Cisco 1242AG Config AP watered

I have an access point that has been on a WLC LWAPP but during an upgrade, it is watered one got it.  When starting, it just stops and shows red lights.  I comforted inside and it will start to boot and then give error loading 'Flash:/update/c1240-k9w8-mx.124-18a.JA2/c1240-k9w8-mx.124-18a.JA2.

Interrupt within 5 seconds to cancel the startup process

boot process failed...

The system is unable to boot automatically.  The BOOT environment must be set for a bootable image.

PA:

Well, I have a new picture, but my question is how to do this in the AP with the console cable.  Can I use xmodem or something like that.  Once the AP goes up to the point where it shows ap: then it stops.  There is no typing or something that works.  Someone at - it a link that explains how to put the code in an AP with an image of bad start or can you explain how to do this.  I would be happy.

Thank you

Joe

By using a TFTP server to revert to a previous version

http://www.Cisco.com/en/us/docs/wireless/access_point/conversion/LWAPP/upgrade/guide/lwapnote.html#wp160918

Please do not forget to note our useful messages.  Thank you.

Tags: Cisco Wireless

Similar Questions

  • Local AIR-CAP702W ethernet ports

    Hi all

    The new AIR-CAP702W AP have local Ethernet ports 10/100/1000Base-T 4.
    On the card, it is written "for wired devices connectivity.

    http://www.Cisco.com/c/en/us/products/collateral/wireless/Aironet-700-se...

    That's fine, but how manage the traffic on these ports?

    • Are we able to configure ports of theses in access with the different VLAN-ID mode?
      In this case the uplink of the AP must therefore in trunk mode.
      And where we configure the ports of the AP, on the WLC?
    • Or is traffic from connected devices in these ports encapsulated in the CAPWAP tunnel, as wireless data traffic and ends in the WLC (s)?
      In this case, we can choose which port is connected to this VLAN / SSID on the WLC?
    • Or maybe something else?

    Thank you for your help.
    Jerome

    The local 4 x 10/100/1000BASE-T Ethernet ports support half and full-duplex, auto-negotiation and MDI/MDIX autodetection. Devices that connect must support auto-negotiation if you connect to another mode, say hard configured speed and so on. The port cannot be activated, depending on the version of the code, for example 7.6.100.120 the first pressed the ports are not supported.

    For now, (until more control is added in the software) all LAN ports are switch locally, are mapped to the VLAN 702W and do not appear on the Wireless LAN Controller or AP.

    Initially, the ports are disabled and can be activated manually via CLI.

    This allows to reduce security risks. Here are the CLI commands to enable the ports.

    (Cisco Controller)> config ap lan <port id> <enable/disable> <AP-NAME>

    (Cisco Controller)> show ap lan <port id> <AP-NAME>

    (Cisco Controller)> show ap lan port-summary <AP-NAME>

    Hope that helps.

  • WLC 2504 cannot access the GUI...

    Hi all

    I'm not sure what I did wrong, the 2504 itself has only 4 ports and no port management but I heard it's actually port 1 (even if there are no labels for this). That's what I've done so far to try to access the GUI:

    in CLI mode, I have

    (1) put AP managament address like 10.151.55.129 255.255.255.224.

    (2) I have activated the adminmode on port 1, which I assume is management port and enabling admin mode is the same as "no shut" on switches I guess; Here is the command I entered:

    (Cisco Controller) config > adminmode port 1 turn on

    (3) enabled HTTPS/HTTP through commands:

    (Cisco Controller) config > activate network secureweb

    (Cisco Controller) config > activate network web-auth secureweb

    (Cisco Controller) config > network webmode enable

    (4) I then reset system and verify that the changes took place to help display the synthesis network, as shown below. I also activated mgmt via dynamic interface to see if it makes a difference:

    RF-network name... TEST_WIFI

    Web Mode.................................... Enable

    Secure Web view... Enable

    Secure Web Mode Cipher-Option high... Disable

    Secure Web SSLv2 Cipher-Option Mode... Disable

    Secure Web Mode RC4 Cipher preference... Disable

    OCSP........................................ People with disabilities

    Responder OCSP URL...

    Secure Shell (ssh)... Enable

    Telnet...................................... Disable

    Transfer Ethernet multicast... Disable

    Transfer of broadcast Ethernet... Disable

    Multicast/Broadcast AP mode... Address multicast: 225.225.225.225

    IGMP snooping... People with disabilities

    IGMP timeout... 60 seconds

    Interval between IGMP queries... 20 seconds

    MLD snooping... People with disabilities

    MLD timeout... 60 seconds

    Interval between MLD queries... 20 seconds

    Period of inactivity of the user... 300 seconds

    ARP timeout... 300 seconds

    Cisco AP by default Master... Disable

    Join AP priority... Disable

    Mgmt interface wireless... Disable

    Mgmt Via dynamic Interface... Enable

    Filter MAC bridge Config... Enable

    Safety of bridge mode... EAP

    Mesh full sector DFS... Enable

    Relief of AP... Enable

    Support CMCC Auth Web... People with disabilities

    Web Auth redirect Ports... 80.1

    Web Proxy Auth Redirect... Disable

    Bypass-Web Auth Captive... Disable

    Web secure Web Auth... Enable

    Quick change SSID... People with disabilities

    Discovery of the AP - IP NAT only... Activated

    IP/MAC Addr binding Check... Activated

    Status of CCX-lite... Disable

    oeap-600-WLAN-dual... Disable

    oeap-600 local-network... Enable

    mDNS snooping... People with disabilities

    mDNS interval between requests. 15 minutes

    (5) I installed my PORTABLE NIC to be 10.151.55.20 255.255.255.224 and connected to port 1 on wlc 2504; but I can't ping 10.151.55.29 nor do I navigate to https://10.151.55.29/. The port appears upwards (the flashing green lights on port 1 and Portable NIC also Flash).

    Any help would be appreciated

    If your connection to your laptop direct to port 1, then you have untagged the management vlan. Now you have configured for vlan 10, you must set to vlan 0.

    You will then be able to ping to the management interface and connect to it through the user interface.

    Sent by Cisco Support technique iPhone App

  • RRI and Client Mode

    Hello

    I'm reading the "Cisco VPN Config complete Guide" by Richard Deal and without a doubt it's a good book. I am confronted with a difficulty to understand something here.

    In my opinion, reverse road Injection is more useful in the Mode of Extension of LAN in Client mode, because the connections must be made from the company to the SOHO network network. And to do this, the corporate network must know the SOHO network. IPP is used in this case, install a static route inside the company and then VPN gateway redistribute it in the corporate network.

    In client mode, the reverse is true: connections are initiated from the client software or the SOHO network to the corporate network ONLY. So why do I care all to reach the SOHO network or client software from the company network? The author does not specify that.  That's what the author said:

    "The Cisco IPP provides the best approach to remote access clients. IPP is a further development of Cisco-owners for IPsec. At the end of ISAKMP/IKE Phase 1, the remote access client does the following:

    • If in client mode, the client is assigned an internal address of the gateway VPN; the VPN gateway this will add as a static route to the local routing table.  ---- > WHY?

    • If in network extension mode, the client sends the network number of the Interior of the interface of the VPN gateway using an ISAKMP/IKE Phase 1 message. "---> MAKE SENSE

    Please clarify why should I the IPP solution for the client mode. IPP for mode LAN Extension makes more sense.

    Kind regards

    AM

    Hello

    As I mentioned in the first answer,

    Consider a situation where you have a central office VPN device that IS NOT the device that crosses all traffic internal to the external network. In other words in your internal network the default route redirects traffic to another device, for example the perimeter firewall.

    Now for all traffic to flow between the 2 different networks you must naturally the routing tables on the device between the networks to have a route to each network or traffic not correctly between them.

    So consider a situation where your hardware client Mode Client connects to the central VPN device (which is not the gateway for all external traffic) which is running OSPF with all internal routers and the IPP is NOT used. The IP of PAT address used by the hardware Client Mode Client is never adverticed to the rest of the network and traffic flows incorrectly for the perimeter firewall to which the default route points to. If IPP has been activated (and other settings) internal routers could properly bringing traffic back to the PAT IP address to the VPN device rather than the perimeter firewall.

