Make the VPN
Hello
I have UC520 and 877 with public IP router in our office, I need to connect my ip communicator, the VPN to my house to UC520 so can I make VPN on my UC520 if you can help me with the documentation.
Kind regards.
Thanks for the confirmation.
If you want to install the VPN Client on your PC, here are the sample configuration:
http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a00800946b7.shtml
You can use the local database of the router for the authentication of the user (using the "username" command).
Tags: Cisco Security
Similar Questions
-
Windows 7 not connecting to the VPN - gives error 930
I'm one of my boxes, upgrade to Windows 7 (x 64) and everything seems to work - until I try to connect to my VPN - it gives me an Error 930. On the same home network are a (x 64) Vista and XP (x 86) - both can make the VPN connection without problem to the same location. When this box is Vista, it has good work as well.
There is nothing fancy here - simple Windows work stations at a location behind a Linksys WRT54GS connection to a Windows Server 2003 server behind an ISA firewall.
I deleted the connection and recreated, and it worked. What is interesting is that the first connector name was identical to the location I tried to connect to (internal & external). When I change the name of the connector, everything worked.
To test, I deleted this connection and created another one as the first - named the same as the network tried to connect to and it wrong on. When I renamed the connection, everything worked perfectly. It seems that Windows 7 is lost when you name the connector, the same as the destination network FULL domain name.
-
Make the remote web server accessible via VPN Site to website
We have two test sites that are connected by a tunnel IPSEC VPN site-to-site (hosted on a SAA each site) over the Internet. We are trying to set up an environment to test two web applications running side by side. Two web servers are running on the Site of Test 1. We don't have the same public IP available at each site.
To address the public site 1 unique IP address restriction, we try to install ACL and NAT rules to have 2 Site accept traffic from the internet and send it on the site to the other tunnel. So 1 Web server would accept the ASA 1 internet traffic and Web Server 2 accept traffic from ASA 2 to the other site. Here's a network diagram:
We have difficulties to get this configuration works correctly. Please note that the network 192.168.3.0/24 clients are able to access the servers Web1 and Web2. This question seems to be due to our NAT configuration. This is the type of error, we see on the two firewalls:
Asymmetrical NAT rules matched for flows forward and backward; Connection for tcp src outside:4.4.4.4/443 dst outside:192.168.1.10/443 refused due to path failure reverse that of NAT
Our situation seems similar to this post: https://supportforums.cisco.com/thread/2242230
Any help would be appreciated.
Hello
What Karsten said above is true. While it is possible and works, it also means that the configuration is a little more complex to manage. I have done no such features in a real-life network environment and have always used additional public IP addresses on the local site when a server is hosted.
If you want to continue to move forward with this so here's a few points to consider and the configurations that you need.
First off it seems to me that the other server will be organized by the local Site 1 so a simple static PAT (Port Forward) must manage the Site 1.
network of the WEB-HTTP object
host 192.168.1.10
NAT (inside, outside) interface static tcp 443 443 service
And if you need TCP/80 also then you will need
network of the HTTPS WEB object
host 192.168.1.10
NAT (inside, outside) interface static service tcp 80 80
Now, 2 Site will naturally a little different that the server is hosted on the Site 1 and Site 2 is the public IP address used to publish the server on the external network.
Essentially, you will need to configure NAT that both makes dynamic PAT for the addresses of the source of the connection to your server Web 2, but also makes the static PAT (Port Forward) for the IP address of the Web Server 2. Additionally, you have to set the area of encryption on the Site 1 and Site 2 to match this new addition to the L2L VPN connection.
Unless of course you use an existing IP address on the field of encryption in the dynamic translation of PAT for the source address. In this case, it would take no change VPN L2L. I'll use that in the example below.
The NAT configuration might look like this
service object WWW
destination eq 80 tcp service
service object HTTPS
destination eq 443 tcp service
the object SOURCE-PAT-IP network
host 192.168.3.254
network of the WEB-SERVER-2-SITE1 object
host 192.168.1.11
NAT (outside, outside) 1 dynamic source no matter what static SOURCE-PAT-IP destination interface WEB-SERVER-2-SITE1 service WWW WWW
NAT (outdoors, outdoor), 2 dynamic source no matter what static SOURCE-PAT-IP destination interface WEB-SERVER-2-SITE1 service HTTPS HTTPS
So, essentially, NAT configurations above should ake 'all' traffic coming from behind 'outside' interface intended to "outside" "interface" IP address and translate the source to ' SOURCE-PAT-IP ' address and untranslate destination to "WEB-SERVER-2-SITE1".
Make sure that the IP address chosen (in this case 192.168.3.254) is not used on any device. If she is then replace it with something that is not currently used in the network. Otherwise, configure an IP address of some other subnet and include in the L2L VPN configurations on both sites.
Unless you already have it, you also have this configuration command to activate the traffic to make a U-turn/pin on the ' outside ' of the Site 2 ASA interface
permit same-security-traffic intra-interface
Hope this helps
Remember to mark a reply as the answer if it answered your question.
Feel free to ask more if necessary.
-Jouni
-
Our mobile sales are part of a domain but not connected to our network. Cached credentials are used to connect outside the office. Once they connect and view their desktops, they select the card from Verizon and use it to connect to our network via a VPN connection. These generally to enter an IP address but the router that connects and not from our DHCP server. This usually means that updates to our DNS servers are not always instantaneous (or update at all).
When they are done for the day, they just closed the lid of the laptop and he starts in mode 'sleep'. The next day, they open the lid and no lgin is necessary, but they do not need to reconnect to the VPN through their cards from Verizon. How can I configure my DNS to update more frequently or maybe these computers portable bécon a command "ipconfig/registerdns"?
We have to connect to these systems in the field and it is almost impossible, unless we call the sales person and ask them their IP. We have more than 350 laptops in the field, then this makes it almost impossible to update all the.
Hello
Your question is more complex than what is generally answered in the Microsoft Answers forums. It is better suited for Windows XP on Technet. Please post your question in the Technet forums. You can follow the link to your question:
-
Unable to connect to the VPN from work
Hello
I read in some previous posts, but were not lucky enough to connect to the company VPN to work. I can sucessfully connect using a mobile wireless dongle (which uses the mobile network) connected to my computer. I tried to make sure that everything works. Unfortaunately I can't conect to work through my LAN VPN server wireless at home.
I use WRT54G2 linksys router wireless and you have activated the VPN options.
I ping the VPN server, but I can't connect. I think that it is unable to authenicate, keep trying, and I just cancel it after a few minutes.
Any ideas? It's the router or it could be my access provider (iinet) that block the VPN somehow?
Thank you
Tim
Finally he got to work!
The problem was due to the modem. It was blocking the port 500udp. After configuring my modem to enable port forwarding I could access my work intranet via VPN.
I have a Belkin MODEL of MODEM ADSL2 + # F5D5730au
Thanks for your help
Tim
-
Make the connection - now what?
I was able to make the connection between our two offices quickVPN. I quess I expected to see the other computer or a log on screen. I'm new to this, I was using UltraVNC. What I have to put in place.
Thank you
Once connected to QuickVPN next thing you need to do is to check if you can test the computer that you want to access behind the VPN router
If you get the answers, then you should be able to map the IP address of this computer by clicking Start > run > type computer \\IP address
It should then give you a login on this computer screen or it should open all shared folders on this computer
QVPN offers similar attributes, such as file sharing, only you do on the internet
-
Once the VPN connection is established, cannot ping or you connect other IP devices
Try to get a RV016 installed and work so that people can work from home. You will need to charge customers remote both WIN XP and MAC OS X.
Have the configured router and works fine with the VPN Linksys client for WIN XP users. Can connect, ping, mount the shared disks, print to printers to intellectual property, etc.
Can connect to the router fine with two VPN clients third 3 for Mac: VPN Tracker and IPSecuritas. However, once the connection is established, cannot ping the VPN LinkSYS router or any other IP address on the LAN Office. Turn the firewall on or off makes no difference.
Is there documentation anywhere that describes how the LinksysVPN for Windows Client communicates so these can be replicated in 3rd VPN clients from third parties for the Mac in OS X?
The connection with IPSecuritas and VPN Tracker is performed using a shared key and a domain name. It is not a conflict of IP address network between the client and the VPN 192.168.0.0/24 network.
VPN Tracker and IPSecuritas are able to connect to the routers CISCO easy VPN with no poblem.
Any ideas on how to get the RV016 to work for non-Windows users?
We found and fixed the problem, so using VPN Tracker or current IPSecuritas on OS X people have access to the LAN via the RV016 machines. The "remote networks" in the screen BASE in VPN Tracker has been set on the entire subnet: 192.168.0.0/255.255.255.0 the in the RV016 has been set to the IP of 192.168.0.1 to 192.168.0.254 range. Even if the addresses are essentially the same, without specifying the full subnet in the RV016 has allowed the connection to do but prevented the VPN client machine to connect because the RV016 would pass all traffic to the Remote LAN. Change the setting of 'local group' in RV016 settings in the screen "VPN/summary/GroupVPN', 'Local Group Zone' for the subnet 192.168.0.0/24 full solved the problem.
-
SRA 4600 - users to limit who can connect to the VPN
We have a SRA 4600 and wishes to restrict access to the VPN to only a handful of our users active directory. that is when they visit the Web page for the SRA and try to logon, once that they connection they told you they have VPN access. That, or else they are simply limited to be able to open a session.
How we would accomplish this?
Since you are using AD, you can create local groups on your device and then restrict access to specific ad groups. The way I work is that a domain has several groups assigned to him, and whenever someone logs in, they show some bookmarks are in the group that they have access to (Yes, it works if you are in more than one group).
If you don't want people to connect at all, make sure that they are not member of the ad groups that access.
You can find the setting under user-> groups-> Edit-> ad groups. This tab appears only if the group is assigned to an AD domain (under portals-> fields).
NetExtender may be restricted in the same way - just make it is available only for groups you want to have.
-
Split of static traffic between the VPN and NAT
Hi all
We have a VPN from Site to Site that secures all traffic to and from 10.160.8.0/24 to/from 10.0.0.0/8. It's for everything - including Internet traffic. However, there is one exception (of course)...
The part that I can't make it work is if traffic comes from the VPN (10.0.0.0/8) of 10.160.8.5 (on 80 or 443), then the return traffic must go back through the VPN. BUT, if traffic 80 or 443 comes from anywhere else (Internet via X.X.X.X which translates to 10.160.8.5), so there need to be translated réécrirait Internet via Gig2.
I have the following Setup (tried to have just the neccessarry lines)...
interface GigabitEthernet2
address IP Y.Y.Y.Y 255.255.255.0! the X.X.X.X and Y.Y.Y.Y are in the same subnet
address IP X.X.X.X 255.255.255.0 secondary
NAT outside IP
card crypto ipsec-map-S2S
interface GigabitEthernet4.2020
Description 2020
encapsulation dot1Q 2020
IP 10.160.8.1 255.255.255.0
IP nat inside
IP virtual-reassembly
IP nat inside source list interface NAT-output GigabitEthernet2 overload
IP nat inside source static tcp 10.160.8.5 80 80 X.X.X.X map route No. - NAT extensible
IP nat inside source static tcp 10.160.8.5 443 443 X.X.X.X map route No. - NAT extensible
NAT-outgoing extended IP access list
refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq www
refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq 443
permit tcp host 10.160.8.5 all eq www
permit tcp host 10.160.8.5 any eq 443
No. - NAT extended IP access list
refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq www
refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq 443
allow an ip
route No. - NAT allowed 10 map
corresponds to the IP no. - NAT
With the above configuration, we can get to the Internet 10.160.8.5, but cannot cross it over the VPN tunnel (from 10.200.0.0/16). If I remove the two commands «ip nat inside source static...» ', then the opposite that happens - I can get then to 10.160.8.5 it VPN tunnel but I now can't get to it from the Internet.
How can I get both? It seems that when I hit the first NAT instruction (overload Gig2) that 'decline' in the list of ACL-NAT-outgoing punts me out of this statement of NAT. It can process the following statement of NAT (one of the 'ip nat inside source static... ") but does not seem to"deny"it in the NON - NAT ACL me punt out of this statement of NAT. That's my theory anyway (maybe something is happening?)
If this work like that or I understand something correctly? It's on a router Cisco's Cloud Services (CSR 1000v).
Thank you!
Your netmask is bad for your 10.0.0.0/8. I worry not about the port/protocol or since that can screw you up. A better way to do it would be to deny all IP vpn traffic.
NAT-outgoing extended IP access list
deny ip 10.160.8.0 0.0.0.0.255 10.0.0.0 0.255.255.255
...
No. - NAT extended IP access list
deny ip 10.160.8.0 0.0.0.0.255 10.0.0.0 0.255.255.255
allow an ip
Doc:
Router to router IPSec with NAT and Cisco Secure VPN Client overload
Thank you
Brendan
-
The VPN client VPN connection behind other PIX PIX
I have the following problem:
I wanted to establish the VPN connection the client VPN to PIX on GPRS / 3G, but I didn t have a bit of luck with PIX IOS version 6.2 (2).
So I upgraded PIX to 6.3 (4) to use NAT - T and VPN client to version 4.0.5
I have configured PIX with NAT-T(isakmp nat-traversal 20), but I still had a chance, he would not go through the 1st phase. As soon as I took nat-traversal isakmp off he started working, and we can connect to our servers.
Now, I want to connect to the VPN client behind PIX to our customer PIX network. VPN connection implements without problem, but we can not access the servers. If I configure NAT - T on the two PIX, or only on the customer PIX or only on our PIX, no VPN connection at all.
If I have to connect VPN client behind PIX to the customer's network and you try to PING DNS server for example, on our PIX, I have following error:
305006: failed to create of portmap for domestic 50 CBC protocol translation: dst outside:194.x.x.x 10.10.1.x
194.x.x.x is our customer s address IP PIX
I understand that somewhere access list is missing, but I can not understand.
Of course, I can configure VPN site to site, but we have few customers and take us over their servers, so it'd just connect behind PIX VPN and client connection s server, instead of the first dial-in and then establish a VPN connection.
Can you please help me?
Thank you in advan
The following is extracted from ASK THE DISCUSSION FORUM of EXPERTS with Glenn Fullage of Cisco.
I've cut and pasted here for you to read, I think that the problem mentioned below:
Question:
Hi Glenn,.
Following is possible?
I have the vpn client on my PC, my LAN is protected by a pix. I can launch the vpn client to connect to remote pix. Authenticates the vpn client and the remote pix makes my PC with the assigned ip appropriate to its pool of ip address.
The problem that I am facing is that I can not anything across the pix remote ping from my PC which is behind my pix. Can you please guide me what I have to do to make this work, if it is possible?
My PC has a static ip address assigned with the default gateway appropriate pointing to my s pix inside interface.
Thank you very much for any help provided in advance.
Response from Glenn:
First of all, make sure that the VPN connection works correctly when the remote PC is NOT behind a PIX. If that works fine, but then breaks when put behind a PIX, it is probably that the PIX is PAT, which usually breaks IPSec. Add the following command on your PIX VPN client is behind:
fixup protocol esp-ike
See http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/df.htm#wp1067379 for more details.
If it still has issues, you can turn on NAT - T on the remote PIX that ends the VPN, the client and the remote PIX must encapsulate then all IPSec in UDP packets that your PIX will be able to PA correctly. Add the following command on the remote PIX:
ISAKMP nat-traversal
See http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1027312 for more details.
NAT - T is a standard for the encapsulation of the UDP packets inot IETF IPSec packets.
ESP IPSec (Protocol that use your encrypted data packets) is an IP Protocol, it is located just above IP, rather than being a TCP or UDP protocol. For this reason, it has no TCP/UDP port number.
A lot of features that make the translation of address of Port (PAT) rely on a single to PAT TCP/UDP source port number ' ing. Because all traffic is PAT would be at the same source address, must be certain uniqueness to each of its sessions, and most devices use the port number TCP/UDP source for this. Because IPSec doesn't have one, many features PAT fail to PAT it properly or at all, and the data transfer fails.
NAT - T is enabled on both devices of the range, they will determine during the construction of the tunnel there is a PAT/NAT device between them, and if they detect that there is, they automatically encapsulate every IPSec packets in UDP packets with a port number of 4500. Because there is now a port number, PAT devices are able to PAT it correctly and the traffic goes normally.
Hope that helps.
-
Need a guide to configure the VPN Client
Hello...
I vpn in my 506th pix and I have ver.4.0.1 software vpn client installed on the other pc (on the outside). In the firewall, there are two types of vpn; VPN site to site and remote vpn access. We use vpn for remote access to allow the vpn client to access our server right?
This is all new to me and could you give an example how to configure vpn inside my firewall in CLI or PDM command and how to configure the software vpn client.
Please help us beginners cisco
Tonny
Tony,
Try chanigng a cisco and see if it solves... but otherwise, since you changed the PIX outside IP now, you will be able to make VPN connections to the new public IP address now, if it is routed on the internet.
can you please try to connect now and let us know what is happening?
-
Is it possible to configure the VPN client to set up some sort of login and password so when you run, connects automatically without writing the user name and password.
This must be the vpn client without making any changes on the vpn server.
No idea how to do this?
Kind regards
to 4.0.2 4.6 & 4.8 Yes - in the profile .pcf file, make sure that
SaveUserPassword = 1
This will keep the user name & password in the profile, when you click on it - it should fine connection.
You must also activate the user store password: -.
In the pix / asa - under the client VPN profile:-
allow password-storage
HTH.
-
vulnerability of Diffie-Hellman <; 1024 Bits (dead end) on the VPN
Hello world
Scans of external provider shows a vulnerability for Diffie-Hellman< 1024="" bits="" (logjam)="" on="" the="" vpn ="" on="" our="" cisco="" asa="" running="">
No idea how can I fix on Cisco ASA 5520?
Concerning
Mahesh
IT depends on how the analysis was done. If only they check your turned to the public outside the address and then only having do not SSL services on it will make the vulnerability "disappear".
If you need the service out of all interfaces, you need to upgrade so that the SSL services are patches they are seen on any interface.
Or you could simply not patch and accept the risk.
-
Cannot ping inside the vpn client hosts. It's a NAT problem
Hello everyone, I'm running into what seems to be a cause of exclusion with an IOS IPSEC VPN NAT/nat. I can connect to the VPN with cisco IPSEC VPN client, and I am able to authenticate. Once I have authenticate, I'm not able to reach one of the guests inside. Below is my relevant config. Any help would be greatly appreciated.
AAA new-model
!
!
AAA authentication login default local
radius of group AAA authentication login userauthen
AAA authorization exec default local
AAA authorization groupauthor LAN
crypto ISAKMP policy 3
BA 3des
preshared authentication
Group 2
!
ISAKMP crypto client configuration group businessVPN
key xxxxxx
DNS 192.168.10.2
business.local field
pool vpnpool
ACL 108
Crypto isakmp VPNclient profile
businessVPN group identity match
client authentication list userauthen
ISAKMP authorization list groupauthor
client configuration address respond
!
!
Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT
!
Crypto-map dynamic dynmap 10
Set transform-set RIGHT
Define VPNclient isakmp-profile
market arriere-route
!
!
10 ipsec-isakmp crypto map clientmap Dynamics dynmap
interface Loopback0
IP 10.1.10.2 255.255.255.252
no ip redirection
no ip unreachable
no ip proxy-arp
IP virtual-reassembly
!
Null0 interface
no ip unreachable
!
interface FastEthernet0/0
IP 111.111.111.138 255.255.255.252
IP access-group outside_in in
no ip redirection
no ip unreachable
no ip proxy-arp
NAT outside IP
inspect the outgoing IP outside
IP virtual-reassembly
automatic duplex
automatic speed
clientmap card crypto
!
the integrated-Service-Engine0/0 interface
description Locator is initialized with default IMAP group
IP unnumbered Loopback0
no ip redirection
no ip unreachable
no ip proxy-arp
IP virtual-reassembly
ip address of service-module 10.1.10.1 255.255.255.252
Service-module ip default gateway - 10.1.10.2
interface BVI1
IP 192.168.10.1 255.255.255.0
no ip redirection
no ip unreachable
no ip proxy-arp
IP nat inside
IP virtual-reassembly
IP nat inside source static tcp 192.168.10.2 25 interface FastEthernet0/0 25
IP nat inside source static tcp 192.168.10.2 443 interface FastEthernet0/0 443
IP nat inside source static tcp 192.168.10.2 3389 interface FastEthernet0/0 3389
IP nat inside source map route nat interface FastEthernet0/0 overload
nat extended IP access list
deny ip 192.168.10.0 0.0.0.255 192.168.109.0 0.0.0.255
refuse the 10.1.1.0 ip 0.0.0.255 192.168.109.0 0.0.0.255
ip licensing 10.1.1.0 0.0.0.255 any
permit ip 192.168.10.0 0.0.0.255 any
sheep extended IP access list
permit ip 192.168.10.0 0.0.0.255 192.168.109.0 0.0.0.255
ip permit 10.1.10.0 0.0.0.255 192.168.109.0 0.0.0.255
ip licensing 10.1.1.0 0.0.0.255 192.168.109.0 0.0.0.255
outside_in extended IP access list
permit tcp object-group Yes_SMTP host 111.111.111.138 eq smtp
permit any any eq 443 tcp
permit tcp 20.20.20.96 0.0.0.31 host 111.111.111.138 eq 3389
permit tcp 20.20.20.96 0.0.0.31 host 111.111.111.138 eq 22
allow any host 111.111.111.138 esp
allow any host 111.111.111.138 eq isakmp udp
allow any host 111.111.111.138 eq non500-isakmp udp
allow any host 111.111.111.138 ahp
allow accord any host 111.111.111.138
access-list 108 allow ip 192.168.109.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 108 allow ip 192.168.109.0 0.0.0.255 10.1.1.0 0.0.0.255
access-list 108 allow ip 192.168.109.0 0.0.0.255 10.1.10.0 0.0.0.255
!
!
!
!
route nat allowed 10 map
match ip address nat
1 channel ip bridge
In my view, the acl applied to customer is back. It must allow traffic from the internal network to the pool of customers.
To confirm, you can open the Cisco VPN client statistics (after login) then go in the route Details tab. We should see the networks you should be able to reach the customer. Make sure that the good ones are here.
Kind regards
-
Hi all
My cisco asa 5520 runs on worm asa 9.0 and my mobility anyconnect client is running 3.1
Understand that I can activate a feature called always 'on vpn"so that my pc client users can automatically establish the vpn, and I can also make use of a feature in"always on vpn"to prevent my users to disconnect from the vpn. To activate "always you vpn", do I need to download software cisco store profile editor? I need to turn on this feature we want to use vpn tunnels to secure the notebk. Pls advise. TIA!
Hi Don Li,
You can use the profile on the ASDM Editor, or download the standalone profile editor and do it on your local PC.
You can find the requirements and configuration on the following document.
Please note the useful messages!
It may be useful
-Randy-
Maybe you are looking for
-
Tecra A2 - audio lost and cannot find the device
The other day, lost all the sounds on the laptop. Nothing else did it and no new software has been loaded for possibly in conflict or cause a problem. Have you tried to uninstall and reinstall the driver and add hardware (Media Audio Controller) even
-
printing with my note from samsung
Does anyone know how to print from note 2 Samsung on a wireless hp deskjet printer. I downloaded e.print Jane
-
Pavilion G62 b04SL: upgraded to an Intel Dual Band Wireless-AC 7260 default wifi card
Hello, my laptop Hp G62 b04SL 2009 can support an Intel Dual Band Wireless-AC 7260 wifi card? Have this laptop, a whitelist (or black)? profuct key: XF299EA #ABZ Processor: Intel Core I3 350M motherboard: HP 1439 60.50 BIOS: version of Hewlett - Pack
-
Speed of cpu max HP Pavilion p-045tx
Hello I recently bought a model of p-045tx Pavilion from HP with processor intel core i7-4510u. In internet, it is mentioned, it must turbo boost up to 3.1 ghz. But when I open the Task Manager, it shows the maximum speed of only 2.6 ghz. Something i
-
Copies of photos and Windows Live Gallery movies on an external hard drive. Windows Vista
In Vista, when I copied pictures and movies of Windows Live Gallery to an external hard drive, files are on the hard drive. Yet, the properties of the folder say they are all there. Is there something I need to check or uncheck so I can see the photo