Packed SLM2008 fall

Hello

I recently looket in the following thread: http://homecommunity.cisco.com/t5/Switches/Linksys-SRW2008-Load-balance-setup/td-p/217487

I recently posted this on the QNAP forum: http://forum.qnap.com/viewtopic.php?f=50&t=56416

I don't know where the problem is, but maybe someone here could give it a glance and a few tips. Protocol I run the 802.3ad and switch SLM2008 LACP configuration. You can see the pictures here: http://www.dropmocks.com/mBg-X8

The MTU is set to 9000 on the servers and the SLM2008 Jumbo Frame active.

Sender-Server(ts-859)

Reciever-Server(ts-639)

Switch configuration

Hello.

These products are processed by the Cisco Small Business Support Community.

* If my post answered your question, please mark it as "acceptable Solution".

Thank you!

Tags: Linksys Adapters

Similar Questions

  • Vista 64-bit Service Pack FPS fall

    I have a XPS M1730 8800 M GTX SLI, 4 GB of ram, and since the vista service pack 2, I got a slow start-ups and game performance a reduction slow office functions.  Fortunately, when I got the laptop I ran 3dmark 2003, so I had a reference point of 46 k points.  I have now a score of 33 k - someone else has this problem - I think only the service pack since I have no other changes that have occurred in the last 3 weeks (no virus since problem I checked with my kaspersky) is, I stopped playing WOW on the EVE of the trial, but it was when I went back to WOW , I noticed an fps serious fall.
    Any suggestions beside, the updated driver (it is now) or reinstalling windows

    Thank you
    Scott

    Hi ScottyB10,

    Thank you for writing to Microsoft answers Community Forums.

    Most of the people have corrected this by updating the drivers for the last available. However, you can also try the following steps

    Enable Write Caching' and 'Advanced performance' is enabled for your hard drive.

    There may other programs that might decrease performance. I suggest you to check in a clean boot.

    To perform a clean boot:

    1. sign the computer by using an account with administrator rights.

    2. click on start, type msconfig.exe in the start search box and press ENTER to start the System Configuration utility. If you are prompted for an administrator password or for confirmation, type your password, or click on continue.

    3. on the general tab, click Selective startup, and then clear the check box load startup items. (The check box use the file Boot is not available.)

    4. on the Services tab, click to select the skin all the Microsoft services check box, and then click Disable all.

    5. click OK and then click on restart.

    If it works fine then follow the article to find out which program is causing the problem

    How to perform a clean boot:

    http://support.Microsoft.com/kb/331796

    I hope this helps.

    Let us know if you need more assistance.

    Kind regards

    Sharath

    Microsoft Answers Support Engineer

  • fall of site to site vpn icmp packets

    Hello

    I test site to site vpn between ASA and cisco router with GNS3, topology is base the tunnel is up but the question when the remote host ping from both sides it is drops icmp, see router command and ASA do not include droppings. Here is a sample output from ping when I try to remote client ping. any help is appreciated :)

    Instant topology is attached, also configs

    Thank you

    84 bytes from 10.20.20.5 icmp_seq = 59 ttl = 63 times = 79,004 ms
    10.20.20.5 icmp_seq = timeout 60
    84 bytes from 10.20.20.5 icmp_seq = 61 = ttl 63 times = 70,004 ms
    10.20.20.5 icmp_seq = timeout 62
    84 bytes from 10.20.20.5 icmp_seq = ttl 63 time = 63 = 59,004 ms
    10.20.20.5 icmp_seq = 64 timeout
    84 bytes from 10.20.20.5 icmp_seq = 65 = ttl 63 times = 50,003 ms
    10.20.20.5 icmp_seq = timeout 66
    84 bytes from 10.20.20.5 icmp_seq = 67 ttl = 63 times = 59,003 ms
    10.20.20.5 icmp_seq = timeout 68
    84 bytes from 10.20.20.5 icmp_seq = 69 = ttl 63 times = 50,003 ms
    10.20.20.5 icmp_seq = timeout 70
    84 bytes from 10.20.20.5 icmp_seq = 71 ttl = 63 times = 58,003 ms
    10.20.20.5 icmp_seq = timeout 72
    84 bytes from 10.20.20.5 icmp_seq = 73 = ttl 63 times = 50,003 ms
    10.20.20.5 icmp_seq = timeout 74
    84 bytes from 10.20.20.5 icmp_seq = 75 ttl = 63 times = 69,004 ms
    10.20.20.5 icmp_seq = timeout 76
    84 bytes from 10.20.20.5 icmp_seq = 77 ttl = 63 times = 237,013 ms
    10.20.20.5 icmp_seq = timeout 78

    R1 ipsec crypto #sh her

    Interface: FastEthernet0/0
    Tag crypto map: map, local addr 100.100.100.2

    protégé of the vrf: (none)
    local ident (addr, mask, prot, port): (10.20.20.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (10.20.10.0/255.255.255.0/0/0)
    current_peer 100.100.100.1 port 500
    LICENCE, flags is {origin_is_acl},
    #pkts program: 14, #pkts encrypt: 14, #pkts digest: 14
    decaps #pkts: 28, #pkts decrypt: 28, #pkts check: 28
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    Errors #send 0, #recv 0 errors

    ciscoasa # sh crypto isakmp stats

    Global statistics IKEv1
    The active Tunnels: 1
    Previous Tunnels: 1
    In bytes: 1384
    In the packages: 12
    In packs of fall: 0
    In Notifys: 8
    In the constituencies of P2: 0
    In P2 invalid Exchange: 0
    In P2 Exchange rejects: 0
    Requests for removal in his P2: 0
    Bytes: 1576
    Packet: 13
    Fall packages: 0
    NOTIFYs out: 16
    Exchanges of P2: 1
    The Invalides Exchange P2: 0
    Exchange of P2 rejects: 0
    Requests to remove on P2 Sa: 0
    Tunnels of the initiator: 1
    Initiator fails: 0
    Answering machine fails: 0
    Ability system breaks down: 0
    AUTH failed: 0
    Decrypt failed: 0
    Valid hash fails: 0
    No failure his: 0

    Hello

    On router R1, you gave the default route as output interface. Instead of using the output interface replace the IP address of the next hop. It will solve the issue of the reduction of ping.

