Appendix B Site-to-Site VPN User Interface Reference

 

 

 

Site-to-Site VPN Manager Window

 

Table B-2

VPN Summary Page (continued)

 

 

 

 

 

Element

 

Description

 

 

 

 

 

Primary Hub

 

Available if the VPN topology type is hub-and-spoke.

 

 

 

The name of the primary hub in the hub-and-spoke topology.

 

 

 

 

 

Failover Hubs

 

Available if the VPN topology type is hub-and-spoke.

 

 

 

The name of any secondary backup hubs that are configured in the

 

 

 

hub-and-spoke topology.

 

 

 

 

Number of Spokes

Available if the VPN topology type is hub-and-spoke.

 

 

 

The number of spokes that are included in the hub-and-spoke

 

 

 

topology.

 

 

 

 

 

Peer 1

 

Available if the VPN topology type is point-to-point.

 

 

 

The name of the device that is defined as Peer One in the

 

 

 

point-to-point VPN topology.

 

 

 

 

 

Peer 2

 

Available if the VPN topology type is point-to-point.

 

 

 

The name of the device that is defined as Peer Two in the

 

 

 

point-to-point VPN topology.

 

 

 

 

Number of Peers

Available if the VPN topology type is full mesh.

 

 

 

The number of devices included in the full mesh VPN topology.

 

 

 

 

IPSec Technology

The IPSec technology assigned to the VPN topology. See

 

 

 

Understanding IPSec Technologies and Policies, page 9-8.

 

 

 

 

 

IKE Proposal

 

The security parameters of the IKE proposal configured in the VPN

 

 

 

topology. See IKE Proposal Page, page B-37.

 

 

 

 

 

Transform Sets

 

The transform sets that specify the authentication and encryption

 

 

 

algorithms that will be used to secure the traffic in the VPN tunnel.

 

 

 

See IPSec Proposal Page, page B-39.

 

 

 

 

 

Preshared Key

 

Unavailable if the selected technology is Easy VPN.

 

 

 

Specifies whether the shared key to use in the preshared key policy

 

 

 

is user defined or auto-generated. See Preshared Key Page,

 

 

 

page B-53.

 

 

 

 

Public Key Infrastructure

If a Public Key Infrastructure policy is configured in the VPN

 

 

 

topology, specifies the CA server. See Public Key Infrastructure

 

 

 

Page, page B-57.

 

 

 

 

 

 

 

 

 

 

User Guide for Cisco Security Manager 3.0.1

 

 

 

 

 

 

 

 

OL-8214-02

 

 

 

B-5

 

 

 

 

Page 5
Image 5
3D Innovations 3.0.1 Understanding IPSec Technologies and Policies, Topology. See IKE Proposal Page, page B-37, B-53