Secure firewall traversal Support for user Datagram Protocol as well as Transmission Control Protocol applications |
Support for a range of authentication, encryption, tunneling and key management schemes |
Extremely flexible access controls Unified and coherent policy management |