|
wireless LANs 5-14
accessing local LAN 4-8
adapter card for network 2-2
backup servers 4-9
connection entry 4-2
VPN device 4-3
Administrator privileges 2-1
AES (Advanced Encryption Standard) 1-7
aggressive mode 1-6
data compression 1-7
encryption 1-7
Application Launcher 7-2
Are You There see AYT firewall policy
algorithms 1-6
Entrust 4-5
extended 1-7
connection status 5-21
internal server 5-5
methods 5-4
mode 1-7
dialog box 5-5
domain name 5-6
password 5-6
username 5-6
RADIUS 5-5
next cardcode 5-9
passcode 5-7
PIN 5-7
username 5-7
SecurID 5-6
smart card 5-12
SoftID 5-6
authenticating 5-16
changing option values 5-18
connection failures 5-20
connection profile 5-15
disabling while suspended 5-19
disconnecting 5-18
managing 7-6
restarting 5-19
resuming 5-17
retry interval 7-6
suspending 5-17
using 5-14
Automatic VPN Initiation option 7-6
AYT (Are You There) firewall policy 5-24
AYT firewall policy 5-24, 5-25
adding 4-9
disabling 4-11
enabling 4-9
removing 4-10
Baltimore Technologies 5-9
base 64 encoded file type 6-6
binary encoded file type 6-6
connection 1-2
CA certificates 6-3
Centralized Protection Policy (CPP) firewall policy 5-24
Centralized Protection Policy see CPP firewall policy
changing password 6-13
completing enrollment form 6-3
connecting 5-9
deleting 6-13
file types 6-6
PKI 5-10
with CA 6-3
Entrust 4-5
expiring 5-10
exporting 6-14
importing 6-10
managing 6-8
peer 1-5
stores 6-2
verifying 6-12
viewing 6-9
CA certificates tab 6-3
certificate 2-2
supported 5-9
overview 6-1
certificate password 6-13
password on an enrollment request 6-17
Cisco certificate store 6-2
classes that generate events 7-12
clearing events display 7-14
Client IP address in connection status 5-21
closing the VPN Client 5-29
common name in certificate enrollment 6-4
company in certificate enrollment 6-4
completing an enrollment request 6-18
LZS compression 5-22
before logon 7-4
via Dial-Up Networking 4-11
to the internet via Dial-Up Networking 5-3
with certificate 5-1
LAN 1-2
direct 2-2
packets bypassed 5-22
packets decrypted 5-22
packets discarded 5-22
packets encrypted 5-22
resetting 5-29
local LAN routes list 5-23
secure associations 5-23
transparent tunneling 5-22
viewing 5-20
technologies 1-2
creating 4-2
preconfigured 4-1
profile 4-2
connection types 1-2
copyrights and licenses 1
country code in certificate enrollment 6-4
CPP firewall policy 5-24, 5-26
connection entry 4-2
formats xii
data compression 1-7
certificate 6-13
enrollment request 6-17
department in certificate enrollment 6-4
DHCP request 1-4
stateful firewall always on 7-2
closing before uninstall 7-18
dial-up modem 1-2
disabling 4-12
enabling 4-12
icon on taskbar 5-4
phonebook entries 4-12
third party 4-12
User Information dialog box 5-3
Diffie-Hellman groups 1-7
direct network connection 2-2
application launch before startup 7-5
automatic disconnect when logging off Windows NT 7-5
backup servers 4-11
Dial-Up Networking 4-12
local LAN access 4-8
third party dial-up 4-12
automatic 7-5
private network 5-29
help 3-12
software version 3-12
DNS server 1-4
cautions xii
notes xii
certificate enrollment 6-4
NT Domain authentication 5-6
adjusting peer time out 4-9
connection technology 1-2
DUN phonebook entries 4-12
e-mail address in certificate enrollment 6-4
auto initiation 7-6
backup servers 4-9
local LAN access 4-8
logging on to Microsoft Network 4-6
start before logon 7-4
stateful firewall 7-1
transparent tunneling 4-7
connection status 5-21
encryption algorithm 1-7
certificates 6-3
file request 6-6
in a PKI 5-10
changing password 6-17
completing 6-18
deleting 6-17
form 6-3
managing 6-15
pasting 6-6
viewing 6-16
configuring 4-5
connecting with 5-10
using with start before logon 5-12
Technologies 5-9
Erase User Password option 5-5
transparent tunneling 4-7
stateful firewall always on 7-2
connecting with 5-12
classes 7-12
setting logging levels 7-11
severity levels 7-12
viewing and managing 7-7
exiting the VPN Client 5-29
exporting a certificate 6-14
extended authentication 1-7
displaying help 3-12
IPSec 1-6
program 1-3
VPN Client 1-2
file types for certificate enrollment 6-6
events 7-11
firewalls 5-26
firewalls 5-27
AYT policy 5-24
AYT tab 5-25
Client/Server policy 5-24, 5-28
configured on concentrator 5-24
CPP 5-24
CPP firewall policy 5-26
filtering 5-26
ICMP protocol 5-27
listed on Firewall tab 5-24
matching 7-15
notifications 7-15
policies 5-24
policy listed 5-24
rules 5-26
stateful 7-1
status 5-25
status screen 5-24
tab on status screen 5-24
TCP protocol 5-27
UDP protocol 5-27
data xii
classes 7-12
hard disk space requirement 2-2
displaying 3-12
F1 key 3-12
from program menu 3-12
VPN device 4-3
IANA protocol numbers 5-27
firewalls 5-27
Dial-Up Networking 5-4
viewing when connected 5-14
IKE keepalives 1-6
IKE protocol 1-2
certificate file 6-10
inactivity timeout (Entrust) 5-10
media requirements 2-2
InstallShield 2-3
MSI 2-4
process 2-1
interface card for network 2-2
authentication 5-5
connecting via Dial-Up Networking 4-11, 5-3
Internet Key Management protocol
platform devices supported x
certificate enrollment 6-4
server 5-21
VPN device 4-3
attributes 1-6
features 1-6
over TCP 4-8
over UDP 4-8
protocol 1-2
connection status 5-22
connection technology 1-2
modem 5-3
password 5-4
username 5-4
keepalives 1-6
LAN connection 1-2
launching an application 7-2, 7-5
licenses and copyrights 1
connection status 5-23
clearing 7-14
saving 7-13
searching 7-13
filtering events 7-11
logging levels 7-11
LZS compression 5-22
main mode 1-6
MSI 2-7
main VPN Client window 3-3
auto initiation 7-6
enrollment request 6-15
event log 7-7
matching firewall configurations 7-15
connection entries 3-5
main 3-4
Certificate Services 5-10
certificate store 6-2
Windows 2000 5-10
installing VPN Client 2-4
aggressive 1-6
authentication 1-7
configuration 1-7
tunnel encapsulation 1-7
dial-up 1-2
ISDN 5-3
requirement 2-2
MSI 2-4
installation 2-4
maintenance dialog 2-7
repair dialog 2-7
MTU size 1-3
NAT 4-7
NAT Transparency 1-3
adapter or interface card 2-2
direct 2-2
Network Address Translation 4-7
firewall 7-15
upgrade 7-15
VPN device 7-14
NT Domain authentication 5-5
domain name 5-6
password 5-6
username 5-6
logon 7-4
Application Launcher 7-2
auto disconnect 7-5
Automatic VPN Initiation 7-6
start before logon 7-4
Stateful Firewall (Always on) 7-1
Logon Properties 7-3
Options menu 4-7
organizational unit in certificate enrollment 6-4
organization of this manual ix
bypassed 5-22
decrypted 5-22
discarded 5-22
encrypted 5-22
RSA authentication 5-7
changing 6-17
erasing 5-5
expiration 5-6
internal server authentication 5-5
invalid 5-5
ISP logon 5-4
NT Domain authentication 5-6
personal certificate 6-13
private key 5-1
RADIUS authentication 5-5
saving 5-5
PAT 4-7
peer certificate 1-5
adjusting 4-9
personal firewall see firewalls
DUN 4-12
RSA authentication 5-7
PKCS10 format 6-6
Port Address Translation 4-7
connection technology 1-2
preconfigured connection entry 4-1
private key password 5-1
disconnecting 5-29
installing VPN Client 2-1
connection entry 4-2
Entrust 4-5
roaming 7-6
program features 1-3
protocol 1-2
Protocol 50 (ESP) traffic 4-7
protocol numbers 5-27
ESP 4-7
ICMP 5-27
IKE 1-2
quitting the VPN Client 5-29
password 5-5
procedure 5-5
username 5-5
RAM requirements 2-2
closing before uninstall 7-18
backup servers 4-10
InstallShield 7-18
MSI 2-7
system 2-1
resetting connection statistics 5-29
restarting your computer after installation 2-4
auto initiation 7-6
roaming profiles 7-6
authentication 5-6
Next Cardcode 5-9
passcode 5-6
PIN 5-7
firewalls 5-26
Save Password option 5-5
saving a log file 7-13
SCEP (Cisco store) 6-2
searching log file 7-13
secure associations 5-23
address 4-3
notifications to client 7-14
SecurID authentication 5-6
connection status 5-21
setting logging levels 7-11
Severity levels in events 7-12
Simple Certificate Enrollment Protocol
connecting with 5-12
configuring 4-5
products supported 4-5
SoftID authentication 5-6
software license agreement 1
launching from VPN Dialer 7-2
split tunneling 1-6
configuring 7-4
using with Entrust SignOn 5-12
connecting to private network 4-2, 5-2
always on 7-1
DHCP traffic 7-2
transparent tunneling 4-7
state in certificate enrollment 6-4
local LAN routes 5-23
firewall 5-25
stopping the VPN Dialer 5-29
certificate 6-2
system requirements 2-1
TCP/IP requirement 2-2
firewalls 5-27
transparent tunneling 4-7
third party dial-up program 4-12
transparent tunneling 1-6
enabling 4-7
stateful firewall 4-7
definition 1-2
negotiation 5-4
transparent 4-7
encapsulation mode 1-7
protocol 1-3
split 1-6
firewalls 5-27
transparent tunneling 4-7
UniCERT 5-9
InstallShield 7-18
upgrade notification 7-15
using InstallShield 7-16
using MSI 7-17
user authentication 1-3, 1-5, 5-4
internal server authentication 5-5
ISP logon 5-4
NT Domain authentication 5-6
RADIUS authentication 5-5
RSA authentication 5-7
verifying a certificate 6-12
displaying 3-12
certificate 6-9
connection status 5-20
enrollment request 6-16
defined 1-1
defined 1-1
applications 1-1
event log 7-7
features 1-2
installing 2-1
menus 3-4
version 3-12
window 3-3
removing 2-7
authentication using internal server 5-5
backup 4-9
Cisco 1-1
DPD 4-9
hostname 4-3
IP address 4-3
notifications 7-14
closing 5-29
main dialog box 4-2
NT logon properties 7-3
platforms requirement 2-1
auto initiation 5-14
X.509 DER file 6-6
XAUTH (extended authentication) 1-7
Zone Labs Integrity 5-24, 5-28
Posted: Tue Apr 8 09:46:08 PDT 2003
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.