Setting in-path rules – HP StorageWorks Enterprise File Services WAN Accelerator User Manual

Page 25

Advertising
background image

HP S

TORAGE

W

ORKS

EFS WAN A

CCELERATOR

M

ANAGEMENT

C

ONSOLE

U

SER

G

UIDE

25

2 C

ONF

IGUR

ING

TH
E

HP

EF

S

W

AN A

CC
EL
E

R

A

T

O

R

3. Click Apply to apply your settings to the running configuration. (Apply your

settings to test a new configuration before committing it to memory.)

4. Click Save to write your settings to memory or click Reset to return the settings to

their previous values.

Setting In-Path
Rules

You set in-path configuration rules in the Optimization Service - In-Path Rules page.

An in-path rule defines the policies for intercepting traffic on specified ports for
optimization.

You can create rules that apply to a single port or to a port label. A port label is a name
that you assign to a set of ports so that you can reduce the number of configuration
rules in your system. The following port labels are created by default in your system:

‹

Interactive. Automatically passes through traffic on interactive ports (for
example, Telnet, TCP ECHO, remote logging, and shell).

‹

Secure. Automatically pass-through traffic on commonly secure ports (for
example, ssh, https, and smtps).

If you do not want to automatically forward these ports, click Remove Selected Rules
in the Optimization Service - In-Path Rules page.

For detailed information about how to configure port labels, see

“Creating Port

Labels” on page 86

.

For a list of interactive and secure ports that are automatically forwarded, see

Appendix A, “HP EFS WAN Accelerator Ports.”

.

Out-of-Path

Enable Out-of-Path Support. Check this box to enable out-of-path support. You can
enable out-of-path support for server-side appliances only.

NOTE: If you set up an out-of-path configuration with failover support, you must set
fixed target rules that specify the master and backup HP EFS WAN Accelerators. For
detailed information, see

“Setting In-Path Rules” on page 25

.

Connection Limit

Per Source IP Connection Limit. Check this box to limit half-opened connections on a
source IP address initiating connections (that is, the client machine). Set this feature to
block a source IP address that is opening multiple connections to invalid hosts or ports
simultaneously (for example, a virus or a port scanner). This feature does not prevent a
source IP address from connecting to valid hosts at a normal rate. Thus a source IP
address could have more established connections than the limit.

The appliance counts the number of half-opened connections for a source IP address
(connections that check if a server connection can be established before accepting the
client connection). If the count is above the limit, new connections from the source IP
address are passed through unoptimized.

NOTE: If you have a client connecting to valid hosts or ports at a very high rate, some of
its connections might be passed through even though all the connections are valid.

Control

Description

Advertising