Replace a Secondary Threat Defense HA Unit with no Backup
Follow the steps below to replace a failed secondary unit in the threat defense high availability pair.
Caution | Creating or breaking the threat defense high availability pair immediately restarts the Snort process on the primary and secondary devices, temporarily interrupting traffic inspection on both devices. Whether traffic drops during this interruption or passes without further inspection depends on how the target device handles traffic. See Snort Restart Traffic Behavior for more information. The system warns you that continuing to create a high availability pair restarts the Snort process on the primary and secondary devices and allows you to cancel. |
Procedure
Step 1 | Choose Force Break to separate the high availability pair; see Break a High Availability Pair.
| ||
Step 2 | Unregister the secondary threat defense device from the management center. | ||
Step 3 | Register the replacement threat defense to the management centerPrerequisites to Onboard a Device to Cloud-delivered Firewall Management Center. | ||
Step 4 | Configure high availability, using the existing primary/active unit as the primary device and the replacement device as the secondary/standby device during registration; see Add a High Availability Pair. |