cc/td/doc/product/vpn/vpn3000/4_0
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Index
Numerics
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Y

Index


Numerics

100 LED (Ethernet)     A-7

A

access to device

physical     2-2

active configuration

definition     3-3, 4-1

saving     3-21, 4-19

Active Sessions LED     A-6

Activity LED

SEP-E     A-8

adding a user     3-17, 4-11

address assignment

configuring     3-11, 4-8

Address Assignment (screen)     3-11

administrator skills     2-1

admin password

changing     4-18

default     3-19, 4-18

Admin Password (screen)     3-19

Authentication

Internal server (screen)     3-12

NT Domain server (screen)     3-14

RADIUS server (screen)     3-13

SDI server (screen)     3-15

authentication

configuring     3-12, 4-10

authentication algorithms

features     1-3

authentication server

internal

configuring     3-12, 4-11

NT Domain

configuring     3-14, 4-14

RADIUS

configuring     3-13, 4-13

SDI

configuring     3-15, 4-15

Authentication Server (field)

RADIUS     3-13

SDI     3-15

Authentication Server Address (field)

NT Domain     3-14

authentication servers

features     1-4

B

Back button     3-3

Bad IP Address error     A-5

basic operation     1-7

beginning quick configuration     2-13

bootcode, upgrading     vi

boot messages at startup     2-12

brackets

default entries in     4-1

browser

Back or Forward button displays incorrect screen or incorrect data     A-2, A-3

navigation toolbar, don't use with Manager     3-3

navigation toolbar not used with Manager     2-3

Refresh / Reload button logs out the Manager     A-2, A-5

requirements     2-2

starting     3-2

C

cables

connecting     2-10

cables and connectors

requirements     2-2

cabling distances

specifications     1-9

case-sensitivity     3-3, 4-1

Certificate Authorities supported     1-4

changing admin password     4-18

CiscoSecure ACS server     3-13, 4-13

CLI

errors     A-5

exiting     4-19

client configuration settings for testing     5-2

client software compatibility features     1-6

Client Specified (check box)     3-11

client specified address assignment

CLI     4-8

Coll LED (Ethernet)     A-7

Command-Line Interface

See CLI

completing Quick Configuration

with Command Line Interface     4-1

with Manager     3-3

compliance standards     B-10

configuration

active or running     3-3, 4-1

configuration files

for troubleshooting     A-2

saving     2-19, 3-21, 4-19

Configured Pool (check box)     3-11

configured pool address assignment

CLI     4-9

configuring

address assignment     3-11, 4-8

authentication     3-12, 4-10

Ethernet interfaces     4-2

internal authentication server     3-12, 4-11

internal server user database     4-11

IP interfaces     3-4

IPSec Group     3-18, 4-17

NT Domain authentication server     3-14, 4-14

private Ethernet interface at startup     2-17

RADIUS authentication server     3-13, 4-13

SDI authentication server     3-15, 4-15

system information     3-8, 4-5

tunneling protocols and options     3-10, 4-6

connecting

console     2-9

network cables     2-10

power cable     2-11

console

connecting     2-9

requirements     2-2

to start quick configuration     2-16

conventions

documentation     vi

cooling

requirements     2-2

specifications     1-9

copyrights and licenses     B-1

CPU Utilization LED     A-6

crash

system

saves log file     A-1

CRSHDUMP.TXT file     A-1

Current Users list     3-17

D

data

formats     ix

date

setting     2-16, 3-8

Daylight-Saving Time

enabling     2-17, 3-8

default

admin password     3-19, 4-18

entries

CLI     4-1

login name     2-16

login password     2-16

default gateway

CLI     4-5

Default Gateway (field)     3-9

deleting a user     3-18, 4-12

DHCP

address assignment

CLI     4-8

check box     3-11

Dial-Up Networking     5-2

digital Certificate Authorities supported     1-4

display settings     2-4

DNS server

CLI     4-5

DNS Server (field)     3-9

documentation

cautions     viii

conventions     vi

notes     viii

related     vi

tips     viii

Domain (field)     3-9

Domain Controller Name (field)

NT Domain     3-14

domain name (CLI)     4-5

Don't Require Encryption option

L2TP     3-10

PPTP     3-10

Done screen     3-20

DST     2-17, 3-8

Duplex

CLI     4-3

field

Ethernet interface     3-7

Dynamic Host Configuration Protocol See DHCP

E

Enable DST Support

check box     3-8

encryption algorithms

features     1-3

Encryption option not required

L2TP     3-10

PPTP     3-10

encryption options

configuring     3-10

encryption options, configuring     4-6

entries

default

CLI     4-1

error

an error has occurred ...     A-3

insufficient authorization     A-4

not allowed     A-4

errors

and troubleshooting     A-1

an error has occurred ...     A-3

bad IP address     A-5

CLI     A-5

insufficient authorization     A-4

invalid login     A-2, A-3

JavaScript     A-3

messages     3-3

no such interface supported (IE)     A-4

not allowed     A-4

not found     A-4

old browser     A-3

out of range value     A-5

passwords do not match     A-5

recovering from     3-3

session timeout     A-2, A-3

VPN Concentrator Manager     A-2

Ethernet interfaces

configuring     4-2

modifying     3-6

private

configuring at startup     2-17

Ethernet Link Status LEDs     A-6

event log

saved at system reboot     A-1

saved if system crashes     A-1

exiting

the Command-Line Interface     4-19

Expansion Modules Insertion Status LEDs     A-6

Expansion Modules Run Status LEDs     A-6

External (Default) filter

Ethernet interface     3-7

F

Fan Status LED     A-6

features

hardware     1-2

Model 3005     1-2

Model 3015     1-2

Model 3030     1-2

Model 3060     1-2

Model 3080     1-2

software

authentication algorithms     1-3

authentication servers     1-4

client compatibility     1-6

digital Certificate Authorities supported     1-4

encryption algorithms     1-3

key management     1-3

list     1-3

management interfaces     1-3

monitoring     1-5

network addressing support     1-4

routing protocols     1-5

security management     1-4

tunneling protocols     1-3

fields

moving between     3-3

Filter (field)

Ethernet interface     3-7

finishing Quick Configuration     3-20, 4-19

formats

data     ix

G

Group Name (field)

IPSec     3-18

H

hardware

features     1-2

installing     2-5

how the VPN Concentrator works     1-7

I

icon

Save     3-21

Save Config     3-21

Save Needed     3-3

indicators

LED     A-6

initial configuration screen     3-3

initialization and boot messages at startup     2-12

installation

preparing for     2-1

typical     1-8

installing

in rack     2-5

rubber feet     2-7

the VPN Concentrator hardware     2-5

interfaces

Ethernet

configuring     4-2

modifying     3-6

interfaces, IP

configuring     3-4

internal server

configuring user database     4-11

selection     3-12

Internet Explorer, requirements     2-2

Invalid Login or Session Timeout (error)     A-3

Invalid Login or Session Timeout error     A-2

IP Address (field)

Ethernet interface     3-6

user database     3-17

user database (CLI)     4-12

IP interfaces

configuring     3-4

screen     3-4

IPSec

check box     3-10

enabling using CLI     4-7

IPSec Group

configuring     3-18

Name (CLI)     4-17

Password (CLI)     4-17

screen     3-18

IPSec Group, configuring     4-17

J

JavaScript

error     A-3

JavaScript, requirements     2-3

K

key management features     1-3

L

L2TP

check box     3-10

enable CLI     4-6

LED indicators

100 (Ethernet)     A-7

Active Sessions     A-6

Activity (SEP-E)     A-8

Coll (Ethernet)     A-7

CPU Utilization     A-6

display at startup     2-12

Ethernet Link Status     A-6

Expansion Modules Insertion Status     A-6

Expansion Modules Run Status     A-6

Fan Status     A-6

Link (Ethernet)     A-7

Power (SEP)     A-8

Power Supplies

front panel     A-6

Status (SEP)     A-8

System     A-6

table     A-6

Throughput     A-6

Tx (Ethernet)     A-7

usage gauge     A-7

licenses and copyrights     B-1

Link LED (Ethernet)     A-7

logging in the VPN Concentrator Manager     3-2

login (screen)     3-2

login name

default     2-16

M

MAC Address (field)

Ethernet interface     3-7

management interfaces, features     1-3

memory, upgrading     vi

Microsoft Dial-Up Networking     5-2

Microsoft VPN Adapter     5-2

mistakes

detecting and correcting     3-3

Model 3005, features     1-2

Model 3015, features     1-2

Model 3030, features     1-2

Model 3060, features     1-2

Model 3080

features     1-2

modifying an Ethernet interface configuration     3-6

monitoring features     1-5

monitor settings     2-4

mounting in rack     2-5

moving from field to field     3-3

MTU field     2-18, 3-7

N

Netscape Navigator

requirements     2-2

network addressing support features     1-4

network cables

connecting     2-10

No such interface supported

error     A-4

Not Allowed

error     A-4

Not Allowed (error)     A-4

Not Found

error     A-4

notices, regulatory agency     B-10

NT Domain (selection)     3-14

NT Domain authentication server

configuring     3-14, 4-14

NT Domain Server Address (CLI)     4-14

NT Domain Server Port (CLI)     4-14

NT Primary Domain Controller (CLI)     4-14

O

old browser (error)     A-3

operation, basic     1-7

organization of manual     v

OSPF     3-9

Out of Range value (error)     A-5

P

parameters needed for quick configuration     2-14

password

admin, changing     4-18

default login     2-16

user database (CLI)     4-11

Password (field)

admin     3-19

IPSec Group     3-18

user database     3-17

Passwords do not match

error     A-5

per-user address assignment     3-17, 4-8

Per User check box     3-11

physical site

access to device     2-2

cables and connectors     2-2

cooling     2-2

power     2-2

preparing     2-2

physical specifications     1-9

power

requirements     2-2

specifications     1-9

power cable

     2-11

powering up     2-12

Power LED (SEP)     A-8

Power Supplies LEDs

front panel     A-6

PPTP enable

check box     3-10

CLI     4-6

preparing to install     2-1

Private (Default) filter

Ethernet interface     3-7

private interface

configuring at startup     2-17

Protocols screen     3-10

Public (Default) filter

Ethernet interface     3-7

Q

Quick Configuration

completing

with Command Line Interface     4-1

with Manager     3-3

Done (screen)     3-20

finishing     3-20, 4-19

running only once     2-13, 3-1, 3-3, 4-1

saving     3-21, 4-19

steps in     2-13

testing     5-1

using nondefault values     2-14

using the VPN Concentrator Manager     3-1

quick configuration

beginning     2-13

starting     2-13

starting from the console     2-16

quitting

the Command-Line Interface     4-19

R

rack mounting     2-5

RADIUS

authentication server

configuring using CLI     4-13

selection     3-13

RADIUS Server Name (CLI)     4-13

RADIUS Server Port (CLI)     4-13

RADIUS Server Secret (CLI)     4-13

Range End

CLI     4-9

field     3-11

Range Start

CLI     4-9

field     3-11

reboot system

saves log file     A-1

regulatory agency notices     B-10

related documentation     vi

removing a user     3-18, 4-12

Require Encryption option

L2TP     3-10, 4-7

PPTP     3-10, 4-6

requirements

browser     2-2

console     2-2

Internet Explorer     2-2

JavaScript     2-3

Netscape Navigator     2-2

Retries (field)

NT Domain     3-14

RADIUS     3-13

SDI     3-15

RIP     3-9

routing protocols features     1-5

rubber feet

installing     2-7

running configuration     3-3, 4-1

S

Save Config (icon)     3-21

Save Configuration window     3-21

Save icon     3-21

SAVELOG.TXT file     A-1

Save Needed

icon     3-3

saving the active configuration     2-19, 3-21, 4-19

screen

Address Assignment     3-11

Admin Password     3-19

Authentication

Internal server     3-12

NT Domain server     3-14

RADIUS server     3-13

SDI server     3-15

Done     3-20

initial configuration     3-3

IP Interfaces     3-4

IPSec Group     3-18

login     3-2

Protocols     3-10

Save Configuration     3-21

System Info     3-8

User Database     3-17

welcome     3-3

SDI

authentication server

configuring     4-15

selection     3-15

SDI Server Name (CLI)     4-15

SDI Server Port (CLI)     4-15

security management features     1-4

Server Port (field)

NT Domain     3-14

RADIUS     3-13

SDI     3-15

Server Secret (field), RADIUS     3-13

Server Type (menu)     3-12, 4-10

Session Timeout (error)     A-3

Session Timeout error     A-2

software features     1-3

specifications

cabling distances     1-9

cooling     1-9

physical     1-9

power     1-9

Specify Server (field)

DHCP     3-11

Speed (CLI)

interface     4-3

Speed (field)

Ethernet interface     3-7

standards compliance     B-10

starting quick configuration     2-13

startup

boot messages     2-12

initialization messages     2-12

static routes     3-9

Status LED

SEP     A-8

steps in Quick Configuration     2-13

stopping

the Command-Line Interface     4-19

Subnet Mask (field)

Ethernet interface     3-7

user database     3-17, 4-12

system information

configuring     3-8, 4-5

System Info screen     3-8

System LED     A-6

system name (CLI)     4-5

System Name (field)     3-8

T

terminal emulator

settings     2-12

starting     2-12

testing the VPN Concentrator     5-1

Throughput LED     A-6

time

Daylight-Saving     2-17, 3-8

setting     2-16, 3-8

Timeout (field)

NT Domain     3-14

RADIUS     3-13

SDI     3-15

time zone

setting     2-17, 3-8

tools needed for installation     2-5

troubleshooting     A-1

files created for     A-1

tunneling protocols

configuring     3-10, 4-6

features     1-3

Tx LED (Ethernet)     A-7

typical installation     1-8

typographic conventions     vi

U

understanding

the VPN Concentrator Manager window     3-23

unpacking     2-4

upgrading

bootcode     vi

memory     vi

usage graph

LEDs (table)     A-7

user

adding     3-17, 4-11

deleting     3-18, 4-12

user administrator skills     2-1

user database

configuring     4-11

User Database (screen)     3-17

User Name

CLI     4-11

User to Add (field)     3-17

User to Delete (CLI)     4-12

using VPN Concentrator Manager functions     3-22

V

VPN Adapter, Microsoft     5-2

VPN Concentrator

installilng hardware     2-5

VPN Concentrator configuration settings for testing     5-1

VPN Concentrator Manager

errors     A-2

logging in     3-2

understanding the window     3-23

using for Quick Configuration     3-1

using functions     3-22

W

welcome screen     3-3

where the VPN Concentrator fits in your network     1-8

window

Manager

understanding     3-23

Y

You are using an old browser or have disabled JavaScript (error)     A-3


hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Apr 18 16:53:55 PDT 2003
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.