
25-4
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 25 Configuring Tunnel Groups, Group Policies, and Users
Configuring Tunnel Groups
Configuring Tunnel Groups
The security appliance provides two default tunnel groups, one for remote access (DefaultRAGroup) and
one for LAN-to-LAN (DefaultL2LGroup). You can modify these groups, but you cannot delete them. To
see the current configured and default configuration of all your tunnel groups, including the default
tunnel group, enter the show running-config all tunnel-group command.
You can configure a new tunnel group as either an IPSec Remote Access (ipsec-ra) tunnel or an IPSec
LAN-to-LAN (ipsec-l2l) tunnel. The default is ipsec-ra. The subsequent parameters depend upon your
choice of tunnel type.
Default Remote Access Tunnel Group Configuration
The contents of the default remote-access tunnel group are as follows:
tunnel-group DefaultRAGroup type ipsec-ra
tunnel-group DefaultRAGroup general-attributes
no address-pool
authentication-server-group LOCAL
no authorization-server-group
no accounting-server-group
default-group-policy DfltGrpPolicy
no dhcp-server
no strip-realm
no strip-group
tunnel-group DefaultRAGroup ipsec-attributes
no pre-shared-key
no authorization-required
authorization-dn-attributes CN OU
peer-id-validate req
no radius-with-expiry
no chain
no trust-point
isakmp keepalive threshold 300 retry 2
Configuring Remote-Access Tunnel Groups
To configure a remote-access tunnel group, follow the steps in this section. An IPSec Remote Access
VPN tunnel group applies only to remote-access IPSec client connections.
Specify a Name and Type for the Remote-Access Tunnel Group
To assign a name and type for the tunnel group, enter the tunnel-group command to assign a name and
type for the tunnel group.
hostname(config)# tunnel-group
tunnel_group_name
type
tunnel_type
For a remote-access tunnel, the type is ipsec-ra; for example:
hostname(config)# tunnel-group TunnelGroup1 type ipsec-ra
Komentarze do niniejszej Instrukcji