Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [V] [W] [X] "validity period" field (ITU-T X.509v3-compliant certificates), VCA (Virtual Cluster Agent) protocol, RAVPN concentrator HA vendor HA interoperability design considerations interoperability with stateful IPsec HA, invalid security parameter index recovery, Phase1/2 SA lifetime expiry, SADB management, impact on path availability limitations of inability to specify multiple peers, lack of peer availability mechanisms, verifying dynamic crypto maps IPsec+GRE model, tunnel establishment message digests site-to-site VPN configuration TED Virtual Fragmentation Reassembly, voluntary tunnels, VPDNs (virtual private dialup networks), L2TP control messages, payload packets, tunnel negotiation process, Layer 2 Forwarding Protocol packet format, tunnel establishment process, PPTP compulsory tunnels, data structure, tunnel negotiation process, voluntary tunnels, VPN clients, VPN concentrators, VPN routes, redistribution, VPN topologies hub-and-spoke clustered spoke design, redundant clustered spoke design, IPsec+GRE model sample configurations, tunnel establishment, verifying, RAVPNs clients, clustered VPN concentrator designs, standalone VPN concentrator designs, site-to-site configuring, over routed domain, 2nd verifying configuration, VPN tunnel termination dual-DMZ firewall design 2nd firewalled GRE-offload with cleartext firewall paths, with dynamic crypto maps, with high-speed tunnel termination, with IKE x-Auth, "on a stick" termination NAT-on-a-stick, router-on-a-stick, termination redundancy on HSRP/VRRP virtual interfaces, using RP-based IPsec HA, with multiple peer statements, VPN3000 Clustering, VRFs (VPN Routing and Forwarding Instances), VRRP, RAVPN concentrator HA, 2nd 3rd |