PIX and Anit-Virus

Hello

Can integrate us Trend micro or any software antivirus which is approved by cisco with PIX...?

Thanks in advance.

Regds

Anthony

Hi Anthony,.

Sorry for the late reply. I hope I understood your question.

If you think on the lines of the existing integration of PIX with Websence/N2H2 for url filtering, then, there is no such integration with AV software

Thank you

Christophe

Tags: Cisco Security

Similar Questions

  • Can someone guide me through the download anit-virus software?

    My school requires that I have download their anit-virus software to access my account and the site of the school.

    I took the steps to download the software and uninstall any anit-virus program. Before you go to the Helpdesk.

    I was wondering if someone could help me. I go to my computer downloads and click on the program, it is written 'save' or 'run '. I click on run and Windows tells me that the Publisher of the program is not identifiable, so I go to the site and he told me just to make sure its good, I keep on clicking then and it won't work. I've been locked out WiFi for about 2 weeks and I want to come back to him.

    Any suggestions? Thank you.

    Hello

    You have Windows Defender pre-packaged with Windows 8.  You have disabled and you uninstall software antivirus installed on the device?  (McAfee, Norton)  Use the product removal tool to make sure you have removed all traces of the software.

    http://answers.Microsoft.com/en-us/protect/wiki/MSE-protect_start/list-of-anti-malware-product-removal-tools/2bcb53f7-7ab4-4EF9-ab3a-6aebfa322f75

    What is the name of the software product you are trying to install?  Have you tried to go to safe mode with networking Mode to install the software?

    To enter safe mode with networking Mode, press the Windows key + R to open the run

    Type Msconfig > OK

    Click on the Startup tab

    Check secure boot

    Check the networking

    Click on apply, Ok

    Reboot and you'll enter Mode safe mode with networking

    Now try to install software or download a new copy of the software and select run

    When you are finished before you restart, return to Msconfig and uncheck safe startup.  Click Ok and restart.

    When you are finished before you restart the computer, go back to Msconfig and uncheck secure boot, click Ok and restart.

  • How to stop Security Center from microsoft that I have my own firewall and anti virus?

    Original title: Microsoft security center

    How to close the Security Center that I have my own firewall and anti virus?

    Hi waynejackson64,

    Follow these steps:

    (a) click Start, Control Panel, Security Center.

    (b) double click Firewall, and then select Disable the firewall.

    How can I turn on or turn off the firewall in Windows XP Service Pack 2 or later versions?

    http://support.Microsoft.com/kb/283673

  • Removed Artemis and false virus alerts, now no rundll32.exe

    I use Windows XP Home edition. For the past 2 days, I was receiving false alerts "XP Security Services" that my computer has been attacked. I used Stinger from McAfee and removed the fake alert virus and the virus of Artemis. However, now I have no rundll32.exe. I can't access MS Office, paint, and it does not recognize my CD/DVD drive. I don't have a Windows XP disk, the PC was already installed with it when I bought it. Any help would be appreciated.

    I use Windows XP Home edition. For the past 2 days, I was receiving false alerts "XP Security Services" that my computer has been attacked. I used Stinger from McAfee and removed the fake alert virus and the virus of Artemis. However, now I have no rundll32.exe. I can't access MS Office, paint, and it does not recognize my CD/DVD drive. I don't have a Windows XP disk, the PC was already installed with it when I bought it. Any help would be appreciated.

    Follow the instructions below.

    Click on the link below. Download the rundll32 file (uploaded by me if it's safer). Save the file to your desktop. Right-click on the file and choose copy. Now click on start > run > paste the following command. c:\Windows\System32 > Ok. When the folder opens, you see a message that these files are hidden. In the left pane, click on the link to view the contents of this folder, as shown in the image on the second link below. Once the content is visible, right-click in the free space in the system32 folder and choose Paste. If you are prompted to replace an existing file, click Yes. Close all windows.

    Click on start > run > type cmd > Ok. On the command line, right click and paste the following code exefile = assoc.exe > press ENTER. Close command prompt. Now try to open any executable file (a game or any application). Be advised, the file download will expire after 3 days. This is the result of the use of the free version of filemail.com.

    http://www.Filemail.com/DL.aspx?ID=EFJLQHHZPHSBIET

    http://img861.imageshack.us/i/hiddenFiles.jpg/

    Once you have completed the above steps, download, update and perform a quick scan with Malwarebytes. Remove any detected object. When you have completed this system clear all restore points and create a new one.

    Malwarebytes.org

    How to use Malwarebytes

  • Why my computer is slow with 80 GB and no virus

    Why my computer is slow with 80 GB and no virus

    Hello

    What antivirus/antispyware/security products do you have on the machine? Be one you ALREADY had on this
    machine, including those you have uninstalled (they leave leftovers behind which can cause strange problems).

    ----------------------------------------------------

    Follow these steps:

    Start - type this in the search box-> find COMMAND at the top and RIGHT CLICK – RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
    generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Also run CheckDisk, so we cannot exclude as much as possible of the corruption.
    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    ==========================================

    After the foregoing:

    How to troubleshoot a problem by performing a clean boot in Windows Vista
    http://support.Microsoft.com/kb/929135
    How to troubleshoot performance issues in Windows Vista
    http://support.Microsoft.com/kb/950685

    Optimize the performance of Microsoft Windows Vista
    http://support.Microsoft.com/kb/959062
    To see everything that is in charge of startup - wait a few minutes without doing anything - then right click on the task - bar
    The task manager - take a look at stored by - Services - process - it is a quick reference (if you have
    a small box in the lower-left - show for all users can check only).

    How to check and change Vista startup programs
    http://www.Vistax64.com/tutorials/79612-startup-programs-enable-disable.html

    A quick check to see that load method 2 is - using MSCONFIG and then display a list of the people here.
    --------------------------------------------------------------------

    Tools that should help you:

    Process Explorer - free - find out what are the files, registry keys and other objects processes have opened, the dll
    they loaded and much more. This exceptionally effective utility will show you even owned by each process.
    http://TechNet.Microsoft.com/en-us/Sysinternals/bb896653.aspx

    Autoruns - free - see what programs are configured to startup automatically when your system boots and you
    opening of session. Autoruns also shows you the full list of registry and file locations where applications can configure auto-
    start the settings.
    http://TechNet.Microsoft.com/en-us/sysinternals/bb963902.aspx
    Process Monitor - Free - monitor the system files, registry, process, thread and DLL real-time activity.
    http://TechNet.Microsoft.com/en-us/Sysinternals/bb896645.aspx

    There are many excellent free tools from Sysinternals
    http://TechNet.Microsoft.com/en-us/Sysinternals/default.aspx

    WhatsInStartUP - free - this utility displays the list of all applications that are loaded automatically when Windows
    starts. For each request, the following information is displayed: Startup Type (registry/Startup folder).
    The command - line String, product name, file Version, company name, location in the registry or the file system,
    and much more. It allows you to easily disable or remove unwanted programs that runs in your Windows startup.
    http://www.NirSoft.NET/utils/what_run_in_startup.html

    There are many excellent free tools to NirSoft
    http://www.NirSoft.NET/utils/index.html

    Window Watcher - free - do you know what is running on your computer? Maybe not. The window Watcher says it all, reporting of any window created by all running programs, if the window is visible or not.
    http://www.KarenWare.com/PowerTools/ptwinwatch.asp

    Many excellent free tools and an excellent newsletter at Karenware
    http://www.KarenWare.com/

    ===========================================

    Vista and Windows 7 updated drivers love then here's how update the most important.

    This is my generic how updates of appropriate driver:

    This utility, it is easy see which versions are loaded:

    -Free - DriverView utility displays the list of all device drivers currently loaded on your system. For
    each driver in the list, additional useful information is displayed: load address of the driver, description,.
    version, product name, company that created the driver and more.
    http://www.NirSoft.NET/utils/DriverView.html

    For drivers, visit manufacturer of emergency system and of the manufacturer of the device that are the most common.
    Control Panel - Device Manager - Display Adapter - note the brand and complete model of your
    video card - double - tab of the driver - write version information. Now click on UPdate Driver (this
    cannot do anything as MS is far behind the certification of drivers) - then do a right click - Uninstall - REBOOT
    This will refresh the driver stack.

    Repeat this for network - card (NIC), Wifi network, sound, mouse, and keyboard if 3rd party with their
    own the software and drivers and all other main drivers that you have.

    Now go to the site of the manufacturer of system (Dell, HP, Toshiba as examples) (restoration) and then of the manufacturer of the device
    (Realtek, Intel, Nvidia, ATI, for example) and get their latest versions. (Look for the BIOS, Chipset and software)
    updates on the site of the manufacturer of the system here.)

    Download - SAVE - go to where you put them - right click - RUN AD ADMIN - REBOOT after each installation.

    Always check in the Device Manager - tab drivers version you install actually shows up. This
    because some restore drivers before the most recent is installed (particularly that audio drivers) so install a
    pilot - reboot - check that it is installed and repeat if necessary.

    Repeat to the manufacturers - BTW on device at the DO NOT RUN THEIR SCANNER - manually check by model.

    Look at the sites of the manufacturer for drivers - and the manufacturer of the device manually.
    http://pcsupport.about.com/od/driverssupport/HT/driverdlmfgr.htm

    How to install a device driver in Vista Device Manager
    http://www.Vistax64.com/tutorials/193584-Device-Manager-install-driver.html

    If you update the drivers manually, then it's a good idea to disable the facilities of driver in the Windows updates,
    This leaves ONE of Windows updates, but it will not install the drivers who are generally older and cause
    questions. If updates offers a new driver and then hide it (right click on it) and then go look for new ones
    manually if you wish.

    How to disable automatic driver Installation in Windows Vista - drivers
    http://www.AddictiveTips.com/Windows-Tips/how-to-disable-automatic-driver-installation-in-Windows-Vista/
    http://TechNet.Microsoft.com/en-us/library/cc730606 (WS.10) .aspx

    Hope these helps.

    Rob - bicycle - Mark Twain said it is good.

  • PIX and ASA static, dynamic and RA VPN does not

    Hello

    I am facing a very interesting problem between a PIX 515 and an ASA 5510.

    The PIX is in HQ and has several dynamic VPN connections (around 130) and IPsec vpn remote works very well. I had to add a PIX to ASA L2L VPN static and it does not work as it is supposed to be. The ASA 5510, at the remote end, connects and rest for a small period of time, however, all other VPN connections stop working.

    The most interesting thing is that ASA is associated with the dynamic map and not the static map that I created (check by sh crypto ipsec his counterpart x.x.x.x). However, if I make any changes in the ACL 'ACL-Remote' it affects the tunnel between the PIX and ASA.

    Someone saw something like that?

    Here is more detailed information:

    HQ - IOS 8.0 (3) - PIX 515

    ASA 5510 - IOS 7.2 (3) - remote provider

    Several Huawei and Cisco routers dynamically connected via ADSL

    Several users remote access IPsec

    A VPN site-to site static between PIX and ASA - does not.

    Here is the config on the PIX:

    Crypto ipsec transform-set ESP-3DES-ESP-SHA-HMAC-IPSec esp-3des esp-sha-hmac

    Dyn - VPN game 100 Dynamics-card crypto transform-set ESP-3DES-ESP-SHA-HMAC-IPSec

    Crypto dynamic-map Dyn - VPN 100 the value reverse-road

    VPN - card 30 crypto card matches the ACL address / remote

    card crypto VPN-card 30 peers set 20 x. XX. XX. XX

    card crypto VPN-card 30 the transform-set ESP-3DES-ESP-SHA-HMAC-IPSec value

    VPN crypto card - 100 - isakmp dynamic Dyn - VPN ipsec

    interface card crypto VPN-card outside

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    md5 hash

    Group 2

    life 86400

    crypto ISAKMP policy 65535

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    access list ACL-remote ext ip 10.0.0.0 allow 255.255.255.0 192.168.1.0 255.255.255.0

    Thank you.

    Marcelo Pinheiro

    The problem is that the ASA has a crypto acl defined between host and network, while the remote end has to the network.

    Make sure that the acl is reversed.

  • PIX and NAT - T

    Hi all

    I have a small question. I have a couple of users who use routers to connect by VPN to our pix that authenticates by a RAY for L2TP connections. I enabled the NAT - T on our PIX and they may not always connect. Is there anything I might have missed. I checked most of the posts in this forum do not see anything else, I should have activated.

    Can anyone help?

    Thanks in advance.

    Michael

    A tunnel of Lan-to-Lan of a router in a PIX does not NAT - T, unless there is NAT devices between two end points. If this is the case, you must ensure that both the software both from the end of rehbeh points devices support this capability. An example of a router to tunnel PIX IPSec configuration is available at http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094498.shtml

    Another example that deals with the same configuration with NAT is available at

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a0080094a87.shtml

  • VPN between a PIX and a VPN 3000

    I'm trying to set up a VPN between PIX and a VPN 3000. All configurations are complete, but the tunnel has not been established. On the PIX, to 'see the crypto engine' and ' show isakmp his ' orders, I do not see the tunnel. Of "show ipsec his ' command, I can see the mistakes"#send"continues to increase when I try to connect to the remote network. Here is the copy - paste command:

    Tag crypto map: myvpnmap, local addr. 10.70.24.2

    local ident (addr, mask, prot, port): (10.70.24.128/255.255.255.128/0/0)

    Remote ident (addr, mask, prot, port): (10.96.0.0/255.224.0.0/0/0)

    current_peer: 10.70.16.5:0

    LICENCE, flags is {origin_is_acl},

    #pkts program: encrypt 0, #pkts: 0, #pkts 0 digest

    #pkts decaps: 0, #pkts decrypt: 0, #pkts check 0

    compressed #pkts: 0, unzipped #pkts: 0

    #pkts uncompressed: 0, #pkts compr. has failed: 0, #pkts decompress failed:

    #send 12, #recv errors 0

    local crypto endpt. : 10.70.24.2, remote Start crypto. : 10.70.16.5

    Path mtu 1500, fresh ipsec generals 0, media, mtu 1500

    current outbound SPI: 0

    SAS of the esp on arrival:

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:

    outgoing ah sas:

    outgoing CFP sas:

    Obviously, the PIX identifies protected traffic but failed to establish the tunnel. I was wondering what could be the reason for these kind of mistakes? That means them growing '#send errors?

    Thank you very much!

    Sending error mean simply the PIX is grateful to encrypt this traffic, but there is no built tunnel and so it must drop the package.

    you will need to look at why the tunnel is not under construction however, "sending error" are just a byproduct of some other configuration issue. On the PIX, it looks like you would have something like:

    Crypto ip 10.70.24.128 access list allow 255.255.255.128 10.96.0.0 255.224.0.0

    On the 3000 under the L2L section and the Local and remote network, you need the exact opposite of the latter, then it would be:

    / Local network mask = 10.96.0.0/0.31.255.255

    / Remote network mask = 10.70.24.128/0.0.0.127

    If you have something else the tunnel will fail to come. Otherwise, we see that the Cryptography debugs the PIX and the trunk of the 3000 when the tunnel is built.

  • Installation of site to site VPN IPSec using PIX and ASA

    / * Style definitions * / table. MsoNormalTable {mso-style-name : « Table Normal » ; mso-tstyle-rowband-taille : 0 ; mso-tstyle-colband-taille : 0 ; mso-style-noshow:yes ; mso-style-priorité : 99 ; mso-style-qformat:yes ; mso-style-parent : » « ;" mso-rembourrage-alt : 0 à 5.4pt 0 à 5.4pt ; mso-para-margin : 0 ; mso-para-marge-bottom : .0001pt ; mso-pagination : widow-orphelin ; police-taille : 11.0pt ; famille de police : « Calibri », « sans-serif » ; mso-ascii-font-family : Calibri ; mso-ascii-theme-font : minor-latin ; mso-fareast-font-family : « Times New Roman » ; mso-fareast-theme-font : minor-fareast ; mso-hansi-font-family : Calibri ; mso-hansi-theme-font : minor-latin ; mso-bidi-font-family : « Times New Roman » ; mso-bidi-theme-font : minor-bidi ;}

    I am a site configuration to site IPSec VPN using a PIX515E to site A and ASA5520 to Site B.

    I have attached the lab diagram. Consider PIX and ASA are in default configuration, which means that nothing is configured on both devices.

    According to the scheme

    ASA5520

    External interface is the level of security 11.11.10.1/248 0

    The inside interface is 172.16.9.2/24 security level 100

    Default route is 0.0.0.0 0.0.0.0 11.11.10.2 1

    PIX515E

    External interface is the level of security 123.123.10.2/248 0

    The inside interface is 172.16.10.1/24 security level 100

    Default route is 0.0.0.0 0.0.0.0 123.123.10.1 1

    / * Style definitions * / table. MsoNormalTable {mso-style-name : « Table Normal » ; mso-tstyle-rowband-taille : 0 ; mso-tstyle-colband-taille : 0 ; mso-style-noshow:yes ; mso-style-priorité : 99 ; mso-style-qformat:yes ; mso-style-parent : » « ;" mso-rembourrage-alt : 0 à 5.4pt 0 à 5.4pt ; mso-para-margin : 0 ; mso-para-marge-bottom : .0001pt ; mso-pagination : widow-orphelin ; police-taille : 11.0pt ; famille de police : « Calibri », « sans-serif » ; mso-ascii-font-family : Calibri ; mso-ascii-theme-font : minor-latin ; mso-fareast-font-family : « Times New Roman » ; mso-fareast-theme-font : minor-fareast ; mso-hansi-font-family : Calibri ; mso-hansi-theme-font : minor-latin ; mso-bidi-font-family : « Times New Roman » ; mso-bidi-theme-font : minor-bidi ;}

    Could someone tell me how to set up this configuration? I tried but didn't workout. Here is the IKE protocol I have used.

    IKE information:

    IKE Encrytion OF

    MD5 authentication method

    Diffie Helman Group 2

    Failure to life

    IPSEC information:

    IPsec encryption OF

    MD5 authentication method

    Failure to life

    Please enter the following command

    on asa

    Sysopt connection permit VPN

    on pix not sure of the syntax, I think it is

    Permitted connection ipsec sysopt

    What we are trying to do here is basically allowing vpn opening ports

    Alternatively you can open udp 500 and esp (or port ip 50) out to in on the two firewalls

  • PIX and non - IP traffic

    I need to install a PIX 501 in a network. The internal interface is connected to my local network and that the external interface is connected to e0 interface of the router.

    The LAN have LLC,(2) and IP traffic. Is possible to LLC,(2) traffic through the firewall without tunnel? Can I connected another interface on the router in the local network only to traffic ll2?

    Thank you

    The PIX only manages the IP traffic, so unless tyou can encapsulate your traffic IP LLC, the PIX won't touch it. I guess you can bypass the PIX and connect a LLC,(2) interface that is only on the router in your home network, depends on how secure you want to be. Make sure that you do not configure an IP address on the router interface, otherwise you will run the risk of someone circumvent security of PIX.

  • PIX and SSH - access to PIX via SSH

    Need help with PIX and SSH

    Objective: Connect to PIX via SSH from the 10.1.1.50 IP address behind inside the interface on the PIX using local aaa on PIX.

    Current settings:

    hostname pix1

    example.com domain name

    CA generates the key rsa 1024

    example username password abc123 privileges 15

    include authentication AAA ssh inside 10.1.1.50 255.255.255.255 local

    SSH 10.1.1.50 255.255.255.255 inside

    Thanks for any help!

    Try this:

    AAA-server local LOCAL Protocol

    the ssh LOCAL console AAA authentication

  • Site to Site VPN between PIX and Linksys RV042

    I am trying to create a tunnel between a 506th PIX and a Linksys RV042 vpn .  I configured the Phase 1 and Phase 2 as well as the transformation defined and interested traffic and connected to the external interface, but it will not create the tunnel.  Configurations are as follows:

    506th PIX running IOS 6.3

    part of pre authentication ISAKMP policy 40
    ISAKMP policy 40 cryptographic 3des
    ISAKMP policy 40 sha hash
    40 2 ISAKMP policy group
    ISAKMP duration strategy of life 40 86400
    ISAKMP key * address 96.10.xxx.xxx netmask 255.255.255.255
    access-list 101 permit ip 192.168.21.0 255.255.255.0 192.168.1.0 255.255.255.0crypto map Columbia_to_Office 10 ipsec-isakmp
    crypto Columbia_to_Office 10 card matches the address 101
    card crypto Columbia_to_Office 10 set peer 96.10.xxx.xxx
    10 Columbia_to_Office transform-set ESP-3DES-SHA crypto card game
    Columbia_to_Office interface card crypto outside

    Linksys RV042

    Configuration of local groups
    IP only
         IP address: 96.10.xxx.xxx
    Type of local Security group: subnet
    IP address: 192.168.1.0
    Subnet mask: 255.255.255.0

    Configuration of the remote control groups
    IP only
    IP address: 66.192.xxx.xxx
    Security remote control unit Type: subnet
    IP address: 192.168.21.0
    Subnet mask: 255.255.255.0

    IPSec configuration
    Input mode: IKE with preshared key
    Group Diffie-Hellman phase 1: group2
    Phase 1 encryption: 3DES
    Authentication of the phase 1: SHA1
    Life of ITS phase 1: 86400
       
    Phase2 encryption: 3DES
    Phase2 authentication: SHA1
    Phase2 life expectancy: 3600 seconds
    Pre-shared key *.

    I'm a novice on the VPN. Thanks in advance for your expertise.

    Yes, version PIX 6.3 does not support HS running nat or sh run crypto.

    Please please post the complete config if you don't mind.

    Please also try to send traffic between subnets 2 and get the output of:

    See the isa scream his

    See the ipsec scream his

  • Version 7.0 of the PIX and ASA 5500

    Hi all

    Is ASA 5500 series identical a PIX 515 or 525 or 535 with version 7.0... I still see some areas where it confused between version 7.0 of the PIX and ASA 5500 series... If not, what are the benefits of ASA 5500 on the PIX 7.0?

    ASA is not the same as PIX, ASA is different hardware architecture. Although both can run the same code. One of the benefits of the SAA is that you can have an IPS module in it to make the prevention of intrusions.

    Search for comprarison on CCO.

  • Router vpn site to site PIX and vpn client

    I have two on one interface on the pix vpn connections that terminate VPN. client vpn and VPN site-to-site have passed phase one and two and decrypt and encrypt the packets. However as in another post I can not ping through the l2l vpn. I checked this isn't a nat problem a nd two NAT 0 on the pix and the NAT on the router access lists work correctly.

    ISAKMP crypto RTR #show its
    IPv4 Crypto ISAKMP Security Association
    status of DST CBC State conn-id slot
    66.x.x.x 89.x.x.x QM_IDLE 2001 0 ACTIVE

    IPv6 Crypto ISAKMP Security Association

    local ident (addr, mask, prot, port): (192.168.2.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (192.168.10.0/255.255.255.0/0/0)
    current_peer 66.x.x.x port 500
    LICENCE, flags is {origin_is_acl},
    #pkts program: 23583, #pkts encrypt: 23583 #pkts digest: 23583
    #pkts decaps: 18236, #pkts decrypt: 18236, #pkts check: 18236
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    #send 40, #recv errors 0

    local crypto endpt. : 89.x.x.x, remote Start crypto. : 66.x.x.x
    Path mtu 1380, ip mtu 1380, ip mtu BID Dialer0
    current outbound SPI: 0xC4BAC5E (206285918)

    SAS of the esp on arrival:
    SPI: 0xD7848FB (225986811)
    transform: aes - esp esp-sha-hmac.
    running parameters = {Tunnel}
    Conn ID: 3, flow_id: Motorola SEC 1.0:3, card crypto: PIX_MAP
    calendar of his: service life remaining (k/s) key: (4573083/78319)
    Size IV: 16 bytes
    support for replay detection: Y
    Status: ACTIVE

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:
    SPI: 0xC4BAC5E (206285918)
    transform: aes - esp esp-sha-hmac.
    running parameters = {Tunnel}
    Conn ID: 4, flow_id: Motorola SEC 1.0:4, card crypto: PIX_MAP
    calendar of his: service life remaining (k/s) key: (4572001/78319)
    Size IV: 16 bytes
    support for replay detection: Y
    Status: ACTIVE

    outgoing ah sas:

    outgoing CFP sas:

    Expand the IP NAT access list
    10 deny ip 192.168.2.0 0.0.0.255 192.168.10.0 0.0.0.255 (21396 matches)
    20 permit ip 192.168.2.0 0.0.0.255 everything (362 matches)
    Expand the IP VPN_ACCESS access list
    10 permit ip 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255 (39724 matches)

    I looked on the internet and that it points to a routing error when packets are being encrypted and decrypted, but you can't do a ping on the binding. However when I test the connection I did not enter any of the static routes that networks are connected directly on each side of the pix and the router. any help would be a preciated as I think there's maybe something is blocking the ping to reach the internal network at the end of pix with a configured access list.

    is ping failure of the only thing between the site to site VPN? and assuming that all other traffic works fine since it decrypts and encrypts the packets.

    If it's just ping, then activate pls what follows on the PIX:

    If it is version 6.3 and below: fixup protocol icmp

    If it is version 7.0 and higher: select "inspect icmp" under your political map of the world.

    Config complete hand and on the other could help determine if it's a configuration problem or another problem.

  • break the link between the pix and sound

    Ugh I still don't know how to break the link between the pix and the sound in the timeline then of

    the sound and image are together. I know it of easy but have not yet found the way.

    Thank you everyone.

    Right-click on the clip and click 'Remove link' If you just want do temporarily, ALT click on the clip.

Maybe you are looking for