10.07.2015 Views

C•CURE 800/8000 Hardware Configuration Guide - Tyco Security ...

C•CURE 800/8000 Hardware Configuration Guide - Tyco Security ...

C•CURE 800/8000 Hardware Configuration Guide - Tyco Security ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring ClustersTable 2-6: Cluster Dialog Box Fields, continuedBox Field/Button DescriptionAvailableControllers cont.Controllers in theClusterOther TabsPrimarySecondaryClusterMiscGlobal APBEncryptionAdd/Add All/Remove/Remove All buttonsClick these buttons to move controllers between theControllers in the cluster and Available Controllers boxes.For example, if you click Add All, all controllers in theAvailable Controllers box are moved to the Controllers inthis cluster box. Controllers listed in the Controllers in thiscluster box are members of the cluster.Displays a list of controllers that are assigned to the cluster. Acontroller must be assigned to a cluster for C•CURE <strong>800</strong>/<strong>800</strong>0to communicate with the controller. Use the Add or Add Allbuttons to add controllers to the cluster by moving them fromthe Available Controllers box to the Controllers in thiscluster box. Use the Remove and Remove All buttons to takecontrollers out of the cluster.This tab lets you configure the primary communications pathfor the cluster. See “Configuring the Primary CommunicationsPath” on page 2-39 for more information.This tab lets you configure the secondary communications pathfor the cluster. See “Configuring the SecondaryCommunications Path” on page 2-43 for information.This tab lets you configure communications between clustermembers and the master. See “Configuring Communicationswith the Master” on page 2-47 for information.This tab lets you configure a communications test for thesecondary communications path and the maximum number ofunacknowledged messages allowed for each controller. See“Configuring the Secondary Communications Path” onpage 2-43 for information.This tab lets you specify if the cluster enforces clusterantipassback and iSTAR Global Antipassback as well as howthe cluster handles antipassback during communicationsfailure. See “Configuring Antipassback for the Cluster” onpage 2-52 for information.This tab lets you configure encryption for the controller. See“Configuring Encryption for the Cluster” on page 2-54 forinformation.2–38 C•CURE <strong>800</strong>/<strong>800</strong>0 <strong>Hardware</strong> <strong>Configuration</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!