Aallow Cisco VPN Client through comodo firewall
Deselect the COMODO
Internet security firewall driver from the Cisco AnyConnect Secure Mobility
Client Connection network adapter. To do this:
·
From the Control
Panel, open the Network and Internet option and then open Network
and Sharing Center.
·
From the left-hand
menu, open Change adapter settings, right-click on Cisco VPN
Client Connection and then select Properties.
·
Now deselect the
Comodo driver and click OK.
Following this
procedure will allow VPN traffic flow through but it will not offer any
protection from the Comodo Firewall.
Go to the Firewall section,
and click the Network Security
Policy. Under Application Rules there
should be 3 entries related to the Cisco VPN Client:
- ppptool.exe
- vpngui.exe
- cvpnd.exe
Make sure these 3 points to your Cisco folder and make them Trusted. This allows the Cisco VPN Client access through the Firewall and sets up the encrypted tunnels properly (IKE and IPSec).
In the Defense+ section, Computer Security Policy, make sure these 3 files have the same Trusted level:
- vpngui.exe
- ipsecdialer.exe
- cvpnd.exe
- ppptool.exe
- vpngui.exe
- cvpnd.exe
Make sure these 3 points to your Cisco folder and make them Trusted. This allows the Cisco VPN Client access through the Firewall and sets up the encrypted tunnels properly (IKE and IPSec).
In the Defense+ section, Computer Security Policy, make sure these 3 files have the same Trusted level:
- vpngui.exe
- ipsecdialer.exe
- cvpnd.exe
You will need the following ports and exceptions set:
Open UDP Port 62515 in your firewall.
Open TCP Port 10000 and UDP 4500 in your firewall.
Add Cisco VPN IPSecDialer and VPNGUI to the firewall
exception list. The path to the files are:
C:\Program Files\Cisco Systems\VPN Client\ipsecdialer.exe
C:\Program Files\Cisco Systems\VPN Client\vpngui.exe
Comentarios
Publicar un comentario
Dime si la información de este blog te sirvio.