interface and all other interfaces from one unit to the other. These packets allow the health of both
units to be monitored. Heartbeat packets are sent in both directions so that the passive unit knows
about the health of the active unit and the active unit knows about the health of the passive.
The heartbeat mechanism is discussed below with more detail in Section 11.2, “HA Mechanisms”.
Cluster Management
When managing the individual hardware units in a cluster, they must be administered separately
using the Web Interface or the CLI. Configuration changes are not automatically duplicated between
the cluster peers.
Load-sharing
D-Link HA clusters do not provide load-sharing since only one unit will be active while the other is
inactive and only two NetDefend Firewalls, the master and the slave, can exist in a single cluster.
The only processing role that the inactive unit plays is to replicate the state of the active unit and to
take over all traffic processing if it detects the active unit is not responding.
Hardware Duplication
D-Link HA will only operate between two NetDefend Firewalls. As the internal operation of
different firewall manufacturer's software is completely dissimilar, there is no common method
available to communicating state information to a dissimilar device.
It is also strongly recommended that the NetDefend Firewalls used in cluster have identical
configurations. They must also have identical licenses which allow identical capabilities including
the ability to run in an HA cluster.
Extending Redundancy
Implementing an HA Cluster will eliminate one of the points of failure in a network. Routers,
switches and Internet connections can remain as potential points of failure and redundancy for these
should also be considered.
11.1. Overview
Chapter 11. High Availability
490
Summary of Contents for NetDefend DFL-260E
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382...
Page 386: ...The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533...