Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?