Key Features
Transfer files between network nodes Remote command execution Automatic nodes software update
Cryptographic protection of traffic Access restriction based on digital signature mechanism