Previous Topic: Estimate a Peak Request RateNext Topic: Security Zones


Configuration Considerations

This section contains the following topics:

Security Zones

Multiple Data Centers

Authentication and a Centralized Login Server