
Chapter
14
High availability and load
balancing using clusters
This chapter includes the following topics:
■
■
■
Creating a new cluster with the Cluster Wizard
■
■
■
Updating interfaces in a cluster configuration
■
■
Cluster interactions with other security gateway features
■
Backing up and restoring cluster configurations
■
Troubleshooting cluster configuration problemsYou can continue configuring the cluster, but the
member experiencing problems is not added. You can fix the problems and add the member at a
later time.
About clustering
The security gateway uses clustering technology to ensure high availability (HA) and increase
performance through load balancing (LB). In a cluster, two to eight security gateways are grouped
together and instructed to work as a single entity. All cluster members share the state information of
all other cluster members, and any cluster member can immediately assume and support a connection
for a failed cluster member. Additionally, you can distribute work evenly among all cluster members.
High availability and load balancing is a feature that is not automatically enabled when you run the
System Setup Wizard. If you have not enabled this feature, you need to do so before trying to set up
clusters.
How clusters work
The security gateways use many components to manage a cluster. These components include:
■
Virtual IP addresses and VIP owners
■
■
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...