How are you planning on enforcing the encryption for the connection? I ask because if you are using FIPS I would test it out because you can break application functionality if something depends on non-FIPS validated algorithms.
Joie Andrew
"Since 1982"