MIDLET error in Cisco IP 7975

Hello world

I have a problem when I try to load the MIDLET in the IP Phone 7975, I rececive an error: "error, contact administrator.

I configured two MIDLETS, one for the Publisher and one for Subsriber services.

The version of the devices are:

Cisco CUCM--> 9.1.2

CTS-500 37 "--> 1.8.5 (4) _P1"

IP Phone 7975--> SIP75.9 - 2-1 s

Version of MIDLETS is--> Transport SPM - 1.8.2 - P1-1 s

The IP Telephony Service is set up fine because I copy the url of this VoIP Service and no error in the browser.

The CTS 500 in the device information obtain the IP, Mac address, and the version of the IP phone; but in the details of the status indicates the following:

Connection: error; Software: Impossible to retrieve the version of the software

In the URL of the IP phone, I got the following newspapers:

| == Syslogd NPT == Thu Jan 23 13:34:35 2014

====================================================

6422: NO 13:34:35.356640 JVM: Boot Loader Module | cip.midp.midletsuite.InstallerModule:? -Download of Jad... MIDLETS SUB

6423: ERR 13:34:35.405343 JVM: Boot Loader Module | cip.midp.midletsuite.ah:? -L'Url http://X.X.X.X:6970/TSPM-1.8.2-P1-1S.jad is available, use this IP address.

6424: ERR 13:34:36.199305 JVM: 13:34:36 | Install Exception: Missing Office name:

at cip.midp.midletsuite.ah.h () V (unknown Source)

to cip.midp.midletsuite.ah.a (Lcip/midp/midletsuite/u; Lcip/cfg/XmlServiceObject ;) V (unknown Source)

to cip.midp.midletsuite.ah.a (Lcip/srvc/z; Ljava/lang/String; ZZLcip/midp/midletsuite/p; Lcip/cfg/XmlServiceObject ;) V (unknown Source)

to cip.midp.midletsuite.ah.a (Lcip/srvc/z; ZZLcip/midp/midletsuite/p; Lcip/cfg/XmlServiceObject ;) V (unknown Source)

to cip.midp.midletsuite.InstallerModule.a (Lcip/cfg/XmlServiceObject ;) V (unknown Source)

to cip.midp.midletsuite.z.a (Lcip/midp/midletsuite/b; Lcip/sys/x ;) V (unknown Source)

to cip.midp.midletsuite.z.sinkMessage (Lcip/sys/x ;) V (unknown Source)

to cip.sys.n.sinkMessage (Lcip/sys/x ;) V (unknown Source)

to cip.sys.aa.a (Lcip/sys/ad ;) Ljava/lang/Throwable; (Unknown source)

at cip.sys.aa.e () V (unknown Source)

at cip.sys.l.run () V (unknown Source)

to java.lang.Thread.startup (Z) V (unknown Source)

6425: NO 13:34:36.203955 JVM: Boot Loader Module | cip.midp.midletsuite.InstallerModule:? -Error/Install midlet cancelled... MIDLETS SUB

6426: NO 13:34:37.807561 JVM: Boot Loader Module | cip.srvc.Services:? -Service url used http://X.X.X.X:8080/ccmcip/getservicesmenu.jsp

6427: NO 13:34:37.809126 JVM: Boot Loader Module | cip.srvc.Services:? -Service url used http:/X.X.X.X:8080/ccmcip/getservicesmenu.jsp

6428: AVT 13:34:39.372046 JVM: boot loader Module. class cip.srvc.XsiMIDletSuiteResponse: (unmanaged updateStatus (-0))

6429: ERR 13:34:39.393814 JVM: Boot Loader Module | cip.midp.midletsuite.ah:? -The http://X.X.X.X:6970/TSPM-1.8.2-P1-1S.jad Url is available, use this IP address.

6430: ERR 13:34:40.212716 JVM: 13:34:40 | Install Exception: Missing Office name:

at cip.midp.midletsuite.ah.h () V (unknown Source)

to cip.midp.midletsuite.ah.a (Lcip/midp/midletsuite/u; Lcip/cfg/XmlServiceObject ;) V (unknown Source)

to cip.midp.midletsuite.ah.a (Lcip/srvc/z; Ljava/lang/String; ZZLcip/midp/midletsuite/p; Lcip/cfg/XmlServiceObject ;) V (unknown Source)

to cip.midp.midletsuite.ah.a (Lcip/srvc/z; ZZLcip/midp/midletsuite/p; Lcip/cfg/XmlServiceObject ;) V (unknown Source)

to cip.midp.midletsuite.InstallerModule.a (Lcip/srvc/bj; Lcip/MIDP/midletsuite/p ;) V (unknown Source)

to cip.midp.midletsuite.z.a (Lcip/midp/midletsuite/b; Lcip/sys/x ;) V (unknown Source)

to cip.midp.midletsuite.z.sinkMessage (Lcip/sys/x ;) V (unknown Source)

to cip.sys.n.sinkMessage (Lcip/sys/x ;) V (unknown Source)

to cip.sys.aa.a (Lcip/sys/ad ;) Ljava/lang/Throwable; (Unknown source)

at cip.sys.aa.e () V (unknown Source)

at cip.sys.l.run () V (unknown Source)

to java.lang.Thread.startup (Z) V (unknown Source)

6431: ERR 13:34:46.631911 JVM: call activate listening for incoming http connections

6432: ERR 13:34:46.692003 JVM: call activate listening for incoming http connections

I have change the address IP of CUCMs oft X.X.X.X.

I followed the documentation for you register very well and to clear the factory default IP phone, removed the old midlet but I do not understand which works very well.

If I don't call other video endpoints of the CTS is working too fine and the line shared by the CTS and IP phone.

Can someone help me?

Thanks in advance.

Best regards.

Hello

You will need to change the name of the Service and the ASCII service name as follows:

TSPM-1.8.2-P1-1S

And then reset the phone of CUCM.  Let me know if that clears it.

-Jonathan

Tags: Cisco Support

Similar Questions

  • Unable to connect to the Internet, the error message "Cisco AnyConnect VPN agent service is not responding. Please restart this application after a minute"

    Original title: unable to connect to the internet

    Whenever I connect to my computer and get it on my desk, it goes on to say that Cisco AnyConnect VPN Service not available. How can I fix? I am not connected to the internet and I can't connect to the internet as well. He said also Cisco AnyConnect VPN service agent is not an answer. Please restart this application after a minute. Also, I can't use my firewall for some reason, if I try to allow its loading and the greenbar's going that far - then stops and says that there is an error. I forgot where I tried to activate.

    Oh thanks for the help but I fix it myself. I just did a system restore to a month before

  • Port gets mode error on Cisco catalyst 3020 after the reboot ESX host

    Hi all!

    I know that this may be the right forum for this questin, nut I m hoping someone can give men a response. Since I m a newbe for switches I use the assistants of Cisco network and Cisco will help me to access the SAN switches.

    As I said in the topic ports gets error on switch mode, most of the time I restart the host. I have to disable and then enable port it to rise again. Also, I get this message in the switch:

    This port has been disabled because the link turned out be fluctuating between high and low States quickly.

    Reason could be bad physical connector hardware or drivers on the device of the OSH connection switch port is faulty.

    Recommendation: Replace physical connector or upgrade the drivers on the switch port or try to replace the cable and re-enable the port.

    Is some setting that I can change the switch to make this disappear? All commands in telnet againt the switch?

    Maybe that's your problem:

    http://h20000.www2.HP.com/bizsupport/TechSupport/document.jsp?objectID=c01869687&lang=en&cc=us&TaskID=101&prodSeriesId=3884113&prodTypeId=15351

    / Rubeck

  • Home add error to Cisco N1000v

    Cannot complete the operation Distributed Virtual Switch for one or several members of host.

    Operations of DVS failed on host x, error when configuring the host: create dvswitch failed with the following error message: sysinfoexception:node (vsi_node_net_create); (bad0003) status = not trouvΘ; message = instance (0). Input (3) DvsPortset-0 256 cisco_nexus_1000v had exception (vim.fault.PlatformConfigFault)

    I have some info on the Crossover questions. This could do not apply to your problem, but apparently there is a problem when Crossover is set up with a Proxy. VUM needs to talk to the outside world and the VSM. When a proxy is configured VUM tries to reach the VSM by the proxy. This usually does not work. In the current version, there is no telling VUM way do not use proxy for local hosts. VUM must be able to talk to the VSM to install the module VEM. I know that VMware is working on a fix for this. The work around is to install manually the VEM modules.

    There are several fixes that VMware has released that require a new module VEM. These new modules are available through the repository VUM or www.cisco.com. In addition to the new patches, you also have to make a change to the configuration of VUM. This change must be made if you have connected your ESX boxes. Follow this KB article to apply the change to VUM http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=1013134&sliceId=1&docTypeID=DT_KB_1_1&dialogID=33585888&stateId=0%200%2033593220

    If you are installing the MEC manually the following will help determine what VEM version must be loaded.

    • If you are running ESX or ESXi to build 164009 (essentially no patches) use module cross_cisco-vem-v100-4.0.4.1.1.27-0.4.2-release.vib VEM

    • If loading the patch ESX400-200906001 or ESXi400-200906001 use the cross_cisco-vem-v100-4.0.4.1.1.28-0.5.2-release.vib VEM module

    • If you have loaded patch ESX400-200907001 or cross_cisco-vem-v100-4.0.4.1.1.28-0.6.2-release.vib module VEM ESXi400-200907001use

    Your network problem sounds like you try to migrate the nic that has your interfaces vswif and vmk. This is permitted, but you have to if make sure that you have the following set.

    • Make sure that your profile-uplink port "system vlan w, xy, z ' where w = vswif VLANs, x = vmk vlan, y = control vlan, z = package vlan. If vmk and vswif use the vlan obviously just have one entry

    • Make sure that your port for the vswif and the vmk profile also have a ' system vlan x "command for corresponding VLANs

    If you are a beginner it is easier to add a network adapter that does not have interfaces configured on it vswif or vmk. Use this network adapter to the virtual computer data traffic, and then when you more comfortable with the N1KV migrate your interfaces vswif and vmk.

    Let us know if you still have problems with the installation.

    Louis

  • Cisco 7975 XML user interface

    Hello

    I have a full 500 CTS with CUCM 6.1.2. I can't use the MIDlets UI on my phone 7975 as usable only for version 7.0.2 CUCM MIDlets and above. That's what I got from all the documentation. So I have to use to operate the UI XML on my Cisco 7975. But I failed to find any document on how to do it. Appriciate any help on the configuration of the user interface XML for ip phone 7975.

    Thank you

    Subash

    Hi Philip:

    Under the locations section of external data for the IP phone attached to your codec, enter it below to the following parameters:

    Authentication server:

    codecIPaddresshttp://: 8080/authenticate.html

    Services:

    http://codecIPaddress:8080 / services.html

    Inactive:

    http://codecIPaddress:8080 / Idle.html

    Idle time (in seconds) timer 1

    Ensure that you have no configured/Subscriber midlet to the IP on the CUCM phone; also ensure that your 500 CTS is not ongoing enforcement 1.7, midlets are required for CTS 1.7.  You may have to restart the phone IP and codec of CUCM, once you have configured the above.

    HTH

  • % 7-ASA-710005: request TCP thrown error in the Client VPN Site to CISCO ASA 5510

    Hi friends,

    I am trying to built customer to site VPN CISCO ASA 5510 8.4 (4) and get error below when connecting to a cisco VPN client software. Also, I'm below ASA, log. Please help me to reslove.

    Error in CISCO VPN Client software:

    Secure VPN connection terminated locally by the client.

    Reason: 414: unable to establish a TCP connection.

    Error in CISCO ASA 5510

    7-ASA-710005%: TCP request and eliminated from 49276 outward: 10000

    The ASA configuration:

    XYZ # sh run
    : Saved
    :
    ASA Version 8.4 (4)
    !
    hostname XYZ
    domain XYZ
    activate the password encrypted 3uLkVc9JwRA1/OXb N3
    activate the encrypted password of R/x90UjisGVJVlh2
    2KFQnbNIdI.2KYOU encrypted passwd
    names of
    !
    interface Ethernet0/0
    nameif outside_rim
    security-level 0
    IP 1.1.1.1 255.255.255.252
    !
    interface Ethernet0/1
    full duplex
    nameif XYZ_DMZ
    security-level 50
    IP 172.1.1.1 255.255.255.248
    !
    interface Ethernet0/2
    Speed 100
    full duplex
    nameif outside
    security-level 0
    IP address 2.2.2.2 255.255.255.252
    !
    interface Ethernet0/3
    Speed 100
    full duplex
    nameif inside
    security-level 100
    IP 3.3.3.3 255.255.255.224
    !
    interface Management0/0
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    boot system Disk0: / asa844 - k8.bin
    passive FTP mode
    DNS domain-lookup outside
    DNS server-group DefaultDNS
    Server name xx.xx.xx.xx
    Server name xx.xx.xx.xx
    Server name xx.xx.xx.xx
    Server name xx.xx.xx.xx
    domain XYZ
    network object obj - 172.17.10.3
    Home 172.17.10.3
    network object obj - 10.1.134.0
    10.1.134.0 subnet 255.255.255.0
    network object obj - 208.75.237.0
    208.75.237.0 subnet 255.255.255.0
    network object obj - 10.7.0.0
    10.7.0.0 subnet 255.255.0.0
    network object obj - 172.17.2.0
    172.17.2.0 subnet 255.255.255.0
    network object obj - 172.17.3.0
    172.17.3.0 subnet 255.255.255.0
    network object obj - 172.19.2.0
    172.19.2.0 subnet 255.255.255.0
    network object obj - 172.19.3.0
    172.19.3.0 subnet 255.255.255.0
    network object obj - 172.19.7.0
    172.19.7.0 subnet 255.255.255.0
    network object obj - 10.1.0.0
    10.1.0.0 subnet 255.255.0.0
    network object obj - 10.2.0.0
    10.2.0.0 subnet 255.255.0.0
    network object obj - 10.3.0.0
    10.3.0.0 subnet 255.255.0.0
    network object obj - 10.4.0.0
    10.4.0.0 subnet 255.255.0.0
    network object obj - 10.6.0.0
    10.6.0.0 subnet 255.255.0.0
    network object obj - 10.9.0.0
    10.9.0.0 subnet 255.255.0.0
    network object obj - 10.11.0.0
    10.11.0.0 subnet 255.255.0.0
    network object obj - 10.12.0.0
    10.12.0.0 subnet 255.255.0.0
    network object obj - 172.19.1.0
    172.19.1.0 subnet 255.255.255.0
    network object obj - 172.21.2.0
    172.21.2.0 subnet 255.255.255.0
    network object obj - 172.16.2.0
    172.16.2.0 subnet 255.255.255.0
    network object obj - 10.19.130.201
    Home 10.19.130.201
    network object obj - 172.30.2.0
    172.30.2.0 subnet 255.255.255.0
    network object obj - 172.30.3.0
    172.30.3.0 subnet 255.255.255.0
    network object obj - 172.30.7.0
    172.30.7.0 subnet 255.255.255.0
    network object obj - 10.10.1.0
    10.10.1.0 subnet 255.255.255.0
    network object obj - 10.19.130.0
    10.19.130.0 subnet 255.255.255.0
    network of object obj-XXXXXXXX
    host XXXXXXXX
    network object obj - 145.248.194.0
    145.248.194.0 subnet 255.255.255.0
    network object obj - 10.1.134.100
    Home 10.1.134.100
    network object obj - 10.9.124.100
    Home 10.9.124.100
    network object obj - 10.1.134.101
    Home 10.1.134.101
    network object obj - 10.9.124.101
    Home 10.9.124.101
    network object obj - 10.1.134.102
    Home 10.1.134.102
    network object obj - 10.9.124.102
    Home 10.9.124.102
    network object obj - 115.111.99.133
    Home 115.111.99.133
    network object obj - 10.8.108.0
    10.8.108.0 subnet 255.255.255.0
    network object obj - 115.111.99.129
    Home 115.111.99.129
    network object obj - 195.254.159.133
    Home 195.254.159.133
    network object obj - 195.254.158.136
    Home 195.254.158.136
    network object obj - 209.164.192.0
    subnet 209.164.192.0 255.255.224.0
    network object obj - 209.164.208.19
    Home 209.164.208.19
    network object obj - 209.164.192.126
    Home 209.164.192.126
    network object obj - 10.8.100.128
    subnet 10.8.100.128 255.255.255.128
    network object obj - 115.111.99.130
    Home 115.111.99.130
    network object obj - 10.10.0.0
    subnet 10.10.0.0 255.255.0.0
    network object obj - 115.111.99.132
    Home 115.111.99.132
    network object obj - 10.10.1.45
    Home 10.10.1.45
    network object obj - 10.99.132.0
    10.99.132.0 subnet 255.255.255.0
    the Serversubnet object-group network
    object-network 10.10.1.0 255.255.255.0
    network-object 10.10.5.0 255.255.255.192
    the XYZ_destinations object-group network
    object-network 10.1.0.0 255.255.0.0
    object-network 10.2.0.0 255.255.0.0
    network-object 10.3.0.0 255.255.0.0
    network-object 10.4.0.0 255.255.0.0
    network-object 10.6.0.0 255.255.0.0
    network-object 10.7.0.0 255.255.0.0
    network-object 10.11.0.0 255.255.0.0
    object-network 10.12.0.0 255.255.0.0
    object-network 172.19.1.0 255.255.255.0
    object-network 172.19.2.0 255.255.255.0
    object-network 172.19.3.0 255.255.255.0
    object-network 172.19.7.0 255.255.255.0
    object-network 172.17.2.0 255.255.255.0
    object-network 172.17.3.0 255.255.255.0
    object-network 172.16.2.0 255.255.255.0
    object-network 172.16.3.0 255.255.255.0
    host of the object-Network 10.50.2.206
    the XYZ_us_admin object-group network
    network-object 10.3.1.245 255.255.255.255
    network-object 10.5.33.7 255.255.255.255
    network-object 10.211.5.7 255.255.255.255
    network-object 10.3.33.7 255.255.255.255
    network-object 10.211.3.7 255.255.255.255
    the XYZ_blr_networkdevices object-group network
    object-network 10.200.10.0 255.255.255.0
    access list XYZ extended ip 10.19.130.0 allow 255.255.255.0 145.248.194.0 255.255.255.0
    access list XYZ extended ip 10.19.130.0 allow 255.255.255.0 host 172.16.2.21
    access list XYZ extended ip 10.19.130.0 allow 255.255.255.0 host 172.16.2.22
    access list XYZ extended ip 10.19.130.0 allow 255.255.255.0 host XXXXXXXX
    Access extensive list ip 10.19.130.0 XYZ_PAT allow 255.255.255.0 any
    Access extensive list ip 10.1.134.0 XYZ_PAT allow 255.255.255.0 host 195.254.159.133
    Access extensive list ip 10.1.134.0 XYZ_PAT allow 255.255.255.0 host 195.254.158.136
    Access extensive list ip 10.1.134.0 XYZ_PAT allow 255.255.255.0 any
    Access extensive list ip 10.1.134.0 XYZ_PAT allow 255.255.255.0 209.164.192.0 255.255.224.0
    Access extensive list ip 10.1.134.0 XYZ_PAT allow 255.255.255.0 host 209.164.208.19
    Access extensive list ip 10.1.134.0 XYZ_PAT allow 255.255.255.0 host 209.164.192.126
    IP 10.1.134.0 allow Access-list extended sheep 255.255.255.0 208.75.237.0 255.255.255.0
    Allow Access-list extended sheep 255.255.255.0 10.1.134.0 IP 10.7.0.0 255.255.0.0
    IP 10.1.134.0 allow Access-list extended sheep 255.255.255.0 172.17.2.0 255.255.255.0
    IP 10.1.134.0 allow Access-list extended sheep 255.255.255.0 172.17.3.0 255.255.255.0
    IP 10.1.134.0 allow Access-list extended sheep 255.255.255.0 172.19.2.0 255.255.255.0
    IP 10.1.134.0 allow Access-list extended sheep 255.255.255.0 172.19.3.0 255.255.255.0
    IP 10.1.134.0 allow Access-list extended sheep 255.255.255.0 172.19.7.0 255.255.255.0
    10.1.134.0 IP Access-list extended sheep 255.255.255.0 allow 10.1.0.0 255.255.0.0
    10.1.134.0 IP Access-list extended sheep 255.255.255.0 allow 10.2.0.0 255.255.0.0
    Allow Access-list extended sheep 255.255.255.0 10.1.134.0 IP 10.3.0.0 255.255.0.0
    10.1.134.0 IP Access-list extended sheep 255.255.255.0 allow 10.4.0.0 255.255.0.0
    10.1.134.0 IP Access-list extended sheep 255.255.255.0 allow 10.6.0.0 255.255.0.0
    Allow Access-list extended sheep 255.255.255.0 10.1.134.0 IP 10.9.0.0 255.255.0.0
    Allow Access-list extended sheep 255.255.255.0 10.1.134.0 IP 10.11.0.0 255.255.0.0
    10.1.134.0 IP Access-list extended sheep 255.255.255.0 allow 10.12.0.0 255.255.0.0
    IP 10.1.134.0 allow Access-list extended sheep 255.255.255.0 172.19.1.0 255.255.255.0
    IP 10.1.134.0 allow Access-list extended sheep 255.255.255.0 172.21.2.0 255.255.255.0
    10.1.134.0 IP Access-list extended sheep 255.255.255.0 allow 172.16.2.0 255.255.255.0
    access-list extended sheep allowed host ip 10.19.130.201 172.30.2.0 255.255.255.0
    access-list extended sheep allowed host ip 10.19.130.201 172.30.3.0 255.255.255.0
    access-list extended sheep allowed host ip 10.19.130.201 172.30.7.0 255.255.255.0
    access-list extended sheep allowed ip object-group Serversubnet-group of objects XYZ_destinations
    10.10.1.0 IP Access-list extended sheep 255.255.255.0 allow 10.2.0.0 255.255.0.0
    10.19.130.0 IP Access-list extended sheep 255.255.255.0 allow host XXXXXXXX
    IP 10.19.130.0 allow Access-list extended sheep 255.255.255.0 145.248.194.0 255.255.255.0
    Access extensive list ip 10.8.108.0 Guest_PAT allow 255.255.255.0 any
    CACIB list extended access permitted ip 10.8.100.128 255.255.255.128 145.248.194.0 255.255.255.0
    Access extensive list ip 10.8.100.128 Cacib_PAT allow 255.255.255.128 all
    Access extensive list ip 10.1.134.0 New_Edge allow 255.255.255.0 208.75.237.0 255.255.255.0
    Allow XYZ_global to access extended list ip 10.7.0.0 255.255.0.0 10.1.134.0 255.255.255.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 10.7.0.0 255.255.0.0
    Access extensive list ip 172.17.2.0 XYZ_global allow 255.255.255.0 10.1.134.0 255.255.255.0
    Access extensive list ip 172.17.3.0 XYZ_global allow 255.255.255.0 10.1.134.0 255.255.255.0
    Access extensive list ip 172.19.2.0 XYZ_global allow 255.255.255.0 10.1.134.0 255.255.255.0
    Access extensive list ip 172.19.3.0 XYZ_global allow 255.255.255.0 10.1.134.0 255.255.255.0
    Access extensive list ip 172.19.7.0 XYZ_global allow 255.255.255.0 10.1.134.0 255.255.255.0
    Access extensive list ip 10.1.0.0 XYZ_global allow 255.255.0.0 10.1.134.0 255.255.255.0
    Access extensive list 10.2.0.0 ip XYZ_global 255.255.0.0 allow 10.1.134.0 255.255.255.0
    Allow XYZ_global to access extended list ip 10.3.0.0 255.255.0.0 10.1.134.0 255.255.255.0
    Access extensive list 10.4.0.0 ip XYZ_global 255.255.0.0 allow 10.1.134.0 255.255.255.0
    Access extensive list 10.6.0.0 ip XYZ_global 255.255.0.0 allow 10.1.134.0 255.255.255.0
    Access extensive list ip 10.9.0.0 XYZ_global allow 255.255.0.0 10.1.134.0 255.255.255.0
    Allow XYZ_global to access extended list ip 10.11.0.0 255.255.0.0 10.1.134.0 255.255.255.0
    Access extensive list 10.12.0.0 ip XYZ_global 255.255.0.0 allow 10.1.134.0 255.255.255.0
    Access extensive list ip 172.19.1.0 XYZ_global allow 255.255.255.0 10.1.134.0 255.255.255.0
    Access extensive list ip 172.21.2.0 XYZ_global allow 255.255.255.0 10.1.134.0 255.255.255.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 172.17.2.0 255.255.255.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 172.17.3.0 255.255.255.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 172.19.2.0 255.255.255.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 172.19.3.0 255.255.255.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 172.19.7.0 255.255.255.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 10.1.0.0 255.255.0.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 10.2.0.0 255.255.0.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 10.3.0.0 255.255.0.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 10.4.0.0 255.255.0.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 10.6.0.0 255.255.0.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 10.9.0.0 255.255.0.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 10.11.0.0 255.255.0.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 10.12.0.0 255.255.0.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 172.19.1.0 255.255.255.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 172.21.2.0 255.255.255.0
    XYZ_global to access extended list ip 172.16.2.0 allow 255.255.255.0 10.1.134.0 255.255.255.0
    Access extensive list ip 10.1.134.0 XYZ_global allow 255.255.255.0 172.16.2.0 255.255.255.0
    Access extensive list ip 172.30.2.0 XYZ_global allow 255.255.255.0 host 10.19.130.201
    XYZ_global list extended access allowed host ip 10.19.130.201 172.30.2.0 255.255.255.0
    Access extensive list ip 172.30.3.0 XYZ_global allow 255.255.255.0 host 10.19.130.201
    XYZ_global list extended access allowed host ip 10.19.130.201 172.30.3.0 255.255.255.0
    Access extensive list ip 172.30.7.0 XYZ_global allow 255.255.255.0 host 10.19.130.201
    XYZ_global list extended access allowed host ip 10.19.130.201 172.30.7.0 255.255.255.0
    XYZ_global list extended access permitted ip object-group Serversubnet-group of objects XYZ_destinations
    XYZ_global list extended access permitted ip object-group XYZ_destinations-group of objects Serversubnet
    ML_VPN list extended access allowed host ip 115.111.99.129 209.164.192.0 255.255.224.0
    permit access list extended ip host 115.111.99.129 ML_VPN 209.164.208.19
    permit access list extended ip host 115.111.99.129 ML_VPN 209.164.192.126
    permit access list extended ip host 10.9.124.100 Da_VPN 10.125.81.88
    permit access list extended ip host 10.9.124.101 Da_VPN 10.125.81.88
    permit access list extended ip host 10.9.124.102 Da_VPN 10.125.81.88
    Da_VPN list extended access allowed host ip 10.9.124.100 10.125.81.0 255.255.255.0
    Da_VPN list extended access allowed host ip 10.9.124.101 10.125.81.0 255.255.255.0
    Da_VPN list extended access allowed host ip 10.9.124.102 10.125.81.0 255.255.255.0
    Sr_PAT to access extended list ip 10.10.0.0 allow 255.255.0.0 any
    Da_Pd_VPN list extended access allowed host ip 10.9.124.100 10.125.80.64 255.255.255.192
    Da_Pd_VPN list extended access allowed host ip 10.9.124.100 10.125.64.0 255.255.240.0
    permit access list extended ip host 10.9.124.100 Da_Pd_VPN 10.125.85.46
    permit access list extended ip host 10.9.124.100 Da_Pd_VPN 10.125.86.46
    Da_Pd_VPN list extended access allowed host ip 10.9.124.101 10.125.80.64 255.255.255.192
    Da_Pd_VPN list extended access allowed host ip 10.9.124.101 10.125.64.0 255.255.240.0
    permit access list extended ip host 10.9.124.101 Da_Pd_VPN 10.125.85.46
    permit access list extended ip host 10.9.124.101 Da_Pd_VPN 10.125.86.46
    Da_Pd_VPN list extended access allowed host ip 10.9.124.102 10.125.80.64 255.255.255.192
    Da_Pd_VPN list extended access allowed host ip 10.9.124.102 10.125.64.0 255.255.240.0
    permit access list extended ip host 10.9.124.102 Da_Pd_VPN 10.125.85.46
    permit access list extended ip host 10.9.124.102 Da_Pd_VPN 10.125.86.46
    Access extensive list ip 10.19.130.0 XYZ_reliance allow 255.255.255.0 145.248.194.0 255.255.255.0
    access-list coextended permit ip host 2.2.2.2 XXXXXXXX
    access-list coextended allow the host ip XXXXXXXXhost 2.2.2.2
    permitted this access list extended ip 10.1.134.0 255.255.255.0 208.75.237.0 255.255.255.0
    permitted this access list extended ip 208.75.237.0 255.255.255.0 10.1.134.0 255.255.255.0
    access list acl-outside extended permit ip host 57.66.81.159 172.17.10.3
    access list acl-outside extended permit ip host 80.169.223.179 172.17.10.3
    access list acl-outside scope permit ip any host 172.17.10.3
    access list acl-outside extended permitted tcp any host 10.10.1.45 eq https
    access list acl-outside extended permit tcp any any eq 10000
    access list acl-outside extended deny ip any any newspaper
    pager lines 10
    Enable logging
    debug logging in buffered memory
    outside_rim MTU 1500
    MTU 1500 XYZ_DMZ
    Outside 1500 MTU
    Within 1500 MTU
    IP pool local XYZ_c2s_vpn_pool 172.30.10.51 - 172.30.10.254
    ICMP unreachable rate-limit 1 burst-size 1
    ICMP allow all outside
    ICMP allow any inside
    don't allow no asdm history
    ARP timeout 14400
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 208.75.237.0 obj - 208.75.237.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 10.7.0.0 obj - 10.7.0.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 172.17.2.0 obj - 172.17.2.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 172.17.3.0 obj - 172.17.3.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 172.19.2.0 obj - 172.19.2.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 172.19.3.0 obj - 172.19.3.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 172.19.7.0 obj - 172.19.7.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 10.1.0.0 obj - 10.1.0.0 non-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 10.2.0.0 obj - 10.2.0.0 non-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 10.3.0.0 obj - 10.3.0.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 10.4.0.0 obj - 10.4.0.0 non-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 10.6.0.0 obj - 10.6.0.0 non-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 10.9.0.0 obj - 10.9.0.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 10.11.0.0 obj - 10.11.0.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 10.12.0.0 obj - 10.12.0.0 non-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 172.19.1.0 obj - 172.19.1.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 172.21.2.0 obj - 172.21.2.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.1.134.0 obj - 10.1.134.0 destination static obj - 172.16.2.0 obj - 172.16.2.0 non-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.19.130.201 obj - 10.19.130.201 destination static obj - 172.30.2.0 obj - 172.30.2.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.19.130.201 obj - 10.19.130.201 destination static obj - 172.30.3.0 obj - 172.30.3.0 no-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.19.130.201 obj - 10.19.130.201 destination static obj - 172.30.7.0 obj - 172.30.7.0 no-proxy-arp-search to itinerary
    NAT (inside, all) static source Serversubnet Serversubnet XYZ_destinations XYZ_destinations non-proxy-arp-search of route static destination
    NAT (inside, all) source static obj - 10.10.1.0 obj - 10.10.1.0 destination static obj - 10.2.0.0 obj - 10.2.0.0 non-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.19.130.0 obj - 10.19.130.0 destination static obj-XXXXXXXX XXXXXXXX - obj non-proxy-arp-search to itinerary
    NAT (inside, all) source static obj - 10.19.130.0 obj - 10.19.130.0 destination static obj - 145.248.194.0 obj - 145.248.194.0 no-proxy-arp-search to itinerary
    NAT source (indoor, outdoor), obj static obj - 10.1.134.100 - 10.9.124.100
    NAT source (indoor, outdoor), obj static obj - 10.1.134.101 - 10.9.124.101
    NAT source (indoor, outdoor), obj static obj - 10.1.134.102 - 10.9.124.102
    NAT interface dynamic obj - 10.8.108.0 source (indoor, outdoor)
    NAT (inside, outside) source dynamic obj - 10.19.130.0 obj - 115.111.99.129
    NAT (inside, outside) source dynamic obj - 10.1.134.0 obj - 115.111.99.129 destination static obj - 195.254.159.133 obj - 195.254.159.133
    NAT (inside, outside) source dynamic obj - 10.1.134.0 obj - 115.111.99.129 destination static obj - 195.254.158.136 obj - 195.254.158.136
    NAT (inside, outside) source dynamic obj - 10.1.134.0 obj - 115.111.99.129
    NAT (inside, outside) source dynamic obj - 10.1.134.0 obj - 115.111.99.129 destination static obj - 209.164.192.0 obj - 209.164.192.0
    NAT (inside, outside) source dynamic obj - 10.1.134.0 obj - 115.111.99.129 destination static obj - 209.164.208.19 obj - 209.164.208.19
    NAT (inside, outside) source dynamic obj - 10.1.134.0 obj - 115.111.99.129 destination static obj - 209.164.192.126 obj - 209.164.192.126
    NAT (inside, outside) source dynamic obj - 10.8.100.128 obj - 115.111.99.130
    NAT (inside, outside) source dynamic obj - 10.10.0.0 obj - 115.111.99.132
    NAT source (indoor, outdoor), obj static obj - 10.10.1.45 - 115.111.99.133
    NAT (inside, outside) source dynamic obj - 10.99.132.0 obj - 115.111.99.129
    !
    network object obj - 172.17.10.3
    NAT (XYZ_DMZ, outside) static 115.111.99.134
    Access-group acl-outside in external interface
    Route outside 0.0.0.0 0.0.0.0 115.111.23.129 1
    Route outside 0.0.0.0 0.0.0.0 115.254.127.130 10
    Route inside 10.10.0.0 255.255.0.0 10.8.100.1 1
    Route inside 10.10.1.0 255.255.255.0 10.8.100.1 1
    Route inside 10.10.5.0 255.255.255.192 10.8.100.1 1
    Route inside 10.8.100.128 255.255.255.128 10.8.100.1 1
    Route inside 10.8.108.0 255.255.255.0 10.8.100.1 1
    Route inside 10.19.130.0 255.255.255.0 10.8.100.1 1
    Route inside 10.99.4.0 255.255.255.0 10.99.130.254 1
    Route inside 10.99.132.0 255.255.255.0 10.8.100.1 1
    Route inside 10.1.134.0 255.255.255.0 10.8.100.1 1
    Route outside 208.75.237.0 255.255.255.0 115.111.23.129 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    identity of the user by default-domain LOCAL
    AAA authentication LOCAL telnet console
    LOCAL AAA authorization command
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-aes-256 ikev1, esp-sha-hmac vpn2
    Crypto ipsec transform-set esp-aes-256 ikev1, esp-md5-hmac vpn6
    Crypto ipsec transform-set esp-aes-256 ikev1, esp-sha-hmac vpn5
    Crypto ipsec transform-set esp-aes-256 ikev1, esp-md5-hmac vpn7
    Crypto ipsec transform-set esp-aes-256 ikev1, esp-sha-hmac vpn4
    Crypto ipsec transform-set esp-aes-256 ikev1, esp-sha-hmac vpn1
    Crypto ipsec transform-set esp-aes-256 ikev1, esp-sha-hmac vpn_reliance
    Crypto ipsec transform-set esp-3des esp-md5-hmac ikev1 c2s_vpn
    86400 seconds, duration of life crypto ipsec security association
    Crypto-map dynamic dyn1 ikev1 transform-set c2s_vpn 1 set
    Crypto-map dynamic dyn1 1jeu reverse-road
    card crypto vpn 1 corresponds to the address XYZ
    card 1 set of peer XYZ Peer IP vpn crypto
    1 set transform-set vpn1 ikev1 vpn crypto card
    card crypto vpn 1 lifetime of security set association, 3600 seconds
    card crypto vpn 1 set security-association life kilobytes 4608000
    correspondence vpn crypto card address 2 DON'T
    2 peer NE_Peer IP vpn crypto card game
    2 set transform-set vpn2 ikev1 vpn crypto card
    3600 seconds, duration of life card crypto vpn 2 set security-association
    card crypto vpn 2 set security-association life kilobytes 4608000
    card crypto vpn 4 corresponds to the address ML_VPN
    card crypto vpn 4 set pfs
    vpn crypto card game 4 peers ML_Peer IP
    4 set transform-set vpn4 ikev1 vpn crypto card
    3600 seconds, duration of life card crypto vpn 4 set - the security association
    card crypto vpn 4 set security-association life kilobytes 4608000
    vpn crypto card 5 corresponds to the address XYZ_global
    vpn crypto card game 5 peers XYZ_globa_Peer IP
    5 set transform-set vpn5 ikev1 vpn crypto card
    3600 seconds, duration of life card crypto vpn 5 set - the security association
    card 5 security-association life set vpn crypto kilobytes 4608000
    vpn crypto card 6 corresponds to the address Da_VPN
    vpn crypto card game 6 peers Da_VPN_Peer IP
    6 set transform-set vpn6 ikev1 vpn crypto card
    3600 seconds, duration of life card crypto vpn 6 set - the security association
    card crypto vpn 6 set security-association life kilobytes 4608000
    vpn crypto card 7 corresponds to the address Da_Pd_VPN
    7 peer Da_Pd_VPN_Peer IP vpn crypto card game
    7 set transform-set vpn6 ikev1 vpn crypto card
    3600 seconds, duration of life card crypto vpn 7 set - the security association
    card crypto vpn 7 set security-association life kilobytes 4608000
    vpn outside crypto map interface
    crypto map vpn_reliance 1 corresponds to the address XYZ_rim
    card crypto vpn_reliance 1 set of peer XYZ_rim_Peer IP
    card crypto 1 ikev1 transform-set vpn_reliance set vpn_reliance
    vpn_reliance card crypto 1 lifetime of security set association, 3600 seconds
    card crypto vpn_reliance 1 set security-association life kilobytes 4608000
    card crypto vpn_reliance interface outside_rim
    dynamic mymap 1 dyn1 ipsec-isakmp crypto map
    crypto isakmp identity address
    No encryption isakmp nat-traversal
    Crypto ikev1 enable outside_rim
    Crypto ikev1 allow outside
    IKEv1 crypto policy 1
    preshared authentication
    aes-256 encryption
    sha hash
    Group 5
    lifetime 28800
    IKEv1 crypto policy 2
    preshared authentication
    aes-256 encryption
    sha hash
    Group 5
    life 86400
    IKEv1 crypto policy 4
    preshared authentication
    aes-256 encryption
    sha hash
    Group 5
    life 28000
    IKEv1 crypto policy 5
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 100
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 43200
    IKEv1 crypto policy 65535
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    Telnet 10.8.100.0 255.255.255.224 inside
    Telnet timeout 5
    SSH timeout 5
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    no basic threat threat detection
    no statistical access list - a threat detection
    no statistical threat detection tcp-interception
    internal XYZ_c2s_vpn group strategy
    username testadmin encrypted password oFJjANE3QKoA206w
    tunnel-group XXXXXXXX type ipsec-l2l
    tunnel-group ipsec-attributes XXXXXXXX
    IKEv1 pre-shared-key *.
    tunnel-group XXXXXXXXtype ipsec-l2l
    tunnel-group XXXXXXXXipsec-attributes
    IKEv1 pre-shared-key *.
    tunnel-group XXXXXXXX type ipsec-l2l
    tunnel-group ipsec-attributes XXXXXXXX
    IKEv1 pre-shared-key *.
    tunnel-group XXXXXXXX type ipsec-l2l
    tunnel-group ipsec-attributes XXXXXXXX
    IKEv1 pre-shared-key *.
    tunnel-group XXXXXXXX type ipsec-l2l
    tunnel-group ipsec-attributes XXXXXXXX
    IKEv1 pre-shared-key *.
    tunnel-group XXXXXXXX type ipsec-l2l
    tunnel-group ipsec-attributes XXXXXXXX
    IKEv1 pre-shared-key *.
    tunnel-group XXXXXXXX type ipsec-l2l
    tunnel-group ipsec-attributes XXXXXXXX
    IKEv1 pre-shared-key *.
    type tunnel-group XYZ_c2s_vpn remote access
    attributes global-tunnel-group XYZ_c2s_vpn
    address pool XYZ_c2s_vpn_pool
    IPSec-attributes tunnel-group XYZ_c2s_vpn
    IKEv1 pre-shared-key *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the netbios
    inspect the rsh
    inspect the rtsp
    inspect the skinny
    inspect esmtp
    inspect sqlnet
    inspect sunrpc
    inspect the tftp
    inspect the sip
    inspect xdmcp
    inspect the icmp
    Review the ip options
    !
    global service-policy global_policy
    level 3 privilege see the running-config command exec mode
    logging of orders privilege see the level 3 exec mode
    privilege see the level 3 exec mode command crypto
    context of prompt hostname
    no remote anonymous reporting call
    call-home
    Profile of CiscoTAC-1
    no active account
    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
    email address of destination [email protected] / * /
    destination-mode http transport
    Subscribe to alert-group diagnosis
    Subscribe to alert-group environment
    Subscribe to alert-group monthly periodic inventory
    monthly periodicals to subscribe to alert-group configuration
    daily periodic subscribe to alert-group telemetry
    Cryptochecksum:caa7476cd348ed89b95d37d4e3c9e1d8
    : end

    XYZ #.

    Good news

    Follow these steps:

    network object obj - 172.30.10.0_24

    172.30.10.0 subnet 255.255.255.0

    !

    the LOCAL_NETWORKS_VPN object-group network

    object-network 1.1.1.0 255.255.255.0

    !

    NAT (inside, outside) 1 static source LOCAL_NETWORKS_VPN destination LOCAL_NETWORKS_VPN static obj - 172.30.10.0_24 obj - 172.30.10.0_24 - route search

    * Where 1.1.1.0/24 is the internal network that you want to reach through the tunnel.

    Keep me posted.

    Thank you.

    Please note all messages that will be useful.

  • Help with Bus 7204VXR error

    Hello

    I got this router crash a few times a couple of days, but has collapsed since. Here is the HS worm showing the bus error:

    Cisco IOS Software, software 7200 (C7200-JK9S-M), Version 12.4 (3) VERSION of the SOFTWARE (fc2)
    Technical, support httpwww.cisco.comtechsupport
    Copyright (c) 1986-2005 by Cisco Systems, Inc.
    Updated Saturday, July 22 05 0911 by hqluong

    ROM system Bootstrap, Version 12.1 (20000710044039) [nlaw-121E_npeb 117], SOFTWARE DEVELOPMENT
    Software BOOTLDR of 7200 (C7200-KBOOT-M), Version 12.3 (26), VERSION of the SOFTWARE (fc2)

    7200vxr1 operating time is 2 days, 2 hours, 17 minutes
    System returned to ROM by bus to the 0x6084C0E4 PC error, address 0xFFF0 213620UTC MON Sep 12 2016
    Reboot system 213830 UTC MON Sep 12 2016
    System image file is disk0c7200-jk9s - mz.124 - 3.bin

    And here is the result of stacks of show:

    Minimum factory chimneys
    Name FreeSize
    DHCPD 1128012000 receive
    background charger 5913660000 script
    23123000 booklet allegro init
    41846000 update prst
    Error message 43086000 DIB
    Init 322012000
    51526000 RADIUS INITCONFIG
    22683000 rom randomly update
    TCP 3484436000 command
    Exec virtual 630812000
    5702460000 AFW_application_process

    Interrupt level piles
    Level gave the name of UnusedSize
    1 1044914134 74689000 network interfaces
    2 111040 85729000 DMATimer interruption
    3 0 90009000 PA Int management Manager
    4 736 86449000 console Uart
    5 0 90009000 OIRError interruption
    7 45261558 85729000 NMI interrupt handler

    System has been restarted by bus to the 0x6084C0E4 PC error, address 0xFFF0 213620 UTC MON Sep 12 2016
    7200 (C7200-JK9S-M) software, Version 12.4 (3) VERSION of the SOFTWARE (fc2)
    Technical, support httpwww.cisco.comtechsupport
    Updated Saturday, July 22 05 0911 by hqluong
    Image text-base 0x6000905C, database 0x62AB2000

    The failure of the system stack trace
    FP 0X65F31FA8, RA 0X6084C0E4
    FP 0X65F31FF0, RA 0X61F9AE00
    FP 0X65F32008, RA 0X61F8EA0C
    FP 0X65F32038, RA 0X61FD9F48
    FP 0X65F320A0, RA 0X61FD9A3C
    FP 0X65F320B8, RA 0X61FDC0E8
    FP 0X65F320D8, RA 0X61FBF4D4
    FP 0X65F32100, RA 0X61FC43D8

    I'm not sure if this is pointing to a hardware failure or if it's a bug in the iOS which caused the accident. Advice to get me in the right direction would be useful.

    Thank you

    Disclaimer

    The author of this announcement offers the information in this publication without compensation and with the understanding of the reader that there is no implicit or explicit adequacy or adaptation to any purpose. Information provided is for information purposes only and should not be interpreted as making the professional advice of any kind. Use information from this announcement is only at risk of the reader.

    RESPONSIBILITY

    Any author will be responsible for any wha2tsoever of damage and interest (including, without limitation, damages for loss of use, data or profits) arising out of the use or inability to use the information in the view even if author has been advised of the possibility of such damages.

    Poster

    Assuming that it's a software problem, and given your IOS version is early in the 12.4 train, you could just upgrade to a later version of 12.4.

  • The VPN Client on Fedora FC6 x86_64 compilation error

    When I try to install the VPN Client on FC6, I get the following errors:

    Cisco Systems VPN Client Version 4.8.00 (0490) Linux installer

    ...

    To build the core VPN module, you must have the

    the headers for the kernel for the version of the kernel you are using.

    ...

    Socket module

    make SUBDIRS = /lib/modules/2.6.19-1.2911.6.5.fc6/build modules / space/home/schulze/installquellen/Cisco/vpn/vpnclient - C

    make [1]: Entering directory ' / usr/src/kernels/2.6.19-1.2911.6.5.fc6-x86_64'

    CC [M] /space/home/schulze/installquellen/Cisco/vpn/vpnclient/linuxcniapi.o

    In Datei, eingef? GT von space/home/schulze/installquellen/Cisco/vpn/vpnclient/Cniapi.h:15,

    von /space/home/schulze/installquellen/Cisco/vpn/vpnclient/linuxcniapi.c:27:

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/GenDefs.h:110:2: Warnung: #warning 64 bit

    CC [M] /space/home/schulze/installquellen/Cisco/vpn/vpnclient/frag.o

    In Datei, eingef? GT von space/home/schulze/installquellen/Cisco/vpn/vpnclient/Cniapi.h:15,

    von /space/home/schulze/installquellen/Cisco/vpn/vpnclient/frag.c:16:

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/GenDefs.h:110:2: Warnung: #warning 64 bit

    CC [M] /space/home/schulze/installquellen/Cisco/vpn/vpnclient/IPSecDrvOS_linux.o

    In Datei, eingef? /space/home/Schulze/installquellen/Cisco/VPN/vpnclient/IPSecDrvOS_linux.c:20 von gt:

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/GenDefs.h:110:2: Warnung: #warning 64 bit

    CC [M] /space/home/schulze/installquellen/Cisco/vpn/vpnclient/interceptor.o

    In Datei, eingef? GT von space/home/schulze/installquellen/Cisco/vpn/vpnclient/Cniapi.h:15,

    von /space/home/schulze/installquellen/Cisco/vpn/vpnclient/interceptor.c:30:

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/GenDefs.h:110:2: Warnung: #warning 64 bit

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c: in function? handle_vpnup? :

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c:310: Warnung: Zuweisung von inkompatiblem Zeigertyp

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c:334: Warnung: Zuweisung von inkompatiblem Zeigertyp

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c:335: Warnung: Zuweisung von inkompatiblem Zeigertyp

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c: in function? do_cleanup? :

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c:378: Warnung: Zuweisung von inkompatiblem Zeigertyp

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c: in function? recv_ip_packet_handler? :

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c:553: Fehler:? CHECKSUM_HW? nicht deklariert (erste Benutzung in dieser Funktion)

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c:553: Fehler: (deklarierte Bezeichner only once aufgef wird nicht Jeder? hrt)

    / space/home/schulze/installquellen/Cisco/vpn/vpnclient/interceptor.c:553: Fehler: f? r jede Funktion der er appearance.)

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c:557: Fehler: zu viele argues f? r Funktion? skb_checksum_help?

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c: in function? do_cni_send? :

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c:680: Fehler:? CHECKSUM_HW? nicht deklariert (erste Benutzung in dieser Funktion)

    /Space/home/Schulze/installquellen/Cisco/VPN/vpnclient/interceptor.c:683: Fehler: zu viele argues f? r Funktion? skb_checksum_help?

    make [2]: * [/ space/home/schulze/installquellen/Cisco/vpn/vpnclient/interceptor.o] Fehler 1

    make [1]: * [_module_/space/home/schulze/installquellen/Cisco/vpn/vpnclient] Fehler 2

    make [1]: leaving directory ' / usr/src/kernels/2.6.19-1.2911.6.5.fc6-x86_64'

    make: * [default] Fehler 2

    Has failed to do the module 'cisco_ipsec.ko '.

    Is there advice?

    There could be various reasons for this problem:

    (1) you miss the source package of the kernel, which can be verified by running the command ' rpm - qa | grep kernel ". If it is not installed, please enter your CD or your the Fedora FTP mirror preferred.

    (2) you could be hitting bug CSCsc39924. For which the workaround is as follows

    In the file linuxcniapi.c in the installation package, REPLACE THE LINE (2 occurrences):

    do_gettimeofday (& skb-> stamp);

    WITH THE FOLLOWING LINES:

    #if LINUX_VERSION_CODE > = KERNEL_VERSION (2,6,14)

    {

    struct timeval timestamp;

    do_gettimeofday (?) TAMP);

    skb_set_timestamp (SKB?, TAMP);

    }

    #else

    do_gettimeofday (& skb-> stamp);

    #endif

    AND THEN RERUN the "vpn_install."

    The following links can help you

    http://blog.360.Yahoo.com/blog-.WURHFYwdq8.zfEosWC6j8jQ?p=55

    http://www.Fedoraforum.org/Forum/printthread.php?s=938da17f7e7ac49f82b84e65f8d50596&t=106929&page=5&pp=15

  • BlackBerry smartphones about upgrading the Blackberry applications

    Hello

    When I go to download apps from the apps world, it shows the upgrade option, but it fails leaving message "midlet error." Nees help

    We have solved the problem

    Thanks again for reaching out to this topic!

  • Users cannot change password for 802.1 x and implementation of ISE

    Hi all

    We have implemented cisco ISE 1.1 for a week and we notice that Microsoft active directory the user cannot change password there when it expired.

    We store all user account in Microsoft active directory for authentication and ISE is mapped with Microsoft active directory. Normally, when your expired password Microsoft active directory ask you to change your password, but in our case cisco switch or 802. 1 x do not allow communication with active directory before giving access to the network. Is this a configuration error or cisco do not support this?

    Best regards.

    Hello

    I have the same problem, did you find a solution?

    Thank you

  • ASDM damaged?

    Hi people,

    I have strange question, as I improved the ASDM on all our ASAs, I get this error

    ' Cisco ASDM-IDM ' is corrupted and cannot be opened. You must move it to the trash.

    See the following accessory how it looks to...

    I upgraded from 6.4.7 to 6.4.9 - 103, and the same happens on all of our ASAs... I'm on Mac OS X Lion of the mountains (10.8.2 and tried also on 10.8.1).)

    Any idea what could be the cause?

    Hello

    Hey! ideal for the stars of Tip 5 for you.

    Now, please mark it as answered so future users can pull of this

    Julio

  • Problem of eve - of sequence numbers

    Hello world! I'm on 10.2.0.3.

    My physical Eve stopped applying newspapers because all of a sudden, the newspapers are out of sequence. See the errors below - after seq 7975 & 7976 seq # 7974 showed once again:

    Online Redo Log recovery: thread 1 mem group 200 Seq 7974 reading 0
    Mem # 0: /db/data3/FSPRD/stby_redo02.log
    MEM # 1: /db/data4/FSPRD/stby_redo02_02.log
    Game 18 dec 16:14:58 2008
    RFS [23]: Eve successfully opened log 100: ' / db/data1/FSPRD/stby_redo01.log'
    Game 18 dec 16:15:01 2008
    RFS [25]: open successfully the journal watch 300: ' / db/data5/FSPRD/stby_redo03.log'
    Game 18 dec 16:15:01 2008
    Primary database is in MAXIMUM PERFORMANCE mode
    RFS [37]: open successfully the journal ensures 400: ' / db/data7/FSPRD/stby_redo04.log'
    Game 18 dec 16:15:02 2008
    RFS [24]: open successfully the journal watch 200: ' / db/data3/FSPRD/stby_redo02.log'
    Game 18 dec 16:15:03 2008
    Media, recovery waiting for thread 1 sequence 7975 (in transit)
    Game 18 dec 16:15:03 2008
    Online Redo Log recovery: thread 1 mem group 100 Seq 7975 reading 0
    Mem # 0: /db/data1/FSPRD/stby_redo01.log
    MEM # 1: /db/data2/FSPRD/stby_redo01_02.log
    Media, recovery waiting for thread 1 sequence 7976 (in transit)
    Game 18 dec 16:15:07 2008
    Online Redo Log recovery: thread 1 mem group 200 Seq 7974 reading 0
    Mem # 0: /db/data3/FSPRD/stby_redo02.log
    MEM # 1: /db/data4/FSPRD/stby_redo02_02.log
    MRP0: Background Media Recovery terminated with error 355
    Game 18 dec 16:15:12 2008
    Errors in the /db/dbdump/FSPRD/bdump/fsprd_mrp0_11351.trc file:
    ORA-00355: change the numbers in the wrong order
    ORA-00353: journal corruption near Block 2 change 4994299896 time 18/12/2008 16:14:57
    ORA-00312: wire of 1 200 online newspaper: ' / db/data4/FSPRD/stby_redo02_02.log'
    ORA-00312: wire of 1 200 online newspaper: ' / db/data3/FSPRD/stby_redo02.log'
    Managed Standby recovery not using real time applies
    Game 18 dec 16:15:12 2008
    Primary database is in MAXIMUM PERFORMANCE mode
    RFS [37]: Eve successfully opened log 100: ' / db/data1/FSPRD/stby_redo01.log'
    Game 18 dec 16:15:13 2008
    Recovery interrupted!
    Game 18 dec 16:15:13 2008
    Errors in the /db/dbdump/FSPRD/bdump/fsprd_mrp0_11351.trc file:
    ORA-00355: change the numbers in the wrong order
    ORA-00353: journal corruption near Block 2 change 4994299896 time 18/12/2008 16:14:57
    ORA-00312: wire of 1 200 online newspaper: ' / db/data4/FSPRD/stby_redo02_02.log'
    ORA-00312: wire of 1 200 online newspaper: ' / db/data3/FSPRD/stby_redo02.log'
    Game 18 dec 16:15:13 2008
    MRP0: Stopping the process background Media Recovery (FSPRD)
    Game 18 dec 16:15:19 2008

    Of course I rebooted managed recovery and everything went well from this time - but I could not find the cause of this problem.

    Anyone has any ideas - or have experienced this before?

    TIA.

    I'm afraid you tap bug 6039415 ORA-355 can occur during the real time applies, the good news: there is a patch.

    HTH

    Enrique

  • Error 500 CTS Cisco ' remote site is not supported contact your technical support.

    Hi guys, I installed 2 Cisco 500 CTS with Cisco CM 7.1.3

    I've updated the CTS 500 version 1.6.7 and I could add to the Director and I have followed all the configuration mentioned in Configuration Cisco Telepresence with Call Manager.

    I also configured the Midlet services and everything seems to work very well.

    The problem is when I'm doing a call between the 2,500 CTS, I'm getting on the screen the below error:

    "Remote site is not supported contact your technical support.

    Knowing that the two CTS have the same version and two of them are registered correctly and no problem is show.

    Can someone help me how I can check where I get this error?

    Thank you

    Seems to be a problem of config CUCM

    Check box and the location make sure you allow enough for a video telepresence call P.C.

  • error 28000 removing the cisco vpn

    When I try to remove the software vpn cisco to my windows xp pro, I get error 28000 say failed to install before the removal of the existing version.it is the only vpn on my pc. I tried several times but to no avail.
    I went to the window registry local machine, then soft and deleted the cisco vpn software. but it does not work.
    any help will be grateful?

    Hello alsky95,

    I do not know what records you remove to uninstall the software, I suggest you to follow the article which you will give information on how to uninstall manually below and upgrade the Cisco VPN Client I found on Cisco's Web site:

    http://www.Cisco.com/en/us/products/sw/secursw/ps2308/products_tech_note09186a0080094b7f.shtml

    Important: This section, method, or task contains steps that tell you how to modify the registry. However, serious problems can occur if you modify the registry incorrectly. Therefore, make sure that you proceed with caution. For added protection, back up the registry before you edit it. Then you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click on the number below to view the article in the Microsoft Knowledge Base:

    322756 (http://support.microsoft.com/kb/322756 ) how to back up and restore the registry in Windows

    Thank you
    Irfan H, Engineer Support Microsoft Answers

  • Cisco recent "update" for E4200 product error Code 3018, which ended wireless.

    The update "has failed," for an "unexpected error".  Connection Wi - Fi is turned off, although, as you have no doubt noticed, I can always connect to the internet (via an ethernet cable from my router to my laptop OS x 10.6.8).  Error code 3018 unknown to Cisco's Web site.  Any ideas?  Or should I just start over with the installation for my router E4200 disc?

    Hard reset the router and try again.

Maybe you are looking for