Configuring An Address Pool; Adding A User; Creating A Transform Set - Cisco PIX 500 Series Configuration Manual

Security appliance command line
Hide thumbs Also See for PIX 500 Series:
Table of Contents

Advertisement

Configuring an Address Pool

To save your changes, enter the write memory command.
Step 7
hostname(config)# write memory
hostname(config)#
Configuring an Address Pool
The security appliance requires a method for assigning IP addresses to users. A common method is using
address pools. The alternatives are having a DHCP server assign address or having an AAA server assign
them. The following example uses an address pool.
Step 1
To configure an address pool, enter the ip local pool command. The syntax is
ip local pool poolname first_address-last_address. In the following example the pool name is testpool.
hostname(config)# ip local pool testpool 192.168.0.10-192.168.0.15
hostname(config)#
Save your changes.
Step 2
hostname(config)# write memory
hostname(config)#

Adding a User

To identify remote access users to the security appliance, configure usernames and passwords.
To add users, enter the username command. The syntax is username username password password. In
Step 1
the following example the username is testuser and the password is 12345678.
hostname(config)# username testuser password 12345678
hostname(config)#
Repeat Step 1 for each additional user.
Step 2

Creating a Transform Set

A transform set combines an encryption method and an authentication method. During the IPSec security
association negotiation with ISAKMP, the peers agree to use a particular transform set to protect a
particular data flow. The transform set must be the same for both peers.
A transform set protects the data flows for the access list specified in the associated crypto map entry.
You can create transform sets in the security appliance configuration, and then specify a maximum of 11
of them in a crypto map or dynamic crypto map entry. For more overview information, including a table
that lists valid encryption and authentication methods, see
"Configuring LAN-to-LAN IPSec VPNs"
Cisco Security Appliance Command Line Configuration Guide
32-4
Chapter 32
Creating a Transform Set
of this guide.
Configuring Remote Access IPSec VPNs
in
Chapter 36,
OL-12172-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5500 series

Table of Contents