You are on page 1of 169

C o u r s e Co d e : 200 - 1 01

L i n kP r o o f L e ve l 1
T r a i n i n g M an u al
October 2010

North America
Radware Inc.
575 Corporate Dr. Suite 205
Mahwah, NJ 07430
Tel 888 234 5763
International
Radware Ltd.
22 Raoul Wallenberg St.
Tel Aviv 69710, Israel
Tel 972 3 766 8655

www.radware.com

-2-

LinkProof Training Manual Level 1


Date: October 2010
Page - 2 -

This document is protected by United States and International copyright laws. Neither
this document nor any material contained within it may be duplicated, copied or
reproduced, in whole or part, without the expressed written consent of Radware, Inc.
The features and functions of Radware devices discussed in this document are based on
the following firmware version.
Product

Version

LinkProof

6.12.xx (ODS hardware)

If your Radware device is running an older version of firmware some of the features and
implementations discussed in this manual may not be available.
To upgrade your existing Radware device, please contact your Radware sales person.
Conventions
The following font conventions are used in this manual:

Bold indicates the series of menu items in Web Based Management used to
reach a particular screen or window

Underline indicates an option or entry within Web Based Management screen


or window

Italics indicates the value or setting supplied in a window or screen

Courier indicates CLI or telnet commands

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

-3-

LinkProof Training Manual Level 1


Date: October 2010
Page - 3 -

Table of Contents
LINKPROOF LAB CONFIGURATION ............................................................................................................ 5
CHAPTER 1 LINKPROOF OVERVIEW ........................................................................................................ 7

INITIAL CONFIGURATION FOR LINKPROOF ................................................................................................ 9


LINKPROOF LAB 1 - LINKPROOF INITIAL CONFIGURATION..........................................................................10
CHAPTER 1 REVIEW: ..............................................................................................................................18

CHAPTER 2 BASIC FARM CONFIGURATION FOR THE LINKPROOF ....................................................19

LINKPROOF LAB 2 CREATING A FARM AND ROUTER SERVERS (USING CLI) ...............................25
LINKPROOF CHAPTER 2 REVIEW .............................................................................................................31

CHAPTER 3 DEVICE MANAGEMENT FOR LINKPROOF .........................................................................32

SERVER PRIORITY..................................................................................................................................32
RECOVERY TIME ...................................................................................................................................32
WARM UP TIME ....................................................................................................................................32
CONNECTION LIMITS .............................................................................................................................32
TRAFFIC LIMITS .....................................................................................................................................33
NHR OPERATIONAL MODE....................................................................................................................33
CLIENT MANAGEMENT ..........................................................................................................................33
CLIENT AGING TIME AND AGING BY PORT.................................................................................................34
HEALTH CHECKING AND FULL PATH HEALTH MONITORING .......................................................................34
LINKPROOF LAB 3A ROUTER MANAGEMENT FOR LINKPROOF (USING CLI) ..............................................37
LINKPROOF LAB 3B CONNECTIVITY CHECKS AND HEALTH MONITORING (USING CLI) ................................40
CONNECTIVITY CHECKS LAB: ............................................................................................................40
HEALTH MONITORING LAB ................................................................................................................41
CHAPTER 3 REVIEW: ..............................................................................................................................46

CHAPTER 4 FLOW POLICIES ..............................................................................................................47

FLOW POLICIES...................................................................................................................................47
LINKPROOF LAB 4 FLOW POLICIES (USING CLI) .....................................................................................52

LINKPROOF PRACTICAL EXERCISE #1 ......................................................................................................59


CHAPTER 5 LINKPROOF INBOUND LOAD-BALANCING .......................................................................60

PROXIMITY SETTINGS ............................................................................................................................61


SELECTIVE PROXIMITY CHECKS...............................................................................................................64
LINKPROOF LAB 5 INBOUND LOAD BALANCING AND PROXIMITY (USING CLI) ...........................................67
CHAPTER 5 REVIEW: ...........................................................................................................................71

CHAPTER 6 LINKPROOF REDUNDANCY ...........................................................................................73

VRRP REDUNDANCY .........................................................................................................................73


CONFIGURATION.................................................................................................................................73
TABLE MIRRORING .............................................................................................................................74

LINKPROOF LAB 6 VRRP REDUNDANCY (USING CLI) ...............................................................75

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

-4-

LinkProof Training Manual Level 1


Date: October 2010
Page - 4 -

CHAPTER 7 ONE IP CONFIGURATION .......................................................................................................81

LINKPROOF LAB 7 ONE IP CONFIGURATION (USING CLI) ........................................................................82

LINKPROOF MANAGEMENT .......................................................................................................................84


LINKPROOF LAB 8 MANAGING THE LINKPROOF (USING CLI) ...........................................................................84
BANDWIDTH MANAGEMENT ................................................................................................................92
LINKPROOF LAB 9 BANDWIDTH MANAGEMENT ON THE LINKPROOF (USING CLI)94

LAB A BANDWIDTH MANAGEMENT SETUP ....................................................................................94


LAB B CREATING A SIMPLE BLOCK POLICY IN BWM ....................................................................97
LAB C CREATING A SIMPLE MINIMUM AND MAXIMUM POLICY ......................................................99

WEB BASED MANAGEMENT LAB STEPS .................................................................................................102


WBM CHAPTER 2 FARM CONFIGURATION FOR THE LINKPROOF ....................................................102

LINKPROOF LAB 2 CREATING A FARM AND ADDING NHRS (USING WBM) ..............................................102
LINKPROOF CHAPTER 2 REVIEW ...........................................................................................................108

CHAPTER 3 DEVICE MANAGEMENT FOR LINKPROOF .......................................................................109

LINKPROOF LAB 3A DEVICE MANAGEMENT FOR LINKPROOF (USING WBM)..........................................109


LINKPROOF LAB 3B CONNECTIVITY CHECKS AND HEALTH MONITORING (USING WBM) .............112
CHAPTER 3 REVIEW: ............................................................................................................................119

CHAPTER 4 FLOW POLICIES ............................................................................................................121

LINKPROOF LAB 4 FLOW POLICIES (USING WBM) ...............................................................................121

LINKPROOF PRACTICAL EXERCISE #1 (OPTIONAL) ..............................................................................129


CHAPTER 5 LINKPROOF INBOUND LOAD-BALANCING .....................................................................130

LINKPROOF LAB 5 INBOUND LOAD BALANCING AND PROXIMITY (USING WBM) .....................................130
CHAPTER 5 REVIEW: ............................................................................................................................135

CHAPTER 6 LINKPROOF REDUNDANCY .................................................................................................136


LINKPROOF LAB 6 VRRP REDUNDANCY .............................................................................................136
CHAPTER 7 ONE IP CONFIGURATION .....................................................................................................143

LINKPROOF LAB 7 ONE IP CONFIGURATION (USING WBM) ..................................................................143

LINKPROOF MANAGEMENT .....................................................................................................................147


LINKPROOF LAB 8 MANAGING THE LINKPROOF (USING WBM) .....................................................................147
BANDWIDTH MANAGEMENT ...................................................................................................................160
LINKPROOF LAB 9 BANDWIDTH MANAGEMENT (USING WBM)......................................................................160
LAB B CREATING A SIMPLE BLOCK POLICY IN BWM...................................................................................165
LAB C CREATING A SIMPLE MINIMUM AND MAXIMUM POLICY .......................................................................166

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

-5-

LinkProof Training Manual Level 1


Date: October 2010
Page - 5 -

LinkProof Lab Configuration


During the training, students are divided into two teams (Alpha, Beta, Gamma and
Delta) and each team will configure and manage a single Radware device. The steps and
diagrams within the training material are based on this type of lab setup.
You and your fellow students will be working with a single LinkProof. Since there are
four devices in this lab setup, take care to follow the instructions in the manual for the
device you are working with.
In some situations, your instructor may have to deviate from the standard configuration
to accommodate more students or to account for less available time.
The labs in this manual are designed to demonstrate the more commonly-used features
and functions on the LinkProof. There are a great number of features on this device,
and it would be impossible to provide labs for all of them without increasing the training
period to several weeks.
Even so, the manuals do contain more labs than can be covered in the time available.
Some of these labs are labeled optional and your instructor may likely choose to skip
them.
Each lab contains step-by-step instructions on how to configure the device correctly
using APSolute. These steps are illustrative only and are usually based only on the
configuration of one device in the training lab.
Pay close attention to the tables and charts within the lab instructions. You will be
expected to apply the appropriate settings for your device only. It will make for a
particularly long day for you (and your instructor) if several students mistakenly use
addresses and settings that belong to other students.
If you have any questions about how to configure your Radware device during a
particular lab, please ask your instructor for assistance.
Listed below are the diagrams and details for each set of equipment:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

-6-

LinkProof Training Manual Level 1


Date: October 2010
Page - 6 -

Figure 1 Sample LinkProof Configuration

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

-7-

LinkProof Training Manual Level 1


Date: October 2010
Page - 7 -

Chapter 1 LinkProof Overview


Radwares LinkProof is designed to provide load balancing and fault tolerance for
multiple network connections. Because it is an extension of the FireProof, the LinkProof
can also load balance both transparent and non-transparent firewalls as well; however, it
is optimized to work with multiple links.
The introduction of a LinkProof into a network can significantly reduce some of the
common headaches associated with having only a single connection to the Internet (and
thus a single point of failure). The LinkProof allows administrators to utilize multiple
Internet connections at the same time, thus improving network throughput, instead of
relying on an active / backup solution or segregating internal segments pointed to
different gateways. Should a single Internet connection fail, the LinkProof will mark it
inactive and continue to send traffic through the functioning link(s).
The LinkProof also maintains state between clients and the Internet connection to
which they have been directed so that all traffic from a single client through a particular
next-hop-router will continue through that device for the duration of the sessions.
LinkProof can load balance at layers 2 7, depending on administrators needs. For
transparent routers, the LinkProof redirects clients requests to the MAC address of the
device. When necessary, the LinkProof can also load balance clients requests based on
changes in source port, effectively scattering individual client traffic across an array of
next-hop-routers.
Dynamic Smart NAT allows the LinkProof to dynamically NAT client requests out two or
more next hop routers, using an appropriate address from each routers network. Static
Smart NAT allows the LinkProof to translate an internal hosts requests out one or more
next-hop-routers using a single, static address on each routers network.
For load balancing inbound requests to internal hosts, the LinkProof can be configured
to act as a DNS Name Server, answering incoming queries for resolution through the
links it is connected to. Thus, if a LinkProof has 3 Internet connections, it can respond to
DNS queries for an internal host with an address on any of the three Internet
connections. This insures that DNS queries are answered with addresses on routes that
are available at the time of the request.
Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

-8-

LinkProof Training Manual Level 1


Date: October 2010
Page - 8 -

Additionally, the LinkProof provides a Proximity feature that allows it to reply with
resolved addresses that are better for a particular querying DNS server. The LinkProof
will determine distance and latency to a specific querying DNS server through each of
the links it is load balancing. It then builds a reference table so that future requests from
the same DNS server (or servers on the same 24-bit network) can be given A Records
that are closer or faster for their location.
The LinkProof uses several different methods to calculate Proximity, including traffic on
UDP and TCP ports, as well as ping. It counts actual router hops (not Autonomous
System hops like BGP) and real-time latency. Administrators can change the relative
importance of Latency, Hop Count as well as network load for the LinkProofs
calculations.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

-9-

LinkProof Training Manual Level 1


Date: October 2010
Page - 9 -

Initial Configuration for LinkProof

Initial configuration of the LinkProof must be done through the serial port using the
provided cable and a terminal emulation program such as Microsoft's HyperTerminal.
Once the initial settings are applied, almost all configuration changes can be done
through web based management, although most settings can also be accomplished
through the command line interface (CLI).
There are three basic settings that have to be configured through the Command Line
Interface (CLI):
IP Address
Subnet Mask
Interface Number
Once these initial settings have been completed, the unit will restart and generate a
number of boot messages.
The command line interface (CLI) provides access to all device settings and features:
bwm

Policy management and classification

classes

Configures traffic attributes used for classification

device

Device Settings

fp

FireProof parameters

health-monitoring

Advanced Health Monitoring

help

Displays help for the specified command

login

Login into the device

logout

Logout of the device

manage

Device management configuration

net

Network configuration

ping

Sends echo requests

reboot

Reboot the device

redundancy

Redundancy settings

security

Security settings

services

General netwroking services

statistics

Device statistics configuration

system

System parameters

LinkProof#

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 10 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 10 -

LinkProof Lab 1 - LinkProof initial configuration

Lab Goals:

Using the serial cable provided, connect to the LinkProof using HyperTerminal
(or similar application)
Apply the required minimum settings through the Startup Menu to allow
connectivity
Configure and test Telnet access
Configure and test Web Based Management
Add Default Gateways
Review the various options and settings available through the initial command
line menu
Enable global options

Note: If you do not intervene at the Startup Menu within 30 seconds the LinkProof will
set initial values. You can simply hit enter when the Startup Menu appears and the
device will not apply a default configuration.
The default configuration will apply the following:
Interface 1 = 192.168.1.1 mask 255.255.255.0
Username and Password = radware
All Management enabled
Step-by-step:
1) Please go to page 183 and remove the topology, fill in the blanks with your team

information as assigned by the instructor.


2) Make sure you have serial connectivity to the LinkProof your class might provide a

terminal access server instead of direct connections to the serial port if your class has
a terminal server use step 3.
3) Use Putty or HyperTerminal to create a connection and set the values based on the

presentation (Summary follows):

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 11 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 11 -

Baud Rate = 19200


Flow Control = None
Make sure the right Com port is selected

4) If you have a terminal server telnet to the IP and port

a) IP = 192.168.150.252
b) Port = 700#
5) Hit the return key a few times you should have a LinkProof> prompt.
6) Follow the instructions below to rest the device:

a) Press the enter key a few times and make sure you get a linkproof> prompt.
b) Type login and use the default user name and password of radware
c) From the # prompt type reboot and hit enter.
d) When the device begins to boot up, you will see a message that says Press any
key to pause autoboot

Press any key on the keyboard (you have 4 seconds to do this)

e) From the > prompt type q1 and press enter


f) On ODS hardware you have to confirm the configuration file erase type y
g) When the erase configuration completes and the > comes back, type @ and
press enter.
h) The device will be reset to factory defaults and you will be asked if you want to
use the new CLI configuration wizard. Please make sure to say n
Would you like to use new CLI configuration wizard (y/n) [y]:
Type n since we want to configure the device step by step.
i) The Startup Configuration screen(see below) will come up, you have 60 seconds
to enter values in the startup, otherwise it will default to 192.168.1.1 (See Next
page step 7 for values or refer to your topology)

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 12 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 12 -

Startup Configuration
0. IP address
1. IP subnet mask
2. Port number
3. Default router IP address
4. RIP version

(0,1,2) [0]

5. Enable OSPF

(y/n) [n]

6. OSPF aread ID
7. User Name
8. User Password
9. Enable Web Access

(y/n) [n]

10. Enable Secure Web Access (y/n) [n]


11. Enable Telnet Access

(y/n) [n]

12. Enable SSH Access

(y/n) [n]

13. SNMP Configuration

7) Assign the values based on your teams topology for the management port (MNGT-1

or Port 16) of 10.10.243.# where # is your team number.


a) 0. IP address = 10.10.243.#
b) 1. IP subnet mask = 255.255.248.0
c) 2. Port Number = MNG-1
d) Hit <Enter> for ALL the other values to set them to default.

Note: For those items on the list that are not applicable for this initial startup phase,
you can hit the <Enter> key and allow the menu to apply default settings to them.

8) When you have entered the appropriate information for this section of the Startup

Menu, you will see another sub-menu for SNMP Configuration. Simply hit <Enter>
to accept all default values:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 13 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 13 -

9) When you have filled in this menu, you will be returned to the previous one. If the

configuration is correct, confirm the reboot process and allow the device to restart.
10) Once the device has finished restarting, you will have to log in to the unit by typing

login. The default username and password for CLI access to the LinkProof is
radware (without the quotes).
When you have logged in, use the question mark (?) to display the commands.
You should see a list of commands similar to the one below:

11) Create two new IP addresses for interface 1. Use the following command and

substitute your teams appropriate values: 1.1.1.# and 2.2.2.# (where # is your team
number). Multiple IP address can be added to a single interface.
All network masks are Class C 24 bit (255.255.255.0)
net ip-interface create <ip> <mask> 1
(you will use this command twice (for the 1.1.1.# address and the 2.2.2.#
address)
Team

Device

Interface Number 1 Address

LinkProof 1

1.1.1.1 and 2.2.2.1

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 14 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 14 -

LinkProof 2

1.1.1.2 and 2.2.2.2

LinkProof 3

1.1.1.3 and 2.2.2.3

LinkProof 4

1.1.1.4 and 2.2.2.4

12) Create a new IP address for interface 2. Use the following command and substitute

your teams appropriate values <192.168.200.# where # is your team number>:


net ip-interface create <ip> <mask> 2

Team

Device

Interface Number 2 Address

LinkProof 1

192.168.200.1

LinkProof 2

192.168.200.2

LinkProof 3

192.168.200.3

LinkProof 4

192.168.200.4

When you are finished, use the command net ip-interface to make sure the unit
shows the appropriate interface addresses.
Your device should look similar to the below (with your IP instead).
Team 1 LinkProof
IP Address

Network Mask

If Number

VlanTag

1.1.1.1

255.255.255.0

2.2.2.1

255.255.255.0

192.168.200.1

255.255.255.0

10.10.243.1

255.255.248.0

MNG-1

Team 11 LinkProof
IP Address

Network Mask

If Number

VlanTag

1.1.1.11

255.255.255.0

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 15 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 15 -

2.2.2.11

255.255.255.0

192.168.200.11

255.255.255.0

10.10.243.11

255.255.255.0

MNG-1

13) From the command line, ping various hosts on either side of the device to make sure

you have basic network connectivity.


Ping the LinkProof from your Management Station, and from the LinkProof ping
the two routers it will be load-balancing.
Take a look at some of the CLI commands available. Feel free to ask your instructor
questions about these functions.
14) Enable Telnet access on the device. From the CLI, enter the following command:

manage telnet status set 1


15) Create a username and password so that you can access the device through Telnet

or you can use the default username and password of radware:


manage user table create team1 -pw team1
Use your teams name for the username and password (team1, team2, team3,
etc.).
16) Open a Telnet session to your device and supply the appropriate username and

password. Hit any key (except <Space> or <Enter>) and then hit the <Enter> key.
You should see a list of commands identical to those displayed through the CLI.
17) Enable Web Based Management. From the CLI or from your Telnet connection,

enter the following command:


manage web status set 1
18) You can now open a browser from your workstation and enter the ip address of your

LinkProof. You should be prompted for a username and password. Use the
username and password that you created in step 14.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 16 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 16 -

19) Enter the following command on the LinkProof in order see traps not only through a

serial connection to the unit, but also when you have a telnet or SSH connection.
manage terminal traps-output set 2
20) Configure the LinkProof with a DNS server to use for lookups:

services dns client primary-server set 4.2.2.2


Note: As a general rule, you will find it helpful to leave one of your workstations
connected to the LinkProof through the CLI for the duration of the labs. There are a
number of traps and error messages that the device will generate through the CLI and
these can useful for trouble-shooting.
Routing Table:
For the LinkProof to function a default gateway must be configured however, only one
of the Routers needs to be a default gateway, once an Router is defined as a gateway
ALL configured Router servers are gateways. A good practice is to define each Router
as a default gateway in the event that the Router or the interface used is removed and
the value is then deleted by accident. The routing table Can NOT be used to limit
routing to one specific Router that feature will be discussed later.
21) To add a default gateway the syntax is:
net route table create <IP net> <Mask> <Next Hop> -i <Interface>

Enter the following two lines:


net route table create 0.0.0.0 0.0.0.0 1.1.1.100 i 1
net route table create 0.0.0.0 0.0.0.0 2.2.2.200 i 1
Global Settings:
The Following settings and recommended changes from the default values and should
be set on all LinkProof installs. Please ask your instructor if you want more information
on any of these settings, included in the training are two base CLI configurations files
1

The address you use may differ from the one listed here depending on the lab conditions.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 17 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 17 -

that already include these commands. (Do Not reboot until you have entered all the
commands)

Client Table:
To set the client table (Maximum number of concurrent sessions), if the LinkProof hits
the maximum client table value no new sessions can be established through the
LinkProof this value should be set high (The below value is a minimum). On ODS
hardware the default value is already 250.000.
system tune client-table set 50000
Proximity Table:
To set the proximity table, used for both inbound and outbound proximity the maximum
stored values (Will be discussed in more detail with lab 5)
system tune dynamic-proximity-table set 20000
NHR Tracking Table:
The NHR tracking table setting tracks all management traffic to the LinkProof and the
NHRs themselves, setting it too low will generate an error message that the NHR
tracking table is full, this will not affect traffic being load balanced by the LinkProof. On
ODS hardware the default value is already 100,000.
system tune nhr-track-table set 2000
IP Forwarding Table:
The IP FFT is a fast forwarding table for established connections, having a larger table
improves the processing performance of the CPU in larger network environments.
system tune ip-fft-table set 32000
Optional Features (IPS and BWM):

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 18 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 18 -

If the Device includes the optional modules of IPS and Bandwidth Management (see
system license get) they can be enabled with the following commands:
Enable Bandwidth Management
bwm global classification-mode set 1

Enable Application Security (not be used later on only for your knowledge!)
LP version 6.x:
security signatures-protection application-security global status set 1

At this Point you must Reboot the device for the changes to take effect.

Chapter 1 Review:

Which type of Smart NAT (Dynamic or Static) could be described as a many-to-one


network address translation process?
Which type of Smart NAT (Dynamic or Static) could be described as a one-to-one
network address translation process?
On what system does the LinkProof rely in order to route external clients into a multihomed network through many internet connections?
What is the default username and password for CLI access to a LinkProof?
Can you have more then one IP on a single physical interface?
What values are assigned to the default configuration after 30 seconds?
What does NMS stand for and what potential problems can occur if you specify an NMS
address in the configuration menu?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 19 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 19 -

Chapter 2 Basic Farm Configuration for the LinkProof


The LinkProof acts as the default gateway for devices into and out of the network.
Instead of sending client traffic to the interface address of a specific router, the clients
gateway becomes the address of an interface on the Active LinkProof. The device
makes real-time decisions about router availability as well as load and will route the
clients request appropriately.
The LinkProof can load balance up to 10 Next Hop Routers with proximity and up to 100
Routers without.
LinkProof uses farms to interface with the Next-Hop-Routers. Essentially, a router farm is
a logical collection of routing devices, grouped according to their functionality. In most
cases, all routers within a given farm will be treated equally as candidates for loadbalancing decisions. In other words, traffic leaving the LinkProof can be sent to any of the
router servers in a specific farm. The same router server can belong to multiple farms.
Farms are also dependent of Traffic Flows specific information that instructs the
LinkProof which type of traffic should be redirected to the router servers within that farm.
Different router farms can be based on different Traffic Flow policies to give
administrators flexibility in varying circumstances. For example, administrators may wish
to have Web traffic redirected out only one of their two available internet routers and all
other traffic redirected out both available routers. To accomplish this, the administrator
would need to create two farms one farm containing only the routing server for Web
traffic and a second farm containing both router servers to be used for all other traffic.
Once the farms and their appropriate router servers have been created, Flows and Flow
Policies need to be configured to specifically redirect traffic to the appropriate farm and to
the servers within it.
This concept, known in previous versions of LinkProof code as Grouping, is essentially
the same in theory but differs somewhat in the configuration details. This feature is
discussed in more detail later in this manual.
Dispatch Method

The LinkProof offers a variety of methods for dispatching (load balancing) traffic
to routers:

Cyclic (Round Robin)

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 20 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 20 -

Least Traffic (in Packets)


Least Traffic local
Least Number of Users
Least Number of Users local
Least Bytes
Least Bytes local
Hashing

Smart NAT
One of the fundamental functions of the LinkProof is the ability to redirect traffic to
various ISP routers intelligently. The process by which this is accomplished is
called Smart NAT and it may be easier to examine it in two different ways
Inbound Smart NAT and Outbound Smart NAT.

Consider the following network configuration:

Figure 2 - Basic LinkProof Configuration for Outbound SmartNAT

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 21 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 21 -

The LinkProof sits between the internal network and two external ISP
routers, each with a unique address space 100.100.100.0/24 for ISP A
and 200.200.200.0/24 for ISP B. The default gateway for internal hosts is
an interface on the LinkProof of 192.168.1.1, and the LinkProof itself has a
connection to each ISP 100.100.100.2 for ISP A and 200.200.200.2 for
ISP B.
When an internal user initiates a session to an external host (i.e. an
Internet site), the LinkProof will choose a ISP router based on the loadbalancing metric in use and will then perform NAT (Network Address
Translation) for the client using a pre-configured address specifically for
that ISP router.
In this example, the LinkProof is configured with a SmartNAT address of
100.100.100.50 to use for ISP A and a separate SmartNAT address of
200.200.200.50 to use for ISP B. The LinkProof tracks these outbound
sessions internally so that when the response returns, the LinkProof can
un-NAT the traffic and forward it back to the host that initiated the
request.
SmartNAT allows customers to connect their network to multiple ISP
routers and use all of them simultaneously without complicated gateway
protocols or address sharing. Adding additional Internet connections can
be as simple as placing new entries in the LinkProofs Next Hop Router
Table and configuring additional SmartNAT addresses.
SmartNAT addresses are configured for ranges of addresses. For
example, users within one range will be translated to a specific SmartNAT
address when sent to a router; and users from a different range will be
translated to a different SmartNAT address when sent to the same router.
The LinkProof can also calculate the latency between itself and the
destination hosts to which internal clients are going. This allows it to begin
building a Proximity Table which the LinkProof will use to route users out
the faster connection based on their destination.
Inbound Smart NAT
In addition to being able to route outbound traffic through multiple next hop
routers, the LinkProof can also control how external users reach internal

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 22 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 22 -

resources through the available connections. The LinkProof utilizes DNS


to accomplish this.
Consider the following network configuration

Figure 3 - Inbound Traffic Redirection

The customers internal hosts (web server, ftp server, etc.) need to be
available through both ISP connections. The LinkProof can provide this
service by acting as the authoritative name server for those specific hosts.
When external users need to reach the customers web server (Step 1),
for example, the DNS query to resolve the host name to an IP address is
actually referred to the LinkProof (Step 2). This delegation is
accomplished by placing NS (Name Server) records in the customers
existing DNS server to refer queries to the LinkProof interfaces that reside
on each ISP network.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 23 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 23 -

The LinkProof is configured with the internal web servers host name, its
corresponding internal IP address and with two public addresses that it
can use to answer incoming queries a static address from ISP As
network and a static address from ISP Bs network.
When the query reaches the LinkProof through either network, it will
respond with the address from the least loaded ISP connection (Step 3),
which is passed back to the client (Step 4).
The LinkProof can also be configured to respond to the query with two
addresses. Should the connection to either ISP fail, incoming queries will
still reach the LinkProof through the available ISP (thus the need for two
NS records in the customers DNS zone file pointing to the two interfaces
of the LinkProof).
Additionally, the LinkProof can be configured to perform proximity
calculations to determine which incoming link is better for different
customers. The results of these calculations are stored in an internal table
so that subsequent queries from DNS servers can be answered with an
address that will be quicker to reach for the actual clients.

Smart NAT Types


Newer versions of the LinkProof software provide several different types of
NAT for use in different circumstances. The following explanations detail
the differences.
Basic Smart NAT
Basic Smart NAT enables a one-to-one NAT mapping for occasional
users, based on local IP ranges and destination applications. A pool of
NAT addresses for each ISP is configured per range of local IP addresses
and destination port. Whenever a client with an IP address within the
range initiates a session to any host with the relevant application port, a
NAT address is allocated to this session, and is used for all further
sessions for the client with this application on this destination host. Basic
NAT is useful for any application which requires that source ports not be
translated, and therefore cannot be used when the client's IP is translated
using Dynamic NAT.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 24 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 24 -

No NAT
You can use No NAT to enable a simple configuration where internal hosts
have IP addresses that belong to a range of one of the ISPs. Traffic from
or to these hosts should not be NATed if the traffic is forwarded to the
router of that ISP.
If you do not configure any NAT address for a server via a firewall, that
firewall will not be used by traffic from that server. In order to use a firewall
for a server when NAT is not required, use the No NAT configuration.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 25 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 25 -

LinkProof Lab 2 Creating a Farm and Router Servers (using CLI)

Lab Goals:

Create the Farm and the router servers

Enable Smart NAT

Review various parameters and settings available for devices

Step by Step:
Creating a basic NHR Farm:
1. The first step to working with NHRs is to create the farm use the following
command to create a basic farm:
Syntax:
lp farms table create <Farm Name> -nm <1>
-nm = NAT Mode, this Specifies whether LinkProof does network address
translation on the packets.
(1) Enable
(2) Disable
-pt = Packet Translation, this setting lets the LinkProof know if a farm
uses a special packet handling and has the following values:
(1) = NAT
(3) = Disable
(4) = Virtual Tunneling
(5) = VIP
For our lab use the flowing command:

lp farms table create mainfarm nm 1


2. When adding a new ISP/NHR you need some basic information before you
can add it to the LinkProof.
a. The IP and Subnet of the ISP, the LinkProof must have an
interface in the same subnet as the ISP (we created these
interfaces in Lab 1).

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 26 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 26 -

b. The best practice is to make sure all interfaces that will be used
in the configuration are up. Use the command net l2-

interface to verify all interfaces have link.


3. To add the NHRs to the farms created above with default parameters type
the following command:
Syntax:
lp servers router-servers create <Farm Name> <Router Name> -ip
<IP of ISP>
Add two NHRs 1.1.1.100 and 2.2.2.200
lp servers router-servers create mainfarm ISP1 -ip 1.1.1.100
lp servers router-servers create mainfarm ISP2 -ip 2.2.2.200
4. Once you add the two ISP you should see in the CLI that they are up, the
LinkProof is by default doing an ICMP health check to verify connectivity.
We will change these parameters in later labs.

25-07-2008 20:53:13 INFO Server mainfarm ISP1 up


25-07-2008 20:53:14 INFO Server mainfarm ISP2 up
At this point the LinkProof will load balance any traffic that passes
through requiring routing to the default gateway. However to
establish connectivity you must configure Dynamic NAT for outbound
traffic (Dynamic NAT is the same as Hide NAT or PAT).
Note: Dynamic NAT is a layer 4 NAT therefore if the traffic is not TCP
or UDP it will have issues with the NAT.
5. For each ISP use a single new IP address that is on the same Subnet as the
ISP for this lab we will use the following two IP address for each team
(where # is the team number).
a. ISP1 = 1.1.1.10#
b. ISP2 = 2.2.2.10#
Use the following command to add the NAT entries to the LP.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 27 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 27 -

Syntax:

lp smartnat dynamic-nat create <Start IP> <End IP> <NHR


IP/ISP> <Dynamic NAT>
The Start IP and End IP is the range of IPs on the local network, you can
not use 0.0.0.0 to say all IPs instead you need to create a range 0.0.0.1
255.255.255.254 or limit the range to just the space on your network.
Dynamic NAT does not support non contiguous ranges.
For each team:

lp smartnat dynamic-nat create 0.0.0.1 255.255.255.254


1.1.1.100 1.1.1.10#
lp smartnat dynamic-nat create 0.0.0.1 255.255.255.254
2.2.2.200 2.2.2.10#
Some Examples Below:
Team

From Local IP

To Local IP

Router IP

Dynamic
Nat IP

NAT
Redundancy
Mode

Team1

0.0.0.1

255.255.255.254

1.1.1.100

1.1.1.101

Regular

0.0.0.1

255.255.255.254

2.2.2.200

2.2.2.101

Regular

0.0.0.1

255.255.255.254

1.1.1.100

1.1.1.102

Regular

0.0.0.1

255.255.255.254

2.2.2.200

2.2.2.102

Regular

0.0.0.1

255.255.255.254

1.1.1.100

1.1.1.110

Regular

0.0.0.1

255.255.255.254

2.2.2.200

2.2.2.110

Regular

0.0.0.1

255.255.255.254

1.1.1.100

1.1.1.111

Regular

0.0.0.1

255.255.255.254

2.2.2.200

2.2.2.111

Regular

Team2
Team10
Team11

When complete, to display the NAT table type:

Figure 4 Dynamic NAT Table

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 28 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 28 -

6. Make certain that your workstation gateways are set to the internal interface of the
LinkProof (192.168.200.# #=team number).
7. Open browser sessions from your remote workstation to external hosts, if available
and you should be able to connect.
8. View the connection table on the LinkProof to see the active connections

lp client table
You should see something like the following:

Figure 5 Client Table

Changing the Dispatch Method:


9. The default dispatch method for the LinkProof is cyclic, this means that
each session will be dispatched to the next router based on where the last
session was sent. To test the different modes we will set the client aging
time to a very low number (20 seconds) to age out from the table faster.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 29 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 29 -

lp farms table set mainfarm -cl 20


10. Now find a simple website that opens few connections for example:
www.hithere.com, in the client table notice what NHR was selected. Wait
to age out of the client table (20 seconds) and then refresh the browser
you should be directed to the second ISP.
11. Change the dispatch method to Least Amount of traffic:
Syntax:

lp farms table set mainfarm -dm <Value>


Allowed values for dispatch-method:
(1) Cyclic
(2) Least Amount Of Traffic
(3) Fewest Number Of Users
(8) Least Number Of Bytes
(9) Hashing
(10) Least Amount Of Local Traffic
(11) Fewest Number Of Local Users
(12) Least Number Of Local Bytes
(14) Customized Hash
(15) Multicast
(16) Source IP Hashing
(17) Layer-3 Hashing

lp farms table set mainfarm -dm 2


12. Test the new method and observe what happens in the client table.

lp client table
13. Change the Dispatch Method to Fewest Number of Users test this new
method as above and observe the client table.

lp farms table set mainfarm -dm 3

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 30 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 30 -

Viewing and Saving the Configuration File:


14. At this point it will be a good idea to save the basic configuration created
above. To view the configuration in CLI type in:

system config immediate


15. Although this configuration can be copied to a text file and saved, it can
be hard to work with until you have more understanding of the CLI, to
save the configuration from web based management:
File Configuration File Receive from Device
Choose Configuration Type as Regular

End of Lab 2 Please continue with Lab 3.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 31 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 31 -

LinkProof Chapter 2 Review

How many devices (total) can the LinkProof load balance?


How Many ISPs can the LinkProof load balance (Routers with Proximity)
What load balancing methods are available on the LinkProof?
What is SmartNAT?
What types of SmartNAT are available on the LinkProof?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 32 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 32 -

Chapter 3 Device Management for LinkProof


The LinkProof has a number of features that allow administrators to control and adjust
traffic to routers with minimum impact on services. Administrators can introduce
routers into the load balancing cluster smoothly; a new router can be added with only
few simple entries using ConfigWare or the CLI; and routers can be brought down
gracefully for maintenance or upgrades with a single configuration change.

Server Priority
Routers can be given varying priorities or weights. The LinkProof will redirect
more traffic to those devices that are configured with a higher weight than those
will a lower weight. This allows administrators to utilize a wider variety of
equipment, some of which may be more or less capable when compared to other
devices being load balanced. NHR weights also allow administrators to test new
or questionable machines without worrying that these members will be
subjected to high traffic loads.

Recovery Time
When a router fails, the LinkProof will continue to check for its availability. When
the device once again becomes available, the LinkProof can be configured to
wait a period of time before sending any traffic to the router. This "Recovery
Time" allows machines to finish their start-up processes before receiving any
traffic from the LinkProof.

Warm Up Time
Once the Recovery Time has ended, the LinkProof can be configured to send
traffic to an NHR a little bit at a time, gradually increasing the traffic. This
"Warm Up" time helps prevent swamping a device with traffic the moment that
the LinkProof confirms its availability.

Connection Limits
Should administrators wish to limit the total number of connections to a specific
device, a connection limit can be set. Since LinkProof maintains information
about traffic it has dispatched to each router, it will not direct any additional
users to a device that has reached its Connection Limit. By default, the
Connection Limit is not set for any router. Connection Limits may be useful for
devices that are bound by licensing requirements or by physical capabilities.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 33 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 33 -

Traffic Limits
Administrators can limit the total amount of traffic for a given NHR by setting either
the Kbits, Inbound Kbits, or Outbound Kbits Limits.

NHR Operational Mode


Routers can be configured as either Active or Backup. An Active device is one which
is immediately capable of receiving traffic. A Backup device is one which will not be
sent any traffic unless all Active devices become unavailable. This feature allows
administrators to place older, less powerful routers in the load balancing scenario to
handle traffic in the event that all other primary devices become unavailable.

Client Management
The LinkProofs client table keeps track of inbound and outbound traffic that has
been redirected through each of the available router servers. The client table tracks
the following:

Source Address the clients source IP when the request reaches the LinkProof
Destination Address the destination IP in the clients request
Source Port the clients source port the request reaches the LinkProof
Destination Port the destination port in the clients request
Flow the applicable traffic flow as defined by the client (or if no flows have been
defined, a Default Flow is used)
Farm Name based on the Flow, the router farm used for a flow match
Server Name the name (as given by the administrator) of the router server contained
within the Farm.
Index an internal tracking number
Action / Port Number Indicates the action which the LinkProof has taken
Type Indicates the packet handling of this request
DN Dynamic NAT
SN Static NAT

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 34 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 34 -

VPN Virtual Private Network


Ext ID an additional internal tracking number

Client Aging Time and aging by port


The Client Aging Time is a mechanism used to maintain persistence between a
client and the device he was load-balanced through. When the LinkProof
receives traffic from a new client, it will make a load-balancing decision based on
the Dispatch Method (Cyclic, Least Traffic, etc.) set on the farm and will put an
entry in the Client Table for that client-router match. As long as there is traffic
between the client and the destination host hes connected to (or vice versa), the
LinkProof will continue to send that client through the same router.
After this traffic stops, the Client Aging Time begins. When the Client Aging
Time expires, the LinkProof will remove that clients entry from the Client Table.
If traffic resumes within the Client Aging Time window, the LinkProof will update
the time stamp and start the counter over when traffic stops. If a client resumes
traffic after the Client Aging Time has expired, the LinkProof will make a new
load-balancing decision and may send the client to a different router.
The default setting for a Farms Client Aging Time is 60 seconds. This can be
increased as needed, but it is a global setting, which means that all entries for
traffic through that router farm are retained in the table for this additional
amount of time. Conceivably, in a high traffic network, the Client Table might fill
up (this is very unlikely); to counter this and to improve the aging process of
client entries, it is now possible to configure the LinkProof to age entries out at
different times for different application ports. For example, port 80 traffic (web)
can be set to age out at 30 seconds, while Telnet traffic (port 23) might be set to
age out after 2 hours.
For any application ports that are not specifically set, the LinkProof will apply the
Client Aging Time in the Farm Settings configuration.

Health Checking and Full Path Health Monitoring

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 35 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 35 -

As important as load balancing traffic is the concept of router health checking. It


does no good to load balance traffic to a device if that particular machine is
unavailable to handle the request. For this reason, the LinkProof can be
configured to monitor the status of routers in order to make certain they are
available.
By default, the LinkProof uses Ping to make certain that a given device is
available, and by default, the Radware unit will simply ping a single interface on
the router. Since this method doesnt indicate whether the device itself is
passing traffic, Radware has introduced Remote Connectivity Checks or Full
Path Health Monitoring that allows the LinkProof to ping through a given
device to remote addresses beyond. Should the pings fail anywhere along this
path, the LinkProof will take that device out of service.
Once a device is marked as unavailable, the Radware unit will continue to check
for its availability and will resume sending traffic to it once it passes all Remote
Connectivity Checks.
Instead of Ping, administrators can configure the LinkProof to use either a TCP
port or an SNMP OID (Simple Network Management Protocol Object Identifier)
as the method for health checking available devices. Since this is a global
setting, all devices in the health check path must be capable of responding to the
TCP port or must be configured to reply to the request for an SNMP OID. The
default OID used is for sysObjectID, and the default community string is
public.

The following diagram illustrates Remote Connectivity Checks for the LinkProof:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 36 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 36 -

Figure 6 - LinkProof Full Path Checking through Router

For the LinkProof, the check intervals and the number of retries can be configured
according to need.

Note: You can specify up to 10 individual devices in the Full Path Health Checks for each
NHR.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 37 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 37 -

LinkProof Lab 3a Router Management for LinkProof (using CLI)

Lab Goals:

Modify various settings designed to help manage routers

Configure Aging By Application

Use Connectivity Checks and Enable Health Monitoring (Lab 3b)

Step-by-step:
Admin Status and Operation Mode:
To view the effects of changing the operation mode to shutdown (no new sessions sent
to the active NHR all existing sessions remain) we will set one of the NHRs to backup.
1) Change the second ISP to backup:

lp servers router-servers set mainfarm ISP2 om 2


-om = Operational Mode and it can ether be:
(1) Active
(2) Backup
2) Change the global aging time to 45 seconds:

lp farms table set mainfarm -cl 45


3) Browse to the internet and make sure you have client table entries all going to ISP1:

lp client table
4) Set the first ISP to shutdown mode:

lp servers physical-servers set ISP1 -as 2


-as = Administrative Status and it has the following 3 values:
(1) Enable
(2) Shutdown
(3) Disable
Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 38 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 38 -

Wait to see a trap in the CLI that the ISP is ready for shutdown.
5) Change both ISP1 and ISP2 back to their normal modes:
ISP 2 set back to Regular and ISP 1 set back to Enabled.

lp servers router-servers set mainfarm ISP2 -om 1


lp servers physical-servers set ISP1 -as 1
Recovery Time:
To avoid the situation where an ISP will flap (come into service and fail quickly after) its
advisable to set the Recovery Time, the amount of time the LinkProof will wait after the
ISP passes a health check before sending it traffic. Its important to note this timer can
only be used if the ISP actually failed. If you disabled and re-enabled the ISP it will
ignore this timer.
6) Setting the Recovery Time on the ISPs to 60 seconds:

lp servers physical-servers set ISP1 -rt 60


lp servers physical-servers set ISP2 -rt 60
Aging By Port:
7) This table allows you to define different aging times for different applications. You
may wish to age some times of traffic out of the client table sooner than the global
aging time of one hour; or you may wish to have the device retain traffic types in the
table for a longer period of time.
8) Define an aging time of 15 seconds for HTTP and 5 seconds for DNS:
Anything that is not defined specifically in this table will use the global Client Aging
Time.
lp global client-table application-aging-time create 53 -at 5
lp global client-table application-aging-time create 80 -at 15
9) Using your client, ping an address (ICMP) and open browser sessions and check the
client table to determine how long entries for DNS and HTTP are retained, the ICMP
should stay for a long time after both DNS and HTTP age out.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 39 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 39 -

10) Restore the configuration from Lab 2.


Using Web based Management:
i)

File Configuration File Send to Device, browse to where you saved


the file and the click Apply and reboot.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 40 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 40 -

LinkProof Lab 3b Connectivity checks and Health Monitoring (using CLI)

Lab Goals:

Configure Full Path Health Monitoring.


Health Monitoring Mandatory Checks
Health Monitoring Non-Mandatory Checks

Connectivity Checks Lab:

Configure your LinkProof to use Health Monitoring checks to verify the availability of the
Next-Hop-Routers.
Step-by-Step:
1) Change a few of the settings for connectivity checks:
a) Change the Polling Interval from 10 to 5. This setting instructs the LinkProof to
check each NHR once every 5 seconds.

lp farms table set mainfarm -ci 5


b) Change the Number of Retries from 5 to 3. This setting means that a Router can
fail three consecutive health checks before the LinkProof will confirm that it is
unavailable and will no longer load-balance traffic to it.

lp farms table set mainfarm -cr 3


2) To test the full path we will configure each of the ISPs to ping an address beyond
their external side in this case we will use 192.168.150.100 for both routers.
Syntax:

lp servers remote-checks-table create <Farm Name> <NHR By


Name> <Remote Address>
lp servers remote-checks-table create mainfarm ISP1
192.168.150.100
lp servers remote-checks-table create mainfarm ISP2
192.168.150.100

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 41 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 41 -

3) Ask your instructor to unplug the external connection (Or disable it) from one of the
Routers.
4) Type in lp servers router-servers get and repeat a few times until for
one of them it will say not in service.
5) Plug the connections for the router back in before continuing to the next lab.

Health Monitoring Lab

Health Monitoring Mandatory Checks:


It is much easier to configure the health monitoring module from web based
management, a CLI version follows in the next section (Non-Mandatory Checks)
1) To use health monitoring connectivity checks must be turned off on each farm
Syntax:
lp farms table set <Farm Name> -hm 3

lp farms table set mainfarm -hm 3


2) The next step enable is to enable Health Monitoring:

health-monitoring status set 1


3) Once Health Monitoring is turned on the next step is to create the actual health
checks, we will start with basic checks for this part of the lab.
Syntax:

health-monitoring check create <Name> -m <Method> -d


<Destination Address> -h <NHR>
-m = Method, this is the application that will be used, you must type in the Method ID
number or the value. To view the application associated with the Method ID type in

health-monitoring method

In Our Lab:
Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 42 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 42 -

health-monitoring check create ISP1-PING-Outside -m 0 -d 192.168.150.100 -h 1.1.1.100


health-monitoring check create ISP2-PING-Outside -m 0 -d 192.168.150.100 -h 2.2.2.200
health-monitoring check create ISP1-ARP-Inside -m 11 -d 1.1.1.100
health-monitoring check create ISP2-ARP-Inside -m 11 -d 2.2.2.200

4) Once the 4 checks are created (2 for each ISP; 1 Inside, 1 Outside) we have to bind
these checks to the NHR farm to fail the routers with a check fails.
Syntax:

health-monitoring binding create <Health Check ID> <NHR


ID> -g <Group Number>
To bind the Checks to the Servers you need to look up the Health Name ID and the
NHR ID
For the Health Check ID look in

health-monitoring check
The look in the second column for the ID
For the NHR ID
health-monitoring server
And look for the value in the first column.
In Our Lab the complete commands will be as follows (this can vary depending on the
Health Check ID):

health-monitoring
health-monitoring
health-monitoring
health-monitoring

binding
binding
binding
binding

create
create
create
create

0
2
1
3

0
0
1
1

-g
-g
-g
-g

1
1
2
2

5) Verify that the NHRs are up and that all checks are passed:

health-monitoring check

6) Once you are configured ask your instructor to take down the outside interface of one
of your routers, you should see it fail.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 43 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 43 -

Have your instructor bring the NHR back online before proceeding.

Health Monitoring Non-Mandatory Checks (CLI):


1) Remove all the health checks from the binding table.

health-monitoring
health-monitoring
health-monitoring
health-monitoring

binding
binding
binding
binding

del
del
del
del

0
2
1
3

0
0
1
1

2) Remove all the health checks


health-monitoring check del ISP1-PING-Outside
health-monitoring check del ISP2-PING-Outside
health-monitoring check del ISP1-ARP-Inside
health-monitoring check del ISP2-ARP-Inside

3) To add new health checks in the CLI the syntax is as follows:

health-monitoring check create <Name> -m <Method> -d


<Destination> -h <NHR> -p <Port> -a <Arguments> -r
<Retries>
Name = The name of the check will be used later in the binding field, the name cant
be changed and the best practice is to use the name of the ISP as part of the name of
the check. For example ISP1-DNS-Yahoo.
-m = Method, this is the application that will be used, you must type in the Method ID
number (In our lab we will use 10 that is DNS). To view the application associated
with the Method ID type in

health-monitoring method
-d = Destination, the IP address of the destination server.
-h = NHR, the NHR that you want this check to go out of.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 44 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 44 -

-p = Port, the TCP or UDP port used for this application.


-a = Arguments, the values given for this application, for example HOST=, or
REGEX=.
-r = Retries, the number of consecutive failed checks before the check will be counted
as failed.
4) Create 4 DNS checks going out 2 for each ISP.

health-monitoring check create ISP1-DNS-yahoo -m 10 -d


4.2.2.2 -h 1.1.1.100 -p 53 -a HOST=www.yahoo.com -r 2
health-monitoring check
4.2.2.1 -h 1.1.1.100 -p
health-monitoring check
4.2.2.2 -h 2.2.2.200 -p

create ISP1-DNS-google -m 10 -d
53 -a HOST=www.google.com -r 2
create ISP2-DNS-yahoo -m 10 -d
53 -a HOST=www.yahoo.com -r 2

health-monitoring check create ISP2-DNS-google -m 10 -d


4.2.2.1 -h 2.2.2.200 -p 53 -a HOST=www.google.com -r 2
5) After creating the checks make sure they all pass you can view the health table with
the following command:

health-monitoring check

6) The next step is to bind the checks to the Routers the syntax is as follows:
health-monitoring binding create <Health Check ID> "HMM Server Name -g <Group
Number> -m <Mode>

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 45 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 45 -

Health Check Name = The name you created in the check table.
HMM Server Name is the name the LinkProof gives your combination of farm
name and ISP. To find out the names you can type:

health-monitoring server
-g = Group, all the checks for the NHR should be part of the same group number.
-m = Mode, has two options:
o

Mandatory

Non-mandatory

7) Create 4 bindings one for each check to the two ISPs marking them all as Nonmandatory.
NOTE: Make sure your health check numbers are correct or use the health check
name.

health-monitoring binding
g 1 -m Non-mandatory
health-monitoring binding
g 1 -m Non-mandatory
health-monitoring binding
g 2 -m Non-mandatory
health-monitoring binding
g 2 -m Non-mandatory

create 5 "NHR: mainfarm/ISP1" create 4 "NHR: mainfarm/ISP1" create 7 "NHR: mainfarm/ISP2" create 6 "NHR: mainfarm/ISP2" -

8) Test the failover by having your instructor fail the external link of one of the ISPs.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 46 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 46 -

Chapter 3 Review:

For a router that is currently up and running, what is the smoothest way to take it out of
service?
If you want more traffic sent to a particular router, what setting can you use?
What is Recovery Time? What is Warm Up Time?
If you set an application aging time for HTTP to 3600 and the farm aging time to 600,
what will happen?
What setting allows administrators to restrict the number of users sent to a router?
What is the Backup setting for Operational mode and why would it be used?
How many points can be checked through a router using Full Path Health Monitoring?
In an active / backup configuration of LinkProofs, with 3 routers, how many health checks
would be performed if you checked 10 devices through each routers?

End of Chapter 3 please wait for your instructor before continuing

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 47 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 47 -

Chapter 4 Flow Policies

Flow Policies
Administrators can configure the LinkProof to redirect specific kinds of traffic to
specific devices or groups of devices. This feature is based on the concept of
Flows, introduced in version 5.10 and can be done based on the destination port,
destination IP address, source IP address, or combinations.
Administrators create flows that contain the router farm to which the LinkProof will
send traffic. Flow Policies instruct the LinkProof what types of traffic to use for
specific flows. For example, a customer has two specific subnets that he would
like to send out different routers. He would like Subnet-1 to be redirected out
Routers 1 and 2; while Subnet-2 should go out Router 3. Traffic from any other
undefined subnets can use either routers 1, 2 or 3.
To accomplish this goal, the customer would first create three farms:

Main Farm this contains all three Routers


Subnet-1 Farm this contains routers 1 and 2
Subnet-2 Farm this contains only router 3

Figure 7 - Router Farms

Having defined the three farms, the administrators next step is to define the flows
for traffic:
Subnet-1 Flow Use Subnet-1 Farm
Subnet-2 Flow Use Subnet-2 Farm
Since there is also a default flow which is used for anything not matching a more
specific flow, this is as far as he needs to go in the definition of flows.
Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 48 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 48 -

Figure 8 - Flow Definitions

The final step is to define the Flow Policies that instruct the LinkProof to watch for certain
types of traffic (in this case the source address from clients) and which Flow to use when
a match is found:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 49 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 49 -

Figure 9 - Flow Policies for Source Traffic

The same principals can be applied to other situations. For example, if a customer
wanted to have Web traffic use only Router 1 and FTP traffic use only Router 2, he would
start by creating two Router farms:
Web Farm containing Router 1
FTP Farm containing Router 2

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 50 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 50 -

Figure 10 - Flows for Applications

The flow policies the administrators define would be instruct the LinkProof that HTTP
service traffic is to use the Web Flow (and thus the Web Farm); while FTP service traffic
is to use the FTP Flow (and thus the FTP Farm).

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 51 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 51 -

Figure 11 - Flow Policies for Applications

Flow Policies and the Flows they use can also be based on combinations of factors such
as any source or destination network, as well as any service type (such as HTTP,
HTTPS, FTP, DNS, etc.)

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 52 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 52 -

LinkProof Lab 4 Flow Policies (using CLI)

Lab Goals:
Setup up network definitions
Create a flow for source networks
Create a flow for an application
Create a flow for application and destination network
Step-by-Step:
Pre Configuration
Before Flow Policies can be created all the farms needed for the different flow
possibilities must be created first. In our Lab we will end up with 3 farms
Mainfarm = Farm with both ISP1 and ISP2 active
Farm-ISP1 = Farm with Just ISP1 active ISP2 is set to backup mode
Farm-ISP2 = Farm with just ISP2 active ISP1 is backup
Creating the two new farms use the following commands
Farm Creation:
lp farms table create Farm-ISP1 -nm 1
lp farms table create Farm-ISP2 -nm 1
Adding Servers:
To Farm-ISP1
lp servers router-servers create Farm-ISP1 ISP1 -ip 1.1.1.100
lp servers router-servers create Farm-ISP1 ISP2 -ip 2.2.2.200 -om backup

To Farm-ISP2
lp servers router-servers create Farm-ISP2 ISP1 -ip 1.1.1.100 -om backup
lp servers router-servers create Farm-ISP2 ISP2 -ip 2.2.2.200

Setting up Networks:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 53 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 53 -

The next step is to set the various networks we will use, there are two types of networks
supported by Radware:
1) A Range of IP Address
2) A full Subnet
We will create both in the network table.
Create a Range of IP Address
Syntax:
classes modify network create <Name> <Subindex> f <From
Address> -t <To Address> -m <Mode>
Subindex can be any value but a good idea to go in order.
-m = Mode can have one of two values depending on the network being created
(1) IP Mask
(2) IP Range
For this lab create the following two Ranges:
classes modify network create Internal 1 -f 192.168.200.1 -t
192.168.200.254 -m 2
classes modify network create DNS-IP 2 -f 4.2.2.2 -t 4.2.2.3
-m 2
Create an IP Mask
Syntax:
classes modify network create <Name> <Subindex> a <Network
ID> -s <Subnet Mask> -m <Mode>
Create the following two Networks:
classes modify network create Outside 3 -a 198.6.1.0 -s
255.255.255.0 -m 1
classes modify network create DNS-Net 4 -a 4.2.2.0 -s
255.255.255.0 -m 1
The last step is to update the information
Use the following to save these updates:
bwm update-policies set 1

Flow Policies for Networks:


Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 54 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 54 -

In some situations, customers may only want to use a subset of available routers for
certain types of traffic. For example, a customer may want users from a certain internal
subnet only to go out one of the available routers. Or another customer may want web
traffic to go out a single router.
In previous versions of LinkProof code, this was done by using Grouping. With the
introduction of LinkProof version 5.10, this is now accomplished with Flow Policies. The
following labs will introduce you to configuring Flow Policies.
1) The first step in actually creating a flow is the Flow Name, on the LinkProof the flow
will only contain one farm, on other devices it is possible to use multiple farms in a
flow.
Syntax:

lp flow-management farms-flow-table create <Flow Name>


<Farm Name>
For this lab we will create the following flows

lp flow-management farms-flow-table create ISP1 Farm-ISP1


lp flow-management farms-flow-table create ISP2 Farm-ISP2
Once complete it should look like the following:

lp flow-management farms-flow-table

Figure 12 Flow Table

2) Create the following flow to force all traffic going to the DNS IPs out ISP 1
Syntax:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 55 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 55 -

lp flow-management modify-policy-table create <Name> -i


<Index Value> -dst <Destination> -src <Source> -fc
<Cluster Name>
-i = Index, this value will determine what policy will be processed first. Order is
important and the policies are processed in numerical order (I.E. 1 2 3 ).
-dst and src = The destination and source networks, you must have defined them
already in the network table before using them here.
-fc = Flow Cluster, as we defined in the first step of the lab.

lp flow-management modify-policy-table create DNS -i 1 dst DNS-IP -src any -dr "Two Way" -fc ISP1
3) We will now create a second policy that will direct all traffic from the subnet of
192.168.200.0 to ISP 2. You will note since the index of this rule is 2, DNS traffic to
4.2.2.2 will still go out ISP 1.

lp flow-management modify-policy-table create Outbound -i


2 -dst any -src Internal -dr "Two Way" -fc ISP2
4) The last step is to activate the polices, use the command:

bwm update-policies set 1


5) Test the policy by browsing out and seeing the results in the client table. Then fail
one router and see that everything fails over.
Flow Policies for Applications
In this section, you will create flow policies to send web traffic out ISP1 and DNS traffic
out ISP2. The first step is removing the policies we created above.
6) To Delete a Policy:
Syntax:

lp flow-management modify-policy-table del <Policy Name>


In Our Lab:

lp flow-management modify-policy-table del DNS


lp flow-management modify-policy-table del Outbound

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 56 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 56 -

The last part is to updated the active policies:

bwm update-policies set 1


7) Next we will create two new policies, this time we will add a new flag for an
application:
Syntax:

lp flow-management modify-policy-table create <Name> -i


<Index Value> -pt filter p <Filter Name> -dst
<Destination> -src <Source> -fc <Cluster Name>
-pt = Service Type, this is used if you want to select a layer 4 7 Service to be used
for the filter. The default is none. The values are as follows:
(1) none
(2) filter = A single Policy
(3) group = A group of Filters and Policies
(4) policy = A group of filters with an And condition (Must match all filters at the
same time)
-p = The Actual filter from the list, It is much easier to view this list in Web Based then
CLI, the value after the p must be a filter on the list. To view the list use the CLI
command: classes modify service basic
In Our Lab:

lp flow-management modify-policy-table create HTTP -i 2 pt filter -p http -dst any -src Internal -fc ISP1
lp flow-management modify-policy-table create DNS -i 3 pt filter -p DNS -dst any -src Internal -fc ISP2
8) To activate the new policies
bwm update-policies set 1
9) Now we can test the policy from the Virtual Appliance browse to the internet and a
few web pages then look at the client table, you should see all HTTP traffic go to
ISP1 and DNS will go to ISP2
Practical Exercise for Chapter 4:
10) Remove the two policies above and create a policy for your workstation when it does
a DNS query it will be forced out ISP2, however all other traffic is load balanced. In
addition any other client will be load balanced no matter what traffic is used.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 57 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 57 -

11) Restore the configuration from Lab 2 before going on to the next lab.
.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 58 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 58 -

Chapter 4 Review Questions


What is the default Client Aging Time on a LinkProof router farm?
What is the Client Aging Time used for?
What happens if a clients entry is removed from the table and the client resumes traffic
to the same destination host?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 59 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 59 -

LinkProof Practical Exercise #1


A customer just bought a LinkProof and has two ISP
ISP 1 = 3.3.3.50 /24
ISP 2 = 4.4.4.150 /24
He wants to just load balance outbound traffic through each one for Dynamic NAT use 3.10#
and 4.10#
He has a Guest Network inside that for all HTTP traffic he wants it to go to ISP1 The network is
10.200.200.0/24
He also has a partner on the outside 128.177.28.44 that must go through ISP 2, even the Guest
network must go to ISP 2 to reach this partner.
He wants the default aging time to be 300 seconds and application specific aging times to be
HTTP 60
DNS 15
HTTPS 600
He also wants to check DNS through each ISP create health monitoring checks to check
www.cnn.com and www.radware.com to 4.2.2.2 and 4.2.2.3

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 60 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 60 -

Chapter 5 LinkProof Inbound Load-Balancing


The LinkProof has the ability to act as a DNS Name Server so that it can answer DNS queries for
specific internal hosts. This feature allows the LinkProof to return A Records to querying DNS
servers from either network for which it is load-balancing Next Hop Routers.
A single internal host, such as a web server, can be statically mapped to two or more different
external IP addresses (one on each of the Routers networks). The LinkProof is then configured
to answer inbound queries by placing its Virtual DNS addresses in the main DNS servers table as
NS Records. Any time a DNS server needs to have a particular host resolved, that query will be
referred to the LinkProof. The LinkProof can then reply with an A record on any of its
configured router networks.
Should a given link fail, the querying DNS server will fail over to the second NS Record in DNS
and reach the LinkProof through the available network. The LinkProof will know that the failed
link is unavailable and will only respond with A Records from the network of the active router.
The diagram below illustrates the concept:

Figure 13 LinkProof Inbound Load Balancing

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 61 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 61 -

Queries from external DNS servers for www.Radware.com will be referred to either Virtual DNS
Address on the LinkProof (usually by round-robin distribution). Should a link fail and the
querying DNS server cant reach the LinkProof name server, the DNS server will fail over to its
second NS Record (also the LinkProof).
When the LinkProof receives a query to either Virtual DNS Address, it can respond with an A
Record on either network (in this case, either 100.100.100.50 or 200.200.200.50).
Since both external addresses are bound to the same internal web host, an outside client will be
able to get to the site through either link.

Proximity Settings
Proximity is the process of determining which available network path (i.e. which ISP router)
is the best one to use in a given situation. Best depends on a customers needs, but
more often than not, the path with the least amount of latency is usually the optimal one.
Over time, the LinkProof will build a detailed Proximity Table that lists destination networks
and ranks the available ISP routers in order of preference from fastest to slowest. If a given
router fails, the LinkProof wont use that path even if it is listed first in the Proximity Table.
The LinkProof calculates Proximity in the background by initiating various types of traffic
through each link to the same destination host. Based on the round-trip time and other
information gathered from the response, the LinkProof can then build and entry in its
Proximity Table for that hosts destination network. Each entry typically remains in the
Proximity Table for 2 days, though that value can be increased or decreased as needed;
additionally, there are internal LinkProof mechanisms that can initiate recalculations of
existing entries.
Outbound Proximity
If an internal user generates traffic to an external destination host, and that external hosts
network is not listed in the Proximity Table, the LinkProof will load balance that users traffic
out the least-loaded router. It may not necessarily be the best one to use, but the
LinkProof has no data yet about the distance and latency to that destination network
through the available routers.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 62 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 62 -

Once the internal users session has been forwarded, in the background the LinkProof will
begin generating its Proximity traffic and calculating the values necessary to place an entry
for that destination network in its Proximity Table.
Inbound Proximity
The LinkProof can determine which is the best link to use for particular DNS servers based
on Proximity calculations. For example, if the LinkProof is load-balancing two NHRs and has
an internal host for which it is acting as the Name Server, the LinkProof can return an A
Record which is closer, faster or less loaded for the querying DNS server.
When it receives a query from an outside DNS server, the LinkProof will first return an A
Record for the network that is least loaded (since the LinkProof knows how much traffic is
on each link).
Once the initial query has been answered, the LinkProof will initiate traffic back to the same
querying DNS server using several different methods. The purpose is not to initiate a
session, but only to determine latency and actual router hops. The LinkProof will initiate
traffic through each of its links back to the DNS server and then build a table based on the
results. This Proximity Table is used for future reference, and any subsequent queries
from the same DNS server (or any other DNS servers on the same 24-bit network), the
LinkProof will know that the best record to return is one from the faster or closer network,
according to its table.
By default, the LinkProof will retain these entries in its Proximity Table for 2 days before
they are dropped out. This value can be adjusted as can the TTL (Time to Live) for the DNS
responses that the LinkProof generates. The LinkProof can also be configured to respond
with two A Records and will order them according to its proximity table.
Additionally, administrators can adjust the weight that the LinkProof gives to Latency, Hops
and Load, increasing or decreasing their relative importance.
The diagram below illustrates the proximity calculations:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 63 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 63 -

Figure 14 LinkProof Proximity Overview

For inbound traffic, the LinkProof will receive a name query from a clients DNS server first.
The LinkProof will respond with an A-Record IP address belonging to the ISP router that is
currently the least loaded. Once the query has been answered, the LinkProof will then
generate Proximity Traffic in the background to the DNS server that made the initial query.
The LinkProof can be configured to consider three factors when making Proximity
determinations: Latency, Hops and Load. Typically, most customers are concerned with
providing users the most responsive service both inbound to and outbound from their
network. In such cases, Latency should be given a higher weight (on a scale of 1 to 99).

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 64 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 64 -

Hops, the number of actual router hops for a given route, may not make a great deal of
difference as long as the latency is low, so this is often given a lower weight. Load is the
amount of traffic into and out of a particular Next Hop Router and can affect how quickly a
user gets into or out of a network. If an NHR is heavily loaded, the LinkProof can take this
into consideration and select another router that is less loaded.
For Outbound traffic (internal users headed to external hosts), the LinkProof can
calculate Proximity to the destination host itself). For Inbound traffic (external users
headed to internal hosts like www, ftp etc.), the LinkProof calculates Proximity to the
clients DNS server that made the name query.
In both cases, entries are stored in the Proximity Table based on the 24-bit destination
network (255.255.255.0).
The LinkProof can be configured to perform only Outbound Proximity, Inbound
Proximity or Both:

Figure 15 - LinkProof Proximity Parameters

Selective Proximity Checks


By default, the LinkProof will perform proximity calculations using several different
internal mechanisms. In some cases, these proximity calculations may trigger IDS
systems at the destination network. With version 3.30 and later, administrators now
have to flexibility to choose which proximity methods the LinkProof uses:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 65 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 65 -

Figure 16 - LinkProof Proximity Check Settings

Basic - This is a simple test; not related to an application. This test typically applies to
inbound traffic.
Advanced - This test simulates standard applications and is used for both inbound and
outbound traffic.
Client Side - Used for outbound traffic, this test simulates a client application.
Server Side - This test simulates the server side of an application and is used for inbound
traffic.
Additionally, administrators can either Enable or Disable proximity calculations for
specific routers (right-hand column NHR Proximity Check Status):

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 66 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 66 -

Figure 17 - LinkProof Proximity Check Status per NHR

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 67 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 67 -

LinkProof Lab 5 Inbound Load Balancing and Proximity (using CLI)

Lab Goals:

Configure the LinkProof to perform inbound load balancing


Test using a DNS lookup utility
Configure the LinkProof to perform Proximity calculations

Use the configuration from the previous labs.


Step by Step:
Static NAT
1. The first step for inbound is to create static Smart NAT addresses to represent an
internal server behind your LinkProofs. You will create two external addresses for
this server, one from each Router network space.
Syntax:

lp smartnat static-nat create <Internal Start Range>


<Internal End Range> NHR-ISP <External Start Range>
<External End Range>
Notes:
Internal Range = Range of internal server IPs that you want to define a public IP
for, if you have only one server the Start and End have to be the same IP.
External Range = Range of Public IPs for the Internal Range, the external range
maps one to one in sequence for example:
192.168.200.101 192.168.200.105 1.1.1.100(NHR) 1.1.1.31 1.1.1.35
This means 101 = 31, 102 = 32 and so on.
In our lab we will set the following two entries (one for each NHR):
lp smartnat static-nat create 192.168.200.10#
192.168.200.10# 1.1.1.100 1.1.1.20# 1.1.1.20#
lp smartnat static-nat create 192.168.200.10#
192.168.200.10# 2.2.2.200 2.2.2.20# 2.2.2.20#

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 68 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 68 -

2. When complete, you can check your static NAT table:


lp smartnat static-nat

3. Once done, browse out with your Client and notice in the client table you are
going out with the Static NAT.

DNS Configuration
4. The next step in inbound configuration is the DNS configuration there are two
main parts of this configuration the first one is Name To Local IP, this table
contains all the host names that the LinkProof will resolve and their Local IP
address. This address is the same as the Local Address in the Static NAT
configuration.
Syntax:

lp dns host-to-ip-tables name-to-ip create <Host Name>


-lia <Local IP Address>
In Our Lab we will use the following:

lp dns host-to-ip-tables name-to-ip create


www.team#.com -lia 192.168.200.10#
5. The next part is the DNS Virtual IP, this IP address is used as the NS record on
the SOA DNS server, the best practice is to configure one DNS VIP per ISP, and
to also have one on the internal interface (We will explain that one with
redundancy).
Syntax:

lp dns virtual-ip create <IP Address>


In Our Lab we will use the following two addresses (50+# means add your team
number to 50):

lp dns virtual-ip create 1.1.1.50+#


lp dns virtual-ip create 2.2.2.50+#

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 69 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 69 -

6. To verify the table type in lp dns virtual-ip


7. It is recommended to change the TTL from default of zero to at least 5 seconds
up to 30 seconds.

lp dns response-ttl set 5


8. The last step is to enable the two records in reply feature, this can be used to
avoid DNS caching issues and to give clients an alternate address. This feature
is also useful in the lab to demonstrate failover.
lp dns two-records set enable
9. To test the response, from the VNC remote desktop use a terminal and the
nslookup command type in
nslookup www.team#.com 192.168.200.#
Note: If you are using Linux then you would use the host command
host www.team#.com 192.168.200.#

10. At this point you can now fail one of the two ISPs (Disable it) and run the lookup
again you should now only get one A record back.
To disable (as = 3) and enable (as = 1) you can use the following command:
lp servers router-servers set mainfarm ISP1 -as 3

Optional Components Proximity:


Note: Proximity is difficult to simulate in the lab since the difference in hops and latency is
minimal. This lab is designed to illustrate the principals behind proximity.
11. The first step is to enable proximity on the LinkProof, there are a few options you
can enable it only for Inbound or Outbound traffic, or enable it both ways, in our
lab we will enable both ways.
lp proximity mode set 5
12. The next step is to choose the importance of three variables Hops, Latency, and
Load. Depending on the desired result or the network you can modify what is
more important then the other on a scale of 1 100 with 100 being highest.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 70 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 70 -

lp load-balancing-weights hops-weight set 60


lp load-balancing-weights latency-weight set 20
lp load-balancing-weights load-weight set 80
13. Its possible to enable statistics on the proximity
lp proximity statistics status set 1
14. Open browser connections to various sites from your remote desktop (If you
changed the IP before change it back to 192.168.200.10#).
Connect to the LinkProof through the CLI and type in the following command:
lp proximity dynamic-table
This will display the LinkProofs dynamic proximity table:
Subnet

Farm name

Server 1

Latency 1

Hops 1

Server 2

Latency 2

Hops 2

Server 3

Latency 3

Hops 3

.........................................
64.236. 16.

MainFarm

Hits counter 0
1.

1.

1.100

65

213

2.

2.

2.200

85

213

69. 44.123.

MainFarm

Hits counter 0
1.

1.

1.100

25

202

2.

2.

2.200

35

202

By typing the following command you can see the proximity statistics:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 71 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 71 -

Chapter 5 Review:

What system does the LinkProof rely on for redirecting external clients to internal hosts
through various next hop routers?
What kind of records should be placed in a customers DNS server to redirect DNS
queries to the LinkProof?
What are Virtual DNS Addresses used for?
What actual addresses should be placed in a customers DNS server to redirect DNS
queries to the LinkProof?
What features can the LinkProof use to help overcome DNS lookup caching?
True or False: If a Next Hop Router is down, the LinkProof will not respond to incoming
DNS queries by giving out an address that belongs to the failed router?
In general terms, what is Proximity on the LinkProof?
The LinkProof calculates outbound proximity to what devices?
The LinkProof calculates inbound proximity to what devices?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 72 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 72 -

How does the LinkProof store entries in the Proximity Table?


When configuring proximity, what three factors can be tuned to determine the best NHR
to use?
Why would load be an important factor to consider?
By default, how long are entries stored in the proximity table on the LP?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 73 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 73 -

Chapter 6 LinkProof Redundancy


Radware recommends that its LinkProof units be installed in pairs to provide fault
tolerance in the case of a single unit's failure. Each pair of devices functions in an Active
/ Backup configuration; the backup unit will come online should the primary unit fail.
Note: LinkProof pairs do not use a dedicated connection or cable to monitor one
another's status.

VRRP Redundancy

VRRP (Virtual Router Redundancy Protocol) is available on the LinkProof running version
3.61 or later. This fairly common standard is often used between various pairs
networking devices such as firewalls or routers. It provides for a shared VR or Virtual
Router, with one device acting as the master for this VR and a second device configured
as backup for the same VR.
When discussing VRRP, it may be less confusing to think of the virtual router as a
virtual MAC address, since that is essentially how the protocol operates. By configuring
VRRP, administrators actually create a shared MAC address on the Radware device,
with one unit acting as the Master and the second as the Backup for this virtual MAC.
Once the shared MAC address has been created, administrators associate IP addresses
to it. This typically includes the interface addresses, virtual IPs, virtual DNS addresses,
etc. that reside on the Active LinkProof. The backup device is also configured with the
same IP associations as its active partner so that it can take over all associated IP
addresses should the primary device fail.
For more information regarding the VRRP protocol, see RFC 2338.

Configuration
In the case of an Active / Backup configuration, the Active LinkProof unit is
configured to handle all traffic.
The Backup device is configured with an identical NHR table containing the exact
same devices and settings. The only difference between this unit and the Active
unit is that the backup unit is set with an Operation Status of Backup.
The Backup LinkProof will periodically send out ARPs to verify that the Active unit
is available. If it fails to get responses from the active device, the Backup unit will
advertise it's MAC addresses for the IP address of its Active partner, letting all

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 74 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 74 -

devices on the networks know that it is now responsible for its failed partner's IP
addresses. The Backup device will continue to listen for it's downed partner and
will release these IP addresses should the Active unit come back online.

Table Mirroring
When a backup LinkProof is used to provide redundancy for a primary unit, it is
possible for the backup device to share the primary devices client table. Portions
or all of the table are periodically shared between the 2 devices so that in case of
a primary device failure, the secondary device can maintain the client sessions as
accurately as possible, with minimum or no client connectivity loss.

Figure 18 - Redundant LinkProofs

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 75 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 75 -

LinkProof Lab 6 VRRP Redundancy (using CLI)


Lab Goals:

Configure a pair of LinkProofs in an Active / Backup Configuration using the


VRRP Redundancy method
Test Failover by disconnecting the Active device

Note: For this lab you will partner with another team, however there is very little that
needs to be changed on the backup device, almost all the configuration is on the primary.
Pre-Configuration:
MASTER device only:
On the MASTER device we will remove the 192.168.200.# interface, as stated above we
want to change the default gateway of the internal network to a DNS VIP.

net ip del 192.168.200.#


Now add a new IP

net ip create 192.168.200.20# 255.255.255.0 2


The last step is create the DNS VIP as the default gateway

lp dns virtual-ip create 192.168.200.#


You can now reach the internet from your Client as you did before.
Redundancy Configuration MASTER device (# is your team number):
1) To configure VRRP it first must be enabled.
redundancy mode set vrrp

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 76 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 76 -

2) Now the next step is creating the VRs, we will create a VR per network the LinkProof
is on with the exception of the management network (10.10.243.x)
Syntax:
redundancy vrrp virtual-routers create <Interface> <VRID> -p
<Priority> -pip <IP on interface for VR ID>
VR ID = A number from 1 255, you have to make sure the number is unique on the
network to the Radware devices.
-p = Priority a value from 1 255 with 255 being the highest and absolute master for
a VR.
-pip = Interface IP, this is the IP that is configured on the physical interface that
reflects what network the VR belongs to (For example VR ID of 111 will be on the
192.168.200.x network).
In Our Lab use the following 3 VR IDs (Remember # is your Team number):
redundancy vrrp virtual-routers create 2 #0 -p 254 -pip 192.168.200.20#
redundancy vrrp virtual-routers create 1 #1 -p 254 -pip 1.1.1.#
redundancy vrrp virtual-routers create 1 #2 -p 254 -pip 2.2.2.#

3) Once the VRs are created we can now associate all the IPs to these VRs, we need to
associate ALL Smart NAT IPs and ALL DNS VIPs
Syntax:
redundancy vrrp associated-ip create <Interface> <VRID> <IP>
IP = IP you want to bind to the VR ID
In Our Lab we will associate the following IPs See table on the next page:

Port Index

VR ID

Associated IP

Description

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 77 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 77 -

F-2

#0

192.168.200.#

F-1

#1

1.1.1.10#

F-1

#2

2.2.2.10#

F-1

#1

1.1.1.20#

F-1

#2

2.2.2.20#

F-1

#1

1.1.1.50+#

F-1

#2

2.2.2.50+#

DNS VIP on Port 1


Dynamic NAT IPs
Static NAT IPs
DNS Virtual IPs

redundancy vrrp associated-ip create 2 #0 192.168.200.#


redundancy vrrp associated-ip create 1 #1 1.1.1.50+#
redundancy vrrp associated-ip create 1 #1 1.1.1.10#
redundancy vrrp associated-ip create 1 #1 1.1.1.20#
redundancy vrrp associated-ip create 1 #2 2.2.2.50+#
redundancy vrrp associated-ip create 1 #2 2.2.2.10#
redundancy vrrp associated-ip create 1 #2 2.2.2.20#
4) At this point we are ready to enable the virtual routers on the Master device.
redundancy vrrp virtual-routers set 2 #0 -as 1
redundancy vrrp virtual-routers set 1 #1 -as 1
redundancy vrrp virtual-routers set 1 #2 -as 1
5) The last two steps on the primary device is to enable interface grouping this will allow
the LinkProof to failover if one of the interfaces go down however we want to make
sure the management port is not taken down when this happens.
To enable interface grouping:

redundancy interface-group set 1


To exclude the management port 16 from interface grouping:
NOTE: On the ODS hardware the MNG-1 port is excluded by default!

redundancy master-interface-group set 16 -s 2

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 78 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 78 -

6) Now, the peer addresses must be configured on the Master device. The peer
addresses allow the Master device to automatically create a configuration for the
Backup device.
The command is: net ip-interface set <master ip> -pac <backup ip>
In our lab we will use the following commands:
net
net
net
net

ip-interface
ip-interface
ip-interface
ip-interface

set
set
set
set

192.168.200.20# -pac 192.168.200.X


1.1.1.# -pac 1.1.1.X
2.2.2.# -pac 2.2.2.X
10.10.243.# -pac 10.10.243.X

Redundancy Configuration BACKUP device:


(# is the MASTER team number X is the Backup team number):

7) The only thing that is needed on the backup devices is the management interface. If
the Backup LinkProof is already configured for one of the previous labs, then nothing
further needs to be done.
IP Addresses for Backup (if needed)
net ip create 10.10.243.x 255.255.248.0 mng-1
Web Based Management Configuration Download/Upload
8) At this point we have to switch to Web Based Management to finish the redundancy
configuration. Open up Internet Explorer on your remote desktop (VNC session) and
browse to the primary device at http://10.10.243.#. The user name will be team# and
the password will be team#
9) Go to File Configuration Receive from Device. Choose Backup (ActiveBackup) and press the Set button. Change the name of the file so that you can
recognize it as the backup redundancy configuration and save it to the remote
desktop. .
10) Browse to the Backup linkproof at http://10.10.243.X. Go to File Configuration
Send to Device on the Backup linkproof and choose Replace configuration file as
the Upload mode. Press the Set button and press the Set button on the popup
message to reset the backup LinkProof (If you dont see the pop-up message, go to

Device Reset Device in order to reboot the backup LinkProof).

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 79 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 79 -

Test of the Redundancy


At this point the backup up is now configured to take over in the event of the master
device failing. We will simulate a failover in the class we will take down one of the
interfaces of the primary unit. Since we have the Management Port excluded from
Interface grouping you should still have connectivity to the Master device.
11) From the Remote Desktop (VNC session), ping an outside address continuously
(4.2.2.2 for example) and ping the default gateway 192.168.200.#
12) On the Master device use the following command to force failover:

net port down 1


13) On the Backup you should see messages that it has taken over and the Pings should
still be working, with maybe 1 missed ping.
LinkProof#19-09-2008 17:03:03 INFO VRRP: now master of VR ID 12
14) Fail back to the Master:

net port up 1
Chapter 6 Review Questions:
True or False - Generally speaking, a backup LinkProof should be configured identically
to its active partner.
What settings are different on a backup device than on an active device?
What is Mirroring and what is it designed to accomplish?
What is Interface Grouping and should it be enabled on an Active or Backup Unit?
True or False: when a backup device takes over for an active device, entries in the IP
Redundancy Table on a Backup device should have an Operating Status of InActive
How can you verify that a backup LinkProof has taken over for a failed active LinkProof?
What does VRRP stand for?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 80 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 80 -

What are VRs?


What are Associated IP Addresses?
How does a backup device monitor the status of an active device using VRRP?
What is different about VRRP from the Proprietary redundancy method?
What setting determines which device is master in an Active/Backup VRRP
configuration?
What should you do before implementing VRRP on a pair of LinkProof in an existing
network?
If you have four physical interfaces with 8 different networks in use on a pair of
LinkProofs, at least how many VRs would you need to configure on each unit?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 81 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 81 -

Chapter 7 One IP Configuration


In some cases when installing the LinkProof there is only one IP available or a customer
wants to only use a single IP for multiple servers accepting inbound traffic.
One IP configuration has two main parts
Outbound Dynamic NAT
Inbound Static PAT
For outbound Dynamic NAT the physical interface IP can also be used as the Dynamic
NAT IP thus there is no need to configure another IP address for Dynamic NAT.
Inbound Static PAT allows a user to configure the LinkProof to accept traffic for multiple
backend systems on a single external IP. For example a network might have a resource
server on HTTP and an email server on port 25, they can now use the same external IP
address for both systems.
This feature can be combined with the Outbound NAT to use a single IP for all inbound
and outbound traffic or it can be used on its own without the one IP configuration.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 82 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 82 -

LinkProof Lab 7 One IP Configuration (using CLI)

Lab Goals:

Configure the LinkProof to only use its interface for outbound dynamic
NAT

Configure inbound SPAT

One IP can only be configured from the CLI or WBM

Step-by-Step
NOTE: Single IP configuration and redundancy are not fully supported at this time please
be aware that this configuration is for locations were a redundant LinkProof will not be
used or is not needed.
1) Restore the configuration saved at the end of Lab 2
2) From the CLI to enable the Interface for 1 IP use the following command:
net ip-interface set <IP Address> -oi <enable or disable>
net ip-interface set 1.1.1.# -oi enable
net ip-interface set 2.2.2.# -oi enable
3) Delete the previously configured dynamic NAT (In Lab 2) and you will create a new
dynamic NAT using the IP of the interface:
4) Create a new Dynamic NAT to the interface IP (Where # is your team number)
lp smartnat dynamic-nat create 0.0.0.1 255.255.255.254 1.1.1.100
1.1.1.#
lp smartnat dynamic-nat create 0.0.0.1 255.255.255.254 2.2.2.200
2.2.2.#

5) Create a SPAT for a web server and email server:


a) First you have to change the web based management port
manage web server-port set 8080

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 83 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 83 -

b) Then configure the Static NAT


lp smartnat static-pat add 192.168.200.10# 80 tcp 1.1.1.100
1.1.1.# 80
lp smartnat static-pat add 192.168.200.10# 80 tcp 2.2.2.200
2.2.2.# 80
lp smartnat static-pat add 192.168.200.10# 25 tcp 1.1.1.100
1.1.1.# 25
lp smartnat static-pat add 192.168.200.10# 25 tcp 2.2.2.200
2.2.2.# 25

6) Test Outbound Traffic, and if you have a web service running on your Client you can
test it from the outside.
End of Lab 7 Please wait for your Instructor before Continuing

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 84 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 84 -

LinkProof Management
LinkProof Lab 8 Managing the LinkProof (using CLI)
Lab Goals:

Enable and configure various options related to managing the AppDirector itself

Step By Step:
Enabling Management Traffic:
manage
manage
manage
manage

web status set enable


secure-web status set enable
telnet status set enable
ssh status set enable

Enabling Management Traffic by port (Default All Ports Enabled):


1. From the CLI you can type
Syntax:
manage management-port set <Interface> <Management
Type> <1 = on 2 = off>
The Mangement Types are:
-sn : SNMP
-t : TELNET
-sh : SSH
-w : WEB
-sl : SSL
Disable Port 2 for all management:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 85 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 85 -

manage
manage
manage
manage
manage

management-port
management-port
management-port
management-port
management-port

set
set
set
set
set

2
2
2
2
2

sn 2
t 2
sh 2
w 2
sl 2

Note that each management method (telnet, web, etc.) must be enabled globally
regardless of the port status for that method.

Enabling Different Traps Outputs:


2. There are three different systems that can be configured to receive event traps
from the device; SNMP, SYSLOG, SMTP. Each one will be discussed.
3. To Enable a device to receive SNMP:
Syntax:
manage snmp target-address create <Name> -a <IP Address UDP Port> -tl
<v3Traps> -p <radware-authPriv> -tm <Subnet Mask>
Example:
manage snmp target-address create ManagePro -a 192.168.150.254-162 -tl
v3Traps -p radware-authPriv -tm 255.255.255.0
4. To Enable Syslog:
a. manage syslog status set 1
b. manage syslog server set <IP Address of Server>
5. To Enable SMTP:
a. First a user must be created with an email address and severity of the
traps to send:
Syntax:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 86 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 86 -

manage user table create <Name> -pw <Password> -e


<Email Address> -sv <Severity Level>
-sv can have one of the following values:
(1) none
(2) info
(3) warning
(4) error
(5) fatal
Example user with all traps Info and above
manage user table create team# -pw team# -e
team#@team#.com sv 2
Note: If the user already exists use set instead of create.
b. Second the SMTP Service needs to be configured:
services smtp status set enable
services smtp send-emails-on-error set enable
services smtp main-smtp-address set <IP Address>
services smtp own-addr set radware@team#.com
Changing the SNMP community for SNMP v1 (See page 110 for SNMP v3)
6. To change the community use the following commands in sequence:
manage snmp users create <Username>
manage snmp groups create SNMPv1 <Username> -gn
<GroupName>
manage snmp access create <Groupname> SNMPv1
noAuthNoPriv -rvn iso -wvn iso -nvn iso
manage snmp community create <Index-can be a name or
number> -n <community string> -sn <Username>
In our Lab we will do the following:
Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 87 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 87 -

manage snmp users create Team#


manage snmp groups create SNMPv1 Team# -gn V1
manage snmp access create V1 SNMPv1 noAuthNoPriv -rvn
iso -wvn iso -nvn iso
manage snmp community create 10 -n team# -sn Team#
.

Interface Configuration:
7. In many circumstances you need to set the speed and duplex of the port. To
change the Layer 2 status:
a. Port Status:
Net port up/down <Interface>
b. Force duplex/speed
net physical-interface set <Interface> -s <Speed>
-d <Duplex> -a <Auto Negotiate>
Values for s are:
(1) Ethernet
(2) Fast Ethernet
(3) Giga Ethernet
(4) XG Ethernet
Example: Setting Interface 3 to 100/Full
net physical-interface set 3 s 2 d Full a off
Saving and viewing the Configuration:
8. The configuration file can be saved CLI or Web based management. It is a little
tricky to save the configuration in CLI (See Below).

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 88 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 88 -

9. To view the running configuration:


system config immediate

Collect trouble-shooting information about the type of unit itself.

10. Use the following CLI commands to gather additional information about the
device:
system device-info
Device Information

Type:

LinkProof Application Switch

Platform:

PPC 7410 processor

Ports:

21

Ports Config:

16 Fast Ethernet + 5 Giga Ethernet

HW version:

1.10

SW version:

3.61.02

Build:

Feb 13 2003, 15:30:41

Version State:

Final

BWM version:

2.30.04 RAM size:

Flash size:

8 MB

Registered:

No

Date:

29.10.2002

Time:

16:34:59

Up time:

0 days, 1 hour, 1 minute, 23 seconds

Base MAC:

00:03:b2:0c:58:00

256 MB

system logfile
Log file is empty

system os cpu

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 89 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 89 -

Device Resource Utilization


---------------------------RS Resource Utilzation : 0
RE Resource Utilzation : 0
Last 5 sec. Average Utilzation : 0
Last 60 sec. Average Utilzation : 0
Maximum Utilization

: 0

statistics ip
------------ IP Counters -----------ipInReceives

573

ipInHdrErrors

ipInAddrErrors

ipForwDatagrams

ipInUnknownProtos

ipInDiscards

ipInDelivers

563

ipOutRequests

543

ipOutDiscards

ipOutNoRoutes

ipReasmReqds

ipReasmOKs

ipReasmFails

ipFragOKs

ipFragFails

ipFragCreates

net arp table


Arp Table
Interface Index IP Address

MAC Address

Type

00e0987b5c08

dynamic

192.168.1.100

net l2-information
Interface Table
ifIndex

mac_addr

adm

1 0003b20c5800 up

oper

InUcastPkt InNUcastPkt OutUcastPkt OutNUcastPkt

up

4291523310

13

4291523310

14

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 90 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 90 -

2 0003b20c5801 up

up

3039383792

1103

3039383792

16

3 0003b20c5802 up

down

3236458074

3236458074

4 0003b20c5803 up

down

2878078969

2878078969

5 0003b20c5804 up

down

6 0003b20c5805 up

down

4050775923

4050775923

7 0003b20c5806 up

down

4225863528

4225863528

net l2-interface
interface Table

Interface Index

MAC Address

Interface Admin

Status

Operational Status

0003b2174540

up

up

0003b2174541

up

up

0003b2174542

up

down

0003b2174543

up

down

0003b2174544

up

down

0003b2174545

up

down

0003b2174546

up

down

0003b2174547

up

down

net physical-interface
Physical Interface Table

Port Index

Speed

Duplex

Auto Negotiate

Ethernet

Half

Off

Ethernet

Half

On

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 91 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 91 -

Ethernet

Half

On

Ethernet

Half

On

Ethernet

Half

On

Ethernet

Half

On

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 92 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 92 -

Bandwidth Management
This component of Radware APSolute OS architecture requires an additional license for
each device.
The Bandwidth Management module extends comprehensive control over bandwidth
resource allocation, to prioritize all network traffic and guarantee service levels for
mission critical applications. Bandwidth management policies enable the classification of
traffic by user, applications, and service pricing models for the configuration and full
enforcement of premium services, and differentiating application performance by
business requirements, while regulating site-wide bandwidth consumption and costs.
Bandwidth Management offers a robust classification engine. Users may be differentiated
between types of traffic according to any of the above parameters and to define the
appropriate handing of the traffic class. This ensures that the quality of service and
allocated bandwidth is appropriate for each identified type of traffic, ensuring that service
is consistent and reliable.
Functionality of the bandwidth management module includes

Prioritizing traffic based on source IP, destination IP, addresses, and range of
addresses, application, port, and content/URL.

Bandwidth limitation by source and destination IP addresses and groups of


addresses, application, port, content/URL, and cookies.

Guaranteed bandwidth per class of traffic.

Bandwidth borrowing may be invoked when the allocated bandwidth for certain
priority queues reaches its limit. In such cases, if bandwidth for other queues is
not being utilized, it can be borrowed in order to alleviate potential bottlenecks
during traffic bursts.

A combination of prioritization and bandwidth limitation can be assigned to each


class of traffic, ensuring the optimal implementation of traffic policies.

Allows differentiating services for groups of users by content.

Dynamic priority setting through the session.

Diff-Serv support including fulfillment and honoring of an assigned priority.

Multiple scheduling dispatch mechanisms including Weighted Round Robin, Class


Based Queuing and Random Early Drop ensure a flexible, configurable, and
optimized scheduling mechanism.
o

Weighted Round Robin (WRR) This scheduling algorithm forwards


packets from each queue according to its priority until bandwidth limitation

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 93 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 93 -

is met. It is most used when the user wants to tune bandwidth


management according to the priority of each class.
o

Class Based Queuing (CBQ) According to CBQ algorithm, within each


priority queue, packets are scheduled from each class of traffic ensuring
that there is no starvation of any class. This ensures that all classes within
the same priority queue evenly share the bandwidth and that bandwidth
limitation and guarantees are met. This algorithm is more suitable for
management by bandwidth limitations. Support for borrowing bandwidth
between queues is built into the CBQ algorithm and ensures overall
optimization of bandwidth usage. The user can specify which classes are
entitled to borrow traffic and which classes can be borrowed from.

Random Early Drop (RED) When queues overflow, this is mechanism


randomly drops packets from lower priority queues. Because of the nature
of the traffic, dropped packets are resent.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 94 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 94 -

LinkProof Lab 9 Bandwidth Management on the


LinkProof (using CLI)
Lab Goals:

Lab A Bandwidth Management Setup

Lab B Basic Block Policy

Lab C Working with queues and bandwidth limits

Lab D Advanced Bandwidth Management Policies

Lab E Bandwidth per flow

Lab A Bandwidth Management Setup

Lab Goals:

Setting up Initial Bandwidth Management components.

Working with Classes


a. Setting Up Networks
b. Viewing Filters
c. Port Groups

Note: It is difficult to generate enough traffic in a lab environment to


saturate the bandwidth available. In order to illustrate the features
detailed in this lab, the guaranteed minimum and borrowing
bandwidth limits have been set artificially low

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 95 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 95 -

Step By Step:

1. Create several network entities following the guidelines below.


Network Name

Network
Mode

IP Address or From

Mask or To IP

LAN

Mask

192.168.0.0

255.255.0.0

LAN

IP Range

10.10.110.1

10.10.110.50

DNS

Mask

4.2.2.0

255.255.255.0

ISP 1

IP Range

1.1.1.20

1.1.1.254

ISP 2

IP Range

2.2.2.20

2.2.2.254

Classes modify network create <Name> <Sub Index> <-switch value>


Switches:
-a
-s
-f
-t
-m

:
:
:
:
:

Address
Mask
From IP
To IP
Mode

In our case:
classes modify network create LAN 0 -a 192.168.0.0 -s 255.255.0.0
-m "IP Mask"
classes modify network create LAN 1 -f 10.10.110.1 -t 10.10.110.50
-m "IP Range"
classes modify network create DNS 0 -a 4.2.2.0 -s 255.255.255.0 -m
"IP Mask"
classes modify network create ISP1 0 -a 1.1.1.20 -f 1.1.1.20 -t
1.1.1.254 -m "IP Range"
classes modify network create ISP2 0 -f 2.2.2.20 -t 2.2.2.254 -m
"IP Range"

2. Update the policies to activate the settings:


bwm update-policies set 1

3. Once complete it should look like the following:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 96 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 96 -

4. We create a physical port group named MyPorts using port 1-4.


classes modify physical-port-groups create MyPorts 1
classes modify physical-port-groups create MyPorts 2
classes modify physical-port-groups create MyPorts 3
classes modify physical-port-groups create MyPorts 4
bwm update-policies set 1

5. Now we adapt the global BWM Parameters.


Set the following parameters:
a. RED = Global
bwm global red-mode set global

b. Check Dynamic Borrowing


bwm global dynamic-borrowing set enable

c. Set the SRP management IP address to 192.168.150.254


LP 6.x:
statistics protocol management-ip set 192.168.150.254
LP 5.x:
statistics reporting management-ip set 192.168.150.254
statistics protocol status set enabled

d. Enable ALL the reporting options


bwm statistics reporting set true
bwm statistics status set enabled

e. Reboot the device to activate the changes


reboot

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 97 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 97 -

Lab B Creating a Simple Block Policy in BWM

Lab Goals:

Create a Bandwidth Management policy to block pings to the


target server.

Test the policy.

Step By Step
1. Ping an external address to make sure you get a response for
example 4.2.2.2.
2. Create a new policy to block outbound ping traffic.
3. Use the information below to create the policy:
Policy Name

Block-Ping

Source

LAN

Destination

any

Direction

One Way

Action

Block

Service Type

Basic Filter

Service Name

icmp

Reporting

Report Block Packets

LP 6.x:
bwm modify policy create Block-Ping -dst any -src LAN -ac Block dr "One Way" -pt "Basic Filter" -p icmp -rep "Report Blocked
Packets"
bwm modify policy-extensions set Block-Ping -cp "Before Changes"
bwm update-policies set 1

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 98 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 98 -

LP 5.x:
bwm modify policy create Block-Ping -dst any -src LAN -ac Block dr "One Way" -pt "filter" -p icmp -rbp 1
bwm global nat-handling dynamic-nat set "Local Address
Classification"
bwm global nat-handling static-nat set "Local Address
Classification"
bwm update-policies set 1

4. Try to ping the same address from step1 and it should now fail.

If you have the console connected you should also have a trap
saying the session was blocked.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 99 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 99 -

Lab C Creating a simple minimum and maximum policy

Lab Goals:

Create multiple policies using existing services.

Test the policy.

Step By Step:
1. Open up an HTTP session to some website and FTP sites to verify connection
speed or gauge how fast the connections will load.
2. Create a policy for FTP traffic.
Policy Name

FTP

Service Type

Regular Service

Service Name

ftp-session

Source

LAN

Destination

any

Direction

Two Way

Action

Forward

Priority

Maximum Bandwidth

100

Borrowing Limit or
Maximal Bandwidth

150

LP 6.x:
bwm modify policy create FTP -dst any -src LAN -pr 0 -gbw 100 -pt
"Basic Filter" -p ftp-session -mbw 150
bwm modify policy-extensions set FTP -cp "Before Changes"
LP 5.x:
bwm modify policy create FTP -dst any -src LAN -pr 0 -gbw 100 -pt
"filter" -p ftp-session -bl 150

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 100 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 100 -

3. Add a second entry for HTTP, with the following parameters:


Policy Name

HTTP

Service Type

Regular Service

Service Name

HTTP

Source

LAN

Destination

any

Direction

Two Way

Action

Forward

Priority

Guaranteed Bandwidth

100

Borrowing Limit or
Maximal Bandwidth

150

LP 6.x:
bwm modify policy create HTTP -dst any -src LAN -pr 0 -gbw 100 -pt
"Basic Filter" -p http -mbw 150
bwm modify policy-extensions set HTTP -cp "Before Changes"
LP 5.x:
bwm modify policy create HTTP -dst any -src LAN -pr 0 -gbw 100 -pt
"filter" -p http -bl 150

4. Now we have to Update Active Policies


bwm update-policies set 1

5. To verify if the policy is configured correctly issue


bwm active policy

And you should see these new policies in the list.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 101 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 101 -

6. From your Client, FTP to a site and download a file, also go to


various web pages for about 2 minutes.
7. Issue the following command during this period to monitor the
bandwidth policies.
bwm monitor policy-bandwidth

8. Stop the FTP session.


9. If time permits, repeat this lab using other guaranteed and
maximal values to see the different behavior.
End of Radware LinkProof Training Thank you

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 102 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 102 -

Web Based Management Lab Steps


The following information provides details on how to configure each lab using the Web
interface. Note that screen shots based on version 5.22 and only provide examples of
what the configuration should look like on a single device in many cases. In version 6.x
the Web Based Management is looking different, but you have the same menu
structure.
The Web Based Management (WBM) section describes only the configuration steps. For
more details go to the corresponding chapter of the CLI configuration above.

WBM Chapter 2 Farm Configuration for the LinkProof

LinkProof Lab 2 Creating a Farm and adding NHRs (using WBM)

Lab Goals:

Configure the next hop routers

Enable Smart NAT

Review various parameters and settings available for devices

Step by Step:
Creating a basic NHR Farm:
1. First browse to your LinkProof and put in your user name and password to get to
the main menu.
2. The first step to working with NHRs is to create the farm, use the following
command to create a basic farm:
LinkProof Farms Farm Table, click Create and fill in the following:
a. Farm Name = mainfarm
b. NAT Mode = Enable

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 103 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 103 -

c. Persistency Mode = Client Table


d. Click Set to save the changes.

3. When adding a new ISP/NHR you need some basic information before you can
add it to the LinkProof.
a. The IP and Subnet of the ISP, the LinkProof must have an interface in the
same subnet as the ISP (we created these interfaces in Lab 1).
b. The best practice is to make sure all interfaces that will be used in the
configuration are up. Use the command net l2-interface to
verify all interfaces have link.
4. To add the NHRs to the farms created above with default parameters do the
following:
LinkProof Servers Logical Routers Table, click Create.
a. Farm Name = mainfarm
b. Router Name = ISP1
c. IP Address = 1.1.1.100
d. Click Set to save the information, then Create the second ISP
e. Farm Name = mainfarm
f. Router Name = ISP2
g. IP Address = 2.2.2.200
h. Click Set to save and you should have two routers in the table.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 104 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 104 -

5. Once you add the two ISP you should see in the CLI that they are up, the
LinkProof is by default doing an ICMP health check to verify connectivity. We
will change these parameters in a later lab.
25-07-2008 20:53:13 INFO Server mainfarm ISP1 up
25-07-2008 20:53:14 INFO Server mainfarm ISP2 up
At this point the LinkProof will load balance any traffic that passes through requiring
routing to the default gateway. However to establish connectivity you must configure
Dynamic NAT for outbound traffic (Dynamic NAT is the same as Hide NAT or PAT).
Note: Dynamic NAT is a layer 4 NAT therefore if the traffic is not TCP or UDP it will have
issues with the NAT.
6. For each ISP use a single new IP address that is on the same Subnet as the ISP for
this lab we will use the following two IP address for each team (where # is the
team number).
ISP1 = 1.1.1.10#
ISP2 = 2.2.2.10#
Use the following command to add the NAT entries to the LP.
LinkProof Smart NAT Dynamic NAT Table, click Create
ISP1
a. From Local IP = 0.0.0.1
b. To Local IP = 255.255.255.254
c. Server IP = 1.1.1.100

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 105 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 105 -

d. Dynamic NAT IP = 1.1.1.10#


e. Click Set to save the changes and click Create for the second entry.
ISP2
f. From Local IP = 0.0.0.1
g. To Local IP = 255.255.255.254
h. Server IP = 2.2.2.200
i.

Dynamic NAT IP = 2.2.2.10#

j. Click Set to save the changes

Some Examples Below:


Team

From Local IP

To Local IP

Router IP

Dynamic
Nat IP

NAT
Redundancy
Mode

Team1

0.0.0.1

255.255.255.254

1.1.1.100

1.1.1.101

Regular

0.0.0.1

255.255.255.254

2.2.2.200

2.2.2.101

Regular

0.0.0.1

255.255.255.254

1.1.1.100

1.1.1.102

Regular

0.0.0.1

255.255.255.254

2.2.2.200

2.2.2.102

Regular

0.0.0.1

255.255.255.254

1.1.1.100

1.1.1.110

Regular

0.0.0.1

255.255.255.254

2.2.2.200

2.2.2.110

Regular

0.0.0.1

255.255.255.254

1.1.1.100

1.1.1.111

Regular

0.0.0.1

255.255.255.254

2.2.2.200

2.2.2.111

Regular

Team2
Team10
Team11

You can always get a summary of all the NAT addresses in use with:
LinkProof Smart NAT NAT Parameter Summary

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 106 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 106 -

7. Make certain that your Virtual Appliance gateways are set to the internal
interface of the LinkProof (See Pre-configuration)
8. Open browser sessions from your Virtual Appliance Session to external hosts, if
available and you should be able to connect.
9. View the connection table on the LinkProof CLI to see the active connections
lp client table
You should see something like the following:

Figure 19 Client Table

Changing the Dispatch Method:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 107 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 107 -

10. The default dispatch method for the LinkProof is cyclic, this means that each
session will be dispatched to the next router based on where the last session was
sent. To test the different modes we will set the client aging time to a very low
number (20 seconds) to age out from the table faster.
LinkProof Farms Farm Table, click on mainfarm
Change Client Aging Time to 20 and click Set.
11. Now find a simple website that opens few connections for example:
http://www.igga.org, in the client table notice what NHR was selected. Wait to
age out of the client table (20 seconds) and then refresh the browser you should
be directed to the second ISP.
12. Change the dispatch method to Least Amount of traffic:
LinkProof Farms Farm Table, click on mainfarm
Change Dispatch Method to Least Amount of Traffic and click Set.
13. Test the new method by browsing to some websites and observe what happens
in the client table.
(Hint the majority of connections should end up on ISP1)
14. Change the Dispatch Method to Fewest Number of Users. Test this new method
as above and observe the client table.
Viewing and Saving the Configuration File:
15. At this point it will be a good idea to save the basic configuration created above.
To view the configuration in CLI type in:
system config immediate
16. Although this configuration can be copied to a text file and saved, it can be hard
to work with until you have more understanding of the CLI, to save the
configuration from web based management.
File Configuration File Receive from Device

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 108 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 108 -

Keep the Configuration Type as Regular and hit the Set button to save the
configuration to the desktop. You can re-name the configuration file if you like.

End of Lab 2 Please continue with Lab 3.

LinkProof Chapter 2 Review

How many devices (total) can the LinkProof load balance?


How Many ISPs can the LinkProof load balance (Routers with Proximity)
What load balancing methods are available on the LinkProof?
What is SmartNAT?
What types of SmartNAT are available on the LinkProof?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 109 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 109 -

Chapter 3 Device Management for LinkProof


The LinkProof has a number of features that allow administrators to control and adjust
traffic to routers with minimum impact on services. Administrators can introduce
routers into the load balancing cluster smoothly; a new router can be added with only
few simple entries using ConfigWare or the CLI; and routers can be brought down
gracefully for maintenance or upgrades with a single configuration change.

LinkProof Lab 3a Device Management for LinkProof (using WBM)

Lab Goals:

Modify various settings designed to help manage routers

Configure Aging By Application

Use Connectivity Checks and Enable Health Monitoring (Lab 3b)

Step-by-step:
Admin Status and Operation Mode:
To view the effects of changing the operation mode to shutdown (no new sessions sent
to the active NHR all existing sessions remain) we will set one of the NHRs to backup.
1) Change the second ISP to backup:
LinkProof Servers Logical Routers Table, click on the link next to ISP 2.
Change OperMode to Backup, and click Set to save.
2) Change the Farm global aging time to 45 seconds:
LinkProof Farms Farm Table, click on mainfarm
Change Client Aging Time to 45 and click Set to save.
3) Browse to the internet and make sure you have client table entries all going to ISP1:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 110 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 110 -

lp client table
4) Set the first ISP to shutdown mode:
LinkProof Servers Physical Servers Table, click on ISP1.
Change the Admin Status to Shutdown, click Set to save.
Wait to see a trap in the CLI that the ISP is ready for shutdown (you may not get the
trap if there is no traffic on ISP1.
5) Change both ISP1 and ISP2 back to their normal modes:
ISP 2 set back to Regular and ISP 1 set back to Enabled.
LinkProof Servers Physical Servers Table, click on ISP1.
Change the Admin Status to Enable, click Set to save.
LinkProof Servers Logical Routers Table, click on the link next to ISP 2.
Change OperMode to Regular, and click Set to save.

Recovery Time:
To avoid the situation where an ISP will flap (come into service and fail quickly after) its
advisable to set the Recovery Time, the amount of time the LinkProof will wait after the
ISP passes a health check before sending it traffic. Its important to note this timer can
only be used if the ISP actually failed. If you disabled and re-enabled the ISP it would
ignore this timer.
6) Setting the Recovery Time on the ISPs to 60 seconds:
LinkProof Servers Physical Servers Table, click on ISP1.
Change the Recovery Time to 60, click Set to save.
LinkProof Servers Physical Servers Table, click on ISP2.
Change the Recovery Time to 60, click Set to save.
Aging By Port:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 111 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 111 -

7) This table allows you to define different aging times for different applications. You
may wish to age some times of traffic out of the client table sooner than the global
aging time of one hour; or you may wish to have the device retain traffic types in the
table for a longer period of time.
8) Define an aging time of 15 seconds for HTTP and 5 seconds for DNS:
Anything that is not defined specifically in this table will use the Farm Client Aging
Time.
LinkProof Global Configuration Client Table Aging By Application Port,
click Create
HTTP:
Application Port = 80
Aging Time = 15
Click Set to Save, click Create for the DNS
DNS
Application Port = 53
Aging Time = 5
9) Using the Virtual Appliance, ping an address (ICMP) and open browser sessions and
check the client table to determine how long entries for DNS and HTTP are retained,
the ICMP should stay for a long time after both DNS and HTTP age out.

10) Restore the configuration from Lab 2.


Using Web based Management:
i) File Configuration File Send to Device, browse to where you saved the
file and then click Set. A small pop-up window will appear, prompting you to
reboot. If a pop-up blocker keeps the window from opening, then go to
DeviceReset Device and click the Set button.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 112 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 112 -

LinkProof Lab 3b Connectivity checks and Health Monitoring (using


WBM)

Lab Goals:
Configure Full Path Health Monitoring.
Health Monitoring Mandatory Checks
Health Monitoring Non-Mandatory Checks
Connectivity Checks Lab:

Configure your LinkProof to use Health Monitoring checks to verify the availability of
the Next-Hop-Routers.
Step-by-Step:
6) Change a few of the settings for connectivity checks:
a) Change the Connectivity Check Interval from 10 to 5. This setting instructs the
LinkProof to check each NHR once every 5 seconds.
b) Change the Connectivity Check Retries from 5 to 3. This setting means that a
NHR can fail three consecutive health checks before the LinkProof will confirm
that it is unavailable and will no longer load-balance traffic to it.
LinkProof Farms Farm Table, click on mainfarm.
Change Connectivity Check Interval to 5
Change Connectivity Check Retries to 3
Click Set to save.
7) To test the full path we will configure each of the ISPs to ping an address beyond
their external side in this case we will use 192.168.150.100 for both routers.
LinkProof Servers Full Path Health Monitor Table, click on Create.
a) Farm Name = mainfarm
b) Server Name = ISP1
c) Check Address = 192.168.150.100
d) Click Set then Create to create one for ISP2
e) Farm Name = mainfarm

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 113 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 113 -

f) Server Name = ISP2


g) Check Address = 192.168.150.100
h) Click Set to save and you should have the following table:

8) Ask your instructor to unplug the external connection (Or disable it) from one of the
Routers.
9) Type in lp servers router-servers get in the CLI and repeat a few
times until one of the routers shows not in service-- or click on the Green Refresh
button in the top right of the Web Based Management screen until one of the
routers shows not in service
10) Plug the connections for the router back in before continuing to the next lab.

Health Monitoring Lab


Health Monitoring Mandatory Checks:

7) To use health monitoring connectivity checks must be turned off on each farm
LinkProof Farms Farm Table, click on mainfarm.
Change Connectivity Check Status to Health Monitoring
Click Set to save
8) The next step enable is to enable Health Monitoring:
Health Monitoring Global Parameters
Change Health Monitoring Status to Enable
Click Set to save.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 114 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 114 -

9) Once Health Monitoring is turned on the next step is to create the actual health
checks, we will start with basic checks of Ping and ARP for this part of the lab. To
create the first check:
Health Monitoring Checks Table, click Create
a)
b)
c)
d)
e)
f)
g)

Check Name = ISP1-ARP-Inside


Method = ARP
Dest. Host = 1.1.1.100
Interval = 5
Retries = 2
Timout = 3
Click Set

10) Now we will create an additional 3 checks 1 ARP to ISP 2 and two pings tests to the
outside:
ARP ISP2
a) Check Name = ISP2-ARP-Inside
b) Method = ARP
c) Dest. Host = 2.2.2.200
d) Interval = 5
e) Retries = 2
f) Timout = 3
g) Click Set
Ping ISP 1
h) Check Name = ISP1-Ping-Outside
i) Method = Ping
j) Dest. Host = 192.168.150.100
k) Next Hop = 1.1.1.100
l) Interval = 5
m) Retries = 2
n) Timout = 3
Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 115 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 115 -

o) Click Set
Ping ISP 2
p) Check Name = ISP2-Ping-Outside
q) Method = Ping
r) Dest. Host = 192.168.150.100
s) Next Hop = 2.2.2.200
t) Interval = 5
u) Retries = 2
v) Timout = 3
w) Click Set

Note: If they do not all say pass, click on the refresh button in the right hand side of the
screen
11) Once the 4 checks are created (2 for each ISP; 1 Inside, 1 Outside) we have to bind
these checks to the NHR farm to fail the routers when a check fails.
Health Monitoring Binding Table, click Create.
ISP1-ARP
a)
b)
c)
d)

Check = ISP1-ARP-Inside
Server= NHR: mainfarm/ISP1
Group = 1
Click Set to save

ISP2-ARP
e) Check = ISP2-ARP-Inside
f) Server= NHR: mainfarm/ISP2
g) Group = 1

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 116 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 116 -

h) Click Set to save


ISP1-Ping
i) Check = ISP1-Ping-Outside
j) Server= NHR: mainfarm/ISP1
k) Group = 1
l) Click Set to save
ISP2-Ping
m) Check = ISP2-Ping-Outside
n) Server= NHR: mainfarm/ISP2
o) Group = 1
p) Click Set to save

12) Once you are configured ask your instructor to take down the outside interface of
one of your routers, you should see it fail the check after a few seconds.

Have your instructor bring the NHR back online before proceeding.

Health Monitoring Non-Mandatory Checks:


9) Remove all the health checks form the binding table.
Health Monitoring Binding Table
Click on the box under the X column and click Delete.
10) Create 4 DNS checks going out 2 for each ISP.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 117 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 117 -

Health Monitoring Checks Table, click Create


DNS to Yahoo ISP 1
a) Check Name = ISP1-DNS-Yahoo
b) Method = DNS
c) Dest. IP = 4.2.2.2
d) Next Hop = 1.1.1.100
e) Destination Port = 53
f) Interval = 5
g) Retries = 2
h) Timout = 3
i) Arguments = HOST=www.yahoo.com|
Note: you can also click on the next to Arguments and put in the Host Name
j) Click Set then click Create for the next one
DNS to Google ISP 1
k) Check Name = ISP1-DNS-Google
l) Method = DNS
m) Dest. IP = 4.2.2.3
n) Next Hop = 1.1.1.100
o) Destination Port = 53
p) Interval = 5
q) Retries = 2
r) Timout = 3
s) Arguments = HOST=www.google.com|
Note: you can also click on the next to Arguments and put in the Host Name
t) Click Set then click Create for the next one
DNS to Yahoo ISP 2
u) Check Name = ISP1-DNS-Yahoo
v) Method = DNS
w) Dest. IP = 4.2.2.2
x) Next Hop = 2.2.2.200
y) Destination Port = 53
z) Interval = 5
aa) Retries = 2
bb) Timout = 3
cc) Arguments = HOST=www.yahoo.com|

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 118 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 118 -

Note: you can also click on the next to Arguments and put in the Host Name
dd) Click Set then click Create for the next one
DNS to Google ISP 2
ee) Check Name = ISP1-DNS-Google
ff) Method = DNS
gg) Dest. IP = 4.2.2.3
hh) Next Hop = 2.2.2.200
ii) Destination Port = 53
jj) Retries = 2
kk) Arguments = HOST=www.google.com|
Note: you can also click on the next to Arguments and put in the Host Name
ll) Click Set

11) The next step is to bind the checks to the NHRs the syntax is as follows:
Health Monitoring Binding Table, click Create
ISP 1
Check = ISP1-DNS-Yahoo
Server = NHR: mainfarm/ISP1
Group = 1
Mandatory = Non-Mandatory
Click Set to save and Create for the next entry
Check = ISP1-DNS-Google

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 119 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 119 -

Server = NHR: mainfarm/ISP1


Group = 1
Mandatory = Non-Mandatory
Click Set to save and Create for the next entry
ISP 2
Check = ISP2-DNS-Yahoo
Server = NHR: mainfarm/ISP2
Group = 1
Mandatory = Non-Mandatory
Click Set to save and Create for the next entry
Check = ISP2-DNS-Google
Server = NHR: mainfarm/ISP2
Group = 1
Mandatory = Non-Mandatory
Click Set to save

12) Test the failover by having your instructor fail the external link of one of the ISPs.

Chapter 3 Review:

For a router that is currently up and running, what is the smoothest way to take it out of
service?
If you want more traffic sent to a particular router, what setting can you use?
What is Recovery Time? What is Warm Up Time?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 120 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 120 -

If you set an application aging time for HTTP to 3600 and the farm aging time to 600,
what will happen?
What setting allows administrators to restrict the number of users sent to a router?
What is the Backup setting for Operational mode and why would it be used?
How many points can be checked through a router using Full Path Health Monitoring?
In an active / backup configuration of LinkProofs, with 3 routers, how many health
checks would be performed if you checked 10 devices through each routers?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 121 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 121 -

Chapter 4 Flow Policies

LinkProof Lab 4 Flow Policies (using WBM)

Lab Goals:
Setup up network definitions
Create a flow for source networks
Create a flow for an application
Create a flow for application and destination network
Step-by-Step:
Pre Configuration
Before Flow Policies can be created all the farms needed for the different flow
possibilities must be created first. In our Lab we will end up with 3 farms
Mainfarm = Farm with both ISP1 and ISP2 active
Farm-ISP1 = Farm with Just ISP1 active ISP2 is set to backup mode
Farm-ISP2 = Farm with just ISP2 active ISP1 is backup
Farm Creation:
LinkProof Farms Farm Table, click Create
Set the following Parameters:
Farm Name = Farm-ISP1
Nat Mode = Enable
Click Set to save and Create to add a second Farm.
Farm Name = Farm-ISP2
Packet Translation = NAT
Click Set to save.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 122 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 122 -

Adding Routers:
LinkProof Servers Logical Routers Table, click Create.
Farm Name = Farm-ISP1
Router Name = ISP1
IP Address = 1.1.1.100
Click Set to save and click Create to add the next one
Farm Name = Farm-ISP1
Router Name = ISP2
IP Address = 2.2.2.200
OperMode = Backup
Click Set to save and click Create to add the next one
Farm Name = Farm-ISP2
Router Name = ISP2
IP Address = 2.2.2.200
Click Set to save and click Create to add the next one
Farm Name = Farm-ISP2
Router Name = ISP1
IP Address = 1.1.1.100
OperMode = Backup
Click Set to save

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 123 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 123 -

Setting up Networks:
The next step is to set the various networks we will use, there are two types of networks
supported by Radware:
1) A Range of IP Address
2) A full Subnet
We will create both in the network table.
Create a Range of IP Address
Classes Modify Networks, click Create
Name = Internal
Sub Index = 1
Mode = IP Range
From IP = 192.168.200.1
To IP = 192.168.200.254
Click Set to save and click Create to add the next entry.
Name = DNS-IP
Sub Index = 2
Mode = IP Range
From IP = 4.2.2.2
To IP = 4.2.2.3
Click Set to save and click Create to add the next entry.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 124 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 124 -

Name = Outside
Sub Index = 3
Mode = IP Mask
Address = 198.6.1.0
Mask = 255.255.255.0
Click Set to save and click Create to add the next entry.
Name = DNS-Net
Sub Index = 3
Mode = IP Mask
Address = 198.6.1.0
Mask = 255.255.255.0
Click Set to save.
The last step is to update the information
Use the following to save these updates:
Classes Update Policies click Set
Verify that the networks are now active:
Classes View Active Networks.

Flow Policies for Networks:


In some situations, customers may only want to use a subset of available routers for
certain types of traffic. For example, a customer may want users from a certain internal
Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 125 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 125 -

subnet only to go out one of the available routers. Or another customer may want web
traffic to go out a single router.
12) The first step in actually creating a flow is the Flow Name, on the LinkProof the flow
will only contain one farm, on other devices it is possible to use multiple farms in a
flow.
LinkProof Flow Management Farms Flow Table, click Create.
Flow Name = ISP1 (Type this in)
Farm Name = Farm-ISP1
Click Set to save and Create to add a second entry.
Flow Name = ISP2
Farm Name = Farm-ISP2
Click Set to save

Once complete it should look like the following:

Important note: The Default Flow can not be removed and although it says no farm it
means it goes to the default farm. The default farm is the first farm that was created
with a NHR that was a default gateway.
13) Create the following flow to force all traffic going to the DNS IPs out ISP 1
LinkProof Flow Management Modify Policies, click Create.
Name = Outbound DNS
Destination = DNS-IP
Source = Inside

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 126 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 126 -

Farm Flow = ISP1


Click Set to save and then click Create to add a second policy.
We will now create a second policy that will direct all traffic from the subnet of
192.168.200.0 to ISP 2. You will note since the index of this rule is 2, DNS traffic to
4.2.2.2 will still go out ISP 1.
Name = Outbound Traffic
Index = 2
Destination = any
Source = Inside
Direction = Two Way
Farm Flow = ISP2
Click Set to save
14) The last step is to activate the polices, use the command:
LinkProof Flow Management Update Policies, click Set
15) Test the policy by browsing out and seeing the results in the client table. Then fail
one router and see that everything fails over to a single ISP.
Flow Policies for Applications
In this section, you will create flow policies to send web traffic out ISP1 and DNS traffic
out ISP2. The first step is removing the policies we created above.
16) To Delete a Policy:
LinkProof Flow Management Modify Policies
Click on a box next to the policy you want to delete and then click Delete.
The last part is to updated the active policies:
LinkProof Flow Management Update Policies, click Set
17) Next we will create two new policies one for DNS and another for HTTP, this time we
will add a new flag for an application:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 127 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 127 -

LinkProof Flow Management Modify Policies, click Create.


Name = DNS
Destination = any
Source = Inside
Direction = Two Way
Service Type = Basic Filter
Service = dns
Farm Flow = ISP2
Click Set to save and then click Create to add a second policy.
Name = HTTP
Index = 2
Destination = any
Source = Inside
Direction = Two Way
Service Type = Basic Filter
Service = http
Farm Flow = ISP1
Click Set to save
You should have a table like the following:

18) To activate the new policies


LinkProof Flow Management Update Policies, click Set
19) Now we can test the policy. From the browser on your VNC Connection, browse to
the internet and a few web pages then look at the client table, you should see all
HTTP traffic go to ISP1 and DNS will go to ISP2

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 128 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 128 -

Practical Exercise for Chapter 4:


20) Remove the two policies above and create a policy for your workstation when it does
a DNS query it will be forced out ISP2, however all other traffic is load balanced. In
addition any other client will be load balanced no matter what traffic is used.
21) Restore the configuration from Lab 2 before going on to the next lab.
.
Chapter 4 Review Questions
What is the default Client Aging Time on a LinkProof router farm?
What is the Client Aging Time used for?
What happens if a clients entry is removed from the table and the client resumes traffic
to the same destination host?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 129 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 129 -

LinkProof Practical Exercise #1 (optional)


A customer just bought a LinkProof and has two ISP
ISP 1 = 3.3.3.50 /24
ISP 2 = 4.4.4.150 /24
He wants to just load balance outbound traffic through each one for Dynamic NAT use 3.10#
and 4.10#
He has a Guest Network inside that for all HTTP traffic he wants it to go to ISP1 The network is
10.200.200.0/24
He also has a partner on the outside 128.177.28.44 that must go through ISP 2, even the Guest
network must go to ISP 2 to reach this partner.
He wants the default aging time to be 300 seconds and application specific aging times to be
HTTP 60
DNS 15
HTTPS 600
He also wants to check DNS through each ISP create health monitoring checks to check
www.cnn.com and www.radware.com to 4.2.2.2 and 4.2.2.3

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 130 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 130 -

Chapter 5 LinkProof Inbound Load-Balancing

LinkProof Lab 5 Inbound Load Balancing and Proximity (using WBM)

Lab Goals:

Configure the LinkProof to perform inbound load balancing


Test using a DNS lookup utility
Configure the LinkProof to perform Proximity calculations

Use the configuration from the previous labs.


Step by Step:
Static NAT
1. The first step for inbound is to create static Smart NAT addresses to represent an
internal server behind your LinkProofs. You will create two external addresses
for this server, one from each Router network space.
LinkProof Smart NAT Static NAT Table, click Create: (# Is your team
number)
From Local Server IP = 192.168.200.10#
To Local Server IP = 192.168.200.10#
Server IP = 1.1.1.100
From Static NAT IP = 1.1.1.20#
To Static NAT IP = 1.1.1.20#
Click Set to save and Create to add the second entry.
From Local Server IP = 192.168.200.10#
To Local Server IP = 192.168.200.10#
Server IP = 2.2.2.200

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 131 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 131 -

From Static NAT IP = 2.2.2.20#


To Static NAT IP = 2.2.2.20#
Click Set to save.

Notes:
Internal Range = Range of internal server IPs that you want to define a public IP
for, if you have only one server the Start and End have to be the same IP.
Eternal Range = Range of Public IPs for the Internal Range, the external range
maps one to one in sequence for example:
192.168.200.101 192.168.200.105 1.1.1.100(NHR) 1.1.1.31 1.1.1.35
This means 101 = 31, 102 = 32 and so on.
2. When complete, you can check your NAT table: (It should have 4 entries-- the 2
Dynamic NAT and the two new Static NAT entries)
LinkProof Smart NAT NAT Parameter Summary:

3. Once done, browse out from your VNC remote desktop and notice in the client
table you are going out with the Static NAT.
DNS Configuration

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 132 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 132 -

4. The next step in inbound configuration is the DNS configuration. There are two
main parts of this configuration. The first part is th Name To Local IP table -- this
table contains all the host names that the LinkProof will resolve and their Local
IP address. The Local IP address needs to be the same as the Local Address in
the Static NAT configuration.
LinkProof DNS Configuration Name to Local IP, click Create
Host Name = www.team#.com
Local IP = 192.168.200.10#
Click Set to save

5. The next part is the DNS Virtual IP, this IP address is used as the NS record on the
SOA DNS server, the best practice is to configure one DNS VIP per ISP, and to
also have one on the internal interface (We will explain that one with
redundancy).
In Our Lab we will use the do the following (50+# means add your team number
to 50):
LinkProof DNS Configuration DNS Virtual IP, click Create.
DNS IP Address = 1.1.1.50+#
Click Set to save and Create to add another
DNS IP Address = 2.2.2.50+#
Click Set to save

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 133 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 133 -

6. The last step is to enable the two records in reply feature, this can be used to
avoid DNS caching issues and to give clients an alternate address. This feature is
also useful in the lab to demonstrate failover. In addition it is recommended to
change the TTL from default of zero to at least 5 seconds up to 30 seconds.
LinkProof DNS Configuration Response:
DNS Response TTL = 5
Two Records in DNS Reply = enable
Click Set to save changes.
7. To test the response, from the Virtual Client use a terminal and the host
command type in
nslookup www.team#.com 192.168.200.#
8. At this point you can now fail one of the two ISPs (Disable it) and run the lookup
again you should now only get one A record back.
Optional Components Proximity:
Note: Proximity is difficult to simulate in the lab since the difference in hops and latency
is minimal. This lab is designed to illustrate the principals behind proximity.
9. The first step is to enable proximity on the LinkProof, there are a few options you
can enable it only for Inbound or Outbound traffic, or enable it both ways, in our
lab we will enable both ways.
LinkProof Proximity Proximity Parameters General

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 134 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 134 -

Change
Proximity Mode = Full Proximity Both
Click Set to save
10. The next step is to choose the importance of three variables Hops, Latency, and
Load. Depending on the desired result or the network you can modify what is
more important then the other on a scale of 1 100 with 100 being highest.
LinkProof Load Balancing Weights
Hops Weight = 60
Latency Weight = 20
Load Weight = 80
Click Set to save.
11. Open browser connections to various sites from your Virtual Machine (If you
changed the IP before change it back to 192.168.200.10#).
Connect to the LinkProof through the CLI and type in the following command:
lp proximity dynamic-table
This will display the LinkProofs dynamic proximity table:
Subnet

Farm name

Server 1

Latency 1

Hops 1

Server 2

Latency 2

Hops 2

Server 3

Latency 3

Hops 3

.........................................
64.236. 16.

MainFarm

Hits counter 0
1.

1.

1.100

65

213

2.

2.

2.200

85

213

69. 44.123.

MainFarm

Hits counter 0
1.

1.

1.100

25

202

2.

2.

2.200

35

202

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 135 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 135 -

Chapter 5 Review:

What system does the LinkProof rely on for redirecting external clients to internal hosts
through various next hop routers?
What kind of records should be placed in a customers DNS server to redirect DNS
queries to the LinkProof?
What are Virtual DNS Addresses used for?
What actual addresses should be placed in a customers DNS server to redirect DNS
queries to the LinkProof?
What features can the LinkProof use to help overcome DNS lookup caching?
True or False: If a Next Hop Router is down, the LinkProof will not respond to incoming
DNS queries by giving out an address that belongs to the failed router?
In general terms, what is Proximity on the LinkProof?
The LinkProof calculates outbound proximity to what devices?
The LinkProof calculates inbound proximity to what devices?
How does the LinkProof store entries in the Proximity Table?
When configuring proximity, what three factors can be tuned to determine the best
NHR to use?
Why would load be an important factor to consider?
By default, how long are entries stored in the proximity table on the LP?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 136 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 136 -

Chapter 6 LinkProof Redundancy


Radware recommends that its LinkProof units be installed in pairs to provide fault
tolerance in the case of a single unit's failure. Each pair of devices functions in an Active
/ Backup configuration; the backup unit will come online should the primary unit fail.

LinkProof Lab 6 VRRP Redundancy


Lab Goals:

Configure a pair of LinkProofs in an Active / Backup Configuration using the


VRRP Redundancy method
Test Failover by disconnecting the Active device

Note: For this lab you will partner with another team, however there is very little that
needs to be changed on the backup device, almost all the configuration is on the
primary.
Pre-Configuration:
MASTER device only:
On the MASTER device we will remove the 192.168.200.# interface, as stated above we
want to change the default gateway of the internal network to a DNS VIP.
From the CLI
net ip del 192.168.200.#
Now add a new IP
Router IP Router Interface Parameters, click Create.
IP Address = 192.168.200.20#
Network Mask = 255.255.255.0
If Number = 2
Click Set to save.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 137 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 137 -

The last step is create the DNS VIP as the default gateway
LinkProof DNS Configuration DNS Virtual IP, click Create.
DNS IP Address = 192.168.200.#
Click Set to save
You can now reach the internet from your Virtual Desktop as you did before.
Redundancy Configuration MASTER device (# is your team number):
15) Configure the peer (Backup LinkProofs) IPs on the LinkProof.
Router IP Router Interface Parameters
Click on each entry and add the Backup LinkProofs corresponding IP address in the
Peer Address field and hit Set to save the changes.
Repeat this for all the entries in the Interface Parameters table.

16) Next, set a few global options first including enabling VRRP.
Redundancy Global Configuration
IP Redundancy Admin Status = VRRP
Interface Grouping = Enable
Trap VRRP Associated Addresses = Summary

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 138 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 138 -

Click Set to save changes

17) Now create the VRs. We will create a VR per network the LinkProof is on with the
exception of the management network (10.10.243.x)
Redundancy VRRP VR Table, click Create
VR ID = A number from 1 255, you have to make sure the number is unique on the
network to the Radware devices.
Priority = Priority a value from 1 255 with 255 being the highest and absolute
master for a VR.
Primary IP = Interface IP, this is the IP that is configured on the physical interface
that reflects what network the VR belongs to (For example VR ID of 111 will be on
the 192.168.200.x network).
First Entry
If Index = G-2
VR ID = #0
Priority = 254
Primary IP = 192.168.200.20# (or leave as 0.0.0.0)
Click Set to save and click Create to add another entry.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 139 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 139 -

Second Entry
If Index =G-1
VR ID = #1
Priority = 254
Primary IP = 1.1.1.#
Click Set to save and click Create to add another entry.
Third Entry
If Index = G-1
VR ID = #2
Priority = 254
Primary IP = 2.2.2.#
Click Set to save and you should have three entries

Note: The VRs are supposed to be down. Until you associate IPs to the VRs you cannot
enable them.
18) Once the VRs are created we can associate all the IPs to these VRs. We need to
associate ALL Smart NAT IPs and ALL DNS VIPs
Redundancy VRRP Associated IP Address, click Create
Remember to click Set after each one.
If Index

VR ID

Associated IP

G-2

#0

192.168.200.#

G-1

#1

1.1.1.10#

G-1

#2

2.2.2.10#

G-1

#1

1.1.1.20#

G-1

#2

2.2.2.20#

G-1

#1

1.1.1.50+#

Description
DNS VIP on Port 1
Dynamic NAT IPs
Static NAT IPs
DNS Virtual IPs

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 140 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 140 -

G-1

#2

2.2.2.50+#

19) At this point we are ready to enable the virtual routers on the Master device.
Redundancy VRRP VR Table, click on each VR ID
Change the Admin Status to Up, then click Set, once all three are done click on the
Yellow Refresh button in the top right. All the VRs should be Master.

20) The last step on the primary device is to exclude the management port from
interface grouping.
NOTE: On the ODS hardware platform the Management Ports are excluded by
default. When using other platforms, use the step below to exclude a port.
Redundancy Master Interface Grouping Table, click on the management port
and change Port Status to Excluded, then click Set to save.
21) The only thing that is needed on the backup devices is an interface IP for
management. If the Backup team already has a configuration on their LinkProof,
there is nothing further to configure on the Backup Linkproof.
22) Go to File Configuration Receive from Device. Choose Backup (ActiveBackup) and press the Set button. Change the name of the file so that you can
recognize it as the backup redundancy configuration and save it to the remote
desktop. .
23) Browse to the Backup linkproof at http://10.10.243.X. Go to File Configuration
Send to Device on the Backup linkproof and choose Replace configuration file as
the Upload mode. Press the Set button and press the Set button on the popup
message to reset the backup LinkProof (If you dont see the pop-up message, go to

Device Reset Device in order to reboot the backup LinkProof).

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 141 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 141 -

24) On the BACKUP device do the following:


Redundancy VRRP VR Table, click on each VR ID
Change the Admin Status to Up, then click Set, once all three are done click on the
Yellow Refresh button in the top right. All the VRs should be Backup
At this point the backup up is now configured to take over in the event of the master
device failing. We will simulate a failover in the class we will take down one of the
interfaces of the primary unit.
25) From the Virtual Desktop, ping an outside address continuously (4.2.2.2 for
example) and ping the default gateway 192.168.200.#
26) On the Master device use the following command to force failover:
net port down 1
27) On the Backup you should see messages that it has taken over and the Pings should
still be working, with maybe 1 missed ping.
LinkProof#19-09-2008 17:03:03 INFO VRRP: now master of VR ID 12
28) Fail back to the Master:
net port up 1

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 142 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 142 -

Chapter 6 Review Questions:


True or False - Generally speaking, a backup LinkProof should be configured identically
to its active partner.
What settings are different on a backup device than on an active device?
What is Mirroring and what is it designed to accomplish?
What is Interface Grouping and should it be enabled on an Active or Backup Unit?
True or False: when a backup device takes over for an active device, entries in the IP
Redundancy Table on a Backup device should have an Operating Status of InActive
How can you verify that a backup LinkProof has taken over for a failed active LinkProof?
What does VRRP stand for?
What are VRs?
What are Associated IP Addresses?
How does a backup device monitor the status of an active device using VRRP?
What is different about VRRP from the Proprietary redundancy method?
What setting determines which device is master in an Active/Backup VRRP
configuration?
What should you do before implementing VRRP on a pair of LinkProof in an existing
network?
If you have four physical interfaces with 8 different networks in use on a pair of
LinkProofs, at least how many VRs would you need to configure on each unit?

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 143 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 143 -

Chapter 7 One IP Configuration


In some cases when installing the LinkProof there is only one IP available or a customer
wants to only use a single IP for multiple servers accepting inbound traffic.
One IP configuration has two main parts
Outbound Dynamic NAT
Inbound Static PAT
For outbound Dynamic NAT the physical interface IP can also be used as the Dynamic
NAT IP thus there is no need to configure another IP address for Dynamic NAT.
Inbound Static PAT allows a user to configure the LinkProof to accept traffic for multiple
backend systems on a single external IP. For example a network might have a resource
server on HTTP and an email server on port 25, they can now use the same external IP
address for both systems.
This feature can be combined with the Outbound NAT to use a single IP for all inbound
and outbound traffic or it can be used on its own without the one IP configuration.

LinkProof Lab 7 One IP Configuration (using WBM)

Lab Goals:

Configure the LinkProof to only use its interface for outbound dynamic
NAT

Configure inbound SPAT

One IP can only be configured from the CLI or WBM

Step-by-Step

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 144 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 144 -

NOTE: Single IP configuration and redundancy are not fully supported at this time
please be aware that this configuration is for locations were a redundant LinkProof will
not be used or is not needed.
7) Restore the configuration saved at the end of Lab 2
8) Enable the two external Interface IPs for 1 IP use the following command:
Router IP Router Interface Parameters click on 1.1.1.#
One IP = Enable
Click Set then click on 2.2.2.#
One IP = Enable
Click Set to save
9) Delete the previously configured dynamic NAT (In Lab 2) and you will create a new
dynamic NAT using the IP of the interface:
LinkProof Smart NAT Dynamic NAT Table, select both NAT addresses and
click Delete.
10) Create a new Dynamic NAT to the interface IP (Where # is your team number)
ISP1
a. From Local IP = 0.0.0.1
b. To Local IP = 255.255.255.254
c. Server IP = 1.1.1.100
d. Dynamic NAT IP = 1.1.1.#
e. Click Set to save the changes and click Create for the second entry.
ISP2
f. From Local IP = 0.0.0.1
g. To Local IP = 255.255.255.254
h. Server IP = 2.2.2.200
i.

Dynamic NAT IP = 2.2.2.#

j. Click Set to save the changes


Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 145 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 145 -

11) Create a SPAT for a web server and email server:


a) First you have to change the web based management port
Services Web Server Web
Web Server Port = 8080
Click Set to save.
b) Then configure the Static NAT
LinkProof Smart NAT Static PAT Table, click Create
Web ISP1
i) Internal IP = 192.168.200.10#
ii) Internal Port = 80
iii) Protocol = tcp
iv) Server IP = 1.1.1.100
v) External IP = 1.1.1.#
vi) Eternal Port = 80
vii) Static PAT Name = WebISP1
Click Set to save then click Create to add another entry
Web ISP2
viii) Internal IP = 192.168.200.10#
ix) Internal Port = 80
x) Protocol = tcp
xi) Server IP = 2.2.2.200
xii) External IP = 2.2.2.#
xiii) Eternal Port = 80
xiv) Static PAT Name = WebISP2
Click Set to save then click Create to add another entry
Email ISP1
xv) Internal IP = 192.168.200.10#
Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 146 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 146 -

xvi) Internal Port = 25


xvii)

Protocol = tcp

xviii)

Server IP = 1.1.1.100

xix) External IP = 1.1.1.#


xx) Eternal Port = 25
xxi) Static PAT Name = EmailISP1
Click Set to save then click Create to add another entry
Email ISP2
xxii)

Internal IP = 192.168.200.10#

xxiii)

Internal Port = 25

xxiv)

Protocol = tcp

xxv)

Server IP = 2.2.2.200

xxvi)

External IP = 2.2.2.#

xxvii) Eternal Port = 25


xxviii) Static PAT Name = EmailISP2
Click Set to save then click Create to add another entry
12) Test Outbound Traffic, and if you have a web service running on your Virtual
Appliance you can test it from the outside.
End of Lab 7 Please wait for your Instructor before Continuing

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 147 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 147 -

LinkProof Management
LinkProof Lab 8 Managing the LinkProof (using WBM)
Lab Goals:

Enable and configure various options related to managing the AppDirector itself

Step By Step:
Enabling Management Traffic:
To Enable web and secure web based management access
Go to Services Web Server Web:

Figure 20 - Web Based Management Configuration

Go to Services Web Server Secure Web:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 148 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 148 -

Figure 21 - Secure Web Management Configuration

To enable telnet and SSH


Go to Services Telnet

Figure 22 - Telnet Access Parameters

Go to Services SSH Server:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 149 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 149 -

Figure 23 - SSH Access Parameters

Disabling Management Traffic by port (Default All Ports Enabled):

Go to Security Management Ports. Selecting a specific port, and enable or


disable management methods to the device through that port:

Figure 24 - Example of Port Restrictions

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 150 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 150 -

Enabling Different Traps Outputs:


There are three different systems that can be configured to receive event traps from
the device; SNMP, SYSLOG, SMTP. Each one will be discussed.
To configure syslog notification
1. Go to Services Syslog Reporting, and configure the appropriate information.
Any traps generated by the Radware device will be mirrored to the syslog server
specified:

Figure 25 - Syslog Reporting Configuration Window

To Configure email notification


First a user must be created with an email address and severity of the traps to
send:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 151 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 151 -

Device Security Users, either create a new user or edit an existing


user.

Severity can have one of the following values:


(1) none
(2) info
(3) warning
(4) error
(5) fatal
Email Address must be put in and Severity has to be info or above.
To configure the email sever go to Services SMTP

To configure SNMP notification


To enable SNMP notification a system has to be configured to receive SNMP traps.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 152 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 152 -

Security SNMP Target Address Table, click Create.

Changing the SNMP community for SNMP v1 (See page 110 for SNMP v3)
11. To change the community use the following commands in sequence:
manage snmp users create <Username>
manage snmp groups create SNMPv1 <Username> -gn
<GroupName>
manage snmp access create <Groupname> SNMPv1
noAuthNoPriv -rvn iso -wvn iso -nvn iso
manage snmp community create <Index-can be a name or
number> -n <community string> -sn <Username>
In our Lab we will do the following:
manage snmp users create Team#
manage snmp groups create SNMPv1 Team# -gn V1
manage snmp access create V1 SNMPv1 noAuthNoPriv -rvn
iso -wvn iso -nvn iso
manage snmp community create 10 -n team# -sn Team#

Interface Configuration:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 153 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 153 -

12. In many circumstances you need to set the speed and duplex of the port. To
change the Layer 2 status:
a. Port Status:
Net port up/down <Interface>
b. Force duplex/speed
Device Physical Interface, click on an Interface.

Click Set when done with changes.


To save a configuration file
1. Go to File Configuration Receive From Device:

Figure 26 - Configuration File Save Window

2. When prompted, save the file to your workstation (*.ber is the binary format of
the file).
To upload a saved configuration file
Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 154 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 154 -

1. Go to File Configuration Send to Device:

Figure 27 - Restoring Configuration File

When restoring a configuration file to a Radware device, you will have to reboot
the unit after the file has been applied.
To upgrade the device
1. Go to File Software Update, you will see the following screen:

Figure 28 - Upgrade Screen

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 155 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 155 -

The File section allows you to select the appropriate firmware file. The Password
section is for the case-sensitive password you have gotten from Technical
Support for this upgrade (you have gotten this password ahead of time, right?).
The Software version section requires you to specify the actual version to be
loaded. Since the filename is usually listed the version, this part is fairly easy to
figure out.
Upgrades through Web Based Management take only a few moments though
they do require a device reboot.
13. Disable Ping Response to one interface of your device.
manage ping-ports set 1 -s disable

Collect trouble-shooting information about the type of unit itself.

1. Go to Device Device Information:

Figure 29 - Device Information Screen

Note the Platform, Flash Memory and Flash RAM, SW Version, SW Build, Version
Status, and the Base MAC Address.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 156 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 156 -

1. Verify network settings for each interface by double-clicking the unit, and selecting
Device Physical Interface:

Figure 30 - Physical Port Settings

2. Use the following CLI commands to gather additional information about the
device:
system device-info
Device Information

Type:

LinkProof Application Switch

Platform:

PPC 7410 processor

Ports:

21

Ports Config:

16 Fast Ethernet + 5 Giga Ethernet

HW version:

1.10

SW version:

3.61.02

Build:

Feb 13 2003, 15:30:41

Version State:

Final

BWM version:

2.30.04 RAM size:

256 MB

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 157 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 157 -

Flash size:

8 MB

Registered:

No

Date:

29.10.2002

Time:

16:34:59

Up time:

0 days, 1 hour, 1 minute, 23 seconds

Base MAC:

00:03:b2:0c:58:00

system logfile
Log file is empty

system os cpu
Device Resource Utilization
---------------------------RS Resource Utilzation : 0
RE Resource Utilzation : 0
Last 5 sec. Average Utilzation : 0
Last 60 sec. Average Utilzation : 0
Maximum Utilization

: 0

statistics ip
------------ IP Counters -----------ipInReceives

573

ipInHdrErrors

ipInAddrErrors

ipForwDatagrams

ipInUnknownProtos

ipInDiscards

ipInDelivers

563

ipOutRequests

543

ipOutDiscards

ipOutNoRoutes

ipReasmReqds

ipReasmOKs

ipReasmFails

ipFragOKs

ipFragFails

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 158 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 158 -

ipFragCreates

net arp table


Arp Table
Interface Index IP Address

MAC Address

Type

00e0987b5c08

dynamic

192.168.1.100

net l2-information
Interface Table
ifIndex

mac_addr

adm

oper

InUcastPkt InNUcastPkt OutUcastPkt OutNUcastPkt

1 0003b20c5800 up

up

4291523310

13

4291523310

14

2 0003b20c5801 up

up

3039383792

1103

3039383792

16

3 0003b20c5802 up

down

3236458074

3236458074

4 0003b20c5803 up

down

2878078969

2878078969

5 0003b20c5804 up

down

6 0003b20c5805 up

down

4050775923

4050775923

7 0003b20c5806 up

down

4225863528

4225863528

net l2-interface
interface Table

Interface Index

MAC Address

Interface Admin
Status

Operational Status

0003b2174540

up

up

0003b2174541

up

up

0003b2174542

up

down

0003b2174543

up

down

0003b2174544

up

down

0003b2174545

up

down

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 159 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 159 -

0003b2174546

up

down

0003b2174547

up

down

net physical-interface
Physical Interface Table

Port Index

Speed

Duplex

Auto Negotiate

Ethernet

Half

Off

Ethernet

Half

On

Ethernet

Half

On

Ethernet

Half

On

Ethernet

Half

On

Ethernet

Half

On

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 160 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 160 -

Bandwidth Management
LinkProof Lab 9 Bandwidth Management (using WBM)
6. Create several network entities following the guidelines below.

Name

Mode

Address or From IP

Mask or To IP

LAN

Mask

192.168.0.0

255.255.0.0

LAN

IP Range

10.10.110.1

10.10.110.50

DNS

Mask

4.2.2.0

255.255.255.0

ISP 1

IP Range

1.1.1.20

1.1.1.254

ISP 2

IP Range

2.2.2.20

2.2.2.254

Classes Modify Networks and click on the Create button. Enter the information
as it appears in the image below and complete all five entries based on the information
above

Once you have completed all five entries above, your Modify Network Table should look
like the image below:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 161 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 161 -

7. Update the policies to activate the settings:

Classes Update Policies


8. Once complete, go to Classes View Active Networks and it should look like

the following:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 162 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 162 -

9. We create a physical port group named MyPorts using port 1-4.


Go to Classes Modify Port Groups and click Create.
The Group Name will be MyPorts and the Inbound Port will be G-1. Repeat for
Inbound Ports G-2 through G4.
Update the Policies to activate the settings:
Classes Update Policies
Go to Classes ActivePort Groups and the table should look like the
following:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 163 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 163 -

10. Now we adapt the global BWM Parameters.


Go to BWM Global Parameters and use the settings in the image below:

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 164 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 164 -

You will need to reboot the LinkProof once you click the Set button.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 165 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 165 -

Lab B Creating a Simple Block Policy in BWM


Lab Goals:

Create a Bandwidth Management policy to block pings to the target server.

Test the policy.

Step By Step
5. Ping an external address to make sure you get a response for example 4.2.2.2.
6. Create a new policy to block outbound ping traffic.
7. Use the information below to create the policy:
Go to BWM Modify Policies and click Create at the bottom of the list. Use
the information below to create a new filter named Block-Ping
Name

Block-Ping

Destination

Any

Source

LAN

Action

Block

Direction

One Way

Service Type

Basic Filter

Service

icmp

Reporting

Report Block Packets

Next, click on BWM Modify Policy Extensions. Click on the Block-Ping


policy to edit it and change the Classification Point to Before Changes.
Update changes BWM Update Policies

Try to ping the same address from step1 and it should now fail. If you have the
console connected you should also have a trap saying the session was blocked.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 166 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 166 -

Lab C Creating a simple minimum and maximum policy


Lab Goals:

Create multiple policies using existing services.

Test the policy.

Step By Step:
10. Open up an HTTP session to some website and an FTP download (ie:

ftp://ftp.mozilla.org/pub/firefox/nightly) to verify connection speed or gauge how


fast the connections will load.

11. Create a policy for FTP traffic.

Go to BWM Modify Policies and click Create at the bottom of the list. Use
the information below to create a new filter named FTP
Name

FTP

Destination

any

Source

LAN

Action

Forward

Direction

Two Way

Priority

Guaranteed Bandwidth

128

Service Type

Basic Filter

Service

ftp-session

Maximum Bandwidth

150

Next, click on BWM Modify Policy Extensions. Click on the FTP policy to

edit it and change the Classification Point to Before Changes.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 167 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 167 -

12. Add a second entry for HTTP:


13. Go to BWM Modify Policies and click Create at the bottom of the list. Use
the information below to create a new filter named HTTP
Name

HTTP

Destination

Any

Source

LAN

Action

Forward

Direction

Two Way

Priority

Guaranteed Bandwidth

128

Service Type

Basic Filter

Service

http

Maximum Bandwidth

150

Next, click on BWM Modify Policy Extensions. Click on the FTP policy to
edit it and change the Classification Point to Before Changes.
Update changes BWM Update Policies

14. To verify if the policies are configured correctly go to


BWM View Active Policies
And you should see these new policies in the list.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 168 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 168 -

15. Turn on BWM Policy Statistics Monitoring.


Go to Performance BWM Policy Statistics Global Parameters and enable
Policy Statistics Monitoring
16. From Firefox on your remote desktop, go to
ftp://ftp.mozilla.org/pub/firefox/nightly and click on a large file to download, also
go to various web pages for about 2 minutes.

17. Go to Performance BWM Policy Statistics View Active Last Second


Statistics
Click the green Refresh button on the upper right corner of the browser window (
) to update the statistics
Stop the FTP session.

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

- 169 -

LinkProof Training Manual Level 1


Date: October 2010
Page - 169 -

18. If time permits, repeat this lab using other guaranteed and maximal values to see

the different behavior.

End of Web Based Management for LinkProof

Radware 2010. All rights reserved. Distribution of this document needs approval from Radware Knowledge & Education Services.

You might also like