Cisco Systems OL-16647-01 Network Router User Manual


  Open as PDF
of 1230
 
32-11
Cisco ASDM User Guide
OL-16647-01
Chapter 32 VPN
VPN Wizard
Attributes Pushed to Client
Use the Attributes Pushed to Client (Optional) panel to have the security appliance pass information
about DNS and WINS servers and the default domain name to remote access clients.
Fields
Provide information for remote access clients to use.
Tunnel Group—Displays the name of the connection policy to which the address pool applies. You
set this name in the VPN Client Name and Authentication Method panel.
Primary DNS Server—Type the IP address of the primary DNS server.
Secondary DNS Server—Type the IP address of the secondary DNS server.
Primary WINS Server—Type the IP address of the primary WINS server.
Secondary WINS Server— Type the IP address of the secondary WINS server.
Default Domain Name—Type the default domain name. Modes
The following table shows the modes in which this feature is available:
IPsec Settings (Optional)
Use the IPsec Settings (Optional) panel to identify local hosts/networks which do not require address
translation. By default, the security appliance hides the real IP addresses of internal hosts and networks
from outside hosts by using dynamic or static Network Address Translation (NAT). NAT minimizes risks
of attack by untrusted outside hosts, but may be improper for those who have been authenticated and
protected by VPN.
For example, an inside host using dynamic NAT has its IP address translated by matching it to a
randomly selected address from a pool. Only the translated address is visible to the outside. Remote VPN
clients that attempt to reach these hosts by sending data to their real IP addresses cannot connect to these
hosts, unless you configure a NAT exemption rule.
Note If you want all hosts and networks to be exempt from NAT, configure nothing on this panel. If you have
even one entry, all other hosts and networks are subject to NAT.
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
——
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
——