Impossible to access remotely to Zoneminder on port 80

I have a Cisco Linksys E2500 modem and I can't access Zoneminder which is basically a Linux video security DVR software package.  It runs on a Ubuntu Linux server.

I have HTTP port 80 forwarded to the address static IP of the server Ubuntu but I repeatedly get an error indicating that the connection has expired whenever I try to access Zoneminder remotely as in access it remotely from a coffee shop.

I have absolutely no problem to access the Zoneminder when I on my home LAN.

I can access other software from remote sites on the parameters of the port 4369 with a favorite TCP protocol.  In other words, 4369 port is forwarded to an another Windows workstation with a static IP address assigned. Absolutely no problem with 4369 port forwarding.

Also, I tried port 80 on the site, YouGetSignal, which is used to test port forwarding.  The Web site indicates that port 80 is closed.  But when I test port 4369, the site indicates that the port is open.  Zoneminder that uses port 80 is fully operational when I test port 80 via YouGetsignal.

My ISP told me that they do not block the ports including port 80.

Any help would be greatly appreciated

Thanx

Try the following steps:

[A] with the help of the Cisco Connect software (if at all, you have installed the router using this software)

1] open the software and go to the option that says "settings of the router.

[2] then click on the option that says 'Advanced settings', which will take you to the router configuration page.

[3] then click on disable SPI Firewall Protection Security tab, uncheck the box filter anonymous Internet requests...

[B] If you have not installed Cisco connect then you can connect to the router's user interface using its default IP address in the browser which is 192.168.1.1 and enter "admin" as password empty username field. This will take to the web interface of the router and then follow the steps as indicated above to make the changes.

Tags: Linksys Routers

Similar Questions

  • Impossible to access wifi with other access points

    WNDR4500v3 with firmware V1.0.0. I32

    I bought this router on dec 25 2015 to replace a dead linksys router.
    The router feeds a switch of 16 points from one of the 4 ports.
    I have a win 7 pc connected to one of the other routers 3 ports.
    Then a VoIP connected to port 3 of the router.
    I have 2 other wireless access points connected to the port 16.
    We feed a remote building through a wired connection to the firset access point
    The other access point is also fed by a wired connection.
    The old linksys router had him for 4 years.

    As I said I bought this router as a replacement... but since its worthless and the two wireless access point do not have internet connection.
    So either I get it work or will return it for a refund within 24 hours.

    Figured that out it was Network Manager and windows share the unknown connection of marking.

    In advanved sharing setting I have to change to use for user accounts and passwords to connect to other computers

    Then all the problems went away.

    No more giving up connection and with no internet connection.

  • How a cRIO can access remote systems VISA resources?

    I have a NI 9871 RS485 module on an ethernet 9148 RIO.

    I have also a laptop and a cRIO 9073.

    I can access each of the 9871 serial ports on the computer but not the 9073.

    When you try to access it from the cRIO, I get error:-1073807192, VISA: (Hex 0xBFFF00A8) is denied access to the resource or to the remote machine. This is due to the lack of sufficient privileges for the current user or the machine.

    How the cRIO can access the serial ports of the module 9871 on the ethernetRIO?

    Or how a remote access cRIO visa resources?

    Or how a cRIO can have sufficient privileges to access remote resources from visa?

    Thank you for your help.

    LabVIEW 2010 & VISA 5.1 on pc

    NOR-RIO 4.0 and 5.1 VISA & NI 9871 SERIES scan engine support on cRIO and eRIO

    Hi Woss,

    It is possible that your RIO Ethernet has some parameters of active access which is to prohibit the connection to serial ports.  You can change these settings in a position and Automation Explorer (MAX) for your device by going to the device under remote systems, expanding the category of software under it and choosing NI-VISA.  There will be a tab in the right pane of MAX called Options of VISA.  In this tab, select Server VISA > security to access these settings.

    From there, you should be able to add the IP address of the RIO device that needs to access the VISA on the RIO Ethernet server.  Once you have changed these settings, just click on register at the top of the window and allow the unit to restart.  Let me know if that helps!

  • VPN clients cannot access remote sites - PIX, routing problem?

    I have a problem with routing to remote from our company websites when users connect via their VPN client remotely (i.e. for home workers)

    Our headquarters contains a PIX 515E firewall. A number of remote sites to connect (via ADSL) to head office using IPSEC tunnels, ending the PIX.

    Behind the PIX is a router 7206 with connections to the seat of LANs and connections to a number of ISDN connected remote sites. The default route on 7206 points to the PIX from traffic firewall which sits to ADSL connected remote sites through the PIX. Internal traffic for LAN and ISDN connected sites is done via the 7206.

    Very good and works very well.

    When a user connects remotely using their VPN client (connection is interrupted on the PIX) so that they get an IP address from the pool configured on the PIX and they can access resources located on local networks to the office with no problems.

    However, the problem arises when a remote user wants access to a server located in one of the remote sites ADSL connected - it is impossible to access all these sites.

    On the remote site routers, I configured the access lists to allow access from the pool of IP addresses used by the PIX. But it made no difference. I think that the problem may be the routes configured on the PIX itself, but I don't know what is necessary to solve this problem.

    Does anyone have suggestions on what needs to be done to allow access to remote sites for users connected remotely via VPN?

    (Note: I suggested a workaround, users can use a server on LAN headquarters as a "jump point" to connect to remote servers from there)

    with pix v6, no traffic is allowed to redirect to the same interface.

    for example, a remote user initiates an rdp session for one of the barns adsl. PIX decrypts the packet coming from the external interface and looks at the destination. because the destination is one of adsl sites, pix will have to return traffic to the external interface. Unfortunately, pix v6.x has a limitation that would force the pix to drop the packet.

    with the v7, this restriction has been removed with the "same-security-traffic control intra-interface permits".

    http://www.Cisco.com/en/us/partner/products/HW/vpndevc/ps2030/products_configuration_example09186a008046f307.shtml

  • Split tunneling cannot access remote host

    Hi guys,.

    Having this problem by which I am able to connect the Anyconnect client but unable to ping / access of remote servers. See below for the config of the SAA;

    Any ideas would be a great help, thank you!

    ASA Version 9.1 (1)

    !

    ASA host name

    enable the encrypted password xxxxxxx

    xxxxxxxxxxxxx encrypted passwd

    names of

    mask of local pool AnyPool 10.0.0.1 - 10.0.0.10 IP 255.255.255.0

    !

    interface GigabitEthernet0/0

    nameif outside

    security-level 0

    IP address 203.106.x.x 255.255.255.224

    !

    interface GigabitEthernet0/1

    nameif inside

    security-level 99

    IP 172.19.88.254 255.255.255.0

    !

    interface Management0/0

    management only

    nameif management

    security-level 100

    IP 192.168.1.1 255.255.255.0

    !

    passive FTP mode

    clock timezone 8 MYT

    the SVR object network

    Home 172.19.88.11

    e-mail server in description

    network of the NETWORK_OBJ_172.19.88.0_24 object

    172.19.88.0 subnet 255.255.255.0

    network of the VPN-POOL object

    10.0.0.0 subnet 255.255.255.0

    object-group Protocol TCPUDP

    object-protocol udp

    object-tcp protocol

    object-group service DM_INLINE_SERVICE_0

    ICMP service object

    area of service-purpose tcp - udp destination eq

    the destination hostname eq tcp service object

    the purpose of the tcp destination eq https service

    the purpose of the tcp destination eq imap4 service

    the purpose of the tcp destination eq nntp service

    the purpose of the tcp destination eq pop3 service

    the purpose of the tcp destination eq smtp service

    the purpose of the tcp destination eq telnet service

    Outside_access_in list extended access allowed object-group DM_INLINE_SERVICE_0 any object SVR

    Outside_access_in list extended access allow TCPUDP of object-group a

    Outside_access_in access-list extended ip any any idle state to allow

    Internal_access_in list extended access allow TCPUDP of object-group a

    Internal_access_in access-list extended ip any any idle state to allow

    SPLIT_TUNNEL list standard access allowed 10.0.0.0 255.255.255.0

    pager lines 24

    Enable logging

    timestamp of the record

    exploitation forest-size of the buffer 16384

    buffered logging critical

    asdm of logging of information

    Debugging trace record

    exploitation forest flash-bufferwrap

    record level of the rate-limit 1000 1 2

    management of MTU 1500

    MTU 1500 internal

    Outside 1500 MTU

    no failover

    ICMP unreachable rate-limit 1 burst-size 1

    ASDM image disk0: / asdm - 711.bin

    don't allow no asdm history

    ARP timeout 14400

    no permit-nonconnected arp

    !

    the SVR object network

    203.106.x.x static NAT (indoor, outdoor)

    !

    source of auto after the cessation of NAT (inside, outside) dynamic interface

    Internal_access_in in interface internal access-group

    Access-group Outside_access_in in interface outside

    Route outside 0.0.0.0 0.0.0.0 203.106.23.97 1

    Timeout xlate 03:00

    Pat-xlate timeout 0:00:30

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    identity of the user by default-domain LOCAL

    the ssh LOCAL console AAA authentication

    LOCAL AAA authorization command

    Enable http server

    http 192.168.1.0 255.255.255.0 management

    http authentication certificate management

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start

    No vpn sysopt connection permit

    Crypto ipsec ikev2 ipsec-proposal OF

    encryption protocol esp

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 proposal ipsec 3DES

    Esp 3des encryption protocol

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal AES

    Esp aes encryption protocol

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal AES192

    Protocol esp encryption aes-192

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 AES256 ipsec-proposal

    Protocol esp encryption aes-256

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec pmtu aging infinite - the security association

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev2 AES256 AES192 AES 3DES ipsec-proposal OF

    card crypto Outside_map 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    Outside_map interface card crypto outside

    Crypto ca trustpoint ASDM_TrustPoint0

    Terminal registration

    name of the object CN = ASA

    Configure CRL

    Crypto ca trustpoint Anyconnect_TrustPoint

    registration auto

    name of the object CN = ASA

    anyconnect_rsa key pair

    Configure CRL

    Crypto ca trustpoint _SmartCallHome_ServerCA

    Configure CRL

    trustpool crypto ca policy

    string encryption ca Anyconnect_TrustPoint certificates

    IKEv2 crypto policy 1

    aes-256 encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 10

    aes-192 encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 20

    aes encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 30

    3des encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 40

    the Encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    Crypto ikev2 activate out of service the customer port 443

    Crypto ikev2 access remote trustpoint Anyconnect_TrustPoint

    Telnet timeout 3

    SSH 172.19.88.0 255.255.255.0 internal

    SSH 0.0.0.0 0.0.0.0 outdoors

    SSH timeout 15

    Console timeout 0

    management of 192.168.1.100 - 192.168.1.200 addresses dhcpd

    enable dhcpd management

    !

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    NTP server 119.110.97.148 prefer external source

    SSL-trust outside Anyconnect_TrustPoint point

    WebVPN

    allow outside

    AnyConnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1

    AnyConnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 2

    AnyConnect image disk0:/anyconnect-linux-2.5.2014-k9.pkg 3

    AnyConnect profiles AnyConnect_client_profile disk0: / AnyConnect_client_profile.xml

    AnyConnect enable

    attributes of Group Policy DfltGrpPolicy

    VPN-tunnel-Protocol ikev1, ikev2 ssl clientless ssl ipsec l2tp client

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list SPLIT_TUNNEL

    Group Policy 'GroupPolicy AnyConnect' internal

    Group Policy attributes "GroupPolicy AnyConnect"

    value of server WINS 172.19.88.11

    value of server DNS 172.19.88.11

    SSL VPN-tunnel-Protocol ikev2 client ssl clientless

    WebVPN

    AnyConnect value AnyConnect_client_profile type user profiles

    attributes global-tunnel-group DefaultWEBVPNGroup

    address pool AnyPool

    tunnel-group "AnyConnect" type remote access

    attributes global-tunnel-group "AnyConnect".

    address pool AnyPool

    strategy-group-by default "GroupPolicy AnyConnect"

    tunnel-group "AnyConnect" webvpn-attributes

    Group-alias "AnyConnect" activate

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    Review the ip options

    Hi Max,.

    Please send me the output of 'see the anyconnect vpn-sessiondb' once connected with VPN.

    And try to add the following configuration and see if that helps:

    NAT (inside, outside) 1 static source NETWORK_OBJ_172.19.88.0_24 NETWORK_OBJ_172.19.88.0_24 static destination VPN-VPN-POOL no-proxy-arp-route search

    And one more qusetion do you use split tunnel? If yes then you must make the following changes, because your split tunnel is incorrect, in the split tunnel, you have configured the address pool of vpn. Please make the following change:

    no access list SPLIT_TUNNEL standards not allowed 10.0.0.0 255.255.255.0

    Standard access list SPLIT_TUNNEL allow 172.19.88.0 255.255.255.0

    Group Policy attributes "GroupPolicy AnyConnect"

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list SPLIT_TUNNEL

    Let me know if this can help, or if you have any questions, more about it.

    Thank you

    Jeet Kumar

  • Our computer was accessed remotely this afternoon, how can we prevent this?

    We have a Mac Mini, with OS X 10.6.8 using NetZero DSL as our internet provider and Firefox as your browser. Our computer was accessed remotely through LogMeIn (rescue), but it seems that the person or the group failed to hack into our computer. Are there settings in Firefox that could prevent this from happening in the future? Thank you...

    Firefox is a web browser not a firewall.

    I agree that it's more to do with your operating system and the LogMeIn software on ensuring that only you have access when you need to.

  • My camera iPhone 5s is accessed remotely? Whenever I use my phone torch ends up taking videos. Is it possible for a person to access my camera through the torch. We share the same Apple ID

    My camera iPhone 5s is accessed remotely? Whenever I use my phone torch ends up taking videos. Is it possible for a person to access my camera through the torch. We share the same Apple ID

    N °

    but maybe you tap the camera icon (bottom-right) when you press the icon of the torch (with the other hand maybe?)

  • TuneUp Utility has been installed on a trial basis, it changed the things that made it impossible to access the C:\ drive to install the important updates and uninstall Tuneup Utilities.

    On my old Dell with Windows XP I installed Tuneup Utility on an experimental basis, it changed things that made it impossible to access the C:\ drive to install the important updates and uninstall Tuneup Utilities.

    Anyone have a solution?

    Help, please.

    Software support to the YOU seem hopeless, they donot even read the request entirely to meet the last 8 weeks and many emails in series.

    Hello

    I suggest you to follow the steps in this link and check if it helps:

    Method 1:
    Try to uninstall the utility and check if it helps:
    http://support.Microsoft.com/kb/307895

    Method 2:
    Try to restore the computer to the point before you install the utility and check if it helps.
    http://support.Microsoft.com/kb/306084

    It will be useful.

  • Security - can some ip provider use a port open to access your computer to say port 80?

    some ip provider allows an open port to access your computer to say port 80? Alex MacDonald

    Port 80 is belong to http and internet connection as long as your firewall is turned on and Windows and antivirus is updated they could not damage you. Hackers scan PC and try to infect them but your firewall is here to protect.

  • Impossible to access the account, the message says: "you cannot access your account because your parent has blocked it.»

    Changed the title: I opened an account and set up parental controls. It is impossible to access that account the message said "you cannot access your account because your parent has blocked it."

    I opened an account and set up parental controls. It is impossible to access that account the message said "you cannot access your account because your parent has blocked it."

    Hello Nimaakhaven,

    The best place to ask your question of Windows Live is inside Windows Live help forums. Experts specialize in all things, Windows Live, and would be delighted to help you with your questions. Please choose a product below to be redirected to the appropriate community:

     

    Windows Live Mail

    Windows Live Hotmail

    Windows Live Messenger

    Looking for a different product to Windows Live? Visit the home page Windows Live Help for the complete list of Windows Live forums to www.windowslivehelp.com.

  • Question of ML6000 Web Client. "The library is busy. Impossible to access."

    Hello

    I hope that somone can help me in this case.

    We have ML6000 library running.

    Since today I can't like connect on ML6000 Web Client.

    I get the message:

    "The library is busy. Impossible to access."

    I checked the library doors. Library doors are closed.

    How can I solve this problem?

    Thanks for all proposals.

    There are a number of things that could cause something like this happens. The first thing that I would recommend would be to restart the ML6000 library and get tickets RAS on the ML.

  • 1920 router access remote vpn LDAP living

    Hello

    What is required for a router in 1920 use AnyConnect and/or also integrate with AD LDAP?

    Currently, this router supports legacy clients and has these licenses:

    Technology for the Module package license information: "c1900".

    -----------------------------------------------------------------
    Technology-technology-package technology
    Course Type next reboot
    ------------------------------------------------------------------
    IPBase ipbasek9 ipbasek9 Permanent
    Security securityk9 Permanent securityk9
    given none none none

    The vpn to access remote client inherited integrate with AD LDAP?

    Thank you.

    As long as you are on IOS 15.3.3M3 or better, you have all the licenses you need for 3.1 AnyConnect run on your 1921.

    The guide to directly connect your router to LDAP can be found here:

    http://www.Cisco.com/c/en/us/TD/docs/iOS-XML/iOS/sec_usr_ldap/configuration/15-Mt/sec-usr-LDAP-15-Mt-book/sec_conf_ldap.html

    Personally, I would avoid directly interfacing with LDAP, because it can be a complex arrangement. While it can be done, it's easier to have your router to connect to the NPS Microsoft via RADIUS server for your authentication.

  • 2 VPN SITE to SITE with ACCESS REMOTE VPN

    Hello

    I have a 870 router c and I would like to put 2 different VPN SITE to SITE and access remote VPN (VPN CLIENTS) so is it possible to put 3 VPN in the router even if yes can u give me the steps or the sample configuration

    Concerning

    Thus, on the routers will be:

    Cisco 2611:

    LAN: 10.10.10.0/24

    access-list 100 permit ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255

    access-list 100 permit ip 14.1.1.0 0.0.0.255 10.10.20.0 0.0.0.255--> VPNPOOL

    !

    10 ipsec-isakmp crypto map clientmap

    defined by peer 172.18.124.199

    match address 100

    !

    IP local pool ippool 14.1.1.1 14.1.1.254

    !

    access-list 120 allow ip 10.10.10.0 0.0.0.255 14.1.1.0 0.0.0.255

    access-list 120 allow ip 10.10.20.0 0.0.0.255 14.1.1.0 0.0.0.255 --> NETWORK REMOTE

    !

    crypto ISAKMP client configuration group ra-customer

        pool ippool

    ACL 120

    !

    Please note that the configuration is incomplete, I added that relevant changes, you should bring to the allow clients of RA through the LAN-to-LAN tunnel, of course, the LAN-to-LAN settings should match to the other side of the tunnel that is mirror of ACL, NAT and so on.

    HTH,

    Portu.

  • Cannot access remote network by VPN Site to Site ASA

    Hello everyone

    First of all I must say that I have configured the VPN site-to site a million times before.  Stuck with it. First of all I can't ping outside the interface of my ASA remote. Secondly, VPN is in place, but no connectivity between local networks

    ASA local:
    hostname gyd - asa
    domain bct.az
    activate the encrypted password of XeY1QWHKPK75Y48j
    XeY1QWHKPK75Y48j encrypted passwd
    names of
    DNS-guard
    !
    interface GigabitEthernet0/0
    Shutdown
    nameif vpnswc
    security-level 0
    IP 10.254.17.41 255.255.255.248
    !
    interface GigabitEthernet0/1
    Vpn-turan-Baku description
    nameif outside Baku
    security-level 0
    IP 10.254.17.9 255.255.255.248

    !
    interface GigabitEthernet0/2
    Vpn-ganja description
    nameif outside-Ganja
    security-level 0
    IP 10.254.17.17 255.255.255.248
    !
    interface GigabitEthernet0/2.30
    Description remote access
    VLAN 30
    nameif remote access
    security-level 0
    IP 85.*. *. * 255.255.255.0
    !
    interface GigabitEthernet0/3
    Description BCT_Inside
    nameif inside-Bct
    security-level 100
    IP 10.40.50.65 255.255.255.252
    !
    interface Management0/0
    nameif management
    security-level 100
    IP 192.168.251.1 255.255.255.0
    management only
    !
    boot system Disk0: / asa823 - k8.bin
    passive FTP mode
    DNS server-group DefaultDNS
    name-server 192.168.1.3
    domain bct.az
    permit same-security-traffic intra-interface
    object-group network obj - 192.168.121.0
    object-group network obj - 10.40.60.0
    object-group network obj - 10.40.50.0
    object-group network obj - 192.168.0.0
    object-group network obj - 172.26.0.0
    object-group network obj - 10.254.17.0
    object-group network obj - 192.168.122.0
    object-group service obj-tcp-eq-22
    object-group network obj - 10.254.17.18
    object-group network obj - 10.254.17.10
    object-group network obj - 10.254.17.26
    access-list 110 scope ip allow a whole
    NAT list extended access permit tcp any host 10.254.17.10 eq ssh
    NAT list extended access permit tcp any host 10.254.17.26 eq ssh
    access-list extended ip allowed any one sheep
    icmp_inside list extended access permit icmp any one
    icmp_inside of access allowed any ip an extended list
    access list nat-ganja extended permit tcp any host 10.254.17.18 eq ssh
    RDP list extended access permit tcp any host 192.168.45.3 eq 3389
    rdp extended permitted any one ip access list
    sheep-vpn access-list extended permits all ip 192.168.121.0 255.255.255.0
    NAT-vpn-internet access-list extended ip 192.168.121.0 allow 255.255.255.0 any
    NAT-vpn-internet access-list extended ip 172.26.0.0 allow 255.255.255.0 any
    NAT-vpn-internet access-list extended ip 192.168.122.0 allow 255.255.255.0 any
    access-list sheep-vpn-city scope ip 192.168.121.0 allow 255.255.255.0 10.40.60.0 255.255.255.0
    access-list sheep-vpn-city scope ip 192.168.121.0 allow 255.255.255.0 10.40.50.0 255.255.255.0
    access-list sheep-vpn-city scope ip 192.168.121.0 allow 255.255.255.0 192.168.0.0 255.255.0.0
    access-list sheep-vpn-city scope ip 192.168.121.0 allow 255.255.255.0 172.26.0.0 255.255.255.0
    access-list sheep-vpn-city scope ip 192.168.121.0 allow 255.255.255.0 10.254.17.0 255.255.255.0
    GHC-ganja-internet access-list extended ip 192.168.45.0 allow 255.255.255.0 any
    Standard access list Split_Tunnel_List allow 192.168.16.0 255.255.255.0
    azans 192.168.69.0 ip extended access-list allow 255.255.255.0 any
    permit inside_nat0_outbound to access extended list ip 192.168.0.0 255.255.0.0 192.168.121.0 255.255.255.0
    permit inside_nat0_outbound to access extended list ip 192.168.0.0 255.255.0.0 192.168.80.0 255.255.255.0
    pager lines 24
    Enable logging
    emblem of logging
    recording of debug console
    recording of debug trap
    asdm of logging of information
    Interior-Bct 192.168.1.27 host connection
    flow-export destination inside-Bct 192.168.1.27 9996
    vpnswc MTU 1500
    outside Baku MTU 1500
    outside-Ganja MTU 1500
    MTU 1500 remote access
    Interior-Bct MTU 1500
    management of MTU 1500
    IP local pool raccess 192.168.121.60 - 192.168.121.120 mask 255.255.255.0
    IP local pool ssl 192.168.121.130 - 192.168.121.200 mask 255.255.255.0
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    ICMP allow any outside Baku
    ICMP allow access remotely
    ICMP allow any interior-Bct
    ASDM image disk0: / asdm - 621.bin
    don't allow no asdm history
    ARP timeout 14400
    global (outside-Baku) 1 interface
    global (outside-Ganja) interface 2
    3 overall (RAS) interface
    azans access-list NAT 3 (outside-Ganja)
    NAT (remote access) 0 access-list sheep-vpn-city
    NAT 3 list nat-vpn-internet access (remote access)
    NAT (inside-Bct) 0-list of access inside_nat0_outbound
    NAT (inside-Bct) 2-nat-ganja access list
    NAT (inside-Bct) 1 access list nat
    Access-group rdp on interface outside-Ganja
    !
    Router eigrp 2008
    No Auto-resume
    neighbor 10.254.17.10 interface outside Baku
    neighbor 10.40.50.66 Interior-Bct interface
    Network 10.40.50.64 255.255.255.252
    Network 10.250.25.0 255.255.255.0
    Network 10.254.17.8 255.255.255.248
    Network 10.254.17.16 255.255.255.248
    redistribute static
    !
    Access remote 0.0.0.0 0.0.0.0 85.*. *. * 1
    Outside-Baku route 10.0.11.0 255.255.255.0 10.254.17.10 1
    Outside-Baku route 10.0.33.0 255.255.255.0 10.254.17.10 1
    Outside-Baku route 10.0.150.0 255.255.255.0 10.254.17.10 1
    Outside-Baku route 10.0.170.0 255.255.255.0 10.254.17.10 1
    Route outside Baku 10.254.17.24 255.255.255.248 10.254.17.10 1
    Route outside Baku 10.254.17.32 255.255.255.248 10.254.17.10 1
    Route outside Baku 192.1.1.0 255.255.255.0 10.254.17.10 1
    Outside-Baku route 192.168.27.0 255.255.255.0 10.254.17.10 1
    Outside-Baku route 192.168.39.0 255.255.255.0 10.254.17.10 1
    Route outside-Ganja 192.168.45.0 255.255.255.0 10.254.17.18 1
    Route outside-Ganja 192.168.66.0 255.255.255.0 10.254.17.18 1
    Route outside-Ganja 192.168.69.0 255.255.255.0 10.254.17.18 1
    Outside-Baku route 192.168.80.0 255.255.255.0 10.254.17.11 1
    Access remote 192.168.121.0 255.255.255.0 85.132.43.1 1
    Route outside-Ganja 192.168.184.0 255.255.255.0 10.254.17.18 1
    Route outside Baku 192.168.208.16 255.255.255.240 10.254.17.10 1
    Route outside-Ganja 192.168.208.112 255.255.255.240 10.254.17.18 1
    Route inside-Bct 192.168.254.0 255.255.255.0 10.40.50.66 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-registration DfltAccessPolicy
    AAA-server protocol Ganymede GANYMEDE +.
    AAA-server GANYMEDE (Interior-Bct) 192.168.1.8
    key *.
    AAA-server GANYMEDE (Interior-Bct) 192.168.22.46
    key *.
    RADIUS protocol AAA-server TACACS1
    AAA-server TACACS1 (Interior-Bct) host 192.168.1.8
    key *.
    AAA-server TACACS1 (Interior-Bct) host 192.168.22.46
    key *.
    authentication AAA ssh console LOCAL GANYMEDE
    Console to enable AAA authentication RADIUS LOCAL
    Console Telnet AAA authentication RADIUS LOCAL
    AAA accounting ssh console GANYMEDE
    Console Telnet accounting AAA GANYMEDE
    Enable http server
    http 192.168.1.0 255.255.255.0 management
    http 192.168.1.0 255.255.255.0 Interior-Bct
    http 192.168.139.0 255.255.255.0 Interior-Bct
    http 192.168.0.0 255.255.255.0 Interior-Bct
    Survey community SNMP-server host inside-Bct 192.168.1.27
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT
    Crypto ipsec transform-set newset aes - esp esp-md5-hmac
    Crypto ipsec transform-set esp-3des esp-sha-hmac myset2

    Crypto ipsec transform-set esp-3des esp-md5-hmac raccess
    Crypto ipsec transform-set esp-3des esp-sha-hmac vpnclienttrans
    Crypto ipsec transform-set vpnclienttrans transport mode
    life crypto ipsec security association seconds 2147483646
    Crypto ipsec kilobytes of life security-association 2147483646
    raccess 1 set transform-set vpnclienttrans crypto dyn1 dynamic-map
    correspondence address card crypto mymap 10 110
    card crypto mymap 10 peers set 10.254.17.10

    card crypto mymap 10 transform-set RIGHT
    correspondence address card crypto mymap 20 110
    card crypto mymap 20 peers set 10.254.17.11
    mymap 20 transform-set myset2 crypto card
    card crypto mymap interface outside Baku
    correspondence address card crypto ganja 10 110
    10 ganja crypto map peer set 10.254.17.18
    card crypto ganja 10 transform-set RIGHT
    card crypto interface outside-Ganja ganja
    correspondence address card crypto vpntest 20 110
    peer set card crypto vpntest 20 10.250.25.1
    newset vpntest 20 transform-set card crypto
    card crypto vpntest interface vpnswc
    vpnclientmap 30 card crypto ipsec-isakmp dynamic dyn1
    card crypto interface for remote access vpnclientmap
    Crypto ca trustpoint ASDM_TrustPoint0
    registration auto
    name of the object CN = gyd - asa .az .bct
    sslvpnkeypair key pair
    Configure CRL
    map of crypto DefaultCertificateMap 10 ca certificate

    crypto isakmp identity address
    ISAKMP crypto enable vpnswc
    ISAKMP crypto enable outside-Baku
    ISAKMP crypto enable outside-Ganja
    crypto ISAKMP enable remote access
    ISAKMP crypto enable Interior-Bct
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    md5 hash
    Group 2
    life 86400
    crypto ISAKMP policy 20
    preshared authentication
    aes encryption
    md5 hash
    Group 2
    life 86400
    crypto ISAKMP policy 30
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    crypto ISAKMP policy 40
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    Crypto isakmp nat-traversal 30
    No vpn-addr-assign aaa
    Telnet timeout 5
    SSH 192.168.0.0 255.255.255.0 Interior-Bct
    SSH timeout 35
    Console timeout 0
    priority queue outside Baku
    queue-limit 2046
    TX-ring-limit 254
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    Server NTP 192.168.1.3
    SSL encryption, 3des-sha1 rc4 - md5 aes128-sha1 sha1-aes256
    SSL-trust point ASDM_TrustPoint0 to vpnlb-ip remote access
    SSL-trust ASDM_TrustPoint0 remote access point
    WebVPN
    turn on remote access
    SVC disk0:/anyconnect-win-2.4.1012-k9.pkg 1 image
    enable SVC
    tunnel-group-list activate
    attributes of Group Policy DfltGrpPolicy
    Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn
    internal group ssl policy
    attributes of group ssl policy
    banner welcome to SW value
    value of DNS-server 192.168.1.3
    Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn
    group-lock value SSL
    WebVPN
    value of the SPS URL-list
    internal vpn group policy
    attributes of vpn group policy
    value of DNS-server 192.168.1.3
    Protocol-tunnel-VPN IPSec l2tp ipsec
    disable the PFS
    BCT.AZ value by default-field
    ssl VPN-group-strategy
    WebVPN
    value of the SPS URL-list
    IPSec-attributes tunnel-group DefaultL2LGroup
    ISAKMP retry threshold 20 keepalive 5
    attributes global-tunnel-group DefaultRAGroup
    raccess address pool
    Group-RADIUS authentication server
    Group Policy - by default-vpn
    IPSec-attributes tunnel-group DefaultRAGroup
    pre-shared key *.
    ISAKMP retry threshold 20 keepalive 5
    IPSec-attributes tunnel-group DefaultWEBVPNGroup
    ISAKMP retry threshold 20 keepalive 5
    tunnel-group 10.254.17.10 type ipsec-l2l
    IPSec-attributes tunnel-group 10.254.17.10
    pre-shared key *.
    ISAKMP retry threshold 20 keepalive 5
    type SSL tunnel-group remote access
    attributes global-group-tunnel SSL
    ssl address pool
    Authentication (remote access) LOCAL servers group
    Group Policy - by default-ssl
    certificate-use-set-name username
    Group-tunnel SSL webvpn-attributes
    enable SSL group-alias
    Group-url https://85. *. *. * / activate
    tunnel-group 10.254.17.18 type ipsec-l2l
    IPSec-attributes tunnel-group 10.254.17.18
    pre-shared key *.
    ISAKMP retry threshold 20 keepalive 5
    tunnel-group 10.254.17.11 type ipsec-l2l
    IPSec-attributes tunnel-group 10.254.17.11
    pre-shared key *.

    ISAKMP retry threshold 20 keepalive 5
    type tunnel-group DefaultSWITGroup remote access
    attributes global-tunnel-group DefaultSWITGroup
    raccess address pool
    Group-RADIUS authentication server
    Group Policy - by default-vpn
    IPSec-attributes tunnel-group DefaultSWITGroup
    pre-shared key *.
    !
    type of policy-card inspect dns migrated_dns_map_1
    parameters
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the migrated_dns_map_1 dns
    inspect the rsh
    inspect the rtsp
    inspect sqlnet
    inspect sunrpc
    inspect xdmcp
    inspect the netbios
    Review the ip options
    class flow_export_cl
    flow-export-type of event all the destination 192.168.1.27
    class class by default
    flow-export-type of event all the destination 192.168.1.27
    Policy-map Voicepolicy
    class voice
    priority
    The class data
    police release 80000000
    !
    global service-policy global_policy
    service-policy interface outside Baku Voicepolicy
    context of prompt hostname

    Cryptochecksum:4f35f975ba7a0c11f7f46dfd541d266f
    : end
    GYD - asa #.

    ASA remote:
    ASA Version 8.2 (3)
    !
    ciscoasa hostname
    activate the encrypted password of XeY1QWHKPK75Y48j
    2KFQnbNIdI.2KYOU encrypted passwd
    names of
    DNS-guard
    !
    interface Ethernet0/0
    nameif inside
    security-level 100
    IP 192.168.80.14 255.255.255.0

    !
    interface Ethernet0/1
    nameif outside
    security-level 0
    IP 10.254.17.11 255.255.255.248

    !
    interface Ethernet0/2
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Ethernet0/3
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Management0/0
    Shutdown
    nameif management
    security-level 100
    no ip address
    management only
    !
    boot system Disk0: / asa823 - k8.bin
    passive FTP mode
    access-list 110 scope ip allow a whole
    192.168.80.0 IP Access-list extended sheep 255.255.255.0 allow 192.168.0.0 255.255.0.0

    pager lines 24
    Enable logging
    asdm of logging of information
    Outside 1500 MTU
    management of MTU 1500
    Within 1500 MTU
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    ICMP allow all outside
    ICMP allow any inside
    ASDM image disk0: / asdm - 621.bin
    don't allow no asdm history
    ARP timeout 14400
    NAT (inside) 0 access-list sheep
    Route outside 0.0.0.0 0.0.0.0 10.254.17.9 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-registration DfltAccessPolicy
    Enable http server
    http 192.168.1.0 255.255.255.0 management
    http 192.168.80.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT
    Crypto ipsec transform-set newset aes - esp esp-md5-hmac
    Crypto ipsec transform-set esp-3des esp-sha-hmac myset2

    life crypto ipsec security association seconds 2147483646
    Crypto ipsec kilobytes of life security-association 2147483646
    correspondence address card crypto mymap 10 110
    card crypto mymap 10 peers set 10.254.17.9
    mymap 10 transform-set myset2 crypto card
    mymap outside crypto map interface
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10

    preshared authentication
    3des encryption
    md5 hash
    Group 2
    life 86400
    crypto ISAKMP policy 20
    preshared authentication
    aes encryption
    md5 hash
    Group 2
    life 86400
    crypto ISAKMP policy 30
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    crypto ISAKMP policy 40
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH timeout 5
    Console timeout 0
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    WebVPN

    tunnel-group 10.254.17.9 type ipsec-l2l
    IPSec-attributes tunnel-group 10.254.17.9
    pre-shared key *.

    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns migrated_dns_map_1
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the migrated_dns_map_1 dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    !
    global service-policy global_policy
    context of prompt hostname

    Cryptochecksum:1c1ac60e2fb84f65269d15d53f27c21b
    : end
    ciscoasa # $

    Still, I can't ping ASA remote outside from outside of the Local interface. And there is no connectivity between the 192.168.80.0 distance and local don't say 192.168.1.0. I have run out of ideas

    Would appreciate any help. Thank you in advance...

    If the tunnel is up (phase 1), but no traffic passing the best test is the following:

    Add order management-access to the Interior , and then try to PING the intellectual property inside ASA counterpart.

    inside x.x.x.x ping --> x.x.x.x is the IP of the ASA peer inside

    The test above shows if the traffic passes through the tunnel (check encrypted/decrypted packets of sh cry ips its).

    Test on both directions.

    Please post the results.

    Federico.

  • Impossible to access anything whatsoever in the Panel, limited access to internet

    Impossible to access anything whatsoever in the Panel, run antivirus, nothing found, limited access to internet too.  Don't know what to do.

    Hello

    1. don't you make changes to the computer before the show?
    2. what happens when you try to access the Internet?
    3. what web browser you use to access the Internet?
    4. do you get the error message?

    Method 1
    Step 1: I suggest to start the computer in safe mode with network and check if you are able to access control panel and Internet.

    Startup options (including safe mode)
    http://Windows.Microsoft.com/en-us/Windows7/advanced-startup-options-including-safe-mode
    Step 2: If you are able to access the Control Panel on safe mode, then I suggest you perform the clean boot and remove the program that is causing the problem. Make sure that you disable also all firewall and antivirus when you perform the clean boot.

    How to troubleshoot a problem by performing a clean boot in Windows Vista or in Windows 7
    http://support.Microsoft.com/kb/929135
    http://Windows.Microsoft.com/en-us/Windows7/disable-antivirus-software
    Note: Microsoft does not recommend that you disable the antivirus protection in most conditions. Disable the antivirus protection that temporarily to restore a computer.
    Note:
    follow step 7 clean boot KB929135 article to reset the computer in normal mode.

    Method 2
    I suggest you run virus scan online by using the Microsoft safety scanner.

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    Note: when you do an antivirus online, you will lose data that are affected by the virus. Microsoft is not responsible for the loss of this data.

    Method 3
    I suggest you to create the new user account and check if the problem persists.

    Create a user account
    http://Windows.Microsoft.com/en-in/Windows7/create-a-user-account

    If everything works well in the new user account, then I suggest you to transfer data and settings to the fixed aid corrupt profile.

    Difficulty of a corrupted user profile
    http://Windows.Microsoft.com/en-in/Windows7/fix-a-corrupted-user-profile

Maybe you are looking for