RSSAll Entries Tagged With: "Cisco Security"

How to troubleshoot Cisco VPN Client Error-Reason 442: Failed to Enable Virtual Adapter

If you are a Windows 7 or Vista users, error “Reason 442: failed to enable virtual adapter” is most common error what you will find for Cisco VPN client. When I find this error, I have noticed that the virtual adapter fails to enable. If I manually enable the adapter and then retry the VPN connection, it always works. I tried to find out why the VPN client no longer automatically enables the connection then found below reason. The following error “Secure VPN Connection terminated locally by the Client. Reason 442: failed to enable virtual adapter” appears in Windows 7 and Vista when Microsoft’s Internet Connection Sharing (ICS) service is running. When you disabled Microsoft’s Internet Connection Sharing (ICS) then issue will be resolved. Find following the steps to disable Microsoft’s Internet Connection Sharing (ICS) service:           1. Go to Windows start button, type “services.msc‘ as shown […]

Download Cisco AnyConnect Secure Mobility Client for Windows

Download and Make the VPN experience easier and more secure with the enhanced remote access technology of Cisco AnyConnect Secure Mobility Client. This software builds on prior Cisco AnyConnect VPN Client offerings to improve the always-on VPN experience across more laptop and smartphone-based mobile devices, including laptops using Microsoft Windows 7. This client now universally supports IPv6.                           Features and Capabilities  Automatically selects the optimal network access point as mobile workers roam Adapts its tunneling protocol to the most efficient method Helps to enable built-in web security and malware threat defense as part of the Cisco AnyConnect Secure Mobility Solution Is the first VPN solution to use the Datagram Transport Layer Security (DTLS) protocol, optimizing connections for latency-sensitive traffic Download Cisco AnyConnect Secure Mobility VPN Client Download  

HyperTerminal Settings for Cisco Secure ACS Solution Engine

Cisco Secure ACS Solution Engine 1121 series (ACS SE) is a highly robust, scalable, rack-mounted, dedicated platform that serves as a high-performance access control server supporting centralized Remote Access Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System (TACACS+). ACS SE controls the authentication, authorization, and accounting (AAA) of users accessing resources through the network. Cisco has taken a completely different approach to designing the solution. The new ACS 5.x series no longer uses windows as an underlying platform for the Cisco ACS software base and are currently using a Linux operating system to deliver stability and performance to the solution. Find below terminal emulation (HyperTerminal or any other) settings to configure Cisco Secure ACS Solution Engine. Terminal Emulation Settings for Cisco Secure ACS: To establish a serial console connection, set your terminal emulation communication software to operate with the following settings:

How to configure all passwords to secure Cisco Router

Fallow below steps to configure the passwords on New Router or If you want to verify that you have properly configured passwords on your existing Cisco Router. Passwords are used to restrict access to a Cisco Router. You can set the separate passwords for different modes like to the virtual terminal lines, console line and privileged EXEC mode etc. This post will provide the information to set up Cisco Router password to virtual terminal lines, console lines and privileged mode etc. You will also learn how to encrypt the passwords. Types of Cisco Router Passwords When it comes to basic password security, there are three basic types: Line Passwords(Console, Vty, Aux) Privileged mode Passwords (enable mode) Username Passwords (optional) Configure Cisco Router Line Passwords Line passwords are configured on Router lines. Examples of lines are: There are two commands used to configure line passwords, no matter what kind of line you […]

Wireless Network Authentication Types

Wireless encryption and authentication is the heart of wireless router security and Wireless routers support multiple wireless encryption and authentication methods. Better the wireless encryption and authentication technology, the more difficult a hacker will find authenticating and unscrambling the encrypted data. When you assign your wireless router with a key and assign an encryption method, it will scramble the data and only a laptop with the same key can unscramble that data. This would ensure a hacker can not access the data. You have to use the strongest wireless encryption and authentication method your router supports, Find below different options available in this topic. Wireless LAN (WLAN) Authentication Types: Open: An open system is a system that does not require authentication. Any station can join the network without authentication. Shared Key: In Shared Key, the WEP key is used for the authentication. However, this procedure is not recommended, because it […]

Wireless Network Encryption Types

There are various encryption types to ensure that no unauthorized person can read the data packets that are exchanged in a wireless network or gain access to the network. Wireless LAN (WLAN) Encryption Types:  WEP (Wired Equivalent Privacy): WEP stands for Wired Equivalent Privacy. WEP standard uses of the RC4 encryption algorithm, originally with a key length of 40 bits, later also with 104 bits. Often, the length is declared as 64 bits or 128 bits, depending on whether the 24 bits of the initialization vector are included or not. WEP is a weak wireless encryption protocol and easy to crack. It has holes that are easily exploitable by even a novice attacker. However if this is only option you have, then do use this. WPA (Wi-Fi Protected Access): WPA was created to improve on or replace the flawed WEP encryption. WPA provides much stronger encryption than WEP and addresses a number of WEP weaknesses. […]