|
Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z
Index
Numerics
802.11x networks
wireless LANs 4-16
A
accessing local LAN 3-18
adapter card for network 2-2
adding
backup servers 3-23
connection entry 3-5
address
remote server
changing 3-26
VPN device 3-7
Administrator privileges 2-1
AES algorithm 1-5
algorithms
AES 1-5
authentication 1-5
DES 1-5
encryption 1-5
HMAC 1-5
MD5 1-5
SHA-1 1-5
triple-DES 1-5
Application Launcher 5-11
Are You There see AYT firewall policy
authentication
algorithms 1-5
Entrust 3-10
features in VPN Client 1-4
information
connection status 4-25
NT Domain 1-4
dialog box 4-6
domain name 4-7
password 4-7
username 4-7
properties
changing 3-20
RSA
next cardcode 4-11
passcode 4-8
PIN 4-9
SDI
smart card 4-14
auto initiation
authenticating 4-18
changing option values 4-20
connection failures 4-22
connection profile 4-17
disabling while suspended 4-21
disconnecting 4-19
managing 5-16
restarting 4-21
resuming 4-19
retry interval 5-17
states 4-23
suspending 4-19
system tray icons 4-23
using 4-16
Automatic VPN Initiation option 5-16
AYT firewall policy 4-25, 4-28
B
backup servers
adding 3-23
disabling 3-24
enabling 3-23
removing 3-24
Baltimore Technologies 4-11
base 64 encoded file type 6-12
binary encoded file type 6-12
bytes in
connection statistics 4-26
bytes out
connection statistics 4-26
C
cable
connection 1-2
CA certificates 6-5
Centralized Protection Policy see CPP firewall policy
certificate
changing 3-22
changing password 6-22
completing enrollment form 6-4
connecting 4-11
deleting 6-21
enrollment
file types 6-12
PKI 4-11
with CA 6-4
Entrust 3-10
expiring 4-12
exporting 6-23
importing 6-15
managing 6-17
stores 6-3
viewing 6-18
Certificate Authorities (CA)
CA certificates tab 6-5
certificate 2-2
supported 4-11
Certificate Manager
Options menu 6-17
overview 6-1
starting 6-2
changing
certificate 3-22
certificate password 6-22
connection entry description 3-17
connection entry properties 3-14
group name or group password 3-21
password on an enrollment request 6-28
remote server address 3-26
Cisco certificate store 6-3
classes that generate events 5-22
clearing events display 5-24
Client/Server policy
Client IP address in connection status 4-24
cloning a connection entry 5-3
closing the VPN Client 4-32
common name in certificate enrollment 6-4
company in certificate enrollment 6-4
completing an enrollment request 6-29
compression algorithm
LZS compression 4-25
configuring connections automatically 5-5
connecting
before logon 5-14
to the internet
via Dial-Up Networking 3-24
to the internet via Dial-Up Networking 4-3
with certificate 4-1
connection
LAN 1-2
network
direct 2-2
properties
changing 3-23
statistics
bytes in 4-26
bytes out 4-26
packets bypassed 4-26
packets decrypted 4-26
packets discarded 4-26
packets encrypted 4-26
resetting 4-32
status
key icon 4-27
local LAN routes list 4-27
secure associations 4-27
secured routes 4-27
time connected 4-27
transparent tunneling 4-25
viewing 4-24
technologies 1-2
connection entry
changing
remote server address 3-26
changing description 3-17
changing properties 3-14
cloning 5-3
creating 3-5
creating shortcut 5-10
definition 3-1
deleting 5-4
description 3-17
managing 5-2
optional parameters 3-14
parameters 3-1
preconfigured 3-1
profile 3-5
properties
changing 3-14
renaming 5-5
copyrights and licenses A-1
country code in certificate enrollment 6-5
CPP firewall policy 4-25, 4-29
creating
connection entry 3-5
shortcut for connection entry 5-10
D
data
formats xii
Data Encryption Standard
Dead Peer Detection
deleting
certificate 6-21
connection entry 5-4
enrollment request 6-27
department in certificate enrollment 6-4
DES algorithm 1-5
DHCP request 1-3
DHCP traffic
stateful firewall always on 5-11
Dial-Up Networking
closing before uninstall 5-29
dial-up modem 1-2
disabling 3-25
enabling 3-25
icon on taskbar 4-4
Microsoft 1-3
phonebook entries 3-25
programs
third party 3-26
requirement for 2-2
User Information dialog box 4-3
Digital Subscriber Line
direct network connection 2-2
disabling
application launch before startup 5-15
automatic disconnect when logging off Windows NT 5-16
backup servers 3-24
Dial-Up Networking 3-25
local LAN access 3-18
Logon to Microsoft Network parameter 3-20
third party dial-up 3-26
disconnecting
automatic 5-16
private network 4-32
Disk icon in log viewer 5-24
displaying
help 3-1
software version 3-3
DNS
dynamic 1-3
split 1-4
documentation
cautions xii
notes xii
domain
Certificate Authority 6-7
name
certificate enrollment 6-5
NT Domain authentication 4-7
server 1-4
DPD
adjusting peer time out 3-19
DSL
connection technology 1-2
DUN phonebook entries 3-26
E
e-mail address in certificate enrollment 6-5
enabling
auto initiation 5-17
backup servers 3-23
local LAN access 3-18
logging on to Microsoft Network 3-20
start before logon 5-14
stateful firewall 5-11
transparent tunneling 3-17
encryption
algorithms 1-5
connection status 4-25
enrolling
certificates 6-4
file request 6-11
network 6-6
in a PKI 4-11
enrollment request
changing password 6-28
completing 6-29
deleting 6-27
form 6-4
managing 6-25
pasting 6-11
resuming 6-29
viewing 6-26
Entrust
certificate
configuring 3-10
connecting with 4-12
SignOn
using with start before logon 4-14
Technologies 4-11
Erase icon in log viewer 5-24
Erase User Password option 4-6, 5-7
ESP
protocol
transparent tunneling 3-17
traffic
stateful firewall always on 5-11
etoken
connecting with 4-14
events
classes 5-22
collecting 5-19
severity levels 5-21
viewing and managing 5-17
exiting the VPN Client 4-32
exporting a certificate 6-23
F
F1 key
displaying help 3-1
features of VPN Client 1-3
file types for certificate enrollment 6-12
Filter icon in log viewer 5-20
filtering
events 5-20
firewalls 4-29
firewalls 4-30
AYT tab 4-28
Client/Server policy 4-25, 4-27, 4-31
CPP firewall policy 4-29
filtering 4-29
ICMP protocol 4-30
matching 5-26
notifications 5-26
policies 4-25
rules 4-29
stateful 5-11
status 4-27
status screen 4-25
support in VPN Client 1-5
tab on status screen 4-25
TCP protocol 4-30
UDP protocol 4-30
force keepalives
ESP-aware NAT 3-18
formats
data xii
G
General tab (Properties) 3-17
generating events
classes 5-22
group name for IPSec
changing 3-21
group password for IPSec
changing 3-21
H
hard disk space requirement 2-2
Hashed Message Authentication Coding
help
displaying 3-1
F1 key 3-1
from program menu 3-1
Help icon in log viewer 5-19
HMAC algorithm 1-5
hostname
VPN device 3-7
I
IANA protocol numbers 4-30
ICMP protocol
firewalls 4-30
icons
Dial-Up Networking 4-4
key 4-27
log viewer
Disk 5-24
Erase 5-24
Filter 5-20
Help 5-19
Printer 5-23
Search 5-22
VPN Client
viewing connection status 4-24
viewing when connected 4-16
VPN Dialer
using to disconnect 4-32
IKE Keepalives 1-4
IKE protocol 1-2
importing
certificate file 6-15
configuration 5-5
Import Password 6-16
inactivity timeout (Entrust) 4-12
installing
media requirements 2-2
installing VPN Client
InstallShield 2-3
MSI 2-5
process 2-1
interface card for network 2-2
internal server
internet
connecting via Dial-Up Networking 3-24, 4-3
Internet Key Management protocol
Internet Protocol Security
IOS
platform devices supported x
IP address
certificate enrollment 6-5
server 4-24
VPN device 3-7
IPSec
attributes supported in VPN Client 1-5
features in VPN Client 1-4
group name 3-21
group password 3-21
over TCP 3-18
over UDP 3-18
protocol 1-2
transparent tunneling
connection status 4-25
ISDN
connection technology 1-2
modem 4-2
ISP
password 4-3
username 4-3
K
key icon
connection status 4-27
L
LAN connection 1-2
launching an application 5-11, 5-15
licenses and copyrights A-1
local LAN access 3-18
connection status 4-27
log file
printing 5-23
saving 5-24
logging on to Microsoft Network 3-20
log viewer
clearing 5-24
filtering events 5-20
icons
Disk 5-24
Erase 5-24
Filter 5-20
Help 5-19
Printer 5-23
Search 5-22
options
capture 5-19
filter 5-20
searching 5-22
LZS compression 4-25
M
maintenance dialog
MSI 2-8
managing
auto initiation 5-16
connection entries 5-2
enrollment request 6-25
event log 5-17
matching firewall configurations 5-26
Message Digest 5 (MD5) algorithm 1-5
Microsoft
Certificate Services 4-11
certificate store 6-3
Network
logging on 3-20
Windows 2000 4-11
Windows Installer (MSI)
installing VPN Client 2-5
modems
dial-up 1-2
ISDN 4-2
requirement 2-2
MSI 2-5
installation 2-5
removing 5-32
maintenance dialog 2-8
repair dialog 2-8
N
names
IPSec group 3-21
NAT 3-17
network
adapter or interface card 2-2
connection
direct 2-2
Network Address Translation 3-17
New Connection Entry Wizard 3-6
notifications
firewall 5-26
upgrade 5-25
VPN device 5-25
NT Domain authentication 1-4, 4-6
domain name 4-7
password 4-7
username 4-7
NT features
logon 5-14
VPN Client 1-3
O
options
Application Launcher 5-11
auto disconnect 5-16
Automatic VPN Initiation 5-16
Clone entry 5-3
Delete entry 5-4
Erase User Password 5-7
Import entry 5-5
Rename entry 5-5
Save Password 5-7
shortcut 5-10
start before logon 5-14
Stateful Firewall (Always on) 5-11
Windows
Logon Properties 5-14
Options menu 3-14
organizational unit in certificate enrollment 6-4
organization of this manual ix
P
packets
bypassed 4-26
decrypted 4-26
discarded 4-26
encrypted 4-26
parameters
connection entry 3-1
passcode
RSA authentication 4-8
passwords
enrollment request
changing 6-28
expiration 4-7
import 6-16
internal server authentication 4-6
invalid 4-6
IPSec group
changing 3-21
ISP logon 4-3
NT Domain authentication 4-7
personal certificate 6-22
private key 4-1
RADIUS authentication 4-6
PAT 3-17
Peer Certificate Domain Name Verification 1-4
peer response timeout
adjusting 3-19
personal firewall see firewalls
phonebook entries
DUN 3-26
PIN
RSA authentication 4-9
PKCS10 format 6-12
PKIs
Plain Old Telephone Service
port
transparent tunneling 4-25
Port Address Translation 3-17
POTS
connection technology 1-2
preconfigured connection entry 3-1
Printer icon in log viewer 5-23
printing a log file 5-23
private key password 4-1
private network
disconnecting 4-32
privileges required for
installing VPN Client 2-1
profile
connection entry 3-5
Entrust 3-11
file
importing into VPN Client 5-5
roaming 5-16
properties
general 3-17
Properties dialog box 3-15
Protocol 50 (ESP) traffic 3-17
protocol numbers 4-30
protocols
ESP 3-17
ICMP 4-30
IKE 1-2
Public Key Infrastructure
Q
quitting the VPN Client 4-32
