• I had a client this week ask me how to re-skin and customize the Cisco AnyConnect client for their employees so I decided to share this with you, my blog readers, as well. As we know, the Cisco AnyConnect client allows users to connect to their corporate offices via the SSL VPN. When you install …   Read More

  • I have to deviate from our latest discussion track to bring up some exciting news in NAC world. This past week Cisco decided to release NAC 4.6 (it also just so happens to be Cisco...

  • Internet connectivity is available almost anywhere you travel today. Airports, schools, restaurants, bookstores and coffee shops offer easy access. Using this convenient access to connect to your organization’s network resources using a VPN connection is...

  • Over the last few months, I have had some of my students share with me their frustration about how much there is to study and learn in their path to CCNA certification. As you know...

  • Global Knowledge instructor, and author on this blog, Jim Thomas reviews the top three Cisco Security technologies found in standard networks: the MARS appliance, Cisco Security Manager, and the NAC appliance.

  • Today we live in the era of the mobile workforce. With PDAs, cell phones and Laptops with cellular links to the Internet we are never truly out of touch. We can email, text, Facebook and...

  • In our last blog series we discussed multiple access commands that can be configured on a router or a switch. These commands included cosmetic commands such as logging synchronous and exec-timeout that can be configured on the console port. We also discussed configuring security features such as banners that can be used for legal purposes. …   Read More

  • As I sit here 34,000 feet up in the air right now, I’m deciding to deviate slightly from the NAC discussion and bring up something very new and interesting, namely changes with Cisco Security Products....

  • When we last left off we were discussing a Cisco NAC Framework scenario using a router. We had discussed the required configuration on the ACS server with ACLs and Attribute Definition Files. But we cannot just get away with only configuring the ACS server and NADs. You must also think about the hosts themselves. Our …   Read More

  • According to an article published in the New York Times on March 28, 2009, there is a rather large spy system at work that has targeted government organizations and private businesses around the world. The...