KEYVPN CLIENT. Features & Benefits. Industry s Most Complete IPsec VPN Client for Android OEMs and Enterprises.

Similar documents
NANOSSH Mocana s comprehensive SSH and RADIUS developers suite, purpose-built for resource-constrained or high-performance device environments.

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Network Security. Lecture 3

Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

KeyVPN User's Guide. Release n.n.n. Mocana Corporation. January 31, Sansome Street San Francisco, CA 94111

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Nokia Mobile VPN Client

Data Sheet. NCP Secure Enterprise Client Windows. Next Generation Network Access Technology

The BANDIT Products in Virtual Private Networks

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

Cisco Wireless Security Gateway R2

Introduction to Security and PIX Firewall

1. New Features and Enhancements in Service Release 9.31 Build 104

Chapter 8 Virtual Private Networking

CCNA Security 1.1 Instructional Resource

Application Note: Onsight Device VPN Configuration V1.1

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Chapter 4 Virtual Private Networking

VNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Understanding the Cisco VPN Client

axsguard Gatekeeper IPsec XAUTH How To v1.6

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

TheGreenBow VPN Client. User Guide

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Integrated Services Router with the "AIM-VPN/SSL" Module

Case Study for Layer 3 Authentication and Encryption

Chapter 5 Virtual Private Networking Using IPsec

Branch Office VPN Tunnels and Mobile VPN

Service "NCPCLCFG" is not running In this case, increase the WaitForConfigService setting until the problem is circumvented

VPN. VPN For BIPAC 741/743GE

VPN SECURITY POLICIES

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Security Engineering Part III Network Security. Security Protocols (II): IPsec

z/os Firewall Technology Overview

Internet Protocol Security IPSec

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT

Cisco VPN Internal Service Module for Cisco ISR G2

IP Security. Ola Flygt Växjö University, Sweden

SonicOS Enhanced 3.2 IKE Version 2 Support

Integrated Services Router with the "AIM-VPN/SSL" Module

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

This section provides a summary of using network location profiles to identify network connection types. Details include:

VPN R Administration Guide. 15 October Classification: [Protected]

Configuring Internet Key Exchange Security Protocol

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

ISG50 Application Note Version 1.0 June, 2011

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

Scenario: Remote-Access VPN Configuration

Configuring a GB-OS Site-to-Site VPN to a Non-GTA Firewall

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Implementing and Managing Security for Network Communications

VPN Configuration Guide. Juniper Networks NetScreen / SSG / ISG Series

IPsec Details 1 / 43. IPsec Details

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Advanced Administration

Lecture 17 - Network Security

Data Sheet. NCP Secure Enterprise VPN Server. Next Generation Network Access Technology

Table of Contents. Cisco Cisco VPN Client FAQ

GB-OS. VPN Gateway. Option Guide for GB-OS 4.0. & GTA Mobile VPN Client Version 4.01 VPNOG

National Security Agency Perspective on Key Management

SSL VPN Technical Primer

Netopia TheGreenBow IPSec VPN Client. Configuration Guide.

Microsoft Azure Configuration

Chapter 49 IP Security (IPsec)

Configuring GTA Firewalls for Remote Access

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Cisco Easy VPN on Cisco IOS Software-Based Routers

GlobalProtect Configuration for IPsec Client on Apple ios Devices

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Complying with PCI Data Security

WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B

Ensuring the security of your mobile business intelligence

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

FortiOS Handbook - IPsec VPN VERSION 5.2.2

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

SAP Single Sign-On 2.0 Overview Presentation

Using Opensource VPN Clients with Firetunnel

Data Sheet. NCP Secure Enterprise VPN Server Next Generation Network Access Technology

Vodafone MachineLink 3G. IPSec VPN Configuration Guide

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

IP Office Technical Tip

Deploying iphone and ipad Security Overview

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Configuring a VPN between a Sidewinder G2 and a NetScreen

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Application Notes. How to Configure UTM with Apple OSX and ios Devices for IPsec VPN

Using IPSec in Windows 2000 and XP, Part 2

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Transcription:

KEYVPN CLIENT Industry s Most Complete IPsec VPN Client for Android OEMs and Enterprises. Features & Benefits Supports latest Android versions Ice Cream Sandwich and Jelly Bean Configuration Wizard for IT administrators provides one click configuration experience to employees Available as post-loadable app for Android 4.x and later Complies with Carrier requirements Enterprise authentication methods Hybrid RSA, EAP-MSCHAPv2, EAP-MD5, RSA Secured ID Suite B algorithms and optional FIPS 140-2 Level 1 cryptography meets Federal, Financial, and Healthcare security requirements Split tunneling allows for securing of only sensitive traffic for longer battery life The smartphone and tablet market has seen remarkable adoption and acceptance for consumer-level Android devices. Enterprises are now looking to take advantage of the features, functionality, and user experience that Android has brought to millions of consumers globally. As OEMs look to build a bridge between these consumer-level devices and Enterprise systems, highly advanced security features will be required to compete against incumbent solutions like Blackberry and iphone. KeyVPN Client The Industry s Most Complete Mobile VPN Solution KeyVPN Client is a complete, full-featured solution that allows Android OEMs to easily integrate VPN functionality into devices that need to establish encrypted tunnels of communication into critical business and enterprise resources. Furthermore, for Android 4.x devices, KeyVPN Client is available as a downloadable mobile application, allowing integration with a single tap. Based on Mocana s award-winning NanoSec code base, which has been certified by the VPN consortium (VPNC) for interoperability with all leading VPN gateway appliances and vendors, KeyVPN Client includes an intuitive GUI with out-of-the-box support for the latest Android operating systems. KeyVPN Client employs a cross-platform implementation that allows OEMs to utilize a single cryptographic module across multiple Security Detail for Android products, such as NanoSec or KeyDAR (data-at-rest encryption for Android devices), creating system-level efficiencies with size and performance. 1

Mocana s cryptographic module is available with NSA Suite B algorithms and an optional FIPS 140-2 Level 1 certification, which have become mandatory with many Healthcare, Financial and Government Enterprises for meeting compliance specifications. Big VPN Functionality in a Very Small Package KeyVPN includes an easy-to-use GUI that is intuitive and suitable for any end user. It also integrates additional features like multiple VPN profile configurations, handling multiple gateways, supporting VPN and non-vpn traffic simultaneously (aka split tunneling ) and Suite B encryption. Easy to Use and Highly Configurable Modular Design: Facilitates integration with headless (GUI-less) embedded devices Highly Customizable: Connect securely to almost any commercial or open-source IPsec-based VPN server software or appliance Multi Purpose: Leverage single IPsec core support for both IMS 4G and VPN enterprise connectivity Highly Efficient: Leverage a single cryptographic module for multiple security applications Support Enterprise and Government Applications NSA Suite B Cryptography included FIPS 140-2 Level 1 certifiable cryptography module Mobile OS Platforms Supported Android Ice Cream Sandwich Android Jelly Bean Android Kit Kat (4.4.2) Hardware Platforms Supported KeyVPN Client Benefits As Android devices make their way into enterprise and Government markets, they will need a way to securely connect to back-end IT systems and infrastructure. Mocana s KeyVPN Client provides many benefits for Android OEMs and Enterprises. 2

Meets Enterprise Protocols IKE/IPsec VPN is widely deployed in Enterprises for desktop and laptop devices. KeyVPN Client follows these same protocols that Enterprises are now requiring for their mobile device VPN clients. Several smartphones on the market today, such as iphone and Blackberry, already support IKE/IPsec VPN. Accessibility & Interoperability KeyVPN Client allows Android smartphones and tablets to access Enterprise resources remotely and securely by setting up a IPsec based VPN tunnel from Android end points to Enterprise VPN gateways. Furthermore, it uses IKEv1/v2 as the key establishment protocol between end point and gateway. KeyVPN Client is an interoperable, standards based solution that does not require prior collaboration with VPN gateway vendors for end to end implementation. Win Government Dollars All government agencies and most contractors require FIPS certified cryptography a difficult certification to achieve. KeyVPN Client s core cryptographic module is available to you in source, or as a FIPS 140-2 Level 1 certified binary module. Both source and binary versions include full support for NSA s Suite B algorithms, providing secure communications between high-assurance and basicassurance systems. Ease of Use & Reduced Development Time KeyVPN Client contains absolutely no GPL code, you can be confident your intellectual property won t accidentally become public domain because of GPL contamination something open source projects cannot do. No crypto expertise is required because KeyVPN Client hides all of the complexity of the cryptography, so you can focus on other aspects of your project. Lastly, KeyVPN Client is hardware architecture independent and fits into tiny memory footprints. Mocana s patentpending Acceleration Harness provides an asynchronous event driven mechanism to leverage available hardware offloads dramatically enhancing performance and extending battery life on mobile platforms. Only KeyVPN Client offers everything you need together in one package, to get the job done right and fast. Open New Markets Android adoption in the Enterprise requires a IKE / IPsec VPN. Adopting KeyVPN Client will allow Android OEMs to make inroads into the Enterprise market with their Android devices. Beat Your Competition Apple iphone and ipad support IKE/IPsec VPN, but it is limited in functionality and are only Cisco compliant. KeyVPN Client is interoperable with all leading VPN gateway vendors giving reach to 99+% of all the Enterprise market. Get There Fast Many Android device OEMs have VPN client functionality on their roadmaps. KeyVPN Client will allow you to be one of the few Enterprise-ready providers in the market. Be one of the first to enable 3

corporate employees access to Enterprise systems with their Android device enabling the ability to carry one device for personal and business use. KeyVPN Client Key Features Key Feature Benefits & Specifications Easy to use & user friendly Intuitive Design Optimized for minimal number of clicks Reduces IT troubleshooting & tickets Extensive Protocol Support Best in Class Encryption / Authentication Internet Key Exchange IKE v1 (Aggressive and Main Mode) IKE v2 / IPv4 / IPv6 / XAUTH / NAT Traversal IPsec (ESP) using Data Encryption Standard (DES)/Triple DES (3DES) (56/168-bit) or AES (128/256-bit) with MD5 or SHA RSA, Diffie-Hellman, Elliptic Curve and full support for NSA Suite B Cryptography RSA SecurID, Hybrid RSA, EAP-MD5, EAP-MSCHAPv2 NSA Suite B Algorithms and Optional FIPS 140-2 Level 1 Certified Cryptography Use of highly advanced cryptography standards & certifications Meets cryptography & compliance needs for Healthcare, Financial, and Government markets No additional equipment to buy VPNC (VPN Consortium) Certified Interoperable VPN profile configuration with MDM Console Compatible with existing & popular VPN gateways Maximum compatibility with the use of industry standard protocols Provides APIs for configuring VPN profile from MDM consoles Supports VPN and non-vpn traffic simultaneously Split-Tunnel Mode Provides clean and smooth user experience Removes enterprise network as the bandwidth bottleneck 4

Key Feature Built-in Error Detection and Logging Mechanisms Connectivity KeyVPN Configuration Wizard Back-Up Server Benefits & Specifications Saves time and money Quicker troubleshooting & resolution of issues or IT tickets Supports WiFi (802.11a/b/g/n), GPRS, 3G, Edge, UMTS, and IMS 4G wireless connections, using native Android functionality Host based configuration tool allows creation of VPN profile Relieves users from complex task of VPN configuration Automatically attempts to connect to back up VPN gateway when primary gateway fails X.509 v3 certificate support Digital Certificate and Advanced Key Management Support PKCS #12, Certificate provisioning support (Digital certificates) Diffie-Hellman (DH) Groups 1, 2, and 5 Perfect Forward Secrecy (PFS) Rekeying KeyVPN Client Functionality and Implementation Figure 1: User Interface & Home Screen End Users will see a VPN application icon on their mobile device home screen. 5

Figure 2: Basic Features KeyVPN Client is a fully configurable VPN client. Users or Enterprise System Administrators can choose their IKE version (v1), their authentication method (certificates or pre share keys) or XAUTH. The feature set can be preconfigured, allowing System Administrators to mask configuration options to the end User by creating set profiles. Figure 3: Advanced Features KeyVPN Client also has more advanced features, such as dead peer detection (DPD) and split tunneling. Many configuration options are available, such as a choice between main and aggressive modes and choice of Suite B algorithms. 6

KeyVPN Client Compliancy and Supported Standards KeyVPN Client is built upon Mocana s award winning NanoSec (IKE / IPSec) product that has been deployed on millions of devices. NanoSec is complaint with the following set of IETF RFCs, cryptographic algorithms, and other applicable industry standards. RFC Compliance RFC-2367, PF_KEY Key Management API, Version 2 RFC 2401/4301, Security Architecture for the Internet Protocol RFC-2402/4302, IP Authentication Header RFC-2403/4303, The Use of HMAC-MD5-96 within ESP and AH RFC-2404, The Use of HMAC-SHA-1-96 within ESP and AH RFC-2405/4305, The ESP DES-CBC Cipher Algorithm With Explicit IV RFC-2406/4306, IP Encapsulating Security Payload (ESP) RFC-2407, The Internet IP Security Domain of Interpretation for ISAKMP RFC-2408, Internet Security Association and Key Management Protocol (ISAKMP) RFC-2409, The Internet Key Exchange (IKE) RFC-2410, The NULL Encryption Algorithm and Its Use With IPsec RFC-2451, The ESP CBC-Mode Cipher Algorithms RFC-3280, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile RFC 3526: More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) RFC-3566, The AES-XCBC-MAC-96 Algorithm and Its Uses With IPsec RFC-3602, The AES-CBC Cipher Algorithm and Its Use with IPsec RFC 3610: Counter with CBC-MAC (CCM) RFC 3686: Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP) RFC-3706, A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers RFC-3715, IPsec-Network Address Translation (NAT) Compatibility Requirements RFC-3748, Extensible Authentication Protocol (EAP) RFC-3947, Negotiation of NAT-Traversal in IKE RFC-3948, UDP Encapsulation of IPsec ESP Packets RFC 4106: The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP) RFC-4306, Internet Key Exchange (IKEv2) Protocol RFC 4307: Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 RFC 4308: Cryptographic Suites for IPsec RFC-4434, The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE) 7

RFC 4478: Repeated Authentication in Internet Key Exchange (IKEv2) Protocol RFC 4543: The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH RFC-4555, IKEv2 Mobility and Multihoming RFC-4718, IKEv2 Clarifications and Implementation Guidelines RFC 4753: ECP Groups for IKE and IKEv2 RFC 4754: IKE and IKEv2 Authentication Using ECDSA RFC 4806: Online Certificate Status Protocol (OCSP) Extensions to IKEv2 RFC 4835: Cryptographic Algorithm Implementation Requirements for ESP and AH RFC 4868: Using HMAC-SHA-256, HMAC- SHA-384, and HMAC-SHA-512 with IPsec RFC 4894: Use of Hash Algorithms in Internet Key Exchange (IKE) and IPsec RFC 4869: Suite B Cryptographic Suites for IPsec RFC 5685: Redirect Mechanism for the Internet Key Exchange Protocol Version 2 (IKEv2) ModeConfig: draft-dukes-ike-mode-cfg-02.txt XAUTH: draft-ietf-ipsec-isakmp-xauth-06.txt Certificate Management RFCs Supported IETF Draft: draft-nourse-scep-14.txt X.509 v3 certificate X.509 v2 CRL format Very Granular IKE / IPsec Feature Controls: Complete control of AH and ESP protocols configuration Multiple concurrent instances for multihoming, VLAN, per-interface, etc. Complete control of transport and tunnel modes Simple and complete control of shared secrets (IKE authentication) Complete control of IKE exchange Complete control of non-compliant security policy packets RFC-2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP RFC-3280, X.509 certificate and CRL profiles IKE APIs to handle VendorIDs, customization of Initial Payload Exchange IKE APIs to set / retrieve information in XAUTH and ModeConfig interactions Support for Dead Peer Detection (DPD) and hooks for customization of DPD interactions. Supports Dual-Mode Operation (IKEv1 and IKEv2) Tight integration with Mocana NanoEAP Supports RSA tokens for EAP-GTC with IKEv2 (RFC 3748) Full-featured IKE implementation as initiator or responder 8

Mocana s Complete Mobile Device Security Solution System Level Efficiency KeyVPN Client builds on top of Mocana s Industry leading NanoSec (IPsec) and NanoCrypto (cryptographic algorithms) security modules to provide a complete VPN solution that integrates into the Android OS. KeyVPN Client can sit beside other Mocana security modules, such as KeyDAR Encryption (Data-at-Rest Encryption) and utilize the same NanoCrypto algorithms driving greater system-level efficiency than any other VPN solution on the market. Future Proof Your Design Furthermore, by choosing KeyVPN Client, OEMs will future proof their code base to add additional Mocana Device Security Framework (DSF) modules, such as x.509v3 certificate lifecycle management with NanoCert. This allows OEMs to better utilize their precious development resources and reduce time to market in the competitive mobile devices market. Mocana s KeyVPN Client KeyVPN Client IMS NanoSec IPSec / IKEv1 / v2 / MOBIKE User Space Tools GUI KeyDAR Encryption Data-at-Rest Encryption Other Mocana Devie Security Framework (DSF ) Modules NanoCrypto FIPS 140-2 Level 1 Certified Suite B Algorithms Mocana Security Detail Android mocana.com/sd/android 9

Mocana s Device Security Framework KeyVPN is part of the Mocana Device Security Framework (DSF ), designed to secure all aspects of any connected device. All components of the Device Security Framework are built on a common architecture and share a common API and code base. As a device designer, you can choose only the components you need for your particular project...or standardize company-wide on the DSF, futureproofing your investment with this broad, cross platform, flexible and extensible security architecture. Device-Resident Code Cloud and On-Premise Services SMART DEVICE MANAGEMENT & SERVICES Mobile App Mgmt Device Identity Mgmt 3 rd Party Systems Integration with and Applications Safety NanoCert NanoSSH NanoSSL NanoSign DEVICE CONFIDENTIALITY NanoSec DEVICE AUTHENTICATION NanoEAP Nano Wireless FIPS 140-2 Certified Cryptographic Core Nano Defender KeyDAR Nano Update KeyVPN NanoBoot DEVICE INTEGRITY Security Event Mgmt Remedation Compliance 10

About Mocana Mocana securely mobilizes enterprise data and protects millions of the smart connected devices that comprise the Internet of Things. The company s award-winning enterprise mobile app security platform provides organizations with an easy way to deliver business-critical mobile apps, with a highquality end user experience, tap-and-go simplicity and strong security, for internal and external users. Mocana s customers include Fortune 50 enterprises, government agencies and the world s leading smart device manufacturers. More information is available at www.mocana.com. Awards and Certificates Mocana Corporation 710 Sansome Street San Francisco, CA 94111 tel (415) 617-0055 toll free (866) 213-1273 www.mocana.com sales@mocana.com 2014 Mocana Corporation 11