<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OS X 10.5.x L2TP/IPSEC VPN Client + ASA 5505 in VPN</title>
    <link>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166928#M22560</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have yo tried adding both configs with different sequence numbers?  ie&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set CISCO_CLIENT esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set APPLE_CLIENT esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set APPLE_CLIENT mode transport&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map client-crypto-map 40 set transform-set CISCO_CLIENT&lt;/P&gt;&lt;P&gt;crypto dynamic-map client-crypto-map 50 set transform-set APPLE_CLIENT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 08 Mar 2009 12:39:16 GMT</pubDate>
    <dc:creator>JamesLuther</dc:creator>
    <dc:date>2009-03-08T12:39:16Z</dc:date>
    <item>
      <title>OS X 10.5.x L2TP/IPSEC VPN Client + ASA 5505</title>
      <link>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166927#M22559</link>
      <description>&lt;P&gt;I'm trying to get Apple's l2tp/ipsec client to function with an ASA.  I've successfully connected with Cisco's client, with the desired access to the remote subnet, but as soon as I add this command:&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TUNNEL_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the Cisco client can no longer connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once the transform set is set to transport mode, the apple client can connect, but it can't see any of the remote LAN resources.  Heres the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address w.x.y.z 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list SPLIT extended permit ip 192.168.1.0 255.255.255.0 192.168.150.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 192.168.1.0 255.255.255.0 192.168.150.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip local pool ra_ip_pool 192.168.150.1-192.168.150.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 w.x.y.z 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TUNNEL_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TUNNEL_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;crypto dynamic-map client-crypto-map 40 set transform-set TUNNEL_ESP_3DES_SHA&lt;/P&gt;&lt;P&gt;crypto map cm-client-ra-vpn 20 ipsec-isakmp dynamic client-crypto-map&lt;/P&gt;&lt;P&gt;crypto map cm-client-ra-vpn interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal  3600&lt;/P&gt;&lt;P&gt;client-update enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!             &lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy client_ra_vpn_gp internal&lt;/P&gt;&lt;P&gt;group-policy client_ra_vpn_gp attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool ra_ip_pool&lt;/P&gt;&lt;P&gt; default-group-policy client_ra_vpn_gp&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt; authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;tunnel-group client_ra_vpn_tg type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group client_ra_vpn_tg general-attributes&lt;/P&gt;&lt;P&gt; address-pool ra_ip_pool&lt;/P&gt;&lt;P&gt; default-group-policy client_ra_vpn_gp&lt;/P&gt;&lt;P&gt;tunnel-group client_ra_vpn_tg ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group client_ra_vpn_tg ppp-attributes&lt;/P&gt;&lt;P&gt; authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 2048&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect pptp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 00:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166927#M22559</guid>
      <dc:creator>benhanson</dc:creator>
      <dc:date>2020-02-22T00:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: OS X 10.5.x L2TP/IPSEC VPN Client + ASA 5505</title>
      <link>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166928#M22560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have yo tried adding both configs with different sequence numbers?  ie&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set CISCO_CLIENT esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set APPLE_CLIENT esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set APPLE_CLIENT mode transport&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map client-crypto-map 40 set transform-set CISCO_CLIENT&lt;/P&gt;&lt;P&gt;crypto dynamic-map client-crypto-map 50 set transform-set APPLE_CLIENT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Mar 2009 12:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166928#M22560</guid>
      <dc:creator>JamesLuther</dc:creator>
      <dc:date>2009-03-08T12:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: OS X 10.5.x L2TP/IPSEC VPN Client + ASA 5505</title>
      <link>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166929#M22561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added the 2nd config, Cisco client still works, apple client doesn't.  Just to retest, I added mode transport to CISCO_CLIENT without changing anything else, and sure enough, apple client can connect but no traffic passes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then tried simply changing the order in the crypto dynamic-map, and whichever is first in sequence is successful, the other fails.  Still no traffic when apple client connects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at debug messages during Apple client failure, Phase 1 is successful, Phase 2 reports "All IPSec SA proposals found unacceptable"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Mar 2009 19:04:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166929#M22561</guid>
      <dc:creator>benhanson</dc:creator>
      <dc:date>2009-03-08T19:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: OS X 10.5.x L2TP/IPSEC VPN Client + ASA 5505</title>
      <link>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166930#M22562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a similar problem with ASA 5510 running 8.2(1) but same with 8.0.4(31) :&lt;/P&gt;&lt;P&gt;- iPhone using IPSEC works on ASA 5510&lt;/P&gt;&lt;P&gt;- no way to setup the ASA for iPhone and Mac using L2TP over IPSEC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Failure is after Phase 1 where i have :&lt;/P&gt;&lt;P&gt;- All IPSec SA proposals found unacceptable!&lt;/P&gt;&lt;P&gt;- QM FSM error (P2 struct &amp;amp;0xd9c86038, mess id 0x9e07a9fa)!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnaks for any help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nicolas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 May 2009 13:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166930#M22562</guid>
      <dc:creator>nicolas.scheffer</dc:creator>
      <dc:date>2009-05-09T13:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: OS X 10.5.x L2TP/IPSEC VPN Client + ASA 5505</title>
      <link>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166931#M22563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I made some progress!&lt;/P&gt;&lt;P&gt;Now i have a failure after Phase 2 for L2TP when i try from the Mac or iPhone using L2TP but the iPhone using the built-in Cisco IPSec client continu to working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some debugs regarding the L2TP Access :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1: IP = 82.246.31.188, IKE_DECODE RECEIVED Message (msgid=dcaebe4c) with payloads : HDR + HASH (8) + NONE (0) total length : 52&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, processing hash payload&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, loading all IPSEC SAs&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, Generating Quick Mode Key!&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, NP encrypt rule look up for crypto map outside_dyn_map 1 matching ACL Unknown: returned cs_id=d9cd7b18; rule=00000000&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, Generating Quick Mode Key!&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, NP encrypt rule look up for crypto map outside_dyn_map 1 matching ACL Unknown: returned cs_id=d9cd7b18; rule=00000000&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1: Group = DefaultRAGroup, IP = 82.246.31.188, Security negotiation complete for User () Responder, Inbound SPI = 0xfa085ca6, Outbound SPI = 0x0e1fc739&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, IKE got a KEY_ADD msg for SA: SPI = 0x0e1fc739&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, Pitcher: received KEY_UPDATE, spi 0xfa085ca6&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, Starting P2 rekey timer: 3420 seconds.&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1: Group = DefaultRAGroup, IP = 82.246.31.188, PHASE 2 COMPLETED (msgid=dcaebe4c)&lt;/P&gt;&lt;P&gt;May 10 09:32:14 IKEv1: IKEQM_Active() Add L2TP classification rules: ip &amp;lt;82.246.31.188&amp;gt; mask &amp;lt;0xFFFFFFFF&amp;gt; port &amp;lt;36755&amp;gt; &lt;/P&gt;&lt;P&gt;L2TP LOWERLAYER: l2tp_add_classification_rules()...ip &amp;lt;82.246.31.188&amp;gt; mask &amp;lt;255.255.255.255&amp;gt; port &amp;lt;36755&amp;gt;&lt;/P&gt;&lt;P&gt;L2TP LOWERLAYER: l2tp_add_fw_rule(): If 1, peer IP 82.246.31.188, peer port 36755&lt;/P&gt;&lt;P&gt;L2TP LOWERLAYER: np_classify_add_static(PERMIT) vpif_num&amp;lt;1&amp;gt; np_rule_id &amp;lt;0xd77b18c0&amp;gt;&lt;/P&gt;&lt;P&gt;L2TP LOWERLAYER: l2tp_add_punt_rule(): If 1, peer IP 82.246.31.188, peer port 36755&lt;/P&gt;&lt;P&gt;L2TP LOWERLAYER: np_classify_add_static(PUNT) vpif_num&amp;lt;1&amp;gt; np_rule_id &amp;lt;0xd7b50c50&amp;gt;&lt;/P&gt;&lt;P&gt;L2TP LOWERLAYER: l2tp_punt_service_callback() ch:&amp;lt;0xd5a95140&amp;gt;, flow:&amp;lt;0x27321bf2&amp;gt; inVpifNum&amp;lt;1:outside&amp;gt; outVpifNum&amp;lt;0:NP Identity Ifc&amp;gt;&lt;/P&gt;&lt;P&gt;L2TP PACKET: vPifNum:&amp;lt;1&amp;gt; proto&lt;UDP&gt; saddr&amp;lt;82.246.31.188&amp;gt; daddr&amp;lt;91.199.0.68&amp;gt; sport&amp;lt;36755&amp;gt; dport&amp;lt;1701&amp;gt;&lt;/UDP&gt;&lt;/P&gt;&lt;P&gt;L2TP PACKET: &lt;/P&gt;&lt;P&gt;dest_ip &amp;lt;82.246.31.188&amp;gt;, dest_port &amp;lt;36755&amp;gt;, ipsec_ident&amp;lt;0x9a000&amp;gt;, vPifNum &amp;lt;1:outside&amp;gt;, channel: &amp;lt;0xd5a95180&amp;gt;&lt;/P&gt;&lt;P&gt;L2TP LOWERLAYER: PUNT CONSUMED!&lt;/P&gt;&lt;P&gt;L2TP LOWERLAYER: l2tp_punt_service_callback() ch:&amp;lt;0xd5a95140&amp;gt;, flow:&amp;lt;0x27321bf2&amp;gt; inVpifNum&amp;lt;1:outside&amp;gt; outVpifNum&amp;lt;0:NP Identity Ifc&amp;gt;&lt;/P&gt;&lt;P&gt;L2TP PACKET: vPifNum:&amp;lt;1&amp;gt; proto&lt;UDP&gt; saddr&amp;lt;82.246.31.188&amp;gt; daddr&amp;lt;91.199.0.68&amp;gt; sport&amp;lt;36755&amp;gt; dport&amp;lt;1701&amp;gt;&lt;/UDP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.........&lt;/P&gt;&lt;P&gt;May 10 09:32:16 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, IKE SA MM:8c279c79 rcv'd Terminate: state MM_ACTIVE flags 0x00010042, refcnt 1, tuncnt 1&lt;/P&gt;&lt;P&gt;May 10 09:32:16 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, sending delete/delete with reason message&lt;/P&gt;&lt;P&gt;May 10 09:32:16 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, constructing blank hash payload&lt;/P&gt;&lt;P&gt;May 10 09:32:16 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, constructing IPSec delete payload&lt;/P&gt;&lt;P&gt;May 10 09:32:16 IKEv1 DEBUG: Group = DefaultRAGroup, IP = 82.246.31.188, constructing qm hash payload&lt;/P&gt;&lt;P&gt;May 10 09:32:16 IKEv1: IP = 82.246.31.188, IKE_DECODE SENDING Message (msgid=ac044337) with payloads : HDR + HASH (8) + DELETE (12) + NONE &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read somewhere on the Cisco Site that L2TP must use default Group and Policy which is not possible for me. If it's correct i don't know how to solve this!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nicolas &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 May 2009 06:39:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166931#M22563</guid>
      <dc:creator>nicolas.scheffer</dc:creator>
      <dc:date>2009-05-10T06:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: OS X 10.5.x L2TP/IPSEC VPN Client + ASA 5505</title>
      <link>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166932#M22564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It works!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You just need to disable all ms-chap-vx and enable pap only under ppp-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nicolas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 May 2009 07:01:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/os-x-10-5-x-l2tp-ipsec-vpn-client-asa-5505/m-p/1166932#M22564</guid>
      <dc:creator>nicolas.scheffer</dc:creator>
      <dc:date>2009-05-11T07:01:06Z</dc:date>
    </item>
  </channel>
</rss>

