GANYMEDE + config help

Having trouble with a Ganymede config...

I can't SSH into my switch 3560 with a configured RADIUS username / password but orders as write mem or dir display an error message.

The command ' write' is not allowed for the user [user_name] and customer [ip address]

AAA new-model
AAA authentication login default group Ganymede + local
the AAA authentication enable default group Ganymede + activate
AAA authorization config-commands
AAA authorization exec default group Ganymede + authenticated if
AAA authorization commands 1 default group Ganymede + authenticated if
AAA authorization commands 15 default group Ganymede + authenticated if
AAA accounting exec default start-stop Ganymede group.
orders accounting AAA 1 by default start-stop Ganymede group.
orders accounting AAA 15 by default start-stop Ganymede group.
AAA - the id of the joint session

Hi Rob,

As everything is Ganymede + specific.

If the command is without authority, this has be checked on the Ganymede server +.

What is a Ganymede server + you use?

Concerning

Ed

Tags: Cisco Security

Similar Questions

  • PIX 515E v7 VPN config help

    Hello

    I have a PIX 515E current of execution to 7.

    Is it possible to use VPN with only 1 static IP address from the ISP (no gateway or the ip address of the ISP router is provided).

    I can set up routing on the ADSL modem, but then the PIX does not have a valid Internet IP address?

    I think that v7 does not support PPPOE? so I can't set the mode on the bridged adsl modem?

    Is there a way to fix this?

    Any help appreciated gratefully.

    apply the commands below:

    ISAKMP identity address

    ISAKMP nat-traversal 20

    If the problem persists, then please post the entire config with ip hidden public.

  • PIX 515E config help

    I am a new user and I'm trying to configure a PIX 515e Ver 6.3 (3). How can I give my users inside access to my webfarm located on dmz1. I am able to access the test sites inside and outside dzm1. I can't access the Web inside dmz1 sites. Here is my current config:

    6.3 (3) version PIX

    interface ethernet0 100full

    interface ethernet1 100full

    interface ethernet2 100full

    Automatic stop of interface ethernet3

    Automatic stop of interface ethernet4

    Automatic stop of interface ethernet5

    ethernet0 nameif outside security0

    nameif ethernet1 inside the security100

    nameif ethernet2 dmz1 security50

    nameif ethernet3 intf3 securite6

    nameif ethernet4 intf4 security8

    ethernet5 intf5 security10 nameif

    enable password xxxx

    passwd xxxx

    hostname pix1

    apprendrefacile.com domain name

    fixup protocol dns-length maximum 512

    fixup protocol ftp 21

    fixup protocol h323 h225 1720

    fixup protocol h323 ras 1718-1719

    fixup protocol http 80

    fixup protocol rsh 514

    fixup protocol rtsp 554

    fixup protocol sip 5060

    fixup protocol sip udp 5060

    fixup protocol 2000 skinny

    fixup protocol smtp 25

    fixup protocol sqlnet 1521

    fixup protocol tftp 69

    names of

    aetest name 10.10.10.1

    name 10.10.10.2 aetest1

    name 13.13.13.3 aetestdmz

    name 13.13.13.4 aetestdmz1

    access-list from-out-to allow tcp any any eq www

    pager lines 24

    opening of session

    debug logging in buffered memory

    Outside 1500 MTU

    Within 1500 MTU

    dmz1 MTU 1500

    intf3 MTU 1500

    intf4 MTU 1500

    intf5 MTU 1500

    IP address outside the 12.x.x.x.255.255.0

    IP address inside 10.10.10.2 255.255.255.0

    IP address dmz1 13.x.x.x.255.255.0

    No intf3 ip address

    No intf4 ip address

    No intf5 ip address

    alarm action IP verification of information

    alarm action attack IP audit

    no failover

    failover timeout 0:00:00

    failover poll 15

    No IP failover outdoors

    No IP failover inside

    no failover ip address dmz1

    no failover ip address intf3

    no failover ip address intf4

    no failover ip address intf5

    history of PDM activate

    ARP timeout 14400

    public static 12.12.12.15 (inside, outside) aetest netmask 255.255.255.255 0 0

    public static 12.12.12.16 (inside, outside) aetest1 netmask 255.255.255.255 0 0

    (dmz1, external) 12.12.12.17 static aetestdmz netmask 255.255.255.255 0 0

    (dmz1, external) 12.12.12.18 static aetestdmz1 netmask 255.255.255.255 0 0

    Access-group from-out-to external interface

    Route outside 0.0.0.0 0.0.0.0 12.12.12.1 1

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225

    H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00

    Timeout, uauth 0:05:00 absolute

    GANYMEDE + Protocol Ganymede + AAA-server

    RADIUS Protocol RADIUS AAA server

    AAA-server local LOCAL Protocol

    Enable http server

    http 10.10.10.207 255.255.255.255 inside

    No snmp server location

    No snmp Server contact

    SNMP-Server Community public

    No trap to activate snmp Server

    enable floodguard

    Telnet 10.10.10.0 255.255.255.0 inside

    Telnet timeout 20

    SSH timeout 5

    Console timeout 0

    Terminal width 80

    Cryptochecksum:XXXXX

    : end

    Thank you... Jay

    with pix v6.x, nat/global or static is a must do before the pix will start to transfer packets between two interfaces.

    the current static instructions do not cover the translation between the inside and the dmz. as the traffic between pix inside the net and dmz is private, I suggest you to set up no. - nat between the two.

    for example

    static (inside, dmz1) 10.10.10.0 10.10.10.0 netmask 255.255.255.0

    clear xlate

    in the above example, pix inside the host must be able to access the dmz Server pointing to the private ip address of dmz Web server.

    If you prefer the pix inside the host to access the dmz by name server, then "alias" command should be applied.

    for example

    alias (inside) 13.13.13.3 12.12.12.17 255.255.255.255

    the need for the command "alias" is due to the fact that when pix inside the host tries to access the server dmz by name, the public dns will point to the public IP address of the dmz Web server. now, as the static electricity created for the dmz Web server is directional i.e. public ip will be accessible from the outside, not the pix inside the net. so the 'alias' command will allow the PIX to manipulate the dns response and point the name to the private ip of Web server dmz for the pix inside the host.

  • BEFSR41 v4.2 with AT & T DSL & PPPoE Config - help!

    I'm about to set up my first DSL connection, which will use PPPoE and a Motorola 2210 DSL modem provided by my ISP, AT & T. The DSL modem stores the user ID and the password. After I get the DSL up (which I think I can handle via a manual installation rather than installing the software provided by AT & T), I will install a router BEFSR41 v4.2 for my new home network. The v4 manual says that I also need to enter the ID and password for PPPoE supports as well as a service name. If the modem is to store the password, why do I also need to put them in the router config. ? In addition, the v4 manual says I need to enter a "service name", which I do not think that I know and do not know what it is supposed to look like. I think I can handle the rest of the router config, but will also enjoy a lot of tips or tricks with this particulare configuration. Thank you!

    My DSL and home network are up and works fine. After I discovered that the Motorola 2210 is a gateway and not just a DSL modem, I knew better what I was dealing with. I used the simplest option, which was to implement the BEFSR41 for DHCP and PPPoE about the 2210, changing the router IP address to 192.168.0.1. I discovered that I had to use the AT & T software furnished to completely configure the service - manual install only did part. After that I got DSL service set up, I moved my connection PC Ethernet back to the BEFSR41 and 2210 to the router cable. Worked like a charm!

  • GANYMEDE Config question

    Hello

    This is the configuration for GANYMEDE but is not authentication works.

    AAA new-model

    !

    !

    connection of AAA 5 authentication attempts

    enable AAA authentication login default group Ganymede + local line

    the AAA authentication enable default group Ganymede + activate

    AAA authorization exec default group Ganymede + local

    AAA authorization commands 1 default group Ganymede + local

    AAA authorization commands by default 15 group Ganymede +.

    AAA accounting exec default start-stop Ganymede group.

    orders accounting AAA 1 by default start-stop Ganymede group.

    orders accounting AAA 15 by default start-stop Ganymede group.

    radius-server host 14.24.6.8

    radius-server host 17.24.66.1

    RADIUS-server timeout 1

    RADIUS-server application made

    The problem must be resolved

    Advanced thanks.

    Concerning

    Dhananjay.M

    Number of things before hit us part of troubleshooting:

    1.] RADIUS-server timeout 1 ->> is a time interval for when waiting for server for the AAA client to respond. 1 sec is too aggressive, don't know what that allows you to configure this prompted. Pleasee defined only at least 5 seconds.

    2.] you have configured the shared secret on the AAA client?

    Run debugs it on the switch/router, try to connect with Ganymede credetials and paste the o/p here.

    debugging Ganymede

    Debug aaa authentication

    ~ BR
    Jatin kone

    * Does the rate of useful messages *.

  • AAA accounting Config help

    I have Cisco ACS 3.2 on widnows with cisco (IOS 12.3) devices configured with authentication. I need enable accounting. I just need the list of commands (changes) on the cisco device. What is the command to correct authentication? This is the current configuration.

    AAA server Ganymede group + tacgrp

    Server X.X.X.X

    Server Y.Y.Y.Y

    !

    AAA authentication login default group Ganymede + local

    AAA authentication login relief group Ganymede + activate

    AAA - the id of the joint session

    GANYMEDE-server host X.X.X.X

    GANYMEDE-server host Y.Y.Y.Y

    RADIUS-server application made

    RADIUS-server key 7 XXXXXXXXXXXXXXXXXXX

    Line con 0

    line vty 0 4

    There is no accounting for SNMP.

    The snmp on the router show command can tell you how many polls where done.

    Example to see the output of snmp:

    RAME: SCA043004DW

    Contact: smotwani

    Location: noida

    SNMP 56224160 to input packets

    0 bad SNMP version error

    38 unknown community name

    Illegal operation in name of the provided community 0

    Coding errors 0

    Number of requested variables 268814216

    Number 112 of the variables changed

    35437579 get PDUs request

    20781918 get-next PDUs

    24 set-request PDUs

    0 input queue DROPS number package (Maximum 1000 queue size)

    56224122 release of SNMP packets

    0 too big mistakes (maximum 1500 packet size)

    15 no such errors of name

    Bad values 0 errors

    0 General errors

    56219928 response PDUs

    0 trap PDUs

    You can also define a list of access allowing for any snmp and connect the access list which will have a counter that increments.

    There is no such thing as research in the papers of the ACS to know how often snmp has been consulted and what ip address for the simple reason that the authorization does not apply to the snmp.

  • GANYMEDE + Config questions

    3750 Ganymede SE4 IOS 15.0 (2) then the radius-server show host X.X.X.X I get "the cli will be deprecated soon" Please notify

    check CSCty69125

  • PIX 515 VPN config help

    I was working on the creation of a PIX 515e to serve my firewall and VPN. The firewall and main routing work well as I am able to VPN and get an IP address. However, I am unable to remote desktop on a PC behind the firewall.

    Here is my config as I have now. If someone could show me what I'm missing, would be great.

    Firewall # sh run
    : Saved
    :
    PIX Version 7.2 (3)
    !
    Firewall host name
    DOMAINNAME.COM domain name
    activate r9tt5TvvX00Om3tg encrypted password
    names of
    !
    interface Ethernet0
    PPPoE Interface Description
    nameif outside
    security-level 0
    PPPoE client vpdn group pppoe
    63.115.220.5 255.255.255.255 IP address pppoe setroute
    !
    interface Ethernet1
    Description network internal
    nameif inside
    security-level 100
    the IP 192.168.0.1 255.255.255.0
    !
    interface Ethernet2
    DMZ Interface Description
    nameif DMZ
    security-level 50
    IP 10.1.48.1 255.255.252.0
    !
    2KFQnbNIdI.2KYOU encrypted passwd
    passive FTP mode
    clock timezone STD - 7
    clock to summer time recurring MDT
    DNS server-group DefaultDNS
    domain ivanwindon.ghpstudios.com
    object-group service remote tcp - udp
    Description Office remotely
    3389 3389 port-object range
    standard access list vpn_client_splitTunnelAcl allow a
    inside_nat0_outbound list of allowed ip extended access any 192.168.0.192 255.255.255.192
    permit access ip 192.168.0.0 scope list inside_nat0_outbound 255.255.255.0 192.168.0.96 255.255.255.240
    access-list Local_LAN_Access Note Local LAN access
    Local_LAN_Access list standard access allowed host 0.0.0.0
    outside_cryptomap_65535.20 deny ip extended access list a whole
    access-list 102 extended allow ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0
    vpn_client_splitTunnelAcl_1 list standard access allowed 192.168.0.0 255.255.255.0
    inside_access_in list extended access permit tcp any eq 3389 3389 any eq
    pager lines 24
    Enable logging
    information recording console
    registration of information monitor
    logging trap information
    asdm of logging of information
    address record [email protected] / * /
    exploitation forest-address recipient [email protected] / * / level of errors
    Outside 1500 MTU
    Within 1500 MTU
    MTU 1500 DMZ
    IP local pool vpn_pool 192.168.0.100 - 192.168.0.105 mask 255.255.255.0
    IP verify reverse path to the outside interface
    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image Flash: / asdm - 523.bin
    enable ASDM history
    ARP timeout 14400
    Overall 101 (external) interface
    NAT (inside) 0-list of access inside_nat0_outbound
    NAT (inside) 101 0.0.0.0 0.0.0.0
    inside_access_in access to the interface inside group
    Route outside 0.0.0.0 0.0.0.0 207.225.112.2 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout, uauth 0:05:00 absolute
    AAA authentication LOCAL telnet console
    Enable http server
    http 192.168.0.4 255.255.255.255 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    Crypto-map dynamic outside_dyn_map 20 set pfs
    Crypto-map dynamic outside_dyn_map 20 the value transform-set ESP-3DES-SHA
    Crypto-map dynamic outside_dyn_map 20 the value reverse-road
    PFS set 40 crypto dynamic-map outside_dyn_map
    Crypto-map dynamic outside_dyn_map 40 value transform-set ESP-3DES-SHA
    map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map
    outside_map interface card crypto outside
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    crypto ISAKMP disconnect - notify
    Telnet 192.168.0.4 255.255.255.255 inside
    Telnet timeout 5
    SSH timeout 5
    Console timeout 0
    VPDN group request dialout pppoe pppoe
    VPDN group pppoe localname [email protected] / * /
    VPDN group pppoe ppp authentication chap
    VPDN username username password *.
    dhcpd dns 208.67.222.222 208.67.220.220
    dhcpd lease 1500
    dhcpd ping_timeout 10
    NAME of domain domain dhcpd
    dhcpd auto_config off vpnclient-wins-override
    dhcpd option 3 ip 192.168.0.1
    !
    dhcpd address 192.168.0.5 - 192.168.0.49 inside
    dhcpd dns 208.67.222.222 208.67.220.220 interface inside
    dhcpd lease interface 1500 inside
    interface ping_timeout 10 dhcpd inside
    dhcpd DOMAIN domain name inside interface
    dhcpd 192.168.0.1 ip interface option 3 inside
    dhcpd allow inside
    !
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the netbios
    inspect the rsh
    inspect the rtsp
    inspect the skinny
    inspect esmtp
    inspect sqlnet
    inspect sunrpc
    inspect the tftp
    inspect the sip
    inspect xdmcp
    !
    global service-policy global_policy
    TFTP server inside 192.168.0.4/TFTP-Root
    internal vpn_client group policy
    attributes of the strategy of group vpn_client
    value of server DNS 208.67.222.222 208.67.220.220
    Protocol-tunnel-VPN IPSec
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list vpn_client_splitTunnelAcl_1
    value by default-domain DomainName
    admin I727P4FvcUV4IZGC encrypted privilege 15 password username
    username ivanwindon encrypted password privilege 0 7K5PuGcBwHggqgCD
    username ivanwindon attributes
    VPN-group-policy vpn_client
    tunnel-group vpn_client type ipsec-ra
    tunnel-group vpn_client General-attributes
    address vpn_pool pool
    Group Policy - by default-vpn_client
    vpn_client group of tunnel ipsec-attributes
    pre-shared-key *.
    96.125.164.139 SMTP server
    context of prompt hostname
    Cryptochecksum:48fdc775b2330699db8fc41493a2767c
    : end
    Firewall #.

    Ivan Windon

    Sent by Cisco Support technique iPad App

    Hello

    I had first change in the pool of VPN Client to something other than the LAN

    As 192.168.1.0/24

    NAT0

    • Adding NAT0 rule for the new pool and then removing the 'old'

    permit access ip 192.168.0.0 scope list inside_nat0_outbound 255.255.255.0 192.168.1.0 255.255.255.0

    no access list inside_nat0_outbound extended permits all ip 192.168.0.192 255.255.255.192

    No inside_nat0_outbound extended access list only to allowed ip 192.168.0.0 255.255.255.0 192.168.0.96 255.255.255.240

    VPN Client pool

    • Remove the old group "tunnel-group" configurations, then removing the pool, make a new pool, and finally configure the pool to group "tunnel".

    tunnel-group vpn_client General-attributes

    No address vpn_pool pool

    no ip local pool vpn_pool 192.168.0.100 - 192.168.0.105 mask 255.255.255.0

    IP local pool vpn_pool 192.168.1.100 - 192.168.1.105 mask 255.255.255.0

    tunnel-group vpn_client General-attributes

    address vpn_pool pool

    Theres another thread with a similar problem (even if the settings appear to be correct) on the forums.

    If you can't get the RDP connection works I would also maybe Google for UltraVNC and its installation on the host LAN and your VPN Client and trying to connect with him to determine that the Client VPN configurations are all ok. There were problems that were ultimately associated with the LAN host rather than the VPN Client configurations.

    If you think that his need. Save your settings before making any changes.

    -Jouni

  • 8.2 ASA dynamic VPN to ASA static config help

    Hello

    I'm trying to set up a tunnel l2l between an ASA and ASA remote central where the remote receives a DHCP provider address.

    ASA Remote Config:

    interface Vlan1

    nameif inside

    security-level 100

    IP 10.10.10.1 255.255.255.0

    # Receives an IP address of 90.0.1.203 from the provider.

    interface Vlan2

    nameif outside

    security-level 0

    IP address dhcp setroute

    the Corp_Networks object-group network

    object-network 172.16.0.0 255.240.0.0

    object-network 10.0.0.0 255.0.0.0

    object-network 192.168.252.0 255.255.255.0

    access-list SHEEP extended ip 10.10.10.0 allow 255.255.255.0 Corp_Networks object-group

    Remote access ip 10.10.10.0 extended list allow 255.255.255.0 Corp_Networks object-group

