Come si fa a ristabilire i privilegi su un disco di backup

non riesco ad aprire le mie cartelle sul mo disco di backup mentre mia mogli sulla sua parte del computer si.
devo fare notare che per ubn cambio di hard disck internè stato reinstallato il sistema operativo.
ora sto provando a rigenerare i permessi facendo tale operazione:ho cliccato sull'icona del hard disck esterno poi sono andato su archivio e ho cliccato su ottieni informazioni,fatto ciò ho cliccato sul lucchetto aprendolo e poi sul simbolo dell'ingranaggio selezionando l'opzione estendi i permessi a ttti gli elementi del disco.
ora stò attednedo ma è più di 3 ore che lavora è normale?

Ho un problema. Ieri ho installato windows 8 (o 8.1 non so) sul mio iMac (27 pollici di fine 2013) con OS Yosemite, solo che adesso ogni volta che lo accendo si avvia windows e non ho alcuna idea di come fare a usare OSX.
There are two methods to switch to OSX.
1. Shutdown your iMac. Start up your iMac and hold the Alt/Option key and select OSX.
2. If you have Bootcamp drivers installed on the Windows side, then
     a. Use Control Panel -> System -> Boot Camp and select OSX to boot from.
     b. Use System Preferences -> Startup Disk to switch to Windows.
     Please also see Boot Camp: Impostare il sistema operativo di default.
Per installare windows ho usato bootcamp seguendo la guida di Apple. Ho comperato anche il CD con il codice ma non servito penso, ma dice comunque che windows deve essere attivato (solo che il codice non funziona).
A Retail Windows version requires activation. It has a 25-character Product Key. If Online Activation does not work, it can also be done by calling Microsoft activation number.
Ho scaricato il file windows da internet e praticamente non ho dovuto usare il disco. Ho anche provato a scaricare il piu recente bootcamp da mettere su windows ma non me lo apre.
From Boot Camp Support Software 5.1.5640
System Requirements
MacBook Air (11-inch & 13-inch, Mid 2013)
MacBook Pro (Retina, 13-inch & 15-inch, Late 2013)
Mac Pro (Late 2013)
iMac (21.5-inch & 27-inch, Late 2013)
Windows 7, Windows 8, and Windows 8.1, 64 bit
You can down load it to a USB2 Flash drive (which will be erased) and then switch to Windows and run setup.exe in the Bootcamp folder.

Similar Messages

  • How to fix podcast privileges when using time machine backup on another mac

    hello,
    my imac broke down the other day and is now at the menders. i had been using time machine with a LaCie 500gb external hard drive.
    i am now using my macbook pro as a substitute and want to use the itunes library from my LaCie instead of copying everything over again. I have managed to achieve this by changing the library destination in itunes preferences. However, when i try to "get" the latest podcasts that usually subscribe to, it says "you do not have enough access privileges for this operation". similarly, when i try to buy anything from the itunes store, it will not let me download, giving me an error 5000 message instead. i had signed in correctly by the way. the purchased songs are still in the downloads folder but greyed out.
    any advise would be much appreciated. i'm not that technically minded so please spell anything out to me!

    johndave, did anyone ever respond to your post?

  • Import error IMP-00017 and ORA-01950 no privileges on tablespace

    Hi,
    I am trying to do a full import into a 10.2.0.4 database from a 9.2.0.6 export dumpfile. The tablespaces have already been pre-created. I got this error on one tablespace, and I can't figure out why because I was using SYS to do import, how come SYS doesn`t have this privilege. All objects in other tablespaces were created without this problem.
    - IMP-00017: following statement failed with ORACLE error 1950:
         "CREATE TABLE "FYAERLG" ...
    - ORA-01950: no privileges on tablespace 'INFOTABLES'
    Please help.
    Thanks
    -lixidon

    Who is the owner of "FYAERLG" ?
    Try granting the owner of the table, quota on INFOTABLES tablespace.
    **Added**
    Note [95554.1|https://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=95554.1] explains a scenario,which could be the reason for this failure.
    Edited by: Bobcatalog on Jan 8, 2009 12:49 PM

  • Line console password vs privilege mode enable secret

    Hi all,
    Below is my running config ->
    line con 0
    exec-timeout 0 0
    privilege level 15
    password cisco
    logging synchronous
    login
    q1) how come every time i will enter privilege mode once i enter the console password ? can I choose to enter normal user mode instead ? is it via setting the privilege level ?
    q2) I understand that for enable privilege mode, i can set secret/encrypted password for the enabling.
    R1#config t
    R1(config)#enable secret cisco
    Where does the encryption take place ? is it only to just md5 the password text in the configuration file only ?  if i were to sniff the password over the network, i will still see clear text "cisco" ?
    q3) Why can't i do so (setting secret/encrypted) password for line (vty,con etc) login ?
    q4) for q3, after google, i realize i need to issue service password-Encryption
    a) does this command "encrypt" again my current enable secret password ? -- i think its no cause i see no changes in show run
    b) why do we have to issue this command to encrypt my line,vty etc password ? why can't we use the "secret" command ?
    c) what the different between this "service password-Encryption" and "secret" ?  why do we need to have both ?
    q5) is all the service password-Encryption, enable secret etc, just basically hashing or encrypting the actual text password in the config file. is there anyway of encryption over the network ?
    Thanks,
    Noob

    a) why vty, console line cannot have hashed password like enable secret ? -- the only way to use secret is to have login local and create local username with secret password
    Because they can't, its as simple as that really.
    Like you said, the only way to protect the password using an MD5 hash is to create a username and password and ensure you use the secret command like:
    username admin secret password
    b) is all the service password-Encryption, enable secret etc, just basically hashing or encrypting the actual text password in the config file. is there anyway of encryption over the network ? 
    Its just using an MD5 hash
    Where its encrypted or not over the network will depend on whether you use Telnet or SSH to connect to the switch.
    Telnet is plain text so even using an MD5 password will still be visible if someone were to packet capture your telnet session.
    SSH in encrypted so use this whenever possible. 

  • Brbackup error ; ORA-01031: insufficient privileges

    Hi Experts,
    We are getting following error when to try to backup our database ;
    BR0301E SQL error -1031 at location BrSapTspList-8, SQL statement:
    'PREPARE stmt_1 STATEMENT FROM'
    'SELECT TABSPACE FROM "SAPSR3".TSORA UNION SELECT INDSPACE FROM "SAPSR3".TSORA ORDER BY 1'
    ORA-01031: insufficient privileges
    BR0056I End of database backup: bebakpth.ant 2009-07-16 10.54.47
    BR0280I BRBACKUP time stamp: 2009-07-16 10.54.47
    BR0054I BRBACKUP terminated with errors
    How can we fix it,
    Regards

    Dear atakan yavuz
    i have faced this issue and fix the issue.
    After executing Oracle sapdba_role.sql which is provided in sapdba_role_ora10.SAR from SAP Note: Note 134592 - Importing the SAPDBA role (sapdba_role.sql)
    Please execute manaully from sql prompt below statemets to assign the privileges to the owner SAPSR3 for the following tables which will fix the issue.
    grant ALL on SAPSR3.SDBAH to sapdba;
    grant ALL on SAPSR3.SDBAD to sapdba;
    grant ALL on SAPSR3.DBAML to sapdba;
    grant ALL on SAPSR3.DBARCL to sapdba;
    grant ALL on SAPSR3.DBAFID to sapdba;
    grant ALL on SAPSR3.DBAEXTL to sapdba;
    grant ALL on SAPSR3.DBAREOL to sapdba;
    grant ALL on SAPSR3.DBABARL to sapdba;
    grant ALL on SAPSR3.DBADFL to sapdba;
    grant ALL on SAPSR3.DBAOPTL to sapdba;
    grant ALL on SAPSR3.DBASPAL to sapdba;
    grant ALL on SAPSR3.DBABD to sapdba;
    grant ALL on SAPSR3.DBABL to sapdba;
    grant ALL on SAPSR3.DBATL to sapdba;
    grant ALL on SAPSR3.DBAOBJL to sapdba;
    grant ALL on SAPSR3.DBAPHAL to sapdba;
    grant ALL on SAPSR3.DBAGRP to sapdba;
    grant ALL on SAPSR3.DBAERR to sapdba;
    grant ALL on SAPSR3.DBATRIAL to sapdba;
    grant ALL on SAPSR3.DBSTATC to sapdba;
    grant ALL on SAPSR3.DBSTATTORA to sapdba;
    grant ALL on SAPSR3.DBSTATIORA to sapdba;
    grant ALL on SAPSR3.DBSTATHORA to sapdba;
    grant ALL on SAPSR3.DBSTAIHORA to sapdba;
    grant ALL on SAPSR3.DBMSGORA to sapdba;
    grant ALL on SAPSR3.DBCHECKORA to sapdba;
    grant ALL on SAPSR3.MLICHECK to sapdba;
    grant SELECT on SAPSR3.TGORA to sapdba;
    grant SELECT on SAPSR3.IGORA to sapdba;
    grant SELECT on SAPSR3.TSORA to sapdba;
    grant SELECT on SAPSR3.TAORA to sapdba;
    grant SELECT on SAPSR3.IAORA to sapdba;
    grant SELECT on SAPSR3.SVERS to sapdba;
    grant SELECT on SAPSR3.CVERS to sapdba;
    grant SELECT on SAPSR3.DD02L to sapdba;
    grant SELECT on SAPSR3.DD09L to sapdba;
    grant SELECT on SAPSR3.DDNTT to sapdba;
    grant SELECT on SAPSR3.DDART to sapdba;
    grant SELECT on SAPSR3.DARTT to sapdba;
    grant SELECT on SAPSR3.DBCHK to sapdba;
    grant SELECT on SAPSR3.DBDIFF to sapdba;
    grant ALL on SAPSR3.SAPLIKEY to sapdba;
    grant SELECT on SAPSR3.RSNSPACE to sapdba;
    grant SELECT on SAPSR3.RSPSPACE to sapdba;
    The cause is sapdba role script existing owner is SAPR3 but from SR3 release default owner is SAPSR3 so which is causing this issue so when grant the above tables to the SAP DB owner SAPSR3 where they can access the tables.The similar issue you will when you try to execute DBCheck also and even saplicense shows no valid license found.
    Me too searching for Oracle 10.2.0.4 SAP SR3 release sapdba role in service market place which i am unable to find waiting for update from sap suppport.
    Update in this thread after this action whether your issue has been solved.I
    Best Regards,
    Venkata.
    Edited by: babjipvr on Jul 22, 2009 6:25 PM
    Edited by: babjipvr on Jul 22, 2009 6:31 PM

  • Lost all contact info.  All my Aps are there but all the data/progress is missing.  When I plug my iphone into the usb fto synch up with my itunes on the computer a message comes up and says "enter the password to unlock your

    Lost all contact info.  All my Aps are there but all the data/progress is missing.  When I plug my iphone into the usb fto synch up with my itunes on the computer a message comes up and says "enter the password to unlock your iphone backup file".  This is very frustrating

    I suggest trying the update again after an hour or two.  Sometimes, the notice that an update is available comes an hour or two before the developers actually sends the revised app out to be downloaded.

  • Iphone with new com, does it backup my contacts?

    Nikki hi, i bought new imac and my iphone has never been plugged on this com, itunes wants to format my iphone but does it do backup for my contacts before it? So if i format my iphone and i want to get my phone numbers back.

    You don't select Import for the Address Book app and for iCal on your Mac.
    Manually enter one contact in the Address Book and one calendar event in iCal on your Mac. Make this up if needed, which can be deleted later. This will provide a merge prompt with the first sync for this data, which you want to select. Syncing contacts with the Address Book and calendars/calendar events with iCal on your Mac is selected under the Info tab for your iPhone sync preferences with iTunes.

  • Privileges for backup

    I'd like to setup a role for running backups in UCS.  What exact privileges are needed to run backups?

    The "Operations" role does not have access to backup or restore config.  Currently only the "Admin" role has access to these operations.
    Regards,
    Robert

  • 8130 camera comes on and takes pictures constantly

    I have an 8130 series Pearl, and for the past couple of days I've had the problem where instead of my screen going black (sleep mode) after it's been sitting idle for 30 seconds, it switches to the camera and starts taking pictures about every 30 seconds. It takes pictures constantly while I'm on the phone (I've even deactivated the right side button so I know I'm not hitting anything accidentally) and if I shut off the phone completely, it will not power on with the red button unless I remove and replace the battery. 
    I was previously an alltel client but they've switched to Verizon, so I'm not sure what to do from here.
    I don't know how to wipe the OS and reload it - is my only option from here to go into a store and have them look at it?

    Hello CrowScraps,
    Welcome to the BlackBerry Support Community Forums.
    In this case we can try to reload the software on the BlackBerry smartphone to make sure it is running the latest version and there are no issues with the OS.
    To do this we would need to back up the BlackBerry smartphone. Please open the BlackBerry Desktop Manager and connect your BlackBerry smartphone. Click on the Backup and Restore button and select Back Up. Please note the location where the backup is being saved as we will need to access it later to restore the BlackBerry smartphone.
    Once you have backed up your BlackBerry smartphone please follow the link below to complete a clean reload of the BlackBerry smartphone software.
    Link: http://www.blackberry.com/btsc/KB11320
    Test the BlackBerry smartphone prior to restoring the backup.
    Thank you
    -DrP
    Come follow your BlackBerry Technical Team on Twitter! @BlackBerryHelp
    Be sure to click Kudos! for those who have helped you.
    Click Solution? for posts that have solved your issue(s)!

  • Not able to import the data in OBIEE 11g

    Hi Gurus,
    I had just build a new development instance from scratch.
    Q1) I am getting database connnection error on the Dashboard and when i tried to update row count from physical layer it also throws me an error, as i test i tried to import but i also got an error " The connection has failed", i am able to connect thru SQL Developer. Where does OBIEE 11g look for the tnsnames.ora file.
    Q2.) Where and what setting do i need to so that i can add the users in the application roles by searching them in the EM, means the LDAP users. I had gone thru most of the stuff in the web but could not get thru.
    Regards,
    Amit

    Ans 1. This is one of the most commonly asked questions on the Forum. I hope you'd search through available posts on the Forum before creating a new discussion. In any case, this might help: http://123obi.com/2011/03/error-the-connection-has-failed-in-obiee-11g/
    Ans 2. Have you set up the integration with the LDAP provider or are you looking for help with that too? These should help:
    http://docs.oracle.com/cd/E21764_01/bi.1111/e10543/privileges.htm
    http://www.rittmanmead.com/2012/03/obiee-11g-security-week-understanding-obiee-11g-security-application-roles-and-applic…
    http://www.rittmanmead.com/2012/03/obiee-11g-security-week-managing-application-roles-and-policies-and-managing-security…

  • IMac Model 2012 makes restart after sleep and after shutdown ?!

    Hello Communities ,
    my iMac Model 2012 i5 / 16 Gb RAM , does not go shut down ! it makes a restart , the same when  it go to sleep ?
    When i shut down , the iMac goes down .... then ca. 10 sek. after them it starts self again !!!!
    What i have do :
    -    all power .pls   in Library deletet
    -     PRAM reset
    -     SMC reset
    -     all USB device plug out
    -     a new Admin account
    -     check filesystem
    -     start up in safe mode
    here .log file ....                                can anyone help me ?
    thx very much .... roger
    {\rtf1\ansi\ansicpg1252\cocoartf1187\cocoasubrtf390
    {\fonttbl\f0\fswiss\fcharset0 Helvetica;}
    {\colortbl;\red255\green255\blue255;}
    \paperw11900\paperh16840\margl1440\margr1440\vieww38300\viewh24840\viewkind0
    \pard\tx566\tx1133\tx1700\tx2267\tx2834\tx3401\tx3968\tx4535\tx5102\tx5669\tx623 6\tx6803\pardirnatural
    \f0\fs24 \cf0 14.07.13 17:27:49.000 syslogd[299]: --- syslogd restarted ---\
    14.07.13 17:27:49.444 com.apple.launchd[1]: (com.apple.aslmanager) Throttling respawn: Will start in 10 seconds\
    14.07.13 17:27:49.459 com.apple.launchd[1]: (com.apple.aslmanager) Throttling respawn: Will start in 10 seconds\
    14.07.13 17:27:49.545 com.apple.launchd[1]: (com.apple.aslmanager) Throttling respawn: Will start in 10 seconds\
    14.07.13 17:28:26.000 bootlog[0]: BOOT_TIME 1373815706 0\
    14.07.13 17:28:45.000 kernel[0]: PMAP: PCID enabled\
    14.07.13 17:28:45.000 kernel[0]: PMAP: Supervisor Mode Execute Protection enabled\
    14.07.13 17:28:45.000 kernel[0]: Darwin Kernel Version 12.4.0: Wed May  1 17:57:12 PDT 2013; root:xnu-2050.24.15~1/RELEASE_X86_64\
    14.07.13 17:28:45.000 kernel[0]: vm_page_bootstrap: 3877659 free pages and 283877 wired pages\
    14.07.13 17:28:45.000 kernel[0]: kext submap [0xffffff7f80737000 - 0xffffff8000000000], kernel text [0xffffff8000200000 - 0xffffff8000737000]\
    14.07.13 17:28:45.000 kernel[0]: zone leak detection enabled\
    14.07.13 17:28:45.000 kernel[0]: standard timeslicing quantum is 10000 us\
    14.07.13 17:28:45.000 kernel[0]: standard background quantum is 2500 us\
    14.07.13 17:28:45.000 kernel[0]: mig_table_max_displ = 74\
    14.07.13 17:28:45.000 kernel[0]: TSC Deadline Timer supported and enabled\
    14.07.13 17:28:45.000 kernel[0]: corecrypto kext started!\
    14.07.13 17:28:45.000 kernel[0]: Running kernel space in FIPS MODE\
    14.07.13 17:28:45.000 kernel[0]: Plist hmac value is    735d392b68241ef173d81097b1c8ce9ba283521626d1c973ac376838c466757d\
    14.07.13 17:28:45.000 kernel[0]: Computed hmac value is 735d392b68241ef173d81097b1c8ce9ba283521626d1c973ac376838c466757d\
    14.07.13 17:28:45.000 kernel[0]: corecrypto.kext FIPS integrity POST test passed!\
    14.07.13 17:28:45.000 kernel[0]: corecrypto.kext FIPS AES CBC POST test passed!\
    14.07.13 17:28:45.000 kernel[0]: corecrypto.kext FIPS TDES CBC POST test passed!\
    14.07.13 17:28:45.000 kernel[0]: corecrypto.kext FIPS AES ECB AESNI POST test passed!\
    14.07.13 17:28:45.000 kernel[0]: corecrypto.kext FIPS AES XTS AESNI POST test passed!\
    14.07.13 17:28:45.000 kernel[0]: corecrypto.kext FIPS SHA POST test passed!\
    14.07.13 17:28:45.000 kernel[0]: corecrypto.kext FIPS HMAC POST test passed!\
    14.07.13 17:28:45.000 kernel[0]: corecrypto.kext FIPS ECDSA POST test passed!\
    14.07.13 17:28:45.000 kernel[0]: corecrypto.kext FIPS DRBG POST test passed!\
    14.07.13 17:28:45.000 kernel[0]: corecrypto.kext FIPS POST passed!\
    14.07.13 17:28:45.000 kernel[0]: AppleACPICPU: ProcessorId=1 LocalApicId=0 Enabled\
    14.07.13 17:28:45.000 kernel[0]: AppleACPICPU: ProcessorId=2 LocalApicId=2 Enabled\
    14.07.13 17:28:45.000 kernel[0]: AppleACPICPU: ProcessorId=3 LocalApicId=4 Enabled\
    14.07.13 17:28:45.000 kernel[0]: AppleACPICPU: ProcessorId=4 LocalApicId=6 Enabled\
    14.07.13 17:28:45.000 kernel[0]: AppleACPICPU: ProcessorId=5 LocalApicId=255 Disabled\
    14.07.13 17:28:45.000 kernel[0]: AppleACPICPU: ProcessorId=6 LocalApicId=255 Disabled\
    14.07.13 17:28:45.000 kernel[0]: AppleACPICPU: ProcessorId=7 LocalApicId=255 Disabled\
    14.07.13 17:28:45.000 kernel[0]: AppleACPICPU: ProcessorId=8 LocalApicId=255 Disabled\
    14.07.13 17:28:45.000 kernel[0]: calling mpo_policy_init for TMSafetyNet\
    14.07.13 17:28:45.000 kernel[0]: Security policy loaded: Safety net for Time Machine (TMSafetyNet)\
    14.07.13 17:28:45.000 kernel[0]: calling mpo_policy_init for Sandbox\
    14.07.13 17:28:45.000 kernel[0]: Security policy loaded: Seatbelt sandbox policy (Sandbox)\
    14.07.13 17:28:45.000 kernel[0]: calling mpo_policy_init for Quarantine\
    14.07.13 17:28:37.720 com.apple.launchd[1]: *** launchd[1] has started up. ***\
    14.07.13 17:28:45.000 kernel[0]: Security policy loaded: Quarantine policy (Quarantine)\
    14.07.13 17:28:45.000 kernel[0]: Copyright (c) 1982, 1986, 1989, 1991, 1993\
    14.07.13 17:28:45.000 kernel[0]: The Regents of the University of California. All rights reserved.\
    14.07.13 17:28:45.000 kernel[0]: MAC Framework successfully initialized\
    14.07.13 17:28:45.000 kernel[0]: using 16384 buffer headers and 10240 cluster IO buffer headers\
    14.07.13 17:28:45.000 kernel[0]: IOAPIC: Version 0x20 Vectors 64:87\
    14.07.13 17:28:45.000 kernel[0]: ACPI: System State [S0 S3 S4 S5]\
    14.07.13 17:28:45.000 kernel[0]: AppleIntelCPUPowerManagement: Turbo Ratios 2344\
    14.07.13 17:28:45.000 kernel[0]: AppleIntelCPUPowerManagement: (built 12:18:39 Oct 18 2012) initialization complete\
    14.07.13 17:28:45.000 kernel[0]: PFM64 (36 cpu) 0xf80000000, 0x80000000\
    14.07.13 17:28:45.000 kernel[0]: [ PCI configuration begin ]\
    14.07.13 17:28:37.720 com.apple.launchd[1]: *** Shutdown logging is enabled. ***\
    14.07.13 17:28:45.000 kernel[0]: Sleep failure code 0x00000000 0x1f006700\
    14.07.13 17:28:45.000 kernel[0]: console relocated to 0xfc0020000\
    14.07.13 17:28:44.816 com.apple.launchd[1]: (com.apple.automountd) Unknown key for boolean: NSSupportsSuddenTermination\
    14.07.13 17:28:45.000 kernel[0]: PCI configuration changed (bridge=17 device=4 cardbus=0)\
    14.07.13 17:28:45.000 kernel[0]: [ PCI configuration end, bridges 13 devices 16 ]\
    14.07.13 17:28:45.000 kernel[0]: AppleThunderboltNHIType2::setupPowerSavings - GPE based runtime power management\
    14.07.13 17:28:45.000 kernel[0]: AppleThunderboltNHIType2::start - type 2 sleep enabled\
    14.07.13 17:28:45.000 kernel[0]: AppleThunderboltNHIType2::start - SXFP method found\
    14.07.13 17:28:45.000 kernel[0]: mbinit: done [128 MB total pool size, (85/42) split]\
    14.07.13 17:28:45.000 kernel[0]: Pthread support ABORTS when sync kernel primitives misused\
    14.07.13 17:28:45.000 kernel[0]: rooting via boot-uuid from /chosen: FA41975F-8187-39BF-A050-6EA65F3EC755\
    14.07.13 17:28:45.000 kernel[0]: Waiting on <dict ID="0"><key>IOProviderClass</key><string ID="1">IOResources</string><key>IOResourceMatch</key><string ID="2">boot-uuid-media</string></dict>\
    14.07.13 17:28:45.000 kernel[0]: com.apple.AppleFSCompressionTypeZlib kmod start\
    14.07.13 17:28:45.000 kernel[0]: com.apple.AppleFSCompressionTypeDataless kmod start\
    14.07.13 17:28:45.000 kernel[0]: com.apple.AppleFSCompressionTypeZlib load succeeded\
    14.07.13 17:28:45.000 kernel[0]: com.apple.AppleFSCompressionTypeDataless load succeeded\
    14.07.13 17:28:45.000 kernel[0]: AppleIntelCPUPowerManagementClient: ready\
    14.07.13 17:28:45.000 kernel[0]: Got boot device = IOService:/AppleACPIPlatformExpert/PCI0@0/AppleACPIPCI/SATA@1F,2/AppleIntelPchS eriesAHCI/PRT0@0/IOAHCIDevice@0/AppleAHCIDiskDriver/IOAHCIBlockStorageDevice/IOB lockStorageDriver/APPLE HDD WDC WD10EALX-408EA0 Media/IOGUIDPartitionScheme/Customer@2\
    14.07.13 17:28:45.000 kernel[0]: BSD root: disk0s2, major 1, minor 2\
    14.07.13 17:28:45.000 kernel[0]: BTCOEXIST off \
    14.07.13 17:28:45.000 kernel[0]: BRCM tunables:\
    14.07.13 17:28:45.000 kernel[0]: pullmode[1] txringsize[  256] txsendqsize[1024] reapmin[   32] reapcount[  128]\
    14.07.13 17:28:45.000 kernel[0]: jnl: unknown-dev: replay_journal: from: 32392192 to: 41551360 (joffset 0x1d18000)\
    14.07.13 17:28:45.000 kernel[0]: IOThunderboltSwitch(0x0)::listenerCallback - Thunderbolt HPD packet for route = 0x0 port = 11 unplug = 0\
    14.07.13 17:28:45.000 kernel[0]: IOThunderboltSwitch(0x0)::listenerCallback - Thunderbolt HPD packet for route = 0x0 port = 12 unplug = 0\
    14.07.13 17:28:45.000 kernel[0]: jnl: unknown-dev: journal replay done.\
    14.07.13 17:28:45.000 kernel[0]: Kernel is LP64\
    14.07.13 17:28:45.000 kernel[0]: hfs: Removed 19 orphaned / unlinked files and 136 directories \
    14.07.13 17:28:48.000 kernel[0]: BCM5701Enet: Ethernet address 10:dd:b1:9f:be:37\
    14.07.13 17:28:48.000 kernel[0]: AirPort_Brcm4331: Ethernet address 8c:2d:aa:57:1a:eb\
    14.07.13 17:28:48.000 kernel[0]: IO80211Controller::dataLinkLayerAttachComplete():  adding AppleEFINVRAM notification\
    14.07.13 17:28:48.000 kernel[0]: IO80211Interface::efiNVRAMPublished():  \
    14.07.13 17:28:50.614 hidd[49]: Posting 'com.apple.iokit.hid.displayStatus' notifyState=1\
    14.07.13 17:28:50.698 hidd[49]: void __IOHIDLoadBundles(): Loaded 0 HID plugins\
    14.07.13 17:28:51.022 fseventsd[50]: event logs in /.fseventsd out of sync with volume.  destroying old logs. (679 25 725)\
    14.07.13 17:28:51.658 fseventsd[50]: log dir: /.fseventsd getting new uuid: FBF6F1D0-FD4C-43AB-ACCA-A2A33EF85E41\
    14.07.13 17:28:52.000 kernel[0]: macx_swapon SUCCESS\
    14.07.13 17:28:57.000 kernel[0]: Waiting for DSMOS...\
    14.07.13 17:28:58.508 appleeventsd[55]: main: Starting up\
    14.07.13 17:28:58.509 com.apple.SecurityServer[19]: Session 100000 created\
    14.07.13 17:28:58.708 coreservicesd[66]: FindBestLSSession(), no match for inSessionID 0xfffffffffffffffc auditTokenInfo( uid=0 euid=0 auSessionID=100000 create=false\
    14.07.13 17:28:58.000 kernel[0]: IOBluetoothUSBDFU::probe\
    14.07.13 17:28:58.000 kernel[0]: IOBluetoothUSBDFU::probe ProductID - 0x828B FirmwareVersion - 0x0032\
    14.07.13 17:28:58.000 kernel[0]: [BroadcomBluetoothHCIControllerUSBTransport][start] -- completed\
    14.07.13 17:28:58.000 kernel[0]: NVDAStartup: Official\
    14.07.13 17:28:58.000 kernel[0]: Previous Shutdown Cause: -128\
    14.07.13 17:28:58.000 kernel[0]: NVDAGK100HAL loaded and registered\
    14.07.13 17:28:58.000 kernel[0]: [IOBluetoothHCIController][staticBluetoothHCIControllerTransportShowsUp] -- Received Bluetooth Controller register service notification \
    14.07.13 17:28:58.000 kernel[0]: [IOBluetoothHCIController][start] -- completed\
    14.07.13 17:28:58.000 kernel[0]: [IOBluetoothHCIController::setConfigState] calling registerService\
    14.07.13 17:28:58.000 kernel[0]: DSMOS has arrived\
    14.07.13 17:28:59.058 mDNSResponder[41]: mDNSResponder mDNSResponder-379.38.1 (Apr 25 2013 19:19:56) starting OSXVers 12\
    14.07.13 17:28:59.231 airportd[70]: _processDLILEvent: en1 attached (down)\
    14.07.13 17:28:59.000 kernel[0]: createVirtIf(): ifRole = 1\
    14.07.13 17:28:59.000 kernel[0]: in func createVirtualInterface ifRole = 1\
    14.07.13 17:28:59.000 kernel[0]: AirPort_Brcm4331_P2PInterface::init name <p2p0> role 1 this 0xffffff804e998000\
    14.07.13 17:28:59.000 kernel[0]: AirPort_Brcm4331_P2PInterface::init() <p2p> role 1\
    14.07.13 17:28:59.000 kernel[0]: Created virtif 0xffffff804e998000 p2p0\
    14.07.13 17:28:59.631 blued[58]: Read the UHE Info\
    14.07.13 17:28:59.631 blued[58]: Read version 2 info.  Number of devices:2\
    14.07.13 17:28:59.631 blued[58]: Class of device:     0x2580\
    14.07.13 17:28:59.631 blued[58]: Device name: 'Apple Magic Mouse' length:18\
    14.07.13 17:28:59.631 blued[58]: Finished reading the HID data\
    14.07.13 17:28:59.631 blued[58]: Found a device with PID:0x030d VID:0x05ac\
    14.07.13 17:28:59.733 blued[58]: Class of device:     0x2540\
    14.07.13 17:28:59.733 blued[58]: Device name: 'Apple Wireless Keyboard' length:24\
    14.07.13 17:28:59.733 blued[58]: Finished reading the HID data\
    14.07.13 17:28:59.733 blued[58]: Found a device with PID:0x0256 VID:0x05ac\
    14.07.13 17:29:00.000 kernel[0]: AirPort: Link Down on en1. Reason 1 (Unspecified).\
    14.07.13 17:29:00.000 kernel[0]: en1::IO80211Interface::postMessage bssid changed\
    14.07.13 17:29:00.389 com.apple.usbmuxd[29]: usbmuxd-296.4 on Dec 21 2012 at 16:11:14, running 64 bit\
    14.07.13 17:29:00.521 configd[16]: network changed.\
    14.07.13 17:29:01.770 com.apple.SecurityServer[19]: Entering service\
    14.07.13 17:29:03.000 kernel[0]: Ethernet [AppleBCM5701Ethernet]: Link up on en0, 100-Megabit, Full-duplex, Symmetric flow-control, Debug [796d,2301,0de1,0300,45e1,0000]\
    14.07.13 17:29:03.106 configd[16]: network changed: v6(en0+:fe80::de0b:1aff:fea8:5393) DNS* Proxy+ SMB\
    14.07.13 17:29:05.732 systemkeychain[76]: done file: /var/run/systemkeychaincheck.done\
    14.07.13 17:29:05.801 configd[16]: network changed: v6(en0:fe80::de0b:1aff:fea8:5393) DNS* Proxy SMB\
    14.07.13 17:29:06.157 apsd[61]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1102)\
    14.07.13 17:29:06.165 apsd[61]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1102)\
    14.07.13 17:29:06.343 mDNSResponder[41]: D2D_IPC: Loaded\
    14.07.13 17:29:06.343 mDNSResponder[41]: D2DInitialize succeeded\
    14.07.13 17:29:06.766 locationd[45]: NOTICE,Location icon should now be in state 0\
    14.07.13 17:29:07.000 kernel[0]: [BNBMouseDevice::init][75.19] init is complete\
    14.07.13 17:29:07.572 loginwindow[44]: Login Window Application Started\
    14.07.13 17:29:07.000 kernel[0]: [BNBMouseDevice::handleStart][75.19] returning 1\
    14.07.13 17:29:07.000 kernel[0]: [AppleMultitouchHIDEventDriver::start] entered\
    14.07.13 17:29:07.758 stackshot[32]: Timed out waiting for IOKit to finish matching.\
    14.07.13 17:29:08.000 kernel[0]: [AppleMultitouchDevice::start] entered\
    14.07.13 17:29:09.000 kernel[0]: USBF:    42.955    AppleUSBHubPort: Port 2 of Hub at 0x1d181000 about to terminate a busy device (CompositeDevice) after waiting 10 seconds\
    14.07.13 17:29:10.349 netbiosd[74]: Unable to start NetBIOS name service: \
    14.07.13 17:29:10.648 digest-service[101]: label: default\
    14.07.13 17:29:10.649 digest-service[101]:     dbname: od:/Local/Default\
    14.07.13 17:29:10.649 digest-service[101]:     mkey_file: /var/db/krb5kdc/m-key\
    14.07.13 17:29:10.649 digest-service[101]:     acl_file: /var/db/krb5kdc/kadmind.acl\
    14.07.13 17:29:10.650 digest-service[101]: digest-request: uid=0\
    14.07.13 17:29:11.794 awacsd[59]: Starting awacsd connectivity-78.3 (Apr 25 2013 19:22:44)\
    14.07.13 17:29:11.844 awacsd[59]: InnerStore CopyAllZones: no info in Dynamic Store\
    14.07.13 17:29:11.850 rpcsvchost[103]: sandbox_init: com.apple.msrpc.netlogon.sb succeeded\
    14.07.13 17:29:11.854 digest-service[101]: digest-request: init request\
    14.07.13 17:29:11.914 digest-service[101]: digest-request: init return domain: BUILTIN server: LOCALHOST\
    14.07.13 17:29:12.705 com.apple.kextd[12]: Can't load /System/Library/Extensions/LogitechUSBHIDevices.kext - no code for running kernel's architecture.\
    14.07.13 17:29:12.706 com.apple.kextd[12]: Load com.Logitech.driver.HIDDevices failed; removing personalities from kernel.\
    14.07.13 17:29:13.000 kernel[0]: X86PlatformPlugin::setRingTable - No ring table found!\
    14.07.13 17:29:13.000 kernel[0]: X86PlatformPlugin::configResourceHandler - Failed to set ring table!\
    14.07.13 17:29:13.000 kernel[0]: [AGPM Controller] build GPUDict by Vendor10deDevice11a2\
    14.07.13 17:29:14.724 mds[40]: (Normal) FMW: FMW 0 0\
    14.07.13 17:29:14.790 WindowServer[95]: Server is starting up\
    14.07.13 17:29:15.252 WindowServer[95]: Session 256 retained (2 references)\
    14.07.13 17:29:15.252 WindowServer[95]: Session 256 released (1 references)\
    14.07.13 17:29:16.052 WindowServer[95]: Session 256 retained (2 references)\
    14.07.13 17:29:16.052 WindowServer[95]: init_page_flip: page flip mode is on\
    14.07.13 17:29:16.166 apsd[61]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1102)\
    14.07.13 17:29:16.838 WindowServer[95]: mux_initialize: Couldn't find any matches\
    14.07.13 17:29:16.936 WindowServer[95]: GLCompositor enabled for tile size [256 x 256]\
    14.07.13 17:29:16.936 WindowServer[95]: CGXGLInitMipMap: mip map mode is on\
    14.07.13 17:29:17.032 WindowServer[95]: WSMachineUsesNewStyleMirroring: true\
    14.07.13 17:29:17.033 WindowServer[95]: Display 0x042c0140: GL mask 0x1; bounds (0, 0)[2560 x 1440], 42 modes available\
    Main, Active, on-line, enabled, built-in, boot, Vendor 610, Model b005, S/N 0, Unit 0, Rotation 0\
    UUID 0x000006100000b00500000000042c0140\
    14.07.13 17:29:17.033 WindowServer[95]: Display 0x003f003e: GL mask 0x4; bounds (0, 0)[0 x 0], 1 modes available\
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 2, Rotation 0\
    UUID 0xffffffffffffffffffffffff003f003e\
    14.07.13 17:29:17.033 WindowServer[95]: Display 0x003f003d: GL mask 0x2; bounds (0, 0)[0 x 0], 1 modes available\
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 1, Rotation 0\
    UUID 0xffffffffffffffffffffffff003f003d\
    14.07.13 17:29:17.038 WindowServer[95]: Created shield window 0x5 for display 0x042c0140\
    14.07.13 17:29:17.039 WindowServer[95]: Created shield window 0x6 for display 0x003f003e\
    14.07.13 17:29:17.039 WindowServer[95]: Created shield window 0x7 for display 0x003f003d\
    14.07.13 17:29:17.042 WindowServer[95]: Display 0x042c0140: GL mask 0x1; bounds (0, 0)[2560 x 1440], 42 modes available\
    Main, Active, on-line, enabled, built-in, boot, Vendor 610, Model b005, S/N 0, Unit 0, Rotation 0\
    UUID 0x000006100000b00500000000042c0140\
    14.07.13 17:29:17.043 WindowServer[95]: Display 0x003f003e: GL mask 0x4; bounds (3584, 0)[1 x 1], 1 modes available\
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 2, Rotation 0\
    UUID 0xffffffffffffffffffffffff003f003e\
    14.07.13 17:29:17.043 WindowServer[95]: Display 0x003f003d: GL mask 0x2; bounds (3585, 0)[1 x 1], 1 modes available\
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 1, Rotation 0\
    UUID 0xffffffffffffffffffffffff003f003d\
    14.07.13 17:29:17.043 WindowServer[95]: CGXPerformInitialDisplayConfiguration\
    14.07.13 17:29:17.043 WindowServer[95]:   Display 0x042c0140: MappedDisplay Unit 0; Vendor 0x610 Model 0xb005 S/N 0 Dimensions 23.50 x 13.23; online enabled built-in, Bounds (0,0)[2560 x 1440], Rotation 0, Resolution 1\
    14.07.13 17:29:17.043 WindowServer[95]:   Display 0x003f003e: MappedDisplay Unit 2; Vendor 0xffffffff Model 0xffffffff S/N -1 Dimensions 0.00 x 0.00; offline enabled, Bounds (3584,0)[1 x 1], Rotation 0, Resolution 1\
    14.07.13 17:29:17.043 WindowServer[95]:   Display 0x003f003d: MappedDisplay Unit 1; Vendor 0xffffffff Model 0xffffffff S/N -1 Dimensions 0.00 x 0.00; offline enabled, Bounds (3585,0)[1 x 1], Rotation 0, Resolution 1\
    14.07.13 17:29:17.699 configd[16]: network changed: v4(en0+:192.168.1.33) v6(en0!:fe80::de0b:1aff:fea8:5393) DNS+ Proxy SMB\
    14.07.13 17:29:17.842 WindowServer[95]: GLCompositor: GL renderer id 0x01022644, GL mask 0x00000007, accelerator 0x00003f9b, unit 0, caps QEX|QGL|MIPMAP, vram 1024 MB\
    14.07.13 17:29:17.855 WindowServer[95]: GLCompositor: GL renderer id 0x01022644, GL mask 0x00000007, texture units 8, texture max 16384, viewport max \{16384, 16384\}, extensions FPRG|NPOT|GLSL|FLOAT\
    14.07.13 17:29:17.884 loginwindow[44]: **DMPROXY** Found `/System/Library/CoreServices/DMProxy'.\
    14.07.13 17:29:18.765 ntpd[97]: proto: precision = 1.000 usec\
    14.07.13 17:29:18.822 WindowServer[95]: Unable to open IOHIDSystem (e00002bd)\
    14.07.13 17:29:18.000 kernel[0]: virtual bool IOHIDEventSystemUserClient::initWithTask(task_t, void *, UInt32): Client task not privileged to open IOHIDSystem for mapping memory (e00002c1)\
    14.07.13 17:29:19.470 WindowServer[95]: Created shield window 0x8 for display 0x042c0140\
    14.07.13 17:29:19.470 WindowServer[95]: Display 0x042c0140: MappedDisplay Unit 0; ColorProfile \{ 2, "iMac"\}; TransferFormula (1.000000, 1.000000, 1.000000)\
    14.07.13 17:29:19.488 launchctl[120]: com.apple.findmymacmessenger: Already loaded\
