Use static, pre-shared keys or TLS-based dynamic key exchange,.Choose between static-key based conventional encryption or certificate-based public key encryption,.Use any cipher, key size, or HMAC digest (for datagram integrity checking) supported by the OpenSSL library,.Use all of the encryption, authentication, and certification features of the OpenSSL library to protect your private network traffic as it transits the internet,.Tunnel any IP subnetwork or virtual ethernet adapter over a single UDP or TCP port, configure a scalable, load-balanced VPN server farm using one or more machines which can handle thousands of dynamic connections from incoming VPN clients,.The community version of the software is developed openly and transparently in community-driven fashion. is committed to both OpenVPN 圆4 community edition and access server edition and is working on a full range of services and products to meet your specific needs. OpenVPN 圆4 provides an extensible VPN framework which has been designed to facilitate site-concrete customization, such as providing the capability to distribute a customized installation package to clients, or fortifying alternative authentication methods via OpenVPN's plugin module interface. OpenVPN is not a web application proxy and does not operate through a web browser. OpenVPN 圆4 implements OSI layer 2 or 3 secure network extension using the SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface. The OpenVPN 圆4 security model is based on SSL, the industry standard for secure communications via the internet. OpenVPN's 圆4 lightweight design sheds many of the complexities that characterize other VPN implementations. OpenVPN 圆4 is not a web application proxy and does not operate through a web browser. OpenVPN 圆4 implements OSI layer 2 or 3 secure network extension utilizing the SSL/TLS protocol, fortifies flexible client authentication methods predicated on certificates, perspicacious cards, and/or 2-factor authentication, and sanctions user or group-concrete access control policies utilizing firewall rules applied to the VPN virtual interface.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |