E4200 Static IP Issues

Hey,
I have assigned a Static IP with other Linksys/Cisco wireless routers (WRT54G), but I can't seem to get the E4200 to assign a Static IP. My device is connected to Port 3, with that being the only port (besides my WAN) being occupied. Here is my process.
Go to http://192.168.1.1
Login
Setup>Advanced Routing
NAT: Enabled
Static Routing
Route Entries: 1 ( )
Enter Route Name: Ooma
Destination LAN IP: 192.168.1.2
Subnet Mask: 255.255.255.0
Gateway: 192.168.1.1
Interface: LAN & Wireless
When I enter the following and click Save Settings I get the following error: "Invalid Static Route!"
I don't understand what I am doing wrong. This is the exact same as I have done on my WRT54G and it worked.
Does anybody have any clues or suggestions? 
Thanks!
Solved!
Go to Solution.

Haha! Oh man! Late nights just aren't good. I realized my error in the morning. I had previous used the Advanced Routing Static IP to route a Static IP to a another router a while back.
I was trying to assign a specific Static IP address to my Ooma Telo phone that is behind my E4200. I had thought that the Advanced Routing was how to do it. Not so.
I realized, in the morning, that the feature to assign a specific Static IP address with DHCP is in Setup>Basic Setup under DHCP Server Setting. It's called DHCP Reservation. There I was able to assign the Static IP I wanted for my Ooma and all is fine.
Sorry the hassle. But thank you for helping!

Similar Messages

  • E4200 v1 - NAT issue - and more....

    Please bear with me, I try to make things work - but my skills are not enough for this... Please help anyone..
    2 things:
    #1)
    I want to Disable NAT on my E4200 v1 with latest FW, since already my ADSL modem does this,... or the other way around - but it does not make much sense they both do it...
    My problem is how to set up the static route..
    ADSL modem
    IP:192.168.01  (GT784WN)  with NAT enabled, and all other filters disabled.
    E4200
    Internet IP: 192.168.0.2
    GW: 192.168.0.1
    LAN IP: 192.168.1.1
    How should I set up the static route on E4200 for things to work with NAT disabled?
    Would it make sense to disable NAT on the cable modem instead - and let E4200 handle that?
    If so - how would the routing have to be configured?
    #2)
    All my computers are connected to E4200, some with wire and some wireless....
    In Windows, Explorer, Network - On top there is supposed to be a list with recognized "Computers",
    What I see, varies A LOT....
    I always see the computer itself: MYFS01,
    and I always see the E4200 (MyHUB) (why this is here I don't understand either - I have Media services disabled in E4200)
    If I unplugg the E4200 from power... and plug back in again,.. I get ALL Computers listed... Backup device connected via LAN, some WiFi connected devices including my PlayBook,... - but after some time, anything from a few minutes to an hour - most "computers" dissapear from the list - and won't get back until I unplug the E4200.. A reboot of any of the computers does not work either...
    I have noticed - that When the list of "computers" in Windows are reduced, I am unable to do a "net view" from my main computer (MYFS01), but after I reboot the E4200, and devices pops up again,... doing a "net view" show all the computers...
    Also - While they do not show up in Windows Explorer, I can still access ALL computers and devices - with both \\IP access or \\computername ... 
    To test, I then took away the E4200 and used ONLY the ADSLmodem (GT784WN) - and I see all Computers always...
    Now I don't understand anything - I first thought this was a Windows 7 issue, but - since it seems to be working with another Switch/router - I suspect the E4200 to be the bad one... but - I could of course be wrong,,,,
    ANY assistance would be appreciated...
    thanx

    You are correct.  You do NOT want double NAT'ing going on.
    You need to put your GT784WN into bridge mode.
    Perform a Google search on "GT784WN bridge mode".  I found some good links that looked like they would help you do this.
    Putting your GT784WN into bridge mode will turn it into modem only.  You should also turn off all firewall, security, uPnP, wireless, etc settings on the GT784WN.  You need to dumb it down as much as possible.  The E4200 v1 needs to do all the work.
    This is exactly what I did with my Arris cable DOCSIS 3.0 router.

  • An E4200 "MegaThread" - FAQ, Issues, How to, etc

    Hi Cisco Community!  I've taken it on myself to make a kind of "mega-thread" for the E4200, because I see that there are a bunch of questions scattered around the forum, and (perhaps it's just me personally) I'd love to see things grouped together as one nice reference. I'm new to the forum, and to the E4200, but I'm loving it so far.  I'm not a forum mod or anything like that, I just thought it'd be nice to gather the issues/questions that Ive seen.
    Let's talk about the E4200!
    The Cisco E4200 is the latest high-end consumer router from LinkSys/Cisco, released in January of this year.
    **Whare are all of the vital stats for the E4200?
    See this web page:  http://homestore.cisco.com/en-us/Routers/Linksys-E4200-MaximumPerformance-Wirelessn-router_stcVVprod...
    **Which hard drives / flash drives work with the E4200?
    Here's a "tested" list:  http://www6.nohold.net/Cisco2/ukp.aspx?pid=80&app=vw&vw=1&login=1&docid=0542deb2fe8c469383f8c59723d2...
    Basically, any external drive (including ones you put together yourself) should work with the E4200, as long as you're using a drive formatted in FAT32, NTFS, or HFS+.
    **Can I wall mount the E4200?
    No, there are not any screwholes in the bottom of the device.  It's a common question though, because Cisco hasn't released any pictures of the bottom of the device.
    **Can I use a USB hub to connect more than 1 hard drive/flash drive device to the E4200?
    No, the USB hub will not be recognized by the router, therefore, the  devices connected to the hub will not be recognized.
    **Why is the light on the top of the router blinking?
    Most times it's normal, and I list normal operation below.  HOWEVER...
    There seems to be an issue in the 1.0 firmware that's been reported in these and other forums.  There is a concern that this is a security risk.  The thinking is that the router is stuck in "Wireless Protected Setup" mode, and waiting for connections.  Some / several users have reported that turning OFF WPS and going to "manual" mode (page 12 of manual) fixes the issue.  CISCO HAS NOT COMMENTED ON THIS ISSUE, and we REALLY want some information.
    You might get a blinking light that doesn't mean anything.  The blinking light, either in error, or as a part of normal operation, doesn't seem to affect performance.   
    Here's the "official/normal" reasons the light blinks:
    Wi-fi protected setup- When you're setting up a device, it's supposed to blink every two seconds.  If there's an error, it flashes quickly.
    Upgrades, Resets, power on - The light should flash slowly in these conditions.
    **The logging functions aren't working the way I expect / aren't working.
    This is also an issue that has been reported in these forums.  So far, it's unknown if this is an issue with the firmware, or how people have configured their routers.  At a minimum, the logs in this device are a lot more "skimpy" than other routers on the market.
    **What issues are Cisco / Linksys aware of?
    Check this page:  http://www6.nohold.net/Cisco2/ukp.aspx?pid=80&app=vw&vw=1&login=1&docid=3ba1589dc0734ff7978c9e9203d0...
    Most of the issues that Cisco are aware of are display issues with the internal Web interface, for instance, you can make a wireless password long enough to break the layout of the page.
    **The Web interface shows two wireless networks, with the same name, is this correct?
    YES, always make sure that the 5Ghz network and the 2.4Ghz network have the same name.  If you're using manual setup for shared keys, make the keys the same.  This enables your clients to roam between the two network types without reconnecting.  
    **The router is hot.  Is this normal?
    The processor in the E4200 runs hotter than room temperature.  In the first month or so of release, some people have reported that the router runs "hot" - most experience that the bottom of the router is warm to the touch.  
    **I'm comparing routers - which is better, the Netgear 3700 series, or the Cisco E4200?  
    You're in a E4200 thread, we're a bit biased.  But as objectively as possible, it's my recommendation you check out the E4200.  
    Netgear's 3700 series routers are currently experiencing several firmware issues (1.0.0.6 in the v2 of the router, 6.98 in the v1 of the router).  These issues are causing disconnects, slowness in the DLNA server (USB hard drive connection), and several versions of the device's firmware have port forwarding issues.  That said, the 3700 has some highlights over the E4200:
    1.  You can flash the firmware to an open source firmware.  Several are reporting that fixes many issues, but is more complex than the default interface. It's also a "power user" solution, so be comfortable with your know-how before attempting.
    2.  There's a few "known good" firmware releases for the 3700 that solve issues, but they are only compatible with the v1 of the 3700 (mostly off the market by now).
    3.  The web interface has more options in the 3700.
    4.  The forum community at Netgear seems to be really good.  
    The E4200 has been generally very well recieved, has had two issues that don't seem to affect performance (blinking light on top, logging failures), has a 90 day return policy, has a wireless download throughput of over 50M (blows away all other routers in this class), and generally speaking, out performs other routers in wired tests (anecdotal reports from forum users).  The E4200 also has a couple more options than the 3700, like being able to translate a port when doing port forwarding.
    The E4200 is much newer than the 3700 series.  It's generally accepted that we'll start to see more issues soon, as more people adopt the product.  Those issues COULD be deal breakers, who knows.
    Several people are taking a "wait and see" approach right now, but others (myself included) jumped from the 3700 to the E4200 because of gaming and other issues.  Anecdotally, I love the E4200!
    Some folks are waiting for the next Netgear router, the WDNR4000.  I needed a router now.  
    **There are several screens under Storage.  What does each do?
    Disk- Disk makes a Network share (SMB share).  This is good for computer devices on your network.  Although you can make the shares authenticated, the default is that everyone has read / write access to the folders on your disk.  The default location for your disk will be \\192.158.1.1\PARTITIONNAME (where PARTITIONNAME is the name of the share, which in turn is by default named the same as the partition; you can edit this name).  This screen also allows you to remove the disk drive safely from the router.
    Media Server- dedicated devices, like the Xbox 360, Playstation 3, several HDTVs, and more (including your computer) can stream music and video from your disk using the Media Server option.  The router uses a service called Twonky to create a DLNA server that you'll see listed in the video tab of your Xbox or PS3.  In this tab, you can specify how often the router should look for new videos on the disk, what to share, and what to call your media server.  
    FTP Server - You can also run an FTP server, for devices that can't access the disk any other way.  
    Admin - User management.
    **Quality of Service - what does it do, how do I set it up?
    QoS allows traffic through your router based on how important it is to you.  For instance, if your games are more important than downloading files, you can apply QoS to ensure that traffic for your games always gets through despite the downloads.
    QoS is automatically applied for wireless devices that support a standard called WMM.  You don't have to do a thing to apply this.
    For games, you'll need to add either applications or devices that get highest priority.  If you have an Xbox or PS3, you can "set it and forget it" by doing a MAC address rule, and adding your Xbox/PS3 as the highest priority device on your network.  If you want fine grained control over ports, etc - check from page 38 of the manual for details on configuring your applications.  If you don't have the manual, it's available for download here:  http://homedownloads.cisco.com/downloads/userguide/E4200_V10_UG_NC.pdf
    **How do I get an "Open NAT" on Xbox Live / PSN with this router?
    Many users will be plesantly suprised that the default settings of this router allow both the Xbox and PS3 through, usually with zero issues on NAT!  That said, if need be, you can do either Port Forwarding or Port Triggering.
    Port Forwarding - use this if you've added "Address reservation" for your PS3 or Xbox, AND you only have ONE (of each) in your house.
    Port Triggering - use this if you have 2 or more Xboxes, 2 or more PS3s, and you need all to connect simultaneously.  
    Check starting at Page 36 for more information on Port Forwarding/Triggering.  
    On Xbox Live, you'll want to open the following ports:  88,3074,1863, and 53.
    On PSN, open:    5223, 3478, 3479, 3658
    Check http://portforward.com/cports.htm for more games / information.
    **Does anyone know how to check what devices are connected to the E4200 via WIRELESS?
    Go into Status -> Local Network , and click on the "DHCP Client Table" button. (thanks kirkh)
    **How does Guest access work?
    Guest network access is an unencrypted wireless network that does not have access to your LAN.  You can assign the guest network any password you choose.  When a user connects to the guest network, they must then load a web browser. When they load the web browser, they'll be asked to enter the guest network password.
    Guest access is defined in more detail in the user manual, page 18.
    *****Conclusion*****
    I'll post more as more questions / items come up.  Unfortunately, we can't edit posts, so please note that information in this post is as accurate as I know it to be as of 1/25/2011.
    I invite other forum members to post question / answer format items, or generally discuss below.  I hope this helps some people, and I hope this doesn't seem excessive.

    **Does DHCP have to be on in the router to properly enable the Guest Network? 
    Yes.  No DHCP, no guest network.
    **How do I access the disk from iPhone, iTouch, iPad, Android, or Blackberry?
    Any application which allows you to access network resources will allow you to access the file share portion of the shared disk.  On Android, ES File Explorer allows you to access files, for example.  There are several apps available on the iPhone, such as NetPortal.  On Blackberry, try the FILES app.
    **Can multiple people access the shared hard drive at the same time?
    Yes, I've successfully streamed a movie to 4 devices simultaneously without any drops! 
    **Port forward to broadcast for WOL (Wake On LAN)?  I want to wake up my computer from the Internet, how do I do this?
    The current method isn't the BEST, but it seems to work:  You must reserve a DHCP address for the computer you want to wake in the DHCP reservation screen (basic setup page).  You must also put in the port forwarding rule for UDP port 6 or 7 to that computer, port being depending on your magic packet software. Currently, this allows for the Wake On Lan to work as long as the ARP table isn't flushed.  Because the magic packet is supposed to be pointed at the broadcast address, it's important to open the port to the broadcast address, but the JavaScript on the port forwarding page disallows this action.  Some people have intercepted the HTML on previous LinkSys routers (on the port forwarding screen) to...  Forum members will likely be trying this method on the E4200 soon - I'm not going to, as I don't have a need for WOL (let me know how it goes).
    **Is there a way to transfer settings from an old router to the E4200, like port forwarding, WEP/WPA keys, etc?
    No, there's no automatic way to transfer the settings.  Many of your old settings (WEP, HAHAHA) are obsolete anyway.
    **Is the E4200 DLNA certified?
    If it's not directly certified, it doesn't really matter.  The media server seems to work with everything I've thrown at it - Xbox, PS3, Media Center, etc etc  Technically, the box and the ad materials all state "UPnP AV Media Server", not specifically DLNA, so it's probably not actually certified at this point.  The server is TwonkyServer it looks like (the icon is the same T icon).

  • ASA 5510 Multiple Public IP - Static NAT Issue - Dynamic PAT - SMTP

    Running into a little bit of a roadblock and hoping someone can help me figure out what the issue is.  My guess right now is that it has something to do with dynamic PAT.
    Essentially, I have a block of 5 static public IP's.  I have 1 assigned to the interface and am using another for email/webmail.  I have no problems accessing the internet, receving emails, etc...  The issue is that the static NAT public IP for email is using the outside IP instead of the one assigned through the static NAT.  I would really appreciate if anyone could help shed some light as to why this is happening for me.  I always thought a static nat should take precidence in the order of things.
    Recap:
    IP 1 -- 10.10.10.78 is assigned to outside interface.  Dynamic PAT for all network objects to use this address when going out.
    IP 2 -- 10.10.10.74 is assgned through static nat to email server.  Email server should respond to and send out using this IP address.
    Email server gets traffic from 10.10.10.74 like it is supposed to, but when sending out shows as 10.10.10.78 instead of 10.10.10.74.
    Thanks in advance for anyone that reads this and can lend a hand.
    - Justin
    Here is my running config (some items like IP's, domain names, etc... modified to hide actual values; ignore VPN stuff -- still work in progress):
    ASA Version 8.4(3)
    hostname MYHOSTNAME
    domain-name MYDOMAIN.COM
    enable password msTsgJ6BvY68//T7 encrypted
    passwd msTsgJ6BvY68//T7 encrypted
    names
    interface Ethernet0/0
    speed 100
    duplex full
    nameif outside
    security-level 0
    ip address 10.10.10.78 255.255.255.248
    interface Ethernet0/1
    nameif inside
    security-level 100
    ip address 192.168.2.2 255.255.255.0
    interface Ethernet0/2
    shutdown
    no nameif
    no security-level
    no ip address
    interface Ethernet0/3
    shutdown
    no nameif
    no security-level
    no ip address
    interface Management0/0
    nameif management
    security-level 100
    ip address 192.168.1.1 255.255.255.0
    management-only
    boot system disk0:/asa843-k8.bin
    ftp mode passive
    clock timezone CST -6
    clock summer-time CDT recurring
    dns server-group DefaultDNS
    domain-name MYDOMAIN.COM
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object network obj_any
    subnet 0.0.0.0 0.0.0.0
    object network inside-network
    subnet 192.168.2.0 255.255.255.0
    object network Email
    host 192.168.2.7
    object network Webmail
    host 192.168.2.16
    object network WebmailSecure
    host 192.168.2.16
    access-list inside_access_out extended permit ip any any
    access-list inside_access_out extended permit icmp any any
    access-list VPN_Split_Tunnel_List remark The corporate network behind the ASA (inside)
    access-list VPN_Split_Tunnel_List standard permit 192.168.2.0 255.255.255.0
    access-list outside_access_in extended deny icmp any any
    access-list outside_access_in extended permit tcp any object Email eq smtp
    access-list outside_access_in extended permit tcp any object Webmail eq www
    access-list outside_access_in extended permit tcp any object WebmailSecure eq https
    pager lines 24
    logging asdm informational
    mtu outside 1500
    mtu inside 1500
    mtu management 1500
    icmp unreachable rate-limit 1 burst-size 1
    asdm image disk0:/asdm-647.bin
    asdm history enable
    arp timeout 14400
    nat (inside,outside) source static inside-network inside-network destination static inside-network inside-network no-proxy-arp route-lookup
    object network obj_any
    nat (inside,outside) dynamic interface
    object network Email
    nat (inside,outside) static 10.10.10.74 service tcp smtp smtp
    object network Webmail
    nat (inside,outside) static 10.10.10.74 service tcp www www
    object network WebmailSecure
    nat (inside,outside) static 10.10.10.74 service tcp https https
    access-group outside_access_in in interface outside
    access-group inside_access_out out interface inside
    route outside 0.0.0.0 0.0.0.0 10.10.10.73 1
    timeout xlate 3:00:00
    timeout pat-xlate 0:00:30
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server MYDOMAIN protocol kerberos
    aaa-server MYDOMAIN (inside) host 192.168.2.8
    kerberos-realm MYDOMAIN.COM
    aaa-server MYDOMAIN (inside) host 192.168.2.9
    kerberos-realm MYDOMAIN.COM
    aaa-server MY-LDAP protocol ldap
    aaa-server MY-LDAP (inside) host 192.168.2.8
    ldap-base-dn DC=MYDOMAIN,DC=com
    ldap-group-base-dn DC=MYDOMAIN,DC=com
    ldap-scope subtree
    ldap-naming-attribute sAMAccountName
    ldap-login-password *****
    ldap-login-dn CN=SOMEUSER,CN=Users,DC=MYDOMAIN,DC=com
    server-type microsoft
    aaa-server MY-LDAP (inside) host 192.168.2.9
    ldap-base-dn DC=MYDOMAIN,DC=com
    ldap-group-base-dn DC=MYDOMAIN,DC=com
    ldap-scope subtree
    ldap-naming-attribute sAMAccountName
    ldap-login-password *****
    ldap-login-dn CN=SOMEUSER,CN=Users,DC=MYDOMAIN,DC=com
    server-type microsoft
    user-identity default-domain LOCAL
    http server enable
    http 192.168.1.0 255.255.255.0 management
    http 192.168.2.0 255.255.255.0 inside
    http redirect outside 80
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec ikev2 ipsec-proposal AES256
    protocol esp encryption aes-256
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES192
    protocol esp encryption aes-192
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES
    protocol esp encryption aes
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal 3DES
    protocol esp encryption 3des
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal DES
    protocol esp encryption des
    protocol esp integrity sha-1 md5
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
    crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outside_map interface outside
    crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map inside_map interface inside
    crypto ca trustpoint ASDM_TrustPoint0
    enrollment self
    email [email protected]
    subject-name CN=MYHOSTNAME
    ip-address 10.10.10.78
    proxy-ldc-issuer
    crl configure
    crypto ca certificate chain ASDM_TrustPoint0
    certificate e633854f
        30820298 30820201 a0030201 020204e6 33854f30 0d06092a 864886f7 0d010105
        0500305e 31143012 06035504 03130b47 46472d53 55532d41 53413146 301a0609
        2a864886 f70d0109 08130d39 382e3130 302e3232 322e3738 30280609 2a864886
        f70d0109 02161b47 46472d53 55532d41 53412e47 46472d50 4541424f 44592e43
        4f4d301e 170d3132 30343131 30373431 33355a17 0d323230 34303930 37343133
        355a305e 31143012 06035504 03130b47 46472d53 55532d41 53413146 301a0609
        2a864886 f70d0109 08130d39 382e3130 302e3232 322e3738 30280609 2a864886
        f70d0109 02161b47 46472d53 55532d41 53412e47 46472d50 4541424f 44592e43
        4f4d3081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100b4
        aa6e27de fbf8492b 74ba91aa e0fd8361 e0e85a31 f95c380d 6e5f43ac a695a810
        f50e893b 82b91870 a32f7e38 8f392607 7a69c814 36a71a9c 2dccca07 24fe7f88
        0f3451ed c64e85fc 8359c87e 62ebf166 0a570ac5 f9f1c64b 262eca66 ea05ab65
        78da1ac2 9867a115 b14a6ba1 cd82d04e 00fc6557 856f7c04 ab1b08a0 b9de8b02
        03010001 a3633061 300f0603 551d1301 01ff0405 30030101 ff300e06 03551d0f
        0101ff04 04030201 86301f06 03551d23 04183016 801430cf 97ef92bb 678e3ba3
        0002069c 8130550a 2664301d 0603551d 0e041604 1430cf97 ef92bb67 8e3ba300
        02069c81 30550a26 64300d06 092a8648 86f70d01 01050500 03818100 64c403bd
        d75717ab 24383e77 63e10ba7 4fdef625 73c5a952 19ceecbd 75bd23ca 86dc0298
        e6693a8a 2c7fb85f 096497a7 8d784ada a433ee0d d88e9219 f0615f3c 7814bf1c
        5b4fe847 7d8894eb 18fe2da7 05f15ae9 bc2c17ec 3a7831ee f95d6ced 4799fba2
        781c8228 48224843 dc07ebb5 d20abf2a b68cfa62 ac71a41b 1196a018
      quit
    crypto ikev2 policy 1
    encryption aes-256
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 10
    encryption aes-192
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 20
    encryption aes
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 30
    encryption 3des
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 40
    encryption des
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 enable outside client-services port 443
    crypto ikev2 enable inside client-services port 443
    crypto ikev2 remote-access trustpoint ASDM_TrustPoint0
    crypto ikev1 policy 10
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    telnet 192.168.2.0 255.255.255.0 inside
    telnet 192.168.1.0 255.255.255.0 management
    telnet timeout 20
    ssh timeout 5
    console timeout 0
    management-access inside
    dhcpd address 192.168.1.2-192.168.1.254 management
    dhcpd enable management
    threat-detection basic-threat
    threat-detection statistics
    threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
    ntp server 192.168.2.8 source inside prefer
    ssl trust-point ASDM_TrustPoint0 inside
    ssl trust-point ASDM_TrustPoint0 outside
    webvpn
    enable outside
    enable inside
    anyconnect-essentials
    anyconnect image disk0:/anyconnect-win-3.0.5080-k9.pkg 1
    anyconnect profiles VPN_client_profile disk0:/VPN_client_profile.xml
    anyconnect enable
    tunnel-group-list enable
    group-policy DfltGrpPolicy attributes
    vpn-tunnel-protocol ikev1 l2tp-ipsec
    group-policy GroupPolicy_VPN internal
    group-policy GroupPolicy_VPN attributes
    wins-server value 192.168.2.8 192.168.2.9
    dns-server value 192.168.2.8 192.168.2.9
    vpn-filter value VPN_Split_Tunnel_List
    vpn-tunnel-protocol ikev2 ssl-client
    group-lock value VPN
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value VPN_Split_Tunnel_List
    default-domain value MYDOMAIN.COM
    webvpn
      anyconnect profiles value VPN_client_profile type user
    group-policy GroupPolicy-VPN-LAPTOP internal
    group-policy GroupPolicy-VPN-LAPTOP attributes
    wins-server value 192.168.2.8 192.168.2.9
    dns-server value 192.168.2.8 192.168.2.9
    vpn-filter value VPN_Split_Tunnel_List
    vpn-tunnel-protocol ikev2
    group-lock value VPN-LAPTOP
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value VPN_Split_Tunnel_List
    default-domain value MYDOMAIN.COM
    webvpn
      anyconnect profiles value VPN_client_profile type user
    tunnel-group VPN type remote-access
    tunnel-group VPN general-attributes
    authentication-server-group MYDOMAIN
    default-group-policy GroupPolicy_VPN
    dhcp-server 192.168.2.8
    dhcp-server 192.168.2.9
    dhcp-server 192.168.2.10
    tunnel-group VPN webvpn-attributes
    group-alias VPN enable
    tunnel-group VPN-LAPTOP type remote-access
    tunnel-group VPN-LAPTOP general-attributes
    authentication-server-group MY-LDAP
    default-group-policy GroupPolicy-VPN-LAPTOP
    dhcp-server 192.168.2.8
    dhcp-server 192.168.2.9
    dhcp-server 192.168.2.10
    tunnel-group VPN-LAPTOP webvpn-attributes
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect sqlnet
      inspect skinny 
      inspect sunrpc
      inspect xdmcp
      inspect sip 
      inspect netbios
      inspect tftp
      inspect ip-options
    class class-default
      user-statistics accounting
    service-policy global_policy global
    prompt hostname context
    no call-home reporting anonymous
    hpm topN enable
    Cryptochecksum:951faceacf912d432fc228ecfcdffd3f

    Hi ,
    As per you config :
    object network obj_any
    nat (inside,outside) dynamic interface
    object network Email
    nat (inside,outside) static 10.10.10.74 service tcp smtp smtp
    object network Webmail
    nat (inside,outside) static 10.10.10.74 service tcp www www
    object network WebmailSecure
    nat (inside,outside) static 10.10.10.74 service tcp https https
    object network obj_any
    subnet 0.0.0.0 0.0.0.0
    object network inside-network
    subnet 192.168.2.0 255.255.255.0
    object network Email
    host 192.168.2.7
    object network Webmail
    host 192.168.2.16
    object network WebmailSecure
    host 192.168.2.16
    The flows from email server ( 192.168.2.7 ) , will be NATed to 10.10.10.74, only if the source port is TCP/25. Any other souce port will use the interface IP for NAT.
      Are you saying that this is not happening ?
    Dan

  • STATIC IP issues from outside of firewall

    Hi
    I’m having one issue, we have static IP and we NAT the same to some local IP for our internal needs. Whenever we tried to reach the static IP from outside of firewall(some other network), it is working properly. But when we try to ping or use that static IP in internal LAN that is not working.
    192.168.0.149 is internal LAN I have NAT to 202.xxx.xxx.xxx static IP with port 80.
    Please help me on this.
    here is the device running configuration
    Result of the command: "show running-config"
    : Saved
    ASA Version 9.1(3) 
    hostname ciscoasa
    enable password 8Ry2YjIyt7RRXU24 encrypted
    names
    ip local pool clientpool 192.168.0.20-192.168.0.50 mask 255.255.255.0
    interface GigabitEthernet0/0
     nameif inside
     security-level 100
     ip address 192.168.0.5 255.255.255.0 
    interface GigabitEthernet0/1
     nameif outside
     security-level 0
     ip address 202.53.82.98 255.255.255.240 
    interface GigabitEthernet0/2
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/3
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/4
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/5
     shutdown
     no nameif
     no security-level
     no ip address
    interface Management0/0
     management-only
     nameif management
     security-level 100
     ip address 192.168.5.1 255.255.255.0 
    ftp mode passive
    dns domain-lookup outside
    dns server-group PW
     name-server 202.53.64.202
     name-server 202.53.72.13
     name-server 192.168.0.16
     name-server 192.168.0.8
    same-security-traffic permit intra-interface
    object network PW-LAN
     subnet 192.168.0.0 255.255.255.0
    object network USA
     subnet 192.168.2.0 255.255.255.0
    object network 202.53.82.110
     host 202.53.82.110
    object network PWHYD
     subnet 192.168.1.0 255.255.255.0
    object network 192.168.0.151
     host 192.168.0.151
    object network 192.168.0.154
     host 192.168.0.154
    object network 192.168.0.156
     host 192.168.0.156
    object network 192.168.0.158
     host 192.168.0.158
    object network 192.168.0.159
     host 192.168.0.159
    object network 192.168.0.149
     host 192.168.0.149
    object network Rackspace
     subnet 10.176.0.0 255.240.0.0
    object network NETWORK_OBJ_10.176.0.0_12
     subnet 10.176.0.0 255.240.0.0
    object network 192.168.0.147_http
     host 192.168.0.147
    object service http
     service tcp source eq www destination eq www 
    object network 192.168.0.14
     host 192.168.0.14
    object network 192.168.0.14_iCA
     host 192.168.0.14
    object network 192.168.0.159_http
     host 192.168.0.159
    object network 192.168.0.159_50100
     host 192.168.0.159
    object network 202.53.82.101
     host 202.53.82.101
    object network 192.168.0.159_8001
     host 192.168.0.159
    object network 192.168.0.192
     host 192.168.0.192
    object network 192.168.0.159_any
     host 192.168.0.159
    object network clientpool
     range 192.168.0.20 192.168.0.50
    object network NETWORK_OBJ_192.168.1.0_24
     subnet 192.168.1.0 255.255.255.0
    object network 192.168.0.192_DEV
     host 192.168.0.192
    object-group network PW-All-Sites
     network-object 192.168.0.0 255.255.255.0
     network-object object PWHYD
     network-object object USA
     network-object object clientpool
    access-list 100 extended permit ip any any 
    access-list 100 extended permit icmp any any 
    access-list l2l-list extended permit ip object-group PW-All-Sites 192.168.2.0 255.255.255.0 
    access-list outside_access_in extended permit ip any any 
    access-list outside_cryptomap extended permit ip object-group PW-All-Sites 192.168.1.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.0.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.1.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.2.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 10.176.0.0 255.240.0.0 
    access-list outside_cryptomap_3 extended permit ip object-group PW-All-Sites object Rackspace 
    access-list inside_access_in extended permit ip any any 
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    mtu management 1500
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    no arp permit-nonconnected
    nat (inside,outside) source static PW-LAN PW-LAN destination static Rackspace Rackspace
    nat (inside,outside) source static PW-LAN PW-LAN destination static PWHYD PWHYD
    nat (inside,outside) source static PW-LAN PW-LAN destination static USA USA
    nat (inside,outside) source dynamic PW-LAN interface
    nat (any,inside) source dynamic clientpool interface
    object network 192.168.0.151
     nat (any,any) static 202.53.82.102 service tcp 3200 3200 
    object network 192.168.0.154
     nat (any,any) static 202.53.82.104 service tcp 3201 3201 
    object network 192.168.0.156
     nat (any,any) static 202.53.82.107 service tcp 3201 3201 
    object network 192.168.0.158
     nat (any,any) static 202.53.82.109 service tcp 3222 3222 
    object network 192.168.0.159
     nat (any,any) static 202.53.82.101 service tcp 3201 3201 
    object network 192.168.0.149
     nat (inside,outside) static 202.53.82.100 service tcp www www 
    object network 192.168.0.147_http
     nat (any,any) static 202.53.82.110 service tcp www www 
    object network 192.168.0.14
     nat (any,any) static 202.53.82.99 service tcp https https 
    object network 192.168.0.14_iCA
     nat (any,any) static 202.53.82.99 service tcp citrix-ica citrix-ica 
    object network 192.168.0.159_50100
     nat (any,any) static 202.53.82.101 service tcp 50100 50100 
    object network 192.168.0.159_8001
     nat (any,any) static 202.53.82.101 service tcp 8001 8001 
    object network 192.168.0.192_DEV
     nat (any,any) static 202.53.82.106 service tcp 3201 3201 
    access-group inside_access_in in interface inside
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 202.53.82.97 1
    timeout xlate 3:00:00
    timeout pat-xlate 0:00:30
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server PW protocol radius
    aaa-server PW (inside) host 192.168.0.16
     key *****
    user-identity default-domain LOCAL
    http server enable
    http 192.168.5.0 255.255.255.0 management
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
    crypto ipsec ikev1 transform-set pwset esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set pwsethyd esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set RackspaceSet esp-3des esp-sha-hmac 
    crypto ipsec ikev2 ipsec-proposal RackSpaceSecure
     protocol esp encryption 3des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal pwhydsetsecure
     protocol esp encryption 3des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal secure
     protocol esp encryption aes 3des des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal AES256
     protocol esp encryption aes-256
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES192
     protocol esp encryption aes-192
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES
     protocol esp encryption aes
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal 3DES
     protocol esp encryption 3des
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal DES
     protocol esp encryption des
     protocol esp integrity sha-1 md5
    crypto ipsec security-association replay disable
    crypto ipsec security-association pmtu-aging infinite
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs 
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outsidemap 1 match address l2l-list
    crypto map outsidemap 1 set peer 63.82.1.98 
    crypto map outsidemap 1 set ikev1 transform-set pwset
    crypto map outsidemap 1 set ikev2 ipsec-proposal secure
    crypto map outsidemap 2 match address outside_cryptomap
    crypto map outsidemap 2 set pfs 
    crypto map outsidemap 2 set peer 115.119.186.194 
    crypto map outsidemap 2 set ikev1 transform-set pwsethyd
    crypto map outsidemap 3 match address outside_cryptomap_3
    crypto map outsidemap 3 set peer 67.192.250.53 
    crypto map outsidemap 3 set ikev1 transform-set RackspaceSet
    crypto map outsidemap 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outsidemap interface outside
    crypto ca trustpoint ASDM_TrustPoint0
     crl configure
    crypto ca trustpoint ASDM_TrustPoint1
     crl configure
    crypto ca trustpoint ASDM_TrustPoint2
     enrollment terminal
     fqdn vpn.processweaver.com
     subject-name CN=vpn.processweaver.com,OU=PWIT,O="ProcessWeaver,Inc",C=US,St=California,L=Fremont
     keypair ciscovpn.key
     no validation-usage
     crl configure
    crypto ca trustpoint ASDM_TrustPoint3
     enrollment terminal
     crl configure
    crypto ca trustpoint ASDM_TrustPoint4
     enrollment terminal
     crl configure
    crypto ca trustpool policy
    crypto ca certificate chain ASDM_TrustPoint2
     certificate ca 47869fe5
        3082046a 30820352 a0030201 02020447 869fe530 0d06092a 864886f7 0d010105 
        05003048 310b3009 06035504 06130255 53312030 1e060355 040a1317 53656375 
        72655472 75737420 436f7270 6f726174 696f6e31 17301506 03550403 130e5365 
        63757265 54727573 74204341 301e170d 30383132 32323233 34373339 5a170d32 
        38313232 32323334 3733395a 3081ae31 0b300906 03550406 13025553 3111300f 
        06035504 08130849 6c6c696e 6f697331 10300e06 03550407 13074368 69636167 
        6f312130 1f060355 040a1318 54727573 74776176 6520486f 6c64696e 67732c20 
        496e632e 31363034 06035504 03132d54 72757374 77617665 204f7267 616e697a 
        6174696f 6e205661 6c696461 74696f6e 2043412c 204c6576 656c2032 311f301d 
        06092a86 4886f70d 01090116 10636140 74727573 74776176 652e636f 6d308201 
        22300d06 092a8648 86f70d01 01010500 0382010f 00308201 0a028201 0100e814 
        eea0da97 bd89bd0c cc8ddf08 fb060983 a823515b 013f34da 1f1f6ec1 e35865cb 
        0af9f387 c8c8faa1 ccf574e2 b8ae2d06 8480286f 5ac1225c 929442cd 1902125c 
        10627ea2 44fb165e 9c72b1ac ea04e615 aa99e85a f858b987 24e875cd 2588e258 
        925e8683 7f8a2353 ae8ae8a3 217e83af 40091849 afe1d05a b04f6fe2 31adf4f1 
        371fc92a e18bd68c 1231d427 1adfea6b 9e7853ed 9a19b0ce 45445b1b ef645921 
        fac7b7d1 d30c1ecb 88dafd23 3ff4ac2b a04d61d3 becade19 616124f1 f69cb496 
        bd9deb17 9f243978 e92350d3 015077d8 52642f3e 194f75b9 17b1da8d e0d0eddb 
        3713dc2f e05f8068 d7f487ba c11f1278 d0082717 7a98a69f d221ba4e 87bf0203 
        010001a3 81f43081 f1300f06 03551d13 0101ff04 05300301 01ff301d 0603551d 
        0e041604 145dd996 9a40c727 cb2c9ba2 eccf19ab c8afcc86 48301f06 03551d23 
        04183016 80144232 b616fa04 fdfe5d4b 7ac3fdf7 4c401d5a 43af300b 0603551d 
        0f040403 02010630 34060355 1d1f042d 302b3029 a027a025 86236874 74703a2f 
        2f63726c 2e736563 75726574 72757374 2e636f6d 2f535443 412e6372 6c305b06 
        03551d20 04543052 300c060a 2b060104 0181ed18 03003042 060f2b06 01040181 
        ed180303 03030404 03302f30 2d06082b 06010505 07020116 21687474 703a2f2f 
        7777772e 73656375 72657472 7573742e 636f6d2f 6c656761 6c2f300d 06092a86 
        4886f70d 01010505 00038201 010053f1 c8a017ec 6c8882b1 c024afd1 0858b32c 
        6f7bc15c 89926f88 fc4bc002 50932f5a 419859b6 e37f8c14 63777d45 3c88505e 
        a6815200 c8c5fe48 ee1f5dad de440b42 589ce167 5c43b6a0 8598ff16 d41a28be 
        76e12fe1 84f47eb9 27aa77cb 36b3fec3 fad217f6 e1624ed3 ccccb319 65d34ba8 
        e8b3d54c eaf64eae cbae3448 1f60cc58 e7e774c9 0135fd6a e0588ad2 16ebece9 
        3ebbf01d cfb6ff1e 0cb7bb39 e9b7981b c05221eb 3a3d7838 8ca9195f 27a4d07f 
        3661ab24 7e9ff82d 3f922963 becb10db 0d403602 a0d417a2 8d7f7e7c 99af455a 
        40cda26b 5cbe0ef3 d387fca1 10caaa33 b7ba4bc0 3da4218c 179ccfd8 bfe657fe 
        cdebfa30 1ad5fee8 2597a9be 3bea
      quit
     certificate 0649f9a965553e7df2709c06c4da1b09e17cd9
        30820510 308203f8 a0030201 02021306 49f9a965 553e7df2 709c06c4 da1b09e1 
        7cd9300d 06092a86 4886f70d 01010505 003081ae 310b3009 06035504 06130255 
        53311130 0f060355 04081308 496c6c69 6e6f6973 3110300e 06035504 07130743 
        68696361 676f3121 301f0603 55040a13 18547275 73747761 76652048 6f6c6469 
        6e67732c 20496e63 2e313630 34060355 0403132d 54727573 74776176 65204f72 
        67616e69 7a617469 6f6e2056 616c6964 6174696f 6e204341 2c204c65 76656c20 
        32311f30 1d06092a 864886f7 0d010901 16106361 40747275 73747761 76652e63 
        6f6d301e 170d3134 30363131 30353330 33355a17 0d313530 32323331 31333033 
        355a3070 311e301c 06035504 030c1576 706e2e70 726f6365 73737765 61766572 
        2e636f6d 31163014 06035504 0a0c0d50 726f6365 73735765 61766572 31143012 
        06035504 070c0b53 616e7461 20436c61 72613113 30110603 5504080c 0a43616c 
        69666f72 6e696131 0b300906 03550406 13025553 30820122 300d0609 2a864886 
        f70d0101 01050003 82010f00 3082010a 02820101 00cc194c fbdd63f5 0b49141a 
        9d21063f a13136df e524cef9 c55e9331 e6c5bc67 43361421 cafb7dc1 d244942e 
        6fd02ee7 198e7f7e 48ca62c2 1c8e1a8e 20431d42 b24103f1 5fad9287 9f9dc2da 
        5002e0b4 cf14b414 31e0e691 26cfbc0c 1ee09d6d 8176a63d 6ad81c30 b2b69dbe 
        59ce7092 44c09e62 27f20c58 8bd8e38a a3d75a94 94bbca6f 7ad87b93 3892ddb0 
        3f00a693 e05b5fe8 7a71d36c 223e1ded 8afb8ee4 1eea579c 53d964df 467694e9 
        b7ffe4f9 22c6dd5e 33d0ffee 9fd57fed 621c62f1 4dc6f14e 6518de53 c2fd7d5d 
        b37913b8 69211fe5 e194a6bf f60bc88a 343a93dc 34526931 b41566e3 f38f219f 
        9a6cefd5 d6d60002 2442b3e5 b4096717 2ffea23d b1020301 0001a382 01623082 
        015e300b 0603551d 0f040403 0205a030 1d060355 1d250416 30140608 2b060105 
        05070302 06082b06 01050507 0301301d 0603551d 0e041604 14cd47cf 646a8932 
        7cecb024 9fd2a31a b54d73dc c0301f06 03551d23 04183016 80145dd9 969a40c7 
        27cb2c9b a2eccf19 abc8afcc 86483048 0603551d 20044130 3f303d06 0f2b0601 
        040181ed 18030303 03040403 302a3028 06082b06 01050507 0201161c 68747470 
        733a2f2f 73736c2e 74727573 74776176 652e636f 6d2f4341 30370603 551d1104 
        30302e82 1576706e 2e70726f 63657373 77656176 65722e63 6f6d8215 7774732e 
        70726f63 65737377 65617665 722e636f 6d303506 03551d1f 042e302c 302aa028 
        a0268624 68747470 3a2f2f63 726c2e74 72757374 77617665 2e636f6d 2f4f5643 
        415f4c32 2e63726c 30360608 2b060105 05070101 042a3028 30260608 2b060105 
        05073001 861a6874 74703a2f 2f6f6373 702e7472 75737477 6176652e 636f6d2f 
        300d0609 2a864886 f70d0101 05050003 82010100 0785070e 045d6201 3ffc49b5 
        88808587 b6418d0e 87dc7ae8 3204563b 6e51ff93 25e8ad7a 9a11d439 2439a533 
        768477ca 902fdfbe f0c58a04 e15bf6a5 63829d4b a36c7ccc 0af9532b f39ec31d 
        21cd6b74 d3adffc2 5f8ee1c4 92c07ac6 ab547346 c740f477 857a82fd 897029d5 
        1cfa9b55 b1064ab7 1274556c 6a14f7a8 b8705cd4 51d6b7f4 0a024f6d 1818918c 
        0cb15bc5 cd301684 38c2dcb8 2585b44c 18808e1b 823a6043 28da0194 280fa6c9 
        80831cbc 1179be24 fc391e54 965761e5 e51031e1 0c76c65f 187922d0 96be80c9 
        3de9a56e 41d0fd3f 76afaf49 4bc4ff4c 213aa474 60a742ba 2a8fb3bd c9349da3 
        1ac96b24 7b99cba5 a28c6647 7803cf2c ee70540c
      quit
    crypto ikev2 policy 10
     encryption 3des
     integrity sha
     group 2
     prf sha
     lifetime seconds 28800
    crypto ikev2 enable outside
    crypto ikev2 remote-access trustpoint ASDM_TrustPoint2
    crypto ikev1 enable outside
    crypto ikev1 policy 10
     authentication pre-share
     encryption 3des
     hash sha
     group 2
     lifetime 28800
    telnet timeout 5
    ssh timeout 5
    ssh key-exchange group dh-group1-sha1
    console timeout 0
    dhcpd address 192.168.5.2-192.168.5.254 management
    dhcpd enable management
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    ssl trust-point ASDM_TrustPoint2 outside
    webvpn
     enable outside
     anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
     anyconnect enable
     tunnel-group-list enable
    group-policy GroupPolicy_PWSSL internal
    group-policy GroupPolicy_PWSSL attributes
     wins-server none
     dns-server value 192.168.0.16
     vpn-tunnel-protocol ssl-client 
     split-tunnel-policy tunnelspecified
     split-tunnel-network-list value PW-VPN-Tunnel-ACL
     default-domain value processw.local
     webvpn
      anyconnect keep-installer none
    group-policy GroupPolicy_115.119.186.194 internal
    group-policy GroupPolicy_115.119.186.194 attributes
     vpn-tunnel-protocol ikev1 l2tp-ipsec 
    group-policy GroupPolicy_67.192.250.53 internal
    group-policy GroupPolicy_67.192.250.53 attributes
     vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless
    group-policy pw internal
    group-policy pw attributes
     dns-server value 192.168.0.16
     vpn-tunnel-protocol ikev1 ikev2 
     split-tunnel-policy tunnelspecified
     split-tunnel-network-list value PW-VPN-Tunnel-ACL
     default-domain none
    username rajuvaradha password 6biM7HbMtaadT82k encrypted
    username e172 password E1abOIw/eu.DKO/y encrypted
    username e150 password dJMsBQfrQRISuR8n encrypted
    username e134 password bLBixKKCoH5Udlk9 encrypted
    username e182 password mirFopEi/OG0LT4d encrypted
    username e192 password u2P6WXLa1k8.kA1w encrypted
    username e184 password Rpt/S1N6et6Xwi7W encrypted
    username u033 password pS5QN8QLvYFHJfoK encrypted
    username u011 password HGFsDnR5XiFAzrcE encrypted
    username u010 password 5R8mktMpyUYPCpTO encrypted
    username u032 password rst8O1b/yrXsKVmu encrypted
    username u002 password .u2izEtqOIC5D2fT encrypted
    username admin password eY/fQXw7Ure8Qrz7 encrypted
    username u012 password JClYI3r7x0T/ed26 encrypted
    username u015 password 6tNvtB4hPcUNDyhE encrypted
    username u014 password Wy6x8dPcSnMcAT1v encrypted
    username u017 password xahCXrBaZWzW8aEp encrypted
    username u006 password BCEOAmlRL6CbQfTV encrypted
    username e006 password DG96SZQ2gBqIXEYv encrypted
    username e034 password 1sG72DUjsY7nt81V encrypted
    username u007 password vtcK6xerueHvqZJZ encrypted
    username u016 password pZgySMnraNBlTTnL encrypted
    username u025 password ulAXIX1u2.UD/KvT encrypted
    username u008 password G4vmDF.mv3rXWa7h encrypted
    username u019 password NxlycJwroZrzCSJ3 encrypted
    username e019 password E9NaUPs18c0.PBnd encrypted
    username u018 password 33CghGQSMjbWDfdb encrypted
    username u009 password uaaSLEu55XXbD5Sr encrypted
    username u028 password UMFMzXMs6He7.zR8 encrypted
    username e097 password .UawdlGNiYnRHnzF encrypted
    username e314 password ye2/LpVufAXvAUJ6 encrypted
    username e327 password 6mKef3HGlnyb6hnu encrypted
    username e343 password 0g33Wbvzi.NL1PjH encrypted
    username e222 password e0.SFEwm1RqC6lLj encrypted
    username e289 password /YrO2mEvMUr9zxq3 encrypted
    username e201 password Eox2TB.HgdkKLuec encrypted
    username e265 password fTk7Vxw0Z06AAbHi encrypted
    username e251 password 6y7YjKQO1rP3nAQG encrypted
    username e219 password p049Lf7jFLisN6UJ encrypted
    username e269 password v7oFefIpmPGd307D encrypted
    tunnel-group 63.82.1.98 type ipsec-l2l
    tunnel-group 63.82.1.98 ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group pw type remote-access
    tunnel-group pw general-attributes
     address-pool clientpool
     default-group-policy pw
    tunnel-group pw ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group 115.119.186.194 type ipsec-l2l
    tunnel-group 115.119.186.194 general-attributes
     default-group-policy GroupPolicy_115.119.186.194
    tunnel-group 115.119.186.194 ipsec-attributes
     ikev1 pre-shared-key *****
     ikev2 remote-authentication pre-shared-key *****
     ikev2 local-authentication pre-shared-key *****
    tunnel-group 67.192.250.53 type ipsec-l2l
    tunnel-group 67.192.250.53 general-attributes
     default-group-policy GroupPolicy_67.192.250.53
    tunnel-group 67.192.250.53 ipsec-attributes
     ikev1 pre-shared-key *****
     ikev2 remote-authentication pre-shared-key *****
     ikev2 local-authentication pre-shared-key *****
    tunnel-group PWSSL type remote-access
    tunnel-group PWSSL general-attributes
     address-pool clientpool
     authentication-server-group PW LOCAL
     default-group-policy GroupPolicy_PWSSL
    tunnel-group PWSSL webvpn-attributes
     group-alias PWSSL enable
    class-map inspection_default
     match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
     parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
     class inspection_default
      inspect dns preset_dns_map 
      inspect ftp 
      inspect h323 h225 
      inspect h323 ras 
      inspect rsh 
      inspect rtsp 
      inspect esmtp 
      inspect sqlnet 
      inspect skinny  
      inspect sunrpc 
      inspect xdmcp 
      inspect sip  
      inspect netbios 
      inspect tftp 
      inspect ip-options 
      inspect icmp 
    service-policy global_policy global
    prompt hostname context 
    call-home reporting anonymous prompt 1
    Cryptochecksum:80663f0c45d0a6736344cf989a7af706
    : end

