Solved

Network Load Balancing 2003 Enterprise server

Posted on 2004-04-09
2
157 Views
Last Modified: 2010-03-18
Would like to know how to configure Network Load Balancing – My server has two network cards on separate VLAN’s.  I noticed a service called Network Load Balancing but not sure how to configure it.  

Your help is greatly appreciated.
0
Comment
Question by:Roebuck1967
  • 2
2 Comments
 
LVL 9

Expert Comment

by:jamesreddy
ID: 10795428
The NLB service provides some features that aid in increasing the availability of VPN connections for your VPN clients:

1. Fail over when one of the ISA firewall/VPN servers

2. Fail over allows other members of an ISA firewall/VPN server array to service connection requests from VPN clients when one of the servers becomes unavailable. All VPN servers in the array "listen" for VPN connections on the same IP address. When a VPN session is disconnected after a VPN array members goes offline, the connection is reestablished to another array member using the same IP address. The VPN user does not need to reconfigure the VPN client software to automatically reestablish the connection.

3. Load balancing for VPN connections

4. VPN sessions can be processor intensive. Data encryption and decryption can take a significant percentage of the processor cycles available to the ISA firewall/VPN server per unit time. The NLB service can automatically split connections across all array members so that no single member of the array receives a disproportion number of connection requests. NLB attempts to even spread the connection requests across all members of the NLB ISA firewall/VPN server array.


I'm not entirely sure you're thinking correctly what the Network Load Balancing is for, but here is a great tutorial for configuring it

http://www.isaserver.org/tutorials/Configuring_Fault_Tolerance_and_Load_Balancing_for_Windows_2003_ISA_FirewallVPN_Servers.html


James
0
 
LVL 9

Accepted Solution

by:
jamesreddy earned 500 total points
ID: 10795431
I answered another question similar to what you MIGHT be asking in another thread.  You may want to take a look in case I am misunderstanding your question here.

http://www.experts-exchange.com/Networking/Microsoft_Network/Q_20903822.html

James
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Greetings, Experts! First let me state that this website is top notch. I thoroughly enjoy the community that is shared here; those seeking help and those willing to sacrifice their time to help. It is fantastic. I am writing this article at th…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now