March 2005
UNIX Update;Mar2005, Vol. 16 Issue 3, p7
Trade Publication
This article reports that Apani Networks, a provider of in-depth security solutions for enterprise and small-to-medium business, has launched the Apani Networks Virtual Private Network (VPN) Client version 3.1.1 for secure connection to Nortel VPN Routers. This version adds support for Linux Kernel-Source 2.6. Apani Networks VPN Client establishes secure connections to the Nortel VPN Router gateway from multiple operating systems including the latest versions of Linux, as of July 2003. This client software enables user-level authentication, virtual Internet Protocol address assignment, NAT traversal, and remote policy update and administration. The VPN client also provides for granular control of access policies and denial or termination of client connections. System administrators installing the VPN client can use pre-configured files for setting address and security parameters. A customizable client appearance will enable information technology (IT) administrators to provide user name and password authentication screens for database authentication or Radius Authentication for user identification. Use of Digital Certificates and RSA SecurelD is also supported. Apani Networks is a leader in enterprise and Server Message Block IT network security, shielding the network from attacks and providing in-depth protection for critical network data.


Related Articles

  • PORT FORWARDING.  // APC (Bauer Media Group);Mar2012, Vol. 32 Issue 3, p102 

    The article talks about technical specifications related to port forwarding on routers while setting up virtual private networks.

  • VOICE-VPN ROUTER DELIVERS SECURE, ENCRYPTED VOIP FOR ISDN.  // Tele-Service News;Sep2006, Vol. 18 Issue 9, p1 

    The article introduces the new SmartNode Model SN4562 Secure ISDN Voice over Internet Protocol (VoIP) Router, developed by Patton-Inalp Networks AG in Bern, Switzerland. The Voice-over-VPN solution with encrypted voice and data offers a way to move forward with secure, hacker-proof VoIP. It...

  • TWEAK YOUR ROUTER.  // APC (Bauer Media Group);Mar2012, Vol. 32 Issue 3, p100 

    The article discusses whether computers routers can effectively support virtual private network.

  • Cisco touts variety of security routers for VPNs. Greene, Tim // Network World;11/25/2002, Vol. 19 Issue 47, p20 

    Features Cisco Systems Inc.'s line of security routers for virtual private networks. Retail price; Design specification of SOHO 91 and SOHO 97.

  • Inbox. Pallis, Mary; Martin, Jo // Choice Computer;Sep/Oct2015, p2 

    The article presents questions and answers related to computer problems including why a document cannot be viewed on a Microsoft Surface 2 tablet and why many home routers are not compliant with virtual private network (VPNs).

  • Smaller suppliers aim to win over users with cutting-edge products.  // Computer Weekly;10/7/2003, p18 

    The article reports that Cisco routers traditionally appeal to users who want tried and tested products and a mature support infrastructure but do not necessarily want or need leading-edge technology. Enterprises interested in adopting newer technologies should look to some of the smaller...

  • Are you open to hackers. Webdale, Jonathan // Director;Jul2003, Vol. 56 Issue 12, p40 

    Focuses on the impact of using Internet in business processes. Use of virtual private networks to guard a network; Improvement in the business productivity with teleworking.

  • Ask Dr. Internet. Blass, Steven // Network World;3/20/2006, Vol. 23 Issue 11, p41 

    The article discusses the advantages and limitations of SSL VPN and Windows Remote Desktop in providing a more secure way to provide remote access to internal intranet resources. The protocol-level security of the SSL VPN and the Remote Desktop are similar. Both are vulnerable to the same kinds...

  • D-Link DFL-600. Taylor, Nathan // Australian PC User;Sep2004, Vol. 16 Issue 9, p108 

    Evaluates the D-Link DFL-600 virtual private network router. Limitations; Features; Price.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics