Cisco 1841 match filter by string http requests

I have a web server behind a Cisco 1841 router that receives a lot of requests like follows(DDOS Slowloris), which causes the resource consumption of bandwidth and the server:

"POST/WP - login.php HTTP1.1".

On the web server, I managed using Iptables to stop these requests, but now I want to move this task to the Cisco 1841 router so that such requests stops at the front door and don't go all the way to the web server.

How can it be implemented in the Cisco firewall so that any request matching the string "POST/WP - login.php HTTP1.1" had to be abandoned?

Hello

Theres two ways to do that would work on a 1841 you can try anyway

check out his link

http://www.Cisco.com/c/en/us/support/docs/routers/7500-series-routers/27...

HTH

Tags: Cisco Network

Similar Questions

  • SRW2048 and a Cisco 1841

    I am trying to Setup VLAN between a 2 and a Cisco 1841 router SRW2048 switches. I have ports that connect the 2 switches to the other and the port that connect to router as junction ports. I set 2 VLANS. VLAN 1 is just the vlan by default everyone runs and vlan will be the area demilitarized. I have no configuration of access control lists to block traffic, but when I assign vlan 2 on the port that the server is, I can not ping to the gateway. I don't know what is happening, see below for the cleaned configs.

    1841:

    Current configuration: 4282 bytes
    !
    version 12.4
    no service button
    horodateurs service debug datetime msec
    Log service timestamps datetime localtime show-time zone
    encryption password service
    !
    hostname QCSLOLURTR01
    !
    boot-start-marker
    start the system flash c1841-advsecurityk9 - mz.124 - 25B .bin
    boot-end-marker
    !
    logging buffered debugging 8192
    !
    AAA new-model
    !
    !
    AAA authentication login default group Ganymede + local
    the AAA authentication enable default group Ganymede + none
    !
    AAA - the id of the joint session
    clock timezone CST - 6
    clock to summer time recurring CDT
    IP cef
    !
    !
    property intellectual auth-proxy max-nodata-& 3
    property intellectual admission max-nodata-& 3
    !
    !
    no ip domain search
    IP domain name qcsupply.com
    !
    !
    !
    user name x

    Archives
    The config log
    hidekeys
    !
    !
    x IP ftp username
    x IP ftp password

    !
    !
    crypto ISAKMP policy 1
    BA 3des
    md5 hash
    preshared authentication
    Group 2
    ISAKMP crypto key QCSLOLU address x.x.x.x No.-xauth
    !
    !
    Crypto ipsec transform-set esp-3des esp-md5-hmac ts1
    Crypto ipsec transform-set esp - esp-md5-hmac ts2
    !
    VPN-map 10 ipsec-isakmp crypto map
    defined peer x.x.x.x
    Set transform-set ts1
    match address 101
    !
    !
    !
    interface FastEthernet0/0
    Description QCSL OLU INTERNET CONNECTION
    IP x.x.x.x where x.x.x.x
    IP access-group denied-hack-attack in
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    NAT outside IP
    IP virtual-reassembly
    automatic duplex
    automatic speed
    No cdp enable
    card crypto vpn-map
    !
    interface FastEthernet0/1
    no ip address
    automatic duplex
    automatic speed
    !
    interface FastEthernet0/1.1
    encapsulation dot1Q 1 native
    IP 10.60.90.1 255.255.255.0
    IP nat inside
    IP virtual-reassembly
    !
    interface FastEthernet0/1.2
    encapsulation dot1Q 2
    IP 10.60.89.1 255.255.255.0
    IP nat inside
    IP virtual-reassembly
    !
    interface Serial0/0/0
    no ip address
    Shutdown
    !
    Router eigrp 100
    Network 10.60.89.0 0.0.0.255
    Network 10.60.90.0 0.0.0.255
    No Auto-resume
    !
    IP forward-Protocol ND
    IP route 0.0.0.0 0.0.0.0 x.x.x.x
    !
    no ip address of the http server
    23 class IP http access
    local IP http authentication
    no ip http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    IP nat inside source map of route-nat interface FastEthernet0/0 overload
    IP nat inside source static tcp 10.60.89.10 80 80 extensible x.x.x.x
    IP nat inside source static tcp 10.60.89.10 expandable 443 443 x.x.x.x
    IP nat inside source static tcp 10.60.89.10 2021 x.x.x.x extensible 2021
    IP nat inside source static tcp 10.60.89.10 6100 6100 extensible x.x.x.x
    IP nat inside source static tcp 10.60.90.13 80 80 extensible x.x.x.x
    IP nat inside source static tcp 10.60.90.13 expandable 443 443 x.x.x.x
    IP nat inside source static tcp 10.60.90.13 1494 x.x.x.x extensible 1494
    !
    deny-hack-attack extended IP access list
    allow udp 0.255.255.255 x.x.x.x any eq snmp
    deny udp any any eq snmp
    deny udp any any eq tftp
    deny udp any any eq bootpc
    deny udp any any eq bootps
    deny ip x.x.x.x 0.15.255.255 all
    deny ip x.x.x.x 0.0.255.255 everything
    allow an ip
    !
    record 10.10.5.30
    access-list 23 allow 10.10.10.0 0.0.0.7
    access-list 99 allow 10.0.0.0 0.255.255.255
    access-list 99 allow x.x.x.x 0.0.1.255
    access-list 101 permit ip 10.60.90.0 0.0.0.255 10.10.0.0 0.0.255.255
    access-list 101 permit ip 10.60.89.0 0.0.0.255 10.10.0.0 0.0.255.255
    access-list 105 deny ip any host x.x.x.x
    105 ip access list allow a whole
    access-list 111 deny ip 10.60.90.0 0.0.0.255 10.10.0.0 0.0.255.255
    access-list 111 deny ip 10.60.89.0 0.0.0.255 10.10.0.0 0.0.255.255
    access-list 111 allow ip 10.60.89.0 0.0.0.255 any
    access-list 111 allow ip 10.60.90.0 0.0.0.255 any
    SNMP-server community no RO
    map of route-nat allowed 10
    corresponds to the IP 111
    !
    !
    RADIUS-server host x.x.x.x
    RADIUS-server key x
    !
    control plan
    !
    Banner motd ^ C

    x

    ^ C
    !
    Line con 0
    line to 0
    Modem InOut
    Discovery to automatically configure modem
    autohangup
    Speed 2400
    line vty 0 4
    location * Access Virtual Terminal allowed only from internal network *.
    access-class 99 in
    privilege level 15
    transport telnet entry
    line vty 5 15
    access-class 23 in
    privilege level 15
    transport telnet entry
    !
    Scheduler allocate 20000 1000
    end

    SRW2048 #1:

    Port 1: Trunk (to the router)

    Port 2: Trunk (SRW2048 #2)

    Prot 24: VLAN 2

    SRW2048 #2:

    Port 1: Trunk (of SRW2048 #1)

    Any ideas?

    Because the SRW is now part of Cisco Small Business, it would probably be best to ask the Cisco Small Business support community. You find people from Cisco over there.

    For SRW configuration, you added the two VLANS to your trunk ports? Configuration of a port in trunk mode adds automatically that all configured VLAN to the trunk.

    The server has a static IP address in the DMZ LAN?

  • Cisco 1841 to Vigor VPN

    Hi all

    I desperately need help. I spent the last 48 hrs trawling internet try to find how to set up secessfully

    I have port ports 80 and 443 forwarded for 78.25.xxx.xxx to our 192.168.6.65 local mail server. But all im presented with is unable to display the page when I try and connect to the external IP address on the local network. But if I try this address outside the local access network, then it works fine?

    My other problem I have is that I would like to setup 7 vpn which all dial for this router. They are configured to use ipsec with a preshared key ike. The dial of the router are vigor 2600-2820 series and I was going to use the following configuration to the cisco but it crashes card crypto cm-cryptomap.

    If anyone can help me I would really really appreciate it.

    Network configuration
    IP PUBLIC IP PRIVATE
    HUB (CISCO 1841) 192.168.6.0 SITE 78.XX. XXX.48
    SITE SPOKE (VIGOR 2600) 192.168.88.0 85.XX. XXX.85

    # tried vpn config that did not work.

    crypto ISAKMP policy 1
    md5 hash
    preshared authentication
    life 3600
    ISAKMP crypto key 123 address 85.189.xxx.xxx (site of talk)
    Crypto ipsec transform-set esp cm-transformset-1-esp-md5-hmac
    Dimensions of tunnel mib crypto ipsec flowmib history 200
    MIB crypto ipsec flowmib size of 200 historical failure
    Crypto card cm-cryptomap-address FastEthernet0/0
    cm-cryptomap 1 ipsec-isakmp crypto map
    defined by peer 85.189.155.85 (site of talk)
    the value of the transform-set cm-transformset-1
    match address 100

    interface FastEthernet0/0
    cm-cryptomap crypto card
    access-list 100 permit ip 192.168.6.0 0.0.0.255 192.168.88.0 0.0.0.255

    Here is the config complete less info vpn that works perfectly with bonded adsl
    # FULL CONFIG #.

    Current configuration: 3938 bytes
    !
    version 12.4
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    BURTON hostname
    !
    boot-start-marker
    boot-end-marker
    !
    activate the FBI secret 5
    activate the password xxxxxxxxxxx
    !
    No aaa new-model
    IP cef
    !
    !
    property intellectual auth-proxy max-nodata-& 3
    property intellectual admission max-nodata-& 3
    !
    !
    name of the IP-server 62.121.0.2
    name of the IP-server 195.54.225.10
    !
    !
    Crypto pki trustpoint TP-self-signed-692553461
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 692553461
    revocation checking no
    rsakeypair TP-self-signed-692553461
    !
    !
    TP-self-signed-692553461 crypto pki certificate chain
    certificate self-signed 01
    308201A 5 A0030201 02020101 3082023C 300 D 0609 2A 864886 F70D0101 04050030
    2 060355 04031325 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 30312E30
    69666963 36393235 35333436 31301E17 313031 31323431 34343930 0D 6174652D
    325A170D 2E302C06 1325494F 03550403 32303031 30313030 30303030 5A 303031
    532D 5365 6C662D53 69676E65 4365 72746966 69636174 652 3639 32353533 642D
    06092A 86 4886F70D 01010105 34363130 819F300D 00308189 02818100 0003818D
    BA51CDF7 D418D270 7DCE516E 1ADE6DF5 82FE4507 CD1EBE0A 4B6E4B15 9A3C20ED
    B1D19FC9 63D0B925 0A4611FF CE8D935C 264FC3FE DF8BFAC2 76EC38ED 68115F43
    20A68D85 C04A564E 8BDE86FE 127F79B4 8E123D9C 8430940C BCD5CDA4 ADAAE387
    FA1E14A6 ECF92197 0CF54E89 B33915E7 A4E01EC7 CE45DDF6 AA60D168 38C92E67
    02030100 01A 36630 03551 D 13 64300F06 0101FF04 05300301 01FF3011 0603551D
    11040A 30 08820642 5552544F 4E301F06 23 04183016 03551D 8014645E 3FDE4E90
    A8773580 81EE4217 F4821238 993A301D 0603551D 0E041604 14645E3F DE4E90A8
    77358081 EE4217F4 3A300D06 01040500 03818100 86F70D01 82123899 092A 8648
    B9B21771 6B8C0F9E C66B907A AC7A09BF 1FFCB332 0C7B6446 22483 HAS 32 5EE7D1FC
    128A 9224 30964615 E70FFE29 513455AB 6A1747C4 250070DF 4ABE123D 0A29DD8B
    E67A33F0 4E61AB87 9AE1D2DC 72741BE7 3A9AD79D 13B622B3 BCADCDAA 9D5EA74C
    567D AD429722 9AE90E13 7D80027F 4FA37A7F 65014 2852 HAS 45 43CB141C 36FCB96B
    quit smoking
    !
    !
    !
    !
    !
    !
    interface FastEthernet0/0
    Description $ETH - LAN$
    IP 192.168.6.40 255.255.255.0
    IP nat inside
    IP virtual-reassembly
    automatic duplex
    automatic speed
    !
    interface FastEthernet0/1
    no ip address
    Shutdown
    automatic duplex
    automatic speed
    !
    ATM0/0/0 interface
    no ip address
    no ip mroute-cache
    No atm ilmi-keepalive
    Bundle-enable
    DSL-automatic operation mode
    PVC 0/38
    aal5mux encapsulation ppp Dialer
    Dialer pool-member 1
    !
    !
    ATM0/1/0 interface
    no ip address
    no ip mroute-cache
    No atm ilmi-keepalive
    Bundle-enable
    DSL-automatic operation mode
    PVC 0/38
    aal5mux encapsulation ppp Dialer
    Dialer pool-member 1
    !
    !
    interface Dialer0
    the negotiated IP address
    NAT outside IP
    IP virtual-reassembly
    encapsulation ppp
    Dialer pool 1
    Dialer-Group 1
    PPP reliable link
    Authentication callin PPP chap Protocol
    PPP chap hostname [email protected] / * /
    PPP chap password 0 xxxxxxxx
    PPP ipcp dns request
    reorganizes the PPP link
    multilink PPP Panel
    PPP multilink sliding 16 mru
    period of PPP multilink fragment 10
    Panel multilink PPP interleave
    multiclass multilink PPP
    !
    IP forward-Protocol ND
    IP route 0.0.0.0 0.0.0.0 Dialer0
    !
    IP http server
    IP http secure server
    overload of IP nat inside source list 100 interface Dialer0
    IP nat inside source static tcp 192.168.6.65 25 interface Dialer0 25
    IP nat inside source static tcp 192.168.6.45 Dialer0 1723 1723 interface
    IP nat inside source static tcp 192.168.6.65 80 78.XX. XXX.61 extensible 80
    IP nat inside source static tcp 192.168.6.65 78.XX 443. XXX.61 extensible 443
    IP nat inside source static tcp 192.168.6.30 80 78.XX. XXX.62 extensible 80
    IP nat inside source static tcp 192.168.6.30 78.XX 443. XXX.62 extensible 443
    !
    access-list 100 permit ip 192.168.6.0 0.0.0.255 any
    Dialer-list 1 ip protocol allow
    public RO SNMP-server community
    !
    !
    control plan
    !
    !
    Line con 0
    line to 0
    line vty 0 4
    password xxxxxxxxxxxx
    opening of session
    !
    Scheduler allocate 20000 1000
    end

    Cryptography works fine it seems.

    The error you receive is I think because that side vigor is able to encrypt a subnet ip (range) that is not defined by Cisco.

    The force he sends down to Cisco and after decrypting the Security Association IPSEC is a fall because it does not part of interesting traffic.

    But, I guess you're already running.

  • L2l VPN with NAT static to hide the IP internal on Cisco 1841 ISR

    I configured a VPN L2L on a Cisco 1841 ISR.  I'm statically from some of my internal hosts to IPS that are included in encrypted traffic.  Please note that not all internal hosts are underway using a NAT.  I am doing this for hidden some of the actual IP addresses on the inside network.  I confirmed that the VPN works as well as natives of VPN traffic.  I configured VPN L2L traditionally on the Cisco ASA 5500 Series devices, and this is my first attempt with HIA of 1841.  I want just the other to take a glance to see if I missed something, or could I effectively part of the configuration.  All comments are welcome.

    VPN-RTR-01 #show run
    Building configuration...

    Current configuration: 9316 bytes
    !
    version 12.4
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    encryption password service
    !
    hostname VPN-RTR-01
    !
    boot-start-marker
    boot-end-marker
    !
    ! type map necessary for vwic/slot-slot 0/0 control
    logging buffered 51200 warnings
    no console logging
    enable secret 5 xxxxxxxxxxxxxxx
    enable password 7 xxxxxxxxxxxxxxx
    !
    No aaa new-model
    IP cef
    !
    !
    !
    !
    no ip domain search
    property intellectual auth-proxy max-nodata-& 3
    property intellectual admission max-nodata-& 3
    !
    !
    Crypto pki trustpoint TP-self-signed-2010810276
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 2010810276
    revocation checking no
    rsakeypair TP-self-signed-2010810276
    !
    !
    TP-self-signed-2010810276 crypto pki certificate chain
    certificate self-signed 01
    30820246 308201AF A0030201 02020101 300 D 0609 2A 864886 F70D0101 04050030
    2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 31312F30
    69666963 32303130 38313032 6174652D 3736301E 31393334 OF 30333131 170 3131
    30365A 17 0D 323030 31303130 30303030 305A 3031 06035504 03132649 312F302D
    4F532D53 5369676E 656C662D 43 65727469 66696361 74652 32 30313038 65642D
    31303237 3630819F 300 D 0609 2A 864886 01050003, 818, 0030, 81890281 F70D0101
    8100C3FF F5EADA3B BCB06873 5577DB24 2AD8ECBB 00D53F1A 37342E2E 5CC9202A
    7F128E51 016CD6EC D8734F4D 28BE8B0A FCD6B714 8D13585B 7844C09C 79BA8F13
    B75E4E98 25D91F02 A4773F66 83407A8B 85447 64 A6889DD9 6085857F 737F8A9F
    749F4297 8804C4F3 D28A6C33 F4137BBE 67F9B945 F239789E 1303AD6D DB98B7E2
    52B 50203 010001 HAS 3 1 130101 FF040530 030101FF 30190603 0F060355 6E306C30
    551 1104 12301082 0E535458 2D56504E 2 525452 2 303130 1 230418 1F060355 D
    3B 232987 30168014 2CBB9DD0 B34B7243 7F8095C8 7AFBEFE3 301D 0603 551D0E04
    1604143B 2329872C BB9DD0B3 4B72437F 8095C87A FBEFE330 0D06092A 864886F7
    010104 05000381 8100A 831 8E05114A DE8AF6C5 4CB45914 36B6427C 42B30F07 0D
    C5C47BC9 0110BCAA A985CB3F 5CBB855B B12D3225 B8021234 86D1952C 655071E4
    66C18F42 F84492A9 835DE884 341B3A95 A3CED4E8 F37E7609 88F52640 741D74D2
    37842 D 39 E5F2B208 0D4D57E1 C5633DEB ACDFC897 7D50683D 05B5FDAA E42714B4
    DD29E815 E9F90877 4 D 68
    quit smoking
    username privilege 15 password 7 xxxxxxxxxxxxxxx lhocin
    username privilege 15 password 7 xxxxxxxxxxxxxxx jsmith
    !
    !
    !
    !
    crypto ISAKMP policy 5
    BA aes 256
    preshared authentication
    Group 2
    lifetime 28800
    xxxxxxxxxxxxxxx key address 172.21.0.1 crypto ISAKMP xauth No.
    !
    !
    Crypto ipsec transform-set ESP-AES256-SHA esp - aes 256 esp-sha-hmac
    !
    card crypto SITES REMOTE VPN-ipsec-isakmp 1
    defined by peer 172.21.0.1
    game of transformation-ESP-AES256-SHA
    match address VPN-REMOTE-SITE
    !
    !
    !
    interface FastEthernet0/0
    no ip address
    automatic speed
    full-duplex
    No mop enabled
    !
    interface FastEthernet0/0.1
    encapsulation dot1Q 1 native
    !
    interface FastEthernet0/0.2
    Description $FW_INSIDE$
    encapsulation dot1Q 61
    IP 10.1.0.34 255.255.255.224
    IP access-group 100 to
    IP nat inside
    IP virtual-reassembly
    !
    interface FastEthernet0/0.3
    Description $FW_OUTSIDE$
    encapsulation dot1Q 111
    IP 172.20.32.17 255.255.255.224
    IP access-group 101 in
    Check IP unicast reverse path
    NAT outside IP
    IP virtual-reassembly
    crypto VPN-REMOTE-SITE map
    !
    interface FastEthernet0/1
    no ip address
    Shutdown
    automatic duplex
    automatic speed
    !
    IP forward-Protocol ND
    IP route 0.0.0.0 0.0.0.0 172.20.32.1
    IP route 10.16.0.0 255.255.0.0 10.1.0.33
    IP route 10.19.0.0 255.255.0.0 10.1.0.33
    IP route 10.191.0.0 255.255.0.0 10.1.0.33
    IP route 10.192.0.0 255.255.0.0 10.1.0.33
    IP route 192.168.20.48 255.255.255.240 10.1.0.33
    !
    !
    IP http server
    local IP http authentication
    IP http secure server
    IP http timeout policy inactive 600 life 86400 request 10000
    IP nat inside source map route NO_NAT interface FastEthernet0/0.3 overload
    IP nat inside source static 10.191.0.11 192.168.20.54 STATIC_NAT_7 card expandable route
    IP nat inside source static 10.191.0.12 192.168.20.55 STATIC_NAT_8 card expandable route
    IP nat inside source static 10.192.1.1 192.168.20.56 STATIC_NAT_1 card expandable route
    IP nat inside source static 10.192.1.2 192.168.20.57 STATIC_NAT_2 card expandable route
    IP nat inside source static 10.192.1.3 192.168.20.58 STATIC_NAT_3 card expandable route
    IP nat inside source static 10.192.1.4 192.168.20.59 STATIC_NAT_4 card expandable route
    IP nat inside source static 10.192.1.5 192.168.20.61 STATIC_NAT_5 card expandable route
    IP nat inside source static 10.16.1.6 192.168.20.62 STATIC_NAT_6 card expandable route
    !
    VPN-REMOTE-SITE extended IP access list
    IP 192.168.20.48 allow the host 0.0.0.15 10.174.52.39
    IP 192.168.20.48 allow the host 0.0.0.15 10.174.52.40
    inside_nat_static_1 extended IP access list
    permit ip host 10.192.1.1 10.174.52.39
    permit ip host 10.192.1.1 10.174.52.40
    refuse an entire ip
    inside_nat_static_2 extended IP access list
    permit ip host 10.192.1.2 10.174.52.39
    permit ip host 10.192.1.2 10.174.52.40
    refuse an entire ip
    inside_nat_static_3 extended IP access list
    permit ip host 10.192.1.3 10.174.52.39
    permit ip host 10.192.1.3 10.174.52.40
    refuse an entire ip
    inside_nat_static_4 extended IP access list
    permit ip host 10.192.1.4 10.174.52.39
    permit ip host 10.192.1.4 10.174.52.40
    refuse an entire ip
    inside_nat_static_5 extended IP access list
    permit ip host 10.192.1.5 10.174.52.39
    permit ip host 10.192.1.5 10.174.52.40
    refuse an entire ip
    inside_nat_static_6 extended IP access list
    permit ip host 10.16.1.6 10.174.52.39
    permit ip host 10.16.1.6 10.174.52.40
    refuse an entire ip
    inside_nat_static_7 extended IP access list
    permit ip host 10.191.0.11 10.174.52.39
    permit ip host 10.191.0.11 10.174.52.40
    refuse an entire ip
    inside_nat_static_8 extended IP access list
    permit ip host 10.191.0.12 10.174.52.39
    permit ip host 10.191.0.12 10.174.52.40
    refuse an entire ip
    !
    access-list 100 remark self-generated by the configuration of the firewall SDM
    Access-list 100 = 1 SDM_ACL category note
    access-list 100 deny ip 172.20.32.0 0.0.0.31 all
    access-list 100 deny ip 255.255.255.255 host everything
    access-list 100 deny ip 127.0.0.0 0.255.255.255 everything
    access ip-list 100 permit a whole
    Remark SDM_ACL category of access list 101 = 17
    access-list 101 permit udp any host 192.168.20.62
    access-list 101 permit tcp any host 192.168.20.62
    access-list 101 permit udp any host 192.168.20.61
    access-list 101 permit tcp any host 192.168.20.61
    access-list 101 permit udp any host 192.168.20.59
    access-list 101 permit tcp any host 192.168.20.59
    access-list 101 permit udp any host 192.168.20.58
    access-list 101 permit tcp any host 192.168.20.58
    access-list 101 permit udp any host 192.168.20.57
    access-list 101 permit tcp any host 192.168.20.57
    access-list 101 permit udp any host 192.168.20.56
    access-list 101 permit tcp any host 192.168.20.56
    access-list 101 permit udp any host 192.168.20.55
    access-list 101 permit tcp any host 192.168.20.55
    access-list 101 permit udp any host 192.168.20.54
    access-list 101 permit tcp any host 192.168.20.54
    access-list 101 permit ip 10.174.52.40 host 192.168.20.48 0.0.0.15
    access-list 101 permit ip 10.174.52.39 host 192.168.20.48 0.0.0.15
    access-list 101 permit udp host 172.21.0.1 host 172.20.32.17 eq non500-isakmp
    access-list 101 permit udp host 172.21.0.1 host 172.20.32.17 eq isakmp
    access-list 101 permit esp 172.21.0.1 host 172.20.32.17
    access-list 101 permit ahp host 172.21.0.1 172.20.32.17
    access-list 101 permit icmp any host 172.20.32.17 - response
    access-list 101 permit icmp any host 172.20.32.17 time limit
    access-list 101 permit icmp any unreachable host 172.20.32.17
    access-list 101 permit udp any host isakmp 172.20.32.17 newspaper eq
    access-list 101 permit udp any host 172.20.32.17 eq non500-isakmp
    access-list 101 permit tcp any host 172.20.32.17 eq 443
    access-list 101 permit tcp any host 172.20.32.17 eq 22
    access-list 101 permit tcp any host 172.20.32.17 eq cmd
    access-list 101 deny ip 10.1.0.32 0.0.0.31 all
    access-list 101 deny ip 10.0.0.0 0.255.255.255 everything
    access-list 101 deny ip 172.16.0.0 0.15.255.255 all
    access-list 101 deny ip 192.168.0.0 0.0.255.255 everything
    access-list 101 deny ip 127.0.0.0 0.255.255.255 everything
    access-list 101 deny ip 255.255.255.255 host everything
    access-list 101 deny host ip 0.0.0.0 everything
    access-list 101 deny ip any any newspaper
    access-list 102 deny ip 192.168.20.48 0.0.0.15 host 10.174.52.40
    access-list 102 deny ip 192.168.20.48 0.0.0.15 host 10.174.52.39
    access-list 102 permit ip 10.1.0.32 0.0.0.31 all
    !
    allowed NO_NAT 1 route map
    corresponds to the IP 102
    !
    STATIC_NAT_8 allowed 10 route map
    inside_nat_static_8 match ip address
    !
    STATIC_NAT_5 allowed 10 route map
    inside_nat_static_5 match ip address
    !
    STATIC_NAT_4 allowed 10 route map
    inside_nat_static_4 match ip address
    !
    STATIC_NAT_7 allowed 10 route map
    inside_nat_static_7 match ip address
    !
    STATIC_NAT_6 allowed 10 route map
    inside_nat_static_6 match ip address
    !
    STATIC_NAT_1 allowed 10 route map
    inside_nat_static_1 match ip address
    !
    STATIC_NAT_3 allowed 10 route map
    inside_nat_static_3 match ip address
    !
    STATIC_NAT_2 allowed 10 route map
    inside_nat_static_2 match ip address
    !
    !
    !
    control plan
    !
    !
    !
    Line con 0
    exec-timeout 30 0
    line to 0
    line vty 0 4
    privilege level 15
    local connection
    transport input telnet ssh
    line vty 5 15
    privilege level 15
    local connection
    transport input telnet ssh
    !
    Scheduler allocate 20000 1000
    end

    VPN-RTR-01 #.

    Hello

    Configuration looks ok to me.

    yet you can cross-reference with the following link:

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a0080223a59.shtml

    I hope this helps.

    Kind regards

    Anisha

    P.S.: Please mark this thread as answered if you feel that your query is resolved. Note the useful messages.

  • VPN between 2 routers Cisco 1841 (LAN to LAN)

    Hello

    I need to connect two offices (two different LAN) using routers cisco 1841 at both ends.

    Currently the two cisco router are in working condition and refer the internet LAN clients. (making the NAT).

    Can someone please tell us what is the easiest way to set up a VPN between two sites, so that LAN users to an office to access mail servers electronic/request to the office LAN.

    I understand that I need IPSec Site to Site VPN (I think).

    Anyonce can you please advise.

    Kind regards.

    s.nasheet wrote:

    Hi ,

    I need to connect two offices ( two different LAN's) together using cisco 1841 routers at both end.

    Currently both cisco router are in working order and  acting as a internet gateway to the LAN clients. ( doing NAT).

    Can anybody please advise what is the easiest method to configure VPN between two sites so that  LAN users at one office be able to access  the  email/application servers at the other LAN office.

    I understand I need IPSec Site to Site VPN  ( i think).

    Can anyonce please advise.

    Regards.

    Yes, you need a VPN site-to site. Start with this link which gives a number of examples to set up a VPN S2S between 2 routers Cisco.

    http://www.Cisco.com/en/us/Tech/tk583/TK372/tech_configuration_examples_list.html#anchor16

    Jon

  • How can I send a HTTP request to a web server using TCP?

    I'm writing a HTTP string to activate a script CGI, server of our company. It seems that the OPEN TCP CONNECTION works. Can I just use the TCP WRITE function to send the HTTP request string to the server?
    Thank you
    Tim

    I know that I probably would have finished faster if I had the Internet Toolbox, but the solution ends up being pretty simple with just the TCP features.
    Here is the solution, I came with yesterday (in the case where someone else needs) after searching Protocols TCP as suggested by "Laboratory Viewer" and examine details in the riding of developer. It ends up being only a string of 4 line.

    GET HTTP://proxyserver/path/file.asp?id=test HTTP/1.1
    HOMEroxyserver

    The first line of the string is made up of three things:
    (1) the GET command
    (2) the URL of the program target (in this case an ASP program that distributes a message preset)
    NOTE that in this case, the URL contained "HTTP://proxyserver" and not only the path to the file. If your not using a proxy server, you can probably omit the name of the server of the URL, but you must always the name of the host server to the second line.
    (3) the HTTP version used

    The second line is the host server.

    The last two lines are empty, but the two are apparently necessary to properly close the TCP request.

    Vi uses an OPEN TCP CONNECTION to connect to port 80, then the 4 line string is sent with a WRITING of TCP and the connection is closed with a NARROW CONNECTION of TCP.

    In my application, when the piece of equipment monitored by LabVIEW begins to enter a dangerous to use, LabVIEW uses this vi to send the HTTP request through the TCP connection and a program of target ASP on the company's web server. The ASP reads the message ID (? id = test) and sends the message page and the text messaging appropriate to maintenance and engineering personnel. People warned by text pagers are supposed to respond immediately.

    Our DSI wrote the ASP that allows you to set the ID of multiple message with different distribution lists. Each message is triggered with a different ID of the virtual instrument according to the gravity of the situation.

    Thanks to other amateurs who have published their questions and their answers. Hope someone else finds this useful.

  • the channel guide does not match the actual string

    the channel guide does not match the actual string that is to say PBS should be Channel 13 but is listed as channel 2 on the guide

    Hello James,.

    Welcome to the community of Sony.

    What is the model # of the TV?

    You can locate the model # of the TV from this link.

    You can try the steps mentioned on the underside of the base article of knowledge:

    http://www.KB.Sony.com/selfservice/documentLink.do?externalId=C408137

    Please mark it as "acceptable Solution" If you find this information useful.

    Kind regards

    Colby

  • signature of the oversized https request

    Hi, is it possible that we can trigger an alarm when an https request exceeds a certain size?

    I can define a type state.http signature using parameters such as the following? MaxRequestFieldLength takes into account the fragmentation of application data by ssl?

    -Direction = ToService

    -MaxRequestFieldLength = 1000000

    -servicePorts = 443

    -AlarmThrottle = FireOnce

    -MinHits = 1

    -ResetAfterIdle = 15

    -ThrottleInterval = 15

    -WantFlag = TRUE

    If this does not work, would you please suggest alternatives. Thank you.

    I looked into it, and it does not seem that this will really be feasible with the help of a personal signature. First, you must use the STRING. TCP engine for this. THE STATE. Engine HTTP needs context information in the HTTP stream in order to work properly. Because the HTTPS protocol is encrypted traffic, we have not these signals. So there's basically trying to count bytes in a HTTPS stream. Two problems here. First of all, the implementation of regex in STRING. TCP is limited to 512 ~ States for performance reasons. So, we will build only a model to 512 or more characters. This obviously does not follow the large desired patterns. Secondly, we need some sort of condition of single endpoint, a character model, at the end of the regex model with. Due to the random nature of characters in the encrypted HTTPS data, we do not have the guarantee that our terminator will not unexpectedly appear in the stream for giving us no good way to determine, we have reached the end of the search. This signature will probably be coded in a new engine.

  • How to use Layer 2 Ports on the Cisco 1841 router switch

    Hello

    I use the Cisco 1841 router with a single port layer 3 Fe0 and 8 Ports switched.

    I gave the IP on the Fe0 port which is connected to another router.

    Now I don't know how to use Layer 2 of the router switch ports.

    I tried to make one of the port as a Port of access by switchport mode access and connected my laptop and the same subnet given IP, but I can't ping my Fe0 IP port and vice versa, as I am also unable to ping my laptop router.

    Can someone explain to me how to use these ports on layer 2?

    Hi Muhammadatifmasood, take a look at the link below, I'm sure that you will find it useful.

    https://supportforums.Cisco.com/discussion/10919631/how-enable-routing-b...

    BenSamayoa

  • How to Setup Cisco 1841 as a site to site VPN VPN server, with watch guard

    I would like to implement a cisco 1841 as a VPN server to establish s IP VPN (site to another) of a watch guard firewall,.

    I have looked through some examples of cisco config, but can't seem to get a lot.

    Can you please send me sample config steps I need o perform on the cisco router? and what credentials must be awarded to watch keeps establishing a permanent VPN?

    emergency assistance will be greatly appreciated.

    The cisco router is configured as a lan to lan normal IPSEC tunnel, there is no difference when configuration to create a tunnel to a watchguard/sonicwall or all that peer will use, you can use this link as a guide:

    http://www.Cisco.com/en/us/products/HW/routers/ps221/products_configuration_example09186a008073e078.shtml

    If you have problems make me know.

  • VPN on Cisco 1841 router

    Hello

    I need to configure the vpn site to site on router cisco 1841, but the problem is that the router does not recognize the crypto comand.

    R1 #conf t
    Enter configuration commands, one per line.  End with CNTL/Z.
    R1 (config) #crypto?
    % Unrecognized command
    R1 (config) #crypto?
    % Unrecognized command
    R1 (config) #c?
    call call-history-mib id-carrier cdp
    chat script class-card clock SNC
    config-register connect plan control configuration

    R1 (config) #crypto isakmp policy 1

    ^
    Invalid entry % detected at ' ^' marker.

    R1 #sh worm
    Cisco IOS Software, 1841 (C1841-IPBASE-M), Version 12.4 (1 c), RELEASE SOFTWARE (fc1)
    Technical support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2005 by Cisco Systems, Inc.
    Updated Wednesday 25 October 05 17:10 by evmiller

    ROM: System Bootstrap, Version 12.3 T9 (8r), RELEASE SOFTWARE (fc1)

    the availability of CS-Khatlon-opio-01 is 2 days, 23 hours, 13 minutes
    System returned to ROM of charging at 16:07:44 TJK Friday, November 7, 2014
    System image file is "flash: c1841-ipbase - mz.124 - 1C.bin.

    Cisco 1841 (revision 6.0) with 114688K / 16384K bytes of memory.
    Card processor ID FCZ102110NQ
    2 FastEthernet interfaces
    Configuration of DRAM is 64 bits wide with disabled parity.
    191K bytes of NVRAM memory.
    31360K bytes of ATA CompactFlash (read/write)

    Configuration register is 0 x 3922

    Please help, how to set up vpn?

    Hello

    According to this output is more than clear that you do not have a k9 license applied to this router, this license will enable the security features on your IOS, in this case, you will need a permit of k9 with an activation key, and then you will be able to have available on your device encryption controls. Once you have that we can work on configuring site to site.

    Do not forget to rate!

    David Castro,

    Kind regards

  • Trying to prevent the firewall to respond to Https requests

    Current configuration

    -2 x ASA 5505 firewall, running 9.0.4; ASDM 7.1; Active mode / standby

    -With the help of Anyconnect v3.0.3054

    -VPN using IPSec only; SSL access is disabled.

    -Anyconnect manually installed on laptops.

    -Web portal Shutdown and the browser not found poster

    -Clientless SSL VPN is disabled.

    Here's my problem: (this problem is causing my external PCI analysis to failure, it is a failure because the https site use ssl3.0 or TLS 1.0)

    1. from an external PC, I open any browser and go to the IP address of my firewall (e.g. https://8.8.8.8)

    2. the browser gives a warning about an untrusted certificate.

    3. If I click on continue, then the browser tries to go to the Web portal connection but then shows the "Cannot display Page" page

    What I'm trying to do is to stop the firewall to respond to HTTPS requests to the address of WAN IP in the firewall; If I do step 1 of my problem, I want the browser timeout due to no response from the firewall.

    After reading the manuals of the admin and research on this problem, I hit a wall.

    Thank you

    VPN IPSec (IKEv2) remote access requires the use of SSL for the creation of the first session. As much as I know there is no way to avoid. You should explain to your listener that this is necessary and that the absence of other services on this interface is a control to compensate for the use of SSL.

    Sent by Cisco Support technique iPad App

  • Cisco 1841 ipsec tunnel protocol down after a minute

    I have a strange problem where im manages to get a tha cisco ipsec tunnel 1841 to a RV016 linksys/cisco for about a minute and ping/encrypt the packets through the linen for about a minute before it breaks down. I tried different configuration and it all results in the tunnel for a minute then descend to come. I don't know if im hitting a bug and decide to if im doing something wrong.

    any help is appreciated paul

    RV016 firmware 2.0.18

    Cisco 1841: C1841-ADVENTERPRISEK9-M), Version 12.4 (24) T

    my config

    no default isakmp crypto policy

    !

    crypto ISAKMP policy 1

    BA 3des

    md5 hash

    preshared authentication

    Group 2

    lifetime 28800

    ISAKMP crypto key address 0.0.0.0 eaton1234 0.0.0.0

    !

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac ESSTS

    transport mode

    no default crypto ipsec transform-set

    !

    Crypto ipsec profile ipsec_profile1

    Description in the location main site to site VPN tunnel

    game of transformation-ESSTS

    PFS group2 Set

    !

    !

    !

    !

    !

    !

    !

    Tunnel1 interface

    Description of the location of the hand

    IP unnumbered Serial0/0/0

    source of tunnel Serial0/0/0

    destination 209.213.x.x tunnel

    ipv4 ipsec tunnel mode

    tunnel path-mtu-discovery

    protection of ipsec profile ipsec_profile1 tunnel

    !

    a debug output

    Apr 24 16:42:07: IPSEC (validate_proposal_request): part #1 the proposal

    Apr 24 16:42:07: IPSEC (validate_proposal_request): part #1 of the proposal

    (Eng. msg key.) Local INCOMING = 209.213.xx.46, distance = 209.213.xx.164,.

    local_proxy = 10.20.86.0/255.255.255.0/0/0 (type = 4),

    remote_proxy = 10.0.0.0/255.255.255.0/0/0 (type = 4),

    Protocol = ESP, transform = NONE (Tunnel),

    lifedur = 0 and 0kb in

    SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 0

    Apr 24 16:42:07: mapdb Crypto: proxy_match

    ADR SRC: 10.20.86.0

    ADR DST: 10.0.0.0

    Protocol: 0

    SRC port: 0

    DST port: 0

    Apr 24 16:42:07: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)

    Apr 24 16:42:07: mapdb Crypto: proxy_match

    ADR SRC: 10.20.86.0

    ADR DST: 10.0.0.0

    Protocol: 0

    SRC port: 0

    DST port: 0

    Apr 24 16:42:07: IPSEC (policy_db_add_ident): src dest 10.0.0.0, 10.20.86.0, dest_port

    0

    Apr 24 16:42:07: IPSEC (create_sa): its created.

    (his) sa_dest = 209.213.xx.46, sa_proto = 50,.

    sa_spi = 0x4CF51011 (1291128849).

    sa_trans = sa_conn_id of hmac-sha-esp, esp-3des = 2045

    sa_lifetime(k/sec) = (4463729/3600)

    Apr 24 16:42:07: IPSEC (create_sa): its created.

    (his) sa_dest = 209.213.xx.164, sa_proto = 50,.

    sa_spi = 0x1EB77DAF (515341743).

    sa_trans = sa_conn_id of hmac-sha-esp, esp-3des = 2046

    sa_lifetime(k/sec) = (4463729/3600)

    Apr 24 16:42:07: % LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, sta changed

    you to

    Apr 24 16:42:07: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)

    Apr 24 16:42:07: IPSEC (key_engine_enable_outbound): rec would notify of ISAKMP

    Apr 24 16:42:07: IPSEC (key_engine_enable_outbound): select SA with spinnaker 515341743/50

    Apr 24 16:42:07: IPSEC (update_current_outbound_sa): update peer 209.213.xx.164 curre

    NT his outgoing to SPI 1EB77DAF

    Apr 24 16:42:12: IPSEC (key_engine): request timer shot: count = 1,.

    local (identity) = 209.213.xx.46, distance = 209.213.xx.164,

    local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    remote_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4)

    Apr 24 16:42:12: IPSEC (sa_request):,.

    (Eng. msg key.) Local OUTGOING = 209.213.xx.46, distance = 209.213.xx.164,.

    local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    remote_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    Protocol = ESP, transform = esp-3des esp-sha-hmac (Tunnel),

    lifedur = 3600 s and KB 4608000,

    SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 0

    Apr 24 16:42:42: IPSEC (key_engine): request timer shot: count = 2,.

    local (identity) = 209.213.xx.46, distance = 209.213.xx.164,

    local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    remote_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4)

    Apr 24 16:42:42: % LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, sta changed

    you all the downu

    All possible debugging has been disabled

    I would try to set up a VPN Interface virtual Tunnel on the IOS router base and the value of defined transformation in tunnel mode no transport.

    In history, I have had several issues with VPN between a router IOS and the series RV.

  • Cisco 1841 how vpn tunnels? default 100vpn?

    Hi everyone, I have read the previous posts and I read that the cisco 1841 can manage up to 100 default VPN tunnels.

    1. is this true?  (I enclose my worm of show)

    2. this version of IOS support SSL VPN tunnels as well?

    SH ver
    Cisco IOS Software, 1841 (C1841-ADVSECURITYK9-M), Version 12.4 (3i), VERSION of the SOFTWARE (fc2)
    Technical support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2007 by Cisco Systems, Inc.
    Updated Thursday 28 November 07 18:48 by stshen

    ROM: System Bootstrap, Version 12.4 (13r) T, RELEASE SOFTWARE (fc1)

    Uptime SPAREROUTER is 7 minutes
    System to regain the power ROM
    System image file is "flash: c1841-advsecurityk9 - mz.124 - 3i.bin".

    ... Output omitted

    Cisco 1841 (revision 7.0) with 234496 K/K 27648 bytes of memory.
    Card processor ID FTX1151Y0BQ
    2 FastEthernet interfaces
    1 module of virtual private network (VPN)
    Configuration of DRAM is 64 bits wide with disabled parity.
    191K bytes of NVRAM memory.
    62720K bytes of ATA CompactFlash (read/write)

    Configuration register is 0 x 2102

    SPAREROUTER #.

    Thank you

    Randall

    Hello

    I guess that means that the total number of vpn ipsec tunnels taken in charge by the router of SSL VPN AIM is 800.

    If you want only a SSL VPN without the AIM module can it be based on the license.

    Kind regards

    Anisha

    P.S.: Please mark this thread as answered if you feel that your query is resolved. Note the useful messages.

  • How to get AFExecuteThisScript to return the value of Net.HTTP.request (asynchronous)?

    I have an Acrobat only plugin, developed in 2005 VS.  Originally with Acrobat 7 SDK, now updated to use Acrobat 9 SDK.  The ultimate goal of this feature is to open a PDF file from a web server Agile: If a user string, a URL is created, a request sent to the URL, then pay back the answer.  The answer can be either the PDF itself or a string path to the PDF file.  I thought it would be easier to use the version of PDF path to simply open the new PDF of the http:// address.

    I created a folder level javascript with a call to Net.HTTP.request confidence.  I have a script that works when invoked from a menu item added by the folder level javascript file.  But when you use this same command in my C++ with AFExecuteThisScript code, I can't get the HTTP response to finish pending in the code for the result.

    The Net.HTTP.request and the asynchronous callbacks confuse me, so maybe that's my big problem.  I could not Net.HTTP.request to return a value in a service simple javascript right now, I'm trying to use a "global" variable in the JavaScript folder level and two calls.  The first call "sets" the global variable, the other "becomes" it.  But this seems to be the issue.  When I have my code debugging or stop execution, the part of the response of the Net.HTTP.request is never called.  But when I left to go beyond this step with error recovery, the answer appears later.

    So how kick off of the Net.HTTP.request and be notified when it's over?  either in JavaScript or VC ++?

    Any help is appreciated.  Even if the best option is to stream the file from the web server to a local file and then open the (this is the option that I take in another tool that runs outside of Acrobat).

    Here's the code.

    Javascript controls at the level of the files (urls truncated for the post)

    var THE_PATH = '';
    
    function setTHE_PATH ( gURL ) {
        console.println('setTHE_PATH Begin');
        var params =
        {
            cVerb: 'GET',
            cURL: gURL,
            oHandler: 
                {
                    response: function( msg, uri, e)
                    {
                        console.println('response method: Setting Path');
                        THE_PATH = SOAP.stringFromStream( msg );
                        console.println('<<' + THE_PATH + '>>');
                    }
                }
        };
        console.println('URL: ' + params.cURL + '\n  oHandler: ' + params.oHandler );
        console.println('Path: ' + THE_PATH );
        var netResult = trustedNetHTTPrequest(params);
        console.println('setTHE_PATH End');
        return THE_PATH;
    };
    
    trustedNetHTTPrequest = app.trustedFunction( 
        function ( params ) {
            console.println('trustedNetHTTPrequest begin');
            app.beginPriv();
            var netResult = Net.HTTP.request( params );
            app.endPriv();
            console.println('trustedNetHTTPrequest end');
            return netResult;
        }
    );
    

    Added MenuItems with JavaScript at the folder level

    app.addMenuItem( { 
        cName: "mysetTHE_PATH", 
        cUser: "set THE_PATH", cParent: "Tools", 
        cExec: "setTHE_PATH('http://......&getURL=true');",
        nPos: 0 
    } );    
    
    app.addMenuItem( { 
        cName: "mygetTHE_PATH", 
        cUser: "get THE_PATH", cParent: "Tools", 
        cExec: "console.println( THE_PATH );",
        nPos: 0 
    } );   
    

    Here's the JavaScript Console output when you run these two commands:

    setTHE_PATH Begin
    URL: http://......&getURL=true
      oHandler: [object Object]
    Path: 
    trustedNetHTTPrequest begin
    trustedNetHTTPrequest end
    setTHE_PATH End
    response method: Setting Path
    <<https://......DesiredFilename.pdf>>
    

    Here is the function in the plugin C++, with additional measures to prove AFExecuteThisScript works here

    sprintf(jsScript, "testVal='%s';event.value = testVal;", strURL.c_str() );
    AFExecuteThisScript( aPdDoc, jsScript, &pReturnValue );
    // After this, pReturnValue is the passed-in URL, as expected.
    sprintf(jsScript, "setTHE_PATH('%s');event.value = 'Step 1 Worked!!';", strURL.c_str() );
    AFExecuteThisScript( aPdDoc, jsScript, &pReturnValue );
    // After this, pReturnValue is 'Step 1 Worked!!', as expected.
    sprintf(jsScript, "event.value = THE_PATH;", strURL.c_str() );
    AFExecuteThisScript( aPdDoc, jsScript, &pReturnValue );
    // After this, pReturnValue is NULL
    

    This is the JavaScript Console output when you run the commands using the plugin (mode debugger, to wait after step 1)

    setTHE_PATH Begin
    URL: http://......&getURL=true
      oHandler: [object Object]
    Path: 
    trustedNetHTTPrequest begin
    trustedNetHTTPrequest end
    setTHE_PATH End
    

    Note that he never gets to the part of the "method of response.

    Thank you!

    Tim James

    You need not limit yourself to the plugin API. The requests HTTP from C/C++ is a fairly common condition, just observe the restrictions in my answer.

Maybe you are looking for