How to configure a CISCO ASA to support the OS X VPN Client. Ask Question. Then set up your MacOS 'Cisco IPSec' client to use the same shared secret as is found in the 'ikev1 pre-shared-key' line and the group name is the tunnel-group, in this case 'TG_VPN'. Browse other questions tagged vpn mac-osx cisco mac ipsec or ask your own.
Cisco Asdm 7.6 Download
I am also having the same issue. It seems its something with the Java or maybe the cisco built in client on the OS? No matter what I have tried (removed old app and prefs) I still cant get it to work. Well back to the ssh way of configuring the firewalls. Note: Username and IP address were removed. JavaLog Reports: Java Web Start 1.6.0_15 Using JRE version 1.6.0_15-b03-219 Java HotSpot(TM) 64-Bit Server VM User home directory = /Users/REMOVED ---------------------------------------------------- c: clear console window f: finalize objects on finalization queue g: garbage collect h: display this help message m: print memory usage o: trigger logging p: reload proxy configuration q: hide console r: reload policy configuration s: dump system and deployment properties t: dump thread list v: dump thread stack 0-5: set trace level to <n> ---------------------------------------------------- Application Logging Started at Tue Sep 01 01:10:17 EDT 2009 --------------------------------------------- Local Launcher Version = 1.5.41 Local Launcher Version Display = 1.5(41) OK button clicked Trying for ASDM Version file; url = https://xxx.xxx.xxx.xxx/admin/ Server Version = 6.2(1) Server Launcher Version = 1.5.41, size = 476672 bytes invoking SGZ Loader. Cache location = /Users/REMOVED/.asdm/cache Exception in thread 'SGZ Loader: launchSgzApplet' java.lang.NoClassDefFoundError: apple/laf/ScreenMenuBar at java.lang.Class.getDeclaredMethods0(Native Method) at java.lang.Class.privateGetDeclaredMethods(Class.java:2427) at java.lang.Class.getMethod0(Class.java:2670) at java.lang.Class.getMethod(Class.java:1603) at javax.swing.UIDefaults.getUI(UIDefaults.java:748) at javax.swing.UIManager.getUI(UIManager.java:1025) at ca.updateUI(Unknown Source) at javax.swing.JMenuBar.<init>(JMenuBar.java:95) at cc.<init>(Unknown Source) at ca.<init>(Unknown Source) at ca.<init>(Unknown Source) at ca.<init>(Unknown Source) at mj.<init>(Unknown Source) at mi.<init>(mi.java:369) at h7.a(h7.java:310) at h7.<init>(h7.java:259) at com.cisco.pdm.PDMApplet.start(PDMApplet.java:160) at com.cisco.nm.dice.loader.r.run(DashoA19*.:410) Caused by: java.lang.ClassNotFoundException: apple.laf.ScreenMenuBar at com.cisco.nm.dice.loader.l.loadClass(DashoA19*.:246) at java.lang.ClassLoader.loadClass(ClassLoader.java:254) at java.lang.ClassLoader.loadClassInternal(ClassLoader.java:399) .. 18 more Added Java Log
Aug 31, 2009 10:22 PM
Cisco asdm-idm launcher mac download. More Apple Software Update 2.6.0.1. - 84.2MB - Shareware - Apple Software Update is a software tool by Apple that installs the latest version of Apple software. » oracle client 11g release 2 patch set 3 » vkontakte-dj download » gta lisene key » 淫行教师.
The upgrade to Snow Leopard on the Mac has messed up the ability to connect to the ASDM client. My reading suggests this may be related to a java incompatibility -- some people have reported success by manually hacking around with the configuration files and uploading a different version of Java.
Active4 years, 1 month ago
Given that OS X now supports (natively) CISCO IPSec VPN connections I am wondering what the requirements for the VPN configuration are on the remote end?
I have evaluated a number of CISCO devices (in the smaller range, such as the ASA 5505 routers, as well as the RV120W and the WRVS4400N devices) and haven't had a lot of luck getting them to talk to the VPN via the built in Client, however when I use something such as IPSecuritas from Lobotomo I am able to establish a connection without any issues.
So what is the ideal configuration to get this working? I would honestly prefer to not have to install a VPN client on my systems and simply use the built in client.
Since Apple claims that Cisco VPN is natively supported, and it is explained in detail here, my guess would be a VPN configuration issue or mismatch.
It may be a matter of matching the Remote Access VPN setup to the OSX client, instead of the other way around.
adaptradaptr
From my experience, you will have to create a group on the ASA and assign it a password. You then add the user to this group.
In OSX, the account name and password is of the user's. Then under 'Authentication Settings' type in the password (shared secret) for the group you configured on the ASA and type in the name of the group in the 'Group Name' field.
RowellRowell
I've copied and pasted what I hope is the relevant config out of my ASA (5525) where this is working for both AnyConnect and MacOS-native clients. I have expurgated it of localized information, so I may have typoed something along the way. I hope I haven't left anything out. (Look out for ! *** comments.)
The file disk0:/examplevpn.xml contains:
Replace with the external FQDN and IP address of your ASA.
Then set up your MacOS 'Cisco IPSec' client to use the same shared secret as is found in the 'ikev1 pre-shared-key' line and the group name is the tunnel-group, in this case 'TG_VPN'. The username and password are locally defined in the ASA with lines like:
I'm guessing it's using the local accounts as a result of:
But if you can get this working with local users, you can probably work to get auth set up differently if you need.
I will say that I started with an already-working AnyConnect config and then just added these lines:
to get it to work with the MacOS client. (I also had to expand the split tunnel network access list, but I suspect that that was needed for the AnyConnect users, too.)