804
Field descriptions
Menu option field descriptions
Cluster VIP Addresses panel
This is the third panel of the Cluster Wizard. Here you can set up your VIP addresses.
Associated tasks
The tasks that you can perform with this panel include:
■
“Creating a new cluster with the Cluster Wizard”
■
Add Cluster Member panel
This is the third panel of the Cluster Wizard. On this panel you can add another security gateway to the
cluster.
Associated tasks
The tasks that you can perform with this panel include:
■
“Creating a new cluster with the Cluster Wizard”
■
■
“Adding or removing a cluster member”
Connect to New Cluster Member panel
This is the fourth panel of the Cluster Wizard. On this panel, you log on to the new cluster member.
Associated tasks
The tasks that you can perform with this panel include:
■
“Creating a new cluster with the Cluster Wizard”
■
■
“Adding or removing a cluster member”
Table D-307
Cluster VIP Addresses panel
Field
Description
Interface
Before you can edit a VIP address, you must select an interface from the table.
VIP Address 198.20.
The remainder of the virtual IP address (VIP) to associate with the interface you selected,
and then click Add.
Repeat this step for each interface. You do not need to assign a VIP to the heartbeat
interface.
The VIP address represents the identity of the cluster to outside computers and routes.
You may assign up to a total of 64 VIPs minus the number of network segments that
participate in the cluster. However, there is no benefit to assigning more VIPs than there are
cluster members. You must enter a VIP address for each interface, excluding the heartbeat
interface.
Do not use a VIP to launch the SGMI. Always use an actual IP address.
Table D-308
Add Cluster Member panel
Field
Description
IP address
IP address of the security gateway you want to add to the cluster.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...