D
Size: a a a
D
EN
EN
layer3+4
This policy uses upper layer protocol information, when available, to generate the hash. This allows for traffic to a particular network peer to span multiple slaves, although a single connection will not span multiple slaves.
A
A
EN
D
EN
A
EN
A
D
EN
A
D
EN
D
D
EN
D