cc/td/doc/product/vpn/client/3_6
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z

Index

Numerics

802.11x networks

wireless LANs 4-16

A

accessing local LAN 3-18

adapter card for network 2-2

adding

backup servers 3-23

connection entry 3-5

address

remote server

changing 3-26

VPN device 3-7

Administrator privileges 2-1

AES algorithm 1-5

algorithms

AES 1-5

authentication 1-5

DES 1-5

encryption 1-5

HMAC 1-5

MD5 1-5

SHA-1 1-5

triple-DES 1-5

Application Launcher 5-11

Are You There see AYT firewall policy

authentication

algorithms 1-5

certificate 2-2, 3-8

Entrust 3-10

features in VPN Client 1-4

information

connection status 4-25

internal server 1-4, 4-5

methods 1-4, 4-5

NT Domain 1-4

dialog box 4-6

domain name 4-7

password 4-7

username 4-7

properties

changing 3-20

RADIUS 4-5

RSA

next cardcode 4-11

passcode 4-8

PIN 4-9

username 4-8, 4-9

SDI

seeRSA

SecurID 1-4, 4-8

smart card 4-14

SoftID 1-4, 4-8

auto initiation

authenticating 4-18

changing option values 4-20

connection failures 4-22

connection profile 4-17

disabling 4-20, 5-17

disabling while suspended 4-21

disconnecting 4-19

enabling 4-21, 5-17

managing 5-16

restarting 4-21

resuming 4-19

retry interval 5-17

states 4-23

suspending 4-19

system tray icons 4-23

using 4-16

Automatic VPN Initiation option 5-16

AYT firewall policy 4-25, 4-28

B

backup servers

adding 3-23

disabling 3-24

enabling 3-23

removing 3-24

Baltimore Technologies 4-11

base 64 encoded file type 6-12

binary encoded file type 6-12

bytes in

connection statistics 4-26

bytes out

connection statistics 4-26

C

cable

connection 1-2

modem 1-2, 4-2

CA certificates 6-5

Centralized Protection Policy see CPP firewall policy

certificate

changing 3-22

changing password 6-22

completing enrollment form 6-4

connecting 4-11

deleting 6-21

enrollment

file types 6-12

PKI 4-11

with CA 6-4

Entrust 3-10

expiring 4-12

exporting 6-23

importing 6-15

managing 6-17

name 3-5, 3-8, 4-1

stores 6-3

verifying 3-10, 6-20

viewing 6-18

Certificate Authorities (CA)

CA certificates tab 6-5

certificate 2-2

supported 4-11

Certificate Manager

Options menu 6-17

overview 6-1

starting 6-2

changing

certificate 3-22

certificate password 6-22

connection entry description 3-17

connection entry properties 3-14

group name or group password 3-21

password on an enrollment request 6-28

remote server address 3-26

Cisco certificate store 6-3

classes that generate events 5-22

clearing events display 5-24

Client/Server policy

firewalls 4-25, 4-27, 4-31

Client IP address in connection status 4-24

cloning a connection entry 5-3

closing the VPN Client 4-32

common name in certificate enrollment 6-4

company in certificate enrollment 6-4

completing an enrollment request 6-29

compression algorithm

LZS compression 4-25

configuring connections automatically 5-5

connecting

before logon 5-14

to private network 4-2, 4-4

to the internet

via Dial-Up Networking 3-24

to the internet via Dial-Up Networking 4-3

with certificate 4-1

connection

LAN 1-2

network

direct 2-2

properties

changing 3-23

statistics

bytes in 4-26

bytes out 4-26

packets bypassed 4-26

packets decrypted 4-26

packets discarded 4-26

packets encrypted 4-26

resetting 4-32

status

key icon 4-27

local LAN routes list 4-27

secure associations 4-27

secured routes 4-27

time connected 4-27

transparent tunneling 4-25

viewing 4-24

technologies 1-2

connection entry

changing

remote server address 3-26

changing description 3-17

changing properties 3-14

cloning 5-3

creating 3-5

creating shortcut 5-10

definition 3-1

deleting 5-4

description 3-17

managing 5-2

optional parameters 3-14

parameters 3-1

preconfigured 3-1

profile 3-5

properties

changing 3-14

renaming 5-5

copyrights and licenses A-1

country code in certificate enrollment 6-5

CPP firewall policy 4-25, 4-29

creating

connection entry 3-5

shortcut for connection entry 5-10

D

data

formats xii

Data Encryption Standard

see DES algorithm

Dead Peer Detection

see DPD

deleting

certificate 6-21

connection entry 5-4

enrollment request 6-27

department in certificate enrollment 6-4

DES algorithm 1-5

DHCP request 1-3

DHCP traffic

stateful firewall always on 5-11

Dial-Up Networking

closing before uninstall 5-29

connecting 3-24, 4-3

dial-up modem 1-2

disabling 3-25

enabling 3-25

icon on taskbar 4-4

Microsoft 1-3

phonebook entries 3-25

programs

third party 3-26

requirement for 2-2

User Information dialog box 4-3

Digital Subscriber Line

see DSL

direct network connection 2-2

disabling

application launch before startup 5-15

automatic disconnect when logging off Windows NT 5-16

backup servers 3-24

Dial-Up Networking 3-25

local LAN access 3-18

Logon to Microsoft Network parameter 3-20

third party dial-up 3-26

disconnecting

automatic 5-16

private network 4-32

Disk icon in log viewer 5-24

displaying

help 3-1

software version 3-3

DNS

dynamic 1-3

split 1-4

documentation

cautions xii

notes xii

domain

Certificate Authority 6-7

name

certificate enrollment 6-5

NT Domain authentication 4-7

server 1-4

DPD

adjusting peer time out 3-19

keep alive mechanism

DSL

connection technology 1-2

modem 1-2, 4-2

DUN phonebook entries 3-26

E

e-mail address in certificate enrollment 6-5

enabling

auto initiation 5-17

backup servers 3-23

local LAN access 3-18

logging on to Microsoft Network 3-20

start before logon 5-14

stateful firewall 5-11

transparent tunneling 3-17

encryption

algorithms 1-5

connection status 4-25

enrolling

certificates 6-4

file request 6-11

network 6-6

in a PKI 4-11

enrollment request

changing password 6-28

completing 6-29

deleting 6-27

form 6-4

managing 6-25

pasting 6-11

resuming 6-29

viewing 6-26

Entrust

certificate

configuring 3-10

connecting with 4-12

SignOn

using with start before logon 4-14

Technologies 4-11

Erase icon in log viewer 5-24

Erase User Password option 4-6, 5-7

ESP

protocol

transparent tunneling 3-17

traffic

stateful firewall always on 5-11

etoken

connecting with 4-14

events

classes 5-22

collecting 5-19

severity levels 5-21

viewing and managing 5-17

exiting the VPN Client 4-32

exporting a certificate 6-23

F

F1 key

displaying help 3-1

features of VPN Client 1-3

file types for certificate enrollment 6-12

Filter icon in log viewer 5-20

filtering

events 5-20

firewalls 4-29

firewalls 4-30

AYT tab 4-28

Client/Server policy 4-25, 4-27, 4-31

CPP firewall policy 4-29

filtering 4-29

ICMP protocol 4-30

matching 5-26

name on general status

notifications 5-26

policies 4-25

policy listed 4-25

rules 4-29

stateful 5-11

status 4-27

status screen 4-25

support in VPN Client 1-5

tab on status screen 4-25

TCP protocol 4-30

UDP protocol 4-30

force keepalives

ESP-aware NAT 3-18

formats

data xii

G

General tab (Properties) 3-17

generating events

classes 5-22

group name for IPSec

changing 3-21

group password for IPSec

changing 3-21

H

hard disk space requirement 2-2

Hashed Message Authentication Coding

see HMAC algorithm

help

displaying 3-1

F1 key 3-1

from program menu 3-1

Help icon in log viewer 5-19

HMAC algorithm 1-5

hostname

VPN device 3-7

I

IANA protocol numbers 4-30

ICMP protocol

firewalls 4-30

icons

Dial-Up Networking 4-4

key 4-27

log viewer

Disk 5-24

Erase 5-24

Filter 5-20

Help 5-19

Printer 5-23

Search 5-22

VPN Client

viewing connection status 4-24

viewing when connected 4-16

VPN Dialer

using to disconnect 4-32

IKE Keepalives 1-4

IKE protocol 1-2

importing

certificate file 6-15

configuration 5-5

Import Password 6-16

inactivity timeout (Entrust) 4-12

installing

media requirements 2-2

installing VPN Client

InstallShield 2-3

MSI 2-5

process 2-1

interface card for network 2-2

internal server

authentication 1-4, 4-5, 4-6

internet

connecting via Dial-Up Networking 3-24, 4-3

Internet Key Management protocol

see IKE

Internet Protocol Security

see IPSec

IOS

platform devices supported x

IP address

certificate enrollment 6-5

server 4-24

VPN device 3-7

IPSec

attributes supported in VPN Client 1-5

features in VPN Client 1-4

group name 3-21

group password 3-21

over TCP 3-18

over UDP 3-18

protocol 1-2

transparent tunneling

connection status 4-25

ISDN

connection technology 1-2

modem 4-2

ISP

password 4-3

username 4-3

K

key icon

connection status 4-27

L

LAN connection 1-2

launching an application 5-11, 5-15

licenses and copyrights A-1

local LAN access 3-18

connection status 4-27

log file

printing 5-23

saving 5-24

logging on to Microsoft Network 3-20

log viewer

clearing 5-24

filtering events 5-20

icons

Disk 5-24

Erase 5-24

Filter 5-20

Help 5-19

Printer 5-23

Search 5-22

options

capture 5-19

filter 5-20

searching 5-22

LZS compression 4-25

M

maintenance dialog

MSI 2-8

managing

auto initiation 5-16

certificates 6-1, 6-17

connection entries 5-2

enrollment request 6-25

event log 5-17

matching firewall configurations 5-26

Message Digest 5 (MD5) algorithm 1-5

Microsoft

Certificate Services 4-11

certificate store 6-3

Network

logging on 3-20

Windows 2000 4-11

Windows Installer (MSI)

installing VPN Client 2-5

modems

cable 1-2, 4-2

dial-up 1-2

DSL 1-2, 4-2

ISDN 4-2

requirement 2-2

MSI 2-5

installation 2-5

removing 5-32

maintenance dialog 2-8

repair dialog 2-8

N

names

IPSec group 3-21

NAT 3-17

network

adapter or interface card 2-2

connection

direct 2-2

Network Address Translation 3-17

New Connection Entry Wizard 3-6

notifications

firewall 5-26

upgrade 5-25

VPN device 5-25

NT Domain authentication 1-4, 4-6

domain name 4-7

password 4-7

username 4-7

NT features

logon 5-14

VPN Client 1-3

O

options

Application Launcher 5-11

auto disconnect 5-16

Automatic VPN Initiation 5-16

Clone entry 5-3

Delete entry 5-4

Erase User Password 5-7

Import entry 5-5

Rename entry 5-5

Save Password 5-7

shortcut 5-10

start before logon 5-14

Stateful Firewall (Always on) 5-11

Windows

Logon Properties 5-14

Options menu 3-14

organizational unit in certificate enrollment 6-4

organization of this manual ix

P

packets

bypassed 4-26

decrypted 4-26

discarded 4-26

encrypted 4-26

parameters

connection entry 3-1

passcode

RSA authentication 4-8

passwords

enrollment request

changing 6-28

erasing 4-6, 5-7

expiration 4-7

import 6-16

internal server authentication 4-6

invalid 4-6

IPSec group

changing 3-21

ISP logon 4-3

NT Domain authentication 4-7

personal certificate 6-22

private key 4-1

RADIUS authentication 4-6

saving 4-6, 5-7

PAT 3-17

Peer Certificate Domain Name Verification 1-4

peer response timeout

adjusting 3-19

personal firewall see firewalls

phonebook entries

DUN 3-26

PIN

RSA authentication 4-9

PKCS10 format 6-12

PKIs

supported 2-2, 4-11

Plain Old Telephone Service

see POTS

port

transparent tunneling 4-25

Port Address Translation 3-17

POTS

connection technology 1-2

preconfigured connection entry 3-1

Printer icon in log viewer 5-23

printing a log file 5-23

private key password 4-1

private network

connecting 4-2, 4-4

disconnecting 4-32

privileges required for

installing VPN Client 2-1

profile

connection entry 3-5

Entrust 3-11

file

importing into VPN Client 5-5

roaming 5-16

properties

general 3-17

Properties dialog box 3-15

Protocol 50 (ESP) traffic 3-17

protocol numbers 4-30

protocols

DPD

ESP 3-17

ICMP 4-30

IKE 1-2

IPSec 1-2, 3-18

TCP 3-17, 4-30

UDP 3-17, 4-30

Public Key Infrastructure

see PKIs

Q

quitting the VPN Client 4-32

R

RADIUS authentication

password 4-6

procedure 4-5

username 4-6

RAM requirements 2-2

reconfiguring automatically 5-5

remote access connection

closing before uninstall 5-29

Remote Authentication Dial-In User Service

see RADIUS authentication

remote server

changing address 3-26

removing

backup servers 3-24

the VPN Client

InstallShield 5-29

removing a client configuration

the VPN Client

MSI 5-32

renaming a connection entry 5-5

repair dialog

MSI 2-8

requirements

system 2-1

resetting connection statistics 4-32

restarting your computer after installation 2-4

resuming an enrollment request 6-29

retry interval

auto initiation 5-17

roaming profiles 5-16

RSA (formerly SDI)

authentication 1-4, 4-8

Next Cardcode 4-11

passcode 4-8

PIN 4-9

rules

firewalls 4-29

S

Save Password option 4-6, 5-7

saving a log file 5-24

SCEP (Cisco store) 6-3

SDI

see RSA

Search icon in log viewer 5-22

searching log file 5-22

secure associations 4-27

secured routes

connection status 4-27

key icon 4-27

secure gateway

address 3-7

notifications to client 5-25

Secure Hash Algorithm

see SHA-1 algorithm

SecurID authentication 1-4, 4-8

Server IP address

connection status 4-24

setting or changing connection entry properties 3-14

Severity levels in events 5-21

SHA-1 algorithm 1-5

shortcut

creating for connection entry 5-10

Simple Certificate Enrollment Protocol

see SCEP

smart card

connecting with 4-14

connection entry

configuring 3-11

products supported 3-12

SoftID authentication 1-4, 4-8

software license agreement A-1

software token applications

launching from VPN Dialer 5-11

split DNS 1-4

split tunneling 1-4

start before logon

configuring 5-14

using with Entrust SignOn 4-14

starting the VPN Dialer

connecting to private network 3-5, 4-2

using a shortcut 5-10

stateful firewall

always on 5-11

DHCP traffic 5-11

transparent tunneling 3-17

state in certificate enrollment 6-4

statistics

connection time 4-27

local LAN routes 4-27

packet 4-26

secured routes 4-27

status

firewall 4-27

stopping the VPN Dialer 4-32

stores

certificate 6-3

system requirements 2-1

T

TCP/IP requirement 2-2

TCP protocol

firewalls 4-30

transparent tunneling 3-17

third party dail-up program 3-26

time connected

connection status 4-27

transparent tunneling

enabling 3-17

port 4-25

stateful firewall 3-17

triple-DES algorithm 1-5

tunnel

definition 1-2

negotiation 4-4

transparent 3-17

U

UDP protocol

firewalls 4-30

transparent tunneling 3-17

UniCERT 4-11

uninstalling the VPN Client

InstallShield 5-29

MSI 5-32

upgrade notification 5-25

upgrading VPN Client software

using InstallShield 5-27

using MSI 5-29

URL or Network Address of CA 6-7

user authentication 1-4, 4-5

see also authentication

username

internal server authentication 4-6

ISP logon 4-3

NT Domain authentication 4-7

RADIUS authentication 4-6

RSA authentication 4-8, 4-9

V

verifying a certificate 3-10, 6-20

version

VPN Client

displaying 3-3

viewing

certificate 6-18

connection status 4-24

enrollment request 6-26

Virtual Private Network (VPN)

defined 1-1

VPN

defined 1-1

VPN Client

applications 1-1

event log 5-17

features 1-3

installing 2-1

software updates 5-27, 5-29

version 3-3

VPN Client version 3.6

removing 2-8

VPN Concentrator

see VPN device

VPN device

authentication using internal server 4-5

backup 3-23

changing address 3-26

Cisco 1-1

DPD 3-19

hostname 3-7

IP address 3-7

notifications 5-25

VPN Dialer

closing 4-32

main dialog box 3-6

W

Windows

NT logon properties 5-14

platforms requirement 2-1

username and password 3-20

wizard

connection entry 3-6

WLANs

auto initiation 4-16

X

X.509 DER file 6-12

Z

Zone Labs Integrity 4-25, 4-27, 4-31


hometocprevnextglossaryfeedbacksearchhelp

Posted: Mon Apr 18 07:53:41 PDT 2005
All contents are Copyright © 1992--2005 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.