IPSec and SSL VPN Client
SecuExtender VPN Client
SecuExtender Zero Trust IPSec/SSL VPN Client Subscription
| Service Category | Part Number | Description | 
|---|---|---|
| Connectivity | SECUEXTENDER-ZZ3Y01F | SecuExtender; Zero Trust IPSec/SSL VPN Client Subscription for Windows/macOS, 1-user; 3YR | 
| Connectivity | SECUEXTENDER-ZZ5Y01F | SecuExtender; Zero Trust IPSec/SSL VPN Client Subscription for Windows/macOS, 1-user; 5YR | 
| Connectivity | SECUEXTENDER-ZZ3Y05F | SecuExtender; Zero Trust IPSec/SSL VPN Client Subscription for Windows/macOS, 5-user; 3YR | 
| Connectivity | SECUEXTENDER-ZZ3Y10F | SecuExtender; Zero Trust IPSec/SSL VPN Client Subscription for Windows/macOS, 10-user; 3YR | 
| Connectivity | SECUEXTENDER-ZZ3Y50F | SecuExtender; Zero Trust IPSec/SSL VPN Client Subscription for Windows/macOS, 50-user; 3YR | 
- Windows 10, Windows 11 (64-bit)
 - macOS 10.15 or above
 
- 1 GHz x86-64 processor
 - RAM: 2 GB
 - 40 MB available disk space
 
Hash Algorithms
- SHA2-HMAC 256-bit authentication
 - SHA2-HMAC 384-bit authentication
 - SHA2-HMAC 512-bit authentication
 
Encryption
- AES 128, 192, 256-bit encryption
 - AES GCM 128, 192, 256-bit encryption
 - AES CTR 128, 192, 256-bit encryption
 
Diffie Hellman Group Support
- Group 14: MODP 2048
 - Group 15: MODP 3072
 - Group 16: MODP 4096
 - Group 17: MODP 6144
 - Group 18: MODP 8192
 - Group 19: ECP 256 (IKEv2 only)
 - Group 20: ECP 384 (IKEv2 only)
 - Group 21: ECP 512 (IKEv2 only)
 
Diffie-Hellman Key Group Support
- DH 28 (BrainpoolP256r1) [RFC 5639]
 
Authentication Mechanism
- PSK (Pre-shared Key)
 - EAP (Login/Password)
 - PKCS #11 Certificate
 - Certificate authentication methods:
	
- Method 1: RSA Digital Signature with SHA-2 [RFC 7296]
 - Method 9: ECDSA “secp256r1” with SHA-2 (256 bits) on the P 256 curve [RFC 4754]
 - Method 10: ECDSA “secp384r1” with SHA-2 (384 bits) on the P 384 curve [RFC 4754]
 - Method 11: ECDSA “secp521r1” with SHA-2 (512 bits) on the P 521 curve [RFC 4754]
 - Method 14: Digital Signature RSASSA-PSS and RSASSA PKCS1 v1_5 with SHA-2 (256/384/512 bits) [RFC 7427]
 
 
X.509 Certificate Management
- DER/PEM
 - PFX/P12
 
IKEv1
- End of support for the vulnerable IPSec/IKEv1protocol, which has been deprecated by the IETF in September 2019
 - End of support for vulnerable algorithms DES, 3DES, SHA-1, DH 1, DH 2, DH 5 in IPSec/IKEv2 (even in “auto” mode)
 
IKEv2 Support
- Mode CP
 - IP fragmentation
 - NAT-Traversal
 - Childless IKE (RFC 6023)
 - Extended Sequence Number (ESC) (RFC 4304)
 
Endpoint Visibility
- Collecting endpoint information for admission control
	
- MAC address
 - Inner IPv4 address
 - Hostname
 - Unique ID
 - Zyxel client version
 - OS type
 - OS version
 - System manufacturer
 - System model
 
 
Networking
- NAT traversal (Draft 1, 2 & 3)
 - Dead Peer Detection (DPD)
 - Redundant gateway
 
Connection Technologies
- Dial-up modem
 - GPRS
 - Ethernet
 - WiFi
 
SSL VPN*1*2
- TLS Requirements
	
- TLS 1.2 Medium
 - TLS 1.2 High
 - TLS 1.3
 
 - Hash Algorithms
	
- SHA2-HMAC 224-bit authentication
 - SHA2-HMAC 256-bit authentication
 - SHA2-HMAC 384-bit authentication
 - SHA2-HMAC 512-bit authentication
 
 - Encryption
	
- AES CBC 128-bit encryption
 - AES CBC 192-bit encryption
 - AES CBC 256-bit encryption
 
 - Authentication Mechanism
	
- PSK (Pre shared key)
 - EAP (Login/Password)
 - PKI (X.509) Certificate
 - Multiple Authentication
 
 - End of Support for Vulnerable Algorithms/Protocols
	
- MD5
 - SHA-1
 - BF-CBC
 - TLS 1.1
 - LOW security suite for TLS V1.2
 
 - Compression Is No Longer Enabled by Default
 
* All specifications are subject to change without notice.
- *1: Select SSL VPN to connect to a USG FLEX H series firewall.
 - *2: When connecting the SecuExtender IPSec/SSL VPN Client to a USG FLEX or ATP firewall, you can only use IPSec/IKEv2, because SSL VPN is not supported.