ping for the pix vpn problem

Hello

I got a pix 501 (6.3 - 4) on a local network and try to use Cisco VPN Client (4.0.2-D) on a remote pc.

I can open a vpn session.

I can't ping from the remote pc to the LAN

I can ping from any station on the LAN to the remote pc

After that I did a ping of a station on the LAN to the remote pc, I ping the remote computer to the local network.

I am so newb, trying for 2 days changing ACLs, no way.

I must say that I am in dynamic ip wan on the local network and the remote pc.

Any idea about this problem?

Any help is welcome.

Here is the configuration of my pix:

6.3 (4) version PIX

interface ethernet0 10baset

interface ethernet1 100full

ethernet0 nameif outside security0

nameif ethernet1 inside the security100

activate the password * encrypted

passwd * encrypted

pixfirewall hostname

domain ciscopix.com

clock timezone THATS 1

clock to summer time CEDT recurring last Sun Mar 02:00 last Sun Oct 03:00

fixup protocol dns-length maximum 512

fixup protocol ftp 21

correction... /...

fixup protocol tftp 69

names of

name 192.168.42.0 Dmi

inside_access_in ip access list allow a whole

inside_outbound_nat0_acl ip access list allow any 192.168.229.0 255.255.255.0

outside_cryptomap_dyn_20 ip access list Dmi 255.255.255.0 allow 192.168.229.32 255.255.255.224

access-list outside_cryptomap_dyn_20 allow icmp a whole

pager lines 24

opening of session

logging trap information

Outside 1500 MTU

Within 1500 MTU

IP address outside the 209.x.x.x.255.255.224

IP address inside 192.168.42.40 255.255.255.0

alarm action IP verification of information

alarm action attack IP audit

IP local pool dmivpndhcp 192.168.229.1 - 192.168.229.254

location of PDM 192.168.229.1 255.255.255.255 outside

209.165.x.x.x.255.255 PDM location inside

209.x.x.x.255.255.255 PDM location outdoors

PDM logging 100 information

history of PDM activate

ARP timeout 14400

Global 1 interface (outside)

NAT (inside) 0-list of access inside_outbound_nat0_acl

NAT (inside) 1 0.0.0.0 0.0.0.0 0 0

Route outside 0.0.0.0 0.0.0.0 209.165.200.225 1

Timeout xlate 0:05:00

Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225

H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00

Timeout, uauth 0:05:00 absolute

GANYMEDE + Protocol Ganymede + AAA-server

AAA-server GANYMEDE + 3 max-failed-attempts

AAA-server GANYMEDE + deadtime 10

RADIUS Protocol RADIUS AAA server

AAA-server RADIUS 3 max-failed-attempts

AAA-RADIUS deadtime 10 Server

AAA-server local LOCAL Protocol

Enable http server

Dmi 255.255.255.0 inside http

No snmp server location

No snmp Server contact

SNMP-Server Community public

No trap to activate snmp Server

TFTP server inside the 192.168.42.100.

enable floodguard

Permitted connection ipsec sysopt

AUTH-prompt quick pass

AUTH-guest accept good

AUTH-prompt bad rejection

Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

Crypto-map dynamic outside_dyn_map 20 the value transform-set ESP-3DES-SHA

Dynamic crypto map dynmap 20 match address outside_cryptomap_dyn_20

map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map

outside_map interface card crypto outside

ISAKMP allows outside

ISAKMP identity address

part of pre authentication ISAKMP policy 20

ISAKMP policy 20 3des encryption

ISAKMP policy 20 chopping sha

20 2 ISAKMP policy group

ISAKMP duration strategy of life 20 86400

vpngroup address dmivpndhcp pool dmivpn

vpngroup dns 192.168.42.20 Server dmivpn

vpngroup dmivpn wins server - 192.168.42.20

vpngroup dmivpn by default-field defi.local

vpngroup idle 1800 dmivpn-time

vpngroup password dmivpn *.

Telnet timeout 5

SSH timeout 5

Console timeout 0

VPDN username vpnuser password *.

VPDN allow outside

VPDN allow inside

dhcpd address 192.168.42.41 - 192.168.42.72 inside

dhcpd lease 3600

dhcpd ping_timeout 750

Terminal width 80

Cryptochecksum: *.

Noelle,

Add the command: (in config mode): isakmp nat-traversal

Let me know if it helps.

Jay

Tags: Cisco Security

Similar Questions

  • Multiple connections to the PIX VPN

    Is it possible to put an end to a simple VPN for the PIX to provide remote access, but at the same time set up an another tunel VPN between the PIX and another firewall to provide access from the internal network to the external?

    Thanks in advance!

    Yes, you can have client and L2L tunnels configured on the pix together. If you talk to redirect traffic so that the customer can speak through the L2L at the remote network as well, here's a link: http://www.cisco.com/warp/public/110/client-pixhub.html

    Here is a link to just the client for the pix configuration:

    http://www.Cisco.com/warp/public/110/pix3000.html

    or here's a link on the conduct of pix pix and customer:

    http://www.Cisco.com/warp/public/110/pixpixvpn.html

    Kurtis Durrett

  • How to create a VPN file .pcf for the CISCO VPN CLIENT software profile

    Dear all

    How to create a VPN file .pcf for the CISCO VPN CLIENT software profile

    Concerning

    Hi Imran,

    Can't do much about that because it depends on what authenticate you the VPN server and how the settings. But let me introduce you to the memory layout. Once you install and open a VPN client. Press it again and it opens up a new page for the VPN config.

    Example of configuration as it is attached. But it differs depending on the configuration of your vpn server.

    Once you create and save this profile. Your FCP file is stored.

    Please assess whether the information provided is useful.

    By

    Knockaert

  • Œuvres ping for the VPN ASA5505 RDP does not work?

    I have an ASA5505 VPN remote access facility

    I have a server connected directly behind the ASA and I can ping the server without problem.

    The reports being encrypted and decrypted packets VPN client

    However when I try to RDP to the server packages encyrpted keep incrementing but the decrypted packets are not.

    I also do not see all RDP traffic hit the server (checked by ethereal)

    I did a packet trace and it succeeds, but ends with a parody of IP which I believe is correct as is the vpn traffic and not actually be encrypted.

    This is the correction of the RDP session, I'm confused by one ICMP denied on line 2 that I am able to ping the server?

    % ASA-6-302013: built of TCP connections incoming 88193 for external:172.16.24.4/50984 (172.16.24.4/50984) at internal:192.168.100.146/3389 (192.168.100.146/3389) (roger_ssl)

    % ASA-4-313004: Denied ICMP type = 0, of laddr 172.16.24.4 on the external interface to 192.168.100.146: no matching session

    % ASA-609001 7: built internal local-host: 192.168.100.37

    % ASA-6-302015: built connection UDP incoming 88194 for external:172.16.24.4/50620 (172.16.24.4/50620) at internal:192.168.100.37/53 (192.168.100.37/53) (roger_ssl)

    % ASA-4-313004: Denied ICMP type = 0, of laddr 172.16.24.4 on the external interface to 192.168.100.37: no matching session

    % ASA-6-302015: built connection UDP incoming 88195 for external:172.16.24.4/64598 (172.16.24.4/64598) at internal:192.168.100.37/53 (192.168.100.37/53) (roger_ssl)

    % ASA-4-313004: Denied ICMP type = 0, of laddr 172.16.24.4 on the external interface to 192.168.100.37: no matching session

    % ASA-4-313004: Denied ICMP type = 0, of laddr 172.16.24.4 on the external interface to 192.168.100.37: no matching session

    % 302014-6-ASA: disassembly of the TCP connection 88193 for external:172.16.24.4/50984 to internal:192.168.100.146/3389 duration 0: bytes of 00:00 0 flow closed by inspection (roger_ssl)

    I have that configured NAT

    NAT (internal, external) static source 192.168.100.0 192.168.100.0 static destination VPN_172 VPN_172

    The only logical bit that is closed by the inspection flow? Is this to say that the server has not responded?

    And decrypt packets increase not when trying to RDP

    Does this mean anyting to anyone that I have arrived at the end of my knowledge of the SAA on this one!

    Thank you

    Roger

    Answer is based on your other thread:

    https://supportforums.Cisco.com/thread/2207372

  • Phone Droid of Pix for the PPTP VPN

    I tried to set up a PPTP VPN between a Droid phone and a performer 6.3.5 Pix code.  As much as I can say the configuration is correct and I can open the vpn pptp fine from my laptop however the Droid refuses to connect.  Here is the relevant configuration.

    VPDN droid group accept dialin pptp

    VPDN group droid ppp authentication pap

    VPDN group droid ppp authentication chap

    VPDN group droid ppp mschap authentication

    VPDN droid Group client configuration address local vpnpool2

    VPDN group droid pptp echo 60

    VPDN group of local authentication client droid

    VPDN group droid username * password *.

    I turned on him debugs following:

    Debug ppp negotiation

    Debug ppp io

    Debug ppp PAPU

    Debug ppp chap

    Debug ppp error

    Debug ppp uauth

    Debug vpdn event

    Debug vpdn error

    VPDN debug package

    I've narrowed the problem down to the following message is displayed, but I'm not sure what this means:

    PPP xmit, ifc = 0, len: 22 data: ff03c021040100120104057802060000000007020802

    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: sending xGRE pak to 97.145.147.41, len 38, 18 seq, ack 8, data: 3081880b00169c450000001200000008ff03c021040100120104057802060000000007020802

    Xmit Link Control Protocol pkt, action code is: Config request, len is: 11

    PKT dump: 0305c2238005062affcd96

    LCP option: AUTHENTICATION_TYPES, len: 5, data: c22380

    LCP option: MAGIC_NUMBER, len: 6, data: 2affcd96

    PPP xmit, ifc = 0, len: 19 data: ff03c0210102000f0305c2238005062affcd96

    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: sending xGRE pak to 97.145.147.41, len 35, 19 seq, ack 8, data: 3081880b00139c450000001300000008ff03c0210102000f0305c2238005062affcd96

    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 52799, ack 805406731

    PPP rcvd, ifc = 0, pppdev: 1, len: 28, data: ff03c02101010018010405780206000000000506990009f607020802

    Pkt RCVD Link Control Protocol, action code is: Config request, len is: 20

    PKT dump: 010405780206000000000506990009f607020802

    LCP option: Max_Rcv_Units, len: 4, data: 0578

    LCP option: ASYNC_MAP, len: 6, data: 00000000

    LCP option: MAGIC_NUMBER, len: 6, data: 990009f6

    LCP option: PROTOCOL_HDR_COMPRESSION, len: 2, data:

    LCP option: ADDRESS_CONTROL_COMPRESSION, len: 2, data:

    Xmit Link Control Protocol pkt, action code is: Config Reject, len is: 14

    PKT dump: 0104057802060000000007020802

    LCP option: Max_Rcv_Units, len: 4, data: 0578

    LCP option: ASYNC_MAP, len: 6, data: 00000000

    LCP option: PROTOCOL_HDR_COMPRESSION, len: 2, data:

    LCP option: ADDRESS_CONTROL_COMPRESSION, len: 2, data:

    PPP xmit, ifc = 0, len: 22 data: ff03c021040100120104057802060000000007020802

    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: xGRE pak to 97.145.147.41, len 38, seq 20, sending ack 9, data: 3081880b00169c450000001400000009ff03c021040100120104057802060000000007020802

    PPTP: soc select returns mask rd = 0 x 8

    PPTP: cc rcvdata, socket fd = 3, new_conn: 0

    PPTP: socket closed, fd = 3

    PPTP LNP/Cl/11/11: Session destroy

    Narrow, peripheral PPP going = 1

    PPTP: cc awaiting entry, max soc fd = 2

    If I read that correctly, this is the Pix rejecting the configuration proposed for the Droid phone?

    Any suggestion or help would be greatly appreciated.

    I'm having exactly the same problem.  We receive this reply with debugs on PIX 6.3

    Any help would be appreciated.

    PPTP: socket select return 0 fd

    PPTP: cc awaiting entry, max soc fd = 3

    PPTP: soc select returns mask rd = 0 x 1
    PPTP: new peer fd is 4
    PPTP: created tunnel, id = 23

    PPTP: cc rcvdata, socket fd = 4, new_conn: 1
    PPTP: cc RRs 156 bytes of data

    LNP 23 PPTP: CC I have 009c00011a2b3c4d0001000001000000000000030000000300010000616e6f6e796d6f757300000000000000000000000000000000000000000000000000...
    LNP 23 PPTP: CC I have SCCRQ
    LNP 23 PPTP: version of the Protocol 0 x 100
    LNP 23 PPTP: framing caps 0 x 3
    LNP 23 PPTP: carrier caps 0 x 3
    LNP 23 PPTP: max channels 1
    LNP 23 PPTP: firmware rev 0 x 0
    LNP 23 PPTP: hostname "anonymous."
    LNP 23 PPTP: vendor «»
    LNP 23 PPTP: CC O SCCRP
    PPTP: cc snddata, socket fd = 4, len = 156, data: 009c00011a2b3c4d000200000100010000000003000000030000120057462d50495800000000000000000000000000000000000000000000000000000000...

    PPTP: cc awaiting entry, max soc fd = 4

    PPTP: soc select returns mask rd = 0 x 10

    PPTP: cc rcvdata, socket fd = 4, new_conn: 0
    PPTP: cc RRs 168 bytes of data

    LNP 23 PPTP: CC I have 00a800011a2b3c4d00070000c111175f000003e805f5e1000000000300000003200000000000000000000000000000000000000000000000000000000000...
    LNP 23 PPTP: CC I have OCRQ
    LNP 23 PPTP: call id 0xc111
    LNP 23 PPTP: series num 5983
    LNP 23 PPTP: min bps 1000:0x3e8
    LNP 23 PPTP: max bps 100000000:0x5f5e100
    LNP 23 PPTP: carrier type 3
    LNP 23 PPTP: framing type 3
    LNP 23 PPTP: recv victory size 8192
    LNP 23 PPTP: ppd 0
    LNP 23 PPTP: phone len num 0
    LNP 23 PPTP: phone num «»
    LNP/Cl 23/21 PPTP: CC O OCRP
    PPTP: cc snddata, socket fd = 4, len = 32, data: 002000011a2b3c4d000800000015c1110100000000fa00001000000000000000

    PPTP: cc awaiting entry, max soc fd = 4

    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 16366, ack 805406731

    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: sending xGRE pak to 70.199.49.15, len 35, seq 1, ack 0, data: 3081880b0013c1110000000100000000ff03c0210101000f0305c2238005065366bd1e
    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: xGRE pak to 70.199.49.15, len 38, sending seq 2, ack 0, data: 3081880b0016c1110000000200000000ff03c021040100120104057802060000000007020802
    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: xGRE pak to 70.199.49.15, len 35, sending seq 3, ack 0, data: 3081880b0013c1110000000300000000ff03c0210101000f0305c2238005065366bd1e
    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 16366, ack 805406731

    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: xGRE pak to 70.199.49.15, len 38, sending seq 4, ack 1, data: 3081880b0016c1110000000400000001ff03c021040100120104057802060000000007020802
    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: xGRE pak to 70.199.49.15, len 35, sending seq 5, ack 1, data: 3081880b0013c1110000000500000001ff03c0210101000f0305c2238005065366bd1e
    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 16366, ack 805406731

    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: xGRE pak to 70.199.49.15, len 38, sending seq 6, ack 2, data: 3081880b0016c1110000000600000002ff03c021040100120104057802060000000007020802
    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: xGRE pak to 70.199.49.15, len 35, sending seq 7, ack 2, data: 3081880b0013c1110000000700000002ff03c0210101000f0305c2238005065366bd1e
    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 16366, ack 805406731

    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: xGRE pak to 70.199.49.15, len 38, sending seq 8, ack 3, data: 3081880b0016c1110000000800000003ff03c021040100120104057802060000000007020802
    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: xGRE pak to 70.199.49.15, len 35, sending seq 9, ack 3, data: 3081880b0013c1110000000900000003ff03c0210101000f0305c2238005065366bd1e
    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 16366, ack 805406731

    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: sending xGRE pak to 70.199.49.15, len 38, seq 10, ack 4, data: 3081880b0016c1110000000a00000004ff03c021040100120104057802060000000007020802
    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 16366, ack 805406731

    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: sending xGRE pak to 70.199.49.15, len 35, 11 seq, ack 5, data: 3081880b0013c1110000000b00000005ff03c0210102000f0305c2238005063391d9ff
    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: xGRE pak to 70.199.49.15, len 38, seq 12, sending ack 5, data: 3081880b0016c1110000000c00000005ff03c021040100120104057802060000000007020802
    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: xGRE pak to 70.199.49.15, len 35, seq 13, sending ack 5, data: 3081880b0013c1110000000d00000005ff03c0210102000f0305c2238005063391d9ff
    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 16366, ack 805406731

