Cisco 5505 Administration Guide - Page 55

or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client > Key Regeneration - support

Page 55 highlights

Chapter 5 Configuring AnyConnect Features Using ASDM Configuring, Enabling, and Using Other AnyConnect Features • Configuration > Remote Access VPN > Network (Client) Access > AAA Setup > Local Users > Add or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client > Key Regeneration • Device Management > Users/AAA > User Accounts > Add or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client > Key Regeneration Figure 5-11 shows an example of configuring the Rekey setting for an internal group policy. Figure 5-11 Configuring Rekey Attributes Key renegotiation occurs when the security appliance and the client perform a rekey and they renegotiate the crypto keys and initialization vectors, increasing the security of the connection. The fields on this dialog box are as follows: • Renegotiation Interval-Clear the Unlimited check box to specify the number of minutes from the start of the session until the rekey takes place, from 1 to 10080 (1 week). • Renegotiation Method-Check the None check box to disable rekey, check the SSL check box to specify SSL renegotiation during a rekey, or check the New Tunnel check box to establish a new tunnel during rekey. Note The security appliance does not currently support inline DTLS rekey. The AnyConnect client, therefore, treats all DTLS rekey events as though they were of the new tunnel method instead of the inline ssl type (CSCsh93610). OL-12950-012 Cisco AnyConnect VPN Client Administrator Guide 5-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118

5-13
Cisco AnyConnect VPN Client Administrator Guide
OL-12950-012
Chapter 5
Configuring AnyConnect Features Using ASDM
Configuring, Enabling, and Using Other AnyConnect Features
Configuration > Remote Access VPN > Network (Client) Access > AAA Setup > Local Users > Add
or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client > Key Regeneration
Device Management > Users/AAA > User Accounts > Add or Edit > Add or Edit User Account >
VPN Policy > SSL VPN Client > Key Regeneration
Figure 5-11
shows an example of configuring the Rekey setting for an internal group policy.
Figure 5-11
Configuring Rekey Attributes
Key renegotiation occurs when the security appliance and the client perform a rekey and they renegotiate
the crypto keys and initialization vectors, increasing the security of the connection. The fields on this
dialog box are as follows:
Renegotiation Interval—Clear the Unlimited check box to specify the number of minutes from the
start of the session until the rekey takes place, from 1 to 10080 (1 week).
Renegotiation Method—Check the None check box to disable rekey, check the SSL check box to
specify SSL renegotiation during a rekey, or check the New Tunnel check box to establish a new
tunnel during rekey.
Note
The security appliance does not currently support inline DTLS rekey. The AnyConnect client, therefore,
treats all DTLS rekey events as though they were of the new tunnel method instead of the inline ssl type
(CSCsh93610).