Software:Cisco Systems VPN Client

From HandWiki
Revision as of 23:42, 27 November 2021 by imported>AstroAI (add)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Cisco Systems VPN Client
Cisco Systems VPN Client screenshot.png
Cisco VPN Client on Windows 7
Developer(s)Cisco Systems
Stable release
  • Windows: 5.0.07.0440[1] / March 15, 2011; 13 years ago (2011-03-15)
  • macOS: 4.9.01.0180[2] / February 5, 2009; 15 years ago (2009-02-05)
Preview release
4.9.01.0230 for Mac / July 27, 2010; 14 years ago (2010-07-27)
Operating systemWindows, Mac OS X 10.4 and 10.5, Solaris UltraSPARC, Linux (Intel)[3]
Size
  • x86: 7.63 MB
  • x64: 4.78 MB
Available inEnglish
TypeVPN software
LicenseProprietary
Websitewww.cisco.com/c/en/us/products/security/vpn-endpoint-security-clients/index.html

Cisco Systems VPN Client is a software application for connecting to virtual private networks based on Internet Key Exchange version 1.

On July 29, 2011, Cisco announced the end of life of the product. No further product updates were released after July 30, 2012, and support ceased on July 29, 2014.[4] The Support page with documentation links was taken down on July 30, 2016, replaced with an Obsolete Status Notification.[5]

Availability and compatibility

The software is not free but is often installed on university and business computers in accordance with a site-license. As with most corporate licenses, administrators are allowed to freely distribute the software to users within their network.

The open-source vpnc client can connect to most VPNs supported by the official client.

VPN Client 4.9.01.0230 beta added support for Mac OS X 10.6.[6] Stable version 4.9.01.0180 appears to lack that support; 4.9.00.0050 explicitly did not support versions of Mac OS X later than 10.5.[7]

VPN Client 5.0.07.0290 added support for 64-bit versions of Windows Vista and Windows 7.[8]

Security

The client uses profile configuration files (.pcf) that store VPN passwords either hashed with type 7, or stored as plaintext. A vulnerability has been identified,[9] and those passwords can easily be decoded using software or online services.[10] To work around these issues, network administrators are advised to use the Mutual Group Authentication feature, or use unique passwords (that aren't related to other important network passwords).[9]

See also

  • Cisco ASA, the product line that replaced Cisco VPN Concentrator on the server side

References