Impossible to access remotely to Zoneminder on port 80
I have a Cisco Linksys E2500 modem and I can't access Zoneminder which is basically a Linux video security DVR software package. It runs on a Ubuntu Linux server.
I have HTTP port 80 forwarded to the address static IP of the server Ubuntu but I repeatedly get an error indicating that the connection has expired whenever I try to access Zoneminder remotely as in access it remotely from a coffee shop.
I have absolutely no problem to access the Zoneminder when I on my home LAN.
I can access other software from remote sites on the parameters of the port 4369 with a favorite TCP protocol. In other words, 4369 port is forwarded to an another Windows workstation with a static IP address assigned. Absolutely no problem with 4369 port forwarding.
Also, I tried port 80 on the site, YouGetSignal, which is used to test port forwarding. The Web site indicates that port 80 is closed. But when I test port 4369, the site indicates that the port is open. Zoneminder that uses port 80 is fully operational when I test port 80 via YouGetsignal.
My ISP told me that they do not block the ports including port 80.
Any help would be greatly appreciated
Thanx
Try the following steps:
[A] with the help of the Cisco Connect software (if at all, you have installed the router using this software)
1] open the software and go to the option that says "settings of the router.
[2] then click on the option that says 'Advanced settings', which will take you to the router configuration page.
[3] then click on disable SPI Firewall Protection Security tab, uncheck the box filter anonymous Internet requests...
[B] If you have not installed Cisco connect then you can connect to the router's user interface using its default IP address in the browser which is 192.168.1.1 and enter "admin" as password empty username field. This will take to the web interface of the router and then follow the steps as indicated above to make the changes.
Tags: Linksys Routers
Similar Questions
-
Impossible to access wifi with other access points
WNDR4500v3 with firmware V1.0.0. I32
I bought this router on dec 25 2015 to replace a dead linksys router.
The router feeds a switch of 16 points from one of the 4 ports.
I have a win 7 pc connected to one of the other routers 3 ports.
Then a VoIP connected to port 3 of the router.
I have 2 other wireless access points connected to the port 16.
We feed a remote building through a wired connection to the firset access point
The other access point is also fed by a wired connection.
The old linksys router had him for 4 years.As I said I bought this router as a replacement... but since its worthless and the two wireless access point do not have internet connection.
So either I get it work or will return it for a refund within 24 hours.Figured that out it was Network Manager and windows share the unknown connection of marking.
In advanved sharing setting I have to change to use for user accounts and passwords to connect to other computers
Then all the problems went away.
No more giving up connection and with no internet connection.
-
How a cRIO can access remote systems VISA resources?
I have a NI 9871 RS485 module on an ethernet 9148 RIO.
I have also a laptop and a cRIO 9073.
I can access each of the 9871 serial ports on the computer but not the 9073.
When you try to access it from the cRIO, I get error:-1073807192, VISA: (Hex 0xBFFF00A8) is denied access to the resource or to the remote machine. This is due to the lack of sufficient privileges for the current user or the machine.
How the cRIO can access the serial ports of the module 9871 on the ethernetRIO?
Or how a remote access cRIO visa resources?
Or how a cRIO can have sufficient privileges to access remote resources from visa?
Thank you for your help.
LabVIEW 2010 & VISA 5.1 on pc
NOR-RIO 4.0 and 5.1 VISA & NI 9871 SERIES scan engine support on cRIO and eRIO
Hi Woss,
It is possible that your RIO Ethernet has some parameters of active access which is to prohibit the connection to serial ports. You can change these settings in a position and Automation Explorer (MAX) for your device by going to the device under remote systems, expanding the category of software under it and choosing NI-VISA. There will be a tab in the right pane of MAX called Options of VISA. In this tab, select Server VISA > security to access these settings.
From there, you should be able to add the IP address of the RIO device that needs to access the VISA on the RIO Ethernet server. Once you have changed these settings, just click on register at the top of the window and allow the unit to restart. Let me know if that helps!
-
VPN clients cannot access remote sites - PIX, routing problem?
I have a problem with routing to remote from our company websites when users connect via their VPN client remotely (i.e. for home workers)
Our headquarters contains a PIX 515E firewall. A number of remote sites to connect (via ADSL) to head office using IPSEC tunnels, ending the PIX.
Behind the PIX is a router 7206 with connections to the seat of LANs and connections to a number of ISDN connected remote sites. The default route on 7206 points to the PIX from traffic firewall which sits to ADSL connected remote sites through the PIX. Internal traffic for LAN and ISDN connected sites is done via the 7206.
Very good and works very well.
When a user connects remotely using their VPN client (connection is interrupted on the PIX) so that they get an IP address from the pool configured on the PIX and they can access resources located on local networks to the office with no problems.
However, the problem arises when a remote user wants access to a server located in one of the remote sites ADSL connected - it is impossible to access all these sites.
On the remote site routers, I configured the access lists to allow access from the pool of IP addresses used by the PIX. But it made no difference. I think that the problem may be the routes configured on the PIX itself, but I don't know what is necessary to solve this problem.
Does anyone have suggestions on what needs to be done to allow access to remote sites for users connected remotely via VPN?
(Note: I suggested a workaround, users can use a server on LAN headquarters as a "jump point" to connect to remote servers from there)
with pix v6, no traffic is allowed to redirect to the same interface.
for example, a remote user initiates an rdp session for one of the barns adsl. PIX decrypts the packet coming from the external interface and looks at the destination. because the destination is one of adsl sites, pix will have to return traffic to the external interface. Unfortunately, pix v6.x has a limitation that would force the pix to drop the packet.
with the v7, this restriction has been removed with the "same-security-traffic control intra-interface permits".
-
Split tunneling cannot access remote host
Hi guys,.
Having this problem by which I am able to connect the Anyconnect client but unable to ping / access of remote servers. See below for the config of the SAA;
Any ideas would be a great help, thank you!
ASA Version 9.1 (1)
!
ASA host name
enable the encrypted password xxxxxxx
xxxxxxxxxxxxx encrypted passwd
names of
mask of local pool AnyPool 10.0.0.1 - 10.0.0.10 IP 255.255.255.0
!
interface GigabitEthernet0/0
nameif outside
security-level 0
IP address 203.106.x.x 255.255.255.224
!
interface GigabitEthernet0/1
nameif inside
security-level 99
IP 172.19.88.254 255.255.255.0
!
interface Management0/0
management only
nameif management
security-level 100
IP 192.168.1.1 255.255.255.0
!
passive FTP mode
clock timezone 8 MYT
the SVR object network
Home 172.19.88.11
e-mail server in description
network of the NETWORK_OBJ_172.19.88.0_24 object
172.19.88.0 subnet 255.255.255.0
network of the VPN-POOL object
10.0.0.0 subnet 255.255.255.0
object-group Protocol TCPUDP
object-protocol udp
object-tcp protocol
object-group service DM_INLINE_SERVICE_0
ICMP service object
area of service-purpose tcp - udp destination eq
the destination hostname eq tcp service object
the purpose of the tcp destination eq https service
the purpose of the tcp destination eq imap4 service
the purpose of the tcp destination eq nntp service
the purpose of the tcp destination eq pop3 service
the purpose of the tcp destination eq smtp service
the purpose of the tcp destination eq telnet service
Outside_access_in list extended access allowed object-group DM_INLINE_SERVICE_0 any object SVR
Outside_access_in list extended access allow TCPUDP of object-group a
Outside_access_in access-list extended ip any any idle state to allow
Internal_access_in list extended access allow TCPUDP of object-group a
Internal_access_in access-list extended ip any any idle state to allow
SPLIT_TUNNEL list standard access allowed 10.0.0.0 255.255.255.0
pager lines 24
Enable logging
timestamp of the record
exploitation forest-size of the buffer 16384
buffered logging critical
asdm of logging of information
Debugging trace record
exploitation forest flash-bufferwrap
record level of the rate-limit 1000 1 2
management of MTU 1500
MTU 1500 internal
Outside 1500 MTU
no failover
ICMP unreachable rate-limit 1 burst-size 1
ASDM image disk0: / asdm - 711.bin
don't allow no asdm history
ARP timeout 14400
no permit-nonconnected arp
!
the SVR object network
203.106.x.x static NAT (indoor, outdoor)
!
source of auto after the cessation of NAT (inside, outside) dynamic interface
Internal_access_in in interface internal access-group
Access-group Outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 203.106.23.97 1
Timeout xlate 03:00
Pat-xlate timeout 0:00:30
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
identity of the user by default-domain LOCAL
the ssh LOCAL console AAA authentication
LOCAL AAA authorization command
Enable http server
http 192.168.1.0 255.255.255.0 management
http authentication certificate management
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
No vpn sysopt connection permit
Crypto ipsec ikev2 ipsec-proposal OF
encryption protocol esp
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 proposal ipsec 3DES
Esp 3des encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES
Esp aes encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES192
Protocol esp encryption aes-192
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 AES256 ipsec-proposal
Protocol esp encryption aes-256
Esp integrity sha - 1, md5 Protocol
Crypto ipsec pmtu aging infinite - the security association
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
card crypto Outside_map 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
Outside_map interface card crypto outside
Crypto ca trustpoint ASDM_TrustPoint0
Terminal registration
name of the object CN = ASA
Configure CRL
Crypto ca trustpoint Anyconnect_TrustPoint
registration auto
name of the object CN = ASA
anyconnect_rsa key pair
Configure CRL
Crypto ca trustpoint _SmartCallHome_ServerCA
Configure CRL
trustpool crypto ca policy
string encryption ca Anyconnect_TrustPoint certificates
IKEv2 crypto policy 1
aes-256 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 10
aes-192 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 20
aes encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 30
3des encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 40
the Encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
Crypto ikev2 activate out of service the customer port 443
Crypto ikev2 access remote trustpoint Anyconnect_TrustPoint
Telnet timeout 3
SSH 172.19.88.0 255.255.255.0 internal
SSH 0.0.0.0 0.0.0.0 outdoors
SSH timeout 15
Console timeout 0
management of 192.168.1.100 - 192.168.1.200 addresses dhcpd
enable dhcpd management
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
NTP server 119.110.97.148 prefer external source
SSL-trust outside Anyconnect_TrustPoint point
WebVPN
allow outside
AnyConnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
AnyConnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 2
AnyConnect image disk0:/anyconnect-linux-2.5.2014-k9.pkg 3
AnyConnect profiles AnyConnect_client_profile disk0: / AnyConnect_client_profile.xml
AnyConnect enable
attributes of Group Policy DfltGrpPolicy
VPN-tunnel-Protocol ikev1, ikev2 ssl clientless ssl ipsec l2tp client
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list SPLIT_TUNNEL
Group Policy 'GroupPolicy AnyConnect' internal
Group Policy attributes "GroupPolicy AnyConnect"
value of server WINS 172.19.88.11
value of server DNS 172.19.88.11
SSL VPN-tunnel-Protocol ikev2 client ssl clientless
WebVPN
AnyConnect value AnyConnect_client_profile type user profiles
attributes global-tunnel-group DefaultWEBVPNGroup
address pool AnyPool
tunnel-group "AnyConnect" type remote access
attributes global-tunnel-group "AnyConnect".
address pool AnyPool
strategy-group-by default "GroupPolicy AnyConnect"
tunnel-group "AnyConnect" webvpn-attributes
Group-alias "AnyConnect" activate
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
Hi Max,.
Please send me the output of 'see the anyconnect vpn-sessiondb' once connected with VPN.
And try to add the following configuration and see if that helps:
NAT (inside, outside) 1 static source NETWORK_OBJ_172.19.88.0_24 NETWORK_OBJ_172.19.88.0_24 static destination VPN-VPN-POOL no-proxy-arp-route search
And one more qusetion do you use split tunnel? If yes then you must make the following changes, because your split tunnel is incorrect, in the split tunnel, you have configured the address pool of vpn. Please make the following change:
no access list SPLIT_TUNNEL standards not allowed 10.0.0.0 255.255.255.0
Standard access list SPLIT_TUNNEL allow 172.19.88.0 255.255.255.0
Group Policy attributes "GroupPolicy AnyConnect"
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list SPLIT_TUNNEL
Let me know if this can help, or if you have any questions, more about it.
Thank you
Jeet Kumar
-
Our computer was accessed remotely this afternoon, how can we prevent this?
We have a Mac Mini, with OS X 10.6.8 using NetZero DSL as our internet provider and Firefox as your browser. Our computer was accessed remotely through LogMeIn (rescue), but it seems that the person or the group failed to hack into our computer. Are there settings in Firefox that could prevent this from happening in the future? Thank you...
Firefox is a web browser not a firewall.
I agree that it's more to do with your operating system and the LogMeIn software on ensuring that only you have access when you need to.
-
My camera iPhone 5s is accessed remotely? Whenever I use my phone torch ends up taking videos. Is it possible for a person to access my camera through the torch. We share the same Apple ID
N °
but maybe you tap the camera icon (bottom-right) when you press the icon of the torch (with the other hand maybe?)
-
On my old Dell with Windows XP I installed Tuneup Utility on an experimental basis, it changed things that made it impossible to access the C:\ drive to install the important updates and uninstall Tuneup Utilities.
Anyone have a solution?
Help, please.
Software support to the YOU seem hopeless, they donot even read the request entirely to meet the last 8 weeks and many emails in series.
Hello
I suggest you to follow the steps in this link and check if it helps:
Method 1:
Try to uninstall the utility and check if it helps:
http://support.Microsoft.com/kb/307895Method 2:
Try to restore the computer to the point before you install the utility and check if it helps.
http://support.Microsoft.com/kb/306084It will be useful.
-
Security - can some ip provider use a port open to access your computer to say port 80?
some ip provider allows an open port to access your computer to say port 80? Alex MacDonald
Port 80 is belong to http and internet connection as long as your firewall is turned on and Windows and antivirus is updated they could not damage you. Hackers scan PC and try to infect them but your firewall is here to protect.
-
Changed the title: I opened an account and set up parental controls. It is impossible to access that account the message said "you cannot access your account because your parent has blocked it."
I opened an account and set up parental controls. It is impossible to access that account the message said "you cannot access your account because your parent has blocked it."
Hello Nimaakhaven,
The best place to ask your question of Windows Live is inside Windows Live help forums. Experts specialize in all things, Windows Live, and would be delighted to help you with your questions. Please choose a product below to be redirected to the appropriate community:
Looking for a different product to Windows Live? Visit the home page Windows Live Help for the complete list of Windows Live forums to www.windowslivehelp.com.
-
Question of ML6000 Web Client. "The library is busy. Impossible to access."
Hello
I hope that somone can help me in this case.
We have ML6000 library running.
Since today I can't like connect on ML6000 Web Client.
I get the message:
"The library is busy. Impossible to access."
I checked the library doors. Library doors are closed.
How can I solve this problem?
Thanks for all proposals.
There are a number of things that could cause something like this happens. The first thing that I would recommend would be to restart the ML6000 library and get tickets RAS on the ML.
-
1920 router access remote vpn LDAP living
Hello
What is required for a router in 1920 use AnyConnect and/or also integrate with AD LDAP?
Currently, this router supports legacy clients and has these licenses:
Technology for the Module package license information: "c1900".
-----------------------------------------------------------------
Technology-technology-package technology
Course Type next reboot
------------------------------------------------------------------
IPBase ipbasek9 ipbasek9 Permanent
Security securityk9 Permanent securityk9
given none none noneThe vpn to access remote client inherited integrate with AD LDAP?
Thank you.
As long as you are on IOS 15.3.3M3 or better, you have all the licenses you need for 3.1 AnyConnect run on your 1921.
The guide to directly connect your router to LDAP can be found here:
Personally, I would avoid directly interfacing with LDAP, because it can be a complex arrangement. While it can be done, it's easier to have your router to connect to the NPS Microsoft via RADIUS server for your authentication.
-
2 VPN SITE to SITE with ACCESS REMOTE VPN
Hello
I have a 870 router c and I would like to put 2 different VPN SITE to SITE and access remote VPN (VPN CLIENTS) so is it possible to put 3 VPN in the router even if yes can u give me the steps or the sample configuration
Concerning
Thus, on the routers will be:
Cisco 2611:
LAN: 10.10.10.0/24
access-list 100 permit ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255
access-list 100 permit ip 14.1.1.0 0.0.0.255 10.10.20.0 0.0.0.255--> VPNPOOL
!
10 ipsec-isakmp crypto map clientmap
defined by peer 172.18.124.199
match address 100
!
IP local pool ippool 14.1.1.1 14.1.1.254
!
access-list 120 allow ip 10.10.10.0 0.0.0.255 14.1.1.0 0.0.0.255
access-list 120 allow ip 10.10.20.0 0.0.0.255 14.1.1.0 0.0.0.255 --> NETWORK REMOTE
!
crypto ISAKMP client configuration group ra-customer
pool ippool
ACL 120
!
Please note that the configuration is incomplete, I added that relevant changes, you should bring to the allow clients of RA through the LAN-to-LAN tunnel, of course, the LAN-to-LAN settings should match to the other side of the tunnel that is mirror of ACL, NAT and so on.
HTH,
Portu.
-
Cannot access remote network by VPN Site to Site ASA
Hello everyone
First of all I must say that I have configured the VPN site-to site a million times before. Stuck with it. First of all I can't ping outside the interface of my ASA remote. Secondly, VPN is in place, but no connectivity between local networks
ASA local:
hostname gyd - asa
domain bct.az
activate the encrypted password of XeY1QWHKPK75Y48j
XeY1QWHKPK75Y48j encrypted passwd
names of
DNS-guard
!
interface GigabitEthernet0/0
Shutdown
nameif vpnswc
security-level 0
IP 10.254.17.41 255.255.255.248
!
interface GigabitEthernet0/1
Vpn-turan-Baku description
nameif outside Baku
security-level 0
IP 10.254.17.9 255.255.255.248
!
interface GigabitEthernet0/2
Vpn-ganja description
nameif outside-Ganja
security-level 0
IP 10.254.17.17 255.255.255.248
!
interface GigabitEthernet0/2.30
Description remote access
VLAN 30
nameif remote access
security-level 0
IP 85.*. *. * 255.255.255.0
!
interface GigabitEthernet0/3
Description BCT_Inside
nameif inside-Bct
security-level 100
IP 10.40.50.65 255.255.255.252
!
interface Management0/0
nameif management
security-level 100
IP 192.168.251.1 255.255.255.0
management only
!
boot system Disk0: / asa823 - k8.bin
passive FTP mode
DNS server-group DefaultDNS
name-server 192.168.1.3
domain bct.az
permit same-security-traffic intra-interface
object-group network obj - 192.168.121.0
object-group network obj - 10.40.60.0
object-group network obj - 10.40.50.0
object-group network obj - 192.168.0.0
object-group network obj - 172.26.0.0
object-group network obj - 10.254.17.0
object-group network obj - 192.168.122.0
object-group service obj-tcp-eq-22
object-group network obj - 10.254.17.18
object-group network obj - 10.254.17.10
object-group network obj - 10.254.17.26
access-list 110 scope ip allow a whole
NAT list extended access permit tcp any host 10.254.17.10 eq ssh
NAT list extended access permit tcp any host 10.254.17.26 eq ssh
access-list extended ip allowed any one sheep
icmp_inside list extended access permit icmp any one
icmp_inside of access allowed any ip an extended list
access list nat-ganja extended permit tcp any host 10.254.17.18 eq ssh
RDP list extended access permit tcp any host 192.168.45.3 eq 3389
rdp extended permitted any one ip access list
sheep-vpn access-list extended permits all ip 192.168.121.0 255.255.255.0
NAT-vpn-internet access-list extended ip 192.168.121.0 allow 255.255.255.0 any
NAT-vpn-internet access-list extended ip 172.26.0.0 allow 255.255.255.0 any
NAT-vpn-internet access-list extended ip 192.168.122.0 allow 255.255.255.0 any
access-list sheep-vpn-city scope ip 192.168.121.0 allow 255.255.255.0 10.40.60.0 255.255.255.0
access-list sheep-vpn-city scope ip 192.168.121.0 allow 255.255.255.0 10.40.50.0 255.255.255.0
access-list sheep-vpn-city scope ip 192.168.121.0 allow 255.255.255.0 192.168.0.0 255.255.0.0
access-list sheep-vpn-city scope ip 192.168.121.0 allow 255.255.255.0 172.26.0.0 255.255.255.0
access-list sheep-vpn-city scope ip 192.168.121.0 allow 255.255.255.0 10.254.17.0 255.255.255.0
GHC-ganja-internet access-list extended ip 192.168.45.0 allow 255.255.255.0 any
Standard access list Split_Tunnel_List allow 192.168.16.0 255.255.255.0
azans 192.168.69.0 ip extended access-list allow 255.255.255.0 any
permit inside_nat0_outbound to access extended list ip 192.168.0.0 255.255.0.0 192.168.121.0 255.255.255.0
permit inside_nat0_outbound to access extended list ip 192.168.0.0 255.255.0.0 192.168.80.0 255.255.255.0
pager lines 24
Enable logging
emblem of logging
recording of debug console
recording of debug trap
asdm of logging of information
Interior-Bct 192.168.1.27 host connection
flow-export destination inside-Bct 192.168.1.27 9996
vpnswc MTU 1500
outside Baku MTU 1500
outside-Ganja MTU 1500
MTU 1500 remote access
Interior-Bct MTU 1500
management of MTU 1500
IP local pool raccess 192.168.121.60 - 192.168.121.120 mask 255.255.255.0
IP local pool ssl 192.168.121.130 - 192.168.121.200 mask 255.255.255.0
no failover
ICMP unreachable rate-limit 1 burst-size 1
ICMP allow any outside Baku
ICMP allow access remotely
ICMP allow any interior-Bct
ASDM image disk0: / asdm - 621.bin
don't allow no asdm history
ARP timeout 14400
global (outside-Baku) 1 interface
global (outside-Ganja) interface 2
3 overall (RAS) interface
azans access-list NAT 3 (outside-Ganja)
NAT (remote access) 0 access-list sheep-vpn-city
NAT 3 list nat-vpn-internet access (remote access)
NAT (inside-Bct) 0-list of access inside_nat0_outbound
NAT (inside-Bct) 2-nat-ganja access list
NAT (inside-Bct) 1 access list nat
Access-group rdp on interface outside-Ganja
!
Router eigrp 2008
No Auto-resume
neighbor 10.254.17.10 interface outside Baku
neighbor 10.40.50.66 Interior-Bct interface
Network 10.40.50.64 255.255.255.252
Network 10.250.25.0 255.255.255.0
Network 10.254.17.8 255.255.255.248
Network 10.254.17.16 255.255.255.248
redistribute static
!
Access remote 0.0.0.0 0.0.0.0 85.*. *. * 1
Outside-Baku route 10.0.11.0 255.255.255.0 10.254.17.10 1
Outside-Baku route 10.0.33.0 255.255.255.0 10.254.17.10 1
Outside-Baku route 10.0.150.0 255.255.255.0 10.254.17.10 1
Outside-Baku route 10.0.170.0 255.255.255.0 10.254.17.10 1
Route outside Baku 10.254.17.24 255.255.255.248 10.254.17.10 1
Route outside Baku 10.254.17.32 255.255.255.248 10.254.17.10 1
Route outside Baku 192.1.1.0 255.255.255.0 10.254.17.10 1
Outside-Baku route 192.168.27.0 255.255.255.0 10.254.17.10 1
Outside-Baku route 192.168.39.0 255.255.255.0 10.254.17.10 1
Route outside-Ganja 192.168.45.0 255.255.255.0 10.254.17.18 1
Route outside-Ganja 192.168.66.0 255.255.255.0 10.254.17.18 1
Route outside-Ganja 192.168.69.0 255.255.255.0 10.254.17.18 1
Outside-Baku route 192.168.80.0 255.255.255.0 10.254.17.11 1
Access remote 192.168.121.0 255.255.255.0 85.132.43.1 1
Route outside-Ganja 192.168.184.0 255.255.255.0 10.254.17.18 1
Route outside Baku 192.168.208.16 255.255.255.240 10.254.17.10 1
Route outside-Ganja 192.168.208.112 255.255.255.240 10.254.17.18 1
Route inside-Bct 192.168.254.0 255.255.255.0 10.40.50.66 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-registration DfltAccessPolicy
AAA-server protocol Ganymede GANYMEDE +.
AAA-server GANYMEDE (Interior-Bct) 192.168.1.8
key *.
AAA-server GANYMEDE (Interior-Bct) 192.168.22.46
key *.
RADIUS protocol AAA-server TACACS1
AAA-server TACACS1 (Interior-Bct) host 192.168.1.8
key *.
AAA-server TACACS1 (Interior-Bct) host 192.168.22.46
key *.
authentication AAA ssh console LOCAL GANYMEDE
Console to enable AAA authentication RADIUS LOCAL
Console Telnet AAA authentication RADIUS LOCAL
AAA accounting ssh console GANYMEDE
Console Telnet accounting AAA GANYMEDE
Enable http server
http 192.168.1.0 255.255.255.0 management
http 192.168.1.0 255.255.255.0 Interior-Bct
http 192.168.139.0 255.255.255.0 Interior-Bct
http 192.168.0.0 255.255.255.0 Interior-Bct
Survey community SNMP-server host inside-Bct 192.168.1.27
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT
Crypto ipsec transform-set newset aes - esp esp-md5-hmac
Crypto ipsec transform-set esp-3des esp-sha-hmac myset2
Crypto ipsec transform-set esp-3des esp-md5-hmac raccess
Crypto ipsec transform-set esp-3des esp-sha-hmac vpnclienttrans
Crypto ipsec transform-set vpnclienttrans transport mode
life crypto ipsec security association seconds 2147483646
Crypto ipsec kilobytes of life security-association 2147483646
raccess 1 set transform-set vpnclienttrans crypto dyn1 dynamic-map
correspondence address card crypto mymap 10 110
card crypto mymap 10 peers set 10.254.17.10
card crypto mymap 10 transform-set RIGHT
correspondence address card crypto mymap 20 110
card crypto mymap 20 peers set 10.254.17.11
mymap 20 transform-set myset2 crypto card
card crypto mymap interface outside Baku
correspondence address card crypto ganja 10 110
10 ganja crypto map peer set 10.254.17.18
card crypto ganja 10 transform-set RIGHT
card crypto interface outside-Ganja ganja
correspondence address card crypto vpntest 20 110
peer set card crypto vpntest 20 10.250.25.1
newset vpntest 20 transform-set card crypto
card crypto vpntest interface vpnswc
vpnclientmap 30 card crypto ipsec-isakmp dynamic dyn1
card crypto interface for remote access vpnclientmap
Crypto ca trustpoint ASDM_TrustPoint0
registration auto
name of the object CN = gyd - asa .az .bct
sslvpnkeypair key pair
Configure CRL
map of crypto DefaultCertificateMap 10 ca certificatecrypto isakmp identity address
ISAKMP crypto enable vpnswc
ISAKMP crypto enable outside-Baku
ISAKMP crypto enable outside-Ganja
crypto ISAKMP enable remote access
ISAKMP crypto enable Interior-Bct
crypto ISAKMP policy 10
preshared authentication
3des encryption
md5 hash
Group 2
life 86400
crypto ISAKMP policy 20
preshared authentication
aes encryption
md5 hash
Group 2
life 86400
crypto ISAKMP policy 30
preshared authentication
3des encryption
sha hash
Group 2
life 86400
crypto ISAKMP policy 40
preshared authentication
aes encryption
sha hash
Group 2
life 86400
Crypto isakmp nat-traversal 30
No vpn-addr-assign aaa
Telnet timeout 5
SSH 192.168.0.0 255.255.255.0 Interior-Bct
SSH timeout 35
Console timeout 0
priority queue outside Baku
queue-limit 2046
TX-ring-limit 254
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
Server NTP 192.168.1.3
SSL encryption, 3des-sha1 rc4 - md5 aes128-sha1 sha1-aes256
SSL-trust point ASDM_TrustPoint0 to vpnlb-ip remote access
SSL-trust ASDM_TrustPoint0 remote access point
WebVPN
turn on remote access
SVC disk0:/anyconnect-win-2.4.1012-k9.pkg 1 image
enable SVC
tunnel-group-list activate
attributes of Group Policy DfltGrpPolicy
Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn
internal group ssl policy
attributes of group ssl policy
banner welcome to SW value
value of DNS-server 192.168.1.3
Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn
group-lock value SSL
WebVPN
value of the SPS URL-list
internal vpn group policy
attributes of vpn group policy
value of DNS-server 192.168.1.3
Protocol-tunnel-VPN IPSec l2tp ipsec
disable the PFS
BCT.AZ value by default-field
ssl VPN-group-strategy
WebVPN
value of the SPS URL-list
IPSec-attributes tunnel-group DefaultL2LGroup
ISAKMP retry threshold 20 keepalive 5
attributes global-tunnel-group DefaultRAGroup
raccess address pool
Group-RADIUS authentication server
Group Policy - by default-vpn
IPSec-attributes tunnel-group DefaultRAGroup
pre-shared key *.
ISAKMP retry threshold 20 keepalive 5
IPSec-attributes tunnel-group DefaultWEBVPNGroup
ISAKMP retry threshold 20 keepalive 5
tunnel-group 10.254.17.10 type ipsec-l2l
IPSec-attributes tunnel-group 10.254.17.10
pre-shared key *.
ISAKMP retry threshold 20 keepalive 5
type SSL tunnel-group remote access
attributes global-group-tunnel SSL
ssl address pool
Authentication (remote access) LOCAL servers group
Group Policy - by default-ssl
certificate-use-set-name username
Group-tunnel SSL webvpn-attributes
enable SSL group-alias
Group-url https://85. *. *. * / activate
tunnel-group 10.254.17.18 type ipsec-l2l
IPSec-attributes tunnel-group 10.254.17.18
pre-shared key *.
ISAKMP retry threshold 20 keepalive 5
tunnel-group 10.254.17.11 type ipsec-l2l
IPSec-attributes tunnel-group 10.254.17.11
pre-shared key *.
ISAKMP retry threshold 20 keepalive 5
type tunnel-group DefaultSWITGroup remote access
attributes global-tunnel-group DefaultSWITGroup
raccess address pool
Group-RADIUS authentication server
Group Policy - by default-vpn
IPSec-attributes tunnel-group DefaultSWITGroup
pre-shared key *.
!
type of policy-card inspect dns migrated_dns_map_1
parameters
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the migrated_dns_map_1 dns
inspect the rsh
inspect the rtsp
inspect sqlnet
inspect sunrpc
inspect xdmcp
inspect the netbios
Review the ip options
class flow_export_cl
flow-export-type of event all the destination 192.168.1.27
class class by default
flow-export-type of event all the destination 192.168.1.27
Policy-map Voicepolicy
class voice
priority
The class data
police release 80000000
!
global service-policy global_policy
service-policy interface outside Baku Voicepolicy
context of prompt hostnameCryptochecksum:4f35f975ba7a0c11f7f46dfd541d266f
: end
GYD - asa #.ASA remote:
ASA Version 8.2 (3)
!
ciscoasa hostname
activate the encrypted password of XeY1QWHKPK75Y48j
2KFQnbNIdI.2KYOU encrypted passwd
names of
DNS-guard
!
interface Ethernet0/0
nameif inside
security-level 100
IP 192.168.80.14 255.255.255.0
!
interface Ethernet0/1
nameif outside
security-level 0
IP 10.254.17.11 255.255.255.248
!
interface Ethernet0/2
Shutdown
No nameif
no level of security
no ip address
!
interface Ethernet0/3
Shutdown
No nameif
no level of security
no ip address
!
interface Management0/0
Shutdown
nameif management
security-level 100
no ip address
management only
!
boot system Disk0: / asa823 - k8.bin
passive FTP mode
access-list 110 scope ip allow a whole
192.168.80.0 IP Access-list extended sheep 255.255.255.0 allow 192.168.0.0 255.255.0.0
pager lines 24
Enable logging
asdm of logging of information
Outside 1500 MTU
management of MTU 1500
Within 1500 MTU
no failover
ICMP unreachable rate-limit 1 burst-size 1
ICMP allow all outside
ICMP allow any inside
ASDM image disk0: / asdm - 621.bin
don't allow no asdm history
ARP timeout 14400
NAT (inside) 0 access-list sheep
Route outside 0.0.0.0 0.0.0.0 10.254.17.9 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-registration DfltAccessPolicy
Enable http server
http 192.168.1.0 255.255.255.0 management
http 192.168.80.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT
Crypto ipsec transform-set newset aes - esp esp-md5-hmac
Crypto ipsec transform-set esp-3des esp-sha-hmac myset2
life crypto ipsec security association seconds 2147483646
Crypto ipsec kilobytes of life security-association 2147483646
correspondence address card crypto mymap 10 110
card crypto mymap 10 peers set 10.254.17.9
mymap 10 transform-set myset2 crypto card
mymap outside crypto map interface
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
md5 hash
Group 2
life 86400
crypto ISAKMP policy 20
preshared authentication
aes encryption
md5 hash
Group 2
life 86400
crypto ISAKMP policy 30
preshared authentication
3des encryption
sha hash
Group 2
life 86400
crypto ISAKMP policy 40
preshared authentication
aes encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH timeout 5
Console timeout 0
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPNtunnel-group 10.254.17.9 type ipsec-l2l
IPSec-attributes tunnel-group 10.254.17.9
pre-shared key *.
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns migrated_dns_map_1
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the migrated_dns_map_1 dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
!
global service-policy global_policy
context of prompt hostnameCryptochecksum:1c1ac60e2fb84f65269d15d53f27c21b
: end
ciscoasa # $Still, I can't ping ASA remote outside from outside of the Local interface. And there is no connectivity between the 192.168.80.0 distance and local don't say 192.168.1.0. I have run out of ideas
Would appreciate any help. Thank you in advance...
If the tunnel is up (phase 1), but no traffic passing the best test is the following:
Add order management-access to the Interior , and then try to PING the intellectual property inside ASA counterpart.
inside x.x.x.x ping --> x.x.x.x is the IP of the ASA peer inside
The test above shows if the traffic passes through the tunnel (check encrypted/decrypted packets of sh cry ips its).
Test on both directions.
Please post the results.
Federico.
-
Impossible to access anything whatsoever in the Panel, limited access to internet
Impossible to access anything whatsoever in the Panel, run antivirus, nothing found, limited access to internet too. Don't know what to do.
Hello
1. don't you make changes to the computer before the show?
2. what happens when you try to access the Internet?
3. what web browser you use to access the Internet?
4. do you get the error message?Method 1
Step 1: I suggest to start the computer in safe mode with network and check if you are able to access control panel and Internet.Startup options (including safe mode)
http://Windows.Microsoft.com/en-us/Windows7/advanced-startup-options-including-safe-mode
Step 2: If you are able to access the Control Panel on safe mode, then I suggest you perform the clean boot and remove the program that is causing the problem. Make sure that you disable also all firewall and antivirus when you perform the clean boot.How to troubleshoot a problem by performing a clean boot in Windows Vista or in Windows 7
http://support.Microsoft.com/kb/929135
http://Windows.Microsoft.com/en-us/Windows7/disable-antivirus-software
Note: Microsoft does not recommend that you disable the antivirus protection in most conditions. Disable the antivirus protection that temporarily to restore a computer.
Note: follow step 7 clean boot KB929135 article to reset the computer in normal mode.Method 2
I suggest you run virus scan online by using the Microsoft safety scanner.Microsoft safety scanner
http://www.Microsoft.com/security/scanner/en-us/default.aspxNote:
when you do an antivirus online, you will lose data that are affected by the virus. Microsoft is not responsible for the loss of this data.Method 3
I suggest you to create the new user account and check if the problem persists.Create a user account
http://Windows.Microsoft.com/en-in/Windows7/create-a-user-accountIf everything works well in the new user account, then I suggest you to transfer data and settings to the fixed aid corrupt profile.
Difficulty of a corrupted user profile
http://Windows.Microsoft.com/en-in/Windows7/fix-a-corrupted-user-profile
Maybe you are looking for
-
[Script] How the auto respond to an address specified when receiving any mail
I need to send an email with the text previously set to exactly 1 address but I need it to be sent to every mail I receive, except those that are sent from an address. For example, any email me, with the exception of the ' [email protected]', I would ans
-
QuestionI have "upgraded" to FF5 and now have no refresh or stop icons in the menu bar, are not available in the menu "personalize." How to make a comeback?
-
Compaq presario sr5610f
-
I'm a 49.38.07 (a 4, 04) error on my computer it tells me to trun it turns off and turn it back on and I tried a few times and nothing happens. No matter what idead what to do?
-
Another factory Dell Restore Question
Hello I have a dell xps l702x. I have upgraded to Windows 8 and needed to do a factory restore. So I reinstalled WIndows 7 manually with the Dell installation disk. I this point I still have the dell recovery partition and the image file still exists