Configuring attributes for vpn hardware clients – Cisco ASA 5505 User Manual

Page 1479

Advertising
background image

67-53

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 67 Configuring Connection Profiles, Group Policies, and Users

Group Policies

The following example shows how to set DHCP Intercepts for the group policy named FirstGroup:

hostname(config)# group-policy FirstGroup attributes

hostname(config-group-policy)# intercept-dhcp enable

Configuring Attributes for VPN Hardware Clients

The commands in this section enable or disable secure unit authentication and user authentication, and
set a user authentication timeout value for VPN hardware clients. They also let you allow Cisco IP
phones and LEAP packets to bypass individual user authentication and allow hardware clients using
Network Extension Mode to connect.

Configuring Secure Unit Authentication

Secure unit authentication provides additional security by requiring VPN hardware clients to
authenticate with a username and password each time that the client initiates a tunnel. With this feature
enabled, the hardware client does not have a saved username and password. Secure unit authentication
is disabled by default.

Note

With this feature enabled, to bring up a VPN tunnel, a user must be present to enter the username and
password.

Secure unit authentication requires that you have an authentication server group configured for the
connection profile the hardware client(s) use. If you require secure unit authentication on the primary
ASA, be sure to configure it on any backup servers as well.

Specify whether to enable secure unit authentication by entering the secure-unit-authentication
command with the enable keyword in group-policy configuration mode.

hostname(config-group-policy)# secure-unit-authentication {enable | disable}

hostname(config-group-policy)# no secure-unit-authentication

To disable secure unit authentication, enter the disable keyword. To remove the secure unit
authentication attribute from the running configuration, enter the no form of this command. This option
allows inheritance of a value for secure unit authentication from another group policy.

The following example shows how to enable secure unit authentication for the group policy named
FirstGroup:

hostname(config)# group-policy FirstGroup attributes

hostname(config-group-policy)# secure-unit-authentication enable

Configuring User Authentication

User authentication is disabled by default. When enabled, user authentication requires that individual
users behind a hardware client authenticate to gain access to the network across the tunnel. Individual
users authenticate according to the order of authentication servers that you configure.

Specify whether to enable user authentication by entering the user-authentication command with the
enable keyword in group-policy configuration mode.

hostname(config-group-policy)# user-authentication {enable | disable}

hostname(config-group-policy)# no user-authentication

Advertising