VPN management for Linux networks

NCP engineering released a new version of the software-based NCP Secure Enterprise Management (SEM) System for Linux-based systems. Developed from the ground up to make hybrid IPSec / SSL networks powerful yet easy to manage, the NCP SEM System can plug-and-play with any existing network infrastructure or stand on its own as a new component.

A single administrator is enabled full control over tens-of-thousands of secure connections, policy setting and enforcement, client updates, configurations and a host of other network access control (NAC) management activities from one dashboard interface.

Anyone running multiple VPNs that require individual settings, the NCP SEM System provides varied administrative access and activity log viewing for easy management. For example, a global enterprise that runs 20 different VPNs for various divisions, or an IT provider that runs 100 VPNs for clients, has the ability to manage each independently with its own administrator, and as a whole under a master administrator.

All log messages are allocated to the relevant network administrator and are invisible to the others. The administrator can monitor traffic and capacity for all components of each network, all from a single PC screen. In either example, each company needs only to run one master VPN with the security and privacy benefits of 20 or 100 separate ones, but the management tasks of just one.

Further simplifying a Linux-based hybrid VPN, the NCP SEM System streamlines client updates and plug-in management. All centrally managed from a single administrator or as a routine, automated process, configuration and software updates can be carried out via a LAN connection—without requiring a VPN tunnel.

In addition, update rule-sets can be enacted based on the type of network connection a device is currently connected to, avoiding “bandwidth hogging’ and pricey wireless data consumption fees. The NCP SEM System can also “pat down’ each device upon attempting to establish a VPN connection to identify if any third-party security software is missing or out of date. The end-device user will then be prompted to take appropriate action.

Don't miss