
I'd like to indulge the Cisco gurus on this list. I am configuring the $subject on ASA5505 using ASDM . When I click finish to commit my actions, I end up with one WARNING as shown below: [OK] access-list ROADWARRIORS_splitTunnelAcl standard permit any [OK] access-list inside_nat0_outbound line 2 extended permit ip 0.0.0.0 0.0.0.0 192.168.31.0 255.255.255.224 [OK] username test password ScEIFvbu66G9uC.V encrypted privilege 0 [OK] username test attributes username test attributes [WARNING] vpn-group-policy ROADWARRIORS group-policy <ROADWARRIORS> does not exist [OK] ip local pool REMOTECLIENTPOOL 192.168.31.11-192.168.31.20 mask 255.255.255.0 [OK] group-policy ROADWARRIORS internal [OK] group-policy ROADWARRIORS attributes group-policy ROADWARRIORS attributes [OK] vpn-tunnel-protocol IPSec [OK] split-tunnel-policy tunnelspecified [OK] split-tunnel-network-list value ROADWARRIORS_splitTunnelAcl [OK] dns-server value 192.168.30.1 [OK] default-domain value testdomain.local [OK] configure terminal [OK] tunnel-group ROADWARRIORS type ipsec-ra [OK] tunnel-group ROADWARRIORS general-attributes tunnel-group ROADWARRIORS general-attributes [OK] default-group-policy ROADWARRIORS [OK] address-pool REMOTECLIENTPOOL [OK] tunnel-group ROADWARRIORS ipsec-attributes tunnel-group ROADWARRIORS ipsec-attributes [OK] pre-shared-key V3r1sEkRiTT!! [OK] crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac [OK] crypto dynamic-map outside_dyn_map 20 set pfs group2 [OK] crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA 1. What could be the possible cause of this problem? I am following the Cisco guide at http://lix.in/-974bf1. 2. Anyone willing to share with me the "relevant" VPN Client, with support for x86/x64?:) Thank you. -- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!