Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number:
Text Part Number: OL-5490-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, Cisco Unity, Follow Me Browsing, FormShare, and StackWise are trademarks of Cisco Systems, Inc.;
Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA,
CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo,
Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net
Readiness Scorecard, LightStream, MGX, MICA, the Networkers logo, Networking Academy, Network Registrar, Pac ket , PIX, Post-Routing, Pre-Routing, RateMUX, Registrar,
ScriptShare, SlideCast, SMARTnet, StrataView Plus, Stratm, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO are registered
trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0304R)
Mutual Group Authentication4-4
Certificate Authentication4-4
Transport Parameters4-6
Enable Transport Tunneling4-7
Transparent Tunneling Mode4-7
Allow Local LAN Access4-7
Peer Response Timeout4-8
Backup Servers4-8
Contents
CHAPTER
CHAPTER
5Establishing a VPN Connection5-1
Checking Prerequisites5-1
Establishing a Connection5-1
Connecting to a Default Connection Entry5-3
Choosing Authentication Methods5-3
Shared Key Authentication5-3
VPN Group Name and Password Authentication5-4
RADIUS Server Authentication5-4
SecurID Authentication5-5
Using Digital Certificates5-6
6Enrolling and Managing Certificates6-1
Using the Certificate Store6-1
Enrolling Certificates6-2
Managing Enrollment Requests6-5
Viewing the Enrollment Request6-5
Deleting an Enrollment Request6-5
Changing the Password on an Enrollment Request6-6
Retrying an Enrollment Request6-6
OL-5490-01
Importing a Certificate6-7
Viewing a Certificate6-7
Exporting a Certificate6-9
Deleting a Certificate6-10
Verifying a Certificate6-11
Changing the Password on a Personal Certificate6-12
VPN Client User Guide for Mac OS X
v
Contents
CHAPTER
I
NDEX
7Managing the VPN Client7-1
Managing Connection Entries7-1
Importing a Connection Entry7-1
Modifying a Connection Entry7-2
Deleting a Connection Entry7-3
Event Logging7-4
Enable Logging7-4
Clear Logging7-5
Set Logging Options7-5
Opening the Log Window7-7
This VPN Client User Guide describes how to install, use, and manage the Cisco VPN Client for the
Macintosh operating system, Version 10.2 or later. You can manage the VPN Client for Mac OS X from
the graphical user interface or from the command-line interface.
The VPN Client for Mac OS X installer program installs both the graphical user interface and the
command-line version of the VPN Client.
Contents
This guide is for remote clients who want to set up virtual private network (VPN) connections to a central
site. Network administrators can also use this guide for information about configuring and managing
VPN connections for remote clients. You should be familiar with the Macintosh platform and know how
to use Macintosh applications. Network administrators should be familiar with Macintosh system
configuration and management and know how to install, configure, and manage internetworking
systems.
This guide contains the following chapters:
• Chapter 1, “Understanding the VPN Client.” This chapter describes how the VPN Client software
works and lists the main features.
• Chapter 2, “Installing the VPN Client.” This chapter describes how to install the VPN Client
software application.
• Chapter 3, “Navigating the User Interface.” This chapter describes the main VPN Client window
and the tools, tabs, menus and icons for navigating the user interface.
• Chapter 4, “Configuring Connection Entries.” This chapter describes how to configure VPN Client
connection entries, including optional parameters.
• Chapter 5, “Establishing a VPN Connection.” This chapter describes how to connect to a private
network using the VPN Client, an Internet connection, and the user authentication methods
supported by the VPN Client.
• Chapter 6, “Enrolling and Managing Certificates.” This chapter describes how to obtain digital
certificates to use for authentication and how to manage these certificates in the VPN Client
certificate store.
OL-5490-01
VPN Client User Guide for Mac OS X
vii
Related Documentation
• Chapter 7, “Managing the VPN Client.” This chapter describes how to manage VPN Client
connections, use the event log, and view tunnel details, including packet and routing data.
Related Documentation
The following is a list of user guides and other documentation related to the VPN Client for Mac OS X
and the VPN devices that provide the connection to the private network.
• Release Notes for the Cisco VPN Client, Release 4.6
• Cisco VPN 3000 Series Concentrator Reference Volume II: Administration and Monitoring, Release
4.1
About This Guide
Terminology
In this user guide:
• The term Cisco VPN device refers to the following Cisco products:
–
Cisco IOS devices that support Easy VPN server functionality
–
Cisco VPN 3000 Series Concentrators
–
Cisco PIX Firewall Series
• The term “PC” refers generically to any personal computer.
• The term click means click the left button on a normally-configured multi-button mouse. The term
right-click means click the right button on a normally-configured multi-button mouse. If your mouse
has only one button, use Ctrl-Click to access the right-click menus.
Document Conventions
This guide uses the following typographic conventions:
• Boldface font—Describes user actions and commands.
• Italic font—Describes arguments that you supply the values for.
• Screen font—Describes terminal sessions and information displayed by the system.
• Boldface screen font—Describes information that you must enter.
viii
Notes use the following conventions:
NoteMeans reader take note. Notes contain helpful suggestions or references to material not covered in the
publication.
Cautions use the following conventions:
VPN Client User Guide for Mac OS X
OL-5490-01
About This Guide
CautionMeans reader be careful. Cautions alert you to actions or conditions that could result in equipment
Data Formats
Obtaining Documentation
damage or loss of data.
When you configure the VPN Client, enter data in these formats unless the instructions indicate
otherwise.
• IP Address—Use standard 4-byte dotted decimal notation (for example, 192.168.12.34). You can
omit leading zeros in a byte position.
• Hostnames—Use legitimate network host or end-system name notation (for example, VPN01).
Spaces are not allowed. A hostname must uniquely identify a specific system on a network. A
hostname can be up to 255 characters in length.
• User names and Passwords—Text strings for user names and passwords use alphanumeric characters
in both upper- and lower-case. Most text strings are case sensitive. For example, simon and Simon
would represent two different user names. The maximum length of user names and passwords is
generally 32 characters, unless specified otherwise.
Obtaining Documentation
Cisco provides several ways to obtain documentation, technical assistance, and other technical
resources. These sections explain how to obtain technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation on the World Wide Web at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
International Cisco web sites can be accessed from this URL:
Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM
package, which may have shipped with your product. The Documentation CD-ROM is updated monthly
and may be more current than printed documentation. The CD-ROM package is available as a single unit
or through an annual subscription.
Registered Cisco.com users can order the Documentation CD-ROM (product number
DOC-CONDOCCD=) through the online Subscription Store:
OL-5490-01
http://www.cisco.com/go/subscription
VPN Client User Guide for Mac OS X
ix
Obtaining Technical Assistance
Ordering Documentation
You can find instructions for ordering documentation at this URL:
• Registered Cisco.com users can order the Documentation CD-ROM (Customer Order Number
DOC-CONDOCCD=) through the online Subscription Store:
http://www.cisco.com/go/subscription
• Nonregistered Cisco.com users can order documentation through a local account representative by
calling Cisco Systems Corporate Headquarters (California, U.S.A.) at 408 526-7208 or, elsewhere
in North America, by calling 800 553-NETS (6387).
About This Guide
Documentation Feedback
You can submit comments electronically on Cisco.com. On the Cisco Documentation home page, click
Feedback at the top of the page.
You can e-mail your comments to bug-doc@cisco.com.
You can submit your comments by mail by using the response card behind the front cover of your
document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Obtaining Technical Assistance
Cisco provides Cisco.com, which includes the Cisco Technical Assistance Center (TAC) Website, as a
starting point for all technical assistance. Customers and partners can obtain online documentation,
troubleshooting tips, and sample configurations from the Cisco TAC website. Cisco.com registered users
have complete access to the technical support resources on the Cisco TAC website, including TAC tools
and utilities.
Cisco.com
VPN Client User Guide for Mac OS X
x
Cisco.com offers a suite of interactive, networked services that let you access Cisco information,
networking solutions, services, programs, and resources at any time, from anywhere in the world.
Cisco.com provides a broad range of features and services to help you with these tasks:
• Streamline business processes and improve productivity
• Resolve technical issues with online support
OL-5490-01
About This Guide
• Download and test software packages
• Order Cisco learning materials and merchandise
• Register for online skill assessment, training, and certification programs
To obtain customized information and service, you can self-register on Cisco.com at this URL:
http://www.cisco.com
Technical Assistance Center
The Cisco TAC is available to all customers who need technical assistance with a Cisco product,
technology, or solution. Two levels of support are available: the Cisco TAC website and the Cisco TAC
Escalation Center. The avenue of support that you choose depends on the priority of the problem and the
conditions stated in service contracts, when applicable.
We categorize Cisco TAC inquiries according to urgency:
• Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities,
product installation, or basic product configuration.
• Priority level 3 (P3)—Your network performance is degraded. Network functionality is noticeably
impaired, but most business operations continue.
Obtaining Technical Assistance
Cisco TAC Website
You can use the Cisco TAC website to resolve P3 and P4 issues yourself, saving both cost and time. The
site provides around-the-clock access to online tools, knowledge bases, and software. To access the
Cisco TAC website, go to this URL:
http://www.cisco.com/tac
All customers, partners, and resellers who have a valid Cisco service contract have complete access to
the technical support resources on the Cisco TAC website. Some services on the Cisco TAC website
require a Cisco.com login ID and password. If you have a valid service contract but do not have a login
ID or password, go to this URL to register:
http://tools.cisco.com/RPF/register/register.do
If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco
TAC website, you can open a case online at this URL:
http://www.cisco.com/en/US/support/index.html
If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC
website so that you can describe the situation in your own words and attach any necessary files.
• Priority level 2 (P2)—Your production network is severely degraded, affecting significant aspects
of business operations. No workaround is available.
• Priority level 1 (P1)—Your production network is down, and a critical impact to business operations
will occur if service is not restored quickly. No workaround is available.
OL-5490-01
VPN Client User Guide for Mac OS X
xi
Obtaining Additional Publications and Information
Cisco TAC Escalation Center
The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These
classifications are assigned when severe network degradation significantly impacts business operations.
When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer
automatically opens a case.
To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:
Before calling, please check with your network operationscenter to determine the level of Cisco support
services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network
Supported Accounts (NSA). When you call the center, please have available your service agreement
number and your product serial number.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online
and printed sources.
• The Cisco Product Catalog describes the networking products offered by Cisco Systems as well as
ordering and customer support services. Access the Cisco Product Catalog at this URL:
• Cisco Press publishes a wide range of networking publications. Cisco suggests these titles for new
and experienced users: Internetworking Terms and Acronyms Dictionary, Internetworking
Technology Handbook, Internetworking Troubleshooting Guide, and the Internetworking Design
Guide. For current Cisco Press titles and other information, go to Cisco Press online at this URL:
http://www.ciscopress.com
• Pack et magazine is the Cisco monthly periodical that provides industry professionals with the latest
information about the field of networking. You can access Packet magazine at this URL:
• Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in the design, development, and operation of public and private internets and
intranets. You can access the Internet Protocol Journal at this URL:
The Cisco VPN Client for Mac OS X is a software application that runs on any Macintosh computer
using operating system Version 10.2 or later. The VPN Client on a remote PC, communicating with a
Cisco VPN device on an enterprise network or with a service provider, creates a secure connection over
the Internet. This connection allows you to access a private network as if you were an on-site user,
creating a Virtual Private Network (VPN).
The following VPN devices can terminate VPN connections from VPN Clients:
• Cisco IOS devices that support Easy VPN server functionality
• VPN 3000 Series Concentrators
• Cisco PIX Firewall Series, Version 6.2 or later
With the graphical user interface for the VPN Client for Mac OS X, you can establish a VPN connection
to a private network; manage connection entries, certificates, events logging; and view tunnel routing
data.
You can also manage the VPN Client for Mac OS X using the command-line interface (CLI). If you are
running Darwin, or if you prefer to manage the VPN Client from the CLI, refer to the Cisco VPN Client Administration Guide.
Connection Technologies
The VPN Client lets you use any of the following technologies to connect to the Internet:
• POTS (Plain Old Telephone Service)—Uses a dial-up modem to connect.
• ISDN (Integrated Services Digital Network)—May use a dial-up modem to connect.
• Cable—Uses a cable modem; always connected.
• DSL (Digital Subscriber Line)—Uses a DSL modem; always connected.
You can also use the VPN Client on a PC with a direct LAN connection.
OL-5490-01
VPN Client User Guide for Mac OS X
1-1
VPN Client Overview
VPN Client Overview
The VPN Client works with a Cisco VPN device to create a secure connection, called a tunnel, between
your computer and a private network. It uses Internet Key Exchange (IKE) and Internet Protocol Security
(IPSec) tunneling protocols to establish and manage the secure connection.
The steps used to establish a VPN connection can include:
• Establishing VPN tunnels according to the parameters
• Authenticating users (from usernames, group names and passwords, and X.509 digital certificates.)
• Establishing user access rights (hours of access, connection time, allowed destinations, allowed
protocols)
• Managing security keys for encryption and decryption
• Authenticating, encrypting, and decrypting data through the tunnel
For example, to use a remote PC to read e-mail at your organization, the connection process might be
similar to the following:
Chapter 1 Understanding the VPN Client
Step 1Connect to the Internet.
Step 2Start the VPN Client.
Step 3Establish a secure connection through the Internet to your organization’s private network.
Step 4When you open your e-mail
• The Cisco VPN device
–
Uses IPSec to encrypt the e-mail message
–
Transmits the message through the tunnel to your VPN Client
• The VPN Client
–
Decrypts the message so you can read it on your remote PC
–
Uses IPSec to process and return the message to the private network through the Cisco VPN
device.
1-2
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 1 Understanding the VPN Client
VPN Client Features
The tables in the following sections describe the VPN Client features.
Table 1 - 1 lists the VPN Client main features.
Table 1-1VPN Client Main Features
FeaturesDescription
Operating SystemMac OS Version 10.2 or later
Connection types
ProtocolIP
Tunnel protocolIPSec
User Authentication
VPN Client Features
• async serial PPP
• Internet-attached Ethernet
• DSL
NoteThe VPN Client for Mac OS X does not support Bluetooth
wireless technology.
• RADIUS
• RSA SecurID
Program Features
The VPN Client supports the Program features listed in Tab l e 1- 2 .
Table 1-2Program Features
Program FeatureDescription
Servers Supported
Interfaces supported
Online HelpComplete browser-based context-sensitive Help
Local LAN accessThe ability to access resources on a local LAN while connected
• VPN server internal user list
• PKI digital certificates
• NT Domain (Windows NT)
• Cisco IOS devices that support Easy VPN server functionality
• VPN 3000 Series Concentrators
• Cisco PIX Firewall Series, Version 6.2 or later
• Graphical user interface
• Command line interface
NoteThe online help requires MS Internet Explorer.
through a secure gateway to a central-site VPN server (if the central
site grants permission).
OL-5490-01
VPN Client User Guide for Mac OS X
1-3
VPN Client Features
Chapter 1 Understanding the VPN Client
Table 1-2Program Features (continued)
Program FeatureDescription
Automatic VPN Client
configuration option
Event loggingThe VPN Client log collects events for viewing and analysis.
NAT Transparency (NAT-T)Enables the VPN Client and the VPN device to automatically detect
Update of a centrally controlled
backup server list
Set MTU sizeThe VPN Client automatically sets a size that is optimal for your
Support for Dynamic DNS
(DDNS hostname population)
NotificationsSoftware update notifications from the VPN server upon
Launching from notificationAbility to launch a location site containing upgrade software from a
Alerts (Delete with reason)The VPN Client provides you with a reason code or reason text
The ability to import a configuration file.
when to use IPSec over UDP to work properly in Port Address
Translation (PAT) environments.
The VPN Client learns the backup VPN server list when the
connection is established. This feature is configured on the VPN
device and pushed to the VPN Client. The backup servers for each
connection entry are listed on the Backup Servers tab.
environment. However, you can also set the MTU size manually. For
information on adjusting the MTU size, see the VPN Client Administrator Guide.
The VPN Client sends its hostname to the VPN device when the
connection is established. If this occurs, the VPN device can send
the hostname in a DHCP request. This causes the DNS server to
update its database to include the new hostname and VPN Client
address.
connection.
VPN server notification.
when a disconnect occurs. The VPN Client supports the delete with
reason function for client-initiated disconnects,
concentrator-initiated disconnects, and IPSec deletes.
1-4
• If you are using a GUI VPN Client, a pop-up message appears
stating the reason for the disconnect, the message is appended
to the Notifications log, and is logged in the IPSec log (Log
Viewer window).
• If you are using a command-line client, the message appears on
your terminal and is logged in the IPSec log.
• For IPSec deletes, which do not tear down the connection, an
event message appears in the IPSec log file, but no message
pops up or appears on the terminal.
NoteThe VPN Concentrator you are connected to must be
running software version 4.0 or later.
Single-SAThe ability to support a single security association (SA) per VPN
connection. Rather than creating a host-to-network SA pair for each
split-tunneling network, this feature provides a host-to-ALL approach,
creating one tunnel for all appropriate network traffic apart from
whether split-tunneling is in use.
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 1 Understanding the VPN Client
Table 1-2Program Features (continued)
Program FeatureDescription
Connect on openThis feature lets a user connect to the default user profile when starting
VPN Client APIVPN Client provides an application programming interface for
Authentication Features
The VPN Client supports the authentication features listed in Tab l e 1-3.
Table 1-3Authentication Features
Authentication FeatureDescription
User authentication through
VPN central-site device
VPN Client Features
the VPN Client. You can enable this feature on the Preferences menu
under the VPN Client tab.
performing VPN Client tasks without using the command-line or
graphical interfaces that Cisco provides. This API comes with a user
guide for programmers, which is in a format that can be edited.
• Internal through the VPN device’s database
• RADIUS (Remote Authentication Dial-In User Service)
IPSec Features
• NT Domain (Windows NT)
• RSA (formerly SDI) SecurID or SoftID
Certificate ManagementAllows you to manage the certificates in the certificate stores.
Certificate Authorities (CAs)CAs that support PKI SCEP enrollment.
Peer Certificate Distinguished
Name Verification
Prevents a VPN Client from connecting to an invalid gateway by
using a stolen but valid certificate and a hijacked IP address. If the
attempt to verify the domain name of the peer certificate fails, the
VPN Client connection also fails.
The VPN Client supports the IPSec features listed in Tab le 1 -4
IKE KeepalivesA tool for monitoring the continued presence of a peer and report
the VPN Client’s continued presence to the peer. This lets the VPN
Client notify you when the peer is no longer present. Another type
of keepalives keeps NAT ports alive.
OL-5490-01
VPN Client User Guide for Mac OS X
1-5
VPN Client Features
Chapter 1 Understanding the VPN Client
Table 1-4IPSec Features (continued)
IPSec FeatureDescription
Split tunnelingThe ability to simultaneously direct packets over the Internet in
clear text and encrypted through an IPSec tunnel. The VPN device
supplies a list of networks to the VPN Client for tunneled traffic.
You enable split tunneling on the VPN Client and configure the
network list on the VPN device.
Support for Split DNSThe ability to direct DNS packets in clear text over the Internet to
domains served through an external DNS (serving your ISP) or
through an IPSec tunnel to domains served by the corporate DNS.
The VPN server supplies a list of domains to the VPN Client for
tunneling packets to destinations in the private network. For
example, a query for a packet destined for corporate.com would go
through the tunnel to the DNS that serves the private network, while
a query for a packet destined for myfavoritesearch.com would be
handled by the ISP's DNS. This feature is configured on the VPN
server (VPN Concentrator) and enabled on the VPN Client by
default. To use Split DNS, you must also have split tunneling
configured.
VPN Client IPSec Attributes
The VPN Client supports the IPSec attributes listed in Ta ble 1 -5.
Table 1-5IPSec Attributes
IPSec AttributeDescription
Main Mode and Aggressive
Mode
Authentication algorithms
Authentication Modes
Diffie-Hellman Groups
Ways to negotiate phase one of establishing ISAKMP Security
Associations (SAs)
• HMAC (Hashed Message Authentication Coding) with MD5
(Message Digest 5) hash function
• HMAC with SHA-1 (Secure Hash Algorithm) hash function
• Preshared Keys
• Mutual Group Authentication
• X.509 Digital Certificates
• Group 1 = 768-bit prime modulus
• Group 2 = 1024-bit prime modulus
• Group 5 = 1536 prime modulus
NoteSee the Cisco VPN Client Administrator Guide for more
information about DH Group 5.
1-6
Encryption algorithms
VPN Client User Guide for Mac OS X
• 56-bit DES (Data Encryption Standard)
• 168-bit Triple-DES
• AES 128-bit and 256-bit
OL-5490-01
Chapter 1 Understanding the VPN Client
Table 1-5IPSec Attributes (continued)
IPSec AttributeDescription
Extended Authentication
(XAUTH)
Mode ConfigurationAlso known as ISAKMP Configuration Method
Tunnel Encapsulation Modes
IP compression (IPCOMP) using
LZS
VPN Client Features
The capability of authenticating a user within IKE. This
authentication is in addition to the normal IKE phase 1
authentication, where the IPSec devices authenticate each other.
The extended authentication exchange within IKE does not replace
the existing IKE authentication.
• IPSec over UDP (NAT/PAT)
• IPSec over TCP (NAT/PAT)
Data compression algorithm
OL-5490-01
VPN Client User Guide for Mac OS X
1-7
VPN Client Features
Chapter 1 Understanding the VPN Client
1-8
VPN Client User Guide for Mac OS X
OL-5490-01
Installing the VPN Client
This chapter describes how to install the VPN Client for Mac OS X.
Verifying System Requirements
The VPN Client for Mac OS X runs on any Power Macintosh or compatible computer with the Macintosh
operating system Versions 10.2 or later and 30 MB of hard disk space.
Mac OS X VPN Clients support only single interface FastEthernet network adapters. This VPN Client
does not support any multiport adapters.
Gathering Information You Need
CHA P TER
2
To configure and use the VPN Client, you might need the following information.
You can normally obtain this information from the system administrator of the private network you want
to access. The system administrator might have preconfigured much of this data.
• Hostname or IP address of the secure gateway you are connecting to
• Your IPSec Group Name (for preshared keys)
• Your IPSec Group Password (for preshared keys)
• If authenticating with a digital certificate, the name of the certificate
• If authenticating through one of the following methods, your username and password
–
The secure gateway’s internal server
–
A RADIUS server
–
An NT Domain server
• If authenticating through a token vendor, your username and PIN
• If you are configuring backup server connections, the hostnames or IP addresses of the backup
servers
OL-5490-01
VPN Client User Guide for Mac OS X
2-1
Obtaining the VPN Client Software
Obtaining the VPN Client Software
The VPN Client software is available from the Cisco website and comes as a disk image file
(vpnclient-<version>-GUI.k9.dmg). Only system administrators can obtain and distribute the VPN
Client software.
To obtain the installer:
Step 1Copy or download the image file to your Desktop.
Step 2Double-click to extract the VPN Client installer to your Desktop.
Step 3The image file remains on the Desktop.
Preconfiguring the VPN Client
This section describes how to distribute preconfigured configuration files (user profiles) and GUI
preference files to the VPN Client installer.
Chapter 2 Installing the VPN Client
• To distribute custom user profiles to the installer program, place the files in the Profiles folder of the
VPN Client installer.
• To distribute custom images, place the files in the Resources folder of the VPN Client installer.
• To distribute custom global profiles, place the vpnclient.ini in the VPN Client installer directory.
NoteRefer to the Cisco VPN Client Administrator Guide for information on creating user profiles, global
profiles, and the complete list of file parameters, keywords, and values.
To access the installer directory
Step 1Double-click the vpnclient installer icon. (Figure 2-1).
Figure 2-1Installer Icon
Alternately, you can right-click (control-click) the VPN Client installer icon and choose Open from the
menu.
2-2
Figure 2-2 shows the vpnclient installer directory. This directory contains the installer package and any
preconfigured files in the Profiles and Resources folders.
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 2 Installing the VPN Client
Figure 2-2VPN Client Installer Directory
Preconfiguring the User Profile
Preconfiguring the VPN Client
The VPN Client uses parameters that must be uniquely configured for each remote user of the private
network. Together these parameters make up a user profile, which is contained in a profile configuration
file (.pcf file).
To distribute preconfigured profiles, copy the configuration files (.pcf files) into the Profiles folder in
the vpnclient installer directory.
Any file with a .pcf extension found in this folder is placed in the Profiles directory when the VPN Client
is installed.
Preconfiguring the Global Profile
A global profile sets rules for all remote users; it contains parameters for the VPN Client as a whole. The
name of the global profile file is vpnclient.ini.
The vpnclient.ini file controls the following features:
• Control of logging services by class
• Certificate enrollment
• Missing group warning message
• VPN Client GUI preferences, such as window locations and sizes
If you do not preconfigure a global profile, the vpnclient.ini file is populated with default settings. Each
time you make changes, the vpnclient.ini file is updated and stored.
OL-5490-01
VPN Client User Guide for Mac OS X
2-3
Chapter 2 Installing the VPN Client
Bundling a Root Certificate with the Installation Package for Darwin
Bundling a Root Certificate with the Installation Package for
Darwin
To use mutual authentication, the VPN Client computer must have a root certificate installed. You can
bundle a root certificate with the installation package so that the root certificate is installed
automatically. The following steps place a root certificate with the installation package. The root
certificate is contained in a file. The name of the file must be rootcert with no extension.
Step 1In the GUI, double-click vpnclient-darwin-<version>-K9.dmg or using the CLI, open
vpnclient-darwin-<version>-K9.dmg.
Step 2In the GUI, drag and drop the root certificate into the CiscoVPNClient folder on the desktop, making
sure the file is renamed to rootcert or using the CLI, enter the following command.
Step 3In the GUI, press <Apple>-E while focusing on the CiscoVPNClient folder or using the CLI, enter the
following command.
umount /Volumes/CiscoVPNClient
Installing the VPN Client
The following sections describe how to install the VPN Client software. The VPN Client for Mac OS X
installer program installs, by default, both the graphical user interface and the command-line version of
the VPN Client. However, you are not required to install the GUI. See the “Choosing the Installation
Type” section on page 2-8 for more information.
NoteWe recommend that you uninstall any previous version of the VPN Client for Mac OS X before you
install a new version. For more information, see “Uninstalling the VPN Client” section on page 2-12.
Authentication
Before you can start the installation process, you must show that you have installation privileges.
Step 1Open the installer package by double-clicking the Cisco VPN Client.mpkg file that resides in the
installer directory. (See Figure 2-2).
The Authorization window appears (Figure 2-3). You must have an administrator password to install the
VPN Client application.
2-4
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 2 Installing the VPN Client
Figure 2-3Authorization Window
Installing the VPN Client
Step 2
Step 3
Step 4Click OK.
Click the lock to authenticate your password. The Authenticate dialog box appears (Figure 2-4).
Figure 2-4Authenticate Dialog Box
Enter your administrator username and a password or challenge phrase.
If the authentication is successful, continue to the installation process. Contact your network
administrator if you cannot authenticate for installation.
OL-5490-01
VPN Client User Guide for Mac OS X
2-5
Installing the VPN Client
VPN Client Installation Process
You must complete all steps in the VPN Client installation process before you can use the VPN Client
software.
At any time during the installation process, you can go back to a previous step and adjust your selections.
The installation process includes the following steps:
• Introduction, page 2-6
• Accepting the License Agreement, page 2-7
• Selecting the Application Destination, page 2-7
• Choosing the Installation Type, page 2-8
Introduction
The first window that appears during installation is the introduction. The right pane of the Introduction
window (Figure 2-5) lists system requirements. The left pane displays each of the installation steps. As
you complete each step, it is highlighted with a blue bullet.
Chapter 2 Installing the VPN Client
Figure 2-5Cisco VPN Client—Introduction Window
Click Continue.
2-6
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 2 Installing the VPN Client
Accepting the License Agreement
You are required to read and accept the Cisco software license agreement before you can continue with
the installation process (See Figure 2-6).
Figure 2-6Cisco Licence Agreement
Installing the VPN Client
Before you accept the license agreement, you can:
• Print the license agreement.
• Save the license agreement to a file.
• Go Back to the Introduction window.
• Continue and agree to the terms in the license agreement.
When you have completely read the Cisco VPN Client software license agreement, click Continue.
To continue with the installation, click Agree.
Selecting the Application Destination
If your workstation has more than one disk drive, you can select the destination volume to install the
VPN Client on your workstation. Figure 2-7 shows the Select Destination window.
OL-5490-01
VPN Client User Guide for Mac OS X
2-7
Installing the VPN Client
Chapter 2 Installing the VPN Client
Figure 2-7Select Destination Window
Click Continue. The VPN Client is installed in the Applications directory.
Choosing the Installation Type
The default installation process installs the following packages with the VPN Client application:
• VPN Client application binaries (includes everything in the directory /usr/local/bin, including the
ipseclog).
• VPN Client graphical user interface.
• VPN Client kernel extension
• VPN Client profiles (includes the global profile, vpnclient.ini, and any user profiles, *.pcf files).
• VPN startup (the system startup script to automatically start the client at boot time).
The VPN Client application binaries and the VPN Client kernel extension must be part of your
installation. However, installing the other three packages is optional.
To install all packages, click Install on the Easy Install window (Figure 2-8).
2-8
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 2 Installing the VPN Client
Figure 2-8Easy Install Window
Installing the VPN Client
To choose which packages to install, click Customize to open the Custom Install window (Figure 2-9).
Figure 2-9Custom Install Window
OL-5490-01
The packages with the blue check box are optional. To make a package part of your installation, check
the blue box. To remove a package from your installation, uncheck the blue box.
VPN Client User Guide for Mac OS X
2-9
Installing the VPN Client
Chapter 2 Installing the VPN Client
Click Easy Install to return to the default installation packages, or Install to continue with a custom
installation.
A progress bar lists the installation steps as they occur (Figure 2-10).
Figure 2-10 Install Software Progress Window
When the installation is finished, a window appears to indicate whether the installation was successful
(Figure 2-11).
If you do not receive this confirmation, the installation was not successful. You must start the installation
process again from the beginning or contact your network administrator for assistance.
To begin using the Client, double-click the VPN Client application icon located in the Applications
directory (Figure 2-12).
OL-5490-01
VPN Client User Guide for Mac OS X
2-11
Uninstalling the VPN Client
Figure 2-12 Location of VPN Client Application
Chapter 2 Installing the VPN Client
CLI Version Install Script Notes
The VPN Client installer includes both the graphical user interface and the command-line version of the
VPN Client for Mac OS X. You can choose to manage the VPN Client using only the command-line.
Use the following commands to start, stop, and restart VPN service:
Save window settings—Saves changes to the VPN Client window. For example, you can save
the window size; the window position; the selected tab; and the view (simple or advanced
mode).
–
Minimize upon connect—Places the VPN Client window in the dock when the VPN connection
is established
–
Enable tooltips—Enables tool tips for the toolbar action buttons
–
Enable connect history display—Displays connection history information
–
Enable connect on open—Connects to the default connection entry when you start the VPN
Client.
• Services—Access standard Mac OS X services.
• Hide VPN Client—Remove the VPN Client window from your screen. This option does not close
the application or minimize the screen.
• Hide Others—Remove all windows except the VPN Client from your screen.
• Show All—Displays all windows that were previously hidden.
• Quit VPN Client—Closes the VPN Client application.
Choosing a Run Mode
You can run the VPN Client in simple mode or in advanced mode. The default is advanced mode.
• Use simple mode if you only want to start the VPN Client application and establish a connection to
a VPN device using the default connection entry.
• Use Advanced mode to manage the VPN Client, configure connection entries, manage certificates,
to view and manage event logging, or to view tunnel routing data.
To toggle between advanced mode and simple mode, press Command-M. Alternately, you can choose
your mode from the Options menu.
Operating in Simple Mode
Use simple mode when you only need to establish a connection to a VPN device using the default
connection entry.
NoteYou must operate in advanced mode to manage certificates and event logging or to make configuration
changes to a connection entry.
VPN Client Window—Simple Mode
3-2
When you run in simple mode, you are presented with a scaled-down version of the VPN Client user
interface (Figure 3-3).
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 3 Navigating the User Interface
Figure 3-3VPN Client Window—Simple Mode
The main VPN Client window shows only the version information, the default connection entry, the
connect button, and the status bar.
Main Menus—Simple Mode
This section describes the abbreviated menu choices available in simple mode. The Certificates and Log
menus are only available in advanced mode.
Connection Entries Menu
Figure 3-4 shows the Connection Entries menu options for simple mode.
Operating in Simple Mode
Status Menu
Figure 3-4Simple Mode Connection Entries Menu
• Connect—Establish a VPN connection using the selected connection entry. If the Connections tab
is not selected, a submenu, which lists all available connection entries, is displayed.
• Disconnect—Disconnect the current VPN session.
• Import—Import a connection entry configuration file (a file with a .pcf extension, called a profile).
• Set as Default Connection Entry—Use the selected connection entry as the default. The default
connection entry is used for this VPN session unless you select an alternate connection entry.
Figure 3-5 shows the Status Menu options for simple mode.
Figure 3-5Simple Mode Status Menu
OL-5490-01
Statistics—Open the Statistics window to view tunnel details and route details.
•
• Notifications—Open the Notifications window to view notices from the VPN device.
VPN Client User Guide for Mac OS X
3-3
Operating in Advanced Mode
Operating in Advanced Mode
Use Advanced mode to manage the VPN Client; configure connection entries; manage certificates; view
and manage event logging; and view tunnel statistics and routing data.
VPN Client Window—Advanced Mode
The following sections describe the main VPN Client window in Advanced Mode, the primary buttons
and tabs for navigating the user interface, the main menu options, and the right-click menu options.
Figure 3-6 shows the VPN Client window and the primary navigation areas.
Figure 3-6Main VPN Client Window
Chapter 3 Navigating the User Interface
2
Version 4.6 (Rel)
4
5
1
3
1VPN Client version information.4Display area for the main tabs.
2Toolbar action buttons. The buttons that are
available depend on which tab is forward.
When connected, the status bar displays
5
information related to the current VPN session:
• The left side indicates the connection
entry name and connection status.
• The right side lists the amount of time for
this session, the client IP address, and the
number of bytes through the VPN tunnel.
3Main tabs for managing the VPN Client.
76513
3-4
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 3 Navigating the User Interface
Toolbar Action Buttons—Advanced Mode
The action buttons at the top of the VPN Client window vary depending on which tab is forward.
For example, if the Connections tab is forward, the Connect, New, Import, Modify, and Delete buttons
control operations for the selected connection entry (see Figure 3-6). If the Certificates tab is forward,
the View, Import, Export, Enroll, Verify, and Delete buttons control operations for the selected certificate (Figure 3-7).
Figure 3-7Toolbar Buttons—Certificates Tab
Main Tabs—Advanced Mode
This section describes the three main tabs for managing the VPN Client (Figure 3-8).
Operating in Advanced Mode
Figure 3-8VPN Client GUI Main Tabs
The three main tabs include:
• Connection Entries tab—Displays the list of current connection entries, the host, which is the VPN
device each connection entry uses to gain access to the private network, and the transport properties
that are set for each connection entry. Refer to Chapter 4, “Configuring Connection Entries” for
more details on the Connection Entries tab.
OL-5490-01
• Certificates tab— Displays the list of certificates in the VPN Client certificate store. Use this tab to
manage certificates. Refer to Chapter 6, “Enrolling and Managing Certificates” for more details on
the Certificates tab.
• Log tab—Displays event messages from all processes that contribute to the client-peer connection,
including enabling logging, clearing the event log, viewing the event log in an external window, and
setting logging levels. Refer to Chapter 7, “Managing the VPN Client” for more information.
VPN Client User Guide for Mac OS X
3-5
Operating in Advanced Mode
Main Menus—Advanced Mode
The following sections describe the main VPN Client menus, located at the top of your screen, when the
VPN Client application is running in advanced mode and active on your desktop.
Connection Entries Menu
Use the Connection Entries menu (Figure 3-9) as a shortcut to frequently-used connection entry
operations. The menu option applies to the connection entry that is currently selected on the Connection
Entries tab.
NoteA connection entry must be selected to use Connection Entries menu options.
Figure 3-9Connection Entries Menu
Chapter 3 Navigating the User Interface
Connect to—Establish a VPN connection using the selected connection entry. If the Connections tab
•
is not selected, a submenu, which lists all available connection entries, is displayed.
• Disconnect—Disconnect the current VPN session.
• Modify—Modify the properties of the selected connection entry.
• Delete—Delete the selected connection entry.
• Duplicate—Duplicate the selected connection entry. This menu choice allows you to create a new
connection entry using the configuration from a current connection entry as a template.
• Set as Default Connection Entry—Use the selected connection entry as the default. The VPN Client
uses the default connection entry for this VPN session unless you select an alternate connection
entry. Also, when you enable connect on open on the Preferences menu, the VPN Client opens the
default connection entry when it starts up.
• New—Configure a new connection entry.
• Import—Import a connection entry from a file.
To configure a new connection entry, see Chapter 4, “Configuring Connection Entries.”
3-6
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 3 Navigating the User Interface
Status Menu
Use the Status menu (Figure 3-10) to display the tunnel and route statistics or to view notifications from
the VPN device.
Figure 3-10 Status Menu
• Statistics—Open the Statistics window to view tunnel details and route details.
• Notifications—Open the Notifications window to view notices from the VPN device.
• Reset Stats—Reset the VPN session statistics on the Tunnel Details tab of the Statistics window.
Certificates Menu
Operating in Advanced Mode
Use the Certificates menu (Figure 3-11) as a shortcut to frequently-used certificate operations. The menu
option applies to the certificate that is currently selected on the Certificates tab.
NoteA certificate must be selected to use Certificates menu options.
Figure 3-11 Certificates Menu
View—View the properties of the selected certificate.
•
• Import—Import a certificate from a file.
OL-5490-01
• Export—Export the selected certificate to a specified file location
• Enroll—Enroll a digital certificate for user authentication.
• Verify—Verify that the selected certificate is valid.
• Delete—Delete the selected certificate.
• Change Certificate Password—Change the password used to protect the certificate while it is in the
VPN Client certificate store.
VPN Client User Guide for Mac OS X
3-7
Operating in Advanced Mode
Log Menu
Chapter 3 Navigating the User Interface
• Retry Certificate Enrollment—Retry a previously started certificate enrollment.
• Show or Hide CA/RA Certificates—This menu option toggles to Show or Hide root certificates
issued by either a Certificate Authority (CA) or a Registration Authority (RA).
Use the Log menu (Figure 3-12) to enable, disable, view or clear the event log, or to adjust the log
settings.
Figure 3-12 Log Menu
•
Enable/Disable—Enable or disable event logging.
• Clear—Clear the event log.
• Log Settings—Open the Log Settings window to view current settings or make adjustments.
• Log Window—Open the Log Window, which is a separate window that displays events. From this
window you can save the display, edit logging levels by event class, and clear both log displays. The
Log Window shows more events than the display area of the main advanced mode window.
• Search Log—Open the Search Log dialog box (Figure 3-13).
Figure 3-13 Log Search Dialog Box
Enter the exact string to match in the Find entry field. The search string is not case-sensitive and
wildcards are not allowed. Matched instances are highlighted on the Log tab.
• Save—Save the event log to a file.
Right-Click Menus
3-8
Use the right-click menus from the Connection Entries tab or the Certificates tab as an alternate method
for performing frequent VPN Client operations. If your mouse has only one button, use Ctrl-Click to
access the right-click menus.
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 3 Navigating the User Interface
Connection Entries Tab Right-Click Menu
Figure 3-14 shows the right-click menu options available when the Connection Entries tab is selected.
Figure 3-14 Connection Entries Right-Click Menu
Operating in Advanced Mode
• Connect—Establish a VPN connection using the selected connection entry.
• Disconnect—Disconnect the current VPN session.
• Duplicate—Duplicate the selected connection entry. This action allows you to create a new
connection entry using the configuration from a current connection entry as a template.
• Delete—Delete the selected connection entry.
• Modify—Display the properties of the selected connection entry. This action opens the VPN Client
Properties window.
• Erase Saved User Password—Erases the user password that is saved on the VPN Client workstation,
forcing the VPN Client to prompt you for a password each time you establish a connection.
OL-5490-01
VPN Client User Guide for Mac OS X
3-9
Operating in Advanced Mode
Certificates Tab Right-Click Menu
Figure 3-15 shows the right-click menu options available when the Certificates tab is forward.
Figure 3-15 Certificates Tab Right-Click Menu
Chapter 3 Navigating the User Interface
•
View—View the properties of the selected certificate.
• Export—Export the selected certificate to a specified file location
• Verify—Verify that the selected certificate is valid.
• Delete—Delete the selected certificate
• Change Certificate Password—Change the password used to protect the certificate while it is in the
VPN Client certificate store.
• Retry Certificate Enrollment—Retry a previously started certificate enrollment.
3-10
VPN Client User Guide for Mac OS X
OL-5490-01
Configuring Connection Entries
A connection entry is a set of parameters that the VPN Client uses to identify and connect to a specific
private network.
Connection entry parameters include a name and description for the connection, the name or address of
the VPN device (the remote server providing the connection), and authentication information that
identifies you as a valid user to the VPN device.
This chapter describes how to configure the parameters for a VPN Client connection entry.
Creating a Connection Entry
To use the VPN Client, you must create at least one connection entry, which identifies the following
information:
• The VPN device that is providing access to the network.
• Preshared keys—The IPSec group that you have been assigned to. Your IPSec group determines the
set of privileges you have for accessing and using the private network. For example, it specifies
access hours, number of simultaneous logins, user authentication method, and the IPSec algorithms
your VPN Client uses.
CHA P TER
4
OL-5490-01
• Certificates—The name of the certificate you are using for authentication.
• Optional parameters that govern VPN Client operation and connection to the remote network.
You can create multiple connection entries if you use your VPN Client to connect to multiple networks
(though not simultaneously) or if you belong to more than one IPSec group.
VPN Client User Guide for Mac OS X
4-1
Creating a Connection Entry
To create a connection entry:
Step 1Open the VPN Client application. The VPN Client window appears (Figure 4-1).
Chapter 4 Configuring Connection Entries
.
Step 2Click the Connection Entries tab.
Step 3Click New at the top of the VPN Client window. The Create New VPN Connection Entry dialog box
appears (Figure 4-2).
Figure 4-2Create New VPN Connection Entry
Figure 4-1VPN Client Window
4-2
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 4 Configuring Connection Entries
Step 4Enter a unique connection entry name. You can use any name to identify this connection. This name can
contain spaces, and it is not case-sensitive.
Step 5Enter a description of this connection. This field is optional, but it helps to further identify this
connection. For example, Connection to Engineering remote server.
Step 6Enter the Host name or IP address of the remote VPN device that is providing access to the private
network.
Step 7Use the Authentication tab to select an authentication method. You can connect as part of a group, which
is configured on the VPN device, or by supplying an identity digital certificate. See the “Authentication
Methods” section on page 4-3 for more information.
Step 8Use the Transport tab to set transport parameters. See the “Transport Parameters” section on page 4-6
for more information.
Step 9Use the Backup Servers tab to view the current list of backup servers or to manually add a backup server.
See the “Backup Servers” section on page 4-8 for more information.
Step 10The Erase User Password button at the bottom of this dialog box erases the user password that is saved
on the VPN Client workstation, forcing the VPN Client to prompt you for a password each time you
establish a connection.
Step 11Click Save. The Connection Entry dialog box closes and you return to the Connection Entries tab.
Authentication Methods
Authentication Methods
You can configure a connection entry to authenticate as part of a group, which is configured on the VPN
device, or by supplying an identity digital certificate. The Authentication tab on the Connection Entry
Settings dialog box must be forward to select an authentication method for a connection entry.
Group Authentication
Use this procedure if you plan to use group authentication for this connection entry.
To configure group authentication:
Step 1From the Authentication tab, click the Group Authentication radio button (Figure 4-3).
OL-5490-01
VPN Client User Guide for Mac OS X
4-3
Authentication Methods
Chapter 4 Configuring Connection Entries
Figure 4-3Group Authentication
Step 2
Step 3Enter the password for your IPSec group. The field displays only asterisks.
Step 4Confirm the password by entering it again.
Step 5Click Save. The Connection Entry dialog box closes, and you return to the Connection Entries tab.
Enter the name of the IPSec group you belong to.
Mutual Group Authentication
When you select mutual group authentication, the VPN Client verifies whether you have a root
certificate installed. If not, it prompts to import one. Before you continue, you must import a root
certificate. For information on importing a certificate, see Importing a Certificate.
When you have installed a root certificate (if required), follow the steps in Group Authentication.
Certificate Authentication
Use this procedure if you plan to use digital certificates for authenticating for this connection entry.
You can obtain a digital certificate for use with the VPN Client by enrolling with a Public Key
Infrastructure (PKI) or by importing a certificate from a file.
To configure this connection entry for a digital certificate:
4-4
Step 1From the Authentication tab, click the Certificate Authentication radio button (Figure 4-4).
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 4 Configuring Connection Entries
Figure 4-4Certificate Authentication
Step 2Select a certificate from the Name drop-down menu.
If the Name field displays No Certificates Installed, you must first enroll or import a certificate before
you can use this feature. See the “Enrolling Certificates” section on page 6-2 or “Importing a Certificate”
section on page 6-7 for more information.
Step 3To send CA certificate chains, check the Send CA Certificate Chain check box. This parameter is
disabled by default.
A CA certificate chain includes all CA certificates in the certificate hierarchy from the root certificate.
This must be installed on the VPN Client to identify each certificate. This feature enables a peer VPN
Concentrator to trust the VPN Client's identity certificate given the same root certificate, without having
the same subordinate CA certificates actually installed.
The following is an example of a certificate chain:
Authentication Methods
• On the VPN Client, you have this chain in the certificate hierarchy:
a. Root Certificate
b. CA Certificate 1
c. CA Certificate 2
d. Identity Certificate
• On the VPN Concentrator, you have this chain in the certificate hierarchy
a. Root Certificate
b. CA Certificate
c. Identity Certificate
Though the identity certificates are issued by different CA certificates, the VPN device can still trust the
VPN Client's identity certificate, because it has received the chain of certificates installed on the VPN
Client PC.
This feature provides flexibility because the intermediate CA certificates do not need to be installed on
the peer.
Step 4Click Save. The Connection Entry dialog box closes and you return to the Connection Entries tab.
OL-5490-01
VPN Client User Guide for Mac OS X
4-5
Transport Parameters
Transport Parameters
This section describes transport parameters you can configure for a connection entry.
The transport parameters include:
• Enable Transport Tunneling, page 4-7
• Transparent Tunneling Mode, page 4-7
• Allow Local LAN Access, page 4-7
• Peer Response Timeout, page 4-8
To configure transport parameters:
Step 1Open the VPN Client application.
Step 2Select a connection entry.
Step 3Click Modify at the top of the VPN Client window to access the VPN Client Properties dialog box.
Step 4Click the Transport tab (Figure 4-5) to display the existing transport parameters configured for this
connection entry.
Chapter 4 Configuring Connection Entries
Figure 4-5Transport Settings
4-6
Step 5
Step 6Click Save. The VPN Client Properties dialog box closes and you return to the Connection Entries tab.
VPN Client User Guide for Mac OS X
Select your transport settings. Refer to the following sections for more information on transport settings.
OL-5490-01
Chapter 4 Configuring Connection Entries
Enable Transport Tunneling
Transparent tunneling allows secure transmission between the VPN Client and a secure gateway through
a router serving as a firewall. The router might also be configured for Network Address Translation
(NAT) or Port Address Translations (PAT).
Transparent tunneling encapsulates Protocol 50 (ESP) traffic within UDP packets. It allows for both IKE
(UDP 500) and Protocol 50 to be encapsulated in TCP packets before they are sent through the NAT or
PAT devices and/or firewalls. The most common application for transparent tunneling is behind a home
router performing PAT.
Not all devices support multiple simultaneous connections behind them. Some cannot map additional
sessions to unique source ports. Check with your device's vendor to see if this limitation exists. Some
vendors support Protocol 50 (ESP) PAT, which might let you operate without enabling transparent
tunneling.
• To use transparent tunneling, the IPSec group in the Cisco VPN device must be configured to
support it.
• Transparent Tunneling is enabled by default. To disable this parameter, clear the check box. We
recommend that you keep this parameter enabled.
Transport Parameters
Transparent Tunneling Mode
The transparent tunneling mode you select must match the mode used by the VPN device providing your
connection to the private network.
• If you select IPSec over UDP (NAT/PAT), the default mode, the port number is negotiated.
• If you select TCP, you must enter the port number for TCP in the TCP port field. This port number
must match the port number configured on the VPN device. The default port number is 10000.
NoteEither mode operates properly through a PAT device. Multiple simultaneous connections might work
better with TCP, and if you are in an extranet environment, TCP mode is preferable. UDP does not
operate with stateful firewalls. Use TCP with this configuration.
Allow Local LAN Access
The Allow Local LAN Access parameter gives you access to resources on your local LAN when you are
connected through a secure gateway to a central-site VPN device.
• When this parameter is enabled:
–
You can access local resources (printer, fax, shared files, other systems) while connected.
–
You can access up to 10 networks. A network administrator at the central site configures a list
of networks at the VPN Client side that you can access.
–
If you are connected to a central site, all traffic from your system goes through the IPSec tunnel
except traffic to the networks excluded from doing so (in the network list).
–
If enabled on the VPN Client and permitted on the central-site VPN device, you can see a list
of the local LANs that are available by choosing Statistics from the Status menu and clicking
the Route Details tab. For more information, see the “Route Details” section on page 7-10.
OL-5490-01
VPN Client User Guide for Mac OS X
4-7
Backup Servers
• When this parameter is disabled, all traffic from your client system goes through the IPSec
connection to the secure gateway.
If the local LAN you are using is not secure, you should not enable local LAN access. For example, do
not enable this feature when you are using a local LAN in a hotel or airport.
To enable this feature, check the Allow Local LAN Access check box on the VPN Client. You must also
enable this feature on the VPN device you are connecting to.
Peer Response Timeout
The VPN Client uses a keepalive mechanism called Dead Peer Detection (DPD) to check the availability
of the VPN device on the other side of an IPSec tunnel. If the network is unusually busy or unreliable,
you may need to increase the number of seconds to wait before the VPN Client decides that the peer is
no longer active. The default number of seconds to wait before terminating a connection is 90 seconds.
The minimum number of seconds you can configure is 30 seconds and the maximum is 480 seconds.
To adjust the setting, enter the number of seconds in the Peer response timeout field.
The VPN Client continues to send DPD requests every 5 seconds, until it reaches the number of seconds
specified by the Peer response timeout value.
Chapter 4 Configuring Connection Entries
Backup Servers
The private network you are connecting to might include one or more backup VPN devices (servers) to
use if the primary server is not available. The list of available backup servers is pushed to the VPN Client
when the connection is established, or you can add a backup server to the list manually.
The list of existing backup servers is found on the Backup Servers tab for each connection entry. Your
network administrator can provide information regarding backup servers.
To use backup servers, you must enable this parameter.
To enable backup servers:
Step 1Open the VPN Client application.
Step 2Select a connection entry.
Step 3Click Modify at the top of the VPN Client window. The VPN Client Properties dialog box appears.
Step 4Click the Backup Servers tab (Figure 4-6).
4-8
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 4 Configuring Connection Entries
Figure 4-6Backup Servers Tab
Backup Servers
Step 5
Check the Enable Backup Servers check box. This parameter is not enabled by default. The list of
available backup servers is displayed. Backup servers are used in the order presented in the list.
Step 6To change the order in which the backup servers are used, select a backup server and use the arrow
buttons to move the server up or down in the list.
Step 7Click Save. The VPN Client Properties dialog box closes and you return to the Connection Entries tab.
If there are no backup servers listed, or if you want to manually add a server to the list, use the following
procedure.
Step 1Click the Add button on the Backup Servers tab. The VPN Client dialog box appears (Figure 4-7).
Figure 4-7Add Backup Server
Step 2
Enter the hostname or IP address of the backup server to add.
OL-5490-01
VPN Client User Guide for Mac OS X
4-9
Backup Servers
Step 3Click OK. The backup server is added to the list of available backup servers.
Chapter 4 Configuring Connection Entries
To remove a backup server, return to the Backup Server tab, select a server from the list, and click
Remove.
4-10
VPN Client User Guide for Mac OS X
OL-5490-01
Establishing a VPN Connection
This chapter describes how to establish a VPN connection with a private network using the VPN Client
and the user authentication methods supported by the VPN device that is providing your connection.
Checking Prerequisites
Before you can establish a VPN connection, you must have:
• At least one connection entry configured on the VPN Client. See Chapter 4, “Configuring
Connection Entries” for more information.
• User authentication information. This includes your username and password, and depending on the
configuration of your connection entry, might also include:
–
Passwords for RADIUS authentication
–
VPN group name and password for connections to VPN devices
CHA P TER
5
–
PINs for RSA Data Security
–
Digital certificates and associated passwords
• An Internet connection
Contact your network administrator for prerequisite information.
Establishing a Connection
To establish a VPN connection:
Step 1Open the VPN Client application by double-clicking the VPN Client icon in the Applications folder. If
you created an alias, you can double-click the VPN Client icon on the Desktop or in the dock
(Figure 5-1).
OL-5490-01
VPN Client User Guide for Mac OS X
5-1
Establishing a Connection
Chapter 5 Establishing a VPN Connection
Figure 5-1VPN Client Icon
The main VPN Client window appears.
Figure 5-2 shows the VPN Client window in simple mode.
Figure 5-2VPN Client Window—Simple Mode
Figure 5-3 shows the VPN Client window in advanced mode.
Figure 5-3VPN Client Window—Advanced Mode
See Chapter 3, “Navigating the User Interface” for more information on simple mode and advanced
mode.
Step 2From the Connection Entries tab, select the connection entry to use for this VPN session. For simple
mode, select a connection entry from the drop-down list.
Step 3Click Connect at the top of the VPN Client window or double-click the selected connection entry. For
simple mode, click the Connect button.
Step 4Respond to all user authentication prompts.
5-2
The user authentication prompts that appear depend on the configuration for this connection entry.
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 5 Establishing a VPN Connection
The status bar at the bottom of the main VPN Client window displays your connection status. When
connected, the left side of the status bar indicates the connection entry name and the right side displays
the amount of time that the VPN tunnel has been established.
Connecting to a Default Connection Entry
If you have configured a default connection entry (sometimes called default user or default profile), the
VPN Client uses this connection entry when it starts. The name of this feature is Connect on Open. You
can enable it on the Preferences menu, see “VPN Client Menu”. An administrator configures this feature
for you. For information, see the VPN Client Administrator Guide. For information on setting a
connection entry to be the default, see “Creating a Connection Entry”.
Choosing Authentication Methods
User authentication means proving that you are a valid user of this private network. User authentication
is optional. Your network administrator determines whether user authentication is required.
The VPN Client supports:
• Shared key or VPN group name and group password for authenticating the VPN device
Choosing Authentication Methods
• Mutual group authentication, using a root certificate generally installed by your network
administrator
• RADIUS server, RSA Security (SecurID), Digital Certificates for authenticating the user.
The authentication prompts displayed during the connection process depend on the configuration of your
IPSec group. Refer to appropriate section in this chapter for more information on the user authentication
method configured for each connection entry.
NoteUser names and passwords are case-sensitive. You have three opportunities to enter the correct
information before an error message indicates that authentication failed. Contact your network
administrator if you cannot pass user authentication.
The following sections describe each user authentication method that the VPN Client supports.
Shared Key Authentication
The shared key authentication method uses the username and shared key password for authentication
(Figure 5-4). The shared key password must be the same as the shared key password configured on the
VPN device that is providing the connection to the private network.
OL-5490-01
VPN Client User Guide for Mac OS X
5-3
Choosing Authentication Methods
Figure 5-4Shared Key Authentication
Enter your Username and Password and click OK.
VPN Group Name and Password Authentication
The VPN group login method uses your VPN group name and password for authentication (Figure 5-5).
You can use VPN group authentication alone or with other authentication methods.
Chapter 5 Establishing a VPN Connection
Figure 5-5VPN Group Authentication
Enter your group name and password and click OK. The group name is the name of the IPSec group
configured on the VPN device for this connection entry.
RADIUS Server Authentication
You can use RADIUS server authentication with VPN group authentication. With this type of
authentication, two prompts appear. The first prompt is for the VPN group name and password, and the
RADIUS user authentication prompt follows (Figure 5-6).
5-4
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 5 Establishing a VPN Connection
Figure 5-6User Authentication for RADIUS
Enter your username and password and click OK.
Check the Save Password check box if you do not want to be prompted for your RADIUS password each
time you start a VPN session using this connection entry.
Choosing Authentication Methods
NoteIf you cannot choose the Save Password option, your system administrator does not allow this option. If
you can choose this option, be aware that using it might compromise system security, because your
password is stored on your PC and is available to anyone who uses your PC.
If Save Password is checked and authentication fails, your password may be invalid. To eliminate a
saved password, choose Erase User Password from the Connection Entries menu.
SecurID Authentication
RSA SecurID® authentication methods include physical RSA SecurID cards and keychain fobs, and PC
software called RSA SecurID for passcode generation. RSA SecurID cards can vary. The passcode might
be combination of a PIN and a card code, or you might be required to enter a PIN on the card to display
the passcode. Ask your network administrator for the correct procedure.
When you use RSA SecurID passcodes for authentication:
• The process varies slightly for different operating systems.
• If you use physical RSA SecurID cards or keychain fobs, the VPN Client displays the appropriate
RSA user authentication dialog box.
• If you use RSA SecurID for passcode generation, it must be running on your workstation.
In most configurations, you use RSA SecurID with VPN group authentication. With this type of
authentication, two prompts appear. The first prompt is for the VPN group name and password, and the
RSA SecurID user authentication prompt follows (Figure 5-7).
OL-5490-01
VPN Client User Guide for Mac OS X
5-5
Using Digital Certificates
Figure 5-7User Authentication for RSA SecurID
Enter your username and RSA SecurID passcode and click OK.
Using Digital Certificates
Chapter 5 Establishing a VPN Connection
The VPN Client works with Certificate Authorities (CAs) that support SCEP, manual enrollment, or
PKCS import.
Each time you establish a VPN connection using a certificate, the VPN Client verifies that your
certificate is not expired.
• Valid— A message appears that indicates the validation period for this certificate.
• Expired—A warning appears that indicates when the certificate expired.
Each digital certificate is protected by a password. If the connection entry you are using requires a digital
certificate for authentication, the VPN Certificate Authentication dialog box appears (Figure 5-8).
Figure 5-8Certificate Password
Enter the certificate password and click OK.
For more information on digital certificates, see Chapter 6, “Enrolling and Managing Certificates.”
5-6
VPN Client User Guide for Mac OS X
OL-5490-01
Enrolling and Managing Certificates
This chapter describes how to enroll and manage digital certificates for the VPN Client for Mac OS X,
specifically how to perform the following tasks:
• Obtain personal certificates through enrollment with a certificate authority (CA), which is an
organization that issues digital certificates that verify that you are who you say you are.
• Manage certificates and enrollment requests
• Import, export, view, and verify certificates
To get started with certificates, open the Certificates tab on the main VPN Client window in advanced
mode. The Certificates tab lists the certificates you currently have enrolled. If there are no certificates
showing, you need to enroll with a CA or contact your system administrator.
Using the Certificate Store
CHA P TER
6
The VPN Client uses the notion of store to convey a location in your local file system for storing personal
certificates. The main store for the VPN Client is the Cisco store, which contains certificates enrolled
through the Simple Certificate Enrollment Protocol (SCEP), and certificates that have been imported
from a file.
The Certificates tab on the main VPN Client window displays the list of certificates in your certificate
store (Figure 6-1).
OL-5490-01
VPN Client User Guide for Mac OS X
6-1
Enrolling Certificates
Chapter 6 Enrolling and Managing Certificates
Figure 6-1Certificate Store
For each certificate, the following information is listed:
• Certificate—The name of the certificate.
• Store—The certificate store where this certificate resides. If you enroll a certificate from a
Certificate Authority, the store is CA. If you import a certificate from a file, the store is Cisco.
• Key Size—The size, in bits, of the signing key pair.
• Validity—The date and time when this certificate expires.
Enrolling Certificates
Your system administrator may have already set up your VPN Client with digital certificates. If not, or
if you want to add certificates, you can obtain a certificate by enrolling with a Certificate Authority (CA).
To enroll a digital certificate you must enroll using the PKI Framework standards, receive approval from
the CA, and have the certificate installed on your system.
You can enroll a digital certificate:
• Over the network from a CA
• From an enrollment request file
To enroll a digital certificate for user authentication
Step 1Click the Certificates tab.
Step 2Click Enroll at the top of the VPN Client window. The Certificate Enrollment dialog box appears.
6-2
Step 3Choose a certificate enrollment type.
• If you choose Online, you obtain a certificate by enrolling with a CA over the network.
• If you choose File, the VPN Client generates an enrollment request file that you can email to a CA
or post into a webpage form.
Figure 6-2 shows the Certificate Enrollment Dialog Box.
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 6 Enrolling and Managing Certificates
Figure 6-2Online Certificate Enrollment
Enrolling Certificates
Step 4
Enter the enrollment parameters.
• For online enrollment enter:
–
Certificate Authority—The Common name or the Subject name of the CA Certificate. This
drop-down list contains a history of previously enrolled CA certificates. If you select a CA from
this list, the CA URL and the CA Domain fields are pre-populated. For <New> online
enrollments, you must enter the CA URL and the CA Domain manually.
–
CA URL—The URL or network address of the CA. For example,
http://198.162.41.9/certsrv/mcep/mcep.dll.
–
CA Domain—The CA's domain name. For example, qa2000.com.
–
Challenge Password—Some CAs require that you enter a password to access their site. Enter
this password in the Challenge Password field. Obtain the challenge password from your
administrator or from the CA.
–
New Password—The password for this certificate. Each digital certificate is protected by a
password. If you create a connection entry that requires a digital certificate for authentication,
you must enter the certificate password each time you attempt a connection.
• For file enrollment enter:
–
File encoding type of the output file.
Base-64—The default, is an ASCII-encoded PKCS10 file that you can display because it is in
a text format. Use this type when you want to cut and paste the text into the CA's website.
Binary—a base-2 PKCS10 (Public-Key Cryptography Standards) file. You cannot display a
binary-encoded file
–
Filename—The full pathname for the file request. For example,
/Users/Anna/Documents/Certificates/mycert.p10.
OL-5490-01
–
New Password—The password for this certificate. Each digital certificate is protected by a
password. If you create a connection entry that requires a digital certificate for authentication,
you must enter the certificate password each time you attempt a connection.
VPN Client User Guide for Mac OS X
6-3
Enrolling Certificates
Step 5Click Next to continue with certificate enrollment. The Certificate Enrollment dialog box appears
Chapter 6 Enrolling and Managing Certificates
(Figure 6-3).
Figure 6-3Certificate Enrollment
Step 6
Enter the remaining certificate enrollment parameters. All fields are required unless they are grayed out.
Table 6 - 1 describes the entry fields.
Table 6-1Certificate Enrollment Parameters
Entry FieldDescription
Name (CN)The common name for the certificate. The common name can be the
name of a person, system, or other entity. It is the most specific level
in the identification hierarchy. The common name becomes the
name of the certificate. For example, Fred Flinstone.
DomainThe Fully Qualified Domain Name (FQDN) of the host for your
system. For example, Dialin_Server.
Email (E)The user e-mail address for the certificate. For example,
email@company.com
IP AddressThe IP address of the user's system. For example, 192.168.23.9
Department (OU)The VPN group that this user belongs to. This field correlates to the
Organizational Unit (OU). The OU is the same as the Group Name
configured in a VPN 3000 Series Concentrator, for example.
Company (O)The company name for the certificate.
State (ST)The state for the certificate.
Country (C)The 2-letter country code for your country. For example, US. This
two-letter country code must conform to ISO 3166 country
abbreviations.
6-4
Step 7Click Enroll to enroll a certificate from a CA, Go Back to review previous certificate enrollment
parameters, or Cancel.
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 6 Enrolling and Managing Certificates
The certificate enrollment is listed in the certificate store as a request. To resume a certificate enrollment
request, right-click and choose Resume Certificate Enrollment. Alternately, you can resume an
enrollment from the Certificates menu.
A prompt indicates whether the certificate enrollment is successful (Figure 6-4).
Figure 6-4Enrollment Complete
If the certificate enrollment is not successful, contact your network administrator.
Enrolling Certificates
Managing Enrollment Requests
While a request is pending approval by the CA administration, the VPN Client places the enrollment
request in the list on the Certificates tab. You can view, delete, or change the password for any request
in the list; or you can retry a network enrollment request. To perform any of these actions, select the
pending enrollment request and click on the Certificate menu.
Viewing the Enrollment Request
To display the enrollment request
Step 1Select the enrollment request in the certificate store
Step 2Choose View from the Certificates menu.
Step 3The VPN Client displays the pending request. The Issuer field shows the subject name and not the name
of the CA, since the CA has not yet issued the certificate.
TipYou can also change the certificate request password from the View dialog box.
Deleting an Enrollment Request
OL-5490-01
To delete an enrollment request
Step 1Select the enrollment request from the certificate store.
Step 2Choose Delete from the Certificates menu.
The VPN Client prompts you for a password.
VPN Client User Guide for Mac OS X
6-5
Enrolling Certificates
Step 3Enter the password in the Password field (if there is one) and click OK.
The VPN Client verifies the password. If the password is correct, the VPN Client deletes the request.
Changing the Password on an Enrollment Request
To change the certificate password on an enrollment request
Step 1Select the certificate request from the certificate store.
Step 2Choose Change CertificatePassword from the Certificates menu.
The VPN Client displays the Certificate Password dialog box (Figure 6-5).
Figure 6-5Changing a Certificate Password
Chapter 6 Enrolling and Managing Certificates
Step 3
Step 4At the prompt, enter the new password and click OK.
Step 5At the next prompt, enter the new password again to verify it and click OK.
Enter the current password and click OK.
The VPN Client responds with a success message.
NoteYou can also change the password from the View dialog box.
Retrying an Enrollment Request
To retry a pending online enrollment request
Step 1Select the enrollment request in the certificate store.
Step 2Choose Retry Client Enrollment. from the Certificates menu.
The VPN Client prompts you to enter a password. This password must match the password you are using
to protect the certificate’s private key, if any.
Step 3Enter the password and click OK to resume the enrollment request.
6-6
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 6 Enrolling and Managing Certificates
Importing a Certificate
A network administrator might place a certificate in a file. This certificate must be imported in to the
certificate store before you can use it for authenticating the VPN Client to a VPN device.
To import a certificate from a file
Step 1Click the Certificates tab.
Step 2Click Import at the top of the VPN Client window. The Import Certificate dialog box appears
(Figure 6-6).
Figure 6-6Import Certificate
Importing a Certificate
Step 3Enter the import path.
If you do not know the location, browse to the folder where the certificate is located and click Open on
the browser window. The import path is automatically entered in the Import Certificate dialog box.
Step 4Enter the import password—This is the password used to protect the certificate file, called the import
password, and is assigned by the system administrator.
Step 5Enter the New Password—This is the password assigned by you to protect the certificate while it is in
your certificate store. This password is optional but we recommend that you always protect your
certificate with a password.
Step 6Verify the New Password again.
Step 7Click Import. The certificate is installed in the VPN Client certificate store.
Viewing a Certificate
To view the contents of a certificate in the certificate store
Step 1Click the Certificates tab.
Step 2Select the certificate to view.
Step 3Click View at the top of the VPN Client window or double-click the certificate. The Certificate
Properties window appears (Figure 6-7).
OL-5490-01
VPN Client User Guide for Mac OS X
6-7
Viewing a Certificate
Chapter 6 Enrolling and Managing Certificates
Figure 6-7Certificate Properties
A typical digital certificate contains the following information:
• Common name—The name of the owner, usually both the first and last names. This field identifies
the owner within the Public Key Infrastructure (PKI organization).
• Department—The name of the owner’s department. This is the same as the organizational unit in the
Subject field.
• Company—The company in which the owner is using the certificate. This is the same as the
organization in the Subject field.
• State—The state in which the owner is using the certificate.
• Country—The 2-character country code in which the owner’s system is located.
• Email—The e-mail address of the owner of the certificate.
• Thumbprint—The MD5 and SHA-1 hash of the certificate’s complete contents. This provides a
means for validating the authenticity of the certificate. For example, if you contact the issuing CA,
you can use this identifier to verify that this certificate is the correct one to use.
• Key size—The size of the signing key pair in bits.
• Subject—The fully qualified distinguished name (FQDN) of the certificate’s owner. This field
uniquely identifies the owner of the certificate in a format that can be used for LDAP and X.500
directory queries. A typical subject includes the following fields:
–
common name (cn)
–
organizational unit, or department (ou)
–
organization or company (o)
–
locality, city, or town (l)
6-8
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 6 Enrolling and Managing Certificates
–
state or province (st)
–
country (c)
–
e-mail address (e)
Other items might be included in the Subject, depending on the certificate.
• Issuer—The fully qualified distinguished name (FQDN) of the source that provided the certificate.
• Serial number—A unique identifier used for tracking the validity of the certificate on the Certificate
Revocation Lists (CRLs).
• Not valid before—The beginning date that the certificate is valid.
• Not valid after—The end date beyond which the certificate is no longer valid.
Step 4Click Close to return to the VPN Client window.
Exporting a Certificate
Exporting a Certificate
To export a certificate from the certificate store to a specified file
Step 1Click the Certificates tab.
Step 2Select the certificate to export.
Step 3Click Export at the top of the VPN Client window. The Export Certificate dialog box appears
(Figure 6-8).
Figure 6-8Export Certificate
Step 4
Enter the export path.
If you do not know the export path, browse to the export directory and click Open on the browser
window. The export path is automatically entered in the Export Certificate dialog box.
OL-5490-01
Step 5To export the entire certificate chain, check the box next to this parameter.
Step 6Enter a password to protect the exported certificate file. We recommend that you always enter a password
to protect your certificates.
Step 7Verify the exported certificate file password.
Step 8Click Export. The certificate is copied to the selected directory and a prompt (Figure 6-9) indicates
whether the export is successful.
