Use real-time adaptive link compression and traffic-shaping to manage link bandwidth utilization.Use static, pre-shared keys or TLS-based dynamic key exchange.Choose between static-key based conventional encryption or certificate-based public-key encryption.Use any cipher, key size, or HMAC digest (for datagram integrity checking) supported by the OpenSSL library.Use all of the encryption, authentication, and certification features of the OpenSSL library to protect your private network traffic as it transits the internet. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |