SENA Serial_IPTM Redirector 4.3 User Manual
Page 49

COM/IP Redirector
Secure the data stream
in the connection to any
TCP/IP network peer
Check identity of any
TCP/IP connection peer
when initiating a
connection
Provide private key and
prove identity when
receiving a connection
DialOut/IP, DialOut/EZ,
and Serial/IP Redirectors
Secure the data stream
between the user PC
and the modem server
or serial server
Check the identify of the
modem server or serial
server
Prove identity by
supplying own certificate
on demand
DialOut/Server
modem server
Check the identity of a
user PC requesting a
connection
Provide private key and
prove identity when
receiving a connection
FAQ's
What implementation of SSL/TLS is used?
Security features are implemented with the OpenSSL toolkit 0.9.7b, an implementation of SSL/TLS that has an
excellent track record for quality, reliability, and performance.
Why is encryption provided with SSL/TLS instead of SSH?
Tactical Software currently supports SSL/TLS instead of SSH for several reasons. First, widely available
SSL/TLS accelerators can be used as a transparent front-end for devices and applications that do not themselves
support encryption. Second, as a Secure SHell, SSH has login-related functions that are not usually needed or
desired by many Tactical customers. Third, SSH is a tunneling protocol that is potentially less secure because
another application could use the SSH connection for unintended purposes.