7: Network, Serial Line, and Tunnel Settings
Note:
Tunneling using AES encryption uses a non-standard protocol and shared
keys, making it not very secure. The EDS also supports SSH as an alternative
method of secure tunneling. SSH tunneling has the advantage of not using
shared keys.
Figure 7-12. Tunnel – AES Keys Page
EDS Device Servers User Guide
68
Need help?
Do you have a question about the Data Center-Grade Evolution Device Server EDS32PR and is the answer not in the manual?
Questions and answers