30-13
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 30 Configuring Connection Profiles, Group Policies, and Users
Configuring Connection Profiles
This command enters tunnel-group ipsec-attributes configuration mode, in which you configure the
remote-access tunnel-group IPSec attributes.
For example, the following command designates that the tunnel-group ipsec-attributes mode commands
that follow pertain to the connection profile named TG1. Notice that the prompt changes to indicate that
you are now in tunnel-group ipsec-attributes mode:
hostname(config)#
tunnel-group
TG1
type remote-access
hostname(config)#
tunnel-group
TG1
ipsec-attributes
hostname(config-tunnel-ipsec)#
Step 2
Specify the preshared key to support IKE connections based on preshared keys. For example, the
following command specifies the preshared key xyzx to support IKE connections for an IPSec remote
access connection profile:
hostname(config-tunnel-ipsec)#
pre-shared-key xyzx
hostname(config-tunnel-ipsec)#
Step 3
Specify whether to validate the identity of the peer using the peer’s certificate:
hostname(config-tunnel-ipsec)#
peer-id-validate
option
hostname(config-tunnel-ipsec)#
The available options are
req
(required),
cert (
if supported by certificate), and
nocheck (
do not check).
The default is
req
.
For example, the following command specifies that peer-id validation is required:
hostname(config-tunnel-ipsec)#
peer-id-validate req
hostname(config-tunnel-ipsec)#
Step 4
Specify whether to
Step 5
Specify whether to enable sending of a certificate chain. The following command includes the root
certificate and any subordinate CA certificates in the transmission:
hostname(config-tunnel-ipsec)#
chain
hostname(config-tunnel-ipsec)#
This attribute applies to all IPSec tunnel-group types.
Step 6
Specify the name of a trustpoint that identifies the certificate to be sent to the IKE peer:
hostname(config-tunnel-ipsec)#
trust-point
trust-point-name
hostname(config-tunnel-ipsec)#
The following command specifies mytrustpoint as the name of the certificate to be sent to the IKE peer:
hostname(config-ipsec)#
trust-point mytrustpoint
Step 7
Specify the ISAKMP (IKE) keepalive threshold and the number of retries allowed.
hostname(config-tunnel-ipsec)#
isakmp keepalive threshold
<
number
>
retry
<
number
>
hostname(config-tunnel-ipsec)#
The
threshold
parameter specifies the number of seconds (10 through 3600) that the peer is allowed to
idle before beginning keepalive monitoring. The
retry
parameter is the interval (2 through 10 seconds)
between retries after a keepalive response has not been received. IKE keepalives are enabled by default.
To disable IKE keepalives, enter the
no
form of the
isakmp
command:
For example, the following command sets the IKE keepalive threshold value to 15 seconds and sets the
retry interval to 10 seconds:
hostname(config-tunnel-ipsec)#
isakmp keepalive threshold 15 retry 10
hostname(config-tunnel-ipsec)#
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......