First I introduce us the software, which is a set of office equipment management software, software piracy, binding machine computer name, MAC address, IP address! Have a separate database, the normal deployment architecture that is the case, the core server and database installed on the physical machine or virtual machine, the authorization server installed in other physical machine or virtual machine, if the core server was born function in does not affect users use to replace the host work!
CodePudding user response:
Have a virtual IP, two with keepalive try