    IP route 0.0.0.0 0.0.0.0 FastEthernet0/0

    IP route 0.0.0.0 0.0.0.0 100.100.100.1

    HTH

    "Please note the useful messages and mark the correct answer if it solves the problem."

  • ASA 5505. VPN Site-to-Site does not connect!

    Hello!
    Already more than a week there, as we had a new channel of communication of MGTSa (Ontario terminal Sercomm RV6688BCM, who barely made in the 'bridge' - had to do the provider in order to receive our white Cisco Ip address), and now I train as well more that one week to raise between our IKEv1 IPsec Site-to-Site VPN tunnel closes offices.
    Configurable and use the wizard in ASDM and handles in the CLI, the result of a year, the connection does not rise.
    Cisco version 9.2 (2), the image of the Cisco asa922 - k8.bin, Security Plus license version, version 7.2 AMPS (2).
    What I'll never know...
    Debugging and complete configuration enclose below.
    Help, which can follow any responses, please! I was completely exhausted!

    Config:

    Output of the command: "sh run".

    : Saved
    :
    : Serial: XXXXXXXXXXXX
    : Material: ASA5505, 512 MB RAM, 500 MHz Geode Processor
    :
    ASA Version 9.2 (2)
    !
    hostname door-71
    activate the encrypted password of F6OJ0GOws7WHxeql
    names of
    IP local pool vpnpool 10.1.72.100 - 10.1.72.120 mask 255.255.255.0
    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 10.1.72.254 255.255.255.0
    !
    interface Vlan2
    nameif outside_mgts
    security-level 0
    62.112.100.R1 255.255.255.252 IP address
    !
    passive FTP mode
    clock timezone 3 MSK/MSD
    clock to DST MSK/MDD recurring last Sun Mar 02:00 last Sun Oct 03:00
    DNS lookup field inside
    DNS server-group MGTS
    Server name 195.34.31.50
    permit same-security-traffic inter-interface
    permit same-security-traffic intra-interface
    network obj_any object
    subnet 0.0.0.0 0.0.0.0
    network of the NET72 object
    10.1.72.0 subnet 255.255.255.0
    network object obj - 0.0.0.0
    host 0.0.0.0
    network of the Nafanya object
    Home 10.1.72.5
    network object obj - 10.1.72.0
    10.1.72.0 subnet 255.255.255.0
    network of the NET61 object
    10.1.61.0 subnet 255.255.255.0
    network of the NETWORK_OBJ_10.1.72.96_27 object
    subnet 10.1.72.96 255.255.255.224
    network of the NETT72 object
    10.1.72.0 subnet 255.255.255.0
    network of the NET30 object
    10.1.30.0 subnet 255.255.255.0
    network of the NETWORK_OBJ_10.1.72.0_24 object
    10.1.72.0 subnet 255.255.255.0
    object-group service OG INET
    the purpose of the echo icmp message service
    response to echo icmp service object
    service-object icmp traceroute
    service-object unreachable icmp
    service-purpose tcp - udp destination eq echo
    the DM_INLINE_NETWORK_1 object-group network
    network-object NET30
    network-object, object NET72
    DM_INLINE_TCP_1 tcp service object-group
    port-object eq www
    EQ object of the https port
    inside_access_in extended access list permit ip object NET72 object-group DM_INLINE_NETWORK_1
    access extensive list ip 10.1.72.0 inside_access_in allow 255.255.255.0 any
    inside_access_in extended access list permit ip object Nafanya any idle state
    inside_access_in list extended access allowed object-group OG INET an entire
    inside_access_in of access allowed any ip an extended list
    inside_access_in list extended access deny ip any alerts on any newspaper
    outside_mgts_access_in list extended access allowed object-group OG INET an entire
    outside_mgts_access_in list extended access permit tcp any any DM_INLINE_TCP_1 object-group
    outside_mgts_access_in list extended access deny ip any alerts on any newspaper
    access extensive list ip 10.1.72.0 outside_mgts_cryptomap allow 255.255.255.0 object NET61
    VPN-ST_splitTunnelAcl permit 10.1.72.0 access list standard 255.255.255.0
    pager lines 24
    Enable logging
    asdm of logging of information
    Within 1500 MTU
    outside_mgts MTU 1500
    IP check path reverse interface outside_mgts
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    no permit-nonconnected arp
    NAT (inside outside_mgts) static source NET72 NET72 NETWORK_OBJ_10.1.72.96_27 NETWORK_OBJ_10.1.72.96_27 non-proxy-arp-search of route static destination
    NAT (inside outside_mgts) static source NETWORK_OBJ_10.1.72.0_24 NETWORK_OBJ_10.1.72.0_24 NET61 NET61 non-proxy-arp-search of route static destination
    !
    network obj_any object
    NAT (inside outside_mgts) dynamic obj - 0.0.0.0
    network of the NET72 object
    NAT (inside outside_mgts) interface dynamic dns
    inside_access_in access to the interface inside group
    Access-group outside_mgts_access_in in the outside_mgts interface
    Route 0.0.0.0 outside_mgts 0.0.0.0 62.112.100.R 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    without activating the user identity
    identity of the user by default-domain LOCAL
    AAA authentication http LOCAL console
    the ssh LOCAL console AAA authentication
    Enable http server
    http 10.1.72.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-TRANS-aes - esp esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-MD5-TRANS esp - esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transit
    Crypto ipsec ikev2 AES256 ipsec-proposal
    Protocol esp encryption aes-256
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES192
    Protocol esp encryption aes-192
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES
    Esp aes encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 proposal ipsec 3DES
    Esp 3des encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal OF
    encryption protocol esp
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec pmtu aging infinite - the security association
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
    card crypto outside_mgts_map 1 match address outside_mgts_cryptomap
    card crypto outside_mgts_map 1 set pfs Group1
    peer set card crypto outside_mgts_map 1 91.188.180.42
    card crypto outside_mgts_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    outside_mgts_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
    card crypto outside_mgts_map interface outside_mgts
    inside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
    inside crypto map inside_map interface
    Crypto ca trustpoint ASDM_TrustPoint0
    registration auto
    E-mail [email protected] / * /
    name of the object CN = door-71
    Serial number
    IP address 62.112.100.42
    Proxy-loc-transmitter
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint1
    registration auto
    ASDM_TrustPoint1 key pair
    Configure CRL
    trustpool crypto ca policy
    string encryption ca ASDM_TrustPoint0 certificates
    certificate eff26954
    30820395 3082027d a0030201 020204ef f2695430 0d06092a 864886f7 0d 010105
    019
    6460ae26 ec5f301d 0603551d 0e041604 14c9a3f2 d70e6789 38fa4b01 465d 1964
    60ae26ec 5f300d06 092 has 8648 01050500 03820101 00448753 7baa5c77 86f70d01
    62857b 65 d05dc91e 3edfabc6 7b3771af bbedee14 673ec67d 3d0c2de4 b7a7ac05
    5f203a8c 98ab52cf 076401e5 1a2c6cb9 3f7afcba 52c617a5 644ece10 d6e1fd7d
    28b57d8c aaf49023 2037527e 9fcfa218 9883191f 60b221bf a561f2be d6882091
    0222b7a3 3880d6ac 49328d1f 2e085b15 6d1c1141 5f850e5c b6cb3e67 0e373591
    94a 82781 44493217 and 38097952 d 003 5552 5c445f1f 92f04039 a23fba20 b9d51b13
    f511f311 d1feb2bb 6d056a15 7e63cc1b 1f134677 8124c 024 3af56b97 51af8253
    486844bc b1954abe 8acd7108 5e4212df db835d76 98ffdb2b 8c8ab915 193b 8167
    0db3dd54 c8346b96 c4f4eff7 1e7cd576 a8b1f86e 3b868a6e 89
    quit smoking
    string encryption ca ASDM_TrustPoint1 certificates
    certificate a39a2b54
    3082025f 30820377 a0030201 020204 has 3 9a2b5430 0d06092a 864886f7 0d 010105
    0500304 06035504 03130767 36313137 30120603 55040513 6174652d 3110300e b
       
    c084dcd9 d250e194 abcb3eb8 1da93bd0 fb0dba1a b1c35b43 d547a841 5d4ee1a4
    14bdb207 7dd790a4 0cd 70471 5f3a896a 07bd56dc ea01b3dd 254cde88 e1490e97
    f3e54c05 551adde0 66aa3782 c85880c2 b162ec29 4e49346a df71062d 6d6d8f49
    62b9de93 ba07b4f7 a50e77e1 8f54b32b 6627cb27 e982b36f a 362973, 0 88de3272
    9bd6d4d2 8ca1e11f 214f20a9 78bdea95 78fdc45c d6d45674 6acb9bcb d0bd930e
    638eedfe cd559ab1 e1205c48 3ee9616f e631db55 e82b623c 434ffdc1 11020301
    0001 has 363 3061300f 0603551d 130101ff 0101ff30 04053003 0e060355 1d0f0101
    ff040403 1f060355 02018630 230418 30168014 0cea70bf 0d0e0c4b eb34a0b1 1 d
    8242 has 549 0603 551d0e04 1604140c ea70bf0d 0e0c4beb 34a0b182 301D 5183ccf9
    42a 54951 010105 05000382 0101004e 7bfe054a 0d 864886f7 0d06092a 83ccf930
    d434a27c 1d3dce15 529bdc5f 70a2dff1 98975de9 2a97333b 96077966 05a8e9ef
    bf320cbd ecec3819 ade20a86 9aeb5bde bd129c7b 29341e4b edf91473 f2bf235d
    9aaeae21 a629ccc6 3c79200b b9a89b08 bf38afb6 ea56b957 4430f692 a 4745, 411
    34d71fad 588e4e18 2b2d97af b2aae6b9 b6a22350 d031615b 49ea9b9f 2fdd82e6
    ebd4dccd df93c17e deceb796 f268abf1 881409b 5 89183841 f484f0e7 bd5f7b69
    ebf7481c faf69d3e 9d24df6e 9c2b0791 785019f7 a0d20e95 2ef35799 66ffc819
    4a77cdf2 c6fb4380 fe94c13c d4261655 7bf3d6ba 6289dc8b f9aad4e1 bd918fb7
    32916fe1 477666ab c2a3d591 a84dd435 51711f6e 93e2bd84 89884c
    quit smoking
    crypto isakmp identity address
    IKEv2 crypto policy 1
    aes-256 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 10
    aes-192 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 20
    aes encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 30
    3des encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 40
    the Encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    Crypto ikev2 activate outside_mgts port 443 customer service
    Crypto ikev2 access remote trustpoint ASDM_TrustPoint0
    Crypto ikev1 allow inside
    Crypto ikev1 enable outside_mgts
    IKEv1 crypto policy 10
    authentication crack
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 20
    authentication rsa - sig
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 30
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 40
    authentication crack
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 50
    authentication rsa - sig
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 60
    preshared authentication
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 70
    authentication crack
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 80
    authentication rsa - sig
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 90
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 100
    authentication crack
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 110
    authentication rsa - sig
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 120
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 130
    authentication crack
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 140
    authentication rsa - sig
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 150
    preshared authentication
    the Encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    without ssh stricthostkeycheck
    SSH 10.1.72.0 255.255.255.0 inside
    SSH timeout 60
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    vpnclient Server 91.188.180.X
    vpnclient mode network-extension-mode
    vpnclient nem-st-autoconnect
    VPN - L2L vpnclient vpngroup password *.
    vpnclient username aradetskayaL password *.
    dhcpd auto_config outside_mgts
    !
    dhcpd update dns replace all two interface inside
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    SSL-trust ASDM_TrustPoint0 inside point
    SSL-trust ASDM_TrustPoint0 outside_mgts point
    WebVPN
    Select outside_mgts
    internal GroupPolicy_91.188.180.X group strategy
    attributes of Group Policy GroupPolicy_91.188.180.X
    Ikev1 VPN-tunnel-Protocol
    internal group VPN - ST strategy
    attributes of group VPN - ST policy
    value of 195.34.31.50 DNS Server 8.8.8.8
    Ikev1 VPN-tunnel-Protocol
    Split-tunnel-policy tunnelspecified
    Split-tunnel-network-list value VPN-ST_splitTunnelAcl
    by default no
    aradetskayaL encrypted HR3qeva85hzXT6KK privilege 15 password username
    tunnel-group 91.188.180.X type ipsec-l2l
    attributes global-tunnel-group 91.188.180.X
    Group - default policy - GroupPolicy_91.188.180.42
    IPSec-attributes tunnel-group 91.188.180.X
    IKEv1 pre-shared-key *.
    remote control-IKEv2 pre-shared-key authentication *.
    remotely IKEv2 authentication certificate
    pre-shared-key authentication local IKEv2 *.
    remote access to tunnel-group VPN - ST type
    VPN-general ST-attributes tunnel-group
    address vpnpool pool
    Group Policy - by default-VPN-ST
    tunnel-group ipsec VPN ST-attributes
    IKEv1 pre-shared-key *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    inspect the icmp
    inspect the icmp error
    !
    global service-policy global_policy
    context of prompt hostname
    no remote anonymous reporting call
    Cryptochecksum:212e4f5035793d1c219fed57751983d8
    : end

