Street no ASA Version 8.2 (2) para 12 trafego WAAS
Information need sober docks configuracao Street no ASA Version 8.2 (2) 12, e necessario para o trafego otimizado WAAS enable.
Obrigado.
Hi Jorge,.
I will answer in English if you don't mind.
By default, the ASA clears the WAAS TCP option.
To pass, you just need to apply inspect waas on the strategy of service interfaces where WAAS traffic is coming.
I wrote a paper a while back that explain this:
https://supportforums.Cisco.com/docs/doc-15128#Solution_on_ASA_723_or_FWSM_321_and_after
Kind regards
Nicolas
Tags: Cisco DataCenter
Similar Questions
-
I am at a loss, I can connect VIA VPN and Ping inside the IPs (192.168.1.2) and outside (4.2.2.2) IPs of the remote VPN client, but can't surf WWW. Inside the network, all users have WWW access and the network is fine. I'm new on the revisions to ver 8.3 and don't see what I'm missing?
Info:
ASA-A # sh xl
in use, the most used 12 4
Flags: D - DNS, e - extended, I - identity, i - dynamics, r - portmap,
s - static, T - twice, N - net-to-net
NAT inside:192.168.1.0/24 to outside:24.180.x.x/24
flags s idle 0:10:46 timeout 0:00:00
NAT outside:192.168.2.0/24 to outside:24.180.x./24
flags s idle 0:00:59 timeout 0:00:00
NAT inside:192.168.1.0/24 to any:192.168.1.0/24
sitting inactive flags 0:11:51 timeout 0:00:00
NAT any:192.168.2.0/24 to inside:192.168.2.0/24
sitting inactive flags 0:11:51 timeout 0:00:00
ASA-A #.ASA-A # sh nat
Manual NAT policies (Section 1)
1 (inside) to destination of (all) Inside_Net Inside_Net the VPN-NET VPN static static
translate_hits = 3, untranslate_hits = 3Auto NAT policies (Section 2)
1 (inside) (outside) static source Inside_Net 24.180.x.x
translate_hits = 3, untranslate_hits = 184
2 (outdoor) (outdoor) static source VPN-net 24.180.x.x
translate_hits 97, untranslate_hits = 91 =
ASA-A #.Journal of the Sho:
% 305013-5-ASA: rules asymmetrical NAT matched for flows forward and backward; Connection for udp src outside:192.168.2.10/137(LOCAL\User) dst outside:192.168.2.255/137 refused due to path failure reverse that of NAT
% ASA-609002 7: duration of outside local host: 192.168.2.255 disassembly 0:00:00
% ASA-609001 7: built outside local host: 192.168.2.255% 305013-5-ASA: rules asymmetrical NAT matched for flows forward and backward; Connection for udp src outside:192.168.2.10/137(LOCAL\User) dst outside:192.168.2.255/137 refused due to path failure reverse that of NAT
% ASA-609002 7: duration of outside local host: 192.168.2.255 disassembly 0:00:00Current config:
ASA Version 9.0 (1)
!
ASA-A host name
domain a.local
enable the encrypted password xxxxx
XXXXX encrypted passwd
names of
IP local pool vpnpool 192.168.2.10 - 192.168.2.20
!
interface Ethernet0/0
Inet connection description
switchport access vlan 2
!
interface Ethernet0/1
LAN connection description
switchport access vlan 3
!
interface Ethernet0/2
switchport access vlan 3
!
interface Ethernet0/3
switchport access vlan 3
!
interface Ethernet0/4
switchport access vlan 3
!
interface Ethernet0/5
switchport access vlan 3
!
interface Ethernet0/6
switchport access vlan 3
!
interface Ethernet0/7
switchport access vlan 3
!
interface Vlan1
No nameif
no level of security
no ip address
!
interface Vlan2
nameif outside
security-level 0
IP address 24.180.x.x 255.255.255.248
!
interface Vlan3
nameif inside
security-level 100
IP 192.168.1.1 255.255.255.0
!
banner exec ********************************************
banner exec * *
exec banner * ASA-A *.
banner exec * *
exec banner * CISCO ASA5505 *.
banner exec * *
exec banner * A Services Inc. *
exec banner * xxx in car Street N. *.
exec banner * city, ST # *.
banner exec * *
banner exec ********************************************
exec banner ^
passive FTP mode
DNS server-group DefaultDNS
domain a.local
permit same-security-traffic intra-interface
network obj_any object
subnet 0.0.0.0 0.0.0.0
network of the Inside_Net object
subnet 192.168.1.0 255.255.255.0
network of the VPN-net object
Subnet 192.168.2.0 255.255.255.0
access-list extended sheep permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0
allowed incoming access extended gre a whole list
inbound udp allowed extended access list any host 24.180.x.x eq 1723
list of allowed inbound tcp extended access any host 24.180.x.x eq pptp
list of allowed inbound tcp extended access any host 24.180.x.x eq smtp
list of allowed inbound tcp extended access any host 24.180.x.x eq www
list of allowed inbound tcp extended access any host 24.180.x.x eq https
list of allowed inbound tcp extended access any host 24.180.x.x eq 987
inbound udp allowed extended access list any host 24.180.x.x eq 25
inbound udp allowed extended access list any host 24.180.x.x eq 443
inbound udp allowed extended access list any host 24.180.x.x eq www
inbound udp allowed extended access list any host 24.180.x.x eq 987
pager lines 24
Enable logging
debug logging in buffered memory
asdm of logging of information
Outside 1500 MTU
Within 1500 MTU
ICMP unreachable rate-limit 1 burst-size 1
ICMP allow all outside
ICMP allow any inside
don't allow no asdm history
ARP timeout 14400
no permit-nonconnected arp
public static Inside_Net Inside_Net destination NAT (inside, all) static source VPN-NET VPN
!
network of the Inside_Net object
NAT static 24.180.x.x (indoor, outdoor)
network of the VPN-net object
24.180.x.x static NAT (outdoors, outdoor)
Access-group interface incoming outside
Route outside 0.0.0.0 0.0.0.0 24.180.x.x 1
Timeout xlate 03:00
Pat-xlate timeout 0:00:30
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
identity of the user by default-domain LOCAL
Enable http server
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
Crypto ipsec transform-set ikev1 VPN remote esp-3des esp-md5-hmac
Crypto ipsec ikev2 VPN ipsec-proposal-remotetest
Protocol esp encryption aes - 256, aes - 192, aes, 3des and
Esp integrity sha-1 protocol
Crypto ipsec pmtu aging infinite - the security association
Crypto-map dynamic dyn1 1jeu ikev1 transform-set remote VPN
Crypto-map dynamic dyn1 1jeu reverse-road
map VPN - map 1-isakmp ipsec crypto dynamic dyn1
VPN-card interface card crypto outside
Crypto ca trustpoint _SmartCallHome_ServerCA
Configure CRL
trustpool crypto ca policy
Crypto ca certificate chain _SmartCallHome_ServerCA
certificate ca 6ecc7aa5a7032009b8cebcf4e952d491
308204 4 a0030201 d 308205ec 0202106e cc7aa5a7 032009b 8 cebcf4e9 52d 49130
010105 05003081 09060355 04061302 55533117 ca310b30 0d 864886f7 0d06092a
30150603 55040 has 13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b
13165665 72695369 676e2054 72757374 204e6574 776f726b 313 has 3038 06035504
0b 133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72
20617574 7a 656420 75736520 6f6e6c79 31453043 06035504 03133c 56 686f7269
65726953 69676e20 436c 6173 73203320 5075626c 69632050 72696 72792043 61 d
65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31
30303230 38303030 3030305a 170d 3230 30323037 32333539 35395a 30 81b5310b
30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20
496e632e 311f301d 06035504 0b 131656 65726953 69676e20 54727573 74204e65
74776f72 6b313b30 5465726d 20757365 20617420 73206f66 39060355 040b 1332
68747470 7777772e 733a2f2f 76657269 7369676e 2e636f6d 2f727061 20286329
302d 0603 55040313 26566572 69536967 61737320 33205365 6e20436c 3130312f
63757265 20536572 76657220 20473330 82012230 0d06092a 864886f7 4341202d
010101 05000382 010f0030 82010 0d has 02 b187841f 82010100 c20c45f5 bcab2597
a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10
9c688b2e 957b899b 13cae234 34c1f35b f3497b62 d188786c 83488174 0253f9bc
7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b
15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845
1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8 63cd
18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced
4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f
81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 01 has 38201 02030100 df308201
082b 0601 05050701 01042830 26302406 082 b 0601 db303406 05050730 01861868
7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1 d 130101
ff040830 02010030 70060355 b 200469 30673065 060, 6086 480186f8 1 d 060101ff
45010717 03305630 2806082b 06010505 07020116 1 c 687474 70733a2f 2f777777
2e766572 69736967 6e2e636f 6d2f6370 73302 has 06 082 b 0601 05050702 02301e1a
1 c 687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406
03551d1f 042d302b 3029 has 027 a0258623 68747470 3a2f2f63 726c2e76 65726973
69676e2e 636f6d2f 2d67352e 70636133 63726c 30 0e060355 1d0f0101 ff040403
02010630 6d06082b 06010505 07010c 59305730 55160969 5da05b30 04 61305fa1
6 d 616765 2f676966 3021301f 2b0e0302 30070605 1a04148f e5d31a86 ac8d8e6b
c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973
69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30
1 b 311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301D 0603
445 1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355 c 1604140d 551d0e04
1 230418 30168014 7fd365a7 c2ddecbb f03009f3 4339fa02 af333133 300 d 0609 d
2a 864886 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80 f70d0101
4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e
b2227055 d9203340 3307c 265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a
99 c 71928 8705 404167d 1 273aeddc 866d 24f78526 a2bed877 7d494aca 6decd018
481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16
b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0
5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8
6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28
6c2527b9 deb78458 c61f381e a4c4cb66
quit smoking
Crypto ikev1 allow outside
IKEv1 crypto policy 1
preshared authentication
3des encryption
sha hash
Group 2
life 43200
Telnet timeout 5
SSH timeout 5
Console timeout 0dhcpd outside auto_config
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
user name UName encrypted password privilege 15 xxxxxxxxx
type tunnel-group remote VPN remote access
attributes global-tunnel-group VPN-remote controls
address vpnpool pool
tunnel-group, ipsec VPN-remote controls-attributes
IKEv1 pre-shared-key *.
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
inspect the icmp
!
global service-policy global_policy
context of prompt hostname
anonymous reporting remote call
Cryptochecksum:43db9ab2d3427289fb9a0fdb22b551fa
: endHello
Its propably because you do not have a DNS server configured for VPN users. Try this command:
group-policy DfltGrpPolicy attributes dns-server value 8.8.8.8
-
ASA version 8.4 for GNS3 IOS
Hi all
I test new IOS Cisco ASA version 8.4 in my LAB GNS3. Please help me and provide the link to download the same.
I do not have access to direct download from cisco.com.
Kind regards
SaurabhHello Slim,
Please do some research on the subject,
Here is a guide that you can use for GNS3,
This will do for you
http://www.xerunetworks.com/2012/02/Cisco-ASA-84-on-GNS3/
Kind regards
-
Hola, tengo mi Suscripcion a problem with Creative Cloud, al momento los programas use sale me el message of Quebec tengo version prueba puedo hacer para el problema delivery
Your subscription to cloud shows correctly on your account page?
If you have more than one email, you will be sure that you use the right Adobe ID?
https://www.adobe.com/account.html for subscriptions on your page from Adobe
If Yes
Some general information for a subscription of cloud
Cloud programs don't use serial... numbers you, connect you to your cloud account paying to download & install & activate... you may need to sign out of the cloud and restart your computer and log into the cloud for things to work
Sign out of your account of cloud... Restart your computer... Connect to your paid account of cloud
-Connect using http://helpx.adobe.com/x-productkb/policy-pricing/account-password-sign-faq.html
-http://helpx.adobe.com/creative-cloud/kb/sign-in-out-creative-cloud-desktop-app.html
-http://helpx.adobe.com/x-productkb/policy-pricing/activation-network-issues.html
-http://helpx.adobe.com/creative-suite/kb/trial--1-launch.html
-ID help https://helpx.adobe.com/contact.html?step=ZNA_id-signing_stillNeedHelp
-http://helpx.adobe.com/creative-cloud/kb/license-this-software.html
If no
This is an open forum, Adobe support... you need Adobe personnel to help
Adobe contact information - http://helpx.adobe.com/contact.html
-Select your product and what you need help with
-Click on the blue box "still need help? Contact us. "
-
IPS 6.1 and ASA / versions ASDM
I've upgraded to the latest version 6.1 for my IPS module, but now I can't get the IPS via the ASDM or IME config. I can however at the CLI. I have to upgrade my ASDM on the ASA, ASA, or both? I have included a copy of the IME of logs. I also have the IPS through the IDM. My version of the SAA is 7.1 (2) and the ASDM 5.1 (2). Any help would be apperciated.
Hello
Please see the ASA and IPS software compatibility matrix in the URL below.
http://www.Cisco.com/en/us/docs/security/ASA/compatibility/asamatrx.html
concerning
Ashok
-
Modification of the VPN on ASA version 7.1
Hi all
I have two problems to solve
- I've added 5 new network lines to an existing tunnel of B2B. Three 3 of the new route network are able to establish sessions on the tunnel but two 2 are unable. I've done a tracert to computer and track stops within the ASA. There is no newspaper showing on the SAA to suggest traffic reaches the ASA. I cloned the existing NAT and ACLs and rules static, but without success.
3 July 11, 2013 15:22:42 713902 Group = 82.199.93.3, IP = 82.199.93.3, error QM WSF (P2 struct & 0xb07054c0, mess id 0x5eafb9bb). 3 July 11, 2013 15:22:42 713902 Group = 82.199.93.3, IP = 82.199.93.3, Removing counterpart of table Correlator has failed, no match! 4 July 11, 2013 15:22:42 752012 IKEv1 has failed to set up a tunnel. Card Tag = outside_map. Map of sequence number = 1. 3 July 11, 2013 15:22:42 752015 The tunnel manager does not have a document SA L2L. All configured IKE versions did not establish the tunnel. Card Tag = outside_map. Map of sequence number = 1.
Thankx
The error message "Approved Removing from table Correlator has failed, no football match!" shows the most often only remote tht doesn't have the mirror image configuration to allow traffic between the VPN and so some of the IKE SAs did not form.
-
We have experienced frm, our compliance team that we run in traumatic psychosis wanted vulnerabity so know the fix and document...
Hi James,
We have a PSIRT filed regarding the vulnerability of traumatic psychosis, please see details below:
CSCur00511 Evaluation of the ACS for CVE-2014-6271 and CVE-2014-7169
https://Tools.Cisco.com/bugsearch/bug/CSCur00511/?reffering_site=dumpcr
Here is the information of fixed code to various versions:
Fixed code:
Patch for CSCur00511 of the DDT is ready and available on CCO.
The patch is included in all update rollups version 5.4.0.46.7/5.5.0.46.6/5.6.0.22.1 and later. We recommend that you download the latest cumulative patches.Download of: CEC / Support / download software http://www.cisco.com/cisco/pub/software/portal/select.html?i=! y
Letter: Security / identity management / Cisco Secure Access Control System / Cisco Secure Access Control System 5.4 / 5.4.0.46.0Patch file name: 5-4-0-46 -.tar.gpg
Read me and displays instructions: Acs-5-4-0-46--Readme.txtDownload of: CEC / Support / download software http://www.cisco.com/cisco/pub/software/portal/select.html?i=! y
Letter: Security / identity management / Cisco Secure Access Control System / Cisco Secure Access Control System 5.5 / 5.5.0.46Patch file name: 5-5-0-46 -.tar.gpg
Read me and displays instructions: Acs-5-5-0-46--Readme.txtDownload of: CEC / Support / download software http://www.cisco.com/cisco/pub/software/portal/select.html?i=! y
Letter: Security / identity management / Cisco Secure Access Control System / Cisco Secure Access Control System 5.6 / 5.6.0.22Patch file name: 5-6-0-22 -.tar.gpg
Read me and displays instructions: Acs-5-6-0-22--Readme.txtDownload of: CEC / Support / download software http://www.cisco.com/cisco/pub/software/portal/select.html?i=! y
Letter: Security / identity management / Cisco Secure Access Control System / Cisco Secure Access Control System 5.3 / 5.3.0.40Patch file name: 5-3-0-40 -.tar.gpg
Read me and displays instructions: Acs-53 - Readme.txtKind regards
Tushar Bénard
Please evaluate the post if you find it useful!
-
Customization of SSL VPN Cisco ASA version 8
Is there a way to customize the appearance of the SSL VPN? To change the features of the ASA custmization? To change the total look of the portal page the way we like it and not the Cisco default settings? For example, the RDP plugin has always display the help text on the right side, and we would like to show different text in this area. We were able to change it but could not import to the area of the asa.
Import of SSL vpn customization ASA is not possible. Impossible also to change the appearance of the portal page.
-
Sheep síntax for ASA version 9.1
Hello friends!
I am trying to perform a Lan-to-Lan VPN, but I'm having some trouble on the rule of sheep. Could someone help me understand how to perform this task on separating my interesting traffic of my Internet traffic through the sheep rule?
Kind regards!
LAN: 192.168.0.0/24
Remote LAN: 10.0.0.0/8
Of course, something like this will work for you:
object network local_lan
subnet 192.168.0.0 255.255.255.0
object network remote_lan
subnet 10.0.0.0 255.0.0.0nat(inside,outside) source static local_lan local_lan destination static remote_lan remote_lan
You will need all the other VPN bits, in particular an access list with subnets connected to the VPN encryption card.
-
Version of the IOS taken ASA supported with WSC, 4.3
Hello world
We will deploy CSM 4.3 in our network.
Need to know if we have ASA 5505 and 5515 and 5520 which version of IOS, we should have so that it can support CSM 4.3?
Also can we get Windows server for CSM 4.3 user?
Thank you
MAhesh
IOS runs on the routers and switches. The software on an ASA is simply called Software ASA.
4.3 CSM supports ASA versions 7.0 to 8.6, although many features require ASA 8.0 or later version. Full details are listed here. If you deploy a new CSM, you should switch to the newer version of 4.4. It adds support for the ASA software up to version 9.1 (1).
As described in the deployment guide (details here), CSM 4.3 requires Windows Server 2008 or 2008 R2. These requirements are the same for the WSC 4.4
-
ASDM 6.4; ASA 5510 version 8.4 (1) - cannot access ASDM
Hello Experts,
I want access to ASDM since my PC of management. I can ping to MANAGEMENT PC as well as do SSH connection but I can't go ASDM browser.
Please guide me.
Here are the usful details:
Running configuration
See the ciscoasa # running: Saved:ASA Version 8.4 (1)!ciscoasa hostnameactivate 9jNfZuG3TC5tCVH0 encrypted password2KFQnbNIdI.2KYOU encrypted passwdnames of!interface Ethernet0/0nameif insidesecurity-level 90IP 192.168.1.1 255.255.255.0!interface Ethernet0/1ShutdownNo nameifno level of securityno ip address!interface Ethernet0/2ShutdownNo nameifno level of securityno ip address!interface Ethernet0/3ShutdownNo nameifno level of securityno ip address!interface Management0/0ShutdownNo nameifno level of securityno ip address!passive FTP modepager lines 24MTU 1500 insideICMP unreachable rate-limit 1 burst-size 1ASDM image disk0: / asdm - 641.bindon't allow no asdm historyARP timeout 14400Timeout xlate 03:00Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolutetimeout tcp-proxy-reassembly 0:01:00dynamic-access-policy-registration DfltAccessPolicythe ssh LOCAL console AAA authenticationEnable http serverhttp 192.168.1.5 255.255.255.255 insideNo snmp server locationNo snmp Server contactServer enable SNMP traps snmp authentication linkup, linkdown warmstart of cold startTelnet timeout 5SSH 192.168.1.0 255.255.255.0 insideSSH timeout 5Console timeout 0a basic threat threat detectionStatistics-list of access threat detectionno statistical threat detection tcp-interceptionWebVPNusername admin privilege 15 encrypted password e1z89R3cZe9Kt6Ib!class-map inspection_defaultmatch default-inspection-traffic!!type of policy-card inspect dns preset_dns_mapparametersmaximum message length automatic of customermessage-length maximum 512Policy-map global_policyclass inspection_defaultinspect the preset_dns_map dnsinspect the ftpinspect h323 h225inspect the h323 rasReview the ip optionsinspect the netbiosinspect the rshinspect the rtspinspect the skinnyinspect esmtpinspect sqlnetinspect sunrpcinspect the tftpinspect the sipinspect xdmcpglobal service-policy global_policycontext of prompt hostnamecall-homeProfile of CiscoTAC-1no active accounthttp https://tools.cisco.com/its/service/oddce/services/DDCEService destination addressemail address of destination [email protected] / * /destination-mode http transportSubscribe to alert-group diagnosisSubscribe to alert-group environmentSubscribe to alert-group monthly periodic inventorymonthly periodicals to subscribe to alert-group configurationdaily periodic subscribe to alert-group telemetryCryptochecksum:afe73d128f7510e1bf9463fd698fa7fb: endSuccessful PING Bothwaysciscoasa (config) # ping 192.168.1.1Type to abort escape sequence.Send 5, echoes ICMP 100 bytes to 192.168.1.1, time-out is 2 seconds:!!!!!Success rate is 100 per cent (5/5), round-trip min/avg/max = 1/1/1 msciscoasa (config) # ping 192.168.1.5Type to abort escape sequence.Send 5, echoes ICMP 100 bytes to 192.168.1.5, time-out is 2 seconds:!!!!!Success rate is 100 per cent (5/5), round-trip min/avg/max = 1/1/1 msoutput ciscoasa (config) #.Thank you :-)
Please let us know the output of:
view worm | I have 3DES
Show ssl
The bits of this production key would ensure that your license 3DES / AES is active and your ASA supports strong cryptographic algorithms (encryption).
-
Hello
I'll put up a tunnel vpn site-to-site between two locations. Both have cisco ASA 5505 running a different version, I'll explain in more detail below. so far, I was able to get the tunnel to come but I can't seem to pass traffic, I work at this for days now and have not been able to understand why he will not pass traffic. Needless to say that the customer's PO would be on the fact that their VPN is not upward and they had to do by hand. I'll put the configs below, if possible can someone help me as soon as POSSIBLE, I really want to get this site up and running so that we do not lose the customer.
An IP address of 0.0.0.0 = site
Site B IP = 1.1.1.1A Version of the site = 8.3.1
Version of the site B = 9.2.3__________________________
_________A RACE OF THE SITE CONFIGURATION
Output of the command: "sh run".
: Saved
:
ASA Version 8.3 (1)
!
hostname SDMCLNASA01
SDMCLNASA01 domain name. LOCAL
Select 5E8js/Fs7qxjxWdp of encrypted password
2KFQnbNIdI.2KYOU encrypted passwd
names of
!
interface Vlan1
nameif inside
security-level 100
the IP 192.168.0.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
the IP 0.0.0.0 255.255.255.252
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passive FTP mode
clock timezone CST - 6
clock to summer time recurring CDT
DNS lookup field inside
DNS domain-lookup outside
DNS server-group DefaultDNS
SDMCLNASA01 domain name. LOCAL
permit same-security-traffic inter-interface
permit same-security-traffic intra-interface
network of the NETWORK_OBJ_192.168.0.0_24 object
192.168.0.0 subnet 255.255.255.0
network of the NETWORK_OBJ_192.168.1.0_24 object
subnet 192.168.1.0 255.255.255.0
network lan_internal object
192.168.0.0 subnet 255.255.255.0
purpose of the smtp network
Home 192.168.0.245
Network http object
Home 192.168.0.245
rdp network object
Home 192.168.0.245
network ssl object
Home 192.168.0.245
network camera_1 object
host 192.168.0.13
network camerahttp object
host 192.168.0.13
service object 8081
source eq 8081 destination eq 8081 tcp service
Dvr description
network camera-http object
host 192.168.0.13
network dvr-http object
host 192.168.0.13
network dvr-mediaport object
host 192.168.0.13
object-group Protocol DM_INLINE_PROTOCOL_1
object-protocol udp
object-tcp protocol
object-group Protocol TCPUDP
object-protocol udp
object-tcp protocol
DM_INLINE_TCP_1 tcp service object-group
EQ port 3389 object
port-object eq www
EQ object of the https port
EQ smtp port object
DM_INLINE_TCP_2 tcp service object-group
port-object eq 34567
port-object eq 34599
EQ port 8081 object
permit access ip 192.168.0.0 scope list outside_1_cryptomap 255.255.255.0 192.168.1.0 255.255.255.0
outside_access_in list extended access permit tcp any any eq smtp
outside_access_in list extended access permit tcp any any DM_INLINE_TCP_1 object-group
outside_access_in list extended access permit tcp any any DM_INLINE_TCP_2 object-group
permit access ip 192.168.0.0 scope list inside_nat0_outbound 255.255.255.0 192.168.1.0 255.255.255.0
pager lines 24
Enable logging
asdm of logging of information
Within 1500 MTU
Outside 1500 MTU
ICMP unreachable rate-limit 1 burst-size 1
ICMP allow any inside
ICMP allow all outside
don't allow no asdm history
ARP timeout 14400
NAT (inside, outside) static static source NETWORK_OBJ_192.168.1.0_24 destination NETWORK_OBJ_192.168.0.0_24 NETWORK_OBJ_192.168.0.0_24 NETWORK_OBJ_192.168.1.0_24
NAT (exterior, Interior) static static source NETWORK_OBJ_192.168.0.0_24 destination NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.0.0_24
!
network lan_internal object
NAT dynamic interface (indoor, outdoor)
purpose of the smtp network
NAT (all, outside) interface static tcp smtp smtp service
Network http object
NAT (all, outside) interface static tcp www www service
rdp network object
NAT (all, outside) interface static service tcp 3389 3389
network ssl object
NAT (all, outside) interface static tcp https https service
network dvr-http object
NAT (all, outside) interface static 8081 8081 tcp service
network dvr-mediaport object
NAT (all, outside) interface static 34567 34567 tcp service
Access-group outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 71.42.194.209 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-registration DfltAccessPolicy
http server enable 8080
http 192.168.0.0 255.255.255.0 inside
http 192.168.1.0 255.255.255.0 inside
http 192.168.1.0 255.255.255.0 outside
http 71.40.221.136 255.255.255.252 inside
http 71.40.221.136 255.255.255.252 outside
http 192.168.0.0 255.255.255.0 outside
http 97.79.197.42 255.255.255.255 inside
http 97.79.197.42 255.255.255.255 outside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
card crypto outside_map 1 match address outside_1_cryptomap
card crypto outside_map 1 set peer 1.1.1.1
card crypto outside_map 1 set of transformation-ESP-3DES-SHA
outside_map interface card crypto outside
crypto isakmp identity address
crypto ISAKMP allow outside
crypto ISAKMP policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH timeout 5
Console timeout 0
dhcpd address 192.168.0.50 - 192.168.0.150 inside
dhcpd dns 192.168.0.245 209.18.47.62 interface inside
dhcpd SDMCLNASA01 field. LOCAL inside interface
dhcpd allow inside
!a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
attributes of Group Policy DfltGrpPolicy
Protocol-tunnel-VPN IPSec l2tp ipsec
tunnel-group 1.1.1.1 type ipsec-l2l
tunnel-group 1.1.1.1 ipsec-attributes
pre-shared key *.
!
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
!
context of prompt hostname
call-home
Profile of CiscoTAC-1
no active account
http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
email address of destination [email protected] / * /
destination-mode http transport
Subscribe to alert-group diagnosis
Subscribe to alert-group environment
Subscribe to alert-group monthly periodic inventory
monthly periodicals to subscribe to alert-group configuration
daily periodic subscribe to alert-group telemetry
Cryptochecksum:462428c25e9748896e98863f2d8aeee7
: end________________________________
SITE B RUNNING CONFIG
Output of the command: "sh run".
: Saved
:
: Serial number: JMX1635Z1BV
: Material: ASA5505, 512 MB RAM, 500 MHz Geode Processor
:
ASA Version 9.2 (3)
!
ciscoasa hostname
activate qddbwnZVxqYXToV9 encrypted password
volatile xlate deny tcp any4 any4
volatile xlate deny tcp any4 any6
volatile xlate deny tcp any6 any4
volatile xlate deny tcp any6 any6
volatile xlate deny udp any4 any4 eq field
volatile xlate deny udp any4 any6 eq field
volatile xlate deny udp any6 any4 eq field
volatile xlate deny udp any6 any6 eq field
names of
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
nameif inside
security-level 100
IP 192.168.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
IP 1.1.1.1 255.255.255.252
!
passive FTP mode
clock timezone CST - 6
clock to summer time recurring CDT
permit same-security-traffic inter-interface
permit same-security-traffic intra-interface
network camera_http object
host 192.168.1.13
network camera_media object
host 192.168.1.13
network of the NETWORK_OBJ_192.168.0.0_24 object
192.168.0.0 subnet 255.255.255.0
network of the NETWORK_OBJ_192.168.1.0_24 object
subnet 192.168.1.0 255.255.255.0
outside_access_in list extended access permit tcp any any eq 9000
outside_access_in list extended access permit tcp any any eq www
outside_access_in list extended access permit icmp any one
outside_cryptomap to access ip 192.168.1.0 scope list allow 255.255.255.0 object NETWORK_OBJ_192.168.0.0_24
pager lines 24
Enable logging
asdm of logging of information
Within 1500 MTU
Outside 1500 MTU
no failover
ICMP unreachable rate-limit 1 burst-size 1
ICMP allow any inside
ICMP allow all outside
ASDM image disk0: / asdm - 732.bin
don't allow no asdm history
ARP timeout 14400
no permit-nonconnected arp
NAT (inside, outside) static static source NETWORK_OBJ_192.168.0.0_24 destination NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.0.0_24
NAT (exterior, Interior) static static source NETWORK_OBJ_192.168.1.0_24 destination NETWORK_OBJ_192.168.0.0_24 NETWORK_OBJ_192.168.0.0_24 NETWORK_OBJ_192.168.1.0_24
!
network camera_http object
NAT (all, outside) interface static tcp www www service
network camera_media object
NAT (all, outside) interface static 9000 9000 tcp service
!
NAT source auto after (indoor, outdoor) dynamic one interface
Access-group outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 71.40.221.137 1
Timeout xlate 03:00
Pat-xlate timeout 0:00:30
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
identity of the user by default-domain LOCAL
Enable http server
http 192.168.1.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-TRANS-aes - esp esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-DES-MD5-TRANS esp - esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transit
Crypto ipsec ikev2 AES256 ipsec-proposal
Protocol esp encryption aes-256
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES192
Protocol esp encryption aes-192
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES
Esp aes encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 proposal ipsec 3DES
Esp 3des encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal OF
encryption protocol esp
Esp integrity sha - 1, md5 Protocol
Crypto ipsec pmtu aging infinite - the security association
card crypto outside_map 1 match address outside_cryptomap
card crypto outside_map 1 peer set 0.0.0.0
card crypto outside_map 1 set transform-set ESP-3DES-SHA ikev1
outside_map interface card crypto outside
trustpool crypto ca policy
IKEv2 crypto policy 1
aes-256 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 10
aes-192 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 20
aes encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 30
3des encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 40
the Encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
Crypto ikev1 allow outside
IKEv1 crypto policy 120
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH stricthostkeycheck
SSH timeout 5
SSH group dh-Group1-sha1 key exchange
Console timeout 0dhcpd address 192.168.1.50 - 192.168.1.150 inside
dhcpd dns 192.168.0.245 209.18.47.61 interface inside
dhcpd SDPHARR field. LOCAL inside interface
dhcpd allow inside
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
AnyConnect essentials
attributes of Group Policy DfltGrpPolicy
Ikev1 VPN-tunnel-Protocol
internal GroupPolicy_0.0.0.0 group strategy
attributes of Group Policy GroupPolicy_0.0.0.0
VPN-tunnel-Protocol ikev1, ikev2
tunnel-group 0.0.0.0 type ipsec-l2l
tunnel-group 0.0.0.0 ipsec-attributes
IKEv1 pre-shared-key *.
remote control-IKEv2 pre-shared-key authentication *.
pre-shared-key authentication local IKEv2 *.
!
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
!
context of prompt hostname
no remote anonymous reporting call
call-home
Profile of CiscoTAC-1
no active account
http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
email address of destination [email protected] / * /
destination-mode http transport
Subscribe to alert-group diagnosis
Subscribe to alert-group environment
Subscribe to alert-group monthly periodic inventory
monthly periodicals to subscribe to alert-group configuration
daily periodic subscribe to alert-group telemetry
Cryptochecksum:19031ab1e3bae21d7cc8319fb7ecf0eb
: endSorry my mistake.
Delete this if it's still there
card crypto external_map 1 the value reverse-road
Add this to both sides
card crypto outside_map 1 the value reverse-road
Sorry about that.
Mike
-
AnyConnect Version issues on ASA - continues to try to get off
I am trying to test and then update our corporate AnyConnect Client from version 2.4.0202 to version 2.5.2019. My current clients of production using 2.4.0202 and everything works as expected. I have a test machine I installed 2.5.2019 (with the SBL/GINA if it's important). I downloaded the 2.5.2019 to my ASA pkg but left as a low priority image in order not to update customers of production.
Now, whenever I try to connect using my 2.5 test client, he's trying to downgrade me back to 2.4. Certainly there must be a way to test multiple versions of the AnyConnect client. They can expect me just to download the new client directly in production. Any help?
Other information that might be relevant:
AnyConnect as SSL using
ASA version 8.0 (4)
ASDM version 6.1 (5)
Thanks in advance!
I think I got the same problem. On the machine that you installed 2.5 on, make sure that there is a
VPNManifest.dat file in C:\Documents and Settings\All Users\Application Data\Cisco\Cisco AnyConnect VPN Client. I found that when this was completely missing, he tried to go down. I think that you can copy it to the VPNManifest.dat of any machine which one who had 2.4 installed power but 2.5 better. I don't know why he doesn't get created in all cases.
-
Como puedo get the clave COA para realize downgrade from Windows 8 one of Windows 7 32 bit
Buenas tardes:
The empresa in the trabajo ha comprado una 86 computers HP EliteDesk 800 G1 SFF, las which amount han venido con license OEM Windows 8 64-bit y con Windows 7 32-bit media.
El problema radIca in Los sistemas y applications than utilizamos solo con how Windows 7 32 bit, por eso as desde page of HP http://h30434.www3.hp.com/t5/Notebook-Operating-Systems-and-Software/download-and-install-Windows-7-... y http://www.mydigitallife.info/official-windows-7-sp1-iso-from-digital-river/ de el instalador proffessional SP1 - U ISO of Windows 7 32 bit in formato ISO, el cual, pude instalarlo con normal y correctamente.
Aun asi, el producto no ha sido activated, y me indican tengo 30 dias para activar fired her will. I have understood what the clave COA me estan tried esta encriptada in el BIOS y is no is muestra formed vignette in el Chasis of the computadora,'re por esa razón Québec no is como puedo activar her license of Windows 7, I have understood that las licenses con buy las son tipo OEM computers y puedo realize downgrade from Windows 8 a Windows 7 con normal y sin problema , in this case pero me pide license there no to get como clave COA.
May inidcarme los pasos para realize este procedure? Are urgent
MUCHAS Gracias
Claudia
[Redacted for privacy]
This is NOT official HP customer service and I, like most other people on this forum do not work for HP. It is a forum for users of peer-to-peer supported for class for the HP consumer products. HP maintains no official presence on this forum and it is unlikely that HP will respond in an official capacity. No response from an employee of HP represents his own opinion and not that of HP.
If computers were purchased with Microsoft's Downgrade rights, they would be shipped with Windows 7 Pro 64 bit installed in the factory and restore HP 8/8.1 Pro 64-bit Windows included media. You will need create the restoration of Windows 7 Pro 64 - bit from at least one of these computers support.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
If computers ship with Windows 7 Pro 64-bit installed or if you have media to restore Windows 7 Pro 64-bit computers, you may be able to use the below to install Windows 7 Pro 32-bit.
(1) download and unzip ABR Beta with Windows 7 Support. This is the homepage of ABR for Windows Vista. Please follow the section "How to use" for information and instructions on how to use it. These steps also apply to Windows 7. Perform the 'activation' on multiple computers backup and back up the certificate and the key has been recovered in separate places for comparison. (He draws the original key HP preinstalled OEM factory and certificate from your factory installed OS OEM) Compare the keys and certificates for each computer, they are all the same? Please report back with your findings.
(2) download and use RWEverything to determine the version of the OA/SLP/SLIC in BIOS of the computer. See this page of Web MyDitigalLife titled "How to check or verify PC motherboard BIOS SLIC Version is SLP OA 2.0 or 2.1 for OEM Activation" for more information on how to use and decipher the information. (Windows 8 use OA 3.0 and this is where the problem can happen) Please report back with your findings.
(3) If you do not already have a copy, download your version (the version that was preinstalled on your HP computer) Windows 7 from Official Windows 7 SP1 ISO from Digital River.
(4) install Windows 7 Pro 32 bit, following all prompts as needed. Don't let not Windows try to scoped. Run ABR 'restoration of activation' to 'install' the previously saved until the product key and the certificate. Make sure that Windows is activated, repeat "restoration of activation" until Windows 7 is activated. (It "installs" pre-installed HP OEM factory original key and certificate from your factory installed OS to your new installation of Windows. This HP OEM key and the OEM HP certificate, as well as the BIOS is what allows your computer to HP be factory preactivated.)
(5) install all drivers from the computer. These can be found on the support page HP for your computer or you can find the drivers on the sites of manufacturers of component various... Intel, NVidia, AMD/ATI, Ralink, Realtek, etc..
(6) image of the Windows installation and deploy it to the remaining computers.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
HP EliteDesk 800 compact computer G1 is a class computer business, your question may be better answered the HP Enterprise Business Community. It is also possible to contact the HP Business Support Center for assistance with your question.
If you have any other questions, feel free to ask.
Please click the 'Thumbs Up' white LAURELS to show your appreciation
Esto NO es oficial HP attention al client y yo, como las otras personas in este foro most, no working para Este HP. are not supported-to-peer forum of usuario para productos consumo HP HP class. sin presencia in este foro oficial stays are likely poco that HP is going to an answering machine of manera oficial. Any respuesta UN empleado represents HP known opinion propia y none of the HP.
If los equipos is compraron con Microsoft Downgrade rights, habrian sido quadrilha con Windows 7 Pro 64 bits wont fabrica desde y Windows 8 / 8.1 Pro 64-bit HP restore / medios recuperacion incluido. Usted will than crear el Pro 64-bit of Windows 7 restore / medios al menos uno estos equipos recuperacion.
- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = -
If con los equipos envían of Windows 7 Pro 64 bit wont o tiene Windows 7 Pro 64-bit restore if / medios recuperacion para los equipos, can be able to use the information of abajo para instalar Windows 7 Pro 32-bit.
(1) Descargar y descomprimir ABR Beta Con Windows 7 support. Here is the main page of the ABR para Windows Vista. Por favor, siga the section "how to usa" para more information e instrucciones sober como each. ESTOS pasos is applied a Windows 7 also. Perform the "copia activacion security" en varios hence there save the clave recuperado y certificado en lugares para comparison separately. (Esto pushes has the original HP OEM certificado preinstalado fabrica of clave y su fabrica installed OS OEM) Comparar las claves y los certificados cada equipo, are all the same? favor informen con sus hallazgos.
(2) Descargar y use of RWEverything para determining OA / SLP / SLIC en el BIOS del equipo version. Consult this web page MyDitigalLife entitled "Como o PC BIOS SLIC SLP OA Verifique see are version 2.0 o para 2.1 OEM Activation ' for more information sober como use there descifrar information. (Windows 8 OA 3.0 uso y aqui are where is can produce el problema) Por favor informar con sus hallazgos.
(3) if usted no tiene una copia, download the version (the version that it was pre-wont in sus equipos HP) of Windows 7 desde Windows 7 SP1 ISO Oficial of Digital River.
(4) to Instalar Windows 7 Pro 32 bit, following todas las instrucciones según sea necessary. No Permite Windows para tratar auto-activation. Run ABR "activacion restore" has the clave of producto y el anterior seguridad certificado "instalar. It check that Windows is activa, repeat "activacion restore" until Windows 7 is activated. (Este "instala" the original HP OEM preinstalada fabrica clave y el su fabrica installed operating system para del certificado knew Windows instalacion limpia.) Esta tecla HP OEM y el certificado OEM from HP, junto con the BIOS are what permite a su equipo ser pre-activated HP fabrica.)
(5) instale todos los drivers finetoothed para el equipo. ESTOS themselves can find in page soporte para HP knew computadora o you can find los controllers in los web sites different from los manufacturing of components... Intel, Nvidia, AMD / ATI, Ralink, Realtek, etc.
(6) the instalacion of Windows Imagen e more in remaining teams.
- = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = -
Medida el EliteDesk 800 HP Small Form Factor equipo G1 are a team of business class, knew pregunta can responderse mejor in Comunidad de Negocios HP business. Also you can consider ponerse in contacto con el Centro de Soporte HP Business para ayuda con su problema request.
If tiene alguna duda, por favor no no dude en long.
Por favor, haga click en Blanco Bravo 'Thumbs Up' el para su agradecimiento show
-
Allow Exchange (SMTP) server by ASA 8.2 (5)
Please help me! Tomorrow, I have to go on a customer site and configure the firewall to allow traffic from the server through it.
I am CCIE Routing & switching certified. But did not have enough hands with the ASA.
Here is the configuration of the firewall running
QLC-11-FW-1 # sh run
: Saved
:
ASA Version 8.2 (5)
!
QLC-11-FW-1 hostname
activate 42Vosoeb.xpDtu0m encrypted password
42Vosoeb.xpDtu0m encrypted passwd
names of
name 10.10.128.0 comments
name 10.10.129.0 Guest_Wirless
name 10.10.0.0 Internal_Networks
!
interface Ethernet0/0
Description ' connection to BB-1-Gi2/5 ".
nameif outside
Security 0
IP 10.10.102.254 255.255.255.0
!
interface Ethernet0/1
Description ' connection to the BB-1-Gi2/3 ".
nameif inside
security-level 100
IP 10.10.101.254 255.255.255.0
!
interface Ethernet0/2
Description ' connection to the BB-1-Gi2/7 "»
nameif DMZ
security-level 50
IP 10.10.103.254 255.255.255.0
!
interface Ethernet0/3
Shutdown
No nameif
no level of security
no ip address
!
interface Management0/0
nameif management
security-level 100
IP 192.168.1.1 255.255.255.0
management only
!
passive FTP mode
object-group network invited
The object-network 255.255.255.0 comments
object-network Guest_Wirless 255.255.255.0
object-group service Guest_services
the purpose of the echo icmp message service
response to echo icmp service object
the purpose of the service tcp eq www
the eq https tcp service object
the eq field udp service object
splitTunnelAcl standard access list allow Internal_Networks 255.255.0.0
outside_in list extended access permit icmp any one
ips_traffic of access allowed any ip an extended list
inside_access_in list extended access allow object-group objects invited to a Guest_services-group
inside_access_in list extended access deny ip object-group invited all
inside_access_in list extended access permitted ip Internal_Networks 255.255.0.0 everything
pager lines 24
asdm of logging of information
Outside 1500 MTU
Within 1500 MTU
MTU 1500 DMZ
management of MTU 1500
IP local pool ra_users 10.10.104.10 - 10.10.104.200 mask 255.255.255.0
ICMP unreachable rate-limit 1 burst-size 1
don't allow no asdm history
ARP timeout 14400
Access-group outside_in in external interface
inside_access_in access to the interface inside group
Route outside 0.0.0.0 0.0.0.0 10.10.102.250 1
Route inside Internal_Networks 255.255.0.0 10.10.101.10 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
the ssh LOCAL console AAA authentication
AAA authentication http LOCAL console
LOCAL AAA authentication serial console
Enable http server
http 192.168.1.0 255.255.255.0 management
http Internal_Networks 255.255.0.0 inside
http 0.0.0.0 0.0.0.0 outdoors
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set distance esp - esp-md5-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
Dynamic crypto map ra_dynamic 10 set transform-set remote control
map ra 10-isakmp ipsec crypto dynamic ra_dynamic
ra outside crypto map interface
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
md5 hash
Group 2
life 86400
Telnet timeout 5
SSH 0.0.0.0 0.0.0.0 outdoors
SSH Internal_Networks 255.255.0.0 inside
SSH timeout 5
Console timeout 0
management of 192.168.1.2 - dhcpd address 192.168.1.254
enable dhcpd management
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
internal GP group policy
GP group policy attributes
value of server DNS 212.77.192.60
Protocol-tunnel-VPN IPSec
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list splitTunnelAcl
username admin privilege 15 encrypted password gXmhyPjHxCEshixG
ahmed vDClM3sGVs2igaOA encrypted password username
type tunnel-group GP remote access
attributes global-tunnel-group GP
address ra_users pool
Group Policy - by default-GP
tunnel-group GP ipsec-attributes
pre-shared key *.
!
class-map ips_traffic_class
corresponds to the ips_traffic access list
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
inspect the icmp
class ips_traffic_class
IPS inline help
!
global service-policy global_policy
context of prompt hostname
no remote anonymous reporting call
Cryptochecksum:57e5e9b117c38869a93a645f88309571
: endThank you
So I don't see any configuration nat here, so I guess it's either a private wan or you have a router upstream do nat? If no Nat is required on the SAA so it should be as simple as
outside_in list extended access permit tcp any host mail server eq smtp
Maybe you are looking for
-
Error 1606: Could not access network location % APPDATA%\.
I am trying to install a game for Windows: Zoo Tycoon 2 Ultimate Collection (which is Zoo Tycoon 2 + 4 expansion packs), on a Vista Home SP2 machine. When you install disc 1, I almost immediately get the error above,Error 1606: could not access netw
-
BSoD Unmountable Boot Volume error message
This morning my laptop was running slowly and I executed a forced shutdown. When you turn on the computer, I kept getting a blue screen with the error message "UNMOUNTABLE_BOOT_VOLUME". All the options I tried met the same fate. I have the recovery d
-
I need instructions to connect my laptop to my TV using a HMDI cable.
HP G60 laptop. Windows Vista 32-bit I cannot connect my laptop to my TV using an HDMI cable. Any suggestion would be appreciated.
-
lost copy of windows and recovery
My windows7 orginal pro installed OA box recovery have been removed and only now I have the key to Sting (*-*-*-*-*), so can haw I install copy
-
BlackBerry torch 9800 Smartphones makes me crazy!
Hey I read so much about these phones touch from of the screen and mine is so near the trash. The phone works perfectly except my touchscreen is unresponsive. After a battery pull it works fine for fighting an hour or two and that later it stops just