VPN Client User Guide for Mac OS X
6-9
Deleting a Certificate
Chapter 6 Enrolling and Managing Certificates
Figure 6-9Successful Export Prompt
Step 9
Click OK to return to the VPN Client window.
Deleting a Certificate
You can delete any certificate from your certificate store. You must provide a password to delete an
enrollment certificate.
CautionYou cannot retrieve a certificate that has been deleted.
To delete a user or root certificate
Step 1Click the Certificates tab.
Step 2Select the certificate to delete.
Step 3Click Delete at the top of the VPN Client window. A warning prompt appears (Figure 6-10).
Figure 6-10 Delete Certificate Warning
6-10
Step 4
Verify the name of the certificate and click Delete. The selected certificate is deleted from the certificate
store.
Click Do not Delete to return to the VPN Client window without deleting the selected certificate.
To delete an enrollment certificate
Step 1Click the Certificates tab.
Step 2Select the enrollment certificate to delete.
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 6 Enrolling and Managing Certificates
Step 3Click Delete at the top of the VPN Client window. The Certificate Password dialog box appears
(Figure 6-11).
Figure 6-11 Password Prompt for Deleting Enrollment Certificates.
Step 4Enter the Certificate Password for the selected certificate to delete.
The Certificate Password is the password assigned by you to protect the certificate while it is in your
certificate store. This is the password set in the New Password field when you enrolled this certificate.
See the “Enrolling Certificates” section on page 6-2.
Step 5Click OK. The certificate is deleted from the certificate store.
Verifying a Certificate
Verifying a Certificate
To verify that a certificate is valid:
Step 1Click the Certificates tab.
Step 2Click Ve ri fy at the top of the VPN Client window. A prompt appears (Figure 6-12) to indicate the
validity of the certificate.
Figure 6-12 Verify Certificate
Step 3
Click OK to return to the VPN Client window.
If your certificate is invalid, contact the network administrator for instructions.
OL-5490-01
VPN Client User Guide for Mac OS X
6-11
Chapter 6 Enrolling and Managing Certificates
Changing the Password on a Personal Certificate
Changing the Password on a Personal Certificate
To view personal (root) certificates issued by either a Certificate Authority (CA) or a Registration
Authority (RA), use the Show/Hide CA/RA Certificates option from the Certificates menu.
To change the password on a personal certificate
Step 1Select a certificate from the certificate store under the Certificates tab.
Step 2Display the Certificates menu and choose Change CertificatePassword
The VPN Client displays the Change Certificate Password dialog box. In the Current field, type the
password you are currently using to protect your private key.
Step 3In the New field, type the new password.
Step 4In the Confirm field, type the same password again.
Step 5Click OK.
6-12
VPN Client User Guide for Mac OS X
OL-5490-01
Managing the VPN Client
This chapter describes how to manage connection entries, and view and manage the event logging.
Managing Connection Entries
The following sections describe the operations used to manage connection entries. This includes how to
import, modify, and delete a connection entry.
Importing a Connection Entry
You can automatically configure your VPN Client with new settings by importing a new configuration
file (a file with a.pcf extension, called a profile) supplied by your network administrator.
To import a stored profile:
CHA P TER
7
Step 1Click the Connection Entries tab.
Step 2Click Import at the top of the VPN Client window. The Import VPN Connection dialog box appears
(Figure 7-1).
OL-5490-01
VPN Client User Guide for Mac OS X
7-1
Managing Connection Entries
Figure 7-1Import VPN Connection
Chapter 7 Managing the VPN Client
Step 3Locate the connection entry to import. A valid connection entry configuration file must have a .pcf
extension.
Step 4Click Open. The connection entry is added to the list of available profiles and you return to the
Connection Entries tab.
Alternately, you can copy the .pcf file into the profiles directory and restart the VPN Client application.
Modifying a Connection Entry
You can make changes to a connection entry at any time. The new configuration is stored in the profiles
directory and is applied during the next connection attempt.
To modify a connection entry:
Step 1Click the Connection Entries tab.
Step 2Select the connection entry to modify.
Step 3Click Modify at the top of the VPN Client window. The VPN Client Properties dialog box appears
(Figure 7-2).
7-2
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 7 Managing the VPN Client
Figure 7-2Connection Entry Settings
Managing Connection Entries
The existing configuration for this connection entry is displayed.
Step 4Make adjustments to this connection entry configuration.
Step 5Click Save. The VPN Client Properties dialog box closes and you return to the Connection Entries tab.
Deleting a Connection Entry
You can delete any connection entry that does not have an active VPN connection.
To delete a connection entry:
Step 1The Connection Entries tab must be forward.
Step 2Select the connection entry to delete.
Step 3Click Delete at the top of the VPN Client window. You are prompted to confirm the connection entry to
delete (Figure 7-3).
OL-5490-01
VPN Client User Guide for Mac OS X
7-3
Event Logging
CautionYou cannot retrieve a connection entry that has been deleted.
Chapter 7 Managing the VPN Client
Figure 7-3Confirm Delete
Step 4Click Delete to delete this connection entry. The connection entry is removed from the profiles directory
and you are returned to the Connection Entries tab.
Click Do not Delete to return to the VPN Client window without deleting the selected connection entry.
Event Logging
The following sections describe how to view and manage the VPN Client event log.
The event log can help diagnose problems with an IPSec connection between the VPN Client and a peer
VPN device. The log collects event messages from all processes that contribute to the client-peer
connection.
From the Log tab on the VPN Client window you can:
• Enable logging
• Clear the logging display
• View the event log in an external window
• Set or change the logging levels
NoteTo search the log, choose Search Log from the Log menu. Matched instances are highlighted on the Log
tab.
Enable Logging
NoteIf you enable logging during normal use of the VPN Client, it might affect the performance of the
application. We recommend that you only enable logging when troubleshooting.
7-4
To enable logging, click Enable at the top of the VPN Client window. Alternately, you can choose
Enable from the Log menu. The event logging window displays (Figure 7-4).
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 7 Managing the VPN Client
Figure 7-4Event Log
Every VPN session contains at least one log entry, the connection history.
To disable logging, click the Disable button at the top of the VPN Client window.
Event Logging
Clear Logging
To clear the event messages from the logging window, click Clear at the top of the VPN Client window.
Clearing the display does not reset event numbering or clear the log file itself.
NoteTo store the event messages before you clear the log, choose Save from the Log menu.
Set Logging Options
Logging options apply to the active VPN session. Changing the logging settings clears the event log and
the new logging settings take effect immediately.
To set logging options for the VPN Client:
Step 1Click the Log tab.
Step 2Click Options at the top of the VPN Client window. The Log Settings dialog box appears (Figure 7-5).
OL-5490-01
VPN Client User Guide for Mac OS X
7-5
Event Logging
Chapter 7 Managing the VPN Client
Figure 7-5Log Settings
Table 7 - 1 describes the log classes that generate events in the VPN Client log viewer.
Table 7-1VPN Client Logging Classes
Log ClassDescriptionModule
[LOG.IKE]Internet Key Exchange module, which manages
IKE
secure associations.
[LOG.CM]Connection Manager (CM), which drives VPN
Connection Manager
connections. (CM dials a PPP device, configures
IKE for establishing secure connections, and
manages connection states.)
[LOG.CVPND]Cisco VPN Daemon, which initializes client
Daemon (cvpnd)
service and controls the messaging process and
flow.
[LOG.XAUTH]Extended authorization application, which
eXtended AUTHentication
validates a remote user's credentials.
[LOG.CERT]Certificate management process, which handles
Certificates
obtaining, validating, and renewing certificates
from certificate authorities. CERT also displays
errors that occur as you use the application.
[LOG.IPSEC]IPSec module, which obtains network traffic and
IPSec
applies IPSec rules to it.
[LOG.CLI]Command-Line Interface, which allows you to
Command Line
perform certain operations from the command
line rather than using the VPN Client graphical
user interface.
[LOG.GUI]The VPN Client for Mac OS X user interface.Graphical User Interface
7-6
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 7 Managing the VPN Client
Step 3Select the logging level for each module that uses logging services. The logging levels allow you to
choose the amount of information you want to capture. Figure 7-6 shows the logging levels.
Figure 7-6Logging Levels
There are four logging levels:
• 0—Disables logging services for the specified [LOG] class.
• 1—Low, displays only critical and warning events. This is the default.
• 2—Medium, displays critical, warning, and informational events.
• 3—High, displays all events.
Event Logging
Step 4Click Apply. This clears the event log and immediately applies the new logging levels.
Opening the Log Window
To display the events log in a separate window, click Log Window at the top of the VPN Client window.
The VPN Client Log Window appears (Figure 7-7).
OL-5490-01
VPN Client User Guide for Mac OS X
7-7
Viewing Statistics
Chapter 7 Managing the VPN Client
Figure 7-7Log Window
The following buttons allow you to manage the information in the Log Window:
• Save the data in the event log to a file.
NoteThe VPN Client saves the information to the Client install directory. The default file name is
based on the date and time (in 24-hour format) that the log file was created; for example,
LOG-2003-03-13-52-56.text. You can save what is in the present log to a different directory and
filename, but you cannot change the default log directory and filename.
• Open the Log Settings window.
• Clear the information listed in the log window.
• Close the Log Window.
Viewing Statistics
View VPN session information on the Statistics window. The Statistics window lists tunnel details, route
details, and other information related to the active VPN session, including:
• IP addresses assigned for this session
• Byte and packet transfer statistics
• Encryption and authentication algorithms
7-8
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 7 Managing the VPN Client
• Split tunneling
• NAT transparency
To view VPN session statistics, choose Statistics from the Status menu.
The Statistics window has two tabs, Tunnel Details and Route Details. The Tunnel Details tab lists
information about the VPN tunnel. The Route Details tab lists information about excluded and secured
routes.
Tunnel Details
The Tunnel Details tab (Figure 7-8) displays the IP addresses assigned for this session and byte and
packet statistics.
Figure 7-8Statistics Window—Tunnel Details
Viewing Statistics
OL-5490-01
Use the Reset button to clear the fields in the tunnel details display. Alternately, you can reset the
statistics by choosing Reset Stats from the Status menu.
Table 7 - 2 describes the statistics fields on the Tunnel Details tab.
Table 7-2Tunnel Details
FieldDescription
Client Address InformationIP address assigned to the client for this VPN session
Server Address InformationIP address of the VPN device you are connected to.
Bytes ReceivedNumber of bytes received by the client during the active session.
Bytes SentNumber of bytes sent by the client during the active session.
Packets EncryptedNumber of packets encrypted during this VPN session.
Packets DecryptedNumber of packets decrypted during this VPN session.
Packets DiscardedNumber of packets discarded during this VPN session.
Packets BypassedNumber of packets bypassed during this VPN session.
VPN Client User Guide for Mac OS X
7-9
Viewing Statistics
Chapter 7 Managing the VPN Client
Table 7-2Tunnel Details (continued)
FieldDescription
Connection Entry NameThe name of the connection entry for this VPN session.
Connection TimeThe connection time for this VPN session.
EncryptionEncryption algorithm used for this VPN session. The VPN Client
supports:
• 56-bit DES (Data Encryption Standard)
• 168-bit Triple-DES
• AES 128-bit and 256-bit
NoteThe VPN Client continues to support DES/MD5. However,
support for DES/SHA is no longer available, and Release
3.7 and later VPN Clients cannot connect to any central-site
device group that is configured for (or proposing)
DES/SHA. The VPN Client must either connect to a
different group or the system administrator for the
central-site device must change the configuration from
DES/SHA to DES/MD5 or another supported configuration.
The Cisco VPN Client Administrator Guide lists all
supported encryption configurations.
AuthenticationAuthentication algorithm used for this VPN session. The VPN
Client supports:
• HMAC-MD 5 (Hashed Message Authentication Coding with
Transparent tunnelingDisplays whether transparent tunneling is enabled; if enabled, lists
the protocol and port number.
Local LANDisplays whether Local LAN access (split tunneling) is enabled.
CompressionDisplays what type of data compression is used, if any.
Route Details
VPN Client User Guide for Mac OS X
7-10
The Route Details tab displays the routes that VPN traffic takes into the network, which can be either
Local LAN routes or secured routes.
• Local LAN routes are excluded from the secure VPN tunnel.
• Secured routes are routes that go through the secured VPN tunnel.
To display route data during an active VPN session, open the Statistics window and click the Route
Details tab (Figure 7-9).
OL-5490-01
Chapter 7 Managing the VPN Client
Figure 7-9Statistics Window—Route Details
For each local LAN or secured route, the following information is listed:
Viewing Statistics
Notifications
• Network—The IP address of the VPN device providing the route to the network.
• Subnet Mask—The subnet mask applied to the route.
The VPN device that provides your connection to the private network might send notifications to the
VPN Client. These notifications appear on the Notifications window. To display the notifications
window (Figure 7-10), choose Notifications from the Status menu.
When you first establish a VPN connection, you receive a notification regarding your connection. This
is typically the login banner or connection history.
Other notifications might include messages from your network administrator about upgrades to the VPN
Client software or information regarding the specific VPN device you are connected to.
OL-5490-01
VPN Client User Guide for Mac OS X
7-11
Viewing Statistics
Chapter 7 Managing the VPN Client
Figure 7-10 Notif ica tion s Wi ndow
The top pane of the Notifications window lists the title of each stored notification. The bottom pane
displays the notification message associated with the selected title.
All notifications from the VPN device are stored in this display during the VPN session. Every VPN
session contains at least one notification, the connection history.
Some notifications contain a URL which directs you to the location of more current versions of the VPN
Client. If the URL exists, the Launch button becomes active. If you click the Launch button, a browser
open on your workstation.
7-12
VPN Client User Guide for Mac OS X
OL-5490-01
INDEX
A
administrator password 2-4
advanced mode
buttons
menus3-6
tabs3-5
window 3-4
AES (Advanced Encryption Standard)1-6
aggressive mode1-6
algorithms
data compression
encryption1-6
in VPN client1-2
application binaries2-8
applications directory2-8
authentication
algorithms
certificate4-4
extended1-7
features1-5
installation2-4
methods 4-3
mode1-6
authentication methods5-3
digital certificate 5-6
RADIUS5-4
SecurID5-5
shared key5-3
VPN group name 5-4
authenticity6-8
3-5
1-7
1-6
B
backup servers
change order
list4-8
tab4-3
base-64 encoding type 6-3
binaries, application2-8
binary encoding type6-3
bytes received7-9
4-9
C
CA (Certificate Authority)6-2
cable modem1-1
CA URL6-3
certificate
at login
authentication4-4
chain4-5
challenge password6-3
change password 3-7
changing password6-12
contents6-2
deleting6-10
digital1-6
enrollment 3-10
expiration 6-2
exporting 6-9
file enrollment 6-2
identity4-3
importing6-7
import password6-7
5-6
OL-5490-01
VPN Client User Guide for Mac OS X
IN-1
Index
management6-1
new password6-3
online enrollment 6-2
password5-6, 6-7
peer1-5
properties6-8
resume enrollment 3-8
store6-1
validity3-7
verifying 6-11
viewing6-7
view properties 3-7
X.509 1-6
certificate chain6-9
certificates menu3-7
certificates tab3-5
challenge password, certificate6-3
challenge phrase2-5
changing
certificate password
6-12
password on an enrollment request6-6
classes for logging7-6
clear log file7-5
client type (platform) 3-1
client upgrades 7-12
coding, HMAC 1-6
command-line interface, logging 7-6
common name, certificate 6-4
configuration file 7-1
connecting
default connection entry
5-3
connecting to default connection entry 5-3
connection
prerequisites
5-1
status5-3
connection entries tab3-5
connection entry
creating
4-2
default5-3
defined4-1
delete3-6
deleting7-3
importing 7-1
menu3-3
modifying 7-2
saving7-3
setting default3-3, 3-6
template3-6
connection manager 7-6
connection technologies 1-1
connection types 1-3
connect on open 5-3
copyright information3-1
country code 6-8
CRL (Certificate Revocation List) 6-9
custom installation 2-9
D
data compression 1-7, 7-10
data formatsix
DDNS (Dynamic Domain Name System) 1-4
Dead Peer Detection
see DPD
default connection entry
connecting 5-3
default installation 2-9
delete
certificate
6-10
connection entry 3-6, 7-3
delete with reason1-4
deleting
enrollment request
department, certificate 6-4
DES (Data Encryption Standard)7-10
destination volume 2-7
DHCP request 1-4
Diffie-Hellman groups 1-6
3-3
6-5
IN-2
VPN Client User Guide for Mac OS X
OL-5490-01
Index
directory, applications 2-8
disable logging 3-8
disconnect client 3-3, 3-9
disk drive2-7
disk space2-1
DNS, split1-6
documentation
conventions
viii
obtaining ix
relatedviii
domains1-6
DPD
adjusting peer time out
4-8
keep alive mechanism
DSL
1-1
duplicate function 3-9
E
easy install2-9
Easy VPN1-1
enable logging3-8
enable transport4-7
encoding types6-3
encryption algorithm1-6
enrolling certificates 6-2
enrollment, resume 3-10
enrollment parameters 6-4
enrollment request
changing password
deleting6-5
resuming 6-6
viewing6-5
enrollment type, certificate 6-2
erase user password3-9
ESP (protocol 50) 4-7
event logging 3-2
event messages3-5
export certificate 6-9
6-6
export path, certificate6-9
extended authentication1-7, 7-6
F
features
authentication
1-5
IPSec1-5
program 1-3
VPN Client 1-3
firewall, see PIX firewall
firewalls
4-7
FQDN (Fully Qualified Distinguished Name) 6-8
G
graphical user interface, logging7-6
group
authentication
5-4
names1-2
passwords1-2
group authentication 4-3
GUI
installing
2-8
logging 7-6
supported 1-1
H
hard disk space2-1
hash6-8, 7-10
hash function, MD5 1-6
hiding client window 3-2
hijacked IP address1-5
HMAC (Hashed Message Authentication Coding)1-6
host name4-3
host name population 1-4
hybrid authentication on Darwin 2-4
OL-5490-01
VPN Client User Guide for Mac OS X
IN-3
Index
I
icon for installer 2-2
identity certificate 4-3
IKE (Internet Key Exchange)1-2, 7-6
IKE keepalives1-5
image file 2-2
import
certificate
connection entry7-1
password6-7
installation
authentication
customize2-9
default2-9
process2-6
requirements2-1
successful2-11
installation packages2-8
installer
directory
extracting2-2
icon2-2
package2-2
installing the GUI2-4, 2-8
interfaces, supported1-1
invalid certificate 6-11
IP address7-9
IPCOMP (IP compression)1-7
IPSec
attributes
features1-5
group4-4
module 7-6
with VPN1-2
ISDN1-1
6-7
2-4
2-3
1-6
K
keepalives1-5
kernel extension 2-8
key
pair
6-8
preshared 1-6, 4-1
size6-2, 6-8
keywords 2-2
L
LAN connection 1-1
launch, from notification 1-4
launch browser 7-12
license agreement2-7
local LAN access1-3, 4-7, 7-10
log
menu
3-8
settings3-8
tab3-5
window 3-8, 7-8
log file, saving 3-8, 7-8
logging
classes
7-6
clear7-5
levels7-7
options 7-5
view in external window 7-7
login, simultaneous 4-1
M
Macintosh OS
services
main mode1-6
3-2
IN-4
VPN Client User Guide for Mac OS X
OL-5490-01
Index
main tabs
certificates
3-5
connection entries3-5
log3-5
main VPN Client window 3-4, 5-2
managing
certificates
6-1
connection entries7-1
MD5 (Message Digest 5)1-6
menus
certificates
3-7
connection entries3-6
log3-8
main3-6
right-click 3-8
status3-7
minimize client window 3-2
mode
advanced
3-4
aggressive1-6
authentication1-6
configuration1-7
main1-6
simple3-2
transparent tunneling4-7
tunnel encapsulation 1-7
modify connection entry 7-2
MTU size1-4
N
NAT Transparency1-4, 7-10
new password, certificate 6-3
notifications 7-11
notifications, from VPN device 1-4
notifications, viewing 3-7
O
obtaining
documentation
ix
installer2-2
software2-2
operating system 1-3
P
packages
installation
remove2-9
packets
querying
tunneling 1-6
packets encrypted7-9
parameters
defining
transport 4-6
passcodes5-5
password
administrator
certificate 6-7
challenge6-3
changing3-7
import6-7
new6-3
passwords
enrollment request
changing
personal certificate 6-12
PAT (Port Address Translation)1-4, 4-7
pcf file2-3, 7-1
peer certificate1-5
peer response timeout4-8
adjusting4-8
peer VPN concentrator4-5
PIX firewall1-1
2-8
1-6
2-3
2-4
6-6
OL-5490-01
VPN Client User Guide for Mac OS X
IN-5
Index
PKI (Public Key Infrastructure) 1-3, 4-4
platform3-1
POTS1-1
preconfiguration tasks2-2
preconfigured files2-2
preconfigured keys 2-1
preferences, client window3-1
prerequisites
installation
2-1, 2-6
passwords2-1
RSA PIN5-1
VPN connection5-1
preshared keys4-1
private network2-3
profile, user2-3, 7-1
program features1-3
progress bar, installation 2-10
protocol 1-3
protocols
DPD
Q
quitting client 3-2
R
RADIUS authentication5-4
reset statistics3-7, 7-9
resume enrollment 3-10
resuming an enrollment request 6-6
right-click menus 3-8
root certificate
installing automatically on Darwin
routing data 3-2
RSA5-5
run mode 3-2
2-4
S
SA (security association) 1-4
save log file3-8
SCEP (Simple Certificate Enrollment Protocol) 6-1
SecurID authentication 5-5
session time 3-4
SHA-1 (Secure Hash Algorithm) 1-6
shared key authentication5-3
show/hide window 3-2
signing key pair6-8
simple mode
menu
3-3
window 3-2
single SA1-4
software upgrades1-4, 7-11
split DNS1-6
split tunneling 1-4, 1-6
stateful firewalls4-7
statistics
tunnel
3-7
viewing 7-8
status bar3-4, 5-3
status menu3-3, 3-7
subnet mask7-11
supported VPN devices 1-1
system adminstrator2-1
system requirements2-1
T
tab
certificates
connection entries 3-5
log3-5
TCP port 4-7
technical supportx
template3-6
terminate connections1-1
3-5
IN-6
VPN Client User Guide for Mac OS X
OL-5490-01
Index
terms, license agreement2-7
toggle command 3-2
tooltips, enabling 3-2
transparent tunneling1-5, 4-7
transport
parameters
4-6
tunneling 4-7
Triple-DES (Data Encryption Standard)1-6
tunneling
encapsulation mode
1-7
protocol 1-3
split1-6
transparent4-7
tunnel routing data 3-2
tunnel statistics 3-7
U
UDP packets4-7
uninstalling the VPN client 2-4
upgrades 7-11
user
access
password3-9
profiles2-3
user authentication
methods
supported types 1-3
VPN device1-5
user profiles, installing 2-8
1-2
5-3
notifications 3-7
statisitics 7-8
viewing
enrollment request
6-5
VPN Client
defined
1-2
features1-3
icon5-2
menus3-6
quitting 3-2
window 3-4, 5-2
VPN Daemon 7-6
VPN device
DPD
4-8
VPN devices 1-1
VPN Group 4-3
VPN server notification 1-4
VPN startup2-8
W
warnings 6-10
window, log 3-8
window settings 3-2
X
X.5091-2
XAUTH (extented authentication) 1-7
V
verify certificate 3-7, 6-11
version information3-4
view
certificate properties
certificates6-7
logging 7-7
OL-5490-01
3-7
VPN Client User Guide for Mac OS X
IN-7
Index
IN-8
VPN Client User Guide for Mac OS X
OL-5490-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.