1-2
VPN Client User Guide for Mac OS X
OL-5490-01
Chapter 1 Understanding the VPN Client
VPN Client Overview
VPN Client Overview
The VPN Client works with a Cisco VPN device to create a secure connection, called a tunnel, between
your computer and a private network. It uses Internet Key Exchange (IKE) and Internet Protocol Security
(IPSec) tunneling protocols to establish and manage the secure connection.
The steps used to establish a VPN connection can include:
•
Negotiating tunnel parameters (addresses, algorithms, lifetime)
•
Establishing VPN tunnels according to the parameters
•
Authenticating users (from usernames, group names and passwords, and X.509 digital certificates.)
•
Establishing user access rights (hours of access, connection time, allowed destinations, allowed
protocols)
•
Managing security keys for encryption and decryption
•
Authenticating, encrypting, and decrypting data through the tunnel
For example, to use a remote PC to read e-mail at your organization, the connection process might be
similar to the following:
Step 1
Connect to the Internet.
Step 2
Start the VPN Client.
Step 3
Establish a secure connection through the Internet to your organization’s private network.
Step 4
When you open your e-mail
•
The Cisco VPN device
–
Uses IPSec to encrypt the e-mail message
–
Transmits the message through the tunnel to your VPN Client
•
The VPN Client
–
Decrypts the message so you can read it on your remote PC
–
Uses IPSec to process and return the message to the private network through the Cisco VPN
device.