Joint services deliver & case of hostname mismatch

Hi all

Recently upgraded from 11i to R12.2.5 with DB 12.1.0.2

OS: RHEL 7

During shutdown of application services, joint services are not stopped correctly.

Get the error message below

Unable to communicate with the Applications TNS Listener to FNDSM_NQ02LHRTAP_DEV on $NODE.  The auditor may be out of service or address the AMT is not configured correctly for this name. (NŒUD = NQ02LHRTAP)

An error occurred in the afpsmccs currents to Service Manager FNDSM_NQ02LHRTAP_DEV client-side.  The routine returned code 144.

When checked the entries TNS, the host name are uppercase "NQ02LHRTAP.domain_name" instead "nq02lhrtap.domain_name".

Is this simultaneous causing problem? Why the host name are uppercase in the tns file?

I ran autoconfig also. His completed successfully.

The host entries are lowercase.

Kindly share your entries to solve problems more far.

Kind regards

Kirushna

Can you please check if you have patches in (concurrent programs fail with: 100 Oracle error: ORA-01403: No Data found were found in FND_CONC_RAC_UTILS.) (Doc ID 1988419.1)) apply?

Thank you

Hussein

Tags: Oracle Applications

Similar Questions

  • 4.2 ACS services does not

    The server is running Windows 2003 SP2 and due to a problem it has restarted. After you restart all services stopped working.

    CSAdmin, CSMon, and CSRadius hanging in State and case of departure in shutdown state. When I program the startuptype manual and began these services

    I got "failed to start the CSAdmin service on Local computer. Error 1053, that service has not responded to the application launch or control in a timely. "

    For the service case, it gives the error message "the service of cases on Local computer started and then stopped. Some service automatically stop if they

    "no work to do, for example, the service logs and alerts.

    In the eventviewer it shows "the description for the event (1) in Source (CiscoAAA) ID is not found. The local computer may not have the information necessary registry or message DLL files to display messages from a remote computer. You may be able to use the option/auxsource = flag to retrieve this description; For more information, see Help and Support. The following information is part of the event: CSAdmin, cannot initialize SchemeLayer, 74. »

    While the automatic startup type event viewer displays error below.

    "The description for the event (1) in Source (acs) ID is not found. The local computer may not have the information necessary registry or message DLL files to display messages from a remote computer. You may be able to use the option/auxsource = flag to retrieve this description; For more information, see Help and Support. The following information is part of the event: * ERROR * failed Assertion: 103401 (9.0.0.1271)

    Could not open the file (C:\Program Files\CiscoSecure ACS v4.2\CSDB\acs.db) who previously opened successfully; error = 32. the description for the event (1) in Source (acs) ID was not found. The local computer may not have the information necessary registry or message DLL files to display messages from a remote computer. You may be able to use the option/auxsource = flag to retrieve this description; For more information, see Help and Support. The following information is part of the event: * ERROR * failed Assertion: 103401 (9.0.0.1271)
    Could not open the file (C:\Program Files\CiscoSecure ACS v4.2\CSDB\acs.db) who previously opened successfully; error = 32. »

    Please help me solve this problem.

    Thank you

    Since we had no access to the ACS server. We tried to take backup of csutil but there was the schemalayer error message. As we stopped AV, logs files removed from the directory, killed services stuck from the Task Manager and restarting the server. If it's still not allowing you to restart services, most likely you need to take backup, uninstall the ACS server and reinstall the same version of ACS, followed by restore.

    ~ BR
    Jatin kone

    * Does the rate of useful messages *.

  • Network error when opening the Regional service console

    Hi all

    I've successfully installed the Hyperion. When I start the Console of Essbase Administration Services, I get the next error * "error - 1042006 - network [111]: unable to connect to [localhost:1423]." The customer has expired waiting to connect to Essbase Agent using the TCP/IP protocol. Check your network connections. Also make sure that this server and port are correct. * Please guide me to solve this problem.

    Thanks and greetings
    Chimbu

    Hi Chimbu,

    Follow the steps below.

    * 1. Open the Windows registry (Start--> Run--> RegEdit). *

    * 2. Go to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TCPIP\Parameters.*

    * 3. Add new DWORD value named "TcpTimedWaitDelay."
    -Right click and select Edit
    -Select "Décimal" radio button, type 30.

    * 4. Add new DWORD value named "MaxUserPort."
    -Right click and select Edit
    -Select "Décimal" radio button, type 65534

    * 5. A restart of the server (reboot the Hyperion related Services) is cas.*

    Thanks and greetings
    Saru

  • How to move all of the FORM to a Web service?

    What is the proper way to pass all of the form to a Web service? I can do my work of CFCS with 1 param, who is the FORM, but when I try to use the CFC as a Web service I get a type mismatch error. The must be a way to pass all of the form to a Web service rather than to me, creating a bunch of parameters for each element of the form, I just can't find an example of anywhere. I know I can't be the only person to ask this question.

    ..

  • VG224 and Verifone xx810 chip and pin component terminal modem

    Hi members of the community.

    I have a very specific problem I'd appreciate help with if anyone else has experienced this or something similar.

    We have a VG224 that provides analog lines for fax machines mainly on our campus. Recently, we had our Department of finance use machines to chip and PIN on these connections. Previously, we used streamline machinery, and they connect properly.

    The specific case I have is a Verifone vx810 machine which is connected to a VG224. The Verifone unitis able to deal with success and to authorize a transaction, but it cannot complete a download batch process or a TMS. I talked to the support company that rent us machines to and identified that the computer uses the following baud rate, bits of parity and stop for 2 different operations:

    For transactions: 2400 baud, parity/stop 7e1 (this works)

    For the batch upload/TMS: 19200 baud, parity/top 8n1 (it does not).

    In the case of the upload of batch/TMS, the machine connects, gets a connection to the remote end to the PSTN for about 10 to 20 seconds, then he tears because the modem negotiation fails. I've read various articles on forums CIHI and others say that data rates high speed can be a problem for the VG224, but nothing to suggest a problem with 19200. I also tried installing on an ATA186 and ATA showed the same symptoms, so I am inclined to think that this isn't just a firmware issue or bug with the VG224. I tried 3 different chip and PIN machines of the model vx810 and all have the same symptoms.

    Here's a copy of my current VG224 config. The VG224 is recorded in the CUCM via SCCP.

    version 12.4

    no service button

    horodateurs service debug datetime localtime

    Log service timestamps datetime localtime

    no password encryption service

    !

    hostname vg224

    !

    boot-start-marker

    boot-end-marker

    !

    forest-meter operation of syslog messages

    logging buffered 4096

    !

    AAA new-model

    !

    !

    AAA authentication login default local radius group

    the AAA authentication enable default

    AAA authorization exec default local radius group

    failure to exec AAA accounting

    action-type market / stop

    RADIUS group

    !

    !

    !

    AAA - the id of the joint session

    clock timezone GMT 0

    clock summer-time recurring UTC 4 Sun Mar 01:00 4 Sun Oct 02:00

    IP source-route

    IP cef

    no ip domain search

    !

    !

    No ipv6 cef

    !

    stcapp ccm-Group 1

    stcapp

    !

    stcapp function-access code

    !

    stcapp speed dial feature

    !

    !

    voip phone service

    Modem passthrough codec g711ulaw nse

    !

    !

    voice-card 0

    !

    username password

    Archives

    The config log

    hidekeys

    !

    !

    !

    interface FastEthernet0/0

    no ip address

    automatic duplex

    automatic speed

    !

    interface FastEthernet0/0.644

    encapsulation dot1Q 644

    IP 10.1.160.4 255.255.255.0

    !

    interface FastEthernet0/1

    no ip address

    Shutdown

    automatic duplex

    automatic speed

    !

    default IP gateway - 10.1.160.1

    !

    IP forward-Protocol ND

    IP route 0.0.0.0 0.0.0.0 10.1.160.1

    no ip address of the http server

    !

    exploitation forest installation local6

    interface FastEthernet0/0.644 source journaling

    logging

    SNMP-server RO community

    SNMP server location

    !

    Server RADIUS auth-port 1812 1813 acct-port host

    Server RADIUS auth-port 1812 1813 acct-port host

    RADIUS 3 server timeout

    RADIUS server key

    !

    control plan

    !

    !

    !

    voice-port 2/0

    cptone GB

    initial delays of 60

    timeouts interdigit 60

    timeout infinity ringtone

    activation of the caller ID

    !

    voice-port 2/1

    cptone GB

    initial delays of 60

    timeouts interdigit 60

    timeout infinity ringtone

    activation of the caller ID

    !

    voice-port 2/2

    cptone GB

    initial delays of 60

    timeouts interdigit 60

    timeout infinity ringtone

    activation of the caller ID

    !

    voice-port 2/3

    cptone GB

    initial delays of 60

    timeouts interdigit 60

    timeout infinity ringtone

    activation of the caller ID

    !

    voice-port 2/4

    no echo - cancel enable

    cptone GB

    initial delays of 60

    timeouts interdigit 60

    timeout infinity ringtone

    activation of the caller ID

    !

    !

    CCM-manager cisco Protocol fax

    CCM-Manager config server

    CCM-Manager config

    CCM-Manager local FastEthernet0/0.644 SCCP

    CCM-Manager sccp

    !

    !

    SCCP local FastEthernet0/0.644

    SCCP ccm version ID 1 6.0

    SCCP ccm 2 identifier version 6.0

    SCCP ccm identifier 3 version 6.0

    SCCP

    !

    SCCP ccm Group 1

    associate the ccm 1 priority 1

    associate priority 2 CCM 2

    associate the ccm 3 priority 3

    !

    transcode dspfarm profile 1

    associate the PCRS application

    !

    !

    voice pots Dial-peer 999200

    Service stcapp

    port 2/0

    !

    voice pots Dial-peer 999201

    Service stcapp

    port 2/1

    !

    voice pots Dial-peer 999202

    Service stcapp

    port 2/2

    !

    voice pots Dial-peer 999203

    Service stcapp

    2/3 port

    !

    voice pots Dial-peer 999204

    Service stcapp

    port 2/4

    !

    !

    !

    Line con 0

    line to 0

    line vty 0 4

    !

    NTP server

    NTP server

    end

    And a version of the show of the vg224:

    System to regain the power ROM

    System restarted at 14:30:34 CEST Wednesday 9 may 2012

    System image file is "slot0:vg224 - i6s - mz.124 - 22.T5.bin".

    Cisco VG224 processor (R527x) (revision 4.1) with 119808 K/K 11264 bytes of memory.

    Card processor ID FHK1432F2CC

    R527x CPU at 225 MHz, 40, Rev 3.1 implementation

    1 voice module 24 analog FXS edge V2.1

    2 FastEthernet interfaces

    Configuration of DRAM is 64 bits wide with disabled parity.

    63K bytes of non-volatile configuration memory.

    The system of fpga version is 250027

    The system of readonly fpga version is 250027

    Option for fpga system is 'system '.

    62496K bytes of ATA Slot0 CompactFlash (read/write)

    Configuration register is 0 x 2102

    This problem is really driving me crazy, if anyone can shed some light on what is perhaps the root cause of that I would be very grateful.

    I would say probably yes, devices compatible PCIDSS circulating on the network IP would be the way to go and that is something that we work, but currently we have units that can communicate using analog telephone lines.

    OK, PRI is clean so you must relay setup for connection of modem modem high speed work.

    I would not waste time with CSPC and go immediately to SIP or H.323.

  • AAA new-model

    How this command works "activate the aaa group by default RADIUS authentication? I served my Radius Cisco Secure ACS 4.2 server but I can not connect... Y does it have someone here can give me a understanding on this command? Need this for my CCNA security exam... Help, please...

    Additional information:

    IETF Radius attributes: NAS calls

    Here is my config on R1:

    !

    !

    version 12.4

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    encryption password service

    !

    hostname R1

    !

    boot-start-marker

    boot-end-marker

    !

    enable secret 5 $1$e.TZ$EXkOaZ0rkd/GBGLA/8GrD/

    !

    AAA new-model

    !

    !

    the AAA authentication enable default group RADIUS

    !

    !

    AAA - the id of the joint session

    !

    !

    resources policy

    !

    memory iomem size 5

    IP cef

    !

    !

    !

    !

    no ip domain search

    IP domain name aida.com

    property intellectual ssh version 2

    !

    !

    username mark password privilege 15 7 110418171C

    username 050A081B29434010 password 7 anthony

    !

    interface Loopback1

    IP 1.1.1.1 255.255.255.255

    !

    interface FastEthernet0/0

    IP 192.168.5.1 255.255.255.248

    automatic duplex

    automatic speed

    !

    interface FastEthernet0/1

    IP 10.10.10.1 255.255.255.252

    automatic duplex

    automatic speed

    !

    Router eigrp 100

    1.1.1.1 to network 0.0.0.0

    Network 10.10.10.0 0.0.0.3

    network 192.168.5.0 0.0.0.7

    No Auto-resume

    !

    !

    !

    no ip address of the http server

    no ip http secure server

    !

    !

    RADIUS-server host 172.16.178.3 auth-port 1645 acct-port 1646 borders 7 xxxxxxxxxxxxxxxxxxxxxxxxxxx

    !

    !

    !

    control plan

    !

    !

    Line con 0

    exec-timeout 0 0

    Synchronous recording

    line to 0

    line vty 0 4

    local connection

    entry ssh transport

    !

    !

    end

    Hi Bro

    The command 'aaa activate by default group radius authentication' means your enable password, you want the router to make reference to the ACS server and obtain the credentials.

    Another example, the command 'aaa radius of group by default authentication enable enable' means your enable password, you want the router to make reference to the ACS server and obtain the credentials. In case your ACS is down, you want the router to see the local enable password and get the credentials.

    I saw what you are trying to achieve and you can do this on the SHELF as well, but I personally prefer GANYMEDE + where possible.

    !

    AAA new-model

    !

    AAA authentication login default local radius group

    AAA authentication enable default group enable RADIUS

    AAA authorization exec default local

    !

    RADIUS-server host 10.0.0.100 auth-port 1645 acct-port 1646 cisco123 keys

    Note: $enab15$, this is because you do not have configured aaa authorization orders. You can add a fictitious user name $enab15$ in your ACS or you could paste the following commands below into your router.

    username admin privilege 15 password 0 cisco123

    operator privilege 7 password cisco123 0 username

    P/S: Please rate this comment, if you find this feedback useful :-)

  • 802. 1 x authentication and phones

    I have just begun to roll authentication of 802. 1 x and found that although I got the authentication for the PC the data VLAN to work, phones on the VOICE VLAN are not unless I put 'host-mode authentication' to 'stream '.

    We did turn not authenticated for 7 years with phones and both work of the PC.

    What I want to do (i.e. what management told me to move), is to have phones connect not authenticated (CDP agreeing to handle correct assignment of VLANS) but require PC to authenticate.

    I guess the simple question is; is it still possible? If this is the case, any advice is greatly appreciated.  (config switch is below).

    Thank you

    Arch

    !
    version 12.2
    no service button
    horodateurs service debug datetime localtime show-timezone msec
    Log service timestamps datetime localtime show-timezone msec
    encryption password service
    !
    switch to hostname
    !
    boot-start-marker
    boot-end-marker
    !
    emergency logging console
    emergency logging monitor
    enable secret 5 *.
    !
    AAA new-model
    !
    !
    Group AAA dot1x default authentication RADIUS
    !
    !
    !
    AAA - the id of the joint session
    clock timezone cst - 6
    clock to summer time recurring cdt
    1 supply ws-c3750g-24ps switch
    mtu 1500 routing system
    VTP transparent mode
    no ip domain-lookup
    !
    !
    interface ip igmp snooping mrouter vlan 41 item in gi1/0/27
    interface ip igmp snooping mrouter vlan 41 item in gi1/0/28
    !
    QoS omitted MLS
    !

    pvst spanning-tree mode
    spanning tree extend id-system
    !
    internal allocation policy of VLAN ascendant
    !
    VLAN 13
    name data - VLAN
    !
    VLAN 857
    name - VLAN VoIP
    !
    VLAN 1611
    name comments - VLAN
    LLDP run
    !
    !
    class-map correspondence AutoQoS-VoIP-RTP-Trust
    match ip dscp ef
    class-map correspondence AutoQoS-VoIP-control-Trust
    match ip dscp cs3 af31
    !
    !
    Policy-map AutoQoS-Police-CiscoPhone
    class AutoQoS-VoIP-RTP-Trust
    DSCP ef Set
    320000 8000 exceed-action of the police controlled-dscp-transmit
    class AutoQoS-VoIP-control-Trust
    DSCP Set cs3
    32000 8000 exceed-action of the police controlled-dscp-transmit
    !
    !
    !
    GigabitEthernet1/0/1 interface
    switchport access vlan 13
    switchport mode access
    switchport voice vlan 857
    security breach port switchport protect
    bandwidth share SRR-queue 10 10 60 20
    form of bandwidth SRR-queue 10 0 0 0
    queue-series 2
    priority queue
    authentication-sense in
    no response from the authentication event action allow vlan 1611
    stream of host-authentication mode
    Auto control of the port of authentication
    protect the violation of authentication
    MLS qos trust device cisco-phone
    MLS qos trust cos
    Auto qos voip cisco-phone
    dot1x EAP authenticator
    spanning tree portfast
    service-policy input AutoQoS-Police-CiscoPhone
    !
    interface GigabitEthernet1/0/2
    !
    interface GigabitEthernet1/0/3
    !
    interface GigabitEthernet1/0/4
    !
    interface GigabitEthernet1/0/5
    !
    interface GigabitEthernet1/0/6
    !
    interface GigabitEthernet1/0/7
    !
    interface GigabitEthernet1/0/8
    !
    interface GigabitEthernet1/0/9
    !
    interface GigabitEthernet1/0/10
    !
    interface GigabitEthernet1/0/11
    !
    interface GigabitEthernet1/0/12
    !
    interface GigabitEthernet1/0/13
    !
    interface GigabitEthernet1/0/14
    !
    interface GigabitEthernet1/0/15
    !
    interface GigabitEthernet1/0/16
    !
    interface GigabitEthernet1/0/17
    !
    interface GigabitEthernet1/0/18
    !
    interface GigabitEthernet1/0/19
    !
    interface GigabitEthernet1/0/20
    !
    interface GigabitEthernet1/0/21
    !
    interface GigabitEthernet1/0/22
    !
    interface GigabitEthernet1/0/23
    !
    interface GigabitEthernet1/0/24
    !
    interface GigabitEthernet1/0/25
    !
    interface GigabitEthernet1/0/26
    !
    interface GigabitEthernet1/0/27
    !
    interface GigabitEthernet1/0/28
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 13,857,1611
    switchport mode trunk
    bandwidth share SRR-queue 10 10 60 20
    form of bandwidth SRR-queue 10 0 0 0
    queue-series 2
    MLS qos trust cos
    Auto qos voip trust
    !
    RADIUS-server host 10.1.2.10 auth-port 1645 acct-port 1646
    Server RADIUS 7 key *.
    RADIUS vsa server send authentication
    end

    Hello

    authentication with PC and phone needs "multi-domain of authentication host mode. You con use MAC address or 802. 1 X (username & password) for authentication of IP phone.

    Profile authenticatipo must send "device-traffic-class = voice" to the switch. PC fits the DATA cross-domain and phone VOICE-field.

    See attachment:

  • VPN and MTU issues

    Recently, I have set up a 1721 running IOS c1700-k9o3sy7 - mz.122 - 15.T5.bin

    This router terminated a VPN with another router, a 1721 with the exact same version of IOS. This router has initially been connected via a WAN link on eth0 wireless. We moved their on a t1 as the main interface with the wireless as a backup. Then we had to

    -Configure a loopback - its ip address device would end the vpn

    -make the source of the vpn packages come from the loop

    -Configure static routes w / higher administrative distance

    Do all this we tested VPN - they worked. Unplugged at t1 connection and traffic moves on the wireless. We checked the vpn clients could connect. Everything worked ok...

    Except when you move large files between hosts behind fa0 via the vpn to the guests at the bottom. To prove the vpn worked and routing was in place, we could telnet from a host behind fa0 via the vpn to a remote host and you connect... Then, we would try an ftp files more. We could connect to the ftp server BUT once a file transfer started things would hang.

    We opened a Cisco tac case and it turned out that the addition of

    IP tcp adjust-mss 1300

    the interface fa0 fixed all - file transfer worked.

    My question why would be reduced aid package size? The vpn add some packages generals cauing more large packages to remove?

    A clue was here, BUT it's PPPoE - no VPN...

    http://www.Cisco.com/univercd/CC/TD/doc/product/software/ios122/122newft/122tcr/122twr/wftbrda.htm#1064471

    I'm looking to explain why this reduced MTU size worked. I would of never figured this out on my own...

    Here's the running-config, we used. Don't forget that everything worked (switching between WAN, vpn, NAT connectivity link) except the transfer of files and when large amounts of data was pushed over the line as MS-sharing files/printers, emails with attachments (a few hundred k). The only change is a line at the fa0 interface.

    version 12.2

    horodateurs service debug uptime

    Log service timestamps uptime

    encryption password service

    !

    hostname HPARFD

    !

    queue logging limit 100

    logging buffered debugging 8192

    enable secret 5

    enable password 7

    !

    abc username password

    clock timezone CST - 6

    clock to summer time recurring CDT

    AAA new-model

    !

    !

    AAA authentication login userauthen local

    AAA authorization groupauthor LAN

    AAA - the id of the joint session

    IP subnet zero

    !

    !

    no ip domain search

    IP domain name blahblah.net

    IP-name server

    IP-name server

    !

    audit of IP notify Journal

    Max-events of po verification IP 100

    property intellectual ssh time 60

    !

    !

    !

    !

    crypto ISAKMP policy 1

    md5 hash

    preshared authentication

    !

    crypto ISAKMP policy 2

    md5 hash

    preshared authentication

    !

    crypto ISAKMP policy 3

    BA 3des

    preshared authentication

    Group 2

    !

    crypto ISAKMP policy 10

    md5 hash

    preshared authentication

    test3030 key crypto isakmp address No.-xauth

    ISAKMP crypto key address 0.0.0.0 test3131 0.0.0.0

    crypto ISAKMP client configuration address pool local ourpool

    !

    ISAKMP crypto client configuration group whatever

    key

    pool ourpool

    ACL 101

    !

    !

    Crypto ipsec transform-set esp - esp-md5-hmac rptset

    Crypto ipsec transform-set esp - esp-md5-hmac trans2

    Crypto ipsec transform-set esp-3des esp-md5-hmac v35clientset

    !

    Crypto-map dynamic dynmap 10

    Set transform-set v35clientset

    Crypto-map dynamic dynmap 20

    Set transform-set trans2

    !

    !

    card crypto rtp-address Loopback0

    crypto isakmp authorization list groupauthor rtp map

    client configuration address card crypto rtp initiate

    client configuration address card crypto rtp answer

    RTP 1 ipsec-isakmp crypto map

    defined by peers

    Set transform-set rptset

    match address 115

    map rtp 50-isakmp ipsec crypto dynamic dynmap

    !

    !

    !

    !

    interface Loopback0

    Description loopback address is NOT dependent on any physical interface

    IP 255.255.255.255

    no ip proxy-arp

    NAT outside IP

    No cutting of the ip horizon

    !

    interface Ethernet0

    secondary description - wireless WAN link

    255.255.255.252 IP address

    no ip proxy-arp

    NAT outside IP

    No cutting of the ip horizon

    Half duplex

    crypto rtp map

    !

    interface FastEthernet0

    Description connected to EthernetLAN

    IP 255.255.255.0

    no ip proxy-arp

    IP tcp adjust-mss 1300

    ^ ^ ^ Tac added cisco work around

    IP nat inside

    automatic speed

    !

    interface Serial0

    first link description WAN - t1

    255.255.255.252 IP address

    no ip proxy-arp

    NAT outside IP

    random detection

    crypto rtp map

    !

    router RIP

    version 2

    passive-interface Loopback0

    passive-interface Serial0

    passive-interface Ethernet0

    network

    No Auto-resume

    !

    IP local pool ourpool

    IP nat inside source overload map route sheep interface Loopback0

    IP classless

    IP route 0.0.0.0 0.0.0.0 Serial0

    IP route 0.0.0.0 0.0.0.0 Ethernet0

    IP route 255.255.255.0 Serial0

    IP route 255.255.255.0 Ethernet0 200

    IP route 255.255.255.0 Serial0

    IP route 255.255.255.0 Ethernet0 200

    IP route 255.255.255.0 Serial0

    IP route 255.255.255.0 Ethernet0 200

    no ip address of the http server

    no ip http secure server

    !

    !

    !

    remote_access extended IP access list

    permit tcp any any eq 22

    permit tcp 0.0.0.255 any eq telnet

    TCP refuse any any eq telnet

    allow an ip

    !

    access-list 1 permit 0.0.0.255

    access-list 100 permit ip 192.168.0.0 0.0.0.255 host

    access-list 100 permit ip 192.168.0.0 0.0.0.255 host

    access-list 100 permit ip 192.168.0.0 0.0.0.255 host

    access-list 101 permit ip 0.0.0.255 10.2.1.0 0.0.0.255

    access-list 101 permit ip 192.168.0.0 0.0.255.255 10.2.1.0 0.0.0.255

    access-list 199 permit tcp a whole Workbench

    access-list 199 permit udp any one

    access-list 199 permit esp a whole

    access-list 199 permit ip 192.168.0.0 0.0.0.255 0.0.0.255

    !

    sheep allowed 10 route map

    corresponds to the IP 110

    !

    Enable SNMP-Server intercepts ATS

    RADIUS server authorization allowed missing Type of service

    alias exec sv show version

    alias exec sr show running-config

    alias exec ss show startup-config

    alias con exec conf t

    top alias show proc exec

    alias exec br show ip brief inter

    !

    Line con 0

    exec-timeout 0 0

    password 7

    line to 0

    line vty 0 4

    exec-timeout 0 0

    password 7

    Synchronous recording

    transport input telnet ssh rlogin udptn stream

    !

    NTP-period clock 17180059

    NTP server

    end

    You can check the following site for more explanation:

    http://www.Cisco.com/en/us/Tech/tk827/tk369/technologies_tech_note09186a0080093f1f.shtml

    HTH...

  • -VPN - PROBLEM IOS CLIENT!

    -Start ciscomoderator note - the following message has been changed to remove potentially sensitive information. Please refrain from publishing confidential information about the site to reduce the risk to the security of your network. -end of the note ciscomoderator-

    Hello

    I have IOS Cisco 2650XM running IPSEC. I configured for authentication local customer vpn. I create ipsec tunnel more Don t ping from router to my client vpn (windows 2 k with vpn client 4.0). If anyone can help me, my express recognition.

    Better compliance

    Joao Medeiros

    SH RUN

    Current configuration: 8092 bytes

    !

    ! Last configuration change at 09:09:04 GMT Tuesday, March 2, 1993 by lordz

    !

    version 12.2

    horodateurs service debug uptime

    Log service timestamps uptime

    encryption password service

    !

    hostname router_vpn_fns

    !

    start the system flash c2600-ik9o3s - mz.122 - 11.T.bin

    AAA new-model

    !

    !

    AAA authentication login default local

    AAA authorization network default local

    AAA - the id of the joint session

    !

    clock timezone GMT - 3

    voice-card 0

    dspfarm

    !

    IP subnet zero

    no ip source route

    IP cef

    !

    !

    no ip domain search

    agm IP domain name - tele.com

    name-server IP 192.168.10.1

    !

    no ip bootp Server

    audit of IP notify Journal

    Max-events of po verification IP 100

    property intellectual ssh time 60

    IP port ssh 2000 rotary 1

    !

    crypto ISAKMP policy 3

    BA 3des

    preshared authentication

    Group 2

    !

    crypto ISAKMP policy 110

    preshared authentication

    lifetime 10000

    !

    crypto ISAKMP policy 130

    preshared authentication

    lifetime 10000

    ISAKMP crypto key xxx address xxx.xxx.76.22

    ISAKMP crypto key xxx address yyy.yyy.149.190

    !

    ISAKMP crypto client configuration group xlordz

    key cisco123

    DNS 192.168.10.1

    area agm - tele.com

    LDz-pool

    ACL 108

    !

    86400 seconds, duration of life crypto ipsec security association

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac agmipsec_gyn

    Crypto ipsec transform-set esp-3des esp-sha-hmac agmipsec_poa

    Crypto ipsec transform-set esp-3des esp-sha-hmac ldz-series

    !

    Crypto-map dynamic ldz_dynmap 10

    ldz - Set transform-set

    !

    !

    by default the card crypto client ldz_map of authentication list

    default value of card crypto ldz_map isakmp authorization list

    client configuration address card crypto ldz_map answer

    ldz_map 10 card crypto ipsec-isakmp dynamic ldz_dynmap

    !

    agmmap_gyn crypto-address on Serial0/0

    agmmap_gyn 1 ipsec-isakmp crypto map

    the value of xxx.xxx.76.22 peer

    Set transform-set agmipsec_gyn

    PFS group2 Set

    match address 120

    QoS before filing

    agmmap_gyn 2 ipsec-isakmp crypto map

    the value of yyy.yyy.149.190 peer

    Set transform-set agmipsec_poa

    PFS group2 Set

    match address 130

    !

    !

    !

    call active voice carrier's ability

    !

    voice class codec 1

    codec preference 1 60 g729r8 bytes

    g711alaw preferably 2 codec

    !

    !

    Fax fax-mail interface type

    MTA receive maximum-recipients 0

    !

    controller E1 0/1

    case mode

    No.-CRC4 framing

    termination 75 Ohm

    time intervals DS0-Group 1-15, 17 0 type digital r2 r2-compelled ani

    Digital-r2 r2-compelled ani type 1 time intervals DS0-group 18-31

    0 cases-custom

    country Brazil

    counting

    signal response Group-b 1

    case-personal 1

    country Brazil

    counting

    signal response Group-b 1

    !

    !

    !

    !

    interface FastEthernet0/0

    192.168.15.1 IP address 255.255.255.0 secondary

    192.168.7.1 IP address 255.255.255.0 secondary

    IP 192.168.10.10 255.255.255.0

    NBAR IP protocol discovery

    load-interval 30

    automatic speed

    full-duplex

    priority-group 1

    No cdp enable

    !

    interface Serial0/0

    bandwidth of 512

    IP 200.193.103.154 255.255.255.252

    NBAR IP protocol discovery

    frame relay IETF encapsulation

    load-interval 30

    priority-group 1

    dlci 507 frame relay interface

    frame-relay lmi-type ansi

    ldz_map card crypto

    !

    interface FastEthernet0/1

    no ip address

    NBAR IP protocol discovery

    load-interval 30

    Shutdown

    automatic duplex

    automatic speed

    No cdp enable

    !

    LDz-pool IP local pool 192.168.10.3 192.168.10.5

    IP classless

    IP route 0.0.0.0 0.0.0.0 200.193.103.153

    IP route 192.168.20.0 255.255.255.0 xxx.xxx.76.22

    IP route 192.168.25.0 255.255.255.0 xxx.xxx.76.22

    IP route 192.168.30.0 255.255.255.0 yyy.yyy.149.190

    IP route 192.168.35.0 255.255.255.0 yyy.yyy.149.190

    IP route vvv.vvv.17.152 255.255.255.248 192.168.10.1

    IP http server

    enable IP pim Bennett

    !

    !

    dns-servers extended IP access list

    extended IP access to key exchange list

    !

    Journal of access list 1 permit 192.168.10.44

    Journal of access list 1 permit 192.168.10.2

    Journal of access list 1 permit 192.168.10.1

    access-list 1 permit vvv.vvv.17.154 Journal

    IP access-list 108 allow any 192.168.10.0 0.0.0.255 connect

    access-list 108 permit ip any any newspaper

    IP access-list 120 allow any 192.168.20.0 0.0.0.255 connect

    IP access-list 120 allow any 192.168.25.0 0.0.0.255 connect

    access-list allow 120 ip host xxx.xxx.76.22 any log

    access-list 120 deny ip any any newspaper

    IP access-list 130 allow any 192.168.30.0 0.0.0.255 connect

    IP access-list 130 allow any 192.168.35.0 0.0.0.255 connect

    access-list allow 130 ip host yyy.yyy.149.190 any log

    access-list 130 deny ip any any newspaper

    access-list 140 deny udp 192.168.20.0 0.0.0.255 any netbios-ns range

    NetBIOS-ss log

    access-list 140 deny udp 192.168.25.0 0.0.0.255 any netbios-ns range

    NetBIOS-ss log

    access-list 140 deny udp 192.168.30.0 0.0.0.255 any netbios-ns range

    NetBIOS-ss log

    access-list 140 deny udp 192.168.35.0 0.0.0.255 any netbios-ns range

    NetBIOS-ss log

    access-list 140 refuse tcp 192.168.20.0 0.0.0.255 any beach 137 139 connect

    access-list 140 refuse tcp 192.168.25.0 0.0.0.255 any beach 137 139 connect

    access-list 140 refuse tcp 192.168.30.0 0.0.0.255 any beach 137 139 connect

    access-list 140 deny tcp 192.168.35.0 0.0.0.255 any beach 137 139 connect

    access-list 140 refuse tcp 192.168.20.0 0.0.0.255 any eq connect 5900

    access-list 140 refuse tcp 192.168.25.0 0.0.0.255 any eq connect 5900

    access-list 140 refuse tcp 192.168.30.0 0.0.0.255 any eq connect 5900

    access-list 140 deny tcp 192.168.35.0 0.0.0.255 any eq connect 5900

    access-list 140 permit ip any any newspaper

    Dialer-list 1 ip protocol allow

    not run cdp

    !

    Server SNMP community xxxxxxxxxx

    Enable SNMP-Server intercepts ATS

    call the rsvp-sync

    !

    voice-port 0/1:0

    !

    voice-port 0/1:1

    !

    No mgcp timer receive-rtcp

    !

    profile MGCP default

    !

    Dial-peer cor custom

    !

    !

    !

    !

    Line con 0

    exec-timeout 2 0

    Synchronous recording

    length 50

    line to 0

    exec-timeout 0 10

    No exec

    line vty 0 4

    access-class 1

    transport input telnet ssh

    !

    Master of NTP

    !

    end

    Hello

    If you are not disturbing the production network much, just try to reload 2650.

    This works sometimes!

    Kind regards

    Walked.

  • Registration of devices or fail to load profile registration

    OS X Server version 10.11.3; App version 5.0.15 Server

    Set up the server and the Profile Manager.

    We use a Windows Server 2008 R2 CA and CA root, server certificate and code-signing certificates are installed and configured in the server application.

    Devices to try to register through https://< myservername > / mydevices can install the profile of Trust successfully.

    However, if clicking on the registration button, they get a 500 Internal Server Error.

    If you try to install the profile of the inscription, it fails with the message: failed installation of profile.  Profile... could not be installed because of an unexpected error < InternalError:1 >

    Research for these mistakes find results mixed, a number of years, then it is clear that this has been a problem for quite a long time.  Most of the solutions is in the form, 'reinstall everything '.

    The only newspaper referencing these errors is the newspaper of the Device Manager Service profile.

    On a failure of the attempt, it is found:

    1: [27453] [03/03/2016 11:17:36.416] < 172.17.19.47 > time since the beginning of the script: 23339us [https://ac1.scdl.local/devicemanagement/mdm/mdm_enroll]

    1: [27453] [03/03/2016 11:17:36.416] < 172.17.19.47 > > > > POST processing mdm_enroll

    1: [27453] [03/03/2016 11:17:36.550] < 172.17.19.47 > OSX version 10.10.5

    1: [27453] [03/03/2016 11:17:36.736] \033[1;7;31mEXCEPTION:\033[0;31m error <-[SCEPHelper getSCEPChallengeForHost:]
    (/Library/Caches/com.apple.xbs/Sources/RemoteDeviceManagement/RemoteDeviceManage ment-889.8/Compiled/Framework-Base/Support/SCEPHelper.m:75): "" ((SCEPHELPER_GetSCEPChallenge (self.connection, hostname, hostnameCnt,
    (((& fault, & challengeCnt)))' error 1 ">

    USERINFO: {}

    NSLocalizedDescription = "Operation not permitted".

    } \033[0m\033[0m

    0: [27453] [03/03/2016 11:17:36.736] do_dmx_get_scep_challenge_for_host: [SCEPHelper an exception-]
    [getSCEPChallengeForHost:] (/Library/Caches/com.apple.xbs/Sources/RemoteDeviceManagement/RemoteDeviceManag ement-889.8/Compiled/Framework-Base/Support/SCEPHelper.m:75): "" ((SCEPHELPER_GetSCEPChallenge (self.connection, hostname, hostnameCnt,
    (((& fault, & challengeCnt)))' error 1 "

    0: [27453] [03/03/2016 11:17:36.736] < 172.17.19.47 > EXCEPTION: 500 Internal Server Error - failed to get challenge CEP. to

    #0 /Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend/php/ot a_service_common.php (47): DieInternalError ("couldn't re-sorting...")

    #1 /Applications/Server.app/Contents/ServerRoot/usr/share/devicemgr/backend/php/md m_enroll.php (78):
    GenerateMDMBindingProfile (8191, "07E047A2 - 1 CD 0-4...")

    #2 {hand}

    1: [27453] [03/03/2016 11:17:36.737] < 172.17.19.47 > < < < final output sent (26 bytes) - POST mdm_enroll

    0: [27453] [03/03/2016 11:17:36.737] < 172.17.19.47 > in 344ms | 500 internal Server Error [https://ac1.scdl.local/devicemanagement/mdm/mdm_enroll]

    Update on that.

    It was clear that there was a problem with the website for the Profile Manager, but I couldn't find the files in the hierarchy were the culprits.

    So, I decided to reinstall Server.app.  Followed by a tutorial online on the removal and reinstallation of the server.

    After you configure the server with just the Manager profile, and therefore Open Directory, a client might get a little farther in the registration process.

    When you click the button to register on the site of Mydevices, instead of the 500 internal server error page the customer to download the profile of remote management, but there is no need to install a message box indicating the host name does not correspond to the certificate.  Even with registration profile download/install.  Not InternalError:1, but the profile could not be installed for the same hostname mismatch.

    By checking this, I found that - when you change the hostname for the name myserver.mydomain.local, an alert was lifted on an incompatibility with the computer name (which is just MyServer) if solve you this error, the host name is changed to myserver.local and customers cannot load profiles.  If you do NOT resolve this error, customers can download and install MDM and registration profiles.

    I would note that other services that run to display messages saying the service is available at myserver.local - even if the host name is myserver.mydomain.local.  I suspect that these other services do not go to work for the same reason.

  • the Web UI using ssl generator

    I use LV2012 with Interface Builder.  I am trying to use SSL for security.  My application works very well with http.  I can access my web services directly via https.  When I try to import the web services in the Web user interface Builder using port 8081 (for SSL), I get the following error...

    Generator of the user Web LabVIEW interface cannot connect to the server. Check the server address and that the server is running. Also make sure that the server hosts file clientaccesspolicy.xml to root with valid permissions.

    LV2012 is a "clientaccesspolicy.xml" held to do SSL?  It is not necessary for http on port 8080.

    Hi Ken,

    LabVIEW should provide a file default on HTTP and HTTPS clientaccesspolicy.xml.

    There could be many different questions here:

    -If you go to https://yourmachine:8081 / clientaccesspolicy.xml in a browser, do you think the policy file? (It takes an automatically, as I mentioned).

    If it works, but you get a certificate error / warning that you have ignored - this is because the default self-signed certificate for the web server LV is not approved. Generator of the user Web interface cannot connect via HTTPS in this case, unless you trust the certificate permanently installing it locally. In addition, you will need to connect to the exact hostname specified by the certificate. If you do not get a certificate error / WARNING when accessing the server directly, you should be able to use in the Web user interface designer (using the exact same server name syntax).

    -If you are using the import Web Service functionality in the user Web interface Builder and tries to connect to "yourmachine:8081", try "https://yourmachine:8081".

    -If you cannot use Import Web Service using the exact hostname that the SSL certificate is configured for in (the editor, depending on the configuration of the network, is not able to connect to via of "yourmachine", only through your address IP; but "yourmachine" would work when you run an application built): you can design at the start of your application in the editor by connecting over HTTP. When you're ready for the generation & deployment, you can use the entry "Server uri in" web service generated screws to allow the SSL right before building.

  • Cannot ping Lan devices in Vlan

    Hello

    I looked for a solution to this for the week without success. I came across a Cisco C3560, which is used because of its ability of poe to power some Deskphones Voip. While the works of great poe, machines connected to the switch can only communicate with each other and don't can't ping or otherwise access any device connected directly to the router of the network.

    The Cisco switch is configured with a vlan and a default gateway, but nothing comes out by behind the switch. On connected devices can ping by default gateway (192.168.0.1 - a tp-link router), receive a lease dhcp from the router said successfully and can connect to the internet, but on the local network, nothing works. (unable to connect to the printer connetced directly to the router or other computers connected directly to the router.

    Any advice? I am new to cisco switches, don't know what I'm doing here. I'm just trying to get devices that are connected directly to the switch to communicate with devices connected directly to the router.

    Switch#show runBuilding configuration...
    Current configuration : 1528 bytes!version 12.2service configno service padservice timestamps debug uptimeservice timestamps log uptimeno service password-encryption!hostname Switch!enable secret 5 {}{}{}{}{}{}{}{}{}{}{}{}!no aaa new-modelclock timezone UTC 2system mtu routing 1500ip subnet-zero!!!!no file verify autospanning-tree mode pvstspanning-tree extend system-id!vlan internal allocation policy ascending!interface FastEthernet0/1!interface FastEthernet0/2!interface FastEthernet0/3!interface FastEthernet0/4!interface FastEthernet0/5!interface FastEthernet0/6!interface FastEthernet0/7!interface FastEthernet0/8!interface FastEthernet0/9!interface FastEthernet0/10!interface FastEthernet0/11!interface FastEthernet0/12!interface FastEthernet0/13!interface FastEthernet0/14!interface FastEthernet0/15!interface FastEthernet0/16!interface FastEthernet0/17!interface FastEthernet0/18!interface FastEthernet0/19!interface FastEthernet0/20!interface FastEthernet0/21!interface FastEthernet0/22!interface FastEthernet0/23!interface FastEthernet0/24 switchport mode access!interface GigabitEthernet0/1!interface GigabitEthernet0/2!interface Vlan1 ip address 192.168.0.26 255.255.255.0 no ip route-cache!ip default-gateway 192.168.0.1ip classlessip default-network 192.168.0.0ip http server!access-list 1 permit any log!control-plane!!line con 0line vty 0 4 password XXXXXXXXX login length 0line vty 5 15 password XXXXXXXX login length 0!end
     Switch#show interface
    Vlan1 is up, line protocol is up Hardware is EtherSVI, address is 001e.bd27.c4c0 (bia 001e.bd27.c4c0) Internet address is 192.168.0.26/24 MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:00, output 00:00:00, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 1000 bits/sec, 3 packets/sec 138534 packets input, 9472693 bytes, 0 no buffer Received 0 broadcasts (68 IP multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 30296 packets output, 2248820 bytes, 0 underruns 0 output errors, 1 interface resets 0 output buffer failures, 0 output buffers swapped out
    
    
    
    FastEthernet0/2 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 001e.bd27.c484 (bia 001e.bd27.c484) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:56, output 00:00:01, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 46000 bits/sec, 37 packets/sec 5 minute output rate 582000 bits/sec, 71 packets/sec 1941044 packets input, 327622438 bytes, 0 no buffer Received 38375 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 30699 multicast, 0 pause input 0 input packets with dribble condition detected 3224783 packets output, 2069682884 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    FastEthernet0/4 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 001e.bd27.c486 (bia 001e.bd27.c486) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:01, output 00:00:01, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 1000 bits/sec, 1 packets/sec 129069 packets input, 64947010 bytes, 0 no buffer Received 9953 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 9759 multicast, 0 pause input 0 input packets with dribble condition detected 600269 packets output, 45540585 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    
    
    FastEthernet0/6 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 001e.bd27.c488 (bia 001e.bd27.c488) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:50, output 00:00:01, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 1000 bits/sec, 1 packets/sec 32693 packets input, 4244428 bytes, 0 no buffer Received 9942 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 9759 multicast, 0 pause input 0 input packets with dribble condition detected 588460 packets output, 45003331 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    
    
    FastEthernet0/8 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 001e.bd27.c48a (bia 001e.bd27.c48a) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:30, output 00:00:01, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 32694 packets input, 4243413 bytes, 0 no buffer Received 9934 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 9757 multicast, 0 pause input 0 input packets with dribble condition detected 588485 packets output, 45009466 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    
    
    
    
    
    FastEthernet0/12 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 001e.bd27.c48e (bia 001e.bd27.c48e) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:28, output 00:00:00, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 32742 packets input, 4252075 bytes, 0 no buffer Received 9947 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 9763 multicast, 0 pause input 0 input packets with dribble condition detected 588497 packets output, 45019272 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    
    
