Cluster configuration rules

When you are configuring a cluster of Security Access Manager appliances, consider the following rules that govern cluster configuration.

General notes: