Stateful Failover Technology White Paper

Size: px
Start display at page:

Download "Stateful Failover Technology White Paper"

Transcription

1 Stateful Failover Technology White Paper Keywords: Stateful failover, master/backup mode, load balancing mode, data synchronization, link switching Abstract: A firewall device is usually the access point of a network. Once the firewall fails, a single point of failure occurs and all the traffic will be interrupted. To avoid this, you can use the stateful failover feature to ensure continuous data transmission. This document describes the concepts, working mode, implementation and application scenarios of stateful failover. Acronyms: Acronym Full spelling ALG ASPF NAT VRRP OSPF Application Level Gateway Application Specific Packet Filter Network Address Translator Virtual Router Redundancy Protocol Open Shortest Path First Hangzhou H3C Technologies Co., Ltd. 1/15

2 Table of Contents 1 Overview Background Benefits Operating Modes of Stateful Failover Active/Standby Mode Load Balancing Mode Stateful Failover Implementation Data Synchronization Link Switchover Link Switchover Through VRRP Link Switchover Through Dynamic Routing Limitations Stateful Failover Technology Characteristics of H3C Application Scenarios Stateful Failover Configuration Example (Routing Mode + Active/Standby Mode) Stateful Failover Configuration Example (Routing Mode + Load Balancing Mode) Stateful Failover Configuration Example (Transparent Mode + Load Balancing Mode) References Hangzhou H3C Technologies Co., Ltd. 2/15

3 1 Overview 1.1 Background Continuous data transmission at key service entries and access points (such as the Internet access point of an enterprise or a database server of a bank) must be ensured. In Figure 1, only one firewall is deployed at the access point. If it fails, services between the internal and external networks will be interrupted. Figure 1 Network diagram for a single point failure To avoid such single point of failures, the traditional backup network solution deploys multiple devices (routers or forwarding devices only) at the access point for service backup and link switchover. Once the active device fails, traffic will switch to a standby device through VRRP or a dynamic routing protocol. In such a network, packets are forwarded based on the forwarding table; however, if stateful firewalls are deployed at the access point, packets need to match session entries before they can pass. Typically, the active firewall checks the first packet of a session, and then creates a session entry (including the source IP address/port number and destination IP address/port number of the packet) if it permits the packet to pass. Subsequent Hangzhou H3C Technologies Co., Ltd. 3/15

4 packets matching the session entry can pass through the firewall. After link switchover, the packets may not find the session entry on the standby device and thus cannot pass through the firewall. The stateful failover solution can solve the problem. In a stateful failover network, the firewall devices synchronize session information before link switchover. If the active device fails, service traffic is switched to the standby device to ensure session continuity. In Figure 2, two firewalls are deployed at the access point. If Firewall 1 fails, the service traffic is switched to Firewall 2. Because Firewall 2 has performed data synchronization with Firewall 1, the current service is not interrupted, and the network stability and reliability are improved. Internet Firewall 1 Firewall 2 Private network Subnet 1: /24 Subnet 2: /24 Figure 2 Network diagram for stateful failover Stateful failover can be regarded as a solution to solve single point failure by data synchronization and link switchover; it can also be regarded as a funtional module (because it only implements data synchronization) that can be configured through the web interface. This manual describes stateful failover from the first perspective. Hangzhou H3C Technologies Co., Ltd. 4/15

5 1.2 Benefits Compared with the traditional backup network solution, the stateful failover solution: Avoids service interruption upon a single point failure. Supports two operating modes (active/standby mode and load balancing mode) and two firewall working modes (routing mode and transparent mode), making the solution applicable to complicated network requirements. The routing mode indicates the firwall works as a Layer 3 device, and the transparent mode indicates the firwall works as a Layer 2 device on the network. 2 Operating Modes of Stateful Failover The stateful failover solution supports two operating modes, namely active/standby and load balancing. In the two modes, a device that forwards traffic is the active device, and a device that does not forward traffic is a standby device. 2.1 Active/Standby Mode If two firewalls are in the active/standby mode, one firewall acts as the active device, and the other firewall acts as the standby device. The active device processes all services and synchronizes session information to the standby device. The standby firewall serves as the backup and does not process services. In Figure 3, Firewall 1 processes all services and Firewall 2 is used for backup. When Firewall 1 fails, Firewall 2 takes over the services, as shown in Figure 4, thus ensuring the establishment of new sessions and the continuity of the current sessions. Hangzhou H3C Technologies Co., Ltd. 5/15

6 Trust zone Firewall 1 Session entries Firewall 2 Session entries Untrust zone Actual link DMZ zone Packet path Figure 3 Network diagram for sessions before Firewall 1 fails (in active/standby mode) Trust zone Firewall 1 Untrust zone Firewall 2 Session entries Actual link DMZ zone Packet path Figure 4 Network diagram for sessions after Firewall 1 fails (in active/standby mode) 2.2 Load Balancing Mode If two firewalls are in the load balancing mode, both devices are active to forward traffic and back up the session information of each other. In Figure 5, both Firewall 1 and Firewall 2 process traffic and serve as the backup of each other. When Firewall 1 Hangzhou H3C Technologies Co., Ltd. 6/15

