inside the user initiates the connection to the vpn user

Hi, couldn't solve this problem:

I have to the customer. A and B.

Connected via VPN for remote access and the applied filter A

B is inside the user connected inside interface with sec - lvl 100.

For example,.

Pings B A but without success

B connect A, but without success

I know of sec - lvl 100 all the conn is allowed and ASA allows a connection established to the rear. Why B is not allowed at a.

(after adding the ACL to allow b to A, I've been successful)

First of all, security levels don't matter when it comes to traffic-vpn - all traffic in both directions is allowed without restriction as long as sysopt-permit vpn connection is present in the config (default).

Secondly, when you applied the filter-vpn functionality, ACL works for traffic in both directions, i.e. you explicitly allow traffic in both directions in this single ACL.

These vpn filter ACL is a little special ACL, cause it is written from the perspective of the (client) remote site, but should include entries for both directions. You can take a look here (or elsewhere)) on how it works:

http://popravak.WordPress.com/2011/11/05/Cisco-ASA-VPN-filter-as-i-see-it/

Tags: Cisco Security

Similar Questions

  • Cannot ping inside the vpn client hosts. It's a NAT problem

    Hello everyone, I'm running into what seems to be a cause of exclusion with an IOS IPSEC VPN NAT/nat. I can connect to the VPN with cisco IPSEC VPN client, and I am able to authenticate. Once I have authenticate, I'm not able to reach one of the guests inside. Below is my relevant config. Any help would be greatly appreciated.

    AAA new-model

    !

    !

    AAA authentication login default local

    radius of group AAA authentication login userauthen

    AAA authorization exec default local

    AAA authorization groupauthor LAN

    crypto ISAKMP policy 3

    BA 3des

    preshared authentication

    Group 2

    !

    ISAKMP crypto client configuration group businessVPN

    key xxxxxx

    DNS 192.168.10.2

    business.local field

    pool vpnpool

    ACL 108

    Crypto isakmp VPNclient profile

    businessVPN group identity match

    client authentication list userauthen

    ISAKMP authorization list groupauthor

    client configuration address respond

    !

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT

    !

    Crypto-map dynamic dynmap 10

    Set transform-set RIGHT

    Define VPNclient isakmp-profile

    market arriere-route

    !

    !

    10 ipsec-isakmp crypto map clientmap Dynamics dynmap

    interface Loopback0

    IP 10.1.10.2 255.255.255.252

    no ip redirection

    no ip unreachable

    no ip proxy-arp

    IP virtual-reassembly

    !

    Null0 interface

    no ip unreachable

    !

    interface FastEthernet0/0

    IP 111.111.111.138 255.255.255.252

    IP access-group outside_in in

    no ip redirection

    no ip unreachable

    no ip proxy-arp

    NAT outside IP

    inspect the outgoing IP outside

    IP virtual-reassembly

    automatic duplex

    automatic speed

    clientmap card crypto

    !

    the integrated-Service-Engine0/0 interface

    description Locator is initialized with default IMAP group

    IP unnumbered Loopback0

    no ip redirection

    no ip unreachable

    no ip proxy-arp

    IP virtual-reassembly

    ip address of service-module 10.1.10.1 255.255.255.252

    Service-module ip default gateway - 10.1.10.2

    interface BVI1

    IP 192.168.10.1 255.255.255.0

    no ip redirection

    no ip unreachable

    no ip proxy-arp

    IP nat inside

    IP virtual-reassembly

    IP nat inside source static tcp 192.168.10.2 25 interface FastEthernet0/0 25

    IP nat inside source static tcp 192.168.10.2 443 interface FastEthernet0/0 443

    IP nat inside source static tcp 192.168.10.2 3389 interface FastEthernet0/0 3389

    IP nat inside source map route nat interface FastEthernet0/0 overload

    nat extended IP access list

    deny ip 192.168.10.0 0.0.0.255 192.168.109.0 0.0.0.255

    refuse the 10.1.1.0 ip 0.0.0.255 192.168.109.0 0.0.0.255

    ip licensing 10.1.1.0 0.0.0.255 any

    permit ip 192.168.10.0 0.0.0.255 any

    sheep extended IP access list

    permit ip 192.168.10.0 0.0.0.255 192.168.109.0 0.0.0.255

    ip permit 10.1.10.0 0.0.0.255 192.168.109.0 0.0.0.255

    ip licensing 10.1.1.0 0.0.0.255 192.168.109.0 0.0.0.255

    outside_in extended IP access list

    permit tcp object-group Yes_SMTP host 111.111.111.138 eq smtp

    permit any any eq 443 tcp

    permit tcp 20.20.20.96 0.0.0.31 host 111.111.111.138 eq 3389

    permit tcp 20.20.20.96 0.0.0.31 host 111.111.111.138 eq 22

    allow any host 111.111.111.138 esp

    allow any host 111.111.111.138 eq isakmp udp

    allow any host 111.111.111.138 eq non500-isakmp udp

    allow any host 111.111.111.138 ahp

    allow accord any host 111.111.111.138

    access-list 108 allow ip 192.168.109.0 0.0.0.255 192.168.10.0 0.0.0.255

    access-list 108 allow ip 192.168.109.0 0.0.0.255 10.1.1.0 0.0.0.255

    access-list 108 allow ip 192.168.109.0 0.0.0.255 10.1.10.0 0.0.0.255

    !

    !

    !

    !

    route nat allowed 10 map

    match ip address nat

    1 channel ip bridge

    In my view, the acl applied to customer is back. It must allow traffic from the internal network to the pool of customers.

    To confirm, you can open the Cisco VPN client statistics (after login) then go in the route Details tab. We should see the networks you should be able to reach the customer. Make sure that the good ones are here.

    Kind regards

  • ASA problem inside the VPN client routing

    Hello

    I have a problem where I can't reach the VPN clients with their vpn IP pool from the inside or the asa itself. Connect VPN clients can access internal network very well. I have no nat configured for the pool of vpn and packet trace crypt packages and puts it into the tunnel. I'm not sure what's wrong.

    Here are a few relevant config:

    network object obj - 192.168.245.0

    192.168.245.0 subnet 255.255.255.0

    192.168.245.1 - 192.168.245.50 vpn IP local pool

    NAT (inside, outside) static source any any destination static obj - 192.168.245.0 obj - 192.168.245.0 no-proxy-arp-search to itinerary

    Out of Packet trace:

    Firewall # entry packet - trace inside the x.x.x.x icmp 8 0 192.168.245.33

    Phase: 1

    Type: ACCESS-LIST

    Subtype:

    Result: ALLOW

    Config:

    Implicit rule

    Additional information:

    MAC access list

    Phase: 2

    Type:-ROUTE SEARCH

    Subtype: entry

    Result: ALLOW

    Config:

    Additional information:

    in 192.168.245.33 255.255.255.255 outside

    Phase: 3

    Type: ACCESS-LIST

    Subtype: Journal

    Result: ALLOW

    Config:

    Access-group acl-Interior interface inside

    access list acl-Interior extended icmp permitted an echo

    Additional information:

    Phase: 4

    Type: IP-OPTIONS

    Subtype:

    Result: ALLOW

    Config:

    Additional information:

    Phase: 5

    Type: INSPECT

    Subtype: np - inspect

    Result: ALLOW

    Config:

    Additional information:

    Phase: 6

    Type:

    Subtype:

    Result: ALLOW

    Config:

    Additional information:

    Phase: 7

    Type: NAT

    Subtype:

    Result: ALLOW

    Config:

    NAT (inside, outside) static source any any destination static obj - 192.168.245.0

    obj - 192.168.245.0 no-proxy-arp-search to itinerary

    Additional information:

    Definition of static 0/x.x.x.x-x.x.x.x/0

    Phase: 8

    Type: VPN

    Subtype: encrypt

    Result: ALLOW

    Config:

    Additional information:

    Phase: 9

    Type: CREATING STREAMS

    Subtype:

    Result: ALLOW

    Config:

    Additional information:

    New workflow created with the 277723432 id, package sent to the next module

    Result:

    input interface: inside

    entry status: to the top

    entry-line-status: to the top

    output interface: outside

    the status of the output: to the top

    output-line-status: to the top

    Action: allow

    There is no route to the address pool of vpn. Maybe that's the problem? I don't know than that used to work before we went to 8.4.

    Check if the firewall is enabled on your host from the client ravpn and blocking your pings.

  • Cisco ASA 5515 - Anyconnect users can connect to ASA, but cannot ping inside the local IP address

    Hello!

    I have a 5515 ASA with the configuration below. I have configure the ASA as remote access with anyconnect VPN server, now my problem is that I can connect but I can not ping.

    ASA Version 9.1 (1)

    !

    ASA host name

    domain xxx.xx

    names of

    local pool VPN_CLIENT_POOL 192.168.12.1 - 192.168.12.254 255.255.255.0 IP mask

    !

    interface GigabitEthernet0/0

    nameif inside

    security-level 100

    192.168.11.1 IP address 255.255.255.0

    !

    interface GigabitEthernet0/1

    Description Interface_to_VPN

    nameif outside

    security-level 0

    IP 111.222.333.444 255.255.255.240

    !

    interface GigabitEthernet0/2

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface GigabitEthernet0/3

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface GigabitEthernet0/4

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface GigabitEthernet0/5

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface Management0/0

    management only

    nameif management

    security-level 100

    192.168.5.1 IP address 255.255.255.0

    !

    passive FTP mode

    DNS server-group DefaultDNS

    www.ww domain name

    permit same-security-traffic intra-interface

    the object of the LAN network

    subnet 192.168.11.0 255.255.255.0

    LAN description

    network of the SSLVPN_POOL object

    255.255.255.0 subnet 192.168.12.0

    VPN_CLIENT_ACL list standard access allowed 192.168.11.0 255.255.255.0

    pager lines 24

    Enable logging

    asdm of logging of information

    Within 1500 MTU

    Outside 1500 MTU

    management of MTU 1500

    no failover

    ICMP unreachable rate-limit 1 burst-size 1

    ASDM image disk0: / asdm - 711.bin

    don't allow no asdm history

    ARP timeout 14400

    no permit-nonconnected arp

    NAT (exterior, Interior) static source SSLVPN_POOL SSLVPN_POOL static destination LAN LAN

    Route outside 0.0.0.0 0.0.0.0 111.222.333.443 1

    Timeout xlate 03:00

    Pat-xlate timeout 0:00:30

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    WebVPN

    list of URLS no

    identity of the user by default-domain LOCAL

    the ssh LOCAL console AAA authentication

    AAA authentication http LOCAL console

    LOCAL AAA authorization exec

    Enable http server

    http 192.168.5.0 255.255.255.0 management

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start

    Crypto ipsec pmtu aging infinite - the security association

    Crypto ca trustpoint ASDM_TrustPoint5

    Terminal registration

    E-mail [email protected] / * /

    name of the object CN = ASA

    address-IP 111.222.333.444

    Configure CRL

    Crypto ca trustpoint ASDM_TrustPoint6

    Terminal registration

    domain name full vpn.domain.com

    E-mail [email protected] / * /

    name of the object CN = vpn.domain.com

    address-IP 111.222.333.444

    pair of keys sslvpn

    Configure CRL

    trustpool crypto ca policy

    string encryption ca ASDM_TrustPoint6 certificates

    Telnet timeout 5

    SSH 192.168.11.0 255.255.255.0 inside

    SSH timeout 30

    Console timeout 0

    No ipv6-vpn-addr-assign aaa

    no local ipv6-vpn-addr-assign

    192.168.5.2 management - dhcpd addresses 192.168.5.254

    !

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    SSL-trust outside ASDM_TrustPoint6 point

    WebVPN

    allow outside

    CSD image disk0:/csd_3.5.2008-k9.pkg

    AnyConnect image disk0:/anyconnect-win-3.1.04066-k9.pkg 1

    AnyConnect enable

    tunnel-group-list activate

    attributes of Group Policy DfltGrpPolicy

    Ikev1 VPN-tunnel-Protocol l2tp ipsec without ssl-client

    internal VPN_CLIENT_POLICY group policy

    VPN_CLIENT_POLICY group policy attributes

    WINS server no

    value of server DNS 192.168.11.198

    VPN - 5 concurrent connections

    VPN-session-timeout 480

    client ssl-VPN-tunnel-Protocol

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list VPN_CLIENT_ACL

    myComp.local value by default-field

    the address value VPN_CLIENT_POOL pools

    WebVPN

    activate AnyConnect ssl dtls

    AnyConnect Dungeon-Installer installed

    AnyConnect ssl keepalive 20

    time to generate a new key 30 AnyConnect ssl

    AnyConnect ssl generate a new method ssl key

    AnyConnect client of dpd-interval 30

    dpd-interval gateway AnyConnect 30

    AnyConnect dtls lzs compression

    AnyConnect modules value vpngina

    value of customization DfltCustomization

    internal IT_POLICY group policy

    IT_POLICY group policy attributes

    WINS server no

    value of server DNS 192.168.11.198

    VPN - connections 3

    VPN-session-timeout 120

    Protocol-tunnel-VPN-client ssl clientless ssl

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list VPN_CLIENT_ACL

    field default value societe.com

    the address value VPN_CLIENT_POOL pools

    WebVPN

    activate AnyConnect ssl dtls

    AnyConnect Dungeon-Installer installed

    AnyConnect ssl keepalive 20

    AnyConnect dtls lzs compression

    value of customization DfltCustomization

    username vpnuser password PA$ encrypted $WORD

    vpnuser username attributes

    VPN-group-policy VPN_CLIENT_POLICY

    type of remote access service

    Username vpnuser2 password PA$ encrypted $W

    username vpnuser2 attributes

    type of remote access service

    username admin password ADMINPA$ $ encrypted privilege 15

    VPN Tunnel-group type remote access

    General-attributes of VPN Tunnel-group

    address VPN_CLIENT_POOL pool

    Group Policy - by default-VPN_CLIENT_POLICY

    VPN Tunnel-group webvpn-attributes

    the aaa authentication certificate

    enable VPN_to_R group-alias

    type tunnel-group IT_PROFILE remote access

    attributes global-tunnel-group IT_PROFILE

    address VPN_CLIENT_POOL pool

    Group Policy - by default-IT_POLICY

    tunnel-group IT_PROFILE webvpn-attributes

    the aaa authentication certificate

    enable IT Group-alias

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    Review the ip options

    inspect the icmp

    !

    global service-policy global_policy

    context of prompt hostname

    no remote anonymous reporting call

    : end

    Help me please! Thank you!

    Hello

    Please set ACLs to allow ICMP between these two subnets (192.168.11.0 and 192.168.12.0) and check. It should ping. Let me know if it does not work.

    Thank you

    swap

  • Run the script inside the virtual machine the user when the user connects or reconnects

    Hello

    is it possible to detect the user that the user has connected or reconnected to his office inside the virtual machine and run a script?

    It is also possible within the VM user to determine if the user is connected and how long?

    One way to do this is via the following powershell command, but this only works if the user is connected through PCoIP Protocol.

    Get-WmiObject-class Win32_PerfRawData_TeradiciPerf_PCoIPSessionGeneralStatistics - SessionDurationSeconds property

    Best regards

    > it is possible to detect the user that the user has connected either reconnected to his office inside the virtual machine and run a script?

    You can run scripts as user on login and reconnect, this has been a feature since 3.0. See running commands on the desktop view.

    > It is possible inside the VM user to determine if the user is connected and how long?

    I don't think that we expose, but you should be able to query Windows for the connection time, or you could write the last time to connect with a script (maybe that is the reason for your first question?).

    Mike

  • ASA 5515 - Anyconnect - inside the subnet connection problem

    Hi all

    I have a problem with the connection to the Interior/subnet using Anyconnect SSL VPN.

    ASA worm. 5515

    Please find below of configuration:

    User access audit

    ASA1 # show running-config
    : Saved
    :
    ASA 9.1 Version 2
    !
    hostname ASA1
    activate 8Ry2YjIyt7RRXU24 encrypted password
    volatile xlate deny tcp any4 any4
    volatile xlate deny tcp any4 any6
    volatile xlate deny tcp any6 any4
    volatile xlate deny tcp any6 any6
    volatile xlate deny udp any4 any4 eq field
    volatile xlate deny udp any4 any6 eq field
    volatile xlate deny udp any6 any4 eq field
    volatile xlate deny udp any6 any6 eq field
    2KFQnbNIdI.2KYOU encrypted passwd
    names of
    mask of local pool swimming POOLS-for-AnyConnect 10.0.70.1 - 10.0.70.50 IP 255.255.255.0
    !
    interface GigabitEthernet0/0
    nameif outside
    security-level 0
    address IP A.A.A.A 255.255.255.240
    !
    interface GigabitEthernet0/1
    nameif inside
    security-level 100
    192.168.64.1 IP address 255.255.255.0
    !
    interface GigabitEthernet0/2
    nameif dmz
    security-level 20
    address IP B.B.B.B 255.255.255.0
    !
    interface GigabitEthernet0/3
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface GigabitEthernet0/4
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface GigabitEthernet0/5
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Management0/0
    management only
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    passive FTP mode
    network of the OBJ_GENERIC_ALL object
    subnet 0.0.0.0 0.0.0.0
    network outside_to_inside_FR-Appsrv01 object
    Home 192.168.64.232
    network outside_to_dmz_fr-websvr-uat object
    Home 10.20.20.14
    network inside_to_dmz object
    192.168.64.0 subnet 255.255.255.0
    gtc-tomcat network object
    Home 192.168.64.228
    network of the USA-Appsrv01-UAT object
    Home 192.168.64.223
    network of the USA-Websvr-UAT object
    Home 10.20.20.13
    network vpn_to_inside object
    10.0.70.0 subnet 255.255.255.0
    extended access list acl_out permit everything all unreachable icmp
    acl_out list extended access permit icmp any any echo response
    acl_out list extended access permit icmp any one time exceed
    acl_out list extended access permit tcp any object outside_to_inside_FR-Appsrv01 eq 3389
    acl_out list extended access permit tcp any object outside_to_inside_FR-Appsrv01 eq 28080
    acl_out list extended access permit tcp any object outside_to_inside_FR-Appsrv01 eq 9876
    acl_out list extended access permit udp any object outside_to_inside_FR-Appsrv01 eq 1720
    acl_out list extended access permit tcp any object outside_to_dmz_fr-websvr-uat eq www
    acl_out list extended access permit tcp any object outside_to_dmz_fr-websvr-uat eq https
    acl_out list extended access permit tcp any object outside_to_dmz_fr-websvr-uat eq 3389
    acl_out list extended access permit tcp any object USA-Appsrv01-UAT eq 9876
    acl_out list extended access permit udp any eq USA-Appsrv01-UAT object 1720
    acl_out list extended access permit tcp any object USA-Websvr-UAT eq www
    acl_out list extended access permit tcp any USA-Websvr-UAT eq https object
    acl_out list extended access permit tcp any object USA-Websvr-UAT eq 3389
    acl_out list extended access permit tcp any object USA-Appsrv01-UAT eq 3389
    acl_dmz list extended access permit icmp any any echo response
    acl_dmz of access allowed any ip an extended list
    acl_dmz list extended access permitted tcp object object to outside_to_dmz_fr-websvr-uat gtc-tomcat eq 8080
    acl_dmz list extended access permitted tcp object object to outside_to_dmz_fr-websvr-uat gtc-tomcat eq 8081
    acl_dmz list extended access permitted tcp object object to outside_to_dmz_fr-websvr-uat gtc-tomcat eq 3389
    acl_dmz list extended access permitted tcp object USA-Websvr-UAT object USA-Appsrv01-UAT eq 8080
    acl_dmz list extended access permitted tcp object USA-Websvr-UAT object USA-Appsrv01-UAT eq 8081
    access extensive list ip 192.168.64.0 gtcvpn2 allow 255.255.255.0 10.0.70.0 255.255.255.0
    pager lines 24
    Outside 1500 MTU
    Within 1500 MTU
    MTU 1500 dmz
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    no permit-nonconnected arp
    NAT dynamic interface of OBJ_GENERIC_ALL source (indoor, outdoor)
    NAT (inside, outside) static source all all static destination vpn_to_inside vpn_to_inside
    !
    network outside_to_inside_FR-Appsrv01 object
