VPN facing new challenges
Your network is constantly evolving as you integrate more business applications and consolidate servers. In that environment, it’s therefore becoming extremely complex to maintain total security at the network’s edge while users (employees or subcontractors either at home, the office or on the go) are working with customers and partners. They need to have access to the company’s applications and servers quickly, easily and securely.
Presenting TheGreenBow
IPSec VPN Client
TheGreenBow IPSec VPN Client is an on demand
IPSec VPN Client, compliant with most popular VPN gateways and with network tools to deploy security in large and medium enterprises. Highly efficient and easy to configure, the
IPSec VPN Client also allows peer-to-peer VPN.
Tunneling Protocol
Tunneling Protocol with full IKE support. Our IKE implementation is based on the OpenBSD 3.1 implementation (ISAKMPD), thus providing best compatibility with existing IPSec routers and gateways. Full IPSec support:
* Main mode and Aggressive mode
* MD5 and SHA hash algorithms
NAT-Traversal
NAT-Traversal support of Draft 1 (enhanced), Draft 2 and 3 (full implementation), IP address emulation, including:
* NAT_OA support (floating port for IKE exchange)
* NAT keepalive
* NAT-T in aggressive mode
* Forced NAT-T
NAT-Traversal may be forced from the
IPSec VPN Client. This functionnality is especially useful to solve issues with intermediate NAT boxes.
IP Encapsulating Security
IP Encapsulating Security: mode tunnel & transport. Multi-tunneling to several VPN Gateways. Allows ‘IPSec only’ trafic filtering, can block all other connections than the VPN connections. Accepts incoming IPSec Tunnels.
Strong encryption
Strong IPSec encryption provided by:
* DES, 3DES 192 bits
* AES 256, AES 512 bits
* RSA 2048
Strong User Authentication
Strong User Authentication provided by:
* PreShared keying
* X-Auth
* USB Token and SmartCard
* X509 Certificates. Flexible Certificate format (PEM, PKCS12, …) on various media (USB, smartcard, tokens)
* Hybrid mode is a specific authentication method used within IKE. Phase 1. This method assume an asymmetry between the authenticating entities.
* Keying group: Support of Diffie-Hellman Group1, 2, 5 and 14 (i.e. 1536 and 2048)
Download
File TheGreenBow96582_vietproblog.com.rar, size 3.15 MB
http://www.mediafire.com/?0dcddypm71m
Or
0 comments:
Post a Comment