<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cisco Services &amp; Technologies</title>
		<description><![CDATA[Leading Network Security & Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips & more.]]></description>
		<link>https://www.firewall.cx/cisco/cisco-services-technologies.html</link>
		<lastBuildDate>Sat, 11 Apr 2026 12:42:48 +1000</lastBuildDate>
		<generator></generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.firewall.cx/cisco/cisco-services-technologies.feed?type=rss"/>
		<language>en-gb</language>
		<item>
			<title>Renewing Cisco Certifications without sitting for a Cisco Exam. Covers CCNA, CCNP, CCIE, CCDE and all Specialist Levels</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/how-to-recertify-any-cisco-certification-without-exams.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/how-to-recertify-any-cisco-certification-without-exams.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-icon.jpg" alt="cisco recertification" style="margin: 7px; float: left;" />Without a doubt,<strong> Cisco certifications and specializations</strong> are among the most popular vendor certifications in the IT industry, and earning them doesn’t come easy. Anyone who’s achieved a Cisco certification would be well aware of the countless hours required to cover the necessary curriculum, <strong>practice labs</strong>, and <strong>prepare</strong> for their <strong>Cisco exam</strong>.</p>
<p style="text-align: justify;">Many would agree that one of the biggest headaches after achieving a Cisco certification is renewing it. <strong>Renewing or maintaining a Cisco certification</strong> usually requires the candidate to sit for an equal-level exam or pushing forward and aiming for a higher-level exam. While this might not be a problem for many professionals, many find it a big struggle. A significant amount of professionals decide not to renew their certifications because of the <strong>time and commitment required</strong> or because they’ve decided to focus on other vendors.</p>
<p style="text-align: justify;">In this article, you’ll discover how you can easily <strong>renew</strong> any <strong>Cisco certification</strong> or <strong>specialization</strong> <strong>without</strong> sitting for a <strong>single exam</strong>! We’ll explain the <strong>different recertification paths</strong>, show <strong>how to select a recertification path</strong>, <strong>submit a claim, track the recertification process, open a support ticket,</strong> and more!</p>
<p><strong>Key Topics</strong>:</p>
<ul class="check">
<li><a href="https://www.firewall.cx/#recertification-how-it-works" title="Recertifying Cisco Certifications without Exams – How it Works">Recertifying Cisco Certifications without Exams – How it Works</a></li>
<li><a href="https://www.firewall.cx/#how-many-learning-credits-do-it-need" title="How Many Cisco Learning Credits Do I Need?">How Many Cisco Learning Credits Do I Need?</a></li>
<li><a href="https://www.firewall.cx/#recertification-strategy" title="Planning Your Cisco Recertification Strategy">Planning Your Cisco Recertification Strategy</a></li>
<li><a href="https://www.firewall.cx/#claiming-cisco-education-credits" title="Claiming Cisco Education Credits">Claiming Cisco Education Credits</a></li>
<li><a href="https://www.firewall.cx/#tracking-verifying-recert-progress" title="Certmetrics: Tracking – Verifying the Recertification Progress">Certmetrics: Tracking – Verifying the Recertification Progress</a></li>
<li><a href="https://www.firewall.cx/#renewal-completed" title="Cisco Associate, Professional, and Specialist Certs Successfully Renewed!">Cisco Associate, Professional, and Specialist Certs Successfully Renewed!</a></li>
<li><a href="https://www.firewall.cx/#summary" title="Summary">Summary</a></li>
</ul>
<h2 style="text-align: left;"><a name="recertification-how-it-works">Recertifying Cisco Certifications without Exams – How it Works</a></h2>
<p style="text-align: justify;">It is indeed possible to renew any Cisco certification without sitting for the dreaded exams, and it’s called the<strong> Cisco Continuing Education Program</strong>, and we’ll explain how it works.</p>
<p style="text-align: justify;">The <strong>Cisco Continuing Education Program</strong> allows Cisco certified engineers to <strong>earn Continuing Education Credits (CE) </strong>that are then applied <strong>towards recertification</strong>. <strong>CEs</strong> can be earn via the following activities:</p>
<ul class="check">
<li>Instructor-Led Training</li>
<li>Cisco Digital Learning</li>
<li>Cisco Live! Training Sessions (BRK, LTR, TEC, DEVWks)</li>
<li>Cisco Network Academy Training</li>
<li>Other Activities such as workshops, bootcamps, etc</li>
</ul>
<p style="text-align: justify;">The <strong>amount of CE credits</strong> earned will depend on the <strong>type of activity</strong> and its <strong>duration</strong>. For example, you can earn <strong>12 CE credits </strong>for a sitting through a <strong>14-hour Cisco course</strong> delivered via the <a href="https://digital-learning.cisco.com/" target="_blank" rel="nofollow noopener" title="Cisco Digital Learning platform">Cisco Digital Learning platform</a> or earn a generous <strong>40 to 65 credits </strong>for attending a <strong>5-day Cisco Instructor-Led training course</strong> offered by <a href="https://www.cisco.com/c/en/us/training-events/training-certifications/training/cisco-delivered-training.html" target="_blank" rel="nofollow noopener" title="authorized Cisco Learning Training Partners">authorized Cisco Learning Training Partners</a>.</p>
<p>Once the<strong> training course</strong> or <strong>activity</strong> is complete, you <strong>submit</strong> a <strong>claim </strong>to earn the <strong>CE Credits</strong>. When you’ve gathered enough <strong>CE credits</strong>, you are automatically recertified.</p>
<h2><a name="how-many-learning-credits-do-it-need">How Many Cisco Learning Credits Do I Need?</a></h2>
<p style="text-align: justify;">The <strong>amount</strong> of <strong>Cisco Learning Credits</strong> required for your <strong>certification renewal</strong> depends on the <strong>level of recertification</strong>. For example, <strong>Associate level</strong> recertification, such as the <strong>CCNA</strong>, requires a minimum of <strong>30 CE credits</strong>. In contrast, the <strong>Professional level</strong> (CCNP Enterprise, CCNP Data Center, etc.) requires <strong>80</strong> <strong>CE credits</strong> and <strong>CCIE level</strong> an impressive <strong>120</strong> <strong>Continuing Education credits</strong>.</p>
<p style="text-align: justify;">The table below shows all available certification levels, duration, required <strong>Continuing Education credits, </strong>but also the ability to combine<strong> exams </strong>with <strong>Continuing Education credits</strong> to achieve recertification:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-recertification-requirements.png" alt="cisco recertification requirements" style="margin: 7px auto; border: 1px solid #000000; display: block;" title="cisco recertification requirements" /></p>
<p class="box-warning">Recertification requirements <strong>must</strong> be met <strong>prior</strong> to the certification expiration date.</p>
<p style="text-align: justify;">Combining <strong>Continuing Education credits</strong> and exams provides significant flexibility as it allows engineers to maximize their options and achieve recertification status easier with less stress.</p>
<h2><a name="recertification-strategy">Planning Your Cisco Recertification Strategy - Selecting a Course or Activity</a></h2>
<p style="text-align: justify;">When planning your <strong>recertification path</strong>, it’s crucial to have a strategy to help you achieve your goal the fastest way, therefore understanding how to search and browse through Cisco’s list of activities is very important.</p>
<p style="text-align: justify;">You can browse through Cisco’s lists of activities by visiting the Cisco <a href="https://ce.cisco.com/" target="_blank" rel="nofollow noopener" title="Continuing Education Program"><strong>Continuing Education Program</strong></a> website and selecting <strong>Item Catalog</strong> from the menu as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-continuing-education-program-selecting-an-activity.png" alt="cisco continuing education program selecting an activity" style="border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;" title="cisco continuing education program selecting an activity" /></p>
<p style="text-align: justify;">From here, you can search for a <strong>course name</strong> and use the various <strong>filters</strong> to find a suitable course. An easy way to look at your available options is to select the <strong>Category</strong> and <strong>Type</strong> of training, then <strong>click</strong> on <strong>Search</strong> to list all available training for the selected filters.</p>
<p style="text-align: justify;">We’ve selected <strong>CCNP/CCDP Training</strong> (1) and <strong>Instructor-Led training</strong> (2) in the example below. This returned several different courses, <strong>delivery methods</strong> (Item type), and <strong>credits</strong> each course earns:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-continuing-education-program-searching-for-an-activity.png" alt="cisco continuing education program searching for an activity" style="border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;" title="cisco continuing education program searching for an activity" /></p>
<p style="text-align: justify;">By clicking on the <strong>View Details</strong> link on the right, we can obtain additional information about the course, where and when it’s delivered, and further filter our selection based on <strong>time-zone</strong>, <strong>dates</strong>, and more. Spending 15 minutes browsing through the <strong>Item Catalog</strong> list and using the various filters helps you better understand how to search for the course or activity that best suits you.</p>
<h2><a name="claiming-cisco-education-credits">Claiming Cisco Education Credits</a></h2>
<p>After selecting and completing an activity, you must <strong>register</strong> or <strong>claim the activity</strong> so that the <strong>Educational Credits</strong> are awarded to your account.</p>
<p class="box-warning">You must register/claim your activity <strong>within 90 days</strong> of completing it, or else you miss the opportunity to claim the credits.</p>
<p style="text-align: justify;">To help illustrate how to claim your <strong>Educational Credits</strong>, we’ll use a real example below. In this case, the candidate has attended two <strong>Instructor-Led courses</strong> delivered by an <strong>authorized Cisco Training partner</strong>:</p>
<p><strong>Course 1</strong>: Implementing and Configuring Cisco Identity Services Engine (SISE) 3.0, <strong>40 Credits </strong>-<strong> Claimed</strong></p>
<p><strong>Course 2</strong>: Implementing and Operating Cisco Security Core Technologies (SCOR) 1.0, <strong>64 Credits</strong> – <strong>Unclaimed</strong></p>
<p><strong>Note: </strong>We’ll cover below the complete process of claiming credits using <strong>Course 2</strong> as an example.</p>
<p style="text-align: justify;">Upon logging into <strong>Cisco’s Continuing Education Program</strong> website, the dashboard displays the first course (<strong>SISE 3.0</strong>), which was completed and successfully claimed, providing a total of <strong>40 Credits</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-continuing-education-program-my-dashboard.png" alt="cisco continuing education program my dashboard" style="border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;" title="cisco continuing education program my dashboard" /></p>
<p>Now it’s time to claim the second course, <strong>SCOR (1.0)</strong>.</p>
<p>To begin, <strong>click</strong> on the <strong>Submit Items</strong> menu and enter the course details. When ready, <strong>click</strong> the <strong>Submit</strong> button:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-continuing-education-program-submit-items.png" alt="cisco continuing education program submit items" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="cisco continuing education program submit items" /></p>
<p style="text-align: justify;">The Cisco course attended was <strong>Implementing and Operating Cisco Security Core Technologies (SCOR) 1.0</strong>, delivered via <strong>Instructor Led Training</strong> method by an <strong>authorized Cisco Training partner</strong>.</p>
<p>As soon as the course details are submitted, a confirmation window appears. Double-check all details and <strong>click</strong> on <strong>Yes</strong> to submit the item:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-continuing-education-program-submit-items-confirm.png" alt="cisco continuing education program submit items confirm" style="border: 1px solid #000000; display: block; margin-left: auto; margin-right: auto;" title="cisco continuing education program submit items confirm" /></p>
<p>After a few minutes, we received an email confirmation containing the <strong>item</strong> and <strong>details</strong> that were submitted:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-continuing-education-program-submit-email-confirmation.png" alt="cisco continuing education program submit email confirmation" style="border: 1px solid #000000; display: block; margin: 7px auto;" title="cisco continuing education program submit email confirmation" /></p>
<p style="text-align: justify;">Viewing the main dashboard on the <strong>Cisco Continuing Education</strong> site, you’ll notice the newly submitted item is listed and in a <strong>Pending</strong> state. The course is eligible for <strong>64 credits</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-continuing-education-program-submitted-item-pending.png" alt="cisco continuing education program submitted item pending" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="cisco continuing education program submitted item pending" /></p>
<p style="text-align: justify;">Cisco next reaches out to the provider to verify the claim. Once this process is complete, Cisco approves the claim, credits are added to the account, and an email confirmation is sent informing us of the outcome:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-continuing-education-program-email-credit-approval.png" alt="cisco continuing education program email credit approval" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="cisco continuing education program email credit approval" /></p>
<p style="text-align: justify;">The time required to process a claim is usually fast – one to two business days. However, if no response is received or the outcome is not the desired one, it is highly advisable to <strong>open a case</strong> using the <strong>Help</strong> menu item on the top right corner of the page:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/cisco-continuing-education-program-open-a-support-case.png" alt="cisco continuing education program open a support case" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="cisco continuing education program open a support case" /></p>
<h2><a name="tracking-verifying-recert-progress">Certmetrics: Tracking – Verifying the Recertification Progress</a></h2>
<p style="text-align: justify;"><strong>Certmetric</strong> helps Cisco professionals to keep track of their <strong>certification progress</strong>, <strong>testing history</strong>, <strong>transcripts</strong>, <strong>download digital badges,</strong> and more. The site is accessible at the following URL: <a href="https://www.certmetrics.com/cisco/" target="_blank" rel="nofollow noopener" title="Cisco Certmetrics">https://www.certmetrics.com/cisco/</a>, and a link is also available from the main dashboard within the <strong>Cisco Continuing Education</strong> site.</p>
<p style="text-align: justify;">Under the <strong>Certifications</strong> menu option, you’ll find all <strong>active</strong> and <strong>expired certifications</strong>. <strong>Select</strong> the certification for which you are recertifying, this is usually the highest certification as this automatically renews all others below it. In this example, we selected (clicked) the <strong>CCNP Enterprise</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/certmetrics-certification-status-before-second-course-approval-2.png" alt="certmetrics certification status before second course approval" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="certmetrics certification status before second course approval" /></p>
<p style="text-align: justify;">The next window shows all paths for the <strong>CCNP Enterprise</strong> recertification. This maps to the recertification path options shown at the beginning of the article.<strong>&nbsp; </strong></p>
<p><strong>Option 1</strong>: Satisfy <strong>one</strong> of the listed items between <strong>1.1.1 – 1.1.2</strong> or <strong>two</strong> items under <strong>1.1.3</strong>.</p>
<p><strong>Option 2</strong>: Satisfy <strong>one </strong>item under <strong>1.2.1</strong> and <strong>1.2.2</strong> (<strong>40 CE credits</strong>).</p>
<p><strong>Option 3</strong>: Satisfy <strong>one </strong>item under <strong>1.3</strong> (<strong>80 CE credits</strong>).</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/ccnp-enterprise-progress-report.png" alt="ccnp enterprise progress report" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="ccnp enterprise progress report" /></p>
<p>Our preferred recertification path is <strong>1.3</strong>. This requires <strong>80 CE credits</strong>, of which <strong>40</strong> have already been claimed and awarded from the first course.</p>
<p class="box-info">The above screenshot was taken <strong>after</strong> the 40 credit points from the first course were approved.</p>
<p>After the second item (course) has been approved, menu item <strong>1.3 </strong>will be fully satisfied and show a total of<strong> 80 CE Credits</strong> (<strong>80/80</strong>).</p>
<h2><a name="renewal-completed">Cisco Associate, Professional and Specialist Certs Successfully Renewed!</a></h2>
<p style="text-align: justify;">The below screenshot confirms that both <strong>Instructor Led Training</strong> courses were approved, earning us a total of <strong>104 CE credits</strong>. We were able to successfully renew all Cisco certifications:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/services-and-tech/recertification-without-exams/successfully-recertified-all-cisco-certifications-final.png" alt="successfully recertified all cisco certifications final" style="display: block; margin: 7px auto; border: 1px solid #000000;" title="successfully recertified all cisco certifications final" /></p>
<p>We should note the certifications above set to expire in <strong>2</strong> and <strong>69 days</strong> have been <strong>retired</strong> by Cisco and cannot therefore be renewed.</p>
<h2><a name="summary">Summary</a></h2>
<p style="text-align: justify;">In this article we showed how it’s possible to <strong>recertify/renew</strong> your <strong>Cisco certifications</strong> without sitting for any <strong>Cisco exams</strong>. We explained how the <strong>recertification process</strong> works via the <strong>Continuing Education Program</strong>, how to calculate and earn <strong>Educational Credits</strong> (<strong>CE</strong>), calculate the required credits to recertify, search and <strong>claim</strong> your <strong>Educational Credits</strong>, your track your recertification progress and more.</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Wed, 08 Sep 2021 12:44:59 +1000</pubDate>
		</item>
		<item>
			<title>Introduction to Cisco VIRL – Virtual Internet Routing Lab &amp; Other Simulation Tools</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-virl-virtual-internet-routing-lab-introduction.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-virl-virtual-internet-routing-lab-introduction.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-virl-virtual-internet-routing-lab-introduction-1a.png" alt="Cisco VIRL – Virtual Internet Routing Lab" style="margin: 7px; float: left;" title="Cisco VIRL – Virtual Internet Routing Lab" />One of the most difficult things for people who are starting out in a networking career is getting their hands on the equipment. Whether you are studying for <strong>Cisco certification</strong> or just wanting to test certain network behaviors in a <strong>lab</strong>, no one would argue that practicing is the best way to learn.</p>
<p style="text-align: justify;">I have seen people spend hundreds or thousands of dollars (myself included) buying used <strong>networking equipment</strong> in order to build a home <strong>Cisco lab</strong> to gain practical experiences and study for <strong>certification exams</strong>. Until a few years ago it was the only option available, or you had to rent lab hours through one of the training companies.</p>
<h3 style="text-align: justify;">Other Simulation Tools</h3>
<p style="text-align: justify;"><strong>GNS3</strong> is a well-known <strong>free network simulation platform</strong> that has been around for many years. <strong>Cisco IOS on UNIX (IOU)</strong>&nbsp;is another option for running <strong>Cisco routers</strong> in a <strong>virtual environment</strong>. It is a fully working version of IOS that runs as a user mode UNIX (Solaris) process. <strong>IOU</strong> was built as a native Solaris image and runs just like any other program. One key advantage that Cisco IOU has is that it does not require nearly as much resources as <strong>GNS3</strong> and <strong>VIRL</strong> would require. However, the legality of the source of Cisco images for GNS3 is questionable.</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/cisco-virl-virtual-internet-routing-lab-introduction-1L.png" target="_blank" class="jcepopup" title="Cisco VIRL Network Topology" data-mediabox="1" data-mediabox-title="Cisco VIRL Network Topology"><img src="https://www.firewall.cx/images/stories/cisco-virl-virtual-internet-routing-lab-introduction-1.png" alt="Cisco VIRL Network Topology" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco VIRL Network Topology" /></a>Figure 1. Cisco VIRL Network Topology (click to enlarge)</p>
<p style="text-align: justify;">If you are not an authorized Cisco employee or trusted partner, usage of <strong>Cisco IOU</strong> is potentially a legal gray area. Because of lack of publicity and availability to average certification students and network engineers, online resources are limited and setting up a network takes much more effort. Also, due to missing features and delays in supporting the recent Cisco image releases, Cisco is not recommending them to engineers and students.</p>
<p class="box-info" style="text-align: justify;"><a href="https://www.firewall.cx/tools-tips-reviews/reviews-interviews/cisco-virl-book-guide-to-cisco-virtual-internet-routing-lab.html" target="_blank" title="review on &quot;The VIRL Book&quot; – A Guide to Cisco’s Virtual Internet Routing Lab (Cisco Lab)">Read our review on "The VIRL Book" – A Guide to Cisco’s Virtual Internet Routing Lab (Cisco Lab)</a></p>
<h3 style="text-align: justify;">Here Comes Cisco VIRL</h3>
<p style="text-align: justify;"><strong>Cisco Virtual Internet Routing Lab</strong> (<strong>VIRL</strong>) is a software tool Cisco developed to build and run network simulations without the need for physical hardware.</p>
<p style="text-align: justify;">Under the hood, <strong>VIRL</strong> is an <strong>OpenStack-based platform</strong> that runs <strong>IOSv</strong>, <strong>IOSvL2</strong>, <strong>IOS XRv</strong>, <strong>NX-OSv</strong>, <strong>CSR1000v</strong>, and <strong>ASAv software images</strong> on the built-in hypervisor. <strong>VIRL</strong> provides a scalable, extensible network design and simulation environment using the VM Maestro frontend. Recently, I have seen extensive development and improvement made on the browser based operations using HTML5. VIRL also has extensive ability to integrate with third-party vendor virtual machines such as <strong>Juniper</strong>, <strong>Palo Alto Networks</strong>, <strong>Fortinet</strong>, <strong>F5 BigIP</strong>, <strong>Extreme Networks</strong>, <strong>Arista,</strong> <strong>Alcatel</strong>, <strong>Citrix</strong> and more.</p>
<p style="text-align: justify;">VIRL comes in two different editions – <strong>Personal Edition</strong> and <strong>Academic Edition</strong>. Both have the same features except the Academic Edition is cheaper. At the time of writing, <strong>Academic Edition</strong> costs <strong>$79.99 USD per annum</strong> and <strong>Personal Edition</strong> costs <strong>$199.99 USD per year</strong>. VIRL has a license limit to simulate up to <strong>20 Cisco nodes at a time</strong>. You can pay an extra <strong>$100 USD</strong> to upgrade to <strong>30 Cisco nodes</strong>, maximum. To qualify to purchase the Academic Edition, you must be faculty, staff and students of any public or private K-12 institution or Higher Education institution.&nbsp;</p>
<p style="text-align: justify;"><strong>Cisco VIRL</strong> is community-supported and is designed for individual users. For enterprise users who want TAC support, in-depth documentation, training and more, there is <strong>Cisco Modeling Labs (CML)</strong>, an <strong>enterprise version of VIRL</strong>. Of course the CML version costs much more.</p>
<h2 style="text-align: left;">Why VIRL Is Better</h2>
<h3 style="text-align: left;">Official Cisco Images</h3>
<p style="text-align: justify;">VIRL comes with a complete set of legal and <strong>licensed Cisco IOS images</strong> that are the same as those running on physical routers. (I’m sure they were tweaked to optimize them running in a virtual environment). New Cisco IOS releases are provided on a regular basis.</p>
<h3 style="text-align: left;">Runs on Most Computers</h3>
<p style="text-align: justify;">The minimum hardware requirement for VIRL is an Intel-based computer with four CPU cores, 8GB of RAM and 70 GB free disk space. Of course more resources allow for larger simulations. Cisco suggests larger memory, such as 12GB for 20 nodes, 15GB for 30 nodes, or 18GB for 40 nodes. Each Cisco IOS-XRv node requires 3GB of memory to launch. In my experience, the only thing that is likely to stop you is the amount of memory installed on the computer. Computer memory is now inexpensive. You just need to ensure that your computer has enough empty slots to install additional memory.</p>
<h3 style="text-align: left;">Flexible Installation Options</h3>
<p style="text-align: justify;">You can install a VIRL on an enterprise-grade server infrastructure, a desktop computer, a laptop, or even on the cloud. You can run it as a Virtual Machine on VMware ESXi, VMware Workstation, Player or VMware Fusion for Mac OS. As opposed to running on a hypervisor, some choose to build VIRL on a bare-metal computer to achieve maximum performance.</p>
<p style="text-align: justify;">Once your VIRL lab is up and running, it is an all-in-one virtual networking lab that has no wires and cords attached. When you run it as a VM, you can scale, migrate and implement high availability (HA) by taking advantage of the features that VMware infrastructure has to offer.</p>
<h3 style="text-align: left;">Automatic Configuration</h3>
<p style="text-align: justify;">The AutoNetkit, which comes with VIRL, can assign IP addresses to the nodes automatically when they launch, and it will even set up some basic routing protocols for you. The bootstrap configuration gives you a fully converged network as soon as they are launched. And you can go straight to the features and focus on what you want to test. This is a cool feature for network engineers who want to set up a one-time temporary environment to look up commands and test certain features. If you were building a network topology from scratch, or creating a mockup a production environment, manual IP addressing is recommended.</p>
<h3 style="text-align: left;">Community Support by Developers</h3>
<p style="text-align: justify;">VIRL is supported by a community full of good people like you. Questions are often answered first-hand by developers and engineers. The Cisco VIRL team offers monthly webinars and newsletters to keep the community updated on new feature releases and announcements. You can find the online community on Cisco Learning Network at: <a href="https://learningnetwork.cisco.com/groups/virl" target="_blank" rel="nofollow noopener" title="Cisco VIRL Learning Network">https://learningnetwork.cisco.com/groups/virl</a></p>
<h3 style="text-align: justify;">About The Author</h3>
<p style="text-align: justify;">Jack Wang, CCIE #32450, is a principle network consultant and founder of Speak Network Solutions. He has been designing and implementing enterprise and large-scale service provider networks as well as teaching and blogging about advanced technologies. His current focus includes Software Defined Networking (SDN), data centers, Amazon AWS cloud integration, wireless, WAN architectures and design. Jack holds B.S. in Engineering and M.S. in Computer Science.</p>
<h3 style="text-align: left;">Summary</h3>
<p style="text-align: justify;">I wish VIRL had been available when I first started learning Cisco networking technology and taking CCIE exams. I have used GNS3, IOU and other simulation and emulation tools. They all had their advantages and disadvantages. When looking at them together, there are four main reasons I recommend VIRL to network engineers, certification students and trainers.</p>
<ul class="check" style="text-align: justify;">
<li>Developed by Cisco, running official Cisco images. No concerns about legal or software licensing issues.</li>
<li>Has a production-grade, commercial version (CML - Cisco Modeling Lab) available to enterprise customers. It runs essentially the same code as VIRL. Cisco has made VIRL much more affordable for personal and academic use, without the price tag and TAC support. Why not take advantage of it?</li>
<li>Runs on OpenStack and is SDN-ready. If you are interested in learning about Software Defined Network, VIRL has direct integration with OpenDaylight.</li>
<li>Is actively developed by Cisco. New features and updates are released regularly.</li>
</ul>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Thu, 20 Oct 2016 18:24:48 +1100</pubDate>
		</item>
		<item>
			<title>Fix Cisco VPN Client Break After Windows 10 Anniversary Update 1607 – 'This App Can’t Run on This PC'</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows-10-anniversary-update-break-and-fix.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows-10-anniversary-update-break-and-fix.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>Windows 10</strong> latest <strong>update 1607</strong> code named <strong>Anniversary update</strong> promises to introduce a number of significant enhancements including breaking your trustworthy <strong>Cisco IPSec VPN client</strong>. After installing the <strong>Anniversary </strong>update users will receive a familiar message from the <strong>Compatibility Assistant</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-anniversary-update-break-and-fix-1.jpg" alt="This app can’t run on this PC. Cisco VPN Client doesn’t work on this version of Windows" style="display: block; margin-left: auto; margin-right: auto;" title="This app can’t run on this PC. Cisco VPN Client doesn’t work on this version of Windows" /></p>
<p style="text-align: center;" align="center">Figure 1. This app can’t run on this PC. Cisco VPN Client doesn’t work on this version of Windows</p>
<p style="text-align: justify;">The good news is that what you’re reading is not true – While Windows 10 does in fact disable the application, <strong>getting it to work again is a very easy process</strong> and very similar to installing the client on the Windows 10 operating system.</p>
<p style="text-align: justify;">The following steps will help rectify the problem and have your Cisco IPSec VPN client working in less than 5 minutes.</p>
<p class="box-hint"><strong>Windows 7</strong> <strong>32bit</strong> &amp; <strong>64bit</strong> users can read our <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-troubleshoot.html" target="_blank" title="Fix of Cisco VPN Client for Windows 7 Operating System">Cisco VPN Client Fix for Windows 7 Operating System</a>.</p>
<p class="box-hint" style="text-align: justify;"><strong><span style="font-size: 11pt; font-family: 'Calibri','sans-serif';">Windows 8</span></strong><span style="font-size: 11pt; font-family: 'Calibri','sans-serif';"> <strong>32bit</strong> &amp; <strong>64bit</strong> users can read our </span><a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows8-fix.html" target="_blank" title="Fix of Cisco VPN Client for Windows 8 Operating System">Cisco VPN Client Fix for Windows 8 Operating System</a>.<span style="font-size: 11pt; font-family: 'Calibri','sans-serif';"></span></p>
<p class="box-hint" style="text-align: justify;"><strong>Windows 10</strong> Anniversary users without the Cisco VPN Client should read our article <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter.html" target="_blank" title="How to Install and Fix Cisco VPN Client on Windows 10">How to Install and Fix Cisco VPN Client on Windows 10</a>.</p>
<h2 style="text-align: justify;">Step 1 – Download and Extract the Cisco VPN Client</h2>
<p style="text-align: justify;">Head to the Firewall.cx <a href="https://www.firewall.cx/downloads/cisco-tools-a-applications.html" target="_blank" title="Cisco Tools &amp; Applications download section">Cisco Tools &amp; Applications download section</a> to download and extract the Cisco IPSec VPN Client installation files on your computer. The Cisco VPN installation files will be required for the repair process that follows.</p>
<p class="box-warning" style="text-align: justify;"><strong>Note:</strong> The Cisco IPSec VPN Client is offered in a <strong>32Bit</strong> and <strong>64Bit version</strong>. Ensure you <a href="https://www.firewall.cx/downloads/cisco-tools-a-applications.html" target="_blank" title="Cisco IPSec VPN Client download">download </a>the correct version for your operating system.</p>
<h2 style="text-align: justify;">Step 2 – Repair The Cisco VPN Client Application</h2>
<p style="text-align: justify;">After the file extraction process is complete, go to the <strong>Windows Control Panel</strong> and select <strong>Programs and Features</strong>. Locate the <strong>Cisco Systems VPN Client,</strong> select it and <strong>click</strong> on <strong>Repair</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-anniversary-update-break-and-fix-2.jpg" alt="Initiating the Repair of the Cisco IPSec VPN Client" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Initiating the Repair of the Cisco IPSec VPN Client" /></p>
<p style="text-align: center;" align="center">Figure 2. Initiating the Repair of the Cisco IPSec VPN Client</p>
<p style="text-align: justify;">The repair process will ask for the location of the Cisco VPN installation files – simply point it to where the files were extracted previously e.g c:\temp\vpnclient.</p>
<p style="text-align: justify;">At this point the Windows 10 User Account Control will prompt for confirmation to allow the Cisco VPN application to make changes to your device. <strong>Click Yes</strong> to continue:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-anniversary-update-break-and-fix-3.jpg" alt="Windows 10 User Account Control requesting user confirmation to make changes" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Windows 10 User Account Control requesting user confirmation to make changes" /></p>
<p style="text-align: center;" align="center">Figure 3. Windows 10 User Account Control requesting user confirmation to make changes</p>
<p style="text-align: justify;">The repair process will continue by reinstalling the Cisco VPN client files as shown in the process below:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-anniversary-update-break-and-fix-4.jpg" alt="The repair process of the Cisco VPN Client on Windows 10 Anniversary update" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="The repair process of the Cisco VPN Client on Windows 10 Anniversary update" /></p>
<p style="text-align: center;" align="center">Figure 4. The repair process of the Cisco VPN Client on Windows 10 Anniversary update</p>
<h2 style="text-align: left;">Step 3 – Edit Windows Registry - Fix Reason 442: Failed To Enable Virtual Adapter Error</h2>
<p style="text-align: justify;">At this point, the workstation has a fresh installation of the Cisco VPN Client, but will fail to work and produce the well-known <strong>Reason 442: Failed to enable Virtual Adapter Error</strong>.</p>
<p style="text-align: justify;">To fix this issue, follow the steps below:</p>
<p style="text-align: justify;">1. Open your Windows Registry Editor by typing <strong>regedit</strong> in the <strong>Search</strong> <strong>Windows</strong> area.</p>
<p style="text-align: justify;">2. Browse to the Registry Key <strong>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CVirtA</strong></p>
<p style="text-align: justify;">3. From the window on the right, select and <strong>right-click</strong> on <strong>DisplayName</strong> and choose <strong>Modify</strong> from the menu. Alternatively, <strong>double-click</strong> on <strong>DisplayName</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-anniversary-update-break-and-fix-5.jpg" alt="Modify &amp; correct the Windows 10 Cisco VPN Registry entry" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Modify &amp; correct the Windows 10 Cisco VPN Registry entry" /></p>
<p style="text-align: center;" align="center">Figure 5. Modify &amp; correct the Windows 10 Cisco VPN Registry entry</p>
<p style="text-align: justify;">For <strong>Windows 10 32bit</strong> (<strong>x86</strong>) operating systems, change the value data from <strong>“@oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter</strong>” to “<strong>Cisco Systems VPN Adapter</strong>”.</p>
<p style="text-align: justify;">For <strong>Windows 10 64bit</strong> (<strong>x64</strong>) operating systems, change the value data from <strong>“@oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter for 64-bit Windows</strong>” to “<strong>Cisco Systems VPN Adapter for 64-bit Windows</strong>” as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-anniversary-update-break-and-fix-6.jpg" alt="Editing the Value Data for the 64Bit Cisco VPN Client" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Editing the Value Data for the 64Bit Cisco VPN Client" /></p>
<p style="text-align: center;" align="center">Figure 6. Editing the Value Data for the 64Bit Cisco VPN Client</p>
<p style="text-align: justify;">The registry key now shows the correct <strong>DisplayName</strong> value data:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-anniversary-update-break-and-fix-7.jpg" alt="The correct DisplayName registry value for the 64bit Cisco VPN Client" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="The correct DisplayName registry value for the 64bit Cisco VPN Client" /></p>
<p style="text-align: center;" align="center">Figure 7. The correct <strong>DisplayName</strong> registry value for the 64bit Cisco VPN Client</p>
<p style="text-align: justify;">At this point, you should be able to connect to your VPN Gateway without any errors or problems.</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Tue, 23 Aug 2016 22:44:46 +1000</pubDate>
		</item>
		<item>
			<title>Install &amp; Fix Cisco VPN Client on Windows 10 (32 &amp; 64 Bit). Fix Reason 442: Failed to enable Virtual Adapter</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter-1a.png" alt="Fix Windows 10 Reason 442: Failed to enable Virtual Adapter " style="margin: 7px; float: left;" title="Fix Windows 10 Reason 442: Failed to enable Virtual Adapter " />This article shows to <strong>how correctly install Cisco VPN Client</strong> (<strong>32</strong> &amp; <strong>64 bit</strong>) on <strong>Windows 10</strong> (<strong>32</strong> &amp; <strong>64 bit</strong>) using simple steps, <strong>overcome</strong> the ‘<strong>This app can’t run on this PC</strong>’ <strong>installation error</strong>, plus <strong>fix</strong> the <strong>Reason 442: Failed to enable Virtual Adapter error message</strong>. The article applies to <strong>New Windows 10 installations</strong> or <strong>Upgrades</strong> from <strong>earlier Windows versions</strong> and all versions <strong>before or after</strong> Windows 10 <strong>build 1511</strong>. We also <strong>include all required VPN files</strong> directly downloadable from Firewall.cx to save time and trouble from broken 3rd-party links.</p>
<p style="text-align: justify;">To simplify the article and help users quickly find what they are after, we’ve broken it into the following two sections:</p>
<ul class="check" style="text-align: justify;">
<li><strong>How to Install Cisco VPN client on Windows 10 </strong>(clean installation or upgrade from previous Windows), including Windows 10 build <strong>prior or after build 1511</strong>.</li>
<li><strong>How to Fix Reason 442: Failed to enable Virtual Adapter on Windows 10</strong></li>
</ul>
<p><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter-1.png" alt="The Cisco VPN Client Reason 442: Failed to enable Virtual Adapter error on Windows 10" style="margin: 7px auto; display: block;" title="The Cisco VPN Client Reason 442: Failed to enable Virtual Adapter error on Windows 10" /></p>
<p style="text-align: center;">Figure 1. The Cisco VPN Client Reason 442: Failed to enable Virtual Adapter error on Windows 10</p>
<p class="box-hint"><strong>Windows 7</strong> <strong>32bit</strong> &amp; <strong>64bit</strong> users can read our <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-troubleshoot.html" target="_blank" title="Fix of Cisco VPN Client for Windows 7 Operating System">Cisco VPN Client Fix for Windows 7 Operating System</a>.</p>
<p class="box-hint"><strong>Windows 8</strong> users can read our <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows8-fix.html" target="_blank" title="Fix of Cisco VPN Client for Windows 8 Operating System">Cisco VPN Client Fix for Windows 8 Operating System</a>.</p>
<p class="box-hint"><strong>Windows 10 <strong>32bit</strong> </strong>&amp;<strong> <strong>64bit </strong>Anniversary Update 1607</strong> users can read our <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows-10-anniversary-update-break-and-fix.html" target="_blank" title="Fix Cisco VPN Client Break After Windows 10 Anniversary Update 1607">Fix Cisco VPN Client Break After Windows 10 Anniversary Update 1607</a>.</p>
<h2 style="text-align: left;">How To Install Cisco VPN Client On Windows 10 (New installations or O/S Upgrades)</h2>
<p style="text-align: justify;">The instructions below are for new or clean Windows 10 installations. Users who just upgraded to Windows 10 from an earlier Windows version, will need to <strong>first uninstall their SonicWALL VPN Client &amp; Cisco VPN client</strong>, then proceed with the instructions below.</p>
<ol style="text-align: justify;">
<li><strong>Download</strong> and <strong>install</strong> the <strong>SonicWALL Global VPN Client</strong> from Firewall.cx’s <a href="https://www.firewall.cx/downloads/cisco-tools-a-applications.html" target="_blank" title="Cisco Tools &amp; Applications">Cisco Tools &amp; Applications</a> section. This is required so that the <strong>DNE Lightweight filter network client</strong> is installed on your workstation. You can later on remove the SonicWall Global Client.</li>
<li><strong>Download</strong> and <strong>install</strong> the<strong> Cisco VPN client</strong> <strong>(32 or 64 bit</strong>) from Firewall.cx’s <a href="https://www.firewall.cx/downloads/cisco-tools-a-applications.html" target="_blank" title="Cisco Tools &amp; Applications">Cisco Tools &amp; Applications</a> section.</li>
<li><strong>Optional</strong>: <strong>Uninstall</strong> the <strong>SonicWALL Global VPN Client</strong>.</li>
</ol>
<p style="text-align: justify;">Note: If you receive the Windows message “<strong>This app can’t run on this PC</strong>”, go to the folder where the <strong>Cisco VPN client</strong> was <strong>extracted</strong> and <strong>run</strong> the “<strong>vpnclient_setup.msi</strong>” file. If you don’t remember where the file was extracted, <strong>execute</strong> the downloaded file again and select an extraction path e.g <strong>c:\temp\ciscovpn\</strong> so you know where to look for it.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter-2.png" alt="Overcoming the “Cisco VPN Client doesn’t work on this version of Windows” message" style="margin: 7px auto; display: block;" title="Overcoming the “Cisco VPN Client doesn’t work on this version of Windows” message" /></p>
<p style="text-align: center;">Figure 2. Overcoming the “Cisco VPN Client doesn’t work on this version of Windows” message</p>
<p style="text-align: justify;">After successfully installing the Cisco VPN Client, you can <strong>uninstall</strong> the <strong>SonicWALL Global VPN Client</strong> to save system resources and stop it from running in the future, however <span style="text-decoration: underline;"><strong>ensure you leave all uninstall options to their default</strong></span>. This means <strong>leave unchecked</strong> the two options below during the uninstall process:</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter-3.jpg" alt="Uninstalling the SonicWALL Global VPN Client after Cisco VPN Client installation" style="margin: 7px auto; display: block;" title="Uninstalling the SonicWALL Global VPN Client after Cisco VPN Client installation" /></p>
<p style="text-align: center;" align="center">Figure 3. Uninstalling the SonicWALL Global VPN Client after Cisco VPN Client installation</p>
<p style="text-align: justify;"><br /> This completes the installation phase of the Cisco VPN client on Windows 10.</p>
<h2 style="text-align: left;">How To Fix Reason 442: Failed To Enable Virtual Adapter On Windows 10</h2>
<p style="text-align: justify;">When attempting to connect to a VPN gateway (router or firewall) using the Cisco VPN Client on Windows 10, it will fail to connect because of the following reason: Reason 442: Failed to Enable Virtual Adapter.</p>
<p style="text-align: justify;">This fix is very easy and identical to <a href="https://www.firewall.cx//cisco/cisco-services-technologies/cisco-vpn-client-windows8-fix.html" target="_blank" title="Windows 8 Cisco VPN Client fix">Windows 8 Cisco VPN Client fix</a>, already covered on Firewall.cx:</p>
<p style="text-align: justify;">1. Open your Windows Registry Editor by typing <strong>regedit</strong> in the <strong>Search the web and Windows</strong> prompt.</p>
<p style="text-align: justify;">2. Browse to the Registry Key <strong>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CVirtA</strong></p>
<p style="text-align: justify;">3. From the window on the right, <strong>select and right-click</strong> on <strong>DisplayName</strong> and choose <strong>Modify</strong> from the menu. Alternatively, <strong>double-click</strong> on <strong>DisplayName</strong>:</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter-4.png" alt="Modify &amp; correct the Windows 10 Cisco VPN Registry entry" style="margin: 7px auto; display: block;" title="Modify &amp; correct the Windows 10 Cisco VPN Registry entry" /></p>
<p style="text-align: center;" align="center">Figure 4. Modify &amp; correct the Windows 10 Cisco VPN Registry entry</p>
<p style="text-align: justify;">For <strong>Windows 10 32bit</strong> (<strong>x86</strong>) operating systems, change the value data from “<strong>@oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter</strong>” to “<strong>Cisco Systems VPN Adapter</strong>”.</p>
<p style="text-align: justify;">For <strong>Windows 10 64bit</strong> (<strong>x64</strong>) operating systems, change the value data from “<strong>@oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter for 64-bit Windows</strong>” to “<strong>Cisco Systems VPN Adapter for 64-bit Windows</strong>” (shown below):</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter-5.png" alt="Editing the Value Data for the Cisco VPN Client" style="margin: 7px auto; display: block;" title="Editing the Value Data for the Cisco VPN Client" /></p>
<p style="text-align: center;" align="center">Figure 5. Editing the Value Data for the Cisco VPN Client</p>
<p style="text-align: justify;">The registry key now shows the correct <strong>DisplayName</strong> value data:</p>
<p style="text-align: justify;" align="center"><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter-6.png" alt="The correct 64bit Windows 10 registry values for the Cisco VPN Client to work" width="650" height="229" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="The correct 64bit Windows 10 registry values for the Cisco VPN Client to work" /></p>
<p style="text-align: center;" align="center">Figure 6. The correct 64bit Windows 10 registry values for the Cisco VPN Client to work</p>
<p style="text-align: justify;">At this point, you should be able to connect to your VPN Router or Gateway without any problems.</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Sun, 27 Dec 2015 20:33:46 +1100</pubDate>
		</item>
		<item>
			<title>How to Fix Cisco VPN Client Error 51 – Unable to Communicate with the VPN Subsystem</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-error-51.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-error-51.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>Apple Mac OS X</strong> users are frequently faced with the Cisco VPN Client <strong>Error 51 - Unable to Communicate with the VPN Subsystem</strong> as shown in the screenshot below:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-vpn-mac-error-51-1.png" alt="cisco-vpn-mac-error-51-1" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco VPN Client Error 51- MAC OS X" /></p>
<p style="text-align: justify;">When this error is produced, users will no longer be able to connect to their VPN using the Cisco VPN client. It seems like Cisco’s VPN client often produces the error when network adaptors disappear and reappear – a common scenario when removing the Ethernet cable or reconnecting to your wireless network.</p>
<p style="text-align: justify;">The solution provided will force the <strong>Cisco VPN</strong> to re-initialize and continue working without a problem.</p>
<p style="text-align: justify;">To overcome the error, close the VPN Client, open a <strong>Terminal Window</strong>, (Applications -&gt; Utilities -&gt; Terminal) and type one of the following commands:<br /> <br /> For older OS versions:</p>
<div class="box-content">$ <strong>sudo /System/Library/StartupItems/CiscoVPN/CiscoVPN restart</strong></div>
<div><br /> For newer OS versions:</div>
<div>&nbsp;</div>
<div class="box-content">$ <strong>sudo kextload /System/Library/Extensions/CiscoVPN.kext</strong></div>
<div>The above command(s) requires administrator rights, so the system might ask for the administrator password as shown below:</div>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-vpn-mac-error-51-2.png" alt="cisco-vpn-mac-error-51-2" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco VPN Client Error 51- MAC OS X command" /></p>
<p style="text-align: justify;">&nbsp;Another command that can be used to re-initialize the <strong>Cisco VPN subsystem</strong> is the following:</p>
<div class="box-content" style="text-align: justify;">$ <strong>sudo SystemStarter restart CiscoVPN</strong></div>
<p style="text-align: justify;">Again, the administrator password might be required.</p>
<p style="text-align: justify;">Should the <strong>Error 51</strong> problem occur again, simply apply the same command that worked for you previously and you’ll be ready to connect to your VPN. It might also be a good idea to create a small script with the above commends so it can be executed every time the error occurs.</p>
<p style="text-align: justify;">Windows 7/8 users experiencing the Cisco VPN Client <strong>Error 442</strong> on their system can also visit our <a href="https://www.firewall.cx/cisco/cisco-services-technologies.html" title="Cisco Services &amp; Technologies">Cisco Services &amp; Technologies</a> section to read how to correct the problem.</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Thu, 13 Mar 2014 07:32:34 +1100</pubDate>
		</item>
		<item>
			<title>Introducing The Cisco Technical Support Mobile App (Apple iOS, Android Smartphones). Open, Monitor &amp; Manage TAC Cases, RMAs, Products, Podcasts &amp; More!</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-tech-support-app.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-tech-support-app.html</guid>
			<description><![CDATA[<p><strong>By: Arani Mukherjee &amp; Chris Partsenidis</strong></p>
<p style="text-align: justify;">For <img src="https://www.firewall.cx/images/stories/review-100-percent-badge.png" alt="review-100-percent-badge" width="71" height="108" style="float: left;" />a successful networking professional it is essential to gain information on-the-fly about the network infrastructure he or she is working on. For a successful and established vendor of networking equipment and technology it is important to satisfy this requirement. Being at the forefront of networking technology, Cisco carries the enviable distinction of not only setting industry standards and delivering a variety of networking equipment, but also presenting an efficient support infrastructure. One such service offering is its latest Cisco Technical Support Mobile App.</p>
<p style="text-align: justify;">As handheld devices are rapidly becoming the norm, the Cisco Support mobile app delivers a strong support base for networking professionals. Firewall.cx, will now present a broad spectrum analysis of this application, discussing its salient features and showcasing its merits.</p>
<p style="text-align: justify;">For the purpose of this exercise the Android Platform has been used.&nbsp; However the app &nbsp;is available for all other platforms such as iOS and BB10.</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-0.png" alt="cisco-support-app-0" width="150" height="214" style="margin: 7px auto; vertical-align: middle; display: block;" title="Cisco Mobile Support App - Start Screen  iOS Apple &amp; Android Smartphone" /></p>
<h2>Key Features</h2>
<p style="text-align: justify;">The Cisco Technical Support mobile app has a multifunctional element, synonymous with all Cisco products. Here we look into the key features, which are as follows:</p>
<ul class="checkbox">
<li><strong>Opening and Managing Support Cases and RMAs with Cisco</strong></li>
<li><strong>Cisco Support Community Activities</strong></li>
<li><strong>Video Feeds</strong></li>
<li><strong>News Feeds (Cisco Blogs)</strong></li>
<li><strong>Podcasts</strong></li>
<li><strong>Cisco Product Information</strong></li>
</ul>
<p style="text-align: justify;">Please note that this review is being done on the app itself, venturing into its ease of use, robustness and overall functionality.</p>
<h2>User Experience</h2>
<p style="text-align: justify;">Simplicity has always been the hallmark of a Cisco product; this mobile application shares this key value. The user experience is enhanced by the fact that the app delivers a robust support infrastructure without complicating the extraction of information.</p>
<p style="text-align: justify;">Before obtaining access to the services and information the app provides, each user is requested to login to their Cisco CCO account as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-1.png" alt="cisco-support-app-1" width="210" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App Login Screen (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">&nbsp;Once logged in, the user is presented with the <strong>Home</strong> screen menu, which clearly shows what the application has to offer:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-1a.png" alt="cisco-support-app-1a" width="210" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - Main Menu  (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">As depicted in the screenshot, it is evident that form has followed function. This high-impact home screen layout clearly shows the services Cisco Technical Support Mobile App has to offer.</p>
<p style="text-align: justify;">Each section has its own subsection, which has a strict hierarchy. This allows the user to navigate through the various subsections without losing context.</p>
<h2>Support Cases</h2>
<p style="text-align: justify;">The <strong>Cisco Support Cases</strong> section is one of the application’s strongest and most popular areas, it allows the user to open and fully manage Cisco support cases. The process of opening a support case is identical to that of the Cisco Support Website.</p>
<p style="text-align: justify;">Users with existing cases in their CCO account will find they can continue working on their cases through the application. The app automatically syncs with the user’s CCO profile, allowing users to have access to their Cisco support cases without requiring a laptop or, being at the office. The only requirement is Internet access on their mobile device.</p>
<p style="text-align: justify;">The <strong>Support Cases</strong> section presents four options, allowing the user to:</p>
<ul class="check">
<li>Use <strong>My Open Cases </strong>toview and manage support cases</li>
<li>Create a <strong>Watch List</strong> (useful to ‘bookmark’ important cases)</li>
<li><strong>Search Cases </strong></li>
<li><strong>Open New Cases</strong> (and issue RMAs)</li>
</ul>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-3a.png" alt="cisco-support-app-3a" width="210" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - TAC Support Cases Menu  (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">The <strong>My Open Cases</strong> menu allows users to fully manage all existing open cases. From here, &nbsp;users can view cases and communications with Cisco TAC, update cases with new information, request the closure of cases and much more.</p>
<p style="text-align: justify;">When working on multiple TAC cases it can be difficult to keep track of the most important ones. This is where the <strong>My Watch List</strong> menu option comes in handy: it allows the user to add cases to his/her <strong>Watch List,</strong> and keep track of them, without searching through the <strong>My Open Cases</strong> section.</p>
<p style="text-align: justify;">The <strong>Search Cases</strong> menu option allows users to search through all open TAC cases for specific keywords. The search can be based on <strong>Title</strong>, <strong>Description</strong>, <strong>Case Number</strong>, <strong>Case Owner ID</strong> or <strong>Service Contract Number</strong>.</p>
<p style="text-align: justify;">The last menu option, <strong>Open New Case</strong>, allows the user to open a new case with Cisco TAC.</p>
<h2 style="text-align: justify;">Support Cases: Diving Into ‘My Open Cases’</h2>
<p style="text-align: justify;">Let’s look at how to fully manage Cisco TAC support cases using the Cisco Technical Support&nbsp; app.</p>
<p style="text-align: justify;">By selecting <strong>My Open Cases</strong> users are presented with all open support cases, which are categorized by <strong>Customer Pending</strong> and <strong>Cisco Pending</strong> status. Notice how the application shows the number of open cases in the tab of each category:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-4.png" alt="cisco-support-app-4" width="425" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - TAC Open Cases Customer/Cisco Pending (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">Selecting either of the two tabs (<strong>Customer</strong>/<strong>Cisco Pending</strong>), the application will list the cases and the following important information: <strong>Severity </strong>(automatically highlighted in the application), <strong>Service Request Number</strong>, <strong>Case Title</strong>, <strong>Last Update Date</strong> and <strong>Case Owner</strong>.</p>
<p style="text-align: justify;">Users running the app under the Android platform can use the <strong>refresh</strong> button (lower left corner) to force the application to update – sync with the Cisco Support website.&nbsp; We should note that the iOS client uses "tug to refresh" instead.&nbsp;</p>
<p style="text-align: justify;">The <strong>refresh</strong> feature comes in handy while monitoring cases where the user is expecting updates by Cisco TAC or one of their colleagues handling the cases with Cisco. For the user’s convenience, the application shows when it was last updated with the Cisco Support website.&nbsp;</p>
<p style="text-align: justify;">The user can tap on any open case to view more details and manage it. For example, we tapped on the second listed case while in the <strong>Cisco Pending</strong> tab (Case 626926599) to view further details:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-5.png" alt="cisco-support-app-5" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - TAC Case Details (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">As shown in the screenshot above, the user is able to view the <strong>Date Created</strong>, the <strong>Cisco TAC Engineer</strong> assigned to the case, <strong>Tracking Number</strong> and <strong>RMA</strong> related information. This is used only in case of an RMA, along with the <strong>Previous Notes</strong> (communication history for this case) and case <strong>Attachments</strong> (files that have been attached to the case).</p>
<p style="text-align: justify;">Getting in contact the Cisco TAC engineer handling the case is as easy as tapping on <strong>Contact TAC Engineer</strong> option. This will open the <strong>Contact Option</strong> popup window and ask the user for the preferred contact method: <strong>Email</strong> or <strong>Call the Engineer</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-7.png" alt="cisco-support-app-7" width="210" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - TAC Case Contact Options (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">Selecting <strong>Email</strong> will launch the preferred email client and automatically enter the Cisco TAC Engineer’s email address and Case number as the subject. Selecting <strong>Call TAC Engineer</strong> will bring up the engineer’s direct phone number.</p>
<p style="text-align: justify;">Returning back to our case screen and selecting the <strong>Previous Notes</strong> option reveals all of the communication history with Cisco TAC. This feature is ideal for IT Managers monitoring cases, to get up to speed on what actions have been taken so far:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-6.png" alt="cisco-support-app-6" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - TAC Case Notes (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">&nbsp;From here, we can read an individual email/note by simply tapping on top of it to select it.</p>
<h2 style="text-align: justify;">Additional Support Case Management</h2>
<p style="text-align: justify;">While inside a Cisco Support Case the user can select additional actions by selecting the left menu button which will reveal the following: <strong>Add Note</strong>, <strong>Request Status</strong> <strong>Update</strong>, <strong>Add to Watch List</strong>, <strong>Attach Photo</strong>, <strong>Request Case Closure </strong>and <strong>Logout</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-8.png" alt="cisco-support-app-8" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - TAC Support Case Management (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">Selecting <strong>Add Note</strong> is similar to replying to an email thread of the case. Once selected, we can add a title and note which can then be submitted. The system will then automatically update the case and the engineer will be notified that an update has been made by the customer.</p>
<h2>Support Cases: Watch Lists &amp; Searching Cases</h2>
<p style="text-align: justify;"><strong>My Watch List</strong></p>
<p style="text-align: justify;">Returning to the main <strong>Support Cases</strong> menu, users can visit the <strong>My Watch List</strong> area. Here they can keep track of any cases that have been added to the <strong>Watch List</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-9.png" alt="cisco-support-app-9" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - Support Cases - Watch List (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">Users who haven’t used this feature won’t find any case listed in it, however, as noted previously, pressing the left menu button while viewing a case will allow it to be added to the <strong>Watch List</strong> for future reference as shown in the two screenshots below:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-10.png" alt="cisco-support-app-10" width="465" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - Support Cases - Add Watch List (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">After adding the necessary support cases to the <strong>Watch List</strong>, users can view and manage them directly from <strong>My Watch List</strong>, as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-11.png" alt="cisco-support-app-11" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - Support Cases - My Watch List (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;"><strong>Searching Cases</strong></p>
<p style="text-align: justify;">The ability to search cases allows the user to quickly search and locate a specific open case, based on the available search options:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-12.png" alt="cisco-support-app-12" width="445" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - Support Cases - Search Options (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">To begin searching, select the <strong>Search Option</strong> (by default <strong>Title or Description contains</strong> is selected), type in a search keyword and select the large green <strong>Search</strong> button at the bottom of the screen.</p>
<p style="text-align: justify;">After the <strong>Search</strong> button is pressed, the application will send the request to the Cisco Support Website&nbsp; and return the results within a few seconds:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-13.png" alt="cisco-support-app-13" width="210" height="171" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - Support Cases - Search Results (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">In our example we searched for the keyword ‘<strong>CME</strong>’ and it returned the Cisco case we were looking for. Once the search is complete select the case to enter and continue managing it.</p>
<h2>Support Cases: Opening A New Case</h2>
<p style="text-align: justify;">Opening a support case with Cisco has always been an easy step-by-step process, especially through the new intuitive Cisco Support Website. The Cisco Technical Support mobile application brings the same ease to all mobile devices.</p>
<p style="text-align: justify;">Through the <strong>Open New Case</strong> option the user is able to quickly open support cases and get a TAC Engineer to help resolve the problem. The experience is so impressive that we (<strong>Firewall.cx</strong>) decided to open a new case and then requested the TAC Engineer call us back so we could discuss our requirements. We tracked this whole case from our mobile phone, without the use of a PC, and we couldn’t think of any other vendor who would provide such a functional and smartly designed support environment.</p>
<p style="text-align: justify;">When opening a new case, the user is presented with five easy steps before submitting the support case. These are:</p>
<ul>
<li>Product Serial Number</li>
<li>Case Type (Severity Selection – ability to mark as urgent)</li>
<li>Select Product Type (Technology or product)</li>
<li>Select Problem Type (Configuration Assistance, Error Messages, Hardware failure etc.)</li>
<li>Case Title and Description</li>
</ul>
<p style="text-align: justify;">Every step, with the exception of <strong>Serial Number</strong> and <strong>Case Title / Description</strong>, consists of easy tap-and-select options that require minimal effort to complete.</p>
<p style="text-align: justify;">When opening a new case, the first screen requests the product’s serial number. It is important to have the serial number of the product experiencing the problem. This will ensure that the application can continue to the next step. Once the correct serial number is entered tap <strong>Next</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-14.png" alt="cisco-support-app-14" width="210" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - Open New Support Case (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">Next, select the <strong>Case Type</strong>. If this is an urgent case such as a network-down situation it is imperative the <strong>Extended Loss of Service</strong> option is also selected. This will help catch the immediate attention of the assigned Cisco TAC Engineer and in most cases results to a faster initial response. For this example we chose the first option by simply tapping on it, after which the <strong>Check</strong> appeared as a visual confirmation of our selection:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-15.png" alt="cisco-support-app-15" width="210" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - Select Case Type (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">We hit the <strong>Next</strong> button and then selected the <strong>technology</strong> and <strong>product</strong> in the two scrollable menu selections:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-support-app-16.png" alt="cisco-support-app-16" width="482" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - Select Product Type (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">Selecting <strong>Next</strong> again takes the user to the next step where he/she is required to select the <strong>Problem Type</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-17.png" alt="cisco-support-app-17" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - Select Problem Type (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">There are five different problem types to select.&nbsp; They cover possible problems that might arise, from simple configuration issues to hardware or software failures. Users selecting the <strong>Hardware Failure</strong> option will be taken down the RMA path to have their hardware replaced. In this example we selected <strong>Configuration Assistance</strong> and selected the <strong>NEXT</strong> button.</p>
<p style="text-align: justify;">The final step requires the user to enter a short <strong>Case Title</strong> and a more detailed <strong>Case Description</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-18.png" alt="cisco-support-app-18" width="210" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - Enter Problem Description (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">It is important to provide as much information as possible, in a well-structured manner. This will help the engineer assigned to the case understand the problem or requirement.</p>
<p style="text-align: justify;">When complete, the application will present a final overview of the case before it is submitted into the queue for an engineer to be assigned to it. If incorrect details were accidentally entered was and submitted an update email can be submitted through the case management with the necessary corrections:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-19.png" alt="cisco-support-app-19" width="210" height="437" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - New Case Review (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">After ensuring the details, notes and problem description are correct, select the <strong>Submit</strong> button. The case is then created and a confirmation window appears with the <strong>Support Case Number</strong> and options <strong>to View the Case</strong> <strong>or Email Case Information</strong> to a Manager, colleague or engineer:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-20.png" alt="cisco-support-app-20" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - Support Case Opened (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">Tapping the <strong>Done</strong> button will return the user to the main <strong>Support Case</strong> menu. Alternatively, selecting <strong>View Case</strong> will show the case details and allow the user to manage the newly opened case:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-21.png" alt="cisco-support-app-21" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - View New Case Info (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">Notice that since this was a newly created TAC Case, no engineer has been assigned to it yet (<strong>TAC Engineer: NA</strong>). After a couple of minutes, the app shows the case was assigned to a Cisco TAC Engineer. Once the TAC Engineer was assigned, we created a new note (<strong>left menu button</strong> -&gt; <strong>Add Note</strong>) requesting the engineer to call us so we can discuss the problem:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-22.png" alt="cisco-support-app-22" width="717" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - Add Case Note - Contact TAC Engineer (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;">The TAC Engineer assigned to the case is able to view the owner’s details and obtain their contact information from there. If we were out of the office, we could provide our mobile number in the note. Shortly after submitting the note, we received the expected phone call from the Cisco TAC Engineer.</p>
<p style="text-align: justify;">Summarizing the <strong>Support Case</strong> section of the Cisco Technical Support mobile application, &nbsp;we believe it is an invaluable tool that helps IT Managers, Engineers and IT personnel keep on top of problems by managing Cisco Support Cases with ease and effectiveness, regardless of their location. We have not seen any similar products from other vendors, confirming once again how innovative Cisco’s Support Services and the Development team are.</p>
<h2 style="text-align: justify;"><span lang="EN-GB">Support Community</span></h2>
<p style="text-align: justify;"><span lang="EN-GB">The Support Community Section is broken down into several subsections, each dealing with a different mode of support as shown in the following screenshot:</span></p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-23.png" alt="cisco-support-app-23" width="210" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - Support Community Section (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;"><span lang="EN-GB">If the user prefers to go down the route of ‘<strong>Browse Community</strong>’ a plethora of options is presented. This enables the user to make very specific choices based on their most current need. The following screenshot shows the options:</span></p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-24.png" alt="cisco-support-app-24" width="210" height="350" style="margin: 7px auto; display: block;" title="Cisco Support Mobile App - Browse Community Section (iOS Apple, Android Smartphone)" /></p>
<p class="MsoListParagraphCxSpFirst" style="margin-left: 0cm; text-align: justify;"><span lang="EN-GB">Each individual subsection further expands into its own area to display further choices. Worth mentioning is also the fact the Cisco Technical Support Mobile App has added support for several global communities such as Japanese, Polish, Portuguese,&nbsp;Russian,&nbsp;&amp;&nbsp;Spanish.</span></p>
<p class="MsoListParagraphCxSpLast" style="margin-left: 0cm; text-align: justify;"><span lang="EN-GB">A key element to an engineer’s understanding is being able to visualize the technology being described, or demonstrated, and to be informed about the latest implementations. This is where the <strong style="mso-bidi-font-weight: normal;">Videos</strong> section comes in very handy. This section contains a variety of information made available in video. These videos range from Cisco Support Communities videos, showcasing seminars, events etc. and expands to bulletins, webcasts and expert explanations.</span></p>
<p><span lang="EN-GB">The following screenshot shows video options available for a user to select from:</span></p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-25.png" alt="cisco-support-app-25" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - Videos Section (iOS Apple, Android Smartphone)" /></p>
<p class="MsoListParagraphCxSpFirst" style="margin-left: 0cm; text-align: justify;"><span lang="EN-GB">The last two sections in the <strong style="mso-bidi-font-weight: normal;">Videos</strong> category are full of fundamental overviews and general networking topics like concepts and networking protocols. <span style="mso-spacerun: yes;"></span></span></p>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 0cm; text-align: justify;"><span lang="EN-GB">Another feature is the <strong style="mso-bidi-font-weight: normal;">Podcasts </strong>section. This category has two subsections <strong style="mso-bidi-font-weight: normal;">Cyber Risks Report</strong> and a <strong style="mso-bidi-font-weight: normal;">TAC Security Podcast</strong>. Selecting either of these subsections opens up the current topics covered within the podcast arena. This handy tool keeps users updated on current news and trends.</span></p>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 0cm; text-align: justify;"><span lang="EN-GB">The next section we will cover is the <strong style="mso-bidi-font-weight: normal;">RSS Feeds</strong>. This is a massive repository of blogs covering a wide range of topics segmented into three major labels: media, news and security. This enables the user to pick and choose which feeds are most relevant from his or her own perspective.</span></p>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 0cm; text-align: justify;"><span lang="EN-GB">Last in this discussion, is the <strong style="mso-bidi-font-weight: normal;">Products </strong>section. This covers all of Cisco’s offerings in terms of devices, tools, services, resources and trends. This is a virtual goldmine for anything and everything related to Cisco. The most brilliant part of this section is that the user can join a chat session (see screenshot) if there is a need for some instant assistance or information. </span></p>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 0cm; text-align: justify;"><span lang="EN-GB">In this section you also have the option to send an email or request a price for any product. Additionally, once the chat session is started it continues to run in the background for easy access whenever the user chooses. Hence the ‘<strong style="mso-bidi-font-weight: normal;">Continue Chat</strong>’ tab that appears, enabling the user to reengage the information interchange. </span></p>
<p style="text-align: justify;"><span lang="EN-GB">This screenshot shows the first page in the list of options on the <strong>Product Information</strong> page:</span></p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-26.png" alt="cisco-support-app-26" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - Product Information Page (iOS Apple, Android Smartphone)" /></p>
<p style="text-align: justify;"><span lang="EN-GB">In this screenshot you can see the multiple options for communicating with Cisco:</span></p>
<p><img src="https://www.firewall.cx/images/stories/cisco-support-app-27.png" alt="cisco-support-app-27" width="210" height="350" style="margin: 7px auto; display: block; border: 1px solid #000000;" title="Cisco Support Mobile App - Communicate with Cisco options (iOS Apple, Android Smartphone)" /></p>
<p class="MsoListParagraphCxSpFirst" style="margin-left: 0cm; mso-add-space: auto; text-align: justify;"><span lang="EN-GB">This mobile application is a must have for every networking professional. <span style="mso-spacerun: yes;"></span>It is a master of usability, simplicity and efficiency in delivering relevant information.</span></p>
<p class="MsoListParagraphCxSpMiddle" style="margin-left: 0cm; text-align: justify;"><span lang="EN-GB">It has often been stated that the value of a tool is in its ability to reach the masses, and their recognition of its features. <span style="mso-spacerun: yes;"></span>The Cisco Technical Support mobile application has won the <strong style="mso-bidi-font-weight: normal;">2013 American Business Award for Mobile On-Demand Application</strong>, <strong style="mso-bidi-font-weight: normal;">2012 Web Marketing Association Best Advocacy Mobile App</strong>, and <strong style="mso-bidi-font-weight: normal;">2012 Forrester Groundswell B2B Mobile App</strong> awards.</span></p>
<p class="MsoListParagraphCxSpLast" style="margin-left: 0cm; text-align: justify;"><span lang="EN-GB">In closing, this application lives up to the expectations and scores on multiple grounds. Networking professionals will benefit from this immensely. Using this app will greatly enhance their own productivity and efficiency as well as help resolve issues and stay up to date on information, products and trends.</span></p>
<p>&nbsp;</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Fri, 30 Aug 2013 06:50:00 +1000</pubDate>
		</item>
		<item>
			<title>Comparing Cisco VPN Technologies – Policy Based vs Route Based VPNs</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-comparing-vpn-technologies.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-comparing-vpn-technologies.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong>Virtual Private Networks</strong> constitute a hot topic in networking because they provide low cost and <strong>secure communications</strong> between sites (<strong>site-to-site VPNs</strong>) while improving productivity by extending corporate networks to remote users (<strong>remote access VPNs</strong>).</p>
<p style="text-align: justify;">Cisco must be proud of its <strong>VPN solutions</strong>. It’s one of the few vendors that support such a wide range of VPN technologies with so many features and flexibility. Cisco Routers and Cisco ASA Firewalls are the two types of devices that are used most often to build Cisco Virtual Private Networks. &nbsp;</p>
<p style="text-align: justify;">In this article we will discuss and compare two general Cisco VPN categories that are utilized by network engineers to build the majority of VPN networks in today’s enterprise environments. These categories are “<strong>Policy Based VPNs” </strong>(or<strong> IPSEC VPNs</strong>) and “<strong>Route Based VPNs</strong>”. Of course Cisco supports additional VPN technologies such as <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-intro.html" target="_blank" title="Web SSL VPNs">SSL VPNs</a> (Anyconnect SSL VPN, Clientless SSL VPN), <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-intro.html" target="_blank" title="Dynamic Multipoint VPN (DMVPN)">Dynamic Multipoint VPN (DMVPN)</a>, <strong>Easy VPN</strong>, <strong>Group Encrypted Transport</strong> (<strong>GET</strong>) <strong>VPN</strong> etc. Many of these VPN technologies are already covered on Firewall.cx and are beyond the scope of this article. &nbsp;</p>
<p style="text-align: justify;">Below is a selection of Cisco VPN articles to which interested users can refer:</p>
<ul style="text-align: justify;">
<li><a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-intro.html" target="_blank" title="Understanding Cisco Dynamic Multipoint VPN (DMVPN)">Understanding Cisco Dynamic Multipoint VPN (DMVPN)</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-models.html" target="_blank" title="Dynamic Multipoint VPN (DMVPN) Deployment Models &amp; Architectures">Dynamic Multipoint VPN (DMVPN) Deployment Models &amp; Architectures</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-dmvpn-configuration.html" target="_blank" title="Configuring Cisco Dynamic Multipoint VPN (DMVPN)">Configuring Cisco Dynamic Multipoint VPN (DMVPN)</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-site-to-site-ipsec-vpn.html" target="_blank" title="Configuring Site to Site IPSec VPN Tunnel Between Cisco Routers">Configuring Site to Site IPSec VPN Tunnel Between Cisco Routers</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-vpn-dynamic-endpoint.html" target="_blank" title="Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers">Configuring Cisco Site to Site IPSec VPN with Dynamic IP Endpoint Cisco Routers</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-gre-ipsec.html" target="_blank" title="Configuring Point-to-Point GRE VPN Tunnels on Cisco Routers">Configuring Point-to-Point GRE VPN Tunnels on Cisco Routers</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-gre-ipsec-tunnel-transport.html" target="_blank" title="Cisco GRE and IPSec - GRE over IPSec - Selecting and Configuring GRE IPSec Tunnel or Transport Mode">Cisco GRE and IPSec - GRE over IPSec - Selecting and Configuring GRE IPSec Tunnel or Transport Mode</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-anyconnect-webvpn.html" target="_blank" title="Configuring Cisco SSL VPN AnyConnect (WebVPN) on Cisco IOS Routers">Configuring Cisco SSL VPN AnyConnect (WebVPN) on Cisco IOS Routers</a></li>
</ul>
<h2 style="text-align: justify;">Overview Of Policy-Based &amp; Route-Based Cisco VPNs</h2>
<p style="text-align: justify;">The diagram below shows a quick overview of the two VPN Categories we are going to discuss and their Practical Applications in actual networks:</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-comparing-vpn-technologies-1.png" alt="cisco policy based and route based vpns" width="670" height="223" style="display: block; margin-left: auto; margin-right: auto;" title="Policy-Based VPNs Vs Route-Based VPNs" /></p>
<p style="text-align: justify;">For a Network Engineer or Designer it’s important to know the main differences between these two VPN categories and their practical applications. Knowing these will help professionals choose the right VPN type for their company and customers.</p>
<p style="text-align: justify;">As shown in the diagram above, Policy-Based VPNs are used to build Site-to-Site and Hub-and-Spoke VPN and also remote access VPNs using an IPSEC Client. On the other hand, Route-Based VPNs are used to build only Site-to-Site or Hub-and-Spoke VPN topologies.</p>
<p style="text-align: justify;">Now let’s see a brief description of each VPN Type.</p>
<h2 style="text-align: justify;">Policy-Based IPSEC VPN</h2>
<p style="text-align: justify;">This is the traditional IPSEC VPN type which is still widely used today. This VPN category is supported on both Cisco ASA Firewalls and Cisco IOS Routers. With this VPN type the device encrypts and encapsulates a subset of traffic flowing through an interface according to a defined policy (using an Access Control List). The <a href="https://www.firewall.cx/networking/network-protocols/ip-security-protocol.html" target="_blank" title="IPSEC protocol">IPSEC protocol</a> is used for tunneling and for securing the communication flow. Since the traditional IPSEC VPN is standardized by IETF, it is supported by all networking vendors so you can use it to build VPNs between different vendor devices as well.&nbsp;</p>
<p style="text-align: justify;"><strong>Sample Configuration on Cisco ASA Firewalls</strong></p>
<p style="text-align: justify;">To illustrate the reason why this VPN type is called <strong>Policy-Based</strong> VPN, we will see a sample configuration code on a Cisco ASA firewall based on the diagram below.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx//images/stories/cisco-comparing-vpn-technologies-2.png" alt="cisco asa ipsec site to site vpn" width="600" height="213" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco ASA Firewall Site-to-Site VPN Configuration" /></p>
<p style="text-align: justify;">Full step-by-step configuration instructions for<strong> Policy-Based</strong> <strong>VPN</strong> on <strong>IOS Routers</strong> can be found at our <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-site-to-site-ipsec-vpn.html" target="_blank" title="Configuring Site to Site IPSec VPN Tunnel Between Cisco Routers">Configuring Site to Site IPSec VPN Tunnel Between Cisco Routers</a> article.</p>
<p style="text-align: justify;"><strong>ASA-1:</strong></p>
<div class="box-content" style="text-align: justify;">ASA-1(config)# <strong><strong>access-list VPN-ACL extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0<br /></strong></strong>
<div>ASA-1(config)# <strong>crypto ipsec ikev1 transform-set TS esp-aes esp-md5-hmac</strong></div>
<div>&nbsp;</div>
<div>ASA-1(config)# <strong>crypto map VPNMAP 10 match address VPN-ACL</strong></div>
<div>ASA-1(config)# <strong>crypto map VPNMAP 10 set peer 200.200.200.1</strong></div>
<div>ASA-1(config)# <strong>crypto map VPNMAP 10 set ikev1 transform-set TS</strong></div>
<div>ASA-1(config)# <strong>crypto map VPNMAP interface outside</strong></div>
</div>
<p><strong>ASA-2:</strong></p>
<div class="box-content">ASA-2(config)# <strong>access-list VPN-ACL extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0</strong><br />ASA-2(config)# <strong>crypto ipsec ikev1 transform-set TS esp-aes esp-md5-hmac </strong><br /><br />ASA-2(config)# <strong>crypto map VPNMAP 10 match address VPN-ACL</strong><br />ASA-2(config)# <strong>crypto map VPNMAP 10 set peer 100.100.100.1</strong><br />ASA-2(config)# <strong>crypto map VPNMAP 10 set ikev1 transform-set TS</strong><br />ASA-2(config)# <strong>crypto map VPNMAP interface outside</strong></div>
<div style="text-align: justify;">From the configuration sample above, the access control list <strong>VPN-ACL</strong> defines the traffic flow that will pass through the VPN tunnel. Although there is other traffic flowing through the outside ASA interface, only traffic between LAN1 and LAN2 will pass through the VPN tunnel according to the traffic policy dictated by <strong>VPN-ACL</strong>. That’s exactly the reason why this VPN type is called <strong>Policy-Based VPN</strong>.</div>
<h2>Understanding Route-Based VPNs</h2>
<p style="text-align: justify;">A route-based VPN configuration uses Layer3 routed tunnel interfaces as the endpoints of the VPN. Instead of selecting a subset of traffic to pass through the VPN tunnel using an Access List, all traffic passing through the special Layer3 tunnel interface is placed into the VPN. Therefore you need to configure routing accordingly. Either a <a href="https://www.firewall.cx/networking/routing-protocols.html" target="_blank" title="dynamic routing protocol">dynamic routing protocol</a> (such as <a href="https://www.firewall.cx/networking/routing-protocols/routing-protocols-eigrp.html" target="_blank" title="EIGRP">EIGRP</a> or <a href="https://www.firewall.cx/networking/routing-protocols/routing-protocol-ospf.html" target="_blank" title="OSPF">OSPF</a>) or static routing must be configured to divert VPN traffic through the special Layer3 tunnel interface.</p>
<p style="text-align: justify;">This VPN Type is supported only on Cisco Routers and is based on <strong>GRE</strong> or <strong>VTI</strong> Tunnel Interfaces. For secure communication, Route-Based VPNs use also the IPSEC protocol on top of the GRE or VTI tunnel to encrypt everything.</p>
<p style="text-align: justify;"><strong>Sample Configuration on Cisco Routers</strong></p>
<p style="text-align: justify;">Based on the network diagram below, let’s see a <strong>GRE Route-Based VPN</strong> with <strong>IPSEC protection</strong>.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx//images/stories/cisco-comparing-vpn-technologies-3.png" alt="" width="679" height="251" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco router Site-to-Site GRE Tunnel with IPSec Configuration" data-alt="cisco router vpn gre ip sec tunnel" /></p>
<p>Full step-by-step configuration instructions for<strong> Route-Based</strong> <strong>VPN</strong> on <strong>IOS Routers</strong> can be found at our<a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-gre-ipsec.html" target="_blank" title="Configuring Point-to-Point GRE VPN Tunnels - Unprotected GRE &amp; Protected GRE over IPSec Tunnels">Configuring Point-to-Point GRE VPN Tunnels - Unprotected GRE &amp; Protected GRE over IPSec Tunnels</a> article.</p>
<p style="text-align: justify;"><strong>Router-1:</strong></p>
<div class="box-content">crypto ipsec transform-set TS esp-3des esp-md5-hmac<br />
<div>crypto ipsec profile GRE-PROTECTION</div>
<div>&nbsp; set transform-set TS</div>
<div>!<br />interface Tunnel0</div>
<div>&nbsp;ip address 10.0.0.1 255.255.255.0</div>
<div>&nbsp;tunnel source 20.20.20.2</div>
<div>&nbsp;tunnel destination 30.30.30.2</div>
<div>&nbsp;tunnel protection ipsec profile GRE-PROTECTION<br />!<br />ip route 192.168.2.0 255.255.255.0 10.0.0.2</div>
</div>
<p>From the configuration above, a GRE Layer3 Tunnel Interface is created (<strong>Tunnel0</strong>) which will be one of the endpoints of the VPN tunnel. IPSEC Protection is also applied for security. The other end of the VPN tunnel is <strong>Tunnel0 </strong>of the other site (with IP 10.0.0.2), thus forming a point-to-point VPN link. The static route shown above will divert VPN traffic destined for LAN2 via the Tunnel Interfaces.</p>
<p>Following is the VPN related configuration commands for our second router:<strong><br /></strong></p>
<p><strong>Router-2:</strong></p>
<div class="box-content">crypto ipsec transform-set TS esp-3des esp-md5-hmac<br />
<div>crypto ipsec profile GRE-PROTECTION</div>
<div>&nbsp; set transform-set TS</div>
<div>!<br />interface Tunnel0</div>
<div>&nbsp;ip address 10.0.0.2 255.255.255.0</div>
<div>&nbsp;tunnel source 30.30.30.2</div>
<div>&nbsp;tunnel destination 20.20.20.2</div>
<div>&nbsp;tunnel protection ipsec profile GRE-PROTECTION<br />!<br />ip route 192.168.1.0 255.255.255.0 10.0.0.1</div>
</div>
<h2>Comparison Between Policy-Based &amp; Route-Based VPNs</h2>
<p style="text-align: justify;">To summarize, let’s see a comparison table with the main differences between <strong>Policy-Based</strong> and <strong>Route-Based</strong> VPNs.</p>
<table border="1" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td style="width: 352px;" valign="top">
<p align="center"><strong>Policy-Based IPSEC VPN</strong></p>
<p align="center"><strong>(Traditional IPSEC)</strong></p>
</td>
<td style="width: 352px;" valign="top">
<p align="center"><strong>Route-Based VPN</strong></p>
<p align="center"><strong>(GRE and VTI)</strong></p>
</td>
</tr>
<tr>
<td style="width: 352px;" valign="top">
<p>&nbsp;Supported on most network devices (Cisco Routers, Cisco ASA, other vendors etc)</p>
</td>
<td style="width: 352px;" valign="top">
<p>&nbsp;Supported only on Cisco IOS Routers. Very limited interoperability with other vendors</p>
</td>
</tr>
<tr>
<td style="width: 352px;" valign="top">
<p>&nbsp;Does not support multicast or non-IP protocols</p>
</td>
<td style="width: 352px;" valign="top">
<p>&nbsp;Supports multicast (GRE and VTI) and non-IP protocols (GRE)</p>
</td>
</tr>
<tr>
<td style="width: 352px;" valign="top">
<p>&nbsp;Routing Protocols (e.g OSPF, EIGRP) cannot pass through the VPN tunnel</p>
</td>
<td style="width: 352px;" valign="top">
<p>&nbsp;Routing Protocols (e.g OSPF, EIGRP) can pass through the VPN tunnel</p>
</td>
</tr>
<tr>
<td style="width: 352px;" valign="top">
<p>&nbsp;Use an access list to select which traffic is going to be encrypted and placed in VPN tunnel.</p>
</td>
<td style="width: 352px;" valign="top">
<p>&nbsp;All traffic passing through a special Tunnel Interface will be encapsulated and placed in the VPN</p>
</td>
</tr>
<tr>
<td style="width: 352px;" valign="top">
<p>&nbsp;Strong Security natively</p>
</td>
<td style="width: 352px;" valign="top">
<p>&nbsp;GRE or VTI alone do not provide security. You must combine them with IPSEC for securing the VPN.</p>
</td>
</tr>
<tr>
<td style="width: 352px;" valign="top">
<p>&nbsp;Complex Configuration</p>
</td>
<td style="width: 352px;" valign="top">
<p>&nbsp;Simplified Configuration</p>
</td>
</tr>
<tr>
<td style="width: 352px;" valign="top">
<p>&nbsp;Limited QoS</p>
</td>
<td style="width: 352px;" valign="top">
<p>&nbsp;QoS is fully supported</p>
</td>
</tr>
</tbody>
</table>
<h2>Summary</h2>
<p style="text-align: justify;">In this article we examined and compare the two Cisco VPN categories that are utilized by organizations: <strong>Policy-Based</strong> and <strong>Route-Based VPNs</strong>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Tue, 26 Feb 2013 08:00:00 +1100</pubDate>
		</item>
		<item>
			<title>Unified Communications Components - Understanding Your True Unified Communications Needs</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-unified-communications-components.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-unified-communications-components.html</guid>
			<description><![CDATA[<h2>&nbsp;What Is Unified Communications (UC)?</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-understanding-uc-needs-1.png" alt="cisco-understanding-uc-needs-1" style="margin: 7px; float: left;" title="Undertanding your organization unified communications needs" />Unified communications is a very popular term these days and we see it appearing on almost every vendor as they rename their platforms and products to include this term. The definition of unified communications changes slightly depending on the vendor you are looking at, but its foundation remains the same. Breaking unified communications into components makes it a lot easier to analyze and put things into the correct perspective.</p>
<h2 style="text-align: justify;"><span style="color: #ffcc00;"></span>Unified Communications Foundational Components</h2>
<p style="text-align: justify;">These are, in essence, the main-core services a unified communications product should offer:</p>
<ul>
<li><strong>Network Infrastructure</strong>. Almost all unified communications services require a rock-solid network infrastructure. Without this foundation component we are unable to use all the features an advanced unified communications solution can offer.</li>
<li><strong>IP telephony</strong>. Also known as Voice over IP (VoIP). This is a critical part of UC.</li>
<li><strong>Presence</strong>. Being able to monitor the availability and state of another user. Check if the user's phone line is occupied, is in a conference or away from his desk/office.</li>
</ul>
<h2>Unified Communications Basic Components</h2>
<p style="text-align: justify;">These are your everyday applications and services helping to unify your communications needs:</p>
<ul>
<li><strong>Email</strong>. The ability to send messages and attachments between colleagues and customers.</li>
<li><strong>Messaging</strong>. Includes faxing, instant messaging services and voicemail.</li>
<li><strong>Conferencing. </strong>Includes audio conferencing and Web conferencing services that tightly integratewith the UC infrastructure.</li>
</ul>
<h2>Unified Communications Emerging Components</h2>
<p style="text-align: justify;">These unified communications components are pretty much the most popular ones around today:</p>
<ul>
<li><strong>Mobility</strong>. Perhaps unified communications' greatest driving force. This component gives mobile workers corporate communications no matter where they are located.</li>
<li><strong>Social Media</strong>. Many companies are using social media to help them reach out to millions of consumers at a fraction of the traditional marketing cost.</li>
<li><strong>Videoconferencing</strong>. Mainly used by companies to reduce travel expenses and organize meetings.</li>
</ul>
<h2>Understanding Your True Unified Communications Needs</h2>
<p style="text-align: justify;">There is no doubt unified communications is not one product but a combination of complex technologies working together to meet your needs. A very common problem IT Managers and engineers are faced with is to understand the needs of their company when considering a unified communications solution.</p>
<p style="text-align: justify;">This process unfortunately can be harder than it sounds as there are a lot of parameters often not taken in consideration during the planning and decision<ins cite="mailto:Parmenter,%20Tessa" datetime="2012-12-04T14:34">-</ins>making process.</p>
<p style="text-align: justify;">To help this process, we've outlined a number of points that require consideration and will help you reveal your true unified communications needs:</p>
<ul>
<li><strong>Return on investment (ROI)</strong>. ROI is a key point to help you understand how your investment will help you save money. ROI can be difficult to measure. ROI must be calculated based on the unified communications solution being examined, the features it offers and how necessary they are for your organization. Don't focus entirely on the product's features but your real needs today and tomorrow.</li>
<li><strong>Unified communications is an evolving trend</strong>. Are you ready for the cloud? Many organizations are already migrating their unified communications services to the cloud, relieving them from the administration burden and management cost while providing a solid platform that has the ability to deliver true 100% uptime and ease of administration.</li>
<li><strong>Future proof / Adapt to changes</strong>. This is where most unified communications solutions fall short. A unified communications solution should be able to adapt to company-wide changes and provide room for future growth. Examine your company's future plans and ensure the unified communications solution selected has the ability to support your growth plan and adapt to rapid changes.</li>
<li><strong>Roll-out plan</strong>. Most unified communication solutions consist of core services that affect everyone in the organization during the rollout (installation) phase. In some cases, these installations can disrupt the company's normal workflow and therefore cannot be made during working hours. Rollout of these services must be planned with your integrator so that your workflow is not affected. Any serious integrator will have this in mind and present an accepted rollout plan that will have minimum impact on the company's operation.</li>
</ul>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Tue, 19 Feb 2013 08:00:00 +1100</pubDate>
		</item>
		<item>
			<title>Cisco VPN Client &amp; Windows 8 (32bit &amp; 64bit) - Reason 442: Failed To Enable Virtual Adapter - How To Fix It</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows8-fix.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows8-fix.html</guid>
			<description><![CDATA[<p style="text-align: justify;">The <strong>Cisco VPN client</strong> is one of the most popular Cisco tools used by administrators, engineers and end-users to connect to their remote networks and access resources. This article shows <strong>how to fix the Cisco VPN Client Error Reason 442: Failed To Enable Virtual Adapter</strong> when trying to <strong>connect to a remote VPN Gateway</strong> or <strong>Router</strong> from the <strong>Windows 8 operating system</strong> (<strong>32bit</strong> and <strong>64bit</strong>).</p>
<p style="text-align: justify;">With the introduction of Windows 8, Cisco VPN users are faced with a problem – the Cisco VPN software installs correctly but fails to connect to any remote VPN network.</p>
<p class="box-hint" style="text-align: justify;"><strong>Windows 7 32bit</strong> &amp; <strong>64bit</strong> users dealing with the same problem can refer to our <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-troubleshoot.html" target="_blank" title="Troubleshooting Cisco VPN Client - How To Fix Reason 442: Failed to Enable Virtual Adapter">Troubleshooting Cisco VPN Client - How To Fix Reason 442: Failed to Enable Virtual Adapter</a> article.</p>
<p class="box-hint" style="text-align: justify;"><strong>Windows 10 32bit</strong> &amp; <strong>64bit </strong>can read our article <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter.html" target="_blank" title="Install &amp; Fix Cisco VPN Client on Windows 10 (32 &amp; 64 Bit). Fix Reason 442: Failed to enable Virtual Adapter">Install &amp; Fix Cisco VPN Client on Windows 10 (32 &amp; 64 Bit). Fix Reason 442: Failed to enable Virtual Adapter</a>.</p>
<p class="box-hint" style="text-align: justify;"><strong>Windows 10 <strong>32bit</strong> </strong>&amp;<strong> <strong>64bit </strong>Anniversary Update 1607</strong> users can read our <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows-10-anniversary-update-break-and-fix.html" target="_blank" title="Fix Cisco VPN Client Break After Windows 10 Anniversary Update 1607">Fix Cisco VPN Client Break After Windows 10 Anniversary Update 1607</a>.</p>
<p style="text-align: justify;">When trying to connect to a VPN network through a Windows 8 operating system (32 or 64 bit), the Cisco VPN client will fail to connect. As soon as the user double-clicks on the selected <strong>Connection Entry</strong>, the VPN client will begin its negotiation and request the username and password.</p>
<p style="text-align: justify;">As soon as the credentials are provided, the VPN client shows the well-known “<strong>Securing communications channel</strong>” at the bottom of the windows application:</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-vpn-client-windows8-fix-1.png" alt="Cisco VPN Client on Windows 8 64 &amp; 32 Bit" width="567" height="300" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco VPN Client &amp; Windows 8 (32bit &amp; 64bit) - Reason 442: Failed To Enable Virtual Adaptor - How To Fix It" /></p>
<p style="text-align: justify;">After a couple of seconds the Cisco VPN client will timeout, fail and eventually the connection is terminated. The user is then greeted by a pop up window explaining that the VPN failed with a <strong>Reason 442: Failed to enable Virtual Adaptor</strong> error:<br /><br /><img src="https://www.firewall.cx//images/stories/cisco-vpn-client-windows8-fix-2.png" alt="Cisco vpn client Error 442 failed to enable virtual adaptor" width="557" height="186" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco vpn client Error 442 failed to enable virtual adaptor" /></p>
<p class="box-hint" style="text-align: justify;">Note: It’s always a great idea to have the latest Cisco VPN client installed. Users can download the Cisco VPN client for Windows, Linux and MacOS operating systems by visiting our <a href="https://www.firewall.cx/downloads/cisco-tools-a-applications.html" target="_blank" title="Cisco Tools &amp; Applications">Cisco Tools &amp; Applications</a> download section.</p>
<h2>Introducing The Fix – Workaround</h2>
<p style="text-align: justify;">Thankfully the fix to this problem is simple and can be performed even by users with somewhat limited experience.</p>
<p style="text-align: justify;">Here are 4 easy-to-follow steps to the solution:</p>
<p>1. Open your Windows Registry Editor by typing <strong>regedit </strong>in the Run prompt.</p>
<p>2. Browse to the Registry Key <strong>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CVirtA</strong></p>
<p>3. From the window on the right, select and right-click on <strong>DisplayName</strong> and choose <strong>Modify</strong> from the menu. Alternatively, double-click on <strong>DisplayName</strong>:</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-vpn-client-windows8-fix-3.png" alt="Cisco vpn client windows 8 registry" width="650" height="306" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p>4. For <strong>Windows 8 32bit</strong> (x86) operating systems, change the value data from <strong>@oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter</strong> to <strong>Cisco Systems VPN Adapter</strong>.</p>
<p style="text-align: justify;">For <strong>Windows 8 64bit</strong> (x64) operating systems, change the value data from <strong>@oem8.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter for 64-bit Windows</strong> to <strong>Cisco Systems VPN Adapter for 64-bit Windows</strong> (shown below):</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-vpn-client-windows8-fix-4.png" alt="Cisco vpn client registry fix value data" width="393" height="177" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">When done editing the <strong>Value data</strong>, click on <strong>OK </strong>and close the Registry Editor.</p>
<p style="text-align: justify;">You can now run the Cisco VPN Client and connect to your VPN network.&nbsp; Changes performed do not require a system restart.</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Wed, 06 Feb 2013 08:10:16 +1100</pubDate>
		</item>
		<item>
			<title>Comparing DMVPN Single Tier and Dual Tier Headend Architectures - IPSec VPN &amp; mGRE Termination</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-single-dual-tier.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-single-dual-tier.html</guid>
			<description><![CDATA[<p style="text-align: justify;">This article extends our DMVPN article series by answering common questions regarding the differences between <strong>Single Tier Headend</strong> and <strong>Dual Tier Headend</strong> architectures.</p>
<p style="text-align: justify;">When hearing the DMVPN terms <strong>single tier</strong> or <strong>dual tier</strong> it can be difficult to understand exactly their meanings.&nbsp; While the difference between the two might seem clear when looking at a DMVPN with single or dual tier headend setup, what really goes on is usually not revealed or analysed in great depth, until now…</p>
<p style="text-align: justify;">While there are plenty of diagrams online illustrating <strong>Single</strong> <strong>Tier </strong>and <strong>Dual Tier Headend </strong>architectures, we found none that would analyse the differences on a packet/protocol level. This is usually the level of analysis many engineers require to truly understand how each model works.</p>
<p style="text-align: justify;">We always assume the DMVPN network (mGRE tunnel) is protected using the IPSecurity protocol.</p>
<h2>Single Tier Headend</h2>
<p style="text-align: justify;"><strong>Single Tier Headend</strong> involves a DMVPN setup with one single Hub router responsible for all DMVPN services. Practically, this means both <strong>Crypto IPSec</strong> and <strong>mGRE tunnel</strong> terminate on the same router, the <strong>Hub</strong>.</p>
<p style="text-align: justify;">This is illustrated in our detailed diagram below:</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-dmvpn-single-dual-tier-1.png" alt="Cisco DMVPN single tier headend IP Sec Tunnel mode" width="550" height="278" style="display: block; margin-left: auto; margin-right: auto;" title="Single Tier Headend - DMVPN with IPSec Tunnel mode" /></p>
<p style="text-align: justify;">In <strong>Single Tier Headend</strong> IPSec runs in Tunnel Model, encrypting the whole GRE tunnel and Data carried within. This ensures true confidentiality of our GRE tunnel and provides great flexibility in terms of VPN network design.</p>
<p style="text-align: justify;">Engineers and Administrators who would like to learn more about protecting <strong>GRE using IPSec</strong> (both <strong>Tunnel</strong> and <strong>Transport</strong> Mode) can read our popular&nbsp; <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-gre-ipsec-tunnel-transport.html" target="_blank" title="GRE over IPSec - Selecting and Configuring GRE IPSec Tunnel or Transport Mode">GRE over IPSec - Selecting and Configuring GRE IPSec Tunnel or Transport Mode</a> article<strong>. </strong>We high recommend the above article as it contains extremely useful information, not found easily!</p>
<p style="text-align: justify;">As expected, a <strong>Single Tier Headend</strong> setup means that all processing is performed by <strong>one single device</strong>. The burden of <strong>encrypting</strong>, <strong>decrypting</strong>, <strong>encapsulating</strong>, <strong>decapsulating</strong> and maintaining the <strong>NHRP database</strong> falls on a <strong>single Hub</strong>. As a rule of thumb, the faster the Internet connection speed on the Hub router the bigger the burden will be on its CPU as it needs to process VPN data at a much faster rate. DMVPN scalability issues is a topic that will be covered on Firewall.cx.</p>
<p style="text-align: justify;"><strong>DMVPN deployments</strong> based on <strong>Single Tier Headend</strong> architecture also support <strong>spoke-to-spoke VPN tunnels</strong>, allowing remote offices to dynamically build VPN tunnels between each other. Remote offices (spokes) are also configured with <strong>mGRE tunnels</strong> (like the Hub), allowing them to create the <strong>dynamic spoke-to-spoke tunnels</strong>.</p>
<h2 style="text-align: justify;">Dual Tier Headend</h2>
<p style="text-align: justify;"><strong>Dual Tier Headend</strong> is a more popular approach to DMVPN, especially when it comes to VPN redundancy. Cisco usually uses this method when analysing DMVPN networks, however, this does not mean the Single Tier is not an acceptable solution.</p>
<p style="text-align: justify;">With <strong>Dual Tier Headend</strong> Crypto IPSec terminates on a router positioned <strong>in front</strong> of the <strong>Hub</strong>, while the mGRE tunnel terminates <strong>on the</strong><strong> Hub</strong>. This is illustrated in our detailed diagram below:</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-dmvpn-single-dual-tier-2.png" alt="Cisco DMVPN Dual tier headend IP Sec Tunnel Mode" width="680" height="322" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco DMVPN Dual tier headend IP Sec Tunnel Mode" /></p>
<p style="text-align: justify;">In <strong>Dual Tier Headend</strong> IPSec runs in <strong>Tunnel Model</strong>, encrypting the whole GRE tunnel and Data carried within. IPSec decryption occurs on R2, the Frontend router, and the mGRE tunnel is passed to the <strong>Hub</strong> where it terminates.</p>
<p style="text-align: justify;">DMVPN deployments based on <strong>Dual Tier Headend</strong> architecture do not support spoke-to-spoke VPN tunnels. This limitation should be seriously considered if planning for this type of DMVPN deployment. This also explains why spoke routers in this deployment method are configured with single GRE tunnels (not mGRE).</p>
<h2>Links To GRE - DMVPN - IPSec VPN Articles<span style="color: #ffff00;"><br /></span></h2>
<p style="text-align: justify;">Firewall.cx hosts a number of popular articles for those requiring additional information on <strong>DMVPN networks</strong> and <strong>IPSec VPNs</strong>. Below are a few hand-picked links to articles we are sure will be useful:</p>
<ol>
<li class="checkbox">
<div><a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-intro.html" target="_blank" title="Understanding Cisco Dynamic Multipoint VPN (DMVPN)">Understanding Cisco Dynamic Multipoint VPN (DMVPN)</a></div>
</li>
<li class="checkbox">
<div><a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-models.html" target="_blank" title="Dynamic Multipoint VPN (DMVPN) Deployment Models &amp; Architectures">Dynamic Multipoint VPN (DMVPN) Deployment Models &amp; Architectures</a></div>
</li>
<li class="checkbox">
<div><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-dmvpn-configuration.html" target="_blank" title="Configuring Cisco Dynamic Multipoint VPN (DMVPN)">Configuring Cisco Dynamic Multipoint VPN (DMVPN)</a></div>
</li>
<li class="checkbox">
<div><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-site-to-site-ipsec-vpn.html" target="_blank" title="Configuring Site to Site IPSec VPN Tunnel Between Cisco Routers">Configuring Site to Site IPSec VPN Tunnel Between Cisco Routers</a></div>
</li>
<li class="checkbox">
<div><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-gre-ipsec.html" target="_blank" title="Configuring Point-to-Point GRE VPN Tunnels on Cisco Routers">Configuring Point-to-Point GRE VPN Tunnels on Cisco Routers</a></div>
</li>
<li class="checkbox">
<div><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-gre-ipsec-tunnel-transport.html" target="_blank" title="Cisco GRE and IPSec - GRE over IPSec - Selecting and Configuring GRE IPSec Tunnel or Transport Mode">Cisco GRE and IPSec - GRE over IPSec - Selecting and Configuring GRE IPSec Tunnel or Transport Mode</a></div>
</li>
<li><a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-anyconnect-webvpn.html" target="_blank" class="checkbox" title="Configuring Cisco SSL VPN AnyConnect (WebVPN) on Cisco IOS Routers">Configuring Cisco SSL VPN AnyConnect (WebVPN) on Cisco IOS Routers</a></li>
<li><a href="https://www.firewall.cx/networking/network-protocols/ipsec-modes.html" target="_blank" title="Understanding VPN IPSec Tunnel Mode and IPSec Transport Mode - What's the Difference?">Understanding VPN IPSec Tunnel Mode and IPSec Transport Mode - What's the Difference?</a></li>
</ol>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Tue, 30 Oct 2012 08:00:00 +1100</pubDate>
		</item>
		<item>
			<title>Dynamic Multipoint VPN (DMVPN) Deployment Models &amp; Architectures</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-models.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-models.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Following our successful article <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-intro.html" target="_blank" title="Understanding Cisco Dynamic Multipoint VPN - DMVPN, mGRE, NHRP">Understanding Cisco Dynamic Multipoint VPN - DMVPN, mGRE, NHRP</a>, which serves as a brief introduction to the DMVPN concept and technologies used to achieve the flexibility DMVPNs provide, we thought it would be a great idea to expand a bit on the topic and show the most common DMVPN deployment models available today which include:<strong> Single DMVPN Network/Cloud&nbsp; - Single Tier Headend Architecture</strong>, <strong>Single DMVPN Network/Cloud&nbsp; - Dual Tier Headend Architecture</strong>, <strong>Dual DMVPN Network/Cloud – Single Tier Headend Architecture</strong> and <strong>Dual DMVPN Network/Cloud – Dual Tier Headend Architecture</strong>. This will provide an insight to engineers and IT Managers considering implementing a DMVPN network.</p>
<p style="text-align: justify;">Those seeking help to configure a DMVPN network can also refer to our <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-dmvpn-configuration.html" target="_blank" title="Configuring Cisco Dynamic Multipoint VPN (DMVPN) - Hub, Spokes , mGRE Protection and Routing - DMVPN Configuration">Configuring Cisco Dynamic Multipoint VPN (DMVPN) - Hub, Spokes , mGRE Protection and Routing - DMVPN Configuration</a> article which fully covers the deployment and configuration of a Single DMVPN Network/Cloud&nbsp; - Single Tier Headend Architecture<strong>.<br /></strong></p>
<h2 style="text-align: justify;">DMVPN Deployment Models</h2>
<p style="text-align: justify;">There is a number of different ways an engineer can implement a DMVPN network. The fact that there is a variety of DMVPN models, each one with its caveats and requirements, means that almost any VPN requirement can be met as long as we have the correct hardware, software license and knowledge to implement it.</p>
<p style="text-align: justify;">Speaking of implementation, no matter how complex the DMVPN network might get, it’s pretty straightforward once it's broken down into sections.</p>
