EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Configuration Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
1822 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1382 background imageLoading...
Page #1382 background image
64-72
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 64 General VPN Setup
Mapping Certificates to IPsec or SSL VPN Connection Profiles
–
Fallback—Specifies whether to use LOCAL for user authentication if the specified server group
fails.
• Client Address Assignment—Specifies attributes relevant to assigning client attributes.
–
DHCP Servers—Specifies the IP address of a DHCP server to use. You can add up to 10 servers,
separated by spaces.
–
Client Address Pools—Specifies up to 6 predefined address pools. To define an address pool,
go to Configuration > Remote Access VPN > Network Client Access > Address Assignment >
Address Pools.
–
Select—Opens the Select Address Pools dialog box.
• Default Group Policy—Specifies attributes relevant to the default group policy.
–
Group Policy—Selects the default group policy to use for this connection. The default is
DfltGrpPolicy.
–
Manage—Opens the Configure Group Policies dialog box, from which you can add, edit, or
delete group policies.
–
Client Protocols—Selects the protocol or protocols to use for this connection. By default, both
IPsec and L2TP over IPsec are selected.
Modes
The following table shows the modes in which this feature is available:
Mapping Certificates to IPsec or SSL VPN Connection Profiles
When the adaptive security appliance receives an IPsec connection request with client certificate
authentication, it assigns a connection profile to the connection according to policies you configure. That
policy can be to use rules you configure, use the certificate OU field, use the IKE identity (i.e. hostname,
IP address, key ID), the peer IP address, or a default connection profile. For SSL connections, the
adaptive security appliance only uses the rules you configure.
For IPsec or SSL connections using rules, the adaptive security appliance evaluates the attributes of the
certificate against the rules until it finds a match. When it finds a match, it assigns the connection profile
associated with the matched rule to the connection. If it fails to find a match, it assigns the default
connection profile (DefaultRAGroup for IPsec and DefaultWEBVPNGroup for SSL VPN) to the
connection and lets the user choose the connection profile from a drop-down menu displayed on the
portal page (if it is enabled). The outcome of the connection attempt once in this connection profile
depends on whether or not the certificate is valid and the authentication settings of the connection
profile.
A certificate group matching policy defines the method to use for identifying the permission groups of
certificate users. You can use any or all of these methods.
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
• — • ——

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals