FNF

Anyone know where to find a version of PDF creator who knows how to properly convert a music notation file, an FNF file into a PDF file?

Thanks for the file. It's a problem with embedding fonts. Assuming you are using the program strong, what you can do is find its installation directory (for example, C:\Program Files (x 86) \FORTE\Forte 5 Home\) and install all the files of fonts, you'll find. It will be a .ttf file extension and may include MClassic.ttf and MGuitar.ttf. They allow for the installable embedding, Acrobat will allow them to be embedded in a PDF document. Just right click on each file of fonts and select 'Install' and printing in PDF format should work after that.

Tags: Acrobat

Similar Questions

  • Flexible Netflow with IPSec configuration

    Hello

    I'm trying to configure netflow/flexible netflow on some 887 branch site routers, which have an IPSec tunnel to the main office.  It is my understanding that the router will not encrypt the traffic it generates itself, so the standard netflow will not work. The workaround I've seen is to use nonstandard and flexible netflow.

    I tried to set up flexible netflow with the following configuration;

    exporter of workflow EXPORTER-1

    destination 192.168.10.1

    source Vlan1

    9996 udp transport

    time-out of 60 model data

    flow meter FLOW-MONITOR-1

    exporter EXPORTER-1

    active cache timeout 60

    netflow-original record

    dialer interface 1

    FLOW-MONITOR-1 controller for the IP stream entry

    IP FLOW-MONITOR-1 output flow controller

    However this doesn't seem to work and our monitoring server receives all the data (I've used network monitor to capture traffic to see if the router sends traffic or not)

    When I check the flow seems not collect data (either incidentally, the site has a lot of users).

    CRF-R-DUM-001 #sh flow monitor FLOW-MONITOR-1 hidden
    Cache type: Normal
    Cache size: 4096
    Current entries: 11
    High Watermark: 403

    Streams added: 164825
    Flow of years: 164814
    -Timeout active (60 seconds) 22720
    -Timeout inactive (15 seconds) 142094
    -Aged event 0
    -Watermark 0
    -Aged 0 emergency

    CRF-R-DUM-001 #sh flow statistics exporter EXPORTER-1
    Exporter of flow EXPORTING-1:
    Packet statistics send (cleared last 6d05h there):
    Successfully sent: 69071 (13068236 bytes)

    Statistics of the customer send:
    Client: Flow FLOW-MONITOR-1 monitor
    Records added: 164840
    -sent: 164840
    The bytes added: 8736520
    -sent: 8736520

    CRF-R-DUM-001 #sh flow Dialer interface 1

    Interface Dialer1

    FNF: monitor: FLOW-MONITOR-1

    Direction: entry

    Traffic (IP): on

    FNF: monitor: FLOW-MONITOR-1

    Direction: exit

    Traffic (IP): on

    I was wondering if someone could confirm that I am along in the right direction in terms of configuration, or am I missing a step which must be configured or if it has other commands that I can use to check the netflow exports

    Thanks in advance

    Brian

    Hi Brian,.

    Make sure you have the 'exit function' option added to your workflow exporter. For more information, see this blog:

    http://blogs.ManageEngine.com/netflowanalyzer/2011/04/01/NetFlow-data-export-over-IPSec-tunnels/

    Kind regards

    Don Thomas Jacob

    www.netflowanalyzer.com

    NOTE: Please note the messages and close issues if your query answered

  • NET controls do not work in (SG6 15.0 IOS - XE (1r)

    NetFlow commands do not work

    (15,0 IOS - XE (1r) CE6) cat4500e-universalk9. Spa.03.03.00.SG.151 - 1.SG.bin running on switching location 2 WS-C4500X-32.

    Please suggest on this.

    Rgds,

    Pellen.

    Hello

    This switch supports Flexible Netflow, what configuration guidelines are explained here:

    http://www.Cisco.com/en/us/docs/switches/LAN/catalyst4500/15.1/XE_330SG/configuration/guide/FNF.html

    Kind regards

    Ivan Shirshin

    * Please rank this post if you find it useful.

  • IP over different WAN, source routing ip range? [cisco 891]

    Hi all!

    Here I am again asking for help! :)

    Here's the goal: I want a set of computers to use a WAN and another using the other WAN based on the IP address range.

    I use a router cisco 891. Fastethernet0 is a WAN, GigabitEthernet8 is the other WAN and gigabitethernet 0 to 7 are 8 switch of the router ports.

    From now on, I have my two internet access works very well, each of them is connected to a WAN port on my router. I have no problem have all my computers using a WAN or the other, or even load balancing between them, but what I want is to fix some computers with internet access and the other computer to use other internet access.

    I don't know how to do this, I looked in the delivery by source IP address, but I don't really know how to do. I saw something on the basis of routing policy, but I can only apply these policies on incoming packets that I seem not to be able to apply these policies to one of the switch port of the router. I would need to use the WAN port to connect my incoming LAN in, but then I would not be enough WAN port for both of my internet connections.

    Internet gateway #1 is 172.26.2.254

    #2 connection gateway is 192.168.1.254

    Here is my current config:
    I understand why I have bad connection whith this config since it is load balancing between the road two default and send only one of my two wan according to the INVESTIGATION period, but I don't know what to do to say precilesy Beach, the beach of IP #2 and IP #1 to go go here.

     Cisco891(config)#do sh run Building configuration... Current configuration : 3833 bytes ! ! Last configuration change at 15:11:43 UTC Tue Oct 20 2015 by *********** ! NVRAM config last updated at 14:58:11 UTC Tue Oct 20 2015 by *************** ! NVRAM config last updated at 14:58:11 UTC Tue Oct 20 2015 by ************** version 15.3 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname Cisco891 ! boot-start-marker boot-end-marker ! aqm-register-fnf ! enable secret 5 ************************/ enable password ************************ ! no aaa new-model ! ! ! ! ! ! ! ip dhcp excluded-address 172.26.1.1 172.26.1.49 ip dhcp excluded-address 172.26.1.100 172.26.1.254 ip dhcp excluded-address 10.10.20.1 10.10.20.49 ip dhcp excluded-address 10.10.20.100 10.10.20.254 ! ip dhcp pool vlan1pool network 172.26.1.0 255.255.255.0 default-router 172.26.1.254 dns-server 208.67.222.222 208.67.220.220 ! ! ! ip domain name lnc360.fr ip name-server 208.67.222.222 ip name-server 208.67.220.220 ip cef no ipv6 cef ! ! ! ! ! multilink bundle-name authenticated ! ! ! ! ! ! ! license udi pid C891F-K9 sn ******************************* ! ! username ******************** privilege 15 secret ************************************* ! ! ! ! ! no ip ftp passive ip ssh time-out 60 ip ssh logging events ip ssh version 2 ! ! ! ! ! ! ! ! ! ! interface BRI0 no ip address encapsulation hdlc shutdown isdn termination multidrop ! interface FastEthernet0 ip address 192.168.1.1 255.255.255.0 ip nat outside ip virtual-reassembly in duplex auto speed auto ! interface GigabitEthernet0 switchport mode trunk no ip address ! interface GigabitEthernet1 switchport mode trunk no ip address ! interface GigabitEthernet2 switchport mode trunk no ip address ! interface GigabitEthernet3 switchport mode trunk no ip address ! interface GigabitEthernet4 switchport mode trunk no ip address ! interface GigabitEthernet5 switchport mode trunk no ip address ! interface GigabitEthernet6 switchport mode trunk no ip address ! interface GigabitEthernet7 switchport mode trunk no ip address ! interface GigabitEthernet8 ip address 172.26.2.10 255.255.255.0 ip nat outside ip virtual-reassembly in duplex auto speed auto ! interface Vlan1 ip address 172.26.1.254 255.255.255.0 ip nat inside ip virtual-reassembly in ! interface Vlan2 ip address 10.10.10.254 255.255.255.0 ip nat inside ip virtual-reassembly in ! interface Async3 no ip address encapsulation slip ! ip forward-protocol nd ip http server ip http authentication local no ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ! ! ip nat inside source list LAN_PCs interface GigabitEthernet8 overload ip nat inside source list LAN_servers interface FastEthernet0 overload ip route 0.0.0.0 0.0.0.0 172.26.2.254 ip route 0.0.0.0 0.0.0.0 192.168.1.254 ! ip access-list extended LAN_PCs deny ip 172.26.1.0 0.0.0.31 any deny ip 172.26.1.112 0.0.0.15 any deny ip 172.26.1.240 0.0.0.15 any permit ip 172.26.1.0 0.0.0.255 any ip access-list extended LAN_servers permit ip 10.10.10.0 0.0.0.255 any permit ip 172.26.1.0 0.0.0.31 any permit ip 172.26.1.112 0.0.0.15 any permit ip 172.26.1.240 0.0.0.15 any ! ! ! control-plane ! ! ! mgcp behavior rsip-range tgcp-only mgcp behavior comedia-role none mgcp behavior comedia-check-media-src disable mgcp behavior comedia-sdp-force disable ! mgcp profile default ! ! ! ! ! line con 0 no modem enable line aux 0 line 3 modem InOut speed 115200 flowcontrol hardware line vty 0 4 privilege level 15 password 7 ****************************************** login local transport input ssh transport output ssh line vty 5 15 password 7 *********************************************** login local transport input telnet transport output telnet ! scheduler allocate 20000 1000 ntp update-calendar ntp server 0.europe.pool.ntp.org ! end

    Thank you!

    Hello

    Apply the ACB on the SVI strategy ' sof the VLAN

    int vlan 1
    intellectual property policy map route ACB

    int vlan 2
    intellectual property policy map route ACB

    RES

    Paul

  • 891 router - no IP on VLAN 2

    Hi all!

    I am) very new to all this and I have to configure a router cisco 891. So far I was doing ok but I have a problem to connect devices on the vlan 2.

    I don't want to assign vlan according to the port, the devices are able to score their own packages.

    For the moment, when I connect a 'classic' device, it will on the vlan 1 and get an ip address from my pool vlan 1. Very well. Problems begin when I tell the device to mark his package as belonging to the vlan 2. As soon as I do this, I just can't get any address from my dhcp assigned IP.

    Here is my config file, someone has an idea? :)

     Building configuration... Current configuration : 2978 bytes ! ! Last configuration change at 14:20:32 UTC Thu Oct 15 2015 by tchavrier version 15.3 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Cisco891 ! boot-start-marker boot-end-marker ! aqm-register-fnf ! enable secret 5 XXXXXXXXXXXXXXXXXXXXXXXXX enable password XXXXXXXXXXXXXXXXXXXXXXXXX ! no aaa new-model ! ! ! ! ! ! ! ip dhcp excluded-address 172.26.1.1 172.26.1.49 ip dhcp excluded-address 172.26.1.100 172.26.1.254 ip dhcp excluded-address 10.10.10.1 10.10.10.49 ip dhcp excluded-address 10.10.10.100 10.10.10.254 ip dhcp excluded-address 10.10.20.1 10.10.20.49 ip dhcp excluded-address 10.10.20.100 10.10.20.254 ! ip dhcp pool vlan1pool network 172.26.1.0 255.255.255.0 default-router 172.26.1.254 dns-server 208.67.220.220 ! ip dhcp pool vlan2pool network 10.10.10.0 255.255.255.0 default-router 10.10.10.254 dns-server 208.67.222.222 ! ip dhcp pool vlan3pool network 10.10.20.0 255.255.255.0 default-router 10.10.20.254 dns-server 208.67.222.222 ! ! ! ip cef no ipv6 cef ! ! ! ! ! multilink bundle-name authenticated ! ! ! ! ! ! ! license udi pid C891F-K9 sn FCZ1939917U ! ! username XXXXXXXXXXXXXXXXXXX privilege 15 secret 5 XXXXXXXXXXXXXXXXXXXXXXXXXXXX. ! ! ! ! ! no ip ftp passive ! ! ! ! ! ! ! ! ! ! interface BRI0 no ip address encapsulation hdlc shutdown isdn termination multidrop ! interface FastEthernet0 ip address dhcp ip nat outside ip virtual-reassembly in duplex auto speed auto ! interface GigabitEthernet0 no ip address ! interface GigabitEthernet1 no ip address ! interface GigabitEthernet2 no ip address ! interface GigabitEthernet3 no ip address ! interface GigabitEthernet4 no ip address ! interface GigabitEthernet5 no ip address ! interface GigabitEthernet6 no ip address ! interface GigabitEthernet7 no ip address ! interface GigabitEthernet8 ip address dhcp ip nat outside ip virtual-reassembly in duplex auto speed auto ! interface Vlan1 ip address 172.26.1.254 255.255.255.0 ! interface Vlan2 ip address 10.10.10.254 255.255.255.0 ! interface Vlan3 ip address 10.10.20.254 255.255.255.0 ! interface Async3 no ip address encapsulation slip ! ip forward-protocol nd ip http server ip http authentication local no ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ! ip flow-top-talkers top 10 sort-by bytes cache-timeout 60000 ! ! ! ! control-plane ! ! ! mgcp behavior rsip-range tgcp-only mgcp behavior comedia-role none mgcp behavior comedia-check-media-src disable mgcp behavior comedia-sdp-force disable ! mgcp profile default ! ! ! ! ! line con 0 no modem enable line aux 0 line 3 modem InOut speed 115200 flowcontrol hardware line vty 0 4 privilege level 15 password haricotmarteaulitjaune login local transport input telnet transport output telnet line vty 5 15 password haricotmarteaulitjaune login local transport input telnet transport output telnet ! scheduler allocate 20000 1000 ! end

    Thank you!

    Hello

    If your devices are marking their own packages (IE VLAN2) then the switchport will reject the.

    Without any explicit configuration on the switchports, they will be configured with native VLAN1. This means any packet received on that switchport who doesn't have a tag of VLAN is tagged with VLAN ID 1. All packages with tags will be ignored, but since you have not configured for trunking they will be discontinued.

    To make it work, you must add the following:

     ! int range gi0-8 switchport trunk native vlan 1 switchport trunk allowed vlan all !

    This would allow to the unmarked packages be sent (VLAN1), but would also treat packages that are being scored by connected devices (providing configuring VLANS exist on the router).

    Hope that helps.

    see you soon,

    SEB.

  • Tunnels of DMVPN causing 99% of the CPU on 2951

    See this issue today with a talk in India.  We have double double cloud hub and if each tunnel is up the spikes of CPU at 99% and the router starts to drop packets.  If I stopped the two tunnels, everything returns to normal, and I have no idea what could be the cause of this?  Something by pushing a large amount of data through the tunnels DMVPN?  Once I bring the backup tunnels I see EIGRP heartbeat constantly and the peaks of the processor immediately but nothing show me what is the cause of the problem.   If it's someone trying to push traffic between sites, he would show little matter what tunnel is on the rise because they are redundant, but I am at a loss.

    No changes to this router.  Any ideas?

    Stop DMVPN tunnel:

    CPU utilization for five seconds: 1%/0%; one minute: 1%; five minutes: 18% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process  88 46924 1768 26540 0.15% 0.11% 0.10% 0 Per-Second Jobs  107 48420 5072 9546 0.23% 0.19% 0.18% 0 Netclock Backgro  145 12028 116244 103 0.07% 0.10% 0.08% 0 Ethernet Msec Ti  458 11244 194180 57 0.39% 0.39% 0.35% 0 IP SLAs XOS Even 
    1 or two tunnels DVMPN upwards:
    CPU utilization for five seconds: 99%/97%; one minute: 51%; five minutes: 53% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process  88 46856 1418 33043 0.15% 0.11% 0.10% 0 Per-Second Jobs  107 48164 3691 13049 0.07% 0.15% 0.16% 0 Netclock Backgro  117 23784 2362 10069 0.15% 0.16% 0.11% 644 SSH Process  128 7040 33962 207 0.07% 0.06% 0.05% 0 SEC BATCH  145 12024 72842 165 0.07% 0.08% 0.08% 0 Ethernet Msec Ti  455 184752 1484 124495 0.38% 0.13% 0.24% 0 CFT Timer Proces  456 862876 2097 411481 0.54% 0.29% 0.40% 0 FNF Cache Ager P  458 11168 108909 102 0.07% 0.25% 0.23% 0 IP SLAs XOS Even ]

    you have high interruption that is causing the high CPU. Traffic will CPU...

    Make sure that the change of CEF is enabled on all interfaces.

    Visit this link for possible causes of high breaks...

    http://www.Cisco.com/c/en/us/support/docs/routers/7500-series-routers/41...

    Thank you

    Véronique

  • Problem on site to site and between router vpn client series 2,800

    Hello

    I need a little help.

    I have 2 office of connection with a site to site vpn

    Each site has a dry - k9 router 800 series.

    Each router has actually client ipsec vpn active and all users can connect by using the client vpn with no problems.

    I added the lines for the vpn site to another, but the tunnel is still down.

    Here the sh run and sh encryption session 2 routers:

    OFFICE A

    version 15.3
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    OFFICE-A-DG host name
    !
    boot-start-marker
    boot-end-marker
    !
    AQM-registry-fnf
    !
    !
    AAA new-model
    !
    !
    AAA authentication login default local
    AAA authentication login xauthlist local
    AAA authorization exec default local
    AAA authorization exec vty group xauthlocal
    AAA authorization exec defaultlocal group bdbusers
    AAA authorization groupauthor LAN
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    !
    Crypto pki trustpoint TP-self-signed-220561722
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 220561722
    revocation checking no
    rsakeypair TP-self-signed-220561722
    !
    !
    TP-self-signed-220561722 crypto pki certificate chain
    certificate self-signed 01
      
    quit smoking
    !
    !
    !
    !

    !
    !
    dhcp WIRED IP pool
    Network 10.0.0.0 255.255.255.0
    router by default - 10.0.0.254
    Server DNS 10.0.0.100
    !
    !
    !
    8.8.8.8 IP name-server
    no ip cef
    No ipv6 cef
    !
    !
    !
    !
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    !
    !
    !
    !
    !

    !
    !
    !
    !
    !
    VDSL controller 0
    !
    property intellectual ssh rsa ssh key pair name
    property intellectual ssh version 2
    property intellectual ssh pubkey-string
     
    !
    !
    crypto ISAKMP policy 3
    BA 3des
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 20
    md5 hash
    preshared authentication
    OFFICE-B-IP address ISAKMP crypto key XXXXX
    !
    ISAKMP crypto client configuration group remoteusers
    key XXXX
    DNS 10.0.0.100
    WINS 10.0.0.100
    domain.ofc field
    pool ippool
    ACL 101
    !
    !
    Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT
    tunnel mode
    Crypto ipsec transform-set esp - esp-md5-hmac xauathtransform
    tunnel mode
    !
    !
    !
    Crypto-map dynamic dynmap 10
    Set transform-set RIGHT
    Crypto-map dynamic dynmap 20
    Set transform-set RIGHT
    !
    !
    map clientmap client to authenticate crypto list userathen
    card crypto clientmap isakmp authorization list groupauthor
    client configuration address map clientmap crypto answer
    10 ipsec-isakmp crypto map clientmap Dynamics dynmap
    20 ipsec-isakmp crypto map clientmap
    defined OFFICE-B-IP peer
    Set transform-set RIGHT
    match address 115
    !
    !
    !
    !
    !
    !
    !
    ATM0 interface
    no ip address
    No atm ilmi-keepalive
    PVC 8/35
    aal5mux encapsulation ppp Dialer
    Dialer pool-member 1
    !
    !
    interface Ethernet0
    no ip address
    Shutdown
    !
    interface FastEthernet0
    INTERNAL description
    switchport access vlan 10
    no ip address
    !
    interface FastEthernet1
    no ip address
    Shutdown
    !
    interface FastEthernet2
    switchport access vlan 10
    no ip address
    !
    interface FastEthernet3
    switchport access vlan 10
    no ip address
    !
    interface Vlan1
    no ip address
    Shutdown
    !
    interface Vlan10
    IP 10.0.0.254 255.255.255.0
    IP nat inside
    IP virtual-reassembly in
    !
    interface Dialer0
    the negotiated IP address
    NAT outside IP
    IP virtual-reassembly in
    encapsulation ppp
    Dialer pool 1
    Authentication callin PPP chap Protocol
    PPP pap sent-name of user password xxx xxx 0
    clientmap card crypto
    !
    router RIP
    version 2
    10.0.0.0 network
    network 192.168.1.0
    !
    IP local pool ippool 10.16.20.1 10.16.20.200
    IP forward-Protocol ND
    no ip address of the http server
    no ip http secure server
    !
    !
    the IP nat inside source 1 interface Dialer0 overload list
    overload of IP nat inside source list 101 interface Dialer0
    IP route 0.0.0.0 0.0.0.0 Dialer0
    !
    !
    access-list 22 allow 10.16.20.0
    access-list 22 permit 10.16.20.0 0.0.0.255
    Note access-list 101 * ACL SHEEP *.
    access-list 101 deny ip 10.0.0.0 0.0.0.255 10.16.20.0 0.0.0.255
    access-list 101 permit ip 10.0.0.0 0.0.0.255 any
    access-list 115 permit ip 10.0.0.0 0.0.0.255 192.168.1.0 0.0.0.255
    !
    !
    !
    control plan
    !
    !
    !
    MGCP behavior considered range tgcp only
    MGCP comedia-role behavior no
    disable the behavior MGCP comedia-check-media-src
    disable the behavior of MGCP comedia-sdp-force
    !
    profile MGCP default
    !
    !
    !
    !
    !
    Line con 0
    no activation of the modem
    line to 0
    line vty 0 4
    exec-timeout 0 0
    preferred transport ssh
    transport input telnet ssh
    !
    Scheduler allocate 20000 1000
    !
    end

    OFFICE B

    OFFICE-B-DG host name
    !
    boot-start-marker
    boot-end-marker
    !
    AQM-registry-fnf

    !
    AAA new-model
    !
    !
    AAA authentication login default local
    AAA authentication login xauthlist local
    AAA authorization exec default local
    AAA authorization exec vty group xauthlocal
    AAA authorization exec defaultlocal group bdbusers
    AAA authorization groupauthor LAN
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    !
    Crypto pki trustpoint TP-self-signed-1514396900
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 1514396900
    revocation checking no
    rsakeypair TP-self-signed-1514396900
    !
    !
    TP-self-signed-1514396900 crypto pki certificate chain
    certificate self-signed 01
      
    quit smoking

    !
    !
    8.8.8.8 IP name-server
    no ip cef
    No ipv6 cef
    !
    !
    !
    !
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    !
    !
    !
    !
    !
    license udi pid C887VAM-K9 sn FCZ191362Q7
    !
    !

    !
    !
    !
    !
    VDSL controller 0
    !
    property intellectual ssh rsa SSH key pair name
    !
    !
    crypto ISAKMP policy 1
    md5 hash
    preshared authentication
    !
    crypto ISAKMP policy 3
    BA 3des
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 20
    md5 hash
    preshared authentication
    encryption XXXX isakmp key address IP-OFFICE-A

    !
    ISAKMP crypto client configuration group remoteusers
    key xxxx
    DNS 192.168.1.10
    WINS 192.168.1.10
    rete.loc field
    pool ippool
    ACL 101
    !
    !
    Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT
    tunnel mode
    Crypto ipsec transform-set esp - esp-md5-hmac xauathtransform
    tunnel mode
    Crypto ipsec transform-set esp - esp-md5-hmac rtpset
    tunnel mode
    !
    !
    !
    Crypto-map dynamic dynmap 10
    Set transform-set RIGHT
    Crypto-map dynamic dynmap 20
    Set transform-set RIGHT
    !
    !
    map clientmap client to authenticate crypto list userathen
    card crypto clientmap isakmp authorization list groupauthor
    client configuration address map clientmap crypto answer
    10 ipsec-isakmp crypto map clientmap Dynamics dynmap
    20 ipsec-isakmp crypto map clientmap
    peer IP-OFFICE-A value
    Set transform-set RIGHT
    match address 115
    !
    !
    !
    !
    !
    !
    !
    interface Loopback1
    no ip address
    !
    ATM0 interface
    no ip address
    No atm ilmi-keepalive
    PVC 8/35
    aal5mux encapsulation ppp Dialer
    Dialer pool-member 1
    !
    !
    interface Ethernet0
    no ip address
    Shutdown
    !
    interface FastEthernet0
    switchport access vlan 30
    no ip address
    !
    interface FastEthernet1
    switchport access vlan 30
    no ip address
    !
    interface FastEthernet2
    switchport access vlan 20
    no ip address
    !
    interface FastEthernet3
    switchport access vlan 10
    no ip address
    !
    interface Vlan1
    no ip address
    Shutdown
    !
    Vlan30 interface
    IP 192.168.1.254 255.255.255.0
    IP nat inside
    IP virtual-reassembly in
    !
    interface Dialer0
    the negotiated IP address
    NAT outside IP
    IP virtual-reassembly in
    encapsulation ppp
    Dialer pool 1
    Authentication callin PPP chap Protocol
    PPP pap sent-name to user
    clientmap card crypto
    !
    router RIP
    version 2
    10.0.0.0 network
    network 192.168.1.0
    !
    IP local pool ippool 10.16.20.201 10.16.20.250
    IP forward-Protocol ND
    no ip address of the http server
    no ip http secure server
    !
    !
    the IP nat inside source 1 interface Dialer0 overload list
    overload of IP nat inside source list 101 interface Dialer0
    IP nat inside source static tcp 192.168.1.100 5060 interface Dialer0 5060
    IP nat inside source static tcp 192.168.1.100 5061 interface Dialer0 5061
    IP nat inside source static tcp 192.168.1.100 5062 interface Dialer0 5062
    IP nat inside source static tcp 192.168.1.100 5063 5063 Dialer0 interface
    IP nat inside source static tcp 192.168.1.100 5064 interface Dialer0 5064
    IP nat inside source static udp 192.168.1.100 5060 interface Dialer0 5060
    IP nat inside source static udp 192.168.1.100 5061 interface Dialer0 5061
    IP nat inside source static udp 192.168.1.100 5062 interface Dialer0 5062
    IP nat inside source static udp 192.168.1.100 5063 5063 Dialer0 interface
    IP nat inside source static udp 192.168.1.100 5064 interface Dialer0 5064
    IP nat inside source static tcp 192.168.1.100 3541 interface Dialer0 3541
    IP nat inside source static udp 192.168.1.100 3541 interface Dialer0 3541
    IP route 0.0.0.0 0.0.0.0 Dialer0
    !
    !
    sheep allowed 10 route map
    corresponds to the IP 150 101
    !
    access-list 22 allow 10.16.20.0
    access-list 22 permit 10.16.20.0 0.0.0.255
    access list 101 deny ip 192.168.1.0 0.0.0.255 10.16.20.0 0.0.0.255
    ACCESS-list 101 permit ip 192.168.1.0 0.0.0.255 any
    access-list 115 permit ip 192.168.1.0 0.0.0.255 10.0.0.0 0.0.0.255
    !
    !
    !
    control plan
    !
    !
    !
    MGCP behavior considered range tgcp only
    MGCP comedia-role behavior no
    disable the behavior MGCP comedia-check-media-src
    disable the behavior of MGCP comedia-sdp-force
    !
    profile MGCP default
    !
    !
    !
    !
    !
    Line con 0
    no activation of the modem
    line to 0
    line vty 0 4
    exec-timeout 0 0
    password Password02
    preferred transport ssh
    transport input telnet ssh
    !
    Scheduler allocate 20000 1000
    !
    end

    Thanks in advance for any help :)

    the site at the other tunnel is mounted, but it does not pass traffic; What is the source and destination ip on the router that you are trying to ping the address

    whenever you try to open the traffic from router A to router B, you must to the source of the traffic.

    for ex,.

    Router A-->10.1.1.1--fa0/0

    Router B - 172.168.1.100

    source of ping 172.168.1.100 router # 10.1.1.1

    After doing the pings, send the output of the show counterpart of its crypto ipsec at both ends

  • Site to site VPN works only on Cisco 881

    I have 2 problems with a cisco 881. The first problem is that Vlan2 (192.168.5.xx) cannot access the internet on the outside. But I know that the router has internet, because I can ping the external ip address. The 2nd problem is that I have a set of site to another upward, but when I test the Site to site I get this error:

    destination of traffic of the tunnel must be channelled through the crypto map interface. The destination following (s) doesn't have a routing entry in the routing table
    192.168.2.0

    I copied the config form this router from another cisco 881 work, where everything works. The only difference is that this router needs a site to site vpn connection.

    My question is how I can get internet on vlan2 and who can I solve the connection to site to site.

    Here's the running configuration:

    Building configuration...

    Current configuration: 12698 bytes
    !
    version 15.3
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    hostname Cisco_881
    !
    boot-start-marker
    boot-end-marker
    !
    AQM-registry-fnf
    !
    logging buffered 51200 warnings
    !
    AAA new-model
    !
    !
    AAA authentication login default local
    AAA authorization exec default local
    AAA authorization network default local
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    !
    Crypto pki trustpoint TP-self-signed-1151531093
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 1151531093
    revocation checking no
    rsakeypair TP-self-signed-1151531093
    !
    Crypto pki trustpoint TP-self-signed-2011286623
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 2011286623
    revocation checking no
    rsakeypair TP-self-signed-2011286623
    !
    !
    TP-self-signed-1151531093 crypto pki certificate chain
    certificate self-signed 01
    3082022B 30820194 02020101 300 D 0609 2A 864886 F70D0101 05050030 A0030201
    2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 31312F30
    69666963 31313531 35333130 6174652D 3933301E 170 3135 30343031 31363230
    34315A 17 0D 323030 31303130 30303030 305A 3031 06035504 03132649 312F302D
    4F532D53 5369676E 656C662D 43 65727469 66696361 74652 31 31353135 65642D
    33313039 3330819F 300 D 0609 2A 864886 01050003, 818, 0030, 81890281 F70D0101
    8100AC6E E7FA8AFD 9D4E206C 2B23DFC1 990AFDB3 98CD84A7 37697253 A7EF2520
    0C45190E 298B6E9F E2711580 80DCFBFB 05A6A0BA 347B960B D9DA17FC B1543B9D
    FBC048F3 063EBBC5 02391432 F0232A73 EAC7278E 8CB83005 D13A1D47 BEF18198
    A 547469, 2 F65ED0E6 249BF517 1E74117D C94BE542 46EE487D A3843F12 364639B 4
    0B 090203 010001 HAS 3 53305130 1 130101 FF040530 030101FF 301F0603 0F060355
    551 2304 18301680 147996F4 3E6D0EE2 2D9065BB D726137C 2DF42ABE 01301D 06
    03551D0E 04160414 7996F43E 6D0EE22D 9065BBD7 26137C2D F42ABE01 300 D 0609
    2A 864886 F70D0101 8181002A 05050003 677B9BE6 CB60D188 73227C4B 2DC33101
    BD448017 EDEF0296 FF7438A3 4C46519B 144C775F 1429CF06 7DB29F2D EB16EE75
    22100B 63 0D75511A 98DC57DC EF87BED2 1C1635C8 B5352706 3963037A 4E9B739A
    3A1EC9BE 8431BD70 116D3B31 E4A2AC4C 0F934B3F 196AF829 AD537005 6935B 451
    EB31DB3F A9BA6D70 65B70D19 D00158
    quit smoking
    TP-self-signed-2011286623 crypto pki certificate chain
    no ip source route
    !
    !
    !
    !

    !
    DHCP excluded-address IP 10.10.10.1
    DHCP excluded-address IP 192.168.5.1 192.168.5.49
    DHCP excluded-address IP 192.168.5.150 192.168.5.254
    !
    DHCP IP CCP-pool
    import all
    Network 10.10.10.0 255.255.255.248
    default router 10.10.10.1
    Rental 2 0
    !
    IP dhcp Internet pool
    network 192.168.5.0 255.255.255.0
    router by default - 192.168.5.254
    DNS-Server 64.59.135.133 64.59.128.120
    lease 6 0
    !
    !
    !
    no ip domain search
    "yourdomain.com" of the IP domain name
    name of the IP-Server 64.59.135.133
    name of the IP-Server 64.59.128.120
    IP cef
    No ipv6 cef
    !
    !
    !
    !
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    !
    !
    !
    !
    !
    udi pid C881-K9 sn FTX18438503 standard license
    !
    !
    Archives
    The config log
    hidekeys
    username * privilege 15 secret 5 $1$IBY.$X5/iqYy47a5vAWWuG4/Oa/
    username * secret 5 $1$ 17 ST$ QzJMvQnZ9Q.1y7u0rYXFa0
    username * secret 5 $1$ L4W9$ zBKpawZ3i5nXxwyS9H6Lf1
    !
    !
    !
    !
    !
    no passive ftp ip
    !
    !
    crypto ISAKMP policy 1
    BA aes 256
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 2
    BA 3des
    preshared authentication
    Group 2
    isakmp encryption key * address 208.98.212.xx
    !
    Configuration group crypto isakmp MPE client
    key *.
    pool VPN_IP_POOL
    ACL 100
    include-local-lan
    10 Max-users
    netmask 255.255.255.0
    banner ^ practive entered the field

    This area is reserved for administrators of control systems.

    If you are here by mistake, please disconnect immediately.

    You have full access to 192.168.125.0 / 0.0.0.255

    Support on continue to start your session.              ^ C
    !
    Configuration group customer crypto isakmp PALL
    key *.
    pool VPN_IP_POOL_PALL
    ACL 101
    include-local-lan
    Max - 1 users
    netmask 255.255.255.0
    banner ^ practive entered the field

    This area is limited to the PALL access only.

    If you are here by mistake, please disconnect immediately.

    You have full access to 192.168.125.0 / 0.0.0.255

    Support on continue to start your session.            ^ C
    ISAKMP crypto profile vpn_isakmp_profile
    game of identity EMT group
    client authentication list default
    Default ISAKMP authorization list
    client configuration address respond
    virtual-model 1
    ISAKMP crypto profile vpn_isakmp_profile_2
    match of group identity PALL
    client authentication list default
    Default ISAKMP authorization list
    client configuration address respond
    virtual-model 2
    !
    !
    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac VPN_TRANSFORM
    tunnel mode
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    tunnel mode
    !
    Profile of crypto ipsec VPN_PROFILE_MPE
    Set the security association idle time 3600
    game of transformation-VPN_TRANSFORM
    vpn_isakmp_profile Set isakmp-profile
    !
    Profile of crypto ipsec VPN_PROFILE_PALL
    Set the security association idle time 1800
    game of transformation-VPN_TRANSFORM
    vpn_isakmp_profile_2 Set isakmp-profile
    !
    !
    !
    map SDM_CMAP_1 1 ipsec-isakmp crypto
    Description Tunnel to208.98.212.xx
    the value of 208.98.212.xx peer
    game of transformation-ESP-3DES-SHA
    match address 102
    !
    !
    !
    !
    !
    !
    interface Loopback0
    IP 192.168.40.254 255.255.255.0
    !
    interface FastEthernet0
    no ip address
    !
    interface FastEthernet1
    no ip address
    !
    interface FastEthernet2
    switchport access vlan 2
    no ip address
    !
    interface FastEthernet3
    switchport access vlan 2
    no ip address
    !
    interface FastEthernet4
    IP address 208.98.213.xx 255.255.255.224
    IP access-group 111 to
    NAT outside IP
    IP virtual-reassembly in
    automatic duplex
    automatic speed
    map SDM_CMAP_1 crypto
    !
    type of interface virtual-Template1 tunnel
    IP unnumbered Loopback0
    ipv4 ipsec tunnel mode
    Tunnel VPN_PROFILE_MPE ipsec protection profile
    !
    tunnel type of interface virtual-Template2
    IP unnumbered Loopback0
    ipv4 ipsec tunnel mode
    Tunnel VPN_PROFILE_PALL ipsec protection profile
    !
    interface Vlan1
    Description of control network
    IP 192.168.125.254 255.255.255.0
    IP access-group CONTROL_IN in
    IP access-group out CONTROL_OUT
    IP nat inside
    IP virtual-reassembly in
    IP tcp adjust-mss 1452
    !
    interface Vlan2
    Description Internet network
    IP 192.168.5.254 255.255.255.0
    IP access-group INTERNET_IN in
    IP access-group out INTERNET_OUT
    IP nat inside
    IP virtual-reassembly in
    !
    local IP VPN_IP_POOL 192.168.40.100 pool 192.168.40.150
    local IP VPN_IP_POOL_PALL 192.168.40.151 pool 192.168.40.152
    IP forward-Protocol ND
    IP http server
    23 class IP http access
    local IP http authentication
    IP http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    !
    !
    IP nat inside source static tcp 192.168.125.2 25000 25000 FastEthernet4 interface
    IP nat inside source overload map route SDM_RMAP_1 interface FastEthernet4
    IP route 0.0.0.0 0.0.0.0 FastEthernet4 permanent 208.98.236.xx
    !
    CONTROL_IN extended IP access list
    Note the access control
    Note the category CCP_ACL = 17
    allow any host 192.168.125.254 eq non500-isakmp udp
    allow any host 192.168.125.254 eq isakmp udp
    allow any host 192.168.125.254 esp
    allow any host 192.168.125.254 ahp
    IP 192.168.125.0 allow 0.0.0.255 192.168.125.0 0.0.0.255
    Note the VPN access
    IP 192.168.125.0 allow 0.0.0.255 192.168.40.0 0.0.0.255
    Note Access VNC
    permit tcp host 192.168.125.2 eq 25000 one
    Comment by e-mail to WIN911
    permit tcp host 192.168.125.2 any eq smtp
    Note DNS traffic
    permit udp host 192.168.125.2 host 64.59.135.133 eq field
    permit udp host 192.168.125.2 host 64.59.128.120 eq field
    Note Everything Else block
    refuse an entire ip
    CONTROL_OUT extended IP access list
    Note the access control
    IP 192.168.125.0 allow 0.0.0.255 192.168.125.0 0.0.0.255
    Note the VPN access
    ip permit 192.168.40.0 0.0.0.255 192.168.125.0 0.0.0.255
    Note Access VNC
    allow any host 192.168.125.2 eq 25000 tcp
    Comment by e-mail to WIN911
    allow any host 192.168.125.2 eq smtp tcp
    Note DNS responses
    allowed from any host domain eq 192.168.125.2 udp
    Note deny all other traffic
    refuse an entire ip
    INTERNET_IN extended IP access list
    Note Access VNC on VLAN
    allow any host 192.168.125.2 eq 25000 tcp
    Note block all other controls and VPN
    deny ip any 192.168.125.0 0.0.0.255
    deny ip any 192.168.40.0 0.0.0.255
    Note leave all other traffic
    allow an ip
    INTERNET_OUT extended IP access list
    Note a complete outbound Internet access
    allow an ip
    WAN_IN extended IP access list
    allow an ip host 207.229.14.xx
    Note PERMIT ESTABLISHED TCP connections
    allow any tcp smtp created everything eq
    Note ALLOW of DOMAIN CONNECTIONS
    permit udp host 64.59.135.133 eq field all
    permit udp host 64.59.128.120 eq field all
    Note ALLOW ICMP WARNING RETURNS
    allow all all unreachable icmp
    permit any any icmp parameter problem
    allow icmp all a package-too-big
    allow a whole icmp administratively prohibited
    permit icmp any any source-quench
    allow icmp all once exceed
    refuse a whole icmp
    allow an ip
    !
    auto discovering IP sla
    not run cdp
    !
    allowed SDM_RMAP_1 1 route map
    corresponds to the IP 103
    !
    access-list 1 remark out to WAN routing
    Note CCP_ACL the access list 1 = 16 category
    access-list 1 permit 192.168.125.2
    access-list 1 permit 192.168.5.0 0.0.0.255
    Note access-list 23 SSH and HTTP access permissions
    access-list 23 permit 192.168.125.0 0.0.0.255
    access-list 23 permit 192.168.40.0 0.0.0.255
    access-list 23 allow one
    Note access-list 100 VPN traffic
    access-list 100 permit ip 192.168.125.0 0.0.0.255 any
    access-list 100 permit ip 192.168.40.0 0.0.0.255 any
    Note access-list 101 for PALL VPN traffic
    access-list 101 permit ip 192.168.125.0 0.0.0.255 any
    Note access-list 102 CCP_ACL category = 4
    Note access-list 102 IPSec rule
    access-list 102 permit ip 192.168.5.0 0.0.0.255 192.168.2.0 0.0.1.255
    Note access-list 103 CCP_ACL category = 2
    Note access-list 103 IPSec rule
    access-list 103 deny ip 192.168.5.0 0.0.0.255 192.168.2.0 0.0.1.255
    access-list 103 allow ip 192.168.5.0 0.0.0.255 any
    access-list 103 allow the host ip 192.168.125.2 all
    Note access-list 111 CCP_ACL category = 17
    access-list 111 permit udp any host 208.98.213.xx eq non500-isakmp
    access-list 111 permit udp any host 208.98.213.xx eq isakmp
    access-list 111 allow esp any host 208.98.213.xx
    access-list 111 allow ahp any host 208.98.213.xx
    Note access-list 111 IPSec rule
    access-list 111 permit ip 192.168.2.0 0.0.1.255 192.168.5.0 0.0.0.255
    Note access-list 111 IPSec rule
    access-list 111 permit ip 192.168.2.0 0.0.1.255 192.168.4.0 0.0.1.255
    access-list 111 permit udp host 208.98.212.xx host 208.98.213.xx eq non500-isakmp
    access-list 111 permit udp host 208.92.12.xx host 208.92.13.xx eq isakmp
    access-list 111 allow esp host 208.92.12.xx host 208.92.13.xx
    access-list 111 allow ahp host 208.92.12.xx host 208.92.13.xx
    access-list 111 permit icmp any host 208.92.13.xx
    access-list 111 permit tcp any host 208.92.13.xx eq 25000
    access-list 111 permit tcp any host 208.92.13.xx eq 22
    access-list 111 permit tcp any host 208.92.13.xx eq telnet
    access-list 111 permit tcp any host 208.92.13.xx eq www
    !
    !
    !
    control plan
    !
    !
    !
    MGCP behavior considered range tgcp only
    MGCP comedia-role behavior no
    disable the behavior MGCP comedia-check-media-src
    disable the behavior of MGCP comedia-sdp-force
    !
    profile MGCP default
    !
    !
    !
    !
    exec banner ^ C
    % Warning of password expiration.
    -----------------------------------------------------------------------

    Unplug IMMEDIATELY if you are not an authorized user
    ^ C
    !
    Line con 0
    no activation of the modem
    line to 0
    line vty 0 4
    access-class 23 in
    password *.
    transport input telnet ssh
    transportation out all
    line vty 5 15
    access-class 160 in
    password *.
    transport of entry all
    transportation out all
    !
    max-task-time 5000 Planner
    Scheduler allocate 20000 1000
    !
    end

    Thank you.

    It seems that DNS has failed, because it is indeed happened to internet, but it does not work when internet DNS resolution.

    Go ahead and try to ping this 157.166.226.25, and it's on the browser http://157.166.226.25/, CNN.com. Let's try those. Also just in case where to configure a DNS SERVER on your router.

    - http://www.cisco.com/c/en/us/support/docs/ip/domain-name-system-dns/2418...

    Disable any ZBF just in case.

    David Castro,

    Kind regards

Maybe you are looking for