Can I connect to F-Secure Freedome while being connected to my work VPN?

QuestionCan I connect to F-Secure Freedome while being connected to my work VPN?
AnswerIf you are working remotely and you are required to be connected to your company VPN to access your company’s internal services, it is recommended that you turn off the FreedomeVPN.
While it is still possible to switch on FreedomeVPN when connected to your work VPN, this may however hinder access to your company’s internal services.

Install an application such as MacDrive onto Windows.
(35077)

Similar Messages

  • How do I supress the "sync encountered an error while syncing" bar? I get it every time I connect to a work VPN that is isolated from the internet.

    Background: For work I routinely need to connect to a secure VPN that is completely isolated from the internet. When using it, I can only connect to the servers that reside within the network and the VPN software (Cisco AnyConnect + NAC Agent) seems to automatically redirect all http requests to external sites to a catch-all 'sorry you can't do that' page.
    So while connected to the VPN, Firefox Sync doesn't work and nor do I expect it to. However, my issue is that every time I connect to the VPN, Firefox silently pops up a "sync encountered an error while syncing" error message bar at the bottom of the browser, which I have to manually close. This obviously isn't the end of the world, but having to do it all the time gets annoying so I was wondering if there was a way of suppressing that particular error message or maybe getting Sync to handle the secure VPN more gracefully.

    I don't know about blocking that message, but my suggestion is to turn Sync autoconnect off, and use Sync manually.
    Type '''about:config''' in the URL bar and hit Enter. <br />
    Then type '''''autoconnect''''' in the Search bar at the top. <br />
    '''services.sync.autoconnect''' = double-click that pref to toggle it to '''false'''.
    Then to trigger a Sync manually, hit '''Sync Now''' in the Firefox menu ''(or the File menu)''.

  • Siri can't connect to net work

    Siri keeps saying can't connect to network  or says having trouble connecting to network

    It's not the network.  Siri doesn't seem to cache any requests (yet) so that means every single request for translation goes to the Siri servers.  I think the greater idea is that, if you build up a large enough question database in the front end, you can make life easier during the back end - or, actual Siri launch. 
    Plus once everyone stops telling Siri "I love you" the servers will relax a bit.  Try telling Siri you're not going to plug it in unless it starts talking...then see what happens. 
    Remember, Siri is still in beta and this is to be expected for a BETA release.  When it does work, it works well!  Launch day: +2

  • I can not connect to my work e-mail using both regular e-mail set-up and mail 2003 (work has Outlook 2003).  I get the error message "no internet connection- as soon as a connection is made it will switch back".  Does anyone have any suggestions?

    Why can't I connect to my work e-mail (Outlook 2003) using either the regular e-mail account set-up or Mail 2003? Does anyone have any suggestions?

    I have yet to find an email server that does not work with Mail.app. Your solution will be to configure its ports and send/receive protocol according to the email server's requirements.
    Try the Zimbra support forums. I found this excerpt from a relevant post:
    http://www.zimbra.com/forums/users/46221-mac-mail-app-dont-work-outside-company. html
    in which the following ports were suggested
    ports 25, 465, and/or 487 to send mail.
    port 143/993 to retrieve mail over IMAP

