05-20-2009 07:58 AM
Hi All,
we are currently looking onto a remote access VPN Solution for users to Log into different VPN VRFs based on their credentials.
Is AnyConnect going to replace (eventually) the EasyVPN. I.e. I read that x64 Users should migrate to AnyConnect.
05-20-2009 10:20 AM
Pavlos
I believe that it is quite clear that AnyConnect will become the VPN client of choice. Going forward the development work will be on AnyConnect and the traditional client will receive only problem fixes but not enhanced functionality. And for 64 bit users AnyConnect is the only choice since the traditional client does not have support for 64 bit.
HTH
Rick
05-23-2009 07:00 AM
That's what I also though. Thing is that AnyConnect is currently supported on ASA only?
What if you want to support it on 7600 or ASR Routers for a Service Provider and add vrf-aware features?
05-26-2009 11:46 PM
hello!
I have configured routers: 2811 and 1841 for anyconnect support and its simple and works fine! even on hosts with Windows 7 :)
06-07-2009 03:02 PM
Hello, we are a group of purdue students that are doing a success case analysis over cisco as a company. We would really appreciate it if you take a few mintues to answer a couple of questions.
-Are you satisfied with the services provided with this company?
-What do you like/dislike the most about cisco?
04-19-2013 12:00 PM
Hi
I'll be very thankful if anyone can put a sample configuration of Anyconnect on Cisco router
Sent from Cisco Technical Support iPhone App
04-22-2013 04:58 AM
My AnyConnect VPN users are authenticated from RADIUS server - you can use LOCAL users from router instead:
aaa authentication login ciscocp_vpn_xauth_ml_1 group radius
aaa authorization network ciscocp_vpn_xauth_ml_1 group radius
Pool for remote users:
ip local pool SSL 192.168.0.220 192.168.0.240
webvpn gateway gateway_1
ip address your.external.IP port 443
http-redirect port 80
ssl trustpoint TP-self-signed-2125266201
inservice
!
webvpn context CTSSL
secondary-color white
title-color #CCCC66
text-color black
!
policy group policy_1
functions svc-enabled
svc address-pool "SSL" netmask 255.255.255.0
svc default-domain "domain.com"
svc keep-client-installed
svc split dns "domain.com"
svc split include your.local.LAN 255.255.255.0
svc dns-server primary 10.0.0.2
citrix enabled
default-group-policy policy_1
aaa authentication list ciscocp_vpn_xauth_ml_1
gateway gateway_1
!
ssl encryption rc4-md5
ssl authenticate verify all
inservice
howto generate/regenerate SSL certificate:
http://fengnet.com/book/vpnconf/ch18lev1sec4.html
cheers!
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: