STD + Cisco 8024f

Hello

I am trying to install

SwA (cisco WS-C3560G-24PS)

SWB (cisco WS-C3560G-24PS)

CFC (8024f)

SWD (8042f)

I stacked CFC & swd (such as CFCS).

My links are so

SWC 1/0/1 & 1/0/2 stacked related swc2/0/1 & 2/0/2. These are my stackable ports!

SwA gi0/16-online swc1/0/24

SWB gi0/16-online swc2/0/24

SwA has 2 links for EFA

bits of Cisco

SwA

spanning tree mode rapid pvst
spanning tree etherchannel guard misconfig
spanning tree extend id-system
VLAN spanning tree priority 4096 1,19,201-211

interface GigabitEthernet0/16
Description link Trunk at CFC
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 201-208 250
switchport mode trunk
! Shutdown

Interface Port - Channel 1
Description safe Inter-Switch
switchport trunk encapsulation dot1q
switchport mode trunk
bandwidth 2000000
!
interface GigabitEthernet0/1
Description safe Inter-Switch
switchport trunk encapsulation dot1q
switchport mode trunk
channel-group mode 1 on

interface GigabitEthernet0/24
Description safe Inter-Switch
switchport trunk encapsulation dot1q
switchport mode trunk
channel-group mode 1 on

SWB

spanning tree mode rapid pvst
spanning tree etherchannel guard misconfig
spanning tree extend id-system

interface GigabitEthernet0/16
Description link Trunk to swd
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 201-208 250
switchport mode trunk
! Shutdown

Interface Port - Channel 1
Description safe Inter-Switch
switchport trunk encapsulation dot1q
switchport mode trunk
bandwidth 2000000
!
interface GigabitEthernet0/1
Description safe Inter-Switch
switchport trunk encapsulation dot1q
switchport mode trunk
channel-group mode 1 on

interface GigabitEthernet0/24
Description safe Inter-Switch
switchport trunk encapsulation dot1q
switchport mode trunk
channel-group mode 1 on

on the 8024f

Configure
database of VLAN
VLAN 201-208 250
VLAN 1 1 routing
output
spanning tree mst mode

spanning tree mst configuration
instance 1 Add vlan 1
output
spanning tree mst configuration
instance 201 add vlan 201
output
spanning tree mst configuration
instance 202 Add vlan 202
output
spanning tree mst configuration
instance 203 Add vlan 203
output
spanning tree mst configuration
instance 204 add vlan 204
output
spanning tree mst configuration
instance 205 add vlan 205
output
spanning tree mst configuration
instance 206 Add vlan 206
output

spanning tree mst configuration
instance 207 Add vlan 207
output
spanning tree mst configuration
instance 208 Add vlan 208
output
spanning tree mst configuration
instance of 250 Add vlan 250
output
spanning tree mst configuration
name "SWC".
output

spanning tree mst configuration
revision 1
output

interface Te1/0/24
full duplex
Description "CFC to swa.
switchport mode trunk
switchport trunk allowed vlan 201-208 250

interface Te2/0/24
full duplex
Description "swb swd."
switchport mode trunk
switchport trunk allowed vlan 201-208 250
output

research on the 8024f I see this on the port. Note it has not received all BPDU packets!

SWC

show the spanning tree tengigabitethernet 1/0/24

Te1/0/24 port permit Port Ext. cost: 20000
State: Forwarding role: designated
Identification of the port: 128.24 int. shipping cost: 20000
Fast port: no Protection from root: No.
Designated the bridge priority: 32768 address: D067. E5AF.1268
Identification of the designated port: cost of access road designated 128,24: 0
Root regional CSE: 80:00:D0:67:E5:AF:12:68 CST Port cost: 0
Root Guard..................................... FAKE
Loop Guard..................................... FAKE
TCN Guard...................................... FAKE
Portfast auto... TRUE
Port of time since the last reset counters... 0 day 19 h 12 min 57 sec
BPDU: 34588 sent, received 0

See the spanning tree 2/0/24 tengigabitethernet

Te2/0/24 port permit Port Ext. cost: 0
Status: Disabled role: disabled
Identification of the port: 128.48 int. Shipping costs: 0
Fast port: no Protection from root: No.
Designated the bridge priority: 32768 address: D067. E5AF.1268
Identification of the designated port: 128.48 designated path cost: 0
Root regional CSE: 80:00:D0:67:E5:AF:12:68 CST Port cost: 0
Root Guard..................................... FAKE
Loop Guard..................................... FAKE
TCN Guard...................................... FAKE
Portfast auto... TRUE
Port of time since the last reset counters... 0 day 18 h 41 min 36 sec
BPDU: 689 sent, received 0

see the summary of spanning tree

Spanning Tree Adminmode... Activated
Spanning Tree Version... IEEE 802. 1 S
BPDU guard mode... People with disabilities
BPDU flood mode... People with disabilities

Mode filter BPDU. People with disabilities
Configuration name... CFC
Review configuration level... 1
Digest configuration key... 0x46511ebde89aab9201e08f03a0f29719
Format of configuration selector... 0

When I check there are 2 roots 1 on the valleys and 1 on the cisco... the cisco work

SwA

SH interface spanning tree g0/16

Role of VLAN m Prio.Nbr cost Type
------------------- ---- --- --------- -------- --------------------------------
VLAN0201 Desg FWD 4 128.16 P2p
VLAN0202 Desg FWD 4 128.16 P2p
VLAN0203 Desg FWD 4 128.16 P2p
VLAN0204 Desg FWD 4 128.16 P2p
VLAN0205 Desg FWD 4 128.16 P2p
VLAN0207 Desg FWD 4 128.16 P2p
VLAN0208 Desg FWD 4 128.16 P2p
VLAN0250 Desg FWD 4 128.16 P2p

SH detail g0/16 interface spanning tree

Port 16 (GigabitEthernet0/16) VLAN0201 is designated transfer
Port path costs 4, 128, Port identifier 128.16 Port priority.
Designated root a priority 4297, address 001e.bde0.ea00
Designated bridge has priority 4297, address 001e.bde0.ea00
Designated port ID is 128.16, designated path cost 0
Timers: 0 delay the message age 0, forward, hold 0
Number of transitions to the transmission of State: 1
Type of connection is from point to point by default
BPDU: 34489 sent, received 4

Show bridge spanning tree

Hello Max Fwd
VLAN ID time bridge age Dly Protocol
---------------- --------------------------------- -----  ---  ---  --------
VLAN0001 4097 (4096, 1) 2 20 15 rstp 001e.bde0.ea00
4115 VLAN0019 (4096, 19) 2 20 15 rstp 001e.bde0.ea00
VLAN0201 4297 (4096, 201) 2 20 15 rstp 001e.bde0.ea00
4298 VLAN0202 (4096, 202) 2 20 15 rstp 001e.bde0.ea00
VLAN0203 4299 (4096, 203) 2 20 15 rstp 001e.bde0.ea00
VLAN0204 4300 (4096, 204) 2 20 15 rstp 001e.bde0.ea00
4301 VLAN0205 (4096, 205) 2 20 15 rstp 001e.bde0.ea00
VLAN0207 4303 (4096, 207) 2 20 15 rstp 001e.bde0.ea00
4304 VLAN0208 (4096, 208) 2 20 15 rstp 001e.bde0.ea00
VLAN0209 4305 (4096, 209) 2 20 15 rstp 001e.bde0.ea00
Rstp 001e.bde0.ea00 2 20 15 VLAN0250 33018 (32768, 250)

I have no installation of STD on the cisco...  It's the first time I touch STD

I guess if I get BPDUS be seen his will start working

I had found a white paper before 8024f and stp, but as is typical I can't find it now!

OK so finally managed to do work. everything moved to STD.

There is a long and complicated why reason not to use STD wit pvst + (or anything else outside of STDs).

He ha with convergence and how stp manages the VLAN and the lag!

an I had install STD on the two end bang just worked

Tags: Dell Switches

Similar Questions

  • Port of uplink on PowerConnect 8024F went to the D State down

    Hi all

    We had a strange behavior on one of our switches PowerConnect 8024F. The uplink port of the device (connected to a port on a Cisco Catalyst 6513 10Gig) came down. The output of 'show interfaces status' looked like this:

    Port speed Duplex Neg frothing link Description
    Status of the State
    ---------  -------------------------  ------  -------  ----  ------ ------------
    TE1/0/1 cat6500-rz-1 (te11/2) 10000 Full Off D-low idle
    TE1/0/2 pc8024-ub-1 (te1, 0, 1) complete 10000 Off place Active
    TE1/0/3 pc8024-uv-1 (te1, 0, 1) complete 10000 Off place Active
    TE1/0/4 pc5500-naf02n-1 (te1, 0, 1) complete 10000 Off place Active
    TE1/0/5 pc5500-naf04n-1 (te1, 0, 1) complete 10000 Off place Active
    TE1/0/6 pc5500-naf03-1 (te1, 0, 2) 10000 Full Active Off
    TE1/0/7 pc8024-mensa-1 (te1, 0, 1) complete 10000 Off place Active
    Defekt TE1/0/8 n/a unknown inactive low Auto
    TE1/0/9 pc5500-naf03-2 (te1, 0, 1) complete 10000 Off place Active
    TE1/0/10 pc5500-naf03-3 (te1, 0, 1) complete 10000 Off place Active
    ...

    .. and so on. Firmware is 5.1.2.3. We rebooted the device and he returned to normal behavior.

    Now, can someone explain to me what the "D-Down" State means? I have not found anything in the documentation and using google not any success.

    The configuration of the port looks like the following:

    Description ' cat6500-rz-1 (te11/2).
    MTU 9216
    switchport mode general
    switchport general allowed vlan add 4-5, 14, 22-2729-33, 36, 39-41, 43 tag
    switchport general allowed vlan add 47,51-52,54-56,58-60,63-64,66,75,78-79 tag
    switchport general allowed vlan add 81, 86-90, 93-99, 107, 120, 122 tag
    switchport general allowed vlan add 124 132 - 135, 137, 140, 142-143 147-152 154 tag
    switchport general allowed vlan add 156-157, 160, 165-166, 171, 173-175 the tag
    switchport general allowed vlan add 177-178 180-181, 183, 189, 192, 195-196 the tag
    switchport general allowed vlan add 199,201,203-205 207-208 210-212 the tag
    switchport general allowed vlan add 219-222 224-225 227-233 235-244 246 tag
    switchport general allowed vlan add 248-249, 253, 256, 258-260 262-267 tag
    switchport general allowed vlan add 269-272 274-276 278-279, 282, 284, 286-288 the tag
    switchport general allowed vlan add 292 295 - 298, 323, 344, 347, 349 tag
    switchport general allowed vlan add 354,362,366,370,372,378-380 382-383 385-386 tag
    switchport general allowed vlan add 391,399,405,431,443,447 tag
    switchport general allowed vlan add 475-476, 485, 488, 511, 522, 584, 700-703 710-714 tag
    switchport general allowed vlan add 725,734,838,854-855 909 tag
    switchport general allowed vlan add 950 961 - 962, 981, 999, 1234, 1236, 2205, 2218-2220 tag
    switchport general allowed vlan add 2222,2233,2414,2417 tag
    switchport general allowed vlan add 2506-2507, 2519, 2521, 2621, 2699 tag
    Access-group PVST Mac - filter 1
    LLDP transmit tlv sys - name sys - cap
    LLDP transmit-mgmt

    The used mac filter access PVST-group is:

    Mac-extended access list filter-PVST
    refuse any 0100.0CCC. RCC 0000.0000.0000
    allow a full
    output

    Thanks for reading and suggestions!

    Robin

    It's all associated spanning-tree protocols. D to the bottom is synonymous with diagnostic downwards, which occurs if more than 15 BPDU per second is received during 3 seconds. The switch closes the port. USL worker task is bound traffic so a big change covering tree cause it's really high.

  • SKUs recovery Cisco UCS and expired ESW

    I have a client who has expired ESW, but still the UCS. I got the word that there is a recovery sku (L-REINST-UWL-STD), but is not in the CCW. Anyone can shed some light on this?

    I suggest that you take a look at the v9 OG CUWL, you will need to use the highest level SKU:

    L CUWL-MISC

    I just tested it and it works

    Reference:

    http://www.Cisco.com/Web/partners/downloads/partner/WWChannels/technology/IPC/downloads/finalcopy.PDF

    Best regards

    Jaime

  • Cisco JOINT and IPS hardware bypass

    Hi all

    I have a question about the Cisco JOINT, ASA - AIP - SSM (IPS) and material of the IPS 4200 bypass unit series. Please let me know if the material fails in both cases how to cross traffic. Is there any circumvention of integrated equipment built in the same

    Concerning

    Ankur

    Sorry for the late reply. I've been on vacation for a week.

    ByPass hardware is not available for the JOINT-2 no matter if you use inline vlan pairs or couples inline interface.

    For devices need special interface cards or a hardware bypass switch separate, and none of them are available on the JOINT-2.

    You must configure your network so that there is a second way around the JOINT 2 JOINT-2 failure.

    This can be done with a standard network cable.

    Suppose you have your JOINT-2 configured for inline vlan VLAN 10 matching and 20.

    Configure a standard switchport as an access port on vlan 10.

    Set up an another standard switchport as an access port on vlan 20.

    Now using a standard network cable connect these 2 all switch ports.

    Stop your JOINT-2 and traffic should now be passed through this network cable and your network connectivity must be maintained.

    Bring your JOINT-2 backup, and now spanning tree runs and will choose the JOINT-2 or the network as the main way and the other cable will set in a State of block.

    Run ' show vlan spanning-tree 10 ' and ' show vlan spanning tree 20 "to determine if the cable ports or port JOINT-2 is in a BLK State.»

    If the cable ports are in a State BLK, then you don't need to modify the spanning tree.

    If the JOINT-2 port is in a State BLK, then you need to change the spanning tree cost and/or priority for JOINT-2 port by using the following commands:

    -[No] port-channel channel_number-STP intrusion detection doesn't cost port_cost

    Defines the cost of port tree covering for the data port on the specified module. Without the option restore shipping tree covering for the data port on the module specified in the default value.

    -[not] port-channel channel_number spanning tree priority priority intrusion detection

    Sets the priority of the port spanning tree for the data port on the specified module. Without the option restores the priority of port spanning tree for the data port on the module specified in the default value.

    To learn more about spanning-tree and how these parameters interact with spanning tree you can look through this section of the user guide for the switch or to search cisco.com for documentation of spanning tree:

    http://www.Cisco.com/en/us/partner/docs/switches/LAN/catalyst6500/IOS/12.2Sx/configuration/guide/spantree.html

    NOTE: Your switch must be configured for rapid PVST for failover more rapid. Work with your administrator to switch to determine which spanning tree Protocol is used on your switch. The JOINT-2 does not work with STDS to ensure that STD is not used.

  • Cisco AnyConnect VPN question

    I am ASA 5505 that I am of is running correctly by using the AnyConnect client. The question is, can I connect to the fine external interface, but cannot ping or attach them to any host on the inside. When I connect, it accepts the user name and password, and I can run the ASDM or SSH to the firewall very well, but not further. In the control, after I log in, I get an IP address inside, of the order of 10.7.30.x as expected.

    Following configuration:

    : Saved
    :
    ASA Version 8.2 (5)
    !
    asa5505 hostname
    domain BLA
    activate the password * encrypted
    passwd * encrypted
    no names

    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    switchport access vlan 150
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 10.7.30.1 255.255.255.0
    !
    interface Vlan2
    nameif outside
    security-level 0
    IP EXTERNAL IP 255.255.255.128
    !
    interface Vlan150
    nameif WLAN_GUESTS
    security-level 50
    IP 10.7.150.1 255.255.255.0
    !
    boot system Disk0: / asa825 - k8.bin
    config to boot Disk0: / running-config
    passive FTP mode
    clock timezone STD - 7
    DNS server-group DefaultDNS
    domain BLA
    permit same-security-traffic intra-interface
    object-group service tcp Webaccess
    port-object eq www
    EQ object of the https port
    object-group network McAfee
    network-object 208.65.144.0 255.255.248.0
    network-object 208.81.64.0 255.255.248.0
    access extensive list ip 10.7.30.0 outside_1_cryptomap allow 255.255.255.0 192.168.24.0 255.255.252.0
    access extensive list ip 10.7.30.0 inside_nat0_outbound allow 255.255.255.0 192.168.24.0 255.255.252.0
    access extensive list ip 10.7.30.0 inside_nat0_outbound allow 255.255.255.0 172.16.10.0 255.255.255.0
    outside_access_in list extended access permit tcp any host 159.87.30.252 eq smtp
    outside_access_in list extended access permit tcp any host 159.87.30.136 Webaccess object-group
    outside_access_in list extended access permit tcp any host 159.87.30.243 Webaccess object-group
    access-list extended outside_access_in permit tcp host 159.87.70.66 host 159.87.30.251 eq lpd
    outside_access_in list extended access permit tcp any host 159.87.30.252 Webaccess object-group
    outside_access_in list extended access permit tcp any host 159.87.30.245 Webaccess object-group
    outside_access_in list extended access permitted tcp object-group McAfee any eq smtp
    permit access list extended ip 172.16.10.0 outside_access_in 255.255.255.0 10.7.30.0 255.255.255.0
    outside_access_in list extended access permit ip host 159.87.64.30 all
    standard access list vpn_users_splitTunnelAcl allow 10.7.30.0 255.255.255.0
    IPS_TRAFFIC of access allowed any ip an extended list
    access extensive list ip 10.7.30.0 outside_nat0_outbound allow 255.255.255.0 any
    inside_access_in list extended access permit udp 10.7.30.0 255.255.255.0 any eq snmp
    access extensive list ip 10.7.30.0 outside_cryptomap allow 255.255.255.0 172.16.10.0 255.255.255.0
    pager lines 24
    Enable logging
    asdm of logging of information
    host of logging inside the 10.7.30.37
    Debugging trace record
    Within 1500 MTU
    Outside 1500 MTU
    MTU 1500 WLAN_GUESTS
    local pool VPN_POOL 10.7.30.190 - 10.7.30.200 255.255.255.0 IP mask
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image disk0: / asdm-645 - 206.bin
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 0-list of access inside_nat0_outbound
    NAT (inside) 1 0.0.0.0 0.0.0.0
    NAT (outside) 0-list of access outside_nat0_outbound
    NAT (WLAN_GUESTS) 1 0.0.0.0 0.0.0.0
    public static 159.87.30.251 (Interior, exterior) 10.7.30.50 netmask 255.255.255.255
    public static 159.87.30.245 (Interior, exterior) 10.7.30.53 netmask 255.255.255.255
    public static 159.87.30.252 (Interior, exterior) 10.7.30.30 netmask 255.255.255.255
    public static 159.87.30.243 (Interior, exterior) 10.7.30.19 netmask 255.255.255.255
    public static 159.87.30.136 (Interior, exterior) 10.7.30.43 netmask 255.255.255.255
    Access-group inside_access_in in interface inside the control plan
    Access-group outside_access_in in interface outside
    Route outside 0.0.0.0 0.0.0.0 159.87.30.254 1
    Route inside 172.16.1.0 255.255.255.0 10.7.30.1 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    AAA-server ADWM-FPS-02 nt Protocol
    AAA-server ADWM-FPS-02 (inside) host 10.7.30.32
    Timeout 5
    auth-domain NT ADWM-FPS-02 controller
    AAA-server ADWM-FPS-02 (inside) host 10.7.30.49
    auth-DC NT ADWM-DC02
    AAA authentication http LOCAL console
    AAA authentication LOCAL telnet console
    the ssh LOCAL console AAA authentication
    Enable http server
    http 206.169.55.66 255.255.255.255 outside
    http 206.169.50.171 255.255.255.255 outside
    http 10.7.30.0 255.255.255.0 inside
    http 206.169.51.32 255.255.255.240 outside
    http 159.87.35.84 255.255.255.255 outside
    SNMP-server host within the 10.7.30.37 community * version 2 c
    location of the SNMP server *.
    contact SNMP Server
    Community SNMP-server
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    Crypto-map dynamic outside_dyn_map pfs set 20 Group1
    card crypto outside_map 1 match address outside_1_cryptomap
    peer set card crypto outside_map 1 206.169.55.66
    map outside_map 1 set of transformation-ESP-3DES-MD5 crypto
    card crypto outside_map 2 match address outside_cryptomap
    peer set card crypto outside_map 2 159.87.64.30
    card crypto outside_map 2 game of transformation-ESP-AES-192-SHA
    map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map
    outside_map interface card crypto outside
    Crypto ca trustpoint *.
    Terminal registration
    full domain name *.
    name of the object *.
    MYKEY keypairs
    Configure CRL
    Crypto ca trustpoint A1
    Terminal registration
    fqdn ***************
    name of the object *.
    MYKEY keypairs
    Configure CRL
    Crypto ca trustpoint INTERMEDIARY
    Terminal registration
    no client-type
    Configure CRL
    Crypto ca trustpoint _SmartCallHome_ServerCA
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint0
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint1
    Configure CRL
    ca encryption certificate chain *.
    certificate ca 0301
    BUNCH OF STUFF
    quit smoking
    A1 crypto ca certificate chain
    OTHER LOTS of certificate
    quit smoking
    encryption ca INTERMEDIATE certificate chain
    YET ANOTHER certificate
    quit smoking
    Crypto ca certificate chain _SmartCallHome_ServerCA
    certificate ca LAST BOUQUET
    quit smoking
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    No encryption isakmp nat-traversal
    Telnet 10.7.30.0 255.255.255.0 inside
    Telnet timeout 30
    SSH 206.169.55.66 255.255.255.255 outside

    SSH timeout 5
    Console timeout 0
    management-access inside
    dhcpd 4.2.2.2 dns 8.8.8.8
    !
    dhcpd address 10.7.150.10 - 10.7.150.30 WLAN_GUESTS
    enable WLAN_GUESTS dhcpd
    !

    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    SSL encryption rc4 - md5 of sha1
    SSL-trust A1 out point
    WebVPN
    allow outside
    AnyConnect essentials
    SVC disk0:/anyconnect-dart-win-2.5.2019-k9.pkg 1 image
    enable SVC
    attributes of Group Policy DfltGrpPolicy
    Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn
    internal VPNUsers group strategy
    Group Policy VPNUsers attributes
    value of server DNS 10.7.30.20
    Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list vpn_users_splitTunnelAcl
    dwm2000.WM.State.AZ.us value by default-field
    Split-dns value dwm2000.wm.state.az.us
    username HCadmin password * encrypted privilege 15
    attributes global-tunnel-group DefaultWEBVPNGroup
    address VPN_POOL pool
    authentication-server-group ADWM-FPS-02
    strategy - by default-VPNUsers group
    tunnel-group 206.169.55.66 type ipsec-l2l
    IPSec-attributes tunnel-group 206.169.55.66
    pre-shared key *.
    tunnel-group 159.87.64.30 type ipsec-l2l
    IPSec-attributes tunnel-group 159.87.64.30
    pre-shared key *.
    !
    class-map IPS_TRAFFIC
    corresponds to the IPS_TRAFFIC access list
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    inspect the icmp
    Review the ip options
    class IPS_TRAFFIC
    IPS inline help
    !
    global service-policy global_policy
    field of context fast hostname
    anonymous reporting remote call
    call-home
    Profile of CiscoTAC-1
    no active account
    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
    email address of destination [email protected] / * /
    destination-mode http transport
    Subscribe to alert-group diagnosis
    Subscribe to alert-group environment
    Subscribe to alert-group monthly periodic inventory
    monthly periodicals to subscribe to alert-group configuration
    daily periodic subscribe to alert-group telemetry
    Cryptochecksum:e70de424cf976e0a62b5668dc2284587
    : end
    ASDM image disk0: / asdm-645 - 206.bin
    ASDM location 159.87.70.66 255.255.255.255 inside
    ASDM location 208.65.144.0 255.255.248.0 inside
    ASDM location 208.81.64.0 255.255.248.0 inside
    ASDM location 172.16.10.0 255.255.255.0 inside
    ASDM location 159.87.64.30 255.255.255.255 inside
    don't allow no asdm history

    Anyone have any ideas?

    Hello

    Please, add this line in your configuration and let me know if it works:

    access extensive list ip 10.7.30.0 inside_nat0_outbound allow 255.255.255.0 10.7.30.0 255.255.255.0

    I ask you to add that it is because you have not specified any exceptions for the return shipping. Once you add to it, will allow you to go through the tunnel VPN, packets back. When this command is not there, you will be able to access everything on the SAA but nothing behind it.

    Let me know if it helps.

    Thank you

    Vishnu

  • Configuration Cisco 1905.

    I have a facility where the client uses 1905 router to access the Internet. They have a local network with 192.168.1.0/24 segment and a segment of WAN of 150.129.126.168/29 provided by the ISP.

    Currently, they use a D-Link router for internet access and his works fine. But when we use the Cisco router with config below, users are unable to access the internet.

    Cisco config:

    gi0/0---192.168.1.1/24 (LAN) interface

    interface gi0/1---150.129.126.170/29 (WAN)

    IP route - 0.0.0.0 0.0.0.0 150.129.126.169

    Pool DHCP - 192.168.1.180 to 192.168.1.199

    Now, since we use Pvt Ip in the network segment local and Public WAN, I feel that we must run NAT for users to access the internet. But not quite sure how to do it.

    Any suggestions and help in this regard would be highly appreciated :).

    Hi chinmoy.boruah1,

    You can use the following commands:

    R1 (config) #ip - 7 standard access list

    R1 (config-std-nacl) #permit 192.168.1.0 0.0.0.255

    R1 (config) #ip nat inside source list 7 g0/1 interface overload

    R1 (config) #interface gi0/0

    R1(Config-if) #ip nat inside

    R1 (config) #interface gi0/1

    R1(Config-if) nat outside #ip

    If you need more information about the different ways to configure nat this will help you to:

    http://www.Cisco.com/c/en/us/TD/docs/iOS-XML/iOS/ipaddr_nat/configuratio...

    Hope this info helps!

    Note If you help!

    -JP-

  • Cisco's VPN IPSec client for LAN connectivity

    I've looked through further discussions and were not able to find a clear answer on this, so I apologize if this is a duplicate question.

    I have the client setup Cisco VPN on an ASA 5505 with tunneling split. I can connect to the VPN very well. I can access the internet fine. I can't get the LAN, however. I try to do a ping, telnet, rdp, etc devices on the side LAN of the firewall without a bit of luck. I have torn down and configure the VPN several times via the CLI and I even used various configurations by using the wizard, all this without a bit of luck. Any help would be appreciated.

    ASA Version 8.2 (2)

    !

    hostname spp-provo-001-fwl-001

    domain servpro.local

    activate the F7n9M1BQr1HPy/zu encrypted password

    F7n9M1BQr1HPy/zu encrypted passwd

    no names

    name 10.0.0.11 Exch-Srv

    name 10.0.0.12 DRAC

    name 10.0.0.10 DVR

    !

    interface Vlan1

    nameif inside

    security-level 100

    the IP 10.0.0.1 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    ServPro PPPoE client vpdn group

    IP address pppoe setroute

    !

    interface Vlan12

    nameif Guest_Wireless

    security-level 90

    IP 10.10.0.1 address 255.255.255.0

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    switchport access vlan 12

    !

    exec banner * only authorized access *.

    exec banner * this system is the property of ServPro. Unplug IMMEDIATELY that you are not an authorized user. *

    connection of the banner * only authorized access *.

    connection of the banner * this system is the property of ServPro. Unplug IMMEDIATELY that you are not an authorized user. *

    banner asdm * only authorized access *.

    banner asdm * this system is the property of ServPro. Unplug IMMEDIATELY that you are not an authorized user. *

    boot system Disk0: / asa822 - k8.bin

    passive FTP mode

    clock timezone STD - 7

    clock to summer time recurring MDT

    DNS lookup field inside

    DNS server-group DefaultDNS

    10.0.0.11 server name

    Name-Server 8.8.8.8

    domain servpro.local

    DRACServices tcp service object-group

    EQ port 5900 object

    EQ object of the https port

    EQ object Port 5901

    object-group service Exch-SrvServices tcp

    EQ port 587 object

    port-object eq 993

    port-object eq www

    EQ object of the https port

    port-object eq imap4

    EQ Port pop3 object

    EQ smtp port object

    SBS1Services tcp service object-group

    EQ port 3389 object

    port-object eq www

    EQ object of the https port

    EQ smtp port object

    outside_access_in list extended access permit tcp any host *. *. *. * object-group SrvServices Exch

    outside_access_in list permits all icmp access *. *. *. * 255.255.255.248

    capture a whole list of access allowed icmp

    Servpro_splitTunnelAcl list standard access allowed 10.0.0.0 255.255.255.0

    inside_nat0_outbound to access ip 10.0.0.0 scope list allow 255.255.255.0 172.16.10.0 255.255.255.240

    inside_nat0_outbound list of allowed ip extended access any 172.16.10.0 255.255.255.240

    guest_wireless_in list extended access permitted tcp a whole

    guest_wireless_in of access allowed any ip an extended list

    NO_NAT to access ip 10.0.0.0 scope list allow 255.255.255.0 10.10.0.0 255.255.255.0

    pager lines 24

    Enable logging

    asdm of logging of information

    Within 1500 MTU

    Outside 1500 MTU

    MTU 1500 Guest_Wireless

    mask 172.16.10.1 - 172.16.10.14 255.255.255.240 IP local pool ServProDHCPVPN

    no failover

    ICMP unreachable rate-limit 1 burst-size 1

    ASDM image disk0: / asdm - 625.bin

    don't allow no asdm history

    ARP timeout 14400

    NAT-control

    Global 1 interface (outside)

    NAT (inside) 0-list of access inside_nat0_outbound

    NAT (inside) 1 0.0.0.0 0.0.0.0

    NAT (Guest_Wireless) 1 0.0.0.0 0.0.0.0

    static (inside, outside) *. *. *. * 10.0.0.11 netmask 255.255.255.255

    Access-group outside_access_in in interface outside

    Access-group guest_wireless_in in the Guest_Wireless interface

    Route outside 0.0.0.0 0.0.0.0 *. *. *. * 2 track 2

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    dynamic-access-policy-registration DfltAccessPolicy

    AAA-server Exch-Srv Protocol nt

    AAA-server Exch-Srv (inside) host 10.0.0.11

    Timeout 5

    auth-NT-PDC SRV EXCH

    the ssh LOCAL console AAA authentication

    AAA authentication LOCAL telnet console

    AAA authentication http LOCAL console

    LOCAL AAA authentication serial console

    Enable http server

    http server idle-timeout 10

    http 10.0.0.0 255.255.255.0 inside

    http 0.0.0.0 0.0.0.0 outdoors

    redirect http outside 80

    redirect http inside 80

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    monitor SLA 124

    type echo protocol ipIcmpEcho 4.2.2.2 outside interface

    NUM-package of 3

    frequency 10

    Annex monitor SLA 124 life never start-time now

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set

    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    outside_map interface card crypto outside

    Crypto ca trustpoint ASDM_TrustPoint0

    registration auto

    name of the object CN = cisco.spprovo.com

    ServPro key pair

    Configure CRL

    string encryption ca ASDM_TrustPoint0 certificates

    certificate f642be4b

    308202fc 308201e4 a0030201 020204f6 42be4b30 0d06092a 864886f7 0d 010105

    311a 3018 05003040 06035504 03131163 6973636f 2e737070 726f766f 2e636f6d

    31223020 06092 has 86 01090216 13636973 636f2e73 726f2e6c 65727670 4886f70d

    6f63616c 31303034 30383230 35363232 30303430 35323035 5a170d32 301e170d

    3632325a 3040311a 30180603 55040313 and 11636973 636f2e73 7070726f 766f2e63

    6f6d3122 30200609 2a 864886 f70d0109 02161363 6973636f 2e736572 7670726f

    2e6c6f63 616c 3082 0122300d 06092 has 86 01010105 00038201 0f003082 4886f70d

    010a 0282 010100 has 5 b4646cde f981f048 efa54c8a 4ba4f51c 25471e01 459ea905

    313ef490 72b4d853 4e95ab7d a8c1350e 5728dca6 a98c439e 2c12d219 06ee7209

    9f2584d1 b2abf71c 31c0890f 3098533b 6bc3ad4b 3bcd8986 e70ca78e 07a749d6

    ee4e0892 4fcb79b6 724f7012 9f42fc2f b80c17ed adb5d36b 67590061 453d9ae6

    16583d 36 5a22b7c2 737fd705 94656f3f 578fb67f 79bd2a59 17522be3 d2386e22

    2c62352f cda317b0 be805a04 76f19989 34031cbd a5fc62a7 1d9f52f3 00cf60b6

    bbbdc4f0 fb651b82 b3e22a0a 718ff0b4 e213f4ac cdeb413b 9c4a47c3 9134d7a9

    e8dcf2c5 c1cd4075 61d75e3a 475a17f1 2f955741 9ed2a8d6 c381eba3 247134e1

    b5c33fac 7ae03d02 03010001 300 d 0609 2a 864886 05050003 82010100 f70d0101

    156 5fde62c5 b4cbb0f4 0c61fab7 fae04399 27457ab7 9790c 3fac914d 70595db9

    e69d3f19 3476dc51 32c885de b5904030 05624fe0 e8983e0a ab5527f3 8c5dd64a

    1e1a6082 b6091657 8704c 539 a3c6be47 da2a871f 4fafe668 70db2c2b 573d47b2

    7f3df02f c9d53a92 bcf5f518 9953e14c f957a6ca 279f9e9f ddbd2561 6e0503c2

    ba59a165 055d697f dd028d00 5cc288c4 83ced827 9c82ef3e 7e67f2d2 6de573e3

    42a0b6bf ef8d06ed cb9805f2 c38011d3 5263bc3f 5b68df7a bef36c40 8c5e33f3

    26b02c27 63a9848c 8461738f cd19ae95 f059ee34 afe4bdbc 8d8d2335 751b 0621

    65464b2c 4649779d 3ba01b69 8977 has 790 73815f8b 3c483f93 a5ca9685 04b6e18a

    quit smoking

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    No encryption isakmp nat-traversal

    !

    Track 2 rtr 124 accessibility

    Telnet 10.0.0.0 255.255.255.0 inside

    Telnet timeout 10

    SSH 10.0.0.0 255.255.255.0 inside

    SSH 0.0.0.0 0.0.0.0 outdoors

    SSH timeout 10

    SSH version 2

    Console timeout 10

    VPDN group ServPro request dialout pppoe

    VPDN group ServPro localname *

    VPDN group ServPro ppp authentication pap

    password username * VPDN * local store

    dhcpd outside auto_config

    !

    dhcpd address 10.10.0.100 - 10.10.0.227 Guest_Wireless

    dhcpd dns 8.8.8.8 4.2.2.2 interface Guest_Wireless

    enable Guest_Wireless dhcpd

    !

    a basic threat threat detection

    threat detection statistics

    a statistical threat detection tcp-interception rate-interval 30 burst-400-rate average rate 200

    NTP server 38.117.195.101 source outdoors

    NTP server 72.18.205.157 prefer external source

    SSL-trust outside ASDM_TrustPoint0 point

    WebVPN

    allow outside

    SVC disk0:/anyconnect-win-2.3.0254-k9.pkg 1 image

    enable SVC

    tunnel-group-list activate

    attributes of Group Policy DfltGrpPolicy

    Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn

    Servpro internal group policy

    Group Policy attributes Servpro

    Server DNS 10.0.0.11 value

    Protocol-tunnel-VPN IPSec svc webvpn

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list Servpro_splitTunnelAcl

    SERVPRO.local value by default-field

    servpro encrypted NtdaWcySmet6H6T0 privilege 15 password username

    servpro username attributes

    type of service admin

    username, encrypted bHGJDrPmHaAZY/78 Integratechs password

    tunnel-group Servpro type remote access

    attributes global-tunnel-group Servpro

    address pool ServProDHCPVPN

    authentication-server-group LOCAL Exch-Srv

    strategy-group-by default Servpro

    tunnel-group Servpro webvpn-attributes

    enable ServPro group-alias

    IPSec-attributes tunnel-group Servpro

    pre-shared key *.

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    Review the ip options

    inspect the icmp

    !

    global service-policy global_policy

    context of prompt hostname

    call-home

    Profile of CiscoTAC-1

    no active account

    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address

    email address of destination [email protected] / * /

    destination-mode http transport

    Subscribe to alert-group diagnosis

    Subscribe to alert-group environment

    Subscribe to alert-group monthly periodic inventory

    monthly periodicals to subscribe to alert-group configuration

    daily periodic subscribe to alert-group telemetry

    Cryptochecksum:52bca254012b1b05cca7dfaa30d1c42a

    : end

    Most likely you are behind a router PAT when you are connected to the VPN, so please allow the following:

    Crypto isakmp nat-traversal 30

  • integrated macOS Sierra Cisco IPsec VPN does not work anymore (impossible to validate the server certificate)

    Hello

    I just upgraded to macOS Sierra and built-in Cisco IPsec VPN no longer works. When you try to connect, I get a "cannot validate the certificate of the server. "Check your settings and try to reconnect" error message. I use Cisco ASA with self-signed certificates and everything worked fine with previous versions of OS X.

    Please help me, I need my VPN Thx a lot

    I am having the same problem with StrongSwan and help cert signed with the channel to complete certificates included in the pkcs12 file imported to the keychain. It was working properly in El Capitan, but now broken in the Sierra.

  • Cisco VPN does not work in the Sierra

    I just upgraded to OS Sierra and the Cisco VPN, I had the installer does connect more.  The Setup looks right into network preferences. When I click it looks like it is trying but stops without asking for a password.

    Cisco VPN client may need to update or re-installed. If she uses the PPTP Protocol, it will not work. Support for PPTP was ignored, because it is no longer considered as secure.

  • Cisco Jabber

    Good afternoon; I have the Cisco Jabber Software running on an Iphone 6 Plus, everything works well when the phone is unlock, when the phone is locked can not answer the calls received by the Cisco Jabber only a window appears with a message that I have a call, but I can't answer. Is there a way to solve this problem. ????

    Greetings.

    Fernando

    Since this request is not an Apple application, I suggest make you contact with the developer of application or their support and ask your question.

  • If I can do an Airport Extreme mobile network with a modem/router cable xfinity manufactured by Cisco?

    Can I create an Airport Extreme (current generation) network of roaming with a cable modem/router xfinity manufactured by Cisco (DPC3939 to be exact)?  The modem-router Cisco/Xfinity put into bridge mode?

    Can I create an Airport Extreme (current generation) network of roaming with a cable modem/router xfinity manufactured by Cisco (DPC3939 to be exact)?

    Yes, if the Airport Extreme will be connected to the Cisco DPC3939 back using wired Ethernet wired, permanent.

    The modem-router Cisco/Xfinity put into bridge mode?

    No. I you have done this, the Cisco/Xfinity device would only act as a simple modem... so it would not be a wireless service to all.

    A note of caution here... the support document you are referencing... Wi - Fi base stations: install and configure a roaming network (802.11 a/b/g/n)... use the examples that are long outdated does not follow with the versions present on a Mac AirPort Utility or iPhone/iPad.

    There are some good general information in the document.

  • Is it possible to download a previous version of firefox that latest update blocks the characteristics I absolutely have to have for my cisco courses?

    I can't get my password box or my java tool correctly load or work on the update for firefox java tool is something that I have to complete my work in my cisco course. So I would like to know if there is a way to download and install an older version of firefox, so I have something I can do my job without having to use a browser that I don't have confidence.

    If you decide to try the version Extended Support Release (ESR) of Firefox, here is how I suggest to install:

    Clean reinstall it

    We use this name, but it isn't about deleting your settings, this is to ensure that the program, files are clean (not incompatible, corrupt or exotic code files). As described below, this process does not disrupt your existing settings. Don't uninstall NOT Firefox, that does not need.

    (A) download a fresh Installer for Firefox 38.2.0esr of https://www.mozilla.org/firefox/organizations/all/ in an ideal location. (Scroll down your preferred language).

    (B) the release of Firefox (if any).

    (C) to rename the program folder, either:

    (Windows 64-bit folder names)

    C:\Program Files (x86)\Mozilla Firefox
    

    TO

    C:\Program Files (x86)\Fx40
    

    (Windows 32-bit folder names)

    C:\Program Files\Mozilla Firefox
    

    TO

    C:\Program Files\Fx40
    

    (D) run the installer downloaded to (A). It should automatically connect to your existing settings.

    Install and run?

    Note: Some plugins can only exist in the old folder. If it is missing something essential, present in these files:

    • \Fx40\Plugins
    • \Fx40\browser\plugins
  • FireFox 39 Incompatible with all Cisco devices

    With the last update access to all devices Cisco via FireFox is no longer supported. Now, I get the following errors:

    The secure connection failed
    An error occurred during a connection to [IP]. SSL has received a low ephemeral Diffie-Hellman key in the handshake message exchange the server key. (Error code: ssl_error_weak_server_ephemeral_dh_key)
    The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.
    Contact the Web site owners to inform them of this problem.

    Is there a way to roll back the version to avoid this or a permanent fix? FireFox is currently the only browser that works very well with Cisco devices, and now it won't work at all.

    What happens if you set these false in two: config:

    Security.SSL3.dhe_rsa_aes_128_sha
    Security.SSL3.dhe_rsa_aes_256_sha

    Are you able to connect with disabled ciphers?

  • Is the plugin "OpenH264 video Codec provided by Cisco Systems, Inc." supposed to come with firefox?

    I recently reinstalled Firefox on my computer and now there is a plugin called "OpenH264 video Codec provided by Cisco Systems, Inc.". I've used Firefox for some time and have never seen this. -What is that supposed to be there. It come with the download of Firefox now?

    Hello DuckBilledPlatypus, yes it is a legitimate plugin that was introduced in firefox 33. for some technical experience on this subject, please see: http://andreasgal.com/2014/10/14/openh264-now-in-firefox/

  • How to install the Codec OpenH264 of Cisco?

    I noticed that almost every time I start my computer and open every night I get a popup to download to download the codec OpenH264 by Cisco. I did and I noticed that there was an entry for it in the Add-ons Manager Plugins section and it says "will be installed soon. He had me download is a zip file which contained two files. The one who gave a short explanation of the codec and a libgmpopenh264.so file. Now, I have no idea what do with the .so to obtain file installed it in every night.

    Does anyone else have this problem and what can I do about it? I am running Xubuntu 14.04 64-bit.

    I see Pref media.gmp - gmpopenh264. * on the topic: config page.
    Media.GMP - gmpopenh264.path displays the installation path that points to the gmp-gmpopenh264 file in the Firefox profile folder.

    Bug 1009909 - Firefox desktop: integrate the media openh264 plugin in the Add-ons Manager
    Bug 1032814 - plugins Gecko media shouldn't use of well-known places for plugins

    There is also a media.gmp - manager. * Pref.
    https://wiki.Mozilla.org/GeckoMediaPlugins
    Bug 957928 - support of Plugins Gecko of the Media (GMP)

Maybe you are looking for