30-13
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 30 Configuring Connection Profiles, Group Policies, and Users
Configuring Connection Profiles
This command enters tunnel-group ipsec-attributes configuration mode, in which you configure the
remote-access tunnel-group IPSec attributes.
For example, the following command designates that the tunnel-group ipsec-attributes mode commands
that follow pertain to the connection profile named TG1. Notice that the prompt changes to indicate that
you are now in tunnel-group ipsec-attributes mode:
hostname(config)#
tunnel-group
TG1
type remote-access
hostname(config)#
tunnel-group
TG1
ipsec-attributes
hostname(config-tunnel-ipsec)#
Step 2
Specify the preshared key to support IKE connections based on preshared keys. For example, the
following command specifies the preshared key xyzx to support IKE connections for an IPSec remote
access connection profile:
hostname(config-tunnel-ipsec)#
pre-shared-key xyzx
hostname(config-tunnel-ipsec)#
Step 3
Specify whether to validate the identity of the peer using the peer’s certificate:
hostname(config-tunnel-ipsec)#
peer-id-validate
option
hostname(config-tunnel-ipsec)#
The available options are
req
(required),
cert (
if supported by certificate), and
nocheck (
do not check).
The default is
req
.
For example, the following command specifies that peer-id validation is required:
hostname(config-tunnel-ipsec)#
peer-id-validate req
hostname(config-tunnel-ipsec)#
Step 4
Specify whether to
Step 5
Specify whether to enable sending of a certificate chain. The following command includes the root
certificate and any subordinate CA certificates in the transmission:
hostname(config-tunnel-ipsec)#
chain
hostname(config-tunnel-ipsec)#
This attribute applies to all IPSec tunnel-group types.
Step 6
Specify the name of a trustpoint that identifies the certificate to be sent to the IKE peer:
hostname(config-tunnel-ipsec)#
trust-point
trust-point-name
hostname(config-tunnel-ipsec)#
The following command specifies mytrustpoint as the name of the certificate to be sent to the IKE peer:
hostname(config-ipsec)#
trust-point mytrustpoint
Step 7
Specify the ISAKMP (IKE) keepalive threshold and the number of retries allowed.
hostname(config-tunnel-ipsec)#
isakmp keepalive threshold
<
number
>
retry
<
number
>
hostname(config-tunnel-ipsec)#
The
threshold
parameter specifies the number of seconds (10 through 3600) that the peer is allowed to
idle before beginning keepalive monitoring. The
retry
parameter is the interval (2 through 10 seconds)
between retries after a keepalive response has not been received. IKE keepalives are enabled by default.
To disable IKE keepalives, enter the
no
form of the
isakmp
command:
For example, the following command sets the IKE keepalive threshold value to 15 seconds and sets the
retry interval to 10 seconds:
hostname(config-tunnel-ipsec)#
isakmp keepalive threshold 15 retry 10
hostname(config-tunnel-ipsec)#
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......