B-5
User Guide for CiscoSecurity Manager3.0.1
OL-8214-02
AppendixB Site-to-Site VPN User Interface Reference Site-to-Site VPN Manager Window
Primary Hub Available if the VPN topology type is hub-and-spoke.
The name of the primary hub in the hub-and-spoke topology.
Failover Hubs Available if the VPN topology type is hub-and-spoke.
The name of any secondary backup hubs that are configuredin the
hub-and-spoke topology.
Number of Spokes Available if the VPN topology type is hub-and-spoke.
The number of spokes that are included in the hub-and-spoke
topology.
Peer 1 Available if the VPN topology type is point-to-point.
The name of the device that is defined as Peer One in the
point-to-point VPN topology.
Peer 2 Available if the VPN topology type is point-to-point.
The name of the device that is defined as Peer Two in the
point-to-point VPN topology.
Number of Peers Available if the VPN topology type is full mesh.
The number of devices included in the full mesh VPN topology.
IPSec Technology The IPSec technology assigned to the VPN topology. See
Understanding IPSec Technologies and Policies, page 9-8.
IKE Proposal The securityparameters ofthe IKE proposalconfigured inthe VPN
topology. See IKE Proposal Page, page B-37.
Transform Sets The transform sets that specify the authentication and encryption
algorithms that will be used to secure the trafficin the VPN tunnel.
See IPSec Proposal Page, page B-39.
Preshared Key Unavailable if the selected technology is EasyVPN.
Specifieswhether the shared key to use in the preshared key policy
is user defined or auto-generated. See Preshared Key Page,
page B-53.
Public Key Infrastructure If a Public Key Infrastructure policy is configured in the VPN
topology, specifies the CA server. SeePublic Key Infrastructure
Page, page B-57.
TableB-2 VPN Summary Page (continued)
Element Description