What's new in TheGreenBow IPSec VPN Client 6.86 Build 009

Jun 22, 2021
  • Important Information concerning updates from previous versions:
  • Encrypted configuration files:
  • VPN configuration files that have been encrypted using versions of the Windows VPN Client prior to 6.8 cannot be imported into the Configuration Panel.
  • During a software update, the installer will convert the existing configuration before it automatically imports the file into the Configuration Panel.
  • Gateway certificate check:
  • By default, the gateway certificate will be checked each time a tunnel is opened.
  • It may be necessary to import the complete chain of certification authorities (CAs) to authenticate the gateway, either into the Windows store or into the VPN configuration file. You can change this default behavior, though we do not recommend doing so (Options menu -> PKI Options).
  • End of support for "weak" algorithms:
  • For security reasons, this version no longer supports the following algorithms: DES, 3DES, MD-5, SHA-1, DH 1-2, DH 5. If a previous configuration contains one of these algorithms, the installer will convert them to "auto" (automatic negotiation with the gateway).
  • If the gateway only supports this type of algorithm, you will not be able to establish a connection with this version of the VPN client.
  • New features in Windows Standard VPN Client 6.8:
  • Upgrade:
  • The following items will be preserved when updating from an older version:
  • software settings
  • VPN configuration file
  • License
  • All software components compiled for Windows 10 64-bit on Intel processors
  • Cryptography:
  • End of support for weak algorithms (DES, 3DES, MD-5, SHA-1, DH 1-2, DH 5)
  • Gateway certificate authentication:
  • Méthod 9: EC-DSA on elliptic curve secp256r1 with SHA-256 (RFC 4754)
  • Méthod 10: EC-DSA on elliptic curve secp384r1 with SHA-384 (RFC 4754)
  • Méthod 11: EC-DSA on elliptic curve secp521r1 with SHA-512 (RFC 4754)
  • Méthod 14: Digital Signature Authentication RSA (RFC 7427)
  • Initiation IKE Childless (RFC 6023)
  • ESN: Extended Sequence Number (RFC 4304)
  • Tokens and smart cards:
  • Support for CNG API (Microsoft Crypto API: Next Generation)
  • End of support for Microsoft CSP API in IKEv2
  • VPN security policy protection:
  • Option for restricting the VPN configuration to OS administrators only
  • Password has been removed from Configuration Panel
  • Increased configuration file protection with SHA-2
  • OpenVPN (SSL/TLS):
  • Support for Lz4 compression
  • Feature: New MSI installer which supports updates of previous versions, including recovery of licence, VPN security policy and installation parameters
  • Feature : Optimized for Windows 10 on Intel 64-bit processors
  • Feature : Authentification of the gateway's certificate
  • Feature : Support of RFC 4754 - methode 9: EC-DSA on secp256r1 elliptic curve with SHA-256
  • Feature : Support of RFC 4754 - method 10: EC-DSA on secp384r1 elliptic curve with SHA-384
  • Feature : Support of RFC 4754 - method 11: EC-DSA on secp521r1 elliptic curve with SHA-512
  • Feature : Support of RFC 7427 - method 14: Digital Signature Authentication RSA
  • Feature : Support of RFC 6023 - Initiation IKE Childless
  • Feature : Support of RFC 4304 - Extended Sequence Number (ESN)
  • Feature : Support of CNG (Microsoft Crypto API: Next Generation)
  • Feature : Renforcement de la protection des fichiers de configuration avec SHA-2
  • Feature : Prise en charge de la compression Lz4 pour OpenVPN (SSL/TLS)
  • Feature : VPN security policy access restricted to Windows administrator (specific password no longer needed)
  • Improvement: Removal of vulnerable algorithms: DES, 3DES, MD-5, SHA-1, DH 1-2, DH5
  • Improvement : Removal of deprecated Microsoft API CSP support for tokens/smartcards in IKEv2
  • Improvement : Stronger protection of VPN configuration using SHA-2
  • Improvement : Update of SSL library to version 1.1.1.i
  • Improvement : After connected to a redundant gateway, the next time the tunnel is opened, the VPN Client tries to switch back to the main gateway
  • Bugfix : tunnel now closes when smartcard reader is pulled out

New in TheGreenBow IPSec VPN Client 6.64 Build 003 (Apr 2, 2020)

  • Feature: IKEv2: Possibility to open several tunnels (Child SA) simultaneously with the same Phase1 (IKE AUth)
  • Nota: In this version, it is possible to open up to 8 simultaneous tunnels for the same Phase1/IKE Auth.
  • Feature: Update OpenSSL to 1.1.1e.
  • Improvement: Possibility to modify the coordinates of the GINA window, and also the "foreground" mode.
  • BugFix: No traffic with AES GCM for particular packet sizes.
  • BugFix: Winstoreroaming with keyusage and dnpattern doesn't work properly.
  • BugFix: EAP Multiple Auth tunnel opens without certificate.
  • BugFix: "No socket" error after resume from standby/hibernation.
  • BugFix: TgbLogonUI: When renegotiating IKEV2 Auth tunnel displayed state is not correct.

New in TheGreenBow IPSec VPN Client 6.63 Build 004 (Aug 12, 2019)

  • BugFix: When Gina mode is enabled, the configuration panel may sometimes be empty (no VPN tunnel) after windows restart.
  • BugFix: Crash when receiving a gateway certificate which contains a specific SubjectAltName.
  • Bugfix: Administrator password management issues

New in TheGreenBow IPSec VPN Client 6.62 Build 002 (May 21, 2019)

  • Vulnerability fix: Possibility of a man-in-the-middle attack via the use of a CA stored in the Windows certificate store.
  • Vulnerability fix: Ability to start a browser for captive portal authentication disabled.
  • Vulnerability fix: Certificate date validity can be bypassed through the use of GeneralizedTime format.
  • Vulnerability fix: DOS upon malformed certificate reception.
  • Vulnerability fix: DOS while the software is in trace mode, with a UDP packet flood.
  • Vulnerability fix: Some padding bytes of the VPN configuration file signature can be patched.
  • Vulnerability fix: crash upon malformed SA reception.
  • Vulnerability fix: Listen port 1194 was open even if not required
  • Vulnerability improvement: Improvement of the CA handling in the Windows Certificate Store.
  • Feature: Display "No CRL" instead of "No CA" in console when appropriate.
  • Feature: New url for customized release.
  • Bugfix: BSOD: Crash in ForwardIPPacket when using FwpsQueryPacketInjectionState0.
  • Bugfix: BSOD after VPN up.
  • Bugfix: Smartcard roaming with different readers (smartcardroaming=5) doesn't work for IKEV1.
  • Bugfix: Unable to enter a lifetime in the main interface.
  • Bugfix: Display of a french button.
  • Bugfix: Error upon certificate selection with keyusage = 3.
  • Bugfix: With some specific PKI configuration, tunnel opens only once.

New in TheGreenBow IPSec VPN Client 6.60 Build 008 (Mar 22, 2019)

  • Feature: VPN Tunnel Fallback (for example: automatic fallback from an IPsec tunnel to an SSL tunnel when IPsec tunnel fails)
  • Feature: Implementation of administration and system logs, with ability to produce administration logs either locally, to the Windows Event Manager or to a Syslog Server
  • Feature: Windows Store Certificate Roaming:Ability to select automatically the user certificate from the Windows Certificate Store, based on criteria (like for smartcards)
  • Feature: Ability to select and store multiple CA (Certificate Authority) in the VPN Configuration
  • Feature: Support of Elliptic curve Diffie-Hellman (Diffie-Hellman group 19, 20, 21) for IKEv2
  • Feature: Support AES-GCM & AES CTR algorithms for IKEv2
  • Feature: Update OpenSSL library version
  • Feature: SSL: Add a way to change the receive socket buffer size (SO_RCVBUF)
  • Feature: SSL: Support of multiple remote networks
  • Feature: Option to disable DPD IKEv2
  • Feature: IKEv2: Support of multiple networks in the same remote TS, in CP mode
  • Feature: Global redesign of the interface (Configuration Panel) with a clearer organization of the configuration tabs (new "advanced" tab, homogenization of the tabs between IKEv1, IKEv2 and TLS)
  • Feature: Ability to configure wait time for gateway responses (timeout was previously set to 5 sec.)
  • Feature: Support of IAS smartcard
  • Feature: Support of ID Prime MD smartcard
  • Feature: Support of Gemalto MD smartcard ATR
  • Feature: Set ERRORLEVEL on /add, /replace, /importonce commands
  • Feature: Support of Microsoft Signing for W10 drivers
  • Feature: Prevent tunnels to work when several users are logged simultaneously
  • Feature: when rekeying, asking for X-Auth credentials is now configurable
  • Feature: Time-out on token PIN Code popup
  • Feature: Handling of PKCS8 (in addition to PKCS1) Private Key format
  • Improvement: Handling of uppercase/lowercase certificates "name" OID
  • Improvement: IKE Port change are supported for more gateways configurations
  • Improvement: Optimize VPN configuration loading and saving
  • Improvement: Gina mode : Progress bar for IKEv2 and SSL enhanced
  • Improvement: DPD, lifetime and IKE Ports are configurable for each tunnel
  • Improvement: IKEv2 doesn't support PKCS#8 private key format, but only PKCS#1
  • Improvement: Remote Sharing : RDP is not opened automatically from configuration panel
  • Improvement: "vpnconf /stop"" doesn't work from another user session
  • Improvement: PIN code is no more asked when the phase 1 is already up
  • BugFix: IKEv2 Fragmentation issue: some fragment sizes lead to Auth Fail or Syntax Error
  • BugFix: BSOD when receiving data in tunnel with a high rate
  • BugFix: IKEv2 and TPM: Unable to import user certificate in internal store
  • BugFix: DN pattern doesn't work properly for IKEv2
  • BugFix: IKE SA renegotiation fails with a Fortigate Gateway
  • BugFix: Remote ID mismatch on "DER ASN1 DN" with the same ASCII string
  • BugFix: Virtual interface: bad handling of ARP table to add/remove gateway IP address
  • BugFix: TLS Connection: renewal from gateway is not implemented, and tunnel closes after a while
  • BugFix: Error with 6.4x VPN Configuration using certificates with accents on smartcards
  • BugFix: Conversion tools: Ovpn2Tgb: verify-x509-name is not properly handled
  • BugFix: IKEv2: Sometimes tunnel doesn't open, IKE Initialization fails (error with "0")
  • BugFix: IKEv2 : No traffic to remote network.VirtualItf error 1 - 209 - 5010
  • BugFix: IKEv2 : Exporting a Single tunnel exports all Child SA
  • BugFix: IKEv1: Tunnel is not deleted when XAuth fails during a Phase 1 renegotiation
  • BugFix: Cannot open tunnel with a token inserted after the VPN Client starts
  • BugFix: IKEv2 child SA is not removed when tunnel is closed for DPD timeout reason
  • BugFix: IKEv2: no traffic when NATT port is changed for one tunnel, and UDP Encap enabled
  • BugFix: IKEv2: IPV4 DNS not set properly when Gateway sends an IPV6 address
  • BugFix: IKEv1 Traffic verification: 1st timer is not properly initialized

New in TheGreenBow IPSec VPN Client 6.45 Build 002 (Mar 22, 2019)

  • Bugfix: IkeV2: Fragmentation IkeV2 and DH algo set to auto => fragmentation is not selected.
  • Bugfix: InjectP12 command: new cert not update when closing the session.
  • Bugfix: IkeV2 Fragmentation issue: some fragment sizes lead to Auth Fail or Syntax Error.
  • Bugfix: IkeV2: Sometimes tunnel doesn't open, IKE Init fails (error with "0")
  • Bugfix: IkeV1 Fragmentation: Cisco Vendor ID is not correctly sent.

New in TheGreenBow IPSec VPN Client 6.45 Build 001 (Mar 22, 2019)

  • Feature: Fragmentation of IkeV1 based on MS-IKE doc.
  • Bugfix: Traffic issue when physical IP Address ends with .255 and virtual IP address = Physical IP address.

