Load-Balance/Route Policy Advanced Routing. Outline How does it Work – When matching criteria, send via the route What does it Do – 2 real usage examples.

Slides:



Advertisements
Similar presentations
Configuring Internet Access for a Network. Overview Options for Connecting a Network to the Internet Configuring Internet Access by Using a Router Configuring.
Advertisements

Addressing the Network – IPv4 by Dodi Heriadi. IP Addressing Structure Describe the dotted decimal structure of a binary IP address and label its parts.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
2008 NetDefend Firewall Series Technical Training Firewall Fundamental - Part 2 ©Copyright All rights reserved.
SYSTEM ADMINISTRATION Chapter 19
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
A+ Guide to Software, 4e Chapter 9 Windows on the Internet.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Wi-Fi Structures.
Router Configuration for Home Security: Forward your Ports Presenter: Steve Harris SCTE Director Advanced Network Technologies Program Development.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Andrew Smith 1 NAT and DHCP ( Network Address Translation and Dynamic Host Configuration Protocol )
1 ICMP – Using Ping and Trace CCNA Semester
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
1 Enabling Secure Internet Access with ISA Server.
Unicenter Desktop & Server Management Network Challenges -Latest Revision 11/28/2005.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
How to setup VRT- 402N with MH-2001?. Outline  Connections Topology  VRT-402N setup  MH-2001 setup.
How to setup VRT- 402N with VRT-401/311S?. Outline  Connections Topology  VRT-402N setup  VRT-401 setup.
IP-adresses and subnet masks. Figure 19.9 Dotted-decimal notation.
Module 3: Planning and Troubleshooting Routing and Switching.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
1 Computer Networks and Internets Spring 2005 Assistant Professor JainShing Liu.
Scenario & Hands-on 7-1 VPN Configuration-PPTP
CBAC L AB. Nmap Port scanner Nmap: the beef, Zenmap: GUI frontend Findings before CBAC firewall c. What services are running and available on R1 from.
DHCP: Dynamic Host Configuration Protocol
4 September 2015 RE Meyers, Ms.Ed., CCAI CCENT ICND1 Exam Topics Review Describe the Operation of Data Networks: Network Diagrams and Data Paths.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Exercises ARP ICMP DNS HTTP/TCP Trace analysis. ARP launch Wireshark ipconfig /all ; see local IP and gateway route -print ; find gateway arp -a ; list.
07/11/ L10/1/63 COM342 Networks and Data Communications Ian McCrumRoom 5B18 Tel: voice.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
D-Link TSD 2009 workshop 1 Outbound Route Load Balancing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
EMEA Partners XTM Network Training
Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Configuring the PIX Firewall Presented by Drew Spesard.
ACCESS CONTROL LIST.
D-Link TSD 2009 workshop D-Link Net-Defends Firewall Training ©Copyright By D-Link HQ TSD Benson Wu.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
1 The Network Menu. 2 Static Routing The Static Routing functionality within GD eSeries allows users to easily configure static routes to networks not.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
Source NAT Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
Wrapping up subnetting, mapping IPs to physical ports BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Network Layer IP Address.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Chapter 5e.  Upon completion of this chapter, you should be able to:  Find IP configuration settings on Windows & Linux  Troubleshoot IP configuration.
Troubleshooting a Network
Troubleshooting ip Chapter 5e.
Module 3: Enabling Access to Internet Resources
How to setup VRT-402N with VRT-401/311S?
Planning and Troubleshooting Routing and Switching
ICMP – Using Ping and Trace
Firewall Exercise.
Chapter 9 Windows on the Internet
ICMP – Using Ping and Trace
Presentation transcript:

Load-Balance/Route Policy Advanced Routing

Outline How does it Work – When matching criteria, send via the route What does it Do – 2 real usage examples Trouble Shooting – Ping / Trace Route Application Note

How does it Work (1/3) Set criteria – Protocol – Source IP – Destination IP – Destination Port Set the route – Interface – Gateway – NAT or Routing

How does it Work (2/3) Protocol – TCP – UDP – ICMP Source IP Destination IP Destination Port

Interface – WAN/Virtual WAN – LAN – VPN Gateway – Default – Specified Do NAT or Routing – NAT is not applicable for LAN and VPN How does it Work (3/3)

What does it Do Choose VPN tunnel for certain destinations (Jump) – Surf facebook – Watch Netflix Choose WAN interface for certain destinations – WAN1 for Public VoIP and data, NAT – WAN5 for Private VoIP, Routing

VPN to Remote Server Scenario Find the Destination IP Range Configuration Confirm the Routing

Scenario Go via VPN tunnel for Netflix and facebook

Find the Destination IP Range ping / nslookup whois

Configuration Dest IP Interface

Confirm the Routing Use tracert / traceroute to confirm routing – First hop: LAN gateway – Second hop: VPN gateway

WAN5 for Private VoIP Scenario Rules Overview Configuration – Public server via WAN1 – DNS via WAN1 – Private server via WAN5 Confirm the Routing

Scenario LAN1 for PC LAN2 for IP Phones Data via WAN1 VoIP to public server via WAN1 – DNS lookup may be required VoIP to private server via WAN5

Rules Overview VoIP to public server via WAN1, NAT DNS lookup via WAN1 VoIP to private server via WAN5, routing Unspecified traffics go via WAN1 (data)

External Server via WAN1 Source IP – IP phones Dest IP – Iptel.org Interface – WAN1 Force NAT

DNS via WAN1 DNS – UDP 53 Interface – WAN1 Force NAT

Private Server via WAN5 Source IP – IP phones Dest IP – Any except iptel Interface – WAN5 Routing

Confirm the Routing LAN1 PC tracert / traceroute to LAN2 IP phone tracert / traceroute to LAN2 IP phone traceroute to another IP phone

Trouble Shooting Use ping / tracert to confirm the routing Respect the first matched rule Ignore the rests Firewall > Inter-LAN routing > Load- Balance/Route Policy > Static Route

Application Note How to use Load-Balance/Route Policy? –