<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EasyVPN setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/easyvpn-setup/m-p/1180289#M835251</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply.  I've been using this guide but keep getting prompted at the CLI for a username and password.  I was hoping that the pre-shared key would handle all authentication and avoid username/password authentication (the physician will not know how to get into the router or navigate the CLI).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 May 2009 16:38:23 GMT</pubDate>
    <dc:creator>RYAN PAUL</dc:creator>
    <dc:date>2009-05-29T16:38:23Z</dc:date>
    <item>
      <title>EasyVPN setup</title>
      <link>https://community.cisco.com/t5/network-security/easyvpn-setup/m-p/1180287#M835249</link>
      <description>&lt;P&gt;I have never setup EasyVPN before.  I want to setup a remote user with a 871 router and connect back to an ASA5510 running the 8.0(4) code.  Can this be setup to only use pre-shared keys for authentication?  The user (physician) does not want any interaction when attempting to access an internal resource (outside of the username/password combo for the applications she runs)?  I followed the ASA to 871 EasyVPN setup/config example on the site but get stuck with user authentication on the router CLI.  Can anyone provide assistance/sample configs?  I want to use AES-256 encryption...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ryan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:37:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easyvpn-setup/m-p/1180287#M835249</guid>
      <dc:creator>RYAN PAUL</dc:creator>
      <dc:date>2019-03-11T15:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: EasyVPN setup</title>
      <link>https://community.cisco.com/t5/network-security/easyvpn-setup/m-p/1180288#M835250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's the config docs. I'll throw my warning out there. I have a 5520 here at the office, and I have a 5505 at the house. I run an 871 at the house, and I could NEVER get my 871 to connect to my 5520 at the office. I COULD connect my 871 to my 5505 with no problems. I believe it had something to do with "crypto isakmp identity" on our 5520, but I couldn't change it because we have multiple public IPs from different providers coming in. Ours was set to hostname. When I set mine up at the house with hostname, I could no longer connect, so crypto isakmp identity addres (I believe it's default) is the way to go it seems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the config guide:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a0080809222.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a0080809222.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 May 2009 15:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easyvpn-setup/m-p/1180288#M835250</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2009-05-29T15:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: EasyVPN setup</title>
      <link>https://community.cisco.com/t5/network-security/easyvpn-setup/m-p/1180289#M835251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply.  I've been using this guide but keep getting prompted at the CLI for a username and password.  I was hoping that the pre-shared key would handle all authentication and avoid username/password authentication (the physician will not know how to get into the router or navigate the CLI).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 May 2009 16:38:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easyvpn-setup/m-p/1180289#M835251</guid>
      <dc:creator>RYAN PAUL</dc:creator>
      <dc:date>2009-05-29T16:38:23Z</dc:date>
    </item>
  </channel>
</rss>

