Preface
Chapter 6, Address Management explains how to configure client IP addresses available in your private
network addressing scheme, that let the client function as a VPN tunnel endpoint.
Chapter 7, Tunneling Protocols explains how to configure system-wide parameters for PPTP and L2TP,
how to configure IPSec LAN-to-LAN connections, and how to configure IKE proposals for IPSec. These
are the three most popular VPN tunneling protocols.
Chapter 8, IP Routing explains how to configure static routes, default gateways, and OSPF in the VPN
Concentrator IP routing subsystem; how to configure DHCP global parameters; and how to configure
redundant systems using VRRP.
Chapter 9, Management Protocols explains how to configure built-in VPN Concentrator servers that
provide management functions: FTP, HTTP and HTTPS, TFTP, Telnet, SNMP, and SSL.
Chapter 10, Events explains how to configure system events such as alarms, traps, error conditions,
network problems, task completion, or status changes. You can specify several ways to record and send
event messages.
Chapter 11, General explains how to configure the system identification, date, and time.
Chapter 12, User Management explains how to configure groups and users with attributes that determine
their access to and use of the VPN. Configuring groups and users correctly is essential for managing the
security of your VPN.
Chapter 13, Policy Management explains how to configure network lists, filters, rules, and Security
Associations, which are policies that govern what data traffic can flow through the VPN. You should
develop and configure policies first, since you apply them to groups, users, and interfaces. This chapter
also describes NAT configuration.
Chapter 14, Administration explains how to configure and use high-level VPN Concentrator
administrator activities such as who is allowed to configure the system, what software runs on it,
rebooting and shutting down the system, managing its files, and managing X.509 digital certificates.
Chapter 15, Monitoring explains the many status, statistics, sessions, and event log screens that you can
use to monitor the VPN Concentrator.
Chapter 16, Using the Command Line Interface explains how to use the built-in menu- and
command-line-based administrative management system via the system console or a Telnet session.
With the CLI, you can access and configure all the same parameters as the HTML-based VPN
Concentrator Manager.
Appendix A, Errors and troubleshooting describes common errors that may occur while configuring the
system, and how to correct them. It also describes all system and module LED indicators.
Appendix B, Copyrights, licenses, and notices provides all copyright and license information for Cisco
software on the VPN Concentrator, and for software that the system uses under license from other firms.
Additional Documentation
The VPN 3000 Concentrator Series Getting Started manual provides information to take you from
unpacking and installing the VPN Concentrator, through configuring the minimal parameters to make it
operational (called Quick Configuration).
The VPN Concentrator Manager also includes extensive context-sensitive online help that you can
access by clicking the Help icon on the toolbar in the Manager window.
The VPN 3000 Client User Guide explains how to install, configure, and use the Cisco VPN 3000 Client,
which lets a remote client use the IPSec tunneling protocol for secure connection to a private network
through the VPN Concentrator.
xxxviii
VPN 3000 Concentrator Series User Guide