NSRP (NetScreen Redundancy Protocol)

To function properly as a network firewall, a security device must be placed at the single point through which all interzone traffic must pass. When a single device is responsible for handling all interzone traffic, it becomes vital that the traffic flow remain uninterrupted, even in the event of a device or network failure.

To ensure a continuous traffic flow, you can cable and configure two security devices in a redundant cluster, with one device acting as a master and the other as its backup. The master propagates all its network and configuration settings and the current session information to the backup. Should the master fail, the backup is promoted to master and takes over the traffic processing.

There are two types of configuration for device redundancy:

Configuring an NSRP Cluster

Before two security devices can provide redundant network connectivity, you must group them in the same NSRP cluster.

To Configure your Security Device in a Redundant Cluster

  1. Enter the necessary information:

Cluster ID: Enter a cluster ID between 1 and 7. After the security devices are members of the same cluster, you can configure them as members of the same VSD group within that cluster.

Not in Cluster: Select this option if you want to remove the device from an NSRP cluster.

Local Unit: (Read-only) Indicates the ID number of the local device.

Active Units Discovered: (Read-only) Indicates the ID number of each active unit in the same NSRP cluster.

Number of Gratuitous ARPs to Resend: Enter the number of ARP broadcasts for notifying surrounding network devices of the MAC address of a new master following a failover. The default is  4.

NSRP Authentication Password: Enter a password for creating an authentication key to secure NSRP communications.

NSRP Encryption Password: Enter a password for creating an encryption key to secure NSRP communications.

Note: If the security devices in an NSRP cluster are cabled directly to each other, authenticating and encrypting the NSRP communications passed between them is unnecessary. On the other hand, if the HA links pass through a switch to which other network devices also connect, then these options increase the security of such communications.

  1. Click Apply to save your configuration.