This chapter describes some situations that may affect your cluster security.
In This Section
Security Considerations
Securing Server Communication in Clusters
Cluster Discovery Methods
Parallels Cloud Storage Ports
Password-based Authentication
Installations via PXE Servers