hit counter script

Configuring The Group Policies For Cisco Ipsec Vpn Server - Cisco ISA500 Series Administration Manual

Integrated security appliance
Hide thumbs Also See for ISA500 Series:
Table of Contents

Advertisement

VPN
Configuring the Cisco IPSec VPN Server
NOTE
STEP 1
STEP 2
STEP 3
STEP 4
Cisco ISA500 Series Integrated Security Appliance Administrator Guide

Configuring the Group Policies for Cisco IPSec VPN Server

This section describes how to enable the Cisco IPSec VPN Server feature and
specify the group policies that can be used by the remote clients to establish the
IPSec VPN tunnels.
The security appliance supports up to 16 group policies for Cisco IPSec VPN
Server.
Click VPN -> Remote User Access -> Cisco IPSec VPN Server.
The Cisco IPSec VPN Server window opens. All existing group policies are listed
in the table.
Click On to enable the Cisco IPSec VPN Server feature and set the security
appliance as a head-end device in remote access VPN, or click Off to disable it.
Specify the group policies that can be used by the remote clients to establish the
IPSec VPN tunnels. To add a group policy, click Add.
Other Options: To edit an entry, click Edit. To delete an entry, click Delete.
After you click Add or Edit, the Cisco IPSec VPN Server - Add/Edit window opens.
In the Basic Settings tab, enter the following information:
Group Name: Enter the name for the group policy.
WAN Interface: Choose the WAN interface that the traffic passes through
over the IPSec VPN tunnel.
Authentication Method: Choose the authentication method.
-
Preshare: If you choose this option, enter the desired value that the peer
device must provide to establish a connection in the Password field. The
pre-shared key must be entered exactly the same here and on the remote
clients.
-
Certificate: If you choose this option, choose the local certificate and the
peer certificate for authentication. On the remote clients, the selected
local certificate should be set as the peer certificate, and the selected
peer certificate should be set as the local certificate. If the certificates are
not in the list, go to the Device Management -> Certificate
Management page to import the certificates. See
Certificates for Authentication, page
Managing the
310.
8
235

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Isa550Isa570Isa570wIsa550w

Table of Contents