3002 vs 800 router

Hello

Why do I buy a double as Dear customer Hardware 3002 instead of a router 800?

Kind regards

Rutgrt

No reason really to get a.

What you can do with a 3002 hardware client is basically push the BONE for her to the central site, if your central site is running a hub of 3000.

Manage the centralized configuration is better on a 3002.

And these two "advantages" are really useful if you use a concentrator 3000 series on your central site.

The 3002 is also certain amount of firewalls on its WAN. You can make IOS Firewall on 800 routers too using an IOS image.

So, if you have no particular reason to just get the 800 router.

Tags: Cisco Security

Similar Questions

  • a way vpn with asa to the 800 router

    people

    I have a site to site vpn set up between a asa 5540 and a 800 router

    I want only the vpn to be initiated from the asa with the 800 remote listen incoming connections

    I know that I can define the type of connection on the asa as only come but I can find an equivalent command to answer only for the 800 remote

    can anyone point me in the right direction or is it enough to simply configure the asa as are created only for this encryption card

    Thanks to anyone who takes the time to answer

    Hello

    I recommend you configure the tunnel as a dynamic to static tunnel VPN, the ASA will be the static counterpart, so it will be the initiator and the router will never be able to establish the connection.

    The ASA will be a common L2L configuration, but the router will use a dynamic encryption card.

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a008051a69a.shtml

    The PIX in the example is old, then you can simply adjust the controls to your current version, the important thing is to understand the concept.

    Please let me know if that answers your question,

    Thank you.

  • 800 series Router and ASA will not create a tunnel

    Hey everybody, what had confused me for a week now, and I feel that it is something small that im overlooking. My 800 router and my ASA will not pass traffic through a VPN. Here are my configs (less sensitive data of course). I also removed irrelevant data to narrow down the config.

    800 series router:

    DHCP excluded-address 192.168.2.1 IP 192.168.2.100

    !

    IP dhcp pool internaldhcp

    network 192.168.2.0 255.255.255.0

    x.x.x.x where x.x.x.x DNS server

    default router 192.168.2.1

    !

    !

    IP cef

    no ip domain search

    domain IP (domain here)

    Server name x.x.x.x IP

    Server name x.x.x.x IP

    No ipv6 cef

    !

    !

    crypto ISAKMP policy 1

    BA 3des

    md5 hash

    preshared authentication

    Group 2

    address key (password) crypto isakmp (ip WAN of ASA)

    !

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac 3des-sha

    Crypto ipsec transform-set esp-3des esp-md5-hmac 3des-md5

    Crypto ipsec transform-set esp-3des esp-md5-hmac distance

    !

    !

    map KentonMap 1 ipsec-isakmp crypto

    defined peer (ASAs WAN IP)

    the value of the transform-set 3des-sha

    match address 110

    !

    !

    !

    !

    !

    interface FastEthernet0

    no ip address

    !

    interface FastEthernet1

    no ip address

    !

    interface FastEthernet2

    no ip address

    !

    interface FastEthernet3

    no ip address

    !

    interface FastEthernet4

    Description outside the int

    (Local WAN) 255.255.255.252 IP address

    NAT outside IP

    IP virtual-reassembly in

    automatic duplex

    automatic speed

    card crypto KentonMap

    service-policy output VoiceLLQ

    !

    interface Vlan1

    IP 192.168.2.1 255.255.255.0

    IP nat inside

    IP virtual-reassembly in

    Fair/fair-queue

    !

    !

    IP nat pool insidepool (WAN IP) (WAN IP) netmask 255.255.255.252

    IP nat inside source list 100 insidepool pool overload

    IP route 0.0.0.0 0.0.0.0 (Next Hop)

    !

    access-list 100 permit ip 192.168.2.0 0.0.0.255 any

    Note access-list 110 VPN ACL

    access-list 110 permit ip 192.168.2.0 0.0.0.255 192.168.24.0 0.0.0.255

    !

    The ASA config:

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    interface Vlan1

    nameif inside

    security-level 100

    IP 192.168.24.1 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    (LOCAL WAN) 255.255.255.252 IP address

    !

    permit same-security-traffic intra-interface

    IP 192.168.24.0 allow Access - list extended sheep 255.255.255.0 192.168.2.0 255.255.255.0

    Access extensive list ip 192.168.24.0 LimatoKenton allow 255.255.255.0 192.168.2.0 255.255.255.0

    OutsideIn list extended access permit tcp any interface outside eq 3389

    Global 1 interface (outside)

    NAT (inside) 0 access-list sheep

    NAT (inside) 1 192.168.24.0 255.255.255.0

    Route outside 0.0.0.0 0.0.0.0 (Next Hop) 1

    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    Crypto ipsec transform-set esp-3des esp-sha-hmac 3des-sha

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    card crypto LimaMap 1 corresponds to the address LimatoKenton

    card crypto LimaMap 1 defined peer (800 WAN router)

    card crypto LimaMap 1 the value transform-set 3des-sha

    LimaMap interface card crypto outside

    crypto isakmp identity address

    crypto ISAKMP allow outside

    crypto ISAKMP policy 1

    preshared authentication

    3des encryption

    md5 hash

    Group 2

    life 86400

    tunnel-group (800 WAN router) type ipsec-l2l

    tunnel-group (800 WAN router)

    IPSec-attributes

    pre-shared key *.

    ISAKMP crypto release:

    ASA

    Type: L2L role: initiator

    Generate a new key: no State: MM_ACTIVE

    Router

    DST CBC conn-State id

    (Local WAN)    (ASA WAN)   ACTIVE QM_IDLE 2003

    Hello, Benjamin.

    I guess that your router does NAT same for site traffic to site.

    So, you have to deny traffic between ACL 100 sites.

    PS: If this does not resolve your problem, could you please share isakmp/ipsec its on both sides?

  • Cisco 800 VPN to a NetScreen-25

    I'm trying to configure a VPN tunnel between a Cisco 800 router and a firewall NetScreen-25. I am able to complete Phase 1 and Phase 2 debugs see 'not found peer. What Miss me?

    Jack,

    The configuration of encryption on the router 800 has access lists overlap.

    Card crypto access-list 115 and 116 are overlapping. Which means, the destination is the same network, and they are two different counterparts.

    access-list 115 permit ip 192.168.103.64 0.0.0.31 192.168.101.0 0.0.0.255

    access-list 116 allow ip 192.168.103.64 0.0.0.31 192.168.101.0 0.0.0.255

    access-list 116 allow ip 192.168.101.0 0.0.0.255 192.168.103.64 0.0.0.31

    Access-list 116 is also a destination of 192.168.103.64 0.0.0.31 which is your network.

    Please update the configuration and try to show up the tunnel.

    Let me know how it goes.

    Kind regards

    Arul

    * Please note all useful messages *.

  • VPN solution - 3002 to IOS

    Hi all

    I'm looking for comments and options for a VPN solution.  The attached diagram shows the configuration of the network and what I am trying to accomplish.

    I have a client to Site A need establish a VPN tunnel with an outside party 3rd , located at Site B.  Traffic must be passed between hosts on Site a subnet 192.168.8.x and host subnet B Site 192.168.9.x

    Site B has a VPN 3002 hardware client to establish a tunnel with Site A

    Site A has an Internet facing router with advanced IP services IOS and a worm ASA 8.x protecting internal resources.

    The Site A customer will only allow VPN tunnels with the router, as opposed to the ASA.

    Based on this topology, how to better create a static tunnel VPN 3002 to the router and allow traffic on the route to/from the 192.168.8.x subnet to Site A and to the 192.168.9.x subnet and Site B?

    All your comments and suggestions would be greatly appreciated.

    You can configure the EasyVPN in NEM (Mode Extension network) between VPN 3002 and router IOS. This will be the only option

    supported on VPN3002 to reach the VPN tunnel between VPN3002 and router IOS.

    Here is the sample configuration for your reference:

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a0080095106.shtml

    Pls also note that VPN3002 is EOL, and here is the notification of end of LIFE for your reference:

    http://www.Cisco.com/en/us/partner/prod/collateral/vpndevc/ps5743/ps5699/ps2286/prod_end-of-life_notice0900aecd805cd557.html

  • Redundancy VPN

    I have a scenario where I have 2 ISPS connected to a different 800 router. Inside network is a single a (10.10.10.0/24). It is a single office and this unique office has a L2L tunnel with another office (office-2). How configure failover and load balancing, and always keep the tunnel if one ISP goes down?

    ciscobigcat,

    I just asked one of the experts switch that I worked with and he told me the 4500 s cannot handle GRE tunnel even if they are L3 switches.  So that would not work for you. 6500 or even the 3700 series switches should be able to do it without problem, but you should talk to your representative local sales to confirm.

    You can absolutely send a tunnel through another tunnel.  The concept is that build you a GRE tunnel between closure of the router behind the ASA closure on Router 1.  Then you build plain ipsec between routers-1 tunnel and the ASA that match all ip traffic between the closure on Router-1 for the closure of the router behind the ASA.

  • Disaster recovery and Tunnels S2S

    I have a lot of remote sites running 800 routers series multiservice that connect to the main office of via IPSec (no GRE) tunnels. What is the best way to switch these guys on a recovery site without completely reconfigure the whole scenario to use GRE and dynamic failover?

    In addition, I would shift immediately, only after an extended shutdown. Is this possible?

    I was planning to put a customer VPN on all PCs, but even once the VPN tunnel complicates things. When it is low there is no internet (all internet traffic is lifted back to the main site for filtering purposes). Can you return to send all traffic directly to the internet regardless of the encryption card? All suggestions are welcome!

    Each remotesite can have two IPsec peers for the same tunnel.
    800 routers will attempt to always connect to the first pair (first site).
    If the first site is unresponsive, 800 routers tries to connect to the second peer second site).

    Now... This happens immediately because it's normally the behavior of desire (the least downtime).

    To do this, for example:

    Main site1: 1.1.1.1

    Main site2: 2.2.2.2

    card crypto peer 1.1.1.1 MYMAP 2.2.2.2

    The foregoing statement card crypto on a 800 router will try to connect to 1.1.1.1 and only if received no response to 2.2.2.2

    Federico.

  • Problem on site to site and between router vpn client series 2,800

    Hello

    I need a little help.

    I have 2 office of connection with a site to site vpn

    Each site has a dry - k9 router 800 series.

    Each router has actually client ipsec vpn active and all users can connect by using the client vpn with no problems.

    I added the lines for the vpn site to another, but the tunnel is still down.

    Here the sh run and sh encryption session 2 routers:

    OFFICE A

    version 15.3
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    OFFICE-A-DG host name
    !
    boot-start-marker
    boot-end-marker
    !
    AQM-registry-fnf
    !
    !
    AAA new-model
    !
    !
    AAA authentication login default local
    AAA authentication login xauthlist local
    AAA authorization exec default local
    AAA authorization exec vty group xauthlocal
    AAA authorization exec defaultlocal group bdbusers
    AAA authorization groupauthor LAN
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    !
    Crypto pki trustpoint TP-self-signed-220561722
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 220561722
    revocation checking no
    rsakeypair TP-self-signed-220561722
    !
    !
    TP-self-signed-220561722 crypto pki certificate chain
    certificate self-signed 01
      
    quit smoking
    !
    !
    !
    !

    !
    !
    dhcp WIRED IP pool
    Network 10.0.0.0 255.255.255.0
    router by default - 10.0.0.254
    Server DNS 10.0.0.100
    !
    !
    !
    8.8.8.8 IP name-server
    no ip cef
    No ipv6 cef
    !
    !
    !
    !
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    !
    !
    !
    !
    !

    !
    !
    !
    !
    !
    VDSL controller 0
    !
    property intellectual ssh rsa ssh key pair name
    property intellectual ssh version 2
    property intellectual ssh pubkey-string
     
    !
    !
    crypto ISAKMP policy 3
    BA 3des
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 20
    md5 hash
    preshared authentication
    OFFICE-B-IP address ISAKMP crypto key XXXXX
    !
    ISAKMP crypto client configuration group remoteusers
    key XXXX
    DNS 10.0.0.100
    WINS 10.0.0.100
    domain.ofc field
    pool ippool
    ACL 101
    !
    !
    Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT
    tunnel mode
    Crypto ipsec transform-set esp - esp-md5-hmac xauathtransform
    tunnel mode
    !
    !
    !
    Crypto-map dynamic dynmap 10
    Set transform-set RIGHT
    Crypto-map dynamic dynmap 20
    Set transform-set RIGHT
    !
    !
    map clientmap client to authenticate crypto list userathen
    card crypto clientmap isakmp authorization list groupauthor
    client configuration address map clientmap crypto answer
    10 ipsec-isakmp crypto map clientmap Dynamics dynmap
    20 ipsec-isakmp crypto map clientmap
    defined OFFICE-B-IP peer
    Set transform-set RIGHT
    match address 115
    !
    !
    !
    !
    !
    !
    !
    ATM0 interface
    no ip address
    No atm ilmi-keepalive
    PVC 8/35
    aal5mux encapsulation ppp Dialer
    Dialer pool-member 1
    !
    !
    interface Ethernet0
    no ip address
    Shutdown
    !
    interface FastEthernet0
    INTERNAL description
    switchport access vlan 10
    no ip address
    !
    interface FastEthernet1
    no ip address
    Shutdown
    !
    interface FastEthernet2
    switchport access vlan 10
    no ip address
    !
    interface FastEthernet3
    switchport access vlan 10
    no ip address
    !
    interface Vlan1
    no ip address
    Shutdown
    !
    interface Vlan10
    IP 10.0.0.254 255.255.255.0
    IP nat inside
    IP virtual-reassembly in
    !
    interface Dialer0
    the negotiated IP address
    NAT outside IP
    IP virtual-reassembly in
    encapsulation ppp
    Dialer pool 1
    Authentication callin PPP chap Protocol
    PPP pap sent-name of user password xxx xxx 0
    clientmap card crypto
    !
    router RIP
    version 2
    10.0.0.0 network
    network 192.168.1.0
    !
    IP local pool ippool 10.16.20.1 10.16.20.200
    IP forward-Protocol ND
    no ip address of the http server
    no ip http secure server
    !
    !
    the IP nat inside source 1 interface Dialer0 overload list
    overload of IP nat inside source list 101 interface Dialer0
    IP route 0.0.0.0 0.0.0.0 Dialer0
    !
    !
    access-list 22 allow 10.16.20.0
    access-list 22 permit 10.16.20.0 0.0.0.255
    Note access-list 101 * ACL SHEEP *.
    access-list 101 deny ip 10.0.0.0 0.0.0.255 10.16.20.0 0.0.0.255
    access-list 101 permit ip 10.0.0.0 0.0.0.255 any
    access-list 115 permit ip 10.0.0.0 0.0.0.255 192.168.1.0 0.0.0.255
    !
    !
    !
    control plan
    !
    !
    !
    MGCP behavior considered range tgcp only
    MGCP comedia-role behavior no
    disable the behavior MGCP comedia-check-media-src
    disable the behavior of MGCP comedia-sdp-force
    !
    profile MGCP default
    !
    !
    !
    !
    !
    Line con 0
    no activation of the modem
    line to 0
    line vty 0 4
    exec-timeout 0 0
    preferred transport ssh
    transport input telnet ssh
    !
    Scheduler allocate 20000 1000
    !
    end

    OFFICE B

    OFFICE-B-DG host name
    !
    boot-start-marker
    boot-end-marker
    !
    AQM-registry-fnf

    !
    AAA new-model
    !
    !
    AAA authentication login default local
    AAA authentication login xauthlist local
    AAA authorization exec default local
    AAA authorization exec vty group xauthlocal
    AAA authorization exec defaultlocal group bdbusers
    AAA authorization groupauthor LAN
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    !
    Crypto pki trustpoint TP-self-signed-1514396900
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 1514396900
    revocation checking no
    rsakeypair TP-self-signed-1514396900
    !
    !
    TP-self-signed-1514396900 crypto pki certificate chain
    certificate self-signed 01
      
    quit smoking

    !
    !
    8.8.8.8 IP name-server
    no ip cef
    No ipv6 cef
    !
    !
    !
    !
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    !
    !
    !
    !
    !
    license udi pid C887VAM-K9 sn FCZ191362Q7
    !
    !

    !
    !
    !
    !
    VDSL controller 0
    !
    property intellectual ssh rsa SSH key pair name
    !
    !
    crypto ISAKMP policy 1
    md5 hash
    preshared authentication
    !
    crypto ISAKMP policy 3
    BA 3des
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 20
    md5 hash
    preshared authentication
    encryption XXXX isakmp key address IP-OFFICE-A

    !
    ISAKMP crypto client configuration group remoteusers
    key xxxx
    DNS 192.168.1.10
    WINS 192.168.1.10
    rete.loc field
    pool ippool
    ACL 101
    !
    !
    Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT
    tunnel mode
    Crypto ipsec transform-set esp - esp-md5-hmac xauathtransform
    tunnel mode
    Crypto ipsec transform-set esp - esp-md5-hmac rtpset
    tunnel mode
    !
    !
    !
    Crypto-map dynamic dynmap 10
    Set transform-set RIGHT
    Crypto-map dynamic dynmap 20
    Set transform-set RIGHT
    !
    !
    map clientmap client to authenticate crypto list userathen
    card crypto clientmap isakmp authorization list groupauthor
    client configuration address map clientmap crypto answer
    10 ipsec-isakmp crypto map clientmap Dynamics dynmap
    20 ipsec-isakmp crypto map clientmap
    peer IP-OFFICE-A value
    Set transform-set RIGHT
    match address 115
    !
    !
    !
    !
    !
    !
    !
    interface Loopback1
    no ip address
    !
    ATM0 interface
    no ip address
    No atm ilmi-keepalive
    PVC 8/35
    aal5mux encapsulation ppp Dialer
    Dialer pool-member 1
    !
    !
    interface Ethernet0
    no ip address
    Shutdown
    !
    interface FastEthernet0
    switchport access vlan 30
    no ip address
    !
    interface FastEthernet1
    switchport access vlan 30
    no ip address
    !
    interface FastEthernet2
    switchport access vlan 20
    no ip address
    !
    interface FastEthernet3
    switchport access vlan 10
    no ip address
    !
    interface Vlan1
    no ip address
    Shutdown
    !
    Vlan30 interface
    IP 192.168.1.254 255.255.255.0
    IP nat inside
    IP virtual-reassembly in
    !
    interface Dialer0
    the negotiated IP address
    NAT outside IP
    IP virtual-reassembly in
    encapsulation ppp
    Dialer pool 1
    Authentication callin PPP chap Protocol
    PPP pap sent-name to user
    clientmap card crypto
    !
    router RIP
    version 2
    10.0.0.0 network
    network 192.168.1.0
    !
    IP local pool ippool 10.16.20.201 10.16.20.250
    IP forward-Protocol ND
    no ip address of the http server
    no ip http secure server
    !
    !
    the IP nat inside source 1 interface Dialer0 overload list
    overload of IP nat inside source list 101 interface Dialer0
    IP nat inside source static tcp 192.168.1.100 5060 interface Dialer0 5060
    IP nat inside source static tcp 192.168.1.100 5061 interface Dialer0 5061
    IP nat inside source static tcp 192.168.1.100 5062 interface Dialer0 5062
    IP nat inside source static tcp 192.168.1.100 5063 5063 Dialer0 interface
    IP nat inside source static tcp 192.168.1.100 5064 interface Dialer0 5064
    IP nat inside source static udp 192.168.1.100 5060 interface Dialer0 5060
    IP nat inside source static udp 192.168.1.100 5061 interface Dialer0 5061
    IP nat inside source static udp 192.168.1.100 5062 interface Dialer0 5062
    IP nat inside source static udp 192.168.1.100 5063 5063 Dialer0 interface
    IP nat inside source static udp 192.168.1.100 5064 interface Dialer0 5064
    IP nat inside source static tcp 192.168.1.100 3541 interface Dialer0 3541
    IP nat inside source static udp 192.168.1.100 3541 interface Dialer0 3541
    IP route 0.0.0.0 0.0.0.0 Dialer0
    !
    !
    sheep allowed 10 route map
    corresponds to the IP 150 101
    !
    access-list 22 allow 10.16.20.0
    access-list 22 permit 10.16.20.0 0.0.0.255
    access list 101 deny ip 192.168.1.0 0.0.0.255 10.16.20.0 0.0.0.255
    ACCESS-list 101 permit ip 192.168.1.0 0.0.0.255 any
    access-list 115 permit ip 192.168.1.0 0.0.0.255 10.0.0.0 0.0.0.255
    !
    !
    !
    control plan
    !
    !
    !
    MGCP behavior considered range tgcp only
    MGCP comedia-role behavior no
    disable the behavior MGCP comedia-check-media-src
    disable the behavior of MGCP comedia-sdp-force
    !
    profile MGCP default
    !
    !
    !
    !
    !
    Line con 0
    no activation of the modem
    line to 0
    line vty 0 4
    exec-timeout 0 0
    password Password02
    preferred transport ssh
    transport input telnet ssh
    !
    Scheduler allocate 20000 1000
    !
    end

    Thanks in advance for any help :)

    the site at the other tunnel is mounted, but it does not pass traffic; What is the source and destination ip on the router that you are trying to ping the address

    whenever you try to open the traffic from router A to router B, you must to the source of the traffic.

    for ex,.

    Router A-->10.1.1.1--fa0/0

    Router B - 172.168.1.100

    source of ping 172.168.1.100 router # 10.1.1.1

    After doing the pings, send the output of the show counterpart of its crypto ipsec at both ends

  • block websites Web of Cisco 800 series Router

    Hello

    I have a Cisco router running. I want to block certain websites (facebook, twitter, etc.) and download files with extensions such as

    *.AVI, *.mp3, *.mp4, *.exe, *.wma, *.wmv and *.torrent etc...

    I want to block for some users (based on the MAC address) and allow other users to have access to it on the same network.

    Help me to do this?

    Here's what you do:

    IP block ip extended access list

    allow an ip

    permit tcp host 192.168.0.100 any eq www

    permit tcp host 192.168.0.107 any eq www

    I suggested to do the following:

    IP block ip extended access list

    permit tcp host 192.168.0.100 any eq www

    permit tcp host 192.168.0.107 any eq www

    Can't you see the difference?

    Concerning

    Alain

    Remember messages useful rate.

  • is eazy customer vpn is supported only on the routers of the 800 pix 7.0 series iOS

    I'm eazy vpn with pix 7.0.4 ios with a 3640 router. the 3640 router is like aeazy vpn client. and the pix as the eazy vpn server. the client connect and continues to ask the xauth parameter. I read in the release notes that requires this vpn eay 12.2 and especially sure ios for 806 routers. the pix also does support eaxy customer vpn routers fo 800 series only. urgent help required. If this true pix sucks big time. they force us to buy routers.they become like microsoft. pls help

    Assane

    According to this document

    http://www.Cisco.com/en/us/products/sw/secursw/ps5299/index.html

    Cisco Easy VPN remote is now available on Cisco 800, 1700, 1800, 2800, 3800 and series UBR900 routers, Cisco PIX 501 security equipment and 506th and Cisco VPN 3002 hardware Clients.

    So no support to 3640...

    M.

    Hope that helps if it is

  • New HP Elitedesk 800 G1 - no wireless adapter?

    I have a HP EliteDesk 800 G1 nine compact PC running Windows 7 - code H5T99EA. It does not have a wireless adapter - certainly none appear in the profile of Harware.

    I can only connect to the Internet via an ethernet cable. I have no option to connect wireless and my wireless router is not discovered when I try (or any other local Wi - Fi access point.

    Do I have to download a driver for the wireless card - no doubt, there is one installed?

    Thank you

    John

    Is an optional scheme, see the specification page 4.

    Integrated Intel® I217LM Gigabit network connection; available wireless LAN card

    http://www.HP.com/hpinfo/newsroom/press_kits/2013/HPDiscover2013/HPEliteDesk800_datasheet.PDF

  • HP deskjet 2540: stop page print quality and 'use printer wireless without router' printing

    After installing the hp deskjet printer 2540, all operating systems (vista, windows, mac os, windows 8) correctly printed.

    I would like to prevent the printing of print quality page whenever the printer is on and to prevent print also the page "use printer wireless without router" (it would be better not to waste the ink).

    Thanks for any help you can provide

    Hi there @lesart55.

    Welcome to the HP community!

    I have seen your post on how your Deskjet 2540 prints a page of print quality every time that the printer is on, and also the page "use printer wireless without router" is printing.

    I'll start with the PQ page that prints at the start of the printer, as it is normally a sign of a hardware problem with the printer.

    Try to update the firmware on the printer. Here is the link to download and run the update using a USB connection to your Vista system: HP Deskjet 2540 series Firmware update

    Try a reset of the power to the printer and make sure the printer is plugged directly into the wall, avoiding bars power and surge protectors. This ensures that the printer is full on and can help greatly.

    Press the power button to turn the product on.
    With the product, unplug the power cord from the back of the product.
    Unplug the power cord from the wall outlet.
    Wait at least 15 seconds.
    Plug the power cord into the wall outlet.
    Reconnect the power cord to the back of the product.
    If the product does not light by itself, press the Power button to turn it on.

    If the PQ page always print after you are done troubleshooting, try the steps outlined in this guide below. I looked at the steps that I see would take place in the tent for your specific problem and chose the steps following, Please do not take account of the actual title.

    An "Incompatible cartridge or"Missing cartridge"Error Message is displayed for HP Deskjet 1510, 2540 Deskjet, HP Deskjet Ink Advantage 1510 and Deskjet Ink Advantage 2540 all-in-One Series Printer"

    I hope that the problem has been cleared up for you at this stage. If this isn't the case, please call us directly to discuss your options of the printer!

    Please contact our technical support at the 800-474-6836. If you do not live in the United States / Canada region, please click the link below to get help from your region number. http://WWW8.HP.com/us/en/contact-HP/WW-phone-assist.html

  • I have a new wireless router - printer MX890 to recognize the new router to print wireless?

    I had to replace my old router with a new wireless today.  How can I get the printer now recognize this new router so I can continue to print wireless?

    Thank you!

    Theresa

    Hello tabuzek.

    Please, try the following to connect to your new router:

    1. press the Menu button on the printer.

    2. Select Configuration Wireless LAN and press OK.

    3. If the WPS option appears, press the STOP button.

    4. Select the Standard installation option, then press OK.

    5. when your access point appears, select it and press OK.

    6. Enter your encryption key and press OK.  Use the Star (*) key to change the patterns of nature.

    7. check the key is correct, then press OK.

    8. once the connection is complete, press OK.

    9. press the copy for return to the default menu button.

    Once this has been done, try printing to test the device.

    If these troubleshooting steps do not work, feel free to call us at 1-800-OKCANON.

  • IOS router with several groups of VPN

    Similar to a discussion, I read with a PIX firewall, I need to set up multiple VPN groups on IOS-based router to support different levels of security. For example, a VPN "GUESTS" group would only have access to 1 server, while the VPN "ADMIN" group would have access to the entire network.

    With a PIX firewall, you can simply specify additional group names (for example "group1 vpngroup',"vpngroup group2"and so on). However, I have not been able to find how do with IOS-based router (Cisco 831 12.3 (4) T) running.

    For example, I have these dynamic groups of VPN:

    the crypto isakmp client configuration group of GUESTS

    password1 keys

    DNS 10.1.1.1

    swimming POOL1-IP pool

    Configuration group customer crypto isakmp ADMIN

    key password2

    DNS 10.1.1.1

    POOL2-IP pool

    ! - Users get authenticated to a RADIUS server

    list of card crypto CRYPTOMAP customer VPN-USER authentication

    ! - The problem is that line taken out. "I can only specify an allow list (a group name) for this encryption card!)

    card crypto CRYPTOMAP ADMIN isakmp authorization list

    I did research on this site, Google, usenet and ORC and have not found what I'm looking for. Any ideas?

    Thank you.

    Command 'isakmp authorization list' you do it reference does not refer to the VPN group, it refers to a whitelist of AAA name which States that the groups are configured locally. Change to the following:

    AAA authorization groupauthor LAN

    card crypto isakmp authorization list groupauthor CRYPTOMAP

    The "groupauthor" is just a label that matches the encryption to the aaa command. Your clients VPN will be accompanied to a specific group depends on what group name, they set up in their VPN client.

    See http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a0080095106.shtml for details, it's a HW 3002 client to a router but the router config is exactly the same thing.

  • Want to update IOS through the Rommon mode in router Cisco 881

    Hi all

    I'm not able to upgrade IOS via mode Rommon in Cisco 881 router as FE 4 port is in router only L3 and rommon mode it supports of 0 - 3-way only.

    So please confirm for me that is there any other way or Cisco 881 router will not support IOS via Rommon upgradation.

    Kindly help.

    Hi charrier you do not give the ip address of the router interface he gets in rommon so it should not matter what interface, as long as your pc and peripherals, same subnet to push the tftpdnld - see doc

    http://www.Cisco.com/c/en/us/TD/docs/routers/access/800/software/CONFIGU...

    EDIT: See this too good examples even syntax for 800

    https://supportforums.Cisco.com/document/12441/tftpdnld-ROMMON-command-r...

Maybe you are looking for

  • HP Designjet Z6100ps does not

    I bought HP Designjet Z6100ps. When I turn it on it gives me a few signals, green flashing on the front and the white screen. Twice he worked well. The first time in the 5th attempt, the second of the 3rd. But now, it does not load the screen.I check

  • all my usb ports was disabled.why?

    I can not conect the memory flash and other devices on my computer

  • APPCRASH on windows install module kernel32.dll error

    I get the same app crash when I try to install 2 different software.  Yet this happens not all the time.  I tried to download all updates current windows and improved my windows installer, but rest the eror.  Any ideas where I can devote myself to th

  • XPS 2720 touchscreen stopped working

    I've had this system for about 3 weeks, and today the touch screen just stopped working no reason apparent. I barely used the system since I received it (were missing), and so it is very likely that it's because of what I did (I installed practically

  • You can cut S 205/speakers?

    I expected to find the keyboard has a * mute button * / option, options not only increase/decrease the volume. Windows 7 has a facility of the Mute speakers in the flight control/console window, but it is not the same as that of a simple keyboard mut