69-7
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter69 Configuring Remote Access IPsec VPNs
Guidelines and Limitations
Guidelines and Limitations
This section includes the guidelines and limitations for this feature.
Context Mode Guidelines
Supported in single context mode only. Does not support multiple context mode.
Firewall Mode Guidelines
Not supported in routed or transparent firewall mode.
Failover Guidelines
IPsec VPN sessions are replicated in Active/Standby failover configurations only. Active/Active failover
configurations are not supported.
IPv6 Guidelines
Does not support IPv6.
Configuring Remote Access IPsec VPNs
This section describes how to configure remote access VPNs and includes the following topics:
Configuring Interfaces, page69-7
Configuring ISAKMP Policy and Enabling ISAKMP on the Outside Interface, page69-8
Configuring an Address Pool, page69-9
Adding a User, page69-10
Creating an IKEv1 Transform Set or IKEv2 Proposal, page 69-10
Defining a Tunnel Group, page69-11
Creating a Dynamic Crypto Map, page69-12
Creating a Crypto Map Entry to Use the Dynamic Crypto Map, page69-13
Saving the Security Appliance Configuration, page69-14

Configuring Interfaces

An ASA has at least two interfaces, referred to here as outside and inside. Typically, the outside interface
is connected to the public Internet, while the inside interface is connected to a private network and is
protected from public access.
To begin, configure and enable two interfaces on the ASA. Then assign a name, IP address and subnet
mask. Optionally, configure its security level, speed and duplex operation on the security appliance.
To configure interfaces, perform the following steps, using the command syntax in the examples: