27-9
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 27 Configuring IPSec and ISAKMP
Configuring Certificate Group Matching
Waiting for Active Sessions to Terminate Before Rebooting
You can schedule a security appliance reboot to occur only when all active sessions have terminated
voluntarily. This feature is disabled by default.
To enable waiting for all active sessions to voluntarily terminate before the security appliance reboots,
enter the following command:
crypto isakmp reload-wait
For example:
hostname(config)#
crypto isakmp reload-wait
Use the
reload
command to reboot the security appliance. If you set the
reload-wait
command, you can
use the
reload quick
command to override the
reload-wait
setting. The
reload
and
reload-wait
commands are available in privileged EXEC mode; neither includes the
isakmp
prefix.
Alerting Peers Before Disconnecting
Remote access or LAN-to-LAN sessions can drop for several reasons, such as: a security appliance
shutdown or reboot, session idle timeout, maximum connection time exceeded, or administrator cut-off.
The security appliance can notify qualified peers (in LAN-to-LAN configurations), Cisco VPN clients
and VPN 3002 hardware clients of sessions that are about to be disconnected. The peer or client
receiving the alert decodes the reason and displays it in the event log or in a pop-up pane. This feature
is disabled by default.
Qualified clients and peers include the following:
•
Security appliances with Alerts enabled.
•
Cisco VPN clients running version 4.0 or later software (no configuration required).
•
VPN 3002 hardware clients running version 4.0 or later software, and with Alerts enabled.
•
VPN 3000 series concentrators running version 4.0 or later software, with Alerts enabled.
To enable disconnect notification to IPSec peers, enter the
crypto isakmp disconnect-notify
command.
For example:
hostname(config)#
crypto isakmp disconnect-notify
Configuring Certificate Group Matching
Tunnel groups define user connection terms and permissions. Certificate group matching lets you match
a user to a tunnel group using either the Subject DN or Issuer DN of the user certificate.
To match users to tunnel groups based on these fields of the certificate, you must first create rules that
define a matching criteria, and then associate each rule with the desired tunnel group.
To create a certificate map,
use the crypto ca certificate map
command. To define a
tunnel group, use
the
tunnel-group
command.
You must also configure a certificate group matching policy that sets one of the following methods for
identifying the permission groups of certificate users:
•
Match the group from the rules
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......