1-3
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Connection Profiles, Group Policies, and Users
Connection Profiles
General Connection Profile Connection Parameters
General parameters are common to all VPN connections. The general parameters include the following:
•
Connection profile name—You specify a connection-profile name when you add or edit a
connection profile. The following considerations apply:
–
For clients that use preshared keys to authenticate, the connection profile name is the same as
the group name that a client passes to the ASA.
–
Clients that use certificates to authenticate pass this name as part of the certificate, and the ASA
extracts the name from the certificate.
•
Connection type—Connection types include IKEv1 remote-access, IPsec Lan-to-LAN, and
Anyconnect (SSL/IKEv2). A connection profile can have only one connection type.
•
Authentication, Authorization, and Accounting servers—These parameters identify the server
groups or lists that the ASA uses for the following purposes:
–
Authenticating users
–
Obtaining information about services users are authorized to access
–
Storing accounting records
A server group can consist of one or more servers.
•
Default group policy for the connection—A group policy is a set of user-oriented attributes. The
default group policy is the group policy whose attributes the ASA uses as defaults when
authenticating or authorizing a tunnel user.
•
Client address assignment method—This method includes values for one or more DHCP servers or
address pools that the ASA assigns to clients.
•
Override account disabled—This parameter lets you override the “account-disabled” indicator
received from a AAA server.
•
Password management—This parameter lets you warn a user that the current password is due to
expire in a specified number of days (the default is 14 days), then offer the user the opportunity to
change the password.
•
Strip group and strip realm—These parameters direct the way the ASA processes the usernames it
receives. They apply only to usernames received in the form user@realm.
A realm is an administrative domain appended to a username with the @ delimiter (user@abc). If
you strip the realm, the ASA uses the username and the group (if present) for authentication. If you
strip the group, the ASA uses the username and the realm (if present) for authentication.
Enter the strip-realm command to remove the realm qualifier, and enter the strip-group command to
remove the group qualilfier from the username during authentication. If you remove both qualifiers,
authentication is based on the
username
alone. Otherwise, authentication is based on the full
username@realm
or
username
<
delimiter
>
group
string. You must specify strip-realm if your server
is unable to parse delimiters.
In addition, for L2TP/IPsec clients only, when you specify the strip-group command the ASA selects
the connection profile (tunnel group) for user connections by obtaining the group name from the
username presented by the VPN client.
•
Authorization required—This parameter lets you require authorization before a user can connect, or
turn off that requirement.
•
Authorization DN attributes—This parameter specifies which Distinguished Name attributes to use
when performing authorization.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......