    NAT (inside) 0 access-list SHEEP

    NAT (inside) 1 0.0.0.0 0.0.0.0

    outdoor 10.0.0.0 255.255.255.0 90.0.1.1

    Route outside 172.16.0.0 255.240.0.0 90.0.1.1

    Route outside 192.168.252.0 255.255.255.0 90.0.1.1

    Crypto ipsec transform-set esp-3des esp-sha-hmac ToCorp

    outside_map card crypto 10 corresponds to the Remote address

    outside_map 10 peer Public_address crypto card game

    card crypto outside_map 10 game of transformation-ToCorp

    life safety association set card crypto outside_map 10 28800 seconds

    card crypto outside_map 10 set security-association life kilobytes 4608000

    outside_map interface card crypto outside

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 864000

    No encryption isakmp nat-traversal

    tunnel-group Public_address type ipsec-l2l

    IPSec-attributes tunnel-group Public_address

    pre-share-key Council

    ASA company Config:

    the Corp_Networks object-group network

    object-network 172.16.0.0 255.240.0.0

    object-network 10.0.0.0 255.0.0.0

    object-network 192.168.252.0 255.255.255.0

    access-list allowed extensive sheep object-group Corp_Networks 10.10.10.0 ip 255.255.255.0

    access-list ToRemote allowed ext object-group ip Corp_Networks 10.10.10.0 255.255.255.0

    NAT (inside) 0 access-list sheep

    Route outside 10.10.10.0 255.255.255.0 Public_Gateway

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    ToRemote game Dynamics-card 65530, crypto transform-set ESP-3DES-SHA

    outside_map map 8-isakmp dynamic ipsec ToRemote crypto

    outside_map interface card crypto outside

    crypto ISAKMP policy 20

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    IPSec-attributes tunnel-group DefaultL2LGroup

    pre-shared-key *.

    Output of remote endpoint:

    ISAKMP crypto #sh her

    ITS enabled: 1

    Generate a new key SA: 0 (a tunnel report Active 1 and 1 to generate a new key during the generate a new key)

    Total SA IKE: 1

    1 peer IKE: Public_Address

    Type: L2L role: initiator

    Generate a new key: no State: MM_ACTIVE

    #sh crypto ipsec his

    Interface: outside

    Tag crypto map: outside_map, seq num: 10, local addr: 90.0.1.203

    Hawaii2Avid to access extended list ip 10.10.10.0 allow 255.255.255.0 10.0.0.0 255.0.0.0

    local ident (addr, mask, prot, port): (10.10.10.0/255.255.255.0/0/0)

    Remote ident (addr, mask, prot, port): (10.0.0.0/255.0.0.0/0/0)

    current_peer: Public_address

    #pkts program: 616, #pkts encrypt: 616, #pkts digest: 616

    #pkts decaps: 22, #pkts decrypt: 22, #pkts check: 22

    compressed #pkts: 0, unzipped #pkts: 0

    #pkts uncompressed: 616, #pkts comp failed: 0, #pkts Dang failed: 0

    success #frag before: 0, failures before #frag: 0, #fragments created: 0

    Sent #PMTUs: 0, #PMTUs rcvd: 0, reassembly: 20th century / of frgs #decapsulated: 0

    #send errors: 0, #recv errors: 0

    local crypto endpt. : 90.0.1.203/4500, remote Start crypto. : Public_address/4500

    Path mtu 1500, fresh ipsec generals 66, media, mtu 1500

    current outbound SPI: D6A48143

    current inbound SPI: E0C4F32A

    SAS of the esp on arrival:

    SPI: 0xE0C4F32A (3771003690)

    transform: esp-3des esp-sha-hmac no compression

    running parameters = {L2L, Tunnel, NAT-T program,}

    slot: 0, id_conn: 36864, crypto-card: outside_map

    calendar of his: service life remaining (KB/s) key: (3914994/28098)

    Size IV: 8 bytes

    support for replay detection: Y

    Anti-replay bitmap:

    0 x 00000000 0x007FFFFF

    outgoing esp sas:

    SPI: 0xD6A48143 (3601105219)

    transform: esp-3des esp-sha-hmac no compression

    running parameters = {L2L, Tunnel, NAT-T program,}

    slot: 0, id_conn: 36864, crypto-card: outside_map

    calendar of his: service life remaining (KB/s) key: (3914952/28098)

    Size IV: 8 bytes

    support for replay detection: Y

    Anti-replay bitmap:

    0x00000000 0x00000001

    Tag crypto map: outside_map, seq num: 10, local addr: 90.0.1.203

    Hawaii2Avid to access extended list ip 10.10.10.0 allow 255.255.255.0 172.16.0.0 255.240.0.0

    local ident (addr, mask, prot, port): (10.10.10.0/255.255.255.0/0/0)

    Remote ident (addr, mask, prot, port): (172.16.0.0/255.240.0.0/0/0)

    current_peer: Public_Address

    #pkts program: 406, #pkts encrypt: 406, #pkts digest: 406

    #pkts decaps: 0, #pkts decrypt: 0, #pkts check: 0

    compressed #pkts: 0, unzipped #pkts: 0

    #pkts uncompressed: 406, model of #pkts failed: 0, #pkts Dang failed: 0

    success #frag before: 0, failures before #frag: 0, #fragments created: 0

    Sent #PMTUs: 0, #PMTUs rcvd: 0, reassembly: 20th century / of frgs #decapsulated: 0

    #send errors: 0, #recv errors: 0

    local crypto endpt. : 90.0.1.203/4500, remote Start crypto. : Public_Address/4500

    Path mtu 1500, fresh ipsec generals 66, media, mtu 1500

    current outbound SPI: 1BE239F9

    current inbound SPI: AC615F8D

    SAS of the esp on arrival:

    SPI: 0xAC615F8D (2892062605)

    transform: esp-3des esp-sha-hmac no compression

    running parameters = {L2L, Tunnel, NAT-T program,}

    slot: 0, id_conn: 36864, crypto-card: outside_map

    calendar of his: service life remaining (KB/s) key: (3915000/28095)

    Size IV: 8 bytes

    support for replay detection: Y

    Anti-replay bitmap:

    0x00000000 0x00000001

    outgoing esp sas:

    SPI: 0x1BE239F9 (467810809)

    transform: esp-3des esp-sha-hmac no compression

    running parameters = {L2L, Tunnel, NAT-T program,}

    slot: 0, id_conn: 36864, crypto-card: outside_map

    calendar of his: service life remaining (KB/s) key: (3914973/28092)

    Size IV: 8 bytes

    support for replay detection: Y

    Anti-replay bitmap:

    0x00000000 0 x 000000000

    We just seems stuck at this point and can't seem to get the traffic going back and forth, even if the tunnel does not seem to be connected.  The only concern I see is pkts getting encrypted but none decrypts.  It is usually something to do with the acl, but this one is pretty simple.

    Thank you

    -Geoff

    Please check if you have any other card/LAN-to-LAN crypto configured on the ASA Corporate where the crypto ACL may overlap.

    If you can share the map full encryption as well as the ACL of the ASA Corporate crypto, we can check for you.

    Misspelling of the ASA remote path statement:

    outdoor 10.0.0.0 255.255.255.0 90.0.1.1

    I understand that you want to access the full class on the site of the company, where the road should say:

    external route 10.0.0.0 255.0.0.0 90.0.1.1

  • Nexus Swithc 5548UP Solution Config help needed

    Hello

    IM new and im really in a bad situation.

    I have a scenario where I have to deploy a Nexus switch (5548UP)

    I've never worked on this product and don't really know what are the things that I have to configure!

    Can anyone share some examples using which I can move forward?

    All I have to do is sync my Storage(Dell-FC) and 2 servers (Dell) with the link switch(5548-UP)

    A small guide step by step /blogs/ model/example will be very useful.

    Network diagram is attached. Please check.

    With respect to zoning, please check

    http://www.Cisco.com/c/en/us/TD/docs/switches/Datacenter/nexus5000/SW/co...

  • Choose/config help new ASA5510

    I am interested in buying an ASA 5510. But I wanted to include IPS and VPN (I don't need but on a 5 VPN user). And I want to ssh features mgmt. What boots or packages do I need? Thanks in advance.

    It is important to note that all devices of the SAA are firewalls, VPN devices at the same time, everything you need, but also / used or you don? t you? He pays for these features. You can not split these features.

    So what about the ASA5510 + IPS feature, you have 2 choices (modules):

    1-SSM-AIP-10 (performance: 150 Mbps)

    2-SSM-AIP-20 (yield: 300 Mbps)

    There is already a package: "ASA5510-AIP10-K9' but for the AIP-20 is required to buy it regardless of the ASA.

    For more details, please refer to this URL:

    http://www.Cisco.com/en/us/products/ps6120/products_data_sheet0900aecd802930c5.html

    One last thing, it is important to differentiate between the ordinary VPN and SSL - VPN. For the second, you have to pay extra$ $$. Be aware that the ASA5510 includes 2 free licenses.

    -Paul-

  • GANYMEDE + Configuration

    Hello

    I am trying to build a Ganymede + config on my network devices.  I have an ACS do the authentication.  I want to do is to have GBA authenticate my users and allow them access.  However, I would like to leave a console access using both local and local user name select the password so that I have a backdoor in case of future problems.  I have everything working except the ability to go to activate the console mode using the local enable password.  I get an auth error, because I think that the device tries to ACS auth password enable result:

    the AAA authentication enable default group Ganymede + activate

    I can get around it by applying a level 15 privlive to next line directly in the activation of the mode, but it seems less sure.

    Any ideas?

    Here's my config relevent bits (and I don't have a local user name and enable defined)

    AAA new-model
    AAA authentication login default group Ganymede + local
    AAA authentication local console connection
    the AAA authentication enable default group Ganymede + activate
    default AAA authorization exec group Ganymede + local no
    Console exec AAA local authorization
    0 default AAA authorization commands group Ganymede + local no
    default 1 AAA authorization commands group Ganymede + local no
    default 15 AAA authorization commands group Ganymede + local no
    AAA accounting exec default start-stop Ganymede group.
    orders accounting AAA 0 arrhythmic default group Ganymede +.
    orders accounting AAA 1 by default start-stop Ganymede group.
    orders accounting AAA 15 by default start-stop Ganymede group.
    AAA - the id of the joint session

    Line con 0
    password 7
    console login authentication

    Thanks in advance

    Hi Rose,

    Unfortunately, there is no way to apply a specific method list for the enable authentication to apply to the console.

    Named method list for enable authentication is not supported.

    Regards,
    ~JG

    Do rate helpful posts

  • Activate the Secret missing in the Config password.

    Recently I came across a router (Cisco 3845, IOS 12.4) configured for GANYMEDE, a local username and password enable. Going through the configuration, I noticed that the router didn't have a password enable secret that seemed strange. The GANYMEDE config is lower and would appreciate help, comments about the GANYMEDE config and the consequences of not having an enable secret, or if there is a need for one.

    AAA authentication login default group Ganymede +.
    enable AAA authentication login no_tacacs
    AAA authorization exec default group Ganymede +.
    AAA authorization commands by default 1 group Ganymede +.
    AAA authorization commands by default 15 group Ganymede +.
    AAA accounting exec default start-stop Ganymede group.
    orders accounting AAA 1 by default start-stop Ganymede group.
    orders accounting AAA 15 by default start-stop Ganymede group.
    AAA accounting network default start-stop Ganymede group.

    Thank you

    The f

    I think this command is the origin of the problem 'connection of no_tacacs aaa authentication enable', I think it's to say if the default is not available, which is to use Ganymede shown by this command "aa authentication login default group Ganymede + ', then you can use the enable password. You should be able to modify and use 'aaa authentication login no_tacacs local', see if it works.

  • The AAA authentication not working method and 'by default' list

    Guys,

    I hope someone can help me here to the problem of the AAA. I copied the configuration and debugging below. The router keeps using username/password local name even if the ACS servers are accessible and functional. To debug, it seems he keeps using the method list 'default' ignoring GANYMEDE config. Any help will be appreciated

    Config

    **********************************

    AAA new-model

    !

    username admin privilege 15 secret 5 xxxxxxxxxx.

    !

    AAA authentication login default group Ganymede + local

    the AAA authentication enable default group Ganymede + activate

    authorization AAA console

    AAA authorization exec default group Ganymede + local

    AAA authorization commands 15 default group Ganymede + local

    AAA authorization default reverse-access group Ganymede + local

    orders accounting AAA 0 arrhythmic default group Ganymede +.

    orders accounting AAA 15 by default start-stop Ganymede group.

    Default connection accounting AAA power Ganymede group.

    !

    AAA - the id of the joint session

    !

    RADIUS-server host x.x.x.x

    RADIUS-server host x.x.x.x

    RADIUS-server host x.x.x.x

    RADIUS-server host x.x.x.x

    RADIUS-server application made

    RADIUS-server key 7 0006140E54xxxxxxxxxx

    !

    Ganymede IP interface-source Vlan200

    ***************************

    Debugs

    002344: 5 Dec 01:36:03.087 ICT: AAA/BIND (00000022): link i / f

    002345: Dec 5 01:36:03.087 ICT: AAA/AUTHENTIC/LOGIN (00000022): choose method list "by default".

    002346: Dec 5 01:36:11.080 ICT: AAA/AUTHENTIC/LOGIN (00000022): choose method list "by default".

    core01 #.

    002347: Dec 5 01:36:59.404 ICT: AAA: analyze name = tty0 BID type =-1 ATS = - 1

    002348: Dec 5 01:36:59.404 ICT: AAA: name = tty0 flags = 0 x 11 type = 4 shelf = 0 = 0 = 0 = 0 = 0 channel port adapter slot

    002349: Dec 5 01:36:59.404 ICT: AAA/MEMORY: create_user (0 x 6526934) user = "admin" ruser = "core01" ds0 = 0 port = "tty0" rem_addr = "async" authen_type = service ASCII = NONE priv = 15 initial_task_id = '0', vrf = (id = 0)

    002350: Dec 5 01:36:59.404 ICT: tty0 AAA/AUTHOR/CMD (2162495688): Port = "tty0" list = "service = CMD

    002351: Dec 5 01:36:59.404 ICT: AAA/AUTHOR/CMD: tty0 (2162495688) user = "admin".