    NAT static x.x.x.x (indoor, outdoor)
    network outside_to_dmz_fr-websvr-uat object
    NAT (dmz, outside) static x.x.x.x
    network of the USA-Appsrv01-UAT object
    NAT static x.x.x.x (indoor, outdoor)
    network of the USA-Websvr-UAT object
    NAT (dmz, outside) static x.x.x.x
    Access-group acl_out in interface outside
    Access-group acl_dmz in dmz interface
    Route outside 0.0.0.0 0.0.0.0 B.B.B.B 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    identity of the user by default-domain LOCAL
    Enable http server
    http 192.168.64.204 255.255.255.255 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
    Crypto ipsec pmtu aging infinite - the security association
    Crypto ca trustpoint ASDM_TrustPoint0
    registration auto
    name of the object CN = ASA1
    GTCVPN2 key pair
    Configure CRL
    trustpool crypto ca policy
    string encryption ca ASDM_TrustPoint0 certificates
    certificate of 19897d 54
    308201cf 30820138 a0030201 02020419 897d 864886f7 0d 010105 5430 0d06092a
    0500302c 3111300f 06035504 03130851 57455354 32343031 17301506 092a 8648
    09021608 51574553 54323430 31343132 30333034 30333237 301e170d 86f70d01
    5a170d32 34313133 30303430 3332375a 302 c 3111 55040313 08515745 300f0603
    53543234 30311730 1506092a 864886f7 010902 16085157 45535432 34303081 0d
    9f300d06 092 has 8648 86f70d01 01010500 03818d 00 30818902 818100a 2 5e873d21
    dfa7cc00 ee438d1d bc400dc5 220f2dc4 aa896be4 39843044 d0521010 88 has 24454
    b4b1f345 84ec0ad3 cac13d47 a71f367a 2e71f5fc 0a9bd55f 05d 75648 72bfb9e9
    c5379753 26ec523d f2cbc438 d234616f a71e4f4f 42f39dde e4b99020 cfcd00ad
    73162ab8 1af6b6f5 fa1b47c6 d261db8b 4a75b249 60556102 03010001 fa3fbe7c
    300 d 0609 2a 864886 f70d0101 8181007a 05050003 be791b64 a9f0df8f 982d162d
    b7c884c1 eb183711 05d676d7 2585486e 5cdd23b9 af774a8f 9623e91a b3d85f10
    af85c009 9590c0b3 401cec03 4dccf99a f1ee8c01 1e6f0f3a 6516579c 12d9cbab
    59fcead4 63baf64b 7adece49 7799f94c 1865ce1d 2c0f3ced e65fefdc a784dc50
    350e8ba2 998f3820 e6370ae5 7e6c543b 6c1ced
    quit smoking
    Telnet 192.168.64.200 255.255.255.255 inside
    Telnet 192.168.64.169 255.255.255.255 inside
    Telnet 192.168.64.190 255.255.255.255 inside
    Telnet 192.168.64.199 255.255.255.255 inside
    Telnet timeout 5
    SSH timeout 5
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    SSL-trust ASDM_TrustPoint0 inside point
    SSL-trust outside ASDM_TrustPoint0 point
    WebVPN
    allow outside
    AnyConnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
    AnyConnect enable
    tunnel-group-list activate
    internal GroupPolicy_GTCVPN2 group strategy
    attributes of Group Policy GroupPolicy_GTCVPN2
    WINS server no
    value of 192.168.64.202 DNS server 192.168.64.201
    client ssl-VPN-tunnel-Protocol
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list gtcvpn2
    field default value mondomaine.fr
    username cHoYQ5ZzE4HJyyq password of duncan / encrypted
    username Aosl50Zig4zLZm4 admin password / encrypted
    password encrypted sebol U7rG3kt653p8ctAz user name
    type tunnel-group GTCVPN2 remote access
    attributes global-tunnel-group GTCVPN2
    Swimming POOLS-for-AnyConnect address pool
    Group Policy - by default-GroupPolicy_GTCVPN2
    tunnel-group GTCVPN2 webvpn-attributes
    enable GTCVPN2 group-alias
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    Review the ip options
    inspect the netbios
    inspect the rsh
    inspect the rtsp
    inspect the skinny
    inspect esmtp
    inspect sqlnet
    inspect sunrpc
    inspect the tftp
    inspect the sip
    inspect xdmcp
    !
    global service-policy global_policy
    context of prompt hostname
    no remote anonymous reporting call
    call-home
    Profile of CiscoTAC-1
    no active account
    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
    email address of destination [email protected] / * /
    destination-mode http transport
    Subscribe to alert-group diagnosis
    Subscribe to alert-group environment
    Subscribe to alert-group monthly periodic inventory 19
    Subscribe to alert-group configuration periodic monthly 19
    daily periodic subscribe to alert-group telemetry
    Cryptochecksum:0b972b3b751b59085bc2bbbb6b0c2281
    : end
    ASA1 #.

    I can connect to the ASA from outside with the Anyconnect client, split tunneling works well unfortunately I can't ping anything inside the network, VPN subnet: 255.255.255.0, inside the 192.168.64.x 255.255.255.0 subnet 10.0.70.x

    When connecting from the outside, cisco anyconnect is showing 192.168.64.0/24 in the tab "details of the trip.

    Do you know if I'm missing something? (internal subnet to subnet route vpn?)

    Thank you

    Use your internal subnet ASA as its default gateway? If this isn't the case, it will take a route pointing to the ASA inside the interface.

    You can perform a packet - trace as:

    Packet-trace entry inside tcp 192.168.64.2 80 10.0.70.1 1025

    (simulation of traffic back from a web server inside a VPN client)

  • ASA 5512 Anyconnect VPN cannot connect inside the network 9.1 x

    Hello

    I'm new to ASA, can I please help with this. I managed to connect to the vpn through the mobility cisco anyconnect client, but I am unable to connect to the Internet. the allocated ip address was 172.16.1.60 and it seems OK, I thought my acl and nat is configured to allow and translate the given vpn ip pool but I'm not able to ping anything on the inside.

    If anyone can share some light... There's got to be something escapes me...

    Here's my sh run

    Thank you

    Raul

    -------------------------------------------------------------------------------

    DLSYD - ASA # sh run

    : Saved
    :
    ASA 9.1 Version 2
    !
    hostname DLSYD - ASA
    domain delo.local
    activate the encrypted password of UszxwHyGcg.e6o4z
    names of
    mask 172.16.1.60 - 172.16.1.70 255.255.255.0 IP local pool DLVPN_Pool
    !
    interface GigabitEthernet0/0
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface GigabitEthernet0/1
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface GigabitEthernet0/2
    Post description
    10 speed
    full duplex
    nameif Ext
    security-level 0
    IP 125.255.160.54 255.255.255.252
    !
    interface GigabitEthernet0/3
    Description Int
    10 speed
    full duplex
    nameif Int
    security-level 100
    IP 192.168.255.2 255.255.255.252
    !
    interface GigabitEthernet0/4
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface GigabitEthernet0/5
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Management0/0
    management only
    nameif management
    security-level 100
    IP 192.168.1.1 255.255.255.0
    !
    boot system Disk0: / asa912-smp - k8.bin
    passive FTP mode
    clock timezone IS 10
    clock daylight saving time EDT recurring last Sun Oct 02:00 last Sun Mar 03:00
    DNS lookup field inside
    DNS domain-lookup Int
    DNS server-group DefaultDNS
    192.168.1.90 server name
    192.168.1.202 server name
    domain delo.local
    permit same-security-traffic intra-interface
    network dlau40 object
    Home 192.168.1.209
    network dlausyd02 object
    host 192.168.1.202
    network of the object 192.168.1.42
    host 192.168.1.42
    dlau-utm network object
    host 192.168.1.50
    network dlauxa6 object
    Home 192.168.1.62
    network of the 192.168.1.93 object
    host 192.168.1.93
    network dlau-ftp01 object
    Home 192.168.1.112
    dlau-dlau-ftp01 network object
    network dlvpn_network object
    subnet 172.16.1.0 255.255.255.0
    the object-group Good-ICMP ICMP-type
    echo ICMP-object
    response to echo ICMP-object
    ICMP-object has exceeded the time
    Object-ICMP traceroute
    ICMP-unreachable object
    DLVPN_STAcl list standard access allowed 192.168.0.0 255.255.0.0
    Standard access list DLVPN_STAcl allow 196.1.1.0 255.255.255.0
    DLVPN_STAcl list standard access allowed 126.0.0.0 255.255.0.0
    Ext_access_in access list extended icmp permitted any object-group Good-ICMP
    Ext_access_in list extended access permitted tcp dlau-ftp01 eq ftp objects
    Ext_access_in list extended access permit tcp any object dlausyd02 eq https
    Ext_access_in list extended access permit tcp any object dlau-utm eq smtp
    Ext_access_in list extended access permit tcp any object dlauxa6 eq 444
    Ext_access_in access-list extended permitted ip object annete-home everything
    pager lines 24
    Enable logging
    asdm of logging of information
    MTU 1500 Ext
    MTU 1500 Int
    management of MTU 1500
    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image disk0: / asdm - 713.bin
    don't allow no asdm history
    ARP timeout 14400
    no permit-nonconnected arp
    NAT (Int, Ext) static source any any destination static dlvpn_network dlvpn_network non-proxy-arp
    !
    network dlausyd02 object
    NAT (Int, Ext) interface static tcp https https service
    dlau-utm network object
    NAT (Int, Ext) interface static tcp smtp smtp service
    network dlauxa6 object
    NAT (Int, Ext) interface static tcp 444 444 service
    network dlau-ftp01 object
    NAT (Int, Ext) interface static tcp ftp ftp service
    Access-group Ext_access_in in Ext interface
    Route Ext 0.0.0.0 0.0.0.0 125.255.160.53 1
    Route Int 192.168.0.0 255.255.0.0 192.168.255.1 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    identity of the user by default-domain LOCAL
    AAA authentication enable LOCAL console
    AAA authentication LOCAL telnet console
    AAA authentication http LOCAL console
    LOCAL AAA authentication serial console
    the ssh LOCAL console AAA authentication
    http server enable 44310
    http server idle-timeout 30
    http 192.168.0.0 255.255.0.0 Int
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
    Crypto ipsec pmtu aging infinite - the security association
    trustpool crypto ca policy
    Telnet 192.168.1.0 255.255.255.0 management
    Telnet timeout 30
    SSH 192.168.0.0 255.255.0.0 Int
    SSH timeout 30
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    No ipv6-vpn-addr-assign aaa
    no local ipv6-vpn-addr-assign
    management of 192.168.1.2 - dhcpd address 192.168.1.254
    enable dhcpd management
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    NTP server 61.8.0.89 prefer external source
    SSL encryption rc4-aes128-sha1 aes256-3des-sha1 sha1 sha1
    WebVPN
    port 44320
    allow outside
    Select Ext
    AnyConnect essentials
    AnyConnect image disk0:/anyconnect-win-3.1.05170-k9.pkg 1
    AnyConnect enable
    tunnel-group-list activate
    internal GroupPolicy_DLVPN group strategy
    attributes of Group Policy GroupPolicy_DLVPN
    WINS server no
    value of server DNS 192.168.1.90 192.168.1.202
    client ssl-VPN-tunnel-Protocol
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list DLVPN_STAcl
    delonghi.local value by default-field
    WebVPN
    AnyConnect Dungeon-Installer installed
    time to generate a new key 30 AnyConnect ssl
    AnyConnect ssl generate a new method ssl key
    AnyConnect ask flawless anyconnect
    encrypted vendor_ipfx pb6/6ZHhaPgDKSHn password username
    vendor_pacnet mIHuYi1jcf9OqVN9 encrypted password username
    username admin password encrypted tFU2y7Uo15ahFyt4
    type tunnel-group DLVPN remote access
    attributes global-tunnel-group DLVPN
    address pool DLVPN_Pool
    Group Policy - by default-GroupPolicy_DLVPN
    tunnel-group DLVPN webvpn-attributes
    enable DLVPN group-alias
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the netbios
    Review the ip options
    inspect the ftp
    inspect the tftp
    !
    global service-policy global_policy
    SMTPS
    Server 192.168.1.50
    Group Policy - by default-DfltGrpPolicy
    context of prompt hostname
    no remote anonymous reporting call
    Cryptochecksum:67aa840d5cfff989bc045172b2d06212
    : end
    DLSYD - ASA #.

    Hello

    Add just to be sure, the following configurations related to ICMP traffic

    Policy-map global_policy
    class inspection_default
    inspect the icmp
    inspect the icmp error

    Your NAT0 configurations for traffic between LAN and VPN users seem to. Your Split Tunnel ACL seems fine too because it has included 192.168.0.0/16. I don't know what are the other.

    I wonder if this is a test installation since you don't seem to have a dynamic PAT configured for your local network at all. Just a few static PAT and the NAT0 for VPN configurations. If it is a test configuration yet then confirmed that the device behind the ASA in the internal network has a default route pointing to the ASAs interface and if so is it properly configured?

    Can you same ICMP the directly behind the ASA which is the gateway to LANs?

    If you want to try ICMP interface internal to the VPN ASA then you can add this command and then try ICMP to the internal interface of the ASA

    Int Management-access

    As the post is a little confusing in the sense that the subject talk on the traffic doesn't work not internal to the network, while the message mentions the traffic to the Internet? I guess you meant only traffic to the local network because you use Split Tunnel VPN, which means that Internet traffic should use the VPN local Internet users while traffic to the networks specified in the ACL Tunnel Split list should be sent to the VPN.

    -Jouni

  • PIX 515E (7.0.1) - problem with the VPN connection between inside and outside

    Hello

    I ve creates a VLAN on the pix.

    In this VLAN, users are allowed to connect only to the Internet. Everything is fine, but when trying to connect with his VPN Client to their company, it has problems... (Outside traffic flow, but no traffic came back.)

    Is the only solution for this problem to create a Pool of Nat with public ip addresses, one to one mapping, or is there another solution with a public IP address (NAT on PAT) possible for this problem?

    Thanks for your replies.

    D.

    The problem is that the esp is an IP Protocol, so PAT will not work in this scenario. When the return traffic returns to pix he doesn't know how to get to the inside host. The only way to do this is by adding a static nat (1 to 1 mapping) and create a rule to allow esp. Is what type of vpn client? Microsoft vpn? Cisco vpn? If cisco VPN, perhaps, they can use NAT - T on the vpn that overcomes the question PAT by encapsulating ipsec within UDP packets. You need to talk to the admin VPN and itself it allow.

    -kevin

  • RRAS issues! -Unable to connect to the VPN users,

    original title: RRAS issues!

    Hi all, I have some real issues with my RRAS VPN. All of a sudden the users are randomly cannot connect to the VPN. Making mistakes like 619 800 and so on. I activated the GRE (once the problem starts) checked to see if the 1723 port is open. Why is this happening now?

    I use DynDns host name and everything seems fine, fact that there are enough ports available to PPTP on the RRAS.

    I am running Windows 2003 SBS SP2

    Router is a MAKO 6861 with a normal ADSL line

    I see this in the PPP.log:

    [8128] 06-04 10:27:27:794: Recv timeout event received for portid = 288, Id = 5, Protocol c021, fAuth = 0 =
    [8128] 06-04 10:27:27:794:
    [8128] 06-04 10:27:27:794:
    [8128] 10:27:27:794:
    [8128] 10:27:27:794: <06 57="" eb="" 0d="" 3e="" 07="" 02="" 08="" 02="" 0d="" 03="" 06="" 11="" 04="" 06="" 4e="" |.w..="">... N |
    [8128] 10:27:27:794:<13 17="" 01="" b0="" 09="" a5="" e1="" 15="" e6="" 49="" 4f="" 85="" fb="" 7c="" a0="" 15="">
    [8128] 10:27:27:794:

    And some of this:

    [8128] 06-04 10:27:43:325: line before the end event occurred on port 138
    [8128] 10:27:43:325 06-04: FsmDown event is received for Protocol c021 on port 138
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 9, Protocol is c021, EventType = 0, = 0 fAuth
    [8128] 10:27:43:325 06-04: FsmReset called Protocol c021, port = 138 =
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, = 0 protocol, EventType = 3, fAuth = 0
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, = 0 protocol, EventType = 7, fAuth = 0
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, = 0 protocol, EventType = 2, fAuth = 0
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, = 0 protocol, EventType = 1, = 0 fAuth
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, = 0 protocol, EventType = 4, = 0 fAuth
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, Protocol is c029, EventType = 0, = 0 fAuth
    [8128] 06-04 10:27:43:325: LcpEnd
    [8128] 06-04 10:27:43:325: line Post event took place on the port 138
    [8128] 06-04 10:27:43:325: NotifyCaller (hPort = 138, dwMsgId = 23)
    [8128] 06-04 10:27:48:043: line-up event took place on the port 138
    [8128] 06-04 10:27:48:043: PortName: VPN3-19
    [8128] 06-04 10:27:48:043: from PPP link with IfType = 0x0, 1p1f = 0 x 0, IPXIf = 0 x 0
    [8128] 10:27:48:043 06-04: RasGetBuffer returned 58 c 2148 to SendBuf
    [8128] 10:27:48:043 06-04: FsmInit called Protocol c021, port = 138 =
    [8128] 06-04 10:27:48:043: ConfigInfo = 80260
    [8128] 06-04 10:27:48:043: available APs = 2
    [8128] 10:27:48:043 06-04: FsmReset called Protocol c021, port = 138 =

    Hello

    Your question of Windows Server is more complex than what is generally answered in the Microsoft Answers forums. It is better suited for the IT Pro TechNet public.

    Please ask your question in the Technet Windows Server General category.
    http://social.technet.Microsoft.com/forums/en-us/winservergen/threads

  • SRA 4600 - users to limit who can connect to the VPN

    We have a SRA 4600 and wishes to restrict access to the VPN to only a handful of our users active directory.  that is when they visit the Web page for the SRA and try to logon, once that they connection they told you they have VPN access.  That, or else they are simply limited to be able to open a session.

    How we would accomplish this?

    Since you are using AD, you can create local groups on your device and then restrict access to specific ad groups.  The way I work is that a domain has several groups assigned to him, and whenever someone logs in, they show some bookmarks are in the group that they have access to (Yes, it works if you are in more than one group).

    If you don't want people to connect at all, make sure that they are not member of the ad groups that access.

    You can find the setting under user-> groups-> Edit-> ad groups.  This tab appears only if the group is assigned to an AD domain (under portals-> fields).

    NetExtender may be restricted in the same way - just make it is available only for groups you want to have.

  • connections of RAW socket to the server inside the corporate network

    Hello!

    I have not found any documentation anywhere elsewhere I hope someone can help out me.

    o know for ftp/http there are a proxy that is used in the scope of work to access the servers inside the corporate network.

    But what is the best practice for an application installed on the perimeter of work to establish a raw socket connection to access network resources other than http/ftp behind my corporate firewall? so I want something like

    sock int = socket (AF_INET, SOCK_STREAM, 0);

    Connect (...) //using a host/ip within my company and port 1234

    Write (...)

    Close (sock)

    is this possible?

    and second: will it work if I use QTCPSocket?

    Hello.

    Yes, there is a recommended approach to do this for the current version of BES.  A HTTP proxy is used to connect to both corporate and external networks internal when in the scope of work.  To connect to a particular host and port, you HTTP CONNECT request to the proxy, and then once the connection is established, you have a connection with the remote server socket.  I wrote a sample application that covers the QTcpSocket / QSslSocket, BSD sockets, OpenSSL taken and connections of curvature (the species is supposed to be transparent, but there has been problems reported with some built OS).

    I'll clean up this sample application and submit for review before it is posted on GitHub.  If your need is urgent, I could share a few code snippets to help you to implement the solution for your specific use case.

