hit counter script

Protocol; Encryption; Login Time - Cisco VPN 3000 User Manual

Table of Contents

Advertisement

15
Monitoring

Protocol

The protocol that the session is using.
Console
Debug/Console
Debug/Telnet
FTP
HTTP
IPSec
IPSec/LAN-to-LAN
IPSec/NAT
L2TP
L2TP/IPSec
Other
PPTP
SNMP
Telnet
TFTP

Encryption

The data encryption algorithm that the session is using.
None
DES-40
DES-56
3DES-168
RC4-40 Stateless
packet.
RC4-40 Stateful
number of packets or whenever a packet is lost.
RC4-128 Stateless
packet.
RC4-128 Stateful
number of packets or whenever a packet is lost.

Login Time

The date and time that this session logged in: MM/DD/YYYY HH:MM:SS . Time is in 24-hour notation.
15-44
= directly connected console; no protocol.
= debugging via console (Cisco use only).
= debugging via Telnet (Cisco use only).
= File Transfer Protocol.
= Hypertext Transfer Protocol (Web browser).
= Internet Protocol Security tunneling protocol (remote-access user).
= IPSec LAN-to-LAN connection.
= IPSec through NAT (Network Address Translation).
= Layer 2 Tunneling Protocol.
= L2TP over IPSec.
= protocol other than those listed here.
= Point-to-Point Tunneling Protocol.
= Simple Network Management Protocol.
= terminal emulation protocol.
= Trivial File Transfer Protocol.
= no data encryption.
= Data Encryption Standard algorithm with a 56-bit key, 40 bits of which are private.
= DES encryption with a 56-bit key.
= Triple-DES encryption with a 168-bit key.
= RSA RC4 encryption with a 40-bit key, and with keys changed on every
= RSA RC4 encryption with a 40-bit key, and with keys changed after some
= RSA RC4 encryption with a 128-bit key, and with keys changed on every
= RSA RC4 encryption with a 128-bit key, and with keys changed after some
VPN 3000 Concentrator Series User Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents