<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5545 multiple contexts and VPN password saving on client side in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5545-multiple-contexts-and-vpn-password-saving-on-client/m-p/3726760#M13342</link>
    <description>Try to create a new profile and see if its greyed out as well. I don't&lt;BR /&gt;think this is related to multicontext.&lt;BR /&gt;</description>
    <pubDate>Wed, 17 Oct 2018 04:44:00 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2018-10-17T04:44:00Z</dc:date>
    <item>
      <title>ASA 5545 multiple contexts and VPN password saving on client side</title>
      <link>https://community.cisco.com/t5/network-security/asa-5545-multiple-contexts-and-vpn-password-saving-on-client/m-p/3726305#M13321</link>
      <description>&lt;P&gt;So I configured Active-Active failover on my 5545 ASA's, and everything looks great other than 1 small thing - users cannot save passwords on their clients anymore. I "ticked" that in ASDM before, which is an equivalent to setting "password-storage enable" in the group policy attribues, but now the command is gone via SSH, and in ASDM it is greyed out wherever I can find it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas how I can "resurrect" the feature ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance !&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:21:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5545-multiple-contexts-and-vpn-password-saving-on-client/m-p/3726305#M13321</guid>
      <dc:creator>mAcRoS</dc:creator>
      <dc:date>2020-02-21T16:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5545 multiple contexts and VPN password saving on client side</title>
      <link>https://community.cisco.com/t5/network-security/asa-5545-multiple-contexts-and-vpn-password-saving-on-client/m-p/3726760#M13342</link>
      <description>Try to create a new profile and see if its greyed out as well. I don't&lt;BR /&gt;think this is related to multicontext.&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Oct 2018 04:44:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5545-multiple-contexts-and-vpn-password-saving-on-client/m-p/3726760#M13342</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-10-17T04:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5545 multiple contexts and VPN password saving on client side</title>
      <link>https://community.cisco.com/t5/network-security/asa-5545-multiple-contexts-and-vpn-password-saving-on-client/m-p/3726883#M13371</link>
      <description>&lt;P&gt;This setting is usually in group policy, but I still created a new profile, which generated a new group policy, and the store password option is not there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also did some investigations in the CLI, and the command is not available, and is not present in the&amp;nbsp;DfltGrpPolicy&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;FW/admin# sh run all group-policy DfltGrpPolicy
group-policy DfltGrpPolicy internal
group-policy DfltGrpPolicy attributes
 banner none
 wins-server none
 dns-server none
 dhcp-network-scope none
 vpn-access-hours none
 vpn-simultaneous-logins 3
 vpn-idle-timeout 30
 vpn-idle-timeout alert-interval 1
 vpn-session-timeout none
 vpn-session-timeout alert-interval 1
 vpn-filter none
 vpn-tunnel-protocol ikev1 ikev2
 ip-comp disable
 group-lock none
 pfs disable
 split-tunnel-policy tunnelall
 ipv6-split-tunnel-policy tunnelall
 split-tunnel-network-list none
 default-domain none
 split-dns none
 split-tunnel-all-dns disable
 client-bypass-protocol disable
 gateway-fqdn none
 msie-proxy server none
 msie-proxy method no-modify
 msie-proxy except-list none
 msie-proxy local-bypass disable
 msie-proxy pac-url none
 msie-proxy lockdown enable
 vlan none
 address-pools none
 ipv6-address-pools none
 smartcard-removal-disconnect enable
 security-group-tag none
 periodic-authentication certificate none
 webvpn
  homepage none
  anyconnect ssl dtls enable
  anyconnect mtu 1406
  anyconnect firewall-rule client-interface private none
  anyconnect firewall-rule client-interface public none
  anyconnect keep-installer installed
  anyconnect ssl keepalive 20
  anyconnect ssl rekey time none
  anyconnect ssl rekey method none
  anyconnect dpd-interval client 30
  anyconnect dpd-interval gateway 30
  anyconnect ssl compression none
  anyconnect dtls compression none
  anyconnect modules none
  anyconnect profiles none
  anyconnect ssl df-bit-ignore disable
  anyconnect routing-filtering-ignore disable&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;FW/admin(config-group-policy)# password-storage enable
                                                     ^
ERROR: % Invalid input detected at '^' marker.
FW/admin(config-group-policy)#

FW/admin(config-group-policy)# password-storage ?
ERROR: % Unrecognized command&lt;/PRE&gt;
&lt;P&gt;So it seems like this command is not available at all ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is version info, which would be helpful I guess&lt;/P&gt;
&lt;PRE&gt;FW/admin# sh version

Cisco Adaptive Security Appliance Software Version 9.9(2) &amp;lt;context&amp;gt;
Firepower Extensible Operating System Version 2.3(1.84)
Device Manager Version 7.9(2)

Compiled on Sun 25-Mar-18 17:39 PDT by builders

FW up 12 hours 10 mins
failover cluster up 4 days 17 hours

Hardware:   ASA5545, 12288 MB RAM, CPU Lynnfield 2659 MHz, 1 CPU (8 cores)
            ASA: 6455 MB RAM, 1 CPU (1 core)
BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
                             Boot microcode        : CNPx-MC-BOOT-2.00
                             SSL/IKE microcode     : CNPx-MC-SSL-SB-PLUS-0005
                             IPSec microcode       : CNPx-MC-IPSEC-MAIN-0026
                             Number of accelerators: 1
Baseboard Management Controller (revision 0x1) Firmware Version: 2.4&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 09:36:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5545-multiple-contexts-and-vpn-password-saving-on-client/m-p/3726883#M13371</guid>
      <dc:creator>mAcRoS</dc:creator>
      <dc:date>2018-10-17T09:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5545 multiple contexts and VPN password saving on client side</title>
      <link>https://community.cisco.com/t5/network-security/asa-5545-multiple-contexts-and-vpn-password-saving-on-client/m-p/3727863#M13390</link>
      <description>&lt;P&gt;After switching back to single context the "password-storage enable" command is back in the group-policy and works as expected. Maybe I am missing something, but this setup is ok for me, so I will stick to single context and Active/Standby HA setup.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Oct 2018 13:18:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5545-multiple-contexts-and-vpn-password-saving-on-client/m-p/3727863#M13390</guid>
      <dc:creator>mAcRoS</dc:creator>
      <dc:date>2018-10-18T13:18:24Z</dc:date>
    </item>
  </channel>
</rss>

