Cisco VXC VPN. Cisco VXC Requirements. Cisco VXC Firmware
|
|
- Angela Haynes
- 6 years ago
- Views:
Transcription
1 Cisco VXC Requirements, page 1 Set Up, page 3 Limitations and Restrictions, page 7 Cisco VXC Requirements The feature provides integrated VPN functionality for Cisco Virtualization Experience Clients (Cisco VXC) 2111 and The feature enables VPN tunneling for the Cisco VXC 2111 and Cisco VXC 2112 clients when they attach to a Cisco Unified IP Phone 8961, 9951, or You can set up the and the phone VPN to use the same tunnel or separate tunnels in the following configurations: One tunnel for both traffic and phone VPN traffic Two tunnels that use the same access credentials (one for traffic and another for phone VPN traffic) Two tunnels that use different access credentials (one for traffic and another for phone VPN traffic). This configuration is only supported when a one-time password is applied. You can configure the feature to prompt the user only once for access credentials (in the Phone VPN Sign In window), or once each for the phone VPN (in the Phone VPN Sign In window) and for the (in the VXC VPN Sign In window). Cisco VXC Firmware To support the VXC VPN feature, the Cisco VXC clients must be running the following minimum firmware releases: Cisco VXC 2112: ICA Firmware Release 7.1_118 Cisco VXC 2111: PCoIP Firmware Release 4.0 (Q3CY12) Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager
2 Cisco Unified Communications Manager for Cisco Unified Communications Manager for The following Cisco Unified Communications Manager configuration is required to support the Cisco VXC VPN: PC Port Enabled You must set the PC Port to Enabled. If the PC port is disabled, the Cisco VXC cannot access the network. The phone provides no enforcement of this configuration. Span to PC Port Disabled You must set the Span to PC Port option to Disabled. The Cisco VXC does not require this feature. You can set the preceding parameters in Cisco Unified Communications Manager Administration by using any of the following configuration windows: Phone Configuration window (Device > Phone) Common Phone Profile Configuration window (Device > Device Settings > Common Phone Profile) Enterprise Phone Configuration window (System > Enterprise Phone Configuration) VPN Concentrator for The recommended VPN concentrator for use with this feature is the Cisco ASA 5500 Series Adaptive Security Appliance. To support the, you must set up the ASA for multisession support so that the phone can establish two tunnels that use the same credentials. Network Guidelines for The following network guidelines exist for the feature implementation: The MTU size in the phone VPN profile is a configurable value. The default value is The maximum MTU value on the phone itself is hardcoded at The MTU value must be no greater than 1406, but it should not be less than 576, because some IIS and virtualization servers do not accept values less than 576. You must set up the firewall to allow the MTU value that you specify in the phone VPN profile. If the phone cannot download the certificate file or the phone configuration file, check for the allowed packet size in the network. If the cannot establish a tunnel, then ping the VPN concentrator IP address with a packet size (load) to match the MTU value that the VPN profile specifies. If the ping fails, try another ping that specifies no load. If the ping still fails without the load, check the routing configuration. If the ping fails only with the load included, check the firewall to ensure that it is configured to allow the required MTU. 2 Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager 10.0
3 Set Up Perform a traceroute to the VPN concentrator IP address, and then ping each route with the load to determine the source of the issue. Ensure the Don t Fragment (DF) bit is not set on the server, network, or IP phone VPN tunnel. Set Up You must enter the Alternate TFTP and TFTP server fields when you configure an off-premises phone for SSL VPN to ASA using a built-in client. Note The Cisco VXC clients require no configuration to support the VPN. All VPN configuration is performed for the phone only. Procedure Step 1 Step 2 To set up the feature, set up the VPN feature for the attached IP phone in Cisco Unified Communications Manager Administration. Use the submenus in Advanced Features > VPN. To enable the feature, populate the Enable VXC VPN for MAC field using one of the following configuration windows: Phone Configuration window (Device > Phone) Common Phone Profile window (Device > Device Settings > Common Phone Profile) Enterprise Phone Configuration window (System > Enterprise Phone Configuration) Descriptions The following table describes the fields. Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager
4 Descriptions Table 1: Fields Parameter Name Enable VXC VPN for MAC Parameter Description This field enables or disables the feature. When you populate this field, the phone allows traffic from the device with the specified MAC address and that connects to the phone PC Port to access the tunnel. When this field is blank, the phone does not establish a Cisco VXC VPN tunnel. When this field specifies one broadcast MAC address (FFFFFFFFFFFF), the phone establishes the tunnel and allows any connected Cisco VXC 2111/2112 device to access the tunnel. When this field specifies one nonbroadcast MAC address, the phone establishes the tunnel and allows only the Cisco VXC device with the specified MAC address to access the tunnel. By default, this field is blank. VXC VPN Option This field indicates the type of VXC VPN support. Dual Tunnel: The phone establishes two VPN tunnels, one for the phone and another for the Cisco VXC device. To ensure the highest quality of service for the phone voice and video services, Cisco recommends the Dual Tunnel setting, which is the default setting. With two VPN tunnels, the host Cisco Unified IP Phone can provide prioritization of CPU and memory resources to the data that associates with the phone voice and with video functions over the data that associates with the tunnel. This approach requires two manual login entries, depending on security parameters: one for the phone VPN and another for the Cisco VXC VPN. The two-tunnel approach also requires two VPN concentrator ports and two IP addresses. Single Tunnel: The phone establishes only one VPN tunnel for the phone and the Cisco VXC device to share. For customers who are willing to trade off potential voice and video quality for a simplified operating model, the single VPN tunnel option is available. All data travels over a single VPN tunnel by sharing the available phone processor and memory resources across the voice, video, and Cisco VXC services. The IP phone does not prioritize data handing of one service over another. As a result, possible performance degradation of the IP phone voice and video media handling and UI functions may occur due to IP phone CPU loading. Default: Dual Tunnel 4 Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager 10.0
5 Descriptions Parameter Name VXC challenge VXC-M Servers Parameter Description This field indicates whether or not to challenge the user for a password for the. 1 Challenge: The phone challenges the user for a password to enable the. 2 No Challenge: The phone does not challenge the user for a password for the. Default: Challenge Note If the phone uses only a certificate for authentication, the Sign In windows do not display. This field indicates the Cisco VXC Manager Server IP address list, where each entry is separated by commas. Maximum length: 255 (character length) Default: blank Note VXC-M Servers is an IP address list which includes VXC-M servers and repository servers (if present). The phone considers the first IP address in this string as the VXC-M server and offers this information to VXC devices. Therefore, after you configure VXC-M Servers, make sure that the IP addresses of any VXC-M servers are placed in front of the IP addresses of the repository servers. The following table describes how the VXC VPN Option and Challenge field settings alter the operation of the feature. Table 2: operation as determined by VXC VPN Option and Challenge settings VXC VPN Option setting Dual Tunnel (default) VXC Challenge setting Challenge (default) Result after enabling the VXC VPN feature (with Cisco VXC connected to the phone) The phone displays the VXC VPN Sign In window to prompt the user to enter a password. If one-time password is configured on the VPN concentrator (that is, a new password is always required to reauthenticate the tunnel), the user must enter a password for the Cisco VXC VPN that differs from the password that was used for the phone VPN tunnel. Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager
6 Descriptions VXC VPN Option setting Dual Tunnel (default) Single Tunnel Single Tunnel VXC Challenge setting No Challenge Challenge No Challenge Result after enabling the VXC VPN feature (with Cisco VXC connected to the phone) The phone attempts to reuse the phone VPN credentials for the tunnel. Note that if the VPN concentrator is configured for one-time passwords, the attempt fails, and the phone displays the VXC VPN Sign In window for the user to enter a different password from the phone VPN password. The phone disconnects the phone VPN tunnel, and then displays the Phone VPN Sign In window to prompt the user to enter a password and reestablish the phone VPN tunnel. If the user is on an active call, the phone waits until the call ends before tearing down the tunnel. Cisco VXC traffic receives silent permission to go over the phone VPN with no challenge. The following table describes how a change in the VXC VPN Option setting alters the operation of the VXC VPN feature when the feature is already enabled. Table 3: operation as determined by VXC VPN Option change VXC VPN action Change from Dual Tunnel to Single Tunnel Change from Single Tunnel to Dual Tunnel Result The phone disconnects the VXC VPN tunnel and leaves the phone VPN tunnel intact. Cisco VXC traffic receives permission to go over the phone VPN tunnel. The phone attempts to reuse the phone VPN credentials for the tunnel silently without considering the VXC Challenge field. If the VPN concentrator is configured for one-time password, the attempt fails and the phone displays the VXC VPN Sign In window, which prompts the user to enter a different password. 6 Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager 10.0
7 Limitations and Restrictions Limitations and Restrictions The following limitations and restrictions apply: Only Layer 3 packets are tunneled. The feature does not support Layer 2 tunneling. Therefore any Layer 2 capabilities are lost if the Cisco VXC connects through VPN. The VPN client supports only IPv4 addresses. The tunnel cannot be established over a Wi-Fi interface. The Enable VXC VPN for MAC feature option is configurable only after you set up the phone VPN parameters, including VPN Group and VPN Profile. This restriction exists because the can share the same VPN parameters as the phone VPN. All existing limitations and restrictions that apply to the phone VPN support apply to the Cisco VXC VPN as well. Note Do not turn on the VPN before a downgrade to a load previous to 9.2(3), or the phone will be unregistered. Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager
8 Limitations and Restrictions 8 Cisco Unified IP Phone 8961, 9951, and 9971 Administration Guide for Cisco Unified Communications Manager 10.0
Cisco VXC PCoIP Configuration
As a user or administrator you can interact with your Cisco VXC clients through the embedded HTTPS web interface (the Administrative Web Interface) and On Screen Display (OSD). Users can connect or disconnect
More informationTransparent or Routed Firewall Mode
This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. You can set the firewall mode independently for each context in multiple
More informationConfiguring Management Access
37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how
More informationUsing Access Point Communication Protocols
Information About Access Point Communication Protocols, page 1 Restrictions for Access Point Communication Protocols, page 2 Configuring Data Encryption, page 2 Viewing CAPWAP Maximum Transmission Unit
More informationTransparent or Routed Firewall Mode
This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. You can set the firewall mode independently for each context in multiple
More informationConfiguring Easy VPN Services on the ASA 5505
CHAPTER 67 Configuring Easy VPN Services on the ASA 5505 This chapter describes how to configure the ASA 5505 as an Easy VPN hardware client. This chapter assumes you have configured the switch ports and
More informationThe VPN menu and its options are not available in the U.S. export unrestricted version of Cisco Unified Communications Manager.
Overview, page 1 Prerequisites, page 1 Configuration Task Flow, page 1 Overview The Cisco for Cisco Unified IP Phones creates a secure VPN connection for employees who telecommute. All settings of the
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationCisco Certified Network Associate ( )
Cisco Certified Network Associate (200-125) Exam Description: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that
More informationINTERNET VPN REMOTE ACCESS CLIENT USER GUIDE
INTERNET VPN REMOTE ACCESS CLIENT USER GUIDE WELCOME TO THE INTERNET VPN REMOTE ACCESS CLIENT USER GUIDE Note: This user guide is provided for trial and evaluation purposes only and is subject to change
More informationEasy VPN. About Easy VPN
This chapter describes how to configure any ASA as an Server, and the Cisco ASA with FirePOWER- 5506-X, 5506W-X, 5506H-X, and 5508-X models as an Remote hardware client. About, page 1 Configure Remote,
More informationCisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]
s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers
More informationCisco CISCO Securing Networks with ASA Advanced. Practice Test. Version
Cisco 642-515 CISCO 642-515 Securing Networks with ASA Advanced Practice Test Version 3.1 QUESTION NO: 1 Cisco 642-515: Practice Exam Which two statements correctly describe configuring active/active failover?
More informationThe process of creating a Mobile Connect connection is slightly different depending on which type of SonicWall appliance you are connecting to.
Installing Mobile Connect SonicWall Mobile Connect is installed through the Chrome Web Store. 1 On your Chromebook, click the Web Store icon. 2 In the Search field, type in SonicWall Mobile Connect, and
More informationCCNA Routing and Switching (NI )
CCNA Routing and Switching (NI400+401) 150 Hours ` Outline The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that is
More informationHow to Configure SSL VPN for Forcepoint NGFW TECHNICAL DOCUMENT
How to Configure SSL VPN for Forcepoint NGFW TECHNICAL DOCUMENT Table of Contents TABLE OF CONTENTS 1 OVERVIEW 2 SSL VPN CASE STUDY 2 CONFIGURE THE NGFW ENGINE 5 ADD SSL VPN USERS 6 ADDING LOCAL USERS
More informationCisco Unified IP Phone Settings
Phone Settings Overview, page 1 Cisco Unified IP Phones 7906G and 7911G Menus, page 1 Phone Setup s, page 4 Network Configuration Menu, page 5 Device Configuration Menu, page 17 Security Configuration
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationCertified Cisco Networking Associate v1.1 ( )
Certified Cisco Networking Associate v1.1 (640-802) Exam Description: The Cisco Certified Networking Associate v1.1 640-802 is the composite exam that is associated with Cisco CCNA Routing and Switching
More informationFortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B
FortiNAC Cisco Airespace Wireless Controller Integration Version: 8.x Date: 8/28/2018 Rev: B FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE
More informationHigh Availability Options
, on page 1 Load Balancing, on page 2 Distributed VPN Clustering, Load balancing and Failover are high-availability features that function differently and have different requirements. In some circumstances
More informationCCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,
CCNA Cisco Certified Network Associate (200-125) Exam DescrIPtion: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment
More informationPROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL
Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.
More informationWireless LAN Profile Setup
Wireless LAN Profiles, page 1 Network Access Profile Settings, page 2 Wireless LAN Profile Settings, page 3 Wireless LAN Profile Group Settings, page 6 Create Network Access Profile, page 6 Create Wireless
More informationMonitoring Remote Access VPN Services
CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,
More informationGrandstream Networks, Inc. GWN7000 Command Line Guide
Grandstream Networks, Inc. Table of Contents INTRODUCTION... 3 CONNECTING AND ACCESSING THE GWN7XXX... 4 Connecting the GWN7000... 4 SSH Access... 5 USING THE CLI MENU... 6 Menu Structure And Navigation...
More informationRealms and Identity Policies
The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page
More informationCisco RV110W Wireless-N VPN Firewall
Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides
More informationConfiguring L2TP over IPsec
CHAPTER 62 This chapter describes how to configure L2TP over IPsec on the ASA. This chapter includes the following topics: Information About L2TP over IPsec, page 62-1 Licensing Requirements for L2TP over
More informationUsing TU Eindhoven s VPN with Ubuntu
Using TU Eindhoven's VPN with Ubuntu 14.04 or 16.04 TU Eindhoven s Virtual Private Networking (VPN) service can be used on Linux computers. This document describes how to do it using Ubuntu 14.04 or 16.04
More informationCisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release
:: Seite 1 von 5 :: Datenblatt zum Produkt Cisco ANYCONNECT ESSENTIALS VPN mit DC# 554678 :: Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release PB526545 Cisco ASA Software Release 8.2
More informationExam4Tests. Latest exam questions & answers help you to pass IT exam test easily
Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : 642-647 Title : Deploying Cisco ASA VPN Solutions (VPN v1.0) Vendors : Cisco Version : DEMO
More informationConfiguring an IPSec Tunnel Between a Cisco SA500 and the Cisco VPN Client
Application Note Configuring an IPSec Tunnel Between a Cisco SA500 and the Cisco VPN Client This application note document provides information on how to configure an SA500 IPSec VPN Tunnel for remote
More informationPulse Secure Desktop Client
Pulse Secure Desktop Client Release Notes Table of Contents Introduction 3 Interoperability and Supported Platforms 3 Release, Build Published Revision 5.1 R 5, 60701 October 2015 1.1 Problems Resolved
More informationForeScout CounterACT. Configuration Guide. Version 4.1
ForeScout CounterACT Network Module: VPN Concentrator Plugin Version 4.1 Table of Contents About the VPN Concentrator Plugin... 3 What to Do... 3 Requirements... 3 CounterACT Requirements... 3 Supported
More informationCisco Unified IP Phone Installation
Verify the Network Setup, page 1 Enable Autoregistration for Phones, page 2 Install Cisco Unified IP Phone, page 3 Set Up Phone from Setup Menus, page 5 Set Up Wireless LAN, page 7 Configure Network Settings,
More informationPulse Secure Desktop Client
Pulse Secure Desktop Client Release Notes Release, Build Published Revision 5.1R6, 61491 October 2015 1.0 Table of Contents Introduction 3 Interoperability and Supported Platforms 3 Problems Resolved in
More informationVPN Client. VPN Client Overview. VPN Client Prerequisites. VPN Client Configuration Task Flow. Before You Begin
Overview, page 1 Prerequisites, page 1 Configuration Task Flow, page 1 Overview The Cisco for Cisco Unified IP Phones creates a secure VPN connection for employees who telecommute. All settings of the
More informationConnecting Devices to the PSD-BYOD Network
Connecting Devices to the PSD-BYOD Network Students and staff can use the PSD-BYOD (Bring Your Own Device) network for internet access. Below are directions for connecting different types of devices. Selecting
More informationConfiguring a VAP on the WAP351, WAP131, and WAP371
Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of
More informationIdentity Firewall. About the Identity Firewall
This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History
More informationV7610 TELSTRA BUSINESS GATEWAY
V7610 TELSTRA BUSINESS GATEWAY VPN Configuration Guide Date: Oct 16, 2015 Revision Num: 1.0 1 V7610 VPN Configuration Guide Rev1.0, October 2015 Revision History Date Release Author Description Oct 16,
More informationTEXTBOOK MAPPING CISCO COMPANION GUIDES
TestOut Routing and Switching Pro - English 6.0.x TEXTBOOK MAPPING CISCO COMPANION GUIDES Modified 2018-08-20 Objective Mapping: Cisco 100-105 ICND1 Objective to LabSim Section # Exam Objective TestOut
More informationTroubleshooting. General Troubleshooting Information
General Information, page 1 Startup s, page 3 Phone Reset s, page 7 Phone Cannot Connect to LAN, page 9 Cisco IP Phone Security s, page 9 Video Call s, page 11 General Telephone Call s, page 12 Procedures,
More informationStatistics Available on the Phone, page 1 Statistics Available from the Phone Web Pages, page 8
Statistics Available on the Phone, page 1 Statistics Available from the Phone Web Pages, page 8 Statistics Available on the Phone You can see statistics and information about the phone from the Settings
More informationForeScout Extended Module for MobileIron
Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationUser Identity Sources
The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The
More informationPulse Secure Desktop Client
Pulse Secure Desktop Client Release Notes Release, Build Published Revision 5.1R7, 61533 December 2015 1.0 Table of Contents Introduction 3 Interoperability and Supported Platforms 3 Problems Resolved
More informationDeploy a Customer Site
Local Administration, on page 1 Run Port Check Tool, on page 4, on page 4 Add Cisco Wireless IP Phone 8821 to the Wireless LAN, on page 6 Provision the Phone, on page 7 Local Administration You can connect
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationNew Features for ASA Version 9.0(2)
FIREWALL Features New Features for ASA Version 9.0(2) Cisco Adaptive Security Appliance (ASA) Software Release 9.0 is the latest release of the software that powers the Cisco ASA family. The same core
More informationFirewalls for Secure Unified Communications
Firewalls for Secure Unified Communications Positioning Guide 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 12 Firewall protection for call control
More informationCisco RV180 VPN Router
Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet ports allow
More informationMS Switch Access Policies (802.1X) Host Modes
MS Switch Access Policies (802.1X) Cisco Meraki MS switches offer the ability to configure access policies, which require connecting devices to authenticate against a RADIUS server before they are granted
More informationPMS 138 C Moto Black spine width spine width 100% 100%
Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of
More informationConfiguring 802.1X Settings on the WAP351
Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X
More informationTechnical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems
Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that
More informationChapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM
Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights
More informationIntegration Debugging Information
APPENDIXC June 18, 2013, Debugging Information for Cisco Adaptive Security Appliance, page C-1 Debugging Access Edge and OCS Server, page C-5 Debugging Information for Cisco Adaptive Security Appliance
More informationHow to Configure the Barracuda VPN Client for Windows
How to Configure the Barracuda VPN Client for Windows Barracuda VPN Control is the user interface of the VPN Client for Windows for configuring VPN profiles and Barracuda VPN adapter settings as well as
More informationChapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM
Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces. 2016 Cisco and/or its affiliates. All
More informationExam Topics Cross Reference
Appendix R Exam Topics Cross Reference This appendix lists the exam topics associated with the ICND1 100-105 exam and the CCNA 200-125 exam. Cisco lists the exam topics on its website. Even though changes
More informationForescout. Configuration Guide. Version 4.2
Forescout Version 4.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationNetwork Security CSN11111
Network Security CSN11111 VPN part 2 12/11/2010 r.ludwiniak@napier.ac.uk Five Steps of IPSec Step 1 - Interesting Traffic Host A Router A Router B Host B 10.0.1.3 10.0.2.3 Apply IPSec Discard Bypass IPSec
More informationFirepower Threat Defense Remote Access VPNs
About, page 1 Firepower Threat Defense Remote Access VPN Features, page 3 Firepower Threat Defense Remote Access VPN Guidelines and Limitations, page 4 Managing, page 6 Editing Firepower Threat Defense
More informationInformation About Routing
19 CHAPTER This chapter describes underlying concepts of how routing behaves within the adaptive security appliance, and the routing protocols that are supported. The chapter includes the following sections:,
More informationWorkspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationError and Event Log Messages
APPENDIXA and Event Log Messages Client Messages Login Failed Clean Access Server is not properly configured, please report to your administrator. A login page must be added and present in the system in
More informationViewing Network Status, page 116. Configuring IPv4 or IPv6 Routing, page 116. Configuring the WAN, page 122. Configuring a VLAN, page 137
Networking Using the Networking module to configure your Internet connection, VLAN, DMZ, zones, routing, Quality of Service (QoS), and related features. It includes the following sections: Viewing Network
More informationInstalling and Connecting to the SOM VPN using the Cisco AnyConnect version 4.x Client (Windows)
Installing and Connecting to the SOM VPN using the Cisco AnyConnect version 4.x Client (Windows) This document is for you if: - You connect to the SOM VPN via the Cisco AnyConnect Client - Your PC is running
More informationPre-Fragmentation for IPSec VPNs
Pre-Fragmentation for IPSec VPNs Feature History Release 12.1(11b)E 12.2(13)T 12.2(14)S Modification This feature was introduced. This feature was integrated into Cisco IOS Release 12.2(13)T. This feature
More informationDigi TransPort Routers. User Guide
Digi TransPort Routers for model LR54 User Guide Revision history 90001461 Revision Date Description A August 2016 Initial release. B October 2016 Added features for TransPort firmware 1.2.0. C January
More informationGeneral Troubleshooting Information, on page 1 Phone Does Not Go Through the Normal Startup Process, on page 3 Connection Problems, on page 4
General Information, on page 1 Phone Does Not Go Through the Normal Startup Process, on page 3 Connection s, on page 4 Phone Reset s, on page 9 Audio s, on page 11 Feature Issues, on page 13 Roaming and
More informationModel Numbers: DPC3939, TC8707C. Quick Start Guide. Wi-Fi Devices. Wireless Gateway 2
Wireless Gateway 2 Model Numbers: DPC3939, TC8707C Quick Start Guide Wi-Fi Devices Wireless Gateway 2 ENG_WG2XB3_QSG_1013.indd 1 About the Wireless Gateway 2 (Model Numbers: DPC3939, TC8707C) The Wireless
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationConfiguring Interface Characteristics
CHAPTER 10 This chapter defines the types of interfaces on the switch and describes how to configure them. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. The
More informationImplementing DVN. directpacket Product Guide
Implementing DVN directpacket Product Guide directpacket Research www.directpacket.com 2 1 DVN and the IPC Community The Secure Dedicated Versatile Network (DVN) Server is a hardened internet facing device
More informationStandard For IIUM Wireless Networking
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version
More informationCisco AnyConnect Secure Mobility Client
To provide secure VPN connections, the Cisco VXC 6215 supports the Cisco AnyConnect Secure Mobility Client, Release 3.1. The Cisco AnyConnect Secure Mobility client provides remote users with secure VPN
More informationAAA and the Local Database
This chapter describes authentication, authorization, and accounting (AAA, pronounced triple A ). AAA is a a set of services for controlling access to computer resources, enforcing policies, assessing
More informationConfiguring Administrative Operations
Configuring Administrative Operations This section includes the following topics: Administrative Operation Conventions, page 1 Configuring Backup Operations, page 1 Restoring a Backup Configuration, page
More informationTroubleshooting the Security Appliance
CHAPTER 43 This chapter describes how to troubleshoot the security appliance, and includes the following sections: Testing Your Configuration, page 43-1 Reloading the Security Appliance, page 43-6 Performing
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationManaging CX Devices in Multiple Device Mode
Tip Device inventory management applies to PRSM in Multiple Device mode only. If you are configuring a CX device through a direct connection to the device, you do not need to add the device to the inventory
More informationForescout. eyeextend for MobileIron. Configuration Guide. Version 1.9
Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationDell SonicWALL Aventail Connect Tunnel User s Guide
Dell SonicWALL Aventail 10.6.2 Connect Tunnel User s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
More informationCisco IP Phone Installation
Verify the Network Setup, page 1 Enable Autoregistration for Phones, page 2 Install Cisco IP Phone, page 3 Set Up Phone from Setup Menus, page 5 Enable the Wireless LAN on the Phone, page 7 Configure Network
More informationREMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.
REMOTE ACCESS IPSEC Course 4002 1 Remote Access Features! Granular Network Access and Authorization based on groups and policies.! Windows, Linux, and MAC client support. Windows ShrewSoft Client MAC IPSecuritas
More informationAggregate Interfaces and LACP
The following topics explain aggregate interface configuration and how LACP functions on managed devices: About Aggregate Interfaces, on page 1 LAG Configuration, on page 2 Link Aggregation Control Protocol
More informationAprima 2015 System Requirements
Aprima 2015 System Requirements APRIMA PRM CLIENT REQUIRED SOFTWARE The following software is required on all client PCs. o o o Microsoft Windows Recommended: Microsoft Windows 8.1 or 10, Pro or Enterprise
More informationSyncplicity Panorama with Isilon Storage. Technote
Syncplicity Panorama with Isilon Storage Technote Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is accurate
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationCisco Passguide Exam Questions & Answers
Cisco Passguide 642-648 Exam Questions & Answers Number: 642-648 Passing Score: 800 Time Limit: 120 min File Version: 61.8 http://www.gratisexam.com/ Cisco 642-648 Exam Questions & Answers Exam Name: Deploying
More informationActivity Configuring and Securing a Wireless LAN in Packet Tracer
Activity Configuring and Securing a Wireless LAN in Packet Tracer Objectives: 1. Configure a Wireless Access Point (WAP) local IP address. 2. Configure a WAP with an SSID. 3. Change the administrator s
More informationConnectivity options configuration
Global Connection Settings dialog box, page 1 Connectivity options access, page 5 Advanced details about ICA and RDP connections, page 18 Global Connection Settings dialog box While it is not recommended
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationSecuring BYOD with Cisco TrustSec Security Group Firewalling
White Paper Securing BYOD with Cisco TrustSec Security Group Firewalling Getting Started with TrustSec What You Will Learn The bring-your-own-device (BYOD) trend can spur greater enterprise productivity
More informationVersion No. Build Date No./ Release Date. Supported OS Apply to Models New Features/Enhancements. Bugs Fixed/Changes
Build Date / 4.1 Build_17031311 EDR-G903 3.6 Build_16081017 EDR-G903 1. Compliance to IEC 62443-4-2 level 2 requirement. 2. Support for ifadminstatus MIB information as device s port setting. 3. Support
More informationUsing the Certificate Authority Proxy Function
CHAPTER 10 This chapter provides information on the following topics: Certificate Authority Proxy Function Overview, page 10-1 Cisco Unified IP Phone and CAPF Interaction, page 10-2 CAPF Interaction with
More informationCERTIFICATE CCENT + CCNA ROUTING AND SWITCHING INSTRUCTOR: FRANK D WOUTERS JR. CETSR, CSM, MIT, CA
CERTIFICATE CCENT + CCNA ROUTING AND SWITCHING INSTRUCTOR: FRANK D WOUTERS JR. CETSR, CSM, MIT, CA CCENT - Cisco Certified Entry Networking Technician (ICND1) CCNA Routing and Switching (ICND2) Prerequisites:
More information