Cisco Systems OL-16647-01 Network Router User Manual


  Open as PDF
of 1230
 
35-73
Cisco ASDM User Guide
OL-16647-01
Chapter 35 General
Mapping Certificates to IPSec or SSL VPN Connection Profiles
Enable notification prior to expiration—When you check this option, the security appliance
notifies the remote user at login that the current password is about to expire or has expired, then
offers the user the opportunity to change the password. If the current password has not yet
expired, the user can still log in using that password. This parameter is valid for AAA servers
that support such notification; that is, RADIUS, RADIUS with an NT server, and LDAP servers.
The security appliance ignores this command if RADIUS or LDAP authentication has not been
configured.
Note that this does not change the number of days before the password expires, but rather, it
enables the notification. If you check this check box, you must also specify the number of days.
Notify...days prior to expiration—Specifies the number of days before the current password
expires to notify the user of the pending expiration. The range is 1 through 180 days.
Modes
The following table shows the modes in which this feature is available:
Add/Edit Tunnel Group > IPSec for LAN to LAN Access > IPSec
The Add or Edit Tunnel Group window for IPSec for Site-to-Site access, IPSec dialog box, lets you
configure or edit IPSec Site-to-Site-specific tunnel group parameters.
Fields
Name—Specifies the name assigned to this tunnel group. For the Edit function, this field is
display-only.
Type—(Display-only) Displays the type of tunnel group you are adding or editing. The contents of
this field depend on your selection on the previous window.
Pre-shared Key—Lets you specify the value of the pre-shared key for the tunnel group. The
maximum length of the pre-shared key is 128 characters.
Trustpoint Name—Selects a trustpoint name, if any trustpoints are configured. A trustpoint is a
representation of a certificate authority. A trustpoint contains the identity of the CA, CA-specific
configuration parameters, and an association with one enrolled identity certificate.
Authentication Mode—Specifies the authentication mode: none, xauth, or hybrid.
none—Specifies no authentication mode.
xauth—Specifies the use of IKE Extended Authentication mode, which provides the capability
of authenticating a user within IKE using TACACS+ or RADIUS.
hybrid—Specifies the use of Hybrid mode, which lets you use digital certificates for security
appliance authentication and a different, legacy method—such as RADIUS, TACACS+ or
SecurID—for remote VPN user authentication. This mode breaks phase 1 of the Internet Key
Exchange (IKE) into the following steps, together called hybrid authentication:
1. The security appliance authenticates to the remote VPN user with standard public key
techniques. This establishes an IKE security association that is unidirectionally authenticated.
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
——