  • Can't Connect to Pix 501 VPN on Network

    Hi All,
    I have a software VPN client that connects just fine to the PIX 501 VPN, but I cannot ping or telnet to any services on the LAN. Below is my config and results of show cry ipsec sa. I would appreciate any suggestions to fix this.
    It's been a while since I have done this. When I check the DHCP address received from the VPN, the default gateway is missing. IIRC, that is normal. What is strange is that when I ping, Windows does not show any sent packets.
    Thanks,
    --Drichards38
    PIX Version 6.3(3)
    interface ethernet0 auto
    interface ethernet1 100full
    nameif ethernet0 outside security0
    nameif ethernet1 inside security100
    enable password bgVy005CZTsaMOwR encrypted
    passwd bgVy005CZTsaMOwR encrypted
    hostname cisco
    domain-name xxxxxx.biz
    fixup protocol dns maximum-length 512
    fixup protocol ftp 21
    fixup protocol ftp 1024-2048
    fixup protocol ftp 49152-65534
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol skinny 2000
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    names
    access-list acl-out permit tcp any interface outside eq www
    access-list acl_out permit tcp any host aa.bb.cc.dd eq telnet
    access-list acl_out permit tcp any host aa.bb.cc.dd eq 3389
    access-list acl_out permit tcp any host aa.bb.cc.dd eq 60990
    access-list acl_out permit tcp any host aa.bb.cc.dd eq www
    access-list acl_out permit tcp any host aa.bb.cc.dd eq www
    access-list acl_out permit tcp any host aa.bb.cc.dd eq echo
    access-list acl_out permit tcp any host aa.bb.cc.dd eq ftp
    access-list acl_out permit tcp any host aa.bb.cc.dd eq https
    access-list acl_out permit tcp any interface inside eq www
    access-list acl_out permit tcp any interface inside eq ftp
    access-list acl_out permit tcp any interface inside eq 3389
    access-list acl_out permit tcp any interface inside eq https
    access-list acl_out permit tcp any host aa.bb.cc.dd eq www
    access-list acl_out permit tcp any host aa.bb.cc.dd eq www
    access-list acl_out permit tcp any host aa.bb.cc.dd eq https
    access-list acl_out permit tcp any host aa.bb.cc.dd eq https
    access-list acl_out permit tcp any host aa.bb.cc.dd eq 3389
    access-list acl_out permit tcp any host aa.bb.cc.dd eq 3389
    access-list acl_out permit tcp any host aa.bb.cc.dd eq www
    access-list acl_out permit tcp any host aa.bb.cc.dd eq https
    access-list acl_out permit tcp any host aa.bb.cc.dd eq 3389
    access-list acl_out permit tcp any host aa.bb.cc.dd eq ftp
    access-list acl_out permit tcp any host aa.bb.cc.dd eq www
    access-list acl_out permit tcp any host aa.bb.cc.dd eq https
    access-list acl_out permit tcp any host aa.bb.cc.dd eq 3389
    access-list acl_out permit tcp any host aa.bb.cc.dd eq 902
    access-list acl_out permit tcp any host aa.bb.cc.dd eq ftp
    access-list acl_out permit tcp any host aa.bb.cc.dd eq www
    access-list acl_out permit tcp any host aa.bb.cc.dd eq ftp
    access-list acl_out permit tcp any host aa.bb.cc.dd eq https
    access-list acl_out permit tcp any host aa.bb.cc.dd eq 3389
    access-list acl_out permit tcp any host aa.bb.cc.dd eq www
    access-list acl_out permit tcp any host aa.bb.cc.dd eq ftp
    access-list acl_out permit tcp any host aa.bb.cc.dd eq https
    access-list acl_out permit tcp any host aa.bb.cc.dd eq 3389
    access-list acl_out permit tcp any host aa.bb.cc.dd eq www
    access-list acl_out permit tcp any host aa.bb.cc.dd eq https
    access-list acl_out permit tcp any host aa.bb.cc.dd eq ftp
    access-list acl_out permit tcp any host aa.bb.cc.dd eq 3389
    access-list outside_cryptomap_dyn_20 permit ip any 10.0.0.0 255.0.0.0
    access-list split_tunnel_acl permit ip 10.0.0.0 255.0.0.0 any
    pager lines 24
    mtu outside 1500
    mtu inside 1500
    ip address outside aa.bb.cc.dd 255.255.255.240
    ip address inside 192.168.93.1 255.255.255.0
    ip audit info action alarm
    ip audit attack action alarm
    ip local pool low_vpn_pool 10.0.1.205-10.0.1.210
    pdm location 172.16.0.0 255.255.0.0 inside
    pdm logging informational 100
    pdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 1 192.168.93.0 255.255.255.0 0 0
    nat (inside) 1 0.0.0.0 0.0.0.0 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.67 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.68 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.69 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.70 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.71 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.72 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.73 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.74 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.75 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.76 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.77 netmask 255.255.255.255 0 0
    static (inside,outside) aa.bb.cc.dd 192.168.93.78 netmask 255.255.255.255 0 0
    access-group acl_out in interface outside
    rip inside default version 1
    route outside 0.0.0.0 0.0.0.0 aa.bb.cc.dd 1
    timeout xlate 0:05:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
    timeout uauth 0:05:00 absolute
    aaa-server TACACS+ protocol tacacs+
    aaa-server RADIUS protocol radius
    aaa-server LOCAL protocol local
    aaa authorization command LOCAL
    http server enable
    no snmp-server location
    no snmp-server contact
    snmp-server community public
    no snmp-server enable traps
    floodguard enable
    sysopt connection permit-ipsec
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
    crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
    crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
    crypto map outside_map client authentication LOCAL
    crypto map outside_map interface outside
    isakmp enable outside
    isakmp nat-traversal 20
    isakmp policy 20 authentication pre-share
    isakmp policy 20 encryption 3des
    isakmp policy 20 hash md5
    isakmp policy 20 group 2
    isakmp policy 20 lifetime 86400
    vpngroup MY_VPN address-pool low_vpn_pool
    vpngroup MY_VPN dns-server 4.2.2.1
    vpngroup MY_VPN default-domain xxxxx.biz
    vpngroup MY_VPN split-tunnel split_tunnel_acl
    vpngroup MY_VPN idle-time 1800
    vpngroup MY_VPN password ********
    telnet 0.0.0.0 255.255.255.255 outside
    telnet 192.168.93.0 255.255.255.0 inside
    telnet timeout 5
    ssh 0.0.0.0 0.0.0.0 outside
    ssh timeout 60
    console timeout 0
    dhcpd address 192.168.93.230-192.168.93.240 inside
    dhcpd dns ff.gg.hh.ii ff.gg.hh.ii
    dhcpd lease 65536
    dhcpd ping_timeout 750
    dhcpd domain xxxxxx.biz
    dhcpd auto_config outside
    dhcpd enable inside
    username xxxx password xxxxxxx encrypted privilege 15
    cisco(config)# show cry ipsec sa
    interface: outside
        Crypto map tag: outside_map, local addr. aa.bb.cc.dd
       local  ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
       remote ident (addr/mask/prot/port): (10.0.1.205/255.255.255.255/0/0)
       current_peer: jj.kk.ll.mm:1265
       dynamic allocated peer ip: 10.0.1.205
         PERMIT, flags={transport_parent,}
        #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0
        #pkts decaps: 38, #pkts decrypt: 38, #pkts verify 38
        #pkts compressed: 0, #pkts decompressed: 0
        #pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
        #send errors 0, #recv errors 0
         local crypto endpt.: aa.bb.cc.dd, remote crypto endpt.: 97.93.95.133
         path mtu 1500, ipsec overhead 64, media mtu 1500
         current outbound spi: 3a898e67
         inbound esp sas:
          spi: 0xeeb64931(4004923697)
            transform: esp-3des esp-md5-hmac ,
            in use settings ={Tunnel UDP-Encaps, }
            slot: 0, conn id: 1, crypto map: outside_map
            sa timing: remaining key lifetime (k/sec): (4607993/28610)
            IV size: 8 bytes
            replay detection support: Y
         inbound ah sas:
         inbound pcp sas:
         outbound esp sas:
          spi: 0x3a898e67(982093415)
            transform: esp-3des esp-md5-hmac ,
            in use settings ={Tunnel UDP-Encaps, }
            slot: 0, conn id: 2, crypto map: outside_map
            sa timing: remaining key lifetime (k/sec): (4608000/28574)
            IV size: 8 bytes
            replay detection support: Y
         outbound ah sas:
         outbound pcp sas:

    I just set the logging to high on all areas of the Cisco VPN client. Below is the resulting log. Everything looks ok from here:
    Cisco Systems VPN Client Version 5.0.03.0530
    Copyright (C) 1998-2007 Cisco Systems, Inc. All Rights Reserved.
    Client Type(s): Windows, WinNT
    Running on: 5.1.2600 Service Pack 3
    29     09:57:02.887  09/03/12  Sev=Info/4    CM/0x63100002
    Begin connection process
    30     09:57:02.897  09/03/12  Sev=Info/4    CM/0x63100004
    Establish secure connection
    31     09:57:02.897  09/03/12  Sev=Info/4    CM/0x63100024
    Attempt connection with server "a.b.c.d"
    32     09:57:02.907  09/03/12  Sev=Info/6    IKE/0x6300003B
    Attempting to establish a connection with a.b.c.d.
    33     09:57:02.917  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to a.b.c.d
    34     09:57:03.228  09/03/12  Sev=Info/4    IPSEC/0x63700008
    IPSec driver successfully started
    35     09:57:03.228  09/03/12  Sev=Info/4    IPSEC/0x63700014
    Deleted all keys
    36     09:57:03.228  09/03/12  Sev=Info/6    IPSEC/0x6370002C
    Sent 47 packets, 0 were fragmented.
    37     09:57:03.979  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    38     09:57:03.979  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK AG (SA, VID(Xauth), VID(dpd), VID(Unity), VID(?), KE, ID, NON, VID(?), VID(Nat-T), NAT-D, NAT-D, HASH) from a.b.c.d
    39     09:57:04.039  09/03/12  Sev=Info/6    GUI/0x63B00012
    Authentication request attributes is 6h.
    40     09:57:03.979  09/03/12  Sev=Info/5    IKE/0x63000001
    Peer supports XAUTH
    41     09:57:03.979  09/03/12  Sev=Info/5    IKE/0x63000001
    Peer supports DPD
    42     09:57:03.979  09/03/12  Sev=Info/5    IKE/0x63000001
    Peer is a Cisco-Unity compliant peer
    43     09:57:03.979  09/03/12  Sev=Info/5    IKE/0x63000082
    Received IOS Vendor ID with unknown capabilities flag 0x000000A5
    44     09:57:03.979  09/03/12  Sev=Info/5    IKE/0x63000001
    Peer supports NAT-T
    45     09:57:03.999  09/03/12  Sev=Info/6    IKE/0x63000001
    IOS Vendor ID Contruction successful
    46     09:57:03.999  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to a.b.c.d
    47     09:57:03.999  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    48     09:57:03.999  09/03/12  Sev=Info/4    IKE/0x63000083
    IKE Port in use - Local Port =  0x0421, Remote Port = 0x1194
    49     09:57:03.999  09/03/12  Sev=Info/5    IKE/0x63000072
    Automatic NAT Detection Status:
       Remote end is NOT behind a NAT device
       This   end IS behind a NAT device
    50     09:57:03.999  09/03/12  Sev=Info/4    CM/0x6310000E
    Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
    51     09:57:04.029  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    52     09:57:04.029  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_INITIAL_CONTACT) from a.b.c.d
    53     09:57:04.029  09/03/12  Sev=Warning/2    IKE/0xA3000067
    Received Unexpected InitialContact Notify (PLMgrNotify:886)
    54     09:57:04.039  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    55     09:57:04.039  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from a.b.c.d
    56     09:57:04.039  09/03/12  Sev=Info/5    IKE/0x63000045
    RESPONDER-LIFETIME notify has value of 86400 seconds
    57     09:57:04.039  09/03/12  Sev=Info/5    IKE/0x63000047
    This SA has already been alive for 2 seconds, setting expiry to 86398 seconds from now
    58     09:57:04.039  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    59     09:57:04.039  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from a.b.c.d
    60     09:57:04.039  09/03/12  Sev=Info/4    CM/0x63100015
    Launch xAuth application
    61     09:57:09.327  09/03/12  Sev=Info/4    CM/0x63100017
    xAuth application returned
    62     09:57:09.327  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to a.b.c.d
    63     09:57:09.367  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    64     09:57:09.367  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from a.b.c.d
    65     09:57:09.367  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to a.b.c.d
    66     09:57:09.367  09/03/12  Sev=Info/4    CM/0x6310000E
    Established Phase 1 SA.  1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
    67     09:57:09.387  09/03/12  Sev=Info/5    IKE/0x6300005E
    Client sending a firewall request to concentrator
    68     09:57:09.387  09/03/12  Sev=Info/5    IKE/0x6300005D
    Firewall Policy: Product=Cisco Systems Integrated Client Firewall, Capability= (Centralized Protection Policy).
    69     09:57:09.387  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to a.b.c.d
    70     09:57:09.427  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    71     09:57:09.427  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from a.b.c.d
    72     09:57:09.427  09/03/12  Sev=Info/5    IKE/0x63000010
    MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.0.1.205
    73     09:57:09.427  09/03/12  Sev=Info/5    IKE/0x63000010
    MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 4.2.2.1
    74     09:57:09.427  09/03/12  Sev=Info/5    IKE/0x6300000E
    MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = xxxx.biz
    75     09:57:09.427  09/03/12  Sev=Info/5    IKE/0x6300000D
    MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SPLIT_INCLUDE (# of split_nets), value = 0x00000001
    76     09:57:09.427  09/03/12  Sev=Info/5    IKE/0x6300000F
    SPLIT_NET #1
        subnet = 10.0.0.0
        mask = 255.0.0.0
        protocol = 0
        src port = 0
        dest port=0
    77     09:57:09.427  09/03/12  Sev=Info/5    IKE/0x6300000D
    MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000
    78     09:57:09.427  09/03/12  Sev=Info/5    IKE/0x6300000D
    MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194
    79     09:57:09.427  09/03/12  Sev=Info/4    CM/0x63100019
    Mode Config data received
    80     09:57:09.427  09/03/12  Sev=Info/4    IKE/0x63000056
    Received a key request from Driver: Local IP = 10.0.1.205, GW IP = a.b.c.d, Remote IP = 0.0.0.0
    81     09:57:09.437  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to a.b.c.d
    82     09:57:09.477  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    83     09:57:09.477  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from a.b.c.d
    84     09:57:09.477  09/03/12  Sev=Info/5    IKE/0x63000045
    RESPONDER-LIFETIME notify has value of 28800 seconds
    85     09:57:09.477  09/03/12  Sev=Info/5    IKE/0x63000046
    RESPONDER-LIFETIME notify has value of 4608000 kb
    86     09:57:09.477  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK QM *(HASH) to a.b.c.d
    87     09:57:09.477  09/03/12  Sev=Info/5    IKE/0x63000059
    Loading IPsec SA (MsgID=D70550E6 OUTBOUND SPI = 0xB335C6DA INBOUND SPI = 0xE99E1A59)
    88     09:57:09.477  09/03/12  Sev=Info/5    IKE/0x63000025
    Loaded OUTBOUND ESP SPI: 0xB335C6DA
    89     09:57:09.477  09/03/12  Sev=Info/5    IKE/0x63000026
    Loaded INBOUND ESP SPI: 0xE99E1A59
    90     09:57:09.527  09/03/12  Sev=Info/5    CVPND/0x63400013
        Destination           Netmask           Gateway         Interface   Metric
            0.0.0.0           0.0.0.0        172.16.0.1       172.16.0.11       25
          127.0.0.0         255.0.0.0         127.0.0.1         127.0.0.1        1
         172.16.0.0       255.255.0.0       172.16.0.11       172.16.0.11       25
        172.16.0.11   255.255.255.255         127.0.0.1         127.0.0.1       25
    172.16.255.255   255.255.255.255       172.16.0.11       172.16.0.11       25
          224.0.0.0         240.0.0.0       172.16.0.11       172.16.0.11       25
    255.255.255.255   255.255.255.255       172.16.0.11           0.0.0.0        1
    255.255.255.255   255.255.255.255       172.16.0.11       172.16.0.11        1
    91     09:57:10.448  09/03/12  Sev=Info/4    CM/0x63100034
    The Virtual Adapter was enabled:
        IP=10.0.1.205/255.0.0.0
        DNS=4.2.2.1,0.0.0.0
        WINS=0.0.0.0,0.0.0.0
        Domain=xxxx.biz
        Split DNS Names=
    92     09:57:10.458  09/03/12  Sev=Info/5    CVPND/0x63400013
        Destination           Netmask           Gateway         Interface   Metric
            0.0.0.0           0.0.0.0        172.16.0.1       172.16.0.11       25
           10.0.0.0         255.0.0.0        10.0.1.205        10.0.1.205       25
         10.0.1.205   255.255.255.255         127.0.0.1         127.0.0.1       25
    10.255.255.255   255.255.255.255        10.0.1.205        10.0.1.205       25
          127.0.0.0         255.0.0.0         127.0.0.1         127.0.0.1        1
         172.16.0.0       255.255.0.0       172.16.0.11       172.16.0.11       25
        172.16.0.11   255.255.255.255         127.0.0.1         127.0.0.1       25
    172.16.255.255   255.255.255.255       172.16.0.11       172.16.0.11       25
          224.0.0.0         240.0.0.0        10.0.1.205        10.0.1.205       25
          224.0.0.0         240.0.0.0       172.16.0.11       172.16.0.11       25
    255.255.255.255   255.255.255.255        10.0.1.205           0.0.0.0        1
    255.255.255.255   255.255.255.255        10.0.1.205        10.0.1.205        1
    255.255.255.255   255.255.255.255       172.16.0.11       172.16.0.11        1
    93     09:57:10.458  09/03/12  Sev=Info/4    CM/0x63100038
    Successfully saved route changes to file.
    94     09:57:10.458  09/03/12  Sev=Info/5    CVPND/0x63400013
        Destination           Netmask           Gateway         Interface   Metric
            0.0.0.0           0.0.0.0        172.16.0.1       172.16.0.11       25
           10.0.0.0         255.0.0.0        10.0.1.205        10.0.1.205        1
         10.0.1.205   255.255.255.255         127.0.0.1         127.0.0.1       25
    10.255.255.255   255.255.255.255        10.0.1.205        10.0.1.205       25
      a.b.c.d   255.255.255.255        172.16.0.1       172.16.0.11        1
          127.0.0.0         255.0.0.0         127.0.0.1         127.0.0.1        1
         172.16.0.0       255.255.0.0       172.16.0.11       172.16.0.11       25
         172.16.0.1   255.255.255.255       172.16.0.11       172.16.0.11        1
        172.16.0.11   255.255.255.255         127.0.0.1         127.0.0.1       25
    172.16.255.255   255.255.255.255       172.16.0.11       172.16.0.11       25
          224.0.0.0         240.0.0.0        10.0.1.205        10.0.1.205       25
          224.0.0.0         240.0.0.0       172.16.0.11       172.16.0.11       25
    255.255.255.255   255.255.255.255        10.0.1.205           0.0.0.0        1
    255.255.255.255   255.255.255.255        10.0.1.205        10.0.1.205        1
    255.255.255.255   255.255.255.255       172.16.0.11       172.16.0.11        1
    95     09:57:10.458  09/03/12  Sev=Info/6    CM/0x63100036
    The routing table was updated for the Virtual Adapter
    96     09:57:10.508  09/03/12  Sev=Info/4    CM/0x6310001A
    One secure connection established
    97     09:57:10.618  09/03/12  Sev=Info/4    CM/0x6310003B
    Address watch added for 172.16.0.11.  Current hostname: toughone, Current address(es): 10.0.1.205, 172.16.0.11.
    98     09:57:10.638  09/03/12  Sev=Info/4    CM/0x6310003B
    Address watch added for 10.0.1.205.  Current hostname: toughone, Current address(es): 10.0.1.205, 172.16.0.11.
    99     09:57:10.638  09/03/12  Sev=Info/4    IPSEC/0x63700014
    Deleted all keys
    100    09:57:10.638  09/03/12  Sev=Info/4    IPSEC/0x63700010
    Created a new key structure
    101    09:57:10.638  09/03/12  Sev=Info/4    IPSEC/0x6370000F
    Added key with SPI=0xdac635b3 into key list
    102    09:57:10.638  09/03/12  Sev=Info/4    IPSEC/0x63700010
    Created a new key structure
    103    09:57:10.638  09/03/12  Sev=Info/4    IPSEC/0x6370000F
    Added key with SPI=0x591a9ee9 into key list
    104    09:57:10.638  09/03/12  Sev=Info/4    IPSEC/0x6370002F
    Assigned VA private interface addr 10.0.1.205
    105    09:57:10.638  09/03/12  Sev=Info/4    IPSEC/0x63700037
    Configure public interface: 172.16.0.11. SG: a.b.c.d
    106    09:57:10.638  09/03/12  Sev=Info/6    CM/0x63100046
    Set tunnel established flag in registry to 1.
    107    09:57:19.741  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to a.b.c.d
    108    09:57:19.741  09/03/12  Sev=Info/6    IKE/0x6300003D
    Sending DPD request to a.b.c.d, our seq# = 3951445672
    109    09:57:19.772  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    110    09:57:19.772  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from a.b.c.d
    111    09:57:19.772  09/03/12  Sev=Info/5    IKE/0x63000040
    Received DPD ACK from a.b.c.d, seq# received = 3951445672, seq# expected = 3951445672
    112    09:57:30.257  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to a.b.c.d
    113    09:57:30.257  09/03/12  Sev=Info/6    IKE/0x6300003D
    Sending DPD request to a.b.c.d, our seq# = 3951445673
    114    09:57:30.297  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    115    09:57:30.297  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from a.b.c.d
    116    09:57:30.297  09/03/12  Sev=Info/5    IKE/0x63000040
    Received DPD ACK from a.b.c.d, seq# received = 3951445673, seq# expected = 3951445673
    117    09:57:40.772  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to a.b.c.d
    118    09:57:40.772  09/03/12  Sev=Info/6    IKE/0x6300003D
    Sending DPD request to a.b.c.d, our seq# = 3951445674
    119    09:57:40.802  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    120    09:57:40.802  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from a.b.c.d
    121    09:57:40.802  09/03/12  Sev=Info/5    IKE/0x63000040
    Received DPD ACK from a.b.c.d, seq# received = 3951445674, seq# expected = 3951445674
    122    09:57:54.291  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    123    09:58:04.306  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    124    09:58:14.320  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    125    09:58:24.334  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    126    09:58:34.349  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    127    09:58:41.359  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to a.b.c.d
    128    09:58:41.359  09/03/12  Sev=Info/6    IKE/0x6300003D
    Sending DPD request to a.b.c.d, our seq# = 3951445675
    129    09:58:41.389  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    130    09:58:41.389  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from a.b.c.d
    131    09:58:41.389  09/03/12  Sev=Info/5    IKE/0x63000040
    Received DPD ACK from a.b.c.d, seq# received = 3951445675, seq# expected = 3951445675
    132    09:58:54.378  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    133    09:59:04.392  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    134    09:59:14.406  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    135    09:59:24.421  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    136    09:59:34.435  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA
    137    09:59:41.946  09/03/12  Sev=Info/4    IKE/0x63000013
    SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY:DPD_REQUEST) to a.b.c.d
    138    09:59:41.946  09/03/12  Sev=Info/6    IKE/0x6300003D
    Sending DPD request to a.b.c.d, our seq# = 3951445676
    139    09:59:41.976  09/03/12  Sev=Info/5    IKE/0x6300002F
    Received ISAKMP packet: peer = a.b.c.d
    140    09:59:41.976  09/03/12  Sev=Info/4    IKE/0x63000014
    RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:DPD_ACK) from a.b.c.d
    141    09:59:41.976  09/03/12  Sev=Info/5    IKE/0x63000040
    Received DPD ACK from a.b.c.d, seq# received = 3951445676, seq# expected = 3951445676
    142    09:59:54.464  09/03/12  Sev=Info/6    IKE/0x63000055
    Sent a keepalive on the IPSec SA

  • Cisco Jabber Client for Windows 9.7 Can't Connect to Other IPSec VPN Clients Over Clustered ASAs

    Environment:
    2 x ASA 5540s (at two different data centers) configured as a VPN Load Balancing Cluster
    Both ASAs are at version 8.4(5)6
    IPSec VPN Client version: 5.0.07.440 (64-bit)
    Jabber for Windows v9.7.0 build 18474
    Issue:
      If I am an IPSec VPN user…
       I can use Jabber to another IPSec VPN user that is connected to the same ASA appliance.
       I can’t use Jabber to another IPSec VPN user that is connected to the different ASA appliance that I am connected to.
    In the hub-and-spoke design, where the VPN ASA is a hub, and the VPN client is a spoke; if you have two hubs clustered together, how does one spoke communicate with another spoke on the other hub in the cluster? (How to allow hairpinning to the other ASA)

    Portu,
    Thanks for your quick reply.
    Unfortunately, I do not have access to the ASA logs nor would I be permitted to turn on the debug settings asked for above.  I might be able to get the logs but it will take awhile and I suspect they wouldn't be helpful as this ASA supports thousands of clients, therefore, separating out my connection attempts from other clients would be difficult.
    I can, though, do whatever you want on the Linux router.  Looking over the firewall logs at the time of this problem, I don't see anything that looks suspicious such as dropped packets destined for the Windows client.
    As I said in my original post, I'm not a networking expert - by any means - but I am willing to try anything to resolve this.  (But I might need a bit of handholding if I need to set up a  wireshark andor tcpdump.)
    Thanks again.

  • Can't connect to my work exchange server 2003

    I am one of the only people in my office with a Mac and my IT dept. refuses to assist me. Therefore, I am forced to try to resolve issues myself (which is not working out).
    I have successfully sent mail through the company's outgoing mail server, but I cannot connect to the incoming mail server to receive my messages.
    On a side note: I have entourage 2004 running successfully with no problems other than the program is crippled compared to outlook on windows. I want to run Apple's Mail program but can't get working, and I'm sick of running Outlook through Parallels.
    To configure Outlook and Entourage all I need to put in is the exchange server path (and login info) and it configures the rest. So how do I know what the outgoing and incoming paths are for Apple Mail? Are they the same? I right now I have both the incoming and the outgoing set up with the same exchange server paths hwmxmsg05.hotels.ad.**.com.
    Any Ideas? Another post mentioned make sure certain things are configured on the server side? What would they be as I need to relay them to someone who knows.
    Thanks!!!
    24" iMac Mac OS X (10.4.9)

    I feel your pain. I also am a lone Mac user in an entire building full of PC robots, and the IT people haven't got a clue.
    I've been trying to get Mac mail working with the Exchange server here, but it's just not happening. I've managed to get Entourage working though, which is far from ideal but significantly better than the web-based version of Outlook that I'd been having to use up till now.
    For entourage, then yes - the incoming and outgoing servers are the same. You may need to ask your recalcitrant IT people which port numbers to use, but give it a whirl anyway.
    Best of luck,
    Boris
    UK

  • How can I locate EBS FND security java classes being referenced from packages?

    Hi All,
    I need to load few java classes in database whose methods are being called from SQL packages. For example, package FND_WEB_SEC calls methods from java class "oracle.apps.fnd.security.WebSessionManagerProc"
    Which means I need to load this class on my db for it to be used correctly.
    I am unable to locate this and few other java classes.
    Can anyone suggest where can I find these?
    Thanks,
    Ishwar

    Hi Ishwar,
    Please have a look at the forum search, as it would be of assistance..
    Forum Search: Where are Java classess
    Best Regards,

  • L7680 Can't connect via Network works fine direct connected via USB Please Help!

    Greetings All,
    I have an HP L7680 that has been having this same problem since I purchased it and the only cure that has ever worked is to completley reload Windows XP and start over which I am very tired of reloading XP to resolve a printer problem.
    This has been posted by several other people but I don't see where anyone has posted a fix.
    When I first install the printer everything usualy works fine and it runs fine for a few mionths. Then the first indicatrion of a problem is the scanner quits working. Then when I try to reinstall the software the printer does not show up.  I read and tried every solution and have spent nuerous hours with HP support to no avail.
    The printer works fine direct connected via a USB cable and it works fine with two other computers on the same network. One of the other computers has the exact same OS and is the same HP model laptop.
    I don't think the uninstall is completley removing all the files or reinstalling everything fresh when I reload. I have tried the Level 1 through 4 uninstall utility posted on HP's site and have tried all sugestions posted in this forum.
    Below is a better rundown of the problem.
    When the Scan function is called, a "Scanning" window appears, and hangs
    I have an HP Laptop with XP32 Bit software
    Once the scanning window appears it stays there forever
    Only way to clear scanning page is to terminate hpoews01.exe with Task Manager
    Scanner does not show up in Paint or Photoshop ect.
    Web Scan Does work and printer shows up using IP address.
    Scanner shows up fine on a web page
    HP support in India has been no help and now my printer is out of warranty so even less help
    Thank you,
    Dave

    I had a similar problem with my OfficeJet L7680 and here's how I fixed it.  
    18APR10 - from Dan
         I lost my L7680 network link (using CAT5 from printer to router) and could not print to it over the network.  However, I could print from a PC with a USB cable directly to the printer, but there are currently three PCs connected wireless to the network.  I think I have a viable solution for anyone with the same problem and is not related to the operating system of the PCs.
         Originally, I went to the HP site and downloaded the program for the L7680, Critical Update to Enhance Reliability of Network and USB Connectivity and Improve System Responsive....  This worked wonders until my modem and/or router went down.  I could see ink levels from my PC, scan, print, and so on.  Then I somehow lost my network connection again.  When I checked the network settings on the L7680 printer panel (Setup, 5 - Network, 1 - View Network Settings, 2 - Display Wired Settings), I noticed a different IP address than the original 192.168.1.100.  Once I figured out how to reset the printer to that one, it connected and worked as it should. 
        Here's how to reset it:  1.  Power down all devices (wired and wireless) to the router (I even disconnected the printer power cord and CAT5 cable at the printer); 2. Power down the modem and router - wait a minute or so before powering back up;  3.  Power up the modem and give it a minute or so to go through system checks, which will normally acquire a new IP address from your ISP;  4. Power up the router and let it go through its system checks; 5.  Connect the CAT5 cable from the printer to the router and power it up before you power up and connect any other computers.  This should assign the printer the first IP address from the router, which should be 192.168.1.100.  Once the printer goes through its start-up checks, you can check its assigned IP address from its panel.  6.  Power up any other PCs or devices to the router.  They should be assigned successive IP address numbers from the router.  You can check these using a browser in the PC after typing in 192.168.1.1, logging in to the router, and checking the appropriate place in the router driver/software displayed in the browser.  I was not able to reassign IP addresses in my router's driver/software to individual devices, but this method did the trick.  I did not try to change the IP address of the printer from its panel to match what had been inadvertently reassigned to it.  That might be another option to synchronize the printer and router with the same IP address.  If the printer loses its connection again, you'll have to synchronize what the printer has with what the router shows.  This worked for me.

  • Why can't I use Siri or GPS while traveling in auto? Works at home, hotels, etc.

    Why can't I use Siri or the GPS features while traveling in a vehicle? Works in home, shops,hotels, and other fixed places.

    You need to be more specific about what doesn't work. The GPS works for me in a vehicle; when used with Google Maps its far more useful than the very expensive navigation system that was factory installed in my car.

  • Can I connect on my work PC to download a podcast only?

    My iPod shares my personal music library on my home PC. I have iTunes on my work PC but I don't want to have all my music files stored there. There is, however, a podcast that I would like to download on my work PC so I can listen to it on my commute home from work. Is there someway to plug my iPod into my work PC so I can transfer the podcast onto it?

    Do you have an iPod touch with version 2.2 installed? If you do, you can download podcasts directly from the iPod itself. To do this, go to Music>More>Podcasts>the podcast that you want to download>Get More Episodes. If you don't have iPod version 2.0, 2.1 or 2.2 then you're out of luck. You can, however, upgrade your iPod touch's software to 2.2 for $10 if you have version 1.x.

  • I just upgraded to 4s and can't connect to my work wifi.  Netflix is not acknowledged and neither is my other apps that need the web.

    my games freeze after 5 minutes of play.  I've upgraded to ios 5.1 could that be the problem?  Should my roaming be on? Help

    Yeah, turn roaming on.  The work wifi issue may be a firewall.  Have you checked with your IT department?

  • Skype can't connect - most likely router problem, ...

    Lately I can't connect to Skype at home. I've tried a lot of different solutions but none of them work.
    The problem started a few months ago when I just couldn't sign into Skype (can't connect). At that time I had no change in any network settings on my computer nor my router. Interestingly enough, I could connect to Skype on Ubuntu (I have dualboot). Though even Ubuntu eventually failed to connect back then (just can't sign in) - still no changes in my network. I couldn't be bothered at the time with the problem so I just didn't use Skype.
    However after some time (some weeks or a month or two), when I tried to connect to Skype again, it worked (on Win 7 as well as Ubuntu). Again, no changes to my network have been done in the mean time (Skype might of been updated, but I doubt it was on both platforms at the same time).
    So Skype worked for a while until about a month ago, when the problem reoccurred. This time I said I'm going to get to the bottom of this so here is the situation:
    I can connect to Skype at work no problem (on my desktop as well as my Android phone)
    I can't connect to Skype at home (just won't sign in) on my desktop nor my phone
    I have tried:
    Reinstalling Skype with cleaning everything that Skype might have left behind
    Installing an (a bit) older version 6.9 (because even the latest 6.11 didn't work). Though these two attempts I've come to see are in vain once I figured out that I can't connect to Skype on my phone as well.
    Resetted my router a couple of times.
    Reset my router settings to default.
    Opened/forwarded Skype ports to my (local) IP. I even enabled DMZ to redirected all traffic to my desktop computer (although I'm not 100% sure that that worked as I imagine it should work).
    Tried some proxy settings in Skype (Connection options) I found on your forum.
    None of the above worked in any way...
    My router is a TP-Link TL-WR1043ND with (I think the latest) firmware version 3.13.13 Build 130428 Rel.58290n (hardware is v1).
    TLDR:
    I can't sign in to Skype at home. It works when I'm at work. I can connect to Skype on my phone if I'm at work (over WiFi) or if I'm on 3G, but not if I'm on my home WiFi. That said, no software firewall can be the problem here, but my router. However I have no more ideas as to what else I can try. This forum is my last hope for finding a solution.
    Please help.
    Solved!
    Go to Solution.

    I do not know the makeup of Skype's internal security policies when it comes to this as they are not too open about this. Most companies are not. These are the only reasons I believe a block would occur based off any company's security policy.
    1. A proactive measure - A blacklist of IPs is constantly obtained/updated to include anonymizer services that might harm the network.
    2. An active/counteractive measure -
    I. Someone uses an anonymizer to SPAM people on the Skype network:
    a. Users complain using the abuse option. Users get the IP Auto-banned.
    b. The company (Skype) receives the complaints or notices a trend and Manual/Auto bans the IP.
    II. Too many people (connections) sign on with the same IP (due to an exit relay/proxy). Due to this being very suspicious, (maybe even DDos-like behavior) the IP is Auto-banned.
    I tend to lean more towards the counteractive measure since I don't believe many proactive measures are needed to limit abuse. There is always at least one rotten apple that engages in illegal activity using anonymizers, proxies, etc. that ruin it for everybody. In reality I believe it is a combination/balance of the two. Not to be prejudice against anonymizers, just blacklists to protect the network from known attacks. For whatever reason once the threshold is met, the IP is banned.  If I had to guess how long it would be in intervals of 30 days (30, 60, 90, 120, etc.). The whole Internet is not going to banned so the security policies in effect can't be too strict. It's goal is probably just to limit the majority of bad behavior that causes problems for their customers.
    Skype is not the only service that reacts this way. Even ISPs will receive notices and in turn will send notices to their customer that since illegal activity (RIAA notices, etc.) is occurring due to a Tor exit relay or some other anonymizer, the ISP will terminate services with that customer if they don't cease (due to breach of contract).
    I don't know whether you can limit an exit relay so it can't be used to access Skype. It may be a lost cause. If I made the choice to run a similar service it would be with a whitelist of people I knew who wouldn't use it to perform illegal activity, just remain anonymous when online.
    You shouldn't have any issues running a non exit relay since in doing so your IP is not being broadcast all over the Internet like a calling card which an exit relay does. Changing your modem's MAC address is something you need to call your ISP for. However changing your router's MAC address generally does not require that. All that is required is a reboot of the modem, router, and possibly computer if you run into issues. You will probably continue to run into the same problem as long as you attempt to run an exit relay.
    Be aware that for every IP that get's banned on your ISP is another IP a person could get issued for 24 hours to a week + after it gets released. Some people then visit this community and complain how they can't connect when it worked not too long ago and how Skype "sucks". So sometimes things like this create a ripple effect for other customers.

  • Does Firefox have some kind of firewall??? Recently I can't print or connect to my work computer remotely. Two things I was always to do in the past.

    Recently I can't connect to my work computer remotely and I can't print things even when I am using my desktop which is directly connected to the printer. If I go to Internet Explorer or AOL I have no problems but since I mainly use Firefox this has become a major problem.

    I encounter similar problem. My TC detects my OKI printer which is connected to the TC via USB but I can't print unless I connect my printer to the TC via Ethernet. Would anyone know how to solve it. Thanks.

  • Can't connect iphone4 to wi-fi.

    Can't connect iphone4 to wi-fi. Get message either "can't connect to net work" or password not correct, even though password is tight

    I am having the same problem. Everything was fine from the time I got my phone several months ago till last week when all of a sudden my iphone will not connect to my ATT Uverse wifi service at home. The laptop is fine and the other iphones in the house connect with no problem. ATT said the problem is not on their end because the laptop and other phones are connecting to the wifi and this makes sense to me. They are sending me a new gateway anyway to see if that helps. I appreciate that effort. At the Apple store the genius bar rep told me that since my phone is connecting to the wifi elsewhere, other than at home, (though I need to check this out), the problem can't be with the phone. I'm reading online that lots of iphone users are having this same issue at the moment with not connecting to the home wifi. The rep said iphone users are always having issues and most problems are user related rather than equipment related. When I said I'd been having some equipment problems of late (hard drive and logic board replaced in an 18 month old laptop) he told me how many hard drives he's had replaced as well as other repairs. I must say, I didn't really feel heard. All the settings were reset, however, and I was hopeful with a few tips he gave me that the situation would be better at home but it is not. It's very frustrating. In certain parts of the house the phone can connect to the 3G network and in other spots it cannot. I can't get any service (or extremely slow 3G service) from the places in the house where I normally use the phone with no problem. My empathy for what you're experiencing....

Maybe you are looking for

  • How do I transfer raw files from iPad to my Mac Pro?

    I transfer RAW and JPEG files from my camera to iPhoto on the iPad using a camera connection kit. How can I copy the files from the iPad to my Mac Pro? (I need the RAW files in particular.)

  • My optical drive is broken, any other way to install OSX?

    I have my OSX discs and I was thinking about upgrading to an SSD. The issue is that one day I noticed the part where you put a CD in was dented. I do not recall dropping my Macbook at all, but it still had a dent. I initially thought no big deal. I d

  • Spotlight doesn't work

    Hi there, I have a problem with spotlight indexing. It fails on me in a number of different ways. Sometimes, when I try to reindex, it will never finish (Estimating indexing time... appears forever). Sometimes, when I try to reindex, it will never fi

  • Solution Manager Configuration

    Hi All, I want to configure Solution Manager for Support Activities and their reporting like creation of tickets by end user, resoultion time according to category. I need a documentation on the same if possible some configuration document. Help on t

  • NQSERROR :47012   ERROR

    Hi , I am getting the nQSERROR :47012 Syntax error in nqsconfig.ini file .. As per the Oracle Tutorial .... I changed the below parameter in nqsconfig.ini from Star = samplesales.rpd ,DEFAULT; Star = SH.rpd ,DEFAULT; Now when I click the Administrato