
Index
IN-14
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Trace Channel
description 9-21
disadvantages (note) 9-21
transform sets
configuring 6-26
description 6-15
transport mode
description B-9
traps, SNMP 9-41
Triple DES
description E-2
IKE policy keyword (table) 6-3
Trivial File Transfer Protocol servers
See TFTP servers
troubleshooting
connectivity 2-3, 2-22
license upgrades 11-4
See also packet capture
tunnel mode B-9
TurboACL 1-7, 3-18
configuring 3-18 to 3-20
viewing configuration 3-20
U
UDP
connection state information 1-4
Unicast Reverse Path Forwarding
See Unicast RPF
Unicast RPF 1-9
UniCERT Certificate Management System
configuring, example 7-14
supported 6-9
Universal Resource Locators
See URLs
unprivileged mode 1-25
upgrading
feature licenses 1-24
image 11-6 to 11-16
images 1-24
UR license 10-2
URLs
filtering 1-10
filtering, configuration 3-39
logging 1-23
user authentication
See also Xauth
to the PIX Firewall 9-3
User Datagram Protocol
See UDP
V
validating CAs 6-8
VDO LIVE 5-27
VeriSign
CA 7-7
CA example 7-7
configuring CAs, example 6-9
video conferencing applications, supported D - 6
viewing
Command Authorization settings 9-7
default configurations 1-30
IPSec configuration 6-29
NTP 9-12
privilege levels 9-5
RMS 9-26
SMR configuration 2-47
SSH 9-24
user accounts for Command Authorization 9-5
Virtual Private Networks
See VPNs
Virtual Re-assembly 1-10
Kommentare zu diesen Handbüchern