MD3000 CLI does not

Hi guys,.

I am trying to reset the password for MD3000 as the person who set up previously left the company and told me that the password.

I connected the cable to reset the password. Connected via HyperTerminal COM port configured as 115200 8 - N - 1; but I don't get a form of response from the controller. only a terminal empty. I checked that I am connected on controller port 0.

Also, I checked the cable if it works on another MD3000 and confirms that I am able to access the CLI.

Help, please. Thank you!

See you soon!

Paeng


Tags: Dell Products

Similar Questions

  • CLI - 6.3.0 does not read the icons more on iOs

    Hello

    as in the title, with the new cli - 6.3.0, my application does not read the icon on ios image, while working on 5.2.0.

    Here is my config:

    "< src="res/icon/ios/icon-57.png icon.Gap: platform = 'ios '.width = "57" height = "57" / >
    "< src="res/icon/ios/icon-72.png icon.Gap: platform = 'ios '.width = "72" height = "72" / >
    "< src="res/icon/ios/icon-57-2x.png icon.Gap: platform = 'ios '.width = "114" height = "114" / >
    "< src="res/icon/ios/icon-72-2x.png icon.Gap: platform = 'ios '.Width = "144" height = "144" / >

    Then, you showed an incomplete zip file and want to debug?

    * sigh *.

    In any case:

    -the path in the config of iOS icons won't

    -Include the splash of the landscape while specifying 'portrait' only

    -you are missing the larger Android

    BTW: are you aware that anyone can see the source code of your goods after the publication of the application in the stores?

  • Applications for iOS does not work after update from cli 6.3.0

    After an update on August 3, when the Service of Build upgrade cli 6.3.0 my apps did not work for iOS, I have an iPhone 4 running iOS 7.1.2 and an iPad running iOS 9.3.3. After the build service update, no matter if I specify a lower version of cli, on the iPhone he asked a more recent software when I try to install from iTunes, but the iPhone and iTunes running on the latest version. On the iPad it installs, but the application icon does not appear on the iPad, so I can't access the application.

    Everyone knows a similar problem? I tried to look for documents but did not find any significant syntax change that could cause the problem. I even did a restore on my code (I had an old version of the compiled application and it worked, then I did a restore to this date on my code) and it does not work yet.

    ryanskihead not really, we test with 2 models, an iPad 2 running iOS 9.3.3 and an iPhone 4 iOS running 7.1.2 in both cases, the application does not, but the behavior is different:

    -On the iPad it installs successfully on iTunes, but the icon does not appear on the iPad

    -On the iPhone it says that it can not be installed because it requires a newer version of the iOS, but the iPhone is running the latest available version of iOS.

    If I specify a deployment target, say iOS 7 for example, it doesn't do anything on the iPhone. This and a similar thread I've seen on the target community deployment cli 6 ignorant, I would say that there is a bug with phonegap cli 6 + versions used on the Build Server.

    The problem now solved in time by doing a restore to phonegap cli 5.2.0, TI began works fine after that, so I don't know if there is a bug on higher versions of cli phonegap or there is a syntax change not yet published on config.xml

  • PGB CLI 6.0.0 - .aspx package does not pass Windows validation dashboard developer

    There is also a related post on the forum community phonegap, but insofar as no solution. That's why I write it here as well, because at the time our deployment in the Windows store is pending.

    We will have a problem when you use CLI 6.0.0 on phonegap build. The build works very well without any problems, but when we download the .aspx package in the dev.windows.com dashboard, the following errors are given (some content are vetted with *):

    Invalid package name identity: 4974de88-* (expected: *)

    Invalid package name: 4974de88-* _ * (expected: *)

    Invalid package Publisher name: CN = OrangeMason BV (expected: CN = *)

    This package uses a display name that you have not reserved: *.

    As far as I know, phonegap build do not specify the name of the identity, the family name, the name of the editor and display the name of anywhere? Or is it possible that we can define these in the config.xml file so that they are treated properly in the package?

    If not, does support for this will be added in the future or how the Phonegap crew we publish our application in the Windows store otherwise wait?

    By the way: when you use CLI older versions (which exports .xap), this problem does not occur. However, these CLI versions do not support Windows Phone 10.

    Thank you for this comment. We have deployed a couple of bugs, here's how you need to configure your application:

    Publisher name: will be set to what you have set the field in the config.xml file

    Full name: will be what you have set the field in the config.xml file

    Identity package name: added a new preference: windows-identity-name. get this App--> App Identity management value in the Dev Center

    Package name: must be generated based on the name of the identity

    Yes, as long as you have your Publisher on man ID and follows the correct values in your config.xml (sample below values) file:

    Adobe
    PhoneGap Build App
    
    

    presentation should be successful. Let us know if you still see errors.

  • power cli script works does not in 5.5-was prior work

    I am trying to perform actions on the virtual machines that reside in a csv file.    Here's what I have:

    to connect-viserver $vcenter

    foreach ()$_.name in ("Import-Csv " "$ENV: USERPROFILE\Desktop\vm_list.csv ' -UseCulture)) { }

    $VM = Get-VM $_. name

    Get-VM $VM | Where {$_. PowerState -eq "PoweredOn"} |

    Select Name, Host, NumCpu, MemoryMB,

    @{N='Cpu.UsageMhz.Average';} E={[Math]::Round((($_ | Get-Stat -Stat cpu.usagemhz.average -Start Get-Date(). () AddHours (-24) -IntervalMins 5 -MaxSamples (12) | Measure-object Value -Average). Average) , 2 )}},

    @{N='Mem.Usage.Average';} E={[Math]::Round((($_ | Get-Stat -Stat mem.usage.average -Start Get-Date(). () AddHours (-24) -IntervalMins 5 -MaxSamples (12) | Measure-object Value -Average). Average) , 2 )}} `

    | Export-Csv c:\Temp\stats.csv

    }

    NOTE - If I get rid of the thing whole 'foreach' script works fine Get - VM and down by removing the $VM variable)

    But I want to get the data of perf for VMs on my list, not only of each of them via the GET - VM against the whole vcEnter.

    Any ideas why it's a failure?   in 5.0, I ran a script that mobilized the "foreach" exactly as you see above and it worked great.  Now we are at 5.5 is more does not work.

    Output showing the errors that have baffled me:

    C:\Users\kwg\Desktop\test2.ps1:8 tank: 12

    + foreach ($_.name in (Import-Csv "$ENV:USERPROFILE\Desktop\vm_ip.csv")

    -UseCulture...

    +            ~

    Missing 'in' after variable in the foreach loop.

    C:\Users\kwg\Desktop\test2.ps1:8 tank: 83

    + ... "- UseCulture)) {}".

    +                    ~

    Unexpected token ')' in expression or statement.

    + CategoryInfo: ParserError: (:)) [], ParseException Exception)

    + FullyQualifiedErrorId: MissingInInForeach

    Not sure why you use the pipeline variable ($_____) in the foreach loop?

    There is no need to use a ForEach loop actually, you can pass several names for the Name parameter on the Get - VM cmdlet.

    And then you use the pipeline at its maximum.

    I would like

    to connect-viserver $vcenter

    Get-VM-name (Import-Csv "$ENV:USERPROFILE\Desktop\vm_list.csv" - UseCulture | % {$_.}) Name}) |

    Where {$_.} PowerState - eq "Receptor"} |

    Select Name, host, NumCpu, MemoryMB,

    @{N = "Cpu.UsageMhz.Average"; E = {[Math]: round ((($_ |))} Get-Stat - Stat cpu.usagemhz.average - Start (Get-Date). AddHours(-24)-IntervalMins 5 - MaxSamples (12) | Measure - Object - average value). Average), 2)}},

    @{N = "Mem.Usage.Average"; E = {[Math]: round ((($_ |))} Get-Stat - Stat mem.usage.average - Start (Get-Date). AddHours(-24)-IntervalMins 5 - MaxSamples (12) | Measure - Object - average value). Average), 2)}} |

    Export-Csv c:\Temp\stats.csv

  • 14.04 the unit does not load firefox only gksudo or comments "will."

    for months 6 or so Firefox now stop launching from the icon of unity... done loading cycle ball and - nothing, it will only load Terminal gksudo firefox, or as a guest visitor. Literally hundreds of codes terminal by 'experts' have not... it seems that I am not recognised as an administrator/owner by Ubuntu or firefox... and it is not available as preview of bluefish (same problem) ubuntu is the only OS and firefox browser only. Please keep in mind that I receive responses by email.

    Terminal and firefox gives me this:
    (process: 14428): CRITICISM of GLib *: g_slice_set_config: assertion 'sys_page_size == 0' failed

    It is a warning that does not start Firefox.
    You don't explain if Firefox actually does start or not not when starting it leave a Terminal like cor - el suggested above.

    I just tried/etc/init. D/vmware install

    I don't know what you were trying to reach wrt VMware. It is clear from the above command that you have no idea of what you do on the CLI. Your other comments it seems that you try arbitrary commands you have picked up various items without understanding what they mean.
    Stop it. It will do you no good.

  • screensharingd does not accept the name of user and password

    Hello

    We have a mac mini which does not accept my credentials via screen sharing. I activated the remote access connection & remote management and set the password for VNC ("viewers VNC may control screen with password") to the same as my username "geertl".

    When I try to connect from another mac mini or an Ubuntu (with customer Remmina) system I always get the following error (system.log):

    7 June 18:01:01 screensharingd mac [2277]: authentication: FAILED: username: geertl: Viewer address: x.x.x.x: Type: DH

    VNC access is fine (with for example of TightVNC viewer):

    7 June 18:01:36 mac screensharingd [2282]: authentication: MANAGED: user name: N/A: Viewer address: x.x.x.x: Type: VNC WITH

    In this window VNC then enter my password and login without problem. SSH also works without problem from a Linux machine:

    ~ # ssh mac-l geertl sw_vers - productVersion

    Password:

    10.11.5

    It's just the screensharing who does not accept my password and/or username. Mac has been restarted, all reconfigured screensharing two through GUI as CLI, 'Account name' and 'Real name' were aligned and put different, none of them work. The firewall is disabled.

    We have another mac that is configured in the same way (same user name, same network,...) where the screen sharing works fine.

    Any pointer very appreciated!

    I had the same problem recently following a power failure.

    What I did to recover was to ensure that my Mac Mini was up and running - visible in the side bar of the finder.

    Then power rolled (stop) OSX on iMac and rebooted.

    Connections has then worked as expected.

    I would add, that my iMac and Mac Mini are running 10.11.5; and Yes, the problem only screen sharing.

  • System it is connected to the internet, but my browser does not display a web page.

    XP has forgotten how to connect to the internet.

    XP is always connected to the net fine, but today he forgot.  When I try to set up the net through the Control Panel, it says I am already connected, but
    Google does, and I can't ping the server in the CLI.  How can I fix it, please?  I send you this PCLinux, on the same machine
    and the same hard drive.
    Thanx. -doug

    Hi dougmack,

    1. What happens when you try to connect using Internet explorer?
    2. What is the type of internet connection you use?
    3. Did you the latest changes on the computer?
    4. You have security software installed on the computer?

    Method 1

    Check if the problem persists in mode safe mode with networking mode.

    A description of the options to start in Windows XP Mode

    http://support.Microsoft.com/kb/315222

    Method 2

    If the problem does not persist in mode safe mode with networking mode, then it is possible that some third-party programs installed on the computer is causing the problem.

    I suggest that you configure the computer in a clean boot state and check if it helps.

    To help resolve the error and other messages, you can start Windows XP by using a minimal set of drivers and startup programs. This type of boot is known as a "clean boot". A clean boot helps eliminate software conflicts.

    See section to learn more about how to clean boot.

    How to configure Windows XP to start in a "clean boot" State

    http://support.Microsoft.com/kb/310353

    Reset the computer to start as usual

    When you are finished troubleshooting, follow these steps to reset the computer to start as usual:

    1. Click Start , and then click run.
    2. Type msconfig , and then click OK.
      The System Configuration utility dialog box appears.
    3. Click the general tab, click Normal Startup - load all device drivers and services , and then click OK.
    4. When you are prompted, click restart to restart the computer.

    Also check the State of the network adapter on the computer by using the Device Manager.

    How to manage devices in Windows XP

    http://support.Microsoft.com/kb/283658

  • Applet JIT does not

    Hi team, Okay, so what we have observed in our network is that flow-export sometimes causes high interface utilization and as a workaround, we remove and re-add flow export commands. Now there are short burstd of traffic as well, so I want to add a condition where "burst happens 3 times in 60s, then trigger the event". As I cannot test in production router, so I am testing on a lab switch and there is not much traffic on it. txload/rxload is 1 and hence my applet looks like this: sw1-trn-mr3.hyd.shaw.net#sh run | b event manager event manager applet test authorization bypass event tag 1 interface name GigabitEthernet0/4 parameter txload entry-op ge entry-val 1 entry-type value exit-op lt exit-val 1 exit-type value poll-interval 10 event tag 2 interface name GigabitEthernet0/4 parameter rxload entry-op ge entry-val 1 entry-type value exit-op lt exit-val 1 exit-type value poll-interval 10 trigger occurs 3 period 60   correlate event 1 or event 2 action 1.1 cli command "enable" action 1.2 syslog msg "Interface utilization has risen again. " action 1.3 cli command "show proc cpu | append flash:test" action 1.4 cli command "show interface GigabitEthernet0/4 | append flash:test" action 1.6 cli command "show ip cache flow | append flash:test" action 1.7 cli command "show tech | append flash:test" action 2.2 cli command "no ip flow-export source GigabitEthernet0/4" action 2.3 cli command "no ip flow-export destination 192.168.1.1 2055" action 2.5 cli command "ip flow-export source GigabitEthernet0/4" action 2.6 cli command "ip flow-export destination 192.168.1.1 2055" action 2.9 cli command "end" ! end The thing is it does not work. I turned on debugs and I see this. Mar  3 15:30:46: fh_send_intf_fd_msg: msg_type=114 Mar  3 15:30:46: fh_send_intf_fd_msg: sval=0 Mar  3 15:30:46: fh_send_intf_fd_msg: msg_type=114 Mar  3 15:30:46: fh_send_intf_fd_msg: sval=0 Mar  3 15:30:54: fh_fd_intf_process_async Mar  3 15:30:54: fh_fd_intf_param_fetch:I/F=GigabitEthernet0/4 txload=1 Mar  3 15:30:54: intf_value_uint_compare:op1=1 op2=1 ret=TRUE Mar  3 15:30:54: intf_entry_value_check:Returning TRUE Mar  3 15:30:54: fh_fd_intf_event_match: re = 0x5849AA0, num_matches = 1 Mar  3 15:30:54: fh_fd_intf_start_poll_timer: start_t=10000 Mar  3 15:30:54: fh_fd_intf_process_poll_timer: update_t=0 Mar  3 15:30:54: fh_fd_intf_param_fetch:I/F=GigabitEthernet0/4 rxload=1 Mar  3 15:30:54: intf_value_uint_compare:op1=1 op2=1 ret=TRUE Mar  3 15:30:54: intf_entry_value_check:Returning TRUE Mar  3 15:30:54: fh_fd_intf_event_match: re = 0x56D793C, num_matches = 1 Mar  3 15:30:54: fh_fd_intf_start_poll_timer: start_t=10000 Mar  3 15:30:54: fh_fd_intf_process_poll_timer: update_t=0 Mar  3 15:30:54: fh_send_intf_fd_msg: msg_type=64 Mar  3 15:30:54: fh_send_intf_fd_msg: sval=63 Mar  3 15:30:54: fh_send_intf_fd_msg: msg_type=64 Mar  3 15:30:54: fh_send_intf_fd_msg: sval=0 Mar  3 15:31:04: fh_fd_intf_process_async Mar  3 15:31:04: fh_fd_intf_param_fetch:I/F=GigabitEthernet0/4 txload=1 Mar  3 15:31:04: intf_value_uint_compare:op1=1 op2=1 ret=FALSE Mar  3 15:31:04: intf_exit_value_check: re=0x5849AA0, returning=FALSE Mar  3 15:31:04: intf_exit_comb_check:Returning FALSE Mar  3 15:31:04: fh_fd_intf_event_match: re = 0x5849AA0, num_matches = 0 Mar  3 15:31:04: fh_fd_intf_start_poll_timer: start_t=10000 Mar  3 15:31:04: fh_fd_intf_process_poll_timer: update_t=0 Mar  3 15:31:04: fh_fd_intf_param_fetch:I/F=GigabitEthernet0/4 rxload=1 Mar  3 15:31:04: intf_value_uint_compare:op1=1 op2=1 ret=FALSE Mar  3 15:31:04: intf_exit_value_check: re=0x56D793C, returning=FALSE Mar  3 15:31:04: intf_exit_comb_check:Returning FALSE Mar  3 15:31:04: fh_fd_intf_event_match: re = 0x56D793C, num_matches = 0 Only the first time, it returns TRUE. After that, it returns FALSE always and hence the condition "trigger occurs 3 period 60" does not match and hence no event is triggered. Where am I going wrong? Appreciate your help on this.

    Thanks.

    You have a condition of release of ' lt 1.  This means that the burden must fall below 1 until the event to rearm.  In this case, it seems that the load is always 1, so you will not see the three events occur.  You have to push some of the traffic through this interface to complete your test.

    In addition, you are away:

    Action 2.1, cli «config t» command

    And probably, you will need to extend the first event with a maxrun parameter I am sure that this policy will have more than 20 seconds to run.

  • Nexus 7009 does not show the N7K-F248XP-25 modules ethernet ports n sh run

    Hello world

    I have a question...

    I'm going to install two Nexus 7009 with N7K-F248XP-25 three modules on each of them, I plan to create 3 VDC, but initial configuration, the system does not display the Ethernet ports of these modules, even with the inventory of show and show module that I can see that the modules are recognized and its status is OK. Is there something I need to do before you start to configure these modules...? allow some feature or the license in order to see the ports with show running CLI...?

    You can activate the F1, F2, M1, M1XL, and M2XL series modules. There is no restriction on the type of mixture allowed for the order of module-type system. Control module-type system allows a mixture of F1, F2, M1, M1XL and M2XL series of modules in the VDC.

    Note The module-type limit-resource command handles the restrictions on the types of module that can be mixed in the VDC.

    Note Use the f2 type module-system command to allow the F2E series modules in a VDC. The ports of F2 and F2E series modules can be distributed as all other ports.

    Note The modules that you do not select must not be powered on after you configure this feature and enter Yes. An error message will force you to manually disable these modules before you continue. You will avoid significant disruptions and problems of service within a VDC.

    No form of this command resets the configuration mode to enable all modules.

    hope this helps

  • 3850 switch does not have wlan config.

    Hello

    I have a switch (running 03.03.05SE) 3850 functioning as WLC but it doesn´t take any configuration associated with an SSID.

    After a power failure she set the SSID on the default configuration and I can´t reconfigure (web or CLI).

    I tried to create a new wlan but it didn t work too.

    Thank you.

    Hey Mate,

    2 weeks ago, I hit this bug on my stack of 3850 running the 3.6.3 version.

    Below you will find the answer of the TAC engineer:

    This is a known issue and the following bug filed:

    CSCus85866    

    Invalid configuration Wlan error trying to change to PSK AKM

    Symptom:

    Error when you attempt to replace AKM PSK in the wlan configuration.

    %-configuration 2:wcm:Invalid WLAN switch. Dot1x or psk

    the authentication must be configured in wpa

     

    Workaround solution:

    Reset the unit to default settings or configure the key to passwd obscure

    Seems that the bug details are not public available and this is why does not have necessary permissions.

    Concerning

    Christos

  • EEM Applet does not fire TCL script after expiration of the countdown

    We use currently EEM Applet below than securities has BGP route and if this path fails, it starts a countdown of 45 min, once the countdown expires, the router reloads. If the BGP route restores it will remove the countdown applet.

    I'm trying to change this applet to reproduce the same type of behavior, but instead to recharge after 45 minutes, I am changing the cell parameters via Script TCL or other means besides.

    Is this possible? Can someone direct me how to proceed?

    Cisco 1941 Version 15.4 (3) M2

    event handler applet track down
    Description "this applet will add the countdown applet when BGP 10.66.66.66 road goes down."
    Event track 10 down state
    command action 1.0 cli 'enable '.
    Action 2.0 cli command "config t.
    Action 3.0 cli command "event manager applet countdown."
    action 3.1 cli command "description This cmdlet is the countdown and will cause the router reload after 2700 seconds if BGP route is always down.
    Action 3.2 cli command "event timer countdown 2700".
    action 3.3 cli command "reload action 1.0.
    Action 4.0 cli command "end".
    command action 4.1 cli 'enable '.
    Action 4.2 cli command "wr mem".
    Event Manager applet track-up
    Description "this cmdlet will delete the countdown applet when restores BGP route to 10.66.66.66.
    Event State track 10 upwards
    command action 1.0 cli 'enable '.
    Action 2.0 cli command "config t.
    action 3.0 cli command "no event manager applet countdown."
    Action 4.0 cli command "end".
    !

    This is the applet changed, with that I have had the most success. The issue I'm running into is, sound without waiting 60 seconds (for testing I reduced to 1 minute) to run the tcl script. From my limited understanding, I discovered that, after the countdown event - the applet requires an action immediately after but does not accept a command like 'tclsh Cell.tcl' cli as 'action '. »

    event handler applet track down
    Event track 10 down state
    command action 1.0 cli 'enable '.
    Action 1.1, «config t» cli command
    Action 1.3 cli command "event manager applet countdown."
    action 1.4 cli command 'event timer countdown 30 '.
    action 1.5 cli command "action 1.0 wait 30.
    Action 1.6 cli command "end".
    Action 1.7 cli command "tclsh Cell.tcl.
    Event Manager applet track-up
    Event State track 10 upwards
    command action 1.0 cli 'enable '.
    Action 2.0 cli command "config t.
    action 3.0 cli command "no event manager applet countdown."
    Action 4.0 cli command "end".

    It is the TCL script that I use to run cellular changes.

    tclsh
    puts [open "flash: Cell.tcl' w +] {}
    ios_config "interface 1/0/0" "shut".
    ios_config "0/1/0 lte tech gsm cell".
    ios_config "interface 1/0/0" 'no shut '.
    After 10000
    ios_config "interface 1/0/0" "shut".
    ios_config exec 'cell auto 0/1/0 lte tech '.
    ios_config "interface 1/0/0" 'no shut '.
    }
    tclquit

    Thank you
    Robert

    These cmdlets will not accomplish what you want.  I also recommend never call EEM tclsh.  You don't need to do.  Use EEM MCI in native mode, or in your case, just use pure applets.  Take a look at https://supportforums.cisco.com/document/12723951/how-introduce-large-de... .  If you follow this example and put your config CLI commands in the countdown applet, you will be able to achieve what you want.

  • Software ASDM does not load

    If I fight with this all day.  I tried 3 different machines, including a server.

    Essentially, when I try to access my ASA 5510 with the software load ASDM software ever.  So I tried to access it via the https://192.168.1.2 management port and installed the software.  The software starts up, I get the password and it connects and loads to 100% but does not extend beyond this point.  I try then the java applet, and it so up to 100% of load and said "Please wait, the main is to come."

    I have http server enabled, and asdm image is oriented correctly

    As I said, I tried this on two computers Windows XP and a computer that is running Server 2008.

    I can connect through CLI all day and all night, but I would have preferred (read feel much safer) by configuring it via ASDM.

    Here is some information of the system version

    Cisco Adaptive Security Appliance Software Version 7.0 (8)

    Version 5.0 device management (8)

    Updated Sunday, 31 May 08 23:48 by manufacturers

    System image file is "disk0: / asa708 - k8.bin.

    I suggest that you look at and see if you meet the requirements of system, especially for Java. If you do, I would suggest load a different version of Ministers DEPUTIES on the SAA, which always seems to solve the problem you are experiencing.

    http://www.Cisco.com/en/us/docs/security/ASA/asa70/asdm50/release/notes/RN508.html

  • RADIUS authorization does not not for Nortel by ACS 5.3 switches

    Hello

    RADIUS authorization does not work on the Nortel switches, I configured the access policies relevant for the attributes RADIUS (attached screenshot)

    Order get not executed due to the failure of authorization:

    config cli password rwa

    I do not see RADIUS authorization reports option, just to check if someone has understood how to set up these reports?

    I made a capture of packages for packages of AAA of the nortel switch and found that the accounting request contains the cli command sent for authorization. (pcap file attached)

    Kind regards

    Akhtar

    Akhtar,

    This isn't how the authorization of RADIUS. Accept access and the av-pairs that are sent in the response is the permission for the session of the user. This isn't like Ganymede where each command is permitted with an authentication request separate with the command that the client is running.

    When it comes to radius account management isn't too late in the process.

    Thank you

    Tarik admani

  • ASA 5505. VPN Site-to-Site does not connect!

    Hello!
    Already more than a week there, as we had a new channel of communication of MGTSa (Ontario terminal Sercomm RV6688BCM, who barely made in the 'bridge' - had to do the provider in order to receive our white Cisco Ip address), and now I train as well more that one week to raise between our IKEv1 IPsec Site-to-Site VPN tunnel closes offices.
    Configurable and use the wizard in ASDM and handles in the CLI, the result of a year, the connection does not rise.
    Cisco version 9.2 (2), the image of the Cisco asa922 - k8.bin, Security Plus license version, version 7.2 AMPS (2).
    What I'll never know...
    Debugging and complete configuration enclose below.
    Help, which can follow any responses, please! I was completely exhausted!

    Config:

    Output of the command: "sh run".

    : Saved
    :
    : Serial: XXXXXXXXXXXX
    : Material: ASA5505, 512 MB RAM, 500 MHz Geode Processor
    :
    ASA Version 9.2 (2)
    !
    hostname door-71
    activate the encrypted password of F6OJ0GOws7WHxeql
    names of
    IP local pool vpnpool 10.1.72.100 - 10.1.72.120 mask 255.255.255.0
    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 10.1.72.254 255.255.255.0
    !
    interface Vlan2
    nameif outside_mgts
    security-level 0
    62.112.100.R1 255.255.255.252 IP address
    !
    passive FTP mode
    clock timezone 3 MSK/MSD
    clock to DST MSK/MDD recurring last Sun Mar 02:00 last Sun Oct 03:00
    DNS lookup field inside
    DNS server-group MGTS
    Server name 195.34.31.50
    permit same-security-traffic inter-interface
    permit same-security-traffic intra-interface
    network obj_any object
    subnet 0.0.0.0 0.0.0.0
    network of the NET72 object
    10.1.72.0 subnet 255.255.255.0
    network object obj - 0.0.0.0
    host 0.0.0.0
    network of the Nafanya object
    Home 10.1.72.5
    network object obj - 10.1.72.0
    10.1.72.0 subnet 255.255.255.0
    network of the NET61 object
    10.1.61.0 subnet 255.255.255.0
    network of the NETWORK_OBJ_10.1.72.96_27 object
    subnet 10.1.72.96 255.255.255.224
    network of the NETT72 object
    10.1.72.0 subnet 255.255.255.0
    network of the NET30 object
    10.1.30.0 subnet 255.255.255.0
    network of the NETWORK_OBJ_10.1.72.0_24 object
    10.1.72.0 subnet 255.255.255.0
    object-group service OG INET
    the purpose of the echo icmp message service
    response to echo icmp service object
    service-object icmp traceroute
    service-object unreachable icmp
    service-purpose tcp - udp destination eq echo
    the DM_INLINE_NETWORK_1 object-group network
    network-object NET30
    network-object, object NET72
    DM_INLINE_TCP_1 tcp service object-group
    port-object eq www
    EQ object of the https port
    inside_access_in extended access list permit ip object NET72 object-group DM_INLINE_NETWORK_1
    access extensive list ip 10.1.72.0 inside_access_in allow 255.255.255.0 any
    inside_access_in extended access list permit ip object Nafanya any idle state
    inside_access_in list extended access allowed object-group OG INET an entire
    inside_access_in of access allowed any ip an extended list
    inside_access_in list extended access deny ip any alerts on any newspaper
    outside_mgts_access_in list extended access allowed object-group OG INET an entire
    outside_mgts_access_in list extended access permit tcp any any DM_INLINE_TCP_1 object-group
    outside_mgts_access_in list extended access deny ip any alerts on any newspaper
    access extensive list ip 10.1.72.0 outside_mgts_cryptomap allow 255.255.255.0 object NET61
    VPN-ST_splitTunnelAcl permit 10.1.72.0 access list standard 255.255.255.0
    pager lines 24
    Enable logging
    asdm of logging of information
    Within 1500 MTU
    outside_mgts MTU 1500
    IP check path reverse interface outside_mgts
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    no permit-nonconnected arp
    NAT (inside outside_mgts) static source NET72 NET72 NETWORK_OBJ_10.1.72.96_27 NETWORK_OBJ_10.1.72.96_27 non-proxy-arp-search of route static destination
    NAT (inside outside_mgts) static source NETWORK_OBJ_10.1.72.0_24 NETWORK_OBJ_10.1.72.0_24 NET61 NET61 non-proxy-arp-search of route static destination
    !
    network obj_any object
    NAT (inside outside_mgts) dynamic obj - 0.0.0.0
    network of the NET72 object
    NAT (inside outside_mgts) interface dynamic dns
    inside_access_in access to the interface inside group
    Access-group outside_mgts_access_in in the outside_mgts interface
    Route 0.0.0.0 outside_mgts 0.0.0.0 62.112.100.R 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    without activating the user identity
    identity of the user by default-domain LOCAL
    AAA authentication http LOCAL console
    the ssh LOCAL console AAA authentication
    Enable http server
    http 10.1.72.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-TRANS-aes - esp esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-MD5-TRANS esp - esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transit
    Crypto ipsec ikev2 AES256 ipsec-proposal
    Protocol esp encryption aes-256
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES192
    Protocol esp encryption aes-192
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES
    Esp aes encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 proposal ipsec 3DES
    Esp 3des encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal OF
    encryption protocol esp
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec pmtu aging infinite - the security association
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
    card crypto outside_mgts_map 1 match address outside_mgts_cryptomap
    card crypto outside_mgts_map 1 set pfs Group1
    peer set card crypto outside_mgts_map 1 91.188.180.42
    card crypto outside_mgts_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    outside_mgts_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
    card crypto outside_mgts_map interface outside_mgts
    inside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
    inside crypto map inside_map interface
    Crypto ca trustpoint ASDM_TrustPoint0
    registration auto
    E-mail [email protected] / * /
    name of the object CN = door-71
    Serial number
    IP address 62.112.100.42
    Proxy-loc-transmitter
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint1
    registration auto
    ASDM_TrustPoint1 key pair
    Configure CRL
    trustpool crypto ca policy
    string encryption ca ASDM_TrustPoint0 certificates
    certificate eff26954
    30820395 3082027d a0030201 020204ef f2695430 0d06092a 864886f7 0d 010105
    019
    6460ae26 ec5f301d 0603551d 0e041604 14c9a3f2 d70e6789 38fa4b01 465d 1964
    60ae26ec 5f300d06 092 has 8648 01050500 03820101 00448753 7baa5c77 86f70d01
    62857b 65 d05dc91e 3edfabc6 7b3771af bbedee14 673ec67d 3d0c2de4 b7a7ac05
    5f203a8c 98ab52cf 076401e5 1a2c6cb9 3f7afcba 52c617a5 644ece10 d6e1fd7d
    28b57d8c aaf49023 2037527e 9fcfa218 9883191f 60b221bf a561f2be d6882091
    0222b7a3 3880d6ac 49328d1f 2e085b15 6d1c1141 5f850e5c b6cb3e67 0e373591
    94a 82781 44493217 and 38097952 d 003 5552 5c445f1f 92f04039 a23fba20 b9d51b13
    f511f311 d1feb2bb 6d056a15 7e63cc1b 1f134677 8124c 024 3af56b97 51af8253
    486844bc b1954abe 8acd7108 5e4212df db835d76 98ffdb2b 8c8ab915 193b 8167
    0db3dd54 c8346b96 c4f4eff7 1e7cd576 a8b1f86e 3b868a6e 89
    quit smoking
    string encryption ca ASDM_TrustPoint1 certificates
    certificate a39a2b54
    3082025f 30820377 a0030201 020204 has 3 9a2b5430 0d06092a 864886f7 0d 010105
    0500304 06035504 03130767 36313137 30120603 55040513 6174652d 3110300e b
       
    c084dcd9 d250e194 abcb3eb8 1da93bd0 fb0dba1a b1c35b43 d547a841 5d4ee1a4
    14bdb207 7dd790a4 0cd 70471 5f3a896a 07bd56dc ea01b3dd 254cde88 e1490e97
    f3e54c05 551adde0 66aa3782 c85880c2 b162ec29 4e49346a df71062d 6d6d8f49
    62b9de93 ba07b4f7 a50e77e1 8f54b32b 6627cb27 e982b36f a 362973, 0 88de3272
    9bd6d4d2 8ca1e11f 214f20a9 78bdea95 78fdc45c d6d45674 6acb9bcb d0bd930e
    638eedfe cd559ab1 e1205c48 3ee9616f e631db55 e82b623c 434ffdc1 11020301
    0001 has 363 3061300f 0603551d 130101ff 0101ff30 04053003 0e060355 1d0f0101
    ff040403 1f060355 02018630 230418 30168014 0cea70bf 0d0e0c4b eb34a0b1 1 d
    8242 has 549 0603 551d0e04 1604140c ea70bf0d 0e0c4beb 34a0b182 301D 5183ccf9
    42a 54951 010105 05000382 0101004e 7bfe054a 0d 864886f7 0d06092a 83ccf930
    d434a27c 1d3dce15 529bdc5f 70a2dff1 98975de9 2a97333b 96077966 05a8e9ef
    bf320cbd ecec3819 ade20a86 9aeb5bde bd129c7b 29341e4b edf91473 f2bf235d
    9aaeae21 a629ccc6 3c79200b b9a89b08 bf38afb6 ea56b957 4430f692 a 4745, 411
    34d71fad 588e4e18 2b2d97af b2aae6b9 b6a22350 d031615b 49ea9b9f 2fdd82e6
    ebd4dccd df93c17e deceb796 f268abf1 881409b 5 89183841 f484f0e7 bd5f7b69
    ebf7481c faf69d3e 9d24df6e 9c2b0791 785019f7 a0d20e95 2ef35799 66ffc819
    4a77cdf2 c6fb4380 fe94c13c d4261655 7bf3d6ba 6289dc8b f9aad4e1 bd918fb7
    32916fe1 477666ab c2a3d591 a84dd435 51711f6e 93e2bd84 89884c
    quit smoking
    crypto isakmp identity address
    IKEv2 crypto policy 1
    aes-256 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 10
    aes-192 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 20
    aes encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 30
    3des encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 40
    the Encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    Crypto ikev2 activate outside_mgts port 443 customer service
    Crypto ikev2 access remote trustpoint ASDM_TrustPoint0
    Crypto ikev1 allow inside
    Crypto ikev1 enable outside_mgts
    IKEv1 crypto policy 10
    authentication crack
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 20
    authentication rsa - sig
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 30
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 40
    authentication crack
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 50
    authentication rsa - sig
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 60
    preshared authentication
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 70
    authentication crack
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 80
    authentication rsa - sig
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 90
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 100
    authentication crack
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 110
    authentication rsa - sig
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 120
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 130
    authentication crack
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 140
    authentication rsa - sig
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 150
    preshared authentication
    the Encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    without ssh stricthostkeycheck
    SSH 10.1.72.0 255.255.255.0 inside
    SSH timeout 60
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    vpnclient Server 91.188.180.X
    vpnclient mode network-extension-mode
    vpnclient nem-st-autoconnect
    VPN - L2L vpnclient vpngroup password *.
    vpnclient username aradetskayaL password *.
    dhcpd auto_config outside_mgts
    !
    dhcpd update dns replace all two interface inside
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    SSL-trust ASDM_TrustPoint0 inside point
    SSL-trust ASDM_TrustPoint0 outside_mgts point
    WebVPN
    Select outside_mgts
    internal GroupPolicy_91.188.180.X group strategy
    attributes of Group Policy GroupPolicy_91.188.180.X
    Ikev1 VPN-tunnel-Protocol
    internal group VPN - ST strategy
    attributes of group VPN - ST policy
    value of 195.34.31.50 DNS Server 8.8.8.8
    Ikev1 VPN-tunnel-Protocol
    Split-tunnel-policy tunnelspecified
    Split-tunnel-network-list value VPN-ST_splitTunnelAcl
    by default no
    aradetskayaL encrypted HR3qeva85hzXT6KK privilege 15 password username
    tunnel-group 91.188.180.X type ipsec-l2l
    attributes global-tunnel-group 91.188.180.X
    Group - default policy - GroupPolicy_91.188.180.42
    IPSec-attributes tunnel-group 91.188.180.X
    IKEv1 pre-shared-key *.
    remote control-IKEv2 pre-shared-key authentication *.
    remotely IKEv2 authentication certificate
    pre-shared-key authentication local IKEv2 *.
    remote access to tunnel-group VPN - ST type
    VPN-general ST-attributes tunnel-group
    address vpnpool pool
    Group Policy - by default-VPN-ST
    tunnel-group ipsec VPN ST-attributes
    IKEv1 pre-shared-key *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    inspect the icmp
    inspect the icmp error
    !
    global service-policy global_policy
    context of prompt hostname
    no remote anonymous reporting call
    Cryptochecksum:212e4f5035793d1c219fed57751983d8
    : end

    door-71 # sh crypto ikev1 his

    There are no SAs IKEv1

    door-71 # sh crypto ikev2 his

    There are no SAs IKEv2

    door-71 # sh crypto ipsec his


    There is no ipsec security associations
    door-71 # sh crypto isakmp

    There are no SAs IKEv1

    There are no SAs IKEv2

    Global statistics IKEv1
    The active Tunnels: 0
    Previous Tunnels: 0
    In bytes: 0
    In the packages: 0
    In packs of fall: 0
    In Notifys: 0
    In the constituencies of P2: 0
    In P2 invalid Exchange: 0
    In P2 Exchange rejects: 0
    Requests for removal in his P2: 0
    Bytes: 0
    Package: 0
    Fall packages: 0
    NOTIFYs out: 0


    Exchanges of P2: 0
    The Invalides Exchange P2: 0
    Exchange of P2 rejects: 0
    Requests to remove on P2 Sa: 0
    Tunnels of the initiator: 0
    Initiator fails: 0
    Answering machine fails: 0
    Ability system breaks down: 0
    AUTH failed: 0
    Decrypt failed: 0
    Valid hash fails: 0
    No failure his: 0

    IKEV1 statistics for Admission appeals
    In negotiating SAs Max: 25
    In negotiating SAs: 0
    In negotiating SAs Highwater: 0
    In negotiating SAs rejected: 0

    Global statistics IKEv2
    The active Tunnels: 0
    Previous Tunnels: 0
    In bytes: 0
    In the packages: 0
    In packs of fall: 0
    In Fragments of fall: 0
    In Notifys: 0
    In Exchange for the P2: 0
    In P2 invalid Exchange: 0
    In P2 Exchange rejects: 0
    In IPSEC delete: 0
    In delete IKE: 0
    Bytes: 0
    Package: 0
    Fall packages: 0
    Fragments of fall: 0
    NOTIFYs out: 0
    Exchange of P2: 0
    The Invalides Exchange P2: 0
    Exchange of P2 rejects: 0
    On IPSEC delete: 0
    The IKE Delete: 0
    Locally launched sAs: 0
    Locally launched sAs failed: 0
    SAs remotely initiated: 0
    SAs remotely initiated failed: 0
    System capacity: 0
    Authentication failures: 0
    Decrypt failures: 0
    Hash failures: 0
    Invalid SPI: 0
    In the Configs: 0
    Configs: 0
    In the Configs rejects: 0
    Configs rejects: 0
    Previous Tunnels: 0
    Previous Tunnels wraps: 0
    In the DPD Messages: 0
    The DPD Messages: 0
    The NAT KeepAlive: 0
    IKE recomposition launched locally: 0
    IKE returned to the remote initiated key: 0
    Generate a new key CHILD initiated locally: 0
    CHILD given to the remote initiated key: 0

    IKEV2 statistics for Admission appeals
    Max active SAs: no limit
    Max in negotiating SAs: 50
    Challenge cookie line: never
    Active sAs: 0
    In negotiating SAs: 0
    Incoming requests: 0
    Accepted incoming requests: 0
    A rejected incoming requests: 0
    Out of requests: 0
    Out of the applications accepted: 0
    The outgoing rejected requests: 0
    A rejected queries: 0
    Rejected at the SA: 0 Max limit
    Rejected low resources: 0
    Rejected the current reboot: 0
    Challenges of cookie: 0
    Cookies transmitted challenges: 0
    Challenges of cookie failed: 0

    IKEv1 global IPSec over TCP statistics
    --------------------------------
    Embryonic connections: 0
    Active connections: 0
    Previous connections: 0
    Incoming packets: 0
    Inbound packets ignored: 0
    Outgoing packets: 0
    Outbound packets ignored: 0
    The RST packets: 0
    Heartbeat Recevied ACK packets: 0
    Bad headers: 0
    Bad trailers: 0
    Chess timer: 0
    Checksum errors: 0
    Internal error: 0

     
    door-71 # sh statistical protocol all cryptographic
    [Statistics IKEv1]
    Encrypt packets of requests: 0
    Encapsulate packets of requests: 0
    Decrypt packets of requests: 0
    Decapsulating requests for package: 0
    HMAC calculation queries: 0
    ITS creation queries: 0
    SA asked to generate a new key: 0
    Deletion requests: 0
    Next phase of allocation key applications: 0
    Number of random generation queries: 0
    Failed requests: 0
    [Statistics IKEv2]
    Encrypt packets of requests: 0
    Encapsulate packets of requests: 0
    Decrypt packets of requests: 0
    Decapsulating requests for package: 0
    HMAC calculation queries: 0
    ITS creation queries: 0
    SA asked to generate a new key: 0
    Deletion requests: 0
    Next phase of allocation key applications: 0
    Number of random generation queries: 0
    Failed requests: 0
    [IPsec statistics]
    Encrypt packets of requests: 0
    Encapsulate packets of requests: 0
    Decrypt packets of requests: 0
    Decapsulating requests for package: 0
    HMAC calculation queries: 0

    ITS creation queries: 0
    SA asked to generate a new key: 0
    Deletion requests: 0
    Next phase of allocation key applications: 0
    Number of random generation queries: 0
    Failed requests: 0
    [SSL statistics]
    Encrypt packets of queries: 19331
    Encapsulate packets of queries: 19331
    Decrypt packets of queries: 437
    Package requests decapsulating: 437
    HMAC calculation queries: 19768
    ITS creation queries: 178
    SA asked to generate a new key: 0
    Requests to remove SA: 176
    Next phase of allocation key applications: 0
    Number of random generation queries: 0
    Failed requests: 0
    [Statistical SSH are not taken in charge]
    [Statistics SRTP]
    Encrypt packets of requests: 0
    Encapsulate packets of requests: 0
    Decrypt packets of requests: 0
    Decapsulating requests for package: 0
    HMAC calculation queries: 0
    ITS creation queries: 0
    SA asked to generate a new key: 0
    Deletion requests: 0
    Next phase of allocation key applications: 0
    Number of random generation queries: 0
    Failed requests: 0
    [Statistics]
    Encrypt packets of requests: 0
    Encapsulate packets of requests: 0
    Decrypt packets of requests: 0
    Decapsulating requests for package: 0
    HMAC calculation queries: 6238
    ITS creation queries: 0
    SA asked to generate a new key: 0
    Deletion requests: 0
    Next phase of allocation key applications: 0
    Number of queries random generation: 76
    Failure of queries: 9

    door-71 # sh crypto ca trustpoints

    Trustpoint ASDM_TrustPoint0:
    Configured for the production of a self-signed certificate.

    Trustpoint ASDM_TrustPoint1:
    Configured for the production of a self-signed certificate.

    If you need something more, then spread!
    Please explain why it is that I don't want to work?

    Hello

    When the IPSEC tunnel does not come to the top, the first thing comes to my mind is to run a tracer of package from the CLI and the phases in it. Please run this command from your firewall side and share the output. I've just compiled this command with the random ip address and ports of your given range.

    Packet-trace entry inside tcp 10.1.72.2 1233 10.1.61.2 443 detailed

    Best regards

    Amandine

Maybe you are looking for