![]() IKE Authentication : Pre-shared Key and X.Authentication : Hardware-Based MD5 and SHA-1.Encryption : MPPE and Hardware-Based AES / DES / 3DES.Tunnelling Protocols: PPTP, IPSec, L2TP, L2TP over IPSec.Up to 32 Concurrent VPN Tunnels (incoming or outgoing).CLI ( Command Line Interface ) / Telnet / SSH*.Web-Based User Interface (HTTP / HTTPS) Wrathful Vigor, Ghost Warrior Attack 17 You strike fear into the hearts of your enemies, and you draw upon that power to bolster your defences Encounter Star.Temporary (5 minute) Quick Blocking of any LAN Client.4-level Priority for each Direction (Inbound / Outbound).Class-based Bandwidth Guarantee by User-Defined Traffic Categories. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |