Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

easy vpn SUA

I have been unable to make SUA work with easy VPN. I have an asa 5505 (client) and an asa 5520 (Server).

When the config is like this:

5505:

vpnclient server 192.168.1.0
vpnclient mode network-extension-mode
vpnclient nem-st-autoconnect
vpnclient vpngroup IPsec password xxxxxxx
vpnclient username domain\user password xxxxxxxx
vpnclient enable

5520:

tunnel-group IPsec type remote-access
tunnel-group IPsec general-attributes
address-pool EasyVpnPool
authentication-server-group radius
default-group-policy IPsec
tunnel-group IPsec ipsec-attributes
pre-shared-key *****

group-policy IPsec attributes
dns-server value 10.1.102.11 10.1.102.12
vpn-tunnel-protocol IPSec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Global
default-domain value mine.com
split-dns value mine.com yours.com
ip-phone-bypass enable
nem enable

If I add "secure-unit-authentication enable" to the 5520 group policy nothing works the 5505 does not connect up and no http redirect takes place.
If I do a "vpnclient enable" I am propted for a username ans password but it does not take any thing. Allso the iphone bypass does not work.

Any Ideas? I am stumpped.

Thanks,
Ben


Everyone's tags (2)
487
Views
0
Helpful
0
Replies