    
    
    
    
    
    
    FastEthernet0/13 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 001e.bd27.c48f (bia 001e.bd27.c48f) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:13, output 00:00:01, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 1000 bits/sec, 1 packets/sec 148160 packets input, 73818106 bytes, 0 no buffer Received 9973 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 9760 multicast, 0 pause input 0 input packets with dribble condition detected 599666 packets output, 49045070 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    
    
    
    
    
    
    
    
    
    
    
    FastEthernet0/14 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 001e.bd27.c490 (bia 001e.bd27.c490) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:05, output 00:00:00, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 1000 bits/sec, 1 packets/sec 129165 packets input, 68409495 bytes, 0 no buffer Received 9982 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 9773 multicast, 0 pause input 0 input packets with dribble condition detected 600283 packets output, 45551497 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    
    
    
    
    
    
    
    
    FastEthernet0/18 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 001e.bd27.c494 (bia 001e.bd27.c494) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:49, output 00:00:00, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 21000 bits/sec, 18 packets/sec 5 minute output rate 13000 bits/sec, 16 packets/sec 606386 packets input, 88151136 bytes, 0 no buffer Received 159883 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 55198 multicast, 0 pause input 0 input packets with dribble condition detected 941617 packets output, 308269004 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    
    
    
    
    
    
    
    
    FastEthernet0/20 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 001e.bd27.c496 (bia 001e.bd27.c496) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:54, output 00:00:00, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 1000 bits/sec, 1 packets/sec 5 minute output rate 1000 bits/sec, 2 packets/sec 515813 packets input, 87006769 bytes, 0 no buffer Received 21466 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 19952 multicast, 0 pause input 0 input packets with dribble condition detected 1858112 packets output, 1700009146 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    
    
    
    
    
    FastEthernet0/24 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 001e.bd27.c49a (bia 001e.bd27.c49a) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input never, output 00:00:01, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 1000 bits/sec, 1 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 0 multicast, 0 pause input 0 input packets with dribble condition detected 546556 packets output, 41182636 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    
    
    
    
    
    
    
    
    GigabitEthernet0/1 is up, line protocol is up (connected) Hardware is Gigabit Ethernet, address is 001e.bd27.c481 (bia 001e.bd27.c481) MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive not set Full-duplex, 1000Mb/s, link type is auto, media type is 10/100/1000BaseTX SFP input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input never, output 00:00:00, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 556000 bits/sec, 83 packets/sec 5 minute output rate 76000 bits/sec, 63 packets/sec 4457827 packets input, 3961330567 bytes, 0 no buffer Received 15028 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 11213 multicast, 0 pause input 0 input packets with dribble condition detected 3822373 packets output, 728132696 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out
    
    
    Switch#show vlan
    VLAN Name     Status         Ports---- -------------------------------- --------- -------------------------------1     default active    Fa0/1, Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12, Fa0/13, Fa0/14, Fa0/15, Fa0/16                        Fa0/17, Fa0/18, Fa0/19, Fa0/20, Fa0/21, Fa0/22, Fa0/23, Fa0/24, Gi0/1, Gi0/21002 fddi-default act/unsup1003 token-ring-default act/unsup1004 fddinet-default act/unsup1005 trnet-default act/unsup
    VLAN Type SAID MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------1 enet 100001 1500 - - - - - 0 01002 fddi 101002 1500 - - - - - 0 01003 tr 101003 1500 - - - - - 0 01004 fdnet 101004 1500 - - - ieee - 0 01005 trnet 101005 1500 - - - ibm - 0 0
    Remote SPAN VLANs------------------------------------------------------------------------------
    Primary Secondary Type Ports------- --------- ----------------- ------------------------------------------

    Hello

    first thing, please edit your post and remove your remote vty lines access password

    never send passwords on a public forum for the just in case production equipment

    line vty 0 4
    password xxxxxx

    ***********************

    Your question

    What is the configuration of the router as a switch which seems to work correctly you're saying and I configured its doing its job, don't forget you said that you cannot route no between the router and the router switch should take care of this, whats the vlan ports on the router are on is - what the same subnet do they get an ip address in the same subnet off dhcp as devices of switching, if they do, and you cannot ping them to the same subnet theres something upward on the side of the router it would treat for layer 3 routing ip traffic

    the ping to the router devices connected to the cisco switch and can the device on the router cannot ping devices switches

    If you move a device out of the router and attach it to the doe sit switch still work ok, reach the talk of the internet to other devices on the switch?

    As there is a layer 2 switch you don't need this command you have your entry door you can remove it.. .IP default-network 192.168.0.0

  • Cisco 877W DHCP does not automatically fill the Windows/Mac customers with DNS server entries

    I have a 877W which was operational on Verizon for about 5 years. It never automatically distributed info DNS server for customers who get DHCP issued IP address. I have to manually enter the DNS entries to each client.  What happened to other sites where I've got installed on AT & T as well as 877 unified communications.

    Here is the config. Thanks in advance for the help.

    Building configuration...

    Current configuration: 7987 bytes
    !
    version 12.4
    no service button
    tcp KeepAlive-component snap-in service
    a tcp-KeepAlive-quick service
    horodateurs service debug datetime localtime show-timezone msec
    Log service timestamps datetime localtime show-timezone msec
    encryption password service
    sequence numbers service
    !
    Cod of hostname
    !
    boot-start-marker
    boot-end-marker
    !
    logging buffered debugging 51200
    recording console critical
    enable secret 5 jSwA $1$ $ 3B5lJNqm0ewh
    !
    AAA new-model
    !
    !
    AAA authentication local-to-remote login
    local remote of the AAA authorization network
    !
    AAA - the id of the joint session
    !
    resources policy
    !
    PCTime-6 timezone clock
    PCTime of summer time clock day April 6, 2003 02:00 October 26, 2003 02:00
    IP subnet zero
    IP cef
    No dhcp use connected vrf ip
    DHCP excluded-address IP 192.168.7.1 192.168.7.19
    DHCP excluded-address IP 192.168.7.70 192.168.7.254
    !
    IP dhcp pool sdm-pool1
    import all
    network 192.168.7.0 255.255.255.0
    router by default - 192.168.7.1
    DNS-server 68.238.96.12 68.238.112.12
    !
    !
    inspect the IP name DEFAULT100 cuseeme
    inspect the IP name DEFAULT100 ftp
    inspect the IP h323 DEFAULT100 name
    inspect the IP icmp DEFAULT100 name
    inspect the IP name DEFAULT100 netshow
    inspect the IP rcmd DEFAULT100 name
    inspect the IP name DEFAULT100 realaudio
    inspect the name DEFAULT100 rtsp IP
    inspect the IP name DEFAULT100 esmtp
    inspect the IP name DEFAULT100 sqlnet
    inspect the name DEFAULT100 streamworks IP
    inspect the name DEFAULT100 tftp IP
    inspect the tcp IP DEFAULT100 name
    inspect the IP udp DEFAULT100 name
    inspect the name DEFAULT100 vdolive IP
    synwait-time of tcp IP 10
    IP domain name cods.com
    name of the IP-server 68.238.96.12
    name of the IP-server 68.238.112.12
    property intellectual ssh time 60
    property intellectual ssh authentication-2 retries
    !
    !
    Crypto pki trustpoint TP-self-signed-437228204
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 437228204
    revocation checking no
    rsakeypair TP-self-signed-437228204
    !
    !
    TP-self-signed-437228204 crypto pki certificate chain
    certificate self-signed 01
    30820254 308201BD A0030201 02992101 300 D 0609 2A 864886 F70D0101 04050030
    2 060355 04031325 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 30312E30
    69666963 34333732 32383230 34301E17 303731 30313632 33333131 0D 6174652D
    395A170D 2E302C06 1325494F 03550403 32303031 30313030 30303030 5A 303031
    532D 5365 6C662D53 69676E65 4365 72746966 69636174 652 3433 37323238 642D
    06092A 86 4886F70D 01010105 32303430 819F300D 00308189 02818100 0003818D
    BF73E16C 24A3FB0B A44C83C8 45ACEC75 163C2F0A 87836F7F A43FEB72 0EF26AFA
    C7F35ED6 CBCC6853 5E82B0A6 1FD8020B F3630023 AB30B870 B3155EE6 86988910
    4ACF5121 1CBFF4DC B705DF1E 5D0D698F 06493 D 3DD8D036 42 FE450D21 E26A4DAF
    CE6BA806 81A9F451 0246698E DA7B49E3 160F115C E1104FA9 31FA3C15 CD 782 279
    02030100 01A37E30 7C300F06 03551 D 13 0101FF04 05300301 01FF3029 0603551D
    20821E63 11042230 6F64732E 6F666472 63697479 6E677370 69707069 72696E67
    732E636F 6D301F06 23 04183016 24 D 77493 80142FA3 03551D 52CF7094 B847B6EB
    1385E2E5 0F3A301D 0603551D 0E041604 142FA324 D7749352 CF7094B8 47B6EB13
    85E2E50F 3A300D06 092 HAS 8648 01040500 03818100 076EE499 12F46D79 86F70D01
    375B7EA6 C9279DA4 B32723B5 908C9FB8 D42CB978 BB24A8FE 73579A3D CA 5130, 87
    B7716644 7E13710D C6E6360C D0A36F7B F62540E2 0C33523B E50396B9 2EF66FA7
    56519E62 E55EAF3C E1D9BEC9 3AE67B59 75E61F06 B649E90A 2798F755 7A020F0A
    F8BDABFA 1EE37B6A A918560D DA45AD70 801BC66E 94D1468E
    quit smoking
    username privilege 15 secret $5 1jgO$sGD@#l4yTtLtYoEZbh/Wl steal551.
    !
    !
    door-key crypto vpn_ddaus
    pre-shared key address 0.0.0.0 0.0.0.0 - key stealthfortyfor5
    door-key crypto vpn_rmlfk
    address of pre-shared-key 205.30.134.22 key stealthfortyfor5
    !
    crypto ISAKMP policy 10
    md5 hash
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 30
    BA 3des
    preshared authentication
    Group 2
    invalid-spi-recovery crypto ISAKMP
    ISAKMP crypto keepalive 20
    !
    Configuration group isakmp crypto VPNRemote client
    key ConnectNow45
    pool ippool
    ISAKMP crypto vpnclient profile
    VPNRemote identity group match
    client authentication list for / remote
    Remote ISAKMP authorization list
    client configuration address respond
    Crypto isakmp CODS_DDAUS profile
    key ring vpn_ddaus
    function identity address 0.0.0.0
    Crypto isakmp CODS_RMLFK profile
    key ring vpn_rmlfk
    function identity address 205.30.134.22 255.255.255.255
    !
    !
    Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT
    !
    Crypto-map dynamic dynmap 10
    Set transform-set RIGHT
    vpnclient Set isakmp-profile
    Crypto-map dynamic dynmap 12
    Set transform-set RIGHT
    CODS_DDAUS Set isakmp-profile
    !
    !
    MYmap 1 ipsec-isakmp crypto map
    defined by peer 205.30.134.22
    Set transform-set RIGHT
    CODS_RMLFK Set isakmp-profile
    match address CODS_to_RMFLK
    map mymap 65535-isakmp ipsec crypto dynamic dynmap
    !
    Bridge IRB
    !
    !
    interface Loopback10
    IP 1.1.1.1 255.255.255.0
    !
    ATM0 interface
    no ip address
    route IP cache flow
    No atm ilmi-keepalive
    DSL-automatic operation mode
    !
    point-to-point interface ATM0.1
    Description $FW_OUTSIDE$ $ES_WAN$
    Check IP unicast reverse path
    inspect the DEFAULT100 over IP
    NAT outside IP
    IP virtual-reassembly
    PVC 0/35
    aal5snap encapsulation
    !
    Bridge-Group 2
    !
    interface FastEthernet0
    !
    interface FastEthernet1
    !
    interface FastEthernet2
    !
    interface FastEthernet3
    !
    interface Dot11Radio0
    no ip address
    no ip-cache cef route
    no ip route cache
    !
    encryption vlan 1 tkip encryption mode
    !
    SSID tsunami
    VLAN 1
    open authentication
    authentication wpa key management
    Comments-mode
    WPA - psk ascii 7 14231A0E01053324363F363B36150E050B08585E
    !
    base speed - 1.0 2.0 basic basic-5, 5 6.0 9.0 basic-11, 0 12.0 18.0 24.0 36.0 48.0 54.0
    root of station-role
    !
    interface Dot11Radio0.1
    encapsulation dot1Q 1 native
    no ip route cache
    no link-status of snmp trap
    No cdp enable
    Bridge-Group 1
    Bridge-group subscriber-loop-control 1
    Bridge-Group 1 covering-disabled people
    Bridge-Group 1 block-unknown-source
    No source of bridge-Group 1-learning
    unicast bridge-Group 1-floods
    !
    interface Vlan1
    Description $ETH - SW - LAUNCH, INTF-INFO-HWIC $$ $4ESW $FW_INSIDE$
    no ip address
    IP tcp adjust-mss 1452
    Bridge-Group 1
    !
    interface BVI1
    Description $ES_LAN$ $FW_INSIDE$
    192.168.7.1 IP address 255.255.255.0
    IP nat inside
    IP virtual-reassembly
    route IP cache flow
    IP tcp adjust-mss 1412
    !
    interface control2
    IP 70.14.49.134 255.255.255.0
    NAT outside IP
    IP virtual-reassembly
    crypto mymap map
    !
    local pool IP 10.10.10.1 ippool 10.10.10.254
    IP classless
    IP route 0.0.0.0 0.0.0.0 70.14.49.1
    !
    IP http server
    local IP http authentication
    IP http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    overload of IP nat inside source list 133 interface control2
    !
    CODS_to_RMFLK extended IP access list
    IP 192.168.7.0 allow 0.0.0.255 192.168.1.0 0.0.0.255
    !
    recording of debug trap
    access-list 1 permit 192.168.7.0 0.0.0.255
    access-list 100 remark self-generated by the configuration of the firewall Cisco SDM Express
    Access-list 100 = 1 SDM_ACL category note
    access-list 100 deny ip 70.14.49.0 0.0.0.255 any
    access-list 100 deny ip 255.255.255.255 host everything
    access-list 100 deny ip 127.0.0.0 0.255.255.255 everything
    access ip-list 100 permit a whole
    access-list 101 permit ip 192.168.7.0 0.0.0.255 192.168.3.0 0.0.0.255
    access-list 133 deny ip 192.168.7.0 0.0.0.255 192.168.1.0 0.0.0.255
    access-list 133 deny ip 192.168.7.0 0.0.0.255 10.10.10.0 0.0.0.255
    access-list 133 deny ip 192.168.7.0 0.0.0.255 192.168.10.0 0.0.0.255
    access-list 133 deny ip 192.168.7.0 0.0.0.255 192.168.3.0 0.0.0.255
    access-list 133 allow ip 192.168.7.0 0.0.0.255 any
    not run cdp
    mymap permit 10 route map
    corresponds to the IP 111
    set ip next-hop 1.1.1.2
    !
    !
    control plan
    !
    Bridge Protocol ieee 1
    1 channel ip bridge
    Bridge Protocol ieee 2
    IP road bridge 2
    connection of the banner ^ CAuthorized access only!
    Unplug IMMEDIATELY if you are not an authorized user. ^ C
    !
    Line con 0
    no activation of the modem
    telnet output transport
    line to 0
    telnet output transport
    line vty 0 4
    privilege level 15
    transport input telnet ssh
    !
    max-task-time 5000 Planner
    Scheduler allocate 4000 1000
    Scheduler interval 500
    end

    Hello

    Can you try to remove the IMPORT ALL of the dhcp pool

    RES
    Paul

    Sent by Cisco Support technique iPad App

  • Cisco 850 routing issues

    I am trying to configure a cisco 850 router but I can't do a ping to the outside world of Vlan1. show running-configLooks follow

    Current configuration : 5563 bytes!! Last configuration change at 15:33:02 UTC Sat Aug 13 2016 by ciscoversion 15.2no service padservice timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname fw2.myfw.tld!boot-start-markerboot-end-marker!!logging buffered 51200 warnings!aaa new-model!!!!!!!aaa session-id commonwan mode ethernet!!!ip dhcp excluded-address 10.10.10.1ip dhcp excluded-address 192.168.1.1ip dhcp excluded-address 129.x.x.5!ip dhcp pool ccp-pool import all network 192.168.1.0 255.255.255.0 dns-server 8.8.8.8 8.8.4.4  default-router 192.168.1.1  lease 0 2!         !         !         ip domain name mydomain.tldip name-server 8.8.8.8ip name-server 8.8.4.4ip cef    no ipv6 cef!         !         !         !         crypto pki trustpoint TP-self-signed-1017650632 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-1017650632 revocation-check none rsakeypair TP-self-signed-1017650632!         !         crypto pki certificate chain TP-self-signed-1017650632 certificate self-signed 01  3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030   31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274   69666963 6174652D 31303137 36353036 3332301E 170D3135 30343037 31303536   30375A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649   4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 30313736   35303633 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281   81008B15 A50BCE53 C1A10611 78247737 97E31A5D 653AF401 024B244B F96B48E0   0A1B41EE 16FBFDD1 46F2E1E2 1329D2C6 EEFBCF5B 217DE650 7D2729B0 266008F3   AC4565EA 53D7FA5B 35761F14 6FBDCFAC 24994667 CB0311A9 7FE25580 7D9564C3   BFE10A4A F5F57C4F C4E18EC9 19874BCA 03127F56 252D04B8 9465A23F FBB9045B   D9EF0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603   551D2304 18301680 146EAE54 B0C95DC2 0561F596 BC47E94B EF80617E F9301D06   03551D0E 04160414 6EAE54B0 C95DC205 61F596BC 47E94BEF 80617EF9 300D0609   2A864886 F70D0101 05050003 81810014 F5B63E51 AD80D4A0 3230E94D 3D1BE457   5D7CF78D 3C911F32 C7238D24 4A8C84D5 D5D4F744 EA2FFD5C 4A40E7A1 A517BFE3   10CC6078 5F446A15 F60EA41E 08C688AF A7834485 0991C739 F3CA38FE CFAA31E2   C72031C1 BAEFA756 719E4903 705C98A7 E20CB004 6FC82D22 D4E62E0C DBA54481   F6A68B3D AA905352 DD76B19F CD4190        quit!         !         username cisco password 0 somepasswordusername admin privilege 15 secret 5 $1$JJZR$kw8yTTHkjUGKIfB8sQiyJ0!         !         controller VDSL 0 shutdown !         ip telnet source-interface Vlan1ip ssh port 2222 rotary 1ip ssh source-interface Vlan1ip ssh rsa keypair-name 1024!         !         !         !         !         !         !         !         !         !         !         !         interface ATM0 no ip address shutdown  no atm ilmi-keepalive!         interface Ethernet0 no ip address shutdown !         interface FastEthernet0 no ip address!         interface FastEthernet1 no ip address!         interface FastEthernet2 no ip address!         interface FastEthernet3 no ip address!         interface GigabitEthernet0 no ip address!         interface GigabitEthernet1 description PrimaryWANDesc_WAN interface ip address 129.x.x.5 255.255.255.0 duplex auto speed auto!         interface Vlan1 description $ETH_LAN$ ip address 192.168.1.1 255.255.255.0 ip helper-address 192.168.1.254 ip nat inside ip virtual-reassembly in ip tcp adjust-mss 1412!         ip forward-protocol ndip http serverip http access-class 23ip http authentication localip http secure-serverip http timeout-policy idle 60 life 86400 requests 10000!         !         ip dns serverip nat inside source list nat-list interface GigabitEthernet1 overloadip route 0.0.0.0 0.0.0.0 GigabitEthernet1!         mac-address-table aging-time 15no cdp run!         !         !         banner exec ^C% Password expiration warning.-----------------------------------------------------------------------
    
    Cisco Configuration Professional (Cisco CP) is installed on this device and it provides the default username "cisco" for  one-time use. If you have already used the username "cisco" to login to the router and your IOS image supports the "one-time" user option, then this username has already expired. You will not be able to login to the router with this username after you exit this session.
    
    It is strongly suggested that you create a new username with a privilege level of 15 using the following command.
    
    username <myuser> privilege 15 secret 0 <mypassword>
    
    Replace <myuser> and <mypassword> with the username and password you want to use.
    
    -----------------------------------------------------------------------^C        banner login ^C-----------------------------------------------------------------------Cisco Configuration Professional (Cisco CP) is installed on this device. This feature requires the one-time use of the username "cisco" with the password "cisco". These default credentials have a privilege level of 15.
    
    YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE  PUBLICLY-KNOWN CREDENTIALS
    
    Here are the Cisco IOS commands.
    
    username <myuser>  privilege 15 secret 0 <mypassword>no username cisco
    
    Replace <myuser> and <mypassword> with the username and password you want to use.   
    
    IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT BE ABLE TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.
    
    For more information about Cisco CP please follow the instructions in the QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp -----------------------------------------------------------------------^C        !         line con 0 no modem enableline aux 0line vty 0 4 access-class 23 in privilege level 15 transport input telnet ssh!         scheduler allocate 60000 1000!         end   

    I am connected via the port console of the router and can ping the outside world only from port GigaEthernet1 whose IP address129.x.x.5

    Clients that connect on VLan1 get IP addresses in the range of 192.168.1.0/24 and these clients can ping each other, the gateway that is 192.168.1.1 and the GigaEthernet1 that has the intellectual property129.x.x.5

    What's not in this case?  Any suggestion is appreciated the most.

    			 
    @[email protected] / * /;
    Thanks for your post. I had a look at your configuration, and it is great that you are a few short steps on your NAT is why it does not work. Please follow the steps below in order to get this work properly.
    1. first of all, let us remove the old configuration NAT then back to a clean slate with the following commands.
    no ip nat inside source list nat-list interface GigabitEthernet1 overloadclear ip nat translation *
    2. now, we will create a list of access control allows for NAT traffic and create the new NAT statement for that tie together. * NOTE: If the version of IOS, you are running requires mask rather than generic then change 0.0.0.255 to 255.255.255.0.
    
    
    access-list 100 permit ip 192.168.1.0 0.0.0.255 anyip nat inside source list 100 interface GigabitEthernet1 overload
    3. the next step is to specify the logical role of the interfaces in question, whether they are 'inside' or ' outside'.
    
    
    interface vlan1 ip nat inside exitinterface GigabitEthernet1 ip nat outside exit
    4. Finally, save us the configuration and reload.
    
    
    copy run startreload
    After the unit is returned as a result of charging, please try again. In some cases - depending on the version of the IOS, you have to ping the outside world from a computer on the local network rather than just sourcing of the interface VLAN. Try this back and forth, and let me know how get you there. I can't wait to hear back.
    
    
    
    Kind regards
    
    
    Luke Oxley
    
    
    
    Please evaluate the useful messages and mark the correct answers.
  • L2l 1941 to ASA VPN

    Hi all

    I have a strange problem, trying to establish a VPN between my camera (1941) and a distance of ASA.

    The question is, can I say is that the IKE phase precipitates after MM6. I'm not an expert in the present, but I'll try to explain to the best of my knowledge

    Here's a cry full debugging isakmp:
    * 05:12:05.187 Jun 10: ISAKMP: (1001): serving SA., his is 3AD3BE6C, delme is 3AD3BE6C
    * Jun 10 05:12:05.259: ISAKMP: (0): profile of THE request is (NULL)
    * 05:12:05.259 Jun 10: ISAKMP: created a struct peer 41.223.4.83, peer port 500
    * 05:12:05.259 Jun 10: ISAKMP: new created position = 0x4B475724 peer_handle = 0 x 80000004
    * 05:12:05.259 Jun 10: ISAKMP: lock struct 0x4B475724, refcount 1 to peer isakmp_initiator
    * 05:12:05.259 Jun 10: ISAKMP: 500 local port, remote port 500
    * 05:12:05.263 Jun 10: ISAKMP: set new node 0 to QM_IDLE
    * 05:12:05.263 Jun 10: ISAKMP: find a dup her to the tree during the isadb_insert his 3AD3BE6C = call BVA
    * 05:12:05.263 Jun 10: ISAKMP: (0): cannot start aggressive mode, try the main mode.
    * 05:12:05.263 Jun 10: ISAKMP: (0): pair found pre-shared key matching 41.223.4.83
    * Jun 10 05:12:05.263: ISAKMP: (0): built of NAT - T of the seller-rfc3947 ID
    * Jun 10 05:12:05.263: ISAKMP: (0): built the seller-07 ID NAT - t
    * Jun 10 05:12:05.263: ISAKMP: (0): built of NAT - T of the seller-03 ID
    * Jun 10 05:12:05.263: ISAKMP: (0): built the seller-02 ID NAT - t
    * 05:12:05.263 Jun 10: ISAKMP: (0): entry = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
    * 05:12:05.263 Jun 10: ISAKMP: (0): former State = new State IKE_READY = IKE_I_MM1
     
    * Jun 10 05:12:05.263: ISAKMP: (0): Beginner Main Mode Exchange
    * Jun 10 05:12:05.263: ISAKMP: (0): lot of 41.223.4.83 sending my_port 500 peer_port 500 (I) MM_NO_STATE
    * 05:12:05.263 Jun 10: ISAKMP: (0): sending a packet IPv4 IKE.
    * 05:12:05.475 Jun 10: ISAKMP (0): received 41.223.4.83 packet dport 500 sport Global 500 (I) MM_NO_STATE
    * 05:12:05.475 Jun 10: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    * 05:12:05.475 Jun 10: ISAKMP: (0): former State = new State IKE_I_MM1 = IKE_I_MM2
     
    * Jun 10 05:12:05.475: ISAKMP: (0): treatment ITS payload. Message ID = 0
    * Jun 10 05:12:05.475: ISAKMP: (0): load useful vendor id of treatment
    * Jun 10 05:12:05.475: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 69
    * 05:12:05.475 Jun 10: ISAKMP (0): provider ID is NAT - T RFC 3947
    * Jun 10 05:12:05.475: ISAKMP: (0): load useful vendor id of treatment
    * Jun 10 05:12:05.475: ISAKMP: (0): IKE frag vendor processing id payload
    * 05:12:05.475 Jun 10: ISAKMP: (0): IKE Fragmentation support not enabled
    * 05:12:05.475 Jun 10: ISAKMP: (0): pair found pre-shared key matching 41.223.4.83
    * Jun 10 05:12:05.475: ISAKMP: (0): pre-shared key local found
    * 05:12:05.475 Jun 10: ISAKMP: analysis of the profiles for xauth...
    * 05:12:05.475 Jun 10: ISAKMP: (0): audit ISAKMP transform 1 against the policy of priority 1
    * 05:12:05.475 Jun 10: ISAKMP: AES - CBC encryption
    * 05:12:05.475 Jun 10: ISAKMP: keylength 256
    * 05:12:05.475 Jun 10: ISAKMP: SHA hash
    * 05:12:05.475 Jun 10: ISAKMP: group by default 2
    * 05:12:05.475 Jun 10: ISAKMP: pre-shared key auth
    * 05:12:05.475 Jun 10: ISAKMP: type of life in seconds
    * 05:12:05.475 Jun 10: ISAKMP: life (basic) of 28800
    * 05:12:05.475 Jun 10: ISAKMP: (0): atts are acceptable
    . Next payload is 0
    * 05:12:05.475 Jun 10: ISAKMP: (0): Acceptable atts: real life: 0
    * 05:12:05.475 Jun 10: ISAKMP: (0): Acceptable atts:life: 0
    * 05:12:05.475 Jun 10: ISAKMP: (0): base life_in_seconds:28800
    * 05:12:05.475 Jun 10: ISAKMP: (0): return real life: 28800
    * 05:12:05.475 Jun 10: ISAKMP: (0): timer life Started: 28800.
     
    * Jun 10 05:12:05.511: ISAKMP: (0): load useful vendor id of treatment
    * Jun 10 05:12:05.511: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 69
    * 05:12:05.511 Jun 10: ISAKMP (0): provider ID is NAT - T RFC 3947
    * Jun 10 05:12:05.511: ISAKMP: (0): load useful vendor id of treatment
    * Jun 10 05:12:05.511: ISAKMP: (0): IKE frag vendor processing id payload
    * 05:12:05.511 Jun 10: ISAKMP: (0): IKE Fragmentation support not enabled
    * 05:12:05.511 Jun 10: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    * 05:12:05.511 Jun 10: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM2
     
    * Jun 10 05:12:05.511: ISAKMP: (0): lot of 41.223.4.83 sending my_port 500 peer_port 500 (I) MM_SA_SETUP
    * 05:12:05.511 Jun 10: ISAKMP: (0): sending a packet IPv4 IKE.
    * 05:12:05.511 Jun 10: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    * 05:12:05.511 Jun 10: ISAKMP: (0): former State = new State IKE_I_MM2 = IKE_I_MM3
     
    * 05:12:05.727 Jun 10: ISAKMP (0): received 41.223.4.83 packet dport 500 sport Global 500 (I) MM_SA_SETUP
    * 05:12:05.727 Jun 10: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    * 05:12:05.727 Jun 10: ISAKMP: (0): former State = new State IKE_I_MM3 = IKE_I_MM4
     
    * Jun 10 05:12:05.727: ISAKMP: (0): processing KE payload. Message ID = 0
    * Jun 10 05:12:05.759: ISAKMP: (0): processing NONCE payload. Message ID = 0
    * 05:12:05.759 Jun 10: ISAKMP: (0): pair found pre-shared key matching 41.223.4.83
    * Jun 10 05:12:05.759: ISAKMP: (1003): load useful vendor id of treatment
    * Jun 10 05:12:05.759: ISAKMP: (1003): provider ID is the unit
    * Jun 10 05:12:05.759: ISAKMP: (1003): load useful vendor id of treatment
    * Jun 10 05:12:05.759: ISAKMP: (1003): provider ID seems the unit/DPD but major incompatibility of 104
    * Jun 10 05:12:05.759: ISAKMP: (1003): provider ID is XAUTH
    * Jun 10 05:12:05.759: ISAKMP: (1003): load useful vendor id of treatment
    * Jun 10 05:12:05.763: ISAKMP: (1003): addressing another box of IOS
    !
    * Jun 10 05:12:05.763: ISAKMP: (1003): load useful vendor id of treatment
    * 05:12:05.763 Jun 10: ISAKMP: (1003): vendor ID seems the unit/DPD but hash mismatch
    * 05:12:05.763 Jun 10: ISAKMP: receives the payload type 20
    * 05:12:05.763 Jun 10: ISAKMP (1003): sound not hash no match - this node outside NAT
    * 05:12:05.763 Jun 10: ISAKMP: receives the payload type 20
    * 05:12:05.763 Jun 10: ISAKMP (1003): No. NAT found for oneself or peer
    * 05:12:05.763 Jun 10: ISAKMP: (1003): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    * 05:12:05.763 Jun 10: ISAKMP: (1003): former State = new State IKE_I_MM4 = IKE_I_MM4
     
    * 05:12:05.763 Jun 10: ISAKMP: (1003): send initial contact
    * 05:12:05.763 Jun 10: ISAKMP: (1003): ITS been pre-shared key, using id ID_IPV4_ADDR type authentication
    * 05:12:05.763 Jun 10: ISAKMP (1003): payload ID
    next payload: 8
    type: 1
    address: 82.117.193.82
    Protocol: 17
    Port: 500
    Length: 12
    * 05:12:05.763 Jun 10: ISAKMP: (1003): the total payload length: 12
    * Jun 10 05:12:05.763: ISAKMP: (1003): lot of 41.223.4.83 sending my_port 500 peer_port 500 (I) MM_KEY_EXCH
    * 05:12:05.763 Jun 10: ISAKMP: (1003): sending a packet IPv4 IKE.
    * 05:12:05.763 Jun 10: ISAKMP: (1003): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    * 05:12:05.763 Jun 10: ISAKMP: (1003): former State = new State IKE_I_MM4 = IKE_I_MM5
     
    * 05:12:05.975 Jun 10: ISAKMP (1003): received 41.223.4.83 packet dport 500 sport Global 500 (I) MM_KEY_EXCH
    * Jun 10 05:12:05.975: ISAKMP: (1003): payload ID for treatment. Message ID = 0
    * 05:12:05.975 Jun 10: ISAKMP (1003): payload ID
    next payload: 8
    type: 1
    address: 41.223.4.83
    Protocol: 17
    Port: 0
    Length: 12
    * Jun 10 05:12:05.975: ISAKMP: (0): peer games * no * profiles
    * Jun 10 05:12:05.975: ISAKMP: (1003): HASH payload processing
    . Message ID = 0
    * 05:12:05.975 Jun 10: ISAKMP: received payload type 17
    * 05:12:05.979 Jun 10: ISAKMP: (1003): SA authentication status:
    authenticated
    * 05:12:05.979 Jun 10: ISAKMP: (1003): SA has been authenticated with 41.223.4.83
    * 05:12:05.979 Jun 10: ISAKMP: try to insert a 82.117.193.82/41.223.4.83/500/peer and inserted 4 B 475724 successfully.
    * 05:12:05.979 Jun 10: ISAKMP: (1003): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    * 05:12:05.979 Jun 10: ISAKMP: (1003): former State = new State IKE_I_MM5 = IKE_I_MM6
     
    * 05:12:05.979 Jun 10: ISAKMP: (1003): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    * 05:12:05.979 Jun 10: ISAKMP: (1003): former State = new State IKE_I_MM6 = IKE_I_MM6
     
    * 05:12:05.979 Jun 10: ISAKMP: (1003): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    * 05:12:05.979 Jun 10: ISAKMP: (1003): former State = new State IKE_I_MM6 = IKE_P1_COMPLETE
     
    * 05:12:05.979 Jun 10: ISAKMP: (1003): start Quick Mode Exchange, M - ID 2434392874
    * 05:12:05.979 Jun 10: ISAKMP: (1003): initiator QM gets spi
    * Jun 10 05:12:05.979: ISAKMP: (1003): lot of 41.223.4.83 sending my_port 500 peer_port 500 (I) QM_IDLE
    * 05:12:05.979 Jun 10: ISAKMP: (1003): sending a packet IPv4 IKE.
    * 05:12:05.979 Jun 10: ISAKMP: (1003): entrance, node 2434392874 = IKE_MESG_INTERNAL, IKE_INIT_QM
    * 05:12:05.979 Jun 10: ISAKMP: (1003): former State = new State IKE_QM_READY = IKE_QM_I_QM1
    * 05:12:05.979 Jun 10: ISAKMP: (1003): entry = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
    * 05:12:05.979 Jun 10: ISAKMP: (1003): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE
     
    * 05:12:06.195 Jun 10: ISAKMP (1003): received 41.223.4.83 packet dport 500 sport Global 500 (I) QM_IDLE
    * 05:12:06.195 Jun 10: ISAKMP: node set 169965215 to QM_IDLE
    * Jun 10 05:12:06.195: ISAKMP: (1003): HASH payload processing
    . Message ID = 169965215
    * Jun 10 05:12:06.195: ISAKMP: (1003): treatment protocol NOTIFIER PROPOSAL_NOT_CHOSEN 3
    0, message ID SPI = 169965215, a = 0x3AD3BE6C
    * 05:12:06.199 Jun 10: ISAKMP: (1003): error suppression node 169965215 FALSE reason 'informational (en) State 1.
    * 05:12:06.199 Jun 10: ISAKMP: (1003): entry = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
    * 05:12:06.199 Jun 10: ISAKMP: (1003): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE
     
    * 05:12:06.199 Jun 10: ISAKMP (1003): received 41.223.4.83 packet dport 500 sport Global 500 (I) QM_IDLE
    * 05:12:06.199 Jun 10: ISAKMP: node set 1149953416 to QM_IDLE
    * Jun 10 05:12:06.199: ISAKMP: (1003): HASH payload processing. Message ID = 1149953416
    * Jun 10 05:12:06.199: ISAKMP: (1003): treatment of payload to DELETE
    . Message ID = 1149953416
    * 05:12:06.199 Jun 10: ISAKMP: (1003): peer does not paranoid KeepAlive.
     
    * 05:12:06.199 Jun 10: ISAKMP: (1003): removal of HIS State "No reason" why (I) QM_IDLE (post 41.223.4.83)
    * 05:12:06.199 Jun 10: ISAKMP: (1003): error suppression node 1149953416 FALSE reason 'informational (en) State 1.
    * 05:12:06.199 Jun 10: ISAKMP: node set 613686650 to QM_IDLE
    * Jun 10 05:12:06.199: ISAKMP: (1003): lot of 41.223.4.83 sending my_port 500 peer_port 500 (I) QM_IDLE
    * 05:12:06.199 Jun 10: ISAKMP: (1003): sending a packet IPv4 IKE.
    * 05:12:06.199 Jun 10: ISAKMP: (1003): purge the node 613686650
    * 05:12:06.199 Jun 10: ISAKMP: (1003): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
    * 05:12:06.199 Jun 10: ISAKMP: (1003): former State = new State IKE_P1_COMPLETE = IKE_DEST_SA
     
    * 05:12:06.199 Jun 10: ISAKMP: (1003): removal of HIS State "No reason" why (I) QM_IDLE (post 41.223.4.83)
    * 05:12:06.199 Jun 10: ISAKMP: Unlocking counterpart struct 0x4B475724 for isadb_mark_sa_deleted(), count 0
    * 05:12:06.199 Jun 10: ISAKMP: delete peer node by peer_reap for 41.223.4.83: 4 B 475724
    * 05:12:06.203 Jun 10: ISAKMP: (1003): node-1860574422 error suppression FALSE reason 'IKE deleted.
    * 05:12:06.203 Jun 10: ISAKMP: (1003): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    * 05:12:06.203 Jun 10: ISAKMP: (1003): former State = new State IKE_DEST_SA = IKE_DEST_SA
     
    * 05:12:25.187 Jun 10: ISAKMP: (1002): purge the node 1140237073

    Installed IOS is c1900-universalk9-mz. Spa. 154 - 3.M5.bin

    Before that, I had 15.3, same thing.

    BGPR1 # running sho
    Building configuration...
     
    Current configuration: 5339 bytes
    !
    ! Last configuration change at 05:19:14 UTC Friday, June 10, 2016 by boris
    !
    version 15.4
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    encryption password service
    !
    hostname BGPR1
    !
    boot-start-marker
    start the system flash0:c1900 - universalk9-mz. Spa. 154 - 3.M5.bin
    boot-end-marker
    !
    !
    logging buffered 51200 warnings
    !
    No aaa new-model
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    IP flow-cache timeout active 1
    IP cef
    No ipv6 cef
    !
    Authenticated MultiLink bundle-name Panel
    !
    CTS verbose logging
    !
    Crypto pki trustpoint TP-self-signed-
    enrollment selfsigned
    name of the object cn = IOS-Self-signed-certificate-
    revocation checking no
    rsakeypair TP-self-signed-3992366821
    !
    !
    chain pki crypto TP-self-signed certificates.
    certificate self-signed 01
    quit smoking
    udi pid CISCO1941/K9 sn CF license
    !
    !
    username
    username
    !
    redundancy
    !
    !
    !
    No crypto ikev2 does diagnosis error
    !
    !
    !
    !
    crypto ISAKMP policy 1
    BA aes 256
    preshared authentication
    Group 2
    lifetime 28800
    isakmp encryption key * address 41.223.4.83
    !
    !
    Crypto ipsec transform-set Meridian ah-sha-hmac esp - aes 256
    tunnel mode
    !
    !
    !
    Meridian 10 map ipsec-isakmp crypto
    VODACOM VPN description
    defined by peer 41.223.4.83
    86400 seconds, life of security association set
    the transform-set Meridian value
    match address 100
    !
    !
    !
    !
    !
    the Embedded-Service-Engine0/0 interface
    no ip address
    Shutdown
    !
    interface GigabitEthernet0/0
    Description peer na Telekom
    IP 79.101.96.6 255.255.255.252
    penetration of the IP stream
    stream IP output
    automatic duplex
    automatic speed
    No cdp enable
    !
    interface GigabitEthernet0/1
    Description peer na SBB
    IP 82.117.193.82 255.255.255.252
    penetration of the IP stream
    stream IP output
    automatic duplex
    automatic speed
    No cdp enable
    Meridian of the crypto map
    !
    interface FastEthernet0/0/0
    no ip address
    !
    interface FastEthernet0/0/1
    no ip address
    !
    interface FastEthernet0/0/2
    no ip address
    !
    interface FastEthernet0/0/3
    switchport access vlan 103
    no ip address
    !
    interface Vlan1
    IP 37.18.184.1 255.255.255.0
    penetration of the IP stream
    stream IP output
    !
    interface Vlan103
    IP 10.10.10.1 255.255.255.0
    !
    router bgp 198370
    The log-neighbor BGP-changes
    37.18.184.0 netmask 255.255.255.0
    10.10.10.2 neighbor remote - as 201047
    map of route-neighbor T-OUT 10.10.10.2 out
    neighbour 79.101.96.5 distance - 8400
    neighbor 79.101.96.5 fall-over
    neighbor 79.101.96.5 LOCALPREF route map in
    79.101.96.5 T-OUT out neighbor-route map
    neighbour 82.117.193.81 distance - as 31042
    neighbor 82.117.193.81 fall-over
    neighbor 82.117.193.81 route LocalOnly outside map
    !
    IP forward-Protocol ND
    !
    IP as path access list 10 permit ^ $
    IP as path access list 20 permits ^ $ 31042
    no ip address of the http server
    local IP http authentication
    no ip http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    IP flow-export Vlan1 source
    peer of IP flow-export version 5 - as
    37.18.184.8 IP flow-export destination 2055
    !
    IP route 37.18.184.0 255.255.255.0 Null0
    IP route 104.28.15.63 255.255.255.255 79.101.96.5
    IP route 217.26.67.79 255.255.255.255 79.101.96.5
    !
    !
    IP-list of prefixes Filter_IN_Telekom seq 10 permit 0.0.0.0/0
    !
    T-OUT route map permit 10
    match 10 way
    !
    route allowed LOCALPREF 10 map
    set local preference 90
    !
    SBBOnly allowed 10 route map
    20 as path game
    !
    LocalOnly allowed 10 route map
    match 10 way
    !
    !
    m3r1d1an RO SNMP-server community
    Server SNMP ifindex persist
    access-list 100 permit ip host 37.18.184.4 41.217.203.234
    access-list 100 permit ip host 37.18.184.169 41.217.203.234
    !
    control plan
    !
    !
    !
    Line con 0
    Synchronous recording
    local connection
    line to 0
    line 2
    no activation-character
    No exec
    preferred no transport
    transport output pad rlogin lapb - your MOP v120 udptn ssh telnet
    StopBits 1
    line vty 0 4
    privilege level 15
    local connection
    entry ssh transport
    line vty 5 15
    privilege level 15
    local connection
    entry ssh transport
    !
    Scheduler allocate 20000 1000
    !
    end
     
    BGPR1 #.

    BGPR1 #sho cry isa his

    IPv4 Crypto ISAKMP Security Association

    DST CBC conn-State id

    41.223.4.83 82.117.193.82 MM_NO_STATE 1106 ACTIVE (deleted)

    41.223.4.83 82.117.193.82 MM_NO_STATE 1105 ACTIVE (deleted)

    For "sho cry ipsec his" I get only a lot of mistakes to send.

    For the other end, I had all the settings, I have no access to this device, they insist that this is a simple installation and that any problem is on my side.

    I tried to juggle the order of the access list, life card crypto security association and all "googlable" solutions, that I could find.

    Any input appreciated.

    Corresponds to the phase 2 double-checking on the SAA, including PFS.

    crypto ipsec transform-set meridian ah-sha-hmac esp-aes 256  mode tunnel

Maybe you are looking for

  • Satellite Pro M70: System is missing or damaged

    My lapwork does not work, all he said when he starts, windows\system32\config\system is missing or damaged, what it means? It says I need to repair it using the original installation CD, which I did not.

  • Tecra S5 - Docking Station Drivers

    Do you get Docking Station Drivers for this laptop... Windows (32 bit) FrançoiseSouth Africa - Cape Town

  • RVL200 ssl vpn, I'm not able to access resources network or ping of the Home Office

    I had installed a Linksys router using port forwarding to allow remote access to the server desktop remotely. I had some problems with it and I've always wanted a vpn connection to the office, but I could not ' operate. So I bought the RVL200 after t

  • Error on the UPS Firmware Dell Update utility

    Hello I got the error "No UPS connected or not able to make the connection" the inverter is connected by USB.  I have RS232 or USB enabled in the upgrade utility. I'm under UPS Local Node Manager, that's how I know that the UPS USB connection is good

  • Media Center PC with the wrong message of impending HD

    I have a m8530f round with some hard drive problems.  After cold session, during the first boot I get the message "failure of imminent hard drive...". "After you start a second time, no HD is detected at all during the post, as if the SATA interface