![cisco 5505 asa end of life cisco 5505 asa end of life](https://worldwidesupply.net/content/uploads/2015/04/cisco_asa.jpg)
Click Next once you have selected these options from their subsequent drop-down menus. The MX requires the 3rd party VPN peer to have 3DES selected for the encryption algorithm, SHA1 has the authentication algorithm, and number 2 specified for the Diffie-Hellman group. The third screen asks you to specify the encryption and hashing algorithms used by the Phase 1 IKE policy. The Tunnel Group Name will be automatically filled in for you based upon the peer IP address. Select the radio button for 'Pre-shared key' under Authentication Method and exactly as it appears on the MX under Security & SD-WAN > Configure > Site-to-site VPN > Organization-wide settings > Non-Meraki VPN peers > Preshared secret. Therefore if you have the primary uplink configured as WAN 1 then you must use WAN 1's Public IP address. Please note that this must be the IP address of the primary interface specified on the MX under Security & SD-WAN > Monitor > Appliance status > Uplink > Configuration > General. On the second screen, you need to enter the public IP address of the MX security appliance in the text box labeled Peer IP address.
![cisco 5505 asa end of life cisco 5505 asa end of life](https://www.neumatic.com/wp-content/uploads/2016/06/cisco_5506_Slider.jpg)
Select Site-to-Site and leave the VPN tunnel interface as outside then click the 'Next' button. On the first screen, you will be prompted to select the type of VPN. The easiest way to configure the VPN tunnel is by logging onto your Cisco ASA via the ASDM GUI and utilizing the IPsec Wizard found under Wizards > IPsec VPN Wizard. Note: The following screenshots should be used as a guide as your wizard may vary depending on the version of ASDM which is being used.