cc/td/doc/product/aggr/vpn5000/5000sw/conc52x
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

index

index

Symbols


/bits subnet masks   D -3

Numerics


100BaseT, setting   3 -6

10BaseT, setting   3 -6

3DES   6 -2

A


ACE/Server, configuration   8 -11

address range   D -5

AppleTalk routing   12 -1

apply command   2 -4

authentication
SecurID   8 -9
tunnel   6 -1
VPN user list   8 -2
VPN users   8 -1

AUX port   2 -2

Axent Defender
concentrator configuration   8 -4
overview   8 -3
server configuration   8 -8

B


bits subnet masks   D -3

C


CA
description   10 -2
requesting a server certificate   10 -9

caution, description   xi

Certificate Authority
description   10 -2
requesting a server certificate   10 -9

certificate generator. See CG

certificates
details   10 -12
installing on concentrator   10 -10
overview   10 -2
PEM format   10 -10
removing   10 -11
root
creating on CG   10 -4
distributing from CG   10 -5
server
CG's own   10 -6
request   10 -7
verifying   10 -11

Certificates section   10 -3

CG
enabling   10 -3
root certificate
creating   10 -4
distributing   10 -5
server certificate
CG's own   10 -6
requesting   10 -9

Class A addresses   D -1

Class B addresses   D -1

Class C addresses   D -1

command hierarchy   C -5

command line
accessing   2 -1
privileges   C -1
prompts   C -2

command types   C -4

comments, in a configuration   C -7

concentrator name, setting   3 -1

configuration
copying   A -2
erasing   B -3
examples   14 -1
formatting   C -5
name   A -3
size   A -2

configuration, erasing   B -3

configure command   C -4

connections
console   2 -2
maximum VPN   1 -1
Telnet   2 -2

console
connection   2 -2
toggle logging messages   3 -4

conventions
document   xi
syntax   C -1

D


default
gateway   5 -2
IP address   2 -2
password   2 -2
section values   3 -6

Defender. See Axent Defender

deleting a keyword   2 -5

DES   6 -2

details, certificates   10 -12

device name, setting   3 -1

Diffie-Hellman group   6 -2

digital certificates. See certificates

DNS
concentrator   3 -2
VPN group   7 -3

document conventions   xi

domain name server
concentrator   3 -2
VPN group   7 -3

Domain Name Server section   3 -2

dotted decimal subnet masks   D -3

downloading
software   A -1
text configuration   A -2

dynamic routing protocols   5 -4

E


edit config command   C -4

embedded software, installing   A -1

enabled mode   C -1

erasing
configuration   B -3
OS and configuration   B -3

Ethernet
duplex   3 -6
protocol   3 -6

Ethernet 0 port   4 -3

Ethernet 1 port   4 -1

Ethernet Interface section   3 -6

example configurations   14 -1

F


failure, software   B -1

features   1 -1

firewall
cabling behind   4 -3
cabling in front   4 -1

firewall, configuring for VPN   4 -4

firmware, installing   A -1

Flash memory
erasing configuration   B -3
erasing OS and configuration   B -3

format
PEM   10 -10
PKCS #7   10 -5
syntax   C -3
text configuration   C -5
X.509   10 -5

full duplex, setting   3 -6

G


gateway   5 -2

General section   3 -1

generic partner for LAN-to-LAN tunnels   9 -5

GRE tunnels   9 -4

groups, VPN   7 -1

H


half duplex, setting   3 -6

hosts, subnet masks for   D -3

I


ICMP requests, VPN-only port   4 -2

IKE
Phase 1   6 -1
Phase 2
LAN-to-LAN tunnel   9 -4
VPN groups   7 -4

IKE Policy section   6 -1

installing
certificates on concentrator   10 -10
software   A -1
text configuration   A -2

interfaces
Ethernet   3 -6
primary   5 -1
sub-interfaces   5 -1

interoperating with third party equipment for LAN-to-LAN tunnels   9 -6

introduction   1 -1

IP
dynamic routing protocols
OSPF   5 -6
RIP   5 -5
routing   5 -2

IP address
classes   D -1
default   2 -2
overview   D -1
private   D -2
RADIUS assignment   8 -9
range with subnet mask   D -5
remote tunnel users   7 -2, 7 -3
setting   5 -2

IPsec LAN-to-LAN tunnel   9 -2

IP section   5 -2

IPX
RADIUS address assignment   8 -9
remote users network   7 -3
routing   11 -1

K


key exchange   6 -2

keyword, deleting   2 -5

L


LAN-to-LAN tunnels
generic partner   9 -5
GRE   9 -4
IPsec   9 -2
overview   9 -1
protocols   9 -9
third party equipment   9 -6

levels, logging   3 -5

logging
enabling   3 -4
levels   3 -5
toggle console   3 -4

Logging section   3 -4

M


management   1 -2

management commands   C -4

maximum
VPN connections   1 -1
VPN groups   7 -1

MD5   6 -2

memory
erasing configuration   B -3
erasing OS and configuration   B -3

modes, privileges   C -1

N


normal mode   C -1

note, description   xi

O


OS, erasing   B -3

OSPF, configuring   5 -6

P


password
allowing default   B -3
default   2 -2
setting   3 -1

PEM format   10 -10

ping   4 -2

PKCS #7 certificates   10 -5

PKI certificates. See certificates

port
Ethernet 0   4 -3
Ethernet 1   4 -1
sub-interfaces   5 -1
VPN-only   4 -1

primary interface   5 -1

private networks   D -2

privileges   C -1

prompts   C -2

protocols
dynamic routing   5 -4
LAN-to-LAN tunnels   9 -9
tunneling   1 -1
VPN remote access   1 -2

R


RADIUS
concentrator configuration   8 -4
IP address assignment   8 -9
IPX address assignement   8 -9
overview   8 -3
server configuration   8 -8
shared secret   8 -8

recovery   B -1

removing certificates   10 -11

requesting a server certificate   10 -7

RIP, configuring   5 -5

root certificate
creating on CG   10 -4
distributing from CG   10 -5
installing on concentrator   10 -10

routes
dynamic   5 -4
static   5 -7

routing
AppleTalk   12 -1
dynamic protocols   5 -4
IP   5 -2
IPX   11 -1

runtime commands   C -4

S


save command   2 -4

saving   2 -4

section, default values   3 -6

SecurID
concentrator configuration   8 -10
overview   8 -9
server configuration   8 -11

server certificate
CG's own   10 -6
installing on concentrator   10 -10
requesting from a CG   10 -9
verifying   10 -11

SHA   6 -2

shared secret, RADIUS   8 -8

site-to-site tunnels. See LAN-to-LAN tunnels

software
erasing   B -3
failure   B -1

static routes   5 -7

sub-interfaces   5 -1

subnet masks
/bits   D -3
address range   D -5
dotted decimal   D -3
number of hosts   D -3
overview   D -2

switch settings   B -2

syntax
conventions   C -1
formatting   C -3

T


Telnet to concentrator   2 -2

Test switch settings   B -2

text configuration
copying   A -2
formatting   C -5
name   A -3

TFTP
software   A -1

third party equipment, interoperating for LAN-to-LAN tunnels   9 -6

time, setting   3 -2

Time Server section   3 -2

traceroute   4 -2

traffic, VPN   4 -1

troubleshooting   B -1

tunneling
authentication   6 -1
protocols   1 -1

Tunnel Partner section   9 -2

U


user list   8 -2

V


VPN
connections   1 -1
groups   7 -1
overview   1 -4
protocols   1 -2
traffic   4 -1
tunnel authentication   6 -1
user authentication   8 -1
user list   8 -2

vpn5001.cfg configuration file   A -3

VPN Group section   7 -1

VPN-only port
ICMP requests   4 -2
using   4 -1

VPN User section   8 -2

W


write command   2 -4

X


X.509 root certificate   10 -5

hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Sep 27 09:58:23 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.