2008 R2 NPS wont connect to Cisco 1841 via Cisco VPN 5.0.03.0560

I am migrating our IAS server from 2003 R2 to 2008 R2 NPS that we use to authenticate VPN conenctions through AD. Currently works without issue on 2003 R2 server. Does not want to work on 2008 R2 NPS server.
We are using Cisco VPN client 5.0.03.0560 as the VPN client. Below is the log file when I try to connect. Can someone tell me what needs to be done on NPS to get this working? If more info is needed please ask and will supply.
Cisco Systems VPN Client Version 5.0.03.0560
Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
Config file directory: C:\Program Files\Cisco Systems\VPN Client\
1      10:55:10.906  06/05/14  Sev=Info/4 CM/0x63100002
Begin connection process
2      10:55:10.921  06/05/14  Sev=Info/4 CM/0x63100004
Establish secure connection
3      10:55:10.921  06/05/14  Sev=Info/4 CM/0x63100024
Attempt connection with server ".com"
4      10:55:10.921  06/05/14  Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with x.x.x.x.
5      10:55:10.937  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to x.x.x.x
6      10:55:11.140  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
7      10:55:11.140  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, VID(Unity), VID(dpd), VID(?), VID(Xauth), VID(Nat-T), KE, ID, NON, HASH, NAT-D, NAT-D) from x.x.x.x
8      10:55:11.140  06/05/14  Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
9      10:55:11.140  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports DPD
10     10:55:11.203  06/05/14  Sev=Info/6 GUI/0x63B00012
Authentication request attributes is 6h.
11     10:55:11.140  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
12     10:55:11.140  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
13     10:55:11.140  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
14     10:55:11.140  06/05/14  Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
15     10:55:11.140  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to x.x.x.x
16     10:55:11.140  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
17     10:55:11.140  06/05/14  Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port =  0x078F, Remote Port = 0x1194
18     10:55:11.140  06/05/14  Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
   Remote end is NOT behind a NAT device
   This   end IS behind a NAT device
19     10:55:11.140  06/05/14  Sev=Info/4 CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
20     10:55:11.203  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
21     10:55:11.203  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from x.x.x.x
22     10:55:11.203  06/05/14  Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds
23     10:55:11.203  06/05/14  Sev=Info/5 IKE/0x63000047
This SA has already been alive for 1 seconds, setting expiry to 86399 seconds from now
24     10:55:11.203  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
25     10:55:11.203  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from x.x.x.x
26     10:55:11.203  06/05/14  Sev=Info/4 CM/0x63100015
Launch xAuth application
27     10:55:11.250  06/05/14  Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
28     10:55:11.250  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
29     10:55:15.484  06/05/14  Sev=Info/4 CM/0x63100017
xAuth application returned
30     10:55:15.484  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to x.x.x.x
31     10:55:21.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
32     10:55:31.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
33     10:55:41.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
34     10:55:51.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
35     10:55:52.593  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
36     10:55:52.593  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from x.x.x.x
37     10:55:52.609  06/05/14  Sev=Info/6 GUI/0x63B00012
Authentication request attributes is 6h.
38     10:55:52.593  06/05/14  Sev=Info/4 CM/0x63100015
Launch xAuth application
39     10:56:01.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
40     10:56:07.656  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
41     10:56:07.656  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from x.x.x.x
42     10:56:11.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
43     10:56:21.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
44     10:56:22.656  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
45     10:56:22.656  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from x.x.x.x
46     10:56:31.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
47     10:56:37.765  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
48     10:56:37.765  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from x.x.x.x
49     10:56:41.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
50     10:56:51.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
51     10:56:52.812  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
52     10:56:52.812  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from x.x.x.x
53     10:57:01.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
54     10:57:07.562  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
55     10:57:07.562  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(Retransmission) from x.x.x.x
56     10:57:11.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
57     10:57:21.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
58     10:57:31.218  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
59     10:57:33.046  06/05/14  Sev=Info/4 CM/0x63100017
xAuth application returned
60     10:57:33.046  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to x.x.x.x
61     10:57:33.046  06/05/14  Sev=Info/4 CM/0x63100018
User does not provide any authentication data
62     10:57:33.046  06/05/14  Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
63     10:57:33.046  06/05/14  Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=A5D0259F68268513 R_Cookie=D90058DAEBC5310F) reason = DEL_REASON_RESET_SADB
64     10:57:33.046  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to x.x.x.x
65     10:57:33.046  06/05/14  Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=A5D0259F68268513 R_Cookie=D90058DAEBC5310F) reason = DEL_REASON_RESET_SADB
66     10:57:33.046  06/05/14  Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
67     10:57:33.062  06/05/14  Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
68     10:57:33.218  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
69     10:57:33.218  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
70     10:57:33.218  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
71     10:57:33.218  06/05/14  Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
72     11:00:54.656  06/05/14  Sev=Info/4 CM/0x63100002
Begin connection process
73     11:00:54.671  06/05/14  Sev=Info/4 CM/0x63100004
Establish secure connection
74     11:00:54.671  06/05/14  Sev=Info/4 CM/0x63100024
Attempt connection with server ".com"
75     11:00:54.687  06/05/14  Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with x.x.x.x
76     11:00:54.703  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to x.x.x.x
77     11:00:54.750  06/05/14  Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
78     11:00:54.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
79     11:00:54.953  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
80     11:00:54.953  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, VID(Unity), VID(dpd), VID(?), VID(Xauth), VID(Nat-T), KE, ID, NON, HASH, NAT-D, NAT-D) from x.x.x.x
81     11:00:54.953  06/05/14  Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
82     11:00:54.953  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports DPD
83     11:00:54.953  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
84     11:00:55.015  06/05/14  Sev=Info/6 GUI/0x63B00012
Authentication request attributes is 6h.
85     11:00:54.953  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
86     11:00:54.953  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
87     11:00:54.953  06/05/14  Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
88     11:00:54.968  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to x.x.x.x
89     11:00:54.968  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
90     11:00:54.968  06/05/14  Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port =  0x0798, Remote Port = 0x1194
91     11:00:54.968  06/05/14  Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
   Remote end is NOT behind a NAT device
   This   end IS behind a NAT device
92     11:00:54.968  06/05/14  Sev=Info/4 CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
93     11:00:55.000  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
94     11:00:55.000  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from x.x.x.x
95     11:00:55.000  06/05/14  Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds
96     11:00:55.000  06/05/14  Sev=Info/5 IKE/0x63000047
This SA has already been alive for 1 seconds, setting expiry to 86399 seconds from now
97     11:00:55.015  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
98     11:00:55.015  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from x.x.x.x
