IKE Trouble with Peer to Peer VPN

Got an interesting one here.  We have three flavors of Cradlepoint router.  The early 1200, the 1200b and the 1400.  I am setting up peer tp peer VPNs.  The Cradlepoints sit in a school bus and connect to the ASA in our district office.
The ASA 5510 is running ASA version 7.2(1) and ASDM version 5.2(1).
The following is the relevent config on the ASA:
interface Ethernet0/1
nameif inside
security-level 100
ip address 10.2.0.37 255.255.0.0
interface Management0/0
shutdown
nameif Management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto dynamic-map vpnterm_dyn_map 20 set transform-set ESP-3DES-SHA
crypto map vpnterm_map 20 ipsec-isakmp dynamic vpnterm_dyn_map
crypto map vpnterm_map interface inside
crypto isakmp identity address
crypto isakmp enable inside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
tunnel-group DefaultL2LGroup ipsec-attributes
pre-shared-key *
no vpn-addr-assign aaa
We have a global address on our main ASA and a static translation to the 10.2.0.37 address. 
This configuration works perfectly with both the 1200b and the 1400.
However, on the older 1200 I see the following on the ASA when the Cradlepoint tries to establish a connection (repeated several times over):
4 Aug 22 2013 14:59:32 713903    Group = DefaultL2LGroup, IP = 75.234.224.136, Freeing previously allocated memory for authorization-dn-attributes
5 Aug 22 2013 14:59:30 713092    Group = DefaultL2LGroup, IP = 75.234.224.136, Failure during phase 1 rekeying attempt due to collision
3 Aug 22 2013 14:59:32 713902    Group = DefaultL2LGroup, IP = 75.234.224.136, Removing peer from peer table failed, no match!
4 Aug 22 2013 14:59:32 713903    Group = DefaultL2LGroup, IP = 75.234.224.136, Error: Unable to remove PeerTblEntry
4 Aug 22 2013 14:59:24 713903    Group = DefaultL2LGroup, IP = 75.234.224.136, Information Exchange processing failed
At the Cradlepoint end I see a couple of related errors:
[INFO] Tue Jan 10 11:29:00 2012 IKE: Sending ISAKMP delete notification to peer 209.191.213.135.
[INFO] Tue Jan 10 11:29:00 2012 IKE: Initiating INFO exchange with peer 209.191.213.135.
[INFO] Tue Jan 10 11:29:00 2012 IKE: Sending INVALID_ID_INFORMATION notification to peer 209.191.213.135.
[INFO] Tue Jan 10 11:29:00 2012 IKE: peer 209.191.213.135 - exchange receive error INVALID_ID_INFORMATION.
[INFO] Tue Jan 10 11:29:00 2012 IKE: Phase 1 negotiation complete with peer 209.191.213.135 (84): fail.
[INFO] Tue Jan 10 11:28:59 2012 IKE: Initiating ID_PROTECT exchange with peer 209.191.213.135.
[INFO] Tue Jan 10 11:28:59 2012 IPSEC: Initiating new session to peer 209.191.213.135 for tunnel ISD31VPN.
It seems that the Cradlepoint isn't getting a response that it likes from the ASA... just can't quite figure out what that response is or how to correct.  The DH group, the key lifetime, etc all match the other two models.  The preshare key is right.  There is a setting on the Cradlepoint ipsec policy setup to provide a "Remote Identity".  This is blank (as it is on the other two models that work fine).  I'm not sure if this is where the problem is or some other setting.
Baffled.  

Just to add a bit more, here is the setup on the Cradlepoint:

Similar Messages

  • Cisco 5505 VPN assistance - Resending P1 and Peer to Peer List No match

    Hello and thanks in advance to anyone that can help me with the IPSec connection.  the VPN were working when i first created them but now they wont connect.  Here is the error on the primary (local) firewall: (yes i know the time isnt set yet on the firewall)
    4|May 17 2007|13:51:55|713903|||||IP = X.X.X.X, Error: Unable to remove PeerTblEntry
    3|May 17 2007|13:51:55|713902|||||IP = X.X.X.X, Removing peer from peer table failed, no match!
    6|May 17 2007|13:51:55|713905|||||IP = X.X.X.X, P1 Retransmit msg dispatched to MM FSM
    5|May 17 2007|13:51:55|713201|||||IP = X.X.X.X, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    6|May 17 2007|13:51:47|713905|||||IP = X.X.X.X, P1 Retransmit msg dispatched to MM FSM
    5|May 17 2007|13:51:47|713201|||||IP = X.X.X.X, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    The local firewall has one VPN configured and the remote has 2 (1 working and the other not): Local Firewall is Base licensing with 3DES.  As far as I can tell they have the same VPN parameters but maybe the remote has pfs1 turned on?  Ive played with various settings and cant seem to get it to work.  The cryptomap has the same firewall rules in it (obviously reversed on remote). Any help much appreciated!  I Have a third site doing exactly the same thing (once again also works on another site to site but not this one).  It's weird because I used the IPSec wizard and got it to work and rebooted the ASA and tunnel came up yet again but now my debug log is just full of this info and tunnels never come up.....the only time it was up was for a few hours then wont come up anymore...odd..
    Local Fire Wall:
    hostname ciscoasa
    names
    name 172.25.42.0 MASALan
    name 172.25.7.0 FHR
    name 172.25.43.0 MR
    interface Vlan1
    nameif inside
    security-level 100
    ip address 172.25.6.1 255.255.255.0
    interface Vlan2
    nameif outside
    security-level 0
    ip address 10.10.10.30 255.255.255.0
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    switchport access vlan 2
    interface Ethernet0/2
    interface Ethernet0/3
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    boot system disk0:/asa821-k8.bin
    ftp mode passive
    dns server-group DefaultDNS
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object-group network inside-network
    object-group protocol DM_INLINE_PROTOCOL_1
    protocol-object ip
    protocol-object icmp
    protocol-object igmp
    protocol-object gre
    object-group protocol DM_INLINE_PROTOCOL_2
    protocol-object ip
    protocol-object icmp
    protocol-object igmp
    protocol-object gre
    object-group network DM_INLINE_NETWORK_4
    network-object MASALan 255.255.255.0
    network-object MR 255.255.255.0
    object-group network DM_INLINE_NETWORK_6
    network-object 172.25.6.0 255.255.255.0
    network-object FHR 255.255.255.0
    object-group protocol DM_INLINE_PROTOCOL_3
    protocol-object ip
    protocol-object icmp
    protocol-object igmp
    protocol-object gre
    object-group network DM_INLINE_NETWORK_3
    network-object 172.25.6.0 255.255.255.0
    network-object FHR 255.255.255.0
    object-group network DM_INLINE_NETWORK_5
    network-object MASALan 255.255.255.0
    network-object MR 255.255.255.0
    access-list outside_2_cryptomap extended permit ip 172.25.6.0 255.255.255.0 MASALan 255.255.255.0
    access-list NONAT extended permit ip any 172.25.4.0 255.255.255.0
    access-list NONAT extended permit ip 172.25.6.0 255.255.255.0 MASALan 255.255.255.0
    access-list NONAT extended permit ip FHR 255.255.255.0 MR 255.255.255.0
    access-list NONAT extended permit ip object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_NETWORK_5
    access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_3 object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_NETWORK_6
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    ip local pool RemotePool 172.25.4.1-172.25.4.2 mask 255.255.255.0
    icmp unreachable rate-limit 1 burst-size 1
    asdm image disk0:/asdm-621.bin
    no asdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 0 access-list NONAT
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 10.10.10.1 1
    route inside 172.25.1.0 255.255.255.0 172.25.6.2 1
    route inside 172.25.2.0 255.255.255.0 172.25.6.2 1
    route inside 172.25.8.0 255.255.255.0 172.25.6.4 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa authentication ssh console LOCAL
    http server enable
    http 172.25.0.0 255.255.0.0 outside
    http 172.25.0.0 255.255.0.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto map outside_map 2 match address outside_2_cryptomap
    crypto map outside_map 2 set peer 216.183.157.158
    crypto map outside_map 2 set transform-set ESP-AES-128-SHA
    crypto map outside_map 2 set security-association lifetime kilobytes 4608000
    crypto map outside_map interface outside
    crypto isakmp enable outside
    crypto isakmp policy 1
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    no crypto isakmp nat-traversal
    telnet timeout 5
    ssh 172.25.0.0 255.255.0.0 inside
    ssh 172.25.6.0 255.255.255.0 inside
    ssh 172.25.0.0 255.255.0.0 outside
    ssh timeout 60
    console timeout 0
    management-access inside
    dhcpd auto_config outside
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    group-policy DfltGrpPolicy attributes
    vpn-tunnel-protocol IPSec
    group-policy GroupPolicy1 internal
    group-policy GroupPolicy1 attributes
    vpn-filter none
    vpn-tunnel-protocol IPSec
    tunnel-group osfdremote ipsec-attributes
    pre-shared-key *
    tunnel-group X.X.X.X type ipsec-l2l
    tunnel-group X.X.X.X general-attributes
    default-group-policy GroupPolicy1
    tunnel-group X.X.X.X ipsec-attributes
    pre-shared-key *
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny 
      inspect sunrpc
      inspect xdmcp
      inspect sip 
      inspect netbios
      inspect tftp
    service-policy global_policy global
    prompt hostname context
    REMOTE FIREWALL
    interface Vlan2
    nameif outside
    security-level 0
    pppoe client vpdn group CHN
    ip address pppoe setroute
    ftp mode passive
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object-group network DM_INLINE_NETWORK_1
    network-object 172.25.42.0 255.255.255.0
    network-object RFN 255.255.255.0
    object-group network DM_INLINE_NETWORK_2
    network-object RHQASAnet 255.255.255.0
    network-object RHQNet 255.255.255.0
    object-group protocol DM_INLINE_PROTOCOL_1
    protocol-object ip
    protocol-object gre
    protocol-object tcp
    object-group network DM_INLINE_NETWORK_3
    network-object 172.25.42.0 255.255.255.0
    network-object RFN 255.255.255.0
    object-group network DM_INLINE_NETWORK_4
    network-object FHData 255.255.255.0
    network-object FHR 255.255.255.0
    object-group protocol DM_INLINE_PROTOCOL_2
    protocol-object ip
    protocol-object gre
    protocol-object tcp
    access-list outside_access_in extended permit icmp any any
    access-list outside_access_in extended permit tcp any any eq www
    access-list outside_cryptomap extended permit ip object-group DM_INLINE_NETWORK_1 RHQASAnet 255.255.255.0
    access-list inside_nat0_outbound extended permit ip RFN 255.255.255.0 RHQNet 255.255.255.0
    access-list inside_nat0_outbound extended permit ip 172.25.42.0 255.255.255.0 RHQASAnet 255.255.255.0
    access-list inside_nat0_outbound extended permit ip any 192.168.5.0 255.255.255.240
    access-list inside_nat0_outbound extended permit ip 172.25.42.0 255.255.255.0 FHData 255.255.255.0
    access-list inside_nat0_outbound extended permit ip RFN 255.255.255.0 FHR 255.255.255.0
    access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any object-group DM_INLINE_NETWORK_2
    access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 any object-group DM_INLINE_NETWORK_4
    access-list outside_cryptomap_1 extended permit ip object-group DM_INLINE_NETWORK_3 FHData 255.255.255.0
    no pager
    logging enable
    logging asdm debugging
    mtu inside 1500
    mtu outside 1500
    ip local pool 192.168.5.1 192.168.5.1-192.168.5.10 mask 255.255.255.0
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    global (outside) 101 interface
    nat (inside) 0 access-list inside_nat0_outbound
    nat (inside) 101 0.0.0.0 0.0.0.0
    access-group inside_access_in in interface inside
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 10.110.10.1 1
    route inside RFN 255.255.255.0 172.25.42.2 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    http server enable
    http 172.25.0.0 255.255.0.0 inside
    http 10.7.72.0 255.255.255.0 inside
    http 192.168.5.0 255.255.255.0 inside
    http 192.168.5.0 255.255.255.0 outside
    http RHQNet 255.255.255.0 inside
    http RHQASAnet 255.255.255.0 inside
    http RHQASAnet 255.255.255.0 outside
    http RHQNet 255.255.255.0 outside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outside_map0 2 match address outside_cryptomap_1
    crypto map outside_map0 2 set peer Y.Y.Y.Y
    crypto map outside_map0 2 set transform-set ESP-AES-128-SHA
    crypto map outside_map0 2 set security-association lifetime seconds 28800
    crypto map outside_map0 2 set security-association lifetime kilobytes 4608000
    crypto map outside_map0 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outside_map0 interface outside
    crypto isakmp enable outside
    crypto isakmp policy 5
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    crypto isakmp policy 65535
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    telnet 0.0.0.0 0.0.255.255 inside
    telnet 172.25.0.0 255.255.0.0 inside
    telnet 192.168.5.0 255.255.255.0 inside
    telnet 192.168.5.0 255.255.255.0 outside
    telnet timeout 5
    ssh 192.168.5.0 255.255.255.0 inside
    ssh 192.168.5.0 255.255.255.0 outside
    ssh timeout 5
    console timeout 0
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    group-policy GroupPolicy1 internal
    group-policy GroupPolicy1 attributes
    vpn-tunnel-protocol IPSec
    group-policy remotevpn internal
    group-policy remotevpn attributes
    vpn-tunnel-protocol IPSec
    vpn-group-policy remotevpn
    tunnel-group Y.Y.Y.Y type ipsec-l2l
    tunnel-group Y.Y.Y.Y general-attributes
    default-group-policy GroupPolicy1
    tunnel-group Y.Y.Y.Y ipsec-attributes
    pre-shared-key *****
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect ip-options
      inspect netbios
      inspect rsh
      inspect rtsp
      inspect skinny
      inspect esmtp
      inspect sqlnet
      inspect sunrpc
      inspect tftp
      inspect sip
      inspect xdmcp
    policy-map global-policy
    class inspection_default
      inspect pptp
    service-policy global_policy global
    prompt hostname context

    May 18 08:13:03 [IKEv1 DEBUG]: IP = X.X.X.X, IKE MM Responder FSM error hi                                                                                        story (struct &0xd578cda0)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3,                                                                                         EV_RESEND_MSG-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2                                                                                        , EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_RESEND_MSG-->MM_W                                                                                        AIT_MSG3, NullEvent
    May 18 08:13:03 [IKEv1 DEBUG]: IP = X.X.X.X, IKE SA MM:8e338e16 terminatin                                                                                        g:  flags 0x01000002, refcnt 0, tuncnt 0
    May 18 08:13:03 [IKEv1 DEBUG]: IP = X.X.X.X, sending delete/delete with re                                                                                        ason message
    May 18 08:13:03 [IKEv1]: IP = X.X.X.X, Removing peer from peer table faile                                                                                        d, no match!
    May 18 08:13:03 [IKEv1]: IP = X.X.X.X, Error: Unable to remove PeerTblEntr  
    Is the result and then it repeats =)

  • SAP Business One 8.8 running on a server with Peer to Peer

    Can SAP Business One 8.8  be install and run in a server with a Peer to Peer Operative system?

    You have more than one Oracle Release on the Server. hence more than one ORACLE_HOME.
    Check which is your default ORACLE_HOME on the server and check which of the homes PERL5LIB environment variable is pointing from both command prompt and in Windows.
    That could explain the funny bahaviour. If you change ORACLE_HOME, that could help.

  • Peer-to-Peer Airplay not working with iPad (Gen. 3)

    I'm in the process of testing "wireless projection" solutions. Since I have access to an iPad (gen. 3), iPad Retina, iPad Air and iPhone 5c all running iOS 8.0, with a pair of Apple TV's, Model 1469, one ATV a wired connection and one ATV no network connection at all.  Both devices were updated using Configurator to get the activation setup. 
    Once activate, they were then set up in their respective locations, and the settings were verified (i.e. airplay is on, networks are connected/disconnected as required) and tested using each of the iOS devices listed above.
    All 4 iOS devices could see the networked Apple TV as expected.  But the Gen 3 iPad was the only device that didn't pick up the Peer-to-peer Apple TV when testing the standalone unit.  I tried to reset the iPad, turned off and on the radios, but the device will not pick up the PTP ATV.
    Has anyone else had any luck getting a Gen 3 iPad to work with the Peer-to-Peer with out a network?
    According to the following KB, Use AirPlay to wirelessly stream content from your iPhone, iPad, or iPod touch, you should be able to use a 3rd gen iPad to peer to peer airplay.

    iPad 3rd generation doesn't support Peer-to-Peer Airplay. Apple quietly said it was for iOS devices introduced in LATE 2012. Like for Handoff; certain devices with the latest Wi-Fi specifications can get this feature. The iPad 3 was introduced in EARLY 2012. I tried, but it didn't work. Here is what I found in the Apple TV Section.
    AirPlay requires an Apple TV (2nd generation or later) with an iOS device running iOS 4.3 or later or a Mac with iTunes 10.2 or later. Some features require the latest software.
    Peer-to-peer AirPlay requires a Mac (2012 or later) with OS X Yosemite or an iOS device (late 2012 or later) with iOS 8; and an Apple TV (3rd generation rev A, model A1469 or later) with Apple TV software 7.0 or later.
    AirPlay Mirroring is available with iPhone 4s or later; iPad 2 or later; iPad mini; iPod touch (5th generation); and iMac (Mid 2011 or newer), Mac mini (Mid 2011 or newer), MacBook Air (Mid 2011 or newer), MacBook Pro (Early 2011 or newer), and Mac Pro (Late 2013) with OS X Mountain Lion or later.
    Dual-screen capability is available with iPhone 4s or later, iPad 2 or later, iPad mini, and iPod touch (5th generation).

  • I am having trouble with exchange account connection .the vpn connects fine but the exchange account is still showing the yellow light .can anyone help?

    i am having trouble with exchange account connection .the vpn connects fine but the exchange account is still showing the yellow light .can anyone help?

    I had a similar problem.  Here is how I resolved the issue.
    1.  Remove Network Connect
    2. Run Terminal and remove /usr/local/juniper and everything within the juniper directory.
    3. Reboot the machine and reinstall Network Connect
    4. Test if you can now connect.
    During removal, you may encounter permission denied error, you will need to change the permission to 777.  For example "sudo chmod 777 nc".

  • I've been having trouble with in getting iMessage to send messages. I decided to connect to my VPN (along with wifi) and it worked. Why won't it work via my wifi connection alone?

    I've been having trouble with in getting iMessage to send messages. I decided to connect to my VPN (along with wifi) and it worked. Why won't it work via my wifi connection alone?

    Using FaceTime http://support.apple.com/kb/ht4319
    Troubleshooting FaceTime http://support.apple.com/kb/TS3367
    The Complete Guide to FaceTime + iMessage: Setup, Use, and Troubleshooting
    http://tinyurl.com/a7odey8
    Troubleshooting FaceTime and iMessage activation
    http://support.apple.com/kb/TS4268
    iOS: FaceTime is 'Unable to verify email because it is in use'
    http://support.apple.com/kb/TS3510
    Using FaceTime and iMessage behind a firewall
    http://support.apple.com/kb/HT4245
    iOS: About Messages
    http://support.apple.com/kb/HT3529
    Set up iMessage
    http://www.apple.com/ca/ios/messages/
    iOS 6 and OS X Mountain Lion: Link your phone number and Apple ID for use with FaceTime and iMessage
    http://support.apple.com/kb/HT5538
    How to Set Up & Use iMessage on iPhone, iPad, & iPod touch with iOS
    http://osxdaily.com/2011/10/18/set-up-imessage-on-iphone-ipad-ipod-touch-with-io s-5/
    Troubleshooting Messages
    http://support.apple.com/kb/TS2755
    Troubleshooting iMessage Issues: Some Useful Tips You Should Try
    http://www.igeeksblog.com/troubleshooting-imessage-issues/
    Setting Up Multiple iOS Devices for iMessage and Facetime
    http://macmost.com/setting-up-multiple-ios-devices-for-messages-and-facetime.htm l
    FaceTime and iMessage not accepting Apple ID password
    http://www.ilounge.com/index.php/articles/comments/facetime-and-imessage-not-acc epting-apple-id-password/
    FaceTime, Game Center, Messages: Troubleshooting sign in issues
    http://support.apple.com/kb/TS3970
    Unable to use FaceTime and iMessage with my apple ID
    https://discussions.apple.com/thread/4649373?tstart=90
    How to Block Someone on FaceTime
    http://www.ehow.com/how_10033185_block-someone-facetime.html
    My Facetime Doesn't Ring
    https://discussions.apple.com/message/19087457
    Send an iMessage as a Text Message Instead with a Quick Tap & Hold
    http://osxdaily.com/2012/11/18/send-imessage-as-text-message/
    To send messages to non-Apple devices, check out the TextFree app https://itunes.apple.com/us/app/text-free-textfree-sms-real/id399355755?mt=8
    How to Send SMS from iPad
    http://www.iskysoft.com/apple-ipad/send-sms-from-ipad.html
    You can check the status of the FaceTime/iMessage servers at this link.
    http://www.apple.com/support/systemstatus/
     Cheers, Tom

  • Problem with peer to peer networking

    My work machine is a new G5 dual 2G, running 10.4.2 with an airport card. It is hooked up by ethernet to our local network. There is no wireless router in my office.
    My laptop is a G4 12" running 10.3.9, also with an airport card.
    I would like to fileshare by creating a peer to peer network over the airport cards.
    SOOoooo, I went to the airport icon in the menu bar, created a network, gave it a password and got a funky little airport icon with a box in the middle. Went to the other computer, chose to join that network, got the same icon. Great, we have a network.
    But I can't actually SEE either computer to allow me to fileshare. ( Yes, both computers have personal filesharing turned on.) If I click "network" in the finder window, the G5 sees all the machines on its ethernet network. The laptop sees nada. Crucially, if I plug the laptop in elsewhere on the network, they can see each other (using the server connection option in the GO menu).
    What am I doing wrong to enable them to talk?
    Thanks....

    slf, see if this is what you need...
    http://docs.info.apple.com/article.html?artnum=151696
    Good Luck....Don

  • Bluetooth connectivity, peer to peer with other devices??

    Bluetooth connectivity!!! Peer to peer with other phones?
    Posted: Jun 19, 2009 1:17 AM  
      Reply Email
    Ok, I'm a 3G user and just updated to 3.0,Im pretty excited about the new Bluetooth protocalls.
    When I tried to connect to a coworkers blackberry my iPhone reconized it but wouldn't connect,
    can anyone tell me why thnx?
    So alittle discourged I try to connect with a friends iPhone, and couldn't even found the device.
    Someone please tell me what I'm doing wrong??
       

    You cannot connect to other phones for things like file sharing. The peer to peer is for apps so you can do things like play games with other iPhones or share data from a supported app to another supported app.

  • Vpn trouble with 10.8.2

    I everybody,
    I have trouble with vpn on OSx Mountain Lion.
    I use a pptp vpn connection, the vpn can connect and access the Internet bug I can't ping local address... I get a time out error message.
    (I choose "Send all traffic over VPN connection" in the advanced settings)
    Is there a known problem with 10.8.2 VPN ? And how can I fix it.
    I had the same problem using Shrew Soft as VPN client.
    Everything worked before update to 10.8.2.
    Thanks,

    #UPDATE
    The problem only occured when both LAN are on the same subnet (ex : 192.168.0.0/24)...

  • Trouble with VPN on HH5

    hello,
    i very recently changed provider to bt about 2 days ago and while i have been connecting all of my devices back up i hit trouble with my VPN server.
    i have made my own firewall rule to allow 500 and 4500 to the VPN server so that i can connect externaly but the connection keeps on timing out. 
    i can connect internaly with no problems but when i try externaly it always fails.
    what could be causing this as i really need this working.

    carbonjoker wrote:
    hello,
    i very recently changed provider to bt about 2 days ago and while i have been connecting all of my devices back up i hit trouble with my VPN server.
    i have made my own firewall rule to allow 500 and 4500 to the VPN server so that i can connect externaly but the connection keeps on timing out. 
    i can connect internaly with no problems but when i try externaly it always fails.
    what could be causing this as i really need this working.
    You will see that a number of people in this forum have been reporting problems with VPN and the HH5; there is also a firmware problem with some HH3. It is possible that you too have have come up against these difficulties.
    However, I see that you are a new customer of BT and there are a couple of problems that BT puts in the way of customers of which you may not be aware.
    Go to http://preferences.webaddresshelp.bt.com/selfcare/preferences.cgi and turn off BT address help; it is not compatible with VPN.
    Also check that your address is not being shared http://btsupport.custhelp.com/app/answers/detail/a_id/44044/c/6433
    Michael

  • Peer to Peer VPN network to share MYOB data file

    I want to network 3 iMacs in two locations to share a MYOB accounting data file.
    Can anyone give me advise on how best to set this up? Does anyone have any experience with using MYOB over VPN?

    In Local security policy: deny logon locally.
    Have you considered creating a homegroup?
    -- pa

  • Windows XP connecting Peer-to-Peer to Windows 7 with HP LJ 4000 through USB-2-Parallel port

    I am running a Peer-to-Peer network and cannot connect my Windows XP computer over the network the 'quasi-server' running Windows 7 that has a connected HP LaserJet 4000 printer connected via a USB-2-Parallel port.  The HP LJ4000 works just fine from the Windows 7 box (and serves ONLY as a backup printer) but connecting from either Windows XP PRO boxes will not work.  
    I have tried opening the Windows 7 Printers window and then updating the printer drivers, like it says it will, and that fails as well.
    ANY suggestions would be appreciated!
    Thank you, 
    Brett W. Sabio
    Regards,
    Brett W. Sabio, CPA-PFA

    Hi,
    You need something like this:
      http://www.shopbot.com.au/pp-belkin-usb-parallel-printer-adapter-f5u002-price-106075.html
    Regards.
    BH
    **Click the KUDOS thumb up on the left to say 'Thanks'**
    Make it easier for other people to find solutions by marking a Reply 'Accept as Solution' if it solves your problem.

  • Amazing trouble with network on two A10-S203 !

    I got two Satellite A10-S203. This notebooks are configured to work on Microsoft network (cable network) with workgroup. Have different IP, name, MAC addresses and same workgroup. At network working about 15 computers. When I connect to network one of them its works fine with network. When I replace previous notebook with second it is work fine too. But when I connect both of them at same time to the network I got trouble. One still works, second can only send pockets but can receive any of them. When this two notebooks are connected to network some of other computers sometimes hangs up.
    This notebooks work fine sparely but together wont work in same network.
    I checked configuration of them hundreds times and it is ok they can see and browse net when are connected separately. Was thinking it is net card MAC addresses conflict but it isnt.
    Can anyone help me with that?
    Message was edited by: TomaszE

    If you want Windows XP on your network, you probably want to do it for as little money as possible. After all, whatever else XP is, it's not cheap. You might even be tempted to upgrade your corporate Win9x machines to XP Home so you can work remotely.Don't do it.
    I know some network administrators who have already been burned by this. Microsoft hasn't made a big deal of it, but XP Home is crippled for serious server-based corporate networking. For the office, XP Professional is the only XP version to consider.
    Unlike all other previous Microsoft operating systems, XP Home will simply not work in an office network environment with NetWare, NT, Samba, or Windows 2000 servers. Period. You simply can't connect to the servers' domains or their file/print services.
    Because of this, you also can't use an XP Home laptop at the office. Nor can you use Home for something as simple as retrieving mail from a protected internal e-mail server over a home Internet connection. Home has only minimal virtual private networking (VPN) with Point to Point Tunneling Protocol (P2TP) or Layer 2 Tunneling Protocol (L2TP), which won't work with many VPN engines. Indeed, Microsoft only advertises its P2TP/IPSec VPN stack in XP Professional as a VPN solution.
    Even if you did cobble together a way to use Home on a domain-based network--and I'm sure someone will do it; you probably wouldn't want to use such a hack. Besides not working with domains, you can't use domain-based or Active Directory-based network administration tools with XP Home. The OS doesn't even include that basic of network administration: Simple Network Management Protocol (SNMP) support. Do you really want an administration hole in your network?
    XP Home also has a built-in network security problem. It's possible on some unsecured domain networks for an XP Home system to be able to access network resources by using pre-existing network login/passwords without actually logging into the domain. Once there, the system can not only not be administered, any network resources that the XP system can access could be hijacked by anyone networking into the XP Home with its insecure Simple File Sharing. And the latter doesn't include login or password protection for system resources. Now, you might think that Internet Connect Firewall (ICF) protects this vulnerability, but you'd be wrong. With ICF up, you can't share files or printers. For practical purposes, you won't want ICF on unless it's a standalone machine connected to the Internet or playing the part of a pure Net server with Internet Connection Sharing (ICS) on a small peer-to-peer (P2P) network.
    XP Home will work in P2P networking with older versions of Windows, but it has significant problems even there. For starters, XP Home will only work with a maximum of five P2P servers; it simply won't work with more than that. XP Professional, on the other hand, will work with up to ten P2P servers. If you have more than that, you need to rethink your network design.
    Another problem with Home on an existing P2P network is that if you run the Network Setup Wizard (NSW) on other machines--which the program will probably ask you to do--it will attempt to make the network confirm to XP's defaults, such as the workgroup name "MSHOME," rather than use the existing network defaults. You should also forget about using NetBEUI. Though that protocol is in Home, Microsoft won't support it. TCP/IP is the only real way to go.
    As for the rest of setup, it will go far better if you know your network defaults and enter them into XP's Network Setup rather than let the wizard attempt to smooth your path for you. Of course, if you're starting a small P2P network from scratch, NSW will actually make the setup run much more smoothly.
    But enough of this, you get the idea. The only way you'll save money in upgrading to XP for your network is to go straight to XP Professional and not waste time on Home; there really is no place for Home at the office

  • Problems with DVTI and Easy-vpn

    Hi,
    I created a test setup with Easy-vpn and DVTI between 2 * 3725.  Although my tunnel comes up  I can't send  a ping from the hub to the spoke . I did some troubleshooting and noticed the following:
    When I ping from the server at the hub site my packet isn't encrypted  and  I receive an error message a the spoke site that I received an unencrypted packet which should have been encrypted.
    When I ping from the client at the spoke to the server   , the packet is encrypted in the spoke and decrypted in the hub router.
    So the most logical conclusion is that there is something wrong at the hub but I can't find out what the problem is....
    Hereby the config of both routers
    HUB router
    Current configuration : 1936 bytes
    version 12.4
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname R2
    boot-start-marker
    boot-end-marker
    aaa new-model
    aaa authentication login default local
    aaa authorization network default local
    aaa session-id common
    memory-size iomem 5
    ip cef   
    multilink bundle-name authenticated
    username cisco privilege 15 password 0 cisco
    archive
    log config
      hidekeys
    crypto isakmp policy 1
    encr 3des
    authentication pre-share
    group 2
    crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0
    crypto isakmp keepalive 10
    crypto isakmp client configuration group cisco
    key cisco
    dns 6.0.0.2
    wins 7.0.0.1
    domain cisco.com
    acl 101
    crypto isakmp profile vi
       match identity group cisco
       isakmp authorization list default
    crypto ipsec transform-set set esp-3des esp-sha-hmac
    crypto ipsec profile vi
    set transform-set set
    set isakmp-profile vi
    crypto dynamic-map dynmap 1
    set transform-set set
    crypto map dynmap isakmp authorization list default
    crypto map dynmap client configuration address respond
    crypto map dynmap 1 ipsec-isakmp dynamic dynmap
    interface FastEthernet0/0
    ip address 10.149.0.221 255.255.255.0
    duplex auto
    speed auto
    interface FastEthernet0/1
    ip address 192.168.2.1 255.255.255.0
    duplex auto
    speed auto
    interface Virtual-Template1 type tunnel
    ip unnumbered FastEthernet0/0
    tunnel source FastEthernet0/0
    tunnel mode ipsec ipv4
    tunnel protection ipsec profile vi
    ip local pool dpool 5.0.0.1 5.0.0.3
    ip local pool dynpool 10.149.0.1 10.149.0.100
    ip forward-protocol nd
    ip route 192.168.1.2 255.255.255.255 10.149.0.220
    ip http server
    no ip http secure-server
    access-list 101 permit ip 192.168.2.0 0.0.0.255 any log
    access-list 101 permit ip any any
    control-plane
    line con 0
    line aux 0
    line vty 0 4
    end
    Spoke router
    R1# sho run
    Building configuration...
    Current configuration : 1228 bytes
    version 12.4
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname R1
    boot-start-marker
    boot-end-marker
    no aaa new-model
    memory-size iomem 5
    ip cef
    multilink bundle-name authenticated
    username cisco privilege 15 password 0 cisco
    archive
    log config
      hidekeys
    crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0
    crypto isakmp keepalive 10
    crypto ipsec client ezvpn ez
    connect auto
    group cisco key cisco
    local-address FastEthernet0/0
    mode network-extension
    peer 10.149.0.221
    virtual-interface 1
    xauth userid mode interactive
    interface FastEthernet0/0
    ip address 10.149.0.220 255.255.255.0
    duplex auto
    speed auto
    crypto ipsec client ezvpn ez
    interface FastEthernet0/1
    ip address 192.168.1.4 255.255.255.0
    duplex auto
    speed auto
    crypto ipsec client ezvpn ez inside
    interface Virtual-Template1 type tunnel
    no ip address
    tunnel mode ipsec ipv4
    ip forward-protocol nd
    ip route 192.168.2.2 255.255.255.255 10.149.0.221
    ip http server
    no ip http secure-server
    control-plane
    line con 0
    line aux 0
    line vty 0 4
    login
    end
    HUB Troubleshooting
    R2#sho crypto session det
    Crypto session current status
    Code: C - IKE Configuration mode, D - Dead Peer Detection    
    K - Keepalives, N - NAT-traversal, X - IKE Extended Authentication
    F - IKE Fragmentation
    Interface: Virtual-Access2
    Profile: vi
    Group: cisco
    Uptime: 00:46:53
    Session status: UP-ACTIVE    
    Peer: 10.149.0.220 port 500 fvrf: (none) ivrf: (none)
          Phase1_id: cisco
          Desc: (none)
      IKE SA: local 10.149.0.221/500 remote 10.149.0.220/500 Active
              Capabilities:CD connid:1007 lifetime:23:13:05
      IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 192.168.1.0/255.255.255.0
            Active SAs: 2, origin: crypto map
            Inbound:  #pkts dec'ed 10 drop 0 life (KB/Sec) 4604343/786
            Outbound: #pkts enc'ed 0 drop 0 life (KB/Sec) 4604345/786
    Spoke troubleshooting
    R1#sho crypto session det
    Crypto session current status
    Code: C - IKE Configuration mode, D - Dead Peer Detection    
    K - Keepalives, N - NAT-traversal, X - IKE Extended Authentication
    F - IKE Fragmentation
    Interface: FastEthernet0/0
    Uptime: 00:27:11
    Session status: UP-ACTIVE    
    Peer: 10.149.0.221 port 500 fvrf: (none) ivrf: (none)
          Phase1_id: 10.149.0.221
          Desc: (none)
      IKE SA: local 10.149.0.220/500 remote 10.149.0.221/500 Active
              Capabilities:CD connid:1007 lifetime:23:32:23
      IPSEC FLOW: permit ip 192.168.1.0/255.255.255.0 0.0.0.0/0.0.0.0
            Active SAs: 2, origin: crypto map
            Inbound:  #pkts dec'ed 0 drop 0 life (KB/Sec) 4514884/1957
            Outbound: #pkts enc'ed 10 drop 0 life (KB/Sec) 4514882/1957

    Hi,
    I created a test setup with Easy-vpn and DVTI between 2 * 3725.  Although my tunnel comes up  I can't send  a ping from the hub to the spoke . I did some troubleshooting and noticed the following:
    When I ping from the server at the hub site my packet isn't encrypted  and  I receive an error message a the spoke site that I received an unencrypted packet which should have been encrypted.
    When I ping from the client at the spoke to the server   , the packet is encrypted in the spoke and decrypted in the hub router.
    So the most logical conclusion is that there is something wrong at the hub but I can't find out what the problem is....
    Hereby the config of both routers
    HUB router
    Current configuration : 1936 bytes
    version 12.4
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname R2
    boot-start-marker
    boot-end-marker
    aaa new-model
    aaa authentication login default local
    aaa authorization network default local
    aaa session-id common
    memory-size iomem 5
    ip cef   
    multilink bundle-name authenticated
    username cisco privilege 15 password 0 cisco
    archive
    log config
      hidekeys
    crypto isakmp policy 1
    encr 3des
    authentication pre-share
    group 2
    crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0
    crypto isakmp keepalive 10
    crypto isakmp client configuration group cisco
    key cisco
    dns 6.0.0.2
    wins 7.0.0.1
    domain cisco.com
    acl 101
    crypto isakmp profile vi
       match identity group cisco
       isakmp authorization list default
    crypto ipsec transform-set set esp-3des esp-sha-hmac
    crypto ipsec profile vi
    set transform-set set
    set isakmp-profile vi
    crypto dynamic-map dynmap 1
    set transform-set set
    crypto map dynmap isakmp authorization list default
    crypto map dynmap client configuration address respond
    crypto map dynmap 1 ipsec-isakmp dynamic dynmap
    interface FastEthernet0/0
    ip address 10.149.0.221 255.255.255.0
    duplex auto
    speed auto
    interface FastEthernet0/1
    ip address 192.168.2.1 255.255.255.0
    duplex auto
    speed auto
    interface Virtual-Template1 type tunnel
    ip unnumbered FastEthernet0/0
    tunnel source FastEthernet0/0
    tunnel mode ipsec ipv4
    tunnel protection ipsec profile vi
    ip local pool dpool 5.0.0.1 5.0.0.3
    ip local pool dynpool 10.149.0.1 10.149.0.100
    ip forward-protocol nd
    ip route 192.168.1.2 255.255.255.255 10.149.0.220
    ip http server
    no ip http secure-server
    access-list 101 permit ip 192.168.2.0 0.0.0.255 any log
    access-list 101 permit ip any any
    control-plane
    line con 0
    line aux 0
    line vty 0 4
    end
    Spoke router
    R1# sho run
    Building configuration...
    Current configuration : 1228 bytes
    version 12.4
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname R1
    boot-start-marker
    boot-end-marker
    no aaa new-model
    memory-size iomem 5
    ip cef
    multilink bundle-name authenticated
    username cisco privilege 15 password 0 cisco
    archive
    log config
      hidekeys
    crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0
    crypto isakmp keepalive 10
    crypto ipsec client ezvpn ez
    connect auto
    group cisco key cisco
    local-address FastEthernet0/0
    mode network-extension
    peer 10.149.0.221
    virtual-interface 1
    xauth userid mode interactive
    interface FastEthernet0/0
    ip address 10.149.0.220 255.255.255.0
    duplex auto
    speed auto
    crypto ipsec client ezvpn ez
    interface FastEthernet0/1
    ip address 192.168.1.4 255.255.255.0
    duplex auto
    speed auto
    crypto ipsec client ezvpn ez inside
    interface Virtual-Template1 type tunnel
    no ip address
    tunnel mode ipsec ipv4
    ip forward-protocol nd
    ip route 192.168.2.2 255.255.255.255 10.149.0.221
    ip http server
    no ip http secure-server
    control-plane
    line con 0
    line aux 0
    line vty 0 4
    login
    end
    HUB Troubleshooting
    R2#sho crypto session det
    Crypto session current status
    Code: C - IKE Configuration mode, D - Dead Peer Detection    
    K - Keepalives, N - NAT-traversal, X - IKE Extended Authentication
    F - IKE Fragmentation
    Interface: Virtual-Access2
    Profile: vi
    Group: cisco
    Uptime: 00:46:53
    Session status: UP-ACTIVE    
    Peer: 10.149.0.220 port 500 fvrf: (none) ivrf: (none)
          Phase1_id: cisco
          Desc: (none)
      IKE SA: local 10.149.0.221/500 remote 10.149.0.220/500 Active
              Capabilities:CD connid:1007 lifetime:23:13:05
      IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 192.168.1.0/255.255.255.0
            Active SAs: 2, origin: crypto map
            Inbound:  #pkts dec'ed 10 drop 0 life (KB/Sec) 4604343/786
            Outbound: #pkts enc'ed 0 drop 0 life (KB/Sec) 4604345/786
    Spoke troubleshooting
    R1#sho crypto session det
    Crypto session current status
    Code: C - IKE Configuration mode, D - Dead Peer Detection    
    K - Keepalives, N - NAT-traversal, X - IKE Extended Authentication
    F - IKE Fragmentation
    Interface: FastEthernet0/0
    Uptime: 00:27:11
    Session status: UP-ACTIVE    
    Peer: 10.149.0.221 port 500 fvrf: (none) ivrf: (none)
          Phase1_id: 10.149.0.221
          Desc: (none)
      IKE SA: local 10.149.0.220/500 remote 10.149.0.221/500 Active
              Capabilities:CD connid:1007 lifetime:23:32:23
      IPSEC FLOW: permit ip 192.168.1.0/255.255.255.0 0.0.0.0/0.0.0.0
            Active SAs: 2, origin: crypto map
            Inbound:  #pkts dec'ed 0 drop 0 life (KB/Sec) 4514884/1957
            Outbound: #pkts enc'ed 10 drop 0 life (KB/Sec) 4514882/1957

  • Trouble with CCME 4 and VIC2-2FXO; IOS 12.4(9)T

    Trouble with CCME 4 and VIC2-2FXO; IOS 12.4(9)T
    I am having trouble making outgoing call or answering incoming call.
    When I try to call out from my IP 7961 phone, it fails with the message "unknown number".
    For incoming call, it rings but when I pick up the call nothing happens,
    Put the receiver back on hook, the phone carries on ringing. I am in UK
    and just trying to set up test system with one analogue line. Any help will
    be most appreciated. My config of the 2811 router is posted below. All calls ineternally works fine.
    Thank you for your help.
    hostname Test-CME
    ip cef
    no ip dhcp use vrf connected
    ip dhcp excluded-address 10.10.10.1 10.10.10.10
    ip dhcp excluded-address 10.139.139.1 10.139.139.10
    ip dhcp pool host
    network 10.10.10.0 255.255.255.0
    default-router 10.10.10.1
    option 150 ip 10.10.10.1
    ip dhcp pool data
    network 10.139.139.0 255.255.255.0
    default-router 10.139.139.1
    dns-server 10.139.139.5
    voice-card 0
    no dspfarm
    voice service voip
    allow-connections h323 to h323
    allow-connections h323 to sip
    allow-connections sip to h323
    allow-connections sip to sip
    supplementary-service h450.12
    h323
    sip
    header-passing
    registrar server expires max 3600 min 3600
    interface FastEthernet0/1
    no ip address
    no ip mroute-cache
    duplex auto
    speed auto
    no shut
    interface FastEthernet0/1.2
    description ** Data VLAN **
    encapsulation dot1Q 2
    ip address 10.139.139.1 255.255.255.0
    interface FastEthernet0/1.3
    description ** Voice VLAN **
    encapsulation dot1Q 3
    ip address 10.10.10.1 255.255.255.0
    ip http server
    ip http authentication local
    no ip http secure-server
    ip http path flash:
    tftp-server flash:S00104000100.sbn
    tftp-server flash:TERM41.7-0-3-0S.loads
    tftp-server flash:term61.default.loads
    tftp-server flash:term41.default.loads
    tftp-server flash:CVM41.2-0-2-26.sbn
    tftp-server flash:cnu41.2-7-6-26.sbn
    tftp-server flash:Jar41.2-9-2-26.sbn
    tftp-server flash:term70.default.loads
    tftp-server flash:term71.default.loads
    tftp-server flash:cnu70.2-7-6-26.sbn
    tftp-server flash:Jar70.2-9-2-26.sbn
    tftp-server flash:TERM70.7-0-3-0S.loads
    tftp-server flash:CVM70.2-0-2-26.sbn
    control-plane
    voice-port 0/3/0
    connection plar opx 202
    caller-id enable
    dial-peer voice 1 pots
    incoming called-number .
    destination-pattern 9T
    port 0/3/0
    telephony-service
    load 7914 S00104000100
    load 7941 TERM41.7-0-3-0S
    load 7961 TERM41.7-0-3-0S
    load 7970 TERM70.7-0-3-0S
    max-ephones 20
    max-dn 40
    ip source-address 10.10.10.1 port 2000
    calling-number initiator
    service phone videoCapability 1
    system message MKC CME
    url services http://10.10.10.1/voiceview/common/login.do
    url authentication
    http://10.10.10.1/voiceview/authentication/authenticate.do
    time-zone 21
    date-format dd-mm-yy
    voicemail 600
    max-conferences 8 gain -6
    call-forward pattern .T
    call-forward system redirecting-expanded
    moh music-on-hold.au
    web admin system name admin secret 0 test
    dn-webedit
    time-webedit
    transfer-system full-consult dss
    transfer-pattern 9.T
    secondary-dialtone 9
    create cnf-files
    ephone-dn 1 dual-line
    number 201
    label 201
    description Sarah
    name Sarah
    ephone-dn 2 dual-line
    number 202
    label 202
    description Vitthal
    name User2 Vitthal
    ephone-dn 3 dual-line
    number 203 secondary
    label 203
    description Neil
    name User3 Neil
    ephone 1
    video
    username "user1" password 201
    mac-address 0018.18EE.947F
    type 7961 addon 1 7914
    button 1:1
    ephone 2
    video
    username "user2" password 202
    mac-address 0018.18BB.B973
    type 7941
    button 1:2
    ephone 3
    video
    username "user3" password 203
    mac-address 0018.1885.6BA2
    type 7970
    button 1:3

    Hi
    Please find enclosed debug attachment for voice ccapi and ephone. First, I called from outside. Extension 202 rings but when I answered on extension 202 nothing happens. Replace the rceiever and the pone starts ringing again.Second step. I tried to call out by dialing 9 and then number but after a while phone displays unknown number.
    Thank you for your help.
    Vitthal

Maybe you are looking for