<p style="text-align: justify;">Engineers already working with complex DMVPNs can appreciate this and see the simplicity in configuration they offer.&nbsp; At the end, it’s all a matter of experience.</p>
<p style="text-align: justify;">Providing configuration for each deployment model is out of this article’s scope, however, we will identify key services used in each deployment model along with their strong and weak points.</p>
<p style="text-align: justify;">Future articles will cover configuration of all DMVPN deployment models presented here.</p>
<p style="text-align: justify;">Following are the most popular DMVPN deployment models found in over 85% of DMVPN networks across the globe:</p>
<ul class="checkbox check">
<li>Single DMVPN Network/Cloud&nbsp; - Single Tier Headend Architecture</li>
<li>Single DMVPN Network/Cloud&nbsp; - Dual Tier Headend Architecture</li>
<li>Dual DMVPN Network/Cloud – Single Tier Headend Architecture</li>
<li>Dual DMVPN Network/Cloud – Dual Tier Headend Architecture</li>
</ul>
<p style="text-align: justify;">In every case a complete <strong>DMVPN deployment</strong> consists of the following services, also known as <strong>control planes</strong>:</p>
<ol style="text-align: justify;">
<li><strong>Dynamic Routing (Next Hop Resolution Protocol)</strong></li>
<li><strong>mGRE Tunnels</strong></li>
<li><strong>Tunnel Protection – IPSec Encryption that protects the GRE tunnel and data</strong></li>
</ol>
<p style="text-align: justify;">It’s time now to take a look at each deployment model.</p>
<h2>Single DMVPN Network/Cloud - Single Tier Headend Architecture</h2>
<p style="text-align: justify;">The <strong>Single DMVPN - Single Tier Headend </strong>deployment model is DMVPN in its simplest form.&nbsp; It consists of the main Hub located at the headquarters and remote spokes spread amongst the remote offices.</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-dmvpn-deployment-models-1.png" alt="Single DMVPN - single Tier Headend architecture" width="630" height="337" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">The term ‘<strong>Single DMVPN</strong>’ refers to the fact there is only one DMVPN network in this deployment.&nbsp; This DMVPN network consists of the yellow GRE/IPSec Hub-and-Spoke tunnels terminating at the central Hub from one end and the remote spokes on the other end.</p>
<p style="text-align: justify;">The term ‘<strong>Single Tier Headend</strong>’ means that all control planes are incorporated into a single router – the Hub. This means it takes care of the dynamic routing (NHRP), mGRE tunnels and IPSec Tunnel Protection.</p>
<p style="text-align: justify;">The central hub maintains the Next Hop Resolution Protocol (NHRP) database and is aware of each spoke’s public IP address.</p>
<p style="text-align: justify;">When setting up a DMVPN network, every spoke is configured, using static NHRP mappings, to register with the Hub. Through this process, every spoke is aware of every other’s public IP address via the NHRP server (Hub), no matter if the spokes IP addresses are dynamic or static.</p>
<p style="text-align: justify;">Through DMVPN, each spoke is able to dynamically build a VPN tunnel to each other spoke, allowing the direct communication between them without needing to tunnel all traffic through the main Hub. This saves valuable bandwidth, time and money.</p>
<p style="text-align: justify;">We should at this point note that in <strong>Phase 1 DMVPN</strong>, all traffic passes through the Hub.&nbsp; <strong>Phase 2</strong> and <strong>Phase 3 DMVPN</strong>, directly forms spoke-to-spoke tunnels and sends traffic directly, bypassing the Hub.</p>
<p style="text-align: justify;">The <strong>Single DMVPN - Single Tier Headend Architecture</strong> has the advantage of requiring only one Hub router, however, the Hub’s CPU is also the limiting factor for this deployment’s scalability as it undertakes all three control planes (NHRP, mGRE &amp; IPSec protection).&nbsp;</p>
<p style="text-align: justify;">In addition the Hub router, and its link to the Internet, is the single point of failure in this design. If any of the two (Hub or Internet link) fail, it can cripple the whole VPN network.</p>
<p style="text-align: justify;">This DMVPN model is a usual approach for a limited budget DMVPN network with a few remote branches.&nbsp; Routing protocols are also not required when implementing a single DMVPN network/cloud. Instead, static routes can be used with the same end result.</p>
<h2 style="text-align: justify;">Single DMVPN Network/Cloud - Dual Tier Headend Architecture</h2>
<p style="text-align: justify;">The <strong>Single DMVPN Network/Cloud or Dual Tier Headend DMVPN</strong> deployment consists of two routers at the headquarters. The first router, R1, is responsible for terminating the IPSec connections to all spokes, offloading the encryption and decryption process from the main Hub behind it. The Hub router undertakes the termination of mGRE tunnel, NHRP server and processing of all routing protocol updates.</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-dmvpn-deployment-models-2.png" alt="Single DMVPN - Dual Tier Headend architecture" width="630" height="336" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">The only real advantage offered by the <strong>Dual Tier Headend Architecture (Single DMVPN cloud)</strong> is that it can support a significantly greater number of spokes.</p>
<p style="text-align: justify;">A limitation of <strong>Dual Tier Headend Architecture</strong> is the absence of the spoke-to-spoke connections, in <strong>Dual Tier</strong> DMVPN spoke-to-spoke connections are not supported.&nbsp;</p>
<h2>Dual DMVPN Network/Cloud – Single Tier Headend Architecture</h2>
<p style="text-align: justify;">The <strong>Dual DMVPN topology with spoke-to-spoke</strong> deployment consists of two headend routers, Hub 1 and Hub 2.&nbsp; Each DMVPN network (DMVPN 1 &amp; DMVPN 2) represents a unique IP subnet, one is considered the primary DMVPN while the other is the secondary/backup DMVPN.</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-dmvpn-deployment-models-3.png" alt="Dual DMVPN - Single Tier Headend architecture" width="629" height="370" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">The dynamic Spoke-to-Spoke tunnels created between branches must be within a single DMVPN network.&nbsp; This means that spoke-to-spoke tunnels can only be created between spokes in the same DMVPN network.&nbsp;</p>
<p style="text-align: justify;">With <strong>Dual DMVPN – Single Tier</strong> <strong>Headend Architecture, </strong>each Hub manages its own DMVPN network. Each Hub undertakes the task of IPSec encryption/decryption, mGRE Tunnel termination and NHRP Server for its DMVPN network. &nbsp;A routing protocol such as EIGRP or OSPF is usually implemented in this type of setup to ensure automatic failover in case the primary DMVPN fails.</p>
<p style="text-align: justify;"><strong>Dual DMVPN – Single Tier Architecture</strong> is considered an extremely flexible and scalable setup as it combines the best of both worlds – that is, true redundancy with two separate Hubs and DMVPN networks, plus support for spoke-to-spoke tunnels.</p>
<h2 style="text-align: justify;">Dual DMVPN Network/Cloud – Dual Tier Headend Architecture</h2>
<p style="text-align: justify;">The <strong>Dual DMVPN Network – Dual Tier Headend</strong> combines the previous two deployment methods in one setup. It consists of <strong>two Hubs</strong> that deal only with <strong>mGRE tunnels</strong> and <strong>NHRP services</strong>, each Hub managing its own DMVPN network.</p>
<p style="text-align: justify;">Frontend routers R1 and R2 take care of all IPSec termination for all spokes, performing encryption/decryption as data enters or exits the IPSec tunnels.</p>
<p style="text-align: justify;">Newer ISR G2 routers are capable of undertaking great quantities of number crunching for all VPN tunnels as they are equipped with hardware accelerated VPN modules that offload this process from the main CPU.</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-dmvpn-deployment-models-4.png" alt="Dual DMVPN - Dual Tier Headend architecture" width="630" height="371" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">As with <strong>Dual DMVPN – Single Tier</strong> <strong>deployment </strong>model<strong>, </strong>each Hub manages its own DMVPN network and connections with its spokes. Routing protocols are a necessity to ensure automatic failover to the secondary DMVPN network in case the primary fails.</p>
<p style="text-align: justify;">Unfortunately, as with all <strong>Dual Tier</strong> deployments, we lose the spoke-to-spoke ability, but this might not be a limitation for some.</p>
<h2>Acknowledgements</h2>
<p>We would like to thank Saravana Kumar from the Cisco VPN TAC Support team for his valuable feedback and help.</p>
<h2>Summary</h2>
<p style="text-align: justify;">This article examined the different types of DMVPN deployments and covered the following deployment models:<strong> Single DMVPN Network/Cloud&nbsp; - Single Tier Headend Architecture</strong>, <strong>Single DMVPN Network/Cloud&nbsp; - Dual Tier Headend Architecture</strong>, <strong>Dual DMVPN Network/Cloud – Single Tier Headend Architecture</strong> and finally <strong>Dual DMVPN Network/Cloud – Dual Tier Headend Architecture</strong>.</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Wed, 24 Oct 2012 07:59:52 +1100</pubDate>
		</item>
		<item>
			<title>Understanding Cisco Dynamic Multipoint VPN - DMVPN, mGRE, NHRP</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-intro.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-dmvpn-intro.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><span style="color: #cc99ff;"></span><strong>Dynamic Multipoint VPN (DMVPN)</strong> is Cisco’s answer to the increasing demands of enterprise companies to be able to connect branch offices with head offices and between each other while keeping costs low, minimising configuration complexity and increasing flexibility.</p>
<p class="box-info" style="text-align: justify;"><strong>Note:</strong> Users familair with <strong>DMVPN</strong> can also visit our article <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-dmvpn-configuration.html" target="_blank" title="Configuring Cisco Dynamic Multipoint VPN (DMVPN) - Hub, Spokes , mGRE Protection and Routing">Configuring Cisco Dynamic Multipoint VPN (DMVPN) - Hub, Spokes , mGRE Protection and Routing</a></p>
<p style="text-align: justify;">With <strong>DMVPN</strong>, one central router, usually placed at the head office, undertakes the role of the <strong>Hub </strong>while all other branch routers are <strong>Spokes </strong>that connect to the<strong> Hub</strong> router so the branch offices can access the company’s resources. DMVPN consists of two mainly deployment designs:</p>
<ul style="text-align: justify;">
<li><strong>DMVPN Hub &amp; Spoke</strong>, used to perform headquarters-to-branch interconnections<strong><br /></strong></li>
<li><strong>DMVPN Spoke-to-Spoke</strong>, used to perform branch-to-branch interconnections</li>
</ul>
<p style="text-align: justify;">In both cases, the Hub router is assigned a static public IP Address while the branch routers (spokes) can be assigned static or dynamic public IP addresses.</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-dmvpn-intro-1.gif" alt="cisco dmvpn introduction - basic diagram" width="626" height="266" style="display: block; margin-left: auto; margin-right: auto;" title="DMVPN Deployment Designs" /></p>
<p style="text-align: justify;"><strong>DMVPN </strong>combines multiple GRE (mGRE) Tunnels, IPSec encryption and NHRP (Next Hop Resolution Protocol) to perform its job and save the administrator the need to define multiple static crypto maps and dynamic discovery of tunnel endpoints.<br /><br /><strong>NHRP </strong>is layer 2 resolution protocol and cache, much like Address Resolution Protocol (ARP) or Reverse ARP (Frame Relay).</p>
<p style="text-align: justify;">The Hub router undertakes the role of the server while the spoke routers act as the clients. The Hub maintains a special NHRP database with the public IP Addresses of all configured spokes.</p>
<p style="text-align: justify;">Each spoke registers its public IP address with the hub and queries the NHRP database for the public IP address of the destination spoke it needs to build a VPN tunnel.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx//images/stories/cisco-dmvpn-intro-2.gif" alt="dmvpn nhrp communication" width="360" height="212" style="display: block; margin-left: auto; margin-right: auto;" title="NHRP communication between DMVPN Hub and Spokes" /><strong>mGRE </strong>Tunnel Interface is used to allow a single GRE interface to support multiple IPSec tunnels and helps dramatically to simplify the complexity and size of the configuration.</p>
<p style="text-align: justify;">Following is an outline of the main differences between GRE and mGRE interfaces:</p>
<p style="text-align: justify;">A <strong>GRE </strong>interface definition includes:</p>
<ul class="check">
<li>An IP address&nbsp;&nbsp;</li>
<li>A Tunnel Source</li>
<li>A Tunnel Destination</li>
<li>An optional tunnel key</li>
</ul>
<div class="info"><strong>interface Tunnel 0</strong><br />
<div style="padding-left: 30px;">ip address 10.0.0.1 255.0.0.0</div>
<div style="padding-left: 30px;">tunnel source Dialer1</div>
<div style="padding-left: 30px;"><span style="background-color: #cc99ff; color: #000000;">tunnel destination 172.16.0.2</span></div>
<div style="padding-left: 30px;">tunnel key 1</div>
</div>
<p style="text-align: justify;">An <strong>mGRE </strong>interface definition includes:</p>
<ul>
<li>An IP address</li>
<li>A Tunnel source</li>
<li>A Tunnel key</li>
</ul>
<div class="info"><strong>interface Tunnel 0</strong>
<div style="padding-left: 30px;">ip address 10.0.0.1 255.0.0.0</div>
<div style="padding-left: 30px;">tunnel source Dialer 1</div>
<div style="padding-left: 30px;"><span style="background-color: #cc99ff; color: #000000;">tunnel mode gre multipoint</span></div>
<div style="padding-left: 30px;">tunnel key 1</div>
</div>
<p style="text-align: justify;">It is important to note that <strong>mGRE </strong>interfaces <strong>do not have a tunnel destination</strong>. Because <strong>mGRE</strong> tunnels do not have a tunnel destination defined, they cannot be used alone.&nbsp; NHRP fills this gap by telling mGRE where to send the packets.</p>
<h2 style="text-align: justify;">DMVPN Benefits</h2>
<p style="text-align: justify;">DMVPN provides a number of benefits which have helped make them very popular and highly recommended. These include:</p>
<ul>
<li><strong>Simplified Hub Router Configuration</strong>. No more multiple tunnel interfaces for each branch (spoke) VPN. A single mGRE, IPSec profile without any crypto access lists, is all that is required to handle all Spoke routers. No matter how many Spoke routers connect to the Hub, the Hub configuration remains constant.</li>
</ul>
<ul>
<li><strong style="text-align: justify;">Full Support for Spoke Routers with Dynamic IP Addressing</strong>. Spoke routers can use dynamic public IP Addresses. Thanks to NHRP, Spoke routers rely on the Hub router to find the public IP Address of other Spoke routers and construct a VPN Tunnel with them.</li>
</ul>
<ul>
<li><strong>Dynamic Creation of Spoke</strong><strong>-to-Spoke VPN Tunnels</strong>. Spoke routers are able to dynamically create VPN Tunnels between them as network data needs to travel from one branch to another.</li>
</ul>
<ul>
<li><strong style="text-align: justify;">Lower Administration Costs</strong>. DMVPN simplifies greatly the WAN network topology, allowing the Administrator to deal with other more time-consuming problems. Once setup, DMVPN continues working around the clock, creating dynamic VPNs as needed and keeping every router updated on the VPN topology.</li>
</ul>
<ul>
<li><strong>Optional Strong Security with IPSec</strong>. Optionally, IPSecurity can be configured to provide data encryption and confidentiality. IPSec is used to secure the mGRE tunnels by encrypting the tunnel traffic using a variety of available encryption algorithms. More on GRE IPSec can be found on our <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-gre-ipsec.html" target="_blank" title="Configuring P-to-P GRE VPN IPSec Tunnels">Configuring P-to-P GRE VPN IPSec Tunnels</a> article.</li>
</ul>
<h2 style="text-align: justify;">DMVPN Case Study - DMVPN = Configuration Reduction and Simplified Architecture</h2>
<p style="text-align: justify;">As stated, <strong>DMVPN</strong> greatly reduces the necessary configuration in a large scale VPN network by eliminating the necessity for crypto maps and other configuration requirements.</p>
<p style="text-align: justify;">To help demonstrate the level of simplicity and dramatic reduction of administrative overhead, we’ve worked on an example from Cisco.com and made it a bit more realistic to help show how much DMVPN does really help when it comes to configuration complexity and length.</p>
<p style="text-align: justify;">The following requirements have been calculated for a traditional VPN network of a company with a central hub and 30 remote offices. All GRE tunnels are protected using IPSec:</p>
<h2>Before DMVPN With p-pGRE + IPSec Encryption</h2>
<ul>
<li>Single GRE interface for each spoke</li>
</ul>
<ul>
<li>All tunnels for each spoke (remote office) need to be predefined:
<ul>
<li>Use of static tunnel destination</li>
<li>Requires static addresses for spokes</li>
<li>Supports dynamic routing protocols</li>
</ul>
</li>
<li>Large hub configuration (HQ Router)
<ul>
<li>1 interface/spoke -&gt; 30 spokes = 30 tunnel interfaces</li>
<li>7 lines per spoke -&gt; 30 spokes = 210 configuration lines</li>
<li>4 IP addresses per spoke -&gt; 30 spokes = 120 addresses</li>
</ul>
</li>
<li>Addition of spokes requires changes on the hub</li>
<li>Spoke-to-Spoke traffic must pass through the hub.</li>
</ul>
<p style="text-align: justify;">The diagram below shows a <strong>point-to-point GRE VPN network</strong>. All spokes connect directly to the hub using a tunnel interface. The hub router is configured with three separate tunnel interfaces, one for each spoke:</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-dmvpn-intro-3.gif" alt="dmvpn GRE tunnels hub-spoke " width="536" height="302" style="display: block; margin-left: auto; margin-right: auto;" title="point-to-point GRE VPN network" />Each <strong>GRE tunnel</strong> between the hub-spoke routers is configured with its unique network ID.&nbsp; For example, GRE tunnel between the HUB and Remote Office 1 could use network 10.0.0.0/30, while GRE tunnel between the HUB and Remote Office 2 could use 10.0.1.0/30 etc.</p>
<p style="text-align: justify;">In addition, the hub router has three GRE tunnels configured, one for each spoke, making the overall configuration more complicated.&nbsp; In case no routing protocol is used in our VPN network, the addition of one more spoke would mean configuration changes to all routers so that the new spoke is reachable by everyone.</p>
<p style="text-align: justify;">Lastly, traffic between spokes in a point-to-point GRE VPN network must pass through the hub, wasting valuable bandwidth and introducing unnecessary bottlenecks.</p>
<h2>After DMVPN With mGRE + IPSec Encryption</h2>
<ul>
<li>One mGRE interface supports ALL spokes. Multiple mGRE interfaces are allowed, in which case each is a separate DMVPN.</li>
<li>Dynamic Tunnel Destination simplifies support for dynamically addressed spokes with the use of NHTP registration and dynamic routing protocols</li>
<li>Smaller hub configuration (HQ Router)
<ul>
<li>1 interface for all 30 spokes = 1 tunnel interfaces</li>
<li>Configuration including NHRP for 30 spokes = 15 lines</li>
<li>7 lines per spoke -&gt; 30 spokes = 210 configuration lines</li>
<li>All spokes in the same subnet -&gt; 30 spokes&nbsp; = 30 addresses</li>
</ul>
</li>
<li>No need to touch the hub for new spokes</li>
<li>Spoke-to-Spoke traffic via the hub or directly.</li>
</ul>
<p style="text-align: justify;">mGRE dramatically simplifies the overall setup and configuration of our VPN network. With mGRE, all spokes are configured with only one tunnel interface, no matter how many spokes they can connect to. All tunnel interfaces are part of the same network. In our diagram below, this is network 10.0.0.0/29.</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-dmvpn-intro-4.gif" alt="dmvpn traffic dynamic spoke to spoke tunnel" width="535" height="338" style="display: block; margin-left: auto; margin-right: auto;" title="DMVPN with mGRE &amp; IPSec Encryption" /></p>
<p style="text-align: justify;">Furthermore, spoke-to-spoke traffic no longer needs to pass through the hub router but is sent directly from one spoke to another.</p>
<p style="text-align: justify;">It should be clear how much simpler and easier DMVPN with mGRE is when compared with IPSec VPN Crypto tunnels or point-to-point GRE.</p>
<h2>Cisco DMVPN IOS Version Support</h2>
<p style="text-align: justify;">While DMVPN was introduced in the earlier <strong>12.3.19T</strong> IOS versions it is highly recommended to use the latest possible IOS. This will ensure VPN stability and access to new DMVPN features found only on the latest IOS.</p>
<h2>Summary - More DMVPN Articles</h2>
<p style="text-align: justify;">It is evident that <strong>DMVPN</strong> is not just another <strong>VPN technology</strong> but a revolution to <strong>VPN architecture design</strong>.&nbsp; The <strong>flexibility</strong>, <strong>stability</strong> and easy setup it provides are second-to-none, making it pretty much the best VPN solution available these days for any type of network.</p>
<p style="text-align: justify;">To learn how to configure a <strong>DMVPN network</strong>, you can read our <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-dmvpn-configuration.html" target="_blank" title="Configuring Cisco Dynamic Multipoint VPN (DMVPN) - Hub, Spokes , mGRE Protection and Routing">Configuring Cisco Dynamic Multipoint VPN (DMVPN) - Hub, Spokes , mGRE Protection and Routing</a> article.</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Wed, 05 Sep 2012 07:00:00 +1000</pubDate>
		</item>
		<item>
			<title>Troubleshooting Cisco VPN Client Windows 7 - How To Fix  Reason 442: Failed to Enable Virtual Adapter</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-troubleshoot.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-troubleshoot.html</guid>
			<description><![CDATA[<p>This article shows <strong>how to fix the Cisco VPN Reason 442: Failed to enable Virtual Adapter error</strong> on the <strong>Windows 7</strong> (<strong>32bit</strong> or <strong>64bit</strong>) <strong>operating system</strong>. If you are a Windows 7 user, it's most likely you've stumbled into the <strong>Cisco VPN Client error message</strong> "Reason 442: Failed to enable Virtual Adapter". We provide a way to <strong>quickly fix this error</strong> and get your<strong> VPN client working</strong>. We also cover <strong>Windows 8</strong> and <strong>Windows 10</strong> <strong>operating systems</strong>.<br /><br /><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-error-442.gif" alt="cisco-vpn-client-error-442" width="594" height="186" style="display: block; margin-left: auto; margin-right: auto;" title="Troubleshooting Cisco VPN Client - How To Fix  Reason 442: Failed to Enable Virtual Adapter" />Unfortunately the good old 'remove and reinstall' method won't get you far in this case as the problem is not within the Cisco VPN client program, but Microsoft's Internet Connection Sharing (ICS) service.</p>
<p class="box-hint"><strong>Windows 8 32bit</strong> &amp; <strong>64bit</strong> users dealing with the same problem can refer to our <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows8-fix.html" target="_blank" title="Cisco VPN Client &amp; Windows 8 (32bit &amp; 64Bit) - Reason 442: Failed To Enable Virtual Adaptor - How To Fix It">Cisco VPN Client &amp; Windows 8 (32bit &amp; 64Bit) - Reason 442: Failed To Enable Virtual Adaptor - How To Fix It</a> article.</p>
<p class="box-hint"><strong>Windows 10 32bit</strong> &amp; <strong>64bit </strong>can read our article <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows-10-install-fix-442-failed-to-enable-virtual-adapter.html" target="_blank" title="Install &amp; Fix Cisco VPN Client on Windows 10 (32 &amp; 64 Bit). Fix Reason 442: Failed to enable Virtual Adapter">Install &amp; Fix Cisco VPN Client on Windows 10 (32 &amp; 64 Bit). Fix Reason 442: Failed to enable Virtual Adapter</a>.</p>
<p class="box-hint"><strong>Windows 10 <strong>32bit</strong> </strong>&amp;<strong> <strong>64bit </strong>Anniversary Update 1607</strong> users can read our <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-vpn-client-windows-10-anniversary-update-break-and-fix.html" target="_blank" title="Fix Cisco VPN Client Break After Windows 10 Anniversary Update 1607">Fix Cisco VPN Client Break After Windows 10 Anniversary Update 1607</a>.</p>
<p><br />Following the steps outlined below will help resolve this error and save you a lot of time and frustration:<br /><br />1. Hit the start button and type "<strong>services.msc</strong>' as shown:<br /><br /><img src="https://www.firewall.cx/images/stories/cisco-vpn-client-error-442-2.gif" alt="cisco-vpn-client-error-442-2" width="466" height="141" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p>2. Locate and stop <em>Cisco Systems, Inc. VPN Service;</em></p>
<p>3. Stop and disable <em>Internet Connection Sharing (ICS) Service</em>;</p>
<p>4. Restart <em>Cisco System, Inc. VPN Service.</em></p>
<p>Launch the Cisco VPN Client again, and the problem is now gone!</p>
<p>Keep in mind that we are running Cisco Systems VPN Client version 5.0.07.0440 on Windows 7 Ultimate 64-bit edition, but we faced the same problem with other versions as well.</p>
<p class="box-hint">Note: It’s always a great idea to have the latest Cisco VPN client installed. Users can download the Cisco VPN client for Windows, Linux and MacOS operating systems by visiting our <a href="https://www.firewall.cx/downloads/cisco-tools-a-applications.html" target="_blank" title="Cisco Tools &amp; Applications">Cisco Tools &amp; Applications</a> download section.</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Thu, 23 Feb 2012 07:02:21 +1100</pubDate>
		</item>
		<item>
			<title>Cisco SmartCare Update - Next Generation Appliance</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/tk-cisco-smartcare-update.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/tk-cisco-smartcare-update.html</guid>
			<description><![CDATA[<p style="text-align: justify;">It's been more than a year since we introduced the <a href="https://www.firewall.cx/cisco/cisco-services-technologies/cisco-smartcare-intro.html" target="_blank" title="Cisco SmartCare service and appliance">Cisco SmartCare service and appliance</a>. It's been extremely popular and has successfully penetrated the Cisco market with installations continually increasing.</p>
<p style="text-align: justify;">Since the presentation of the new SmartCare service on Firewall.cx some things have changed, which is the reason we decided to write&nbsp; an update on the original article.&nbsp;</p>
<p style="text-align: justify;">Firstly, the Cisco SmartCare appliance has changed. With the termination of collaboration between Cisco and HP, Cisco no longer supplies HP-based SmartCare appliances; these have been replaced by IBM-based servers, which are a lot shorter and lighter.&nbsp; The SmartCare appliance is much easier to install and doesn't require a lengthy rack to fit in properly.</p>
<p style="text-align: justify;">While the operating system is still Linux, the distribution used now is the popular CentOS v5.3 with kernel version 2.6.18-128.el5 - essentially&nbsp;a repackaged RedHat Enterprise Linux.&nbsp;This operating system runs on 3.5 Gigs of installed memory and an Intel-based CPU. The hard drive is a Seagate Barracuda SATA 250GB spinning at 7200rpm.</p>
<p style="text-align: justify;">As expected, the box the appliance arrives in is very small compared to the original SmartCare appliance. The box is similar to that of a Cisco 2960G Catalyst switch and contains mounting brackets plus a SATA cable and a few screws which we couldn't find a use for!</p>
<p><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-v2-1a.jpg" alt="cisco smartcare appliance box" width="650" height="433" style="display: block; margin-left: auto; margin-right: auto;" /></p>
]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Sat, 24 Sep 2011 06:47:08 +1000</pubDate>
		</item>
		<item>
			<title>The Cisco Smart Care Service &amp; Appliance</title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-smartcare-intro.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-smartcare-intro.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left">Cisco, as most IT engineers know, covers a wide range of products and services. These range from routers to switches, firewalls, intrusion prevention systems (ips), intrusion detection systems (ids), servers, wireless lan controllers (wlc), wireless access points and much more.</p>
<p style="text-align: justify;" align="left">What a lot people aren't aware of is that most of these products come with a 90 day warranty - something that's really odd when compared with other vendors who usually offer at least one year warranty. On the other hand, only a number of hand-picked Cisco devices offer lifetime-limited warranty - for example, the Cisco Catalyst switches (lower to mid range models). Effectively, these lifetime-limited covered devices means that if they fail, it takes 20-25 days for Cisco to replace them.</p>
<p style="text-align: justify;" align="left">For the above, and many more reasons, you should always choose to purchase the additional warranty extension service for each device. This is know as a 'SmartNet service'.</p>
<p style="text-align: justify;" align="left">The <strong>Cisco SmartNet service</strong> comes in many variations, however in its most basic form, it extends up to one year the warranty for the device it is purchased, with a next business day replacement (NBD). The SmartNet service also entities you to download minor upgrade for the device's IOS or firmware.</p>
<p style="text-align: justify;" align="left">The big problem with SmartNet service is that when dealing with a lot of equipment e.g 8 routers, 15 switches, 2 firewalls, it can get quite tricky and you need to ensure the renewal of every SmartNet happens within a specific period, otherwise you'll need to pay a lot more money to renew it.</p>
<p style="text-align: justify;" align="left">Sounds fussy and a laborious task? Want more from Cisco than a simple warranty coverage?</p>
<p style="text-align: justify;" align="left">Enter the Cisco SmartCare service.....</p>
<p style="text-align: justify;" align="left">The Cisco Smart Care service is the most advanced support services Cisco has offered until now. Due to the extensive features and services offered within the Smart Care service, we've broken the article down into smaller sections to make it easier to follow.</p>
<h2>Cisco Smart Care Service</h2>
<p style="text-align: justify;" align="left">The Cisco Smart Care service is a new and much sophisticated approach in covering expensive Cisco equipment. The Smart Care service aims to help simplyfy the whole process while providing a lot more for your money.</p>
<p style="text-align: justify;" align="left">The Smart Care service of course covers completely everything the SmartNet service does, but also adds the following benefits:</p>
<ul class="check">
<li style="text-align: justify;">Simplified Contract. Everything you have with a Cisco logo is covered under one contract.</li>
<li style="text-align: justify;">Access to advanced Cisco Technical Assistance Center (TAC) for help around the clock.</li>
<li style="text-align: justify;">Free Cisco Smart Care appliance (Hold on, we'll analyse this soon).</li>
<li style="text-align: justify;">24/7 Monitoring of your Cisco equipment.</li>
<li style="text-align: justify;">Delivers dashboard visibility into network performance</li>
<li style="text-align: justify;">Proactive network scanning for software vulnerabilities and security risks</li>
<li style="text-align: justify;">Security assesments of your device configurations according to Cisco's security guidelines</li>
<li style="text-align: justify;">VoIP assessment of your network (for networks with VoIP Smart Care services)</li>
<li style="text-align: justify;">Cheaper coverage. As it turns out, the more Cisco equipment you cover, the cheaper it gets when compared to the traditional SmartNet service.</li>
</ul>
<p style="text-align: justify;" align="left">When your <strong>Cisco Smart Care service</strong> is <strong>purchased</strong> and <strong>enabled</strong>, you'll receive the <strong>Cisco Smart Care appliance</strong> within a couple of days.</p>
<p style="text-align: justify;" align="left">Through this appliance, all Cisco network equipment covered under the Smart Care contract, are monitored 24/7. This information is encrypted and sent directly to the Cisco Smart Care center for processing and is almost immediately made available to your Cisco Partner via the Smart Care portal.</p>
<p style="text-align: justify;" align="left">Your Cisco partner can, and should, provide you with access to the Smart Care portal so you can see all information provided by Cisco, that is associated with your network. Reports and warnings generated by the Smart Care appliance are sent to your Cisco partner and can also be configured so you (the network administrator) receive them as well.</p>
<h2>The Cisco Smart Care Appliance</h2>
<p style="text-align: justify;" align="left">The <strong>Cisco Smart Care appliance</strong> can only be deployed only by your authorised Cisco Smart Care partner. Keep in mind that the Cisco 'Smart Care certifed' certification is a separate certification in addition to the ones your partner might already have aquired. This means that no matter what certification level your Cisco partner has (SMB, Premier, Silver or Gold), they need to also be Smart Care certified.</p>
<p style="text-align: justify;" align="left">The <strong>Cisco Smart Care appliance</strong> is basically a <strong>HP Proliant DL server</strong> with the Cisco brand on it, much like the Cisco Call Manager servers. At the time, the model we received was powered by an <strong>Intel Celeron Processor</strong> running at 3.2 Ghz with a 533Mhz bus and is bundled with 1GB RAM and a single Western Digital 74.6 GB SATA hdd.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-1.jpg" alt="tk-cisco-smartcare-1" width="500" height="333" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">We must agree that the specifications for this server are extremely low, however because its running on a customised Linux kernel, we can justify the server's specifications. By the way, don't expect to find a floppy or DVD drive - they've been removed and replaced by plastic covers.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-1a.jpg" alt="" width="473" height="300" style="display: block; margin-left: auto; margin-right: auto;" data-alt="tk-cisco-smartcare-1a" /></p>
<p style="text-align: justify;" align="left">Speaking of covers, we thought it would be nice if we opened our Smart Care appliance and see what's inside it, and we did just that:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-2.jpg" alt="tk-cisco-smartcare-2" width="500" height="333" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">At a first glance, the server's fanless CPU, Ram and SATA hdd grabs your attention. In front of the CPU you'll notice an array of fans designed to constantly blow cool air through the CPU's heatsink keeping its temperature low, but also cooling at the same time the motherboard and other circuits. This is a classical design for these type of servers. On the lower left part of the picture you can see the server's power supply, bundled with two additional fans in front forcing cool air to enter the area from the front, skimming the hdd and cooling it as well.</p>
<p style="text-align: justify;" align="left">Turning the appliance backwards, you'll find all necessary interfaces, including a serial port which is all you really need to setup the server.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-3.jpg" alt="tk-cisco-smartcare-3" width="500" height="333" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">Provided with the server is a <strong>DB9 serial cable</strong> (shown below on the right side) which is basically a null-modem serial cable with the TX &amp; RX pins in cross-over mode:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-4.jpg" alt="tk-cisco-smartcare-4" width="500" height="333" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">Since almost all laptops today do not feature a serial port, you'll need to use a USB-to-Serial adaptor like the one shown left in the above picture. Alternatively, you can simply connect a VGA monitor and a keyboard to proceed with the setup. We've decided to go ahead using the serial cable, rather than a monitor.</p>
<p style="text-align: justify;" align="left">When you first power on the Smart Care, you'll get the well-know bios post test and a brief summary of the system's configuration as shown below:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-5.gif" alt="tk-cisco-smartcare-5" width="500" height="359" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;" align="left">Following the post test is the system bootup which doesn't really show anything else other than a message telling you that its booting the kernel. Once the system has loaded, it will prompt for a login name and password. The factory defaults for this are 'cisco' and 'cisco'.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-6.gif" alt="tk-cisco-smartcare-6" width="500" height="327" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">The first step required once your Smart Care appliance boots up, is to configure it with the appropriate network settings in order to obtain Internet access and update the appliance software.</p>
<h2>Configuring the Appliance Network Settings</h2>
<p style="text-align: justify;" align="left">To configure the network settings, you need to enter <strong>Priveliged Mode</strong> just as you would with a Cisco router or switch. Type 'enable' and enter 'admin' as a password when prompted.</p>
<p style="text-align: justify;" align="left">You'll see the hash&nbsp;<strong>#</strong> character at the prompt, indicating you've now entered priveliged mode. Typing <strong>?</strong> will present all available options as shown below:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-7.gif" alt="" width="500" height="373" style="display: block; margin-left: auto; margin-right: auto;" data-alt="tk-cisco-smartcare-7" /></p>
<p style="text-align: justify;" align="left">The <strong>conf ip</strong> command will launch a series of prompts asking for the system's IP Address, Subnet mask, Gateway, DNS servers and proxy server, however we highly advise you enable a DHCP server on your network that will provide all this information automatically.</p>
<p style="text-align: justify;" align="left">Our approach was to use a DHCP server and by issuing the 'show net' command we were able to verify the correct settings of our Smart Care appliance:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-8.gif" alt="tk-cisco-smartcare-8" width="500" height="372" /></p>
<p style="text-align: justify;" align="left">As with all Cisco products, you can enter a simple 'ping' command toward a domain to ensure the DNS resolution process is working correctly and there is in fact connectivity with the Internet.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-9.gif" alt="tk-cisco-smartcare-9" width="500" height="371" /></p>
<h2>Updating the Cisco Smart Care Appliance</h2>
<p style="text-align: justify;" align="left">Updating the Cisco Smart Care appliance is a necessity because if you don't upgrade it, it simply won't work.</p>
<p style="text-align: justify;" align="left">The first time we performed the update, we had a problem downloading the new image and were required to open a Cisco TAC case as the appliance is not able to automatically find the necessary update and download it. Hopefully this will be fixed in the newer versions of the appliance so updating it would simply mean to execute a command and nothing more.</p>
<p style="text-align: justify;" align="left">Envoking the update process is easy: At the prompt <strong>#</strong>, simply type the command <strong>update</strong> and <strong>hit enter</strong>. The Cisco Smart Care appliance will ask you to confirm the upgrade of the client:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-10.gif" alt="tk-cisco-smartcare-10" width="500" height="358" /></p>
<p style="text-align: justify;" align="left">After answering <strong>y</strong> for yes, the system will move to the 'client update' page to continue the process.</p>
<p style="text-align: justify;" align="left">The client update page is very simple and requests the following two peices of information:</p>
<p style="text-align: justify;" align="left">1) URL from which the Cisco Smart Care appliance is able to download the necessary image</p>
<p style="text-align: justify;" align="left">2) Cisco Connection Online (known as 'CCO') account name &amp; password</p>
<p style="text-align: justify;" align="left">Keep in mind that when entering your CCO password, the system will not show it on the screen, but instead the field is kept blank:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-11.gif" alt="tk-cisco-smartcare-11" width="500" height="359" /></p>
<p style="text-align: justify;" align="left">The url seems a bit wierd at a first glance because of its length, the system wraps it at the end of the screen, giving it an aweful look. Assuming all the information provided is correct, the Cisco Smart Care appliance will automatically start downloading the new update providing you with constant feedback on the download speed. The image download is about 55Mb, so if your on a fast ASDL connection, its a matter of minutes.</p>
<p style="text-align: justify;" align="left">This update can only be performed online. You cannot download the image and install it from your computer as you would with an IOS image!</p>
<p style="text-align: justify;" align="left">As soon as the image download is complete, you are prompted with a few details about the installation that will proceed, plus a final confirmation that you wish to perform the update:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-12.gif" alt="tk-cisco-smartcare-12" width="500" height="262" /></p>
<p style="text-align: justify;" align="left">After you press '<strong>y</strong>' and '<strong>enter</strong>', confirming to proceed with the update, the system will start to upwrap the image it downloaded and begins the installation as shown below:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-13.gif" alt="tk-cisco-smartcare-13" width="491" height="352" /></p>
<p style="text-align: justify;" align="left">The installation process is monitored easily through the stars * on the screen. We don't know what eactly one unique star represents, but that doesn't really matter :) As soon as the update is complete, the system notifies the installer with a '<strong>Installation Complete</strong>' message and immediately begins the restart process to load the newly updated software.</p>
<p style="text-align: justify;" align="left">When the Cisco Smart Care appliance completes its reboot, you'll need to perform the whole login process again, until you reach the '#' prompt. At that point, we can issue the '?' command and see the available menu options. If you compare the options with the ones before the update, (shown at the begining of this page - first screenshot), we'll see there is a noticeable difference.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-14.gif" alt="tk-cisco-smartcare-14" width="500" height="480" /></p>
<p style="text-align: justify;" align="left">Now that we have updated the Cisco Smart Care appliance, we need to register it with Cisco. This registration is necessary so we can finally tie the appliance to the end customer.</p>
<p style="text-align: justify;" align="left">To kick-start the registration, simply enter the 'register' command and the registration screen will make its appearance:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-15.gif" alt="tk-cisco-smartcare-15" width="495" height="398" /></p>
<p style="text-align: justify;" align="left">Taking the settings from top to bottom, we leave the first three options 'as is' and move to the fourth where enter again the partner CCO account and password. Next, we can provide a name for the appliance to help us indicate which customer is it for. The name above has been smudged out to ensure privacy.</p>
<p style="text-align: justify;">We confirm at the end that all above information is correct and the appliance proceeds to contact Cisco and register itself. A confirmation message is shown, indicating tha the registration was successful.</p>
<h2>Assigning &amp; Enabling the Cisco Smart Care Appliance</h2>
<p style="text-align: justify;" align="left">Once the Cisco Smart Care appliance has registered with Cisco, we need to assign it to the end customer. This process binds the appliance to the specific customer and the contract invoked.</p>
<p style="text-align: justify;" align="left">For this process, the partner must log into the <strong>Cisco Smart Care portal</strong>.</p>
<p style="text-align: justify;" align="left">The main page at the Cisco Smart Care portal provides all the necessary configuration and monitoring options for all appliances installed.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-16.gif" alt="" width="500" height="358" data-alt="tk-cisco-smartcare-16" /></p>
<p style="text-align: justify;" align="left">From the menu on the left, we select the <strong>Administration</strong> menu and then <strong>Assessment Appliances</strong> to assign the registered appliance to the appropriate customer.</p>
<p style="text-align: justify;" align="left">When selected, the <strong>Assessment Appliances</strong> screen will show all registered appliances no matter what state they are in. As shown in the screenshot below, our hardware client is registered, but remains unassigned to the customer.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-17.gif" alt="tk-cisco-smartcare-17" width="620" height="295" /></p>
<p style="text-align: justify;" align="left">To assign the appliance, we select the appliance and then click on the <strong>Assign/Unassign</strong> button located on the lower left corner of the <strong>Cisco Network Assessment Appliances</strong> table.</p>
<p style="text-align: justify;" align="left">Once the Assign/Unassign button is pressed, a final confirmation is required before the assignment process begins. After confirming by pressing <strong>OK</strong>, the process begins:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-18.gif" alt="tk-cisco-smartcare-18" width="465" height="351" /></p>
<p style="text-align: justify;" align="left">The Cisco Smart Care portal will contact the appliance and after a brief secure exchange of data, the appliance will be assigned to the customer.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-19.gif" alt="tk-cisco-smartcare-19" width="470" height="351" /></p>
<p style="text-align: justify;" align="left">Once this phase of the process is complete, we need to enable the Smart Care appliance installed as the customer's site. To do this, under the customer's menu, we select <strong>Administration</strong> and then <strong>Assessment Appliance Configuration</strong>.</p>
<p style="text-align: justify;" align="left">Once the page loads we click on <strong>view</strong> and wait for the next window to open</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-20.gif" alt="tk-cisco-smartcare-20" width="620" height="114" /></p>
<p style="text-align: justify;" align="left">The next page provides us with the option to finally enable the network appliance installed at our customer's site. Click on the drop-down box, select <strong>Enabled</strong> and then click on the <strong>Save</strong> button.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-21.gif" alt="tk-cisco-smartcare-21" width="620" height="163" /></p>
<p style="text-align: justify;" align="left">Once the Save button is pressed, the Smart Care portal will queue the necessary commands and send them to the Smart Care appliance to enable it, providing the Cisco engineer with a number of additional tasks within the Smart Care portal.</p>
<p align="left"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-22.gif" alt="tk-cisco-smartcare-22" width="620" height="418" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<h2 align="left">Discovering Cisco Devices</h2>
<p style="text-align: justify;" align="left">As soon as the appliance is enabled, the Smart Care portal will refresh and show its status alongside with the services activated and their respective version. This particular customer has a Level 3 service which includes routing, switching and voice services (Cisco Unified CallManager Express).</p>
<p style="text-align: justify;" align="left">Level 3 services indicate a higher complexity network and therefore offer additional services such as <strong>Voice Monitor</strong>, <strong>Voice Quality Monitor</strong> and other related services as shown in the screenshot above.</p>
<p style="text-align: justify;" align="left">At this point, we need to discover our Cisco network devices and add them to the portal. This process is usually handled during the contract setup by your Cisco Partner, and therefore all covered equipment are already listed with their product codes and serial numbers, however the system does not contain any IP Addresses, SNMP passwords (required for the SmartCare appliance to connect to the devices) e.t.c.</p>
<p style="text-align: justify;" align="left">We now head over to the <strong>Discovered Devices</strong> menu on the left and click the <strong>Perform New Discovery</strong> button which brings up the <strong>Service Control</strong> screen where we can run a number of services by either scheduling them or running them at that moment.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-23.gif" alt="" width="620" height="405" data-alt="tk-cisco-smartcare-23" /></p>
<p style="text-align: justify;" align="left">The first step here is to select the <strong>Run Now...</strong> button which will trigger the 3-step discovery process so that the Smart Care appliance can discover all Cisco devices that will be included in the Smart Care contract. These devices will be permanently monitored by the appliance once added.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-24.gif" alt="tk-cisco-smartcare-24" width="620" height="255" /></p>
<p style="text-align: justify;" align="left">The first step involves the Cisco engineer inserting the network subnets that need to be scanned by the appliance to discover the Cisco devices. Scrolling further below (not shown) the system requires the SNMP string which will be used to connect to each discovered device and obtain all necessary information. As it is evident, SNMP must be enabled on all Cisco devices we want to be discovered, using a read-only string.</p>
<p style="text-align: justify;" align="left">This technique is favourable because it allows you to control which equipment are added to the Smart Care contract. If the Smart Care appliance can't 'see' them - they aren't added to the contract!</p>
<p style="text-align: justify;" align="left">As soon as all the information is entered, hitting the <strong>Next</strong> button starts the scanning process as shown below:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-25.gif" alt="tk-cisco-smartcare-25" width="620" height="287" /></p>
<p style="text-align: justify;" align="left">The screen will show the discovered hosts in real-time and won't take longer than a couple of minutes to complete, depending on the amount of hosts the network has.</p>
<p style="text-align: justify;" align="left">As each device is successfully discovered, the system shows its Status, Device Type, Eligibility and Details. This will help ensure the correct devices are discovered.</p>
<p style="text-align: justify;" align="left">In our first discovery process, the ASA 5510 appliances were not discovered due to the strict firewall policies in place. This was a reminder that when performing the discovery, you must ensure firewall access lists are not blocking SNMP queries to the devices.</p>
<p style="text-align: justify;" align="left">Thankfully, we are able to re-run the discovery process and add the missing devices later on.</p>
<p style="text-align: justify;" align="left">As soon as the process is complete, we are presented with the final table of discovered devices. Here we get the chance to make any last changes and select the proper device, in case the Smart Care appliance made a mistake - something we have never encountered so far.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-26.gif" alt="tk-cisco-smartcare-26" width="620" height="241" /></p>
<p style="text-align: justify;" align="left">Clicking on the <strong>Details</strong> button doesn't do much other than display the IP Address and SNMP MIB Tree information of the discovered device - slightly useless information we believe.</p>
<p style="text-align: justify;" align="left">Now all that is needed is to hit the <strong>Save and Continue</strong> button so the system can add these devices to the Cisco Smart Care service so they become available to the customer's inventory.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-27.gif" alt="tk-cisco-smartcare-27" width="359" height="238" style="border: 1px solid #000000;" /></p>
<p style="text-align: justify;" align="left">The Cisco Smart Care service allows the Cisco Partner to run the discover process and add devices to the service at any time, however, these additional devices (assuming they are not already covered) can force the Smart Care service <strong>device weight</strong> jump to the next level. When this happens, an invoice is automatically generated and sent to the partner!</p>
<p style="text-align: justify;" align="left">Therefore, to help avoid covering equipment accidently, the system always provides a number of warnings before allowing you to accept the changes:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-28.gif" alt="tk-cisco-smartcare-28" width="581" height="355" style="border: 1px solid #000000;" /></p>
<p style="text-align: justify;" align="left">For this installation, all devices had been pre-inserted into the Smart Care portal in order to generate the initial quotation. As these devices are now discovered, we will see duplicate entries in the inventory. As a last step, we simply need to delete the older entries, effectively replacing them with the newly discovered devices.</p>
<h2>Inventorying The Discovered Cisco Devices</h2>
<p style="text-align: justify;" align="left">After running the discovery service, if we visit the<strong> Discovered Devices</strong> section from the menu, the system will confirm the devices found already exist in the system and report that we need to run the inventory service:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-29.gif" alt="" width="620" height="167" data-alt="tk-cisco-smartcare-29" /></p>
<p style="text-align: justify;" align="left">Following the instructions, we select <strong>Services</strong> under the customer's <strong>Administration</strong> menu:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-30.gif" alt="" width="222" height="146" style="border: 1px solid #000000;" data-alt="tk-cisco-smartcare-30" /></p>
<p style="text-align: justify;" align="left">This will load the <strong>Service Control</strong> panel where we can execute on the spot a number of services or schedule them to automatically run at specific times and dates. The panel will also show when exactly the available services were executed.</p>
<p style="text-align: justify;" align="left">To continue our setup, we select the <strong>Run Now...</strong> button to initiate the <strong>Inventory</strong> service.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-31.gif" alt="tk-cisco-smartcare-31" width="620" height="101" /></p>
<p style="text-align: justify;" align="left">Like most partner-initiated services, this is a 4-step process where we selected the discovered devices to the inventoried:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-32.gif" alt="tk-cisco-smartcare-32" width="620" height="189" /></p>
<p style="text-align: justify;" align="left">After selecting the devices to be inventoried and clicking the <strong>Next</strong> button, we are asked to enter the necessary credentials for each Cisco device, so that the Smart Care appliance can log into each device.</p>
<p style="text-align: justify;" align="left">This might come as a surprise to some engineers, however it is necessary because the Cisco Smart Care appliance actually logs into each device and obtains a full list of all components installed, including part numbers, serial numbers, PVDMs (Cisco DSPs), slots in which cards are installed (for routers) and even Cisco Unity Express modules (if installed)!</p>
<p style="text-align: justify;" align="left">The amount of information later on provided will surprise you as it is extremely comprehensive.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-33.gif" alt="tk-cisco-smartcare-33" width="620" height="198" /></p>
<p style="text-align: justify;" align="left">In case an incorrect username or password is entered, the system will reported a failure to log into the affected device and we will be able to later on re-run the inventory service and enter the correct credentials. For any given device who's credentials are correct, the SmartCare appliance will save this information for all future monitoring services to be run.</p>
<p style="text-align: justify;" align="left">As we complete entering all information and select the protocol used to access each device, we can click on the <strong>Next</strong> button to start the inventory process:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-34.gif" alt="tk-cisco-smartcare-34" width="620" height="162" /></p>
<p style="text-align: justify;" align="left">At this point, the Smart Care portal queues the operation at the customer's Smart Care appliance and will begin to execute in a minute or two.</p>
<p style="text-align: justify;" align="left">The time required to complete the inventory process will depend on the amount of devices and their complexity. For our setup, the process did not take more than 5 minutes to complete.</p>
<p style="text-align: justify;" align="left">As soon as the process completes, we are presented with a brief summary of the process and are able to <strong>Terminate</strong> (close) the window. This will take us back to the Service Control panel where the Inventory will show as sucessfully executed along with a date and time.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/tk-cisco-smartcare-35.gif" alt="tk-cisco-smartcare-35" width="620" height="242" /></p>
<p style="text-align: justify;" align="left">With the inventory process complete, the last step is to schedule or run the Core, Security and Voice technology processes in order to examine and monitor the equipment discovered.</p>
<p style="text-align: justify;" align="left">The Core, Security and Voice process is out of this article's scope and will be covered in future articles.</p>
<h1>Summary</h1>
<p style="text-align: justify;" align="left">This article introduced the Cisco Smart Care service and explained the secret details of this service, which is executed by Cisco Smart Care authorized partners only. We saw the setup process of the Smart Care appliance, the portal setup including discovery and inventorying process of Cisco devices.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Tue, 23 Aug 2011 01:23:59 +1000</pubDate>
		</item>
		<item>
			<title>WEB SSL VPN - The Next Wave Of Secure VPN Services </title>
			<link>https://www.firewall.cx/cisco/cisco-services-technologies/cisco-web-vpn.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-services-technologies/cisco-web-vpn.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left">Fifteen years ago <strong>Virtual Private Networks</strong> (VPN) access was a fairly new concept to most businesses. While large corporations already had a good head-start with VPN technologies, the rest were starting to realise the potential and possibilities provided by VPN connections provided. Vendors such as Cisco, Checkpoint, Microsoft and many more, started to produce a variety of products that provided VPN services to business. Today, VPN is considered a standard feature in any serious security-router related product and is widely implemented throughout almost all companies.</p>
<p style="text-align: justify;" align="left">Early VPN products required, as many still do today, their own client which is usually installed on the remote workstation that requires access to the local network. The encryption methods and supported protocols made them either a very good choice, or simply a very bad one which could be easily compromised. These days, IPSec based VPNs are a standard, using the IP Security protocol and a number of other relative protocols, they provide adequate security and encryption to ensure a session is secure and properly encrypted.</p>
<p style="text-align: justify;" align="left">VPN clients are usually preconfigured by the company's IT department with the necessary details and all end users need to do is launch the SSL VPN program and enter their credentials. Once user credentials are verified, they are granted access to the company's network and all associated security policies (such as access control lists) are applied.</p>
<p style="text-align: justify;" align="left">We would say that, until recently (last 5 years), one of the major fall backs with VPN solutions was the fact that their vendors would in most cases only support their own VPN client, making the product usable only with their software – a major drawback for most companies. Another big problem with VPN clients is the fact they usually support specific operating systems. For example, many vendors provide VPN clients for Windows based operating systems but few support 64bit operating systems! Linux and Unix systems are usually out of luck when it comes to vendor-based VPN clients but, thanks to the open source community, solutions are freely available .</p>
<p style="text-align: justify;" align="left">But these are just a few of the problems vpn-users and administrators are faced with. Getting access to your corporate VPN in most cases requires custom ports to be open through the firewall that's in front. Hotels and public hotspots usually block these ports and only allow very specific protocols to pass through such as HTTP, HTTPS, POP3, SMTP and others.</p>
<p style="text-align: justify;" align="left"><strong>Web SSL VPN</strong> has started to change all that. As the name implies, Web SSL VPN is a popular version of VPNs, moving in a complete different direction from that which most vendors have been used to.</p>
<h2>What is Web SSL VPN?</h2>
<p style="text-align: justify;" align="left"><strong>Web SSL VPN</strong> is, as the name implies, a <strong>web-based VPN client</strong>. While this might not mean much to many, it's actually a revolution in VPN technology! By moving from the program-based VPN client to a web-based VPN client, the operating system is no longer a problem. You can download, install and run your web-based VPN client on any operating system without a second thought!</p>
<p style="text-align: justify;" align="left"><strong>Web SSL VPN</strong> works by communicating over standard <strong>HTTPS</strong> (<strong>SSL</strong>) <strong>protocol</strong>, allowing it to pass through almost any proxy or firewall that might be limiting your access. Once connected, a small java-based client is downloaded to the computer's web browser which creates a virtual connection between your computer and VPN concentrator or firewall providing the service.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/web-ssl-vpn-1.gif" alt="web-ssl-vpn-1" width="379" height="296" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: center;" align="left"><em>An early version of Cisco Web VPN client, being downloaded and preparing its installation </em></p>
<p style="text-align: justify;" align="left">The great part about Web SSL VPN is that it will automatically download if needed on to your computer and install itself. Once your session is over, it can be configured (by the administrator setting up the VPN service) to automatically delete itself from the computer, leaving no trace of the VPN client!</p>
<p style="text-align: justify;" align="left">This means that using Web SSL VPN, you can safely log on to your corporate network from another computer, without requiring special certificates installed or group passwords at the user end. All you need to know is your own credentials and the URL to your Web SSL VPN concentrator.</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/web-ssl-vpn-2.gif" alt="web-ssl-vpn-2" width="345" height="133" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: center;" align="left"><em>After installation, your connection is established with the corporate Firewall </em></p>
<p style="text-align: justify;" align="left">Another big advantage of Web SSL VPN is that it supports ‘split tunnelling' natively. Split tunnelling is a technique where when connected to a VPN network, only traffic destined for that network is encrypted and passed over the tunnel. All other traffic (e.g Internet browsing) bypasses the tunnel and is sent directly to the Internet as any normal connection. Split tunnelling is a wonderful feature that allows users to do necessary work through the VPN, but also maintain a direct Internet connection. Of course, this feature is easily disabled, again, by the administrator of your VPN concentrator.</p>
<p class="box-info" style="text-align: justify;" align="left"><strong>Note:</strong> WebVPN for Cisco IOS routers is fully covered in our article: <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-anyconnect-webvpn.html" target="_blank" title="Configuring WebSSL VPN AnyConnect on Cisco IOS Routers">Configuring WebSSL VPN AnyConnect on Cisco IOS Routers</a>.</p>
<h2>Is Web based VPN Considered Safe?</h2>
<p style="text-align: justify;" align="left">Fortunately Web based VPN connections do not suffer from the same vulnerabilities as websites and webservers. The technology might use the same protocols (HTTP &amp; HTTPS), however the Web SSL VPN implementation is completely different for most vendors. The non-web server based solution of Web SSL VPN offers a much more secure approach and is generally considered safe. The main difference here is that you've got a dedicated appliance offering a web service, and not a dedicated machine with a buggy operating system and web server full of exploits.</p>
<p style="text-align: justify;" align="left">Web SSL VPN is considered to be very secure and capable of encrypting your user sessions so that no data is compromised over the VPN.</p>
<h2>Client-Side Security of Web SSL VPN</h2>
<p style="text-align: justify;" align="left">The latest Web SSL VPN solutions offered have certainly improved in both performance and security requirements for the end user. They are now capable of checking a number of parameters on the host's side to decide whether or not to install. Administrators are able to create their own policies that would allow the Web SSL VPN client to install on a host's PC only if the host has a firewall installed and operating on its system, or if it has a valid up to date antivirus. If any of these requirements are not met, the Web SSL VPN client can fail to install.</p>
<h2>VPN Application Support for Web SSL VPN</h2>
<p style="text-align: justify;" align="left">Early Web SSL VPNs, or First-Generation Web SSL VPNs, supported fewer features and protocols and provided secure access mainly to Intranet web-based application services. Their limited functionality and immaturity did not allow many companies to see them as an alternative to the well-known vpn client program.</p>
<p style="text-align: justify;" align="left">As things started to progress and the Second-Generation of Web SSL VPNs came out, there was full support for all IP-based applications. Intranet Web services, File services, ERP services and pretty much anything you can think of is now capable of running through a second generation Web SSL VPN. This is also called a <em>True SSL VPN </em> solution as it completely replaces the IPSec based VPN client used until now.</p>
<p style="text-align: justify;" align="left">Today, all Web SSL VPNs offer tunnelling of all IP Services, thereby falling into the second category .</p>
<h2>Business Value of Web SSL VPN</h2>
<p style="text-align: justify;" align="left">While this fairly new technology is great, is there any real value in it for business? The answer is clearly ‘Yes'. Here are a few pointers that will help clarify:</p>
<p style="text-align: justify;" align="left">• Easy to setup with a lot less administrative overhead and technical support required due to the ease of use.</p>
<p style="text-align: justify;" align="left">• Costs less than traditional IPSec VPNs. They do not require propriety vpn client software to be purchased or licensed (in most cases).</p>
<p style="text-align: justify;" align="left">• SSL makes use of Port 443. This almost guarantees it will work though any firewall that provides standard Internet access, without the need for any special configuration. No more troubled users trying to connect to the corporate network due to a restrictive Internet connection.</p>
<p style="text-align: justify;" align="left">• Compatible with all operating system and web browsers.</p>
<p style="text-align: justify;" align="left">• Full IP application support – replacing IPSec vpn client programs completely</p>
<p style="text-align: justify;" align="left">• Ability to create security policies and allow access only when these policies are met e.g. Firewall, up to date antivirus and more.</p>
<p style="text-align: justify;" align="left">• Available on servers, firewalls and even routers! You don't necessarily need a dedicated machine only for your VPN users as it is supported even on small devices such as Cisco 870 series routers!</p>
<p class="box-info" align="left"><strong>WebVPN for Cisco IOS routers</strong> is fully covered in our article: <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-anyconnect-webvpn.html" target="_blank" title="Configuring WebSSL VPN AnyConnect on Cisco IOS Routers">Configuring WebSSL VPN AnyConnect on Cisco IOS Routers</a>.</p>
<h2>Summary</h2>
<p style="text-align: justify;" align="left">We saw what the Web SSL VPN hype is all about and it's good. As time passes, more vendors will start offering these solutions in their products. The message is '<em>use them</em>'– don't be afraid to adopt these solutions as they will help you solve a great deal more problems and help get the job done better, faster and safer.</p>
<p style="text-align: justify;" align="left">Invest in Web SSL VPN – it's the future of remote VPN access.</p>]]></description>
			<category>Cisco Services &amp; Technologies</category>
			<pubDate>Sat, 20 Aug 2011 09:39:32 +1000</pubDate>
		</item>
	</channel>
</rss>
