IOS upgrade does it again.  It trashes my old calendar entries

I have come to rely on the feature in the iOS upgrade that it will trash my old calendar entries. Upgrading to iOS 4 was no exception. It changed start and end times, repeat information, adds entries,combined multiple repeating entries into 1 even though they had different start and end dates and information in the entry and does a whole lot of other nifty stuff. I have reported this with every upgrade and now I realize that Apple does not care what happens to someone's calendar. This IPhone is being synch'd with a Mac so its an apples to apples (sorry for the pun) process.
I have a whole lot of issues with the calendar program on the IPhone. This is the one of the most annoying. The other is if you have parents in the 80's and you set birthdays. They do not show up on your IPhone. They show fine on the Mac but I guess the IPhone does not think your parent's birthday's are important enough to display. I am slowly getting to the point of regretting that I converted to the IPhone. For all of the bells and whistles, when a device cannot do the simplest tasks it becomes an annoyance. Oh yes this is a 3G and not a new phone. I do not intend to spend money until I see that Apple starts to take their customers seriously. They are slowly becoming Microsoft and that is the attitude that I thought I was getting away from.

You have options in the Organizer Tab for Calendar by clicking on Configure. From there, there you can choose to sync ALL calendar entries. This should be a resolution. Additionally, there are options to further control what syncs by clicking on the advanced button.
If you want to control how much calendar data remains on your mobile consider...
I have had problems with Blackberry's handling of appts in the past where - when an appt is deemed to be removed from the mobile device - it removed it also from Outlook! This should NEVER be - but WAS. As a result it is a better 'policy' to simply have your BB sync ALL appts and control how much will remain on your phone by using Outlook's archiving feature. When the calendar items do move to your archive, then you will see appts to be deleted from your phone but they will just be "older" appts according to what you have setup.
And regardless - before you do any new sync or major changes that may react unexpectedly...
Make a backup of your Outlook file just in case!!
Hope this helps.

Similar Messages

  • Have tried to install icloud 4.0 for windows and again it does not allow syncing with outlook 2013 calendar and contact using windows 8.1 and IOS 8.02 (unexpected error)? I thought itunes 12.0 and icloud 4.0 would solve issue but still same result.

    I have tried to install icloud 4.0 for windows and again is does not allow syncing with outlook 2013 calendar and contact, using windows 8.1 and IOS 8.02 (get - unexpected error)?

    Having same issues. had been syncing every few days with outlook 2007 contacts and calendar but since updated to 4.0.2 and latest itunes I get an error that it is unable to sync. I can't seem to find any solution.

  • I cant upgrade my new ipad to the ios6 dont knkow why and whats the problem and i was alo trying to   do the update simolteniously for infinity blade which i stoped in between as it crashed the ios upgrade   once hence tryed it again it went half way but

    i cant upgrade my new ipad to the ios6 dont knkow why and whats the problem and i was alo trying to
    do the update simolteniously for infinity blade which i stoped in between as it crashed the ios upgrade
    once hence tryed it again it went half way but it didnt work at all and i am trying to do it from the
    India..

    bnjr86 wrote:  There have been times when I've walked in there, that I really don't want to deal with VZW anymore and just take my business elsewhere.
    I  wonder if another provider would really be much different?  Read some of the other carrier forums - seems to be the same story everywhere.
    I'm not disagreeing with you - I've found that I am usually more informed about Verizon policies and procedures than some of the reps in our local store.

  • Does anyone know if Sprint Wireless will be allowing the hotspot on the devices for free instead of having to pay with the new iOS upgrade?

    Does anyone know if Sprint Wireless will be allowing the hotspot on the devices for free instead of having to pay with the new iOS upgrade?

    Sprint probably knows.  Ask them.

  • IPad 2 Does not retain names and passwords after iOS-upgrade  to 8.0.2

    After the last series of iOS upgrades (device current status is 8.0.2 , latest available) the iPad2-16G WIFI version, does not retain any names and passwords anymore. Function (Safari) is enabled.
    Re-booting, clearing memory etc did not solve anything).
    Is this a known version 8.0 bug or .......?

    Make sure "Private Browsing" is disabled.

  • HT1414 My iPhone4 (iOS 6) does not sync with iTunes. The message displayed suggests to return the iPhone to factory settings (which I cannot do). This happened after the iPhone was upgraded to iOS6 and performed one sync. Any ideas?

    My iPhone4 (iOS 6) does not sync with iTunes. The message displayed suggests to return the iPhone to factory settings (which I cannot do). This happened after the iPhone was upgraded to iOS6 and performed one sync. Any ideas?

    Lilasil wrote:
    The message displayed suggests to return the iPhone to factory settings (which I cannot do).
    Why not?

  • TS3694 Ipad  locked up when doing iOS upgrade .  Screen shows iTunes logo and connector    . Any suggestions on how to reboot/ restart

    iPad locks up when doing iOS upgrade. Screen shows iTunes icon and connector. System will not power up or restart. Any ideas?

    FORCE IPAD INTO RECOVERY MODE
    1. Turn off iPad
    2. Turn on computer and launch iTunes (make sure you have the latest version of iTune)
    3. Plug USB cable into computer's USB port
    4. Hold Home button down and plug the other end of cable into docking port.
    DO NOT RELEASE BUTTON until you see picture of iTunes and plug
    5. Release Home button.
    ON COMPUTER
    6. iTunes has detected iPad in recovery mode. You must restore this iPad before it can be used with iTunes.
    7. Select "Restore iPad"...
    Note:
    1. Data will be lost if you do not have backup
    2. You must follow step 1 to step 4 VERY CLOSELY.

  • Router ios upgrade 2811

    I am trying to upgrade the router from compact  Flash Card I have put the file on the new card and reboot the router. what about the config that is running on the router and the boot parameters does it automatically load the old config?

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    The 2811 will load its config from NVRAM, and by default, will boot its IOS from CF.  Also by default, it will use the first valid IOS image it finds, but it can be configured to look for specific IOS images.  If it doesn't find any of the specific IOS images, it will again select the first valid IOS image on CF.
    The later 2811 ROM images can also boot from USB, but this would need to be defined in the config.

