Configuring The User Database For The Ipsec Remote Access Vpn - Cisco WS-CE500 Administration Manual

Sa500 series small business security appliances
Table of Contents

Advertisement

Configuring VPN
Configuring an IPsec VPN Tunnel for Remote Access with a VPN Client
STEP 1
STEP 2
STEP 3
Cisco SA500 Series Security Appliances Administration Guide
To review or update the configured IKE policy, click IPsec > IKE Policies.
For more information, see
page
144.
To configure IPsec passthrough, click IPsec > Passthrough. For more
information, see
Configuring the User Database for the IPsec Remote Access
VPN
If you are using IPsec VPN for remote access by remote workers, use this page to
manage the users (both XAUTH and Cisco QuickVPN). The VPN gateway
authenticates the users in this list when XAUTH is used in an IKE policy.
Alternatively, you can enable Extended Authentication (XAUTH) from user records
stored on an external authentication server such as a RADIUS server, see
Configuring the IKE Policies for IPsec VPN, page
If you are using the using the Cisco VPN Client, see the Application Note located
under Technical Documentation at:
Click VPN > IPsec > IPsec Users.
The IPsec Users window opens. Any existing users are listed in the List of IPsec
Users table.
Click Add to add a user.
Other options: Click the Edit button to edit an entry. To delete an entry, check the
box and then click Delete. To select all entries, check the box in the first column of
the table heading.
After you click Add or Edit, the IPsec User Configuration window opens.
Enter the following information:
User Name: Enter a unique identifier for the XAUTH user.
Remote Peer Type: Choose one of the following options:
-
Standard IPsec (XAuth)
Configuring the IKE Policies for IPsec VPN,
Configuring IPsec Passthrough, page
www.cisco.com/go/sa500resources.
153.
144.
7
142

Advertisement

Table of Contents
loading

Table of Contents