Cisco PIX 500 Series Configuration Manual page 629

Security appliance command line
Hide thumbs Also See for PIX 500 Series:
Table of Contents

Advertisement

Chapter 30
Configuring Connection Profiles, Group Policies, and Users
This command enters tunnel-group ipsec-attributes configuration mode, in which you configure the
remote-access tunnel-group IPSec attributes.
For example, the following command designates that the tunnel-group ipsec-attributes mode commands
that follow pertain to the connection profile named TG1. Notice that the prompt changes to indicate that
you are now in tunnel-group ipsec-attributes mode:
hostname(config)# tunnel-group TG1 type remote-access
hostname(config)# tunnel-group TG1 ipsec-attributes
hostname(config-tunnel-ipsec)#
Specify the preshared key to support IKE connections based on preshared keys. For example, the
Step 2
following command specifies the preshared key xyzx to support IKE connections for an IPSec remote
access connection profile:
hostname(config-tunnel-ipsec)# pre-shared-key xyzx
hostname(config-tunnel-ipsec)#
Specify whether to validate the identity of the peer using the peer's certificate:
Step 3
hostname(config-tunnel-ipsec)# peer-id-validate option
hostname(config-tunnel-ipsec)#
The available options are req (required), cert (if supported by certificate), and nocheck (do not check).
The default is req.
For example, the following command specifies that peer-id validation is required:
hostname(config-tunnel-ipsec)# peer-id-validate req
hostname(config-tunnel-ipsec)#
Specify whether to
Step 4
Specify whether to enable sending of a certificate chain. The following command includes the root
Step 5
certificate and any subordinate CA certificates in the transmission:
hostname(config-tunnel-ipsec)# chain
hostname(config-tunnel-ipsec)#
This attribute applies to all IPSec tunnel-group types.
Step 6
Specify the name of a trustpoint that identifies the certificate to be sent to the IKE peer:
hostname(config-tunnel-ipsec)# trust-point trust-point-name
hostname(config-tunnel-ipsec)#
The following command specifies mytrustpoint as the name of the certificate to be sent to the IKE peer:
hostname(config-ipsec)# trust-point mytrustpoint
Step 7
Specify the ISAKMP (IKE) keepalive threshold and the number of retries allowed.
hostname(config-tunnel-ipsec)# isakmp keepalive threshold < number > retry < number >
hostname(config-tunnel-ipsec)#
The threshold parameter specifies the number of seconds (10 through 3600) that the peer is allowed to
idle before beginning keepalive monitoring. The retry parameter is the interval (2 through 10 seconds)
between retries after a keepalive response has not been received. IKE keepalives are enabled by default.
To disable IKE keepalives, enter the no form of the isakmp command:
For example, the following command sets the IKE keepalive threshold value to 15 seconds and sets the
retry interval to 10 seconds:
hostname(config-tunnel-ipsec)# isakmp keepalive threshold 15 retry 10
hostname(config-tunnel-ipsec)#
OL-12172-03
Cisco Security Appliance Command Line Configuration Guide
Configuring Connection Profiles
30-13

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5500 series

Table of Contents