  • Cisco 4500X IOS upgrade through ISSU

    Hi,
    I am having 2 number of cisco 4500x switch and configured with VSS
    so one switch is active and another switch is standby.
    I am panning to upgrade IOS through ISSU
    i read in document that it required auto boot enable in switch.
    My switch current Configuration register = 0x2101
    do i need to change config register or this will ok. If need to change then what will be auto boot and after IOS upgrade do i need to change it again.
    Please help....

    Hello Tarun,
    Please find below the steps to perform the ISSU:
    ISSU Prerequisites
    Before one can perform an ISSU, there are a few prerequisites one must verify for a successful ISSU. The following list explains what is initially required.
    • Must be using a redundant Cisco Catalyst 4500 switch with symmetric hardware (that is, supervisors, memory, rommon, NFL daughter card, and so on).
    • Both new and old Cisco IOS Software images must be preloaded to the file system on both supervisors.
    • SSO must be configured and working properly.
    • Config register must be configured to autoboot (that is, the value should have a "2" in the lowest byte).
    45010R-203# sh bootvar | i register
    Configuration register is 0x2102
    Standby Configuration register is 0x2102
    Several commands are available to verify if SSO is enabled:
    4510R-203# sh module | b Redundancy
    Mod  Redundancy role     Operating mode      Redundancy status
    ----+-------------------+-------------------+-------------------
     1   Standby Supervisor   SSO                  Standby hot        
     2   Active Supervisor    SSO                 Active
    45010R-203# sh redundancy states 
           my state = 13 -ACTIVE 
         peer state = 8   -STANDBY HOT 
               Mode = Duplex
               Unit = Secondary
            Unit ID = 2
    Redundancy Mode (Operational) =  Stateful Switchover
    Redundancy Mode (Configured)  =  Stateful Switchover
    Redundancy State              =  Stateful Switchover
                 <snip>
    4507R-ISSU# sh run | b redundancy
    redundancy
     mode  sso
    As a step prior to the beginning of the ISSU process, the new version of the Cisco IOS Software image needs to be loaded into both the active and standby supervisors' file systems. Both active and standby supervisor need to contain both the new and old images in the file system. In order to store both new and old images, the supervisors should be upgraded to contain sufficient amounts of flash memory prior to the ISSU process.
    The new images can be downloaded into both supervisors using commands such as:
    copy tftp: bootflash:
    copy tftp: slavebootflash: 
    The example below illustrates this verification:
    4510R-203#dir
    Directory of bootflash:/
    1  -rwx 13636500 Sep 6 2006 03:18:58 -08:00 cat4500-entservices-mz.122-31.SGA
    2  -rwx 13747611 Sep 9 2006 03:19:58 -08:00 cat4500-entservices-mz.122-31.SGA1
    4510R-203#dir slavebootflash:
    Directory of slavebootflash:/
    1  -rwx 13636500 Sep 6 2006 03:18:58 -08:00 cat4500-entservices-mz.122-31.SGA
    2  -rwx 13747611 Sep 9 2006 03:19:58 -08:00 cat4500-entservices-mz.122-31.SGA1 
    Once this check is verified, one can now proceed with the ISSU process.
    The ISSU process is started by typing the "issu loadversion" command on the active supervisor. This command directs the active supervisor to begin the ISSU process. The active supervisor, through intersupervisor communications, checks that the requested image has been downloaded into both the active and standby supervisors' file systems. If the required images are not present, the command is rejected, and an appropriate warning is generated.
    If the "issu loadversion" command is successful, the switch transitions into the "Load Version" ISSU state. The standby supervisor will reset and boot with the new version of the Cisco IOS Software image loaded into the file system.
    The following actions take place when the command is implemented:
    1. The standby supervisor (B) is reset.
    2. The standby supervisor (B) is booted with the new Cisco IOS Software image: Release 12.2(31)SGA1.
    3. If both Cisco IOS Software images are declared as compatible, the standby supervisor moves into SSO mode and is fully stateful for all compatible clients and applications. Compatibility allows for in-service software upgrade or downgrade between two versions to succeed with minimal service effect.
    4. If both Cisco IOS Software images are incompatible, the system moves into RPR mode, and the ISSU process is terminated with an appropriate message to the user. Images are declared incompatible when "required" clients or applications are not interoperable between two Cisco IOS Software releases.
    5. Standby "B" reaches the standby HOT state.
    6. The user has an option to abort the ISSU process by issuing the "issu abortversion" command.
    7. The "issu loadversion" command also supports a "forced" option that allows the operator to force the system into entering RPR mode when incompatibility is detected.
    Note: When performing an ISSU, disable manual switchovers. Performing manual switchovers during the issu process is strongly discouraged. The current implementation does not prevent it, but it does display a warning to the user.
    An example of the CLI for implementing the issu loadversion command is displayed below.
    On the active supervisor, one would issue the following command:
    4510R-203#issu loadversion 1 bootflash:cat4500-entservices-mz.122-31.SGA1 2 slavebootflash: cat4500-entservices-mz.122-31.SGA1
    Syntax - issu loadversion active-slot active-image-new standby-slot standby-image-new
    The second step of the ISSU process is to perform the issu runversion CLI.
    The user can issue the " issu runversion" command when:
    1. The ISSU state is "Load Version"; this can be verified with the "show issu state detail" CLI.
    2. The standby supervisor is running the new version of the software.
    3. The standby supervisor has moved into the "Standby Hot " state.
    The following actions take place when the " issu runversion" command is executed:
    1. A switchover occurs; that is, the standby (B) becomes the new active, and the old active (A) is rebooted and comes up as a standby.
    2. A timer called "Rollback Timer" is started with a previously configured value.
    3. Move both supervisors to "Run Version" state.
    4. If the command "issu acceptversion" is not issued before the "Rollback timer" fires, then the entire ISSU process is aborted via the automatic rollback.
    5. If the active supervisor console connectivity is established and the "issu acceptversion" command is issued, then the rollback timer is stopped.
    6. The user has an option to abort the ISSU process by issuing the "issu abortversion" command.
    An example of the CLI for implementing the issu runversion command is displayed below:
    On the active supervisor, one would issue the following command:
    4510R-203#issu runversion 2 slavebootflash:cat4500-entservices-mz.122-31.SGA1
    Syntax - issu runversion standby-slot [standby-image-new]
    Prior to issuing the `issu acceptversion' command the system will be counting down the rollback timer. If `issu acceptversion' is not completed before rollback timer expires an automatic abort will occur. This command stops the "Rollback Timer." This command serves as a feedback mechanism. This is an optional command and can be skipped in the ISSU process with the "issu commitversion" CLI.
    If this command is not issued within 45 minutes (default) from the time the standby supervisor moves into the "Standby Hot" state, it is assumed that the new active supervisor is not reachable and the entire ISSU process is rolled back to the previous version of the software. The acceptversion is not intended for long-term network operation. It is also important to note that none of the features available on the new version will work yet.
    The following actions take place when the command is implemented:
    1. The "Rollback Timer" is terminated. This means that the rollback timer is not looked at anymore. Therefore, the system can run in this state for an extended period.
    2. The user has an option to abort the ISSU process by issuing the command "issu abortversion."
    Aborting the ISSU process now causes the newly active supervisor (B) to fail over to the standby supervisor (A) running the old image and will also cause the rebooting supervisor (B) to load the original image. The issu acceptversion halts the rollback timer and helps ensure the ISSU process is not automatically aborted during the process.
    An example of the CLI for implementing the issu acceptversion command is displayed below:
    On the "New" active supervisor, one would issue the following command:
    4510R-203#issu acceptversion 2
    % Rollback timer stopped. Please issue the commitversion command.
    Syntax - issu acceptversion active-slot-number
    This is the last stage of the ISSU procedure. Once the user is satisfied with the new version of software, this must be committed by issuing the "issu commitversion" command. This command resets the standby supervisor and boots it with a new version of the software (same as the active supervisor). This concludes the ISSU process, and the new version of software is permanently committed on both supervisors. Since this is the conclusion of the ISSU process, the system can not be reverted back to the previous version of the software from this point onward as a part of this upgrade cycle. However, if for any reason users wish to go back to the previous version of the software, they can do so by starting a new upgrade/downgrade process.
    The following actions take place if the command is implemented:
    1. The standby supervisor (A) is reset and booted with the new version of Cisco IOS Software image.
    2. The standby supervisor (A) moves into the "Standby Hot" state in SSO mode and is fully stateful for all clients/applications that are compatible.
    3. Both supervisors are moved into "Final State," which is the same as "Initial State."
    4. Users can initiate switchovers from this point onward.
    An example of the CLI for implementing the issu commitversion command is displayed below:
    4510R-203#issu commitversion 1
    Syntax - issu commitversion standby-slot-number
    ISSU Process: issu abortversion
    One can abort the ISSU process at any stage manually (prior to issuing the issu commitversion command) by issuing the exec-level issu abortversion command. The ISSU process also aborts on its own if the software detects a failure.
    If a user aborts the process after issuing the issu loadversion command, then the standby supervisor engine is reset and reloaded with the original software.
    If the process is aborted after a user enters either the issu runversion or issu acceptversion command, then a second switchover is performed to the new standby supervisor engine that is still running the original software version.
    The supervisor engine that had been running the new software is reset and reloaded with the original software version. The command is accepted only in "Load Version" or "Run Version" states. In "Load Version" state, the active supervisor is running an old image and the standby supervisor is running new image.
    Syntax - issu abortversion active-slot [active-image-new]
    Let me know if you have any questions.

  • 2960s IOS Upgrade Issue

    Hi 
    I have a issue when i try to upgrade the IOS of WS-C2960S-48TS-L, the curretn version is 12.2(58)SE2 , the verison im trying to upgrate to is 15.2.SE6.
    I do the "archive tar /xtract tftp" command to extract all the files to the flash, then i do the "boot system flash:"  command to change to the new but when i reboot the switch it loads the new ios then loads the old ios and boot using the old ios, how can i change to ignore the old ios ?

    Here i am again...and with new weird news.
    I've made new tests and analisys on my six WS-2960S-48LPS-L.
    Cables are ok (said by TDR).
    Five on six no way to upgrade, from CLI, upper 15.0.1-SE. This is the newest working IOS i found, tested:
    c2960s-universalk9-mz.150-2.EX
    c2960s-universalk9-mz.150-2.SE6
    c2960s-universalk9-mz.150-2.SE6  <-- suggested by Cisco
    c2960s-universalk9-mz.150-2.SE7
    c2960s-universalk9-mz.152-2a.E1
    no way to boot, always the same error i've already posted.
    Tried to format the rom also, always same things.
    Anyway with 15.0.1-SE that should have fixed the poe problems, poe doesnt work...So i guess it's a hardware problem. Well ...5/6... i must say i have really bad luck...
    But now, give me your attention please.....
    One of them works, every port do its job with my voip cisco 7912 phones, with an old IOS also (12.2.58-SE2). So, i checked if it is a 2960S-48LPS-L for sure, serial number on case is the same i have on the package. It says it's a LPS-L. So, from CLI, i tried a show version....look at this:
    Cisco IOS Software, C2960S Software (C2960S-UNIVERSALK9-M), Version 12.2(55)SE8, RELEASE SOFTWARE (fc2)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2013 by Cisco Systems, Inc.
    Compiled Wed 26-Jun-13 11:40 by prod_rel_team
    Image text-base: 0x00003000, data-base: 0x01B00000
    ROM: Bootstrap program is Alpha board boot loader
    BOOTLDR: C2960S Boot Loader (C2960S-HBOOT-M) Version 12.2(53r)SE, RELEASE SOFTWARE (fc3)
    Vigili uptime is 6 days, 21 hours, 54 minutes
    System returned to ROM by power-on
    System restarted at 12:01:56 UTC Wed Apr 1 2015
    System image file is "flash:/c2960s-universalk9-mz.122-55.SE8/c2960s-universalk9-mz.122-55.SE8.bin"
    This product contains cryptographic features and is subject to United
    States and local country laws governing import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third-party authority to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. and local country laws. By using this product you
    agree to comply with applicable laws and regulations. If you are unable
    to comply with U.S. and local laws, return this product immediately.
    A summary of U.S. laws governing Cisco cryptographic products may be found at:
    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
    If you require further assistance please contact us by sending email to
    [email protected].
    cisco WS-C2960S-48FPS-L (PowerPC) processor (revision H0) with 131072K bytes of memory.
    Processor board ID FOC1726Z0GN
    Last reset from power-on
    1 Virtual Ethernet interface
    1 FastEthernet interface
    52 Gigabit Ethernet interfaces
    The password-recovery mechanism is enabled.
    512K bytes of flash-simulated non-volatile configuration memory.
    Base ethernet MAC Address       : 84:80:2D:0D:F8:00
    Motherboard assembly number     : 73-11908-09
    Power supply part number        : 341-0393-02
    Motherboard serial number       : FOC183811TD
    Power supply serial number      : LIT183101SG
    Model revision number           : H0
    Motherboard revision number     : A0
    Model number                    : WS-C2960S-48LPS-L
    Daughterboard assembly number   : 73-11933-04
    Daughterboard serial number     : FOC18376CNB
    System serial number            : FOC1726Z0GN
    Top Assembly Part Number        : 800-30945-04
    Top Assembly Revision Number    : C0
    Version ID                      : V04
    CLEI Code Number                : COMGZOOARD
    Daughterboard revision number   : A0
    Hardware Board Revision Number  : 0x01
    Switch Ports Model              SW Version            SW Image
    *    1 52    WS-C2960S-48FPS-L  12.2(55)SE8           C2960S-UNIVERSALK9-M
    now i'm really confused...
    I called Cisco, gave them the serial number and they confirmed must be a LPS-L.
    Ideas?

  • 2851 IOS upgrade failed with WAE

    Hello,
    I have a strange situation with WAAS.  I am in progress of a project to upgrade my Cisco IP telephony and as a result preferred to update my remote sites routers to 12.4.x T code in order to register DSP resources over SCCP and match closely the CMgr version as many of the sites running mainline code didn't have updated parameters for this.  To make a long story short, I upgraded (for other reasons) several non-voice sites routers that have WAE 512s running 4.1.7 with the latest 12.4.xT code and didn't have an issue. All upgraded sites are running 2821's or 2811's except this one site I had an issue with.  I needed T code on this particular site router and assumed since  others sites reacted well with the IOS upgrade and WAAS that this site wouldn't be different but it was!
    Situation:  After updating this 2851 router from 12.4.25c mainline to 12.4.24T3, traffic from WAN was directing to WAE but no return.  It appeared also that any LAN redirection was also working but no return from WAE.  I didn't see any WCCP flow statistics incrementing but traffic was being directed to the WAE.  WAE connection statistics were building but all TCP based traffic was getting dropped.  I tried 3 different feature sets of same code version wondering if I've encountered a bug but none of the featured images worked.  I downgraded to 12.4.24T2 and still nothing.  Changed IOS back to mainline code and WAE was back operational as expected.  During the testing of each IOS change, I've reset the WAE also hoping it didn't get hung up with some WCCP process from the previous IOS change in case there was some codebug occuring.
    Layout:
    With respect to this site, we have a 2851 with multilinked serial interfaces to MPLS; WAN interface is redirecting 62 in with an ACL that disallows a couple of hosts.  LAN side of router is single Gig port (router on a stick).  5 sub-interfaces configured with DOT1Q encap. including one interface for WAAS.  2 of these user interfaces are redirecting 61 in and of course the interface servicing WAAS is redirect excluded in.  The 61 WCCP group is also using ACL to oppositely match WCCP 62 group.
    Why would this upgrade cause a problem especially using latest T code?  Feature sets would be irrelevant.  One more thing that makes this even stranger is I have one other voice site running a 2851 with 12.4.24T3 (already running) and is configured for WCCP the very same with same 512WAE and 4.1.7 code.  The only difference is this router is running a "SP" feature set which I didn't try on this site that is failing.
    Does this make any sense to anyone?  I've seen posted from one of the WAAS experts a document listing compatible IOS version across platforms but these efforts are the latest code.  Any help would be greatly appreciated!  Thanks everyone.

    Thanks Bhavin.
    Sorry, I've been traveling a lot lately for business and I haven't had a chance to respond.  And it looks like I'll be heading out again for a few days.  Meanwhile, I did want to say that I looked at a lot of these things and didn't see anything apparent.  Egress methods show GRE Return.  When I ran "show wccp flows tcp" I didnt' see any flow counts.  However I could see packets redirecting at the router with "show ip wccp".  I debugged events and packets and saw "See You" packets being sent back to the caching appliance.  WCCP looked fine from the router's viewpoint.  WCCP communications looked good rather.  But anything getting redirected to the WAE would get dropped.
    I don't have a chance right now to change IOS back to one of the non-working versions to get all of the info. but I will try soon.  Unfortunately, the site is where my executives reside and it's always a tough situation to do anything there most of the time.
    And to answer your question about having another configuration in place working .... yes I do.  I have another 2851 with 12.4(24)T3, same WAE model with WAE-4.1.7 code and everything configured the same including connections as the site that isn't working.  The only difference as mentioned before is that this working site router is running SP feature set which I know shouldn't matter but I didn't try a SP feature set however I went through ADV IP, ADV ENTER, and IP VOICE and neither worked with 2 different 12.4(X)Tx versions.  I was grasping at straws at this point.
    I figured I was going to need to get TAC involved when I could spare some time to run one of the non-working IOS images and could afford to not have WAAS working for the site but was hoping one of you guys might have seen something like this and could offer something to try to fix the issue.  It is very odd indeed.  I have other 28xx routers and all of the upgrades worked that aren't 2851's.
    I'll post more info. when I can.
    Thanks again!
    Wayne

  • So my Ipod will no longer turn on. i leave it on my Ihome and nothing happens. whenever i try to turn it on i get the Apple logo and then it dies and says i should charge it, so i do and it does it again. What does this mean? is my battery totally dead?

