
802
Field descriptions
Menu option field descriptions
A cluster consists of at least two cluster members, and can include up to eight. Before you create a
cluster, ensure that all of the prerequisites are met. After the second cluster member is added, you can
add additional members, modify settings of the members you have already added, or finish the wizard.
Note:
If there are only two cluster members, then you are prevented from removing a cluster member.
When you run the Cluster Wizard, you configure the heartbeat interface once for the initial cluster
member. The Cluster Wizard automatically sets the heartbeat interface attribute for each subsequent
cluster member, assuming that the logical name and subnet is the same as the heartbeat interface of
the other cluster members.
Note:
Once you set the heartbeat interface with the Cluster Wizard and click Next, you cannot click
Back.
Later, when you need to modify, remove, or dissolve a cluster or cluster member, you can do so from
the Tools > Cluster menu. These options share panels.
Associated tasks
The task that you can perform with this wizard is:
■
“Creating a new cluster with the Cluster Wizard”
■
Associated panels
These are the individual panels of the Cluster Wizard, if you are adding, modifying, or removing a
cluster member:
■
■
■
■
■
“Connect to New Cluster Member panel”
■
“Add/Remove Cluster Members panel”
■
Cluster Wizard panel
This is the first panel of the Cluster Wizard. This panel introduces you to the wizard.
Associated tasks:
The tasks that you can perform with this panel include:
■
“Creating a new cluster with the Cluster Wizard”
■
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...