Uses pre-shared keys, static, or TSL-based dynamic key exchange.Tunnels any virtual ethernet adapter or IP subnetwork over UDP or TCP port.Manages link bandwidth utilization via real-time adaptive link compression and traffic-shaping. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |