Solved

Cisco RVS-4000

Posted on 2014-01-21
6
774 Views
Last Modified: 2016-03-23
HI,

I have a bunch of locations using Cisco's RVS-4000 most of them with 1.3.3.5 firmware on it.

Knowing that this router is now discontinued and replaced by the Cisco RV-180 which I dislike and also that the DHS National Cyber Security Division release a bulletin stating "The Cisco WAP4410N access point with firmware through 2.0.6.1, WRVS4400N router with firmware 1.x through 1.1.13 and 2.x through 2.0.2.1, and RVS4000 router with firmware through 2.0.3.2 allow remote attackers to read credential and configuration data, and execute arbitrary commands, via requests to the test interface on TCP port 32764, aka Bug IDs CSCum37566, CSCum43693, CSCum43700, and CSCum43685."
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0659

Can anybody recommend a better router to replace the RVS400 ?

Thanks in advance;

RM
0
Comment
Question by:RODRIGOMORCAL
  • 4
  • 2
6 Comments
 
LVL 92

Expert Comment

by:John Hurst
ID: 39799576
I use a Cisco RV220w in my home office. It is a good wireless router, fast internally, supports N cards reliably and is easy to use.

It is the successor to the RV180 but it is a good successor.

.... Thinkpads_User
0
 
LVL 1

Author Comment

by:RODRIGOMORCAL
ID: 39804169
Thanks for the reply, im not looking for a Wireless device, at the end what im trying to accomplish is to secure my network as much as i can.
0
 
LVL 92

Accepted Solution

by:
John Hurst earned 500 total points
ID: 39804365
Thank you for the clarification.

In my home office network, I use a Cisco RV042G router as my main wired router. My Cisco RV220W is attached to the RV042G.

The RV042G is a fast, gigabit VPN router that is easily secured and great for site-to-site tunnels if you need that. Even without tunnels it is a nice, fast and stable router. It is easy to manage (in my opinion). It is certainly worth a look.

.... Thinkpads_User
0
Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

 
LVL 1

Author Comment

by:RODRIGOMORCAL
ID: 39808247
Can you tell me what make you pick this router, what you see in this router that you couldn't find in any other, why u just stay with the Cisco RV220W doesn't cover both?

Thanks

RM
0
 
LVL 92

Expert Comment

by:John Hurst
ID: 39808548
The Cisco RV042G is a strong, fast, reliable VPN router and the cost is reasonable.  

I always keep a separate wireless router so as not to have all functions in one box.

.... Thinkpads_User
0
 
LVL 92

Expert Comment

by:John Hurst
ID: 39875251
@RODRIGOMORCAL - Thanks and I was happy to help.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Any tablets immune to viruses? 11 113
Forticlients not registering to Fortigate 3 123
Cyber Security Requirements 6 106
Email Gateway Reccomnedations 4 80
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
How important is it to take extra precautions to protect your online business? These are some steps you can take to make sure you're free of any cyber crime.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now