
Appendix B 
  | 
  | 
  | 
  | |||
Table   | VPN Summary Page (continued)  | |||||
  | 
  | 
  | 
  | |||
  | Element | 
  | Description  | |||
  | 
  | 
  | 
  | |||
  | Primary Hub  | 
  | Available if the VPN topology type is   | |||
  | 
  | 
  | The name of the primary hub in the   | |||
  | 
  | 
  | 
  | |||
  | Failover Hubs  | 
  | Available if the VPN topology type is   | |||
  | 
  | 
  | The name of any secondary backup hubs that are configured in the  | |||
  | 
  | 
  | ||||
  | 
  | 
  | ||||
  | Number of Spokes  | Available if the VPN topology type is   | ||||
  | 
  | 
  | The number of spokes that are included in the   | |||
  | 
  | 
  | topology.  | |||
  | 
  | 
  | 
  | |||
  | Peer 1  | 
  | Available if the VPN topology type is   | |||
  | 
  | 
  | The name of the device that is defined as Peer One in the  | |||
  | 
  | 
  | ||||
  | 
  | 
  | 
  | |||
  | Peer 2  | 
  | Available if the VPN topology type is   | |||
  | 
  | 
  | The name of the device that is defined as Peer Two in the  | |||
  | 
  | 
  | ||||
  | 
  | 
  | ||||
  | Number of Peers  | Available if the VPN topology type is full mesh.  | ||||
  | 
  | 
  | The number of devices included in the full mesh VPN topology.  | |||
  | 
  | 
  | ||||
  | IPSec Technology  | The IPSec technology assigned to the VPN topology. See  | ||||
  | 
  | 
  | Understanding IPSec Technologies and Policies, page  | |||
  | 
  | 
  | 
  | |||
  | IKE Proposal  | 
  | The security parameters of the IKE proposal configured in the VPN  | |||
  | 
  | 
  | topology. See IKE Proposal Page, page  | |||
  | 
  | 
  | 
  | |||
  | Transform Sets  | 
  | The transform sets that specify the authentication and encryption  | |||
  | 
  | 
  | algorithms that will be used to secure the traffic in the VPN tunnel.  | |||
  | 
  | 
  | See IPSec Proposal Page, page  | |||
  | 
  | 
  | 
  | |||
  | Preshared Key  | 
  | Unavailable if the selected technology is Easy VPN.  | |||
  | 
  | 
  | Specifies whether the shared key to use in the preshared key policy  | |||
  | 
  | 
  | is user defined or   | |||
  | 
  | 
  | page  | |||
  | 
  | 
  | ||||
  | Public Key Infrastructure  | If a Public Key Infrastructure policy is configured in the VPN  | ||||
  | 
  | 
  | topology, specifies the CA server. See Public Key Infrastructure  | |||
  | 
  | 
  | Page, page  | |||
  | 
  | 
  | 
  | 
  | 
  | 
  | 
  | 
  | 
  | User Guide for Cisco Security Manager 3.0.1  | 
  | 
  | 
  | 
  | 
  | 
  | 
  | |||
  | 
  | 
  | 
  | |||
  | 
  | 
  | 
  | |||