| http://www.w3.org/ns/prov#value | - This is in contrast to the flows for many different applications being combined and encrypted as a whole for transport over the VPN. [0110] Referring to FIG. 6, in a related approach to use of VPNs, VPN-endpoint functionality is provided outside the security layer software, for instance in a dedicated computer or integrated into a network device such as a router or a switch.
|