    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: pak to 70.199.49.15, len 38, seq 14 xGRE sending ack 6, data: 3081880b0016c1110000000e00000006ff03c021040100120104057802060000000007020802
    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: xGRE pak to 70.199.49.15, len 35, seq 15, sending ack 6, data: 3081880b0013c1110000000f00000006ff03c0210102000f0305c2238005063391d9ff
    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 16366, ack 805406731

    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: sending xGRE pak to 70.199.49.15, len 38, 16 seq, ack 7, data: 3081880b0016c1110000001000000007ff03c021040100120104057802060000000007020802
    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: xGRE pak to 70.199.49.15, len 35, seq 17, sending ack 7, data: 3081880b0013c1110000001100000007ff03c0210102000f0305c2238005063391d9ff
    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 16366, ack 805406731

    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: sending xGRE pak to 70.199.49.15, len 38, 18 seq, ack 8, data: 3081880b0016c1110000001200000008ff03c021040100120104057802060000000007020802
    Outdoors - PPTP xGRE interface: Out paket, len PPP 19

    outside PPTP: sending xGRE pak to 70.199.49.15, len 35, 19 seq, ack 8, data: 3081880b0013c1110000001300000008ff03c0210102000f0305c2238005063391d9ff
    outside PPTP: pak xGRE 69.0.0.60 Recvd, len 16366, ack 805406731

    Outdoors - PPTP xGRE interface: Out paket, PPP len 22

    outside PPTP: xGRE pak to 70.199.49.15, len 38, seq 20, sending ack 9, data: 3081880b0016c1110000001400000009ff03c021040100120104057802060000000007020802
    PPTP: soc select returns mask rd = 0 x 10

    PPTP: cc rcvdata, socket fd = 4, new_conn: 0
    PPTP: socket closed, fd = 4

    PPTP: cc awaiting entry, max soc fd = 3

  • IPSec sequence numbers not working not for the multi VPN

    a site at a single site VPN works no problem, but when I add the second peer in the concentrator, router it does not connect. There is no routing in place that all routers are connected to the same switch, and with no crypto card they can all two ping 192.168.2.1. With crypto card only 192.168.2.2 can ping 192.168.2.1. I'm at a loss as to what I'm doing wrong, it seems simple I just add the Test input with a different number, but it won't work.

    Ask any other question you can think of. I followed the same controls on both spoke routers so that it seems that it would be in the hub, router, but he beat me as to why.

    Thanks for the help.

    Concentrator, router:

    ----------------------------------------------------------------------------------------------------------------------------------------------

    R1 #sh card crypto

    1 test card crypto ipsec-isakmp

    Peer = 192.168.2.2

    Expand the IP 110 access list

    access ip-list 110 permit a whole

    Current counterpart: 192.168.2.2

    Life safety association: 4608000 kilobytes / 86400 seconds

    PFS (Y/N): N

    Transform sets = {}

    Test,

    }

    Interfaces using crypto sheet test:

    FastEthernet0/0

    2 ipsec-isakmp crypto map test

    Peer = 192.168.2.3

    Expand the IP 110 access list

    access ip-list 110 permit a whole

    Current counterpart: 192.168.2.3

    Life safety association: 4608000 kilobytes / 86400 seconds

    PFS (Y/N): N

    Transform sets = {}

    Test,

    }

    Interfaces using crypto sheet test:

    FastEthernet0/0

    ---------------------------------------------------------------------------------------------------------------------------------------------

    R2 #sh card crypto

    1 test card crypto ipsec-isakmp

    Peer = 192.168.2.1

    Expand the IP 110 access list

    access ip-list 110 permit a whole

    Current counterpart: 192.168.2.1

    Life safety association: 4608000 kilobytes / 86400 seconds

    PFS (Y/N): N

    Transform sets = {}

    Test,

    }

    Interfaces using crypto sheet test:

    FastEthernet0/0

    ----------------------------------------------------------------------------------------------------------------------------------------------

    R3 #sh card crypto

    1 test card crypto ipsec-isakmp

    Peer = 192.168.2.1

    Expand the IP 110 access list

    access ip-list 110 permit a whole

    Current counterpart: 192.168.2.1

    Life safety association: 4608000 kilobytes / 86400 seconds

    PFS (Y/N): N

    Transform sets = {}

    Test,

    }

    Interfaces using crypto sheet test:

    FastEthernet0/0

    There is a typing error in the IP for the PSK on R3.

    --
    Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
    http://www.Kiva.org/invitedBy/karsteni

  • DES/3DES license needed for the PIX 515 active/active configuration.

    Hello

    I am setting up two PIX active/active.

    My problem is that the PIX without restrictions, the 3DES activated license but the FO - AA that just the license OF.

    I would like to know if it is possible to downgrade the 3DES to just unlimited license OF (I know that the alternative would be to upgrade the FO - AA 3DES but I don't need this license).

    Thank you.

    Javier,

    You can get FREE 3DES/AES license of Cisco for your PIX, go here:

    http://www.Cisco.com/en/us/products/sw/secursw/ps2120/products_product_index09186a00801bc3ec.html

    Hope this helps and please note post if it isn't.

    Jay

  • Ping on the PIX firewall

    Is it possible to ping directly from low security high security without translations on a PIX?

    For example, 192.168.2.90 is currently natted to 10.0.0.4 by the pix. I want to ping directly from 192.168.2.4 to 10.0.0.4.

    I can certainly ping directly from 10.0.0.4 to 192.168.2.4.

    Please let me know if you would like to see the complete config.

    I hope I understand your question completely. You try to ping from one interface to another on your PIX. This URL explains how this can be done.

    http://www.Cisco.com/warp/public/110/31.html

  • PIX VPN problem!

