
7
Release Notes for Cisco VPN 3002 Hardware Client Release 3.1
78-13771-01
Features Summary
• Multiple management interfaces: HTML and command-line interface.
• An auto-update feature that lets you upgrade software for multiple hardware
clients from a single, central-site location.
• IPSec as the tunneling protocol.
• UDP NAT/FW Transparent IPSec, which enables secure transmission
between the VPN 3002 Hardware Client and the central-site Concentrator
through a device, such as a firewall, that is performing Network Address
Translation (NAT). See the section, “UDP NAT/FW Transparent IPSec” for
more information.
• Two encryption algorithms: 56-bit DES (Data Encryption Standard) and
168-bit Triple DES.
• Two authentication algorithms:
–
MD5/HMAC-128: HMAC (Hashed Message Authentication Coding)
with the MD5 (Message Digest 5) hash function using a 128-bit key.
–
SHA/HMAC-160: HMAC with the SHA-1 (Secure Hash Algorithm)
hash function using a 160-bit key.
• Key management, using Internet Key Exchange (IKE) (formerly called
ISAKMP/Oakley) with Diffie-Hellman key technique.
• Network addressing support using DNS (Domain Name System), DHCP
(Dynamic Host Configuration Protocol) client and server.
• Support for multiple certificate authorities: Baltimore, Entrust, Microsoft
Windows 2000, Netscape, RSA Keon, and VeriSign.
• System administration features: session monitoring and management,
software image update, system reset and reboot, PING capability,
configurable system administrator profiles, and digital certificate
management.
• Monitoring capabilities, such as: event logging and notification via system
console, syslog, SNMP traps; SNMP MIB-II support; System status and
session data monitoring; and extensive statistics.
Komentarze do niniejszej Instrukcji