30-40
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 30 Configuring Connection Profiles, Group Policies, and Users
Group Policies
Step 4
Configure a maximum amount of time for VPN connections, using the
vpn-session-timeout
command
in group-policy configuration mode or in username configuration mode.
hostname(config-group-policy)#
vpn-session-timeout
{
minutes
|
none
}
hostname(config-group-policy)#
The minimum time is 1 minute, and the maximum time is 35791394 minutes. There is no default value.
At the end of this period of time, the security appliance terminates the connection.
A group policy can inherit this value from another group policy. To prevent inheriting a value, enter the
none
keyword instead of specifying a number of minutes with this command. Specifying the
none
keyword permits an unlimited session timeout period and sets session timeout with a null value, which
disallows a session timeout.
The following example shows how to set a VPN session timeout of 180 minutes for the group policy
named FirstGroup:
hostname(config)#
group-policy FirstGroup attributes
hostname(config-group-policy)#
vpn-session-timeout 180
hostname(config-group-policy)#
Step 5
Choose one of the following options to specify an egress VLAN (also called “VLAN mapping”) for
remote access or specify an ACL to filter the traffic:
•
Enter the following command in group-policy configuration mode to specify the egress VLAN for
remote access VPN sessions assigned to this group policy or to a group policy that inherits this group
policy:
hostname(config-group-policy)#
[
no
]
vlan
{
vlan_id |
none
}
no vlan
removes the
vlan_id
from the group policy. The group policy inherits the vlan value from
the default group policy.
vlan none
removes the
vlan_id
from the group policy and disables VLAN mapping for this group
policy. The group policy does not inherit the vlan value from the default group policy.
vlan_id
in the command
vlan
vlan_id
is the number of the VLAN, in decimal format, to assign to
remote access VPN sessions that use this group policy. The VLAN must be configured on this
security appliance per the instructions in
“Configuring VLAN Subinterfaces and 802.1Q Trunking”
procedure on page 5-7
.
none
disables the assignment of a VLAN to the remote access VPN sessions that match this group
policy.
Note
The egress VLAN feature works for HTTP connections, but not for FTP and CIFS.
•
Specify the name of the ACL to apply to VPN session, using the
vpn
-
filter
command in group policy
mode. (You can also configure this attribute in username mode, in which case the value configured
under username supersedes the group-policy value.)
hostname(config-group-policy)#
vpn-filter
{
value
ACL name
|
none
}
hostname(config-group-policy)#
You configure ACLs to permit or deny various types of traffic for this group policy. You then enter
the
vpn-filter
command to apply those ACLs.
To remove the ACL, including a null value created by entering the
vpn
-
filter none
command, enter
the
no
form of this command. The
no
option allows inheritance of a value from another group policy.
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......