Common Proxylet Base
Basic application-independent needs
- Loading, authentication, topology discovery, configuration, management
Policy-related components
- Loading, interpretation, enforcement
Security-related components
- Signing, authentication, encryption/decryption, ike or Key distribution