Nebero High Availability Cluster

Utilized in certain organizational networks that regularly encounter 3,000 or more online users, the Nebero cluster has been perfected to benefit a wide range of different enterprises. With multiple implementations done at different points within Layer 3 of your network, Nebero Systems is able to provide a centralized authentication process and management console in order to prevent single point failure. This is extremely important when it comes to dealing with high levels of Internet traffic and user exposure.

Group of two Nebero deployments implemented to work as a single entity. Every HA Cluster has one Primary Appliance and one Auxiliary Appliance. The Primary Appliance controls how the cluster operates. The roles that the primary and auxiliary appliances play in the cluster depend on the configuration mode.

Nebero HA Modes

Active-Active: Configuration of HA cluster which consists of a primary unit and one or more auxiliary units. In this mode, both primary unit and auxiliary unit process traffic while primary unit is in charge of balancing the traffic. The primary unit takes decision of load balancing. Auxiliary unit can take over in case of a primary unit failure.

Active-Passive: A configuration of HA cluster which consists of a primary appliance and an auxiliary appliance. In this mode, only the primary appliance processes traffic while auxiliary appliance remains in stand- by mode, ready to take over if a primary appliance failure occurs.

How HA Cluster Works

Nebero offers high availability by using Virtual MAC address shared between a primary appliance and an auxiliary appliance linked together as a “cluster”. Appliances - primary and auxiliary appliance, are physically connected over a dedicated HA link.

Typically, traffic enters your network by passing through a network switch. In an HA solution, one of the appliance in the cluster has a Virtual MAC address and traffic is forwarded to the cluster appliance which has the virtual MAC address. The appliance which has virtual MAC address is the Primary Appliance and other peer is Auxiliary Appliance. Primary Appliance acts as a load balancer and forwards the traffic to the Auxiliary Appliance for processing. Auxiliary Appliance can process traffic only if cluster is operating in the Active-Active mode. If configured in Active-Passive mode, primary appliance processes the entire traffic Auxiliary Appliance waits in a ready mode to operate as the primary appliance, in case primary appliance or any of the monitored links fail.

Auxiliary Appliance monitors the primary appliance through the dedicated HA link and if it does not receive any communication within the pre-configured time, the primary appliance is considered to have failed. In this case, Auxiliary appliance takes ownership of the virtual MAC address from primary appliance, and becomes primary appliance temporarily. Primary appliance automatically takes over from the Auxiliary appliance once it starts functioning.

Nebero Cluster Advantages

By offering our exclusive cluster solution, your enterprise is able to benefit from a variety of different critical network components. Regardless of the specific industry that you operate in, whether you have an automobile, healthcare or hotel enterprise, Nebero Systems is now able to provide more uptime than ever before. In order to ensure that your organization never experiences unwanted downtime, we are here to optimize your installations through 3 separate layers.

Some of the biggest advantages that our cluster solution provides include:

  • Network deployments that encounter more than 3,000 different users
  • Maximized uptime
  • Centralized authentication in order to avoid single point failure
  • High availability with limited user downtime
  • Layer 3 installation to provide efficient management

Through a distributed deployment environment with high availability, our unique cluster solution is able to provide maximum uptime regardless of the specific time of day. In order to offer your enterprise specialized network deployment and authentication, we have reinvented this one of a kind solution. Now, network downtime will be virtually nonexistent, allowing for maximized efforts and optimal production.

Posted on February 18, 2015 at 4:30 pm

No comments

Categories: Unified Threat Management

The comments are closed.