摘要:
A network device includes a group of interfaces. Each interface is associated with at least one other interface of the group of interfaces and a group of network addresses. Each interface is configured to monitor at least one of the group of network addresses with which the each interface is associated or the at least one other interface with which the each interface is associated, and determine whether to logically shut down based on the monitoring.
摘要:
A system and method for a network security system are provided. The method includes providing a master device and a backup device within a cluster of network security devices, providing the backup device with state information for the master device, detecting failure in the cluster and using the state information to recover from the failure.
摘要:
A backup device detects that a session timer associated with a session in a session table of the backup network device has expired and ages out the session from the session table based on whether a first message has been sent to a master network device regarding the session and whether a second message has been received from the master network device regarding the session.
摘要:
A system includes a first network device and a second network device. The first network device includes a group of first logical portions and is configured to detect a problem with one of the first logical portions, and transmit a message identifying the one first logical portion. The second network device includes a group of second logical portions, where the group of second logical portions corresponds to the group of first logical portions. The second network device is configured to receive the message from the first network device, and activate the one second logical portion corresponding to the one first logical portion in response to receiving the message.
摘要:
A system includes a first network device and a second network device. The first network device includes a group of first logical portions and is configured to detect a problem with one of the first logical portions, and transmit a message identifying the one first logical portion. The second network device includes a group of second logical portions, where the group of second logical portions corresponds to the group of first logical portions. The second network device is configured to receive the message from the first network device, and activate the one second logical portion corresponding to the one first logical portion in response to receiving the message.
摘要:
A system protects database operations performed on a shared resource. The system may chunk memory to form a set of memory chunks which have memory blocks, at least some of the memory blocks including database objects. The system may configure at least one binary search tree using the memory chunks as nodes and buffer a set of pointers corresponding to the memory blocks. The system may further validate the buffered pointers and dereference validated buffered pointers.
摘要:
A network device includes a group of interfaces. Each interface is associated with at least one other interface of the group of interfaces and a group of network addresses. Each interface is configured to monitor at least one of the group of network addresses with which the each interface is associated or the at least one other interface with which the each interface is associated, and determine whether to logically shut down based on the monitoring.
摘要:
A system protects database operations performed on a shared resource. The system may chunk memory to form a set of memory chunks which have memory blocks, at least some of the memory blocks including database objects. The system may configure at least one binary search tree using the memory chunks as nodes and buffer a set of pointers corresponding to the memory blocks. The system may further validate the buffered pointers and dereference validated buffered pointers.
摘要:
Techniques are described for managing failover in redundant network devices. In particular, each device in a set of redundant network devices includes redundant processing modules. Each module provides a separate operating environment for a set of network services. Each network device includes a control unit that receives configuration information that specifies individual weight values for each of the modules and a threshold value for the network device. The control unit detects failures of the modules and transfers primary responsibility for performing the network service to a second network device when the threshold value is exceeded by a weighted sum of the weight values for the failed modules.
摘要:
Techniques are described for managing failover in redundant network devices. In particular, each device in a set of redundant network devices includes redundant processing modules. Each module provides a separate operating environment for a set of network services. Each network device includes a control unit that receives configuration information that specifies individual weight values for each of the modules and a threshold value for the network device. The control unit detects failures of the modules and transfers primary responsibility for performing the network service to a second network device when the threshold value is exceeded by a weighted sum of the weight values for the failed modules.