Exinda Applications List

Exinda Applications List

Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc. 3 Table of Contents Chapter 1: Configuring Applications And Application Groups 4 Add a new Application 4 Add or update an application group 12 Chapter 2: Predefined Applications And Application Groups 14 Predefined Applications and Supported L7 Signatures 14 Predefined Application Groups 27 © 2014 Exinda Networks, Inc. Application List Chapter 1: Configuring Applications and Application Groups Add a new Application Application objects are used to classify traffic on the network and are made up of layer 7 signatures, TCP/UDP port numbers and port ranges, protocols, network objects, or DSCP marks. Application classification can be used to monitor traffic or to create application-specific policy. There are many predefined applications on the appliance. You can add applications that are not already in the list. Applications can be created from L7 signatures, or TCP/UDP port numbers or ranges, or protocols, or DSCP marks, or network objects, or various combinations of these. The following are valid combinations: n Applications based on only L7 signatures. For example, you can create an application for a particular website by selecting http, host, and entering the domain of the website. n Applications based on only port numbers.For example, HTTPS is defined as tcp port 443. n Applications based on L7 signatures can be augmented by matching port numbers or ranges as well. For example, HTTP is defined as matching the L7 signature 'http' or TCP port 80. Note that the L7 signature and port are OR'ed. n Applications based on protocol. For example, the predefined VRRP application is based on the vrrp protocol. n Applications based on L7 signatures can be augmented by matching a protocol as well. For example, the ICMP app is defined as matching the L7 signature icmp or the protocol icmp. Note that the L7 signature and protocol are OR'ed. n Applications based on DSCP marks. For example, on your Riverbed appliance mark your CIFS traffic with a particular DSCP mark, then define an application using that DSCP mark to identify CIFS within a Riverbed- accelerated stream. n Applications based on only network object. For example, you could define an application based on a par- ticular application server, particular site, or particular user or user group (specified by network object). n DSCP marks can be used in combination with network object, port, or protocol to refine the traffic for a given application. Note that DSCP mark + network object, or DSCP mark + port, or DSCP mark + protocol are AND'ed. n Network objects can be used in combination with DSCP marks, port, or protocol to refine the traffic for a given application. Note that network object + DSCP mark, or network object + port, or network object + protocol are AND'ed. n Application based on DSCP mark + network object + port. Not that DSCP mark + network object + port are all AND'ed. Network objects cannot be used in conjunction with a layer 7 signature. © 2014 Exinda Networks, Inc. 5 Chapter 1: Configuring Applications and Application Groups Note: When creating applications based on ports, any given port number can only be defined once for TCP and once for UDP. The same port number can be defined for TCP and UDP. For example, if you define an application object with a port range TCP 500-510, you cannot then define another application object on TCP port 505. However, you can define another application object with UDP port 505. You can define duplicate ports/port ranges if a network object is also specified. Many of the L7 signatures have sub-type classifications, which makes layer 7 visibility much more granular. For instance, for reporting on specific web applications, most vendors can only report on port 80 traffic. Exinda allows a deeper look into Layer 7 applications. For example, by comparison: n Layer 4 reporting tools report on web applications as: port 80 or HTTP n Layer 7 reporting tools report on web applications as: Yahoo or Skype n Exinda s Layer 7 with sub-type classification report on web applications as: Yahoo video, Yahoo voice, or Yahoo webchat. This allows you to monitor on a much more granular level. © 2014 Exinda Networks, Inc. Chapter 1: Configuring Applications and Application Groups 6 To add a new application 1. In the Add New Application area, enter a name for the new application. 2. Define an application to be based on one of the following: n L7 signature n L7 signature + ports or protocols (OR'ed together) n Network object n DSCP mark n Port or protocols n Network object + ports or protocols (AND'ed together) n Network object + DSCP mark (AND'ed together) n DSCP mark + ports or protocols (AND'ed together) n Network object + DSCP mark + ports or protocols (AND'ed together) Note that network objects cannot be used in conjunction with a layer 7 signature. 3. Select the Network Object for the application. If the network object is internal, then traffic inbound to the LAN with the network object as a destination will be matched to this application, and traffic outbound from the LAN with the network object as the source will be matched to this application. If the network object is external, then traffic inbound to the LAN with the network object as a source will be matched to this application, and traffic outbound from the LAN with the network object as the destination will be matched to this application. © 2014 Exinda Networks, Inc. 7 Chapter 1: Configuring Applications and Application Groups 4. Select the DSCP mark for the application. Multiple DSCP marks or DSCP mark ranges can be used by specifying a range using a dash (e.g. 1-20) and by using commas (e.g. 1-20,44,63) 5. Select the L7 Signature for the application. Some layer 7 signatures have additional options that allow you to define application objects based on specific parts of that L7 signature. If a layer 7 signature is selected, specify the parameters for the signature. For example, to create an application object that matches traffic to and from the Exinda.com website, in the L7 Signature field, select http --->, host, and type exinda.com. 6. In the Ports/Protocols controls, specify either TCP ports/port ranges, UDP ports/port ranges, or a layer 3 protocol. Multiple ports and port ranges can be specified at the same time by comma separating values. 7. Click the Add New Application button. What L7 signature options are there? Some Layer 7 signatures have additional options that allow you to define application objects based on specific parts of that L7 Signature. When configuring new application object, the L7 signatures followed by '--->' in the drop-list have additional options. Most provide options that you simply select from. Some require a selection plus additional information. The following table explains the various options that require more than simply picking an option. Layer 7 Sig- SubType Description nature citrix application Allows you to define an Application Object based on a published Citrix application name. priority Allows you to define an Application Object based on a published Citrix priority. Citrix priorities are 0=High, 1=Medium, 2=Low, 3=Background. The Citrix priority detection will only work if Citrix is running without session-reliability, over TCP port 1494. user Allows you to define an Application Object based on the user running the Citrix published application. ddl (direct down- host Allows you to define an Application Object based on the 'host' field in the load link) HTTP header. flash host Allows you to define an Application Object based on the 'host' field in the HTTP header (where flash is running over http). http content_ Allows you to define an Application Object based on the 'content-type' type field in the HTTP header. © 2014 Exinda Networks, Inc. Chapter 1: Configuring Applications and Application Groups 8 Layer 7 Sig- SubType Description nature file Allows you to define an Application Object based on the filename requested in the HTTP URL. host Allows you to define an Application Object based on the 'host' field in the HTTP header. method Allows you to define an Application Object based on the HTTP method (e.g.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    30 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us