Cisco Systems OL-16647-01 Network Router User Manual


  Open as PDF
of 1230
 
35-4
Cisco ASDM User Guide
OL-16647-01
Chapter 35 General
Default Tunnel Gateway
Default Tunnel Gateway
To configure the default tunnel gateway, click the Static Route link in this window. The Configuration >
Routing > Routing > Static Route window opens.
Modes
The following table shows the modes in which this feature is available:
Group Policies
The Group Policies window lets you manage VPN group policies. A VPN group policy is a collection
of user-oriented attribute/value pairs stored either internally on the device or externally on a RADIUS
or LDAP server. Configuring the VPN group policy lets users inherit attributes that you have not
configured at the individual group or username level. By default, VPN users have no group policy
association. The group policy information is used by VPN tunnel groups and user accounts.
The “child” windows and dialog boxes let you configure the group parameters, including those for the
default group. The default group parameters are those that are most likely to be common across all
groups and users, and they streamline the configuration task. Groups can “inherit” parameters from this
default group, and users can “inherit” parameters from their group or the default group. You can override
these parameters as you configure groups and users.
You can configure either an internal or an external group policy. An internal group policy is stored
locally, and an external group policy is stored externally on a RADIUS or LDAP server.Clicking Edit
opens a similar dialog box on which you can create a new group policy or modify an existing one.
In these dialog boxes, you configure the following kinds of parameters:
General attributes: Name, banner, address pools, protocols, filtering, and connection settings.
Servers: DNS and WINS servers, DHCP scope, and default domain name.
Advanced attributes: Split tunneling, IE browser proxy, SSL VPN Client and AnyConnect Client,
and IPSec Client.
Before configuring these parameters, you should configure:
Access hours.
Rules and filters.
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
——
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
——