When the system described in the FIGS. 1-6 is initialized, the security appliances are clustered and are configured via the Ethernet cable 19, as shown, to share information, including encryption keys and system information that the administer might determine.