Configuring VPN
Configuring an IPSec VPN Tunnel for Remote Access with a VPN Client
NOTE
NOTE
Cisco SA 500 Series Security Appliances Administration Guide
Next steps:
•
If you are using the Getting Started (Advanced) page, click Getting Started
on the menu bar and then click Advanced in the navigation tree to return to
the list of configuration tasks for IPsec Remote Access VPN.
•
Required: Configure the VPN users.
-
To add users to the user database, continue with the procedure
Configuring the User Database for the IPSec Remote Access VPN,
page
155.
-
To allow Extended Authentication (XAUTH) from user records stored on
an external authentication server such as a RADIUS server, see
Configuring the IKE Policies for IPSec VPN, page
•
To review or update the configured VPN policy click IPSec > VPN Policies
in the navigation tree. For more information, see
VPN Policies, page
•
To review or update the configured IKE policy, click IPSec > IKE Policies in
the navigation tree. For more information, see
for IPSec VPN, page
•
To configure IPSec passthrough, click IPSec > Passthrough. For more
information, see
Configuring the User Database for the IPSec Remote Access
VPN
If you are using IPSec VPN for remote access by remote workers, use this page to
manage the users (both XAUTH and Cisco QuickVPN). The VPN gateway
authenticates the users in this list when XAUTH is used in an IKE policy.
Alternatively, you can enable Extended Authentication (XAUTH) from user records
stored on an external authentication server such as a RADIUS server, see
Configuring the IKE Policies for IPSec VPN, page
161.
157.
Configuring IPSec Passthrough, page
157.
Configuring the IPSec
Configuring the IKE Policies
166.
157.
8
155