user manual

xv
Cisco VPN 5000 Concentrator Software Configuration Guide, Software Version 6.0.x
OL-1287-01
About This Guide
Document Conventions
Chapter 7, “Configuring the IKE Policy for IPSec Tunnel Security, tells you
how to configure VPN tunnel security for IPSec clients and LAN-to-LAN
tunnels.
Chapter 8, “Configuring VPN Groups, tells you how to create VPN groups
for use with the VPN 5000 client or L2TP client.
Chapter 9, “Authenticating VPN Users, describes systems you can use to
authenticate users for VPN groups.
Chapter 10, “Configuring VPN LAN-to-LAN Tunnels, tells you how to
create a LAN-to-LAN tunnel between two concentrators.
Chapter 11, “Installing Certificates on the Concentrator, tells you how to
install root and server certificates on the concentrator for authentication.
Chapter 12, “Sample Configurations, includes sample configuration
diagrams and text configuration files.
Appendix A, “Installing the Software and Configuration, tells you how to
install or upgrade the VPN 5000 concentrator software, and how to copy the
configuration files to or from Flash memory.
Appendix D, “Configuring the Firewall for VPN, tells you how to configure
a firewall for VPN traffic.
Appendix B, “Recovering from a Software Failure, tells you how to recover
the system from a software failure.
Appendix C, “Syntax Conventions, describes the syntax conventions for the
command line interface and the text configuration file.
Appendix E, “IP Addressing, describes IP address classes and private
addresses, and indicates how to determine the subnet mask.
The Index provides easy access to topics within the guide.
Document Conventions
The following conventions are used in this guide:
Note Means reader take note. Notes contain helpful suggestions or references to
material not covered in the manual.