Index-2
IIIInnnnd
ddde
eeex
xxx
key pairs
.............................................
2-10
key spaces
...........................................
2-13
L
L
L
L
limited access
multiuser tunnels
...........................
5-17
single-user tunnels
.........................
5-13
load balancing
......................................
6-1
M
M
M
M
modular components of VPN suite
.........
1-2
multiuser tunnels
.........................
5-16
–
5-19
firewall rule
...................................
5-18
full access
.....................................
5-17
limited access
................................
5-17
N
N
N
N
names
..................................................
3-2
See also secure profiles
network address translation (NAT)
.......
5-12
network configurations of VPN components
.
1-5
networks
.............................................
5-20
O
O
O
O
one-way in firewall rules
.......................
5-22
one-way out firewall rules
.....................
5-24
outbound proxies
.................................
5-26
outer cipher block chaining (CBC)
.........
2-8
P
P
P
P
packet handling
....................................
3-7
packet keys
..........................................
3-8
packets and packet headers
...................
1-6
private keys
....................................
1-3
,
2-9
proxies
.......................................
5-26
–
5-29
public key length
..................................
3-6
public keys
...........................................
2-9
R
R
R
R
RADIUS authentication
.........................
4-5
red networks
........................................
5-2
red tunnels
..........................................
5-20
redundancy
..........................................
6-2
routing tables
.......................................
1-8
S
S
S
S
secure profiles
................................
3-2
–
3-3
algorithms
......................................
3-2
encapsulation
.................................
3-3
keepalive
........................................
3-2
names
............................................
3-2
timeout
..........................................
3-2
secure tokens
.......................................
1-3
SecurID authentication
..........................
4-4
Shiva Smart Tunneling (SST)
authentication methods
...................
3-6
crypto period length
........................
3-6
public key length
............................
3-6
See also encapsulation
single-user tunnels
.......................
5-12
–
5-15
firewall rule
...................................
5-14
full access
.....................................
5-12
limited access
................................
5-13
site-to-site tunnels
.................................
5-9
stateful filtering
....................................
5-4
stateless filtering
..................................
5-2
subnet masks
.......................................
1-6
symmetric cryptographic systems
..
2-3
,
2-10
T
T
T
T
TCP/IP
.................................................
1-6
IP addresses of devices
...................
1-6
timeout
................................................
3-2
See also secure profiles
Transmission Control Protocol/Internet
Protocol (TCP/IP)
.....................
1-6
trusted networks
.................................
5-20
trusted tunnels
....................................
5-20
tunnel modes
.......................................
5-20
tunnel termination and firewall rules
.....
5-31
tunnels
...........................................
5-1
–
5-8
firewall rules
.........................
5-14
,
5-18
full access with multiuser
...............
5-17
full access with single-user
.............
5-12