Cisco Systems ASA5515K9 Network Router User Manual


  Open as PDF
of 1994
 
69-7
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter 69 Configuring Remote Access IPsec VPNs
Guidelines and Limitations
Guidelines and Limitations
This section includes the guidelines and limitations for this feature.
Context Mode Guidelines
Supported in single context mode only. Does not support multiple context mode.
Firewall Mode Guidelines
Not supported in routed or transparent firewall mode.
Failover Guidelines
IPsec VPN sessions are replicated in Active/Standby failover configurations only. Active/Active failover
configurations are not supported.
IPv6 Guidelines
Does not support IPv6.
Configuring Remote Access IPsec VPNs
This section describes how to configure remote access VPNs and includes the following topics:
Configuring Interfaces, page 69-7
Configuring ISAKMP Policy and Enabling ISAKMP on the Outside Interface, page 69-8
Configuring an Address Pool, page 69-9
Adding a User, page 69-10
Creating an IKEv1 Transform Set or IKEv2 Proposal, page 69-10
Defining a Tunnel Group, page 69-11
Creating a Dynamic Crypto Map, page 69-12
Creating a Crypto Map Entry to Use the Dynamic Crypto Map, page 69-13
Saving the Security Appliance Configuration, page 69-14
Configuring Interfaces
An ASA has at least two interfaces, referred to here as outside and inside. Typically, the outside interface
is connected to the public Internet, while the inside interface is connected to a private network and is
protected from public access.
To begin, configure and enable two interfaces on the ASA. Then assign a name, IP address and subnet
mask. Optionally, configure its security level, speed and duplex operation on the security appliance.
To configure interfaces, perform the following steps, using the command syntax in the examples: