Cisco FirePOWER ASA 5500 series Configuration Manual page 627

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Chapter 30
Configuring Tunnel Groups, Group Policies, and Users
Configuring the Maximum Connect Time
Specify the maximum user connection time in minutes, or enter none to allow unlimited connection time
and prevent inheriting a value for this attribute. At the end of this period of time, the security appliance
terminates the connection.
The range is 1 through 35791394 minutes. There is no default timeout. To allow an unlimited timeout
period, and thus prevent inheriting a timeout value, enter the vpn-session-timeout command with the
none keyword. To remove the attribute from the running configuration, enter the no form of this
command.
hostname(config-username)# vpn-session-timeout {minutes | none}
hostname(config-username)# no vpn-session-timeout
hostname(config-username)#
The following example shows how to set a VPN session timeout of 180 minutes for the user named
anyuser:
hostname(config)# username anyuser attributes
hostname(config-username)# vpn-session-timeout 180
hostname(config-username)#
Applying an ACL Filter
Specify the name of a previously-configured, user-specific ACL to use as a filter for VPN connections.
To disallow an access list and prevent inheriting an access list from the group policy, enter the vpn-filter
command with the none keyword. To remove the ACL, including a null value created by issuing the
vpn-filter none command, enter the no form of this command. The no option allows inheritance of a
value from the group policy. There are no default behaviors or values for this command.
You configure ACLs to permit or deny various types of traffic for this user. You then use the vpn-filter
command to apply those ACLs.
hostname(config-username)# vpn-filter {value ACL_name | none}
hostname(config-username)# no vpn-filter
hostname(config-username)#
You must have filter selected in the functions command. WebVPN does not use ACLs defined in the
Note
vpn-filter command.
The following example shows how to set a filter that invokes an access list named acl_vpn for the user
named anyuser:
hostname(config)# username anyuser attributes
hostname(config-username)# vpn-filter value acl_vpn
hostname(config-username)#
Specifying the IP Address and Netmask
Specify the IP address and netmask to assign to a particular user. To remove the IP address, enter the no
form of this command.
hostname(config-username)# vpn-framed-ip-address {ip_address}
hostname(config-username)# no vpn-framed-ip-address
hostname(config-username)
The following example shows how to set an IP address of 10.92.166.7 for a user named anyuser:
OL-10088-01
Cisco Security Appliance Command Line Configuration Guide
Configuring User Attributes
30-73

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents