Cisco SA520-K9 Administration Guide - Page 142

Configuring the User Database for the IPsec Remote Access, IPsec > IKE Policies

Page 142 highlights

Configuring VPN Configuring an IPsec VPN Tunnel for Remote Access with a VPN Client 7 • To review or update the configured IKE policy, click IPsec > IKE Policies. For more information, see Configuring the IKE Policies for IPsec VPN, page 144. • To configure IPsec passthrough, click IPsec > Passthrough. For more information, see Configuring IPsec Passthrough, page 153. Configuring the User Database for the IPsec Remote Access VPN If you are using IPsec VPN for remote access by remote workers, use this page to manage the users (both XAUTH and Cisco QuickVPN). The VPN gateway authenticates the users in this list when XAUTH is used in an IKE policy. Alternatively, you can enable Extended Authentication (XAUTH) from user records stored on an external authentication server such as a RADIUS server, see Configuring the IKE Policies for IPsec VPN, page 144. If you are using the using the Cisco VPN Client, see the Application Note located under Technical Documentation at: www.cisco.com/go/sa500resources. STEP 1 Click VPN > IPsec > IPsec Users. The IPsec Users window opens. Any existing users are listed in the List of IPsec Users table. STEP 2 Click Add to add a user. Other options: Click the Edit button to edit an entry. To delete an entry, check the box and then click Delete. To select all entries, check the box in the first column of the table heading. After you click Add or Edit, the IPsec User Configuration window opens. STEP 3 Enter the following information: • User Name: Enter a unique identifier for the XAUTH user. • Remote Peer Type: Choose one of the following options: - Standard IPsec (XAuth) Cisco SA500 Series Security Appliances Administration Guide 142

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Configuring VPN
Configuring an IPsec VPN Tunnel for Remote Access with a VPN Client
Cisco SA500 Series Security Appliances Administration Guide
142
7
To review or update the configured IKE policy, click
IPsec > IKE Policies
.
For more information, see
Configuring the IKE Policies for IPsec VPN,
page 144
.
To configure IPsec passthrough, click
IPsec > Passthrough
. For more
information, see
Configuring IPsec Passthrough, page153
.
Configuring the User Database for the IPsec Remote Access
VPN
If you are using IPsec VPN for remote access by remote workers, use this page to
manage the users (both XAUTH and Cisco QuickVPN). The VPN gateway
authenticates the users in this list when XAUTH is used in an IKE policy.
Alternatively, you can enable Extended Authentication (XAUTH) from user records
stored on an external authentication server such as a RADIUS server, see
Configuring the IKE Policies for IPsec VPN, page144
.
If you are using the using the Cisco VPN Client, see the Application Note located
under Technical Documentation at:
www.cisco.com/go/sa500resources.
STEP 1
Click
VPN
> IPsec > IPsec Users
.
The IPsec Users window opens. Any existing users are listed in the List of IPsec
Users table.
STEP
2
Click
Add
to add a user.
Other options:
Click the
Edit
button to edit an entry. To delete an entry, check the
box and then click
Delete
. To select all entries, check the box in the first column of
the table heading.
After you click Add or Edit, the IPsec User Configuration window opens.
STEP 3
Enter the following information:
User Name:
Enter a unique identifier for the XAUTH user.
Remote Peer Type:
Choose one of the following options:
-
Standard IPsec (XAuth)