Fortiadc D-Series Handbook 4.3.2, Revision 1

Fortiadc D-Series Handbook 4.3.2, Revision 1

FortiADC™ Handbook - D Series VERSION 4.3.2 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTIGATE COOKBOOK http://cookbook.fortinet.com FORTINET TRAINING SERVICES http://www.fortinet.com/training FORTIGUARD CENTER http://www.fortiguard.com END USER LICENSE AGREEMENT http://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: [email protected] December 1, 2015 FortiADC™ Handbook - D Series TABLE OF CONTENTS Introduction .................................................................................................... 10 Features................................................................................................................. 10 Basic network topology.......................................................................................... 10 Scope..................................................................................................................... 11 What’s New ..................................................................................................... 12 Key Concepts and Features.......................................................................... 17 Server load balancing ............................................................................................ 17 Feature Summary ............................................................................................ 17 Authentication and authorization...................................................................... 18 Caching............................................................................................................ 18 Compression.................................................................................................... 18 Content rewriting.............................................................................................. 19 Content routing ................................................................................................ 19 Scripting ........................................................................................................... 19 SSL offloading.................................................................................................. 19 Link load balancing ................................................................................................ 22 Global load balancing ............................................................................................ 22 Security.................................................................................................................. 22 High availability...................................................................................................... 22 Virtual domains ...................................................................................................... 22 Getting Started ............................................................................................... 23 Step 1: Install the appliance................................................................................... 23 Step 2: Configure the management interface ........................................................ 23 Step 3: Configure basic network settings............................................................... 28 Step 4: Test connectivity to destination servers..................................................... 33 Step 5: Complete product registration, licensing, and upgrades ........................... 33 Step 6: Configure a basic server load balancing policy ......................................... 34 Step 7: Test the deployment.................................................................................. 37 Step 8: Back up the configuration.......................................................................... 41 Server Load Balancing .................................................................................. 42 Server load balancing basics................................................................................. 42 Server load balancing configuration overview ....................................................... 45 Using real server pools .......................................................................................... 47 Configuring pools of real servers ..................................................................... 47 Example: Using port ranges and the port 0 configuration................................ 50 Configuring persistence rules ................................................................................ 53 Configuring content routes..................................................................................... 57 Using content rewriting rules.................................................................................. 59 Overview .......................................................................................................... 59 Configuring content rewriting rules .................................................................. 60 Example: Redirecting HTTP to HTTPS............................................................ 62 Example: Rewriting the HTTP response when using content routing.............. 69 Example: Rewriting the HTTP request and response to mask application details 70 Example: Rewriting the HTTP request to harmonize port numbers................. 72 Configuring compression rules .............................................................................. 74 Configuring caching rules ...................................................................................... 75 Configuring profiles................................................................................................ 77 Configuring error pages ......................................................................................... 84 Using source pools ................................................................................................ 85 Configuring source pools ................................................................................. 85 Example: DNAT ............................................................................................... 87 Example: full NAT ............................................................................................ 88 Example: NAT46 (Layer 4 virtual servers) ....................................................... 89 Example: NAT64 (Layer 4 virtual servers) ....................................................... 90 Example: NAT46 (Layer 7 virtual servers) ....................................................... 91 Example: NAT64 (Layer 7 virtual servers) ....................................................... 92 Configuring auth policies........................................................................................ 93 Configuring methods.............................................................................................. 94 Configuring virtual servers ..................................................................................... 95 Link Load Balancing .................................................................................... 100 Link load balancing basics................................................................................... 100 Using link groups ........................................................................................... 100 Using virtual tunnels....................................................................................... 101 Link load balancing configuration overview ......................................................... 103 Configuring gateway links.................................................................................... 104 Configuring persistence rules .............................................................................. 105 Configuring proximity route settings..................................................................... 107 Configuring a link group....................................................................................... 108 Configuring a virtual tunnel group........................................................................ 110 Configuring link policies ....................................................................................... 111 Global Load Balancing ................................................................................ 113 Global load balancing basics ............................................................................... 113 Global load balancing configuration overview...................................................... 114 Configuring data centers...................................................................................... 117 Configuring servers.............................................................................................. 118 Configuring virtual server pools ........................................................................... 120 Configuring hosts................................................................................................. 121 Configuring an address group.............................................................................. 122 Configuring remote DNS servers......................................................................... 123 Configuring the DSSET list .................................................................................. 123 Configuring DNS zones ....................................................................................... 124 Configuring DNS64.............................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    314 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us