30-19
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 30 Configuring Connection Profiles, Group Policies, and Users
Configuring Connection Profiles
hostname(config-tunnel-ipsec)#
isakmp ikev1-user-authentication (inside) hybrid
hostname(config-tunnel-ipsec)#
Configuring Connection Profiles for Clientless SSL VPN Sessions
The tunnel-group general attributes for clientless SSL VPN connection profiles are the same as those for
IPSec remote-access connection profiles, except that the tunnel-group type is webvpn and the
strip-group
and
strip-realm
commands do not apply. You define the attribute specific to clientless SSL
VPN separately. The following sections describe how to configure clientless SSL VPN connection
profiles.
Specifying a Connection Profile Name and Type for Clientless SSL VPN Sessions
Create the connection profile, specifying its name and type by entering the
tunnel-group
command in
global configuration mode. For an IPSec remote-access tunnel, the type is
webvpn
hostname(config)#
tunnel-group
tunnel_group_name
type webvpn
hostname(config)#
For example, to create a clientless SSL VPN tunnel-group named TunnelGroup3, enter the following
command:
hostname(config)#
tunnel-group TunnelGroup3 type webvpn
hostname(config)#
Configuring General Tunnel-Group Attributes for Clientless SSL VPN Sessions
To configure or change the connection profile general attributes, specify the parameters in the following
steps.
Step 1
To configure the general attributes, enter
tunnel-group general-attributes
command, which enters
tunnel-group general-attributes configuration mode. Note that the prompt changes:
hostname(config)#
tunnel-group
tunnel_group_name
general-attributes
hostname(config-tunnel-general)#
To configure the general attributes for TunnelGroup3, created in the previous section, enter the following
command:
hostname(config)#
tunnel-group TunnelGroup3 general-attributes
hostname(config-tunnel-general)#
Step 2
Specify the name of the authentication-server group, if any, to use. If you want to use the LOCAL
database for authentication if the specified server group fails, append the keyword LOCAL:
hostname(config-tunnel-general)#
authentication-server-group
groupname
[
LOCAL
]
hostname(config-tunnel-general)#
For example, to configure the authentication server group named test, and to provide fallback to the
LOCAL server if the authentication server group fails, enter the following command:
hostname(config-tunnel-general)#
authentication-server-group test LOCAL
hostname(config-tunnel-general)#
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......