<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New ASA Device in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956323#M440572</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm zeroing in on the section I've copied below. Which username is the iPad user logging in with? I'm thinking perhaps either the username command parameterrs need to be modified or possibly the secondary CryptoCard autherntication server is not getting the Radius secret properly from the iPad client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy OUTSIDE-REMOTEACCESS attributes&lt;/P&gt;&lt;P&gt;dns-server value 10.4.4.50 10.4.4.51&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec svc &lt;/P&gt;&lt;P&gt;default-domain value internal.xxx&lt;/P&gt;&lt;P&gt;username user1 password spqkEUN2dW2Uq2B3 encrypted&lt;/P&gt;&lt;P&gt;username user2 password CiPqkZGHO77wSa/e encrypted privilege 0&lt;/P&gt;&lt;P&gt;username user2 attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy RSA-TEST&lt;/P&gt;&lt;P&gt;username xxx password xxx encrypted&lt;/P&gt;&lt;P&gt;username neteng password xxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;username neteng attributes&lt;/P&gt;&lt;P&gt;service-type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool OUTSIDE-TEST&lt;/P&gt;&lt;P&gt;authentication-server-group INTERNAL_AD&lt;/P&gt;&lt;P&gt;secondary-authentication-server-group CryptoCard use-primary-username&lt;/P&gt;&lt;P&gt;tunnel-group CompanyOwnedComputer type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group CompanyOwnedComputer general-attributes&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 23 Jun 2012 12:53:26 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2012-06-23T12:53:26Z</dc:date>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956318#M440567</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a new ASA box configured and one of the user is using his IPad to connect to it.&lt;/P&gt;&lt;P&gt;It is asking for secret password while he trys to connect it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arun&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956318#M440567</guid>
      <dc:creator>Kesar123456</dc:creator>
      <dc:date>2019-03-11T23:21:51Z</dc:date>
    </item>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956319#M440568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Enable password should be blank if you haven't configured the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2012 03:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956319#M440568</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-22T03:54:01Z</dc:date>
    </item>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956320#M440569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Let me put it this way, user is trying to connected ASA using his IPAD.&lt;/P&gt;&lt;P&gt;It is asking for password, which he has. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again it is asking for Secret...................so not sure what it is.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2012 20:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956320#M440569</guid>
      <dc:creator>Kesar123456</dc:creator>
      <dc:date>2012-06-22T20:50:14Z</dc:date>
    </item>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956321#M440570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the user trying to use the AnyConnect app on an iPad or is he trying to connect to the ASA to administer it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only in the latter case should an enable password be required. In the former case - e.g., when connecting using AnyConnect (for a remote access VPN), a user should only be required to provide their user password (unless 2 factor authentication with a third party application is setup for the VPN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide the ASA configuration file for better assistance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2012 22:12:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956321#M440570</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-06-22T22:12:30Z</dc:date>
    </item>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956322#M440571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Marvin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attaching&amp;nbsp; the running config.&lt;/P&gt;&lt;P&gt;The user is from the group MDW(You can see it in the config).&lt;/P&gt;&lt;P&gt;=====================================================================================&lt;/P&gt;&lt;P&gt;sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;BR /&gt;hostname nmtasav001&lt;BR /&gt;domain-name internal.XXX.com&lt;BR /&gt;enable password xxx encrypted&lt;BR /&gt;passwd xxx encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.4.5.5 NetflowAnalyzer&lt;BR /&gt;name 10.4.5.6 Challenger&lt;BR /&gt;name 10.4.237.0 Net-10.4.237.0 description ASA Client VPN&lt;BR /&gt;name xxx Net-xxx description Hosting&lt;BR /&gt;name 10.4.4.50 mtcdnsw001&lt;BR /&gt;name 10.4.4.51 mtcdnsw002&lt;BR /&gt;name xxx nmtasav001-outside&lt;BR /&gt;name 172.16.0.0 Net-172.16.0.0&lt;BR /&gt;name 192.168.0.0 Net-192.168.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif INSIDE&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.4.1.20 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address nmtasav001-outside 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; nameif lab&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.105.193 255.255.254.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup INSIDE&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server mtcdnsw001&lt;BR /&gt; name-server mtcdnsw002&lt;BR /&gt; domain-name internal.xxx&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network obj-SSL-pool&lt;BR /&gt; network-object 10.2.31.0 255.255.255.0&lt;BR /&gt;object-group network obj-inside-LAN&lt;BR /&gt; network-object 10.4.1.0 255.255.255.224&lt;BR /&gt;object-group network INTERNAL-DNS&lt;BR /&gt; network-object host mtcdnsw001&lt;BR /&gt; network-object host mtcdnsw002&lt;BR /&gt;object-group network Net-PrivateRFC1918&lt;BR /&gt; network-object 10.0.0.0 255.0.0.0&lt;BR /&gt; network-object Net-172.16.0.0 255.240.0.0&lt;BR /&gt; network-object Net-192.168.0.0 255.255.0.0&lt;BR /&gt;access-list mngmt-in extended permit ip any any &lt;BR /&gt;access-list INSIDE_nat0_outbound extended permit ip any 192.168.105.194 255.255.255.254 &lt;BR /&gt;access-list INSIDE_nat0_outbound extended permit ip any 10.2.31.0 255.255.255.0 &lt;BR /&gt;access-list no_nat extended permit ip 10.2.31.0 255.255.255.0 10.0.0.0 255.0.0.0 &lt;BR /&gt;access-list no_nat extended permit ip any 10.0.0.0 255.255.255.0 &lt;BR /&gt;access-list tcp_bypass extended permit tcp host 10.4.4.38 any &lt;BR /&gt;access-list DAP-Test extended deny ip 10.2.31.0 255.255.255.0 host Challenger &lt;/P&gt;&lt;P&gt;access-list MDW-Contractors extended permit ip Net-10.4.237.0 255.255.255.0 Net-xxx 255.255.224.0 &lt;BR /&gt;access-list MDW-Contractors extended permit udp Net-10.4.237.0 255.255.255.0 object-group INTERNAL-DNS eq domain &lt;BR /&gt;access-list MDW-Contractors extended deny ip any object-group Net-PrivateRFC1918 &lt;BR /&gt;access-list MDW-Contractors extended permit ip Net-10.4.237.0 255.255.255.0 any &lt;BR /&gt;access-list MDW-ST-TEST extended permit ip any any inactive &lt;BR /&gt;access-list MDW-ST-TEST2 standard permit host xxx &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;flow-export destination INSIDE NetflowAnalyzer 2055&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu lab 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool IPPool 192.168.105.194-192.168.105.195 mask 255.255.254.0&lt;BR /&gt;ip local pool TestPool 10.0.0.1-10.0.0.254 mask 255.255.255.0&lt;BR /&gt;ip local pool OUTSIDE-TEST 10.2.31.2-10.2.31.254 mask 255.255.255.0&lt;BR /&gt;ip local pool MDW-Contractors 10.4.237.206-10.4.237.210 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (OUTSIDE) 1 interface&lt;BR /&gt;nat (INSIDE) 0 access-list no_nat&lt;BR /&gt;nat (OUTSIDE) 1 Net-10.4.237.0 255.255.255.0&lt;BR /&gt;access-group mngmt-in in interface management&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 xxx 1&lt;BR /&gt;route INSIDE 10.0.0.0 255.0.0.0 10.4.1.4 1&lt;BR /&gt;route INSIDE Net-172.16.0.0 255.240.0.0 10.4.1.4 1&lt;BR /&gt;route INSIDE Net-192.168.0.0 255.255.0.0 10.4.1.4 1&lt;BR /&gt;route INSIDE Net-xxx 255.255.224.0 10.4.1.4 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt; user-message "Default Success"&lt;BR /&gt;dynamic-access-policy-record Employees&lt;BR /&gt; user-message "Employees DAP Good"&lt;BR /&gt; network-acl DAP-Test&lt;BR /&gt;aaa-server Internal_LDAP protocol nt&lt;BR /&gt;aaa-server Internal_LDAP (INSIDE) host 10.4.4.40&lt;BR /&gt; nt-auth-domain-controller 10.4.4.40&lt;BR /&gt;aaa-server CryptoCard protocol radius&lt;BR /&gt;aaa-server CryptoCard (INSIDE) host 10.4.5.1&lt;BR /&gt;key *****&lt;BR /&gt; authentication-port 1812&lt;BR /&gt; accounting-port 1813&lt;BR /&gt;aaa-server INTERNAL_AD protocol nt&lt;BR /&gt;aaa-server INTERNAL_AD (INSIDE) host 10.4.4.40&lt;BR /&gt; nt-auth-domain-controller 10.4.4.40&lt;BR /&gt;aaa-server AD_LDAP protocol ldap&lt;BR /&gt;aaa-server AD_LDAP (INSIDE) host 10.4.4.38&lt;BR /&gt; server-port 389&lt;BR /&gt; ldap-base-dn ou=xxx,dc=internal,dc=xxx,dc=com&lt;BR /&gt; ldap-group-base-dn ou=xxx,dc=internal,dc=xxx,dc=xxx&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password *****&lt;BR /&gt; ldap-login-dn &lt;A href="mailto:ldapquery@xxx"&gt;ldapquery@xxx&lt;/A&gt;&lt;BR /&gt; server-type microsoft&lt;BR /&gt;aaa-server BlackShield protocol radius&lt;BR /&gt;aaa-server BlackShield (INSIDE) host 10.4.4.253&lt;BR /&gt; key *****&lt;BR /&gt; authentication-port 1812&lt;BR /&gt; accounting-port 1813&lt;BR /&gt;aaa-server BlackShield (INSIDE) host 10.4.4.254&lt;BR /&gt; key *****&lt;BR /&gt; authentication-port 1812&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; accounting-port 1813&lt;BR /&gt;aaa-server Hosting-LDAP protocol ldap&lt;BR /&gt;aaa-server Hosting-LDAP (INSIDE) host xxx&lt;BR /&gt; server-port 636&lt;BR /&gt; ldap-base-dn ou=People,dc=xxx,dc=xxx&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute uid&lt;BR /&gt; ldap-login-password *****&lt;BR /&gt; ldap-login-dn cn=VPN,ou=Auth Accounts,dc=xxx,dc=xxx&lt;BR /&gt; ldap-over-ssl enable&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.105.192 255.255.255.255 lab&lt;BR /&gt;http Challenger 255.255.255.255 lab&lt;BR /&gt;http 10.0.0.0 255.0.0.0 lab&lt;BR /&gt;http 10.0.0.0 255.0.0.0 INSIDE&lt;BR /&gt;http Net-192.168.0.0 255.255.0.0 INSIDE&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map lab_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map lab_map interface lab&lt;BR /&gt;crypto map OUTSIDE_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map OUTSIDE_map interface OUTSIDE&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt; enrollment self&lt;BR /&gt; subject-name CN=nmtasav001&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt; certificate 17ffe14e&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308201d7 30820140 a0030201 02020417 ffe14e30 0d06092a 864886f7 0d010105 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05003030 31133011 06035504 03130a6e 6d746173 61763030 31311930 1706092a &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 864886f7 0d010902 160a6e6d 74617361 76303031 301e170d 31313132 30393132 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 34363231 5a170d32 31313230 36313234 3632315a 30303113 30110603 55040313 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0a6e6d74 61736176 30303131 19301706 092a8648 86f70d01 0902160a 6e6d7461 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 73617630 30313081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8181009a 6917bd8f e740f061 92d7a6fe 93407ac8 0449a07d 65da57c8 ce4954d4 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2260f2b5 ab4df14c 5ad4c326 83a5d44f 61c1fcf1 4b297cfd 99b5d476 1c448acf &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1939e5aa 8b994aba 4a6cd5ee dc9add18 92677696 773d581c 3b8bc39b 3257c32c &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cf1288d2 9a2addce 76b3fd5c 90207513 c4f2c662 771dfbe7 4b6ce8a3 5ec886a4 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3ec27d02 03010001 300d0609 2a864886 f70d0101 05050003 8181008e 36d02573 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; df2277dd d0902fa8 83b6efb1 183c3df1 2d305cd8 c3eb6c15 f21534e1 12252077 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; f9d92978 7477cd70 b0e5cf6a db9401ea b02b1ece ace0ed55 7b84bddc cb86e9af &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 306c1033 ed52c294 ea59a284 0e6f63e6 d1c6f3c8 ace8b8ba 158e38a1 2923cbc2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 27895b29 549ce80a 66170c58 b4e493d5 879c44d5 860ed20d 96d05d&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto isakmp enable OUTSIDE&lt;BR /&gt;crypto isakmp enable lab&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 INSIDE&lt;BR /&gt;ssh Net-192.168.0.0 255.255.0.0 INSIDE&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 lab&lt;BR /&gt;ssh Net-192.168.0.0 255.255.0.0 lab&lt;BR /&gt;ssh Challenger 255.255.255.255 lab&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.4.4.35 source INSIDE prefer&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 lab&lt;BR /&gt;webvpn&lt;BR /&gt; enable OUTSIDE&lt;BR /&gt; csd image disk0:/csd_3.5.841-k9.pkg&lt;BR /&gt; svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1&lt;BR /&gt; svc image disk0:/anyconnect-linux-2.4.1012-k9.pkg 2&lt;BR /&gt; svc image disk0:/anyconnect-macosx-powerpc-2.3.2016-k9.pkg 3&lt;BR /&gt; svc image disk0:/anyconnect-macosx-i386-2.4.1012-k9.pkg 4&lt;BR /&gt; svc image disk0:/anyconnect-win-2.5.3055-k9.pkg 5&lt;BR /&gt; svc enable&lt;BR /&gt;group-policy RSA-TEST internal&lt;BR /&gt;group-policy RSA-TEST attributes&lt;BR /&gt; dns-server value 10.4.4.50 10.4.4.51&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value internal.xxx&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; dns-server value 10.4.4.50 10.4.4.51&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;BR /&gt; default-domain value internal.xxx&lt;BR /&gt;group-policy GroupPolicy4 internal&lt;BR /&gt;group-policy GroupPolicy4 attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 10.4.4.50 10.4.4.51&lt;BR /&gt; vpn-filter value MDW-Contractors&lt;BR /&gt; vpn-tunnel-protocol svc &lt;BR /&gt; default-domain value internal.xxx&lt;BR /&gt;group-policy GroupPolicy3 internal&lt;BR /&gt;group-policy GroupPolicy3 attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 10.4.4.50 10.4.4.51&lt;BR /&gt; vpn-tunnel-protocol svc &lt;BR /&gt; default-domain value internal.xxx&lt;BR /&gt;group-policy GroupPolicy2 internal&lt;BR /&gt;group-policy GroupPolicy2 attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 10.4.4.50 10.4.4.51&lt;BR /&gt; vpn-tunnel-protocol svc &lt;BR /&gt; default-domain value internal.xxx&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 10.4.4.50 10.4.4.51&lt;BR /&gt; vpn-tunnel-protocol svc &lt;BR /&gt; default-domain value internal.xxx&lt;BR /&gt;group-policy EmployeeGrpPolicy internal&lt;BR /&gt;group-policy EmployeeGrpPolicy attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 10.4.4.50 10.4.4.51&lt;BR /&gt; vpn-tunnel-protocol svc webvpn&lt;BR /&gt; default-domain value internal.xxx&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list value Challenger&lt;BR /&gt;group-policy OUTSIDE-REMOTEACCESS internal&lt;BR /&gt;group-policy OUTSIDE-REMOTEACCESS attributes&lt;BR /&gt; dns-server value 10.4.4.50 10.4.4.51&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt; default-domain value internal.xxx&lt;BR /&gt;username user1 password spqkEUN2dW2Uq2B3 encrypted&lt;BR /&gt;username user2 password CiPqkZGHO77wSa/e encrypted privilege 0&lt;BR /&gt;username user2 attributes&lt;BR /&gt; vpn-group-policy RSA-TEST&lt;BR /&gt;username xxx password xxx encrypted&lt;BR /&gt;username neteng password xxx encrypted privilege 15&lt;BR /&gt;username neteng attributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt; address-pool OUTSIDE-TEST&lt;BR /&gt; authentication-server-group INTERNAL_AD&lt;BR /&gt; secondary-authentication-server-group CryptoCard use-primary-username&lt;BR /&gt;tunnel-group CompanyOwnedComputer type remote-access&lt;BR /&gt;tunnel-group CompanyOwnedComputer general-attributes&lt;BR /&gt; address-pool OUTSIDE-TEST&lt;BR /&gt; authentication-server-group INTERNAL_AD&lt;BR /&gt; secondary-authentication-server-group BlackShield use-primary-username&lt;BR /&gt; default-group-policy EmployeeGrpPolicy&lt;BR /&gt;tunnel-group CompanyOwnedComputer webvpn-attributes&lt;BR /&gt; group-url &lt;A href="https://xxx/employees"&gt;https://xxx/employees&lt;/A&gt; enable&lt;BR /&gt;tunnel-group MDW type remote-access&lt;BR /&gt;tunnel-group MDW general-attributes&lt;BR /&gt;address-pool MDW-Contractors&lt;BR /&gt; authentication-server-group Hosting-LDAP&lt;BR /&gt; authorization-server-group Hosting-LDAP&lt;BR /&gt; default-group-policy GroupPolicy4&lt;BR /&gt;tunnel-group MDW webvpn-attributes&lt;BR /&gt; group-url &lt;A href="https://xxx/mdw"&gt;https://xxx/mdw&lt;/A&gt; enable&lt;BR /&gt;tunnel-group OUTSIDE-REMOTEACCESS type remote-access&lt;BR /&gt;tunnel-group OUTSIDE-REMOTEACCESS general-attributes&lt;BR /&gt; address-pool OUTSIDE-TEST&lt;BR /&gt; default-group-policy OUTSIDE-REMOTEACCESS&lt;BR /&gt;tunnel-group OUTSIDE-REMOTEACCESS ipsec-attributes&lt;BR /&gt; trust-point ASDM_TrustPoint0&lt;BR /&gt;tunnel-group RSA-TEST type remote-access&lt;BR /&gt;tunnel-group RSA-TEST general-attributes&lt;BR /&gt; address-pool TestPool&lt;BR /&gt; default-group-policy RSA-TEST&lt;BR /&gt;tunnel-group RSA-TEST ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group TunnelGroup1 type remote-access&lt;BR /&gt;tunnel-group TunnelGroup1 general-attributes&lt;BR /&gt; authentication-server-group (INSIDE) Internal_LDAP&lt;BR /&gt; default-group-policy GroupPolicy2&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map tcp_bypass&lt;BR /&gt; description "TCP traffic that bypasses stateful firewall"&lt;BR /&gt; match access-list tcp_bypass&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;policy-map tcp_bypass_policy&lt;BR /&gt; class tcp_bypass&lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy tcp_bypass_policy interface INSIDE&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:8ebf55bf0eac5187d701d62352d57e6f&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;nmtasav001# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2012 12:41:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956322#M440571</guid>
      <dc:creator>Kesar123456</dc:creator>
      <dc:date>2012-06-23T12:41:07Z</dc:date>
    </item>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956323#M440572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm zeroing in on the section I've copied below. Which username is the iPad user logging in with? I'm thinking perhaps either the username command parameterrs need to be modified or possibly the secondary CryptoCard autherntication server is not getting the Radius secret properly from the iPad client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy OUTSIDE-REMOTEACCESS attributes&lt;/P&gt;&lt;P&gt;dns-server value 10.4.4.50 10.4.4.51&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec svc &lt;/P&gt;&lt;P&gt;default-domain value internal.xxx&lt;/P&gt;&lt;P&gt;username user1 password spqkEUN2dW2Uq2B3 encrypted&lt;/P&gt;&lt;P&gt;username user2 password CiPqkZGHO77wSa/e encrypted privilege 0&lt;/P&gt;&lt;P&gt;username user2 attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy RSA-TEST&lt;/P&gt;&lt;P&gt;username xxx password xxx encrypted&lt;/P&gt;&lt;P&gt;username neteng password xxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;username neteng attributes&lt;/P&gt;&lt;P&gt;service-type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool OUTSIDE-TEST&lt;/P&gt;&lt;P&gt;authentication-server-group INTERNAL_AD&lt;/P&gt;&lt;P&gt;secondary-authentication-server-group CryptoCard use-primary-username&lt;/P&gt;&lt;P&gt;tunnel-group CompanyOwnedComputer type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group CompanyOwnedComputer general-attributes&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2012 12:53:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956323#M440572</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-06-23T12:53:26Z</dc:date>
    </item>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956324#M440573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The user is trying to connect ASA using Anyconnect from his IPAD.&lt;/P&gt;&lt;P&gt;We use Authentication using LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i see from the attachment his send me is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;He is entering the followng information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Description as &lt;SPAN style="text-decoration: underline;"&gt;MDW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Server as &lt;SPAN style="text-decoration: underline;"&gt;Public IP of the ASA box&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Account as his name &lt;SPAN style="text-decoration: underline;"&gt;Tim.Hopes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Password as &lt;SPAN style="text-decoration: underline;"&gt;***************&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Use Certificate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group Name as &lt;SPAN style="text-decoration: underline;"&gt;mdw&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;secret &lt;SPAN style="text-decoration: underline;"&gt;Missing info&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/SPAN&gt;I am looking for this Information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are currently accessing Juniper box for VPN access. Permanant&amp;nbsp; Employees dont use Cryptocard for secondary authentication, but this user is a contractor.