<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.shrew.net/support/index.php?action=history&amp;feed=atom&amp;title=Howto_Cisco_Asa</id>
	<title>Howto Cisco Asa - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.shrew.net/support/index.php?action=history&amp;feed=atom&amp;title=Howto_Cisco_Asa"/>
	<link rel="alternate" type="text/html" href="https://www.shrew.net/support/index.php?title=Howto_Cisco_Asa&amp;action=history"/>
	<updated>2026-04-30T09:54:56Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.34.1</generator>
	<entry>
		<id>https://www.shrew.net/support/index.php?title=Howto_Cisco_Asa&amp;diff=339&amp;oldid=prev</id>
		<title>Admin: /* Resources */</title>
		<link rel="alternate" type="text/html" href="https://www.shrew.net/support/index.php?title=Howto_Cisco_Asa&amp;diff=339&amp;oldid=prev"/>
		<updated>2013-01-09T04:54:52Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Resources&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 04:54, 9 January 2013&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l149&quot; &gt;Line 149:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 149:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Resources ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Resources ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Media:Ciscoasa.cfg.txt]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Media:Ciscoasa.cfg.txt]] &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;br/&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Media:Ciscoasa.vpn.txt]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Media:Ciscoasa.vpn.txt]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki?hprd-mediawiki-:diff::1.12:old-338:rev-339 --&gt;
&lt;/table&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
	<entry>
		<id>https://www.shrew.net/support/index.php?title=Howto_Cisco_Asa&amp;diff=338&amp;oldid=prev</id>
		<title>Admin: /* Resources */</title>
		<link rel="alternate" type="text/html" href="https://www.shrew.net/support/index.php?title=Howto_Cisco_Asa&amp;diff=338&amp;oldid=prev"/>
		<updated>2013-01-09T04:54:37Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Resources&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 04:54, 9 January 2013&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l149&quot; &gt;Line 149:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 149:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Resources ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Resources ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;http&lt;/del&gt;:&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;//www&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;shrew.net/static/howto/CiscoAsa/ciscoasa&lt;/del&gt;.txt &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Example ASA configuration&lt;/del&gt;]&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[Media&lt;/ins&gt;:&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ciscoasa&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;cfg&lt;/ins&gt;.txt&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;http&lt;/del&gt;:&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;//www&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;shrew&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;net/static/howto/CiscoAsa/ciscoasa.vpn Example Client configuration&lt;/del&gt;]&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[Media&lt;/ins&gt;:&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ciscoasa&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;vpn&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;txt]&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki?hprd-mediawiki-:diff::1.12:old-131:rev-338 --&gt;
&lt;/table&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
	<entry>
		<id>https://www.shrew.net/support/index.php?title=Howto_Cisco_Asa&amp;diff=131&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;== Introduction ==  This guide provides information that can be used to configure a Cisco PIX/ASA device running firmware version 7.x to support IPsec VPN client connectivity....&quot;</title>
		<link rel="alternate" type="text/html" href="https://www.shrew.net/support/index.php?title=Howto_Cisco_Asa&amp;diff=131&amp;oldid=prev"/>
		<updated>2012-09-03T19:40:32Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Introduction ==  This guide provides information that can be used to configure a Cisco PIX/ASA device running firmware version 7.x to support IPsec VPN client connectivity....&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This guide provides information that can be used to configure a Cisco PIX/ASA device running firmware version 7.x to support IPsec VPN client connectivity. If you have a PIX device running firmware version 6.x, please consult the HowtoCiscoPix. The Shrew Soft VPN Client has been tested with Cisco products to ensure interoperability.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
The configuration example described below will allow an IPsec VPN client to communicate with a single remote private network. The client uses the pull configuration method to acquire the following parameters automatically from the gateway.&lt;br /&gt;
&lt;br /&gt;
* IP Address&lt;br /&gt;
* IP Netmask&lt;br /&gt;
* DNS Servers&lt;br /&gt;
* DNS Default Domain Suffix&lt;br /&gt;
* DNS Split Network Domain List&lt;br /&gt;
* WINS Servers&lt;br /&gt;
* PFS Group&lt;br /&gt;
* Remote Network Topology&lt;br /&gt;
* Login Banner&lt;br /&gt;
&lt;br /&gt;
== Gateway Configuration ==&lt;br /&gt;
&lt;br /&gt;
This example assumes you have knowledge of the Cisco ASA gateway command line configuration interface. For more information, please consult your Cisco product documentation.&lt;br /&gt;
&lt;br /&gt;
=== Interfaces ===&lt;br /&gt;
&lt;br /&gt;
Two network interfaces are configured. The &amp;#039;&amp;#039;outside&amp;#039;&amp;#039; interface has a static public IP address of 1.1.1.20 which faces the internet. The &amp;#039;&amp;#039;inside&amp;#039;&amp;#039; interface has a static private IP address that faces the internal private network. The default gateway is configured as 1.1.1.3 via the outside interface.&lt;br /&gt;
&lt;br /&gt;
 interface Vlan1&lt;br /&gt;
  nameif inside&lt;br /&gt;
  security-level 100&lt;br /&gt;
  ip address 10.1.2.20 255.255.255.0&lt;br /&gt;
 !&lt;br /&gt;
 interface Vlan2&lt;br /&gt;
  nameif outside&lt;br /&gt;
  security-level 0&lt;br /&gt;
  ip address 10.1.1.20 255.255.255.0&lt;br /&gt;
 !&lt;br /&gt;
 interface Ethernet0/0&lt;br /&gt;
  switchport access vlan 2&lt;br /&gt;
 !&lt;br /&gt;
&lt;br /&gt;
=== Access List ===&lt;br /&gt;
&lt;br /&gt;
An access lists must be configured to define the IPSec policies. This is expressed with the source matching the local private network(s) and the destination matching any as the VPN client address will be assigned by the gateway.&lt;br /&gt;
&lt;br /&gt;
 object-group network group-inside-vpnclient&lt;br /&gt;
  description All inside accessible networks&lt;br /&gt;
  network-object 10.1.2.0 255.255.255.0&lt;br /&gt;
&lt;br /&gt;
 access-list acl-vpnclient extended permit ip object-group group-inside-vpnclient any&lt;br /&gt;
&lt;br /&gt;
=== Address Pool ===&lt;br /&gt;
&lt;br /&gt;
The IP address pool must be configured. Clients will be assigned private network addresses from a pool of 10.2.20.1-10.2.20.126.&lt;br /&gt;
&lt;br /&gt;
 ip local pool ippool-vpnclient 10.2.20.1-10.2.20.126 mask 255.255.255.0&lt;br /&gt;
&lt;br /&gt;
=== User Authentication ===&lt;br /&gt;
&lt;br /&gt;
User authentication must be configured to support IKE extended authentication ( XAuth ). In this example, we use define user accounts locally on the ASA. It is possible to pass this authentication to a radius or an LDAP account server using the Cisco AAA authentication mechanism. For more information, please consult your cisco product documentation.&lt;br /&gt;
&lt;br /&gt;
 aaa authentication ssh console LOCAL&lt;br /&gt;
 username bill password XXX encrypted&lt;br /&gt;
 username bob password XXX encrypted&lt;br /&gt;
&lt;br /&gt;
=== IPsec Parameters ===&lt;br /&gt;
&lt;br /&gt;
A transform set and dynamic IPsec crypto map must be configured to support client VPN connections. The dynamic crypto map is then assigned to a standard crypto map and bound to the outside ( public ) interface.&lt;br /&gt;
&lt;br /&gt;
 crypto ipsec transform-set xform-3des-md5 esp-3des esp-md5-hmac&lt;br /&gt;
 crypto dynamic-map dcmap-vpnclient 1 set transform-set xform-3des-md5&lt;br /&gt;
 crypto map cmap-vpncient 65535 ipsec-isakmp dynamic dcmap-vpnclient&lt;br /&gt;
 crypto map cmap-vpncient interface outside&lt;br /&gt;
&lt;br /&gt;
=== ISAKMP Parameters ===&lt;br /&gt;
&lt;br /&gt;
The ISAKMP protocol must be enabled on the outside ( public ) interface and an ISAKMP policy must be configured. NAT Traversal is also enabled to allow clients to communicate effectively when their peer address is being translated. The keep alive packet rate is set to 20 seconds.&lt;br /&gt;
&lt;br /&gt;
 crypto isakmp enable outside&lt;br /&gt;
 crypto isakmp identity address&lt;br /&gt;
 crypto isakmp nat-traversal 20&lt;br /&gt;
 crypto isakmp policy 1&lt;br /&gt;
  authentication pre-share&lt;br /&gt;
  encryption 3des&lt;br /&gt;
  hash md5&lt;br /&gt;
  group 2&lt;br /&gt;
  lifetime 86400&lt;br /&gt;
&lt;br /&gt;
=== Group Policy ===&lt;br /&gt;
&lt;br /&gt;
A group policy must be configured to provide the client with dynamic configuration information.&lt;br /&gt;
&lt;br /&gt;
 group-policy group-policy-default internal&lt;br /&gt;
 group-policy group-policy-default attributes&lt;br /&gt;
  banner value Welcome to the shrew.net ciscoasa&lt;br /&gt;
  wins-server value 10.1.2.100 10.1.2.1&lt;br /&gt;
  dns-server value 10.1.2.100 10.1.2.1&lt;br /&gt;
  vpn-tunnel-protocol IPSec&lt;br /&gt;
  password-storage disable&lt;br /&gt;
  re-xauth disable&lt;br /&gt;
  pfs disable&lt;br /&gt;
  split-tunnel-policy tunnelspecified&lt;br /&gt;
  split-tunnel-network-list value acl-vpnclient&lt;br /&gt;
  default-domain value shrew.net&lt;br /&gt;
  split-dns value shrew.net example.com&lt;br /&gt;
&lt;br /&gt;
=== Tunnel Group ===&lt;br /&gt;
&lt;br /&gt;
A tunnel group must be configured to define the VPN Client tunnel parameters. It is created using the type ipsec-ra for IPsec remote access. The client uses the tunnel group name as its FQDN identity value and the tunnel group pre-shared-key as its pre-shared key value.&lt;br /&gt;
&lt;br /&gt;
 tunnel-group vpnclient type ipsec-ra&lt;br /&gt;
 tunnel-group vpnclient general-attributes&lt;br /&gt;
  address-pool ippool-vpnclient&lt;br /&gt;
  default-group-policy group-policy-default&lt;br /&gt;
 tunnel-group vpnclient ipsec-attributes&lt;br /&gt;
  pre-shared-key mypresharedkey&lt;br /&gt;
&lt;br /&gt;
== Client Configuration ==&lt;br /&gt;
&lt;br /&gt;
The client configuration in this example is straight forward. Open the Access Manager application and create a new site configuration. Configure the settings listed below in the following tabs.&lt;br /&gt;
&lt;br /&gt;
=== General Tab ===&lt;br /&gt;
&lt;br /&gt;
The Remote Host section must be configured. The &amp;#039;&amp;#039;Host Name or IP Address&amp;#039;&amp;#039; is defined as &amp;#039;&amp;#039;&amp;#039;10.1.1.20&amp;#039;&amp;#039;&amp;#039; to match the ASA outside ( public ) interface address. The &amp;#039;&amp;#039;Auto Configuration&amp;#039;&amp;#039; mode should be set to &amp;#039;&amp;#039;ike config pull&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
=== Phase 1 Tab ===&lt;br /&gt;
&lt;br /&gt;
The Proposal section must be configured. The &amp;#039;&amp;#039;Exchange Type&amp;#039;&amp;#039; is set to &amp;#039;&amp;#039;aggressive&amp;#039;&amp;#039; and the &amp;#039;&amp;#039;DH Exchange&amp;#039;&amp;#039; is set to &amp;#039;&amp;#039;group 2&amp;#039;&amp;#039; to match the ASA ISAKMP policy definition.&lt;br /&gt;
&lt;br /&gt;
=== Authentication Tab ===&lt;br /&gt;
&lt;br /&gt;
The client authentication settings must be configured. The Authentication Method is defined as &amp;#039;&amp;#039;Mutual PSK + XAuth&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
==== Local Identity Tab ====&lt;br /&gt;
&lt;br /&gt;
The Local Identity parameters are defined as &amp;#039;&amp;#039;Fully Qualified Domain Name&amp;#039;&amp;#039; with a &amp;#039;&amp;#039;FQDN String&amp;#039;&amp;#039; of &amp;quot;vpnclient&amp;quot; to match the ASA tunnel group name.&lt;br /&gt;
&lt;br /&gt;
==== Remote Identity Tab ====&lt;br /&gt;
&lt;br /&gt;
The Remote Identity parameters are set to &amp;#039;&amp;#039;IP Address&amp;#039;&amp;#039; with the &amp;#039;&amp;#039;Use a discovered remote host address&amp;#039;&amp;#039; option checked to match the ASA ISAKMP &amp;#039;&amp;#039;identity&amp;#039;&amp;#039; parameter.&lt;br /&gt;
&lt;br /&gt;
==== Credentials Tab ====&lt;br /&gt;
&lt;br /&gt;
The Credentials &amp;#039;&amp;#039;Pre Shared Key&amp;#039;&amp;#039; is defined as &amp;quot;mypresharedkey&amp;quot; to match the ASA tunnel group pre-shared-key.&lt;br /&gt;
&lt;br /&gt;
== Known Issues ==&lt;br /&gt;
&lt;br /&gt;
Cisco gateways support a proprietary form of hybrid authentication which does not conform to RFC draft standards. At this time the Shrew Soft VPN Client does not support this authentication mode. We hope to add support for this in the future.&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
&lt;br /&gt;
[http://www.shrew.net/static/howto/CiscoAsa/ciscoasa.txt Example ASA configuration]&lt;br /&gt;
[http://www.shrew.net/static/howto/CiscoAsa/ciscoasa.vpn Example Client configuration]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>