Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: OL-1446-02
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT
ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
CIP, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Fast Step, Follow Me Browsing, FormShare, Internet Quotient, iQ
reakthrough, iQ Expertise, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, Networking Academy, ScriptShare, SMARTnet, TransPath, and Voice
AN are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Discover All That’s Possible, The Fastest Way to Increase
our Internet Quotient, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA,
CNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco
ystems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, GigaStack, IOS, IP/TV, LightStream, MGX, MICA,
he Networkers logo, Network Registrar, Pack et , PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, SlideCast, StrataView Plus, Stratm, SwitchProbe,
eleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
ll other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a
artnership relationship between Cisco and any other company. (0201R)
Digital Certificate Information Window 4-16
About Tab 4-19
Help Tab 4-20
Security Prompts 4-20
VPN Encryption Password 4-21
Prompt for Secret 4-21
iv
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
RADIUS Login 4-22
SecurID Challenge 4-24
Changing the SecurID Passcode 4-26
File Menu 4-26
Contents
APPENDIX
AConfiguration File Keywords A-1
VPN Partner Aliases A-1
VPN User A-2
VPN General Section A-4
VPN Root Cert A-4
Example Configuration File A-5
OL-1446-02
Cisco VPN 5000 Client User Guide for Mac OS X
v
Contents
vi
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Contents
About This Guide
This guide provides users and administrators with information about the
Cisco VPN 5000 Client software for the Mac OS X operating system.
This guide contains the following chapters and appendixes:
• Chapter 1, “Introduction to the Cisco VPN 5000 Client.” This chapter
describes how the VPN client works, including its main features.
OL-1446-02
• Chapter 2, “Installing the Cisco VPN 5000 Client.” This chapter describes
how to install the VPN client software.
• Chapter 3, “Running the Cisco VPN 5000 Client.” This chapter describes
how to operate the VPN client.
• Chapter 4, “Cisco VPN 5000 Client User Interface.” This chapter describes
the windows and features of the VPN client.
• Appendix A, “Configuration File Keywords.” This appendix lists acceptable
section names and keywords for editing the configuration file.
• Index
Cisco VPN 5000 Client User Guide for Mac OS X
vii
Obtaining Documentation
Obtaining Documentation
The following sections provide sources for obtaining documentation from Cisco
Systems.
World Wide Web
You can access the most current Cisco documentation on the World Wide Web at
the following sites:
• http://www.cisco.com
• http://www-china.cisco.com
• http://www-europe.cisco.com
Documentation CD-ROM
Cisco documentation and additional literature are available in a CD-ROM
package, which ships with your product. The Documentation CD-ROM is updated
monthlyand may be more current than printed documentation. The CD-ROM
package is available as a single unit or as an annual subscription.
About This Guide
Ordering Documentation
Cisco documentation is available in the following ways:
• Registered Cisco Direct Customers can order Cisco Product documentation
from the Networking Products MarketPlace:
http://www.cisco.com/cgi-bin/order/order_root.pl
• Registered Cisco.com users can order the Documentation CD-ROM through
the online Subscription Store:
http://www.cisco.com/go/subscription
• Nonregistered Cisco.com users can order documentation through a local
account representative by calling Cisco corporate headquarters (California,
USA) at 408 526-7208 or, in North America, by calling 800
553-NETS (6387).
Cisco VPN 5000 Client User Guide for Mac OS X
viii
OL-1446-02
About This Guide
Documentation Feedback
If you are reading Cisco product documentation on the World Wide Web, you can
submit technical comments electronically. Click Feedback in the toolbar and
select Documentation. After you complete the form, click Submit to send it to
Cisco.
You can e-mail your comments to bug-doc@cisco.com.
To submit your comments by mail, use the response card behind the front cover
of your document, or write to the following address:
Attn Document Resource Connection
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Obtaining Technical Assistance
Obtaining Technical Assistance
Cisco.com
OL-1446-02
Cisco provides Cisco.com as a starting point for all technical assistance.
Customers and partners can obtain documentation, troubleshooting tips, and
sample configurations from online tools. For Cisco.com registered users,
additional troubleshooting tools are available from the TAC website.
Cisco.com is the foundation of a suite of interactive, networked services that
provides immediate, open access to Cisco information and resources at anytime,
from anywhere in the world. This highly integrated Internet application is a
powerful, easy-to-use tool for doing business with Cisco.
Cisco.com provides a broad range of features and services to help customers and
partners streamline business processes and improve productivity. Through
Cisco.com, you can find information about Cisco and our networking solutions,
services, and programs. In addition, you can resolve technical issues with online
technical support, download and test software packages, and order Cisco learning
materials and merchandise. Valuable online skill assessment, training, and
certification programs are also available.
Cisco VPN 5000 Client User Guide for Mac OS X
ix
Obtaining Technical Assistance
Customers and partners can self-register on Cisco.com to obtain additional
personalized information and services. Registered users can order products, check
on the status of an order, access technical support, and view benefits specific to
their relationships with Cisco.
To access Cisco.com, go to the following website:
http://www.cisco.com
Technical Assistance Center
The Cisco TAC website is available to all customers who need technical assistance
with a Cisco product or technology that is under warranty or covered by a
maintenance contract.
Contacting TAC by Using the Cisco TAC Website
If you have a priority level 3 (P3) or priority level 4 (P4) problem, contact TAC
by going to the TAC website:
About This Guide
http://www.cisco.com/tac
P3 and P4 level problems are defined as follows:
• P3—Your network performance is degraded. Network functionality is
noticeably impaired, but most business operations continue.
• P4—You need information or assistance on Cisco product capabilities,
product installation, or basic product configuration.
In each of the above cases, use the Cisco TAC website to quickly find answers to
your questions.
To register for Cisco.com, go to the following website:
http://www.cisco.com/register/
If you cannot resolve your technical issue by using the TAC online resources,
Cisco.com registered users can open a case online by using the TAC Case Open
tool at the following website:
http://www.cisco.com/tac/caseopen
Cisco VPN 5000 Client User Guide for Mac OS X
x
OL-1446-02
About This Guide
Contacting TAC by Telephone
If you have a priority level 1 (P1) or priority level 2 (P2) problem, contact TAC
by telephone and immediately open a case. To obtain a directory of toll-free
numbers for your country, go to the following website:
• P1—Your production network is down, causing a critical impact to business
operations if service is not restored quickly. No workaround is available.
• P2—Your production network is severely degraded, affecting significant
aspects of your business operations. No workaround is available.
Obtaining Technical Assistance
OL-1446-02
Cisco VPN 5000 Client User Guide for Mac OS X
xi
Obtaining Technical Assistance
About This Guide
xii
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
CHAPTER
1
Introduction to the
Cisco VPN 5000 Client
The Cisco VPN 5000 Client connects a remote user to a corporate network.
The user connects to a local Internet Service Provider (ISP). Then, using the
VPN client, the user connects to the VPN concentrator Internet IP address to
create a secure tunnel for passing IP packets between the remote user and the
corporate network.
The VPN client encapsulates the data in a routable IP packet and encrypts it using
the IP Security (IPSec) Protocol.
The corporate server or concentrator authenticates the user, decrypts and
authenticates the IPSec packet, and translates the source address in the packets to
an address recognized on the corporate network. This address is used for all traffic
sent from the corporate network to the remote user for the duration of the
connection.
Features
OL-1446-02
The VPN client distinguishes between tunneled and nontunneled traffic and,
depending on your concentrator configuration, allows simultaneous access to the
corporate network and to Internet resources.
Cisco VPN 5000 Client User Guide for Mac OS X
1-1
Features
Chapter 1 Introduction to the Cisco VPN 5000 Client
Cisco VPN 5000 Client software is available for the Macintosh operating system,
Version 10.0, or Mac OS X.
The VPN client communicates over PPP links (including dialup and ISDN) and
over Internet-attached Ethernet connections (including DSL and cable modem).
Table 1-1 describes the VPN client features.
Table 1-1VPN Client Features
FeatureDescription
Operating systemsMac OS X Version 10.0.0 to 10.1.
Connection types
Protocols
Tunnel protocolIPSec
User authentication
• PPP, including dialup and ISDN
• Ethernet, including DSL and cable modem
• IP
• RADIUS
• RSA SecurID
1-2
• Axent Defender
• PKI user certificates (Entrust and
RSA Security CAs only)
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Contents
CHAPTER
2
Installing the Cisco VPN 5000 Client
This chapter describes how to install and uninstall the Cisco VPN 5000 Client on
your computer for the Macintosh operating system Version 10.0, or Mac OS X.
You can obtain the install file by downloading it from the Cisco Systems website
or from your network administrator. The VPN client install file is located in the
VPN5000 folder.
This chapter contains the following sections:
• Uninstalling the VPN Client for Mac OS X, page 2-1
• System Requirements, page 2-2
• Installing the Software, page 2-2
OL-1446-02
NoteBefore you install a new version of the VPN client for Mac OS X, you must first
uninstall any earlier versions of the VPN client, and reboot your computer.
Cisco VPN 5000 Client User Guide for Mac OS X
2-1
Chapter 2 Installing the Cisco VPN 5000 Client
Uninstalling the VPN Client for Mac OS X
Uninstalling the VPN Client for Mac OS X
To uninstall the VPN client for Mac OS X you must run the vpn_uninstall scripts
located in the /Applications/VPN5000Client directory.
To uninstall the VPN client:
Step 1Log in as root user or superuser.
Step 2Make sure you are in the Applications/VPN5000 folder.
Step 3Enter the following command from a terminal window:
./vpn_uninstall
This method completely uninstalls all previous versions of the VPN client.
If running the uninstall script does not work, you can manually uninstall the VPN
client by issuing the following set of commands from a terminal window as the
root user or superuser:
The VPN client for Mac OS X runs on any Power Macintosh or compatible
computer with the Macintosh operating system Versions 10.0.0 to 10.1.
Have available an application that can unpack the archive, such as StuffIt. This
application is included with the VPN client. Your web browser might perform the
translation automatically for you.
Cisco VPN 5000 Client User Guide for Mac OS X
2-2
OL-1446-02
Chapter 2 Installing the Cisco VPN 5000 Client
Installing the Software
This section describes the installation process for the VPN client for Mac OS X.
You must have root login priveleges for the computer on which you are installing
the VPN client.
To install the VPN client for Mac OS X
Step 1From the VPN5000 folder, translate the set-up file from tar.gz using the StuffIt
application.
This operation creates two files: a tar file and a pkg file.
Step 2If your tar.gz application did not expand the set-up package you must enter the
following commands from a terminal window:
gunzip vpn5000-macosx-510-k9.tar.gz
tar -xvf vpn5000-macosx-510-k9.tar
This set of commands creates an installer package named
vpn5000-macosx-510-k9.pkg.
Step 3In a Finder application window, double-click the vpn5000-macosx-510-k9.pkg
icon and follow the instructions to install the VPN client.
Installing the Software
OL-1446-02
Step 4Restart your computer.
After your computer completes the restart process, you can run the VPN client
program.
Cisco VPN 5000 Client User Guide for Mac OS X
2-3
Installing the Software
Chapter 2 Installing the Cisco VPN 5000 Client
2-4
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Contents
CHAPTER
3
Running the Cisco VPN 5000 Client
This chapter describes how to use the Cisco VPN 5000 Client for Mac OS X.
For an overview of the software user interface, see Chapter 4, “Cisco VPN 5000
Client User Interface.”
This chapter contains the following sections:
• Setting Up a Login, page 3-1
• Setting Up Digital Certificates, page 3-4
• Connecting to the VPN Concentrator, page 3-8
• Configuration File Description, page 3-9
Setting Up a Login
This section describes how to set up a login if your administrator has not already
done so.
OL-1446-02
Cisco VPN 5000 Client User Guide for Mac OS X
3-1
Setting Up a Login
Step 1Double-click the VPN client icon on your desktop.
Chapter 3 Running the Cisco VPN 5000 Client
To set up your own login configuration
The VPN Client window opens with the Configurations tab forward (Figure 3-1).
Figure 3-1VPN Client Window
3-2
Step 2
Click the Add button.
The Login Properties dialog box opens.
Step 3Choose your login method.
If you choose Shared Secret, a shared key password authenticates the server
during the login.
If you choose Certificate, a digital certificate is used for authentication during the
login. Tabl e 3- 1 describes the digital certificate login methods.
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Chapter 3 Running the Cisco VPN 5000 Client
Table 3-1Digital Certificate Login Methods
Certificate TypeDescription
ManualManual login method—Uses a root certificate to
UserUser login method—Requires both a user
To add certificates after the initial login, see the “Certificates Tab” section on
page 4-12.
Step 4Enter the login name assigned by your network administrator.
Setting Up a Login
validate the concentrator to the VPN client. See
the “Manual Certificates” section on page 3-4 for
more information.
certificate and a root certificate. The user
certificate validates the VPN client user to the
concentrator, and the root certificate validates the
concentrator to the VPN client. See the “User
Certificates” section on page 3-5 for more
information.
OL-1446-02
Step 5Enter the IP address or domain name of the VPN concentrator that you log in to.
You also have the option to set a secondary concentrator address, choose NAT
transparency, and select your NAT port in this dialog box.
For information regarding other entry fields in the Login Properties dialog box,
see the “Login Properties Dialog Box” section on page 4-5.
Step 6Click OK.
You are now back to the Configurations tab.
Step 7Select a network interface for the VPN client to use.
The network interface is applied to the VPN client software application and does
not differ between users. For example, if you choose Ethernet 0 (en0), every
connection attempt to a concentrator has the VPN client’s network kernel
extension attached to Ethernet 0.
Step 8Click OK.
Cisco VPN 5000 Client User Guide for Mac OS X
3-3
Setting Up Digital Certificates
Step 9Connect to the server as described in the “Connecting to the VPN Concentrator”
section on page 3-8.
Setting Up Digital Certificates
Digital certificates are special encrypted text files that are generated by a trusted
Certificate Authority (CA). Certificates encrypt and decrypt your data, and
replace the shared secret method for user and concentrator authentication.
The VPN client can be configured to use root (manual) certificates or user
certificates. Root certificates authenticate the concentrator that you are
connecting to. User certificates authenticate both the concentrator and the user.
Digital certificates can be obtained using any of the following methods:
• You can import certificates from another location using a browser window.
This method is discussed in the following sections.
• You can request a root or user certificate from a CA using the Certificates tab
of the VPN Client window. See the “Requesting Certificates from a
Certificate Authority” section on page 3-7.
Manual and user certificates are defined in the configuration file for each user. For
information on the configuration file, see the “Configuration File Description”
section on page 3-9.
Chapter 3 Running the Cisco VPN 5000 Client
Manual Certificates
If you choose the manual login method, the system uses a root certificate to
validate the concentrator to the VPN client.
Each VPN client uses a root certificate file, called rootcert, which is generated by
the same CA that generated the concentrator’s certificate. The root certificate
identifies the CA to the client. All clients connecting to concentrators certified by
the same CA use the same root certificate.
NoteIf one or more root certificate files are already defined in the configuration file,
you are not prompted to select one.
Cisco VPN 5000 Client User Guide for Mac OS X
3-4
OL-1446-02
Chapter 3 Running the Cisco VPN 5000 Client
If there are no root certificates in the configuration file, a file browser window
(Figure 3-2) appears to allow you to import a root certificate file to be used during
login.
Figure 3-2Import Root Certificate Window
Setting Up Digital Certificates
You can also access this window by clicking the Import button on the Certificates
tab of the VPN Client window.
Each root certificate in the configuration file is validated during the login.
User Certificates
The user login method requires both a user certificate and a root certificate. The
user certificate validates the VPN client user to the concentrator, and the root
certificate validates the concentrator to the VPN client. User certificates are
associated with one user, while root certificates are associated to a concentrator
and can be used by multiple users.
OL-1446-02
Cisco VPN 5000 Client User Guide for Mac OS X
3-5
Setting Up Digital Certificates
If there is no user certificate in the configuration file, a file browser window
(Figure 3-2) appears to allow you to import a user certificate file to be used during
login. A root certificate must exist in the configuration file; otherwise, you are
prompted to import a root certificate using a file browser window as shown in
Figure 3-3.
Figure 3-3Import Root Certificate Prompt
Chapter 3 Running the Cisco VPN 5000 Client
3-6
NoteIf both the user and root certificate files are already defined in the configuration
file, you are not prompted to select one.
You can also access this browser window by clicking the Import button on the
Certificates tab of the VPN Client window.
When you exit the Login Properties dialog box, the root and user certificate files
that you select are copied in the configuration file.
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Chapter 3 Running the Cisco VPN 5000 Client
Setting Up Digital Certificates
Requesting Certificates from a Certificate Authority
You can also request a user or root certificate from a CA.
• If you request a root certificate, the server script obtains a root certificate
from the CA.
• If you request a user certificate, the server script obtains both a root and a user
certificate from the CA.
To request a root or user certificate from a CA
Step 1Click the Request button on the Certificates tab of the VPN Client window
(Figure 3-4).
Figure 3-4VPN Client Window—Certificates Tab
OL-1446-02
• For root certificates, the Request Root Certificate dialog box appears.
• For user certificates, the Request User Certificate dialog box appears.
Step 2Enter the IP address and URL of the server script of the CA.
Cisco VPN 5000 Client User Guide for Mac OS X
3-7
Chapter 3 Running the Cisco VPN 5000 Client
Connecting to the VPN Concentrator
User certificates require you to enter both the root certificate request information
and the user certificate request information.
For information on these entry fields, see the “Certificates Tab” section on
page 4-12.
Connecting to the VPN Concentrator
You can connect to a VPN concentrator after startup and login.
Connecting After Startup and Login
To establish tunnel sessions after startup
Step 1Double-click the VPN client icon on your desktop.
The VPN Client window opens with the Configurations tab forward
(see Figure 3-1).
3-8
Step 2Select a login name.
Step 3Click the Connect button.
TipTo automatically establish a tunnel session after startup, check the Auto-Connect
to Default when Opened check box on the Configurations tab of the VPN Client
window.
Step 4Respond to each security prompt. Your configuration might require you to
respond to one or more of the following security prompts:
• Encryption Password
• Shared Secret
• RADIUS Login
• SecurID challenge
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Chapter 3 Running the Cisco VPN 5000 Client
For more information on security prompts, see the “Security Prompts” section on
page 4-20.
Step 5Click OK.
A successful connection is indicated by a black dot that appears next to the
selected login name and a connection message appears at the bottom of the
window.
NoteWhen the VPN client is connected, all DNS traffic is tunneled as designated by
the configuration in the concentrator. All other Internet traffic follows normal
routing.
Disconnecting the VPN Client
Choose any of the following methods to disconnect the VPN client:
Configuration File Description
• Click the Disconnect button on the Configurations tab of the VPN Client
window. See Figure 4-1 on page 4-2.
• Press the keyboard combination “Apple-key” and Q simultaneously.
• In the VPN5000 menu, choose the Quit VPN5000 option. See Figure 4-18 on
page 4-26.
Configuration File Description
The configuration file contains information on passwords, security features,
IP addresses, and connection protocols. A configuration file is automatically
generated each time you exit the VPN client. The file is saved in the same folder
in which the installer resides. See the “Example Configuration File” section on
page A-5 for more information.
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
3-9
Configuration File Description
The name and location of the configuration file is VPN Client Preferences, and is
located in the Preferences folder. Each user has their own Preferences folder. It is
located in the Library folder of your home directory.
To edit the configuration file, refer to Appendix A, “Configuration File
Keywords.”
Chapter 3 Running the Cisco VPN 5000 Client
3-10
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Contents
CHAPTER
4
Cisco VPN 5000 Client User Interface
This chapter describes all of the windows, dialog boxes, and features of the Cisco
VPN 5000 Client user interface.
This chapter includes the following sections:
• VPN Client Window, page 4-1
–
Configurations Tab, page 4-2
–
Logging Tab, page 4-9
–
General Tab, page 4-11
–
Certificates Tab, page 4-12
–
About Tab, page 4-19
–
Help Tab, page 4-20
• Security Prompts, page 4-20
• File Menu, page 4-26
VPN Client Window
To access the VPN Client window while you are connected, choose the VPN 5000
Client from the Finder menu. To quit, enter “Apple-key” and Q simultaneously.
OL-1446-02
Cisco VPN 5000 Client User Guide for Mac OS X
4-1
VPN Client Window
The following sections describe the different tabs on the VPN Client window. Use
these windows to set up logins, view statistics, and set other VPN client
parameters.
Configurations Tab
The Configurations tab in the VPN Client window contains a list of possible login
configurations. To establish a tunnel session, select the login configuration you
want to use and click the Connect button.
Figure 4-1 shows the VPN Client window with the Configurations tab forward.
Figure 4-1Configurations Tab
Chapter 4 Cisco VPN 5000 Client User Interface
4-2
To add or modify existing login configurations, use the buttons described in
Table 4-1. To set auto-connect preferences, see Ta ble 4-2.
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Chapter 4 Cisco VPN 5000 Client User Interface
Table 4-1Configurations Tab Buttons
ButtonAction
AddCreates a new login configuration.
RemoveDeletes a login configuration.
EditEdits the selected login configuration.
Set DefaultSets a preselected login configuration when the
ConnectEstablishes a tunnel connection using the selected
DisconnectDisconnects the active tunnel session.
AdvancedOpens the Advanced Configuration Properties
Table 4-2Configurations Tab Check Box
VPN Client Window
client loads.
login configuration.
dialog box.
Network Interface
OL-1446-02
Check BoxAction
Auto-Connect to Default
when Opened
Sets whether or not the default login configuration
automatically connects to the concentrator when
you open the VPN client.
When you open the VPN client application, a list of currently active network
interfaces are displayed in a drop-down menu. For example, your VPN client
might display the following network interfaces:
• en0, for an Ethernet card
• en1, for a wireless card
• ppp0, for a dialup connection
The first active interface detected upon startup is the default.
Cisco VPN 5000 Client User Guide for Mac OS X
4-3
VPN Client Window
The network interface is applied to the VPN client software application and does
not differ between users. For example, if you choose Ethernet 0 (en0), every
connection attempt to a concentrator has the VPN client’s network kernel
extension attached to Ethernet 0.
You can only change the network interface when the VPN client is not connected
to a concentrator. If you try to change the network interface while you have a
connection established, you receive a warning message.
Advanced Configuration Properties Dialog Box
If the concentrator is configured to save secrets, all static passwords entered in the
VPN client are saved in the configuration file so you do not need to enter
passwords again.
To prevent your passwords from being read in the configuration file, enable
password encryption in the file by checking the Encrypt Passwords box on the
Advanced Configuration Properties dialog box.
To access the Advanced Configuration Properties dialog box (Figure 4-2), click
the Advanced button on the Configuration tab of the VPN Client window.
The VPN Client – VPN Encryption Password dialog box appears.
See the “VPN Client—VPN Encryption Password” section on page 4-21.
Step 2Enter your VPN encryption password.
Step 3Click OK.
Step 4In the Advanced Configuration Properties dialog box, click OK.
Login Properties Dialog Box
The Login Properties dialog box allows you to enter and change parameters for
the selected login configuration. To access this dialog box, click the Add or
Edit button on the Configurations tab of the VPN Client window.
OL-1446-02
Cisco VPN 5000 Client User Guide for Mac OS X
4-5
VPN Client Window
Chapter 4 Cisco VPN 5000 Client User Interface
Many parameters require that the client be configured to match the configuration
of the concentrator. For more information on configuring your concentrator, refer
to the Cisco VPN 5000 Concentrator Series Command Reference Guide or the
Cisco VPN 5000 Concentrator Software Configuration Guide.
Figure 4-3 shows the Login Properties dialog box, and Ta bl e 4-3 describes the
entry fields.
Figure 4-3Login Properties Dialog Box
4-6
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Chapter 4 Cisco VPN 5000 Client User Interface
Table 4-3Login Properties Dialog Box Entry Fields
ParameterDescription
Shared KeyThis login method uses only the shared key
CertificateIf you select the Certificate radio button, a
Login NameName of the tunnel user. This name must also be
Primary VPN ServerIP address or fully qualified domain name of the
VPN Client Window
password for authentication.
drop-down menu appears to allow you to choose
your certificate type.
If you choose:
• Manual—Specifies that a root certificate is
used for authentication during the login. If no
root certificate is defined in the configuration
file, you can import one using the Import Root
Certificate browser window, or request one
from the CA using the Request Root
Certificate dialog box.
• User—Specifies that both a root certificate
and a user certificate are used for
authentication during the login. If no user
certificate is defined in the configuration file,
you can import one using the Import User
Certificate browser window, or request one
from a CA using the Request User Certificate
dialog box.
configured either on the concentrator or, if
present, an authentication server. The name can be
between 1 and 60 alphanumeric characters (no
spaces allowed).
concentrator that the VPN client software
connects to. Domain names can be up to
80 characters.
Secondary ServerAlternate concentrator address.
Use NAT Transparency
Mode
NAT PortThis feature allows you to set the destination TCP
Advanced buttonOpens the Advanced Login Properties dialog box.
Enables Network Address Translation (NAT)
transparency for client sessions. The concentrator
must be configured to have an ESP transform set.
Check Use NAT Transparency if you are having
problems connecting through a NAT device or
through an ISP.
port for outgoing VPN packets.
The NAT port on the VPN 5000 client must match
the port number that is configured in
NATTransport keyword in the General section
on the concentrator.
The value can be between 0 and 65536. The
default is 80.
Advanced Login Properties Dialog Box
The Advanced Login Properties dialog box sets local tunneling control. To access
this dialog box, click the Advanced button on the Login Properties dialog box.
Figure 4-4 shows the Advanced Login Properties dialog box, and Table 4-4
Tunnel IPEnables IP-in-IP tunneling to the IP networks
configured in the concentrator.
Exclude Local LANLocal LAN traffic (for the directly connected
network only) is not tunneled, if enabled on the
concentrator.
Exclude DHCP (bootp)DHCP traffic is not tunneled.
The Logging tab displays messages related to tunnel connections for
troubleshooting purposes (Figure 4-5).
Cisco VPN 5000 Client User Guide for Mac OS X
4-9
VPN Client Window
Chapter 4 Cisco VPN 5000 Client User Interface
Figure 4-5Logging Tab
4-10
The Log message level drop-down list determines the detail of messages logged.
The log information is displayed in the window. Tab le 4 -5 describes the levels of
log messages.
Table 4-5Log Message Level Options
Log Message LevelDescription
ErrorReports errors.
WarningReports warnings and errors.
StatusReports connection status, warnings, and errors.
DebugReports every action and provides detailed
information about the connection conversation
between the client and the concentrator.
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Chapter 4 Cisco VPN 5000 Client User Interface
CautionWe recommend that you do not use Debug on a daily basis. It generates a large
number of log messages.
General Tab
The General tab displays information about the VPN client and packet statistics
for each session (Figure 4-6).
Figure 4-6General Tab
VPN Client Window
OL-1446-02
The Version Information section displays the current version of the VPN client
software, copyright information, software build date, and the version number of
the code for the last VPN 5000 concentrator the VPN client was connected to.
The IP address the VPN 5000 concentrator gives to the VPN client for this session
is displayed at the bottom of the VPN Client window.
Cisco VPN 5000 Client User Guide for Mac OS X
4-11
VPN Client Window
Chapter 4 Cisco VPN 5000 Client User Interface
The Statistics section displays information related to tunnel traffic (Tab le 4-6).
This information is used for troubleshooting purposes.
Table 4-6General Statistics
Statistics FieldDescription
Packets Received and
Packets Transmitted
Bad authenticationNumber of packets with bad authentication. A bad
Bad encapsulationNumber of packets with bad encapsulation. A bad
Bad inputNumber of packets that could not wrap properly.
Statistics FieldDescription
Bytes Received and
Bytes Transmitted
ResetClears all displayed statistics except bytes
Number of IP and IPX packets received and
transmitted by the client during the active session.
authentication error means that the check on the
digital signature failed.
encapsulation error usually means that the packet
headers could not be found.
Can be used for billing purposes. These fields list
the number of bytes transmitted and received by
the client during the active session.
received and transmitted.
Certificates Tab
The Certificates tab allows you to manage your root and user certificates.
During the login:
• Each root certificate file is checked against the received concentrator
• Each user certificate is associated with a particular root certificate. During
Figure 4-7 shows the Certificates tab of the VPN Client window and Ta ble 4-7
describes each button.
Cisco VPN 5000 Client User Guide for Mac OS X
4-12
certificate for validity until the concentrator’s certificate is validated, or until
there are no more root certificates. Root certificates are not bound to any user.
the login, each user certificate is checked against each root certificate for
validation. User certificates are bound to the user.
OL-1446-02
Chapter 4 Cisco VPN 5000 Client User Interface
Figure 4-7Certificates Tab
VPN Client Window
OL-1446-02
Table 4-7Certificates Tab Buttons
ButtonAction
ImportImports root certificates.
RemoveRemoves unused or unneeded root certificates.
VerifyVerifies that the selected user certificate includes
an associated root certificate.
ViewOpens the Digital Certificate Information window
(Figure 4-10).
RequestFor root certificates, this button opens the Request
Root Certificate dialog box (Figure 4-8). For user
certificates, this button opens the Request User
Certificate dialog box (Figure 4-9).
Cisco VPN 5000 Client User Guide for Mac OS X
4-13
VPN Client Window
Request Root Certificate Dialog Box
The Request Root Certificate dialog box (Figure 4-8) appears if you request your
root certificate from a CA. See the “Requesting Certificates from a Certificate
Authority” section on page 3-7 for more information.
Figure 4-8Request Root Certificate Dialog Box
Chapter 4 Cisco VPN 5000 Client User Interface
4-14
Table 4-8 describes the entry fields for the Request Root Certificate dialog box.
Table 4-8Request Root Certificate Entry Fields
ParameterDescription
IP AddressIP address of the CA.
URLLocation of the scep server script.
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Chapter 4 Cisco VPN 5000 Client User Interface
Request User Certificate Dialog Box
The Request User Certificate dialog box (Figure 4-9) appears if you request a user
certificate from a CA. A request for a user certificate requires both root certificate
information and user certificate information.
Figure 4-9Request User Certificate Dialog Box
VPN Client Window
OL-1446-02
Table 4-9 describes the entry fields in this dialog box.
Table 4-9Request User Certificate Entry Fields
ParameterDescription
First NameUser’s first name.
Last NameUser’s last name.
Cisco VPN 5000 Client User Guide for Mac OS X
4-15
VPN Client Window
Table 4-9Request User Certificate Entry Fields (continued)
ParameterDescription
EmailUser’s e-mail address.
GroupVPN group on the concentrator.
Challenge PhrasePassword used to validate the user to the network
Key LengthValid key length of the user certificate.
Digital Certificate Information Window
The Digital Certificate Information window (Figure 4-10) displays details about
the selected root or user certificate. To access this window, click either of the
View buttons on the Certificates tab of the VPN Client window. Table 4-10
provides a description of each field in the Digital Certificate Information window.
Chapter 4 Cisco VPN 5000 Client User Interface
administrator.
4-16
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Chapter 4 Cisco VPN 5000 Client User Interface
Figure 4-10 Digital Certificate Information Window
VPN Client Window
OL-1446-02
Table 4-10 Digital Certificate Information Fields
FieldDescription
Certificate Format
Ve rs io n
Certificate Serial
Number
Indicates the X.509 version of the certificate
format.
Specifies the unique numerical identifier of the
certificate in the domain of all public key
certificates issued by the CA.
Signature Algorithm ID
for CA
Identifies the algorithm used by the CA to sign the
certificate.
Cisco VPN 5000 Client User Guide for Mac OS X
4-17
VPN Client Window
Chapter 4 Cisco VPN 5000 Client User Interface
Table 4-10 Digital Certificate Information Fields (continued)
FieldDescription
Issuer NameSpecifies the X.500 distinguished name (DN) of
the CA that issued the certificate.
Validity PeriodSpecifies the start dates and times, and the
expiration date of the certificate.
Subject NameSpecifies the X.500 DN of the entity holding the
private key corresponding to the public key
identified in the certificate.
Subject Public Key
Information
MD5 FingerprintIdentifies the fingerprint of the certificate so that it
The first part of this field identifies the value of the
public key owned by the subject. The second part
is the algorithm identifier specifying the algorithm
with which the public key is to be used.
can be verified against the certificate on the
concentrator.
4-18
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Chapter 4 Cisco VPN 5000 Client User Interface
About Tab
The About tab of the VPN Client window displays product licensing and
copyright information (Figure 4-11).
Figure 4-11 About Tab
VPN Client Window
OL-1446-02
Cisco VPN 5000 Client User Guide for Mac OS X
4-19
Security Prompts
Help Tab
Chapter 4 Cisco VPN 5000 Client User Interface
The VPN client for Mac OS X includes a help file with a Help tab on the VPN
Client window (Figure 4-12).
Figure 4-12 Help Tab
Security Prompts
This section describes the security windows and dialog boxes that can appear
during the login. The security prompts that appear depend on your configuration.
Cisco VPN 5000 Client User Guide for Mac OS X
4-20
OL-1446-02
Chapter 4 Cisco VPN 5000 Client User Interface
VPN Encryption Password
The following dialog box (Figure 4-13) appears if you enabled password
encryption to decrypt the passwords in your configuration file for tunnel session
(see the “Advanced Configuration Properties Dialog Box” section on page 4-4).
Figure 4-13 VPN Client—VPN Encryption Password
Security Prompts
Prompt for Secret
If you are not using certificates, you are prompted for a shared secret to establish
a tunnel between the client and the concentrator (Figure 4-14). Additional
passwords are sent over the tunnel. A shared secret is provided by your
administrator.
OL-1446-02
Cisco VPN 5000 Client User Guide for Mac OS X
4-21
Security Prompts
Chapter 4 Cisco VPN 5000 Client User Interface
Figure 4-14 Prompt for Secret
RADIUS Login
Cisco VPN 5000 Client User Guide for Mac OS X
4-22
If the VPN concentrator uses a RADIUS server to authenticate users, the
RADIUS password and authentication secret verify the client to connect to the
RADIUS VPN concentrator.
OL-1446-02
Chapter 4 Cisco VPN 5000 Client User Interface
If the concentrator specifies PAP authentication, you are prompted by the dialog
box shown in Figure 4-15.
Enter the password and authentication secret in the RADIUS Login dialog box.
The password is the RADIUS password configured on the RADIUS server. The
authentication secret must match the PAPAuthSecret configured in the RADIUS
section of the concentrator.
Figure 4-15 RADIUS Login/PAP Dialog Box
Security Prompts
OL-1446-02
Cisco VPN 5000 Client User Guide for Mac OS X
4-23
Security Prompts
Chapter 4 Cisco VPN 5000 Client User Interface
If the concentrator specifies CHAP authentication, you are prompted by the dialog
box shown in Figure 4-16.
Figure 4-16 RADIUS Login/CHAP Dialog Box
Enter the password in the VPN Client – RADIUS Password dialog box. The
password is issued by the administrator.
SecurID Challenge
Client configurations that use SecurID display several special user prompts. In
some cases, all of the prompts described in this section appear. In other cases, only
some of the prompts described appear.
If the concentrator configuration specifies that the SecurID user name is different
from the concentrator login name, the VPN Client – SecurID Challenge dialog
box appears (Figure 4-17).
Cisco VPN 5000 Client User Guide for Mac OS X
4-24
OL-1446-02
Chapter 4 Cisco VPN 5000 Client User Interface
Figure 4-17 VPN Client—SecurID Challenge
Security Prompts
OL-1446-02
If the SecurID server is configured to require a PIN change, the first time you log
in, the VPN Client – SecurID Challenge dialog box prompts you to change your
PIN.
To change your PIN the first time you log in
Step 1Enter a PIN and click OK, or leave the edit box blank and click Cancel to make
the system generate a PIN.
If the system generates the PIN, a window containing a new PIN appears.
Memorize or note the PIN before you click OK.
Step 2If you have logged in before, enter your SecurID passcode in the VPN Client –
SecurID Challenge dialog box. The passcode consists of your PIN plus the current
code from your SecurID token.
If the passcode is accepted, a client tunnel is created and the globe icon in the
upper right corner of the VPN Client window starts spinning.
If the passcode is not accepted, you get an authentication failed message.
Cisco VPN 5000 Client User Guide for Mac OS X
4-25
File Menu
Step 3Wait until the token passcode changes from the passcode you just entered, and try
again.
If the passcode is still unacceptable, an access denied message appears.
Changing the SecurID Passcode
The administrator can set the SecurID server to require users to change their PINs.
To change your PIN at the request of the administrator
Step 1Enter a PIN in the VPN Client – SecurID Challenge dialog box, and click OK, or
leave the edit box blank and click Cancel to make the system generate a PIN.
Step 2After memorizing or noting your new PIN, click OK.
Step 3Enter your new passcode and click OK.
Chapter 4 Cisco VPN 5000 Client User Interface
File Menu
Cisco VPN 5000 Client User Guide for Mac OS X
4-26
The File menu (Figure 4-18) includes Hide, Show, and Quit commands.
Figure 4-18 File Menu
To hide the VPN Client window, choose Hide VPN5000.
•
• To exit the program, choose Quit VPN5000.
OL-1446-02
Configuration File Keywords
The configuration file has four valid section names:
• [VPN Partner Aliases]
• [VPN User]
• [VPN General Section]
• [VPN Root Cert]
The section names are not case sensitive.
VPN Partner Aliases
Use the keywords listed in Ta bl e A- 1 for aliasing VPN client IP addresses to a text
string. Alias_Name is case sensitive.
APPENDIX
A
OL-1446-02
Table A-1VPN Partner Aliases Keyword
KeywordDescription
Alias_Name=
IP_Address
Alias_Name is any text string including spaces
less than 80 characters. The IP_Address is a valid
IP address of a VPN 5000 concentrator to which
the client can connect. The IP address must be in
standard dotted decimal format and not a domain
name.
Cisco VPN 5000 Client User Guide for Mac OS X
A-1
VPN User
VPN User
Appendix A Configuration File Keywords
Use the keywords listed in Tabl e A- 2 to manually define the login information for
each user of the VPN client. There may be multiple users for each configuration
file.
Table A-2VPN User Section Keywords
KeywordDescription
UserName = stringIdentifies a unique user. This must be the same as
the user name configured in the authentication
service you are using (for example, RADIUS or
SecurID). The string can be between 1 and
60 alphanumeric characters in length, with no
spaces allowed. This entry must always be the first
one on the line.
IPPrimary =
{Alias_Name |
IP_address |
Domain_Name}
IPSecondary =
{Alias_Name |
IP_address |
Domain_Name}
SharedKey =
pass_phrase
RADIUSPassword =
string
Sets the alias name, IP address, or fully qualified
domain name of the VPN 5000 concentrator to
which the client connects.
Sets the alias name, IP address, or fully qualified
domain name of the VPN 5000 concentrator to
which the client connects, if the primary
concentrator is unreachable.
Sets the shared secret for this user. The pass phrase
generates session keys used to authenticate and
encrypt each packet received from or sent to the
client. This keyword must match the Shared Key
configured for this user in the VPN authentication
system. Save Secrets must also be enabled on the
concentrator.
Sets the RADIUSPassword keyword to match the
user’s password configured in the RADIUS server.
Save Secrets must also be enabled on the
concentrator.
A-2
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Appendix A Configuration File Keywords
Table A-2VPN User Section Keywords (continued)
KeywordDescription
PAPAuthSecret =
pass_phrase
IPEnabled = {True |
False}
ExcludeLocalLAN =
{True | False}
ExcludeDHCP =
{True | False}
UsefTCP = {True |
False}
FTCPDestinationPort
= Number
VPN User
Sets the secret used between the VPN 5000
concentrator and the client. This secret
authenticates and encrypts packets exchanged
before passing them on to the RADIUS server
this keyword if the RADIUS server is set to use
PAP for authentication instead of CHAP. The
PAPAuthSecret must match the secret configured
in the RADIUS section of the VPN 5000
concentrator. Save Secrets must also be enabled on
the concentrator.
When the IPEnabled keyword is true, the
VPN client enables IP-in-IP tunneling to the
corporate network.
When the ExcludeLocalLAN keyword is true,
local LAN traffic is not tunneled. You must also
enable the ExcludeLocalLAN keyword in the
VPN Group configuration of the VPN 5000
concentrator.
When the ExcludeDHCP keyword is true,
DHCP traffic is not tunneled.
When the UsefTCP keyword is true, you enable
Network Address Translation (NAT) transparency
for client sessions. Set this keyword if you
experience a problem connecting through a
NAT device or through an ISP.
Sets the NAT port you want to use.
The value can be between 0 and 65536. The
default is 80. If you leave this value blank or
specify a value outside the valid range, the value
of 80 is assumed by the VPN client.
. Use
OL-1446-02
This port must match the number set in the
NATTransport keyword in the General section
for the concentrator.
Cisco VPN 5000 Client User Guide for Mac OS X
A-3
VPN General Section
Table A-2VPN User Section Keywords (continued)
KeywordDescription
LoginMethod =
Entrust | User |
Manual
UserCertLocation =
string
VPN General Section
Use the keyword listed in Table A-3 for setting general operations of the
VPN client. These settings affect each user in the configuration file. Currently, the
password encryption operation is on a per-user basis.
Table A-3VPN General Section Keyword
KeywordDescription
EncryptPasswords =
{True | False}
Appendix A Configuration File Keywords
Sets the login method. Refer to Table 3-1 on
page 3-3 for a description of each login method.
Name of the user certificate that is located in the
IntraPort Client/certificates/user folder.
When the EncryptPasswords keyword is true, all
pass phrases (SharedKey, RADIUSPassword,
and PAPAuthSecret) are encrypted for every user
in the configuration file. The user is prompted for
the encryption password during the login.
VPN Root Cert
Use the keyword in Table A-4 for root certificates that were imported into the
VPN client. Only one root certificate is allowed per section, but there may be as
many as 30 VPN Root Cert sections.
Table A-4VPN Root Cert Section Keyword
KeywordDescription
CertName =
root_certificate_file_name
Cisco VPN 5000 Client User Guide for Mac OS X
A-4
Specifies the file name for each root
certificate that was imported.
OL-1446-02
Appendix A Configuration File Keywords
Each root certificate must have its own section header as shown in the following
examples:
RADIUS Login 4-22
requesting a root certificate 4-14
IN-2
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Index
requesting a user certificate 4-15
S
secrets, encrypting 4-4
section names
VPN General
VPN Partner Aliases A-1
VPN Root Cert A-4
VPN User A-2
SecurID 4-24
setting up a login 3-1
shared key login 4-7
software features 1-1
statistics, tunnel traffic 4-12
StuffIt 2-2
A-4
user certificates, see certificates
user interface
4-1
V
VPN 5000 concentrator
connecting to
specifying 3-3
VPN Client window 4-1 to ??
VPN Encryption Password 4-21
VPN General section name A-4
VPN Partner Aliases section name A-1
VPN Root Cert section name A-4
VPN User section name A-2
3-8
T
Tunnel protocols 1-2
tunnels, establishing 3-8
U
uninstalling
client
2-1
user authentication
specifying
supported 1-2
OL-1446-02
3-3
Cisco VPN 5000 Client User Guide for Mac OS X
IN-3
Index
IN-4
Cisco VPN 5000 Client User Guide for Mac OS X
OL-1446-02
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.