Renewed Cert on ASA, Upgraded from AnyConnect 2.5 to 3.1
We had been running AnyConnect 2.5 against our ASA and the Cert on our ASA Expired. the 2.5 Client (and all of the iPad Clients) had a way of saying, its cool, connect anyway if the Cert is not valid.
I finially got around to renewing the cert on the ASA. We have an Internal CA that I renewed it against. So if the CA's Cert was not installed in your trusted Cert Store you would get an error. Many Clients can Connect just fine with the new 3.1 client, Auto-upgrade, etc (besides it lopping off the /vpn from the connection URL)
We have a few of the clients that cannot connect. they get an error like:
The certificate on the secured gateway is invalid. A VPN connection will not be established
They have the CA's Root Cert installed in their trusted Cert Store. The Cert on the ASA has the proper CN, and Expiration date, so that should not be the issue.
When I look in the Syslog I see:
%ASA-7-725008: SSL client outside-interface:<Client Public IP>/50088 proposes the following 8 cipher(s).
%ASA-6-725001: Starting SSL handshake with client outside-interface:<Client Public IP>/50088 for TLSv1 session.
%ASA-7-710005: TCP request discarded from <Client Public IP>/50089 to outside-interface:<ASA Public IP>/443
%ASA-6-106015: Deny TCP (no connection) from <Client Public IP>/50089 to <ASA Public IP>/443 flags FIN ACK on interface outside-interface
%ASA-7-710005: TCP request discarded from <Client Public IP>/50089 to outside-interface:<ASA Public IP>/443
%ASA-6-106015: Deny TCP (no connection) from <Client Public IP>/50089 to <ASA Public IP>/443 flags PSH ACK on interface outside-interface
%ASA-6-725007: SSL session with client outside-interface:<Client Public IP>/50089 terminated.
%ASA-4-113019: Group = SSL-VPN, Username = <userID>, IP = <Client Public IP>, Session disconnected. Session Type: SSL, Duration: 0h:00m:31s, Bytes xmt: 9787, Bytes rcv: 3991, Reason: User Requested
%ASA-6-716002: Group #%cLt#%SSLVPNGrpPolicy> User #%cLt#%<UserID>> IP #%cLt#%<Client Public IP>> WebVPN session terminated: User Requested.
%ASA-6-725002: Device completed SSL handshake with client outside-interface:<Client Public IP>/50089
The other Interesting thing is in ADSM when I monitor the VPN Connections, All of the Trouble users show up in the "Clientless SSL VPN/Clientless" Section, where as the users that work fine are all in the "SSL VPN Client/WithClient" section. Though all of the ones in the
"SSL VPN Client/WithClient" section have 'Clientless SSL-Tunnel DTLS-Tunnel' as the Protocol.
We have completely removed AnyConnect and Manually installed the Client.
We have connected to the ASA's SSLVPN URL and had it install the Client.
All the same result. It Connects, Asks for a Username/Password, Displayes the Warning Banner to accept, checks for pgrads, then on the Establishing VPN comes up with the Server's Certificate is invalid.
Is this a NAT/PAT issue on the remote end?
Any Suggestions for these guys?
Thank you,
Scott<-
AnyConnect 3.1 is a significant upgrade, even over 3.0.
Over 3.0 it adds an enhanced GUI (common between Windows and Mac), NAM enhancement, crypto suite B enhancements, HostScan/Posture performance enhancements, IPv6 support, better untrusted certificate handling, plug-in component tiles, etc.
3.0+ offers IPSec VPN client as opposed to SSL VPN.
Similar Messages
-
Cisco ASA Upgrade from 7.0(8) to 8.2(1)
Hi, i need to upgrade my 5510 ASA from 7.0(8) to 8.2(1) ( Please note its different query from my last thread)
what i found online is i will have to do this upgrade in sequence, that is
7.0.x -> 7.2.x --> 8.0.x --> 8.2.1
is that correct?
or i will go to 7.1.x first? like this
7.0.x--> 7.1.x -> 7.2.x --> 8.0.x --> 8.1.x--> 8.2.1
Please guide, Also i am assuming, reboot required after every upgrade right?ok, i found something on another Cisco document. that is what i thought
To ensure that your configuration updates correctly, you must upgrade to each major release in turn. Therefore, to upgrade from Version 7.0 to Version 8.2, first upgrade from 7.0 to 7.1, then from 7.1 to 7.2, and finally from Version 7.2 to Version 8.2 (8.1 was only available on the ASA 5580). " -
SSL cert on ASA 5512 from Thwate or Digitcert
I ran into the issue when I install SSL123 cert from Thwate . I did not have issue with SSL cert from DIgitcert- their process and steps are simple and using better encryoption - SHA256. Compare to Thwate - their support did not let me use SHA2 and I had to use SHA1 - according to some organisation SHA1 will be retired soon
Let me explain how to install SSL123 from Thwate into ASA 5510- you can follow their instruction - but generate CSR with 2048 - with 4096 did not work .Once you apply into their portal use SHA1 ( SHA2 did not work ) . Before you get email with their CA - install Root and Secondary intermidiate certificate - located in their website . After you get email with the new cert - you can install under Idendity certificates where still says pending .Note - there are CSR checker tools - before you apply it into CA _ google CSR checker - make sure your CSR does not have any errors
Note - When you install each certificate - trustpoint association could be in different order - example - ASDM_trustpoint0 , ASDM_trustpoint1 , ASDM_trustpoint2 etc . If you use the same ASDM_trustpoint0 for all certs- root , intermidiate and signed certificate - Did not work and you are getting ERROR - :Failed to parse or verify imported certificate
here is the link you can follow - https://search.thawte.com/support/ssl-digital-certificates/index?page=content&id=SO16141&actp=search&viewlocale=en_US&searchid=1429125296765
Finally you can check your SSL cert - google SSL checker to see if your chain as good all the way and what need to be fixedFirst of all, you don't need the server names in the cert if your Exchange urls are configured to a load balanced url. Going forward, you will not be able to get a certificate from 3rd party with internal urls (server fqdn) in it.
When you export the certificate from CAS1, make sure that you include the private key as well (there will be a check box to tick) and import it back on CAS2.
If not, you can just import the certificate into CAS2 by selecting Import Exchange certificate in EMC and select the 3rd party cert (just like you imported on CAS1).
Yes, you need the certificate on both servers, otherwise you will get certificate errors on clients (assuming that there is some form of load balancing in place - NLB or hardware). -
Advice on upgrading ASA 5510 from version 8.4(4)1
Hello all,
Due to an issue we need to upgrade our ASA. Cisco Support team recommended upgrading to version 8.4.7, but, as we'll upgrade, we'd like to upgrade to version 9.
We still use Cisco VPN Client for Remote Access VPNs so I'd like your advice on which version to install on ASA.
Would you recommend version 9.0.3? 9.1.X?
Thanks in advance,
IgorWe have a pretty huge ASA and ASASM complex, and we are just about finished upgrading from an assortment of 8.4.x, 8.5.x, and 8.6.x installs to 9.1.3 on everything. There is one gotcha on some systems in that there is a file system change or some sort of bug that is fixed in 8.4.5 I think. So you _may_ have to first upgrade to a newer version (8.4.7 would work) before going to 9.1.3.
Our Cisco team has recommended going to version 9.x, and this is supported by recent tickets I've had on our stuff still running on 8.x, as the TAC engineer often says we need to upgrade to version 9.
Four our setup, we had some fatal bugs in 8.4.6 and 8.4.7 that kept us running 8.4.5 for a very long time on some equipment.
Anyway, I would recommend going to 9.1.3, which is one removed from the recently recleased 9.1.4. Our AnyConnect VPN complex has been on 9.1.3 for a few months now with no issues. Be sure to read the release notes thoroughly as 9.x changes some command contexts, new features, etc.
Graham -
After upgrading from ASA 8.2 to 9.1(2) not able to get web site
Dears,
ASA Version has been upgraded from 8.2 to 9.1(2). Since then, website is not accessible from outside.
Diagnosis:
Many web sites are deployed behind the ASA. When anyone accesses website from outside, the following error is reported: The page cannot be displayed. No issues have been reported with any other websites.
In the ASA, two different public subnets are in use in order to allow accessing the website from the public domain. No issues have been reported so far with the first subnet. The website is mapped to a public address in the second subnet. When the website is mapped to an IP address in the working subnet, the website is accessible from outside. As a workaround, this is applied and the website is up and running.
As the website is working fine with the second subnet, NAT and ACL configuration is fine. We have turned on logging in the ASDM, but no traffic was observed on the ASA for the non-working subnet. On the other hand, the traffic was noticed on the ASDM for the working subnet.
The working subnet is XX.YY.XX.X
Non working subnet is XX.YY.YY.X
The outside interface ip is XX.YY.XX.X (Working Subnet)
Tried to assign one ip address to the PC from non working subnet and connected to the Switch , its pinging from outsideHi
Have you tried using packet tracer? -
after i upgrade my ASA 5505 from 8.2 to 8.4 i can no longer connect to ASDM. showing connecting ..... please wait for hours now
Ron
I recently looked at this question with a customer who has been running 8.2 and needs to get some features in newer code. We decided that it made more sense to go to 8.4 than to 8.3.
HTH
Rick -
ASA Firewall Upgrade from 8.2,8.4, to 9.0
Dear All ,
we have five firewalls with the following details:
First Firewall
Hardware: ASA5550, 4096 MB RAM, CPU Pentium 4 3000 MHz, Flash 256MB , BIOS Flash1024KB , ASA IOS 8.4(3) ,Device Manager Version 6.4(7)
my question can i upgrade ASA IOS 8.4(3) to 9.0 directly without any issues also can i upgrade Device manager 6.4(7) to 7.0 without upgrading the ASA IOS itself
Second Firewall
Hardware: ASA5520,2048 MB RAM, CPU Pentium 4 2000MHz, Flash 256MB , BIOS Flash1024KB , ASA IOS 8.2(3) ,Device Manager Version
6.2(3)
my question can i upgrade ASA IOS 8.2(3) to 9.0 directly without any issues also can i upgrade Device manager 6.2(3) to 7.0 without upgrading the ASA IOS itself
Third Firewall
Hardware: ASA5520,2048 MB RAM, CPU Pentium 4 2000MHz, Flash 256MB , BIOS Flash1024KB , ASA IOS 8.4(3) ,Device Manager Version 6.4(7)
my question can i upgrade ASA IOS 8.4(3) to 9.0 directly without any issues also can i upgrade Device manager 6.4(7) to 7.0 without upgrading the ASA IOS itself
Fourth Firewall
Hardware: ASA5520,2048 MB RAM, CPU Pentium 4 2000MHz, Flash 256MB , BIOS Flash1024KB , ASA IOS 8.4(3) ,Device Manager Version 6.4(7)
my question can i upgrade ASA IOS 8.4(3) to 9.0 directly without any issues also can i upgrade Device manager 6.4(7) to 7.0 without upgrading the ASA IOS itself
fifth Firewall:
Hardware: ASA5520,2048 MB RAM, CPU Pentium 4 2000MHz, Flash 256MB , BIOS Flash1024KB , ASA IOS 8.2(3) ,Device Manager Version 6.2(3)
my question can i upgrade ASA IOS 8.2(3) to 9.0 directly without any issues also can i upgrade Device manager 6.2(3) to 7.0 without upgrading the ASA IOS itself
please help i am doing the upgrading remotely using the ASDM and i don't want to do any upgrade could result disconnectivity.
Best regardsHi Basel,
Honestly, I wouldn't suggest a direct upgrade from 8.2 to 9.0. This is a *major* upgrade. The recommended path to reach 9.0 would be from 8.2-->8.4-->9.0
Here are the release notes for 9.0:
http://www.cisco.com/en/US/docs/security/asa/asa90/release/notes/asarn90.html#wp690047
Per above document:
If you are upgrading from a pre-8.3 release, see also the Cisco ASA 5500 Migration Guide to Version 8.3 and Later
for important information about migrating your configuration.
Once you are on 8.3/8.4 (I would suggest 8.4 as a lot of issues were fixed post 8.3 as that was a huge transition from 8.2) upgrade to 9.0 is fairly simple.
Major part is upgrade from 8.2 to 8.4 as configuration changes and few things can be broken as a result. I would highly recommend you to check these docs before attempting an upgrade and also do it with some maintenence window so as to correct things in case they broke:
Following doc talks about 8.3 but it is applicable to direct upgrade to 8.4 as well:
https://supportforums.cisco.com/docs/DOC-12690
Release notes for 8.4:
http://www.cisco.com/en/US/docs/security/asa/asa84/release/notes/asarn84.html
Sourav -
ASA 5520 upgrade from 8.4.6 to 9.1.2
Dear All,
I am having ASA 5520 in Active Standby failover configuration . I want to know if I can upgrade it from 8.4.6 to 9.1.2 using the zero downtime upgrade process mentioned on cisco site .
Below is the process :
Upgrade an Active/Standby Failover Configuration
Complete these steps in order to upgrade two units in an Active/Standby failover configuration:
Download the new software to both units, and specify the new image to load with the boot system command.
Refer to Upgrade a Software Image and ASDM Image using CLI for more information.
Reload the standby unit to boot the new image by entering the failover reload-standby command on the active unit as shown below:
active#failover reload-standby
When the standby unit has finished reloading and is in the Standby Ready state, force the active unit to fail over to the standby unit by entering the no failover active command on the active unit.
active#no failover active
Note: Use the show failover command in order to verify that the standby unit is in the Standby Ready state.
Reload the former active unit (now the new standby unit) by entering the reload command:
newstandby#reload
When the new standby unit has finished reloading and is in the Standby Ready state, return the original active unit to active status by entering the failover active command:
newstandby#failover active
This completes the process of upgrading an Active/Standby Failover pair.
Also after upgrade are there any changes required after IOS migration ( i.e are there any changes in the command line of 8.4.6 and 9.1.2 )
It is mentioned on cisco site that
Major Release
—You can upgrade from the last minor release of the previous version to the next major release. For example, you can upgrade from 7.9 to 8.0, assuming that 7.9 is the last minor version in the 7.x release.Hi Tushar,
The steps you mentioned are perfectly fine. There is no major difference in the commands of the 2 versions, it's just that in access-rule from 9.1 you have to any4 instead of any for ipv4 and any6 for ipv6. During conversion it will get convert automatically.
Also, please refer to the following document (release notes of 9.1.2) for viewing the new features added in that version:
http://www.cisco.com/en/US/docs/security/asa/asa91/release/notes/asarn91.html#wp685480
- Prateek Verma -
Upgrading ASA (5520) from 8.2(5) to 8.4(6)
Hi All,
I'm planing to upgrade my failover firewalls active/standby from 8.2.5 to 8.4.6. I read about the NAT and I think I'm ready for it cross fingers
My plane is
Upload the 8.4.6 and ASDM 7.1.3 for both firewalls then assgin the boot and ASDM image to the new files. After thaton the active firewall reload the standby and wait until its up and running (cross finger again) then force the active to be standby and reload the standby to get the new 8.4.6.
am I right about that? or should I upgrade to 8.3.1 or 8.3.1 first ?? please if it is, can you give me the full upgarde path?
Thanks in advance!!!I don't know if I'm going to answer your question. But here is my latest experience, about year ago. I just preformed an upgrade from 8.0.x to 8.4.4.1 on a pair of ASA 5510's in failover using CLI. The upgrade seem to go smooth from our end, but all connection did drop. We followed these steps here. NAT wasn't an issue for us.
Point is, there really isn't an upgrade path. Just reload stand-by unit, make it the active unit and watch the connections. Ours dropped don't know why.
Don't know if that helps,
Nick -
Upgrading from PIX to ASA 5512X
Hi everyone,
We are in the middle of upgrading from two PIX's to some new ASA5512X's. To give you some background on the situation we are upgrading these since the PIXs are fairly old. We had one extra that we had to use since one PIX has failed already. The guy that implemented the PIXs orginally was learning how to do so as he went so there is alot of needless config in the PIX, atleast from what I can tell. Another guy that works with me has done some configuration on the new ASAs and has done the majority of it so far. Today we went to install the new ASAs and switch everything over hoping it would work, but that didn't happen. It seems that there is something wrong with our NAT and ACLs somewhere along the lines. The way our network is laid out is that we have two school campus with a site-to-site VPN one is 172.17.0.0/16 and the other is 172.18.0.0/16. We also have a remote-access VPN on both ASA's. When we connected the new ASAs up and brought up the interfaces, nothing on the inside could ping the internet nor the other side. The VPN showed active on the ASA's and each ASA could ping the others outside interface, but that was it. I have posted the configs below. If anyone could help out I would GREATLY appreciate it! Thank you in advance!
ASA1:
: Saved
: Written by enable_15 at 04:26:18.240 CDT Tue Mar 12 2013
ASA Version 8.6(1)2
hostname dallasroadASA
enable password **** encrypted
passwd **** encrypted
names
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 70.x.x.x 255.255.255.0
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 172.18.1.1 255.255.255.0
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
ftp mode passive
clock timezone CST -6
clock summer-time CDT recurring
dns domain-lookup inside
dns server-group DefaultDNS
name-server 172.18.2.21
name-server 172.18.2.20
object network WS_VLAN2
subnet 172.17.2.0 255.255.255.0
object network WS_VLAN3
subnet 172.17.3.0 255.255.255.0
object network WS_VLAN4
subnet 172.17.4.0 255.255.255.0
object network WS_VLAN5
subnet 172.17.5.0 255.255.255.0
object network WS_VLAN6
subnet 172.17.6.0 255.255.255.0
object network WS_VLAN7
subnet 172.17.7.0 255.255.255.0
object network WS_VLAN8
subnet 172.17.8.0 255.255.255.0
object network WS_VLAN9
subnet 172.17.9.0 255.255.255.0
object network WS_VLAN10
subnet 172.17.10.0 255.255.255.0
object network WS_VLAN11
subnet 172.17.11.0 255.255.255.0
object network WS_VLAN12
subnet 172.17.12.0 255.255.255.0
object network WS_VLAN13
subnet 172.17.13.0 255.255.255.0
object network WS_VLAN14
subnet 172.17.14.0 255.255.255.0
object network WS_VLAN15
subnet 172.17.15.0 255.255.255.0
object network WS_VLAN16
subnet 172.17.16.0 255.255.255.0
object network DR_VLAN2
subnet 172.18.2.0 255.255.255.0
object network DR_VLAN3
subnet 172.18.3.0 255.255.255.0
object network DR_VLAN4
subnet 172.18.4.0 255.255.255.0
object network DR_VLAN5
subnet 172.18.5.0 255.255.255.0
object network DR_VLAN6
subnet 172.18.6.0 255.255.255.0
object network DR_VLAN7
subnet 172.18.7.0 255.255.255.0
object network DR_VLAN8
subnet 172.18.8.0 255.255.255.0
object network DR_VLAN9
subnet 172.18.9.0 255.255.255.0
object network DR_VLAN10
subnet 172.18.10.0 255.255.255.0
object network DR_CORE_SW
host 172.18.2.1
object network dallasdns02_internal
host 172.18.2.21
object network faithdallas03_internal
host 172.18.2.20
object network dns_external
host 70.x.x.x
object network WorthStreet
subnet 172.17.0.0 255.255.0.0
object network DallasRoad
subnet 172.18.0.0 255.255.0.0
object-group network DALLAS_VLANS
network-object object DR_VLAN10
network-object object DR_VLAN2
network-object object DR_VLAN3
network-object object DR_VLAN4
network-object object DR_VLAN5
network-object object DR_VLAN6
network-object object DR_VLAN7
network-object object DR_VLAN8
network-object object DR_VLAN9
object-group network WORTH_VLANS
network-object object WS_VLAN10
network-object object WS_VLAN11
network-object object WS_VLAN12
network-object object WS_VLAN13
network-object object WS_VLAN14
network-object object WS_VLAN15
network-object object WS_VLAN16
network-object object WS_VLAN2
network-object object WS_VLAN3
network-object object WS_VLAN4
network-object object WS_VLAN5
network-object object WS_VLAN6
network-object object WS_VLAN7
network-object object WS_VLAN8
network-object object WS_VLAN9
object-group network dallasitnetwork
network-object host 172.18.2.20
network-object host 172.18.2.40
object-group protocol tcpudp
protocol-object udp
protocol-object tcp
object-group network dallasroaddns
network-object host 172.18.2.20
network-object host 172.18.2.21
object-group service tcpservices tcp
port-object eq ftp
port-object eq ftp-data
port-object eq www
port-object eq ssh
object-group network remotevpnnetwork
network-object 172.18.50.0 255.255.255.0
access-list L2LAccesslist extended permit ip 172.18.0.0 255.255.0.0 172.17.0.0 255.255.0.0
access-list NONAT extended permit ip any 172.18.50.0 255.255.255.0
access-list inside_inbound_access extended permit ip 172.18.0.0 255.255.0.0 172.17.0.0 255.255.0.0
access-list inside_inbound_access extended permit ip object-group dallasitnetwork any
access-list inside_inbound_access extended permit object-group tcpudp object-group dallasroaddns any eq domain
access-list inside_inbound_access extended permit ip host 172.18.4.10 any
access-list inside_inbound_access extended deny object-group tcpudp any any eq domain
access-list inside_inbound_access extended deny tcp any any eq smtp
access-list inside_inbound_access extended permit ip any any
access-list outside_inbound_access extended permit tcp any host 70.x.x.x object-group tcpservices
pager lines 24
mtu outside 1500
mtu inside 1500
mtu management 1500
ip local pool vpnaddresspool 172.18.50.0-172.18.50.255
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside,outside) source static dallasdns02_internal dns_external
nat (inside,outside) source static faithdallas03_internal dns_external
nat (inside,outside) source dynamic any interface
nat (any,outside) source static remotevpnnetwork remotevpnnetwork destination static remotevpnnetwork remotevpnnetwork description NONAT for remote vpn users
nat (inside,outside) source static DallasRoad DallasRoad destination static WorthStreet WorthStreet
access-group outside_inbound_access in interface outside
access-group inside_inbound_access in interface inside
route outside 0.0.0.0 0.0.0.0 70.x.x.x 1
route inside 172.18.0.0 255.255.0.0 172.18.1.2 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
ldap attribute-map CISCOMAP
map-name VPNALLOW IETF-Radius-Class
map-value VPNALLOW FALSE NOACESS
map-value VPNALLOW TRUE ALLOWACCESS
dynamic-access-policy-record DfltAccessPolicy
aaa-server LDAP protocol ldap
aaa-server LDAP (inside) host 172.17.2.28
server-port 389
ldap-base-dn DC=campus,DC=fcschool,DC=org
ldap-scope subtree
ldap-naming-attribute sAMAccountName
ldap-login-password ****
ldap-login-dn CN=fcsadmin,CN=Users,DC=campus,DC=fcschool,DC=org
server-type microsoft
ldap-attribute-map CISCOMAP
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 management
http 172.17.11.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set myset esp-aes-256 esp-sha-hmac
crypto map outside_map 10 match address L2LAccesslist
crypto map outside_map 10 set peer 71.x.x.x
crypto map outside_map 10 set ikev1 transform-set myset
crypto map outside_map 10 set reverse-route
crypto map outside_map interface outside
crypto ikev1 enable outside
crypto ikev1 policy 1
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 65535
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh 172.18.0.0 255.255.0.0 inside
ssh 172.17.0.0 255.255.0.0 inside
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
group-policy NOACCESS internal
group-policy NOACCESS attributes
vpn-simultaneous-logins 0
vpn-tunnel-protocol ikev1
group-policy DfltGrpPolicy attributes
dns-server value 172.18.2.20
vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless
password-storage enable
group-policy DallasRoad internal
group-policy DallasRoad attributes
dns-server value 172.18.2.20 172.18.2.21
password-storage enable
default-domain value campus.fcschool.org
group-policy ALLOWACCESS internal
group-policy ALLOWACCESS attributes
banner value Now connected to the FCS Network
vpn-tunnel-protocol ikev1
username iwerkadmin password i6vIlW5ctGaR0l7n encrypted privilege 15
tunnel-group remoteaccessvpn type remote-access
tunnel-group remoteaccessvpn general-attributes
address-pool vpnaddresspool
authentication-server-group LDAP
tunnel-group 71.x.x.x type ipsec-l2l
tunnel-group 71.x.x.x ipsec-attributes
ikev1 pre-shared-key ****
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:fd69fbd7a2cb0a6a125308dd85302198
: end
ASA2:
: Saved
: Written by enable_15 at 09:27:47.579 UTC Tue Mar 12 2013
ASA Version 8.6(1)2
hostname worthstreetASA
enable password **** encrypted
passwd **** encrypted
names
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 71.x.x.x 255.255.255.0
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 172.17.1.1 255.255.255.0
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
boot system disk0:/asa861-2-smp-k8.bin
ftp mode passive
dns domain-lookup inside
dns server-group DefaultDNS
name-server 172.17.2.23
name-server 172.17.2.28
object network mail_external
host 71.x.x.x
object network mail_internal
host 172.17.2.57
object network faweb_external
host 71.x.x.x
object network netclassroom_external
host 71.x.x.x
object network blackbaud_external
host 71.x.x.x
object network netclassroom_internal
host 172.17.2.41
object network nagios
host 208.x.x.x
object network DallasRoad_ASA
host 70.x.x.x
object network WS_VLAN2
subnet 172.17.2.0 255.255.255.0
object network WS_VLAN3
subnet 172.17.3.0 255.255.255.0
object network WS_VLAN4
subnet 172.17.4.0 255.255.255.0
object network WS_VLAN5
subnet 172.17.5.0 255.255.255.0
object network WS_VLAN6
subnet 172.17.6.0 255.255.255.0
object network WS_VLAN7
subnet 172.17.7.0 255.255.255.0
object network WS_VLAN8
subnet 172.17.8.0 255.255.255.0
object network WS_VLAN9
subnet 172.17.9.0 255.255.255.0
object network WS_VLAN10
subnet 172.17.10.0 255.255.255.0
object network WS_VLAN11
subnet 172.17.11.0 255.255.255.0
object network WS_VLAN12
subnet 172.17.12.0 255.255.255.0
object network WS_VLAN13
subnet 172.17.13.0 255.255.255.0
object network WS_VLAN14
subnet 172.17.14.0 255.255.255.0
object network WS_VLAN15
subnet 172.17.15.0 255.255.255.0
object network WS_VLAN16
subnet 172.17.16.0 255.255.255.0
object network DR_VLAN2
subnet 172.18.2.0 255.255.255.0
object network DR_VLAN3
subnet 172.18.3.0 255.255.255.0
object network DR_VLAN4
subnet 172.18.4.0 255.255.255.0
object network DR_VLAN5
subnet 172.18.5.0 255.255.255.0
object network DR_VLAN6
subnet 172.18.6.0 255.255.255.0
object network DR_VLAN7
subnet 172.18.7.0 255.255.255.0
object network DR_VLAN8
subnet 172.18.8.0 255.255.255.0
object network DR_VLAN9
subnet 172.18.9.0 255.255.255.0
object network DR_VLAN10
subnet 172.18.10.0 255.255.255.0
object network WS_CORE_SW
host 172.17.2.1
object network blackbaud_internal
host 172.17.2.26
object network spiceworks_internal
host 172.17.2.15
object network faweb_internal
host 172.17.2.31
object network spiceworks_external
host 71.x.x.x
object network WorthStreet
subnet 172.17.0.0 255.255.0.0
object network DallasRoad
subnet 172.18.0.0 255.255.0.0
object network remotevpnnetwork
subnet 172.17.50.0 255.255.255.0
object-group icmp-type echo_svc_group
icmp-object echo
icmp-object echo-reply
object-group service mail.fcshool.org_svc_group
service-object icmp
service-object icmp echo
service-object icmp echo-reply
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq imap4
service-object tcp destination eq pop3
service-object tcp destination eq smtp
object-group service nagios_svc_group tcp
port-object eq 12489
object-group service http_s_svc_group tcp
port-object eq www
port-object eq https
object-group network DALLAS_VLANS
network-object object DR_VLAN10
network-object object DR_VLAN2
network-object object DR_VLAN3
network-object object DR_VLAN4
network-object object DR_VLAN5
network-object object DR_VLAN6
network-object object DR_VLAN7
network-object object DR_VLAN8
network-object object DR_VLAN9
object-group network WORTH_VLANS
network-object object WS_VLAN10
network-object object WS_VLAN11
network-object object WS_VLAN12
network-object object WS_VLAN13
network-object object WS_VLAN14
network-object object WS_VLAN15
network-object object WS_VLAN16
network-object object WS_VLAN2
network-object object WS_VLAN3
network-object object WS_VLAN4
network-object object WS_VLAN5
network-object object WS_VLAN6
network-object object WS_VLAN7
network-object object WS_VLAN8
network-object object WS_VLAN9
object-group network MailServers
network-object host 172.17.2.57
network-object host 172.17.2.58
network-object host 172.17.2.17
object-group protocol DM_INLINE_PROTOCOL
protocol-object ip
protocol-object udp
protocol-object tcp
object-group network DNS_Servers
network-object host 172.17.2.23
network-object host 172.17.2.28
object-group protocol TCPUDP
protocol-object udp
protocol-object tcp
access-list outside_access_in extended permit object-group mail.fcshool.org_svc_group any object mail_internal
access-list outside_access_in extended permit tcp object nagios object mail_internal object-group nagios_svc_group
access-list outside_access_in extended permit tcp any object faweb_external object-group http_s_svc_group
access-list outside_access_in extended permit tcp any object netclassroom_external object-group http_s_svc_group
access-list outside_access_in extended permit tcp any object blackbaud_external eq https
access-list outside_access_in extended permit tcp any object spiceworks_external object-group http_s_svc_group
access-list L2LAccesslist extended permit ip 172.17.0.0 255.255.0.0 172.18.0.0 255.255.0.0
access-list inside_inbound extended permit object-group TCPUDP object-group DNS_Servers any eq domain
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL host 172.17.15.10 any inactive
access-list inside_access_in extended permit tcp object-group MailServers any eq smtp
access-list inside_access_in extended permit tcp host 172.17.14.10 any eq smtp
access-list inside_access_in extended deny object-group TCPUDP any any eq domain
access-list inside_access_in extended deny tcp any any eq smtp
access-list inside_access_in extended permit ip any any
access-list vpn_access extended permit ip any any
pager lines 24
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu management 1500
ip local pool vpnaddresspool 172.17.50.1-172.17.50.255
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-66114.bin
no asdm history enable
arp timeout 14400
nat (inside,outside) source static mail_internal mail_external
nat (inside,outside) source static netclassroom_internal netclassroom_external
nat (inside,outside) source static faweb_internal faweb_external
nat (inside,outside) source static spiceworks_internal interface
nat (inside,outside) source static blackbaud_internal blackbaud_external
nat (inside,outside) source dynamic any interface
nat (inside,outside) source static WorthStreet WorthStreet destination static DallasRoad DallasRoad
nat (any,outside) source static remotevpnnetwork remotevpnnetwork destination static remotevpnnetwork remotevpnnetwork description NONAT for remote vpn users
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 71.x.x.x 1
route inside 172.17.0.0 255.255.0.0 172.17.2.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
ldap attribute-map CISCOMAP
map-name VPNALLOW IETF-Radius-Class
map-value VPNALLOW FALSE NOACESS
map-value VPNALLOW TRUE ALLOWACCESS
dynamic-access-policy-record DfltAccessPolicy
network-acl vpn_access
aaa-server LDAP protocol ldap
aaa-server LDAP (inside) host 172.17.2.28
ldap-base-dn DC=campus,DC=fcschool,DC=org
ldap-scope subtree
ldap-naming-attribute sAMAccountName
ldap-login-password Iw@FCS730w
ldap-login-dn CN=VPN Admin,CN=Users,DC=campus,DC=fcschool,DC=org
server-type microsoft
ldap-attribute-map CISCOMAP
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 management
http 172.17.0.0 255.255.0.0 inside
http 172.18.0.0 255.255.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set myset esp-aes-256 esp-sha-hmac
crypto map outside_map 10 match address L2LAccesslist
crypto map outside_map 10 set peer 70.x.x.x
crypto map outside_map 10 set ikev1 transform-set myset
crypto map outside_map 10 set reverse-route
crypto map outside_map interface outside
crypto ikev1 enable outside
crypto ikev1 policy 1
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 65535
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
telnet 172.17.0.0 255.255.0.0 inside
telnet 172.18.0.0 255.255.0.0 inside
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh 172.17.0.0 255.255.0.0 inside
ssh 172.18.0.0 255.255.0.0 inside
ssh 192.168.1.0 255.255.255.0 inside
ssh timeout 5
console timeout 0
management-access management
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl encryption aes256-sha1 aes128-sha1 3des-sha1
webvpn
group-policy NOACCESS internal
group-policy NOACCESS attributes
vpn-simultaneous-logins 0
vpn-tunnel-protocol ikev1
group-policy ALLOWACCESS internal
