VTI and NAT IPsec Tunnel mode

Hello world

I don't know that this subject has been beaten to death already on these forums.  Nevertheless, I have yet to find the exact solution, I need.  I have three machines, two routers and an ASA.  One of the routers sits behind the ASA and I have a GRE VTI configuration between two routers with ASA NATting, one of the routers to a public IP address.  I can guarantee the tunnel mode IPsec transport, but as soon as I pass in tunnel mode, the communication fails even if the SA is established.

Please see the configuration below and tell me what I am missing please.  I changed the IP addresses for security.

The following configuration works when transform-set is set to the mode of transport

Note: The Router 2 is sitting behind the ASA and is coordinated to the public IP 200.1.1.2

Router 1:

Crypto ipsec transform-set SEC esp - aes 256 esp-md5-hmac

tunnel mode

!

Crypto ipsec IPSEC profile

transformation-SEC game

!

!

interface tunnels2

IP 172.16.1.1 255.255.255.252

tunnel source 200.1.1.1

tunnel destination 200.1.1.2

Ipsec IPSEC protection tunnel profile

!

SECURITYKEY address 200.1.1.2 isakmp encryption key

!

crypto ISAKMP policy 1

BA aes 256

md5 hash

preshared authentication

Group 2

ASA:

public static 200.1.1.2 (indoor, outdoor) 10.1.1.1 netmask 255.255.255.255

Router 2:

interface Tunnel121

address 172.16.1.2 IP 255.255.255.252

IP nat inside

IP virtual-reassembly

tunnel source 10.1.1.1

tunnel destination 200.1.1.1

Ipsec IPSEC protection tunnel profile

!

Crypto ipsec transform-set SEC esp - aes 256 esp-md5-hmac

tunnel mode

!

Crypto ipsec IPSEC profile

transformation-SEC game

!

SECURITYKEY address 200.1.1.1 isakmp encryption key

!

crypto ISAKMP policy 2

BA aes 256

md5 hash

preshared authentication

Group 2

There is no access-lists on the SAA except to allow a whole ICMP

I am very grateful for any guidance you can provide in advance guys.

Hello

MTU, and the overhead was in this case.

You changed encapsulating ipv4 instead of LIKING - which have less overhead (no GRE inside). This is why it started working.

If you want to continue using GRE you decrease the MTU as described.

---

Michal

Tags: Cisco Security

Similar Questions

  • (Between Cisco and Fortigate) IPsec tunnel question

    Hi all

    Im trying to install an IPsec site-to-site between 2 different routers (Cisco 3750 and Fortigate 100a) (R1 & Fortigate100A)

    IPsec, the whole scenario works with the installation.

    But unfortunately the tunnel (between R1 & Fortigate100A) IPsec does not work.

    (Pls look at the attached jpg file)

    The message is received in routers are shown below:

    Cisco: R1:

    % CRYPTO-6-IKMP_MODE_FAILURE: fast mode processing failed with the peer to 192.168.43.75

    FortiGate 100A:

    IKE 0: none established HIS IKE for informational type of d18e1af773e658b9/192.168.43.195:500->192.168.43.75 Exchange 3 cookie d3695c6cea17475a, don't drop

    IKE 0:Cisco - P1:6899: authentication OK

    IKE 0: none established HIS IKE for informational type of d18e1af78ed17bf9/192.168.43.195:500->192.168.43.75 Exchange 3 cookie 414bd35ab92bc4ef, don't drop

    IKE 0:Cisco - P1:6899:Cisco - P2:14802: failure of negotiating quick mode due to the delay of new attempt

    IKE 0:Cisco - P1:6900: authentication OK

    I configured both routers as follows:

    Cisco:

    HostName:R1

    ISAKMP policy 1

    Hash: sha

    Authentication: pre-shared

    Encryption: AES128

    DH group: 2

    Life 86400

    ISAKMP Key: cisco1 address 192.168.43.75

    Crypto IPsec transform-set esp - aes and hmac-sha-esp RIGHT

    Access-list: 101 permit ip 10.0.0.0 0.0.0.255 10.10.10.0 0.0.0.255

    Map R1_to_Fortigate100A 10 IPsec-Isakmp crypto

    defined by peers: 192.168.43.75

    Mailing address 101

    The value transformset: RIGHT

    int fa # 0 / 0 Crypto map R1_to_Fortigate100A

    FortiGate:

    HostName: Fortigate100A

    Phase 1:

    Preshared key: cisco1

    The remote gateway ip address: 192.168.43.195

    mode: aggressive

    Accept any pair

    Proposal P1:

    AES 128 / SHA1

    AES 192 / SHA1

    AES192/SHA 256

    DH: 2

    Keylife: 86400

    Phase2:

    AES 128 / SHA1

    AES 192 / SHA1

    AES192/SHA 256

    Keylife:86400

    Quick mode selector:

    Source address: 10.10.10.0/24

    Destination address: 192.168.43.0/24

    I will be very very very grateful if you informed of my faults possible a solution

    Happy new year

    Ministry of education

    For some time I messed with a fortigate, but I would try first to change the remote address of the phase 2 to 10.0.0,0/24. If this is the statement "interesting traffic", it does not match what you have on the Cisco. After that, try to change the phase 1 Ike mode to something else than "aggressive."

    Sent by Cisco Support technique iPad App

  • Protection of IPSEC Tunnel and tunnel QOS shaping does no formatting.

    I have an implosion of the little brain as to why it won't work.

    I tried the QOS policy on tunnel interfaces and the ATM interface. No formatting occurs. Interfaces to transmit at their leisure.

    Please can someone have a better day me to tell me what I am doing wrong?

    Here is the config relevant (and standard). without the political order applied anywhere. Any help appreciated.

    ---------------------------------------------------------------------------------

    class-map correspondence-everything APPSERVEURS
    match the name of group-access TERMINALSERVERS
    class-map correspondence-any VOICE
    sip protocol game
    match Protocol rtp
    match dscp ef
    !
    !
    Policy-map QOSPOLICY
    class VOICE
    priority 100
    class APPSERVEURS
    33% of bandwidth
    class class by default
    Fair/salon-tail 16
    Policy-map of TUNNEL
    class class by default
    form average 350000
    QOSPOLICY service-policy
    !
    !
    interface Tunnel0
    bandwidth 350
    IP 172.20.58.2 255.255.255.0
    IP mtu 1420
    load-interval 30
    QoS before filing
    source of Dialer0 tunnel
    destination tunnel X.X.X.X
    ipv4 ipsec tunnel mode
    tunnel path-mtu-discovery
    Tunnel IPSECPROFILE ipsec protection profile
    !
    Tunnel1 interface
    bandwidth 350
    IP 172.21.58.2 255.255.255.0
    IP mtu 1420
    load-interval 30
    delay 58000
    QoS before filing
    source of Dialer0 tunnel
    destination tunnel Y.Y.Y.Y
    ipv4 ipsec tunnel mode
    tunnel path-mtu-discovery
    Tunnel IPSECPROFILE ipsec protection profile
    !
    !
    ATM0/0/0 interface
    no ip address
    load-interval 30
    No atm ilmi-keepalive
    !
    point-to-point interface ATM0/0/0.1
    PVC 0/38
    aal5mux encapsulation ppp Dialer
    Dialer pool-member 1
    !
    !
    interface Dialer0
    bandwidth 400
    the negotiated IP address

    ---------------------------------------------------------------------------------------------------------

    Thank you

    Paul

    Paul,

    One of the reasons could be because of the VTI overload.

    That being said I don't know which is the way to go with your QoS:

    https://Tools.Cisco.com/bugsearch/bug/CSCsz63683/?reffering_site=dumpcr

    My suggestion: give it a try with 15.2 M/T and prosecute TAC with discount people rather than VPN QoS ;-)

    M.

  • Cisco VTI and configuration of IPSec (IKE Phase2) ITS proposal.

    Hello

    I have a question about the functionality of the virtual Tunnel Interface (VTI) configuration option. I have a Cisco IOS router, ending individual customers with the tunnel interfaces. The question I have now is that how can I specify the traffic 'interesting' on the security association proposal ITS IPsec (IKE Phase2). The configuration of the router is made by cryptographic profiles like this:

    !

    crypto ISAKMP policy 10

    BA 3des

    preshared authentication

    Group 2

    !

    Crypto isakmp ISAKMP_PHASE1_PARAMETERS profile

    key ring PRESHARED_KEYS

    function identity address 1.2.3.4 255.255.255.255

    !

    door-key crypto PRESHARED_KEYS

    pre-shared key address 1.2.3.4 key xyz

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac VPN-TRANSFORMSET

    !

    Profile of crypto ipsec ISAKMP_PHASE2_TUNNEL

    game of transformation-VPN-TRANSFORMSET

    PFS group2 Set

    ISAKMP_PHASE1_PARAMETERS Set isakmp-profile

    !

    Tunnel1 interface

    IP 10.10.10.1 255.255.255.252

    IP mtu 1450

    source of tunnel Loopback1

    tunnel destination 1.2.3.4

    ipv4 ipsec tunnel mode

    Tunnel ISAKMP_PHASE2_TUNNEL ipsec protection profile

    !

    Now when I look at the output of the command 'See the crypto ipsec his tu1 int' I get the following:

    ....

    Interface: Tunnel1

    Tag crypto map: x.x.x.x addr Tunnel1-head-0, local

    protégé of the vrf: (none)

    local ident (addr, mask, prot, port): (0.0.0.0/0.0.0.0/0/0)

    Remote ident (addr, mask, prot, port): (0.0.0.0/0.0.0.0/0/0)

    current_peer 1.2.3.4 port 500

    LICENCE, flags is {origin_is_acl},

    ....

    However, the peer on the other side do not accept the proposal, as it would like to have specific IP subnets on the IPSec security association proposal parameters. He would accept the policy if the identity local remote proxies, for example, would be 192.168.10.0/255.255.255.0/0/0 (local) and

    192.168.200.0/255.255.255.0/0/0 (remotely).

    Y at - it 'interesting' no IOS configuration for traffic configuration option on the profile of crypto? With the crypto map - basic configuration you can specify interesting traffic with an ACL under the crypto map configuration section.

    I'm in IOS version 15.1 (4) M with Advanced IP Services have together.

    Hello

    ASIT will always want to negotiate a whole as traffic selectors.

    What you MIGHT find is multi-SA DVTI configuration, in what remote end could say what proxy identity he would like to encrypt. (Supported from 15.2 M / T)

    Unfortunately, the ceveat of this configuration is this remote end needs to open the negotiation.

    M.

  • transport mode, AH in IPSec AH tunnel mode

    Hello world.

    I read about Ipsec that contains two main protocols among others: AH and ESP.

    For now, I'm focused on AH only. I read the theory on AH and two modes AH may work: mode and tunnel Transport mode.

    (201.201.201.1) h1 - R1 (199.199.199.1) s0 - s0 (199.199.199.2) R2 - H2 (200.200.200.2)

    I would like to implement the following:

    Whenever R1 receives the ip packet to the H1 to H2, R1 must use AH in transport mode before it sends the packet to R2, in the same way, R2 must use AH in transport of packets sent by H2 H1, before mailing in R1.

    I just need an example on how we can configure R1 and R2 to accomplish the task above...

    Thanks for your help and have a great day.

    .

    Hi Sara,.

    Please find the example configuration for the GRE IPsec VPN using the mode of transport.

    (201.201.201.1) h1 - R1 (199.199.199.1) s0 - s0 (199.199.199.2) R2 - H2 (200.200.200.2)

    You can use the ACL to restrict to only the ports required for the vpn as udp 500, ah, gre and 4500 and you can check. I hope this helps.

    Also, you can find the site mentioned described to better understand the differences between the modes of transport or tunnel.

    R1:

    ===

    version 12.4

    !

    hostname R1

    !

    IP cef

    !

    !

    crypto ISAKMP policy 10

    preshared authentication

    address key crypto isakmp 199.199.199.2 CISCO

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac MyTransSet

    transport mode

    !

    Profile of crypto ipsec MyProfile

    game of transformation-MyTransSet

    !

    interface Tunnel0

    IP 10.10.10.1 255.255.255.252

    tunnel source 199.199.199.1

    tunnel destination 199.199.199.2

    ipv4 ipsec tunnel mode

    Profile of tunnel MyProfile ipsec protection

    !

    interface serial0

    199.199.199.1 IP address 255.255.255.0

    automatic duplex

    automatic speed

    !

    IP route 0.0.0.0 0.0.0.0 199.199.199.2

    !

    Line con 0

    line to 0

    line vty 0 4

    !

    !

    end

    ======================================================================

    R2

    =====

    version 12.4

    !

    hostname R2

    !

    !

    !

    IP cef

    !

    !

    crypto ISAKMP policy 10

    preshared authentication

    address key crypto isakmp 199.199.199.1 CISCO

    !

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac MyTransSet

    transport mode

    !

    Profile of crypto ipsec MyProfile

    game of transformation-MyTransSet

    !

    interface Tunnel0

    10.10.10.2 IP address 255.255.255.252

    tunnel source 199.199.199.2

    199.199.199.1 tunnel destination

    ipv4 ipsec tunnel mode

    Profile of tunnel MyProfile ipsec protection

    !

    interface serial0

    IP 199.199.199.2 255.255.255.0

    automatic duplex

    automatic speed

    !

    IP route 0.0.0.0 0.0.0.0 199.199.199.1

    !

    !

    Line con 0

    line to 0

    line vty 0 4

    !

    !

    end

    Please assess whether the information provided is useful.

    By

    Knockaert

  • GET VPN tunnel mode and transport mode multicast

    Hello

    I really don't understand why GET VPN uses a tunnel for packets in multicast mode:

    Examples of a @multicast = 239.0.0.37:

    (1) here a package to GET VPN: | 239.0.0.37 | ESP | 239.0.0.37 | transport layer. Payload: : This way, he uses (two IP headers) IPSec tunnel mode.

    (2) here a package that I imagine to be better: | 239.0.0.37 | ESP | transport layer. Payload: : Mode of transport IPsec, 1 registered IP header = fewer bytes used.

    In both cases, the IP header cannot be secured, cause GET VPN Tunnel using the same multicast IP header (this is why it works so well...)

    I don't understand why Cisco uses model IPsec in tunnel mode to encapsulate packets instead of the mode of transport. I can't find a descent of answer to this question... Maybe my question is not relevant?

    Thanks for your replies.

    Concerning

    Stone,

    I quote DIG it

    It is worth noting that tunnel header preservation seems very similar to IPsec transport mode.

    However, the underlying IPsec mode of operation with GET VPN is IPsec tunnel mode. While

    IPsec transport mode reuses the original IP header and therefore adds less overhead to an IP

    packet (5% for IMIX packets; 1% for 1400-byte packets), IPsec transport mode suffers from

    fragmentation and reassembly limitations when used together with Tunnel Header Preservation

    and must not be used in GET VPN deployments where encrypted or clear packets might require

    fragmentation.

    In practice, reassambly concerns and initially odd behaviors with some encryption engines caused the recommendation to be tunnel mode.

    That being said, for large packages (where fresh important generals) overhead costs are minimal. For small packages (voice), the overhead is large, but the packet (after encapsulation) size should not be a problem.

    M.

  • Strange problem in IPSec Tunnel - 8.4 NAT (2)

    Helloo all,.

    This must be the strangest question I've seen since the year last on my ASA.

    I have an ASA 5540, who runs the code of 8.4 (2) without any problem until I ran into this problem last week and I spent sleepless nights with no resolution! Then, take a deep breath and here is a brief description of my setup and the problem:

    A Simple IPSEC tunnel between my 8.4 (2) ASA 5540 and a Juniper SSG 140 6.3.0r9.0 (road OS based VPN) screen

    The tunnel rises without any problem but the ASA refused to encrypt the traffic but it decrypts with GLORY!

    Here are a few outputs debug, see the output and a package tracer output that also has an explanation of my problem of NAT WEIRD:

    my setup - (I won't get into the details of encryption tunnel as my tunnel negotiations are perfect and returns from the outset when the ASA is configured as response only)

    CISCO ASA - IPSec network details

    LAN - 10.2.4.0/28

    REMOTE NETWORK - 192.168.171.8/32

    JUNIPER SSG 140 - IPSec networks details

    ID OF THE PROXY:

    LAN - 192.168.171.8/32

    REMOTE NETWORK - 10.2.4.0/28

    Name host # sh cry counterpart his ipsec

    peer address:

    Tag crypto map: outside_map, seq num: 5, local addr:

    outside_cryptomap_4 to access extended list ip 10.2.4.0 allow 255.255.255.240 host 192.168.171.8

    local ident (addr, mask, prot, port): (10.2.4.0/255.255.255.240/0/0)

    Remote ident (addr, mask, prot, port): (192.168.171.8/255.255.255.255/0/0)

    current_peer:

    #pkts program: encrypt 0, #pkts: 0, #pkts digest: 0

    #pkts decaps: 72, #pkts decrypt: 72, #pkts check: 72

    compressed #pkts: 0, unzipped #pkts: 0

    #pkts uncompressed: 0, comp #pkts failed: 0, #pkts Dang failed: 0

    success #frag before: 0, failures before #frag: 0, #fragments created: 0

    Sent #PMTUs: 0, #PMTUs rcvd: 0, reassembly: 20th century / of frgs #decapsulated: 0

    #send errors: 0, #recv errors: 0

    local crypto endpt. : 0, remote Start. crypto: 0

    Path mtu 1500, fresh ipsec generals 58, media, mtu 1500

    current outbound SPI: 5041C19F

    current inbound SPI: 0EC13558

    SAS of the esp on arrival:

    SPI: 0x0EC13558 (247543128)

    transform: esp-3des esp-sha-hmac no compression

    running parameters = {L2L, Tunnel}

    slot: 0, id_conn: 22040576, crypto-card: outside_map

    calendar of his: service life remaining key (s): 3232

    Size IV: 8 bytes

    support for replay detection: Y

    Anti-replay bitmap:

    0xFFFFFFFF to 0xFFFFFFFF

    outgoing esp sas:

    SPI: 0x5041C19F (1346486687)

    transform: esp-3des esp-sha-hmac no compression

    running parameters = {L2L, Tunnel}

    slot: 0, id_conn: 22040576, crypto-card: outside_map

    calendar of his: service life remaining key (s): 3232

    Size IV: 8 bytes

    support for replay detection: Y

    Anti-replay bitmap:

    0x00000000 0x00000001

    CONTEXTS for this IPSEC VPN tunnel:

    # Sh asp table det vpn context host name

    VPN CTX = 0x0742E6BC

    By peer IP = 192.168.171.8

    Pointer = 0x78C94BF8

    State = upwards

    Flags = BA + ESP

    ITS = 0X9C28B633

    SPI = 0x5041C19D

    Group = 0

    Pkts = 0

    Pkts bad = 0

    Incorrect SPI = 0

    Parody = 0

    Bad crypto = 0

    Redial Pkt = 0

    Call redial = 0

    VPN = filter

    VPN CTX = 0x07430D3C

    By peer IP = 192.168.1.8

    Pointer = 0x78F62018

    State = upwards

    Flags = DECR + ESP

    ITS = 0X9C286E3D

    SPI = 0x9B6910C5

    Group = 1

    Pkts = 297

    Pkts bad = 0

    Incorrect SPI = 0

    Parody = 0

    Bad crypto = 0

    Redial Pkt = 0

    Call redial = 0

    VPN = filter

    outside_cryptomap_4 to access extended list ip 10.2.4.0 allow 255.255.255.240 host 192.168.171.8

    NAT (inside, outside) static source Ren - Ren - about destination static counterpart-host peer to route non-proxy-arp-search

    network of the Ren - around object

    subnet 10.2.4.0 255.255.255.240

    network of the host object counterpart

    Home 192.168.171.8

    HS cry ipsec his

    IKE Peer:

    Type: L2L role: answering machine

    Generate a new key: no State: MM_ACTIVE

    output packet tracer extracted a packet transmitted by the network of 10.2.4.0/28 to 192.168.171.8 host

    Phase: 7

    Type: VPN

    Subtype: encrypt

    Result: ALLOW

    Config:

    Additional information:

    Direct flow from returns search rule:

    ID = 0x7789d788, priority = 70, domain = encrypt, deny = false

    Hits = 2, user_data is0x742e6bc, cs_id = 0x7ba38680, reverse, flags = 0 x 0 = 0 protocol

    IP/ID=10.2.4.0 SRC, mask is 255.255.255.240, port = 0

    IP/ID=192.168.171.8 DST, mask is 255.255.255.255, port = 0, dscp = 0 x 0

    input_ifc = none, output_ifc = external

    VPN settings corresponding to the encrytpion + encapsulation and the hits here increment only when I run a test of tracer from my host on the remote peer inside package.

    A tracer complete package out for a packet of the 10.2.4.1 255.255.255.255 network to host 192.168.171.8:

    Phase: 1

    Type: ACCESS-LIST

    Subtype:

    Result: ALLOW

    Config:

    Implicit rule

    Additional information:

    Direct flow from returns search rule:

    ID = 0x77ebd1b0, priority = 1, domain = allowed, deny = false

    hits = 3037156, user_data = 0 x 0, cs_id = 0 x 0, l3_type = 0 x 8

    Mac SRC = 0000.0000.0000, mask is 0000.0000.0000

    DST = 0000.0000.0000 Mac, mask is 0100.0000.0000

    input_ifc = output_ifc = any to inside,

    Phase: 2

    Type:-ROUTE SEARCH

    Subtype: entry

    Result: ALLOW

    Config:

    Additional information:

    in 192.168.171.0 255.255.255.0 outside

    Phase: 3

    Type: IP-OPTIONS

    Subtype:

    Result: ALLOW

    Config:

    Additional information:

    Direct flow from returns search rule:

    ID = 0x77ec1030, priority = 0, sector = inspect-ip-options, deny = true

    hits = 212950, user_data = 0 x 0, cs_id = 0 x 0, reverse, flags = 0 x 0 = 0 protocol

    IP/ID=0.0.0.0 SRC, mask is 0.0.0.0, port = 0

    IP/ID=0.0.0.0 DST, mask is 0.0.0.0, port = 0, dscp = 0 x 0

    input_ifc = output_ifc = any to inside,

    Phase: 4

    Type:

    Subtype:

    Result: ALLOW

    Config:

    Additional information:

    Direct flow from returns search rule:

    ID = 0x7c12cb18, priority = 18, area = import-export flows, deny = false

    hits = 172188, user_data = 0x78b1f438, cs_id = 0 x 0, use_real_addr, flags = 0 x 0,

    IP/ID=0.0.0.0 SRC, mask is 0.0.0.0, port = 0

    IP/ID=0.0.0.0 DST, mask is 0.0.0.0, port = 0, dscp = 0 x 0

    input_ifc = output_ifc = any to inside,

    Phase: 5

    Type: NAT

    Subtype:

    Result: ALLOW

    Config:

    NAT (inside, outside) static source Ren - Ren - about destination static counterpart-host peer to route non-proxy-arp-search

    Additional information:

    Definition of static 10.2.4.1/2700 to 10.2.4.1/2700

    Direct flow from returns search rule:

    ID = 0x77e0a878, priority = 6, area = nat, deny = false

    hits = 9, user_data is 0x7b7360a8, cs_id = 0 x 0, use_real_addr, flags = 0 x 0, proto

    IP/ID=10.2.4.1 SRC, mask is 255.255.255.240, port = 0

    IP/ID=192.168.171.8 DST, mask is 255.255.255.255, port = 0, dscp = 0 x 0

    input_ifc = inside, outside = output_ifc


    (it's the weird NAT problem I see. I see the number of hits is increment only when I run the packet tracer understands even I have pings (traffic) the 192.168.171.8 constant welcomes the 10.2.4.1/28)-s'il please see the package I pasted after the capture section)

    Phase: 6

    Type: VPN

    Subtype: encrypt

    Result: ALLOW

    Config:

    Additional information:

    Direct flow from returns search rule:

    ID = 0x7b8751f8, priority = 70, domain = encrypt, deny = false

    hits = 3, user_data = 0x7432b74, cs_id = 0x7ba38680, reverse, flags = 0 x 0, proto

    IP/ID=10.2.4.1 SRC, mask is 255.255.255.240, port = 0

    IP/ID=192.168.171.8 DST, mask is 255.255.255.255, port = 0, dscp = 0 x 0

    input_ifc = none, output_ifc = external

    Phase: 7

    Type: VPN

    Subtype: ipsec-tunnel-flow

    Result: ALLOW

    Config:

    Additional information:

    Reverse flow from returns search rule:

    ID = 0x78b0c280, priority = 69 = ipsec-tunnel-flow area, deny = false

    hits = 154, user_data is 0x7435f94, cs_id = 0 x 0, reverse, flags = 0 x 0 = 0 protocol

    IP/ID=192.168.171.8 SRC, mask is 255.255.255.255, port = 0

    IP/ID=10.2.4.1 DST, mask is 255.255.255.240, port = 0, dscp = 0 x 0

    input_ifc = out, output_ifc = any

    Phase: 8

    Type: IP-OPTIONS

    Subtype:

    Result: ALLOW

    Config:

    Additional information:

    Reverse flow from returns search rule:

    ID = 0x77e7a510, priority = 0, sector = inspect-ip-options, deny = true

    hits = 184556, user_data = 0 x 0, cs_id = 0 x 0, reverse, flags = 0 x 0 = 0 protocol

    IP/ID=0.0.0.0 SRC, mask is 0.0.0.0, port = 0

    IP/ID=0.0.0.0 DST, mask is 0.0.0.0, port = 0, dscp = 0 x 0

    input_ifc = out, output_ifc = any

    Phase: 9

    Type: CREATING STREAMS

    Subtype:

    Result: ALLOW

    Config:

    Additional information:

    New workflow created with the 119880921 id, package sent to the next module

    Information module for forward flow...

    snp_fp_tracer_drop

    snp_fp_inspect_ip_options

    snp_fp_tcp_normalizer

    snp_fp_translate

    snp_fp_adjacency

    snp_fp_encrypt

    snp_fp_fragment

    snp_ifc_stat

    Information for reverse flow...

    snp_fp_tracer_drop

    snp_fp_inspect_ip_options

    snp_fp_ipsec_tunnel_flow

    snp_fp_translate

    snp_fp_tcp_normalizer

    snp_fp_adjacency

    snp_fp_fragment

    snp_ifc_stat

    Result:

    input interface: inside

    entry status: to the top

    entry-line-status: to the top

    output interface: outside

    the status of the output: to the top

    output-line-status: to the top

    Action: allow

    Hostname # sh Cap A1

    8 packets captured

    1: 12:26:53.376033 192.168.10.252 > 10.2.4.1: icmp: echo request

    2: 12:26:53.376597 10.2.4.1 > 192.168.10.252: icmp: echo reply

    3: 12:26:56.487905 192.168.171.8 > 10.2.4.1: icmp: echo request

    4: 12:27:01.489217 192.168.171.8 > 10.2.4.1: icmp: echo request

    5: 12:27:03.378245 192.168.10.252 > 10.2.4.1: icmp: echo request

    6: 12:27:03.378825 10.2.4.1 > 192.168.10.252: icmp: echo reply

    7: 12:27:06.491597 192.168.171.8 > 10.2.4.1: icmp: echo request

    8: 12:27:11.491856 192.168.171.8 > 10.2.4.1: icmp: echo request

    8 packets shown

    As you can see, there is no echo response packet at all because the package may not be wrapped while he was sent to.

    I'm Karen with it. In addition, he is a firewall multi-tenant live production with no problems at all outside this for a Juniper ipsec tunnel!

    Also, the 192.168.10.0/24 is another remote network of IPSec tunnel to this network of 10.2.4.0/28 and this IPSEC tunnel has a similar Juniper SSG 140 screen os 6.3.0r9.0 at the remote end and this woks like a charm with no problems, but the 171 is not be encrypted by the ASA at all.

    If someone could help me, that would be greatt and greatly appreciated!

    Thanks heaps. !

    Perfect! Now you must find something else inside for tomorrow--> forecast rain again

    Please kindly marks the message as answered while others may learn from it. Thank you.

  • IPSec tunnels does not work

    I have 2 Cat6, with IPsec SPA card, while the other did not.

    I tried setting IPsec tunnel between them, but somehow can't bring up the tunnel, can someone help me to watch set it up?

    A (with SPA):

    crypto ISAKMP policy 1

    BA aes 256

    preshared authentication

    Group 5

    ISAKMP crypto cisco123 key address 0.0.0.0 0.0.0.0

    ISAKMP crypto keepalive 10

    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac testT1

    !

    Crypto ipsec profile P1

    Set transform-set testT1

    !

    Crypto call admission limit ike his 3000

    !

    Crypto call admission limit ike in-negotiation-sa 115

    !

    interface Tunnel962

    Loopback962 IP unnumbered

    tunnel GigabitEthernet2/37.962 source

    tunnel destination 172.16.16.6

    ipv4 ipsec tunnel mode

    Profile of tunnel P1 ipsec protection

    interface GigabitEthernet2/37.962

    encapsulation dot1Q 962

    IP 172.16.16.5 255.255.255.252

    interface Loopback962

    1.1.4.200 the IP 255.255.255.255

    IP route 2.2.4.200 255.255.255.255 Tunnel962

    B (wuthout SPA):

    crypto ISAKMP policy 1

    BA aes 256

    preshared authentication

    Group 5

    ISAKMP crypto cisco123 key address 0.0.0.0 0.0.0.0

    !

    !

    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac T1

    !

    Crypto ipsec profile P1

    game of transformation-T1

    interface Tunnel200

    Loopback200 IP unnumbered

    tunnel GigabitEthernet2/1.1 source

    tunnel destination 172.16.16.5

    ipv4 ipsec tunnel mode

    Profile of tunnel T1 ipsec protection

    interface Loopback200

    2.2.4.200 the IP 255.255.255.255

    interface GigabitEthernet2/1.1

    encapsulation dot1Q 962

    IP 172.16.16.6 255.255.255.252

    IP route 1.1.4.200 255.255.255.255 Tunnel200

    I can ping from 172.16.16.6 to 172.16.16.5, but the tunnel just can not upwards. When I turned on "debugging ipsec cry ' and ' debug cry isa", nothing comes out, when I trun on 'cry of debugging sciences', I got:

    "00:25:17: crypto_engine_select_crypto_engine: can't handle more."

    Hello

    You need a map of IPSEC SPA on chassis B do IPSEC encryption. Please see the below URL for more details.

    Without a SPA-IPSEC - 2G or IPsec VPN Services Module of acceleration, the IPsec network security feature (configured with the crypto ipsec command) is supported in the software only for administrative for Catalyst 6500 series switches and routers for the Cisco 7600 Series connections.

    http://www.Cisco.com/en/us/docs/switches/LAN/catalyst6500/IOS/12.2SXF/native/release/notes/OL_4164.html

    Kind regards

    Arul

    * Rate pls if it helps *.

  • Public static IPsec tunnel between two routers cisco [VRF aware]

    Hi all

    I am trying to configure static IPsec tunnel between two routers. Router R1 has [no VRF] only global routing table.

    Router R2 has two routing tables:

    * vrf INET - used for internet connectivity

    * global routing table - used for VPN connections

    Here are the basic configs:

    R1

    crypto ISAKMP policy 1
    BA 3des
    md5 hash
    preshared authentication
    Group 2
    ISAKMP crypto key 7V7u841k2D3Q7v98d6Y4z0zF address 203.0.0.3
    invalid-spi-recovery crypto ISAKMP
    !
    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac TRSET_AES-256_SHA
    transport mode
    !
    Crypto ipsec TUNNEL-IPSEC-PROTECTION profile
    game of transformation-TRSET_AES-256_SHA
    !
    interface Loopback0
    10.0.1.1 IP address 255.255.255.255
    IP ospf 1 zone 0
    !
    interface Tunnel0
    IP 192.168.255.34 255.255.255.252
    IP ospf 1 zone 0
    source of tunnel FastEthernet0/0
    tunnel destination 203.0.0.3
    ipv4 ipsec tunnel mode
    Ipsec TUNNEL-IPSEC-PROTEC protection tunnel profile
    !
    interface FastEthernet0/0
    IP 102.0.0.1 255.255.255.0

    !

    IP route 203.0.0.3 255.255.255.255 FastEthernet0/0 102.0.0.2

    #######################################################

    R2

    IP vrf INET
    RD 1:1
    !
    Keyring cryptographic test vrf INET
    address of pre-shared-key 102.0.0.1 key 7V7u841k2D3Q7v98d6Y4z0zF
    !
    crypto ISAKMP policy 1
    BA 3des
    md5 hash
    preshared authentication
    Group 2
    invalid-spi-recovery crypto ISAKMP
    crypto isakmp profile test
    door-key test
    function identity address 102.0.0.1 255.255.255.255
    !
    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac TRSET_AES-256_SHA
    transport mode
    !
    Crypto ipsec TUNNEL-IPSEC-PROTECTION profile
    game of transformation-TRSET_AES-256_SHA
    Test Set isakmp-profile
    !
    interface Loopback0
    IP 10.0.2.2 255.255.255.255
    IP ospf 1 zone 0
    !
    interface Tunnel0
    IP 192.168.255.33 255.255.255.252
    IP ospf 1 zone 0
    source of tunnel FastEthernet0/0
    tunnel destination 102.0.0.1
    ipv4 ipsec tunnel mode
    tunnel vrf INET
    Ipsec TUNNEL-IPSEC-PROTEC protection tunnel profile
    !
    interface FastEthernet0/0
    IP vrf forwarding INET
    IP 203.0.0.3 255.255.255.0

    !

    IP route 102.0.0.1 255.255.255.255 FastEthernet0/0 203.0.0.2

    #######################################################

    There is a router between R1 and R2, it is used only for connectivity:

    interface FastEthernet0/0
    IP 102.0.0.2 255.255.255.0
    !
    interface FastEthernet0/1
    IP 203.0.0.2 255.255.255.0

    The problem that the tunnel is not coming, I can't pass through phase I.

    The IPsec VPN are not my strength. So if someone could show me what mistake I make, I'd appreciate it really.

    I joined ouptup #debug R2 crypto isakmp

    Source and destination Tunnel0 is belong to VRF INET, the static route need to be updated.

    IP route vrf INET 102.0.0.1 255.255.255.255 FastEthernet0/0 203.0.0.2

    crypto isakmp profile test

    VRF INET

    door-key test
    function identity address 102.0.0.1 255.255.255.255

  • IPSec tunnel between 2 routers

    Hello

    I am trying to configure an IPSec VPN tunnel between 2 routers Cisco, connected to the internet via the ATM interface, my router is a 1841 with the network 10.200.36.0 address the remote router is a Cisco network 192.168.9.0 address with 877.

    I have tryied to follow some tutorials, unsuccessfully, because I can't always ping all IP addresses on the remote network and also the VPN tunnel is not up!

    Can help you please give me a configuration model, or maybe let me know how to configure step by step on mine and remote router?

    Thank you very much!

    Concerning

    Riccardo

    Here is an example. x.x.x.x and y.y.y.y are the public IPs of routers:

    ROUTER1 hostname

    !

    crypto ISAKMP policy 10

    BA aes 256

    AUTH pre

    Group 5

    !

    ISAKMP crypto key cisco1234 address y.y.y.y

    !

    Crypto ipsec transform-set ESP-AES256-SHA1 esp - aes 256 esp-sha-hmac

    !

    Profile of crypto ipsec TunnelProfile

    the transform ESP-AES256-SHA1 value

    !

    interface Tunnel0

    IP 10.255.255.0 255.255.255.254

    tunnel Dialer source 0

    tunnel destination y.y.y.y

    ipv4 ipsec tunnel mode

    Tunnel TunnelProfile ipsec protection profile

    !

    interface Dialer0

    IP x.x.x.x

    !

    IP route 192.168.9.0 255.255.255.0 Tunnel0

    hostname ROUTER2

    !

    crypto ISAKMP policy 10

    BA aes 256

    AUTH pre

    Group 5

    !

    ISAKMP crypto cisco1234 key address x.x.x.x

    !

    Crypto ipsec ESP-AES256-SHA1 transform-set esp - aes 256 esp-sha-hmac

    !

    Profile of crypto ipsec TunnelProfile

    the transform ESP-AES256-SHA1 value

    !

    interface Tunnel0

    IP 10.255.255.1 255.255.255.254

    tunnel Dialer source 0

    tunnel destination x.x.x.x

    ipv4 ipsec tunnel mode

    Tunnel TunnelProfile ipsec protection profile

    !

    interface Dialer0

    IP address y.y.y.y

    !

    IP route 10.200.36.0 255.255.255.0 Tunnel0

    --
    Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
    http://www.Kiva.org/invitedBy/karsteni

  • Cisco 1841 ipsec tunnel protocol down after a minute

    I have a strange problem where im manages to get a tha cisco ipsec tunnel 1841 to a RV016 linksys/cisco for about a minute and ping/encrypt the packets through the linen for about a minute before it breaks down. I tried different configuration and it all results in the tunnel for a minute then descend to come. I don't know if im hitting a bug and decide to if im doing something wrong.

    any help is appreciated paul

    RV016 firmware 2.0.18

    Cisco 1841: C1841-ADVENTERPRISEK9-M), Version 12.4 (24) T

    my config

    no default isakmp crypto policy

    !

    crypto ISAKMP policy 1

    BA 3des

    md5 hash

    preshared authentication

    Group 2

    lifetime 28800

    ISAKMP crypto key address 0.0.0.0 eaton1234 0.0.0.0

    !

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac ESSTS

    transport mode

    no default crypto ipsec transform-set

    !

    Crypto ipsec profile ipsec_profile1

    Description in the location main site to site VPN tunnel

    game of transformation-ESSTS

    PFS group2 Set

    !

    !

    !

    !

    !

    !

    !

    Tunnel1 interface

    Description of the location of the hand

    IP unnumbered Serial0/0/0

    source of tunnel Serial0/0/0

    destination 209.213.x.x tunnel

    ipv4 ipsec tunnel mode

    tunnel path-mtu-discovery

    protection of ipsec profile ipsec_profile1 tunnel

    !

    a debug output

    Apr 24 16:42:07: IPSEC (validate_proposal_request): part #1 the proposal

    Apr 24 16:42:07: IPSEC (validate_proposal_request): part #1 of the proposal

    (Eng. msg key.) Local INCOMING = 209.213.xx.46, distance = 209.213.xx.164,.

    local_proxy = 10.20.86.0/255.255.255.0/0/0 (type = 4),

    remote_proxy = 10.0.0.0/255.255.255.0/0/0 (type = 4),

    Protocol = ESP, transform = NONE (Tunnel),

    lifedur = 0 and 0kb in

    SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 0

    Apr 24 16:42:07: mapdb Crypto: proxy_match

    ADR SRC: 10.20.86.0

    ADR DST: 10.0.0.0

    Protocol: 0

    SRC port: 0

    DST port: 0

    Apr 24 16:42:07: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)

    Apr 24 16:42:07: mapdb Crypto: proxy_match

    ADR SRC: 10.20.86.0

    ADR DST: 10.0.0.0

    Protocol: 0

    SRC port: 0

    DST port: 0

    Apr 24 16:42:07: IPSEC (policy_db_add_ident): src dest 10.0.0.0, 10.20.86.0, dest_port

    0

    Apr 24 16:42:07: IPSEC (create_sa): its created.

    (his) sa_dest = 209.213.xx.46, sa_proto = 50,.

    sa_spi = 0x4CF51011 (1291128849).

    sa_trans = sa_conn_id of hmac-sha-esp, esp-3des = 2045

    sa_lifetime(k/sec) = (4463729/3600)

    Apr 24 16:42:07: IPSEC (create_sa): its created.

    (his) sa_dest = 209.213.xx.164, sa_proto = 50,.

    sa_spi = 0x1EB77DAF (515341743).

    sa_trans = sa_conn_id of hmac-sha-esp, esp-3des = 2046

    sa_lifetime(k/sec) = (4463729/3600)

    Apr 24 16:42:07: % LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, sta changed

    you to

    Apr 24 16:42:07: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)

    Apr 24 16:42:07: IPSEC (key_engine_enable_outbound): rec would notify of ISAKMP

    Apr 24 16:42:07: IPSEC (key_engine_enable_outbound): select SA with spinnaker 515341743/50

    Apr 24 16:42:07: IPSEC (update_current_outbound_sa): update peer 209.213.xx.164 curre

    NT his outgoing to SPI 1EB77DAF

    Apr 24 16:42:12: IPSEC (key_engine): request timer shot: count = 1,.

    local (identity) = 209.213.xx.46, distance = 209.213.xx.164,

    local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    remote_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4)

    Apr 24 16:42:12: IPSEC (sa_request):,.

    (Eng. msg key.) Local OUTGOING = 209.213.xx.46, distance = 209.213.xx.164,.

    local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    remote_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    Protocol = ESP, transform = esp-3des esp-sha-hmac (Tunnel),

    lifedur = 3600 s and KB 4608000,

    SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 0

    Apr 24 16:42:42: IPSEC (key_engine): request timer shot: count = 2,.

    local (identity) = 209.213.xx.46, distance = 209.213.xx.164,

    local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    remote_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4)

    Apr 24 16:42:42: % LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, sta changed

    you all the downu

    All possible debugging has been disabled

    I would try to set up a VPN Interface virtual Tunnel on the IOS router base and the value of defined transformation in tunnel mode no transport.

    In history, I have had several issues with VPN between a router IOS and the series RV.

  • Double IPSec tunnel between routers

    I am facing the following challenge:

    I have two routers and want to build two IPSec encapsulated between them, with the help of ASIT tunnel interfaces.

    The interaces two tunnel would in that case the same source and destination ip addresses.

    With a single tunnel interface defined, it works well, however, as soon as the second tunnel interface is defined, the first breaks down.

    Here is an example configuration:

    interface Tunnel0
    IP 192.168.1.1 255.255.255.252
    source of tunnel Serial1/0
    tunnel destination 10.1.1.6
    ipv4 ipsec tunnel mode
    protection of ipsec profile ipsecprofile tunnel
    !
    Tunnel1 interface
    IP 192.168.1.5 255.255.255.252
    source of tunnel Serial1/0
    tunnel destination 10.1.1.6
    ipv4 ipsec tunnel mode
    protection of ipsec profile ipsecprofile tunnel
    !

    In fact, the matter is rather a conceptual issue than a direct. What is the root cause, this type of configuration does not work?

    ESP protocol is the distinction between endponits ESP SAs based on SPI identifier as well, isn't? If so, what is wrong here?

    Thanks in advance...

    Hi Frank,.

    As a general rule, you cannot have two interfaces of tunnel with the same tunnel source (series 1/0) and destinations (10.1.1.6) tunnel; with the same method (ipv4) tunel.

    The work around that would be to bounce one of the tunnels on a loopback interface.

    This tunnel 1: tunnel_interface_1 - series 1/0---internet---10.1.1.6

    and tunnel 2: tunnel_interface_2---loopback---serial1/0---internet---10.1.1.6

    In this way the two tunnels can be up at the same time.

    I hope this helps.

    -Shrikant

    P.S.: Please check question one answer, if it has been resolved. Note the useful messages. Thank you.

  • IPsec VPN between two routers - mode ESP Transport and Tunnel mode

    Hi experts,

    I have this question about the Transport mode and Tunnel mode for awhile.

    Based on my understanding of 'Transport' mode is not possible because you always original "internal" private in the IP headers or IP addresses. They are always different as public IP on interfaces enabled with Crypto Card addresses. When encapsulated in the VPN tunnel, the internal IP addresses must be included or the remote VPN router won't know where to forward the packet.

    To test, I built a simple GNS3 with three routers laboratory. R1 and R3 are configured as VPN routers and the R2 must simulate Internet.

    My configs are also very basic. The R2 is routing between 1.1.1.0/24 and 2.2.2.0/24. It is defined as the gateway of R1 and R3.

    R1:

    crypto ISAKMP policy 100
    BA aes
    preshared authentication
    Group 2
    ISAKMP crypto key 123456 address 2.2.2.2
    !
    Crypto ipsec transform-set ESP_null null esp esp-sha-hmac
    !
    10 map ipsec-isakmp crypto map
    defined peer 2.2.2.2
    transformation-ESP_null game
    match address VPN

    !

    list of IP - VPN access scope
    ip permit 192.168.1.0 0.0.0.255 10.0.0.0 0.0.0.255
    !

    R3:

    crypto ISAKMP policy 100
    BA aes
    preshared authentication
    Group 2
    ISAKMP crypto key 123456 address 1.1.1.2
    !
    !
    Crypto ipsec transform-set ESP_null null esp esp-sha-hmac
    !
    10 map ipsec-isakmp crypto map
    defined peer 1.1.1.2
    transformation-ESP_null game
    match address VPN

    !

    list of IP - VPN access scope
    Licensing ip 10.0.0.0 0.0.0.255 192.168.1.0 0.0.0.255

    I configured transform-"null" value, while it will not encrypt the traffic.

    Then I tried the two 'transport' mode and mode "tunnel". I ping a host in the internal network of the R1 to another host in the internal network of the R3. I also tried 'telnet'. I also captured packets and carefully compared in both modes.

    Packets encapsulated in exactly the same way!

    It's just SPI + sequence No. + + padding

    I will attach my screenshots here for you guys to analyze it. I would be grateful for any explanation. I confused maybe just when it comes to the NAT...

    I guess my next step is to check if the two modes to make the difference when the GRE is used.

    Thank you

    Difan

    Hi Difan,

    As you point out the mode of transport is not always applicable (i.e. applicable if IP source and destination is equal to corresnpoding proxy IDs).

    A typical scenario in this mode of transport is used:

    -Encryption between two hosts

    -GRE tunnels

    -L2TP over IPsec

    Even if you set "transport mode" this does not mean that it will be used. IOS routers and I blieve also ASA will perform backup even if the mode of transport is configured but does not apply in tunnel mode.

    I can take a look at your traces to sniff, but all first can you please check if you transport mode on your ipsec security associations? "See the crypto ipsec his" exit you will show the tunnel or transport mode.

    HTH,

    Marcin

  • IPSec Tunnel between Cisco 2801 and Netscren 50 with NAT and static

    Hello

    My problem isn't really the IPSec connection between two devices (it is already done...) But my problem is that I have a mail server on the site of Cisco, who have a static NAT from inside to outside. Due to the static NAT, I do not see the server in the VPN tunnel. I found a document that almost describes the problem:

    "Configuration of a router IPSEC Tunnel private-to-private network with NAT and static" (Document ID 14144)

    NAT takes place before the encryption verification!

    In this document, the solution is 'routing policy' using the loopback interface. But, how can I handle this with the Netscreen firewall. Someone has an idea?

    Thanks for any help

    Best regards

    Heiko

    Hello

    Try to change your static NAT with static NAT based policy.

    That is to say the static NAT should not be applicable for VPN traffic

    permissible static route map 1

    corresponds to the IP 104

    access-list 104 refuse host ip 10.1.110.10 10.1.0.0 255.255.0.0

    access-list 104 allow the host ip 10.1.110.10 all

    IP nat inside source static 10.1.110.10 81.222.33.90 map of static route

    HTH

    Kind regards

    GE.

  • Policy Nat and IPSec tunnel

    Hello

    I have a Cisco IOS router and you want to configure an IPSec tunnel between myself and the client.  Unfortunately, we have two overlapping of 10 network IP addresses.

    Is it possible for me to just Nat addresses IP on my side or should the customer Nat as well?

    I have configured NAT on the inside of the interface for 10.134.206.1 to 192.168.156.6 so that Nat happens before that packages are encrypted in the tunnel, however tunnel is not coming.    The client uses a sonic firewall and allowed their 10.91.0.0/16 network 192.168.156.0/24.

    See attachment

    Kind regards

    They are wrong to installation.  Remote local networks are not 10.134.206.0 and 10.134.206/42.  It is simply your public IP address.

Maybe you are looking for

  • Windows does not start on Satellite A50 - 110

    HelloI have a problem with my computer toshiba laptop.The last time that I used it I suddenly had a black screen and I could not go back to windows, so I turned it off.Since then, I can't run Windows. When I turn on my computer, I have the Toshiba sc

  • Agilent 33250 has synchronized with DT9812

    Hello everyone, I'm trying to control two devices (Agilent 33250 A and card DAQ DT9812) synchronizedly using LabVIEW.I need excite a transducer using an arbitrary waveform generated by 33250 A burst mode with its frequency swept KHz x to Y KHz with a

  • HP Pavilion G7 1070US: need help to identify the version of my laptop's HDMI port

    Hello! I'm trying to identify the version of my laptop's HDMI port. The reason for this is - a product that I'm shoping requires the version of HDMI 1.3 port and it does not support version 1.4. My laptop is HP Pavilion G7 1070US and product number i

  • C4480: Printing labels color leads to double image, levels of grayscale print normally

    I have a C4480 which generally prints normally. However, when I print a pdf file that I created for some labels, it prints a miniature double image on all labels on the left side (except the top one). The pdf file is displayed correctly on the screen

  • The upgrade from Windows 2000 to Vista

    Yes, I'm trying to determine if I have to install windows vista after using Windows 2000 for the past eight years.  When XP came out I could see no reason to change because XP couldn't do anything more than Windows 2000.  Now, vista is out and everyt