Navigation

  • index
  • next |
  • Vortex Link 3.0.1 documentation »

Vortex Link User GuideΒΆ

  • 1. What is Vortex Link ?
  • 2. How do Vortex Link works?
    • 2.1. Discovery
    • 2.2. Routing
  • 3. How to deploy and configure Vortex Link?
    • 3.1. Device-to-Device & Device-to-Link
    • 3.2. LAN to LAN
    • 3.3. Indirect LAN to LAN
  • 4. The Vortex Link service
    • 4.1. Vortex Link capabilities
    • 4.2. Running a Vortex Link service
    • 4.3. Configuring the Vortex Link service
    • 4.4. Vortex Link service configuration properties
    • 4.5. Files locations
    • 4.6. Vortex Link service advanced configuration
  • 5. Selective Routing
    • 5.1. Specific case of Vortex Link as an intermediate routing point
  • 6. DDS-Security
    • 6.1. Limitations
  • 7. Boundary Security
    • 7.1. The Concept
    • 7.2. Authentication and Cryptography Configuration
    • 7.3. Access-Control Configuration
    • 7.4. Limitations
    • 7.5. Example
  • 8. Load balancing & Fault tolerance
    • 8.1. Redundancy
    • 8.2. Clusters & Cluster ID
    • 8.3. Load balancing plugins
    • 8.4. Fault tolerance
  • 9. Logging
  • 10. Locators
    • 10.1. Locators & locator list
    • 10.2. Locators group
  • 11. Detailed Examples
    • 11.1. Device to Device
    • 11.2. Device to Device & Device to Link
    • 11.3. LAN to LAN (I can deploy on my Firewall/NAT)
    • 11.4. LAN to LAN (I can’t deploy on my Firewall/NAT but can configure it)
    • 11.5. Indirect LAN to LAN (I can’t deploy on my Firewall/NAT and can’t configure it)
    • 11.6. LAN to LAN + Internet devices (no cloud)
    • 11.7. LAN to LAN + Internet devices (with public cloud)
  • 12. The Command Line Tool
    • 12.1. Commands
    • 12.2. Examples
  • 13. Troubleshooting
  • 14. Contacts & Notices
    • 14.1. Contacts
    • 14.2. Notices

Logo

Next topic

1. What is Vortex Link ?

This Page

  • Show Source

Quick search

Navigation

  • index
  • next |
  • Vortex Link 3.0.1 documentation »
© Copyright 2018.