Tuesday, October 19, 2010

Cisco Security Certificates Mechanism And Its Aspects

Security is always been the major concern for most of the people and there were numerous researches on improving the security. Cryptography has been a major area of research for most of the scientists. Network security is an indispensable part. Customers need to trust the network in order to use it. Thus the users of the network must be well guarded with privacy and security. Confidentiality and integrity must be maintained in order to make people use a network. Cisco security certificates mechanism and its aspects certificates deals with security aspects of a network. In order to authenticate network devices digital certificates are greatly used and they play a major role in authenticating users in a network and one can use it between the network nodes to negotiate IPSec sessions. There are three different ways in which a Cisco device recognizes itself in the network.



Best Cisco CCNA Training, Cisco CCNA Certification and more at certkingdom.com




The first one is the preshared keys, where two or more devices have same shared secret key and this is used by the peers for authentication. They compute a data and send it in order to authenticate themselves.

The receiver is expected to create the same hash and this does not depend on the preshared key. It is based on the concept of using the same secret in order to build trust. This method looks very similar to olden ways of communication and it is not very scalable.

The other popular method include self-signed certificate where a device is used for this purpose. It generates own certificate and takes ownership of it and signs it to be valid. One has to use this certificate in a limited manner. A very good example which illustrates the usage of this certificate is SSH. One can also find HTTPS access to be a good example and what it requires is all a username and a password. This is the primary requirement in order to establish a connection. One must be aware of the reloading of the persistent self-signed certificates which has the ability to survive reloads. It has the ability to be store in non-volatile RAM. This factor makes it to be persistent. SSl VPN is an excellent example for persistent SSI which has got a nonvolatile RAM. Another popular certificate is the certificate authority in which a third party is used for the validation process. He is used to authenticate the parties that are trying to communicate. Each party is given with a public and a private key.

The public key is employed for the encryption process and the private key is used with the decryption process. Since they are using the certificates, which were generated from the same source they are given assurance of the identities. In order to obtain the digital certificate one can use the ASA device. This is used to obtain the certificate from the third party.

One has to undergo an enrollment process and this can either be a manual or an automatic enrollment process. This method and the digital certificate is based on third party product and the certificate service is vendor based. One has to contact the vendor to obtain more information on this. One or more pre-shared keys are used with Cisco Adaptive security or third parties are involved in providing digital certificates which are used in the authentication of IPSec. Self-signed digital certificates can also be produced which are used with SSH, HTTPS.

The Cisco Adaptive Security Device Manager also uses this for its connections to the device. One can refer the document in order to understand the procedures for obtaining a digital certificate. This document does not include the procedure for the method of enrollment. One can find the use of ASDM and also the final command-line interface in the document.

One can refer various examples in order to get better enlightenment about the things in the Cisco IOS platform. A popular example includes the IOS certificate enrollment. One can also refer to related examples in order to understand about VPN 3000 series.

One must make sure the following rules are satisfied before proceeding to configuration.

Configure your window server.

Then make sure your server support Cisco axa pix version 7. 0

If required install extra dll files, in order to run the Cisco axa in window server.

Try to get the add-on dll as exe extension. These help you to add your Cisco application easily with the window server.

Make sure the date and time zone is configured properly in the window server.

Modules involved

Cisco asa with recent version should be used.

Cisco adaptive manager version should be minimum 5. 0

Window server should contain its certificate to ensure ability to run the program properly.

Added modules – This configuration also used in Cisco pix series also.

Step by step procedure to configure Asdm.

Click on Asdm application panel to choose configuration button.

Try to choose device manager from driver menu.

Enter the domain and the host name properly.

Then after configuration, click the save button.

Configure asa with proper time and date, and make sure the time setting is correct and matches with their time zones. To do the above configuration login in to ntp server.

Click the application panel, choose clock under device administration.

You can now able to see the calendar, choose the correct date and time in the calendar. Click the save button and close the window.

Now let us see how to configure the asa.

In the application panel, choose key pair under the certificate option.

Click add button, you get a pop up that asks you to fill the key name and size of key name.

Click generate key now and close the window.

Let us see the steps to add the network under trust worthy option in server.

Click on application panel and click add.

Here click the edit trustworthy configuration.

Fill the available key pair and give the related Microsoft URL address for the key used in server.

Let us see the steps to configure control retrieval methods.

Make sure you uncheck the directory access protocol.

Enable the simple http protocol by just putting check mark in check box.

Click save button and close it.

Friday, October 15, 2010

CompTIA IT Study Around The UK – News

In today’s high speed society, support workers who are able to solve problems with computers and networks, along with giving regular solutions to users, are essential in all areas of the business environment. Our country’s need for better qualified personnel is enhanced, as human beings become ever more dependent on computers in today’s environment.



Best Cisco CCNA Training, Cisco CCNA Certification and more at certkingdom.com



Watch out that all certifications you’re studying for are commercially relevant and are bang up to date. Training companies own certificates are not normally useful in gaining employment. If your certification doesn’t come from a company like Microsoft, CompTIA, Adobe or Cisco, then chances are it will have been a waste of time – as it’ll be an unknown commodity.

Review the points below and pay great regard to them if you believe that over-used sales technique about ‘guaranteeing’ exams sounds like a benefit to the student:

You’re paying for it somehow. You can be assured it’s not a freebie – they’ve simply charged more for the whole training package. If you want to qualify first ‘go’, then the most successful route is to avoid exam guarantees and pay when entering exams, give it the priority it deserves and apply yourself as required.

Isn’t it outrageous to have to pay the training college in advance for examinations? Go for the best offer at the time, instead of paying any mark-up – and take it closer to home – instead of miles away at the college’s beck and call. A lot of extra profit is made by many companies that incorporate exam fees into the cost of the course. For quite legitimate reasons, a number of students don’t get to do their exams but no refunds are given. Surprising as it sounds, there are training companies who actually bank on it – and that’s how they increase their profits. In addition to this, ‘Exam Guarantees’ often aren’t worth the paper they’re written on. Most companies won’t pay for you to re-take until you’ve completely satisfied them that you’re ready this time.

Spending hundreds or even thousands extra on an ‘Exam Guarantee’ is foolish – when study, commitment and preparing with good quality mock and practice exams is what will really see you through.

Commercially accredited qualifications are now, without a doubt, already replacing the more academic tracks into IT – so why is this? With 3 and 4 year academic degree costs becoming a tall order for many, and the industry’s increasing awareness that key company training is often far more commercially relevant, there has been a great increase in CISCO, Adobe, Microsoft and CompTIA accredited training programmes that create knowledgeable employees at a fraction of the cost and time involved. University courses, for example, clog up the training with vast amounts of background study – and a syllabus that’s too generalised. Students are then prevented from getting enough core and in-depth understanding on a specific area.

It’s a bit like the TV advert: ‘It does what it says on the tin’. All an employer has to do is know what they need doing, and then advertise for someone with the specific certification. Then they know that anyone who applies can do the necessary work.

Potential trainees looking to build an Information Technology career usually have no idea of what route is best, or even what market to achieve their certification in. Consequently, if you’ve got no background in the IT sector, how are you equipped to know what a particular IT employee actually does day-to-day? Let alone decide on what accreditation path is the most likely for ultimate success. To work through this, there should be a discussion of a number of definitive areas:

* Your personality type as well as your interests – what kind of working tasks you like and dislike.

* Is your focus to obtain training because of a specific motive – i.e. are you pushing to work based at home (being your own boss?)?

* Is the money you make further up on your priority-list than some other areas.

* Because there are so many ways to train in the IT industry – it’s wise to pick up some key facts on what differentiates them.

* Having a proper look at how much time and effort that you’re going to put into it.

At the end of the day, the most intelligent way of covering these is from a long chat with someone that understands the market well enough to give you the information required.