[an error occurred while processing this directive]

Support

Index

Hierarchical Navigation

Downloads

 Feedback

Table Of Contents

Symbols - Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - X -

Index

Symbols

/bits subnet masksE-3

Numerics

100BaseT, setting4-2

10BaseT, setting4-2

3DES6-3

A

ACE/Server, configuring8-13

address rangeE-5

authentication

combining systems8-2

overview8-1

see also SecurID, RADIUS, VPN Users list, AXENT Defender, or SafeWord

AXENT Defender

authentication server8-5

certificates8-14

overview8-5

RADIUS component8-10

server attributes8-9

VPN 5000 client support8-10

B

backslash character sequencesC-6

bits subnet masksE-3

C

CA

requesting a server certificate10-11

supported10-2

cable length, DS34-5

caution, descriptionxiv

certificate authority

requesting a server certificate10-11

supported10-2

certificate generator

See CG

certificates

chaining10-2

details10-15

enabling for LAN-to-LAN tunnel

proprietary IPSec9-5

standard IPSec9-5, 9-10

guidelines10-2

installing on concentrator10-13

overview8-14

PEM format10-13

root

creating on CG10-4

distributing from CG10-5

installing10-13

server

for CG10-7

installing10-13

request10-10

size10-2

verifying10-15

Certificates section10-3

CG

enabling10-3

root certificate

creating10-4

distributing10-5

transferring to another CG10-5

server certificate

for CG10-7

requesting10-12

Class A, B, and C addressesE-1

clock

DS34-5

HSSI4-3

setting time3-2

command hierarchyC-6

command line

accessing2-1

privilegesC-1

promptsC-1

command typesC-4

comments2-6

concentrator name, setting3-1

configuration files

copyingA-6

examples11-1

configure commandC-4

connections

console2-1

maximum VPN1-2

Telnet2-3

console

connection2-1

toggle logging messages3-6

conventions

documentxiii

syntaxC-1

CRC

DS34-5

HSSI4-3

cyclic redundancy check

DS34-5

HSSI4-3

D

data, inverted for DS34-5

data rate, DS34-5

default

gateway5-14

IP address2-3

password2-2

deleting

keywords2-7

DES6-3

details, certificates10-15

device name, setting3-1

Diffie-Hellman group6-3

digital certificates

See certificates

DNS

concentrator5-17

VPN group7-3

document conventionsxiii

Domain Name Server section5-17

domain name system

concentrator5-17

VPN group7-3

dotted decimal subnet masksE-3

downloading

concentrator softwareA-1

text configurationA-6

DS3 interface parameters4-5

DS3 Interface section4-4

duplex mode, setting4-2

dynamic responder9-10

dynamic routing protocols5-11

E

edit config commandC-4

embedded software, installingA-1

emulator, terminal settings2-2

enabled modeC-1

Entrust/PKI CA10-2

Entrust/VPNConnection10-2

erasing

configurationB-5

softwareB-4

Ethernet interface parameters4-2

Ethernet Interface section4-2

F

failure, softwareB-1

features, software1-1

files

configuration2-4

softwareA-1

firewall, configuring for VPND-1

Flash memory

downloading configurationA-6

downloading softwareA-1

erasing configurationB-5

erasing softwareB-4

format, certificate

PEM10-13

PKCS #710-6

X.50910-6

Frame Relay

multipoint5-9

point-to-point5-8

setting for link type4-6

unnumbered5-8

Frame Relay section5-9

full duplex, setting4-2

G

gateway

default5-14

VPN5-5

General section3-1

GRE tunnels9-13

group, VPN

see VPN group

H

half duplex, setting4-2

hosts, subnet masks forE-3

HSSI interface parameters4-3

HSSI Interface section4-3

HyperTerminalA-5

I

ICMP requests, VPN-only port5-4

IKE

Phase 16-1

Phase 2

LAN-to-LAN tunnel9-4

VPN groups7-4

IKE Policy section6-1

installing

certificates on concentrator10-13

concentrator softwareA-1

text configurationA-6

interfaces

DS34-4

Ethernet4-1

HSSI4-2

loopback5-2

primary5-1

subinterfaces5-1

introduction1-1

inverted data, DS34-5

IOS, LAN-to-LAN tunnel example11-15

IP address

assigning to remote users7-6

classesE-1

default2-3

loopback5-2

overviewE-1

privateE-2

range with subnet maskE-5

setting5-10

IP routing

Ethernet or WAN5-7

LAN-to-LAN tunnels9-14

OSPF5-12

RIP5-11

static5-13

IPSec, LAN-to-LAN tunnels

dynamic9-10

proprietary

configuring9-2

sample configuration11-15

standard

configuring9-6

sample configuration11-15

K

Keon10-2

key exchange6-3

keywords, deleting2-7

L

LAN-to-LAN tunnels

certificates

dynamic responder9-12

proprietary IPSec9-5

standard IPSec9-10

dynamic responder9-10

GRE9-13

IP routing9-14

overview9-1

proprietary IPSec9-2

sample configurations

IOS11-15

proprietary IPSec11-5

standard IPSec11-15

standard IPSec9-6

VPN port number9-2

levels, logging3-8

link layer protocols1-1

link type, setting to Frame Relay4-6

logging

enabling3-5

levels3-8

toggle console3-6

Logging section3-5

loopback IP address5-2

M

management1-3

management commandsC-5

maximum

VPN connections1-2

VPN groups7-1

MD56-3

memory

downloading configurationA-6

downloading softwareA-1

erasing configurationB-5

erasing softwareB-4

modes, privilegesC-1

N

normal modeC-1

note, descriptionxiv

numbering of slots2-2, A-4

O

OSPF overview5-12

P

passthrough mode, RADIUS8-9

password

allowing default at startupB-5

default2-2

setting3-1

PEM format10-13

permissions

commandC-1

TFTP serverA-7

ping5-4

PKCS #7 certificates10-6

PKI certificates

see certificates

ports, VPN-only5-3

primary interface5-1

private networksE-2

privileges

commandC-1

TFTP serverA-7

promptsC-1

proprietary IPSec tunnel9-2

protocols

dynamic routing5-11

link layer1-1

tunneling1-1

VPN remote access1-2

R

RADIUS

accounting8-7

authentication8-5

certificates8-14

guidelines8-5

overview8-5

passthrough mode8-9

server attributes8-9

rate, DS34-5

recoveryB-1

requesting a server certificate10-10

RIP5-11

root certificate

creating on CG10-4

distributing from CG10-5

installing on concentrator10-13

transferring to another CG10-5

routes

dynamic5-11

static5-13

routing

dynamic protocols5-11

IP5-7

static5-13

RSA Security

CA10-2

Keon10-2

SecurID

see main entry for SecurID

run-time commandsC-5

S

SafeWord

configuring8-11

RADIUS passthrough server attribute8-10

token support8-11

sample configurations11-1

saving configuration changes2-7

SecurID

certificates8-14

concentrator configuration8-12

overview8-12

RADIUS in passthrough mode8-12

server configuration8-13

VPN group configuration7-6

VPN Users list8-12

SecurID section8-12

server certificates

C's own10-7

installing on concentrator10-13

requesting from a CG10-12

verifying10-15

SHA6-3

shared secret

RADIUS, for concentrator8-6

replacing with certificates8-14

site-to-site tunnels

See LAN-to-LAN tunnels

slot numberingA-4

software

failureB-1

installingA-1

special character sequencesC-6

static routes5-13

strings, allowed charactersC-6

subinterfaces5-1

guidelines5-2

loopback5-2

syntax5-2

subnet masks

/bitsE-3

address rangeE-5

dotted decimalE-3

number of hostsE-3

overviewE-2

switch settingsB-2

syntax

conventionsC-1

formattingC-3

T

Telnet to concentrator2-3

terminal emulator settings2-2

test switch settingsB-2

text configuration

copyingA-6

formatting2-4

TFTP

concentrator as clientA-2

concentrator as serverA-1

concentrator softwareA-1

configuration file to Flash memoryA-6

permissionsA-7

third-party equipment, LAN-to-LAN tunnels9-6

time, setting3-2

Time Server section3-3

traceroute5-4

traffic, VPN5-3

troubleshootingB-1

tunneling

authentication6-1

protocols1-1

U

unnumbered link5-8

usernames, VPN Users list8-4

V

VPN

connections1-2

gateway5-5

groups7-1

overview1-4

protocols1-2

traffic, firewall5-3

tunnel authentication6-1

user authentication8-1

VPN 5000 client

IP tunnel addresses7-6

version for AXENT Defender8-10

VPN group configuration7-2

VPN group

SecurID configuration7-6

VPN 5000 client7-2

VPN Group section7-2

VPN-only port

example5-5

ICMP requests5-4

VPN Users list

username options8-4

using with SecurID8-12

X

X.509 root certificate10-6

XModem, downloading softwareA-3


[an error occurred while processing this directive]