Configuring CC-SG Clusters

A CC-SG cluster uses two CC-SG nodes, one Primary node and one Secondary node, for backup security in case of Primary node failure. Both nodes share common data for active users and active connections, and all status data is replicated between the two nodes.

Devices in a CC-SG cluster must be aware of the IP of the Primary CC-SG node in order to be able to notify the Primary node of status change events. If the Primary node fails, the Secondary node immediately assumes all Primary node functionality. This requires initialization of the CC-SG application and user sessions and all existing sessions originating on the Primary CC-SG node will terminate. The devices connected to the Primary node will recognize that the Primary node is not responding and will respond to requests initiated by the Secondary node.

Note: When accessing CC-SG using the thick client, you will not be redirected to the backup node automatically if the primary node fails. You must enter the IP address of the backup node manually for thick client access.

In This Section

Requirements for CC-SG Clusters

Access a CC-SG Cluster

Create a Cluster

Remove Secondary CC-SG Node

Configure Cluster Settings

Switch the Primary and Secondary Node Status

Recover a Cluster

Delete a Cluster

Upgrade a Cluster

Cluster Licenses

See Also

Advanced Administration

Configuring a Message of the Day

Configuring Applications for Accessing Nodes

Configuring Default Applications

Managing Device Firmware

Configuring the CC-SG Network

Configuring Logging Activity

Configuring the CC-SG Server Time and Date

Connection Modes: Direct and Proxy

Device Settings

Configuring Custom JRE Settings

Configuring SNMP

Configuring a Neighborhood

Security Manager

Notification Manager

Task Manager

SSH Access to CC-SG

Serial Admin Port

Finding the Serial Number

Web Services API

CC-NOC