30-41
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 30 Configuring Connection Profiles, Group Policies, and Users
Group Policies
A group policy can inherit this value from another group policy. To prevent inheriting a value, enter
the
none
keyword instead of specifying an ACL name. The
none
keyword indicates that there is no
access list and sets a null value, thereby disallowing an access list.
The following example shows how to set a filter that invokes an access list named acl_vpn for the
group policy named FirstGroup:
hostname(config)#
group-policy FirstGroup attributes
hostname(config-group-policy)#
vpn-filter acl_vpn
hostname(config-group-policy)#
Step 6
Specify the VPN tunnel type for this group policy.
hostname(config-group-policy)#
vpn-tunnel-protocol
{
webvpn
|
IPSec
|
l2tp-ipsec
}
hostname(config-group-policy)#
The default is IPSec. To remove the attribute from the running configuration, enter the
no
form of this
command.
hostname(config-group-policy)#
no vpn-tunnel-protocol
[
webvpn
|
IPSec
|
l2tp-ipsec
]
hostname(config-group-policy)#
The parameter values for this command follow:
•
IPSec
—Negotiates an IPSec tunnel between two peers (a remote access client or another secure
gateway). Creates security associations that govern authentication, encryption, encapsulation, and
key management.
•
webvpn
—Provides VPN services to remote users via an HTTPS-enabled web browser, and does not
require a client.
•
l2tp-ipsec
—Negotiates an IPSec tunnel for an L2TP connection
Enter this command to configure one or more tunneling modes. You must configure at least one tunneling
mode for users to connect over a VPN tunnel.
The following example shows how to configure the IPSec tunneling mode for the group policy named
FirstGroup:
hostname(config)#
group-policy FirstGroup attributes
hostname(config-group-policy)#
vpn-tunnel-protocol IPSec
hostname(config-group-policy)#
Configuring Security Attributes
The attributes in this section specify certain security settings for the group:
Step 1
Specify whether to let users store their login passwords on the client system, using the
password-storage
command with the
enable
keyword
in group-policy configuration mode. To disable
password storage, use the
password-storage
command with the
disable
keyword.
hostname(config-group-policy)#
password-storage
{
enable
|
disable
}
hostname(config-group-policy)#
For security reasons, password storage is disabled by default. Enable password storage only on systems
that you know to be in secure sites.
To remove the password-storage attribute from the running configuration, enter the
no
form of this
command:
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......