Index

browser

1-1

 

 

Internet Explorer

1-1

 

IPSec over TCP

6-6

 

JavaScript

1-2

 

 

Netscape Navigator 1-1

 

RFC 1650, Ethernet interface MIB objects

13-53

RFC 1907, SNMP version 2 MIB objects

13-56

RFC 2011, ARP table entries 13-51

 

RFC 2011, IP and ICMP MIB objects 13-45,13-48

RFC 2012,TCP MIB objects

13-42

RFC 2013, UDP MIB objects

13-42

RFC 2459 12-50

 

root CA certificate 12-16

 

routing table (monitoring) 13-2

RRC4-128/MD5 SSL encryption algorithm 8-11RSA key, SSH 8-13

S

SAVELOG.TXT file

9-4,12-5,A-1

 

saving

 

 

 

configuration file with CLI

14-6

event log 13-5

 

 

 

log file on system reboot

9-4,12-5

SCEP

 

 

 

(Simple Certificate Enrollment Protocol),

definition

12-16

 

 

enrolling an identity certificate

12-41

enrolling SSL certificate

12-42

 

installing CA certificates

12-17

installing identity certificates

12-22,12-24

SCEP-enabled certificate

12-17

troubleshooting

12-17

 

 

screen

 

 

 

login, using HTTPS 1-17

 

 

SDRAM memory

13-9

 

 

secure connection

 

 

 

See also tunnel

 

 

 

tunnel 6-1

 

 

 

VPN 3002 Hardware Client Reference

Secure Shell protocol See SSH

 

Secure Sockets Layer See SSL

12-16

 

Security Associations (SAs)

6-2

 

self-signed certificates

 

 

 

CA certificates

12-16

 

 

 

SSL

12-16

 

 

 

 

 

 

SSL certificate, generating

12-33

 

server identity certificates

12-32

 

server key, SSH

8-13

 

 

 

 

servers

 

 

 

 

 

 

 

 

backup, configuring

6-3

 

 

backup, overview

6-4

 

 

 

configuring system access

5-1

 

remote, configuring

6-3

 

 

session idle timeout

 

 

 

 

live event log overrides

13-6

 

session key

 

 

 

 

 

 

 

SSH

8-13

 

 

 

 

 

 

 

Session Timeout (error)

A-5

 

 

severity level, events

9-3

 

 

 

shutdown system

12-5

 

 

 

Simple Certificate Enrollment Protocol See SCEP

Simple Network Management Protocol See SNMP

SNMP

 

 

 

 

 

 

 

 

configuring internal server

8-6

 

enabling

8-6

 

 

 

 

 

event trap destinations, configuring

9-12

add

9-13

 

 

 

 

 

 

modify

9-13

 

 

 

 

 

MIB-II statistics

13-56

 

 

 

port number

8-6

 

 

 

 

traps, configuring "well-known" 9-8

 

traps, configuring for specific events

9-11

SNMP communities

 

 

 

 

adding

8-8

 

 

 

 

 

 

configuring

8-7

 

 

 

 

modifying

 

8-8

 

 

 

 

 

software image

 

 

 

 

 

filenames

 

12-3,13-9

 

 

 

 

IN-8

OL-1893-01

 

 

 

 

Page 278
Image 278
Cisco Systems VPN 3002 manual Scep, IN-8

VPN 3002 specifications

Cisco Systems VPN 3002 is a versatile hardware device designed to provide secure remote access to corporate networks. As part of Cisco's family of VPN concentrators, the VPN 3002 is aimed at small to medium-sized businesses seeking to establish secure communications over the Internet.

One of the key features of the VPN 3002 is its ability to support a wide range of VPN protocols, including IPsec and L2TP. This flexibility allows businesses to tailor their security solutions to meet specific needs, thereby ensuring robust encryption and integrity for data in transit. The device also supports innovative technologies such as Clientless SSL VPN, enabling users to access corporate resources without the need for a full client installation.

Another vital characteristic of the VPN 3002 is its scalability. It can support multiple users while maintaining optimal performance due to its integrated firewall capabilities. This functionality allows organizations to manage user traffic effectively, ensuring that both security and efficiency are maintained during peak access periods.

Additionally, the VPN 3002 boasts advanced features like NAT traversal, which helps ensure that VPN connections can penetrate network address translation firewalls and other similar devices, thereby enhancing connectivity. It also features strong authentication mechanisms, including support for RADIUS and TACACS+, providing businesses with the ability to implement stringent user verification processes.

The device is designed with ease of use in mind. The setup process is relatively simple, and Cisco's intuitive web-based management interface makes it easy to configure and monitor VPN connections. Furthermore, the VPN 3002 comes with a variety of integrated tools for logging and reporting, allowing administrators to maintain comprehensive oversight of network activities.

In terms of hardware, the VPN 3002 is equipped with multiple Ethernet ports for network connectivity and can support a range of configurations to meet diverse organizational requirements. Its robust design ensures longevity and dependable operation, making it an ideal solution for businesses seeking reliable remote access capabilities.

In conclusion, Cisco Systems VPN 3002 provides a comprehensive solution for organizations looking to secure their remote connections. With its support for various protocols, scalable architecture, advanced security features, and ease of use, it stands out as a reliable choice for enhancing corporate network security.