Table of Contents

Search

  1. Preface
  2. Introduction
  3. Dashboard
  4. Resources
  5. Workflows
  6. Task Reference
  7. Services Overview
  8. Users
  9. Logs and Reports
  10. Encryption
  11. System
  12. Appendix
  13. Glossary Terms

Exchanging Data

Exchanging Data

After the encryption method is established (in the Transport Layer) and authentication is completed (in the Authentication Layer), then Client and the Server can begin to exchange data over the encrypted tunnel.

0 COMMENTS

We’d like to hear from you!