The Access Interface table lists the interface groups and security zones that contain the device interfaces. These are configured for remote access SSL or IPsec IKEv2 VPN connections. The table displays the name of each interface group or security-zone, the interface trustpoints used by the interface, and whether Datagram Transport Layer Security (DTLS) is enabled.
Procedure
Step 1 | Choose . |
Step 2 | Select an existing remote access VPN policy in the list and click the corresponding Edit icon. |
Step 3 | Click the Access Interface tab. |
Step 4 | To add an access interface, click + and specify values for the following in the Add Access Interface dialog box:
-
Access Interface—Select the interface group or security zone to which the interface belongs.
The interface group or security zone must be a Routed type. Other interface types are not supported for remote access VPN connectivity.
-
Associate the Protocol object with the access interface by selecting the following options:
-
Click OK to save the changes.
|
Step 5 | Select the following under Access Settings:
-
Allow Users to select connection profile while logging in—If you have multiple connection profiles, check this check box to allow user to select the correct connection profile during login. You must select this option for IPsec-IKEv2 VPNs.
-
Enable HTTP-only VPN Cookies—Check this check box to enable HTTP-only VPN cookies.
|
Step 6 | Use the following options to configure SSL Settings:
-
Web Access Port Number—The port to use for VPN sessions. The default port is 443.
-
DTLS Port Number—The UDP port to use for DTLS connections. The default port is 443.
-
SSL Global Identity Certificate— The selected SSL Global Identity Certificate will be used for all the associated interfaces if the Interface Specific Identity Certificate is not provided.
|
Step 7 | For IPsec-IKEv2 Settings, select the IKEv2 Identity Certificate from the list or add an identity certificate. |
Step 8 | Under the Access Control for VPN Traffic section, select the following option if you want to bypass access control policy:
-
Bypass Access Control policy for decrypted traffic (sysopt permit-vpn) — Decrypted traffic is subjected to Access Control Policy inspection by default. Enabling the Bypass Access Control policy for decrypted traffic option bypasses the ACL inspection, but VPN Filter ACL and authorization ACL downloaded from AAA server are still applied to VPN traffic.
|
Step 9 | Click Save to save the access interface changes. |