![]() ![]() ![]() Tunnel networks whose public endpoints are dynamic such as DHCP or dial-in clients,.Use real-time adaptive link compression and traffic-shaping to manage link bandwidth utilization,.Use static, pre-shared keys or TLS-based dynamic key exchange,.Choose between static-key based conventional encryption or certificate-based public key encryption,.Use any cipher, key size, or HMAC digest (for datagram integrity checking) supported by the OpenSSL library,. ![]() Use all of the encryption, authentication, and certification features of the OpenSSL library to protect your private network traffic as it transits the internet,.Configure a scalable, load-balanced VPN server farm using one or more machines which can handle thousands of dynamic connections from incoming VPN clients,.Tunnel any IP subnetwork or virtual ethernet adapter over a single UDP or TCP port,. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |