Skip to main content

Learning Remote access VPN

Pulled content from https://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/vpn_groups.html



how to configure VPN connection profiles (formerly called “tunnel groups” )




In summary, you first configure connection profiles to set the values for the connection. Then you configure group policies. These set values for users in the aggregate. Then you configure users, which can inherit values from groups and configure certain values on an individual user basis. This chapter describes how and why to configure these entities.



A group is a collection of users treated as a single entity
Users get their attributes from group policies .
A connection profile identifies the group policy for a specific connection.
If you do not assign a particular group policy to a user, the default group policy for the connection applies.


The security appliance can apply attribute values from a variety of sources. It applies them according to the following hierarchy:
1. Dynamic Access Policy (DAP) record
2. Username
3. Group policy
4. Group policy for the connection profile
5. Default group policy

Comments

Popular posts from this blog

Cisco FTD 2140 using ASA image

Have got a project to migrate the current EOL ( End of Life ) Cisco ASA 51XX series firewall. The Documentation for this is not enough to migrate seemlessly. A few links which can help to ease the pain while trying to configure via remote ( other country) .Click on the below link. ASA on a FTD 2100 https://www.cisco.com/c/en/us/td/docs/security/firepower/630/fdm/fptd-fdm-config-guide-630/fptd-fdm-mgmt.html#id_32969 https://www.cisco.com/c/en/us/support/docs/security/firepower-2100-series/213519-configure-fdm-firepower-device-manageme.html delete ipv6 command was the below: >configure network ipv6 delete it deletes the "router" ipv6 setting, along with the ipv6 mgmt configuration. For the migration from ASA to FTD, if you are doing it manually, please refer the config guide to get the steps to configure the required things: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/fdm/fptd-fdm-config-guide-640.html For FXOS cli commands: https://www.cisco.com/c/en/...