R
RADIUS authentication
password 4-6
procedure 4-5
username 4-6
RAM requirements 2-2
reconfiguring automatically 5-5
remote access connection
closing before uninstall 5-29
Remote Authentication Dial-In User Service
remote server
changing address 3-26
removing
backup servers 3-24
the VPN Client
InstallShield 5-29
removing a client configuration
the VPN Client
MSI 5-32
renaming a connection entry 5-5
repair dialog
MSI 2-8
requirements
system 2-1
resetting connection statistics 4-32
restarting your computer after installation 2-4
resuming an enrollment request 6-29
retry interval
auto initiation 5-17
roaming profiles 5-16
RSA (formerly SDI)
Next Cardcode 4-11
passcode 4-8
PIN 4-9
rules
firewalls 4-29
S
saving a log file 5-24
SCEP (Cisco store) 6-3
SDI
Search icon in log viewer 5-22
searching log file 5-22
secure associations 4-27
secured routes
connection status 4-27
key icon 4-27
secure gateway
address 3-7
notifications to client 5-25
Secure Hash Algorithm
SecurID authentication 1-4, 4-8
Server IP address
connection status 4-24
setting or changing connection entry properties 3-14
Severity levels in events 5-21
SHA-1 algorithm 1-5
shortcut
creating for connection entry 5-10
Simple Certificate Enrollment Protocol
smart card
connecting with 4-14
connection entry
configuring 3-11
products supported 3-12
SoftID authentication 1-4, 4-8
software license agreement A-1
software token applications
launching from VPN Dialer 5-11
split DNS 1-4
split tunneling 1-4
start before logon
configuring 5-14
using with Entrust SignOn 4-14
starting the VPN Dialer
connecting to private network 3-5, 4-2
using a shortcut 5-10
stateful firewall
always on 5-11
DHCP traffic 5-11
transparent tunneling 3-17
state in certificate enrollment 6-4
statistics
connection time 4-27
local LAN routes 4-27
packet 4-26
secured routes 4-27
status
firewall 4-27
stopping the VPN Dialer 4-32
stores
certificate 6-3
system requirements 2-1
T
TCP/IP requirement 2-2
TCP protocol
firewalls 4-30
transparent tunneling 3-17
third party dail-up program 3-26
time connected
connection status 4-27
transparent tunneling
enabling 3-17
port 4-25
stateful firewall 3-17
triple-DES algorithm 1-5
tunnel
definition 1-2
negotiation 4-4
transparent 3-17
U
UDP protocol
firewalls 4-30
transparent tunneling 3-17
UniCERT 4-11
uninstalling the VPN Client
InstallShield 5-29
MSI 5-32
upgrade notification 5-25
upgrading VPN Client software
using InstallShield 5-27
using MSI 5-29
URL or Network Address of CA 6-7
username
internal server authentication 4-6
ISP logon 4-3
NT Domain authentication 4-7
RADIUS authentication 4-6
V
verifying a certificate 3-10, 6-20
version
VPN Client
displaying 3-3
viewing
certificate 6-18
connection status 4-24
enrollment request 6-26
Virtual Private Network (VPN)
defined 1-1
VPN
defined 1-1
VPN Client
applications 1-1
event log 5-17
features 1-3
installing 2-1
version 3-3
VPN Client version 3.6
removing 2-8
VPN Concentrator
VPN device
authentication using internal server 4-5
backup 3-23
changing address 3-26
Cisco 1-1
DPD 3-19
hostname 3-7
IP address 3-7
notifications 5-25
VPN Dialer
closing 4-32
main dialog box 3-6
W
Windows
NT logon properties 5-14
platforms requirement 2-1
username and password 3-20
wizard
connection entry 3-6
WLANs
auto initiation 4-16
X
X.509 DER file 6-12
Z
Posted: Mon Apr 18 07:53:41 PDT 2005
All contents are Copyright © 1992--2005 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.