Description

Authentication and authentication of remote users
Cryptographic protection of transmitted information
Hiding Protected Servers and Address Translation
Fault Tolerance and Scalability
Monitoring and recording of events
Convenient management tools
Supported protocols
User work through any web browser
Using a user-friendly software client