
11
Release Notes for Cisco VPN 3002 Hardware Client Release 3.1
78-13771-01
Features Summary
• The VPN 3002 Command Line Interface (CLI) is a menu- and command-line
based interface that you can use with the local system console or
remotely—from the private LAN or through the VPN tunnel— using:
–
Telnet connections
–
Telnet over SSL secure connections
–
SSH secure connections
The amount of time remaining until the current IP address lease expires, shown
as HH:MM:SS.
PPPoE
PPPoE lets a network client interact with a service provider’s equipment, such as
a broadband modem—most often xDSL—to achieve access to high-speed data
networks. It relies on the Ethernet and PPP standards. It uses an authentication
strategy that includes a username and password to create a PPPoE session from
the VPN 3002 to your ISP Access Concentrator.
PPPoE is a VPN 3002 feature, transparent to the central-site Concentrator to
which the VPN 3002 connects. To use PPPoE, for the VPN 3002 public interface
you must:
• Enable PPPoE.
• Supply a username and password.
UDP NAT/FW Transparent IPSec
UDP NAT/FW Transparent IPSec enables secure transmission between the VPN
3002 Hardware Client and the central-site Concentrator through a device, such as
a firewall, that is performing Network Address Translation (NAT).
Using this feature encapsulates encrypted data traffic within UDP packets. The
VPN 3002 also sends keepalives frequently, ensuring that the mappings on the
NAT device are kept active.
While you do not have to configure this feature on the VPN 3002, the following
requirements do apply. To use IPSec through NAT:
• You must upgrade both the central-site Concentrator and the VPN 3002 to
Release 3.0.2 or higher.
Comentarios a estos manuales