7 fails, Firewall 2 takes over all services, as shown in Figure 4, thus ensuring the establishment of new sessions and the continuity of the current sessions. Trust zone Firewall 1 Session entries Untrust zone Firewall 2 Session entries Actual link DMZ zone Packet path Figure 5 Network diagram for sessions before Firewall 1 fails (in load balancing mode) 3 Stateful Failover Implementation 3.1 Data Synchronization A firewall maintains the information of each session. After the standby device takes over the services of the active device, it must have correct session information to process session packets; otherwise, session packets are discarded and sessions are terminated. Therefore, upon the establishment of new session entries or session entry changes, the active device needs to synchronize the information to the standby device for session information consistency. The information that a firewall can synchronize includes: session, NAT, ALG, ASPF, black list, H.323, SIP, ILS, RTSP, NBT, and SQLNET. The data synchronization method can be either of the following: Batch backup. After a firewall works for a period of time, a large number of session entries are generated. Then you can deploy another firewall and enable stateful failover on both firewalls. The session entries will be synchronized to Hangzhou H3C Technologies Co., Ltd. 7/15

8 the newly added device at one time. This process is called batch backup. Real-time backup. Upon the establishment of new session entries or session entry changes, the active firewall synchronizes session information to the standby device in real time for session information consistency. This process is called real-time backup. 3.2 Link Switchover The stateful failover solution uses VRRP or a dynamic routing protocol to implement link switchover Link Switchover Through VRRP You can configure a group of devices in a LAN as a VRRP group, which functions as a virtual device. Hosts in the LAN can communicate with other networks through the virtual device. In the VRRP group, only one device is active to forward packets, which is called the master; other devices are in standby state, which are called backups and are ready to take over services based on the device priorities. When the master fails, the device with the highest priority is elected as the new master and takes over services. Thus, a link switchover is completed and is totally transparent to users. Through network and VRRP configurations, you can implement the active/standby or load balancing mode of stateful failover. In the active/standby mode, only one VRRP group is required. The firewalls in the VRRP group have different priorities and the one with the highest priority is the master. As shown in Figure 6, create VRRP group 1 on Firewall 1 and Firewall 2, and configure a higher priority for Firewall 1. Configure the default gateway of Host A and Host B as the virtual IP address /24 of VRRP group 1. If Firewall 1 works normally, it forwards packets of Host A and Host B and Firewall 2 serves as backup in monitoring state; if Firewall 1 fails, Firewall 2 becomes the master and forwards packets of Host A and Host B. Hangzhou H3C Technologies Co., Ltd. 8/15

9 Public network Firewall 1 Firewall 2 Stateful failover link GE0/1 GE0/1 Master VRRP group 1 Virtual IP address: //24 Backup Private network Host A IP: /24 Gateway: Host B IP: /24 Gateway: Figure 6 Link switchover through VRRP (in active/standby mode) In the load balancing mode, two VRRP groups are required. One firewall serves as the master in VRRP group 1 and the other firewall serves as the master in VRRP group 2. As shown in Figure 7, create VRRP group 1 and VRRP group 2 on Firewall 1 and Firewall 2 respectively, and configure a higher priority for Firewall 1 in VRRP group 1 and a higher priority for Firewall 2 in VRRP group 2. Configure the default gateway of Host A as the virtual IP address /24 of VRRP group 1, and that of Host B as the virtual IP address /24 of VRRP group 2. If Firewall 1 works normally, it forwards packets of Host A and Firewall 2 forwards packets of Host B to implement load balancing. They serve as backups and monitor the state of each other. If Firewall 1 fails, Firewall 2 becomes the master in VRRP group 1 and forwards packets of Host A and Host B. Hangzhou H3C Technologies Co., Ltd. 9/15

10 Figure 7 Link switchover through VRRP (in load balancing mode) Link Switchover Through Dynamic Routing If devices A and B located on separate networks are reachable through multiple paths, the dynamic routing protocol selects an optimal path by route calculation. If the path fails, the routing protocol selects an optimal path from the rest of the paths, and the failed route is used after recovery. Thus, the connectivity between A and B is ensured. Through network and dynamic routing configurations, you can implement the active/standby or load balancing mode of stateful failover. (The following network diagram takes OSPF as example.) In the active/standby mode, one firewall is active and the other firewall is in the backup state. As shown in Figure 8, enable OSPF on Router A, Router B, Firewall 1 and Firewall 2, configure them to be in the same OSPF domain, and configure the cost value of Ethernet 1/1 to be greater than that of Ethernet 1/2 on both Router A and Router B. Then, the path Router A< >Firewall 1< >Router B has a higher priority than the path Router A< >Firewall 2< Hangzhou H3C Technologies Co., Ltd. 10/15

11 >Router B. If Firewall 1 works normally, packets from the private network are forwarded by Firewall 1 to the Internet; if Firewall 1 fails, packets from the private network are forwarded by Firewall 2 to the Internet. In the active/standby mode, both firewalls are active and serve as the backup of each other. As shown in Figure 8, enable OSPF on Router A, Router B, Firewall 1 and Firewall 2, configure them to be in the same OSPF domain, and configure Router A and Router B to support at least two equal-cost routes. Because the path Router A< >Firewall 1< >Router B has the same priority as the path Router A< >Firewall 2< >Router B, packets from the private network are forwarded by both Firewall 1 and Firewall 2 to the Internet; if Firewall 1 fails, packets from the private network are forwarded by Firewall 2 to the Internet. Internet OSPF Eth1/1 Router A Eth1/2 Firewall 1 Firewall 2 Eth1/1 Eth1/2 Router B Private network Figure 8 Link switchover through OSPF 3.3 Limitations Stateful failover supports only two devices. The hardware configuration and software version must be consistent on the two devices, and the interface cards on the corresponding slot must be consistent; otherwise, the device may fail to recognize or fail to find related physical resources of the information backed up from the other device, resulting in Hangzhou H3C Technologies Co., Ltd. 11/15

12 packet forwarding error or failure after link switchover. Stateful failover supports data synchronization only and does not support configuration synchronization. Therefore, if you make some configurations (such as interface type, VLAN that permitted to pass the interface) on one device, you need to make the same configurations on the other device. 4 Stateful Failover Technology Characteristics of H3C Stateful failover backs up only session information to ensure session continuity after link switchover. Link switchover is implemented by using traditional backup technologies (such as VRRP and dynamic routing protocols), which are flexible in application and adaptable to various network environments. Stateful failover backs up session information through dedicated interfaces that are not used for forwarding, thus featuring high reliability and performance. 5 Application Scenarios 5.1 Stateful Failover Configuration Example (Routing Mode + Active/Standby Mode) As shown in Figure 9, Firewall and Firewall 2 are deployed at the access point between the private network and public network, and are working in routing mode. It is required that: If Firewall 1 works normally, Host A and Host B access Server 1 through Firewall 1; if Firewall 1 fails, Host A and Host B access Server 1 through Firewall 2 and the ongoing sessions between Host A and Server 1, Host B and Server 1 are not interrupted. To meet the requirement, you can configure VRRP group 1 for monitoring the down links and VRRP group 2 for monitoring the uplinks on Firewall 1 and Firewall 2, and enable data synchronization between the two firewalls. Hangzhou H3C Technologies Co., Ltd. 12/15

13 Server 1 IP: /24 Gateway: /24 L2 switch A / /24 Firewall 1 Stateful failover link Firewall 2 GE0/1 GE0/1 GE1/ /24 Master Master VRRP group 2 Virtual IP address: //24 VRRP group 1 Virtual IP address: //24 Backup GE1/ /24 Backup L2 switch B L2 switch C Host A IP: /24 Gateway: Host B IP: /24 Gateway: Figure 9 Network diagram for stateful failover (implementing link switchover through VRRP) 5.2 Stateful Failover Configuration Example (Routing Mode + Load Balancing Mode) As shown in Figure 10, Firewall 1 and Firewall 2 are deployed at the access point between the private network and public network, and are working in routing mode. It is required that: If Firewall 1 works normally, Host A accesses Server 1 through Firewall 1 and Host B accesses Server 1 through Firewall 2 for load balancing; if Firewall 1 fails, Host A and Host B access Server 1 through Firewall 2 and the ongoing sessions between Host A and Server 1, Host B and Server 1 are not interrupted. To meet the requirement, you can configure OSPF on Router A, Router B, Router C, Router D, Firewall 1 and Firewall 2, and enable data synchronization between the two firewalls. Hangzhou H3C Technologies Co., Ltd. 13/15

14 Server / /24 OSPF Router C /24 GE1/ /16 GE1/ /24 GE1/ / /24 Router D GE1/ /16 GE1/1 GE1/ / /16 Firewall 1 Stateful failover link Firewall / / /24 Router A GE1/ / /24 Router B GE1/ / / /24 Host A Host B Figure 10 Network diagram for stateful failover (routing mode + load balancing mode) 5.3 Stateful Failover Configuration Example (Transparent Mode + Load Balancing Mode) As shown in Figure 11, Firewall and Firewall 2 are deployed at the access point between the private network and public network, and are working in transparent mode (Layer 2 mode). It is required that: If Firewall 1 works normally, Host A accesses Server 1 through Firewall 1 and Host B accesses Server 1 through Firewall 2 for load balancing; if Firewall 1 fails, Host A and Host B access Server 1 through Firewall 2 and the ongoing sessions between Host A and Server 1, Host B and Sever 1 are not interrupted. To meet the requirement, you can configure VRRP group 1 and VRRP group 2 (both for load balancing and monitoring the down link) on Router A and Router B, and Hangzhou H3C Technologies Co., Ltd. 14/15

15 enable data synchronization between Firewall 1 and Firewall 2. Server 1 IP: /24 L2 switch C Route A Route B Backup VRRP group 2 Virtual IP address: //24 Master Master VRRP group 1 Virtual IP address: //24 Backup Firewall 1 Firewall 2 GE0/1 Stateful failover link GE0/1 L2 switch A L2 switch B Host A IP: /24 Gateway: Host B IP: /24 Gateway: Figure 11 Network diagram for stateful failover (transparent mode + load balancing mode) 6 References Stateful Failover Configuration Examples Copyright 2008 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd. The information in this document is subject to change without notice. Hangzhou H3C Technologies Co., Ltd. 15/15

