VPN configuration ends the SSH session

Can someone tell me why my SSH session in a PIX gets terminated when I apply a command card crypto on the firewall that I can access?

If you go through the external interface, you will need to be very careful about adding crypto map controls, cause, you can easily lock you out of the PIX and stop the PIX to pass all traffic.

If there is an existing encryption card on the PIX and you add another, you must unapply the card encryption first, add the new in (make sure it is complete) and then re-apply.

If there is no existing mapping, then make sure that you add the card encryption in its entirety, including the access list and then apply the encryption card to the interface.

If you think you're doing it right, answer back with exactly what you type in and let's see what you're missing.

Tags: Cisco Security

Similar Questions

  • After you type the master password in session can force type master password once again without ending the current session and start new session?

    Sometimes after using the password to access an account during a given session of firefox, I want to "repeal" this ability of automatic access (i.e. require type the password again once) without having to put an end to the current session and restart firefox.

    It's nice to only have to type the password once per session, there are times when after launching an action that I would let the browser unattended for a short period but to prevent others to access sensitive information on other sites if they can't my master password. Note that this is not the same thing as "locking the browser. Currently, the only way I know to force it is to kill the session and restart the browser but it's not very satisfying if I really want to stay connected (allowed) to a particular site. I hope that adding a button in the Security tab "requires the master password for the current session" would be a simple solution to implement? Thank you for your attention.

    You can connect from the software security device (e.g. click Cancel in the dialog box display the passwords) to force them to return to the MP once more.

    • Tools > Options > Security: passwords: "saved passwords" > "show passwords".
    • Tools > Options > advanced > encryption: Certificates > safety devices: software security device: Logout button
  • Client connected to the remote access VPN, but got the wrong default gateway

    Hi all

    I struggled for a few days and really need some help here. My PC (192.168.254.x) is on the same vlan with external interface (192.168.254.171) to my PIX506E. When I run the Cisco VPN client, my PC shows connected and gets the IP address of 10.9.0.150 that is expected. However, it also gets the entry door of 10.9.0.1 that I have no idea where it came from. So my PC can not access any external or internal network.

    I've listed below the configuration of my and highlighted the part that I typed in. PIX version 7.1 (2) is the latest version that I can install on PIX506E. Help, please. Thank you very much.

    pixfirewall # sh run
    : Saved
    :
    PIX Version 7.1 (2)
    !
    pixfirewall hostname
    activate 2KFQnbNIdI.2KYOU encrypted password
    names of
    !
    interface Ethernet0
    nameif outside
    security-level 0
    IP 192.168.254.171 255.255.255.0
    !
    interface Ethernet1
    nameif inside
    security-level 100
    IP 10.10.10.1 255.255.255.0
    !
    2KFQnbNIdI.2KYOU encrypted passwd
    Flash: / pix712.bin starting system
    passive FTP mode
    pager lines 24
    Enable logging
    timestamp of the record
    logging buffered information
    Outside 1500 MTU
    Within 1500 MTU
    10.9.0.150 mask - local 10.9.0.160 ROBERT-pool IP 255.255.255.0
    don't allow no asdm history
    ARP timeout 14400
    Route outside 0.0.0.0 0.0.0.0 192.168.254.1 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00
    Timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
    Timeout, uauth 0:05:00 absolute
    internal group strategy Robert-GP
    attributes of Group Policy GP-Robert
    value of server DNS 8.8.8.8
    username cisco password encrypted privilege 15 3USUcOPFUiMCO4Jk
    robert yXUoa8oHzS0Ncp2O of encrypted password username
    robert username attributes
    Strategy Group-VPN-Robert-GP
    the ssh LOCAL console AAA authentication
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT
    Dynamic crypto map DYN1 1 set of transformation-RIGHT
    Dynamic crypto map DYN1 1jeu reverse-road
    map MYMAP 1 ipsec-isakmp dynamic DYN1 crypto
    MYMAP outside crypto map interface
    ISAKMP allows outside
    part of pre authentication ISAKMP policy 1
    ISAKMP policy 1 3des encryption
    ISAKMP policy 1 sha hash
    Group of ISAKMP policy 1 2
    ISAKMP policy 1 life 43200
    ISAKMP nat-traversal 30
    tunnel-GROUP ROBERT type ipsec-ra
    tunnel-group ROBERT-General-attributes
    address-pool ROBERT-
    Group Policy - by default-Robert-GP
    tunnel-group ROBERT-GROUP ipsec-attributes
    pre-shared-key *.
    Telnet timeout 5
    SSH 0.0.0.0 0.0.0.0 outdoors
    SSH 0.0.0.0 0.0.0.0 inside
    SSH timeout 60
    SSH version 2
    Console timeout 0
    SSL rc4 - md5 encryption
    Cryptochecksum:7157c6095f2abae2aae9e15c1caa81aa
    : end
    pixfirewall #.

    disconnect from the vpn session after adding the new ACL to the external interface and try again?

    Disconnect the vpn session and try again and if does not apply this line.

    permit same-security-traffic intra-interface

    See the ipsec crytop her.

    Please post this output.

    Thank you

  • N3048 cannot leave ssh sessions with firmware 6.3.0.3

    I recently updated a stand-alone switch N3048 for the latest firmware 6.3.0.3, A14 (filename = N3000_N2000v6.3.0.3.stk) 6.2.7.2, A10 and it seems, I can't leave a SSH session to the switch (via the OOB interface). I can connect with several configured users and the switch works fine otherwise, but from entering exit the SSH session is suspended. It looks like the following on a switch with m1940 hostname:

    M1940 #exit
    M1940 > output<-- hangs="" here,="" not="" even="" a="" newline="" after="" hitting="">

    Connecting to the switch via the serial console, I see that 'show ip ssh' is empty and shows no active sessions. In addition, the switch generates the message "User has disconnected" in syslog. However, the real SSH session of my management station is still alive, and actually living remains permanently it seems. I left such a session open all night after the * IDLE TIMEOUT * had it done automatically on the switch and the next morning, the SSH session and underlying session TCP were always persistent.

    After reloading via the serial console switch the SSH session disconnect properly by following a generic box of RHEL 6 on my management station:

    M1940 connection closed by remote host.
    Closed connection to m1940.

    For me, it's just a further indication that the SSH session remains active after a user, there are sessions on the switch.

    Also has anyone seen this behavior? Someone at - it a data point of SSH sessions behaving normally with this new firmware?

    Your observations are correct, that Dell Networking OS 6.3.0.3 is no longer available for download from the Dell eSupport site. If you have all of the switches currently on 6.3.0.3, I suggest rolling back to 6.2.7.2.

    I don't have any official information from Dell on the exact reason the firmware was pulled. But according to my observations, it seems that there are certain undesirable behaviors in the version of the firmware. Including those discussed here on the forums. Rather than wait for the next firmware correct these behaviors, the firmware is shot, quickly being developed and should hopefully be reissued in due course.

  • ASA public 8.4 + key RSA for the SSH user authentication

    I saw in another post and the configuration guide in the community of support this key public RSA authentication is in favor of the SSH sessions at 8.4 and after.  I tried this implementation on an ASA 8.4 and a 9.1 ASA and I get the same error on both.  I tried specifying SSH version 2 to see if that is the question, but I still get the error.  Y at - there a step I'm missing?

    Here is the result of the configuration commands:

    ciscoasa (config) #username test nopassword privilege 15

    attributes of test #username ciscoasa (config)

    ciscoasa(config-username) # ssh publickey authentication

    ^

    ERROR: % name host not valid

    The above links:

    https://supportforums.Cisco.com/thread/2150480

    http://www.Cisco.com/en/us/docs/security/ASA/asa84/configuration/guide/access_aaa.html#wp1053558

    http://www.Cisco.com/en/us/docs/security/ASA/asa91/configuration/General/aaa_servers.html#wp1176050

    Thank you!

    My version is 8.4 (4).

    Tried to do it on another vith asa 9.1 and no luck.

    Fact a little research, and it turns out that this feature was launched in 8.4 (4) and not available for later versions.

    So, probably, your 8.4 is meadow (4) output and it was not available at the time and in your 9.1 is not available either)))

    Here is the document:

    http://www.Cisco.com/en/us/docs/security/ASA/roadmap/asa_new_features.html

    Take a look at the table 10.

  • PIX 520 running 6.2 (1); SSH session limited exceeded; cannot reconnect

    Twice now, one of my PIX 520 s did not allow new ssh or telnet sessions and displays the following message on the syslog server:

    PIX-4-315005% SSH session limit exceeded %. Connection request of #. #. #. # on the _interfacename_ interface

    I think I understand the basics of what is going on, but I am confused about how to get it for free, and why it has suddenly become a problem.

    Both times I went to a physical console (via the nice blue cable) session and used the ssh session disconnect # command. There are 5 numbered 0-4 connections.

    Both times that do not release the firewall to serve ssh again.

    Help! Anyone have any ideas?

    It is a known issue (CSCdy05681 and other I think), must be laid down in the code of 6.2 (2).

  • SSH session gets ACCESS denied

    Try to connect to a Putty session and I get access denied for the ROOT user and any other user.  I can connect to this host with the VI client and create a new user, but the user also gets access denied.  I can connect via web browser and simply not the SSH session.  I'm unable to connect to the console from the keyboard is unplugged.  Are there other options before that I have to restart?  Any help is appreicated.

    Have a look here, to allow ROOT to log in: http://itknowledgeexchange.techtarget.com/virtualization-pro/how-to-allow-the-root-user-to-login-to-vmware-esx-server-with-ssh/

    Also ensure that server SSH is running:

    service sshd status
    

    If this is not the case, start it:

    service sshd start
    

    =========================================================================

    William Lam

    VMware vExpert 2009

    Scripts for VMware ESX/ESXi and resources at: http://engineering.ucsb.edu/~duonglt/vmware/

    repository scripts vGhetto

    VMware Code Central - Scripts/code samples for developers and administrators

    http://Twitter.com/lamw

    If you find this information useful, please give points to "correct" or "useful".

  • CANNOT ACCESS THE LAN WITH THE EASY VPN CONFIGURATION

    Hello

    I configured easy vpn server in cisco 1905 SRI using ccp. The router is already configured with zone based firewall. With the help of vpn client I can reach only up to the internal interface of the router, but cannot access the LAN from my company. I need to change any configuration of ZBF since it is configured as "deny everything" from outside to inside? If so that all protocols should I match?   Also is there any exemption of NAT for VPN clients? Please help me! Thanks in advance.

    Please see my full configuration:

    Router #sh run
    Building configuration...

    Current configuration: 8150 bytes
    !
    ! Last modification of the configuration at 05:40:32 UTC Wednesday, July 4, 2012 by
    ! NVRAM config updated 06:04 UTC Tuesday, July 3, 2012 by
    ! NVRAM config updated 06:04 UTC Tuesday, July 3, 2012 by
    version 15.1
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    router host name
    !
    boot-start-marker
    boot-end-marker
    !
    !
    Passwords security min-length 6
    no set record in buffered memory
    enable secret 5 xxxxxxxxxxx
    !
    AAA new-model
    !
    !
    AAA authentication login default local
    AAA authentication login ciscocp_vpn_xauth_ml_1 local
    AAA authorization exec default local
    AAA authorization ciscocp_vpn_group_ml_1 LAN
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    !
    !
    No ipv6 cef
    IP source-route
    no ip free-arps
    IP cef
    !
    Xxxxxxxxx name server IP
    IP server name yyyyyyyyy
    !
    Authenticated MultiLink bundle-name Panel
    !

    parameter-map local urlfpolicy TSQ-URL-FILTER type
    offshore alert
    block-page message "Blocked according to policy"
    parameter-card type urlf-glob FACEBOOK
    model facebook.com
    model *. Facebook.com

    parameter-card type urlf-glob YOUTUBE
    mires of youtube.com
    model *. YouTube.com

    parameter-card type urlf-glob CRICKET
    model espncricinfo.com
    model *. espncricinfo.com

    parameter-card type urlf-glob CRICKET1
    webcric.com model
    model *. webcric.com

    parameter-card type urlf-glob YAHOO
    model *. Yahoo.com
    model yapo

    parameter-card type urlf-glob PERMITTEDSITES
    model *.

    parameter-card type urlf-glob HOTMAIL
    model hotmail.com
    model *. Hotmail.com

    Crypto pki token removal timeout default 0
    !
    Crypto pki trustpoint TP-self-signed-2049533683
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 2049533683
    revocation checking no
    rsakeypair TP-self-signed-2049533683
    !
    Crypto pki trustpoint tti
    crl revocation checking
    !
    Crypto pki trustpoint test_trustpoint_config_created_for_sdm
    name of the object [email protected] / * /
    crl revocation checking
    !
    !
    TP-self-signed-4966226213 crypto pki certificate chain
    certificate self-signed 01
    3082022B 30820194 02111101 300 D 0609 2A 864886 F70D0101 05050030 A0030201
    2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43647274 31312F30
    69666963 32303439 35323236 6174652D 3833301E 170 3132 30363232 30363332

    quit smoking
    encryption pki certificate chain tti
    for the crypto pki certificate chain test_trustpoint_config_created_for_sdm
    license udi pid CISCO1905/K9 sn xxxxxx
    licence start-up module c1900 technology-package datak9
    username privilege 15 password 0 xxxxx xxxxxxx
    !
    redundancy
    !
    !
    !
    !
    !
    type of class-card inspect entire tsq-inspection-traffic game
    dns protocol game
    ftp protocol game
    https protocol game
    match icmp Protocol
    match the imap Protocol
    pop3 Protocol game
    netshow Protocol game
    Protocol shell game
    match Protocol realmedia
    match rtsp Protocol
    smtp Protocol game
    sql-net Protocol game
    streamworks Protocol game
    tftp Protocol game
    vdolive Protocol game
    tcp protocol match
    udp Protocol game
    match Protocol l2tp
    class-card type match - all BLOCKEDSITES urlfilter
    Server-domain urlf-glob FACEBOOK game
    Server-domain urlf-glob YOUTUBE game
    CRICKET urlf-glob-domain of the server match
    game server-domain urlf-glob CRICKET1
    game server-domain urlf-glob HOTMAIL
    class-map type urlfilter match - all PERMITTEDSITES
    Server-domain urlf-glob PERMITTEDSITES match
    inspect the class-map match tsq-insp-traffic type
    corresponds to the class-map tsq-inspection-traffic
    type of class-card inspect correspondence tsq-http
    http protocol game
    type of class-card inspect all match tsq-icmp
    match icmp Protocol
    tcp protocol match
    udp Protocol game
    type of class-card inspect correspondence tsq-invalid-src
    game group-access 100
    type of class-card inspect correspondence tsq-icmp-access
    corresponds to the class-map tsq-icmp
    !
    !
    type of policy-card inspect urlfilter TSQBLOCKEDSITES
    class type urlfilter BLOCKEDSITES
    Journal
    reset
    class type urlfilter PERMITTEDSITES
    allow
    Journal
    type of policy-card inspect SELF - AUX-OUT-policy
    class type inspect tsq-icmp-access
    inspect
    class class by default
    Pass
    policy-card type check IN and OUT - POLICIES
    class type inspect tsq-invalid-src
    Drop newspaper
    class type inspect tsq-http
    inspect
    service-policy urlfilter TSQBLOCKEDSITES
    class type inspect tsq-insp-traffic
    inspect
    class class by default
    drop
    policy-card type check OUT IN-POLICY
    class class by default
    drop
    !
    area inside security
    security of the OUTSIDE area
    source of security OUT-OF-IN zone-pair outside the destination inside
    type of service-strategy check OUT IN-POLICY
    zone-pair IN-to-OUT DOMESTIC destination outside source security
    type of service-strategy inspect IN and OUT - POLICIES
    security of the FREE-to-OUT source destination free outdoors pair box
    type of service-strategy inspect SELF - AUX-OUT-policy
    !
    Crypto ctcp port 10000
    !
    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 2
    Group 2
    !
    ISAKMP crypto client configuration group vpntunnel
    XXXXXXX key
    pool SDM_POOL_1
    include-local-lan
    10 Max-users
    ISAKMP crypto ciscocp-ike-profile-1 profile
    vpntunnel group identity match
    client authentication list ciscocp_vpn_xauth_ml_1
    ISAKMP authorization list ciscocp_vpn_group_ml_1
    client configuration address respond
    virtual-model 1
    !
    !
    Crypto ipsec transform-set TSQ-TRANSFORMATION des-esp esp-md5-hmac
    !
    Profile of crypto ipsec CiscoCP_Profile1
    game of transformation-TRANSFORMATION TSQ
    set of isakmp - profile ciscocp-ike-profile-1
    !
    !
    !
    !
    !
    !
    the Embedded-Service-Engine0/0 interface
    no ip address
    response to IP mask
    IP directed broadcast to the
    Shutdown
    !
    interface GigabitEthernet0/0
    Description LAN INTERFACE-FW-INSIDE
    IP 172.17.0.71 255.255.0.0
    IP nat inside
    IP virtual-reassembly in
    security of the inside members area
    automatic duplex
    automatic speed
    !
    interface GigabitEthernet0/1
    Description WAN-INTERNET-INTERNET-FW-OUTSIDE
    IP address xxxxxx yyyyyyy
    NAT outside IP
    IP virtual-reassembly in
    security of the OUTSIDE member area
    automatic duplex
    automatic speed
    !
    interface Serial0/0/0
    no ip address
    response to IP mask
    IP directed broadcast to the
    Shutdown
    no fair queue
    2000000 clock frequency
    !
    type of interface virtual-Template1 tunnel
    IP unnumbered GigabitEthernet0/0
    ipv4 ipsec tunnel mode
    Tunnel CiscoCP_Profile1 ipsec protection profile
    !
    local IP SDM_POOL_1 172.17.0.11 pool 172.17.0.20
    IP forward-Protocol ND
    !
    no ip address of the http server
    local IP http authentication
    IP http secure server
    !
    IP nat inside source list 1 interface GigabitEthernet0/1 overload
    IP route 0.0.0.0 0.0.0.0 yyyyyyyyy
    IP route 192.168.1.0 255.255.255.0 172.17.0.6
    IP route 192.168.4.0 255.255.255.0 172.17.0.6
    !
    access-list 1 permit 172.17.0.0 0.0.255.255
    access-list 100 permit ip 255.255.255.255 host everything
    access-list 100 permit ip 127.0.0.0 0.255.255.255 everything
    access-list 100 permit ip yyyyyy yyyyyy everything
    !
    !
    !
    !
    !
    !
    !
    !
    control plan
    !
    !
    !
    Line con 0
    line to 0
    line 2
    no activation-character
    No exec
    preferred no transport
    transport of entry all
    output transport lat pad rlogin lapb - your MOP v120 udptn ssh telnet
    StopBits 1
    line vty 0 4
    transport input ssh rlogin
    !
    Scheduler allocate 20000 1000
    end

    A few things to change:

    (1) pool of IP must be a single subnet, it is not the same subnet as your subnet internal.

    (2) your NAT ACL 1 must be changed to ACL extended for you can configure NAT exemption, so if your pool is reconfigured to be 10.10.10.0/24:

    access-list 120 deny ip 172.17.0.0 0.0.255.255 10.10.10.0 0.0.0.255

    access-list 120 allow ip 172.17.0.0 0.0.255.255 everything

    overload of IP nat inside source list 120 interface GigabitEthernet0/1

    No inside source list 1 interface GigabitEthernet0/1 ip nat overload

    (3) OUT POLICY need to include VPN traffic:

    access-list 121 allow ip 10.10.10.0 0.0.0.255 172.17.0.0 0.0.255.255

    type of class-card inspect correspondence vpn-access

    game group-access 121

    policy-card type check OUT IN-POLICY

    vpn-access class

    inspect

  • Need help with the configuration of the Site with crossed on Cisco ASA5510 8.2 IPSec VPN Client (1)

    Need urgent help in the configuration of the Client VPN IPSec Site with crossed on Cisco ASA5510 - 8.2 (1).

    Here is the presentation:

    There are two leased lines for Internet access - a route 1.1.1.1 and 2.2.2.2, the latter being the default Standard, old East for backup.

    I was able to configure the Client VPN IPSec Site

    (1) with access to the outside so that the internal network (172.16.0.0/24) behind the asa

    (2) with Split tunnel with simultaneous assess internal LAN and Internet on the outside.

    But I was not able to make the tradiotional model Hairpinng to work in this scenario.

    I followed every possible suggestions made on this subject in many topics of Discussion but still no luck. Can someone help me here please?

    Here is the race-Conf with Normal Client to Site IPSec VPN configured with no access boarding:

    LIMITATION: Cannot boot into any other image ios for unavoidable reasons, must use 8.2 (1)

    race-conf - Site VPN Customer normal work without internet access/split tunnel

    :

    ASA Version 8.2 (1)

    !

    ciscoasa hostname

    domain cisco.campus.com

    enable the encrypted password xxxxxxxxxxxxxx

    XXXXXXXXXXXXXX encrypted passwd

    names of

    !

    interface GigabitEthernet0/0

    nameif outside internet1

    security-level 0

    IP 1.1.1.1 255.255.255.240

    !

    interface GigabitEthernet0/1

    nameif outside internet2

    security-level 0

    IP address 2.2.2.2 255.255.255.224

    !

    interface GigabitEthernet0/2

    nameif dmz interface

    security-level 0

    IP 10.0.1.1 255.255.255.0

    !

    interface GigabitEthernet0/3

    nameif campus-lan

    security-level 0

    IP 172.16.0.1 255.255.0.0

    !

    interface Management0/0

    nameif CSC-MGMT

    security-level 100

    the IP 10.0.0.4 address 255.255.255.0

    !

    boot system Disk0: / asa821 - k8.bin

    boot system Disk0: / asa843 - k8.bin

    passive FTP mode

    DNS server-group DefaultDNS

    domain cisco.campus.com

    permit same-security-traffic inter-interface

    permit same-security-traffic intra-interface

    object-group network cmps-lan

    the object-group CSC - ip network

    object-group network www-Interior

    object-group network www-outside

    object-group service tcp-80

    object-group service udp-53

    object-group service https

    object-group service pop3

    object-group service smtp

    object-group service tcp80

    object-group service http-s

    object-group service pop3-110

    object-group service smtp25

    object-group service udp53

    object-group service ssh

    object-group service tcp-port

    port udp-object-group service

    object-group service ftp

    object-group service ftp - data

    object-group network csc1-ip

    object-group service all-tcp-udp

    access list INTERNET1-IN extended permit ip host 1.2.2.2 2.2.2.3

    access-list extended SCC-OUT permit ip host 10.0.0.5 everything

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq www

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any https eq

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq ssh

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 no matter what eq ftp

    list of access CAMPUS-LAN extended permitted udp 172.16.0.0 255.255.0.0 no matter what eq field

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq smtp

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq pop3

    access CAMPUS-wide LAN ip allowed list a whole

    access-list CSC - acl note scan web and mail traffic

    access-list CSC - acl extended permit tcp any any eq smtp

    access-list CSC - acl extended permit tcp any any eq pop3

    access-list CSC - acl note scan web and mail traffic

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq 993

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq imap4

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq 465

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq www

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq https

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq smtp

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq pop3

    access-list extended INTERNET2-IN permit ip any host 1.1.1.2

    access-list sheep extended ip 172.16.0.0 allow 255.255.0.0 172.16.0.0 255.255.0.0

    access list DNS-inspect extended permit tcp any any eq field

    access list DNS-inspect extended permit udp any any eq field

    access-list extended capin permit ip host 172.16.1.234 all

    access-list extended capin permit ip host 172.16.1.52 all

    access-list extended capin permit ip any host 172.16.1.52

    Capin list extended access permit ip host 172.16.0.82 172.16.0.61

    Capin list extended access permit ip host 172.16.0.61 172.16.0.82

    access-list extended capout permit ip host 2.2.2.2 everything

    access-list extended capout permit ip any host 2.2.2.2

    Access campus-lan_nat0_outbound extended ip 172.16.0.0 list allow 255.255.0.0 192.168.150.0 255.255.255.0

    pager lines 24

    Enable logging

    debug logging in buffered memory

    asdm of logging of information

    Internet1-outside of MTU 1500

    Internet2-outside of MTU 1500

    interface-dmz MTU 1500

    Campus-lan of MTU 1500

    MTU 1500 CSC-MGMT

    IP local pool 192.168.150.2 - 192.168.150.250 mask 255.255.255.0 vpnpool1

    IP check path reverse interface internet2-outside

    IP check path reverse interface interface-dmz

    IP check path opposite campus-lan interface

    IP check path reverse interface CSC-MGMT

    no failover

    ICMP unreachable rate-limit 1 burst-size 1

    ASDM image disk0: / asdm - 621.bin

    don't allow no asdm history

    ARP timeout 14400

    interface of global (internet1-outside) 1

    interface of global (internet2-outside) 1

    NAT (campus-lan) 0-campus-lan_nat0_outbound access list

    NAT (campus-lan) 1 0.0.0.0 0.0.0.0

    NAT (CSC-MGMT) 1 10.0.0.5 255.255.255.255

    static (CSC-MGMT, internet2-outside) 2.2.2.3 10.0.0.5 netmask 255.255.255.255

    Access-group INTERNET2-IN interface internet1-outside

    group-access INTERNET1-IN interface internet2-outside

    group-access CAMPUS-LAN in campus-lan interface

    CSC-OUT access-group in SCC-MGMT interface

    Internet2-outside route 0.0.0.0 0.0.0.0 2.2.2.5 1

    Route internet1-outside 0.0.0.0 0.0.0.0 1.1.1.5 2

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    dynamic-access-policy-registration DfltAccessPolicy

    the ssh LOCAL console AAA authentication

    AAA authentication enable LOCAL console

    Enable http server

    http 10.0.0.2 255.255.255.255 CSC-MGMT

    http 10.0.0.8 255.255.255.255 CSC-MGMT

    HTTP 1.2.2.2 255.255.255.255 internet2-outside

    HTTP 1.2.2.2 255.255.255.255 internet1-outside

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs set group5

    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

    Crypto map internet2-outside_map 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    crypto internet2-outside_map outside internet2 network interface card

    Crypto ca trustpoint _SmartCallHome_ServerCA

    Configure CRL

    Crypto ca certificate chain _SmartCallHome_ServerCA

    certificate ca xyzxyzxyzyxzxyzxyzxyzxxyzyxzyxzy

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as

    quit smoking

    ISAKMP crypto enable internet2-outside

    crypto ISAKMP policy 10

    preshared authentication

    aes encryption

    md5 hash

    Group 2

    life 86400

    Telnet 10.0.0.2 255.255.255.255 CSC-MGMT

    Telnet 10.0.0.8 255.255.255.255 CSC-MGMT

    Telnet timeout 5

    SSH 1.2.3.3 255.255.255.240 internet1-outside

    SSH 1.2.2.2 255.255.255.255 internet1-outside

    SSH 1.2.2.2 255.255.255.255 internet2-outside

    SSH timeout 5

    Console timeout 0

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    internal VPN_TG_1 group policy

    VPN_TG_1 group policy attributes

    Protocol-tunnel-VPN IPSec

    username ssochelpdesk encrypted password privilege 15 xxxxxxxxxxxxxx

    privilege of encrypted password username administrator 15 xxxxxxxxxxxxxx

    username vpnuser1 encrypted password privilege 0 xxxxxxxxxxxxxx

    username vpnuser1 attributes

    VPN-group-policy VPN_TG_1

    type tunnel-group VPN_TG_1 remote access

    attributes global-tunnel-group VPN_TG_1

    address vpnpool1 pool

    Group Policy - by default-VPN_TG_1

    IPSec-attributes tunnel-group VPN_TG_1

    pre-shared-key *.

    !

    class-map cmap-DNS

    matches the access list DNS-inspect

    CCS-class class-map

    corresponds to the CSC - acl access list

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    message-length maximum 512

    Policy-map global_policy

    CCS category

    CSC help

    cmap-DNS class

    inspect the preset_dns_map dns

    !

    global service-policy global_policy

    context of prompt hostname

    Cryptochecksum: y0y0y0y0y0y0y0y0y0y0y0y0y0y

    : end

    Adding dynamic NAT for 192.168.150.0/24 on the external interface works, or works the sysopt connection permit VPN

    Please tell what to do here, to pin all of the traffic Internet from VPN Clients.

    That is, that I need clients connected via VPN tunnel, when connected to the internet, should have their addresses IP NAT'ted against the address of outside internet2 network 2.2.2.2 interface, as it happens for the customers of Campus (172.16.0.0/16)

    I am well aware of all involved in here, so please be elaborative in your answers. Please let me know if you need more information about this configuration to respond to my request.

    Thank you & best regards

    MAXS


    Hello

    If possible, I'd like to see that a TCP connection attempt (e.g. http://www.google.com) in the ASDM logging of the VPN Client when you set up the dynamic NAT for the VPN Pool also.

    I'll try also the command "packet - trace" on the SAA, while the VPN Client is connected to the ASA.

    The command format is

    packet-tracer intput tcp

    That should tell what the SAA for this kind of package entering its "input" interface

    Still can not see something wrong with the configuration (other than the statement of "nat" missing Dynamics PAT)

    -Jouni

  • When you try to connect to the XP user account, it starts to load then said end the session but don't connect

    When I try to log on my account, he begins to say load my settings personal, but immediately after it is said to end the session once your settings and brings me back to the same screen and I'm stuck. I tried to do this in safe mode and the same thing is happening even with the account admin I also tried using last good known Configuration and not luck. How can I fix it?

    Hey ashok patelTM,.

    1. you remember to make changes to the computer, after which the issue started?

    Try these steps and see if it helps:

    Step 1:

    Unplug all devices (except keyboard and mouse) external connected to the computer and then try to boot to the desktop and check if it helps. Let us know the results.

    Step 2:

    Try the steps from the link to the following article and see if it helps:

    How do I recover from a corrupted registry that prevents Windows XP startup

    I hope this helps.

  • STOP: c000021a {fatal system error} the initial session process or system ended unexpectedly with status 0 x 000000001 (0xc0000034 0x0010038c). The system has been shut down

    I am trying to start my Dell Inspiron 1525, but get the following blue screen message "STOP: c000021a {fatal system error} the initial session of the process or system process ended unexpectedly with status 0 x 000000001 (0xc0000034 0x0010038c).» The system was stopped.

    I tried to boot mode without fail & startup repair but nothing helps, always the message, any help would be really appreciated as all my College work is stored on the laptop.
    What about Otto
    Windows vista Home basic

    Hello

    Check with Dell Support, their online documentation, diagnosis and ask in the forums about known issues.

    Dell support
    http://support.Dell.com/

    Dell support drivers - product manual & warranty Info (left side) - and much more
    http://support.Dell.com/support/index.aspx?c=us&l=en&s=DHS

    Dell forums
    http://en.community.Dell.com/forums/

    =========

    STOP: 0XC000021A

    Can be a difficult problem to solve, and you indeed need a technical help in a real store of the computer
    (not the leeks and the glances at a BestBuy or other BigBox stores) or system manufacturer support.

    Cause

    This error occurs when a subsystem of mode user, such as WinLogon or the Client Server Run-Time Subsystem (CSRSS), irremediably compromised and security can not be guaranteed. In response, the operating system goes into kernel mode. Microsoft Windows cannot run without WinLogon or CSRSS. Therefore, it is one of the rare cases where the failure of a user mode service can stop the system.

    Incompatible system files can also cause this error. This can happen if you restored your hard disk from a backup. Some backup programs may skip restoring system files which they determine are in use.


    Solve the problem

    Run the kernel debugger is not useful in this situation because the error occurred in a user mode process.

    Resolve an error in the user-mode device driver or system, third-party application service: Because the bug 0xC000021A control occurs in a user mode process, the most common culprits are third-party applications. If the error occurred after the installation of the new or updated device driver or service system, third-party applications, the new software should be removed or disabled. Contact the manufacturer of the software on a possible update.

    If the error occurs during the system startup, restart your computer, and then press F8 to character-based menu that displays the choice of operating system. In the Windows Advanced Options menu that results, select the last known good Configuration option. This option is most effective when a pilot or a service is added at a time. If the error is not resolved, try to manually remove the offending software. If the system partition is formatted with the (FAT) file allocation table, use a MS-DOS boot disk to access the hard disk of the computer. If the system partition is formatted with the NTFS file system, you may be able to use Safe Mode to rename or remove the defective software. If the defective software is used as part of the start-up procedure of the system Safe Mode, you must start the computer by using the Recovery Console to access the file. If a room newly installed if material is suspected, remove it to see if that fixes the problem.

    Try running the emergency recovery disk (ERD) and allow the system to repair any errors that it detects.

    Solve a problem of file system do not match: If you have recently restored your hard disk from a backup, check if there is an updated version of the backup/restore program available from the manufacturer. Make sure that the latest Windows Service Pack is installed.

    STOP: 0XC000021A<-- read="" this="">
    * 1314.html http://www.faultwire.com/solutions-fatal_error/Status-System-Process-terminated-0xC000021A-

    -----------------------------------------------------------------------

    Look in the Event Viewer to see if something is reported on those.
    http://www.computerperformance.co.UK/Vista/vista_event_viewer.htm

    MyEventViewer - free - a simple alternative in the standard Windows Event Viewer.
    TIP - Options - Advanced filter allows you to see a period of time instead of the entire file.
    http://www.NirSoft.NET/utils/my_event_viewer.html

    -------------------------------------------------------------------------

    It's my generic bluescreen convenience store - you can try Mode safe mode as suggested in article
    above - repeatedly press F8 that you start. Disks of Vista are probably necessary - if you do not have to try
    repair, you can borrow a friends because they are not protected against copying. You can also buy the physical
    discs of the machine system good cheap that you already own windows (you will need to reinstall
    If necessary). You can also repair disks on another computer.

    Here are a few ways to possibly fix the blue screen issue. If you could give the blue screen
    info that would help. Such as ITC and 4 others entered at the bottom left. And all others
    error information such as codes of STOP and info like IRQL_NOT_LESS_OR_EQUAL or PAGE_FAULT_IN_NONPAGED_AREA and similar messages.

    As examples:

    BCCode: 116
    BCP1: 87BC9510
    BCP2: 8C013D80
    BCP3: 00000000
    BCP4: 00000002

    or in this format:

    Stop: 0 x 00000000 (oxoooooooo oxoooooooo oxoooooooo oxooooooooo)
    Tcpip.sys - address blocking 0 x 0 00000000 000000000 DateStamp 0 x 000000000

    It is an excellent tool for displaying the blue screen error information

    BlueScreenView scans all your minidump files created during "blue screen of death," collisions
    Displays information on all the "crash" of a table - free
    http://www.NirSoft.NET/utils/blue_screen_view.html

    BlueScreens many are caused by old or damaged, in particular the video drivers drivers however
    There are other causes.

    You can do mode if necessary safe or the Vista DVD command prompt or
    Options recovery if your system is installed by the manufacturer.

    How to start on the System Recovery Options in Windows 7
    http://www.SevenForums.com/tutorials/668-system-recovery-options.html

    You can try a system restore to a point before the problem started when one exists.

    How to do a system restore in Windows 7
    http://www.SevenForums.com/tutorials/700-system-restore.html

    -------------------------------------------------------------------------

    Start - type this in the search box-> find COMMAND at the top and RIGHT CLICK – RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to fix the system files of Windows 7 with the System File Checker
    http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.html

    How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
    generates cbs.log Windows Vista (and Windows 7)
    http://support.Microsoft.com/kb/928228

    The log can give you the answer if there is a corrupted driver. (Says not all possible
    driver problems).

    Also run CheckDisk, so we cannot exclude as much as possible of the corruption.

    How to run the check disk at startup in Windows 7
    http://www.SevenForums.com/tutorials/433-disk-check.html

    -------------------------------------------------------------------------

    Often drivers up-to-date will help, usually video, sound, network card (NIC), WiFi, part 3
    keyboard and mouse, as well as of other major device drivers.

    Look at the sites of the manufacturer for drivers - and the manufacturer of the device manually.
    http://pcsupport.about.com/od/driverssupport/HT/driverdlmfgr.htm

    Installation and update of drivers under Windows 7 (updated drivers manually using the methods above
    It is preferable to ensure that the latest drivers from the manufacturer of system and device manufacturers are located)
    http://www.SevenForums.com/tutorials/43216-installing-updating-drivers-7-a.html

    How to disable automatic driver Installation in Windows Vista - drivers
    http://www.AddictiveTips.com/Windows-Tips/how-to-disable-automatic-driver-installation-in-Windows-Vista/
    http://TechNet.Microsoft.com/en-us/library/cc730606 (WS.10) .aspx

    -------------------------------------------------------------------------

    How to fix BlueScreen (STOP) errors that cause Windows Vista to shut down or restart
    quit unexpectedly
    http://support.Microsoft.com/kb/958233

    Troubleshooting Vista Blue Screen, error of JUDGMENT (and Windows 7)
    http://www.chicagotech.NET/Vista/vistabluescreen.htm

    Understanding and decoding BSOD (blue screen of death) Messages
    http://www.Taranfx.com/blog/?p=692

    Windows - troubleshooting blue screen errors
    http://KB.wisc.edu/page.php?id=7033

    -------------------------------------------------------------------------

    In some cases, it may be necessary.

    Startup Options recovery or Windows 7 disk repair

    How to run a startup repair in Windows 7
    http://www.SevenForums.com/tutorials/681-startup-repair.html

    How to start on the System Recovery Options in Windows 7
    http://www.SevenForums.com/tutorials/668-system-recovery-options.html

    How to create a Windows 7 system repair disc
    http://www.SevenForums.com/tutorials/2083-system-repair-disc-create.html

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle="" -="" mark="" twain="" said="" it="">

  • Using configuration for the 2nd link of lan to lan vpn

    Hello

    Successfully, I configured a connection of lan to lan vpn between two offices. I try to add another link to a 3rd office to my office at home, but have some difficulty. I have attached my setup and hope someone can help me solve my problem. Right now I have a working vpn to the 172.16.0.0/24 network and putting in place the link to 172.16.3.0/24 so. For the new vpn connection, I can ping the external interfaces, but can't ping anything in-house.

    Thanks for your time and help,

    Jason

    Jason

    There is a major mistake that's easy to fix. You have successfully created a second instance of the encryption card to create a VPN tunnel for the second site. But as currently configured two instances of the encryption card use the same access list:

    1 ipsec-isakmp crypto map clientmap

    match address 100

    5 ipsec-isakmp crypto map clientmap

    match address 100

    But each session/tunnel VPN needs its own access list. So, I suggest that you make the following changes:

    5 ipsec-isakmp crypto map clientmap

    match address 101

    no access list 100

    access-list 100 permit ip 192.168.0.0 0.0.0.255 172.16.0.0 0.0.0.255

    access-list 101 permit ip 192.168.0.0 0.0.0.255 172.16.3.0 0.0.0.255

    This provides a list of separate for each session/tunnel access and should solve this problem. Try it and tell us the result.

    HTH

    Rick

  • SSH Session in the firewall log errors

    Cisco NIDS 4210 connected to 515UR PIX for fleeing host.

    Loss of connectivity between the two briefly and when the link is back to the top I see now what follows in firewall logs:

    SSH session (address IP of NESTS) on the inside for the user interface ' ' disconnected by the SSH server, reason: "Connection closed TCP" (0x03)

    These inscriptions are spend on all the 1 second.

    Suggestions?

    You do everything correctly; However, I forgot the most obvious thing!

    Some of the improvements PIX cause the SSH host key change. You trust the old key, but now the key has changed, so that the sensor plugs is no longer.

    Here is how you confirm this and correct. Assume 10.1.2.3 is the IP address of your PIX:

    Log in to the CLI IDS and run the following commands:

    probe # configure terminal

    Service sshKnownHosts Sensor (config) #.

    view the settings of Sensor(config-SshKnownHosts) #.

    rsa1Keys (min: 0, max: 500, current: 1).

    -----------------------------------------------

    ID: 10.1.2.3

    Exhibitor: 35

    Length: 1024

    modulus: 149179708427081921991314663521689741774756100495017439492530949884845471909428674644441439921263665830148866033670908370886898363392278142692283773831284783749668258827076536253701577307251585007783348971708045285375623731521532280202472737775552590541493491501955424294561124918251835488802734947343216844023

    -----------------------------------------------

    -----------------------------------------------

    Sensor(config-SshKnownHosts) # no id rsa1Keys 10.1.2.3

    output Sensor(config-SshKnownHosts) #.

    Sensor (config) # ssh - host key 10.1.2.3

    Fingerprint MD5 is A7:CF:FD:02:C0:A1:C9:10:64:A8:CD:4 A: BA:0E:C1:6 B

    Bubble Babble is xobal-vemyn-tasyn-rimef-nibiv-bodig-dylel-bekat-nacel-tupip-cuxix

    You want to add to the host known for this host table? [Yes]:

    exit Sensor (config) #.

    In this example, we see that the sensor has a key for 10.1.2.3, we removed, then re-confidence that host.

    After you approve that the new PIX ssh host key, the sensor must be able to establish a connection with the PIX and start it management.

  • Will there be improvements made to the features of VPN configuration and firewalls in the ACC?

    Future versions of CCA will have the ability to set up the VPN site-to site on UC520s, UC540s and SR520s without having to use the Multisite Manager or CLI? With non-SBCS Cisco VPN products have a Cisco's GUI to configure site-to-site VPNs. The UC520, UC540 and SR520 are the only Cisco products (with the exception of products that have reached end of life status) who do not have this capability in a sort of Cisco's GUI (apart from the Multisite Manager of CCA 2.1 and later versions).

    Future versions of CCA will allow you to modify the firewall on UC520s, UC540s and SR520s rules without having to resort to the CLI?

    Almost all Cisco products, except for UC520, UC540 and SR520 series products, have a Cisco's GUI to configure these features. The SA520 and SA540, these features can be configured in the web GUI. The Cisco ISR, these features can be configured through SDM or CCP. CCA has always had the ability to fix UC520 unit, but he had not the possibility to fine-tune the settings of firewall and security, unlike the web interface SA500, SDM or CCP.

    Reasons why having the skills to the CCA is important:

    • These characteristics are indicated on the data of UC520, UC540 and SR520 sheets
    • The opportunity to refine and verify access control lists in the ACC can accomplish the following:
      • Ability to comply with HIPAA, Sarbanes-Oxley, PCI, etc.
      • Improved troubleshooting
      • Eliminates the need to use CLI to refine or verify the firewall settings
    • VPN site to site can currently be configured via CLI or the CCA Multisite Manager
    • Multisite Manager CCA can be used for virtual private networks between UC500 or SR520s placed in front of UC500 units units
    • CCA Multisite Manager cannot be used for VPN between autonomous SR520 units, or between a unit UC500 and endpoint non-UC500 (with the exception of a placed in front of a UC500 unit SR520)
    • All images IOS Supportepar UC520 units, UC540 and SR520 routers have firewalls and VPN capabilities described here

    Hi John,.

    The ACC is a configuration tool for platforms that are part of the SBCS solutions. Multisite manager is the approach we take to configure a VPN site. Enchancements in customization of the firewall and access lists is something we plan to put on the roadmap. We will continue to improve the CCA to meet these requirements. We will schedule to get these features added in the 2010 calendar.

    Thank you

    Saurabh

  • ask me if I want to save the tabs at the end of a session and therefore the tabs are lost

    I'm working on a Mac. With version 3.6 of firefox when I type "quit firefox" a window asking if I wanted to save my tabs. By clicking on "save session" saved my tabs open for the next session. With version 4.0.1 of firefox, no window opens, and the session ends. The next session starts with only my open home page. How can I save my tabs open in this version?

    Firefox 4 saves the previous session automatically, so it is no longer necessary for the dialog box asking if you want to save the current session.

    You can use "Firefox > history > restore previous Session ' to get the previous session at any time.

    There is also a button 'Restore previous Session' on the default on: Home home page.

    Another possibility is to use:

    • Firefox > Preferences > General > startup: "When Firefox starts": "show my windows and tabs from last time '.

    Make sure that you do not remove the navigation, search and download history on Firefox to clear the browsing history when you close Firefox.

Maybe you are looking for