EasyManuals Logo
Home>Cisco>Firewall>5510 - ASA SSL / IPsec VPN Edition

Cisco 5510 - ASA SSL / IPsec VPN Edition User Manual

Cisco 5510 - ASA SSL / IPsec VPN Edition
2164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1728 background imageLoading...
Page #1728 background image
1-94
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Connection Profiles, Group Policies, and Users
Configuring User Attributes
Specifying the Tunnel Protocol
Specify the VPN tunnel types (IPsec or clientless SSL VPN) that this user can use. The default is taken
from the default group policy, the default for which is IPsec. To remove the attribute from the running
configuration, enter the no form of this command.
hostname(config-username)# vpn-tunnel-protocol {webvpn | IPsec}
hostname(config-username)# no vpn-tunnel-protocol [webvpn | IPsec]
hostname(config-username)
The parameter values for this command are as follows:
• IPsec—Negotiates an IPsec tunnel between two peers (a remote access client or another secure
gateway). Creates security associations that govern authentication, encryption, encapsulation, and
key management.
• webvpn—Provides clientless SSL VPN access to remote users via an HTTPS-enabled web browser,
and does not require a client
Enter this command to configure one or more tunneling modes. You must configure at least one tunneling
mode for users to connect over a VPN tunnel.
The following example shows how to configure clientless SSL VPN and IPsec tunneling modes for the
user named anyuser:
hostname(config)# username anyuser attributes
hostname(config-username)# vpn-tunnel-protocol webvpn
hostname(config-username)# vpn-tunnel-protocol IPsec
hostname(config-username)
Restricting Remote User Access
Configure the group-lock attribute with the value keyword to restrict remote users to access only
through the specified, preexisting connection profile. Group-lock restricts users by checking whether the
group configured in the VPN client is the same as the connection profile to which the user is assigned.
If it is not, the ASA prevents the user from connecting. If you do not configure group-lock, the ASA
authenticates users without regard to the assigned group.
To remove the group-lock attribute from the running configuration, enter the no form of this command.
This option allows inheritance of a value from the group policy. To disable group-lock, and to prevent
inheriting a group-lock value from a default or specified group policy, enter the group-lock command
with the none keyword.
hostname(config-username)# group-lock {value tunnel-grp-name | none}
hostname(config-username)# no group-lock
hostname(config-username)
The following example shows how to set group lock for the user named anyuser:
hostname(config)# username anyuser attributes
hostname(config-username)# group-lock value tunnel-group-name
hostname(config-username)

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals