Create a New Remote Access VPN Policy
You can add a new remote access VPN Policy only by using the Remote Access VPN Policy wizard. The wizard guides you to quickly and easily set up remote access VPNs with basic capabilities. Further, you can enhance the policy configuration by specifying additional attributes as desired and deploy it to your Firepower Threat Defense secure gateway devices.
Before you begin
-
Ensure that you complete all the prerequisites listed in Prerequisites for Configuring Remote Access VPN.
Procedure
Step 1 | Choose . | ||
Step 2 | Click (Add ()) Add to create a new Remote Access VPN Policy using a wizard that walks you through a basic policy configuration. You must proceed through the entire wizard to create a new policy; the policy is not saved if you cancel before completing the wizard. | ||
Step 3 | Select the Target Devices and Protocols. The Firepower Threat Defense devices selected here will function as your remote access VPN gateways for the VPN client users. You can select the devices from the list or add a new device. You can select Firepower Threat Defense devices when you create a remote access VPN policy or change them later. See Setting Target Devices for a Remote Access VPN Policy. You can select SSL or IPSec-IKEv2, or both the VPN protocols. Firepower Threat Defense supports both the protocols to establish secure connections over a public network through VPN tunnels.
For SSL settings, see Configure SSL Settings. | ||
Step 4 | Configure the Connection Profile and Group Policy settings. A connection profile specifies a set of parameters that define how the remote users connect to the VPN device. The parameters include settings and attributes for authentication, address assignments to VPN clients, and group policies. Firepower Threat Defense device provides a default connection profile named DefaultWEBVPNGroup when you configure a remote access VPN policy. For more information, see Configure Connection Profile Settings. For information about configuring,
A group policy is a set of attribute and value pairs, stored in a group policy object, that define the remote access VPN experience for VPN users. You configure attributes such as user authorization profile, IP addresses, AnyConnect settings, VLAN mapping, and user session settings and so on using the group policy. The RADIUS authorization server assigns the group policy, or it is obtained from the current connection profile. For more information, see Configuring Group Policies. | ||
Step 5 | Select the AnyConnect Client Image that the VPN users will use to connect to the remote access VPN. The Cisco AnyConnect Secure Mobility client provides secure SSL or IPSec (IKEv2) connections to the Firepower Threat Defense device for remote users with full VPN profiling to corporate resources. After the remote access VPN policy is deployed on the Firepower Threat Defense device, VPN users can enter the IP address of the configured device interface in their browser to download and install the AnyConnect client. For information about configuring AnyConnect client profile and client modules, see Group Policy AnyConnect Options. | ||
Step 6 | Select the Network Interface and Identity Certificate. Interface objects segment your network to help you manage and classify traffic flow. A security zone object simply groups interfaces. These groups may span multiple devices; you can also configure multiple zones interface objects on a single device. There are two types of interface objects:
| ||
Step 7 | View the Summary of the Remote Access VPN policy configuration. The Summary page displays all the remote access VPN settings you have configured so far and provides links to the additional configurations that need to be performed before deploying the remote access VPN policy on the selected devices. Click Back to make changes to the configuration, if required. | ||
Step 8 | Click Finish to complete the basic configuration for the remote access VPN policy. When you have completed the remote access VPN policy using the wizard, it returns to the policy listing page. Set up DNS configuration, configure access control for VPN users, and enable NAT exemption (if necessary) to complete a basic RA VPN Policy configuration. Then, deploy the configuration and establish VPN connections. |