|
access hours, configuring 15-3
accounting record attributes, RADIUS 5-28
configuring 5-28
access hours 15-4
address pool 6-6
email recipient of events 10-33
event class 10-18
filter (traffic management) 15-40
filter rule (traffic management) 15-15
IPSec LAN-to-LAN connection 7-17
NAT rule 15-55
network list 15-9
NTP host 5-41
OSPF area 8-12
security association (traffic management) 15-29
security association to rule on filter 15-46
SMTP server for events 10-30
SNMP community 9-13
SNMP event destination 10-23
static route for IP routing 8-5
syslog server to receive events 10-26
user on internal server (user management) 14-122
address management, configuring 6-2
alarm thresholds, power, configuring 3-6
alerts, IPSec 7-39
Are You There (AYT) firewall policy 14-25, 14-29, 14-67, 14-71
assignment of IP addresses, configuring 6-3
assign rules to filter (traffic management) 15-43
authentication features, summary of 14-35, 14-77
autodiscovery, network 7-11, 7-24
automatic software update, See client update 12-1
automatic switchover (redundancy) 8-18
Backup LAN-to-LAN, See IPSec LAN-to-LAN, redundancy 7-11
configuring 15-64
banner for IPSec clients, configuring 14-17, 14-62
base group, configuring (user management) 14-4
base group global preshared secret 14-16
bibliography xv
bootcode, upgrading xiv
See management protocols 9-1
burst size 15-67
Central Protection Policy (CPP) 14-25, 14-29, 14-67, 14-71, 15-15
certificate group matching 15-72
change security association on rule 15-48
Cisco IP Phone Bypass 14-31
Cisco Secure ACS RADIUS server 14-1
CiscoSecure ACS server 5-2, 5-18, 14-1
and split tunneling 14-25, 14-67
Are You There (AYT) policy 14-25, 14-29, 14-67, 14-71
Central Protection Policy (CPP) 14-25, 14-29, 14-67, 14-71, 15-15
configuring rules for firewall filters 14-25, 14-67, 15-15, 15-17, 15-19, 15-22
supported products 14-27, 14-69
client update 12-1
configuration section of Manager 2-1
connecting to VPN Concentrator
crash, system, saves log file 10-8
formats xvii
date and time, configuring 11-3
Daylight-Saving Time, enabling 11-4
in IPSec LAN-to-LAN 7-20
display settings 1-3
dynamic filters 15-1
email recipients of events, configuring 10-31
add 10-33
See also interfaces
event identifier, tracking events by 10-12
event log 10-5
event trap destinations, configuring 10-21
Extended Authentication, IPSec 14-14, 14-58
filter 15-1
add (traffic management) 15-40
add security association to rule on 15-46
assign rules to (traffic management) 15-43
configuring (traffic management) 15-37
configuring on base group 14-6
configuring on group 14-50
Ethernet 3-12
configuring on user 14-127
copy (traffic management) 15-40
modify (traffic management) 15-40
filter rules 15-1
firewall, client 14-67
See client firewall 14-67
firewall, client, See client firewall 14-25
saving log files in 10-7
data xvii
gateways, default 8-7
general parameters, configuring 11-1
global authentication parameters 11-6
groups, configuring, user management 14-42
adding to routing table 8-22
idle time allowed in keepalive monitoring 14-12
See security associations
inheritance, of group and user parameters 1-3
Install SSL Certificate (screen) 1-5
internal authentication server
Internet Explorer, requirements 1-2
configuring assignment of 6-3
IPComp data compression 14-15, 14-59
IP Phone Bypass 14-31
IPSec NAT-T 7-23
IPSec over TCP 7-36
base group 14-18
JavaScript, requirements 1-2
keepalives, See IKE keepalives 14-56
Kerberos/Active Directory authentication
configuring 14-93
Kerberos/Active Directory authentication, configuring 5-11
See IPSec LAN-to-LAN
configuring 14-103
LDAP authorization servers, configuring 5-23
LEAP Bypass, configuring 14-31, 14-73
Linux server and Kerberos/Active Directory authentication 5-11, 14-93
load balancing 13-1
local LAN access for VPN client 14-22, 14-64
See event log
logging in the VPN Concentrator Manager 1-21
management protocols, configuring 9-1
Manager table of contents 1-23
memory, upgrading xiv
system
object 11-2
Mode Configuration, IPSec 14-16, 14-60
access hours 15-4
accounting server 5-30
address pool 6-6
authentication server 5-5
authorization server 5-21
DHCP server 5-36
event class 10-18
filter (traffic management) 15-40
filter rule (traffic management) 15-15
group (external) (user management) 14-84
group (internal) (user management) 14-45
IKE proposal 7-32
NAT rule 15-55
network list 15-9
NTP host 5-41
OSPF area 8-12
security association (traffic management) 15-29
SMTP server for events 10-30
SNMP community 9-13
SNMP event trap destination 10-23
static route, for IP routing 8-5
syslog server to receive events 10-26
user on internal server (user management) 14-122
monitor / display settings 1-3
movianVPN client support 7-22, 7-34, 14-10, 14-54, 14-130, 15-32, 15-35
MPPC data compression 14-38, 14-40, 14-80, 14-82
MTU 3-13
NAT rules, configuring 15-52
NAT-T (NAT Traversal) 7-23, 7-38
NAT transparency 7-36
the VPN Concentrator Manager 1-23
network autodiscovery 7-11, 7-24
network lists 15-1
See NTP 5-38
NT Domain, configuring authentication server 5-7
NTP, configuring 5-38
organization of the VPN Concentrator Manager 1-22
OSPF areas, configuring 8-11
factory default (Manager) 1-21
policing rate 15-67
power thresholds, configuring 3-6
pre-shared secret 14-16
product codes for client firewalls 14-28, 14-70
configuring 14-101
saves log file 10-8
configuring, system 8-18
references (bibliography) xv
routes, adding to routing table
network autodiscovery 7-24
RRI See reverse route injection
rules 15-1
rules, NAT, configuring 15-52
SAs See security associations
SAVELOG.TXT
file 10-8
SecurID, configuring authentication server 5-9, 14-91
security associations 15-1
servers 5-1
configuring 14-99
authentication 5-2
DNS 5-32
firewall 5-37
internal authentication 5-13
Kerberos/Active Directory authentication 5-11, 14-93
LDAP authorization 5-23, 14-103
NT Domain authentication 5-7
NTP 5-38
RADIUS accounting 5-28
RADIUS authentication 5-5
RADIUS authorization 5-21, 14-101
SDI authentication 5-9
system access to 5-1
deleting internal authentication 5-14
testing authentication 5-14
SMTP servers, configuring for events 10-28
SNMP communities, configuring 9-12
software update, automatic 12-1
speed, configuring Ethernet interface 3-12
split tunneling network list 14-24, 14-65
SSL certificate 9-14
static routes, configuring for IP routing 8-3
strip realm 14-8
switchover, automatic (redundancy) 8-18
syslog servers, configuring for events 10-25
system configuration section of Manager 4-1
system identification, configuring 11-2
table of contents, Manager 1-23
configuring internal server 9-8
time and date, configuring 11-3
time zone, configuring 11-3
traffic management, configuring 15-6
transmission mode, configuring Ethernet interface 3-12
consult event log 10-5
tunnel default gateway, configuring 8-7
typographic conventions xiv
See base group 14-4
users, configuring on internal server (user management) 14-120
vendor codes for client firewalls 14-28, 14-70
virtual cluster 13-1
configuring 8-18
welcome text for IPSec clients, configuring 14-17, 14-62
wildcard masks 7-24, 7-25, 15-10, 15-19
WINS, configuring for group 14-51
wireless support See movianVPN client support 7-34
configuring as system management protocol 9-20
Zone Labs Integrity Server 14-25, 14-29, 14-67, 14-71
Posted: Wed Jul 16 12:36:12 PDT 2003
All contents are Copyright © 1992--2003 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.