tag:blogger.com,1999:blog-3991004594884305625.post5911988989463904710..comments2023-11-28T23:42:25.873-08:00Comments on Satcom Guru: Aviation Data Link - Security, Segmentation, QoSPeter Lemmehttp://www.blogger.com/profile/16409315777756590084noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-3991004594884305625.post-64043603521564739802018-11-27T11:24:41.815-08:002018-11-27T11:24:41.815-08:00Just admiring your work and wondering how you mana...Just admiring your work and wondering how you managed this blog so well. It’s so remarkable that I can't afford to not go through this valuable information whenever I surf the internet! <a href="https://www.lesmeilleursvpn.com/guide-vpn-faq/acceder-aux-sites-bloques/meilleur-vpn-pour-netflix/" rel="nofollow">lesmeilleursvpn</a><br />Jims lindahttps://www.blogger.com/profile/07385507354598354902noreply@blogger.comtag:blogger.com,1999:blog-3991004594884305625.post-9959223678375800242016-06-19T08:37:48.374-07:002016-06-19T08:37:48.374-07:00The air-side 848 instance establishes each IPSec t...The air-side 848 instance establishes each IPSec tunnel upon air-side application connection establishment to peer on ground. The path is pre-programmed in the air-side 848 instance, including expected authentication of IPSec termination. This work is still in progress.Peter Lemmehttps://www.blogger.com/profile/16409315777756590084noreply@blogger.comtag:blogger.com,1999:blog-3991004594884305625.post-25968023708575208222016-06-19T08:11:26.078-07:002016-06-19T08:11:26.078-07:00Can you explain how the ipsec tunnels would be set...Can you explain how the ipsec tunnels would be set up.Anonymoushttps://www.blogger.com/profile/08605258353945863464noreply@blogger.comtag:blogger.com,1999:blog-3991004594884305625.post-64204351449139532882016-06-19T08:10:24.908-07:002016-06-19T08:10:24.908-07:00Great article Peter.
Bragi/IcelandairGreat article Peter.<br />Bragi/IcelandairAnonymoushttps://www.blogger.com/profile/08605258353945863464noreply@blogger.com