67-46
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter67 Configuring Connection Profiles, Group Policies, and Users
Group Policies
The default is IPsec. To remove the attribute from the running configuration, enter the no form of this
command.
The parameter values for this command follow:
ikev1—Negotiates an IPsec IKEv1 tunnel between two peers (the Cisco VPN Client or another
secure gateway). Creates security associations that govern authentication, encryption,
encapsulation, and key management.
ikev2—Negotiates an IPsec IKEv2 tunnel between two peers (the AnyConnect Secure Mobility
Client or another secure gateway). Creates security associations that govern authentication,
encryption, encapsulation, and key management.
l2tp-ipsec—Negotiates an IPsec tunnel for an L2TP connection
ssl-client—Negotiates an SSL tunnel using TLS or DTLS with the AnyConnect Secure Mobility
Client.
ssl-clientless—Provides VPN services to remote users via an HTTPS-enabled web browser, and
does not require a client.
Enter this command to configure one or more tunneling modes. You must configure at least one tunneling
mode for users to connect over a VPN tunnel.
The following example shows how to configure the IPsec IKEv1 tunneling mode for the group policy
named FirstGroup:
hostname(config)# group-policy FirstGroup attributes
hostname(config-group-policy)# vpn-tunnel-protocol ikev1
hostname(config-group-policy)#
Configuring Security Attributes
The attributes in this section specify certain security settings for the group:
Step1 Specify whether to let users store their login passwords on the client system, using the
password-storage command with the enable keyword in group-policy configuration mode. To disable
password storage, use the password-storage command with the disable keyword.
hostname(config-group-policy)# password-storage {enable | disable}
hostname(config-group-policy)#
For security reasons, password storage is disabled by default. Enable password storage only on systems
that you know to be in secure sites.
To remove the password-storage attribute from the running configuration, enter the no form of this
command:
hostname(config-group-policy)# no password-storage
hostname(config-group-policy)#
Specifying the no form enables inheritance of a value for password-storage from another group policy.
This command does not apply to interactive hardware client authentication or individual user
authentication for hardware clients.
The following example shows how to enable password storage for the group policy named FirstGroup:
hostname(config)# group-policy FirstGroup attributes
hostname(config-group-policy)# password-storage enable
hostname(config-group-policy)#