About This Guide
Document Conventions
•Chapter 7, “Configuring the IKE Policy for IPSec Tunnel Security,” tells you how to configure VPN tunnel security for IPSec clients and
•Chapter 8, “Configuring VPN Groups,” tells you how to create VPN groups for use with the VPN 5000 client or L2TP client.
•Chapter 9, “Authenticating VPN Users,” describes systems you can use to authenticate users for VPN groups.
•Chapter 10, “Configuring VPN
•Chapter 11, “Installing Certificates on the Concentrator,” tells you how to install root and server certificates on the concentrator for authentication.
•Chapter 12, “Sample Configurations,” includes sample configuration diagrams and text configuration files.
•Appendix A, “Installing the Software and Configuration,” tells you how to install or upgrade the VPN 5000 concentrator software, and how to copy the configuration files to or from Flash memory.
•Appendix D, “Configuring the Firewall for VPN,” tells you how to configure a firewall for VPN traffic.
•Appendix B, “Recovering from a Software Failure,” tells you how to recover the system from a software failure.
•Appendix C, “Syntax Conventions,” describes the syntax conventions for the command line interface and the text configuration file.
•Appendix E, “IP Addressing,” describes IP address classes and private addresses, and indicates how to determine the subnet mask.
•The Index provides easy access to topics within the guide.
Document Conventions
The following conventions are used in this guide:
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
Cisco VPN 5000 Concentrator Software Configuration Guide, Software Version 6.0.x
| xv | |
|