    door-71 # sh crypto ikev1 his

    There are no SAs IKEv1

    door-71 # sh crypto ikev2 his

    There are no SAs IKEv2

    door-71 # sh crypto ipsec his


    There is no ipsec security associations
    door-71 # sh crypto isakmp

    There are no SAs IKEv1

    There are no SAs IKEv2

    Global statistics IKEv1
    The active Tunnels: 0
    Previous Tunnels: 0
    In bytes: 0
    In the packages: 0
    In packs of fall: 0
    In Notifys: 0
    In the constituencies of P2: 0
    In P2 invalid Exchange: 0
    In P2 Exchange rejects: 0
    Requests for removal in his P2: 0
    Bytes: 0
    Package: 0
    Fall packages: 0
    NOTIFYs out: 0


    Exchanges of P2: 0
    The Invalides Exchange P2: 0
    Exchange of P2 rejects: 0
    Requests to remove on P2 Sa: 0
    Tunnels of the initiator: 0
    Initiator fails: 0
    Answering machine fails: 0
    Ability system breaks down: 0
    AUTH failed: 0
    Decrypt failed: 0
    Valid hash fails: 0
    No failure his: 0

    IKEV1 statistics for Admission appeals
    In negotiating SAs Max: 25
    In negotiating SAs: 0
    In negotiating SAs Highwater: 0
    In negotiating SAs rejected: 0

    Global statistics IKEv2
    The active Tunnels: 0
    Previous Tunnels: 0
    In bytes: 0
    In the packages: 0
    In packs of fall: 0
    In Fragments of fall: 0
    In Notifys: 0
    In Exchange for the P2: 0
    In P2 invalid Exchange: 0
    In P2 Exchange rejects: 0
    In IPSEC delete: 0
    In delete IKE: 0
    Bytes: 0
    Package: 0
    Fall packages: 0
    Fragments of fall: 0
    NOTIFYs out: 0
    Exchange of P2: 0
    The Invalides Exchange P2: 0
    Exchange of P2 rejects: 0
    On IPSEC delete: 0
    The IKE Delete: 0
    Locally launched sAs: 0
    Locally launched sAs failed: 0
    SAs remotely initiated: 0
    SAs remotely initiated failed: 0
    System capacity: 0
    Authentication failures: 0
    Decrypt failures: 0
    Hash failures: 0
    Invalid SPI: 0
    In the Configs: 0
    Configs: 0
    In the Configs rejects: 0
    Configs rejects: 0
    Previous Tunnels: 0
    Previous Tunnels wraps: 0
    In the DPD Messages: 0
    The DPD Messages: 0
    The NAT KeepAlive: 0
    IKE recomposition launched locally: 0
    IKE returned to the remote initiated key: 0
    Generate a new key CHILD initiated locally: 0
    CHILD given to the remote initiated key: 0

    IKEV2 statistics for Admission appeals
    Max active SAs: no limit
    Max in negotiating SAs: 50
    Challenge cookie line: never
    Active sAs: 0
    In negotiating SAs: 0
    Incoming requests: 0
    Accepted incoming requests: 0
    A rejected incoming requests: 0
    Out of requests: 0
    Out of the applications accepted: 0
    The outgoing rejected requests: 0
    A rejected queries: 0
    Rejected at the SA: 0 Max limit
    Rejected low resources: 0
    Rejected the current reboot: 0
    Challenges of cookie: 0
    Cookies transmitted challenges: 0
    Challenges of cookie failed: 0

    IKEv1 global IPSec over TCP statistics
    --------------------------------
    Embryonic connections: 0
    Active connections: 0
    Previous connections: 0
    Incoming packets: 0
    Inbound packets ignored: 0
    Outgoing packets: 0
    Outbound packets ignored: 0
    The RST packets: 0
    Heartbeat Recevied ACK packets: 0
    Bad headers: 0
    Bad trailers: 0
    Chess timer: 0
    Checksum errors: 0
    Internal error: 0

     
    door-71 # sh statistical protocol all cryptographic
    [Statistics IKEv1]
    Encrypt packets of requests: 0
    Encapsulate packets of requests: 0
    Decrypt packets of requests: 0
    Decapsulating requests for package: 0
    HMAC calculation queries: 0
    ITS creation queries: 0
    SA asked to generate a new key: 0
    Deletion requests: 0
    Next phase of allocation key applications: 0
    Number of random generation queries: 0
    Failed requests: 0
    [Statistics IKEv2]
    Encrypt packets of requests: 0
    Encapsulate packets of requests: 0
    Decrypt packets of requests: 0
    Decapsulating requests for package: 0
    HMAC calculation queries: 0
    ITS creation queries: 0
    SA asked to generate a new key: 0
    Deletion requests: 0
    Next phase of allocation key applications: 0
    Number of random generation queries: 0
    Failed requests: 0
    [IPsec statistics]
    Encrypt packets of requests: 0
    Encapsulate packets of requests: 0
    Decrypt packets of requests: 0
    Decapsulating requests for package: 0
    HMAC calculation queries: 0

    ITS creation queries: 0
    SA asked to generate a new key: 0
    Deletion requests: 0
    Next phase of allocation key applications: 0
    Number of random generation queries: 0
    Failed requests: 0
    [SSL statistics]
    Encrypt packets of queries: 19331
    Encapsulate packets of queries: 19331
    Decrypt packets of queries: 437
    Package requests decapsulating: 437
    HMAC calculation queries: 19768
    ITS creation queries: 178
    SA asked to generate a new key: 0
    Requests to remove SA: 176
    Next phase of allocation key applications: 0
    Number of random generation queries: 0
    Failed requests: 0
    [Statistical SSH are not taken in charge]
    [Statistics SRTP]
    Encrypt packets of requests: 0
    Encapsulate packets of requests: 0
    Decrypt packets of requests: 0
    Decapsulating requests for package: 0
    HMAC calculation queries: 0
    ITS creation queries: 0
    SA asked to generate a new key: 0
    Deletion requests: 0
    Next phase of allocation key applications: 0
    Number of random generation queries: 0
    Failed requests: 0
    [Statistics]
    Encrypt packets of requests: 0
    Encapsulate packets of requests: 0
    Decrypt packets of requests: 0
    Decapsulating requests for package: 0
    HMAC calculation queries: 6238
    ITS creation queries: 0
    SA asked to generate a new key: 0
    Deletion requests: 0
    Next phase of allocation key applications: 0
    Number of queries random generation: 76
    Failure of queries: 9

    door-71 # sh crypto ca trustpoints

    Trustpoint ASDM_TrustPoint0:
    Configured for the production of a self-signed certificate.

    Trustpoint ASDM_TrustPoint1:
    Configured for the production of a self-signed certificate.

    If you need something more, then spread!
    Please explain why it is that I don't want to work?

    Hello

    When the IPSEC tunnel does not come to the top, the first thing comes to my mind is to run a tracer of package from the CLI and the phases in it. Please run this command from your firewall side and share the output. I've just compiled this command with the random ip address and ports of your given range.

    Packet-trace entry inside tcp 10.1.72.2 1233 10.1.61.2 443 detailed

    Best regards

    Amandine

  • Installed Vista pack 1 as prompted. Tour is continuing after 10 hours. Monitor says no entries, and falls asleep.

    original title: installed Vista pack 1 as prompted.  Tour is continuing after 10 hours.  Monitor says no entries, and falls asleep.  What should I do?

    My desktop computer has said that there was a problem with the window.  He said that Vista pack 1 expired July 12.  I installed it when prompted by August 6.  He began to run at 18:30 and HP Tower ran all night with a blue and orange light flashing.  The monitor was gone to sleep.  When I turned on the screen this morning, he said that he had no entry and time to sleep.  What should I do next?    I just got internet on 28 June, so don't know what that what is happening.  I get updates automatically.  Why it that not update.  I use another computer to communicate with you because I don't know what to do next.

    Spent by the factory with the OS. After 18 + OVERLAYS on my XP Pro PC I've exchanged on this VISTA Premium 32 bit and after 15 + OVERLAYS on this one, IT WORKS finally.

    This experience as Kosh Vorlon said above RESTORATION anyway possible and go directly to Microsoft for Service Pack so I found this to be the best source

    It's the 32-bit version

    http://www.Microsoft.com/download/en/details.aspx?displaylang=en&ID=30

    This is the 64-bit version

    http://www.Microsoft.com/download/en/details.aspx?displaylang=en&ID=21299

    Now it's been GETTING all THE UPDATES... I found that the PC knows what to do with them, and without any help from us that it just boot process follow all prompts.

    When it's done GET SERVICE PACK 2, SP2 from Microsoft

    It's the 32-bit version

    http://www.Microsoft.com/download/en/details.aspx?displaylang=en&ID=17669

    It is for the 64-bit version

    http://www.Microsoft.com/download/en/details.aspx?displaylang=en&ID=17669

    and it goes the same for this time to GET all UPDATES.

    And a my Service Packs note came in the updates of Windows. As well as all updates from the update updates. HP updates are usually for the hardware and drivers.

    Good luck

    RickS

  • Server 2016 for Action Pack

    I really like my Microsoft Action Pack subscription.  It allows me to familiarize yourself with the software I deploy my clients.

    One of my clients will install a new server in the fall, and I intend to load it again Windows Server 2016 (probably Essentials).  So I went on the site of Microsoft Action Pack to load the software on one of my servers, so that I could familiarize myself with the installation and use, before the purchase of my client.

    Unfortunately, there is no download for server 2016... only Server 2012.  I was just wondering if anyone knows if server 2016 will be added to downloads MAPS.  I'm pretty well versed with Server 2012... should I stay with this version for my client?

    I would like any ideas or suggestions.

    Thank you

    Phil

    Hello

    Post your question in the TechNet Server Forums, as your question kindly is beyond the scope of these Forums.

    http://social.technet.Microsoft.com/forums/WindowsServer/en-us/home?category=WindowsServer

    TechNet forums:

    https://social.technet.Microsoft.com/forums/en-us/home

    MSDN forums:

    https://social.msdn.Microsoft.com/forums/en-us/home

    See you soon.

  • Service Pack compliance - SQL - SCOM

    We have:

    SCOM R2 2012

    SQL MP is up to date

    The question:

    We rely on the compliance of Service Pack within the SQL MP in order to know when the SQL servers fall in non-compliance.  He worked up to 1.5 months ago.  It worked so well, that it has become a tool for our team of SQL.

    We have realized that it stopped working when the SQL team members out of non-compliant servers where we have not received any notification.

    There is little documentation about this tool.

    (1) how do SCOM servers communicate with MS on knowledge when check compliance?  My hunch is that something has changed in the Internet network access.

    (2) is just use MS Updates?

    Any help will be greatly appreciated.

    Thank you!!!

    Hello

    Your question is beyond the scope of this community.

    Please repost your question in the SQL Server TechNet Forums.

    https://social.technet.Microsoft.com/forums/SQLServer/en-us/home?category=SQLServer

    Or here:

    https://social.technet.Microsoft.com/forums/SystemCenter/en-us/home?category=systemcenteroperationsmanager

    See you soon.

  • Encounter problems when you try to install Windows XP Service Pack 3.

    original title: Professional window xp

    Redirect the project!

    Sorry! We to inconvenient, interruption of power supply to the island due to bad weather and low atmospheric pressure in the Mariana Islands. and relative to the first page I wrote I hope he gets becaused in the future, I can't guarantee if there is another set of black out

    in the island again and I hope not! becaused I have extra power for my machine, so I'm going to the principal of my question! can I know

    1. I already check the version of the Professional Windows xp system under the computer system only service pack 3 edition

    is written and nothing like 32 or 64-bit version.

    2 - I have a few download but it comes up to the attempt failed becaused of the 32-bit and 64-bit, I can't determine.

    3. is the service pack 3 is the 64 bit version? 'or' version 32 bit!

    Last week! I also tried to download a microsoft software support center of spywares, virus, malware, Trojan horses to prevent

    the downturn and falls down the computer and still fails, I don't know if the cause is becaused of the smart display or because of the security alert! becaused it says "configuration is a bad installation needs to reinstall the configuration" what does that mean? the version of 32-bit and 64-bit

    always have failled download connection? What is the right option for this? Recently, I already have microsoft security essential and it can

    protect the computer against all viruses! My question is that the microsoft security essential can fix regestry types of problems? or scan only to deter-

    my mistakes! Is that the security system can help if we make upgrades in the order compatibllity of the system?

    Thanks again for understand my question!

    Hi allanmiones,

    ·         It shows Windows XP Service Pack 3 under System Properties?

    ·         What you are trying to download?

    ·         What is the exact message that you receive when you download something?

    There is no SP3 for the 64 bit version of Windows XP, so if you have installed Service Pack 3, it means that you have a 32-bit version of Windows XP is installed on the computer.

    Overview of Windows XP Service Pack 3

    You can check the Windows XP system information (Msinfo32.exe) tool to see if you have a 32-bit or a 64-bit operating system. Search for System Type. Note that x 86 is 32-bit and x 64 is 64-bit.

    For Microsoft Security Essentials, see:

    Microsoft Security Essentials

    You can also ask your question in the Microsoft Security Essentials Forums .

  • Blue screen on startup after installation of service pack 3

    Original title: big problems with Windows service pack 3

    My pc runs xp edition media with a processor intel dc. I had to reformat using recovery discs cleaning all ok using microsoft update until after that load successfully and the installation of Service pack 3. Start theres a brief flash of B.S.O.D. then it goes straight to load the page option of safe mode. Startup journal raises a whole series of errors. drivers of not start tearing my hair on it!

    If there is a problem starting, XP is configured to automatically try to start again and you can stuck in a loop not being able to go beyond the screen boot options, or none of these startup options you choose will work only.

    Sometimes, when XP has a problem starting or falls down and tries to start again, it will give you a "short" menu of boot options and none of them will appear to be good to get your system going again.  You have tried them all!

    The options are similar to the Advanced Boot Options menu XP, but the only option that you need (disable automatic error system reboot) are not offered, because XP went too far during the boot process and offers a limited number of boot options.

    If this is the case, you must call Options menu advanced boot yourself until you do not see the option:

    Disable the automatic restart in the event of system failure

    When you get the XP Advanced Options correct start menu you want to see, he has options on it like these:

    Safe mode
    Safe mode with networking
    Safe mode with command prompt

    Enable Boot logging
    Enable VGA mode
    Last good Configuration known (your most recent settings that worked)
    Directory Services Restore Mode (Windows domain controllers only)
    Debug mode
    Disable the automatic restart in the event of system failure

    Start Windows normally
    Reset
    Return to OS Choices Menu

    You need to choose in this menu is the option:

    Disable the automatic restart in the event of system failure

    Then if XP does not start normally, you will see an error screen with information and clues about the problem and then you can decide what to do next.

    If you do not see the automatic restart on system failure option turn it off, you must reset your system and start typing the key F8 on the keyboard until you see her disable automatic restart on system failure option.

    If you miss the window of opportunity F8, you must try again and start tapping the F8 key with more urgency (earlier and more frequently) until you see disable automatic restart on system failure, and then select.

