How does Critical Watch access the VM Server located on the internal private network?
Upon boot, the appliance makes an out-bound request to a high numbered port from your location to our network across the Internet. It establishes a secure connection to our system and creates a VPN Tunnel back to the local loop-back device of the appliance. When testing or updating, the system will use the Tunnel of this “call-back VPN” to connect to the appliance. This connection is encrypted with a unique public/private key set and it is not open to anyone else from the outside.