
Kryptonet Operator's Program/Security Server
3 Steps to a VPN
In three steps, a manager creates impenetrable VPN tunnels:
1.Create a security group with a click in the Access tree.
2.Drag systems, users, subnets or other groups onto the new group from the Resource tree.
3.Select a predefined security policy template.
You’re done! Secure Office automatically establishes
the encrypted tunnels, accords all security specifications contained
in the policy to the new connections, and distributes the new configuration
to every gateway device throughout the domain. You don't have to
connect to each device separately and repeatedly enter new configuration
data.
If desired, individual members of the group can also
have additional, differing access rights or restrictions to other
groups.
VPN monitoring / maintenance
The IT manager can monitor the VPN at a glance. In stark contrast to conventional VPN management programs, Secure Office’s
administration provides a comprehensive view of the entire VPN, all managed resources
and their security groupings as well as selectable views of each
individual connection, each device, each system and all its accesses. Configuration changes are distributed to all units simultaneously as opposed to connecting one-by-one to each device.
The Online Log window continually receives messages from all components
with warning flags in the event of a security risk.
The status of all gateways all connections and all
accesses is immediately viewable.
Modify an existing security policy by changing a single template;
the change is automatically propagated to every instance of that
template throughout the VPN.
Add systems behind a gateway with a single click; the new system
is automatically included with every instance of the gateway and
automatically inherits the rights of each security group where the
gateway is represented. No additional configuration necessary.
KSS/administration Product Sheet (PDF-239KB)
|