show ip cache flow
Can we find if a stream is using tcp or udp by using the command 'sh ip cache flow? indicate here 06 and 11?
Routert #sh ip cache flow
Vl52 TE3/4 10.2.1.1 1.1.1.1 06 48 0017 8389
Vl59 192.168.1.1 Te3/4 10.2.2.2 11 b 007 007 b 0
Hello
The hexadecimal values for the upper layer protocol: 6 in hexadecimal is 6 in December and 11 in hex is 17 Dec
as you'll see here 6 = tcp and udp = 17
http://www.IANA.org/assignments/Protocol-numbers/Protocol-numbers.XML
Kind regards.
Alain
Remember messages useful rate.
Tags: Cisco Network
Similar Questions
-
Word 2007 toolbars icons not showing - icon Cache problem?
Announcement on behalf of my brother, he is using Word 2007 and is having a problem that when it opens, all the toolbars that are normally he presents, however, they have no icons.
For example, he can click on the white square where the B for "BOLD" should be and it works fine, however the B is not there, the same for every icon on the tool bar, there the dropdown list font size, but not the icon saying size etc. Since he knows not all icons on all toolbars out of heart he has trouble using the program now.
I was wondering if this could be a problem with the Office/Word icon Cache, but I don't have any idea how to solve this problem, in this case.
Hello
Check with the experts here: (re - ask your question in these groups)
Discussions in Word Application errors
http://www.Microsoft.com/Office/Community/en-us/default.mspx?DG=Microsoft.public.Word.application.errors&lang=en&CR=usOffice newsgroups
http://www.Microsoft.com/Office/Community/en-us/FlyoutOverview.mspxand here:
Microsoft.public.word.application.errors discussions
http://www.Microsoft.com/communities/newsgroups/list/en-us/default.aspx?DG=Microsoft.public.Word.application.errors&cat=en_us_f09268b3-8479-4cea-8037-d168d96833ac&lang=en&CR=usWelcome to Microsoft Discussion groups
http://www.Microsoft.com/communities/newsgroups/list/en-us/default.aspx?GUID=1A61081E-1F66-5F7F-B5BA-04767E55A63BI hope this helps.
Rob - bicycle - Mark Twain said it is good. -
after update to camera raw the photodownloader shows a blue flower no nef file
after update to camera raw, I tried to use photo downloader. No NEF files appear. They are replaced by a blue chart with a picture of a flower.
What is the
PhotoDownloader
-
Shared photos showing the data flow but it is off
Hello
My phone keeps telling that storage is almost full and when I went into settings - storage - and camera is that Shared Photo Stream uses 4 KB. I don't even have Shared Photo Stream active... anyone know how to find these photos or how to remove the data used? Thank you
Hello monkeyface0508,
Thank you for using communities of Apple Support. It is my understanding that photo stream is too much space on your iPhone 6 sec, even if you do not use. I know how valuable storage capacity can be on any device. I want to ensure that your data and storage are accurate.
Given that you have confirmed that the photo stream is turned off, I recommend you to restart the phone. This can solve many unexpected behaviours. Follow the steps below to restart.
- Press and hold the sleep/wake button until the Red slider appears.
- Drag the slider to turn off your device completely off.
- Once the device turns off, press and hold the sleep/wake button again until you see the Apple logo.
Restart your iPhone, iPad or iPod touch
In addition, check your Photos app to see if there is an album of Photo Stream shown. Please use the link below for more information on checking your storage space.
Check the storage on your iPhone, iPad and iPod touchHave a great day!
-
Hi team, Okay, so what we have observed in our network is that flow-export sometimes causes high interface utilization and as a workaround, we remove and re-add flow export commands. Now there are short burstd of traffic as well, so I want to add a condition where "burst happens 3 times in 60s, then trigger the event". As I cannot test in production router, so I am testing on a lab switch and there is not much traffic on it. txload/rxload is 1 and hence my applet looks like this: sw1-trn-mr3.hyd.shaw.net#sh run | b event manager event manager applet test authorization bypass event tag 1 interface name GigabitEthernet0/4 parameter txload entry-op ge entry-val 1 entry-type value exit-op lt exit-val 1 exit-type value poll-interval 10 event tag 2 interface name GigabitEthernet0/4 parameter rxload entry-op ge entry-val 1 entry-type value exit-op lt exit-val 1 exit-type value poll-interval 10 trigger occurs 3 period 60 correlate event 1 or event 2 action 1.1 cli command "enable" action 1.2 syslog msg "Interface utilization has risen again. " action 1.3 cli command "show proc cpu | append flash:test" action 1.4 cli command "show interface GigabitEthernet0/4 | append flash:test" action 1.6 cli command "show ip cache flow | append flash:test" action 1.7 cli command "show tech | append flash:test" action 2.2 cli command "no ip flow-export source GigabitEthernet0/4" action 2.3 cli command "no ip flow-export destination 192.168.1.1 2055" action 2.5 cli command "ip flow-export source GigabitEthernet0/4" action 2.6 cli command "ip flow-export destination 192.168.1.1 2055" action 2.9 cli command "end" ! end The thing is it does not work. I turned on debugs and I see this. Mar 3 15:30:46: fh_send_intf_fd_msg: msg_type=114 Mar 3 15:30:46: fh_send_intf_fd_msg: sval=0 Mar 3 15:30:46: fh_send_intf_fd_msg: msg_type=114 Mar 3 15:30:46: fh_send_intf_fd_msg: sval=0 Mar 3 15:30:54: fh_fd_intf_process_async Mar 3 15:30:54: fh_fd_intf_param_fetch:I/F=GigabitEthernet0/4 txload=1 Mar 3 15:30:54: intf_value_uint_compare:op1=1 op2=1 ret=TRUE Mar 3 15:30:54: intf_entry_value_check:Returning TRUE Mar 3 15:30:54: fh_fd_intf_event_match: re = 0x5849AA0, num_matches = 1 Mar 3 15:30:54: fh_fd_intf_start_poll_timer: start_t=10000 Mar 3 15:30:54: fh_fd_intf_process_poll_timer: update_t=0 Mar 3 15:30:54: fh_fd_intf_param_fetch:I/F=GigabitEthernet0/4 rxload=1 Mar 3 15:30:54: intf_value_uint_compare:op1=1 op2=1 ret=TRUE Mar 3 15:30:54: intf_entry_value_check:Returning TRUE Mar 3 15:30:54: fh_fd_intf_event_match: re = 0x56D793C, num_matches = 1 Mar 3 15:30:54: fh_fd_intf_start_poll_timer: start_t=10000 Mar 3 15:30:54: fh_fd_intf_process_poll_timer: update_t=0 Mar 3 15:30:54: fh_send_intf_fd_msg: msg_type=64 Mar 3 15:30:54: fh_send_intf_fd_msg: sval=63 Mar 3 15:30:54: fh_send_intf_fd_msg: msg_type=64 Mar 3 15:30:54: fh_send_intf_fd_msg: sval=0 Mar 3 15:31:04: fh_fd_intf_process_async Mar 3 15:31:04: fh_fd_intf_param_fetch:I/F=GigabitEthernet0/4 txload=1 Mar 3 15:31:04: intf_value_uint_compare:op1=1 op2=1 ret=FALSE Mar 3 15:31:04: intf_exit_value_check: re=0x5849AA0, returning=FALSE Mar 3 15:31:04: intf_exit_comb_check:Returning FALSE Mar 3 15:31:04: fh_fd_intf_event_match: re = 0x5849AA0, num_matches = 0 Mar 3 15:31:04: fh_fd_intf_start_poll_timer: start_t=10000 Mar 3 15:31:04: fh_fd_intf_process_poll_timer: update_t=0 Mar 3 15:31:04: fh_fd_intf_param_fetch:I/F=GigabitEthernet0/4 rxload=1 Mar 3 15:31:04: intf_value_uint_compare:op1=1 op2=1 ret=FALSE Mar 3 15:31:04: intf_exit_value_check: re=0x56D793C, returning=FALSE Mar 3 15:31:04: intf_exit_comb_check:Returning FALSE Mar 3 15:31:04: fh_fd_intf_event_match: re = 0x56D793C, num_matches = 0 Only the first time, it returns TRUE. After that, it returns FALSE always and hence the condition "trigger occurs 3 period 60" does not match and hence no event is triggered. Where am I going wrong? Appreciate your help on this.
Thanks.
You have a condition of release of ' lt 1. This means that the burden must fall below 1 until the event to rearm. In this case, it seems that the load is always 1, so you will not see the three events occur. You have to push some of the traffic through this interface to complete your test.
In addition, you are away:
Action 2.1, cli «config t» command
And probably, you will need to extend the first event with a maxrun parameter I am sure that this policy will have more than 20 seconds to run.
-
Hi ARSHAD,.
Posted by: albertobrivio - May 19, 2006, 8:11 am PST
I would like to know if in IOS environment command like "show conn" or "capture" normally available in the firewall PIX, so take a look at the passage of package source/destination address/port interface.
Concerning
Alberto Brivio
Alberto,
If you have IOS Firewall context, then you can get the output as
See IP inspect session details (if you have a firewall IOS configured and applied on the interface).
If you want to monitor all packets go out from the interface, you must check the technology "netflow".
Activate "penetration of ip stream" on the specific interface and then 'show ip cache flow' you will be able to see the flow of traffic.
If you are interested in some features like 'tcpdump' ability to sniff in IOS let me know as well.
Thanks and greetings
Arshad
-
Return VPN traffic flows do not on the tunnel
Hello.
I tried to find something on the internet for this problem, but am fails miserably. I guess I don't really understand how the cisco decides on the road.
In any case, I have a Cisco 837 which I use for internet access and to which I would like to be able to complete a VPN on. When I vpn (using vpnc in a Solaris box as it happens which is connected to the cisco ethernet interface), I can establish a VPN and when I ping a host on the inside, I see this package ping happen, however, the return package, the cisco 837 is trying to send via the public internet facing interface Dialer1 without encryption. I can't work for the life of me why.
(Also note: I can also establish a tunnel to the public internet, but again, I don't can not all traffic through the tunnel.) I guess I'm having the same problem, IE back of packages are not going where it should be, but I do know that for some, on the host being ping well, I can see the ping arriving packets and the host responds with a response to ICMP echo).
Here is the version of cisco:
version ADSL #show
Cisco IOS software, software C850 (C850-ADVSECURITYK9-M), Version 12.4 (15) T5, VERSION of the SOFTWARE (fc4)
Technical support: http://www.cisco.com/techsupport
Copyright (c) 1986-2008 by Cisco Systems, Inc.
Updated Friday 1 May 08 02:07 by prod_rel_teamROM: System Bootstrap, Version 12.3 (8r) YI4, VERSION of the SOFTWARE
ADSL availability is 1 day, 19 hours, 27 minutes
System to regain the power ROM
System restarted at 17:20:56 CEST Sunday, October 10, 2010
System image file is "flash: c850-advsecurityk9 - mz.124 - 15.T5.bin".Cisco 857 (MPC8272) processor (revision 0 x 300) with 59392K / 6144K bytes of memory.
Card processor ID FCZ122391F5
MPC8272 CPU Rev: Part Number 0xC, mask number 0 x 10
4 interfaces FastEthernet
1 ATM interface
128 KB of non-volatile configuration memory.
20480 bytes K of on board flash system (Intel Strataflash) processorConfiguration register is 0 x 2102
And here is the cisco configuration (IP address, etc. changed of course):
Current configuration: 7782 bytes
!
! Last configuration change at 11:57:21 CEST Monday, October 11, 2010 by bautsche
! NVRAM config updated at 11:57:22 CEST Monday, October 11, 2010 by bautsche
!
version 12.4
no service button
tcp KeepAlive-component snap-in service
a tcp-KeepAlive-quick service
horodateurs service debug datetime localtime show-timezone msec
Log service timestamps datetime localtime show-timezone msec
encryption password service
sequence numbers service
!
hostname adsl
!
boot-start-marker
boot-end-marker
!
logging buffered 4096
enable secret 5
!
AAA new-model
!
!
AAA authentication login local_authen local
AAA authentication login sdm_vpn_xauth_ml_1 local
AAA authorization exec local local_author
AAA authorization sdm_vpn_group_ml_1 LAN
!
!
AAA - the id of the joint session
clock timezone gmt 0
clock daylight saving time UTC recurring last Sun Mar 01:00 last Sun Oct 01:00
!
!
dot11 syslog
no ip source route
dhcp IP database dhcpinternal
No dhcp use connected vrf ip
DHCP excluded-address IP 10.10.7.1 10.10.7.99
DHCP excluded-address IP 10.10.7.151 10.10.7.255
!
IP dhcp pool dhcpinternal
import all
Network 10.10.7.0 255.255.255.0
router by default - 10.10.7.1
Server DNS 212.159.6.9 212.159.6.10 212.159.13.49 212.159.13.50
!
!
IP cef
property intellectual auth-proxy max-nodata-& 3
property intellectual admission max-nodata-& 3
no ip bootp Server
nfs1 host IP 10.10.140.207
name of the IP-server 212.159.11.150
name of the IP-server 212.159.13.150
!
!
!
username password cable 7
username password bautsche 7
vpnuser password username 7
!
!
crypto ISAKMP policy 1
BA 3des
md5 hash
preshared authentication
Group 2
!
crypto ISAKMP policy 2
BA aes 256
preshared authentication
Group 2
!
crypto ISAKMP policy 3
BA 3des
Prior authentication group part 2
the local address SDM_POOL_1 pool-crypto isakmp client configuration
!
ISAKMP crypto client configuration group groupname2
key
DNS 10.10.140.201 10.10.140.202
swangage.co.uk field
pool SDM_POOL_1
users of max - 3
netmask 255.255.255.0
!
ISAKMP crypto client configuration group groupname1
key
DNS 10.10.140.201 10.10.140.202
swangage.co.uk field
pool SDM_POOL_1
users of max - 3
netmask 255.255.255.0
ISAKMP crypto sdm-ike-profile-1 profile
groupname2 group identity match
client authentication list sdm_vpn_xauth_ml_1
ISAKMP authorization list sdm_vpn_group_ml_1
client configuration address respond
ISAKMP crypto profile sdm-ike-profile-2
groupname1 group identity match
ISAKMP authorization list sdm_vpn_group_ml_1
client configuration address respond
!
!
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
Crypto ipsec transform-set esp-3des esp-md5-hmac ESP_MD5_3DES
Crypto ipsec transform-set ESP-AES-256-SHA aes - esp esp-sha-hmac
!
crypto dynamic-map SDM_DYNMAP_1 1
Set the security association idle time 3600
game of transformation-ESP-AES-256-SHA
market arriere-route
crypto dynamic-map SDM_DYNMAP_1 2
Set the security association idle time 3600
game of transformation-ESP-AES-256-SHA
market arriere-route
!
!
card crypto SDM_CMAP_1 client authentication list sdm_vpn_xauth_ml_1
map SDM_CMAP_1 isakmp authorization list sdm_vpn_group_ml_1 crypto
map SDM_CMAP_1 65535-isakmp dynamic SDM_DYNMAP_1 ipsec crypto
!
Crypto ctcp port 10000
Archives
The config log
hidekeys
!
!
synwait-time of tcp IP 10
!
!
!
Null0 interface
no ip unreachable
!
ATM0 interface
no ip address
no ip redirection
no ip unreachable
no ip proxy-arp
route IP cache flow
No atm ilmi-keepalive
PVC 0/38
aal5mux encapsulation ppp Dialer
Dialer pool-member 1
!
DSL-automatic operation mode
waiting-224 in
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface Vlan1
Description $FW_INSIDE$
10.10.7.1 IP address 255.255.255.0
IP access-group 121 to
no ip redirection
no ip unreachable
no ip proxy-arp
IP nat inside
IP virtual-reassembly
route IP cache flow
map SDM_CMAP_1 crypto
Hold-queue 100 on
!
interface Dialer1
Description $FW_OUTSIDE$
the negotiated IP address
IP access-group 121 to
no ip redirection
no ip unreachable
no ip proxy-arp
NAT outside IP
IP virtual-reassembly
encapsulation ppp
route IP cache flow
No cutting of the ip horizon
Dialer pool 1
Dialer idle-timeout 0
persistent Dialer
Dialer-Group 1
No cdp enable
Authentication callin PPP chap Protocol
PPP chap hostname
PPP chap password 7
map SDM_CMAP_1 crypto
!
local IP SDM_POOL_1 10.10.148.11 pool 10.10.148.20
IP local pool public_184 123.12.12.184
IP local pool public_186 123.12.12.186
IP local pool public_187 123.12.12.187
IP local pool internal_9 10.10.7.9
IP local pool internal_8 10.10.7.8
IP local pool internal_223 10.10.7.223
IP local pool internal_47 10.10.7.47
IP forward-Protocol ND
IP route 0.0.0.0 0.0.0.0 Dialer1
IP route 10.10.140.0 255.255.255.0 10.10.7.2
!
no ip address of the http server
no ip http secure server
IP nat inside source overload map route SDM_RMAP_1 interface Dialer1
IP nat inside source static 10.10.7.9 123.12.12.184
IP nat inside source static tcp 10.10.7.8 22 123.12.12.185 22 Expandable
IP nat inside source static tcp 10.10.7.8 25 123.12.12.185 25 expandable
IP nat inside source static tcp 10.10.7.8 80 123.12.12.185 80 extensible
IP nat inside source static tcp 10.10.7.8 443 123.12.12.185 443 extensible
IP nat inside source static tcp 10.10.7.8 993 123.12.12.185 993 extensible
IP nat inside source static tcp 10.10.7.8 123.12.12.185 1587 1587 extensible
IP nat inside source static tcp 10.10.7.8 8443 123.12.12.185 8443 extensible
IP nat inside source static 10.10.7.223 123.12.12.186
IP nat inside source static 10.10.7.47 123.12.12.187
!
record 10.10.140.213
access-list 18 allow one
access-list 23 permit 10.10.140.0 0.0.0.255
access-list 23 permit 10.10.7.0 0.0.0.255
Access-list 100 category SDM_ACL = 2 Note
access-list 100 deny ip any 10.10.148.0 0.0.0.255
access ip-list 100 permit a whole
Note access-list 121 SDM_ACL category = 17
access-list 121 deny udp any eq netbios-dgm all
access-list 121 deny udp any eq netbios-ns everything
access-list 121 deny udp any eq netbios-ss all
access-list 121 tcp refuse any eq 137 everything
access-list 121 tcp refuse any eq 138 everything
access-list 121 tcp refuse any eq 139 all
access ip-list 121 allow a whole
access-list 125 permit tcp any any eq www
access-list 125 permit udp any eq isakmp everything
access-list 125 permit udp any any eq isakmp
access-list 194 deny udp any eq isakmp everything
access-list 194 deny udp any any eq isakmp
access-list 194 allow the host ip 123.12.12.184 all
IP access-list 194 allow any host 123.12.12.184
access-list 194 allow the host ip 10.10.7.9 all
IP access-list 194 allow any host 10.10.7.9
access-list 195 deny udp any eq isakmp everything
access-list 195 deny udp any any eq isakmp
access-list 195 allow the host ip 123.12.12.185 all
IP access-list 195 allow any host 123.12.12.185
access-list 195 allow the host ip 10.10.7.8 all
IP access-list 195 allow any host 10.10.7.8
not run cdp
public_185 allowed 10 route map
corresponds to the IP 195
!
public_184 allowed 10 route map
corresponds to the IP 194
!
allowed SDM_RMAP_1 1 route map
corresponds to the IP 100
!
!
control plan
!
!
Line con 0
connection of authentication local_authen
no activation of the modem
preferred no transport
telnet output transport
StopBits 1
line to 0
connection of authentication local_authen
telnet output transport
StopBits 1
line vty 0 4
access-class 23 in
privilege level 15
authorization exec local_author
connection of authentication local_authen
length 0
preferred no transport
transport input telnet ssh
!
max-task-time 5000 Planner
Scheduler allocate 4000 1000
Scheduler interval 500
130.88.202.49 SNTP server
130.88.200.98 SNTP server
130.88.200.6 SNTP server
130.88.203.64 SNTP server
endAny help would be appreciated.
Thank you very much.
Ciao,.
Eric
Hi Eric,.
(Sorry for the late reply - needed some holidays)
So I see that you have a few steps away now. I think that there are 2 things we can try:
1)
I guess you have provided that:
IP nat inside source overload map route SDM_RMAP_1 interface Dialer1
Since the routemap refers to ACL 100 to define the traffic to be translated, we can exclude traffic that initiates the router:
Access-list 100 category SDM_ACL = 2 Note
access-list 100 deny ip 123.12.12.185 host everything
access-list 100 deny ip any 10.10.148.0 0.0.0.255
access ip-list 100 permit a wholeWhich should prevent the source udp 4500 to 1029 changing port
OR
2)
If you prefer to use a different ip address for VPN,
Then, you can use a loop like this:
loopback interface 0
123.12.12.187 the IP 255.255.255.255
No tap
map SDM_CMAP_1 crypto local-address loopback 0
I don't think you should apply card encryption to the loopback interface, but it's been a while since I have configured something like that, so if you have problems first try and if still does not get the crypto debugs new (isakmp + ipsec on the vpn, nat router on the router of the client package).
HTH
Herbert
-
problem of traffic flow with tunnel created the network with a tunnel to a VPN concentrator
Hi, I worked with Cisco and the seller for 2 weeks on this.II am hoping that what we are witnessing will ring a Bell with someone.
Some basic information:
I work at a seller who needs from one site to the other tunnel. There are currently 1 site to another with the seller using a Juniper SSG, which works without incident in my system. I'm transitioning to routers Cisco 2811 and put in place a new tunnel with the seller for the 2800 uses a different public ip address in my address range. So my network has 2 tunnels with the provider that uses a Cisco VPN concentrator. The hosts behind the tunnel use 20x.x.x.x public IP addresses.
My Cisco router will create a tunnel, but I can't not to hosts on the network of the provider through the Cisco 2811, but I can't get through the tunnel of Juniper. The seller sees my packages and provider host meets them and sends them to the tunnel. They never reach the external interface on my Cisco router.