    You must keep trying the F8 menu until you see disable automatic restart on system failure option, and select it.

    If your system has a Blue Screen of Death (BSOD), we need to know what the screen says:

    Here's a BSOD example showing information you provide:

    http://TechRepublic.com.com/i/tr/downloads/images/bsod_a.jpg

    Send for the nose and the Red arrows (3 to 4 lines total).

    Send all * line STOP message since there are clues in the 4 parameters.

    If it looks like there is some kind of name listed in the STOP message file, send this line also.

    Ignore the boring text unless it seems important to you.  We know what a BSOD looks like, we need to know what your BSOD looks like.

    If your ntbootlog is display messages «Is a not load driver...» ', this does not necessarily mean that a problem...

  • Failure of Windows Service Pack 2 - 0x80071aa7 error Code

    I tried several times to install this update and finally just ignored, because it does not constantly. But now the programs are in need, so I tried again and come up with the same result.

    I just tried the standalone download of Service Pack 2 of Windows. Downloaded and installed fine, but after the restart, he completed the phase 1 very good, but arriving at step 2, says that it is "some changes could not be made. Returning from the changes. "He then stops, tries again, falls on the same subject, and then starts and displays the following message:"Installation failed - could not open the file transactionally, because its identity depends on the result of a unresolved transaction. "Details - error: ERROR_FILE_IDENTITY_NOT_PERSISTENT (0x80071aa7).

    I tried looking for other forums, but found no answer. Help, please!

    I am running Windows Vista Home Premium 64-bit on an HP Pavilion dv4 laptop.

    Hello

    Jump down to audits of programs malicious and if necessary come back here:

    Did you use the troubleshooter above? KB947366?

    Disable you and even uninstall your antivirus/security programs? Stop or
    Uninstall any firewall other than Windows Firewall.

    Have you tried Safe Mode Setup?

    You download and install rather than using Windows Updates?

    You have enough free disk space on the Windows drive?

    See Ronnie Vernon's response in this thread:

    http://answers.Microsoft.com/en-us/Windows/Forum/windows_other-windows_update/error-code-80071aa7/70a484f7-fca5-4d6b-BAFF-805160380a86

    =============================================

    There is also a good chance that malware are involved.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    ======================================

    If necessary AFTER you are sure that the machine is clean of any malware. (DO NOT USE IF)
    MALWARE IS STILL PRESENT).

    You can try a repair install or an upgrade in Place.

    You can use another DVD that aren't copy protected but you you need to own
    Product key. It must be the same version 32 or 64 BIT Vista OEM. Also the system
    machine to usually sell the cheap disk since you already own Windows. Don't forget to make a
    good backup or 3 (security in redundancy).

    On-site upgrade
    http://vistasupport.MVPs.org/repair_a_vista_installation_using_the_upgrade_option_of_the_vista_dvd.htm

    This tells you how to access the System Recovery Options and/or a Vista DVD
    http://Windows.Microsoft.com/en-us/Windows-Vista/what-happened-to-the-recovery-console

    How to perform a repair for Vista Installation
    http://www.Vistax64.com/tutorials/88236-repair-install-Vista.html

    =======================================

    For extreme cases:

    Norton Power Eraser - eliminates deeply embedded and difficult to remove crimeware
    This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
    uses aggressive methods to detect these threats, there is a risk that it can select some
    legitimate programs for removal. You should use this tool very carefully and only after
    you have exhausted other options.
    http://us.Norton.com/support/DIY/index.jsp

    ================================

    If you are in North America, you can call 866-727-2338 to get infections of virus and spyware. Seehttp://www.microsoft.com/protect/support/default.mspx for more details. For international information, check your subsidiary local Support site.

    I hope this helps.

  • Is my HP Thin Client still under warranty after a fall

    In our facility, we have about 50 thin clients running on the production floor. We recently had a fall of 4 Ft. Now, it's not beyond the splash screen. I can't enter the BIOS setup, but when I go out, it still does not start.

    My warranty will cover that?

    Hello BCraft,

    Here is a link to the HP warranty information

    HP products - additional information in statements of warranty on HP products

    "Warranty does not protect against accidental damage, loss, natural disasters or any other event that does not during the manufacture of the product."

    Often you can buy guarantee agreements that have clauses that support and can be part of some agreements Care Pack accidental damage.

    You can review this package guarantees that you bought with customers and see if accidental damage are covered.

  • File InDesign CC falls down after a first action...

    Hi, I have an indesign files that opens but hangs at end of every act, (sometimes after just to scroll or copy paste).

    I worked 10 hours on the file and have a deadline tomorrow morning.

    I can't do an idml file as the file falls down during the packing process...

    Any idea?

    TNX!

    INE

    In fact, I think that IDML is more likely to help. See remove minor corruption by exporting

  • Help to configure content vRealize Pack of Operations Manager for paper Insight

    I am running the following:

    vrops Version 6.0.1.2523163

    Log insight Version 2.5.0 - 2629935

    I installed the v1.0 vROps 6.x content pack in Insight Journal and used this article very useful when configuring the liagent.ini file

    vRealize content Operations Manager Pack for newspaper Insight - VMware Blogs

    Everything seemed to go well, but the end result is no data of vrops Li and connection errors in the newspapers of the agent without clear indication of why it is not agent connection.

    Viewing the log file, I see a lot of counters indicating the date, the agent of time shows that he has worked for a few days now with more 8 million observed events.

    However, interrupted events number matches the 8 million observed number of events which means that everything has been ignored "due to the overflow of local storage or rejected by the server" as stated in the article.

    2015-08-23 17:07:16.704273 0x00007f770ffff700 < path > CFApiTransport:348 | Re-login to the server vrops.domain.local:9000

    2015-08-23 17:07:16.762633 0x00007f770ffff700 < error > CurlConnection:482 | Transport CurlConnection::Config error: could not connect to the server

    2015-08-23 17:07:16.762664 0x00007f770ffff700 < path > CFApiTransport:328 | DoConnectJob [deferred by 167 dry connection]

    Agent of the time 134:15:34.106000

    Events observed: 8 176 438 (total number of events saw the newspaper sources since the Agent started or changed server)

    The events collected: 0 (= fall the observed)

    Events sent: 0 (delivered to the destination server)

    Events ignored: 8 176 438 (abandoned due to overflow of local storage or rejected by the server)

    Mailing frequency: 0.00 EPS (average of the last minute)

    DB file size: 143,576,064 bytes

    CPU usage: 0% (in the last 900 seconds average)

    Link: cfapi://vrops.domain.local:9000

    Host name (FQDN full): vrops.domain.local

    Opportunity of free space: 191,429,376 bytes

    Two things, I thought maybe to blame that I don't know how to fix:

    1. vmw_vr_ops_hostname = IP address? same as address of node? My cluster shows the node address as the IP address rather than a FULL domain name. I tried to provide as well in the ini file, but doesn't seem to help, but I find it weird that I don't see the name domain FULL configuration section that I linked to suggested that I should. And what is listed here would be that I filled in the ini file to vmw_vr_ops_hostname file?2015-08-24_14-30-14.jpg
    2. In vrops, under Administration > Support > newspapers > change the Logger Configuration > export to Syslog, no matter how many times I uncheck the box 'exit of syslog server logs' external and click ok the box remains checked off the coast. I'm sure that this must be unchecked, but even if it were problems, as I understand it, it would be especially causing duplicate rather logs that prevent all newspapers to appear as is my case.

    According to this article it is said: "If export syslog is configured then the required configuration of the specific agent is not set and the syslog Protocol is used instead of the cfapi." It is also very important to note that configurations can and will be replaced! By example, if you configure the agent works with the content pack (for example. liagent.ini) client-side and later someone configure syslog export from the user interface, the configuration of the client-side agent are crushed with the parameters of the interface user break the integration of content package. »

    vRealize content Operations Manager Pack for newspaper Insight - SFlanders.net

    Given that syslog export was apparently when I first tried to set this up, it would make sense that this is what causes problems, but how could I then set? Especially when the user interface won't let not disable me export syslog on vrops?

    Any help is appreciated. Thank you

    Very useful - I think that the problem is with the [server] section if your configuration. What is the host name = value? It can be solved? The reconnecting log messages are expected that the delayed connection makes it sound like the configuration of the host name does not.

  • Impossible to drop the datafile after a fall of tablespace

    Hi all

    Try to Drop tablespace with Datafile command used is as below

    Drop tablespace tims_db including content and data files;

    It has been performed successfully, but the data file is always... tried to let fall off the BONES, but cannot remove the alert... associates file tracking logs are as below

    __________________________________________________________________________________________________
    C:\oracle\admin\ocprd\udump\ocprd_ora_4236.TRC dump file
    Mon Feb 06 03:40:58 2012
    ORACLE V9.2.0.6.0 - Production vsnsta = 0
    vsnsql = 12 vsnxtr = 3
    Windows 2000 Version 5.0 Service Pack 4, CPU type 586
    Oracle9i Enterprise Edition Release 9.2.0.6.0 - Production
    With partitioning, OLAP and Oracle Data Mining options
    Release 9.2.0.6.0 - Production jserver
    Windows 2000 Version 5.0 Service Pack 4, CPU type 586


    Redo thread mounted by this instance: 1

    Oracle process number: 14

    Windows thread ID: 4236, image: ORACLE. EXE


    2012-02-06 03:40:58.562
    SESSION ID: (52.7127) 2012-02-06 03:40:58.500
    ORA-01259: cannot remove the E:\ORACLE\ORADATA\OCPRD\TIMSDB01 data file. DBF
    ORA-27056: skgfrdel: could not delete file
    OSD-04024: cannot delete the file.
    S/O-error: (32 OS) the process cannot access the file because it is being used by another process.
    ______________________________________________________________________________________________

    OS: Windows 2000
    DB: Oracle 9i

    Help, please

    Thank you

    user1687821 wrote:
    As it is an instance of production, we need approval to bounce back

    If you are sure that this file is not necessary - unlock with unlocker and move to a place for a while. Then kill him or kill him immediately.

    Then the database will ask missing datafile to the restart of the database even if it is not listed in dba_data_files...?

    If your fall of tbs succeeded - everything will be fine

  • Home sharing a fall of Apple TV 3 rd gen.

    I have two devices. A MacBook Air 13 inch (2013) and a new iMac 27 K 5 in. end 2015 (OS 10.11.6). The iTunes is the last 12.1.5.21 and once on the version previous home sharing would be cut at random on my Apple 3rd GEN MacBook Air TV is never a problem, just this iMac. Yesterday I fixed in signing off everything, leave iTunes, restarted my iMac, reboot of the Capsule of ancient times - not sure of the model, then by restarting Apple TV. He was working back. Then I just tried this and failed. Then, I am registered on the sharing House Apple TV and iTunes from iMac, restarted the router and voila it worked. Now while typing this it just cut off again. This is while watching videos streaming on Apple TV, the main reason I bought the thing.

    Now I try the same procedure to see if it will work. Why - what is falling all the time. I am registered on iTunes, but Apple TV says that I am not connected. This is getting very frustrating.

    HI T - dude,

    Thank you for using communities of Apple Support. From what you have said, it seems that for Apple TV streaming home sharing is cutting.  Looks like you already have a troubleshooting. There are a few things that we can do that you mentioned not try again. I recommend you read these articles, since this seems consistent throughout a few Macs, maybe it's a problem with the AppleTV.

    If you use an airport or a Time Capsule, check the firmware updates.

    Get help with sharing home - Apple Support

    See you soon.

Maybe you are looking for