Authentication and Encryption Among Cluster Managers
To secure communications among cluster manager, you can require transport layer security (TLS) connections among the nodes in a SafeLinx Server cluster.
To support VPN access from SafeLinx Clients, you can group multiple SafeLinx Server nodes in a cluster. On each node, a cluster manager component communicates with other nodes to manage client traffic. By default, communication among nodes occurs over unsecured connections. To require that communications with other cluster managers are always secured by TLS, you must install a set of public key certificates in a key file database.
The default key database (cm.trusted.kdb) is separate from other key databases. For more information about enabling TLS communications among cluster managers, see Securing communications among SafeLinx Servers in a cluster