Symantec 10521146 - Network Security 7120 Administration Manual page 277

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

Note: SuperUsers can establish a cluster master node; Administrators,
StandardUsers, and RestrictedUsers cannot. See
page 319 for more about permissions.
Adding slave nodes to clusters
Symantec Network Security provides a way to add both Network Security
software nodes and 7100 Series appliance nodes to a cluster, using the topology
tree.
Add a slave node to the topology tree after you install Symantec Network
Security on the corresponding slave computer. Similarly, add a 7100 Series node
to the topology tree after performing the initial configuration of the appliance
itself.
When you add slave nodes to the topology tree, make a note of the node number
that you assign. You must supply the same number when you perform the initial
configuration of the appliance, and when you install Symantec Network
Security software on a designated computer.
See the following for additional related information:
See
"Adding or editing software nodes"
See
"Adding or editing 7100 Series nodes"
See
"Configuring availability for multiple nodes"
Caution: Verify that Network Time Protocol (NTP) is not running on any slave
node within a cluster. If a slave node is running NTP, it cannot synchronize with
the master node, which can cause the slave node to malfunction.
Note: SuperUsers can add both Network Security software nodes and 7100
Series appliance nodes to a cluster and assign them master and slave status. See
"User groups reference"
Deleting nodes from clusters
Symantec Network Security provides a way to delete both Network Security
software nodes and 7100 Series appliance nodes from a cluster, using the
topology tree.
See
"Deleting objects"
on page 86.
on page 319 for more about permissions.
on page 81.
Advanced configuration
Managing node clusters
"User groups reference"
on page 92.
on page 289.
277
on

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents