Hello everybody, As part of our distance learning project, we need in-depth technical information about security mechanisms and multicast allocation in the AG. Are there any documents or papers about this? The team will be doing low-level implementation, so we need hard-core documentation for techies :o) Thanks, Dio.-