To Create a Remote Server VPN: 1. Go to the Network > VPN Section. 2. Click the Create VPN button....
To Create an L2TP VPN: 1. Go to the Network > VPN Section. 2. Click the Create VPN button. A...
To create a site-to-site VPN: 1. Go to the Network > VPN section. 2. Click the Create VPN button. A...
This section helps you analyze IPDS activity in more detail. You can view the reports by: Farms: See which of...
The Reporting section shows the traffic flow on the SKUDONET ADC in different ways. You can see the traffic flow...
The following graphs show monitored data for IPDS attacks on the load balancer, with options for daily, weekly, monthly, and...
This portion shows statistics for monitoring various types of attacks encountered by the load balancer. The monitoring modules track Blacklists,...
Contents1 Customizing Theme Colors and Brand Images2 1. Top Menu3 2. Left Menu4 3. Main Content5 Customizing the Header |...
To create a routing rule in SKUDONET ADC: Go to the Network > Routing section. Click the Create routing rule...
Contents1 Updating GSLB Farms1.1 Global1.2 Services1.2.1 Farmguardian1.2.2 Backends1.3 Zones1.3.1 Resources1.4 IPDS Rules for GSLB farms Updating GSLB Farms Updating your...
Welcome to SKUDONET 6.3! Access to the SKUDONET web interface. Once you have successfully installed and deployed SKUDONET 6.3, you...
Contents1 Dashboard | SKUDONET Enterprise 6.31.1 System Stats1.1.1 CPU1.1.2 Load Usage1.1.3 Memory Usage1.2 Connections Graph1.3 IPDS. Attacks by type of...
To stay up-to-date on the latest news from SKUDONET, be sure to visit the company’s website and blog regularly. You...
This section allows you to create LSLB farms, which can be configured using two profiles: HTTP profile: This profile works...
This section allows you to Modify the configuration of LSLB farms. Each farm profile has different parameters because it manages...
Contents1 Global L4xNAT farm profile settings1.1 Basic L4xNAT farm profile settings1.2 Advanced configuration1.2.1 Protocol Type1.2.2 NAT Type1.2.2.1 Requirements for DSR2...
Contents1 Global Settings for HTTP Farm Profile1.1 Basic Parameters for HTTP/S Farm Profile With Global Settings1.1.1 HTTP(S) Farm Profiles1.1.2 HTTPS...
This section shows live statistics for all LSLB farms, including both Established and Pending connections. The stats table includes the...
This section shows graphs of the Established and Pending connections for current the farms over four time periods: The Daily,...
Backends Table: The columns in this table include: Service: The name of the farm service where the backend is configured....
This section lists all of the certificates that are stored on the appliance and can be used by LSLB farms....
To generate a Certificate Signing Request (CSR): Go to the LSLB > SSL Certificates section Click the Generate CSR button....
This section is for creating PEM certificates. PEM certificates use a passphrase and include the private key in the same...
To upload an SSL certificate to the load balancer: Go to the LSLB > SSL Certificates section Click the Upload...
This section is about viewing SSL certificate information. When you click on a domain name in the Common Name column...
Let’s Encrypt, a non-profit organization, provides free, automated, and open-source Transport Layer Security (TLS)/Secure Sockets Layer (SSL) certificates. These certificates...
To create a Let’s encrypt certificate in the SKUDONET ADC: Click LSLB >> Let’s Encrypt >> Create Certificate Enter your...
Global Server Load Balancing (GSLB) is like an intelligent traffic controller for your website or application. It ensures that requests...
To create a GSLB farm: Go to the GSLB > Farms page. Click the Create Farm button. Enter the following...
The GSLB Farm Stats page shows real-time statistics for all GSLB farms, including the number of Established and Pending connections...
The GSLB Farm Stats Graphs section shows monitoring graphs and the history of Established and Pending connections for the active...
This section provides a detailed overview of the GSLB farm’s current status, including Backend statistics, Client requests, Server requests, and...
Datalink Service Load Balancing (DSLB), also known as Uplinks Load Balancing, allows you to create highly available and scalable WAN...
To create a DSLB farm, follow these steps: Go to the DSLB > Farms section. Click the Create Farm button....
After creating a DSLB farm, we must add Services, Backends, and IPDS rules in this section. We will discuss about...
The IPDS package is a collection of security rules that users can use. This section lets you update the IPDS...
The IPDS module adds a variety of advanced security features to your load balancer to protect your applications. These features...
To create a blacklist: Go to IPDS > Blacklists. Click the Create Blacklist button. Enter the following fields in the...
The Settings section for the current blacklist has two tabs; Global and Farms. The Global Configuration tab for both Local...
Distributed Denial-of-Service (DDoS) attacks have emerged as a significant threat, posing a serious risk to the stability and accessibility of...
To protect your farm services from denial-of-service (DoS) attacks, you can create customized DoS rules by following these instructions: Go...
Contents1 DoS Protection Rules Configuration1.1 Global Settings1.1.1 Connection limit per second1.1.2 Total Connections Limit per Source IP1.1.3 Check Bogus TCP...
An RBL(Real-time Blacklist), also known as a DNS-based blacklist (DNSBL), is a spam-fighting tool that maintains lists of IP addresses...
To create a new RBL rule: Go to the IPDS > RBL page. Click the Create RBL rule button Enter...
The image below shows all the available Global settings for the RBL rules. Here is a brief description of all...
RBL domains are domains that point to servers that maintain lists of IP addresses that have been flagged for malicious...
The SKUDONET Web Application Firewall (WAF) is a tool that can be used to detect and block malicious HTTP traffic....
A WAF ruleset is a group of WAF rules that are designed to protect against a specific type of attack...
Contents1 WAF Global Settings2 Rules2.1 List of WAF Rules2.2 Advanced WAF settings2.3 Editing a WAF in Raw Mode2.3.1 Form mode:2.3.2...
WAF rulesets can be used with additional files to extend and organize the rules. This section allows you to work...
To create an IPDS WAF file: Go to the IPDS >> WAF >> Files section. Click the Create File button....
To update an IPDS WAF file: Go to the IPDS > WAF > Files section. Hover over the file you...
The monitoring section connects all of the systems, network interfaces, farm services, and monitoring graphs. These graphs are essential for...
This section offers in-depth statistics on the load balancer’s performance, behavior, and interfaces. It is organized into three tabs: Farms:...
This section provides a detailed overview of the statistics for farms and load-balancing services. It includes a table that shows...
This section shows statistics about the most important resources available in the load balancer. It also presents graphs and stats...
This section provides statistics for tracking inbound and outbound traffic flowing through the network interfaces that you have created on...
The Farmguardian section lists all the health checks available in the load balancer. It also includes a brief description of...
Farmguardian allows users to create custom checks by copying existing checks and modifying their parameters. This can be done in...
SKUDONET comes with basic health checks for backends, but these checks may not be enough to ensure that the backends...
NICs are physical network adapters that allow computers to connect to a network. This section describes how to configure and...
To change the configurations of a Network Interface Card: Go to the Network > NIC section. Hover over the interface...
Network bonding (also known as link aggregation, NIC teaming) combines multiple physical network interfaces into a single logical interface. This...
To create a bonding interface on SKUDONET ADC: Go to the NIC > Bonding section. Click the Create bonding button....
To create a bonding interface on SKUDONET ADC: Go to the NIC > Bonding section. Hover over the interface you’d...
In today’s digital landscape, network security and efficient data management are not merely buzzwords but essential pillars of any organization’s...
To create a Virtual LAN: Go to the Network > VLAN page. Click the Create VLAN button. In the Parent...
To update or modify a VLAN interface in SKUDONET: Go to the Network > VLAN section. Locate the VLAN interface...
Virtual Interfaces allow you to assign multiple IP addresses to a single physical network interface (NIC), bonding interface, or VLAN...
To create a virtual Interface: Go to the Network > Virtual Interface page. Click the Create Virtual Interface button. In...
To update or modify a virtual interface in the SKUDONET ADC: Go to the Network > Virtual Interface section. Locate...
A floating IP, also known as a virtual IP (VIP), is a dynamic IP address that can be assigned to...
SKUDONET load balancer can be configured to forward outbound traffic through a Floating IP address. This IP address can be...
The default gateway is the IP address that the SKUDONET load balancer uses to route inbound and outbound traffic between...
To configure a default gateway in SKUDONET: Go to the Network > Gateway page. Click the Configure button on an...
Aliases are alternative names for backends and networking IP addresses. They make it easier for DevOps engineers, developers, and security...
SKUDONET ADC is designed to work with multiple subnets. The system uses a rule-based routing system. The rule determines whether...
In SKUDONET ADC, each routing table knows about the subnets of the ADC’s configured interfaces. This means that the system...
To configure Routing Tables in SKUDONET ADC: Go to the Network > Routing section. Scroll to the Routing tables list...
SKUDONET Load Balancer can be used to create a virtual private network (VPN). A VPN allows users to connect to...
Contents1 Role-Based Access Control1.1 Supported Data Sources1.2 Validation System Configuration1.3 Validation System Fields1.4 LDAP Validation Connector Configuration Role-Based Access Control...
The RBAC User List allows you to manage system permissions on a user-by-user basis. Each user can have two types...
To create a new RBAC user: Go the System > RBAC > Users section. click the Create User button. Fill...
You can update the user-scoped parameters of an RBAC user to give or remove permissions. To update an RBAC user:...
In Role-Based Access Control (RBAC), groups are collections of users who share the same permissions. Groups can be used to...
Go to the System > RBAC > Groups section. Click the Create group button. Enter a descriptive Name for the...
To update RBAC roles for each user: Go to the System > RBAC > Groups page. Click the Edit button...
Role-based access control (RBAC) roles allow you to manage permissions for your team based on objects and actions. This means...
RBAC roles allow you to define permissions for users and groups. To create a new role, follow these steps: Go...
The RBAC Role Update section allows you to manage all aspects of your RBAC roles. You can configure various parameters...
Contents1 Local Services1.1 HTTP1.2 SSH1.3 SNMP1.4 Rsyslog1.5 Global2 Remote Services2.1 DNS2.2 NTP2.3 Proxy2.4 Let’s Encrypt Local Services The Local Services...
The clustering service allows you to manage two load balancer Nodes in a way that ensures High Availability and prevents...
You can manage the configuration of backups of the load balancer for quick disaster recovery, and clone or migrate the...
To create a backup file of the load balancer configuration: Go to the Systems > Backups page Click the Create...
To upload and store a local backup file into the load balancer: Go to the System > Backups page. Click...
This section explains how notifications work in the load balancer. Notifications can be used to send email alerts when an...
To Create an Alert Notification, follow these instructions: Go to the System > Notifications section. Hover over the service you’d...
System and load balancer logs can be accessed in this section to analyze problems and learn more about the appliance’s...
The Show action opens a new screen for managing the log file display. In this section, you may select the...
To change your load balancer access credentials: Go to the System>User settings section. Select the user whose credentials you want...