528
High availability and load balancing using clusters
Monitoring cluster status
Related information
For further information related to this topic, see the following:
■
■
“Cluster Management Update Interface panel”
■
Monitoring cluster status
You can assess the status of a cluster by viewing the whole cluster status or an individual member’s
status in the following ways:
■
Viewing the cluster status in the SGMI
■
Viewing cluster status using the bfstat utility
Viewing the cluster status in the SGMI
The cluster status display lets you monitor a cluster of security gateways. The display shows the
following:
■
Whether each cluster member is up and running
■
IP address and virtual IP address (VIP) of each cluster member
■
Relative load of traffic on each cluster member
■
Configuration revision number for each cluster member
Prerequisites
None.
To view cluster status in the SGMI
1
In the SGMI, in the left pane, under Cluster, click
Cluster Status
.
2
In the right pane, on the Cluster Status window, you can view the IP addresses, a partial list of VIPs,
status, and configuration revision numbers of each cluster member.
The color of the icon in the top left corner of the display indicates the cluster status as follows:
3
To view a complete list of VIPs for a cluster member, move the pointer over the specific member
status area.
A table displays the IP address, a complete list of VIPs, and the configuration revision status for the
selected cluster member. The display refreshes every five seconds.
Related information
For further information related to this topic, see the following:
■
Green
All cluster members are up.
Red
Not all cluster members are up.
For example, a cluster member may have gone offline.
Blue
Not synchronized.
The latest revision is not being used by all cluster members.
The Status at the bottom of the window gives the revision of each cluster member.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...