C H A P T E R
30-1
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
30
Configuring Connection Profiles, Group Policies,
and Users
This chapter describes how to configure VPN connection profiles (formerly called “tunnel groups”),
group policies, and users. This chapter includes the following sections.
•
Overview of Connection Profiles, Group Policies, and Users, page 30-1
•
Configuring Connection Profiles, page 30-6
•
Group Policies, page 30-33
•
Configuring User Attributes, page 30-73
In summary, you first configure connection profiles to set the values for the connection. Then you
configure group policies. These set values for users in the aggregate. Then you configure users, which
can inherit values from groups and configure certain values on an individual user basis. This chapter
describes how and why to configure these entities.
Overview of Connection Profiles, Group Policies, and Users
Groups and users are core concepts in managing the security of virtual private networks (VPNs) and in
configuring the security appliance. They specify attributes that determine user access to and use of the
VPN. A
group
is a collection of users treated as a single entity.
Users
get their attributes from
group
policies
.
Connection profiles
identify the group policy for a specific connection. If you do not assign a
particular group policy to a user, the default group policy for the connection applies.
Note
You configure connection profiles using
tunnel-group
commands. In this chapter, the terms “connection
profile” and “tunnel group” are often used interchangeably.
Connection profiles and group policies simplify system management. To streamline the configuration
task, the security appliance provides a default LAN-to-LAN connection profile, a default remote access
connection profile, a default connection profile for clientless SSL VPN, and a default group policy
(DfltGrpPolicy). The default connection profiles and group policy provide settings that are likely to be
common for many users. As you add users, you can specify that they “inherit” parameters from a group
policy. Thus you can quickly configure VPN access for large numbers of users.
If you decide to grant identical rights to all VPN users, then you do not need to configure specific
connection profiles or group policies, but VPNs seldom work that way. For example, you might allow a
finance group to access one part of a private network, a customer support group to access another part,
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......