A10 Thunder SLB 开局文档V1.0(1)
闪电匣机器人· 型号:FBBDR1 用户手册说明书

型号:FBBDR1用户手册V1.0闪电匣机器人·用户手册User Manual目录中文简体EnglishPUDU ROBOTICS格和资讯仅供参考,如果内容更新,恕不另行通知。
除非有特殊规定,本说明书仅作为使用指导,所作陈述均不构成任何形式的担保。
PUDU ROBOTICS运行过程中请勿拉拽或推动机器人,如需推动或者搬运机器人请先按下急停开关让其暂停。
禁止遮挡机器人元器件或放置超过装载空间的物品,否则可能导致机器人行走不正常或定位丢失。
禁止拍打设备或用力按压敲击屏幕,否则易造成设备损坏禁止机器人超载运行,禁止承放任何可燃固、气、液体等违禁物品;不允许配送高温和汤水类物品,以免对机器和行人造成损伤。
禁止在机器开机运行状态下做维护工作。
使用前请先将环境中地面各种线材收起,避免主机运行时拖拽。
请将地面尖锐物体(如装修废料、玻璃、铁钉等)清除,以免对机器底盘造成伤害。
为保证安全建议将机器人速度调整至0.8m/s及以下,禁止在机器人前方嬉戏打闹以避免不必要的伤害,机器人有自动避障功能,但存在识别盲区,故严禁在机器人高速行驶期间突然阻挡机器人,否则可能引发安全事故。
禁止配送未封装的饮料或液体,禁止配送高温液体。
机器人最佳通行宽度应大于80cm,长通道需要宽度大于1m流畅性最佳,宽度大于2m通道可设置两台机器人对向会车行驶(具体宽度由技术人员根据实际场景评估)。
机器人设计最大爬坡角度为度不应小于最小通行宽度80cm,侧翻角度不允许超过PUDU ROBOTICS1.3电源与用电须知机器人剩余电量小于20%,请及时充电,长时间低电量运行可能会缩短电池使用寿命;若长时间不使用机器人,请及时将产品断电以保护机器电池;务必使用原厂专配的可充电电池与充电设备,严禁使用非原厂充电器对机器人充电;按照充电器铭牌标识的电源电压为机器人充电;机器人电池故障,需联系厂家更换电池,严禁非专业人士操作;请勿将机器放置于易燃易爆物体附近充电;机器人存放及充电位置请保持干燥、常温,严禁将机器以及充电器放置于高温区域(>40℃),严禁机器以及充电器进水;严禁充电器与外物碰撞,造成充电器损坏;收到机器人报警,请立即断开充电设备需要在阶梯边沿,下坡的入口等有机器人跌落风险的地方增加栅栏或者其他阻挡防护地面高度20~26cm 之间有纯黑色(如踢脚线)、镜面(如墙面)、全透明(如落地玻璃窗)的物件,可能干扰机器人雷达反射,造成机器人行走异常,可能需要对场地进行一定的改造(如粘贴贴纸)。
SLB多数据中心技术方案

S L B多数据中心技术方案This model paper was revised by the Standardization Office on December 10, 2020A10G S L B多数据中心部署方案A10的Thunder系列产品可以在数据中心同时作为负载均衡(SLB)设备和全局负载均衡(GSLB)设备。
无论是单数据中心还是多数据中心,Thunder系列产品都可以根据需求,实现高可用或容灾方式部署。
单数据中心高可用部署网络拓扑Thunder系列产品在单数据中心的高可用部署如下图所示:部署方式说明Thunder作为互联网出口网关1)在数据中心的出口处,部署高性能的Thunder硬件产品,作为互联网出口链路的网关设备,实现多链路之间的负载分档和冗余备份。
2)2台Thunder设备采用HA方式部署,以实现高可用性保障。
3)2台Thunder设备之间建议部署专门的心跳线(可在设备上指定任意以太接口作为心跳口),以实现心跳监测的高可用性。
4)Thunder设备的上连接口或下连接口建议采用三层方式部署(即两台Thunder的上/下连接口需要在不同的三层子网中)。
主备设备的切换可通过主动ARP更新实现快速收敛。
5)结合Thunder产品的虚拟分区(ADP)功能,可以实现不同VLAN或不同链路群组之间的分隔部署和管理。
Thunder系列产品最大支持1024个虚拟分区,因此,可以实现最大1024个租户与传统网络、链路的分隔部署。
Thunder作为应用负载均衡(SLB)设备1)在每个数据中心中,部署Thunder产品作为SLB设备,实现对不同应用系统的负载分担功能和高可用性的要求。
2)Thunder可采用独立部署、HA双机热备方式部署或aVCS集群方式部署。
采用HA双机热备或集群方式部署时,两台或多台Thunder设备之间需要进行心跳检测。
可部署专门的以太口作为心跳接口,或利用已有的数据口作为心跳接口。
A10 用户手册

A10用户手册A10 Networks, Inc.Performance by Design目录1 基本硬件信息 (4)1.1设备外形 (4)1.2前面板状态灯含义 (4)1.3电源 (5)2 登录到A10 (6)2.1命令行接口方式登录 (6)2.1.1 Console方式设置说明 (6)2.1.2 SSH/Telnet方式登录说明 (7)2.1.3 CLI命令行模式说明 (7)2.2图形化用户界面(GUI)登录 (9)3 系统基本配置及维护 (11)3.1系统基本信息设定及查询 (11)3.1.1 主机名设置及查询 (11)3.1.2 时区、时间设置及查询 (11)3.2管理员 (12)3.2.1 管理员相关信息查询 (12)3.2.2 添加或修改管理员账号 (13)3.3通过E THERNET接口管理A10设备 (14)3.4SNMP (14)3.5系统配置备份及恢复 (15)3.5.1 系统配置备份 (15)3.5.2 系统配置恢复 (17)3.6系统升级 (19)4 网络及HA配置 (21)4.1配置VLAN (21)4.1.1 配置VLAN (22)4.1.2 为VLAN配置三层IP地址 (23)4.2配置链路捆绑 (24)4.3配置静态路由 (25)4.4HA配置 (26)4.4.1 配置L3 HA (26)4.4.2 配置同步 (29)5 服务器负载均衡配置 (32)5.1A10负载均衡的概念 (32)5.2配置健康检查方式 (32)5.3配置真实服务器(R EAL S ERVER) (33)5.4配置服务组(S ERVICE G ROUP) (36)5.5配置虚拟服务器(V IRTUAL S ERVER) (37)5.6ABC网典型VIP配置实例 (39)5.6.1 L4 SLB VIP配置实例 (39)5.6.2 URL-Hashing功能配置实例 (39)5.6.3 连接复用功能配置实例 (39)5.6.4 DSR工作模式配置实例 (40)6 A10常用维护命令及解释 (40)6.1常用维护命令及说明 (40)6.2命令行输出结果的过滤查询 (46)1 基本硬件信息1.1 设备外形1) A10设备前面板2) 10/100/1000M数据接口(RJ45)3) 1G光纤接口(SFP)4) 管理接口:左边是Console接口,右边是MGMT接口(以太网接口)1.2 前面板状态灯含义1.3 电源如下图所示,A10系列产品在标准配置中均配置了冗余电源。
A10 Thunder Convergent Firewall (CFW) Data Sheet说明

DATA S H E E T Thunder CFWConsolidated Firewall, CGN, ADC, VPN and Secure Web Gatewayperformance data center firewall includes a Layer 4 firewall with integrated DDoS protection and server load-balancing to protect data center assets from the inside out.enterprises and service providers. In mobile networks, it can be deployed as a security gateway to enable secure backhaul between the RAN nodes and the core network.The policy-based IPsec VPN also enables high-capacity client-to-site VPN deployment to support remote access clients in enterprise network.in from access networks and roaming partners to support uninterrupted operations. Thunder CFW can secure its own resources, such as NAT IP pools, to ensure that operational functions are not compromised.Gi/SGi LAN PROTECTIONEvolvedPacket Core (EPC)Radio Access NetworkMobile & IoT DevicesA10 Gi/SGi Firewall for the GiLANIn this scenario, a mobile network operator deploys the Gi/SGi firewall to secure communication between the EPC and the internet to protect the mobile coreinfrastructure. Integrated carrier-grade NAT enables carriers to manage communication with both IPv4 and IPv6 address protocols. Built-in DDoS protection safeguards the NAT IP pools to avoid service interruption. A10 Harmony ® Controller provides centralized management and analytics.business intelligence, tighter security controls, enhanced lawenforcement agency compliance and service monetization.Agile Management and Array Analytics-driven DashboardGain application and network servicesvisibility with the A10Harmony Controllerfor Thunder CFW. Centrally configureandmanage policies across services in a multi-cloud environment. Get real-time actionableinsights on firewall performance, criticalCGN services such as mapping distribution,NAT IP pool utilization and more, andapplication visibility including applicationdistribution by category, bytes consumed byapplication category.spam and phishing sources. The A10 URL Classification categorizes more than 460 million domains and 13 billion URLs into 83 categories to block undesirable sites and shield users from threats.Block Known Web ThreatsIdentify and block traffic going out to and coming in from known bad IP addresses on the internet with threat intelligence feeds.Prevent Data ExfiltrationIntegrate with third-party Data Loss Prevention (DLP) solutions via the industry-standard ICAP. Send decrypted traffic to DLP servers for inspection before forwarding intercepted traffic to a client or a server.Gain Superior Visibility and Control into Application TrafficIdentify and categorize traffic on the application level, allowing for more granular controls and policies to be defined, with application visibility and control. This DPI-based service provides application visibility with comprehensive user and group awareness, providing deep insights into network traffic. Understanding application traffic trends in enterprise networks allows for effective security planning and sanctioning of allowed business applications.A10 Thunder CFW DeviceInternetClientSecure Web Gateway Protects the Enterprise PerimeterDeploy Thunder CFW, with integrated SSL Insight technology, to decrypt traffic for a variety of security products, including inline, non-inline (passive/TAP) and ICAP-enabled devices.clouds, offering unprecedented telemetry as well as 100 percent RESTful API coverage. The product supports multi-tenancy features like application delivery partitions (ADP) for segmentation.7650 CFWThunderby the Numbers370Gbps8 MLayer 4 CPS128KRules384 MConcurrent SessionsThunder CFWThunder CFW IPsecData Center-to-Data CenterVPNVPNBy unifying IPsec VPN, firewall and application delivery controller (ADC) capabilities,organizations are able to both load-balance traffic and protect the data center, services and related applications from DDoS attacks and other threats.Thunder CFW provides industry-leading high performance as a physical, virtual or containerized solution. The physical appliance with hardware acceleration supports scalable and high-performance on-premises deployments. For NFVi and private cloud deployments, the virtual appliance works with leading hypervisors such as VMware ESXi, KVM and Microsoft Hyper-V, and integrates with leading NFV-MANO solutions including Ericsson Cloud Manager, NEC Netcracker HOM, Cisco NSO and Red Hat OpenStack andmore. For flexible and efficient cloud native deployments such as Docker and Kubernetes, the container option can be used.All Thunder CFW options run on A10’s ACOS software, providing feature parity, regardless of form factor, which helps simplify and consolidate operations in any deployment environment.Flexible Deployment OptionsHardware specifications and performance numbers are subject to change without notice, and may vary depending on configuration and environmental conditions. As for network interface, it’s highly recommended to use A10 Networks qualified optics/transceivers to ensure network reliability and stability.*1 Tested in single appliance SSLi deployment with maximum SSL option. Cipher "TLS_RSA_WITH_AES_256_CBC_SHA" with RSA 2K keys are used for RSA cases, "TLS ECDHE_RSA_WITH_AES_128_CBC_SHA256" with EC P-256 and RSA 2K keys are used for PFS case. | *2 With maximum SSL | *3 With base model | *4 Optional RPS available | *5 10Gbps speed only | *6 Fixed SFP+ optical ports with dual rate (10GBASE-SR and 1000BASE-SX) | *7 Hardware Bypass model comes equipped with the hardwareTLS acceleration | ^ Certification in process | + FIPS model must be purchasedHardware specifications and performance numbers are subject to change without notice, and may vary depending on configuration and environmental conditions. As for network interface, it’s highly recommended to use A10 Networks qualified optics/transceivers to ensure network reliability and stability.*1 Tested in single appliance SSLi deployment with maximum SSL option. Cipher "TLS_RSA_WITH_AES_128_CBC_SHA" with RSA 2K keys are used.*2 With maximum SSL*3 With base model. Number varies by SSL model+ Thunder 14045 comes with a splitter cable for console to provide access to both modules. | ^ Certification in process* Carrier-class firewall along with CGNAT and data-center firewall with ADC are the common use cases. SSL Insight (SWG) and IPsec are not adequate use cases. *******************************************************************************************.TestedwithUDPtrafficforCGNATusecase.Visibility and Analytics with Harmony Controller• CGNAT-Subscriber session insights-Session opening and closing rates-TopN flow consuming subscribers-TopN bandwidth consuming subscribers-Subscriber user quota alerts-CGN resource tracking-Mapping distribution per protocol and per technology-NAT IP pool utilization-Session distribution per NAT technology• Firewall-Firewall rule performance and rule distribution by protocol-Top firewall rules by state-GTP traffic insights, roam-in/out view and policy violation analytics-Comprehensive transduction log with source/destination IP, port, protocol, application, application category, and firewall actions for better visibility and faster troubleshooting• Application-Application distribution by category-Top destination IP by application distribution-Bytes consumed by application category Application-aware Firewall• Recognition of thousands protocol signatures with identification of service types within applications• Support custom rules that run real-timeIP Threat Intelligence• Prevents malicious traffic from entering your network, based on customizable risk score and toleranceThreat Investigator• Rich and contextual analytics for object under investigation Operation Modes• Transparent forward proxy• Explicit forward proxy• Proxy chainingCentralized Management and Analytics with Harmony Controller• Device and configuration management across multiple sites• Deployment wizard with guided configuration• Centralized security policy management and enforcement• Rich TLS/SSL traffic and decryption analytics for traffic insight, application insight, URL insight, source and destination insight and more• Threat investigator view• Session log drill-down• Troubleshooting tools• Extensive logging for auditADC• Advanced L4/L7 server load-balancing-Full HTTP proxy, Fast HTTP, HTTP/2, FIX, SIP, RADIUS, FTP, TCP, UDP and more -High-performance, template-based L7 switching with header/URL/domain manipulation-Comprehensive L7 application persistence support• DNS load balancing-Layer 4 (TCP, UDP) and Layer 7 (DNS-UDP, DNS-TCP-DNS over HTTPS (DoH), DNS over TLS (DoT)-Recursive DNS-DNS firewall/RPZ-DNS cache• Global Server Load Balancing (GSLB)• Comprehensive IPv4/IPv6 support• aFleX® TCL-based scripting: deep packet inspection and transformation for customizable, application-aware switching• HTTP acceleration: HTTP connection multiplexing (TCP connection reuse),• RAM caching, HTTP compression• SSL acceleration: Hardware SSL, TLS 1.2, TLS 1.3 support, Elliptic Curve Diffie-Hellman Exchange (ECDHE) and other PFS ciphers• ACME client support for automating TLS certificate renewal with Let’s Encrypt, Sectigo and else • Dynamic threat intelligence feed updated in near real time• 30-plus public, private and proprietary sources to block “call homes” to command and control servers, identify known attack sources and mitigate zero-day attacks.Scalable, High-performance Platform• Advanced Core Operating System (ACOS)-Multi-core CPU support-Linear application scaling with scalable symmetrical multi-processing (SSMP) architecture-ACOS on data plane• Linux on control plane• IPv6 feature parity• Flexible traffic acceleration (FTA) for scalable flow distribution, common attack mitigation-Hardware FTA utilizing FPGAs• Scale-out clusterNetworking• Integrated Layer 2/Layer 3• Transparent mode/gateway mode• Virtual wire interface support• Routing — static routes, IS-IS (v4/v6), RIPv2/ng, OSPF v2/v3, BGP4+• L2 protocols (STP, RSTP, MSTP)• VLAN (802.1Q)• Link aggregation (802.1AX), LACP• Access control lists (ACLs)• Traditional IPv4 NAT/NAPT• IPv6 NAPT• Jumbo frame support*• Hardware-accelerated VXLAN*• NVGRELearn More About A10 Networks Contact Us/contact ©️2023 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, Thunder, Harmony and SSL Insight are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies in this document. A10 Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. For the full list of trademarks, visit: /a10trademarks.Part Number: A10-DS-15112-EN-23 Feb 2023• Multi-tenancy with application delivery partitions (ADP) with L3-7 separation• L3 virtualizationDevOps Tools and Integration• Ansible modules and playbooks• Terraform Thunder provider• HashiCorp’s Consul and Network Infrastructure Automation (NIA) integration• Thunder Kubernetes Connector (TKC)• OpenStack Octavia driver• Cloud-init support for auto-configuration on-OpenStack-OCI-AWS-Azure• Prometheus integration for visibility and analytics monitoring* Features and certifications may vary by appliance.** Additional paid service.。
A10负载均衡SLB测试配置v1.0

A10负载均衡SLB测试配置v1.0 A10负载均衡SLB测试配置说明A10 Networks, Inc.2013年9⽉A10 Networks–“ The Performance/Price Leader!”⽬录1.测试背景 ................................................................ 错误!未定义书签。
2.测试内容 ................................................................ 错误!未定义书签。
3.测试组⽹ (3)4.产品测试 (3)1.负载均衡设备基础⽹络配置测试 (3)1.配置AX主机名称 (3)2.VLAN的配置及测试 (4)3.IP地址的配置及测试 (5)4.默认路由的配置 (6)5.动态路由的配置 (7)6.端⼝捆绑的配置及测试 (7)2.服务器负载均衡算法测试 (11)1.Round Robin 算法配置及验证 (11)2.Weight Round Robin 算法配置及验证 (14)3.Least-connection 算法验证 (17)3.服务器健康检查测试 (18)1.默认健康检查 (19)2.七层健康检查 (27)4.HTTP应⽤模板 (31)1.重定向模板 (32)2.URL/Host Switching模板 (33)3.RAM缓存模板 (40)5.会话保持测试 (40)1.基于Cookie的会话保持 (40)2.基于⽬的IP的会话保持 (40)3.基于源IP的会话保持 (40)4.基于SSL Session-ID的会话保持 (40)1. 组⽹拓扑⽂中如果未进⾏特殊说明,则均使⽤下列拓扑图:2. 产品测试配置本次测试中,⽤A10的AX负载均衡设备替代web服务器,与APP直接相连,有效提⾼了系统的整体性能,降低了系统复杂程度。
本地负载均衡技术通过在真实服务器的前端设置⼀个虚拟IP地址(VIP),将来⾃客户端的服务请求统⼀进⾏调度并转发给后端的服务器进⾏处理。
A10Thunder1030S规格_normal_20140221

A10Thunder1030S规格_normal_201402211、獨立主機採硬體式設備(Hardware Appliance)架構,並使用嵌入式或專屬作業系統,提供 6 埠(含)以上10/100/1000Mbps (Copper)實體連接埠介面與2埠(含)以上1Gb Fiber光纖介面(SFP)與2 埠(含)以上10Gb Fiber (SFP+)。
2、具備下列資料處理能力:(1) Layer 4流量(Throughput)處理能力可達10 Gbps (含)以上。
(2) 同時連線數(Concurrent Sessions)可達32,000,000(含)以上。
(3) Layer 4每秒連線處理能力CPS( Connections Per Second)可達450,000(含)以上。
(4) Layer 7每秒需求處理能力RPS( Requests Per Second)可達480,000(含)以上。
3、具備下列伺服器負載平衡(Server Load Balancing)功能:(1) Round Robin模式。
(2) Least Connection模式。
(3) Response Time模式。
(4) Weighted模式。
(5) Hash模式。
4、具備下列負載平衡之連線堅持(Persistence)功能:(1) HTTP Session ID Persistence。
(2) Cookie Persistence。
(3) Destination address Persistence。
(4) Source address Persistence。
(5) SIP Persistence。
(6) SSL ID Persistence。
5、具備Global Server Load Balancing(GSLB)廣域負載平衡及內建DNS功能, 並能回應A Record,CNAME,MX record,且支援DNSSEC 功能以確保DNS安全。
ZXA10 F809工程开局指导书
ZXA10 F809工程开局指导书法律声明若接收中兴通讯股份有限公司(以下称为“中兴通讯”)的此份文档,即表示您已同意以下条款。
若不同意以下条款,请停止使用本文档。
本文档版权所有中兴通讯股份有限公司。
保留任何未在本文档中明示授予的权利。
文档中涉及中兴通讯的专有信息。
未经中兴通讯事先书面许可,任何单位和个人不得复制、传递、分发、使用和泄漏该文档以及该文档包含的任何图片、表格、数据及其他信息。
和是中兴通讯的注册商标。
中兴通讯产品的名称和标志是中兴通讯的商标或注册商标。
在本文档中提及的其他产品或公司名称可能是其各自所有者的商标或注册商标。
在未经中兴通讯或第三方权利人事先书面同意的情况下,阅读本文档并不表示以默示、不可反言或其他方式授予阅读者任何使用本文档中出现的任何标记的权利。
本产品符合有关环境保护和人身安全方面的设计要求,产品的存放、使用和弃置应遵照产品手册、相关合同或相关国法律、法规的要求进行。
本文档按“现状”和“仅此状态”提供。
本文档中的信息随着中兴通讯产品和技术的进步将不断更新,中兴通讯不再通知此类信息的更新。
中兴通讯股份有限公司地址: 中国深圳市科技南路55号邮编518057网站: (TSM-技术支持库)邮箱: TSM售后文档库@目录1概述 (1)1.1适用范围 (1)1.2ZXA10 F809系统特点 (1)1.3ZXA10 F809的硬件结构 (2)1.4物理指标与环境要求 (4)2设备安装要求 (5)2.1安装前准备 (5)2.2安装环境和机柜要求 (5)2.2.1安装环境 (5)2.2.2机柜(机箱)要求 (6)2.2.3设备供电要求 (6)2.2.4设备散热要求 (7)2.2.5线缆走线要求 (7)2.2.6防雷接地要求 (10)3获取开局基本数据 (12)3.1基本数据获取 (12)3.2相关线缆制作说明 (12)3.2.1串口调试线 (12)3.2.2RS232-RJ45串口数据采集线 (12)3.2.3RS232串口转接线 (13)3.2.4RS485-RJ45串口数据采集线 (13)3.2.5RS485串口转接线 (13)3.2.6RS232流控线缆制作说明 (14)4F809开局基本配置 (15)4.1F809 版本升级 (15)4.1.1通过带内进行版本升级 (15)4.1.2通过带外网口进行版本升级 (16)4.1.3F809双BOOT和双版本的介绍 (17)4.1.4PON MAC固件版本升级 (17)4.1.5CPLD版本升级 (18)4.2F809注册 (18)4.2.1添加F809类型模板 (18)4.2.2带宽模板配置 (19)4.2.3配置MAC/SN/LOID (20)4.2.4进行F809注册 (21)4.2.5在OLT上对F809 EPON接口进行配置 (22)4.2.6对F809进行扩展OAM配置 (23)4.3F809以太网业务数据配置 (23)4.3.1OLT侧上联口配置 (23)4.3.2OLT上F809 EPON接口配置 (23)4.3.3F809侧上联口配置 (23)4.3.4F809侧用户端口配置 (24)4.4IP+PORT方式串口数据采集业务 (25)4.4.1IP+PORT UDP方式串口数据采集业务 (25)4.4.2IP+PORT TCP方式串口数据采集业务 (27)4.5虚拟串口管理软件的安装 (29)4.6虚拟串口方式数据采集业务 (32)4.6.1启动服务器和客户端进程 (32)4.6.2默认串口属性配置 (34)4.6.3串口业务VLAN配置 (36)4.6.4发现串口设备(被动发现方式) (36)4.6.5发现串口设备(主动发现方式) (38)4.6.6关联关系配置 (39)4.6.7修改串口属性 (44)4.6.8虚拟串口功能自测 (45)4.6.9信令跟踪功能 (48)4.7EPON保护机制(TYPE D和手拉手) (51)4.7.1手拉手保护基本结构和特点 (51)4.7.2手拉手保护倒换条件 (52)4.7.3OLT上联口断的处理流程 (53)4.7.4主动发送ARP包的快速恢复流程 (54)4.7.5上层交换机上的配置注意事项 (56)5配网自动化以及抄表的典型应用 (57)5.1典型组网结构 (57)5.2配网自动化应用场景 (59)5.3抄表业务应用场景 (62)图目录图1-1 F809机框 (2)图1-2 F809上面板 (2)图1-3 F809前面板 (3)图2-1 F809信息箱安装图 (6)图2-2 F809竖直壁挂安装 (7)图2-3 F809横向壁挂安装 (8)图2-4 F809 TYPE D(手拉手保护)光纤连接示意图 (8)图2-5 F809 TYPE C光纤连接示意图 (9)图2-6 F809 单PON光纤连接示意图 (9)图4-1 串口测试工具 (26)图4-2 tcp-udp测试工具 (28)图4-3 安装向导 (29)图4-4 软件授权 (30)图4-5 选择安装位置 (30)图4-6 安装完成界面 (31)图4-7 菜单启动方式 (32)图4-8 启动成功界面 (32)图4-9 虚拟串口客户端 (33)图4-10 登录界面 (33)图4-11 客户端界面 (33)图4-12 登录界面 (34)图4-13 串口默认属性修改 (34)图4-14 保存数据 (35)图4-15 保存进度 (35)图4-16 监听设置 (36)图4-17 完成设置 (37)图4-18 登录界面 (37)图4-19 重新发现 (39)图4-20 虚拟串口设置 (39)图4-21 增加串口 (40)图4-22 操作完成 (40)图4-23 映射关系 (41)图4-24 修改 (42)图4-25 修改后的界面 (42)图4-26 保存配置 (43)图4-27 保存进度 (43)图4-28 修改串口属性 (44)图4-29 修改参数 (44)图4-30 收发包工具 (45)图4-31 打开方式 (46)图4-32 虚拟串口界面 (47)图4-33 发包工具界面 (48)图4-34 信令跟踪打开方式 (49)图4-35 信令跟踪设置 (49)图4-36 跟踪结果 (49)图4-37 地址及端口 (50)图4-38 心跳消息 (51)图4-39 分光器 (52)图4-40 LST组网 (53)图4-41 基本组网 (54)图4-42 ARP报文 (55)图5-1 F809支持的组网结构 (58)图5-2 配电网自动化综合解决方案 (59)图5-3 手拉手组网结构的配电自动化应用 (61)图5-4 混合组网结构的配电自动化应用 (62)图5-5 抄表业务典型组网 (63)图5-6 F809直连电表 (64)图5-7 抄表业务应用场景 (65)表目录表1-1 F809指示灯说明 (3)表1-2 F809接口说明 (4)1 概述1.1 适用范围中国的经济高速前进造就了中国电力迅速的发展,并给中国电网企业带来了新的挑战。
A10-DS-15100-EN
DATASHEETOverview ______________________A10 Thunder Series is a family ofhardware and software appliances ready to match any deployment need. Each Thunder Series form factor is powered by ACOS software, which brings a unique combination of shared memory accuracy and efficiency, 64-bit scalability and advanced flow processing.THUNDER ADCNext-generation Application Delivery ControllerA10 Networks® Thunder® ADC product line of high-performance, next-generation application delivery controllers enable customers’ applications to be highly available, accelerated and secure. Thunder ADC is our premium ADC product line, delivering up to 220 Gbps of throughput in a single appliance or 1.7 Tbps of throughput in a cluster, the broadest range of form factors (physical, virtual, Bare Metal, and hybrid), and with expanded system resources designed to support future feature needs.The A10 Thunder ADC product line is built upon A10’s Advanced Core Operating System (ACOS®) platform, with our Symmetric Scalable Multi-Core Processing (SSMP) software architecture that delivers high performance and a range of deployment options for dedicated, hosted or cloud data centers.• Application availability for customer satisfaction: Enable your Web and key infrastructure servers to scale seamlessly to meet customer demand and ensure business continuity to maximize revenue and user satisfaction.• Application acceleration for efficient operations: Provide fast and responsive service to your customers for competitive advantage and reduced infrastructure requirements for both application delivery and critical services, driving down CAPEX and OPEX.• Security for compliance and risk reduction: Protect against advanced and emerging attacks for uninterrupted operations, brand protection, and revenue loss while meeting required regulatory compliance obligations for Payment Card Industry Data Security Standard (PCI DSS) and other regulations.A10 Thunder ADC delivers critical services in the most efficient hardware and software models. With its data center-efficient design and compact form factor, Thunder ADC minimizes your rack space, power consumption, and cooling costs.While the Thunder ADC platform provides a rich set of application and security services out-of-the-box, it also supports open and standards-based programmability, which allows developers to rapidly integrate custom and off-the-shelf services with Thunder ADC. The A10 Harmony ™ architecture combines open programmability, policy enforcement, and telemetry to deliver the next generation of application networking.Supported Platforms _____________Thunder ADC physical applianceThunder HVAhybrid virtual appliancevirtual applianceaGalaxycentralized managementBare MetalFeatures and BenefitsWhether you are an enterprise, service provider or Web giant, A10Thunder ADC offers key benefits to make your data center applications available, accelerated and secure.Application AvailabilityHighly available applications and data centers: Advanced server load balancing (SLB) and global server load balancing (GSLB) ensure maximum uptime by detecting local and remote outages. Acting on advanced health checks, A10 Thunder ADC directs connections to active servers and data centers in a way that is transparent to the end user.Next-generation cloud data center evolution: Equip your network for the next phase in network evolution with Infrastructure-as-a-Service (IaaS) capabilities. Benefit from integration of software defined networks (SDNs) with overlay networking (VXLAN and NVGRE), cloud orchestration systems (OpenStack, Microsoft SCVMM, Cisco ACI, and more), network functions virtualization (NFV) using vThunder virtual appliances, and enable service chaining and traffic insertion.Fast deployment and proven application configuration andprovisioning: Rapidly enable and deploy business critical applications with predefined smart templates for popular applications fromMicrosoft (Exchange, Skype for Business, SharePoint), Oracle and many more, to deploy in hours, not days or weeks.Application AccelerationApplication acceleration for a better user experience andinfrastructure utilization: Offload application infrastructure from CPU and memory intensive tasks to reduce costs. Techniques include SSL offload (including offload of demanding 2048- and 4096-bit key operations ECDHE, and Perfect Forward Secrecy), HTTP compression, support for SPDY, TCP reuse, and RAM caching. Deliver a fasterexperience for your customers and reduced CAPEX and OPEX as your infrastructure scales efficiently without wasted compute cycles.Virtualization for ADC and SLB consolidation: Choose the best option for your network to enable multi-tenancy. Maximize density with our Application Delivery Partitions (ADP), allowing you toconfigure up to 1,023 virtual ADCs on a single Thunder ADC appliance that support Layer 3 virtualization. Rapidly deploy pure software vThunder appliances or Hybrid Virtual Appliances (HVA) to provide strong isolation and complete resource isolation as required. Full control and deep packet inspection (DPI) capabilities to solve complex problems: aFleX® TCL scripting provides granular traffic transformation capabilities to adjust traffic as needed for your applications. Additionally, advanced ADC capabilities enable the most common requirements to be met with specific preconfigured templates and capabilities, for example L7 URL switching.Flexible management to optimize IT operations: Multiplemanagement capabilities simplify operation tasks using the aGalaxy centralized management system to control any A10 Thunder device, whether pushing configurations, aFleX rules providing 100 percent coverage, backing up SSL keys and much more. Our aXAPI® REST-based API gives complete management control with custom scripting for homegrown management operations or integration into third-party management systems. Also, plug-ins and packages are available to be used with partners’ management systems such as Microsoft SCVMM and others.SecurityEnhance your data center security: Our ICSA-certified web application firewall (WAF) guards Web servers against the criticalOpen Web Application Security Project (OWASP) top ten threats facing web-based application servers, while our DNS application firewall (DAF) gives advanced protection against domain name system (DNS) infrastructure exploitation, with granular application rules for query behavior and mitigation methods such as rate limiting.• Firewall Load Balancing • DDoS Mitigation • WAF • DAF • AAM• Tra c Steering • aFleX Scripting • Firewall Load Balancing• Firewalls • IDS/IPS • DLP• OtherWeb App DNS Other App• DDoS Mitigation • WAF • DAF • AAM• ADC High Availability • SSL O oad • TCP Reuse • RAM Caching • CompressionArchitecture and Key ComponentsApplication delivery example for Web, DNS and other servicesDMZ security device scaling, offload and accelerationEnhance, scale and optimize your existing DMZ security infrastructure: With our appliances supporting up to 220 Gbpsper device, firewall load balancing (FWLB) enables existing security products to scale seamlessly. Thunder ADC also provides hardware assisted high-performance decryption and re-encryption with rates in excess of 40 Gbps.Protect against the latest emerging threats: As threats emerge, the A10 Thunder ADC enables your network to be ready with effective countermeasures. DDoS protection is standard in all appliances, and with FPGA FTA-based models, protection can be enabled for the highest volume attacks against application servers. The FPGA mitigates common volumetric attacks, while general purpose CPUs can be used to mitigate more sophisticated low and slow and application attacks such as Slowloris and HTTP floods.Stop data breaches with A10 Threat Intelligence: Cybercriminals use automation to execute large-scale attacks and evade corporate defenses. The A10 Threat Intelligence Service, an optional subscription for Thunder ADC, provides a near real-time feed of malicious IP addresses to identify automated attacks and prevent data loss. Aggregating IP reputation data from over three dozen sources, A10 Threat Intelligence Service enables Thunder ADC to block inbound or outbound threats before malicious users can steal data or disrupt access.Streamline authentication and authorization: With Application Access Management (AAM), Thunder ADC can authenticate users and enforce access policies. With support for a wide array of authentication protocols, including OCSP, SAML, RADIUS, LDAP and Kerberos. Thunder ADC enables customers to centralize authentication management and reduce operating costs, while leveraging SAML 2.0 and AAM enables Single Sign-On for a superior user experience.A10 HarmonyWith the A10 Harmony architecture, Thunder ADC automates policy enforcement, improves visibility, and accelerates service integration. Thunder ADC customers can take advantage of A10 Harmony architecture to rapidly provision application networking services and effectively manage and monitor their deployments.POLICY ENFORCEMENT• Operational Simplicity • Reduce TCO• AutomationTELEMETRY• Visibility and Control• Health Checks• Proactive Maintenance• TroubleshootingSECURE & OPEN• Open APIs• Autonomous Security• SDN, NFV Integration• Third-party IntegrationManagementComprehensive and scalable management: The A10 ThunderADC devices feature an array of options to simplify and automatemanagement tasks to reduce administration overhead and ensurecomplex tasks can be done accurately the first time. To complement theindustry standard CLI Web GUI, our RESTful API (aXAPI) can be used tointegrate with third party or custom management consoles, to efficientlyoperate one or more Thunder ADC appliances. For larger deployments,our optional aGalaxy centralized management system ensures routinetasks can be performed at scale, across multiple physical, virtual orhybrid Thunder appliances, regardless of physical location.Thunder ADC supports granular role-based access control, enabling youto create users and groups and grant read-only or read/write privilegesfor specific partitions or management interfaces. To scale load balancingcapacity, aVCS (virtual chassis system) allows multiple appliances tooperate as one, with a single management point for all appliances in thevirtual chassis.Product DescriptionA10 Thunder ADC Product LineA10 Thunder ADC is a family of hardware and software appliancesready to match any deployment need. Each Thunder ADC form factoris powered by ACOS software, which brings a unique combinationof shared memory accuracy and efficiency, 64-bit scalability andadvanced flow processing.• Thunder ADC Hardware Appliances: The A10 Thunder ADC lineof appliances fits all size networks with entry-level models startingat 5 Gbps and moving up to a 220 Gbps high-performanceappliance for your most demanding requirements. All models aredual power supply-capable, feature solid-state drives (SSDs) anduse no inaccessible moving parts for high availability. All modelsbenefit from our Flexible Traffic Acceleration (FTA) technology,with select models featuring field programmable gate arrays(FPGAs) for hardware optimized FTA processing; this provideshighly scalable flow distribution and distributed denial of service(DDoS) protection capabilities. Select models include dedicatedsecurity processors for SSL offload, switching and routingprocessors for high-speed network processing, and lights-outmanagement (LOM) support for out-of-band monitoring andmanagement. Each appliance offers the best performance perrack unit and the highest level “80 PLUS™ Platinum” certificationfor power supplies to ensure a green solution and reduce powerconsumption costs. Coupled with high density 1 GbE, 10 GbE,40 GbE, and 100 GbE port options, Thunder ADC meets thehighest networking bandwidth demands.Thunder ADC’s integrated Web application firewall has achieved WAF certification from ICSA Labs. ICSA Labs testing and certification ensures that Thunder ADC performs as intended to secure application services from exploitation and attack.• vThunder Virtual Appliances: The vThunder® ADC line of virtual appliances is designed to meet the growing needs of organizations requiring a flexible and easy-to-deployapplication delivery and server load balancer solution running within a virtualized infrastructure or public cloud service. Each vThunder instance has a full set of features that can run atop your choice of commodity hardware and also your choice of leading hypervisor; for example, VMware ESXi, Microsoft Hyper-V, and KVM. vThunder ADC for Amazon Web Services (AWS) and Microsoft Azure are also available for cloud deployment, powered by our aCloud® services. • Thunder ADC for Bare Metal: This family of high-performance software appliances provide complete ADC functionality that is tied to a dedicated server. With no need for an intervening hypervisor, the resulting throughput of up to 40 Gbps of Layer 7 traffic processing is optimized. As with vThunder, the Bare Metal option eases installations. Large enterprise, service providers and Web hosting operations are ideal environments that can leverage the flexibility afforded by Bare Metal.• Thunder Hybrid Virtual Appliances (HVA): Offering you the combined flexibility of a virtual appliance and the power of the performance optimized hardware appliances, A10 Thunder HVA appliances enable multi-tenancy with multiple vThunder virtual appliances running on dedicated, turnkey hardware appliances with a high density of instances that are strongly isolated from each other, each with its own dedicated ACOS instance and dedicated compute resources. The fact that each instance can use dedicated SSL security processor technology with Single Root I/O Virtualization (SR-IOV) to offload and accelerate SSL sessions is a key hardware advantage. All vThunder ADC instances are included within the HVA appliance.Additional management options are also available to enhance your Thunder ADC infrastructure. A10’s aGalaxy® line of hardware and software appliances centrally manage all Thunder ADC hardware and software appliances for streamlined operations, resulting in reduced OPEX.Security DDoS | SSL | WAF | AAM | DAF | FWIPv6 | SLB | SSL | GSLB | TCP Opt | NATDedicated NetworkManaged HostingCloud IaaSADC CGN TPSSSLi CFW ACOS – Advanced Core Operating SystemA10 Networks Harmony Architecture*Optimization &Acceleration PolicyManagementSoftware SolutionsPlatform OS and ServicesForm FactorsDeliveryModels*Features vary by form factor and software solutionThunder ADC Hardware Appliance Specifications TableThunder SPE Hardware Appliance Specifications TableThunder HVA Products Specifications TablevThunder ADC Specifications TablevThunder ADC Specifications Table(continued)Thunder ADC for Bare Metal Specifications Table1112Thunder 840Thunder 930Thunder 1030SThunder 5840(S)Thunder 6430(S)Thunder 3430(S)Thunder 5330(S)Thunder 5440(S)Thunder 5430(S)-11Thunder 5630(S)Thunder 3030S Thunder 4440(S)Thunder 3230(S)Thunder 6630(S)Thunder 7440(S)Thunder 6440(S)Thunder 4430(S) Thunder 5435(S) SPE Thunder 6435(S) SPEThunder 6635(S) SPEThunder 3030S HVAThunder 3530S HVAThunder4435(S) SPEDetailed Feature List*Application Delivery• Comprehensive IPv4/IPv6 Support• Advanced Layer 4/Layer 7 Server Load Balancing-Fast HTTP, Full HTTP Proxy-High-performance, template-based Layer 7 switching withheader/URL/domain manipulation-Comprehensive Layer 7 application persistence support-FTP, DNS, FIX and more• Comprehensive load balancing methods-Round Robin, Least Connections, Weighted RR, Weighted LC,Fastest Response, & more• aFleX – deep packet inspection and transformation forcustomizable, application-aware switching• Advanced Health Monitoring-Comprehensive Protocol Support – ICMP, TCP, UDP, HTTP, HTTPS, FTP, RTSP, SMTP, POP3, SNMP, DNS, RADIUS, LDAP, & more-Scriptable health check support using TCL, Python, Perl, and Bash • High Availability – Active-Active, Active-Standby configurations • SIP Load Balancing for VoIP• STARTTLS support for Secure Email & LDAPS• Spam Filter Support – high-speed application of very large black/ white lists• Firewall Load Balancing (FWLB)• Global Server Load Balancing (GSLB)• Transparent Cache Switching (TCS)• Next Hop Load Distribution (NHLD) for load balancing multiplelinks• Diameter AAA Load Balancing• Database Load Balancing• Internet Content Adaptation Protocol (ICAP) Support Application Acceleration• HTTP Acceleration and Optimization-HTTP Connection Multiplexing (also called TCP connection reuse) -RAM Caching-HTTP Compression• WAN protocol support including Selective Acknowledgment, Fast Ramp, Client Keep alive, and Window Scaling• HTTP Pipelining support• SPDY protocol supportSecurity• Web Application Firewall (WAF)• DNS Application Firewall (DAF)• Next-generation DDoS protection for servers and CGNAT pools • Application Access Management (AAM)—SAML, Kerberos, NTLM, TDS SQL Logon, LDAP, RADIUS, Basic, OCSP stapling, HTML Form- based• AAM RADIUS-based audit support• Single sign-on (SSO) authentication relay• Authentication for Microsoft SharePoint, Outlook Web Access, and other packaged and custom applications• SSL Acceleration-SSL Offload-Support for all TCP Protocols – SSL Termination, SSL Bridging(SSL Initiation)-TLS 1.2 and 4096-bit SSL key support-Perfect Forward Secrecy (PFS) with Elliptic Curve Diffie-HellmanExchange (ECDHE) and other Elliptic Curve Cryptography (ECC)ciphers-SSL Session ID Reuse-AES-NI, GCM and ECDHE ciphers for vThunder• IP Anomaly Detection• Connection Rate Limiting/Connection Limiting• Bandwidth Rate Limiting per Source IP• Dynamically add IPs to Black-White ListsA10 Threat Intelligence Service**• Dynamically updated threat intelligence feedHigh Performance, Scalable Platform• ACOS (Advanced Core Operating System)-Multi-core, Multi-CPU support-Linear Application Scaling-Linux on control plane• ACOS on data planeNetworking• Integrated Layer 2/Layer 3• Transparent Mode/Gateway Mode• Routing – Static Routes, IS-IS (v4/v6), RIPv2/ng, OSPF v2/v3, BGP4+• VLAN (802.1Q)• Trunking (802.1AX), LACP• Access Control Lists (ACLs)• Traditional IPv4 NAT/NAPT• IPv6 NAPT• Jumbo Frame support• Hardware-accelerated VXLAN• NVGREIPv6 Migration/IPv4 Preservation• Full native IPv6 management and feature support• SLB-PT (Protocol Translation), SLB-64 (IPv4<–>IPv6, IPv6<–>IPv4) • Carrier Grade NAT (CGN/CGNAT), Large Scale NAT (LSN), NAT444, NAT44, NAT46-Integrated DDoS protection for NAT pools• NAT64/DNS64, DS-Lite, 6rd, LW4o6• ALG protocol support for protocols with dynamic ports like SIPand FTPManagement• Dedicated management interface (Console, SSH, Telnet, HTTPS)• Web-based Graphical User Interface (GUI) with LanguageLocalization• Industry-standard Command Line Interface (CLI) support• Granular Role-based Access Control• SNMP, Syslog, email alerts, NetFlow v9 and v10 (IPFIX), sFlow• Port mirroring• REST-style XML API (aXAPI) for all functions• Local LDAP, TACACS+, RADIUS support• Selectable number of CPUs for control processing1314Corporate HeadquartersA10 Networks, Inc 3 West Plumeria Ave.San Jose, CA 95134 USA Tel: +1 408 325-8668Fax: +1 408 Part Number: A10-DS-15100-EN-16 Apr 2016Worldwide OfficesNorth Americasales@ Europeemea_sales@ South Americalatam_sales@ Japanjinfo@ Chinachina_sales@Hong KongHongKong@ Taiwantaiwan@ Koreakorea@ South AsiaSouthAsia@ Australia/New Zealand anz_sales@To learn more about the A10 Thunder Application Service Gateways and how it can enhance your business, contact A10 Networks at: /contact or call to talk to an A10 sales representative.©2016 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, Thunder and SSL Insight are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies in this document. A10 Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. For the full list of trademarks, visit: /a10-trademarks.About A10 NetworksA10 Networks is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, California, and serves customers globally with offices worldwide. For more information, visit: .Virtualization• aVCS (Virtual Chassis System)• vThunder Virtual Appliance for VMware vSphere ESXi, Microsoft Hyper-V, KVM (with SR-IOV and Virtio support), Amazon Web Services (AWS) AMI, and Microsoft Azure VHD• Multi-tenancy with Application Delivery Partitions (ADP) -Partition-based management -L3 virtualization• Hypervisor acceleration and management integrationCarrier-grade Hardware• Advanced hardware architecture • Hardware-based SYN Cookies• Hot swap Redundant Power Supplies (AC or DC)• Smart Fans (hot swap) • Solid-state drive (SSD) • High Port Density • 40 GE ports • 100 GE ports• Tamper detection• Lights Out Management (LOM/IPMI)• Hardware Security Module (HSM) option •High performance security processor optionCertificationsSecurity and Capability Assurance Certifications *• ICSA Labs WAF Certification • Common Criteria EAL 2+• FIPS 140-2 Level 2• Joint Interoperability Test Command (JITC)•Network Equipment Building System (NEBS) compliance*Features and certifications may vary by appliance **Additional paid service。
ZUXN B200 工程开局指导(V2.00.71版本)2013-12-12
开局准备为了避免中试调试不完全的情况而使ZXSS10B200运行存在隐患,开局时需要运行环境检查脚本SBC产品出厂检测自动化脚本(SBCEnvCheck注:SBC使用不同的机架是有差异的1)使用A02机架需要设置槽位号和风扇速率2)脚本有针对A02/A04/A12的检测选项(A02为2槽位3U机框;A04为4槽位5U 机框;A12为12槽位14U机框)3)选项如下:[root@sbc test]# ./SBCEnvCheck.shThis is tool for CGSL(V2.0), please select the rack type of SBC:1: A022: A043: A120: QuitPlease select?(0/1/2/3)IPMC版本检查最新的IPMC4需要升版本到2012-4-9的版本,老的IPMC2需要升级版本到2012-4-10的版本。
查询是IPMC2还是IPMC4,可以通过IPMC串口查询(串口在刀片前面板),如下(见红色字体):如何查询IPMC类型:IPMC->PUB_ShowIpmcInfo**************************************************************** Z T E A T C A I P M C I N F O R M A T I O N ****************************************************************Ipmc Version: ---- IPMC2Board Type: ---- SBCJ //单板类型Cpu Type: ---- AT91Firmware Version: ---- 1.1.40.57 //版本号Make Time: ---- 2012-4-10 //版本编译时间FPGA VERSION: ---- 6PCB VERSION: ---- 3BOM ID: ---- 3EPLD VERSION: ---- 5**************************************************************** I P M C I N F O R M A T I O N E N D *串口登录ZXSS10B200调试注:适用于SBC 使用不同机架的情况下当SBC配置和版本情况都不清楚,或没有任何配置的情况下,我们采取串口直连SBC的方式进行配置。
A10负载均衡测试方案
A10 负载均衡测试方案目录1 测试目的 (5)2 测试环境描述 (5)2.1 测试设备 (5)2.2 测试时间和人员 (5)2.3 测试拓扑图 (5)2.3.1 测试拓扑图一 (6)2.3.2 测试拓扑图二 (6)2.3.3 测试拓扑图三 (7)2.4 测试拓扑图说明 (7)2.4.1 拓扑图一说明 (7)2.4.2 拓扑图二说明 (8)2.4.3 拓扑图三说明 (8)3 测试项目 (8)3.1 拓扑图一测试项目 (8)3.2 拓扑图二测试项目 (9)3.3 拓扑图三测试项目 (10)4 拓扑图一测试内容 (11)4.1 基本功能测试 (11)4.1.1 项目:系统基本设置测试 (11)4.1.2 项目:系统账号管理 (13)4.1.3 项目:SNMP 监控功能 (16)4.1.4 项目:系统维护 (18)4.1.5 项目:设备状态监控功能测试 (20)4.1.6 项目:设备系统时间功能测试 (22)4.1.7 项目:设备系统日志输出功能测试 (24)4.2 负载均衡服务测试 (25)4.2.1 项目:A10 会话保持测试 (25)4.2.2 项目:服务器健康检查测试 (29)4.2.3 项目:SSL 加密测试 (35)4.2.4 项目:http 压缩测试 (38)4.2.5 项目:TCP 连接复用功能测试 (40)4.2.6 项目:内容缓存功能测试 (42)4.3 高可用性 HA 相关测试 (44)4.3.1 项目:A10Thunder 重启测试 (44)4.3.2 项目:A10 Thunder 拔线测试 (46)4.3.3 项目:A10 Thunder 手工 HA 切换测试 (47)5 拓扑图二测试内容 (48)(本次测试因环境未搭建该测试环境,只在模拟环境测试) (48)5.1 部署模式相关测试 (48)5.1.1 项目:A10 Thunder 负载均衡旁路模式部署 (48)5.1.2 项目:A10 Thunder 地址 NAT 测试 (49)5.1.3 项目:A10 Thunder 不做 Reverse-NAT 测试 (52)5.1.4 项目:A10 Thunder 负载均衡源地址透传测试 (55)5.2 负载均衡算法相关测试 (57)5.2.1 项目:轮询算法测试 (57)5.2.2 项目:比例算法测试 (58)5.2.3 项目:最小连接数测试 (61)5.3 负载均衡指定分发相关测试 (62)5.3.1 项目:负载均衡指定分发测试 (63)6 拓扑图三测试内容 (65)6.1 基本链路功能相关测试 (66)6.1.1 项目:基本链路配置测试 (66)6.1.2 项目:链路健康监测(7 层方式)测试 (68)6.1.3 项目:链路 NAT 应用 (72)6.2 链路组算法相关测试 (74)6.2.1 项目:带权重的最小连接数 (75)6.2.2 项目:静态轮询测试 (76)6.3 链路精细功能相关测试 (78)6.3.1 项目:会话保持(基于目标 IP+Port)测试 (78)6.3.2 项目:NAT 地址保持 (80)6.4 链路备份功能相关测试 (82)6.4.1 项目:链路故障自动切换至其他指定链路 (82)6.5 GSLB 分发策略 (84)6.5.1 项目:基于运营商地址段分发 (84)6.6 健康检查相关测试 (89)6.6.1 项目:服务器 down 测试 (89)6.6.2 项目:链路 down 测试 (91)6.6.3 项目:负载均衡设备 down 测试 (92)7 测试结果 (94)1 测试目的本次测试,根据公司的实际应用需求,结合现有应用实际情况,搭建模拟测试环境,采用具有针对性的应用优化测试。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
A10服务器负载均衡SLB开局文档目录1.SLB开局流程 (3)2.开局前准备工作 (4)2.1.环境准备工作 (4)2.2.A10T HUNDER配置流程确认 (5)3.设备安装加电 (6)4.设备配置 (6)4.1.初始化配置 (6)4.2.配置网络VLAN和IP地址 (15)4.3.配置双机VRRP (21)4.4.配置服务器 (26)4.5.配置服务组 (27)4.6.配置SNAT池 (29)4.7.配置虚拟服务器 (29)4.8.SNMP配置 (32)4.9.配置远程管理和密码修改 (34)4.10.将主机配置同步到备机 (36)4.11.数据备份及保存 (37)4.12.S HOWTECH文件导出 (39)5.设备运维 (40)5.1.设备基本运行状态查看 (40)5.2.虚拟服务器运行状态查看 (41)5.3.接口工作状态查看 (42)5.4.日志信息查看及导出 (43)5.5.常用CLI命令 (44)5.5.1.show version (44)5.5.2.show running-config (44)5.5.3.show ip interface brief (44)5.5.4.show cpu (44)5.5.5.show ip route (44)5.5.6.show session brief (44)5.5.7.show slb server (45)5.5.8.show slb virtul-server (45)6.开局确认表 (46)1.SLB开局流程在进行SLB开局前需要阅读开局流程,在开局结束后需要对流程中环节进行确认2.开局前准备工作2.1.环境准备工作开局前需要对用户实施环境进行初步的了解,可以通过电话、邮件等方式了解用户真实的需求,主要了解的内容包括:1、设备供电情况、设备安装位置2、主机名、IP地址/VLAN、路由、虚拟服务器、地址池、负载均衡算法、会话保持方式、双机地址等按照了解的内容填写SLB规划图和用户拓扑图拓扑图2.2.A10 Thunder配置流程确认在对A10 Thunder进行配置之前,需要对实施过程步骤进行确认。
A10 Thunder 主要配置步骤如下:(1)设备安装,加电、并连接到相应的交换机节点上;(2)设备初始化配置,升级到统一的软件版本、更改时区及时钟、设置主机名(3)配置网络VLAN和IP地址(4)配置SNAT池(5)配置双机(6)配置服务器(7)配置服务组(8)配置虚拟服务器(9)测试和确认业务系统正常(10)配置远程管理和密码修改3.设备安装加电设备加电安装需要严格按照A10公司设备安装手册进行,确认电源4.设备配置4.1.初始化配置对于A10 Thunder设备,初始化配置有2种方式:WEB图形化界面和CLI方式。
文档中我们选择中文WEB图形化配置。
配置可以使用所有主流浏览器。
建议使用google chrome浏览器,windows ie建议使用6.0以上版本管理初始登录设备可以通过设备管理口进行登录,如下图红色方框所示:设备管理口默认IP地址为172.31.31.31,需要将电脑网卡IP地址设置在同一网段:使用https://172.31.31.31进行登录,默认的登录用户名:“admin”,密码:“a10”,如下图A10 Thunder WEB图形界面分为配置模式和监控模式,所有配置均在配置模式中进行,所以统计、监控相关的功能都在监控模式中进行。
初始化主要包括:(1)升级设备软件版本到较新的版本为了未来的运维管理,统一升级较新的软件版本,本文中以272-P9为例。
配置模式—系统-维护-升级:出现如下界面:点击“选择文件”按钮,选择本地的镜像文件:ACOS_non_FTA_2_7_2-P9_78.64.tgz,并点击打开:出现如下界面,点击“确定”进行升级:出现升级进度条,chrome谷歌浏览器左下角会显示上传进度:升级完成后,出现如下成功提示界面:点击配置模式-设置-动作-重启:重启后,在设备登录后的默认界面可以确认软件版本升级是否成功,如果软件版本显示:2.7.2-P4(build:76),则设备升级成功:(2)修改时区和时间:配置模式-系统-设置-时间:1、时区在下拉菜单中,选择(GMT+8:00)Beijing,Chongqing,Hong Kong,Urumqi,然后点击下方的“确定”保存:2、在日期/时间选项,可以通过2种方式同步设备时间:A、手工同步本地计算机的时间:点击日期/时间选项后面的同步按钮即可同步本地配置计算机的时间:B、NTP服务器同步:修改后依旧点击“确定”进行保存。
(3)配置主机名:根据设备命名规范要求:A10 2台TH930的的命名应该为:N-VGXBAL930-01、N-VGXBAL930-02,其中,01为主机,02为备机。
配置模式-网络-DNS:根据2台TH930的命名分别修改主机和备机的主机名:N-VGXBAL930-01:N-VGXBAL930-02:(4)设置A10 Thunder管理网口地址、网关配置模式—网络-接口-管理:设备默认管理接口地址为172.31.31.31,默认网关为空,根据用户要求修改管理接口地址和默认网关:N-VGXBAL930-01:50.28.40.204N-VGXBAL930-02:50.28.40.205注:此处的默认网关只是管理接口的默认网关,和系统自身的默认网关是分离的。
4.2.配置网络VLAN和IP地址1、Enable所有接口状态A10 Thunder 930默认情况下,所有物理接口都是disable的,所以在进行配置之前需要启用所有接口:配置模式-网络-接口-LAN:选择接口前的方框勾选所有物理接口,然后点击“启用”:即可启用所有物理接口:2、创建Trunk口创建端口聚合组,将E1和E2加入该Trunk组中配置模式-网络-Trunk,点添加:将E1和E2接口从可用的拖到端口,名称填SKT,Trunk ID为1,点“确定”:同理将E5和E6加入端口聚合组,名称填Failover,Trunk ID为2,点“确定”:3、创建Vlan 并添加接口:配置模式-网络-VLAN,点添加:根据前面的组网规划,需要创建Vlan ID为43,名称为STK的Vlan,将E1和E2拖动到右边“标记的”下面,并将该VLAN关联到43的VE接口(虚拟接口)上,点击“确定”保存:同理,根据前面的规划,创建VLan ID为1000,名称为Failover的Vlan,将E5和E6拖动到左边“未标记的”下面,并将该Vlan关联到1000的VE接口(虚拟接口)上,点击“确定”保存:4、为VE接口分配IP地址:配置模式-网络-接口-虚拟,点击ve43:N-VGXBAL930-01的配置:填入规划的IP地址:50.28.43.141,掩码:255.255.255.128,名称为STK:N-VGXBAL930-02的配置:填入规划的IP地址:50.28.43.142,掩码:255.255.255.128,名称为STK:点击最下方的“确定”保存:同理配置VE1000:配置模式-网络-接口-虚拟,点击ve1000:N-VGXBAL930-01:名称填:Failover,IP地址填:1.1.1.1,掩码填:255.255.255.0N-VGXBAL930-02:点击下方的“确定”保存:最后结果如下:N-VGXBAL930-01:N-VGXBAL930-02:5、配置默认路由:配置模式-网络-路由-IPv4静态-添加:添加默认网关地址50.28.43.254,点击“确定”保存:4.3.配置双机vrrp配置-系统-VRRP接口,将E5和E6上作为心跳接口,点击“启用”:配置-系统-VRRP全局:主设备01:常规部分:vrrp状态选择“启用”,设备ID 填1,组ID填1,vrid部分:vrip:default,优先级填250,点击右边的添加:浮动IP地址部分:组名下拉菜单选1,IPv4地址填写浮动IP:50.28.42.113,点击右边的“添加”:设置track条件:点击右边的“添加”,并点击下方的“确定”保存。
备设备02:常规部分:vrrp状态选择“启用”,设备ID 填2,组ID填1,vrid部分:vrip:default,优先级填240,点击右边的添加:浮动IP地址部分:IPv4地址填写浮动IP:点击右边的“添加”:设置track条件:点击右边的“添加”,并点击下方的“确定”保存。
双机配置完成后,如果一切正常,主机01 WEB页面最上方会显示“活动的”:而相应的,备机02 WEB页面最上方会显示“备份的”。
4.4.配置服务器配置模式-SLB-服务-服务器-添加:在名称处填写:server_50.28.43.131,IP地址填写:50.28.43.131,健康监测在下单菜单中选空白(默认是default):端口填8091,健康监测下拉菜单选空白,然后点击添加,并“确定”保存。
同理创建50.28.43.132,端口8091.4.5.配置服务组配置模式-SLB-服务-服务组,点添加:在名称处填写:pool_qwjs,在算法下拉菜单选择“Round Robin“,在健康监测下拉菜单选“创建”,然后出现新建健康监测方式的界面,在名称部分填写tcp,在类型下拉菜单选择TCP,然后点击“确定”按钮保存随后返回服务组界面:在服务器下拉菜单选择前面创建的server_50.28.43.131和server_50.28.43.132,在端口除填写8091,然后点击右边的“添加”,最后点击“确定”保存。
4.6.配置SNAT池配置模式-NAT-IPv4池-添加:IPv4的名称处填写:snat_pool,起始IP地址填写:50.28.43.144,结束IP地址填写:50.28.43.145,子网掩码填写:255.255.255.128,HA组下拉菜单选1,勾选HA use all ports选项,最后点“确定”保存。
4.7.配置虚拟服务器配置模式-SLB-服务-虚拟服务器-添加:在名称处填写:vip_qwjs,在IP地址or CIDR subnet处填写:50.28.43.146,在,在下方端口部分点“添加”在“类型”下拉菜单处选择HTTP,在“端口”处选择80,在“服务组”下拉菜单选择“pool_webloigc”,勾选“使用接受到的hop作为相应”,在“源NAT”下拉菜单选择“snat_pool”,,在HTTP模板下拉菜单选“创建”:在“名称”处填写“http”,启用“严格处理转换”:然后点最下方的确定,返回虚拟服务器端口配置模式,在“持续模板类型”下拉菜单选“Cookie持续模板”,在“cookie持续模板”下拉菜单选“创建”:出现创建“Cookie持续”界面,在“名称”处填写:cookie,在“总是插入”打钩,点“确定”保存:界面返回到创建虚拟服务器的“端口”模式界面,点“确定”保存:4.8.SNMP配置首先在访问控制中启用snmp-trap进入snmp设置界面:配置模式---系统----SNMP 启用snmp设置SNMP字符串、设置snmp trap的原地址、设置snmp版本设置trap信息最后点击确定即可4.9.配置远程管理和密码修改配置模式-系统-设置-访问控制:默认管理口MGMT的SSH,HTTP和HTTPS管理方式都是允许的;勾选ve42的SSH,HTTP和HTTPS,允许通过业务口进行管理;勾选ve1000的SSH,TELNET,HTTP和HTTPS,允许通过心跳口进行管理。