    Hi Marius,
    Thanks for your suggestion
    i have followed the same, but i'm still not able to access the static IP internal LAN. here is the running config out put.
    Result of the command: "show running-config"
    : Saved
    ASA Version 9.1(3) 
    hostname ciscoasa
    enable password 8Ry2YjIyt7RRXU24 encrypted
    names
    ip local pool clientpool 192.168.0.20-192.168.0.50 mask 255.255.255.0
    interface GigabitEthernet0/0
     nameif inside
     security-level 100
     ip address 192.168.0.5 255.255.255.0 
    interface GigabitEthernet0/1
     nameif outside
     security-level 0
     ip address 202.53.82.98 255.255.255.240 
    interface GigabitEthernet0/2
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/3
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/4
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/5
     shutdown
     no nameif
     no security-level
     no ip address
    interface Management0/0
     management-only
     nameif management
     security-level 100
     ip address 192.168.5.1 255.255.255.0 
    ftp mode passive
    dns domain-lookup outside
    dns server-group PW
     name-server 202.53.64.202
     name-server 202.53.72.13
     name-server 192.168.0.16
     name-server 192.168.0.8
    same-security-traffic permit intra-interface
    object network PW-LAN
     subnet 192.168.0.0 255.255.255.0
    object network USA
     subnet 192.168.2.0 255.255.255.0
    object network 202.53.82.110
     host 202.53.82.110
    object network PWHYD
     subnet 192.168.1.0 255.255.255.0
    object network 192.168.0.151
     host 192.168.0.151
    object network 192.168.0.154
     host 192.168.0.154
    object network 192.168.0.156
     host 192.168.0.156
    object network 192.168.0.158
     host 192.168.0.158
    object network 192.168.0.159
     host 192.168.0.159
    object network 192.168.0.149
     host 192.168.0.149
    object network Rackspace
     subnet 10.176.0.0 255.240.0.0
    object network NETWORK_OBJ_10.176.0.0_12
     subnet 10.176.0.0 255.240.0.0
    object network 192.168.0.147_http
     host 192.168.0.147
    object service http
     service tcp source eq www destination eq www 
    object network 192.168.0.14
     host 192.168.0.14
    object network 192.168.0.14_iCA
     host 192.168.0.14
    object network 192.168.0.159_http
     host 192.168.0.159
    object network 192.168.0.159_50100
     host 192.168.0.159
    object network 202.53.82.101
     host 202.53.82.101
    object network 192.168.0.159_8001
     host 192.168.0.159
    object network 192.168.0.192
     host 192.168.0.192
    object network 192.168.0.159_any
     host 192.168.0.159
    object network clientpool
     range 192.168.0.20 192.168.0.50
    object network NETWORK_OBJ_192.168.1.0_24
     subnet 192.168.1.0 255.255.255.0
    object network 192.168.0.192_DEV
     host 192.168.0.192
    object network 202.53.82.100
     host 202.53.82.100
    object network 149
     host 192.168.0.149
    object-group network PW-All-Sites
     network-object 192.168.0.0 255.255.255.0
     network-object object PWHYD
     network-object object USA
     network-object object clientpool
    access-list 100 extended permit ip any any 
    access-list 100 extended permit icmp any any 
    access-list l2l-list extended permit ip object-group PW-All-Sites 192.168.2.0 255.255.255.0 
    access-list outside_access_in extended permit ip any any 
    access-list outside_cryptomap extended permit ip object-group PW-All-Sites 192.168.1.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.0.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.1.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.2.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 10.176.0.0 255.240.0.0 
    access-list outside_cryptomap_3 extended permit ip object-group PW-All-Sites object Rackspace 
    access-list inside_access_in extended permit ip any any 
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    mtu management 1500
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    no arp permit-nonconnected
    nat (inside,outside) source static PW-LAN PW-LAN destination static Rackspace Rackspace
    nat (inside,outside) source static PW-LAN PW-LAN destination static PWHYD PWHYD
    nat (inside,outside) source static PW-LAN PW-LAN destination static USA USA
    nat (inside,outside) source dynamic PW-LAN interface
    nat (any,inside) source dynamic clientpool interface
    nat (inside,inside) source static PW-LAN PW-LAN destination static 192.168.0.149 202.53.82.100
    object network 192.168.0.151
     nat (any,any) static 202.53.82.102 service tcp 3200 3200 
    object network 192.168.0.154
     nat (any,any) static 202.53.82.104 service tcp 3201 3201 
    object network 192.168.0.156
     nat (any,any) static 202.53.82.107 service tcp 3201 3201 
    object network 192.168.0.158
     nat (any,any) static 202.53.82.109 service tcp 3222 3222 
    object network 192.168.0.159
     nat (any,any) static 202.53.82.101 service tcp 3201 3201 
    object network 192.168.0.147_http
     nat (any,any) static 202.53.82.110 service tcp www www 
    object network 192.168.0.14
     nat (any,any) static 202.53.82.99 service tcp https https 
    object network 192.168.0.14_iCA
     nat (any,any) static 202.53.82.99 service tcp citrix-ica citrix-ica 
    object network 192.168.0.159_50100
     nat (any,any) static 202.53.82.101 service tcp 50100 50100 
    object network 192.168.0.159_8001
     nat (any,any) static 202.53.82.101 service tcp 8001 8001 
    object network 192.168.0.192_DEV
     nat (any,any) static 202.53.82.106 service tcp 3201 3201 
    object network 149
     nat (any,any) static 202.53.82.100 service tcp www www 
    access-group inside_access_in in interface inside
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 202.53.82.97 1
    timeout xlate 3:00:00
    timeout pat-xlate 0:00:30
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server PW protocol radius
    aaa-server PW (inside) host 192.168.0.16
     key *****
    user-identity default-domain LOCAL
    http server enable
    http 192.168.5.0 255.255.255.0 management
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
    crypto ipsec ikev1 transform-set pwset esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set pwsethyd esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set RackspaceSet esp-3des esp-sha-hmac 
    crypto ipsec ikev2 ipsec-proposal RackSpaceSecure
     protocol esp encryption 3des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal pwhydsetsecure
     protocol esp encryption 3des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal secure
     protocol esp encryption aes 3des des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal AES256
     protocol esp encryption aes-256
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES192
     protocol esp encryption aes-192
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES
     protocol esp encryption aes
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal 3DES
     protocol esp encryption 3des
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal DES
     protocol esp encryption des
     protocol esp integrity sha-1 md5
    crypto ipsec security-association replay disable
    crypto ipsec security-association pmtu-aging infinite
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs 
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outsidemap 1 match address l2l-list
    crypto map outsidemap 1 set peer 63.82.1.98 
    crypto map outsidemap 1 set ikev1 transform-set pwset
    crypto map outsidemap 1 set ikev2 ipsec-proposal secure
    crypto map outsidemap 2 match address outside_cryptomap
    crypto map outsidemap 2 set pfs 
    crypto map outsidemap 2 set peer 115.119.186.194 
    crypto map outsidemap 2 set ikev1 transform-set pwsethyd
    crypto map outsidemap 3 match address outside_cryptomap_3
    crypto map outsidemap 3 set peer 67.192.250.53 
    crypto map outsidemap 3 set ikev1 transform-set RackspaceSet
    crypto map outsidemap 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outsidemap interface outside
    crypto ca trustpoint ASDM_TrustPoint0
     crl configure
    crypto ca trustpoint ASDM_TrustPoint1
     crl configure
    crypto ca trustpoint ASDM_TrustPoint2
     enrollment terminal
     fqdn vpn.processweaver.com
     subject-name CN=vpn.processweaver.com,OU=PWIT,O="ProcessWeaver,Inc",C=US,St=California,L=Fremont
     keypair ciscovpn.key
     no validation-usage
     crl configure
    crypto ca trustpoint ASDM_TrustPoint3
     enrollment terminal
     crl configure
    crypto ca trustpoint ASDM_TrustPoint4
     enrollment terminal
     crl configure
    crypto ca trustpool policy
    crypto ca certificate chain ASDM_TrustPoint2
     certificate ca 47869fe5
        3082046a 30820352 a0030201 02020447 869fe530 0d06092a 864886f7 0d010105 
        05003048 310b3009 06035504 06130255 53312030 1e060355 040a1317 53656375 
        72655472 75737420 436f7270 6f726174 696f6e31 17301506 03550403 130e5365 
        63757265 54727573 74204341 301e170d 30383132 32323233 34373339 5a170d32 
        38313232 32323334 3733395a 3081ae31 0b300906 03550406 13025553 3111300f 
        06035504 08130849 6c6c696e 6f697331 10300e06 03550407 13074368 69636167 
        6f312130 1f060355 040a1318 54727573 74776176 6520486f 6c64696e 67732c20 
        496e632e 31363034 06035504 03132d54 72757374 77617665 204f7267 616e697a 
        6174696f 6e205661 6c696461 74696f6e 2043412c 204c6576 656c2032 311f301d 
        06092a86 4886f70d 01090116 10636140 74727573 74776176 652e636f 6d308201 
        22300d06 092a8648 86f70d01 01010500 0382010f 00308201 0a028201 0100e814 
        eea0da97 bd89bd0c cc8ddf08 fb060983 a823515b 013f34da 1f1f6ec1 e35865cb 
        0af9f387 c8c8faa1 ccf574e2 b8ae2d06 8480286f 5ac1225c 929442cd 1902125c 
        10627ea2 44fb165e 9c72b1ac ea04e615 aa99e85a f858b987 24e875cd 2588e258 
        925e8683 7f8a2353 ae8ae8a3 217e83af 40091849 afe1d05a b04f6fe2 31adf4f1 
        371fc92a e18bd68c 1231d427 1adfea6b 9e7853ed 9a19b0ce 45445b1b ef645921 
        fac7b7d1 d30c1ecb 88dafd23 3ff4ac2b a04d61d3 becade19 616124f1 f69cb496 
        bd9deb17 9f243978 e92350d3 015077d8 52642f3e 194f75b9 17b1da8d e0d0eddb 
        3713dc2f e05f8068 d7f487ba c11f1278 d0082717 7a98a69f d221ba4e 87bf0203 
        010001a3 81f43081 f1300f06 03551d13 0101ff04 05300301 01ff301d 0603551d 
        0e041604 145dd996 9a40c727 cb2c9ba2 eccf19ab c8afcc86 48301f06 03551d23 
        04183016 80144232 b616fa04 fdfe5d4b 7ac3fdf7 4c401d5a 43af300b 0603551d 
        0f040403 02010630 34060355 1d1f042d 302b3029 a027a025 86236874 74703a2f 
        2f63726c 2e736563 75726574 72757374 2e636f6d 2f535443 412e6372 6c305b06 
        03551d20 04543052 300c060a 2b060104 0181ed18 03003042 060f2b06 01040181 
        ed180303 03030404 03302f30 2d06082b 06010505 07020116 21687474 703a2f2f 
        7777772e 73656375 72657472 7573742e 636f6d2f 6c656761 6c2f300d 06092a86 
        4886f70d 01010505 00038201 010053f1 c8a017ec 6c8882b1 c024afd1 0858b32c 
        6f7bc15c 89926f88 fc4bc002 50932f5a 419859b6 e37f8c14 63777d45 3c88505e 
        a6815200 c8c5fe48 ee1f5dad de440b42 589ce167 5c43b6a0 8598ff16 d41a28be 
        76e12fe1 84f47eb9 27aa77cb 36b3fec3 fad217f6 e1624ed3 ccccb319 65d34ba8 
        e8b3d54c eaf64eae cbae3448 1f60cc58 e7e774c9 0135fd6a e0588ad2 16ebece9 
        3ebbf01d cfb6ff1e 0cb7bb39 e9b7981b c05221eb 3a3d7838 8ca9195f 27a4d07f 
        3661ab24 7e9ff82d 3f922963 becb10db 0d403602 a0d417a2 8d7f7e7c 99af455a 
        40cda26b 5cbe0ef3 d387fca1 10caaa33 b7ba4bc0 3da4218c 179ccfd8 bfe657fe 
        cdebfa30 1ad5fee8 2597a9be 3bea
      quit
     certificate 0649f9a965553e7df2709c06c4da1b09e17cd9
        30820510 308203f8 a0030201 02021306 49f9a965 553e7df2 709c06c4 da1b09e1 
        7cd9300d 06092a86 4886f70d 01010505 003081ae 310b3009 06035504 06130255 
        53311130 0f060355 04081308 496c6c69 6e6f6973 3110300e 06035504 07130743 
        68696361 676f3121 301f0603 55040a13 18547275 73747761 76652048 6f6c6469 
        6e67732c 20496e63 2e313630 34060355 0403132d 54727573 74776176 65204f72 
        67616e69 7a617469 6f6e2056 616c6964 6174696f 6e204341 2c204c65 76656c20 
        32311f30 1d06092a 864886f7 0d010901 16106361 40747275 73747761 76652e63 
        6f6d301e 170d3134 30363131 30353330 33355a17 0d313530 32323331 31333033 
        355a3070 311e301c 06035504 030c1576 706e2e70 726f6365 73737765 61766572 
        2e636f6d 31163014 06035504 0a0c0d50 726f6365 73735765 61766572 31143012 
        06035504 070c0b53 616e7461 20436c61 72613113 30110603 5504080c 0a43616c 
        69666f72 6e696131 0b300906 03550406 13025553 30820122 300d0609 2a864886 
        f70d0101 01050003 82010f00 3082010a 02820101 00cc194c fbdd63f5 0b49141a 
        9d21063f a13136df e524cef9 c55e9331 e6c5bc67 43361421 cafb7dc1 d244942e 
        6fd02ee7 198e7f7e 48ca62c2 1c8e1a8e 20431d42 b24103f1 5fad9287 9f9dc2da 
        5002e0b4 cf14b414 31e0e691 26cfbc0c 1ee09d6d 8176a63d 6ad81c30 b2b69dbe 
        59ce7092 44c09e62 27f20c58 8bd8e38a a3d75a94 94bbca6f 7ad87b93 3892ddb0 
        3f00a693 e05b5fe8 7a71d36c 223e1ded 8afb8ee4 1eea579c 53d964df 467694e9 
        b7ffe4f9 22c6dd5e 33d0ffee 9fd57fed 621c62f1 4dc6f14e 6518de53 c2fd7d5d 
        b37913b8 69211fe5 e194a6bf f60bc88a 343a93dc 34526931 b41566e3 f38f219f 
        9a6cefd5 d6d60002 2442b3e5 b4096717 2ffea23d b1020301 0001a382 01623082 
        015e300b 0603551d 0f040403 0205a030 1d060355 1d250416 30140608 2b060105 
        05070302 06082b06 01050507 0301301d 0603551d 0e041604 14cd47cf 646a8932 
        7cecb024 9fd2a31a b54d73dc c0301f06 03551d23 04183016 80145dd9 969a40c7 
        27cb2c9b a2eccf19 abc8afcc 86483048 0603551d 20044130 3f303d06 0f2b0601 
        040181ed 18030303 03040403 302a3028 06082b06 01050507 0201161c 68747470 
        733a2f2f 73736c2e 74727573 74776176 652e636f 6d2f4341 30370603 551d1104 
        30302e82 1576706e 2e70726f 63657373 77656176 65722e63 6f6d8215 7774732e 
        70726f63 65737377 65617665 722e636f 6d303506 03551d1f 042e302c 302aa028 
        a0268624 68747470 3a2f2f63 726c2e74 72757374 77617665 2e636f6d 2f4f5643 
        415f4c32 2e63726c 30360608 2b060105 05070101 042a3028 30260608 2b060105 
        05073001 861a6874 74703a2f 2f6f6373 702e7472 75737477 6176652e 636f6d2f 
        300d0609 2a864886 f70d0101 05050003 82010100 0785070e 045d6201 3ffc49b5 
        88808587 b6418d0e 87dc7ae8 3204563b 6e51ff93 25e8ad7a 9a11d439 2439a533 
        768477ca 902fdfbe f0c58a04 e15bf6a5 63829d4b a36c7ccc 0af9532b f39ec31d 
        21cd6b74 d3adffc2 5f8ee1c4 92c07ac6 ab547346 c740f477 857a82fd 897029d5 
        1cfa9b55 b1064ab7 1274556c 6a14f7a8 b8705cd4 51d6b7f4 0a024f6d 1818918c 
        0cb15bc5 cd301684 38c2dcb8 2585b44c 18808e1b 823a6043 28da0194 280fa6c9 
        80831cbc 1179be24 fc391e54 965761e5 e51031e1 0c76c65f 187922d0 96be80c9 
        3de9a56e 41d0fd3f 76afaf49 4bc4ff4c 213aa474 60a742ba 2a8fb3bd c9349da3 
        1ac96b24 7b99cba5 a28c6647 7803cf2c ee70540c
      quit
    crypto ikev2 policy 10
     encryption 3des
     integrity sha
     group 2
     prf sha
     lifetime seconds 28800
    crypto ikev2 enable outside
    crypto ikev2 remote-access trustpoint ASDM_TrustPoint2
    crypto ikev1 enable outside
    crypto ikev1 policy 10
     authentication pre-share
     encryption 3des
     hash sha
     group 2
     lifetime 28800
    telnet timeout 5
    ssh timeout 5
    ssh key-exchange group dh-group1-sha1
    console timeout 0
    dhcpd address 192.168.5.2-192.168.5.254 management
    dhcpd enable management
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    ssl trust-point ASDM_TrustPoint2 outside
    webvpn
     enable outside
     anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
     anyconnect enable
     tunnel-group-list enable
    group-policy GroupPolicy_PWSSL internal
    group-policy GroupPolicy_PWSSL attributes
     wins-server none
     dns-server value 192.168.0.16
     vpn-tunnel-protocol ssl-client 
     split-tunnel-policy tunnelspecified
     split-tunnel-network-list value PW-VPN-Tunnel-ACL
     default-domain value processw.local
     webvpn
      anyconnect keep-installer none
    group-policy GroupPolicy_115.119.186.194 internal
    group-policy GroupPolicy_115.119.186.194 attributes
     vpn-tunnel-protocol ikev1 l2tp-ipsec 
    group-policy GroupPolicy_67.192.250.53 internal
    group-policy GroupPolicy_67.192.250.53 attributes
     vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless
    group-policy pw internal
    group-policy pw attributes
     dns-server value 192.168.0.16
     vpn-tunnel-protocol ikev1 ikev2 
     split-tunnel-policy tunnelspecified
     split-tunnel-network-list value PW-VPN-Tunnel-ACL
     default-domain none
    username rajuvaradha password 6biM7HbMtaadT82k encrypted
    username e172 password E1abOIw/eu.DKO/y encrypted
    username e150 password dJMsBQfrQRISuR8n encrypted
    username e134 password bLBixKKCoH5Udlk9 encrypted
    username e182 password mirFopEi/OG0LT4d encrypted
    username e192 password u2P6WXLa1k8.kA1w encrypted
    username e184 password Rpt/S1N6et6Xwi7W encrypted
    username u033 password pS5QN8QLvYFHJfoK encrypted
    username u011 password HGFsDnR5XiFAzrcE encrypted
    username u010 password 5R8mktMpyUYPCpTO encrypted
    username u032 password rst8O1b/yrXsKVmu encrypted
    username u002 password .u2izEtqOIC5D2fT encrypted
    username admin password eY/fQXw7Ure8Qrz7 encrypted
    username u012 password JClYI3r7x0T/ed26 encrypted
    username u015 password 6tNvtB4hPcUNDyhE encrypted
    username u014 password Wy6x8dPcSnMcAT1v encrypted
    username u017 password xahCXrBaZWzW8aEp encrypted
    username u006 password BCEOAmlRL6CbQfTV encrypted
    username e006 password DG96SZQ2gBqIXEYv encrypted
    username e034 password 1sG72DUjsY7nt81V encrypted
    username u007 password vtcK6xerueHvqZJZ encrypted
    username u016 password pZgySMnraNBlTTnL encrypted
    username u025 password ulAXIX1u2.UD/KvT encrypted
    username u008 password G4vmDF.mv3rXWa7h encrypted
    username u019 password NxlycJwroZrzCSJ3 encrypted
    username e019 password E9NaUPs18c0.PBnd encrypted
    username u018 password 33CghGQSMjbWDfdb encrypted
    username u009 password uaaSLEu55XXbD5Sr encrypted
    username u028 password UMFMzXMs6He7.zR8 encrypted
    username e097 password .UawdlGNiYnRHnzF encrypted
    username e314 password ye2/LpVufAXvAUJ6 encrypted
    username e327 password 6mKef3HGlnyb6hnu encrypted
    username e343 password 0g33Wbvzi.NL1PjH encrypted
    username e222 password e0.SFEwm1RqC6lLj encrypted
    username e289 password /YrO2mEvMUr9zxq3 encrypted
    username e201 password Eox2TB.HgdkKLuec encrypted
    username e265 password fTk7Vxw0Z06AAbHi encrypted
    username e251 password 6y7YjKQO1rP3nAQG encrypted
    username e219 password p049Lf7jFLisN6UJ encrypted
    username e269 password v7oFefIpmPGd307D encrypted
    tunnel-group 63.82.1.98 type ipsec-l2l
    tunnel-group 63.82.1.98 ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group pw type remote-access
    tunnel-group pw general-attributes
     address-pool clientpool
     default-group-policy pw
    tunnel-group pw ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group 115.119.186.194 type ipsec-l2l
    tunnel-group 115.119.186.194 general-attributes
     default-group-policy GroupPolicy_115.119.186.194
    tunnel-group 115.119.186.194 ipsec-attributes
     ikev1 pre-shared-key *****
     ikev2 remote-authentication pre-shared-key *****
     ikev2 local-authentication pre-shared-key *****
    tunnel-group 67.192.250.53 type ipsec-l2l
    tunnel-group 67.192.250.53 general-attributes
     default-group-policy GroupPolicy_67.192.250.53
    tunnel-group 67.192.250.53 ipsec-attributes
     ikev1 pre-shared-key *****
     ikev2 remote-authentication pre-shared-key *****
     ikev2 local-authentication pre-shared-key *****
    tunnel-group PWSSL type remote-access
    tunnel-group PWSSL general-attributes
     address-pool clientpool
     authentication-server-group PW LOCAL
     default-group-policy GroupPolicy_PWSSL
    tunnel-group PWSSL webvpn-attributes
     group-alias PWSSL enable
    class-map inspection_default
     match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
     parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
     class inspection_default
      inspect dns preset_dns_map 
      inspect ftp 
      inspect h323 h225 
      inspect h323 ras 
      inspect rsh 
      inspect rtsp 
      inspect esmtp 
      inspect sqlnet 
      inspect skinny  
      inspect sunrpc 
      inspect xdmcp 
      inspect sip  
      inspect netbios 
      inspect tftp 
      inspect ip-options 
      inspect icmp 
    service-policy global_policy global
    prompt hostname context 
    call-home reporting anonymous prompt 1
    Cryptochecksum:3b6339b71a4cf924c7b30056a3e6fc31
    : end

  • Dynamic PAT and Static NAT issue ASA 5515

    Hi All,
    Recently we migrated our network to ASA 5515, since we had configured nat pool overload on our existing router the users are able to translated their ip's outside. Right now my issue was when I use the existing NAT configured to our router into firewall, it seems that the translation was not successful actually I used Dynamic NAT. When I use the Dynamic PAT(Hide) all users are able to translated to the said public IP's. I know that PAT is Port address translation but when I use static nat for specific server. The Static NAT was not able to translated. Can anyone explain if there's any conflict whit PAT to Static NAT? I appriciate their response. Thanks!
    - Bhal

    Hi,
    I would have to guess that you Dynamic PAT was perhaps configured as a Section 1 rule and Static NAT configured as Section 2 rule which would mean that the Dynamic PAT rule would always override the Static NAT for the said host.
    The very basic configured for Static NAT and Default PAT I would do in the following way
    object network STATIC
    host
    nat (inside,outside) static dns
    object-group network DEFAULT-PAT-SOURCE
    network-object
    nat (inside,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface
    The Static NAT would be configured as Network Object NAT (Section 2) and the Default PAT would be configured with Twice NAT / Manual NAT (after-auto specifies it as Section 3 rule)
    This might sound confusing. Though it would be easier to say what the problem is if we saw the actual NAT configuration. Though I gave the reason that I think is probably one of the most likely reasons if there is some conflict with the 2 NAT rules
    You can also check out a NAT document I made regarding the new NAT configuration format and its operation.
    https://supportforums.cisco.com/docs/DOC-31116
    Hope this helps
    - Jouni

  • E4200 has major issues losing packets!

    Any one else having this issue?  For the top of the line router in this range it for sure should not be suffering from this and for me makes the router unbareable. % is loss.  I removed ips.  I am certain the issue is with the Cisco... same Rj45 connecting modem to PC 0 loss all the way through.  I would HIGHLY recommend testing this on your e4200.  Can anyone speculate if it is a configuration issue?      
    WinMTR statistics
    Host
    Sent
    Recv
    Best
    Avrg
    Wrst
    Last
    CISCOE4200
    8
    89
    82
    0
    2
    19
    1
    5
    100
    95
    6
    11
    47
    7
    7
    97
    91
    7
    12
    37
    8
    11
    86
    77
    18
    25
    106
    22
    2
    112
    110
    20
    26
    91
    22
    8
    92
    85
    24
    31
    76
    31
    19
    69
    56
    64
    74
    121
    121
    12
    81
    72
    21
    33
    107
    26
    8
    92
    85
    43
    51
    122
    56
    23
    61
    47
    70
    77
    99
    79
    33
    52
    35
    79
    87
    126
    80
    30
    54
    38
    0
    85
    108
    85
    5
    101
    96
    0
    86
    138
    87

    I grabbed a new E4200 and will be hooking it up shortly.  For comparison I have my DIR 655 Hooked up now and wanted to show results before I post results of new E4200,
    WinMTR statistics
    Host
    Sent
    Recv
    Best
    Avrg
    Wrst
    Last
    0
    64
    64
    5
    9
    14
    11
    0
    64
    64
    7
    10
    24
    12
    0
    64
    64
    17
    21
    26
    22
    0
    64
    64
    18
    22
    48
    22
    0
    64
    64
    18
    22
    40
    19
    0
    64
    64
    61
    69
    159
    64
    0
    64
    64
    18
    26
    132
    22
    0
    64
    64
    40
    44
    65
    65
    0
    64
    64
    67
    72
    98
    71
    0
    64
    64
    77
    88
    193
    77
    0
    64
    64
    77
    87
    97
    86
    0
    64
    64
    77
    81
    88
    77

  • [Solved]Netcfg wifi static connection issue

    I have set up netcfg to use a wifi static ip address [to use as a small home server]
    CONNECTION='wireless'
    DESCRIPTION='A simple WPA encrypted wireless connection using a static IP'
    INTERFACE='wlan0'
    SECURITY='wpa'
    ESSID='MyNetwork'
    KEY='WirelessKey'
    IP='static' # Any other CONNECTION='ethernet' options may be used.
    ADDR='192.168.1.23'
    GATEWAY='192.168.1.1'
    DNS=('192.168.1.1')
    # Uncomment this if your ssid is hidden
    #HIDDEN=yes
    Edited and used the above config
    I can access [ping] local network but I cannot ping www.google.co.uk at all, odd thing is I can see my server from my desktop and web page I created is visible on the internet so port forwarding is working fine.
    Only issue is going to be updating or adding packages
    Has anyone else created a static wifi shed any light on my problem?
    Last edited by Mr Green (2012-09-28 11:43:08)

    hey Daudbros,
    could you provide the MTM of your unit so that I can assist you further ?
    To locate MTM - http://support.lenovo.com/en_US/FindProductNumber.page#find
    WW Social Media
    Important Note: If you need help, post your question in the forum, and include your system type, model number and OS. Do not post your serial number.
    Did someone help you today? Press the star on the left to thank them with a Kudo!
    If you find a post helpful and it answers your question, please mark it as an "Accepted Solution"!
    Follow @LenovoForums on Twitter!
    Have you checked out the Community Knowledgebase yet?!
    How to send a private message? --> Check out this article.

  • E4200 USB Storage Issue - Connection drops / router hangs

    I'm having issues with maintaining a reliable connection to the USB drive connected to my new E4200.  Here are the situation:
    (1)  I can successfully share the drive and map it from any computer on the network as expected
    (2)  After mapping the drive, I try to copy files/folder to the mapped drive.  It starts off ok, but within a few seconds/minutes, I'll begin getting the message "the specified network name is no longer available".  The drive status will show "disconntected" or "reconnecting"
    (3)  When this happens, the router will often stop accepting new connections (i.e. the DHCP function stops working).  However, some of the computer that are connected continue to work / have internet access.
    (4)  Restarting the router (i.e. pulling the power and plugging it back in) gets things working again.  Things are good until I try to map the drive and begin copying files again.
    Here's some other parameter info:
    (a)  I'm running the latest (only) firmware available: 1.0.00 build 13
    (b)  Per Linksys support, I've reflashed the firmware.  Didn't make any difference
    (c)  I'm working in a wired environment (this is not a wirelss issue...although it happens via wireless the same way)
    (d)  I'm running Win XP SP3 (have also tried on Vista HE 64...same results)
    (e)  The USB disk is a Seagate FreeAgent 1.5 TB (which is on the list of compatible devices for this router)
    (f)  I do most of my work at the command line with NET USE commands.  The files are being copied via ROBOCOPY and or XCOPY.  Just basic scripting.  Note:  I get the same results if I use Windows Explorer to map/copy files.
    (g)  I've validated the Seagate drive is not the issue by plugging in the the computer and using it for several days.  Have had no issues copying files to it  It's formatted as NTFS.  Chkdsk and SeaTools show no issues with the drive.
    (h)  I am copying large volumes of data (i.e. entire folders of movies, backups of "USERS" folder, etc.).  
    (i)  It's not any one paritcular file or folder this issue occurs on.  It will make a little progress, then flake out.  Upon restarting, it will make a little more, then flake out, etc.
    (j)  Just to be safe, I turned off the sleep mode/spin down option on the FreeAgent drive to ensue that wasn't the problem.
    (k)  I haven't made any elaborate router settings (haven't changed many defaults).  Haven't turned on FTP, Media Server functions, etc.  I've just done some basic things like (1) change the ssid (2) set up some DHCP reservations (3) changed the security to WPA2 (4)  changed admin password (5) set up port forwarding for two apps.  I've not created any policies, turned on guest accounts, enabled logging, etc.
    (l)  I am doing all of the above with an admin account (on the router, I created an admin user acccount for myself).  I've been careful to always map the drive with that userid/password.
    Is anyone else having reliability issues with access to thier attached USB storage.  I was very hopeful that the storage attached to the router would be readily available.  I'm not expecting or needing great performance, but do need it to be "always on" for the purposes of sharing files and executing backups.  Eventually, I would like to use some of the other features of the router (streaming video the PS3 and external FTP access for example).  However, for now, I just want the attached storage to work.
    Thanks in advance for your advice.

    oops, well now i see your full question. i asked you some ?s in the other thread you posted in.. but they seemed to be answered here..
    ok, solely speaking about this E42 router, i have had it for 2 weeks now and i had a buffalo 500gb drive on the usb port. i had all sorts of junk on the drive..just random files, etc, and the ones that were supported by the PS3 would stream fine form the drive. i even have a sony BD player (s770) and its able to see the files and drive and stream. the PS3 is wired and the BD player is wireless. i have a laptop (wireless) and it has the same results.
    last night i purchased a seagate go flex 2TB and plan to ONLY put media type files on this drive and try and clean things up and stop being lazy.. so far i have transferred a FEW small video and audio files from a wired computer with zero issues.
    now let me ask, when you are transferring these huge files, are you like copying a folder and pasting it onto the mapped seagate drive? or are you doing individual files, etc? i dont have a folder with a bunch of GBs of files but i will try and see if i can reproduce the problem you see.
    however thus far with the few small media files i have transferred on this new go flex 2TB drive, they have all transferred over. im talking about a couple GBs worth -ish...

  • Iphone 4s background static noise issue !

    I paid a lot of $$$ for a miricle device named Iphone 4S.
    I got :
    1 - Phone that drains the battery for a few hours. ( this will be fixed I guess).
    2. A device that gets very warm when used for half an hour.
    3. Very,very annoying static ,buzzing noise when using 3G apps.
    Many users claim this is a hardware issue. I'm very worried about that. Will a firmware update fix a hardware issue ?
    Apple Support, could you explain in details the issue with the static noise in the background please and your action plan for fixing it ?
    Alex

    Try these...
    Resetting Your iPod
    Restoring Your iPod
    btabz

  • Update: E4200 Media Server Issues

    Dear All,
    Late last week engineering released beta firmware for the E4200 that should resolve the media server issues many have experienced.  This firmware release will go through a cycle of testing internally as well as with members of the community that we have been working with. Once the firmware has gone through the required testing and approvals it will be released publicly.  There is no ETA at the moment but we will update the community once a release window has been identified.

    Dear All,
    Here is an update on the media server issue.
    "The media server issue is definitely a software issue as confirmed by the engineers. A fix has been built, tested and is close to release. The firmware is currently going through the Engineering release process. This process is time consuming as this firmware is open-source and requires that Cisco follows strict guidelines to ensure that they are in compliance with the GNU General Public License. Estimated release date is around 3rd or 4th week of September if there are no other issues."
    As promised, we will keep track of this issue until a fix has been released. Again, we sincerely apologize for the inconvenience. 

  • Linksys e4200 connection reliability issues

    Hello there. A few months ago, I bought a new Linksys E4200 and it had no issues, until now. Recently, the reliability of this thing has dipped. The connection would just stop working and I'd have to unplug the box and reboot it. Other times, the Cisco logo would start blinking and the connection would stop, then it'd fix itself. But today, both things kept happening over and over to the point where I had to switch to the Netgear router that Comcast provided me with (which is working perfectly). As a mine craft server runner, I rely on a constant, reliable connection. What should I do? The e4200 is still faster than the Netgear thing so I'd like to get it fixed.

    TheCh1ckenM7n wrote:
    I'll give it a shot.
    Just provide updates. I hope it will work.

  • Titanium Pro, single GPU, two monitors - SERIOUS static/popping issues

    So here is my setup: Creative X-Fi Titanium Pro, Logitech Z-2300 speakers, Turtle Beach 5. headset (splitters between them to output audio to both), XFX GTX 285, DFI LanParty P45-T2RS mobo, Samsung 206BW monitor, and here's the new addition: Samsung 640 series 32" LCD television connected via DVI-to-HDMI cable. I have the audio out from the TV also spliced into the feed for the speakers.
    Pretty much from day one with the new TV I've had issues with loud static, and random (left to right channel) popping sounds coming from the speakers and headphones, so it has to be coming from the sound card. It only seems to happen when I have the TV on as a second monitor. I first noticed it while trying to watch a movie in Windows Media Player on the TV, then it started being prevalent while playing Call of Duty 4 on the 20" monitor with the TV on with my Xfire, Ventrilo, and Firefox open. It seems like the extra duty the GPU is putting out interferes with the sound card or something. I've tried moving them both to a different slot but it didn't make any difference.
    Does anyone know of anything else that could be causing this? Maybe a power issue? I've got a 650 watt PSU (Seasonic S2). I'm thinking I might just have to throw in the towel and junk my $30 sound card.... ugh.
    p.s. I've also got an issue to where if I leave it in one audio mode (Entertainment or Game) for more than a couple hours the sound goes completely to s*** and I'm forced to switch modes and go back, forcing me to close any and all sound producing applications (iTunes, WMP, Firefox) otherwise they freeze. For example I like to play a playlist in iTunes as I go to sleep, but when I wake up and try to play something its completely garbled and staticky (loud too)[email protected]

    So here is my setup: Creative X-Fi Titanium Pro, Logitech Z-2300 speakers, Turtle Beach 5. headset (splitters between them to output audio to both), XFX GTX 285, DFI LanParty P45-T2RS mobo, Samsung 206BW monitor, and here's the new addition: Samsung 640 series 32" LCD television connected via DVI-to-HDMI cable. I have the audio out from the TV also spliced into the feed for the speakers.
    Pretty much from day one with the new TV I've had issues with loud static, and random (left to right channel) popping sounds coming from the speakers and headphones, so it has to be coming from the sound card. It only seems to happen when I have the TV on as a second monitor. I first noticed it while trying to watch a movie in Windows Media Player on the TV, then it started being prevalent while playing Call of Duty 4 on the 20" monitor with the TV on with my Xfire, Ventrilo, and Firefox open. It seems like the extra duty the GPU is putting out interferes with the sound card or something. I've tried moving them both to a different slot but it didn't make any difference.
    Does anyone know of anything else that could be causing this? Maybe a power issue? I've got a 650 watt PSU (Seasonic S2). I'm thinking I might just have to throw in the towel and junk my $30 sound card.... ugh.
    p.s. I've also got an issue to where if I leave it in one audio mode (Entertainment or Game) for more than a couple hours the sound goes completely to s*** and I'm forced to switch modes and go back, forcing me to close any and all sound producing applications (iTunes, WMP, Firefox) otherwise they freeze. For example I like to play a playlist in iTunes as I go to sleep, but when I wake up and try to play something its completely garbled and staticky (loud too)[email protected]

  • Static function issue?

    hi,
    i am having a static function which fetch some values from data base and put it to an arraylist and return this array list.
    some times the returned array list empty even though values are exists in db,all the varibles used in this static functions are local and
    this function is very frequently acceessing from diffrent threads
    when a static function calls then all the variables in the fuction will have diffrent copies right?
    in my example i wondered like one thread is executing this function then in beetween another thread comes and re initilise the variables so i am getting the abive specified error...
    please any one help ...

    My J2SE version (no EJB's, direct JDBC, no ConnectionPooling) might look something like this, except the connect and close methods are allready in my krc.utilz.jdbc.JDBC class.
    package david;
    import java.io.IOException;
    import java.io.InputStream;
    import java.util.Properties;
    import java.util.logging.Logger;
    import java.sql.Connection;
    import java.sql.DriverManager;
    import java.sql.PreparedStatement;
    import java.sql.ResultSet;
    import java.sql.ResultSetMetaData;
    import java.sql.SQLException;
    import java.util.ArrayList;
    import java.util.HashMap;
    import java.util.List;
    import java.util.Map;
    class Sql
      private final String className;
      private final Logger log;
      private final Connection conn;
      public Sql() throws ClassNotFoundException, SQLException, IOException  {
        className = this.getClass().getName();
        log = Logger.getLogger(className);
        try {
          conn = connect(this.getClass().getResourceAsStream("database.properties"));
        } catch (SQLException e) {
          log.throwing(className, "noargs constructor", e);
          throw e;
       * Executes the given query and returns the resulting rows as a List(rows)
       * of Maps(Column name to value).
       * @param String sql - the sql-select-query to execute
       * @param String[] args - the query paramaters (if
       * @return List<Map<String,String>> rows
       * @throws java.sql.SQLException
      public List<Map<String,String>> select(String sql, String[] args) throws SQLException {
        final String methodName = "select";
        log.entering(className, methodName, new String[] {"sql="+sql, "args="+args});
        List<Map<String,String>> rows = new ArrayList<Map<String,String>>();
        PreparedStatement stmt = null;
        ResultSet rs = null;
        try {
          stmt = conn.prepareStatement(sql);
          for (int i=0; i<args.length; i++) {
            stmt.setString(i+1, args);
    rs = stmt.executeQuery();
    ResultSetMetaData md = rs.getMetaData();
    int numCols = md.getColumnCount();
    while (rs.next()) {
    Map<String,String> cols = new HashMap<String,String>(numCols);
    for (int c=1; c<=numCols; c++) {
    cols.put(md.getColumnName(c).toUpperCase(), rs.getString(c));
    rows.add(cols);
    } finally {
    close(rs, stmt, null);
    log.exiting(className, methodName, "rows="+rows.size());
    return rows;
    public void close(ResultSet rs, PreparedStatement st, Connection cn) {
    if(rs!=null)try{rs.close();}catch(SQLException e){log.severe(e.toString());}
    if(st!=null)try{st.close();}catch(SQLException e){log.severe(e.toString());}
    if(cn!=null)try{cn.close();}catch(SQLException e){log.severe(e.toString());}
    * Connects to the database specified in the given connectionProperties.
    * @param propertiesStream a java.io.InputStream from which to read
    * java.util.Properties - Example contents:
    * jdbc.driver=com.mysql.jdbc.Driver
    * jdbc.url=jdbc:mysql://localhost/test
    * jdbc.username=user
    * jdbc.password=pass
    * @return Connection - an open connection to the given database.
    * @throws ClassNotFoundException if the class named in the
    * jdbc.driver property can't be initialized.
    * The root cause exception is enclosed.
    * Double check the name of the driver class in the properties file.
    * Ensure that the named driver class exists is in the classpath.
    * @throws SQLException if a database access error occurs.
    * The root cause exception is enclosed.
    * Check the jdbc.url, jdbc.username, and jdbc.password properties.
    private Connection connect(InputStream propertiesStream)
    throws IOException, ClassNotFoundException, SQLException
    Properties props = new Properties();
    props.load(propertiesStream);
    String driver = props.getProperty("jdbc.driver");
    String url = props.getProperty("jdbc.url");
    String username = props.getProperty("jdbc.username");
    String password = props.getProperty("jdbc.password");
    try {
    Class.forName(driver).newInstance();
    } catch (ClassNotFoundException e) {
    throw e;
    } catch (Exception e) {
    String msg = "Failed to connect to url: "+url+" as "+username+" via driver "+driver;
    throw new ClassNotFoundException(msg, e);
    try {
    return DriverManager.getConnection(url, username, password);
    } catch (SQLException e) {
    String msg = "Failed to connect to url: "+url+" as "+username+" via driver "+driver;
    throw new SQLException(msg, e);
    BTW... search the forums and you'll find something similar to (but a tad more flexible than) this... I wrote a simple "squirrel" in swing about a year or so ago... execute the query, populate a table with the results.
    Another trick is the close the database connection on ANY SQLException (to keep it clean)... easy when you use a connection pool.
    Cheers. Keith.
    Edited by: corlettk on 7/11/2008 00:47 ~~ Wrong file. Doh!

  • ASA5525X - 8.6(1)2 and One-To-One Static Mapping Issue

    Just started working with the post 8.3 CLI.
    Traffic from outside to inside is translated correctly, but inside to outside is using the outside Interface IP instead of the mapped IP, 50.50.50.50.
    I know I'm missing something small here.
    This is the config that was build using ASDM.
    Outside IP: 50.50.50.50
    Inside IP: 10.10.10.10
    object network TEST
    host 50.50.50.50
    description One-To-One NAT 50.50.50.50/10.10.10.10
    object network TEST-priv
    host 10.10.10.10
    description One-To-One NAT 50.50.50.50/10.10.10.10
    object network TEST-priv
    nat (inside,outside) static TEST
    nat (inside,outside) source dynamic IN2OUT interface description PAT Overload Using Interface Public IP
    object network IN2OUT
    subnet 0.0.0.0 0.0.0.0
    description Inside To Outside NAT
    Note: ASDM created object TEST-priv twice. One on top and one below the NAT configs.

    Hello Robert,
    The problem here is the nat order.
    Twice nat are review first so in order to make this work do the following on the CLI.
    no nat (inside,outside) source dynamic IN2OUT interface description PAT Overload Using Interface Public IP
    nat (inside,outside) after-auto source dynamic IN2OUT interface description PAT Overload Using Interface Public IP
    Remember to rate all of the answers, for the community that is more important that a thank
    Regards,
    Julio

Maybe you are looking for

  • How to add new fields to Profit center screen (KE51)

    Dear All, I have a requirement that to add new fields to the Create Profit center screen KE51. I couldn't find the user exits for the same. Please help me in this. Thanks. Ravi

  • Returns to the state of departure

    Hi When I reload the browser page it returns to the state of departure set in Flash Bilder even if it is for the authentication state of the beginning and we lose the session. I used Flash Bilder

  • RMI Binding Error

    When I am trying to run my code, the following error is being displayed Starting Sever... Binding... Error: java.rmi.ConnectException: Connection refused to host: 169.254.135.47; nested exception is: java.net.ConnectException: Connection refused: con

  • ACS 4.1 traffic

    I'm trying to find out how to send authentication traffic from a router to an ACS 4.1 server through a specified interface across a crypto tunnel.

  • Find a field in TX: CJE3

    Dear All, I m working on transaction CJE3, when i run a report 12KST1A ( Budget/Actual/Commitment). I get an output with all the values, like budget-Total, Actual-total, Commitment and so on. Now my requirement is that i need to know the field name o