Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
valterj
Contributor
Jump to solution

SecureXL Forward to Virtual Machine

Hi, all.

Anyone could me explain how F2V works? In which cases should I use? I can't find this detailed information on SecureXL documentation. 

Regards. 

Valter Junior

0 Kudos
1 Solution

Accepted Solutions
Timothy_Hall
Legend Legend
Legend

You are correct that the F2V path that was introduced in R80.20 is not really documented.  I had to chat with R&D to figure out what it was when I was researching my third book, and here is the result:

f2v.png

Attend my online "Be your Own TAC: Part Deux" CheckMates event
March 27th with editions for both the EMEA and Americas time zones

View solution in original post

(1)
2 Replies
Chris_Atkinson
Employee Employee
Employee

You don't choose to use the F2V path, this is a somewhat dynamic path in R80.20+ used as we decide or reevaluate if a connection should be accelerated.

CCSM R77/R80/ELITE
0 Kudos
Timothy_Hall
Legend Legend
Legend

You are correct that the F2V path that was introduced in R80.20 is not really documented.  I had to chat with R&D to figure out what it was when I was researching my third book, and here is the result:

f2v.png

Attend my online "Be your Own TAC: Part Deux" CheckMates event
March 27th with editions for both the EMEA and Americas time zones
(1)

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events