1 | Secure firewall traversal Support for user Datagram Protocol as well as Transmission Control Protocol applications |
2 | Support for a range of authentication, encryption, tunneling and key management schemes |
3 | Extremely flexible access controls Unified and coherent policy management |