27-10
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 27 Configuring IPSec and ISAKMP
Configuring Certificate Group Matching
•
Match the group from the organizational unit (OU) field
•
Use a default group for all certificate users
You can use any or all of these methods.
Creating a Certificate Group Matching Rule and Policy
To configure the policy and rules by which certificate-based ISAKMP sessions map to tunnel groups,
and to associate the certificate map entries with tunnel groups, enter the
tunnel-group-map
command
in global configuration mode.
The syntax follows:
tunnel-group-map enable
{
rules | ou | ike-id | peer ip
}
tunnel-group-map
[
rule-index
]
enable
policy
Be aware of the following:
•
You can invoke this command multiple times as long as each invocation is unique and you do not
reference a map index more than once.
•
Rules cannot be longer than 255 characters.
•
You can assign multiple rules to the same group. To do that, you add the rule priority and group first.
Then you define as many criteria statements as you need for each group. When multiple rules are
assigned to the same group, a match results for the first rule that tests true.
•
Create a single rule if you want to require all criteria to match before assigning a user to a specific
tunnel group. Requiring all criteria to match is equivalent to a logical AND operation. Alternatively,
create one rule for each criterion if you want to require that only one match before assigning a user
to a specific tunnel group. Requiring only one criterion to match is equivalent to a logical OR
operation.
The following example enables mapping of certificate-based ISAKMP sessions to a tunnel group based
on the content of the phase1 ISAKMP ID:
hostname(config)#
tunnel-group-map enable ike-id
hostname(config)#
policy
Specifies the policy for deriving the tunnel group name from the certificate.
Policy
can be one of the following:
ike-id
—Indicates that if a tunnel-group is not determined based on a rule
lookup or taken from the ou, then the certificate-based ISAKMP sessions are
mapped to a tunnel group based on the content of the phase1 ISAKMP ID.
ou
—Indicates that if a tunnel-group is not determined based on a rule lookup,
then use the value of the OU in the subject distinguished name (DN).
peer-ip
—Indicates that if a tunnel-group is not determined based on a rule
lookup or taken from the ou or ike-id methods, then use the peer IP address.
rules
—Indicates that the certificate-based ISAKMP sessions are mapped to a
tunnel group based on the certificate map associations configured by this
command.
rule index
(Optional) Refers to parameters specified by the
crypto ca certificate map
command. The values are 1 to 65535.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......