EasyManuals Logo
Home>Cisco>Firewall>FirePOWER ASA 5500 series

Cisco FirePOWER ASA 5500 series User Manual

Cisco FirePOWER ASA 5500 series
989 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #553 background imageLoading...
Page #553 background image
29-11
Cisco Security Appliance Command Line Configuration Guide
OL-10088-01
Chapter 29 Setting General IPSec VPN Parameters
Configuring VPN Session Limits
Step 5 If you enable cluster encryption, you must also specify the IPSec shared secret by entering the cluster
key command. This command specifies the shared secret to between IPSec peers when you have enabled
IPSec encryption. The value you enter in the box appears as consecutive asterisk characters
hostname(config-load-balancing)# cluster key shared_secret
hostname(config-load-balancing)#
For example, to set the shared secret to 123456789, enter the following command:
hostname(config-load-balancing)# cluster key 123456789
hostname(config-load-balancing)#
Step 6 Enable this device’s participation in the cluster by entering the participate command:
hostname(config-load-balancing)# participate
hostname(config-load-balancing)#
Configuring VPN Session Limits
You can run as many IPSec and WebVPN sessions as your platform and license for the security appliance
supports. To view the licensing information for your security appliance, enter the show version
command in global configuration mode. The following example shows the command and the licensing
information excerpted from the output of this command:
hostname(config)# show version
Cisco Adaptive Security Appliance Software Version 7.1(0)182
Device Manager Version 5.1(0)128
Licensed features for this platform:
Maximum Physical Interfaces : Unlimited
Maximum VLANs : 100
Inside Hosts : Unlimited
Failover : Active/Active
VPN-DES : Enabled
VPN-3DES-AES : Enabled
Security Contexts : 10
GTP/GPRS : Enabled
VPN Peers : 750
WebVPN Peers : 500
This platform has an ASA 5520 VPN Plus license.
To limit the maximum number of active IPSec VPN sessions to a lower value than the security appliance
allows, enter the vpn-sessiondb max-session-limit command in global configuration mode. This limit
affects the calculated load percentage for VPN Load Balancing.
hostname(config)# vpn-sessiondb max-session-limit number_of_sessions
hostname(config)#
For example, if the security appliance license allows 750 IPSec sessions, and you want to limit the
number of IPSec sessions to 500, enter the following command:
hostname(config)# vpn-sessiondb max-session-limit 500
hostname(config)#

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco FirePOWER ASA 5500 series and is the answer not in the manual?

Cisco FirePOWER ASA 5500 series Specifications

General IconGeneral
BrandCisco
ModelFirePOWER ASA 5500 series
CategoryFirewall
LanguageEnglish

Related product manuals