Cannot access a remote LAN with Cisco Client

Hello

IAM using an ASA 5505 and connect with the Cisco Client 5.0.02.0090. The Client connects to the Remote LAN and get an IP of the SAA.

But I can't access the Remote LAN or ping the Interface of the ASA trainee.

Can someone help me with this problem?

If the client computer is in the same subnet as the other PC, then its dislikes a question ASA.

Just make sure that the client computer is in the subnet, default gateway of 192.168.20.100 192.168.20./24 and connected to a switchport on vlan 1.

Finally, check whether the DNS resolution works, or if you can browse the internet with the ip address.

Tags: Cisco Security

Similar Questions

  • RVL200 SSL VPN: cannot access a remote LAN with iPad2

    RVL200 firmware 1.1.12.1

    iPad2 cannot access any device on the Remote LAN despite the closed padlock icon.

    Is there another App needed? Or how to debug SSL VPN?

    Emmanuel,

    Were you able to access the LAN devices? Also, have you connected using a Mac or a PC successfully to verify that the devices are available? Sometimes antivirus and firewall software can block access to devices from a remote IP address.

  • Cannot access the internal network with Cisco easy vpn client RV320

    I have a cisco RV320 (firmware v1.1.1.06) and created a tunnel easy vpn (= split tunnel tunnel mode), then I installed the cisco client vpn v5.0.07.0290 in Windows 7 64 bit, I can connect to the vpn, but I do not see the other pc ping nor them, no idea?

    Thank you

    Hello

    1. is the firewall on the active Windows 7 computer? If so, please disable it

    2. can you check that you get a correct IP address in the range of the POOL of IP configured?

    3. When you perform the tracert command to access an internal server, it crosses the VPN¨?

    4. is the tunnel of split giving you access to internal IP subnets defined?

    5. on the RV320 you see the user connected and sending and receiving bytes?

    Don t forget to rate and score as correct the helpful post!

    David Castro,

    Kind regards

  • Cannot access Mac on LAN with the name of user and password correct

    I have two Mac Pros, it of brand-new and came with El Capitan installed, the other I've just updated to El Capitan.

    I need to have access to the Mac via my local network and would usually use the option in the sidebar of the Finder. I can't access the new Mac.

    I have the good registered user name and password, but every time I try to connect it just shakes and refuses to connect.  Strangely, if I choose screen sharing, it works perfectly!

    Is there something obvious that I do not forget to allow me to access the first Mac?

    Thank you

    Adam

    by chance, you have file sharing enabled on the new Mac? (Preferences system - share - file sharing) Looks like you have active screen sharing, but not file sharing.

  • Failed: Cannot access the remote Converter Standalone Agent service. It does not exist or is not responding.

    When I try to run the converter that we receive the following error message, FAILED: cannot access the remote Converter Standalone Agent service. It does not exist or is not responding.

    RaymondT

    Given that the conversion works, you can have a software or configuration of Windows Server. Check the Windows event logs. Anything in current policies that could prevent?

  • PIX501 customer VPN - cannot access inside the network with VPN Session

    What follows is based on the config on the attached link:

    http://www.Cisco.com/en/us/Partner/Tech/tk583/TK372/technologies_configuration_example09186a008009442e.shtml

    PIX Ver 6.2 (3) - VPN Client 3.3.6(A) - Windows XP Client PC

    We can establish the VPN to the PIX501 session, but we cannot access the network private behind the pix.

    Here is the config - I can't determine why it does not work, we are desperate to get there as soon as POSSIBLE!

    We have the same problem with the customer 4.0.3(c)

    Thanks in advance for any help!

    =======================================

    AKCPIX00 # sh run

    : Saved

    :

    6.2 (3) version PIX

    ethernet0 nameif outside security0

    nameif ethernet1 inside the security100

    hostname AKCPIX00

    domain.com domain name

    fixup protocol ftp 21

    fixup protocol http 80

    fixup protocol h323 h225 1720

    fixup protocol h323 ras 1718-1719

    fixup protocol they 389

    fixup protocol rsh 514

    fixup protocol rtsp 554

    fixup protocol smtp 25

    fixup protocol sqlnet 1521

    fixup protocol sip 5060

    fixup protocol 2000 skinny

    fixup protocol sip udp 5060

    names of

    access-list 101 permit ip 192.168.1.0 255.255.255.0 10.0.0.0 255.255.255.0

    pager lines 24

    interface ethernet0 10baset

    interface ethernet1 10full

    Outside 1500 MTU

    Within 1500 MTU

    external IP address #. #. #. # 255.255.240.0

    IP address inside 192.168.1.5 255.255.255.0

    alarm action IP verification of information

    alarm action attack IP audit

    IP local pool akcpool 10.0.0.1 - 10.0.0.10

    history of PDM activate

    ARP timeout 14400

    Global 1 interface (outside)

    (Inside) NAT 0-list of access 101

    NAT (inside) 1 0.0.0.0 0.0.0.0 0 0

    Route outside 0.0.0.0 0.0.0.0 #. #. #. # 1

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0: 10:00 udp 0:02:00 CPP 0: h323 from 10:00 0:05:00 sip 0:30:00 sip_media 0:02:00

    Timeout, uauth 0:05:00 absolute

    GANYMEDE + Protocol Ganymede + AAA-server

    RADIUS Protocol RADIUS AAA server

    AAA-server local LOCAL Protocol

    the ssh LOCAL console AAA authentication

    No snmp server location

    No snmp Server contact

    SNMP-Server Community public

    No trap to activate snmp Server

    enable floodguard

    Permitted connection ipsec sysopt

    No sysopt route dnat

    Crypto ipsec transform-set esp - esp-md5-hmac RIGHT

    Crypto-map dynamic dynmap 10 transform-set RIGHT

    map mymap 10-isakmp ipsec crypto dynamic dynmap

    mymap outside crypto map interface

    ISAKMP allows outside

    part of pre authentication ISAKMP policy 10

    encryption of ISAKMP policy 10

    ISAKMP policy 10 md5 hash

    10 2 ISAKMP policy group

    ISAKMP life duration strategy 10 86400

    vpngroup address akcpool pool akcgroup

    vpngroup dns 192.168.1.10 Server akcgroup

    vpngroup akcgroup by default-domain domain.com

    vpngroup split tunnel 101 akcgroup

    vpngroup idle 1800 akcgroup-time

    vpngroup password akcgroup *.

    vpngroup idle 1800 akc-time

    Telnet timeout 5

    SSH #. #. #. # 255.255.255.255 outside

    SSH timeout 15

    dhcpd address 192.168.1.100 - 192.168.1.130 inside

    dhcpd dns 192.168.1.10

    dhcpd lease 3600

    dhcpd ping_timeout 750

    dhcpd allow inside

    Terminal width 80

    Cryptochecksum:XXXXX

    : end

    AKCPIX00 #.

    Config looks good - just as domestic mine to my local network. The only thing I can think is that you may have entered commands in the wrong order - which means, you could have isakmp or encryption before the config map was complete. Write memory, then reloading the pix is a way to reset everything. If you do not want downtime:

    mymap outside crypto map interface

    ISAKMP allows outside

    Enter these two commands should be enough to reset the ipsec and isakmp.

  • cannot access properties .parent charger with Player 11.2

    OK, so this is embaresing and my entire company suffers from this! www.doitflash.com

    the key point in my TextArea class that extends from TextField is to load external swf files and I use the property .parent of the Loader class to access the textfield with the news updates coming with 11.2 security I cannot access the parent and all crashes!

    to give you more insight:

    Imagine that we have file.swf loaded into the project using the flash.display.Loader class.

    file.swf document class, I can access the charger like this, all ok so far

    _loader = this.parent as charger

    I used to access the object TextField like this:

    _textArea = _loader.parent as an object

    now, this does not work!

    I appriciate any idea on how I can fix this...? every day that one of my clients is updating its reader to the new version, their Web site fails. I need to fix this ASAP thanks.

    I found a work around for the problem... I ' l explain here so anyone having the same problem can solve that...

    OK, I have a string with< img="" tags="" in="" it="" where="" they="" loaded="" the="" external="" swf="" files.="" the="" problem="" was="" that="" the="" loaded="" swf="" file="" could="" not="" have="" access="" to="" the="" main="" project="" which="" had="" loaded="" it="" through="" textfield.="" so="" what="" i="" did="" was="" to="" parse="" the="" string="" and="" locate="" all="" the="">< img="" tags="" and="" add="" the="" id="sth" attribute="" to="" them,="" at="" the="" same="" time,="" i="" saved="" an="" array="" of="" these="" id="">

    now, I could listen to the shipper of these external SWFs to see when they have finished loading:

    var loader:Loader = textField.getImageReference($id) as Loader;

    loader.contentLoaderInfo.addEventListener(Event.COMPLETE, onModuleLoadDone, false, 0, true);

    Then, I created a function called 'building' in the external swf files and now I can call as func and pass a reference to the external swf TextField object

    private function onModuleLoadDone(e:Event):void

    {

    var content:* = e.currentTarget.content;

    content.construct(textField);

    }

    It works fine now. Adobe, you almost gave me a heart attack! but thanks for all your work. After I did this update in my projects, I feel as if it was the best approach I should had thought initially. It's safer now, and he made sure to swf files external unauthorized will not be able to run func in the main project...

