Symantec 10521146 - Network Security 7120 Administration Manual page 295

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

6
In Apply Changes To, select the node or subset of nodes that you want to
apply the parameter to.
7
Click OK to save the changes to this sensor and close.
Caution: Make sure that the system has enough RAM for this parameter.
Setting Watchdog Process Stop Window
Watchdog Process Stop Window determines the time period during which
Symantec Network Security decides if failures occur at too high a rate. If a node
fails too many times during this time period, then it shuts down and fails over to
the standby node. The default value is 10 minutes.
To configure node parameters
1
Click Configuration > Node > Network Security Parameters.
2
In Select Node, choose the node from the pull-down list, and click OK.
3
In the left pane, click the parameter that you want to configure.
4
In the lower right corner of the Configuration Parameters pane, enter a fail
rate. If the number of failures breaches this threshold, it resorts to standby.
5
Click Apply.
6
In Apply Changes To, select the node or subset of nodes that you want to
apply the parameter to.
7
Click OK to save the changes to this sensor and close.
Caution: Make sure that the system has enough RAM for this parameter. Before
setting this parameter, please review the failover procedure thoroughly.
Setting Watchdog Process Maximum Resets
Watchdog Process Maximum Resets defines the maximum number of reboots or
restarts that Symantec Network Security executes within the time period
defined by Watchdog Process Stop Window before failing over to the standby
node. The default value is 2.
To configure node parameters
1
Click Configuration > Node > Network Security Parameters.
2
In Select Node, choose the node from the pull-down list, and click OK.
Advanced configuration
Establishing high availability failover
295

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents