This Article explains how Sticky IP and Round Robin NLB mechanisms works when connecting to Two RDP (Remote Desktop Protocol) hosts via incoming NAT policy. This article also demonstrate with help of packet monitor about Sticky IP and Round Robin NAT LB methods. NAT Methods which will be explained with Packet Monitor example are: Sticky IP – Source IP always connects to the same Destination IP (assuming it is alive). This method is best for publicly hosted sites requiring connection persistence, such as Web applications, Web forms, or shopping cart applications. This is the default mechanism, and is recommended for most deployments. Round Robin – Source IP cycles through each live load-balanced resource for each connection. This method is best for equal load distribution when persistence is not required.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Above Access rule will allow access to the Public Virtual IP and then it will be sent to RDP hosts using the NAT LB method
Note: If outbound access is required from above RDP hosts then add outbound NAT policies and access rules per requirements, as the above NAT and Access Rule will only allow inbound access, and if any of the RDP host need to initiate outbound connection, not replying an incoming request, then separate NAT/Access Rule will be needed.
in the load-balancing group, using either a simple ICMP ping query to determine if the resource is alive, or a TCP socket open query to determine if the resource is alive. Per the configurable intervals, the SonicWall can direct traffic away from a non-responding resource, and return traffic to the resource once it has begun to respond again.
After the NAT rule has been added successfully, check the Investigate |Event Logs for the following Network Monitor logs confirming hosts are responding on Probes.
Source IPs: 10.71.254.254, 10.71.253.1 initiated two connections on destination TCP ports 3389 and their requests were load balanced onto destination hosts as shown in the "Packet Monitor" screenshot below:
Source IP 10.71.254.254 connected to 10.10.11.141.
Source IP 10.71.253.1 connected to 10.10.11.142.
Source IP: 10.71.253.1 connect to 10.10.11.142 and Source IP: 10.71.254.254 connects to 10.10.11.141, see "Packet Monitor" below:
Example one - Mapping to a network:
Example two - Mapping to a IP address range:
Testing of Round Robin NAT LB method
Select Rules| NAT Policies | edit the same NAT policy used in the above example and change the "NAT LB" method from Sticky IP to Round Robin under Advanced tab, as shown below:
NAT LB method changed to Round Robin:
Source IPs: 10.71.254.254, 10.71.253.1 initiated two connections on destination TCP ports 3389 and their requests were load balanced onto destination hosts as shown in the "Packet Monitor" screenshot below:
Source IP 10.71.253.1 connected to 10.10.11.141.
Source IP 10.71.254.254 connected to 10.10.11.142.
Closed current RDP sessions on both hosts and re launched Two RDP sessions to see if same how their request will be load balanced across two RDP hosts, see screenshot below:
Source IP 10.71.253.1 connected to 10.10.11.142.
Source IP 10.71.254.254 connected to 10.10.11.141.
Round Robin – Source IP cycles through each live load-balanced resource for each connection. This method is best for equal load distribution when persistence is not required.
Determining the NAT LB Method to Use
Caveats
The following are not available at present:
While there is no limit to the number of internal resources that the SonicWall network security appliance can load-balance to, and there no limit to the number of hosts it can monitor, abnormally large load-balancing groups (25+resources) may impact performance.
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
Above Access rule will allow access to the Public Virtual IP and then it will be sent to RDP hosts using the NAT LB method
Note: If outbound access is required from above RDP hosts then add outbound NAT policies and access rules per requirements, as the above NAT and Access Rule will only allow inbound access, and if any of the RDP host need to initiate outbound connection, not replying an incoming request, then separate NAT/Access Rule will be needed.
in the load-balancing group, using either a simple ICMP ping query to determine if the resource is alive, or a TCP socket open query to determine if the resource is alive. Per the configurable intervals, the SonicWall can direct traffic away from a non-responding resource, and return traffic to the resource once it has begun to respond again.
After the NAT rule has been added successfully, check the Log | View for the following Network Monitor logs confirming hosts are responding on Probes, and this can further be monitored under Network | Network Monitor.
Source IPs: 10.71.254.254, 10.71.253.1 initiated two connections on destination TCP ports 3389 and their requests were load balanced onto destination hosts as shown in the "Packet Monitor" screenshot below:
Source IP 10.71.254.254 connected to 10.10.11.141.
Source IP 10.71.253.1 connected to 10.10.11.142.
Source IP: 10.71.253.1 connect to 10.10.11.142 and Source IP: 10.71.254.254 connects to 10.10.11.141, see "Packet Monitor" below:
Example one - Mapping to a network:
Example two - Mapping to a IP address range:
Testing of Round Robin NAT LB method
Select Network | NAT Policies | edit the same NAT policy used in the above example and change the "NAT LB" method from Sticky IP to Round Robin under Advanced tab, as shown below:
NAT LB method changed to Round Robin:
Source IPs: 10.71.254.254, 10.71.253.1 initiated two connections on destination TCP ports 3389 and their requests were load balanced onto destination hosts as shown in the "Packet Monitor" screenshot below:
Source IP 10.71.253.1 connected to 10.10.11.141.
Source IP 10.71.254.254 connected to 10.10.11.142.
Closed current RDP sessions on both hosts and re launched Two RDP sessions to see if same how their request will be load balanced across two RDP hosts, see screenshot below:
Source IP 10.71.253.1 connected to 10.10.11.142.
Source IP 10.71.254.254 connected to 10.10.11.141.
Round Robin – Source IP cycles through each live load-balanced resource for each connection. This method is best for equal load distribution when persistence is not required.
Determining the NAT LB Method to Use
Caveats
The following are not available at present:
While there is no limit to the number of internal resources that the SonicWall network security appliance can load-balance to, and there no limit to the number of hosts it can monitor, abnormally large load-balancing groups (25+resources) may impact performance.