Cisco ASA Series Cli Configuration Manual page 1568

Software version 9.0 for the services module
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Configuring IPsec
The following example enables mapping of certificate-based ISAKMP sessions to a tunnel group based
on the content of the phase1 ISAKMP ID:
hostname(config)# tunnel-group-map enable ike-id
hostname(config)#
The following example enables mapping of certificate-based ISAKMP sessions to a tunnel group based
on the IP address of the peer:
hostname(config)# tunnel-group-map enable peer-ip
hostname(config)#
The following example enables mapping of certificate-based ISAKMP sessions based on the
organizational unit (OU) in the subject distinguished name (DN):
hostname(config)# tunnel-group-map enable ou
hostname(config)#
The following example enables mapping of certificate-based ISAKMP sessions based on established
rules:
hostname(config)# tunnel-group-map enable rules
hostname(config)#
Using the Tunnel-group-map default-group Command
This command specifies a default tunnel group to use when the configuration does not specify a tunnel
group.
The syntax is tunnel-group-map [rule-index] default-group tunnel-group-name where rule-index is the
priority for the rule, and tunnel-group name must be for a tunnel group that already exists.
Configuring IPsec
This section provides background information about IPsec and describes the procedures required to
configure the ASA when using IPsec to implement a VPN. It contains the following topics:
Cisco ASA Series CLI Configuration Guide
1-18
You can assign multiple rules to the same group. To do that, you add the rule priority and group first.
Then you define as many criteria statements as you need for each group. When multiple rules are
assigned to the same group, a match results for the first rule that tests true.
By creating a single rule, you can require all criteria to match before assigning a user to a specific
tunnel group. Requiring all criteria to match is equivalent to a logical AND operation. Alternatively,
create one rule for each criterion if you want to require that only one match before assigning a user
to a specific tunnel group. Requiring only one criterion to match is equivalent to a logical OR
operation.
Understanding IPsec Tunnels, page 1-19
Understanding IKEv1 Transform Sets and IKEv2 Proposals, page 1-19
Defining Crypto Maps, page 1-19
Applying Crypto Maps to Interfaces, page 1-29
Using Interface Access Lists, page 1-29
Changing IPsec SA Lifetimes, page 1-31
Creating a Basic IPsec Configuration, page 1-32
Chapter 1
Configuring IPsec and ISAKMP

Advertisement

Table of Contents
loading

Table of Contents