This is the exact option we're going with. It has a couple of
bennifits.
1) Encrypted. I think the advantage here is a bit obvious.
2) Authentication: Using preshared keys or public key encryption
(we'll be using pubkey), you can actually verify the other endpoint,
and even attach authorization to that.
In other words, encryption, gives you simple mechanisms to implement
two of the three A's (Authentication; Authorization; Accounting)
On Oct 23, 11:04 am, "Dan Mayer" <
danma...@gmail.com> wrote:
> You could use ssh tunneling
>
>
http://revsys.com/writings/quicktips/ssh-tunnel.htmlhttp://en.wikipedia.org/wiki/Tunneling_protocol