Guidelines and limitations, Configuring remote access ipsec vpns, Configuring interfaces – Cisco ASA 5505 User Manual

Page 1531: Remote access ipsec vpns, Configuring

Advertising
background image

69-7

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 69 Configuring Remote Access IPsec VPNs

Guidelines and Limitations

Guidelines and Limitations

This section includes the guidelines and limitations for this feature.

Context Mode Guidelines

Supported in single context mode only. Does not support multiple context mode.

Firewall Mode Guidelines

Not supported in routed or transparent firewall mode.

Failover Guidelines

IPsec VPN sessions are replicated in Active/Standby failover configurations only. Active/Active failover
configurations are not supported.

IPv6 Guidelines

Does not support IPv6.

Configuring

Remote Access IPsec VPNs

This section describes how to configure remote access VPNs and includes the following topics:

Configuring Interfaces, page 69-7

Configuring ISAKMP Policy and Enabling ISAKMP on the Outside Interface, page 69-8

Configuring an Address Pool, page 69-9

Adding a User, page 69-10

Creating an IKEv1 Transform Set or IKEv2 Proposal, page 69-10

Defining a Tunnel Group, page 69-11

Creating a Dynamic Crypto Map, page 69-12

Creating a Crypto Map Entry to Use the Dynamic Crypto Map, page 69-13

Saving the Security Appliance Configuration, page 69-14

Configuring Interfaces

An ASA has at least two interfaces, referred to here as outside and inside. Typically, the outside interface
is connected to the public Internet, while the inside interface is connected to a private network and is
protected from public access.

To begin, configure and enable two interfaces on the ASA. Then assign a name, IP address and subnet
mask. Optionally, configure its security level, speed and duplex operation on the security appliance.

To configure interfaces, perform the following steps, using the command syntax in the examples:

Advertising