    Naturally, the situation described above applies to a LAN Extender mode also, but in this case the VPN device is naturally adverticing a whole network/subnet instead of an IP address of the host used as IP address of the PAT customer.

    If the remote Client Mode or LAN Extension Mode hardware Client connects to the central site, the central site must have a route to the remote network or the IP of PAT address for traffic to flow between the 2 end points of the network.

    If the central VPN device does not install a route to the address IP of PAT to the central network and then naturally the traffic won't be a way. Customer address IP PAT mode traffic will reach the central site, but the return to the address IP of PAT traffic will not flow properly without IPP.

    -Jouni

  • to access the LWAPP in the GUI

    Hello

    Is it possible to access the cisco 1242ag in graphical mode AP LWAPP?

    No, you can't... GUI is accessed using stand-alone mode... If his LWAPP configure us it using GUI WLC

    Let me know if that answers your question

    Concerning

    Surendra

  • Internet in

    Hello

    I want to configure my cisco 1242ag ap (autonomous) series to work as internet gateway.

    How can I connect it to the network so that it works as the internet gateway for users.

    OK Cool... So, you have AP autonomous and connected to a switch that can get out to the internet now? Am I wrong? and you don't need any LWAPP now... Just the Autonomou?

    Concerning

    Surendra

  • Image of ios LWAPP

    Hello

    which is image ios LWAPP for cisco 1242AG AP series?

    C1240-k9w7 - tar.124 - 10B .JA .tar

    C1240-k9w7 - tar.124 - 10B .JA3 .tar

    C1240-k9w7 - tar.124 - 25d.JA.tar

    Hello

    Here is the link that gives you the list of LWAPP images

    http://www.Cisco.com/Cisco/software/release.html?mdfid=280237322&flowid=7588&softwareid=280775090&release=12.4%2821A%29JA2&relind=available&rellifecycle=&RelType=latest

    LWAPP image looks like this...

    C1240-rcvk9w8 - tar.124 - 21A .JA2 .tar

    C1240-rcvk9w8 - tar.124 - 10B .JDA .tar

    Let me know if this answers your question!

    Concerning

    Surendra

  • 4.1 default TMSXE update

    I am trying to improve TMSXE of 4.0 to 4.1.

    It is not a cluster deployment.

    I stopped the service "Cisco TMSXE".

    But once the upgrade is complete, he launched the "ClusterNodeWizard" window and gives me an error saying

    "Cannot complete update when a node in the cluster is active."

    Stop the service on the currently active node, then finish upgrading both nodes before restartin services. »

    But yet again, I'm not on a TMSXE cluster deployment, I did not choose the option of CClustering during the upgrade and the "Cisco TMSXE" service is stopped

    Hello

    Interesting problem, not something we've seen before.

    I recommend opening a request for Service of the TAC. In the meantime, there are two thing, you can consult:

    1. Open every .xml file in C:\ProgramData\Cisco\TMSXE\Config in a text editor. Most of them must have an element of 'version' somewhere at the top. In all the files with a 'version' element, not the version number match the exact version number you will see listed for TMSXE in Control Panel > uninstall or change a program?
    2. Open regedit.exe and navigate to HKEY_LOCAL_MACHINE > SOFTWARE > Cisco > TMSXE. In a non-clustered installation, you normally only see two strings: "ConfigLocation" and "StorageLocation. You see other string values, as for example "NodeConfigLocation"?

    Kind regards
    Kjetil

  • Change the namespace in the XML document in PLSQL

    Hi friends,

    by creating an XML namespace, I used a query as below

    SELECT ' <? XML version = "1.0" encoding = "UTF-8" standalone = "yes"? > '

    || () XMLSERIALIZE

    (XMLELEMENT) DOCUMENT

    "DeriveCoverageRequest,"

    XmlAttributes)

    "urn: xyz:ccw:config:common: data ' AS 'xmlns '.

    ("urn: xyz:ccw:config:msa: data ' AS 'xmlns:ns1'),

    (l_xmltype) AS CLOB)

    its working fine. But... There are no changes in ie.

    DeriveCoverageRequest should be like "ns1:DeriveCoverageRequest".

    I modified the code as

    SELECT ' <? XML version = "1.0" encoding = "UTF-8" standalone = "yes"? > '

    || () XMLSERIALIZE

    (XMLELEMENT) DOCUMENT

    "ns1:DeriveCoverageRequest,"

    XmlAttributes)

    "urn: xyz:ccw:config:common: data ' AS 'xmlns '.

    ("urn: xyz:ccw:config:msa: data ' AS 'xmlns:ns1'),

    (l_xmltype) AS CLOB)

    but his mistake to launch.

    Please help out to as below

    < ns1:DeriveCoverageRequest xmlns = "urn: xxx:ccw:config:common: data" xmlns:ns1 = "urn: xxx:ccw:config:msa: data" >

    Thanks in advance.

    Arun

    BTW, 10.2, you can make use of XMLROOT, no necessary concatenation... (and no risk of implicit conversion of character)

    SELECT XMLSERIALIZE ( DOCUMENT xmlroot
                                  (XMLELEMENT (
                                   "ns1:DeriveCoverageRequest",
                                   xmlattributes (
                                      'urn:cisco:ccw:config:common:data' AS "xmlns",
                                      'urn:cisco:ccw:config:msa:data' AS "xmlns:ns1"),
                                   dummy)
                                   , VERSION '1.0', STANDALONE YES
                                   )
                                   AS CLOB)
    from dual;   
    
    X
    
  • 1242AG lwapp cli config

    Hello

    I have a 1242ag AP lwapp I want to config via the console (I send to a remote site).

    The AP has been previously configured, so I can't change anything.

    I tried the command

    CLAIRE LWAPP PRIVATE-CONFIG

    But I get

    ERROR! Command is disabled.

    All suggest?

    Thank you very much

    Luigi

    If a lwapp ap is unable to reach a DHCP server, you can manually configure static controller information using the power port injector console and CLI commands in EXEC mode. The static settings are configured with the CLI commands are used by the lightweight access point to connect to a controller. These CLI commands can be used only on lightweight access points that are not associated with a controller.

    Also, REAP H access points that are in the connected mode will not allow the creation or disabling configurations via the console. When the access point is in this State, configurations must be done through the controller interface. Access to the access point configuration commands, if necessary, to ensure that the access point is in standalone mode before attempting to enter all the configuration commands.

    Once the access point is connected to a controller at any time (even if the H-REAP is placed in stand-alone mode), console access point won't command configuration until a new password. Each REAP: password must be changed. This can be set through the CLI of the controller to which the access point is connected. The syntax of this command allows the controller to set the password of the individual access point console or the password to all the services of the controller access points:

    (WLC_CLI) > ap config password username {all |}

    : Note for an access point that did not have its console defined passwords, that this configuration is sent AP to point the command is entered on the controller. Access points that join later to this will require the command be entered again.

    Again the access point has both received a default password and the access point is in stand-alone mode, the access point will still not allow access to these commands. To make changes to the configuration of the REAP H, the removal of pre-existing static IP addresses and IP address of the controller of the configurations is necessary. This configuration is called the private LWAPP Configuration and will need to be removed before any new access point CLI commands can be entered. To do this, enter the following command:

    AP_CLI #clear lwapp private-config

    Note: In order to completely return the access point to factory default, to the boot of access point, press the Mode button until Ethernet light turns orange.

    Only at that point can be made of LWAPP configurations

    http://www.Cisco.com/en/us/Tech/tk722/tk809/technologies_tech_note09186a008081103d.shtml

  • Problems with initial config 1242ag

    Hi all... I got a new aironet AIR-LAP-1242AG-E-K9 and I am asked to configure...

    I have a hard time to do it, since according to the manuals and information that I found, I should be able to easily do this web UI or CLI trought.

    some information here:

    http is disabled, so no user Web interface

    the look of command "set up" does not exist here that '? ' show me:

    AP001d.7095.4f62 #?
    Exec commands:
    CD change current directory
    Disable the Reset functions
    Manage the clock system clock
    Crypto encryption related orders.
    debug debugging features (see also "undebug")
    Delete Deletes a file
    List of files on a file system dir
    disable the Turn off privileged commands
    turn on the turn on privileged commands
    exit from the EXEC
    fsck Fsck a file system
    help Description of the interactive help system
    led functions LED
    locking of the terminal
    Connection connect you as a particular user
    Logout Exit from the EXEC
    LWAPP lwapp exec commands
    mkdir create new directory
    more display the contents of a file
    Name the connection-name an existing network connection
    No function to disable debugging
    Send echo ping messages
    Working Directory current pwd display
    Release to release a resource
    Stop reload and perform a restart cold
    Rename rename a file
    renew renew a resource
    rmdir remove the existing directory
    Register early to save the battery raise_interrupt_level
    Send a message to other TTY lines
    setting system Set Set (no config)
    Show Show running system information
    SYSTAT display information about the terminal lines
    terminal Set terminal line parameters
    Test Test subsystems, memory and interfaces
    Traceroute-Trace route to destination
    undebug disable debugging functions (see also 'debug')
    software upgrade upgrade
    Check check a file
    where the list of active connections

    no 'configure' I stuck since I can't do anything!

    other info:

    Version AP001d.7095.4f62 #Show
    Cisco IOS software, software of C1240 (C1240-RCVK9W8-M), Version 12.3 (11) JX1, RELEASE SOFTWARE (fc1)
    Technical support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2006 by Cisco Systems, Inc.
    Updated Tuesday 17 July 06 11:44 by alnguyen

    ROM: Bootstrap program is C1240 boot loader
    BOOTLDR: C1240 program boot (BOOT-C1240-M), Version 12.4 (13d) JA, VERSION of the SOFTWARE (fc2)

    AP001d.7095.4f62 operating time is 43 minutes
    System to regain the power ROM
    System image file is "flash: / c1240-rcvk9w8-mx/c1240-rcvk9w8-mx".

    Cisco AIR-LAP1242AG-E-K9 (PowerPCElvis) Prozesseur (revision A0) 24566K / 8192K bytes of memory.
    Card processor ID FCZ123280SS
    PowerPCElvis CPU at 266 Mhz, revision number 0 x 0950
    Last reset of tension
    Image LWAPP 3.0.51.0 version
    1 interface FastEthernet

    32K bytes memory simulated by flash not volatile configuration.
    Basic Ethernet MAC address: 00:1: 70:95:4F:62
    Part number: 73-10256-07
    Kit numbered PCA: 800-26918-06
    Revision number of PCA: A0
    Serial number of PCB: FOC122911LE
    Top Assembly part number: 800-29152-03
    Top of page the Assembly serial number: FCZ123280SS
    Top of page revision number: A0
    Product/model number: AIR-LAP1242AG-E-K9

    Configuration register is 0xF

    running-config is here: (no market is available)

    AP001d.7095.4f62 #Show run
    Building configuration...

    Current configuration: 29653 bytes
    !
    version 12.3
    no service button
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    hostname AP001d.7095.4f62
    !
    enable secret 5 $1$ ybi3$ 6Xx0BaRCQlN9rQnOv.YPL0
    !
    IP subnet zero
    diet pre-standard trading online
    !
    Crypto pki trustpoint Cisco_IOS_MIC_cert
    revocation checking no
    rsakeypair Cisco_IOS_MIC_Keys
    !
    Crypto pki trustpoint cisco-root-cert
    revocation checking no
    rsakeypair Cisco_IOS_MIC_Keys
    !
    Crypto pki trustpoint airespace-device-root-cert
    revocation checking no
    rsakeypair Cisco_IOS_MIC_Keys
    !
    Crypto pki trustpoint airespace-new-root-cert
    revocation checking no
    rsakeypair Cisco_IOS_MIC_Keys
    !
    Crypto pki trustpoint airespace-old-root-cert
    revocation checking no
    rsakeypair Cisco_IOS_MIC_Keys
    !
    !
    string encryption ca Cisco_IOS_MIC_cert certificates
    certificate 5DC2D2980000001FF640
    ----

    CERTIFICATES

    ----

    !
    !
    interface FastEthernet0
    customer_id FastEthernet0 dhcp IP address
    no ip route cache
    automatic duplex
    automatic speed
    waiting-80 in
    !
    not run cdp
    !
    Line con 0
    line vty 0 4
    opening of session
    transport of entry no
    line vty 5 15
    opening of session
    transport of entry no
    !
    end

    any idea on how I'm supposed to configure this access point?

    Thanks for help

    Cisco IOS Software, C1240 Software (C1240-RCVK9W8-M), Version 12.3(11)JX1, RELEASE SOFTWARE (fc1)

    You run an IOS based controller.

    Conversion of IOS to IOS autonomous controller is easy.  Just follow the link below:

    By using a TFTP server to revert to a previous version

    Please do not forget to note our useful messages.  Thank you.

  • wrt160n with cisco pix and isa server 2004 config

    Hello

    I am installing a configuration to which my wrt160n router should work, but it is not at present

    .. the is the problem:

    Internet proxy - pix cisco - ms isa 2004 - 4 network cards <> lan1, lan2, dmz and wlan networks

    The wlan network card will only be my lan wireless for internet access interface. The isa server wireless lan nic has been configurered with an IP 10.0.10.1. / 24

    Configure the interface to internet wrt160n with static ip 10.0.10.2 / 24 and bridge 10.0.10.1 2 i'net addresses of dns.

    My dhcp server config is 192.168.100.x /255.255.255.0 and the same dns addresses i'net 2. NAT is disabled because isa server nat for all networks

    where is mistaken or do I forgot something... Help, please

    Activate NAT on the WRT or add a static route for 192.168.100.0/255.255.255.0 to 10.0.10.2 on your isa server computer.

    Of course, you only want wireless, there is not need to use the WRT as a router. You can set the WRT back to DHCP on internet settings. Set the address LAN IP of 10.0.10.2 with a mask of 255.255.255.0. Disable the DHCP server on the WRT. Then one of the LAN wire ports of the WRT to the ISA Server. Do not use the internet port on the WRT!

    Now, you have configured the WRT as simple access point. So you should use your ISA Server to serve DHCP IP addresses inside 10.0.10.0/24...

  • Cisco 6509-v-e redundancy config

    Hello

    What can I config redundancy with sup32-ge-3 b and sup720 - 10g on cisco 6509 switch?

    Disclaimer

    The author of this announcement offers the information in this publication without compensation and with the understanding of the reader that there is no implicit or explicit adequacy or adaptation to any purpose. Information provided is for information purposes only and should not be interpreted as making the professional advice of any kind. Use information from this announcement is only at risk of the reader.

    RESPONSIBILITY

    Any author will be responsible for any wha2tsoever of damage and interest (including, without limitation, damages for loss of use, data or profits) arising out of the use or inability to use the information in the view even if author has been advised of the possibility of such damages.

    Poster

    In the same frame?  If so, not that I know of.  According to me, overtime must be in the same chassis.

  • Cisco RV220W IPSec VPN problem Local configuration for any config mode

    Dear all,

    I need help, I am currently evaluating RV220W for VPN usage but I'm stuck with the config somehow, it seems that there is a problem with the Mode-Config?

    What needs to be changed or where is my fault?

    I have installed IPSec according to the RV220W Administrator's Guide. Client's Mac with Mac Cisco IPSec VPN, I also tried NCP Secure Client.

    I have 3 other sites where the config on my Mac works fine, but the Cisco VPN router is not.

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: remote for found identifier "remote.com" configuration

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: application received for the negotiation of the new phase 1: x.x.x.x [500]<=>2.206.0.67 [53056]

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: early aggressive mode.

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received unknown Vendor ID

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received Vendor ID: RFC 3947

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received unknown Vendor ID

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received unknown Vendor ID

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received unknown Vendor ID

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received unknown Vendor ID

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received unknown Vendor ID

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received unknown Vendor ID

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received unknown Vendor ID

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received unknown Vendor ID

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received Vendor ID: CISCO - UNITY

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: received Vendor ID: DPD

    2013-03-07 01:55:49: [CiscoFirewall] [IKE] INFO: for 2.206.0.67 [53056], version selected NAT - T: RFC 39472013-03-07 01:55:50: [CiscoFirewall] [IKE] INFO: floating ports NAT - t with peer 2.206.0.67 [52149]

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] INFO: NAT - D payload is x.x.x.x [4500]

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] INFO: NAT - D payload does not match for 2.206.0.67 [52149]

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] INFO: NAT detected: Peer is behind a NAT device

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] INFO: request sending Xauth for 2.206.0.67 [52149]

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] INFO: ISAKMP Security Association established for x.x.x.x [4500] - 2.206.0.67 [52149] with spi: 1369a43b6dda8a7d:fd874108e09e207e

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] INFO: type of the attribute "ISAKMP_CFG_REPLY" from 2.206.0.67 [52149]

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] INFO: connection for the user "Testuser".

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] INFO: type of the attribute "ISAKMP_CFG_REQUEST" from 2.206.0.67 [52149]

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] WARNING: ignored attribute 5

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] WARNING: attribute ignored 28678

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] ERROR: local configuration for 2.206.0.67 [52149] has no config mode

    2013-03-07 01:55:50: [CiscoFirewall] [IKE] WARNING: attribute ignored 28683

    2013-03-07 01:56:07: [CiscoFirewall] [IKE] INFO: purged-with proto_id = ISAKMP and spi = 1369a43b6dda8a7d:fd874108e09e207e ISAKMP Security Association.

    2013-03-07 01:56:08: [CiscoFirewall] [IKE] INFO: ISAKMP Security Association deleted for x.x.x.x [4500] - 2.206.0.67 [52149] with spi: 1369a43b6dda8a7d:fd874108e09e207e

    Hi Mike, the built-in client for MAC does not work with the RV220W. The reason is, the MAC IPSec client is the same as the Cisco VPN 5.x client.

    The reason that this is important is that the 5.x client work that on certain small business products include the SRP500 and SA500 series.

    I would recommend that you search by using a client VPN as Greenbow or IPSecuritas.

    -Tom
    Please mark replied messages useful

  • Configs ISE Cisco switch

    I guess Cisco ISE sends a redirect to URL to the switch and switch, it presents to the customer in the case of access comments get a redirect URL with acceptance of the user (guests and not wired) Page.

    My question is, do we need to configure the server http and https on the switches (both pleading and authenticator)?

    I don't know that it will take a confirmation, but just wanted to...

    I checked the configuration for the supplicant and authenticator of ISE switches, and there no where not mentioned this part of the config.

    http://www.Cisco.com/en/us/docs/security/ISE/1.0/user_guide/ise10_troubleshooting.html (a redirect to URL and possible cause problem is mentioned) - make sure that the config is necessary.

    http://www.Cisco.com/c/en/us/TD/docs/switches/LAN/catalyst2960x/software/15-0_2_EX/security/configuration_guide/b_sec_152ex_2960-x_cg/b_sec_152ex_2960-x_cg_chapter_010000.html

    (the begging and authenticator switch configuration) - mentioned anywhere in the configuration of http/https for the two switches.

    Yes, his need.  The http/s server in the swtich is used to retrieve the user http traffic and redirect the traffic to the CWA portal, or a registration portal device or even for the portal of integrated Mobile Device Management (MDM).  .

    IP http server

    IP http secure server

    The info below, I caught Cisco ISE for BYOD and book secure access unified.

    "Organization many want if ensure that this referral process to aid internal HTTP Server switch is dissociated from the management of the switch itself, in order to limit the risk of the user interacts with the intervace plan a switch of control and management."  This can be accomplished by connecting the two following commands in global configuration mode:

    active session modules IP http no

    "IP http secure-active-session-modules no".

Maybe you are looking for