Release Notes. NCP Secure Enterprise Client (Win32/64) Service Release: r29675 Date: May 2016

Similar documents
Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. Major Release: build Date: July 2015

Release Notes. NCP Secure Entry Client (Win32/64) 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Windows 10 Update 1511 (Threshold 2/Build 10586) causes problems with installed NCP Secure Client

Release Notes. NCP Secure Enterprise Client (Win32/64) 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Windows 10 Update 1511 (Threshold 2/Build 10586) causes problems with installed NCP Secure Client

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Release Notes. NCP Secure Enterprise Client (Win32/64) 1. New Features and Enhancements. Service Release: Revision Date: January 2016

NCP Secure Client Juniper Edition (Win32/64) Release Notes

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

NCP Secure Client Juniper Edition Release Notes

Data Sheet NCP Exclusive Remote Access Client Windows

NCP Secure Entry Client (Win32/64) Release Notes

NCP Secure Entry Client Release Notes

Data Sheet. NCP Secure Enterprise macos Client. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Linux Client. Next Generation Network Access Technology

Data Sheet. NCP Exclusive Entry Client. Next Generation Network Access Technology

Data Sheet. NCP Secure Entry Client Windows. Next Generation Network Access Technology. Universal VPN Client Suite for Windows 32/64 bit

Data Sheet. NCP Exclusive Remote Access Mac Client. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Client Windows. Next Generation Network Access Technology

NCP Secure Entry Client Release Notes

Release Notes. NCP Secure Enterprise Client (Win32/64) 1. New Features and Enhancements. 2. Changes Made and Problems Resolved

Data Sheet. NCP Secure Entry Mac Client. Next Generation Network Access Technology

NCP Secure Enterprise macos Client Release Notes

NCP Secure Managed Android Client Release Notes

NCP Secure Entry Client (Win32/64) Release Notes

Release Notes. NCP Secure Enterprise Client (Win32/64) 1. New Features and Enhancements. Service Release 9.30 Build 162 Date: May 2012

NCP Secure Enterprise macos Client Release Notes

In the event of re-installation, the client software will be installed as a test version (max 10 days) until the required license key is entered.

NCP Secure Entry macos Client Release Notes

Release Notes. NCP Android Secure Managed Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

NCP Secure Enterprise Client (Win32/64) Release Notes

NCP Secure Enterprise Client (Win32/64) Release Notes

Windows 8.1 Adaptation The Secure Enterprise Client is supported on the Microsoft Windows 8.1 operating system.

Release Notes. NCP Secure Enterprise Client (Win32/64) 1. New Features and Enhancements. Service Release: 9.31 Build 116 Date: February 2013

Teldat Secure IPSec Client - for professional application Teldat IPSec Client

Release Notes. NCP Secure Enterprise Client (Win32/64) 1. New Features and Enhancements. Service Release: 9.32 Build 142 Date: October 2013

Release Notes. NCP Secure Entry Client (Win32/64) 1. New Features and Enhancements. Service Release: 9.32 Build 160 Date: November 2013

Release Notes. NCP Secure Entry Client (Win32/64) 1. New Features and Enhancements in this Service Release

Data Sheet. NCP Secure Enterprise VPN Server. Next Generation Network Access Technology

The complete client communication infrastructure is now handled by the Windows socket interface.

Release Notes. NCP Secure Enterprise VPN Server. 1. New Features and Enhancements. 2. Improvements / Problems Resolved

Release Notes. NCP Secure Enterprise VPN Server. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

CVE / "POODLE"

OCSP When the OCSP responder was not available, clients not establish connections, although in case of error was configured.

NCP Secure Enterprise Management for Windows Release Notes

Release Notes. NCP Secure Enterprise VPN Server. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Release Notes. NCP Secure Enterprise VPN Server. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Release Notes. NCP Secure Enterprise VPN Server. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

NCP Secure Enterprise Management (Win) Release Notes

NCP Secure Enterprise Management for Linux Release Notes

Data Sheet NCP Secure Enterprise Management

Astaro Security Linux v5 & NCP Secure Entry Client A quick configuration guide to setting up NCP's Secure Entry Client and Astaro Security Linux v5

NCP Secure Enterprise Management for Windows Release Notes

NCP Secure Enterprise Management for Linux Release Notes

Virtual Private Networks

The EN-4000 in Virtual Private Networks

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

NCP Exclusive Remote Access Management

Table of Contents 1 IKE 1-1

Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows

Configuration of an IPSec VPN Server on RV130 and RV130W

D-Link VPN Client. Manual

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

Secure Access Configuration Guide For Wireless Clients

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

Apple Inc. Apple IOS 11 VPN Client on iphone and ipad Guidance Documentation

Service Managed Gateway TM. Configuring IPSec VPN

Sample excerpt. Virtual Private Networks. Contents

NCP Secure Enterprise VPN Server (Win)

Secure Entry CE Client & Watchguard Firebox 700 A quick configuration guide to setting up the NCP Secure Entry CE Client in a simple VPN scenario

NCP Secure Enterprise VPN Server (Win)

MRD-310 MRD G Cellular Modem / Router Web configuration reference guide. Web configuration reference guide

Hillstone IPSec VPN Solution

Chapter 5 Virtual Private Networking

DPX8000 Series Deep Service Switching Gateway User Configuration Guide BRAS Service Board Module v1.0

Appendix. F E C S e c u r e IP Sec C li en t

Series 1000 / G Cellular Modem / Router. Firmware Release Notes

Debugging a Virtual Access Service Managed Gateway

VPN Overview. VPN Types

Chapter 6 Virtual Private Networking

Modifications according to new functionalities of the NCP Secure Enterprise Server 10.0.

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

Integration Guide. Oracle Bare Metal BOVPN

Broadband Router DC-202. User's Guide

IPSec Network Applications

VPN Auto Provisioning

FAQ about Communication

Series 1000 / G Cellular Modem / Router. Firmware Release Notes

IKE and Load Balancing

NETGEAR ProSafe VPN Client

CHAPTER 7 ADVANCED ADMINISTRATION PC

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Manual Overview. This manual contains the following sections:

QuickStart. NCP Secure Enterprise Server. Configuration Guide

Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0. Issue th October 2009 ABSTRACT

User Manual. SSV Remote Access Gateway. Web ConfigTool

Proxicast VPN Client v6.x

Configuring a Hub & Spoke VPN in AOS

Transcription:

NCP Secure Enterprise Client (Win32/64) Service Release: 10.04 r29675 Date: May 2016 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 (32 and 64 bit) Windows 8.x (32 and 64 bit) Windows 7 (32 and 64 bit) Windows Vista (32 and 64 bit) Windows 10 Update 1511 (Threshold 2/Build 10586) causes problems with installed NCP Secure Client Microsoft s november update for Windows 10 is far more than merely a collection of patches and/or enhancements. In general it is essentially a new version of Windows. Some areas of the registry database are rewritten during the update and while doing so a few important entries of the NCP Secure Client are discarded. To resolve this issue the lost registry keys and related values have to be written again. Therefore one has to perform an uninstall of the NCP Secure Client followed by a mandatory reboot prompted for within the uninstall procedure. After which one just has to reinstall the version of the client used before. (Please do not confirm the Delete all files option of the uninstall process). The full configuration will be preserved; only the license information has to be re-entered after the installation. After having completed this procedure the NCP Secure Client can be used again without any limitations. Information on the operation of the Secure Client under Windows 10 It is necessary to have a product key for version 10.x to operate the Client. Note when updating the operating system to Windows 10 When updating from Microsoft Windows 7, Windows 8 or Windows 8.1 to Microsoft Windows 10, it is vital that the NCP Secure Client be uninstalled before starting the update. At the same time it is recommended that the configuration file, as well as the certificates used, is saved separately. When the update to Windows 10 is complete, the latest version of the NCP Secure Client (10.02 or later) should then be installed. page 1 of 31

1. New Features and Enhancements None 2. Improvements / Problems Resolved Windows Pre-Logon Windows Pre-Logon (Credential Provider) has been adapted for Windows 10. The user interface has also been optimized. 3. Known Issues None page 2 of 31

Service Release: 10.04 Revision 27627 Date: January 2016 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 (32 and 64 bit) Windows 8.x (32 and 64 bit) Windows 7 (32 and 64 bit) Windows Vista (32 and 64 bit) Windows 10 Update 1511 (Threshold 2/Build 10586) causes problems with installed NCP Secure Client Microsoft s november update for Windows 10 is far more than merely a collection of patches and/or enhancements. In general it is essentially a new version of Windows. Some areas of the registry database are rewritten during the update and while doing so a few important entries of the NCP Secure Client are discarded. To resolve this issue the lost registry keys and related values have to be written again. Therefore one has to perform an uninstall of the NCP Secure Client followed by a mandatory reboot prompted for within the uninstall procedure. After which one just has to reinstall the version of the client used before. (Please do not confirm the Delete all files option of the uninstall process). The full configuration will be preserved; only the license information has to be re-entered after the installation. After having completed this procedure the NCP Secure Client can be used again without any limitations. Information on the operation of the Secure Client under Windows 10 It is necessary to have a product key for version 10.x to operate the Client. Note when updating the operating system to Windows 10 When updating from Microsoft Windows 7, Windows 8 or Windows 8.1 to Microsoft Windows 10, it is vital that the NCP Secure Client be uninstalled before starting the update. At the same time it is recommended that the configuration file, as well as the certificates used, is saved separately. When the update to Windows 10 is complete, the latest version of the NCP Secure Client (10.02 or later) should then be installed. page 3 of 31

1. New Features and Enhancements None 2. Improvements / Problems Resolved Configuration and License File In some cases, the configuration and license file may become corrupted or be deleted. The handling of the configuration and license file has been optimized to resolve this. Firewall Configuration An issue in reading the firewall configuration caused by the central management function if a large number of known networks are used has been resolved. Compatibility with Older NCP Secure Enterprise VPN Gateways An error caused by endpoint policy with legacy NCP gateways has been resolved. Hotspot Registration An issue with the hotspot registration configuration has been resolved. Now up to 255 characters may be entered for the configuration of permitted ports. The activation of the system proxy has also been improved. Parameter Lock A problem with the parameter lock following a configuration update has been resolved Credential Provider A problem with the VPN tunnel established by the NCP Credential Provider during Windows logon has been resolved. Deactivating the WLAN Adapter when the LAN Cable is Connected If a computer or device (mainly tablet PCs) is connected via a USB LAN adapter, the status change "LAN connected / not connected" was not recognized correctly. The automatic media change between LAN and WLAN is now activated when an ethernet cable (RJ45) or a USB cable is connected or disconnected. 3. Known Issues Credentials Provider under Windows 10 If the NCP Secure Client credential provider is used under Windows 10, the user login may not function correctly. page 4 of 31

Service Release: 10.04 Revision 26745 Date: November 2015 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 (32 and 64 bit) Windows 8.x (32 and 64 bit) Windows 7 (32 and 64 bit) Windows Vista (32 and 64 bit) Windows 10 Update 1511 (Threshold 2/Build 10586) causes problems with installed NCP Secure Client Microsoft s november update for Windows 10 is far more than merely a collection of patches and/or enhancements. In general it is essentially a new version of Windows. Some areas of the registry database are rewritten during the update and while doing so a few important entries of the NCP Secure Client are discarded. To resolve this issue the lost registry keys and related values have to be written again. Therefore one has to perform an uninstall of the NCP Secure Client followed by a mandatory reboot prompted for within the uninstall procedure. After which one just has to reinstall the version of the client used before. (Please do not confirm the Delete all files option of the uninstall process). The full configuration will be preserved; only the license information has to be re-entered after the installation. After having completed this procedure the NCP Secure Client can be used again without any limitations. Information on the operation of the Secure Client under Windows 10 It is necessary to have a product key for version 10.x to operate the Client. Note when updating the operating system to Windows 10 When updating from Microsoft Windows 7, Windows 8 or Windows 8.1 to Microsoft Windows 10, it is vital that the NCP Secure Client be uninstalled before starting the update. At the same time it is recommended that the configuration file, as well as the certificates used, is saved separately. When the update to Windows 10 is complete, the latest version of the NCP Secure Client (10.02 or later) should then be installed. 1. New Features and Enhancements NCPScript Mit NCPScript kann das Betriebssystem abgefragt werden. Voraussetzung: Secure Enterprise Management Server ab Version 4.0. page 5 of 31

2. Improvements / Problems Resolved Split Tunneling Error fixed in split tunneling when the remote network shared the same IP address range as the user's local network. This previously caused the local network route to be deleted if the VPN profile was changed. Support of the HA Server Error fixed in communication procedure via L2TP. 3. Known Issues Credentials Provider under Windows 10 If the NCP Secure Client credential provider is used under Windows 10, the user login may not function correctly. page 6 of 31

Service Release: 10.03 Revision 25927 Date: October 2015 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 (32 and 64 bit) Windows 8.x (32 and 64 bit) Windows 7 (32 and 64 bit) Windows Vista (32 and 64 bit) Information on the operation of the Secure Client under Windows 10 It is necessary to have a product key for version 10.x to operate the Client. Note when updating the operating system to Windows 10 When updating from Microsoft Windows 7, Windows 8 or Windows 8.1 to Microsoft Windows 10, it is vital that the NCP Secure Client be uninstalled before starting the update. At the same time it is recommended that the configuration file, as well as the certificates used, is saved separately. When the update to Windows 10 is complete, the latest version of the NCP Secure Client (10.02 or later) should then be installed. 1. New Features and Enhancements None 2. Improvements / Problems Resolved Endpoint Policy The reading of registry entries during the Endpoint Policy check could lead to a malfunction. 3. Known Issues None page 7 of 31

Service Release: 10.03 Revision 25862 Date: September 2015 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 (32 and 64 bit) Windows 8.x (32 and 64 bit) Windows 7 (32 and 64 bit) Windows Vista (32 and 64 bit) Information on the operation of the Secure Client under Windows 10 It is necessary to have a product key for version 10.x to operate the Client. Note when updating the operating system to Windows 10 When updating from Microsoft Windows 7, Windows 8 or Windows 8.1 to Microsoft Windows 10, it is vital that the NCP Secure Client be uninstalled before starting the update. At the same time it is recommended that the configuration file, as well as the certificates used, is saved separately. When the update to Windows 10 is complete, the latest version of the NCP Secure Client (10.02 or later) should then be installed. 1. New Features and Enhancements None 2. Improvements / Problems Resolved Hotfix Detection in Endpoint Security An error has been corrected in Endpoint Security, whereby the request of hotfixes of the current operating system did not function. The recognition of hotfix starting from Windows Vista has been corrected with this version and now is using the WMI interface internally (Windows Management Instrumentation). Custom Branding Option The Custom Branding Option could not always be configured. This error has been corrected. Environment Variable In the case that for the parameter VPN User Name, an environment variable was set, this was not properly evaluated. This has now been corrected. page 8 of 31

VPN Profile with configured PKI and PSK If within a VPN profile configuration with IKEv1, a pre-shared key is configured, this will then be used, if a PKI configuration is available. In Version 10.02 Rev. 25056 this behavior was changed so that the PKI configuration was used. With the current release this behavior will be reversed so that as with the original behavior a configured pre-shared key is used. Windows Pre-Logon The process after entering User Name and Password manually for windows logon via credential provider has been corrected. Disable WiFi adapter when LAN cable is connected The compatibility of this feature has been optimized on different Windows operating systems. A problem that occurred, if automatic media detection and PPPoE were used in combination, has been resolved. A bug related to the application detection of the NCP Firewall has been fixed. 3. Known Issues Credential Provider for Windows 10 Using the Credential Provider of the NCP Secure Client on Windows 10 may cause incorrect behaviour during user logon. page 9 of 31

Service Release: 10.02 Revision 25056 Date: August 2015 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 (32 and 64 bit) Windows 8.x (32 and 64 bit) Windows 7 (32 and 64 bit) Windows Vista (32 and 64 bit) Information on the operation of the Secure Client under Windows 10 It is necessary to have a product key for version 10.x to operate the Client. Note when updating the operating system to Windows 10 When updating from Microsoft Windows 7, Windows 8 or Windows 8.1 to Microsoft Windows 10, it is vital that the NCP Secure Client be uninstalled before starting the update. At the same time it is recommended that the configuration file, as well as the certificates used, is saved separately. When the update to Windows 10 is complete, the latest version of the NCP Secure Client (10.02 or later) should then be installed. 1. New Features and Enhancements None 2. Improvements / Problems Resolved Installation Adjustment Users experienced a rollback of the client installation during the filter driver setup. This version contains adjustments of the setup information correcting this behavior. 3. Known Issues None page 10 of 31

Service Release: 10.02 Build 24958 Date: July 2015 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 10 (32 and 64 bit) Windows 8.x (32 and 64 bit) Windows 7 (32 and 64 bit) Windows Vista (32 and 64 bit) Information on the operation of the Secure Client under Windows 10 It is necessary to have a product key for version 10.x to operate the Client. Note when updating the operating system to Windows 10 When updating from Microsoft Windows 7, Windows 8 or Windows 8.1 to Microsoft Windows 10, it is vital that the NCP Secure Client be uninstalled before starting the update. At the same time it is recommended that the configuration file, as well as the certificates used, is saved separately. When the update to Windows 10 is complete, the latest version of the NCP Secure Client (10.02 or later) should then be installed. 1. New Features and Enhancements Extensions inside the Log Protocolling For the evaluaton of the log text two search functions were implemented, that facilitate the searches in the log protocol. These functions are opened by clicking in the log display window with two input fields on Show Search. Scaling the Monitor for Better Touch Operation So that the touch operation of the client monitor can be comfortably done on tablets, the monitor's surface is now scaleable. A scaling degree of 150% is pre-set and can be activated or deactivated by pressing on the NCP logo. Via the main monitor menu under View / GUI Scaling the display size in levels of 100, 125, 150, 175 and 200% van be variably set. A dynamic change to the scaling is possible with the key combination [CTRL] [+] or [CTRL] [+]. Check for friendly networks periodically The periodical testing should then be enabled when a change to the condition of the network adapter has not occurred e.g. on taking out the LAN cable. This can be the consequence of using the client in a virtual environment. page 11 of 31

The function that is checked in pre-set intervals, checks whether the client is still in a friendly network. As soon as the friendly network is no longer available this status change will be shown as a red firewall symbol on the monitor. This configuration option is located in the monitor menu under: Firewall / Friendly Networks / Automatic. VPN Profile with IKEv2 receives Diffie Hellman 14 for the PFS Group On setting up a new VPN profile with IPsec protcoll the Diffie Hellman Group 14 is pre-set as the standard value for the key exchange process in the IPsec policy. This setting can be done under PFS Group and also be altered there. Install Configuration Update immediately A configuration update is carried over by the management system SEM via LAN or VPN to the client. So that this new configuration can be used for the next connection build-up, the tunnel must be dismantled (via RWSCMD) and re-built. Tunnel construction and deconstruction can be transmitted to the command line tool RWSCMD. This happens in the monitor menu under "Configuration / Connection Options / External Applications" by inserting the following commands as external applications: rwscmd / disconnect rwscmd / connect According to the update via LAN or VPN the command line applications must be placed in this order in the relevant update connection, either - start application with a configuration update via LAN (updlan) or - start application with a configuration update via VPN (updvpn). If several VPN profiles are available in the profile applications, selection of the desired profile as external application must be prioritized before initiating the connection build-up (rwscmd/connect profile name). Other external applications or batches can also be pre-defined. Central Switch for Viewing automatically Available Communication Media on Connection Failure The independent appearance of the window with the connection media can be annoying with a frequent media change and new connection build-up, eg. when as connection mode always is chosen. This can be disabled centrally at the SEM. In the client template of the SEM under Restrictions the preconfiguration right has to be set under Connection / Available Connection Media. Under View the new option Show dialog for available communication media on failed connection appears. At this point you can disable this dialog. At the client the automatic can be turned off in this case, by deleting the check from the checkbox in the dialog of Available Communication Media (see main menu Connection / Available Communication Media. The Translation/Resolution of Environment Variables into Local Paths Things can be configured on the monitor of the client under different menu points so that an external application is started automatically in conjunction with the connection build-up or a network switch: page 12 of 31

- Configuration / LinkOptions / External Applications - Configuration / Logon Options / External Applications - Configuration / Firewall / Friendly Networks / Measures Environment variables, which are input here, are resolved or converted on closing and saving of the intended configuration (with OK) into the relevant local path. Also on inputting a configuration file ncpphone.cfg and ncpphone.cnf the general environement variable is converted by the SEM. The following variables are supported: NCP variables: %SYSTEMROOT%, %INSTALLDIR%, %PROGDIR% Windows Environment Variables: eg: NcpClntInstallPath, ProgramData,... The path to be resolved of the application can contain empty characters, must be set in speech marks, though. EG: "%INSTALLDIR%Ncp Client Cmd.exe" /connect Entry in the Log Book of the Enterprise Clients When Parameter Locks are Unlocked The following entries are written into the log book should the parameter locks be unlocked or relocked: On the parameter locks being unlocked: INFO - MONITOR: Unlock parameters -> successful ERROR - MONITOR: Unlock parameters -> failed On the locks being relocked: INFO - MONITOR: Lock parameters Extended Options with new Management Client Plugin Within the extended options in the management client plug-in all ncpmon.ini entries of the Client can be defined. The condition is the usage of the client plugin 10.00 / 23158. Changing the Password Entry Dialog to Non-Modal Modal dialogs (eg: pin entry, password check) stop the status display of the client (eg: FND display in the system tray). The modal dialogs are therefore switched to non-modal. Automatic Tunnel Build-up without User Entries before Windows Logon The NCP Secure Enterprise Client builds up a VPN tunnel immediately after the system start without the user having to enter a password or a PIN before Windows Logon. Pre-requisites: The client exclusively uses a hardware certificate to extend the authentication, and the VPN profile to be used automatically (in the basic settings set as standard profile after every new start) has the following configuration settings: - Line Management / Connection Mode always : causes a continuous connection build-up regardless of waiting data flow or user entries. Customer-specific Adaptation for OTP Field Identifier The file NCPMON.INI can be edited in order to be able to see the fields in mixed architectures for the same inputted values, also with the same field titles. page 13 of 31

Example: in the dialog for the OTP registration there is the field title PIN and One Time Password. Should the value of the windows code word be entered into the PIN field and the value of a token be entered into the one time password field, then at the same time the relevant field title can be changed. That can be done via the client plug-in of the SEM under the new title Extended Options. Alternatively the NCPMON.INI can also be modified: After opening the file, look for the configuration section [OTP]. Then change the field title on the right next to the equals sign: [OTP] Caption_User = User name: Caption_Pin = Windows code word: Caption_Pw = Token: Should the titles be changed in several languages, the abbreviation name of the language must be added as an annex note. If there is no entry for the language in the GUI then the entry will be used without the annex note. [OTP] Caption_Pin_de = Windows code word: Caption_Pin_en = Windows Password: Caption_Pin_fr = Windows Mot de passe: Caption_Pin_es = Windows Contraseña: Caption_Pw_de = Token: Caption_Pw_en = Token: Caption_Pw_fr = Token: Caption_Pw_es = Token: Deactivate WLAN Adapter with Plugged in LAN Cable With help of the function "Deactivate WLAN Adapter with plugged in LAN cable" mobile teleworkers are saved some manual switching. As soon as a teleworker, who is connected via WLAN with the company network, plugs the LAN cable into his Notebook inhouse, the WLAN adapter is deactivated and the LAN connection into the company network is used. That happens independent of whether the NCP WLAN manager or that of an unknown producer is used. When the LAN cable is unplugged, the WLAN adapter is again activated. The function is situated in the monitor configuration for the WLAN settings under "Options". It is only visible with a license key >= 10.00. page 14 of 31

2. Improvements / Problems Resolved Improving Friendly Net Detection With this optimization the Entry Client carries out the certification checking of the incoming FND server certificates correctly. 3. Known Issues None 4. Getting Help for the NCP Secure Enterprise Client (Win 32/64) To ensure that you always have the latest information about NCP s products, always check the NCP website at: http://www.ncp-e.com/en/downloads/software/version-information.html For further information about the Enterprise Client, visit: http://www.ncp-e.com/en/products/centrally-managed-vpn-solution/managed-vpn-client-suite.html For further assistance with the NCP Secure Enterprise Client (Win32/64), visit: http://www.ncp-e.com/en/company/contact.html page 15 of 31

Service Release: 10.00 Revision 21900 Date: February 2015 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 8.x (32 and 64 bit) Windows 7 (32 and 64 bit) Windows Vista (32 and 64 bit) 1. New Features and Enhancements None 2. Improvements / Problems Resolved Improvements to the Friendly Net Detection With this optimization the Enterprise Client correctly executes the certificate check of the incoming FND server certificate. 3. Known Issues None 4. Getting Help for the NCP Secure Enterprise Client (Win 32/64) To ensure that you always have the latest information about NCP s products, always check the NCP website at: http://www.ncp-e.com/en/downloads/software/version-information.html For further information about the Enterprise Client, visit: http://www.ncp-e.com/en/products/centrally-managed-vpn-solution/managed-vpn-client-suite.html For further assistance with the NCP Secure Enterprise Client (Win32/64), visit: http://www.ncp-e.com/en/company/contact.html page 16 of 31

Service Release: 10.00 Revision 21567 Date: January 2015 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 8.x (32 and 64 bit) Windows 7 (32 and 64 bit) Windows Vista (32 and 64 bit) 1. New Features and Enhancements None 2. Improvements / Problems Resolved Improvements to the Update Process When performing a local update using the MSI installer, the license details from the previous version are carried forward, without the need to re-enter license key or serial number. Improvements in connection with Strong Authentication using OTP An error occurred when the one-time-password was incorrectly entered and connection mode "always" was in use. This problem has been resolved. MSI-Installation without Credential Provider as Default When using the MSI installer, the option "Credential Provider" is no longer activated by default. 3. Known Issues None 4. Getting Help for the NCP Secure Enterprise Client (Win 32/64) To ensure that you always have the latest information about NCP s products, always check the NCP website at: http://www.ncp-e.com/en/downloads/software/version-information.html For further information about the Enterprise Client, visit: http://www.ncp-e.com/en/products/centrally-managed-vpn-solution/managed-vpn-client-suite.html For further assistance with the NCP Secure Enterprise Client (Win32/64), visit: http://www.ncp-e.com/en/company/contact.html page 17 of 31

Major Release: 10.00 Revision 20921 Date: December 2014 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows 8.x (32 and 64 bit) Windows 7 (32 and 64 bit) Windows Vista (32 and 64 bit) 1. New Features and Enhancements New Enterprise Client Plug-ins for SEM 3.x In order to be able to manage and support the new features of the NCP Secure Enterprise Client (Win 32/64) from SEM 3.x, the following plug-ins are required: Firewall Plug-in Version 2.30 Build 22 Client Plug-in Version 10.00 Build 43 Binding the Enterprise Client to a SEM 3.x After being initialized, an NCP Secure Enterprise Client is permanently bound to its "owning" SEM. Binding is performed during the initial tailoring of the Client software. The process is as follows: after software rollout and installation but before the Client is personalized, user enters his or her credentials (username and authentication code) and "Connects", connection established between Client and SEM, via which the first update of personal configuration takes place, unique serial number downloaded for the Client. From this point onwards, the Client software is licensed and permanently bound to the SEM; that SEM is then responsible for the corresponding configurations and serial numbers of "its" Clients. The optional 30 day free-trial period can only be used before the Client is bound to its SEM, i.e. before initialization. The licensing feature means that an Enterprise Client is always bound to the management system from which it received its serial number. The Client binding is implemented as an additional security feature. After a period of 16 days expires after the last connection was established between Client and the company network and the SEM, the Client enters a (non-functional) state which only allows connections to the management system in the company network (where configuration and serial number with initialized values is stored). Immediately after that connection is established, the Client returns to its normal state. If, after the 16 days have expired, the Client is in the non-functional state, a VPN tunnel is indicated in orange. If the "orange" tunnel is visible to the user, this means that he/she must disconnect the existing connection and select a connection profile via which the company network and the SEM can be reached. Only after the license has been refreshed, as described above, can the Client establish connections to other VPN gateways that are not in the company network. In VPN environments where a Client always establishes a VPN tunnel to the company network, the license refresh takes place un-noticed by the user. page 18 of 31

MSI Installer - Updating to NCP Secure Enterprise Client Version 10.0 NCP Secure Enterprise Client version 10.00 software is distributed in the Microsoft.msi format. The impact of this move to the new format is dependent on how the Client software is distributed: Updates using SEM software distribution As before, updates are read in to the SEM and distributed from the SEM. Newly rolled out devices are installed using the MSI Installer and all (existing and newly installed) systems subsequently receive updates via SEM. Updates from SEM are NOT MSI Updates. Updates NOT using SEM software distribution All NCP Secure Enterprise Client software versions earlier than 10.00, must first be de-installed using the Microsoft "Programs and Features" functions. Then the new software can be installed from the.msi package; existing profiles can be preserved across the update. Subsequent updates can be applied, when available, using the MSI Update feature. Enhanced Connection Modes Connection Mode has been enhanced with two additional modes and the selections have been given more explanatory names as follows: manual / (default Connection Mode) When this mode is set, the user must manually establish the VPN connection by pressing "Connect". The connection will be disconnected dependent on timeout settings. If timeout is set to null (0) the connection must be disconnected manually. automatic (connection initiated by data transfer) When this mode is set, the Client software automatically establishes the connection as soon as data must be transferred across the connection. How the connection is disconnected is dependent on how the Client is configured, i. e. according to application requirements and profile settings. always When Connection Mode is set to "always", a VPN connection is always established automatically when the Client starts. Connection establishment is independent of the "Connect" button, of the onset of data transfer, or of how the monitor is set to be displayed variable (Connect starts "automatic" mode) When this mode is set, the first VPN connection is established manually (by pressing "Connect") The mode used to establish the next connection is dependent on how the previous connection was disconnected: if the connection was disconnected due to a timeout, then the next connection will be established whenever data transfer to a remote host is initiated by a Client application. If the connection was disconnected manually (by pressing "Disconnect")then the next connection must be established manually. If timeout is set to zero (0), i.e. no timeout, then the connection must be disconnected manually. Important: if connection mode is set to "manual" then activate a timeout (i.e. set timeout to non zero) in order to automate disconnection. variable (Connect starts "always" mode) When this mode is set, the first time "Connect" is pressed to establish a VPN connection, the connection mode is set to "always". This "always" mode stays set until the monitor is closed, when the mode is changed back to "variable (Connect starts "always" mode)". page 19 of 31

Extended Log Settings Under the monitor menu "Help/Extended Log Settings" the maximum log-entries retention period (in days) can be defined. Execution of the RWSCMD and NcpClientCmd command-line tools, including the calling parameters, can be written to a log file. To do this the application must be activated in the "Extended Log Settings". Alternatively this can be done by adding the line "[RWSCMD]Logs=1" to the NCPMON.INI. The output is logged to "RwscmdLog.txt" in the log directory. Enhancements to the Support Assistant The support assistant has been enhanced to enable the Microsoft log file from the driver installation to be included. The following files are included, if present: WINDOWSDIR\inf\setupapi.dev.log WINDOWSDIR\inf\setupapi.app.log WINDOWSDIR\inf\setupapi.setup.log IKEv2 Profile Configuration - GUI Improvements IKEv2 based polices can be defined in the Client monitors' IPsec settings. IKEv2 key exchange is then handled according to these settings. Further IKEv2 configuration settings are made in a profile's standard configuration, where the corresponding authentication can be selected - Certificate, Pre-shared Key or EAP. The input fields for username and password or the IKE ID are blanked out, dependent on which authentication method is chosen, In the profile settings under "IPsec" the required IKEv2 policy can be selected, unless automatic mode has been chosen. In addition the Diffie-Hellman and PFS Groups can be selected which will be used for the elliptical curve IKEv2 key exchange (ECP with DH Groups: 19, 20, 21, 25, 26) The "Policy Editor" button can be used to switch directly from the IPsec profile settings to the IPsec policies configuration. Support for Elliptic Curves in Certificates and Key Exchange Processes (ECC, Elliptic Curve Cryptography) Various storage media and locations can be accessed when using certificates that employ Elliptical Curve Cryptography. Such certificates can be read from PKCS#12 files or from PKCS#11 or PC/SC interfaces via a smart card reader, or they can be accessed via the Windows CSP or CNG. Verification of signatures using ECC is only supported under IKEv2. Therefore newer smart cards such as TCOS 3.0 V2, which only employ Elliptical Curve Cryptography, can only be used in connection with IKEv2 connections. Checking that Data is Passing Through the Tunnel In locations with poor mobile wireless reception, there is a chance that, despite a VPN tunnel being established and marked green, data is not actually transferred across the tunnel. In order to give the correct feedback to the user in such a situation, "Tunnel Traffic Monitoring" can be enabled in the Client connection profile under the "Line Management" folder; this causes a configurable, target address in the page 20 of 31

remote network to be automatically pinged periodically. The VPN tunnel status is modified in line with the response from the ping. AES-GCM - Galois/Counter Mode Galois/Counter Mode (GCM), an authenticated encryption algorithm, is a mode of operation for symmetric key cryptographic block ciphers that combines encryption with integrity protection. It has been widely adopted because of its efficiency and performance. AES_GCM 128 or 256 can be selected as the encryption algorithm in IPsec or IKEv2 profiles; doing so removes the need for additional integrity algorithms Firewall: New Option: "Reject Outgoing Traffic" When set, outgoing packets are rejected and a corresponding acknowledgement message returned to the sending application. Support for xdsl (PPP over Capi) Communication Medium and PPTP Withdrawn Support for IPsec over L2TP Withdrawn MSI Installer NCP-specific Functions Adding a.cnf file when installing When installing a.msi package, a.cnf file can be included in the installation. In previous setup procedures the.cnf file had to be copied to the installation directory. Now the installer copies the.cnf autonomously to the installation directory, providing the.cnf file is stored in the directory from which the.msi package, (or the installer as a.exe file) is to be executed. The return value from the copy is ignored. If errors occur, the installation is not aborted. Transferring installation properties via a.cnf file While previously a.cnf file could be created at the SEM which could be used to transfer setup details about the installation directory, the Start menu and network settings, this feature is no longer supported. Instead the installation directory can be passed via the INSTALLDIR property to the called.msi package. e. g.: msiexec /i myproduct.msi INSTALLDIR=c:\program\company\product myproduct.exe /v"installdir=c:\program\company\product" There are no replacement methods for setting the Start menu or the network settings. Adding files during the installation Additional files, for example certificates or customer specific project logo files (CBO) which should be included in the setup can be installed. Previously a directory ncple, was created under "Disk1" from where all files and directories were recursively copied to the installation directory. This is now performed in a different way. If a directory IMPORTDIR is located in the directory from which the.msi package, (or the installer as a.exe file) is to be executed, this directory is copied recursively to the installation directory. The return value from the copy is ignored. If an error occurs, the installation is not aborted. As such files are not recognized by the installer, these are neither updated nor de-installed. Another mechanism for adding files, icons, registry entries, etc. to an installation is the transform file. Using the admin tools from various software manufacturers (such as InstallShield, SuperOrca), the.msi page 21 of 31

package can be opened, any features, components, files etc., added, and a transform file created which can be passed as a parameter to the installation. msiexec /i myproduct.msi TRANSFORM=mytransfom.mst This is the officially supported method for extending an existing.msi package. The advantage is that the extensions are known to the installer and can be updated and de-installed by the installer. Executing a batch file during the installation If a batch file NcpInstall.bat is located in the directory from which the.msi package, (or the installer as a.exe file) is to be executed, this file is executed as the last process in the installation. The return value from the execution is ignored. If an error occurs during execution of the batch file, the installation is not aborted. The installer is unaware of the execution and therefore cannot manage it. Starting a test version immediately In many projects there is the wish to "Start the test version now" when starting the monitor but without the need to prompt the user. This can be achieved using the command line parameter "STARTTESTVERSION". msiexec /i myproduct.msi STARTTESTVERSION=1 Silent Installation und De-installation The previous "silent installation" has been replaced by a new form, handled by the installer. Its own "silent installation" is used, initiated by the display options. e.g.: msiexec /i myproduct.msi /qn myproduct.exe /v"/qn" The previous form of "silent installation" is replaced with one which is initiated via the display options. e.g.: msiexec /x myproduct.msi /qn Logging Previously parts of the setup could be logged using the NCP specific SetupExt.ini. Now the Windows installer performs extensive logging. This can be configured using the logging options. e.g.: msiexec /i myproduct.msi /log "c:\temp\myinstall.log" myproduct.exe /v"/log "c:\temp\myinstall.log"" Deleting all files during de-installation Previously, during the last part of the de-installation, the user was asked whether personal files should deleted. Using "silent installation" the parameter -delall could be used for this purpose. This has now changed and is dependent on the type of de-installation. If the Client is de-installed using the assistant, the user is prompted as previously. If it is de-installed directly (no dialog), the user is not prompted as no personal files are deleted. In this case the command line parameter DELETEALL=1 can be used, causing all files to be deleted. e.g.: msiexec /x myproduct.msi DELETEALL=1 2. Improvements / Problems Resolved OpenSSL Version 1.0.1j OpenSSL 1.0.1j is used within the Client software. Security deficiencies associated with previous versions of the OpenSSL libraries are thereby resolved. 3. Known Issues none page 22 of 31

4. Getting Help for the NCP Secure Enterprise Client (Win 32/64) To ensure that you always have the latest information about NCP s products, always check the NCP website at: http://www.ncp-e.com/en/downloads/software/version-information.html For further information about the Enterprise Client, visit: http://www.ncp-e.com/en/products/centrally-managed-vpn-solution/managed-vpn-client-suite.html For further assistance with the NCP Secure Enterprise Client (Win32/64), visit: http://www.ncp-e.com/en/company/contact.html page 23 of 31

5. Features Central Management As the Single Point of Management, NCP s Secure Enterprise Management (SEM) provides functionality and automation for the rollout, commissioning and efficient use of Secure Enterprise Clients. The Secure Enterprise Management (SEM) makes use of a VPN connection or the LAN (when on the company network), to automatically provide NCP Secure Enterprise Clients with: configuration updates, certificate updates, and updates to the Update Client. Network Access Control / Endpoint Security The policies for Endpoint Security (Endpoint Policy Enforcement)) are created centrally at the Secure Enterprise Management (SEM) and each NCP Secure Enterprise Client is only permitted access to the company network in accordance with the corresponding rules. High Availability Services The NCP Secure Enterprise Client supports the NCP HA Services. These services are client / server based and can be used in two different operating modes: load balancing or failsafe mode. Regardless of the load on the server or whether a server has failed, the VPN connection to the corporate network is established and maintained reliably, in the background and without any delay for the user of the NCP Secure Enterprise Client. Operating Systems See Prerequisites on page 1. Security Features Support of the Internet Society s Security Architecture for IPsec and all the associated RFCs. Virtual Private Networking RFC conformant IPsec (Layer 3 Tunneling) IPsec Tunnel Mode IPsec proposals are negotiated via the IPsec gateway (IKE Phase 1, IPsec Phase 2) Communication only in the tunnel Message Transfer Unit (MTU) size fragmentation and reassembly Network Address Translation-Traversal (NAT-T) Dead Peer Detection (DPD) Anti-replay Protection page 24 of 31

Authentication Internet Key Exchange version 1 (IKE): Aggressive Mode and Main Mode, Quick Mode Pre-shared secrets RSA Signatures (and associated Public Key Infrastructure) Perfect Forward Secrecy (PFS) IKE Config. Mode for dynamic allocation of private IP (virtual) address from address pool Internet Key Exchange v2 (IKEv2): Pre-shared secrets RSA Signatures (and associated Public Key Infrastructure) Extended Authentication Protocol (EAP) - username and password used to authenticates NCP Secure Enterprise Client with VPN gateway, PKI certificate used to authenticate VPN gateway with Client EAP Types supported: PAP, MD5, MS-CHAP v2, TLS (selected by responder) IKEv2 Mobility and Multihoming Protocol (MOBIKE) Perfect Forward Secrecy (PFS) IKE Config. Mode for dynamic allocation of private IP (virtual) address from address pool User authentication: User Authentication via GINA/Credential Management Windows Logon over VPN connection XAUTH (with IKEv1) for extended user authentication One-time passwords and challenge response systems Authentication details from certificate (prerequisite PKI) Support for certificates in a PKI: Soft certificates, Smart cards, and USB tokens: Multi Certificate Configurations Seamless rekeying PAP, CHAP, MS-CHAP v2 Pre-Authentication (Authentication before VPN establishment) IEEE 802.1x: Extensible Authentication Protocol Message Digest 5 (EAP-MD5): Extended authentication relative to switches and access points (layer 2) Extensible Authentication Protocol Transport Layer Security (EAP-TLS): Extended authentication relative to switches and access points on the basis of certificates (layer 2) Secure hotspot logon using HTTP or EAP RSA SecurID ready Encryption and Encryption Algorithms Symmetrical: AES-GCM 128, 256 bits (only IKEv2 & IPsec); AES-CTR 128, 192, 256 bits (only IKEv2 & IPsec)); AES (CBC) 128,192,256 bits; Blowfish 128,448 bits; Triple-DES 112,168 bits Asymmetrical: RSA to 2048 bits, dynamic processes for key exchange page 25 of 31

Hash / Message Authentication Algorithms SHA1, SHA-256, SHA-384, SHA-512, MD5 Diffie Hellman groups 1, 2, 5, 14, 15-18, 19-21, 25-26 used for asymmetric key exchange and PFS Diffie Hellman groups 19, 20, 21, 25,26 employ Elliptical Curve Cryptography algorithm (only under IKEv2). Public Key Infrastructure (PKI) - Strong Authentication X.509 v.3 Standard Entrust ready Support for certificates in a PKI Smart cards and USB tokens PKCS#11 interface for encryption tokens (smart cards and USB) Smart card operating systems TCOS 1.2, 2.0 and 3.0 Smart card reader systems PC/SC, CT-API Soft certificates PKCS#12 interface for private keys in soft certificates PIN policy: administrative specification of PIN entry to any level of complexity Certificate Service Provider (CSP) for the use of user certificates in Windows certificate store Revocation: End-entity Public-key Certificate Revocation List (EPRL formerly CRL) Certification Authority Revocation List, (CARL formerly ARL) Online Certificate Status Protocol (OCSP) Certificate Management Protocol (CMP) i Personal Firewall Stateful Packet Inspection IP-NAT (Network Address Translation) Friendly Net Detection (Firewall rules adapted automatically if connected network recognized based on its IP subnet address, the DHCP server s MAC address or an NCP FND Server i ) Supports secure hotspot logon feature Start application before or after VPN establishment Differentiated filter rules relative to: Protocols, ports or IP addresses LAN adapter protection, Central administration (optional) ii Protect VMware Guest systems IPv4 and IPv6 support Option: "Reject Outgoing Traffic" Endpoint Security Endpoint Policy Enforcement ii page 26 of 31

Networking Features Secure Network Interface LAN Emulation NCP Virtual Ethernet adapter with NDIS interface Full support of Wireless Local Area Network (WLAN) Full support of Wireless Wide Area Network (WWAN) Network Protocol IPv4 protocol IP traffic inside and outside VPN tunnel can use IPv4 protocol IPv6 protocol IP traffic used to establish and maintain the VPN tunnel can use IPv6 protocol (Client to VPN gateway and Client to NCP Secure Enterprise HA Server), IP traffic inside any VPN tunnel MUST use IPv4 protocol. Communications Media LAN Wi-Fi GPRS / 3G (UMTS, HSDPA), GSM (incl. HSCSD) Windows 7 Mobile Broadband support Messaging Center (send & receive SMSs) xdsl (PPPoE) PSTN ISDN Automatic Media Detection (AMD) External Dialer Seamless Roaming (LAN / Wi-Fi / GPRS / 3G) Dialers NCP Secure Dialer Microsoft RAS Dialer (for ISP dial-up using dial-up script) Line Management Dead Peer Detection with configurable time interval Wi-Fi Roaming (handover) Connection Modes manual / (default Connection Mode) automatic (connection initiated by data transfer) always variable (Connect starts "automatic" mode) variable (Connect starts "always" mode) Inactivity Timeout (send, receive or bi-directional) Short Hold Mode Channel Bundling (dynamic in ISDN) with freely configurable threshold value Budget Manager Separate management of Wi-Fi, GPRS/3G, xdsl, PPTP, ISDN and modem connections Duration or volume based budgets page 27 of 31

Management of GPRS/3G roaming costs Separate management of multiple Wi-Fi access points IP Address Allocation Dynamic Host Control Protocol (DHCP) Domain Name Service (DNS) : gateway selection using public IP address allocated by querying DNS server VPN Path Finder NCP Path Finder Technology Fallback to HTTPS (port 443) from IPsec if neither port 500 nor UDP encapsulation are available iii Data Compression IPsec Compression: lzs, deflate Link Firewall Stateful Packet Inspection Additional Features VoIP prioritization UDP encapsulation IPsec roaming iii Wi-Fi roaming iii Additional Features (cont.) WISPr support (T-Mobile hotspots) Point-to-Point Protocols PPP over Ethernet PPP over GSM, PPP over ISDN, PPP over PSTN. LCP, IPCP, MLP, CCP, PAP, CHAP, ECP page 28 of 31

Standards Conformance Internet Society RFCs and Drafts Security Architecture for the Internet Protocol and associated RFCs.(RFC 2401 2409) Internet Key Exchange Protocol v1 (IKE) (includes IKMP/Oakley) (RFC 2406), IKE Extended Authentication (XAUTH), IKE configure (IKECFG) and Dead Peer Detection (DPD) Negotiation of NAT-Traversal in the IKE (RFC 3947) Internet Key Exchange Protocol v2 (IKEv2) (RFC 4306, 5996) IKEv2 Mobility and Multihoming Protocol (MOBIKE) (RFC 4555) UDP encapsulation of IPsec Packets (RFC 3948), Additional Extended Key Usages: id-kp-ipsecike (1.3.6.1.5.5.7.3.17) in accordance with RFC 4945 anyextendedkeyusage (2.5.29.37.0) in accordance with RFC 4945 IKEIntermediate (1.3.6.1.5.5.8.2.2) in accordance with draft-ietf-ipsec-pki-req-03 FIPS Inside The Secure Client incorporates cryptographic algorithms conformant to the FIPS standard. The embedded cryptographic module incorporating these algorithms has been validated as conformant to FIPS 140-2 (certificate #1051). FIPS conformance will always be maintained when any of the following algorithms are used for establishment and encryption of the IPsec connection: Diffie Hellman Group: Group 2 or higher (DH starting from a length of 1024 Bit) Hash Algorithms: SHA1, SHA 256, SHA 384, or SHA 512 Bit Encryption Algorithms: AES with 128, 192 or 256 Bit or Triple DES Usability Features APN from SIM card The APN (Access Point Name) defines the access point of a mobile data connection at a provider. If the user changes provider, the system automatically takes APN data from the corresponding SIM card and uses it in client configuration. This makes it easy to use inexpensive, local providers abroad. page 29 of 31

Secure Client Monitor Notes i Intuitive Graphical User Interface Language support (English, German, French, Spanish) Monitor & Setup: en, de, fr, es Online Help and License en, de, es Icon indicates connection status Client Info Center overview of : General information - version#, MAC address etc Connection current status Services/Applications process(es) status Certificate Configuration PKI certificates in use etc. Configuration, connection statistics, Log-book (color coded, easy copy&paste function) Integrated support of Mobile Connect Cards (PCMCIA, embedded) Password protected configuration and profile management Trace tool for error diagnosis Maximum log-entries retention period (in days) can be defined Monitor can be tailored to include company name or support information Custom Branding Option Internet Availability Tests VPN Tunnel Traffic Monitoring (Tunnel Availability Tests) If you wish to download NCP's FND Server as an add-on, please click here: http://www.ncp-e.com/en/downloads/software.html ii Prerequisite: NCP Secure Enterprise Management iii Prerequisite: NCP Secure Enterprise VPN Server V 8.0 and later page 30 of 31