1-15
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Connection Profiles, Group Policies, and Users
Configuring Connection Profiles
The following command specifies mytrustpoint as the name of the certificate to be sent to the IKE peer:
hostname(config-ipsec)#
ikev1
trust-point mytrustpoint
Step 6
Specify the ISAKMP keepalive threshold and the number of retries allowed:
hostname(config-tunnel-ipsec)#
isakmp keepalive threshold
<
number
>
retry
<
number
>
hostname(config-tunnel-ipsec)#
The
threshold
parameter specifies the number of seconds (10 through 3600) that the peer is allowed to
idle before beginning keepalive monitoring. The
retry
parameter is the interval (2 through 10 seconds)
between retries after a keepalive response has not been received. IKE keepalives are enabled by default.
To disable ISAKMP keepalives, enter
isakmp keepalive disable
.
For example, the following command sets the IKE keepalive threshold value to 15 seconds and sets the
retry interval to 10 seconds:
hostname(config-tunnel-ipsec)#
isakmp keepalive threshold 15 retry 10
hostname(config-tunnel-ipsec)#
The default value for the
threshold
parameter is 300 for remote-access and 10 for LAN-to-LAN, and the
default value for the retry parameter is 2.
To specify that the central site (secure gateway) should never initiate ISAKMP monitoring, enter the
following command:
hostname(config-tunnel-ipsec)#
isakmp keepalive threshold infinite
hostname(config-tunnel-ipsec)#
Step 7
Specify the ISAKMP hybrid authentication method, XAUTH or hybrid XAUTH.
You use
isakmp ikev1-user-authentication
command to implement hybrid XAUTH authentication
when you need to use digital certificates for ASA authentication and a different, legacy method for
remote VPN user authentication, such as RADIUS, or SecurID. Hybrid XAUTH breaks phase
1 of IKE down into the following two steps, together called hybrid authentication:
a.
The ASA authenticates to the remote VPN user with standard public key techniques. This
establishes an IKE security association that is unidirectionally authenticated.
b.
An XAUTH exchange then authenticates the remote VPN user. This extended authentication can use
one of the supported legacy authentication methods.
Note
Before the authentication type can be set to hybrid, you must configure the authentication server,
create a preshared key, and configure a trustpoint.
You can use the
isakmp ikev1-user-authentication
command with the optional
interface
parameter to
specify a particular interface. When you omit the
interface
parameter, the command applies to all the
interfaces and serves as a back-up when the per-interface command is not specified. When there are two
isakmp ikev1-user-authentication
commands specified for a connection profile, and one uses the
interface
parameter and one does not, the one specifying the interface takes precedence for that
particular interface.
For example, the following commands enable hybrid XAUTH on the inside interface for a connection
profile called example-group:
hostname(config)#
tunnel-group example-group type remote-access
hostname(config)#
tunnel-group example-group ipsec-attributes
hostname(config-tunnel-ipsec)#
isakmp ikev1-user-authentication (inside) hybrid
hostname(config-tunnel-ipsec)#
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......