69-55
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter69 General VPN Setup
Configuring AnyConnect VPN Connections
Enable IPsec (IKEv2) client protocol—Check to enable IPsec using IKEv2 for this connection.
DNS Servers—Enter the IP address(s) of DNS servers for this policy.
WINS Servers—Enter the IP address(s) of WINS servers for this policy.
Domain Name—Enter a default domain name.
Find—Enter a GUI label or a CLI command to use as a search string, then click Next or Previous to
begin the search.
Modes
The following table shows the modes in which this feature is available:
Setting Advanced Attributes for a Connection Profile
The Advanced menu items and their dialog boxes let you configure the following characteristics for this
connection:
General attributes
Client Addressing attributes
Authentication attributes
Authorization attributes
Accounting attributes
Name server attributes
Clientless SSL VPN attributes
Note SSL VPN and secondary authentication attributes apply only to SSL VPN connection profiles.
Setting General Attributes for an AnyConnect SSL VPN Connection
Configure the General attributes to specify the password management parameters.
Fields
Set the Advanced General attributes as follows:
Enable Password Management—Lets you configure parameters relevant to overriding an
account-disabled indication from a AAA server and to notifying users about password expiration.
The ASA supports password management for the RADIUS and LDAP protocols. It supports the
“password-expire-in-days” option only for LDAP. This parameter is valid for AAA servers that
support such notification. The ASA ignores this command if RADIUS or LDAP authentication has
not been configured.
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
——