New in TheGreenBow IPSec VPN Client 6.44 Build 003 (Jul 5, 2018)

  • Feature: (Partner Specific) DH default algorithm is set to "No DH".
  • Feature: Support of Microsoft Signing for W10 drivers.
  • Improvement: SSL VPN: Reception Socket buffer sizes are increased to accept traffic peaks.
  • Improvement: Improvement of the automatic software activation when the subscription is going to expire.
  • Improvement: Improvement of the software activation mechanism if activation errors occure.
  • Bugfix: Remote ID mismatch on "DER ASN1 DN" with the same ASCII string.
  • Bugfix: IKEv2: DPD handling: Tunnel was closing when one DPD message is lost.
  • Bugfix: IKEv2 child SA is not removed when tunnel is closed for DPD timeout reason.
  • Bugfix: Could not open tunnel with mixed SujectAltName containing an IP address.
  • Bugfix: IKEv1: Traffic verification with pings doesn't work properly.
  • Bugfix: No traffic when virtual IP address ends with .255.
  • Bugfix: SSL VPN: When using TCP mode the tunnel may close unexpectedly.
  • Bugfix: Silent install is not silent on Windows Seven.
  • Bugfix: IKE SA renegotiation failed with a Fortigate gateway.
  • Bugfix: IKE SA renegotiation failed in a CHILD SA.
  • Bugfix: Error message "driver not signed" when installing VPN Client on Windows 10 with UEFI BIOS option Secure Boot Enabled.
  • Bugfix: IKEV2 EAP MultAuth tunnel closed after key renewal.
  • Bugfix: IKEV2 Multiple Auth: When changing an option in IKE SA Tab, certificate vanishes.

New in TheGreenBow IPSec VPN Client 5.51 Build 002 (Apr 17, 2013)

  • Feature: Support of Windows 8 32/64-bit.
  • Feature: Gina Mode supported on Windows Vista 32/64-bit, Windows 7 32/64-bit and Windows 8 32/64-bit.
  • Feature: Support of new Token ePass3003.
  • Feature: Added a password confirmation field when exporting a VPN Configuration.
  • Feature: ESP anti-replay service supported i.e. RFC 2401/4303.
  • Feature: Added several command lines (and setup init file) to better choose Certificates from Token or SmartCard in VPN Configuration. They are called PKI Options. For more details, look at our deployment guide on our website. 'KeyUsage' allows limiting access only to 'Authentication' certificates from the Token or SmartCard. 'SmartCardRoaming' allows setting the rule used to fetch a Certificate from the Token or SmartCard. 'Pkcs11Only' allows limiting access only to 'PKCS#11' certificates from the Token or SmartCard. 'NoCaCertReq' allows using Certificate with different Certificate Authority the VPN Gateway is using. 'PKICheck' Force the VPN Client to check the Certificate Root Authority when receiving a Certification from the VPN gateway.
  • Feature: The PKI Options are also manageable through the user interface via a new tab in the 'Tools' > 'Option…' window.
  • Feature: Exclusion of DHCP protocol from network filter to allow DHCP mechanism when network configuration forces everything in tunnel (0.0.0.0/0.0.0.0).
  • Feature: Algorithms SHA2 is supported to sign with a CSP smart card.
  • Feature: Korean and Farsi are now embedded as new languages, bringing to 25 the total number of languages.
  • Feature: Ability to open the current User Certificate Store when selecting a Certificate in the configuration Panel, instead of the local machine Certificate Store.
  • Feature: Gemalto .NET with CSP middleware supported on Windows Vista & Seven.
  • Feature: Enable auto import of VPN configuration if a specific configuration file name is available in the installation folder.
  • Improvement: New order to move the focus from one field to another with the tab key in the Configuration Panel > IPsec Phase 2 tab.
  • Improvement: Do not display systray popup on Phase1/Phase2 renegotiation.
  • Improvement: Extended the size of SmartCard PIN code field to be able to enter longer PIN code.
  • Improvement: Ability to activate the software on Windows machine where system folders like MyDocuments or ProgramData might or might not be available.
  • Improvement: Ability to connect to Wifi hotspot with VPN Configuration forcing all traffic in the tunnel (i.e. subnet mask 0.0.0.0).
  • Improvement: The 'Lock Access to Config Panel' password popup doesn't have focus.
  • Improvement: Ctrl+Alt+T is now the shortcut for Trace mode.
  • Improvement: Support of Cisco ASA special Config Mode behavior with a new option in the Global Parameters panel.
  • Improvement: Minor cosmetic.
  • Bug fixing: Once tunnel opened using Mode-Config, WINS value might be overwritten by DNS value.
  • Bug fixing: Unselect PKICheck might not be taken into account in some circumstances.
  • Bug fixing: A specific and large number of tunnel Phase 1 may crash the VPN Client in some circumstances.
  • Bug fixing: BSOD when Windows is coming back from sleep mode (Windows XP only).
  • Bug fixing: Finnish and Danish language typo in the Software Activation window.
  • Bug fixing: VPN tunnel might not open when another IPSec service is enabled on the machine, as port 500 and/or 4500 are used.
  • Bug fixing: VPN tunnel re-connection fails with some gateways because INITIAL-CONTACT was not sent.
  • Bug fixing: Debug log generation fails if software installation folder is changed by user during install.
  • Bug fixing: Phase1 Renegotiation fails when initiated by a StrongSwan gateway type.
  • Bug fixing: Silent uninstallation doesn't launch upgrade.
  • Bug fixing: The VPN Client cannot open a tunnel when using a Certificate with Unicode or UTF8 characters like Japanese characters.
  • Bug fixing: PKCS#11 middleware used instead of CSP middleware when SmartCardRoaming Option is set to either 2, 3, 4 or 5.
  • Bug fixing: No wrong PIN code popup when using Smart Card with CSP middleware.
  • Bug fixing: Alternate DNS/WINS are not applied if tunnel open when enabling 'Auto open this tunnel on traffic detection'.
  • Bug fixing: In Gina mode and 'Open tunnel' with Alternate DNS/WINS, the DNS/WINS are applied to Local Interface instead of Virtual Interface.
  • Bug fixing: Packet fragmentation not properly performed when modifying MTU size (some values) on Windows XP.
  • Bug fixing: Software upgrade fails when using silent mode '/S'.
  • Bug fixing: Impossible to open with certificate when user does not have admin right.
  • Bug fixing: VPN Client not responding after received Key renewal from router.
  • Bug fixing: Wrong Finnish translation in Software Activation window.
  • Bug fixing: No tunnel when using SHA2 algorithm and Windows Certificate Store.
  • Bug fixing: Another tunnel does not open properly after unplugging a smartcard with some smartcard models.
  • Bug fixing: Crash IKE in some network circumstances when coming out of sleep mode, or when tunnel fails to open on 'Wrong Remote Address' followed by 'Save' VPN Configuration.
  • Bug fixing: Remote Config feature creates logs in the wrong directory.
  • Bug fixing: Activation not properly working in some circumstances like multiple user levels on the same machine.
  • Bug fixing: Accept the Section ID in VPN Configuration file coming from the VPN Gateway when virtual IP address is set to 0.0.0.0.
  • Bug fixing: Support VPN configuration coming from the VPN gateway containing '-' in the tunnel names and also when using configuration with certificates.
  • Bug fixing: IKE crash when Phase name is too long. Phase names now limited to 49 chars.
  • Bug fixing: The feature VPN 'Peer to Peer' might fail when there is a router with NAT-T in between, in some network configuration.
  • Bug fixing: VPN tunnel might not open when configured with a Certificate selected from the User Certificate Store.
  • Bug fixing: The VPN tunnel opens properly but no traffic goes through when using X-Auth based configuration and VPN Client address is 0.0.0.0.
  • Bug fixing: VPN Client stops responding for a while after received Key Renewal from the VPN Router in some VPN Configuration circumstances.
  • Bug fixing: IP address renewal with DHCP server does not working properly with VPN Configuration forcing all traffic in the tunnel (i.e. subnet mask 0.0.0.0).
  • Bug fixing: Import of VPN Configuration not working properly when the Certificate has a local ID type DER_ASN1_DN_ID containing a subject with chars like spaces and '/'.
  • Bug fixing: 'Phase2' > 'Advanced' > 'Alternate Server' > IP addresses cannot be reset to 0.0.0.0.

New in TheGreenBow IPSec VPN Client 5.13 Build 002 (Feb 18, 2012)

  • Improvement: Clarification of the rules to select which Certificates to take into account when available via Token, Smartcard Reader.
  • Improvement: Speed up display of systray menu when 100+ VPN tunnels configured.
  • Improvement: Log file name format changed to include date/time. This allows smaller file size when sending logs to techsupport.
  • Bug fixing: VPN tunnel send Certificate Request with DN from a specific Certificate Authority only. However some VPN Gateway might use other CA.
  • Bug fixing: VPN Client can now send INITIAL-CONTACT message during IKE negotiation.
  • Bug fixing: Console stops displaying logs after clicking on menu Tools > Reset IKE.
  • Bug fixing: Some 3G USB drives from Orange (e.g. 3G Business Everywhere) are changing routing settings preventing VPN traffic to go through especially when configuring the VPN Client to force all traffic in VPN tunnel.
  • Bug fixing: A second VPN Client popup show up when coming back from sleep prior to Windows login if Gina mode (i.e. opening VPN tunnel before Windows logon) has been configured.
  • Bug fixing: Wrong IKE timestamp format in console.
  • Bug fixing: VPN tunnel might not re-open properly when using 3G connexion especially if a new IP address is re-assigned by the mobile network.
  • Bug fixing: When a tunnel is using Config Mode, Phase 2 renegotiation does not use the settings sent by the gateway, but the parameters from the configuration file, therefore preventing from opening the VPN tunnel.
  • Bug fixing: VPN tunnel might not open properly when using PKCS#11 Certificate and multiple certificate with the same subject on a single smart card.
  • Bug fixing: VPN tunnel might not open properly when importing a VPN Configuration containing a smart card. The message "conf_x509_subject_set: error while using PKCS#11 middleware" displays.
  • Bug fixing: Payload CERT_REQ not send properly in some circumstances.
  • Bug fixing: VPN tunnel might not open properly when coming back from windows sleep mode.
  • Bug fixing: VPN tunnel configured with IP Address Range might not open properly.
  • Bug fixing: DNS/WINS addresses might not be restored properly when using Gina Mode (i.e. opening VPN tunnel before Windows logon).
  • Bug fixing: DNS/WINS addresses might not be configured properly when VPN Client Address (remote IP address is configured to 0.0.0.0).
  • Bug fixing: Computer freeze in rare case of VPN Configuration using Certificates i.e. Windows Seven 64-bit on some Dell machines.
  • Bug fixing: Traffic remains blocked when "Disable Split Tunneling" is selected and the VPN Client IP address (i.e. remote IP address of the computer) selected already exists on the computer.
  • Bug fixing: Traffic might be slower when all traffic forced into tunnel (remote mask is 0.0.0.0) and using IE or Firefox.
  • Bug fixing: The tunnel might not open properly, when the remote gateway is sending a large Certificate (e.g. key size of 2048-bit).
  • Bug fixing: MTU modification might not be taken in account (Windows XP 32-bit only).
  • Bug fixing: VPN tunnel doesn't open with 'Error 307' when the remote network mask contains specific values (e.g. 255.255.254.0, 255.255.252.0,...).
  • Bug fixing: No smartcard PIN code popup when a special sequence of events occurs, like plugging in the smartcard, then VPN tunnel fails to open (e.g. router not responding), then plugging in again the smartcard.
  • Bug fixing: VPN Configuration Wizard does not start when software starts and VPN Configuration is empty.

New in TheGreenBow IPSec VPN Client 5.10 Build 009 (Feb 18, 2012)

  • Feature: Ability to support SIP/VoIP traffic in VPN Tunnel (Window Vista and Seven).
  • Feature: Ability to open a Windows RDP session in one click from systray menu. This allows the user to open a remote desktop sharing with any machine on the remote network. Multiple desktop sharing sessions per VPN tunnel can be defined, and the right VPN tunnel opens automatically when a desktop sharing session is requested.
  • Feature: Ability to execute a silent un-installation when the software was installed with silent installation configuration.
  • Feature: Ability to set a specific MTU per IPSEC tunnels.
  • Feature: Added a checkbox to run the IPSec VPN Client after software installation.
  • Improvement: Ability to install the software without rebooting Windows operating system.
  • Improvement: Ability to disable the systray popup window that shows up when opening or closing VPN tunnel.
  • Improvement: Ability to close all tunnels in one click. New menu item in the Configuration Panel.
  • Improvement: Show a little USB Icon in Configuration Panel whenever an USB drive is plugged in and the software is in USB Mode (i.e. expecting the USB drive to hold the VPN configuration).
  • Improvement: Each VPN tunnel Phase1 & Phase2 names now appear in the systray menu.
  • Improvement: All VPN tunnel names are sorted by alphabetical order in the systray menu.
  • Improvement: The stability of the IP address change detection has been significantly improved.
  • Improvement: The stability of the DNS/WINS management has been significantly improved.
  • Improvement: The time to quit has been significantly improved.
  • Improvement: The management of Token insertion and extraction has been significantly improved. Upon insertion or extraction, all VPN tunnels are opened or closed accordingly.
  • Improvement: Ctrl+Alt+D starts the debug logs, and now also add an icon with a link to the log folder.
  • Improvement: IKE logs are now timestamps with daily span to reduce log files sent to techsupport.
  • Improvement: More help added for Hybrid Mode. Hybrid Mode requires a Certificate and X-Auth to be set to function properly.
  • Improvement: Warning info when using an USB drive VPN configuration in case the USB drive was not supposed to be plugged in.
  • Improvement: A 'Don't warn me anymore' checkbox added in warning popup when the VPN Client address belongs to the remote network configured in 'Remote LAN Address'.
  • Improvement: 'Block non-ciphered connections' has been replaced by 'Disable Split tunneling'.
  • Improvement: Support of Token containing multiple certificates with the same certificate subject.
  • Improvement: Added Certificate validity date check before opening a tunnel. If multiple Certificates, the VPN Client only uses the Certificate with a valid date. If no certificate with valid date can be found, the tunnel does not open, and an error message 'no suitable certificate' displays in the console.
  • Bug fixing: All VPN tunnel Phase2 do not close when unplugging the smartcard used to authenticate.
  • Bug fixing: VPN tunnel cannot be opened coming back from Windows Sleep mode.
  • Bug fixing: Too many errors shown in systray popup window when opening VPN tunnel in some network circumstances.
  • Bug fixing: Once in USB Mode, the sub-menu 'Move to USB drive' is still enabled.
  • Bug fixing: OSAport not supported in vpnconf.ini.
  • Bug fixing: Error message when launching help using 'F1'.
  • Bug fixing: Software crashes when entering into the USB Mode for the first time in some Windows configurations.
  • Bug fixing: All leds are green although the IPSec VPN Client is 'giving up' after several attempts to open a VPN tunnel.
  • Bug fixing: Export of a VPN Configuration can be empty in USB Mode (i.e. VPN configuration has been moved to the USB drive).
  • Bug fixing: A message 'INVALID COOKIE' received while the VPN tunnel is open might make the systray popup window to show up with orange led instead of green.
  • Bug fixing: A special icon is displayed in the Configuration Panel tree when 'Auto open on traffic detection' is selected.
  • Bug fixing: The char '\' should not be allowed in PreShared Key confirmation field.
  • Bug fixing: Remote LAN address and subnet field are empty after importing a configuration with 'Remote LAN Address' and 'subnet' 0.0.0.0/0.
  • Bug fixing: Manual activation fails with an Activation error message: 0 in some circumstances.
  • Bug fixing: Software crashes when numerous clicks on 'Apply' button.
  • Bug fixing: Tunnel with certificates cannot be opened when using Phase 1 ID with FQDN.
  • Bug fixing: Setup command option "--GuiDefs" not working properly.
  • Bug fixing: Silent installation not working properly when used with options "--license", "--activmail", "--noactiv", "--autoactiv", "--guidefs".
  • Bug fixing: Software crashes when copy&paste an existing VPN tunnel, and then trying to delete it in Configuration Panel.
  • Bug fixing: Wrong activation code file might be used if multiple users try to activate the IPsec VPN Client on the same machine.
  • Bug fixing: TgbIke crash when using with smartcard while debug logs are activated and a connection error occurs.

New in TheGreenBow IPSec VPN Client 5.06 Build 004 (Oct 21, 2011)

  • Improvement: Login X-Auth accepts more than 31 characters.
  • Improvement: Removed restriction on SHA-256 & DH14 for one of our partners.
  • Improvement: Ability to increase hash from 96bit to 128bit when using SHA-256.
  • Improvement: For RFC compliancy, SHA2-256 becomes SHA-256.
  • Bug fixing: Combination of SHA2 & DES or 3DES is not working.
  • Bug fixing: Access denied error when launching the IPSec VPN Client through an RDP remote connection.
  • Bug fixing: 'Open' tunnel button & menu stays disabled even if tunnel failed to open when user enter wrong X-Auth login/password in popup.
  • Bug fixing: X-Auth popup cannot be saved until the user erases login/password fields.
  • Bug fixing: Tunnel negotiation fails with error 'exchange_validate failed' when 'Remote LAN Address' and 'Mask' are 0.0.0.0/0.
  • Bug fixing: IKE service crash when coming back from Windows Hibernate or Sleep mode.
  • Bug fixing: TgbStarter.exe might crash when updating the VPN Configuration in some circumstances.

New in TheGreenBow IPSec VPN Client 4.70 Build 001 (Jul 19, 2010)

  • Feature: Support 2 new languages Czech and Danish for a total of 21 languages. Czech and Danish now embedded in the software setup.
  • Feature: Support of new WWAN driver model for 3G/4G devices on Windows 7 (Windows Seven 32/64bit). With this new software release any WWAN compatible adapter should be working fine. WWAN stands for Wireless Wide Area Network or Wireless WAN, and is now supported by several 3G/4G wireless modem/adapter manufacturers. All manufactures must support “Mobile Broadband Driver Model Specification” for Windows 7 based on NDIS6.20 miniport driver model. Among those adapters, we do support now Atheros Wireless Adapter, Dell Wireless 5530 HSDPA Mini-Card, Dell Wireless 5600 EVDO-HSPA Mini-Card, Huawei 3G modem, Qualcomm Gobi 2000, Sierra wireless MC8781 HSPDA. See our list of 3G modem/adapters, and FAQ here.
  • Feature: Latest NetGear VPN Routers Mode-Config support.
  • Feature: Windows firewall rules auto setup extended to 'public' and 'domain' profiles.
  • Feature: Ability to upgrade a group of license numbers at a specific date (with different expiration dates). This is useful to large customers/resellers to simplify their accounting/reporting of maintenance option. Not available online yet, please contact our team [email protected].
  • Feature: Configuration file now encrypted during software upgrade. If 'GUI Access' password has been setup, or a password is set in setup command line, they will be used (i.e. ‘View’ > 'Configuration' > 'GUI Access' or see Deployment Guide).
  • Improvement: Ability to copy&paste the license number from the 'About..' windows, so it can be sent easily to our techsupport.
  • Improvement: Change in user interface of the Phase2 panel around the “Certificates Management..” button.
  • Improvement: Temporary installation folder for drivers in Windows 7 64-bit shall not had restricted access rights. It doesn’t matter now.
  • Improvement: RFC defines port 4500 UDP for key renegotiation. Port 500 now is allowed.
  • Improvement: Mode-Config in IKE Engine has been adapted for compatibility with NetGear gateways.
  • Improvement: Added Push mode in Mode-Config for compatibility with NetGear gateway.
  • Improvement: Command line /export and /exportonce requires /pwd switch as mandatory now (e.g. vpnconf.exe /export:c:\test.tgb /pwd:test).
  • Bug fixing: No retransmit of Phase2 request when the remote gateway does not answer.
  • Bug fixing: When a remote gateway is not responding, the IPSec VPN Client does not switch to a redundant gateway. This does not occur if another tunnel is opened.
  • Bug fixing: IKE engine might not be listening anymore in some cases of message exchanges with the VPN gateway e.g. timeout on no response (or lost) from the VPN Gateway.
  • Bug fixing: Activation Wizard string look&feel, in case very long custom strings for some OEM e.g. long product name.
  • Bug fixing: Default mask in VPN Configuration Wizard shall be set to class C.
  • Bug fixing: DNS/WINS server address not removed from Windows network settings on Windows 7 Ultimate using WiFi connection.
  • Bug fixing: Embedded pre-configured VPN Configuration file into the setup might not work properly (see Deployment Guide section ‘How to embed a specific VPN configuration into the VPN Client Setup?’).
  • Bug fixing: Multiple Mode-Config messages received with DNS/WINS server addresses to be updated might not work properly.
  • Bug fixing: Phase2 ESP mode might still be ‘Tunnel’ mode although ‘Transport’ mode has been selected with some VPN gateways.
  • Bug fixing: Command line to replace a configuration file protected with password (e.g. /replace:c:\test.tgb /pwd:test) might erase current configuration if wrong password. Command lines to /add or /importonce are not affected.
  • Bug fixing: Command lines ("vpnconf.exe /import:[filename]") might not be executed properly.
  • Bug fixing: Events not logged in ‘Console’ when opening/closing tunnel before Windows logon (for Gina mode go to ‘Phase2 Advanced’ > ‘Enable before Windows logon’).
  • Bug fixing: Software activation may not work properly in case Windows default temporary folder is restricted to the user.
  • Bug fixing: Bluescreen when leaving sleep mode in Windows 7 64-bit.
  • Bug fixing: Special characters in Phase1 or Phase2 names could crash when software starts.
  • Bug fixing: Popup shows continuously "Remaining tunnel" after tunnel closed, due to erroneous cookie in ‘INVALID COOKIE’ notification message (i.e. RFC2522)
  • Bug fixing: Limitation in length of all parameters to avoid buffer overflow. Retrofit of old patch.
  • Bug fixing: ‘Open Tunnel’ button disabled while network interfaces become available or unavailable to avoid crash. Especially wireless network interfaces (e.g. 3G, WiFi,..).
  • Bug fixing: IKE service might crash if user open and close the tunnel multiple times rapidly while a redundant gateway as been set.
  • Bug fixing: Support for numerical OID in certificate subject may lead to inability to open tunnel.
  • Bug fixing: Sound (‘Ding’) when using ‘Tab’ keyboard key in X-Auth Authentication popup.
  • Bug fixing: Password limiting access to some features (‘View’ > ‘Configuration’) might be asked even when not set.
  • Bug fixing: "Don't start VPN Client when I start Windows" is not working on Windows 7 64-bit. The IPSec VPN Client always starts.
  • Bug fixing: Bluescreen on Sony VAIO VGN-FW51MF with 3G option, Windows Seven 64-bit (Wind 7) and a VPN Configuration using Certificates.
  • Bug fixing: When local and remote network are on the same subnet, access to remote network would not work properly if the ‘Auto open tunnel on traffic detection’ feature has not been selected.
  • Bug fixing: Bad version number of IKE daemon.

New in TheGreenBow IPSec VPN Client 4.65 Build 003 (Jan 12, 2010)

  • Bug fixing: IKE crash (tgbike.exe) in some circumstances like renegotiating user authentication using X-Auth twice and getting a not ok response from X-Auth remote server although initial negotiation was authorized with same login/password.
  • Bug fixing: Phase2 Authentication SHA-2 algorithm not working properly in Peer2Peer mode.
  • Bug fixing: Import VPN Configuration window may take several seconds to appears (Win7/Windows Seven only).
  • Bug fixing: Mismatch in tunnel names in Configuration Panel if multiple tunnels have been configured.
  • Bug fixing: Configuration Panel might display the wrong tunnel status if multiple tunnels have been configured.

New in TheGreenBow IPSec VPN Client 4.65 Build 002 (Jan 12, 2010)

  • Feature: Windows Seven (7) RTM 32/64-bit full compatibility. TheGreenBow IPSec VPN Client now support Windows 2000 (Workstation), Windows XP 32-bit, Windows Server 2003 32-bit, Windows Server 2008 32/64-bit, Windows Vista 32/64-bit, Windows 7 32/64-bit. Older Windows versions are supported with older IPSec VPN Client software release on the download page.
  • Improvement: Easier activation wizard to accept 20 or 24 digit license number.
  • Improvement: More explicit message instead of error 056 when trying to activate an expired temporary license.
  • Improvement: Management of temporary license improved and limit extended.
  • Improvement: Connexion Panel slightly redesigned to better display multiple tunnels.
  • Improvement: Ability to maintain trial period while installing multiple OEM customization releases.
  • Improvement: Remove the registry key DnSeparator. The Certificate subject is now RFC 4514 based.
  • Bug fixing: FTP transfert in ESP tunnel creates a BSOD when active mode is set.
  • Bug fixing: When the user insert again his smartcard after closing tunnel, PIN Windows does not pop up for checking PIN code.
  • Bug fixing: DoS vulnerability fixed.
  • Bug fixing: Software might not run properly when USB Drive mode active (i.e. VPN Config moved onto USB Drive) and one of the network drives is inaccessible.
  • Bug fixing: Use of Certificate from Windows Certificate Store not working properly on Windows XP 32/64-bit.
  • Bug fixing: Improve warning message in English when global parameters set outside limits.
  • Bug fixing: VPN Peer 2 peer not working in agressive mode.
  • Bug fixing: VMWare Server and IPSec VPN Client, installed on Windows Vista may cause BSOD. Problem fixed for VMWare but also for Virtual PC, Virtual Box from Sun.
  • Bug fixing: Crash may occur when importing Certificate .P12 generated by Checkpoint firewall.
  • Bug fixing: Crash may occur during extremely large data load with NVIDIA Ethernet chipset integrated to mother board or network board based on Realtek chipset.
  • Bug fixing: USB Drive wizard windows not running on forefront.
  • Bug fixing: "Alternate WINS Server" address might not be updated when opening a tunnel (Windows7 only).
  • Bug fixing: Evaluation period might expire at first installation in some rare circumstances with very aggresive desktop firewall settings.
  • Bug fixing: Network drivers might not be installed properly on Vista 64bits when install path contains spaces.
  • Bug fixing: Typo in –noactiv and /D switches in command line section in deployment guide.
  • Bug fixing: Systray icon might disappear when Windows Explorer crash.
  • Bug fixing: A Software Activation request might be sent malformed during software un-installation.
  • Bug fixing: The DN value in Certificates OID (Object ID) not correctly parsed leading to an ‘unknown OID’ error message when using comma inside either of the RDNs (i.e. Relative Distinguished Name).
  • Bug fixing: Crash using some Certificate where private key cannot be read properly (malformed...).
  • Bug fixing: Changing Phase2 Advanced ‘ID Type’ in Configuration Panel not saved in VPN Configuration file.
  • Bug fixing: Windows function ‘CryptUIDlgViewContext’ from ‘cryptui.dll’ not available in Windows 2000, however used to view Certificate details in IPSec VPN Client 4.6 and further.
  • Bug fixing: Not supporting Certificate ‘subjectaltname’ extension properly which generates a ‘subjectaltname invalid length’ error message.

New in TheGreenBow IPSec VPN Client 4.61 Build 003 (Jul 11, 2009)

  • Bug fixing: Credential Providers (aka GINA) not disabled after software un-installation under Windows XP in case one VPN tunnel has been enabled with the ‘Enable before Windows Logon’ feature.
  • Known issue (supported OS): Once logged on again, after a 'Switch user' or a 'Lock this computer' (i.e. basically exiting the Windows session without closing that session), the IPSec VPN Client software might not show opened tunnels although they have been opened for the Windows Logon and are still open. In this case, quit and restart the software, all opened tunnels from now on will show up.

New in TheGreenBow IPSec VPN Client 4.61 Build 002 (Jun 12, 2009)

  • Feature: Support of Windows 7 RC 32-bit and Windows 7 RC 64-bit in compatibility mode. TheGreenBow IPSec VPN Client now supports Windows 2000, Windows XP 32-bit, Windows Server 2003 32-bit, Windows Server 2008 32/64-bit, Windows Vista 32/64-bit, Windows 7 32/64-bit.
  • Improvement: Remove the application focus onto the Vista Credential Providers window (aka GINA on W2K/WXP). Known issue: Vista Credential Providers (aka GINA) not working on Windows 64-bit.
  • Improvement: Better warning message when the user is entering a wrong password for a USB Token/Smartcard or when the USB Token/Smartcard is locked.
  • Improvement: All following command line switches can now be used with the /pwd:xxx option: /export, /import, /exportonce, /importonce, /add, /replace.
  • Bug fixing: Background color of few links in ‘Software Activation Wizard’ and ‘Connection Panel’.
  • Bug fixing: VPN tunnel might not open automatically when connecting using IP ‘Range address’.
  • Bug fixing: Some OID (Object ID) in Certificates not supported (i.e. RFC 4519).
  • Bug fixing: Transport mode access behind NAT may fail in some VPN configurations.
  • Bug fixing: Conflict with some other vendor Credential Providers (aka GINA) if already installed.
  • Bug fixing: Desktop application shortcut and driver not removed during software un-installation.
  • Bug fixing: Lost of network interface due to 64-bit new network drivers.

New in TheGreenBow IPSec VPN Client 4.60 Build 007 (May 20, 2009)

  • Feature: Ability to use Certificates from the Windows Certificate Store which enables smooth integration with any PKI software supporting Windows Certificate Store. When using USB Tokens or Windows Certificate Store, a single Certificate can be selected in case multiple ones have been pre-stored.
  • Feature: Vista Credential Providers (aka GINA on W2K/WXP) support to enable Windows logon via VPN tunnel or choose to logon on local machine.
  • Known issue: Vista Credential Providers (aka GINA) not working on Vista 64-bit.
  • Feature: Easy import of smartcard ATR codes which enables easily and quickly new smartcard and USB Token models. See easy way to add new USB Tokens or Smartcard by importing new ATR codes.
  • Feature: Windows 7 (32-bit) Support. TheGreenBow IPSec VPN Client now supports Windows 2000, Windows XP 32-bit, Windows Server 2003 32-bit, Windows Server 2008 32/64-bit, Windows Vista 32/64-bit, Windows 7 32-bit.
  • Feature: Arabic, Hindi & Thai languages added. TheGreenBow IPSec VPN Client is now available in 19 languages: Arabic, Chinese (simplified), Dutch, English, Finnish, French, German, Greek, Hindi, Italian, Japanese, Polish, Portuguese, Russian, Serbian, Slovenian, Spanish, Thai & Turkish.
  • Feature: Support of SHA-2 algorithm (256-bit).
  • Feature: Ability to prevent software upgrade or un-installation if software usage has been protected by password.
  • Feature: Ability to view all the certificate details like expiration date, issued by, subject and so on.
  • Feature: A shortcut added to enable debug mode.
  • Feature: New Oberthur AuthentIC Card v220 USB Token support. See our Supported Tokens/SmartCards list.
  • Improvement: Significant usability improvement of the USB Mode with ability to attach a VPN configuration to a specific computer or to a specific USB drive.
  • Improvement: Better warning message when the user is entering a wrong password for a USB Token/Smartcard or when the USB Token/Smartcard is locked.
  • Improvement: Better warning message when software activation error like quota exceeded.
  • Improvement: More detailed information on some Software Activation errors especially those due to internal activation server errors.
  • Improvement: Software localization in German.
  • Improvement: Changed string in Certificate Import Wizard.
  • Improvement: Merged menu ‘Help’ and ‘Online support’.
  • Improvement: Impossible to open a tunnel in case an IP address has been defined as the local IP address (i.e. ‘Phase1’ > ’Interface’) but this address does not exist in the computer.
  • Improvement: PinCode management in X-Auth login/password user interface.
  • Bug fixing: VPN Configuration file might not be restored properly after software upgrade on some Windows configuration.
  • Bug fixing: No access to a NAS shared folders depending on the NAS device. Due to TCP checksum when fragmented IP packet.
  • Bug fixing: Phase1 LocalID value malformed when certificate uses UTF8 string syntax.
  • Bug fixing: Oberthur Smartcard not recognized [ATR 3B:7B:18:00:00:00:31:C0:64:77:E9:10:00:01:90:00]. See easy way to add new USB Tokens or Smartcard by importing new ATR codes.
  • Bug fixing: Unable to read certificates on some smartcards.
  • Bug fixing: Incoming UDP packets larger than 1672 bytes are not handled properly and may cause bluescreen.
  • Bug fixing: Software startup time and VPN Configuration import time might be longer than usual when debug mode enabled on some Windows Vista configuration.
  • Bug fixing: Wrong default remote address point when using VPN Configuration Wizard in peer-to-peer mode and VPN Configuration Wizard has been used before to connect to a VPN Gateway.
  • Bug fixing: Losing the Pre-Shared Key as soon as user tries to import a Certificate.
  • Bug fixing: Phase1 & Phase2 names could be changed once only as names were cached by software.
  • Bug fixing: Changing ‘Remote LAN address’ multiple times might not be saved properly into the VPN Configuration file.
  • Bug fixing: Command lines /Open and /Close maximize the IPSec VPN Client window even it was minimize by user. Also, command lines /Open, /Close and /stop are not working if the Connection Panel has been opened prior to using them.
  • Bug fixing: Command lines /Open and /Close not working if tunnel name contains CAPS char.
  • Bug fixing: Scripts before or after tunnel open or close might not be launched in some circumstances.
  • Bug fixing: Systray popup to show tunnel progress bar taking focus over other application.
  • Bug fixing: Latest zip compression format of the setup was not supported within some computer environments.
  • Bug fixing: Software un-installation not successfully completed in some cases where software is running and a tunnel is open.
  • Bug fixing: A click on the systray icon would not maximize the IPSec VPN Client Connection Panel, Configuration Panel or Console windows in case they were minimized
  • Bug fixing: A tunnel is shown as open in Connection Panel when an USB Drive is plugged-in, but the tunnel is still shown as open when USB drive is un-plugged although it has been closed.
  • Bug fixing: Phase 2 Remote LAN address might not be saved properly in some circumstances with multiple VPN tunnels.
  • Bug fixing: Token PIN code might be asked when tunnel start opening even though no Token is plugged-in, in case ‘Phase 1 Certificate on Token’ and ‘Auto Open on Traffic’ have been configured.
  • Bug fixing: Software crash if the ‘Remote Gateway’ field is not available in the VPN Configuration file.
  • Bug fixing: Padding and IP frame total length when using some FTP commands with a web server preventing access through a WindRiver VPN Server.
  • Bug fixing: Initial DNS not restored when the user closes all tunnels, quit software or reset IKE service, in case two tunnels have been configured to use alternate DNS addresses.
  • Bug fixing: Compatibility with ePass 2000 reading certificates. See our supported USB Token/Smartcards list.

New in TheGreenBow IPSec VPN Client 4.51 Build 001 (Jan 9, 2009)

  • Improvement: SHA name is replaced by SHA-1.
  • Bug fixing: Missing "Add or Replace" choice when double-click on a configuration file in Windows Explorer.
  • Bug fixing: Command line "/import" is not working when importing password protected VPN Configuration.
  • Bug fixing: Redundant Gateway might not try again primary gateway if both primary and redundant gateways are not available.
  • Bug fixing: VPN Configuration lost during upgrade in some Windows configurations.
  • Bug fixing: Software upgrade not working properly on Windows XP slow computers.
  • Bug fixing: Software always asking for activation in some circumstances of busy computer.
  • Bug fixing: Connexion panel might not show an opened tunnel in some VPN Configurations.
  • Bug fixing: Erratic crashes when using Config-Mode.

New in TheGreenBow IPSec VPN Client 4.50 Build 001 (Nov 3, 2008)

  • Feature: Windows Vista 64-bit support.
  • Feature: New Gemalto .Net Two-Factor Authentication Smart Cards certified.
  • Feature: New Token ePass 2000 and ePass 3000 certified.
  • Improvement: X-Auth login/password popup window display duration can be configured.
  • Improvement: More explanation on how to move license to other computer on successful software activation.
  • Improvement: Faster ‘Save&Apply’.
  • Improvement: confirmation popup on configuration reset.
  • Improvement: New TheGreenBow Software Publisher Certificate.
  • Bug fixing: Alternate DNS/WINS server addresses are not released when closing the VPN tunnel in some Windows configuration.
  • Bug fixing: Restore some Windows settings like Vista IKE service and XP PolicyAgent to pre-install values after un-installation the IPSec VPN Client software.
  • Bug fixing: Change the ‘?’ menu in Chinese.
  • Bug fixing: Wrong icon when VPN Configuration created with the VPN Configuration Wizard.
  • Bug fixing: Language codes in all online links are now iso-639-2code compliant.
  • Bug fixing: Temporary license activation may prohibit the IPSec VPN Client software to start properly.
  • Bug fixing: White icon on grey background in systray menu.
  • Bug fixing: Software activation response wrongly parsed generating Activation Error Code 50.
  • Bug fixing: impossible to restart IPSec VPN Client software in user mode on Windows XP in some circumstances after software activation.
  • Bug fixing: USB drive plug in not detected in some circumstances.
  • Bug fixing: Phase2 lost link to Phase1 after renaming and in multiple VPN tunnels configuration.
  • Bug fixing: Modification on VPN configuration not taken into account if switch to USB mode and back with some specific USB drives.
  • Bug fixing: Certificate subject truncated to 124 char.
  • Bug fixing: Phase1 unstable when using Neusoft VPN Gateways.
  • Bug fixing: Display errors in remaining evaluation days in Chinese.
  • Bug fixing: Display errors in the Italian DLL .
  • Bug fixing: Wrong Phase1 name in the title of the X-Auth password window.

New in TheGreenBow IPSec VPN Client 4.2 (Jul 26, 2008)

  • 16 languages supported.
  • Certificates management in Chinese and Japanese.
  • Easier installation process and reduce software size by half.
  • More USB Tokens and VPN Gateways.

New in TheGreenBow IPSec VPN Client 4.10.001 (Sep 20, 2007)

  • Vista Support
  • Merge or split VPN Configuration
  • Easier with systray popup when tunnels open or close
  • More USB Tokens and VPN Gateways

New in TheGreenBow IPSec VPN Client 4.10.001 (Sep 20, 2007)

  • Vista Support
  • Merge or split VPN Configuration
  • Easier with systray popup when tunnels open or close
  • More USB Tokens and VPN Gateways

New in TheGreenBow IPSec VPN Client 4.00.007 (Mar 30, 2007)

  • Improvement: standard portuguese finalized.
  • Bug fixing: sometime crash of GUI when closing tunnel