7: Network, Serial Line, and Tunnel Settings
EDS Device Servers User Guide 68
Note: Tunneling using AES encryption uses a non-standard protocol and shared
keys, making it not very secure. The EDS also supports SSH as an alternative
method of secure tunneling. SSH tunneling has the advantage of not using
shared keys.
Figure 7-12. Tunnel – AES Keys Page