This may be implemented using SSL, or SSH. Implement quick and dirty ssh tunneling to see if that's sufficient. If so, then implement internal ssh tunneling
Log in to post a comment.