<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Implementing Remote Access VPN in Secure Firewall in Evaluation Mo in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/implementing-remote-access-vpn-in-secure-firewall-in-evaluation/m-p/5336203#M1123049</link>
    <description>&lt;P&gt;Thanks a lot. Very informative...&amp;nbsp;I appreciate the help.&lt;/P&gt;</description>
    <pubDate>Mon, 06 Oct 2025 14:41:58 GMT</pubDate>
    <dc:creator>rezaalikhani</dc:creator>
    <dc:date>2025-10-06T14:41:58Z</dc:date>
    <item>
      <title>Implementing Remote Access VPN in Secure Firewall in Evaluation Mode</title>
      <link>https://community.cisco.com/t5/network-security/implementing-remote-access-vpn-in-secure-firewall-in-evaluation/m-p/5335663#M1123023</link>
      <description>&lt;P data-start="131" data-end="152"&gt;&lt;STRONG data-start="131" data-end="150"&gt;Hello everyone,&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-start="154" data-end="284"&gt;I would like to know if it is possible to implement Remote Access VPN on Cisco Secure Firewall while running in Evaluation Mode?&lt;/P&gt;
&lt;P data-start="154" data-end="284"&gt;I have already completed all the required configuration steps and enabled &lt;STRONG&gt;IPsec/IKEv2&lt;/STRONG&gt; with the &lt;STRONG&gt;DES&lt;/STRONG&gt; algorithm. However, when the client attempts to connect to the firewall remotely, it encounters the following event:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rezaalikhani_0-1759490051056.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/252957iE5A01427124C0ADC/image-size/large?v=v2&amp;amp;px=999" role="button" title="rezaalikhani_0-1759490051056.png" alt="rezaalikhani_0-1759490051056.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 11:15:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implementing-remote-access-vpn-in-secure-firewall-in-evaluation/m-p/5335663#M1123023</guid>
      <dc:creator>rezaalikhani</dc:creator>
      <dc:date>2025-10-03T11:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing Remote Access VPN in Secure Firewall in Evaluation Mo</title>
      <link>https://community.cisco.com/t5/network-security/implementing-remote-access-vpn-in-secure-firewall-in-evaluation/m-p/5335697#M1123032</link>
      <description>&lt;P&gt;The web portal (for client services) will require strong encryption for SSL/TLS to securely negotiate with any modern browser. For that you will need a registered license associated with a Smart License account.&lt;/P&gt;
&lt;P&gt;You can get a registered evaluation license - either via your partner or (if you are a partner yourself) directly from Cisco via a Global Virtual Engineering (GVE) request.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2025 14:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implementing-remote-access-vpn-in-secure-firewall-in-evaluation/m-p/5335697#M1123032</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-10-03T14:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing Remote Access VPN in Secure Firewall in Evaluation Mo</title>
      <link>https://community.cisco.com/t5/network-security/implementing-remote-access-vpn-in-secure-firewall-in-evaluation/m-p/5336182#M1123047</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/146869"&gt;@rezaalikhani&lt;/a&gt;&amp;nbsp;please note further that when the Secure Client negotiates the SSL/TLS handshake with a VPN headend, it will propose 22 supported cipher suites (see below). What they all have in common is that they all use AES128 or AES256. If the headend does not have a license from Cisco, it will not support AES of any type and thus the error you cited will appear.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MarvinRhoads_0-1759755839144.png" style="width: 981px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/253098i13C980BDB39C2480/image-dimensions/981x734?v=v2" width="981" height="734" role="button" title="MarvinRhoads_0-1759755839144.png" alt="MarvinRhoads_0-1759755839144.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2025 14:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implementing-remote-access-vpn-in-secure-firewall-in-evaluation/m-p/5336182#M1123047</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-10-06T14:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Implementing Remote Access VPN in Secure Firewall in Evaluation Mo</title>
      <link>https://community.cisco.com/t5/network-security/implementing-remote-access-vpn-in-secure-firewall-in-evaluation/m-p/5336203#M1123049</link>
      <description>&lt;P&gt;Thanks a lot. Very informative...&amp;nbsp;I appreciate the help.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2025 14:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implementing-remote-access-vpn-in-secure-firewall-in-evaluation/m-p/5336203#M1123049</guid>
      <dc:creator>rezaalikhani</dc:creator>
      <dc:date>2025-10-06T14:41:58Z</dc:date>
    </item>
  </channel>
</rss>

