dial hard peer correspondent
Hello
I need help with this. We have a dial out peer and it is mapped on the incoming side and calls do not come out to the carrier. Instead the tower to the PBX.
PBX: 10.21.10.12
Carrier: 1.1.1.1
LAN cube: 10.21.10.250
The call: 13053284888
Called: 8889990 * 3051234567
!
Dial-peer voice voip 200
Carrier1 description come OUT
translation-profile outgoing Carrier1
destination-pattern 1 [2-9]... [2-9]......
session protocol sipv2
session target ipv4:1.1.1.1
!
Dial-peer voice voip 201
Description INCOMING FS
destination-model ^ 1... $
session protocol sipv2
session target ipv4:10.21.10.12
--------------------------------------------------------------------------
GUEST sip:[email protected]/ * / SIP/2.0
Via: SIP/2.0/UDP 10.21.10.12:5080; rport; branch = z9hG4bK4FSD31mDDt79e
Max-Forwards: 69
From: "1001" <> [email protected]/ * / >; tag = 4FcXBHZ4X3tZg
To: <> [email protected]/ * / >
Call ID: d49e922e-09be-1235-41bf-005056820b2e
CSeq: INVITATION 97726988
Contact: <> [email protected]/ * /: 5080; transport = udp; GW = f170dc57-cdf4-4115-933 c-7c9b5d4e1fed >
User-Agent: FreeSWITCH
Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, CONSULT, INFORM
Supported: timer, path, replaces
Allow-events: talk, waiting, Conference, see
Content-Type: application/sdp
Content-Disposition: session
Content-Length: 289
X - accountcode: 10.21.10.12
X-FS-Support: update_display, send_info
Remote-Party-ID: "1001" <> [email protected]/ * / >; left = call; screen = yes; intimacy = off
v = 0
o = FreeSWITCH 1476108761 1476108762 IN IP4 10.21.10.12
s = FreeSWITCH
c = IN IP4 10.21.10.12
t = 0 0
m = audio RTP/AVP 0 8 3 101 13 17344
a = rtpmap:0 PCMU/8000
a = rtpmap:8 PCMA/8000
a rtpmap:3 GSM/8000 =
a rtpmap:101 telephone-event/8000 =
a = fmtp:101 0-16
a = rtpmap:13 CN/8000
a = ptime:20
* 10 Oct 18:35:19.261: //-1/213CC85D9ABD/CCAPI/cc_api_display_ie_subfields:
cc_api_call_setup_ind_common:
Cisco-username = 13053284888
-ccCallInfo IE subfields-
Cisco-ani = 13053284888
Cisco-anitype = 0
Cisco-aniplan = 0
Cisco-anipi = 0
Cisco-anisi = 1
dest = 8889990 * 3051234567
Cisco-desttype = 0
Cisco-destplan = 0
Cisco-ISDS = FFFFFFFF
Cisco-rdn =
Cisco-rdntype = 0
Cisco-rdnplan = 0
Cisco-rdnpi =-1
Cisco-rdnsi =-1
Cisco-redirectreason = - 1 fwd_final_type = 0
final_redirectNumber =
hunt_group_timeout = 0
* 10 Oct 18:35:19.261: //-1/213CC85D9ABD/CCAPI/cc_api_call_setup_ind_common:
Interface = 0x23036E14, call Info)
Number = 13053284888, (Calling Name =) (TON = unknown, NPI = unknown, screening = User, spent, presentation = allowed).
Called number = 8889990 * 3051234567(TON=Unknown, NPI=Unknown);
The appeal translated = FALSE, Subscriber Type Str = unknown, FinalDestinationFlag = TRUE,
Incoming dial-peer = 200, progress Indication = NULL (0), Calling THE Present = TRUE,
Road Trkgrp Label source, label Trkgrp road target = CLID Transparent = FALSE), call Id = 1530
* 10 Oct 18:35:19.261: //-1/213CC85D9ABD/CCAPI/ccCheckClipClir:
In: Component number = 13053284888 (TON = unknown, NPI = unknown, screening = User, spent, presentation = allowed)
* 10 Oct 18:35:19.261: //-1/213CC85D9ABD/CCAPI/ccCheckClipClir:
Departures: Component number = 13053284888 (TONE = unknown, NPI = unknown = User, spent, screening presentation allowed =)
* 10 Oct 18:35:19.261: //-1/xxxxxxxxxxxx/CCAPI/cc_get_feature_vsa:
* 18:35:19.261 Oct 10: cc_get_feature_vsa success of malloc
* 10 Oct 18:35:19.261: //-1/xxxxxxxxxxxx/CCAPI/cc_get_feature_vsa:
* 18:35:19.261 Oct 10: number of cc_get_feature_vsa is 1
* 10 Oct 18:35:19.261: //-1/xxxxxxxxxxxx/CCAPI/cc_get_feature_vsa:
* 18:35:19.261 Oct 10: the FEATURE_VSA attributes are: feature_name:0, feature_time:592111880, feature_id:1482
* Oct 10 18:35:19.261: / / 1530, 213CC85D9ABD, CCAPI, cc_api_call_setup_ind_common:
Set up the event sent;
Call Info (number = 13053284888 (TON = unknown, NPI = unknown, screening = User, spent, presentation = allowed),)
Called number = 8889990 * 3051234567(TON=Unknown, NPI=Unknown))
* Oct 10 18:35:19.261: / / 1530, 213CC85D9ABD, CCAPI, cc_process_call_setup_ind:
Event = 0x22C44B78
* 10 Oct 18:35:19.261: //-1/xxxxxxxxxxxx/CCAPI/cc_setupind_match_search:
Try again with the demoted called number 8889990 * 3051234567
* Oct 10 18:35:19.261: / / 1530, 213CC85D9ABD, CCAPI, ccCallSetContext:
Context = 0x3DF0A054
* Oct 10 18:35:19.265: / / 1530, 213CC85D9ABD, CCAPI, cc_process_call_setup_ind:
> Handed CCAPI cid 1530 with tag 200 app '_ManagedAppProcess_Default '.
* Oct 10 18:35:19.265: / / 1530, 213CC85D9ABD, CCAPI, ccCallProceeding:
Progress Indication = NULL (0)
* Oct 10 18:35:19.265: / / 1530, 213CC85D9ABD, CCAPI, ccCallDisconnect:
Value = 1, Tag = 0x0, entry calls (previous disconnection Cause = 0, remove the Cause = 0)
* Oct 10 18:35:19.265: / / 1530, 213CC85D9ABD, CCAPI, ccCallDisconnect:
Value = 1, entered calls (Responsed = TRUE, Cause value = 1)
* Oct 10 18:35:19.265: / / 1530/213CC85D9ABD/SIP/Msg/ccsipDisplayMsg:
Envoy:
SIP/2.0 100 trying
Via: SIP/2.0/UDP 10.21.10.12:5080; rport; branch = z9hG4bK4FSD31mDDt79e
From: "1001" <> [email protected]/ * / >; tag = 4FcXBHZ4X3tZg
To: <> [email protected]/ * / >
Date: Monday, October 10, 2016 18:35:19 GMT
Call ID: d49e922e-09be-1235-41bf-005056820b2e
CSeq: INVITATION 97726988
Allow-events: telephone-event
Server: Cisco-SIPGateway/IOS-15.2.4.M7
Content-Length: 0
* Oct 10 18:35:19.265: / / 1530/213CC85D9ABD/SIP/Msg/ccsipDisplayMsg:
Envoy:
SIP/2.0 404 not found
Via: SIP/2.0/UDP 10.21.10.12:5080; rport; branch = z9hG4bK4FSD31mDDt79e
From: "1001" <> [email protected]/ * / >; tag = 4FcXBHZ4X3tZg
To: <> [email protected]/ * / >; tag = 969 D 148-ACD
Date: Monday, October 10, 2016 18:35:19 GMT
Call ID: d49e922e-09be-1235-41bf-005056820b2e
CSeq: INVITATION 97726988
Allow-events: telephone-event
Server: Cisco-SIPGateway/IOS-15.2.4.M7
Reason: Q.850; cause = 1
Content-Length: 0
* 10 Oct 18:35:19.265: //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg:
Received:
SIP ACK:[email protected]/ * / SIP/2.0
Via: SIP/2.0/UDP 10.21.10.12:5080; rport; branch = z9hG4bK4FSD31mDDt79e
Max-Forwards: 69
From: "1001" <> [email protected]/ * / >; tag = 4FcXBHZ4X3tZg
To: <> [email protected]/ * / >; tag = 969 D 148-ACD
Call ID: d49e922e-09be-1235-41bf-005056820b2e
CSeq: ACK 97726988
Content-Length: 0
Always 2 dial peers matching a dial incoming peer and a dial out peer.
so now the counterpart of incoming dial from freeswitch you need a counterpart of incoming dialing, probably get you matched on component number (who represents the family number (s) call number on the freeswitch. then put a translation model to the same inbound dial peer, who 8889990 prefixes * the outgoing dialpeer to create a n, which corresponds to 8889990 * 3051234567 as a model and that it points to the IP address of) your carrier. That's the theory, you must follow
Tags: Cisco Support
Similar Questions
-
Help setting up Dial-Peer in the CME
Hello experts,
I tried to set up my network voice for 2 days but no luck.
Here is my scenario:
CUCM
CME
IRIS PBX
+++ Posted inside Config.
CME and PBX are PRI resources; I can see active layer 1 and Layer 2 multi_Frame_Established in 'display the ISDN State '.
SIP trunk of CUCM to established CMF.
Cannot communicate registered CUCM to analog phones in PBX Voip phones.
Several times analog voip calls work and then some changes in the PBX, which in fact shit once again. (Those that have been made by PBX technician)
VoIP ext: 1003
Analog position: 270
!! for voip analog calls
In CUCM:
Routing model: 9XXX--> to the trunk of the CME
In the CME:
The destination model: 9... --> E1 card (with auto stripping)
!! for analog / voip calls
In PBX access code 4 and stripped when sending guys.
that the means to post analogue for reach 1003 user consist 41003 and 4 will be stripped.
In the CME:
The destination model: 1... --> session target ipv4:
With this configuration in the 'debugging ccapi inout"see"transfer number is NULL"and
in the "show history of last calls 1" am see reason code "1 c" - invalid number.
After some research, this are my ideas but not tested:
1. I have incoming dial Exchange files corresponds to the movement of e1 card:
voice pots Dial-peer X
incoming called-number. T
(2) I have to configure dtmf-relay-notify sip and dtmf-relay rtp - nte to accept the numbers of telephone service.
(3) need to create any DIDs for incoming calls to pbx?
Please help me on this point, how could I get from analog to voip calls and vice versa, which I think is fair? If this is not the case, what would be the alternatives? where we should use the dtmf-relay command. ?
Thanks to all in advance.
Current config:
type 0 1 e1 card
network-clock-participate wic 1
network-clock-select 1 E1 1/0/1
primary-qsig ISDN switch type
voip phone service
h323 connections allow h323
allow connections h323 to SIP
allow connections sip h323
allow sip to sip connections
no service additional h450.2
no service additional h450.3
Fax protocol t38 ls-redundancy version 0 0 hs-redundancy 0 help none
SIP
Registration Server expires max 600 min 60
no update-callerid
!
voice class codec 1
preferably 1 codec g729br8
codec preference 2 g729r8
g723ar63 preferably 3 codec
g711ulaw codec preference 4
g711alaw preferably 5 codec
!
controller E1 1/0/1
No.-CRC4 framing
time intervals PRI - Group 1-31
!
Voice-port 1/0/1:15
Capitalization in the carrier speech
MGCP
MGCP behavior considered range tgcp only
MGCP comedia-role behavior no
disable the behavior MGCP comedia-check-media-src
disable the behavior of MGCP comedia-sdp-force
!
profile MGCP default
!
!
!
!
Dial-peer voice 3 pots
destination-style 9...
port 0/1/1:15
!
Dial-peer voice 1 voip
destination-model 1...
session target ipv4:10.15.108.242
!
!
!
!
access controller
Shutdown
!
!
phone service
MAX conferences 8-6 win
transfer full-consult system
!
!OK, lets delete all of your peers-Dial and start from scratch.
For testing purposes, we will test with specific numbers. We can get more general thereafter. Try the following tips for incoming traffic.
voice pots Dial-peer 10
/ / DESC # incoming Iris PBX #.
incoming called-number.
direct line to inside
Forward-digits all theThen lets try this for your Call Manager Dial-Peer
Dial-peer voice voip 20
destination-model 501
session protocol sipv2
session target ipv4: CUCM_IP
If please retest and propose some outputs fresh showing.
debugging ccapi inout voice
ccsip debug messages
Debug ISDN q931
-
I need help finding this hard drive HP
I'll try to find a second hard drive corresponding to buy for my laptop but I can't find it on the hp website. I have not spent one hour and no luck, geese. in any case, my laptop computer and a hard drive is:
HP dv7-6c95dx
750 GB HDD at 5400 RPM with HP ProtectSmart hard drive Protection
I want to get another hard drive, exactly like the one above, so the two hard drives are a matching pair.
Then I have to find the special cable for it, yes an another headache. any help would be a great guy, thank you...
Maintenance & Service dv7 notebook guidehas the information you need. See the list of parts shown for the part number.
From the Manual:
Supports the following double hard drive
configurations:
● 2 TB: (1 TB, 5400 RPM, 12.5 mm × 2)
● 1500 GB: (750 GB, 7200 RPM, 9.5 mm × 2)
● 1500 GB: (750 GB, 5400 RPM, 9.5 mm × 2)
● 1 TB: (500 GB, 5400 RPM, 9.5 mm × 2)Hard drive (2, 2.5-inch, SATA, does not include support, connection cable, Shield of Mylar or screw):
1 TB 5400 RPM, 12.7 mm 638974-001
750 GB, 7200 RPM, 9.5 mm 633252-001
750 GB, 5400 RPM, 9.5 mm 634250-001
640 GB, 5400 RPM, 9.5 mm 603785-001
500 GB, 7200 RPM, 9.5 mm 608218-001
500 GB, 5400 RPM, 9.5 mm 634932-001
320 GB, 7200 RPM, 9.5 mm 634862-001
320 GB, 5400 RPM, 9.5 mm 622643-001Hard disk hardware kit (not shown, includes support, connector cable, Mylar)
Shield and screws) 665597-001You can order parts by parts HP online store. You can save some money by ordering identical pieces from another provider online.
-
Problem router Cisco and Checkpoint VPN
Hello
I couldn't establish vp from site to site between cisco and checkpoint. Can you please check the logs?
Thank you.
* 29 sept 08:17:22.627: IPSEC (sa_request):,.
(Eng. msg key.) Local OUTGOING = Y.Y.Y.Y:500, distance = X.X.X.X:500,
local_proxy = 192.168.222.0/255.255.255.0/256/0,
remote_proxy = 10.0.10.0/255.255.255.0/256/0,
Protocol = ESP, transform = esp - aes 256 esp-sha-hmac (Tunnel),
lifedur = 3600 s and KB 4608000,
SPI = 0 x 0 (0), id_conn = 0, keysize = 256, flags = 0 x 0
* 29 sep 08:17:22.631: ISAKMP: (0): profile of THE request is (NULL)
* 29 sep 08:17:22.631: ISAKMP: created a struct peer X.X.X.X, peer port 500
* 29 sep 08:17:22.631: ISAKMP: new created position = 0x88AD1AB0 peer_handle = 0 x 80000004
* 29 sep 08:17:22.631: ISAKMP: lock struct 0x88AD1AB0, refcount 1 to peer isakmp_initiator
* 29 sep 08:17:22.631: ISAKMP: 500 local port, remote port 500
* 29 sep 08:17:22.631: ISAKMP: set new node 0 to QM_IDLE
* 29 sep 08:17:22.631: ISAKMP: (0): insert his with his 88AF7D94 = success
* 29 sep 08:17:22.631: ISAKMP: (0): cannot start aggressive mode, try the main mode.
* 29 sep 08:17:22.631: ISAKMP: (0): pre-shared key found peer corresponding X.X.X.X
* 29 sep 08:17:22.631: ISAKMP: (0): built of NAT - T of the seller-rfc3947 ID
* 29 sep 08:17:22.631: ISAKMP: (0): built the seller-07 ID NAT - t
* 29 sep 08:17:22.631: ISAKMP: (0): built of NAT - T of the seller-03 IDexit
Router (config) #n
* 29 sep 08:17:22.631: ISAKMP: (0): built the seller-02 ID NAT - t
* 08:17:22.631 Sept. 29: ISAKMP: (0): entry = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
* 08:17:22.631 Sept. 29: ISAKMP: (0): former State = new State IKE_READY = IKE_I_MM1* 29 sep 08:17:22.631: ISAKMP: (0): Beginner Main Mode Exchange
* 29 sep 08:17:22.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
* 08:17:22.631 Sept. 29: ISAKMP: (0): a Packet.o IKE IPv4 send* 29 sep 08:17:32.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
* 29 sep 08:17:32.631: ISAKMP (0): increment the count of errors on his, try 1 5: retransmit the phase 1
* 29 sep 08:17:32.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE
* 29 sep 08:17:32.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
* 08:17:32.631 Sept. 29: ISAKMP: (0): sending of a CPVPN IKE IPvaccess lists* 29 sep 08:17:42.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
* 29 sep 08:17:42.631: ISAKMP (0): increment the count of errors on his, try 2 of 5: retransmit the phase 1
* 29 sep 08:17:42.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE
* 29 sep 08:17:42.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
* 08:17:42.631 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE...
* 29 sep 08:17:52.627: IPSEC (key_engine): request timer shot: count = 1,.
local (identity) = Y.Y.Y.Y:0, distance = X.X.X.X:0,
local_proxy = 192.168.222.0/255.255.255.0/256/0,
remote_proxy = 10.0.10.0/255.255.255.0/256/0
* 29 sept 08:17:52.627: IPSEC (sa_request):,.
(Eng. msg key.) Local OUTGOING = Y.Y.Y.Y:500, distance = X.X.X.X:500,
local_proxy = 192.168.222.0/255.255.255.0/256/0,
remote_proxy = 10.0.10.0/255.255.255.0/256/0,
Protocol = ESP, transform = esp - aes 256 esp-sha-hmac (Tunnel),
lifedur = 3600 s and KB 4608000,
SPI = 0 x 0 (0), id_conn = 0, keysize = 256, flags = 0 x 0
* 29 sep 08:17:52.627: ISAKMP: set new node 0 to QM_IDLE
* 29 sep 08:17:52.627: ISAKMP: (0): SA is still budding. Attached new request ipsec. (local Y.Y.Y.Y, distance X.X.X.X)
* 29 sep 08:17:52.627: ISAKMP: error during the processing of HIS application: failed to initialize SA
* 29 sep 08:17:52.627: ISAKMP: error while processing message KMI 0, error 2.
* 29 sep 08:17:52.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
* 29 sep 08:17:52.631: ISAKMP (0): increment the count of errors on his, try 3 of 5: retransmit the phase 1
* 29 sep 08:17:52.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE
* 29 sep 08:17:52.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
* 08:17:52.631 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
* 29 sep 08:18:02.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
* 29 sep 08:18:02.631: ISAKMP (0): increment the count of errors on his, try 4 out 5: retransmit the phase 1
* 29 sep 08:18:02.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE
* 29 sep 08:18:02.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
* 08:18:02.631 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
* 29 sep 08:18:12.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
* 29 sep 08:18:12.631: ISAKMP (0): increment the count of errors on his, try 5 of 5: retransmit the phase 1
* 29 sep 08:18:12.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE
* 29 sep 08:18:12.631: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
* 08:18:12.631 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
* 29 sep 08:18:22.627: IPSEC (key_engine): request timer shot: count = 2,.
local (identity) = Y.Y.Y.Y:0, distance = X.X.X.X:0,
local_proxy = 192.168.222.0/255.255.255.0/256/0,
remote_proxy = 10.0.10.0/255.255.255.0/256/0
* 29 sep 08:18:22.631: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
* 29 sep 08:18:22.631: ISAKMP: (0): the peer is not paranoid KeepAlive.* 29 sep 08:18:22.631: ISAKMP: (0): removal of reason ITS status of 'Death by retransmission P1' (I) MM_NO_STATE (peer X.X.X.X)
* 29 sep 08:18:22.631: ISAKMP: (0): removal of reason ITS status of 'Death by retransmission P1' (I) MM_NO_STATE (peer X.X.X.X)
* 29 sep 08:18:22.631: ISAKMP: Unlocking counterpart struct 0x88AD1AB0 for isadb_mark_sa_deleted(), count 0
* 29 sep 08:18:22.631: ISAKMP: delete peer node by peer_reap for X.X.X.X: 88AD1AB0
* 29 sep 08:18:22.631: ISAKMP: (0): node-930113685 error suppression FALSE reason 'IKE deleted.
* 29 sep 08:18:22.631: ISAKMP: (0): error suppression node 661004686 FALSE reason 'IKE deleted.
* 08:18:22.631 Sept. 29: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
* 08:18:22.631 Sept. 29: ISAKMP: (0): former State = new State IKE_I_MM1 = IKE_DEST_SA* 29 sep 08:18:22.631: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)
* 29 sept 08:18:27.559: IPSEC (sa_request):,.
(Eng. msg key.) Local OUTGOING = Y.Y.Y.Y:500, distance = X.X.X.X:500,
local_proxy = 192.168.222.0/255.255.255.0/256/0,
remote_proxy = 10.0.10.0/255.255.255.0/256/0,
Protocol = ESP, transform = esp - aes 256 esp-sha-hmac (Tunnel),
lifedur = 3600 s and KB 4608000,
SPI = 0 x 0 (0), id_conn = 0, keysize = 256, flags = 0 x 0
* 29 sep 08:18:27.559: ISAKMP: (0): profile of THE request is (NULL)
* 29 sep 08:18:27.559: ISAKMP: created a struct peer X.X.X.X, peer port 500
* 29 sep 08:18:27.559: ISAKMP: new created position = 0x85EDF1F0 peer_handle = 0 x 80000005
* 29 sep 08:18:27.559: ISAKMP: lock struct 0x85EDF1F0, refcount 1 to peer isakmp_initiator
* 29 sep 08:18:27.559: ISAKMP: 500 local port, remote port 500
* 29 sep 08:18:27.559: ISAKMP: set new node 0 to QM_IDLE
* 29 sep 08:18:27.559: ISAKMP: find a dup her to the tree during the isadb_insert his 88C1CE60 = call BVA
* 29 sep 08:18:27.559: ISAKMP: (0): cannot start aggressive mode, try the main mode.
* 29 sep 08:18:27.559: ISAKMP: (0): pre-shared key found peer corresponding X.X.X.X
* 29 sep 08:18:27.559: ISAKMP: (0): built of NAT - T of the seller-rfc3947 ID
* 29 sep 08:18:27.559: ISAKMP: (0): built the seller-07 ID NAT - t
* 29 sep 08:18:27.559: ISAKMP: (0): built of NAT - T of the seller-03 ID
* 29 sep 08:18:27.559: ISAKMP: (0): built the seller-02 ID NAT - t
* 08:18:27.559 Sept. 29: ISAKMP: (0): entry = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
* 08:18:27.559 Sept. 29: ISAKMP: (0): former State = new State IKE_READY = IKE_I_MM1* 29 sep 08:18:27.559: ISAKMP: (0): Beginner Main Mode Exchange
* 29 sep 08:18:27.559: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
* 08:18:27.559 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
* 29 sep 08:18:37.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
* 29 sep 08:18:37.559: ISAKMP (0): increment the count of errors on his, try 1 5: retransmit the phase 1
* 29 sep 08:18:37.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE
* 29 sep 08:18:37.559: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
* 08:18:37.559 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
* 29 sep 08:18:47.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
* 29 sep 08:18:47.559: ISAKMP (0): increment the count of errors on his, try 2 of 5: retransmit the phase 1
* 29 sep 08:18:47.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE
* 29 sep 08:18:47.559: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
* 08:18:47.559 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.* 29 sep 08:18:57.559: IPSEC (key_engine): request timer shot: count = 1,.
local (identity) = Y.Y.Y.Y:0, distance = X.X.X.X:0,
local_proxy = 192.168.222.0/255.255.255.0/256/0,
remote_proxy = 10.0.10.0/255.255.255.0/256/0
* 29 sept 08:18:57.559: IPSEC (sa_request):,.
(Eng. msg key.) Local OUTGOING = Y.Y.Y.Y:500, distance = X.X.X.X:500,
local_proxy = 192.168.222.0/255.255.255.0/256/0,
remote_proxy = 10.0.10.0/255.255.255.0/256/0,
Protocol = ESP, transform = esp - aes 256 esp-sha-hmac (Tunnel),
lifedur = 3600 s and KB 4608000,
SPI = 0 x 0 (0), id_conn = 0, keysize = 256, flags = 0 x 0
* 29 sep 08:18:57.559: ISAKMP: set new node 0 to QM_IDLE
* 29 sep 08:18:57.559: ISAKMP: (0): SA is still budding. Attached new request ipsec. (local Y.Y.Y.Y, distance X.X.X.X)
* 29 sep 08:18:57.559: ISAKMP: error during the processing of HIS application: failed to initialize SA
* 29 sep 08:18:57.559: ISAKMP: error while processing message KMI 0, error 2.
* 29 sep 08:18:57.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
* 29 sep 08:18:57.559: ISAKMP (0): increment the count of errors on his, try 3 of 5: retransmit the phase 1
* 29 sep 08:18:57.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE
* 29 sep 08:18:57.559: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
Router #.
Router #.
* 08:18:57.559 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
* 29 sep 08:19:07.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE...
* 29 sep 08:19:07.559: ISAKMP (0): increment the count of errors on his, try 4 out 5: retransmit the phase 1
* 29 sep 08:19:07.559: ISAKMP: (0): transmit phase 1 MM_NO_STATE
* 29 sep 08:19:07.559: ISAKMP: (0): package to X.X.X.X my_port 500 peer_port 500 (I) sending MM_NO_STATE
* 08:19:07.559 Sept. 29: ISAKMP: (0): sending a packet IPv4 IKE.
Router #.
Router #un all
All possible debugging has been disabledThe log shows main mode setup has failed. See if this helps: http://www.itcertnotes.com/2011/04/ipsec-stuck-in-mmsasetup-and-mmnostat...
-
Tunnel VPN IPSEC site 2 Site will not appear.
Hello Experts,
I was wondering if I can get help on creating an IPSEC VPN between a Cisco 2921 and ASA 550 x tunnel. Here is the config
See the race | s crypto
Crypto pki token removal timeout default 0
crypto ISAKMP policy 1
BA aes
preshared authentication
Group 2
lifetime 28800
ISAKMP crypto key address A.A.A.A xxxxxxxxxxxxxxxxxxxxxx
Crypto ipsec transform-set ESP-AES128-SHA aes - esp esp-sha-hmac
transport mode
ICQ-2-ILAND 1 ipsec-isakmp crypto map
defined by peer A.A.A.A
game of transformation-ESP-AES128-SHA
match the address iland_london_s2s_vpn
ICQ-2-ILAND crypto card
The config on the remote end has not been shared with me, so I don't know if I'm doing something wrong locally, or if the remote end is configured incorrectly.
The command Sh crypto isakmp its the following message
ISAKMP crypto to show his
IPv4 Crypto ISAKMP Security Association
DST CBC conn-State id
A.A.A.A B.B.B.B MM_NO_STATE 1231 ACTIVE (deleted)IPv6 Crypto ISAKMP Security Association
See the session encryption
Current state of the session cryptoInterface: GigabitEthernet0/0
The session state: DOWN-NEGOTIATION
Peer: Port A.A.A.A 500
IKEv1 SA: local B.B.B.Bremote 500 A.A.A.A500 inactive
IKEv1 SA: local B.B.B.Bremote 500 A.A.A.A500 inactive
FLOW IPSEC: allowed ip 10.20.111.0/255.255.255.0 10.120.1.0/255.255.255.0
Active sAs: 0, origin: card crypto
FLOW IPSEC: allowed ip 10.10.0.0/255.255.0.0 10.120.1.0/255.255.255.0
Active sAs: 0, origin: card cryptoThe command debug crypto isakmp debug logs are listed below.
ISAKMP: (0): pre-shared key local found
08:51:52.019 on 6 Dec: ISAKMP: analysis of the profiles for xauth...
08:51:52.019 on 6 Dec: ISAKMP: (0): audit ISAKMP transform 1 against the policy of priority 1
08:51:52.019 on 6 Dec: ISAKMP: AES - CBC encryption
08:51:52.019 on 6 Dec: ISAKMP: keylength 128
08:51:52.019 on 6 Dec: ISAKMP: SHA hash
08:51:52.019 on 6 Dec: ISAKMP: group by default 2
08:51:52.019 on 6 Dec: ISAKMP: pre-shared key auth
08:51:52.019 on 6 Dec: ISAKMP: type of life in seconds
08:51:52.019 on 6 Dec: ISAKMP: life (basic) of 28800
08:51:52.019 on 6 Dec: ISAKMP: (0): atts are acceptable. Next payload is 0
08:51:52.019 on 6 Dec: ISAKMP: (0): Acceptable atts: real life: 0
08:51:52.019 on 6 Dec: ISAKMP: (0): Acceptable atts:life: 0
08:51:52.019 on 6 Dec: ISAKMP: (0): base life_in_seconds:28800
08:51:52.019 on 6 Dec: ISAKMP: (0): return real life: 28800
08:51:52.019 on 6 Dec: ISAKMP: (0): timer life Started: 28800.DEC 6 08:51:52.019: ISAKMP: (0): load useful vendor id of treatment
DEC 6 08:51:52.019: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123
DEC 6 08:51:52.019: ISAKMP: (0): provider ID is NAT - T v2
DEC 6 08:51:52.019: ISAKMP: (0): load useful vendor id of treatment
DEC 6 08:51:52.019: ISAKMP: (0): IKE frag vendor processing id payload
08:51:52.019 on 6 Dec: ISAKMP: (0): IKE Fragmentation support not enabled
08:51:52.019 on 6 Dec: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
08:51:52.019 on 6 Dec: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM2DEC 6 08:51:52.019: ISAKMP: (0): A packet is sent. A.A.A my_port 500 peer_port 500 (I) MM_SA_SETUP
08:51:52.019 on 6 Dec: ISAKMP: (0): sending a packet IPv4 IKE.
08:51:52.019 on 6 Dec: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
08:51:52.019 on 6 Dec: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM308:51:52.155 on 6 Dec: ISAKMP (0): packet received dport 500 sport Global 500 (I) MM_SA_SETUP A.A.A.A
08:51:52.155 on 6 Dec: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
08:51:52.155 on 6 Dec: ISAKMP: (0): former State = new State IKE_I_MM3 = IKE_I_MM4DEC 6 08:51:52.155: ISAKMP: (0): processing KE payload. Message ID = 0
DEC 6 08:51:52.175: ISAKMP: (0): processing NONCE payload. Message ID = 0
08:51:52.175 on 6 Dec: ISAKMP: (0): pre-shared key found peer corresponding to A.A.A.A
DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
DEC 6 08:51:52.175: ISAKMP: (1227): provider ID is the unit
DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
DEC 6 08:51:52.175: ISAKMP: (1227): provider ID seems the unit/DPD but major incompatibility of 92
DEC 6 08:51:52.175: ISAKMP: (1227): provider ID is XAUTH
DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
DEC 6 08:51:52.175: ISAKMP: (1227): addressing another box of IOS!
DEC 6 08:51:52.175: ISAKMP: (1227): load useful vendor id of treatment
08:51:52.175 on 6 Dec: ISAKMP: (1227): vendor ID seems the unit/DPD but hash mismatch
08:51:52.175 on 6 Dec: ISAKMP: receives the payload type 20
08:51:52.175 on 6 Dec: ISAKMP (1227): sound not hash no match - this node outside NAT
08:51:52.175 on 6 Dec: ISAKMP: receives the payload type 20
08:51:52.175 on 6 Dec: ISAKMP (1227): No. NAT found for oneself or peer
08:51:52.175 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
08:51:52.179 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM4 = IKE_I_MM408:51:52.179 on 6 Dec: ISAKMP: (1227): send initial contact
08:51:52.179 on 6 Dec: ISAKMP: (1227): ITS been pre-shared key, using id ID_IPV4_ADDR type authentication
08:51:52.179 on 6 Dec: ISAKMP (1227): payload ID
next payload: 8
type: 1
address: B.B.B.B
Protocol: 17
Port: 500
Length: 12
08:51:52.179 on 6 Dec: ISAKMP: (1227): the total payload length: 12
DEC 6 08:51:52.179: ISAKMP: (1227): A packet is sent. A.A.A my_port 500 peer_port 500 (I) MM_KEY_EXCH
08:51:52.179 on 6 Dec: ISAKMP: (1227): sending a packet IPv4 IKE.
08:51:52.179 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
08:51:52.179 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM4 = IKE_I_MM508:51:52.315 on 6 Dec: ISAKMP (1227): packet received dport 500 sport Global 500 (I) MM_KEY_EXCH A.A.A.A
DEC 6 08:51:52.315: ISAKMP: (1227): payload ID for treatment. Message ID = 0
08:51:52.315 on 6 Dec: ISAKMP (1227): payload ID
next payload: 8
type: 1
address: A.A.A.A
Protocol: 17
Port: 0
Length: 12
DEC 6 08:51:52.315: ISAKMP: (0): peer games * no * profiles
DEC 6 08:51:52.315: ISAKMP: (1227): HASH payload processing. Message ID = 0
08:51:52.315 on 6 Dec: ISAKMP: received payload type 17
DEC 6 08:51:52.315: ISAKMP: (1227): load useful vendor id of treatment
DEC 6 08:51:52.315: ISAKMP: (1227): provider ID is DPD
08:51:52.315 on 6 Dec: ISAKMP: (1227): SA authentication status:
authenticated
08:51:52.315 on 6 Dec: ISAKMP: (1227): SA has been authenticated with A.A.A.A
08:51:52.315 on 6 Dec: ISAKMP: try to insert a B.B.B.B/A.A.A.A/500/ peer and inserted 2B79E8BC successfully.
08:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM5 = IKE_I_MM608:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM6 = IKE_I_MM608:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_I_MM6 = IKE_P1_COMPLETE08:51:52.315 on 6 Dec: ISAKMP: (1227): start Quick Mode Exchange, M - ID 1511581970
08:51:52.315 on 6 Dec: ISAKMP: (1227): initiator QM gets spi
DEC 6 08:51:52.315: ISAKMP: (1227): A packet is sent. A.A.A my_port 500 peer_port 500 (I) QM_IDLE
08:51:52.315 on 6 Dec: ISAKMP: (1227): sending a packet IPv4 IKE.
08:51:52.315 on 6 Dec: ISAKMP: (1227): entrance, node 1511581970 = IKE_MESG_INTERNAL, IKE_INIT_QM
08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_QM_READY = IKE_QM_I_QM1
08:51:52.315 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
08:51:52.315 on 6 Dec: ISAKMP: (1227): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE08:51:52.455 on 6 Dec: ISAKMP (1227): packet received dport 500 sport Global 500 (I) QM_IDLE A.A.A.A
08:51:52.455 on 6 Dec: ISAKMP: node set-1740216573 to QM_IDLE
DEC 6 08:51:52.455: ISAKMP: (1227): HASH payload processing. Message ID = 2554750723
DEC 6 08:51:52.455: ISAKMP: (1227): treatment protocol NOTIFIER PROPOSAL_NOT_CHOSEN 3
0, message ID SPI = 2554750723, a = 0x2B78D574
08:51:52.455 on 6 Dec: ISAKMP: (1227): node-1740216573 error suppression FALSE reason 'informational (en) State 1.
08:51:52.455 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
08:51:52.455 on 6 Dec: ISAKMP: (1227): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE08:51:52.455 on 6 Dec: ISAKMP (1227): packet received dport 500 sport Global 500 (I) QM_IDLE A.A.A.A
08:51:52.455 on 6 Dec: ISAKMP: node set 1297146574 to QM_IDLE
DEC 6 08:51:52.455: ISAKMP: (1227): HASH payload processing. Message ID = 1297146574
DEC 6 08:51:52.455: ISAKMP: (1227): treatment of payload to DELETE. Message ID = 1297146574
08:51:52.455 on 6 Dec: ISAKMP: (1227): peer does not paranoid KeepAlive.08:51:52.455 on 6 Dec: ISAKMP: (1227): removal of HIS State "No reason" why (I) QM_IDLE (post A.A.A.A)
08:51:52.455 on 6 Dec: ISAKMP: (1227): error suppression node 1297146574 FALSE reason 'informational (en) State 1.
08:51:52.455 on 6 Dec: ISAKMP: node set-1178304129 to QM_IDLE
DEC 6 08:51:52.455: ISAKMP: (1227): A packet is sent. A.A.A my_port 500 peer_port 500 (I) QM_IDLE
08:51:52.455 on 6 Dec: ISAKMP: (1227): sending a packet IPv4 IKE.
08:51:52.455 on 6 Dec: ISAKMP: (1227): purge the node-1178304129
08:51:52.455 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
08:51:52.455 on 6 Dec: ISAKMP: (1227): former State = new State IKE_P1_COMPLETE = IKE_DEST_SA08:51:52.455 on 6 Dec: ISAKMP: (1227): removal of HIS State "No reason" why (I) QM_IDLE (post A.A.A.A)
08:51:52.455 on 6 Dec: ISAKMP: Unlocking counterpart struct 0x2B79E8BC for isadb_mark_sa_deleted(), count 0
08:51:52.455 on 6 Dec: ISAKMP: delete peer node by peer_reap for A.A.A.A: 2B79E8BC
08:51:52.455 on 6 Dec: ISAKMP: (1227): error suppression node 1511581970 FALSE reason 'IKE deleted.
08:51:52.455 on 6 Dec: ISAKMP: (1227): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
08:51:52.455 on 6 Dec: ISAKMP: (1227): former State = new State IKE_DEST_SA = IKE_DEST_SAWould appreciate any help you can provide.
Kind regards
Sidney Dsouza
The phase 2 does not complete since there is no visible SPI value. In addition, depending on your configuration Transport mode is configured for phase 2 However, debug displays the tunnel mode.
Thus, as suggested earlier to debug this further and find the root cause we need to match the configuration settings in Phase 2 with regard to the remote device.
Hope that helps.
Kind regards
Anuj
-
VPN site to Site btw Pix535 and 2811 router, can't get to work
Hi, everyone, I spent a few days doing a VPN site-to site between PIX535 and 2811 router but returned empty-handed, I followed the instructions here:
http://www.Cisco.com/en/us/products/ps9422/products_configuration_example09186a0080b4ae61.shtml
#1: config PIX:
: Saved
: Written by enable_15 to the 18:05:33.678 EDT Saturday, October 20, 2012
!
8.0 (4) version PIX
!
hostname pix535
!
interface GigabitEthernet0
Description to cable-modem
nameif outside
security-level 0
address IP X.X.138.132 255.255.255.0
OSPF cost 10
!
interface GigabitEthernet1
Description inside 10/16
nameif inside
security-level 100
IP 10.1.1.254 255.255.0.0
OSPF cost 10
!
outside_access_in of access allowed any ip an extended list
access extensive list ip 10.1.0.0 inside_nat0_outbound allow 255.255.0.0 10.20.0.0 255.255.0.0
inside_nat0_outbound list of allowed ip extended access all 10.1.1.192 255.255.255.248
outside_cryptomap_dyn_60 list of allowed ip extended access all 10.1.1.192 255.255.255.248
access extensive list ip 10.1.0.0 outside_1_cryptomap allow 255.255.0.0 10.20.0.0 255.255.0.0
pager lines 24
cnf-8-ip 10.1.1.192 mask - 10.1.1.199 IP local pool 255.255.0.0
Global interface 10 (external)
15 1.2.4.5 (outside) global
NAT (inside) 0-list of access inside_nat0_outbound
NAT (inside) 15 10.1.0.0 255.255.0.0
Access-group outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 X.X.138.1 1
Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
Crypto-map dynamic outside_dyn_map 20 the value transform-set ESP-3DES-SHA MD5-ESP-3DES ESP-DES-MD5
life together - the association of security crypto dynamic-map outside_dyn_map 20 28800 seconds
Crypto-map dynamic outside_dyn_map 20 kilobytes of life together - the association of safety 4608000
Crypto-map dynamic outside_dyn_map 40 value transform-set ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA
life together - the association of security crypto dynamic-map outside_dyn_map 40 28800 seconds
Crypto-map dynamic outside_dyn_map 40 kilobytes of life together - the association of safety 4608000
Dynamic crypto map outside_dyn_map 60 match address outside_cryptomap_dyn_60
Crypto-map dynamic outside_dyn_map 60 value transform-set ESP-3DES-MD5 ESP-3DES-SHA ESP-DES-MD5 ESP-DES-SHA
life together - the association of security crypto dynamic-map outside_dyn_map 60 28800 seconds
Crypto-map dynamic outside_dyn_map 60 kilobytes of life together - the association of safety 4608000
Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs
Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-SHA-3DES ESP-MD5-3DES ESP-DES-SHA ESP-DES-MD5
Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define security association lifetime 28800 seconds
cryptographic kilobytes 4608000 life of the set - the association of security of the 65535 SYSTEM_DEFAULT_CRYPTO_MAP of the dynamic-map
card crypto outside_map 1 match address outside_1_cryptomap
outside_map game 1 card crypto peer X.X.21.29
card crypto outside_map 1 set of transformation-ESP-DES-SHA
outside_map map 1 lifetime of security association set seconds 28800 crypto
card crypto outside_map 1 set security-association life kilobytes 4608000
outside_map card crypto 65534 isakmp ipsec dynamic SYSTEM_DEFAULT_CRYPTO_MAP
map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map
outside_map interface card crypto outside
ISAKMP crypto identity hostname
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
the Encryption
sha hash
Group 1
life 86400
crypto ISAKMP policy 20
preshared authentication
3des encryption
sha hash
Group 2
life 86400
crypto ISAKMP policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Crypto isakmp nat-traversal 3600
internal GroupPolicy1 group strategy
cnf-vpn-cls group policy internal
attributes of cnf-vpn-cls-group policy
value of 10.1.1.7 WINS server
value of 10.1.1.7 DNS server 10.1.1.205
Protocol-tunnel-VPN IPSec l2tp ipsec
field default value x.com
sean U/h5bFVjXlIDx8BtqPFrQw password user name is nt encrypted
IPSec-attributes tunnel-group DefaultRAGroup
pre-shared-key secret1
RADIUS-sdi-xauth
tunnel-group DefaultRAGroup ppp-attributes
ms-chap-v2 authentication
tunnel-group cnf-vpn-cls type remote access
tunnel-group global cnf-vpn-cls-attributes
cnf-8-ip address pool
Group Policy - by default-cnf-vpn-cls
tunnel-group cnf-CC-vpn-ipsec-attributes
pre-shared-key secret2
ISAKMP ikev1-user authentication no
tunnel-group cnf-vpn-cls ppp-attributes
ms-chap-v2 authentication
tunnel-group X.X.21.29 type ipsec-l2l
IPSec-attributes tunnel-Group X.X.21.29
Pre-shared key SECRET
!
class-map inspection_default
match default-inspection-traffic
!
!
!
global service-policy global_policy
context of prompt hostname
Cryptochecksum:9780edb09bc7debe147db1e7d52ec39c
: end
#2: 2811 router config:
!
! Last configuration change to 09:15:32 PST Friday, October 19, 2012 by cnfla
! NVRAM config update at 13:45:03 PST Tuesday, October 16, 2012
!
version 12.4
horodateurs service debug datetime msec
Log service timestamps datetime msec
no password encryption service
!
hostname THE-2800
!
!
Crypto pki trustpoint TP-self-signed-1411740556
enrollment selfsigned
name of the object cn = IOS - Self - signed - certificate - 1411740556
revocation checking no
rsakeypair TP-self-signed-1411740556
!
!
TP-self-signed-1411740556 crypto pki certificate chain
certificate self-signed 01
308201A 8 A0030201 02020101 3082023F 300 D 0609 2A 864886 F70D0101 04050030
2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 31312F30
69666963 31343131 37343035 6174652D 3536301E 170 3132 31303136 32303435
30335A 17 0D 323030 31303130 30303030 305A 3031 06035504 03132649 312F302D
4F532D53 5369676E 656C662D 43 65727469 66696361 74652 31 34313137 65642D
34303535 3630819F 300 D 0609 2A 864886 01050003, 818, 0030, 81890281 F70D0101
8100F75F F1BDAD9B DE9381FD 7EAF9685 CF15A317 165B 5188 1 B 424825 9C66AA28
C990B2D3 D69A2F0F D745DB0E 2BB4995D 73415AC4 F01B2019 C4BCF9E0 84373199
E599B86C 17DBDCE6 47EBE0E3 8DBC90B2 9B4E217A 87F04BF7 A182501E 24381019
A61D2C05 5404DE88 DA2A1ADC A81B7F65 C318B697 7ED69DF1 2769E4C8 F3449B33
010001A 3 67306530 1 130101 FF040530 030101FF 30120603 0F060355 35AF0203
1104 B 0 300982 074C412D 32383030 551D 551 2304 18301680 14B56EEB 301F0603
88054CCA BB8CF8E8 F44BFE2C B77954E1 52301 D 06 04160414 B56EEB88 03551D0E
054CCABB 8CF8E8F4 4BFE2CB7 7954E152 300 D 0609 2A 864886 F70D0101 04050003
81810056 58755 56 331294F8 BEC4FEBC 54879FF5 0FCC73D4 B964BA7A 07D 20452
E7F40F42 8B 355015 77156C9F AAA45F9F 59CDD27F 89FE7560 F08D953B FC19FD2D
310DA96E A5F3E83B 52D515F8 7B4C99CF 4CECC3F7 1A0D4909 BD08C373 50BB53CC
659 4246 2CB7B79F 43D94D96 586F9103 9B4659B6 5C8DDE4F 7CC5FC68 C4AD197A 4EC322 C
quit smoking
!
