Internet Access Speed

I have just upgraded to a 16MB connection speed with Deutsche Telecom. The modem's (supplied by the ISP) status page shows a download speed of about 16MB. However, when I measure it on speedtest.net, using either my Airport-connected G5 on OS 10.5, or 2 power bridge connected G3s on 10.2.8 and 10.4.11 and even a windows xp laptop on wireless, the maximum speed I get is about 6MB/sec, which I had before on the 6MB/sec service I upgraded from.
Is there anything I can do to overcome this, or does the solution lie with the ISP?

Network Utility (in the Utilities folder) can tell you, in the Info pane, what speed you are actually connecting at.
Just set the interface to the one you are using (which may show up as en2 or something). Link Staus and speed are shown along with error counts.
If the data rate is very different from what you expected, you may have it manually set to a lower rate.
YouTube files are enormous -- that may be the best it can do.

Similar Messages

  • How to increase internet access speed of OS X 10.5.8 whilst using telstra prepaid wirless broadband internet stick in Darwin, Australia

    Is it possible  to increase internet access speed of Mackbook Pro OS X 10.5.8 whilst using telstra prepaid wirless broadband internet stick in Darwin, Australia?
    How can i do this?

    Network Utility (in the Utilities folder) can tell you, in the Info pane, what speed you are actually connecting at.
    Just set the interface to the one you are using (which may show up as en2 or something). Link Staus and speed are shown along with error counts.
    If the data rate is very different from what you expected, you may have it manually set to a lower rate.
    YouTube files are enormous -- that may be the best it can do.

  • Internet Access Speeds - iMac vs PowerBook G4

    Hi Folks,
    I'm running an iMac7,1 and a PowerBook G4, both located an equal distance from my wifi hub. Neither of them are spring chickens, however my PowerBook is accessing the internet at at least 3 times faster than the iMac. The iMac has 4 times the memory and a faster processor. So what would be causing the slowness and how would I find its source?
    These are both used for work and are "dodgy site" clean. Any ideas?
      Model Name: iMac
      Model Identifier:               iMac7,1
      Processor Name:               Intel Core 2 Duo
      Processor Speed:              2 GHz
      Number Of Processors:     1
      Total Number Of Cores:    2
      L2 Cache:                         4 MB
      Memory:                          3 GB
      Bus Speed:                       800 MHz
      Boot ROM Version:            IM71.007A.B03
      SMC Version (system):       1.20f4
      Machine Name:          PowerBook G4 12"
      Machine Model:          PowerBook6,8
      CPU Type:                         PowerPC G4  (1.5)
      Number Of CPUs:     1
      CPU Speed:                         1.5 GHz
      L2 Cache (per CPU):          512 KB
      Memory:                              768 MB
      Bus Speed:                         167 MHz
      Boot ROM Version:               4.9.0f0
    Thanks
    D

    What version of OS X is the iMac running?  If per chance it is running Lion at this point, then the 3 GB of RAM is very minimal because Lion is a resource hog and increasing the RAM to the maximum 6 GB that your model version 7.1 iMac can stabley use would help it run much faster.  I own the 7.1 iMac also and while Apple originally said that the Maximum RAM was 4 GB, it later was found by online vendors such as OWC and Crucial that the 7.1 was fully stable with 6 GB of RAM, which is what I have been running for years.  And it certainly sped up the system.  The Powerbook running OS X 10.5.7 apparently, does not need as much RAM for that version of OS.
    Hope this helps

  • I downloaded the newest version of Firefox while I was trying to access Yahoo! and now it is horribly, horribly slow. My Internet access is by dial-up. How can I speed things up or how can I get back my prevous version? What number was it?

    I presume that the reason why it takes so much time for Firefox to load and then for me to get responses is because my Internet access if by dial-up. I need a less rich, or complicated, version of Firefox. The previous version was okay in terms of speed. What can I do to speed up the processing. Is it because I downloaded the version from the Yahoo website?

    Try using this extension. <br />
    https://addons.mozilla.org/en-US/firefox/addon/textarea-cache/

  • HT1498 I started downloading a rental movie on apple tv, but I live in a rural area with terrible Internet download speed...is there anyway to stop the download, and resume downloading, onto my iPad when I have access in an urban setting with high speed I

    I started downloading a rental movie on apple tv, but I live in a rural area with terrible Internet download speed...is there anyway to stop the download, and resume downloading, onto my iPad when I have access in an urban setting with high speed Internet?

    Yes, to be honest I was a little surprised myself. But it absolutely didn't connect when plugged into the test socket (I even tried to force a connection from the Home Hub manager but it wasn't having it). It is definitely the master socket. The only extension is a small piece of (engineer installed) phone cable to link the hub and the master socket (because the socket and mains power are unhelpfully on opposite walls of the hallway).
    I ran the Java download for Google anyway and it only took about an hour. The speedtester results are as follows:
     Download speed achieved during the test was - 109 Kbps
     For your connection, the acceptable range of speeds is 50-250 Kbps.
     Additional Information:
     Your DSL Connection Rate :2560 Kbps(DOWN-STREAM), 448 Kbps(UP-STREAM)
     IP Profile for your line is - 135 Kbps
    I don't as a rule disconnect / reboot the hub; today it has been dropping off on its own, while several days ago I tried a few reboots just to try and get a connection.
    Additional info - my exchange is actually called Claypole Fenton (or vice versa). Whatever, my profile has probably been welded to 135k for days and days.
    Cheers
    Nick

  • Wireless Internet access via requires unplugging cable modem -

    I have a brand new MacBook Pro with Snow Leopard (10.6.1) and Airport Express (7.4.2). I have high speed Internet via Comcast/cable modem. I spent 30 minutes with the Apple Tech Support folks and was finally able to get wireless internet access. However, after I shutdown and reboot, the only way I can wireless internet is to unplug the internet cable from both the wall plug and cable modem and unplug the modem, both for about two minutes. This isnt what I had in mind when I crossed over from the dark side (PC laptop world) and am having buyer's remorse. Does anyone know how I can fix this problem (i dont want to unplug cables before each session on the internet)?

    Mr. Timmons,
    Thank you so much for the response.  I thought the complete reboot would work, but apparently not.  I followed the directions precisely, even waiting a few minutes longer than suggested for each of the steps.  My air express is still blinking yellow.  I think the issue has something to do with the DHCP and the IP address which are diifferent. The IP address is one series of number (starts with 169), and the LAN IP address is another number (starts with 10). Status on airport express show yellow for internet connection, and yellow for no DSN servers. When I go to the internet tab of airport utility, it shows the iPv4 address starts wutg the 169 number. When I click on the network tab, the DHCP range starts with the 10 number.  When I open the Network Options window, the iPv4 DHCP range starts with the 10 number.  I am at a loss as to how to get them to match up (with either the 169 number or the 10 number).  V/R sjbgtmo

  • New WRT320N - slow internet access help!

    Hi, we'e just installed a new WRT320N. We have broadband access via Virgin Broadband and have a fairly new modem. When we access the internet via the router it is really slow. This is the case whether the connection is wired (our PC doesn't have wireless, so the connection is wired - ie cable between router and modem and then cable between router and PC) or wireless (ie PC with wireless n card). If I unplug both and reboot, connection is initially fast and then slows down again.
    If I connect the computer directly to the modem, the speed of internet access is fine. So there is nothing wrong with broadband generally, it is definitely something to do with the Linksys router and possibly the way it is communicating with the modem.
    The one thing I've noticed is that when connected directly via modem without the router, speed is 100 mbps whereas when connected with Linksys router, speed is 1.0 Gbps.
    Help! Thinking of giving up and returning the Linksys router and going with the one Virgin recommend (Netgear) but we'd rather not.
    Virgin tech guys said we might need Linksys firmware update?
    Anyone got any ideas? We're not v techie here and clueless .... Thanks v much!

    100Mbps is the maximum supported on a Virgin modem, whereas your "gigabit" router is capable of outputting at 1Gbps or 1000Mbps. This is normal and has no bearing on your issue.
    Go into the router config page at 192.168.1.1, change the MTU size to 1350, reboot both modem and router and see if that makes any difference.
    Also check what version of firmware you have, it will tell you in the config (top right hand corner usually)
    The latest available here is: Ver.1.0.03 build 10
    http://www.linksysbycisco.com/UK/en/support/WRT320N/download
    Message Edited by Matt Hall on 02-07-2010 07:13 PM

  • No Internet access

    Hi everybody,
    I am unable to access internet with one of the vlan. i have two vlans
    VLAN 2   192.168.1.0
    VLAN 8   172.168.1.0
    When i am on vlan 2 i can access to internet. when i work with vlan 8, i cannot access to internet. As a matter of fact VLAN 8 (172.168.1.0) is new. I need to know what else i need to configure to get access. the following is the configuration of my cisco ASA firewall. Any help will be apprieciated.
    Thanks
    hostname abcASA1
    domain-name abc.com
    enable password .4rNnGSuheRe encrypted
    passwd 2KFQnbNIdI.2K encrypted
    names
    name 192.168.1.3 Email_DNS
    name 192.168.1.4 SQLServer
    name 192.168.2.2 VPN_3005
    name 192.168.2.0 DMZ_Subnet
    name 192.168.3.0 VPN_Subnet
    name 192.168.1.0 Inside_Subnet
    name 192.168.3.5 VPNNET_DNS
    name 128.8.10.90 D_Root
    name 192.5.5.241 F_Root
    name 198.41.0.10 J_Root
    name 192.33.4.12 C_Root
    name 193.0.14.129 K_Root
    name 198.32.64.12 L_Root
    name 192.36.148.17 I_Root
    name 192.112.36.4 G_Root
    name 128.63.2.53 H_Root
    name 128.9.0.107 B_Root
    name 198.41.0.4 A_Root
    name 202.12.27.33 M_Root
    name 192.203.230.10 E_Root
    name 12.183.68.51 ATT_DNS_2
    name 12.183.68.50 ATT_DNS_1
    name 192.168.1.6 FileServer_NAS
    name 192.168.2.6 abc_WEB
    name 199.130.197.153 CA_Mgmt_USDA
    name 199.130.197.19 CA_Roaming_USDA
    name 199.130.214.49 CA_CRLChk_USDA
    name 199.134.134.133 CA_Mgmt_USDA_
    name 199.134.134.135 CA_Roaming_USDA2
    name 192.168.2.9 PublicDNS2
    name 192.168.2.8 PublicDNS
    name 192.168.1.11 abc02EX2
    name 162.140.109.7 GPO_PKI_DIR
    name 162.140.9.10 GPO_PKI
    name 192.168.1.12 Patchlink
    name 192.168.1.10 abcSLIMPS1
    name 192.168.1.7 FileServer_DNS
    name 192.168.1.15 abc06ex2
    name 192.168.101.0 NEW_VPN_SUBNET
    name 192.168.77.0 NEW_VPN_POOL description NEW_VPN_POOL
    name 192.168.1.16 VTC description LifeSize VTC
    name 12.18.13.16 VTC_Outside
    name 192.168.2.50 Email_Gateway
    name 192.168.1.20 Exch10
    name 192.168.1.8 SharePoint
    name 192.168.1.19 abc09ic description Web Servr
    name 192.168.1.180 ExternalDNS
    name 192.168.2.223 abc11ids
    name 192.168.50.0 inside_new_Network
    dns-guard
    interface Vlan1
    nameif outside
    security-level 0
    ip address 12.18.13.20 255.255.255.0
    interface Vlan2
    nameif inside
    security-level 100
    ip address 192.168.1.1 255.255.255.0
    interface Vlan3
    nameif dmz
    security-level 10
    ip address 192.168.2.1 255.255.255.0
    interface Vlan4
    nameif vpnnet
    security-level 75
    ip address 192.168.3.1 255.255.255.0
    interface Vlan5
    nameif asainside
    security-level 50
    ip address 192.168.4.1 255.255.255.0
    interface Vlan6
    nameif testinside
    security-level 50
    ip address 192.168.5.1 255.255.255.0
    ipv6 address 2001:ab1:5::/64 eui-64
    interface Vlan7
    description New Local Area Network for Server
    nameif inside_new
    security-level 50
    ip address 192.168.50.1 255.255.255.0
    interface Vlan8
    description abcdone Server VLAN
    nameif Internal_LAN
    security-level 100
    ip address 172.168.1.254 255.255.255.0
    interface Vlan16
    description out of band
    nameif oobnet
    security-level 100
    ip address 172.16.1.1 255.255.255.0
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    speed 100
    duplex full
    interface Ethernet0/2
    switchport access vlan 3
    interface Ethernet0/3
    switchport access vlan 7
    interface Ethernet0/4
    interface Ethernet0/5
    switchport trunk allowed vlan 1-10
    switchport mode trunk
    interface Ethernet0/6
    interface Ethernet0/7
    boot system disk0:/asa802-k8.bin
    ftp mode passive
    clock timezone EST -5
    clock summer-time EDT recurring
    dns domain-lookup inside
    dns domain-lookup vpnnet
    dns server-group DefaultDNS
    name-server 192.168.1.2
    name-server Email_DNS
    domain-name abc.com
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object-group network Inside_Server_Group
    description EmailServer, FileServer, SQLServer
    network-object Email_DNS 255.255.255.255
    network-object SQLServer 255.255.255.255
    network-object 192.168.1.2 255.255.255.255
    network-object FileServer_NAS 255.255.255.255
    network-object host abc02EX2
    network-object host abc06ex2
    object-group network Inside_Server_Group_ref
    network-object 192.168.3.73 255.255.255.255
    network-object 192.168.3.74 255.255.255.255
    network-object 192.168.3.72 255.255.255.255
    network-object 192.168.3.76 255.255.255.255
    object-group service DNS tcp-udp
    description DNS Service both TCP/UDP
    port-object eq domain
    object-group network InternetDNS
    network-object A_Root 255.255.255.255
    network-object B_Root 255.255.255.255
    network-object C_Root 255.255.255.255
    network-object D_Root 255.255.255.255
    network-object E_Root 255.255.255.255
    network-object F_Root 255.255.255.255
    network-object G_Root 255.255.255.255
    network-object H_Root 255.255.255.255
    network-object I_Root 255.255.255.255
    network-object J_Root 255.255.255.255
    network-object K_Root 255.255.255.255
    network-object L_Root 255.255.255.255
    network-object M_Root 255.255.255.255
    network-object ATT_DNS_2 255.255.255.255
    network-object ATT_DNS_1 255.255.255.255
    object-group network USDA-PKI-Users
    description GAO PKI User Group
    network-object 192.168.1.51 255.255.255.255
    network-object 192.168.1.52 255.255.255.255
    network-object 192.168.1.53 255.255.255.255
    network-object 192.168.1.54 255.255.255.255
    network-object 192.168.1.55 255.255.255.255
    network-object 192.168.1.56 255.255.255.255
    network-object 192.168.1.57 255.255.255.255
    network-object 192.168.1.58 255.255.255.255
    network-object 192.168.1.59 255.255.255.255
    network-object 192.168.1.60 255.255.255.255
    network-object host 192.168.1.61
    network-object host 192.168.1.62
    network-object host 192.168.1.63
    object-group network CITABCDAS
    network-object 192.168.3.241 255.255.255.255
    network-object 192.168.3.242 255.255.255.255
    network-object 192.168.3.243 255.255.255.255
    network-object 192.168.3.244 255.255.255.255
    network-object 192.168.3.245 255.255.255.255
    network-object VPNNET_DNS 255.255.255.255
    object-group service Virginia.edu tcp
    description blackboard java classroom
    port-object range 8010 8012
    object-group network PDASB1-VPN-Inside
    network-object host abcPLIasd1
    network-object host 192.168.3.10
    object-group service http-https tcp
    port-object range https https
    port-object range www www
    object-group protocol TCPUDP
    protocol-object udp
    protocol-object tcp
    object-group service VTC tcp-udp
    description LifeSize
    port-object range 60000 64999
    object-group service DM_INLINE_TCP_1 tcp
    port-object eq 3268
    port-object eq ldap
    object-group service EmailGateway udp
    description TrustManager
    port-object eq 19200
    port-object eq 8007
    object-group service DM_INLINE_TCP_2 tcp
    port-object eq 990
    port-object eq ftp
    port-object range 2000 5000
    object-group service Barracuda tcp
    port-object eq 5124
    port-object eq 5126
    object-group service barracuda udp
    port-object eq 5124
    port-object eq 5126
    object-group service IMAP tcp
    port-object eq 993
    port-object eq imap4
    object-group service DM_INLINE_SERVICE_0
    service-object tcp eq domain
    service-object udp eq domain
    access-list inside_access_in extended permit ip any any
    access-list inside_access_in extended permit object-group TCPUDP any object-group InternetDNS object-group DNS
    access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_0 any host 12.18.13.222
    access-list outside_access_in remark Website
    access-list outside_access_in extended permit tcp any host 12.18.13.19 eq 8090
    access-list outside_access_in remark Allow ICMP replies to inside
    access-list outside_access_in extended permit icmp any host 12.18.13.21 echo-reply
    access-list outside_access_in remark VTC
    access-list outside_access_in extended permit tcp any host VTC_Outside eq h323
    access-list outside_access_in remark VTC
    access-list outside_access_in extended permit object-group TCPUDP any host VTC_Outside eq sip
    access-list outside_access_in extended permit icmp any host VTC_Outside
    access-list outside_access_in remark Barracuda
    access-list outside_access_in extended permit tcp any host 192.168.1.25 object-group Barracuda
    access-list outside_access_in remark Barracuda
    access-list outside_access_in extended permit udp any host 192.168.1.25 object-group barracuda
    access-list outside_access_in remark VTC
    access-list outside_access_in extended permit udp any host VTC_Outside range 60000 64999
    access-list outside_access_in remark VTC
    access-list outside_access_in extended permit tcp any host VTC_Outside range 60000 64999
    access-list outside_access_in remark for Public DNS2
    access-list outside_access_in extended permit udp any host 12.18.13.223 eq domain
    access-list outside_access_in remark for Public DNS2
    access-list outside_access_in extended permit tcp any host 12.18.13.223 eq domain
    access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.224 eq www
    access-list outside_access_in remark NTP from Router to DMZ
    access-list outside_access_in extended permit udp host 12.18.13.1 host 12.18.13.15 eq ntp
    access-list outside_access_in remark Syslog from Router
    access-list outside_access_in extended permit udp host 12.18.13.1 gt 1023 host 12.18.13.13 eq syslog
    access-list outside_access_in remark Inbound Email SMTP to DMZ Host 192.168.2.50
    access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.13 eq smtp
    access-list outside_access_in remark VPNNET IPSec ESP
    access-list outside_access_in extended permit esp any host 12.18.13.31
    access-list outside_access_in remark VPNNET IPSec AH
    access-list outside_access_in extended permit ah any host 12.18.13.31
    access-list outside_access_in remark VPNNET IPSec Port 4500
    access-list outside_access_in extended permit udp any eq 4500 host 12.18.13.31 eq 4500
    access-list outside_access_in remark VPNNET IPSec ISAKMP
    access-list outside_access_in extended permit udp any eq isakmp host 12.18.13.31 eq isakmp
    access-list outside_access_in remark VPNNET IPSec over UDP port 10000
    access-list outside_access_in extended permit udp any eq 10000 host 12.18.13.31 eq 10000
    access-list outside_access_in remark Sharepoint1
    access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.42 eq https
    access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.31 eq https
    access-list outside_access_in remark Access Rule to Webmail
    access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.32 eq https
    access-list outside_access_in remark SLIMPSdev
    access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.33 object-group http-https
    access-list outside_access_in remark Inbound Website
    access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.19 eq www
    access-list outside_access_in remark Inbound SharePoint
    access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.42 eq www
    access-list outside_access_in remark Inbound WEb Traffic to ISA server-SLIMPS
    access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.41 eq www
    access-list outside_access_in remark Inbound Secure Web Traffic to ISA server-SLIMPS
    access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.41 eq https
    access-list outside_access_in remark Inbound FTP abc_web
    access-list outside_access_in extended permit tcp any host 12.18.13.14 object-group DM_INLINE_TCP_2
    access-list outside_access_in remark DNS1
    access-list outside_access_in remark for Public DNS2
    access-list outside_access_in remark for Public DNS2
    access-list outside_access_in remark NTP from Router to DMZ
    access-list outside_access_in remark Syslog from Router
    access-list outside_access_in remark Inbound Email SMTP to DMZ Host 192.168.2.5
    access-list outside_access_in remark VPNNET IPSec ESP
    access-list outside_access_in remark VPNNET IPSec AH
    access-list outside_access_in remark VPNNET IPSec Port 4500
    access-list outside_access_in remark VPNNET IPSec ISAKMP
    access-list outside_access_in remark VPNNET IPSec over UDP port 10000
    access-list outside_access_in remark Inbound WEb Traffic to Facilitate Web Server in DMZ
    access-list outside_access_in remark Inbound Secure Web Traffic to Facilitate Web Server in DMZ
    access-list outside_access_in remark Access Rule to FE Server
    access-list outside_access_in remark SLIMPSdev
    access-list outside_access_in remark Inbound WEb Traffic to ISA server-SLIMPS
    access-list outside_access_in remark Inbound Secure Web Traffic to ISA server-SLIMPS
    access-list outside_access_in remark Inbound port 93 to ISA server-SLIMPS
    access-list outside_access_in remark Explicit Deny All
    access-list vpnnet_access_in remark Patrica RDP
    access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.53 eq 3389
    access-list vpnnet_access_in remark Berry RDP
    access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.51 eq 3389
    access-list vpnnet_access_in remark John Tsai RDP
    access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.156 eq 3389
    access-list vpnnet_access_in remark Chopper RDP
    access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.128 eq 3389
    access-list vpnnet_access_in remark Ms Ballard RDP
    access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.58 eq 3389
    access-list vpnnet_access_in remark Wakita
    access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.153 eq 3389
    access-list vpnnet_access_in remark Amy RDP
    access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.124 eq 3389
    access-list vpnnet_access_in remark KC RDP
    access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.57 eq 3389
    access-list vpnnet_access_in remark Eyang RDP
    access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.161 eq 3389
    access-list vpnnet_access_in remark SLIMPS doc
    access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.13 eq 3389
    access-list vpnnet_access_in extended deny ip any any
    access-list vpnnet_access_in remark for SLIMPS APP
    access-list vpnnet_access_in remark for SLIMPS APP
    access-list vpnnet_access_in remark for SLIMPS APP
    access-list vpnnet_access_in remark FOR SLIMPS Application
    access-list vpnnet_access_in remark SLIMPS Production Workflow
    access-list vpnnet_access_in remark SLIMPS
    access-list vpnnet_access_in remark FOR SLIMPS Application
    access-list vpnnet_access_in remark SLIMPS VPN access to SLIMPSTEST2 Alpha website
    access-list vpnnet_access_in remark SLIMPS VPN access to abc02SLIMPS1
    access-list vpnnet_access_in remark SLIMPS VPN access to abc02SLIMPS2
    access-list vpnnet_access_in remark for abc06SLIMPS1
    access-list vpnnet_access_in remark for abc06SLIMPS1
    access-list vpnnet_access_in remark VPNNET Windows Port 135 Netbios
    access-list vpnnet_access_in remark VPNNET Windows Port 137 Netbios Name Service
    access-list vpnnet_access_in remark VPNNET Windows Port 138 Netbios Datagram
    access-list vpnnet_access_in remark VPNNET Windows Port 139 Netbios Session Service
    access-list vpnnet_access_in remark VPNNET Windows Port 445 Server Message Block
    access-list vpnnet_access_in remark VPNNET Windows Port 389 Lightweight Directory Access Protocol
    access-list vpnnet_access_in remark VPNNET Windows Port 389 Lightweight Directory Access Protocol
    access-list vpnnet_access_in remark VPNNET Windows Port 88 Kerberos
    access-list vpnnet_access_in remark VPNNET Windows Port 88 Kerberos
    access-list vpnnet_access_in remark VPNNET Windows Port 1433 Windows Sql Server
    access-list vpnnet_access_in remark VPNNET Windows Port 9000 Static RPC Port
    access-list vpnnet_access_in remark VPNNET Windows Port 9000 Static RPC Port
    access-list vpnnet_access_in remark VPNNET Windows Port 9001 Static RPC Port
    access-list vpnnet_access_in remark VPNNET Windows Port 9001 Static RPC Port
    access-list vpnnet_access_in remark VPNNET Windows Port 4000 Status NTDS Port
    access-list vpnnet_access_in remark VPNNET Windows TCP Domain Name Service
    access-list vpnnet_access_in remark VPNNET Windows UDP Domain Name Service
    access-list vpnnet_access_in remark VPNNET DNS Forwarding to DMZ DNS
    access-list vpnnet_access_in remark VPNNET DNS Forwarding to DMZ DNS
    access-list vpnnet_access_in remark VPNNET DNS Forwarding to DMZ DNS
    access-list vpnnet_access_in remark VPNNET DNS Forwarding to DMZ DNS
    access-list vpnnet_access_in remark VPNNET Outbound Web
    access-list vpnnet_access_in remark VPNNET Outbound Secure Web
    access-list vpnnet_access_in remark VPNNET Outbound FTP
    access-list vpnnet_access_in remark VPNNET ICMP Echo
    access-list vpnnet_access_in remark VPNNET ICMP Echo-Reply
    access-list vpnnet_access_in remark RDP for ISA
    access-list vpnnet_access_in remark Allow access after Exemption from nat to inside network
    access-list vpnnet_access_in remark talin test
    access-list dmz_access_in remark isa to SLIMPS1 vote portal
    access-list dmz_access_in extended permit tcp host 192.168.2.20 host 192.168.2.10 eq 8200
    access-list dmz_access_in extended permit udp host 192.168.2.101 host 12.18.13.1 eq ntp
    access-list dmz_access_in remark ISA to SLIMPS Dev
    access-list dmz_access_in extended permit tcp host 192.168.2.14 host 12.18.13.33 eq www inactive
    access-list dmz_access_in remark ClearSwift TRUSTmanager Reputations server &
    access-list dmz_access_in remark Broadcasting of greylisting data to peer Gateway
    access-list dmz_access_in extended permit udp host Email_Gateway any eq 8007
    access-list dmz_access_in remark ClearSwift TRUSTmanager Reputations server &
    access-list dmz_access_in remark Broadcasting of greylisting data to peer Gateway
    access-list dmz_access_in extended permit udp host Email_Gateway any eq 19200
    access-list dmz_access_in remark NTP Email Gateway
    access-list dmz_access_in extended permit udp host Email_Gateway gt 1023 host FileServer_DNS eq ntp
    access-list dmz_access_in remark FTP
    access-list dmz_access_in extended permit tcp host Email_Gateway host FileServer_DNS eq ftp
    access-list dmz_access_in remark ldap
    access-list dmz_access_in extended permit udp host Email_Gateway gt 1023 host 192.168.2.78
    access-list dmz_access_in remark ldap
    access-list dmz_access_in extended permit udp host SharePoint gt 1023 host 192.168.2.78
    access-list dmz_access_in remark HTTP for Email_Gateway
    access-list dmz_access_in extended permit object-group TCPUDP host Email_Gateway host FileServer_DNS object-group DNS
    access-list dmz_access_in remark HTTP for Email_Gateway
    access-list dmz_access_in extended permit tcp host Email_Gateway host FileServer_DNS eq ldap
    access-list dmz_access_in remark HTTP for Email_Gateway
    access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 host 192.168.2.78 eq www inactive
    access-list dmz_access_in remark HTTPS access to the Clearswift Update Server
    access-list dmz_access_in extended permit tcp Inside_Subnet 255.255.255.0 gt 1023 host Email_Gateway eq https inactive
    access-list dmz_access_in remark HTTP for SharePoint
    access-list dmz_access_in extended permit tcp host SharePoint host FileServer_DNS eq ldap
    access-list dmz_access_in remark LDAP Communication for Email Gateway
    access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 host 192.168.2.78 object-group DM_INLINE_TCP_1
    access-list dmz_access_in remark LDAP Communication
    access-list dmz_access_in extended permit tcp host SharePoint gt 1023 host 192.168.2.78 eq 3268
    access-list dmz_access_in remark DMZ DNS Forwarding to Outside
    access-list dmz_access_in extended permit udp host PublicDNS object-group InternetDNS object-group DNS
    access-list dmz_access_in remark DMZ DNS Forwarding to Outside for Email Gateway
    access-list dmz_access_in extended permit udp host Email_Gateway gt 1023 object-group InternetDNS object-group DNS
    access-list dmz_access_in remark DMZ ISA DNS Forwarding to Outside
    access-list dmz_access_in extended permit udp host 192.168.2.15 gt 1023 object-group InternetDNS object-group DNS
    access-list dmz_access_in remark DMZ DNS Forwarding to Outside
    access-list dmz_access_in extended permit udp host SharePoint gt 1023 object-group InternetDNS object-group DNS
    access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)
    access-list dmz_access_in extended permit udp host abc_WEB gt 1023 object-group InternetDNS object-group DNS
    access-list dmz_access_in remark DMZ DNS Forwarding to Outside for Email Gateway
    access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 object-group InternetDNS object-group DNS
    access-list dmz_access_in remark DMZ DNS Forwarding to Outside
    access-list dmz_access_in extended permit tcp host SharePoint gt 1023 object-group InternetDNS object-group DNS inactive
    access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)
    access-list dmz_access_in extended permit tcp host PublicDNS gt 1023 any eq https
    access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)
    access-list dmz_access_in extended permit tcp host PublicDNS2 gt 1023 any eq https
    access-list dmz_access_in remark DMZ DNS Outbound https Web
    access-list dmz_access_in extended permit tcp host abc_WEB gt 1023 object-group InternetDNS object-group DNS inactive
    access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Email Static Address
    access-list dmz_access_in extended permit udp host PublicDNS gt 1023 object-group InternetDNS object-group DNS
    access-list dmz_access_in remark Public DNS server.
    access-list dmz_access_in extended permit tcp host PublicDNS2 gt 1023 object-group InternetDNS object-group DNS
    access-list dmz_access_in remark Public DNS Server
    access-list dmz_access_in extended permit tcp host PublicDNS gt 1023 any eq www
    access-list dmz_access_in remark Public DNS Server
    access-list dmz_access_in extended permit tcp host PublicDNS2 gt 1023 any eq www
    access-list dmz_access_in remark DMZ Public DNS Outbound Web
    access-list dmz_access_in remark DMZ Public DNS Outbound Web
    access-list dmz_access_in remark DMZ Public  DNS to Outside
    access-list dmz_access_in remark DMZ DNS to Outside
    access-list dmz_access_in remark DMZ Public DNS Outbound Web
    access-list dmz_access_in extended deny tcp host SharePoint gt 1023 host 192.168.2.73 eq www
    access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Email Static Address
    access-list dmz_access_in extended deny tcp host abc_WEB gt 1023 host 192.168.2.73 eq www
    access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Web Shield Static Address
    access-list dmz_access_in extended deny tcp host SharePoint gt 1023 host 192.168.2.75 eq www
    access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Web Shield Static Address
    access-list dmz_access_in extended deny tcp host abc_WEB gt 1023 host 192.168.2.75 eq www
    access-list dmz_access_in remark DMZ DNS FTP for Email Gateway
    access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 any eq ftp
    access-list dmz_access_in remark DMZ DNS Outbound Web for Email Gateway
    access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 any eq www
    access-list dmz_access_in remark DMZ ISA DNS Outbound Web
    access-list dmz_access_in extended permit tcp host 192.168.2.15 gt 1023 any eq www
    access-list dmz_access_in remark DMZ DNS Outbound Web
    access-list dmz_access_in extended permit tcp host SharePoint gt 1023 any eq www
    access-list dmz_access_in remark For Email  Gateway
    access-list dmz_access_in extended permit icmp host Email_Gateway host 12.18.13.1
    access-list dmz_access_in remark ISA
    access-list dmz_access_in extended permit icmp host 192.168.2.15 host 12.18.13.1
    access-list dmz_access_in extended permit icmp host SharePoint host 12.18.13.1
    access-list dmz_access_in remark DMZ DNS Outbound Web
    access-list dmz_access_in extended permit tcp host abc_WEB gt 1023 any eq www
    access-list dmz_access_in extended permit tcp host 192.168.2.7 gt 1023 any eq www
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address
    access-list dmz_access_in extended deny tcp host SharePoint gt 1023 host 192.168.2.73 eq ftp inactive
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address
    access-list dmz_access_in extended deny tcp host abc_WEB gt 1023 host 192.168.2.73 eq ftp
    access-list dmz_access_in remark DMZ DNS Outbound FTP
    access-list dmz_access_in extended permit tcp host SharePoint gt 1023 any eq ftp inactive
    access-list dmz_access_in remark DMZ DNS Outbound FTP
    access-list dmz_access_in extended permit tcp host abc_WEB gt 1023 any eq ftp
    access-list dmz_access_in remark DMZ DNS Inbound Email Relay SMTP
    access-list dmz_access_in extended permit tcp host SharePoint host 192.168.2.73 eq smtp
    access-list dmz_access_in remark DMZ DNS Inbound Email Gateway SMTP
    access-list dmz_access_in extended permit tcp host Email_Gateway host 192.168.2.77 eq smtp
    access-list dmz_access_in remark DMZ DNS Inbound Email Gateway SMTP
    access-list dmz_access_in extended permit tcp host Email_Gateway host Exch10 eq smtp
    access-list dmz_access_in remark DMZ DNS Inbound Email Gateway SMTP
    access-list dmz_access_in extended permit tcp host Email_Gateway host abc06ex2 eq smtp
    access-list dmz_access_in remark DMZ DNS Inbound Email Relay SMTP
    access-list dmz_access_in extended permit tcp host SharePoint host abc06ex2 eq smtp inactive
    access-list dmz_access_in remark DMZ DNS Inbound Web Shield Relay SMTP
    access-list dmz_access_in extended permit tcp host SharePoint gt 1023 host 192.168.2.75 eq smtp inactive
    access-list dmz_access_in remark Mailsweeper access to FE Server
    access-list dmz_access_in extended permit tcp host SharePoint gt 1023 host 192.168.2.11 eq smtp inactive
    access-list dmz_access_in extended permit tcp host 192.168.2.7 gt 1023 host 192.168.2.73 eq smtp
    access-list dmz_access_in extended permit tcp host 192.168.2.7 gt 1023 host 192.168.2.75 eq smtp
    access-list dmz_access_in remark DMZ EMail Gateway outbound delivery
    access-list dmz_access_in extended permit tcp host Email_Gateway any eq smtp
    access-list dmz_access_in remark DMZ Mail Sweeper outbound delivery
    access-list dmz_access_in extended permit tcp host SharePoint any eq smtp inactive
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address
    access-list dmz_access_in extended deny tcp host SharePoint gt 1023 host 192.168.2.73 eq https inactive
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address
    access-list dmz_access_in extended deny tcp host abc_WEB gt 1023 host 192.168.2.73 eq https
    access-list dmz_access_in remark DMZ DNS Outbound HTTPS for Email Gateway
    access-list dmz_access_in extended permit udp host Email_Gateway object-group EmailGateway any eq 8007
    access-list dmz_access_in remark DMZ DNS Outbound HTTPS for Email Gateway
    access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 any eq https
    access-list dmz_access_in remark DMZ DNS Outbound HTTPS
    access-list dmz_access_in extended permit tcp host SharePoint gt 1023 any eq https
    access-list dmz_access_in remark DMZ DNS Outbound HTTPS
    access-list dmz_access_in extended permit tcp host abc_WEB gt 1023 any eq https inactive
    access-list dmz_access_in extended permit tcp host 192.168.2.7 gt 1023 any eq https inactive
    access-list dmz_access_in remark DMZ DNS Outbound SMTP to Internet
    access-list dmz_access_in extended permit tcp host SharePoint gt 1023 any eq smtp inactive
    access-list dmz_access_in remark for ISA
    access-list dmz_access_in extended permit tcp host 192.168.2.20 gt 1023 any eq www
    access-list dmz_access_in remark for ISA
    access-list dmz_access_in extended permit tcp host 192.168.2.20 gt 1023 any eq https
    access-list dmz_access_in extended permit object-group TCPUDP host SharePoint Inside_Subnet 255.255.255.0 eq domain
    access-list dmz_access_in extended permit icmp host SharePoint Inside_Subnet 255.255.255.0
    access-list dmz_access_in extended permit ip host abc11ids any
    access-list dmz_access_in extended permit ip Inside_Subnet 255.255.255.0 any
    access-list dmz_access_in remark Explicit Rule
    access-list dmz_access_in extended deny ip any any
    access-list dmz_access_in remark isa to SLIMPS1 vote portal
    access-list dmz_access_in remark ISA to SLIMPS Dev
    access-list dmz_access_in remark ldap
    access-list dmz_access_in remark LDAP Communication
    access-list dmz_access_in remark DMZ DNS Forwarding to Outside
    access-list dmz_access_in remark DMZ DNS Forwarding to Outside
    access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)
    access-list dmz_access_in remark DMZ DNS Forwarding to Outside
    access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)
    access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)
    access-list dmz_access_in remark DMZ DNS Outbound https Web
    access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Email Static Address
    access-list dmz_access_in remark Public DNS server.
    access-list dmz_access_in remark Public DNS Server
    access-list dmz_access_in remark Public DNS Server
    access-list dmz_access_in remark DMZ Public DNS Outbound Web
    access-list dmz_access_in remark DMZ Public  DNS to Outside
    access-list dmz_access_in remark DMZ DNS to Outside
    access-list dmz_access_in remark DMZ Public DNS Outbound Web
    access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Email Static Address
    access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Web Shield Static Address
    access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Web Shield Static Address
    access-list dmz_access_in remark DMZ DNS Outbound Web
    access-list dmz_access_in remark DMZ DNS Outbound Web
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Web Shield Static Address
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Web Shield Static Address
    access-list dmz_access_in remark DMZ DNS Outbound FTP
    access-list dmz_access_in remark DMZ DNS Outbound FTP
    access-list dmz_access_in remark DMZ DNS Inbound Email Relay SMTP
    access-list dmz_access_in remark DMZ DNS Inbound Email Relay SMTP
    access-list dmz_access_in remark DMZ DNS Inbound Web Shield Relay SMTP
    access-list dmz_access_in remark Mailsweeper access to FE Server
    access-list dmz_access_in remark DMZ Mail Sweeper outbound delivery
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Web Shield Static Address
    access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Web Shield Static Address
    access-list dmz_access_in remark DMZ DNS Outbound HTTPS
    access-list dmz_access_in remark DMZ DNS Outbound HTTPS
    access-list dmz_access_in remark DMZ DNS Outbound SMTP to Internet
    access-list dmz_access_in remark for ISA
    access-list dmz_access_in remark for ISA
    access-list dmz_access_in remark Explicit Deny All
    access-list testinside_access_in remark Deny IP Traffic from Test to Production DMZ
    access-list testinside_access_in remark Allow all other Traffic to Outside
    access-list testinside_access_in remark Deny IP Traffic from Test to Production DMZ
    access-list testinside_access_in remark Allow all other Traffic to Outside
    access-list vpnnet_nat0_outbound extended permit ip VPN_Subnet 255.255.255.0 Inside_Subnet 255.255.255.0
    access-list vpnnet_nat0_outbound extended permit ip VPN_Subnet 255.255.255.0 NEW_VPN_POOL 255.255.255.0
    access-list inside_nat0_outbound extended permit ip Inside_Subnet 255.255.255.0 host Email_Gateway
    access-list inside_nat0_outbound remark SharePoint
    access-list inside_nat0_outbound extended permit ip Inside_Subnet 255.255.255.0 host SharePoint
    access-list inside_nat0_outbound extended permit ip Inside_Subnet 255.255.255.0 NEW_VPN_POOL 255.255.255.0
    access-list dmz_nat0_outbound remark For Email Gateway
    access-list dmz_nat0_outbound extended permit ip host Email_Gateway Inside_Subnet 255.255.255.0
    access-list dmz_nat0_outbound remark Sharepoint
    access-list dmz_nat0_outbound extended permit ip host SharePoint Inside_Subnet 255.255.255.0
    access-list dmz_nat0_outbound extended permit ip DMZ_Subnet 255.255.255.0 NEW_VPN_SUBNET 255.255.255.0
    access-list dmz_nat0_outbound extended permit ip DMZ_Subnet 255.255.255.0 NEW_VPN_POOL 255.255.255.0
    access-list capture_acl extended permit ip host 12.18.13.33 host 12.18.13.180
    access-list capture_acl extended permit ip host 12.18.13.180 host 12.18.13.33
    access-list cap_acl extended permit ip host 192.168.2.14 host 12.18.13.180
    access-list cap_acl extended permit ip host 12.18.13.180 host 192.168.2.14
    access-list 213 extended permit ip host SharePoint host 192.168.2.21
    access-list asainside_access_in remark permit traffic from the new ASA
    access-list asainside_access_in extended permit ip 192.168.100.0 255.255.255.0 Inside_Subnet 255.255.255.0
    access-list asainside_access_in extended permit ip 192.168.4.0 255.255.255.0 Inside_Subnet 255.255.255.0
    access-list asainside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 Inside_Subnet 255.255.255.0
    access-list asainside_nat0_outbound extended permit ip 192.168.4.0 255.255.255.0 Inside_Subnet 255.255.255.0
    access-list acl_cap extended permit ip host 192.168.100.1 host 192.168.4.1
    access-list acl_cap extended permit ip host 192.168.4.1 host 192.168.100.1
    access-list abcdONE_splitTunnelAcl standard permit Inside_Subnet 255.255.255.0
    access-list abcdONE_splitTunnelAcl standard permit DMZ_Subnet 255.255.255.0
    access-list abcdONE_splitTunnelAcl standard permit 172.16.1.0 255.255.255.0
    access-list oobnet_access_in extended permit ip any Inside_Subnet 255.255.255.0
    access-list VMman_nat0_outbound extended permit ip 172.16.1.0 255.255.255.0 Inside_Subnet 255.255.255.0
    access-list Internal_LAN_access_in extended permit object-group TCPUDP any object-group InternetDNS object-group DNS
    access-list Internal_LAN_access_in extended permit ip any any
    snmp-map mysnmpmap
    pager lines 30
    logging enable
    logging timestamp
    logging monitor informational
    logging buffered informational
    logging trap debugging
    logging history warnings
    logging asdm debugging
    logging mail informational
    logging from-address [email protected]
    logging recipient-address [email protected] level errors
    logging device-id ipaddress outside
    logging host vpnnet VPNNET_DNS
    logging host inside abc09ic
    logging host inside 192.168.1.60
    mtu outside 1500
    mtu inside 1500
    mtu dmz 1500
    mtu vpnnet 1500
    mtu asainside 1500
    mtu testinside 1500
    mtu inside_new 1500
    mtu Internal_LAN 1500
    mtu oobnet 1500
    ip local pool VPNPOOL 192.168.101.1-192.168.101.254 mask 255.255.255.0
    ip local pool NEW_VPN_POOL 192.168.77.10-192.168.77.240 mask 255.255.255.0
    ip verify reverse-path interface outside
    ip verify reverse-path interface inside
    ip verify reverse-path interface dmz
    ip verify reverse-path interface vpnnet
    ip verify reverse-path interface asainside
    ip audit name Outside attack action drop
    ip audit interface outside Outside
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    icmp permit any outside
    asdm image disk0:/asdm-621.bin
    asdm history enable
    arp outside 12.18.13.20 0024.c4e9.4764
    arp timeout 14400
    global (outside) 1 12.18.13.21 netmask 255.255.255.255
    global (outside) 2 12.18.13.22 netmask 255.255.255.255
    global (outside) 3 12.18.13.23 netmask 255.255.255.255
    global (outside) 4 12.18.13.24 netmask 255.255.255.255
    global (outside) 5 12.18.13.25 netmask 255.255.255.255
    global (inside) 1 interface
    global (dmz) 1 192.168.2.21 netmask 255.255.255.255
    global (dmz) 3 192.168.2.23 netmask 255.255.255.255
    global (dmz) 4 192.168.2.24 netmask 255.255.255.255
    global (dmz) 5 192.168.2.25 netmask 255.255.255.255
    global (vpnnet) 1 192.168.3.21 netmask 255.255.255.255
    nat (outside) 1 NEW_VPN_POOL 255.255.255.0
    nat (inside) 0 access-list inside_nat0_outbound
    nat (inside) 1 Inside_Subnet 255.255.255.0
    nat (dmz) 0 access-list dmz_nat0_outbound
    nat (dmz) 2 DMZ_Subnet 255.255.255.0
    nat (vpnnet) 0 access-list vpnnet_nat0_outbound
    nat (vpnnet) 3 VPN_Subnet 255.255.255.0
    nat (asainside) 0 access-list asainside_nat0_outbound
    nat (asainside) 1 192.168.4.0 255.255.255.0
    nat (oobnet) 0 access-list VMman_nat0_outbound
    static (dmz,outside) 12.18.13.31 VPN_3005 netmask 255.255.255.255
    static (inside,vpnnet) 192.168.3.72 FileServer_DNS netmask 255.255.255.255
    static (inside,vpnnet) 192.168.3.74 SQLServer netmask 255.255.255.255
    static (inside,vpnnet) 192.168.3.73 Email_DNS netmask 255.255.255.255
    static (inside,vpnnet) 192.168.3.76 FileServer_NAS netmask 255.255.255.255 dns
    static (inside,vpnnet) 192.168.3.80 abcSLIMPS1 netmask 255.255.255.255 dns
    static (inside,dmz) 192.168.2.73 Email_DNS netmask 255.255.255.255
    static (inside,dmz) 192.168.2.77 abc06ex2 netmask 255.255.255.255
    static (dmz,outside) 12.18.13.13 Email_Gateway netmask 255.255.255.255
    static (dmz,outside) 12.18.13.14 abc_WEB netmask 255.255.255.255
    static (outside,inside) VTC VTC_Outside netmask 255.255.255.255
    static (dmz,outside) 12.18.13.15 192.168.2.101 netmask 255.255.255.255
    static (inside,outside) 12.18.13.19 abc09ic netmask 255.255.255.255
    static (inside,outside) 12.18.13.42 SharePoint netmask 255.255.255.255
    static (inside,dmz) 192.168.2.78 FileServer_DNS netmask 255.255.255.255
    static (inside,outside) 12.18.13.32 Exch10 netmask 255.255.255.255
    static (inside,dmz) 192.168.2.10 abcSLIMPS1 netmask 255.255.255.255
    static (inside,dmz) 192.168.2.11 abc02EX2 netmask 255.255.255.255
    static (inside,vpnnet) 192.168.3.11 abc02EX2 netmask 255.255.255.255
    static (inside,vpnnet) 192.168.3.81 192.168.1.155 netmask 255.255.255.255
    static (inside,vpnnet) 192.168.3.82 192.168.1.28 netmask 255.255.255.255 dns
    static (inside,dmz) 192.168.2.13 192.168.1.13 netmask 255.255.255.255
    static (inside,outside) VTC_Outside VTC netmask 255.255.255.255
    static (inside,outside) 12.18.13.33 192.168.1.13 netmask 255.255.255.255
    static (inside,outside) 12.18.13.41 abcSLIMPS1 netmask 255.255.255.255
    static (inside,outside) 12.18.13.222 ExternalDNS netmask 255.255.255.255
    static (inside,Internal_LAN) Inside_Subnet Inside_Subnet netmask 255.255.255.0
    static (Internal_LAN,inside) 172.168.1.0 172.168.1.0 netmask 255.255.255.255
    access-group outside_access_in in interface outside
    access-group inside_access_in in interface inside
    access-group dmz_access_in in interface dmz
    access-group vpnnet_access_in in interface vpnnet
    access-group asainside_access_in in interface asainside
    access-group Internal_LAN_access_in in interface Internal_LAN
    access-group oobnet_access_in in interface oobnet
    route outside 0.0.0.0 0.0.0.0 12.18.13.1 1
    route asainside 192.168.100.0 255.255.255.0 192.168.4.2 1
    timeout xlate 1:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server TACACS+ protocol tacacs+
    aaa-server RADIUS protocol radius
    aaa-server abc.com protocol nt
    aaa-server abc.com (inside) host 192.168.1.2
    nt-auth-domain-controller abc12dc1
    aaa-server abc.com (inside) host Email_DNS
    nt-auth-domain-controller abc12dc2
    aaa authentication ssh console LOCAL
    aaa authentication enable console LOCAL
    http server enable
    http 10.0.0.0 255.255.255.0 outside
    http Inside_Subnet 255.255.255.0 outside
    http Inside_Subnet 255.255.255.0 inside
    http VPN_Subnet 255.255.255.0 vpnnet
    snmp-server group Authentication_Only v3 auth
    snmp-server group Authentication&Encryption v3 priv
    snmp-server user mkaramat Authentication&Encryption v3 encrypted auth md5 25:57:33:8a:86:b0:fc:71:36:5f:de:3d:83:35:eb:d4 priv aes 128 25:57:33:8a:86:b0:fc:71:36:5f:de:3d:83:35:eb:d4
    snmp-server host inside 192.168.1.60 version 3 mkaramat udp-port 161
    no snmp-server location
    no snmp-server contact
    snmp-server community *****
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    no service resetoutbound interface outside
    no service resetoutbound interface inside
    no service resetoutbound interface dmz
    no service resetoutbound interface vpnnet
    no service resetoutbound interface asainside
    no service resetoutbound interface testinside
    crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outside_map interface outside
    crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map inside_map interface inside
    crypto map oobnet_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map oobnet_map interface oobnet
    crypto isakmp enable outside
    crypto isakmp enable inside
    crypto isakmp enable inside_new
    crypto isakmp enable oobnet
    crypto isakmp policy 10
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    no crypto isakmp nat-traversal
    telnet 12.18.13.0 255.255.255.0 outside
    telnet timeout 5
    ssh 0.0.0.0 0.0.0.0 outside
    ssh Inside_Subnet 255.255.255.0 inside
    ssh VPN_Subnet 255.255.255.0 vpnnet
    ssh timeout 30
    ssh version 1
    console timeout 0
    dhcpd auto_config inside
    dhcpd dns 192.168.1.2 Email_DNS interface oobnet
    dhcpd domain abc.com interface oobnet
    dhcpd option 3 ip 172.16.0.1 interface oobnet
    threat-detection basic-threat
    threat-detection statistics
    threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
    ntp server 192.43.244.18 source outside prefer
    tftp-server vpnnet 192.168.3.10 /
    webvpn
    group-policy DfltGrpPolicy attributes
    vpn-idle-timeout 60
    group-policy abcdONEVPN internal
    group-policy abcdONEVPN attributes
    dns-server value 192.168.1.7 192.168.1.3
    vpn-tunnel-protocol IPSec
    default-domain value abc
    group-policy abcdONE internal
    group-policy abcdONE attributes
    dns-server value 192.168.1.7 192.168.1.3
    vpn-idle-timeout 30
    vpn-tunnel-protocol IPSec l2tp-ipsec
    split-tunnel-policy tunnelall
    split-tunnel-network-list value abcdONE_splitTunnelAcl
    default-domain value abc.com
    service-type remote-access
    service-type remote-access
    tunnel-group abcdONE type remote-access
    tunnel-group abcdONE general-attributes
    address-pool NEW_VPN_POOL
    default-group-policy abcdONE
    tunnel-group abcdONE ipsec-attributes
    pre-shared-key *
    isakmp keepalive disable
    tunnel-group abcdONE ppp-attributes
    authentication pap
    authentication ms-chap-v2
    authentication eap-proxy
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum 512
    policy-map type inspect ipsec-pass-thru VPN
    parameters
      esp
      ah
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect sqlnet
      inspect skinny 
      inspect sunrpc
      inspect xdmcp
      inspect sip 
      inspect netbios
      inspect tftp
      inspect http
      inspect icmp
    policy-map type inspect dns migrated_dns_map_1
    parameters
      message-length maximum 512
    service-policy global_policy global
    prompt hostname context
    Cryptochecksum:02e178404b46bb8758b23aea638d2f24
    : end
    asdm image disk0:/asdm-621.bin
    asdm location NEW_VPN_POOL 255.255.255.0 inside
    asdm location abc09ic 255.255.255.255 inside
    asdm location VTC 255.255.255.255 inside
    asdm location Email_Gateway 255.255.255.255 inside
    asdm location Exch10 255.255.255.255 inside
    asdm location ExternalDNS 255.255.255.255 inside
    asdm location abc11ids 255.255.255.255 inside
    asdm history enable

    Hi,
    Could you let me know if you  have tried the configuration I originally suggested. I mean creating a  "nat" statement for the "Internal_LAN" thats ID number matches one of  the existing "global" or make a new "global" for  it. And also if the "Internal_LAN" needs to access "inside" you could  have added the "static" command suggested.
    It seems there has been some  other suggestions in between that  have again suggested completely  different things. I would have been  interested to know what the  situation is after the suggested changes  before going and  doing something completely different.
    If you are changing a lot of NAT configurations for the new "Internal_LAN" interface I would suggest checking the output of
    show xlate | inc 172.168.1
    To see if you need to use some  variant of the "clear xlate" command to clear old translations still  active on the firewall. You should not use the "clear xlate" without  additional parameters as otherwise it clears all  translations on the firewall in the mentioned form of the command
    You can use
    clear xlate ?
    To view the different optional parameters for the command
    - Jouni

  • No internet access from WRT54G router -see details please-

    I have a westell 6100 modem with Verizon high speed internet.
    I was given these instructions for my modem by Verizon for the router to work and it still doesn't. what do I need to do?
    3. Click on Network Connections in the left navigation menu.
    4. Click on Broadband Connection (DSL) to continue to the Broadband Connection.
    5. Locate the VPI VCI of 0 & 35 under VCs and click the Edit icon.
    6. Verify that the VC Status is Enabled and that the VPI & VCI are 0 and 35 respectively.
    7. Change the Protocol drop down menu to Bridge then change the Bridge Mode: drop down menu to Bridge and click Apply.
    8. Select OK to allow the modem to reset and apply the new changes.
    9. Click on My Network in the top navigation bar.
    10. Click on Network Connections.
    11. Click on LAN.
    12. Remove the check mark from the Private LAN DHCP Server Enable field.
    13. Verify that the Private LAN is now off and click on Apply. 
    windows 7
    I can connect to "linksys" as a wireless network, but get no internet access. Please help! Thank you!

    The settings that you provided is for the modem so I suppose you can able to go online with modem… Please let me know the IP address that you receiving from the modem… Since the connection that you have is DSL connection and if you are receiving the IP address from the modem under LAN (Local Area Connection) is a Private IP address (192.168.X.X) then follow the steps:
    # Connect the modem with the Linksys Router WRT54G on the Internet Port and then connect the Computer on any of the Ethernet Port on the Router (Numbered – 1, 2, 3 and 4)…
    # Open up the browser and on the address bar type 192.168.1.1 that will open up the Router setup page…
    # Look for the Local IP Address and change it to 192.168.2.1 …
    # Click Save Settings...
    # Then Click on wireless Tab create the Wireless Network Name SSID and select the channel to 6, 9, and 11… Click Save Settings...
    # Then Click on Wireless Security sub tab and select the security mode and provide the password as per the requirement… Click Save Settings...
    # Click on Status Tab on the Router Setup page check if Internet IP Address has numbers or values. If the Internet IP Address has numbers, the computer should now be able to access the Internet. If the IP address is all zeroes (0.0.0.0) click "IP Address Release" first then click "IP Address Renew".  If the IP address is still all zeroes, enable PPPoE on the router.
    To enable PPPoE on the router you should have a username and password provided by the ISP (Internet Service Provider) and follow the steps...
    # Under the Setup tab, set the Internet Connection Type to PPPoE…
    # Enter the Username and Password that your ISP provided, including the domain in the User Name field if necessary…
    # Click Save Settings...
    # Then Click on wireless Tab create the Wireless Network Name SSID and select the channel to 6, 9, and 11… Click Save Settings...
    # Then Click on Wireless Security sub tab and select the security mode and provide the password as per the requirement… Click Save Settings...
    # Click the Status tab then look for Login Status and check if it says Connected.  If it’s connected, you should be able to access the Internet.
    After doing the following settings then connect the wireless computer the preferred Network… Once it gets connected you will be online wirelessly as well…

  • No Internet Access wtih NetGear N600

    helo guys.  I have just moved home and the boardband has activated on 25th April.  it kept dropping (say no internet access), signal is perfect.  I had almost no internet from this morning till now.  I am running a NetGear Dual band N600.  Please let me know if I got the correct settings with my N600.

    Hi Welcome to the forums  as your connection has just gone live you are still in a 10 day line training period during which time  you may disconnect  and speeds vary 
    Here are some help pages done by CL Keith http://www.btinternet.com/~cbeddoe/speed/Speed.html
    also post your full hub stats details shown in this link http://www.btinternet.com/~cbeddoe/others/adslstats.html
    Can you also post the full results fromBT Speedtest speedtester.bt.com
    Have you tried connecting to the test socket at the rear of the master socket  
    Have you tried the quiet line test? - dial 17070 option 2 - should hear nothing - best done with a corded phone. if cordless phone you may hear a 'dull hum' which is normal
    This is a customer to customer self help forum the only BT presence here are the forum moderators
    If you want to say thanks for a helpful answer,please click on the Ratings star on the left-hand side If the reply answers your question then please mark as ’Mark as Accepted Solution’

  • "No internet access" on Guest Wifi

    We upgraded our router the other day, we made a backup as well as a txt copy of the config file for copying in various commands to the new router .
    We have a Secure wifi for employees and a Guest wifi for visitors. We have a server doing the DHCP(10.27.131.8) for both the secure (10.27.131.0 network) and for the Guest (10.26.131.0 network). The Secure wifi is working as it should be - the Guest however is not. Visitors can connect and get a valid IP address from the 10.26.131.0 network but have no internet access. Everything else has stayed the same - no changes to the AP's.
    Again we copied the config from the old to the new with a few minor changes but nothing that should effect the Guest wifi.
    I did an ipconfig after connecting to the Guest Wifi and I can get a correct IP address 10.26.131.214, Default GW: 10.26.131.1.
    I enclosed the config from my router is anybody could shed some light,
    Thanks in advance.
    Building configuration...
    aaa new-model
    aaa authentication login default line local
    aaa authentication login vtymethod group tacacs+ line
    aaa authentication login conmethod line
    aaa authentication login httpmethod group tacacs+ local
    aaa authentication enable default enable group tacacs+
    aaa authentication ppp default none
    aaa authorization config-commands
    aaa authorization exec default local group tacacs+ none
    aaa authorization commands 1 default group tacacs+ if-authenticated
    aaa authorization commands 15 default group tacacs+ none
    aaa accounting exec default start-stop group tacacs+
    aaa accounting commands 1 default start-stop group tacacs+
    aaa accounting commands 15 default start-stop group tacacs+
    aaa accounting network default start-stop group tacacs+
    aaa accounting system default start-stop group tacacs+
    aaa session-id common
    resource policy
    ip subnet-zero
    ip cef
    no ip dhcp use vrf connected
    ip dhcp excluded-address 10.26.131.1 10.26.131.100
    ip dhcp pool guest
       network 10.26.131.0 255.255.255.0
       dns-server 208.67.222.222 208.67.220.220
       default-router 10.26.131.1
       domain-name guest.X.xxx
    interface Tunnel3
     ip address 172.17.3.2 255.255.255.0
     ip mtu 1400
     ip tcp adjust-mss 1360
     tunnel source 12.xx.xx.xx
     tunnel destination 19x.xx.xx.xx
    interface Tunnel55
     ip address 192.168.66.10 255.255.255.0
     ip accounting output-packets
     ip accounting access-violations
     ip mtu 1400
     ip tcp adjust-mss 1360
     tunnel source 12.xx.xx.xx
     tunnel destination 12.xx.xx.xx
    interface FastEthernet0/0
     ip address 12.xx.xx.xx 255.255.255.248
     ip nat outside
     ip route-cache flow
     duplex auto
     speed auto
     service-policy output physical
    interface FastEthernet0/1
     description CONNECTION TO SW3
     no ip address
     duplex auto
     speed auto
     service-policy output physical
    interface FastEthernet0/1.1
     description LAN
     encapsulation dot1Q 1 native
     ip address 10.27.131.254 255.255.255.0
     ip flow ingress
     ip flow egress
     ip nat inside
     no snmp trap link-status
    interface FastEthernet0/1.20
     description GUEST NETWORK
     encapsulation dot1Q 20
     ip address 10.26.131.1 255.255.255.0
     ip access-group 101 in
     ip helper-address 10.27.131.8
     no snmp trap link-status
    interface FastEthernet0/1.200
     description Phone VLAN
     encapsulation dot1Q 200
     ip address 10.5.2.254 255.255.255.0
     no snmp trap link-status
    interface Serial0/0/0
     no ip address
     shutdown
    interface Serial0/2/0
     no ip address
     shutdown
    interface Serial0/3/0
     no ip address
     shutdown
    ip classless
    ip route 0.0.0.0 0.0.0.0 12.xx.xx.xx
    ip route 10.5.5.0 255.255.255.0 10.5.2.1
    ip route 10.10.0.0 255.255.255.0 172.17.3.5
    ip route 10.10.200.0 255.255.255.0 172.17.3.5
    ip route 10.25.131.0 255.255.255.0 192.168.66.20
    ip route 10.27.129.0 255.255.255.0 172.17.3.5
    ip route 10.27.130.0 255.255.255.0 172.17.3.5
    ip route 140.xx.xx.xx 255.255.0.0 172.17.3.5
    ip route 192.168.2.0 255.255.254.0 172.17.3.5
    ip route 192.168.99.0 255.255.255.0 172.17.3.5
    ip http server
    ip http authentication local
    ip http secure-server
    ip nat inside source list 2 interface FastEthernet0/0 overload
    access-list 2 permit 10.27.131.0 0.0.0.255
    access-list 2 permit 10.25.131.0 0.0.0.255
    access-list 2 permit 192.168.66.0 0.0.0.255
    access-list 2 permit 10.14.0.0 0.0.0.255
    access-list 2 permit 10.5.5.0 0.0.0.255
    access-list 2 permit 10.5.2.0 0.0.0.255
    access-list 5 deny   10.27.131.123
    access-list 5 permit 192.168.2.0 0.0.0.255
    access-list 5 permit 10.27.131.0 0.0.0.255
    access-list 5 permit any
    access-list 101 permit tcp any host 10.27.131.8 eq 67
    access-list 101 permit udp any host 10.27.131.8 eq bootps
    access-list 101 permit ip 10.26.131.0 0.0.0.255 host 10.14.0.6
    access-list 101 deny   ip 10.26.131.0 0.0.0.255 10.0.0.0 0.255.255.255
    access-list 101 deny   ip 10.26.131.0 0.0.0.255 172.16.0.0 0.15.255.255
    access-list 101 deny   ip 10.26.131.0 0.0.0.255 192.168.0.0 0.0.255.255
    access-list 101 deny   icmp 10.26.131.0 0.0.0.255 172.16.0.0 0.15.255.255
    access-list 101 deny   icmp 10.26.131.0 0.0.0.255 10.0.0.0 0.255.255.255
    access-list 101 deny   icmp 10.26.131.0 0.0.0.255 192.168.0.0 0.0.255.255
    access-list 101 permit ip 10.26.131.0 0.0.0.255 any
    access-list 102 permit icmp 10.25.131.0 0.0.0.255 any
    access-list 102 permit ip 192.168.66.0 0.0.0.255 any
    access-list 102 permit ip 10.25.131.0 0.0.0.255 any
    access-list 102 permit ip 10.27.131.0 0.0.0.255 any

    Hi,
    I also apologize for my late answer.
    I appears your ACL 101 that filters traffic entering the Fa0/1.20 is not correctly written to allow DHCP requests to be processed by the router. The attempt has been made - but it is not correct. In particular, check out the second entry in the ACL 101:
    access-list 101 permit udp any host 10.27.131.8 eq bootps
    It allows all DHCP messages that are already targeted to 10.27.131.8, the DHCP server. However, such targeted DHCP messages may be used by clients only after they know who the DHCP server is in the first place. Until then, the requests are targeted to 255.255.255.255 and sourced from 0.0.0.0. Such packets are not allowed by any entry in the ACL 101 and are therefore dropped even before the DHCP Relay Agent can process them. That would explain why your clients actually cannot obtain IP address via DHCP in VLAN 20.
    We need to add the following entry immediately before or after the existing second entry in the ACL 101:
    access-list 101 permit udp any host 255.255.255.255 eq bootps
    You may accomplish this by the following sequence of commands directly pasted into the global configuration:
    ip access-list resequence 101 10 10
    ip access-list extended 101
    15 permit udp any host 255.255.255.255 eq bootps
    end
    The first line will cause the individual entries of the ACL 101 to be internally numbered, starting with the sequence number 10 and incrementing by 10 for each subsequent entry. The second line enters the ACL 101, treating it as a named ACL, allowing us to use the extended editing features. Finally, the third line starting with the sequence number 15 will cause the entry to be added between the existing first (seq no 10) and second (seq no 20) entry. It must be entered including the sequence number, otherwise the line will be added at the end of the ACL.
    Would you mind trying out this modification? The former corrections with the NAT I have described earlier must be applied as well.
    Best regards,
    Peter

  • My kids have figured a workaround for the internet access control

    I was quite happy with Network Magic until my kids rendered it fairly ineffective by a simple workaround. The internet access control seems to be tied into each PC's clock. So, my kids simply change the time on the computer and ... Voila! Internet access whenever the parents aren't around. I was kind of hoping the internet access schedule would be linked to the time on the router. I'm hoping this can be fixed.
    Message Edited by molsoncdn on 12-13-2009 06:58 PM

    Hi, set your kids user accounts to not be admins, and set the BIOS password, this will migate that workaround.
    My Cisco Network Magic Configuration:
    Router: D-Link WBR-2310 A1 FW:1.04, connected to Comcast High Speed Internet
    Desktop, iMac: NM is on the Windows Partition, using Boot camp to access Windows, Windows 7 Pro 32-bit RTM, Broadcom Wireless N Card, McAfee Personal Firewall 2009,
    Mac Partition of the iMac is using Mac OS X 10.6.1 Snow Leopard
    Laptop: Windows XP Pro SP3, Intel PRO/Wireless 2200BG, McAfee Personal Firewall 2008
    Please note that though I am a beta tester for Network Magic, I am not a employee of Linksys/Cisco and am volunteering my time here to help other NM users.

  • DSL intermittently stop working for a day (DSL light on, but no Internet access)

    Hi,
    We have a frustrating problem with our Verizon Business DSL.
    Three times in the past 2 months it has gone down between 12AM and 6AM in the morning.
    Each time this happens, the DSL light will stay solid on the modem and it will obtain a valid WAN IP address, but there will be absolutely no Internet access.
    This occurs with or without the Trendnet router we normally have installed.
    To get it working again we have to call Verizon tech support.
    Usually that involves hour(s) of talking with a support person, during which time they will reset things on their end, and they will have us reset our Westell 6100 modem, and do many other things like restart the PC, check settings, etc, etc...
    -The first time, after trying all the usual stuff, they had to escalate the issue to another department, which took 24hrs, and then they got it working... or it started working on it's own?
    -The second time it started working while I was talking to the first support person.
    I had reset the modem and she had also reset things on her end.
    -Today it quit again.
    The first support person referred the problem to the maintenance office, after having me do all the usual stuff.
    Eventually I got a call from a Verizon maintenance (?)  guy, he said he thinks it might be our modem, so he is going to have a replacement modem sent to us.
    But then the Internet started working on it's own about 5PM...
    Once we receive the modem, I suppose I will replace that, but I'm not real confident it will fix the problem?
    Another thing I noticed today, not sure if it related to the first problem...
    Normally the modem will show 2800k/700k speeds, today it is showing 1700k/400k.
    Thanks for any help/ideas,
    {edited for privacy}

    Thanks for your help, Smith6612!
    I have contacted Verizon about the slow speed, so we will see what happens with that.
    I'll post an update when I hear back from them.
    Thank you very much for your offer to help with the other issue, I will keep that in mind if the problem recurrs.

  • Connected to Router, but not getting any Internet access

    Hello,
    So I recently got my parent's old router. It's a Linksys WRT54G. I had used it with my MBP when I lived with them a year ago, and I never had a problem. Airport was always able to locate their network and log into it.
    6 months ago I moved out and have been using a direct Ethernet connection to my Road Runner Cable modem. No problem.
    Yesterday I did some rearranging of my apartment, and now my computer isn't near a cable outlet. So I got the old router old and started getting it running.
    Over many stress filled hours I have it at the point where my MBP is connected to the network (I named it, gave it a password, it shows a strong signal), but I have no Internet access. I even ran the Network Diagnostics a couple times, and it said my Internet connection appeared to be working correctly. Yet I can't open up any pages in Safari.
    I don't know if I need to change any of the router settings?? Or if it's just an old router and I need a new one?? I've unplugged, replugged, and restarted everything numerous times, and still nothing.
    Thank you!

    Hi Rod,
    Let me start by mentioning that when I hit the 'reply' button to write this post, it took more than 6 min for the page to appear. During that time, the 'connected time' displayed to the right of the 'radar' icon slid in and out dozens of times (indicating a dropped connection). If you have the 'magic' broth, I'd be happy to drink it.
    You must have seen my posting on the InformationWeek website, which I wrote on after reading the review of the MacBook products in their email newsletter that I receive. I normally don't post on blogs but after reading the pulp in that review - after trying AppleCare and the Genius bar and seeing all of the posts here (with no fix forthcoming from Apple), I felt the need to both vent and to seek a solution outside of these discussion pages.
    I have posted the details of my MBP/Airport connectivity issues in detail on other threads here but I would be happy to reiterate them.
    My problems appeared to start after the 10.5.2 update. My connections became unbearably slow, to the point that I would begin to get Safari browser connection error messages (i.e., no server response...not connected to the internet, etc.) Then I noticed that the 'connected time' displayed to the right on the 'radar' icon in the menu bar was 'sliding' in and out (I didn't realize what this meant at the time but soon realized that every time it 'slid' out (disappeared) represented a 'droped' connection and when it 'slid' back (reappeared) it represented a reconnection. Both at home and at the office, I run under static IP addresses (home = MaxDSL with Westell modem to APEBSg; office = T-1x2 with NetGear). But about a month ago, I did some more testing. I run VM Ware and Windows Vista and my assumption had been, since Vista, running under VM Ware, utilizes all of the Mac I/O ports, that Vista would share the same slowness with the Mac Airport Wi-Fi. I tried it and, much to my surprise, the connection speed was great (like normal). I then tried an Ethernet hardwire to the Ethernet port on the APEBSg and got the same great connection speed.
    So, MBP Airport works with Vista but not with Mac OS and by-passing the Airport Wi-Fi with a hardwire works with both Vista and Mac OS. It's only the Mac OS trying to go through the onboard Airport that gets choked down to unacceptable connection speeds.
    I have tried all of the suggestions posted on the discussion board (resetting the CSM, PMU, etc). But, like everyone else, to no avail.
    So, it's all about being connected via Wi-Fi (with my 'portable'). That's my problem. And, as you can see from all of the posts, it's not just me. So, you must have received the 'wonder machine' when you got your MBP. My MBP is a 1st gen but you can read posts here of people who just bought theirs (some who indicated that they were 'switchers') and it wouldn't connect right out of the box with 10.5.2. So, I realized that it wasn't 'me' - it was a real problem.
    And, I might add that I've been an 'enthusiastic' Apple user since 1979. I've owned almost every model along the way - except for the LISA. In the past year alone, I've encouraged four people to 'switch' to Mac (three of whom I actually accompanied to the Apple Store and helped them with their selection). So, I'm a longtime - happy - user (my wife has a PBG4, my daugher a MacBook, my son a new MBP, plus I have an iMac and a CubeG4) who has hit a bump in the road and have become very frustrated by the fact that Apple does not appear to be responding to a real issue.
    I welcome any advice that you might have to offer.

  • HT201210 When I try to do a software upgrade from 4 to 6 on my ipad I get a Network error message.  i have full internet access. Any ideas?

    I am trying to upgrade my ipad ios 4 to IOS 6 or above. I  get a network error code saying the ipad upgrade server cannot be contacted. I do have full internet access on a high speed connection. Any suggestions?

    If you have an iPad 1, the max iOS is 5.1.1. For newer iPads, the current iOS is 7.1. The Settings>General>Software Update only appears if you have iOS 5.0 or higher currently installed.
    You can no longer update to iOS 6.x, or down grade the iOS.
    iOS 5: Updating your device to iOS 5 or Later
    http://support.apple.com/kb/HT4972
    How to install iOS 6
    http://www.macworld.com/article/2010061/hands-on-with-ios-6-installation.html
    iOS: How to update your iPhone, iPad, or iPod touch
    http://support.apple.com/kb/HT4623
    If you are currently running an iOS lower than 5.0, connect the iPad to the computer, open iTunes. Then select the iPad under the Devices heading on the left, click on the Summary tab and then click on Check for Update.
    Tip - If connected to your computer, you may need to disable your firewall and antivirus software temporarily.  Then download and install the iOS update. Be sure and backup your iPad before the iOS update. After you update an iPad (except iPad 1) to iOS 7.x, the next update can be installed via wifi (i.e., not connected to your computer).
    Tip 2 - If you're updating via wifi, place your iPad close to your router to preclude getting a corrupted download.
    How to Upgrade to iOS 7
    The iOS 7.0 update requires around 2.5 GB of storage space, so if your iPad is almost full, you may need to clear up some space. You can check your available space in Settings -> General -> Usage.
    There are two ways to upgrade to iOS 7: You can use your Wi-Fi connection, or you can connect your iPad to your PC and update through iTunes. We'll go over each method.
    To upgrade using Wi-Fi:
    Note: If your iPad's battery is under 50%, you will want to plug it into your charger while performing the update.
    Go into the iPad's Settings.
    Locate and tap "General" from the menu on the left.
    The second option from the top is "Software Update". Tap this to move into the update settings.
    Tap "Download and Install". This will start the upgrade, which will take several minutes and will reboot your iPad during the process. If the Download and Install button is grayed out, trying clearing up some space. The space required by the update is mostly temporary, so you should gain most of it back after iOS 7 is installed.
    Once the update is installed, you may have to run through the initial steps of setting up your iPad again. This is to account for new features and settings.
    To upgrade using iTunes:
    First, connect your iPad to your PC or Mac using the cable provided when you purchased your device. This will allow iTunes to communicate with your iPad.
    You will also need the latest version of iTunes. Don't worry, you will be prompted to download the latest version when you launch iTunes. Once it installs, you may be asked to setup iCloud by logging into your iTunes account. If you have a Mac, you may be prompted on whether or not you want to enable the Find my Mac feature.
    Now you are ready to begin the process:
    If you upgraded iTunes earlier, go ahead and launch it. (For many, it will launch automatically when you plug in your iPad.)
    Once iTunes is launched, it should automatically detect that a new version of the operating system exists and prompt you to upgrade to it. Choose Cancel. Before updating, you will want to manually sync your iPad to make sure everything is up to date.
    After canceling the dialog box, iTunes should automatically sync with your iPad.
    If iTunes doesn't automatically sync, you can manually do it by selecting your iPad within iTunes, clicking on the File menu and choosing Sync iPad from the list.
    After your iPad has been synced to iTunes, select your iPad within iTunes. You can find it on the left side menu under Devices.
    From the iPad screen, click on the Update button.
    After verifying that you want to update your iPad, the process will begin. It takes a few minutes to update the operating system during which time your iPad may reboot a few times.
    After updating, you may be asked a few questions when your device finally boots back up. This is to account for new settings and features.
     Cheers, Tom

Maybe you are looking for