摘要 |
The method is generally based on the idea that a sender of a communication packet places a piece of information in a certain header field of the communi-cation packet. On the basis of the said piece of information, the master of the server cluster receiving the communication packet can then determine which slave should handle the said packet. The same idea can be exploited during a security association (SA) negotiation. The SA negotiation may be per-formed using Internet Security Association and Key Management Protocol (ISAKMP) packets. When the SA is negotiated Internet Protocol security (IP-sec) packets are preferably used as communication packets.
|