SecBlade Firewall Cards Stateful Failover Configuration Examples

SecBlade Firewall Cards Stateful Failover Configuration Examples SecBlade Firewall Cards Stateful Failover Configuration Examples Keywords: Stateful failover, active/standby mode, active/active mode, data synchronization, traffic switchover Abstract: A network that

More information

SecBlade Firewall Cards NAT Configuration Examples

SecBlade Firewall Cards NAT Configuration Examples SecBlade Firewall Cards NAT Configuration Examples Keywords: NAT, PAT, private IP address, public IP address, IP address pool Abstract: This document describes the characteristics, applications scenarios,

More information

SecBlade Firewall Cards ARP Attack Protection Configuration Examples

SecBlade Firewall Cards ARP Attack Protection Configuration Examples SecBlade Firewall Cards ARP Attack Protection Configuration Examples Keywords: ARP Abstract: ARP provides no security mechanism and can be easily utilized by attackers to launch attacks. The device provides

More information

Isolate-User-VLAN Technology White Paper

Isolate-User-VLAN Technology White Paper Isolate-User-VLAN Technology White Paper Keywords: Isolate-user-VLANs, secondary VLANs Abstract: Isolate-user-VLAN adopts a two-tier VLAN structure: an upper level isolate-user-vlan and multiple lower-level

More information

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or

More information

SecBlade Firewall Cards Attack Protection Configuration Example

SecBlade Firewall Cards Attack Protection Configuration Example SecBlade Firewall Cards Attack Protection Configuration Example Keywords: Attack protection, scanning, blacklist Abstract: This document describes the attack protection functions of the SecBlade firewall

More information

H3C Firewall and UTM Devices Log Management with IMC Firewall Manager Configuration Examples (Comware V5)

H3C Firewall and UTM Devices Log Management with IMC Firewall Manager Configuration Examples (Comware V5) H3C Firewall and UTM Devices Log Management with IMC Firewall Manager Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual

More information

SecPath Series Firewalls Virtual Firewall Configuration Examples

SecPath Series Firewalls Virtual Firewall Configuration Examples SecPath Series Firewalls Virtual Firewall Configuration Examples Keywords: VPN instance, VRF, private address, public address, address pool Abstract: This document describes the virtual firewall implementation

More information

H3C SecPath Series High-End Firewalls

H3C SecPath Series High-End Firewalls H3C SecPath Series High-End Firewalls NAT and ALG Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATH1000FE&SECBLADEII-CMW520-R3166 SECPATH5000FA-CMW520-R3206

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

HP VPN Firewall Appliances

HP VPN Firewall Appliances HP VPN Firewall Appliances High Availability Configuration Guide Part number: 5998-4169 Software version: F1000-A-EI/F1000-S-EI (Feature 3726) F1000-E (Release 3177) F5000 (Feature 3211) F5000-S/F5000-C

More information

SYN Flood Attack Protection Technology White Paper

SYN Flood Attack Protection Technology White Paper Flood Attack Protection Technology White Paper Flood Attack Protection Technology White Paper Keywords: flood, Cookie, Safe Reset Abstract: This document describes the technologies and measures provided

More information

NAT Box-to-Box High-Availability Support

NAT Box-to-Box High-Availability Support The feature enables network-wide protection by making an IP network more resilient to potential link and router failures at the Network Address Translation (NAT) border. NAT box-to-box high-availability

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module High Availability Configuration Guide Part number: 5998-2687 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company,

More information

H3C SecPath Series High-End Firewalls

H3C SecPath Series High-End Firewalls H3C SecPath Series High-End Firewalls NAT and ALG Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATHF1000SAI&F1000AEI&F1000ESI-CMW520-R3721 SECPATH5000FA-CMW520-F3210

More information

Zone-Based Policy Firewall High Availability

Zone-Based Policy Firewall High Availability The feature enables you to configure pairs of devices to act as backup for each other. High availability can be configured to determine the active device based on a number of failover conditions. When

More information

VRRP (Virtual Router Redundancy Protocol) Function Added

VRRP (Virtual Router Redundancy Protocol) Function Added VRRP (Virtual Router Redundancy Protocol) Function Added Category S/W Release Version Date General 7.01 22 Dec. 2003 Function Description This protocol ties a number of routers as a group and assigns one

More information

IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance

IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance IPv4 Firewall Rule configuration on Cisco SA540 Security Appliance Objective The objective of this document to explain how to configure IPv4 firewall rules on Cisco SA540 Security Appliance. Firewall provide

More information

M2M CDMA Router. VRRP Configuration Guide

M2M CDMA Router. VRRP Configuration Guide M2M CDMA Router VRRP Configuration Guide Copyright Copyright 2013 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless. No part of this document

More information

H3C Firewall Devices. High Availability Configuration Guide (Comware V7) Hangzhou H3C Technologies Co., Ltd.

H3C Firewall Devices. High Availability Configuration Guide (Comware V7) Hangzhou H3C Technologies Co., Ltd. H3C Firewall Devices High Availability Configuration Guide (Comware V7) Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: F5020/F5040 firewalls M9006/M9010/M9014 security gateways

More information

Operation Manual VRRP. Table of Contents

Operation Manual VRRP. Table of Contents Table of Contents Table of Contents... 1-1 1.1 Introduction to VRRP... 1-1 1.2 Configuring VRRP... 1-2 1.2.1 Configuring the Function of Pinging the Virtual IP Address... 1-3 1.2.2 Configuring the TTL

More information

Virtual Router Redundancy Protocol (VRRP) Technical Support Guide

Virtual Router Redundancy Protocol (VRRP) Technical Support Guide Virtual Router Redundancy Protocol (VRRP) Technical Support Guide Copyright Copyright 2015 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless.

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

H3C SecPath Series High-End Firewalls

H3C SecPath Series High-End Firewalls H3C SecPath Series High-End Firewalls NAT and ALG Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: SECPATH1000FE&SECBLADEII-CMW520-R3166 SECPATH5000FA-CMW520-R3206

More information

S Series Switch. Cisco HSRP Replacement. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

S Series Switch. Cisco HSRP Replacement. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. Cisco HSRP Replacement Issue 01 Date 2013-08-05 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior

More information

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls NAT Configuration Guide Part number:5998-2649 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,

More information

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Internetwork Expert s CCNP Bootcamp. Gateway Redundancy Protocols & High Availability. What is High Availability?

Internetwork Expert s CCNP Bootcamp. Gateway Redundancy Protocols & High Availability. What is High Availability? Internetwork Expert s CCNP Bootcamp Gateway Redundancy Protocols & High Availability http:// What is High Availability? Ability of the network to recover from faults in timely fashion Service availability

More information

WLAN high availability

WLAN high availability Technical white paper WLAN high availability Table of contents Overview... 2 WLAN high availability implementation... 3 Fundamental high availability technologies... 3 AP connection priority... 3 AC selection...

More information

MAC-Based VLAN Technology White Paper

MAC-Based VLAN Technology White Paper MAC-Based VLAN Technology White Paper Keywords: MAC-based VLAN, 802.1X, MAC address authentication Abstract: As a way of grouping VLAN members, MAC address-based VLAN (MAC-based VLAN) decides the VLAN

More information

Multimax Redundancy with VRRP Maxon Guide

Multimax Redundancy with VRRP Maxon Guide Multimax Redundancy with VRRP Maxon Guide Page 1 Version 1.0 May 2014 C ONTACT I NFORMATION In keeping with Maxon's dedicated customer support policy, we encourage you to contact us. TECHNICAL: Hours of

More information

SecBlade Firewall Cards Log Management and SecCenter Configuration Example

SecBlade Firewall Cards Log Management and SecCenter Configuration Example SecBlade Firewall Cards Log Management and SecCenter Configuration Example Keywords: Syslog Abstract: This document describes the log management function of SecBlade firewall cards, and presents configuration

More information

Network-Level High Availability

Network-Level High Availability This chapter describes Cisco NX-OS network high availability and includes the following sections: Information About, page 1 Licensing Requirements, page 2 Spanning Tree Protocol, page 2 Virtual Port Channels,

More information

H3C S5830V2 & S5820V2 Switch Series

H3C S5830V2 & S5820V2 Switch Series H3C S5830V2 & S5820V2 Switch Series High Availability Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release2108 Document version: 6W101-20120531 Copyright

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls NAT and ALG Command Reference Part number: 5998-2639 Software version: F1000-E/Firewall module: R3166 F5000-A5: R3206 Document version: 6PW101-20120706 Legal and notice information

More information

Configuring VIP and Virtual Interface Redundancy

Configuring VIP and Virtual Interface Redundancy CHAPTER 6 Configuring VIP and Virtual Interface Redundancy This chapter describes how to plan for and configure virtual IP (VIP) redundancy and virtual interface redundancy on the CSS. Information in this

More information

H3C SecPath UTM Series. Configuration Examples. Hangzhou H3C Technologies Co., Ltd. Manual Version: 5W

H3C SecPath UTM Series. Configuration Examples. Hangzhou H3C Technologies Co., Ltd.  Manual Version: 5W H3C SecPath UTM Series Configuration Examples Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Manual Version: 5W101-20100520 Copyright 2009-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors

More information

L2 MPLS VPN (VPLS) Technology White Paper

L2 MPLS VPN (VPLS) Technology White Paper S9500 L2 MPLS VPN (VPLS) Technology White Paper L2 MPLS VPN (VPLS) Technology White Paper Keywords: MPLS, VPLS Abstract: MPLS technologies make it very easy to provide VPN services based on IP technologies

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring SRX Chassis Clusters for High Availability Modified: 2018-09-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by

More information

Hot Standby Router Protocol (HSRP): Frequently Asked Questions

Hot Standby Router Protocol (HSRP): Frequently Asked Questions Hot Standby Router Protocol (HSRP): Frequently Asked Questions Document ID: 9281 Contents Introduction Will the standby router take over if the active router LAN interface state is "interface up line protocol

More information

IPv6 ND Configuration Example

IPv6 ND Configuration Example IPv6 ND Configuration Example Keywords: IPv6 ND Abstract: This document describes the application environment and typical configuration of IPv6 ND. Acronyms: Acronym Full spelling ARP FIB Address Resolution

More information

Accurate study guides, High passing rate! IT TEST BOOK QUESTION & ANSWER. Ittestbook provides update free of charge in one year!

Accurate study guides, High passing rate! IT TEST BOOK QUESTION & ANSWER. Ittestbook provides update free of charge in one year! IT TEST BOOK QUESTION & ANSWER Ittestbook provides update free of charge in one year! Accurate study guides, High passing rate! Exam : HC-224-ENU Title : Huawei Certified Datacom Professional - Fast Certification

More information

PPPoE Technology White Paper

PPPoE Technology White Paper PPPoE Technology White Paper Keywords: PPP, Ethernet, PPPoE Abstract: Point-to-Point Protocol over Ethernet (PPPoE) provides access to the Internet for hosts on an Ethernet through a remote access device

More information

PIX/ASA/FWSM Platform User Interface Reference

PIX/ASA/FWSM Platform User Interface Reference CHAPTER 50 PIX/ASA/FWSM Platform User Interface Reference The following topics describe the options available for configuring and managing security services and policies for PIX firewalls, Firewall Services

More information

Completing Interface Configuration (Transparent Mode)

Completing Interface Configuration (Transparent Mode) CHAPTER 9 Completing Interface Configuration (Transparent Mode) This chapter includes tasks to complete the interface configuration for all models in transparent firewall mode. This chapter includes the

More information

H3C AR18 Series Branch Access Routers Introduction. Date: Security Level: Normal H3C Technologies Co., Limited.

H3C AR18 Series Branch Access Routers Introduction. Date: Security Level: Normal H3C Technologies Co., Limited. H3C AR18 Series Branch Access Routers Introduction Date: 2007-04-10 Security Level: Normal H3C Technologies Co., Limited. Agenda Overview Product Introduction Competitor Analysis Typical Solution Router

More information

SD-WAN Deployment Guide (CVD)

SD-WAN Deployment Guide (CVD) SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces

More information

User FAQ for H3C Security Products

User FAQ for H3C Security Products User FAQ for H3C Security Products Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior

More information

Configuring Stateful Interchassis Redundancy

Configuring Stateful Interchassis Redundancy The Stateful Interchassis Redundancy feature enables you to configure pairs of devices to act as backups for each other. This module describes conceptual information about and tasks for configuring stateful

More information

The information in this document is based on the Cisco VPN 3000 Series Concentrator.

The information in this document is based on the Cisco VPN 3000 Series Concentrator. What Is VRRP? Document ID: 7210 Contents Introduction Prerequisites Requirements Components Used Conventions How Does the VPN 3000 Concentrator Implement VRRP? Configure VRRP Synchronize the Configurations

More information

Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3

Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3 Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3 Introduction Preparing the 3.2.X system for the upgrade Installing the BIG-IP version 9.2.3 software Licensing the software using

More information

Network Configuration Guide

Network Configuration Guide Cloud VoIP Network Configuration PURPOSE This document outlines the recommended VoIP configuration settings for customer provided Firewalls and internet bandwidth requirements to support Mitel phones.

More information

CyberP3i Course Module Series

CyberP3i Course Module Series CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls

More information

ITDumpsKR. IT 인증시험한방에패스시키는최신버전시험대비덤프

ITDumpsKR.   IT 인증시험한방에패스시키는최신버전시험대비덤프 ITDumpsKR http://www.itdumpskr.com IT 인증시험한방에패스시키는최신버전시험대비덤프 Exam : 300-115 Title : Implementing Cisco IP Switched Networks Vendor : Cisco Version : DEMO Get Latest & Valid 300-115 Exam's Question and

More information

WiNG 5.x How-To Guide

WiNG 5.x How-To Guide WiNG 5.x How-To Guide Tunneling Remote Traffic using L2TPv3 Part No. TME-08-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola

More information

H3C S12500 VLAN Configuration examples

H3C S12500 VLAN Configuration examples H3C S12500 VLAN Configuration examples Copyright 2014 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without

More information

Configuring NAT for High Availability

Configuring NAT for High Availability Configuring NAT for High Availability Last Updated: December 18, 2011 This module contains procedures for configuring Network Address Translation (NAT) to support the increasing need for highly resilient

More information

F5 Networks F5LTM12: F5 Networks Configuring BIG-IP LTM: Local Traffic Manager. Upcoming Dates. Course Description. Course Outline

F5 Networks F5LTM12: F5 Networks Configuring BIG-IP LTM: Local Traffic Manager. Upcoming Dates. Course Description. Course Outline F5 Networks F5LTM12: F5 Networks Configuring BIG-IP LTM: Local Traffic Manager This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring a Two-Tiered Virtualized Data Center for Large Enterprise Networks Release NCE 33 Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California

More information

Pass-Through Technology

Pass-Through Technology CHAPTER 3 This chapter provides best design practices for deploying blade servers using pass-through technology within the Cisco Data Center Networking Architecture, describes blade server architecture,

More information

H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5)

H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5) H3C Firewall and UTM Devices L2TP VPN Virtual Firewall Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced

More information

PKI Configuration Examples

PKI Configuration Examples PKI Configuration Examples Keywords: PKI, CA, RA, IKE, IPsec, SSL Abstract: The Public Key Infrastructure (PKI) is a general security infrastructure for providing information security through public key

More information

MSTP Technology White Paper

MSTP Technology White Paper MSTP Technology White Paper Key words: STP, RSTP, MSTP, rapid transition, multiple instances, redundancy loop, redundancy link, load sharing Abstract: This article introduces basic MSTP terms, MSTP algorithm

More information

Transient Traffic Interruption on Ports Due to Source MAC Address Attacks Troubleshooting. Table of Contents

Transient Traffic Interruption on Ports Due to Source MAC Address Attacks Troubleshooting. Table of Contents Table of Contents Chapter 1 Transient Traffic Interruption on Ports Due to Source MAC Address Attacks Troubleshooting... 1-1 1.1 Symptom... 1-1 1.2 Related Information... 1-1 1.3 Diagnosis... 1-2 1.4 Troubleshooting...

More information

H

H H12-721 Number: H12-721 Passing Score: 800 Time Limit: 120 min File Version: 1.0 Exam A QUESTION 1 The main method of caching servers DNS Request Flood defense is the use of DNS source authentication.

More information

Integrating WX WAN Optimization with Netscreen Firewall/VPN

Integrating WX WAN Optimization with Netscreen Firewall/VPN Application Note Integrating WX WAN Optimization with Netscreen Firewall/VPN Joint Solution for Firewall/VPN and WX Platforms Alan Sardella Portfolio Marketing Choh Mun Kok and Jaymin Patel Lab Configuration

More information

HP0-Y12. Building ProCurve Resilient, Adaptive Networks. Download Full Version :

HP0-Y12. Building ProCurve Resilient, Adaptive Networks. Download Full Version : HP HP0-Y12 Building ProCurve Resilient, Adaptive Networks Download Full Version : https://killexams.com/pass4sure/exam-detail/hp0-y12 QUESTION: 106 The output of show ip ospf link-state on a ProCurve Switch

More information

Routing Overview. Information About Routing CHAPTER

Routing Overview. Information About Routing CHAPTER 21 CHAPTER This chapter describes underlying concepts of how routing behaves within the ASA, and the routing protocols that are supported. This chapter includes the following sections: Information About

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

HP Firewalls and UTM Devices

HP Firewalls and UTM Devices HP Firewalls and UTM Devices NAT and ALG Configuration Guide Part number: 5998-4166 Software version: F1000-A-EI: Feature 3722 F1000-S-EI: Feature 3722 F5000: Feature 3211 F1000-E: Feature 3174 Firewall

More information

Configuring High Availability (HA)

Configuring High Availability (HA) 4 CHAPTER This chapter covers the following topics: Adding High Availability Cisco NAC Appliance To Your Network, page 4-1 Installing a Clean Access Manager High Availability Pair, page 4-3 Installing

More information

Configuring a Cluster in IPSO 5 with Both Members in Active Mode

Configuring a Cluster in IPSO 5 with Both Members in Active Mode Configuring a Cluster in IPSO 5 with Both Members in Active Mode In This Document Configuring a VSX Cluster Member page 1 Configuring the Link Aggregation Group (LAG) page 5 Active Active Mode VRRP Configuration

More information

Configuring the EN-2000 for its Network Functions

Configuring the EN-2000 for its Network Functions EN-2000 Reference Manual Document 3 Configuring the EN-2000 for its Network Functions T he EN-2000 provides wireless and cabled connections to a local area network (LAN), to a wide area network (WAN, and

More information

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER CHAPTER 23 You can configure Generic Routing Encapsulation (GRE) and Dynamic Multipoint (DM) VPNs that include GRE mode configurations. You can configure IPsec GRE VPNs for hub-and-spoke, point-to-point,

More information

Configuring Box-to-Box Redundancy

Configuring Box-to-Box Redundancy CHAPTER 3 This chapter describes how to configure redundancy between two identically configured Cisco Content Services Switches (CSSs). Information in this chapter applies to all CSS models, except where

More information

High Availability Options

High Availability Options , on page 1 Load Balancing, on page 2 Distributed VPN Clustering, Load balancing and Failover are high-availability features that function differently and have different requirements. In some circumstances

More information

Network Migration Strategies

Network Migration Strategies Vaishali Nagpure BE, Industrial Electronics, Pune University, Maharashtra, India Network Migration Strategies Abstract - Technology is always changing and providing new solutions to address current as

More information

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Enabling ALGs and AICs in Zone-Based Policy Firewalls Enabling ALGs and AICs in Zone-Based Policy Firewalls Zone-based policy firewalls support Layer 7 application protocol inspection along with application-level gateways (ALGs) and application inspection

More information

Layer 4 to Layer 7 Design

Layer 4 to Layer 7 Design Service Graphs and Layer 4 to Layer 7 Services Integration, page 1 Firewall Service Graphs, page 5 Service Node Failover, page 10 Service Graphs with Multiple Consumers and Providers, page 12 Reusing a

