Network Router User Manual
Web OS 10.0 Application Guide
22
Preface
212777-A, February 2002
n Chapter 5, “Secure Switch Management,” describes how to manage the switch using spe-
cific IP addresses, RADIUS authentication, Secure Shell (SSH), and Secure Copy (SCP).
Part 2: Web Switching Fundamentals
n Chapter 6, “Server Load Balancing,” describes how to configure the Web switch to bal-
ance network traffic among a pool of available servers for more efficient, robust, and scal-
able network services.
n Chapter 7, “Filtering,” describes how to configure and optimize network traffic filters for
security and Network Address Translation purposes.
n Chapter 8, “Application Redirection,” describes how to use filters for redirecting traffic to
such network streamlining devices as Web caches.
n Chapter 9, “Virtual Matrix Architecture,” describes how to optimize system resources by
distributing the workload to multiple processors.
n Chapter 10, “Health Checking,” describes how to configure the Web switch to recognize
the availability of the various network resources used with the various load-balancing and
application redirection features.
n Chapter 11, “High Availability,” describes how to use the Virtual Router Redundancy Pro-
tocol (VRRP) to ensure that network resources remain available if one Web switch fails.
Part 3: Advanced Web Switching
n Chapter 12, “Global Server Load Balancing,” describes configuring Server Load Balanc-
ing across multiple geographic sites.
n Chapter 13, “Firewall Load Balancing,” describes how to combine features to provide a
scalable solution for load balancing multiple firewalls.
n Chapter 14, “Virtual Private Network Load Balancing,” describes using your Web switch
to load balance secure point-to-point links.
n Chapter 15, “Content Intelligent Switching,” describes how to perform load balancing and
application redirection based on Layer 7 packet content information (such as URL, HTTP
Header, browser type, and cookies).
n Chapter 16, “Persistence,” describes how to ensure that all connections from a specific cli-
ent session reach the same server. Persistence can be based on cookies or SSL session ID.
n Chapter 17, “Bandwidth Management,” describes how to configure the Web switch for
allocating specific portions of the available bandwidth for specific users or applications.