Téléchargement strongSwan VPN Client - v2.2.1

Téléchargement strongSwan VPN Client - v2.2.1
Package Name org.strongswan.android
Category ,
Latest Version 2.2.1
Get it On Google Play
Update December 07, 2019 (5 years ago)

Veuillez télécharger et partager strongSwan VPN Client - v2.2.1, l'une des Applications vedettes de la catégorie Communication.
De plus, d'autres Applications que vous pouvez télécharger en tant que Temporary Numbers - Receive Sms Free Phone Numbers, WhatsApp Messenger v2.21.18.9 MOD APK (Many Features) MOD APK, Psiphon Pro v342 APK + MOD (Premium Subscribed) MOD APK, CryptoTab Browser Pro APK Patched MOD APK, UC Browser (MOD, Many Features) MOD APK, WhatsApp Business. Si vous êtes satisfait de strongSwan VPN Client - v2.2.1.

Lancée par strongSwan Project, strongSwan VPN Client - v2.2.1 est l'une des meilleures applications de téléphonie mobile gratuites et les meilleures disponibles aujourd'hui. Située dans la catégorie Communication de l'App Store.

Le système d'exploitation minimum pour strongSwan VPN Client - v2.2.1 est Android 4.0.3+ et plus. Vous devez donc mettre à jour votre téléphone si vous ne l'avez pas déjà fait.

Sur APKDroid, vous obtiendrez un strongSwan VPN Client - v2.2.1 téléchargement gratuit d'APK, la dernière version étant 2.2.1, date de publication 2019-11-19, la taille du fichier est 6.5 MB.Selon les statistiques du Google Play Store, il y a environ 1000 téléchargements. Les applications téléchargées ou installées individuellement sur Android peuvent être mises à jour si vous le souhaitez. Mettez à jour vos applications également. Vous permet d'accéder aux dernières fonctionnalités et améliore la sécurité et la stabilité de l'application. Profitez-en maintenant !!!

strongSwan VPN Client - v2.2.1

Official Android 4+ port of the popular strongSwan VPN solution.# FEATURES AND LIMITATIONS # * Uses the VpnService API featured by Android 4+. Devices by some manufacturers seem to lack support for this - strongSwan VPN Client won't work on these devices! * Uses the IKEv2 key exchange protocol (IKEv1 is not supported) * Uses IPsec for data traffic (L2TP is not supported) * Full support for changed connectivity and mobility through MOBIKE (or reauthentication) * Supports username/password EAP authentication (namely EAP-MSCHAPv2, EAP-MD5 and EAP-GTC) as well as RSA/ECDSA private key/certificate authentication to authenticate users, EAP-TLS with client certificates is also supported * Combined RSA/ECDSA and EAP authentication is supported by using two authentication rounds as defined in RFC 4739 * VPN server certificates are verified against the CA certificates pre-installed or installed by the user on the system. The CA or server certificates used to authenticate the server can also be imported directly into the app. * IKEv2 fragmentation is supported if the VPN server supports it (strongSwan does so since 5.2.1) * Split-tunneling allows sending only certain traffic through the VPN and/or excluding specific traffic from it * Per-app VPN allows limiting the VPN connection to specific apps, or exclude them from using it * The IPsec implementation currently supports the AES-CBC, AES-GCM, ChaCha20/Poly1305 and SHA1/SHA2 algorithms * Passwords are currently stored as cleartext in the database (only if stored with a profile) * VPN profiles may be imported from files (this is the only reason why the app requests android.permission.READ_EXTERNAL_STORAGE)Details and a changelog can be found on our wiki: https://wiki.strongswan.org/projects/strongswan/wiki/AndroidVPNClient# EXAMPLE SERVER CONFIGURATION #Example server configurations may be found on our wiki: https://wiki.strongswan.org/projects/strongswan/wiki/AndroidVPNClient#Server-ConfigurationPlease note that the host name (or IP address) configured with a VPN profile in the app *must be* contained in the server certificate as subjectAltName extension.# FEEDBACK #Please post bug reports and feature requests on our wiki: https://wiki.strongswan.org/projects/strongswan/issuesIf you do so, please include information about your device (manufacturer, model, OS version etc.).The log file written by the key exchange service can be sent directly from within the application.

# 2.2.1 #- Fixes loading CRL/OCSP via HTTP on Android 9# 2.2.0 #- Makes the client's IKE identity configurable also when using EAP authentication- The certificate identity is now configured via text field with auto-completion instead of a drop-down field- Fixes an issue with ECDSA certificate selection on Android 10- Uses a newer API to detect network changes

Show more