&lt;/P&gt;&lt;P&gt;I am not sure if he is currently using it. That I can check with user on Monday.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2012 17:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956324#M440573</guid>
      <dc:creator>Kesar123456</dc:creator>
      <dc:date>2012-06-23T17:27:03Z</dc:date>
    </item>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956325#M440574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I just got reply from the user, he is not using Cryptocard while connecting to Juniper box.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2012 20:06:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956325#M440574</guid>
      <dc:creator>Kesar123456</dc:creator>
      <dc:date>2012-06-23T20:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956326#M440575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You've said Juniper twice now. Do you mean Cisco ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In mentioning the certificate, I assume you mean the user is accepting the SSL certificate of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you verify that your system has the Anyconnect Mobile license installed? (Please post output of "show version | i AnyConnect".)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2012 21:29:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956326#M440575</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-06-23T21:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956327#M440576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will answer your question one by one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;We are currently using Juniper VPN box.This user is having no problem while connected to it from Mac Laptop.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;We are moving from Juniper to Cisco ASA. Same user is now trying to connect to ASA using his IPAD.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Regarding certificate, I am not sure, he just send me the print screen. If you want I can attach it.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nmtasav001# show version | i AnyConnect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AnyConnect for Cisco VPN Phone : Disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nmtasav001#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 04:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956327#M440576</guid>
      <dc:creator>Kesar123456</dc:creator>
      <dc:date>2012-06-24T04:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956328#M440577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, that makes more sense. You might want to open a TAC case since this is more complex than a simple question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was going to suggest using AnyConnect but it will not work without the license. You do not have Anyconnect for Mobile license installed on your ASA. That is a prerequisite for AnyConnect access from an iOS device. &lt;A href="http://www.cisco.com/en/US/products/ps8411/products_qanda_item09186a00809aec31.shtml" rel="nofollow"&gt;Reference&lt;/A&gt;, excerpted here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;A name="mobilelicence" style="color: #000000; font-size: 11.818181991577148px;"&gt;The Mobile license is a fixed license on top of the existing number of licensed Secure Socket Layer (SSL) users. It can be used either with a Premium SSL VPN license or an AnyConnect Essentials license. To order the AnyConnect Mobile license for an existing unit with an SSL license, the part number is L-ASA-AC-M-55XX= (XX=05,10,20,40,50,80 depending on the model). This Mobile license can also be added as an option for new device purchases (ASA-AC-M-55XX). To order the AnyConnect Mobile license for an existing unit, contact your Cisco reseller. For an evaluation license for devices that have Essentials or Premium licenses, refer to&lt;/A&gt;&lt;A href="https://tools.cisco.com/SWIFT/Licensing/PrivateRegistrationServlet?FormId=717" rel="nofollow" style="color: #003399; font-size: 11.818181991577148px; text-decoration: none;"&gt;Product License Registration for AnyConnect Mobile&lt;/A&gt; (&lt;A href="http://tools.cisco.com/RPF/register/register.do" rel="nofollow" style="color: #003399; font-size: 11px; text-decoration: none;"&gt;registered&lt;/A&gt; customers only) . If you have specific questions on Mobile license requirements, send an e-mail to &lt;A href="mailto:ac-mobile-license-request@cisco.com" style="color: #003399; font-size: 11.818181991577148px; text-decoration: none;"&gt;ac-mobile-license-request@cisco.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 14:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956328#M440577</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-06-24T14:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956329#M440578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I found the same answer in this link.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/partner/products/ps8411/products_qanda_item09186a00809aec31.shtml"&gt;http://www.cisco.com/en/US/partner/products/ps8411/products_qanda_item09186a00809aec31.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question, this license is required for all the user who will be connected to this ASA box or just for this user using IPAD.&lt;/P&gt;&lt;P&gt;After getting this license installed on the ASA, do I need to do some configuration changes and what will be the anwer to my question.................Secret&amp;nbsp; .................for the IPAD user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 16:26:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956329#M440578</guid>
      <dc:creator>Kesar123456</dc:creator>
      <dc:date>2012-06-24T16:26:51Z</dc:date>
    </item>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956330#M440579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you use AnyConnect for a mobile device, it is an alternative to clientless SSL VPN. A single license is required for the ASA to service multiple end users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case, one installs and launches AnyConnect on the mobile device. The userid and password should be all that are required.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Jun 2012 16:58:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956330#M440579</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-06-24T16:58:32Z</dc:date>
    </item>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956331#M440580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Marvin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While checking with my boss, we found that we have already procured the Cisco AnyConnect Mobile license.&lt;/P&gt;&lt;P&gt;But these were never opened or installed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you help me to get it installed or let me know the steps, which I have to follow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Arun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jun 2012 20:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956331#M440580</guid>
      <dc:creator>Kesar123456</dc:creator>
      <dc:date>2012-06-25T20:59:59Z</dc:date>
    </item>
    <item>
      <title>New ASA Device</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956332#M440581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Marvin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even after installing Anyconnect license, it is still prompting for second password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nmtasav001# show version | i AnyConnect&lt;/P&gt;&lt;P&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;/P&gt;&lt;P&gt;AnyConnect for Cisco VPN Phone : Disabled&lt;/P&gt;&lt;P&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jun 2012 20:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-device/m-p/1956332#M440581</guid>
      <dc:creator>Kesar123456</dc:creator>
      <dc:date>2012-06-28T20:27:19Z</dc:date>
    </item>
  </channel>
</rss>