    So my Ipod will no longer turn on. i leave it on my Ihome and nothing happens. whenever i try to turn it on i get the Apple logo and then it dies and says i should charge it, so i do and it does it again. What does this mean? is my battery totally dead? please i really need help

    Did you try to charge it using the adapter or your computer?
    If you can, let it charge for about 15min, then connect in recovery mode, described in this article:
    iOS: Unable to update or restore
    If still not luck, your battery might have to be replaced:
    Apple - Support - Service Answer Center

  • ASA 5585 IOS upgradation from 8.2(5) to 9.0(2)

    Hi,
    I am getting below warning messages when i am doing IOS upgradation of ASA5585.The current version of IOS is 8.2(5) and the converted version is 9.0(2). I would like to know whether i can ignore the warnings and move on with new version or need to do any manual changes in configuration.
    This is my internet firewall which has DMZ  as well.
    WARNING: MIGRATION: ACE converted to real IP/port values based on
    dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing policy NAT ACL
    Thanks
    Soumya

    Hi ,
    Sorry, I forgot to mention that we have upgraded from  8.2->8.4.6>9.02.
    We have multiple warning messages like below. A huge number of inbound access rules have been created in new version and we are worried whether this will creat a security loop.
    WARNING: MIGRATION: ACE converted to real IP/port values based on
    dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing policy NAT ACL
    216.163.252.25
    8.2(5)
    access-list outside extended permit udp host 216.163.252.25 host 203.99.194.163
    access-list outside extended permit esp host 216.163.252.25 host 203.99.194.163
    access-list Metlife-VPN extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.237.164.0 255.255.254.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.237.241.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.230.107.128 255.255.255.224 host 216.163.252.25
    access-list inside1 extended permit udp 10.237.164.0 255.255.254.0 host 216.163.252.25
    access-list inside1 extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list inside1 extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit ip host 10.239.23.177 host 216.163.252.25
    access-list outside extended permit ip any host 203.99.194.163
    9.0(2)
    object network obj-216.163.252.25
    host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.237.164.0 255.255.254.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.237.241.0 255.255.255.0 host 216.163.252.25
    access-list Metlife-VPN extended permit ip 10.230.107.128 255.255.255.224 host 216.163.252.25
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.56
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.72
    access-list outside extended permit udp host 216.163.252.25 10.239.24.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.15
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.94
    access-list outside extended permit udp host 216.163.252.25 host 10.239.24.138
    access-list outside extended permit udp host 216.163.252.25 10.239.23.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.101
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.208
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.20
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.78
    access-list outside extended permit udp host 216.163.252.25 10.239.48.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.73
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.204
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.178
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.187
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.28
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.144
    access-list outside extended permit udp host 216.163.252.25 host 10.239.48.105
    access-list outside extended permit udp host 216.163.252.25 10.237.23.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.237.23.179
    access-list outside extended permit udp host 216.163.252.25 10.237.164.0 255.255.254.0
    access-list outside extended permit udp host 216.163.252.25 10.239.50.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.46
    access-list outside extended permit udp host 216.163.252.25 host 10.237.165.120
    access-list outside extended permit udp host 216.163.252.25 10.239.50.0 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.11
    access-list outside extended permit udp host 216.163.252.25 host 10.239.48.142
    access-list outside extended permit udp host 216.163.252.25 host 10.239.48.12
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.45
    access-list outside extended permit udp host 216.163.252.25 host 10.237.173.12
    access-list outside extended permit udp host 216.163.252.25 host 10.237.164.72
    access-list outside extended permit udp host 216.163.252.25 host 10.237.173.13
    access-list outside extended permit udp host 216.163.252.25 host 10.239.20.145
    access-list outside extended permit udp host 216.163.252.25 host 10.239.41.23
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.128
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.146
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.137
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.144
    access-list outside extended permit udp host 216.163.252.25 10.230.144.64 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.229.32.0 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.242.50.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.153
    access-list outside extended permit udp host 216.163.252.25 host 10.242.50.68
    access-list outside extended permit udp host 216.163.252.25 host 10.232.8.176
    access-list outside extended permit udp host 216.163.252.25 10.242.0.128 255.255.255.128
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.198
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.199
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.201
    access-list outside extended permit udp host 216.163.252.25 10.230.107.192 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.202
    access-list outside extended permit udp host 216.163.252.25 10.237.226.0 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 10.242.146.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.197
    access-list outside extended permit udp host 216.163.252.25 host 10.229.59.109
    access-list outside extended permit udp host 216.163.252.25 10.242.97.128 255.255.255.128
    access-list outside extended permit udp host 216.163.252.25 10.242.36.64 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.237.241.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 host 10.237.241.14
    access-list outside extended permit udp host 216.163.252.25 host 10.237.241.68
    access-list outside extended permit udp host 216.163.252.25 host 10.237.241.94
    access-list outside extended permit udp host 216.163.252.25 host 10.237.173.15
    access-list outside extended permit udp host 216.163.252.25 10.242.212.0 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.242.51.128 255.255.255.128
    access-list outside extended permit udp host 216.163.252.25 10.242.210.192 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 host 10.242.146.18
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.168
    access-list outside extended permit udp host 216.163.252.25 host 10.239.48.31
    access-list outside extended permit udp host 216.163.252.25 host 10.242.195.204
    access-list outside extended permit udp host 216.163.252.25 10.242.195.192 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.230.241.0 255.255.255.0
    access-list outside extended permit udp host 216.163.252.25 10.230.103.128 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 host 10.230.107.144
    access-list outside extended permit udp host 216.163.252.25 10.230.107.128 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 10.211.202.224 255.255.255.240
    access-list outside extended permit udp host 216.163.252.25 host 10.211.211.221
    access-list outside extended permit udp host 216.163.252.25 host 10.229.34.43
    access-list outside extended permit udp host 216.163.252.25 host 10.229.34.49
    access-list outside extended permit udp host 216.163.252.25 host 10.232.38.160
    access-list outside extended permit udp host 216.163.252.25 host 10.232.130.93
    access-list outside extended permit udp host 216.163.252.25 host 10.233.38.151
    access-list outside extended permit udp host 216.163.252.25 host 10.236.147.50
    access-list outside extended permit udp host 216.163.252.25 host 10.236.147.71
    access-list outside extended permit udp host 216.163.252.25 host 10.236.147.83
    access-list outside extended permit udp host 216.163.252.25 host 10.236.180.4
    access-list outside extended permit udp host 216.163.252.25 host 10.237.9.83
    access-list outside extended permit udp host 216.163.252.25 host 10.237.9.93
    access-list outside extended permit udp host 216.163.252.25 host 10.237.77.39
    access-list outside extended permit udp host 216.163.252.25 host 10.237.77.74
    access-list outside extended permit udp host 216.163.252.25 host 10.237.77.76
    access-list outside extended permit udp host 216.163.252.25 host 10.237.173.8
    access-list outside extended permit udp host 216.163.252.25 host 10.237.241.24
    access-list outside extended permit udp host 216.163.252.25 host 10.237.241.183
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.13
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.71
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.108
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.109
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.120
    access-list outside extended permit udp host 216.163.252.25 host 10.239.23.170
    access-list outside extended permit udp host 216.163.252.25 host 10.239.24.26
    access-list outside extended permit udp host 216.163.252.25 host 10.239.24.158
    access-list outside extended permit udp host 216.163.252.25 host 10.239.24.222
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.20
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.34
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.41
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.42
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.52
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.60
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.64
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.73
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.81
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.82
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.90
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.114
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.141
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.151
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.155
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.205
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.224
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.233
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.238
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.239
    access-list outside extended permit udp host 216.163.252.25 host 10.239.30.251
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.26
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.52
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.57
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.72
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.90
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.93
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.107
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.161
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.171
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.184
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.185
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.196
    access-list outside extended permit udp host 216.163.252.25 host 10.239.31.208
    access-list outside extended permit udp host 216.163.252.25 host 10.239.38.17
    access-list outside extended permit udp host 216.163.252.25 host 10.239.41.34
    access-list outside extended permit udp host 216.163.252.25 host 10.239.41.68
    access-list outside extended permit udp host 216.163.252.25 host 10.239.41.72
    access-list outside extended permit udp host 216.163.252.25 host 10.239.41.78
    access-list outside extended permit udp host 216.163.252.25 host 10.239.48.143
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.10
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.15
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.31
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.35
    access-list outside extended permit udp host 216.163.252.25 host 10.239.50.52
    access-list outside extended permit udp host 216.163.252.25 host 10.239.60.100
    access-list outside extended permit udp host 216.163.252.25 host 10.239.67.18
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.17
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.23
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.34
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.42
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.53
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.75
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.76
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.77
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.114
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.117
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.118
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.120
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.136
    access-list outside extended permit udp host 216.163.252.25 host 10.239.96.143
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.15
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.17
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.35
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.48
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.90
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.116
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.140
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.168
    access-list outside extended permit udp host 216.163.252.25 host 10.239.98.183
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.26
    access-list outside extended permit udp host 216.163.252.25 host 10.242.8.53
    access-list outside extended permit udp host 216.163.252.25 host 10.242.11.29
    access-list outside extended permit udp host 216.163.252.25 host 10.242.11.31
    access-list outside extended permit udp host 216.163.252.25 host 10.242.11.80
    access-list outside extended permit udp host 216.163.252.25 host 10.242.11.81
    access-list outside extended permit udp host 216.163.252.25 host 10.242.22.133
    access-list outside extended permit udp host 216.163.252.25 host 10.242.22.134
    access-list outside extended permit udp host 216.163.252.25 host 10.242.22.154
    access-list outside extended permit udp host 216.163.252.25 host 10.242.36.76
    access-list outside extended permit udp host 216.163.252.25 host 10.242.36.79
    access-list outside extended permit udp host 216.163.252.25 host 10.242.36.118
    access-list outside extended permit udp host 216.163.252.25 host 10.242.146.29
    access-list outside extended permit udp host 216.163.252.25 host 10.242.158.227
    access-list outside extended permit udp host 216.163.252.25 host 10.242.195.197
    access-list outside extended permit udp host 216.163.252.25 host 207.41.226.145
    access-list outside extended permit udp host 216.163.252.25 10.233.38.144 255.255.255.248
    access-list outside extended permit udp host 216.163.252.25 10.230.132.160 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 10.230.134.0 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 10.242.68.160 255.255.255.224
    access-list outside extended permit udp host 216.163.252.25 10.233.38.150 255.255.255.222
    access-list outside extended permit udp host 216.163.252.25 10.229.144.0 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.236.84.64 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.237.84.128 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.239.47.192 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.242.90.64 255.255.255.192
    access-list outside extended permit udp host 216.163.252.25 10.230.137.128 255.255.255.128
    access-list outside extended permit udp host 216.163.252.25 10.239.56.0 255.255.255.128
    access-list outside extended permit udp host 216.163.252.25 10.237.22.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.56
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.72
    access-list outside extended permit esp host 216.163.252.25 10.239.24.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.15
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.94
    access-list outside extended permit esp host 216.163.252.25 host 10.239.24.138
    access-list outside extended permit esp host 216.163.252.25 10.239.23.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.101
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.208
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.20
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.78
    access-list outside extended permit esp host 216.163.252.25 10.239.48.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.73
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.204
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.178
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.187
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.28
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.144
    access-list outside extended permit esp host 216.163.252.25 host 10.239.48.105
    access-list outside extended permit esp host 216.163.252.25 10.237.23.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.237.23.179
    access-list outside extended permit esp host 216.163.252.25 10.237.164.0 255.255.254.0
    access-list outside extended permit esp host 216.163.252.25 10.239.50.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.46
    access-list outside extended permit esp host 216.163.252.25 host 10.237.165.120
    access-list outside extended permit esp host 216.163.252.25 10.239.50.0 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.11
    access-list outside extended permit esp host 216.163.252.25 host 10.239.48.142
    access-list outside extended permit esp host 216.163.252.25 host 10.239.48.12
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.45
    access-list outside extended permit esp host 216.163.252.25 host 10.237.173.12
    access-list outside extended permit esp host 216.163.252.25 host 10.237.164.72
    access-list outside extended permit esp host 216.163.252.25 host 10.237.173.13
    access-list outside extended permit esp host 216.163.252.25 host 10.239.20.145
    access-list outside extended permit esp host 216.163.252.25 host 10.239.41.23
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.128
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.146
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.137
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.144
    access-list outside extended permit esp host 216.163.252.25 10.230.144.64 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.229.32.0 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.242.50.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.153
    access-list outside extended permit esp host 216.163.252.25 host 10.242.50.68
    access-list outside extended permit esp host 216.163.252.25 host 10.232.8.176
    access-list outside extended permit esp host 216.163.252.25 10.242.0.128 255.255.255.128
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.198
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.199
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.201
    access-list outside extended permit esp host 216.163.252.25 10.230.107.192 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.202
    access-list outside extended permit esp host 216.163.252.25 10.237.226.0 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 10.242.146.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.197
    access-list outside extended permit esp host 216.163.252.25 host 10.229.59.109
    access-list outside extended permit esp host 216.163.252.25 10.242.97.128 255.255.255.128
    access-list outside extended permit esp host 216.163.252.25 10.242.36.64 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.237.241.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 host 10.237.241.14
    access-list outside extended permit esp host 216.163.252.25 host 10.237.241.68
    access-list outside extended permit esp host 216.163.252.25 host 10.237.241.94
    access-list outside extended permit esp host 216.163.252.25 host 10.237.173.15
    access-list outside extended permit esp host 216.163.252.25 10.242.212.0 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.242.51.128 255.255.255.128
    access-list outside extended permit esp host 216.163.252.25 10.242.210.192 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 host 10.242.146.18
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.168
    access-list outside extended permit esp host 216.163.252.25 host 10.239.48.31
    access-list outside extended permit esp host 216.163.252.25 host 10.242.195.204
    access-list outside extended permit esp host 216.163.252.25 10.242.195.192 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.230.241.0 255.255.255.0
    access-list outside extended permit esp host 216.163.252.25 10.230.103.128 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 host 10.230.107.144
    access-list outside extended permit esp host 216.163.252.25 10.230.107.128 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 10.211.202.224 255.255.255.240
    access-list outside extended permit esp host 216.163.252.25 host 10.211.211.221
    access-list outside extended permit esp host 216.163.252.25 host 10.229.34.43
    access-list outside extended permit esp host 216.163.252.25 host 10.229.34.49
    access-list outside extended permit esp host 216.163.252.25 host 10.232.38.160
    access-list outside extended permit esp host 216.163.252.25 host 10.232.130.93
    access-list outside extended permit esp host 216.163.252.25 host 10.233.38.151
    access-list outside extended permit esp host 216.163.252.25 host 10.236.147.50
    access-list outside extended permit esp host 216.163.252.25 host 10.236.147.71
    access-list outside extended permit esp host 216.163.252.25 host 10.236.147.83
    access-list outside extended permit esp host 216.163.252.25 host 10.236.180.4
    access-list outside extended permit esp host 216.163.252.25 host 10.237.9.83
    access-list outside extended permit esp host 216.163.252.25 host 10.237.9.93
    access-list outside extended permit esp host 216.163.252.25 host 10.237.77.39
    access-list outside extended permit esp host 216.163.252.25 host 10.237.77.74
    access-list outside extended permit esp host 216.163.252.25 host 10.237.77.76
    access-list outside extended permit esp host 216.163.252.25 host 10.237.173.8
    access-list outside extended permit esp host 216.163.252.25 host 10.237.241.24
    access-list outside extended permit esp host 216.163.252.25 host 10.237.241.183
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.13
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.71
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.108
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.109
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.120
    access-list outside extended permit esp host 216.163.252.25 host 10.239.23.170
    access-list outside extended permit esp host 216.163.252.25 host 10.239.24.26
    access-list outside extended permit esp host 216.163.252.25 host 10.239.24.158
    access-list outside extended permit esp host 216.163.252.25 host 10.239.24.222
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.20
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.34
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.41
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.42
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.52
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.60
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.64
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.73
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.81
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.82
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.90
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.114
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.141
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.151
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.155
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.205
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.224
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.233
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.238
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.239
    access-list outside extended permit esp host 216.163.252.25 host 10.239.30.251
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.26
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.52
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.57
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.72
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.90
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.93
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.107
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.161
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.171
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.184
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.185
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.196
    access-list outside extended permit esp host 216.163.252.25 host 10.239.31.208
    access-list outside extended permit esp host 216.163.252.25 host 10.239.38.17
    access-list outside extended permit esp host 216.163.252.25 host 10.239.41.34
    access-list outside extended permit esp host 216.163.252.25 host 10.239.41.68
    access-list outside extended permit esp host 216.163.252.25 host 10.239.41.72
    access-list outside extended permit esp host 216.163.252.25 host 10.239.41.78
    access-list outside extended permit esp host 216.163.252.25 host 10.239.48.143
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.10
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.15
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.31
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.35
    access-list outside extended permit esp host 216.163.252.25 host 10.239.50.52
    access-list outside extended permit esp host 216.163.252.25 host 10.239.60.100
    access-list outside extended permit esp host 216.163.252.25 host 10.239.67.18
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.17
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.23
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.34
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.42
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.53
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.75
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.76
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.77
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.114
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.117
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.118
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.120
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.136
    access-list outside extended permit esp host 216.163.252.25 host 10.239.96.143
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.15
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.17
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.35
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.48
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.90
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.116
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.140
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.168
    access-list outside extended permit esp host 216.163.252.25 host 10.239.98.183
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.26
    access-list outside extended permit esp host 216.163.252.25 host 10.242.8.53
    access-list outside extended permit esp host 216.163.252.25 host 10.242.11.29
    access-list outside extended permit esp host 216.163.252.25 host 10.242.11.31
    access-list outside extended permit esp host 216.163.252.25 host 10.242.11.80
    access-list outside extended permit esp host 216.163.252.25 host 10.242.11.81
    access-list outside extended permit esp host 216.163.252.25 host 10.242.22.133
    access-list outside extended permit esp host 216.163.252.25 host 10.242.22.134
    access-list outside extended permit esp host 216.163.252.25 host 10.242.22.154
    access-list outside extended permit esp host 216.163.252.25 host 10.242.36.76
    access-list outside extended permit esp host 216.163.252.25 host 10.242.36.79
    access-list outside extended permit esp host 216.163.252.25 host 10.242.36.118
    access-list outside extended permit esp host 216.163.252.25 host 10.242.146.29
    access-list outside extended permit esp host 216.163.252.25 host 10.242.158.227
    access-list outside extended permit esp host 216.163.252.25 host 10.242.195.197
    access-list outside extended permit esp host 216.163.252.25 host 207.41.226.145
    access-list outside extended permit esp host 216.163.252.25 10.233.38.144 255.255.255.248
    access-list outside extended permit esp host 216.163.252.25 10.230.132.160 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 10.230.134.0 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 10.242.68.160 255.255.255.224
    access-list outside extended permit esp host 216.163.252.25 10.233.38.150 255.255.255.222
    access-list outside extended permit esp host 216.163.252.25 10.229.144.0 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.236.84.64 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.237.84.128 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.239.47.192 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.242.90.64 255.255.255.192
    access-list outside extended permit esp host 216.163.252.25 10.230.137.128 255.255.255.128
    access-list outside extended permit esp host 216.163.252.25 10.239.56.0 255.255.255.128
    access-list outside extended permit esp host 216.163.252.25 10.237.22.0 255.255.255.0
    access-list inside1 extended permit udp 10.237.164.0 255.255.254.0 host 216.163.252.25
    access-list inside1 extended permit ip 10.229.32.0 255.255.255.192 host 216.163.252.25
    access-list inside1 extended permit ip 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit esp 10.242.146.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit ip 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit esp 10.239.48.0 255.255.255.0 host 216.163.252.25
    access-list inside1 extended permit ip host 10.239.23.177 host 216.163.252.25
    nat (inside,outside) source dynamic obj-10.239.48.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
    nat (inside,outside) source dynamic obj-10.237.164.0-01 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
    nat (inside,outside) source dynamic obj-10.229.32.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
    nat (inside,outside) source dynamic obj-10.242.146.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
    nat (inside,outside) source dynamic obj-10.237.241.0 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25
    nat (inside,outside) source dynamic obj-10.230.107.128 obj-203.99.194.163 destination static obj-216.163.252.25 obj-216.163.252.25

  • POE 3560 Issue after IOS upgrade

    Hello,
    I having issue where 6 WLAN AP's not coming back uo after reboot and IOS upgrade of 3560 POE swtiches - . Prior to changes here most if not all ALL the 23 Aps were mainly on one switch, Now after these changes they are now spread over three switches ( 3560's) - with 17 coming back on line
    I am sure its not the power limitation of the switch(s) as the one switch I am TS at present had a fairly large allocation of the aps attached prior to ios upgrade and reload. and the available power value now showing is applicable.for 8 AP's
    I have tried various TS steps to try and bring them back up - A couple of things I would like to try but I am restricted to do so is to check the APS physically or downgrade the ios!
    Any input on this matter would be truly appreciated.- (attached is the log buffer debug)
    res
    Paul

    c3560-ipbase-mz.122-25.SEE2.bin
    You upgraded the IOS to the switch?  I shudder at the thought of what old version did you upgrade FROM.  
    Available:370.0(w) Used:110.4(w) Remaining:259.6(w)
    You've got more than enough PoE left. 
    Only two things comes to my mind:  
    1.   Cable issue - Unfortunately, the 3560 is a non-GigabitEthernet and this particular sub-model does NOT support TDR.
    2.  Hardware failure - Read THIS.

  • Why does the new iOS 7.1 not show all your calendar entry's  like 7.0 only shows daily entry's not the list. New software on iPad still shows all calender entry's

    New iOS 7.01 iPhone 5. When you go to check you calendar entry's it does not bring up all the entry's only shows entry's for each day. Why?

    When in month view, swipe up or down to change the month, tap the litle icon "three lines horizontal" next to the search icon, and you have a list view of all events. Clicking the icon twice again, brings up the Day view, and then again tapping twice the list view again....
    Personally I am not very happy with this "advanced" app, and I have installed Week calendar which basically is another interface to the same calendars database.

Maybe you are looking for

  • Apply Receipts and CM

    Hello all, We Have Oracle EBS R12. There are many invoices already entered to the application. There are more than 1000 Check (Receipts) already entered in the application, also there are 1000 Credit memo's Entered in the application. As there are no

  • HT204380 how do you know if someone is online

    I just want to know how someone will know that I'm online and available to talk using Facetime please

  • Job cancel

    Hi, While cancelling the process in SM66, how to find out the corresponding job in SM37 to make sure that we are cancelling the right job? Thanks.

  • Does anyone have experience with vxWorks 5.2?

    Hi,  I have started a new project that is currently using LabWindows/CVI, vxWorks 5.2 (Windows 2000 I believe).  I will be interfacing with a (Cutronic - TM-9223F) motion control/rate table  running vxWorks 5.2 and am looking for any assitance for up

  • Duplicate Calendars showing up

    In iCal, I now have two versions of each of my three Calendars showing up: one set under [email protected], and another under MYNAME @me.com. How do I get rid of one or the other?