Cisco Systems OL-5532-02 manual Summary, MSCHAPv1, MSCHAPv2

Page 23

Chapter 4 Remote Access VPN Services

Creating Remote Access VPN Policies

Table 4-10 Remote Access VPN Policy – VPN 3000 L2TP Editor Fields (continued)

Field Name

Type

Instructions

 

 

 

MSCHAPv1

checkbox

Check the box to use Microsoft Challenge-Handshake Authentication Protocol

 

 

version 1 (MSCHAPv1), or uncheck the box to disable use of this protocol.

 

 

 

MSCHAPv2

checkbox

Check the box to use Microsoft Challenge-Handshake Authentication Protocol

 

 

version 2 (MSCHAPv2), or uncheck the box to disable use of this protocol.

 

 

 

Step 3 Click Next to continue to the Remote Access VPN Policy Summary page as described in the “Summary Page” section on page 4-23.

Summary Page

When you have completed entering all the remote access parameters, the Remote Access VPN Policy – Summary page is displayed. Perform the following steps to save your remote access policy:

Step 1 The Remote Access VPN Policy – Summary page appears as shown in Figure 4-22.

Figure 4-22 The Remote Access VPN Policy – Summary Page

Step 2 Click Finish when you are done reviewing the VPN policy summary, or click Back to return to a previous page within the Remote Access VPN Policy pages to update a parameter.

Step 3 After you click Finish, the Polices page appears with the status of the policy displayed in the lower left corner of the page, under Status, as shown in Figure 4-23.

Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2

 

OL-5532-02

4-23

 

 

 

Image 23
Contents Remote Access VPN Services Adding AAA Server Devices to Your Repository AAA Servers IP Address TimeoutName Owner Select buttonCreating Encryption Policies Policies Click Remote Access VPN PolicyRemote Access VPN Policy General Editor Use Mode Group PasswordConfirm Password XAuth TimeoutIKE NAT Keepalive AuthenticationDefault Domain NAT TraversalDefining Address Pools Remote Access VPN Policy Address PoolsNet Mask Starting AddressEnding Address Defining Split Tunneling Networks Optional 11 Remote Access VPN Policy Split Tunneling Network ListCreate Split TunnelingPolicy Generate14 The Everything Option for Split Tunneling Defining the Remote Access User List OptionalUser ID PasswordDefining Cisco IOS Software-Specific Parameters SA Idle TimeoutEnabled SA Idle Timeout Group Lock Defining PIX Firewall-Specific ParametersReverse Route InjectionSysopt Connection Idle TimeoutDefining VPN 3000-Specific Parameters Max Connect TimeSimultaneous Logins Min PasswordOnly Passwords Authentication onDefining the VPN 3000 Access Hours End Time Defining the VPN 3000 L2TP ParametersControl Start TimeRequire Stateless Use Client AddressL2TP Compression RequiredMSCHAPv2 SummaryMSCHAPv1 23 The Policies Page with Policy Status Displayed Creating Remote Access VPN Service Requests Description Network-basedIPsec CPEs Remote AccessPolicies AAA Servers29 CPEs Associated with Remote Access Service Dialog Box 31 Add/Remove Templates Dialog Box 32 The Template DataFile Chooser Active ActionOL-5532-02