!
!
crypto ISAKMP policy 1
preshared authentication
ISAKMP crypto key address SECRET X.X.138.132 No.-xauth
!
!
Crypto ipsec transform-set the-2800-trans-set esp - esp-sha-hmac
!
map 1 la-2800-ipsec policy ipsec-isakmp crypto
ipsec vpn Description policy
defined by peer X.X.138.132
the transform-set the-2800-trans-set value
match address 101
!
!
!
!
!
!
interface FastEthernet0/0
Description WAN side
address IP X.X.216.29 255.255.255.248
NAT outside IP
IP virtual-reassembly
automatic duplex
automatic speed
No cdp enable
No mop enabled
card crypto 2800-ipsec-policy
!
interface FastEthernet0/1
Description side LAN
IP 10.20.1.1 255.255.255.0
IP nat inside
IP virtual-reassembly
full duplex
automatic speed
No mop enabled
!
IP nat inside source map route sheep interface FastEthernet0/0 overload
access-list 10 permit X.X.138.132
access-list 99 allow 64.236.96.53
access-list 99 allow 98.82.1.202
access list 101 remark vpn tunnerl acl
Note access-list 101 category SDM_ACL = 4
policy of access list 101 remark tunnel
access-list 101 permit ip 10.20.0.0 0.0.0.255 10.1.0.0 0.0.255.255
access-list 110 deny ip 10.20.0.0 0.0.0.255 10.1.0.0 0.0.255.255
access-list 110 permit ip 10.20.0.0 0.0.0.255 any
public RO SNMP-server community
!
!
!
sheep allowed 10 route map
corresponds to the IP 110
!
!
!
!
WebVPN gateway gateway_1
IP address X.X.216.29 port 443
SSL trustpoint TP-self-signed-1411740556
development
!
WebVPN install svc flash:/webvpn/svc.pkg
!
WebVPN gateway-1 context
title 'b '.
secondary-color white
color of the title #CCCC66
text-color black
SSL authentication check all
!
!
policy_1 political group
functions compatible svc
SVC-pool of addresses "WebVPN-Pool."
SVC Dungeon-client-installed
SVC split include 10.20.0.0 255.255.0.0
Group Policy - by default-policy_1
Gateway gateway_1
development
!
!
end
#3: test Pix to the router:
ITS enabled: 1
Generate a new key SA: 0 (a tunnel report Active 1 and 1 to generate a new key during the generate a new key)
Total SA IKE: 1
1 peer IKE: X.X.21.29
Type: user role: initiator
Generate a new key: no State: MM_WAIT_MSG2
> DEBUG:
12:07:14 pix535:Oct 22 Oct 22 12:20:28 EDT: % PIX-vpn-3-713902: IP = X.X.21.29, Removing peer to peer table has not, no match22 Oct 12:07:14 pix535: 22 Oct 12:20:28 EDT: % PIX-vpn-4-713903: IP = X.X.21.29, error: cannot delete PeerTblEntry#4: test the router to pix:LA - 2800 #sh crypto isakmp hisIPv4 Crypto ISAKMP Security Associationstatus of DST CBC State conn-id slotX.X.138.132 X.X.216.29 MM_KEY_EXCH 1017 ASSETS 0> debugLA - 2800 #ping 10.1.1.7 source 10.20.1.1Type to abort escape sequence.Send 5, echoes ICMP 100 bytes to 10.1.1.7, time-out is 2 seconds:Packet sent with a source address of 10.20.1.1Oct 22 16:24:33.945: ISAKMP: (0): profile of THE request is (NULL)22 Oct 16:24:33.945: ISAKMP: created a struct peer X.X.138.132, peer port 50022 Oct 16:24:33.945: ISAKMP: new created position = 0x488B25C8 peer_handle = 0 x 8000001322 Oct 16:24:33.945: ISAKMP: lock struct 0x488B25C8, refcount 1 to peer isakmp_initiator22 Oct 16:24:33.945: ISAKMP: 500 local port, remote port 50022 Oct 16:24:33.945: ISAKMP: set new node 0 to QM_IDLE22 Oct 16:24:33.945: ISAKMP: find a dup her to the tree during the isadb_insert his 487720 A 0 = call BVA22 Oct 16:24:33.945: ISAKMP: (0): cannot start aggressive mode, try the main mode.22 Oct 16:24:33.945: ISAKMP: (0): pair found pre-shared key matching 70.169.138.132Oct 22 16:24:33.945: ISAKMP: (0): built of NAT - T of the seller-rfc3947 IDOct 22 16:24:33.945: ISAKMP: (0): built the seller-07 ID NAT - tOct 22 16:24:33.945: ISAKMP: (0): built of NAT - T of the seller-03 IDOct 22 16:24:33.945: ISAKMP: (0): built the seller-02 ID NAT - t22 Oct 16:24:33.945: ISAKMP: (0): entry = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM22 Oct 16:24:33.945: ISAKMP: (0): former State = new State IKE_READY = IKE_I_MM1Oct 22 16:24:33.945: ISAKMP: (0): Beginner Main Mode ExchangeOct 22 16:24:33.945: ISAKMP: (0): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_NO_STATE22 Oct 16:24:33.945: ISAKMP: (0): sending a packet IPv4 IKE.22 Oct 16:24:34.049: ISAKMP (0:0): packet received dport 500 sport Global 500 (I) MM_NO_STATE X.X.138.13222 Oct 16:24:34.049: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH22 Oct 16:24:34.049: ISAKMP: (0): former State = new State IKE_I_MM1 = IKE_I_MM2Oct 22 16:24:34.049: ISAKMP: (0): treatment ITS payload. Message ID = 0Oct 22 16:24:34.049: ISAKMP: (0): load useful vendor id of treatmentOct 22 16:24:34.049: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123Oct 22 16:24:34.049: ISAKMP: (0): provider ID is NAT - T v2Oct 22 16:24:34.049: ISAKMP: (0): load useful vendor id of treatmentOct 22 16:24:34.049: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 19422 Oct 16:24:34.053: ISAKMP: (0): pair found pre-shared key matching 70.169.138.132Oct 22 16:24:34.053: ISAKMP: (0): pre-shared key local found22 Oct 16:24:34.053: ISAKMP: analysis of the profiles for xauth...22 Oct 16:24:34.053: ISAKMP: (0): audit ISAKMP transform 1 against the policy of priority 122 Oct 16:24:34.053: ISAKMP: DES-CBC encryption22 Oct 16:24:34.053: ISAKMP: SHA hash22 Oct 16:24:34.053: ISAKMP: default group 122 Oct 16:24:34.053: ISAKMP: pre-shared key auth22 Oct 16:24:34.053: ISAKMP: type of life in seconds22 Oct 16:24:34.053: ISAKMP: life (IPV) 0 x 0 0 x 1 0 x 51 0x8022 Oct 16:24:34.053: ISAKMP: (0): atts are acceptable22 Oct 16:24:34.053: ISAKMP: (0): Acceptable atts: real life: 022 Oct 16:24:34.053: ISAKMP: (0): Acceptable atts:life: 022 Oct 16:24:34.053: ISAKMP: (0): fill atts in his vpi_length:422 Oct 16:24:34.053: ISAKMP: (0): fill atts in his life_in_seconds:8640022 Oct 16:24:34.053: ISAKMP: (0): return real life: 8640022 Oct 16:24:34.053: ISAKMP: (0): timer life Started: 86400.Oct 22 16:24:34.053: ISAKMP: (0): load useful vendor id of treatmentOct 22 16:24:34.053: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123Oct 22 16:24:34.053: ISAKMP: (0): provider ID is NAT - T v2Oct 22 16:24:34.053: ISAKMP: (0): load useful vendor id of treatmentOct 22 16:24:34.053: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 19422 Oct 16:24:34.053: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE22 Oct 16:24:34.053: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM2Oct 22 16:24:34.057: ISAKMP: (0): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_SA_SETUP22 Oct 16:24:34.057: ISAKMP: (0): sending a packet IPv4 IKE.22 Oct 16:24:34.057: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE22 Oct 16:24:34.057: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM322 Oct 16:24:34.181: ISAKMP (0:0): packet received dport 500 sport Global 500 (I) MM_SA_SETUP X.X.138.13222 Oct 16:24:34.181: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH22 Oct 16:24:34.181: ISAKMP: (0): former State = new State IKE_I_MM3 = IKE_I_MM4Oct 22 16:24:34.181: ISAKMP: (0): processing KE payload. Message ID = 0Oct 22 16:24:34.217: ISAKMP: (0): processing NONCE payload. Message ID = 022 Oct 16:24:34.217: ISAKMP: (0): pre-shared key found peer corresponding to X.X.138.132Oct 22 16:24:34.217: ISAKMP: (1018): load useful vendor id of treatmentOct 22 16:24:34.217: ISAKMP: (1018): provider ID is the unitOct 22 16:24:34.217: ISAKMP: (1018): load useful vendor id of treatmentOct 22 16:24:34.217: ISAKMP: (1018): provider ID seems the unit/DPD but major incompatibility of 55Oct 22 16:24:34.217: ISAKMP: (1018): provider ID is XAUTHOct 22 16:24:34.217: ISAKMP: (1018): load useful vendor id of treatmentOct 22 16:24:34.217: ISAKMP: (1018): addressing another box of IOS!Oct 22 16:24:34.221: ISAKMP: (1018): load useful vendor id of treatment22 Oct 16:24:34.221: ISAKMP: (1018): vendor ID seems the unit/DPD but hash mismatch22 Oct 16:24:34.221: ISAKMP: receives the payload type 2022 Oct 16:24:34.221: ISAKMP: receives the payload type 2022 Oct 16:24:34.221: ISAKMP: (1018): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE22 Oct 16:24:34.221: ISAKMP: (1018): former State = new State IKE_I_MM4 = IKE_I_MM422 Oct 16:24:34.221: ISAKMP: (1018): send initial contact22 Oct 16:24:34.221: ISAKMP: (1018): ITS been pre-shared key, using id ID_IPV4_ADDR type authentication22 Oct 16:24:34.221: ISAKMP (0:1018): payload IDnext payload: 8type: 1address: X.X.216.29Protocol: 17Port: 500Length: 1222 Oct 16:24:34.221: ISAKMP: (1018): the total payload length: 12Oct 22 16:24:34.221: ISAKMP: (1018): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_KEY_EXCH22 Oct 16:24:34.221: ISAKMP: (1018): sending a packet IPv4 IKE.22 Oct 16:24:34.225: ISAKMP: (1018): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE22 Oct 16:24:34.225: ISAKMP: (1018): former State = new State IKE_I_MM4 = IKE_I_MM5...22 Oct 16:24:38.849: ISAKMP: (1017): purge the node 19855474022 Oct 16:24:38.849: ISAKMP: (1017): purge the node 81238000222 Oct 16:24:38.849: ISAKMP: (1017): purge node 773209335...Success rate is 0% (0/5)# THE-2800Oct 22 16:24:44.221: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH...22 Oct 16:24:44.221: ISAKMP (0:1018): increment the count of errors on his, try 1 5: retransmit the phase 1Oct 22 16:24:44.221: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCHOct 22 16:24:44.221: ISAKMP: (1018): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_KEY_EXCH22 Oct 16:24:44.221: ISAKMP: (1018): sending a packet IPv4 IKE.22 Oct 16:24:44.317: ISAKMP (0:1018): packet received dport 500 sport Global 500 (I) MM_KEY_EXCH X.X.138.132Oct 22 16:24:44.317: ISAKMP: (1018): package of phase 1 is a duplicate of a previous package.Oct 22 16:24:44.321: ISAKMP: (1018): retransmission jumped to the stage 1 (time elapsed since the last transmission 96)22 Oct 16:24:48.849: ISAKMP: (1017): serving SA., his is 469BAD60, delme is 469BAD6022 Oct 16:24:52.313: ISAKMP (0:1018): packet received dport 500 sport Global 500 (I) MM_KEY_EXCH X.X.138.132Oct 22 16:24:52.313: ISAKMP: (1018): package of phase 1 is a duplicate of a previous package.Oct 22 16:24:52.313: ISAKMP: (1018): retransmission due to phase 1 of retransmissionOct 22 16:24:52.813: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH...22 Oct 16:24:52.813: ISAKMP (0:1018): increment the count of errors on his, try 2 of 5: retransmit the phase 1Oct 22 16:24:52.813: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCHOct 22 16:24:52.813: ISAKMP: (1018): package X.X138.132 my_port 500 peer_port 500 (I) sending MM_KEY_EXCH22 Oct 16:24:52.813: ISAKMP: (1018): sending a packet IPv4 IKE.Oct 22 16:24:52.913: ISAKMP: (1018): package of phase 1 is a duplicate of a previous package.Oct 22 16:24:52.913: ISAKMP: (1018): retransmission jumped to the stage 1 (time elapsed since the last transmission of 100)22 Oct 16:25:00.905: ISAKMP (0:1018): packet received dport 500 sport Global 500 (I) MM_KEY_EXCH X.X.138.13222 Oct 16:25:00.905: ISAKMP: node set 422447177 to QM_IDLE....22 Oct 16:25:03.941: ISAKMP: (1018): SA is still budding. New application of ipsec in the annex22 Oct 16:25:03.941: ISAKMP: error during the processing of HIS application: failed to initialize SA22 Oct 16:25:03.941: ISAKMP: error while processing message KMI 0, error 2.Oct 22 16:25:12.814: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH...22 Oct 16:25:12.814: ISAKMP (0:1018): increment the count of errors on his, try 4 out 5: retransmit the phase 1Oct 22 16:25:12.814: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCHOct 22 16:25:12.814: ISAKMP: (1018): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_KEY_EXCH22 Oct 16:25:12.814: ISAKMP: (1018): sending a packet IPv4 IKE.Oct 22 16:25:22.814: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH...22 Oct 16:25:22.814: ISAKMP (0:1018): increment the count of errors on his, try 5 of 5: retransmit the phase 1Oct 22 16:25:22.814: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCHOct 22 16:25:22.814: ISAKMP: (1018): package X.X.138.132 my_port 500 peer_port 500 (I) sending MM_KEY_EXCH22 Oct 16:25:22.814: ISAKMP: (1018): sending a packet IPv4 IKE.Oct 22 16:25:32.814: ISAKMP: (1018): transmit phase 1 MM_KEY_EXCH...22 Oct 16:25:32.814: ISAKMP: (1018): peer does not paranoid KeepAlive.......22 Oct 16:25:32.814: ISAKMP: (1018): removal of reason ITS status of 'Death by retransmission P1' (I) MM_KEY_EXCH (post 70.169.138.132)
22 Oct 16:25:32.814: ISAKMP: (1018): removal of reason ITS status of 'Death by retransmission P1' (I) MM_KEY_EXCH (post 70.169.138.132)
22 Oct 16:25:32.814: ISAKMP: Unlocking counterpart struct 0x488B25C8 for isadb_mark_sa_deleted(), count 0
22 Oct 16:25:32.814: ISAKMP: delete peer node by peer_reap for X.X.138.132: 488B25C8
22 Oct 16:25:32.814: ISAKMP: (1018): error suppression node 1112432180 FALSE reason 'IKE deleted.
22 Oct 16:25:32.814: ISAKMP: (1018): error suppression node 422447177 FALSE reason 'IKE deleted.
22 Oct 16:25:32.814: ISAKMP: (1018): node-278980615 error suppression FALSE reason 'IKE deleted.
22 Oct 16:25:32.814: ISAKMP: (1018): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
22 Oct 16:25:32.814: ISAKMP: (1018): former State = new State IKE_I_MM5 = IKE_DEST_SA
22 Oct 16:26:22.816: ISAKMP: (1018): purge the node 1112432180
22 Oct 16:26:22.816: ISAKMP: (1018): purge the node 422447177
22 Oct 16:26:22.816: ISAKMP: (1018): purge the node-278980615
22 Oct 16:26:32.816: ISAKMP: (1018): serving SA., its A 487720, 0 =, delme = A 487720, 0
The PIX is also used VPN client, such as the VPN Cicso 5.0 client access, works very well. Router is used as a server SSL VPN, too much work
I know there are a lot of data here, I hope that these data may be useful for diagnostic purposes.
All suggestions and tips are greatly appreciated.
Sean
Recommended action:
On the PIX:
no card crypto outside_map 1
!
crypto ISAKMP policy 5
preshared authentication
3des encryption
sha hash
Group 2
life 86400
!
card crypto outside_map 10 correspondence address outside_1_cryptomap
crypto outside_map 10 peer X.X.216.29 card game
outside_map crypto 10 card value transform-set ESP-3DES-SHA
life safety association set card crypto outside_map 10 28800 seconds
card crypto outside_map 10 set security-association life kilobytes 4608000
!
tunnel-group X.X.216.29 type ipsec-l2l
IPSec-attributes tunnel-Group X.X.216.29
Pre-shared key SECRET
!
On the router:
crypto ISAKMP policy 10
preshared authentication
Group 2
3des encryption
!
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
output
!
card 10 la-2800-ipsec policy ipsec-isakmp crypto
ipsec vpn Description policy
defined by peer X.X.138.132
game of transformation-ESP-3DES-SHA
match address 101
!
No crypto card-2800-ipsec-policy 1
Let me know how it goes.
Portu.
Please note all useful posts
Post edited by: Javier Portuguez
-
Need to convert vmdk using pRDM vmkfstools command
Need to convert to pRDM vmdk format command. tried to convert using cold migration that it stuck at 23 percent. Are there vmkfstools or powercli to convert?
You can try the host command line is:
vmkfstools -i /vmfs/volumes/source-ds/source-vm/source.vmdk/vmfs/volumes/target-ds/target-vm/target. VMDK
You can optionally add thin d in case you want to that thin target to be configured.
What you need to do - before running the command - is to ensure that the size of the disk in the hard file corresponds to the actual size of the LUN in case the LUN has been resized / increased at some point.
André
-
preference outbound Dial-peer, how to set
Hi all
I have a case where a customer wants all calls except 34xx having LTD only
and 34xx be masked to 3400. It's a 200 range 34xx and 35xxvoice POTS dial-peer 1
destination-model 0 t
Disable fax speed
restrict LTD
direct line to inside
port 0/2/0:15Dial-peer voice 7 pots
Description block caller ID
destination-model 0 t
incoming called number 434...
Disable fax speed
CLID network-number 0357543400
direct line to inside
port 0/2/0:15This translates into calls randomly with the mask and no caller ID,
the idea was that called-number incoming 434... in pots of equal voice dial 7, would give all calls with the 434xx monitoring and resume monitoring dial-peer voice 1 pots. However, this is not the case. I read that this incoming called number takes the monitoring.
However see the numbering even detail, shows that calls get closer the two counterparts-dial and its using both dial peer.
can someone clarify for me details about what patten matching dial takes preference. or an alternative.
Concerning
First you have to determine when you say "patten destination differentiate through the introductory call for instance' that you will use this command to match an incoming or outgoing dial peer dial peer. Since the destination-model command can be used to match the two dial peers, but the use is dfferent
Dial Peer additional information
The dial peer attribute destination-model has different behavior when it is applied to the feet of the incoming or outgoing call:
For inbound dial peers, the destination model is compared to the number calling (ANI string).
For outbound dial peers, the destination model is compared to the numbers dialed (DNIS string):
So corresponding to a help outgoing dial peer destination-model against the call number is not possible. Just use the command preferably as suggested by Langlois, it will be your best shot in pre deciding outbound dial peers must be selected using the same destination model.
Concerning
Deepak
-
How a dial-peer SIP Trunk using a Registrar?
Hi all
I'll put up a GUY using two records. With the generous help of people on this forum, I got records in doubles to work. But now I need to know how to configure the dial-peer to use registration information. For example, I have this set up:
SIP - ua
Password 08114342101A0A1A43 7 authentication username 5555555555
...
IPv4:11.11.11.11:6034 at the office 1 expires 3600
Registrar 2 ipv4:22.22.22.22:6035 expires 3600
How to configure a dial-peer to send traffic to one of the recordings? I tried this, and it does not work:
Dial-peer voice voip 105
Description * outgoing SIP Trunk call *.
translation-profile outgoing PSTN_Outgoing
destination-model 91%...
session protocol sipv2
Registrar of target session? WHAT SHOULD I USE HERE?
codec voice-class 2
DTMF-relay rtp - nte
No vad
Thanks in advance.
Hi Tod,
Please go through this post, hope that it answers your question:
http://tekcert.com/blog/2011/02/03/CME-configuration-example-SIP-trunks-ViaTalk-and-voipms
Specify the article accordingly.
Kind regards
Kevin
-
Dial-Peer out of the CME, for UC540 does not
Dear Experts,
We have a UC560 HQ and the new branch with 2811 router. These sites linked via VPN using fortigate. The connectivity between sites is in place and we are able to ping both the sites and networks of voice successfully.
I have configured dial-peers on both sites. The headquarters at the local branch calls succeed without problem, but when we compose branch at HQ, we get a fast busy signal. Here is the config of dial peers
AC-
Dial-peer voice 300 voip destination-model 3... session target ipv4:192.168.110.1 DTMF-relay h245 alphanumeric No vad Branch-
Dial-peer voice 800 voip
destination-model 8...
session target ipv4:192.168.201.2
DTMF-relay h245 alphanumeric
No vadCSIM results of branch-
CSIM start 891
CSIM: called number = 891, number of loops = 1 ping count = 0CSIM err csimDisconnected recvd DISC cid (786)
CSIM: loop = 1, failed = 1
CSIM: call attempt = 1, Setup failed = 1, your failed = 0Please please advise. Thank you.
Hi, it's like application of fraud alleged toll-free which dismissed the appeal of the site BR.
1076043: 11 Oct 14:36:29.759: / / 282614/B639957688BC/CCAPI/cc_api_call_setup_ind_common:
Set up the event sent;
Call Info (number = 308(TON = unknown, NPI = unknown, not projected = screening, presentation = authorized),
Called number = 807 (Unknown = TON, NPI = unknown))1076047: 11 Oct 14:36:29.763: / / 282614/B639957688BC/CCAPI/cc_process_call_setup_ind:
> Handed CCAPI cid 282614 tagged 300 to app "" _ManagedAppProcess_TOLLFRAUD_APP".
1076048: 11 Oct 14:36:29.763: / / 282614/B639957688BC/CCAPI/ccCallDisconnect:
Value = 21, Tag = 0x0, entry calls (previous disconnection Cause = 0, remove the Cause = 0)you need to add the address IP of GW BR (192.168.110.1) slot ' voice voip service > reliable list of IPS "as shown below.
voip phone service
list of approved IP addresses
IPv4 192.168.110.1For you reference: https://supportforums.cisco.com/document/46566/understanding-toll-fraud-...
-
Problems with dial-peer between routers cisco 3925
Good afternoon...
I have a problem when we want to connect telephony between two routers 3925, on both routers and I configured the
telephone service (phone service), I released my phone and there is an internal communication in each of them (I can do
between the phones of the same router), each router I have configured a dial-position intercomunicarlos and this is where the problem arises. When I try a telephone line in the router for each B telephone router A composed the Ringout timeout and mark Unknow number is finished, when I make a call, the router that has the phone number of this brand, I run sh call status command and tells me that there is an ongoing call and you use , the problem with the dial-peer, is that it seems that the other router you call never happens.
I help a lot to get an overview of why this happens.
Thank you
Excuse my English is not very good
In addition what IOS you're running, calls can be prevented by the mechanism of toll-free fraud if it is 15.1 or newer.
HTH,
Chris
-
Hard disk space do not correspond with the size of all the content files!
In the properties of "my computer", my placeholder is (?) 114 GB
My files are almost empty!
If I choose theall files on the hard drive and click Properties, the size is only 50 GB!
All waste are removed, I ran degfragmatation and my memory Visual option is 'auto '.
I do not understand why this submission therefore difference between.
Can you help me please?In the properties of "my computer", my placeholder is (?) 114 GB
My files are almost empty!
If I choose theall files on the hard drive and click Properties, the size is only 50 GB!
All waste are removed, I ran degfragmatation and my memory Visual option is 'auto '.
I do not understand why this submission therefore difference between.
Can you help me please?... I forgot... my laptop is very recent, almost 15 days...
-
Dial the direct IP address of E20 E20 /-to-peer
Hello
We try to replace Polycoms by E20 in our small office. We always try to get the E20 to accept the static Ip address. He will gladly accept a DHCP offering if the product is connected to a local VIRTUAL network with a DHCP server. If specify us a static IP address, it shows network not found message.
Everything we try to do is make a direct ccall-to-peer use a publicly routed IP address. Of course, since we are still not able to use static IP addresses, in our test configuration, we have two units connected on a private subnet (172.16.140.50 and 172.16.140.51), which is to assign a DHCP address for both units. Is it possible to call direct ip from 172.16.140.50 to 172.16.140.51?
Thank you
DD
Hi DD,
A couple of things to check. I don't know whether a problem with the IP address conflict, I think that Ravi pointed out correctly that if it is a conflict with the IP address, you can send it.
Just to add to that, Yes, you can make direct calls. In order to make direct calls, make sure that the version of the software on the E20 is TE4.1. Once you have the E20 running this version, you can configure the E20 as a H323 endpoint and you would be able to make direct calls to public IP addresses.
For more information, please see the release notes for TE4.1:
You can assign IP addresses to the E20 and then make the Direct call setup mode. Connect to the API and the following number:
xConfiguration H323 profile 1 CallSetup Mode: Direct
Hope that answers your question.
Kind regards
Saint André
-
Site to Site &; Dialer Dual Wan VPN
Hello!
I have some problems with a Cisco 1941 running 15.2...
I have two interfaces WAN ADSL (PPPoE Dialer). I want normal Internet traffic through DSL - 1 and VPN through DSL - 2. So I put the default route through Dialer1 and the route heading to the IP of the Brach-Site (R.R.R.R), through Dialer2.
on the R1: Ping R.R.R.R-> works fine
A2: Ping Y.Y.Y.Y-> works fine
R2: ssh Y.Y.Y.Y-> works fine
so I guess that routing should work?
but the VPN be established:
router-wi #show cry sess
Current state of the session crypto
Interface: Dialer1
The session state: DOWN-NEGOTIATION
Peer: Port B.B.B.B 500
IKEv1 SA: local X.X.X.Xremote of 500 B.B.B.Bidle 500
FLOW IPSEC: allowed ip 172.20.100.0/255.255.255.0 172.20.110.0/255.255.255.0
Active sAs: 0, origin: card crypto
FLOW IPSEC: allowed ip 192.168.100.0/255.255.255.0 192.168.40.0/255.255.255.0
Active sAs: 0, origin: card crypto
Interface: Dialer2
The session state: down
Peer: B.B.B.B port 500
FLOW IPSEC: allowed ip 172.20.100.0/255.255.255.0 172.20.110.0/255.255.255.0
Active sAs: 0, origin: card crypto
FLOW IPSEC: allowed ip 192.168.100.0/255.255.255.0 192.168.40.0/255.255.255.0
Active sAs: 0, origin: card crypto
Even when I remove the Card Crypto VPN - D1, without VPN can be established. Only when I stop the Dialer1 interface and the default Route also goes throug Dialer2 VPN is properly set up.
R1 config:
.....
track 1 ip sla 1
period 5-2
!
Track 2 ip sla 2
period 5-2
!
crypto ISAKMP policy 1
BA aes 256
sha512 hash
preshared authentication
!
ISAKMP crypto key xxxxx address R.R.R.R
ISAKMP xauth timeout 10 crypto
!
Crypto ipsec transform-set esp - aes 256 esp-sha512-hmac VPN_TS
!
map VPN crypto -D1 10 ipsec-isakmp
defined by peer R.R.R.R
game of transformation-VPN_TS
match address VPN_1
map VPN - D1 20 ipsec-isakmp crypto
defined by peer R.R.R.R
game of transformation-VPN_TS
match address VPN_2
!
map VPN crypto -D2 10 ipsec-isakmp
defined by peer R.R.R.R
game of transformation-VPN_TS
match address VPN_1
map VPN - D2 20 ipsec-isakmp crypto
defined by peer R.R.R.R
game of transformation-VPN_TS
match address VPN_2
!
interface GigabitEthernet0/0
Green description
no ip address
IP virtual-reassembly in
IP tcp adjust-mss 1412
automatic duplex
automatic speed
!
interface GigabitEthernet0/0.1
Wlan (network VPN_1) description
encapsulation dot1Q 2 native
192.168.100.2 IP address 255.255.255.0
NBAR IP protocol discovery
penetration of the IP stream
stream IP output
IP nat inside
IP virtual-reassembly in
!
interface GigabitEthernet0/1
Orange Description
no ip address
IP tcp adjust-mss 1412
automatic duplex
automatic speed
!
interface GigabitEthernet0/1.1
Description VPN_2 network
encapsulation dot1Q 1 native
IP 172.20.100.2 255.255.255.0
NBAR IP protocol discovery
penetration of the IP stream
stream IP output
IP virtual-reassembly in
!
interface FastEthernet0/0/0
Description-= DSL-1 =-
no ip address
automatic duplex
automatic speed
PPPoE enable global group
PPPoE-client dial-pool-number 1
!
interface FastEthernet0/0/1
Description-= DSL-2 =-
no ip address
IP virtual-reassembly in
automatic duplex
automatic speed
PPPoE enable global group
PPPoE-client dial-pool-number 2
!
interface Dialer1
Description-= DSL-1 (Vdsl) =-
the negotiated IP address
IP mtu 1452
NBAR IP protocol discovery
penetration of the IP stream
stream IP output
NAT outside IP
IP virtual-reassembly in
encapsulation ppp
Dialer pool 1
Dialer-Group 1
PPP authentication chap callin pap
PPP chap hostname [email protected] / * /
PPP chap password 0 xxx
PPP pap sent-username [email protected] / * / password 0 xxx
card crypto VPN - D1
!
interface Dialer2
Description-= DSL-2 (T - DSL) =-
the negotiated IP address
IP mtu 1452
NBAR IP protocol discovery
penetration of the IP stream
stream IP output
NAT outside IP
IP virtual-reassembly in
encapsulation ppp
Dialer pool 2
Dialer-Group 2
PPP authentication chap callin pap
PPP chap hostname [email protected] / * /
PPP chap password 0 xxx
PPP pap sent-username [email protected] / * / password 0 xxx
card crypto VPN - D2
!
.......
!
The dns server IP
IP nat inside source map route DSL - 1 interface Dialer1 overload
IP nat inside source map route DSL - 2 interface Dialer2 overload
IP route B.B.B.B 255.255.255.255 Dialer2 10 track 2
IP route 0.0.0.0 0.0.0.0 Dialer1 30 track 1
IP route 0.0.0.0 0.0.0.0 Dialer2 50 track 2
!
VPN_2 extended IP access list
IP 172.20.100.0 allow 0.0.0.255 172.20.110.0 0.0.0.255
VPN_1 extended IP access list
IP 192.168.100.0 allow 0.0.0.255 192.168.40.0 0.0.0.255
!
radius of the IP source-interface GigabitEthernet0/0.1
ALS IP 1
X.X.X.X ICMP echo
tag Check DSL-1
threshold of 300
timeout 500
frequency 5
IP SLA annex 1 point of life to always start-time now
ALS IP 2
Y.Y.Y.Y ICMP echo
tag check DSL - 2
threshold of 300
timeout 500
frequency 1
IP SLA annex 2 to always start-time life now
access-list 100 remark = NAT Route - Map DSL-1 LCA =-
access-list 100 deny ip 192.168.100.0 0.0.0.255 192.168.40.0 0.0.0.255
access-list 100 permit ip 192.168.100.0 0.0.0.255 any
access list 101 remark = NAT Route - Map DSL-2 ABI =-
access-list 101 deny ip 192.168.100.0 0.0.0.255 192.168.40.0 0.0.0.255
access-list 101 permit ip 192.168.100.0 0.0.0.255 any
Dialer-list 1 ip protocol allow
Dialer-list 2 ip protocol allow
!
10 allowed DSL-2 route map
corresponds to the IP 101
match interface Dialer2
DSL-1 allowed route map 10
corresponds to the IP 100
match interface Dialer1
R2 config:
....
10 VPN ipsec-isakmp crypto map
defined peer Y.Y.Y.Y
defined peer X.X.X.X
game of transformation-VPN_TS
match address VPN_1
20 VPN ipsec-isakmp crypto map
defined peer Y.Y.Y.Y
defined peer X.X.X.X
game of transformation-VPN_TS
match address VPN_2
...
Yes you can incorporate these underneath routes as well on track 2, however track 2 fails, you must have a failover to dsl1 itinerary, with highest should cost 100 road.
IP route 192.168.40.0 255.255.255.0 Dialer 2 track 2 name VPN-1_to_R2_via_DSL-2
IP route 172.20.110.0 255.255.255.0 Dialer 2 track 2 name VPN-2_to_R2_via_DSL-2
Hope that helps.
Thank you
Rizwan James
Post edited by: Mohamed Rizwan
-
MacBook Pro hard repeated panics of the kernel
Hello
I knew panic the kernel repeated on my MacBook Pro (retina, 15 inch, mid-2014). In general, a piece of software will be "quit unexpectedly" a few times (Web Safari, Mail, Finder content). Then, randomly, the system will be completely freeze two seconds and restart.
I tried running with the system in Mode safe, but panicking kernel continue to hinder. Then I erased the hard drive and reinstalled the new El Capitan (and later upgrade to Sierra). I continued to experiment with these error messages and panics of the kernel, which I can only assume means that I have a hardware problem.
I take the unit to a Genius Bar next week, but in the meantime, I was wondering if someone could look over panic report and identify a possible cause? I have never added or changed everything - the MacBook is exactly as it was when I bought it.
