Can't see LAN

Client connects to PIX 501 but cannot see the LAN in Windows Explorer.
Devices can be pinged by IP and hostname (netbios name)
I can navagate to a server by typing in \\servername
Why can I not get a resolution from Cisco techs?
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list Axis-VPN_splitTunnelAcl permit ip 192.168.1.0 255.255.255.0 any
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.20.96 255.255.255.240
access-list outside_cryptomap_dyn_20 permit ip any 192.168.20.96 255.255.255.240
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 222.111.33.2 255.255.255.248
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool VPN-Pool 192.168.20.101-192.168.20.110
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
route outside 0.0.0.0 0.0.0.0 222.111.33.1 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup Axis-VPN address-pool VPN-Pool
vpngroup Axis-VPN wins-server 192.168.1.10
vpngroup Axis-VPN default-domain axis
vpngroup Axis-VPN split-tunnel Axis-VPN_splitTunnelAcl
vpngroup Axis-VPN idle-time 1800
vpngroup Axis-VPN password ********
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd address 192.168.1.50-192.168.1.70 inside
dhcpd dns 167.206.112.138 167.206.7.4
dhcpd wins 192.168.1.10
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain axis
dhcpd auto_config outside
dhcpd enable inside
username dentest password 2bUGX7ZnEwBHIU2J encrypted privilege 15
username cmurcha password ouqdyA3s8ZAguJYz encrypted privilege 3
terminal width 80
Cryptochecksum:7a32aa123a3b003a1f3db925164fc269
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list Axis-VPN_splitTunnelAcl permit ip 192.168.1.0 255.255.255.0 any
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.20.96 255.255.255.240
access-list outside_cryptomap_dyn_20 permit ip any 192.168.20.96 255.255.255.240
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 222.111.33.2 255.255.255.248
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool VPN-Pool 192.168.20.101-192.168.20.110
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
route outside 0.0.0.0 0.0.0.0 222.111.33.1 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup Axis-VPN address-pool VPN-Pool
vpngroup Axis-VPN wins-server 192.168.1.10
vpngroup Axis-VPN default-domain axis
vpngroup Axis-VPN split-tunnel Axis-VPN_splitTunnelAcl
vpngroup Axis-VPN idle-time 1800
vpngroup Axis-VPN password ********
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd address 192.168.1.50-192.168.1.70 inside
dhcpd dns 167.206.112.138 167.206.7.4
dhcpd wins 192.168.1.10
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain axis
dhcpd auto_config outside
dhcpd enable inside
username vpntest password 2bUGX7ZnEwBHIU2J encrypted privilege 15
terminal width 80
Cryptochecksum:7a32aa123a3b003a1f3db925164fc269

Anyone have a guess?

Similar Messages

  • Can't see LAN Apache servers.

    With any and all computers on the router, I can see any Apache servers around the LAN, but when iPhone is on WI-FI it cannot see any of them. I get a "Server stopped responding" error. I can see the one server (port mapped in the router) from outside using Edge, but not "inside the loop".
    Is this related to a fix for the early network flip-out at Duke University? Any known way to fix this? I'd like to test some web sites to see how they look on the phone during development.
    Dave.

    Well, I managed to get it working... I reset the router to wide open and it worked, and when I went back to password protection, it still worked... I don't remember now which way I set it, but my router has 2 passwords available... One that allows LAN access and one that only passes Internet through... I "may" have used the Internet only passwords when I first set up the phones. Not sure, but I'm going OK now.

  • Come Cisco! VPN can't see LAN

    I can connect and ping with netbios and DNS names, but the nothing appears in Windows Explorer. I can navagate with \\server\share, but I want this to work like Cisco says it will.
    This problm is all over Google and I need for someone to help me fix it.    This is such a common problem, surley someone at Cisco has a clue.
    Pix 501
    Win 2003 server
    Result of firewall command: "sh config"
    : Saved
    : Written by enable_15 at 18:18:27.362 UTC Tue Sep 18 2012
    PIX Version 6.3(5)
    interface ethernet0 auto
    interface ethernet1 100full
    nameif ethernet0 outside security0
    nameif ethernet1 inside security100
    enable password 8Ry2YjIyt7RRXU24 encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    hostname pixfirewall
    domain-name axis.local
    fixup protocol dns maximum-length 512
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol pptp 1723
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol skinny 2000
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    names
    access-list Axis-VPN_splitTunnelAcl permit ip 192.168.1.0 255.255.255.0 any
    access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.1.96 255.255.255.240
    access-list inside_outbound_nat0_acl permit ip any 192.168.1.96 255.255.255.240
    access-list outside_cryptomap_dyn_40 permit ip any 192.168.1.96 255.255.255.240
    access-list outside_cryptomap_dyn_60 permit ip any 192.168.1.96 255.255.255.240
    pager lines 24
    mtu outside 1500
    mtu inside 1500
    ip address outside 18.17.1.2 255.255.255.248
    ip address inside 192.168.1.1 255.255.255.0
    ip audit info action alarm
    ip audit attack action alarm
    ip local pool VPN-Pool 192.168.1.101-192.168.1.110 mask 255.255.255.0
    pdm logging informational 100
    pdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 0 access-list inside_outbound_nat0_acl
    nat (inside) 1 0.0.0.0 0.0.0.0 0 0
    route outside 0.0.0.0 0.0.0.0 18.17.1.1 1
    timeout xlate 0:05:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
    timeout sip-disconnect 0:02:00 sip-invite 0:03:00
    timeout uauth 0:05:00 absolute
    aaa-server TACACS+ protocol tacacs+
    aaa-server TACACS+ max-failed-attempts 3
    aaa-server TACACS+ deadtime 10
    aaa-server RADIUS protocol radius
    aaa-server RADIUS max-failed-attempts 3
    aaa-server RADIUS deadtime 10
    aaa-server LOCAL protocol local
    http server enable
    http 192.168.1.0 255.255.255.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server community public
    no snmp-server enable traps
    floodguard enable
    sysopt connection tcpmss 1300
    sysopt connection permit-ipsec
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
    crypto dynamic-map outside_dyn_map 40 match address outside_cryptomap_dyn_40
    crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-MD5
    crypto dynamic-map outside_dyn_map 60 match address outside_cryptomap_dyn_60
    crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-MD5
    crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
    crypto map outside_map client authentication LOCAL
    crypto map outside_map interface outside
    isakmp enable outside
    isakmp policy 20 authentication pre-share
    isakmp policy 20 encryption 3des
    isakmp policy 20 hash md5
    isakmp policy 20 group 2
    isakmp policy 20 lifetime 86400
    vpngroup Axis-VPN address-pool VPN-Pool
    vpngroup Axis-VPN dns-server 192.168.1.10
    vpngroup Axis-VPN wins-server 192.168.1.10
    vpngroup Axis-VPN default-domain axis.local
    vpngroup Axis-VPN split-tunnel Axis-VPN_splitTunnelAcl
    vpngroup Axis-VPN split-dns axis.local
    vpngroup Axis-VPN idle-time 1800
    vpngroup Axis-VPN password ********
    telnet timeout 5
    ssh timeout 5
    console timeout 0
    dhcpd address 192.168.1.50-192.168.1.70 inside
    dhcpd dns 167.206.112.138 167.206.7.4
    dhcpd wins 192.168.1.10
    dhcpd lease 3600
    dhcpd ping_timeout 750
    dhcpd domain axis.local
    dhcpd auto_config outside
    dhcpd enable inside
    username dentest password 2bUGX7ZnEwBHIU2J encrypted privilege 15
    terminal width 80
    Cryptochecksum:b781be846bfe48c0d862036291e39811

    That didn't work. I can still connect, but can't do anything now, because I'm on a differnet IP scheme then the LAN I VPN into.
    What you are telling me to do is making things worse. Before I could at least ping the remote devices.
    sh cry isa aa
    isakmp enable outside
    isakmp policy 20 authentication pre-share
    isakmp policy 20 encryption 3des
    isakmp policy 20 hash md5
    isakmp policy 20 group 2
    isakmp policy 20 lifetime 86400
    sh cry ipsec sa"
    interface: outside
        Crypto map tag: outside_map, local addr. 18.17.1.2
       local  ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
       remote ident (addr/mask/prot/port): (192.168.20.1/255.255.255.255/0/0)
       current_peer: 96.250.177.237:51207
       dynamic allocated peer ip: 192.168.20.1
         PERMIT, flags={}
        #pkts encaps: 36, #pkts encrypt: 36, #pkts digest 36
        #pkts decaps: 36, #pkts decrypt: 36, #pkts verify 36
        #pkts compressed: 0, #pkts decompressed: 0
        #pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
        #send errors 0, #recv errors 0
         local crypto endpt.: 18.17.1.2, remote crypto endpt.: 96.250.177.237
         path mtu 1500, ipsec overhead 56, media mtu 1500
         current outbound spi: 1931e19b
         inbound esp sas:
          spi: 0x2e27fda2(774372770)
            transform: esp-3des esp-md5-hmac ,
            in use settings ={Tunnel, }
            slot: 0, conn id: 3, crypto map: outside_map
            sa timing: remaining key lifetime (k/sec): (4607995/28263)
            IV size: 8 bytes
            replay detection support: Y
         inbound ah sas:
         inbound pcp sas:
         outbound esp sas:
          spi: 0x1931e19b(422699419)
            transform: esp-3des esp-md5-hmac ,
            in use settings ={Tunnel, }
            slot: 0, conn id: 4, crypto map: outside_map
            sa timing: remaining key lifetime (k/sec): (4607996/28263)
            IV size: 8 bytes
            replay detection support: Y
         outbound ah sas:
         outbound pcp sas:
    sh config
    : Saved
    : Written by enable_15 at 14:52:06.847 UTC Thu Sep 20 2012
    PIX Version 6.3(5)
    interface ethernet0 auto
    interface ethernet1 100full
    nameif ethernet0 outside security0
    nameif ethernet1 inside security100
    enable password 8Ry2YjIyt7RRXU24 encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    hostname pixfirewall
    domain-name ciscopix.com
    fixup protocol dns maximum-length 512
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol skinny 2000
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    names
    access-list Axis-VPN_splitTunnelAcl permit ip 192.168.1.0 255.255.255.0 any
    access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.1.96 255.255.255.240
    access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.20.0 255.255.255.240
    access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.20.0 255.255.255.0
    access-list outside_cryptomap_dyn_40 permit ip any 192.168.20.0 255.255.255.240
    access-list outside_cryptomap_dyn_40 permit ip any 192.168.20.0 255.255.255.0
    pager lines 24
    mtu outside 1500
    mtu inside 1500
    ip address outside 18.17.1.2 255.255.255.248
    ip address inside 192.168.1.1 255.255.255.0
    ip audit info action alarm
    ip audit attack action alarm
    ip local pool VPN-Pool 192.168.20.1-192.168.20.10
    pdm location 192.168.1.96 255.255.255.240 outside
    pdm logging informational 100
    pdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 0 access-list inside_outbound_nat0_acl
    nat (inside) 1 0.0.0.0 0.0.0.0 0 0
    route outside 0.0.0.0 0.0.0.0 18.17.1.1 1
    timeout xlate 0:05:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
    timeout sip-disconnect 0:02:00 sip-invite 0:03:00
    timeout uauth 0:05:00 absolute
    aaa-server TACACS+ protocol tacacs+
    aaa-server TACACS+ max-failed-attempts 3
    aaa-server TACACS+ deadtime 10
    aaa-server RADIUS protocol radius
    aaa-server RADIUS max-failed-attempts 3
    aaa-server RADIUS deadtime 10
    aaa-server LOCAL protocol local
    http server enable
    http 192.168.1.0 255.255.255.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server community public
    no snmp-server enable traps
    floodguard enable
    sysopt connection permit-ipsec
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
    crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-MD5
    crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
    crypto map outside_map client authentication LOCAL
    crypto map outside_map interface outside
    isakmp enable outside
    isakmp policy 20 authentication pre-share
    isakmp policy 20 encryption 3des
    isakmp policy 20 hash md5
    isakmp policy 20 group 2
    isakmp policy 20 lifetime 86400
    vpngroup Axis-VPN address-pool VPN-Pool
    vpngroup Axis-VPN dns-server 192.168.1.10
    vpngroup Axis-VPN wins-server 192.168.1.10
    vpngroup Axis-VPN default-domain axis.local
    vpngroup Axis-VPN split-tunnel Axis-VPN_splitTunnelAcl
    vpngroup Axis-VPN idle-time 1800
    vpngroup Axis-VPN password ********
    telnet timeout 5
    ssh timeout 5
    console timeout 0
    dhcpd address 192.168.1.50-192.168.1.70 inside
    dhcpd dns 167.206.112.138 167.206.7.4
    dhcpd wins 192.168.1.10
    dhcpd lease 3600
    dhcpd ping_timeout 750
    dhcpd domain axis.local
    dhcpd auto_config outside
    dhcpd enable inside
    username dentest password 2bUGX7ZnEwBHIU2J encrypted privilege 15
    username cmurcha password ouqdyA3s8ZAguJYz encrypted privilege 3
    terminal width 80
    Cryptochecksum:2e99cc37bcbfd86251743ef90668f379
    Route Details from VPN client shows:
    Local Lan Routes - blank
    Secured Routes - 192.168.1.0 255.255.255.0

  • Windows 7 Pro can't see Internet IP's after recovery from having WGA invalidate OEM license

    My Win 7 Pro receives an IP, can ping local IPs, can see right up to the internal router IP but cannot see the internet. Yes the network functions for other PCs.
    Important historical data:
    Some weeks ago my spare admin pc was rebooting after the usual monthly WAU when it failed to complete the last stages of installation of the updates (this would have been June 2014 updates.) Instead of booting normally to Windows, the system ran a bunch
    of registry change attempts and then booted to a black Windows desktop that contained the dreaded "You're a filthy pirate" message that Microsoft so gently slaps onto newly discovered Winhacks. The trouble is my Gigabyte/AMD powered barebones box
    was purchased, by ME, from TigerDirect.ca WITH an OEM Windows 7 Pro bundle. Now I should point out that I have suspected the Seagate Barracuda that was included with this machine as being a little off as the machine would occasionally freeze up or reboot itself.
    Instead of putting up with this HDD any longer, I ghosted the fractured build off of the Seagate and onto a new WD Caviar Black. On first boot the system seemed to work but the "pirate" message was still there. I then attempted to go through the
    recovery wizard and fix my license issue. The wizard failed and advised that the installation was corrupt and that I should reinstall. I reinstalled (not scratch installed) Windows and was rewarded by a successful install  minus the activation. I proceeded
    to phone the MS automated attendant and successfully activated my installation. I have a functioning network card but can only see LAN stuff. What the deuce? Gigabyte GA-M68MT-S2 with  AMD Phenom II X6 1045T.

    You can try this:
    From administrative account, go to start, type cmd, press Ctrl+Shift+Enter. Click Yes, if UACD prompots. Now, type the following command and restart the PC:
    netsh winsock reset
    After restart, check internet connectivity.
    Balaji Kundalam

  • New iMac can't see Laserwriter Select connected to a PC on same LAN-- why?

    I've just returned to the Mac universe after a five year hiatus. When I discovered how well Macs play with PCs and Unix these days, I decided to come back.
    There's just one issue: I can't print to my Laserwriter Select 360, connected by parallel port to a Windows XP Pro PC on my LAN. My new iMac doesn't see the printer at all. The imac does see the PC's workgroup in the Network Neighborhood, and I can mount the shared volumes of that PC on the mac with no problem, so the Mac can talk to the PC for filesharing, anyway. (smb:// address used)
    Applecare has no clue why I can't see the printer. They told me to turn on Windows Sharing and Print Sharing, but that had no effect. The Windows machines on my LAN can all see and print to the shared Laserwriter Select 360, no problem. They're all running Windows XP pro, latest patches.
    The iMac of course has the latest Tiger. All machines are on my internal subnet 192.168.0.*.
    I just got a new cartridge for the Laserwriter, and there's no reason to retire it-- that printer works great. I just can't believe/accept that the iMac can't be made to print to an Apple printer! (Also, I've heard that appletalk->ethernet bridge solutions are flaky so that's not an ideal route).
    Any/all ideas welcome.
    imac g5   Mac OS X (10.4.3)  

    Here's the result. The PC is on 192.168.0.2, and the iMac was assigned .18 by DHCP.
    I just tried adding a lexmark printer to the PC (over USB) to see if there might be some difference. The other windows box on the lan sees the LexMark same as it sees the Laserwriter (and both show up in the output of smbclient below). Needless to say, the iMac doesn't see the LexMark either.
    Thanks for your help with this one...
    will-kesslers-imac-g5:~ willkessler$ smbclient -NL 192.168.0.2
    Domain=[WILLPC] OS=[Windows 5.1] Server=[Windows 2000 LAN Manager]
    Sharename Type Comment
    My Documents Disk
    IPC$ IPC Remote IPC
    print$ Disk Printer Drivers
    SharedDocs Disk
    AppleLas Printer Apple LaserWriter Select 360
    Downloads Disk
    My Pictures Disk
    ADMIN$ Disk Remote Admin
    C$ Disk Default share
    Printer Printer Fax via eFax 3.5
    LexmarkX Printer Lexmark X63
    session request to 192.168.0.2 failed (Called name not present)
    session request to 192 failed (Called name not present)
    Domain=[WILLPC] OS=[Windows 5.1] Server=[Windows 2000 LAN Manager]
    Server Comment
    Workgroup Master
    --------- -------

  • Network can't see my Mac after upgrading to Mountain Lion 10.8.2

    After upgrading to ML 10.8.2 (coming from Lion), the network (another mac and an iPad) can't see my Macbook-pro.
    Using a network scanner (Fing on iPad), my Macbook is not there, and in the same way all the other services from Macbook-pro (such as Internet sharing, Filemaker sharing, ...) don't work.
    My Macbook-pro is regularly connected to the right network and has a proper IP address (192.168.1.32 with 192.168.1.1 being the router, ...33 the other mac and so on). Also, my Macbook-pro perfectly reaches both other LAN devices and the internet.
    I've tried disabling Firewall but nothing changed. I havn't got any antivirus nor security programs running.
    Anyone experiencing the same issue?

    Please read this whole message before doing anything. This procedure is a diagnostic test. It’s unlikely to solve your problem. Don’t be disappointed when you find that nothing has changed after you complete it. The purpose of this test is to determine whether your problem is caused by third-party system modifications that load automatically at startup or login. Disconnect all wired peripherals except those needed for the test, and remove all aftermarket expansion cards. Boot in safe mode* and log in to the account with the problem. The instructions provided by Apple are as follows: 
    Shut down your computer, wait 30 seconds, and then hold down the shift key while pressing the power button.
    When you see the gray Apple logo, release the shift key.
    If you are prompted to log in, type your password, and then hold down the shift key again as you click  Log in.
     *Note: If FileVault is enabled under OS X 10.7 or later, or if a firmware password is set, or if the boot volume is a software RAID, you can’t boot in safe mode. Safe mode is much slower to boot and run than normal, and some things won’t work at all, including wireless networking on certain Macs. The login screen appears even if you usually log in automatically. You must know your login password in order to log in. If you’ve forgotten the password, you will need to reset it before you begin. Test while in safe mode. Same problem? After testing, reboot as usual (i.e., not in safe mode) and verify that you still have the problem. Post the results of the test.

  • Can't see Windows 7 PC's from Mac on home network

    Same exact problem as this person...
    http://discussions.apple.com/thread.jspa?messageID=11492672
    Any help appreciated. Thanks -Frank

    frankencat wrote:
    Same exact problem as this person...
    http://discussions.apple.com/thread.jspa?messageID=11492672
    Any help appreciated. Thanks -Frank
    I think the other person can't see his Mac, you appear to not be able to see your Windows PCs. Did you set up sharing on the Windows PCs? How is your LAN set up? Describe your connections and equipment.

  • How can I see the PC on my local network

    How can I see the PC on my local network. With Leopard installed I see the others Mac on the network but ot the PC. But the PC see me. What happen and How I can resolve that.

    Have you tried connecting to the PC via the Finder's "Connect to Server…" and used the IP address?
    It would be smb://server.ip.address/sharename
    Do you have the workgroup set up in the network preferences for the service that you are connected to your LAN with.
    There is also a problem on Leopard where the workgroup doesn't stay set, so if that is the case, you need to duplicate the service (ethernet, airport, etc) and use the duplicate. You can then remove the original.

  • Can't see buddy

    I'm just starting ichat. Got signed up, can log in etc, picture and sound work fine. At this stage only have 1 buddy. He can invite me to video chat - it rings, I accept everything works fine. But, when I log in, my buddy list is grayed out, and I cannot invite him to chat. I created him in buddy list, but I still can't see him and cannot initiate a chat. I told him my log in info (he is in a different country) he logs in as me and can see the buddy list, but I can't. The only difference seems to be that I am using Airport Extreme router and he is just on internet direct via modem. Could the router be the problem. When I first tried to get on, I had to enable appletalk to make iChat work, so that is done.

    Interesting one.
    At iChat 4 in Leopard (10.5.x) or higher a Buddy (Or you ) can set them selves to Invisible.
    Sending your details to your Buddy should eliminate this if he has his Own regular Buddy List Open as he would still s"see" himself as Off Line.
    Next is you may have added him as An AIM Name when he is @mac. com or @me.com as you have to choose when adding a Buddy in iChat 4
    Now as above as he can "See" himself in your Buddy List this does not seem to apply.
    Nor would if you had Blocked him in iChat > Preferences > Accounts > Block Specific People > Block list or the two Allow Buddy List Only or Allow Specific People as these setting are passed to the AIM servers and those Buddies are Flagged so that they work when you log in somewhere else (as passing your details over has done).
    Now iChat does login to the aIM servers on port 5190 using the TCP Protocol by default.
    iChat also uses this port on the UDP Protocol, mainly for File Sharing and Group chats but also for Some Buddy List feedback.
    Changing the port to get around some routing devices that don't like using the port Twice will only work if port 5190 is Open on the UDP Protocol if its is open and the PRotocol has to be Specified in any Routing device.
    Defcom is right that the Mac Firewall is the logical place to Start making sure iChat is allowed through any and all firewall settings.
    It is in System Preferences > Security > Firewall
    Allow All and Allow Specific apps with iChat added to the list are the ones that work. (iChat is NOT an Essential App).
    (In the Advanced Button, Stealth should not be On as it interferes with A/V chats)
    In the Airport Extreme (Accessed with Airport Utility in Applications/Utilities) the Internet pane has a NAT Tab.
    In here is Port Mapping Protocol.
    This should be ON/Enabled.
    I would ask if your Modem routes ?
    If so is the Extreme set to Bridge (Off) Mode in the Internet Pane so that the Extreme is just a Wireless access Point to the LAN created by the Modem ?
    9:40 PM Friday; January 29, 2010
    Please, if posting Logs, do not post any Log info after the line "Binary Images for iChat"

  • Can "they" see what sites I'm connecting to?

    I connect to the internet on my MBP through airport extreme which is connected to a LAN. My question is, can the LAN admins or ISP providers or ANYONE who's in "charge" up there see exactly what sites and pages I have browsed to? I know they can see whether or not I'm connected and using the internet, but how much can "they" see exactly?
    I have my firewall enabled as well as firewall logging, blocking udp traffic (whatever that is) and stealth mode. Just curious... I guess I'm a bit paranoid!
    Thanks for your help.

    Ehlimana,
    I was a system administrator in a computing lab. We were up to our ears (and a few other body parts!) in computers. We created an inventory database of all our computers and then I created a system that would query the main switch for the company and retrieve all the MAC numbers of computers using our network.
    When someone connected an unauthorized computer on our network, within a few seconds I would have a window on my desktop computer showing me the computer's MAC number, IP address and what jack they were plugged into, and a small map showing me which cube the person was sitting in inside the building. If it was through our wireless node, I still had their MAC number.
    With that, I had several tools at my disposal with which I could use to find out what they were doing and look at the sites they were visiting. Even if their packets were encrypted, I could still see what site they were visiting.
    Not only that, we also had access to the logs, so even if someone was authorized, we could still go through the logs and see who was looking at what.
    The point is, whoever owns the network can pretty much see anything they want to see on the network. If you want to keep your surfing private, do it at home on the network you own. And always make sure you have all your security precautions in place!

  • Satellite A200 can't see wifi

    Hello,
    I meet strange problem, till now my wifi has working good, but today, i don't know why, my laptop can't see any wireless networks, like the antenna was turn off. Of course it is on, i see orange light that signalize that. I try to reinstall drivers, but it didn't help.
    LAN is working.
    My computer: Satellite A200 1M4, Windows XP Professsional SP 2

    First of all you should check if the WLan card is still recognized in the device manager.
    If yes -> you could still try to remove and to update the WLan driver.
    Furthermore reset the WLan router. The router reset is necessary and mostly it solves some strange connectivity problems.
    Last but not least use the FN+F8 key combination to enable the WLan antenna

  • Windows 7 can't see USB disk (WD Passport) on Airport Extreme

    I am needing some help. I just bought an Airport Extreme and everything is working but I can't see my files on the USB external drive from the Airport Extreme. I can see the drive inside of the Airport Utility but not over the network on my laptop.
    My laptop is Windows 7.
    I read somewhere that I may need to reformat my WD Passport but how do I do that in windows 7 and will I lose my files on the drive if I do this?
    THANK YOU SO MUCH for helping me!

    There are a number of posts related to issues between Windows 7 and AirPort Disks. Two potential solutions being forwarded are: 1) Changing the LAN Manager authentication level, and/or 2) Disabling the Windows Search feature.
    To change the LAN Manager authentication level:
    o From the Vista desktop, click Start
    o Search for: security
    o Click 'Local Security Policy'
    o Goto Local Policies > Security Options
    o Under Policy, double-click 'Network security: LAN Manager authentication level'
    o Change level to: Send LM & NTLM responses
    o Under Policy, double-click 'Network security: Minimum session security for NTLM SSP based (including RPC) clients'
    o De-select 'Require 128-bit encryption'
    o Click OK
    To disable Windows Search:
    o Start > Control Panel > Programs > Programs & Features
    o On the right-hand side, click "Turn Windows features on/off"
    o Scroll down, and de-select "Windows Search".
    o Press OK, close all windows and restart.
    A third "solution," that has worked for me, is verify that both the AirPort Extreme Base Station (AEBS) and the Win7 PC are using the exact same Workgroup Name. In my case, I use "WORKGROUP" (without the quote marks) for this name.
    On the AEBS, you would enter this value on the Disks > File Sharing tab.
    On Win7, Start > Control Panel > System and Security > System > Change Settings > Change > Workgroup

  • Can't see printer or shares when connected via Internet Sharing

    I recently switched from a 2006 to a 2008 Mac Pro. Rather than do a migration I simply took the hard drives from the old machine and put them in the new one.
    I then upgraded to Mountain Lion.
    I use Internet Sharing to share my Mac Pro's Ethernet connection via wifi, but the other Macs can't see the Mac Pro's printer or shares when connected in this way. They can access the internet. If I connect a machine via the LAN rather than Internet Sharing, the shares and printer are visible.
    This worked fine on Lion on the old machine. Any ideas?

    Seems that the issue is something to do with connecting via WPA2. When I set Internet Sharing to use WEP (by option-clicking the security menu), I'm then able to see the network shares and the printer.

  • Xp box can only see 1 mac on wireless...

    I hope im in the right section....?
    My set up:
    1 MacBook Pro (my work laptop)
    1 iMac 24 (shared printer, iTunes lib)
    1 PC with XP (partners work laptop)
    All connected via wireless
    My iMac has a printer connected and contains the shared iTunes library. The house is fully wireless all of the machines can all see each other, however.
    The XP PC can only see the iTunes library and able to print (via) bonjour when using ethernet into the wireless router. When I disconnect the PC from the ethernet and go wireless it can see the shared library in iTunes but I get a message about firewalls on each side being on or off and the printer won't print although it is seen when setting up the printer in Bonjour for Windows.
    The XP PC can however see and play the iTunes library on my MacBook without a problem on both wireless and wired. But only on when wired does XP PC see the iMac24 and works ok.
    Can anyone help...? Is the problem with the iMac24 or the wireless router..? I'm confused
    Many thanks
    Derek

    it's the combination wireless+windows XP XP has trouble using it often my computers are connected to a WAN but via a LAN and then I can make a connection with the WAN via a Vista PC directly doesn't work

  • Can't see printers on TC

    I have a TC connected by ethernet cable to my main wireless Linksys router. The first iMac is attached to it via ethernet cable. The second iMac ws just added and is attached to the Linksys router via ethernet cable. There is an HP Laserjet 5M attached to a LAN port on the TC. There is also a USB color printer attached to the USB port on the TC. The new iMac can not see the HP Laserjet 5M at all. It can see the USB printer just fine. Thinking two routers may cause some unusuall things to happen on the network, I decided to set the TC as a bridge. When I set it in this manner I get the following error:
    "Advertising a service globally using Bonjour requires a global hostname."
    In order to get Time Machine running again and network operations back to some degree of capability, I have rolled the 7.6.3 firmware back to 7.6.1.
    It appears I can't share an ethernet capable printer on the network with the TC as a router or as a bridge. Do I need to throw it out and get some real network equipment? I hope to stay the course but am losing patience with Apple. Is there anyway to get access to my printer using a TC?
    Thanks in advance for any help you can provide.
    Cy

    Your assumption is correct, it is not possible to have everything connected to the Linksys. I think there may be a misunderstanding. The original and current setup in play is that the TC is set to join the current (Linksys) wireless network.
    This is your problem.. I thought you had ethernet connection..
    You have used join a wireless network.. TC does not change to router.. it changes to nothing much of anything client mode.. In other words, the TC is now a dumb client of the Linksys.. ethernet is turned off.
    HP        169.254.111.121
    Mac1     169.254.215.89
    Hence these are self generated IP addresses. Not allocated by Linksys or TC.
    You simply cannot mix apple and non-apple routers in this way.. apple wireless bridge is only for other apple apple routers.
    You must connect the two devices by ethernet or ethernet equivalent.. like Homeplug (EOP adapters).
    Or you must buy another apple router to introduce it as a WAP plugged by ethernet into the linksys to make the wireless bridge to the TC.

Maybe you are looking for