Unified Threat Management - Options | GTA, Inc.
GTA Mobile IPSec VPN Client   Mobile and Remote VPN's!

Request Information from GTA
Request More Information

Secure System Software
Current Version: 6.2.03

Spam and Virus Protection
Anti-Virus & Anti-Spam Protection

Content Filtering
Content Filtering


Product Details

Windows Mobile IPSec VPN Client
Windows Mobile IPSec VPN Client

Mobile IPSec VPN Client
For Mobile and Remote Virtual Private Networks

Designed specifically for the mobile work force, the Mobile IPSec VPN Client provides the vital ability for remote users to initiate VPN communication with corporate resources. Road warriors and telecommuters need to access mission critical networks over the Internet and often use unsecured public networks or untrusted local networks. A VPN connection may connect end-users that need a secure host to transmit sensitive information.

The Mobile IPSec VPN Client uses the IPSec ESP tunnel mode to form a secure communications channel to a network secured by a GTA Firewall. It provides VPN capability to desktop and notebook computers running Microsoft Windows, OS X, and Linux operating systems, enabling secure client-to-gateway communication over TCP/IP networks. Secured encrypted communications can be initiated in any IP environment.

OS X IPSec VPN Client
OS X IPSec VPN Client

Simple Configuration and Installation
The Mobile IPSec VPN Client is easy to configure and install. Firewall administrators configure the Mobile IPSec Client on the firewall in a few simple steps and all installation and certificate information is provided via the GTA Remote Access Portal. Users can log in and download the installer, certificates, and installation guide for Windows, OS X, and Linux operating systems. IPSec Client policies are also dynamically generated and available for download via the firewall.

The Mobile IPSec VPN Client transparently creates a VPN when operating on the Internet, including when utilizing NAT-T. With the client, secure connections can be made with all IPSec compliant network products, such as routers, gateway encryptors, and firewalls. Multiple encryption and authentication algorithms are employed, including DES, 3DES, AES, MD-5, SHA-1, and SHA-2. IKE is supported in main and aggressive modes. Certificates are used with Simple Certificate Enrollment Protocol (SCEP). XAUTH (Extended Authentication Protocol) V.6 supports RSA SecurID, LDAPv3, and RADIUS.

Security Standards

  • IPSec with IKE RFCs 2401 and 2409
  • Tunnel Mode
  • Transport Mode
  • NAT-T RFCs 3947 and 3948
  • X.509 Certificate Support - PKCS#12, PEM, SmartCard
  • Pre-shared Key Authentication
  • RSA Authentication
  • RSA + XAUTH Authentication
  • DES 56-bit Encryption
  • 3DES 168-bit Encryption
  • AES with 128-, 192-, or 256-bit Encryption
  • HMAC MD-5 128 Authentication Hash Algorithm
  • HMAC SHA-1 160-bit Authencation Hash Algorithm
  • HMAC SHA-2 256-bit, 384-bit or 512-bit Authencation Hash Algorithm
  • Diffie Hellman Group 1, Group 2, Group 5, Group 14, Group 16, Group 17 and Group 18 Support
  • IP Payload Compression Protocol (IPCOMP)

Option Availability

ProductStandardOptionalNot Available
GB-250e (Rev B)  
GB-250 (Rev B)[10 User] 

VPN Features:

VPN Configuration Wizard provides a format for entering primary VPN configuration specifications, and automatically creates the necessary VPN policy. Manual configuration and management of digital certificates is available through a graphical user interface.

Create and distribute customized installations for easy setup. Policies and be imported or exported allowing easy implementation of the same policy on multiple PC workstations.

Security policies can be locked and hidden to ensure network security. By locking the policy and using the hidden mode, network administrators can prevent unauthorized or accidental changes to the VPN policy, reducing the calls for support.

Mobile VPN Example:

How VPN's Work | How Virtual Private Networks Work
1. Authorization ensures that only trusted hosts can gain network access.

If a computer has not logged in with the VPN gateway (GTA firewall), the connection is denied (1a). if a computer provides authorization credentials such as a password and pre-shared secret, the VPN gateway adds the computer to its list of computers allowed to connect (1b).

2. Encryption defeats interception of traffic by scrambling data.

Once authorized, a computer can use encryption to prevent digital eavesdropping (packet sniffing) by any in-between points on the Internet, including unauthorized hosts.

Copyright © 2016 Global Technology Associates, Inc. All rights reserved.

'GB-OS' and 'GB-Ware' are registered trademarks of Global Technology Associates, Incorporated.
'Global Technology Associates' and 'GTA' are service marks of Global Technology Associates, Incorporated.