Which method of load balancing describes “Round Robin”?
Which method of load balancing describes “Round Robin”?
Is State Synchronization working properly between the two members?
State Synchronization is enabled on both members in a cluster, and the Security Policy is
successfully installed. No protocols or services have been unselected for selective sync.
Review the fw tab -t connections -s output from both members. Is State Synchronization
working properly between the two members?
What is the correct upgrade procedure?
You want to upgrade a cluster with two members to R77. The Security Management Server
and both members are version NGX R65, with the latest Hotfix Accumulator. What is the
correct upgrade procedure? 1. Change the version in the General Properties of the
Gateway-cluster object. 2. Upgrade the Security Management Server, and reboot. 3. Run
cpstop on one member, while leaving the other member running. Upgrade one member at a
time and reboot after upgrade. 4. Install the Security Policy.
Which of the following answers does NOT lead to a successful solution?
Included in the client’s network are some switches, which rely on IGMP snooping. You must
find a solution to work with these switches. Which of the following answers does NOT lead
to a successful solution?
Is it possible to install a cluster in this situation?
The customer wishes to install a cluster. In his network, there is a switch which is incapable
of forwarding multicast. Is it possible to install a cluster in this situation?
What could be a reason why synchronization between primary and secondary Security Management Servers does not
What could be a reason why synchronization between primary and secondary Security
Management Servers does not occur?
What is the proper command for importing users into the R77 User Database?
What is the proper command for importing users into the R77 User Database?
Select the BEST response for the synchronization trigger.
In a R75 Management High Availability (HA) configuration, you can configure
synchronization to occur automatically, when: 1. The Security Policy is installed. 2. The
Security Policy is saved. 3. The Security Administrator logs in to the seconday Security
Management Server and changes its status to Active. 4. A scheduled event occurs. 5. The
user data base is installed. Select the BEST response for the synchronization trigger.
What is a requirement for setting up R77 Management High Availability?
What is a requirement for setting up R77 Management High Availability?
What is the problem with this configuration?
You are establishing a ClusterXL environment, with the following topology: VIP internal
cluster IP = 172.16.10.3; VIP external cluster IP = 192.168.10.3 Cluster Member 1: 4 NICs,
3 enableD. hme0: 192.168.10.1/24, hme1: 10.10.10.1/24, qfe2: 172.16.10.1/24 Cluster
Member 2: 5 NICs, 3 enabled; hme3: 192.168.10.2/24, hme1: 10.10.10.2/24, hme2:
172.16.10.2/24 External interfaces 192.168.10.1 and 192.168.10.2 connect to a VLAN
switch. The upstream router connects to the same VLAN switch. Internal interfaces
172.16.10.1 and 172.16.10.2 connect to a hub. 10.10.10.0 is the synchronization network.
The Security Management Server is located on the internal network with IP 172.16.10.3.
What is the problem with this configuration?