Specifications
8-3
Cisco ASA 5580 Getting Started Guide
78-18101-01
Chapter 8 Scenario: IPsec Remote-Access VPN Configuration
Implementing the IPsec Remote-Access VPN Scenario
• Specifying a User Authentication Method, page 8-9
• (Optional) Configuring User Accounts, page 8-10
• Configuring Address Pools, page 8-11
• Configuring Client Attributes, page 8-13
• Configuring the IKE Policy, page 8-14
• Configuring IPsec Encryption and Authentication Parameters, page 8-15
• Specifying Address Translation Exception and Split Tunneling, page 8-16
• Verifying the Remote-Access VPN Configuration, page 8-18
Information to Have Available
Before you begin configuring the adaptive security appliance to accept remote
access IPsec VPN connections, make sure that you have the following information
available:
• Range of IP addresses to be used in an IP pool. These addresses are assigned
to remote VPN clients as they are successfully connected.
• List of users to be used in creating a local authentication database, unless you
are using a AAA server for authentication.
• Networking information to be used by remote clients when connecting to the
VPN, including the following:
–
IP addresses for the primary and secondary DNS servers
–
IP addresses for the primary and secondary WINS servers
–
Default domain name
–
List of IP addresses for local hosts, groups, and networks that should be
made accessible to authenticated remote clients
Starting ASDM
This section describes how to start ASDM using the ASDM Launcher software.
If you have not installed the ASDM Launcher software, see
Starting ASDM with
a Web Browser, page 4-7.