HOBLink VPN Anywhere Client

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Reduce Cost & Complexity Partner logo here Presenters Name (16pt) Presenters Title (14pt) Company/ (14pt) Manage and Deploy Applications using Virtualization.
Digital Certificate Installation & User Guide For Class-2 Certificates.
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Israel Securities Authority MAGNA – Electronic filing Natan Herscovitz, CIO December 2004.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Intranet, Extranet, Firewall. Intranet and Extranet.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Chapter 13 – Network Security
Archival information system ARHiNET Croatian national archival information system Vlatka Lemić Croatian State Archives, Croatia.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Rev. 2.0 Mobile access for iPhone / iPad. Allied Telesis’ AR routers provide a simple and secure mobile connectivity solution for iPhone and iPad - anytime,
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Virtual Private Networks
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
VCE IT Theory Slideshows
Virtual Private Network Access for Remote Networks
Connectivity to bank and sample account structure
Reliable VPN Solutions IN IOT Environments
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 5 Electronic Commerce | Security Threats - Solution
Virtual Private Networks (VPN)
Internet, Intranet and Extranets
Virtual Private Networks
WLAN(stands for wireless LANs)
Wireless Communication and Networks
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Internet, Intranet and Extranets
Chapter 5 Electronic Commerce | Security Threats - Solution
Virtual Private Networks (VPN)
Firewalls.
Security of a Local Area Network
Internet, Intranet and Extranets
Unit 27: Network Operating Systems
Business Communication
Cabrillo College Building Cisco Remote Access Network
Virtual Private Network
IS4680 Security Auditing for Compliance
Installation & User Guide
AbbottLink™ - IP Address Overview
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
HOB – Company presentation
Cengage Learning: Computer Networking from LANs to WANs
HOBCOM Universal Server
Designing IIS Security (IIS – Internet Information Service)
HOB RD VPN 2.x Basic Training course.
HOB RD VPN 2.x Basic Training course.
Referent: Name Stellenbezeichnung  .
Topic 12: Virtual Private Networks
HOB RD VPN 2.x Basic Training course.
Presentation transcript:

HOBLink VPN Anywhere Client The Universal Client for IPsec VPNs - worldwide unique -

HOB´s Solution: HOBLink VPN Anywhere Client To enable flexible, convenient and secure access to centrally stored company data and applications – at any time and from anywhere – HOB provides companies with its HOBLink VPN Anywhere Client HOBLink VPN Anywhere Client is a universal, software-based IPsec Client compatible with many VPN-Gateways to establish secure VPN-Tunnels

HOB´s Solution: HOBLink VPN Anywhere Client (2) Access to centrally stored company data and applications anywhere, anytime and from almost any device greatest flexibility VPN-Tunnel can be established without any administration rights and installation on the client side quick integration of new users use program with just some clicks Simplified, single point of administration significant reduction in costs, time and effort each used client need not be configured separately

HOB´s Solution: HOBLink VPN Anywhere Client (3) Quick and simple integration of new employees, customers, or partners into your network fast reaction to internal or external changes provide high-quality work environment and service Client can be easily downloaded from a Webserver or executed from an USB-Stick no training needed no particular hardware needed

HOBLink VPN Anywhere Client Download von einem Webserver 18.10.2019

HOBLink VPN Anywhere Client Ausführen via USB-Stick 18.10.2019

HOBLink VPN Anywhere Client Features & Functions Local execution on a Microsoft OS (Vista / Windows 7 / Windows 8) IPsec connections independent from type of router, firewall or WLAN Hotspots No IP-Address Conflicts between IP-Network on client-side and Company Network

HOBLink VPN Anywhere Client Features & Functions (2) All data communication is based on IPsec and IKE/ISAKMP Standards, i.e. including a strong encryption (AES, 3DES) and authentication Currently used authentication methods can remain in service (e.g. Radius, Certificates, username/password, Smartcard, Token, PKCS11) Radius Authentifizierung Smart-Card

HOBLink VPN Anywhere Client Features & Functions (3) 18.10.2019 The above shown figure depicts the functioning of HOBLink VPN Anywhere Client. One can see that all company data and applications are centrally stored on a server, mainframe, PC, or database within the company. With HOBLink VPN Anywhere Client used from a PC having Windows Vista or Windows 7 installed as operating system the user can access these data via the Internet. There is no installation or administration rights needed on client-side. Hereby, HOBLink VPN Anywhere Client establishes a secure VPN Tunnel to the used VPN Gateway (e.g. from HOB, Cisco, or Juniper) in the DMZ of the company. The VPN-Gateway retrieves data from the local corporate LAN and sends them via the secured VPN Tunnel to the user. Since HOBLink VPN Anywhere Client makes use of NAT-T, NAT keepalive and UDP encapsulation the IPsec connection can be established via arbitrary routers, firewalls or WLAN hotspots. Moreover, HOBLink VPN Anywhere Client supports dynamic NAT, i.e. IP-address conflicts between the client-side network and the companynetwork are avoided. This holds also true if several destination networks exist. The whole data communication with HOBLink VPN Anywhere Client is secured on the basis of Ipsec and IKE/ISAKMP Standards (RFC 2401-ff) including a strong encryption and authentication. Finally an Application Level Gateway for FTP and SIP is included. This ensures data security when they are externally accessed.

HOBLink VPN Anywhere Client Advantages at a Glance 18.10.2019 Universally usable IPsec VPN Client Higher flexibility Freed resources to strengthen competitive advantage Ongoing use of existent IT-structures Compatible with several VPN-Gateways of different manufacturers Easily adaptable to internal and external changes Applicable almost independent of type of device used Individuality

HOBLink VPN Anywhere Client Advantages at a Glance (2) No need for additional drivers and administration rights on client side Secure access to data when you need to Intuitive usability, just use it HOBLink VPN Anywhere Client is conformant to current security standards IT-Administrator is not tied to administering hundreds of clients due to one-time, central installation and configuration Single point of administration

HOBLink VPN Anywhere Client Questions? 18.10.2019

Many Thanks for Your Attention! 18.10.2019 Many Thanks for Your Attention! HOB GmbH & Co. KG Schwadermühlstraße 3 90556 Cadolzburg Tel: +49 9103 715 3715 Fax: +49 9103 715 3271 E-Mail: marketing@hob.de Internet: www.hob.de Anatoly Maslennikov - Fotolia.com

Legal Notice HOB GmbH & CO. KG. KG Schwadermuehlstr. 3 90556 Cadolzburg Represented by: Klaus Brandstätter, Zoran Adamovic Contact: Phone: 0049-91037150 Fax: 0049-9103715271 E-mail: marketing@hob.de Register of Companies: Entered in the Registry of Companies, Registry Court: Amtsgericht Fürth, Registration Number: HRA 5180 Tax ID: Sales Tax Identification Number according to Section 27a Sales Tax Act: DE 132 747 002 Responsible for content according to Section 55 Paragraph 2 Interstate Broadcasting Agreement: Klaus Brandstätter, Zoran Adamovic, Schwadermuehlstr. 3, 90556 Cadolzburg References for all images and graphics used: All pictures and images included in this publication to which HOB does not hold the copyright must be credited to the current copyright holders. See section Picture Sources   Disclaimer: Liability for content The contents of this publication were created with great care and diligence. While we keep it as up-to-date as practicable, we cannot take any responsibility for the accuracy and completeness of the contents of this publication. As a service provider we are responsible for our own content in this publication under the general laws according to Section 7 paragraph 1 of the TMG. According to Chapters 8 to 10 of the TMG we are not obliged as a service provider to monitor transmitted or stored information not created by us, or to investigate circumstances that indicate illegal activity. Obligations to remove or block the use of information under the general laws remain unaffected. Liability is only possible however from the date of a specific infringement being made known to us. Upon notification of such violations, the content will be removed immediately. Liability for links This publication may contain links to external websites over which we have no control. Therefore we can not accept any responsibility for their content. The respective provider or operator of the website pages to which there are links is always responsible for the content of the linked pages. The linked sites were checked at the time of linking for possible violations of the law. At the time the link was created in this publication, no illegal or harmful contents had been identified. A continuous and on-going examination of the linked pages is unreasonable without concrete evidence of a violation. Upon notification of any violations, such links will be removed immediately. Copyright The contents and works on these pages created by the author are subject to German copyright law. Reproducing, copying, modifying, adapting, distributing or any kind of exploiting of this material outside the realms of copyright require the prior written consent of the respective author or creator. The downloading of, and making copies of, these materials is only permitted for private, non-commercial use. Where contents of this publication have not been created by the author, the copyright of the third parties responsible for these contents shall be upheld. In particular any contents created by a third party are marked as such. If you become aware of any copyright infringement within this publication, we kindly ask to be provided with this information. Upon notification of any such violation, the concerned content will be removed immediately.