  • Can I block the user to connect to the VPN 3030 by type of customer or version?

    I would like to block some users who use to connect to our VPN 3030 client Win98 or very old version of VPN client.

    Is there a way to set up my VPN 3030 so I can block customers? I don't want to push new customer for them or that you don't have a server radius or something like that to put them on an isolated network independent.

    I want to configure VPN 3030, is it possible?

    Thank you.

    Jayesh,

    Reach:

    Configuration | User management | Groups

    Go to the specific group and click on modify.

    On the IPSec tab, you will see a section for:

    Customer type & Version limiting

    For example:

    p *: 4.7*

    This will allow the version 4.7 of customers.

    See you soon

    Gilbert

    Write it down, if it can help

  • Establish the VPN connection before the user logged

    Hello world!

    Anyone know if it is possible to run the cisco vpn client and establish the vpn connection before the user logs (Windows 7)? How?

    Thanks in advance!

    You must Anyconnect VPN.

    use start before logon feature you can get the VPN before windows logon.

    There are a lot of configuration guide that you can find in CISOC regarding anyconnect SBL.

  • Need to reference user PKID for frmPrint page inside the PLM_HOME\web\gsm\Print

    Dear all,

    We need to send the USER-PKID via the button "print" inside the PLM_HOME\web\gsm\Print\frmPrint.aspx, I'm trying to implement using the same suggestion inside this URL https://forums.oracle.com/message/11059357#11059357

    So I understand four under the namespace in the page of frmPrint.aspx side.

    < % @ import namespace="Xeno.Web.UI.Common.Utils"% >
    < % @ import Namespace = "Xeno.Prodika.Application" % > "
    < % @ import Namespace = "Xeno.Prodika.Services" % > "
    < % @ import Namespace = "Xeno.Prodika.Common" % > "

    Adding javascript to reteriving user PKID system, with outside of the header section.

    < script language = "javascript" >

    function GetUserPKID()
    {
    return ' < % = ((IUserService) AppPlatformHelper.ApplicationManager.ServiceManager [typeof (IUserService).). FullName]). UserContext.User.PKID% > ';
    }

    < /script >


    and then, we'll use it below inside the frmprint.aspx to open the new URL with UserPKID has been attached.

    newwindow = window.open ('http://vsvr-plmdev02.cpf.co.th/ICERPT/frmPrint.aspx?pkid= ' + SpecID +' & rpt = rptPackMatCoverSheet_Print & param = ' + Spec_id_list +' & UserID ='+ GetUserPKID(,),' height = 400 width = 200' ');

    But after restarting IIS, I found the error message as below

    BC30108: "IUserService' is a type and cannot be used as an expression.

    Can someone please help?

    Thakhor Srichantra

    Please use below to get the userID because it must use the VB GSM syntax:

    return ' < %="DirectCast(AppPlatformHelper.ApplicationManager.ServiceManager(GetType(IUserService)." (fullname),="" iuserservice).="" usercontext.user.pkid%=""> '; "

  • Creating user interface inside the transmitterPlugin.cpp

    Hi, I had two questions about transmitterPLugin. I am trying to create a plugin that will transmit data to the monitor of first source pro on an external device.

    transmit_UI.PNG

    (1) I use the MessageBox to create a normal window from the code above, but how to create a UI like premier pro has inside the function above? Is there documentation on creating interface user using C++?

    Or should I create a Javascript UI file that is used by the C++ plugin loading?

    (2) in the SDK documentation mentions this:

    transmit_other.PNG

    By clicking on the following call pass does not any useful information. I also checked on a previous post on this https://forums.adobe.com/thread/1179336

    Adobe explain please how can I get the suite to call forwarded to work. For example, should I create a video filter that, if the user adds to the clip, it should

    Send the entire timeline for external devices, how to use the SDK example files to achieve this? Should I export a Video_filer plugin and a plugin of the issuer or should

    Add the source code of these two into one? It would be useful to understand the workflow, since there is no examples related to this in the SDK.

    Thank you

    Since you have to scrub the timeline and see live results, plugin show is the way to go.

    The interesting part of your project, it's that you must return the frame for head tracking, even if there is no new image from Premiere Pro.  I agree that you need the while loop in a separate thread or process, so that it can continue to loop and manage the lead followed separately.

    SetupDialog certainly isn't the place to run a processing loop.  This is only a place to display the user settings and save them.  To the settings dialog box, you can use Windows or Mac API.

    During the ActivateDeactivate, you can manage physical access low level, and could be a possible place to redeploy a new priority processing thread that assumes the head track frames and handles.

Maybe you are looking for

  • Is there a way to identify the reason for the disk activity?

    I am running Windows XP SP3. I often hear my hard drive makes a lot of disk activity as long as 20 minutes or more. No request probably appear in the Task Manager, and I don't think that the application using the more memory is necessarily the same r

  • Vista won't start and F8 does not work

    I got a SONY VGN-SR140D laptop, when I try to start the system. It behaves as follows: After past the Sony logo it enters a black screen with an indicator of underscore flashing on top of the left hand and remains there goes no where. I try to press

  • Display Port Dell XPS 15 9530

    Hello I have the Dell XPS 15 9530 (Q4 13). Could you tell me if I can connect monitor external throught mini DP and get a complete resolution of 3440 x 1440? Thank you for your help.

  • Development of a superior electronic medical records system

    Hi all I would like to know that if there is interest at Microsoft to develop an electronic medical records (EMR) program that would far exceed the existing programs that are used.  At a recent meeting of medical staff, I was frustrated by the lack o

  • BlackBerry 9000 "BOLD" as Smartphones OS v4.6.0.247 should move to a new version?

    I would like to know if West a new versin of the OS for my 9000 "BOLD" and if someone recommends the upgrade actually. Thank you.