group-policy ALLOWACCESS attributes
banner value Now connected to the FCS Network
vpn-tunnel-protocol ikev1
username iwerkadmin password i6vIlW5ctGaR0l7n encrypted privilege 15
tunnel-group 70.x.x.x type ipsec-l2l
tunnel-group 70.x.x.x ipsec-attributes
ikev1 pre-shared-key FC$vpnn3tw0rk
tunnel-group remoteaccessvpn type remote-access
tunnel-group remoteaccessvpn general-attributes
address-pool vpnaddresspool
authentication-server-group LDAP
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:b599ba0f719f39b213e7f01fe55588ac
: endHi Derrick,
I just did the same for a customer; replaced 2 PIX515s failover cluster with 5512X. The NAT change is major with ASAs version 8.3 and later...
here's what you need: a manual NAT rule called twice NAT (policy NAT or NONAT is the old terminology) for the VPNs to work. also add the no-proxy-arp keyword:
nat (inside,outside) source static INSIDE_NETWORKS INSIDE_NETWORKS VPN_NETWORKS VPN_NETWORKS no-proxy-arp
nat (inside,outside) source static INSIDE_NETWORKS INSIDE_NETWORKS RA_VPN_NETWORKS RA_VPN_NETWORKS no-proxy-arp
then the dynamic PAT for internet access (after the twice NATs for VPN); could be a manual NAT like you did, or preferred an object NAT.
you did:
nat (inside,outside) source dynamic any interface
would also work with object nat:
object network INSIDE_NETWORKS
subnet ...
nat (inside,outside) dynamic interface
Same on the other side (except the networks are reversed since the inside network is now what the other side refers to as vpn network and vice versa)
If you don't put the no-proxy-arp, your NAT configuration will cause network issues.
also to be able to pass pings through ASA, add the following:
policy-map global_policy
class inspection_default
inspect icmp
The asa will do some basic inspection of the ICMP protocol with that config ex. it will make sure there is 1 echo-reply for each echo-request...
hope that helps,
Patrick -
Upgrading from SSM-10 to ASA 5525x
We are upgrading from an ASA 5510 with a SSM-10 module to the 5525x ips. Can we simply copy the config from the SSM-10 to the 5525x?
Please refer the below document for the details regarding the catalog conversions.
http://helpx.adobe.com/photoshop-elements/kb/common-catalog-issues-upgrade-elements.html -
Testing a Firewall upgrade from PIX 7.0.2 to ASA 8.4.5
I have upgraded from PIX 7.0.2, to ASA 8.4.5, and had some issues regarding the NAMES list, setup NETWORK-OBJECTS to get the HOSTS in the access-list added to the ASA.
The PIX script contained no NAT, only access-list, and when the script was copied onto the ASA, it was taken successfully.
I was wondering what methods are available to test the script I have compiled on the ASA, prior to switching from the PIX onto the ASA? what processes are normal to confirm the Firewall is operational, and the rulesets working ? any ideas / tools / commands would be welcome.There are changes in the NAT syntax & Object Grouping. Also on VPN configurations.....
You need to make sure that certain things are taken care in new ASA which runs in 8.4 Version.
I have attached reference for NAT changes pre and post 8.3, which might be helpful for you.
Using the packet tracer command you can check the NAT rules are working and ACL is working fine.
packet tracer input [src_int] protocol src_addr src_port dest_addr dest_port [detailed] [xml]
http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/command/reference/cmd_ref/p.html#wp1878788
Hope this helps....
Regards
Karthik -
ASA 5585 IOS upgradation from 8.2(5) to 9.0(2)
Hi,
I am getting below warning messages when i am doing IOS upgradation of ASA5585.The current version of IOS is 8.2(5) and the converted version is 9.0(2). I would like to know whether i can ignore the warnings and move on with new version or need to do any manual changes in configuration.
This is my internet firewall which has DMZ as well.
WARNING: MIGRATION: ACE converted to real IP/port values based on
dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing policy NAT ACL
Thanks
SoumyaHi ,
Sorry, I forgot to mention that we have upgraded from 8.2->8.4.6>9.02.
We have multiple warning messages like below. A huge number of inbound access rules have been created in new version and we are worried whether this will creat a security loop.
WARNING: MIGRATION: ACE converted to real IP/port values based on
dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing policy NAT ACL
216.163.252.25
8.2(5)
access-list outside extended permit udp host 216.163.252.25 host 203.99.194.163
access-list outside extended permit esp host 216.163.252.25 host 203.99.194.163
access-list Metlife-VPN extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.237.164.0 255.255.254.0 host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
access-list Metlife-VPN extended permit esp 10.229.32.0 255.255.255.192 host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
access-list Metlife-VPN extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
access-list Metlife-VPN extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.237.241.0 255.255.255.0 host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.230.107.128 255.255.255.224 host 216.163.252.25
access-list inside1 extended permit udp 10.237.164.0 255.255.254.0 host 216.163.252.25
access-list inside1 extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
access-list inside1 extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
access-list inside1 extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
access-list inside1 extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
access-list inside1 extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
access-list inside1 extended permit ip host 10.239.23.177 host 216.163.252.25
access-list outside extended permit ip any host 203.99.194.163
9.0(2)
object network obj-216.163.252.25
host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.237.164.0 255.255.254.0 host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
access-list Metlife-VPN extended permit esp 10.229.32.0 255.255.255.192 host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
access-list Metlife-VPN extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
access-list Metlife-VPN extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.237.241.0 255.255.255.0 host 216.163.252.25
access-list Metlife-VPN extended permit ip 10.230.107.128 255.255.255.224 host 216.163.252.25
access-list outside extended permit udp host 216.163.252.25 host 10.239.23.56
access-list outside extended permit udp host 216.163.252.25 host 10.239.23.72
access-list outside extended permit udp host 216.163.252.25 10.239.24.0 255.255.255.0
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.15
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.94
access-list outside extended permit udp host 216.163.252.25 host 10.239.24.138
access-list outside extended permit udp host 216.163.252.25 10.239.23.0 255.255.255.0
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.101
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.208
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.20
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.78
access-list outside extended permit udp host 216.163.252.25 10.239.48.0 255.255.255.0
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.73
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.204
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.178
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.187
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.28
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.144
access-list outside extended permit udp host 216.163.252.25 host 10.239.48.105
access-list outside extended permit udp host 216.163.252.25 10.237.23.0 255.255.255.0
access-list outside extended permit udp host 216.163.252.25 host 10.237.23.179
access-list outside extended permit udp host 216.163.252.25 10.237.164.0 255.255.254.0
access-list outside extended permit udp host 216.163.252.25 10.239.50.0 255.255.255.0
access-list outside extended permit udp host 216.163.252.25 host 10.239.50.46
access-list outside extended permit udp host 216.163.252.25 host 10.237.165.120
access-list outside extended permit udp host 216.163.252.25 10.239.50.0 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 host 10.239.50.11
access-list outside extended permit udp host 216.163.252.25 host 10.239.48.142
access-list outside extended permit udp host 216.163.252.25 host 10.239.48.12
access-list outside extended permit udp host 216.163.252.25 host 10.239.50.45
access-list outside extended permit udp host 216.163.252.25 host 10.237.173.12
access-list outside extended permit udp host 216.163.252.25 host 10.237.164.72
access-list outside extended permit udp host 216.163.252.25 host 10.237.173.13
access-list outside extended permit udp host 216.163.252.25 host 10.239.20.145
access-list outside extended permit udp host 216.163.252.25 host 10.239.41.23
access-list outside extended permit udp host 216.163.252.25 host 10.242.8.128
access-list outside extended permit udp host 216.163.252.25 host 10.242.8.146
access-list outside extended permit udp host 216.163.252.25 host 10.242.8.137
access-list outside extended permit udp host 216.163.252.25 host 10.242.8.144
access-list outside extended permit udp host 216.163.252.25 10.230.144.64 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 10.229.32.0 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 10.242.50.0 255.255.255.0
access-list outside extended permit udp host 216.163.252.25 host 10.242.8.153
access-list outside extended permit udp host 216.163.252.25 host 10.242.50.68
access-list outside extended permit udp host 216.163.252.25 host 10.232.8.176
access-list outside extended permit udp host 216.163.252.25 10.242.0.128 255.255.255.128
access-list outside extended permit udp host 216.163.252.25 host 10.230.107.198
access-list outside extended permit udp host 216.163.252.25 host 10.230.107.199
access-list outside extended permit udp host 216.163.252.25 host 10.230.107.201
access-list outside extended permit udp host 216.163.252.25 10.230.107.192 255.255.255.224
access-list outside extended permit udp host 216.163.252.25 host 10.230.107.202
access-list outside extended permit udp host 216.163.252.25 10.237.226.0 255.255.255.224
access-list outside extended permit udp host 216.163.252.25 10.242.146.0 255.255.255.0
access-list outside extended permit udp host 216.163.252.25 host 10.230.107.197
access-list outside extended permit udp host 216.163.252.25 host 10.229.59.109
access-list outside extended permit udp host 216.163.252.25 10.242.97.128 255.255.255.128
access-list outside extended permit udp host 216.163.252.25 10.242.36.64 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 10.237.241.0 255.255.255.0
access-list outside extended permit udp host 216.163.252.25 host 10.237.241.14
access-list outside extended permit udp host 216.163.252.25 host 10.237.241.68
access-list outside extended permit udp host 216.163.252.25 host 10.237.241.94
access-list outside extended permit udp host 216.163.252.25 host 10.237.173.15
access-list outside extended permit udp host 216.163.252.25 10.242.212.0 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 10.242.51.128 255.255.255.128
access-list outside extended permit udp host 216.163.252.25 10.242.210.192 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 host 10.242.146.18
access-list outside extended permit udp host 216.163.252.25 host 10.239.23.168
access-list outside extended permit udp host 216.163.252.25 host 10.239.48.31
access-list outside extended permit udp host 216.163.252.25 host 10.242.195.204
access-list outside extended permit udp host 216.163.252.25 10.242.195.192 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 10.230.241.0 255.255.255.0
access-list outside extended permit udp host 216.163.252.25 10.230.103.128 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 host 10.230.107.144
access-list outside extended permit udp host 216.163.252.25 10.230.107.128 255.255.255.224
access-list outside extended permit udp host 216.163.252.25 10.211.202.224 255.255.255.240
access-list outside extended permit udp host 216.163.252.25 host 10.211.211.221
access-list outside extended permit udp host 216.163.252.25 host 10.229.34.43
access-list outside extended permit udp host 216.163.252.25 host 10.229.34.49
access-list outside extended permit udp host 216.163.252.25 host 10.232.38.160
access-list outside extended permit udp host 216.163.252.25 host 10.232.130.93
access-list outside extended permit udp host 216.163.252.25 host 10.233.38.151
access-list outside extended permit udp host 216.163.252.25 host 10.236.147.50
access-list outside extended permit udp host 216.163.252.25 host 10.236.147.71
access-list outside extended permit udp host 216.163.252.25 host 10.236.147.83
access-list outside extended permit udp host 216.163.252.25 host 10.236.180.4
access-list outside extended permit udp host 216.163.252.25 host 10.237.9.83
access-list outside extended permit udp host 216.163.252.25 host 10.237.9.93
access-list outside extended permit udp host 216.163.252.25 host 10.237.77.39
access-list outside extended permit udp host 216.163.252.25 host 10.237.77.74
access-list outside extended permit udp host 216.163.252.25 host 10.237.77.76
access-list outside extended permit udp host 216.163.252.25 host 10.237.173.8
access-list outside extended permit udp host 216.163.252.25 host 10.237.241.24
access-list outside extended permit udp host 216.163.252.25 host 10.237.241.183
access-list outside extended permit udp host 216.163.252.25 host 10.239.23.13
access-list outside extended permit udp host 216.163.252.25 host 10.239.23.71
access-list outside extended permit udp host 216.163.252.25 host 10.239.23.108
access-list outside extended permit udp host 216.163.252.25 host 10.239.23.109
access-list outside extended permit udp host 216.163.252.25 host 10.239.23.120
access-list outside extended permit udp host 216.163.252.25 host 10.239.23.170
access-list outside extended permit udp host 216.163.252.25 host 10.239.24.26
access-list outside extended permit udp host 216.163.252.25 host 10.239.24.158
access-list outside extended permit udp host 216.163.252.25 host 10.239.24.222
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.20
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.34
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.41
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.42
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.52
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.60
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.64
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.73
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.81
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.82
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.90
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.114
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.141
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.151
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.155
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.205
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.224
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.233
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.238
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.239
access-list outside extended permit udp host 216.163.252.25 host 10.239.30.251
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.26
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.52
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.57
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.72
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.90
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.93
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.107
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.161
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.171
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.184
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.185
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.196
access-list outside extended permit udp host 216.163.252.25 host 10.239.31.208
access-list outside extended permit udp host 216.163.252.25 host 10.239.38.17
access-list outside extended permit udp host 216.163.252.25 host 10.239.41.34
access-list outside extended permit udp host 216.163.252.25 host 10.239.41.68
access-list outside extended permit udp host 216.163.252.25 host 10.239.41.72
access-list outside extended permit udp host 216.163.252.25 host 10.239.41.78
access-list outside extended permit udp host 216.163.252.25 host 10.239.48.143
access-list outside extended permit udp host 216.163.252.25 host 10.239.50.10
access-list outside extended permit udp host 216.163.252.25 host 10.239.50.15
access-list outside extended permit udp host 216.163.252.25 host 10.239.50.31
access-list outside extended permit udp host 216.163.252.25 host 10.239.50.35
access-list outside extended permit udp host 216.163.252.25 host 10.239.50.52
access-list outside extended permit udp host 216.163.252.25 host 10.239.60.100
access-list outside extended permit udp host 216.163.252.25 host 10.239.67.18
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.17
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.23
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.34
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.42
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.53
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.75
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.76
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.77
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.114
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.117
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.118
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.120
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.136
access-list outside extended permit udp host 216.163.252.25 host 10.239.96.143
access-list outside extended permit udp host 216.163.252.25 host 10.239.98.15
access-list outside extended permit udp host 216.163.252.25 host 10.239.98.17
access-list outside extended permit udp host 216.163.252.25 host 10.239.98.35
access-list outside extended permit udp host 216.163.252.25 host 10.239.98.48
access-list outside extended permit udp host 216.163.252.25 host 10.239.98.90
access-list outside extended permit udp host 216.163.252.25 host 10.239.98.116
access-list outside extended permit udp host 216.163.252.25 host 10.239.98.140