    Hello

    I have currently having problem with vpn, the pix pix506e works fine yesterday, but today morning that the problem appears, the pix did more than 2 connections vpn client, if the user connected, user B will cut this time... If the user B, user A logs off, I write erase config and rebuild again with the base, but still the problem occurs, what could be the problem, software or... material? Here I am attaching my beginning of basic config and vpn client connection.

    Our network is down now... Help, please.

    118 17:07:12.460 12/16/04 Sev = Info/6 IKE/0x6300003D

    Sending DPD asks 218.xxx.xxx.161, seq # = 1257657895

    119 17:07:12.460 12/16/04 Sev = Info/4 IKE / 0 x 63000013

    SEND to > ISAKMP OAK INFO * (HASH, NOTIFY: DPD_REQUEST) to 218.xxx.xxx.161

    120 17:07:17.468 16/12/04 Sev = Info/6 IKE/0x6300003D

    Sending DPD asks 218.xxx.xxx.161, seq # = 1257657896

    121 17:07:17.468 16/12/04 Sev = Info/4 IKE / 0 x 63000013

    SEND to > ISAKMP OAK INFO * (HASH, NOTIFY: DPD_REQUEST) to 218.xxx.xxx.161

    122 17:07:22.475 12/16/04 Sev = Info/4 IKE / 0 x 63000013

    SEND to > ISAKMP OAK INFO *(HASH, DEL) to 218.xxx.xxx.161

    123 17:07:22.475 12/16/04 Sev = Info/5 IKE / 0 x 63000018

    Deleting IPsec security association: (OUTBOUND SPI = 695320B 5 SPI INCOMING = F0A2471)

    124 17:07:22.475 12/16/04 Sev = Info/4 IKE / 0 x 63000048

    IPsec security association negotiation made scrapped, MsgID = 7A8F1E11

    125 17:07:22.475 12/16/04 Sev = Info/4 IKE / 0 x 63000017

    Marking of IKE SA delete (I_Cookie = BAF3D743B1D25DD6 R_Cookie = ED5BAEF920BA3244) reason = DEL_REASON_PEER_NOT_RESPONDING

    126 17:07:22.475 12/16/04 Sev = Info/4 IKE / 0 x 63000013

    SEND to > ISAKMP OAK INFO *(HASH, DEL) to 218.xxx.xxx.161

    127 17:07:22.475 12/16/04 Sev = Info/4 IPSEC / 0 x 63700013

    Delete the internal key with SPI = 0x71240a0f

    128 17:07:22.475 12/16/04 Sev = Info/4 IPSEC/0x6370000C

    Key removed by SPI 0x71240a0f

    129 17:07:22.475 12/16/04 Sev = Info/4 IPSEC / 0 x 63700013

    Delete the internal key with SPI = 0xb5205369

    130 17:07:22.475 16/12/04 Sev = Info/4 IPSEC/0x6370000C

    Key removed by SPI 0xb5205369

    131 17:07:22.986 12/16/04 Sev = Info/4 IKE/0x6300004A

    IKE negotiation to throw HIS (I_Cookie = BAF3D743B1D25DD6 R_Cookie = ED5BAEF920BA3244) reason = DEL_REASON_PEER_NOT_RESPONDING

    132 17:07:22.986 12/16/04 Sev = Info/4 CM / 0 x 63100013

    ITS phase 1 deleted because of DEL_REASON_PEER_NOT_RESPONDING. 0 ITS phase 1 currently in the system

    133 17:07:22.996 16/12/04 Sev = Info/5 CM / 0 x 63100025

    Initializing CVPNDrv

    134 17:07:23.106 12/16/04 Sev = Info/6 CM / 0 x 63100031

    Head of network device tunnel 218.xxx.xxx.161 disconnected: duration: 0 days 0:16:44

    135 17:07:23.286 16/12/04 Sev = Info/4 IKE / 0 x 63000001

    Signal received IKE to complete the VPN connection

    138 17:07:23.316 12/16/04 Sev = Info/6 CM / 0 x 63100037

    The routing table was returned to the original state before virtual card

    139 17:07:25.649 12/16/04 Sev = Info/4 CM / 0 x 63100035

    The virtual adapter has been disabled

    140 17:07:25.699 16/12/04 Sev = Info/4 IKE / 0 x 63000085

    Service Microsoft's IPSec Policy Agent started successfully

    141 17:07:25.699 16/12/04 Sev = Info/4 IPSEC / 0 x 63700014

    Remove all keys

    142 17:07:25.699 16/12/04 Sev = Info/4 IPSEC / 0 x 63700014

    Remove all keys

    143 17:07:25.699 12/16/04 Sev = Info/4 IPSEC / 0 x 63700014

    Remove all keys

    144 17:07:25.699 12/16/04 Sev = Info/4 IPSEC/0x6370000A

    IPSec driver successfully stopped

    Thank you

    Tonny

    In your PIX, enter the following command:

    ISAKMP nat-traversal

  • ASA 5505 9.1 Unable to ping inside the IPSec VPN network

    To give some background that the asa has been reloaded and upgranded from 8.2 to 9.1.  I am able to connect to vpn, but unable to reach anything inside, including of the asa.  I didn't unfortunately not much experience with 8.3 +, but I thought that I had nat made appropriately.  Nothing else is currently configured for the asa, as it's just an asa test currently, so I could of just missed something odvious.

    ASA Version 9.1 (3)

    !

    hostname testasa

    activate the encrypted password of Ry5/Pmodu2QL1Xe3

    volatile xlate deny tcp any4 any4

    volatile xlate deny tcp any4 any6

    volatile xlate deny tcp any6 any4

    volatile xlate deny tcp any6 any6

    volatile xlate deny udp any4 any4 eq field

    volatile xlate deny udp any4 any6 eq field

    volatile xlate deny udp any6 any4 eq field

    volatile xlate deny udp any6 any6 eq field

    names of

    mask 192.168.3.1 - 192.168.3.200 255.255.255.0 IP local pool VPNPool

    !

    interface Ethernet0/0

    !

    interface Ethernet0/1

    switchport access vlan 2

    !

    interface Ethernet0/2

    switchport access vlan 2

    !

    interface Ethernet0/3

    switchport access vlan 2

    !

    interface Ethernet0/4

    switchport access vlan 2

    !

    interface Ethernet0/5

    switchport access vlan 2

    !

    interface Ethernet0/6

    switchport access vlan 2

    !

    interface Ethernet0/7

    switchport access vlan 2

    !

    interface Vlan1

    nameif outside

    security-level 0

    IP address dhcp setroute

    !

    interface Vlan2

    nameif inside

    security-level 100

    IP 192.168.2.252 255.255.255.0

    !

    passive FTP mode

    network of the NETWORK_OBJ_192.168.2.0_24 object

    Subnet 192.168.2.0 255.255.255.0

    network of the NETWORK_OBJ_192.168.3.0_24 object

    subnet 192.168.3.0 255.255.255.0

    network of object obj-Interior

    Subnet 192.168.2.0 255.255.255.0

    object obj - vpn network

    subnet 192.168.3.0 255.255.255.0

    VPNGroup_splitTunnelAcl list standard access allowed 192.168.2.0 255.255.255.0

    pager lines 24

    Enable logging

    asdm of logging of information

    Outside 1500 MTU

    Within 1500 MTU

    no failover

    ICMP unreachable rate-limit 1 burst-size 1

    don't allow no asdm history

    ARP timeout 14400

    no permit-nonconnected arp

    NAT (inside, outside) static source inside obj obj-indoor destination static obj - vpn obj - vpn

    !

    NAT source auto after (indoor, outdoor) dynamic one interface

    Timeout xlate 03:00

    Pat-xlate timeout 0:00:30

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    identity of the user by default-domain LOCAL

    Enable http server

    http 192.168.2.0 255.255.255.0 inside

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start

    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac

    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec pmtu aging infinite - the security association

    Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    outside_map interface card crypto outside

    trustpool crypto ca policy

    Crypto ikev1 allow outside

    IKEv1 crypto policy 10

    authentication crack

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 20

    authentication rsa - sig

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 30

    preshared authentication

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 40

    authentication crack

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 50

    authentication rsa - sig

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 60

    preshared authentication

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 70

    authentication crack

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 80

    authentication rsa - sig

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 90

    preshared authentication

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 100

    authentication crack

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 110

    authentication rsa - sig

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 120

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 130

    authentication crack

    the Encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 140

    authentication rsa - sig

    the Encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 150

    preshared authentication

    the Encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 65535

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    Telnet timeout 5

    SSH timeout 5

    SSH group dh-Group1-sha1 key exchange

    Console timeout 0

    interface ID client DHCP-client to the outside

    dhcpd address 192.168.2.50 - 192.168.2.100 inside

    dhcpd dns 208.67.222.222 198.153.192.40 interface inside

    dhcpd allow inside

    !

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    AnyConnect essentials

    internal VPNGroup group strategy

    Group Policy attributes VPNGroup

    value of server DNS 208.67.222.222 198.153.192.40

    Ikev1 VPN-tunnel-Protocol

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list VPNGroup_splitTunnelAcl

    disable the split-tunnel-all dns

    no method of MSIE-proxy-proxy

    VLAN no

    NAC settings no

    test I9znLlryc6yq.BN4 encrypted privilege 15 password username

    tunnel-group VPNGroup type remote access

    attributes global-tunnel-group VPNGroup

    address pool VPNPool

    Group Policy - by default-VPNGroup

    IPSec-attributes tunnel-group VPNGroup

    IKEv1 pre-shared-key *.

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    Review the ip options

    inspect the netbios

    inspect the rsh

    inspect the rtsp

    inspect the skinny

    inspect esmtp

    inspect sqlnet

    inspect sunrpc

    inspect the tftp

    inspect the sip

    inspect xdmcp

    inspect the icmp

    inspect the icmp error

    !

    global service-policy global_policy

    context of prompt hostname

    Hello

    To be honest, I can't see anything in the configuration that should be a problem.

    Your NAT settings seem to be correct.

    You have the global setting of "sysopt connection permit - vpn" who does not appear in this form in the CLI configuration. This configuration means essentially that the SAA would allow traffic from a VPN connection to work around interface ACL of the interface when the VPN connection is completed (outside)

    Your ACL Split Tunnel is also correct.

    You might connect with VPN Client and run a continuous ICMP to a host of LAN and provide an output of the following command after a the ICMP has run a few seconds

    Crypto ipsec to show his

    Should see the counters of VPN.

    You can also try adding

    management-access inside

    This should allowed you to the 'internal' to the ASA IP ICMP and also manage ASA through the VPN connection by using the 'internal' the IP address provided you have enabled it. But for this you need to change the configuration of "nat" in this

    NAT (inside, outside) static source inside obj obj-indoor destination static obj - vpn vpn-obj-research route

    Hope this helps

    -Jouni

  • Western Digital IcePack for the SSD mounting: problem to share

    I liked the sled of adapter form factor of 2.5 to 3.5 Western Digital IcePack for my converted Momentus XT 500 GB disks hard/Intel SSD 2.5 "for proper installation in HP xw workstations.  Most of the jobs that I use have the standard plastic 3.5 "drive green HP monte that slide in case channels meant for this.  See PDF attached on the ice.  They are very solid and well built.

    It turns out that are the two colors of the interface... red and green circuit board. Green only those that I have seen include a molded projection that is supposed to interface with a cavity on the back of some disks 2,5 "hard, that allows the transfer of the drive jumper pins hard interface in the background of the ice SATA connector (which is exposed for easy access, therefore).

    I received only of briquettes with PCB red until today, and those who have not had this projection at the end of disk 2.5 "interface.

    My SSD intel is not riders and so no mating recess and therefore not necessary for this part of the interface, but they cannot drag on the projection as a result.  My 'red' briquettes version would accept the SSD and 2.5 "hard drives with a jumper pin recess in all circumstances (but not be able to allow the manipulation of rider to end exposed sea ice).  My "green version" briquettes will can return disks 2.5 "with the cavity of jumper pin into the rear end of the car itself.

    So, for me, red is the only type I want.  I did not use jumpers on the drives for years...  If you buy a guy on eBay who these new Western Digital be sure to communicate your needs for the Red version.  It is obvious through the sealed bags of mylar.

    Scott

    CHANGE > > > > > > see below... There is actually a few briquettes with PCB being red and have the projection causing trouble, too, but they seem to be a small minority.

    I've seen 2 WD briquettes with the Green circuit board, and each of them has had this additional projection that interferes with my Intel SSD to slip in the correct position.  You can see in the pictures that "bottom basket' of the SSD Intel a flower metal where the hard drive has a"container"recessed in the same region to take account of this protrusion.

    I checked all my Velociraptors currently here, which are 2.5 "hard disks that are mounted on the plateau of the Western Digital factory.  All those who have red cards (without projection).  This is despite the fact that make Velociraptor hard drives have the recess that would accept the projection, as does the 2.5 "hard drive shown in the first photo attached.  Thus, it seems that for the WD Velociraptors does not feel the need to provide this Green type of physical interface.

    The hard drives with the recess for the projection of mesh with the Green type perfectly, but they are also perfectly on the type of red.  So, for me, I would call the "universal" type red

    If they make a red PCB with the offending projection included is something I can't answer otherwise that to tell you I have never seen one of these and have used over 20 Red types so far.

    CHANGE > > > > > > > > > visitor, below, found a specific example of an ice floe that has a red PCB and a drive to interface with the projection.  Thus, they exist but appear to be a small minority.  See my last post on how to avoid the problem.

    Keep us informed if learn you more, take a look at the attached pictures.

  • I FOUND THE SOLUTION FOR THE TX WIRELESS PROBLEM!

    Hi guys,.

    IM pretty happy problem because I found the solution for my tx 1219 us wireless!

    First of all, my laptop started with wifi problems. Then, when I tried to start, nothing has been posted.

    I read a lot of posts on forums that talking about changing the motherboard by HP.

    I sent my knees to HP in Argentina - where i live - and they had sent me a budget with a «renewed» system map

    I was paying, so I pretend a new.

    Tired and frustrated on the HP customer service: they dosen´t recognize their mistake. They dosen´t give me GUARANTEE AND they pretend a lot of money for something refurbished!

    I found a post where a guy - now away for me is 'God' - explains how to fix this problem yourself! AND a lot of positions where other guys did, and they confirm that it works!

    Here's the method. Feel happy!

    This post is for the repair of the range of following HP laptop: tx1000, dv2000, dv6000, dv9000, with AMD processors and graphic chips from nvidia (6150go).
    Symptoms are more, wireless wireless card are running out, are repeatedly, the laptop, it does not ignite until several attempts and finally the laptop turns on but he did not have no image in the monitor, in some models, you listen to some sounds.

    The cause is excessive overheating of the GPU from nvidia, which has powered up to 100 degrees or but tends to fail the welds that unite it to the mother of the card.
    HP already admitted the existence of the failure in the design of the card, and extended 2-year warranty, so that if even you can demand but the desirable thing is to do, the method I describe is simple and has worked in 100% of those laptop with this problem, prefer all must do it under your own risk.

    Step 1. -It is necessary to compile the necessary material: this is a 1-cent American copper currency or a currency that similar thickness now about a 1/16 of an inch, or a piece with these features, but the copper. also we will need a table lamp with a halogen centre, or the one with the normal centres but it is 150W or but case is that it heats up a lot. disipadora thermal paste of what they take microprocessors (sold at any electronics store).

    step 2. -Once gathered our components, it is necessary to remove the mother card and remove the radiator so that they are exposed to the microprocessor and the nvidia chip.

    Step 3. -Now, we are committed to the lamp, started to warm up a while, in my case I have tapeworm a gun to measure temperatures and saw that it was 134 degrees, once it is hot we close set, but the thing at latest, the graphics chip, but on the other hand, where all the solder points are seen We leave about 5 minutes, which were both that I gave him, no doubt, it can be less, depending on the source of heat, once that done this we have pressed with the fingers with force the graphics chip (care, it will be hot), which will be expanded by heat welding is to merge.

    Step 4. -Now, we put a little disipadora in the room by both parties and we placed on the graphics chip and put the radiator and arm!

    It is with the intention of wrong correct dissipation system design since the heat produced by the chip is transferred to the coin in copper.

    Copper is an excellent conductor of heat and thus provide the heatsink of makes, initially was clearly a very small between the radiator and the chip and when warm itself does not transfer not warmth to any party since not thanks to the air, it can, but the copper coins made this work

    Greetings

    Message edited by Wendy on 30/04/2009 21:02

    Please see the procedure on YouTube

    http://www.YouTube.com/watch?v=musu759LsT4

    Message edited by Wendy on 30/04/2009 21:02

  • Friday for the nerd CS problem

    I stumbled on what is probably a common problem and thought that some of super nerds here might have fun with this question:

    take a (ascending) table of arbitrary values... that is to say {1,2,3,5,8,12,16}

    now for any desired value, return a subset of table of values that SUM to the desired value. Elements can only be used once, obviously there are several solutions. As for the table above 8 would have 2 solutions: {3,5} or {8}.

    My particular problem was not as arbitrary, so I was able to use a combination of thresholding and number to Boolean matrix to determine the value.

    My instinct tells me to nested loops would work but messy, maybe a form any recursion could be better, or is there a way to solve this problem with a linear system.

    Any thoughts?

    It's the classic CS Knapsack Problem.

    I guess a solution like this: put the element next to the table in the 'bag', as well as the index of this item. Then, you have three options:

    -The sum of the cover is lower than the target. If so, increment the index table and repeat.

    -The sum of the cover is equal to the goal. Add to the list of solutions, empty the bag, add to the index of the first element that was in the bag and repeat.

    -The sum is greater than the objective. Remove the most recently added element, increment the index and repeat. If at the end of the list, remove the item next-most recently-added, increment its index and repeat.

    If I have time later or over the weekend, maybe I'll post real code.

  • global variables for the XML plugin problem

    Hello world

    recently I started working on a dialog box SOUTH, where the user can load the *.xml files in DIAdem.So much my code for the button looks like this:

    ....

    Call the FileNameGet ('ALL', 'FileRead","*.xml")
    Call DataFileLoad (FileDlgName, "XML_Plugin", "Load")

    ....

    And I must say that it works very well! I am able to load all listed in the devices file. BUT when I tried a number of loading devices, I used a global variable, that I defined in the vbscript file that I load the SOUTH since, I've noticed that global variables, I've defined with GlobalDim are not defined in the vbs.:mansurprised of XML_Pluging:

    Then I started to experiment and so far without success, no matter where I define global variables, in my plugin *.xml all not defined! The native commands even and DIAdem functrions does not work. If I run the script in tiara, it shows no errors, but when I use the plugin to open a file, then it gives an error. For example, MsgBox is not allowed.

    I used the plugin example for *.xml, which was published on the Web site of NOR, and I made a few changes. But overall I have it has not corrupted and I kept the same structure:

    Void ReadStore (File)

    Dim XmlFile: xmlFile = File.Info.FullPath
    '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
    'open the file '.
    OpenXMLFile xmlFile

    End Sub

    Void OpenXMLFile (xmlFile)
    '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
    ' Open MS - Xml Parser
    'Create the ActiveX object for the Microsoft XML parser.
    Dim XDoc: set xDoc = CreateObject ("MSXML2. DOMDocument.3.0")

    "Try to load the XML document
    If xDoc.Load (xmlFile) = False Then
    "Failed to load the document XML.
    RaiseError ' unable to load XML document!
    End If

    protected originalLocale: originalLocale = Getlocalte
    "SetLocale" en - us ".

    "The XML document loaded successfully!
    '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''

    '----------------------------------------------
    "Read the header information.
    '----------------------------------------------

    Here, I have read some values of the header and then I loop on all devices present in the file!

    So basically I have two subroutines and that's all.

    SetLocale originalLocale

    End Sub

    So what I am doing wrong? Why global variables and other functions do not work. Is it because there is xml code in the script this way or it's a version problem?

    I use DIAdem 10.2. If I use global variables in other vbscripts, I use to draw curves for example I have no problem. Now I'm no *.xml code and no subroutines.

    I'd appreciate any solution that will make my *.xml plugin to work.

    Hi fscommand.

    It is expected all behavior.  Use XML, as all VBScript DataPlugins, runs in a separate VBScript host of the DIAdem VBScript host.  DIAdem VBScript host adds all global variables green and Red controls global to host Microsoft VBScript standard.  Use VBScript host has its own special abilities (file object, root object), but there is NO access to Globals green or red blanket orders in the reception of DIAdem VBScript.  Your SUDialog runs in a third host VBScript, which is separated from the other two and the other two are not capabilities (command SUDialog callback functions), but the SUDialog VBScript host and VBScript tiara share all global variables green and Red orders overall.

    Normally all blue VBScript commands are allowed in all 3 VBScripts hosts, but in the case of the DataPlugins MsgBox and InputBox functions were especially restrained because the dialogues could cause a lot of trouble with the DataFinder.  In fact, they have been allowed to 9.1 tiara which was the latest version of tiara for the DataFinder appear.

    So, why do you want to pass information between the XML use and tiara?  If you want to use to share information with DIAdem, then you should just expose every piece of information as a new property in the data portal, which can read and use the code VBScript DIAdem.  The path of the XML file is already available inside the use of XML.  What other information in the call VBScript DIAdem do you need to share with the use?

    Brad Turpin

    Tiara Product Support Engineer
    National Instruments

  • HP Pavilion Notebook 15-ab083T: laptop upgraded before even starting for the first time = problem?

    Hello!

    I recently bought this laptop with the intention to replace the hard drive (1 TB HDD 120 GB SSD), as well as upgrading the ram from 8 GB to 16 GB. The problem is that I have improved these things before you start for the first time. And now it complains that it cannot find a device boot, even when I insert a USB key with windows 10 iso on it. Or a cd with windows XP. He needs to have the HDD windows 8.1 original in it on first commissioning? It took a while to replace parts...

    Thanks in advance.

    That's very true, I used gparted before checking this again, and it was corrupted. Very well! I ended up installing windows 10 home using a free student license. It's perfect, since I have windows 8.1 before running on the 1 TB hard drive and it was filled with bloatware, thanks to HP (no offense). So, it is nice to have a clean install. Everything works fine now, I had to change some settings of 'Legacy Boot' in the bios to boot from the USB.

Maybe you are looking for