CHAPT ER
71-1
Cisco ASA 5500 Series Configuration Guide using the CLI
71
Configuring Easy VPN Services on the ASA 5505
This chapter describes how to configure the ASA 5505 as an Easy VPN hardware client. This chapter
assumes you have configured the switch ports and VLAN interfaces of the ASA 5505 (see Chapter7,
“Starting Interface Configuration (ASA 5505)”).
Note The Easy VPN hardware client configuration specifies the IP address of its primary and secondary
(backup) Easy VPN servers. Any ASA, including another ASA 5505 configured as a headend, a VPN
3000 Series Concentrator, an IOS-based router, or a firewall can act as an Easy VPN server. An ASA
5505 cannot, however function as both a client and a server simultaneously. To configure an ASA 5505
as a server, see the “Specifying the Client/Server Role of the Cisco ASA 5505” section on page71-1.
Then configure the ASA 5505 as you would any other ASA, beginning with the “Getting Started” section
on page 2-1 of this guide.
This chapter includes the following sections:
Specifying the Client/Server Role of the Cisco ASA 5505, page71-1
Specifying the Primary and Secondary Servers, page71-2
Specifying the Mode, page71-3
Configuring Automatic Xauth Authentication, page71-4
Configuring IPsec Over TCP, page71-4
Comparing Tunneling Options, page71-5
Specifying the Tunnel Group or Trustpoint, page71-6
Configuring Split Tunneling, page71-8
Configuring Device Pass-Through, page71-8
Configuring Remote Management, page71-9
Guidelines for Configuring the Easy VPN Server, page71-10

Specifying the Client/Server Role of the Cisco ASA 5505

The Cisco ASA 5505 can function as a Cisco Easy VPN hardware client (also called “Easy VPN
Remote”) or as a server (also called a “headend”), but not both at the same time. It does not have a default
role. Use one of the following commands in global configuration mode to specify its role:
vpnclient enable to specify the role of the ASA 5505 as an Easy VPN Remote