CMC has a standard graphical user interface (GUI) that allows the user to configure the client.
Support for Multiple User Profiles:
CMC user profiles contain the user configuration settings, keys, IP addresses, and rules regarding access that determine the behavior of the CMC for the user. The profiles can be created using the GUI on the client. Profiles can also be created in an external tool, such as a text editor, and loaded into the CMC. The format is an XML-like structure. The CMC supports having multiple profiles loaded, with easy switching to different profiles as needed. Switching to a new profile takes on a completely new user identity, allowing the CMC to connect in a new topological manner. This is particularly useful for consultants or other workers who need secure connectivity to different networks, from different places at different times, without having access to all simultaneously.
Lock-Down Mode :
Lock-down support allows the administrator to restrict what options are available to the user in terms of CMC interaction. For example, the user can be restricted from disabling/stopping the CMC. This restriction would ensure that while the PC is on, all user traffic is tunneled to the Enterprise network, thereby limiting possibilities of security breaches, because all network traffic passes through corporate firewalls/AV servers.
Multiple Users on Same Device :
Multiple profiles can be installed. In addition, multiple users in Windows will have their own profiles. This means that a single PC can be shared between multiple Windows users, and all of them will have their own CMC identities.
Software OS Support, Installation, Update, and Systems :
The CMC supports Windows XP including support for Windows XP Home and Tablet PC Edition. There are no service pack dependencies for Windows XP.
The CMC supports Windows 2000 with Service Pack 2 or higher installed.
A log viewer is included that allows users to view events of the CMC. This functionality is useful when checking is required and connectivity is not possible. The CMC log can be copied elsewhere and viewed by a support engineer. The information displayed in the log includes the severity of the event, the time that the event occurred, and a brief description of the event. If you double-click a particular entry, you can view more details about the entry.
Mobile Client Password Protection:
Depending on the deployment model, the CMC can request a user password at startup. In situations where the CMC is deployed, with a single user per PC, and where a Windows domain is employed, it may be regarded as unnecessary to have this login. However, this is an administrative issue configurable in the CMC profile.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...