Cisco ASA Series Cli Configuration Manual page 1701

Software version 9.0 for the services module
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Chapter 1
Configuring Connection Profiles, Group Policies, and Users
hostname(config-group-policy)# secure-unit-authentication {enable | disable}
hostname(config-group-policy)# no secure-unit-authentication
To disable secure unit authentication, enter the disable keyword. To remove the secure unit
authentication attribute from the running configuration, enter the no form of this command. This option
allows inheritance of a value for secure unit authentication from another group policy.
The following example shows how to enable secure unit authentication for the group policy named
FirstGroup:
hostname(config)# group-policy FirstGroup attributes
hostname(config-group-policy)# secure-unit-authentication enable
Configuring User Authentication
User authentication is disabled by default. When enabled, user authentication requires that individual
users behind a hardware client authenticate to gain access to the network across the tunnel. Individual
users authenticate according to the order of authentication servers that you configure.
Specify whether to enable user authentication by entering the user-authentication command with the
enable keyword in group-policy configuration mode.
hostname(config-group-policy)# user-authentication {enable | disable}
hostname(config-group-policy)# no user-authentication
To disable user authentication, enter the disable keyword. To remove the user authentication attribute
from the running configuration, enter the no form of this command. This option allows inheritance of a
value for user authentication from another group policy.
If you require user authentication on the primary ASA, be sure to configure it on any backup servers as
well.
The following example shows how to enable user authentication for the group policy named FirstGroup:
hostname(config)# group-policy FirstGroup attributes
hostname(config-group-policy)# user-authentication enable
Configuring an Idle Timeout
Set an idle timeout for individual users behind hardware clients by entering the
user-authentication-idle-timeout command in group-policy configuration mode. If there is no
communication activity by a user behind a hardware client in the idle timeout period, the ASA terminates
the client's access:
hostname(config-group-policy)# user-authentication-idle-timeout {minutes | none}
hostname(config-group-policy)# no user-authentication-idle-timeout
Note
This timer terminates only the client's access through the VPN tunnel, not the VPN tunnel itself.
The idle timeout indicated in response to the show uauth command is always the idle timeout value of
the user who authenticated the tunnel on the Cisco Easy VPN remote device.
The minutes parameter specifies the number of minutes in the idle timeout period. The minimum is 1
minute, the default is 30 minutes, and the maximum is 35791394 minutes.
To delete the idle timeout value, enter the no form of this command. This option allows inheritance of
an idle timeout value from another group policy.
Cisco ASA Series CLI Configuration Guide
Group Policies
1-67

Advertisement

Table of Contents
loading

Table of Contents