I'm from the external interface so that my endpoint and the peers are the same IP address. (note, I tried to do a static NAT and have an address of tunnel and my different host to the same result.) Cisco has confirmed that I do have 2 addresses different and this configuration was a success with the creation of another successful tunnels toa different network.)
I tested this configuration on a network of transit area before moving the router to the production network and my Cisco 2811 has managed to create the tunnel and ping the inside host. Once we moved the router at camp, we can no longer ping on the host behind the seller tunnel. The seller assured me that the tunnel setting is exactly the same, and he sees his host to send traffic to the tunnel. The seller seems well versed with the VPN concentrator and manages connections for many customers successfully.
The seller has a second VPN concentrator on a separate network and I can connect to this VPN concentrator with success of the Cisco 2811 who is having problems with the hub, which has also a tunnel with Gin.
Here is what we have done so far:
(1) confirm the config with the help of Cisco 2811. The tunnel is up. SH cyrpto ipa wristwatch tunnel upward.
(2) turn on Nat - T side of the tunnel VPN landscapers
(3) confirm that the traffic flows properly a tunnel on another network (which would indicate that the Cisco config is ok)
(4) successfully, tunnel and reach a different configuration hosting
(5) to confirm all the settings of tunnel with the seller
(6) the seller confirmed that his side host has no way and that it points to the default gateway
(7) to rebuild the tunnel from scratch
8) confirm with our ISP that no way divert traffic elsewhere. My gateway lSP sees my directly connected external address.
(9) confirm that the ACL matches with the seller
(10) I can't get the Juniper because he is in production and in constant useIs there a known issue with the help of a VPN concentrator to connect to 2 tunnels on the same 28 network range?
Options or ideas are welcome. I had countless sessions with Cisco webex, but do not have access to the hub of the seller. I can forward suggestions.
Here's a code
crypto ISAKMP policy 1
BA 3des
md5 hash
preshared authentication
Group 2
!
crypto ISAKMP policy 2
BA 3des
preshared authentication
Group 2Crypto ipsec transform-set mytrans aes - esp esp-sha-hmac
Crypto-map dynamic dynmap 30
Set transform-set RIGHTISAKMP crypto key
address No.-xauth interface FastEthernet0/0
Description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-FE $ 0/0
IP255.255.255.240
IP access-group 107 to
IP access-group out 106
NAT outside IP
IP virtual-reassembly
route IP cache flow
automatic duplex
automatic speed
crypto mymap maplogging of access lists (applied outside to get an idea of what will happen. No esp traffic happens, he has never hits)
allowed access list 106 esp host
host newspaper
106 ip access list allow a whole
allowed access list 107 esp hosthost Journal
access-list 107 permit ip hosthost Journal access-list 107 permit ip host
host Journal
107 ip access list allow a wholeCrypto isa HS her
IPv4 Crypto ISAKMP Security Association
status of DST CBC State conn-id slot
QM_IDLE ASSETS 0 1010 "Mymap" ipsec-isakmp crypto map 1
Peer =.
Extend the 116 IP access list
access - list 116 permit ip hosthost (which is a public IP address))
Current counterpart:
Life safety association: 4608000 kilobytes / 2800 seconds
PFS (Y/N): N
Transform sets = {}
myTrans,
}OK - so I have messed around the lab for 20 minutes and came up with the below (ip are IP test:-)
(4) ip nat pool crypto-nat 10.1.1.1 10.1.1.1 prefix length 30 <> it comes to the new address of NAT
!
(1) ip nat inside source list 102 interface FastEthernet0/0 overload <> it comes to the interface by default NAT!
IP nat inside source map route overload of crypto-nat of crypto-nat pool <> it is the policy of the NAT function!
(6) access-list 101 permit ip 172.16.1.0 0.0.0.255 172.16.2.0 0.0.0.255 <> defines the IP source and destination traffic
!
(2) access-list 102 deny ip 172.16.1.0 0.0.0.255 172.16.2.0 0.0.0.255 <> does not NAT the normal communication
(3) access-list 102 deny ip 10.1.1.1 host 172.16.2.0 0.0.0.255 <> does not re - NAT NAT
(1) access-list 102 permit ip 172.16.1.0 0.0.0.255 any <> allows everyone else to use the IP Address of the interface for NAT
!
(5) crypto-nat route-map permit 5 <> condition for the specific required NAT
corresponds to the IP 101 <> game of traffic source and destination IP must be NAT'td(7) access list 103 permit ip 10.1.1.1 host 172.16.2.0 0.0.0.255 <> crypto acl
Then, how the works above, when a package with the what IP 172.16.1.0/24 source wants to leave the router to connect to google, say the source will change to IP interface (1). When 172.16.1.0/24 wants to talk to172.16.2.0/24, it does not get translated (2). When the remote end traffic equaled the following clause of NAT - the already NAT'td IP will not be affected again (3) when a host 172.16.1.0/24 wants to communicate with 172.16.2.20/24 we need a NAT NAT specific pool is required (4). We must define a method of specific traffic to apply the NAT with a roadmap (5) which applies only when the specific traffic (6), then simply define the interesting traffic to the VPN to initiate and enable comms (7) corresponding
-
Hello
I'm on Oracle Database 11 g Release 11.2.0.3.0 and Application Express 4.2.2.00.11
How to use trick cache result?
How do you get the same result shown in Figuree 3 (apex.oracle.com Application Express 4.2.6.00.03) ?
I try to use the result cache but explain plan does not appear to be used (Figure 1)
Then I tried ' alter table STUDENT result_cache (FORCE mode); In figure 2, you could see that column in the table of students result_cache was changed to 'force' but explain the plan shows yet cache result being used.
Figure 2
Figure 3 (from apex.oracle.com workspace)
Hello
Thank you all for your answers.
According to Oracle Help Center (11 g release 2) this is a feature reserved for Enterprise Edition. And Apex.oracle.com from today using Oracle Database 11 g Enterprise Edition Release 11.2.0.4.0 - 64 bit Production.
While I'm using Oracle Database 11 g Release 11.2.0.3.0 - 64 bit Production it is why in the screenshots above I could not duplicate the result in apex.oracle.com
https://docs.Oracle.com/CD/E11882_01/license.112/e47877/editions.htm#DBLIC116
-
vSphere networking performance counters - Teddy bear use of flow compared to its use
I am responsible for a vSphere 5.1 environment that uses NFS data warehouses and I'm trying to collect metrics on how much bandwidth is used to access NFS data stores. When I did it first a week ago, I ran esxtop and looked at network and sort by Mbps passed parameters and what he was able to indicate what vmnic NFS vmkernel was linked to. I then took a look at the usage meter vmnic for a total of send/receive KB/s. During my research, I ran across another counter: "use of flow rates for NFS Teddy." Here's the problem, when we look at the use and Teddy flow using the counters from NFS on the same vmnic over the same period of time, the use of flow for meter NFS shows bandwidth much higher than that of the meter use (see image). What gives?
What I forgot to mention, is that measures to counter throughput.usage.nfs report a higher flow rate than the physical NETWORK adapter can handle. The highest Summit on the graph shows about a flow of 13 GB/s on a network card 1 GB. I spoke with a VMware engineer friend and he said it looks like the meter is mislabeled in vCenter. I verified this by looking at the use of the NFS in vCenter Operations Manager metric and compared to the metric of its use on the same physical NETWORK adapter and the metric NFS for the NIC I was looking at showed approximately 23.8 MB/s (if I assume that the unit of measure of labelling was supposed to be B/s and not KB/s) and usage was about 24.2 MB / s. The metric of higher use is due to the fact that the environment is badly designed by my predecessor and the NFS Sharing vmkernel rising with VM networks (something that I am trying to solve).
-
Excessive memory allocation in the cache nodes
All,
I'm on the 3.6.1.8 consistency and Java 1.7.0_40. Bunch is - Xms100m-Xmx1280m - XX: + UseParallelOldGC
I am seeding a problem suddenly in my cache nodes where they are allocating and releasing the very large amount of memory very quickly. GC happens about every 2-3 seconds and the release of about 400 MB. GC itself is fast enough. The volume of operations against the cache (gets, puts, entrySets) seems pretty normal. I took some thread dumps and see what seems to be cache queries, if each dump is different. (It is not as if a thread is blocked or whatever it is). All requests must be indexed. Eclipse MAST pointing some of my caches as being the largest consumers of memory, which does not at all surprise me. There have not been any change in code or configuration in almost 2 months.
Newspapers of coherence is complained mainly just delays in communication (DEBUG, WARN not) due to distance GC, which I do not doubt. I don't know how to determine which objects are actually get awarded and thrown.
Sample GC output below:
2014 01-29 T 12: 46:53.640 - 0600: [GC [PSYoungGen: 435520 K - > 448 K (436224 K)] 1237751 K - > 802823 K (1257984 K), dry 0,0229380] [time: user = 0.02 sys = 0.00, true = 0.02 seconds]
2014 01-29 T 12: 46:56.385 - 0600: [GC [PSYoungGen: 435648 K - > 320 K (436224 K)] 1238023 K - > 802967 K (1257984 K), dry 0,0244490] [time: user = 0.02 sys = 0.00, true = 0.03 seconds]
2014 01-29 T 12: 46:58.551 - 0600: [GC [PSYoungGen: 435520 K - > 256 K (436224 K)] 1238167 K - > 803079 K (1257984 K), dry 0,0242600] [time: user = 0.02 sys = 0.00, true = 0.02 seconds]
2014 01-29 T 12: 47:00.454 - 0600: [GC [PSYoungGen: 435456 K - > 384 K (436224 K)] 1238279 K - > 803295 K (1257984 K), dry 0,0278340] [time: user = 0.02 sys = 0.00, true = 0.03 seconds]
2014 01-29 T 12: 47:03.087 - 0600: [GC [PSYoungGen: 435584 K - > 384 K (436224 K)] 1238495 K - > 803383 K (1257984 K), dry 0,0287130] [time: user = 0.02 sys = 0.00, true = 0.03 seconds]
2014 01-29 T 12: 47:06.553 - 0600: [GC [PSYoungGen: 435584 K - > 416 K (436224 K)] 1238583 K - > 803627 K (1257984 K), dry 0,0229790] [time: user = 0.02 sys = 0.00, true = 0.02 seconds]
2014 01-29 T 12: 47:08.894 - 0600: [GC [PSYoungGen: 435616 K - > 416 K (436224 K)] 1238827 K - > 803851 K (1257984 K), dry 0,0167050] [time: user = 0.03 sys = 0.00, true = 0.02 seconds]
2014 01-29 T 12: 47:11.446 - 0600: [GC [PSYoungGen: 435616 K - > 256 K (436224 K)] 1239051 K - > 803947 K (1257984 K), dry 0,0387630] [time: user = 0.02 sys = 0.00, true = 0.04 seconds]
Any ideas?
Thank you
It seems that the index was not used. I have no idea how this could happen. Clues were:
1. some of the thread dumps showing objects cached during the evaluation of the query during deserialization. This should not happen if the index is used.
2. There is a preponderance of these same items cached in the "inaccessible objects" (garbage) as indicated by Eclipse MAST.
Suddenly, I fixed the problem by using the command line query tool. In my view, show "ensure index on
" did. I had hoped that he would at least confirm whether the index exists, but right at that time, I published this command the problem magically disappeared. I did not use the command 'create index '. -
IE cache on the browser back side
Hi all
I have a form page, a page of action and a confirmation page.
I send the form page... takes me to the action page where I validate the fields... fields are NOT valid... I place the data and the error message in the session and redirect (cflocation) to the form page. In the page of form I to store session variables (err message and incorrect data) into local variables, destroy the session variables and use local variables afterwards.
Now I have the correct values and submit the form again... going... valid action page and then redirect to the confirmation page.
Now if I use my browser back from the confirmation page, it takes me to the page of form with the validation error message and incorrect data... I understand that the IE 7 browser uses the cache to get the data... but I tried to use cfheader and META tags to avoid pulling... always pulls of browser cache cache... This does not happen in Firefox. I use the following code.
< name cfheader = 'cache-control' value = "no-store, no-cache, must-revalidate" >
< name cfheader = "pragma" value = "no-cache" >
< name cfheader = "expires" value = "#getHttpTimeString (now ()) #" >< META HTTP-EQUIV = "expires" CONTENT = "-1" >
< META HTTP-EQUIV = "pragma" CONTENT = "no-cache" >
< META HTTP-EQUIV = "cache-control" CONTENT = "no-store, no-cache, must-revalidate" >Any thoughts on how this can be resolved?
Hi Madhu,
I am back. I revisited the thread and my test code. The first code that worked for me is, in fact, not very different from the one I gave above. Only the headers, no tag meta. And my headers are more or less the same as those of the original of your post, too! So why it works for me and not for you?
The crucial point to be noted is that if IE buttons next and previous shows pages cached, then it may be that these pages were already stored as history. This means that, in your case, IE must have disobeyed the directive no.-cache. How?
My first guess is: the web server. If you're using ColdFusion's built-in JRun Web Server, for example, then who might be the index. This web server uses the HTTP/1.0 protocol to answer. Current browsers expect the HTTP/1.1 version. For example, the Cache-Control header was introduced in HTTP/1.1. It could be that HTTP/1.0 is too old for IE and, possibly, that IE is not backward compatible as the HTTP protocol is concerned. Test for to do us next is to compare the behavior of the headers for HTTP/1.0 and HTTP/1.1 web servers.
-
New episode does not appear in iTunes
Hello
I have a problem, my flow
http://hypnowords.Podbean.com/feed/
works but I have the new episode I posted recently, this morning, does not Hypnowords https://itunes.apple.com/de/podcast/hypnowords-podcast/id1062592743?l=en in the store.
Can you help me please?
Concerning
Daniel
Episode 2, released today, shows for subscribers, both in the iTunes Store. You were lucky it as it can normally take 1-2 days for a new episode to appear in the store puts it in cache flows, checking them in some sort of rotation (Subscribers see pretty quickly as their iTunes application reads the stream directly).
-
Cisco 877W DHCP does not automatically fill the Windows/Mac customers with DNS server entries
I have a 877W which was operational on Verizon for about 5 years. It never automatically distributed info DNS server for customers who get DHCP issued IP address. I have to manually enter the DNS entries to each client. What happened to other sites where I've got installed on AT & T as well as 877 unified communications.
Here is the config. Thanks in advance for the help.
Building configuration...
Current configuration: 7987 bytes
!
version 12.4
no service button
tcp KeepAlive-component snap-in service
a tcp-KeepAlive-quick service
horodateurs service debug datetime localtime show-timezone msec
Log service timestamps datetime localtime show-timezone msec
encryption password service
sequence numbers service
!
Cod of hostname
!
boot-start-marker
boot-end-marker
!
logging buffered debugging 51200
recording console critical
enable secret 5 jSwA $1$ $ 3B5lJNqm0ewh
!
AAA new-model
!
!
AAA authentication local-to-remote login
local remote of the AAA authorization network
!
AAA - the id of the joint session
!
resources policy
!