99     11:00:55.015  06/05/14  Sev=Info/4 CM/0x63100015
Launch xAuth application
100    11:00:58.765  06/05/14  Sev=Info/4 CM/0x63100017
xAuth application returned
101    11:00:58.765  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to x.x.x.x
102    11:01:05.250  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
103    11:01:15.250  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
104    11:01:25.250  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
105    11:01:30.312  06/05/14  Sev=Info/6 GUI/0x63B0000D
Disconnecting VPN connection.
106    11:01:30.312  06/05/14  Sev=Info/4 CM/0x63100006
Abort connection attempt before Phase 1 SA up
107    11:01:30.312  06/05/14  Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
108    11:01:30.312  06/05/14  Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=B172E43640D94E73 R_Cookie=D90058DA499474F6) reason = DEL_REASON_RESET_SADB
109    11:01:30.328  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to x.x.x.x
110    11:01:30.328  06/05/14  Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=B172E43640D94E73 R_Cookie=D90058DA499474F6) reason = DEL_REASON_RESET_SADB
111    11:01:30.328  06/05/14  Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
112    11:01:30.328  06/05/14  Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
113    11:01:30.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
114    11:01:30.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
115    11:01:30.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
116    11:01:30.750  06/05/14  Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
117    11:01:44.875  06/05/14  Sev=Info/4 CM/0x63100002
Begin connection process
118    11:01:44.890  06/05/14  Sev=Info/4 CM/0x63100004
Establish secure connection
119    11:01:44.890  06/05/14  Sev=Info/4 CM/0x63100024
Attempt connection with server ".com"
120    11:01:44.906  06/05/14  Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with x.x.x.x
121    11:01:44.921  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to x.x.x.x
122    11:01:45.234  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
123    11:01:45.234  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, VID(Unity), VID(dpd), VID(?), VID(Xauth), VID(Nat-T), KE, ID, NON, HASH, NAT-D, NAT-D) from x.x.x.x
124    11:01:45.296  06/05/14  Sev=Info/6 GUI/0x63B00012
Authentication request attributes is 6h.
125    11:01:45.234  06/05/14  Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
126    11:01:45.234  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports DPD
127    11:01:45.234  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
128    11:01:45.234  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
129    11:01:45.234  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
130    11:01:45.234  06/05/14  Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
131    11:01:45.234  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to x.x.x.x
132    11:01:45.234  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
133    11:01:45.234  06/05/14  Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port =  0x079B, Remote Port = 0x1194
134    11:01:45.234  06/05/14  Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
   Remote end is NOT behind a NAT device
   This   end IS behind a NAT device
135    11:01:45.234  06/05/14  Sev=Info/4 CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
136    11:01:45.250  06/05/14  Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
137    11:01:45.250  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
138    11:01:45.281  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
139    11:01:45.281  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from x.x.x.x
140    11:01:45.281  06/05/14  Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds
141    11:01:45.281  06/05/14  Sev=Info/5 IKE/0x63000047
This SA has already been alive for 1 seconds, setting expiry to 86399 seconds from now
142    11:01:45.296  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
143    11:01:45.296  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from x.x.x.x
144    11:01:45.296  06/05/14  Sev=Info/4 CM/0x63100015
Launch xAuth application
145    11:01:53.625  06/05/14  Sev=Info/4 CM/0x63100017
xAuth application returned
146    11:01:53.625  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to x.x.x.x
147    11:01:53.640  06/05/14  Sev=Info/4 CM/0x63100018
User does not provide any authentication data
148    11:01:53.640  06/05/14  Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
149    11:01:53.640  06/05/14  Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=07A59EB947FF6880 R_Cookie=D90058DA7E39EE62) reason = DEL_REASON_RESET_SADB
150    11:01:53.640  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to x.x.x.x
151    11:01:53.640  06/05/14  Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=07A59EB947FF6880 R_Cookie=D90058DA7E39EE62) reason = DEL_REASON_RESET_SADB
152    11:01:53.640  06/05/14  Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
153    11:01:53.640  06/05/14  Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
154    11:01:53.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
155    11:01:53.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
156    11:01:53.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
157    11:01:53.750  06/05/14  Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
158    11:02:00.406  06/05/14  Sev=Info/4 CM/0x63100002
Begin connection process
159    11:02:00.421  06/05/14  Sev=Info/4 CM/0x63100004
Establish secure connection
160    11:02:00.421  06/05/14  Sev=Info/4 CM/0x63100024
Attempt connection with server "com"
161    11:02:00.421  06/05/14  Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with x.x.x.x
162    11:02:00.437  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to x.x.x.x
163    11:02:00.750  06/05/14  Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
164    11:02:00.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
165    11:02:01.015  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
166    11:02:01.015  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, VID(Unity), VID(dpd), VID(?), VID(Xauth), VID(Nat-T), KE, ID, NON, HASH, NAT-D, NAT-D) from x.x.x.x
167    11:02:01.015  06/05/14  Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
168    11:02:01.109  06/05/14  Sev=Info/6 GUI/0x63B00012
Authentication request attributes is 6h.
169    11:02:01.015  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports DPD
170    11:02:01.015  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports DWR Code and DWR Text
171    11:02:01.015  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
172    11:02:01.015  06/05/14  Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
173    11:02:01.031  06/05/14  Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
174    11:02:01.031  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to x.x.x.x
175    11:02:01.031  06/05/14  Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
176    11:02:01.031  06/05/14  Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port =  0x079E, Remote Port = 0x1194
177    11:02:01.031  06/05/14  Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
   Remote end is NOT behind a NAT device
   This   end IS behind a NAT device
178    11:02:01.031  06/05/14  Sev=Info/4 CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
179    11:02:01.078  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
180    11:02:01.078  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from x.x.x.x
181    11:02:01.078  06/05/14  Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds
182    11:02:01.078  06/05/14  Sev=Info/5 IKE/0x63000047
This SA has already been alive for 1 seconds, setting expiry to 86399 seconds from now
183    11:02:01.078  06/05/14  Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x
184    11:02:01.078  06/05/14  Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from x.x.x.x
185    11:02:01.078  06/05/14  Sev=Info/4 CM/0x63100015
Launch xAuth application
186    11:02:06.406  06/05/14  Sev=Info/4 CM/0x63100017
xAuth application returned
187    11:02:06.406  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to x.x.x.x
188    11:02:06.406  06/05/14  Sev=Info/4 CM/0x63100018
User does not provide any authentication data
189    11:02:06.406  06/05/14  Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
190    11:02:06.406  06/05/14  Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=E9F0E2EDD6D85F48 R_Cookie=D90058DA2BBDFC93) reason = DEL_REASON_RESET_SADB
191    11:02:06.406  06/05/14  Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DWR) to x.x.x.x
192    11:02:06.406  06/05/14  Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=E9F0E2EDD6D85F48 R_Cookie=D90058DA2BBDFC93) reason = DEL_REASON_RESET_SADB
193    11:02:06.406  06/05/14  Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
194    11:02:06.421  06/05/14  Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
195    11:02:06.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
196    11:02:06.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
197    11:02:06.750  06/05/14  Sev=Info/4 IPSEC/0x63700014
Deleted all keys
198    11:02:06.750  06/05/14  Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped

I am using 2008 R2 NPS as radius server. 1841 ISR as VPN device. Here are debug loghs from Cisco 1841
1430434: .Jun  9 2014 12:06:59.187 PDT: RADIUS: no sg in radius-timers: ctx 0x62A26CC8 sg 0x0000
1430435: .Jun  9 2014 12:06:59.187 PDT: RADIUS: Retransmit to (10.1.x.x:1645,1646) for id 1645/140
1430436: .Jun  9 2014 12:06:59.191 PDT: RADIUS: Received from id 1645/140 10.1.4.7:1645, Access-Reject, len 20
1430437: .Jun  9 2014 12:06:59.191 PDT: RADIUS:  authenticator 06 F7 D9 7C 40 F4 9A FB - E1 81 EE EC 66 84 48 B7
1430438: .Jun  9 2014 12:06:59.191 PDT: RADIUS: response-authenticator decrypt fail, pak len 20
1430439: .Jun  9 2014 12:06:59.191 PDT: RADIUS: packet dump: 038C001406F7D97C40F49AFBE181EEEC668448B7
1430440: .Jun  9 2014 12:06:59.191 PDT: RADIUS: expected digest: 7AAF1DE8D8190BC4D8B9B66437405BBA
1430441: .Jun  9 2014 12:06:59.191 PDT: RADIUS: response authen: 06F7D97C40F49AFBE181EEEC668448B7
1430442: .Jun  9 2014 12:06:59.191 PDT: RADIUS: request  authen: 2669BD0BEF3749C79C551EABB4B4D105
1430443: .Jun  9 2014 12:06:59.191 PDT: RADIUS: Response (140) failed decrypt
1430444: .Jun  9 2014 12:07:05.246 PDT: RADIUS: no sg in radius-timers: ctx 0x62A26CC8 sg 0x0000
1430445: .Jun  9 2014 12:07:05.246 PDT: RADIUS: Retransmit to (10.1.4.7:1645,1646) for id 1645/140
1430446: .Jun  9 2014 12:07:05.250 PDT: RADIUS: Received from id 1645/140 10.1.4.7:1645, Access-Reject, len 20
1430447: .Jun  9 2014 12:07:05.250 PDT: RADIUS:  authenticator 06 F7 D9 7C 40 F4 9A FB - E1 81 EE EC 66 84 48 B7
1430448: .Jun  9 2014 12:07:05.250 PDT: RADIUS: response-authenticator decrypt fail, pak len 20
1430449: .Jun  9 2014 12:07:05.250 PDT: RADIUS: packet dump: 038C001406F7D97C40F49AFBE181EEEC668448B7
1430450: .Jun  9 2014 12:07:05.250 PDT: RADIUS: expected digest: 7AAF1DE8D8190BC4D8B9B66437405BBA
1430451: .Jun  9 2014 12:07:05.250 PDT: RADIUS: response authen: 06F7D97C40F49AFBE181EEEC668448B7
1430452: .Jun  9 2014 12:07:05.250 PDT: RADIUS: request  authen: 2669BD0BEF3749C79C551EABB4B4D105
1430453: .Jun  9 2014 12:07:05.254 PDT: RADIUS: Response (140) failed decrypt
1430454: .Jun  9 2014 12:07:08.574 PDT: %SEC-6-IPACCESSLOGP: list 102 denied tcp x.x.9.47(21303) -> x.x.109.122(5038), 1 packet
1430455: .Jun  9 2014 12:07:09.826 PDT: RADIUS: no sg in radius-timers: ctx 0x62A26CC8 sg 0x0000
1430456: .Jun  9 2014 12:07:09.826 PDT: RADIUS: Retransmit to (10.1.4.7:1645,1646) for id 1645/140
1430457: .Jun  9 2014 12:07:09.830 PDT: RADIUS: Received from id 1645/140 10.1.x.x:1645, Access-Reject, len 20
1430458: .Jun  9 2014 12:07:09.830 PDT: RADIUS:  authenticator 06 F7 D9 7C 40 F4 9A FB - E1 81 EE EC 66 84 48 B7
1430459: .Jun  9 2014 12:07:09.830 PDT: RADIUS: response-authenticator decrypt fail, pak len 20
1430460: .Jun  9 2014 12:07:09.830 PDT: RADIUS: packet dump: 038C001406F7D97C40F49AFBE181EEEC668448B7
1430461: .Jun  9 2014 12:07:09.830 PDT: RADIUS: expected digest: 7AAF1DE8D8190BC4D8B9B66437405BBA
1430462: .Jun  9 2014 12:07:09.830 PDT: RADIUS: response authen: 06F7D97C40F49AFBE181EEEC668448B7
1430463: .Jun  9 2014 12:07:09.830 PDT: RADIUS: request  authen: 2669BD0BEF3749C79C551EABB4B4D105
1430464: .Jun  9 2014 12:07:09.830 PDT: RADIUS: Response (140) failed decrypt
1430465: .Jun  9 2014 12:07:14.210 PDT: RADIUS: no sg in radius-timers: ctx 0x62A26CC8 sg 0x0000
1430466: .Jun  9 2014 12:07:14.210 PDT: RADIUS: No response from (10.1.4.7:1645,1646) for id 1645/140
Log Buffer (4096 bytes):
6E7C
1430534: .Jun  9 2014 12:09:50.586 PDT: RADIUS: expected digest: DE950EACA36AD5E6CE5A0148663AB1AD
1430535: .Jun  9 2014 12:09:50.586 PDT: RADIUS: response authen: 9745CF5AD4B8418A59D9C97E72586E7C
1430536: .Jun  9 2014 12:09:50.590 PDT: RADIUS: request  authen: E39E7226C93AFEDCAF03A49F11FDA193
1430537: .Jun  9 2014 12:09:50.590 PDT: RADIUS: Response (141) failed decrypt
1430538: .Jun  9 2014 12:09:51.902 PDT: %SEC-6-IPACCESSLOGRL: access-list logging rate-limited or missed 12 packets
1430539: .Jun  9 2014 12:09:55.638 PDT: %SEC-6-IPACCESSLOGP: list 112 denied tcp x.x.245.x(1602) -> x.32.x.x(445), 1 packet
1430540: .Jun  9 2014 12:09:55.974 PDT: RADIUS: no sg in radius-timers: ctx 0x637771F4 sg 0x0000
1430541: .Jun  9 2014 12:09:55.974 PDT: RADIUS: Retransmit to (10.x.x.x:1645,1646) for id 1645/141
1430542: .Jun  9 2014 12:09:55.978 PDT: RADIUS: Received from id 1645/141 10.1.4.7:1645, Access-Reject, len 20
1430543: .Jun  9 2014 12:09:55.978 PDT: RADIUS:  authenticator 97 45 CF 5A D4 B8 41 8A - 59 D9 C9 7E 72 58 6E 7C
1430544: .Jun  9 2014 12:09:55.978 PDT: RADIUS: response-authenticator decrypt fail, pak len 20
1430545: .Jun  9 2014 12:09:55.978 PDT: RADIUS: packet dump: 038D00149745CF5AD4B8418A59D9C97E72586E7C
1430546: .Jun  9 2014 12:09:55.978 PDT: RADIUS: expected digest: DE950EACA36AD5E6CE5A0148663AB1AD
1430547: .Jun  9 2014 12:09:55.978 PDT: RADIUS: response authen: 9745CF5AD4B8418A59D9C97E72586E7C
1430548: .Jun  9 2014 12:09:55.978 PDT: RADIUS: request  authen: E39E7226C93AFEDCAF03A49F11FDA193
1430549: .Jun  9 2014 12:09:55.978 PDT: RADIUS: Response (141) failed decrypt
1430550: .Jun  9 2014 12:09:58.070 PDT: %SEC-6-IPACCESSLOGP: list 102 denied tcp 27.x.x.x(33281) -> 12.x.x.x(80), 1 packet
1430551: .Jun  9 2014 12:10:00.326 PDT: RADIUS: no sg in radius-timers: ctx 0x637771F4 sg 0x0000
1430552: .Jun  9 2014 12:10:00.326 PDT: %RADIUS-4-RADIUS_DEAD: RADIUS server 10.1.x.x:1645,1646 is not responding.
1430553: .Jun  9 2014 12:10:00.326 PDT: %RADIUS-4-RADIUS_ALIVE: RADIUS server 10.1.x.x:1645,1646 is being marked alive.
1430554: .Jun  9 2014 12:10:00.326 PDT: RADIUS: Retransmit to (10.1.x.x:1645,1646) for id 1645/141
1430555: .Jun  9 2014 12:10:00.330 PDT: RADIUS: Received from id 1645/141 10.1.x.x:1645, Access-Reject, len 20
1430556: .Jun  9 2014 12:10:00.330 PDT: RADIUS:  authenticator 97 45 CF 5A D4 B8 41 8A - 59 D9 C9 7E 72 58 6E 7C
1430557: .Jun  9 2014 12:10:00.330 PDT: RADIUS: response-authenticator decrypt fail, pak len 20
1430558: .Jun  9 2014 12:10:00.330 PDT: RADIUS: packet dump: 038D00149745CF5AD4B8418A59D9C97E72586E7C
1430559: .Jun  9 2014 12:10:00.330 PDT: RADIUS: expected digest: DE950EACA36AD5E6CE5A0148663AB1AD
1430560: .Jun  9 2014 12:10:00.330 PDT: RADIUS: response authen: 9745CF5AD4B8418A59D9C97E72586E7C
1430561: .Jun  9 2014 12:10:00.330 PDT: RADIUS: request  authen: E39E7226C93AFEDCAF03A49F11FDA193
1430562: .Jun  9 2014 12:10:00.334 PDT: RADIUS: Response (141) failed decrypt
1430563: .Jun  9 2014 12:10:01.713 PDT: %SEC-6-IPACCESSLOGDP: list 102 denied icmp 175.x.x.x -> x.x.x.104 (3/3), 1 packet
1430564: .Jun  9 2014 12:10:05.841 PDT: RADIUS: no sg in radius-timers: ctx 0x637771F4 sg 0x0000
1430565: .Jun  9 2014 12:10:05.841 PDT: RADIUS: Retransmit to (10.x.x.x:1645,1646) for id 1645/141
1430566: .Jun  9 2014 12:10:05.845 PDT: RADIUS: Received from id 1645/141 10.x.x.x:1645, Access-Reject, len 20
1430567: .Jun  9 2014 12:10:05.845 PDT: RADIUS:  authenticator 97 45 CF 5A D4 B8 41 8A - 59 D9 C9 7E 72 58 6E 7C
1430568: .Jun  9 2014 12:10:05.845 PDT: RADIUS: response-authenticator decrypt fail, pak len 20
1430569: .Jun  9 2014 12:10:05.845 PDT: RADIUS: packet dump: 038D00149745CF5AD4B8418A59D9C97E72586E7C
1430570: .Jun  9 2014 12:10:05.845 PDT: RADIUS: expected digest: DE950EACA36AD5E6CE5A0148663AB1AD
1430571: .Jun  9 2014 12:10:05.845 PDT: RADIUS: response authen: 9745CF5AD4B8418A59D9C97E72586E7C
1430572: .Jun  9 2014 12:10:05.849 PDT: RADIUS: request  authen: E39E7226C93AFEDCAF03A49F11FDA193
1430573: .Jun  9 2014 12:10:05.849 PDT: RADIUS: Response (141) failed decrypt

