|
RebelRemote |
|
RebelRemote consists of RebelRemote Client software, which is installed on the remote PC, and RebelRemote Server software, which is installed on the network server. RebelRemote Server links the remote PCs on the "untrusted" network to the computers on the secure network.
RebelRemote extends the corporate network to remote users over untrusted networks like the Internet by creating a remote virtual private network (VPN) that transparently encrypts and validates all data. The Bad Guys on the untrusted network cannot eavesdrop, modify, or intercept data exchanged with the corporate network.
The software combines encryption, strong authentication, and authorization to protect against potential intruders and eavesdroppers. Public key and symmetric key encryption transparently encrypt all communications over the untrusted network, without modifying applications. Strong authentication ensures that only legitimate users can access the secure network. Filters can be defined and assigned by administrators to control the resources available to each user.
SMART Tunnels offer greater ease of use and better performance when using RebelRemote for remote access over the Internet. The remote virtual private network is created only when communication to the secure network is required. Only data exchanged with the corporate network is routed through the VPN, keeping Internet traffic on the Internet.
RebelRemote incorporates a number of standards based security and management features. The encryption, authentication and key exchange algorithms include DES 40, DES, Triple DES, and Diffie-Hellman.
The ability to scale is provided through redundancy, load balancing, and interfaces to authentication servers. RebelRemote Server provides interfaces to popular authentication, authorization, and accounting servers. RebelRemote also supports load balancing, redundancy, and replication in multi-gateway configurations.
[TOP] |
Clicking this link on the RebelRemote Options page displays a page showing the number of remote access licenses in use, as well as who is using them. Unused licenses will show up as "(unused)" in the displayed table.