User's Manual
Table Of Contents
- Getting Started
- Wizards
- Using the Startup Wizard
- Using the Wireless Wizard to Configure the Wireless Settings for ISA550W and ISA570W
- Using the DMZ Wizard to Configure the DMZ Settings
- Using the Dual WAN Wizard to Configure the WAN Redundancy Settings
- Using the Site-to-Site Wizard to Establish the Site-to-Site VPN Tunnels
- Using the Remote Access Wizard to Establish the IPSec VPN Tunnels or SSL VPN Tunnels for Remote Access
- Status
- Networking
- Configuring IP Routing Mode
- Port Management
- Configuring the WAN
- Configuring the WAN Redundancy
- Configuring the VLAN
- Configuring the DMZ
- Configuring the Zones
- Configuring the Routing
- Dynamic DNS
- IGMP
- VRRP
- Configuring the Quality of Service
- Address Management
- Service Management
- Wireless Configuration for ISA550W and ISA570W
- Firewall
- Configuring the Firewall Access Rules to Control Inbound and Outbound Traffic
- Configuring the Firewall Schedule
- Firewall Access Rule Configuration Examples
- Configuring the NAT Rules to Securely Access a Remote Network
- Configuring the Session Settings
- Configuring the Content Filtering to Control Access to Internet
- Configuring the MAC Filtering to Permit or Block Traffic
- Configuring the IP/MAC Binding to Prevent Spoofing
- Configuring the Attack Protection
- Configuring the Application Level Gateway
- Security Services
- VPN
- About VPN
- Configuring the Cisco IPSec VPN Server
- Configuring the Cisco IPSec VPN Client
- Configuring the Site-to-Site VPN
- Configuring the SSL VPN
- Elements of the SSL VPN
- Configuration Tasks to Establish a SSL VPN Tunnel
- Installing the Cisco AnyConnect VPN Client on User’s PC
- Importing the Certificates for User Authentication
- Configuring the SSL VPN Users
- Configuring the SSL VPN Gateway
- Configuring the SSL VPN Group Policies
- Configuring the SSL VPN Portal
- Configuring the L2TP Server
- Configuring the VPN Passthrough
- Viewing the VPN Status
- User Management
- Device Management
- Remote Management
- Administration
- SNMP
- Configuration Management
- Firmware Management
- Log Management
- Managing the Security License
- Managing the Certificates for Authentication
- Configuring the Email Alert Settings
- Configuring the RADIUS Servers
- Configuring the Time Zone
- Device Discovery
- Diagnosing the Device
- Measuring and Limiting Traffic with the Traffic Meter
- Configuring the ViewMaster
- Configuring the CCO Account
- Configuring the Device Properties
- Configuring the Debug Settings
- Troubleshooting
- Technical Specifications and Environmental Requirements
- Factory Default Settings
- Where to Go From Here
VPN
Configuring the SSL VPN
Cisco ISA500 Series Integrated Security Appliance Administrator Guide 261
8
VPN group policies for them. Specifying a SSL VPN group policy for a user group
can enable the SSL VPN service for all included SSL VPN users. For complete
details about the users and user groups, see Configuring the Users and Groups,
page 275
According to the user login settings specified on your security appliance, the SSL
VPN users can be authenticated by the local database or external AAA server
(such as Active Directory, LDAP, or RADIUS). For complete details about the user
login settings, see Configuring the Users and Groups, page 275 and
Configuring the User Authentication Settings, page 277.
Configuring the SSL VPN Gateway
Use the SSL VPN Configuration page to enable SSL VPN and configure the SSL
VPN gateway settings.
STEP 1 Click VPN -> SSL Remote Aceess -> SSL VPN Configuration.
The SSL VPN Configuration window opens.
STEP 2 Click On to enable SSL VPN, or click Off to disable SSL VPN. If you enable SSL
VPN, the security appliance is set as the SSL VPN server.
STEP 3 In the Gateway (Mandatory) area, enter the following information:
• Gateway Interface: Choose the WAN interface that the traffic passes
through over the SSL VPN tunnel.
• Gateway Port: Enter the port number used for the SSL VPN gateway. By
default, HTTPS or SSL typically operates on port 443. However, the SSL
VPN gateway should be flexible to operate on a user defined port. The SSL
VPN clients need to enter the entire address pair “Gateway IP Address: Port
Number” for connectting purposes.
• Certificate File: Choose a certificate to authenticate the users who want to
access your network resource through the SSL VPN tunnel. To import the
digital certificates for authentication, go to the Device Management ->
Certificate Management page. See Managing the Certificates, page 311.
• Client Address Pool: The SSL VPN gateway has a configurable address
pool with maximum size of 255 that is used to allocate IP addresses to the
remote clients. Enter the IP address pool for all remote clients. The client is
assigned an IP address by the SSL VPN gateway.