<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA easy VPN server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-easy-vpn-server/m-p/1209067#M835075</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to add following command to tunnel-group ipsec-attributes:&lt;/P&gt;&lt;P&gt;isakmp ikev1-user-authentication none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I should warn you - this practice is too insecure. Because in IKE's Aggressive mode group name and other attributes go in clear text.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With best regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Jun 2009 04:26:34 GMT</pubDate>
    <dc:creator>Maxim Zimovets</dc:creator>
    <dc:date>2009-06-04T04:26:34Z</dc:date>
    <item>
      <title>ASA easy VPN server</title>
      <link>https://community.cisco.com/t5/network-security/asa-easy-vpn-server/m-p/1209066#M835074</link>
      <description>&lt;P&gt;Hi All, &lt;/P&gt;&lt;P&gt;I've setup ASA as easy VPN server. I don't want user authentication, which means when I run VPN client, I want to connect directly without to ask me username and password. I know we can do this in router, but I couldn't figure out in ASA. &lt;/P&gt;&lt;P&gt;any suggestion would be very appreciated. &lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:39:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-easy-vpn-server/m-p/1209066#M835074</guid>
      <dc:creator>alex goshtaei</dc:creator>
      <dc:date>2019-03-11T15:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA easy VPN server</title>
      <link>https://community.cisco.com/t5/network-security/asa-easy-vpn-server/m-p/1209067#M835075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to add following command to tunnel-group ipsec-attributes:&lt;/P&gt;&lt;P&gt;isakmp ikev1-user-authentication none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I should warn you - this practice is too insecure. Because in IKE's Aggressive mode group name and other attributes go in clear text.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With best regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jun 2009 04:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-easy-vpn-server/m-p/1209067#M835075</guid>
      <dc:creator>Maxim Zimovets</dc:creator>
      <dc:date>2009-06-04T04:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA easy VPN server</title>
      <link>https://community.cisco.com/t5/network-security/asa-easy-vpn-server/m-p/1209068#M835076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;also, when someone leaves the company who has either the pcf file or knows the groupname and password, everything is compromised.  you should consider the security concerns inherent with not using xauth in this situation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jun 2009 18:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-easy-vpn-server/m-p/1209068#M835076</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2009-06-05T18:30:33Z</dc:date>
    </item>
  </channel>
</rss>