    14.07.13 17:29:19.662 com.apple.SecurityServer[19]: Session 100004 created\
    14.07.13 17:29:19.710 WindowServer[95]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.\
    14.07.13 17:29:19.804 WindowServer[95]: Display 0x042c0140: MappedDisplay Unit 0; ColorProfile \{ 2, "iMac"\}; TransferFormula (1.000000, 1.000000, 1.000000)\
    14.07.13 17:29:20.101 WindowServer[95]: Display 0x042c0140: MappedDisplay Unit 0; ColorProfile \{ 2, "iMac"\}; TransferFormula (1.000000, 1.000000, 1.000000)\
    14.07.13 17:29:20.334 com.apple.launchd[1]: (com.apple.xprotectupdater[26]) Exited with code: 252\
    14.07.13 17:29:21.493 coreaudiod[129]: Enabled automatic stack shots because audio IO is inactive\
    14.07.13 17:29:21.533 WindowServer[95]: MPAccessSurfaceForDisplayDevice: Set up page flip mode on display 0x042c0140 device: 0x10051f110  isBackBuffered: 1 numComp: 3 numDisp: 3\
    14.07.13 17:29:23.698 BezelServices 236.3[44]: -[DriverServices sendPreferencesToDevice:resetDefaults:] error: classPrefID (null), classPrefs (null)\
    14.07.13 17:29:25.074 hidd[49]: CGSShutdownServerConnections: Detaching application from window server\
    14.07.13 17:29:25.074 hidd[49]: CGSDisplayServerShutdown: Detaching display subsystem from window server\
    14.07.13 17:29:25.074 locationd[132]: NOTICE,Location icon should now be in state 0\
    14.07.13 17:29:25.182 UserEventAgent[121]: cannot find useragent 1102\
    14.07.13 17:29:25.332 loginwindow[44]: Login Window Started Security Agent\
    14.07.13 17:29:26.161 SecurityAgent[134]: This is the first run\
    14.07.13 17:29:26.162 SecurityAgent[134]: MacBuddy was run = 0\
    14.07.13 17:29:26.177 SecurityAgent[134]: User info context values set for kurt\
    14.07.13 17:29:27.516 awacsd[59]: Exiting\
    14.07.13 17:29:29.046 loginwindow[44]: Login Window - Returned from Security Agent\
    14.07.13 17:29:29.105 loginwindow[44]: ERROR | ScreensharingLoginNotification | Failed sending message to screen sharing GetScreensharingPort, err: 1102\
    14.07.13 17:29:29.127 loginwindow[44]: USER_PROCESS: 44 console\
    14.07.13 17:29:29.528 coreservicesd[66]: SendFlattenedData, got error #268435459 (ipc/send) invalid destination port from ::mach_msg(), sending notification kLSNotifyApplicationDeath to notificationID=108\
    14.07.13 17:29:29.548 com.apple.launchd[1]: (com.wacom.pentablet[126]) Exited with code: 255\
    14.07.13 17:29:29.593 com.apple.launchd.peruser.501[139]: (com.apple.gamed) Ignored this key: UserName\
    14.07.13 17:29:29.593 com.apple.launchd.peruser.501[139]: (com.apple.gamed) Ignored this key: GroupName\
    14.07.13 17:29:29.594 com.apple.launchd.peruser.501[139]: (com.apple.ReportCrash) Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self\
    14.07.13 17:29:29.597 loginwindow[44]: Connection with distnoted server was invalidated\
    14.07.13 17:29:29.622 com.apple.launchd[1]: ([0x0-0x5005].com.wacom.Consumer_TouchDriver[138]) Exited with code: 255\
    14.07.13 17:29:29.624 distnoted[143]: # distnote server agent  absolute time: 63.250366578   civil time: Sun Jul 14 17:29:29 2013   pid: 143 uid: 501  root: no\
    14.07.13 17:29:30.353 WindowServer[95]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.\
    14.07.13 17:29:30.773 blued[58]: kBTXPCUpdateUserPreferences gConsoleUserUID = 501\
    14.07.13 17:29:30.774 coreservicesd[66]: SendFlattenedData, got error #268435460 (ipc/send) timed out from ::mach_msg(), sending notification kLSNotifyApplicationBirth to notificationID=119\
    14.07.13 17:29:30.897 WindowServer[95]: Display 0x042c0140: MappedDisplay Unit 0; ColorProfile \{ 2, "iMac"\}; TransferFormula (1.000000, 1.000000, 1.000000)\
    14.07.13 17:29:31.101 com.apple.launchd.peruser.501[139]: (com.apple.afpstat-qfa[174]) Exited with code: 2\
    14.07.13 17:29:31.203 talagent[154]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, _kLSApplicationIsHiddenKey, hidden ? kCFBooleanTrue : kCFBooleanFalse, NULL) produced OSStatus -50 on line 623 in TCApplication.m\
    14.07.13 17:29:31.203 talagent[154]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, TAL_kLSIsProxiedForTALKey, kCFBooleanTrue, NULL) produced OSStatus -50 on line 626 in TCApplication.m\
    14.07.13 17:29:32.199 locationd[179]: NOTICE,Location icon should now be in state 0\
    14.07.13 17:29:32.345 apsd[175]: Couldn't change keychain information for default user: -25299\
    14.07.13 17:29:32.510 com.apple.launchd.peruser.501[139]: (com.apple.mrt.uiagent[164]) Exited with code: 255\
    14.07.13 17:29:32.591 NetworkBrowserAgent[186]: Starting NetworkBrowserAgent\
    14.07.13 17:29:32.998 WindowServer[95]: CGXDisableUpdate: UI updates were forcibly disabled by application "SystemUIServer" for over 1.00 seconds. Server has re-enabled them.\
    14.07.13 17:29:37.368 com.apple.SecurityServer[19]: Session 100005 created\
    14.07.13 17:29:39.787 WindowServer[95]: reenable_update_for_connection: UI updates were finally reenabled by application "SystemUIServer" after 7.79 seconds (server forcibly re-enabled them after 1.00 seconds)\
    14.07.13 17:29:49.093 com.apple.time[142]: Interval maximum value is 946100000 seconds (specified value: 9223372036854775807).\
    14.07.13 17:29:49.116 genatsdb[202]: ########## genatsdb Sandboxed. ##########\
    14.07.13 17:29:49.348 com.apple.launchd[1]: (com.apple.coreservices.appleid.authentication[125]) Exit timeout elapsed (20 seconds). Killing\
    14.07.13 17:29:49.481 genatsdb[203]: ########## genatsdb Sandboxed. ##########\
    14.07.13 17:29:55.004 SyncServer[200]: [0x7fd2b1c1b9f0] |DataManager|Warning| Client com.apple.Mail sync alert tool path /System/Library/Frameworks/Message.framework/Resources/MailSync does not exist.\
    14.07.13 17:29:56.000 kernel[0]: USBMSC Identifier (non-unique): KZGCAPH0951          0x5ac 0x1500 0x202\
    14.07.13 17:29:57.807 com.apple.time[142]: Interval maximum value is 946100000 seconds (specified value: 9223372036854775807).\
    14.07.13 17:30:10.000 kernel[0]: jnl: disk1s3: replay_journal: from: 35868672 to: 35934208 (joffset 0x1d1f000)\
    14.07.13 17:30:10.000 kernel[0]: jnl: disk1s3: journal replay done.\
    14.07.13 17:30:10.000 kernel[0]: jnl: disk1s4: replay_journal: from: 36921344 to: 36995072 (joffset 0x1d1f000)\
    14.07.13 17:30:10.000 kernel[0]: jnl: disk1s4: journal replay done.\
    14.07.13 17:30:11.000 kernel[0]: jnl: disk1s5: replay_journal: from: 37044224 to: 37109760 (joffset 0x1d18000)\
    14.07.13 17:30:11.000 kernel[0]: jnl: disk1s5: journal replay done.\
    14.07.13 17:30:11.000 kernel[0]: jnl: disk1s2: replay_journal: from: 83034112 to: 83140608 (joffset 0x1d1f000)\
    14.07.13 17:30:12.000 kernel[0]: jnl: disk1s2: journal replay done.\
    14.07.13 17:30:24.629 coreaudiod[129]: Disabled automatic stack shots because audio IO is active\
    14.07.13 17:30:24.830 coreaudiod[129]: Enabled automatic stack shots because audio IO is inactive\
    14.07.13 17:30:27.137 genatsdb[203]: *GENATSDB* FontObjects generated = 656\
    14.07.13 17:30:28.991 genatsdb[202]: *GENATSDB* FontObjects generated = 633\
    14.07.13 17:30:50.048 com.apple.SecurityServer[19]: Session 100007 created\
    14.07.13 17:30:54.426 firefox-bin[254]: -_continuousScroll is deprecated for NSScrollWheel. Please use -hasPreciseScrollingDeltas.\
    14.07.13 17:30:54.426 firefox-bin[254]: -deviceDeltaY is deprecated for NSScrollWheel. Please use -scrollingDeltaY.\
    14.07.13 17:30:54.427 firefox-bin[254]: -deviceDeltaX is deprecated for NSScrollWheel. Please use -scrollingDeltaX.\
    14.07.13 17:30:54.000 kernel[0]: AppleBCM5701Ethernet:        0        1 BCM5701Enet::replaceOrCopyPacket worked after N tries\
    14.07.13 17:32:19.000 kernel[0]: considerRebuildOfPrelinkedKernel com.apple.driver.AudioAUUC triggered rebuild\
    14.07.13 17:32:24.148 com.apple.launchd.peruser.501[139]: ([0x0-0x25025].com.apple.installer[295]) Exited: Killed: 9\
    14.07.13 17:32:39.371 com.apple.launchd.peruser.501[139]: ([0x0-0x27027].com.apple.installer[298]) Exited: Killed: 9\
    14.07.13 17:32:43.992 coreaudiod[129]: Disabled automatic stack shots because audio IO is active\
    14.07.13 17:32:44.619 coreaudiod[129]: Enabled automatic stack shots because audio IO is inactive\
    14.07.13 17:32:45.069 coreaudiod[129]: Disabled automatic stack shots because audio IO is active\
    14.07.13 17:32:45.696 coreaudiod[129]: Enabled automatic stack shots because audio IO is inactive\
    14.07.13 17:33:30.546 com.apple.backupd[313]: Starting automatic backup\
    14.07.13 17:33:31.318 com.apple.backupd[313]: Backing up to: /Volumes/Time Machine/Backups.backupdb\
    14.07.13 17:33:32.254 com.apple.backupd[313]: Event store UUIDs don't match for volume: Macintosh HD\
    14.07.13 17:33:32.511 com.apple.backupd[313]: Deep event scan at path:/ reason:must scan subdirs|new event db|\
    14.07.13 17:34:09.502 coreaudiod[129]: Disabled automatic stack shots because audio IO is active\
    14.07.13 17:34:10.268 coreaudiod[129]: Enabled automatic stack shots because audio IO is inactive\
    14.07.13 17:34:13.596 Safari[316]: CFPropertyListCreateFromXMLData(): Old-style plist parser: missing semicolon in dictionary on line 3. Parsing will be abandoned. Break on _CFPropertyListMissingSemicolon to debug.\
    14.07.13 17:34:13.597 Safari[316]: CFPropertyListCreateFromXMLData(): Old-style plist parser: missing semicolon in dictionary on line 3. Parsing will be abandoned. Break on _CFPropertyListMissingSemicolon to debug.\
    14.07.13 17:34:13.597 Safari[316]: CFPropertyListCreateFromXMLData(): Old-style plist parser: missing semicolon in dictionary on line 3. Parsing will be abandoned. Break on _CFPropertyListMissingSemicolon to debug.\
    14.07.13 17:34:34.966 com.apple.backupd[313]: Finished scan\
    14.07.13 17:34:44.328 com.apple.backupd[313]: Found 728 files (41.1 MB) needing backup\
    14.07.13 17:34:44.509 com.apple.backupd[313]: 376.8 MB required (including padding), 837.3 GB available\
    14.07.13 17:34:45.009 WebProcess[318]: objc[318]: Object 0x7fdd1a42bf80 of class NSUserDefaults autoreleased with no pool in place - just leaking - break on objc_autoreleaseNoPool() to debug\
    14.07.13 17:34:45.110 WebProcess[318]: objc[318]: Object 0x7fdd1a42bf80 of class NSUserDefaults autoreleased with no pool in place - just leaking - break on objc_autoreleaseNoPool() to debug\
    14.07.13 17:34:46.236 CalendarAgent[171]: [com.apple.calendar.store.log.caldav.queue] [Account [email protected]@https://cal.me.com:8443/principals/users/1.1106928981/ timed out when executing operation: <CalDAVAccountRefreshQueueableOperation: 0x7fb09b4e2bb0; Sequence: 0>]\
    14.07.13 17:34:46.287 CalendarAgent[171]: [com.apple.calendar.store.log.caldav.queue] [Account refresh failed with error: Error Domain=NSURLErrorDomain Code=-1001 "Zeit\'fcberschreitung bei der Anforderung." UserInfo=0x7fb09c064200 \{NSUnderlyingError=0x7fb09c067100 "Zeit\'fcberschreitung bei der Anforderung.", NSErrorFailingURLStringKey=https://kurt.wyttenbach%[email protected]:8443/principals/users/1.1106928981///kurt.wyttenbach%[email protected]:8443/principals/users/1.1106928981/, NSErrorFailingURLKey=https://kurt.wyttenbach%[email protected]:8443/principals/users/1.1106928981///kurt.wyttenbach%[email protected]:8443/principals/users/1.1106928981/, [email protected], CalDAVErrFromRefresh=YES, NSLocalizedDescription=Zeit\'fcberschreitung bei der Anforderung.\}]\
    14.07.13 17:35:17.528 com.apple.backupd[313]: Copied 3507 files (40.2 MB) from volume Macintosh HD.\
    14.07.13 17:35:17.575 com.apple.backupd[313]: Using file event preflight for Macintosh HD\
    14.07.13 17:35:17.583 com.apple.backupd[313]: Will copy (189 KB) from Macintosh HD\
    14.07.13 17:35:17.584 com.apple.backupd[313]: Found 38 files (189 KB) needing backup\
    14.07.13 17:35:17.584 com.apple.backupd[313]: 327.7 MB required (including padding), 837.25 GB available\
    14.07.13 17:35:21.858 com.apple.backupd[313]: Copied 1007 files (190 KB) from volume Macintosh HD.\
    14.07.13 17:35:22.461 com.apple.backupd[313]: Created new backup: 2013-07-14-173521\
    14.07.13 17:35:23.524 com.apple.backupd[313]: Starting post-backup thinning\
    14.07.13 17:35:27.147 com.apple.backupd[313]: Deleted /Volumes/Time Machine/Backups.backupdb/Macintosh/2013-07-10-144448 (803 KB)\
    14.07.13 17:35:32.317 com.apple.backupd[313]: Deleted /Volumes/Time Machine/Backups.backupdb/Macintosh/2013-07-11-133335 (10.1 MB)\
    14.07.13 17:35:36.667 com.apple.backupd[313]: Deleted /Volumes/Time Machine/Backups.backupdb/Macintosh/2013-07-11-121821 (14.6 MB)\
    14.07.13 17:35:36.667 com.apple.backupd[313]: Post-back up thinning complete: 3 expired backups removed\
    14.07.13 17:35:36.721 com.apple.backupd[313]: Backup completed successfully.\
    14.07.13 17:36:35.643 WindowServer[95]: Created shield window 0x72 for display 0x042c0140\
    14.07.13 17:36:35.643 WindowServer[95]: device_generate_desktop_screenshot: authw 0x0(0), shield 0x0(0)\
    14.07.13 17:36:35.651 WindowServer[95]: device_generate_lock_screen_screenshot: authw 0x0(0), shield 0x0(0)\
    14.07.13 17:36:35.651 com.apple.time[11]: Next maintenance wake [Backup Interval]: <date: 0x7fc678e09560> Sun Jul 14 18:29:10 2013 CEST (approx)\
    14.07.13 17:36:35.651 com.apple.time[11]: Requesting maintenance wake [Backup Interval]: <date: 0x7fc678e09560> Sun Jul 14 18:29:10 2013 CEST (approx)\
    14.07.13 17:36:57.000 bootlog[0]: BOOT_TIME 1373816217 0\
    14.07.13 17:37:05.000 kernel[0]: PMAP: PCID enabled\
    14.07.13 17:37:05.000 kernel[0]: PMAP: Supervisor Mode Execute Protection enabled\
    14.07.13 17:37:05.000 kernel[0]: Darwin Kernel Version 12.4.0: Wed May  1 17:57:12 PDT 2013; root:xnu-2050.24.15~1/RELEASE_X86_64\
    14.07.13 17:37:05.000 kernel[0]: vm_page_bootstrap: 3917120 free pages and 244416 wired pages\
    14.07.13 17:37:05.000 kernel[0]: kext submap [0xffffff7f80737000 - 0xffffff8000000000], kernel text [0xffffff8000200000 - 0xffffff8000737000]\
    14.07.13 17:37:05.000 kernel[0]: zone leak detection enabled\
    14.07.13 17:37:05.000 kernel[0]: standard timeslicing quantum is 10000 us\
    14.07.13 17:37:05.000 kernel[0]: standard background quantum is 2500 us\
    14.07.13 17:37:05.000 kernel[0]: mig_table_max_displ = 74\
    14.07.13 17:37:05.000 kernel[0]: TSC Deadline Timer supported and enabled\
    14.07.13 17:37:05.000 kernel[0]: corecrypto kext started!\
    14.07.13 17:37:05.000 kernel[0]: Running kernel space in FIPS MODE\
    14.07.13 17:37:05.000 kernel[0]: Plist hmac value is    735d392b68241ef173d81097b1c8ce9ba283521626d1c973ac376838c466757d\
    14.07.13 17:37:05.000 kernel[0]: Computed hmac value is 735d392b68241ef173d81097b1c8ce9ba283521626d1c973ac376838c466757d\
    14.07.13 17:37:05.000 kernel[0]: corecrypto.kext FIPS integrity POST test passed!\
    14.07.13 17:37:05.000 kernel[0]: corecrypto.kext FIPS AES CBC POST test passed!\
    14.07.13 17:37:05.000 kernel[0]: corecrypto.kext FIPS TDES CBC POST test passed!\
    14.07.13 17:37:05.000 kernel[0]: corecrypto.kext FIPS AES ECB AESNI POST test passed!\
    14.07.13 17:37:05.000 kernel[0]: corecrypto.kext FIPS AES XTS AESNI POST test passed!\
    14.07.13 17:37:05.000 kernel[0]: corecrypto.kext FIPS SHA POST test passed!\
    14.07.13 17:37:05.000 kernel[0]: corecrypto.kext FIPS HMAC POST test passed!\
    14.07.13 17:37:05.000 kernel[0]: corecrypto.kext FIPS ECDSA POST test passed!\
    14.07.13 17:37:05.000 kernel[0]: corecrypto.kext FIPS DRBG POST test passed!\
    14.07.13 17:37:05.000 kernel[0]: corecrypto.kext FIPS POST passed!\
    14.07.13 17:37:05.000 kernel[0]: AppleACPICPU: ProcessorId=1 LocalApicId=0 Enabled\
    14.07.13 17:37:05.000 kernel[0]: AppleACPICPU: ProcessorId=2 LocalApicId=2 Enabled\
    14.07.13 17:37:05.000 kernel[0]: AppleACPICPU: ProcessorId=3 LocalApicId=4 Enabled\
    14.07.13 17:37:05.000 kernel[0]: AppleACPICPU: ProcessorId=4 LocalApicId=6 Enabled\
    14.07.13 17:37:05.000 kernel[0]: AppleACPICPU: ProcessorId=5 LocalApicId=255 Disabled\
    14.07.13 17:37:05.000 kernel[0]: AppleACPICPU: ProcessorId=6 LocalApicId=255 Disabled\
    14.07.13 17:37:05.000 kernel[0]: AppleACPICPU: ProcessorId=7 LocalApicId=255 Disabled\
    14.07.13 17:37:05.000 kernel[0]: AppleACPICPU: ProcessorId=8 LocalApicId=255 Disabled\
    14.07.13 17:37:05.000 kernel[0]: calling mpo_policy_init for TMSafetyNet\
    14.07.13 17:37:05.000 kernel[0]: Security policy loaded: Safety net for Time Machine (TMSafetyNet)\
    14.07.13 17:37:05.000 kernel[0]: calling mpo_policy_init for Sandbox\
    14.07.13 17:37:05.000 kernel[0]: Security policy loaded: Seatbelt sandbox policy (Sandbox)\
    14.07.13 17:37:05.000 kernel[0]: calling mpo_policy_init for Quarantine\
    14.07.13 17:37:05.000 kernel[0]: Security policy loaded: Quarantine policy (Quarantine)\
    14.07.13 17:37:05.000 kernel[0]: Copyright (c) 1982, 1986, 1989, 1991, 1993\
    14.07.13 17:37:05.000 kernel[0]: The Regents of the University of California. All rights reserved.\
    14.07.13 17:37:05.000 kernel[0]: MAC Framework successfully initialized\
    14.07.13 17:37:05.000 kernel[0]: using 16384 buffer headers and 10240 cluster IO buffer headers\
    14.07.13 17:37:05.000 kernel[0]: IOAPIC: Version 0x20 Vectors 64:87\
    14.07.13 17:37:05.000 kernel[0]: ACPI: System State [S0 S3 S4 S5]\
    14.07.13 17:37:05.000 kernel[0]: AppleIntelCPUPowerManagement: Turbo Ratios 2344\
    14.07.13 17:37:05.000 kernel[0]: AppleIntelCPUPowerManagement: (built 12:18:39 Oct 18 2012) initialization complete\
    14.07.13 17:37:05.000 kernel[0]: PFM64 (36 cpu) 0xf80000000, 0x80000000\
    14.07.13 17:37:05.000 kernel[0]: [ PCI configuration begin ]\
    14.07.13 17:37:05.000 kernel[0]: Sleep failure code 0x00000000 0x1f006600\
    14.07.13 17:37:05.000 kernel[0]: console relocated to 0xfc0020000\
    14.07.13 17:37:05.000 kernel[0]: PCI configuration changed (bridge=17 device=4 cardbus=0)\
    14.07.13 17:37:05.000 kernel[0]: [ PCI configuration end, bridges 13 devices 16 ]\
    14.07.13 17:37:05.000 kernel[0]: AppleThunderboltNHIType2::setupPowerSavings - GPE based runtime power management\
    14.07.13 17:37:05.000 kernel[0]: AppleThunderboltNHIType2::start - type 2 sleep enabled\
    14.07.13 17:37:05.000 kernel[0]: AppleThunderboltNHIType2::start - SXFP method found\
    14.07.13 17:37:05.000 kernel[0]: mbinit: done [128 MB total pool size, (85/42) split]\
    14.07.13 17:37:05.000 kernel[0]: Pthread support ABORTS when sync kernel primitives misused\
    14.07.13 17:37:05.000 kernel[0]: rooting via boot-uuid from /chosen: FA41975F-8187-39BF-A050-6EA65F3EC755\
    14.07.13 17:37:05.000 kernel[0]: Waiting on <dict ID="0"><key>IOProviderClass</key><string ID="1">IOResources</string><key>IOResourceMatch</key><string ID="2">boot-uuid-media</string></dict>\
    14.07.13 17:37:05.000 kernel[0]: com.apple.AppleFSCompressionTypeZlib kmod start\
    14.07.13 17:37:05.000 kernel[0]: com.apple.AppleFSCompressionTypeDataless kmod start\
    14.07.13 17:37:05.000 kernel[0]: com.apple.AppleFSCompressionTypeZlib load succeeded\
    14.07.13 17:37:05.000 kernel[0]: com.apple.AppleFSCompressionTypeDataless load succeeded\
    14.07.13 17:37:05.000 kernel[0]: AppleIntelCPUPowerManagementClient: ready\
    14.07.13 17:37:05.000 kernel[0]: Got boot device = IOService:/AppleACPIPlatformExpert/PCI0@0/AppleACPIPCI/SATA@1F,2/AppleIntelPchS eriesAHCI/PRT0@0/IOAHCIDevice@0/AppleAHCIDiskDriver/IOAHCIBlockStorageDevice/IOB lockStorageDriver/APPLE HDD WDC WD10EALX-408EA0 Media/IOGUIDPartitionScheme/Customer@2\
    14.07.13 17:37:05.000 kernel[0]: BSD root: disk0s2, major 1, minor 2\
    14.07.13 17:37:05.000 kernel[0]: BTCOEXIST off \
    14.07.13 17:37:05.000 kernel[0]: BRCM tunables:\
    14.07.13 17:37:05.000 kernel[0]: pullmode[1] txringsize[  256] txsendqsize[1024] reapmin[   32] reapcount[  128]\
    14.07.13 17:37:05.000 kernel[0]: jnl: unknown-dev: replay_journal: from: 11534848 to: 15105536 (joffset 0x1d18000)\
    14.07.13 17:37:05.000 kernel[0]: IOThunderboltSwitch(0x0)::listenerCallback - Thunderbolt HPD packet for route = 0x0 port = 11 unplug = 0\
    14.07.13 17:37:05.000 kernel[0]: IOThunderboltSwitch(0x0)::listenerCallback - Thunderbolt HPD packet for route = 0x0 port = 12 unplug = 0\
    14.07.13 17:37:05.000 kernel[0]: USBMSC Identifier (non-unique): KZGCAPH0951          0x5ac 0x1500 0x202\
    14.07.13 17:37:05.000 kernel[0]: jnl: unknown-dev: journal replay done.\
    14.07.13 17:37:05.000 kernel[0]: Kernel is LP64\
    14.07.13 17:37:05.000 kernel[0]: hfs: Removed 10 orphaned / unlinked files and 31 directories \
    14.07.13 17:37:00.744 com.apple.launchd[1]: *** launchd[1] has started up. ***\
    14.07.13 17:37:00.744 com.apple.launchd[1]: *** Shutdown logging is enabled. ***\
    14.07.13 17:37:05.106 com.apple.launchd[1]: (com.apple.automountd) Unknown key for boolean: NSSupportsSuddenTermination\
    14.07.13 17:37:05.000 kernel[0]: BCM5701Enet: Ethernet address 10:dd:b1:9f:be:37\
    14.07.13 17:37:05.000 kernel[0]: AirPort_Brcm4331: Ethernet address 8c:2d:aa:57:1a:eb\
    14.07.13 17:37:05.000 kernel[0]: IO80211Controller::dataLinkLayerAttachComplete():  adding AppleEFINVRAM notification\
    14.07.13 17:37:05.000 kernel[0]: IO80211Interface::efiNVRAMPublished():  \
    14.07.13 17:37:10.229 hidd[49]: Posting 'com.apple.iokit.hid.displayStatus' notifyState=1\
    14.07.13 17:37:10.231 hidd[49]: void __IOHIDLoadBundles(): Loaded 0 HID plugins\
    14.07.13 17:37:10.241 fseventsd[50]: event logs in /.fseventsd out of sync with volume.  destroying old logs. (464 13 499)\
    14.07.13 17:37:10.241 fseventsd[50]: log dir: /.fseventsd getting new uuid: 6B676697-3A0C-4445-9059-FE1886DE3608\
    14.07.13 17:37:10.000 kernel[0]: macx_swapon SUCCESS\
    14.07.13 17:37:10.000 kernel[0]: Waiting for DSMOS...\
    14.07.13 17:37:15.026 coreservicesd[65]: FindBestLSSession(), no match for inSessionID 0xfffffffffffffffc auditTokenInfo( uid=0 euid=0 auSessionID=100000 create=false\
    14.07.13 17:37:15.047 mDNSResponder[41]: mDNSResponder mDNSResponder-379.38.1 (Apr 25 2013 19:19:56) starting OSXVers 12\
    14.07.13 17:37:15.050 airportd[71]: _processDLILEvent: en1 attached (down)\
    14.07.13 17:37:15.000 kernel[0]: createVirtIf(): ifRole = 1\
    14.07.13 17:37:15.000 kernel[0]: in func createVirtualInterface ifRole = 1\
    14.07.13 17:37:15.000 kernel[0]: AirPort_Brcm4331_P2PInterface::init name <p2p0> role 1 this 0xffffff80449cb400\
    14.07.13 17:37:15.000 kernel[0]: AirPort_Brcm4331_P2PInterface::init() <p2p> role 1\
    14.07.13 17:37:15.000 kernel[0]: Created virtif 0xffffff80449cb400 p2p0\
    14.07.13 17:37:15.148 com.apple.SecurityServer[16]: Session 100000 created\
    14.07.13 17:37:15.149 blued[58]: Read the UHE Info\
    14.07.13 17:37:15.149 blued[58]: Read version 2 info.  Number of devices:2\
    14.07.13 17:37:15.149 blued[58]: Class of device:     0x2580\
    14.07.13 17:37:15.150 blued[58]: Device name: 'Apple Magic Mouse' length:18\
    14.07.13 17:37:15.150 blued[58]: Finished reading the HID data\
    14.07.13 17:37:15.150 blued[58]: Found a device with PID:0x030d VID:0x05ac\
    14.07.13 17:37:15.151 blued[58]: Class of device:     0x2540\
    14.07.13 17:37:15.151 blued[58]: Device name: 'Apple Wireless Keyboard' length:24\
    14.07.13 17:37:15.151 blued[58]: Finished reading the HID data\
    14.07.13 17:37:15.151 blued[58]: Found a device with PID:0x0256 VID:0x05ac\
    14.07.13 17:37:15.207 com.apple.kextd[12]: Can't load /System/Library/Extensions/LogitechUSBHIDevices.kext - no code for running kernel's architecture.\
    14.07.13 17:37:15.208 com.apple.kextd[12]: Load com.Logitech.driver.HIDDevices failed; removing personalities from kernel.\
    14.07.13 17:37:15.000 kernel[0]: NVDAStartup: Official\
    14.07.13 17:37:15.000 kernel[0]: [IOBluetoothHCIController][start] -- completed\
    14.07.13 17:37:15.000 kernel[0]: NVDAGK100HAL loaded and registered\
    14.07.13 17:37:15.000 kernel[0]: IOBluetoothUSBDFU::probe\
    14.07.13 17:37:15.000 kernel[0]: IOBluetoothUSBDFU::probe ProductID - 0x828B FirmwareVersion - 0x0032\
    14.07.13 17:37:15.000 kernel[0]: [BroadcomBluetoothHCIControllerUSBTransport][start] -- completed\
    14.07.13 17:37:15.000 kernel[0]: [IOBluetoothHCIController][staticBluetoothHCIControllerTransportShowsUp] -- Received Bluetooth Controller register service notification \
    14.07.13 17:37:15.000 kernel[0]: Previous Shutdown Cause: -128\
    14.07.13 17:37:15.000 kernel[0]: [IOBluetoothHCIController::setConfigState] calling registerService\
    14.07.13 17:37:15.000 kernel[0]: DSMOS has arrived\
    14.07.13 17:37:15.224 mds[40]: (Normal) FMW: FMW 0 0\
    14.07.13 17:37:15.381 appleeventsd[55]: main: Starting up\
    14.07.13 17:37:15.388 com.apple.usbmuxd[29]: usbmuxd-296.4 on Dec 21 2012 at 16:11:14, running 64 bit\
    14.07.13 17:37:15.943 WindowServer[81]: Server is starting up\
    14.07.13 17:37:15.945 configd[17]: network changed.\
    14.07.13 17:37:15.000 kernel[0]: AirPort: Link Down on en1. Reason 1 (Unspecified).\
    14.07.13 17:37:15.000 kernel[0]: en1::IO80211Interface::postMessage bssid changed\
    14.07.13 17:37:16.000 kernel[0]: X86PlatformPlugin::setRingTable - No ring table found!\
    14.07.13 17:37:16.000 kernel[0]: X86PlatformPlugin::configResourceHandler - Failed to set ring table!\
    14.07.13 17:37:16.000 kernel[0]: [AGPM Controller] build GPUDict by Vendor10deDevice11a2\
    14.07.13 17:37:16.315 com.apple.SecurityServer[16]: Entering service\
    14.07.13 17:37:16.404 UserEventAgent[11]: Captive: [HandleNetworkInformationChanged:2435] nwi_state_copy returned NULL\
    14.07.13 17:37:16.470 systemkeychain[92]: done file: /var/run/systemkeychaincheck.done\
    14.07.13 17:37:16.516 loginwindow[44]: Login Window Application Started\
    14.07.13 17:37:16.544 netbiosd[89]: Unable to start NetBIOS name service: \
    14.07.13 17:37:16.554 awacsd[59]: Starting awacsd connectivity-78.3 (Apr 25 2013 19:22:44)\
    14.07.13 17:37:16.570 awacsd[59]: InnerStore CopyAllZones: no info in Dynamic Store\
    14.07.13 17:37:16.606 digest-service[113]: label: default\
    14.07.13 17:37:16.606 digest-service[113]:     dbname: od:/Local/Default\
    14.07.13 17:37:16.606 digest-service[113]:     mkey_file: /var/db/krb5kdc/m-key\
    14.07.13 17:37:16.606 digest-service[113]:     acl_file: /var/db/krb5kdc/kadmind.acl\
    14.07.13 17:37:16.608 digest-service[113]: digest-request: uid=0\
    14.07.13 17:37:16.636 rpcsvchost[115]: sandbox_init: com.apple.msrpc.netlogon.sb succeeded\
    14.07.13 17:37:16.639 digest-service[113]: digest-request: init request\
    14.07.13 17:37:16.643 digest-service[113]: digest-request: init return domain: BUILTIN server: LOCALHOST\
    14.07.13 17:37:16.740 WindowServer[81]: Session 256 retained (2 references)\
    14.07.13 17:37:16.740 WindowServer[81]: Session 256 released (1 references)\
    14.07.13 17:37:16.760 WindowServer[81]: Session 256 retained (2 references)\
    14.07.13 17:37:16.760 WindowServer[81]: init_page_flip: page flip mode is on\
    14.07.13 17:37:16.915 apsd[61]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1102)\
    14.07.13 17:37:16.915 apsd[61]: CGSLookupServerRootPort: Failed to look up the port for "com.apple.windowserver.active" (1102)\
    14.07.13 17:37:17.347 WindowServer[81]: mux_initialize: Couldn't find any matches\
    14.07.13 17:37:17.359 WindowServer[81]: GLCompositor enabled for tile size [256 x 256]\
    14.07.13 17:37:17.359 WindowServer[81]: CGXGLInitMipMap: mip map mode is on\
    14.07.13 17:37:17.425 WindowServer[81]: WSMachineUsesNewStyleMirroring: true\
    14.07.13 17:37:17.425 WindowServer[81]: Display 0x042c0140: GL mask 0x1; bounds (0, 0)[2560 x 1440], 42 modes available\
    Main, Active, on-line, enabled, built-in, boot, Vendor 610, Model b005, S/N 0, Unit 0, Rotation 0\
    UUID 0x000006100000b00500000000042c0140\
    14.07.13 17:37:17.426 WindowServer[81]: Display 0x003f003e: GL mask 0x4; bounds (0, 0)[0 x 0], 1 modes available\
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 2, Rotation 0\
    UUID 0xffffffffffffffffffffffff003f003e\
    14.07.13 17:37:17.426 WindowServer[81]: Display 0x003f003d: GL mask 0x2; bounds (0, 0)[0 x 0], 1 modes available\
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 1, Rotation 0\
    UUID 0xffffffffffffffffffffffff003f003d\
    14.07.13 17:37:17.431 WindowServer[81]: Created shield window 0x5 for display 0x042c0140\
    14.07.13 17:37:17.432 WindowServer[81]: Created shield window 0x6 for display 0x003f003e\
    14.07.13 17:37:17.432 WindowServer[81]: Created shield window 0x7 for display 0x003f003d\
    14.07.13 17:37:17.433 WindowServer[81]: Display 0x042c0140: GL mask 0x1; bounds (0, 0)[2560 x 1440], 42 modes available\
    Main, Active, on-line, enabled, built-in, boot, Vendor 610, Model b005, S/N 0, Unit 0, Rotation 0\
    UUID 0x000006100000b00500000000042c0140\
    14.07.13 17:37:17.433 WindowServer[81]: Display 0x003f003e: GL mask 0x4; bounds (3584, 0)[1 x 1], 1 modes available\
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 2, Rotation 0\
    UUID 0xffffffffffffffffffffffff003f003e\
    14.07.13 17:37:17.433 WindowServer[81]: Display 0x003f003d: GL mask 0x2; bounds (3585, 0)[1 x 1], 1 modes available\
    off-line, enabled, Vendor ffffffff, Model ffffffff, S/N ffffffff, Unit 1, Rotation 0\
    UUID 0xffffffffffffffffffffffff003f003d\
    14.07.13 17:37:17.434 WindowServer[81]: CGXPerformInitialDisplayConfiguration\
    14.07.13 17:37:17.434 WindowServer[81]:   Display 0x042c0140: MappedDisplay Unit 0; Vendor 0x610 Model 0xb005 S/N 0 Dimensions 23.50 x 13.23; online enabled built-in, Bounds (0,0)[2560 x 1440], Rotation 0, Resolution 1\
    14.07.13 17:37:17.434 WindowServer[81]:   Display 0x003f003e: MappedDisplay Unit 2; Vendor 0xffffffff Model 0xffffffff S/N -1 Dimensions 0.00 x 0.00; offline enabled, Bounds (3584,0)[1 x 1], Rotation 0, Resolution 1\
    14.07.13 17:37:17.434 WindowServer[81]:   Display 0x003f003d: MappedDisplay Unit 1; Vendor 0xffffffff Model 0xffffffff S/N -1 Dimensions 0.00 x 0.00; offline enabled, Bounds (3585,0)[1 x 1], Rotation 0, Resolution 1\
    14.07.13 17:37:17.503 WindowServer[81]: GLCompositor: GL renderer id 0x01022644, GL mask 0x00000007, accelerator 0x0000409b, unit 0, caps QEX|QGL|MIPMAP, vram 1024 MB\
    14.07.13 17:37:17.508 WindowServer[81]: GLCompositor: GL renderer id 0x01022644, GL mask 0x00000007, texture units 8, texture max 16384, viewport max \{16384, 16384\}, extensions FPRG|NPOT|GLSL|FLOAT\
    14.07.13 17:37:17.511 loginwindow[44]: **DMPROXY** Found `/System/Library/CoreServices/DMProxy'.\
    14.07.13 17:37:17.524 WindowServer[81]: Unable to open IOHIDSystem (e00002bd)\
    14.07.13 17:37:17.000 kernel[0]: virtual bool IOHIDEventSystemUserClient::initWithTask(task_t, void *, UInt32): Client task not privileged to open IOHIDSystem for mapping memory (e00002c1)\
    14.07.13 17:37:18.109 WindowServer[81]: Created shield window 0x8 for display 0x042c0140\
    14.07.13 17:37:18.109 WindowServer[81]: Display 0x042c0140: MappedDisplay Unit 0; ColorProfile \{ 2, "iMac"\}; TransferFormula (1.000000, 1.000000, 1.000000)\
    14.07.13 17:37:18.143 launchctl[128]: com.apple.findmymacmessenger: Already loaded\
    14.07.13 17:37:18.174 com.apple.SecurityServer[16]: Session 100004 created\
    14.07.13 17:37:18.212 hidd[49]: CGSShutdownServerConnections: Detaching application from window server\
    14.07.13 17:37:18.212 hidd[49]: CGSDisplayServerShutdown: Detaching display subsystem from window server\
    14.07.13 17:37:18.234 loginwindow[44]: Login Window Started Security Agent\
    14.07.13 17:37:18.324 SecurityAgent[137]: This is the first run\
    14.07.13 17:37:18.325 SecurityAgent[137]: MacBuddy was run = 0\
    14.07.13 17:37:18.000 kernel[0]: [BNBMouseDevice::init][75.19] init is complete\
    14.07.13 17:37:18.343 WindowServer[81]: MPAccessSurfaceForDisplayDevice: Set up page flip mode on display 0x042c0140 device: 0x104561110  isBackBuffered: 1 numComp: 3 numDisp: 3\
    14.07.13 17:37:18.343 SecurityAgent[137]: User info context values set for kurt\
    14.07.13 17:37:18.367 coreaudiod[138]: Enabled automatic stack shots because audio IO is inactive\
    14.07.13 17:37:18.000 kernel[0]: Ethernet [AppleBCM5701Ethernet]: Link up on en0, 100-Megabit, Full-duplex, Symmetric flow-control, Debug [796d,0301,0de1,0300,45e1,0000]\
    14.07.13 17:37:18.477 configd[17]: network changed: v6(en0+:fe80::de0b:1aff:fea8:5393) DNS* Proxy+ SMB\
    14.07.13 17:37:18.000 kernel[0]: [BNBMouseDevice::handleStart][75.19] returning 1\
    14.07.13 17:37:18.000 kernel[0]: [AppleMultitouchHIDEventDriver::start] entered\
    14.07.13 17:37:19.017 loginwindow[44]: Login Window - Returned from Security Agent\
    14.07.13 17:37:19.023 loginwindow[44]: ERROR | ScreensharingLoginNotification | Failed sending message to screen sharing GetScreensharingPort, err: 1102\
    14.07.13 17:37:19.040 loginwindow[44]: USER_PROCESS: 44 console\
    14.07.13 17:37:19.404 com.apple.launchd.peruser.501[143]: (com.apple.gamed) Ignored this key: UserName\
    14.07.13 17:37:19.404 com.apple.launchd.peruser.501[143]: (com.apple.gamed) Ignored this key: GroupName\
    14.07.13 17:37:19.404 com.apple.launchd.peruser.501[143]: (com.apple.ReportCrash) Falling back to default Mach exception handler. Could not find: com.apple.ReportCrash.Self\
    14.07.13 17:37:19.408 loginwindow[44]: Connection with distnoted server was invalidated\
    14.07.13 17:37:19.431 distnoted[147]: # distnote server agent  absolute time: 22.728758230   civil time: Sun Jul 14 17:37:19 2013   pid: 147 uid: 501  root: no\
    14.07.13 17:37:19.432 WindowServer[81]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.\
    14.07.13 17:37:19.436 coreservicesd[65]: SendFlattenedData, got error #268435459 (ipc/send) invalid destination port from ::mach_msg(), sending notification kLSNotifyApplicationDeath to notificationID=113\
    14.07.13 17:37:19.438 com.apple.launchd[1]: (com.wacom.pentablet[134]) Exited with code: 255\
    14.07.13 17:37:19.000 kernel[0]: [AppleMultitouchDevice::start] entered\
    14.07.13 17:37:19.543 blued[58]: kBTXPCUpdateUserPreferences gConsoleUserUID = 501\
    14.07.13 17:37:19.804 WindowServer[81]: Display 0x042c0140: MappedDisplay Unit 0; ColorProfile \{ 2, "iMac"\}; TransferFormula (1.000000, 1.000000, 1.000000)\
    14.07.13 17:37:19.828 WindowServer[81]: Display 0x042c0140: MappedDisplay Unit 0; ColorProfile \{ 2, "iMac"\}; TransferFormula (1.000000, 1.000000, 1.000000)\
    14.07.13 17:37:20.559 configd[17]: network changed: v6(en0:fe80::de0b:1aff:fea8:5393) DNS* Proxy SMB\
    14.07.13 17:37:20.619 mDNSResponder[41]: D2D_IPC: Loaded\
    14.07.13 17:37:20.619 mDNSResponder[41]: D2DInitialize succeeded\
    14.07.13 17:37:20.666 locationd[45]: NOTICE,Location icon should now be in state 0\
    14.07.13 17:37:23.690 configd[17]: network changed: v4(en0+:192.168.1.33) v6(en0!:fe80::de0b:1aff:fea8:5393) DNS+ Proxy SMB\
    14.07.13 17:37:23.803 ntpd[109]: proto: precision = 1.000 usec\
    14.07.13 17:37:24.518 locationd[164]: NOTICE,Location icon should now be in state 0\
    14.07.13 17:37:25.894 com.apple.SecurityServer[16]: Session 100005 created\
    14.07.13 17:37:25.963 mds[40]: (Warning) Server: No stores registered for metascope "kMDQueryScopeComputer"\
    14.07.13 17:37:25.964 mds[40]: (Warning) Server: No stores registered for metascope "kMDQueryScopeComputer"\
    14.07.13 17:37:25.973 apsd[61]: Couldn't change keychain information for default user: -25299\
    14.07.13 17:37:26.575 com.apple.launchd[1]: (com.apple.xprotectupdater[26]) Exited with code: 252\
    14.07.13 17:37:31.570 awacsd[59]: Exiting\
    14.07.13 17:37:32.942 WindowServer[81]: **DMPROXY** (2) Found `/System/Library/CoreServices/DMProxy'.\
    14.07.13 17:37:32.978 WindowServer[81]: Display 0x042c0140: MappedDisplay Unit 0; ColorProfile \{ 2, "iMac"\}; TransferFormula (1.000000, 1.000000, 1.000000)\
    14.07.13 17:37:33.073 BezelServices 236.3[44]: -[DriverServices sendPreferencesToDevice:resetDefaults:] error: classPrefID (null), classPrefs (null)\
    14.07.13 17:37:33.277 NetworkBrowserAgent[185]: Starting NetworkBrowserAgent\
    14.07.13 17:37:33.316 talagent[176]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, _kLSApplicationIsHiddenKey, hidden ? kCFBooleanTrue : kCFBooleanFalse, NULL) produced OSStatus -50 on line 623 in TCApplication.m\
    14.07.13 17:37:33.316 talagent[176]: _LSSetApplicationInformationItem(kLSDefaultSessionID, asn, TAL_kLSIsProxiedForTALKey, kCFBooleanTrue, NULL) produced OSStatus -50 on line 626 in TCApplication.m\
    14.07.13 17:37:33.000 kernel[0]: jnl: disk1s2: replay_journal: from: 46989312 to: 61497344 (joffset 0x1d1f000)\
    14.07.13 17:37:36.368 talagent[176]: CGSGetOnScreenWindowList: Invalid connection\
    14.07.13 17:37:36.368 coreservicesd[65]: Can't change an application into stopped state for app App:"Safari" [ 0x0/0x7007]  @ 0x0x7fc899b06030 because it's already been started.\
    14.07.13 17:37:37.308 WindowServer[81]: CGXDisableUpdate: UI updates were forcibly disabled by application "SystemUIServer" for over 1.00 seconds. Server has re-enabled them.\
    14.07.13 17:37:37.733 WindowServer[81]: reenable_update_for_connection: UI updates were finally reenabled by application "SystemUIServer" after 1.43 seconds (server forcibly re-enabled them after 1.00 seconds)\
    14.07.13 17:37:39.381 com.apple.launchd[1]: (com.apple.coreservices.appleid.authentication[133]) Exit timeout elapsed (20 seconds). Killing\
    14.07.13 17:37:41.000 kernel[0]: jnl: disk1s2: journal replay done.\
    14.07.13 17:37:42.000 kernel[0]: hfs: Removed 0 orphaned / unlinked files and 187 directories \
    14.07.13 17:37:42.090 fseventsd[50]: event logs in /Volumes/Time Machine/.fseventsd out of sync with volume.  destroying old logs. (3428 9 3429)\
    14.07.13 17:37:42.097 fseventsd[50]: log dir: /Volumes/Time Machine/.fseventsd getting new uuid: 3F58FA72-0AA8-4ECC-89C5-B97788DD1AA0\
    14.07.13 17:37:42.425 coreservicesd[65]: Can't change an application into stopped state for app App:"Finder" [ 0x0/0xc00c]  @ 0x0x7fc89990e0d0 because it's already been started.\
    14.07.13 17:37:42.000 kernel[0]: jnl: disk1s3: replay_journal: from: 35934208 to: 36024320 (joffset 0x1d1f000)\
    14.07.13 17:37:43.000 kernel[0]: jnl: disk1s3: journal replay done.\
    14.07.13 17:37:44.326 WindowServer[81]: CGXDisableUpdate: UI updates were forcibly disabled by application "Safari" for over 1.00 seconds. Server has re-enabled them.\
    14.07.13 17:37:45.242 fseventsd[50]: event logs in /Volumes/TB 2/.fseventsd out of sync with volume.  destroying old logs. (3337 3 3432)\
    14.07.13 17:37:45.262 fseventsd[50]: log dir: /Volumes/TB 2/.fseventsd getting new uuid: C8782414-AB4E-4C53-95EC-4B1B2FD2ED51\
    14.07.13 17:37:45.000 kernel[0]: jnl: disk1s4: replay_journal: from: 36995072 to: 37093376 (joffset 0x1d1f000)\
    14.07.13 17:37:46.660 WindowServer[81]: reenable_update_for_connection: UI updates were finally reenabled by application "Safari" after 3.33 seconds (server forcibly re-enabled them after 1.00 seconds)\
    14.07.13 17:37:47.300 com.apple.launchd.peruser.501[143]: (com.apple.afpstat-qfa[234]) Job failed to exec(3). Setting up event to tell us when to try again: 2: No such file or directory\
    14.07.13 17:37:47.300 com.apple.launchd.peruser.501[143]: (com.apple.afpstat-qfa[234]) Job failed to exec(3) for weird reason: 2\
    14.07.13 17:37:47.000 kernel[0]: jnl: disk1s4: journal replay done.\
    14.07.13 17:37:49.320 WindowServer[81]: CGXDisableUpdate: UI updates were forcibly disabled by application "Finder" for over 1.00 seconds. Server has re-enabled them.\
    14.07.13 17:37:49.362 com.apple.time[146]: Interval maximum value is 946100000 seconds (specified value: 9223372036854775807).\
    14.07.13 17:37:49.507 WindowServer[81]: reenable_update_for_connection: UI updates were finally reenabled by application "Finder" after 1.19 seconds (server forcibly re-enabled them after 1.00 seconds)\
    14.07.13 17:37:49.527 com.apple.launchd.peruser.501[143]: (com.apple.mrt.uiagent[225]) Exited with code: 255\
    14.07.13 17:37:50.018 fseventsd[50]: event logs in /Volumes/TB 3/.fseventsd out of sync with volume.  destroying old logs. (3338 5 3437)\
    14.07.13 17:37:50.108 DictationIM[216]: Exception in proxy <IMKTextInput> respondsToSelector: inputSessionDoneSleep\
        name = NSPortTimeoutException\
        reason = connection timeout: did not receive reply\
        userInfo = (null)\
    0   CoreFoundation                      0x0000000109fa2b06 __exceptionPreprocess + 198\
    1   libobjc.A.dylib                     0x0000000109ddd3f0 objc_exception_throw + 43\
    2   CoreFoundation                      0x0000

    Same problem, my brand new iMac (27inch 2011 SSD OS X 10.6.8) comes out of sleep and after a few seconds it looks like it cannot write to disk anymore. Programs that are open can still be accessed, however once they need to log or write something to disk the system freezes.
    Tried the following:
    Thunderbolt 27/06 firmware upgrade
    SMC and PRAM reset
    Extended hardware test -> everything OK
    Created new user to see if it is a cache issue that coming from my Time Machine restore from my old iMac
    Keyboard and Magic mouse from my old iMac
    Nothing helped, so I'm becoming desperate. I suspect an SSD drive issue however cannot find any error in the logs.
    Rgds,
    Zwiri

  • OBIEE Security 10g to 11g: Groups

    I had a Security scenario that I wanted to throw out to the forum...
    In 10g, we made use of the GROUP system variable to pull a users group membership from a database table. This was a Session Variable initialized upon each login.
    Data-level and object-level security was different for each group.
    In our environment users had the ability to switch groups, so they could be active in one of the groups and inactive in the others. We provided a form (WriteBack) that allowed them to set what group they wanted to be active for. They would then log out and log back in and have their new group assignments.
    In the Session Variable this was done by pulling in only groups that were flagged as Active. This worked great as it was done at the Session level. So I could login once and see Dashboard A, swtich my role, then log back in and NOT see Dashboard A.
    I know 11g still has the concept of WEBGROUPS, that would mimic the above, but my understanding is that Oracle is pushing the use of Application Roles.
    My question is how would the above behavior be ported over to 11g using Application Roles? I didn't think the population of an Application Role was Session Based, my belief is that it is populated when the Admin Server/Managed Servers are bought up pulling from the applcable Security Provider.
    Edited by: DustinC on Jan 19, 2012 1:29 PM
    Edited by: DustinC on Jan 20, 2012 3:54 PM
    Edited by: DustinC on Jan 22, 2012 12:45 PM
    Edited by: DustinC on Jan 23, 2012 11:40 AM

    Q1. how deploy external database security(users, groups) to OBIEE 11g.
    we used external database security in 10g. all the users and groups maintained in database and obiee rpd has security groups. repository has group information only so it is deployed groups information to obiee 11g by upgrade assistant but how can it deploy users in external database?
    Solution:
    http://www.varanasisaichand.com/2011/09/external-table-authenticationorder-of.html
    http://www.rittmanmead.com/2012/03/obiee-11g-security-week-connecting-to-active-directory-and-obtaining-group-membership-from-database-tables/
    http://obieeblog.wordpress.com/2009/06/18/obiee-security-enforcement-%E2%80%93-external-database-table-authorization/
    Q2. all the users and roles in LDAP server. in this case how obiee 11g read users and group information?
    Obiee11g is intergated with weblogic fusion middleware (Console,EM). in that console have feature to enable mulitiple LDAP authentication
    while configuring AD via weblogic console we need to give the users and group info
    Solution refer:
    http://obieeelegant.blogspot.com/2012/01/obiee-11g-integration-with-ldap.html
    http://docs.oracle.com/cd/E23943_01/bi.1111/e10543/privileges.htm#BABCDCFE
    Thanks
    Deva

  • I am loosing configuration when I power off my Cisco 857 router

    I bought new Cisco 857 router from the shop. Router must have been used before as I couln't go in with default username/password cisco/cisco.
    Well I followed instruciton and reset password to username and password. Now I finally connected to the Cisco CP express over my IE browser.
    I found out that somebody was using a router from the shop so this is why I coun't log to it in the first place. Anyway problem is that when I changed configuration and applied settings it remembers it until I power it off. When I power it on again it remembers all settings from that shop.
    It reverts everything back: IP address, previous level 15 account and password - everything like after password reset.
    I tried it again and it again lost settings. So I found following instruction:
    http://www.cisco.com/en/US/products/hw/routers/ps233/products_tech_note09186a00800a65a5.shtml
    I followed it and changed again all settings on the router. My settings are again lost after power off/on. I noticed that when I do first bit it does show
    0x2102 not 0x2142 like they think that is password reset mode.
    Here is my output from Hyper Terminal:
    =============================
    Cisco#enableCisco#show startUsing 3359 out of 131072 bytes!version 12.4no service padservice timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname Cisco!boot-start-markerboot-end-marker!logging buffered 51200 warningsenable secret 5 $1$hpKF$Rc1tl6r45J8iHG7EN5jSk.!no aaa new-model!crypto pki trustpoint TP-self-signed-3185909327 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-3185909327 revocation-check none rsakeypair TP-self-signed-3185909327!!crypto pki certificate chain TP-self-signed-3185909327 certificate self-signed 01 nvram:IOS-Self-Sig#5.cerdot11 syslogno ip dhcp use vrf connectedip dhcp excluded-address 10.10.10.1!ip dhcp pool ccp-pool   import all   network 10.10.10.0 255.255.255.248   default-router 10.10.10.1   lease 0 2!!ip cefno ip domain lookupip domain name molinary.com!!!username admin privilege 15 secret 5 $1$jD3j$r6ROikgGsIlcMTGjkxFQ6.username username privilege 15 password 0 password!!archive log config  hidekeys!!!!!interface ATM0 no ip address shutdown no atm ilmi-keepalive dsl operating-mode auto!interface ATM0.1 point-to-point description $ES_WAN$ ip nat outside ip virtual-reassembly pvc 0/38  encapsulation aal5mux ppp dialer  dialer pool-member 1 !!interface FastEthernet0!interface FastEthernet1!interface FastEthernet2!interface FastEthernet3!interface Vlan1 description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$ES_LAN$ ip address 10.10.10.1 255.255.255.248 ip nat inside ip virtual-reassembly ip tcp adjust-mss 1452!interface Dialer0 ip address dhcp encapsulation ppp dialer pool 1 dialer-group 1 no cdp enable ppp authentication chap pap callin ppp chap hostname [email protected] ppp chap password 0 netgear01 ppp pap sent-username [email protected] password 0 netgear01!ip forward-protocol nd!ip http serverip http access-class 23ip http authentication localip http secure-serverip http timeout-policy idle 60 life 86400 requests 10000ip nat inside source list 1 interface ATM0.1 overload!access-list 1 remark INSIDE_IF=Vlan1access-list 1 remark CCP_ACL Category=2access-list 1 permit 10.10.10.0 0.0.0.7dialer-list 1 protocol ip permitno cdp run!control-plane!banner exec ^C% Password expiration warning.-----------------------------------------------------------------------Cisco Configuration Professional (Cisco CP) is installed on this deviceand it provides the default username "cisco" for  one-time use. If you havealready used the username "cisco" to login to the router and your IOS imagesupports the "one-time" user option, then this username has already expired.You will not be able to login to the router with this username after you exitthis session.It is strongly suggested that you create a new username with a privilege levelof 15 using the following command.username <myuser> privilege 15 secret 0 <mypassword>Replace <myuser> and <mypassword> with the username and password youwant to use.-----------------------------------------------------------------------^Cbanner login ^CAuthorized access only! Disconnect IMMEDIATELY if you are not an authorized user!^C!line con 0 login local no modem enableline aux 0line vty 0 4 privilege level 15 login local transport input telnet ssh!scheduler max-task-time 5000endCisco#Cisco#Cisco#Cisco#Cisco#Cisco#Cisco#Cisco#Cisco#show versionCisco IOS Software, C850 Software (C850-ADVSECURITYK9-M), Version 12.4(15)T12, RELEASE SOFTWARE (fc3)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2010 by Cisco Systems, Inc.Compiled Fri 22-Jan-10 14:46 by prod_rel_teamROM: System Bootstrap, Version 12.3(8r)YI4, RELEASE SOFTWARECisco uptime is 20 minutesSystem returned to ROM by power-onSystem image file is "flash:c850-advsecurityk9-mz.124-15.T12.bin"This product contains cryptographic features and is subject to UnitedStates and local country laws governing import, export, transfer anduse. Delivery of Cisco cryptographic products does not implythird-party authority to import, export, distribute or use encryption.Importers, exporters, distributors and users are responsible forcompliance with U.S. and local country laws. By using this product youagree to comply with applicable laws and regulations. If you are unableto comply with U.S. and local laws, return this product immediately.A summary of U.S. laws governing Cisco cryptographic products may be found at:http://www.cisco.com/wwl/export/crypto/tool/stqrg.htmlIf you require further assistance please contact us by sending email [email protected] 857 (MPC8272) processor (revision 0x400) with 59392K/6144K bytes of memory.Processor board ID FCZ140792J5MPC8272 CPU Rev: Part Number 0xC, Mask Number 0x104 FastEthernet interfaces1 ATM interface128K bytes of non-volatile configuration memory.20480K bytes of processor board System flash (Intel Strataflash)Configuration register is 0x2102Cisco#Cisco#Cisco#Cisco#endTranslating "end"% Unknown command or computer name, or unable to find computer addressCisco#reloadProceed with reload? [confirm]*Mar  1 01:19:27.786: %SYS-5-RELOAD: Reload requested  by username on console. Reload Reason: Reload Command.System Bootstrap, Version 12.3(8r)YI4, RELEASE SOFTWARETechnical Support: http://www.cisco.com/techsupportCopyright (c) 2006 by cisco Systems, Inc.C850 series (Board ID: 2-149) platform with 65536 Kbytes of main memoryBooting flash:/c850-advsecurityk9-mz.124-15.T12.binSelf decompressing the image : ############################################## [OK]              Restricted Rights LegendUse, duplication, or disclosure by the Government issubject to restrictions as set forth in subparagraph(c) of the Commercial Computer Software - RestrictedRights clause at FAR sec. 52.227-19 and subparagraph(c) (1) (ii) of the Rights in Technical Data and ComputerSoftware clause at DFARS sec. 252.227-7013.           cisco Systems, Inc.           170 West Tasman Drive           San Jose, California 95134-1706Cisco IOS Software, C850 Software (C850-ADVSECURITYK9-M), Version 12.4(15)T12, RELEASE SOFTWARE (fc3)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2010 by Cisco Systems, Inc.Compiled Fri 22-Jan-10 14:46 by prod_rel_teamImage text-base: 0x8002007C, data-base: 0x814E7240This product contains cryptographic features and is subject to UnitedStates and local country laws governing import, export, transfer anduse. Delivery of Cisco cryptographic products does not implythird-party authority to import, export, distribute or use encryption.Importers, exporters, distributors and users are responsible forcompliance with U.S. and local country laws. By using this product youagree to comply with applicable laws and regulations. If you are unableto comply with U.S. and local laws, return this product immediately.A summary of U.S. laws governing Cisco cryptographic products may be found at:http://www.cisco.com/wwl/export/crypto/tool/stqrg.htmlIf you require further assistance please contact us by sending email [email protected] 857 (MPC8272) processor (revision 0x400) with 59392K/6144K bytes of memory.Processor board ID FCZ140792J5MPC8272 CPU Rev: Part Number 0xC, Mask Number 0x104 FastEthernet interfaces1 ATM interface128K bytes of non-volatile configuration memory.20480K bytes of processor board System flash (Intel Strataflash)no ip dhcp use vrf connected               ^% Invalid input detected at '^' marker.SETUP: new interface NVI0 placed in "shutdown" statePress RETURN to get started!*Mar  1 00:00:03.952: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0  State changed to: Initialized*Mar  1 00:00:03.960: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0  State changed to: Enabled*Mar  1 00:00:07.244: %LINK-3-UPDOWN: Interface FastEthernet0, changed state toup*Mar  1 00:00:08.413: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0, changed state to up*Mar  1 00:00:08.821: %SYS-5-CONFIG_I: Configured from memory by console*Mar  1 01:19:27.072: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up*Mar  1 01:19:27.352: %SYS-5-RESTART: System restarted --Cisco IOS Software, C850 Software (C850-ADVSECURITYK9-M), Version 12.4(15)T12, RELEASE SOFTWARE (fc3)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2010 by Cisco Systems, Inc.Compiled Fri 22-Jan-10 14:46 by prod_rel_team*Mar  1 01:19:27.352: %SNMP-5-COLDSTART: SNMP agent on host Cisco is undergoinga cold start*Mar  1 01:19:27.436: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF*Mar  1 01:19:27.436: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF*Mar  1 01:19:27.540: %LINEPROTO-5-UPDOWN: Line protocol on Interface NVI0, changed state to down*Mar  1 01:19:28.072: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1, changed state to up*Mar  1 01:19:28.484: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up*Mar  1 01:19:28.484: %LINK-5-CHANGED: Interface ATM0, changed state to administratively down*Mar  1 01:19:28.848: %LINK-5-CHANGED: Interface NVI0, changed state to administratively down*Mar  1 01:19:28.932: %LINK-3-UPDOWN: Interface FastEthernet3, changed state toup*Mar  1 01:19:28.936: %LINK-3-UPDOWN: Interface FastEthernet2, changed state toup*Mar  1 01:19:28.940: %LINK-3-UPDOWN: Interface FastEthernet1, changed state toup*Mar  1 01:19:29.484: %LINEPROTO-5-UPDOWN: Line protocol on Interface ATM0, changed state to down*Mar  1 01:19:29.932: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet3, changed state to down*Mar  1 01:19:29.936: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2, changed state to down*Mar  1 01:19:29.940: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1, changed state to down*Mar  1 01:19:29.948: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0, changed state to upAuthorized access only!===========================================
    Please help me as I am stuck and can't go any further....

    Hi David White,
    Alternatively, after password recovery you can modify the configuration to be what you want, and then issue:
       write memory
    to save the configuration.  You can then verify that your changes have been saved to the startup config by issuing:
       show startup-config"
    The only good thing is that when I switch off a router it erase configuration except my new password which I created after password reset. Everything else is getting vanished (ADSL settings, DHCP, routing ) everything. Even new admin accounts I created.
    Well have a question to your above comments. I am new in Cisco so please put as much detail as you can for me to understand. When you say modify configuration do you mean to go to Cisco CP Express graphical interface and then connect router to hyper terminal and execute above commands?
    Why router doesn't remember this anyway. There must be some option to change in configuration to make thing permanent when I hit apply changes in Cisco CO Express otherwise it is pointless to heve it.
    Phillip
    write memory
    is
    copy running-config startup-config"
    Can't this be done via Cisco CP Express or set up router to copy this every time I change this in graphical interface rather going to command line to achnoledge it?
    I understand your concern about this router and somebodie's configuration details as you want things to be un-used when you buy them - true. ADSL details belongs to the shop which sold me the router so that is why I don't make a big problem about this. We take most of hardware from this shop and have discount and many good deals with them so I think they have been just testing it and forgot to erease their config. It might be that someone has returned router to the shop and they have repaired it and tested it.
    I hope this is a normal behaviour of this router as I have option to replace it in case this is a fault.
    Could you please write me step by step guide how can I make changed options stay permanently on router?
    thank you
    Dragan

  • Is there a way to password protect internet access?

    Is there a way to password protect internet access?
    Is there a way to password protect the Airport function on my mac?
    I have spent some time looking at the forums and on the internet trying to look for a app that can solve my problem. I wish to be able to turn off internet access. I have been using K9 web protection but have found some flaws and bugs. It is a great idea and works well except for the "block any access between(set time) and (set time)" function.
    I want to be able to use my computer with out the worry of access to the internet. In my simplistic ideas I need an app that will simply toggle the AirPort function on and off and password protect it. That way when i dont want the distraction in my own life and when i let the rest of the family are playing games the internet is safely protected.
    At this time the ethernet connection is not a problem.
    I can simply un plug the router however the neighbours around me don't password protect their connections!
    If any one knows of a way to solve this or any alternative solutions please let me know.
    Many thanks for reading and I look forward to your expertise.
    Alex

    AirPort Express frequently asked questions (FAQ)
    Question: Can I completely turn off the AirPort Express wireless signal when I don't need it?    Answer: No, though you can turn the transmission strength down to a minimum setting. To prevent unauthorized access, you can turn on wireless security features.
    http://support.apple.com/kb/HT1515
    Wi-Fi base stations: Setting up and configuring a roaming network (802.11 a/b/g/n)
    http://support.apple.com/kb/HT4260
    Check your access privileges
        If you enabled encryption on your network, make sure that you set up your base station or router properly. Consult the documentation that came with your product. Make sure you're using the correct settings and password. If you're joining a closed network, a network with its name hidden, make sure that you've entered the network name and password correctly. If the network is secured by access control, make sure that your MAC address is registered with the network administrator. Consult the network administrator for assistance with access.
    http://support.apple.com/kb/HT1145
    Airport Apple Support
    http://www.apple.com/support/airport/

  • Site to Site VPN between ASA 5505 and Cisco 800 router

    Evening all,
    Hoping that someboy can see the error of my ways.  It seems very like the problem that i read here: https://supportforums.cisco.com/thread/2016300
    We have a cisco 800 in a remote site which we wanted to use for a site to site vpn.  Went through the steps on the ASA 5505 and the 800 and have got to the stage were the tunnel is up and connected.  Getting traffic through it is another matter.  Remote network is 172.20.224.0/20 and the server network behind the ASA is 192.168.168.0/24. The tunnel does intiate when you send traffic from 172 ......to 192.......  Both the ASA and 800 report the tunnel is up.  If i look at the stats using ccp on the 800 i can see the encapsulation packets graph shooting up but nothing cominbg back.  I did packet captures on the 5505 and could not see anything coming from the tunnel so i dont belive its making it to the ASA.  Here is the config from the 800:
    Building configuration...
    Current configuration : 6488 bytes
    version 12.4
    no service pad
    service timestamps debug uptime
    service timestamps log uptime
    no service password-encryption
    hostname hhp-sty-backup
    boot-start-marker
    boot-end-marker
    logging message-counter syslog
    logging buffered 4096
    enable secret 5 $1$jI1i$/kZbRk2WHD5h0HtfuQVej1
    aaa new-model
    aaa authentication login default local
    aaa authorization exec default local
    aaa authorization auth-proxy default local
    aaa session-id common
    crypto pki trustpoint TP-self-signed-1347488939
    enrollment selfsigned
    subject-name cn=IOS-Self-Signed-Certificate-1347488939
    revocation-check none
    rsakeypair TP-self-signed-1347488939
    crypto pki certificate chain TP-self-signed-1347488939
    certificate self-signed 02
      30820255 308201BE A0030201 02020102 300D0609 2A864886 F70D0101 04050030
      31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
      69666963 6174652D 31333437 34383839 3339301E 170D3032 30333031 30313336
      33375A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
      4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 33343734
      38383933 3930819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
      8100E714 7B0ADB41 19F60528 A8A5C43B 5CD2D1CD DCCF2E08 8B38D444 36EAB9B7
      0E93CEF7 660F979E E27915B9 E44812A5 794EA03D BA66752B FD0F7EBF D6342513
      D6410E4E 098CE838 C3BADD0A 5F3505FE 22CA776F 89B19510 F0852225 3600F046
      4D57D2E2 FE4AAD1E 8BE4BF80 7B27369E BFA65160 BC769BC9 00A13741 E336D0EA
      8A810203 010001A3 7D307B30 0F060355 1D130101 FF040530 030101FF 30280603
      551D1104 21301F82 1D686870 2D737479 2D626163 6B75702E 796F7572 646F6D61
      696E2E63 6F6D301F 0603551D 23041830 168014FA 4A8C4DF6 629638DE 87D7B60A
      0F5BB40F EA6AED30 1D060355 1D0E0416 0414FA4A 8C4DF662 9638DE87 D7B60A0F
      5BB40FEA 6AED300D 06092A86 4886F70D 01010405 00038181 00BBE577 6EF63FE7
      789766D5 37841812 298D4885 1CD06D07 4C625369 C3403106 89EE1398 73495432
      66C49CB1 36A5B2F8 D77A8C46 5AFE4112 EA5917D9 81542640 80EF2D36 54A85CC6
      C3FFFFB8 39A648DD 2ABA2B13 4137BE07 760E46C0 74401DA7 482E3FA2 A64B70FF
      447AA1B2 52E37240 29987085 532BBE3B C2E2E54A 54CA1D13 0E
                quit
    dot11 syslog
    ip source-route
    ip dhcp excluded-address 10.10.10.1
    ip dhcp pool inside
    ip dhcp pool lan_network
       network 172.20.224.0 255.255.240.0
       dns-server 8.8.8.8 8.8.4.4
       default-router 172.20.224.1
       lease 7
    ip cef
    no ip domain lookup
    ip domain name yourdomain.com
    password encryption aes
    username pix privilege 15 secret 5 $1$Z.wA$lBmj36AJx/cbK1RjmfGJh1
    username admin privilege 15 password 0 434Zaty
    crypto isakmp policy 1
    encr 3des
    authentication pre-share
    group 2
    crypto isakmp key password address 217.36.32.222
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto map SDM_CMAP_1 1 ipsec-isakmp
    description Tunnel to217.36.32.222
    set peer 217.36.32.222
    set transform-set ESP-3DES-SHA
    match address 100
    archive
    log config
      hidekeys
    interface ATM0
    no ip address
    no atm ilmi-keepalive
    pvc 0/38
      encapsulation aal5mux ppp dialer
      dialer pool-member 1
    dsl operating-mode auto
    interface FastEthernet0
    interface FastEthernet1
    interface FastEthernet2
    interface FastEthernet3
    interface Vlan1
    description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$
    ip address 172.20.224.1 255.255.240.0
    ip nat inside
    ip virtual-reassembly
    ip tcp adjust-mss 1452
    interface Dialer0
    ip address negotiated
    ip nat outside
    ip virtual-reassembly
    encapsulation ppp
    dialer pool 1
    no cdp enable
    ppp authentication chap callin
    ppp chap hostname B6*******.btclick.com
    ppp chap password 0 H*******
    crypto map SDM_CMAP_1
    ip forward-protocol nd
    ip route 0.0.0.0 0.0.0.0 Dialer0
    ip http server
    ip http authentication local
    ip http secure-server
    ip http timeout-policy idle 60 life 86400 requests 10000
    ip nat inside source route-map SDM_RMAP_1 interface Dialer0 overload
    access-list 1 remark CCP_ACL Category=16
    access-list 1 permit 172.4.0.0 0.240.255.255
    access-list 10 permit 195.12.1.35
    access-list 10 permit 172.4.0.0 0.240.255.255
    access-list 100 remark CCP_ACL Category=4
    access-list 100 remark IPSec Rule
    access-list 100 permit ip 172.20.224.0 0.0.15.255 192.168.168.0 0.0.0.255
    access-list 101 remark CCP_ACL Category=2
    access-list 101 remark IPSec Rule
    access-list 101 deny   ip 172.20.224.0 0.0.15.255 192.168.168.0 0.0.0.255
    access-list 101 permit ip 172.4.0.0 0.240.255.255 any
    route-map SDM_RMAP_1 permit 1
    match ip address 101
    control-plane
    banner exec ^C
    % Password expiration warning.
    Cisco Configuration Professional (Cisco CP) is installed on this device
    and it provides the default username "cisco" for  one-time use. If you have
    already used the username "cisco" to login to the router and your IOS image
    supports the "one-time" user option, then this username has already expired.
    You will not be able to login to the router with this username after you exit
    this session.
    It is strongly suggested that you create a new username with a privilege level
    of 15 using the following command.
    username <myuser> privilege 15 secret 0 <mypassword>
    Replace <myuser> and <mypassword> with the username and password you
    want to use.
    ^C
    banner login ^C
    Cisco Configuration Professional (Cisco CP) is installed on this device.
    This feature requires the one-time use of the username "cisco" with the
    password "cisco". These default credentials have a privilege level of 15.
    YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE 
    PUBLICLY-KNOWN CREDENTIALS
    Here are the Cisco IOS commands.
    username <myuser>  privilege 15 secret 0 <mypassword>
    no username cisco
    Replace <myuser> and <mypassword> with the username and password you want
    to use.
    IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL
    NOT BE ABLE TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.
    For more information about Cisco CP please follow the instructions in the
    QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
    ^C
    line con 0
    no modem enable
    stopbits 1
    line aux 0
    line vty 0 4
    access-class 10 in
    privilege level 15
    password 434Zaty
    transport input telnet ssh
    scheduler max-task-time 5000
    end
    Any help will be most gratefully recieved.

    Rick,
    Thanks for replying.  Here is the output from the 800 Show Crypto command:
    interface: Dialer0
        Crypto map tag: SDM_CMAP_1, local addr 81.136.160.237
       protected vrf: (none)
       local  ident (addr/mask/prot/port): (172.20.224.0/255.255.240.0/0/0)
       remote ident (addr/mask/prot/port): (192.168.168.0/255.255.255.0/0/0)
       current_peer 217.36.32.222 port 500
         PERMIT, flags={origin_is_acl,}
        #pkts encaps: 10928, #pkts encrypt: 10928, #pkts digest: 10928
        #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
        #pkts compressed: 0, #pkts decompressed: 0
        #pkts not compressed: 0, #pkts compr. failed: 0
        #pkts not decompressed: 0, #pkts decompress failed: 0
        #send errors 2, #recv errors 0
         local crypto endpt.: 81.136.160.237, remote crypto endpt.: 217.36.32.222
         path mtu 1500, ip mtu 1500, ip mtu idb Virtual-Access2
         current outbound spi: 0x0(0)
         inbound esp sas:
         inbound ah sas:
         inbound pcp sas:
         outbound esp sas:
         outbound ah sas:
         outbound pcp sas:
    interface: Virtual-Access2
        Crypto map tag: SDM_CMAP_1, local addr 81.136.160.237
       protected vrf: (none)
       local  ident (addr/mask/prot/port): (172.20.224.0/255.255.240.0/0/0)
       remote ident (addr/mask/prot/port): (192.168.168.0/255.255.255.0/0/0)
       current_peer 217.36.32.222 port 500
         PERMIT, flags={origin_is_acl,}
        #pkts encaps: 10928, #pkts encrypt: 10928, #pkts digest: 10928
        #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
        #pkts compressed: 0, #pkts decompressed: 0
        #pkts not compressed: 0, #pkts compr. failed: 0
        #pkts not decompressed: 0, #pkts decompress failed: 0
        #send errors 2, #recv errors 0
         local crypto endpt.: 81.136.160.237, remote crypto endpt.: 217.36.32.222
         path mtu 1500, ip mtu 1500, ip mtu idb Virtual-Access2
         current outbound spi: 0x0(0)
         inbound esp sas:
         inbound ah sas:
         inbound pcp sas:
         outbound esp sas:
         outbound ah sas:
         outbound pcp sas:
    and this is the running config frm our ASA at HQ:
    Result of the command: "sh run"
    : Saved
    ASA Version 8.2(1)
    hostname secure-access
    domain-name hhp.com
    enable password UWWykvGjAPmxufUo encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    names
    interface Vlan1
    nameif inside
    security-level 100
    ip address 192.168.168.1 255.255.255.0
    interface Vlan2
    nameif outside
    security-level 0
    pppoe client vpdn group BT
    ip address 217.36.32.222 255.255.255.255 pppoe
    interface Vlan12
    nameif DMZ
    security-level 50
    ip address 192.168.169.1 255.255.255.0
    interface Vlan22
    nameif Wireless_HHP
    security-level 100
    ip address 172.16.36.1 255.255.254.0
    interface Vlan32
    nameif CNES
    security-level 100
    ip address 187.187.168.1 255.255.0.0
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    interface Ethernet0/2
    switchport access vlan 12
    interface Ethernet0/3
    switchport access vlan 22
    interface Ethernet0/4
    switchport access vlan 32
    interface Ethernet0/5
    switchport access vlan 12
    interface Ethernet0/6
    switchport access vlan 12
    interface Ethernet0/7
    ftp mode passive
    dns domain-lookup inside
    dns domain-lookup outside
    dns domain-lookup DMZ
    dns domain-lookup Wireless_HHP
    dns domain-lookup CNES
    dns server-group DefaultDNS
    name-server 192.168.168.2
    domain-name hhp.com
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object-group network NET-cnes_HHP-Sty
    network-object 172.20.224.0 255.255.240.0
    object-group network NET-cnes_HHP-Balivanich
    network-object 172.20.192.0 255.255.240.0
    object-group network Oak-DC1
    network-object 192.168.168.2 255.255.255.255
    object-group network Maple-DC2
    network-object 192.168.168.3 255.255.255.255
    object-group network HHP_Domain_Controllers
    group-object Oak-DC1
    group-object Maple-DC2
    object-group network PC-Support
    network-object 187.187.60.1 255.255.255.255
    network-object 187.187.60.2 255.255.255.254
    network-object 187.187.60.4 255.255.255.254
    network-object 187.187.60.6 255.255.255.255
    object-group network ELM-ActiveH
    network-object 192.168.168.6 255.255.255.255
    object-group network Pine-GP
    network-object 192.168.168.12 255.255.255.255
    object-group network HHP_Application_Servers
    group-object ELM-ActiveH
    group-object Pine-GP
    object-group network Fern-TS1
    network-object 192.168.168.4 255.255.255.255
    object-group network Fir-TS2
    network-object 192.168.168.5 255.255.255.255
    object-group network HHP_Terminal_Servers
    group-object Fern-TS1
    group-object Fir-TS2
    object-group service Global_Catalog_LDAP
    description (Generated by Cisco SM from Object "Global Catalog LDAP")
    service-object tcp eq 3268
    object-group service Global_Catalog_LDAP_SSL
    description (Generated by Cisco SM from Object "Global Catalog LDAP SSL")
    service-object tcp eq 3269
    object-group service UDP-389
    description UDP port for LDAP
    service-object udp eq 389
    object-group service TCP-88
    description TCP Port 88
    service-object tcp eq 88
    object-group service TCP-445
    description SMB
    service-object tcp eq 445
    object-group network John_-_Laptop
    description John's Laptop
    network-object 187.187.10.65 255.255.255.255
    object-group network Graham_-_PC
    description Graham Morrison's PC
    network-object 187.187.10.90 255.255.255.255
    object-group network john_test
    network-object 187.187.40.7 255.255.255.255
    object-group network Iain_PC
    description Iain Macaulay IT
    network-object 187.187.10.19 255.255.255.255
    object-group network John_-_PC
    description John MacPhail's PC
    network-object 187.187.10.7 255.255.255.255
    object-group network it-alahen-lap
    network-object 187.187.10.230 255.255.255.255
    object-group network Catriona_-_Laptop
    description Catriona's Laptop
    network-object 187.187.10.60 255.255.255.255
    object-group network Graham_-_Laptop
    network-object 187.186.10.120 255.255.255.255
    object-group network it-innive-xp
    description Innes MacIver's PC
    network-object 187.187.10.14 255.255.255.255
    object-group network it-alahen-xp
    description Desktop
    network-object 187.187.10.229 255.255.255.255
    object-group network Cat_-_PC
    description Catriona Macmillan's PC
    network-object 187.187.10.4 255.255.255.255
    object-group network it-davdon-xp
    description Desktop
    network-object 187.187.160.7 255.255.255.255
    object-group network cat-laptop
    description Catriona's Laptop addresses
    network-object 187.187.77.81 255.255.255.255
    network-object 187.187.77.82 255.255.255.255
    object-group network Catriona_old_pc
    network-object 187.187.10.44 255.255.255.255
    object-group network cat-tablet
    description Catriona's Tablet ip address's
    network-object 187.187.77.78 255.255.255.254
    object-group network DSO-SQLServer
    description Task Database Server
    network-object 187.187.1.33 255.255.255.255
    object-group network it-finfernew-xp
    description Findlay Ferguson PC
    network-object 187.187.10.153 255.255.255.255
    object-group network PC_Support
    group-object John_-_Laptop
    group-object Graham_-_PC
    group-object john_test
    group-object Iain_PC
    group-object John_-_PC
    group-object it-alahen-lap
    group-object Catriona_-_Laptop
    group-object Graham_-_Laptop
    group-object it-alahen-xp
    group-object Cat_-_PC
    group-object it-davdon-xp
    group-object cat-laptop
    group-object Catriona_old_pc
    group-object cat-tablet
    group-object it-innive-xp
    network-object 187.187.1.128 255.255.255.255
    network-object 187.187.10.76 255.255.255.255
    group-object DSO-SQLServer
    network-object 187.187.15.234 255.255.255.255
    network-object 187.187.4.60 255.255.255.255
    network-object 187.187.10.134 255.255.255.255
    network-object 172.18.194.22 255.255.255.255
    group-object it-finfernew-xp
    object-group network Entire_CNE
    description Entire CNE range
    network-object 187.0.0.0 255.0.0.0
    object-group network NET-cnes_HHP-Sty-Staff
    network-object 172.20.225.0 255.255.255.0
    object-group network NET-cnes_HHP-Balivanich-staff
    network-object 172.20.193.0 255.255.255.0
    object-group network Alder-Intranet
    network-object 192.168.168.13 255.255.255.255
    object-group network Aspen-ISA
    network-object 192.168.168.10 255.255.255.255
    object-group service tcp-8080
    description TCP Port 8080
    service-object tcp eq 8080
    object-group network Beech-External
    network-object 217.36.32.210 255.255.255.255
    object-group network it-csm
    description cisco security manager
    network-object 187.187.1.72 255.255.255.255
    object-group network Juniper-External
    description Internet Server
    network-object 217.36.32.211 255.255.255.255
    object-group network HHP_Server_Network
    network-object 192.168.168.0 255.255.255.0
    object-group network Messagelabs_Incoming_HHP
    network-object 67.219.240.0 255.255.240.0
    network-object 95.131.104.0 255.255.248.0
    network-object 193.109.254.0 255.255.254.0
    network-object 195.245.230.0 255.255.254.0
    network-object 216.82.240.0 255.255.240.0
    network-object 85.158.136.0 255.255.248.0
    network-object 117.120.16.0 255.255.248.0
    network-object 194.106.220.0 255.255.254.0
    object-group network Angus-Maclean-PC
    network-object 187.187.10.250 255.255.255.255
    object-group service RDP
    service-object tcp eq 3389
    object-group network it-dbserver
    description Database Server (Live)
    network-object 187.187.1.65 255.255.255.255
    object-group network it-sql-test
    description Test SQL / database server
    network-object 187.187.1.81 255.255.255.255
    object-group service DNS-Resolving
    description Domain Name Server
    service-object tcp eq domain
    service-object udp eq domain
    object-group network Beech-Exchange
    network-object 192.168.168.91 255.255.255.255
    object-group network Messagelabs_-_Incoming
    description List of MessageLab addresses that SMTP connections are accepted from
    network-object 212.125.75.0 255.255.255.224
    network-object 216.82.240.0 255.255.240.0
    network-object 195.216.16.211 255.255.255.255
    network-object 194.205.110.128 255.255.255.224
    network-object 194.106.220.0 255.255.254.0
    network-object 193.109.254.0 255.255.254.0
    network-object 62.231.131.0 255.255.255.0
    network-object 62.173.108.208 255.255.255.240
    network-object 62.173.108.16 255.255.255.240
    network-object 212.125.74.44 255.255.255.255
    network-object 195.245.230.0 255.255.254.0
    network-object 85.158.136.0 255.255.248.0
    object-group network MIS_Support
    network-object 192.168.168.250 255.255.255.254
    object-group network it-donadon-xp
    description Donald Macdonald's PC
    network-object 187.187.10.13 255.255.255.255
    object-group network Angela_PC
    network-object 187.187.10.155 255.255.255.255
    object-group network Katie_PC
    network-object 187.187.10.151 255.255.255.255
    object-group network Pauline_PC
    network-object 187.187.10.12 255.255.255.255
    object-group network it-paye-net
    network-object 187.187.1.92 255.255.255.255
    object-group network MessageLabs-Towers
    description Message Labs IP Address ranges
    network-object 216.82.240.0 255.255.240.0
    network-object 67.219.240.0 255.255.240.0
    network-object 85.158.136.0 255.255.248.0
    network-object 95.131.104.0 255.255.248.0
    network-object 117.120.16.0 255.255.248.0
    network-object 193.109.254.0 255.255.254.0
    network-object 194.106.220.0 255.255.254.0
    network-object 195.245.230.0 255.255.254.0
    network-object 62.231.131.0 255.255.255.0
    network-object 212.125.75.16 255.255.255.240
    object-group network NET_cnes-castlebay-staff
    network-object 172.19.17.0 255.255.255.0
    object-group network NET_cnes_tarbert_staff
    description NET_cnes_tarbert_staff
    network-object 172.19.33.0 255.255.255.0
    object-group network Juniper
    network-object 192.168.169.5 255.255.255.255
    object-group network HHP_DMZ_Network
    network-object 192.168.169.0 255.255.255.0
    object-group network Ash
    network-object 192.168.168.100 255.255.255.255
    object-group service UDP-445
    service-object udp eq 445
    object-group service tcp-udp-135-139
    service-object tcp-udp range 135 139
    object-group network HHP-ELM
    description HHP's ELM ActiveH server
    network-object 187.187.1.203 255.255.255.255
    object-group network CNES-Ext-GW
    description CNES External Address
    network-object 194.83.245.242 255.255.255.255
    object-group service IPSEC
    description IPSEC
    service-object 57
    service-object ah
    service-object esp
    service-object udp eq isakmp
    object-group network Alamur-PC
    network-object 187.187.10.15 255.255.255.255
    object-group network Iain-Nicolson-PC
    network-object 187.187.10.159 255.255.255.255
    object-group network HHP_Remote_Access_Pool
    network-object 192.168.168.200 255.255.255.248
    network-object 192.168.168.208 255.255.255.240
    network-object 192.168.168.224 255.255.255.252
    network-object 192.168.168.228 255.255.255.254
    object-group network Holly-AV
    network-object 192.168.168.9 255.255.255.255
    object-group service AVG_Ports
    description For AVG server to HHP PCs
    service-object tcp-udp eq 6150
    service-object tcp-udp eq 6051
    service-object tcp-udp eq 445
    service-object tcp-udp eq 138
    service-object tcp-udp eq 135
    service-object tcp-udp eq 6054
    service-object tcp-udp eq 4158
    service-object tcp-udp eq 139
    service-object tcp-udp eq 137
    object-group network CNES_Access
    network-object 192.168.168.230 255.255.255.254
    network-object 192.168.168.232 255.255.255.248
    network-object 192.168.168.240 255.255.255.248
    network-object 192.168.168.248 255.255.255.254
    object-group network HHP-068
    description BACS PC
    network-object 172.20.225.6 255.255.255.255
    object-group network Banyan
    network-object 192.168.168.105 255.255.255.255
    object-group service TCP81
    description TCP Port 81
    service-object tcp eq 81
    object-group network Gavin_-_new_PC
    network-object 187.187.10.150 255.255.255.255
    object-group network Secudoors
    network-object 172.20.224.4 255.255.255.255
    access-list outside_access_in remark Time sync to external ntp server
    access-list outside_access_in extended permit udp host 192.108.114.23 object-group HHP_Domain_Controllers eq ntp
    access-list outside_access_in extended permit tcp object-group MessageLabs-Towers object-group Beech-External eq smtp
    access-list outside_access_in extended permit ip host 81.136.160.237 object-group HHP_Server_Network
    access-list outside_access_in extended permit ip object-group CNES_Access object-group HHP_Server_Network
    access-list outside_access_in extended permit ip object-group MIS_Support object-group HHP_Server_Network
    access-list outside_access_in extended permit ip object-group HHP_Remote_Access_Pool object-group HHP_Server_Network
    access-list outside_access_in extended permit tcp any object-group Juniper-External eq www
    access-list outside_access_in extended permit tcp any object-group Juniper-External eq https
    access-list outside_access_in extended deny ip any any
    access-list outside_access_in_1 extended permit ip any any
    access-list CSM_FW_ACL_Wireless_HHP extended permit ip object-group NET-cnes_HHP-Balivanich object-group HHP_Server_Network
    access-list CSM_FW_ACL_Wireless_HHP extended permit ip object-group NET-cnes_HHP-Sty object-group HHP_Server_Network
    access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group HHP-068 any eq www
    access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group HHP-068 any eq domain
    access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group HHP-068 any eq domain
    access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group HHP-068 any eq https
    access-list CSM_FW_ACL_Wireless_HHP extended permit object-group DNS-Resolving object-group HHP-068 any
    access-list CSM_FW_ACL_Wireless_HHP extended permit object-group tcp-8080 object-group HHP-068 any
    access-list CSM_FW_ACL_Wireless_HHP extended permit ip host 172.20.193.53 object-group CNES-Ext-GW
    access-list CSM_FW_ACL_Wireless_HHP extended permit ip object-group Secudoors any
    access-list CSM_FW_ACL_inside extended permit ip object-group HHP_Server_Network object-group NET-cnes_HHP-Balivanich
    access-list CSM_FW_ACL_inside extended permit ip object-group HHP_Server_Network object-group NET-cnes_HHP-Sty
    access-list CSM_FW_ACL_inside extended permit ip object-group HHP_Application_Servers object-group PC_Support
    access-list CSM_FW_ACL_inside extended permit ip object-group HHP_Domain_Controllers object-group PC_Support
    access-list CSM_FW_ACL_inside extended permit ip object-group HHP_Terminal_Servers object-group PC_Support
    access-list CSM_FW_ACL_inside extended permit tcp object-group Oak-DC1 any eq domain
    access-list CSM_FW_ACL_inside extended permit udp object-group Oak-DC1 any eq domain
    access-list CSM_FW_ACL_inside extended permit object-group DNS-Resolving object-group Oak-DC1 any
    access-list CSM_FW_ACL_inside extended permit tcp object-group Maple-DC2 any eq domain
    access-list CSM_FW_ACL_inside extended permit udp object-group Maple-DC2 any eq domain
    access-list CSM_FW_ACL_inside extended permit object-group DNS-Resolving object-group Maple-DC2 any
    access-list CSM_FW_ACL_inside extended permit tcp object-group Aspen-ISA any eq www
    access-list CSM_FW_ACL_inside extended permit tcp object-group Aspen-ISA any eq domain
    access-list CSM_FW_ACL_inside extended permit udp object-group Aspen-ISA any eq domain
    access-list CSM_FW_ACL_inside extended permit tcp object-group Aspen-ISA any eq https
    access-list CSM_FW_ACL_inside extended permit object-group DNS-Resolving object-group Aspen-ISA any
    access-list CSM_FW_ACL_inside extended permit object-group tcp-8080 object-group Aspen-ISA any
    access-list CSM_FW_ACL_inside remark For Symantec Liveupdates
    access-list CSM_FW_ACL_inside extended permit tcp object-group Banyan any eq ftp
    access-list CSM_FW_ACL_inside extended permit tcp object-group Banyan any eq www
    access-list CSM_FW_ACL_inside extended permit tcp object-group Banyan any eq https
    access-list CSM_FW_ACL_inside remark IPSec VPN access from ELm to CNES
    access-list CSM_FW_ACL_inside extended permit object-group IPSEC object-group ELM-ActiveH object-group CNES-Ext-GW
    access-list CSM_FW_ACL_inside extended permit udp object-group ELM-ActiveH object-group CNES-Ext-GW eq 4500
    access-list CSM_FW_ACL_inside extended permit tcp object-group ELM-ActiveH object-group CNES-Ext-GW eq 4500
    access-list CSM_FW_ACL_inside extended permit icmp object-group HHP_Server_Network object-group HHP_DMZ_Network
    access-list CSM_FW_ACL_inside remark Time sync to external ntp server
    access-list CSM_FW_ACL_inside extended permit udp object-group HHP_Domain_Controllers host 192.108.114.23 eq ntp
    access-list CSM_FW_ACL_inside extended permit tcp object-group Beech-Exchange object-group Messagelabs_-_Incoming eq smtp
    access-list CSM_FW_ACL_inside extended permit tcp object-group Aspen-ISA object-group Juniper eq www
    access-list CSM_FW_ACL_inside extended permit tcp object-group Aspen-ISA object-group Juniper eq https
    access-list CSM_FW_ACL_inside extended permit ip object-group Holly-AV object-group Juniper
    access-list CSM_FW_ACL_inside extended deny ip any any
    access-list CSM_FW_ACL_CNES extended permit ip object-group PC_Support object-group HHP_Server_Network
    access-list CSM_FW_ACL_CNES extended permit ip object-group PC_Support object-group HHP_DMZ_Network
    access-list CSM_FW_ACL_CNES extended permit ip object-group PC_Support object-group NET-cnes_HHP-Balivanich
    access-list CSM_FW_ACL_CNES extended permit ip object-group PC_Support object-group NET-cnes_HHP-Sty
    access-list CSM_FW_ACL_CNES extended permit tcp object-group it-csm any eq ssh
    access-list CSM_FW_ACL_CNES extended permit tcp object-group it-csm any eq www
    access-list CSM_FW_ACL_CNES extended permit tcp object-group it-csm any eq https
    access-list CSM_FW_ACL_CNES remark Aim's access to Active H server: DSO SQL
    access-list CSM_FW_ACL_CNES remark server's access (Task)
    access-list CSM_FW_ACL_CNES remark IT Ops - mapped drive for FTP transfer to and from E450/Elm of Entitlement Adjustments
    access-list CSM_FW_ACL_CNES remark and Tenancy Changes
    access-list CSM_FW_ACL_CNES extended permit ip object-group it-sql-test object-group ELM-ActiveH
    access-list CSM_FW_ACL_CNES extended permit ip object-group DSO-SQLServer object-group ELM-ActiveH
    access-list CSM_FW_ACL_CNES extended permit ip object-group it-paye-net object-group ELM-ActiveH
    access-list CSM_FW_ACL_CNES extended permit ip object-group Angela_PC object-group ELM-ActiveH
    access-list CSM_FW_ACL_CNES extended permit ip object-group Katie_PC object-group ELM-ActiveH
    access-list CSM_FW_ACL_CNES extended permit ip object-group Pauline_PC object-group ELM-ActiveH
    access-list CSM_FW_ACL_CNES remark donald and Findlay RDP access to Active H
    access-list CSM_FW_ACL_CNES extended permit object-group RDP object-group it-donadon-xp object-group ELM-ActiveH
    access-list CSM_FW_ACL_CNES extended permit object-group RDP object-group it-donadon-xp object-group HHP_Terminal_Servers
    access-list CSM_FW_ACL_CNES extended permit object-group RDP object-group it-finfernew-xp object-group ELM-ActiveH
    access-list CSM_FW_ACL_CNES extended permit object-group RDP object-group it-finfernew-xp object-group HHP_Terminal_Servers
    access-list CSM_FW_ACL_CNES extended permit ip object-group Angus-Maclean-PC object-group Alder-Intranet
    access-list CSM_FW_ACL_CNES extended permit ip object-group Angus-Maclean-PC host 192.168.168.17
    access-list CSM_FW_ACL_CNES extended permit ip object-group Angus-Maclean-PC object-group Juniper
    access-list CSM_FW_ACL_CNES extended permit ip object-group Iain-Nicolson-PC object-group Alder-Intranet
    access-list CSM_FW_ACL_CNES extended permit ip object-group Iain-Nicolson-PC host 192.168.168.17
    access-list CSM_FW_ACL_CNES extended permit ip object-group Iain-Nicolson-PC object-group Juniper
    access-list CSM_FW_ACL_CNES extended permit ip object-group it-davdon-xp object-group Alder-Intranet
    access-list CSM_FW_ACL_CNES extended permit ip object-group it-davdon-xp host 192.168.168.17
    access-list CSM_FW_ACL_CNES extended permit ip object-group it-davdon-xp object-group Juniper
    access-list CSM_FW_ACL_CNES extended permit ip object-group Alamur-PC object-group Alder-Intranet
    access-list CSM_FW_ACL_CNES extended permit ip object-group Alamur-PC host 192.168.168.17
    access-list CSM_FW_ACL_CNES extended permit ip object-group Alamur-PC object-group Juniper
    access-list CSM_FW_ACL_CNES extended permit ip object-group Gavin_-_new_PC object-group Alder-Intranet
    access-list CSM_FW_ACL_CNES extended permit ip object-group Gavin_-_new_PC host 192.168.168.17
    access-list CSM_FW_ACL_CNES extended permit ip object-group Gavin_-_new_PC object-group Juniper
    access-list CSM_FW_ACL_CNES extended permit object-group RDP object-group NET_cnes-castlebay-staff object-group HHP_Server_Network
    access-list CSM_FW_ACL_CNES extended permit object-group RDP object-group NET_cnes_tarbert_staff object-group HHP_Server_Network
    access-list MIS_splitTunnelAcl standard permit 192.168.168.0 255.255.255.0
    access-list inside_nat0_outbound extended permit ip object-group HHP_Server_Network 192.168.168.250 255.255.255.254
    access-list inside_nat0_outbound extended permit ip object-group HHP_Server_Network 192.168.168.224 255.255.255.224
    access-list CSM_FW_ACL_DMZ extended permit ip object-group HHP_DMZ_Network object-group PC_Support
    access-list CSM_FW_ACL_DMZ extended permit icmp object-group HHP_DMZ_Network object-group HHP_Server_Network
    access-list CSM_FW_ACL_DMZ extended permit ip object-group Juniper object-group Angus-Maclean-PC
    access-list CSM_FW_ACL_DMZ extended permit ip object-group Juniper object-group Holly-AV
    access-list CSM_FW_ACL_DMZ extended permit tcp object-group Juniper object-group Beech-Exchange eq smtp
    access-list CSM_FW_ACL_DMZ extended permit tcp object-group Juniper object-group HHP_Domain_Controllers eq domain
    access-list CSM_FW_ACL_DMZ extended permit udp object-group Juniper object-group HHP_Domain_Controllers eq domain
    access-list CSM_FW_ACL_DMZ remark for backups to USB drive on ASH
    access-list CSM_FW_ACL_DMZ extended permit object-group TCP-445 object-group Juniper object-group Ash
    access-list CSM_FW_ACL_DMZ extended permit object-group UDP-445 object-group Juniper object-group Ash
    access-list CSM_FW_ACL_DMZ extended permit object-group tcp-udp-135-139 object-group Juniper object-group Ash
    access-list CSM_FW_ACL_DMZ extended deny ip any any
    access-list CNES_Support_splitTunnelAcl standard permit 192.168.168.0 255.255.255.0
    access-list RemoteAccess_splitTunnelAcl standard permit 192.168.168.0 255.255.255.0
    access-list outside_cryptomap extended permit ip object-group HHP_Server_Network object-group NET-cnes_HHP-Sty
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1492
    mtu DMZ 1500
    mtu Wireless_HHP 1500
    mtu CNES 1500
    ip local pool CNES_Access 192.168.168.230-192.168.168.249
    ip local pool MIS_Support 192.168.168.250-192.168.168.251
    ip local pool OLM-VPN-Pool 192.168.168.252
    ip local pool HHP_Remote_Access_Pool 192.168.168.200-192.168.168.229
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    nat-control
    global (outside) 1 interface
    nat (inside) 0 access-list inside_nat0_outbound
    nat (inside) 1 0.0.0.0 0.0.0.0
    nat (Wireless_HHP) 1 172.20.193.53 255.255.255.255
    nat (Wireless_HHP) 1 172.20.225.0 255.255.255.0
    static (inside,CNES) 192.168.168.0 192.168.168.0 netmask 255.255.255.0
    static (CNES,inside) 187.187.0.0 255.255.0.0 netmask 255.255.0.0
    static (Wireless_HHP,inside) 172.20.224.0 172.20.224.0 netmask 255.255.240.0
    static (inside,Wireless_HHP) 192.168.168.0 192.168.168.0 netmask 255.255.255.0
    static (CNES,Wireless_HHP) 187.187.0.0 187.187.0.0 netmask 255.255.0.0
    static (inside,outside) 217.36.32.210 192.168.168.91 netmask 255.255.255.255
    static (DMZ,outside) 217.36.32.211 192.168.169.5 netmask 255.255.255.255
    static (inside,DMZ) 192.168.168.0 192.168.168.0 netmask 255.255.255.0
    static (CNES,DMZ) 187.0.0.0 187.0.0.0 netmask 255.0.0.0
    access-group CSM_FW_ACL_inside in interface inside
    access-group outside_access_in_1 in interface outside control-plane
    access-group outside_access_in in interface outside
    access-group CSM_FW_ACL_DMZ in interface DMZ
    access-group CSM_FW_ACL_Wireless_HHP in interface Wireless_HHP
    access-group CSM_FW_ACL_CNES in interface CNES
    route outside 0.0.0.0 0.0.0.0 81.148.0.157 1
    route Wireless_HHP 172.20.192.0 255.255.240.0 172.16.36.3 1
    route Wireless_HHP 172.20.224.0 255.255.240.0 172.16.36.2 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server HHP protocol ldap
    aaa-server HHP (inside) host 192.168.168.2
    timeout 5
    ldap-base-dn dc=hhp,dc=com
    ldap-scope subtree
    ldap-naming-attribute sAMAccountName
    ldap-login-password *
    ldap-login-dn cn=gramor,cn=users,dc=hhp,dc=com
    server-type microsoft
    aaa-server HHP_1 protocol ldap
    aaa-server HHP_1 (inside) host 192.168.168.2
    timeout 5
    ldap-base-dn dc=hhp,dc=com
    ldap-scope subtree
    ldap-naming-attribute sAMAccountName
    ldap-login-password *
    ldap-login-dn cn=administrator,cn=users,dc=hhp,dc=com
    server-type microsoft
    aaa-server HHP_3 protocol ldap
    aaa-server HHP_3 (inside) host 192.168.168.2
    timeout 5
    ldap-base-dn dc=hhp,dc=com
    ldap-scope subtree
    ldap-naming-attribute sAMAccountName
    ldap-login-password *
    ldap-login-dn cn=administrator,cn=users,dc=hhp,dc=com
    server-type microsoft
    aaa authentication ssh console LOCAL
    aaa authentication http console LOCAL
    http server enable
    http 192.168.1.0 255.255.255.0 inside
    http 192.168.168.0 255.255.255.0 inside
    http 0.0.0.0 0.0.0.0 outside
    http 194.83.245.242 255.255.255.255 outside
    http 187.187.1.72 255.255.255.255 CNES
    http 187.187.10.90 255.255.255.255 CNES
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto dynamic-map outside_map_dynamic 2 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outside_map 1 match address outside_cryptomap
    crypto map outside_map 1 set peer 81.136.160.237
    crypto map outside_map 1 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outside_map 30001 ipsec-isakmp dynamic outside_map_dynamic
    crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outside_map interface outside
    crypto ca trustpoint ASDM_TrustPoint0
    enrollment terminal
    fqdn none
    subject-name O=Hebridean Housing Partnership Limited,CN=secure-access.hebrideanhousing.co.uk,L=Isle of Lewis,ST=Scotland,C=GB
    keypair SSL_Certificate
    crl configure
    crypto ca trustpoint ASDM_TrustPoint1
    enrollment terminal
    fqdn none
    crl configure
    crypto ca certificate chain ASDM_TrustPoint0
    certificate 0100000000012790a5c005
        30820530 30820418 a0030201 02020b01 00000000 012790a5 c005300d 06092a86
        4886f70d 01010505 00306a31 23302106 0355040b 131a4f72 67616e69 7a617469
        6f6e2056 616c6964 6174696f 6e204341 31133011 06035504 0a130a47 6c6f6261
        6c536967 6e312e30 2c060355 04031325 476c6f62 616c5369 676e204f 7267616e
        697a6174 696f6e20 56616c69 64617469 6f6e2043 41301e17 0d313030 33323431
        34313835 385a170d 31333033 32343134 31383534 5a308197 310b3009 06035504
        06130247 42311130 0f060355 04081308 53636f74 6c616e64 31163014 06035504
        07130d49 736c6520 6f66204c 65776973 312e302c 06035504 0a132548 65627269
        6465616e 20486f75 73696e67 20506172 746e6572 73686970 204c696d 69746564
        312d302b 06035504 03132473 65637572 652d6163 63657373 2e686562 72696465
        616e686f 7573696e 672e636f 2e756b30 82012230 0d06092a 864886f7 0d010101
        05000382 010f0030 82010a02 82010100 def181d9 c34c58a8 9abcc849 7d8ad0a9
        3c64c77f f3126c81 30911f41 5903a92c 81fb374b 2fe2680e 10b26dce 81ca0c23
        af2c9f9a 52295e8c d2223fa6 7c4c386d 51c6fb16 a47688e6 e47e2410 b0283503
        fd72abd3 e59d3b02 cd47706e babf948c 4e0282a3 5f789ff7 8041b2db ceac64eb
        3e163b38 3a8ecc25 0c4802a8 d17fecd9 f1a36288 29202df4 b20ae891 f95ce055
        6e670559 3d075024 7f3ac7ef 26218154 a7f6a399 34c43c4a 97c2c88c c4588ee4
        77cc2ad8 b1bd868d d55c2b9b 727e9904 66d0fb52 c212abd7 a06f28f1 ad2aa04b
        3d7b3094 c59c00d4 cf51fefb d8bfa101 8ba9c4ba 5cf629ff c50716d3 71019a98
        8fa55b83 6b158b6d 1043f092 646ef07d 02030100 01a38201 a7308201 a3301f06
        03551d23 04183016 80147d6d 2aec66ab a75136ab 0269f170 8fc4590b 9a1f3049
        06082b06 01050507 0101043d 303b3039 06082b06 01050507 3002862d 68747470
        3a2f2f73 65637572 652e676c 6f62616c 7369676e 2e6e6574 2f636163 6572742f
        6f726776 312e6372 74303f06 03551d1f 04383036 3034a032 a030862e 68747470
        3a2f2f63 726c2e67 6c6f6261 6c736967 6e2e6e65 742f4f72 67616e69 7a617469
        6f6e5661 6c312e63 726c301d 0603551d 0e041604 14d398d5 ddf29355 15b04750
        baccc6b3 0f97a6c9 94302f06 03551d11 04283026 82247365 63757265 2d616363
        6573732e 68656272 69646561 6e686f75 73696e67 2e636f2e 756b3009 0603551d
        13040230 00300e06 03551d0f 0101ff04 04030205 a0302906 03551d25 04223020
        06082b06 01050507 03010608 2b060105 05070302 060a2b06 01040182 370a0303
        304b0603 551d2004 44304230 4006092b 06010401 a0320114 30333031 06082b06
        01050507 02011625 68747470 3a2f2f77 77772e67 6c6f6261 6c736967 6e2e6e65
        742f7265 706f7369 746f7279 2f301106 09608648 0186f842 01010404 030206c0
        300d0609 2a864886 f70d0101 05050003 82010100 8af3be01 c4830d83 9b347355
        de7496ef bd76b86c ee92f32f 1157ef11 6ad949b6 611537ad 81f06408 73ec6fe2
        6466675c cf31a80f bead422d ec574f95 55fe0b7a 97e271e7 0220c7b1 53376843
        ff7f7280 f9bfdee6 3584e123 00c37d9f 5004b766 9469ead5 f002744c fd50271c
        6bcdb54c e5db85aa 9760a330 d72464a2 bc8ecdff d80bbc27 7551e97c ee9b7078
        9207f9d6 b969a47a 6df722b6 14ce803d 8d4bb9e9 4695e8e6 d453950e 06506594
        ec7652ea 365cdf94 90e2f7ee 855dadb5 c0459d73 bb6d01a8 3c076718 7f80de40
        c5eb9e0e 17c93087 fd5c5fc1 fd6401fe 7e5038b1 3da1d250 01ccd8be 964d5557
        b320c4c1 0015d1b7 daad7527 930b0c90 7711704f
      quit
    crypto ca certificate chain ASDM_TrustPoint1
    certificate ca 0400000000011e44a5f52a
        30820467 3082034f a0030201 02020b04 00000000 011e44a5 f52a300d 06092a86
        4886f70d 01010505 00305731 0b300906 03550406 13024245 31193017 06035504
        0a131047 6c6f6261 6c536967 6e206e76 2d736131 10300e06 0355040b 1307526f
        6f742043 41311b30 19060355 04031312 476c6f62 616c5369 676e2052 6f6f7420
        4341301e 170d3037 30343131 31323030 30305a17 0d313730 34313131 32303030
        305a306a 31233021 06035504 0b131a4f 7267616e 697a6174 696f6e20 56616c69
        64617469 6f6e2043 41311330 11060355 040a130a 476c6f62 616c5369 676e312e
        302c0603 55040313 25476c6f 62616c53 69676e20 4f726761 6e697a61 74696f6e
        2056616c 69646174 696f6e20 43413082 0122300d 06092a86 4886f70d 01010105
        00038201 0f003082 010a0282 010100a1 2fc4bcce 8703e967 c189c8e5 93fc7db4
        ad9ef663 4e6ae89c 2c7389a2 01f48f21 f8fd259d 58166d86 f6ee4957 757e75ea
        22117e3d fbc74241 dcfcc50c 9155807b eb64331d 9bf9ca38 e9abc625 43512540
        f4e47e18 556aa98f 103a401e d65783ef 7f2f342f 2dd2f653 c2190db7 edc981f5
        462cb423 425e9d13 0375ecea 6afc577c c936973b 98dc1313 ecec41fa 5d34eab9
        93e71016 65cc9c92 fdf5c59d 3e4ab909 fce45f1e 695f4df4 567244b1 1d2303c8
        36f66588 c8bf3916 458e1e26 6c5116c5 2a0038c5 a4136995 7dab013b a8c414b4
        80daac1a 4420d5fe a9067b14 27afe030 21dd90f4 a9d52319 2e1e03e6 c1df9529
        e4c19443 dd3e90aa cb4bc9be 8ad33902 03010001 a382011f 3082011b 300e0603
        551d0f01 01ff0404 03020106 30120603 551d1301 01ff0408 30060101 ff020100
        301d0603 551d0e04 1604147d 6d2aec66 aba75136 ab0269f1 708fc459 0b9a1f30
        4b060355 1d200444 30423040 06092b06 010401a0 32011430 33303106 082b0601
        05050702 01162568 7474703a 2f2f7777 772e676c 6f62616c 7369676e 2e6e6574
        2f726570 6f736974 6f72792f 30330603 551d1f04 2c302a30 28a026a0 24862268
        7474703a 2f2f6372 6c2e676c 6f62616c 7369676e 2e6e6574 2f726f6f 742e6372
        6c301106 09608648 0186f842 01010404 03020204 30200603 551d2504 19301706
        0a2b0601 04018237 0a030306 09608648 0186f842 0401301f 0603551d 23041830
        16801460 7b661a45 0d97ca89 502f7d04 cd34a8ff fcfd4b30 0d06092a 864886f7
        0d010105 05000382 01010079 47fc15d7 4c79df0f 7a9eced4 7c4b63c9 89b57b3f
        9912e89c 8c9a492f e04e954a edc7bcbe f1a2db8e 931dba71 54aa4bd9 89222487
        c504a8ac 8252a052 f8b8e14f a1276663 214a39e7 c7c54e5f b2d61d13 6d30e9ce
        d7a21cbc 290a733c 5b2349fe d6ffcab0 4ff5f267 98c04711 f8b748a6 9009d642
        beeab1b9 5342c39c 20c9fba1 5bb5566d 8781c860 acc4b972 270a8e1e a8b12ecd
        32a27857 b09cf895 bb438e8c 31866e53 0dc61205 ba416ea8 35300918 1d0261ff
        fdee35de 6ac33bd0 4d4b4e50 b256360c 445dda1a 652ae698 56a96333 2e04e7ae
        e8f48eb7 b2da7dc0 c8e2aea6 282fe3c9 73bdfc07 4134b7aa 6eeea7db d1933ced
        90ec3292 88d9c823 6c7421
      quit
    crypto isakmp identity hostname
    crypto isakmp enable outside
    crypto isakmp policy 10
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    crypto isakmp policy 30
    authentication pre-share
    encryption 3des
    hash sha
    group 1
    lifetime 86400
    telnet 0.0.0.0 0.0.0.0 inside
    telnet timeout 5
    ssh 187.187.1.41 255.255.255.255 inside
    ssh 187.187.1.72 255.255.255.255 inside
    ssh 187.187.77.81 255.255.255.255 inside
    ssh 187.187.10.19 255.255.255.255 inside
    ssh 187.187.10.229 255.255.255.255 inside
    ssh 187.187.160.7 255.255.255.255 inside
    ssh 187.187.1.41 255.255.255.255 outside
    ssh 187.187.1.72 255.255.255.255 outside
    ssh 187.187.77.81 255.255.255.255 outside
    ssh 187.187.10.19 255.255.255.255 outside
    ssh 187.187.10.229 255.255.255.255 outside
    ssh 187.187.160.7 255.255.255.255 outside
    ssh timeout 15
    console timeout 0
    vpdn group BT request dialout pppoe
    vpdn group BT localname B*******.btclick.com
    vpdn group BT ppp authentication chap
    vpdn username B*******@hg39.btclick.com password *********
    dhcpd auto_config outside
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    ssl trust-point ASDM_TrustPoint0 outside
    ssl trust-point ASDM_TrustPoint0 outside vpnlb-ip
    webvpn
    enable inside
    enable outside
    group-policy HHP_Remote_Access_1 internal
    group-policy HHP_Remote_Access_1 attributes
    wins-server value 192.168.168.2 192.168.168.2
    dns-server value 192.168.168.2 192.168.168.3
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value CNES_Support_splitTunnelAcl
    group-policy HHP_Remote_Access internal
    group-policy HHP_Remote_Access attributes
    wins-server value 192.168.168.2 192.168.168.2
    dns-server value 192.168.168.2 192.168.168.3
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value CNES_Support_splitTunnelAcl
    group-policy Omfax internal
    group-policy Omfax attributes
    wins-server value 192.168.168.2 192.168.168.3
    dns-server value 192.168.168.2 192.168.168.3
    vpn-tunnel-protocol IPSec webvpn
    webvpn
      svc ask none default webvpn
    group-policy MIS_1 internal
    group-policy MIS_1 attributes
    wins-server value 192.168.168.2 192.168.168.3
    dns-server value 192.168.168.2 192.168.168.3
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value MIS_splitTunnelAcl
    default-domain value hhp.com
    group-policy RemoteAccess internal
    group-policy RemoteAccess attributes
    wins-server value 192.168.168.2 192.168.168.3
    dns-server value 192.168.168.2 192.168.168.3
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value RemoteAccess_splitTunnelAcl
    group-policy CNES_Access internal
    group-policy CNES_Access attributes
    wins-server value 192.168.168.2 192.168.168.3
    dns-server value 192.168.168.2 192.168.168.3
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value CNES_Support_splitTunnelAcl
    group-policy HHP internal
    group-policy HHP attributes
    dhcp-network-scope none
    vpn-access-hours none
    vpn-idle-timeout none
    vpn-session-timeout none
    vpn-filter none
    vpn-tunnel-protocol IPSec webvpn
    password-storage disable
    ip-comp disable
    re-xauth disable
    group-lock none
    pfs disable
    ipsec-udp disable
    split-tunnel-policy tunnelall
    split-tunnel-network-list none
    split-dns none
    secure-unit-authentication disable
    user-authentication disable
    user-authentication-idle-timeout none
    ip-phone-bypass disable
    leap-bypass disable
    nem disable
    backup-servers keep-client-config
    client-firewall none
    webvpn
      url-list value Severs
      filter none
      homepage none
      port-forward disable
      http-proxy disable
      sso-server none
      svc dtls none
      svc keep-installer none
      svc rekey time none
      svc rekey method none
      svc dpd-interval client none
      svc dpd-interval gateway none
      svc compression none
      svc modules none
      svc profiles none
      svc ask none default webvpn
      customization none
      http-comp none
      user-storage none
      storage-key none
      hidden-shares none
      smart-tunnel disable
      activex-relay disable
      file-entry disable
      file-browsing disable
      url-entry disable
      deny-message none
    group-policy MIS internal
    group-policy MIS attributes
    wins-server value 192.168.168.2 192.168.168.3
    dns-server value 192.168.168.2 192.168.168.3
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value MIS_splitTunnelAcl
    username test password Kg/Rgy23do7gPGTv encrypted privilege 0
    username test attributes
    vpn-group-policy HHP_Remote_Access
    username catneil password yOgiHCGobUNIkjcN encrypted privilege 0
    username omfax password pvUaCLwilGmQVifd encrypted privilege 0
    username backup password IHQbl.JAoESlM9Jv encrypted privilege 0
    username misadmin password 8IZXmHa67HIJYHK1 encrypted
    username misadmin attributes
    service-type remote-access
    username gramor password ne829U0rGFVEedhY encrypted privilege 15
    username gramor attributes
    vpn-group-policy HHP_Remote_Access
    webvpn
      url-list value Severs
    username aim_user password 5OQaWCdB18qiHlOn encrypted privilege 0
    username aim_user attributes
    vpn-group-policy CNES_Support
    username katask password 2WsX.HoqKXuiqkDk encrypted privilege 0
    username katask attributes
    vpn-group-policy CNES_Support
    username janboyd password ZEUyykwzME6hII2i encrypted privilege 0
    username marmor password C5n48AiRLXwxAeBQ encrypted privilege 0
    username marste password amwTL584WdiT87Tb encrypted privilege 0
    username helmah password RvU8c.3w0H3/MJz4 encrypted privilege 0
    username anglea password wGlUJDBrmJI.uz./ encrypted privilege 0
    username anglea attributes
    vpn-group-policy CNES_Support
    username fiobuc password 5Uispw90wqvDYerQ encrypted privilege 0
    tunnel-group DefaultRAGroup general-attributes
    authentication-server-group HHP_1
    tunnel-group DefaultWEBVPNGroup general-attributes
    authentication-server-group HHP_1
    default-group-policy HHP
    tunnel-group DefaultWEBVPNGroup webvpn-attributes
    nbns-server 192.168.168.2 timeout 2 retry 2
    nbns-server 192.168.168.3 timeout 2 retry 2
    tunnel-group WebVPN type remote-access
    tunnel-group WebVPN general-attributes
    authentication-server-group HHP_3
    default-group-policy HHP
    username-from-certificate UID
    tunnel-group CNES_Access

Maybe you are looking for