| The name of the base system (platform): | Ideco ICS |
| Developers: | Ideco (Aydeco) |
| Last Release Date: | November 2011 |
| Technology: | VPN - Virtual Private Networks, Information Security - Encryption Tools |
Content |
As of January 2026, it is no longer sold by the company.
2011: Possibility of using Ideco "MagPro" GOST-VPN on the basis of certified CIPF "MagPro CryptoPacket"
Since October 2011, all users of the Ideco ICS Internet gateway have become available the ability to use Ideco MagPro GOST-VPN servers based on the certified CIPF "MagPro CryptoPacket" to build secure communication channels between branches of the corporate network.
This product meets the requirements of GOST 28147-89, GOST R 34.10 2001, GOST Z 34.10-94 and the requirements of the FSB of Russia for CIPF class KS1. It can be used to cryptographically protect information that does not contain information constituting a state secret.
The solution operates at the level of a separate hardware and software device "Ideco MagPro GOST-VPN," made on the basis of the CIPF "MagPro CryptoPacket," which runs under the Debian operating system. Setting up "Ideco MagPro GOST-VPN" is carried out entirely through the web interface of the Ideco ICS Internet gateway.
CIPF "MagPro CryptoPackage" was not built into Ideco ICS.
The Ideco MagPro GOST-VPN software and hardware complex designates a set of two or more hardware and software devices that can be administered through the interface of the Ideco ICS Internet Gateway.
Advantages of Ideco MagPro:
- Convenient graphical web management interface.
- Easy to deploy - The solution starts automatically and is configured in 10-15 minutes.
- VPN connection is completely transparent to users. If a user from one local network connects to computers from another, then his connection is automatically routed through a secure channel and is completely transparent to him.
- One-time purchase with no additional costs in future periods.
- Use of certified GOST algorithms.
- The number of VPN channel users is limited only by the number of Ideco ICS licenses.
The scope of delivery includes:
- Ideco CryptoCom hardware complexes (by the number of purchased, at least 2);
- USB drives with Ideco MagPro GOST-VPN software (by the number of purchased, at least 2);
- 2 forms: on "MagePro OpenVPN-GOST" and on CIPF "MagePro Cryptopacket."
Ideco MagePro GOST-VPN crypto gateway management interface is available only to Ideco ICS 4.3 users
Application scenarios
The need to use certified cryptographic protection means arises in the following cases:
- protection of personal data in the organization;
- protection of confidential information subject to protection in accordance with the legislation of the Russian Federation - for example, if we are talking about commercial or professional secrets, information about insured persons, etc.;
- information protection in the executive authorities of the Russian Federation;
- protection of information in commercial organizations when they fulfill orders for the supply of goods or the provision of services within the framework of government activities;
- protection of information owned by state bodies or organizations fulfilling government orders.
Ideco MagPro Implementation Steps
At the first stage of implementation, the Ideco MagPro server is directly connected by cable to the dedicated network interface of the Ideco ICS Internet Gateway. In this case, a separate network card must be present in the Ideco server.
In the head office of Ideco, MagPro is configured as a GOST-VPN server, and in subsidiaries - as a GOST-VPN client. A VPN tunnel is installed between Ideco MagPro servers, through which traffic encrypted using GOST algorithms is transmitted.
If an employee of one office needs to connect to a computer located in another office, this connection is automatically protected.
The GOST-VPN server Ideco MagPro is also a Certification Center, it issues and supports digital certificates. As part of basic cryptographic operations, they are open information and, along with requests for certificates, can be transmitted in any unprotected way. Cryptographic keys are classified information that is not accessible.
The Certification Authority issues the certificate, signs it, and maintains it throughout its lifetime. If necessary, the Ideco MagPro server also revokes certificates.
Based on a certificate request, a client certificate is generated in the certification authority. After it is downloaded to the GOST-VPN client, the VPN connection is automatically established.