    002352: Dec 5 01:36:59.404 ICT: tty0 AAA/AUTHOR/CMD (2162495688): send service AV = shell

    002353: Dec 5 01:36:59.404 ICT: tty0 AAA/AUTHOR/CMD (2162495688): send cmd = AV set up

    002354: Dec 5 01:36:59.404 ICT: tty0 AAA/AUTHOR/CMD (2162495688): send AV terminal = cmd - arg

    002355: Dec 5 01:36:59.404 ICT: tty0 AAA/AUTHOR/CMD (2162495688): send cmd - arg = AV

    002356: Dec 5 01:36:59.404 ICT: tty0 AAA/AUTHOR/CMD (2162495688): found the 'default' list

    002357: Dec 5 01:36:59.404 ICT: tty0 AAA/AUTHOR/CMD (2162495688): method = Ganymede + (Ganymede +)

    002358: Dec 5 01:36:59.404 ICT: AAA/AUTHOR/TAC +: (2162495688): user = admin

    002359: Dec 5 01:36:59.404 ICT: AAA/AUTHOR/TAC +: (2162495688): send service AV = shell

    002360: Dec 5 01:36:59.404 ICT: AAA/AUTHOR/TAC +: (2162495688): send cmd = AV set up

    002361: Dec 5 01:36:59.404 ICT: AAA/AUTHOR/TAC +: (2162495688): send AV terminal = cmd - arg

    002362: Dec 5 01:36:59.404 ICT: AAA/AUTHOR/TAC +: (2162495688): send cmd - arg = AV

    Enter configuration commands, one per line.  End with CNTL/Z.

    core01 (config) #.

    002363: Dec 5 01:37:04.261 ICT: AAA/AUTHOR (2162495688): permission post = ERROR

    002364: Dec 5 01:37:04.261 ICT: tty0 AAA/AUTHOR/CMD (2162495688): method = LOCAL

    002365: Dec 5 01:37:04.261 ICT: AAA/AUTHOR (2162495688): position of authorization = PASS_ADD

    002366: Dec 5 01:37:04.261 ICT: AAA/MEMORY: free_user (0 x 6526934) user = "admin" ruser = "core01" port = "tty0" rem_addr = "async" authen_type = ASCII service = NONE priv = 15

    core01 (config) #.

    Ganymede + accessible servers use source vlan 200. Also in the Ganymede server + can you check if the IP address for this device is configured correctly and also please check the pwd on the server and the game of this device.

    As rick suggested sh Ganymede would be good as well. That would show the failures and the successes

    HTH

    Kishore

  • Catalyst Control Center does not (hp pavilion dv6)

    I downloaded Catalyst Control Center several times, but it still does not. I have Paviliion dv6-6120se, AMD radeon hd 6490M and integrated intel GPU hd 3000 the two GPU works well but the problem started when I uninstalled the Catalyst Control Center to obtain a new update site Web of AMD. But the site says my version of the radeon hd 6490 M AMD does not support in any way I tried everything I uninstalled the driver of ATI GPU and install again. Somehow, I downloaded Catalyst Control Center and the installation is complete and the same problem, it's still not working. Please any help would be appreciated. Now, I've lost the Catalyst Control Center and the switchable graphics config. help please.

    Hello

    As you have switchable graphics, you will need to download and install the driver of HP - it is on the link below.

    http://ftp.HP.com/pub/SoftPaq/sp55001-55500/sp55092.exe

    Once the installation is complete, restart the laptop.

    Kind regards

    DP - K

Maybe you are looking for

  • Excel files print after update of El Capitan

    I just installed the latest update of the El Capitan (10.11.4) and often when I go to print an Excel the busy wheel appears. When this happens other programs also stop responding and I have to touch Cntrl + control + Power to restart. All solutions?

  • Look at the torrent of Blu - ray 3D with Lenovo T430

    I have a 3D projector and a 3D compatible receiver in my home theater room. I recently bought a Lenovo T430 and I was wondering if it is possible to watch downloaded torrents movie in 3D with this laptop. I understand that I need a mini displayport--

  • should I proceed to report a suspected phishing scam Windows Live by Microsoft?

    For the record, I get a "Windows Live Team" request.  I know it is phishing, but should I forward e-mails to Microsoft or just mark them as phishing?  If I mark as phishing scams will be my filter ban real emails form Windows Live?

  • Stretching from full screen and setting the update hack?

    Hey, we have a screen that currently extends to full screen and passes a delegate from Manager custom in the constructor. It seems that tests on some devices do not focus to the first element in the domain manager. After a few I found that the substi

  • report a scam to microsoft

    I received an email below... I found it very difficult to report just something like this in microsoft... I'm disappointed about how microsoft attend concerns like that... Microsoft Corporation Lottery promotion,The customer service.Your winner of th