router to router 2821 encryption

How to secure this scenerio?

(1) site A has a 2821 router and an IP connection to the site C. 2821 on another organizations IP network.

(2) site B has a router 2821 with an MPLS connection at the site of the C-2821.

It's pretty easy to connect and get plain text connections and tunnels WILL work, but I'm leaving my network open to other agencies or MPLS service provider.

I think little flavor of encryption between routers with tunnels GRE routes real traffic.

Thank you in advance for recommendations and examples of config.

Hi Tod,

You can deploy a separate acl on the physical interface, which allows only the tunnel itself (udp/500 and esp). The ACL in the VTI would control the traffic through the tunnel.

Rgds,

MiKa

Tags: Cisco Security

Similar Questions

  • GDOI------GETVPN - GM of the router is not encrypted traffic

    Group Member (GM) router in a GDOI environment, is not having it is Netflow and Syslog traffic encrypted. Traffic comes from the loopback interface that is included in the ACL to the key server.

    All other traffic originating behind the GM router is encrypted.

    Any help?

    What debug commands could help pin point how this Netflow traffic is treated, compared to GDOI?

    Thanks in advance.

    NetFlow Traffic is not encrypted by default. There is a bug that cscef28662 filed demanding to implement this feature for netflow traffic as well.

  • How can I block others access to my wireless router?

    I have performance slow and even lose connections.  I have Comcast and they have suggested that it is 'noisy' of what they see on their end.  The technology said that he receives many complaints from users of wireless router.

    Hello

    Quote: "How can I block others access to my wireless router?

    By setting up the wireless router security encryption.

    Of the weaker for wireless security, more strong capacity is.

    No security
    Switch Off SSID (even has No Security. SSID can be sniffed easily even if it is turned off)
    MAC Filtering___ (Band Aid if nothing else is available, MAC number can be easily Spoofed).
    WEP64___ (Easy, "Break" by knowledgeable people).
    WEP128___ (a little more difficult to activate, but "Piraté" too).

    -------------------
    The three above are not considered safe.
    Safe starts here at WPA.
    -------------------

    WPA-PSK__(Very Hard to Break).

    WPA-AES__(Not functionally Breakable)

    WPA2___ (not functionally breakable).

    Note 1: WPA - AES the current interpretation level entry of WPA2.

    Note 2: If you use WinXP SP3 bellows and not updated, you need to download
    the WPA2 Microsoft's fix.

    Documentation of your devices (router wireless and computer wireless card) must indicate the type of security that is available with your wireless hardware.

    All devices MUST be set to the same level of security using the same password.
    Therefore, security must be set according to what is the best possible one of the wireless devices.

    I.e. even if most of your system may be able to be configured to the maximum with WPA2, but a device is able to be configured for maximum of the WEP Protocol, to the whole system must be configured to WEP.

    If you need more security and a device (such as a wireless card that can only do WEP) is now better security for the entire network, replace with a better device.

  • Proof of encryption for the DMVPN Tunnel

    I've been setting up VPN for a short time and Im trying to get a better

    understanding of mechanics.

    I configured DMVPN between a router HQ and two branches. Im running eigrp between routers by gre tunnel interfaces. I can see neighbors eigrp via the tunnel which is good. The part is Im trying to understand, I have not created any ACL and I seem to form relationships neighbor eigrp in the tunnels. If I ping or telnet from the HQ router to one of the branches, I assume that Im going through the tunnel and the traffic is encrypted. I would like to be able to prove and to see evidence.

    I have to have ACL is configured to tell the router what to encrypt? Or the fact that the tunnel has a profile applied crypto doesn't take care of it?

    I did a test and telneted from Headquarters to Division 1 to aid private addresses that were sent through the tunnel and then entered the command

    SH crypto ipsec his. My telnet source address is the closure of the router which is 172.22.3.1 I though I'd see 172.22.3.1 or 172.22.1.1 in the out command has turned down and I do not have that make me wonder if the traffic is being encryption. Maybe my configs are incorrect or I need a different show command?

    I have attached my router configs also. If someone could help understand me a little more it would be appreciated.

    Andy

    Lab-HQ-rtr #telnet 172.22.1.1 it's Branch1rtr
    172.22.1.1 by train... Open

    User access audit

    Username: andrewb
    Password:

    Lab-branch1-rtr #sh crypto ipsec his

    Interface: Tunnel0
    Tag crypto map: addr Tunnel0-head-0, local 50.50.50.1

    protégé of the vrf: (none)
    local ident (addr, mask, prot, port): (50.50.50.1/255.255.255.255/47/0) * thought I'd see the src and dst the telnet address *

    Remote ident (addr, mask, prot, port): (50.50.50.3/255.255.255.255/47/0)
    current_peer 50.50.50.3 port 500
    LICENCE, flags is {origin_is_acl},
    #pkts program: 14307, #pkts encrypt: 14307, #pkts digest: 14307
    #pkts decaps: 14286, #pkts decrypt: 14286, #pkts check: 14286
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    #send 24, #recv errors 0

    local crypto endpt. : 50.50.50.1, remote Start crypto. : 50.50.50.3
    Path mtu 1500, mtu 1500 ip, ip mtu IDB Serial0/0/0
    current outbound SPI: 0x61D48BA8 (1641319336)

    SAS of the esp on arrival:
    SPI: 0x555FD9F (89521567)
    transform: esp-3des esp-sha-hmac.
    running parameters = {Transport}
    Conn ID: 2037, flow_id: VPN:37 on board, card crypto: head-Tunnel0-0
    calendar of his: service life remaining (k/s) key: (4598507/3044)
    Size IV: 8 bytes
    support for replay detection: Y
    Status: ACTIVE

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:
    SPI: 0x61D48BA8 (1641319336)
    transform: esp-3des esp-sha-hmac.
    running parameters = {Transport}
    Conn ID: 2038, flow_id: VPN:38 on board, card crypto: head-Tunnel0-0
    calendar of his: service life remaining (k/s) key: (4598507/3033)
    Size IV: 8 bytes
    support for replay detection: Y
    Status: ACTIVE

    outgoing ah sas:

    outgoing CFP sas:
    Lab-branch1-rtr #.

    Lab-HQ-rtr #sh ip route
    C 50.50.50.0 is directly connected, Serial0/0/0
    172.22.0.0/16 is variably divided into subnets, 4 subnets, 2 masks
    C 172.22.3.1/32 is directly connected, Loopback0
    D 172.22.2.1/32 [90/2944000] via 192.168.254.2, 21:18:04, Tunnel0
    D 172.22.1.1/32 [90/2944000] via 192.168.254.1, 21:19, Tunnel0
    D 172.22.64.32/27 [90/2816256] via 192.168.254.2, 21:18:04, Tunnel0
    [90/2816256] via 192.168.254.1, 21:18:04, Tunnel0
    10.0.0.0/24 is divided into subnets, 5 subnets
    D 10.10.10.0 [90/2816256] via 192.168.254.1, 21:19, Tunnel0
    D 10.10.20.0 [90/2816256] via 192.168.254.1, 21:19, Tunnel0
    D 10.10.30.0 [90/2816256] via 192.168.254.2, 21:18:04, Tunnel0
    D 10.10.40.0 [90/2816256] via 192.168.254.2, 21:18:04, Tunnel0
    D 10.10.50.0 [90/2816256] via 192.168.254.1, 21:19:02, Tunnel0
    C 192.168.254.0/24 is directly connected, Tunnel0
    C 192.168.1.0/24 is directly connected, FastEthernet0/0

    IPv4 Crypto ISAKMP Security Association
    status of DST CBC State conn-id slot
    50.50.50.3 50.50.50.2 QM_IDLE 1002 ASSETS 0
    50.50.50.3 50.50.50.1 QM_IDLE 1001 ASSETS 0

    Hi Andy,.

    DMVPN will use routing to control this traffic will be encrypted. You can add ACLs as the regular crypto-plan to specify the traffic of interest, but which is not must have.

    When the traffic leaving the router, it will do the routing research first; If the next hop points on your tunnel interface and the traffic is encapsulated and encrypted; If the next hop points to another interface, the traffic will leave the router without encryption.

    ISAKMP SAs are built between your tunnel end points, as see you in the output of "show isakmp crypto his." You can check the traffic was encrypted or not by looking at the
    #pkts program: 14307, #pkts encrypt: 14307, #pkts digest: 14307
    #pkts decaps: 14286, #pkts decrypt: 14286, #pkts check: 14286

    If you really want to see the package, you can EXTEND it to a monitor station traffic.

    HTH,

    Lei Tian

  • Provided to the customer VPN encryption

    Hello world

    You must confirm if the PC user used RA of Cisco VPN to connect to the network of corp.

    Here IPSEC tunnel that is being built between the PC and router VPN encryption is provided by the Client VPN software to the right user data?

    Concerning

    Mahesh

    Remote access VPN clients negotiate the encryption based on the settings in the head of ASA line (or whatever the device puts an end to the corporate VPN remote access). It may be a SSL or IPSec method with other different parameters according to the configuration settings.

    Once a VPN session is established, the client software encapsulates the traffic goes the end head and decapsulating the received data using the negotiated parameters. The head of line did the same thing.

    Sent by Cisco Support technique iPad App

  • Hardware encryption

    Hello guys,.

    Is it possible to encrypt data flowing across the WAN link without establishing a VPN between sites?    If Yes please let me know what hardware can do this task

    I m asking this question because >

    We have a HQ existing with existing branches 20 connected to Headquarters through VPN connections via the internet cloud.  and we intend to throw 3 of internet link existing branches and give DATA-Link by microwave, so even if they are connected through microwave Datalink data that is passed between these 3 branches at HQ is not encrypted because we will not establish a vpn between the seat and the 3 - brs.  so here, we want to have some sort of router to encrypt data at the hardware level without the need to have the vpn link in place.

    You can use switch effect if you have the right equipment. See this matrix.

  • Expand the production VLAN behind ASA5510 to the remote site and 2821

    I have a 5510 ASA and here to contact one of the subnets behind this ASA out to my house which has a modem cable, a switch/router wireless and then behind that I have a router 2821.  I have read and it seems that L2TP can be the way to go, but can not find config examples.  Yet once again, I'd extend an and nail a permanent connection of one of VLAN in the production network to the bottom of my house using my cable modem and the 2821.  Examples of configuration would be very appreciated!  In addition, any recommendations for the IOS 2821 would be very appreciated.  Finally, the L2TP looks like how I need to go?  I enclose a very basic Visio diagram of what I'm trying to do.  Thank you, john

    You must L2TPv3.

    ASA does not support but will pass L2TPv3 borrowing.

    At work, you will need to add another router. L3 switches does not support it.

    The configuration of a router would be:

    Pseudowire-class test

    L2TPv3 encapsulation

    IP local interface loopback0 (this will be the source of the tunnel, can use any interface with the IP address access remote xconnect)

    !

    int fas0/0.30

    (do not put an ip address here)

    encapsulation dot1q 30

    pw-class xconnect X.X.X.X 1000 test

    X.X.X.X is the IP the remote router interface, it serves to "interface local ip" in the remote configuration

    Make sure that corresponds to 1000 (VC ID) on both sides

  • This is explained? (Help)

    6 Sep 05-2014 21:28:46   192.168.1.2 37071 199.195.xxx.xxx 37071 Dynamic translation TCP disassembly of any:192.168.1.2/37071 to Outside:199.195.xxx.xxx/37071 duration 0:00:31

    Hello

    I hope I can get this explained to me in simple terms so I understand what is happening. I thought that I had stated in my config that allowed all traffic of my internal networks to external networks, but my Active log is filled with packets are blocked and blocked. I'm just curious to know what is happening here. It is with UDP and TCP.

    Thank you!

    I have tons of them:

    6 Sep 05-2014 21:36:59   192.168.1.2 62608 199.195.xxx.xxx 62608 Built a dynamic UDP conversion of any:192.168.1.2/62608 to Outside:199.195.xxx.xxx/62608
    6 Sep 05-2014 21:36:59   199.195.xxx.x 53 192.168.1.2 62608 UDP connection disassembly 6952281 for Outside:199.195.xxx.x/53 for Inside:192.168.1.2/62608 duration 0: 00:00 152 bytes
    6 Sep 05-2014 21:36:58   10.10.1.2 63481 199.195.xxx.xxx 63481 Dynamic translation UDP disassembly of any:10.10.1.2/63481 to Outside:199.195.xxx.xxx/63481 duration 0:00:31

    The ASA config:

    ASA5510 # sh run
    : Saved
    :
    ASA Version 9.1 (4)
    !
    hostname ASA5510
    domain maladomini.int
    activate liqhNWIOSfzvir2g encrypted password
    volatile xlate deny tcp any4 any4
    volatile xlate deny tcp any4 any6
    volatile xlate deny tcp any6 any4
    volatile xlate deny tcp any6 any6
    volatile xlate deny udp any4 any4 eq field
    volatile xlate deny udp any4 any6 eq field
    volatile xlate deny udp any6 any4 eq field
    volatile xlate deny udp any6 any6 eq field
    liqhNWIchangedvir2g encrypted passwd
    names of
    DNS-guard
    !
    interface Ethernet0/0
    LAN Interface Description
    nameif inside
    security-level 100
    IP 10.10.1.1 255.255.255.252
    !
    interface Ethernet0/1
    Description of the WAN Interface
    nameif outside
    security-level 0
    IP address 199.195.xxx.x 255.255.255.240
    !
    interface Ethernet0/2
    DMZ description
    nameif DMZ
    security-level 100
    IP 10.10.0.1 255.255.255.252
    !
    interface Ethernet0/3
    VOIP description
    nameif VOIP
    security-level 100
    IP 10.10.2.1 255.255.255.252
    !
    interface Management0/0
    management only
    Shutdown
    nameif management
    security-level 0
    no ip address
    !
    boot system Disk0: / asa914 - k8.bin
    passive FTP mode
    DNS domain-lookup outside
    DNS server-group DefaultDNS
    Server name 199.195.xxx.x
    Server name 205.171.2.65
    Server name 205.171.3.65
    domain maladomini.int
    permit same-security-traffic inter-interface
    the ROUTER-2811 object network
    10.10.1.2 home
    the ROUTER-2821 object network
    Home 10.10.0.2
    network of the WEBCAM-01 object
    host 192.168.1.5
    the DNS SERVER object network
    host 192.168.1.2
    the ROUTER-3745 object network
    host 10.10.2.2
    network of the RDP - DC1 object
    host 192.168.1.2
    PAT-SOURCE network object-group
    object-network 10.10.1.0 255.255.255.252
    object-network 10.10.0.0 255.255.255.252
    network-object 10.10.2.0 255.255.255.252
    object-network 192.168.0.0 255.255.255.0
    object-network 172.16.10.0 255.255.255.0
    object-network 172.16.20.0 255.255.255.0
    object-network 128.162.1.0 255.255.255.0
    object-network 128.162.10.0 255.255.255.0
    object-network 128.162.20.0 255.255.255.0
    the DM_INLINE_NETWORK_2 object-group network
    network-host 98.22.xxx.xxx object
    the Outside_access_in object-group network
    object-group Protocol DM_INLINE_PROTOCOL_1
    object-protocol gre
    allow access-list of standard USERS 10.10.1.0 255.255.255.0
    Outside_access_in list extended access permit tcp host object eq ROUTER-2811 98.22.xxx.xx ssh
    Outside_access_in list extended access permit tcp host object eq ROUTER-2821 98.22.xxx.xx ssh
    Outside_access_in list extended access permit tcp host 98.22.xxx.xx interface outside eq https
    Outside_access_in list extended access permit tcp host object 98.22.xxx.xx WEBCAM-01 eq www
    access-list extended Outside_access_in permit tcp host 98.22.xxx.xx eq 3389 RDP - DC1 object
    IP 128.162.1.0 allow Access-list access-dmz-vlan1 extended 255.255.255.0 any
    Note access-list access dmz allow all traffic in DC1
    permit access-list extended access dmz ip 128.162.1.0 255.255.255.0 192.168.1.2 host
    Note dmz access list only allow DNS traffic to the DNS server
    permit access-list extended access dmz udp 128.162.1.0 255.255.255.0 192.168.1.2 host eq field
    Note to dmz-access access-list ICMP allow devices in DC
    permit access-list extended access dmz icmp 128.162.1.0 255.255.255.0 192.168.1.0 255.255.255.0
    pager lines 24
    Enable logging
    asdm of logging of information
    Within 1500 MTU
    Outside 1500 MTU
    management of MTU 1500
    MTU 1500 DMZ
    MTU 1500 VOIP
    ICMP unreachable rate-limit 1 burst-size 1
    ICMP deny everything outside
    ASDM image disk0: / asdm - 715.bin
    don't allow no asdm history
    ARP timeout 14400
    no permit-nonconnected arp
    !
    the ROUTER-2811 object network
    NAT (inside, outside) interface static tcp ssh 222 service
    the ROUTER-2821 object network
    NAT (DMZ, outside) static interface tcp ssh 2222 service
    network of the WEBCAM-01 object
    NAT (inside, outside) interface static tcp 8080 www service
    the ROUTER-3745 object network
    NAT (VOIP, outdoor) static interface service tcp ssh 2223
    network of the RDP - DC1 object
    NAT (inside, outside) interface static service tcp 3389 3389
    !
    NAT interface (it is, outside) the after-service automatic PAT-SOURCE dynamic source
    Access-group Outside_access_in in interface outside
    !
    router RIP
    10.0.0.0 network
    version 2
    No Auto-resume
    !
    Route outside 0.0.0.0 0.0.0.0 199.195.xxx.xxx 1
    Route inside 128.162.1.0 255.255.255.0 10.10.0.2 1
    Route inside 128.162.10.0 255.255.255.0 10.10.0.2 1
    Route inside 128.162.20.0 255.255.255.0 10.10.0.2 1
    Route inside 172.16.10.0 255.255.255.0 10.10.1.2 1
    Route inside 172.16.20.0 255.255.255.0 10.10.1.2 1
    Route inside 192.168.1.0 255.255.255.0 10.10.1.2 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    identity of the user by default-domain LOCAL
    the ssh LOCAL console AAA authentication
    Enable http server
    http 0.0.0.0 0.0.0.0 inside
    http 98.22.xxx.xxx 255.255.255.255 outside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec pmtu aging infinite - the security association
    trustpool crypto ca policy
    Telnet timeout 5
    SSH 0.0.0.0 0.0.0.0 inside
    SSH 98.22.xxx.xxx 255.255.255.255 outside
    SSH timeout 60
    SSH version 2
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    NTP server 24.56.178.140 prefer external source
    username redacted encrypted privilege 15
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns migrated_dns_map_1
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the migrated_dns_map_1 dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    inspect the icmp
    inspect the icmp error
    inspect the pptp
    !
    global service-policy global_policy
    context of prompt hostname
    no remote anonymous reporting call
    call-home
    Profile of CiscoTAC-1
    no active account
    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
    email address of destination [email protected] / * /
    destination-mode http transport
    Subscribe to alert-group diagnosis
    Subscribe to alert-group environment
    Subscribe to alert-group monthly periodic inventory
    monthly periodicals to subscribe to alert-group configuration
    daily periodic subscribe to alert-group telemetry
    aes encryption password
    Cryptochecksum:6f99e1277a392a926d04735c7f6a8c50
    : end

    You provided the log messages are NAT and messages from tell-establishment of connections, not blocks.

    They are a normal part of the firewall, clean the table xlate and connections once they have expired.

  • Portege M800-107 - weak WiFi signal

    You have a Portege M800 wireless problem? I have weak signal problem. This problem is specific or?

    Hello!

    To be honest, I think that you are off of the router if you have a weak signal.
    Have the latest driver WLAN and the BIOS?

    Check if the laptop and the router use the same WLAN standards and disable all security features in the router like encryption, the hidden SSID, MAC address filtering settings, firewall, etc.

    You have security software on your laptop? Disable it and test it again.

    Good bye

  • BRAVIA internet video link does not connect to the server

    I have a KDL-32xbr6 (Yes, it has a DMEX button on the remote control). Just buy a DMX - NV1. Connection is "by the book". The wireless bridge is a NetGear 3001 bought a month ago. This Wireless Bridge works fine when connected to a computer and has no trouble at all a link to my 4G version jetpack. This device has abundant speed and is used by other Bravia owners to access the internet. Yet, when it is connected to the DMX - NV1, the system cannot connect to the 'server' (some server that can be). I spent about 4 hours, spread over 3 days exceeding this ad nauseum with the online chat. And we continue to go right on the same things over and over again. DMX has so much power and network illumintated lights green. When accessing the network, the Green Network flashing. So, it IS out in the network. But after the timeout, it always comes with a message "configuration failed due to the delay" on the TV screen. (Which is exactly what it says - I don't remember the exact job right now). Instrumentation in settiings presents the new appropriate icons (internet video settings, etc.). So that part is OK. I did a system reset several times on television and DMX. I did the cold repowering (unplug, wait a minute, reconnect) of all devices several times. I even tried to delete the security on the router/modem encryption and went 'none' for a test, just in case there was some sort of encryption confusion. The system seems to be absolutely spot on, but when we try to make his connection to the 'server' it can do. And don't suggest even trying out an online software update, you must first be able to connect to 'server '. Has anyone experience this problem? It is quite a haruumpher. Driving me crazy. I'm sure it's something simple. But what is it? Thanks in advance for any help in this matter.

    Can you please answer back with the MAC address of the DMX - NV1. I would need to check the activity of the unit to try to find out what's wrong.

    Thank you.

  • No indication of traffic during the update of Windows

    Strange problem. When you use Windows update (via the notification system, not through IE) there is no or almost no indication of traffic: 1: progress bar and the text indicator (xx % AA) only get updates 2-3 times during a 23 MB download. This is new behavior, it will display each percent) 2: Network Monitor in systray give no idea that there are 3 inbound: Manager tasks, graphical network traffic gives no blip by updating 4: Comodo Firewall Traffic indicator and the active connections see nothing. But the download of the update and is installed later. Basically, other than a flashing light hard drive, I have more idea if the download of an update works (for the first 10 minutes, then the progress bar is updated and past at 10/11% or something, to 34, etc.). In addition, given that this problem occurred, update is horribly slow. My comp. is ONLY connected to my wireless router, WPA encryption. and no Bluetooth or other wireless adapter. Anyone? = Vista Home Premium SP1 ESET NOD32 AV Comodo Firewall 3.8... 477

    Hi girizano,
    Most of the time when you see weird things like that it's the 3rd-party addons like Firewall and intrusive antivirus software.

    I'm not saying that yours is, but that's where I would start to check to identify the problem. Matt
    Microsoft Answers Support Engineer
    Visit our Microsoft answers feedback Forum and let us know what you think.

  • Wireless HP5510 printer

    I hope someone can help I had my printer wireless for more than a year (now out of warranty) and two weeks, he ceased to connect to the computer, I've sent e-mails to HP, but the problem has not been resolved, here's what I said to HP (sorry if this is a bit long)

    1. for a few days on my Photosmart HP 5510, the wirless light flashes on and outside, and when I press on the screen is says not connected and I notice on my computer that says I can't scan, I tried to do all the things suggested in the troubleshooting without result page

    Troubleshooting: I first printed wirless network test results when I configured the printer by setting its parameters compatible with the wireless settings - PASS, no filtering router said-printer - PASS, channel - 1, security - PASS, so that one I printed today said for all of the above settings NOT RUN and security FAIL. On the top page it says your HP printer is also unable to connect to your wireless router. This may be caused by the following settings on your wireless router: 1) 802.11 only and 2) only WPA TKIP encryption. WKA-TKIP is no longer allowed for the new WiFi 802.11n certified devices because WPA - AES provides the enhanced security and then SOLUTION - change your router configuration encryption WPA - AES or WPA - AES or TKIP (also called mixed mode), then run the printers set up the wizard again. I have no idea how to do it all.
    At the bottom of the test result is said authentication type - WPA - PSK and encryption - Auto (AES or TKIP)?

    2.I click the wireless bottom right of my screen, then press activate it goes up to 4%, then stops.

    3. the situation is going from bad to worse, I have a laptop HP pavilion dv9000 and edition of Vista running Home premium, as well as all the other problems I had with the HP5510, blue
    Wirless light has stopped flashing altogether, so today, I uninstalled the printer and reinstalled with the CD, the WiFi lights not at all, so when I press the wireless icon the
    printer it says it is connected and shows my IP address, then when I try to print something it says that it cannot connect to the printer when I try to scan something it cannot yet find the printer.

    After having reinstalled the printer that was printed a sheet of test result of wireless network, at the top of the page it says no. PROBLEMS FOUND CONGRATULATIONS on a SUCCESSFUL INSTALLATION OF

    YOUR WIRELESS PRINTER. When I look at the map shows the diagnostic results - wireless - wireless on COL-wireless - PASS signal quality - EXCELLENT work.

    Under settings, it is said - the printer settings that are compatible with the wireless router configuration-, no low-pass filtering - PASS, channel - 1, security - PASS, so if the test report shows that everything works correctly

    Why can't print or scan anything.

    All the ideas from someone as to what the problem is, the 5510 can be connected to a bu computer USB cable

    Thanks Dave

    Use only the print and Scan doctor, when the wireless printer test all PASS. Another suggestion would be to reset you the router. Just unplug it for 10 seconds and plug it back in, and then try to connect at all.

    Yes, if all else fails, you can plug in USB.

  • I can't find the patch file for an update of the WPA password. Someone help me with this? Any help or clarity is appreciated. Maybe I'm going the wrong way? Thank you

    I use an old Dell XP Home Edition with SP2 preinstalled.  2 days ago at home, this laptop recognized and connected my network home wireless (802. 11 g Linksys). Today, at work, while sitting next to a wireless router, nothing (Mac Airport Extreme).  I use a Belkin Wireless card.  I'm not sure of the model of wireless card.  Laptop is older and I am afraid to remove the card, but I will if necessary.  Belkin Tech offers a WPA Librarians dwnld password to update my XP Op sys. She said that this update would allow my Sys OP to recognize an encrypted router WPA-2, which is how my work router is encrypted.

    HI Captben,

    The patch file the Belkin tech was referring to can be found here.

    http://www.Microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=009d8425-CE2B-47a4-ABEC-274845dc9e91

    I hope this helps! Shawn - Support Engineer - MCP, MCDST
    Microsoft Answers Support Engineer
    Visit our Microsoft answers feedback Forum and let us know what you think

  • WRT54GS: Pushing Easy Setup knocks out network

    I have 5 computers and an Xbox 360 on my wireless network.

    Everything works fine until I re-do one of my computers and I press the button to set up easy to connect to this computer and he knocks out all of my other computers and Xbox.

    How can I get those to reconnect?

    Alan

    (Mod Note: under the guidance of the compliance of the directive.)

    Pressing the button of HIS (Secure Easy Setup) on the router causes the router to generate a new SSID, affects the router WPA encryption, and generate a new key for WPA encryption.  When these settings are changed, it disconnected all of your other wireless devices.

    For all your wireless devices work, you will need to put them all to the same SSID, encryption method (WEP, WPA, WPA2) and encryption key.

    So you can assign all of your devices to the previous SSID, encryption and keys (as in option 1) method, or you can set all your devices on the new SSID, WPA, WPA key encryption encryption (as in option 2).  So, make your choice:

    (1) connect to the router and reset the SSID, encryption method and key encryption to their previous values.   In addition, the last wireless computer that you connected to the router - you will need to set to match the previous SSID, encryption method and key.

    OR (2) to connect to the router and enter your new SSID and the encryption key, go to each of your other wireless devices and then enter this info and set up for WPA encryption devices.

  • Using netflow ntop configuration

    Looking for advice on getting NTOP to work.  I have installed the app, can access.  I have configured my router 2821 with Netflow by the example of configuration, using the Internet as a source and the LAN onplus as the destination interface.  I do not use the port of LUN.  My NTOP Web page does not display anything, no packages, summary, etc. are all empty.  My router shows no error when I run "sh ip flow export.  What Miss me?

    Maybe that's it... you have to 'assets' the NTOP for Netflow plugin. Once it is activated, you will see the "peripheral NetFlow in the list of devices on the 'Global Taffic statistics' page. Don't forget to set the port in NTOP configuration in 2055 as well.

    Regarding ports LAN and LUN, the LAN port is eth0 and the port of LUN is eth1. These are just generic passive listening ports, and as a general rule, only the port 'eth1' is useful, when it is connected to a mirror/span on a switch/router port. None of them are useful for NetFlow.

    Robert

Maybe you are looking for

  • my phone is stuck on the load screen

    I was just on my phone and it glitches so I pressed the home page and lock button to restart and now it is stuck on the load with the apple logo screen, and I can't do anything else that turn it off but when I turn back goes back to the load up scree

  • 10.11.2 update does not completely load

    This may be the straw that broke the camel's back. I tried four times to upgrade to 10.11.2 and after half an hour and an equal amount of time restart whenever I get the message that the download was incomplete, cannot be verified or corrupt, please

  • a finger scrolling lost when upgraded to windows 10

    HP G72-259WM Notebook PC laptop using, upgrade to Windows 10 and now the Snaptics pointing device lose vertical scrolling with a finger.  It is checked and the scroll box shows ok.  He worked well with windows 7 Home Premium, before the upgrade. I wa

  • where can I find the icon for sound; and how do I get it on my desktop screen?

    I had an icon on my sound bar; He disappeared; where can I find and put it back on my desktop screen?

  • The ADF Table data validation and highlighting

    I have an ADF table, supported by a VO. Gets the data loaded from a spreadsheet file. There are some required columns marked with the required attribute. the columns do not get highlighted when loaded data are empty. How can I get auto table validate