
25-21
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 25 Configuring Tunnel Groups, Group Policies, and Users
Group Policies
User authentication is disabled by default. When enabled, user authentication requires that individual
users behind a hardware client authenticate to gain access to the network across the tunnel. Individual
users authenticate according to the order of authentication servers that you configure.
If you require user authentication on the primary security appliance, be sure to configure it on any
backup servers as well.
The following example shows how to enable user authentication for the group policy named
“FirstGroup”:
hostname(config)# group-policy FirstGroup attributes
hostname(config-group-policy)# user-authentication enable
Step 24 Set an idle timeout for individual users behind hardware clients, using the
user-authentication-idle-timeout command in group-policy configuration mode.
hostname(config-group-policy)# user-authentication-idle-timeout {
minutes
| none}
hostname(config-group-policy)# no user-authentication-idle-timeout
The minutes parameter specifies the number of minutes in the idle timeout period.The minimum is 1
minute, the default is 30 minutes, and the maximum is 35791394 minutes.
To delete the idle timeout value, enter the no form of this command. This option allows inheritance of
an idle timeout value from another group policy.
To prevent inheriting an idle timeout value, enter the user-authentication-idle-timeout command with
the none keyword. This command sets the idle timeout with a null value, which disallows an idle timeout
and prevents inheriting an user authentication idle timeout value from a default or specified group policy.
If there is no communication activity by a user behind a hardware client in the idle timeout period, the
security appliance terminates the client’s access.
Note The user-authentication-idle-timeout command terminates only the client’s access through the
VPN tunnel, not the VPN tunnel itself.
The following example shows how to set an idle timeout value of 45 minutes for the group policy named
“FirstGroup”:
hostname(config)# group-policy FirstGroup attributes
hostname(config-group-policy)# user-authentication-idle-timeout 45
Step 25 To enable IP Phone Bypass, enter the ip-phone-bypass command with the enable keyword in
group-policy configuration mode. IP Phone Bypass lets IP phones behind hardware clients connect
without undergoing user authentication processes. IP Phone Bypass is disabled by default. If enabled,
secure unit authentication remains in effect.
To disable IP Phone Bypass, enter the disable keyword. To remove the IP phone Bypass attribute from
the running configuration, enter the no form of this command. This option allows inheritance of a value
for IP Phone Bypass from another group policy.
hostname(config-group-policy)# ip-phone-bypass {enable | disable}
hostname(config-group-policy)# no ip-phone-bypass
Step 26 Specify whether to enable LEAP Bypass. To enable LEAP Bypass, enter the leap-bypass command with
the enable keyword in group-policy configuration mode. To disable LEAP Bypass, enter the disable
keyword. To remove the LEAP Bypass attribute from the running configuration, enter the no form of this
command. This option allows inheritance of a value for LEAP Bypass from another group policy.
hostname(config-group-policy)# leap-bypass {enable | disable}
hostname(config-group-policy)# no leap-bypass
Comentarios a estos manuales