgoing SMTP filter to the port)  
(Add the outgoing HTTP filter to the port)  
(Add the default filter to the port)  
(Enable filtering on the port)  
(Apply the configuration changes)  
(Save the configuration changes)  
200  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Matching ICMP Message Types  
Internet Control Message Protocol (ICMP) is used for reporting TCP/IP processing errors.  
There are numerous types of ICMP messages, as shown in Table 7-6. Although ICMP packets  
can be filtered using the protoicmpoption, by default, the Web switch ignores the ICMP  
message type when matching a packet to a filter. To perform filtering based on specific ICMP  
message types, ICMP message type filtering must be enabled.  
Web OS software supports filtering on the following ICMP message types:  
Table 7-6 ICMP Message Types  
Type # Message Type  
Description  
0
echorep  
destun  
quench  
redir  
ICMP echo reply  
3
ICMP destination unreachable  
ICMP source quench  
ICMP redirect  
4
5
8
echoreq  
rtradv  
rtrsol  
timex  
ICMP echo request  
9
ICMP router advertisement  
ICMP router solicitation  
ICMP time exceeded  
ICMP parameter problem  
ICMP timestamp request  
ICMP timestamp reply  
ICMP information request  
ICMP information reply  
ICMP address mask request  
ICMP address mask reply  
10  
11  
12  
13  
14  
15  
16  
17  
18  
param  
timereq  
timerep  
inforeq  
inforep  
maskreq  
maskrep  
Chapter 7: Filtering  
201  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
The command to enable or disable ICMP message type filtering is entered from the Advanced  
Filtering menu as follows:  
>> # /cfg/slb/filt <filter number>/adv  
>> Filter 1 Advanced# icmp <message type|number|any|list>  
For any given filter, only one ICMP message type can be set at any one time. The anyoption  
message types that can be entered.  
NOTE ICMP message type filters must be cache-disabled. Exercise caution when applying  
cache-enabled and cache-disabled filters to the same switch port. For more information, see  
Cache-Enabled versus Cache-Disabled Filterson page 178.  
202  
Chapter 7: Filtering  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 8  
Application Redirection  
Application Redirection improves network bandwidth and provides unique network solutions.  
Filters can be created to redirect traffic to cache and application servers improving speed of  
access to repeated client access to common Web or application content and freeing valuable  
network bandwidth.  
n
n
n
Overviewon page 204. Application redirection helps reduce the traffic congestion dur-  
ing peak loads by accessing locally cached information. This section also discusses how  
performance is improved by balancing cached Web requests across multiple servers.  
Web Cache Configuration Exampleon page 206. This section provides a step-by-step  
procedure on how to intercept all Internet bound HTTP requests (on default TCP port 80)  
and redirect them to the Web cache servers.  
RTSP Web Cache Redirectionon page 211. This section explains how to configure the  
switch to redirect data (multimedia presentations) to the cache servers and how to balance  
the load among the cache servers.  
n
n
IP Proxy Addresses for NATon page 213. This section discusses the benefits of trans-  
parent proxies when used with application redirection.  
Excluding Noncacheable Siteson page 215. This section describes how to filter out  
applications that keep real-time session information from being redirected to cache serv-  
ers.  
NOTE To access Application Redirection functionality, the optional Layer 4 software must  
be enabled on the Web switch (see Filtering and Layer 4in Chapter 8 of the Web OS Com-  
mand Reference).  
203  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Overview  
Most of the information downloaded from the Internet is not unique, as clients will often  
access the Web page many times for additional information or to explore other links. Duplicate  
information also gets requested as the components that make up Internet data at a particular  
Web site (pictures, buttons, frames, text, and so on) are reloaded from page to page. When you  
consider this scenario in the context of many clients, it becomes apparent that redundant  
requests can consume a considerable amount of your available bandwidth to the Internet.  
Application redirection can help reduce the traffic congestion during peak loads. When Appli-  
cation redirection filters are properly configured for the Web OS-powered switch, outbound  
client requests for Internet data are intercepted and redirected to a group of application or Web  
cache servers on your network. The servers duplicate and store inbound Internet data that has  
been requested by your clients. If the servers recognize a clients outbound request as one that  
can be filled with cached information, the servers supply the information rather than send the  
request across the Internet.  
In addition to increasing the efficiency of your network, accessing locally cached information  
can be much faster than requesting the same information across the Internet.  
Web Cache Redirection Environment  
Consider a network where client HTTP requests begin to regularly overload the Internet router.  
Client Switch  
Router  
Internet  
Client Switch  
Clients  
Congestion  
Targets Router  
Figure 8-1 Traditional Network Without Web Cache Redirection  
204  
Chapter 8: Application Redirection  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
The network needs a solution that addresses the following key concerns:  
n
n
The solution must be readily scalable  
The administrator should not need to reconfigure all the clientsbrowsers to use proxy  
servers.  
HTTP requests  
are redirected  
A
B
HTTP  
Requests  
C
Client Switch  
Clients  
Cache farm proxies  
client requests  
Internet  
Client Switch  
Figure 8-2 Network with Web Cache Redirection  
Adding an Alteon Web switch with optional Layer 4 software addresses these issues:  
Router  
n
n
Web cache servers can be added or removed dynamically without interrupting services.  
Performance is improved by balancing the cached Web request load across multiple serv-  
ers. More servers can be added at any time to increase processing power.  
n
n
The proxy is transparent to the client.  
Frames that are not associated with HTTP requests are normally passed to the router.  
Additional Application Redirection Options  
Application redirection can be used in combination with other Layer 4 options, such as load  
balancing metrics, health checks, real server group backups, and more. See Additional Server  
Load Balancing Optionson page 128 for details.  
Chapter 8: Application Redirection  
205  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Web Cache Configuration Example  
The following is required prior to configuration:  
n
n
You must connect to the Web switch Command Line Interface (CLI) as the administrator.  
Optional Layer 4 software must be enabled.  
NOTE For details about the procedures above, and about any of the menu commands  
described in this example, see the Web OS Command Reference.  
In this example, an Alteon Web switch is placed between the clients and the border gateway to  
the Internet. The Web switch will be configured to intercept all Internet bound HTTP requests (on  
default TCP port 80), and redirect them to the Web cache servers. The Web switch will distribute  
HTTP requests equally to the Web cache servers based on the destination IP address of the  
requests.  
Also, filters are not limited to the few protocols and TCP or UDP applications shown in this  
example. See Table 6-3 on page 128 and Table 7-2 on page 171 for a list of other well-known  
protocols and services.  
1. Assign an IP address to each of the Web cache servers.  
Similar to server load balancing, the Web cache real servers are assigned an IP address and  
placed into a real server group. The real servers must be in the same VLAN and must have an  
IP route to the Web switch that will perform the Web cache redirection. In addition, the path  
from the Web switch to the real servers must not contain a router. The router would stop HTTP  
requests from reaching the Web cache servers and, instead, directing them back out to the  
Internet.  
More complex network topologies can be used if configuring IP proxy addresses (see IP  
Proxy Addresses for NATon page 213).  
For this example, the three Web cache real servers have the following IP addresses on the same  
IP subnet:  
Table 8-1 Web Cache Example: Real Server IP Addresses  
Web Cache Server  
Server A  
IP address  
200.200.200.2  
200.200.200.3  
200.200.200.4  
Server B  
Server C  
206  
Chapter 8: Application Redirection  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
2. Install transparent Web cache software on all three Web cache servers.  
3. Define an IP interface on the Web switch.  
Since, by default, the Web switch only remaps destination MAC addresses, it must have an IP  
interface on the same subnet as the three Web cache servers.  
To configure an IP interface for this example, enter this command from the CLI:  
>> # /cfg/ip/if 1  
(Select IP interface 1)  
>> IP Interface 1# addr 200.200.200.100  
>> IP Interface 1# ena  
(Assign IP address for the interface)  
(Enable IP interface 1)  
NOTE The IP interface and the real servers must be in the same subnet. This example  
assumes that all ports and IP interfaces use default VLAN 1, requiring no special VLAN con-  
figuration for the ports or IP interface.  
4. Define each real server on the switch.  
For each Web cache real server, you must assign a real server number, specify its actual IP  
address, and enable the real server. For example:  
>> ip# /cfg/slb/real 1  
>> Real server 1# rip 200.200.200.2  
>> Real server 1# ena  
(Server A is real server 1)  
(Assign Server A IP address)  
(Enable real server 1)  
>> Real server 1# ../real 2  
>> Real server 2# rip 200.200.200.3  
>> Real server 2# ena  
(Server B is real server 2)  
(Assign Server B IP address)  
(Enable real server 2)  
>> Real server 2# ../real 3  
>> Real server 3# rip 200.200.200.4  
>> Real server 3# ena  
(Server C is real server 3)  
(Assign Server C IP address)  
(Enable real server 3)  
5. Define a real server group.  
This places the three Web cache real servers into one service group:  
>> Real server 3# ../group 1  
>> Real server group 1# add 1  
>> Real server group 1# add 2  
>> Real server group 1# add 3  
(Select real server group 1)  
(Add real server 1 to group 1)  
(Add real server 2 to group 1)  
(Add real server 3 to group 1)  
Chapter 8: Application Redirection  
207  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
6. Set the real server group metric to minmisses.  
This setting helps minimize Web cache misses in the event real servers fail or are taken out of  
service:  
>> Real server group 1# metric minmisses (Metric for minimum cache misses.)  
7. Verify that server processing is disabled on the ports supporting application redirection.  
NOTE Do not use the serversetting on a port with Application Redirection enabled. Server  
processing is used only with SLB. To disable server processing on the port, use the commands  
on the /cfg/slb/portmenu, as described in Chapter 8 of the Web OS Command Refer-  
ence.  
8. Create a filter that will intercept and redirect all client HTTP requests.  
The filter must be able to intercept all TCP traffic for the HTTP destination port and must redi-  
rect it to the proper port on the real server group:  
>> SLB port 6# /cfg/slb/filt 2  
>> Filter 2# sip any  
>> Filter 2# dip any  
>> Filter 2# proto tcp  
>> Filter 2# sport any  
>> Filter 2# dport http  
>> Filter 2# action redir  
>> Filter 2# rport http  
>> Filter 2# group 1  
(Select the menu for Filter 2)  
(From any source IP addresses)  
(To any destination IP addresses)  
(For TCP protocol traffic)  
(From any source port)  
(To an HTTP destination port)  
(Set the action for redirection)  
(Set the redirection port)  
(Select real server group 1)  
(Enable the filter)  
>> Filter 2# ena  
The rportparameter must be configured whenever TCP/UDP protocol traffic is redirected.  
The rportparameter defines the real server TCP or UDP port to which redirected traffic will  
be sent. The port defined by the rportparameter is used when performing Layer 4 health  
checks of TCP services.  
Also, if NAT and proxy addresses are used on the Web switch (see Step 3 on page 207), the  
rportparameter must be configured for all application redirection filters. Take care to use  
the proper port designation with rport: if the transparent proxy operation resides on the host,  
the well-known port (80 or http) is probably required. If the transparent proxy occurs on the  
Web switch, make sure to use the service port required by the specific software package.  
See IP Proxy Addresses for NATon page 213 for more about IP proxy addresses.  
208  
Chapter 8: Application Redirection  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
9. Create a default filter.  
In this case, the default filter will allow all noncached traffic to proceed normally:  
>> Filter 2# ../filt 224  
>> Filter 224# sip any  
>> Filter 224# dip any  
>> Filter 224# proto any  
>> Filter 224# action allow  
>> Filter 224# ena  
(Select the default filter)  
(From any source IP addresses)  
(To any destination IP addresses)  
(For any protocols)  
(Set the action to allow traffic)  
(Enable the default filter)  
NOTE When the protoparameter is not tcp or udp, then sportand dportare ignored.  
10. Assign the filters to the client ports.  
Assuming that the redirected clients are connected to physical switch Ports 5 and 6, both ports  
are configured to use the previously created filters as follows:  
>> Filter 224# ../port 5  
>> SLB Port 5# add 2  
(Select the SLB port 5)  
(Add filter 1 to port 5)  
>> SLB Port 5# add 224  
>> SLB Port 5# filt enable  
>> SLB Port 5# ../port 6  
>> SLB Port 6# add 2  
(Add the default filter to port 5)  
(Enable filtering for port 5)  
(Select the SLB port 6)  
(Add filter 1 to port 6)  
>> SLB Port 6# add 224  
>> SLB Port 6# filt enable  
(Add the default filter to port 6)  
(Enable filtering for port 6)  
11. Enable, apply, and verify the configuration.  
>> SLB Port 6# /cfg/slb  
>> Layer 4# on  
>> Layer 4# apply  
>> Layer 4# cur  
(Select Server Load Balancing Menu)  
(Activate Layer 4 software services)  
(Make your changes active)  
(View current settings)  
NOTE SLB must be turned on in order for application redirection to work properly. The on  
command is valid only if the optional Layer 4 software is enabled on your Web switch (see  
Activating Optional Softwarein the Web OS Command Reference).  
12. Examine the resulting information from the curcommand. If any settings are incorrect,  
make appropriate changes.  
Chapter 8: Application Redirection  
209  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
13. Save your new configuration changes.  
>> Layer 4# save  
(Save for restore after reboot)  
(View SLB information)  
14. Check the SLB information.  
>> Layer 4# /info/slb  
Check that all SLB parameters are working according to expectation. If necessary, make any  
appropriate configuration changes and then check the information again.  
NOTE Changes to filters on a given port only effect new sessions. To make filter changes  
take effect immediately, clear the session binding table for the port (see the /oper/slb/  
clearcommand in the Web OS Command Reference).  
Delayed Binding for Web Cache Redirection  
To configure delayed binding on your Web switch for WCR only, use the following command:  
>> # /cfg/slb/filt <filter number>/adv/urlp ena  
For more conceptual information on delayed binding, see Delayed Bindingon page 146.  
210  
Chapter 8: Application Redirection  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
RTSP Web Cache Redirection  
Web OS 10.0 supports Web Cache Redirection (WCR) for Real Time Streaming Protocol  
(RTSP). RTSP WCR is similar to HTTP WCR in configuration and in concept. Multimedia  
presentations consume a lot of Internet bandwidth. The quality of these presentations depends  
upon the real time delivery of the data. To ensure the high quality of multimedia presentations,  
several caching servers are needed to cache the multimedia data locally. This data is then made  
available quickly from the cache memory as required.  
RTSP WCR redirects cached data transparently and balances the load among the cache servers.  
If there is no cache server, the request is directed to the origin server. Internet Service Provid-  
ers use this feature to cache the multimedia data of a customer site locally. Since the requests  
for this data are directed to the local cache, they are served faster.  
You can also configure certain URL content to be non-cacheable. The requests for non-  
cacheable URLs will bypass the cache server and be sent across the Internet to the origin  
server. The client packets are relayed to the server by using Layer 4 server load balancing.  
For a detailed information on load balancing two prominent commercial RTSP serversReal  
Player and QuickTimesee Real Time Streaming Protocol SLBon page 155.  
RTSP Web Cache Redirection Example  
To configure RTSP for web cache redirection, follow this procedure:  
1. Define RTSP WCR cache servers for RTSP WCR load balancing.  
>> # /cfg/slb/real 1  
>> Real server 1# rip 1.1.1.1  
(Enter an IP address, for example:  
1.1.1.1 for RTSP cache Server 1)  
>> # /cfg/slb/real 2  
>> Real server 2# rip 1.1.1.2  
(Enter an IP address, for example:  
1.1.1.2 for RTSP cache Server 2)  
2. Define RTSP cache server groups for RTSP WCR load balancing.  
>> # /cfg/slb/group 1  
>> Group 1# add 1  
>> Group 1# add 2  
(Add RTSP cache server 1 to group 1)  
(Add RTSP cache server 2 to group 1)  
Chapter 8: Application Redirection  
211  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
3. Configure an RTSP redirection filter to cache data and balance the load among the cache  
servers.  
>> # /cfg/slb/filt 1  
(Select the menu for filter 1)  
(Set the action for redirection)  
(Enter TCP protocol)  
(Enter service port for RTSP)  
(Enter redirection port for RTSP)  
(Select RTSP cache server group 1)  
(Select advanced menu for filter 1)  
(Disable proxy)  
>> Filter 1# action redir  
>> Filter 1# proto tcp  
>> Filter 1# dport rtsp  
>> Filter 1# rport rtsp  
>> Filter 1# group 1  
>> Filter 1# adv  
>> Filter 1# Advanced# proxy disable  
4. Configure a default allow filter to facilitate traffic.  
>> # /cfg/slb/filt 2048  
>> Filter 2048# sip any  
>> Filter 2048# dip any  
>> Filter 2048# ena  
(Select a default allow filter 2048)  
(From any source IP addresses)  
(To any destination IP addresses)  
(Enable a default allow filter)  
>> Filter 2048# action allow  
(Set the action to allow normal traffic)  
5. Turn on filtering on the port and add filters to the port to support basic WCR.  
>> # /cfg/slb/port 1  
>> SLB Port 1# add 1  
>> SLB Port 1# add 2  
>> SLB Port 1# filt ena  
(Select the menu for port 1)  
(Add RTSP filter 1 to port 1)  
(Add RTSP filter 2 to port 1)  
(Enable filtering on port 1)  
6. Apply and save the configuration.  
>> SLB Port 1# apply  
>> SLB Port 1# save  
212  
Chapter 8: Application Redirection  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
IP Proxy Addresses for NAT  
Transparent proxies provide the benefits listed below when used with application redirection.  
Application redirection is automatically enabled when a filter with the rediraction is applied  
on a port.  
n
With proxies IP addresses configured on redirected ports, the Web switch can redirect cli-  
ent requests to servers located on any subnet, anywhere.  
n
The Web switch can perform transparent substitution for all source and destination  
addresses, including destination port remapping. This provides support for comprehen-  
sive, fully-transparent proxies. These proxies are transparent to the user. No additional cli-  
ent configuration is needed.  
The following procedure can be used for configuring proxy IP addresses:  
1. Add proxy IP addresses to the redirection ports.  
Each of the ports using redirection filters require proxy IP addresses to be configured. Each  
proxy IP address must be unique on your network. These are configured as follows:  
>> SLB port 3# /cfg/slb/port 5  
>> SLB port 5# pip 200.200.200.68  
>> SLB port 5# proxy ena  
(Select network port 5)  
(Set proxy IP address for port 5)  
(Enable proxy port 5)  
>> SLB port 5# ../port 6  
(Select network port 6)  
>> SLB port 6# pip 200.200.200.69  
>> SLB port 6# proxy ena  
(Set proxy IP address for port 6)  
(Enable proxy port 6)  
2. If VMA is enabled, add proxy IP addresses for all other switch ports (except port 9).  
Virtual Matrix Architecture (VMA) is normally enabled on the Web switch. In addition to  
enhanced resource management, this feature eliminates many of the restrictions found in ear-  
lier versions of the Web OS. It does require, however, that when any switch port is configured  
with an IP proxy address, all ports must be configured with IP proxy addresses. Otherwise, if  
VMA is disabled, only the client port with filters need proxy IP addresses and this step can be  
skipped.  
Chapter 8: Application Redirection  
213  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
The following commands can be used to configure the additional unique proxy IP addresses:  
>> SLB port 6# ../port 1  
(Select network port 1)  
>> SLB port 1# pip 200.200.200.70  
>> SLB port 1# ../port 2  
(Set proxy IP address for port 1)  
(Select network port 2)  
>> SLB port 2# pip 200.200.200.71  
>> SLB port 2# ../port 3  
(Set proxy IP address for port 2)  
(Select network port 3)  
>> SLB port 3# pip 200.200.200.72  
>> SLB port 3# ../port 4  
(Set proxy IP address for port 3)  
(Select network port 4)  
>> SLB port 4# pip 200.200.200.73  
>> SLB port 4# ../port 7  
(Set proxy IP address for port 4)  
(Select network port 7)  
>> SLB port 7# pip 200.200.200.74  
>> SLB port 7# ../port 8  
(Set proxy IP address for port 7)  
(Select network port 8)  
>> SLB port 8# pip 200.200.200.75  
(Set proxy IP address for port 8)  
NOTE Port 9 does not require a proxy IP address with VMA enabled.  
See the Web OS Command Reference for more information (/cfg/slb/adv/matrix).  
3. Configure the application redirection filters.  
Once proxy IP addresses are established, configure each Application Redirection filter (Filter 2  
in our example) with the real server TCP or UDP port to which redirected traffic will be sent.  
In this case, the requests are mapped to a different destination port (8080). You must also  
enable proxies on the real servers:  
>> # /cfg/slb/filt 2  
>> Filter 2# rport 8080  
>> Filter 2# real 1/proxy enable  
>> Real server 1# ../real 2/proxy enable  
>> Real server 2# ../real 3/proxy enable  
(Select the menu for Filter 2)  
(Set proxy redirection port)  
(Enable proxy on real servers)  
(Enable proxy on real servers)  
(Enable proxy on real servers)  
NOTE This configuration is not limited to HTTP Web service. Other TCP/IP services can be  
configured in a similar fashion. For example, if this had been a DNS redirect, rportwould be  
sent to well-known port 53 (or the service port you want to remap to). For a list of other well-  
known services and ports, see the Web OS Command Reference.  
4. Apply and save your changes.  
5. Check server statistics to verify that traffic has been redirected based on filtering criteria:  
>> # /info/slb/group <group number>/filter <filter number>  
214  
Chapter 8: Application Redirection  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Excluding Noncacheable Sites  
Some Web sites provide content that is not well suited for redirection to cache servers. Such  
sites might provide browser-based games or applications that keep real-time session informa-  
tion or authenticate by client IP address.  
To prevent such sites from being redirected to cache servers, create a filter which allows this  
specific traffic to pass normally through the Web switch. This filter must have a higher prece-  
dence (a lower filter number) than the application redirection filter.  
For example, if you wished to prevent a popular Web-based game site on subnet 200.10.10.*  
from being redirected, you could add the following to the previous example configuration:  
>> # /cfg/slb/filt 1  
(Select the menu for filter 1)  
(To the sites destination IP address)  
(For entire subnet range)  
(From any source IP address)  
(For TCP traffic)  
(To an HTTP destination port)  
(From any source port)  
(Allow matching traffic to pass)  
(Enable the filter)  
>> Filter 1# dip 200.10.10.0  
>> Filter 1# dmask 255.255.255.0  
>> Filter 1# sip any  
>> Filter 1# proto tcp  
>> Filter 1# dport http  
>> Filter 1# sport any  
>> Filter 1# action allow  
>> Filter 1# ena  
>> Filter 1# ../port 5  
>> SLB port 5# add 1  
>> SLB port 5# ../port 6  
>> SLB port 6# add 1  
>> SLB port 6# apply  
>> SLB port 6# save  
(Select SLB port 5)  
(Add the filter to port 5)  
(Select SLB port 6)  
(Add the filter to port 6)  
(Apply configuration changes)  
(Save configuration changes)  
Chapter 8: Application Redirection  
215  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
216  
Chapter 8: Application Redirection  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 9  
Virtual Matrix Architecture  
Virtual Matrix Architecture (VMA) is a hybrid architecture that takes full advantage of the dis-  
tributed processing capability in Alteon Web switches. With VMA, the switch makes optimal  
use of system resources by distributing the workload to multiple processors, thereby improving  
switch performance and increasing session capacity. VMA also removes the topology con-  
straints introduced by using Direct Access Mode (DAM).  
The number of concurrent sessions per switch, with VMA enabled, is given below:  
n
n
n
AD4 and A184: 512K  
AD3 and A180E: 336K  
AD2: 256K  
For better switch performance and higher session capacities, it is recommended that you  
enable VMA, especially when using Bandwidth Management and Content Intelligent Switch-  
ing for multiple frames processing (up to 4500 bytes).  
Proxy IP Addresses and VMA  
By default, VMA is enabled on the Web switch (/cfg/slb/adv/matrix). If you are  
upgrading to Web OS from a previous release, however, VMA will be initially disabled if a  
proxy IP address is configured for any port on the switch. VMA requires that if any port is con-  
figured with a proxy IP address, then all ports (except port 9) must be configured with a unique  
proxy IP address prior to enabling VMA.  
With VMA, the concept of a per-port session table doesnt apply; instead, there is a global ses-  
sion table. To identify which processor should process responses to proxied requests, a unique  
proxy IP address must be configured on each port (except port 9). The action of the unused  
proxy IP addresses can be disabled using /cfg/slb/port x/proxydis.  
217  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Frames ingressing a port that has been configured with a proxy IP address and the proxy  
option enabled (/cfg/slb/port x/proxyena) can be processed using a proxy IP  
address by any switch port. The client source address is substituted with the proxy IP address  
of the port processing the request.  
Frames ingressing switch ports that have been configured with a proxy IP address, but do not  
have the proxyoption enabled, is processed by other ports that have been configured with a  
proxy IP address; but the client source address will not be replaced with a proxy IP address  
before it is forwarded to a server.  
>> # /cfg/slb/port 1/pip 10.10.10.10  
>> # /cfg/slb/port 1/pip 10.10.10.11/proxy ena  
>> # /cfg/slb/port 2/pip 10.10.10.11/proxy dis  
>> # /cfg/slb/port 3/pip 10.10.10.12/proxy dis  
>> # /cfg/slb/port 4/pip 10.10.10.13/proxy dis  
>> # /cfg/slb/port 5/pip 10.10.10.14/proxy dis  
and so on....  
(Proxy IP for NAT, etc.)  
(Turns on address proxying)  
(Turns off address proxying)  
NOTE VMA must be enabled if you are setting up Firewall Load Balancing (FWLB) with  
clean-side switches performing server load balancing (SLB) or URL-based SLB and Direct  
Access Mode (DAM) is enabled.  
218  
Chapter 9: Virtual Matrix Architecture  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 10  
Health Checking  
Content intelligent Web switches allow Web masters to customize server health checks to ver-  
ify content accessibility in large Web sites. As the amount of content grows and information is  
distributed across different server farms, flexible, customizable content health checks are criti-  
cal to ensure end-to-end availability.  
The following Web OS health-checking topics are described in this chapter.  
n
n
Real Server Health Checkson page 221. This section explains the switchs default  
health check, which checks the status of each service on each real server every two  
seconds.  
DSR Health Checkson page 222. This section describes the serversability to respond  
to the client queries made to the Virtual server IP address when the server is in Direct  
Server Return (DSR) mode.  
n
n
n
n
Link Health Checkson page 223. This section describes how to perform Layer 1 health  
checking on an Intrusion Detection Server (IDS).  
TCP Health Checkson page 224. TCP health checks help verify the TCP applications  
that cannot be scripted.  
ICMP Health Checkson page 224. This section explains how ICMP health checks are  
used for UDP services.  
Script-Based Health Checkson page 225. This section describes how to configure the  
switch to send a series of health-check requests to real servers or real server groups and  
monitor the responses.  
n
Application-based health checks:  
HTTP Health Checkson page 231. This section provides examples of HTTP-based  
health checks using hostnames.  
UDP-Based DNS Health Checkson page 233. This section explains the functional-  
ity of the DNS Health Checks using UDP packets.  
219  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
FTP Server Health Checkson page 234. This section describes how the File Trans-  
fer Protocol (FTP) server is used to perform health checks and explains how to con-  
figure the switch to perform FTP health checks.  
POP3 Server Health Checkson page 235. This section explains how to use Post  
Office Protocol Version 3 (POP3) mail server to perform health checks between a cli-  
ent system and a mail server and how to configure the switch for POP3 health checks.  
SMTP Server Health Checkson page 236. This section explains how to use Simple  
Mail Transfer Protocol (SMTP) mail server to perform health checks between a client  
system and a mail server and how to configure the switch for SMTP health checks.  
IMAP Server Health Checkson page 237. This section describes how the mail  
server Internet Message Access Protocol (IMAP) protocol is used to perform health  
checks between a client system and a mail server.  
NNTP Server Health Checkson page 238. This section explains how to use Net-  
work News Transfer Protocol (NNTP) server to perform health checks between a cli-  
ent system and a mail server and how to configure the switch for NNTP health checks  
RADIUS Server Health Checkson page 239. This section explains how the  
RADIUS protocol is used to authenticate dial-up users to Remote Access Servers  
(RASs).  
HTTPS/SSL Server Health Checkson page 240. This section explains how the  
switch queries the health of the SSL servers by sending an SSL client Hellopacket  
and then verifies the contents of the servers Helloresponse.  
WAP Gateway Health Checkson page 240. This section discusses how the Web  
switch provides a connectionless WSP health check for WAP gateways.  
LDAP Health Checkson page 243. This section describes how to configure the  
switch to perform Lightweight Directory Access Protocol (LDAP) health checks for  
the switch to determine whether or not the LDAP server is running.  
n
n
ARP Health Checkson page 245. This section describes how to perform health checks  
on Intrusion Detection Servers (IDS) that do not have full TCP/IP stack support.  
Failure Typeson page 246. This section explains the service failed and server failed  
states.  
220  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Real Server Health Checks  
Alteon Web switches running Server Load Balancing (SLB) monitor the servers in the real  
server group and the load-balanced application(s) running on them. If a switch detects that a  
server or application has failed, it will not direct any new connection requests to that server.  
When a service fails, an Alteon Web switch can remove the individual service from the load-  
balancing algorithm without affecting other services provided by that server.  
By default, the Web switch checks the status of each service on each real server every two sec-  
onds. Sometimes, the real server may be too busy processing connections to respond to health  
checks. If a service does not respond to four consecutive health checks, the switch, by default,  
declares the service unavailable. You can modify both the health check interval and the number  
of retries.  
>> # /cfg/slb/real <real server number>  
>> Real server# inter 4  
>> Real server# retry 6  
(Select the real server)  
(Check real server every 4 seconds)  
(If 6 consecutive health checks fail,  
declare real server down)  
NOTE Health checks are performed sequentially when used in conjunction with a virtual  
server configured with multiple services and groups. As a result, the actual health-check inter-  
val could vary significantly from the value set for it using the interparameter.  
Chapter 10: Health Checking  
221  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
DSR Health Checks  
Direct Server Return (DSR) health checks are used to verify the existence of a server-provided  
service where the server replies directly back to the client without responding through the vir-  
tual server IP address. In this configuration, the server will be configured with a real server IP  
address and virtual server IP address. The virtual server IP address is configured to be the same  
address as the users virtual server IP address. When DSR health checks are selected, the spec-  
ified health check is sent originating from one of the switchs configured IP interfaces, and is  
destined to the virtual server IP address with the MAC address that was acquired from the real  
server IP addresss Address Resolution Protocol (ARP) entry.  
Web OS 10.0 allows you to perform health checks for DSR configurations. For more informa-  
tion, see Using Direct Server Returnon page 142. The switch is able to verify that the server  
correctly responds to requests made to the virtual server IP address as required in DSR config-  
urations. To perform this function, the real server IP address is replaced with the virtual server  
IP address in the health check packets that are forwarded to the real servers for health check-  
ing. With this feature enabled, the health check will fail if the real server is not properly config-  
ured with the virtual server IP address.  
NOTE viphlthis enabled by default. This has no effect on the health check unless the real  
server is configured with DSR.  
Configuring the Switch for DSR Health Checks  
1. Select the health check menu for a real server group.  
>> # /cfg/slb/group 1  
(Select the Real Server Group 1 menu)  
2. Enable DSR VIP health checks for a real server group.  
For more information on DSR, see Using Direct Server Returnon page 142.  
>> Real server group 1# viphlth enable|disable  
3. Apply and save your configuration.  
>> DSR VIP Health Check# apply  
222  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Link Health Checks  
Link health check is performed at the Layer 1 (physical) level. The server is considered to be  
up when the link (connection) is present and the server is considered to be down when the link  
is absent. These checks are used on servers that do not respond to any other health checks.  
Intrusion Detection Servers (IDSs) fall into this category. Many IDSs have two physical  
interfaces. One is used to detect intrusions, and the other is used to generate logging. The first  
interface detects intrusions but it does not have TCP/IP stack. So it is not possible to perform  
any health check other than Layer 1 health checking on the IDS. As long as the physical link  
between the switch and the IDS is up, it indicates the IDS is alive.  
To perform this health check, a link option has been added to the real server group health com-  
mand. The real server number is used to determine which port the server is connected to. For  
example, real server 1 is assumed to be connected to port 1. The valid IDS real server numbers  
are from 1 to 9 when health check is in use.  
Configuring the Switch for Link Health Checks  
Configure the switch to verify if the IDS server is alive by performing the following tasks:  
1. Select the health check menu for real server group 1.  
>> # /cfg/slb/group 1  
2. Set the health check type to linkfor real server group 1.  
>> # Real server group 1# health  
Current health check type: tcp  
Enter health check type: link  
3. Apply and save your configuration.  
>> # Real server group 1# apply  
>> # Real server group 1# save  
Chapter 10: Health Checking  
223  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
TCP Health Checks  
TCP health checks are useful in verifying user-specific TCP applications that cannot be  
scripted.  
Session switches monitor the health of servers and applications by sending Layer 4 connection  
requests (TCP SYN packets) for each load-balanced TCP service to each server in the server  
group on a regular basis. The rate at which these connection requests are sent is a user-config-  
urable parameter. These connection requests identify both failed servers and failed services on  
a healthy server. When a connection request succeeds, the session switch quickly closes the  
connection by sending a TCP FIN (finished) packet.  
NOTE TCP health check is a default health check after you have configured the switch for a  
particular service.  
ICMP Health Checks  
Configure the switch with ICMP health check to verify if the real server is alive. The Layer 3  
echo - echo reply health check is used for UDP services or when ICMP health checks are  
configured.  
1. Select the health check menu for group 1.  
>> # /cfg/slb/group 1  
2. Set the health check type to ICMP for group 1.  
>> # Real server group 1# health icmp  
3. Apply and save your configuration.  
>> # Real server group 1# apply  
224  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Script-Based Health Checks  
The send/expectscript-based health checks dynamically verify application and content  
availability using scripts. These scripts execute a sequence of tests to verify application and  
content availability.  
Configuring the Switch for Script-Based Health Checks  
You can configure the switch to send a series of health check requests to real servers or real  
server groups and monitor the responses. ASCII-based scripts can be used to verify application  
and content availability.  
NOTE Only TCP services can be health checked, since UDP protocols are usually not ASCII  
based.  
The benefits of using script-based health checks are listed below:  
n
n
n
n
Ability to send multiple commands  
Check for any return string  
Test availability of different applications  
Test availability of multiple domains or Web sites  
Web OS supports the following capacity for a single switch:  
n
n
n
1024 bytes per script  
16 scripts per switch  
approximately 10 to 15 health check statements (HTTP getand expectstrings)  
A simple command line interface controls the addition and deletion of ASCII commands to  
each script. New commands are added and removed from the end of the script. Commands  
exist to open a connection to a specific TCP port, send an ASCII request to the server, expect  
an ASCII string, and close a connection. The string configured with an expectcommand is  
searched for in each response packet. If it is not seen anywhere in any response packet before  
the real server health check interval expires, the server does not pass the expect step and fails  
the health check. A script can contain any number of these commands, up to the allowable  
number of characters that a script supports.  
NOTE Health check scripts can only be set up via the command line interface, but once  
entered, can be assigned as the health-check method using SNMP or the Browser-Based Inter-  
face (BBI).  
Chapter 10: Health Checking  
225  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Script Format  
The general format for health-check scripts is shown below:  
open application_port (e.g., 80 for HTTP, 23 for Telnet, etc.)  
send request1  
expect response1  
send request2  
expect response2  
send request3  
expect response3  
close  
NOTE If you are doing HTTP 1.1 pipelining, you need to individually open and close each  
response in the script.  
n
n
Each script should start with the command openport<protocol port number>. The  
next line can be either a sendor expect.  
The first word is the method. This is usually get; however, HTTP supports several other  
commands, including putand head. The second word indicates the content desired, or  
request-URI, and the third word represents the version of the protocol used by the client.  
If you supplied HTTP/1.1 for the protocol version, you would also have to add in the fol-  
lowing line: Host: www.hostname.com  
Example: GET /index.html HTTP/1.1 (press Enter key)  
Host: www.hostname.com (press Enter key twice)  
This is known as a host header. It is important to include because most Web sites now  
require it for proper processing. Host headers were optional in HTTP/1.0 but are required  
when you use HTTP/1.1+.  
n
In order to tell the Web server you have finished entering header information, a blank line  
of input is needed after all headers. At this point, the URL will be processed and the  
results returned to you.  
NOTE If you make an error, enter remto remove the last typed script line entered. If you  
need to remove more than one line, enter remfor each line that needs to be removed.  
n
The switch provides the \prompt, which is one enter key stroke. When using the send  
command, note what happens when you type the sendcommand with the command  
string. When you type send, press enter and allow the switch to format the command  
string (that is, \ versus \\).  
226  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Scripting Guidelines  
n
Use generic result codes that are standard and defined by the RFC, as applicable. This  
helps ensure that if the customer changes server software, the servers wont start failing  
unexpectedly.  
n
n
Search only for the smallest and most concise piece of information possible. Each script  
cannot exceed 1K in size, so use the space wisely.  
Avoid tasks that may take a long time to perform or the health check will fail. For exam-  
ple, avoid tasks that exceed the interval for load balancing.  
Script Configuration Examples  
Script Example 1: A Basic Health Check  
Configure the switch to check a series of Web pages (HTML or dynamic CGI scripts) before it  
declares a real server is available to receive requests.  
NOTE If you are using the CLI to create a health check script, you must use quotes () to  
indicate the beginning and end of each command string.  
/cfg/slb/group x/health script1/content none  
/cfg/slb/adv/script1  
open 80  
send "GET /index.html HTTP/1.1\\r\\nHOST:www.hostname.com\\r\\n\\r\\n"  
expect "HTTP/1.1 200"  
close  
open 80  
send "GET /script.cgi HTTP/1.1\\r\\nHOST:www.hostname.com\\r\\n\\r\\n"  
expect "HTTP/1.1 200"  
close  
open 443  
close  
NOTE When you are using the command line interface to enter the sendstring as an argu-  
ment to the sendcommand, you must type two \s before an nor r.If you are instead  
prompted for the line, that is, the text string is entered after hitting <return>, then only one \”  
is needed before the nor r.”  
Chapter 10: Health Checking  
227  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Script Example 2: GSLB URL Health Check  
In earlier Web OS releases, each remote Global Server Load Balancing sites virtual server IP  
address was required to be a real server of the local switch. Each switch sends a health check  
request to the other switchs virtual servers that are configured on the local switch. The health  
check is successful if there is at least one real server on the remote switch that is up. If all real  
servers on the remote switch are down, the remote real server (a virtual server of a remote  
switch) will respond with an HTTP Redirect message to the health check.  
Using the scriptable health check feature, you can set up health check statements to check all  
the substrings involved in all the real servers.  
Site 1 with Virtual Server 1 and the following real servers:  
n
n
n
n
Real Server 1 and Real Server 2: images”  
Real Server 3 and Real Server 4: html”  
Real Server 5 and Real Server 6: cgiand bin”  
Real Server 7 (which is Virtual Server 2): any”  
Site 2 with Virtual Server 2 and the following real servers:  
n
n
n
n
Real Server 1 and Real Server 2: images”  
Real Server 3 and Real Server 4: html”  
Real Server 5 and Real Server 6: cgiand bin”  
Real Server 7 (which is Virtual Server 2): any”  
A sample script is shown below:  
/cfg/slb/group x/health script2/content none  
/cfg/slb/adv/script2  
open 80  
send "GET /images/default.asp HTTP/1.1\\r\\nHOST: 192.192.1.2\\r\\n\\r\\n"  
expect "HTTP/1.1 200"  
close  
open 80  
send "GET /install/default.html HTTP/1.1\\r\\nHOST: 192.192.1.2\\r\\n\\r\\n"  
expect "HTTP/1.1 200"  
close  
open 80  
send "GET /script.cgi HTTP/1.1\\r\\nHOST: www.myurl.com \\r\\n\\r\\n"  
expect "HTTP/1.1 200"  
close  
228  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Script-based health checking is intelligent in that it will only send the appropriate requests to  
the relevant servers. In the example above, the first GET statement will only be sent to Real  
Server 1 and Real Server 2. Going through the health-check statements serially will ensure that  
all content is available by at least one real server on the remote site.  
Configure the remote real server IP address (the virtual server IP address of the remote site) to  
accept anyURL requests. The purpose of the first GET is to check if Real Server 1 or Real  
Server 2 is upthat is, to check if the remote site has at least one server for imagescontent.  
Either Real Server 1 or Real Server 2 will respond to the first GET health check.  
If all the real server IP addresses are down, Real Server 7 (the virtual server IP address of the  
remote site) will respond with an HTTP Redirect (respond code 302) to the health check. Thus,  
the health check will fail as the expected response code is 200, ensuring that the HTTP Redi-  
rect messages will not cause a loop.  
Verifying Script-Based Health Checks  
If a script fails, the expect line in the script that is not succeeding is displayed under the /  
info/slb/real<real server number> command:  
>> # /info/slb/real 1  
1: 205.178.13.225, 00:00:00:00:00:00, vlan 1, port 0, health 4, FAILED  
real ports:  
script 2, DOWN, current  
send GET / HTTP/1.0\r\n\r\n  
expect HTTP/1.0 200  
The server is not responding to the getwith the expect string.  
When the script succeeds in determining the health of a real server, the following information  
is displayed:  
>> # /info/slb/real 1  
1: 205.178.13.223, 00:00:5e:00:01:24, vlan 1, port 2, health 4, up  
real ports:  
script 2, up, current  
Chapter 10: Health Checking  
229  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
n
n
n
n
n
n
n
n
n
n
IMAP Server Health Checkson page 237  
NNTP Server Health Checkson page 238  
WAP Gateway Health Checkson page 240  
WSP Content Health Checkson page 241  
WTLS Health Checkson page 242  
n
LDAP Health Checkson page 243  
230  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
HTTP Health Checks  
HTTP-based health checks can include the hostname for HOST:headers. The HOST:header  
and health check URL are constructed from the following components:  
Item  
Option  
hname  
dname  
Configured Under  
Max. Length  
9 characters  
Virtual server hostname  
Domain name  
/cfg/slb/virt/service  
/cfg/slb/virt  
35 characters  
34 characters  
Server group health check field  
content /cfg/slb/group  
If the HOST:header is required, an HTTP/1.1GETwill occur. Otherwise, an HTTP/1.0  
GETwill occur. HTTP health check is successful if you get a return code of 200.  
Example 1:  
hname  
dname  
= everest  
= alteonwebsystems.com  
content= index.html  
Health check is performed using:  
GET /index.html HTTP/1.1  
Host: everest.alteonwebsystems.com  
NOTE If the content is not specified, the health check will revert back to TCP on the port that is being  
load balanced.  
Example 2:  
hname  
dname  
= (none)  
= raleighduram.cityguru.com  
content= /page/gen/?_template=alteon  
Health check is performed using:  
GET /page/gen/?_template=alteon HTTP/1.1  
Host: raleighduram.cityguru.com  
Example 3:  
hname  
dname  
= (none)  
= jansus  
content= index.html  
Chapter 10: Health Checking  
231  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Health check is performed using:  
GET /index.html HTTP/1.1  
Host: jansus  
Example 4:  
hname  
dname  
= (none)  
= (none)  
content= index.html  
Health check is performed using:  
GET /index.html HTTP/1.0(since no HTTPHOST:header is required)  
Example 5:  
hname  
dname  
= (none)  
= (none)  
content= //everest/index.html  
Health check is performed using:  
GET /index.html HTTP/1.1  
Host: everest  
Configuring the Switch for HTTP Health Checks  
Perform the following on the switch to configure the switch for HTTP health checks:  
1. Select the real server group.  
>> # /cfg/slb/group 1  
(Select a real server group)  
2. Set the health check type to FTP for the real server group.  
>> # /cfg/slb/group 1/health http  
3. Configure the health check content.  
>> # /cfg/slb/group 1/content <filename>  
4. Apply and save your configuration.  
>> # Real server group 1# apply  
>> # Real server group 1# save  
232  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
UDP-Based DNS Health Checks  
Web OS 10.0 supports UDP-based health checks along with TCP health checks, and performs  
load-balancing based on TCP and UDP protocols.  
DNS servers can be based on both TCP and UDP protocols. With UDP-based DNS health  
checks enabled, you can send TCP-based queries to one real server group and UDP-based que-  
ries to another real server group.  
The health check may be performed by sending a UDP-based query (for example, for  
www.nortelnetworks.com), and watching for the servers reply. The domain name to be que-  
ried may be modified by specifying the content command if you need to change the  
domain name.  
Configuring the Switch for UDP-based Health Checks  
Configure the switch to verify if the DNS server is alive.  
1. Select the real server group.  
>> # /cfg/slb/group 1  
2. Set the health check type to UDP for the real server group.  
>> # Real server group 1# health udpdns  
3. Set the content to domain name.  
>> # Real server group 1# content <filename>|//<host><filename>|none  
4. Apply and save your configuration.  
>> # Real server group 1# apply  
>> # Real server group 1# save  
NOTE If no host name is configured, the health check is performed by sending a UDP-based  
query from a dummy host and watching for the servers reply. The reply, even though negative  
(for example, Server not foundsince the query is from a dummy host), serves the purpose of  
a health check, nonetheless.  
Chapter 10: Health Checking  
233  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
FTP Server Health Checks  
The Internet File Transfer Protocol (FTP) provides facilities for transferring files to and from  
remote computer systems. Usually the user transferring a file needs authority to login and  
access files on the remote system. This protocol is documented in RFC 1123.  
In normal Internet operation, the FTP server listens on the well-known port number 21 for con-  
trol connection requests. The client sends a control message which indicates the port number  
on which the client is prepared to accept an incoming data connection request.  
When a transfer is being set up, it is always initiated by the client. However, either the client or  
the server may be the sender of data. Along with transferring user requested files, the data  
transfer mechanism is also used for transferring directory listings from server to client.  
NOTE To configure the switch for FTP health checks, the FTP server must accept anony-  
mous user.  
Configuring the Switch for FTP Health Checks  
Create any file name from an FTP server under FTP server directory, for example, .txt, .exe,  
.bin and so forth.  
To configure the switch for FTP health checks:  
1. Select the real server group.  
>> # /cfg/slb/group 1  
(Select a real server group)  
2. Set the health check type to FTP for the real server group.  
>> # /cfg/slb/group 1/health ftp  
3. Configure the health check content.  
>> # /cfg/slb/group 1/content <filename>  
4. Apply and save your configuration.  
>> # Real server group 1# apply  
>> # Real server group 1# save  
234  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
POP3 Server Health Checks  
The Post Office Protocol - Version 3 (POP3) is intended to permit a workstation to dynami-  
cally access a maildrop on a server host. The POP3 protocol is used to allow a workstation to  
retrieve mail that the server is holding for it. This protocol is documented in RFC 1939.  
When the user on a client host wants to enter a message into the transport system, it establishes  
an SMTP connection to its relay host and sends all mail to it.  
Initially, the server host starts the POP3 service by listening on TCP port 110. When a client  
host wants to make use of the service, it establishes a TCP connection with the server host.  
Configuring the Switch for POP3 Health Checks  
To support health checking on the UNIX POP3 server, the network administrator must config-  
ure a username:password value in the switch, using the contentoption on the SLB real  
server groupmenu (/cfg/slb/group)  
To configure the switch for POP3 health checks:  
1. Select the real server group.  
>> # /cfg/slb/group 1  
(Select a real server group)  
2. Set the health check type to POP3 for the real server group..  
>> # /cfg/slb/group 1/health pop3  
3. Configure the health check content.  
>> # /cfg/slb/group 1/content <username>:<password>  
4. Apply and save your configuration.  
>> # Real server group 1# apply  
>> # Real server group 1# save  
Chapter 10: Health Checking  
235  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
SMTP Server Health Checks  
Simple Mail Transfer Protocol is a protocol to transfer e-mail messages between servers reli-  
ably and efficiently. This protocol traditionally operates over TCP, port 25 and is documented  
in RFC 821. Most e-mail systems that send mail over the Internet use SMTP to send messages  
from one server to another; the messages can then be retrieved with an e-mail client using  
either POP or IMAP.  
Configuring the Switch for SMTP Health Checks  
To support SMTP health checking, the network administrator must configure a username:pass-  
word value in the switch, using the contentoption on the SLB real server groupmenu (/  
cfg/slb/group)  
To configure the switch for SMTP health checks:  
1. Select the health check menu for the real server group.  
>> # /cfg/slb/group 1  
(Select a real server group)  
2. Set the health check type to SMTP for the real server group..  
>> # /cfg/slb/group 1/health smtp  
3. Configure the health check content.  
>> # /cfg/slb/group 1/content <username>  
4. Apply and save your configuration.  
>> # Real server group 1# apply  
>> # Real server group 1# save  
236  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
IMAP Server Health Checks  
Internet Message Access Protocol (IMAP) is a mail server protocol used between a client sys-  
tem and a mail server that allows a user to retrieve and manipulate mail messages. IMAP is not  
used for mail transfers between mail servers. IMAP servers listen to TCP port 143.  
Configuring the Switch for IMAP Health Check  
To support IMAP health checking, the network administrator must configure a username:pass-  
word value in the switch, using the contentoption on the SLB Real Server Group Menu (/  
cfg/slb/group)  
To configure the switch for IMAP health checks:  
1. Select the health check menu for the real server group.  
>> # /cfg/slb/group 1  
(Select a real server group)  
2. Set the health check type to IMAP for the real server group..  
>> # /cfg/slb/group 1/health imap  
3. Configure the health check content.  
>> # /cfg/slb/group 1/content <username>:<password>  
The contentoption specifies the username:password value that the server tries to match in  
its user database. In addition to verifying the user name and password, the database may spec-  
ify the client(s) or port(s) the user is allowed to access.  
4. Apply and save your configuration.  
>> # Real server group 1# apply  
>> # Real server group 1# save  
Chapter 10: Health Checking  
237  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
NNTP Server Health Checks  
Net News Transfer Protocol (NNTP) is a TCP/IP protocol based upon text strings sent bidirec-  
tionally over 7 bit ASCII TCP channels, and listens to port 119. It is used to transfer articles  
between servers as well as to read and post articles. NNTP specifies a protocol for the distribu-  
tion, inquiry, retrieval, and posting of news articles using a reliable stream-based transmission  
of news among the ARPA-Internet community. NNTP is designed so that news articles are  
stored in a central database allowing a subscriber to select only those items he wishes to read.  
NNTP is documented in RFC977. Articles are transmitted in the form specified by RFC1036.  
Configuring the Switch for NNTP Health Checks  
To configure the switch for NNTP health checks:  
1. Select the real server group.  
>> # /cfg/slb/group 1  
(Select a real server group)  
2. Set the health check type to NNTP for the real server group.  
>> # /cfg/slb/group 1/health nntp  
3. Configure the health check content.  
>> # /cfg/slb/group 1/content <nntp newsgroup name>  
Create nntp directory from MS Windows Option Pack4.  
4. Apply and save your configuration.  
>> # Real server group 1# apply  
>> # Real server group 1# save  
238  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
RADIUS Server Health Checks  
The Remote Authentication Dial-In User Service (RADIUS) protocol is used to authenticate  
dial-up users to Remote Access Servers (RASs) and the client application they will use during  
the dial-up connection.  
n
RADIUS Content Health Check Enhancements  
Include the switch IP as the Network-attached storage (NAS) IP parameter in the  
RADIUS content health check  
RADIUS health check using the configured real server port (rport)  
Variable-length RADIUS secret password. Supports less than 16 octets and up to 32  
octets  
n
n
The secretvalue is a field of up to 32 alphanumeric characters used by the switch to  
encrypt a password during the RSA Message Digest Algorithm (MD5) and by the  
RADIUS server to decrypt the password during verification.  
The contentoption specifies the username:password value that the server tries to  
match in its user database. In addition to verifying the user name and password, the data-  
base may specify the client(s) or port(s) the user is allowed to access.  
NOTE Network-attached storage (NAS) is hard disk storage that is set up with its own net-  
work address rather than being attached to the department computer that is serving applications  
to a networks workstation users. By removing storage access and its management from the  
department server, both application programming and files can be served faster because they  
are not competing for the same processor resources. The network-attached storage device is  
attached to a local area network (typically, an Ethernet network) and assigned an IP address.  
File requests are mapped by the main server to the NAS file server.  
Configuring the Switch for RADIUS Server Content Health Checks  
The Alteon Web switch will provide the NAS IP parameter while performing RADIUS content  
health checks. The switch uses the IP address of the IP interface that is on the same subnet as  
the RADIUS server or the default gateway as the NAS IP.  
The RADIUS health check is performed using the configured real server port (rport). To  
configure RADIUS health checks, use the /cfg/slb/virt<#>/servicemenu.  
Chapter 10: Health Checking  
239  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Configuring the Switch for RADIUS Secret and Password  
RADIUS is stateless and uses UDP as its transport protocol. To support RADIUS health  
checking, the network administrator must configure two parameters on the switch:  
n
n
the /cfg/slb/secretvalue  
the contentparameter with a username:password value.  
>> # /cfg/slb/group <real server group number>  
>> # health radius  
>> # content <username>:<password>  
(Select the real server group)  
(Specify the type of health checking)  
(Specify the RADIUS username:pass-  
word value)  
>> # /cfg/slb/adv/secret <RADIUS-coded value> (Enter up to 32 alphanumeric charac-  
ters used to encrypt and decrypt pass-  
word)  
HTTPS/SSL Server Health Checks  
The sslhhealth check option on the Real Server Group Menu (/cfg/slb/group<#>)  
allows the switch to query the health of the SSL servers by sending an SSL client Hello”  
packet and then verify the contents of the servers Helloresponse. SSL health check is per-  
formed using the real server port configured, that is, the rport.  
The SSL enhanced health check behavior is summarized below:  
n
n
n
The switch sends a SSL Hellopacket to the SSL server.  
If it is up and running, the SSL server responds with the Server Hellomessage.  
The switch verifies fields in the response and marks the service Upif the fields are OK.  
During the handshake, the user and server exchange security certificates, negotiate an encryp-  
tion and compression method, and establish a session ID for each session.  
WAP Gateway Health Checks  
Wireless Application protocol (WAP) carries Internet traffic to mobile devices and allows Web  
services to be delivered to mobile phones and handsets. The translation from HTTP/HTML to  
WAP/WML (Wireless Markup Language) is implemented by servers known as WAP gateways  
on the land-based part of the network. WAP devices can communicate in two ways:  
n
n
Wireless Session Protocol (WSP) content health checks, the unencrypted mode of sending  
WML traffic (similar to HTTPS).  
Wireless Transport Layer Security (WTLS) health checks, an encrypted mode of sending  
WML traffic (similar to HTTP).  
240  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
WSP Content Health Checks  
Wireless Session Protocol content health checks can be configured in two modes: connection-  
less and connection-oriented. Connectionless WSP runs on UDP/IP protocol, port 9200.  
Therefore, Alteon Web switches can be used to load balance the gateways in this mode of oper-  
ation.  
Web OS 10.0 provides a content-based health check mechanism where customized WSP pack-  
ets can be sent to the gateways, and the switch can verify the expected response, in a manner  
similar to scriptable health checks.  
The content of the WSP/UDP packet that is sent to the gateway can be configured as a hexa-  
decimal string, which is encapsulated in a UDP packet and shipped to the server. Hence, this  
byte string should include all applicable WSP headers.  
The content that the switch expects to receive from the gateway is also specified in the form of  
hexadecimal byte string. The switch matches each byte of this string with the received content.  
If there is a mismatch of even a single byte on the received content, the gateway fails the health  
check. The user can also configure an offset for the received WSP packet: a byte index to the  
WSP response content from where the byte match can be performed.  
Configuring the Switch for WSP Content Health Checks  
1. Select the WAP Health Check Menu.  
>> # /cfg/slb/adv/waphc  
2. Use the sndcntcommand to enter the content to be sent to the WSP gateway.  
>> WAP Health Check# sndcnt  
Current Send content:  
Enter new Send content: 01 42 15 68 74 74 70 3a 2f 77 77 77 2e 6e 6f  
6b 61 6d 00 .  
3. Enter the content that the switch expects to receive from the WSP gateway.  
>> WAP Health Check# rcvcnt  
Current Receive content:  
Enter new Receive content: 01 04 60 0e 03 94  
NOTE A maximum of 255 bytes of input are allowed on the switch command line. You may  
remove spaces in between the numbers to save space on the command line. For example, type  
010203040506instead of 010203040506.  
Chapter 10: Health Checking  
241  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
4. Enter the WSP port.  
>> WAP Health Check# wspport 9200  
5. Set the offset value.  
>> WAP Health Check# offset 0  
6. Because WAP gateways are UDP-based and operate on a UDP port, configure UDP ser-  
vice in the virtual server menu.  
>> # /cfg/slb/virt 1  
>> Virtual Server 1# service  
Enter virtual port: 9200  
(Configure virtual service 1)  
(On the default WSP port)  
>> Virtual Server 1 9200 Service# group 1 (Set the real server group number)  
>> Virtual Server 1 9200 Service# udp ena (Enable UDP load balancing)  
>> Virtual Server 1 9200 Service# apply  
(Apply the configuration)  
7. Enable WSP health checks for group 1.  
>> # /cfg/slb/group 1  
>> Real server group 1# health wsp  
(Select the Real Server Group 1 menu)  
(Set the health check type)  
8. Apply and save the configuration.  
>> Real server group 1# apply  
WTLS Health Checks  
Wireless Transport Layer Security (WTLS) can be configured to use ports 9202 and 9203 in  
connectionless and connection oriented modes respectively.  
The WTLS health check feature provides a WTLS Hello based health check for connection-  
oriented WTLS traffic on port 9203. The web switch sends a new WTLS Client Hello to the  
WAP gateway, and checks to see if it receives a valid WTLS Server Hello back from the WAP  
Gateway.  
242  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Configuring the Switch for WTLS Health Checks  
1. Select the group with the WAP gateway.  
>> Main# /cfg/slb/group 1  
(Select the Real Server Group 1 menu)  
2. Use the sndcntcommand to enter the content to be sent to the WSP gateway.  
>> Real server group 1# health wtls  
3. Select a port number other than 9203, if you want to change the port number on which  
your gateway is listening to WTLS traffic.  
>> Main# /cfg/slb/adv/wap  
>> WAP Health Check Menu # wtlsprt 10203  
4. Apply and save your configuration.  
>> WSP Health Check# apply  
LDAP Health Checks  
Lightweight Directory Access Protocol (LDAP) health checks enable the switch to determine  
whether the LDAP server is alive or not. LDAP versions 2 and 3 are described in RFC 1777  
and RFC 2251.  
The LDAP health check process consists of three LDAP messages over one TCP connection:  
n
Bind request: The switch first creates a TCP connection to the LDAP server on port 339,  
which is the default port. After the connection is established, the switch initiates an LDAP  
protocol session by sending an anonymous bind request to the server.  
n
Bind response: On receiving the bind request, the server sends a bind response to the  
switch. If the result code indicates that the server is alive, the switch marks the server as  
up. Otherwise, the switch marks the server as down even if the switch did this because the  
server did not respond within the timeout window.  
n
Unbind request: If the server is alive, the switch sends a request to unbind the server.  
This request does not require a response. It is necessary to send an unbind request as the  
LDAP server may crash if too many protocol sessions are active.  
If the server is up, the switch closes the TCP connection after sending the unbind request. If the  
server is down, the connection is torn down after the bind response, if one arrives. The connec-  
tion will also be torn down if it crosses the timeout limit, irrespective of the servers condition.  
Chapter 10: Health Checking  
243  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Configuring the Switch for LDAP Health Checks  
Configure the switch to verify if the LDAP server is alive.  
1. Select the health check menu for the real server group.  
>> # /cfg/slb/group 1  
2. Set the health check type to LDAP for the real server group.  
>> # Real server group 1# health ldap  
3. Apply and save your configuration.  
>> # Real server group 1# apply  
>> # Real server group 1# save  
Determining the Version of LDAP  
1. Select the Advanced Menu.  
>> # Real server group 1# /cfg/slb/adv  
2. Set the version of LDAP. The default version is 2.  
>> # # Real server group 1# ldap <2 | 3> (Select the desired LDAP version)  
3. Apply and save your configuration.  
>> LDAP Health Check# apply  
>> LDAP Health Check# save  
244  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
ARP Health Checks  
Address Resolution Protocol (ARP) is the TCP/IP protocol that resides within the Internet  
layer. ARP resolves a physical address from an IP address. ARP queries machines on the local  
network for their physical addresses. ARP also maintains IP to physical address pairs in its  
cache memory. In any IP communication, the ARP cache is consulted to see if the IP address of  
the computer or the router is present in the ARP cache. Then the corresponding physical  
address is used to send a packet.  
In the switch, this features allows the user to health check the Intrusion Detection Server (IDS)  
by sending an ARP query. The health check consists of the following sequence of actions:  
1. Accessing the ARP table.  
2. Looking for the session entry in the ARP table. If the entry exists in the table, that means  
the real server is up, otherwise the health check has failed.  
3. If the entry is present, then check the timestamp to find out if the last used time is greater  
than the ARP health check interval. If it is, then delete the query, as this means that the  
health check has failed.  
4. Send another ARP request and repeat the above process until the timestamp shows the  
last used time smaller than the ARP health check interval.  
Configuring the Switch for ARP Health Checks  
1. Select the SLB group from the health check menu.  
>> /cfg/slb/group 1  
2. Select the type of health check to use.  
>> Real server group 1# health arp  
3. Enable ARP health checks for group 1.  
>> Real server group 1# arp enable  
4. Apply and save your configuration.  
>> Real server group 1# apply  
Chapter 10: Health Checking  
245  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Failure Types  
Service Failure  
If a certain number of connection requests for a particular service fail, the session switch  
places the service into the service failed state. While in this state, no new connection requests  
are sent to the server for this service; however, if graceful real server failure is enabled  
(/cfg/slb/adv/graceena), state information about existing sessions is maintained and  
traffic associated with existing sessions continues to be sent to the server. Connection requests  
to, and traffic associated with, other load-balanced services continue to be processed by the  
server.  
Example: A real server is configured to support HTTP and FTP within two real server groups.  
If a session switch detects an HTTP service failure on the real server, it removes that real  
server group from the load-balancing algorithm for HTTP but keeps the real server in the mix  
for FTP. Removing only the failed service from load balancing allows users access to all  
healthy servers supporting a given service.  
When a service on a server is in the service failed state, the session switch sends Layer 4  
connection requests for the failed service to the server. When the session switch has  
successfully established a connection to the failed service, the service is restored to the load-  
balancing algorithm.  
Server Failure  
If all load-balanced services supported on a server fail to respond to switch connection requests  
within the specified number of attempts, then the server is placed in the server failed state.  
While in this state, no new connection requests are sent to the server; however, if graceful real  
server failure is enabled (/cfg/slb/adv/graceena), state information about existing  
sessions is maintained and traffic associated with existing sessions continues to be sent to the  
server.  
NOTE All load-balanced services on a server must fail before the switch places the server in  
the server failed state.  
The server is brought back into service as soon as the first service is proven to be healthy.  
Additional services are brought online as they are subsequently proven to be healthy.  
246  
Chapter 10: Health Checking  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
CHAPTER 11  
High Availability  
Alteon Web switches support high-availability network topologies through an enhanced imple-  
mentation of the Virtual Router Redundancy Protocol (VRRP).  
The following topics are discussed in this chapter:  
n
n
n
n
VRRP Overviewon page 248. This section discusses VRRP operation and Web OS  
redundancy configurations.  
Failover Methodson page 253. This section describes the three modes of high availabil-  
ity.  
Web OS Extensions to VRRPon page 259. This section describes VRRP enhancements  
implemented in Web OS.  
Active-Active VIR and VSR Configurationon page 265  
VRRP-Based Hot-Standby Configurationon page 275  
n
n
Virtual Router Deployment Considerationson page 277. This section describes issues to  
consider when deploying virtual routers.  
Stateful Failover of Layer 4 and Layer 7 Persistent Sessionson page 283. This section  
describes how to enable stateful failover by mirroring Layer 7 and Layer 4 persistent  
transactional states on the peer switch.  
247  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
VRRP Overview  
In a high-availability network topology, no device can create a single point-of-failure for the  
network or force a single point-of-failure to any other part of the network. This means that  
your network will remain in service despite the failure of any single device. To achieve this  
usually requires redundancy for all vital network components.  
VRRP enables redundant router configurations within a LAN, providing alternate router paths  
for a host to eliminate single points-of-failure within a network. Each participating VRRP-  
capable routing device is configured with the same virtual router IP address and ID number.  
One of the virtual routers is elected as the master, based on a number of priority criteria, and  
assumes control of the shared virtual router IP address. If the master fails, one of the backup  
virtual routers will take control of the virtual router IP address and actively process traffic  
addressed to it.  
Because the router associated with a given alternate path supported by VRRP uses the same IP  
address and MAC address as the routers for other paths, the hosts gateway information does  
not change, no matter what path is used. A VRRP-based redundancy schema reduces adminis-  
trative overhead because hosts need not be configured with multiple default gateways.  
VRRP Components  
Each physical router running VRRP is known as a VRRP router.  
Virtual Interface Router  
Two or more VRRP routers can be configured to form a virtual interface router (VIR). (RFC  
2338 calls this entity a virtual router.) The term virtual interface router will be used to distin-  
guish this type of entity from a virtual server router (VSR), as described in Web OS Exten-  
sions to VRRPon page 259. When the term virtual router is used herein, the concept applies  
to both virtual interface routers and virtual server routers. Each VRRP router may participate  
in one or more virtual interface routers.  
A virtual interface router acts as a default or next hop gateway for hosts on a LAN. Each vir-  
tual interface router consists of a user-configured virtual router identifier (VRID) and an IP  
address.  
248  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Virtual Router MAC Address  
The VRID is used to build the virtual router MAC Address. The five highest-order octets of the  
virtual router MAC Address are the standard MAC prefix (00-00-5E-00-01) defined in RFC  
2338. The VRID is used to form the lowest-order octet.  
Owners and Renters  
Only one of the VRRP routers in a virtual interface router may be configured as the IP address  
owner. This router has the virtual interface routers IP address as its real interface address. This  
router responds to packets addressed to the virtual interface routers IP address for ICMP  
pings, TCP connections, and so on.  
There is no requirement for any VRRP router to be the IP address owner. Most VRRP installa-  
routers that are not the IP address owner are called renters.  
Master and Backup Virtual Router  
Within each virtual router, one VRRP router is selected to be the virtual router master. See  
Selecting the Master VRRP Routeron page 251 for an explanation of the selection process.  
NOTE If the IP address owner is available, it will always become the virtual router master.  
The virtual router master forwards packets sent to the virtual interface router. It also responds to  
Address Resolution Protocol (ARP) requests sent to the virtual interface routers IP address.  
Finally, the virtual router master sends out periodic advertisements to let other VRRP routers  
know it is alive and its priority.  
Within a virtual router, the VRRP routers not selected to be the master are known as virtual  
router backups. Should the virtual router master fail, one of the virtual router backups becomes  
the master and assumes its responsibilities.  
Chapter 11: High Availability  
249  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
The Alteon Web switches in Figure 11-1 have been configured as VRRP routers. Together,  
they form a virtual interface router (VIR).  
VRRP Router  
VRID = 1  
Router #1 = Master Active  
VR IP address = 205.178.13.226  
MAC address = 00.00.SE.00.01.01  
Priority = 255  
IP interface = 205.178.13.226  
Router  
Web Switch 1  
Virtual  
Interface  
Router  
Internet  
Host #1  
Default Gateway  
205.178.13.226  
Web Switch 2  
Router  
VRRP Router  
VRID = 1  
Router #2 = Backup Standby  
MAC address = 00.00.SE.00.01.01  
Priority = 100  
IP interface = 205.178.13.225  
Figure 11-1 Example 1: VRRP Router  
Web switch 1 in Figure 11-1 has its real interface configured with the IP address of the virtual  
interface router and is, therefore, the IP address owner. It also becomes the virtual router mas-  
ter. Web switch 2 is a virtual router backup. Its real interface is configured with an IP address  
that is on the same subnet as the virtual interface router but is not the IP address of the virtual  
interface router.  
The virtual interface router has been assigned a VRID = 1. Therefore, both of the VRRP rout-  
ers have a MAC address = 00-00-5E-00-01-01.  
250  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
VRRP Operation  
The host shown in Figure 11-1 is configured with the virtual interface routers IP address as its  
default gateway. The master forwards packets destined to remote subnets and responds to ARP  
requests. In this example, the master is also the virtual interface routers IP address owner—  
therefore it also responds to ICMP ping requests and IP datagrams destined for the virtual  
interface router's IP address. The backup does not forward any traffic on behalf of the virtual  
interface router nor does it respond to ARP requests.  
If the owner is not available, the backup becomes the master and takes over responsibility for  
packet forwarding and responding to ARP requests. However, because this switch is not the  
owner, it does not have a real interface configured with the virtual interface router's IP address.  
Selecting the Master VRRP Router  
Each VRRP router that is not an owner is configured with a priority between 1254. According  
to the VRRP standard, an owner has a priority of 255. A bidding process determines which  
VRRP router is or becomes the masterthe VRRP router with the highest priority. Owners  
have a higher priority than the range permitted for non-owners. If there is an IP address owner,  
it is always the master for the virtual interface router, as long as it is available.  
The master periodically sends advertisements to an IP multicast address. As long as the back-  
ups receive these advertisements, they remain in the backup state. If a backup does not receive  
an advertisement for three advertisement intervals, it initiates a bidding process to determine  
which VRRP router has the highest priority and takes over as master.  
If, at any time, a backup determines that it has higher priority than the current master does, it  
can preempt the master and become the master itself, unless configured not to do so. In pre-  
emption, the backup assumes the role of master and begins to send its own advertisements. The  
current master sees that the backup has higher priority and will stop functioning as the master.  
A backup router can stop receiving advertisements for one of two reasonsthe master can be  
down, or all communications links between the master and the backup can be down. If the  
master has failed, it is clearly desirable for the backup (or one of the backups, if there is more  
than one) to become the master.  
NOTE If the master is healthy but communication between the master and the backup has  
failed, there will then be two masters within the virtual router. To prevent this from happening,  
configure redundant links to be used between the switches that form a virtual router.  
Chapter 11: High Availability  
251  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Active-Standby Failover  
The previous text described the use of a group of VRRP routers to form a single virtual inter-  
face router. It implements a traditional hot-standby configuration in which the backup router  
only functions when the active router has failed. VRRP can also be used to implement active-  
standby configurations. In an active-standby configuration, both switches support active traf-  
fic, but are configured so that they do not simultaneously support the same service.  
In the example shown in Figure 11-2, Web switch 1 is the master for the virtual interface router  
with VRID = 1, and its backup for the virtual interface router with VRID = 2. Web switch 2 is  
master for the virtual interface router with VRID = 2 and backup for the virtual interface router  
with VRID = 1. In this manner, both routers can actively forward traffic at the same time but  
not for the same interface.  
VRID = 1  
Router #1 = Master Active  
VRID = 2  
Host #1  
Default Gateway  
205.178.13.226  
Router #1 = Backup Standby  
Router  
Web Switch 1  
Internet  
Web Switch 2  
Host #2  
Default Gateway  
205.178.13.240  
Router  
VRID = 1  
Router #2 = Backup Standby  
VRID = 2  
Router #2 = Master Active  
Figure 11-2 Example 2: VRRP Router  
Table 11-1 Active Standby Configuration  
VRID = 1  
VRID = 2  
Web Switch 1  
Web Switch 2  
Router #1 = Master Active  
VR IP address = 205.178.13.226  
MAC address = 00.00.SE.00.01.01  
Priority = 255  
Router #1 = Backup Standby  
VR IP address = 205.178.13.240  
MAC address = 00.00.SE.00.01.02  
Priority = 100  
IP interface = 205.178.13.226  
IP interface = 205.178.13.239  
Router #2 = Backup Standby  
VR IP address = 205.178.13.226  
MAC address = 00.00.SE.00.01.01  
Priority = 100  
Router #1 = Master Active  
VR IP address = 205.178.13.240  
MAC address = 00.00.SE.00.01.02  
Priority = 255  
IP interface = 205.178.13.225  
IP interface = 205.178.13.240  
252  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Failover Methods  
With service availability becoming a major concern on the Internet, service providers are  
increasingly deploying Internet traffic control devices, such as Web switches, in redundant  
configurations. Traditionally, these configurations have been hot-standby configurations,  
where one switch is active and the other is in a standby mode. A non-VRRP hot-standby con-  
figuration is shown in the figure below:  
Intranet Clients  
Primary Web Switch  
IP: 200.200.200.100  
Active Links Intranet Servers  
A
B
Inter-switch  
Link  
Client Switches  
Secondary Web Switch  
IP: 200.200.200.101  
Backup Links  
NFS Server  
Figure 11-3 A Non-VRRP, Hot-Standby Configuration  
While hot-standby configurations increase site availability by removing single points-of-fail-  
ure, service providers increasingly view them as an inefficient use of network resources  
because one functional Web switch sits by idly until a failure calls it into action. Service pro-  
viders now demand that vendorsequipment support redundant configurations where all  
devices can process traffic when they are healthy, increasing site throughput and decreasing  
user response times when no device has failed.  
Web OS high availability configurations are based on VRRP. The Web OS implementation of  
VRRP includes proprietary extensions to accommodate Layer 4 though Layer 7 Web switching  
features.  
The Web OS implementation of VRRP supports three modes of high availability:  
n
n
n
Active-Standby  
Active-Active  
Hot-Standby  
The first mode, active-standby, is based on standard VRRP, as defined in RFC 2338. The sec-  
ond and third modes, active-active and hot-standby, are based on proprietary Web OS exten-  
sions to VRRP. Each mode is described in detail in the following sections.  
Chapter 11: High Availability  
253  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Active-Standby Redundancy  
In an active-standby configuration, shown in Figure 11-4, two Web switches are used. Both  
switches support active traffic but are configured so that they do not simultaneously support  
the same service. Each switch is active for its own set of services, such as IP routing interfaces  
or load-balancing virtual server IP addresses, and acts as a standby for other services on the  
other switch. If either switch fails, the remaining switch takes over processing for all services.  
The backup switch may forward Layer 2 and Layer 3 traffic, as appropriate.  
NOTE In an active-standby configuration, the same service cannot be active simultaneously  
on both switches.  
Standby VIP 1  
VIP: 205.178.13.226  
Active VIP 2  
VIP: 205.178.13.240  
Standby VIP 3  
VIP: 205.178.13.110  
Router  
Active  
Internet  
Active  
Router  
Active VIP 1  
VIP: 205.178.13.226  
Standby VIP 2  
VIP: 205.178.13.240  
Active VIP 3  
VIP: 205.178.13.110  
Figure 11-4 Active-Standby Redundancy  
254  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Active-Active Redundancy  
In an active-active configuration, two Web switches provide redundancy for each other, with  
both active at the same time for the same services.  
Web OS has extended VRRP to include virtual servers, allowing full active/active redundancy  
between its Layer 4 switches. In an active-active configuration, shown in Figure 11-5, both  
switches can process traffic for the same service at the same time; both switches can be active  
simultaneously for a given IP routing interface or load-balancing virtual server (VIP).  
Active VIP 1  
VIP: 205.178.13.226  
Active VIP 2  
VIP: 205.178.13.240  
Active VIP 3  
VIP: 205.178.13.110  
Router  
Active  
Internet  
Active  
Router  
Active VIP 1  
VIP: 205.178.13.226  
Active VIP 2  
VIP: 205.178.13.240  
Active VIP 3  
VIP: 205.178.13.110  
Figure 11-5 Active-Active Redundancy  
In the example above, one switch is still the master router. However, traffic going through the  
backup router (associated with the same virtual router on the switch) that is addressed to the  
master router will be intercepted and processed by the backup router.  
Chapter 11: High Availability  
255  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Hot-Standby Redundancy  
In a hot-standby configuration, Spanning Tree Protocol (STP) is not needed to eliminate bridge  
loops. This speeds up failover when a switch fails. The standby switch blocks all ports configured  
as standby ports, whereas the master switch enables these same ports. Consequently, on a given  
switch, all virtual routers are either master or backup; they cannot change state individually.  
To provide as much flexibility as possible, the old hot-standby approach has been modified to  
eliminate the problems previously associated with it and is now based on VRRP. In a hot-standby  
configuration, two or more switches provide redundancy for each other. One switch is elected  
master and actively processes Layer 4 traffic. The other switches (the backups) assume the master  
role should the master fail. The backups may forward Layer 2 and Layer 3 traffic as appropriate.  
There are three components to the VRRP-based, hot-standby model: the virtual router group,  
additional Layer 4 port states, and configuration synchronization options. The hot-standby  
model is shown in Figure 11-6.  
Active VIP 1  
VIP: 205.178.13.226  
Active VIP 2  
VIP: 205.178.13.240  
Active VIP 3  
VIP: 205.178.13.110  
Router  
Active  
Internet  
Hot Standby  
Router  
Standby VIP 1  
VIP: 205.178.13.226  
Standby VIP 2  
VIP: 205.178.13.240  
Standby VIP 3  
VIP: 205.178.13.110  
Figure 11-6 Hot-Standby Redundancy  
256  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Virtual Router Group  
The virtual router group ties all of the virtual routers together as a single entity and is central to  
the hot-standby configuration. All virtual routers on a given switch must all be either master or  
backup. They cannot failover individually, only as a group. Once hot-standby is globally  
enabled, the virtual router group must be enabled. The virtual router group aggregates all of the  
virtual routers as a single entity.  
If the virtual router group is master on one switch, it means the switch is master; otherwise, the  
switch is backup. However, Layer 4 processing is still enabled. If a virtual server is not a vir-  
tual router, the backup switch can still process traffic addressed to that virtual server IP  
address. Filtering is also still functional. Only traffic addressed to virtual server routers is not  
processed.  
VRRP actually contains support for virtual router groups. Each advertisement is not limited to  
a single virtual router IP address and can include up to 256 addresses. This means that all vir-  
tual routers are advertised in the same packet, conserving processing and buffering resources.  
However, the advertisements are also used to help bridges learn the virtual router MAC  
address. Since all of the virtual routers can have different virtual router identifiers (VRIDs),  
you must rotate the MAC source address of the advertisement to ensure that the bridges learn  
all of the virtual router MAC addresses.  
Hot-Standby and Inter-Switch Port States  
The second part of the solution involves introducing two additional Layer 4 port states, hot-  
standby and inter-switch:  
n
n
Links that attach to the standby switch must be configured as hot standby using  
/cfg/slb/port x/hotstan.  
Links that are used by VRRP to deliver updates are configured as intersw, or inter-  
switch links (not to be confused with Ciscos ISL). The command to configure one or  
more ports as interswitch links is /cfg/slb/port<port number>/intersw.  
NOTE A port cannot be configured to support both hot-standby and interswitch link.  
The hot-standby switch listens to the masters VRRP updates. After an interval period has  
expired without receiving a update, the backup switch will take over. The forwarding states of  
hot-standby ports are controlled much like the forwarding states of the old hot-standby  
approach. Enabling hot-standby on a switch port allows the hot-standby algorithm to control  
the forwarding state of the port. If a switch is master, the forwarding states of the hot-standby  
ports are enabled. If a switch is backup, the hot-standby ports are blocked from forwarding or  
receiving traffic.  
Chapter 11: High Availability  
257  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
When the hotstanoption (/cfg/slb/portx/hotstan) is enabled and all hot-standby  
ports have link, the virtual router group's priority is automatically incremented by the track  
other virtual routersvalue. This action allows the switches to failover when a hot-standby port  
loses link. Other enabled tracking features only have affect when all hot-standby ports on a  
switch have link. The default virtual routers tracking value is 2 seconds. Keep in mind that this  
is an automatic process that cannot be turned off.  
NOTE The VRRP hot-standby approach does not support single-link failover. If one hot-  
standby port loses link, the entire switch must become master to eliminate loss of connectivity.  
The forwarding states of non-hot-standby ports are not controlled via the hot-standby algo-  
rithm, allowing the additional ports on the switches to provide added port density. The client  
ports on both switches should be able to process or forward traffic to the master switch.  
The inter-switch port state is only a place holder. Its presence forces the user to configure a  
inter-switch link when hot-standby is globally enabled and prohibits the inter-switch link from  
also being a hot-standby link for VRRP advertisements. These advertisements must be able to  
reach the backup switch.  
Synchronizing Configurations  
The final piece in configuring a high-availability solution includes the addition of synchroniza-  
tion options to simplify the manual configuration. Configuration options have been added to  
refine what is synchronized, to whom, and to disable synchronizing certain configurations.  
These options include proxy IP addresses, Layer 4 port configuration, filter configuration, and  
virtual router priorities.  
Also, a peer menu (cfg/slb/sync/peer) has been added to allow the user to configure  
the IP addresses of the switches that should be synchronized. This provides added synchroni-  
zation validation but does not require the users to enter the IP address of the redundant switch  
for each synchronization.  
NOTE When using both VRRP and GSLB, you must change the /cfg/sys/wport  
(Browser-Based Interface port) value of the target switch (the switch that is being synchro-  
nized to) to a port other than port 80 before VRRP synchronization begins.  
For more information on synchronizing configurations between two switches, see Synchro-  
nizing Configurationson page 282.  
258  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
This section describes the following VRRP enhancements that are implemented in Web OS:  
n
n
n
Virtual Server Routers  
Sharing/Active-Active Failover  
Tracking VRRP Router Priority  
Virtual Server Routers  
Web OS supports virtual server routers, which extend the benefits of VRRP to virtual server IP  
addresses that are used to perform SLB.  
Virtual server routers operate for virtual server IP addresses in much the same manner as Vir-  
tual Interface Routers operate for IP interfaces. A master is negotiated via a bidding process,  
during which information about each VRRP routers priority is exchanged. Only the master can  
process packets that are destined for the virtual server IP address and respond to ARP requests.  
One difference between virtual server routers and virtual interface routers is that a virtual  
server router cannot be an IP address owner. All virtual server routers are renters.  
All virtual routers, whether virtual server routers or virtual interface routers, operate indepen-  
dently of one another; that is, their priority assignments, advertisements, and master negotia-  
tions are separate. For example, when you configure a VRRP routers priority in a virtual  
server router, you are not affecting that VRRP routers priority in any virtual interface router or  
any other virtual server router of which it is a part. However, because of the requirement that  
MAC addresses be unique on a LAN, VRIDs must be unique among all virtual routers,  
whether virtual interface routers or virtual server routers.  
Chapter 11: High Availability  
259  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Sharing/Active-Active Failover  
Web OS supports sharing of interfaces at both Layer 3 and Layer 4, as shown in Figure 11-7.  
With sharing, an IP interface or a VIP address can be active simultaneously on multiple  
switches, enabling active-active operation as shown in Table 11-2.  
Master-Active VR 1  
Backup-Active VR 2  
Master-Active VR 3  
Router  
Web Switch 1  
Internet  
Web Switch 2  
Router  
Backup-Active VR 1  
Master-Active VR 2  
Backup-Active VR 3  
Figure 11-7 Active-Active High Availability  
Table 11-2 Sharing Active-Active Failover  
Web Switch 1 Master-Active VR 1  
VRID 2  
Backup-Active VR 2  
VRID 4  
Master-Active VR 3  
VRID 6  
VIP: 205.178.13.226  
VIP: 205.178.13.240  
VIP: 205.178.13.110  
MAC address 00-00-5E-OO-01-02 MAC address 00-00-5E-OO-01-04 MAC address 00-00-5E-OO-01-06  
Web Switch 2 Backup-Active VR 1  
VRID 2  
Master-Active VR 2  
VRID 4  
Backup-Active VR 3  
VRID 6  
VIP: 205.178.13.226  
VIP: 205.178.13.240  
VIP: 205.178.13.110  
MAC address 00-00-5E-OO-01-02 MAC address 00-00-5E-OO-01-04 MAC address 00-00-5E-OO-01-06  
When sharing is used, incoming packets are processed by the switch on which they enter the  
virtual router. The ingress switch is determined by external factors, such as routing and Span-  
ning Tree configuration.  
NOTE Sharing cannot be used in configurations where incoming packets have more than one  
entry point into the virtual routerfor example, where a hub is used to connect the switches.  
260  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
When sharing is enabled, the master election process still occurs. Although the process does  
not affect which switch processes packets that must be routed or that are destined for the vir-  
tual server IP address, it does determine which switch sends advertisements and responds to  
ARP requests sent to the virtual routers IP address.  
Web OS strongly recommends that sharing, rather than active-standby configurations, be used  
whenever possible. Sharing offers both better performance and fewer service interruptions in  
the face of fault conditions than active-standby configurations.  
Tracking VRRP Router Priority  
Web OS supports a tracking function that dynamically modifies the priority of a VRRP router,  
based on its current state. The objective of tracking is to have, whenever possible, the master  
bidding processes for various virtual routers in a LAN converge on the same switch. Tracking  
ensures that the selected switch is the one that offers optimal network performance. For track-  
ing to have any effect on virtual router operation, preemption must be enabled.  
NOTE Tracking only affects hot standby and active-standby configurations. It does not have  
any effect on active-active sharing configurations.  
Web OS can track the attributes listed in Table 11-3:  
Table 11-3 VRRP Tracking Parameters  
Parameter  
Description  
Number of virtual routers in master mode Useful for ensuring that traffic for any particular cli-  
on the switch  
/cfg/vrrp/track/vrs  
ent/server pair is handled by the same switch, increasing  
routing and load-balancing efficiency. This parameter  
influences the VRRP routers priority in both virtual inter-  
face routers and virtual server routers.  
Number of IP interfaces active on the  
switch  
/cfg/vrrp/track/ifs  
Helps elect the virtual routers with the most available  
routes as the master. (An IP interface is considered active  
when there is at least one active port on the same VLAN.)  
This parameter influences the VRRP routers priority in  
both virtual interface routers and virtual server routers.  
Number of active ports on the same VLAN Helps elect the virtual routers with the most available  
/cfg/vrrp/track/ports  
ports as the master. This parameter influences the VRRP  
routers priority in both virtual interface routers and virtual  
server routers.  
Chapter 11: High Availability  
261  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Table 11-3 VRRP Tracking Parameters  
Parameter Description  
Number of physical switch ports that Helps elect the main Layer 4 switch as the master.  
have active Layer 4 processing on the This parameter influences the VRRP router's prior-  
switch  
ity in both virtual interface routers and virtual server  
routers.  
/cfg/vrrp/track/l4pts  
Number of healthy real servers behind Helps elect the switch with the largest server pool as  
the virtual server IP address that is the the master, increasing Layer 4 efficiency. This  
same as the IP address of the virtual  
server router on the switch  
parameter influences the VRRP router's priority in  
virtual server routers only.  
/cfg/vrrp/track/reals  
In networks where the Hot Standby  
Router Protocol (HSRP) is used for  
Helps elect the switch closest to the master HSRP  
router as the master, optimizing routing efficiency.  
establishing router failover, the num- This parameter influences the VRRP router's prior-  
ber of Layer 4 client-only ports that  
receive HSRP advertisements  
/cfg/vrrp/track/hsrp  
ity in both virtual interface routers and virtual server  
routers.  
Each tracked parameter has a user-configurable weight associated with it. As the count associ-  
ated with each tracked item increases (or decreases), so does the VRRP routers priority, sub-  
ject to the weighting associated with each tracked item. If the priority level of a backup is  
greater than that of the current master, then the backup can assume the role of the master.  
See Configuring the Switch for Trackingon page 280 for an example on how to configure  
the switch for tracking VRRP priority.  
262  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Alteon Web switches offer flexibility in implementing redundant configurations. This section  
discusses a few of the more useful and easily deployed configurations:  
n
n
n
n
Active-Standby Virtual Server Router Configurationon page 263  
Active-Active VIR and VSR Configurationon page 265  
Active/Active Server Load Balancing Configurationon page 267  
VRRP-Based Hot-Standby Configurationon page 275  
Active-Standby Virtual Server Router Configuration  
Figure 11-8 shows an example configuration where two Alteon Web switches are used as  
VRRP routers in an active-standby configuration, implementing a virtual server router. Active-  
standby redundancy should be used in configurations that cannot support sharing, that is, con-  
figurations where incoming packets will be seen by more than one switch, such as instances  
where a hub is used to connect the switches. In this configuration, when both switches are  
healthy, only the master responds to packets sent to the virtual server IP address.  
Server 1  
RIP 1: 205.178.13.101  
RIP 2: 205.178.13.105  
Master-Active  
VRID 2  
VIP: 205.178.13.226  
MAC address 00-00-5E-00-01-02  
Router  
Web Switch 1  
Web Switch 2  
Server 2  
RIP 1: 205.178.13.102  
RIP 2: 205.178.13.106  
Internet  
Server 3  
RIP 1: 205.178.13.103  
RIP 2: 205.178.13.107  
Router  
Backup-Standby  
VRID 2  
VIP: 205.178.13.226  
MAC address 00-00-5E-00-01-02  
Server 4  
RIP 1: 205.178.13.104  
RIP 2: 205.178.13.108  
Figure 11-8 Active-Standby High-Availability Configuration  
Although this example shows only two switches, there is no limit on the number of switches  
used in a redundant configuration. It is possible to implement an active-standby configuration  
across all the VRRP-capable switches in a LAN.  
Each VRRP-capable switch in an active-standby configuration is autonomous. Switches in a  
virtual router need not be identically configured.  
Chapter 11: High Availability  
263  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
To implement the active-standby example, perform the following switch configuration:  
1. Configure the appropriate Layer 2 and Layer 3 parameters on both switches.  
This includes any required VLANs, IP interfaces, default gateways, and so on. If IP interfaces  
are configured, none should use the virtual server IP address described in Step 4.  
2. Define all filters required for your network configuration.  
Filters may be configured on one switch and synchronized with settings on the other switch  
(see Step 5 below).  
3. Configure all required SLB parameters on Web switch 1.  
For the purposes of this example, assume that Web switch 1 in Figure 11-8 is configured in this  
step. Required Layer 4 parameters include a VIP = 205.178.13.226 and one real server group  
with four real servers, RIP = 205.178.13.101, RIP = 205.178.13.102, RIP = 205.178.13.103,  
and RIP = 205.178.13.104.  
4. Configure the VRRP parameters on Web switch 1.  
This configuration includes VRID = 2, VIP = 205.178.13.226 and the priority. Enable tracking  
and set the parameters appropriately (refer to Configuring the Switch for Trackingon page  
280). Make sure to disable sharing.  
5. Synchronize the SLB and VRRP configurations by synchronizing the configuration from  
Web switch 1 to Web switch 2.  
Use the /oper/slb/synchcommand (see Synchronizing Configurationson page 282).  
6. Change the real servers in the Web switch 2 configuration to RIP = 205.178.13.105,  
RIP = 205.178.13.106, RIP =205.178.13.107, and RIP = 205.178.13.108.  
Adjust Web switch 2s priority (see Configuring the Switch for Trackingon page 280).  
In this example, with Web switch 1 as the master, if a link between Web switch 1 and a server  
fails, the server will fail health checks and be taken out of the load-balancing algorithm. If track-  
ing is enabled and is configured to take into account the number of healthy real servers for the  
Virtual Router's VIP address, Web switch 1s priority will be reduced. If it is reduced to a value  
lower than Web switch 2s priority, then Web switch 2 will assume the role of master. In this  
case, all active connections serviced by Web switch 1s virtual server IP address are severed.  
If the link between Web switch 1 and its Internet router fails, the protocol used to distribute  
traffic between the routers, for example, Open Shortest Path First (OSPF), will reroute traffic  
to the other router. Web switch 2 (backup) will act as a Layer 2/3 switch and forward all traffic  
destined to the virtual server IP address to Web switch 1.  
If the entire Web switch 1 (master) fails, the protocol used to distribute traffic between the  
routers, such as OSPF, will reroute traffic to Web switch 2. Web switch 2 (backup) detects that  
the master has failed because it will stop receiving advertisements. The backup then assumes  
the master's responsibility of responding to ARP requests and issuing advertisements.  
264  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Active-Active VIR and VSR Configuration  
Figure 11-9 two Alteon Web switches are used as VRRP routers in an active-active configura-  
tion implementing a virtual server router. As noted earlier, this is the preferred redundant con-  
figuration.  
Server 1  
RIP 1: 205.178.13.101  
Master-Active  
VRID 2  
VIP: 205.178.13.226  
MAC address 00-00-5E-00-01-02  
Server 2  
RIP 1: 205.178.13.102  
Router  
Web Switch 1  
Internet  
Web Switch 2  
Router  
Server 3  
Backup-Active  
RIP 1: 205.178.13.103  
VRID 2  
VIP: 205.178.13.226  
MAC address 00-00-5E-00-01-02  
Server 4  
RIP 1: 205.178.13.104  
Figure 11-9 Active-Active High-Availability Configuration  
Although this example shows only two switches, there is no limit on the number of switches  
used in a high availability configuration. It is possible to implement an active-active configura-  
tion and perform load sharing between all of the VRRP-capable switches in a LAN.  
In this configuration, when both switches are healthy, the load balanced packets are sent to the  
virtual server IP address, resulting in higher capacity and performance than when the switches  
are used in an active-standby configuration.  
The switch on which a frame enters the virtual server router is the one that processes that  
frame. The ingress switch is determined by external factors, such as routing and STP settings.  
NOTE Each VRRP-capable switch is autonomous. There is no requirement that the switches  
in a virtual router be identically configured. Different switch models with different numbers of  
ports and different enabled services may be used in a virtual router.  
Chapter 11: High Availability  
265  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
To implement this example, configure the switches as follows:  
1. Configure the appropriate Layer 2 and Layer 3 parameters on both switches.  
This configuration includes any required VLANs, IP interfaces, default gateways, and so on. If  
IP interfaces are configured, none of them should use the VIP address described in Step 4.  
2. Define all filters required for your network configuration.  
Filters may be configured on one switch and synchronized with the settings on the other switch  
(see Step 5, below).  
3. Configure all required SLB parameters on one of the switches.  
For the purposes of this example, assume that Web switch 1 (see Figure 11-9 on page 265) is  
configured in this step. Required Layer 4 parameters include a VIP = 205.178.13.226 and one  
real server group with two real servers, RIP = 205.178.13.101 and RIP = 205.178.13.102.  
RIP = 205.178.13.103 should be configured as a backup server to RIP = 205.178.13.101.  
RIP = 205.178.13.104 should be configured as a backup server to RIP = 205.178.13.102.  
NOTE In this configuration, each servers backup is attached to the other switch. This ensures  
that operation will continue if all of the servers attached to a switch fail.  
4. Configure the VRRP parameters on the switch.  
Configure VRID = 2, VIP address = 205.178.13.226, and priority. Be sure to enable sharing.  
5. Synchronize the SLB and VRRP configurations by pushing the configuration from Web  
switch 1 to Web switch 2.  
Use the /oper/slb/synccommand.  
6. Reverse the roles of the real servers and their backups in Web switch 2s configuration.  
Configure RIP = 205.178.13.103 and RIP= 205.178.13.104 as the real servers  
Configure RIP = 205.178.13.101 and RIP = 205.178.13.102 as their backups, respectively.  
In this configuration, if a link between a switch and a server fails, the server will fail health  
checks and its backup (attached to the other switch) will be brought online. If a link between a  
switch and its Internet router fails, the protocol used to distribute traffic between the routers  
(for example, OSPF) will reroute traffic to the other router. Since all traffic now enters the vir-  
tual server router on one switch, that switch will process all incoming connections.  
If an entire master switch fails, the backup will detect this failure because it will stop receiving  
advertisements. The backup will assume the masters responsibility of responding to ARP  
requests and issuing advertisements.  
Be cautious before setting the maximum connections (maxconn) metric in this configuration.  
The maxconnumber is not shared between switches. Therefore, if a server is used for normal  
operation by one switch and is activated simultaneously as a backup by the other switch, the  
total number of possible connections to that server will be the sum of the maximum connection  
limits defined for it on both switches.  
266  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Active/Active Server Load Balancing Configuration  
In this example, you set up four virtual servers each load balancing two servers providing one  
service (for example, HTTP) per virtual server.  
You are load balancing HTTP, HTTPS, POP3, SMTP, and FTP. Each protocol is load balanced  
via a different virtual server. You could load balance all of these services on one VIP, but in this  
example, four distinct virtual servers are used to illustrate the benefits of active/active failover.  
Set up one switch, dump out the configuration script (also called a text dump), edit it, and  
dump the edited configuration into the peer switch.  
NOTE Configuring the switch for active-active failover should take no longer than 15 min-  
utes to complete. You can use either the Web OS Browser-Based Interface (BBI) or the Com-  
mand Line Interface (CLI) for configuration.  
Task 1: Background Configuration  
1. Define the IP interfaces.  
The switch will need an IP interface for each subnet to which it will be connected so it can  
communicate with devices attached to it. Each interface will need to be placed in the appropri-  
ate VLAN. In our example, Interfaces 1, 2, 3, and 4 will be in VLAN 2 and Interface 5 will be  
in VLAN 1.  
NOTE On Alteon Web switches, you may configure more than one subnet per VLAN.  
To configure the IP interfaces for this example, enter the following commands from the CLI:  
>> Main# /cfg/ip/if 1  
(Select IP interface 1)  
>> IP Interface 1 # addr 10.10.10.10  
>> IP Interface 1 # vlan 2  
>> IP Interface 1 # ena  
(Assign IP address for the interface)  
(Assign VLAN for the interface)  
(Enable IP interface 1)  
Repeat the commands for each interface listed below:  
n
n
n
n
IF 2 20.10.10.10  
IF 3 30.10.10.10  
IF 4 40.10.10.10  
IF 5 200.1.1.10  
Chapter 11: High Availability  
267  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
2. Define the VLANs.  
In this configuration, set up two VLANs: One for the outside world (the ports connected to the  
upstream switches, toward the routers) and one for the inside (the ports connected to the down-  
stream switches, toward the servers).  
>> Main# /cfg/vlan <VLAN number>  
>> vlan 1 # add <port number>  
>> vlan 1 # ena  
(Select VLAN 1)  
(Add a port to the VLAN membership)  
(Enable VLAN 1)  
Repeat this command for the second VLAN.  
n
n
VLAN 1 - IF 5physical ports connected to upstream switches.  
VLAN 2 - IFs 1,2,3,4physical ports connected to downstream switches.  
3. Disable Spanning Tree.  
>> Main# /cfg/stp 1  
>> Main# /cfg/stp/off  
>> Main# /cfg/stp/apply  
(Select the STP Group number)  
(Disable STP)  
(Make your changes active)  
4. Enable IP forwarding.  
IP forwarding is enabled by default. Make sure IP forwarding is enabled if the virtual server IP  
addresses and real server IP addresses are on different subnets, or if the switch is connected to  
different subnets and those subnets need to communicate through the switch. If you are in  
doubt as to whether or not to enable IP forwarding, enable it. In this example, the virtual server  
IP addresses and real server IP addresses are on different subnets, so enable this feature using  
the following command:  
>> Main# /cfg/ip/frwd/on  
(Enable IP forwarding)  
268  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Task 2: SLB Configuration  
1. Define the Real Servers.  
The real server IP addresses are defined and put into four groups, depending on the service  
they are running. Notice that RIPs 7 and 8 are on routable subnets in order to support passive  
FTP. For each real server, you must assign a real server number, specify its actual IP address,  
and enable the real server.  
For example:  
>> Main# /cfg/slb/real 1  
>> Real server 1 # rip 10.10.10.5/24  
>> Real server 1 # ena  
(Server A is real server 1)  
(Assign Server A IP address)  
(Enable real server 1)  
Repeat this sequence of commands for the following real servers:  
n
n
n
n
n
n
n
RIP 2 10.10.10.6/24  
RIP 3 20.10.10.5/24  
RIP 4 20.10.10.6/24  
RIP 5 30.10.10.5/24  
RIP 6 30.10.10.6/24  
RIP 7 200.1.1.5/24  
RIP 8 200.1.1.6/24  
2. Define the real server groups, adding the appropriate real servers.  
This combines the three real servers into one service group:  
>> Real server 8 # /cfg/slb/group 1  
>> Real server group 1# add 1  
>> Real server group 1# add 2  
(Select real server group 1)  
(Add real server 1 to group 1)  
(Add real server 2 to group 1)  
Repeat this sequence of commands for the following real server groups:  
n
n
n
Group 2Add RIP 3 and 4  
Group 3Add RIP 5 and 6  
Group 4Add RIP 7 and 8  
Chapter 11: High Availability  
269  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
3. Define the virtual servers.  
After defining the virtual server IP addresses and associating them with a real server group  
number, you must tell the switch which IP ports/services/sockets you want to load balance on  
each VIP. You can specify the service by either the port number, service name, or socket num-  
ber.  
>> Real server group 4 # /cfg/slb/virt 1 (Select virtual server 1)  
>> Virtual server 1 # vip 200.200.200.100 (Assign a virtual server IP address)  
>> Virtual Server 1 # service 80  
>> Virtual server 1 http Service # group 1(Associate virtual port to real group)  
>> Virtual server 1 # ena (Enable the virtual server)  
(Assign HTTP service port 80)  
Repeat this sequence of commands for the following virtual servers:  
n
n
n
VIP 2 200.200.200.101 will load balance HTTPS (Port 443) to Group 2  
VIP 3 200.200.200.102 will load balance POP/SMTP (Ports 110/25) to Group 3  
VIP 4 200.200.200.104 will load balance FTP (Ports 20/21) to Group 4  
4. Define the client and server port states.  
Defining a client port state tells that port to watch for any frames destined for the VIP and to  
load balance them if they are destined for a load-balanced service. Defining a server port state  
tells the port to the do the remapping (NAT) of the real server IP address back to the virtual  
server IP address. Note the following:  
n
n
The ports connected to the upstream switches (the ones connected to the routers) will need  
to be in the client port state.  
The ports connected to the downstream switches (the ones providing fan out for the serv-  
ers) will need to be in the server port state.  
Configure the ports, using the following sequence of commands:  
>> Virtual server 4# /cfg/slb/port 1  
>> SLB port A1 # client ena  
>> SLB port A1 # ../port 2  
(Select physical switch port 1)  
(Enable client processing on port 1)  
(Select physical switch port 2)  
>> SLB port A2 # server ena  
(Enable server processing on port 2)  
270  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Task 3: Virtual Router Redundancy Configuration  
1. Configure virtual routers 2, 4, 6, and 8.  
These virtual routers will have the same IP addresses as the virtual server IP address. This is  
what tells the switch that these are virtual service routers (VSRs). In this example, Layer 3  
bindings are left in their default configuration, which is disabled.  
Configure a virtual router using the following sequence of commands:  
>> Virtual server 4 # /cfg/vrrp/vr 2  
>> Virtual router 2 vrid 2  
(Select virtual router 2)  
(Set virtual router ID)  
>> Virtual router 2 addr 200.200.200.100 (Assign virtual router IP address)  
>> Virtual router 2 if 5  
>> Virtual router 2 ena  
(Assign virtual router interface)  
(Enable virtual router 2)  
Repeat this sequence of commands for the following virtual routers:  
n
n
n
VR 4 - VRID 4 - IF 5 (associate with IP interface #5)Address 200.200.200.101  
VR 6 - VRID 6 - IF 5 (associate with IP interface #5)Address 200.200.200.103  
VR 8 - VRID 8 - IF 5 (associate with IP interface #5)Address 200.200.200.104  
2. Configure virtual routers 1, 3, 5, and 7.  
These virtual routers will act as the default gateways for the servers on each respective subnet.  
Because these virtual routers are survivable next hop/default gateways, they are called virtual  
interface routers (VIRs).  
Configure each virtual router listed below, using the sequence of commands in Step 1.  
n
n
n
n
VR 1 - VRID 1 - IF 1 (associate with IP interface 1)Address 10.10.10.1  
VR 3 - VRID 3 - IF 2 (associate with IP interface 2)Address 20.10.10.1  
VR 5 - VRID 5 - IF 3 (associate with IP interface 3)Address 30.10.10.1  
VR 7 - VRID 7 - IF 4 (associate with IP interface 4)Address 40.10.10.1  
Chapter 11: High Availability  
271  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
3. Set the renter priority for each virtual router.  
Since you want Switch 1 to be the master router, you need to bump the default virtual router  
priorities (which are 100 to 101 on virtual routers 1-4) to force switch 1 to be the master for  
these virtual routers.  
Use the following sequence of commands:  
>> Virtual server 4 # /cfg/vrrp/vr 1  
(Select virtual router 1)  
>> Virtual router 1 prio 101  
(Set virtual router priority)  
Apply this sequence of commands to the following virtual routers, assigning each a priority of  
101:  
n
n
n
VR 2 - Priority 101  
VR 3 - Priority 101  
VR 4 - Priority 101  
4. Configure priority tracking parameters for each virtual router.  
For this example, the best parameter(s) on which to track is Layer 4 ports (l4pts).  
Use the following command:  
>> Virtual server 4# /cfg/vrrp/vr 1/track l4pts  
This command sets the priority tracking parameter for virtual router 1, electing the virtual  
router with the most available ports as the master router. Repeat this command for the follow-  
ing virtual routers:  
n
n
n
VR 2 - Track l4pts  
VR 3 - Track l4pts  
VR 4 - Track l4pts  
VR 6 - Track l4pts  
VR 7 - Track l4pts  
VR 8 - Track l4pts  
Switch 1 configuration is complete.  
272  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Task 4: Configuring Switch 2  
Use the following procedure to dump the configuration script (text dump) out of Switch 1:  
n
Using the Browser Based Interface (BBI)  
(a) You need a serial cable that is a DB-9 Male to DB-9 Female, straight-through (not a  
null modem) cable.  
(b) Connect the cable from a COM port on your computer to the console port on switch 1.  
(c) Open HyperTerminal (or the terminal program of your choice) and connect to the  
switch using the following parameters: Baud: 9600, Data Bits: 8, Parity: None, Stop  
Bits:1, Flow Control: None.  
n
Using HyperTerminal  
(a) Only the Baud Rate and Flow Control options need to be changed from the default set-  
tings.  
(b) Once you connect to the switch, start logging your session in HyperTerminal (trans-  
fer/capture text).  
(c) Save the file as Customer NameSwitch 1, then type the following command in the  
switch command line interface:  
/cfg/dump  
A script will be dumped out.  
(d) Stop logging your session (transfer/capture text/stop).  
Modify the script as follows:  
1. Open the text file that you just created and change the following:  
n
n
Delete anything above Script Start.”  
Delete the two lines directly below Script Start.These two lines identify the switch from  
which the dump was taken and the date and time. If these two lines are left in, it will con-  
fuse Web switch 2 when you dump in the file.  
n
Change the last octet in all the IP interfaces from .10 to .11. Find this in line:  
/cfg/ip/if 1/addr 10.10.10.10. Simply delete the 0and put in a 1.Be  
sure to do this for all the IP interfaces, otherwise, you will have duplicate IP addresses in  
the network.  
2. Change the virtual router priorities.  
Virtual routers 14 need to have their priority set to 100 from 101, and virtual routers 5-7 need  
to have their priorities set to 101 from 100. You can find this in line /cfg/vrrp/vr  
1/vrid 1/if 1/prio 101.  
Chapter 11: High Availability  
273  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
3. Scroll to the bottom of the text file and delete anything past Script End.”  
4. Save the changes to the text file as Customer NameSwitch 2.  
Move your serial cable to the console port on the second switch. Any configuration on it needs  
to be deleted by resetting it to factory settings, using the following command:  
>> Main# /boot/conf factory/reset  
You can tell if the switch is at factory default when you log on because the switch will prompt  
you if you want to use the step-by-step configuration process. When it does, respond: No.”  
5. In HyperTerminal, go to transfer/send text file and send the Switch 2 text file. The configu-  
ration will dump into the switch. Simply type apply, then save. When you can type charac-  
ters in the terminal session again, reboot the switch (/boot/reset).  
274  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
VRRP-Based Hot-Standby Configuration  
A hot-standby configuration allows all processes to failover to a backup switch if any type of  
failure should occur. The primary application for hot-standby redundancy is to avoid bridging  
loops when using the Spanning Tree Protocol (STP), IEEE 802.1d. VRRP-based hot-standby  
supports the default Spanning Tree only. It does not support multiple Spanning Trees.  
Figure 11-10 shows a classic network topology, designed with redundancy in mind. This topol-  
ogy contains bridging loops that would require the use of STP. In the typical network, STP  
failover time is 45-50 seconds, much longer than the typical failover rate using VRRP only.  
NOTE To use hot-standby redundancy, peer switches must have an equal number of ports.  
Clients  
Active  
Side  
Standby  
Side  
Hub  
7
C H  
7
C H  
Interswitch link  
3
3
S H  
1
1
S H  
Hub  
Legend  
1. L4 ports are configured as Hot-Standby.  
2. Crosslink is configured as Interswitch link.  
Servers  
Figure 11-10 Hot-Standby Configuration  
NOTE In complex networks, STP convergence time can be much higher than 45-50 seconds.  
If VRRP was used in this configuration, it would require STP. An important factor to consider is  
that the switch would be affected by the slower failover time of STP even if VRRP were in use.  
While VRRP can be used without STP in this scenario, doing so would involve a more com-  
plex network configuration, requiring multiple subnets and/or VLANs and enabling IP for-  
warding to route between them.  
Chapter 11: High Availability  
275  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
By reducing complexity to a single subnet and not requiring routing (L3), hot-standby can be  
used. The key to hot-standby is that the interswitch link (the link between switches), does NOT  
participate in STP, so there are no loops in the topology (see Figure 11-10). STP does not need to  
be enabled, and the switch will have failover times similar to what would be the case with VRRP.  
Configuration Procedure  
Configuration takes place after configuring SLB and VRRP with STP enabled:  
1. From the SLB menu, enable a hot-standby link on the Layer 4 ports; then enable inter-  
switch link on the crosslink.  
>> Main# /cfg/slb/port 1  
>> SLB Port 1# server ena  
>> SLB Port 1# hotstan ena  
>> SLB Port 1# ../port 3  
>> SLB Port 3# intersw ena  
>> SLB Port 3# ../port 7  
>> SLB Port 7# client ena  
>> SLB Port 7# hotstan ena  
(Select port 1)  
(Enable the server)  
(Enable hot standby)  
(Select port 3)  
(Enable inter-switch processing)  
(Select port 7)  
(Enable the client)  
(Enable hot standby)  
2. From the VRRP menu, enable VRRP group mode; then enable hot-standby.  
>> Main# /cfg/vrrp/on  
>> VRRP# hotstan ena  
>> VRRP# group ena  
(Enable VRRP)  
(Enable hot standby)  
(Enable VR group)  
3. Sync the VRRP, SLB, and filter settings to the other switch (same ports).  
>> Main# /oper/slb/sync  
NOTE Switches peering with each other must have an equal number of ports.  
4. Turn off STP after verifying that the network is stable.  
>> Main# /cfg/stp 1/off  
>> Spanning Tree Group 1# save  
>> Main# /boot/reset  
(Disable STP group)  
(Enable hot standby)  
(Reset the switch)  
NOTE You must reboot the switch for the hot-standby configuration to take effect.  
276  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Review the following issues described in this section to prevent network problems when  
deploying virtual routers:  
n
n
n
n
n
n
Mixing Active-Standby and Active-Active Virtual Routers  
Synchronizing Active/Active Failover  
Eliminating Loops with STP and VLANs  
Assigning VRRP Virtual Router ID  
Configuring the Switch for Tracking  
Synchronizing Configurations  
Mixing Active-Standby and Active-Active Virtual Routers  
If the network environment can support sharing, enable it for all virtual routers in the LAN. If  
not, use active-standby for all virtual routers. Do not mix active-active and active-standby vir-  
tual routers in a LAN. Mixed configurations have not been tested, may result in unexpected  
operational characteristics, and, therefore, are not recommended.  
Synchronizing Active/Active Failover  
The hot-standby failover required the primary and secondary switches to have identical config-  
urations and port topology. With VRRP and active/active failover, this is optional. Each switch  
can be configured individually with different port topology, SLB, and filters. If you would  
rather force two active/active switches to use identical settings, you can synchronize their con-  
figuration using the following command:  
/oper/slb/synch  
The synccommand copies the following settings to the switch at the specified IP interface  
address:  
n
n
n
VRRP settings  
SLB settings (including port settings)  
Filter settings (including filter port settings)  
If you perform the synccommand, you should check the configuration on the target switch to  
ensure that the settings are correct.  
For more information on synchronizing configurations between two switches, see Synchro-  
nizing Configurationson page 282.  
Chapter 11: High Availability  
277  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Eliminating Loops with STP and VLANs  
VRRP active/active failover is significantly different from the hot-standby failover method  
supported in previous releases. As shown in Figure 11-11, active-active configurations can  
introduce loops into complex LAN topologies.  
Server  
Web Switch  
Router  
Bridging Loop  
Internet  
Router  
Web Switch  
Server  
Figure 11-11 Loops in Active-Active Configuration  
278  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Using Spanning Tree Protocol to Eliminate Loops  
VRRP generally requires Spanning Tree Protocol (STP) to be enabled in order to resolve  
bridge loops that usually occur in cross-redundant topologies, as shown in Figure 11-12. In this  
example, a number of loops are wired into the topology. STP resolves loops by blocking ports  
where looping is detected.  
Routers Alteon Web Switches Switches  
Servers  
Internet  
Figure 11-12 Cross-Redundancy Creates Loops, But STP Resolves Them  
One drawback to using STP with VRRP is the failover response time. STP could take as long  
as 45 seconds to re-establish alternate routes after a switch or link failure.  
Using VLANs to Eliminate Loops  
When using VRRP, you can decrease failover response time by using VLANs instead of STP  
to separate traffic into non-looping broadcast domains. An example is shown in Figure 11-13:  
Routers Alteon Web Switches Switches  
Servers  
VLAN 1 is for switch-to-switch  
and external routing  
Internet  
VLAN 2 groups the first sub-  
switch with the Alteon  
Web Switches  
VLAN 3 groups the second  
sub- switch with the  
Alteon Web switches  
Figure 11-13 Using VLANs to Create Non-Looping Topologies  
This topology allows STP to be disabled. On the Alteon Web switches, IP routing allows traf-  
fic to cross VLAN boundaries. The servers use the Alteon Web switches as default gateways.  
For port failure, traffic is rerouted to the alternate path within one health check interval (con-  
figurable between 1 and 60 seconds, with a default of 2 seconds).  
Chapter 11: High Availability  
279  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Assigning VRRP Virtual Router ID  
During the software upgrade process, VRRP virtual router IDs will be automatically assigned  
if failover is enabled on the switch. When configuring virtual routers at any point after  
upgrade, virtual router ID numbers (/cfg/vrrp/vr#/vrid) must be assigned. The virtual  
router ID may be configured as any number between 1 and 255.  
Configuring the Switch for Tracking  
Tracking configuration largely depends on user preferences and network environment. Con-  
sider the configuration shown in Figure 11-8 on page 263. Assume that the user wants the fol-  
lowing behavior on the network:  
n
n
Web switch 1 is the master router upon initialization.  
If Web switch 1 is the master and it has one active server fewer than Web switch 2, it  
remains the master.  
n
n
n
n
The user wants this behavior because running one server down is less disruptive than  
bringing a new master online and severing all active connections in the process.  
If Web switch 1 is the master and it has two or more active servers fewer than Web switch  
2, then Web switch 2 becomes the master.  
If Web switch 2 is the master, it remains the master even if servers are restored on Web  
switch 1 such that it has one fewer or an equal number of servers.  
If Web switch 2 is the master and it has one active server fewer than Web switch 1, then  
Web switch 1 becomes the master.  
The user can implement this behavior by configuring the switch for tracking as follows:  
1. Set the priority for Web switch 1 to the default value of 100.  
2. Set the priority for Web switch 2 to 96.  
3. On both switches, enable tracking based on the number of virtual routers in master mode  
on the switch and set the value = 5.  
4. On both switches, enable tracking based on the number of healthy real servers behind  
the VIP address that is the same as the IP address of the virtual server router on the  
switch and set the value = 6.  
Initially, Web switch 1 (Figure 11-8) will have a priority of 100 (base value) + 5 (since it will  
initially be the master) + 24 (4 active real servers x 6 per real server) = 129. Web switch 2 will  
have a priority of 96 (base value) + 24 (4 active real servers X 6 per real server) = 120.  
280  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
If one server attached to Web switch 1 fails, then Web switch 1s priority will be reduced by 6  
to 123. Since 123 is greater than 120 (Web switch 2s priority), Web switch 1 will remain the  
master.  
If a second server attached to Web switch 1 fails, then Web switch 1s priority will be reduced  
by 6 more to 117. Since 117 is less than 120 (Web switch 2s priority), then Web switch 2 will  
become the Master. At this point, Web switch 1s priority will fall by 5 more and Web switch  
2's will rise by 5 because the switches are tracking how many Masters they are running. So,  
Web switch 1's priority will settle out at 112 and Web switch 2's priority at 125.  
When both servers are restored to Web switch 1, that switch's priority will rise by 12 (2 healthy  
real servers X 6 per healthy server) to 124. Since 124 is less than 125, Web switch 2 will  
remain the master.  
If, at this point, a server fails on Web switch 2, its priority will fall by 6 to 119. Since 119 is less  
than 124, Web switch 1 will become the Master. Its priority will settle out at 129 (since it's now  
the master) while Web switch 2s priority will drop by 5 more to 114.  
As you can see from this example, the user's goals were met by the configured tracking param-  
eters.  
NOTE There is no shortcut to setting tracking parameters. The goals must first be set and the  
outcomes of various configurations and scenarios analyzed to find settings that meet the goals.  
Chapter 11: High Availability  
281  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Synchronizing Configurations  
As noted above, each VRRP-capable switch is autonomous. Switches in a virtual router need  
not be identically configured. As a result, configurations cannot be synchronized automatically.  
For user convenience, it is possible to synchronize a configuration from one VRRP-capable  
switch to another using the /oper/slb/synccommand. However, care must be taken  
when using this command to avoid unexpected results. All server load balancing, port configu-  
rations, filter configurations, and VRRP parameters can be synchronized using the  
/oper/slb/synchcommand.  
NOTE Before you synchronize the configuration between two switches, a peer must be con-  
figured on each switch. Switches being synchronized must use the same administrator pass-  
word.  
Configure the two switches as peers to each other. From Switch 1, configure Switch 2 as a peer  
and specify its IP address as follows:  
>> Main # /cfg/slb/sync  
(Select the synchronization menu)  
(Select a peer)  
(Assign switch 2 IP address)  
(Enable peer switch)  
>> Config Synchronization # peer 1  
>> Peer Switch 1 # addr <ip address>  
>> Peer Switch 1 # enable  
Similarly, from switch #2, configure switch # 1 as a peer and specify its IP address as follows:  
>> Main # /cfg/slb/sync  
(Select the synchronization menu)  
(Select a peer)  
(Assign switch 1 IP address)  
(Enable peer switch)  
>> Config Synchronization # peer 2  
>> Peer Switch 2 # addr <ip address>  
>> Peer Switch 2 # enable  
Port specific parameters, such as what filters are applied and enabled on what ports, are part of  
what is pushed by the /oper/slb/synchcommand. Thus, if the /oper/slb/synch  
command is used, it is highly recommended that the hardware configurations and network con-  
nections of all switches in the virtual router be identical; that is, each switch should be the  
same model, have the same line cards in the same slots (if modular) and have the same ports  
connected to the same external network devices. Otherwise, unexpected results may occur  
when the /oper/slb/synchcommand attempts to configure a non-existent port or applies  
an inappropriate configuration to a port.  
282  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Stateful Failover of Layer 4 and Layer 7  
Persistent Sessions  
Web OS provides stateful failover of content-intelligent persistent session state and Layer 7  
persistent session state. This includes the following:  
n
n
n
n
SSL session state  
HTTP cookie state  
Layer 4 persistent  
FTP session state  
Providing stateful failover enables network administrators to mirror their Layer 7 and Layer 4  
persistent transactional state on the peer switch.  
NOTE Stateful failover does not synchronize all sessions, except persistent sessions. Make  
sure Direct Access Mode (DAM) is enabled when you configure stateful failover for Layer 7  
persistency (for example: SSL session ID persistence-based server load balancing, URL and  
cookie-based server load balancing).  
To provide stateful failover, the state of the connection and session table must be shared  
between the switches in high-availability configurations. With Virtual Matrix Architecture  
(VMA) enabled, all URL and cookie-parsing information is stored in the session table on port  
9. Sharing this information between switches is necessary to ensure the persistent session goes  
back to the same server.  
NOTE Stateful failover is only supported in active-standby mode with VMA enabled.  
Chapter 11: High Availability  
283  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
What Happens When a Switch Fails  
Assume that the user performing an e-commerce transaction has selected a number of items  
and placed them in the shopping cart. The user has already established a persistent session on  
the top server in Figure 11-14. The user then clicks the Submit button to purchase the items.  
At this time, the active switch fails. With stateful failover, the following sequence of events  
occurs:  
1. The backup switch (Switch 2) becomes active.  
2. The incoming request is redirected to Switch 2.  
3. When the user clicks Submit again, the request is forwarded to the correct server.  
Even though Switch 1 has failed, the stateful failover feature prevents the client from having to  
re-establish a secure session. The server that stores the secure session now returns a response  
to the client via Switch 2.  
Clients  
Servers  
Web Switch 1  
Failed  
Internet  
Layer 2  
Switch  
Router  
IP: A  
Traffic is redirected  
to Switch 2  
Web Switch 2  
Active  
IP: B  
Figure 11-14 Stateful Failover Example when the Master Switch Fails  
284  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Stateful Failover Configuration Example  
After the VRRP setup, perform the following additional steps to enable stateful failover on the  
switches.  
On the Master Switch  
1. Enable stateful failover.  
>> # /cfg/slb/sync/state ena  
2. Set the update interval.  
>> # /cfg/slb/sync/update 10  
(The default is 30)  
On the Backup Switch  
1. Turn on stateful failover.  
>> # /cfg/slb/sync/state ena  
2. Set the update interval.  
>> # /cfg/slb/sync/update 10  
(The default is 30)  
NOTE The update does not have to be the same for both switches. Stateful failover supports  
up to two peer switches. Repeat the steps mentioned above to enable stateful failover on all the  
peer switches.  
Chapter 11: High Availability  
285  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Viewing Statistics on Persistent Port Sessions  
You can view statistics on persistent port sessions using the /stats/slb/sslcommand.  
To determine which switch is the master and which is the backup, use the /info/vrrp  
command.  
If the switch is a master:  
>> # /info/vrrp  
(View VRRP Information)  
VRRP information:  
1: vrid 1, 172.21.16.187, if 4, renter, prio 109, master,  
server  
3: vrid 3, 192.168.1.30,  
if 2, renter, prio 109, master  
if 4, renter, prio 109, master  
5: vrid 5, 172.21.16.10,  
If the switch is a backup:  
>> # /info/vrrp  
(View VRRP Information)  
VRRP information:  
1: vrid 1, 172.21.16.187, if 1, renter, prio 104, backup,  
server  
3: vrid 3, 192.168.1.30,  
5: vrid 5, 172.21.16.10,  
if 3, renter, prio 104, backup  
if 1, renter, prio 104, backup  
286  
Chapter 11: High Availability  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Part 3: Advanced Web  
Switching  
Web OS can parse requests and classify flows using URLs, host tags, and cookies so that each  
request can be isolated and treated intelligently. This section describes the following advanced  
Web switching applications:  
n
n
n
n
n
n
Global Server Load Balancing  
Firewall Load Balancing  
Virtual Private Network Load Balancing  
Content Intelligent Switching  
Persistence  
Bandwidth Management  
287  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
288  
Advanced Web Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 12  
across multiple geographic sites. The following topics are covered:  
n
n
n
n
n
n
IP Proxy for Non-HTTP Redirectson page 304  
Verifying GSLB Operationon page 308  
Configuring Client Site Preferenceson page 308  
Using Border Gateway Protocol for GSLBon page 312  
289  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
GSLB Overview  
GSLB allows balancing server traffic load across multiple physical sites. The Alteon GSLB  
implementation takes into account an individual sites health, response time, and geographic  
location to smoothly integrate the resources of the dispersed server sites for complete global  
performance.  
Benefits  
GSLB meets the following demands for distributed network services:  
n
n
n
n
High content availability is achieved through distributed content and distributed decision  
making. If one site becomes disabled, the others become aware of it and take up the load.  
There is no latency during client connection set up. Instant site hand-off decisions can be  
made by any distributed switch.  
The best performing sites receive a majority of traffic over a given period of time but are  
not overwhelmed.  
Switches at different sites regularly exchange information through the Distributed Site  
State Protocol (DSSP), and can trigger exchanges when any sites health status changes.  
This ensures that each active site has valid state knowledge and statistics.  
n
n
GSLB implementation takes geography as well as network topology into account.  
Creative control is given to the network administrator or Webmaster to build and control  
content by user, location, target application, and more.  
n
GSLB is easy to deploy, manage, and scale. Switch configuration is straightforward. There  
are no complex system topologies involving routers, protocols, and so forth.  
n
n
Flexible design options are provided.  
All IP protocols are supported.  
Compatibility with Other Web OS Features  
n
URL-based server load balancing is compatible with GSLB.  
n
Cookie-based persistence is compatible with GSLB: cookie rewrite and cookie insert  
modes.  
290  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
How GSLB Works  
GSLB is based on the Domain Name System (DNS) and proximity by source IP address. In the  
example in Figure 12-1, a client is using a browser to view the Web site for the Foo Corporation  
at www.foocorp.com.The Foo Corporation has two Web sites: one in California, and one in  
Denver, each with identical content and available services. Both Web sites have an Alteon Web  
switch configured for GSLB. These switches are also configured as the Authoritative Name  
Servers for www.foocorp.com.”  
Client Site  
DNS  
Request  
1
HTTP  
Request  
5
DNS  
Foo Corp. California  
Foo Corp. Denver  
2
DNS  
DNS  
3
Best Service!  
Web Switch  
Web Switch  
Internet  
4
Switches regularly exchange performance information  
Web  
Servers  
Web  
Servers  
DNS response  
lists best site's  
IP address first  
Figure 12-1 DNS Resolution with Global Server Load Balancing  
The DNS resolution for GSLB is described in detail in the following procedure:  
1. The client Web browser requests the www.foocorp.comIP address from the local DNS.  
2. Clients DNS asks its upstream DNS, which in turn asks the next, and so on, until the  
address is resolved.  
Eventually, the request reaches an upstream DNS server that has the requested IP address  
information on hand or the request reaches one of the Foo Corporations DNS servers.  
3. The Foo Corporations California DNS has been configured to use the local Web switch  
with GSLB software as the authoritative name server for www.foocorp.com.”  
Chapter 12: Global Server Load Balancing  
291  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
4. The California Web switch responds to the DNS request, listing the IP address with the  
current best service.  
Each switch with GSLB software is capable of responding to the clients name resolution  
request. Since each switch regularly checks and communicates health and performance infor-  
mation with its peers, either switch can determine which site(s) are best able to serve the cli-  
ents Web access needs. It can respond with a list of IP addresses for the Foo Corporations  
distributed sites, which are prioritized by performance, geography, and other criteria.  
In this case, the California Web switch knows that Foo Corp. Denver currently provides better  
service, and lists Foo Corp. Denvers virtual server IP address first when responding to the  
DNS request.  
5. The client connects to Foo Corp. Denver for the best service.  
The clients Web browser will use the IP address information obtained from the DNS request  
to open a connection to the best available site. The IP addresses represent virtual servers at any  
site, which are locally load balanced according to regular SLB configuration.  
If the site serving the client HTTP content suddenly experiences a failure (no healthy real serv-  
ers) or becomes overloaded with traffic (all real servers reach their maximum connection  
limit), the switch issues an HTTP Redirect and transparently causes the client to connect to  
another peer site.  
The end result is that the client gets quick, reliable service with no latency and no special cli-  
ent-side configuration.  
292  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring GSLB  
Configuring GSLB is simply an extension of the configuration procedure for SLB. The process  
is summarized as follows:  
n
n
n
Use the administrator login to connect to the switch you want to configure.  
Activate SLB and GSLB software keys. See the Web OS Command Reference for details.  
Configure the switch at each site with basic attributes.  
Configure the switch IP interface.  
Configure the default gateways.  
n
n
Configure the switch at each site to act as the DNS server for each service that is hosted on  
its virtual servers. Also, configure the local DNS server to recognize the switch as the  
authoritative DNS server for the hosted services.  
Configure the switch at each site for local SLB.  
Define each local real server.  
Group local real servers into real server groups.  
Define the local virtual server with its IP address, services, and real server groups.  
Define the switch port states.  
Enable SLB.  
n
Finally, configure each switch so that it recognizes its remote peers.  
Configure a remote real server entry on each switch for each remote service.  
Add the remote real server entry to an appropriate real server group.  
Enable GSLB.  
Chapter 12: Global Server Load Balancing  
293  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Example GSLB Topology  
Consider the following example network:  
California Site  
200.200.200.X Network  
Denver Site  
174.14.70.X Network  
DNS Server:  
DNS Server:  
200.200.200.102  
174.14.70.102  
A
D
Web Switch  
Web Switch  
B
C
Internet  
Default Gateway:  
200.200.200.101  
Default Gateway:  
174.14.70.101  
IP Interface:  
IP Interface:  
174.14.70.100  
Virtual Server:  
174.14.70.1  
200.200.200.100  
Virtual Server:  
200.200.200.1  
Web Servers:  
200.200.200.2  
200.200.200.3  
Web Servers:  
174.14.70.3  
Figure 12-2 GSLB Topology Example  
In the following examples, many of the options are left to their default values. See Additional  
Server Load Balancing Optionson page 128 for more options.  
GSLB Requirements  
The following is required prior to configuration:  
n
n
You must be connected to the switch Command Line Interface (CLI) as the administrator.  
Both of the following optional software keys must be activated:  
SLB  
GSLB  
NOTE For details about any of the processes or menu commands described in this example,  
see the Web OS Command Reference.  
294  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Task 1: Configure the Basics at the California Site  
1. If the Browser-Based Interface (BBI) is to be used for managing the California switch,  
change its service port.  
GSLB uses service port 80 on the IP interface for DSSP updates. By default, the Web OS  
Browser-Based Interface (BBI) also uses port 80. Both services cannot use the same port. If the  
BBI is enabled (see the /cfg/sys/httpcommand in Chapter 7 of the Web OS Command  
Reference), configure it to use a different port.  
For example, enter the following command to change the BBI port to 8080:  
>> # /cfg/sys  
(Select the System menu)  
>> System# wport 8080  
(Set service port 8080 for BBI)  
2. On the California switch, define an IP interface.  
The switch IP interface responds when asked to resolve client DNS requests. The IP interface  
must have an IP route to the local real servers. The switch uses this path to determine if the real  
servers can be reached via TCP/IP.  
To configure an IP interface for this example, enter these commands from the CLI:  
>> System# /cfg/ip/if 1  
(Select IP interface 1)  
>> IP Interface 1# addr 200.200.200.100  
>> IP Interface 1# ena  
(Assign IP address for the interface)  
(Enable IP interface 1)  
NOTE This example assumes that all ports and IP interfaces use default VLAN 1, requiring  
no special VLAN configuration for the ports or IP interface.  
3. On the California switch, define the default gateway.  
The router at the edge of the site acts as the default gateway to the Internet. To configure the  
default gateway for this example, enter these commands from the CLI:  
>> IP Interface 1# ../gw 1  
>> Default gateway 1# addr 200.200.200.101(Assign IP address for the gateway)  
>> Default gateway 1# ena (Enable default gateway 1)  
(Select default gateway 1)  
4. Configure the local DNS server to recognize the local GSLB switch as the authoritative  
name server for the hosted services.  
Determine the domain name that will be distributed to both sites and the host name for each  
distributed service. In this example, the California DNS server is configured to recognize  
200.200.200.100 (the IP interface of the California GSLB switch) as the authoritative name  
server for www.foocorp.com.”  
Chapter 12: Global Server Load Balancing  
295  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Task 2: Configure the California Switch for Standard SLB  
1. Assign an IP address to each of the real servers in the local California server pool.  
The real servers in any real server group must have an IP route to the switch that will perform  
the SLB functions. This is most easily accomplished by placing the switches and servers on the  
same IP subnet, although advanced routing techniques can be used as long as they do not vio-  
late the topology rules outlined in Network Topology Requirementson page 122.  
For this example, the host real servers have IP addresses on the same IP subnet:  
Table 12-1 GSLB Example: California Real Server IP Addresses  
Real Server  
Server A  
IP address  
200.200.200.2  
200.200.200.3  
Server B  
2. On the California switch, define each local real server.  
For each local real server, you must assign a real server number, specify its actual IP address,  
and enable the real server. For example:  
>> Default gateway 1# /cfg/slb/real 1  
>> Real server 1# rip 200.200.200.2  
>> Real server 1# ena  
(Server A is real server 1)  
(Assign IP address to server A)  
(Enable real server 1)  
>> Real server 1# ../real 2  
>> Real server 2# rip 200.200.200.3  
>> Real server 2# ena  
(Server B is real server 2)  
(Assign IP address to server B)  
(Enable real server 2)  
3. On the California switch, define a real server group.  
Combine the real servers into one service group and set the necessary health checking parame-  
ters. In this example, HTTP health checking is used to ensure that Web content is being served.  
If the index.htmlfile is not accessible on a real server during health checks, the real server  
will be marked as down.  
>> Real server 2# ../group 1  
>> Real server group 1# add 1  
>> Real server group 1# add 2  
>> Real server group 1# health http  
(Select real server group 1)  
(Add real server 1 to group 1)  
(Add real server 2 to group 1)  
(Use HTTP for health checks)  
>> Real server group 1# content index.html(Set URL content for health checks)  
296  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
4. On the California switch, define a virtual server.  
All client requests will be addressed to a virtual server IP address defined on the switch. Cli-  
ents acquire the virtual server IP address through normal DNS resolution. HTTP uses well-  
known TCP port 80. In this example, HTTP is configured as the only service running on this  
virtual server IP address and, is associated with the real server group. For example:  
>> Real server group 1# ../virt 1  
>> Virtual server 1# vip 200.200.200.1  
>> Virtual Server 1# service 80  
(Select virtual server 1)  
(Assign a virtual server IP address)  
>> Virtual server 1 http Service# group 1 (Associate virtual port to real group)  
>> Virtual server 1 http Service# ../ena (Enable virtual server)  
NOTE This configuration is not limited to HTTP services. For a list of other well-known  
TCP/IP services and ports, see Table 6-3 on page 128.  
5. On the California switch, define the type of Layer 4 traffic processing each port must  
support.  
In this example, the following ports are being used on the Web switch:  
Table 12-2 GSLB Example: California Alteon 180 Port Usage  
Port  
Host  
Layer 4 Processing  
1
2
6
Server A  
Server B  
Server  
Server  
Client  
Default Gateway Router. This connects the switch to the Internet  
where all client requests originate.  
The ports are configured as follows:  
>> Virtual server 1# /cfg/slb/port 1  
>> SLB port 1# server ena  
>> SLB port 1# ../port 2  
(Select physical switch port 1)  
(Enable server processing on port 1)  
(Select physical switch port 2)  
>> SLB port 2# server ena  
>> SLB port 2# ../port 6  
(Enable server processing on port 2)  
(Select physical switch port 6)  
>> SLB port 6# client ena  
(Enable client processing on port 6)  
6. On the California switch, enable SLB.  
>> SLB port 6# /cfg/slb  
>> Layer 4# on  
(Select the SLB Menu)  
(Turn SLB on)  
Chapter 12: Global Server Load Balancing  
297  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Task 3: Configure the California Site for GSLB  
1. On the California switch, define each remote site.  
When you start configuring at the California site, California is local and Denver is remote. Add  
and enable the remote switchs IP address interface. In this example, there is only one remote  
site: Denver, with an IP interface address of 174.14.70.100. The following commands are used:  
>> Layer 4# gslb/site 1  
>> Remote site 1# prima 174.14.70.100  
>> Remote site 1# ena  
(Select remote site 1)  
(Define remote interface)  
(Enable remote site 1)  
Each additional remote site would be configured in the same manner. You can enable up to 64  
remote sites with a total aggregate of 2048 service/site combinations.  
2. On the California switch, assign each remote distributed service to a local virtual server.  
Configure the local California site to recognize the services offered at the remote Denver site.  
To do this, configure one real server entry on the California switch for each virtual server  
located at each remote site. Since there is only one remote site (Denver) with only one virtual  
server, only one more local real server entry is needed at the California site.  
The new real server entry is configured with the IP address of the remote virtual server rather  
than the usual IP address of a local physical server. Do not confuse this value with the IP inter-  
face address on the remote switch.  
Also, the remote parameter is enabled, and the real server entry is added to the real server  
group under the local virtual server for the intended service. Finally, since the real server health  
checks are performed across the Internet, the health-checking interval should be increased to  
30 or 60 seconds to avoid generating excess traffic. For example:  
>> Remote site 1# /cfg/slb/real 3  
>> Real server 3# rip 174.14.70.1  
>> Real server 3# remote enable  
>> Real server 3# inter 60  
(Create an entry for real server 3)  
(Set remote virtual server IP address)  
(Define the real server as remote)  
(Set a high health check interval)  
(Enable the real server entry)  
>> Real server 3# ena  
>> Real server 3# ../group 1  
>> Real server group 1# add 3  
(Select appropriate real server group)  
(Add real server 3 to the group 1)  
NOTE Take care to note where each configured value originates or this step can result in  
improper configuration.  
298  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
3. On the California switch, define the domain name and host name for each service hosted  
on each virtual server.  
In this example, the domain name for the Foo Corporation is foocorp.com,and the host  
name for the only service (HTTP) is www.These values are configured as follows:  
>> Real server group 1# ../virt 1  
>> Virtual server 1# dname foocorp.com  
(Select virtual server 1)  
(Define domain name)  
>> Virtual server 1# service 80/hname www (Define HTTP host name)  
To define other services (such as FTP), make additional hostname entries.  
4. On the California switch, turn on GSLB.  
>> Virtual server 1# ../gslb  
(Select the GSLB Menu)  
>> Global SLB# on  
(Activate GSLB for the switch)  
5. Apply and verify the configuration.  
>> Global SLB# apply  
>> Global SLB# cur  
>> Global SLB# /cfg/slb/cur  
(Make your changes active)  
(View current GSLB settings)  
(View current SLB settings)  
Examine the resulting information. If any settings are incorrect, make and apply any appropri-  
ate changes, and then check again.  
6. Save your new configuration changes.  
>> Layer 4# save  
(Save for restore after reboot)  
Task 4: Configure the Basics at the Denver Site  
Following the same procedure described for California (see Example GSLB Topologyon  
page 294), configure the Denver site as follows:  
1. If the Web OS BBI is to be used for managing the Denver switch, change its service port.  
>> # /cfg/sys  
(Select the System menu)  
>> System# wport 8080  
(Set service port 8080 for BBI)  
Chapter 12: Global Server Load Balancing  
299  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
2. On the Denver switch, define an IP interface.  
>> # /cfg/ip/if 1  
(Select IP interface 1)  
>> IP Interface 1# addr 174.14.70.100  
>> IP Interface 1# ena  
(Assign IP address for the interface)  
(Enable IP interface 1)  
3. On the Denver switch, define the default gateway.  
>> IP Interface 1# ../gw 1  
(Select default gateway 1)  
>> Default gateway 1# addr 174.14.70.101 (Assign IP address for the gateway)  
>> Default gateway 1# ena (Enable default gateway 1)  
4. Configure the local DNS server to recognize the local GSLB switch as the authoritative  
name server for the hosted services.  
The Denver DNS server is configured to recognize 174.14.70.100 (the IP interface of the Den-  
ver GSLB switch) as the authoritative name server for www.foocorp.com.”  
Task 5: Configure the Denver Switch for Standard SLB  
1. Assign an IP address to each of the real servers in the local Denver server pool.  
Table 12-3 Denver Real Server IP Addresses  
Real Server  
Server C  
IP address  
179.14.70.2  
179.14.70.2  
Server D  
2. On the Denver switch, define each local real server.  
>> Default gateway 1# /cfg/slb/real 1  
>> Real server 1# rip 179.14.70.2  
>> Real server 1# ena  
(Server C is real server 1)  
(Assign IP address for Server C)  
(Enable real server 1)  
>> Real server 1# ../real 2  
>> Real server 2# rip 179.14.70.3  
>> Real server 2# ena  
(Server D is real server 2)  
(Assign IP address for Server D)  
(Enable real server 2)  
300  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
3. On the Denver switch, define a real server group.  
>> Real server 2# ../group 1  
>> Real server group 1# add 1  
>> Real server group 1# add 2  
>> Real server group 1# health http  
(Select real server group 1)  
(Add real server 1 to group 1)  
(Add real server 2 to group 1)  
(Use HTTP for health checks)  
>> Real server group 1# content index.html(Set URL content for health checks)  
4. On the Denver switch, define a virtual server.  
>> Real server group 1# ../virt 1  
>> Virtual server 1# vip 179.14.70.1  
>> Virtual server 1# service http  
(Select virtual server 1)  
(Assign IP address)  
(Select the HTTP service menu)  
>> Virtual server 1 http service# group 1 (Associate virtual port to real group)  
>> Virtual server 1 http service# ../ena (Enable the virtual server)  
5. On the Denver switch, define the type of Layer 4 processing each port must support.  
In this example, the following ports are being used on the Alteon 180 Web switch:  
Table 12-4 Web Host Example: Alteon 180 Port Usage  
Port  
Host  
Layer 4 Processing  
3
4
5
Server C  
Server D  
Server  
Server  
Client  
Default Gateway Router. This connects the switch to the Internet  
where all client requests originate.  
The ports are configured as follows:  
>> Virtual server 1# /cfg/slb/port 3  
>> SLB port 3# server ena  
>> SLB port 3# ../port 4  
(Select physical switch port 3)  
(Enable server processing on port 3)  
(Select physical switch port 4)  
>> SLB port 4# server ena  
>> SLB port 4# ../port 5  
(Enable server processing on port 4)  
(Select physical switch port 5)  
>> SLB port 5# client ena  
(Enable client processing on port 5)  
6. On the Denver switch, enable SLB.  
>> SLB port 5# /cfg/slb  
>> Layer 4# on  
(Select the SLB Menu)  
(Turn SLB on)  
Chapter 12: Global Server Load Balancing  
301  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Task 6: Configure the Denver Site for GSLB  
Following the same procedure described for California (see Task 3: Configure the California  
Site for GSLBon page 298), configure the Denver site as follows:  
1. On the Denver switch, define each remote site.  
When you start configuring at the Denver site, Denver is local and California is remote. Add  
and enable the remote switchs IP address interface. In this example, there is only one remote  
site: California, with an IP interface address of 200.200.200.100. The following commands are  
used:  
>> Layer 4# gslb/site 1  
(Select remote site 1)  
>> Remote site 1# prima 200.200.200.100  
>> Remote site 1# ena  
(Define remote IP interface address)  
(Enable remote site 1)  
Each additional remote site would be configured in the same manner. You can enable up to 64  
remote sites with a total aggregate of 2048 service/site combinations.  
2. On the Denver switch, assign each remote distributed service to a local virtual server.  
In this step, the local Denver site is configured to recognize the services offered at the remote  
California site. As before, configure one real server entry on the Denver switch for each virtual  
server located at each remote site. Since there is only one remote site (California) with only  
one virtual server, only one more local real server entry is needed at the Denver site.  
The new real server entry is configured with the IP address of the remote virtual server, rather  
than the usual IP address of a local physical server. Do not confuse this value with the IP inter-  
face address on the remote switch.  
Also, the remote parameter is enabled, and the real server entry is added to the real server  
group under the local virtual server for the intended service. Finally, since the real server health  
checks are headed across the Internet, the health-checking interval should be increased to 30 or  
60 seconds to avoid generating excess traffic.  
302  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
For example:  
>> Remote site 1# /cfg/slb/real 3  
>> Real server 3# rip 200.200.200.1  
>> Real server 3# remote enable  
>> Real server 3# inter 60  
(Create an entry for real server 3)  
(Set remote virtual server IP address)  
(Define the real server as remote)  
(Set a high health check interval)  
(Enable the real server entry)  
>> Real server 3# ena  
>> Real server 3# ../group 1  
>> Real server group 1# add 3  
(Select appropriate. real server group)  
(Add real server 3 to group 1)  
NOTE Take care to note where each configured value originates or this step can result in  
improper configuration.  
3. On the Denver switch, define the domain name and host name for each service hosted on  
each virtual server.  
These will be the same as for the California switch: the domain name is foocorp.com,and  
the host name for the HTTP service is www.These values are configured as follows:  
>> Real server group 1# ../virt 1  
>> Virtual server 1# dname foocorp.com  
>> Virtual server 1# service 80  
(Select virtual server 1)  
(Define domain name)  
(Select HTTP for virtual server)  
(Define HTTP hostname)  
>> Virtual server 1 http# hname www  
4. On the Denver switch, turn on GSLB.  
>> Virtual server 1 http# /cfg/slb/gslb/on(Activate GSLB for the switch)  
5. Apply and verify the configuration.  
>> Global SLB# apply  
>> Global SLB# cur  
>> Global SLB# /cfg/slb/cur  
(Make your changes active)  
(View current GSLB settings)  
(View current SLB settings)  
Examine the resulting information. If any settings are incorrect, make and apply any appropri-  
ate changes, and then check again.  
6. Save your new configuration changes.  
>> Layer 4# save  
(Save for restore after reboot)  
Chapter 12: Global Server Load Balancing  
303  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
IP Proxy for Non-HTTP Redirects  
Typically, client requests for HTTP applications are automatically redirected to the location  
with the best response and least load for the requested content. This is because the HTTP proto-  
col has a built-in redirection function that allows requests to be redirected to an alternate site.  
If a client requests a non-HTTP application such as FTP, POP3, or SMTP, then the lack of a  
redirection function in these applications requires that a proxy IP address be configured on the  
client port. The client port will initiate a redirect only if resources are unavailable at the first site.  
NOTE This feature should be used as a method of last resort for GSLB implementations in  
topologies where the remote servers are usually virtual server IP addresses in other Alteon  
Web switches.  
Figure 12-3 illustrates the packet-flow of HTTP and non-HTTP redirects in a GSLB environ-  
ment.  
Client Site  
HTTP Applications  
DNS  
Non HTTP Applications  
DNS  
Request  
Site 1  
Site 2  
DNS  
Web Switch  
1a  
Web Switch  
1b  
2b  
2a  
Web  
Servers  
Internet  
Web  
Servers  
Proxy IP address is  
configured on Client  
port for non-HTTP  
applications.  
DNS  
Figure 12-3 HTTP and Non-HTTP Redirects  
304  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Table 12-5 explains the packet -flow process in detail. In this example, the initial DNS request  
from the client reaches Site 2, but Site 2 has no available services.  
Table 12-5 HTTP Versus Non-HTTP Redirects  
Site 2 Web switch  
Site 1 Web switch  
HTTP application  
(built-in redirection)  
1a. Client DNS request reaches Site 2.  
Resources are unavailable at Site 2.  
Site 2 sends a response to Client with Site 1s  
virtual server IP address.  
1b. Client resends request to Site 1.  
Resources are available at Site 1.  
Site 1 completes TCP three-way handshake with  
client.  
Non-HTTP application 2a. Client DNS request reaches Site 2.  
2b. Site 1 processes the client proxy IP request.  
Resources are available at Site 1.  
(no redirection)  
Resources are unavailable at Site 2.  
Site 2 sends a request to Site 1 with Site 2s  
proxy IP address as the source IP address and  
Site 1 returns request to proxy IP port on Site 2.  
Site 2 completes the three-way handshake with  
the virtual server IP address of Site 1 as the des- Client.  
tination IP address.  
How IP Proxy Works  
Figure 12-4 shows examples of two GSLB sites deployed in California and Denver. The appli-  
cations being load balanced are HTTP and POP3. Any request that cannot be serviced locally  
is sent to the peer site. HTTP requests are sent to the peer site using HTTP Redirect. Any other  
application request will be sent to the peer site using the IP proxy feature.  
California Site #1  
Denver: Site #2  
200.200.200.X Network  
174.14.70.X Network  
Service requests are always served by  
local real servers if available.  
Proxy Disabled For  
Local Real Servers  
Proxy Disabled For  
Local Real Servers  
D
A
Proxy IP Address  
200.200.200.4  
Proxy IP Address  
174.14.70.4  
Web Switch  
Web Switch  
C
B
Internet  
HTTP/POP3  
Local Servers  
174.14.70.2  
174.14.70.3  
Virtual Server  
200.200.200.1  
Virtual Server  
174.14.70.1  
HTTP/POP3  
Local Servers  
200.200.200.2  
200.200.200.3  
Proxy Enabled For  
Remote Server  
Proxy Enabled For  
Remote Server  
Remote Server  
200.200.200.1  
Remote Server  
174.14.70.1  
If local real servers cannot service the request,  
the remote server is used via proxy.  
Figure 12-4 POP3 Request Fulfilled via IP Proxy  
Chapter 12: Global Server Load Balancing  
305  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
The following procedure explains the three-way handshake between the two sites and the cli-  
ent for a non-HTTP application (POP3). When POP3 processes at Site 1 terminate because of  
operator error, the following events occur to allow POP3 requests to be fulfilled:  
1. A user POP3 TCPSYNrequest is received by the virtual server at Site 1. The switch at  
that site determines that there are no local resources to handle the request.  
2. The Site 1 switch rewrites the request such that it now contains a client proxy IP address  
as the source IP address, and the virtual server IP address at Site 2 as the destination IP  
address.  
3. The switch at Site 2 receives the POP3 TCPSYNrequest to its virtual server. The request  
looks like a normal SYNframe, so it performs normal local load-balancing.  
4. Internally at Site 2, the switch and the real servers exchange information. The TCPSYN  
ACKfrom Site 2s local real server is sent back to the IP address specified by the proxy IP  
address.  
5. The Site 2 switch sends the TCPSYNACKframe to Site 1, with Site 2s virtual server IP  
address as the source IP address, and Site 1s proxy IP address as the destination IP  
address.  
6. The switch at Site 1 receives the frame and translates it, using Site 1s virtual server IP  
address as the source IP address and the clients IP address as the destination IP address.  
This cycle continues for the remaining frames to transmit all the clients mail, until a FIN  
frame is received.  
306  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring Proxy IP Addresses  
Refer to the example starting on page 294 and Figure 12-4, the switch at Site 1 in California is  
configured with switch port 6 connecting to the default gateway and real server 3 represents  
the remote server in Denver.  
The following commands are used at Site 1 in California to configure the proxy IP address for  
the remote server in Denver:  
NOTE If any port is configured with a proxy IP address, then all ports (except port 9) must  
be configured with a unique proxy IP address prior to enabling Virtual Matrix Architecture  
(VMA). Once they are configured, proxy IP addresses not in use can be disabled.  
>> # /cfg/slb/port 6  
>> SLB port 6# pip 200.200.200.4  
>> SLB port 6# proxy enable  
>> SLB port 6 ../real 1/proxy disable  
>> Real server 1# ../real 2/proxy disable  
>> Real server 2# ../real 3/proxy enable  
>> Real server 3# apply  
(Select port to default gateway)  
(Set unique proxy IP address)  
(Enable proxy for switch port 6)  
(Disable local real server proxy)  
(Disable proxy for local server)  
(Enable proxy for remote server)  
(Apply configuration changes)  
(Save configuration changes)  
>> Real server 3# save  
If you want to configure proxy IP addresses on Site 2, the following commands are issued on  
the Denver switch:  
>> # /cfg/slb/port 5  
>> SLB port 5# pip 174.14.17.4  
>> SLB port 5# proxy enable  
>> SLB port 5# ../real 1/proxy disable  
>> Real server 1# ../real 2/proxy disable  
>> Real server 2# ../real 3/proxy enable  
>> Real server 3# apply  
(Select port to default gateway)  
(Set unique proxy IP address)  
(Enable proxy for switch port 5)  
(Disable local real server proxy)  
(Disable local real server proxy)  
(Enable proxy for remote server)  
(Apply configuration changes)  
(Save configuration changes)  
>> Real server 3# save  
Chapter 12: Global Server Load Balancing  
307  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Verifying GSLB Operation  
n
Use your browser to request the configured service (www.foocorp.comin the previous  
example).  
n
n
Examine the /info/slbinformation on each switch.  
Check to see that all SLB parameters are working according to expectation. If necessary,  
make any appropriate configuration changes and then check the information again.  
n
Examine the following statistics on each switch:  
/stats/slb/gslb/virt <virtual server number>  
/stats/slb/gslb/group <real server group number>  
/stats/slb/maint  
Configuring Client Site Preferences  
Internet Assigned Numbers Authority (IANA), the central coordinator for the assignment of  
unique parameter values for Internet protocols, does not provide sufficient geographic separa-  
tion of client proximity information. As a result, large ISP partners cannot use their own geo-  
graphic data to determine GSLB site selection based on client location. However, using static  
client-to-sitemapping in Web OS software, you can configure client proximity tables to select  
GSLB sites based on client location.  
The use of a static client/site database allows you to customize the client environment. The  
proximity database is limited to 128 entries. The GSLB client proximity table is supported for  
HTTP protocol.  
308  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Figure 12-5 illustrates GSLB proximity tables. The client sends a request to the DNS server,  
which is forwarded to the master switch. The master switch looks through its proximity table  
and returns the request to the DNS server with the virtual server IP address of the preferred  
site. The DNS server sends a new request through the Internet and connects the client to the  
preferred site.  
4.CLIENT REQUEST FORWARDED  
TO NEAREST LOCATION  
DATABASE FIELDS  
<IP ADDRESS> <NETMASK> <VIP>  
3.MASTER  
SWIT CH LOOKS AT  
DATABASE AND RESPONDS  
1. CLIENT SENDS REQUEST  
TO LOCAL DNS SERVER  
2. DNS REQUEST  
SENT TO MASTER  
SWIT CH  
Figure 12-5 GSLB Proximity Tables: How They Work  
The following example illustrated in Figure 12-6 on page 310 shows how to add entries into a  
GSLB proximity table. Two client networks, A and B, are configured in the proximity table on  
the master switch at Site 4. Client A with a subnet address of 205.178.13.0 is configured with  
static entries for preferred Sites 1 and 3. Client B, with a subnet address of 204.165.0.0, is con-  
figured with static entries for preferred Sites 2 and 4.  
Chapter 12: Global Server Load Balancing  
309  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Client A, with a source IP address of 205.178.13.10, initiates a request that is sent to the local  
DNS server. The local DNS server is configured to forward requests to the DNS server at Site  
4. The Web switch at Site 4 looks up its proximity table and finds Client A prefers to connect  
to Sites 1 or 3. Similarly, Client Bs requests are always forwarded to Sites 2 or 4.  
1. Client sites A and B send requests to  
their DNS servers which are forwarded  
to the master switch at Site 4.  
Client Site A  
Client Site B  
205.178.13.0  
Prefers  
Sites 1 and 3  
204.165.0.0  
Prefers  
Sites 2 and 4  
2. The master switch looks through its  
proximity table and responds to the  
DNS request by providing the virtual  
IP address of the preferred site.  
DNS  
Request  
DNS  
Request  
3. The client sends out a new request  
and connects to the preferred site.  
Site 1  
Site 4  
DNS  
DNS  
Web Switch  
IF: 4.4.4.4 / 24  
VIP: 4.4.4.100  
Web Switch  
IF: 1.1.1.1 / 24  
Internet  
Web  
Servers  
Web  
Servers  
VIP: 1.1.1.100  
Master switch returns  
Client's request with the  
VIP of the preferred site  
Site 2  
Site 3  
DNS  
DNS  
Web Switch  
IF: 2.2.2.2 / 24  
VIP: 2.2.2.100  
Web Switch  
IF: 3.3.3.3 / 16  
VIP: 3.3.3.100  
Web  
Servers  
Web  
Servers  
Figure 12-6 Configuring Client Proximity Table  
You can add static entries in the proximity table for up to 128 client networks.  
NOTE Web OS allows you to configure a single domain only and for each client subnet you  
can configure up to two preferred sites.  
The Web switch forwards the client request based on the minimum available sessions and  
response time between the two preferred sites.  
310  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Use the following commands to configure a proximity table on the Web switch at Site 4:  
>> # /cfg/slb/gslb/lookup/lookups ena  
>> # dname nortelnetworks.com  
>> # network 1  
(Enable the lookup or proximity table)  
(Select the domain name)  
(Select Client A subnet)  
>> # sip 205.178.13.0  
>> # mask 255.255.255.0  
>> # vip1 <virtual server IP addr of Site 3>  
>> # vip2 <virtual server IP addr of Site 1>  
>> # ../network 2  
(Assign source address for Client A)  
(Assign the mask for Client A)  
(Select preferred Site 3)  
(Select preferred Site 1)  
(Select Client B subnet)  
>> # sip 204.165.0.0  
>> # mask 255.255.0.0  
>> # vip1 <virtual server IP add of Site 4>  
>> # vip2 <virtual server IP add of Site 2>  
(Assign source address for Client B)  
(Assign the mask for Client B)  
(Select preferred Site 4)  
(Select preferred Site 2)  
NOTE For each client subnet, add only one static entry.  
Using this configuration, the DNS request nortelnetworks.comfrom 205.178.13.0 will get a  
DNS response with only the virtual server IP address of Site 1, if Site 1 has less load than  
Site 3.  
Chapter 12: Global Server Load Balancing  
311  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Using Border Gateway Protocol for GSLB  
Border Gateway Protocol (BGP)-based GSLB utilizes the Internets routing protocols to local-  
ize content delivery to the most efficient and consistent site. It does so by using a shared IP  
block that co-exists in each Internet Service Providers (ISPs) network and is then advertised,  
using BGP, throughout the Internet.  
Because of the way IP routing works, BGP-based GSLB allows for the routing protocols to  
route DNS requests to the closest location, which then returns IP addresses of that particular  
site, locking in the requests to that site. In effect, the Internet is making the decision of the best  
location for you, avoiding the need for advanced GSLB.  
Some corporations use more than one ISP as a way to increase the reliability and bandwidth of  
their Internet connection. Enterprises with more than one ISP are referred to as being multi-  
homed. Instead of multi-homing a network to several other networks, BGP-based GSLB  
enables you to multi-home a particular piece of content (DNS information) to the Internet by  
distributing the IP blocks that contain that content to several sites.  
When using DNS to select the site, a single packet is used to make the decision so that the  
request will not be split to different locations. Through the response to the DNS packet, a client  
is locked in to a particular site, resulting in efficient, consistent service that cannot be achieved  
when the content itself is shared.  
For example, in multi-homing, you can connect a data center to three different Internet provid-  
ers and have one DNS server that has the IP address 1.1.1.1. In this case, all requests can be  
received via any given feed but are funneled to the same server on the local network. In BGP-  
based GSLB, the DNS server (with the IP address 1.1.1.1) is duplicated and placed local to the  
peering point instead of having a local network direct traffic to one server.  
When a particular DNS server receives a request for a record (in this case, the Web switch), it  
returns with the IP address of a virtual server at the same site. This can be achieved using the  
localoption (/cfg/slb/gslb/localena) in the GSLB configuration. If one site is  
saturated, then the switch will failover and deliver the IP address of a more available site.  
For more information on configuring your switch to support BGP routing, see Border Gate-  
way Protocol (BGP)on page 36.  
312  
Chapter 12: Global Server Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CHAPTER 13  
Firewall Load Balancing  
Firewall Load Balancing (FWLB) with Alteon Web switches allows multiple active firewalls  
to operate in parallel. Parallel operation allows users to maximize firewall productivity, scale  
firewall performance without forklift upgrades, and eliminate the firewall as a single point-of-  
failure.  
n
n
Firewall Overviewon page 314  
An overview of firewalls and the various FWLB solutions supported by Alteon Web  
switches.  
Basic FWLBon page 316  
Explanation and example configuration for FWLB in simple networks, using two parallel  
firewalls and two Web switches. The basic FWLB method combines redirection filters and  
static routing for FWLB.  
n
n
Four-Subnet FWLBon page 326  
Explanation and example configuration for FWLB in a large-scale, high-availability net-  
work with redundant firewalls and Web switches. This method combines redirection fil-  
Advanced FWLB Conceptson page 346  
Free-Metric FWLBon page 346. Using other load balancing metrics (besides  
hash) by enabling the Return to Sender (RTS) option.  
Adding a Demilitarized Zone (DMZ)on page 349. Adding a DMZ for servers that  
attach to the Web switch between the Internet and the firewalls.  
Firewall Health Checkson page 351. Methods for fine-tuning the health checks  
performed for FWLB.  
313  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Firewall Overview  
Firewall devices have become indispensable for protecting network resources from unautho-  
rized access. Prior to FWLB, however, firewalls could become critical bottlenecks or single  
points-of-failure for your network.  
As an example, consider the following network:  
"Dirty" Public Network  
Firewall  
"Clean" Private Network  
Private  
Network  
Internet  
DMZ  
Figure 13-1 Typical Firewall Configuration Before FWLB  
One network interface card on the firewall is connected to the public side of the network, often  
to an Internet router. This is known as the dirty or untrusted side of the firewall. Another net-  
work interface card on the firewall is connected to the side of the network with the resources  
that must be protected. This is known as the clean or trusted side of the firewall.  
In this simple example, all traffic passing between the dirty, clean, and DMZ networks must  
traverse the firewall, which examines each individual packet. The firewall is configured with a  
detailed set of rules that determine which types of traffic are allowed and which types are  
denied. Heavy traffic can turn the firewall into a serious bottleneck. The firewall is also a sin-  
gle point-of-failure device. If it goes out of service, external clients can no longer reach your  
services and internal clients can no longer reach the Internet.  
Sometimes, a Demilitarized Zone (DMZ) is attached to the firewall or between the Internet and  
the firewall. Typically, a DMZ contains its own servers that provide dirty-side clients with  
access to services, making it unnecessary for dirty-side traffic to use clean-side resources.  
FWLB with Alteon Web switches provides a variety of options that enhance firewall perfor-  
mance and resolve typical firewall problems.  
314  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Alteon Web switches support the following methods of FWLB:  
n Basic FWLB for simple networks  
This method uses a combination of static routes and redirection filters and is usually  
employed in smaller networks.  
A Web switch filter on the dirty-side splits incoming traffic into streams headed for differ-  
ent firewalls. To ensure persistence of session traffic through the same firewall, distribu-  
tion is based on a mathematical hash of the IP source and destination addresses.  
For more information about basic FWLB, see Basic FWLBon page 316.  
n
Four-Subnet FWLB for larger networks  
Although similar to basic FWLB, the four-subnet method is more often deployed in larger  
networks that require high-availability solutions. This method adds Virtual Router Redun-  
dancy Protocol (VRRP) to the configuration.  
Just as with the basic method, four-subnet FWLB uses the hashmetric to distribute fire-  
wall traffic and maintain persistence.  
For more information, see Four-Subnet FWLBon page 326.  
Each method is described in more detail in the following sections.  
Chapter 13: Firewall Load Balancing  
315  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Basic FWLB  
The basic FWLB method uses a combination of static routes and redirection filters to allow  
multiple active firewalls to operate in parallel.  
Figure 13-2 shows a basic FWLB topology:  
"Dirty" Side of Network  
"Clean" Side of Network  
Internal  
Network  
Internet  
Web Switch  
Web Switch  
Firewalls  
Figure 13-2 Basic FWLB Topology  
The firewalls being load balanced are in the middle of the network, separating the dirty side  
from the clean side. This configuration requires a minimum of two Web switches: one on the  
dirty side of the firewalls and one on the clean side.  
A redirection filter on the dirty-side Web switch splits incoming client traffic into multiple  
streams. Each stream is routed through a different firewall. The valid client traffic in each  
stream is forwarded to a virtual server on the clean-side Web switch. The clean-side Web  
switch uses Server Load Balancing (SLB) settings to select a real server on the internal net-  
work for each incoming request. The same process is used for outbound server responses; a  
redirection filter on the clean-side Web switch splits the traffic, and static routes forward each  
stream through a different firewall and then back to the client.  
Although other metrics can be used in some configurations (see Free-Metric FWLBon page  
346), the distribution of traffic within each stream is normally based on a mathematical hash of  
the IP source and destination addresses. This ensures that each client request and its related  
responses will use the same firewall (a feature known as persistence) and that the streams will  
be roughly equal in traffic load.  
Although basic firewall load-balancing techniques can support more firewalls as well as multi-  
ple switches on the clean and dirty sides for redundancy, the configuration complexity  
increases dramatically. The four-subnet FWLB solution is usually preferred in larger scale,  
high-availability topologies (see page 326).  
316  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Basic FWLB Implementation  
In this example, traffic is load balanced among the available firewalls.  
"Dirty" Side  
Firewalls  
"Clean" Side  
Servers  
Web Switch  
Web Switch  
4
9
Client  
3
5
8
Internet  
1
2
10  
7
6
1. Client sends a request  
2. Redir filter selects upper or lower path  
3. Static route directs request through  
the selected firewall  
4. Firewall forwards valid traffic  
5. SLB selects an available server  
6. Server responds  
7. Redir filter selects reverse path  
8. Static route directs response back  
through the same firewall  
9. Firewall forwards valid traffic  
10. Client receives response  
Figure 13-3 Basic FWLB Process  
1. The client requests data.  
The external clients intend to connect to services at the publicly advertised IP address assigned  
to a virtual server on the clean-side Web switch.  
2. A redirection filter balances incoming requests among different IP addresses.  
When the client request arrives at the dirty-side Web switch, a filter redirects it to a real server  
group that consists of a number of different IP addresses. This redirection filter splits the traffic  
into balanced streams: one for each IP address in the real server group. For FWLB, each IP  
address in the real server group represents an IP Interface (IF) on a different subnet on the  
clean-side Web switch.  
3. Requests are routed to the firewalls.  
On the dirty-side switch, one static route is needed for each traffic stream. For instance, the first  
static route will lead to an IP interface on the clean-side Web switch using the first firewall as  
the next hop. A second static route will lead to a second clean-side IP interface using the second  
firewall as the next hop, and so on. By combining the redirection filter and static routes, traffic  
is load balanced among all active firewalls.  
All traffic between specific IP source/destination address pairs flows through the same fire-  
wall, ensuring that sessions established by the firewalls persist for their duration.  
NOTE More than one stream can be routed though a particular firewall. You can weight the  
load to favor one firewall by increasing the number of static routes that traverse it.  
Chapter 13: Firewall Load Balancing  
317  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
4. The firewalls decide if they should allow the packets and, if so, forwards them to a virtual  
server on the clean-side Web switch.  
Client requests are forwarded or discarded according to rules configured for each firewall.  
NOTE Rule sets must be consistent across all firewalls.  
5. The clean-side Web switch performs normal SLB functions.  
Packets forwarded from the firewalls are sent to the original destination address, that is, the vir-  
tual server on the clean-side Web switch. There, they are load balanced to the real servers using  
standard SLB configuration.  
6. The real server responds to the client request.  
7. Redirection filters on the clean-side Web switch balance responses among different IP  
addresses.  
Redirection filters are needed on all ports on the clean-side Web switch that attach to real serv-  
ers or internal clients on the clean-side of the network. Filters on these ports redirect the Inter-  
net-bound traffic to a real server group that consists of a number of different IP addresses. Each  
IP address represents an IP interface on a different subnet on the dirty-side Web switch.  
8. Outbound traffic is routed to the firewalls.  
Static routes are configured on the clean-side switch. One static route is needed for each stream  
that was configured on the dirty-side Web switch. For instance, the first static route would be  
configured to lead to the first dirty-side IP interface using the first firewall as the next hop. The  
second static route would lead to the second dirty-side IP interface using the second firewall as  
the next hop, and so on.  
Since Web switches intelligently maintain state information, all traffic between specific IP  
source/destination addresses flows through the same firewall, maintaining session persistence.  
NOTE If Network Address Translation (NAT) software is used on the firewalls, FWLB ses-  
sion persistence requires the RTS option to be enabled on the Web switch (see Free-Metric  
FWLBon page 346).  
9. The firewall decides if it should allow the packet and, if so, forwards it to the dirty-side  
Web switch.  
Each firewall forwards or discards the server responses according to the rules that are config-  
ured for it. Forwarded packets are sent to the dirty-side Web switch and out to the Internet.  
10. The client receives the server response.  
318  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring Basic FWLB  
The steps for configuring basic FWLB are provided below. While two or four switches can be  
used, the following procedure assumes a simple network topology with only two Web switches  
(one on each side of the firewalls) as shown in Figure 13-4.  
"Dirty" Side  
"Clean" Side  
Firewall 1  
Web Switch 2  
Clean Side:  
Servers  
Dirty Side:  
10.1.1.10  
IF1: 20.1.1.1  
Virtual Server:  
20.1.1.10  
10.1.3.10  
Web Switch 1  
IF1: 192.16.12.1  
2
2
3
4
5
Internet  
1
20.1.1.2  
20.1.1.3  
Firewall 2  
3
IF2: 10.1.3.1  
IF3: 10.1.4.1  
IF2: 10.1.1.1  
IF3: 10.1.2.1  
Dirty Side:  
10.1.2.10  
Clean Side:  
10.1.4.10  
Figure 13-4 Basic FWLB Example Network  
Configure the Dirty-Side Web Switch  
1. Configure VLANs.  
NOTE Alternately, if using hubs between the switches and firewalls and you do not wish to  
configure VLANs, you must enable Spanning Tree Protocol to prevent broadcast loops.  
2. Define the dirty-side IP interface.  
In addition to one IP interface for general switch management, there must be one dirty-side IP  
interface for each firewall path being load balanced. Each must be on a different subnet.  
>> # /cfg/ip/if 1  
(Select IP interface 1)  
>> IP Interface 1# addr 192.16.12.1  
>> IP Interface 1# mask 255.255.255.0  
>> IP Interface 1# ena  
(Set address for switch management)  
(Set subnet mask for interface 1)  
(Enable IP interface 1)  
>> IP Interface 1# ../if 2  
(Select IP interface 2)  
>> IP Interface 2# addr 10.1.1.1  
>> IP Interface 2# mask 255.255.255.0  
>> IP Interface 2# ena  
(Set the IP address for interface 2)  
(Set subnet mask for interface 2)  
(Enable IP interface 2)  
>> IP Interface 2# ../if 3  
(Select IP interface 3)  
>> IP Interface 3# addr 10.1.2.1  
>> IP Interface 3# mask 255.255.255.0  
>> IP Interface 3# ena  
(Set the IP address for interface 3)  
(Set subnet mask for interface 3)  
(Enable IP interface 3)  
Chapter 13: Firewall Load Balancing  
319  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
3. Configure the clean-side IP interface as if they were real servers on the dirty side.  
Later in this procedure, youll configure one clean-side IP interface on a different subnet for  
each firewall path being load balanced. On the dirty-side Web switch, create two real servers  
using the IP address of each clean-side IP interface used for FWLB.  
>> IP Interface 3# /cfg/slb/real 1  
>> Real server 1# rip 10.1.3.1  
>> Real server 1# ena  
(Select real server 1)  
(Assign clean-side IF 2 address)  
(Enable real server 1)  
>> Real server 1# ../real 2  
>> Real server 2# rip 10.1.4.1  
>> Real server 2# ena  
(Select real server 2)  
(Assign clean-side IF 3 address)  
(Enable real server 1)  
NOTE Each of the four interfaces used for FWLB (two on each Web switch) in this example  
must be configured for a different IP subnet.  
4. Place the IP interface real servers into a real server group.  
>> Real server 2# /cfg/slb/group 1  
>> Real server group 1# add 1  
>> Real server group 1# add 2  
(Select real server group 1)  
(Add real server 1 to group 1)  
(Add real server 2 to group 1)  
5. Set the health check type for the real server group to ICMP.  
>> Real server group 1# health icmp  
(Select ICMP as health check type)  
6. Set the load-balancing metric for the real server group to hash.  
>> Real server group 1# metric hash  
(Select SLB hash metric for group 1)  
Using the hashmetric, all traffic between specific IP source/destination address pairs flows  
through the same firewall. This ensures that sessions established by the firewalls are main-  
tained for their duration.  
NOTE Other load balancing metrics such as leastconns, roundrobin, minmiss,  
response, and bandwidthcan be used when enabling the Return to Sender (RTS) option.  
For more information, see Free-Metric FWLBon page 346.  
7. Enable SLB on the switch.  
>> Real server group 1# /cfg/slb/on  
320  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
8. Create a filter to allow local subnet traffic on the dirty side of the firewalls to reach the  
firewall interfaces.  
>> Layer 4# /cfg/slb/filt 10  
>> Filter 10# sip any  
>> Filter 10# dip 192.16.12.0  
>> Filter 10# action allow  
>> Filter 10# ena  
(Select filter 10)  
(From any source IP address)  
(To this destination IP address)  
(Allow frames with this DIP address)  
(Enable filter)  
9. Create the FWLB redirection filter.  
This filter will redirect inbound traffic, load balancing it among the defined real servers in the  
group. In this network, the real servers represent IP interfaces on the clean-side Web switch.  
>> Filter 10# ../filt 15  
>> Filter 15# sip any  
>> Filter 15# dip any  
>> Filter 15# proto any  
>> Filter 15# action redir  
>> Filter 15# group 1  
>> Filter 15# ena  
(Select filter 15)  
(From any source IP address)  
(To any destination IP address)  
(For any protocol)  
(Perform redirection)  
(To real server group 1)  
(Enable the filter)  
10. Add filters to the ingress port.  
>> Filter 15# ../port 1  
>> SLB Port 1# add 10  
>> SLB Port 1# add 15  
>> SLB Port 1# filt ena  
(Select the ingress port)  
(Add the filter to the ingress port)  
(Add the filter to the ingress port)  
(Enable filtering on the port)  
11. Define static routes to the clean-side IP interfaces, using the firewalls as gateways.  
One static route is required for each firewall path being load balanced. In this case, two paths  
are required: one that leads to clean-side IF 2 (10.1.3.1) through the first firewall (10.1.1.10) as  
its gateway, and one that leads to clean-side IF 3 (10.1.4.1) through the second firewall  
(10.1.2.10) as its gateway.  
>> SLB Port 5# /cfg/ip/route  
>> IP Static Route# add 10.1.3.1 255.255.255.255 10.1.1.10  
>> IP Static Route# add 10.1.4.1 255.255.255.255 10.1.2.10  
12. Apply and save the configuration changes.  
>> # apply  
>> # save  
Chapter 13: Firewall Load Balancing  
321  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configure the Clean-Side Web Switch  
1. Define the clean-side IP interfaces.  
Create one clean-side IP interface on a different subnet for each firewall being load balanced.  
NOTE An extra IP interface (IF 1) prevents server-to-server traffic from being redirected.  
>> # /cfg/ip/if 1  
(Select IP interface 1)  
>> IP Interface 1# addr 20.1.1.1  
>> IP Interface 1# mask 255.255.255.0  
>> IP Interface 1# ena  
(Set the IP address for interface 1)  
(Set subnet mask for interface 1)  
(Enable IP interface 1)  
>> IP Interface 1# ../if 2  
>> IP Interface 2# addr 10.1.3.1  
>> IP Interface 2# mask 255.255.255.0  
>> IP Interface 2# ena  
(Select IP interface 2)  
(Set the IP address for interface 2)  
(Set subnet mask for interface 2)  
(Enable IP interface 2)  
>> IP Interface 2# ../if 3  
>> IP Interface 3# addr 10.1.4.1  
>> IP Interface 3# mask 255.255.255.0  
>> IP Interface 3# ena  
(Select IP interface 3)  
(Set the IP address for interface 3)  
(Set subnet mask for interface 3)  
(Enable IP interface 3)  
2. Configure the dirty-side IP interfaces as if they were real servers on the clean side.  
You should already have configured a dirty-side IP interface on a different subnet for each fire-  
wall path being load balanced. Create two real servers on the clean-side switch, using the IP  
address of each dirty-side IP interface.  
>> IP Interface 5# /cfg/slb/real 1  
>> Real server 1# rip 10.1.1.1  
>> Real server 1# ena  
(Select real server 1)  
(Assign dirty-side IF 1 address)  
(Enable real server 1)  
>> Real server 1# ../real 2  
>> Real server 2# rip 10.1.2.1  
>> Real server 2# ena  
(Select real server 2)  
(Assign dirty-side IF 2 address)  
(Enable real server 2)  
NOTE Each of the four IP interfaces (two on each Web switch) in this example must be con-  
figured for a different IP subnet.  
3. Place the real servers into a real server group.  
>> Real server 2# ../group 1  
>> Real server group 1# add 1  
>> Real server group 1# add 2  
(Select real server group 1)  
(Select real server 1 to group 1)  
(Select real server 2 to group 1)  
322  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
4. Set the health check type for the real server group to ICMP.  
>> Real server group 1# health icmp (Select ICMP as health check type)  
5. Set the load-balancing metric for the real server group to hash.  
>> Real server group 1# metric hash  
(Select SLB hash metric for group 1)  
NOTE The clean-side Web switch must use the same metric as defined on the dirty side.  
6. Enable server load balancing on the switch.  
>> Real server group 1# /cfg/slb/on  
7. Configure ports 2 and 3, which are connected to the clean-side of the firewalls, for client  
processing.  
>> Real server group 1# ../port 2/clientena(Enable client processing on port 2)  
>> SLB port 2# ../port 3/client ena  
>> SLB port 3# apply  
(Enable client processing on port 3)  
(Apply the configuration)  
>> SLB port 3# save  
(Save the configuration)  
8. Configure the virtual server that will load balance the real servers.  
>> SLB port 3# ../virt 100  
(Configure virtual server 100)  
>> Virtual Server 100# vip 20.1.1.10  
>> Virtual Server 100# ena  
(Assign virtual server 100 IP address)  
(Enable the virtual server)  
9. Configure the real servers to which traffic will be load-balanced.  
These are the real servers on the network.  
>> Real server group 1# /cfg/slb/real/2  
>> Real server 2 # rip 20.1.1.2  
>> Real server 2 # ena  
(Select real server 2)  
(Assign real server 2 IP address)  
(Enable real server 2)  
>> Real server 2 # ../real 3  
>> Real server 3 # rip 20.1.1.3  
(Select real server 3)  
(Assign real server 3 IP address)  
Chapter 13: Firewall Load Balancing  
323  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
10. Place the real servers into a real server group.  
>> Real server 3# ../group 200  
>> Real server group 200# add 2  
>> Real server group 200# add 3  
(Select real server group 1)  
(Select real server 2 to group 200)  
(Select real server 3 to group 200)  
11. Configure ports 4 and 5, which are connected to the real servers, for server processing.  
>> Real server group 200# ../port 4/server ena  
>> SLB port 4# ../port 5/server ena  
12. Enable server load balancing on the switch.  
>> Real server group 1# /cfg/slb/on  
13. Create a filter to prevent server-to-server traffic from being redirected.  
>> Layer 4# /cfg/slb/filt 10  
>> Filter 10# sip any  
(Select filter 10)  
(From any source IP address)  
(To base IP address for IF 5)  
(For the range of addresses)  
(For any protocol)  
(Allow traffic)  
(Enable the filter)  
>> Filter 10# dip 20.1.1.0  
>> Filter 10# dmask 255.255.255.0  
>> Filter 10# proto any  
>> Filter 10# action allow  
>> Filter 10# ena  
14. Create the redirection filter.  
This filter will redirect outbound traffic, load balancing it among the defined real servers in the  
group. In this case, the real servers represent IP interfaces on the dirty-side switch.  
>> Filter 10# ../filt 15  
>> Filter 15# sip any  
>> Filter 15# dip any  
>> Filter 15# proto any  
>> Filter 15# action redir  
>> Filter 15# group 1  
>> Filter 15# ena  
(Select filter 15)  
(From any source IP address)  
(To any destination IP address)  
(For any protocol)  
(Perform redirection)  
(To real server group 1)  
(Enable the filter)  
324  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
15. Add the filters to the ingress ports for the outbound packets.  
Redirection filters are needed on all the ingress ports on the clean-side Web switch. Ingress  
ports are any that attach to real servers or internal clients on the clean-side of the network. In  
this case, two real servers are attached to the clean-side Web switch on port 4 and port 5.  
>> Filter 15# ../port 4  
>> SLB Port 4# add 10  
>> SLB Port 4# add 15  
>> SLB Port 4# filt ena  
>> SLB Port 4# ../port 5  
>> SLB Port 5# add 10  
>> SLB Port 5# add 15  
>> SLB Port 5# filt ena  
(Select ingress port 4)  
(Add the filter to the ingress port)  
(Add the filter to the ingress port)  
(Enable filtering on the port)  
(Select ingress port 5)  
(Add the filter to the ingress port)  
(Add the filter to the ingress port)  
(Enable filtering on the port)  
16. Define static routes to the dirty-side IP interfaces, using the firewalls as gateways.  
One static route is required for each firewall path being load balanced. In this case, two paths  
are required: one that leads to dirty-side IF 2 (10.1.1.1) through the first firewall (10.1.3.10) as  
its gateway, and one that leads to dirty-side IF 3 (10.1.2.1) through the second firewall  
(10.1.4.10) as its gateway.  
>> SLB Port 5# /cfg/ip/route  
>> IP Static Route# add 10.1.1.1 255.255.255.255 10.1.3.10  
>> IP Static Route# add 10.1.2.1 255.255.255.255 10.1.4.10  
NOTE Configuring static routes for FWLB does not require IP forwarding to be turned on.  
17. Apply and save the configuration changes.  
>> # apply  
>> # save  
Chapter 13: Firewall Load Balancing  
325  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Four-Subnet FWLB  
The four-subnet FWLB method is often deployed in large networks that require high-availabil-  
ity solutions. This method uses filtering, static routing, and Virtual Router Redundancy Proto-  
col (VRRP) to provide parallel firewall operation between redundant Web switches.  
Figure 13-5 shows one possible network topology using the four-subnet method:  
Dirty Side  
Clean Side  
Subnet 4  
Subnet 1  
Subnet 2  
Subnet 3  
Primary  
Primary  
Internet  
Routers  
Simple  
Switches  
Simple  
Switches  
Secondary  
Web Switch  
Firewalls  
Secondary  
Web Switch  
Servers  
Figure 13-5 Four-Subnet FWLB Topology  
This network is classified as a high-availability network because no single component or link  
failure could cause network resources to become unavailable. Simple switches and vertical  
block interswitch connections are used to provide multiple paths for network failover. Nor-  
mally the interswitch link between the primary and secondary Web switches is configured on  
port 9 of the Web switch. However, the interswitch links may trunked together with multiple  
ports for additional protection from failure.  
NOTE Other topologies that use internal hubs, or diagonal cross-connections between the  
Web switches and simple switches are also possible. While such topologies may resolve net-  
working issues in special circumstances, they can make configuration more complex and can  
cause restrictions on the use of advanced features such as Active-Active VRRP, free-metric  
FWLB, or Content Intelligent Switching. Alternate topologies are explored in more detail in  
Web OS FWLB white papers, but are not within the scope of this manual.  
326  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
As shown in Figure 13-5, the network is divided into four sections:  
n
n
Subnet 1 includes all equipment between the exterior routers and dirty-side Web switches.  
Subnet 2 includes the dirty-side Web switches with their interswitch link, and dirty-side  
firewall interfaces.  
n
Subnet 3 includes the clean-side firewall interfaces, and clean-side Web switches with  
their interswitch link.  
n
Subnet 4 includes all equipment between the clean-side Web switches and their servers.  
In this network, external traffic arrives through both routers. Since VRRP is enabled, one of  
the dirty-side Web switches acts as primary and receives all traffic. The dirty-side primary Web  
switch performs FWLB in a fashion similar to basic FWLB: a redirection filter splits traffic  
into multiple streams which are routed through the available firewalls to the primary clean-side  
Web switch.  
Just as with the basic method, four-subnet FWLB uses the hashmetric to distribute firewall  
traffic and maintain persistence, though other load-balancing metrics can be used by configur-  
ing an additional Return to Sender (RTS) option (see Free-Metric FWLBon page 346).  
Four-Subnet FWLB Implementation  
In this example, traffic between the redundant Web switches is load balanced among the avail-  
able firewalls.  
Dirty Side  
Clean Side  
Subnet 4  
Subnet 1  
Subnet 2  
Subnet 3  
Primary  
Primary  
3
2
1
Internet  
Routers  
Simple  
Switches  
Simple  
Switches  
Secondary  
Web Switch  
Firewalls  
Secondary  
Web Switch  
Servers  
1.VRRP forces incoming traffic to converge on primary dirty-side Web switch  
2. Firewall load balancing occurs between primary Web switches  
3. Primary clean-side Web switch performs standard SLB  
Figure 13-6 Four-Subnet FWLB Process  
Chapter 13: Firewall Load Balancing  
327  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
1. Incoming traffic converges on the primary dirty-side Web switch.  
External traffic arrives through redundant routers. A set of interconnected switches ensures  
that both routers have a path to each dirty-side Web switch.  
VRRP is configured on each dirty-side Web switch so that one acts as the primary routing  
switch. If the primary fails, the secondary takes over.  
2. FWLB is performed between primary Web switches.  
Just as with basic FWLB, filters on the ingress ports of the dirty-side Web switch redirect traf-  
fic to a real server group composed of multiple IP addresses. This configuration splits incom-  
ing traffic into multiple streams. Each stream is then routed toward the primary clean-side Web  
switch through a different firewall.  
Although other load balancing metrics can be used in some configurations (see Free-Metric  
FWLBon page 346), the distribution of traffic within each stream is normally based on a  
mathematical hash of the IP source and destination addresses. Hashing ensures that each  
request and its related responses will use the same firewall (a feature known as persistence),  
and that the streams will be statistically equal in traffic load.  
3. The primary clean-side Web switch forwards the traffic to its destination.  
Once traffic arrives at the primary clean-side Web switch, it is forwarded to its destination. In  
this example, the Web switch uses regular server load balancing settings to select a real server  
on the internal network for each incoming request.  
The same process is used for outbound server responses; a filter on the clean-side Web switch  
splits the traffic, and static routes forward each response stream back through the same firewall  
that forwarded the original request.  
328  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring Four-Subnet FWLB  
An example network for four-subnet FWLB is illustrated in Figure 13-7. While other complex  
topologies are possible, this example assumes a high-availability network using block (rather  
than diagonal) interconnections between switches.  
Dirty Side  
Clean Side  
Subnet 1 (VLAN 1):  
195.1.1.0/24  
Subnet 2 (VLAN 2): Subnet 3 (VLAN 3): Subnet 4 (VLAN 4):  
10.10.2.0/24 10.10.3.0/24 10.10.4.0/24  
Web Switch #3  
Web Switch #1  
IF1: 10.10.4.10  
IF2: 10.10.3.1  
IF1: 195.1.1.10  
IF2: 10.10.2.1  
Firewall #1  
Dirty: 10.10.2.3  
Clean: 10.10.3.3  
IF3: 10.10.3.2/32  
VIP: 10.10.4.100  
IF3: 10.10.2.2/32  
Router  
195.1.1.1  
1
2
3
4
10.10.4.20  
10.10.4.21  
9
9
VIR VIR  
195.1.1.9 10.10.2.9  
VIR VIR  
10.10.3.9 10.10.4.9  
Internet  
9
9
1
2
3
4
Router  
195.1.1.2  
Web Switch #2  
Firewall #2  
Dirty: 10.10.2.4  
Clean: 10.10.3.4  
Web Switch #4  
10.10.4.22  
IF1: 195.1.1.11  
IF2: 10.10.2.11  
IF1: 10.10.4.11  
IF2: 10.10.3.11  
IF3: 10.10.2.12/32  
IF3: 10.10.3.12/32  
VIP: 10.10.4.100  
Figure 13-7 Four-Subnet FWLB Example Network  
NOTE The port designations of both dirty-side Web switches are identical, as are the port  
designations of both clean-side Web switches. This simplifies configuration by allowing you to  
synchronize each primary Web switchs configuration with the secondary.  
Four-subnet FWLB configuration is summarized as follows:  
n
n
n
n
n
n
Configure routers and firewalls and test them for proper operation.  
Configure VLANs, IP interfaces, and static routes on all Web switches and test them.  
Configure secondary web switches with VRRP support settings.  
Configure FWLB groups and redirection filters on the primary dirty-side Web switch.  
Configure and synchronize VRRP on the primary dirty-side Web switch.  
Configure FWLB and SLB groups, and add FWLB redirection filters on the primary  
clean-side Web switch.  
n
Configure VRRP on the primary clean-side Web switch and synchronize the secondary.  
These steps are explained in detail in the following sections.  
Chapter 13: Firewall Load Balancing  
329  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Configure the Routers  
The routers must be configured with a static route to the destination services being accessed by  
the external clients.  
In this example, the external clients intend to connect to services at a publicly advertised IP  
address on this network. Since the real servers are load balanced behind a virtual server on the  
clean-side Web switch using normal SLB settings, the routers require a static route to the vir-  
tual server IP address. The next hop for this static route is the Web switch Virtual Interface  
Router (VIR), which is in the same subnet as the routers:  
Route Added: 10.10.4.100 (to clean-side virtual server) via 195.1.1.9 (Subnet 1 VIR)  
Configure the Firewalls  
Before you configure the Web switches, the firewalls must be properly configured. For incom-  
ing traffic, each firewall must be configured with a static route to the clean-side virtual server,  
using the VIR in its clean-side subnet as the next hop. For outbound traffic, each firewall must  
use the VIR in its dirty-side subnet as the default gateway.  
In this example, the firewalls are configured with the following IP addresses:  
Table 2 Four-Subnet Firewall IP Address Configuration  
Item  
Address  
Firewall 1  
Dirty-side IP interface  
10.10.2.3  
Clean-side IP interface  
Default Gateway  
Route Added  
10.10.3.3  
10.10.2.9 (Subnet 2 VIR)  
10.10.4.100 (virtual server) via 10.10.3.9 (Subnet 3 VIR)  
Firewall 2  
Dirty-side IP interface  
Clean-side IP interface  
Default Gateway  
10.10.2.4  
10.10.3.4  
10.10.2.9 (dirty-side VIR)  
Route Added  
10.10.4.100 (virtual server) via 10.10.3.9 (Subnet 3 VIR)  
The firewalls must also be configured with rules that determine which types of traffic will be  
forwarded through the firewall and which will be dropped. All firewalls participating in FWLB  
must be configured with the same set of rules.  
NOTE It is important to test the behavior of the firewalls prior to adding FWLB.  
330  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configure Connectivity for the Primary Dirty-Side Web Switch  
1. Configure VLANs on the primary dirty-side Web switch.  
Two VLANs are required. VLAN 1 includes port 1, for the Internet connection. VLAN 2  
includes port 2, for the firewall connection, and port 9, for the interswitch connection.  
>> # /cfg/vlan 2  
>> # add 2  
>> # add 9  
>> # ena  
(Port 2 connects to the firewall)  
(Port 9 is the inter-switch connection)  
NOTE Port 1 is part of VLAN 1 by default and does not require manual configuration.  
2. Configure IP interfaces on the primary dirty-side Web switch.  
Three IP interfaces (IFs) are used. IF 1 is on placed on Subnet 1. IF 2 will be used for routing  
traffic through the top firewall. IF 3 will be used for routing traffic through the lower firewall.  
To avoid confusion, IF 2 and IF 3 will be used in the same way on all Web switches.  
>> # /cfg/ip/if 1  
>> # mask 255.255.255.0  
>> # addr 195.1.1.10  
>> # ena  
>> # ../if 2  
>> # mask 255.255.255.0  
>> # addr 10.10.2.1  
>> # vlan 2  
>> # ena  
>> # ../if 3  
>> # mask 255.255.255.255  
>> # addr 10.10.2.2  
>> # vlan 2  
>> # ena  
NOTE By configuring the IP interface mask prior to the IP address, the broadcast address is  
automatically calculated. Also, only the first IP interface in a given subnet is given the full sub-  
net range mask. Subsequent IP interfaces (such as IF 3) are given individual masks.  
3. Turn Spanning Tree Protocol (STP) off for the primary dirty-side Web switch.  
>> # /cfg/stp/off  
Chapter 13: Firewall Load Balancing  
331  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
4. Configure static routes on the primary dirty-side Web switch.  
Four static routes are required:  
n
n
n
n
To primary clean-side IF 2 via Firewall 1 using dirty-side IF 2  
To primary clean-side IF 3 via Firewall 2 using dirty-side IF 3  
To secondary clean-side IF 2 via Firewall 1 using dirty-side IF 2  
To secondary clean-side IF 3 via Firewall 2 using dirty-side IF 3  
NOTE Remember, IF 2 is being used on all Web switches whenever routing through the top  
firewall, and IF 3 is being used on all Web switches whenever routing through the lower fire-  
wall.  
The static route addcommand uses the following format:  
add <destination address> <dest. mask> <gateway address> <source interface>  
This example requires the following static route configuration:  
>> # /cfg/ip/frwd/route  
>> # add 10.10.3.1 255.255.255.255 10.10.2.3 2  
>> # add 10.10.3.2 255.255.255.255 10.10.2.4 3  
>> # add 10.10.3.11 255.255.255.255 10.10.2.3 2  
>> # add 10.10.3.12 255.255.255.255 10.10.2.4 3  
NOTE When defining static routes for FWLB, it is important to specify the source IP inter-  
face numbers.  
5. Make your changes take effect.  
>> # apply  
>> # save  
>> # /boot/reset  
332  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configure Connectivity for the Secondary Dirty-Side Web Switch  
Except for the IP interfaces, this configuration is identical to the primary dirty-side Web switch.  
1. Configure VLANs on the secondary dirty-side Web switch.  
>> # /cfg/vlan 2  
>> # add 2  
>> # add 9  
>> # ena  
2. Configure IP interfaces on the secondary dirty-side Web switch.  
>> # /cfg/ip/if 1  
>> # mask 255.255.255.0  
>> # addr 195.1.1.11  
>> # ena  
>> # ../if 2  
>> # mask 255.255.255.0  
>> # addr 10.10.2.11  
>> # vlan 2  
>> # ena  
>> # ../if 3  
>> # mask 255.255.255.255  
>> # addr 10.10.2.12  
>> # vlan 2  
>> # ena  
3. Turn STP off for the secondary dirty-side Web switch.  
>> # /cfg/stp/off  
4. Configure static routes on the secondary dirty-side Web switch.  
>> # /cfg/ip/frwd/route  
>> # add 10.10.3.1 255.255.255.255 10.10.2.3 2  
>> # add 10.10.3.2 255.255.255.255 10.10.2.4 3  
>> # add 10.10.3.11 255.255.255.255 10.10.2.3 2  
>> # add 10.10.3.12 255.255.255.255 10.10.2.4 3  
5. Apply and save your configuration.  
>> # apply  
>> # save  
>> # /boot/reset  
Chapter 13: Firewall Load Balancing  
333  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configure Connectivity for the Primary Clean-Side Web Switch  
1. Configure VLANs on the primary clean-side Web switch.  
Two VLANs are required. VLAN 3 includes the firewall port and interswitch connection port.  
VLAN 4 includes the port that attaches to the real servers.  
>> # /cfg/vlan 3  
>> # add 3  
>> # add 9  
>> # ena  
>> # ../vlan 4  
>> # add 4  
>> # ena  
2. Configure IP interfaces on the primary clean-side Web switch.  
>> # /cfg/ip/if 1  
>> # mask 255.255.255.0  
>> # addr 10.10.4.10  
>> # vlan 4  
>> # ena  
>> # ../if 2  
>> # mask 255.255.255.0  
>> # addr 10.10.3.1  
>> # vlan 3  
>> # ena  
>> # ../if 3  
>> # mask 255.255.255.255  
>> # addr 10.10.3.2  
>> # vlan 3  
>> # ena  
3. Turn STP off for the primary clean-side Web switch.  
>> # /cfg/stp/off  
334  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
4. Configure static routes on the primary clean-side Web switch.  
Four static routes are needed:  
n
n
n
n
To primary dirty-side IF 2 via Firewall 1 using clean-side IF 2  
To primary dirty-side IF 3 via Firewall 2 using clean-side IF 3  
To secondary dirty-side IF 2 via Firewall 1 using clean-side IF 2  
To secondary dirty-side IF 3 via Firewall 2 using clean-side IF 3  
Again, the static route addcommand uses the following format:  
add <destination address> <dest. mask> <gateway address> <source interface>  
This example requires the following static route configuration:  
>> # /cfg/ip/frwd/route  
>> # add 10.10.2.1 255.255.255.255 10.10.3.3 2  
>> # add 10.10.2.2 255.255.255.255 10.10.3.4 3  
>> # add 10.10.2.11 255.255.255.255 10.10.3.3 2  
>> # add 10.10.2.12 255.255.255.255 10.10.3.4 3  
5. Apply and save your changes.  
>> # apply  
>> # save  
>> # /boot/reset  
Configure Connectivity for the Secondary Clean-Side Web Switch  
1. Configure VLANs on the secondary clean-side Web switch.  
>> # /cfg/vlan 3  
>> # add 3  
>> # add 9  
>> # ena  
>> # ../vlan 4  
>> # add 4  
>> # ena  
Chapter 13: Firewall Load Balancing  
335  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
2. Configure IP interfaces on the secondary clean-side Web switch.  
>> # /cfg/ip/if 1  
>> # mask 255.255.255.0  
>> # addr 10.10.4.11  
>> # vlan 4  
>> # ena  
>> # ../if 2  
>> # mask 255.255.255.0  
>> # addr 10.10.3.11  
>> # vlan 3  
>> # ena  
>> # ../if 3  
>> # mask 255.255.255.255  
>> # addr 10.10.3.12  
>> # vlan 3  
>> # ena  
3. Turn STP off for the secondary clean-side Web switch.  
>> # /cfg/stp/off  
4. Configure static routes on the secondary clean-side Web switch.  
>> # /cfg/ip/frwd/route  
>> # add 10.10.2.1 255.255.255.255 10.10.3.3 2  
>> # add 10.10.2.2 255.255.255.255 10.10.3.4 3  
>> # add 10.10.2.11 255.255.255.255 10.10.3.3 2  
>> # add 10.10.2.12 255.255.255.255 10.10.3.4 3  
5. Apply and save your changes.  
>> # apply  
>> # save  
>> # /boot/reset  
336  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Verify Proper Connectivity  
To verify proper configuration up to this point, use the pingoption to test network connectiv-  
ity. At each Web switch, you should receive a valid response when pinging the destination  
addresses established in the static routes.  
For example, on the secondary clean-side Web switch, the following commands should receive  
a valid response:  
>> # ping 10.10.2.1  
Response; 10.10.2.1: #1 OK, RTT 1 msec.  
>> # ping 10.10.2.2  
Response; 10.10.2.2: #1 OK, RTT 1 msec.  
>> # ping 10.10.2.11  
Response; 10.10.2.11: #1 OK, RTT 1 msec.  
>> # ping 10.10.2.12  
Response; 10.10.2.12: #1 OK, RTT 1 msec.  
Configure VRRP Support on the Secondary Dirty-Side Web Switch  
The secondary dirty-side Web switch must be configured with the primary as its peer. Once  
this is done, the secondary Web switch will get the remainder of its configuration from the pri-  
mary when synchronized in a later step.  
In this example, the secondary Web switch is configured to use primary dirty-side interface 1  
as its peer.  
>> # /cfg/vrrp/on  
>> # /cfg/slb  
>> # on  
>> # sync/peer 1  
>> # addr 195.1.1.10  
>> # ena  
>> # apply  
>> # save  
Configure VRRP Support on the Secondary Clean-Side Web Switch  
In this example, the secondary Web switch uses primary clean-side interface 1 as its peer.  
>> # /cfg/vrrp/on  
>> # /cfg/slb  
>> # on  
>> # sync/peer 1  
>> # addr 10.10.4.10  
>> # ena  
>> # apply  
>> # save  
Chapter 13: Firewall Load Balancing  
337  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Complete the Configuration of the Primary Dirty-Side Web Switch  
1. Create an FWLB real server group on the primary dirty-side Web switch.  
A real server group is used as the target for the FWLB redirection filter. Each IP address that is  
assigned to the group represents a path through a different firewall. In this case, since two fire-  
walls are used, two addresses are added to the group.  
Earlier, it was stated that this example uses IF 2 on all Web switches whenever routing through  
the top firewall, and IF 3 on all Web switches whenever routing through the lower firewall.  
Therefore, the first address will represent the primary clean-side IF 2, and the second repre-  
sents the primary clean-side IF 3.  
>> # /cfg/slb  
>> # on  
>> # real 1  
>> # rip 10.10.3.1  
>> # ena  
>> # ../real 2  
>> # rip 10.10.3.2  
>> # ena  
>> # ../group 1  
>> # add 1  
>> # add 2  
>> # metric hash  
Using the hashmetric, all traffic between specific IP source/destination address pairs flows  
through the same firewall, ensuring that sessions established by the firewalls are maintained  
for their duration (persistence).  
NOTE Other load balancing metrics, such as leastconns, roundrobin, minmiss,  
response, and bandwidth, can be used when enabling the Return to Sender (RTS) option.  
For more information, see Free-Metric FWLBon page 346.  
338  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
2. Create the FWLB filters.  
Three filters are required on the port attaching to the routers:  
n
n
Filter 10 prevents local traffic from being redirected.  
Filter 20 prevents VRRP traffic (and other multicast traffic on the reserved 224.0.0.0/24  
network) from being redirected.  
n
Filter 224 redirects the remaining traffic to the firewall group.  
>> # /cfg/slb/filt 10  
>> # dip 195.1.1.0  
>> # dmask 255.255.255.0  
>> # ena  
>> # ../filt 20  
>> # dip 224.0.0.0  
>> # dmask 255.255.255.0  
>> # ena  
>> # ../filt 224  
>> # action redir  
>> # group 1  
>> # ena  
>> # ../port 1  
>> # filt ena  
>> # add 10  
>> # add 20  
>> # add 224  
Chapter 13: Firewall Load Balancing  
339  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
3. Configure VRRP on the primary dirty-side Web switch.  
VRRP in this example requires two virtual routersone for the subnet attached to the routers,  
and one for the subnet attached to the firewalls.  
>> # /cfg/vrrp  
>> # on  
>> # vr 1  
>> # vrid 1  
(Configure virtual router 1)  
>> # addr 195.1.1.9  
>> # if 1  
(For the subnet attached to the routers)  
>> # prio 101  
>> # share dis  
>> # ena  
>> # track  
>> # ifs ena  
>> # ports ena  
>> # /cfg/vrrp/vr 2  
>> # vrid 2  
(Configure virtual router 2)  
>> # addr 10.10.2.9  
>> # if 2  
(For the subnet attached to the firewall)  
>> # prio 101  
>> # share dis  
>> # ena  
>> # track  
>> # ifs ena  
>> # ports ena  
4. Configure the VRRP peer on the primary dirty-side Web switch.  
>> # /cfg/slb/sync  
>> # prios d  
>> # peer 1  
>> # ena  
>> # addr 195.1.1.11  
5. Apply and save your configuration changes.  
>> # apply  
>> # save  
6. Synchronize primary and secondary dirty-side Web switches.  
>> # /oper/slb/sync  
340  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Complete the Configuration of the Primary Clean-Side Web Switch  
1. Create an FWLB real server group on the primary clean-side Web switch.  
A real server group is used as the target for the FWLB redirection filter. Each IP address  
assigned to the group represents a return path through a different firewall. In this case, since  
two firewalls are used, two addresses are added to the group. The two addresses are the inter-  
faces of the dirty-side Web switch, and are configured as if they are real servers.  
NOTE Remember that IF 2 is used on all Web switches whenever routing through the top  
firewall, and IF 3 is used on all Web switches whenever routing through the lower firewall.  
>> # /cfg/slb  
>> # on  
>> # real 1  
>> # rip 10.10.2.1  
>> # ena  
>> # ../real 2  
>> # rip 10.10.2.2  
>> # ena  
(IF2 of the primary dirty-side Web switch)  
(IF2 of the primary dirty-side Web switch)  
>> # ../group 1  
>> # add 1  
>> # add 2  
>> # metric hash  
NOTE The clean-side Web switch must use the same metric as defined on the dirty side. For  
information on using metrics other than hash, see Free-Metric FWLBon page 346.  
Chapter 13: Firewall Load Balancing  
341  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
2. Create an SLB real server group on the primary clean-side Web switch, to which traffic  
will be load-balanced.  
The external clients intend to connect to HTTP services at a publicly advertised IP address.  
The servers on this network are load balanced by a virtual server on the clean-side Web switch.  
SLB options are configured as follows:  
>> # /cfg/slb  
>> # real 20  
>> # rip 10.10.4.20  
>> # ena  
(Select the SLB menu)  
(Select real server 20)  
(Set IP address of real server 20)  
(Enable)  
>> # ../real 21  
>> # rip 10.10.4.21  
>> # ena  
(Select real server 21)  
(Set IP address of real server 21)  
(Enable)  
>> # ../real 22  
>> # rip 10.10.4.22  
>> # ena  
(Select real server 22)  
(Set IP address of real server 22)  
(Enable)  
>> # ../group 2  
>> # add 20  
(Select real server group 2)  
(Add the real servers to the group)  
>> # add 21  
>> # add 22  
>> # metric leastconns  
(Select least connections as the load  
balancing metric)  
>> # ../virt 1  
(Select the virtual server 1 menu)  
(Set the virtual server IP address)  
(Select HTTP for load balancing)  
(Add real server group 2)  
>> # vip 10.10.4.100  
>> # service http  
>> # group 2  
>> # ena  
(Enable the virtual server)  
>> # ../port 4/server ena  
(Enable server processing on the port  
connected to the real servers)  
(Enable client processing on the port  
connected to the firewall)  
>> # ../port 3/client ena  
>> # ../port 9/client ena  
(Enable client processing on the inter-  
switch connection)  
NOTE The virtual server IP address configured in this step will also be configured as a Vir-  
tual Server Router (VSR) when VRRP is configured in a later step.  
342  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
3. Create the FWLB filters on the primary clean-side Web switch.  
Three filters are required on the port attaching to the real servers:  
n
n
n
Filter 10 prevents local traffic from being redirected.  
Filter 20 prevents VRRP traffic from being redirected.  
Filter 224 redirects the remaining traffic to the firewall group.  
>> # /cfg/slb/filt 10  
>> # dip 10.10.4.0  
>> # dmask 255.255.255.0  
>> # ena  
>> # ../filt 20  
>> # dip 224.0.0.0  
>> # dmask 255.255.255.0  
>> # ena  
>> # ../filt 224  
>> # action redir  
>> # group 1  
>> # ena  
>> # ../port 4  
>> # filt ena  
>> # add 10  
>> # add 20  
>> # add 224  
Chapter 13: Firewall Load Balancing  
343  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
4. Configure VRRP on the primary clean-side Web switch.  
VRRP in this example requires two virtual routers to be configuredone for the subnet attached  
to the real servers, and one for the subnet attached to the firewalls.  
>> # /cfg/vrrp  
>> # on  
>> # vr 1  
>> # vrid 3  
>> # addr 10.10.4.9  
>> # if 1  
>> # prio 100  
>> # share dis  
>> # ena  
>> # track  
>> # ifs ena  
>> # ports ena  
>> # /cfg/vrrp/vr 2  
>> # vrid 4  
>> # addr 10.10.3.9  
>> # if 2  
>> # prio 101  
>> # share dis  
>> # ena  
>> # track  
>> # ifs ena  
>> # ports ena  
A third virtual router is required for the virtual server used for optional SLB.  
>> # /cfg/vrrp/vr 3  
>> # vrid 5  
>> # addr 10.10.4.100  
>> # prio 102  
>> # share dis  
>> # ena  
>> # track  
>> # ifs ena  
>> # ports ena  
344  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
5. Configure the peer on the primary clean-side Web switch.  
>> # /cfg/slb/sync  
>> # prios d  
>> # peer 1  
>> # ena  
>> # addr 10.10.4.11  
6. Apply and save your configuration changes.  
>> # apply  
>> # save  
7. Synchronize primary and secondary dirty-side Web switches.  
>> # /oper/slb/sync  
Chapter 13: Firewall Load Balancing  
345  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Advanced FWLB Concepts  
Free-Metric FWLB  
Free-metric FWLB allows to you use load-balancing metrics other than hash, such as  
leastconns, roundrobin, minmiss, response, and bandwidthfor more versatile  
FWLB.  
The free-metric method uses the Return to Sender (RTS) option. RTS can be used with basic  
FWLB or four-subnet FWLB networks.  
Free-Metric with Basic FWLB  
For this example, review the basic FWLB example network.  
"Dirty" Side  
"Clean" Side  
Firewall 1  
Web Switch 2  
Clean Side:  
Servers  
Dirty Side:  
10.1.1.10  
IF1: 20.1.1.1  
Virtual Server:  
20.1.1.10  
10.1.3.10  
Web Switch 1  
IF1: 192.16.12.1  
2
2
3
4
5
Internet  
1
20.1.1.2  
20.1.1.3  
Firewall 2  
3
IF2: 10.1.3.1  
IF3: 10.1.4.1  
IF2: 10.1.1.1  
IF3: 10.1.2.1  
Dirty Side:  
10.1.2.10  
Clean Side:  
10.1.4.10  
Figure 13-8 Basic FWLB Example Network  
To use free-metric FWLB in this network, the following configuration changes are necessary.  
1. On the clean-side Web switch, enable RTS on the ports attached to firewalls (ports 2 and 3).  
>> # /cfg/slb/port 2/rts enable  
>> # ../port 3/rts enable  
2. On the dirty-side Web switch, remove the redirection filter from the ports attached to the  
real servers (ports 4 and 5), but make sure filter processing is enabled.  
>> # ../port 4/rem 224  
>> # filt ena  
>> # ../port 5/rem 224  
>> # filt ena  
346  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
3. On the dirty-side Web switch, set the FWLB metric.  
>> # ../group 1  
>> # metric <metric type>  
Any of the following load-balancing metrics can be used: hash, leastconns, roun-  
drobin, minmiss, response, and bandwidth. See Metrics for Real Server Groups”  
on page 131 for details on using each metric.  
NOTE Some metrics allow other options (such as weights) to be configured.  
Free-Metric with Four-Subnet FWLB  
For this example, review the four-subnet example network.  
Dirty Side  
Clean Side  
Subnet 1 (VLAN 1):  
195.1.1.0/24  
Subnet 2 (VLAN 2): Subnet 3 (VLAN 3): Subnet 4 (VLAN 4):  
10.10.2.0/24 10.10.3.0/24 10.10.4.0/24  
Web Switch #3  
Web Switch #1  
IF1: 10.10.4.10  
IF2: 10.10.3.1  
IF1: 195.1.1.10  
IF2: 10.10.2.1  
Firewall #1  
Dirty: 10.10.2.3  
Clean: 10.10.3.3  
IF3: 10.10.3.2/32  
VIP: 10.10.4.100  
IF3: 10.10.2.2/32  
Router  
195.1.1.1  
1
2
3
4
10.10.4.20  
10.10.4.21  
9
9
VIR VIR  
195.1.1.9 10.10.2.9  
VIR VIR  
10.10.3.9 10.10.4.9  
Internet  
9
9
1
2
3
4
Router  
195.1.1.2  
Web Switch #2  
Firewall #2  
Dirty: 10.10.2.4  
Clean: 10.10.3.4  
Web Switch #4  
10.10.4.22  
IF1: 195.1.1.11  
IF2: 10.10.2.11  
IF1: 10.10.4.11  
IF2: 10.10.3.11  
IF3: 10.10.2.12/32  
IF3: 10.10.3.12/32  
VIP: 10.10.4.100  
Figure 13-9 Four-Subnet FWLB Example Network  
Chapter 13: Firewall Load Balancing  
347  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
To use free-metric FWLB in this network, the following configuration changes are necessary.  
1. On the clean-side Web switches, enable RTS on the ports attached to the firewalls (port 3)  
and on the interswitch port (port 9).  
On both clean-side switches:  
>> # /cfg/slb/port 3/rts enable  
2. On the clean-side Web switches, remove the redirection filter from the ports attached to  
the real servers (ports 4), but make sure filter processing is enabled.  
To view the original redirection filters that were configured for the four-subnet example, see  
Step 3. on page 343.  
On both clean-side switches:  
>> # ../port 4/rem 224  
>> # filt ena  
3. On the dirty-side Web switches, set the FWLB metric.  
On both dirty-side Web switches:  
>> # ../group 1  
>> # metric <metric type>  
Any of the following load-balancing metrics can be used: hash, leastconns, roun-  
drobin, minmiss, response, and bandwidth. See Metrics for Real Server Groups”  
on page 131 for details on using each metric.  
NOTE Some metrics allow other options (such as weights) to be configured.  
348  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Adding a Demilitarized Zone (DMZ)  
Implementing a DMZ in conjunction with firewall load balancing enables the Web switch to  
do the traffic filtering, off-loading this task from the firewall. A DMZ is created by configuring  
FWLB with another real server group and a redirection filter towards the DMZ subnets.  
The DMZ servers can be connected to the Web switch on the dirty side of the firewall. A typi-  
cal firewall load balancing configuration with a DMZ is shown in Figure 13-10.  
DMZ  
Note: There can be  
one or two DMZs.  
Private  
Network  
Internet  
Firewalls  
Web Switches  
Web Switches  
Figure 13-10 Typical Firewall Load-Balancing Topology with DMZ  
The DMZ servers can be attached to the Web switch directly or through an intermediate hub or  
switch. The Web switch is then configured with filters to permit or deny access to the DMZ  
servers. In this manner, two levels of security are implemented: one that restricts access to the  
DMZ through the use of Web switch filters, and another that restricts access to the clean net-  
work through the use of stateful inspection performed by the firewalls.  
Chapter 13: Firewall Load Balancing  
349  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
You could add the filters required for the DMZ (to each Web switch) as follows:  
1. On the dirty-side Web switch, create the filter to allow HTTP traffic to reach the DMZ  
Web servers.  
In this example, the DMZ Web servers use IP addresses 205.178.29.0/24.  
>> # /cfg/slb/filt 80  
(Select filter 80)  
>> Filter 80# sip any  
(From any source IP address)  
(To the DMZ base destination)  
(For the range of DMZ addresses)  
(For TCP protocol traffic)  
(From any source port)  
(To an HTTP destination port)  
(Allow the traffic)  
>> Filter 80# dip 205.178.29.0  
>> Filter 80# dmask 255.255.255.0  
>> Filter 80# proto tcp  
>> Filter 80# sport any  
>> Filter 80# dport http  
>> Filter 80# action allow  
>> Filter 80# ena  
(Enable the filter)  
2. Create another filter to deny all other traffic to the DMZ Web servers.  
>> Filter 80# ../filt 89  
>> Filter 89# sip any  
(Select filter 89)  
(From any source IP address)  
(To the DMZ base destination)  
(For the range of DMZ addresses)  
(For TCP protocol traffic)  
(Allow the traffic)  
>> Filter 89# dip 205.178.29.0  
>> Filter 89# dmask 255.255.255.0  
>> Filter 89# proto any  
>> Filter 89# action deny  
>> Filter 89# ena  
(Enable the filter)  
NOTE The deny filter has a higher filter number than the allow filter. This is necessary so  
that the allow filter has the higher order of precedence.  
3. Add the filters to the traffic ingress ports.  
>> Filter 89# ../port 1  
>> SLB Port 1# add 80  
>> SLB Port 1# add 89  
(Select the ingress port)  
(Add the allow filter)  
(Add the deny filter)  
4. Apply and save the configuration changes.  
>> SLB Port 1# apply  
>> SLB Port 1# save  
350  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Firewall Health Checks  
Basic FWLB health checking is automatic. No special configuration is necessary unless you  
wish to tune the health checking parameters. See Chapter 10, Health Checkingfor details.  
Firewall Service Monitoring  
To maintain high availability, Web switches monitor firewall health status and send packets  
only to healthy firewalls. There are two methods of firewall service monitoring: ICMP and  
HTTP. Each Web switch monitors the health of the firewalls on a regular basis by pinging the  
IP interfaces configured on its partner Web switch on the other side of the firewall.  
If a Web switch IP interface fails to respond to a user-specified number of pings, it (and, by  
implication, the associated firewall), is placed in a Server Failed state. At this time, the partner  
Web switch stops routing traffic to that IP interface and, instead, distributes it across the  
remaining healthy Web switch IP interfaces and firewalls.  
When a Web switch IP interface is in the Server Failed state, its partner Web switch continues  
to send pings to it at user-configurable intervals. After a specified number of successful pings,  
the IP interface (and its associated firewall) is brought back into service.  
For example, to configure the switch to allow one-second intervals between health checks or  
pings, two failed health checks to remove the firewall, and four successful health checks to  
restore the firewall to the real server group, use the following command:  
>> /cfg/slb/real <real server number>/inter 1/retry 2/restr 4  
Physical Link Monitoring  
Web switches also monitor physical link status of switch ports connected to firewalls. If the  
physical link to a firewall goes down, that firewall is placed immediately in the Server Failed  
state. When a Web switch detects that a failed physical link to a firewall has been restored, it  
brings the firewall back into service.  
Chapter 13: Firewall Load Balancing  
351  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Using HTTP Health Checks  
For those firewalls that do not permit ICMP pings to pass through, Web switches can be con-  
figured to perform HTTP health checks, as described below.  
1. Set the health check type to HTTP instead of ICMP.  
>> # /cfg/slb/group 1/health http  
(Select HTTP health checks)  
2. Configure a dummyredirect filter as the last filter (after the redirect all filter) to force  
the HTTP health checks to activate, as shown below:  
>> # /cfg/slb/filt 225  
>> Filter 224# proto tcp  
>> Filter 224# action redir  
>> Filter 224# group 1  
>> Filter 224# rport http  
>> Filter 224# ena  
(Select filter 225)  
(For TCP protocol traffic)  
(Redirect the traffic)  
(Set real server group for redirection)  
(Set real server port for redirection)  
(Enable the filter)  
NOTE Make sure that the number of each real filter is lower than the number of the dummy”  
redirect filter.  
352  
Chapter 13: Firewall Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 14  
Virtual Private Network Load  
Balancing  
The VPN (Virtual Private Network) load balancing feature in Web OS 10.0 allows the switch  
to load balance simultaneously up to 255 VPN devices. The switch records from which VPN  
server a session was initiated and ensures that the traffic returns back to the same VPN server  
from which the session started.  
The following topics are addressed in this chapter:  
n
n
Overviewon page 354  
VPN Load-Balancing Configurationon page 356  
353  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Overview  
Virtual Private Networks  
A VPN is a connection that has the appearance and advantages of a dedicated link, but it  
occurs over a shared network. Using a technique called tunneling, data packets are transmitted  
across a routed network, such as the Internet, in a private tunnel that simulates a point-to-point  
connection. This approach enables network traffic from many sources to travel via separate  
tunnels across the infrastructure. It also enables traffic from many sources to be differentiated,  
so that it can be directed to specific destinations and receive specific levels of service.  
VPNs provide security features of a firewall, network address translation, data encryption, and  
authentication and authorization. Since most of the data sent between VPN initiators and ter-  
minators is encrypted, network devices cannot use information inside the packet to make intel-  
ligent routing decisions.  
How VPN Load Balancing Works  
VPN load balancing requires that all ingress traffic passing through a particular VPN must  
traverse the same VPN as it egresses back to the client. Traffic ingressing from the Internet is  
usually addressed to the VPNs, with the real destination encrypted inside the datagram. Traffic  
egressing the VPNs into the intranet contains the real destination in the clear.  
Using the hash algorithm on the source and destination address may not be possible in many  
VPN/firewall configurations because the address may be encrypted inside the datagram. Also,  
the source/destination IP address of the packet may change as the packet traverses from the  
dirty-side switches to clean-side switches and back.  
To support VPN load balancing, the Alteon Web switch records state on frames entering the  
switch to and from the VPNs. This session table ensures that the same VPN server handles all  
the traffic between an inside host and an outside client for a particular session.  
NOTE VPN load balancing is supported for connecting from remote sites to the network  
behind the VPN cluster IP address. Connection initiated from clients internal to the VPN gate-  
ways is not supported.  
Basic frame flow, from the dirty side of the network to the clean side, is shown in Figure 5-1.  
An external client is accessing an internal server. No Network Address Translation (NAT) is  
performed by the VPN devices.  
354  
Chapter 14: Virtual Private Network Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Figure 14-1 Basic Network Frame Flow and Operation  
The basic steps that occur at the switches when a request arrives from the Internet are  
described below:  
1. The user prepares to send traffic to the destination server.  
2. The VPN client software encrypts the packet and sends it to the cluster IP address of the  
VPN devices.  
3. Switch 1 (SW1) makes an entry in the session table and forwards the packet to VPN  
device 1.  
The selection of the VPN device is based on the hash load-balancing metric.  
4. The VPN device strips the IP header and decrypts the encrypted IP header.  
5. Switch 2 (SW2) forwards the packet to E.10.  
If an entry is found, the frame is forwarded normally. If an entry is not found, the switch deter-  
mines which VPN device processed the frame by performing a lookup with the source MAC  
address of the frame. If the MAC address matches a MAC address of a real VPN server, the  
switch adds an entry to the session table so that reverse traffic is redirected to the same VPN  
server. Finally, the frame is forwarded normally.  
Chapter 14: Virtual Private Network Load Balancing  
355  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Requirements  
n
Configure the switch with firewall load balancing. For more information, see Firewall  
Load Balancingon page 313.  
n
Enable the Return to Sender (RTS) feature on the ports attached to the VPN devices, using  
the following command:  
>> # /cfg/slb/port <port number>/rts ena  
VPN Load-Balancing Configuration Example  
The following example uses Alteon Web switches for VPN load balancing. The configuration  
is for four Web switches, four subnets, and two VPN devices.  
Figure 14-2 VPN Load-Balancing Configuration Example  
Build the topology illustrated in Figure 14-2 on page 356, and configure the switches as shown  
on the following pages.  
356  
Chapter 14: Virtual Private Network Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Web OS 10.0 Application Guide  
Configure the First Clean-Side Switch (CA)  
1. Turn off BOOTP.  
>> # /cfg/sys/bootp dis  
2. Define and enable VLAN 2 for ports 7, and 8.  
>> # /cfg/vlan 2/ena/def 7 8  
3. Turn off Spanning Tree Protocol (STP).  
>> # /cfg/stp/off  
4. Define the clean-side IP interfaces.  
Create one clean-side IP interface on a different subnet for each VPN device being load bal-  
anced.  
>> # /cfg/ip/if 1/ena  
(Select IP interface 1 and enable)  
(Set subnet mask for interface 1)  
(Set IP address for interface 1)  
(For VLAN 1)  
>> IP Interface 1# mask 255.255.255.0  
>> IP Interface 1# addr 30.0.0.10  
>> IP Interface 1# vlan 1  
>> IP Interface 1# ../if 2/ena  
>> IP Interface 2# mask 255.255.255.0  
>> IP Interface 2# addr 20.0.0.10  
>> IP Interface 2# vlan 2  
(Select IP interface 2 and enable)  
(Set subnet mask for interface 2)  
(Set IP address for interface 2)  
(For VLAN 2)  
>> IP Interface 2# ../if 3/ena  
>> IP Interface 3# mask 255.255.255.255  
>> IP Interface 3# addr 20.0.0.11  
>> IP Interface 3# vlan 2  
(Select IP interface 3 and enable)  
(Set subnet mask for interface 3)  
(Set IP address for interface 3)  
(For VLAN 2)  
5. Configure routes for each of the IP interfaces you configured in Step 4 using the VPN  
devices as gateways.  
Chapter 14: Virtual Private Network Load Balancing  
357  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
One static route is required for each VPN device being load balanced.  
>> # /cfg/ip/route  
>> IP Static Route# add 10.0.0.10  
>> IP Static Route# 255.255.255.255  
>> IP Static Route# 20.0.0.101  
>> IP Static Route# 2  
(Static route destination IP address)  
(Destination subnet mask)  
(Enter gateway IP address)  
(For interface 2)  
>> IP Static Route# add 10.0.0.11  
>> IP Static Route# 255.255.255.255  
>> IP Static Route# 20.0.0.102  
>> IP Static Route# 3  
(Enter destination IP address)  
(Destination subnet mask)  
(Enter gateway IP address)  
(For interface 3)  
>> IP Static Route# add 10.0.0.20  
>> IP Static Route# 255.255.255.255  
>> IP Static Route# 20.0.0.101  
>> IP Static Route# 2  
(Enter destination IP address)  
(Destination subnet mask)  
(Enter gateway IP address)  
(For interface 2)  
>> IP Static Route# add 10.0.0.21  
>> IP Static Route# 255.255.255.255  
>> IP Static Route# 20.0.0.102  
>> IP Static Route# 3  
(Static route destination IP address)  
(Destination subnet mask)  
(Enter gateway IP address)  
(For interface 3)  
6. Configure VRRP for virtual routers 1 and 2.  
>> # /cfg/vrrp/on  
(Enable VRRP)  
>> Virtual Router Redundancy Protocol# vr 1  
>> VRRP Virtual Router 1# ena  
>> VRRP Virtual Router 1# vrid 1  
>> VRRP Virtual Router 1# if 1  
>> VRRP Virtual Router 1# prio 101  
(Select virtual router 1 menu)  
(Enable the virtual router)  
(Assign virtual router ID 1)  
(To interface number 1)  
(Set the renter priority)  
>> VRRP Virtual Router 1# addr 30.0.0.50 (Set IP address of virtual router)  
>> VRRP Virtual Router 1# share dis  
>> VRRP Virtual Router 1# track  
(Disable sharing)  
(Select virtual router tracking menu)  
(Enable tracking of virtual routers)  
(Apply the configuration)  
(Save the configuration)  
(Select virtual router 2 menu)  
(Enable the virtual router)  
(Assign virtual router ID 2)  
(To interface number 2)  
>> VRRP VR 1 Priority Tracking# vrs ena  
>> VRRP VR 1 Priority Tracking# apply  
>> VRRP VR 1 Priority Tracking# save  
>> VRRP VR 1 Priority Tracking# ../vr 2  
>> VRRP Virtual Router 2# ena  
>> VRRP Virtual Router 2# vrid 2  
>> VRRP Virtual Router 2# if 2  
>> VRRP Virtual Router 2# prio 101  
>> VRRP Virtual Router 2# addr 20.0.0.1  
>> VRRP Virtual Router 2# share dis  
>> VRRP Virtual Router 2# track  
(Set the renter priority)  
(Set IP address of virtual router)  
(Disable sharing)  
(Select Virtual Router Tracking Menu)  
>> VRRP VR 2 Priority Tracking# ports ena (Track VLAN switch ports)  
>> VRRP VR 2 Priority Tracking# apply  
>> VRRP VR 2 Priority Tracking# save  
(Apply the configuration)  
(Save the configuration)  
358  
Chapter 14: Virtual Private Network Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
7. Enable Server Load Balancing (SLB) on the first clean switch.  
>> # /cfg/slb/on  
8. Configure real servers for health checking VPN devices.  
>> # /cfg/slb/real 1/ena  
(Enable slb for real server 1)  
>> Real server 1 # rip 10.0.0.10  
>> Real server 1 # ../real 2/ena  
>> Real server 2 # rip 10.0.0.11  
>> Real server 2 # ../real 3/ena  
>> Real server 3 # rip 10.0.0.20  
>> Real server 3 # ../real 4/ena  
>> Real server 4 # rip 10.0.0.21  
(Assign IP address for real server 1)  
(Enable SLB for real server 2)  
(Assign IP address for real server 2)  
(Enable SLB for real server 3)  
(Assign IP address for real server 3)  
(Enable SLB for real server 4)  
(Assign IP address for real server 4)  
9. Configure real server group 1, and add real servers 1, 2, 3, and 4 to the group.  
>> # /cfg/slb/group 1  
(Configure real server group 1)  
(Select SLB hash metric for group 1)  
(Add real servers 1-4 to group 1)  
>> Real server group 1# metric hash  
>> Real server group 1# add 1  
>> Real server group 1# add 2/add 3/add 4  
10. Enable RTS on the necessary ports.  
>> # /cfg/slb/port 7/rts ena  
>> # /cfg/slb/port 8/rts ena  
(Enable Return to Sender on port 7)  
(Enable Return to Sender on port 8)  
11. Enable filter processing on the server ports so that the responses from the real server will  
be looked up in the VPN session table.  
>> # /cfg/slb/port 1/filter ena  
12. Apply and save the configuration, and reboot the switch.  
>> # apply  
>> # save  
>> # /boot/reset  
Chapter 14: Virtual Private Network Load Balancing  
359  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configure the Second Clean-Side Switch (CB)  
1. Turn off bootp.  
>> # /cfg/sys/bootp dis  
2. Define and enable VLAN 2 for ports 7 and 8.  
>> # /cfg/vlan 2/ena/def 7 8  
3. Turn off Spanning Tree Protocol.  
>> # /cfg/stp/off  
4. Define the clean-side IP interfaces.  
Create one clean-side IP interface on a different subnet for each VPN device being load bal-  
anced.  
>> # /cfg/ip/if 1/ena/mask 255.255.255.0/addr 30.0.0.11  
>> # /cfg/ip/if 2/ena/mask 255.255.255.0/addr 20.0.0.20/vl 2  
>> # /cfg/ip/if 3/ena/mask 255.255.255.255/addr 20.0.0.21/vl 2  
5. Configure routes for each of the IP interfaces you configured in Step 4, using the VPN  
devices as gateways.  
One static route is required for each VPN device being load balanced.  
>> # /cfg/ip/route  
>> # add 10.0.0.10 255.255.255.255 20.0.0.101 2  
>> # add 10.0.0.11 255.255.255.255 20.0.0.102 3  
>> # add 10.0.0.20 255.255.255.255 20.0.0.101 2  
>> # add 10.0.0.21 255.255.255.255 20.0.0.102 3  
360  
Chapter 14: Virtual Private Network Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
6. Configure Virtual Router Redundancy Protocol (VRRP) for virtual routers 1 and 2.  
>> # /cfg/vrrp/on  
>> Virtual Router Redundancy Protocol# vr 1  
>> VRRP Virtual Router 1# ena  
>> VRRP Virtual Router 1# vrid 1  
>> VRRP Virtual Router 1# if 1  
>> VRRP Virtual Router 1# addr 30.0.0.50  
>> VRRP Virtual Router 1# share dis  
>> VRRP Virtual Router 1# track/vrs ena  
>> VRRP Virtual Router 1 Priority Tracking# /cfg/vrrp/vr 2  
>> VRRP Virtual Router 2# ena  
>> VRRP Virtual Router 2# vrid 2  
>> VRRP Virtual Router 2# if 2  
>> VRRP Virtual Router 2# addr 20.0.0.1  
>> VRRP Virtual Router 2# share dis  
>> VRRP Virtual Router 2# track/ports ena  
7. Enable SLB.  
>> VRRP Virtual Router 2 Priority Tracking# /cfg/slb/on  
8. Configure real servers for health checking VPN devices.  
>> Layer 4# /cfg/slb/real 1/ena/rip 10.0.0.10  
>> Real server 1# ../real 2/ena/rip 10.0.0.11  
>> Real server 2# ../real 3/ena/rip 10.0.0.20  
>> Real server 3# ../real 4/ena/rip 10.0.0.21  
9. Enable the real server group.  
>> Real server 4# ../group 1  
>> Real server group 1# metric hash  
>> Real server group 1# add 1/add 2/add 3/add 4  
10. Enable RTS on the necessary ports.  
>> Real server group 1# ../port 7/rts ena  
>> SLB port 7# ../port 8/rts ena  
Chapter 14: Virtual Private Network Load Balancing  
361  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
11. Enable filter processing on the server ports so that the response from the real server will  
be looked up in VPN session table.  
>> SLB port 8# ../port 1/filter ena  
12. Apply and save the configuration, and reboot the switch.  
>> SLB port 8# apply  
>> SLB port 8# save  
>> SLB port 8# /boot/reset  
Configure the First Dirty-Side WebSwitch (DA)  
1. Turn off BOOTP.  
>> # /cfg/sys/bootp dis  
2. Define and enable VLAN 2 for ports 7 and 8.  
>> # /cfg/vlan 2/ena/def 7 8  
3. Turn off STP.  
>> # /cfg/stp/off  
4. Configure IP interfaces 1, 2, and 3.  
>> # /cfg/ip/if 1/ena/mask 255.255.255.0/addr 192.168.10.10  
>> # /cfg/ip/if 2/ena/mask 255.255.255.0/addr 10.0.0.10/vl 2  
>> # /cfg/ip/if 3/ena/mask 255.255.255.255/addr 10.0.0.11/vl 2  
5. Define static routes for each of the IP interfaces you configured in Step 4, using the VPN  
devices as gateways.  
One static route is required for each VPN device being load balanced.  
>> # /cfg/ip/route  
>> # add 20.0.0.10 255.255.255.255 10.0.0.101 2  
>> # add 20.0.0.11 255.255.255.255 10.0.0.102 3  
>> # add 20.0.0.20 255.255.255.255 10.0.0.101 2  
>> # add 20.0.0.21 255.255.255.255 10.0.0.102 3  
362  
Chapter 14: Virtual Private Network Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
6. Configure VRRP for virtual routers 1 and 2.  
>> # /cfg/vrrp/on  
>> Virtual Router Redundancy Protocol# /cfg/vrrp/vr 1  
>> VRRP Virtual Router 1# ena  
>> VRRP Virtual Router 1# vrid 1  
>> VRRP Virtual Router 1# if 1  
>> VRRP Virtual Router 1# prio 101  
>> VRRP Virtual Router 1# addr 192.168.10.50  
>> VRRP Virtual Router 1# share dis  
>> VRRP Virtual Router 1# track  
>> VRRP Virtual Router 1 Priority Tracking# vrs ena  
>> VRRP Virtual Router 1 Priority Tracking# ports ena  
>> VRRP Virtual Router 1 Priority Tracking# /cfg/vrrp/vr 2  
>> VRRP Virtual Router 2# ena  
>> VRRP Virtual Router 2# vrid 2  
>> VRRP Virtual Router 2# if 2  
>> VRRP Virtual Router 2# prio 101  
>> VRRP Virtual Router 2# addr 10.0.0.1  
>> VRRP Virtual Router 2# share dis  
>> VRRP Virtual Router 2# track  
>> VRRP Virtual Router 2 Priority Tracking# vrs ena  
>> VRRP Virtual Router 2 Priority Tracking# ports ena  
7. Enable SLB.  
>> VRRP Virtual Router 1 Priority Tracking# /cfg/slb/on  
8. Configure real servers for health-checking VPN devices.  
>> Layer 4# real 1/ena/rip 20.0.0.10  
>> Real server 1# ../real 2/ena/rip 20.0.0.11  
>> Real server 2# ../real 3/ena/rip 20.0.0.20  
>> Real server 3# ../real 4/ena/rip 20.0.0.21  
9. Enable the real server group.  
>> Real server 1# ../group 1  
>> Real server group 1# metric hash  
>> Real server group 1# add 1/add 2/add 3/add 4  
Chapter 14: Virtual Private Network Load Balancing  
363  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
10. Configure the filters to allow local subnet traffic on the dirty side of the VPN device to  
reach the VPN device interfaces.  
>> # ../filt 100  
>> # ena  
>> # sip any  
>> # dip 192.168.10.0/dmask 255.255.255.0  
>> # action allow  
>> # ../filt 110  
>> # ena  
>> # sip any  
>> # dip 224.0.0.0/dmask 255.0.0.0  
>> # action allow  
11. Create a filter to allow the management firewall (Policy Server) to reach the VPN firewall.  
>> # ../filt 120 ena  
>> # sip 192.168.10.120  
>> # smask 255.255.255.255  
>> # dip 10.0.0.0  
>> # dmask 255.255.255.0  
12. Create the redirection filter and enable firewall load balancing.  
This filter will redirect inbound traffic, redirecting it among the defined real servers in the group.  
>> # ../filt 224  
>> # ena  
>> # sip any  
>> # dip any  
>> # action redir  
>> # ../filt 224/adv  
>> # fwlb ena  
13. Add filters to the ingress port.  
>> # ../port 1  
>> # filt ena  
>> # add 100/add 110/add 224  
14. Apply and save the configuration, and reboot the switch.  
>> # apply  
>> # save  
>> # /boot/reset  
364  
Chapter 14: Virtual Private Network Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configure the Second Dirty-Side WebSwitch (DB)  
1. Turn off BOOTP.  
>> # /cfg/sys/bootp dis  
2. Define and enable VLAN 2 for ports 7 and 8.  
>> # /cfg/vlan 2/ena/def 7 8  
3. Turn off STP.  
>> # /cfg/stp/off  
4. Configure IP interfaces 1, 2, and 3.  
>> # /cfg/ip/if 1/ena/mask 255.255.255.0/addr 192.168.10.11  
>> # /cfg/ip/if 2/ena/mask 255.255.255.0/addr 10.0.0.20/vl 2  
>> # /cfg/ip/if 3/ena/mask 255.255.255.255/addr 10.0.0.21/vl 2  
5. Configure routes for each of the IP interfaces you configured in Step 4.  
>> # /cfg/ip/route  
>> # add 20.0.0.10 255.255.255.255 10.0.0.101 2  
>> # add 20.0.0.11 255.255.255.255 10.0.0.102 3  
>> # add 20.0.0.20 255.255.255.255 10.0.0.101 2  
>> # add 20.0.0.21 255.255.255.255 10.0.0.102 3  
Chapter 14: Virtual Private Network Load Balancing  
365  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
6. Configure VRRP for virtual routers 1 and 2.  
>> # /cfg/vrrp/on  
>> # /cfg/vrrp/vr 1  
>> # ena  
>> # vrid 1  
>> # if 1  
>> # addr 192.168.10.50  
>> # share dis  
>> # track  
>> # vrs ena  
>> # ports ena  
>> # /cfg/vrrp/vr 2  
>> # ena  
>> # vrid 2  
>> # if 2  
>> # addr 10.0.0.1  
>> # share dis  
>> # track  
>> # vrs ena  
>> # ports ena  
7. Enable SLB.  
>> # /cfg/slb/on  
8. Configure real servers for health checking VPN devices.  
>> # /cfg/slb/real 1/ena/rip 20.0.0.10  
>> # /cfg/slb/real 2/ena/rip 20.0.0.11  
>> # /cfg/slb/real 3/ena/rip 20.0.0.20  
>> # /cfg/slb/real 4/ena/rip 20.0.0.21  
9. Enable the real server group, and place real servers 1-4 into the real server group.  
>> # /cfg/slb/group 1  
>> # metric hash  
>> # add 1/add 2/add 3/add 4  
366  
Chapter 14: Virtual Private Network Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
10. Configure the filters to allow local subnet traffic on the dirty side of the VPN device to  
reach the VPN device interfaces.  
>> # /cfg/slb/filt 100  
>> # ena  
>> # sip any  
>> # dip 192.168.10.0/dmask 255.255.255.0  
>> # ../filt 110  
>> # ena  
>> # sip any  
>> # dip 224.0.0.0/dmask 255.0.0.0  
11. Create the redirection filter and enable firewall load balancing.  
This filter will redirect inbound traffic, among the defined real servers in the group.  
>> # /cfg/slb/filt 224  
>> # ena  
>> # sip any  
>> # dip any  
>> # proto any  
>> # action redir  
>> # ../filt 224/adv  
>> # fwlb ena  
12. Add filters to the ingress port.  
>> # /cfg/slb/port 1  
>> # filt ena  
>> # add 100/add 110/add 224  
13. Apply and save the configuration and reboot the switch.  
>> # apply  
>> # save  
>> # /boot/reset  
Chapter 14: Virtual Private Network Load Balancing  
367  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Test Configurations and General Topology  
The switches should be able to health check each other, and all switches should see four real  
servers up. (Rules on the VPN devices permit thissee Figure 14-3 on page 368.)  
Figure 14-3 Checkpoint Rules for Both VPN Devices as Seen in the Policy Editor  
1. Disconnect the cables (cause failures) to change the available servers that are up.  
>> # /info/slb/dump  
(Verify which servers are up)  
This should change the VRRP preferences. You can view VRRP preferences using the CLI  
command /info/vrrp.  
2. Use the Checkpoint Log Viewer to watch for accepted and dropped traffic. In the tool bar  
above, click on Window, then Log Viewer.  
NOTE To help simplify the logs, the health checks are not logged.  
368  
Chapter 14: Virtual Private Network Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Test the VPN  
1. Launch the SecuRemote client on the dirty side of the network.  
2. Add a new site.  
3. Enter the policy server IP address: 192.168.10.120. You have the option of adding a  
nickname.  
4. Launch a browser (such as Netscape or Internet Explorer) and go to http://30.0.0.100  
5. You will be asked to authenticate yourself.  
6. Enter vpnuserfor user name and alteonfor the password.  
Chapter 14: Virtual Private Network Load Balancing  
369  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
7. You will see a message verifying that you were authenticated.  
8. Browse to the Web site.  
If there are other services running on other servers in the internal network, you should also be  
able to reach those services. All of this traffic is traveling over the VPN and is being decrypted  
at the VPN device. You can verify which VPN device is being used by looking at the Log  
Viewer. You should also be able to see the client authentication as well as the decrypted traffic.  
To verify that the FWLB and hash metric is working correctly on the dirty-side switches (that  
is, hashed on client IP address/Destination IP address), you can configure your current client  
with an IP address one higher (or lower) in the last octet, and try to reestablish the VPN con-  
nection. Or, add another PC on the dirty side and connect.  
NOTE When many clients are coming from behind a VPN gateway (for example, not using  
the SecuRemote clients but using a VPN 1 Gateway or other compatible VPN Gateway), you  
will not see load balancing across those clients. Each SecuRemote client will be treated differ-  
ently, but each VPN 1 Gateway will be treated as one client each (that is, one Client IP  
address). VPN Device 1 and VPN Device 2 belong to one cluster IP.  
370  
Chapter 14: Virtual Private Network Load Balancing  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 15  
Content Intelligent Switching  
This chapter discusses advanced load balancing solutions utilizing Layer 7 content switching.  
ing content requests are discussed in the following topics:  
n
n
n
n
n
n
n
Content Intelligent Web Cache Redirectionon page 394  
Exclusionary String Matching for Real Serverson page 410  
Regular Expression Matchingon page 412  
Content Precedence Lookupon page 414  
Layer 7 Deny Filteron page 417  
NOTE Direct Access Mode (DAM) must be enabled or configure a proxy IP address on all  
switch ports (except port 9) for all content-intelligent switching features.  
371  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Overview  
Alteon Web switches performs content intelligent switching by processing numerous tasks for  
each incoming session, including connection setup, traffic parsing, applying server selection  
algorithms, splicing connections and translating session addresses, metering and controlling  
server bandwidth usage, processing traffic filters, collecting statistics, and so on. Figure 15-1  
illustrates the process of content intelligent switching in the Web switch.  
Switch completes 3-way  
handshake with client  
2.  
Requests for static  
data go to caches  
Client requests  
a Web page  
1.  
3.  
File types:  
"images"  
".gif"  
".jpg"  
".html"  
Client sends an  
HTTP request  
Switch parses the HTTP request  
and forwards based on header  
and URL information  
4.  
6.  
Internet  
Requests for dynamic  
data go to servers  
File types:  
".cgi"  
".bin"  
Switch gets response,  
adjusts the sequence  
numbers in the TCP Header,  
and forwards the packet  
to the client  
".exe"  
Web server receives  
the HTTP request and  
responds  
5.  
Figure 15-1 Content Intelligent Load Balancing Example  
372  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Parsing Content  
Examining session content places heavier demands upon the Web switch than examining  
TCP/IP headers for the following reasons:  
n
Content is non-deterministic. Content identifiers such as URLs and cookies can be of  
varying lengths and can appear at unpredictable locations within a request. Scanning ses-  
sion traffic for a specific string is far more processor-intensive than looking at a known  
location in a session for a specific number of bytes.  
n
To parse a content request, the Web switch must temporarily terminate the TCP connec-  
tion from the client. This temporary termination is called a delayed binding. While the  
connection is suspended, the Web switch acknowledges the client connection on behalf of  
the server, buffers and examines the client request, and finally opens a connection to an  
appropriate server based on the requested content.  
For more information on delayed binding, see Delayed Bindingon page 146.  
n
Delayed binding causes two independent TCP connections to span a Web session: one  
from the client to the Web switch and the second from the Web switch to the selected  
server. The Web switch must modify the TCP header, including performing TCP sequence  
number translation and recalculating checksums on every packet that travels between the  
client and the server, for the duration of the session. This function, known as TCP connec-  
tion splicing, heavily tasks a Web switch, particularly when the switch must process thou-  
sands of these sessions simultaneously.  
n
n
In addition to real-time traffic and connection processing, a content intelligent Web switch  
must monitor servers to ensure that requests are forwarded to the best-performing and  
healthiest servers. This monitoring involves more than simple ICMP or TCP connection  
tests, as servers can continue to process network protocols while failing to retrieve con-  
tent.  
If content is segregated in different servers or server farms, the Web switch must provide a  
flexible, user-customizable mechanism allowing a relevant set of application and content  
tests to be applied to each server or server farm.  
In addition to implementing content intelligent switching, the switch periodically performs  
background functions such as updating network topology, measuring server performance, and  
health checking for servers, applications, and server sites.  
Chapter 15: Content Intelligent Switching  
373  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
HTTP Header Inspection  
Content intelligent switching is performed by inspecting HTTP headers. HTTP headers  
include additional information about requests and responses. The HTTP 1.1 specification  
defines a total of 46 headers. For Web Cache Redirection, at any given time one HTTP header  
is supported globally for the entire switch.  
HTTP headers can be general, request, response, or entity headers. General headers may exist  
in both requests and responses. Requests and response headers are specific only to requests and  
responses, respectively. Entity headers describe the content of the request body or the content  
of the response body.  
Each HTTP header field consists of a name, followed immediately by a colon ( : ), a single  
space character, and the field value. Field names are case-insensitive. Header fields can be  
extended over multiple lines by preceding each extra line with at least one space.  
Some customer applications of HTTP header inspection are listed below:  
n
n
n
n
n
Redirection based on domain name  
Cachability based on domain name  
Virtual hosting  
Redirection based on browser type  
Cookie-based preferential redirection  
Buffering Content with Multiple Frames  
To handle the overall length of HTTP headers, including request headers containing multiple  
cookies, and the Maximum Segment Size (MSS) of dial-up connections, Web OS software  
provides the following support:  
n
HTTP GET Request Headers  
NOTE In addition to the URL path, which generally is less than 300 bytes, the HTTP GET  
requests also include general headers and request headers.  
Parsing GET requests to match URL path and HTTP header beyond the first frame  
while performing delayed binding  
Processing multiple frames from a single HTTP GET request, using a TCP stack on  
the switch  
n
HTTP Cookie Request Headers  
Buffering a maximum of 4500 bytes for a single GET request across multiple frames. A  
single GET request can include multiple cookies.  
374  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Content Intelligent Server Load Balancing  
Web OS allows you to load balance HTTP requests based on different HTTP header informa-  
or User-Agentfor browser-smart load balancing.  
n
n
n
n
n
n
n
URL Hashing for Server Load Balancingon page 387  
Header Hash Load Balancingon page 389  
DNS Load Balancingon page 390  
Layer 7 RTSP Load Balancingon page 392  
URL-Based Server Load Balancing  
URL-based SLB allows you to optimize resource access and server performance. Content dis-  
persion can be optimized by making load-balancing decisions on the entire path and filename  
of each URL.  
NOTE Both HTTP 1.0 and HTTP 1.1 requests are supported.  
For URL matching you can configure up to 128 strings comprised of 40 bytes each. Each URL  
Web request is then examined against the URL strings defined for each real server. URL  
requests are load balanced among multiple servers matching the URL, according to the load  
balancing metric configured for the real server group (leastConnsis the default).  
In Figure 15-2, the following criteria are specified for content load balancing:  
n
n
n
Requests with .cgiin the URL are forwarded to real servers 3 and 4.  
Requests with the string imagesin the URL are sent to real servers 1 and 2.  
Requests with URLs starting with /product:are sent to real servers 2, 3, and 5.  
Requests containing URLs with anything else are sent to real servers 1, 2, 3, and 4. These serv-  
ers have been defined with the anystring.  
Chapter 15: Content Intelligent Switching  
375  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
String matching for:  
GET/www.foo.com/images/abc.gif  
images  
/product  
.gif  
2
GET/www.foo.com/event/reg.bin  
1
3
.jpg  
GET/www.foo.com/product/abc.html  
String matching for:  
/product  
.cgi  
4
Alteon Web Switch  
.bin  
.exe  
6
5
String matching for:  
/product  
In groups with multiple servers,  
traffic is distributed within the  
group via standard SLB metric  
or URL hashing  
.html  
Figure 15-2 URL-Based Server Load Balancing  
Configuring URL-Based Server Load Balancing  
To configure URL-based SLB, perform the following steps:  
1. Before you can configure URL-based load balancing, ensure that the switch has already  
been configured for basic SLB with the following tasks:  
NOTE When URL-based SLB is used in an active/active redundant setup, use a proxy IP  
address instead of Direct Access Mode (DAM) to enable the URL parsing feature.  
n
n
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Define a real server group and set up health checks for the group.  
Define a virtual server on virtual port 80 (HTTP), and assign the real server group to service it.  
Enable SLB on the switch.  
Enable client processing on the port connected to the clients.  
For information on how to configure your network for SLB, see Server Load Balancingon  
page 117.  
376  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
2. Define the string(s) to be used for URL load balancing.  
>> # /cfg/slb/layer7/slb/add|rem <string>  
n add: Add string or a path.  
n rem: Remove string or a path.  
A default string anyindicates that the particular server can handle all URL or Web-cache  
requests. Refer to the following examples given below:  
Example 1: String with the Forward Slash (/)  
A string that starts with a forward slash ( /), such as /images,indicates that the server  
will process requests that start out with the /imagesstring only.  
For example, with the /imagesstring, the server will handle these requests:  
/images/product/b.gif  
/images/company/a.gif  
/images/testing/c.jpg  
The server will not handle these requests:  
/company/images/b.gif  
/product/images/c.gif  
/testing/images/a.gif  
Example 2: String without the Forward Slash (/)  
A string that does not start out with a forward slash ( / ) indicates that the server will process  
any requests that contain the defined string. For example, with the imagesstring, the server  
will process these requests:  
/images/product/b.gif  
/images/company/a.gif  
/images/testing/c.jpg  
/company/images/b.gif  
/product/images/c.gif  
/testing/images/a.gif  
Example 3: String with the Forward Slash (/) Only  
If a server is configured with the load balance string ( / ) only, it will only handle requests to  
the root directory. For example, the server will handle any files in the rootdirectory:  
/
/index.htm  
/default.asp  
/index.shtm  
Chapter 15: Content Intelligent Switching  
377  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
3. Apply and save your configuration changes.  
4. Identify the defined string IDs.  
>> # /cfg/slb/layer7/slb/cur  
For easy configuration and identification, each defined string has an ID attached, as shown in  
the following example:  
Number of entries: six  
ID  
1
SLB String  
any  
2
.gif  
3
/sales  
/xitami  
/manual  
.jpg  
4
5
6
5. Configure one or more real servers to support URL-based load balancing.  
6. Add the defined string(s) to the real server using the following command:  
>> # /cfg/slb/real 2/layer7/addlb <ID>  
where ID is the identification number of the defined string.  
NOTE If you dont add a defined string (or add the defined string any) the server will han-  
dle any request.  
A server can have multiple defined strings. For example:  
n
n
n
/images”  
/sales”  
.gif”  
With these defined strings, this particular server can handle requests that start with /images”  
or /salesand any requests that contain .gif.  
378  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
7. Enable SLB on the switch.  
>> # /cfg/slb/on  
(Turn SLB on)  
8. Enable DAM on the switch or configure a proxy IP address on the client port.  
n
n
To turn on DAM:  
>> # /cfg/slb/adv/direct ena  
To turn off DAM and configure a proxy IP address on the client port:  
>> # /cfg/slb/direct dis  
>> # port 2/pip 12.12.12.12  
>> # proxy ena  
NOTE By enabling DAM on the switch or, alternatively, disabling DAM and configuring a  
Proxy IP address on the client port, port mapping for URL load balancing can be performed.  
9. Enable URL-based SLB on the virtual server(s).  
>> # /cfg/slb/virt <virtual server number>/service 80/httpslb urlslb  
Statistics for URL-Based Server Load Balancing  
To show the number of hits to the SLB or cache server, use this command:  
>> # /stats/slb/layer7/lb  
Sample Statistics:  
ID  
1
SLB String Hits  
any  
73881  
2
.gif  
0
3
/sales  
/xitami  
/manual  
.jpg  
0
4
162102  
5
0
0
6
Chapter 15: Content Intelligent Switching  
379  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Virtual Hosting  
Web OS allows individuals and companies to have a presence on the Internet in the form of a  
dedicated Web site address. For example, you can have a www.site-a.comand www.site-  
b.cominstead of www.hostsite.com/site-aand www.hostsite.com/site-b.”  
Service providers, on the other hand, do not want to deplete the pool of unique IP addresses by  
dedicating an individual IP address for each home page they host. By supporting an extension in  
HTTP 1.1 to include the host header, Web OS enables service providers to create a single virtual  
server IP address to host multiple Web sites per customer, each with their own host name.  
NOTE For SLB, one HTTP header is supported per virtual server.  
The following list provides more detail on virtual hosting with configuration information.  
n
An HTTP/1.0 request sent to an origin server (not a proxy server) is a partial URL instead  
of a full URL.  
An example of the request that the origin server would see as follows:  
GET /products/180/ HTTP/1.0  
User-agent: Mozilla/3.0  
Accept: text/html, image/gif, image/jpeg  
The GET request does not include the host name. From the TCP/IP headers, the origin  
server knows the requests host name, port number, and protocol.  
n
With the extension to HTTP/1.1 to include the HTTP HOST: header, the above request to  
retrieve the URL /www.nortelnetworks.com/ products/180would look like this:  
GET /products/180/ HTTP/1.1  
Host: www.nortelnetworks.com  
User-agent: Mozilla/3.0  
Accept: text/html, image/gif, image/jpeg  
The Host: header carries the hostname used to generate the IP address of the site.  
n
n
n
Based on the Host: header, the switch will forward the request to servers representing dif-  
ferent customersWeb sites.  
The network administrator needs to define a domain name as part of the 128 supported  
URL strings.  
The switch performs string matching; that is, the string nortelnetworks.comor  
www.nortelnetworks.comwill match www.nortelnetworks.com.”  
380  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Virtual Hosting Configuration Overview  
The sequence of events for configuring virtual hosting based on HTTP Host: headers is  
described below:  
1. The network administrator defines a domain name as part of the 128 supported URL  
strings.  
Both domain names www.company-a.comand www.company-b.comresolve to the same  
IP address. In this example, the IP address is for a virtual server on the switch.  
2. www.company-a.comand www.company-b.comare defined as URL strings.  
3. Server Group 1 is configured with Servers 1 through 8.  
Servers 1 through 4 belong to www.company-a.comand Servers 5 through 8 belong to  
www.company-b.com.”  
4. The network administrator assigns string www.company-a.comto Servers 1 through 4  
and string www.company-b.comto Servers 5 through 8.  
5. The Web switch inspects the HTTP host header in requests received from the client.  
n
If the host header is www.company-a.com,the switch directs requests to one of the  
Servers 1 through 4.  
n
If the host header is www.company-b.com,the switch directs requests to one of the  
Servers 5 through 8.  
Chapter 15: Content Intelligent Switching  
381  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Configuring the “Host” Header for Virtual Hosting  
To support virtual hosting, configure the switch for Host header-based load balancing with the  
following procedure:  
1. Before you can configure header-based server load balancing, ensure that the switch has  
already been configured for basic SLB with the following tasks:  
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define each real server.  
Assign servers to real server groups.  
Define virtual servers and services.  
For information on how to configure your network for server load balancing, see Server Load  
Balancingon page 117.  
2. Turn on URL parsing for the virtual server for virtual hosting.  
>> # /cfg/slb/virt 1  
(Select the virtual IP for host  
header-based SLB)  
>> Virtual Server 1 # service 80  
(Select the HTTP service)  
>> Virtual Server 1 http Service # httpslb host  
3. Define the host names.  
>> # /cfg/slb/layer7/slb/add "www.customer1.com"  
>> Server Loadbalance Resource# add "www.customer2.com"  
>> Server Loadbalance Resource# add "www.customer3.com"  
4. Configure the real server(s) to handle the appropriate load balancing string(s).  
To add a defined string:  
>> # /cfg/slb/real 2  
(Select the real server)  
>> Real Server 2 # Layer 7  
>> Real Server 2 Layer 7 Commands # addlb <ID>(Specify the string ID)  
where ID is the identification number of the defined string.  
NOTE If you don't add a defined string (or add the defined string any), the server will han-  
dle any request.  
382  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Cookie-Based Preferential Load Balancing  
Cookies can be used to provide preferential services for customers, ensuring that certain users  
are offered better access to resources than other users when site resources are scarce. For  
example, a Web server could authenticate a user via a password and then set cookies to identify  
them as Gold,” “Silver,or Bronzecustomers. Using cookies, you can distinguish individu-  
als or groups of users and place them into groups or communities that get redirected to better  
resources and receive better services than all other users.  
NOTE Cookie-based persistent load balancing is described in Chapter 16, Persistence.”  
Cookie-based preferential services enable the following support:  
n
n
n
n
n
Redirect higher priority users to a larger server or server group.  
Identify a user group and redirect them to a particular server.  
Serve content based on user identity.  
Prioritize access to scarce resources on a Web site.  
Provide better services to repeat customers, based on access count.  
Clients that receive preferential service can be distinguished from other users by one of the fol-  
lowing methods:  
n
Individual User  
Specific individual user could be distinguished by IP address, login authentication, or per-  
manent HTTP cookie.  
n
User Communities  
Some set of users, such as Premium Usersfor service providers who pay higher mem-  
bership fees than Normal Userscould be identified by source address range, login  
authentication, or permanent HTTP cookie.  
n
n
Applications  
Users could be identified by the specific application they are using. For example, priority  
can be given to HTTPS traffic that is performing credit card transactions versus HTTP  
browsing traffic.  
Content  
Users could be identified by the specific content they are accessing.  
Based on one or more of the criteria above, you can load balance requests to different server  
groups.  
Chapter 15: Content Intelligent Switching  
383  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Configuring Cookie-Based Preferential Load Balancing  
To configure cookie-based preferential load balancing, perform the following procedure.  
1. Before you can configure header-based load balancing, ensure that the switch has already  
been configured for basic SLB with the following tasks:  
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Assign servers to real server groups.  
Define virtual servers and services.  
For information on how to configure your network for SLB, see Chapter 6, Server Load Bal-  
ancing.  
2. Turn on URL parsing for the virtual server.  
>> # /cfg/slb/virt 1  
>> Virtual Server 1 # service 80  
>> Virtual Server 1 http Service # httpslb cookie  
Enter Cookie Name: sid  
Enter the starting point of the Cookie value [1-64]: 1  
Enter the number of bytes to extract [1-64]: 6  
Look for Cookie in URI [e|d]: d  
where  
sid= cookie name  
1 = offset (the starting position of the value to be used for hashing)  
6 = length (the number of bytes in the cookie value)  
d = looks for the cookie in the cookie header instead of the URI (disables searching for cookie  
in the URI)  
3. Define the cookie values.  
>> # /cfg/slb/layer7/slb/add "Gold"  
>> # add "Silver"  
>> # add "Bronze"  
Since a session cookie does not exist in the first request of an HTTP session, a default server or  
anyserver is needed to assign cookies to a Nonecookie HTTP request.  
384  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Example:  
n
n
n
n
Real Server 1: Goldhandles gold requests.  
Real Server 2: Silverhandles silver request.  
Real Server 3: Bronzehandles bronze request.  
Real Server 4: anyhandles any request that does not have a cookie or matching  
cookie.  
With servers defined to handle the requests listed above, here is what happens:  
n
n
n
n
n
Request 1 comes in with no cookie; it is forwarded to Real Server 4 to get cookie assigned.  
Request 2 comes in with Goldcookie; it will be forwarded to Real Server 1.  
Request 3 comes in with Silvercookie; it will be forwarded to Real Server 2.  
Request 4 comes in with Bronzecookie; it will be forwarded to Real Server 3.  
Request 5 comes in with Titaniumcookie; it will be forwarded to Real Server 4, since it  
does not have an exact cookie match (matches with anyconfigured at Real Server 4).  
4. Configure the real server(s) to handle the appropriate load balance string(s).  
To add a defined string:  
>> # /cfg/slb/real 2/layer7/addlb <ID>  
where ID is the identification number of the defined string.  
NOTE If you don't add a defined string (or add the defined string any), the server will han-  
dle any request.  
5. Enable DAM on the switch or configure a proxy IP address on the client port.  
To use cookie-based preferential load balancing without DAM, you must configure a proxy IP  
address on the client port.  
NOTE If VMA is enabled, you need to configure a proxy IP address on ports 1-8. If VMA is  
disabled, you need only one proxy IP address.  
Enable proxy load balancing on the port used for cookie-based preferential load balancing. If  
Virtual Matrix Architecture (VMA) is enabled on the switch, you can choose to configure the  
remaining ports with proxy IP disabled.  
Chapter 15: Content Intelligent Switching  
385  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Browser-Smart Load Balancing  
HTTP requests can be directed to different servers based on browser type by inspecting the  
User-Agentheader. For example,  
GET /products/180/ HTTP/1.0  
User-agent: Mozilla/3.0  
Accept: text/html, image/gif, image/jpeg  
To allow the switch to perform browser-smart load balancing, perform the following proce-  
dure.  
1. Before you can configure browser-based load balancing, ensure that the switch has  
already been configured for basic SLB with the following tasks:  
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Assign servers to real server groups.  
Define virtual servers and services.  
2. Turn on URL parsing for the virtual server for User-Agent:header.  
>> # /cfg/slb/virt 1/service 80/httpslb browser  
3. Define the host names.  
>> # /cfg/slb/layer7/slb/add "Mozilla"  
>> Server Loadbalance Resource# add "Internet Explorer"  
>> Server Loadbalance Resource# add "Netscape"  
4. Configure the real server(s) to handle the appropriate load balancing string(s).  
NOTE If you don't add a defined string (or add the defined string any), the server will han-  
dle any request.  
Use the following command to add a defined string:  
>> # /cfg/slb/real 2/layer7/addlb <ID>  
where ID is the identification number of the defined string.  
386  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
URL Hashing for Server Load Balancing  
By default, hashing algorithms use the IP source address and/or IP destination address  
(depending on the application area) to determine content location. The default hashing algo-  
rithm for SLB is the IP source address. By enabling URL hashing, requests going to the same  
page of an origin server are redirected to the same real server or cache server.  
Virtual Server Load Balancing of Nontransparent Caches  
You can deploy a cluster of non-transparent proxy caches and use the virtual server to load bal-  
ance requests to the cache servers. The clients browser is configured to send Web requests to a  
nontransparent cache (the IP address of the configured virtual server).  
If hash is selected as the load-balancing algorithm, the switch hashes the source IP address to  
select the server for SLB. Under this condition, the switch may not send Web requests for the  
same origin server to the same proxy cache server. For example, requests made from a client to  
http://www.nortelnetworks.com/productsfrom different clients may get sent to different  
caches.  
Virtual Server IP Address:  
205.178.13.243  
$
$
$
Client's browser is configured  
to send Web requests to the  
origin server via the virtual server  
Non-Transparent  
Cache Farm  
Figure 15-3 Balancing Nontransparent Caches  
Configuring URL Hashing  
You can direct the same URL request to the same cache or proxy server by using a virtual  
server IP address to load balance proxy requests. By configuring hashor minmissesas the  
metric, the switch uses the number of bytes in the URI to calculate the hash key.  
If the host field exists and the switch is configured to look into the Host: header, the switch  
uses the Host: header field to calculate the hash key.  
Chapter 15: Content Intelligent Switching  
387  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
To configure URL hashing, perform the following procedure:  
1. Before you can configure URL hashing, ensure that the switch has already been config-  
ured for basic SLB with the following tasks:  
n
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Assign servers to real server groups.  
Define virtual servers and services.  
Configure load-balancing algorithm for hashor minmiss.  
Enable SLB.  
For information on how to configure your network for SLB, see Chapter 6, Server Load  
Balancing.”  
n
Define server port and client port.  
2. Enable URL hashing.  
>> # /cfg/slb/virt 1  
>> Virtual Server 1 # service 80  
>> Virtual Server 1 http Service # httpslb urlhash  
Enter new hash length [1-255]: 25  
Hashing is based on the URL, including the HTTP Host: header (if present), up to a maximum  
of 255 bytes.  
3. Set the metric for the real server group to minmissesor hash.  
>> # /cfg/slb/group 1/metric <hash|minmiss>  
388  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Header Hash Load Balancing  
Web OS allows you to hash on any selected HTTP header. To configure the Web switch for  
load balancing based on header hash, perform the following procedure:  
1. Ensure that the switch has already been configured for basic SLB:  
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Assign servers to real server groups.  
Define virtual servers and services.  
For information on how to configure your network for SLB, see Chapter 6, Server Load Bal-  
ancing.”  
2. Enable header hashing.  
>> # /cfg/slb/virt 1  
>> Virtual Server 1 # service 80  
>> Virtual Server 1 http Service # httpslb headerhash  
Select Operation: none  
Enter new HTTP header name: User-agent  
Enter new hash length [1-255]: 25  
3. Set the metric for the real server group to minmissesor hash.  
>> # /cfg/slb/group 1/metric <hash|minmiss>  
Chapter 15: Content Intelligent Switching  
389  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
DNS Load Balancing  
The Internet name registry has become so large that a single server cannot keep track of all the  
entries. This is resolved by splitting the registry and saving it on different servers.  
If you have large DNS server farms, Web OS allows you to load balance traffic based on DNS  
names. To load balance DNS names, the host name is extracted from the query, processed by  
the regular expressions engine, and the request is sent to the appropriate real server.  
For example, Figure 15-4 shows a DNS server farm load balancing DNS queries based on  
DNS names. Requests with DNS names beginning with A through G are sent to Server 1; DNS  
names beginning with H through M are sent to Server 2; DNS names beginning with N through  
T are sent to Server 3; DNS names beginning with U through Z are sent to Server 4.  
DNS Server Farm  
Server 1  
DNS Queries A - G  
Web Switch  
Client  
Server 2  
DNS Queries H - M  
Server 3  
Server 4  
DNS Queries N - T  
DNS Queries U - Z  
Figure 15-4 Load Balancing DNS Queries  
390  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
To configure the switch for DNS load balancing, perform the following procedure:  
1. Before you can configure DNS load balancing, ensure that the switch has already been  
configured for basic SLB with the following tasks:  
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server (DNS server address).  
Assign servers to real server groups.  
Define virtual servers and services.  
Enable SLB.  
For information on how to configure your network for SLB, see Chapter 6, Server Load  
Balancing.”  
n
Define server port and client port.  
2. Enable DNS load balancing.  
>> # /cfg/slb/virt 1  
>> Virtual Server 1 # service 53  
(Select the virtual server)  
(Select the DNS service)  
>> Virtual Server 1 DNS Service # dnsslb ena (Enable DNS SLB)  
3. Enable delayed binding.  
>> Virtual Server 1 DNS Service# dbind ena  
4. Define the host names.  
>> # /cfg/slb/layer7/slb/add www.[abcdefg]*.com  
>> Server Loadbalance Resource# add www.[hijklm]*.com  
>> Server Loadbalance Resource# add www.[nopqrst]*.com  
>> Server Loadbalance Resource# add www.[uvwxyz]*.com  
5. Apply and save your configuration changes.  
6. Identify the defined string IDs.  
>> # /cfg/slb/layer7/slb/cur  
For easy configuration and identification, each defined string has an ID attached, as shown in  
the following example:  
Chapter 15: Content Intelligent Switching  
391  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Number of entries: five  
ID  
1
SLB String  
any, cont 1024  
2
www.[abcdefg]*.com, cont 1024  
www.[hijklm]*.com, cont 1024  
www.[nopqrst]*.com, cont 1024  
www.[uvwxyz]*.com, cont 1024  
3
4
5
7. Add the defined string IDs to the real server using the following command:  
>> # /cfg/slb/real 1/layer7/addlb 2  
>> # /cfg/slb/real 2/layer7/addlb 3  
>> # /cfg/slb/real 3/layer7/addlb 4  
NOTE If you don't add a defined string (or add the defined string any) the server will han-  
dle any request.  
Earlier versions of Web OS supported hashing to bind a clients request to a real server for  
Layer 7 load balancing. As a result, all the real servers carried the same content. In addition to  
hashing, Web OS 10.0 allows you to segregate the requests based on the string pattern, match  
the strings in the requests, and direct the requests to the assigned servers. For more information  
on RTSP, refer to Real Time Streaming Protocol SLBon page 155  
To configure RTSP load balancing using hash, follow this procedure:  
>> # /cfg/slb/virt 1/service 554  
>> Virtual Server 1 rtsp Service# rtspslb  
Enter new RTSP load balancing method [hash|pattern|disabled]: hash  
392  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
To configure RTSP load balancing using pattern matching, follow this procedure:  
1. Add the URL string.  
>> # /cfg/slb/layer7/slb/add <URL string ID> (Add URL string ID, for example,  
g2video.rm)  
n
You can remove the URL string by performing the following:  
>> # /cfg/slb/layer7/slb  
>> Server Load Balance Resource# rem <URL string ID>  
(Remove URL string ID: g2video.rm)  
n
You can rename the URL string by performing the following:  
>> # /cfg/slb/layer7/slb  
>> Server Load Balance Resource# rename <URL string ID>  
(Rename URL string: g2video.rm)  
2. Assign a URL string ID to a real server.  
>> # /cfg/slb/real 1  
(Select the real server)  
>> Real Server 1 # Layer 7  
>> Real Server 1 Layer 7 Commands # addlb <URL string ID (1-128)>  
(Add the string ID for RTSP load  
balance)  
3. Enable Layer 7 Parsing for RTSP.  
>> # /cfg/slb/virt 1/service rtsp  
>> Virtual Server 1 rtsp Service# rtspslb  
Current RTSP URL load balancing:  
disabled  
Enter new RTSP load balancing method [hash|pattern|disabled]: pattern  
4. Apply and save the configuration  
>> Virtual Server 1 rtsp Service# apply  
>> Virtual Server 1 rtsp Service# save  
Chapter 15: Content Intelligent Switching  
393  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Content Intelligent Web Cache Redirection  
Web OS allows you to redirect Web cache requests based on different HTTP header information,  
such as Host:header or User-Agentfor browser-smart load balancing. For more information  
on layer 4 Web cache redirection, see Chapter 8, Application Redirection.”  
The No Cache/Cache Control for Web Cache Redirection (WCR) feature in Web OS allows  
you to off load the processing of non-cacheable content from cache servers by sending only  
appropriate requests to the cache server farm. When a Cache-Control header is present in a  
HTTP 1.1 request, it indicates a client's special request with respect to caching, such as to guar-  
antee up-to-date data from the origin server. If this feature (Cache-Control: no cache directive)  
is enabled, HTTP 1.1 GET requests are forwarded directly to the origin servers.  
NOTE The term origin server refers to the server originally specified in the request.  
The HTTP 1.0 Pragma: no-cacheheader is equivalent to the HTTP 1.1 Cache-Con-  
trolheader. By enabling the Pragma: no-cacheheader, requests are forwarded to the ori-  
gin server.  
NOTE For WCR, at any given time one HTTP header is supported globally for the entire  
switch.  
This section discusses the following types of Web cache redirection:  
n
n
n
n
n
HTTP Header-Based Web Cache Redirectionon page 403  
Browser-Based Web Cache Redirectionon page 405  
URL Hashing for Web Cache Redirectionon page 406  
Layer 7 RTSP Streaming Cache Redirectionon page 409  
394  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
URL-Based Web Cache Redirection  
URL parsing for Web Cache Redirection operates in a manner similar to URL-based server  
load balancing except that in WCR a virtual server on the switch is the target of all IP/HTTP  
requests. For information on URL-based server load balancing, see URL-Based Server Load  
Balancingon page 375.  
By separating static and dynamic content requests via URL parsing, Web OS enables you to  
send requests with specific URLs or URL strings to designated cache servers. The URL-based  
WCR option allows you to off load overhead processing from the cache servers by only send-  
ing appropriate requests to the cache server farm.  
NOTE Both HTTP 1.0 and HTTP 1.1 requests are supported.  
Each request is examined and handled as described below:  
n
n
n
If the request is a non-GET request such as HEAD, POST, PUT, or HTTP with cookies, it  
is not sent to the cache.  
If the request is an ASP or CGI request or a dynamically generated page, it is not sent to  
the cache.  
If the request contains a Cookie, it can optionally bypass the cache.  
You can configure up to 32 URL expressions, each 8 bytes long, for noncacheable content  
types. You can use up to 128 strings, comprising of 40 bytes each for URL string matching on  
each switch. As each URL Web request is examined, noncacheable items are forwarded to the  
origin server while requests with matching strings are redirected to the appropriate cache  
server.  
Examples of matching string expressions are:  
n
n
/product  
Any URL that starts with /product,including any information in the /productdirec-  
tory  
product  
Any URL that has the string product”  
Chapter 15: Content Intelligent Switching  
395  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
The switch is preconfigured with a list of 13 noncacheable items that you can add to, delete, or  
modify. These items are either known dynamic content file extensions or dynamic URL  
parameters, as described below:  
n
Dynamic content files:  
Common gateway interface files (.cgi)  
cold fusion files (.cfm), ASP files (.asp)  
BIN directory  
CGI-BIN directory  
SHTML (scripted html)  
Microsoft HTML extension files (.htx)  
executable files (.exe)  
n
Dynamic URL parameters: +, !, %, =, &  
Host B  
Host A  
Internet  
ipt.bin  
Host C  
.hostc.com/cgi-bin/scr  
.com/q?s=hwp%2C+ibm%d=v1  
ahoo  
.y  
GET/www  
GET/http://finance  
Non-HTTP GET  
Web Cache Redirector  
GET/product/Webswitch.html  
GET/company/information.html  
/product  
information  
$
GET/compan  
y
/imag  
es/s  
witch.gif  
$
images  
$
Implicit load balancing  
within the group  
Figure 15-5 URL-Based Web Cache Redirection  
Requests matching the URL are load balanced among the multiple servers, depending on the  
metric specified for the real server group (leastconnsis the default).  
396  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Network Address Translation Options  
URL-based WCR supports three types of Network Address Translation (NAT): No NAT, Half  
NAT, and Full NAT.  
n
No NAT  
In this NAT method, the traffic is redirected to the Web cache with the destination MAC  
address replaced by the MAC address of the cache. The destination IP address remains  
unchanged, and no modifications are made to the IP address or the MAC address of the  
source or origin server. This works well for transparent cache servers, which process traf-  
fic destined to their MAC address but with the IP address of some other device.  
n
n
Half NAT  
In this most commonly used NAT method, the destination IP address is replaced by the IP  
address of the Web cache, and the destination MAC address is replaced by the MAC  
address of the Web cache. Both the IP address and the MAC address of the source remain  
unchanged.  
Full NAT  
In this NAT method, the source IP address and the source MAC address are replaced by  
the IP address and MAC address of the Web cache. This method works well for proxy  
cache servers.  
Configuring URL-Based Web Cache Redirection  
To configure URL-based Web Cache Redirection (WCR), perform the following steps:  
1. Before you can configure URL-based WCR, configure the switch for basic Server Load  
Balancing (SLB) with the following tasks:  
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
For information on how to configure your network for SLB, see Server Load Balancingon  
page 117.  
2. Configure the switch to support basic WCR.  
For information on WCR, refer to Application Redirectionon page 203.  
Chapter 15: Content Intelligent Switching  
397  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
3. Configure the parameters and file extensions that bypass WCR.  
The switch is preconfigured with a list of 13 noncacheable items:  
n
Dynamic content files: Common gateway interface files (.cgi), cold fusion files (.cfm),  
ASP files (.asp), BIN directory, CGI-BIN directory, SHTML (scripted html), Microsoft  
HTML extension files (.htx), executable files(.exe)  
n
Dynamic URL parameters: +, !, %, =, &  
a) Add or remove expressions that should not be cacheable.  
>> # /cfg/slb/layer7/redir/add|remove <expression>  
b) Enable/disable ALLOW for non-GETS (such as HEAD, POST, and PUT) to the ori-  
gin server, as described below.  
>> # /cfg/slb/layer7/redir/urlal ena|dis  
Ena:The switch allows all non-GET requests to the origin server.  
Dis: The switch compares all requests against the expression table to determine  
whether the request should be redirected to a cache server or the origin server.  
c) Enable/disable cache redirection of requests that contain cookie:in the HTTP  
header.  
>> # /cfg/slb/layer7/redir/cookie ena|dis  
Ena: The switch redirects all requests that contain cookie:in the HTTP header to  
the origin server.  
Dis: The switch compares the URL against the expression table to determine  
whether the request should be redirected to a cache server or the origin server.  
d) Enable/disable cache redirection of requests that contain Cache-control:no  
cachein the HTTP 1.1 header or Pragma:no cachein the HTTP 1.0 header  
to the origin server.  
>> # /cfg/slb/layer7/redir/nocache ena|dis  
Ena: The switch redirects all requests that contain Cache-control:nocache  
in the HTTP 1.1 header or Pragma:no cachein the HTTP 1.0 header to the origin  
server.  
Dis: The switch compares the URL against the expression table to determine  
whether the request should be redirected to a cache server or the origin server.  
398  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
4. Define the string(s) to be used for Web cache SLB. Refer to the parameters listed below:  
>> # /cfg/slb/layer7/slb/add|rem <string>  
n add: Add a string or a path.  
n rem: Remove string or a path.  
A default string anyindicates that the particular server can handle all URL or Web-cache  
requests. Refer to the following examples:  
Example 1: String Starting with the Forwardslash (/)  
A string that starts with a forwardslash ( /), such as /images,indicates that the server will  
process requests that start out with the /imagesstring only.  
For example, with the /imagesstring, the server will handle these requests:  
/images/product/b.gif  
/images/company/a.gif  
/images/testing/c.jpg  
The server will not handle these requests:  
/company/images/b.gif  
/product/images/c.gif  
/testing/images/a.gif  
Example 2: String without the Forwardslash (/)  
A string that does not start out with a forwardslash ( / ) indicates that the server will process  
any requests that contain the defined string. For example, with the imagesstring, the server  
will process these requests:  
/images/product/b.gif  
/images/company/a.gif  
/images/testing/c.jpg  
/company/images/b.gif  
/product/images/c.gif  
/testing/images/a.gif  
Example 3: String with the Forwardslash (/) Only  
If a server is configured with the load balance string ( / ) only, it will only handle requests to  
the root directory. For example, the server will handle any files in the ROOT directory:  
/
/index.htm  
/default.asp  
/index.shtm  
Chapter 15: Content Intelligent Switching  
399  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
5. Apply and save your configuration changes.  
6. Identify the defined string IDs.  
>> # /cfg/slb/layer7/slb/cur  
For easy configuration and identification, each defined string has an ID attached, as shown in  
the following example:  
Number of entries: six  
ID  
1
SLB String  
any  
2
.gif  
3
/sales  
/xitami  
/manual  
.jpg  
4
5
6
7. Configure the real server(s) to support WCR.  
NOTE If you don't add a defined string (or add the defined string any), the server will han-  
dle any request.  
Add the defined string(s) to the real servers:  
>> # /cfg/slb/real 2/layer7/addlb <ID>  
where ID is the identification number of the defined string.  
The server can have multiple defined strings. For example: /images, /sales, .gif”  
With these defined strings, the server can handle requests that begin with /imagesor /sales”  
and any requests that contain .gif.  
8. Define a real server group and add real servers to the group.  
The following configuration combines three real servers into a group:  
>> # /cfg/slb/group 1  
(Select real server group 1)  
(Add real server 1 to group 1)  
(Add real server 2 to group 1)  
(Add real server 3 to group 1)  
>> Real server group 1# add 1  
>> Real server group 1# add 2  
>> Real server group 1# add 3  
400  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
9. Configure a filter to support basic WCR.  
The filter must be able to intercept all TCP traffic for the HTTP destination port and must redi-  
rect it to the proper port in the real server group:  
>> # /cfg/slb/filt <filter number>  
>> Filter <filter number># sip any  
>> Filter <filter number># dip any  
>> Filter <filter number># proto tcp  
>> Filter <filter number># sport any  
>> Filter <filter number># dport http  
>> Filter <filter number># action redir  
>> Filter <filter number># rport http  
>> Filter <filter number># group 1  
>> Filter <filter number># ena  
(Select the menu for Filter #x)  
(From any source IP addresses)  
(To any destination IP addresses)  
(For TCP protocol traffic)  
(From any source port)  
(To an HTTP destination port)  
(Set the action for redirection)  
(Set the redirection port)  
(Select real server group 1)  
(Enable the filter)  
10. Enable URL-based WCR on the same filter.  
>> # /cfg/slb/filt <filter number>/adv/urlp ena  
11. Select the appropriate NAT option.  
The three NAT options are listed below. For more information about each option, see Net-  
work Address Translation Optionson page 397.  
n
n
n
No NAT option:  
>> # /cfg/slb/filter <filter number>/adv/proxy dis  
Half NAT option:  
>> # /cfg/slb/filter <filter number>/adv/proxy ena  
Full NAT option:  
>> # /cfg/slb/port <port number>  
>> SLB port <port number># pip 12.12.12.12(Configure proxy IP address on  
the physical port)  
>> SLB port <port number># ../filt <filter number>  
>> Filter <filter number># rport 3128  
>> Filter <filter number># adv  
(Specify redirection port)  
(Select the advance menu)  
>> Filter <filter number> Advanced# proxy ena(Enable proxy IP address)  
Chapter 15: Content Intelligent Switching  
401  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
12. Create a default filter for noncached traffic on the switch.  
>> # /cfg/slb/filt <filter number>  
>> Filter <filter number># sip any  
>> Filter <filter number># dip any  
>> Filter <filter number># proto any  
>> Filter <filter number># action allow  
>> Filter <filter number># ena  
(Select the default filter)  
(From any source IP addresses)  
(To any destination IP addresses)  
(For any protocol traffic)  
(Set the action to allow traffic)  
(Enable the default filter)  
>> Filter <filter number># port <port number>  
(Assign the default filter to a port)  
NOTE When the protoparameter is not tcpor udp, then sportand dportare ignored.  
13. Turn on filtering for the port.  
>> SLB <port number># filt ena  
14. Add the filters to the client port.  
>> SLB <port number># add <filter number>  
15. Enable Direct Access Mode (DAM) on the switch.  
>> SLB <port number># ../adv  
>> Layer 4 Advanced# direct ena  
16. Enable, apply, and verify the configuration.  
>> # /cfg/slb  
>> # on  
(Select the SLB Menu)  
(Turn SLB on)  
>> # apply  
>> # cur  
(Make your changes active)  
(View current settings)  
Viewing Statistics for URL-Based Web Cache Redirection  
To show the number of hits to the cache server or origin server, use this command:  
>> # /stats/slb/layer7/redir  
Total URL based Web cache redirection stats:  
Total cache server hits:  
Total origin server hits:  
Total none-GETs hits:  
Total ’Cookie: ’ hits:  
Total no-cache hits:  
73942  
2244  
53467  
729  
43  
402  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
HTTP Header-Based Web Cache Redirection  
To configure the switch for WCR based on the Host:header, use the following procedure:  
1. Configure basic SLB.  
Before you can configure header-based cache redirection, ensure that the switch has already  
been configured for basic SLB (see Server Load Balancingon page 117)with the following  
tasks:  
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Assign servers to real server groups.  
Define virtual servers and services.  
2. Turn on URL parsing for the filter.  
>> # /cfg/slb/filt 1/adv/urlp ena  
3. Enable header load balancing for the Host:header.  
>> # /cfg/slb/layer7/redir/header ena host  
4. Define the host names.  
>> # /cfg/slb/layer7/slb/add ".com"  
>> Server Load Balance Resource# add ".org"  
>> Server Load Balance Resource# add ".net"  
5. Apply and save your configuration changes.  
6. Identify the string ID numbers with this command.  
>> # /cfg/slb/layer7/slb/cur  
Each defined string has an associated ID number.  
Number of entries: four  
ID  
1
SLB String  
any  
2
.com  
3
.org  
4
.net  
Chapter 15: Content Intelligent Switching  
403  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
7. Configure the real server(s) to handle the appropriate load balance string(s).  
Add the defined string IDs to the real servers:  
>> # /cfg/slb/real 2/layer7/addlb <ID>  
where ID is the identification number of the defined string.  
NOTE If you dont add a defined string (or add ID=1), the server will handle any request.  
8. If Host:header filtering is enabled (Step 3), you can configure the switch to use the host  
header field to determine whether requests are cacheable (or noncacheable).  
For example, if you want all domain names that end with .netor .uknot to go to a cache  
server, then enter the following command:  
>> # /cfg/slb/layer7/redir/add .net .uk  
404  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Browser-Based Web Cache Redirection  
Browser-based Web cache redirection uses the User-agent:header. To configure browser-  
based WCR, perform the following procedure.  
1. Before you can configure header-based WCR, ensure that the switch is already config-  
ured for basic SLB with the following tasks:  
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Assign servers to real server groups.  
Define virtual servers and services.  
2. Turn on URL parsing for the filter.  
>> # /cfg/slb/filt 1/adv/urlp enable  
3. Enable header load balancing for User-Agent:header.  
>> # /cfg/slb/layer7/redir/header ena useragent  
4. Define the host names.  
>> # /cfg/slb/layer7/slb/add "Mozilla"  
>> Server Load Balance Resource# add "Internet Explorer"  
>> Server Load Balance Resource# add "Netscape"  
5. Apply and save your configuration changes.  
6. Identify the string ID numbers with this command.  
>> # /cfg/slb/layer7/slb/cur  
Each defined string has an ID number.  
Number of entries: four  
ID  
1
SLB String  
any  
2
Mozilla  
3
Internet Explorer  
Netscape  
4
Chapter 15: Content Intelligent Switching  
405  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
7. Add the defined string IDs to configure the real server(s) to handle the appropriate load  
balance string(s).  
>> # /cfg/slb/real 2/layer7/addlb <ID>  
where ID is the identification number of the defined string.  
NOTE If you dont add a defined string (or add the ID 1), the server will handle any request.  
URL Hashing for Web Cache Redirection  
By default, hashing algorithms use the source IP address and/or destination IP address  
(depending on the application area) to determine content location. For example, firewall load  
balancing uses both source and destination IP addresses, WCR uses only the destination IP  
address, and SLB uses only the source IP address.  
Hashing is based on the URL, including the HTTP Host header (if present), up to a maximum  
of 255 bytes. You can optimize cache hitsby using the hashing algorithm to redirect client  
requests going to the same page of an origin server to a specific cache server.  
For example the switch could use the string nortelnetworks.com/products/180/for hashing  
the following request:  
GET http://products/180 / HTTP/1.0  
HOST:www.nortelnetworks.com  
To configure the switch for WCR based on a hash key, use the following procedure:  
1. Configure basic SLB.  
Before you can configure header-based cache redirection, ensure that the switch has already  
been configured for basic SLB (see Server Load Balancingon page 117) with the following  
tasks:  
n
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Assign servers to real server groups.  
Define virtual servers and services.  
Configure the load-balancing algorithm to hashor minmiss.  
406  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
2. Turn on URL parsing for the filter.  
>> # /cfg/slb/filt 1/adv/urlp ena  
3. Enable hash to direct a cacheable URL request to a specific cache server.  
By default, the host header field is used to calculate the hash key and URL hashing is disabled.  
n
hash ena: Enables hashing based on the URL and the host header if it is present. Specify  
the length of the URL to hash into the cache server.  
>> # /cfg/slb/layer7/redir/hash ena  
Enter new hash length [1-255]: 24  
n
hash disable: Disables hashing based on the URL. Instead, the host header field to calcu-  
late the hash key.  
If the host header field does not exist in the HTTP header, then the switch uses the source  
IP address as the hash key.  
Example 1: Hashing on the URL  
In this example, URL hashing is enabled. If the Host field does not exist, the specified length  
of the URL is used to hash into the cache server as shown in Figure 15-6 on page 408. If the  
Host field exists, the specified length of both the Host field and the URL is used to hash into  
the cache server. The same URL request goes to the same cache server as shown below:  
n
n
n
Client 1 request http://www.nortelnetworks.com/sales/index.htmis  
directed to cache server 1.  
Client 2 request http://www.nortelnetworks.com/sales/index.htmis  
directed to cache server 1.  
Client 3 request http://www.nortelnetworks.com/sales/index.htmis  
directed to cache server 1.  
Chapter 15: Content Intelligent Switching  
407  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
http://www.nortelnetworks.com  
Cache server farm  
1
Clients  
1
2
3
2
3
Internet  
Alteon Web Switch  
Figure 15-6 URL Hashing for WCR  
Example 2: Hashing on the Host Header Field Only  
In this example, URL hashing is disabled. If you use the Host header field to calculate the hash  
key, the same URL request goes to the same cache server:  
n
n
n
Client 1 request http://www.nortelnetworks.comis directed to cache server 1.  
Client 2 request http://www.nortelnetworks.comis directed to cache server 1.  
Client 3 request http://www.nortelnetworks.comis directed to cache server 1.  
Example 3: Hashing on the Source IP address  
In this example, URL hashing is disabled. Because the host header field does not exist in the  
HTTP header, the source IP address is used as the hash key and requests from clients 1, 2, and  
3 are directed to three different cache servers as shown below.  
n
n
n
Client 1 request http://www.nortelnetworks.comis directed to cache server 1.  
Client 2 request http://www.nortelnetworks.comis directed to cache server 2.  
Client 3 request http://www.nortelnetworks.comis directed to cache server 3.  
408  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Layer 7 RTSP Streaming Cache Redirection  
This section explains Layer 7 support for RTSP Streaming Cache Redirection. For conceptual  
information on RTSP Streaming Cache Redirection, see RTSP Web Cache Redirectionon  
page 211. For detailed information on two prominent commercial RTSP serversReal Player  
and QuickTimesee Real Time Streaming Protocol SLBon page 155.  
To configure RTSP for Streaming Cache Redirection, follow this procedure:  
1. Enable URL parsing for the redirection filter.  
>> Main# /cfg/slb/filt <filter number>/adv  
>> Filter 1 Advanced# urlp ena  
(Select the filtering advanced menu)  
(Enable URL parsing)  
2. Configure the parameters and file extensions that will bypass RTSP streaming cache  
redirection. (This is the user-defined non-cacheable content)  
. You can add or remove RTSP files like *.mov, *.smil, .rm, and so forth.  
>> /cfg/slb/layer7/rtspred  
(Select the RTSP cache redirection  
menu)  
>> Web Cache Redirection# add|rem <expression> (Add non-cacheable RTSP URL  
expression for load balancing)  
3. Assign the url string to the real server.  
>> # /cfg/slb/real 1  
(Select the real server)  
>> Real Server 1 # Layer 7  
>> Real Server 1 Layer 7 Commands # addlb <ID>(Add the URL string ID for RTSP  
cache redirection)  
where ID is the identification number of the defined string.  
4. Apply and save the configuration.  
>> Real Server 1 Layer 7 Commands# apply  
>> Real Server 1 Layer 7 Commands# save  
Chapter 15: Content Intelligent Switching  
409  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Exclusionary String Matching for Real  
Servers  
URL-based SLB and WCR can match or exclude up to 128 strings. Examples of strings are as  
follows:  
n
n
/product,matches URLs that starts with /product.  
product,matches URLs that have the string productanywhere in the URL.  
You can assign one or more strings to each real server. When more than one URL string is  
assigned to a real server, requests matching any string are redirected to that real server. There is  
also a special string known as anythat matches all content.  
Web OS also supports exclusionary string matching. Using this option, you can define a server  
to accept any requests regardless of the URL, except requests with a specific string.  
NOTE Once exclusionary string matching is enabled, clients cannot access the URL strings  
that are added to that real server. This means you cannot configure a dedicated server to  
receive a certain string and, at the same time, have it exclude other URL strings. The exclu-  
sionary feature is enabled per server, not per string.  
For example, the following strings are assigned to a real server:  
string 1 = cgi  
string 2 = NOT cgi/form_A  
string 3 = NOT cgi/form_B  
As a result, all cgi scripts are matched except form_A and form_B.  
Configuring for Exclusionary URL String Matching  
This configuration example shows you how to configure a server to handle any requests except  
requests that contain the string testor requests that start with /imagesor /product.  
To configure exclusionary URL string matching, perform the following procedure:  
1. Before you can configure URL string matching, ensure that the switch has already been  
configured for basic SLB:  
n
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Assign servers to real server groups.  
Define virtual servers and services.  
Enable SLB.  
410  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
For information on how to configure your network for server load balancing, see Chapter 6,  
Server Load Balancing.”  
2. Add the load balancing strings (for example test, /images, and /product) to the real  
server.  
>> # /cfg/slb/layer7/slb/add test  
>> Server Loadbalance Resource# add “/images”  
>> Server Loadbalance Resource# add “/product”  
3. Apply and save the configuration.  
4. Identify the IDs of the defined strings.  
>> Server Loadbalance Resource# cur  
Number of entries: three  
ID  
1
SLB String  
any  
2
test  
3
/images  
/product  
4
5. Assign the URL string ID to the real server.  
>> Real Server 1 Layer 7 commands# addlb 2  
>> Real Server 1 Layer 7 commands# addlb 3  
>> Real Server 1 Layer 7 commands# addlb 4  
6. Enable the exclusionary string matching option.  
>> Real Server 1 Layer 7 commands# exclude enable  
If you configured a string anyand enabled the exclusion option, the server will not handle  
any requests. This has the same effect as disabling the server.  
Chapter 15: Content Intelligent Switching  
411  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Regular Expression Matching  
Regular expressions are used to describe patterns for string matching. They enable you to  
match the exact string, such as URLs, host names, or IP addresses. It is a powerful and effec-  
tive way to express complex rules for Layer 7 string matching. Both Layer 7 HTTP SLB and  
Web Cache Redirection can use regular expressions as a resource. Configuring for regular  
expressions can enhance content-based switching in the following areas:  
n
n
HTTP header matching  
URL matching  
Standard Regular Expression Characters  
The following is a list of standard regular expression special characters that are supported in  
Web OS:  
Table 15-1 Standard Regular Expression Special Characters  
Construction  
Description  
*
.
Matches any string of zero or more characters  
Matches any single character  
+
?
$
\
Matches one or more occurrences of the pattern it follows  
Matches zero or one occurrences of its followed pattern  
Matches the end of a line  
Escape the following special character  
Matches any of the single character inside the bracket  
Matches any single character except those inside the bracket  
[abc]  
[^abc]  
Use the following rules to describe patterns for string matching:  
n
n
Supports one layer of parenthesis.  
Supports only single $(match at end of line) which must appear at the end of the string.  
For example, abc$*defis not supported.  
n
Size of the user input string must be 40 characters or less.  
412  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
n
Size of the regular expression structure after compilation cannot exceed 43 bytes for load  
balancing strings and 23 bytes for Web Cache Redirection. The size of regular expression  
after compilation varies, based on regular expression characters used in the user input  
string.  
n
n
Use /at the beginning of the regular expression. Otherwise a regular expression will  
have *prefixed to it automatically. For example, html/*\.htmappears as  
*html/*\.htm.  
Incorrectly or ambiguously formatted regular expressions are rejected instantly. For exam-  
ple:  
where a +or ?follows a special character like the *”  
A single +or ?sign  
Unbalanced brackets and parenthesis  
Configuring Regular Expressions  
The regular expression feature is applicable to both URL SLB path strings and URL SLB redi-  
rected expression strings. Configure regular expressions at the following CLI prompts:  
/cfg/slb/layer7/slb/add  
or  
/cfg/slb/layer7/slb/redir/add  
As a result, both HTTP SLB and WCR can use regular expression as the resource.  
NOTE The more complex the structure of the string, the longer it will take for the server to  
load balance the incoming packets.  
Chapter 15: Content Intelligent Switching  
413  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Content Precedence Lookup  
The Layer 7 Precedence Lookup feature in Web OS allows you to give precedence to one Layer  
7 parameter over another and selectively decide which parameter should be analyzed first.  
The Content Precedence Lookup feature allows you to combine up to two Layer 7 load balanc-  
ing mechanisms. You can specify which types of Layer 7 content to examine, the order in  
which they are examined, and a logical operator (and/or) for their evaluation.  
The following Layer 7 content types can be specified:  
n
n
n
n
n
n
URL SLB  
HTTP Host  
Cookie  
Browsers (User agent)  
URL hash  
Header hash  
Using the above content types with the and and or operators, the Web switch is configured to  
refine HTTP-based server load balancing multiple times on a single client HTTP request in  
order to bind it to an appropriate server. Typically, when you combine two content types with  
an operator (and/or), URL hash and Header hash are used in combination with Host, Cookie,  
or Browser content types.  
For example, the following types of load balancing can be configured using the Content Prece-  
dence Lookup feature:  
n
n
n
n
n
Virtual host and/or URL-based load balancing  
Cookie persistence and URL-based load balancing  
Cookie load balancing and/or URL-based load balancing  
Cookie persistence and HTTP SLB together in the same service  
Multiple HTTP SLB process type on the same service  
NOTE Cookie persistence can also be combined with the Layer 7 content types. For more  
information on cookie persistence, see Chapter 16, Persistence.”  
For example, the Content Precedence Lookup feature can be used in the following scenarios:  
n
n
n
If the client request is sent without a cookie and if no HTTP SLB is configured, then the  
switch binds the request to the real server using normal SLB.  
If the client request is sent without a cookie, but HTTP SLB is configured on the switch,  
then the request is bound to real server based on HTTP SLB.  
If the client request is sent with a cookie, and a real server associated to the cookie is  
found in the local session table, then the request will stay bound to that real server.  
414  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
n
Enable Direct Access Mode (DAM), or configure proxy IP address if DAM is disabled.  
n
Enable delayed binding.  
Using the or and and Operators  
Figure 15-7 shows a network with real servers 1 and 3 configured for URL SLB and real serv-  
ers 2 and 3 configured for HTTP Host SLB.  
Real Servers  
URL: "/gold"  
1
Web Switch  
Client  
Internet  
Host: "www.host.net"  
2
Host: "www.host.net"  
3
URL: "/gold"  
Figure 15-7 Content Precedence Lookup Protectors Example  
If the Content Precedence Lookup feature is configured with the or and and operators, the  
request from the client is as follows:  
n
HTTP Host or URL SLB  
The HTTP Host header takes precedence because it is specified first. If there is no Host  
Header information and because oris the operator, the URL string is examined next.  
If a request from a client contains no Host Header but has a URL string (such as  
/gold), the request is load balanced among Server 1 or Server 3.  
If a request from a client contains a Host Header, then the request is load balanced  
among Server 2 and Server 3. The URL string is ignored because the HTTP Host was  
specified and matched first.  
n
HTTP Host and URL SLB  
The HTTP Host header takes precedence because it is specified first. Because and is the  
operator, both a Host Header and URL string are required. If either is not available, the  
request is dropped.  
If a request from a client contains a URL string (such as /gold) but not a Host  
Header, it is not served by any real server.  
If a request from a client contains a URL string (such as /gold) and Host Header, it  
is served only by real server 3.  
Chapter 15: Content Intelligent Switching  
415  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Assigning Multiple Strings  
Figure 15-8 shows an example of a company providing content for two large customers: Cus-  
tomers A and B. Customer A uses www.a.comas their domain name, and Customer B uses  
www.b.com.  
The company has a limited number of public IP addresses and wishes to assign them on a very  
conservative basis. As a result, the company implements virtual hosting by advertising a single  
virtual server IP address that includes both customersWeb sites. Additionally, the hosting  
company assigns only one service (HTTP port 80) to support the virtual server.  
The virtual hosting company wishes to maintain the flexibility to allow different types of con-  
tent to be placed on different servers. To make most efficient use of their server resources, they  
separate their servers into two groups, using their fastest servers to process dynamic content  
(such as .cgi files) and their slower servers to process all static content (such as .jpg files).  
Web Switch  
Internet  
Client  
Real Servers  
1
2
3
4
5
Host: www.a.com Host: www.a.com Host: www.a.com Host: www.b.com Host: www.b.com  
URL: *.jpg URL: *.jpg URL: *.cgi URL: *.jpg URL: *.cgi  
Figure 15-8 Content Precedence Lookup Multiple Strings Example  
To configure content precedence lookup for the example in Figure 15-8, the hosting company  
groups all the real servers into one real server group even though different servers provide ser-  
vices for different customers and different types of content. In this case, the servers are set up  
for the following purpose:  
Table 15-2 Real Server Content  
Server  
Server 1  
Server 2  
Server 3  
Server 4  
Server 5  
Customer  
Customer A  
Customer A  
Customer A  
Customer B  
Customer B  
Content  
Static .jpg files  
Static .jpg files  
Dynamic .cgi files  
Static .jpg files  
Dynamic .cgi files  
416  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
When a client request is received with www.a.comin the Host Header and .jpg in the URL,  
the request will be load balanced between Server 1 and Server 2.  
To accomplish this configuration, you must assign multiple strings (a Host Header string and a  
URL string) for each real server.  
Layer 7 Deny Filter  
Web OS allows you to secure your switch from virus attacks by configuring the switch with a  
list of potential offending string patterns (HTTP URL request). The switch examines the HTTP  
content of the incoming client request for the matching string pattern. If the matching virus  
pattern is found, then the packet is dropped and a reset frame is sent to the offending client.  
SYSLOG messages and SNMP traps are generated warning operators of a possible attack.  
Figure 15-9 shows an incoming client request with a virus string. The Web switch is config-  
ured for Layer 7 deny filter, so it blocks the incoming packet with the virus string and prevents  
it from entering the network.  
1. Client sends  
a URL request  
with a virus  
string.  
2. Switch filter  
processes the  
string and  
denies entry to  
the network.  
Real servers  
Any virus string  
www.playdog.com  
Clients  
STOP  
Web Switch  
Internet  
Figure 15-9 Configuring Layer 7 Deny Filter  
Chapter 15: Content Intelligent Switching  
417  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Configuring a Layer 7 Deny Filter  
1. Before you can configure Layer 7 deny filter, ensure that the switch has already been con-  
figured for basic switch functions:  
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
For information on how to configure your network for the above tasks, see Chapter 6, Server  
Load Balancing.”  
2. Define the virus string patterns or offending HTTP URL request to be blocked.  
>> # /cfg/slb/layer7/slb/add ida  
(Define the code red virus string)  
>> Server Loadbalance resource# add %c1%9c(Define the code blue virus string)  
>> Server Loadbalance resource# add %c0%af(Define the code blue virus string)  
>> Server Loadbalance resource# add playdog.com(Define the offending URL  
request)  
3. Apply and save the configuration.  
4. Identify the IDs of the defined strings.  
>> Server Loadbalance resource# cur  
Number of entries: four  
ID  
1
SLB String  
ida  
2
%c1%9c  
3
%c0%af  
4
playdog.com  
5. Select the filter and enable the filter action to deny.  
>> # /cfg/slb/filt 1  
(Select the filter)  
>> Filter 1 # action deny  
(Set the filter action to deny)  
6. Enable URL parsing.  
>> Filter 1 # adv  
>> Filter 1 Advanced# urlp ena  
(Enable URL parsing)  
418  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
7. Enable the Layer 7 deny option.  
>> Filter 1 Advanced# l7deny  
>> Filter 1 Advanced L7deny# ena  
(Select the Layer 7 deny menu)  
(Enable Layer 7 deny filter)  
8. Assign the URL string ID from Step 4 to the filter.  
>> Filter 1 Advanced L7deny# addstr 1  
>> Filter 1 Advanced L7deny# addstr 2  
>> Filter 1 Advanced L7deny# addstr 3  
>> Filter 1 Advanced L7deny# addstr 4  
(Add the code red virus string)  
(Add the code blue virus string)  
(Add the code blue virus string)  
(Add the offending URL request)  
9. Apply and save the configuration.  
10. Apply the filter to the client port.  
If the incoming client requests are on port 3, then add the filter to the port.  
>> # /cfg/slb/port 3  
>> SLB Port 3# filt ena  
>> SLB Port 3# add 1  
(Select the client port)  
(Enable filtering on the port)  
(Add the Layer 7 filter to the port)  
Chapter 15: Content Intelligent Switching  
419  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
420  
Chapter 15: Content Intelligent Switching  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 16  
Persistence  
The Web OS persistence feature ensures that all connections from a specific client session  
The following topics are addressed in this chapter:  
n
Overview of Persistenceon page 422. This section gives an overview of persistence and  
the different types of persistence methods implemented in Web OS.  
n
anism for inserting a unique key for each client of a virtual server. This feature is only  
used in nonsecure socket layer (non-SSL) connections. This section discusses in detail  
how persistence is maintained between a client and a real server using different types of  
cookies.  
n
n
Server-Side Multi-Response Cookie Searchon page 436. This section explains how to  
configure the switch to look through multiple HTTP responses from the server to achieve  
cookie-based persistence.  
SSL Session ID-Based Persistenceon page 437. This section explains how an applica-  
tion server and client communicate over an encrypted HTTP session.  
421  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Overview of Persistence  
In a typical SLB environment, traffic comes from various client networks across the Internet to  
the virtual server IP address on the Web switch. The switch then load balances this traffic  
among the available real servers.  
In any authenticated Web-based application, it is necessary to provide a persistent connection  
between a client and the Web server to which it is connected. Because HTTP does not carry  
any state information for these applications, it is important for the browser to be mapped to the  
same real server for each HTTP request until the transaction is complete. This ensures that the  
client traffic is not load balanced mid-session to a different real server, forcing the user to  
restart the entire transaction.  
Persistence-based SLB enables the network administrator to configure the network to redirect  
requests from a client to the same real server that initially handled the request. Persistence is an  
important consideration for administrators of e-commerce Web sites, where a server may have  
data associated with a specific user that is not dynamically shared with other servers at the site.  
In Web OS, persistence can be based on the following characteristics: source IP address, cook-  
ies, and Secure Sockets Layer (SSL) session ID.  
Using Source IP Address  
Until recently, the only way to achieve TCP/IP session persistence was to use the source IP  
address as the key identifier. There are two major conditions which cause problems when ses-  
sion persistence is based on a packets IP source address:  
n
Many clients sharing the same source IP address (proxied clients): Proxied clients  
appear to the switch as a single source IP address and do not take advantage of SLB on the  
switch. When many individual clients behind a firewall use the same proxied source IP  
address, requests are directed to the same server, without the benefit of load balancing the  
traffic across multiple servers. Persistence is supported without the capability of effec-  
tively distributing traffic load.  
Also, persistence is broken if you have multiple proxy servers behind the Web switch per-  
forming SLB. The Web switch changes the clients address to different proxy addresses as  
attempts are made to load balance client requests.  
n
Single client sharing a pool of source IP addresses: When individual clients share a  
pool of source IP addresses, persistence for any given request cannot be assured. Although  
each source IP address is directed to a specific server, the source IP address itself is ran-  
domly selected, thereby making it impossible to predict which server will receive the  
request. SLB is supported, but without persistence for any given client.  
422  
Chapter 16: Persistence  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Using Cookies  
Cookies are strings passed via HTTP from servers to browsers. Based on the mode of opera-  
tion, cookies are inserted by either the Web switch or the server. After a client receives a  
cookie, a server can poll that cookie with a GET command, which allows the querying server  
to positively identify the client as the one that received the cookie earlier.  
The cookie-based persistence feature solves the proxy server problem and gives better load  
distribution at the server site. In the Web switch, cookies are used to route client traffic back to  
the same physical server to maintain session persistence.  
Using SSL Session ID  
The SSL session ID is effective only when the server is running SSL transactions. Because of  
the heavy processing load required to maintain SSL connections most network configurations  
use SSL only when it is necessary. Persistence based on SSL Session ID ensures completion of  
complex transactions in proxy server environments. However, this type of persistence does not  
scale on servers because of their computational requirements.  
Chapter 16: Persistence  
423  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Cookie-Based Persistence  
Cookies are a mechanism for maintaining state between clients and servers. When the server  
receives a client request, the server issues a cookie, or token, to the client, which the client then  
sends to the server on all subsequent requests. Using cookies, the server does not require  
authentication, the client IP address, or any other time-consuming mechanism to determine  
that the user is the same user that sent the original request.  
In the simplest case, the cookie may be just a customer IDassigned to the user. It may be a  
token of trust, allowing the user to skip authentication while his or her cookie is valid. It may  
also be a key that associates the user with additional state data that is kept on the server, such as  
a shopping cart and its contents. In a more complex application, the cookie may be encoded so  
that it actually contains more data than just a single key or an identification number. The  
cookie may contain the users preferences for a site that allows their pages to be customized.  
3
WEB SERVER DESIGNATED TO SERVE  
COOKIES RECORDS INFORMATION AND  
SENDS THE CLIENT A COOKIE  
1
USER REGISTERS TO BUY  
AN ITEM  
4
SWITCH RECORDS OR REWRITES  
5
COOKIE STORED ON CLIENT  
COOKIE INFORMATION BASED ON  
CONFIGURATION  
MACHINE  
6
CLIENT DECIDES TO BUY AN  
ITEM. THE COOKIE  
INFORMATION IS SENT AS  
PART OF THE HTTP  
REQUEST  
7
BASED ON COOKIE INFORMATION SWITCH  
2
SWITCH COMPLETES THREE-WAY  
HANDSHAKE WITH CLIENT.  
REDIRECTS REQUEST TO THE SAME SERVER  
OR HASHES ON COOKIE VALUE  
- FORWARDS HTTP REQUEST TO COOKIE  
SERVER  
Figure 16-1 Cookie-Based Persistence: How It Works  
424  
Chapter 16: Persistence  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
The following topics discussing cookie-based persistence are detailed in this section:  
n
n
n
n
n
n
Cookie Propertieson page 426  
Client Browsers that Do Not Accept Cookieson page 426  
Cookie Modes of Operationon page 427  
Configuring Cookie-Based Persistenceon page 430  
Permanent and Temporary Cookies  
Cookies can either be permanent or temporary. A permanent cookie is stored on the client's  
browser, as part of the response from a Web sites server. It will be sent by the browser when  
the client makes subsequent requests to the same site, even after the browser has been shut  
down. A temporary cookie is only valid for the current browser session. Similar to a SSL Ses-  
sion-based ID, the temporary cookie expires when you shut down the browser. Based on RFC  
2109, any cookie without an expiration date is a temporary cookie.  
Cookie Formats  
A cookie can be defined in the HTTP header (the recommended method) or placed in the URL  
for hashing. The cookie is defined as a Name=Valuepair and can appear along with other  
parameters and cookies. For example, the cookie SessionID=1234can be represented in  
one of the following ways:  
n
In the HTTP Header  
Cookie: SesssionID=1234  
Cookie: ASP_SESSIONID=POIUHKJHLKHD  
Cookie: name=john_smith  
The second cookie represents an Active Server Page (ASP) session ID. The third cookie  
represents an application-specific cookie that records the name of the client.  
n
Within the URL  
http://www.mysite.com/reservations/SessionID=1234  
Chapter 16: Persistence  
425  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Cookie Properties  
Cookies are configured on the Web switch by defining the following properties:  
n
n
Cookie names of up to 20 bytes  
The offset of the cookie value within the cookie string  
For security, the real cookie value can be embedded somewhere within a longer string.  
The offset directs the Web switch to the starting point of the real cookie value within the  
longer cookie string.  
n
Length of the cookie value  
This defines the number of bytes to extract for the cookie value within a longer cookie  
n
n
Whether to find the cookie value in the HTTP header (the default) or the URL  
Cookie values of up to 64 bytes for hashing  
Hashing on cookie values is used only with the passive cookie mode (Passive Cookie  
Modeon page 428), using a temporary cookie. The switch mathematically calculates the  
cookie value using a hash algorithm to determine which real server should receive the  
request.  
n
An asterisk (*) in cookie names for wildcards  
For example, Cookie name = ASPsession*  
Client Browsers that Do Not Accept Cookies  
Under normal conditions, most browsers are configured to accept cookies. However, if a client  
browser is not configured to accept cookies, you must use hashas the load-balancing metric  
to maintain session persistence.  
With cookie-based persistence enabled, session persistence for browsers that do not accept  
cookies will be based on the source IP address. However, individual client requests coming  
from a proxy firewall will appear to be coming from the same source IP address. Therefore, the  
requests will be directed to a single server, resulting in traffic being concentrated on a single  
real server instead of load balanced across the available real servers.  
426  
Chapter 16: Persistence  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Cookie Modes of Operation  
Web OS supports the following modes of operation for cookie-based session persistence:  
insert, passive, and rewrite mode. The following table shows the differences among the modes:  
Table 16-1 Comparison Among the Three Cookie Modes  
Cookie Mode  
Configuration Required Cookie Location  
Uses Switch  
Session Entry  
Insert Cookie  
Passive Cookie  
Rewrite Cookie  
Switch only  
HTTP Header  
No  
Yes  
No  
Server and Switch  
Server and Switch  
HTTP Header or URL  
HTTP Header  
Each of the modes are explained in detail in the following sections.  
Insert Cookie Mode  
In the insert cookie mode, the Web switch generates the cookie value on behalf of the server.  
Because no cookies are configured at the server, the need to install cookie server software on  
each real server is eliminated.  
In this mode, the client sends a request to visit the Web site. The Web switch performs load  
balancing and selects a real server. The real server responds without a cookie. The Web switch  
inserts a cookie and forwards the new request with the cookie to the client.  
1. Configure switch to insert cookie values  
3. Switch selects  
2. Client visits the Web site via HTTP request  
server via SLB  
Web Server  
Farm  
Internet  
Client  
Web Switch  
Proxy Firewall  
4. Server responds  
without any cookie  
5. Web switch inserts a cookie and forwards the  
request to the client.  
Figure 16-2 Insert Cookie Mode  
Chapter 16: Persistence  
427  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Passive Cookie Mode  
In Passive Cookie mode, when the client first makes a request, the switch selects the server  
based on the load-balancing metric. The real server embeds a cookie in its response to the cli-  
ent. The switch records the cookie value and matches it in subsequent requests from the same  
client.  
NOTE The passive cookie mode is recommended for temporary cookies. However, you can  
use this mode for permanent cookies if the server is embedding an IP address.  
The following figure shows passive cookie mode operation:  
1. Configure server to send cookies  
2. Configure switch to record cookie values  
4. Switch selects  
3. Client visits the web site  
cookie server  
Web Server  
Farm  
Internet  
Client  
Proxy Firewall  
Web Switch  
5. Server returns  
cookie value  
6. Switch registers cookie value and forwards it  
to the client for use in subsequent requests  
Figure 16-3 Passive Cookie Mode  
Subsequent requests from Client 1 with the same cookie value will be sent to the same real  
server (RIP 1 in this example).  
428  
Chapter 16: Persistence  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Rewrite Cookie Mode  
In rewrite cookie mode, the Web switch generates the cookie value on behalf of the server,  
eliminating the need for the server to generate cookies for each client.  
Instead, the server is configured to return a special persistence cookie which the switch is con-  
figured to recognize. The switch then intercepts this persistence cookie and rewrites the value  
to include server-specific information before sending it on to the client. Subsequent requests  
from the same client with the same cookie value are sent to the same real server.  
Rewrite cookie mode requires at least eight bytes in the cookie header. An additional eight  
bytes must be reserved if you are using cookie-based persistence with Global Server Load Bal-  
ancing (GSLB).  
NOTE Rewrite cookie mode only works for cookies defined in the HTTP header, not cookies  
defined in the URL.  
Example: The following figure shows rewrite cookie mode operation:  
1. Configure switch to rewrite cookie values  
3. Switch selects  
2. Client visits the Web site via HTTP request  
server via SLB  
Web Server  
Farm  
Internet  
Client  
Proxy Firewall  
Web Switch  
4. Server HTTP response  
includes empty cookie  
5. Web switch rewrites the cookie to contain a  
server ID for hashing on subsequent requests  
Figure 16-4 Rewrite Cookie Mode  
NOTE When the Web switch rewrites the value of the cookie, the rewritten value represents  
the responding server; that is, the value can be used for hashing into a real server ID or it can  
be the real server IP address. The rewritten cookie value is encoded.  
Chapter 16: Persistence  
429  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Configuring Cookie-Based Persistence  
1. Before you can configure cookie-based persistence, you need to configure the switch for  
basic SLB. This includes the following tasks:  
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Configure each real server with its IP address, name, weight, and so forth.  
Assign servers to real server groups.  
Define virtual servers and services.  
For information see Server Load Balancingon page 117.  
2. Either enable Direct Access Mode (DAM), or disable DAM and specify proxy IP  
address(es) on the client port(s).  
n
Enable DAM for the switch.  
>> # /cfg/slb/adv/direct ena  
Disable DAM and specify proxy IP address(es) on the client port(s).  
(Enable Direct Access Mode on switch)  
n
>> # /cfg/slb/adv/direct disable  
>> # /cfg/slb/port 1  
(Disable DAM on the switch)  
(Select network port 1)  
>> # pip 200.200.200.68  
(Set proxy IP address for port 1)  
NOTE If Virtual Matrix Architecture (VMA) is enabled on the switch, you must configure a  
unique proxy IP address for every port (except port 9).  
3. If proxy IP addresses are used, make sure server processing is disabled on the server  
port.  
>> # /cfg/slb/port 1  
(Select switch port 1)  
>> # server dis  
(Disable server processing on port 1)  
430  
Chapter 16: Persistence  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
4. Select the appropriate load-balancing metric for the real server group.  
>> # /cfg/slb/group 2/metric hash (Select hash as server group metric)  
n
n
If embedding an IP address in the cookie, select roundrobinor leastconnsas the  
metric.  
If you are not embedding the IP address in the cookie, select hashas the metric in con-  
junction with a cookie assignment server.  
While you may experience traffic concentration using the hashmetric with a cookie  
assignment server, using a hashmetric without a cookie assignment server will cause  
traffic concentration on your real servers.  
5. Enable cookie-based persistence on the virtual server service.  
In this example, cookie-based persistence is enabled for service 80 (HTTP).  
>> # /cfg/slb/virt 1/service 80/pbind  
Current persistent binding mode: disabled  
Enter cookie|sslid|disable persistence mode: cookie  
Once you specify cookieas the mode of persistence, you will be prompted for the following  
parameters:  
Enter insert|passive|rewrite cookie persistence mode [i/p/r]: p  
Enter cookie name: CookieSession1  
Enter starting point of cookie value [1-64]: 1  
Enter number of bytes to extract [0-64]: 8  
Look for cookie in URI [e|d]: d  
Set multiple response count [1-16]: 1  
n
n
n
n
n
Cookie-based persistence mode: insert, passiveor rewrite  
Cookie name  
Starting point of the cookie value  
Number of bytes to be extracted  
Look for cookie in the URI [e | d]  
If you want to look for cookie name/value pair in the URI, enter eto enable this option. To  
look for the cookie in the HTTP header, enter dto disable this option.  
Chapter 16: Persistence  
431  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
n
Set multiple response count  
This parameter is set for passive mode only. Typically, the Web switch searches the first  
HTTP response packet from the server and, if a persistence cookie is found, sets up a per-  
sistent connection between the server and the client. While this approach works for most  
servers, some customers with complex server configurations might send the persistence  
cookie a few responses later. In order to achieve cookie-based persistence in such cases,  
Web OS allows the network administrator to configure the switch to look through multiple  
HTTP responses from the server. The switch looks for the persistence cookie in the speci-  
fied number of responses (each of them can be multi-frame) from the server.  
Setting Expiration Timer for Insert Cookie  
If you configure for insert cookie persistence mode, then you will be prompted for cookie expi-  
ration timer. The expiration timer specifies a date string that defines the valid life time of that  
cookie. The expiration timer for insert cookie can be of the following types:  
n
Absolute timer  
The syntax for the absolute timer is MM/dd/yy[@hh:mm]. The date and time is based on  
RFC 822, RFC 850, RFC 1036, and RFC 1123, with the variations that the only legal time  
zone is GMT. Once the expiration date is met, the cookie is not stored or given out. For  
example,  
Enter cookie expiration: 12/31/01@11:59  
Current persistent binding for http: disabled  
New persistent binding for http: cookie  
New cookie persistence mode: insert  
Inserted cookie expires on Mon 12/31/01 at 11:59  
n
Relative timer  
This timer defines the elapsed time from when the cookie was created. The syntax for the rela-  
tive timer is days[:hours[:minutes]]. For example,  
Enter cookie expiration: 32:25:61  
Current persistent binding for http: disabled  
New persistent binding for http: cookie  
New cookie persistence mode: insert  
Inserted cookie expires after 33 days 2 hours 1 minutes  
NOTE If the cookie expiration timer is not specified, the cookie will expire when the users  
session ends.  
432  
Chapter 16: Persistence  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Example 1: Setting the Cookie Location  
In this example, the client request has two different cookies labeled UID.One exists in the  
HTTP header and the other appears in the URI:  
GET /product/switch/UID=12345678;ck=1234...  
Host: www.alteonwebsystems.com  
Cookie: UID=87654321  
n
n
Look for the cookie in the HTTP header  
>> # /cfg/slb/virt 1/service 80/pbind cookie passive UID 1 8 dis  
The last parameter in this command answers the Look for cookie in URI?”  
prompt. If you set this parameter to disable, the Web switch will use UID=87654321  
as the cookie.  
Look for the cookie in the URI  
>> # /cfg/slb/virt 1/service 80/pbind cookie passive UID 1 8 ena  
The last Look for cookie in URI?parameter is set to enable. Therefore the Web  
switch will use UID=12345678as the cookie.  
Chapter 16: Persistence  
433  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Example 2: Parsing the Cookie  
This example shows three configurations where the switch uses the hashing key or wild cards  
to determine which part of the cookie value should be used for determining the real server. For  
example, the value of the cookie is defined as follows:  
Cookie: sid=0123456789abcdef; name1=value1;...  
n
n
n
Select the entire value of the sidcookie as a hashing key for selecting the real server:  
>> # /cfg/slb/virt 1/service 80/pbind cookie passive sid 1 16 dis  
This command directs the switch to use the sidcookie, starting with the first byte in the  
value and using the full 16 bytes.  
Select a specific portion of the sidcookie as a hashing key for selecting the real server:  
>> # /cfg/slb/virt 1/service 80/pbind cookie passive sid 8 4 dis  
This command directs the switch to use the sid cookie, starting with the eight byte in the  
value and using only four bytes. This uses 789aas a hashing key.  
Using wildcards for selecting cookie names:  
>> # /cfg/slb/virt 1/service 80/pbind cookie passive  
ASPSESSIONID* 1 16 dis  
With this configuration, the switch will look for a cookie name that starts with ASPSES-  
SIONID. ASPSESSIONID123, ASPSESSIONID456, and ASPSESSIONID789will  
all be seen by the switch as the same cookie name. If more than one cookie matches, only  
the first one will be used.  
Example 3: Using Passive Cookie Mode  
If you are using passive cookie mode, the Web switch examines the servers Set-Cookie:  
value and directs all subsequent connections to the server that assigned the cookie.  
For example, if Server 1 sets the cookie as Set-Cookie:sid=12345678,then all traf-  
fic from a particular client with cookie sid=12345678will be directed to Server 1.  
The following command is used on the Web switch:  
>> # /cfg/slb/virt 1/service 80/pbind cookie passive sid 1 8 dis  
434  
Chapter 16: Persistence  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Example 4: Using Rewrite Cookie Mode  
n
Rewrite server cookie with the encrypted real server IP address:  
In cookie rewrite mode, if the cookie length parameter is configured to be eight bytes, the  
switch will rewrite the placeholder cookie value with the encrypted real server IP address.  
>> # /cfg/slb/virt 1/service 80/pbind cookie rewrite sid 1 8 dis  
If the server is configured to include a placeholder cookie, such as follows:  
Set-Cookie: sid=alteonpersistence;  
then the Web switch will rewrite the first eight bytes of the cookie to include the servers  
encrypted IP address:  
Set-Cookie: sid=cdb20f04rsistence;  
All subsequent traffic from a specific client with this cookie will be directed to the same  
real server.  
n
Rewrite server cookie with the encrypted real server IP address and virtual server IP  
address:  
If the cookie length is configured to be 16 bytes, the switch will rewrite the cookie value  
with the encrypted real server IP address and virtual server IP address.  
>> # /cfg/slb/virt 1/service 80/pbind cookie rewrite sid 1 16 dis  
If the server is configured to include a placeholder cookie, as follows:  
Set-Cookie: sid=alteonwebcookies;  
then the Web switch will rewrite the first 16 bytes of the cookie to include the encrypted  
real server IP address and virtual server IP address:  
Set-Cookie: sid=cdb20f04cdb20f0a;  
All subsequent traffic from a specific client to the particular virtual server IP address with  
this cookie will be directed to the same real server.  
Chapter 16: Persistence  
435  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Server-Side Multi-Response Cookie Search  
Cookie-based persistence requires the switch to search the HTTP response packet from the  
server and, if a persistence cookie is found, sets up a persistence connection between the server  
and the client. The Alteon switch looks through the first HTTP response from the server. While  
this approach works for most servers, some customers with complex server configurations  
might send the persistence cookie a few responses later. In order to achieve cookie-based per-  
sistence in such cases, Web OS 10.0 allows the network administrator to configure the switch  
to look through multiple HTTP responses from the server.  
In Web OS 10.0, the network administrator can modify a response counter to a value from 1-  
16. The switch will look for the persistence cookie in this number of responses (each of them  
can be multi-frame) from the server.  
Configuring Server-Side Multi-Response Cookie Search  
Configure the server-side multi-response cookie search by using the following command:  
>> # /cfg/slb/virt <virtual server>/service <virtual port number>/rcount  
Current Cookie search response count:  
Enter new Cookie search response count [1-16]:  
436  
Chapter 16: Persistence  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
SSL Session ID-Based Persistence  
SSL is a set of protocols built on top of TCP/IP that allows an application server and client to  
communicate over an encrypted HTTP session, providing authentication, non-repudiation, and  
security. The SSL protocol handshake is performed using clear (unencrypted) text. The content  
data is then encrypted (using an algorithm exchanged during the handshake) prior to being  
transmitted.  
Using the SSL session ID, the switch forwards the client request to the same real server to  
which it was bound during the last session. Because SSL protocol allows many TCP connec-  
tions to use the same session ID from the same client to a server, key exchange needs to be  
done only when the session ID expires. This reduces server overhead and provides a mecha-  
nism, even when the client IP address changes, to send all sessions to the same real server.  
NOTE The destination port number to monitor for SSL traffic is user-configurable.  
How SSL Session ID-Based Persistence Works  
n
All SSL sessions that present the same session ID (32 random bytes chosen by the SSL  
server) will be directed to the same real server.  
NOTE The SSL session ID can only be read by the switch after the TCP three-way hand-  
shake. In order to make a forwarding decision, the switch must terminate the TCP connection  
to examine the request.  
n
n
New sessions are sent to the real server based on the metric selected (hash,  
roundrobin, leastconns, minmisses, response, and bandwidth).  
If no session ID is presented by the client, the switch picks a real server based on the met-  
ric for the real server group and waits until a connection is established with the real server  
and a session ID is received.  
n
n
The session ID is stored in a session hash table. Subsequent connections with the same  
session ID are sent to the same real server. This binding is preserved even if the server  
changes the session ID mid-stream. A change of session ID in the SSL protocol will cause  
a full three-way handshake to occur.  
Session IDs are kept on the switch until an idle time equal to the configured server time-  
out (a default of 10 minutes) for the selected real server has expired.  
Chapter 16: Persistence  
437  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Figure 16-5 illustrates persistence based on SSL session ID as follows:  
1. An SSL Hello handshake occurs between Client 1 and Server 1 via the Web switch.  
2. An SSL session ID is assigned to Client 1 by Server 1.  
3. The Web switch records the SSL session ID.  
4. The Web switch selects a real server based on the existing SLB settings.  
As a result, subsequent connections from Client 1 with the same SSL session ID are directed to  
Server 1.  
Web Server  
Farm  
Firewall  
Client 1  
Internet  
Client 2  
Figure 16-5 SSL Session ID-Based Persistence  
5. Client 2 appears to the switch to have the same source IP address as Client 1 because they  
share the same proxy firewall.  
However, the Web switch does not automatically direct Client 2 traffic to Server 1 based on the  
source IP address. Instead an SSL session ID for the new traffic is assigned. Based on SLB set-  
tings, the connection from Client 2 is spliced to Server 3.  
As a result, subsequent connections from Client 2 with the same SSL session ID are directed to  
Server 3.  
438  
Chapter 16: Persistence  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Configuring SSL Session ID-Based Persistence  
To configure session ID-based persistence for a real server, perform the following steps:  
1. Configure real servers and services for basic SLB, as indicated below:  
n
n
n
Define each real server and assign an IP address to each real server in the server pool.  
Define a real server group and set up health checks for the group.  
Define a virtual server on the virtual port for HTTPS (for example, port 443) and assign a  
real server group to service it.  
n
n
Enable SLB on the switch.  
Enable client processing on the port connected to the client.  
For information on how to configure your network for SLB, see Server Load Balancingon  
page 117  
2. If a proxy IP address is not configured on the client port, enable DAM for real servers.  
>> # /cfg/slb/adv/direct ena  
3. Select session ID-based persistence as the persistent binding option for the virtual port.  
>> # /cfg/slb/virt <virtual server number>/service <virtual port> pbind sslid  
4. Enable client processing on the client port.  
>> # /cfg/slb/port <port number>/client ena  
Chapter 16: Persistence  
439  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
440  
Chapter 16: Persistence  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CHAPTER 17  
Bandwidth Management  
Bandwidth Management (BWM) enables Web site managers to allocate a certain portion of the  
available bandwidth for specific users or applications. It allows companies to guarantee that  
critical business traffic, such as e-commerce transactions, receive higher priority versus non-  
critical traffic. Traffic classification can be based on user or application information. BWM  
policies can be configured to set lower and upper bounds on the bandwidth allocation.  
The following topics are addressed in this chapter:  
n
n
n
n
n
n
n
n
Bandwidth Statistics and Historyon page 452  
Packet Coloring (TOS bits) for Burst Limiton page 453  
Operational Keyson page 453  
Configuring Bandwidth Managementon page 454  
441  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Overview  
To manage bandwidth, create one or more bandwidth management contracts. The switch uses  
these contracts to limit individual traffic flows.  
2. Administrator configures  
bandwidth policy and contract  
3. Classification is done  
on ingress port of switch  
Web Switch  
Internet  
1. Client buys a contract  
(for example, a VIP address)  
4. Bandwidth management done on  
egress port of switch. Can optionally  
set TOS values to reflect usage rate  
5. TOS value (optional)  
affects router bandwidth  
Figure 17-1 Bandwidth Management: How It Works  
Each contract comprises the following:  
n
n
A classification policy where certain frames are grouped together  
A bandwidth policy specifying usage limitations to be applied to these frames  
NOTE At any given time, up to 1024 contracts can be created for a single Alteon AD4 or  
Alteon 184 Web switch.  
442  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
n
When Virtual Matrix Architecture (VMA) is not enabled, bandwidth classification is done  
on the ingress side of the switch (at the ingress port or designated port) and can be based  
on the following: source port, VLAN, filters, Virtual Internet Protocol (VIP) address, ser-  
vice on the Virtual server, URL, and so on.  
When VMA is enabled, traffic classification that is not based on filters or Server Load  
Balancing (SLB) is done on the ingress portthat is, the port on which the frame is  
received (not the client port or the server port). If the traffic classification is filter-based or  
SLB traffic, then the classification occurs on the designated port.  
NOTE VMA is recommended when Bandwidth Management is enabled.  
n
Bandwidth management occurs on the egress port of the switchthat is, the port from  
which the frame is leaving. However, in the case of multiple routes or trunk groups, the  
egress port can actually be one of several ports (from the point-of-view of where the  
queues are located).  
Rate management is controlled by using queues for each contract and by scheduling when  
frames are sent from each queue. Each frame is put into a managed buffer and placed on a  
contract queue. The time that the next frame is supposed to be transmitted for the contract  
queue is calculated according to the configured rate of the contract, the current egress rate  
of the ports, and the buffer size set for the contract queue. The scheduler then organizes all  
the frames to be sent according to their time-based ordering and meters them out to the  
port.  
NOTE Bandwidth management and port mirroring cannot be enabled at the same time.  
Chapter 17: Bandwidth Management  
443  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Bandwidth Policies  
Bandwidth policies are bandwidth limitations defined for any set of frames, specifying the  
guaranteed bandwidth rates. A bandwidth policy is often based on a rate structure whereby a  
Web host or co-location provider could charge a customer for bandwidth utilization. There are  
three rates that are configured: a Committed Information Rate (CIR)/Reserved Limit, a Soft  
Limit, and a Hard Limit, as described below.  
A queue depth is also associated with a policy. A queue depth is the size of the queue that holds  
the data. It can be adjusted to accommodate delay-sensitive traffic (such as audio) versus drop-  
sensitive traffic (such as FTP).  
Hard Limit  
Soft Limit  
Reserved Limit  
Figure 17-2 Bandwidth Rate Limits  
444  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Rate Limits  
A bandwidth policy specifies three limits, listed and described in Table 17-1:  
Table 17-1 Bandwidth Rate Limits  
Rate Limit  
Description  
Committed Information  
Rate (CIR)  
or Reserved Limit  
This is a rate that a bandwidth classification is always guaranteed. In con-  
figuring BWM contracts, ensure that the sum of all committed informa-  
tion rates never exceeds the link speeds associated with ports on which  
the traffic is transmitted. In a case where the total CIRs exceed the out-  
bound port bandwidth, the switch will perform a graceful degradation of  
all traffic on the associated ports.  
Soft Limit  
Hard Limit  
This is the desired bandwidth rate, that is, the rate the customer has  
agreed to pay on a regular basis. When output bandwidth is available, a  
bandwidth class will be allowed to send data at this rate. No exceptional  
condition will be reported when the data rate does not exceed this limit.  
This is a never exceedrate. A bandwidth class is never allowed to trans-  
mit above this rate. Typically, traffic bursts between the soft limit and the  
hard limit are charged a premium. The maximum hard limit for a band-  
width policy is 1 Gbps, even when multiple Gigabit ports are trunked.  
Bandwidth Policy Configuration  
Each bandwidth policy, comprised of the reserved, soft, and hard limits, is assigned an index.  
These policies can be found under the /cfg/bwmmenu. Up to 64 bandwidth policies can be  
defined. Bandwidth limits are usually entered in Mbps.  
NOTE For better granularity, rates can be entered in Kbps by appending Kto the entered  
number. For example, 1 Mbps can be entered as either 1or as 1024k.”  
Table 17-2 lists the granularity of policy limits:  
Table 17-2 Bandwidth Policy Limits  
Bandwidth Range  
250 Kbps to 5000 Kbps  
1 Mbps to 20 Mbps  
20 Mbps to 50 Mbps  
Interval  
250 Kbps  
1 Mbps  
5 Mbps  
Bandwidth Range  
Interval  
10 Kbps  
25 Mbps  
50 Mbps  
50 Mbps to 150 Mbps  
150 Mbps to 500 Mbps  
500 Mbps to 1000 Mbps  
In addition, a queue size is associated with each policy. The queue size is measured in bytes.  
Chapter 17: Bandwidth Management 445  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Web OS 10.0 Application Guide  
Data Pacing  
The mechanism used to keep the individual traffic flows under control is called data pacing. It  
is based on the concept of a virtual clock and theoretical departure times (TDT). The actual cal-  
culation of the TDT is based initially on the soft limit rate. The soft limit can be thought of as a  
target limit for the ISPs customer. So long as bandwidth is available and the classification  
queue is not being filled at a rate greater than the soft limit, the TDT will be met for both incom-  
ing frames and outgoing frames and no borrowing or bandwidth limitation will be necessary.  
Queue 1  
Queue 2  
Queue 3  
Queue 4  
Time  
Figure 17-3 Virtual Clocks and TDT  
If the data is arriving more quickly than it can be transmitted at the soft limit and sufficient  
bandwidth is still available, the rate is adjusted upwards based on the depth of the queue, until  
the rate is fast enough to reduce the queue depth or the hard limit is reached. If the data cannot  
be transmitted at the soft limit, then the rate is adjusted downward until the data can be trans-  
mitted or the CIR is hit. If the CIR is overcommitted among all the contracts configured for the  
switch, graceful degradation will reduce each CIR until the total bandwidth allocated fits  
within the total bandwidth available.  
Each BWM contract is assigned a bandwidth policy index and (optionally) a name. This index  
can be viewed using the /cfg/bwm/contmenu. Contracts can be enabled and disabled. The  
set of classifications associated with each contract can be viewed using the /info/bwmmenu.  
For frames qualifying for multiple classifications, precedence of contracts is also specified per  
contract. If no precedence is specified, the default order is used (see Precedenceon page 448).  
n
When both filter Types-Of-Service (TOS) and BWM TOS are applied, BWM TOS has  
precedence.  
n
BWM configurations will optionally be synchronized during VRRP synchronization  
except the port contracts and VLAN contracts, which will not be synchronized.  
446  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Classification Criteria  
The frames associated with a particular BWM contract are specified, using the parameters  
listed below. All of these classifications are aimed at limiting the traffic outbound from the  
server farm for bandwidth measurement and control.  
Server Output Bandwidth Control  
n
n
Physical Port - All frames are from a specified physical port.  
VLAN - All frames are from a specified VLAN. Even if a VLAN translation occurs, the  
bandwidth policy is based on the ingress VLAN.  
n
n
n
IP Source Address - All frames have a specified IP source address or range of addresses  
defined with a subnet mask.  
IP Destination Address - All frames have a specified IP destination address or range of  
addresses defined with a subnet mask.  
Switch services on the virtual servers  
The following are various Layer 4 groupings:  
A single virtual server  
A group of virtual servers  
A service for a particular virtual server  
Select a particular port number (service on the virtual server) within a particular vir-  
tual server IP address.  
The following are various Layer 7 groupings:  
A single URL path  
A group of URL paths  
A single cookie  
Application Bandwidth Control  
Classification policies allow bandwidth limitations to be applied to particular applications; that  
is, they allow applications to be identified and grouped. Classification can be based on any fil-  
tering rule, including those listed below:  
n
n
n
TCP Port Number - All frames with a specific TCP source or destination port number  
UDP - All UDP frames  
UDP Port Number - All frames with a specific UDP source or destination port number  
Chapter 17: Bandwidth Management  
447  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Combinations  
Combinations of classifications are limited to grouping items together into a contract. For  
example, if you wanted to have three different virtual servers associated with a contract, you  
would specify the same contract index on each of the three virtual server IP addresses. You can  
also combine filters in this manner.  
Precedence  
If a frame qualifies for different classifications, it is important to be able to specify the classifi-  
cation with which it should be associated. There are two mechanisms to address classifica-  
tiona per-contract precedence value and a default ordering. If a contract does not have an  
assigned precedence value, then the ordering is as follows:  
1. Layer 7 applications (for example, URL, HTTP, headers, cookies, and so forth)  
2. Layer 4 services on the virtual server  
3. Filter  
4. VLAN  
5. Source Port/Default Assignment  
Bandwidth Classification Configuration  
Any item that is configured with a filter can be used for BWM. Bandwidth classification is per-  
formed using the following menus:  
n /cfg/slb/filtis used to configure classifications based on the IP destination  
address, IP source address, TCP port number, UDP, UDP port number, or any filter rule.  
n /cfg/slb/virtis used to configure classifications based on virtual servers.  
n /cfg/portis used to configure classifications based on physical ports.  
(In case of trunking, use /cfg/trunk.)  
n /cfg/vlanis used to configure classifications based on VLANs.  
n /cfg/slb/layer7/lbis used to configure classification based on URL paths.  
To associate a particular classification with a contract, enter the contract index into the cont”  
menu option under the applicable configuration menus.  
448  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Frame Discard  
When packets in a contract queue have not yet been sent and the buffer size set for the queue is  
full, any new frames attempting to be placed in the queue will be discarded.  
URL-Based Bandwidth Management  
URL-based BWM allows the network administrator or Web site manager to control bandwidth  
based on URLs, HTTP headers, or cookies.  
All three types of BWM are accomplished by following the configuration guidelines on con-  
tent switching described in Chapter 15, Content Intelligent Switching.You would also need  
to assign a contract to each defined string, where the string is contained in a URL, an HTTP  
header, or a cookie.  
BWM based on URLs gives Web site managers the following capabilities:  
n
Ability to allocate bandwidth based on the type of request  
The switch allocates bandwidth based on certain strings in the incoming URL request. For  
example, as shown in Figure 17-4, if a Web site has 10Mbs of bandwidth, the site manager  
can allocate 1 Mbs of bandwidth for static HTML content, 3Mbs of bandwidth for graphic  
content and 4Mbs of bandwidth for dynamic transactions, such as URLs with cgi-bin  
requests and .asprequests.  
n
n
Ability to prioritize transactions or applications  
By allocating bandwidth, the Web switch can guarantee that certain applications and trans-  
actions get better response time.  
Ability to allocate a certain amount of bandwidth for requests that can be cached  
As shown in Figure 17-5 on page 450, users will be able to allocate a certain percentage of  
bandwidth for Web cache requests by using the URL parsing and bandwidth management  
feature.  
Chapter 17: Bandwidth Management  
449  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Figure 17-4 URL-Based Bandwidth Management  
Cache servers  
Figure 17-5 URL-Based Bandwidth Management with Web Cache Redirection  
450  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
HTTP Header-Based Bandwidth Management  
HTTP header-based BWM allows Web site managers to allocate bandwidth based on header  
value. Thus, they can allocate bandwidth based on browser type, cookie value, and so forth.  
Cookie-Based Bandwidth Management  
Cookie-based BWM enables Web site managers to prevent network abuse by bandwidth-hog-  
ging users. Using this feature, bandwidth can be allocated by type of user or other user-specific  
information available in the cookie.  
Cookie-based bandwidth management empowers service providers to create tiered services.  
For example, Web site managers can classify users as first class, business class, and coach and  
allocate a larger share of the bandwidth for preferred classes.  
Figure 17-6 Cookie-Based Bandwidth Management  
NOTE Cookie-based BWM does not apply to cookie-based persistency or cookie pas-  
sive/active mode applications.  
Chapter 17: Bandwidth Management  
451  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Bandwidth Statistics and History  
Statistics are maintained in order to allow Web switch owners to bill for bandwidth usage. Sta-  
tistics for frequency and count are configurable. Statistics are kept in the individual Switch  
Processors (SP) and then collected every second by the MP (Management Processor). The MP  
then combines the statistics, as statistics for some classifications may be spread across multiple  
SPs.  
The MP maintains some global statistics, such as total octets and a window of historical statis-  
tics. When the history buffer of 128K is ready to overflow, it can be optionally e-mailed to a  
user for long-term storage. Additionally, the history buffer can be sent to the user when the  
user enters the command: /oper/bwm/sndhist.The SMTP protocol is used for this  
transfer if the SMTP host has been configured (/cfg/sys/smtp) and the user e-mail address  
has been set up (/cfg/bwm/user). To obtain graphs, the data must be collected and pro-  
cessed by an external entity through SNMP or through e-mailed logs.  
History is maintained only for the contracts for which the history option is enabled  
(/cfg/bwm/cont x/hist).  
If SMTP is enabled, then the infocommand (/info/bwm) can display when the history sta-  
tistics will be e-mailed to a user.  
Statistics Maintained  
The total number of octets sent, octet discards, and times over the soft limit are kept for each  
contract. The history buffer maintains the average queue size for the time interval and the aver-  
age rate for the interval.  
Statistics and Management Information Bases  
n
For existing BWM classes:  
As mentioned above, the MP maintains per-contract rate usage statistics. These are obtain-  
able via a private MIB.  
n
When BWM services are not enabled:  
Even when BWM is not enforced, the MP can still collect classification information and  
report it, allowing the customer to observe a network for a while before deciding how to  
configure it. This feature can be disabled using /cfg/bwm/force dis. When this  
command is used, no limits will be applied on any contract.  
452  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Web OS 10.0 Application Guide  
Packet Coloring (TOS bits) for Burst Limit  
Whenever the soft limit is exceeded, optional packet coloring can be done to allow down-  
stream routers to use diff-serv mechanisms (that is, writing the Type-Of-Service (TOS) byte of  
the IP header) to delay or discard these out-of-profile frames. Frames that are not out-of -pro-  
file are marked with a different, higher priority value. This feature can be enabled or disabled  
on a per-contract basis, using the wtosoption under the contract menu (/cfg/bwm/cont  
x/wtos) to enable/disable overwriting IP TOS.  
The actual values used by the switch for overwriting TOS values (depending on whether traffic  
is over or under the soft TOS limit) are set in the bandwidth policy menu (/cfg/bwm/pol  
x) with the utosand otosoptions. The values allowed are 0-255. Typically, the values spec-  
ified should match the appropriate diff-servspecification but could be different, depend-  
ing on the customer environment.  
Operational Keys  
There are two operational keys for BWM: a standard key and a demo key. The demo key auto-  
matically expires after a demo time period. These keys may only be enabled if Layer 4 services  
have been enabled.  
Chapter 17: Bandwidth Management  
453  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Web OS 10.0 Application Guide  
Configuring Bandwidth Management  
The following procedure provides general instructions for configuring BWM on the switch.  
Specific configuration examples begin on page 457.  
1. Configure the switch as you normally would for SLB. Configuration includes the follow-  
ing tasks:  
n
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Define a real server group.  
Define a virtual server.  
Define the port configuration.  
For more information about SLB configuration, see Server Load Balancingon page 117.  
2. Enable BWM on the switch.  
NOTE If you purchased the Bandwidth Management option, make sure you enable it by typ-  
ing /oper/swkeyand entering its software key.  
>> # /cfg/bwm/on  
(Turn BWM on)  
3. Select a bandwidth policy.  
Each policy must have a unique number from 1 to 64.  
>> Bandwidth Management# pol 1  
(Select bandwidth policy 1)  
4. Set the hard, soft, and reserved rate limits for the policy, in Mbps.  
Typically, charges are applied for burst rates between the soft and hard limit. Each limit must  
be set between 256K-1000M.  
NOTE For rates less than 1 Mbps, append a Ksuffix to the number.  
>> Policy 1# hard 6  
>> Policy 1# soft 5  
>> Policy 1# resv 4  
(Set never exceedrate)  
(Set desired bandwidth rate)  
(Set committed information rate)  
454  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
5. (Optional) Set the TOS byte value, between 0-255, for the policy underlimit and over-  
limit.  
There are two parameters for specifying the TOS bits: underlimit (utos) and overlimit  
(otos). These TOS values are used to overwrite the TOS values of IP packets if the traffic for  
a contract is under or over the soft limit, respectively. These values only have significance to a  
contract if TOS overwrite is enabled in the Bandwidth Management Contract Menu  
(cfg/bwm/cont x/wtos ena.)  
The administrator has to be very careful in selecting the TOS values because of their greater  
impact on the downstream routers.  
>> Policy 1# utos 204  
>> Policy 1# otos 192  
(Set BWM policy underlimit)  
(Set BWM policy overlimit)  
6. Set the buffer limit for the policy.  
Set a value between 8192-128000 bytes. The buffer depth for a BWM contract should be set to  
a multiple of the packet size.  
NOTE Keep in mind that the total buffer limit for the Bandwidth Management policy is  
128K.  
>> Policy 1# buffer 16320  
(Set BWM policy buffer limit)  
7. On the switch, select a BWM contract and (optional) a name for the contract.  
Each contract must have a unique number from 1 to 256.  
>> Policy 1# /cfg/bwm/cont 1  
(Select BWM contract 1)  
>> BWM Contract 1# name BigCorp  
(Assign contract name BigCorp)  
8. (Optional) Set a precedence value for the BWM contract.  
Each contract can be given a precedence value from 1-256. The higher the number, the higher  
the precedence. If a frame is applicable to different classifications, then the contract with  
higher precedence will be assigned to the frame. If the precedence is the same for the applica-  
ble contracts, then the following order will be used to assign the contract to the frame:  
(1) Incoming port, (2) VLAN, (3) Filter, (4) Service on the Virtual server, (5) URL/Cookie  
>> BWM Contract 1# prec 1  
(Sets contract precedence value to 1)  
Chapter 17: Bandwidth Management  
455  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
9. (Optional) Enable TOS overwriting for the BWM contract.  
>> BWM Contract 1# wtos ena  
(Enables overwriting for contract)  
10. Set the bandwidth policy for this contract.  
Each bandwidth management contract must be assigned a bandwidth policy.  
>> BWM Contract 1# pol 1  
(Assign policy 1 to BWM contract 1)  
11. Enable the BWM contract.  
>> BWM Contract 1# ena  
(Enables this BWM contract)  
12. Classify the frames for this contract and assign the BWM contract to the filter.  
Each BWM contract must be assigned a classification policy. The classification can be based on  
a filter or service(s) on the Virtual server. Filters are used to create classification policies based  
on the IP source address, IP destination address, TCP port number, UDP, and UDP port number.  
>> BWM Contract 1# /cfg/slb/virt 1/cont 1 (Assign contract to virtual server)  
>> Virtual Server 1# ../filt 1/adv/cont 1 (Assign contract 1 to filter 1)  
In this case, all frames that match filter 1 or virtual server 1 will be assigned contract 1.  
13. On the switch, apply and verify the configuration.  
>> Filter 1 Advanced# apply  
>> Filter 1 Advanced# /cfg/bwm/cur  
(Make your changes active)  
(View current settings)  
Examine the resulting information. If any settings are incorrect, make any appropriate changes.  
14. On the switch, save your new configuration changes.  
>> Bandwidth Management# save  
(Save for restore after reboot)  
15. On the switch, check the BWM information.  
>> Bandwidth Management# /info/bwm <contract number>(View BWM information)  
>> Bandwidth Management# /stats/bwm <contract number>(View BWM information)  
Check that all BWM contract parameters are set correctly. If necessary, make any appropriate  
configuration changes and then check the information again.  
456  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Additional Configuration Examples  
Examples are provided for the following Bandwidth Management applications:  
n
n
n
n
n
User/Application Fairness: see next section  
Preferential Services: page 460  
URL-Based: page 463  
Cookie-Based: page 465  
Security Management: page 468  
User/Application Fairness Example  
Bandwidth Management can be applied to prevent heavy bursters from locking out other users,  
such as in preventing the following:  
n
n
n
n
Customers using broadband access (such as DSL) from blocking dial-up customers  
Customers from the same hosting facility locking out each other because of flash crowd  
FTP from locking out Telnet  
Rate limit particular applications  
In the following example, BWM is configured to prevent broadband customers from affecting  
dial-up customer access. This is accomplished by setting higher bandwidth policy rate limits  
for the port processing broadband traffic.  
1. Select the first bandwidth policy.  
Each policy must have a number from 1 to 64.  
NOTE Ensure BWM is enabled on the switch (/cfg/bwm/on).  
>> # /cfg/bwm/pol 1  
(Select BWM policy 1)  
2. Set the hard, soft, and reserved rate limits for the bandwidth policy, in Mbps.  
>> Policy 1# hard 5  
>> Policy 1# soft 4  
>> Policy 1# resv 3  
(Set never exceedrate)  
(Set desired bandwidth rate)  
(Set committed information rate)  
Chapter 17: Bandwidth Management  
457  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
3. On the switch, select a BWM contract and name the contract.  
Each contract must have a unique number from 1 to 256.  
>> Policy 1# /cfg/bwm/cont 1  
(Select BWM contract 1)  
>> BWM Contract 1# name dial-up  
(Assign contract name dial-up)  
4. Set the bandwidth policy for this contract.  
Each BWM contract must be assigned a bandwidth policy.  
>> BWM Contract 1# pol 1  
(Assign policy 1 to BWM Contract 1)  
(Enables this BWM contract)  
(Select bandwidth policy 2)  
5. Enable this BWM contract.  
>> BWM Contract 1# ena  
6. Select the second bandwidth policy.  
>> BWM Contract 1# /cfg/bwm/pol 2  
7. Set the hard, soft, and reserved rate limits for this policy, in Mbps.  
>> Policy 2# hard 30  
>> Policy 2# soft 25  
>> Policy 2# resv 20  
(Set never exceedrate)  
(Set desired bandwidth rate)  
(Set committed information rate)  
8. On the switch, select the second BWM contract and name the contract.  
>> Policy 2# /cfg/bwm/cont 2  
(Select BWM contract 2)  
>> BWM Contract 2# name broadband  
(Assign contract name broadband)  
9. Set the bandwidth policy for this contract.  
Each BWM contract must be assigned a bandwidth policy.  
>> BWM Contract 2# pol 2  
(Assign policy 2 to BWM contract 2)  
10. Enable this BWM contract.  
>> BWM Contract 2# ena  
(Enables this BWM contract)  
458  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
11. Assign the BWM contracts to different switch ports.  
Physical switch ports are used to classify which frames are managed by each contractthat is,  
one BWM contract will be applied to all frames from a specific port. The second contract will  
be applied to all frames from another specified port.  
>> BWM Contract 2# /cfg/port 1/cont 1  
>> Port 1# ../port 2/cont 2  
(Assign contract 1 to port 1)  
(Assign contract 2 to port 2)  
12. On the switch, apply and verify the configuration.  
>> Port 2# apply  
>> Port 2# /cfg/bwm/cur  
(Make your changes active)  
(View current BWM settings)  
Examine the resulting information. If any settings are incorrect, make any appropriate changes.  
13. On the switch, save your new configuration changes.  
>> Bandwidth Management# save  
(Save for restore after reboot)  
14. On the switch, check the BWM information.  
>> Bandwidth Management# /info/bwm <contract number> (View BWM information)  
Check that all BWM contract parameters are set correctly. If necessary, make any appropriate  
configuration changes and then check the information again.  
Chapter 17: Bandwidth Management  
459  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Preferential Services Examples  
BWM can be used to provide preferential treatment to certain traffic, based on source IP  
blocks, applications, URL paths, or cookies. You may find it useful to configure higher policy  
rate limits for specific sites, for example, those used for e-commerce.  
Web Site Preference Example  
In the following example, there are two Web sites, A.comand B.com.BWM is configured  
to give preference to traffic sent to Web site B.com:”  
1. Configure the switch as you normally would for SLB. Configuration includes the follow-  
ing tasks:  
n
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Define a real server group.  
Define a virtual server.  
Define the port configuration.  
For more information about SLB configuration, refer to Server Load Balancingon page 117.  
NOTE Ensure BWM is enabled on the switch (/cfg/bwm/on).  
2. Select the first bandwidth policy.  
Each policy must have a number from 1 to 64.  
>> # /cfg/bwm/pol 1  
(Select BWM policy 1)  
3. Set the hard, soft, and reserved rate limits for the bandwidth policy in Mbps.  
>> Policy 1# hard 10  
>> Policy 1# soft 8  
>> Policy 1# resv 5  
(Set never exceedrate)  
(Set desired bandwidth rate)  
(Set committed information rate)  
4. On the switch, select a BWM contract and name the contract.  
Each contract must have a unique number from 1 to 256.  
>> Policy 1# /cfg/bwm/cont 1  
>> BWM Contract 1# name a.com  
(Select BWM Contract 1)  
(Assign contract name a.com)  
460  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
5. Set the bandwidth policy for this contract.  
Each BWM contract must be assigned a bandwidth policy.  
>> BWM Contract 1# pol 1  
(Assign policy 1 to BWM contract 1)  
(Enables this BWM contract)  
(Select BWM policy 2)  
6. Enable this BWM contract.  
>> BWM Contract 1# ena  
7. Select the second bandwidth policy.  
>> BWM Contract 1# /cfg/bwm/policy 2  
8. Set the hard, soft, and reserved rate limits for this policy, in Mbps.  
>> Policy 2# hard 18  
>> Policy 2# soft 15  
>> Policy 2# resv 10  
(Set never exceedrate)  
(Set desired bandwidth rate)  
(Set committed information rate)  
9. On the switch, select the second BWM contract and name the contract.  
>> Policy 2# /cfg/bwm/cont 2  
(Select BWM contract 2)  
>> BWM Contract 2# name b.com  
(Assign contract name b.com)  
10. Set the bandwidth policy for this contract.  
Each BWM contract must be assigned a bandwidth policy.  
>> BWM Contract 2# pol 2  
(Assign policy 2 to BWM contract 2)  
(Enables this BWM contract)  
11. Enable this BWM contract.  
>> BWM Contract 2# ena  
Chapter 17: Bandwidth Management  
461  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
12. Create a virtual server that will be used to classify the frames for contract 1 and assign  
the Virtual server IP address for this server. Then, assign the BWM contract to the vir-  
tual server. Repeat this procedure for a second virtual server.  
NOTE This classification applies to the services within the virtual server and not to the  
virtual server itself.  
The classification policy for these BWM contracts is based on a virtual server. One of the  
BWM contracts will be applied to any frames that are sent to the virtual server associated with  
that contract.  
>> BWM Contract 2# /cfg/slb/virt 1/cont 1 (Assign contract to virtual server 1)  
>> Virtual Server 1# vip 100.2.16.2  
>> Virtual Server 1# ena  
(Set virtual server VIP address)  
(Enable this virtual server)  
>> Virtual Server 1# /cfg/slb/virt 2/cont 2 (Assign contract to virtual server)  
>> Virtual Server 2# vip 100.2.16.3  
>> Virtual Server 2# ena  
(Set virtual server IP address)  
(Enable this virtual server)  
13. On the switch, apply and verify the configuration.  
>> Virtual Server 2# apply  
>> Virtual Server 2# /cfg/bwm/cur  
(Make your changes active)  
(View current BWM settings)  
Examine the resulting information. If any settings are incorrect, make the appropriate changes.  
14. On the switch, save your new configuration changes.  
>> Bandwidth Management# save  
(Save for restore after reboot)  
15. On the switch, check the bandwidth management information.  
>> Bandwidth Management# /info/bwm <contract number>(View BWM information)  
Check that all BWM contract parameters are set correctly. If necessary, make any appropriate  
configuration changes and then check the information again.  
462  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
URL-Based Bandwidth Management Example  
In this example, you will assign bandwidth based on URL paths. For URL-based server load  
balancing, a user has to first define strings to monitor. Each of these strings is attached to real  
servers, and any URL with the string is load balanced across the assigned servers.  
NOTE The complete procedure to configure URL-based SLB is described in Chapter 7,  
Content Intelligent Switchingof the Web OS Application Guide.  
The best way to achieve URL-based bandwidth management is to assign a contract to each  
defined string. This allocates a percentage of bandwidth to the string or URL containing the  
string.  
To configure the switch for URL-based bandwidth management, perform the following steps:  
NOTE Refer to the Web OS Command Reference, Chapter 7, for more information on how to  
create a contract.  
1. Define a load-balancing string for URL-based server load balancing. For example, add  
the string alteon.”  
>> # /cfg/slb/layer7/lb/add alteon  
To see the URL path ID assigned for the string alteon,execute the curcommand:  
>> Server Load Balance Resource# cur  
Number of entries: 2  
1: any, cont 1024  
2: alteon, cont 3  
2. Allocate bandwidth for each string.  
To implement this, assign a BWM contract to a defined string.  
>> Server Load Balance Resource# cont <URL path ID> <BWM Contract number>  
Chapter 17: Bandwidth Management  
463  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
3. Configure a real server to handle the URL request.  
To add a defined string:  
>> # /cfg/slb/real 2/layer7/addlb <URL path ID>  
where URL path ID is the identification number of the defined string as displayed when you  
enter the curcommand.  
Example: /cfg/slb/real 2/layer7/addlb 3  
4. Either enable Direct Access Mode (DAM) on the switch or configure a proxy IP address  
on the client port.  
NOTE If VMA is enabled and you are using a proxy IP address, you need to configure proxy  
IP addresses on ports 1 through 8.  
To turn on DAM:  
>> # /cfg/slb/adv/direct ena  
To turn off DAM and configure a proxy IP address on the client port:  
>> # /cfg/slb/adv/direct dis  
>> # ../port 2/pip 12.12.12.12  
>> # proxy ena  
NOTE By enabling DAM on the switch or, alternatively, disabling DAM and configuring a  
proxy IP address on the client port, port mapping for URL-based server load balancing can be  
performed.  
464  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
5. Turn on URL-based server load balancing on the virtual server.  
Configure everything under the virtual server as in Configuration Example 1.  
>> # /cfg/slb/virt 1/service 80/httpslb enable urlslb  
If the same string is used by more than one service, and you want to allocate a certain percent-  
age of bandwidth to this URL string for this service on the virtual server, then define a rule  
using the urlcontcommand.  
>> # /cfg/slb/virt 1/service 80/urlcont <URL path ID> <BW Contract number>  
This contract is tied to service 1. The urlcontcommand will overwrite the contract assigned  
to the URL string ID.  
6. Enable Server Load Balancing.  
>> # /cfg/slb/on  
Cookie-Based Bandwidth Management Example  
In this example, you will assign bandwidth based on cookies. First, configure cookie-based  
server load balancing, which is very similar to URL-based load balancing. Any cookie contain-  
ing the specified string is redirected to the assigned server.  
Scenario 1: In this scenario, the Web site has a single virtual server IP address and supports  
multiple classes of users. Turn on cookie parsing for the service on the virtual server.  
>> # /cfg/slb/virt 1/service 80  
>> # httpslb enabled cookie sid 1 8 disable  
1. Define one or more load-balancing strings.  
>> # /cfg/slb/layer7/lb/add <URL path ID>  
Example:  
>> # /cfg/slb/layer7/lb/add "Business"  
>> # add "First"  
>> # add "Coach"  
Chapter 17: Bandwidth Management  
465  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
2. Allocate bandwidth for each string.  
To do this, assign a BWM contract to each defined string.  
>> # /cfg/slb/layer7/lb/cont <URL path ID> <BWM Contract number>  
3. Configure a real server to handle the cookie.  
To add a defined string:  
>> # /cfg/slb/real 2/layer7/addlb <URL path ID>  
where URL path ID is the identification number of the defined string.  
Example:  
>> # /cfg/slb/real 2/layer7/addlb 3  
4. Either enable DAM on the switch or configure a proxy IP address on the client port.  
NOTE If VMA is enabled, you need to configure a unique proxy IP address for each port 1-8.  
To turn on DAM:  
>> # /cfg/slb/adv/direct ena  
To turn off DAM and configure a Proxy IP address on the client port:  
>> # /cfg/slb/adv/direct dis  
>> # ../port 2/pip 12.12.12.12  
>> # proxy ena  
NOTE By enabling DAM on the switch or, alternatively, disabling DAM and configuring a  
Proxy IP address on the client port, port mapping for URL-based load balancing can be per-  
formed.  
5. Enable SLB.  
>> # /cfg/slb/on  
466  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
Scenario 2: In this scenario, the Web site has multiple virtual server IP addresses, and the  
same user classification or multiple sites use the same string name. In this scenario, there are  
two Virtual IP (VIP) addresses: 172.17.1.1 and 172.17.1.2. Both the virtual servers and sites  
have first class and business class customers, with different bandwidth allocations, as shown in  
Figure 17-7 on page 467.  
Figure 17-7 Cookie-Based Preferential Services  
The configuration to support this scenario is similar to Scenario 1. Note the following:  
1. Configure the string and assign contracts for the strings and services.  
2. If the same string is used by more than one service, and you want to allocate a certain  
percentage of bandwidth to a user class for this service on the virtual server, then define a  
rule using the urlcontcommand:  
>> # /cfg/slb/virt 1/service 80/urlcont <URL path ID> <BW Contract number>  
NOTE When assigning /cfg/slb/virt 1/service 80/urlcont(contract 1) and  
/cfg/slb/layer7/lb/cont(contract 2) to the same URL, urlcontwill override  
contract 2, even if contract 2 has higher precedence.  
Chapter 17: Bandwidth Management  
467  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
Security Management Example  
BWM can be used to prevent Denial of Service (DoS) attacks by a flooding of necessary evil”  
packets and limiting the rate of TCP SYN, ping, other disruptive packets, and alerting/logging  
the network manager when soft limits are exceeded.  
In the following example, a filter is configured to match ping packets, and BWM is configured  
to prevent DoS attacks by limiting the bandwidth policy rate of those packets:  
1. Configure the switch as usual for SLB (see Server Load Balancingon page 117):  
n
n
n
n
n
n
Assign an IP address to each of the real servers in the server pool.  
Define an IP interface on the switch.  
Define each real server.  
Define a real server group.  
Define a virtual server.  
Define the port configuration.  
NOTE Ensure BWM is enabled on the switch (/cfg/bwm/on).  
2. Select a bandwidth policy.  
Each policy must have a number from 1 to 64.  
>> # /cfg/bwm/pol 1  
(Select BWM policy 1)  
3. Set the hard, soft, and reserved rate limits for this policy in Kilobytes.  
>> Policy 1# hard 250k  
>> Policy 1# soft 250k  
>> Policy 1# resv 250k  
(Set never exceedrate)  
(Set desired bandwidth rate)  
(Set committed information rate)  
4. Set the buffer limit for the policy.  
Set a parameter between 8192 and 128000 bytes. The buffer depth for a BWM contract should  
be set to a multiple of the packet size.  
>> Policy 1# buffer 8192  
(Set policy buffer limit of 8192 bytes)  
5. On the switch, select a BWM contract and name the contract.  
Each contract must have a unique number from 1 to 256.  
>> Bandwidth Management# /cfg/bwm/cont 1 (Select BWM contract 1)  
>> BWM Contract 1# name icmp  
(Select contract name icmp)  
468  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
6. Set the bandwidth policy for the contract.  
Each BWM contract must be assigned a bandwidth policy.  
>> BWM Contract 1# pol 1  
(Assign policy 1 to BWM contract 1)  
(Enables this BWM contract)  
7. Enable the BWM contract.  
>> BWM Contract 1# ena  
8. Create a filter that will be used to classify the frames for this contract and assign the  
BWM contract to the filter.  
The classification policy for this BWM contract is based on a filter configured to match ICMP  
traffic. The contract will be applied to any frames that match this filter  
>> BW Contract 1# /cfg/slb/filt 1/proto icmp (Define protocol affected by filter)  
>> Filter 1# adv/icmp any  
(Set the ICMP message type)  
>> Filter 1 Advanced# cont 1  
(Assign BWM contract 1 to this filter)  
>> Filter 1 Advanced# /cfg/slb/filt 1/ena (Enable this filter)  
>> Filter 1# apply  
(Port and enable filtering)  
9. On the switch, apply and verify the configuration.  
>> Filter 1 Advanced# apply  
>> Filter 1 Advanced# /cfg/bwm/cur  
(Make your changes active)  
(View current BWM settings)  
Examine the resulting information. If any settings are incorrect, make the appropriate changes.  
10. On the switch, save your new configuration changes.  
>> Bandwidth Management# save  
(Save for restore after reboot)  
11. On the switch, check the BWM information.  
>> Bandwidth Management# /info/bwm <contract number>(View BWM information)  
Check that all BWM contract parameters are set correctly. If necessary, make any appropriate  
configuration changes and then check the information again.  
Chapter 17: Bandwidth Management  
469  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
470  
Chapter 17: Bandwidth Management  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
DIP (Destination IP  
Address)  
The destination IP address of a frame.  
Dport (Destination  
Port)  
The destination port (application socket: for example, http-80/https-443/DNS-53)  
Any time an IP address is changed from one source IP or destination IP address to another  
NAT (Network  
Address Translation) address, network address translation can be said to have taken place. In general, half NAT  
is when the destination IP or source IP address is changed from one address to another.  
Full NAT is when both addresses are changed from one address to another. No NAT is  
when neither source nor destination IP addresses are translated. Virtual server-based load  
balancing uses half NAT by design, because it translates the destination IP address from  
the Virtual Server IP address, to that of one of the real servers.  
Preemption  
In VRRP, preemption will cause a Virtual Router that has a lower priority to go into  
backup should a peer Virtual Router start advertising with a higher priority.  
Priority  
In VRRP, the value given to a Virtual Router to determine its ranking with its peer(s). Min-  
imum value is 1 and maximum value is 254. Default is 100. A higher number will win out  
for master designation.  
Proto (Protocol)  
The protocol of a frame. Can be any value represented by a 8-bit value in the IP header  
adherent to the IP specification (for example, TCP, UDP, OSPF, ICMP, and so on.)  
Real Server Group  
A group of real servers that are associated with a Virtual Server IP address, or a filter.  
Redirection or  
Filter-Based Load  
Balancing  
A type of load balancing that operates differently from virtual server-based load balancing.  
With this type of load balancing, requests are transparently intercepted and redirectedto  
a server group. Transparentlymeans that requests are not specifically destined for a Vir-  
tual Server IP address that the switch owns. Instead, a filter is configured in the switch.  
This filter intercepts traffic based on certain IP header criteria and load balances it.  
Filters can be configured to filter on the SIP/Range (via netmask), DIP/Range (via net-  
mask), Protocol, SPort/Range or DPort/Range. The action on a filter can be Allow, Deny,  
Redirect to a Server Group, or NAT (translation of either the source IP or destination IP  
address). In redirection-based load balancing, the destination IP address is not translated to  
that of one of the real servers. Therefore, redirection-based load balancing is designed to  
load balance devices that normally operate transparently in your networksuch as a fire-  
wall, spam filter, or transparent Web cache.  
RIP (Real Server)  
Real Server IP Address. An IP addresses that the switch load balances to when requests  
are made to a Virtual Server IP address (VIP).  
471  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
SIP (Source IP  
Address)  
The source IP address of a frame.  
SPort (Source Port)  
Tracking  
The source port (application socket: for example, HTTP-80/HTTPS-443/DNS-53).  
In VRRP, a method to increase the priority of a virtual router and thus master designation  
(with preemption enabled). Tracking can be very valuable in an active/active configura-  
tion.  
You can track the following:  
Vrs: Virtual Routers in Master Mode (increments priority by 2 for each)  
Ifs: Active IP interfaces on the Web switch (increments priority by 2 for each)  
Ports: Active ports on the same VLAN (increments priority by 2 for each)  
l4pts: Active Layer 4 Ports, client or server designation (increments priority by 2  
for each  
reals: healthy real servers (increments by 2 for each healthy real server)  
hsrp: HSRP announcements heard on a client designated port (increments by 10  
for each)  
VIP (Virtual Server IP An IP address that the switch owns and uses to load balance particular service requests  
Address) (like HTTP) to other servers.  
VIR (Virtual Interface A VRRP address that is an IP interface address shared between two or more virtual rout-  
Router)  
ers.  
Virtual Router  
A shared address between two devices utilizing VRRP, as defined in RFC 2338. One vir-  
tual router is associated with an IP interface. This is one of the IP interfaces that the switch  
is assigned. All IP interfaces on the Alteon Web switches must be in a VLAN. If there is  
more than one VLAN defined on the Web switch, then the VRRP broadcasts will only be  
sent out on the VLAN of which the associated IP interface is a member.  
Virtual Server Load  
Balancing  
Classic load balancing. Requests destined for a Virtual Server IP address (VIP), which is  
owned by the switch, are load balanced to a real server contained in the group associated  
with the VIP. Network address translation is done back and forth, by the switch, as  
requests come and go.  
Frames come to the switch destined for the VIP. The switch then replaces the VIP and with  
one of the real server IP addresses (RIPs), updates the relevant checksums, and forwards  
the frame to the server for which it is now destined. This process of replacing the destina-  
tion IP (VIP) with one of the real server addresses is called half NAT. If the frames were  
not half NATed to the address of one of the RIPs, a server would receive the frame that  
was destined for its MAC address, forcing the packet up to Layer 3. The server would  
then drop the frame, since the packet would have the DIP of the VIP and not that of the  
server (RIP).  
VRID (Virtual Router  
Identifier)  
In VRRP, a value between 1 and 255 that is used by each virtual router to create its MAC  
address and identify its peer for which it is sharing this VRRP address. The VRRP MAC  
address as defined in the RFC is 00-00-5E-00-01-{VRID}. If you have a VRRP address  
that two switches are sharing, then the VRID number needs to be identical on both  
switches so each virtual router on each switch knows whom to share with.  
472  
Glossary  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
VRRP (Virtual Router A protocol that acts very similarly to Ciscos proprietary HSRP address sharing protocol.  
Redundancy  
Protocol)  
The reason for both of these protocols is so devices have a next hop or default gateway that  
is always available. Two or more devices sharing an IP interface are either advertising or  
listening for advertisements. These advertisements are sent via a broadcast message to an  
address such as 224.0.0.18.  
With VRRP, one switch is considered the master and the other the backup. The master is  
always advertising via the broadcasts. The backup switch is always listening for the broad-  
casts. Should the master stop advertising, the backup will take over ownership of the  
VRRP IP and MAC addresses as defined by the specification. The switch announces this  
change in ownership to the devices around it by way of a Gratuitous ARP, and advertise-  
ments. If the backup switch didnt do the Gratuitous ARP the Layer 2 devices attached to  
the switch would not know that the MAC address had moved in the network. For a more  
detailed description, refer to RFC 2338.  
VSR (Virtual Server  
Router)  
A VRRP address that is a shared Virtual Server IP address. VSR is Web OS proprietary  
extension to the VRRP specification. The switches must be able to share Virtual Server IP  
addresses, as well as IP interfaces. If they didnt, the two switches would fight for owner-  
ship of the Virtual Server IP address, and the ARP tables in the devices around them would  
have two ARP entries with the same IP address but different MAC addresses.  
Glossary  
473  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
474  
Glossary  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
Symbols  
B
[ ]....................................................................... 23  
backup servers...................................................135  
bandwidth management...........................449 to 450  
burst limit...................................................453  
classification policies...................................447  
configuration, general .......................454 to 456  
configuration, preferential service .................460  
configuration, security .................................468  
configuration, user fairness...........................457  
cookie-based ..............................................451  
data pacing.................................................446  
HTTP header-based.....................................451  
operational keys..........................................453  
precedence .................................................448  
statistics and history ....................................452  
VMA.........................................................443  
bandwidth policies.............................................444  
rates ..........................................................445  
BBI ....................................................................74  
Border Gateway Protocol (BGP) ...........................36  
use with GSLB ...........................................312  
Bridge Protocol Data Unit (BPDU) .................48, 50  
broadcast domains .............................33, 43, 45, 48  
Browser-Based Interface ......................................74  
Numerics  
80 (port) ........................................................... 295  
802.1Q VLAN tagging................................... 44, 45  
A
active cookie mode............................................ 429  
active-active redundancy.................................... 255  
configuration.............................................. 265  
Server Load Balancing ................................ 267  
synchronization .......................................... 277  
active-standby redundancy ................................. 254  
configuration.............................................. 263  
administrator account......................................... 105  
allow (filtering)......................................... 120, 170  
application health checking ................................ 231  
application ports........................................ 128, 171  
application redirection ....................................... 203  
client IP address authentication..................... 215  
example with NAT ..................................... 208  
games and real-time applications .................. 215  
non cacheable sites...................................... 215  
non-HTTP redirects for GSLB...................... 304  
proxies ................................... 205, 208 to 213  
rport.................................................. 208, 214  
topologies .................................................. 206  
Web-cache redirection example......... 204 to 215  
authenticating, in OSPF ....................................... 80  
authoritative name servers.................................. 291  
autonomous systems (AS) .................................... 73  
C
CGI-bin scripts..........................................123, 134  
Cisco EtherChannel .............................................68  
client traffic processing ......................................123  
SLB web balancing example ........................126  
command conventions..........................................23  
Command Line Interface ......................................74  
475  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Web OS 10.0 Application Guide  
configuring  
E
cookie-based persistence ..............................430  
egress traffic ..................................................... 354  
encrypt ............................................................. 354  
EtherChannel ...................................................... 65  
as used with port trunking .............................. 68  
expiration timer, insert cookie............................. 432  
external routing ............................................. 36, 73  
FTP Server Load Balancing ..................150, 151  
multi-response cookie search.........................436  
stateful failover ...........................................285  
contacting us........................................................24  
content intelligent  
server load balancing ...................................375  
Web cache redirection..................................394  
cookie  
F
active .........................................................429  
different types .............................................427  
expiration timer...........................................432  
header ........................................................425  
insert mode.................................................427  
names ........................................................426  
passive mode ..............................................428  
permanent...................................................425  
temporary ...................................................425  
values.........................................................426  
cookie-based persistence.....................................424  
customer support..................................................24  
failed server protection, SLB .............................. 118  
failover  
active-active............................................... 260  
active-standby ............................................ 252  
overview.................................................... 253  
stateful....................................................... 283  
fault tolerance  
port trunking ................................................ 66  
Server Load Balancing ................................ 122  
filter redirection  
tunable hash ............................................... 184  
filtering  
configuration example ................................. 186  
default filter ....................................... 173, 186  
IP address ranges ........................................ 178  
layer 7 deny ............................................... 417  
NAT configuration example .............. 191 to 193  
numbering.................................................. 176  
order of precedence..................................... 172  
proto (option) ..................................... 186, 209  
security example......................................... 185  
filtering-based VLANs....................................... 174  
firewalls ........................................................... 185  
fragmenting jumbo frames.............................. 28, 30  
frame processing ................................................. 63  
frame tagging. See VLANs tagging.  
D
data pacing ........................................................446  
datagram ...........................................................354  
default gateway....................................................30  
configuration example......................32, 61, 295  
VLAN-based ................................................58  
default password ................................................105  
default route, OSPF ..............................................78  
delayed binding.............................. 146 to 148, 373  
Web cache redirection..................................210  
deny (filtering)...........................................120, 170  
dip (destination IP address for filtering)................178  
direct real server access ......................................142  
Distributed Site State Protocol (DSSP).........290, 295  
dmask, destination mask for filtering....................178  
Domain Name System (DNS)  
FTP.................................................................. 304  
FTP Server Load Balancing................................ 150  
configuring ........................................ 150, 151  
filtering ..............................................185, 188  
Global SLB (diagram)..................................291  
load balancing, layer 4..................................151  
load balancing, layer 7..................................390  
round robin .................................................118  
dport (filtering option) ................................186, 209  
DSSP. See Distributed Site State Protocol.  
duplex mode for jumbo frames ..............................63  
dynamic NAT....................................................193  
476  
Index  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
HTTP  
G
application health checks..............................231  
redirects (Global SLB option).......................292  
HTTP header  
hashing ......................................................389  
HTTP URL request............................................417  
HTTPS/SSL health checks..................................240  
gateway. See default gateway.  
Gigabit adapters  
jumbo frames ............................................... 63  
Global SLB  
configuration tutorial........................ 294 to 303  
Distributed Site State Protocol.............. 290, 295  
DNS resolution (diagram)............................ 291  
domain name configuration.......................... 299  
health check interval ................................... 298  
hostname configuration ............................... 299  
HTTP redirect ............................................ 292  
port states .................................................. 297  
real server groups........................................ 296  
real servers................................................. 296  
remote site configuration ............................. 298  
tests .......................................................... 308  
using proxy IP............................................ 304  
I
ICMP ...............................................................171  
IEEE 802.1Q VLAN tagging ................................45  
IF. See IP interfaces.  
IGMP ...............................................................171  
IMAP server health checks .................................237  
imask................................................................129  
ingress traffic ....................................................354  
insert cookie mode.............................................427  
expiration timer...........................................432  
internal routing..............................................36, 73  
Internet Service Provider (ISP), SLB example ......121  
inter-switch port states, for hot-standby redundancy....  
257  
H
half-duplex for jumbo frames ............................... 63  
hash metric ....................................................... 132  
hashing  
Intrusion Detection System (IDS)........................163  
load balancing metrics .................................164  
IP address  
redirection filters ........................................ 184  
hashing on any HTTP header.............................. 389  
health checks ............................................ 208, 237  
configuration using scripts ........................... 227  
format ....................................................... 226  
Global SLB interval .................................... 298  
hostname for HTTP content .............. 231 to 232  
HTTPS/SSL............................................... 240  
IMAP server .............................................. 237  
RADIUS server .......................................... 239  
real server parameters.................................. 231  
script-based..................................... 225 to 229  
verifying scripts.......................................... 229  
wireless session protocol................... 240 to 242  
WSP ......................................................... 241  
WTLS....................................................... 242  
high-availability ................................................ 247  
Host routes  
conservation ...............................................191  
filter ranges ................................................178  
local route cache ranges .................................35  
private .......................................................191  
proxies....................122, 136, 205, 208 to 213  
real server groups................125, 269, 296, 400  
real servers.................................120, 124, 296  
routing example ......................................31, 60  
SLB real servers..........................................125  
virtual servers .....................120, 122, 126, 297  
IP interfaces  
configuration example .........................125, 295  
example configuration .......................31, 34, 60  
VLAN #1 (default)........................................45  
VLANs........................................................45  
IP proxies  
for application redirection ............................213  
for Global Server Load Balancing .................304  
for Server Load Balancing............................136  
See also proxies, proxy IP address (PIP).  
OSPF .......................................................... 82  
hostname, for HTTP health checks.............. 231, 299  
hot-standby redundancy ..................................... 256  
configuration.............................................. 275  
Index  
477  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
IP routing ..........................................................123  
cross-subnet example .....................................28  
default gateway configuration ...................32, 61  
IP interface configuration ...................31, 34, 60  
IP subnets.....................................................29  
network diagram............................................29  
routing between VLANs.................................64  
subnet configuration example..........................31  
switch-based topology....................................30  
IP subnets............................................................30  
routing ...................................................29, 30  
VLANs ..................................................43, 45  
ISL Trunking.......................................................65  
load balancing  
DNS.................................................. 151, 390  
FTP traffic ................................................. 150  
IDS traffic.................................................. 163  
layer 7 traffic.............................................. 375  
RTSP ................................................ 155, 392  
TCP-based DNS queries .............................. 151  
types of........................................... 149 to 166  
UDP-based DNS queries.............................. 151  
WAN traffic............................................... 166  
WAP traffic................................................ 158  
local route cache address range ............................. 35  
local route cache parameters  
lmask .......................................................... 35  
lnet.............................................................. 35  
log  
filtering option............................................ 170  
log (filtering option) .......................................... 185  
logical segment. See IP subnets.  
J
jumbo frames  
fragmenting to normal size........................28, 30  
frame size.....................................................63  
Gigabit adapter..............................................63  
isolating with VLANs ....................................63  
routing ...................................................28, 30  
supported duplex modes .................................63  
VLANs ........................................................63  
LSAs.................................................................. 72  
M
MAC address .................................................... 355  
Management Processor (MP)................................ 45  
use in switch security................................... 100  
manual style conventions ..................................... 23  
mapping ports ................................................... 214  
mapping virtual ports to real ports....................... 139  
maxcons limit............................................ 134, 135  
maximum connections ............................... 134, 135  
minimum misses (SLB real server metric)............ 131  
mirroring ports .................................................. 113  
MP (Management Processor)................................ 45  
multi-homing .................................................... 312  
multi-links between switches  
L
Layer 4  
administrator account...................................105  
server load balancing ...................................124  
Web cache redirection..................................206  
Layer 7  
deny filter...................................................417  
precedence lookup .......................................414  
regular expression matching..........................412  
server load balancing ...................................375  
string matching............................................410  
Web cache redirection..................................394  
least connections (SLB Real Server metric) ..........132  
limiting TCP sessions .........................................179  
lmask (local route cache parameter) .......................35  
lnet (local route cache parameter) ..........................35  
using port trunking........................................ 65  
using VLANs ............................................... 48  
multimedia servers............................................. 155  
multiple spanning tree groups ............................... 51  
478  
Index  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
persistent  
N
bindings.....................................................123  
port sessions...............................................286  
PIP. See proxies, proxy IP address.  
POP3................................................................304  
port 80..............................................................295  
port mapping.....................................................214  
port mirroring....................................................113  
port processing mode  
name servers, Global SLB configuration example. 291  
Network Address Translation (NAT)................... 208  
configuration example...................... 191 to 193  
filter example ............................................. 194  
proxy ........................................................ 194  
static example............................................. 191  
network performance  
statistics, with use of proxy addresses............ 136  
New ................................................................... 19  
NFS server........................................................ 121  
non cacheable sites in application redirection....... 215  
none (port processing mode) example.................. 126  
non-HTTP redirects for GSLB............................ 304  
client .........................................................126  
none ..........................................................126  
server ................................................123, 126  
port states..........................................................297  
port trunking .......................................................66  
configuration example ...................................67  
description ...................................................68  
EtherChannel................................................65  
fault tolerance...............................................66  
ports  
O
optional software............................................... 203  
OSPF  
for services.........................................128, 171  
physical. See switch ports.  
area types..................................................... 70  
authentication............................................... 80  
configuration examples......................... 84 to 98  
default route................................................. 78  
external routes.............................................. 82  
filtering criteria........................................... 171  
host routes ................................................... 82  
link state database......................................... 72  
neighbors..................................................... 72  
overview...................................................... 69  
redistributing routes ...................................... 82  
route summarization...................................... 77  
router ID...................................................... 80  
virtual link ................................................... 79  
overflow servers................................................ 135  
SLB configuration example..........................126  
precedence, in bandwidth classifications ..............448  
private IP address ..............................................191  
private network..................................................191  
protocol types....................................................171  
proxies...................................122, 136, 205 to 213  
configuration example .................................194  
NAT..........................................................193  
proxy IP address (PIP)................122, 136, 144, 213  
proxy servers.....................................................205  
PVID (port VLAN ID) .........................................44  
Q
QuickTime Streaming Server..............................156  
P
R
RADIUS  
parallel links ....................................................... 48  
password  
administrator account .................................. 105  
default....................................................... 105  
L4 administrator account ............................. 105  
user account ............................................... 105  
PDUs ................................................................. 48  
persistence  
health checks ..............................................239  
port 1812 and 1645..............128, 159, 161, 171  
port 1813 ...................................128, 162, 171  
server parameters ........................................239  
SSH/SCP ...................................................110  
RADIUS snooping.............................................160  
RADIUS static session entries.............................158  
real server groups  
cookie-based .............................................. 424  
multi-reponse cookie search ......................... 436  
SSL session ID-based....................... 437 to 439  
configuration example .................269, 296, 400  
Index  
479  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
real servers ........................................................122  
backup/overflow servers...............................135  
configuration example..................................296  
connection timeouts .....................................134  
health checks ..............................................231  
maximum connections .................................134  
SLB configuration example ..........................125  
weights.......................................................134  
redirect (HTTP) .................................................292  
redirecting filters  
SecurID ............................................................ 110  
security  
filtering.............................................. 170, 185  
firewalls..................................................... 185  
from viruses ............................................... 170  
layer 7 deny filter........................................ 417  
port mirroring............................................. 113  
private networks ......................................... 191  
switch management....................................... 99  
VLANs........................................................ 43  
segmentation. See IP subnets.  
tunable hash................................................184  
redirecting non-HTTP applications ......................304  
redirection. See application redirection  
segments. See IP subnets.  
server (port processing mode) example................ 126  
server failure..................................................... 246  
Server Load Balancing  
redundancy  
active-active................................................255  
active-standby .............................................254  
hot-standby.................................................256  
remote (Global SLB real server property).............298  
roundrobin  
SLB Real Server metric................................132  
route cache, sample ..............................................59  
Router ID  
OSPF...........................................................80  
routers.....................................................29, 32, 61  
border ..........................................................73  
peer .............................................................73  
port trunking.................................................65  
switch-based routing topology.........................30  
using redirection to reduce Internet congestion 203  
web-cache redirection example......................204  
routes, advertising ................................................73  
routing ................................................................36  
internal and external.......................................73  
rport (filtering)...........................................208, 214  
RSA keys ..........................................................109  
RTSP  
across subnets............................................... 28  
active-active redundancy.............................. 267  
backup servers............................................ 135  
complex network topologies......................... 136  
configuration example ......................... 121, 136  
direct real server access ............................... 142  
distributed sites........................................... 290  
DNS.................................................. 151, 390  
failed server protection ................................ 118  
fault tolerance............................................. 122  
FTP........................................................... 150  
health checks.............................................. 231  
IDS ........................................................... 163  
maximum connections................................. 134  
overflow servers ......................................... 135  
overview.................................................... 119  
persistent bindings ...................................... 123  
port processing modes ......................... 123, 126  
proxies .............................................. 122, 136  
proxy IP addresses ...................................... 144  
real server group ......................... 125, 269, 400  
real server IP address (RIP) .......................... 120  
real servers................................................. 122  
remote sites................................................ 290  
RTSP ................................................ 155, 392  
topology considerations ............................... 122  
virtual IP address (VIP) ....................... 120, 122  
virtual servers..................................... 120, 126  
WAN links................................................. 166  
WAP......................................................... 158  
weights...................................................... 134  
server pool........................................................ 118  
server port processing ........................................ 123  
service failure.................................................... 246  
configuring .................................................157  
Layer 7 load balancing .................................392  
server load balancing ...................................155  
Web cache redirection..................................211  
S
scalability, service..............................................118  
SCP  
services ......................................................108  
script-based health checks....................... 225 to 229  
searching for cookie ...........................................432  
searching for cookies..........................................432  
480  
Index  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
service ports.............................................. 128, 171  
setting multiple response count........................... 432  
shared services.................................................. 118  
SIP (source IP address for filtering)..................... 178  
smask  
transparent proxies..................136, 205, 208 to 213  
tunable hashing..................................................184  
tunneling...........................................................354  
typographic conventions.......................................23  
source mask for filtering .............................. 178  
SMTP .............................................................. 304  
SNMP ................................................................ 74  
Spanning-Tree Protocol  
eliminating bridge loops with VRRP ............. 279  
multiple instances ......................................... 51  
replacing with hot-standby failover ............... 275  
VLANs ................................................. 48, 49  
spoofing, prevention of ........................................ 99  
sport (filtering option)................................ 186, 209  
SSH  
U
UDP .................................................171, 188, 189  
datagrams.....................................................64  
jumbo frame traffic fragmentation...................30  
server status using .......................................130  
URL-based.............................................449 to 450  
user account ......................................................105  
Using proxy IP  
GSLB........................................................304  
RSA host and server keys ............................ 109  
SSH/SCP  
V
virtual clocks.....................................................446  
virtual interface router (VIR) ..............................248  
virtual IP address (VIP)..............................120, 122  
virtual link, OSPF................................................79  
Virtual Local Area Networks. See VLANs.  
virtual port mapping to multiple real ports.139 to 142  
virtual router  
ID numbering .............................................280  
virtual router group ............................................257  
Virtual Router Redundancy Protocol  
tracking......................................................261  
virtual server router............................................259  
virtual servers....................................................120  
configuration example .................................126  
IP address...........................................126, 297  
virus attacks, preventing.....................................417  
configuring ................................................ 111  
supported client commands .......................... 112  
stateful failover ................................................. 283  
static NAT........................................................ 191  
static session entries........................................... 158  
statistical load distribution.................................... 66  
STP bridge PDUs ................................................ 48  
streaming media ................................................ 155  
summarizing routes ............................................. 77  
switch failover .................................................. 253  
switch management  
security........................................................ 99  
via IP interface ............................................. 45  
switch ports VLANs membership ......................... 44  
syslog  
messages ................................................... 170  
T
tagging. See VLANs tagging.  
TCP ................................................. 171, 188, 189  
health checking using .................................. 130  
port 80....................................................... 144  
rate limiting ............................................... 179  
TCP/UDP port numbers ..................................... 139  
TDT (Theoretical Departure Times) .................... 446  
Telnet............................................................... 185  
text conventions .................................................. 23  
Theoretical Departure Times (TDT) .................... 446  
timeouts for real server connnections................... 134  
TOS burst limit for bandwidth management......... 453  
Index  
481  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Web OS 10.0 Application Guide  
VLANs  
W
WAP  
broadcast domains .......................33, 43, 45, 48  
default PVID.................................................44  
example showing multiple VLANs ..................46  
filtering ......................................................174  
gateway, default ............................................58  
ID numbers...................................................44  
IP interface configuration ...............................34  
IP interfaces..................................................45  
jumbo frames ................................................63  
Management Processor...................................45  
multiple links ................................................48  
multiple spanning trees...................................49  
multiple VLANs......................................44, 45  
parallel links example.....................................48  
port members................................................44  
PVID ...........................................................44  
routing .........................................................33  
security ........................................................43  
Spanning-Tree Protocol............................48, 49  
tagging............................................... 44 to 47  
topologies.....................................................45  
VLAN #1 (default) ...... 44 to 45, 125, 207, 295  
VLAN-tagging adapter support for ..................45  
VPN .................................................................353  
VPN cluster.......................................................354  
VPN Load Balancing overview ...........................354  
VRRP (Virtual Router Redundancy Protocol)  
WSP content health check............................ 241  
WTLS health check..................................... 242  
WAP Gateway .................................................. 158  
WAP load balancing  
RADIUS snooping...................................... 160  
static session entries .................................... 158  
Web cache redirection  
browser-based ............................................ 405  
delayed binding .......................................... 210  
example..................................................... 206  
HTTP header-based..................................... 403  
layer 7 traffic.............................................. 394  
RTSP ................................................ 211, 409  
See application redirection  
servers.................................... 204 to 206, 207  
URL hashing.............................................. 406  
URL-based................................................. 395  
Web hosting...................................................... 121  
weights............................................................. 134  
Wide Area Networking (WAN)  
configuring ................................................ 166  
load balancing ............................................ 166  
Wireless Application Protocol ............................ 158  
World Wide Web, client security for browsing ..... 185  
WSP health check.............................................. 241  
WSP health checks ................................. 240 to 242  
WTLS health check ........................................... 242  
active-active redundancy ..............................255  
active-standby redundancy............................254  
hot-standby redundancy................................256  
inter-switch port states..................................257  
overview ............................................248, 261  
synchronization...........................................277  
synchronizing configurations ........................257  
virtual interface router..................................248  
virtual router ID numbering ..........................280  
virtual server router......................................259  
vrid............................................................249  
482  
Index  
212777-A, February 2002  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Miele Range 10 102 470 User Manual
NEC Computer Monitor AS171 User Manual
Nikon Two Way Radio MH 60 User Manual
North Star Pressure Washer M157477A User Manual
Nostalgia Electrics Mixer DMB 790 User Manual
Olympus Computer Drive C P20U User Manual
Omnimount TV Mount OL50 C User Manual
Panasonic Camcorder AG AC7P User Manual
Panasonic Car Stereo System C9701U User Manual
Panasonic Cordless Telephone KX TGC212E User Manual