SlideShare a Scribd company logo
Network Composer® EX Series New Features
           XLi™ OS Version 9
     Active-Passive High Availability
Notice


Notice
Cymphonix® Network Composer EX Services® New Features XLi™ OS Version 9

©2004 - 2010 Cymphonix Corporation . All Rights Reserved.

Documentation Date: Wednesday, December 08, 2010
Licensed software and documentation. use, copy, and disclosure restricted by license agreement.

Cymphonix®, Network Composer®, Network Conductor™, XLi™ OS and the Cymphonix logos are
trademarks of Cymphonix Corporation. Other names and products may be property of their respective
owners.




                                              -2-
Licensing and Maintenance Agreement


Licensing and Maintenance Agreement
View and print the Cymphonix Disclaimer, and Licensing and Maintenance Agreement online at
http://help.cymphonix.com.




                                             -3-
Table of Contents


Table of Contents
 Notice                                                                               2
 Licensing and Maintenance Agreement                                                  3
 Table of Contents                                                                    4
 Active/Passive High Availability                                                     5
   How does Failover Work?                                                            6
   Setting up Network Composer for Active/Passive High Availability                   6
 Customer Support                                                                     9
   Cymphonix Premium Support Services                                                 9
   Send Feedback                                                                      9




                                           -4-
Active/Passive High Availability


Active/Passive High Availability
Active/Passive High Availability is a fully redundant instance of the Network Composer
appliance, with the secondary Network Composer coming inline only when the primary appliance
fails. This ensures that you have continued access to the Internet, depending on how you set up the
bypass feature.

Scenario - Two Firewalls
If you have two firewalls, and one is used for primary traffic, while the other circuit is used for backup
purposes, you can install two Network Composer appliances to manage traffic as it passes through
to the Internet. When you have a primary and secondary appliance, you can set up Active / Passive
High Availability to ensure you always have traffic passing through a Network Composer. This is
especially helpful in environments, such as schools or law firms where organizations could be
required to always have filtered traffic to access the Internet.

When you set up Active/Passive High Availability the primary and secondary Network Composers
are physically connected together through a port pair that is not in use for the Internet. Depending on
the Network Composer model, there are extra ports specifically designed for Active/Passive High
Availability.

After you link the two appliances together (straight-through cable), log in to each Network Composer,
configuring one appliance as primary and the other as secondary. Set the ports used to connect the
two appliances together, and then assign both devices a passcode so that configuration data
between the two appliances can be synchronized. Both of the Network Composer's User Interfaces
provide status information for Active/Passive High Availability settings, such as which appliance is
primary and secondary, the HA Interface port used to connect the appliances,the IP address of the
HA Interface (port), and so on.

Scenario - Active/Passive Setup
The following graphic illustrates an environment setup for Active/Passive High Availability.




                                                  -5-
How does Failover Work?


   1. The primary circuit or the primary Network Composer has a incurred a failure, but traffic auto-
      matically switches over to the secondary Network Composer so that traffic to the Internet is
      seamless.
   2. The configuration data is always synchronized between the two appliances, so any Internet
      Usage Rules or Shaping policies you have created apply to all traffic. However, telemetry data
      does not transfer from the primary to the secondary appliance. Rather, the secondary appli-
      ance starts collecting telemetry data after the network traffic starts passing through it.
   3. After the primary circuit or Network Composer is restored to full functionality and resumes
      passing network traffic, telemetry data resumes collecting on the primary appliance. When
      your environment is restored, and you want to view or print report data, you must log in to the
      secondary Network Composer and run reports to view activity for the time period it was acting
      as primary. If you want to aggregate data from both Network Composers into one reporting sys-
      tem, you can install Cymphonix Network Conductor, which manages multiple Network Com-
      poser's and compiles all data passing through it.

How does Failover Work?
One of the options in the Network Composer User Interface is to enable bypass mode. This feature
enables the primary appliance to switch over to the secondary appliance in the event of a failure. If
either, the circuit to the Internet or the Network Composer fails, then all traffic passes through the sec-
ondary appliance on the backup circuit. Depending on how you set up the bypass feature determines
whether or not you have access to the Internet. The Internet traffic is unfiltered until the failure is
resolved.

Fail to wire is when you have an open unfiltered connection to the Internet when bypass is enabled.
This allows users to still have access to the Internet, but Network Composer will not filter any of its
traffic. Fail to closed is when the circuit to the Internet is broken and Network Composer cannot pass
any traffic to the Internet until the failure is resolved.

See also:
Network Composer Startup Guide: Test Failover and What is Bypass.
Network Conductor Quick Start Guide

Setting up Network Composer for Active/Passive High
Availability
You can set up Network Composer for Active/Passive High Availability through the User Interface.
You must configure both a primary and secondary Network Composer to use this feature. The fol-
lowing table describes the fields on the User Interface page that you must set for both the primary and
secondary Active/Passive High Availability Field Definitions.

          Field                                           Description
HA Interface              The port you use to connect the primary Network Composer to the sec-
                          ondary Network Composer. You can select any pair of ports that are not
                          currently used to connect to the Internet.
                          Options:
                              l P1-LAN
                              l P1-WAN
                              l P2-LAN




                                                    -6-
Setting up Network Composer for Active/Passive High Availability

           Field                                         Description
                             l   P2-WAN

                         Standard: No Active/Passive High Availability configured.
                         Primary: Network Composer is set as primary.
Operation Mode           Secondary: Network Composer is set as secondary (backup).
                         Note: The primary and secondary Network Composers are physically
                         connected, but only one appliance can be set as primary.

Passcode                 User defined. This passcode is used to synchronize the encrypted con-
                         figuration data between the primary and secondary Network Composer.
                         You must enter the same Passcode on both devices to they can com-
                         municate correctly.

                         Note: Telemetry data is not synchronized between the primary and sec-
                         ondary Network Composers.

                         All the status fields help you quick view at-a-glance, the configuration
Status                   you entered for the Primary or Secondary appliance. If this field is con-
                         figured, then the Active/Passive High Availability feature is set up.

HA Mode                  Network Composer's High Availability assignment: primary or sec-
                         ondary.

                         The port selected to connect the primary to the secondary Network Com-
HA Interface
                         poser.

HA IP                    The system auto-detects the IP address of the port used to connect the
                         primary and secondary appliances.

                         Enabled or disabled. Do you want the secondary Network Composer to
Bypass Mode
                         pass network traffic in the event the primary circuit or appliance fails?

Last Config Download The date of the last configuration download between the primary and sec-
                     ondary appliances.

Last Config Update       The date of the last configuration update on the appliance.

Last Communication       Time stamp of the last time the primary communicated with the sec-
                         ondary appliance.

Transfer Stats           Byte transfer data.

To set up Active/Passive High Availability
   1. Log in to Network Composer.
   2. Select Admin > Configuration > System Options > Active - Passive.
   3. Select the HA Interface from the drop-down list.
   4. Enter a passcode for synchronizing the primary and secondary Network Composer.

         Note: The passcode must match on both appliances.

   5. Click Apply.




                                                -7-
Setting up Network Composer for Active/Passive High Availability




                                       -8-
Customer Support


Customer Support
For additional help, do the following:
   1. Search the Cymphonix Knowledge Base.
   2. Contact your Authorized CymphonixReseller for support.

Cymphonix Premium Support Services
Cymphonix Premium Support Services provide additional technical support to help customers do the
following:
   1. Configuration and Installation .
   2. Product Training.
   3. Technical Support Services.


For more information about purchasing Cymphonix Premium Support Service contact us at:
    l   E-mail: support@cymphonix.com
    l   Phone:(801) 938-1500 #2 between the hours of 8:00 AM and 7:00 PM Eastern Time.


To better serve your needs, gather the following information before contacting Cymphonix.
    l   Product Model number
    l   Serial number
    l   License count

Send Feedback
Your feedback and suggestions help us to better serve you as our valued customer. We want to hear
from you!
Send feedback and comments about our products to support@cymphonix.com. If you want us to con-
tact you directly, include your product's model number and contact information. We will make every
attempt to help you resolve your questions or issues.

Cymphonix
8871 S. Sandy Parkway, Suite 150
Salt Lake City, UT 84070-6408
Phone: (866) 511-1155

www.cymphonix.com




                                               -9-

More Related Content

What's hot

Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
NetProtocol Xpert
 
CCNP Switching Chapter 6
CCNP Switching Chapter 6CCNP Switching Chapter 6
CCNP Switching Chapter 6
Chaing Ravuth
 
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdfKVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
RikyFitriadi1
 
Madge LANswitch Plus LFE-4004 Fast Ethernet Switch
Madge LANswitch Plus LFE-4004 Fast Ethernet SwitchMadge LANswitch Plus LFE-4004 Fast Ethernet Switch
Madge LANswitch Plus LFE-4004 Fast Ethernet Switch
Ronald Bartels
 
Ethernet Services for Multi-Site Connectivity
Ethernet Services for Multi-Site ConnectivityEthernet Services for Multi-Site Connectivity
Ethernet Services for Multi-Site Connectivity
Mallory Zemelis
 
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANsCCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANs
Amir Jafari
 
Base Designs Lab Setup for Validated Reference Design
Base Designs Lab Setup for Validated Reference DesignBase Designs Lab Setup for Validated Reference Design
Base Designs Lab Setup for Validated Reference DesignContent Rules, Inc.
 
Design and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksDesign and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss Networks
Cisco Mobility
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
Chaing Ravuth
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
sushmil123
 
Design, Deployment and Management of Unified WLAN
Design, Deployment and Management of Unified WLANDesign, Deployment and Management of Unified WLAN
Design, Deployment and Management of Unified WLANCisco Canada
 
S1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupS1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setup
Prashant Sengar
 
CCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANsCCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
Amir Jafari
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
Andy Juan Sarango Veliz
 
MPLS-based Metro Ethernet Networks
MPLS-based Metro Ethernet NetworksMPLS-based Metro Ethernet Networks
MPLS-based Metro Ethernet Networks
APNIC
 
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsCCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
Amir Jafari
 
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewShared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
zOSCommserver
 
CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and RoutesCCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and Routes
Amir Jafari
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
PacketBase, Inc.
 

What's hot (20)

Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
 
CCNP Switching Chapter 6
CCNP Switching Chapter 6CCNP Switching Chapter 6
CCNP Switching Chapter 6
 
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdfKVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
KVM_over_IP_Matrix_System_Implementation_Guide_20190618.pdf
 
Madge LANswitch Plus LFE-4004 Fast Ethernet Switch
Madge LANswitch Plus LFE-4004 Fast Ethernet SwitchMadge LANswitch Plus LFE-4004 Fast Ethernet Switch
Madge LANswitch Plus LFE-4004 Fast Ethernet Switch
 
Ethernet Services for Multi-Site Connectivity
Ethernet Services for Multi-Site ConnectivityEthernet Services for Multi-Site Connectivity
Ethernet Services for Multi-Site Connectivity
 
CCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANsCCNA R&S-11-Troubleshooting Ethernet LANs
CCNA R&S-11-Troubleshooting Ethernet LANs
 
Base Designs Lab Setup for Validated Reference Design
Base Designs Lab Setup for Validated Reference DesignBase Designs Lab Setup for Validated Reference Design
Base Designs Lab Setup for Validated Reference Design
 
Design and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksDesign and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss Networks
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
 
Design, Deployment and Management of Unified WLAN
Design, Deployment and Management of Unified WLANDesign, Deployment and Management of Unified WLAN
Design, Deployment and Management of Unified WLAN
 
S1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupS1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setup
 
CCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANsCCCNA R&S-03-Fundamentals of Ethernet LANs
CCCNA R&S-03-Fundamentals of Ethernet LANs
 
Vo lte white paper
Vo lte   white paperVo lte   white paper
Vo lte white paper
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
 
MPLS-based Metro Ethernet Networks
MPLS-based Metro Ethernet NetworksMPLS-based Metro Ethernet Networks
MPLS-based Metro Ethernet Networks
 
CCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANsCCNA R&S-10-Implementing Ethernet Virtual LANs
CCNA R&S-10-Implementing Ethernet Virtual LANs
 
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewShared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
 
CCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and RoutesCCNA R&S-20-Configuring IPv4 Addresses and Routes
CCNA R&S-20-Configuring IPv4 Addresses and Routes
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 

Similar to Cymphonix active-passive high availability v9

Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
Juan Carlos Banegas
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.
Kapil Sabharwal
 
Whatsup
WhatsupWhatsup
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5friv4schoolgames
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
robertguerra
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501robertguerra
 
Nat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleNat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleLuis Nagasako
 
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
SagarR24
 
CCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptxCCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptx
RichardChecca1
 
Adding a-new-network-device
Adding a-new-network-deviceAdding a-new-network-device
Adding a-new-network-devicebhimt00
 
Kubernetes OpenContrail Meetup
Kubernetes OpenContrail MeetupKubernetes OpenContrail Meetup
Kubernetes OpenContrail Meetup
Lachlan Evenson
 
Auto default gateway settings for virtual
Auto default gateway settings for virtualAuto default gateway settings for virtual
Auto default gateway settings for virtual
ijwmn
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
ccna4discovery
 
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Đồng Quốc Vương
 
Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023
Chris Grundemann
 
NETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADANETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADAPratik Aggarwal
 
NETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADANETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADAPratik Aggarwal
 
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP modeHUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
IPMAX s.r.l.
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 

Similar to Cymphonix active-passive high availability v9 (20)

Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.
 
Whatsup
WhatsupWhatsup
Whatsup
 
Whatsup
WhatsupWhatsup
Whatsup
 
Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
 
Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501Installation of pfSense on Soekris 6501
Installation of pfSense on Soekris 6501
 
Nat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleNat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_module
 
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
 
CCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptxCCNA_RSE_Chp4.pptx
CCNA_RSE_Chp4.pptx
 
Adding a-new-network-device
Adding a-new-network-deviceAdding a-new-network-device
Adding a-new-network-device
 
Kubernetes OpenContrail Meetup
Kubernetes OpenContrail MeetupKubernetes OpenContrail Meetup
Kubernetes OpenContrail Meetup
 
Auto default gateway settings for virtual
Auto default gateway settings for virtualAuto default gateway settings for virtual
Auto default gateway settings for virtual
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
 
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
 
Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023
 
NETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADANETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADA
 
NETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADANETWORKING, COMMUNICATION SYSTEMS AND SCADA
NETWORKING, COMMUNICATION SYSTEMS AND SCADA
 
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP modeHUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 

Recently uploaded

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

Cymphonix active-passive high availability v9

  • 1. Network Composer® EX Series New Features XLi™ OS Version 9 Active-Passive High Availability
  • 2. Notice Notice Cymphonix® Network Composer EX Services® New Features XLi™ OS Version 9 ©2004 - 2010 Cymphonix Corporation . All Rights Reserved. Documentation Date: Wednesday, December 08, 2010 Licensed software and documentation. use, copy, and disclosure restricted by license agreement. Cymphonix®, Network Composer®, Network Conductor™, XLi™ OS and the Cymphonix logos are trademarks of Cymphonix Corporation. Other names and products may be property of their respective owners. -2-
  • 3. Licensing and Maintenance Agreement Licensing and Maintenance Agreement View and print the Cymphonix Disclaimer, and Licensing and Maintenance Agreement online at http://help.cymphonix.com. -3-
  • 4. Table of Contents Table of Contents Notice 2 Licensing and Maintenance Agreement 3 Table of Contents 4 Active/Passive High Availability 5 How does Failover Work? 6 Setting up Network Composer for Active/Passive High Availability 6 Customer Support 9 Cymphonix Premium Support Services 9 Send Feedback 9 -4-
  • 5. Active/Passive High Availability Active/Passive High Availability Active/Passive High Availability is a fully redundant instance of the Network Composer appliance, with the secondary Network Composer coming inline only when the primary appliance fails. This ensures that you have continued access to the Internet, depending on how you set up the bypass feature. Scenario - Two Firewalls If you have two firewalls, and one is used for primary traffic, while the other circuit is used for backup purposes, you can install two Network Composer appliances to manage traffic as it passes through to the Internet. When you have a primary and secondary appliance, you can set up Active / Passive High Availability to ensure you always have traffic passing through a Network Composer. This is especially helpful in environments, such as schools or law firms where organizations could be required to always have filtered traffic to access the Internet. When you set up Active/Passive High Availability the primary and secondary Network Composers are physically connected together through a port pair that is not in use for the Internet. Depending on the Network Composer model, there are extra ports specifically designed for Active/Passive High Availability. After you link the two appliances together (straight-through cable), log in to each Network Composer, configuring one appliance as primary and the other as secondary. Set the ports used to connect the two appliances together, and then assign both devices a passcode so that configuration data between the two appliances can be synchronized. Both of the Network Composer's User Interfaces provide status information for Active/Passive High Availability settings, such as which appliance is primary and secondary, the HA Interface port used to connect the appliances,the IP address of the HA Interface (port), and so on. Scenario - Active/Passive Setup The following graphic illustrates an environment setup for Active/Passive High Availability. -5-
  • 6. How does Failover Work? 1. The primary circuit or the primary Network Composer has a incurred a failure, but traffic auto- matically switches over to the secondary Network Composer so that traffic to the Internet is seamless. 2. The configuration data is always synchronized between the two appliances, so any Internet Usage Rules or Shaping policies you have created apply to all traffic. However, telemetry data does not transfer from the primary to the secondary appliance. Rather, the secondary appli- ance starts collecting telemetry data after the network traffic starts passing through it. 3. After the primary circuit or Network Composer is restored to full functionality and resumes passing network traffic, telemetry data resumes collecting on the primary appliance. When your environment is restored, and you want to view or print report data, you must log in to the secondary Network Composer and run reports to view activity for the time period it was acting as primary. If you want to aggregate data from both Network Composers into one reporting sys- tem, you can install Cymphonix Network Conductor, which manages multiple Network Com- poser's and compiles all data passing through it. How does Failover Work? One of the options in the Network Composer User Interface is to enable bypass mode. This feature enables the primary appliance to switch over to the secondary appliance in the event of a failure. If either, the circuit to the Internet or the Network Composer fails, then all traffic passes through the sec- ondary appliance on the backup circuit. Depending on how you set up the bypass feature determines whether or not you have access to the Internet. The Internet traffic is unfiltered until the failure is resolved. Fail to wire is when you have an open unfiltered connection to the Internet when bypass is enabled. This allows users to still have access to the Internet, but Network Composer will not filter any of its traffic. Fail to closed is when the circuit to the Internet is broken and Network Composer cannot pass any traffic to the Internet until the failure is resolved. See also: Network Composer Startup Guide: Test Failover and What is Bypass. Network Conductor Quick Start Guide Setting up Network Composer for Active/Passive High Availability You can set up Network Composer for Active/Passive High Availability through the User Interface. You must configure both a primary and secondary Network Composer to use this feature. The fol- lowing table describes the fields on the User Interface page that you must set for both the primary and secondary Active/Passive High Availability Field Definitions. Field Description HA Interface The port you use to connect the primary Network Composer to the sec- ondary Network Composer. You can select any pair of ports that are not currently used to connect to the Internet. Options: l P1-LAN l P1-WAN l P2-LAN -6-
  • 7. Setting up Network Composer for Active/Passive High Availability Field Description l P2-WAN Standard: No Active/Passive High Availability configured. Primary: Network Composer is set as primary. Operation Mode Secondary: Network Composer is set as secondary (backup). Note: The primary and secondary Network Composers are physically connected, but only one appliance can be set as primary. Passcode User defined. This passcode is used to synchronize the encrypted con- figuration data between the primary and secondary Network Composer. You must enter the same Passcode on both devices to they can com- municate correctly. Note: Telemetry data is not synchronized between the primary and sec- ondary Network Composers. All the status fields help you quick view at-a-glance, the configuration Status you entered for the Primary or Secondary appliance. If this field is con- figured, then the Active/Passive High Availability feature is set up. HA Mode Network Composer's High Availability assignment: primary or sec- ondary. The port selected to connect the primary to the secondary Network Com- HA Interface poser. HA IP The system auto-detects the IP address of the port used to connect the primary and secondary appliances. Enabled or disabled. Do you want the secondary Network Composer to Bypass Mode pass network traffic in the event the primary circuit or appliance fails? Last Config Download The date of the last configuration download between the primary and sec- ondary appliances. Last Config Update The date of the last configuration update on the appliance. Last Communication Time stamp of the last time the primary communicated with the sec- ondary appliance. Transfer Stats Byte transfer data. To set up Active/Passive High Availability 1. Log in to Network Composer. 2. Select Admin > Configuration > System Options > Active - Passive. 3. Select the HA Interface from the drop-down list. 4. Enter a passcode for synchronizing the primary and secondary Network Composer. Note: The passcode must match on both appliances. 5. Click Apply. -7-
  • 8. Setting up Network Composer for Active/Passive High Availability -8-
  • 9. Customer Support Customer Support For additional help, do the following: 1. Search the Cymphonix Knowledge Base. 2. Contact your Authorized CymphonixReseller for support. Cymphonix Premium Support Services Cymphonix Premium Support Services provide additional technical support to help customers do the following: 1. Configuration and Installation . 2. Product Training. 3. Technical Support Services. For more information about purchasing Cymphonix Premium Support Service contact us at: l E-mail: support@cymphonix.com l Phone:(801) 938-1500 #2 between the hours of 8:00 AM and 7:00 PM Eastern Time. To better serve your needs, gather the following information before contacting Cymphonix. l Product Model number l Serial number l License count Send Feedback Your feedback and suggestions help us to better serve you as our valued customer. We want to hear from you! Send feedback and comments about our products to support@cymphonix.com. If you want us to con- tact you directly, include your product's model number and contact information. We will make every attempt to help you resolve your questions or issues. Cymphonix 8871 S. Sandy Parkway, Suite 150 Salt Lake City, UT 84070-6408 Phone: (866) 511-1155 www.cymphonix.com -9-