RSSAll Entries in the "Cisco Security" Category

How to troubleshoot Cisco VPN Client Error-Reason 442: Failed to Enable Virtual Adapter

If you are a Windows 7 or Vista users, error “Reason 442: failed to enable virtual adapter” is most common error what you will find for Cisco VPN client. When I find this error, I have noticed that the virtual adapter fails to enable. If I manually enable the adapter and then retry the VPN connection, it always works. I tried to find out why the VPN client no longer automatically enables the connection then found below reason. The following error “Secure VPN Connection terminated locally by the Client. Reason 442: failed to enable virtual adapter” appears in Windows 7 and Vista when Microsoft’s Internet Connection Sharing (ICS) service is running. When you disabled Microsoft’s Internet Connection Sharing (ICS) then issue will be resolved. Find following the steps to disable Microsoft’s Internet Connection Sharing (ICS) service:           1. Go to Windows start button, type “services.msc‘ as shown […]

Download Cisco AnyConnect Secure Mobility Client for Windows

Download and Make the VPN experience easier and more secure with the enhanced remote access technology of Cisco AnyConnect Secure Mobility Client. This software builds on prior Cisco AnyConnect VPN Client offerings to improve the always-on VPN experience across more laptop and smartphone-based mobile devices, including laptops using Microsoft Windows 7. This client now universally supports IPv6.                           Features and Capabilities  Automatically selects the optimal network access point as mobile workers roam Adapts its tunneling protocol to the most efficient method Helps to enable built-in web security and malware threat defense as part of the Cisco AnyConnect Secure Mobility Solution Is the first VPN solution to use the Datagram Transport Layer Security (DTLS) protocol, optimizing connections for latency-sensitive traffic Download Cisco AnyConnect Secure Mobility VPN Client Download  

Switchport Port-Security Violation Options in Cisco Switch

Understand Swithport Port-Security Cisco layer 2 switch maintains the MAC address-table and it forwards a frames to destination based on MAC address table. We can enable a Switchport Port Security feature by allowing the specific Ethernet MAC address connected to the switch port. If any other MAC address tries to communicate through the same Switch port, port security will disable the port. Most of the time, network administrators configure the switch to send a SNMP trap to their network monitoring solution that the port’s disabled for security reasons. When using port security, you can prevent devices from accessing the network, which increases security. If any devices tried to connect to same switch port, there are three port security violation options available in Cisco Switch, based on your requirement you can enable any option for the switch port. There are three port security violation options are restrict, protect and shutdown, If […]

Configure 802.1X (dot1X) on Windows XP & Windows 7 for Wireless Network

802.1X (dot1x) configuration on Cisco Switch with Wireless Access Point Find below configuration to enable 802.1x (dot1x) on Cisco catalyst 2960 switch with wireless access point. ­­­Enables 802.1x.with Access point  Cisco‐2960(Config)#dot1x system‐auth‐control  Cisco‐2960(Config)#interface fastEthernet 0/24  Cisco‐2960(Config‐if)#switchport mode access  Cisco‐2960(Config‐if)#switchport access vlan <dataVlanid>  Cisco‐2960(Config‐if)#authentication port‐control auto              Cisco‐2960(Config‐if)#authentication host‐mode multi‐host  Cisco‐2960(Config‐if)#dot1x pae both  Cisco‐2960(Config‐if)#dot1x timeout tx‐period 3                                                                    Cisco‐2960(Config‐if)#spanning‐tree portfast 

Configure Cisco (802.1X) dot1x port Based Authentication for Wired LAN Network

Introduction to 802.1X (dot1x) This post describes how to configure IEEE 802.1X port‐based authentication on Cisco Switch to prevent unauthorized devices (clients) from gaining access to the network. The IEEE 802.1X standard defines a client‐server‐based access control and authentication protocol that restricts unauthorized devices from connecting to a LAN through publicly accessible ports. The authentication server authenticates each client connected to a switch port before making available any services offered by the switch or the LAN With 802.1X port‐based authentication, the devices in the network have specific roles.             Supplicant – This is often software on a client device such as a PC. Authenticator – This is often a medium between the client device asking for access permission and an authentication server. In most cases, this is either a switch or a wireless access point. Authentication server -This is a RADIUS database. Configuring 802.1X (dot1x) Authentication The […]

How to configure 802.1x (dot1x) on Cisco CatOS Switches

This document describes how to configure IEEE 802.1X  port-based authentication to prevent unauthorized devices (clients) from gaining access to the network.  In below example describes how to configure 802.1x (dot1x) port-based authentication on Cisco CatOS 6500 series switches. Cisco 802.1x also referred as dot1x. Step by Step Dot1x Configuration on Cisco CatOS switch Enable dot1x authentication on CatOS Switch set dot1x system-auth-control enable set dot1x quiet-period 30 set dot1x re-authperiod 30 Configure system name set system name  Cisco_6509 Configure Radius Server for Authentication set radius server auth-port 1812 primary set radius key openthedoor Configure Dot1x on Specific Switch Ports set port dot1x 3/45 port-control auto set port dot1x 3/46 port-control auto set port dot1x 3/47 port-control auto set port dot1x 3/48 port-control auto set port dot1x 3/45 re-authentication enable set port dot1x 3/46 re-authentication enable set port dot1x 3/47 re-authentication enable set port dot1x 3/48 re-authentication enable set port […]