cc/td/doc/product/vpn/vpn3000/3_6
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Preface
Audience
Prerequisites
Organization
Related Documentation
Conventions
Obtaining Documentation
Obtaining Technical Assistance

Preface


The VPN Concentrator provides an HTML-based graphic interface, called the VPN Concentrator Manager, that allows you to configure, administer, and monitor your device easily. The VPN Concentrator Manager has three sets of screens that correspond to these tasks: Configuration screens, Administration screens, and Monitoring screens.

VPN 3000 Series Concentrator Reference Volume I: Configuration is the first in the two volume VPN 3000 Series Concentrator Reference. Together, both volumes document all the screens of the VPN Concentrator Manager.

This manual contains only configuration information. It contains no information about administering or monitoring the VPN Concentrator. For administration or monitoring information, refer to VPN 3000 Series Concentrator Reference Volume II: Administration and Monitoring.

This manual also contains no information about installing the VPN Concentrator and initially configuring it. For information about set-up and initial configuration, refer to the VPN 3000 Series Concentrator Getting Started.

Audience

We also assume you are an experienced system administrator or network administrator with appropriate education and training, who knows how to install, configure, and manage internetworking systems. However, virtual private networks and VPN devices might be new to you. You should be familiar with Windows system configuration and management, and you should be familiar with Microsoft Internet Explorer or Netscape Navigator or Communicator browsers.

Prerequisites

We assume you have read the VPN 3000 Series Concentrator Getting Started manual, set up your VPN Concentrator, and followed the minimal configuration steps in quick configuration.

Organization

The chapters and sections of this guide correspond to the Configuration part of the VPN Concentrator Manager table of contents (the left frame of the Manager browser window) and are in the same order they appear there.

This guide is organized as follows:

Chapter Title Explains How To...

Chapter 1

Using the VPN Concentrator Manager

Log in, navigate, and use the VPN Concentrator Manager with a browser. It explains both HTTP and HTTPS browser connections, and how to install the SSL certificate for a secure (HTTPS) connection.

Chapter 2

Configuration

Access the Configuration screens.

Chapter 3

Interfaces

Configure the VPN Concentrator Ethernet interfaces, and how to configure the system power supply and voltage sensor alarms.

Chapter 4

System Configuration

Access the System Configuration screens.

Chapter 5

Servers

Configure the VPN Concentrator to communicate with and access servers for user authentication, user accounting, converting host names to IP addresses (DNS), assigning client IP addresses (DHCP), and network time synchronization (NTP).

Chapter 6

Address Management

Configure the client IP addresses available in your private network addressing scheme to let the client function as a VPN tunnel endpoint.

Chapter 7

Tunneling Protocols

Configure system-wide parameters for PPTP and L2TP, how to configure IPSec LAN-to-LAN connections, and how to configure IKE proposals for IPSec. These are the three most popular VPN tunneling protocols.

Chapter 8

IP Routing

Configure static routes, default gateways, and OSPF in the VPN Concentrator IP routing subsystem; how to configure DHCP global parameters; and how to configure redundant systems using VRRP.

Chapter 9

Management Protocols

Configure built-in VPN Concentrator servers that provide management functions: FTP, HTTP and HTTPS, TFTP, Telnet, SNMP, and SSL.

Chapter 10

Events

Configure how the system handles events such as alarms, traps, error conditions, network problems, task completion, or status changes. You can specify several ways to record and send event messages.

Chapter 11

General

Configure the system identification, date, time, and maximum session limit.

Chapter 12

Client Update

Configure the VPN Concentrator to manage, from a central location, distribution of software and firmware updates to VPN 3002 hardware clients deployed in diverse locations.

Chapter 13

Load Balancing Cisco VPN Clients

Configure two or more VPN Concentrators to share their remote access session loads.

Chapter 14

User Management

Configure groups and users with attributes that determine their access to and use of the VPN. Configuring groups and users correctly is essential for managing the security of your VPN.

Chapter 15

Policy Management

Configure network lists, filters, rules, and Security Associations, all of which are policies that govern what data traffic can flow through the VPN. You should develop and configure policies first, since you apply them to groups, users, and interfaces. This chapter also describes NAT configuration.


Note   This guide is the first volume of the complete VPN Concentrator Manager reference. It documents only configuration tasks. For information on administering or monitoring your VPN Concentrator, refer to the VPN 3000 Series Concentrator Reference Volume II: Administration and Monitoring.

Related Documentation

Refer to the following documents for further information about Cisco VPN applications and products.

VPN 3000 Series Concentrator Documentation

The VPN 3000 Series Concentrator Reference Volume II: Administration and Monitoring provides guidelines for administering and monitoring the VPN Concentrator. It explains and defines all functions available in the Administration and Monitoring screens of the VPN Concentrator Manager. Appendixes to this manual provide troubleshooting guidance and explain how to access and use the alternate command-line interface.

The VPN Concentrator Manager also includes online help that you can access by clicking the Help icon on the toolbar in the Manager window.

The VPN 3000 Series Concentrator Getting Started manual takes you from unpacking and installing the VPN 3000 Series Concentrator, through configuring the minimal parameters to make it operational (called quick configuration).

VPN Client Documentation

The VPN Client User Guide explains how to install, configure, and use the VPN Client, which lets a remote client use the IPSec tunneling protocol for secure connection to a private network through the VPN Concentrator.

The VPN Client Administrator Guide tells how to configure a VPN 3000 Concentrator for remote user connections using the VPN Client, how to automate remote user profiles, how to use the VPN Client command-line interface, and how to get troubleshooting information.

VPN 3002 Hardware Client Documentation

The VPN 3002 Hardware Client Reference provides details on all the functions available in the VPN 3002 Hardware Client Manager. This manual is online only.

The VPN 3002 Hardware Client Getting Started manual provides information to take you from unpacking and installing the VPN 3002, through configuring the minimal parameters to make it operational (called Quick Configuration). This manual is available only online.

The VPN 3002 Hardware Client Quick Start Card summarizes the information for quick configuration. This quick reference card is provided with the VPN 3002 and is also available online.

The VPN 3002 Hardware Client Basic Information sticky label summarizes information for quick configuration. It is provided with the VPN 3002 and you can also print it from the online version; you can affix the label to the VPN 3002.

Documentation on VPN Software Distribution CDs

The VPN 3000 Series Concentrator and VPN 3002 Hardware Client documentation are provided on the VPN 3000 Concentrator software distribution CD-ROM in PDF format. The VPN Client documentation is included on the VPN Client software distribution CD-ROM, also in PDF format. To view the latest versions on the Cisco web site, click the Support icon on the toolbar at the top of the VPN Concentrator Manager, Hardware Client Manager, or Client window. To open the documentation, you need Acrobat Reader 3.0 or later; version 4.5 is included on the Cisco VPN 3000 Concentrator software distribution CD-ROM and on the VPN Client software distribution CD-ROM.

Other References

Other useful references include:

Conventions

This document uses the following conventions:

Convention Description

boldface font

Commands and keywords are in boldface.

italic font

Arguments for which you supply values are in italics.

screen font

Terminal sessions and information the system displays are in screen font.

boldface screen font

Information you must enter is in boldface screen font.

^

The symbol ^ represents the key labeled Control. For example, the key combination ^D in a screen display means hold down the Control key while you press the D key.

Notes use the following conventions:


Note   Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.

Tips use the following conventions:


Tip Means the following are useful tips.

Cautions use the following conventions:


Caution   Means reader be careful. Cautions alert you to actions or conditions that could result in equipment damage or loss of data.

Warnings use the following conventions:


Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, you must be aware of the hazards involved with electrical circuitry and familiar with standard practices for preventing accidents.

Data Formats

As you configure and manage the system, enter data in the following formats unless the instructions indicate otherwise:

Type of Data Format

IP Addresses

IP addresses use 4-byte dotted decimal notation (for example, 192.168.12.34); as the example indicates, you can omit leading zeros in a byte position.

Subnet Masks and Wildcard Masks

Subnet masks use 4-byte dotted decimal notation (for example, 255.255.255.0). Wildcard masks use the same notation (for example, 0.0.0.255); as the example illustrates, you can omit leading zeros in a byte position.

MAC Addresses

MAC addresses use 6-byte hexadecimal notation (for example, 00.10.5A.1F.4F.07).

Host names

Host names use legitimate network host name or end-system name notation (for example, VPN01). Spaces are not allowed. A host name must uniquely identify a specific system on a network.

Text Strings

Text strings use upper- and lower-case alphanumeric characters. Most text strings are case-sensitive (for example, simon and Simon represent different usernames). In most cases, the maximum length of text strings is 48 characters.

Filenames

Filenames on the VPN Concentrator follow the DOS 8.3 naming convention: a maximum of eight characters for the name, plus a maximum of three characters for an extension. For example, LOG00007.TXT is a legitimate filename. The VPN Concentrator always stores filenames in uppercase.

Port Numbers

Port numbers use decimal numbers from 0 to 65535. No commas or spaces are permitted in a number.

Obtaining Documentation

These sections explain how to obtain documentation from Cisco Systems.

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at this URL:

http://www.cisco.com

Translated documentation is available at this URL:

http://www.cisco.com/public/countries_languages.shtml

Documentation CD-ROM

Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which is shipped with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual subscription.

Ordering Documentation

You can order Cisco documentation in these ways:

http://www.cisco.com/cgi-bin/order/order_root.pl

http://www.cisco.com/go/subscription

Documentation Feedback

You can submit comments electronically on Cisco.com. In the Cisco Documentation home page, click the Fax or Email option in the "Leave Feedback" section at the bottom of the page.

You can e-mail your comments to bug-doc@cisco.com.

You can submit your comments by mail by using the response card behind the front cover of your document or by writing to the following address:

Cisco Systems; Attn: Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate your comments.

Obtaining Technical Assistance

Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from online tools by using the Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC Web Site.

Cisco.com

Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.

Cisco.com is a highly integrated Internet application and a powerful, easy-to-use tool that provides a broad range of features and services to help you with these tasks:

If you want to obtain customized information and service, you can self-register on Cisco.com. To access Cisco.com, go to this URL:

http://www.cisco.com

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC Web Site and the Cisco TAC Escalation Center.

Cisco TAC inquiries are categorized according to the urgency of the issue:

The Cisco TAC resource that you choose is based on the priority of the problem and the conditions of service contracts, when applicable.

Cisco TAC Web Site

You can use the Cisco TAC Web Site to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC Web Site, go to this URL:

http://www.cisco.com/tac

All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:

http://www.cisco.com/register/

If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC Web Site, you can open a case online by using the TAC Case Open tool at this URL:

http://www.cisco.com/tac/caseopen

If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC Web Site.

Cisco TAC Escalation Center

The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.

To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:

http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml

Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Apr 18 17:54:39 PDT 2003
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.