    Hadi

  • Cannot reset the user vmail with Cisco Unified CM Administration password

    We use Cisco Unified CM Administration ver 7.1 with Cisco 7945 IP phones. I have a user who came to tell me that they could access is no longer the voicemail, getting PIN disabled. Ichanged the PIN with the Cisco Unified CM Administration that accepts the new pin without problem, but when we try from the phone, it does not work. Any ideas... Thank you Don

    Hi Don,

    For voicemail partners changes/updates, you should choose

    2 cisco Unity Connection Administration.

    Then; Users > Find/list > user associated with selectect > drop-down Edit > change passwords >

    Change voicemail password

    See you soon!

    SoC

    "Spend your life waiting,
    a moment that all do not come.
    Well, don't waste your time waiting.

    -Springsteen

  • Cannot access my IOGEAR BOSS with Vista home premium

    I have problems to access the directories on my external device with my new PC, and I hope you can help me.

    I just replaced my old HP Desktop running XP OS with a new DELL desktop which is under Vista Home Premium (32 bit) and now I can't access the device of utility of IOGEAR BOSS. I was able to access the external device with it and can be accessed with 2 other PC at home now. Can't seem to connect to the external device with this new system.

    What I can do:
    I am directly connected the BOSS and can access the internet via the BOSS. I also see the external device in my network. I can ping, tracert it. That's where! Just can't log in there!

    What I can't do
    Map a drive to the external device or authenticate in the unit. (When I try to access it, it prompts me for the ID/PW as it should, but he does not like the ID/PW I provided). I know that the PW & ID works calibrated it works on 2 other PC's connected on it.

    Steps to access the external device
    I am trying to access by taking the following measures:
    1 map a network drive
    2 assign the letter Z
    3 path: \\192.168.2.1\share
    4 pushes. me for ID & PW - admin\ *.
    5 ERROR Message: Logon FAILURE - NOTES: now shows the ID: Desktop\admin

    What I've done
    1 Contcted IOGEAR - checked all the settings of security, network and pwermission and reset the permissions of the external device to the original state. Did not work. They sent me to Ms & Dell.
    2. contacted Dell - did the same exact steps. They sent me Ms.

    Can anyone help?

    According to the site Web of IOGEAR (http://www.iogear.com/product/GNS1000/) it is only compatible with Windows® 98SE, 2000, ME, XP.  So so looking for a compatibility issue.  The update of the firmware is from March 2006, you might want to update the Firmware and see if that helps, but with compatibility issues, it's a scenario 'best effort '.

    Below you will find the IOGEAR support page, I hope that helps solve your problem.

    http://atenpbsr2.ATEN-USA.NET:8000/Inet_tech/form/us/index.asp

    Stephen Davies MS

  • Customer remote cannot access the server LAN via VPN

    Hi friends,

    I'm a new palyer in ASA.

    My business is small. We need to the LAN via VPN remote client access server.

    I have an ASA5510 with version 7.0. I have configured remote access VPN and it can establish the tunnel with success. But I can not access the server.

    Client VPN is 5.0.07.0290 version. Encrypted packages have increased but the decrypted packet is 0 in the VPN client statistics, after I connected successfully.

    Next to the ASA, I show crypto ipsec sa, just deciphering the packets increase.

    Who can help me?

    Thank you very much.

    The following configuration:

    ASA Version 7.0(7)
    !
    hostname VPNhost
    names
    dns-guard
    !
    interface Ethernet0/0
    nameif outside
    security-level 10
    ip address 221.122.96.51 255.255.255.240
    !
    interface Ethernet0/1
    nameif inside
    security-level 100
    ip address 192.168.42.199 255.255.255.0
    !
    interface Ethernet0/2
    shutdown
    no nameif
    no security-level
    no ip address
    !
    interface Management0/0
    shutdown
    no nameif
    no security-level
    no ip address
    management-only
    !
    ftp mode passive
    dns domain-lookup inside
    access-list PAT_acl extended permit ip 192.168.42.0 255.255.255.0 any
    access-list allow_PING extended permit icmp any any inactive
    access-list Internet extended permit ip host 221.122.96.51 any inactive
    access-list VPN extended permit ip 192.168.42.0 255.255.255.0 192.168.43.0 255.255.255.0
    access-list VPN extended permit ip 192.168.43.0 255.255.255.0 192.168.42.0 255.255.255.0
    access-list CAPTURE extended permit ip host 192.168.43.10 host 192.168.42.251
    access-list CAPTURE extended permit ip host 192.168.42.251 host 192.168.43.10
    pager lines 24
    mtu outside 1500
    mtu inside 1500
    ip local pool testpool 192.168.43.10-192.168.43.20

    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 0 access-list VPN
    nat (inside) 1 access-list PAT_acl
    route outside 0.0.0.0 0.0.0.0 221.122.96.49 10

    
    username testuser password 123
    aaa authentication ssh console LOCAL
    aaa local authentication attempts max-fail 3

    no sysopt connection permit-ipsec
    crypto ipsec transform-set FirstSet esp-des esp-md5-hmac
    crypto dynamic-map dyn1 1 set transform-set FirstSet
    crypto dynamic-map dyn1 1 set reverse-route
    crypto map mymap 1 ipsec-isakmp dynamic dyn1
    crypto map mymap interface outside
    isakmp enable outside
    isakmp policy 1 authentication pre-share
    isakmp policy 1 encryption des
    isakmp policy 1 hash md5
    isakmp policy 1 group 2
    isakmp policy 1 lifetime 86400
    isakmp nat-traversal  3600
    tunnel-group testgroup type ipsec-ra
    tunnel-group testgroup general-attributes
    address-pool testpool
    tunnel-group testgroup ipsec-attributes
    pre-shared-key *
    telnet timeout 5

    ssh timeout 10
    console timeout 0

    : end

    Topology as follows:

    Hello

    Configure the split for the VPN tunneling.

    1. Create the access list that defines the network behind the ASA.

      ciscoasa(config)#access-list Split_Tunnel_List remark The corporate network behind the ASA. ciscoasa(config)#access-list Split_Tunnel_List standard permit 10.0.1.0 255.255.255.0 

    2. Mode of configuration of group policy for the policy you want to change.

      ciscoasa(config)#group-policy hillvalleyvpn attributes ciscoasa(config-group-policy)#

    3. Specify the policy to split tunnel. In this case, the policy is tunnelspecified.

      ciscoasa(config-group-policy)#split-tunnel-policy tunnelspecified 

    4. Specify the access tunnel split list. In this case, the list is Split_Tunnel_List.

      ciscoasa(config-group-policy)#split-tunnel-network-list value Split_Tunnel_List 

    5. Type this command:

      ciscoasa(config)#tunnel-group hillvalleyvpn general-attributes 

    6. Associate the group with the tunnel group policy

      ciscoasa(config-tunnel-ipsec)# default-group-policy hillvalleyvpn 

    7. Leave the two configuration modes.

      ciscoasa(config-group-policy)#exit ciscoasa(config)#exit ciscoasa#

    8. Save configuration to non-volatile RAM (NVRAM) and press enter when you are prompted to specify the name of the source file.

    Kind regards
    Abhishek Purohit
    CCIE-S-35269

  • ASA5505 with 10 users. Need to connect 25 remote users with AnyConnect Client

    Hello to everyone.

    I ASA5505 with license 10 users. I need to connect 25 remote users via SSL VPN (in my case cisco Anyconnect client). So I have to buy the license more security (ASA5505-SEC-PL =) for more then 10 simultaneous VPN connections on Cisco ASA 5505. Fix?

    And the main question. What I need to order the user getting up-to-date (for example ASA5505-SW-10-50 =, or ASA5505-SW-10-UL =) license for my device Cisco ASA5505 in order to have 25 connections of concurrent remote users without restriction for each remote user?

    You need the license SecPlus for increased remote access users. But you don't need an extra user license if you still only up to 10 internal systems.

  • Cannot save the new DA with Cisco Smart Net Total Care

    I get the following error when configuring a Director of several browsers. I also cleared my browser cache.  Any ideas to go beyond this issue?

    "We encountered an error while processing your request. Please refresh this page or try again. »

    It was first recording attempt of DA, but group account has been used and we got after the support response:

    Thank you for your request to become a Managing Director for Smart Net Total Care. Unfortunately, this application using what appears to be a shared account. Cisco access policy requires that each account is associated with a single person, and this policy must be strictly applied when this account is used to manage access to other accounts. Smart Net Total Care registration must be performed by a competent person, using their individual Cisco.com account that clearly identifies them by name. Please re - submit a new registration request online by using your individual Cisco.com user ID. Once this request is received, we will proceed with your Smart NET Care total integration.

    Maybe there's some cleaning must be performed in the database before the client can retry to register?

    Best regards

    Resad

  • IPSec remote VPN with VPN client in error

    Hello

    ASA 5505 configuration is: (installation using ASDM)

    output from the command: 'show running-config '.

    : Saved
    :
    ASA Version 8.2 (5)
    !
    hostname TEST

    Select _ from encrypted password
    _ encrypted passwd
    names of
    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 192.168.1.1 255.255.255.0
    !
    interface Vlan2
    nameif outside
    security-level 0
    IP address dhcp setroute
    !
    passive FTP mode
    sap_vpn_splitTunnelAcl list standard access allowed 192.168.1.0 255.255.255.0
    inside_nat0_outbound to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.10.0 255.255.255.224
    pager lines 24
    asdm of logging of information
    Within 1500 MTU
    Outside 1500 MTU
    IP local pool test_pool 192.168.10.0 - 192.168.10.20 mask 255.255.255.0
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 0-list of access inside_nat0_outbound
    NAT (inside) 1 0.0.0.0 0.0.0.0
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    AAA authentication http LOCAL console
    Enable http server
    http 192.168.1.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
    outside_map interface card crypto outside
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH timeout 5
    Console timeout 0
    dhcpd outside auto_config
    !
    dhcpd address 192.168.1.5 - 192.168.1.132 inside
    dhcpd allow inside
    !

    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    WebVPN
    internal sap_vpn group policy
    attributes of the strategy of group sap_vpn
    value of server DNS 192.168.2.1
    Protocol-tunnel-VPN IPSec


    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list sap_vpn_splitTunnelAcl
    username password encrypted _ privilege 0 test
    username test attributes
    VPN-group-policy sap_vpn
    Username password encrypted _ privilege 15 TEST
    type tunnel-group sap_vpn remote access
    tunnel-group sap_vpn General-attributes
    address test_pool pool
    Group Policy - by default-sap_vpn
    sap_vpn group of tunnel ipsec-attributes
    pre-shared key *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    !
    global service-policy global_policy
    context of prompt hostname
    no remote anonymous reporting call
    Cryptochecksum:b67cdffbb9567f754052e72f69ef95f1
    : end

    I use customer VPN authentication with IP 192.168.2.20 host group with username:sap_vpn and key pre-shared password but not able to connect to the vpn and the error message attached.

    ASA, set up with the initial wizard ASDM: inside the interface IP 192.168.1.1 (VLAN1) and outside (VLAN2) IP 192.168.2.20 assigned by using DHCP. I use outside interface IP 192.168.2.20 to HOST IP to the VPN client for the remote connection? is it good?

    Please advise for this.

    Hello

    What train a static IP outside? We need a static IP address to connect, please try again and let us know how it works?

    Kind regards

  • Cannot change the wireless Lan through the Client Manager

    I currently have a series of Satellite Pro 6100 running Windows 2000. The user is uable to select another wireless thanks to the future connection manager Client unless he is logged on as administrator.
    We run Customer Manager V2.58. This problem is noticed in the previuos versions but was supposed to be fixed in Version 1.58.
    There is no set of restrictions against this user in AD that would prevent these changes only that he is not an administrator.

    Can anyone help with this please.

    Thank you

    One of my friends has the same client wireless as you and ask him the solution to this problem. His opinion is that you are right. You are able to switch between profiles only if you are logged on as administrator.

    It makes no sense to me. Try to give any user administrator rights and allow him to have unlimited access to the computer, and then try again.
    Perhaps on this way you can be sure that it is just a means to add, edit, and change between the rare profiles.

  • Cannot access 'change of startup with the Defender programs stops but prove Essentials won't advocate not run

    Microsoft Security Essentials disables the Defender, but with Defender disabled I can't access certain items in such as 'Change startup programs' control panel - I get the message that the Defender is not enabled - if I try to activate Defendeer access, the freezing of the entire machine.  Defender does not appear in the list of programs - so it cannot be deleted.  (Well not really), I am surprised that Microsoft may not yet know of ocnflicts with its own software.  What is the reference for this?

    Because of the interaction between the defender and Essentials I need to completely uninstall Essesntials for program startup - enable - disable options via the control panel.  When you click the option to enable - disable the startup program that a box comes up saying Defender is turned off, and if you click on to activate it, the machine frezzes.  This is exactly the problem I want to fix it.  Your p - submit not only serve to illustrate the problem.  I have no idea why Defender is connected to the options of startup programs, but it is apparently and screw Essentials correct operation of this function.

Maybe you are looking for