Cisco FirePOWER ASA 5500 series Configuration Manual page 536

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Configuring L2TP over IPSec Connections
Configure the PPP authentication protocol using the authentication type command from tunnel group
Step 8
ppp-attributes mode.
hostname(config)# tunnel-group name ppp-attributes
hostname(config-ppp)# authentication pap
Table 28-1
Keyword
chap
eap-proxy
ms-chap-v1
ms-chap-v2
pap
Specify a method to authenticate users attempting L2TP over IPSec connections. Use the
Step 9
authentication-server-group command from tunnel-group general-attributes mode to configure the
security appliance to use an authentication server or its own local database.
Using an Authentication Server
To use an authentication server, use the authentication server group keyword:
hostname(config)# tunnel-group name general-attributes
hostname(config-tunnel-general)# authentication-server-group auth_server_group
Using the Local Database
To use the local database, enter the LOCAL keyword.
hostname(config)# tunnel-group name general-attributes
hostname(config-tunnel-general)# authentication-server-group LOCAL
The security appliance only supports the PPP authentications PAP and Microsoft CHAP, Versions 1 and
Note
2, on the local database. EAP and CHAP are performed by proxy authentication servers. Therefore, if a
remote user belongs to a tunnel group configured with the authentication eap-proxy or authentication
chap commands, and the security appliance is configured to use the local database, that user will not be
able to connect.
Create a user in the local database with the username command from global configuration mode.
Step 10
If the user is an L2TP client using Microsoft CHAP, Version 1 or Version 2, and the security appliance
is configured to authenticate against the local database, you must include the mschap keyword. For
Example:
hostname(config)# username t_wmith password eu5d93h mschap
Cisco Security Appliance Command Line Configuration Guide
28-4
Table 28-1
shows the types of PPP authentication, and their characteristics.
Authentication Type Characteristics
Authentication Type Characteristics
CHAP
In response to the server challenge, the client returns the encrypted
[challenge plus password] with a cleartext username. This protocol
is more secure than the PAP, but it does not encrypt data.
EAP
Enables EAP which permits the security appliance to proxy the
PPP authentication process to an external RADIUS authentication
server.
Microsoft CHAP,
Similar to CHAP but more secure in that the server stores and
Version 1
compares only encrypted passwords rather than cleartext
passwords as in CHAP. This protocol also generates a key for data
Microsoft CHAP,
encryption by MPPE.
Version, 2
PAP
Passes cleartext username and password during authentication and
is not secure.
Chapter 28
Configuring L2TP over IPSec
OL-10088-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents