You are on page 1of 46

TM

Performance Pack
Administration Guide
Version NGX R65

March 2007
© 2003-2007 Check Point Software Technologies Ltd.

All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying,
distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written
authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or
omissions. This publication and features described herein are subject to change without notice.

RESTRICTED RIGHTS LEGEND:

Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer
Software clause at DFARS 252.227-7013 and FAR 52.227-19.

TRADEMARKS:

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Express, Check Point
Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement,
Cooperative Security Alliance, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1,
FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless
Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Policy Lifecycle Management,
Provider-1, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer,
SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro,
SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal,
SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering,
TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-
1 Power, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web
Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router,
Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check
Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The
products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 6,496,935, 6,873,988, and 6,850,943 and may be protected by
other U.S. Patents, foreign patents, or pending applications.

For third party notices, see: THIRD PARTY TRADEMARKS AND COPYRIGHTS.
Contents

Preface Who Should Use This Guide................................................................................ 8


Summary of Contents ......................................................................................... 9
Related Documentation .................................................................................... 10
More Information ............................................................................................. 13
Feedback ........................................................................................................ 14

Chapter 1 Introduction to Performance Pack


Overview ......................................................................................................... 16
Release Notes ................................................................................................. 17

Chapter 2 Getting Started


Performance Pack NGX System Requirements .................................................... 20
Minimum System Requirements ................................................................... 20
Recommended System Options .................................................................... 21
Performance Pack Recommended Platform Configuration .................................... 22
Preparing the Performance Pack NGX Machine ................................................... 23
BIOS Settings............................................................................................. 23
Network Interface Cards location .................................................................. 23
Installation................................................................................................. 23

Chapter 3 Command Line


fwaccel ........................................................................................................... 26
cpconfig ......................................................................................................... 27
sim................................................................................................................. 28
proc entries..................................................................................................... 29

Appendix 4 Performance Tuning and Measurement Hints


Performance Tuning......................................................................................... 32
SYN Defender............................................................................................. 32
Amount of Concurrent Connections and Hash Size ......................................... 32
Implied Rules............................................................................................. 33
HyperThreading .......................................................................................... 33
Connection Templates ................................................................................. 34
Delayed Synchronization.............................................................................. 35
Performance Measurement ............................................................................... 37
TCP State and Benchmarking....................................................................... 37

Index........................................................................................................... 45

Table of Contents 5
6
Preface P
Preface

In This Chapter

Who Should Use This Guide page 8


Summary of Contents page 9
Related Documentation page 10
More Information page 13
Feedback page 14

7
Who Should Use This Guide

Who Should Use This Guide


This guide is intended for administrators responsible for maintaining network
security within an enterprise, including policy management and user support.
This guide assumes a basic understanding of
• System administration.
• The underlying operating system.
• Internet protocols (IP, TCP, UDP etc.).

8
Summary of Contents

Summary of Contents
This document describes how to install and configure Performance Pack.
Additionally, it shows you how to get the best possible performance using
Performance Pack..

Chapter Description
Chapter 1, “Introduction to Contains a general description of Performance
Performance Pack” Pack.
Chapter 2, “Getting Started” Describes system requirements, recommended
platforms and how to prepare for the NGX
Machine.
Chapter 3, “Command Line” Contains explanations of the Performance Pack
commands.
Chapter 4, “Performance Describes Performance Pack Tuning and
Tuning and Measurement Measurement.
Hints”

Preface 9
Related Documentation

Related Documentation
The NGX R65 release includes the following documentation

TABLE P-1 VPN-1 Power documentation suite documentation

Title Description
Internet Security Product Contains an overview of NGX R65 and step by step
Suite Getting Started product installation and upgrade procedures. This
Guide document also provides information about What’s
New, Licenses, Minimum hardware and software
requirements, etc.
Upgrade Guide Explains all available upgrade paths for Check Point
products from VPN-1/FireWall-1 NG forward. This
guide is specifically geared towards upgrading to
NGX R65.
SmartCenter Explains SmartCenter Management solutions. This
Administration Guide guide provides solutions for control over
configuring, managing, and monitoring security
deployments at the perimeter, inside the network, at
all user endpoints.
Firewall and Describes how to control and secure network
SmartDefense access; establish network connectivity; use
Administration Guide SmartDefense to protect against network and
application level attacks; use Web Intelligence to
protect web servers and applications; the integrated
web security capabilities; use Content Vectoring
Protocol (CVP) applications for anti-virus protection,
and URL Filtering (UFP) applications for limiting
access to web sites; secure VoIP traffic.
Virtual Private Networks This guide describes the basic components of a
Administration Guide VPN and provides the background for the
technology that comprises the VPN infrastructure.

10
Related Documentation

TABLE P-1 VPN-1 Power documentation suite documentation (continued)

Title Description
Eventia Reporter Explains how to monitor and audit traffic, and
Administration Guide generate detailed or summarized reports in the
format of your choice (list, vertical bar, pie chart
etc.) for all events logged by Check Point VPN-1
Power, SecureClient and SmartDefense.
SecurePlatform™/ Explains how to install and configure
SecurePlatform Pro SecurePlatform. This guide will also teach you how
Administration Guide to manage your SecurePlatform machine and
explains Dynamic Routing (Unicast and Multicast)
protocols.
Provider-1/SiteManager-1 Explains the Provider-1/SiteManager-1 security
Administration Guide management solution. This guide provides details
about a three-tier, multi-policy management
architecture and a host of Network Operating Center
oriented features that automate time-consuming
repetitive tasks common in Network Operating
Center environments.

TABLE P-2 Integrity Server documentation

Title Description
Integrity Advanced Explains how to install, configure, and maintain the
Server Installation Integrity Advanced Server.
Guide
Integrity Advanced Provides screen-by-screen descriptions of user
Server Administrator interface elements, with cross-references to relevant
Console Reference chapters of the Administrator Guide. This document
contains an overview of Administrator Console
navigation, including use of the help system.
Integrity Advanced Explains how to managing administrators and
Server Administrator endpoint security with Integrity Advanced Server.
Guide
Integrity Advanced Provides information about how to integrating your
Server Gateway Virtual Private Network gateway device with Integrity
Integration Guide Advanced Server. This guide also contains information
regarding deploying the unified SecureClient/Integrity
client package.

Preface 11
Related Documentation

TABLE P-2 Integrity Server documentation (continued)

Title Description
Integrity Advanced Provides information about client and server
Server System requirements.
Requirements
Integrity Agent for Linux Explains how to install and configure Integrity Agent
Installation and for Linux.
Configuration Guide
Integrity XML Policy Provides the contents of Integrity client XML policy
Reference Guide files.
Integrity Client Explains how to use of command line parameters to
Management Guide control Integrity client installer behavior and
post-installation behavior.

12
More Information

More Information
• For additional technical information about Check Point products, consult Check
Point’s SecureKnowledge at https://secureknowledge.checkpoint.com/.

• See the latest version of this document in the User Center at


http://www.checkpoint.com/support/technical/documents/

Preface 13
Feedback

Feedback
Check Point is engaged in a continuous effort to improve its documentation. Please
help us by sending your comments to:
cp_techpub_feedback@checkpoint.com

14
Chapter 1
Introduction to Performance
Pack
In This Chapter

Overview page 16
Release Notes page 17

15
Overview

Overview
Performance Pack is supported both for SecurePlatform and Solaris platforms.
Performance Pack is a software acceleration product installed as an add-on to
VPN-1 Power. Performance Pack significantly enhances and improves the
performance of VPN-1 Power.
Performance Pack uses Check Point’s SecureXL technology and other innovative
network acceleration techniques, to deliver wire-speed performance for VPN-1
Power. Moreover, it accelerates key security functions, thereby ensuring your
organization the best security with the best performance available on an open
platform.
Supported security functions include:
• Access control.
• Encryption.
• NAT.
• Accounting and logging.
• Connection/session rate.
• General security checks.
• SmartDefense features.
• CIFs resources.
• ClusterXL High Availability and Load Sharing.
• TCP Sequence Verification.
• Dynamic VPN

16
Release Notes

Release Notes
The latest Release Notes for Performance Pack can be found at:
http://www.checkpoint.com/support/technical/documents/index.html

Chapter 1 Introduction to Performance Pack 17


Release Notes

18
Chapter 2
Getting Started
In This Chapter

Performance Pack NGX System Requirements page 20


Performance Pack Recommended Platform Configuration page 22
Preparing the Performance Pack NGX Machine page 23

19
Performance Pack NGX System Requirements

Performance Pack NGX System


Requirements
Performance Pack accelerates the performance of VPN-1 Power on:
• Hardware supported by SecurePlatform
• Solaris 8, 9, or 10 for SPARC 64 Bit
Following are the minimum recommended requirements:

Minimum System Requirements


The following are the minimum system requirements:

Table 2-1 Minimum System Requirements

Operating SecurePlatform NGX R65


Systems Solaris 8, 9, and 10

CPU • See: Hardware Compatibility List for SecurePlatform NGX


R65
• SPARC 64 bit for Solaris.
Disk Space 80MB

Memory 128MB

Network Network Interfaces supported by VPN-1 Power on Solaris:


Interfaces
• GEM Ethernet NIC
• 10/100 QuadEthernet NIC
• GigaSwift NIC
• Sun HME 10/100 Ethernet NIC
• BGE

20
Recommended System Options

Recommended System Options


The following system options are recommended for optimal performance:

Table 2-2 Recommended system options

Operating SecurePlatform NGX R65


Systems Solaris 8, 9, and 10

CPU Dual Intel Xeon or Dual SPARC 64 bit

Disk Space 400 MB

Memory 512 MB or more

Network SecurePlatform NGX R65: Intel Pro 1000 MF/MT


Interfaces Solaris: GigaSwift.

Bus Technology At least two 64bit/66Mhz PCI buses, ServerWorks or Intel


E7500 Chipset

Chapter 2 Getting Started 21


Performance Pack Recommended Platform Configuration

Performance Pack Recommended Platform


Configuration
It is recommended you use Performance Pack on a platform configured with a
Dual-Core Intel Xeon Processor 5160 (3.00 GHz, 333 MHz FSB, 2x2 MB L2
Cache), with 667 MHz RAM, or better configuration.
Examples of platforms with such configurations are:
• IBM System 3650
• HP Proliant DL-380 G5
• Dell PowerEdge 1950 or PowerEdge 2950
Please refer to the latest Performance Pack release notes for additional information
on hardware support, limitations and recommendations.

22
Preparing the Performance Pack NGX Machine

Preparing the Performance Pack NGX


Machine
For optimal performance, appropriate configuration settings are recommended for
the following:
• BIOS Settings
• Network Interface Cards

BIOS Settings
• If your BIOS supports CPU clock setting, make sure that the BIOS is set to the
actual CPU speed.
• If you are running Performance Pack NGX R65 on a machine with Intel Xeon
CPUs, consider setting the HyperThreading feature to “on”. Using
HyperThreading may improve performance for some scenarios.

Network Interface Cards location


• If you are using a motherboard with multiple PCI or PCI-X buses, make sure
that each Network Interface Card is installed in a slot connected to a different
bus.
• If you are using more than two Network Interface Cards in a system with only
two 64bit/66Mhz PCI buses, make sure that the least-used cards are installed
in slots connected to the same bus.

Note - Performance Pack is automatically disabled on PPTP and PPPoE interfaces.

Installation
For installation details see the most current online documentation:
http://www.checkpoint.com/support/technical/documents/

Chapter 2 Getting Started 23


Installation

24
Chapter 3
Command Line
In This Chapter

fwaccel page 26
cpconfig page 27
sim page 28
proc entries page 29

25
fwaccel

fwaccel
The fwaccel utility allows you to enable or disable acceleration dynamically while
VPN-1 Power is running. The default setting is determined by the setting
configured with cpconfig (see “cpconfig” on page 27). This setting reverts to the
default after reboot.

Usage
fwaccel [on|off|stat|stats|conns|templates]

Parameters

Table 3-1 fwaccel parameters

Parameter Explanation
on Start acceleration
off Stop acceleration
stat Display the acceleration device status and the status
of the Connection Templates on the local VPN-1
Power module.
stats Displays acceleration statistics.
stats -s Displays more summarized statistics information.
conns Displays all connections.
conns -s Displays the number of connections currently defined
in the accelerator.
conns -m <max_entries> Limits the number of connections displayed by the
conns command to the number entered in the
variable max_entries.
templates Display all connection templates.
templates -m max_entries Limits the number of templates displayed by the
templates command to the number entered in the
variable max_entries.
templates -s Displays the number of templates currently defined
in the accelerator.

26
cpconfig

cpconfig
Check Point products are configured using the cpconfig utility. When run, this
utility displays a screen with the configuration options. The options that are
displayed, depend on the installed configuration and product(s). You can use
cpconfig to enable or disable Performance Pack. Once you have selected an
acceleration setting, the setting remains configured, until you choose to change it
on another occasion. In other words, the settings that you define will remain even
after the machine is rebooted. For an alternative method to enable or disable
acceleration, see “fwaccel” on page 26.

Usage
Execute cpconfig by entering the following command:
cpconfig
An interactive menu will be displayed providing you with the option to enable or
disable the acceleration by selecting Enable/Disable Check Point SecureXL.
Select Enable in order to enable acceleration. Select Disable in order to disable
acceleration.

Chapter 3 Command Line 27


sim

sim
The sim utility controls various Performance Pack driver features and applies only
for SecurePlatform.

Usage
sim affinity [-a|-s|-l]

Parameters
Affinity is a general term for binding Network Interface Card (NIC) interrupts to
processors. By default, SecurePlatform does not set Affinity to the NIC interrupts,
which means that each NIC is handled by all processors. Optimal network
performance is obtained when each NIC is individually bound to a single processor.
To achieve the above, the sim utility includes an Affinity feature, which has the
following operation modes:

Table 3-2 sim Affinity operation modes

Option Explanation
-a Automatic Mode — the Affinity is determined automatically, by
analyzing the load on each NIC. If the NICs are not loaded, the
Affinity will not be set. This is the default Affinity operation mode, in
which the Affinity is re-tuned every 60 seconds.
-s Manual Mode — allows you to manually specify the Affinity settings.
For each interface, you will be asked to enter one of the following:
• A space-separated list of the processor numbers that are to
handle this interface, or
• The word all, to allow all processors to handle this interface.
When setting the Affinity manually, the periodic automatic check will
be disabled. After booting, it will remain disabled and the Affinity
settings entered manually will be applied.
-l View a list of the current Affinity settings.

28
proc entries

proc entries
Performance Pack supports SecurePlatform proc entries. These entries are used to
display information about the Performance Pack.
The proc entries are read-only entries. They cannot be configured. The proc entries
are located under /proc/ppk.

Usage
cat /proc/ppk/[conf|ifs|statistics]

Parameters

Table 3-3 /proc Parameters

Parameter Explanation
conf Displays the Performance Pack Configuration.
ifs Lists the interfaces to which Performance Pack is
attached.
statistics Displays general Performance Pack statistics.

Chapter 3 Command Line 29


proc entries

30
Chapter 4
Performance Tuning and
Measurement Hints
In This Appendix

Performance Tuning page 32


Performance Measurement page 37

31
Performance Tuning

Performance Tuning
SYN Defender
To obtain optimal TCP connection setup rate performance, verify that the SYN
Defender method specified in the SmartDefense is set to None (default).

Amount of Concurrent Connections and Hash Size


Setting the Maximal Concurrent Connections
To set the desired number of maximal concurrent connections, open
SmartDashboard’s Gateway Object Properties window and proceed as follows:
1. Open the Capacity Optimization tab. Make sure that Calculate connections hash
table size and memory pool is set to Automatically.
2. Set the desired amount of concurrent connections in the Maximum Concurrent
Connections field.

Increasing the Number of Concurrent Connections


You can increase the actual number of concurrent connections by reducing the
timeout of TCP and UDP sessions:
• TCP end timeout determines the amount of time a TCP connection will stay in
the FireWall connection table after a TCP session has ended.
• UDP virtual session timeout determines the amount of time a UDP connection
will stay in the FireWall connection table after the last UDP packet was seen by
the gateway.
By reducing the above values, the capacity of actual TCP and UDP connections is
increased.

32
Implied Rules

Implied Rules
In order to set the optimal connection/sec rate, proceed as follows:
1. Select Global Properties from the Policy menu.
2. Select FireWall-1 in the Global Properties tree.
3. Uncheck the following options:
• Accept RIP
• Accept Domain Name over UDP (Queries)
• Accept Domain Name over TCP (Zone Transfer)
• Accept ICMP requests

HyperThreading
HyperThreading applies only to SecurePlatform.
HyperThreading is a feature of some Intel processors that enables emulation of two
virtual processors by a single physical processor. This feature increases the
performance under certain conditions.
Machines with Xeon processors have a BIOS option that may allow enabling or
disabling HyperThreading, under the following circumstances:
• If the number of network interfaces is less than the actual physical number of
processors (i.e. two network interfaces and three processors), it is
recommended to enable HyperThreading.
• If the number of network interfaces is equal to or greater than the actual
physical number of processors (i.e. two network interfaces and two processors),
it is recommended to disable HyperThreading.
• If cryptography is used extensively, HyperThreading should be enabled.

Chapter 4 Performance Tuning and Measurement Hints 33


Connection Templates

Connection Templates
General
Connection templates are generated from active connections according to the policy
rules. The connection template feature accelerates the speed at which a connection
is established by matching a new connection to a set of attributes. When a new
connection matches the template, connections are established without performing
a rule match and therefore are accelerated. Connection templates are generated
from active connections according to policy rules. Currently, connection template
acceleration is performed only on connections with the same destination port.
Examples:
• A connection from 10.0.0.1/2000 to 11.0.0.1/80 — established through
Firewall and then accelerated.
• A connection from 10.0.0.1/2001 to 11.0.0.1/80 — fully accelerated
(including connection establishment).
• A connection from 10.0.0.1/8000 to 11.0.0.1/80 — fully accelerated
(including connection establishment).
HTTP GET requests to specific server will be accelerated since the connection has
the same source IP address.

Restrictions
In general, Connections Templates will be created only for plain UDP or TCP
connections. The following restrictions apply for Connection Template generation:
Global restrictions:
• SYN Defender — Connection Templates for TCP connections will not be
created.
• NAT connections.
• VPN connections.
• Complex connections (H323, FTP, SQL).
• NetQuotas.
• ISN Spoofing.
If the Rule Base contains a rule regarding one of the following component, the
Connection Templates will be disabled for connections matching this rule, and for
all of the following rules:

34
Delayed Synchronization

• Security Server connections.


• Services with source port range.
• Time objects in the rules.
• Dynamic Objects and/or Domain Objects.
• Services of type “other” with a match expression.
• User/Client/Session Authentication actions.
• Services of type RPC/DCERPC/DCOM.
When installing a policy containing restricted rules, you will receive console
messages indicating that Connection Templates will not be created due to the rules
that have been defined. The warnings should be used as a recommendation that
will assist you to fine-tune your policy in order to optimize performance.

Testing
To verify that connection templates are enabled, use the fwaccel stat command.
To verify that connection templates are generated, use fwaccel templates. This
should be done while traffic is running, in order to obtain a list of currently defined
templates.

Delayed Synchronization
The synchronization mechanism guarantees High Availability. In a cluster
configuration, if one cluster member fails, the other recognizes the connection
failure and takes over, so the user does not experience any connectivity issue.
However, there is an overhead per synchronized operation, which can occasionally
cause a system slow-down when there are short sessions.
Delayed synchronization is a mechanism based upon the duration of the
connection, with the duration itself used to determine whether or not to perform
synchronization. A time range can be defined per service. The time range indicates
that connections terminated before a specified expiration time will not be
synchronized. As a result, synchronized traffic is reduced and overall performance
increases. Delayed Synchronization is performed only for connections matching a
connection template.

Note - Delayed synchronization is disabled if the log or account are enabled.

Chapter 4 Performance Tuning and Measurement Hints 35


Delayed Synchronization

Configuration
Currently, delayed synchronization is allowed only for services of type HTTP or
None. In order to configure delayed synchronization, proceed as follows:
1. In SmartDashboard, right click on the Service tab.
2. Either edit an existing service or click New and select TCP. The TCP service
properties window is shown.
3. After defining TCP parameters, click Advanced in the TCP service properties
window. The Advanced TCP Service Properties window is shown.
4. Select the HTTP or None protocol from the Protocol Type list.
5. Check Start synchronizing.
6. Define the duration value Seconds after connection initiation. The duration value
is specified in seconds.

36
Performance Measurement

Performance Measurement
TCP State and Benchmarking
Certain testing applications (SmartBits or Chariot) generate invalid TCP sequences.
The VPN-1 Power module’s TCP state check detects these faulty sequences, and
drops the packets. As a result, the benchmark fails. Since these TCP sequences are
invalid, they may affect overall Firewall performance.
To disable this type of TCP state check, perform the following operations on the
SmartCenter Server:
1. Select the Smart Defense tab in the SmartDashboard.
2. Click the TCP object under Network Security.
3. In the TCP window, disable Sequence Verifier.
4. Install the Policy from SmartDashboard in order to apply the changes.

Chapter 4 Performance Tuning and Measurement Hints 37


TCP State and Benchmarking

38
THIRD PARTY TRADEMARKS AND COPYRIGHTS

Entrust is a registered trademark of Entrust Technologies, Inc. in the United States and other countries. Entrust’s logos and Entrust
product and service names are also trademarks of Entrust Technologies, Inc. Entrust Technologies Limited is a wholly owned subsidiary
of Entrust Technologies, Inc. FireWall-1 and SecuRemote incorporate certificate management technology from Entrust.

Verisign is a trademark of Verisign Inc.

The following statements refer to those portions of the software copyrighted by University of Michigan. Portions of the software copyright
© 1992-1996 Regents of the University of Michigan. All rights reserved. Redistribution and use in source and binary forms are
permitted provided that this notice is preserved and that due credit is given to the University of Michigan at Ann Arbor. The name of the
University may not be used to endorse or promote products derived from this software without specific prior written permission. This
software is provided “as is” without express or implied warranty. Copyright © Sax Software (terminal emulation only).

The following statements refer to those portions of the software copyrighted by Carnegie Mellon University.

Copyright 1997 by Carnegie Mellon University. All Rights Reserved.

Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted,
provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in
supporting documentation, and that the name of CMU not be used in advertising or publicity pertaining to distribution of the software
without specific, written prior permission.CMU DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CMU BE LIABLE FOR ANY SPECIAL, INDIRECT
OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

The following statements refer to those portions of the software copyrighted by The Open Group.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO
EVENT SHALL THE OPEN GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF
CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
DEALINGS IN THE SOFTWARE.

The following statements refer to those portions of the software copyrighted by The OpenSSL Project. This product includes software
developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/).

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.

The following statements refer to those portions of the software copyrighted by Eric Young. THIS SOFTWARE IS PROVIDED BY ERIC
YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright © 1998 The Open Group.

353
The following statements refer to those portions of the software copyrighted by Jean-loup Gailly and Mark Adler Copyright (C)
1995-2002 Jean-loup Gailly and Mark Adler. This software is provided 'as-is', without any express or implied warranty. In no event will
the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for
any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this
software in a product, an acknowledgment in the product documentation would be appreciated but is not required.

2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.

3. This notice may not be removed or altered from any source distribution.

The following statements refer to those portions of the software copyrighted by the Gnu Public License. This program is free software;
you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software
Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be
useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
PURPOSE. See the GNU General Public License for more details.You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.

The following statements refer to those portions of the software copyrighted by Thai Open Source Software Center Ltd and Clark Cooper
Copyright (c) 2001, 2002 Expat maintainers. Permission is hereby granted, free of charge, to any person obtaining a copy of this
software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the
rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom
the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY
KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
GDChart is free for use in your applications and for chart generation. YOU MAY NOT re-distribute or represent the code as your own.
Any re-distributions of the code MUST reference the author, and include any and all original documentation. Copyright. Bruce
Verderaime. 1998, 1999, 2000, 2001. Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring
Harbor Laboratory. Funded under Grant P41-RR02188 by the National Institutes of Health. Portions copyright 1996, 1997, 1998,
1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner.
Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg Roelofs. Portions relating to gdttf.c copyright 1999, 2000, 2001,
2002 John Ellson (ellson@graphviz.org). Portions relating to gdft.c copyright 2001, 2002 John Ellson (ellson@graphviz.org). Portions
relating to JPEG and to color quantization copyright 2000, 2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997,
1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. See the
file README-JPEG.TXT for more information. Portions relating to WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van
den Brande. Permission has been granted to copy, distribute and modify gd in any context without fee, including a commercial
application, provided that this notice is present in user-accessible supporting documentation. This does not affect your ownership of
the derived work itself, and the intent is to assure proper credit for the authors of gd, not to interfere with your productive use of gd. If
you have questions, ask. "Derived works" includes all programs that utilize the library. Credit must be given in user-accessible
documentation. This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including but
not limited to implied warranties of merchantability and fitness for a particular purpose, with respect to this code and accompanying
documentation. Although their code does not appear in gd 2.0.4, the authors wish to thank David Koblas, David Rowley, and
Hutchison Avenue Software Corporation for their prior contributions.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You
may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0

The curl license

COPYRIGHT AND PERMISSION NOTICE

Copyright (c) 1996 - 2004, Daniel Stenberg, <daniel@haxx.se>.All rights reserved.

Permission to use, copy, modify, and distribute this software for any purpose

with or without fee is hereby granted, provided that the above copyright

notice and this permission notice appear in all copies.

354
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF
THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES
OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use
or other dealings in this Software without prior written authorization of the copyright holder.

The PHP License, version 3.0

Copyright (c) 1999 - 2004 The PHP Group. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are
met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.

3. The name "PHP" must not be used to endorse or promote products derived from this software without prior written permission. For
written permission, please contact group@php.net.

4. Products derived from this software may not be called "PHP", nor may "PHP" appear in their name, without prior written permission
from group@php.net. You may indicate that your software works in conjunction with PHP by saying "Foo for PHP" instead of calling it
"PHP Foo" or "phpfoo"

5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing
version number. Once covered code has been published under a particular version of the license, you may always continue to use it
under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the
license published by the PHP Group. No one other than the PHP Group has the right to modify the terms applicable to covered code
created under this License.

6. Redistributions of any form whatsoever must retain the following acknowledgment:

"This product includes PHP, freely available from <http://www.php.net/>".

THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PHP DEVELOPMENT TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.

This software consists of voluntary contributions made by many individuals on behalf of the PHP Group. The PHP Group can be
contacted via Email at group@php.net.

For more information on the PHP Group and the PHP project, please see <http://www.php.net>. This product includes the Zend
Engine, freely available at <http://www.zend.com>.

This product includes software written by Tim Hudson (tjh@cryptsoft.com).

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS

INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.

Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd

355
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to
the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of
the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN
NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Copyright © 2003, 2004 NextHop Technologies, Inc. All rights reserved.

Confidential Copyright Notice

Except as stated herein, none of the material provided as a part of this document may be copied, reproduced, distrib-uted,
republished, downloaded, displayed, posted or transmitted in any form or by any means, including, but not lim-ited to, electronic,
mechanical, photocopying, recording, or otherwise, without the prior written permission of NextHop Technologies, Inc. Permission is
granted to display, copy, distribute and download the materials in this doc-ument for personal, non-commercial use only, provided you
do not modify the materials and that you retain all copy-right and other proprietary notices contained in the materials unless otherwise
stated. No material contained in this document may be "mirrored" on any server without written permission of NextHop. Any
unauthorized use of any material contained in this document may violate copyright laws, trademark laws, the laws of privacy and
publicity, and communications regulations and statutes. Permission terminates automatically if any of these terms or condi-tions are
breached. Upon termination, any downloaded and printed materials must be immediately destroyed.

Trademark Notice

The trademarks, service marks, and logos (the "Trademarks") used and displayed in this document are registered and unregistered
Trademarks of NextHop in the US and/or other countries. The names of actual companies and products mentioned herein may be
Trademarks of their respective owners. Nothing in this document should be construed as granting, by implication, estoppel, or
otherwise, any license or right to use any Trademark displayed in the document. The owners aggressively enforce their intellectual
property rights to the fullest extent of the law. The Trademarks may not be used in any way, including in advertising or publicity
pertaining to distribution of, or access to, materials in

this document, including use, without prior, written permission. Use of Trademarks as a "hot" link to any website is prohibited unless
establishment of such a link is approved in advance in writing. Any questions concerning the use of these Trademarks should be
referred to NextHop at U.S. +1 734 222 1600.

U.S. Government Restricted Rights

The material in document is provided with "RESTRICTED RIGHTS." Software and accompanying documentation are provided to the
U.S. government ("Government") in a transaction subject to the Federal Acquisition Regulations with Restricted Rights. The
Government's rights to use, modify, reproduce, release, perform, display or disclose are

restricted by paragraph (b)(3) of the Rights in Noncommercial Computer Software and Noncommercial Computer Soft-ware
Documentation clause at DFAR 252.227-7014 (Jun 1995), and the other restrictions and terms in paragraph (g)(3)(i) of Rights in
Data-General clause at FAR 52.227-14, Alternative III (Jun 87) and paragraph (c)(2) of the Commer-cial

Computer Software-Restricted Rights clause at FAR 52.227-19 (Jun 1987).

Use of the material in this document by the Government constitutes acknowledgment of NextHop's proprietary rights in them, or that of
the original creator. The Contractor/Licensor is NextHop located at 1911 Landings Drive, Mountain View, California 94043. Use,
duplication, or disclosure by the Government is subject to restrictions as set forth in applicable laws and regulations.

Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty

THE MATERIAL IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTIES OF ANY KIND EITHER EXPRESS OR IMPLIED.
TO THE FULLEST EXTENT POSSIBLE PURSUANT TO THE APPLICABLE LAW, NEXTHOP DISCLAIMS ALL WARRANTIES,

EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, NON INFRINGEMENT OR OTHER VIOLATION OF RIGHTS. NEITHER NEXTHOP NOR ANY OTHER
PROVIDER OR DEVELOPER OF MATERIAL CONTAINED IN THIS DOCUMENT WARRANTS OR MAKES ANY REPRESEN-TATIONS
REGARDING THE USE, VALIDITY, ACCURACY, OR RELIABILITY OF, OR THE RESULTS OF THE USE OF, OR OTHERWISE
RESPECTING, THE MATERIAL IN THIS DOCUMENT.

Limitation of Liability

356
UNDER NO CIRCUMSTANCES SHALL NEXTHOP BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR
CONSEQUENTIAL DAMAGES, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR PROFIT, ARISING OUT OF THE USE, OR THE
INABILITY TO USE, THE MATERIAL IN THIS DOCUMENT, EVEN IF NEXTHOP OR A NEXTHOP AUTHORIZED REPRESENTATIVE HAS
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IF YOUR USE OF MATERIAL FROM THIS DOCUMENT RESULTS IN THE NEED
FOR SERVICING, REPAIR OR CORRECTION OF EQUIPMENT OR DATA, YOU ASSUME ANY COSTS THEREOF. SOME STATES DO
NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR
EXCLUSION MAY NOT FULLY APPLY TO YOU.

Copyright © ComponentOne, LLC 1991-2002. All Rights Reserved.

BIND: ISC Bind (Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC"))

Copyright 1997-2001, Theo de Raadt: the OpenBSD 2.9 Release

PCRE LICENCE

PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5
language. Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE,
supplied in the "doc" directory, is distributed under the same terms as the software itself.

Written by: Philip Hazel <ph10@cam.ac.uk>

University of Cambridge Computing Service, Cambridge, England. Phone:

+44 1223 334714.

Copyright (c) 1997-2004 University of Cambridge All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions
are met:

* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.

* Neither the name of the University of Cambridge nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.

Eventia Reporter includes software whose copyright is owned by, or licensed from, MySQL AB.

357
358
Index

A BIOS settings 23
Network Interface Cards
CPU 20
Disk Space 20
location 23 Memory 20
acceleration device status 26 Platforms 22 Minimum 20
Affinity settings 28 Network Interfaces 20
Operating Systems 20

M
C
Maximal Concurrent T
Command Line 25 Connections 32
fwaccel 26 TCP end timeout 32
Concurrent Connections TCP State and Benchmarking 37
and Hash Size 32
Increasing Number 32 N
TCP end timeout 32
UDP virtual session NAT 16 U
timeout 32
Connection Templates 34 UDP virtual session timeout 32
Configuration 36
Delayed Synchronization 35 P
policy rules 34
Restrictions 34 Performance Measurement 37 X
Testing 35 Benchmarking 37
cpconfig 27 TCP State 37 Xeon processors 33
Command Usage 27 Performance Tuning 32
proc 29
proc entries 29
F Command Parameters 29

fwaccel 26, 35
Command Usage 26 R
Recommended Platforms 22
H
HyperThreading 33 S
sim 28
I SIM Affinity
Automatic Mode 28
Manual Mode 28
Implied Rules 33 SYN Defender 32
Installation System Requirements

March 2007 45
46

You might also like