SonicOS 7.1 High Availability Administration Guide
- SonicOS 7.1
- About SonicOS
- High Availability
- High Availability Status
- Configuring High Availability
- Configuring High Availability in the Cloud Platform
- Set up an Active/Standby High Availability Configuration Using Azure
- Install the Custom Template
- Enable Identity of Both Virtual Machines (HA1 and HA2)
- Role Assignment
- Check the Networking Tab
- Configuring Active NSv Firewall Using the Associated Public IP
- Configuring Standby NSv Firewall Using the Associated Public IP
- Enable the L3 Mode
- Configuring Active NSv Firewall Using the Floating Public IP
- Configuring HA to Active/Standby with L3 HA link
- Adding Additional Floating Public IP
- Set up an Active/Standby High Availability Configuration Using Azure
- Fine Tuning High Availability
- Monitoring High Availability
- Azure Use Cases
- SonicWall Support
Configuring Advanced High Availability Settings
To configure advanced settings
- Log in as an administrator to the SonicOS Management Interface on the Active Node.
-
Navigate to DEVICE | High Availability > Settings.
-
Set the Probe Interval to the interval, in seconds, between probes sent to specified IP addresses to monitor that the network critical path is still reachable. This interval is used in logical monitoring for the local HA pair. The default is 20 seconds, and the allowed range is 5 to 255 seconds.
You can set the Probe IP Address(es) on DEVICE | High Availability > Advanced. See Monitoring High Availability.
- Set the Probe Count to the number of consecutive probes before SonicOS concludes that the network critical path is unavailable or the probe target is unreachable. This count is used in logical monitoring for the HA pair. The default is 3, and the allowed range is 3 to 10.
-
Set the Election Delay Time to the number of seconds the Active Security Appliance waits to consider an interface up and stable. The default is 3 seconds, the minimum is 3 seconds, and the maximum is 255 seconds.
This timer is useful with switch ports that have a spanning-tree delay set.
-
Set the Dynamic Route Hold-Down Time to the number of seconds the newly-active Security Appliance keeps the dynamic routes it had previously learned in its route table. The default value is 45 seconds, the minimum is 0 seconds, and the maximum is 1200 seconds (20 minutes).
The Dynamic Route Hold-Down Time setting is displayed only when the Advanced Routing Mode option is selected on NETWORK | System > Dynamic Routing > Settings.
In large or complex networks, a larger value may improve network stability during a failover.
This setting is used when a failover occurs on a High Availability pair that is using either a dynamic routing protocol. During this time, the newly-active appliance relearns the dynamic routes in the network. When the Dynamic Route Hold-Down Time duration expires, SonicOS deletes the old routes and implements the new routes it has learned from routing protocols.
- If you want Failover to occur only when ALL aggregate links are down, select Active/Standby Failover only when ALL aggregate links are down. This option is not selected by default.
- To have the appliances synchronize all certificates and keys within the HA pair. select Include Certificates/Keys. This option is selected by default.
-
(Optional) To force synchronize the SonicOS preference settings between your primary and secondary HA firewalls, click Synchronize Settings.
This will cause a restart of the standby device.
- (Optional) To synchronize the firmware version between your primary and secondary HA firewalls, click Synchronize Firmware.
- (Optional) To test the HA failover functionality is working properly by attempting an Active/Standby HA failover to the secondary Security Appliance, click Force Active/Standby Failover.
- When finished with all High Availability configuration, click Accept. All settings are synchronized to the Secondary Security Appliance.
Was This Article Helpful?
Help us to improve our support portal