5 Security Fundamentals
5 Security Fundamentals
Routers use access lists to control incoming or outgoing traffic. You should know the following
characteristics of an access list.
When you create an access list, it automatically contains a deny any statement, although this
statement does not appear in the list itself. For a list to allow any traffic, it must have at least one
permit statement, either permitting a specific traffic type or permitting all traffic not specifically
restricted.
There are two general types of access lists: basic and extended.
Use a standard list to filter on... Use an extended list to filter on...
Source IP protocol (i.e. IP, TCP, UDP, etc.)
Source hostname or host IP address
Source hostname or host IP address Source or destination socket number
Destination hostname or host IP address
Precedence or TOS values
Wildcard Mask
The wildcard mask is used with access list statements to identify a range of IP addresses (such as all
addresses on a specific network). When used to identify network addresses in access list statements,
wildcard masks are the exact opposite of a subnet mask. To calculate the wildcard mask:
For example, suppose you wanted to allow all traffic on network 10.12.16.0/21. To find the wildcard
mask:
Like subnet masks, wildcard masks operate at the bit level. Any bit in the wildcard mask with a 0 value
means that the bit must match to match the access list statement. A bit with a 1 value means that the
bit does not have to match. For example, let's examine the subnet address, subnet mask, and
wildcard mask in binary form for the preceding example.
Notice how the bits in the wildcard mask are exactly opposite of the bits in the subnet mask. Suppose
an access list were created with a statement as follows:
Suppose that a packet addressed to 10.12.16.15 was received. The router uses the wildcard mask to
compare the bits in the address to the bits in the subnet address.
In this example, all bits identified with a 0 in the wildcard mask must match between the address and
the network address. Any bit identified with a 1 is ignored. In this example, 10.12.16.15 matches the
access list statement and the traffic is denied.
Now suppose that a packet addressed to 10.13.17.15 was received. The router uses the wildcard
mask to compare the bits in the address to the bits in the subnet address.
Notice that this address does not match the access list statement as identified with the wildcard mask.
In this case, traffic would be permitted.
Tip: If you use a table to help you identify subnet masks, be aware that the wildcard mask value is one
less than the magic number, as shown in the following table:
Bits in the mask /25 /26 /27 /28 /29 /30 /31 /32
Magic number 128 64 32 16 8 4 2 1
Decimal mask value 128 192 224 240 248 252 254 255
Wildcard mask value 127 63 31 15 7 3 1 0
1. Create the list and list entries with the access-list command.
2. Apply the list to a specific interface or line.
o Use the ip access-group command to apply the list to an interface.
o Use the access-class command to apply the list to a line.
• The access list statement includes the access list number. The type of list (standard or
extended) is indicated by the access list number. Use the following number ranges to define
the access list:
o 1-99 = Standard IP access lists
o 100-199 = Extended IP access lists
• A single access list can include multiple access list statements. The access list number groups
all statements into the same access list.
• List statements include an action, either permit or deny.
• To identify a host address in the access list statement, use the following formats:
n.n.n.n
n.n.n.n 0.0.0.0
OR host n.n.n.n
Where n.n.n.n is the IP address of the host.
• To identify a network address, use the format:
n.n.n.n w.w.w.w
Where n.n.n.n is the subnet address and w.w.w.w is the wildcard mask.
• Enter access list statements in order, with the most restrictive statements at the top. Traffic is
matched to access list statements in the order they appear in the list. If the traffic matches a
statement high in the list, subsequent statements will not be applied to the traffic.
• Each access list has an implicit deny any statement at the end of the access list. Your access
list must contain at least one allow statement, or no traffic will be allowed.
• When you remove an access list statement, the entire access list is deleted. Use Notepad or
another text editor to construct and modify access lists, then paste the list into the router
console.
• A single access list can be applied to multiple interfaces.
• Extended access lists include a protocol designation (such as IP, TCP, or UDP). Use IP to
match any Internet Protocol (including TCP and UDP). Use other keywords to match specific
protocols.
• Newer routers include an access list command prompt mode.
o Before you can enter access list statements, you must first enter the configuration
mode for access lists. For example, typing ip access-list standard 3 creates the
standard IP address list number 3, and changes the router prompt to: Router(config-
std-nacl)#
o In access list mode, you can use a sequence number to identify the order of access
list statements.
o Removing an access list statement removes only that statement, not the entire access
list.
Examples
The following commands create a standard IP access list that permits all outgoing traffic except the
traffic from network 10.0.0.0, and applies the list to the Ethernet0 interface.
The following commands create a standard IP access list that rejects all traffic except traffic from host
10.12.12.16, and applies the list to the Serial0 interface.
The following commands create an extended IP access list that rejects packets from host 10.1.1.1
sent to host 15.1.1.1, and applies the list to the second serial interface.
The following commands create an extended IP access list that does not forward TCP packets from
any host on network 10.0.0.0 to network 11.12.0.0, and applies the list to the first serial interface.
The following commands create a standard access list that allows VTY lines 0-4 access only from the
internal network of 192.168.1.0/24:
The following list summarizes the commands to use for viewing specific access list information on the
router.
show ip int
All access lists applied to an interface show run
Rejected traffic information show log
show run
IP access lists configured on the router show ip access-lists
A carefully-designed access list provides a measure of security to both the router and any connected
networks. You can use an access list to prevent some forms of Internet attacks, or to restrict the
devices that are allowed to send packets through a router. A router that uses access lists is a form of
firewall because it allows or denies the flow of packets between networks. You can use a Cisco router
with access list statements to protect your private network from the Internet, or to protect Internet
servers from specific attacks.
After you have created an access list, you must apply it to an interface. In many cases, this means you
will need to decide which router, with port, and which direction to apply the access list to. Keep in mind
the following:
• The access list is applied to traffic with a specific direction (either in or out).
• Each interface can only have one inbound and one outbound access list for each protocol.
This means that an interface can have either a standard inbound or an extended inbound IP
access list, but not both.
• You can have two access lists for the same direction applied to an interface if the lists restrict
different networking protocols. For example, you can have one outbound IP access list and
one outbound IPX access list.
• When constructing access lists, place the most restrictive statements at the top. Traffic is
matched to access list statements in the order they appear in the list. If traffic matches a
statement high in the list, subsequent statements will not be applied to the traffic.
• Each access list has an implicit deny any statement at the end of the access list. Your access
list must contain at least one allow statement, or no traffic will be allowed.
• As a general rule, apply extended access lists as close to the source router as possible. This
keeps the packets from being sent throughout the rest of the network.
• As a general rule, apply standard access lists as close to the destination router as possible.
This is because standard access lists can only filter on source address. Placing the list too
close to the source will prevent any traffic from the source from getting to any other parts of
the network.
• When making placement decisions, carefully read all access lists statements and
requirements. Identify blocked and allowed traffic, as well as the direction that traffic will be
traveling. Place the access list on the interface where a single list will block (or allow) all
necessary traffic.
TCP/IP Ports
Network ports are logical connections, provided by the TCP or UDP protocols at the Transport layer,
for use by protocols in the upper layers of the OSI model. The TCP/IP protocol stack uses port
numbers to determine what protocol incoming traffic should be directed to. Some characteristics of
ports are listed below:
• Ports allow a single host with a single IP address to run network services. Each port number
identifies a distinct service.
• Each host can have over 65,000 ports per IP address.
• Port use is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN).
Categories Characteristics
• ICANN can assign a specific port for a newly created network service
Registered • Port numbers range from 1024 to 49151
• Assigned when a network service establishes contact and released when the
session ends
• Allows applications to 'listen' to the assigned port for other incoming requests
Dynamic (traffic for a protocol can be received through a port other than the port which
(Private or the protocol is assigned, as long as the destination application or service is
High) 'listening' for that type of traffic on that port)
• Port numbers range from 49,152 to 65,535
The following table lists the well known ports that correspond to common Internet services.
Note: When creating access lists, allow only the port numbers that correspond to the services running
on the servers.
Security Facts
Threat Description
A reconnaissance attack is exploring or probing a system to discover information
about the system. Most malicious attacks are preceded by a reconnaissance
attack. There are two types of reconnaissance attacks:
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks impact
system availability by flooding the target system with traffic or requests or by
exploiting a system or software flaw. The main purpose of a DoS attack is to
overwhelm the system to make it unavailable for legitimate use. Examples include:
Implementation Description
A firewall is a network device installed on the border of secured networks
to protect a private network from a public network or to separate one
private network from another.
Because the names of several of the tools start with anti-, Cisco uses the
term anti-x to refer to the whole of the class of security tools.
Network traffic is compared to the signature files for a match. If the traffic
does not match a known signature, it is allowed. If the traffic matches a
signature, the alert or action is triggered. One disadvantage to a signature-
based IDS is the potential for errors:
Centralized
• Remote Authentication Dial In User Service (RADIUS)
Authentication
• Terminal Access Controller Access-Control System (TACACS)
Hardening is the process of securing devices and software by reducing the security exposure and
tightening security controls. Take the following general actions to secure your devices and network:
Security
Description
Measure
Ensure physical security by keeping network devices in a locked room. If someone
Physical
can gain access to the physical Cisco device, they can easily bypass any configured
security
passwords. Passwords are useless if physical access is not controlled.
Use the following methods to secure Cisco device passwords:
• Set the enable secret password instead of the enable password. Make sure
Secure the two passwords are different.
passwords • Use the service password-encryption command to encrypt other
passwords in the configuration file. This provides a low level of security, but
passwords can be easily broken.
Use access lists to control incoming or outgoing traffic with the following criteria:
Use the banner command to provide a warning banner to users who try to log into
the router. Be aware of the following:
Use no cdp run on the device or no cdp enable on an interface to avoid sharing
CDP information about the Cisco device with neighboring devices. This helps to reduce
exposure due to reconnaissance attacks.
SSH Configuration
SSH (Secure Shell) is a secure and acceptable alternative to Telnet. SSH uses RSA public key
cryptography for both connection and authentication. Use the following commands to configure SSH
on a VTY line.
Use . . . To . . .
Example
The following commands configure SSH to accept a username of admin with a password of cisco,
allowing only SSH on lines VTY 0-4:
RouterA#config t
RouterA(config)#ip domain-name westsim.com
RouterA(config)#crypto key generate rsa
RouterA(config)#aaa new-model
RouterA(config)#username admin password cisco
RouterA(config)#line vty 0 4
RouterA(config-line)#transport input ssh
Port Security
Under normal circumstances, there are no restrictions on the devices that can be attached to a switch
port. With switch port security, the devices that can connect to a switch through the port are restricted.
• Port security uses the MAC address to identify allowed and denied devices.
• By default, port security allows only a single device to connect through a switch port. You can,
however, modify the maximum number of allowed devices.
• MAC addresses are stored in RAM in a table, and are identified with the port and by a MAC
address type. Port security uses the following three MAC address types:
Type Description
A SecureConfigured address is a MAC address that has been manually
SecureConfigured identified as an allowed address. The address is configured in interface
mode and stored in the running-config file.
A SecureDynamic address is a MAC address that has been dynamically
SecureDynamic
learned and allowed by the switch.
1. When a device connects to the switch port, its MAC address is
identified.
2. If the maximum number of allowed devices has not been
reached, its MAC address is added to the table, and use of the
port is allowed.
• A port violation occurs when the maximum number of MAC addresses has been seen on the
port, and an unknown MAC address is then seen.
• You can configure the switch to take one of the following actions when a violation occurs:
o Shut down the port. This is the default setting.
o Drop all frames from unauthorized MAC addresses.
o Drop all frames and generate an SMNP trap.
Each switch port has its own port security settings. To configure port security, take the following
general actions:
Command Function
switch(config-if)#switchport
port-security mac-address Identifies an allowed MAC address, making it a sticky
sticky h.h.h address.
Note: You cannot configure more MAC addresses for a port than the maximum allowed number. To
add more MAC addresses to an interface after the limit has been reached, increase the maximum
number first or delete existing MAC addresses. This limitation applies to MAC addresses with or
without the sticky parameter.
Examples
The following commands configure switch port security to allow only host 5ab9.0012.02af to use Fast
Ethernet port 0/12:
The following commands configures Fast Ethernet port 0/15 to accept the first MAC address it
receives as the allowed MAC address for the port:
Command Description
Shows a summary of port security settings for enabled interfaces.
Information includes:
Listed below is a sample output from the show port-security interface command:
Entry Description
Shows the enabled or the disabled state of port security.
The port status indicates the operational status of the port as viewed by port
security. A status of Secure-down could mean any of the following conditions:
A status of Secure-up indicates that the line is operational and port security is
being enforced.
Identifies the configured violation mode for the interface (shutdown, protect, or
Violation Mode
restrict).
Maximum MAC
Identifies the configured maximum number of allowed devices.
Addresses
Identifies the total number of known MAC addresses on this port. This includes all
Total MAC
addresses in the running-config file (including sticky addresses) and all dynamic
Addresses
addresses that have been learned.
Configured MAC Identifies the number of addresses configured with the switchport port-security
Addresses mac-address command (excluding sticky addresses).
Sticky MAC Identifies the number of addresses in the running-config file identified with the
Addresses switchport port-security mac-address sticky entries.
Security Identifies the number of violations detected. If this value is anything other than 1,
Violation Count then the port has already taken the action specified by the Violation Mode line.
DHCP Snooping
DHCP Snooping is available on both the Cisco Catalyst and Cisco Nexus platform switches. Both
platforms are classified as enterprise-grade switches and fully support all DHCP Snooping functions.
DHCP Snooping is considered a standard security feature and does not require any additional licensing
for the older Catalyst IOS, newer Catalyst IOS XE and Nexus NS-OS operating systems, therefore the
feature is available and readily configurable on all switches.
Examples of Cisco Catalyst switches that support DHCP Snooping are: Cisco Catalyst 2960S, 2960-
X, 3560, 3750, 3750-X, 3850, 4500, 6500, 9300, 9400 and 9500 series.
Examples of Cisco Nexus switches that support DHCP Snooping are: Nexus 2000, 3000, 5000, 7000
and 9000 series.
DHCP Snooping can be enabled globally and on a per-VLAN basis. This means you can enable it for
all VLANs (globally) or only for specific including VLAN ranges e.g VLANs 1-20 & VLANs 45-50.
DHCP Snooping is a Layer 2 security switch feature which blocks unauthorized (rogue) DHCP
servers from distributing IP addresses to DHCP clients. In fact Cisco was the first vendor to implement
DHCP Snooping as a security feature in its network switches and other vendors have since then followed
with similar features.
It is important to note that DHCP SNOOPING is an access layer protection service – it does not
belong in the core network.
The way DHCP Snooping works is fairly straight forward. DHCP Snooping categorizes all switchports
into two simple categories:
• Trusted Ports
• Untrusted Ports
A Trusted Port, also known as a Trusted Source or Trusted Interface, is a port or source whose
DHCP server messages are trusted because it is under the organization’s administrative control. For
example, the port to which your organization’s DHCP server connects to is considered a Trusted Port.
This is also shown in the diagram below:
DHCP Snooping Concepts: Trusted and Untrusted Ports
An Untrusted Port, also known as an Untrusted Source or Untrusted Interface, is a port from which
DHCP server messages are not trusted. An example on an untrusted port is one where hosts or PCs
connect to from which DHCP OFFER, DHCP ACK or DHCPNAK messages should never be seen as
these are sent only by DHCP Servers.
When enabling DHCP Snooping the switch will begin to drop specific type of DHCP traffic in order to
protect the network from rogue DHCP servers. Here is a list of the type of traffic DHCP Snooping will
drop:
• DHCP Snooping will drop DHCP messages DHCPACK, DHCPNAK, DHCPOFFER originating from a
DHCP server that is not trusted – that is, connected to an untrusted port.
• DHCP Snooping will drop DHCP messages that release or decline an offer if these messages are
not originating from the port where the original DHCP conversation was held. This stops attackers
from trying to terminate or decline a DHCP offer on behalf of the actual DHCP client.
• A DHCP relay agent forwards a DHCP packet that includes a relay-agent IP address that is not 0.0.0.0,
or the relay agent forwards a packet that includes Option 82 information to an untrusted port. For an
in-depth analysis please refer to our DHCP Option 82 article.
• DHCP Snooping will drop DHCP messages where the Source MAC address and client MAC address
are not identical (see DHCP_SNOOPING-5-DHCP_SNOOPING_MATCH_MAC_FAIL below).
When DHCP Snooping detects a violation the DHCP packet(s) triggering the event is dropped and a
message is logged in the switch’s log. The message can contain one of the following entries:
Source MAC address of an Ethernet frame and Client MAC address in the DHCP message must
always match
When DHCP Snooping is enabled it will begin to build a dynamic database containing an entry for
each untrusted host with a leased IP address if the host is associated with a VLAN that has DHCP
Snooping enabled. No entries are created for hosts connected to trusted interfaces.
As untrusted hosts are assigned IP addresses from the trusted DHCP server the switch will
automatically create new entries, update and cleanup the DHCP Snooping Binding Database.
For example, when an IP address lease expires or the switch receives a DHCPRELEASE message
from the untrusted host, it will remove the specific entry from the database. On the other hand an entry
will be created in the database if the switch sees a DHCPACK message from the trusted DHCP server
acknowledging the assignment of an IP address to an untrusted host.
The show ip dhcp snooping binding command displays all entries inside the DHCP Snooping
Binding Database:
The DHCP Snooping Binding Database is also used by other Layer2/3 security features such as
Dynamic ARP Inspection which help protect the network against ARP Poisoning & ARP Spoofing
attacks.
IP DHCP Snooping configuration for Cisco Catalyst and Cisco Nexus switching platforms will be
covered extensively in an upcoming technical article.
Dynamic ARP Inspection, ARP Poisoning, ARP Spoofing attacks will be covered in an upcoming
security article.
The DHCP Option 82, aka Relay Agent Information Option, was originally created by RFC 3046 to
allow the DHCP relay agent (e.g switch or router) to identify itself and the DHCP client that sent the
DHCP messages. DHCP Option 82 is used in large metropolitan Ethernet-access deployments where
DHCP is required to centrally manage the IP addresses for a large number of subscribers.
When DHCP Snooping is enabled on a Cisco Catalyst or Nexus switch, it will insert the Option 82 field
into the client’s DHCP message:
DHCP Snooping enabled switch inserting DHCP Option 82 into a DHCP Request
DHCP Option 82 is not often used within organizations but it does provide an additional layer of
protection if the DHCP server supports it. For example the DHCP Server on Windows Server 2012 or
2016 supports Option 82 allowing administrators to create DHCP Policies that control the assignment
of IP addresses to specific switches within the network.
Analyzing the structure of DHCP Option 82 is out of this article’s scope but will be covered in great
depth in an upcoming article.
Read our article "DHCP Option 82 Message Format, Analysis. DHCP Snooping Option 82 Injection &
Removal Method, Trusted – Untrusted Switch Ports" for in-depth analysis of DHCP Option 82.
Summary
Man-in-the-Middle attacks and network disruptions from rogue DHCP servers is a serious network
security threat organizations are faced to deal with on a daily basis. In this article we explained how
Man-in-the-Middle attacks allow attackers to gain visibility of your network and can potentially lead
exposing sensitive data flowing between servers and clients. We explained what DHCP Snooping is,
examined how DHCP Snooping works and how it can effectively protect the network from these
attacks. We looked at the type of traffic dropped by DHCP snooping, violation warnings and also
explained the purpose and operation of the DHCP Snooping Binding Database.
VPN
A Virtual Private Network (VPN) is a network that uses encryption to allow IP traffic to travel securely
over the TCP/IP network.
• A VPN uses encrypted and authenticated links that provide remote access and routed
connections between private networks or computers.
• A VPN can be used over a local area network, across a WAN connection, over the Internet,
and even between a client and a server over a dial-up connection through the Internet.
• VPNs work by using a tunneling protocol that encrypts packet contents and wraps them in an
unencrypted packet.
• Tunnel endpoints are devices that can encrypt and decrypt packets. When you create a VPN,
you establish a security association between the two tunnel endpoints. These endpoints
create a secure, virtual communication channel. Only the destination tunnel endpoint can
unwrap packets and decrypt the packet contents.
• Routers use the unencrypted packet headers to deliver the packet to the destination device.
Intermediate routers along the path cannot (and do not) read the encrypted packet contents.
Protocol Description
IPSec is a security mechanism that:
Transport Layer • Requires a digital certificate from both the client and server.
Security (TLS) • Provides security for traffic above the Transport layer.
• Does not provide security for Web traffic at the Transport layer.
PPTP is a Microsoft VPN technology that:
Cisco VPN
Type Description
Site-to-site VPNs connect entire networks to each other, for example, connecting a
branch office network to a company headquarters network.
• Traffic between the host and target site is encrypted using IPSec or Secure
Sockets Layer (SSL) technology.
Remote • The host is responsible for encapsulating and encrypting outbound traffic,
access sending it through a VPN tunnel over the Internet, to a peer VPN gateway at the
target site.
• The target VPN gateway behaves the same as site-to-site VPNs.
• Hosts using IPSec encryption need VPN client software.
• Hosts using SSL need a modern Internet browser (that includes built-in SSL
support).
• An Adaptive Security Appliance (ASA) is Cisco's security appliance that is configured for many
security functions, such as VPNs.
• Routers can provide VPN functions aside from packet forwarding, such as VPN encryption.
• PIX Firewalls are an older product line of Cisco. The firewall performs the VPN functions, as
well as firewall functions. New installations now use an ASA.
• VPN accelerator cards are PCI cards that fit in Cisco devices, such as the PIX Firewall, to
provide encryption, tunneling, and firewall functions.
• VPN concentrators are an older product line of Cisco, and provide a specific endpoint of a
VPN tunnel.
• VPN client-side software is for access VPNs. It is software installed on the individual's client to
perform the VPN functions.
• VPN client-side hardware is used to provide a VPN to multiple clients on the same device.
IPSec VPN
IPSec provides encryption for site-to-site and remote access VPNs. IPSec encrypts any traffic
supported by the IP protocol, such as Internet, e-mail, Telnet, file transfer, as well as countless others.
IPSec includes the following three protocols for authentication, data encryption, and connection
negotiation:
Protocol Description
Authentication Header (AH) provides integrity and authentication.
Note: If the VPN uses ESP, then the HMAC is not needed because the attacker
would have had to break the ESP encryption key before altering the message.
The Internet Key Exchange (IKE) negotiates the connection. As two end points
are securing an IPSec network, they have to negotiate what is called a Security
Association (SA). An inbound and outbound SA is necessary for each connection
with a remote endpoint. IKE uses the following functions:
After the parameters of the SA have been established, IPSec functions in a mode of operation based
on the relationship of the communicating devices to each other. The two IPSec modes of operation
are:
Mode Characteristics
Tunnel mode is used for site-to-site communications.
A remote access VPN can use Secure Sockets Layer (SSL) to encrypt VPN traffic. SSL encrypts the
entire communication session between the server and client. Cisco SSL VPN (also known as
WebVPN) is a technology that provides remote-access VPN capability by using the security features
that are already built into a modern Internet browser. An SSL VPN allows users from any Internet-
enabled location to launch an Internet browser to establish remote access VPN connections. There
are three modes of Cisco SSL VPNs:
Mode Description
A clientless SSL VPN (browser-based) allows a user to use any common Web browser to
securely access the internal or corporate network. This mode is useful for accessing most
content that you would expect to access in a browser, such as Web content, databases,
and online tools that employ a Web interface.
• Because SSL is already built in to the client Internet browsers, there is no setup
Clientless
required on the client side.
• The client must run the Windows 2000, Windows XP, or Linux operating system.
• Applications that cannot be accessed through a browser are not available.
Use clientless SSL VPNs when the client is a public or private computer or when the user
only needs to access Web-enabled applications.
Cisco's thin-client SSL VPN (also referred to as port forwarding) downloads a small Java-
based applet (plug-in) to the remote client which is used to secure remote access for
Transmission Control Protocol (TCP) applications.
• The remote client must allow the Java applet to download and install through the
Internet browser. This typically requires administrative privileges on the system.
• SSL tunnels can also be established using a smart tunnel. A smart tunnel does
not require installation and therefore does not require administrative privileges.
• Proxy services are an option with the thin-client mode. A proxy acts as an
intermediary between the client and the Internet, intercepting all requests to the
Internet to see if it can fulfill the request using its cache to improve performance.
If the proxy service is enabled, the Java applet acts as a TCP proxy server
through the Internet browser.
• Applications such as FTP, where the ports are negotiated dynamically cannot be
used. You can use TCP port forwarding only with applications that use static
ports, such as:
o Telnet, port 23
Thin- o Secure Shell (SSH), port 22
Client o Post Office Protocol 3 (POP3), port 110
o Internet Message Access Protocol 4 (IMAP4), port 143
o Simple Mail Transfer Protocol (SMTP), port 25
o Microsoft Outlook Express
o Lotus Notes
Use the Thin-Client SSL VPN to provide application access for applications that can be
forwarded on a specific port and to provide access to shared folders on network servers.
It typically cannot be used on a public computer because administrative privileges are
required to download the Java plug-ins.
Full tunnel mode downloads client-side VPN software to the remote workstation and
allows secure access to most IP-based applications on an internal or corporate network.
• The client software is called the AnyConnect VPN Client. Previous versions of the
client software were called the Cisco SSL VPN Client (SVC).
• The client software can be loaded on the security appliance, where it will
download and install on the client automatically as needed. It can also be
manually installed on the client prior to making the connection.
• The client software can be uninstalled automatically when the session is closed,
or it can be configured to remain on the system.
Full
• Local administrator privileges are required for the initial installation of the Cisco
Tunnel
AnyConnect VPN Client.
• AnyConnect uses TLS in addition to SSL to improve performance.
• The client software can run as a standalone application (not running in the
browser).
• The client software supports IPv6, Windows Vista, running scripts, password
caching, logon using certificates only, and drive mapping.
Use the client software for VPN access to configure a permanent client, or to provide
access to resources not allowed by the clientless or thin-client solutions (such as
Microsoft Outlook using MAPI).