Text or shortcode
Text or shortcode

Статьи о технологиях охраны, биографии, фото.

Blog

Table 3. Key features of VPN tools and solutions.

0
logo11d 4 1

Table 3. Key features of VPN tools and solutions..

Table 3. Key features of VPN tools and solutions.

Table 3. Key features of VPN tools and solutions

Protection tool Developer company
Security
Functions or Services
Standards, Protocols, Formats Composition of the
security system
Notes
IP Stream Encoder “SHIP” MO PNIEI Centralized Key Management, Authentication, Confidentiality and Integrity, Access Blocking GOST 28147-89;

IP, ICMP, IPX, x.25, Frame Relay, RIP2, OSPF, BGP

Crypto gateway;
information management, storage and transmission tools;
critical security event monitoring tools
Recommended by FAPSI
Zastava Complex ELVIS+ OJSC The software product is designed to organize VPN on communication channels, in local and global networks Uses the PKI system for storing and distributing keys “Zastava-office”, “Zastava-server”, “Zastava-client” Works under the Solaris and Windows NT operating systems
“Net-PRO” software suite “Signal-Com” CJSC The administrator carries out centralized management, viewing events and abnormal situations SSL protocol over TCP/IP; GOST 28147-89; X.509 “Net-PRO VPN Server” – server module;
Net-PRO VPN Client” – client module
Works under Windows NT/9x
“ViPNet2” software suite JSC “InfoTeKS” Security server;
universal server;
network control center;
key security center
Operating environments: Windows 95/98/NT, Linux “ViPNet Desk”;
ViPNet Office”;
ViPNet Tunnel”;
ViPNet Corporate”
State Customs Committee certificate for class 1B for AS and class 3 for ME
Software package “Tropa” JSC “Infosystems Jet” Strict adherence to IPSec specification Solaris OS Crypto gateway; centers for generation, registration, distribution of keys and system monitoring Compatible with “Zastava-Jet” (class 2 for ME)
“VPN-1” crypto gateway Check Point Software Technologies Support for “foreign crypto libraries such as GOST” is not expected in the near future SKIP, IPSec, FWZ1, DES, CAST-40, 3DES, ISAKMP The integrated Secure Virtual Network bundle system includes:
VPN-1 crypto gateway;
FireWall-1 screen;
FloodGate-1 bandwidth management tool
For mobile users, the SecuRemote VPN client is used (running Windows)
Cryptogateway “Continent-K” NIP “Informzashita” Electronic lock “Sobol” (FAPSI certificate) provides its own protection of the crypto router GOST 28147-89; Intel platform running FreeBSD OS Cryptogateway; network control center; crypto routers; management consoles Encryption speed – 30 Mbit/s;
Software package “IGLA-P” ZAO “MO PNIEI” Fully ensures the organization of VPN OS Microsoft Windows NT 4.0/2000/XP, GOST 28147-89 Special software “IGLA-P” Filtration criteria:
— addresses;
— protocols;
— ports;
— flags

You might be interested in …

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *

одиннадцать + девятнадцать =

Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
Принять