ASA transparent mode with secondary IP on the router

Hi
I have
Router --- ASA (Transparent)----Switch
and just wonder if it is possible to configure secondary IP on the router interface which is connected to ASA
so there is plenty of room in terms of LAN IP range.
Or to implement this, do I have change ASA to context mode and modify configuration on the ASA?
hope I do not have to change anything on the ASA.
Thanks

ASA in transparant mode work as L2 device
so what ever ips u use dosent matter
u dont need to change anything in the ASA while it is in transperant mod
but be careful of what is allowed to be passed through the firewall
u can control it by ACLs
the router and the switch u have will operat in L3 as thy connected directly or nothing between them from routing and layer three prespective
so they shoud be in the same subnet VLAN and so on
good lcuk
please, if helpful rate

Similar Messages

  • ASA Transparent Mode For Multiple Subnets

    I am looking to replace a FortiGate firewall which is currently working in transparent mode handling mutiple subnets with ASA 5515.  Currently, I am testing transparent mode configuration on ASA 5505, and it will not forward any traffic that is not in the same subnet as IP address assigned to BV interface.
    For example, the following configuration works.
    10.0.0.3/24 (computer) ---> 10.0.0.2/24 (firewall) ---> 10.0.0.1/24 (computer)
    However, the following does not work
    10.0.0.3/24 (computer) ---> 10.10.0.2/24 (firewall) ---> 10.0.0.1/24 (computer)
    I thought that transparent mode is just a bump in the wire, so why does the IP address/subnet assigned to BV interface affects the traffic?  Is the ASA capable of handling other/multiple subnets in transparent mode other than the subnet assigned to BV interface?
    By the way, I used to run PIX 515E 7.2(2) transparent mode filtering multiple subnets.  The current ASA 5505 is on 9.0(1).  Is it the limitation on the ASA 5505 model but not on the more powerful ASA model?
    Thank you

    Thank you @ttemirgaliyev, I tried but multiple context is not supported by ASA 5505.
    I have an example of PIX configuration in transparent mode filtering multiple subnets.  I was using this configuration in production environment in the past.  I am wondering if ASA 5510 or higher can handle this setup.
    : Saved
    : Written by enable_15 at 10:57:25.766 UTC Wed Jul 16 xxxx
    PIX Version 7.2(2)
    firewall transparent
    hostname pixfirewall
    enable password xxxxxxxxxx encrypted
    names
    interface Ethernet0
    nameif outside
    security-level 0
    interface Ethernet0.1
    vlan 1
    no nameif
    no security-level
    interface Ethernet1
    nameif inside
    security-level 100
    interface Ethernet1.1
    no vlan
    no nameif
    no security-level
    passwd xxxxxxxxxx encrypted
    ftp mode passive
    access-list outside extended permit udp any host 10.0.0.210
    access-list outside extended permit udp any host 10.0.0.3
    access-list outside extended permit tcp any host 10.0.0.110 eq smtp
    access-list outside extended permit tcp any host 10.0.0.110 eq www
    access-list outside extended permit tcp any host 10.0.0.57 eq smtp
    access-list outside extended permit tcp any host 10.0.0.57 eq www
    access-list outside extended permit tcp any host 10.0.0.75 eq www
    access-list outside extended permit tcp any host 10.0.0.75 eq ftp
    access-list outside extended permit tcp any host 10.0.0.75 eq 5003
    access-list outside extended permit tcp any host 10.0.0.75 eq 403
    access-list outside extended permit tcp any host 10.0.0.75 eq 407
    access-list outside extended permit tcp any host 10.0.0.76 eq ftp
    access-list outside extended permit tcp any host 10.0.0.2 eq pcanywhere-data
    access-list outside extended permit udp any host 10.0.0.2 eq pcanywhere-status
    access-list outside extended permit tcp any host 10.0.10.61
    access-list outside extended permit tcp any host 10.0.10.62
    access-list outside extended permit tcp any host 10.0.10.63
    access-list outside extended permit tcp any host 10.0.10.64
    access-list outside extended permit tcp any host 10.0.13.225 eq ftp
    access-list outside extended permit tcp host 192.168.4.30 host 10.0.17.254 eq telnet
    access-list outside extended permit tcp any host 10.0.13.225 eq telnet
    access-list outside extended permit tcp any host 10.0.10.61 eq 50
    access-list outside extended permit udp any host 10.0.10.61 eq isakmp
    access-list outside extended permit tcp any host 10.0.10.62 eq 50
    access-list outside extended permit udp any host 10.0.10.62 eq isakmp
    access-list outside extended permit tcp any host 10.0.10.63 eq 50
    access-list outside extended permit udp any host 10.0.10.63 eq isakmp
    access-list outside extended permit tcp any host 10.0.10.64 eq 50
    access-list outside extended permit udp any host 10.0.10.64 eq isakmp
    access-list outside extended permit tcp any host 10.0.0.219
    access-list outside extended permit udp any host 10.0.0.219
    access-list outside extended permit udp any host 10.0.10.61
    access-list outside extended permit udp any host 10.0.10.62
    access-list outside extended permit udp any host 10.0.10.63
    access-list outside extended permit udp any host 10.0.10.64
    access-list outside extended permit icmp any host 10.0.10.29
    access-list outside extended permit tcp any host 10.0.10.29 eq ftp
    access-list outside extended permit tcp any gt 1023 host 10.0.10.29 eq ftp-data
    access-list outside extended permit tcp any host 10.0.0.110 eq pop3
    access-list outside extended permit tcp any host 10.0.0.57 eq pop3
    access-list outside extended permit tcp any host 10.0.10.27 eq pcanywhere-data
    access-list outside extended permit udp any host 10.0.10.27 eq pcanywhere-status
    access-list outside extended permit tcp any host 10.0.10.31 eq pcanywhere-data
    access-list outside extended permit udp any host 10.0.10.31 eq pcanywhere-status
    access-list outside extended permit tcp any host 10.0.0.222 eq pcanywhere-data
    access-list outside extended permit udp any host 10.0.0.222 eq pcanywhere-status
    access-list outside extended permit icmp any host 10.0.10.28
    access-list outside extended permit tcp any host 10.0.10.28 eq pptp
    access-list outside extended permit gre any host 10.0.10.28
    access-list outside extended permit ip any host 10.0.10.28
    access-list outside extended permit ip any host 10.0.10.29
    access-list outside extended permit tcp any host 10.0.10.25 eq 8234
    access-list outside extended permit tcp any host 10.0.17.217 eq 8234
    access-list outside extended permit tcp any host 10.0.17.217 eq 8235
    access-list outside extended permit tcp any host 10.0.17.217 eq www
    access-list outside extended permit ip any host 10.0.10.36
    access-list outside extended permit ip any host 10.0.10.37
    access-list outside extended permit ip any host 10.0.10.38
    access-list outside extended permit ip any host 10.0.10.39
    access-list outside extended permit ip any host 10.0.10.40
    access-list outside extended permit ip any host 10.0.10.41
    access-list outside extended permit tcp any host 10.0.0.235 eq www
    access-list outside extended permit tcp any host 10.0.10.2 eq www
    access-list outside extended permit tcp any host 10.0.10.2 eq 3389
    access-list outside extended permit tcp host 192.168.1.234 host 10.0.0.211 eq 4899
    access-list outside extended permit tcp any host 10.0.0.211 eq www
    access-list outside extended permit tcp any host 10.0.10.35 eq www
    access-list outside extended permit tcp any host 10.0.10.36 eq www
    access-list outside extended permit tcp any host 10.0.10.37 eq www
    access-list outside extended permit tcp any host 10.0.10.38 eq www
    access-list outside extended permit tcp any host 10.0.10.39 eq www
    access-list outside extended permit tcp any host 10.0.10.40 eq www
    access-list outside extended permit tcp any host 10.0.10.41 eq www
    access-list outside extended permit tcp any host 10.0.0.110 eq https
    access-list outside extended permit tcp any host 10.0.0.57 eq https
    access-list outside extended permit tcp any host 10.0.0.75 eq https
    access-list outside extended permit tcp any host 10.0.17.217 eq https
    access-list outside extended permit tcp any host 10.0.0.234 eq 220
    access-list outside extended permit tcp any host 10.0.0.235 eq https
    access-list outside extended permit tcp any host 10.0.10.2 eq https
    access-list outside extended permit tcp any host 10.0.0.211 eq https
    access-list outside extended permit tcp any host 10.0.10.35 eq https
    access-list outside extended permit tcp any host 10.0.10.36 eq https
    access-list outside extended permit tcp any host 10.0.10.37 eq https
    access-list outside extended permit tcp any host 10.0.10.38 eq https
    access-list outside extended permit tcp any host 10.0.10.39 eq https
    access-list outside extended permit tcp any host 10.0.10.40 eq https
    access-list outside extended permit tcp any host 10.0.10.41 eq https
    access-list outside extended permit tcp any host 10.0.10.35 eq 8234
    access-list outside extended permit tcp any host 10.0.10.36 eq 8234
    access-list outside extended permit tcp any host 10.0.10.37 eq 8234
    access-list outside extended permit tcp any host 10.0.10.38 eq 8234
    access-list outside extended permit tcp any host 10.0.10.39 eq 8234
    access-list outside extended permit tcp any host 10.0.10.40 eq 8234
    access-list outside extended permit tcp any host 10.0.10.41 eq 8234
    access-list outside extended permit tcp any host 10.0.10.35 eq 8235
    access-list outside extended permit tcp any host 10.0.10.36 eq 8235
    access-list outside extended permit tcp any host 10.0.10.37 eq 8235
    access-list outside extended permit tcp any host 10.0.10.38 eq 8235
    access-list outside extended permit tcp any host 10.0.10.39 eq 8235
    access-list outside extended permit tcp any host 10.0.10.40 eq 8235
    access-list outside extended permit tcp any host 10.0.10.41 eq 8235
    access-list outside extended permit udp any host 10.0.0.222
    access-list outside extended permit gre any any
    access-list outside extended permit ip host 10.0.10.28 any
    access-list outside extended permit ip host 10.0.0.211 any
    access-list outside extended permit ip host 10.0.10.35 any
    access-list outside extended permit ip host 10.0.10.36 any
    access-list outside extended permit ip host 10.0.10.37 any
    access-list outside extended permit ip host 10.0.10.38 any
    access-list outside extended permit ip host 10.0.10.39 any
    access-list outside extended permit ip host 10.0.10.40 any
    access-list outside extended permit ip host 10.0.10.41 any
    access-list outside extended permit ip host 10.0.0.222 any
    access-list outside extended permit ip host 10.0.0.234 any
    access-list outside extended permit icmp host 10.0.0.234 any
    access-list outside extended permit tcp any host 10.0.0.235 eq 3389
    access-list outside extended permit ip host 10.0.0.254 any
    access-list outside extended permit tcp any host 10.0.0.2 eq 3389
    access-list outside extended permit tcp any host 10.0.13.240 eq 5900
    access-list outside extended permit udp any host 10.0.13.240 eq 5900
    access-list outside extended permit tcp any host 10.0.13.240 eq 3283
    access-list outside extended permit udp any host 10.0.13.240 eq 3283
    access-list outside extended permit tcp any host 10.0.13.240 eq ssh
    access-list outside extended permit tcp any host 10.0.10.12 eq www
    access-list outside extended permit tcp any host 10.0.0.212 eq www
    pager lines 24
    mtu outside 1500
    mtu inside 1500
    ip address 10.0.0.230 255.255.255.0
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    access-group outside in interface outside
    route outside 0.0.0.0 0.0.0.0 10.0.0.254 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout uauth 0:05:00 absolute
    snmp-server host inside 10.0.0.234 community xxxx
    no snmp-server location
    no snmp-server contact
    snmp-server community xxxx
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    snmp-server enable traps syslog
    telnet timeout 5
    ssh 0.0.0.0 0.0.0.0 outside
    ssh 0.0.0.0 0.0.0.0 inside
    ssh timeout 60
    console timeout 0
    prompt hostname context
    Cryptochecksum:c887f562a196123a335c5ebeba0ad482
    : end

  • My iphone4 is stuck in restore mode with usb plug and the itunes symbol on the screen.

    My iphone4 is stuck in restore mode with usb plug and the itunes symbol on the screen after update os7 to os7.04
    My phone is completely disabled, what can i do ?

    Connect to iTunes. The phone is in Recovery mode. Follow the directions in this support document. http://support.apple.com/kb/HT1808

  • ASA Transparent mode multicast traffic in 8.2 and 8.4

    Hi,
    When i configure 8.2 in trasparent mode and deploy the a network that was wrok on EIGRP after that i found the neighborship was stop when i allow the mutlicast address and prtocol on outside interface it was start the working But when i deploy an ASA with 8.4 IOS and then allow the multicast address and protocol both the interface (Inside and outside) after that it was start working.
    So i want to know that what the reasion to allow multicast address and protocol on 8.4 IOS for both interface. I am not able to find any answer for this.

    Hi Mahesh,
    By default ASA in transparent mode do not allow any packets not having a valid EtherType greater than or equal to 0x600. As per my knowledge this concept remain same for all versions of ASA. Most control plane protocols are denied.
    ASA in transparent mode only allows ARP, broadcast traffic, TCP and UDP inspected unicast traffic.
    For EIGRP to work through transparent firewall, we need to open ACLs in both direction for multicast and unicast both type of EIGRP traffic on all versions of ASA Firewall.

  • Transparent mode with AIP-SSM-20

    I currently have an ASA5510 in routed mode with an AIP-SSM-20.
    There is a requirement to use a fibre optic connection between this ASA and another ASA across campus, so the AIP-SSM will have to be removed and replaced with the SSM-4GE.  This part should present no issue.
    However, this will remove the IPS device, and I still want to use IPS.
    So, what I am thinking is to get another ASA5510, install the AIP-SSM, configure ASA for transparent mode and put it in between the inside of the routed ASA and my LAN.  The transparent ASA would be functioning strictly as an IPS appliance.
    Setup would look something like this:
    Internal LAN <> transparent ASA with IPS <> routed ASA <> WAN
    Can the AIP-SSM still perform IPS with the ASA in transparent mode?
    Is there a way to configure the ASA and AIP-SSM such that traffic to/from a particular server completely bypasses the AIP-SSM?
    I have a couple of fileservers that generate heavy traffic and could overload the AIP-SSM.
    Regards.

    AFAIR, There is no problem to setup AIP in a transparent firewall.
    "An ASA in transparent mode can run an AIP.  In the event the AIP fails,
    the IPS will fail-open and the ASA will continue to pass traffic.
    However, if an interface or cable fails, then traffic will stop.  You
    would need a failover pair to account for this failure event, which
    means another ASA and matching AIP."
    And no there is no problem to exclude certain hosts/ports/subnets from inspection by IPS via MPF.
    http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ips.html#wp1050744
    What I however consider however is if the ASAs 5510 as second tier firewall for 5520s will be enough.
    http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html
    HTH,
    Marcin

  • ASA Transparent Mode - Stateful Inspection

    Hi Community,
    I would appreciate any input other may be able to provide on the behaviour of ASA when in Transparent mode.
    I have a few scenarios and am looking to confirm stateful inspection behaviour for.
    By default I shall block all traffic.
    1 - Flow initiated Inside to outside (Higher to Lower security interface)
         - Rule on inside
    2 - Flow Initiated Outside to Inside (Lower to Higher security interface)
         - Rule on Outside
         - Appears to require rule on inside to allow response - No Stateful inspection
    3 - Flow initiated Inside to Outside - With Application inspection (Higher to Lower)
         - Rule on inside + App inspection
    4 - Flow initiated Outside to Inside - With Application Inspection (Lower to Higher)
         - Rule on outside + App Inspection
         - Appears to require rule on inside to allow response - No Stateful Inspection
    The references guide could do with some clarification around transparent behaviour.
    Many thanks

    Hello,
    For flow innitiated on the inside to the outside you do not need an acl on the outside for the returning traffic, that is the main idea of the stateful inspection.
    As soon as you do not have any ACLs applied to the inside interface this will be like this:
    1 - Flow initiated Inside to outside (Higher to Lower security interface)
    2 - Flow Initiated Outside to Inside (Lower to Higher security interface)
         - Rule on Outside
         - Appears to require rule on inside to allow response - No Stateful inspection
    3 - Flow initiated Inside to Outside - With Application inspection (Higher to Lower)
        App inspection
    4 - Flow initiated Outside to Inside - With Application Inspection (Lower to Higher)
         - Rule on outside + App Inspection
    Regards,

  • Failure when FWSM in transparent mode with multiple contexts

    hi experts,
                We have two FWSMs working in active/standby state,  configured with multiple contexts in transparent mode. and the "outside" and "inside" interfaces for each context are in same subnet. 
                Now we have one FWSM broken and the RMA part can't arrived in short time, so  we have the risk that the sencond FWSM could be failed as well.   In the worst case if the two was broken or powered off simultaneously,   i wonder that if the communications between multiple contexts could be ok???
    thanks in advance.

    The software requirements for Cisco Secure ACS are dependent on the type of Extensible Authentication Protocol (EAP) desired. For full support of all the EAP types including EAP-Flexible Authentication via Secure Tunneling (FAST), use release 3.2.3 or higher.
    http://www.cisco.com/en/US/netsol/ns340/ns394/ns431/ns434/networking_solutions_implementation_guide09186a008038906c.html

  • ASA Transparent Mode

    Hi Guys
    On the ASA running  the 8.4.4.1 code in transparent mode.
    Can I create sub interfaces in different vlans and attach them to different BVI groups?
    switch---trunk---ASA---Trunk---switch
    Gig0/1.1 vlan 100 bridge-gr1          Gig0/2.1 vlan 101 bridge-gr1
    Gig0/1.2 vlan 200 bridge-gr2          Gig0/2.2 vlan 201 bridge-gr2
    Is this possible?
    Thanks

    Hi,
    Yes you can do that. Please refer the below mentioned guide for better understanding.
    http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/interface_complete_transparent.html
    Please do rate if the given information helps.
    By
    Karthik

  • ASA Transparent Mode & Routing

    Since ASA in transparent mode acts like a cable, do I need to have the routes on the firewall except for the management?

    You need to put routes only for the traffic originating from the firewall.

  • After reinstalling MAC OS 10.6.8, config the permissions to read/write/no access, my MacMini [mid 2010] refuses to reboot. I tried to reboot in safe mode with fsck, but after the steps to be taken, it says fscs not done, root device is read only

    After reinstalling MAC OS 10.6.8, I config the permissions to read/write/no access, my MacMini [mid 2010] refuses to reboot. I tried to reboot in safe mode with Command+S and fsck, but after the steps to be taken, it says fscs not done, root device is read only. I also tried to bypass the Mac firmware password by taking one Ram card out and reboot the macmini while holding COMMAND+OPTION+P+R. But no luck. The macmini is not able to see the mac OSX installation CD.
    Please help ??

    f.fromleiden wrote:
    After reinstalling MAC OS 10.6.8, I config the permissions to read/write/no access, my MacMini [mid 2010] refuses to reboot.
    How and where did you change which permissions? And what was the goal?
    Do you have a complete backup of your system? and more importantly data files?
    What happened that prompted the need to reinstall the 10.6.8 update?
    The immediate road forward would be to boot from the optical drive and revert the changes you made.
    What happens when you boot with the install cd and hold down C or hold down the option key?
    [Off topic: I've been to Leiden a few times ]

  • Firewall Transparent Mode with IPS

      Dear All,
    I have network setup shown below
    Router --- Firewall Transparent Mode --- cisco layer 3 switch
    I am planning to implement ips. Which is the right place to put the IPS
    IPS is separate hardware. Let me know on which mode IPS has to be enabled? Rgds - pramod

    Hello,
    If you have the separate hardware of IPS then, place the IPS in between Router and firewall.
    you can use the IPS in inline and promiscuous mode.
    In inline mode all traffic will pass through the IPS first then after inspection will move to firewall.
    And if you are using the IPS in promiscuous mode then the copy of traffic will send to the IPS and after that inspection will done.
    Thanks.

  • ASA transparent mode vlan question

    Hi i was going through ASA 5505 doco and i found the follwoing
    In transparent firewall mode, you can configure two active VLANs in the Base license and three active
    VLANs in the Security Plus license, one of which must be for failover.
    So if i want to trunk 3 vlans can i do it or not it says that on eof them should be used for failover what does that mean i  thought that we can use a failover using a IP address on interface???
    my scenario is that my two ASA 5505 firewalls will be connected to two 3750 switches and i need 3 vlans to come to my outside ASA interface.

    As per:
    http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/97853-Transparent-firewall.html#backinfo
    Only two interface can be used for data, and a 3rd one for failover.
    Regards,
    Felipe.
    Remember to rate useful posts.

  • ASA enable mode with ACS

    Hi
    When I SSH to my ASA is there anyway to go straight to enable mode? We use RSA SecurID which means I have to wait for the token to change before I go into enable mode at the moment.
    ASA config:
    aaa authentication ssh console CISCO-ACS LOCAL
    aaa authentication serial console CISCO-ACS LOCAL
    aaa authentication http console CISCO-ACS LOCAL
    aaa authorization command CISCO-ACS LOCAL
    aaa accounting enable console CISCO-ACS
    aaa accounting serial console CISCO-ACS
    aaa accounting ssh console CISCO-ACS
    aaa accounting command CISCO-ACS
    ACS config (Group Level)
    Privilege level 15
    Read/write command authorisation set
    Thanks

    Unfortunately that is not possible as ASA does not support Exec Authorization.
    Regards,
    ~JG
    Do rate helpful posts

  • ASA Transparent Mode Deployment Issue

    Could you please be more specific as to what does not work.  How are you testing, from which IP to which IP is not working? Are you able to ping the switch from the ASA Firewall (not the transparent firewall)?
    Please remember to rate and select a correct answer

    Ok after a little research I think I have found a solution for you ( I am leaving out the policy map configs):
    firewall transparent
    hostname ASA-IPS
    interface GigabitEthernet0/0.20
    vlan 20
    nameif Outside2
    bridge-group 2
    security-level 0
    interface GigabitEthernet0/0.10
    vlan 10
    nameif Outside1
    bridge-group 1
    security-level 0
    interface GigabitEthernet0/1.22
    vlan 22
    nameif Inside2
    bridge-group 2
    security-level 100
    interface GigabitEthernet0/1.11
    vlan 11
    nameif Inside1
    bridge-group 1
    security-level 100
    interface BVI1
    ip address 10.10.10.10 255.255.255.0
    interface BVI2
    ip address 10.10.20.10 255.255.255.0
    access-list inside_acl extended permit ip any any
    access-list outside_acl extended permit ip any any
    access-group outside_acl in interface Outside1
    access-group inside_acl in interface Inside1
    access-group outside_acl in interface Outside2
    access-group inside_acl in interface Inside2
    Also make sure that you amend the VLANs on the switch to correspond to the VLANs on the Transparent ASA.
    Please remember to rate and select a correct answer

  • Transparent mode with WCCP v2

    Hi all.
    I config my content engine 7305 with configurations:
    CE(config)# wccp version 2
    CE(config)# wccp router-list 1 10.10.10.1
    CE(config)# wccp web-cache router-list-num 1
    And with router:
    Router(config)# ip wccp web-cache
    Router(config)# interface Serial0
    Router(config-if)# ip wccp web-cache redirect out
    Address Router: 10.10.10.1/24
    Address CE: 10.10.10.2 /24
    Client1 connect internet with url: http://www.vnexpress.net
    Client2 connect the same URL many times.
    But when I use: sho statistic http saving
    The hit is a little.(1 hit)
    The miss is alot. (49 miss)
    So I don't understand the ContentEngine work perfect or not????
    Help me, plz
    Thanks

    You should check to see if your CE and router see each other.
    CE "show wccp routers" - you should see the ID of your router you have configured.
    Router "show ip wccp web-cache view"
    If that doesn't work you can turn on debug
    "debug ip wccp packets" and see the request/response sequence
    .Jun 16 17:46:26: WCCP-PKT:S00: Received valid Here_I_Am packet from 10.1.1.1 w/rcv_id 00000844
    .Jun 16 17:46:26: WCCP-PKT:S00: Sending I_See_You packet to 10.1.1.1 w/ rcv_id 00000845

Maybe you are looking for

  • Why are videos saved as gif's slow when viewed in browsers?

    i can never find an answer to this, an seeing as how CS4 just came out, but is still giving me this issue there must be something new that i dont know about. i play back the video in CS4 and its blazingly fast, faster than the actual video, i save th

  • How can I call a Method in a Transformation Routine

    Hello Experts, How can I call a Method in a Transformation Routine ?? THNXX

  • Reader 9.1 (Linux) takes 100% CPU

    Initially when starting Adobe Reader and opening a document everything is fine. But after a few minutes Reader takes up to 100% CPU. This also happens when starting Adobe Reader without opening a document. It's Adobe Reader 9.1 (AdobeReader_enu-9.1.0

  • How do you scroll down in dropdown menus?

    On long dropdown menus where you normally get a scroll bar. Im not seeing a scroll bar in my iPad 2. How do you scroll down in these menus?

  • Mail is constantly asking for my password.

      I enter the password and tell keychain to remember it, but an hour, 2 hours, 3 hours, later mail is asking for the password again. The program has worked for a number of years without problem.  Then a couple of months ago this started.  It is happe