Skip to content
This repository has been archived by the owner on Jun 15, 2023. It is now read-only.

Fixed capitalization typo, added plural #67

Closed
wants to merge 1 commit into from
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions developerguide/secure-tunneling.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
# AWS IoT secure tunneling<a name="secure-tunneling"></a>

When devices are deployed behind restricted firewalls at remote sites, you need a way to gain access to those devices for troubleshooting, configuration updates, and other operational tasks\. Use secure tunneling to establish bidirectional communication to remote devices over a secure connection that is managed by AWS IoT\. secure tunneling does not require updates to your existing inbound firewall rule, so you can keep the same security level provided by firewall rules at a remote site\.
When devices are deployed behind restricted firewalls at remote sites, you need a way to gain access to those devices for troubleshooting, configuration updates, and other operational tasks\. Use secure tunneling to establish bidirectional communication to remote devices over a secure connection that is managed by AWS IoT\. Secure tunneling does not require updates to your existing inbound firewall rules, so you can keep the same security level provided by firewall rules at a remote site\.

For example, a sensor device located at a factory that is a couple hundred miles away is having trouble measuring the factory temperature\. You can use secure tunneling to open and quickly start a session to that sensor device\. After you have identified the problem \(for example, a bad configuration file\), you can reset the file and restart the sensor device through the same session\. Compared to a more traditional troubleshooting \(for example, sending a technician to the factory to investigate the sensor device\), secure tunneling decreases incident response and recovery time and operational costs\.
For example, a sensor device located at a factory that is a couple hundred miles away is having trouble measuring the factory temperature\. You can use secure tunneling to open and quickly start a session to that sensor device\. After you have identified the problem \(for example, a bad configuration file\), you can reset the file and restart the sensor device through the same session\. Compared to a more traditional troubleshooting \(for example, sending a technician to the factory to investigate the sensor device\), secure tunneling decreases incident response and recovery time and operational costs\.
Copy link
Author

@oaustegard oaustegard Mar 24, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No changes in this paragraph, not sure why it shows a diff

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks! I'll put this in the next build.