HP StorageWorks Enterprise File Services WAN Accelerator 2.1.5 deployment guide (June 2006)

VI CONTENTS
Specific Traffic Redirection ......................................................... 81
Load Balancing............................................................................. 81
Failover Support........................................................................... 81
Troubleshooting .................................................................................. 82
Chapter 8 Proxy File Service Deployments ............................................... 83
Introduction to PFS............................................................................. 83
PFS Terms........................................................................................... 84
PFS Operating Modes .................................................................. 85
How Does PFS Work? ........................................................................ 86
When to Use PFS ......................................................................... 87
When to use Global Mode............................................................ 88
Configuration Checklist for PFS ................................................. 88
Configuring PFS Using the Management Console............................. 89
Chapter 9 RADIUS and TACACS+ Authentication .................................... 97
Introduction to Authentication............................................................ 97
Configuring a RADIUS Server with FreeRADIUS............................ 98
Configuring a TACACS+ Server
with Free TACACS+......................................................................... 100
Configuring RADIUS Authentication
in the HP EFS WAN Accelerator...................................................... 101
Configuring RADIUS Authentication........................................ 101
Basic Steps.................................................................................. 102
Configuring TACACS+ Authentication
in the HP EFS WAN Accelerator...................................................... 103
Configuring TACACS+ Authentication ..................................... 103
Basic Steps.................................................................................. 104
Chapter 10 Serial Cluster and Cascade Deployments ............................. 107
Serial Cluster Deployment................................................................ 107
A Basic Serial Cluster Deployment............................................ 109
Cascade Deployment ........................................................................ 111
Peering Rules.............................................................................. 111
Fixed-Target Rules ..................................................................... 112
Glossary ....................................................................................................... 113
Index ....................................................................................................... 117