|
The VPN 3002 Hardware Client Reference provides guidelines for configuring the Cisco VPN 3002, details on all the functions available in the VPN 3002 Hardware Client Manager, and instructions for using the VPN 3002 Command Line Interface.
We assume you have read the VPN 3002 Hardware Client Getting Started manual and have followed the minimal configuration steps in Quick Configuration. That section of the VPN Hardware Client Manager is not described here.
We also assume you are an experienced system administrator or network administrator with appropriate education and training, who knows how to install, configure, and manage internetworking systems. However, virtual private networks and VPN devices might be new to you. You should be familiar with Windows system configuration and management, and you should be familiar with Microsoft Internet Explorer or Netscape Navigator or Communicator browsers.
This manual is organized by the order in which sections appear in the VPN 3002 Hardware Client Manager table of contents (the left frame of the Manager browser window; see Figure 1-35 in "Using the VPN 3002 Hardware Client Manager."
Chapter | Title | Description |
---|---|---|
Chapter 1 | Using the VPN 3002 Hardware Client Manager | Explains how to log in, navigate, and use the VPN 3002 Hardware Client Manager with a browser. It explains both HTTP and HTTPS browser connections, and how to install the SSL certificate for a secure (HTTPS) connection. |
Chapter 2 | Configuration | Describes the main VPN 3002 Hardware Client Manager configuration screen. |
Chapter 3 | Interfaces | Explains how to configure the VPN 3002 private and public interfaces. |
Chapter 4 | System Configuration | Describes the system configuration screen of the VPN 3002 Hardware Client Manager. |
Chapter 5 | Servers | Explains how to configure the VPN 3002 to communicate with DNS servers to convert hostnames to IP addresses. |
Chapter 6 | Tunneling | Explains how to configure IPSec. |
Chapter 7 | IP Routing | Explains how to configure static routes, default gateways, and DHCP parameters and options. |
Chapter 8 | Management Protocols | Explains how to configure built-in VPN 3002 servers that provide management functions:, HTTP and HTTPS, Telnet, SNMP, SNMP Community Strings, SSL and SSH. |
Chapter 9 | Events | Explains how to configure system events such as alarms, traps, error conditions, network problems, task completion, or status changes. |
Chapter 10 | General | Explains how to configure the system identification, date, and time. |
Chapter 11 | Policy Management | Explains how to configure and use PAT and Network Extension modes. |
Chapter 12 | Administration | Explains how to configure and use high-level VPN 3002 administrator activities such as who is allowed to configure the system, what software runs on it, rebooting and shutting down the system, managing its configuration files, and managing X.509 digital certificates. |
Chapter 13 | Explains the many status, statistics, sessions, and event log screens that you can use to monitor the VPN 3002. | |
Chapter 14 | Using the Command-Line Interface | Explains how to use the built-in menu- and command-line-based administrative management system via the system console or a Telnet session. With the CLI, you can access and configure all the same parameters as you can using the HTML-based VPN 3002 Hardware Client Manager. |
Appendix A | Identifies and describes all valid IKE proposals for the VPN 3002. | |
Appendix B | Troubleshooting and System Errors | Describes common errors that may occur while configuring the system, and how to correct them. It also describes all system and module LED indicators. |
Refer to the following documents for further information about Cisco VPN 3000 Series applications and products.
The VPN 3002 Hardware Client Getting Started manual provides information to take you from unpacking and installing the VPN 3002, through configuring the minimal parameters to make it operational (called Quick Configuration). This manual is online only.
The VPN 3002 Hardware Client Quick Start Card summarizes the information for quick configuration. This quick reference card is provided with the VPN 3002 and is also available online.
The VPN 3002 Hardware Client Basic Information sticky label summarizes information for quick configuration. It is provided with the VPN 3002 and you can also print it from the online version; you can affix the label to the VPN 3002.
The HTML interface, called the VPN 3002 Hardware Client Manager, includes online help that you can access by clicking the Help icon on the toolbar in the Manager window.
The VPN 3000 Series Concentrator Reference Volume I: Configuration explains how to start and use the VPN Concentrator Manager. It details the Configuration screens and explains how to configure your device beyond the minimal parameters you set during quick configuration.
The VPN 3000 Series Concentrator Reference Volume II: Administration and Monitoring provides guidelines for administering and monitoring the VPN Concentrator. It explains and defines all functions available in the Administration and Monitoring screens of the VPN Concentrator Manager. Appendixes to this manual provide troubleshooting guidance and explain how to access and use the alternate command-line interface.
The VPN Concentrator Manager also includes online help that you can access by clicking the Help icon on the toolbar in the Manager window.
The VPN Client User Guide explains how to install, configure, and use the VPN Client, which lets a remote client use the IPSec tunneling protocol for secure connection to a private network through the VPN Concentrator.
The VPN Client Administrator Guide tells how to configure a VPN Concentrator for remote user connections using the VPN Client, how to automate remote user profiles, how to use the VPN Client command-line interface, and how to get troubleshooting information.
The VPN 3000 Series Concentrator and VPN 3002 Hardware Client documentation are provided on the VPN 3000 Concentrator software distribution CD-ROM in PDF format. The VPN Client documentation is included on the VPN Client software distribution CD-ROM, also in PDF format. To view the latest versions on the Cisco web site, click the Support icon on the toolbar at the top of the VPN Concentrator Manager, Hardware Client Manager, or Client window. To open the documentation, you need Acrobat® Reader 3.0 or later; version 4.5 is included on the Cisco VPN 3000 Concentrator software distribution CD-ROM and on the VPN Client software distribution CD-ROM.
Other useful references include:
This document uses the following conventions:
Convention | Description |
---|---|
boldface font | Commands and keywords are in boldface. |
italic font | Arguments for which you supply values are in italics. |
| Terminal sessions and information the system displays are in |
boldface screen font | Information you must enter is in boldface screen font. |
^ | The symbol ^ represents the key labeled Controlfor example, the key combination ^D in a screen display means hold down the Control key while you press the D key. |
Notes use the following conventions:
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication. |
Cautions use the following conventions:
Caution Means reader be careful. Cautions alert you to actions or conditions that could result in equipment damage or loss of data. |
As you configure and manage the system, enter data in the following formats unless the instructions indicate otherwise:
Type of Data | Format |
---|---|
IP Addresses | IP addresses use 4-byte dotted decimal notation (for example, 192.168.12.34); as the example indicates, you can omit leading zeros in a byte position. |
Subnet Masks and Wildcard Masks | Subnet masks use 4-byte dotted decimal notation (for example, 255.255.255.0). Wildcard masks use the same notation (for example, 0.0.0.255); as the example illustrates, you can omit leading zeros in a byte position. |
MAC Addresses | MAC addresses use 6-byte hexadecimal notation (for example, 00.10.5A.1F.4F.07). |
Hostnames | Hostnames use legitimate network hostname or end-system name notation (for example, VPN01). Spaces are not allowed. A hostname must uniquely identify a specific system on a network. |
Text Strings | Text strings use upper- and lower-case alphanumeric characters. Most text strings are case-sensitive (for example, simon and Simon represent different usernames). In most cases, the maximum length of text strings is 48 characters. |
Filenames | Filenames on the VPN 3002 follow the DOS 8.3 naming convention: a maximum of eight characters for the name, plus a maximum of three characters for an extension. For example, LOG00007.TXT is a legitimate filename. The VPN 3002 always stores filenames in uppercase. |
Port Numbers | Port numbers use decimal numbers from 0 to 65535. Commas and spaces are not permitted. |
These sections explain how to obtain documentation from Cisco Systems.
You can access the most current Cisco documentation on the World Wide Web at this URL:
Translated documentation is available at this URL:
http://www.cisco.com/public/countries_languages.shtml
Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which is shipped with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual subscription.
You can order Cisco documentation in these ways:
You can submit comments electronically on Cisco.com. In the Cisco Documentation home page, click the Fax or Email option in the "Leave Feedback" section at the bottom of the page.
You can e-mail your comments to bug-doc@cisco.com.
You can submit your comments by mail by using the response card behind the front cover of your document or by writing to the following address:
Cisco Systems
Attn: Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from online tools by using the Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC Web Site.
Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.
Cisco.com is a highly integrated Internet application and a powerful, easy-to-use tool that provides a broad range of features and services to help you with these tasks:
If you want to obtain customized information and service, you can self-register on Cisco.com. To access Cisco.com, go to this URL:
The Cisco Technical Assistance Center (TAC) is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC Web Site and the Cisco TAC Escalation Center.
Cisco TAC inquiries are categorized according to the urgency of the issue:
The Cisco TAC resource that you choose is based on the priority of the problem and the conditions of service contracts, when applicable.
You can use the Cisco TAC Web Site to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC Web Site, go to this URL:
All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:
http://www.cisco.com/register/
If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC Web Site, you can open a case online by using the TAC Case Open tool at this URL:
http://www.cisco.com/tac/caseopen
If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC Web Site.
The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.
To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number.
Posted: Tue Oct 29 11:46:32 PST 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.