Cisco ASA 5505 User Manual

Page 1370

Advertising
background image

64-18

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 64 Configuring IPsec and ISAKMP

Configuring Certificate Group Matching for IKEv1

Be aware of the following:

You can invoke this command multiple times as long as each invocation is unique and you do not
reference a map index more than once.

Rules cannot be longer than 255 characters.

You can assign multiple rules to the same group. To do that, you add the rule priority and group first.
Then you define as many criteria statements as you need for each group. When multiple rules are
assigned to the same group, a match results for the first rule that tests true.

By creating a single rule, you can require all criteria to match before assigning a user to a specific
tunnel group. Requiring all criteria to match is equivalent to a logical AND operation. Alternatively,
create one rule for each criterion if you want to require that only one match before assigning a user
to a specific tunnel group. Requiring only one criterion to match is equivalent to a logical OR
operation.

The following example enables mapping of certificate-based ISAKMP sessions to a tunnel group based
on the content of the phase1 ISAKMP ID:

hostname(config)# tunnel-group-map enable ike-id

hostname(config)#

The following example enables mapping of certificate-based ISAKMP sessions to a tunnel group based
on the IP address of the peer:

hostname(config)# tunnel-group-map enable peer-ip

hostname(config)#

The following example enables mapping of certificate-based ISAKMP sessions based on the
organizational unit (OU) in the subject distinguished name (DN):

hostname(config)# tunnel-group-map enable ou

hostname(config)#

The following example enables mapping of certificate-based ISAKMP sessions based on established
rules:

hostname(config)# tunnel-group-map enable rules

hostname(config)#

policy

Specifies the policy for deriving the tunnel group name from the certificate.
Policy can be one of the following:

ike-id—Indicates that if a tunnel group is not determined based on a rule
lookup or taken from the OU, then the certificate-based ISAKMP sessions are
mapped to a tunnel group based on the content of the phase1 ISAKMP ID.

ou—Indicates that if a tunnel-group is not determined based on a rule lookup,
then use the value of the OU in the subject distinguished name (DN).

peer-ip—Indicates that if a tunnel group is not determined based on a rule
lookup or taken from the OU or ike-id methods, then use the peer IP address.

rules—Indicates that the certificate-based ISAKMP sessions are mapped to a
tunnel group based on the certificate map associations configured by this
command.

rule index

(Optional) Refers to parameters specified by the crypto ca certificate map
command. The values are 1 to 65535.

Advertising