802
Field descriptions
Menu option field descriptions
A cluster consists of at least two cluster members, and can include up to eight. Before you create a
cluster, ensure that all of the prerequisites are met. After the second cluster member is added, you can
add additional members, modify settings of the members you have already added, or finish the wizard.
Note:
If there are only two cluster members, then you are prevented from removing a cluster member.
When you run the Cluster Wizard, you configure the heartbeat interface once for the initial cluster
member. The Cluster Wizard automatically sets the heartbeat interface attribute for each subsequent
cluster member, assuming that the logical name and subnet is the same as the heartbeat interface of
the other cluster members.
Note:
Once you set the heartbeat interface with the Cluster Wizard and click Next, you cannot click
Back.
Later, when you need to modify, remove, or dissolve a cluster or cluster member, you can do so from
the Tools > Cluster menu. These options share panels.
Associated tasks
The task that you can perform with this wizard is:
■
“Creating a new cluster with the Cluster Wizard”
■
Associated panels
These are the individual panels of the Cluster Wizard, if you are adding, modifying, or removing a
cluster member:
■
■
■
■
■
“Connect to New Cluster Member panel”
■
“Add/Remove Cluster Members panel”
■
Cluster Wizard panel
This is the first panel of the Cluster Wizard. This panel introduces you to the wizard.
Associated tasks:
The tasks that you can perform with this panel include:
■
“Creating a new cluster with the Cluster Wizard”
■
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...