Setup Cisco RV325 for Cisco Easy VPN client and Shrewsoft VPN client (full VPN)
# Source: https://supportforums.cisco.com/video/12300166/rv320-and-rv325-ipsec-vpn-client-configuration
1) Login to router.
2) Click "VPN".
3) Click "Client to Gateway".
4) Tick "Easy VPN".
5) Set "Tunnel Name" to "fullvpn". This is also your group name.
6) Disable "Minimum Password Complexity".
7) Set "Password" to a desired password (for this documentation, it is "DoNotUseThisExample". PLEASE USE YOUR OWN DIFFERENT PASSWORD!).
8) Set "Interface" to "WAN1". We'll use WAN1 for VPN access here.
9) Make sure "Enable" is ticked.
10) Set "Tunnel Mode" to "Full Tunnel"
11) "IP Address" should be "192.168.1.0". If you use a different value from the default 192.168.1.0, please use it instead.
12) "Subnet Mask" should be "255.255.255.0".
13) "Extended Authentication" should be "Default - Local Database".
14) Click "Save".

Create an user on Cisco RV325 for Cisco Easy VPN
# Source: https://supportforums.cisco.com/video/12300166/rv320-and-rv325-ipsec-vpn-client-configuration
1) Login to router.
2) Click "User Management".
3) Click "Add" under "User Management Table".
4) Give a "Username" and "Password". "Group" should be "Unassigned" and "Domain" should be "Default".

Setup Shrewsoft for full tunnel VPN(Windows 7 to 10 and Fedora 26 GNU/Linux)
1.A) For Windows 7 to 8.1, download Shrewsoft VPN client from https://www.shrew.net/download/vpn (I used version 2.2.2). Install Shrewsoft VPN client. Standard Edition will do. This VPN client was also tested to work with Windows 10. But the test is not exhaustive. Please note that Microsoft Edge does not work with the VPN connection. Firefox and Chrome worked in tests.
1.B) For Fedora 26 GNU/Linux, issue the following commands as root to download and install:
dnf -y install ike
2) Open Shrewsoft VPN client.
3) Click "Add".
4) Under "General", assign the IP address used by WAN1 of the router (for this documentation, the example is "1.2.3.4") to "Host Name or IP Address".
5) Under "General", "Port" should be "500".
6) Under "General", "Auto Configuration" should be "ike config pull".
7) Under "General", "Adaptor Mode" should be "Use a virtual adapter and assigned address".
8) Under "General", "MTU" should be "1380".
9) Under "General", "Obtain "Automatically" should be ticked.
10) Tick "Client" tab. "NAT Traversal" should be "enabled".
11) Under "Client", "NAT Traversal Port" should be "4500".
12) Under "Client", "Keep-alive packet rate" should be "15" seconds.
13) Under "Client", "IKE Fragmentation" should be "enable".
14) Under "Client", "Maximum packet size" should be "540" Bytes.
15) Under "Client", "Enable Dead Peer Detection" should be ticked.
16) Under "Client", "Enable ISAKMP Failure Notifications" should be ticked.
17) Under "Client", "Enable Client Login Banner" should be ticked.
18) Click "Name Resolution" tab. Make sure "Enable DNS" and the 2 "Obtain Automatically" checkboxes are ticked.
19) This is for Windows only: Under "Name Resolution", click "WINS" tab. Make sure the "Enable WINS" and "Obtain Automatically" checkboxes are ticked.
20) Click "Authentication" tab. Set "Authentication Method" to "Mutual PSK + XAuth".
21) Under "Local Identity", choose "Key Identifier" for "Identification Type".
22) Set "Key ID String" to "fullvpn".
23) Click "Remote Identity". Make sure "Identification Type" is "Any".
24) Click "Credentials". Set "Pre Shared Key" to the password you set in "Setup Cisco RV325 for Cisco Easy VPN client and Shrewsoft VPN client (full VPN)" above(in this documentation, the example is "DoNotUseThisExample").
25) Click "Phase 1". "Exchange Type" should be "aggressive".
26) "DH Exchange" should be "group 2"
27) "Cipher Algorithm" should be "auto".
28) Keep default of "Cipher Key Length".
29) "Hash Algorithm" should be "auto".
30) "Key Life Time limit" should be "86400" seconds.
31) "Key Life Data limit" should be "0" Kbytes.
32) "Enable Check Point Compatible Vendor ID" should be unticked.
33) Click "Phase 2". "Transform Algorithm" should be "auto".
34) Keep default of "Transform Key Length".
35) "HMAC Algorithm" should be "auto".
36) "PFS Exchange" should be "disabled".
37) "Compress Algorithm" should be "disabled".
38) "Key Life Time limit" should be "3600" seconds.
39) "Key Life Data limit" should be "0" Kbytes.
40) Click "Policy". "Policy Generation Level" should be "auto".
41) "Maintain Persistent Security Associations" should be unticked.
42) "Obtain Topology Automatically or Tunnel All" should be ticked.
43) There should be nothing in "Remote Network Resource".
44) Click "Save".
45) In Fedora 26, execute this as root: /usr/sbin/iked # You'll need to do this everytime you boot and need to use Shrew Soft VPN client.
46) Double click the new entry.
47) Enter an username and password you've entered under "User Management" in the Cisco RV325 (eg: the one you made in "Create an user on Cisco RV325 for Cisco Easy VPN" above).

Setup MacOS for full tunnel VPN
1) Go to "System Preferrences", and then click the "Network" icon.
2) Click the "+" symbol in the lower left of the "Network" window.
3) In the "Interface" drop-down, choose "VPN".
4) In the "VPN Type" drop-down, choose "Cisco IPSec".
5) Set "Service Name" to "fullvpn".
6) Click "Create".
7) Set "Server Address" to the IP address used by WAN1 of the router (for this documentation, the example is "1.2.3.4").
8) Set "Account Name" to the VPN username/account you've entered under "User Management" in the Cisco RV325 (eg: the one you made in "Create an user on Cisco RV325 for Cisco Easy VPN" above).
9) Keep the "Password" field blank.
10) Click "Authentication Settings".
11) Set "Shared Secret" to the password you set in "Setup Cisco RV325 for Cisco Easy VPN client and Shrewsoft VPN client (full VPN)" above(in this documentation, the example is "DoNotUseThisExample").
12) Set "Group Name" to "fullvpn".
13) Click "OK".
14) Click "Apply".
15) With "fullvpn" selected in the left sidebar of the "Network" window, click the "Connect" button.
16) Supply the VPN password you've entered under "User Management" in the Cisco RV325 (eg: the one you made in "Create an user on Cisco RV325 for Cisco Easy VPN" above).
17) You should be connected soon.

Setup IOS for full tunnel VPN
1) In your IOS device, go to "Settings -> General -> VPN -> Add VPN configuration".
2) Set "Type" to "IPSec".
3) Set "Description" to "fullvpn".
4) Change "Server" to the IP address used by WAN1 of the router (for this documentation, the example is "1.2.3.4").
5) Set "Account" to the VPN username/account you've entered under "User Management" in the Cisco RV325 (eg: the one you made in "Create an user on Cisco RV325 for Cisco Easy VPN" above).
6) Keep the default "Password" setting to "Ask Every Time".
7) Set "Group Name" to "fullvpn".
8) Set "Secret" to the password you set in "Setup Cisco RV325 for Cisco Easy VPN client and Shrewsoft VPN client (full VPN)" above(in this documentation, the example is "DoNotUseThisExample").
9) Click "Done".
10) You may now toggle "Status" from "Not connected" to "Connecting".
11) Supply the VPN password you've entered under "User Management" in the Cisco RV325 (eg: the one you made in "Create an user on Cisco RV325 for Cisco Easy VPN" above).
12) You should be connected soon.