More information

User Guide Managed VPN Router

User Guide Managed VPN Router The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Wireless Maingate AB shall have no liability for any error or damages

More information

Routing Overview for Firepower Threat Defense

Routing Overview for Firepower Threat Defense Path Determination This chapter describes underlying concepts of how routing behaves within the Cisco Firepower Threat Defense, and the routing protocols that are supported. Routing is the act of moving

More information

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Enabling ALGs and AICs in Zone-Based Policy Firewalls Enabling ALGs and AICs in Zone-Based Policy Firewalls Zone-based policy firewalls support Layer 7 application protocol inspection along with application-level gateways (ALGs) and application inspection

More information

Sun RPC ALG Support for Firewalls and NAT

Sun RPC ALG Support for Firewalls and NAT The feature adds support for the Sun Microsystems remote-procedure call (RPC) application-level gateway (ALG) on the firewall and Network Address Translation (NAT). Sun RPC is an application layer protocol

More information

Sun RPC ALG Support for Firewalls and NAT

Sun RPC ALG Support for Firewalls and NAT The feature adds support for the Sun Microsystems remote-procedure call (RPC) application-level gateway (ALG) on the firewall and Network Address Translation (NAT). Sun RPC is an application layer protocol

More information

J-series High Availability

J-series High Availability Application Note J-series High Availability Configuring and Deploying the J-series Chassis Cluster Feature Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000

More information

Sample excerpt. HP ProCurve Threat Management Services zl Module NPI Technical Training. NPI Technical Training Version: 1.

Sample excerpt. HP ProCurve Threat Management Services zl Module NPI Technical Training. NPI Technical Training Version: 1. HP ProCurve Threat Management Services zl Module NPI Technical Training NPI Technical Training Version: 1.00 5 January 2009 2009 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

HPE FlexFabric 12900E & 12900

HPE FlexFabric 12900E & 12900 HPE FlexFabric 12900E & 12900 IRF Configuration Guide Part number: 5998-8351s Software version: Release 1135 and later Document version: 6W102-20151124 Copyright 2015 Hewlett Packard Enterprise Development

More information

Configuring ARP. Prerequisites for Configuring ARP. Restrictions for Configuring ARP

Configuring ARP. Prerequisites for Configuring ARP. Restrictions for Configuring ARP Address resolution is the process of mapping network addresses to Media Access Control (MAC) addresses. This process is accomplished using the Address Resolution Protocol (ARP). This module describes how

More information

BRANCH SRX SERIES AND J SERIES CHASSIS CLUSTERING

BRANCH SRX SERIES AND J SERIES CHASSIS CLUSTERING APPLICATION NOTE BRANCH SRX SERIES AND J SERIES CHASSIS CLUSTERING Configuring Chassis Clusters on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2012, Juniper Networks, Inc.

More information

H3C SecPath Series Firewalls and UTM Devices

H3C SecPath Series Firewalls and UTM Devices H3C SecPath Series Firewalls and UTM Devices High Availability Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: F100 series: ESS 5132 F1000-A-EI: Feature 3722

More information

Cisco CISCO Interconnecting Cisco Networking Devices Exam (ICND) Practice Test. Version

Cisco CISCO Interconnecting Cisco Networking Devices Exam (ICND) Practice Test. Version Cisco 640-811 CISCO 640-811 Interconnecting Cisco Networking Devices Exam (ICND) Practice Test Version 1.3 QUESTION NO: 1 Cisco 640-811: Practice Exam What is the purpose of the OSPF router ID in a DR/BDR

More information

HSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network

HSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal www.computerscijournal.org ISSN: 0974-6471 December 2011, Vol. 4, No. (2): Pgs. 399-404

More information

ARP attack protection commands

ARP attack protection commands Contents ARP attack protection commands 1 Unresolvable IP attack protection commands 1 arp resolving-route enable 1 arp source-suppression enable 1 arp source-suppression limit 2 display arp source-suppression

More information

Configuring Auto-Anchor Mobility

Configuring Auto-Anchor Mobility Information About Auto-Anchor Mobility, page 1 Guest Anchor Priority, page 5 Information About Auto-Anchor Mobility You can use auto-anchor mobility (also called guest tunneling) to improve load balancing

More information

MikroTik RouterOS Training. Routing. Schedule. Instructors. Housekeeping. Introduce Yourself. Course Objective 7/4/ :00 10:30 Morning Session I

MikroTik RouterOS Training. Routing. Schedule. Instructors. Housekeeping. Introduce Yourself. Course Objective 7/4/ :00 10:30 Morning Session I MikroTik RouterOS Training Routing Schedule 09:00 10:30 Morning Session I 10:30 11:00 Morning Break 11:00 12:30 Morning Session II 12:30 13:30 Lunch Break 13:30 15:00 Afternoon Session I 15:00 15:30 Afternoon

More information

Transparent or Routed Firewall Mode

Transparent or Routed Firewall Mode This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. You can set the firewall mode independently for each context in multiple

More information

vcloud Director Tenant Portal Guide vcloud Director 8.20

vcloud Director Tenant Portal Guide vcloud Director 8.20 vcloud Director Tenant Portal Guide vcloud Director 8.20 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information