access-list outside extended permit udp host 216.163.252.25 host 10.239.98.168
access-list outside extended permit udp host 216.163.252.25 host 10.239.98.183
access-list outside extended permit udp host 216.163.252.25 host 10.242.8.26
access-list outside extended permit udp host 216.163.252.25 host 10.242.8.53
access-list outside extended permit udp host 216.163.252.25 host 10.242.11.29
access-list outside extended permit udp host 216.163.252.25 host 10.242.11.31
access-list outside extended permit udp host 216.163.252.25 host 10.242.11.80
access-list outside extended permit udp host 216.163.252.25 host 10.242.11.81
access-list outside extended permit udp host 216.163.252.25 host 10.242.22.133
access-list outside extended permit udp host 216.163.252.25 host 10.242.22.134
access-list outside extended permit udp host 216.163.252.25 host 10.242.22.154
access-list outside extended permit udp host 216.163.252.25 host 10.242.36.76
access-list outside extended permit udp host 216.163.252.25 host 10.242.36.79
access-list outside extended permit udp host 216.163.252.25 host 10.242.36.118
access-list outside extended permit udp host 216.163.252.25 host 10.242.146.29
access-list outside extended permit udp host 216.163.252.25 host 10.242.158.227
access-list outside extended permit udp host 216.163.252.25 host 10.242.195.197
access-list outside extended permit udp host 216.163.252.25 host 207.41.226.145
access-list outside extended permit udp host 216.163.252.25 10.233.38.144 255.255.255.248
access-list outside extended permit udp host 216.163.252.25 10.230.132.160 255.255.255.224
access-list outside extended permit udp host 216.163.252.25 10.230.134.0 255.255.255.224
access-list outside extended permit udp host 216.163.252.25 10.242.68.160 255.255.255.224
access-list outside extended permit udp host 216.163.252.25 10.233.38.150 255.255.255.222
access-list outside extended permit udp host 216.163.252.25 10.229.144.0 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 10.236.84.64 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 10.237.84.128 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 10.239.47.192 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 10.242.90.64 255.255.255.192
access-list outside extended permit udp host 216.163.252.25 10.230.137.128 255.255.255.128
access-list outside extended permit udp host 216.163.252.25 10.239.56.0 255.255.255.128
access-list outside extended permit udp host 216.163.252.25 10.237.22.0 255.255.255.0
access-list outside extended permit esp host 216.163.252.25 host 10.239.23.56
access-list outside extended permit esp host 216.163.252.25 host 10.239.23.72
access-list outside extended permit esp host 216.163.252.25 10.239.24.0 255.255.255.0
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.15
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.94
access-list outside extended permit esp host 216.163.252.25 host 10.239.24.138
access-list outside extended permit esp host 216.163.252.25 10.239.23.0 255.255.255.0
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.101
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.208
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.20
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.78
access-list outside extended permit esp host 216.163.252.25 10.239.48.0 255.255.255.0
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.73
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.204
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.178
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.187
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.28
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.144
access-list outside extended permit esp host 216.163.252.25 host 10.239.48.105
access-list outside extended permit esp host 216.163.252.25 10.237.23.0 255.255.255.0
access-list outside extended permit esp host 216.163.252.25 host 10.237.23.179
access-list outside extended permit esp host 216.163.252.25 10.237.164.0 255.255.254.0
access-list outside extended permit esp host 216.163.252.25 10.239.50.0 255.255.255.0
access-list outside extended permit esp host 216.163.252.25 host 10.239.50.46
access-list outside extended permit esp host 216.163.252.25 host 10.237.165.120
access-list outside extended permit esp host 216.163.252.25 10.239.50.0 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 host 10.239.50.11
access-list outside extended permit esp host 216.163.252.25 host 10.239.48.142
access-list outside extended permit esp host 216.163.252.25 host 10.239.48.12
access-list outside extended permit esp host 216.163.252.25 host 10.239.50.45
access-list outside extended permit esp host 216.163.252.25 host 10.237.173.12
access-list outside extended permit esp host 216.163.252.25 host 10.237.164.72
access-list outside extended permit esp host 216.163.252.25 host 10.237.173.13
access-list outside extended permit esp host 216.163.252.25 host 10.239.20.145
access-list outside extended permit esp host 216.163.252.25 host 10.239.41.23
access-list outside extended permit esp host 216.163.252.25 host 10.242.8.128
access-list outside extended permit esp host 216.163.252.25 host 10.242.8.146
access-list outside extended permit esp host 216.163.252.25 host 10.242.8.137
access-list outside extended permit esp host 216.163.252.25 host 10.242.8.144
access-list outside extended permit esp host 216.163.252.25 10.230.144.64 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 10.229.32.0 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 10.242.50.0 255.255.255.0
access-list outside extended permit esp host 216.163.252.25 host 10.242.8.153
access-list outside extended permit esp host 216.163.252.25 host 10.242.50.68
access-list outside extended permit esp host 216.163.252.25 host 10.232.8.176
access-list outside extended permit esp host 216.163.252.25 10.242.0.128 255.255.255.128
access-list outside extended permit esp host 216.163.252.25 host 10.230.107.198
access-list outside extended permit esp host 216.163.252.25 host 10.230.107.199
access-list outside extended permit esp host 216.163.252.25 host 10.230.107.201
access-list outside extended permit esp host 216.163.252.25 10.230.107.192 255.255.255.224
access-list outside extended permit esp host 216.163.252.25 host 10.230.107.202
access-list outside extended permit esp host 216.163.252.25 10.237.226.0 255.255.255.224
access-list outside extended permit esp host 216.163.252.25 10.242.146.0 255.255.255.0
access-list outside extended permit esp host 216.163.252.25 host 10.230.107.197
access-list outside extended permit esp host 216.163.252.25 host 10.229.59.109
access-list outside extended permit esp host 216.163.252.25 10.242.97.128 255.255.255.128
access-list outside extended permit esp host 216.163.252.25 10.242.36.64 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 10.237.241.0 255.255.255.0
access-list outside extended permit esp host 216.163.252.25 host 10.237.241.14
access-list outside extended permit esp host 216.163.252.25 host 10.237.241.68
access-list outside extended permit esp host 216.163.252.25 host 10.237.241.94
access-list outside extended permit esp host 216.163.252.25 host 10.237.173.15
access-list outside extended permit esp host 216.163.252.25 10.242.212.0 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 10.242.51.128 255.255.255.128
access-list outside extended permit esp host 216.163.252.25 10.242.210.192 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 host 10.242.146.18
access-list outside extended permit esp host 216.163.252.25 host 10.239.23.168
access-list outside extended permit esp host 216.163.252.25 host 10.239.48.31
access-list outside extended permit esp host 216.163.252.25 host 10.242.195.204
access-list outside extended permit esp host 216.163.252.25 10.242.195.192 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 10.230.241.0 255.255.255.0
access-list outside extended permit esp host 216.163.252.25 10.230.103.128 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 host 10.230.107.144
access-list outside extended permit esp host 216.163.252.25 10.230.107.128 255.255.255.224
access-list outside extended permit esp host 216.163.252.25 10.211.202.224 255.255.255.240
access-list outside extended permit esp host 216.163.252.25 host 10.211.211.221
access-list outside extended permit esp host 216.163.252.25 host 10.229.34.43
access-list outside extended permit esp host 216.163.252.25 host 10.229.34.49
access-list outside extended permit esp host 216.163.252.25 host 10.232.38.160
access-list outside extended permit esp host 216.163.252.25 host 10.232.130.93
access-list outside extended permit esp host 216.163.252.25 host 10.233.38.151
access-list outside extended permit esp host 216.163.252.25 host 10.236.147.50
access-list outside extended permit esp host 216.163.252.25 host 10.236.147.71
access-list outside extended permit esp host 216.163.252.25 host 10.236.147.83
access-list outside extended permit esp host 216.163.252.25 host 10.236.180.4
access-list outside extended permit esp host 216.163.252.25 host 10.237.9.83
access-list outside extended permit esp host 216.163.252.25 host 10.237.9.93
access-list outside extended permit esp host 216.163.252.25 host 10.237.77.39
access-list outside extended permit esp host 216.163.252.25 host 10.237.77.74
access-list outside extended permit esp host 216.163.252.25 host 10.237.77.76
access-list outside extended permit esp host 216.163.252.25 host 10.237.173.8
access-list outside extended permit esp host 216.163.252.25 host 10.237.241.24
access-list outside extended permit esp host 216.163.252.25 host 10.237.241.183
access-list outside extended permit esp host 216.163.252.25 host 10.239.23.13
access-list outside extended permit esp host 216.163.252.25 host 10.239.23.71
access-list outside extended permit esp host 216.163.252.25 host 10.239.23.108
access-list outside extended permit esp host 216.163.252.25 host 10.239.23.109
access-list outside extended permit esp host 216.163.252.25 host 10.239.23.120
access-list outside extended permit esp host 216.163.252.25 host 10.239.23.170
access-list outside extended permit esp host 216.163.252.25 host 10.239.24.26
access-list outside extended permit esp host 216.163.252.25 host 10.239.24.158
access-list outside extended permit esp host 216.163.252.25 host 10.239.24.222
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.20
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.34
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.41
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.42
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.52
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.60
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.64
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.73
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.81
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.82
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.90
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.114
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.141
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.151
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.155
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.205
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.224
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.233
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.238
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.239
access-list outside extended permit esp host 216.163.252.25 host 10.239.30.251
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.26
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.52
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.57
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.72
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.90
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.93
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.107
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.161
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.171
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.184
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.185
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.196
access-list outside extended permit esp host 216.163.252.25 host 10.239.31.208
access-list outside extended permit esp host 216.163.252.25 host 10.239.38.17
access-list outside extended permit esp host 216.163.252.25 host 10.239.41.34
access-list outside extended permit esp host 216.163.252.25 host 10.239.41.68
access-list outside extended permit esp host 216.163.252.25 host 10.239.41.72
access-list outside extended permit esp host 216.163.252.25 host 10.239.41.78
access-list outside extended permit esp host 216.163.252.25 host 10.239.48.143
access-list outside extended permit esp host 216.163.252.25 host 10.239.50.10
access-list outside extended permit esp host 216.163.252.25 host 10.239.50.15
access-list outside extended permit esp host 216.163.252.25 host 10.239.50.31
access-list outside extended permit esp host 216.163.252.25 host 10.239.50.35
access-list outside extended permit esp host 216.163.252.25 host 10.239.50.52
access-list outside extended permit esp host 216.163.252.25 host 10.239.60.100
access-list outside extended permit esp host 216.163.252.25 host 10.239.67.18
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.17
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.23
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.34
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.42
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.53
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.75
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.76
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.77
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.114
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.117
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.118
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.120
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.136
access-list outside extended permit esp host 216.163.252.25 host 10.239.96.143
access-list outside extended permit esp host 216.163.252.25 host 10.239.98.15
access-list outside extended permit esp host 216.163.252.25 host 10.239.98.17
access-list outside extended permit esp host 216.163.252.25 host 10.239.98.35
access-list outside extended permit esp host 216.163.252.25 host 10.239.98.48
access-list outside extended permit esp host 216.163.252.25 host 10.239.98.90
access-list outside extended permit esp host 216.163.252.25 host 10.239.98.116
access-list outside extended permit esp host 216.163.252.25 host 10.239.98.140
access-list outside extended permit esp host 216.163.252.25 host 10.239.98.168
access-list outside extended permit esp host 216.163.252.25 host 10.239.98.183
access-list outside extended permit esp host 216.163.252.25 host 10.242.8.26
access-list outside extended permit esp host 216.163.252.25 host 10.242.8.53
access-list outside extended permit esp host 216.163.252.25 host 10.242.11.29
access-list outside extended permit esp host 216.163.252.25 host 10.242.11.31
access-list outside extended permit esp host 216.163.252.25 host 10.242.11.80
access-list outside extended permit esp host 216.163.252.25 host 10.242.11.81
access-list outside extended permit esp host 216.163.252.25 host 10.242.22.133
access-list outside extended permit esp host 216.163.252.25 host 10.242.22.134
access-list outside extended permit esp host 216.163.252.25 host 10.242.22.154
access-list outside extended permit esp host 216.163.252.25 host 10.242.36.76
access-list outside extended permit esp host 216.163.252.25 host 10.242.36.79
access-list outside extended permit esp host 216.163.252.25 host 10.242.36.118
access-list outside extended permit esp host 216.163.252.25 host 10.242.146.29
access-list outside extended permit esp host 216.163.252.25 host 10.242.158.227
access-list outside extended permit esp host 216.163.252.25 host 10.242.195.197
access-list outside extended permit esp host 216.163.252.25 host 207.41.226.145
access-list outside extended permit esp host 216.163.252.25 10.233.38.144 255.255.255.248
access-list outside extended permit esp host 216.163.252.25 10.230.132.160 255.255.255.224
access-list outside extended permit esp host 216.163.252.25 10.230.134.0 255.255.255.224
access-list outside extended permit esp host 216.163.252.25 10.242.68.160 255.255.255.224
access-list outside extended permit esp host 216.163.252.25 10.233.38.150 255.255.255.222
access-list outside extended permit esp host 216.163.252.25 10.229.144.0 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 10.236.84.64 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 10.237.84.128 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 10.239.47.192 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 10.242.90.64 255.255.255.192
access-list outside extended permit esp host 216.163.252.25 10.230.137.128 255.255.255.128
access-list outside extended permit esp host 216.163.252.25 10.239.56.0 255.255.255.128
access-list outside extended permit esp host 216.163.252.25 10.237.22.0 255.255.255.0
access-list inside1 extended permit udp 10.237.164.0 255.255.254.0 host 216.163.252.25
access-list inside1 extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
access-list inside1 extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
access-list inside1 extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
access-list inside1 extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
access-list inside1 extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
access-list inside1 extended permit ip host 10.239.23.177 host 216.163.252.25
nat (inside,outside) source dynamic obj-10.239.48.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
nat (inside,outside) source dynamic obj-10.237.164.0-01 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
nat (inside,outside) source dynamic obj-10.229.32.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
nat (inside,outside) source dynamic obj-10.242.146.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
nat (inside,outside) source dynamic obj-10.237.241.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
nat (inside,outside) source dynamic obj-10.230.107.128 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25 -
Upgrade ASA Software from 8.3.2 to 8.4.3
Hi,
does anybody did an Upgrade from an 8.3 version to the new version 8.4.3 and can give some hints or links to read?
I only have a production system and nothing to test and I don' want to get a nasty surprise...
Thanks a lot in advanceIf you're already on 8.3(2) you've already gotten past the tricky bit - the new NAT syntax and access-list object use. There are some minor changes with identity NAT in going up to 8.4(3) as described here but that's about it as far as things to watch out for.
The TAC is quite helpful and it is a good idea to open a case proactively just to have them on hand to take a quick look at any issues that come up. The TAC security team deals with these upgrades every day and is very adept at zeroing in on the root cause of any issues you are having and setting things straight within in few minutes. -
Problem in upgrading from CUCM 8.5.1 to CUCM 8.6.2
Unable to upgarde cucm 8.5 to 8.6 ,
installed referesh upgrade cop file . tried on SFTP and using local DVD same below error displayed . Any one have any solution please share .
Installation Status
File
UCSInstall_UCOS_8.6.2.21900-5.sgn.iso
Start Time
Mon Dec 10 14:31:47 GST 2013
Status
Error encountered: An unknown error occurred while accessing the upgrade file.
12/10/2013 13:44:37 file_list.sh|Starting file_list.sh|<LVL::Info>
12/10/2013 13:44:37 file_list.sh|Parse argument method=remote_sftp|<LVL::Debug>
12/10/2013 13:44:37 file_list.sh|Parse argument source_dir=/|<LVL::Debug>
12/10/2013 13:44:37 file_list.sh|Parse argument dest_file=/var/log/install/downloaded_versions|<LVL::Debug>
12/10/2013 13:44:37 file_list.sh|Parse argument remote_host=10.2.102.68|<LVL::Debug>
12/10/2013 13:44:37 file_list.sh|Parse argument user_name=cisco|<LVL::Debug>
12/10/2013 13:44:37 file_list.sh|Process remote SFTP request|<LVL::Info>
12/10/2013 13:44:37 file_list.sh|Calling SFTP command with metering off|<LVL::Debug>
12/10/2013 13:44:38 file_list.sh|SFTP command complete (0)|<LVL::Debug>
12/10/2013 13:44:38 file_list.sh|List file (pre-filtered):|<LVL::Debug>
12/10/2013 13:44:38 file_list.sh|(CAPTURE) UCSInstall_UCOS_8.6.2.21900-5.sgn.iso|<LVL::Debug>
12/10/2013 13:44:38 file_list.sh|(CAPTURE) ciscocm.refresh_upgrade_v1.1.cop.sgn|<LVL::Debug>
12/10/2013 13:44:38 file_list.sh|/opt/cisco/install/bin/filter file=/var/log/install/downloaded_versions|<LVL::Debug>
12/10/2013 13:44:38 filter|Parse argument file=/var/log/install/downloaded_versions|<LVL::Debug>
12/10/2013 13:44:38 filter|No patch type specified. Optional.|<LVL::Debug>
12/10/2013 13:44:38 filter|No upgrade mode specifed. Optional.|<LVL::Debug>
12/10/2013 13:44:43 filter|Processing filter candidate names|<LVL::Debug>
12/10/2013 13:44:43 filter|Process "UCSInstall_UCOS_8.6.2.21900-5.sgn.iso"|<LVL::Debug>
12/10/2013 13:44:43 filter| Match against patch pattern (UCSInstall_UCOS_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
12/10/2013 13:44:43 filter| Match against patch pattern (UCSInstall_UCOS_UNRST_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
12/10/2013 13:44:43 filter| Match against patch pattern (UCSInstall_UCOS_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
12/10/2013 13:44:43 filter|INorOUT=IN UCSInstall_UCOS_8.6.2.21900-5.sgn.iso: Filter passed.|<LVL::Debug>
12/10/2013 13:44:43 filter|Process "ciscocm.refresh_upgrade_v1.1.cop.sgn"|<LVL::Debug>
12/10/2013 13:44:43 filter| Match against patch pattern (UCSInstall_UCOS_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
12/10/2013 13:44:43 filter| Match against patch pattern (UCSInstall_UCOS_UNRST_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
12/10/2013 13:44:43 filter| Match against patch pattern Signed Standard upgrade patch file (UCSInstall_UCOS_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
12/10/2013 13:44:43 filter| Match against patch pattern (UCSInstall_UCOS_UNRST_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against es pattern (UCSInstall_UCOS_ES[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against es pattern (UCSInstall_UCOS_UNRST_ES[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against es pattern (UCSInstall_UCOS_ES[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against es pattern (UCSInstall_UCOS_UNRST_ES[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against su pattern (UCSInstall_UCOS_SU[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against su pattern (UCSInstall_UCOS_UNRST_SU[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.iso)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against su pattern (UCSInstall_UCOS_SU[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against su pattern (UCSInstall_UCOS_UNRST_SU[0-9]*_[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.sgn.iso)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (dp-ffr.[1-9]-[0-9]-[0-9]+.*.cop)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (dp-ffr.[1-9]-[0-9]-[0-9]+.*.cop.sgn)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (cm-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (cm-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop.sgn)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (po-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (po-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop.sgn)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (cmterm-devicepack[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (cmterm-devicepack[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop.sgn)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (cmterm-.*\.cop)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (cmterm-.*\.cop\.sgn)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (uc-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (uc-locale-.*_.*-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop.sgn)|<LVL::Debug>
12/10/2013 13:44:44 filter| Match against cop pattern (uc-friendly-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop)|<LVL::Debug>
12/10/2013 13:44:45 filter| Match against cop pattern (uc-friendly-[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+-[0-9]+.cop.sgn)|<LVL::Debug>
12/10/2013 13:44:45 filter| Match against cop pattern (ciscocm..*.cop)|<LVL::Debug>
12/10/2013 13:44:45 filter| Match against cop pattern (ciscocm..*.cop.sgn)|<LVL::Debug>
12/10/2013 13:44:45 filter|INorOUT=IN ciscocm.refresh_upgrade_v1.1.cop.sgn: Filter passed.|<LVL::Debug>
12/10/2013 13:44:45 file_list.sh|List file (post-filtered):|<LVL::Debug>
12/10/2013 13:44:45 file_list.sh|(CAPTURE) <?xml version="1.0" encoding="UTF-8"?>|<LVL::Debug>
12/10/2013 13:44:45 file_list.sh|(CAPTURE) <InstallList>|<LVL::Debug>
12/10/2013 13:44:45 file_list.sh|(CAPTURE) <InstallItem type="patch" secure-file="UCSInstall_UCOS_8.6.2.21900-5.sgn.iso" version="8.6.2.21900-5" file="UCSInstall_UCOS_8.6.2.21900-5.sgn.iso" reboot="no" signed="yes"/>|<LVL::Debug>
12/10/2013 13:44:45 file_list.sh|(CAPTURE) <InstallItem type="cop" secure-file="ciscocm.refresh_upgrade_v1.1.cop.sgn" version="0.0.0.0-0" file="ciscocm.refresh_upgrade_v1.1.cop" reboot="no" signed="yes"/>|<LVL::Debug>
12/10/2013 13:44:45 file_list.sh|(CAPTURE) </InstallList>|<LVL::Debug>
12/10/2013 13:44:45 file_list.sh|success|<LVL::Info>
12/10/2013 13:44:45 file_list.sh|file_list.sh complete (rc=0)|<LVL::Info>
12/10/2013 13:44:53 upgrade_validate_file.sh|Starting upgrade_validate_file.sh|<LVL::Info>
12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument method=remote_sftp|<LVL::Debug>
12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument source_dir=/|<LVL::Debug>
12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument file_name=UCSInstall_UCOS_8.6.2.21900-5.sgn.iso|<LVL::Debug>
12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument remote_host=10.2.102.68|<LVL::Debug>
12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument user_name=cisco|<LVL::Debug>
12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument file_type=patch|<LVL::Debug>
12/10/2013 13:44:53 upgrade_validate_file.sh|Parse argument file_signed=yes|<LVL::Debug>
12/10/2013 13:44:53 upgrade_validate_file.sh|Process remote SFTP request|<LVL::Info>
12/10/2013 13:44:53 upgrade_validate_file.sh|Get //UCSInstall_UCOS_8.6.2.21900-5.sgn.iso size via sftp|<LVL::Debug>
12/10/2013 13:44:54 upgrade_validate_file.sh|Size of file obtained from sftp is 4793341952|<LVL::Debug>
12/10/2013 13:44:54 upgrade_validate_file.sh|Total space needed is 9586683904|<LVL::Debug>
12/10/2013 13:44:54 upgrade_validate_file.sh|Check free space|<LVL::Info>
12/10/2013 13:44:54 upgrade_validate_file.sh|There is enough space on device to proceed.|<LVL::Info>
12/10/2013 13:44:54 upgrade_validate_file.sh|(CAPTURE) Free space : 25916985344|<LVL::Debug>
12/10/2013 13:44:54 upgrade_validate_file.sh|(CAPTURE) Space needed : 19827077120|<LVL::Debug>
12/10/2013 13:44:54 upgrade_validate_file.sh|Remote SFTP request complete (0)|<LVL::Info>
12/10/2013 13:44:54 upgrade_validate_file.sh|success|<LVL::Info>
12/10/2013 13:44:54 upgrade_validate_file.sh|upgrade_validate_file.sh complete (rc=0)|<LVL::Info>
12/10/2013 13:44:54 upgrade_validate_file.sh|Unmount DVD|<LVL::Info>
12/10/2013 13:44:57 upgrade_get_file.sh|Starting upgrade_get_file.sh|<LVL::Info>
12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument method=remote_sftp|<LVL::Debug>
12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument source_dir=/|<LVL::Debug>
12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument file_name=UCSInstall_UCOS_8.6.2.21900-5.sgn.iso|<LVL::Debug>
12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument dest_dir=/common/download/|<LVL::Debug>
12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument remote_host=10.2.102.68|<LVL::Debug>
12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument user_name=cisco|<LVL::Debug>
12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument version=8.6.2.21900-5|<LVL::Debug>
12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument file_type=patch|<LVL::Debug>
12/10/2013 13:44:57 upgrade_get_file.sh|Parse argument file_signed=yes|<LVL::Debug>
12/10/2013 13:45:08 upgrade_get_file.sh|Process remote SFTP request|<LVL::Info>
12/10/2013 13:45:08 upgrade_get_file.sh|source_dir=/, dest_file=/common/download//UCSInstall_UCOS_8.6.2.21900-5.sgn.iso, file_name=UCSInstall_UCOS_8.6.2.21900-5.sgn.iso|<LVL::Debug>
12/10/2013 13:45:08 upgrade_get_file.sh|Starting SFTP|<LVL::Debug>
12/10/2013 14:29:34 upgrade_get_file.sh|Mount /common/download//UCSInstall_UCOS_8.6.2.21900-5.sgn.iso on /mnt/source|<LVL::Info>
12/10/2013 14:29:34 upgrade_get_file.sh|Download of iso file RTMTStart|<LVL::Notice>
12/10/2013 14:29:34 upgrade_get_file.sh|Create md5 "/common/download/UCSInstall_UCOS_8.6.2.21900-5.sgn.iso.md5"|<LVL::Info>
12/10/2013 14:30:49 upgrade_get_file.sh|MD5(/common/download/UCSInstall_UCOS_8.6.2.21900-5.sgn.iso)= e8:da:df:9a:3a:61:ee:27:4d:c5:4f:7b:77:78:bc:f1|<LVL::Debug>
12/10/2013 14:30:49 upgrade_get_file.sh|Create md5 complete|<LVL::Info>
12/10/2013 14:30:49 upgrade_get_file.sh|Authenticate file "/common/download/8.6.2.21900-5/checksum_file.sgn"|<LVL::Info>
12/10/2013 14:30:49 upgrade_get_file.sh|File authentication complete|<LVL::Debug>
12/10/2013 14:30:49 upgrade_get_file.sh|authenticating ISO name, filename=UCSInstall_UCOS_8.6.2.21900-5.sgn.iso, isoname=UCSInstall_UCOS_8.6.2.21900-5.sgn.iso|<LVL::Debug>
12/10/2013 14:30:49 upgrade_get_file.sh|Download of iso file RTMTFinish|<LVL::Notice>
12/10/2013 14:30:49 upgrade_get_file.sh|Checking for preflight script|<LVL::Debug>
12/10/2013 14:30:49 upgrade_get_file.sh|Executing preflight script: /mnt/source/Cisco/install/bin/preflight isolocation=/mnt/source|<LVL::Info>
12/10/2013 14:30:49 preflight|Starting preflight|<LVL::Info>
12/10/2013 14:30:49 preflight|Validate preflight data|<LVL::Info>
12/10/2013 14:30:49 preflight|Preflight data validation complete|<LVL::Info>
12/10/2013 14:30:49 preflight|Determine upgrade type|<LVL::Info>
12/10/2013 14:30:50 preflight|Active RH version = 4AS|<LVL::Debug>
12/10/2013 14:30:50 preflight|New os version(xml) = 5Server|<LVL::Debug>
12/10/2013 14:30:50 preflight|HW model = VMware|<LVL::Debug>
12/10/2013 14:30:50 preflight|Upgrade type = RU|<LVL::Debug>
12/10/2013 14:30:50 preflight|Obtain product type|<LVL::Info>
12/10/2013 14:30:53 preflight|Obtained product type CallManager|<LVL::Info>
12/10/2013 14:30:53 preflight|Processing preflight install mode|<LVL::Info>
12/10/2013 14:30:53 preflight|Set preflight cancel utility|<LVL::Info>
12/10/2013 14:30:53 preflight|Execute install preflight commands for CallManager:RU from /mnt/source/Cisco/install/preflight.xml|<LVL::Info>
12/10/2013 14:30:53 preflight|Found 10 preflight commands to execute|<LVL::Debug>
12/10/2013 14:30:53 preflight|Execute preflight command (1/10): mkdir -p /common/preflight/CM/RU|<LVL::Debug>
12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
12/10/2013 14:30:53 preflight|Execute preflight command (2/10): cp -f /usr/local/platform/conf/dynamicConfig.xml /common/preflight/CM/RU/dynamicConfig.xml|<LVL::Debug>
12/10/2013 14:30:53 preflight|Preflight command returns 1|<LVL::Debug>
12/10/2013 14:30:53 preflight|(CAPTURE) cp: cannot stat `/usr/local/platform/conf/dynamicConfig.xml': No such file or directory|<LVL::Debug>
12/10/2013 14:30:53 preflight|Preflight command did not complete (1). Continuing command processing...|<LVL::Warn>
12/10/2013 14:30:53 preflight|Execute preflight command (3/10): cp -f /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/dynamic.jsp /common/preflight/CM/RU/dynamic.jsp|<LVL::Debug>
12/10/2013 14:30:53 preflight|Preflight command returns 1|<LVL::Debug>
12/10/2013 14:30:53 preflight|(CAPTURE) cp: cannot stat `/usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/dynamic.jsp': No such file or directory|<LVL::Debug>
12/10/2013 14:30:53 preflight|Preflight command did not complete (1). Continuing command processing...|<LVL::Warn>
12/10/2013 14:30:53 preflight|Execute preflight command (4/10): cp -f /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/install-confirm-content.jsp /common/preflight/CM/RU/install-confirm-content.jsp|<LVL::Debug>
12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
12/10/2013 14:30:53 preflight|Execute preflight command (5/10): cp -f /mnt/source/Cisco/install/dynamicConfig_RU.xml /usr/local/platform/conf/dynamicConfig.xml|<LVL::Debug>
12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
12/10/2013 14:30:53 preflight|Execute preflight command (6/10): mkdir -p /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install|<LVL::Debug>
12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
12/10/2013 14:30:53 preflight|Execute preflight command (7/10): cp -f /mnt/source/Cisco/install/dynamic_RU.jsp /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/dynamic.jsp|<LVL::Debug>
12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
12/10/2013 14:30:53 preflight|Execute preflight command (8/10): cp -f /mnt/source/Cisco/install/install-confirm-content_RU.jsp /usr/local/thirdparty/jakarta-tomcat/webapps/cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|<LVL::Debug>
12/10/2013 14:30:53 preflight|Preflight command returns 0|<LVL::Debug>
12/10/2013 14:30:53 preflight|Execute preflight command (9/10): /mnt/source/Cisco/install/bin/tempDynamic.preflight /mnt/source/Cisco/install/dynamic_RU.jsp dynamic.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|Preflight command returns 0|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:53 starting tempDynamic.preflight...|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:53 Source dir/file = /mnt/source/Cisco/install/dynamic_RU.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:53 Destination file name = dynamic.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 Copying /mnt/source/Cisco/install/dynamic_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/1-cmplatform/WEB-INF/pages/install/dynamic.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/1-cmplatform/WEB-INF/pages/install/dynamic.jsp successfully|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 Copying /mnt/source/Cisco/install/dynamic_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/2-cmplatform/WEB-INF/pages/install/dynamic.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/2-cmplatform/WEB-INF/pages/install/dynamic.jsp successfully|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 Copying /mnt/source/Cisco/install/dynamic_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/4-cmplatform/WEB-INF/pages/install/dynamic.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/4-cmplatform/WEB-INF/pages/install/dynamic.jsp successfully|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 ... tempDynamic.preflight completed|<LVL::Debug>
12/10/2013 14:30:54 preflight|Execute preflight command (10/10): /mnt/source/Cisco/install/bin/tempDynamic.preflight /mnt/source/Cisco/install/install-confirm-content_RU.jsp install-confirm-content.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|Preflight command returns 0|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 starting tempDynamic.preflight...|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 Source dir/file = /mnt/source/Cisco/install/install-confirm-content_RU.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 Destination file name = install-confirm-content.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 Copying /mnt/source/Cisco/install/install-confirm-content_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/1-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/1-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp successfully|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 Copying /mnt/source/Cisco/install/install-confirm-content_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/2-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/2-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp successfully|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 Copying /mnt/source/Cisco/install/install-confirm-content_RU.jsp to /usr/local/thirdparty/jakarta-tomcat/temp/4-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 added/replaced /usr/local/thirdparty/jakarta-tomcat/temp/4-cmplatform/WEB-INF/pages/install/install-confirm-content.jsp successfully|<LVL::Debug>
12/10/2013 14:30:54 preflight|(CAPTURE) 12/10/2013 14:30:54 ... tempDynamic.preflight completed|<LVL::Debug>
12/10/2013 14:30:54 preflight|Exiting with result 0|<LVL::Info>
12/10/2013 14:30:54 upgrade_get_file.sh|preflight rc=0|<LVL::Debug>
12/10/2013 14:30:54 upgrade_get_file.sh|Preflight completed successfully|<LVL::Info>
12/10/2013 14:30:56 upgrade_get_file.sh|success|<LVL::Info>
12/10/2013 14:30:56 upgrade_get_file.sh|upgrade_get_file.sh complete (rc=0)|<LVL::Info>
12/30/2014 14:31:49 sd_cancelInstall.sh|Canceling active side processes
12/30/2014 14:31:49 sd_cancelInstall.sh|Canceling active side processes done
12/30/2014 14:31:49 sd_cancelInstall.sh|Canceling inactive side processes
12/30/2014 14:31:50 sd_cancelInstall.sh|Canceling inactive side processes done
12/10/2013 14:31:55 upgrade_install.sh|Starting Upgrade -- upgrade_install.sh|<LVL::Info>
12/10/2013 14:31:55 upgrade_install.sh|Parse argument version=8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:31:55 upgrade_install.sh|Parse argument dest_dir=/common/download/|<LVL::Debug>
12/10/2013 14:31:55 upgrade_install.sh|Parse argument work_dir=/var/log/install|<LVL::Debug>
12/10/2013 14:31:59 upgrade_install.sh|/usr/local/platform/bin/startcsa status|<LVL::Debug>
12/10/2013 14:31:59 upgrade_install.sh|CSA Status = 0|<LVL::Debug>
12/10/2013 14:31:59 upgrade_install.sh|(CAPTURE) Cisco Security Agent is running with pid 23124|<LVL::Debug>
12/10/2013 14:31:59 upgrade_install.sh|CSA Status = 0|<LVL::Debug>
12/10/2013 14:31:59 upgrade_install.sh|/etc/init.d/ciscosec stop|<LVL::Debug>
12/10/2013 14:32:14 upgrade_install.sh|(CAPTURE) Stopping ciscosec: [ OK ]|<LVL::Debug>
12/10/2013 14:32:14 upgrade_install.sh|Upgrade the system|<LVL::Info>
12/10/2013 14:32:14 upgrade_install.sh|Copy /mnt/source/Cisco/base_scripts/upgrade_manager.sh to /common/download/8.6.2.21900-5/upgrade_manager.sh|<LVL::Info>
12/10/2013 14:32:14 upgrade_install.sh|Copy /mnt/source/Cisco/base_scripts/upgrade_manager.sh to /common/download/8.6.2.21900-5/upgrade_manager.sh complete|<LVL::Info>
12/10/2013 14:32:14 upgrade_install.sh|Start upgrade manager|<LVL::Info>
12/10/2013 14:32:14 upgrade_install.sh|/common/download/8.6.2.21900-5/upgrade_manager.sh type=upgrade basepath=/common/download/8.6.2.21900-5 file_name= logfile=/var/log/install/install_log_2013-12-30.13.44.35.log resultfile=/var/log/install/upgrade-results.xml work_dir=/var/log/install intf_file=/common/download/8.6.2.21900-5/upgrade_manager.xml|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Cleanup data from a prior upgrade attempt|<LVL::Info>
12/10/2013 14:32:14 upgrade_manager.sh|Removing any /grub/boot/grub/grub.conf.recovery|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Invalidate upgrade partition|<LVL::Info>
12/10/2013 14:32:14 upgrade_manager.sh|Clean up rpm any stale __db. files in rpmdb on the to side|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Removing any master RPM from /partB|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Removing any /partB/etc/opt/cisco/install.conf|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Invalidate any product configuration file|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Parse argument type=upgrade|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Parse argument basepath=/common/download/8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Parse argument file_name=|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Parse argument logfile=/var/log/install/install_log_2013-12-30.13.44.35.log|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Parse argument resultfile=/var/log/install/upgrade-results.xml|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Parse argument work_dir=/var/log/install|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Parse argument intf_file=/common/download/8.6.2.21900-5/upgrade_manager.xml|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|upgrade_type="upgrade"|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|L2 upgrade|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Initialize install support functions|<LVL::Info>
12/10/2013 14:32:14 upgrade_manager.sh|Calling "source /mnt/source/Cisco/install/bin/install_func"|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Initialize install support functions complete|<LVL::Info>
12/10/2013 14:32:14 upgrade_manager.sh|Check for Refresh Upgrade|<LVL::Info>
12/10/2013 14:32:14 upgrade_manager.sh|Check if /mnt/source/upgradeConfig.xml exists|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Checking RedHat release version (4AS, 5Server)|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Initiate Refresh Upgrade|<LVL::Info>
12/10/2013 14:32:14 upgrade_manager.sh|Copy /mnt/source/Cisco/install/bin/refresh_upgrade to /common/download/8.6.2.21900-5/refresh_upgrade|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Check that /common/download/8.6.2.21900-5/refresh_upgrade exists and is executable|<LVL::Debug>
12/10/2013 14:32:14 upgrade_manager.sh|Calling exec /common/download/8.6.2.21900-5/refresh_upgrade type=upgrade basepath=/common/download/8.6.2.21900-5 file_name= logfile=/var/log/install/install_log_2013-12-30.13.44.35.log resultfile=/var/log/install/upgrade-results.xml work_dir=/var/log/install intf_file=/common/download/8.6.2.21900-5/upgrade_manager.xml|<LVL::Debug>
12/10/2013 14:32:14 refresh_upgrade|Parse argument type=upgrade|<LVL::Debug>
12/10/2013 14:32:14 refresh_upgrade|Parse argument basepath=/common/download/8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:32:14 refresh_upgrade|Parse argument file_name=|<LVL::Debug>
12/10/2013 14:32:14 refresh_upgrade|Parse argument logfile=/var/log/install/install_log_2013-12-30.13.44.35.log|<LVL::Debug>
12/10/2013 14:32:14 refresh_upgrade|Parse argument resultfile=/var/log/install/upgrade-results.xml|<LVL::Debug>
12/10/2013 14:32:14 refresh_upgrade|Parse argument work_dir=/var/log/install|<LVL::Debug>
12/10/2013 14:32:14 refresh_upgrade|Parse argument intf_file=/common/download/8.6.2.21900-5/upgrade_manager.xml|<LVL::Debug>
12/10/2013 14:32:14 refresh_upgrade|No 'to' version specified. Extracting it from base path.|<LVL::Debug>
12/10/2013 14:32:14 refresh_upgrade|NEW_VERSION updated to 8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:32:14 refresh_upgrade|Refresh Upgrade Starting|<LVL::Info>
12/10/2013 14:32:14 refresh_upgrade|IOWAIT monitor starting|<LVL::Info>
12/10/2013 14:32:14 refresh_upgrade|Checksum the upgrade source on /mnt/source|<LVL::Info>
12/10/2013 14:32:14 refresh_upgrade|Calling sha1sum -c /common/download/8.6.2.21900-5/checksum_file|<LVL::Debug>
12/10/2013 14:34:14 refresh_upgrade|Checksum complete|<LVL::Info>
12/10/2013 14:34:14 refresh_upgrade|Initialize staging area|<LVL::Info>
12/10/2013 14:34:14 refresh_upgrade|Initialize globals for hard drive|<LVL::Debug>
12/10/2013 14:34:14 refresh_upgrade|Calling rm -rf /common/refresh_upgrade /common/component|<LVL::Debug>
12/10/2013 14:34:23 refresh_upgrade|Copy /mnt/source to /common/refresh_upgrade|<LVL::Info>
12/10/2013 14:34:23 refresh_upgrade|Execute find /mnt/source and cpio to /common/refresh_upgrade. This may take several minutes.|<LVL::Debug>
12/10/2013 14:37:31 refresh_upgrade|Copy source files to staging area complete|<LVL::Info>
12/10/2013 14:37:31 refresh_upgrade|Initialize staging area complete|<LVL::Info>
12/10/2013 14:37:31 refresh_upgrade|Prepare Refresh Upgrade support directory|<LVL::Info>
12/10/2013 14:37:31 refresh_upgrade|Make /common/mnt/product_img mount point|<LVL::Info>
12/10/2013 14:37:32 refresh_upgrade|Calling umount /common/mnt/product_img|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Setup support directories|<LVL::Info>
12/10/2013 14:37:33 refresh_upgrade|Calling rm -rf /common/download/8.6.2.21900-5/Cisco|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling mkdir -p /common/download/8.6.2.21900-5/Cisco|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Create /common/cisco link to /common/download/8.6.2.21900-5/Cisco|<LVL::Info>
12/10/2013 14:37:33 refresh_upgrade|Calling rm -rf /common/cisco|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling ln -s /common/download/8.6.2.21900-5/Cisco /common/cisco|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Copy files from /common/refresh_upgrade/images/product.img to /common/download/8.6.2.21900-5/Cisco|<LVL::Info>
12/10/2013 14:37:33 refresh_upgrade|Calling mount /common/refresh_upgrade/images/product.img /common/mnt/product_img -o loop|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/iproduct.sh /common/download/8.6.2.21900-5/Cisco/bin/iproduct.sh|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/ihardware.sh /common/download/8.6.2.21900-5/Cisco/bin/ihardware.sh|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/ihistory.sh /common/download/8.6.2.21900-5/Cisco/bin/ihistory.sh|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/xproduct.sh /common/download/8.6.2.21900-5/Cisco/bin/xproduct.sh|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/xcomponent.sh /common/download/8.6.2.21900-5/Cisco/bin/xcomponent.sh|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/xplatformconfig.sh /common/download/8.6.2.21900-5/Cisco/bin/xplatformconfig.sh|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/install_emailer /common/download/8.6.2.21900-5/Cisco/bin/install_emailer|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling cp -rf /common/mnt/product_img/bin/component_install /common/download/8.6.2.21900-5/Cisco/bin/component_install|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Calling umount /common/mnt/product_img|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|Setup install information in /common/download/8.6.2.21900-5/Cisco|<LVL::Info>
12/10/2013 14:37:33 refresh_upgrade|Calling ln -s /common/refresh_upgrade/Cisco/install /common/download/8.6.2.21900-5/Cisco/install|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) Mail notification cancelled - smtp server address for email not found! [/usr/local/platform/conf/platformConfig.xml]|<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:33 refresh_upgrade|(CAPTURE) |<LVL::Debug>
12/10/2013 14:37:36 refresh_upgrade|Setting up cisco specific enviroment|<LVL::Info>
12/10/2013 14:37:36 refresh_upgrade|PATH=/common/download/8.6.2.21900-5/Cisco/bin:/usr/local/sbin:/sbin:/usr/sbin:/bin:/usr/bin:/usr/X11R6/bin:/sbin:/home/sftpuser:/root/.security|<LVL::Debug>
12/10/2013 14:37:36 refresh_upgrade|LD_LIBRARY_PATH=/common/download/8.6.2.21900-5/Cisco/lib:/opt/cisco/install/lib:|<LVL::Debug>
12/10/2013 14:37:36 refresh_upgrade|PYTHONPATH=/common/download/8.6.2.21900-5/Cisco/python:/usr/local/cm/lib:/usr/local/cm/lib:/usr/local/cm/lib:|<LVL::Debug>
12/10/2013 14:37:36 refresh_upgrade|CISCO_INSTALL_CONF_PATH=/common/download/8.6.2.21900-5/Cisco/install/conf|<LVL::Debug>
12/10/2013 14:37:36 refresh_upgrade|CISCO_INSTALL_BIN_PATH=/common/download/8.6.2.21900-5/Cisco/bin /opt/cisco/install/bin /usr/local/bin/base_scripts|<LVL::Debug>
12/10/2013 14:37:36 refresh_upgrade|CISCO_PLATFORMCONF_PATH=/common/cisco /usr/local/platform/conf|<LVL::Debug>
12/10/2013 14:37:36 refresh_upgrade|CISCO_INSTALL_LIB_PATH=/usr/local/bin/base_scripts|<LVL::Debug>
12/10/2013 14:37:36 refresh_upgrade|Set logging globals for upgrade|<LVL::Info>
12/10/2013 14:37:36 refresh_upgrade|Before: ILOG_CONTEXT="Upgrade", ILOG_FILE="/var/log/install/install_log_2013-12-30.13.44.35.log", ILOG_RESULTS_FILE="/var/log/install/upgrade-results.xml"|<LVL::Debug>
12/10/2013 14:37:36 refresh_upgrade|After: ILOG_CONTEXT="Upgrade", ILOG_FILE="/common/log/install/install_log_2013-12-30.13.44.35.log", ILOG_RESULTS_FILE="/common/log/install/upgrade-results.xml"|<LVL::Debug>
12/10/2013 14:37:36 refresh_upgrade|Initialize APIs|<LVL::Info>
12/10/2013 14:37:36 refresh_upgrade|Initializing the product API|<LVL::Info>
12/10/2013 14:37:37 refresh_upgrade|Initializing the hardware API|<LVL::Info>
12/10/2013 14:37:38 ServerApiManager|INITIALIZE: sam_legacy_mode_init=1|<LVL::Debug>
12/10/2013 14:37:46 ServerApiManager|INITIALIZE: sam_hssi_mode_init=0|<LVL::Debug>
12/10/2013 14:37:46 refresh_upgrade|Initializing the history log API|<LVL::Info>
12/10/2013 14:37:46 refresh_upgrade|Initializing the xplatformconfig API|<LVL::Info>
12/10/2013 14:37:46 refresh_upgrade|Initializing the xproduct API|<LVL::Info>
12/10/2013 14:37:46 refresh_upgrade|Initialize setup functions|<LVL::Info>
12/10/2013 14:37:46 refresh_upgrade|Calling "source /common/download/8.6.2.21900-5/Cisco/install/setup/utils.sh"|<LVL::Debug>
12/10/2013 14:37:46 refresh_upgrade|Initialize setup functions complete|<LVL::Info>
12/10/2013 14:37:46 refresh_upgrade|Getting deployment ID from active side|<LVL::Info>
12/10/2013 14:37:46 refresh_upgrade|Copy /usr/local/platform/conf/platformConfig.xml to /common/cisco/platformConfig.xml|<LVL::Info>
12/10/2013 14:37:46 refresh_upgrade|Calling "cp /usr/local/platform/conf/platformConfig.xml /common/cisco/platformConfig.xml"|<LVL::Debug>
12/10/2013 14:37:48 refresh_upgrade|Check if the upgrade is allowed|<LVL::Info>
12/10/2013 14:37:48 refresh_upgrade|Validate hardware for the upgrade|<LVL::Info>
12/10/2013 14:37:48 refresh_upgrade|Hardware is supported for the upgrade|<LVL::Info>
12/10/2013 14:37:50 refresh_upgrade|Validate hardware for "callmanager" deployment|<LVL::Info>
12/10/2013 14:37:50 refresh_upgrade|Hardware is supported for "callmanager" deployment|<LVL::Info>
12/10/2013 14:37:50 refresh_upgrade|Validate from version 8.5.1.10000-26|<LVL::Info>
12/10/2013 14:37:50 refresh_upgrade|Upgrade from 8.5.1.10000-26 allowed|<LVL::Info>
12/10/2013 14:37:50 refresh_upgrade|Validate free space for the upgrade|<LVL::Info>
12/10/2013 14:37:50 refresh_upgrade|(CAPTURE) Free space: 26040668160, Needed space: 15014745300|<LVL::Debug>
12/10/2013 14:37:50 refresh_upgrade|Free space validation complete|<LVL::Info>
12/10/2013 14:37:50 refresh_upgrade|Run component export scripts|<LVL::Debug>
12/10/2013 14:37:50 component_install|Initializing xproduct.sh API|<LVL::Debug>
12/10/2013 14:37:50 component_install|Initializing xcomponent.sh API|<LVL::Debug>
12/10/2013 14:37:50 component_install|Initializing xplatformconfig.sh API|<LVL::Debug>
12/10/2013 14:37:50 component_install|Parse argument export|<LVL::Debug>
12/10/2013 14:37:50 component_install|Parse argument mode=refresh-upgrade|<LVL::Debug>
12/10/2013 14:37:50 component_install|Parse argument install_root=/common/refresh_upgrade/Cisco|<LVL::Debug>
12/10/2013 14:37:50 component_install|Parse argument data_root=/common|<LVL::Debug>
12/10/2013 14:37:50 component_install|Run component export scripts, mode refresh-upgrade|<LVL::Info>
12/10/2013 14:37:50 component_install|Initialize product data, mode refresh-upgrade|<LVL::Info>
12/10/2013 14:37:50 component_install|Initialize "to" side product version|<LVL::Info>
12/10/2013 14:37:50 component_install|Access "to" side API|<LVL::Debug>
12/10/2013 14:37:50 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:37:50 component_install|Initialize "to" side product version complete|<LVL::Info>
12/10/2013 14:37:50 component_install|Initialize "from" side product version|<LVL::Info>
12/10/2013 14:37:50 component_install|Access "from" side API|<LVL::Debug>
12/10/2013 14:37:50 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
12/10/2013 14:37:50 component_install|Initialize "from" side product version complete|<LVL::Info>
12/10/2013 14:37:50 component_install|Initialize product data complete|<LVL::Info>
12/10/2013 14:37:50 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
12/10/2013 14:37:50 component_install|Initialize ucos "to" side version|<LVL::Info>
12/10/2013 14:37:50 component_install|Access "to" side API|<LVL::Debug>
12/10/2013 14:37:51 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:37:51 component_install|Initialize ucos "to" side version complete|<LVL::Info>
12/10/2013 14:37:51 component_install|Initialize ucos "from" side version|<LVL::Info>
12/10/2013 14:37:51 component_install|Component ucos available on active side|<LVL::Debug>
12/10/2013 14:37:51 component_install|Access "from" side API|<LVL::Debug>
12/10/2013 14:37:51 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
12/10/2013 14:37:51 component_install|Initialize ucos "from" side version complete|<LVL::Info>
12/10/2013 14:37:51 component_install|Initialize global data complete|<LVL::Info>
12/10/2013 14:37:51 component_install|Build the command list for ucos|<LVL::Info>
12/10/2013 14:37:51 component_install|Initialize command list|<LVL::Debug>
12/10/2013 14:37:51 component_install|Build ucos export phase commands|<LVL::Debug>
12/10/2013 14:37:51 component_install|Processing ucos export element|<LVL::Debug>
12/10/2013 14:37:51 component_install|Building the command list for ucos is complete|<LVL::Info>
12/10/2013 14:37:51 component_install|Command execution for ucos component RTMTStart|<LVL::Notice>
12/10/2013 14:37:51 component_install|Execute commands in the command list for ucos component|<LVL::Info>
12/10/2013 14:37:51 component_install|No commands to execute for ucos component|<LVL::Info>
12/10/2013 14:37:51 component_install|Command execution for ucos component is complete|<LVL::Info>
12/10/2013 14:37:51 component_install|Command execution for ucos component RTMTFinish|<LVL::Notice>
12/10/2013 14:37:51 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
12/10/2013 14:37:51 component_install|Initialize ucplatform "to" side version|<LVL::Info>
12/10/2013 14:37:51 component_install|Access "to" side API|<LVL::Debug>
12/10/2013 14:37:51 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:37:51 component_install|Initialize ucplatform "to" side version complete|<LVL::Info>
12/10/2013 14:37:51 component_install|Initialize ucplatform "from" side version|<LVL::Info>
12/10/2013 14:37:51 component_install|Component ucplatform available on active side|<LVL::Debug>
12/10/2013 14:37:51 component_install|Access "from" side API|<LVL::Debug>
12/10/2013 14:37:51 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
12/10/2013 14:37:51 component_install|Initialize ucplatform "from" side version complete|<LVL::Info>
12/10/2013 14:37:51 component_install|Initialize global data complete|<LVL::Info>
12/10/2013 14:37:51 component_install|Build the command list for ucplatform|<LVL::Info>
12/10/2013 14:37:51 component_install|Initialize command list|<LVL::Debug>
12/10/2013 14:37:51 component_install|Build ucplatform export phase commands|<LVL::Debug>
12/10/2013 14:37:51 component_install|Processing ucplatform export element|<LVL::Debug>
12/10/2013 14:37:51 component_install|Processing ucplatform script element|<LVL::Debug>
12/10/2013 14:37:51 component_install|Add "security_prepare RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
12/10/2013 14:37:52 component_install|Add "password_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
12/10/2013 14:37:52 component_install|Add "ssh_keys_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
12/10/2013 14:37:52 component_install|Add "installed_options_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
12/10/2013 14:37:52 component_install|Add "platform_certs_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
12/10/2013 14:37:52 component_install|Add "servm_export RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
12/10/2013 14:37:52 component_install|Add "network_files_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
12/10/2013 14:37:52 component_install|Processing ucplatform script element|<LVL::Debug>
12/10/2013 14:37:52 component_install|Add "drf_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
12/10/2013 14:37:52 component_install|Building the command list for ucplatform is complete|<LVL::Info>
12/10/2013 14:37:52 component_install|Command execution for ucplatform component RTMTStart|<LVL::Notice>
12/10/2013 14:37:52 component_install|Execute commands in the command list for ucplatform component|<LVL::Info>
12/10/2013 14:37:52 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
12/10/2013 14:37:52 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/security_prepare|<LVL::Debug>
12/10/2013 14:37:52 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/security_prepare RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Parse arguments|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Validate arguments|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Initialize global variables|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Handle Security Information|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Export security information|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Export /etc/shadow file|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Export login warning message|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Export SFTP data|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Export DRF data|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Export CCM Service Data|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Export IPSec Data|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|get_fips_status returning partB fips_cnf as 0|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Export Racoon Data|<LVL::Debug>
12/10/2013 14:37:52 security_prepare|Export Tomcat Data|<LVL::Debug>
12/10/2013 14:37:53 security_prepare|security information prepare successful|<LVL::Info>
12/10/2013 14:37:53 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
12/10/2013 14:37:53 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/password_migrate|<LVL::Debug>
12/10/2013 14:37:53 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/password_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
12/10/2013 14:37:53 password_migrate|Handle password information|<LVL::Debug>
12/10/2013 14:37:53 password_migrate|Export password information|<LVL::Info>
12/10/2013 14:37:53 password_migrate|Calling mkdir -p /common/component/ucplatform/etc/pam.d|<LVL::Info>
12/10/2013 14:37:53 password_migrate|password information migrate successful|<LVL::Info>
12/10/2013 14:37:53 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
12/10/2013 14:37:53 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/ssh_keys_migrate|<LVL::Debug>
12/10/2013 14:37:53 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/ssh_keys_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
12/10/2013 14:37:53 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
12/10/2013 14:37:53 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/installed_options_migrate|<LVL::Debug>
12/10/2013 14:37:53 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/installed_options_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
12/10/2013 14:37:55 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
12/10/2013 14:37:55 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/platform_certs_migrate|<LVL::Debug>
12/10/2013 14:37:55 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/platform_certs_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
12/10/2013 14:37:55 platform_certs_migrate|Source major version: 8|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|Export platform certificates|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|starting refresh upgrade export certs copy|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|creating /common/component/ucplatform|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|starting refresh upgrade export certs copy|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|creating /common/component/ucplatform|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|exporting certmon config|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|creating /common/component/ucplatform/config|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|copy /usr/local/platform/conf/certMonitorConfig.xml /common/component/ucplatform/conf/|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|Export bulk sftp config|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|sftp config not available|<LVL::Info>
12/10/2013 14:37:55 platform_certs_migrate|platform certificates migrate successful|<LVL::Info>
12/10/2013 14:37:55 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
