VPN Client Window
Either typing Ctrl-S or selecting Statistics from the Status drop-down menu displays the
following information about your connection (see Figure 14-7):
¦ Client IP address—The IP address assigned to the Cisco VPN Client for the current
session.
¦ Server IP address—The IP address of the Easy VPN Server to which the client is currently
connected.
¦ Bytes Received—The total number of bytes received by the client software.
¦ Bytes Sent—The total number of bytes sent by the client software.
¦ Packets Encrypted—The total number of data packets transmitted.
¦ Packets Decrypted—The total number of data packets received.
¦ Packets Discarded—The total number of packets rejected because they did not come
from the Easy VPN Server.
¦ Packets Bypassed— The total number of packets that were not processed (such as
Address Resolution Protocol [ARP] and Dynamic Host Configuration Protocol [DHCP]
packets).
¦ Encryption—The data encryption method in use for traffic in the tunnel.
¦ Authentication—The data or packet authentication method used for traffic through the
tunnel.
¦ Transparent Tunneling—The status of transparent tunneling (either active or inactive).
¦ Local LAN Access—Indicates whether local local area network (LAN) access is enabled
or disabled.
¦ Compression—Indicates whether data compression is in effect and identifies the
compression being used (currently, only LZS compression is supported).
Figure 14-7 VPN Client Statistics Window
Transparent Tunneling
Transparent tunneling enables a secure transmission between the VPN Client and a secure
VPN Server when the traffic passes through an intermediary device that is performing NAT
(such as a firewall). Transparent tunneling encapsulates Internet Protocol 50 (ESP) traffic
within either UDP or TCP packets to prevent the IPSec traffic from being changed by the
NAT/PAT device. Transparent tunneling is commonly used with VPN Client deployments
that are behind a home router that is performing NAT/PAT.