Similar Messages

  • My ipod touch wont connect to my computer via usb but will connect to a different computer and i can connect my ipod nano anyone know how to connect my ipod touch?

    so the ipod connects to my brothers computer fine but it wont connect to myn... it doesnt show in my computer but when i plug it in and out it makes the little connect sound and it doesnt charge on my computer either,,, my ipod nano however connects fine to my computer fine.. any solutions?? please help

    Try here. Look especially at the driver and service topics. The iPod touch uses different drivers thant the Nano
    iOS: Device not recognized in iTunes for Windows

  • Routeur cisco 1841 and cisco SA540

    I already have 1841 router and I am trying to install SA540 as firewall. Can someone help me how to configure these
    two?  I tried once but failed. I can connect Internet from firewall but I can  not connect Internet from PC which connected to router.
    If I have to tell you more information, please let me know.
    Thank you.

    Tahar,
    How far you can get? Do you have connectivty between the SA and the 1841 Router? Is the Router able to go out to the internet? In your computer, can you see an ARP being build for the IP address of the router?
    Mike

  • My phone wont connect to my imac via usb

    I have a 2010 imac & an iphone 5s. When I connect my phone to my computer via usb, nothing happens. If I use the same cable with a wall charger, phone charges as normal. If I connect to my work mac, phone will charge and sync as normal (but being work, I don't back up to their machines). I've tried all 4 usb ports on my computer, same null result. USB works normally for everything else, including charging & syncing an old ipod. If I use a non-Apple approved cheapo cable, it simply tells me that the cable will be unreliable, but still will not sync or charge over this unreliable cable. Cheapo cable works fine at work & with wall charger. PRAM was reset as normal Apple SOP. Suggestions?

    Yup...everything is up-to-date, still nothing. It's weird because every component works normally in every other situation. I only have the 2 usb/thunderbolt cable, but they don't exhibit an error in any other situation.

  • Ipad wont connect to the imac via bluetooth.?

    ipad will not connect to imac via bluetooth.  after sending file to ipad it says the ipad doesnt have the services. 

    Bluetooth on the iPad is aimed at devices such as keyboards and heaadphones, not for transferring files. The supported bluetooth profiles are listed on this page http://support.apple.com/kb/HT3647

  • HT204387 My iPad wont connect with my android via Bluetooth

    I've tried this with three different android phones and it can detect them but won't paired. don't have this issue connecting my galaxy tab with phnes

    IiOS devices only support Bluetooth connections to keyboards, speakers and headsets

  • I have the little black apple tv boc but it wont connect to any computer via micro usb leads

    can anyone help please

    Answers can only be as helpful as the details provided.  There is literally nothing any one can tell you when all you post is "can anyone help please".  Help with what?

  • Cisco 1841/871 crash EEM scripting 15.1(1)T

    We have been testing 15.1.1T on a couple of lab Cisco 1841 and Cisco 871 devices.
    On the devices we are using EEM to automate the failover/failback process for a cellular modem attached to f3 on the 871 or f0/1 on the 1841. One of the EEM applets we use fires from a cron timer event that occurs every 10 minutes on the router.
    IOS revision 12.4(22)T we had no problems with using the cron-timer triggered applet (every 10 minutes between 7am to 10pm), except for the fact that every command issued by EEM required AAA authentication. The EEM applet is causing our routers to saturate our Cisco ACS servers (we use 700+ routers in the field, all exectuing this EEM script) with single-connect requests. We will refer to the cron-timer executed applet as 'Maintenance' from here on out.
    As of 15.1(1)T the addition to bypass the AAA authentication process became available. This was a huge speed increase to our EEM applets, specifically the Maintenance applet. I will include the applet for clairity.
    event manager applet Maintenance authorization bypass
    event timer cron name 10min cron-entry "*/10 7-21 * * *" maxrun 30
    action 001 cli command "en"
    action 002 cli command "show ip route | section B\*[ ]+0\.0\.0\.0"
    action 003 regexp "^B\*.([ ]+)(0\.)+0" "$_cli_result"
    action 004 set bgpstate "$_regexp_result"
    action 005 cli command "show ip route | section S[ ]+208\.38\.154\.8"
    action 006 regexp "^S([ ]+)208\.38\.154\.8" "$_cli_result"
    action 007 set wireless "$_regexp_result"
    action 008 track read 1
    action 009 set track1 "$_track_state"
    action 010 if $wireless eq 0
    action 011       if $bgpstate eq 0
    action 012             cli command "conf t"
    action 013             cli command "int fa0/1"
    action 014             cli command "no shut"
    action 015             cli command "int tun201"
    action 016             cli command "no shut"
    action 017             cli command "int lo201"
    action 018             cli command "no shut"
    action 019             if $track1 eq up
    action 020                   exit
    action 021                   else
    action 022                   cli command "conf t"
    action 023                   cli command "int s0/0/0"
    action 024                   cli command "no shut"
    action 025             end
    action 026             cli command "end"
    action 027             cli command "exit"
    action 028       else
    action 029             exit
    action 030            end
    action 031 else
    action 032       if $bgpstate eq 1
    action 033             cli command "conf t"
    action 034             cli command "int fa0/1"
    action 035             cli command "shut"
    action 036             cli command "int tun201"
    action 037             cli command "shut"
    action 038             cli command "int lo201"
    action 039             cli command "shut"
    action 040             cli command "end"
    action 041             cli command "exit"
    action 042      else
    action 043             if $track1 eq up
    action 044                   exit
    action 045             else
    action 046                   cli command "conf t"
    action 047                   cli command "int s0/0/0"
    action 048                   cli command "no shut"
    action 049             end
    action 050             cli command "end"
    action 051             cli command "exit"
    action 052             exit
    action 053       end
    action 054 end
    This script is designed to look for a couple of routes in the IP routing table, and populate two variables (bgpstate and wireless) with the regular expression matching result of the show ip route commands. It uses track 1 to determine the up/down status of Serial0/0/0 which is the primary T1 interface for WAN services on the router. The wireless is "up/1" if the static route to 208.38.154.8 is present in the show ip route output (only when f0/1 is up in this case). The T1 is "up/1" if the default route passed to the IP routing table is present in the show ip route output.
    Before the upgrade to 15.1(1)T these scripts ran without issue, and we had no errors. Now after the upgrade, anytime this script fires and the show ip route match for the wireless variable is 1 instead of zero, it begins to run through the else condition starting at action 031, and during the second execution of the script every 10 minutes (I still have not figured out how to force the cron-timer to fire only ONCE per minute, instead of at the beginning and end of the minute), the router will generate spurious memory errors, and sometimes crash or reboot.
    This all began with 15.1(1)T, and I have not seen any caveats or other entries that could possibly point to the cause of this problem. Any ideas?
    I am also attaching a crash file from one of the routers like this one so you can see what I mean.
    All of these devices are running the advipservices k9 version of this IOS.
    Thanks for your time.

    The problem with cron events running twice in the same minute is bug CSCsz12460 which will be fixed in EEM 3.2 in 15.1(3)T.
    The crash you're seeing doesn't appear to be related to EEM at all.  It looks like a problem with single-connection TACACS+.  The bug appears to be CSCtg40901 which has not yet been fixed in 15.1T.
    A workaround was suggested to use multiple-connection TACACS+.

  • Help Needed i can't connect to the router via VPN

    I can not connect to my server via the VPN client i have attached the config. I also havve a bif problem i can't use the webb gui any more and idon't know why.
    Thanks i advance

    You would need to change the NAT from standard ACL to extended ACL as follows:
    access-list 150 deny ip 192.168.1.0 0.0.0.255 192.168.0.0 0.0.0.255
    access-list 150 permit ip 192.168.1.0 0.0.0.255 any
    ip nat inside source list 150 interface ATM0.1 overload
    no ip nat inside source list 1 interface ATM0.1 overload

  • Windows 2008 R2 NPS/ 1841 - Connection Failure

    Looks like NPS is connecting but my AD account get locked out and the below are log entries from c:\windows\system32\logfiles
    Any idea what the logs are telling me? 10.1.6.3 is router.
    "MA-UTILITY","IAS",04/17/2014,09:26:52,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",8,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37
    1",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:26:52,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,16,"311 1 10.1.4.7 04/15/2014 17:25:37 1",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:26:56,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",8,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 2",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:26:56,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,16,"311 1 10.1.4.7 04/15/2014 17:25:37 2",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:27:01,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",8,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 3",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:27:01,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,16,"311 1 10.1.4.7 04/15/2014 17:25:37 3",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:27:05,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",8,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 4",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:27:05,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,16,"311 1 10.1.4.7 04/15/2014 17:25:37 4",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:27:46,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",8,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 5",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:27:46,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,16,"311 1 10.1.4.7 04/15/2014 17:25:37 5",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:27:51,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",8,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 6",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:27:51,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 6",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:27:56,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",8,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 7",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:27:56,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 7",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:28:00,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",8,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 8",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:28:00,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 8",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:36:51,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",5,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 9",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:36:51,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 9",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:36:56,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",5,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 10",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:36:56,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 10",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:37:01,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",5,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 11",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:37:01,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 11",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:37:05,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",5,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 12",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:37:05,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 12",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:53:28,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",6,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 13",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:53:28,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 13",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:53:33,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",6,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 14",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:53:33,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 14",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:53:38,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",6,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 15",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:53:38,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 15",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:53:43,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",6,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/15/2014 17:25:37 16",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,09:53:43,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/15/2014 17:25:37 16",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:09:16,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",11,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/17/2014 19:58:35 1",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:09:16,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,16,"311 1 10.1.4.7 04/17/2014 19:58:35 1",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:09:21,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",11,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/17/2014 19:58:35 2",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:09:21,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,16,"311 1 10.1.4.7 04/17/2014 19:58:35 2",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:09:26,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",11,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/17/2014 19:58:35 3",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:09:26,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,16,"311 1 10.1.4.7 04/17/2014 19:58:35 3",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:09:31,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",11,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/17/2014 19:58:35 4",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:09:31,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,16,"311 1 10.1.4.7 04/17/2014 19:58:35 4",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:10:02,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",11,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/17/2014 19:58:35 5",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:10:02,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,16,"311 1 10.1.4.7 04/17/2014 19:58:35 5",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:10:07,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",11,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/17/2014 19:58:35 6",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:10:07,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/17/2014 19:58:35 6",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:10:12,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",11,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/17/2014 19:58:35 7",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:10:12,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/17/2014 19:58:35 7",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:10:17,1,"dsantel","MOA\dsantel",,"99.148.214.150",,,,"10.1.6.3",11,0,"10.1.6.3","ma-rint",,,5,,,,1,,0,"311 1 10.1.4.7 04/17/2014 19:58:35 8",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use
    Windows authentication for all users",1,,,,
    "MA-UTILITY","IAS",04/17/2014,13:10:17,3,,"MOA\dsantel",,,,,,,,0,"10.1.6.3","ma-rint",,,,,,,1,,36,"311 1 10.1.4.7 04/17/2014 19:58:35 8",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Use Windows authentication
    for all users",1,,,,

    Hi,
    Unfortunately, the available information is not enough have a clear view of the occurred behavior. For narrow down the reason, could you provide more information about your environment. when this problem occurs the system log record information, screenshots
    is the best information. I don't found the simlar issue, please try to reset the specific user password then monitor the issue again.
    More information:
    Event Logs
    http://technet.microsoft.com/en-us/library/cc722404.aspx
    Thanks.
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Cannot establish multiple simultaneous PPTP connections with the CISCO 1841.

    Hello everyone;
    I have recently tested a PPTP connection with a CISCO 1841 router and got success. I have configured a windows 7 client and successfully connected to the router and was able to access the documents in the server PC that I have mentioned in the attached diagram. I have created number of different users  in the CISCO 1841 too. While some one is having a connection, another user cannot connect to it, which means multiple simultaneous connections aren't possible. Do I have to create a ACL for the PPTP and if yes, How ? 
     FastEthernet0/0 is up, line protocol is up
      Internet address is 192.168.100.1/25
      Broadcast address is 255.255.255.255
      Address determined by non-volatile memory
      MTU is 1500 bytes
      Helper address is not set
      Directed broadcast forwarding is disabled
      Outgoing access list is not set
      Inbound  access list is 100
    Proxy ARP is enabled
    Local Proxy ARP is disabled
    Security level is default
    Split horizon is enabled
    ICMP redirects are always sent
    ICMP unreachables are always sent
    ICMP mask replies are never sent
    IP fast switching is enabled
    IP fast switching on the same interface is disabled
    IP Flow switching is disabled
    IP CEF switching is enabled
    IP CEF Feature Fast switching turbo vector
    IP multicast fast switching is enabled
    IP multicast distributed fast switching is disabled
    IP route-cache flags are Fast, CEF
    Router Discovery is disabled
    IP output packet accounting is disabled
    IP access violation accounting is disabled
    TCP/IP header compression is disabled
    RTP/IP header compression is disabled
    Policy routing is disabled
    Network address translation is enabled, interface in domain inside
    BGP Policy Mapping is disabled
    WCCP Redirect outbound is disabled
    WCCP Redirect inbound is disabled
    WCCP Redirect exclude is disabled
    Inbound inspection rule is SDM_LOW
    --------------------------------------------------------------------------------------------ACL 100-----------------------------
    deny icmp any any echo-reply
    deny ip host 255.255.255.255 any
    deny ip 127.0.0.0 0.255.255.255 any
    deny ip host 66.163.169.186 any
    permit ip any any (122467027 matches)

    As long as you have the inspection engine enabled on the ASA, it shouldn't freak out of the different IP as it will inspect the call signalling and will NAT it accordingly, BUT, for simplicity, I agree with you, it would cause a lot of troubleshooting headache if there is problem as well as reconfiguration of IP on the host ends.
    Here is the NAT FYI:
    object network obj-10.10.96.0
       subnet 10.10.96.0 255.255.255.0
    object network obj-192.168.96.0
       subnet 192.168.96.0 255.255.255.0
    object network obj-10.10.14.0
       subnet 10.10.14.0 255.255.255.0
    object network obj-10.1.0.0
       subnet 10.1.0.0 255.255.255.0
    object network obj-192.168.1.0
       subnet 192.168.1.0 255.255.255.0
    object network obj-10.10.11.0
       subnet 10.10.11.0 255.255.255.0
    object network obj-192.168.11.0
       subnet 192.168.11.0 255.255.255.0
    nat (inside,outside) source static obj-10.10.96.0 obj-192.168.96.0 destination static obj-10.10.14.0 obj-10.10.14.0
    nat (inside,outside) source static obj-10.1.0.0 obj-192.168.1.0 destination static obj-10.10.14.0 obj-10.10.14.0
    nat (inside,outside) source static obj-10.10.11.0 obj-192.168.11.0 destination static obj-10.10.14.0 obj-10.10.14.0

  • IPad wont connect to cisco dpq3925 wifi

    Hello All,
    I've come to this forum in hope that I can obtain my answer, as Apple Support, Cox Communications, and Cisco has been unable to help me with my issue.  I own the latest iPad model, and I own a wireless router made by Cisco, Model # DPQ3925.   I'm able to connect via wifi using my laptop, gaming consoles, wife's kindle, however I am unable to connect via wifi to my home router.
    I also had a friend bring his ipad mini, and he was unable to connect either.   Any suggestions?  In case you're interested, below is what I've attempted:
    1. Reset of router and ipad
    2. Network reset for both
    3. Changed router name and password
    4. Factory restore on ipad
    I've tried just about everything.

    Some things to try first:
    1. Turn Off your iPad. Then turn Off (disconnect power cord for 30 seconds or longer) the wireless router & then back On. Now boot your iPad. Hopefully it will see the WiFi.
    2. Go to Settings>Wi-Fi and turn Off. Then while at Settings>Wi-Fi, turn back On and chose a Network.
    3. Change the channel on your wireless router (Auto or Channel 6 is best). Instructions at http://macintoshhowto.com/advanced/how-to-get-a-good-range-on-your-wireless-netw ork.html
    4. Go into your router security settings and change from WEP to WPA with AES.
    5.  Renew IP Address: (especially if you are droping internet connection)
        •    Launch Settings app
        •    Tap on Wi-Fi
        •    Tap on the blue arrow of the Wi-Fi network that you connect to from the list
        •    In the window that opens, tap on the Renew Lease button
    6. Potential Quick Fixes When Your iPad Won’t Connect to Your Wifi Network
    http://ipadinsight.com/ipad-tips-tricks/potential-quick-fixes-when-your-ipad-won t-connect-to-your-wifi-network/
    ~~~~~~~~~~~~~~~~~~~~~~~~~
    iOS 6 Wifi Problems/Fixes
    Wi-Fi Fix for iOS 6
    https://discussions.apple.com/thread/4823738?tstart=240
    How To: Workaround iPad Wi-Fi Issues
    http://www.theipadfan.com/workaround-ipad-wifi-issues/
    Another Fix For iOS 6 WiFi Problems
    http://tabletcrunch.com/2012/10/27/fix-ios-6-wifi-problems-ssid/
    Wifi Doesn't Connect After Waking From Sleep - Sometimes increasing screen brightness prevents the failure to reconnect after waking from sleep. According to Apple, “If brightness is at lowest level, increase it by moving the slider to the right and set auto brightness to off.”
    Fix For iOS 6 WiFi Problems?
    http://tabletcrunch.com/2012/09/27/fix-ios-6-wifi-problems/
    Did iOS 6 Screw Your Wi-Fi? Here’s How to Fix It
    http://gizmodo.com/5944761/does-ios-6-have-a-wi+fi-bug
    How To Fix Wi-Fi Connectivity Issue After Upgrading To iOS 6
    http://www.iphonehacks.com/2012/09/fix-wi-fi-connectivity-issue-after-upgrading- to-ios-6.html
    iOS 6 iPad 3 wi-fi "connection fix" for netgear router
    http://www.youtube.com/watch?v=XsWS4ha-dn0
    Apple's iOS 6 Wi-Fi problems
    http://www.zdnet.com/apples-ios-6-wi-fi-problems-linger-on-7000004799/
    ~~~~~~~~~~~~~~~~~~~~~~~
    How to Boost Your Wi-Fi Signal
    http://ipad.about.com/od/iPad_Troubleshooting/a/How-To-Boost-Your-Wi-Fi-Signal.h tm
    Troubleshooting a Weak Wi-Fi Signal
    http://ipad.about.com/od/iPad_Troubleshooting/a/Troubleshooting-A-Weak-Wi-Fi-Sig nal.htm
    How to Fix a Poor Wi-Fi Signal on Your iPad
    http://ipad.about.com/od/iPad_Troubleshooting/a/How-To-Fix-A-Poor-Wi-Fi-Signal-O n-Your-iPad.htm
    iOS Troubleshooting Wi-Fi networks and connections  http://support.apple.com/kb/TS1398
    iPad: Issues connecting to Wi-Fi networks  http://support.apple.com/kb/ts3304
    WiFi Connecting/Troubleshooting http://www.apple.com/support/ipad/wifi/
    How to Fix: My iPad Won't Connect to WiFi
    http://ipad.about.com/od/iPad_Troubleshooting/ss/How-To-Fix-My-Ipad-Wont-Connect -To-Wi-Fi.htm
    iOS: Connecting to the Internet http://support.apple.com/kb/HT1695
    iOS: Recommended settings for Wi-Fi routers and access points  http://support.apple.com/kb/HT4199
    How to Quickly Fix iPad 3 Wi-Fi Reception Problems
    http://osxdaily.com/2012/03/21/fix-new-ipad-3-wi-fi-reception-problems/
    iPad Wi-Fi Problems: Comprehensive List of Fixes
    http://appletoolbox.com/2010/04/ipad-wi-fi-problems-comprehensive-list-of-fixes/
    Connect iPad to Wi-Fi (with troubleshooting info)
    http://thehowto.wikidot.com/wifi-connect-ipad
    Fix iPad Wifi Connection and Signal Issues  http://www.youtube.com/watch?v=uwWtIG5jUxE
    Fix Slow WiFi Issue https://discussions.apple.com/thread/2398063?start=60&tstart=0
    How To Fix iPhone, iPad, iPod Touch Wi-Fi Connectivity Issue http://tinyurl.com/7nvxbmz
    Unable to Connect After iOS Update - saw this solution on another post.
    https://discussions.apple.com/thread/4010130
    Note - When troubleshooting wifi connection problems, don't hold your iPad by hand. There have been a few reports that holding the iPad by hand, seems to attenuate the wifi signal.
    Wi-Fi or Bluetooth settings grayed out or dim
    http://support.apple.com/kb/TS1559
    ~~~~~~~~~~~~~~~
    If any of the above solutions work, please post back what solved your problem. It will help others with the same problem.
     Cheers, Tom

  • Connection issue between Cisco 515 Pix and Cisco 1841 router

    Hi,
    I am having a problem getting a Cisco Pix 515 communicating to a Cisco 1841. I am currently studying for CCNA so forgive me if it's obvious to the rest of you where the problem lies.
    The client currently has an ISDN service which is being moved over to a 2MB E1 connection.
    I have configured the 1841 router with G.703 WIC according to the information given to me by the ISP. I have configured the 1841 to have the same internal IP as the ISDN Cisco 800 series router, hoping for a simple swap over. The Pix 515 sits behind the ISDN at present and will be behind the 1841 when it is active.
    Once I unplug the 800 series ISDN router and plug the 1841 into the pix, I cannot get any response what so ever. I have tried changing the ethernet connection speeds between the pix and 1841 hoping it would be as simple as that without success. Can't get ping responses from either end but I can when the ISDN service is plugged in. Both ISDN and E1 link are supplied by the same ISP, Telstra Australia and the fixed IP's are able to move over to the E1 service.
    I have not touched the pix in any way. A seperate company configured the router a couple of years ago.
    I have included the configurations of the existing ISDN, Pix and the 1841 for you to review. Any advise/solutions would be greatly appreciated.
    Thanks in Advance,

    Hi,
    The outside interface on your PIX is configured as 10BaseT which would be fine when using the original 800 series ISDN router.
    Now with your new 1841, the interface that the PIX connects to is Fast Ethernet so you need to change your outside interface on the PIX to the same
    If you want to use auto negotiation between the PIX and router then the command to do this on the PIX is
    interface ethernet0 auto
    I recommend using hard coded settings between the PIX and router and the command to do this on this PIX is
    interface ethernet0 100full
    You will also need to change your router as:
    interface FastEthernet0/0
    speed 100
    duplex full
    If you can't configure the PIX as you mentioned an external company did it, then i guess you could change your Fast Ethernet interface to "speed 10", "duplex half".
    This won't create a bottleneck as you only have a 2 MB connection to your ISP
    Everything else looks good, don't worry about asking questions on the forum, this is what its for.
    HTH
    Paddy

  • 802.11x with 2008 R2 NPS

    Here's what I'm using for attempt at 802.11x:
    -2008 R2 NPS
    -AIR-AP1142N-A-K9
    -Lenovo T510 Laptop
    Here is what I followed:
    1. http://techblog.mirabito.net.au/?p=87&cpage=1#comment-26452
    2. http://blog.laurence.id.au/2010/03/running-peap-with-cisco-aeronet-1231g.html
    Here is my config on the AP, radius related:
    aaa new-model
    aaa group server radius rad_eap
    aaa group server radius rad_mac
    aaa group server radius rad_acct
    aaa group server radius rad_admin
    aaa group server tacacs+ tac_admin
    aaa group server radius rad_pmip
    aaa group server radius dummy
    aaa authentication login eap_methods group rad_eap
    aaa authentication login mac_methods local
    aaa authorization exec default local
    aaa accounting network acct_methods start-stop group rad_acct
    aaa session-id common
    clock timezone EST -4
    dot11 syslog
    dot11 ssid IPC02-AP
       authentication open eap eap_methods
       authentication network-eap eap_methods
       authentication key-management wpa version 2
       guest-mode
    encryption mode ciphers aes-ccm tkip
    interface BVI1
    ip address 192.168.1.7 255.255.255.0
    no ip route-cache
    ip radius source-interface BVI1
    radius-server local
      nas 192.168.1.38 key 7 *
    radius-server attribute 32 include-in-access-req format %h
    radius-server host 192.168.1.38 auth-port 1645 acct-port 1646 key 7 *
    Here is my part of my debug:
    RADIUS(000000C0): Received from id 1645/151
    RADIUS/DECODE: EAP-Message fragments, 4, total 4 bytes
    dot11_auth_dot1x_parse_aaa_resp: Received server response: FAIL
    dot11_auth_dot1x_parse_aaa_resp: found eap pak in server response
    Client 0026.c750.**** failed: by EAP authentication server
    dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 0026.c750.****
    dot11_auth_dot1x_send_response_to_client: Forwarding server message to client 0026.c750.****
    dot11_auth_dot1x_send_response_to_client: Started timer client_timeout 30 seconds
    dot11_auth_dot1x_send_client_fail: Authentication failed for 0026.c750.****
    DOT11-7-AUTH_FAILED: Station 0026.c750.**** Authentication failed RADIUS(000000C0): Received from id 1645/151
    RADIUS/DECODE: EAP-Message fragments, 4, total 4 bytes
    dot11_auth_dot1x_parse_aaa_resp: Received server response: FAIL
    dot11_auth_dot1x_parse_aaa_resp: found eap pak in server response
    Client 0026.c750.**** failed: by EAP authentication server
    dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 0026.c750.****
    dot11_auth_dot1x_send_response_to_client: Forwarding server message to client 0026.c750.****
    dot11_auth_dot1x_send_response_to_client: Started timer client_timeout 30 seconds
    dot11_auth_dot1x_send_client_fail: Authentication failed for 0026.c750.****
    DOT11-7-AUTH_FAILED: Station 0026.c750.**** Authentication failed
    I get a "connection failed" on my laptop.  I don't see any logs/events relating to a failure of credentials on my 2008 server.
    Any ideas?

    I have not gotten any other feedback and I have not been ablet to identify anything on technet about it.  It will happen with any role that requires more than 27 of the Cisco-AV-Pair settings.  It is working fine for stuff like the Lobby administrator logins, that require less than 5 access rules to be passed from the NPS, but that just goes to show that it is working as long as I do ot hit the 27 "line-item" limit.

  • Creating "A" record in Cisco 1841

    Hello All,
    We are using Cisco 1841 router. Our requirement is to configure "A" record in the router i.e. we wanted this router to act as a Primary DNS server.
    I can bit explain the scenario.
    We have connected Internet Lease line ILL to this router with a static ip assigned to it. We  have a domain name registered say e.g. www.xyz.com at www.namecheap.com. We wanted to host the web server inside our office network for our website. We did the necessary changes at www.namecheap.com to the domain www.xyz.com pointing it to our static ip. But we are not able to ping or browse the domain www.xyz.com and we contacted www.namecheap.com technical support and they informed us that we need to create a "A" record where ever the web server is hosted.
    I tried to search the internet and i couldn't able to find the necessary online resources for creating "A" record in the router for the domain name. But i could find the below link for creating soa record http://blog.ipspace.net/2006/09/use-your-cisco-router-as-primary-dns.html and created a namesever entries like ns1.xyz.com
    But this doesn't create "A" record
    Any assistance would be really helpful.
    Thanks
    Sundar

    Dear Daniele,
    Thanks for your reply.
    You solution worked great for me.
    We are able to ping the domain name.
    Now we are facing another problem in reaching our web server. I will explain it below.
    1. When i type the domain name in the browser we are getting a authentication popup asking for username & password, the popup says "a username and password are being requested by says level_15_access ..."
    2. I provided the router username & password it redirect to the following link http://www.sitename.com/archive/flash:home/html/home_aux.shtml. and load the SDM (Cisco router and security device manager) page.
    NOTE: we have installed Cisco SDM.
    What i wanted is, the site should reach our website hosted in our IIS server inside the network. The IIS server has an local IP address 192.168.1.x and the router gateway has a IP address 192.168.1.y
    Any assistance would be really helpful.
    Thanks
    Sundar

Maybe you are looking for

  • Read from text file: time to number

    Ok short question. I've been using labview for logging data to a text file. I made it comma separated and looks like this: absolute time, relative time (since start exp), channel 1 data, channel 2 data. Well, I can sucessfully read from textfile and

  • How can I create a video with effects using my ipad?

    How can I create a video with effects (sepia, B&W, Negative, oval or any other shape borders) using my ipad?  I would Like to keep a higher res and also be able to shrink it down to email or send in a MMS. Or should I just upload it to my PC and mess

  • Cannot install QT, iTunes, or safari "could not open key..."

    whenever i try to install iTunes, QT, or safari it always says "could not open key UNKNOWN\components\.... i have used the registry editor and done the things listed in several different posts on the same topic. please help

  • How to upload images in a blog?

    hi, i wanted to post a blod in sdn..but i have no idea as how to insert images(such as datatype,MT etc screenshots). please help me out.. regards madhu

  • El in a custom tag

    Hi all I've just written a taglib. I need JSTL EL support in this tag. What I have to configure? Any ideas? <taglib:tag attribute="<%= myAttribute %>" ...// works fine! <taglib:tag attribute="${myAttribute}" ...// won't work!- Expression Language is