SENA Serial_IPTM Redirector 4.3 User Manual

Page 49

Advertising
background image

COM/IP Redirector

Secure the data stream
in the connection to any
TCP/IP network peer

Check identity of any
TCP/IP connection peer
when initiating a
connection

Provide private key and
prove identity when
receiving a connection

DialOut/IP, DialOut/EZ,
and Serial/IP Redirectors

Secure the data stream
between the user PC
and the modem server
or serial server

Check the identify of the
modem server or serial
server

Prove identity by
supplying own certificate
on demand

DialOut/Server
modem server

Check the identity of a
user PC requesting a
connection

Provide private key and
prove identity when
receiving a connection

FAQ's

What implementation of SSL/TLS is used?

Security features are implemented with the OpenSSL toolkit 0.9.7b, an implementation of SSL/TLS that has an
excellent track record for quality, reliability, and performance.

Why is encryption provided with SSL/TLS instead of SSH?

Tactical Software currently supports SSL/TLS instead of SSH for several reasons. First, widely available
SSL/TLS accelerators can be used as a transparent front-end for devices and applications that do not themselves
support encryption. Second, as a Secure SHell, SSH has login-related functions that are not usually needed or
desired by many Tactical customers. Third, SSH is a tunneling protocol that is potentially less secure because
another application could use the SSH connection for unintended purposes.

Advertising