30-3
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 30 Configuring Connection Profiles, Group Policies, and Users
Connection Profiles
General Connection Profile Connection Parameters
General parameters are common to all VPN connections. The general parameters include the following:
•
Connection profile name—You specify a connection-profile name when you add or edit a
connection profile. The following considerations apply:
–
For clients that use preshared keys to authenticate, the connection profile name is the same as
the group name that an IPSec client passes to the security appliance.
–
Clients that use certificates to authenticate pass this name as part of the certificate, and the
security appliance extracts the name from the certificate.
•
Connection type—Connection types include IPSec remote access, IPSec LAN-to-LAN, and
clientless SSL VPN. A connection profile can have only one connection type.
•
Authentication, Authorization, and Accounting servers—These parameters identify the server
groups or lists that the security appliance uses for the following purposes:
–
Authenticating users
–
Obtaining information about services users are authorized to access
–
Storing accounting records
A server group can consist of one or more servers.
•
Default group policy for the connection—A group policy is a set of user-oriented attributes. The
default group policy is the group policy whose attributes the security appliance uses as defaults
when authenticating or authorizing a tunnel user.
•
Client address assignment method—This method includes values for one or more DHCP servers or
address pools that the security appliance assigns to clients.
•
Override account disabled—This parameter lets you override the “account-disabled” indicator
received from a AAA server.
•
Password management—This parameter lets you warn a user that the current password is due to
expire in a specified number of days (the default is 14 days), then offer the user the opportunity to
change the password.
•
Strip group and strip realm—These parameters direct the way the security appliance processes the
usernames it receives. They apply only to usernames received in the form user@realm. A realm is
an administrative domain appended to a username with the @ delimiter (user@abc).
When you specify the
strip-group
command, the security appliance selects the connection profile
for user connections by obtaining the group name from the username presented by the VPN client.
The security appliance then sends only the user part of the username for
authorization/authentication. Otherwise (if disabled), the security appliance sends the entire
username, including the realm.
Strip-realm processing removes the realm from the username when sending the username to the
authentication or authorization server. If the command is enabled, the security appliance sends only
the user part of the username authorization/authentication. Otherwise, the security appliance sends
the entire username.
•
Authorization required—This parameter lets you require authorization before a user can connect, or
turn off that requirement.
•
Authorization DN attributes—This parameter specifies which Distinguished Name attributes to use
when performing authorization.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......