Table Of Contents
A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -
Index
A
AAA, comparing VPN 3000 with ASA 1-6
AAA server groups, adding AAA hosts 5-23
AAA servers, tunnel group 2-3
accounting
management traffic, VPN 3000 vs. ASA 1-6
RADIUS, comparing VPN 3000 with ASA 1-6
ACL manager 5-16
ACLs
adding 5-15
bypassing
LAN-to-LAN IPSec traffic 4-20
remote access 4-32
comparing VPN 3000 with ASA 1-9
configuring for LAN-to-LAN 4-16
downloadable 1-4
adaptive security appliance, overview 2-1
Advanced Inspection and Prevention Security Services Module (AIPSSM) 1-3
AES 4-12
Aggressive Mode 1-3
AIP SSM 1-3
Are You There (AYT) firewall policy 5-9, 5-14
ASA system, overview 2-1
authentication, certificate 4-6
B
bandwidth reservation, comparing VPN 3000 with ASA 1-8
base group 2-2
C
Central Protection Policy (CPP) 5-9, 5-14
certificate enrollment
authenticating to the CA 4-6
generating key pairs 4-2
summary of steps 4-2
trustpoint configuration 4-4
certificate management in ASDM 4-8
CLI 1-3
client address assignment method, tunnel group 2-3
client configuration parameters, group policy 2-5
client firewall 5-13
Are You There (AYT) policy 5-9, 5-14
Central Protection Policy (CPP) 5-9, 5-14
configuring 5-9
allowing HTTP traffic 5-17
default 5-9
rules for firewall filters 5-9
group policy 5-11
local 5-9
policies 5-13
client firewall options, group policy 2-5
configuring
AAA hosts 5-23
ACLs 4-16, 5-15
address management method 3-3
address pools 5-20
administrator password 3-4
authentication 3-3
client firewall 5-9
crypto map, IPSec LAN-to-LAN tunnel 4-18
default client firewall 5-9
dynamic crypto map, remote-access tunnel 4-30
extended access list rule 5-15
external authentication 5-26
external server 5-20
external server group 5-21
group policy, client firewall 5-11
interfaces
IPSec LAN-to-LAN tunnel 4-10, 4-14
remote-access tunnel 4-22, 4-25
internal server user database 3-3
IP interfaces 3-2
IPSec group 3-3
IPSec LAN-to-LAN tunnel 4-9
ISAKMP policy
IPSec LAN-to-LAN tunnel 4-11
remote-access tunnel 4-23
load balancing 6-1
network list 5-1
QoS 6-5
RADIUS 5-20
split tunneling 5-1
system information 3-2
transform set, remote-access tunnel 4-27
tunnel group
IPSec LAN-to-LAN tunnel 4-17
remote-access tunnel 4-28
split tunneling 5-6
tunneling protocols and options 3-2
user access, remote-access tunnel 4-26
configuring users 1-3
connection timeout, TCP 1-4
connection type, tunnel group 2-3
crypto map
applying to interfaces 4-20
configuring for LAN-to-LAN 4-18
creating for using dynamic crypto map 4-32
D
data integrity, Phase 2, default setting 1-2
dbgtrace logging levels, security appliance 1-3
DefaultL2LGroup 2-2
DefaultRAGroup 2-2
Denial of Service (DoS) attack 1-3
DES, IKE policy keywords (table) 4-12
DfltGrpPolicy 2-3
Diffie-Hellman, groups supported 4-12
DNS servers, group policy 2-5
documentation
additional ix
cautions xi
notes xi
DoS attack 1-3
dynamic crypto map
configuring for remote access 4-30
crypto map usage 4-32
E
encryption algorithm, default 1-1
enrolling for certificate
authenticating to the CA 4-6
generating key pairs 4-2
summary of steps 4-1
trustpoint configuration 4-4
enrolling for identity certificate 4-7
extended access list rule 5-15
external authentication, configuring for tunnel group 5-26
external server
configuring 5-20
protocols supported 5-22
external server group, configuring 5-21
EzVPN client 2-6
F
fallback, VPN 3000 vs. ASA 1-6
feature map, VPN 3000 to security appliance 1-1
filters
comparing VPN 3000 with ASA 1-9
group policy 2-4
VPN 3000 1-4
firewall
client 5-9
unlocking, comparing VPN 3000 with ASA 1-9
firewall policy 5-13
firewall types 5-13
G
Group 5, Diffie Hellman 4-12
group policy
attributes 2-4
client firewall 5-11
default 2-3
defined 2-4
split tunneling 5-4
groups 2-2
H
HTTP traffic 5-17
hub-and-spoke configuration 1-3
hybrid server group, support on VPN 3000 vs. ASA 1-6
I
identity, group policy 2-4
identity certificate, enrolling 4-7
IKE
negotiation 1-2
Phase 2 Data Integrity, enabling 1-10
policy keywords 4-11
inspection, packet 1-3
interfaces
configuring for LAN-to-LAN 4-10
configuring for remote access 4-22, 4-25
IP address pool, configuring 5-20
IPSec
comparing VPN 3000 with ASA 1-6
LAN-to-LAN, permitting 4-20
parameters
group policy 2-5
tunnel group 2-3
remote access, permitting 4-32
tunnel mode 4-14
IPSec LAN-to-LAN tunnel
configuring ACLs 4-16
configuring crypto map 4-18
configuring interfaces 4-10, 4-14
configuring ISAKMP Policy 4-11
configuring tunnel group 4-17
ISAKMP
configuring 4-11, 4-23
enabling Phase 2 data integrity 1-10
K
key length, RSA 1-5
key pairs, generating 4-2
L
L2TP, L2TP over IPSec, and PPTP 1-1
LAN-to-LAN tunnel, configuring 4-9
license, comparing of VPN 3000 with ASA 1-5
load balancing
comparing VPN 3000 with ASA 1-7
configuring 6-1
logging, event, VPN 3000 1-3
low-latency queueing (LLQ), comparing VPN 3000 with ASA 1-8
low memory, action 1-2
M
management traffic accounting, VPN3000 vs. ASA 1-6
managing certificates in ASDM 4-8
MD5 4-12
memory red condition 1-2
minimum bandwidth guarantee, comparing VPN 3000 with ASA 1-8
modes, comparing VPN 3000 with ASA 1-7
N
navigation map for ASDM A-1
network list, configuring 5-1
network mask 1-4
nice reboot 1-2
O
object group, comparing VPN 3000 with ASA 1-7
P
packet inspection 1-3
permitting IPSec traffic
LAN-to-LAN 4-20
remote access 4-32
Phase 2 data integrity
default setting 1-2
enabling 1-2, 1-10
PKI
certificate 1-5
implementation on ASA 2-8
new CLI commands 2-8
policing, comparing VPN 3000 with ASA 1-8
protocols, external servers 5-22
Q
Quality of Service (QoS)
comparing VPN 3000 with ASA 1-8
configuring 6-5
Quick Configuration program, VPN 3000 3-1
R
RADIUS accounting, VPN 3000 vs. ASA 1-6
RADIUS server, configuring 5-20
reboot, nice 1-2
related documentation x
remote-access tunnel
configuring 4-21
configuring dynamic crypto map 4-30
configuring interfaces 4-22, 4-25
configuring ISAKMP policy 4-23
configuring transform set 4-27
configuring tunnel group 4-28
configuring user access 4-26
RSA key length 1-5
S
servers, group policy 2-5
service policy rule wizard 6-5
session timeout, TCP 1-4
SHA, IKE policy keywords (table) 4-12
Split DNS 5-8
split tunneling
configuring 5-1
firewalls 5-9
group policy 5-4
tunnel group 5-6
syslog levels, security appliance 1-3
T
TCP connection timeout 1-4
timeout, TCP connection 1-4
transform set, configuring for remote access 4-27
Triple DES, IKE policy keyword (table) 4-12
trustpoint 1-5, 4-4
tunnel group
attributes 2-2
configuring for LAN-to-LAN 4-17
configuring for remote access 4-28
default 2-2
external authentication 5-26
tunneling protocols, group policy 2-4
U
user management, differences from the VPN 3000 2-2
users
account attributes 2-7
adding for remote access 4-26
configuring 1-3
V
VPN 3000 features in ASA 2-1
VPN 3002 hardware client See EzVPN client
VPN client
configuring a client firewall to allow HTTP traffic 5-17
firewall options 5-9
firewall policy 5-14
stateful firewall 5-13
VPN Wizard 3-4
W
WebVPN
comparing VPN 3000 with ASA 1-5
connection parameters, group policy 2-6
wildcard mask 1-4
WINS servers, group policy 2-5
wizards
service policy rule 6-5
VPN 3-4