linkup HP

I have a problem installing HP Linkup on my HP desktop to my laptop remotely.  In step 1 (installing HP Linkup on the remote computer) after through the procedure, a file called HP Linkup did not appear. Two new files called HP Linkup diagnosis and help appear. A ran the tests for diagnosis and every thing jn that he checked well.  Went back to my HP desktop computer to continue implementing (2 connect a remote computer).  In her select a remote computer box was the name I called my laptop.  Clicked in computing and green bar scanning ran at the end and Hung there.  Can't go tostep 3 (Journal of computation of distance)

Returned to the help of the remote control and found file here.  Could not find counsel for the HP software so I chose this card.

[edited by Moderator]

Hello bruceperrine1,

Welcome to the HP Forums, I hope you enjoy your experience! To help you get the most out of the Forums of HP, I would like to draw your attention to the Guide of the Forums HP first time here? Learn how to publish and more.

I understand that you are having problems getting HP Linkup connect properly. I'm you provide a document from HP support: HP's LinkUp with access computers remotely on a home network that provides the steps necessary to configure the software and troubleshooting down.

Please re-post if you need extra support. Thanks for posting on the HP Forums. Have a great day!

Tags: HP Desktops

Similar Questions

  • on the new program go/linkup can I move a file from desktop to laptop?

    You just bought the Pavilion HPE it came with GB/linkup. I put in place and wanted to move some files I have scanned my laptop. Can it be done?

    Yes, it can be done. Consult the following link which will help you to do:

    http://support.HP.com/us-en/document/c02540572

  • HP Linkup put in place the question

    Can anyone help with a problem of HP Linkup?

    I have followed the instructions on my Touchsmart PC, downloaded the Linkup file to my laptop remotely. But when running through the implementation on the remote computer, after saying me, he recognizes the name of password and the computer, when trying to connect to my Touchsmart, I don't then get a message saying that he does not recognize the name / password? What should I do?

    Hello AndyGTC:

    I guess it's a wizard synchronization in both computers. Each computer must be in harmony with each other. I would leave her alone if she does not ruin things on computers.

  • HP ultra Norebook: HP Linkup Viewer

    How do install (download)? LinkUp Viewer on my laptop?

    Thanks also for the quick response. Of course, I am disappointed and now will have to resort to an alternative like Teamviewer for my needs. I really like the app Linkup and used it for my other computers for some time. Agai thanks and best wishes.

  • R5 - 471 T - 71W with wireless card Atheros QCA61x4A unable to reach linkup with Linksys WRT1900AC AC

    Hello, I have laptop Aspire R5 - 471T - 71W with the NIC of the Qualcomm Atheros QCA61x4A wireless. I have the Linksys WRT1900AC wireless router configuration to support the chain of 80 MHz, I have the latest Firmware & drivers for installed devices. Run Win10 pro on the Aspire. Even in the same room that the WRT1900AC router, longs it reached only 802.11n connection speed. How will I know if I'm actually in 802.11ac and Win10 falsely reported my connection speed using the details of the network & sharing Panel as 300Mbps?

    Hello Jordan,.

    Thanks for the pointer... I had two bands with separate SSID. Channels of communication were also in automatic. What I didn't have was the network Mode in the joint framework. Documentation of Linksys seems to be lacking on how these parameters affect the configuration of the WRT1900AC AC speed.

    I am now at 866,3 Mbit/s.

    Thank you for your prompt and accurate diagnosis of the root cause.

    Steven Sutherland

  • TouchSmart 300-1115uk: nothing happens on the touchsmart button

    Hello I have a touchsmart 300-1115uk that I just bought this camera from a friend who in his day. so I did a freash install windows 7 64 bit and everything has gone great but then watched some utubes on this machine and see pushing them the button of the interface (little house in the lower-right corner of the screen), but when I hit my nothing happens I have looked for drivers, but can't find one for this button. Please can you how to get this interface running as seems very convenient

    Many thanks tim

    Unfortunately software TouchSmart not is not supported in Windows 8.

    This article is that a good read if you have decided to upgrade to a HP for Windows 8 desktop PC:

    http://support.HP.com/us-en/document/c03457468

    In this document, it is caveat:

    WARNING: HP Linkup, Wizard of Application HP, HP TouchSmart Magic Canvas and all other HP TouchSmart applications are not compatible with Windows 8 and must be uninstalled before the upgrade. The content that is created by using the TouchSmart applications as Graffiti will be unavailable after the upgrade.
  • Can I use my .iso in Windows 8, but are unable to right boot screen!

    I would like my HP TouchSmart 520-1031 to Windows 8. Impossible to get to the screen to start USB boot. I used the Fn keys to try to do. NOT good. My splash screen does not function Fn key to do this, and it starts too soon. What happened with that anyway? How to fix this or that?

    Please see the settings of the BIOS for the motherboard Angelino2, HP PC - UEFI and the Start Menuand desktop HP - upgrade from Windows 7 to Windows 8 for more information on access to BIOS, access to the "Boot Menu" and questions you may encouter during the upgrade to Windows 8.

    Not all the features of Windows 8 may be available on all Windows 7 computers. Your computer may require hardware, software, firmware or upgrade the BIOS to install and run Windows 8.

    Secure boot is not available on any computer or HP consumer desktop computer all-in-One.

    If you purchased your computer before October 1, 2011, HP has not tested or developed the drivers for your model computer. Therefore, an upgrade of your computer may be difficult, if not impossible.

    HP recommends to install the 64 bit version of Windows 8 for desktop computers.

    Not all the features of Windows 8 will be available on all computers, and your particular experience with Windows 8 is determined by the capabilities of your computer.

    Software designed for Windows 7 systems or previous operating may not work after installing Windows 8.

    HP provides a compatible software Windows 8 and drivers updated to support only specific computer models.

    You may not be able to watch movies on DVD after the upgrade. If you currently use a DVD codec to play DVD movies, such as the encoder that comes with Windows 7 Professional, this encoder are not available after the upgrade to Windows 8. To continue to read the DVD after upgrading, go to http://windows.microsoft.com/en-US/windows-8/feature-packs to download Windows Media Center or purchase a DVD playback software.
    If you are currently using HP's DVD playback software, the installation process of Windows 8 helps you determine if your playback software is compatible with Windows 8, or if an update is required. If the software is compatible and you perform an upgrade in place, you have the option to keep this software during the upgrade. If you perform a clean installation, you must reinstall the software after the upgrade.

    Windows 7 PCs with touch won't fully Windows 8 touch features after upgrade. HP PC with touch input material designed for Windows 7 will provide a comparable experience to point applications to touch only two after the upgrade to Windows 8. Computers Windows HP with touch input material will not support Windows 8 applications that require more than two simultaneous points of contact.

    WARNING: HP Linkup, Wizard of Application HP, HP TouchSmart Magic Canvas and all other HP TouchSmart applications are not compatible with Windows 8 and must be uninstalled before the upgrade. Content created using the TouchSmart applications as Graffiti will be unavailable after the upgrade

    In general, pressing "ESC" to light, will bring up a menu of about 6 items, as shown in the example below;

    Press "F9" key when on this menu to access the Menu "Boot". Select the boot device you want to use the "Start menu", as shown in the example below.

    If you have any other questions, feel free to ask.

    Please click the 'Thumbs Up' white LAURELS to show your appreciation

  • Link to the top without password

    Hello

    The link to the top is fabulous and works well.

    But is it possible to use it without a password?

    We have a very secluded home network.

    See you soon

    Hello desktopbilly,

    HP Linkup support documentation

    "NOTE: HP LinkUp requires a user name and password to connect to the computer." If the current user account doesn't have a password, you're prompted to create one now. »

    Since it is a powerful tool that if it has been accidentally accessible could lead to a lot of questions, it is important that it is password protected access.

    Using HP LinkUp to access remote network computers home

  • Newer HP model

    Hi everyone has a problem with 610xt smart touch. I would like to know before you buy this computer

    I didn't know personally the questions appear on the 610 s. It is a PC brand new, just released this month. I have no home, but I have one at work and it seems perfectly fulfil and has some new features such as Beats Audio and HP LinkUp (software that allows you to directly control the other computers on your home network via the TouchSmart).

  • N3024 snmp trouble with openmanage switch.

    Hello

    I have two new N3024 that I want to manage with openmanage essentials.
    I configured N3024 with a name of community and also put in place a notification recipients.

    The two switches openmanage shows upp under devices.
    But they both have a yellow alert on them.
    If I try to go to the web interface of openmanage, it takes me to the address 0.0.0.0
    Under general / health in the switch I see nothing wrong.
    What is the problem?

    I also try to get the N3024 to send traps.
    I have test it with linkup and linkdown.
    The newspaper of trap on the switch that I can that a trap is generated but in openmanage nothing comes in.
    I have no problem with any other material traps.
    Any suggestions on what I am doing wrong?

    In general the latest firmware has several improvements on the 6.1 firmware SNMP protocol. After the upgrade is done we should test and see if all the problems are solved. If this isn't the case, then we can look in that still does not work.

  • Cannot ping port host MD3000i on RC0

    Hello

    I have set up my iSCSI network, as suggested in this post:

    http://en.community.Dell.com/TechCenter/storage/w/wiki/MPIO-to-PowerVault-MD3000i-with-Microsoft-iSCSI-initiator.aspx

    I can only ping the ports of controller RAID 1 (two ports). All of my iSCSI traffic is drunk through the controller. Windows Server 2008R2 (R710/810), but also an ESXi 4.1 cluster (R610 and PE2950) access the dedicated iSCSI network. I contacted the support a few weeks ago, and they have replaced the MD3000i RAID controllers as well as the background. They are insistent that there is a configuration problem and would not assist any more beyond to send me links suggested configs. I went through the Setup on the R810 (Windows 2008R2) from scratch. This has not produced different results. Then I updated all drivers (BCM5709Cs) NETWORK card and software on all hosts, successfully restarted the MD3000i and the two MD1000s bike powered two switches HP Procurve 1400 and restarted all hosts. I can't always ping RC0. I Putty and captured RC0 boot logs, but it was not obvious to me. Here are the logs of boot:

    -=<###>=-
    Set the interface lo0... done

    Autonomous 9768 symbols added.
    Error
    03/26/13-16:44:29 (GMT) (tRootTask): NOTE: I2C transaction returned 0x0423fe00

    ATTENTION: Reset by spare controller

    Current date: 26/03/13 time: 09:26:15

    Send Change Service Interface rate or baud
    03/26/13-16: 44:46 (GMT) (NCDB): NOTE: sequence SOD is Normal, 0
    03/26/13-16: 44:46 (GMT) (NCDB): NOTE: SOD: removed host SAS from index 0
    03/26/13-16: 44:46 (GMT) (NCDB): NOTE: in iscsiIOQLIscsiInitDq.  iscsiIoFstrBase = 0 x 0
    03/26/13-16: 44:46 (GMT) (NCDB): NOTE: turn on seeing failure summary tray
    03/26/13-16: 44:48 (GMT) (NCDB): NOTE: SYMBOL: SYMbolAPI registered.
    esmc0: event LinkUp
    03/26/13-16: 44:50 (GMT) (tNetCfgInit): NOTE: the loan network
    03/26/13-16: 44:51 (GMT) (NCDB): NOTE: channel initiating Drive: ioc:0 bringup
    03/26/13-16: 44:54 (GMT) (NCDB): NOTE: the Firmware Version of the IOC: 00-24-63-00
    03/26/13-16: 45:17 (GMT) (tSasEvtWkr): NOTE: sasIocPhyUp: chan: 0 phy:0 prevNumActivePhys:2 numActivePhys:2
    03/26/13-16: 45:17 (GMT) (tSasEvtWkr): NOTE: sasIocPhyUp: chan: 0 phy:1 prevNumActivePhys:2 numActivePhys:2
    03/26/13-16: 45:17 (GMT) (tSasEvtWkr): NOTE: sasIocPhyUp: chan: 1 phy:2 prevNumActivePhys:2 numActivePhys:2
    03/26/13-16:45:18 (GMT) (tSasEvtWkr): NOTE: sasIocPhyUp: chan: 1 phy:3 prevNumActivePhys:2 numActivePhys:2
    03/26/13-16:45:18 (GMT) (tSasCfg021): NOTE: path of the Alt up - chan: 0 phy:18 itn:1 controller
    03/26/13-16:45:18 (GMT) (tSasCfg022): NOTE: path of the Alt up - chan: 1 phy:16 itn:2 controller
    03/26/13-16:45:18 (GMT) (IOSched): NOTE: discoveredEncl: enclosure: 1, enclProp: x2c50104, trayId: slotCount 2:15
    03/26/13-16: 45:19 (GMT) (NCDB): NOTE: IonMgr: Drive Interface enabled
    03/26/13-16: 45:19 (GMT) (NCDB): NOTE: SOD: instantiation Phase complete
    03/26/13-16: 45:19 (GMT) (NCDB): NOTE: controller between open Communication channels
    03/26/13-16: 45:19 (GMT) (IOSched): NOTE: initiator of news: 1 - channel: 1, devHandle: x2c, SAS address: 590b11c41a9d8b00
    03/26/13-16: 45:19 (GMT) (tSasDiscCom): NOTE: complete a discovery SAS task created
    03/26/13-16: 45:19 (GMT) (NCDB): NOTE: LockMgr role is slave
    03/26/13-16: 45:19 (GMT) (IOSched): NOTE: discoveredEncl: enclosure: 1, enclProp: x2c9516c, trayId: slotCount 2:15
    03/26/13-16: 45:19 (GMT) (IOSched): NOTE: new initiator: 2 - channels: 0, devHandle: x1a, SAS address: 590b11c41a9d8b01
    03/26/13-16: 45:21 (GMT) (IOSched): NOTE: discoveredEncl: Speaker: 2, enclProp: x2c8f730, trayId: 1, slotCount: 15
    03/26/13-16: 45:21 (GMT) (sasCheckExpanderSet): NOTE: Expander Firmware Version: 0116-e05c
    03/26/13-16: 45:21 (GMT) (sasCheckExpanderSet): NOTE: address SAS Expander: salvation = Low = xf6ac8d10 x5848f694
    03/26/13-16: 45:21 (GMT) (tSasDiscCom): WARN: SAS: Initial full time of discovery: 33 seconds
    03/26/13-16: 45:21 (GMT) (IOSched): NOTE: discoveredEncl: Speaker: 2, enclProp: x2c66ad4, trayId: 1, slotCount: 15
    03/26/13-16: 45:22 (GMT) (NCDB): NOTE: spmEarlyData: from alternate data
    03/26/13-16: 45:22 (GMT) (NCDB): NOTE: WWN baseName (valid ==> SigMatch) 00040026-b95795de

    03/26/13-16: 45:23 (GMT) (NCDB): NOTE: ionEnableHostInterfaces is waiting for a channel lends itself
    03/26/13-16: 45:26 (GMT) (NCDB): NOTE: ionEnableHostInterfaces expected 3800ms for a channel lends itself
    03/26/13-16: 45:26 (GMT) (NCDB): NOTE: IonMgr: Host Interface enabled
    03/26/13-16: 45:26 (GMT) (NCDB): NOTE: SOD: pre to complete initialization Phase
    03/26/13-16: 45:47 (GMT) (NCDB): NOTE: ACS: autoCodeSync(): beginning of the process. Comm mode: 0, State: 1
    03/26/13-16: 45:47 (GMT) (NCDB): NOTE: SOD: complete Phase initialization Code synchronization
    03/26/13-16: 45:48 (GMT) (NvpsPersistentSyncM): NOTE: persistent storage NVSRAM updated successfully
    03/26/13-16: 45:48 (GMT) (NCDB): NOTE: initialization complete USM Mgr with 0 records.
    03/26/13-16: 45:49 (GMT) (NCDB): NOTE: BDU - received 1 small files
    03/26/13-16: 45:49 (GMT) (NCDB): NOTE: BDU - received 0 records of great
    03/26/13-16: 45:50 (GMT) (NCDB): NOTE: acquire 0.035 dry
    03/26/13-16: 45:53 (GMT) (NCDB): NOTE: QLStartFw: FW drive download image 03.00.01.47 033eab00 4c0c8 bytes, result 0
    03/26/13-16:45:55 (GMT) (tRAID): NOTE:  ********************************************************************************
    03/26/13-16:45:55 (GMT) (NCDB): NOTE: Application target QLogic, 2.01.08 Version 2005-06-13 (W2K)
    03/26/13-16:45:55 (GMT) (NCDB): NOTE: iSCSI Target Application
    03/26/13-16:45:55 (GMT) (tRAID): NOTE:   ********************************************************************************
    03/26/13-16: 45:56 (GMT) (NCDB): NOTE: QLInitializeFW: iSNS Server 0.0.0.0:3205
    03/26/13-16: 45:56 (GMT) (NCDB): NOTE: QLInitializeFW: ISNSServerIPv6Addr 00:00:00:00:00:00:00:00: 3205
    03/26/13-16: 45:56 (GMT) (NCDB): NOTE: QLInitializeFW: iSCSI name iqn.1984 - 05.com.dell:powervault.md3000i.60026b90005795de000000004b2ae7b6
    03/26/13-16: 45:56 (GMT) (NCDB): NOTE: QLInitializeFW: port = 0, turn on IPv4 = 1, turn on IPv6 = 0
    03/26/13-16: 45:56 (GMT) (NCDB): NOTE: QLInitializeFW: 10.182.233.250:3260 IP address
    03/26/13-16: 45:56 (GMT) (NCDB): NOTE: QLInitializeFW: Firmware waiting for DHCP lease.  State 18
    03/26/13-16: 45:56 (GMT) (NCDB): NOTE: QLInitializeFW: 18 FwState 000/010 of time
    03/26/13-16: 45:57 (GMT) (NCDB): NOTE: QLInitializeFW: 10/01/00 18 FwState of time
    03/26/13-16: 45:58 (GMT) (NCDB): NOTE: QLInitializeFW: 10/02/00 18 FwState of time
    03/26/13-16: 45:58 (GMT) (IOSched): NOTE: QLIsrDecodeMailbox: Port 0 bind upward.
    03/26/13-16: 45:59 (GMT) (NCDB): NOTE: QLInitializeFW: 10/03/00 FwState time 0
    03/26/13-16: 46:00 (GMT) (NCDB): NOTE: QLInitializeFW: port = 1, turn on IPv4 = 1, turn on IPv6 = 0
    03/26/13-16: 46:00 (GMT) (NCDB): NOTE: QLInitializeFW: 10.182.232.250:3260 IP address
    03/26/13-16: 46:00 (GMT) (NCDB): NOTE: QLInitializeFW: Firmware waiting for DHCP lease.  State 18
    03/26/13-16: 46:00 (GMT) (NCDB): NOTE: QLInitializeFW: 18 FwState 000/010 of time
    03/26/13-16: 46:01 (GMT) (NCDB): NOTE: QLInitializeFW: 10/01/00 18 FwState of time
    03/26/13-16: 46:02 (GMT) (NCDB): NOTE: QLInitializeFW: 10/02/00 18 FwState of time
    03/26/13-16: 46:03 (GMT) (NCDB): NOTE: QLInitializeFW: 10/03/00 FwState 18 time
    03/26/13-16: 46:03 (GMT) (IOSched): NOTE: QLIsrDecodeMailbox: Port 1 link up.
    03/26/13-16: 46:04 (GMT) (NCDB): NOTE: QLInitializeFW: 10/04/00 FwState time 0
    03/26/13-16: 46:05 (GMT) (NCDB): NOTE: PM - reading DB (record 1.0)
    03/26/13-16: 46:08 (GMT) (t1): NOTE: QLTA_HandleTeb: Connect ports 0
    03/26/13-16: 46:08 (GMT) (t3): NOTE: QLTA_HandleTeb: port 1 link up
    03/26/13-16: 46:09 (GMT) (t2): WARN: QLTA_Handleteb: 72 event Code.
    03/26/13-16: 46:09 (GMT) (t4): WARN: QLTA_Handleteb: 72 event Code.
    03/26/13-16: 46:09 (GMT) (NCDB): NOTE: CCM: sodMirrorCheckIn() waiting alt cache check in mirror...
    03/26/13-16: 46:10 (GMT) (NCDB): WARN: CCM: initMirrorAltChkIn() may not reflect
    03/26/13-16: 46:11 (GMT) (NCDB): NOTE: CCM: initialize(): cache configuration
    03/26/13-16: 46:11 (GMT) (NCDB): NOTE: from UWManager::initialize, 510, the invalid index - 1 entries
    03/26/13-16: 46:11 (GMT) (NCDB): NOTE: NVSRAM IW queue size is 0
    03/26/13-16: 46:16 (GMT) (NCDB): NOTE: RTR: IO released
    03/26/13-16: 46:17 (GMT) (NCDB): NOTE: SOD: initialization Phase complete
    ==============================================
    Title: Disk Array Controller
    Copyright 2005 - 2011 LSI Logic Corporation, all rights reserved.

    Name: RC
    Version: 07.35.39.64
    Date: 16/08/2011
    Time: 14:24:32 CDT
    Models: 1532
    Manager: devmgr.v1035api01.Manager
    ==============================================

    03/26/13-16: 46:17 (GMT) (NCDB): NOTE: sodMain of the sequence is complete, elapsed time = 90 seconds
    03/26/13-16: 46:17 (GMT) (NCDB): NOTE: complete sodMain
    03/26/13-16: 46:17 (GMT) (EventGateManager): WARN: GMOS: 8 events of creation for objects that already exist

    IPs I can ping: 10.182.232.251 and 10.182.233.251 (both on RC1). I can even ping all other iSCSI host initiator ports! I hope I gave enough information about me for some answers. Please advise!

    Thank you.

    What are the 4 IP addresses and subnets for the 4 the MD3000i iSCSI ports?

    ISCSI controller 0 port 0?: (guess 10.182.232.250/24)

    ISCSI 0 1 controller port?: (guess 10.182.233.250/24)

    Controller 1 iSCSI port 0: 10.182.232.251 24 (hypothesis on the mask)

    Port of iSCSI controller 1 1: 10.182.233.251 24 (hypothesis on the mask)

    Wiring must be:

    iSCSI 1 Switch / VLAN:

    ISCSI controller 0 port 0

    ISCSI controller 1 port 0

    Server 1 iSCSI port 0 (in the subnet 10.182.232.x 24)

    etc.

    iSCSI Switch 2 / VLAN:

    ISCSI 0 1 controller port

    ISCSI 1 1 controller port

    Server 1 iSCSI port 0 (in the subnet 10.182.233.x 24)

    etc.

    To test iSCSI on controller 0 port, take a cell phone with a Gbit ethernet port (any modern laptop should have it), connect the ethernet controller iSCSI 0 0, 10.182.232.100 port value IP from the laptop and try to ping 10.182.232.250 (assuming that it comes to the INVESTIGATION period on this port). If it works, change the IP of the laptop to 10.182.233.100 and move the cable to the iSCSI port 1 and try to ping 10.182.233.250 and see if you can ping the IP address.

    If these two are working, the first thing that comes to mind is that the port 0 and 1 have their swapped cables.

  • Force10 problem and Dell Openmanage Network Manager snmp

    Hello

    I have install snmp on Force10: traps, string community, I have also setup set up on omnm, but for some reason, I could not authenticate with F10, please find config below as well as key details:

    Dell10G-1 #show running-config

    Current configuration...

    ! Version 9.0 (1.3)

    ! Last modification of the configuration to Fri Feb 21 14:07:21 2014 by default

    ! Startup-config updated Fri Feb 21 12:50:21 2014 by default

    !

    start the primary system battery-unit 1: A:

    start a system secondary battery-unit 1: B:

    start the system default stack-unit 1: A:

    start the primary system battery-unit 2: A:

    start a system secondary battery-unit 2: B:

    start the system default stack-unit 2: A:

    !

    redundancy full automatic synchronization

    !

    hostname Dell10G-1

    !

    enable password 7 b125455cf679b208d3169fc631698be5722a1b01b7edad00

    !

    username admin password 7 269672acad1160b3ff0b65cde5149f32

    !

    no activation of dcb

    !

    disposal of battery-unit 1 S5000

    !

    stack stack-unit 1-group 14

    !

    stack stack-unit 1-group 15

    !

    TenGigabitEthernet-1/0 interface

    no ip address

    hybrid portmode

    switchport

    TrustDSCP of service-policy input

    no downtime

    !

    interface TenGigabitEthernet 1/1

    no ip address

    hybrid portmode

    switchport

    TrustDSCP of service-policy input

    no downtime

    !

    interface TenGigabitEthernet 1/2

    no ip address

    hybrid portmode

    switchport

    TrustDSCP of service-policy input

    no downtime

    !

    interface TenGigabitEthernet 1/3

    no ip address

    hybrid portmode

    switchport

    TrustDSCP of service-policy input

    no downtime

    !

    interface TenGigabitEthernet 1/4

    no ip address

    hybrid portmode

    switchport

    TrustDSCP of service-policy input

    no downtime

    !

    interface TenGigabitEthernet 1/5

    no ip address

    hybrid portmode

    switchport

    TrustDSCP of service-policy input

    no downtime

    !

    interface TenGigabitEthernet 1/6

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/7

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/8

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 9/1

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/10

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/11

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/12

    no ip address

    hybrid portmode

    switchport

    TrustDSCP of service-policy input

    no downtime

    !

    interface TenGigabitEthernet 1/13

    no ip address

    hybrid portmode

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/14

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/15

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/16

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/17

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/18

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 1/19

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 1/20

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 1/21

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 1/22

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 1/23

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 1/24

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/25

    EQL-con2 description

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/26

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/27

    no ip address

    hybrid portmode

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/28

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/29

    no ip address

    hybrid portmode

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/30

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/31

    no ip address

    hybrid portmode

    switchport

    no downtime

    !

    interface TenGigabitEthernet 1/32

    no ip address

    no downtime

    !

    interface TenGigabitEthernet 1/33

    no ip address

    Shutdown

    !

    TenGigabitEthernet 1/34 interface

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 1/35

    no ip address

    Shutdown

    !

    interface 1/48 fortyGigE

    no ip address

    Shutdown

    !

    interface fortyGigE 1/52

    no ip address

    Shutdown

    !

    disposal of battery-unit 2 S5000

    !

    stack stack-unit 2-group 14

    !

    stack stack-unit 2-group 15

    !

    TenGigabitEthernet-2/0 interface

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/1

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/2

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/3

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/4

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/5

    no ip address

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/6

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/7

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/8

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 9/2

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/10

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/11

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/12

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/13

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/14

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/15

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/16

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/17

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/18

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/19

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/20

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/21

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/22

    no ip address

    Shutdown

    !

    interface TenGigabitEthernet 2/23

    no ip address

    no downtime

    !

    interface TenGigabitEthernet 2/24

    EQL-con1 description

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/25

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/26

    no ip address

    hybrid portmode

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/27

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/28

    no ip address

    hybrid portmode

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/29

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/30

    no ip address

    hybrid portmode

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/31

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/32

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/33

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    TenGigabitEthernet 2/34 interface

    no ip address

    MTU 12000

    switchport

    no downtime

    !

    interface TenGigabitEthernet 2/35

    no ip address

    Shutdown

    !

    interface fortyGigE 2/48

    no ip address

    Shutdown

    !

    interface fortyGigE 2/52

    no ip address

    Shutdown

    !

    interface ManagementEthernet 0/0

    no downtime

    !

    ManagementEthernet 1/0 interface

    IP address 10.0.0.30/24

    no downtime

    !

    ManagementEthernet 2/0 interface

    IP address 10.0.0.25/24

    no downtime

    !

    ManagementEthernet 3/0 interface

    no downtime

    !

    ManagementEthernet 4/0 interface

    no downtime

    !

    ManagementEthernet-5/0 interface

    no downtime

    !

    ManagementEthernet 6/0 interface

    no downtime

    !

    ManagementEthernet 7/0 interface

    no downtime

    !

    ManagementEthernet-8/0 interface

    no downtime

    !

    interface ManagementEthernet 9/0

    no downtime

    !

    ManagementEthernet-10/0 interface

    no downtime

    !

    ManagementEthernet-11/0 interface

    no downtime

    !

    interface Vlan 1

    ! unidentified TenGigabitEthernet-1/0-17, 27, 29, 31

    ! unidentified TenGigabitEthernet 2/2,5,26,28,30

    !

    Vlan 100 interface

    ISCSI description

    iSCSI name

    no ip address

    tagless TenGigabitEthernet 1/24-26, 28, 30

    tagless TenGigabitEthernet 2/24-25, 27, 29, 31-34

    no downtime

    !

    interface Vlan 150

    VMotion description

    no ip address

    Tagged TenGigabitEthernet 1/27,29,31

    Tagged TenGigabitEthernet 2/26,28,30

    Shutdown

    !

    interface Vlan 999

    Speech description

    the voice name

    no ip address

    Tagged TenGigabitEthernet 1/0-3, 5, 12-13

    no downtime

    !

    interface Vlan 4000

    no ip address

    Shutdown

    !

    interface Vlan 4001

    no ip address

    Shutdown

    !

    interface Vlan 4003

    no ip address

    Shutdown

    !

    interface Vlan 4010

    no ip address

    Shutdown

    !

    interface Vlan 4020

    no ip address

    Shutdown

    !

    interface Vlan 4030

    no ip address

    Shutdown

    !

    management route 0.0.0.0/0 10.0.0.1

    !

    class service dynamics dot1p

    !

    SNMP-server community Monitoring ro

    Server enable SNMP traps bgp

    SNMP-Server enable traps snmp authentication linkdown, linkup cold start

    Server enable SNMP traps vrrp

    Server enable SNMP traps lacp

    entity of traps activate SNMP Server

    Enable SNMP-Server intercepts stp

    Server enable SNMP traps ecfm

    Server enable SNMP traps vlt

    Enable SNMP-Server intercepts fips

    Server enable SNMP traps xstp

    Enable SNMP-Server intercepts ets

    Server enable SNMP traps envmon cam-use temperature power fan

    Server enable SNMP traps eoam

    Enable SNMP-Server intercepts pfc

    Host Server SNMP 10.0.0.238 traps version 1 monitoring - port udp 162

    !

    class-map correspondence-everything ClassMap1

    match ip dscp 46

    !

    Policy-map-input TrustDSCP

    Class-card service-queue ClassMap1 2

    Trust diffserv

    !

    Lldp Protocol

    to advertise dot1-tlv, port port-protocole-vlan-id-vlan-id

    advertise dot1-tlv-name of vlan id the vlan-999

    advertise med

    advertise med 999 6 46 voices

    !

    0 line console

    line vty 0

    line vty 1

    line vty 2

    line vty 3

    line vty 4

    line vty 5

    line vty 6

    line vty 7

    line vty 8

    line vty 9

    !

    end

    ______________________________

    Dell10G-1 #show snmp group

    GroupName: v1v2creadg security model: v1

    readview: v1v2cdefault writeview: no give view entry

    notifyview: v1v2cdefault context: no context specified

    status: Active

    GroupName: v1v2creadg security model: v2c

    readview: v1v2cdefault writeview: no give view entry

    notifyview: v1v2cdefault context: no context specified

    status: Active

    GroupName: v1v2cwriteg security model: v1

    readview: v1v2cdefault writeview: v1v2cdefault

    notifyview: v1v2cdefault context: no context specified

    status: Active

    GroupName: v1v2cwriteg security model: v2c

    readview: v1v2cdefault writeview: v1v2cdefault

    notifyview: v1v2cdefault context: no context specified

    status: Active

    __________________________________

    Dell10G-1 #show snmp community

    Community: monitoring

    Background: no

    Security-name: v1v2creadu

    Community: public

    Background: no

    Security-name: v1v2creadu

    Don't know if there are other settings of snmp that must be put in place or I missed something

    Thank you for your help

    Hello

    Can you try to set up OMNM like this http://en.community.dell.com/support-forums/network-switches/f/866/t/19535001.aspx

    Set up two profiles of authentication in OMNM. ((1) SNMP v1/v2c and used the SNMP community string, I put on the Force 10 switch 2) Telnet/SSH using the switches telnet user ID, password and the password 'Enable' leaving him activate ID empty.

  • Discovery of switch Dell OMNM 5.3

    Hello

    We have two switches in the lab and try to play with OMNM however I'm unable to the discovery process. Default SNMP seems successful but telnet/ssh or ssh2 works. Any help would be much appreciated...

    Depends on the type of connection I get different error.

    SSHv1 (force10): closed device connection prematurely

    (powerconnect) sshv1: closed java.io.ioexception.stream

    SSHv2: wrong ssh credentials provided...

    Telnet:failed to connect to the device...

    With respect to authentication; I've added the username and password in the 'user id', 'user password' and 'enable password '.

    No firewall is installed on vm 2008R2 with no UAC 5.3 OMNM. Server can ping and access to the swithces without any problem. After you can see force10 partial config below...

    SW1 #sh running-config
    Current configuration...
    ! Version 9.3 (0.0)

    username admin password 7 387a7f2df5969da4 privilege 15
    username lab passes 7 3745d37543b3578f privilege 15

    Server SNMP community private rw
    SNMP-server community public ro
    Server enable SNMP traps bgp
    SNMP-Server enable traps snmp authentication linkdown, linkup cold start
    Server enable SNMP traps vrrp
    Server enable SNMP traps lacp
    entity of traps activate SNMP Server
    Enable SNMP-Server intercepts stp
    Server enable SNMP traps ecfm
    Server enable SNMP traps vlt
    Enable SNMP-Server intercepts fips
    Enable SNMP-Server intercepts ets
    Server enable SNMP traps xstp
    Enable SNMP-Server intercepts pfc
    Server enable SNMP traps envmon cam-use temperature power fan
    Server enable SNMP traps eoam
    Host Server SNMP 10.80.104.53 traps version3 public auth - port udp 162
    Host Server SNMP 10.80.104.53 traps version 2 public c - port udp 162

    IP Server enable ssh
    property intellectual ssh server version 2

    It seems that IE (version 8) and the problem of compatibility of java causing problem to the discovery stage, so I have found a workaround using the browser (chrome) different. Not sure if this is relevant or not, but I also lowered the java security setting in the middle.

  • L2TP - impossible to find a group valid tunnel

    Hello

    I'm sure this is a simple solution, but I don't see what I'm missing.

    Any help please?

    Get the following errors in debugging.

    [IKEv1]: invalid tunnel, leaving group = 95.83.254.91, IP = 95.x.x.x, impossible to find a group...!
    23 September 14:26:05 [IKEv1]: IP = 95.x.x.x, invalid header, lack of payload SA! (next payload = 4)

    Group of tunnel I want to use is Remote-L2TP

    Attached config.

    ASA Version 8.2 (5)
    !
    ciscoasa hostname
    domain xxxxx.local
    activate 8Ry2YjIyt7RRXU24 encrypted password
    2KFQnbNIdI.2KYOU encrypted passwd
    names of
    name 192.168.1.40 description CCTV system CCTV_System
    name x.x.x.x outside outside interface description
    description of the SERVER name server 192.168.1.1
    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    switchport access vlan 12
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
    nameif inside
    security-level 100
    192.168.1.222 IP address 255.255.255.0
    !
    interface Vlan2
    nameif outside
    security-level 0
    IP address outside 255.255.255.252
    !
    passive FTP mode
    clock timezone GMT/IST 0
    summer time clock GMT/IDT recurring last Sun Mar 01:00 last Sun Oct 02:00
    DNS domain-lookup outside
    DNS server-group DefaultDNS
    Server name 89.191.34.249
    domain xxxxx.local
    object-group service CCTV tcp
    port-object eq 9010
    object-group service CCTV_NEW tcp - udp
    port-object eq 9091
    object-group service BlackBerry tcp - udp
    port-object eq 3101
    object-group service NSM tcp - udp
    port-object eq 886
    object-group service RDP tcp - udp
    EQ port 3389 object
    object-group Protocol TCPUDP
    object-protocol udp
    object-tcp protocol
    outside_access_in list extended access allowed object-group TCPUDP any host outside eq 9091
    outside_access_in list extended access allowed object-group TCPUDP any host outside eq 886
    outside_access_in list extended access allowed object-group TCPUDP any host outside eq 3101
    outside_access_in list extended access permit tcp any host outside eq https
    outside_access_in list extended access permit tcp any interface outside eq pptp
    outside_access_in list extended access allowed esp any external interface
    outside_access_in list extended access permit udp any interface outside isakmp eq
    outside_access_in list extended access permit udp any interface outside eq 4500
    outside_access_in list extended access permit udp any interface outside eq 1701
    standard access list for distance-VPN-Gp_splitTunnelAcl permit 192.168.1.0 255.255.255.0
    inside_nat0_outbound to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.25.0 255.255.255.192
    RemoteVPN_splitTunnelAcl list standard access allowed 192.168.1.0 255.255.255.0
    VPN-GP_splitTunnelAcl-list of allowed access standard 192.168.1.0 255.255.255.0
    standard L2TP_splitTunnelAcl-Remote Access-list allowed 192.168.1.0 255.255.255.0
    pager lines 24
    Enable logging
    asdm of logging of information
    Within 1500 MTU
    Outside 1500 MTU
    mask of local pool Remote-DHCP-POOL 192.168.25.10 - 192.168.25.50 IP 255.255.255.0
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 0-list of access inside_nat0_outbound
    NAT (inside) 1 0.0.0.0 0.0.0.0
    public static 9091 9091 CCTV_System netmask 255.255.255.255 interface tcp (indoor, outdoor)
    public static 886 886 SERVER netmask 255.255.255.255 interface tcp (indoor, outdoor)
    public static 3101 3101 SERVER netmask 255.255.255.255 interface tcp (indoor, outdoor)
    public static tcp (indoor, outdoor) interface https SERVER https netmask 255.255.255.255
    public static tcp (indoor, outdoor) pptp pptp netmask 255.255.255.255 SERVER interface
    Access-group outside_access_in in interface outside
    Route outside 0.0.0.0 0.0.0.0 89.191.53.17 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    the ssh LOCAL console AAA authentication
    AAA authentication http LOCAL console
    Enable http server
    http 192.168.1.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    Crypto ipsec transform-set esp-3des esp-sha-hmac trans
    Crypto ipsec transform-set trans transport mode
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs
    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    Crypto-map Dynamics dyno 20 transform-set trans
    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
    card crypto 20-isakmp ipsec vpn Dynamics dyno
    vpn outside crypto map interface
    Crypto ca trustpoint _SmartCallHome_ServerCA
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint0
    registration auto
    name of the object CN = ciscoasa
    Configure CRL
    Crypto ca certificate chain _SmartCallHome_ServerCA
    certificate ca 6ecc7aa5a7032009b8cebcf4e952d491
    308204 4 a0030201 d 308205ec 0202106e cc7aa5a7 032009b 8 cebcf4e9 52d 49130
    010105 05003081 09060355 04061302 55533117 ca310b30 0d 864886f7 0d06092a
    30150603 55040 has 13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b
    13165665 72695369 676e2054 72757374 204e6574 776f726b 313 has 3038 06035504
    0b 133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72
    20617574 7a 656420 75736520 6f6e6c79 31453043 06035504 03133c 56 686f7269
    65726953 69676e20 436c 6173 73203320 5075626c 69632050 72696 72792043 61 d
    65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31
    30303230 38303030 3030305a 170d 3230 30323037 32333539 35395a 30 81b5310b
    30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20
    496e632e 311f301d 06035504 0b 131656 65726953 69676e20 54727573 74204e65
    74776f72 6b313b30 5465726d 20757365 20617420 73206f66 39060355 040b 1332
    68747470 7777772e 733a2f2f 76657269 7369676e 2e636f6d 2f727061 20286329
    302d 0603 55040313 26566572 69536967 61737320 33205365 6e20436c 3130312f
    63757265 20536572 76657220 20473330 82012230 0d06092a 864886f7 4341202d
    010101 05000382 010f0030 82010 0d has 02 b187841f 82010100 c20c45f5 bcab2597
    a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10
    9c688b2e 957b899b 13cae234 34c1f35b f3497b62 d188786c 83488174 0253f9bc
    7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b
    15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845
    1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8 63cd
    18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced
    4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f
    81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 01 has 38201 02030100 df308201
    082b 0601 05050701 01042830 26302406 082 b 0601 db303406 05050730 01861868
    7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1 d 130101
    ff040830 02010030 70060355 b 200469 30673065 060, 6086 480186f8 1 d 060101ff
    45010717 03305630 2806082b 06010505 07020116 1 c 687474 70733a2f 2f777777
    2e766572 69736967 6e2e636f 6d2f6370 73302 has 06 082 b 0601 05050702 02301e1a
    1 c 687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406
    03551d1f 042d302b 3029 has 027 a0258623 68747470 3a2f2f63 726c2e76 65726973
    69676e2e 636f6d2f 2d67352e 70636133 63726c 30 0e060355 1d0f0101 ff040403
    02010630 6d06082b 06010505 07010c 59305730 55160969 5da05b30 04 61305fa1
    6 d 616765 2f676966 3021301f 2b0e0302 30070605 1a04148f e5d31a86 ac8d8e6b
    c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973
    69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30
    1 b 311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301D 0603
    445 1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355 c 1604140d 551d0e04
    1 230418 30168014 7fd365a7 c2ddecbb f03009f3 4339fa02 af333133 300 d 0609 d
    2a 864886 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80 f70d0101
    4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e
    b2227055 d9203340 3307c 265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a
    99 c 71928 8705 404167d 1 273aeddc 866d 24f78526 a2bed877 7d494aca 6decd018
    481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16
    b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0
    5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8
    6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28
    6c2527b9 deb78458 c61f381e a4c4cb66
    quit smoking
    string encryption ca ASDM_TrustPoint0 certificates
    certificate 5eb57b56
    3082016a 30820201 a0030201 0202045e b57b5630 0d06092a 864886f7 0d 010105
    3111300f 05003045 06035504 03130863 6973636f 61736131 30302e06 092 has 8648
    09021621 63697363 6f617361 2e627574 6 c 657274 6563686e 6f6c6f67 86f70d01
    6965732e 6c6f6361 6c301e17 313630 39313931 33303732 395a170d 32363039 0d
    a 31373133 30373239 5 304531 11300f06 03550403 13086369 73636f61 73613130
    2a 864886 f70d0109 6973636f 02162163 6173612e 6275746c 65727465 302e0609
    63686e6f 6c6f6769 65732e6c 6f63616c 30819f30 0d06092a 864886f7 0d 010101
    8 D 003081 89028181 05000381 008e76a6 2ad8e079 15814471 df2c3309 abdc0ae7
    1c665f5f bb09154b 1ac3fd81 930b29cb 6da29338 738c 9373 a0b30f61 a1d08aa9
    f5ef926b 11ef1e22 e8beeb5f c6606090 7a71b367 cad571c5 56331678 d83d4bb4
    9f98a565 577cccd6 dc20e190 c7128cf2 e38d3ad1 37807440 3da501c2 14bbbe02
    45abf677 89248633 d 05589d 4886f70d 01010505 55 75020301 0001300 06092a 86
    000a7b9d 00038181 3e29b1d9 8459309b 5e24606a cae0710e b9e264f4 a61125b9
    2f431f3a 5c4a9485 fe9bc0b0 9f9f7072 13abd978 243e0542 e34642d6 ae33028d
    be03b9e9 56c693ab b082932d b44ab014 9366c0d4 529a7ff5 818f7293 2026521b
    52fcf5c7 d623f7fa 54019c 86 e64a4212 08444c 58 8ccd11d8 4297d18a c4b2de33
    2003eaf5 e2
    quit smoking
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH 192.168.1.0 255.255.255.0 inside
    SSH 0.0.0.0 0.0.0.0 outdoors
    SSH timeout 30
    SSH version 2
    Console timeout 0
    dhcpd outside auto_config
    !

    a basic threat threat detection
    Statistics-list of access threat detection
    a statistical threat detection tcp-interception rate-interval 30 burst-400-rate average rate 200
    NTP 79.125.112.210 Server
    NTP server 193.1.193.157 prefer external source
    WebVPN
    port 8443
    allow outside
    DTLS port 8443
    SVC disk0:/anyconnect-win-2.5.2014-k9.pkg 1 image
    SVC disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 2 image
    Picture disk0:/sslclient-win-1.1.4.176.pkg 3 SVC
    enable SVC
    attributes of Group Policy DfltGrpPolicy
    Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn
    WebVPN
    SVC request enable
    internal RemoteVPN group strategy
    attributes of Group Policy RemoteVPN
    value of server DNS 192.168.1.1 192.168.1.2
    Protocol-tunnel-VPN IPSec
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list RemoteVPN_splitTunnelAcl
    XXXX.local value by default-field
    internal strategy group at distance-VPN-GP
    remote control-VPN-GP group policy attributes
    value of 192.168.1.1 DNS server
    Protocol-tunnel-VPN IPSec
    XXXXX.local value by default-field
    internal strategy group to distance-L2TP
    L2TP remote group policy attributes
    value of server DNS 192.168.1.1 192.168.1.2
    VPN-tunnel-Protocol webvpn
    username privilege 15 encrypted v5FJjvsPy8PsIOtZ xxxxpassword
    attributes of username xxxx
    VPN-group-policy RemoteVPN
    xxxxx YeC9t79Bj2E5FxxV username encrypted password
    attributes of username xxxxx
    Strategy-Group-VPN Remote - L2TP
    2KXeP2Ggcoa6BTsozucgAA password xxxxx user name is nt encrypted
    remote access of type tunnel-group to distance-VPN-GP
    distance-VPN-GP-global attributes tunnel-group
    Remote control-DHCP-POOL-pool of addresses
    Group Policy - by default-remote control-VPN-GP
    tunnel-group GP-remote control-VPN ipsec-attributes
    pre-shared key *.
    type tunnel-group Remote-L2TP remote access
    attributes global-tunnel-group Remote-L2TP
    Remote control-DHCP-POOL-pool of addresses
    Group Policy - by default-remote-L2TP
    tunnel-group Remote-L2TP ipsec-attributes
    pre-shared key *.
    tunnel-group Remote-L2TP ppp-attributes
    ms-chap-v2 authentication
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    inspect the pptp
    !
    global service-policy global_policy
    context of prompt hostname
    anonymous reporting remote call
    Cryptochecksum:c4b7c39420a91e2f7bb4adc5e5a8539b
    : end
    ciscoasa (config) #.

    Hello

    I see same Phase 2 is completed in the newspapers, so more than a customer issue.

    On the Security tab in the connection on the client profile, check if you have allowed the correct password and security protocols:

    https://www.SoftEther.org/4-docs/2-HOWTO/9.L2TPIPsec_Setup_Guide_for_Sof...

    Kind regards

    Aditya

    Please evaluate the useful messages and mark the correct answers.

  • Cisco VPN Client cannot ping from LAN internal IP

    Hello

    I apologize in advance for my lack of knowledge about it, but I got a version of the software running ASA 5510 7.2 (2) and has been invited to set up a site with a client, I managed to get this configured and everything works fine. In addition, I created a group of tunnel ipsec-ra for users to connect to a particular server 192.168.10.100/24 remote, even if the connection is made successfully, I can not ping any IP on the LAN 192.168.10.0/24 located behind the ASA and when I ping inside the interface on the ASA it returns the public IP address of the external interface.

    If someone out there could give me a little push in the right direction, it would be much appreciated! This is the current configuration of the device.

    Thanks in advance.

    : Saved

    :

    ASA Version 7.2 (2)

    !

    hostname ciscoasa5510

    domain.local domain name

    activate the password. 123456789 / encrypted

    names of

    !

    interface Ethernet0/0

    nameif outside

    security-level 0

    PPPoE client vpdn group ISP

    12.34.56.789 255.255.255.255 IP address pppoe setroute

    !

    interface Ethernet0/1

    nameif inside

    security-level 100

    IP 192.168.10.1 255.255.255.0

    !

    interface Ethernet0/2

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface Ethernet0/3

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface Management0/0

    nameif management

    security-level 100

    IP 192.168.1.1 255.255.255.0

    management only

    !

    passwd encrypted 123456789

    passive FTP mode

    clock timezone GMT/UTC 0

    summer time clock GMT/BDT recurring last Sun Mar 01:00 last Sun Oct 02:00

    DNS server-group DefaultDNS

    domain.local domain name

    permit outside_20_cryptomap to access extended list ip 192.168.10.0 255.255.255.0 host 10.16.2.124

    permit inside_nat0_outbound to access extended list ip 192.168.10.0 255.255.255.0 host 10.16.2.124

    access-list Split_Tunnel_List note the network of the company behind the ASA

    Split_Tunnel_List list standard access allowed 192.168.10.0 255.255.255.0

    pager lines 24

    asdm of logging of information

    Outside 1500 MTU

    Within 1500 MTU

    management of MTU 1500

    IP local pool domain_vpn_pool 192.168.11.1 - 192.168.11.254 mask 255.255.255.0

    ICMP unreachable rate-limit 1 burst-size 1

    ASDM image disk0: / asdm - 522.bin

    don't allow no asdm history

    ARP timeout 14400

    Global 1 interface (outside)

    NAT (inside) 0-list of access inside_nat0_outbound

    NAT (inside) 1 0.0.0.0 0.0.0.0

    Route outside 0.0.0.0 0.0.0.0 12.34.56.789 1

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout, uauth 0:05:00 absolute

    internal domain_vpn group policy

    attributes of the strategy of group domain_vpn

    value of 212.23.3.100 DNS server 212.23.6.100

    Protocol-tunnel-VPN IPSec

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list Split_Tunnel_List

    username domain_ra_vpn password 123456789 encrypted

    username domain_ra_vpn attributes

    VPN-group-policy domain_vpn

    encrypted utilisateur.123456789 password username

    encrypted utilisateur.123456789 password username

    privilege of username user password encrypted passe.123456789 15

    encrypted utilisateur.123456789 password username

    the ssh LOCAL console AAA authentication

    AAA authentication enable LOCAL console

    Enable http server

    http 192.168.1.0 255.255.255.0 management

    http 192.168.10.0 255.255.255.0 inside

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    Crypto-map dynamic outside_dyn_map 20 set pfs

    Crypto-map dynamic outside_dyn_map 20 the value transform-set ESP-3DES-SHA

    card crypto outside_map 20 match address outside_20_cryptomap

    peer set card crypto outside_map 20 987.65.43.21

    outside_map crypto 20 card value transform-set ESP-3DES-SHA

    3600 seconds, duration of life card crypto outside_map 20 set - the security association

    map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map

    outside_map interface card crypto outside

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    aes-256 encryption

    sha hash

    Group 5

    life 86400

    crypto ISAKMP policy 30

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    tunnel-group 987.65.43.21 type ipsec-l2l

    IPSec-attributes tunnel-group 987.65.43.21

    pre-shared-key *.

    tunnel-group domain_vpn type ipsec-ra

    tunnel-group domain_vpn General-attributes

    address domain_vpn_pool pool

    Group Policy - by default-domain_vpn

    domain_vpn group of tunnel ipsec-attributes

    pre-shared-key *.

    Telnet 192.168.10.0 255.255.255.0 inside

    Telnet timeout 5

    Console timeout 0

    VPDN group ISP request dialout pppoe

    VPDN group ISP localname [email protected] / * /

    VPDN group ISP ppp authentication chap

    VPDN username [email protected] / * / password *.

    dhcpd dns 212.23.3.100 212.23.6.100

    dhcpd lease 691200

    dhcpd ping_timeout 500

    domain.local domain dhcpd

    !

    dhcpd address 192.168.10.10 - 192.168.10.200 inside

    dhcpd allow inside

    !

    management of 192.168.1.2 - dhcpd address 192.168.1.254

    enable dhcpd management

    !

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    !

    global service-policy global_policy

    context of prompt hostname

    Cryptochecksum:1234567890987654321

    : end

    Hello

    Seems to me that you are atleast lack the NAT0 configuration for your VPN Client connection.

    This configuration is intended to allow the VPN Client to communicate with the local network with their original IP addresses. Although the main reason that this is necessary is to avoid this traffic to the normal rule of dynamic PAT passing this traffic and that traffic is falling for the corresponding time.

    You can add an ACL rule to the existing ACL NAT0, you have above and the NAT configuration should go next

    Add this

    permit inside_nat0_outbound to access extended list ip 192.168.10.0 255.255.255.0 192.168.11.0 255.255.255.0

    Hope this helps

    Let me know how it goes

    -Jouni

Maybe you are looking for

  • Images on the yahoo home page does not load/display in firefox

    Everything suddenly when the yahoo homepage support any of the images on the page are visible. This has never been a problem in the past. I tried the previously recommended fixes, such as clear, clear cookies, caching, updating firefox, etc. I even t

  • drivers for printer 2840

    Hello I have a HP all in one 2840 printer.  He constantly live and I have to go re-download the drivers.  However, when I went there today he says that is not what can be downloaded.  Anyone know why or how to get the drivers Thank you LueyD

  • receipt message when I went to the sight of aarp: the circuit breaker is open

    receipt message when I went to the sight of the aarp. Curcuit breaker is open, is it important or can I move forward & use? Thank you G.B.

  • Java update problem

    update of Java while trying to install a java update the followin message problem, cannot start the installer from the java (TM) update the requested operation requires a rise.

  • PDF files are no longer attached to Gmail [Android]

    After the most recent update, I'm more able to attach the pdf file to gmail. I tried several different phones, but I get the same answer "access denied or file corrupted".