We do not negotiate keys, encrypted from first message, no diffie hellman etc. required, the keys are all available on the network PKI infrastructure. So many differences. This is a much simpler issue than the network up and running though. ATM we are multi port multi protocol encrypted and obfuscated (now there is a large area of discussion) comms. We can go from there