VPN
Configuring the Cisco IPSec VPN Client
Cisco ISA500 Series Integrated Security Appliance Administrator Guide
239
8
This section describes how to configure the Cisco IPSec VPN Client feature. It
includes the following topics:
•
Restrictions for Cisco IPSec VPN Client, page 239
•
Benefits of the Cisco IPSec VPN Client Feature, page 239
•
•
•
Configuring the Group Policies for Cisco IPSec VPN Client, page 243
Restrictions for Cisco IPSec VPN Client
The Cisco IPSec VPN Client feature requires that the destination peer is a Cisco
ISA500 Series Integrated Security Appliance that works as the Cisco IPSec VPN
Server, or a Cisco IOS router (such as C871, C1801, C1812, C1841, and C2821) or a
Cisco ASA5500 platform that supports the Cisco IPSec VPN Server feature.
The Cisco IPSec VPN Client feature supports configuration of only one destination
peer. If your application requires multiple VPN tunnels, you must manually
configure the IPSec VPN and Network Address Translation/Peer Address
Translation (NAT/PAT) parameters on both client and server.
NOTE
If you set the security appliance as a Cisco VPN hardware client, the VPN tunnels
established by Site-to-Site VPN or Cisco IPSec VPN Server are automatically
disconnected. The Cisco IPSec VPN Client feature allows you to create multiple
group polices to connect different servers but only one group policy can be used
to establish the IPSec tunnel with a specified server.
Benefits of the Cisco IPSec VPN Client Feature
•
Allows dynamic configuration of end-user policy, requiring less manual
configuration by end users and field technicians, thus reducing errors and
further service calls.
•
Allows the provider to change equipment and network configurations as
needed, with little or no reconfiguration of the end-user equipment.
•
Provides for centralized security policy management.
•
Enables large-scale deployments with rapid user provisioning.