30-49
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 30 Configuring Connection Profiles, Group Policies, and Users
Group Policies
Configuring an Idle Timeout
Set an idle timeout for individual users behind hardware clients by entering the
user-authentication-idle-timeout
command in group-policy configuration mode. If there is no
communication activity by a user behind a hardware client in the idle timeout period, the security
appliance terminates the client’s access:
hostname(config-group-policy)#
user-authentication-idle-timeout
{
minutes
| none
}
hostname(config-group-policy)#
no user-authentication-idle-timeout
Note
This timer terminates only the client’s access through the VPN tunnel, not the VPN tunnel itself.
The idle timeout indicated in response to the
show uauth
command is always the idle timeout value of
the user who authenticated the tunnel on the Cisco Easy VPN remote device.
The
minutes
parameter specifies the number of minutes in the idle timeout period. The minimum is 1
minute, the default is 30 minutes, and the maximum is 35791394 minutes.
To delete the idle timeout value, enter the
no
form of this command. This option allows inheritance of
an idle timeout value from another group policy.
To prevent inheriting an idle timeout value, enter the
user-authentication-idle-timeout
command with
the
none
keyword. This command sets the idle timeout with a null value, which disallows an idle timeout
and prevents inheriting an user authentication idle timeout value from a default or specified group policy.
The following example shows how to set an idle timeout value of 45 minutes for the group policy named
FirstGroup:
hostname(config)#
group-policy FirstGroup attributes
hostname(config-group-policy)#
user-authentication-idle-timeout 45
Configuring IP Phone Bypass
You can allow Cisco IP phones to bypass individual user authentication behind a hardware client. To
enable IP Phone Bypass, enter the
ip-phone-bypass
command with the
enable
keyword in group-policy
configuration mode. IP Phone Bypass lets IP phones behind hardware clients connect without
undergoing user authentication processes. IP Phone Bypass is disabled by default. If enabled, secure unit
authentication remains in effect.
To disable IP Phone Bypass, enter the
disable
keyword. To remove the IP phone Bypass attribute from
the running configuration, enter the
no
form of this command. This option allows inheritance of a value
for IP Phone Bypass from another group policy:
hostname(config-group-policy)#
ip-phone-bypass
{
enable
|
disable
}
hostname(config-group-policy)#
no ip-phone-bypass
Configuring LEAP Bypass
When LEAP Bypass is enabled, LEAP packets from wireless devices behind a VPN 3002 hardware
client travel across a VPN tunnel prior to user authentication. This action lets workstations using Cisco
wireless access point devices establish LEAP authentication and then authenticate again per user
authentication. LEAP Bypass is disabled by default.
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......