VIRTUAL PRIVATE NETWORK (VPN), CRYPTO
Provides easy configuration of components which are required for Virtual Private Networking. VPN is built according to the IPSec and IKE standarts.
May act as an e-notary and may produce and sign certificates.
Pre-shared secret key or x509 certificates are supported for indetification.
AES, DES, 3DES, BLOWFISH, CAST algorithms are supported for crypto and
MD5, SHA1-2 algorithms are used for hashing.
Tries reconnecting whenever the VPN connection is lost.
It supports other IPSEC based VPN devices.
Crypto performance can significantly be increases with hardware accelarators.
|