Configuring Active/Passive Cluster - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide
Related
Documentation

Configuring Active/Passive Cluster

366
Finally, configure the cluster and the cluster members (you must configure cluster
members from within the cluster itself). To configure a cluster member:
In the NSM navigation tree, select Device Manager > Cluster. Double-click the cluster
1.
object to open the cluster configuration.
Select Members in the Cluster.
2.
Double-click the cluster member you want to configure to open its device configuration,
3.
then make your changes.
Most settings entered on one device in a cluster propagate to the other device, however,
some configurations, such as setting NSRP authentication and encryption passwords,
do not propagate. If you are using NSRP authentication and encryption passwords in the
cluster, you need to configure the same information on all devices in the cluster.
For instructions for adding member devices to a cluster, see the Network and Security
Manager Online Help topic " Configuring NSRP Clusters."
For more information about configurations that do not propagate, see the Concepts &
Examples ScreenOS Reference Guide: NSRP for ScreenOS 5.x or Concepts & Examples
ScreenOS Reference Guide: High Availability.
Route Types Overview on page 295
Routing Table Entries Overview on page 305
RIP Overview on page 321
IEEE 802.1x Support Overview on page 361
Supported EAP Types on page 362
NSRP Clusters Overview on page 363
Configuring Active/Passive Cluster on page 366
Example: Configuring Active/Passive Cluster (NSM Procedure) on page 367
In an active/passive configuration, the primary device propagates all its network and
configuration settings and the current session information to the backup device. If the
primary device fails, the backup device becomes the primary device and takes over the
traffic processing.
NOTE: When using a PPPoE connection to an ISP for Internet access, you
can bind the PPPoE instance to a VSI interface. In the event of failover, this
configuration enables the new master to use the same IP and PPPoE
connection as the previous master. For details, see "About Configuring PPPoE"
on page 135.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents