注册 登录  
 加关注
   显示下一条  |  关闭
温馨提示!由于新浪微博认证机制调整,您的新浪微博帐号绑定已过期,请重新绑定!立即重新绑定新浪微博》  |  关闭

itoedr的it学苑

记录从IT文盲学到专家的历程

 
 
 

日志

 
 

wccp2下的The Adaptive Redirection Module (ARM)  

2013-08-10 20:55:47|  分类: wccp使用 |  标签: |举报 |字号 订阅

  下载LOFTER 我的照片书  |
ARM:可以翻译为重向适配模块

The Adaptive Redirection Module (ARM) performs several essential functions including sending device notifications for cluster communication interface failover and inspection of incoming packets before the IP layer sees them, readdressing them for Content Gateway processing.The ARM is always active. For more information, see The ARM.

Enables or disables the IP spoofing option, which configures Content Gateway to establish connections to origin servers with the client IP address instead of the Content Gateway IP address. For more information, see IP spoofing.(ip欺骗)
WARNING: IP spoofing requires precise control of the routing paths on your network, overriding the normal routing process for traffic running on TCP port 80 and 443.
Network Address Translation (NAT)
Displays the redirection rules in the ipnat.conf file that specify how incoming packets are readdressed when the proxy is serving traffic transparently. Content Gateway creates redirection rules during installation. You can modify these rules.
Lists the ipnat.conf file rules. Select a rule to edit it. The buttons on the left of the box allow you to delete or move the selected rule up or down in the list.
Updates the rule display box at the top of the configuration file editor page.
Specifies the Ethernet interface that traffic will use to access the Content Gateway machine: for example, eth0 on Linux.
Specifies the IP address in CIDR (Classless Inter-Domain Routing) format, such as 1.1.1.0/24. Entering a value in this field is optional.
User Protocol (Optional)
When dns is selected, the ARM redirects DNS traffic to Content Gateway: otherwise, DNS traffic is bypassed.
Click Apply before you click Close; otherwise, all configuration changes are discarded.
Displays a table listing the rules in the bypass.config file that specify static transparency bypass rules. When transparency is enabled, the proxy uses these rules to determine whether to bypass incoming client requests or attempt to serve them transparently.
Lists the bypass.config file rules. Select a rule to edit it. The buttons on the left of the box allow you to delete or move the selected rule up or down in the list.
Updates the rule display box at the top of the configuration file editor page.
A bypass rule bypasses specified incoming requests.
A deny_dyn_bypass rule prevents the proxy from bypassing specified incoming client requests dynamically (a deny bypass rule can prevent Content Gateway from bypassing itself).
Specifies the source IP address in incoming requests that the proxy must bypass or deny bypass. The IP address can be one of the following:
Any combination of the above, separated by commas, such as 1.1.1.0/24, 25.25.25.25, 123.1.23.1-123.1.23.123
Specifies the destination IP address of incoming requests that the proxy must bypass or deny bypass. The IP address can be one of the following:
Any combination of the above, separated by commas, such as 1.1.1.0/24, 25.25.25.25, 123.1.23.1-123.1.23.123
Click Apply before you click Close; otherwise, all configuration changes will be lost.
Enables or disables the dynamic bypass option to bypass the proxy and go directly to the origin server when clients or servers cause problems. Dynamic bypass rules are deleted when you stop Content Gateway.
Select Enabled to enable dynamic bypass when Content Gateway encounters non-HTTP traffic on port 80.
Select Disabled to disable dynamic bypass when Content Gateway encounters non-HTTP traffic on port 80.
Select Source-Destination to enable dynamic source/destination bypass when Content Gateway encounters non-HTTP traffic on port 80.
Select Destination Only to enable dynamic destination bypass when Content Gateway encounters non-HTTP traffic on port 80.
Select Enabled to enable dynamic bypass when an origin server returns a 400 error.
Select Disabled to disable dynamic bypass when an origin server returns a 400 error.
Select Source-Destination to enable dynamic source/destination bypass when an origin server returns a 400 error.
Select Destination Only to enable dynamic destination bypass when an origin server returns a 400 error.
Select Enabled to enable dynamic bypass when an origin server returns a 401 error.
Select Disabled to disable dynamic bypass when an origin server returns a 401 error.
Select Source-Destination to enable dynamic source/destination bypass when an origin server returns a 401 error.
Select Destination Only to enable dynamic destination bypass when an origin server returns a 401 error.
Select Enabled to enable dynamic bypass when an origin server returns a 403 error.
Select Disabled to disable dynamic bypass when an origin server returns a 403 error.
Select Source-Destination to enable dynamic source/destination bypass when an origin server returns a 403 error.
Select Destination Only to enable dynamic destination bypass when an origin server returns a 403 error.
Select Enabled to enable dynamic bypass when an origin server returns a 405 error.
Select Disabled to disable dynamic bypass when an origin server returns a 405 error.
Select Source-Destination to enable dynamic source/destination bypass when an origin server returns a 405 error.
Select Destination Only to enable dynamic destination bypass when an origin server returns a 405 error.
Select Enabled to enable dynamic bypass when an origin server returns a 406 error.
Select Disabled to disable dynamic bypass when an origin server returns a 406 error.
Select Source-Destination to enable dynamic source/destination bypass when an origin server returns a 406 error.
Select Destination Only to enable dynamic destination bypass when an origin server returns a 406 error.
Select Enabled to enable dynamic bypass when an origin server returns a 408 error.
Select Disabled to disable dynamic bypass when an origin server returns a 408 error.
Select Source-Destination to enable dynamic source/destination bypass when an origin server returns a 408 error.
Select Destination Only to enable dynamic destination bypass when an origin server returns a 408 error.
Select Enabled to enable dynamic bypass when an origin server returns a 500 error.
Select Disabled to disable dynamic bypass when an origin server returns a 500 error.
Select Source-Destination to enable dynamic source/destination bypass when an origin server returns a 500 error.
Select Destination Only to enable dynamic destination bypass when an origin server returns a 500 error.
  评论这张
 
阅读(49)| 评论(0)
推荐 转载

历史上的今天

在LOFTER的更多文章

评论

<#--最新日志,群博日志--> <#--推荐日志--> <#--引用记录--> <#--博主推荐--> <#--随机阅读--> <#--首页推荐--> <#--历史上的今天--> <#--被推荐日志--> <#--上一篇,下一篇--> <#-- 热度 --> <#-- 网易新闻广告 --> <#--右边模块结构--> <#--评论模块结构--> <#--引用模块结构--> <#--博主发起的投票-->
 
 
 
 
 
 
 
 
 
 
 
 
 
 

页脚

网易公司版权所有 ©1997-2017