|
|
This chapter describes how to use the VPN 5000 Client. For an overview of the software user interface, see "VPN 5000 Client User Interface."
This section describes the operation procedures for the Windows and Mac OS VPN 5000 Clients. The operation under these platforms is virtually identical, except where indicated in the text.
This section describes how to set up a login if your administrator has not already done so.
For an administrator to pre-configure a login, see "Network Administrator's Guide."
To set up your own login configuration:
The VPN Client window opens.
Step 2 Click the Configuration tab.
Step 3 Click the Add button.
The Login Properties window opens.
Step 4 Enter the login name assigned by your network administrator.
Step 5 Enter the IP address or domain name of the VPN 5000 Concentrator that you will be logging into.
For information regarding other entry fields in the Login Properties window, see the "Login Properties Window" section.
Step 6 Click OK.
This section describes how to set up a digital certificate during the login.
The VPN Client window opens with the Configuration tab forward.
Step 2 Click on the Add button
The Login Properties opens.
Step 3 Select the Login Method.
Step 4 Enter your Login Name.
Step 5 Enter Primary and Secondary server information.
For information on the Advanced button or using NAT, see the "Login Properties Window" section.
Step 6 Connect to the server as described in the following section.
Use the Certificates tab on the VPN Client window to manage certificates used in the Manual logon method. For more information on managing your certificates, see the "Certificates Tab" section.
You can connect to the VPN 5000 Concentrator after startup and login, or you can connect to the concentrator before logging into your domain (Windows only), which is available only after you connect to the corporate network.
To establish tunnel sessions after startup:
The VPN Client window opens.
.
Step 2 On the Configuration tab, select a login name.
Step 3 Click the Connect button.
If you are logging in for the first time, or if the VPN Group configuration in your server requires it, the Prompt for Secret window opens.
Step 4 Respond to any security prompts, if required.
Your configuration might require you to respond to one or more of the following security prompts:
For more information on security prompts, see "VPN 5000 Client User Interface."
Step 5 Click OK.
If the connection is successful, a person icon appears next to the login name for Windows, and a black dot appears next to the selected login name for Mac OS, and a connection message appears at the bottom of the window.
![]() |
Note When the VPN 5000 Client is connected, only traffic destined for authorized remote networks are tunneled as designated by the configuration in the VPN 5000 concentrator. All other Internet traffic follows normal routing. |
To connect before logging into your domain:

![]() |
Caution For Windows NT, do not type Ctrl-Alt-Del to log on to your computer until the VPN Client Connect window appears or you may lose your connection. The VPN Client is the last service on the Windows NT bootup. |
Step 2 Click one of the following buttons to connect to the VPN server:
If the phonebook button is grayed out, you do not have Remote Access Service (RAS) installed. Contact your administrator if you want to have this option available.
When the Client connection is established, log on to the network as usual.
The Configuration file contains information on passwords, security features, IP addresses and connection protocols. A configuration file is automatically generated each time you exit the client and saved in the same folder where the installer resides.
The name and location of the configuration file is listed below.
To edit the configuration file, see "Network Administrator's Guide."
If you are converting an old configuration file to a new one, you will be asked to overwrite the existing file. If you are the only user of your configuration file, you can answer Yes.
If other users with different logins use the same configuration file, you should answer No and give the file a new name. There is only one configuration file per machine, but multiple logins can use the same configuration file.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Tue Jun 20 14:42:11 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.