User's Manual

Table Of Contents
Index 3
E
edit 5-5, 5-27, 6-8
connections 5-5, 5-27
distinguished name 5-16
proposals 5-27
security policy 5-27
enable log file 5-3
Encapsulating Security Payload B-3
Encapsulating Security Protocol (ESP) 9-10
encapsulation methods 9-10
encryption algorithms 9-10
end secure connection manually 7-2
Enh KeyUsage 6-6
ESP B-3
ESP (Encapsulating Security Protocol) 9-10
export 6-8, 6-19, 6-24
CA certificates 6-19
certificates 6-19, 6-24
personal certificates 6-24
private key with personal certificate 6-8
RA certificates 6-19
F
firewall 5-9, 6-6
gateway devices 5-9
if protecting Internet access 6-6
freeze the Log Viewer 9-3
G
gateways 5-9
configure 5-9
DNS name 5-9
hostname 5-9
IP address 5-9
generic security policy 5-5, 5-9, 5-24
Global Policy Settings 5-3
H
hash algorithms 9-10
manual keys 9-10
HTTP proxy server 6-5, 6-6
I
IANA
contacting A-2
icon 9-2
Remove from system tray 9-2
Restore to system tray 9-2
ID types 5-5, 5-9, 5-10
My Identity 5-10
redundant gateway 5-9
remote party 5-5
Secure Gateway Tunnel 5-9
IETF A-1
Web site address A-7
IKE (Internet Key Exchange) 5-12
IKE resend retries 5-3
IKE Security Association B-4
import 5-28, 6-7, 6-15, 6-27
CA certificates 6-7
certificate files 6-7, 6-15
certificate request response file 6-15
certificates 6-7, 6-15
CRL 6-27
personal certificates 6-15
private key files 6-15
RA certificates 6-7
security policy 5-28
inbound keys 9-11
initiate secure connection manually 7-2
Internet Explorer, Microsoft 6-3, 6-18
Internet Key Exchange (IKE) B-3
Internet Protocol security B-1
Intranets B-1
IP addresses
and NAT A-8
and the Internet A-2
assigning A-2, A-9
private A-7
translating A-9
IP configuration by DHCP A-10
IPSec B-1