12/10/2013 14:37:55 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/servm_export|<LVL::Debug>
12/10/2013 14:37:55 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/servm_export RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
12/10/2013 14:37:56 servm_export|Start servm Export processing|<LVL::Info>
12/10/2013 14:37:56 servm_export|Copying /usr/local/cm//../platform/conf/activate.conf to /common/component/ucplatform|<LVL::Info>
12/10/2013 14:37:56 servm_export|Copying /usr/local/cm//../platform/conf/services.conf to /common/component/ucplatform|<LVL::Info>
12/10/2013 14:37:56 servm_export|SUCCESS: servm Export processing completed|<LVL::Info>
12/10/2013 14:37:56 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
12/10/2013 14:37:56 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/network_files_migrate|<LVL::Debug>
12/10/2013 14:37:56 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/network_files_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
12/10/2013 14:37:56 network_files_migrate|Export network configuration files to /common/component/ucplatform/etc/sysconfig/network-scripts|<LVL::Info>
12/10/2013 14:37:56 network_files_migrate|Calling mkdir -p /common/component/ucplatform/etc/sysconfig/network-scripts|<LVL::Debug>
12/10/2013 14:37:56 network_files_migrate|Calling mkdir -p /common/component/ucplatform/common|<LVL::Debug>
12/10/2013 14:37:56 network_files_migrate|Copy network configuration files|<LVL::Info>
12/10/2013 14:37:56 network_files_migrate|Copying /etc/sysconfig/network-scripts/ifcfg-eth0 to /common/component/ucplatform/etc/sysconfig/network-scripts/ifcfg-eth0|<LVL::Debug>
12/10/2013 14:37:56 network_files_migrate|Copying /etc/sysconfig/network to /common/component/ucplatform/etc/sysconfig/network|<LVL::Debug>
12/10/2013 14:37:56 network_files_migrate|Copying /etc/hosts to /common/component/ucplatform/etc/hosts|<LVL::Debug>
12/10/2013 14:37:57 network_files_migrate|Copying /etc/resolv.conf to /common/component/ucplatform/etc/resolv.conf|<LVL::Debug>
12/10/2013 14:37:57 network_files_migrate|Copying //etc/nsswitch.conf to /common/component/ucplatform/etc/nsswitch.conf|<LVL::Debug>
12/10/2013 14:37:57 network_files_migrate|Copy network configuration files complete|<LVL::Info>
12/10/2013 14:37:57 network_files_migrate|Export network configuration files complete|<LVL::Info>
12/10/2013 14:37:57 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform/scripts:/usr/local/cm/script|<LVL::Debug>
12/10/2013 14:37:57 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform/scripts/drf_migrate|<LVL::Debug>
12/10/2013 14:37:57 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform/scripts/drf_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
12/10/2013 14:37:57 component_install|Command execution for ucplatform component is complete|<LVL::Info>
12/10/2013 14:37:57 component_install|Command execution for ucplatform component RTMTFinish|<LVL::Notice>
12/10/2013 14:37:57 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
12/10/2013 14:37:57 component_install|Initialize ucplatform_cluster "to" side version|<LVL::Info>
12/10/2013 14:37:57 component_install|Access "to" side API|<LVL::Debug>
12/10/2013 14:37:57 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:37:57 component_install|Initialize ucplatform_cluster "to" side version complete|<LVL::Info>
12/10/2013 14:37:57 component_install|Initialize ucplatform_cluster "from" side version|<LVL::Info>
12/10/2013 14:37:57 component_install|Component ucplatform_cluster available on active side|<LVL::Debug>
12/10/2013 14:37:57 component_install|Access "from" side API|<LVL::Debug>
12/10/2013 14:37:57 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
12/10/2013 14:37:57 component_install|Initialize ucplatform_cluster "from" side version complete|<LVL::Info>
12/10/2013 14:37:57 component_install|Initialize global data complete|<LVL::Info>
12/10/2013 14:37:57 component_install|Build the command list for ucplatform_cluster|<LVL::Info>
12/10/2013 14:37:57 component_install|Initialize command list|<LVL::Debug>
12/10/2013 14:37:57 component_install|Build ucplatform_cluster export phase commands|<LVL::Debug>
12/10/2013 14:37:57 component_install|Processing ucplatform_cluster export element|<LVL::Debug>
12/10/2013 14:37:57 component_install|Processing ucplatform_cluster script element|<LVL::Debug>
12/10/2013 14:37:57 component_install|Add "platform_sso_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform_cluster /usr/local/cm/ /common/log/install/capture.txt" to command list|<LVL::Debug>
12/10/2013 14:37:57 component_install|Building the command list for ucplatform_cluster is complete|<LVL::Info>
12/10/2013 14:37:57 component_install|Command execution for ucplatform_cluster component RTMTStart|<LVL::Notice>
12/10/2013 14:37:57 component_install|Execute commands in the command list for ucplatform_cluster component|<LVL::Info>
12/10/2013 14:37:57 component_install|Search path is /common/refresh_upgrade/Cisco/ucplatform_cluster/scripts:/usr/local/cm/script|<LVL::Debug>
12/10/2013 14:37:57 component_install|Checking command /common/refresh_upgrade/Cisco/ucplatform_cluster/scripts/platform_sso_migrate|<LVL::Debug>
12/10/2013 14:37:57 component_install|Execute "/common/refresh_upgrade/Cisco/ucplatform_cluster/scripts/platform_sso_migrate RU Export 8.6.2.21900-5 8.5.1.10000-26 /common/component/ucplatform_cluster /usr/local/cm/ /common/log/install/capture.txt"|<LVL::Debug>
12/10/2013 14:37:58 platform_sso_migrate|Source major version: 8|<LVL::Info>
12/10/2013 14:37:58 component_install|Command execution for ucplatform_cluster component is complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Command execution for ucplatform_cluster component RTMTFinish|<LVL::Notice>
12/10/2013 14:37:58 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize thirdparty "to" side version|<LVL::Info>
12/10/2013 14:37:58 component_install|Access "to" side API|<LVL::Debug>
12/10/2013 14:37:58 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:37:58 component_install|Initialize thirdparty "to" side version complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize thirdparty "from" side version|<LVL::Info>
12/10/2013 14:37:58 component_install|Component thirdparty available on active side|<LVL::Debug>
12/10/2013 14:37:58 component_install|Access "from" side API|<LVL::Debug>
12/10/2013 14:37:58 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
12/10/2013 14:37:58 component_install|Initialize thirdparty "from" side version complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize global data complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Build the command list for thirdparty|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize command list|<LVL::Debug>
12/10/2013 14:37:58 component_install|Build thirdparty export phase commands|<LVL::Debug>
12/10/2013 14:37:58 component_install|Processing thirdparty export element|<LVL::Debug>
12/10/2013 14:37:58 component_install|Building the command list for thirdparty is complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Command execution for thirdparty component RTMTStart|<LVL::Notice>
12/10/2013 14:37:58 component_install|Execute commands in the command list for thirdparty component|<LVL::Info>
12/10/2013 14:37:58 component_install|No commands to execute for thirdparty component|<LVL::Info>
12/10/2013 14:37:58 component_install|Command execution for thirdparty component is complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Command execution for thirdparty component RTMTFinish|<LVL::Notice>
12/10/2013 14:37:58 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize serviceability_core "to" side version|<LVL::Info>
12/10/2013 14:37:58 component_install|Access "to" side API|<LVL::Debug>
12/10/2013 14:37:58 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:37:58 component_install|Initialize serviceability_core "to" side version complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize serviceability_core "from" side version|<LVL::Info>
12/10/2013 14:37:58 component_install|Component serviceability_core available on active side|<LVL::Debug>
12/10/2013 14:37:58 component_install|Access "from" side API|<LVL::Debug>
12/10/2013 14:37:58 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
12/10/2013 14:37:58 component_install|Initialize serviceability_core "from" side version complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize global data complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Build the command list for serviceability_core|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize command list|<LVL::Debug>
12/10/2013 14:37:58 component_install|Build serviceability_core export phase commands|<LVL::Debug>
12/10/2013 14:37:58 component_install|Processing serviceability_core export element|<LVL::Debug>
12/10/2013 14:37:58 component_install|Building the command list for serviceability_core is complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Command execution for serviceability_core component RTMTStart|<LVL::Notice>
12/10/2013 14:37:58 component_install|Execute commands in the command list for serviceability_core component|<LVL::Info>
12/10/2013 14:37:58 component_install|No commands to execute for serviceability_core component|<LVL::Info>
12/10/2013 14:37:58 component_install|Command execution for serviceability_core component is complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Command execution for serviceability_core component RTMTFinish|<LVL::Notice>
12/10/2013 14:37:58 component_install|Initialize component data, mode refresh-upgrade|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize database "to" side version|<LVL::Info>
12/10/2013 14:37:58 component_install|Access "to" side API|<LVL::Debug>
12/10/2013 14:37:58 component_install|Got version 8.6.2.21900-5|<LVL::Debug>
12/10/2013 14:37:58 component_install|Initialize database "to" side version complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize database "from" side version|<LVL::Info>
12/10/2013 14:37:58 component_install|Component database available on active side|<LVL::Debug>
12/10/2013 14:37:58 component_install|Access "from" side API|<LVL::Debug>
12/10/2013 14:37:58 component_install|Got version 8.5.1.10000-26|<LVL::Debug>
12/10/2013 14:37:58 component_install|Initialize database "from" side version complete|<LVL::Info>
12/10/2013 14:37:58 component_install|Initialize global data complete|<LVL::Info>hi gupta ,
admin:run sql car select * from tbl_event_log
Failed to get Connection.Connector(NOT CONNECTED: Driver=com.informix.jdbc.IfxDr iver;)
admin:run sql car select * from tbl_system_preferences
Failed to get Connection.Connector(NOT CONNECTED: Driver=com.informix.jdbc.IfxDriver;)
restarted the below sevices
Cisco CDR Agent
Cisco Database Layer Monitor
Cisco CDR Repository Manager
Cisco CAR Scheduler
Cisco SOAP - CDRonDemand Service
Cisco CAR Web Service
while accessing cdr reporting showing below error .
------------------------------------------WARNING-----------------------------------------
* Cluster wide parameter 'Call Diagnostics Enabled flag' is set to false. Hence no QoS information will be generated on calls. If required, please configure the same from service parameter page for Call Manager service.
* Problem in determining 2M/HWM breach status. Tbl_System_Preferences table might be corrupted. Please click on the 'Restore Defaults' button to update the table with default values.
* Tbl_System_Preferences table is corrupted. Please click on the 'Restore Defaults' button to update the table with default values.
* Problem in determining Loader Configuration. Tbl_System_Preferences table might be corrupted. Please click on the 'Restore Defaults' button to update the table with default values.
-------------------------------------------NOTICE------------------------------------------
* Problem in determining Billing Tables status. Please check the CAR DB for tables Tbl_Billing_Data and Tbl_Billing_Error.
* Problem in getting the Mail parameters. It might result in mails/alerts/notifications not been sent to CAR Administrators. Please configure this at CAR->System->System Parameters->Mail Parameters.
* Mail id for 'ccmadmin' is not available. CAR Reports/Notifications/Alert Emails might not be able to sent to this user properly. Please configure a mail id in end user configuration page.
if we apllied Restore Defaults ,geting below error
Error Code
Error Description
30029
Direct access to this screen is not allowed.
and try to access system and data base , getting below error
Error Code
Error Description
10012
Database Error. Contact System Administrator.
Does any other way to avoid cdr and do the istallation .
Maybe you are looking for
-
In iLife08 what is best setting to convert avi 720 and digital video 1080i
What is the bottom line for best quality for 720 p TV. 1.) My import is digital video 1080i to i Movie 08 (full quality) What should I use for sharing on AppleTV - the preset Large (which is 960x 540) - or some custom setting 25 fps at 1220x 720? ( H
-
Issue with wifi on my new itouch 4g after upgrade to 4.3.1
Hi, I have itouch 4g and based on the recent update message from itunes, i have clicked on upgrade to 4.3.1 after that i'm not able to select my wi-fi location as it is greayed out in the settings of my ipod touch. I'm upset. I tried reset option but
-
Adding logic to the hide/show
Hi Guys I am pretty new at this so please excuse my ignorance. I have added hide/show regions into a cell of an advanced table. In the VO I also coded in the boolean decode. So now when I run my page I get the the following: where there is details fo
-
Interview Questions and Answers for Pricing and Shipping Modules!!!!
Please let me know the Interview Questions and Answers for Pricing and Shipping Modules?
-
Tree with custom labels crashes during scrolling
We have a tree that uses custom icons for different folder/data types. The tree contains about 150 items of around 15 types. The icons are assigned correctly and the tree works just fine. However: If we scroll the tree up and down, it eats up some re