All traffic is sent along the tunnel using TCP (Transmission Control Protocol) using a single server port number, ensuring that the connection stays open only for as long as is necessary and that all data is encrypted. The tunnel uses SSL (Secure Sockets Layer) and requires certificates at either end of the connection to verify the identity of each participant. See below for details on certificate management.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |