6-4
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter6 VPN Wizards
IPsec IKEv1 Remote Access Wizard
Tunnel Group Name—Type a name to create the record that contains tunnel connection policies for
this IPsec connection. A connection policy can specify authentication, authorization, and accounting
servers, a default group policy, and IKE attributes. A connection policy that you configure with this
VPN wizard specifies an authentication method and uses the ASA Default Group Policy.
Client Authentication
Use the Client Authentication pane to select the method by which the ASA authenticates remote users.
Fields
Select one of the following options:
Authenticate using the local user database—Click to use authentication internal to the ASA. Use this
method for environments with a small, stable number of users. The next pane lets you create
accounts on the ASA for individual users.
Authenticate using an AAA server group—Click to use an external server group for remote user
authentication.
AAA Server Group Name—Choose a AAA server group configured previously.
New...—Click to configure a new AAA server group.
User Accounts
Use the User Accounts pane to add new users to the ASA internal user database for authentication
purposes.
Fields
Use the fields in this section to add a user.
Username—Enter the username.
Password—(Optional) Enter a password.
Confirm Password—(Optional) Reenter the password.
Add—Click to add a user to the database after you have entered the username and optional
password.
Delete—To remove a user from the database, highlight the appropriate username and click Delete.
Address Pool
Use the Address Pool pane to configure a pool of local IP addresses that the ASA assigns to remote VPN
clients.
Fields
Tunnel Group Name—Displays the name of the connection policy to which the address pool
applies. You set this name in the VPN Client Name and Authentication Method pane.
Pool Name—Select a descriptive identifier for the address pool.
New...—Click to configure a new address pool.