Cisco PIX 525 Specifikace Strana 424

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 604
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 423
25-10
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 25 Configuring Tunnel Groups, Group Policies, and Users
Group Policies
Step 6 Specify the ISAKMP keepalive threshold and the number of retries allowed. The threshold parameter
specifies the number of seconds (10 through 3600) that the peer is allowed to idle before beginning
keepalive monitoring. The retry parameter is the interval (2 through 10 seconds) between retries after a
keepalive response has not been received. IKE keepalives are enabled by default. To disable IKE
keepalives, enter the no form of the isakmp command:
hostname(config)# isakmp keepalive threshold <
number
> retry <
number
>
For example, the following command sets the ISAKMP keepalive threshold to 15 seconds and sets the
retry interval to 10 seconds.:
hostname(config-ipsec)# isakmp keepalive threshold 15 retry 10
The default value for the threshold parameter for LAN-to-LAN is 10, and the default value for the retry
parameter is 2.
Group Policies
A group policy is a set of user-oriented attribute/value pairs for IPSec connections that are stored either
internally (locally) on the device or externally on a RADIUS server. The tunnel group refers to a group
policy that sets terms for user connections after the tunnel is established. Group policies let you apply
whole sets of attributes to a user or a group of users, rather than having to specify each attribute
individually for each user.
Enter the group-policy commands in global configuration mode to assign a group policy to users or to
modify a group policy for specific users.
The security appliance includes a default group policy. You can modify this default group policy, but you
cannot delete it. You can also create one or more group policies specific to your environment.
Group policies include the following attributes:
Identity
Defining servers
Client firewall settings
Tunneling protocols
IPSec settings
Hardware client settings
Filters
Client configuration settings
Connection settings
Zobrazit stránku 423
1 2 ... 419 420 421 422 423 424 425 426 427 428 429 ... 603 604

Komentáře k této Příručce

Žádné komentáře