Configuring The User Database For The Ipsec Remote Access Vpn - Cisco QuickVPN - PC Administration Manual

Sa 500 series security appliances administration guide
Hide thumbs Also See for QuickVPN - PC:
Table of Contents

Advertisement

Configuring VPN
Configuring an IPSec VPN Tunnel for Remote Access with a VPN Client
NOTE
NOTE
Cisco SA 500 Series Security Appliances Administration Guide
Next steps:
If you are using the Getting Started (Advanced) page, click Getting Started
on the menu bar and then click Advanced in the navigation tree to return to
the list of configuration tasks for IPsec Remote Access VPN.
Required: Configure the VPN users.
-
To add users to the user database, continue with the procedure

Configuring the User Database for the IPSec Remote Access VPN,

page
159.
-
To allow Extended Authentication (XAUTH) from user records stored on
an external authentication server such as a RADIUS server, see
Configuring the IKE Policies for IPSec VPN, page
To review or update the configured VPN policy click IPSec > VPN Policies
in the navigation tree. For more information, see
VPN Policies, page
To review or update the configured IKE policy, click IPSec > IKE Policies in
the navigation tree. For more information, see
for IPSec VPN, page
To configure IPSec passthrough, click IPSec > Passthrough. For more
information, see
Configuring the User Database for the IPSec Remote Access
VPN
If you are using IPSec VPN for remote access by remote workers, use this page to
manage the users (both XAUTH and Cisco QuickVPN). The VPN gateway
authenticates the users in this list when XAUTH is used in an IKE policy.
Alternatively, you can enable Extended Authentication (XAUTH) from user records
stored on an external authentication server such as a RADIUS server, see
Configuring the IKE Policies for IPSec VPN, page
166.
162.
Configuring IPSec Passthrough, page
162.
Configuring the IPSec
Configuring the IKE Policies
171.
162.
8
159

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents