From a single youth to ridicule the festival to the Electric Business Carnival day, Singles Day has become the hottest topic of the network, it seems that everyone is ready in the Singles Day on the Internet carnival. But deeply convinced that, silently in the network to work the management equipment can also be deployed only one, so that an Internet behavior management, an application delivery, a next-generation firewall can be in the Singles Day also with the same day network traffic like ' Carnival some '?
▲
Although theoretically can, but, this has-wind-risk!
Single Network device unsafe
When a single network device runs for a certain period of time, it is possible to encounter some of the risks, such as the line of aging caused by network interruption, equipment power outages, there are a number of unexpected failures, etc., it is easy to become a single point of failure, affecting the smooth network or the core business system interruption.
So single network equipment is often very easy to be nervous and fearful.
Network equipment to "strip"
In order to make the network more reliable, in principle not only requires the equipment to have excellent stability and a shorter average failure time (MTBF), but also need to carry out redundant backup of important core equipment, to avoid a single device failure caused network interruption and runaway risk.
For example, in the practical applications of many large users, it is generally believed that the deployment of online behavior management is the following deployment methods to ensure a more stable and secure network.
▲
Loyal dual-machine deployment requires a heartbeat line:
Dual-machine deployment requires a heartbeat line to do the connection, that is, a host is responsible for the flow of traffic processing, another is usually not to deal with the flow of standby, when the host unexpected situation, standby opportunities to quickly replace the host to deal with the network business, to avoid network interruption or out of control.
But the loyalty of two machines to love is very high, the same hardware platform, software version, interface, and so on, the deployment mode is also high, so the deployment of the user is very small.
Flexible multi-machine deployments require "middleman":
Multi-machine deployments are more flexible and require only the same version of the software. Two deeply convincing Internet behavior management (AC) can work simultaneously to handle traffic and to backup each other. At the same time, the interaction between the multiple computer information can be through the intranet two-tier equipment or multiple-machine line to achieve information interaction. When there is a problem with a device, the other one can immediately take over seamlessly to ensure the network can be controlled.
So deploying two or more sets of network management devices in the network can make the network more secure and stable, and ensure the high reliability of the network. Scenario requirements for multiple-machine deployments, deeply convinced that a variety of network security and optimization products launched the "dual-machine 1+1 preferential activities", so that more users can discount purchase, such as strong online behavior management products (AC), load Balancing Products (AD), Next-generation firewall (NGAF), VPN and other products:
• SSL VPN Asymmetric cluster deployment can improve the reliability of mobile terminal access and achieve smooth expansion of performance;
L The cluster solution for the maximum 16 devices of the application delivery product (AD) can meet the high performance and reliability requirements of the various application system servers;
The Next Generation Firewall (NGAF) can realize the millisecond of dual-machine deployment switch, improve the data center, Internet exports and other security boundary scenarios of the reliability.