May 06

Cisco IPSEC VPN Client for Windows 10 – Painful Experience

As most of you know the Cisco IPSEC VPN Client is not officially supported on Windows 8+. I have Window 10, now that puts me in the not so friendly basket. After googling this, there a raft of blogs and websites advising you to install additional components and modify registry settings.. Not all of which are proven. I finally found a sequence that worked for me.. AND successfully connected to customer sites.

First thing is to get around this virtual adapter filter thing that doesn’t get installed with Windows 10.. The SonicWall VPN Client however does install the ‘DNE Lightweight filter network client’. Beautiful.. Job done.

Link to Sonicwall website for vpn client. http://help.mysonicwall.com/applications/vpnclient/

If the above link is not available and you cannot find it anyway.. Ping me and I’ll email it to you.

Right. Lets install the Cisco IPSEC VPN Client now.. No wait another error.. ‘This software doesn’t support Windows 10′, great. To get around this one.. Extract the install files and manually run the .msi file. Job done.

Now the client is installed and we are away and running.. Try to connect to a customer site and low and behold another error.. ‘Secure VPN Connection terminated locally by the client. Reason 442: Failed to enable Virtual Adapter.’ we are getting closer though right?

Here comes the infamous registry change.. Now I’ll add the general blurb that everyone would say… ‘Backup your registry settings in case you absolutely blunder this change’. Now lets get started.

Open registry and go to HKLM\SYSTEM\CurrentControlSet\Services\CVirtA look for the key ‘Display Name’. We want to modify this key from something like this ‘@oem47.inf,%CVirtA_Desc%;Cisco Systems VPN Adapter for 64-bit Windows‘ to ‘Cisco Systems VPN Adapter for 64-bit Windows‘ (screen shot below of change).

Cisco IPSEC VPN Client

Now open the VPN Client again and try connecting to a customer site.. Whola! Job is now done. Thanks Internet.

May 07

Deploying Ironport Cisco Web Security Virtual Appliance

Prerequisites

  • Download OVF file from Cisco.com. Use a CCO login that has access to the WSA download section.
  • Ensure you have received a PAK License ID from Cisco. This should have been received via email
  • Generate a License file from cisco.com/go/license

Installing Ironport Cisco Web Security Virtual Appliance

  1. Log into your VMware VCentre Console. Deploy OVF file

2.   Browse to OVF file location

2

3.   Specify Name for the Device. Eg vWSA-01

4.   Specify the Datastore to install the Device.

5.   Select ‘Thin Provision’. Default is Thick provision, this will consume 1TB of data, includes whitespace.

5

6.   Map the Network to the correct Port Groups.

6

7.   Power on the VM

8.   Default username and password

U: admin

P: ironport

9.   Set the Time on the vWSA

Settime

MM/DD/YYYY HH:MM:SS

10.   Commit changes. Commit cmd

11.   Copy license to vWSA. FTP to vWSA device and browse to the ‘Configuration’ Directory. Copy the license.xml to this directory.

12.   Upload License. SSH to the vWSA device. Type ‘loadlicense’ select option 2 to upload from xml file.

12

13.   Accept License Agreement

14.   Browse to the GUI. https:// 192.168.0.2:8443 or http://192.168.0.2:8080

15.   Run System Setup Wizard via the System Menu.

15a

15b

15c

15d

15e

15f

15g

15h

16.   Click ‘Install this Configuration’ to complete the setup wizard.

This is just the initial install steps for Ironport. I’ll write up some more posts on Ironport configuration in the future. There are a lot of variations to the configuration.