EasyManuals Logo
Home>Cisco>Network Hardware>ASA Series

Cisco ASA Series User Manual

Cisco ASA Series
2164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1700 background imageLoading...
Page #1700 background image
1-66
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Connection Profiles, Group Policies, and Users
Group Policies
hostname(config-group-policy)# ipsec-udp {enable | disable}
hostname(config-group-policy)# no ipsec-udp
To use IPsec over UDP, you must also configure the ipsec-udp-port command, as described in this
section.
To disable IPsec over UDP, enter the disable keyword. To remove the IPsec over UDP attribute from the
running configuration, enter the no form of this command. This enables inheritance of a value for IPsec
over UDP from another group policy.
The Cisco VPN client must also be configured to use IPsec over UDP (it is configured to use it by
default). The VPN 3002 requires no configuration to use IPsec over UDP.
The following example shows how to set IPsec over UDP for the group policy named FirstGroup:
hostname(config)# group-policy FirstGroup attributes
hostname(config-group-policy)# ipsec-udp enable
If you enabled IPsec over UDP, you must also configure the ipsec-udp-port command in group-policy
configuration mode. This command sets a UDP port number for IPsec over UDP. In IPsec negotiations,
the ASA listens on the configured port and forwards UDP traffic for that port even if other filter rules
drop UDP traffic. The port numbers can range from 4001 through 49151. The default port value is 10000.
To disable the UDP port, enter the no form of this command. This enables inheritance of a value for the
IPsec over UDP port from another group policy.
hostname(config-group-policy)# ipsec-udp-port port
The following example shows how to set an IPsec UDP port to port 4025 for the group policy named
FirstGroup:
hostname(config)# group-policy FirstGroup attributes
hostname(config-group-policy)# ipsec-udp-port 4025
Configuring Attributes for VPN Hardware Clients
This section describes how to enable or disable secure unit authentication and user authentication or set
a user authentication timeout value for VPN hardware clients. They also let you allow Cisco IP phones
and LEAP packets to bypass individual user authentication and allow hardware clients using Network
Extension Mode to connect.
Configuring Secure Unit Authentication
Secure unit authentication provides additional security by requiring VPN hardware clients to
authenticate with a username and password each time that the client initiates a tunnel. With this feature
enabled, the hardware client does not have a saved username and password. Secure unit authentication
is disabled by default.
Note With this feature enabled, to bring up a VPN tunnel, a user must be present to enter the username and
password.
Secure unit authentication requires that you have an authentication server group configured for the
connection profile the hardware client(s) use. If you require secure unit authentication on the primary
ASA, be sure to configure it on any backup servers as well.
Specify whether to enable secure unit authentication by entering the secure-unit-authentication
command with the enable keyword in group-policy configuration mode.

Table of Contents

Other manuals for Cisco ASA Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASA Series and is the answer not in the manual?

Cisco ASA Series Specifications

General IconGeneral
BrandCisco
ModelASA Series
CategoryNetwork Hardware
LanguageEnglish

Related product manuals