PCTime-6 timezone clock
PCTime of summer time clock day April 6, 2003 02:00 October 26, 2003 02:00
IP subnet zero
IP cef
No dhcp use connected vrf ip
DHCP excluded-address IP 192.168.7.1 192.168.7.19
DHCP excluded-address IP 192.168.7.70 192.168.7.254
!
IP dhcp pool sdm-pool1
import all
network 192.168.7.0 255.255.255.0
router by default - 192.168.7.1
DNS-server 68.238.96.12 68.238.112.12
!
!
inspect the IP name DEFAULT100 cuseeme
inspect the IP name DEFAULT100 ftp
inspect the IP h323 DEFAULT100 name
inspect the IP icmp DEFAULT100 name
inspect the IP name DEFAULT100 netshow
inspect the IP rcmd DEFAULT100 name
inspect the IP name DEFAULT100 realaudio
inspect the name DEFAULT100 rtsp IP
inspect the IP name DEFAULT100 esmtp
inspect the IP name DEFAULT100 sqlnet
inspect the name DEFAULT100 streamworks IP
inspect the name DEFAULT100 tftp IP
inspect the tcp IP DEFAULT100 name
inspect the IP udp DEFAULT100 name
inspect the name DEFAULT100 vdolive IP
synwait-time of tcp IP 10
IP domain name cods.com
name of the IP-server 68.238.96.12
name of the IP-server 68.238.112.12
property intellectual ssh time 60
property intellectual ssh authentication-2 retries
!
!
Crypto pki trustpoint TP-self-signed-437228204
enrollment selfsigned
name of the object cn = IOS - Self - signed - certificate - 437228204
revocation checking no
rsakeypair TP-self-signed-437228204
!
!
TP-self-signed-437228204 crypto pki certificate chain
certificate self-signed 01
30820254 308201BD A0030201 02992101 300 D 0609 2A 864886 F70D0101 04050030
2 060355 04031325 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 30312E30
69666963 34333732 32383230 34301E17 303731 30313632 33333131 0D 6174652D
395A170D 2E302C06 1325494F 03550403 32303031 30313030 30303030 5A 303031
532D 5365 6C662D53 69676E65 4365 72746966 69636174 652 3433 37323238 642D
06092A 86 4886F70D 01010105 32303430 819F300D 00308189 02818100 0003818D
BF73E16C 24A3FB0B A44C83C8 45ACEC75 163C2F0A 87836F7F A43FEB72 0EF26AFA
C7F35ED6 CBCC6853 5E82B0A6 1FD8020B F3630023 AB30B870 B3155EE6 86988910
4ACF5121 1CBFF4DC B705DF1E 5D0D698F 06493 D 3DD8D036 42 FE450D21 E26A4DAF
CE6BA806 81A9F451 0246698E DA7B49E3 160F115C E1104FA9 31FA3C15 CD 782 279
02030100 01A37E30 7C300F06 03551 D 13 0101FF04 05300301 01FF3029 0603551D
20821E63 11042230 6F64732E 6F666472 63697479 6E677370 69707069 72696E67
732E636F 6D301F06 23 04183016 24 D 77493 80142FA3 03551D 52CF7094 B847B6EB
1385E2E5 0F3A301D 0603551D 0E041604 142FA324 D7749352 CF7094B8 47B6EB13
85E2E50F 3A300D06 092 HAS 8648 01040500 03818100 076EE499 12F46D79 86F70D01
375B7EA6 C9279DA4 B32723B5 908C9FB8 D42CB978 BB24A8FE 73579A3D CA 5130, 87
B7716644 7E13710D C6E6360C D0A36F7B F62540E2 0C33523B E50396B9 2EF66FA7
56519E62 E55EAF3C E1D9BEC9 3AE67B59 75E61F06 B649E90A 2798F755 7A020F0A
F8BDABFA 1EE37B6A A918560D DA45AD70 801BC66E 94D1468E
quit smoking
username privilege 15 secret $5 1jgO$sGD@#l4yTtLtYoEZbh/Wl steal551.
!
!
door-key crypto vpn_ddaus
pre-shared key address 0.0.0.0 0.0.0.0 - key stealthfortyfor5
door-key crypto vpn_rmlfk
address of pre-shared-key 205.30.134.22 key stealthfortyfor5
!
crypto ISAKMP policy 10
md5 hash
preshared authentication
Group 2
!
crypto ISAKMP policy 30
BA 3des
preshared authentication
Group 2
invalid-spi-recovery crypto ISAKMP
ISAKMP crypto keepalive 20
!
Configuration group isakmp crypto VPNRemote client
key ConnectNow45
pool ippool
ISAKMP crypto vpnclient profile
VPNRemote identity group match
client authentication list for / remote
Remote ISAKMP authorization list
client configuration address respond
Crypto isakmp CODS_DDAUS profile
key ring vpn_ddaus
function identity address 0.0.0.0
Crypto isakmp CODS_RMLFK profile
key ring vpn_rmlfk
function identity address 205.30.134.22 255.255.255.255
!
!
Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT
!
Crypto-map dynamic dynmap 10
Set transform-set RIGHT
vpnclient Set isakmp-profile
Crypto-map dynamic dynmap 12
Set transform-set RIGHT
CODS_DDAUS Set isakmp-profile
!
!
MYmap 1 ipsec-isakmp crypto map
defined by peer 205.30.134.22
Set transform-set RIGHT
CODS_RMLFK Set isakmp-profile
match address CODS_to_RMFLK
map mymap 65535-isakmp ipsec crypto dynamic dynmap
!
Bridge IRB
!
!
interface Loopback10
IP 1.1.1.1 255.255.255.0
!
ATM0 interface
no ip address
route IP cache flow
No atm ilmi-keepalive
DSL-automatic operation mode
!
point-to-point interface ATM0.1
Description $FW_OUTSIDE$ $ES_WAN$
Check IP unicast reverse path
inspect the DEFAULT100 over IP
NAT outside IP
IP virtual-reassembly
PVC 0/35
aal5snap encapsulation
!
Bridge-Group 2
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface Dot11Radio0
no ip address
no ip-cache cef route
no ip route cache
!
encryption vlan 1 tkip encryption mode
!
SSID tsunami
VLAN 1
open authentication
authentication wpa key management
Comments-mode
WPA - psk ascii 7 14231A0E01053324363F363B36150E050B08585E
!
base speed - 1.0 2.0 basic basic-5, 5 6.0 9.0 basic-11, 0 12.0 18.0 24.0 36.0 48.0 54.0
root of station-role
!
interface Dot11Radio0.1
encapsulation dot1Q 1 native
no ip route cache
no link-status of snmp trap
No cdp enable
Bridge-Group 1
Bridge-group subscriber-loop-control 1
Bridge-Group 1 covering-disabled people
Bridge-Group 1 block-unknown-source
No source of bridge-Group 1-learning
unicast bridge-Group 1-floods
!
interface Vlan1
Description $ETH - SW - LAUNCH, INTF-INFO-HWIC $$ $4ESW $FW_INSIDE$
no ip address
IP tcp adjust-mss 1452
Bridge-Group 1
!
interface BVI1
Description $ES_LAN$ $FW_INSIDE$
192.168.7.1 IP address 255.255.255.0
IP nat inside
IP virtual-reassembly
route IP cache flow
IP tcp adjust-mss 1412
!
interface control2
IP 70.14.49.134 255.255.255.0
NAT outside IP
IP virtual-reassembly
crypto mymap map
!
local pool IP 10.10.10.1 ippool 10.10.10.254
IP classless
IP route 0.0.0.0 0.0.0.0 70.14.49.1
!
IP http server
local IP http authentication
IP http secure server
IP http timeout policy slowed down 60 life 86400 request 10000
overload of IP nat inside source list 133 interface control2
!
CODS_to_RMFLK extended IP access list
IP 192.168.7.0 allow 0.0.0.255 192.168.1.0 0.0.0.255
!
recording of debug trap
access-list 1 permit 192.168.7.0 0.0.0.255
access-list 100 remark self-generated by the configuration of the firewall Cisco SDM Express
Access-list 100 = 1 SDM_ACL category note
access-list 100 deny ip 70.14.49.0 0.0.0.255 any
access-list 100 deny ip 255.255.255.255 host everything
access-list 100 deny ip 127.0.0.0 0.255.255.255 everything
access ip-list 100 permit a whole
access-list 101 permit ip 192.168.7.0 0.0.0.255 192.168.3.0 0.0.0.255
access-list 133 deny ip 192.168.7.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 133 deny ip 192.168.7.0 0.0.0.255 10.10.10.0 0.0.0.255
access-list 133 deny ip 192.168.7.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 133 deny ip 192.168.7.0 0.0.0.255 192.168.3.0 0.0.0.255
access-list 133 allow ip 192.168.7.0 0.0.0.255 any
not run cdp
mymap permit 10 route map
corresponds to the IP 111
set ip next-hop 1.1.1.2
!
!
control plan
!
Bridge Protocol ieee 1
1 channel ip bridge
Bridge Protocol ieee 2
IP road bridge 2
connection of the banner ^ CAuthorized access only!
Unplug IMMEDIATELY if you are not an authorized user. ^ C
!
Line con 0
no activation of the modem
telnet output transport
line to 0
telnet output transport
line vty 0 4
privilege level 15
transport input telnet ssh
!
max-task-time 5000 Planner
Scheduler allocate 4000 1000
Scheduler interval 500
endHello
Can you try to remove the IMPORT ALL of the dhcp pool
RES
PaulSent by Cisco Support technique iPad App
-
We have Cisco 2800 to each of our four locations that are managed by our ISP. We had problems with them, I got them to send me the configuration files of one of them, but nothing jumps out to me.
You must disable TCP Window Scaling/tuning on all our Machines 7/Server Windows 2012 (by running netsh interface tcp set global autotuning = disabled in the command line)
If we have not this is very slow to load even a Web page and cannot download a file (even something as small as 2 MB). Mobile devices have no hope to work on our network now because of this. This isn't a question on our XP remaning machines bit, but I think that XP did not use Window Scaling is the reason.
Any ideas what could be causing this? I intend to replace it soon with our own routers, because they do not want to configure the secondary interfaces for our VLAN, but in the meantime I need this job.
Thanks in advanced for any help.
Here is the Config with Sensative information deleted
version 12.3
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname REMOVED
!
boot-start-marker
boot-end-marker
!
logging buffered 8192 debugging
no logging console
enable secret REMOVED
!
no aaa new-model
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
ip cef
!
!
no ip dhcp use vrf connected
!
ip inspect name DEFAULT100 cuseeme
ip inspect name DEFAULT100 ftp
ip inspect name DEFAULT100 h323
ip inspect name DEFAULT100 icmp
ip inspect name DEFAULT100 netshow
ip inspect name DEFAULT100 rcmd
ip inspect name DEFAULT100 realaudio
ip inspect name DEFAULT100 rtsp
ip inspect name DEFAULT100 esmtp
ip inspect name DEFAULT100 sqlnet
ip inspect name DEFAULT100 streamworks
ip inspect name DEFAULT100 tftp
ip inspect name DEFAULT100 tcp
ip inspect name DEFAULT100 udp
ip inspect name DEFAULT100 vdolive
no ip ips deny-action ips-interface
!
no ftp-server write-enable
!
!
!
!
!
!
!
!
!
!
!
!
!
crypto pki trustpoint TP-self-signed-REMOVED
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-REMOVED
revocation-check none
rsakeypair TP-self-signed-REMOVED
!
!
crypto pki certificate chain TP-self-signed-REMOVED
certificate self-signed 01
REMOVED
quit
!
class-map match-all VOIP
match access-group 120
!
!
policy-map VOIP
class VOIP
priority 1000
class class-default
!
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp key REMOVED address 0.0.0.0 0.0.0.0
no crypto isakmp ccm
!
!
crypto ipsec transform-set VPN esp-aes 256 esp-sha-hmac
!
crypto ipsec profile SDM_Profile1
set transform-set VPN
!
crypto ipsec profile SDM_Profile2
set transform-set VPN
!
!
!
!
!
interface Tunnel0
description $FW_INSIDE$
bandwidth 3000
ip address 10.10.200.1 255.255.255.0
ip access-group 101 in
no ip redirects
ip mtu 1400
ip nhrp authentication VPN
ip nhrp map multicast dynamic
ip nhrp network-id 100000
ip nhrp holdtime 360
ip virtual-reassembly
ip route-cache flow
ip tcp adjust-mss 1360
ip ospf network broadcast
ip ospf priority 20
delay 10
tunnel source FastEthernet0/1
tunnel mode gre multipoint
tunnel key 100000
tunnel protection ipsec profile SDM_Profile1
!
interface Null0
no ip unreachables
!
interface Loopback0
ip address 192.168.210.1 255.255.255.255
no ip redirects
no ip unreachables
no ip proxy-arp
ip route-cache flow
!
interface FastEthernet0/0
description $FW_INSIDE$
ip address 10.10.100.1 255.255.255.0
ip access-group 100 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip virtual-reassembly
ip route-cache flow
ip policy route-map server-nat
duplex auto
speed auto
no mop enabled
service-policy output VOIP
!
interface FastEthernet0/1
description $FW_OUTSIDE$
ip address IP REMOVED NETMASK REMOVED
ip access-group 102 in
ip verify unicast reverse-path
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat outside
ip inspect DEFAULT100 out
ip virtual-reassembly
ip route-cache flow
load-interval 30
duplex auto
speed auto
no mop enabled
!
interface FastEthernet0/1/0
load-interval 30
!
interface FastEthernet0/1/1
!
interface FastEthernet0/1/2
!
interface FastEthernet0/1/3
!
router ospf 100
log-adjacency-changes
passive-interface FastEthernet0/0
passive-interface FastEthernet0/1
passive-interface FastEthernet0/1/0
network 10.10.100.0 0.0.0.255 area 0
network 10.10.200.0 0.0.0.255 area 0
network 10.10.201.0 0.0.0.255 area 0
network 192.168.210.1 0.0.0.0 area 0
!
ip classless
ip route 0.0.0.0 0.0.0.0 REMOVED
ip route REMOVED NETMASK REMOVED
ip route REMOVED NETMASK REMOVED
ip route REMOVED NETMASK REMOVED
!
ip flow-capture ip-id
ip flow-capture mac-addresses
ip flow-top-talkers
top 10
sort-by bytes
cache-timeout 30000
!
ip http server
ip http authentication local
ip http secure-server
ip nat pool nat REMOVED netmask REMOVED
ip nat inside source list 150 interface FastEthernet0/1 overload
!
access-list 100 deny ip 10.10.200.0 0.0.0.255 any
access-list 100 deny ip host 255.255.255.255 any
access-list 100 deny ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip any any
access-list 100 deny ip 10.10.201.0 0.0.0.255 any
access-list 101 remark Tunnel ACL
access-list 101 deny ip REMOVED 0.0.0.7 any log
access-list 101 deny ip host 255.255.255.255 any log
access-list 101 deny ip 127.0.0.0 0.255.255.255 any log
access-list 101 permit ip 10.10.100.0 0.0.0.255 10.10.110.0 0.0.0.255 log
access-list 101 permit ip 10.10.100.0 0.0.0.255 10.10.120.0 0.0.0.255 log
access-list 101 permit ip 10.10.100.0 0.0.0.255 10.10.130.0 0.0.0.255 log
access-list 101 permit ip host 10.10.100.10 any log
access-list 101 permit ip host 10.10.100.12 any log
access-list 101 permit ip host 10.10.100.20 any log
access-list 101 permit ip host 10.10.100.21 any log
access-list 101 permit ip host 10.10.100.45 any log
access-list 101 permit ip any host 10.10.100.10 log
access-list 101 permit ip any host 10.10.100.12 log
access-list 101 permit ip any host 10.10.100.20 log
access-list 101 permit ip any host 10.10.100.21 log
access-list 101 permit ip any host 10.10.100.45 log
access-list 101 permit ospf any any
access-list 101 permit icmp any any
access-list 101 deny ip 10.10.100.0 0.0.0.255 any log
access-list 101 permit ip 10.10.110.0 0.0.0.255 10.10.100.0 0.0.0.255
access-list 101 permit ip 10.10.120.0 0.0.0.255 10.10.100.0 0.0.0.255
access-list 101 permit ip 10.10.130.0 0.0.0.255 10.10.100.0 0.0.0.255
access-list 102 remark Outside ACL
access-list 102 permit tcp host REMOVED host REMOVED eq 22
access-list 102 permit tcp REMOVED 0.0.0.15 host REMOVED eq 22
access-list 102 permit udp any host REMOVED eq non500-isakmp
access-list 102 permit udp any host REMOVED eq isakmp
access-list 102 permit esp any host REMOVED
access-list 102 permit ahp any host REMOVED
access-list 102 permit gre any host REMOVED
access-list 102 permit icmp any host REMOVED echo-reply
access-list 102 permit icmp any host REMOVED time-exceeded
access-list 102 permit icmp any host REMOVED unreachable
access-list 102 permit ip any host 10.10.100.10
access-list 102 permit ip any host 10.10.100.12
access-list 102 permit ip any host 10.10.100.20
access-list 102 permit ip any host 10.10.100.21
access-list 102 permit ip any host 10.10.100.45
access-list 102 deny ip 10.10.100.0 0.0.0.255 any
access-list 102 deny ip 10.10.200.0 0.0.0.255 any
access-list 102 deny ip 10.0.0.0 0.255.255.255 any
access-list 102 deny ip 172.16.0.0 0.15.255.255 any
access-list 102 deny ip 192.168.0.0 0.0.255.255 any
access-list 102 deny ip 127.0.0.0 0.255.255.255 any
access-list 102 deny ip host 255.255.255.255 any
access-list 102 deny ip host 0.0.0.0 any
access-list 103 permit ip REMOVED 0.0.0.15 any
access-list 103 permit ip 10.10.200.0 0.0.0.255 any
access-list 103 permit ip 10.10.100.0 0.0.0.255 any
access-list 103 permit ip 10.10.110.0 0.0.0.255 any
access-list 103 permit ip 10.10.120.0 0.0.0.255 any
access-list 103 permit ip 10.10.130.0 0.0.0.255 any
access-list 110 deny ip host 10.10.100.12 10.10.110.0 0.0.0.255
access-list 110 deny ip host 10.10.100.12 10.10.130.0 0.0.0.255
access-list 110 deny ip host 10.10.100.10 10.10.110.0 0.0.0.255
access-list 110 deny ip host 10.10.100.10 10.10.130.0 0.0.0.255
access-list 110 deny ip host 10.10.100.20 10.10.110.0 0.0.0.255
access-list 110 deny ip host 10.10.100.20 10.10.130.0 0.0.0.255
access-list 110 deny ip host 10.10.100.21 10.10.110.0 0.0.0.255
access-list 110 deny ip host 10.10.100.21 10.10.130.0 0.0.0.255
access-list 110 deny ip host 10.10.100.45 10.10.110.0 0.0.0.255
access-list 110 deny ip host 10.10.100.45 10.10.130.0 0.0.0.255
access-list 110 permit ip host 10.10.100.12 any
access-list 110 permit ip host 10.10.100.10 any
access-list 110 permit ip host 10.10.100.20 any
access-list 110 permit ip host 10.10.100.21 any
access-list 110 permit ip host 10.10.100.45 any
access-list 120 permit udp any any eq 5060
access-list 150 deny ip host 10.10.100.10 any
access-list 150 deny ip host 10.10.100.12 any
access-list 150 deny tcp host 10.10.100.20 any eq 3389
access-list 150 deny ip host 10.10.100.21 any
access-list 150 deny tcp host 10.10.100.45 any eq 22
access-list 150 deny tcp host 10.10.100.45 any eq 443
access-list 150 deny udp host 10.10.100.45 any eq 5060
access-list 150 deny udp host 10.10.100.45 any range 10000 10500
access-list 150 deny ip 10.10.110.0 0.0.0.255 any
access-list 150 deny ip 10.10.120.0 0.0.0.255 any
access-list 150 deny ip 10.10.130.0 0.0.0.255 any
access-list 150 permit ip 10.10.100.0 0.0.0.255 any
!
route-map server-nat permit 10
match ip address 110
set ip next-hop 10.10.200.3
!
!
!
!
control-plane
!
!
!
!
!
!
!
!
banner motd ^CC
<@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>
Authorized access only
<@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@>
Disconnect IMEDIATELY if you are not an authorized user !
^C
!
line con 0
login local
transport output telnet
line aux 0
login local
transport output telnet
line vty 0 4
access-class 103 in
privilege level 15
login local
transport input ssh
line vty 5 15
access-class 103 in
privilege level 15
login local
transport input ssh
!
end
Hello Jason,
you will find articles from may saying that MS AutoFix feature does not work well with some firewall stateful inspection and/or VPN.
At CSC, I found another interesting:
https://supportforums.Cisco.com/thread/2169557
Maybe Joseph joins this discussion later with some new or additional information.
Best regards
Rolf
Maybe you are looking for
-
Satellite A500: card reader cause BSOD
Hi I have a satellite A500 and its card reader (jmicron) is dead.It is for me a bsod.I solved my problem without installing driver jmicron and use xp.In win 7 gives me a bsod always because win 7 driver jmicron. My question is:Can I remove the mother
-
Satellite U300 works without current alternative. can't stop either
Hi all I have a portable Satellite U300 - 13 k which was purchased recently (1 month ago) and has the following problems: 1. it does not start without power regardless of whether the battery is fully charged or notIt will come without the battery.Onc
-
Pavilion g6 2320 tx: I can't send files on blue tooth
my laptop model is pavilion g6 2320 tx. The factory installed OS has been version.later for 64-bit windows 8 I updated my os to 64-bit windows windows store 8.1 version. After the update I can't send all files on blue tooth on the other equipment, bu
-
My whole windows screen turned sideways. Do not know why. Can anyone help?
My whole windows screen turned sideways. Not sure how it happened. Does anyone know why this happened and how to fix it?
-
USB-Serial Cable Driver for Windows 7 64 bit
This question has been previously answered with a pointer to a url which seems to no longer work; for example,. http://www.prolific.com.tw/Eng/downloads.asp?ID=31 I'm a generic HTTP 500 Server error today, March 2, 10. Any ideas on where to go to get