11.2. HA Mechanisms
This section discusses in more depth the mechanisms NetDefendOS uses to implement the high
availability feature.
Basic Principles
D-Link HA provides a redundant, state-synchronized hardware configuration. The state of the active
unit, such as the connection table and other vital information, is continuously copied to the inactive
unit via the sync interface. When cluster failover occurs, the inactive unit knows which connections
are active, and traffic can continue to flow after the failover with negligible disruption.
The inactive system detects that the active system is no longer operational when it no longer detects
sufficient Cluster Heartbeats. Heartbeats are sent over the sync interface as well as all other
interfaces.
Heartbeat Frequency
NetDefendOS sends 5 heartbeats per second from the active system and when three heartbeats are
missed (that is to say, after 0.6 seconds) a failover will be initiated. By sending heartbeats over all
interfaces, the inactive unit gets an overall view of the active unit's health. Even if sync is
deliberately disconnected, failover may not result if the inactive unit receives enough heartbeats
from other interfaces via a shared switch, however the sync interface sends twice as many heartbeats
as any of the normal interfaces.
Heartbeats are not sent at smaller intervals because such delays may occur during normal operation.
An operation, for example opening a file, could result in delays long enough to cause the inactive
system to go active, even though the other is still active.
Disabling Heartbeat Sending on Interfaces
The administrator can manually disable heartbeat sending on any interface if that is desired. This is
not recommended since the fewer interfaces that send heartbeats, the higher the risk that not enough
heartbeats are received to correctly indicate system health.
The exception to this recommendation is if an interface is not used at all. In this case, it can be
advantageous to disable heartbeat sending on that interface. The reason for this is that NetDefendOS
would otherwise send heartbeats on the disabled interface and this can contribute to a false picture
of system health since these heartbeats are always lost. A "false" failover could therefore be the
result.
Heartbeat Characteristics
Cluster heartbeats have the following characteristics:
•
The source IP is the interface address of the sending firewall.
•
The destination IP is the broadcast address on the sending interface.
•
The IP TTL is always 255. If NetDefendOS receives a cluster heartbeat with any other TTL, it is
assumed that the packet has traversed a router and therefore cannot be trusted.
•
It is a UDP packet, sent from port 999, to port 999.
•
The destination MAC address is the Ethernet multicast address corresponding to the shared
hardware address. In other words, 11-00-00-C1-4A-nn. Link-level multicasts are used over
normal unicast packets for security: using unicast packets would mean that a local attacker could
fool switches to route heartbeats somewhere else so the inactive system never receives them.
11.2. HA Mechanisms
Chapter 11. High Availability
491
Summary of Contents for NetDefend DFL-260E
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382...
Page 386: ...The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533...