Panic report *.
panic (cpu 6 0xffffff80013ef077 appellant): "Possible memory corruption: pmap_pv_remove (0xffffff80208925e0, 0x10f621000, 0 x 40, 0 40000, 0xffffff81e9943b8c, 0xffffff81e9943b80): pv_list null!" @/Library/Caches/com.apple.xbs/Sources/xnu/xnu-3789.1.32/osfmk/i386/pm ap_internal.h:786
Backtrace (CPU 6), frame: return address
0xffffff81e99439b0: 0xffffff80012f748c
0xffffff81e9943a30: 0xffffff80013ef077
0xffffff81e9943bc0: 0xffffff80013735e1
0xffffff81e9943d50: 0xffffff8001374ea5
0xffffff81e9943f30: 0xffffff800140a35c
0xffffff81e9943fb0: 0xffffff80012a9655
The process corresponding to the current thread BSD name: ReportCrash
Mac OS version:
A 16, 323
Kernel version:
16.0.0 Darwin kernel version: Mon Aug 29 17:56:20 PDT 2016; root:XNU-3789.1.32~3/RELEASE_X86_64
Kernel UUID: 622D2470-C34D-31F9-A62B-6AA9A3C6A3CD
Slide kernel: 0 x 0000000001000000
Text of core base: 0xffffff8001200000
Text __HIB base: 0xffffff8001100000
Name of system model: MacBookPro11, 2 (Mac-3CBD00234E554E41)
Availability of the system in nanoseconds: 618091097144
last load kext to 499153283898: com.apple.iokit.IOBluetoothUSBDFU 5.0.0f18 (addr 0xffffff7f8418c000 size 12288)
Finally unloaded kext to 379778273675: com.apple.driver.AppleXsanScheme 3 (addr 0xffffff7f83523000 size 40960)
kexts responsible:
com.apple.iokit.IOBluetoothUSBDFU 5.0.0f18
com.apple.driver.AppleUSBTCKeyEventDriver 251
com.apple.driver.AudioAUUC 1.70
com.apple.driver.ApplePlatformEnabler 2.7.0d0
com.apple.driver.AGPM 110.23.7
com.apple.driver.X86PlatformShim 1.0.0
com Apple.filesystems.autofs 3.0
com.apple.driver.AppleOSXWatchdog 1
com.apple.driver.AppleGraphicsDevicePolicy 3.13.60
com.apple.driver.AppleHDA 276.26
com.apple.driver.AppleUpstreamUserClient 3.6.4
com Apple.Driver.pmtelemetry 1
com.apple.iokit.IOUserEthernet 1.0.1
com.apple.iokit.IOBluetoothSerialManager 5.0.0f18
com.apple.Dont_Steal_Mac_OS_X 7.0.0
com.apple.driver.AppleIntelHD5000Graphics 10.1.8
com.apple.driver.AppleBacklight 170.9.10
com.apple.driver.AppleHV 1
com.apple.iokit.BroadcomBluetoothHostControllerUSBTransport 5.0.0f18
com.apple.driver.AppleIntelSlowAdaptiveClocking 4.0.0
com.apple.driver.AppleSMCLMU 208
com.apple.driver.AppleMCCSControl 1.2.13
com.apple.driver.AppleLPC 3.1
com.apple.driver.AppleCameraInterface 5.57.0
com.apple.driver.AppleIntelFramebufferAzul 10.1.8
com.apple.driver.AppleThunderboltIP 3.0.8
com.apple.driver.AppleUSBCardReader 404.1.1
com.apple.driver.AppleUSBTCButtons 251
com.apple.driver.AppleUSBTCKeyboard 251
com.apple.AppleFSCompression.AppleFSCompressionTypeDataless 1.0.0d1
com.apple.AppleFSCompression.AppleFSCompressionTypeZlib 1.0.0
com.apple.BootCache 39
com Apple.filesystems.HFS.kext 366.1.1
com.apple.iokit.IOAHCIBlockStorage 295.1.1
com.apple.driver.AppleAHCIPort 326
com.apple.driver.AirPort.Brcm4360 1100.37.1a16
com.apple.driver.AppleSmartBatteryManager 161.0.0
com.apple.driver.AppleRTC 2.0
com.apple.driver.AppleACPIButtons 5.0
com.apple.driver.AppleHPET 1.8
com.apple.driver.AppleSMBIOS 2.1
com.apple.driver.AppleACPIEC 5.0
com.apple.driver.AppleAPIC 1.7
com Apple.NKE.applicationfirewall 171
com Apple.Security.Quarantine 3
com.apple.security.TMSafetyNet 8
com Apple.Driver.USB.cdc 5.0.0
com Apple.kext.Triggers 1.0
com.apple.driver.DspFuncLib 276.26
com.apple.kext.OSvKernDSPLib 525
com.apple.iokit.IOSerialFamily 11
com.apple.iokit.IOSurface 152
com.apple.iokit.IOBluetoothHostControllerUSBTransport 5.0.0f18
com.apple.iokit.IOBluetoothHostControllerTransport 5.0.0f18
com.apple.iokit.IOBluetoothFamily 5.0.0f18
com.apple.iokit.IOSlowAdaptiveClockingFamily 1.0.0
com.apple.driver.AppleSMBusController 1.0.14d1
com.apple.driver.AppleBacklightExpert 1.1.0
com.apple.iokit.IONDRVSupport 2.4.1
com.apple.driver.AppleGraphicsControl 3.13.60
com.apple.driver.X86PlatformPlugin 1.0.0
com.apple.driver.AppleSMC 3.1.9
com.apple.driver.IOPlatformPluginFamily 6.0.0d8
com.apple.AppleGraphicsDeviceControl 3.13.60
com.apple.iokit.IOAcceleratorFamily2 288.13
com.apple.driver.AppleHDAController 276.26
com.apple.iokit.IOGraphicsFamily 2.4.1
com.apple.iokit.IOHDAFamily 276.26
com.apple.iokit.IOAudioFamily 205.11
com.apple.vecLib.kext 1.2.0
com.apple.iokit.IOSCSIBlockCommandsDevice 394
com.apple.iokit.IOUSBMassStorageDriver 131.1.1
com.apple.iokit.IOSCSIArchitectureModelFamily 394
com.apple.driver.usb.AppleUSBHub 1.1
com.apple.driver.AppleUSBMultitouch 258
com.apple.driver.usb.IOUSBHostHIDDevice 1.1
com.Apple.Driver.USB.Networking 5.0.0
com.apple.driver.usb.AppleUSBHostCompositeDevice 1.1
com.apple.driver.CoreStorage 540
com Apple.filesystems.HFS.Encodings.kext 1
com.apple.iokit.IOAHCIFamily 288
com.apple.driver.AppleThunderboltDPInAdapter 4.5.3
com.apple.driver.AppleThunderboltDPAdapterFamily 4.5.3
com.apple.driver.AppleThunderboltPCIDownAdapter 2.0.3
com.apple.driver.AppleThunderboltNHI 4.1.3
com.apple.iokit.IOThunderboltFamily 6.2.1
com.apple.iokit.IO80211Family 1200.12.2
com.apple.driver.mDNSOffloadUserClient 1.0.1b8
com.apple.iokit.IONetworkingFamily 3.2
com Apple.Driver.corecapture 1.0.4
com.apple.driver.usb.AppleUSBHostPacketFilter 1.0
com.apple.iokit.IOUSBFamily 900.4.1
com.apple.driver.usb.AppleUSBXHCIPCI 1.1
com.apple.driver.usb.AppleUSBXHCI 1.1
com.apple.iokit.IOUSBHostFamily 1.1
com.apple.driver.AppleUSBHostMergeProperties 1.1
com.apple.driver.AppleEFINVRAM 2.1
com.apple.driver.AppleBusPowerController 1.0
com.apple.driver.AppleEFIRuntime 2.0
com.apple.iokit.IOHIDFamily 2.0.0
com.apple.iokit.IOSMBusFamily 1.1
com Apple.Security.sandbox 300.0
com.apple.kext.AppleMatch 1.0.0d1
com.apple.driver.AppleKeyStore 2
com.apple.driver.AppleMobileFileIntegrity 1.0.5
com.apple.driver.AppleCredentialManager 1.0
com.apple.driver.DiskImages 444
com.apple.iokit.IOStorageFamily 2.1
com.apple.iokit.IOReportFamily 31
com.apple.driver.AppleFDEKeyStore 28.30
com.apple.driver.AppleACPIPlatform 5.0
com.apple.iokit.IOPCIFamily 2.9
com.apple.iokit.IOACPIFamily 1.4
com.apple.kec.Libm 1
com Apple.KEC.pthread 1
com Apple.KEC.corecrypto 1.0
System profile:
Airport: spairport_wireless_card_type_airport_extreme (0x14E4, 0 x 134), Broadcom BCM43xx 1.0 (7.21.171.10.1a16)
Bluetooth: Version 5.0.0f18, 3 services, 27 aircraft, 1 incoming serial ports
Bus crush: MacBook Pro, Apple Inc., 17.1
Memory module: BANK 0/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120
Memory module: BANK 1/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120
USB device: USB 3.0 Bus
USB device: Apple keyboard / Trackpad
USB device: Hub BRCM20702
USB Device: USB Bluetooth host controller
Serial ATA Device: APPLE SM0256F, 251 GB SSD
Model: MacBookPro11 2, MBP112.0138.B17 of BootROM, 4 processors, Intel Core i7, 2.2 GHz, 16 GB, MSC 2.18f15
Network service: Wi - Fi, AirPort, en0
Graphics card: Intel integrated Iris Pro, Intel Iris Pro,
Model: MacBookPro11 2, MBP112.0138.B17 of BootROM, 4 processors, Intel Core i7, 2.2 GHz, 16 GB, MSC 2.18f15
Graphics card: Intel integrated Iris Pro, Intel Iris Pro,
Memory module: BANK 0/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120
Memory module: BANK 1/DIMM0, 8 GB, DDR3, 1600 MHz, 0x802C, 0x31364B544631473634485A2D314736453120
Airport: spairport_wireless_card_type_airport_extreme (0x14E4, 0 x 134), Broadcom BCM43xx 1.0 (7.21.171.10.1a16)
Bluetooth: Version 5.0.0f18, 3 services, 27 aircraft, 1 incoming serial ports
Network service: Wi - Fi, AirPort, en0
Serial ATA Device: APPLE SM0256F, 251 GB SSD
USB device: USB 3.0 Bus
USB device: Apple keyboard / Trackpad
USB device: Hub BRCM20702
USB Device: USB Bluetooth host controller
Bus crush: MacBook Pro, Apple Inc., 17.1
You seem running unmodified Mac OS (no third party kernel extensions added). Mac OS do not plant this way. You should pay attention to this statement in the accident report:
panic (cpu 6 0xffffff80013ef077 appellant): "Possible memory corruption:
Maybe you are looking for
-
I can move my car outside firefox6.0 browser?
Can I move the Firefox application from my main drive to my external drive? Should what command I use? Move to? Send to? Or something else? The Firefox icon will remain on the taskbar? Addons of Firefox will also move? Thank you.
-
Installation of an EVGA in a Compaq Presario SR5710F 5600GT
Hello, users of the forum! A few moments ago, I bought a Compaq Presario SR5710. I noticed the horrible integrated graphics card (nforce 430 motherboard w / GeForce 6150SE) supplied with the machine, so I'm interested to the EVGA 5600GT graphics card
-
Is it possible to clean your computer. Then reinstall everything?
Original title: computer Is it possible to clean your computer. Then reinstall everything?
-
501 - pix basic configuration help
People: Just acquired a 501. I'm really new to cisco pix and have no idea how to set it up. NAT seems to work (I connect via a client workstation on the 'inside' interface) using the pdm. However, I can't get the 'external' interface to work. I must
-
IMPROVE the BRUTE &;. DNG WORKFLOW IN PREMIERE and AFTER EFFECTS
I am editor-in-Chief, and I work with raw. DNG files more over the past two years.Image with the RAW settings controls are amazing off course.But not the controls that Adobe provides to editing the .dng files. I find this workflow to be stoneaged, ex