how are packets being handled by cluster members?
When Load Sharing Multicast mode is defined in a ClusterXL cluster object, how are packets
being handled by cluster members?
Which of the following does NOT happen when using Pivot Mode in ClusterXL?
Which of the following does NOT happen when using Pivot Mode in ClusterXL?
which valid Load Sharing method will consider VPN information?
When distributing IPSec packets to gateways in a Load Sharing Multicast mode cluster, which
valid Load Sharing method will consider VPN information?
By default, the Cluster Control Protocol (CCP) uses this to send delta sync messages to other cluster members.
By default, the Cluster Control Protocol (CCP) uses this to send delta sync messages to other
cluster members.
What cluster mode is represented in this case?
Exhibit:
What cluster mode is represented in this case?
Which load-balancing method below is NOT valid?
Which load-balancing method below is NOT valid?
Which method of load balancing describes “Round Robin”?
Which method of load balancing describes “Round Robin”?
Is State Synchronization working properly between the two members?
State Synchronization is enabled on both members in a cluster, and the Security Policy is
successfully installed. No protocols or services have been unselected for selective sync.
Review the fw tab -t connections -s output from both members. Is State Synchronization working
properly between the two members?
What is the correct upgrade procedure?
You want to upgrade a cluster with two members to R77. The Security Management Server and
both members are version NGX R65, with the latest Hotfix Accumulator. What is the correct
upgrade procedure?
1. Change the version in the General Properties of the Gateway-cluster object.
2. Upgrade the Security Management Server, and reboot.
3. Run cpstop on one member, while leaving the other member running. Upgrade one member at
a time and reboot after upgrade.
4. Install the Security Policy.
Which of the following answers does NOT lead to a successful solution?
Included in the client’s network are some switches, which rely on IGMP snooping. You must find a
solution to work with these switches. Which of the following answers does NOT lead to a
successful solution?