it is a pain when you have compunding factors like constrained bandwidth… we just use m$'s implementation of ipsec between machines… networking guys hate it because it encapsulates the traffic but oh well
it is a pain when you have compunding factors like constrained bandwidth… we just use m$'s implementation of ipsec between machines… networking guys hate it because it encapsulates the traffic but oh well