VPN Solutions SECURITY SOFTWARE. Product Information



Similar documents
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

Chapter 5 Virtual Private Networking Using IPsec

Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network

Guideline for setting up a functional VPN

SSL SSL VPN

Case Study for Layer 3 Authentication and Encryption

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

SSL VPN vs. IPSec VPN

ViPNet ThinClient 3.3. Deployment Guide

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

REMOTE ACCESS VPN NETWORK DIAGRAM

Cornerstones of Security

1. PRODUCT OVERVIEW PRODUCT COMPONENTS... 3

VPN. Date: 4/15/2004 By: Heena Patel

Configuring IPsec VPN with a FortiGate and a Cisco ASA

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Windows XP VPN Client Example

Understanding the Cisco VPN Client

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Table of Contents. Cisco Cisco VPN Client FAQ

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

NETASQ MIGRATING FROM V8 TO V9

How To Configure Apple ipad for Cyberoam L2TP

ISG50 Application Note Version 1.0 June, 2011

How to configure VPN function on TP-LINK Routers

Managing Remote Access

How To Set Up A Net Integration Firewall

ViPNet ThinClient 3.3. Quick Start

Chapter 6 Virtual Private Networking

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Gigabit Multi-Homing VPN Security Router

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Chapter 8 Virtual Private Networking

The BANDIT Products in Virtual Private Networks

Virtual Private Network and Remote Access Setup

User Manual. Page 2 of 38

How To Install Sedar On A Workstation

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Monitoring Remote Access VPN Services

Special Edition for Loadbalancer.org GmbH

Virtual Private Networks

How To Industrial Networking

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Configuring a VPN for Dynamic IP Address Connections

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

VPN. VPN For BIPAC 741/743GE

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

Setting up D-Link VPN Client to VPN Routers

Chapter 4 Customizing Your Network Settings

Chapter 4 Virtual Private Networking

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

StoneGate Installation Guide

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 9 Monitoring System Performance

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Network Security. Protective and Dependable. Pioneer of IP Innovation

Proof of Concept Guide

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA USA. November v1.0

VPN Tracker for Mac OS X

How to configure VPN function on TP-LINK Routers

Secure remote access to your applications and data. Secure Application Access

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Netopia TheGreenBow IPSec VPN Client. Configuration Guide.

Chapter 4 Firewall Protection and Content Filtering

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

TABLE OF CONTENTS NETWORK SECURITY 2...1

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

QoS VPN Router.

VPN Configuration Guide LANCOM

Security Policy Revision Date: 23 April 2009

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

Technical White Paper BlackBerry Enterprise Server

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Gigabit Multi-Homing VPN Security Router

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Chapter 5. Data Communication And Internet Technology

VPN Wizard Default Settings and General Information

Apliware firewall. TheGreenBow IPSec VPN Client. Configuration Guide.

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Step-by-Step Configuration

WAN Traffic Management with PowerLink Pro100

LinkProof And VPN Load Balancing

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Broadband Firewall Router with 4-Port Switch/VPN Endpoint

Using a VPN with Niagara Systems. v0.3 6, July 2013

Technical papers Virtual private networks

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

Gigabit SSL VPN Security Router

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition

Transcription:

VPN Solutions SECURITY SOFTWARE Product Information

A new approach to VPN solution INFOTECS VPN solutions under the ViPNet brand have many technologic distinguishing features, which set them apart from the classic VPN products. That is why ViPNet is a good alternative to the SSL and IPSec standards concerning financial and security aspects. ViPNet brand means both security and quality. In addition it has its own Key management, which is based on combination of symmetric keys (preshared keys) infrastructure and PKI. Both processes are implemented simultaneously, which mutually offsets the disadvantages of one technology with the advantages of the other. ViPNet is a pure software solution. This circumstance allows integration of ViPNet in different network structures, which are based on the Internet Protocol (IP). It is not necessary to adjust network structure to ViPNet VPN or interrupt the network functioning process during the VPN implementation. In SMEs ViPNet can be used as a major and only security measure for network protection, since it includes all known security services. In the large enterprises, where usually corresponding security mechanisms are used, ViPNet can become an additional virtual layer of security system. It works independently from other security mechanisms such as the proprietary security tools of the operating system (user name and password) and does not interfere with other software or hardware solutions (Firewalls, Routers, Proxys etc.) which were implemented previously. ViPNet technology supports all types of Internet connections or Internet providers, putting Client-to-Client connections on the first place. It provides very flexible VPN scenarios for the mobile users, and allows separating highly secured sections inside the one single local network. Besides the VPN functionality, the end user receives additional security mechanisms such as an Integrated Firewall for the local sensible data protection, because the security of the private network is determined by the security of its components - devices on which Client or Server software runs. The software is very easy to install and it does not require any intimate knowledge from the user s side. The ViPNet driver processes the entire TCP/IP traffic and blocks it in case of necessity. Software has preconfigured security settings, which exclude the dangerous mistakes while software setup. The integrated communication applications make the day to day work more secure and the user in each situation more mobile.

ViPNet: Custom-build solution for every situation AT A GLANCE: Encrypted communication via Internet Unique Client-to-Client Technology Protected e-business Mobility instrument for your workers VPN Client with integrated Firewall and IDS-System Safe access to Company s resources (CRM, CMS, ERP, Intranet etc.) No investments in expensive hardware Easy and quick adjustment to existing network structure Spam free and digitally signed correspondence Protected IP-telephony, chat, videoconference Unlimited scalability Unique technology which provides much more security than any other VPN solution No high-priced management Outstanding price/capacity correlation ViPNet CUSTOM is a flagship of the Infotecs Company. It is a configurable system, which can be customized to meet every end user s requirements. With ViPNet CUSTOM, you get all you need for setting up a VPN with unlimited scalability for fulfilling e-business tasks with a single CA (Certification Authority). This solution suits best large public and commercial organizations. It includes the following software modules: ViPNet Administrator, ViPNet Coordinator, ViPNet Client ViPNet OFFICE is our VPN solution for small and medium size enterprises (SME): this software package is used for building a VPN structure of any scope uncomplicated and very fast without sacrificing any network performance. It includes the following software modules: ViPNet Manager, ViPNet Coordinator, ViPNet Client ViPNet TUNNEL is designed for making protected connections between offices or LANs. The product is used when there is no necessity of access control inside each of the LANs, which are included in the VPN. It corresponds the classic Tunnel solutions. It includes the following software modules: ViPNet Manager, ViPNet Coordinator ViPNet MVS (Managed ViPNet Service) VPN on loan, rent-a- VPN: it is a business model for all IT Service Providers including ISPs and ASPs. This service allows end users to enjoy for the reasonable price what only large enterprises with intensive capital investments can afford. All the VPN solutions offered by Infotecs Company can be configured and customized according to each end user s needs and requirements. If a will to extend the existing network structure emerges (to increase the number of Servers, Clients or IP-Tunnels) it can be easily done with ViPNet product licensing procedure.

ViPNet OFFICE The main concept of ViPNet OFFICE is a distant but completely secure information exchange between two endpoints (for example, between two VPN-Clients also located inside the same LAN, or between a mobile notebook and server, or between Gateways located in different LANs, etc.). This security is provided on the very low network level, which is impossible to accomplish with SSL, while IPSec is very complicated and expensive in case of a client-to-client interaction so the most VPN vendors do not provide this opportunity. Each ViPNet OFFICE package includes the three software modules: ViPNet Manager, ViPNet Coordinator and ViPNet Client. The installation of ViPNet software module links the computer to ViPNet VPN. ViPNet Manager is a software utility, which enables you to create and configure the ViPNet VPN logical structure (to assign the necessary amount of Coordinators and Clients and define the relationship between them). This module also serves the key sets and passwords generation for the installation of ViPNet Coordinators and Clients and their proper functioning. ViPNet Manager contains the Build ViPNet VPN wizard. It guides you through the building process of ViPNet network structure gradually. With this wizard, you can establish a highly secure network even without an intimate knowledge of network administration. ViPNet Coordinator acts as a VPN Gateway and has various functions such as being an IP Address-, Proxy-, Tunnel-Server, a corporate firewall or Mail-Server for the integrated ViPNet Mail system. A computer with ViPNet Coordinator installed on it is a communication center of the ViPNet VPN, which ensures its functionality. A ViPNet network needs at least one ViPNet Coordinator. It can be installed on Mail-, Web-, File-, DB-Server etc., as well as on a regular workstation. It is recommended to install it on a computer, which has a static IP address or DNS name, which could be reached by all the other network nodes. All the network nodes regularly send their relevant IP information to the Coordinator, which in turn distributes information between all the network nodes in VPN. That ensures all VPN participants establish client-to-client connections and communicate directly. ViPNet Client is end-user software, which includes the following services: data flow encryption, personal firewall, control over applications network activity, secure mail-client, encrypted chat, file exchange, etc. ViPNet Client should be installed on each VPN participant s workstation. Single installation is enough for the automatic network environment recognition and security settings definition making it possible to fulfill the installation of ViPNet Client by inexperienced user without an intimate knowledge of network administration. Each ViPNet Client is provided with a clear user-friendly interface to communicate and exchange data with other VPN members. It doesn t matter whether a user is actively exploiting the communication features of ViPNet Client or if he runs the software in a background mode, the traffic, computer and the user s data will still be strongly protected. After the installation of ViPNet Client the VPN user can make no further changes however his data will be transmitted via protected channel.

Integrated E-Business Applications ViPNet Client: In contrast to other well-known VPN solutions ViPNet has integrated E-Business applications. FileExchange as well as Business Mail are integrated in Windows context menu. Thanks to this feature, sending data from any location on your PC is immensely simple. ViPNet Business Mail (Protected mail client) To send an e-mail to another ViPNet user you do not need to undergo special training. ViPNet Business Mail is configured as a classic mail client. You can also observe the status of your correspondence (sent/delivered/read). Your mail will automatically be encrypted and decrypted for you and signed with your digital signature. Each letter is numbered to ease e-mail search. ViPNet Chat (Protected instant messaging, Chat ) Thanks to this tool, you will stop using any other chat or conference with your colleagues and clients forever from a security standpoint. ViPNet Chat is used for exchanging instant short messages between ViPNet users. It is comparable to all the well known Instant Messaging Programs such as Yahoo! Messenger, ICQ, AOL Messenger, but unlike all them, the message exchange is transmitted via secure channels. ViPNet FileExchange (Protected data exchange) FileExchange is a program designed for quick, simple and safe data exchange without cover letters between ViPNet users. Thanks to that feature, any data file can be easily sent from any location on the PC. Right mouse button click on a necessary file and send file to ViPNet user menu-item becomes available

VPN on loan, rent-a-vpn MVS TARGET GROUPS: Small and medium size enterprises. Enterprises with no opportunity to build a full VPN infrastructure because of budget or personal reasons. Enterprises which wish to cut down their expenses. Enterprises which want to execute information security legal regulations. Enterprises, which still fear the Internet because of the security concerns. ViPNet MVS as a client-connecting instrument: ViPNet technology gave a completely new meaning to such notion as VPN Outsourcing: you don t only provide your clients with a perfect security service, but you also receive an instrument for establishing a long lasting collaboration with them. Not every organization can afford a detached IT department. Highqualified security specialists are rare and highly paid. To help your clients not digressing from their primary business, you can volunteer to fulfill the task of protecting their computer information. ViPNet technology makes the VPN solutions developed by Infotecs Company a perfect instrument for VPN-Outsourcing. MVS Managed ViPNet Service is the name of the service, which gives you the following benefits: Customized development, implementation and centralized managing of several enterprises VPN networks of any scope Reasonable monthly payments for your clients instead of upfront high capital investments in proprietary VPN network and permanently running payments for it administration You receive a price attractive security service to bind your clients with a long lasting collaboration Classic VPN-Outsourcing assumes that VPN-Gateways are always situated on the client side and are managed from there. The VPN connections between clients PCs are established only via these Gateways, which should obligatory have static IP address or DNS name. Thanks to ViPNet technology VPN gateway are not obliged to be located on the client side VPN gateway (ViPNet Coordinator) can be situated on the provider side and fulfill a function of IP address resolving for the ViPNet Clients from there. ViPNet Clients can be installed on regular workstations as well as on servers, which are not obliged to have static IP addresses by the way. Client PCs can be located anywhere and still communicate via protected channel directly.

Encryption software for local data ViPNet Safe Disk ViPNet Safe Disk stores your sensible data in a virtual folders protected by strong encryption. These folders are displayed as ordinary logical disks and the data stored in them is recognized as if it is another disk volume. ViPNet Safe Disk provides an encryption in the real time mode ( on-the-fly ) for your Notebook or your desktop PC. In the working process, the system is creating files so-called containers, whose size is specified by user. These containers are displayed as ordinary logical disks in Windows and are recognized by Windows Explorer. Password authentication is performed once on the entire volume. Once access has been granted to the volume, users can create, read, write, drag, drop and copy files to and from the volume just as if it were another hard drive. All information that the user stores on the disks is kept encrypted. When read, the information is being automatically decrypted, when savedencrypted. This process is completely transparent to a PC user. VIPNET SAFE DISK FEATURES AT A GLANCE: 256 bit strong AES encryption Supports external authentication devices USB Flash Disk, Smart- Card, ikey «Panic mode» fast hiding of containers with sensible data «Violent panic mode» extreme measure of protection: all container protection keys are deleted and the information, kept in all containers, is lost forever Integrated data deletion utility guarantees that your data will never be restored ViPNet Safe Disk Mobile: This program solves the problem of information security on the PDA. The data is stored encrypted and password-protected even when your device is switched off or in stand by mode. The solution has the same principle of operation as ViPNet Safe Disk - once the system is turned on, containers are recognized as another storage cards. ViPNet DISCguise ViPNet DISCguise is a small footprint utility, which allows data stored on a machine s hard disk to be kept completely secure. The program is simple to install and occupies less than 2Mb of disk space. A Windows Explorer style interface is used to select either individual files or a directory structure to encrypt. Files and folders are protected with a strong encryption algorithm (256 bit AES) using a combination of a unique user key and the password entered at time of encryption. The overall encryption strength is a function of the password selected by the user at time of encryption. Another application area of ViPNet DISCguise is the ability to encrypt files/folders for a safe e-mail transmission. It makes ViPNet DISCguise a pretty good alternative to PGP solutions.

ViPNet VPN Specification Current VPN Standard Encryption algorithms Key length Certificates Authentication The time required for establishing connection between two VPN objects VPN connection types Maximal number of simultaneous connections on one VPN host supported NAT Traversal Access control / Integrated Firewall Preconfigured security settings Administration Clustering / Fail-safe operation Operating Systems supported PC Hardware Network Proprietary key management system: SIMULTANEOUS usage of symmetric keys (preshared keys) infrastructure and PKI AES, GOST, 3DES and DES Secure symmetric key und private key IKE Diffie-Hellman 256 bit; public key IKE Diffie-Hellman 1024 bit Proprietary CA (Certification Authority) for the distribution and management of X.509 certificates (included in ViPNet CUSTOM package) Is based on symmetric keys system under the protection of crypto filtering. Immediate connection establishment after the request of VPN user in his VPN Client None there is no authentication session; it guarantees no disturbance in network services functioning or in LAN in general. All existent VPN connection types: Server-to-Server Client-to-Server Client-to-Client unlimited Works over Firewalls, Router and other NAT devices. UDP Encapsulation (a free definable UDP port) UDP Keepalive centralized connections management of the entire VPN cryptographic filtering by means of symmetric keys and one session IDs Packet filter (IP address, protocol, port, service) Application control IDS ViPNet Client and Coordinator are set by default in one of the five security levels so called Stealth mode Centralized generation and management of VPN structure Remote keys update Remote software update Connection protocol (local and remote) etc. Yes, Coordinator clustering with failover function for Linux, for Windows in progress Windows Me/2000/XP/2003 Server/Vista; Linux, Solaris (Sparc) only for ViPNet Client and Coordinator. PCs with other Operating Systems can be tunneled through ViPNet Coordinator Standard PC with min. CPU Pentium II 400MHz min. 128 MB RAM CD-ROM drive Minimum free disk space: 50 MB LAN: 10/100 Mbps Ethernet, Gigabit-Ethernet, WiFi WAN: xdsl, ISDN, Analog, GPRS/UMTS etc. Infotecs GmbH Internet Sercurity Software Hebbelstr. 41 D-14469 Potsdam Tel. +49 331 8170376 Fax:+49 331 8170377 E-Mail: support@infotecs.biz More information about ViPNet products you can find on www.infotecs.biz All the rights reserved. All the trademarks displayed in these materials are the property of the trademark owner.