• How are you planning on enforcing the encryption for the connection? I ask because if you are using FIPS I would test it out because you can break application functionality if something depends on non-FIPS validated algorithms.

    Joie Andrew
    "Since 1982"