Peer to peer airplay

hi
I'm using yosemite on an mid 2012 macbook pro and an apple tv rev a with os7.0.
i can't figure out how to use peer to peer airplay.
my wifi router is a very weak, so the peer to peer would help me a lot.
the wifi is turned on in the screenshot, but not logged into a network.
greetings michael

iPad 3rd generation doesn't support Peer-to-Peer Airplay. Apple quietly said it was for iOS devices introduced in LATE 2012. Like for Handoff; certain devices with the latest Wi-Fi specifications can get this feature. The iPad 3 was introduced in EARLY 2012. I tried, but it didn't work. Here is what I found in the Apple TV Section.
AirPlay requires an Apple TV (2nd generation or later) with an iOS device running iOS 4.3 or later or a Mac with iTunes 10.2 or later. Some features require the latest software.
Peer-to-peer AirPlay requires a Mac (2012 or later) with OS X Yosemite or an iOS device (late 2012 or later) with iOS 8; and an Apple TV (3rd generation rev A, model A1469 or later) with Apple TV software 7.0 or later.
AirPlay Mirroring is available with iPhone 4s or later; iPad 2 or later; iPad mini; iPod touch (5th generation); and iMac (Mid 2011 or newer), Mac mini (Mid 2011 or newer), MacBook Air (Mid 2011 or newer), MacBook Pro (Early 2011 or newer), and Mac Pro (Late 2013) with OS X Mountain Lion or later.
Dual-screen capability is available with iPhone 4s or later, iPad 2 or later, iPad mini, and iPod touch (5th generation).

Similar Messages

  • HT204289 Apple tv a1469 7.1 to macbook pro retina late 2013 yosemite 10.10.2 peer to peer airplay connection probem..?

    Macbook pro retina late 2013 yosemite 10.10.2 wifi bluetooth both turned on same thing for apple tv a1469 and there isn't any network or internet connection. Macbook pro can see apple tv as a mirroring device but cannot connect to apple tv a1469. There is a connection failed or the screen code is wrong message appears but no peer to peer airplay between macbook pro retina and apple tv a1469. On the ios side everything just works except sometimes there is no audio problem (when switching between different apps) between ios and apple tv but on the screen mirroring side everything looks ok. Please help me to connect apple tv a1469 to macbook pro, thanks.
    Airplay peer-to-peer

    Macbook pro retina late 2013 yosemite 10.10.2 wifi bluetooth both turned on same thing for apple tv a1469 and there isn't any network or internet connection. Macbook pro can see apple tv as a mirroring device but cannot connect to apple tv a1469. There is a connection failed or the screen code is wrong message appears but no peer to peer airplay between macbook pro retina and apple tv a1469. On the ios side everything just works except sometimes there is no audio problem (when switching between different apps) between ios and apple tv but on the screen mirroring side everything looks ok. Please help me to connect apple tv a1469 to macbook pro, thanks.
    Airplay peer-to-peer

  • Peer to Peer Airplay w Apple TV and iPhone?

    I want to do peer to peer screen sharing from my iphone 5 (ios 8.1) to my new Apple TV (model A1469, 7.0.1 (6912) software). We don't have WIFI in the office and that's why I want to do peer to peer.  I can't get my phone to find the Apple TV when I click on Airplay.  It only shows my phone as a device. 
    I have rebooted my phone and the Apple TV.  Airplay is ON.  Security option is "password".  I installed the new OS on my phone and also did the updates for the Apple TV.  I've read all the instructions on apple.com for doing this, which is really just a couple of sentences (Use AirPlay to wirelessly stream content from your iPhone, iPad, or iPod touch). Still no luck. I'd love some help!  thanks. 

    HI man,
    same problem here, latest iOS, latest ATV update, not a single device works over peer to peer...
    I have two ATV's, macbook air, iPad mini, iPad Air, iPhone 5s, not a single device after this update can get AirPlay... so disappointed with Apple...

  • Peer-to-Peer Airplay not working with iPad (Gen. 3)

    I'm in the process of testing "wireless projection" solutions. Since I have access to an iPad (gen. 3), iPad Retina, iPad Air and iPhone 5c all running iOS 8.0, with a pair of Apple TV's, Model 1469, one ATV a wired connection and one ATV no network connection at all.  Both devices were updated using Configurator to get the activation setup. 
    Once activate, they were then set up in their respective locations, and the settings were verified (i.e. airplay is on, networks are connected/disconnected as required) and tested using each of the iOS devices listed above.
    All 4 iOS devices could see the networked Apple TV as expected.  But the Gen 3 iPad was the only device that didn't pick up the Peer-to-peer Apple TV when testing the standalone unit.  I tried to reset the iPad, turned off and on the radios, but the device will not pick up the PTP ATV.
    Has anyone else had any luck getting a Gen 3 iPad to work with the Peer-to-Peer with out a network?
    According to the following KB, Use AirPlay to wirelessly stream content from your iPhone, iPad, or iPod touch, you should be able to use a 3rd gen iPad to peer to peer airplay.

    iPad 3rd generation doesn't support Peer-to-Peer Airplay. Apple quietly said it was for iOS devices introduced in LATE 2012. Like for Handoff; certain devices with the latest Wi-Fi specifications can get this feature. The iPad 3 was introduced in EARLY 2012. I tried, but it didn't work. Here is what I found in the Apple TV Section.
    AirPlay requires an Apple TV (2nd generation or later) with an iOS device running iOS 4.3 or later or a Mac with iTunes 10.2 or later. Some features require the latest software.
    Peer-to-peer AirPlay requires a Mac (2012 or later) with OS X Yosemite or an iOS device (late 2012 or later) with iOS 8; and an Apple TV (3rd generation rev A, model A1469 or later) with Apple TV software 7.0 or later.
    AirPlay Mirroring is available with iPhone 4s or later; iPad 2 or later; iPad mini; iPod touch (5th generation); and iMac (Mid 2011 or newer), Mac mini (Mid 2011 or newer), MacBook Air (Mid 2011 or newer), MacBook Pro (Early 2011 or newer), and Mac Pro (Late 2013) with OS X Mountain Lion or later.
    Dual-screen capability is available with iPhone 4s or later, iPad 2 or later, iPad mini, and iPod touch (5th generation).

  • HT4437 peer-to-peer AirPlay doesnot work on my ipad air

    I am able to connect to peer-to-peer AirPlay with my iphone5 to apple tv, but the same is not working with ipad air. I am not able to connect my ipad air to my apple tv via peer-to-peer AirPlay.

    Do you have the option in Display Preferences? (System Preferences -> Displays)
    http://support.apple.com/kb/HT5404

  • Airplay peer-to-peer

    I have been unable to get the new "Peer-to-Peer" airplay feature working.
    The AppleTV website lists the following requirements:
    "Peer-to-peer AirPlay requires a Mac device (2012 or later) running OS X 10.10 or an iOS device (2012 or later) running iOS 8 and an Apple TV third-generation rev A (model A1469) running Apple TV software 7.0."
    I have an A1469 Apple TV as well as several ios and Mac devices that meet allo of the above requirements, yet none of them seem to be able to accomplish a peer-to-peer connection.  There is seemingly no option to enable or disable this feature in the most recent AppleTV software update.
    Has any one had any luck getting peer-to-peer airplay to work, or is this feature just a myth?

    Saw this just now, not strictly true then
    An Apple spokesperson said in a statement to The Next Web that ‘AppleTV 3,2′ is basically a stealth refresh:
    We sometimes make component changes which require an updated model number for regulatory approval.
    The component changes we made don’t affect product features and Apple TV customers will continue to have the same great user experience.

  • HT4528 Has anyone figured out peer-to-peer airplay?

    I have updated my operating system on my iPhone, my iPad and I have a third generation Apple TV. Peer-to-peer airplay is not working without Wi-Fi as I thought it would. Is anyone figure this out?

    Hi collinbrooksie,
    Welcome to the Apple Support Communities!
    To use AirPlay with your Apple TV and iOS device, they must be on the same Wi-Fi network. Please reference the attached article for more information.
    Use AirPlay to wirelessly stream content from your iPhone, iPad, or iPod touch
    Have a great day,
    Joe

  • Peer to peer AirPlay setup

    I have just purchased a 3rd generation AppleTV with the aim of using peer-to-peer Airplay to mirror what is on my iPad (iPad Air running IOS8).  I was assured by the staff at the Apple store that this works well when you cannot access a WiFi network.  However after 3 hours of trying I am at a loss as to how to get this to work, any ideas would be greatly received.

    Hello Sandclimber,
    I'm sorry to hear you are having issues with your Apple TV and your iPad Air. If you are having difficulties connecting via peer-to-peer AirPlay, you may want to double check that Bluetooth is enabled on both devices, as noted in the following article:
    Peer-to-peer AirPlay
    With peer-to-peer AirPlay, your iOS device and Apple TV don't need to be on the same Wi-Fi network. If you have one of these products, you can use peer-to-peer AirPlay:
    * iPhone 5 or later, iPad (4th generation or later), iPad mini, or iPod touch (5th generation) using iOS 8 or later.
    * Apple TV (3rd generation rev A, model A1469 or later) with Apple TV software 7.0 or later. Find out which Apple TV model you have.
    To use peer-to-peer AirPlay, your iOS device needs to have both Wi-Fi and Bluetooth turned on.
    You'll need an Internet connection to stream iTunes content.
    Use AirPlay to wirelessly stream content from your iPhone, iPad, or iPod touch - Apple Support
    Sincerely,
    - Brenden

  • Neighbours Apple TV and peer to peer Airplay

    I think it's unacceptable that I cannot turn off the new peer-to-peer functionality on the Apple TV.
    I myself can see two of my closest neighbours (apartment complex) Apple TV's in my Airplay menus. Not only does that make me feel uneasy, showing random people what equipment I have, but my neighbours can also turn on my Apple TV whenever they feel like, by trying to stream to my TV. Setting a pass code doesn't stop them from trying. They can also try to interrupt the current streaming.
    I'm so relieved that my Apple TV does NOT have the functionality of turning on my TV automatically, as my Playstation have, or I would find my TV turning on in the middle of the night each time a neighbour select the wrong Apple TV from their list of Airplay devices.
    If Apple does not fix this security issue, I'm gonna have to retire my Apple TV.

    Thank you so much for taking the time!

  • ATV peer-to-peer from MBP w/Kanex ATV adaptor

    Hello.I am a H.S. teacher. I wish to use an ATV, peer-to-peer w/ a MBP. Cannot use school network. LED uses vga so would use Kanex ATV pro hdmi to vga adaptor. 720i is OK for my purposes. Can this be accomplished. Any suggestions/comments greatly apprecitated.
    Thank you in advance.

    iPad 3rd generation doesn't support Peer-to-Peer Airplay. Apple quietly said it was for iOS devices introduced in LATE 2012. Like for Handoff; certain devices with the latest Wi-Fi specifications can get this feature. The iPad 3 was introduced in EARLY 2012. I tried, but it didn't work. Here is what I found in the Apple TV Section.
    AirPlay requires an Apple TV (2nd generation or later) with an iOS device running iOS 4.3 or later or a Mac with iTunes 10.2 or later. Some features require the latest software.
    Peer-to-peer AirPlay requires a Mac (2012 or later) with OS X Yosemite or an iOS device (late 2012 or later) with iOS 8; and an Apple TV (3rd generation rev A, model A1469 or later) with Apple TV software 7.0 or later.
    AirPlay Mirroring is available with iPhone 4s or later; iPad 2 or later; iPad mini; iPod touch (5th generation); and iMac (Mid 2011 or newer), Mac mini (Mid 2011 or newer), MacBook Air (Mid 2011 or newer), MacBook Pro (Early 2011 or newer), and Mac Pro (Late 2013) with OS X Mountain Lion or later.
    Dual-screen capability is available with iPhone 4s or later, iPad 2 or later, iPad mini, and iPod touch (5th generation).

  • Cisco 5505 VPN assistance - Resending P1 and Peer to Peer List No match

    Hello and thanks in advance to anyone that can help me with the IPSec connection.  the VPN were working when i first created them but now they wont connect.  Here is the error on the primary (local) firewall: (yes i know the time isnt set yet on the firewall)
    4|May 17 2007|13:51:55|713903|||||IP = X.X.X.X, Error: Unable to remove PeerTblEntry
    3|May 17 2007|13:51:55|713902|||||IP = X.X.X.X, Removing peer from peer table failed, no match!
    6|May 17 2007|13:51:55|713905|||||IP = X.X.X.X, P1 Retransmit msg dispatched to MM FSM
    5|May 17 2007|13:51:55|713201|||||IP = X.X.X.X, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    6|May 17 2007|13:51:47|713905|||||IP = X.X.X.X, P1 Retransmit msg dispatched to MM FSM
    5|May 17 2007|13:51:47|713201|||||IP = X.X.X.X, Duplicate Phase 1 packet detected.  Retransmitting last packet.
    The local firewall has one VPN configured and the remote has 2 (1 working and the other not): Local Firewall is Base licensing with 3DES.  As far as I can tell they have the same VPN parameters but maybe the remote has pfs1 turned on?  Ive played with various settings and cant seem to get it to work.  The cryptomap has the same firewall rules in it (obviously reversed on remote). Any help much appreciated!  I Have a third site doing exactly the same thing (once again also works on another site to site but not this one).  It's weird because I used the IPSec wizard and got it to work and rebooted the ASA and tunnel came up yet again but now my debug log is just full of this info and tunnels never come up.....the only time it was up was for a few hours then wont come up anymore...odd..
    Local Fire Wall:
    hostname ciscoasa
    names
    name 172.25.42.0 MASALan
    name 172.25.7.0 FHR
    name 172.25.43.0 MR
    interface Vlan1
    nameif inside
    security-level 100
    ip address 172.25.6.1 255.255.255.0
    interface Vlan2
    nameif outside
    security-level 0
    ip address 10.10.10.30 255.255.255.0
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    switchport access vlan 2
    interface Ethernet0/2
    interface Ethernet0/3
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    boot system disk0:/asa821-k8.bin
    ftp mode passive
    dns server-group DefaultDNS
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object-group network inside-network
    object-group protocol DM_INLINE_PROTOCOL_1
    protocol-object ip
    protocol-object icmp
    protocol-object igmp
    protocol-object gre
    object-group protocol DM_INLINE_PROTOCOL_2
    protocol-object ip
    protocol-object icmp
    protocol-object igmp
    protocol-object gre
    object-group network DM_INLINE_NETWORK_4
    network-object MASALan 255.255.255.0
    network-object MR 255.255.255.0
    object-group network DM_INLINE_NETWORK_6
    network-object 172.25.6.0 255.255.255.0
    network-object FHR 255.255.255.0
    object-group protocol DM_INLINE_PROTOCOL_3
    protocol-object ip
    protocol-object icmp
    protocol-object igmp
    protocol-object gre
    object-group network DM_INLINE_NETWORK_3
    network-object 172.25.6.0 255.255.255.0
    network-object FHR 255.255.255.0
    object-group network DM_INLINE_NETWORK_5
    network-object MASALan 255.255.255.0
    network-object MR 255.255.255.0
    access-list outside_2_cryptomap extended permit ip 172.25.6.0 255.255.255.0 MASALan 255.255.255.0
    access-list NONAT extended permit ip any 172.25.4.0 255.255.255.0
    access-list NONAT extended permit ip 172.25.6.0 255.255.255.0 MASALan 255.255.255.0
    access-list NONAT extended permit ip FHR 255.255.255.0 MR 255.255.255.0
    access-list NONAT extended permit ip object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_NETWORK_5
    access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_3 object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_NETWORK_6
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    ip local pool RemotePool 172.25.4.1-172.25.4.2 mask 255.255.255.0
    icmp unreachable rate-limit 1 burst-size 1
    asdm image disk0:/asdm-621.bin
    no asdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 0 access-list NONAT
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 10.10.10.1 1
    route inside 172.25.1.0 255.255.255.0 172.25.6.2 1
    route inside 172.25.2.0 255.255.255.0 172.25.6.2 1
    route inside 172.25.8.0 255.255.255.0 172.25.6.4 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa authentication ssh console LOCAL
    http server enable
    http 172.25.0.0 255.255.0.0 outside
    http 172.25.0.0 255.255.0.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto map outside_map 2 match address outside_2_cryptomap
    crypto map outside_map 2 set peer 216.183.157.158
    crypto map outside_map 2 set transform-set ESP-AES-128-SHA
    crypto map outside_map 2 set security-association lifetime kilobytes 4608000
    crypto map outside_map interface outside
    crypto isakmp enable outside
    crypto isakmp policy 1
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    no crypto isakmp nat-traversal
    telnet timeout 5
    ssh 172.25.0.0 255.255.0.0 inside
    ssh 172.25.6.0 255.255.255.0 inside
    ssh 172.25.0.0 255.255.0.0 outside
    ssh timeout 60
    console timeout 0
    management-access inside
    dhcpd auto_config outside
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    group-policy DfltGrpPolicy attributes
    vpn-tunnel-protocol IPSec
    group-policy GroupPolicy1 internal
    group-policy GroupPolicy1 attributes
    vpn-filter none
    vpn-tunnel-protocol IPSec
    tunnel-group osfdremote ipsec-attributes
    pre-shared-key *
    tunnel-group X.X.X.X type ipsec-l2l
    tunnel-group X.X.X.X general-attributes
    default-group-policy GroupPolicy1
    tunnel-group X.X.X.X ipsec-attributes
    pre-shared-key *
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny 
      inspect sunrpc
      inspect xdmcp
      inspect sip 
      inspect netbios
      inspect tftp
    service-policy global_policy global
    prompt hostname context
    REMOTE FIREWALL
    interface Vlan2
    nameif outside
    security-level 0
    pppoe client vpdn group CHN
    ip address pppoe setroute
    ftp mode passive
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object-group network DM_INLINE_NETWORK_1
    network-object 172.25.42.0 255.255.255.0
    network-object RFN 255.255.255.0
    object-group network DM_INLINE_NETWORK_2
    network-object RHQASAnet 255.255.255.0
    network-object RHQNet 255.255.255.0
    object-group protocol DM_INLINE_PROTOCOL_1
    protocol-object ip
    protocol-object gre
    protocol-object tcp
    object-group network DM_INLINE_NETWORK_3
    network-object 172.25.42.0 255.255.255.0
    network-object RFN 255.255.255.0
    object-group network DM_INLINE_NETWORK_4
    network-object FHData 255.255.255.0
    network-object FHR 255.255.255.0
    object-group protocol DM_INLINE_PROTOCOL_2
    protocol-object ip
    protocol-object gre
    protocol-object tcp
    access-list outside_access_in extended permit icmp any any
    access-list outside_access_in extended permit tcp any any eq www
    access-list outside_cryptomap extended permit ip object-group DM_INLINE_NETWORK_1 RHQASAnet 255.255.255.0
    access-list inside_nat0_outbound extended permit ip RFN 255.255.255.0 RHQNet 255.255.255.0
    access-list inside_nat0_outbound extended permit ip 172.25.42.0 255.255.255.0 RHQASAnet 255.255.255.0
    access-list inside_nat0_outbound extended permit ip any 192.168.5.0 255.255.255.240
    access-list inside_nat0_outbound extended permit ip 172.25.42.0 255.255.255.0 FHData 255.255.255.0
    access-list inside_nat0_outbound extended permit ip RFN 255.255.255.0 FHR 255.255.255.0
    access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any object-group DM_INLINE_NETWORK_2
    access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 any object-group DM_INLINE_NETWORK_4
    access-list outside_cryptomap_1 extended permit ip object-group DM_INLINE_NETWORK_3 FHData 255.255.255.0
    no pager
    logging enable
    logging asdm debugging
    mtu inside 1500
    mtu outside 1500
    ip local pool 192.168.5.1 192.168.5.1-192.168.5.10 mask 255.255.255.0
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    global (outside) 101 interface
    nat (inside) 0 access-list inside_nat0_outbound
    nat (inside) 101 0.0.0.0 0.0.0.0
    access-group inside_access_in in interface inside
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 10.110.10.1 1
    route inside RFN 255.255.255.0 172.25.42.2 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    http server enable
    http 172.25.0.0 255.255.0.0 inside
    http 10.7.72.0 255.255.255.0 inside
    http 192.168.5.0 255.255.255.0 inside
    http 192.168.5.0 255.255.255.0 outside
    http RHQNet 255.255.255.0 inside
    http RHQASAnet 255.255.255.0 inside
    http RHQASAnet 255.255.255.0 outside
    http RHQNet 255.255.255.0 outside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outside_map0 2 match address outside_cryptomap_1
    crypto map outside_map0 2 set peer Y.Y.Y.Y
    crypto map outside_map0 2 set transform-set ESP-AES-128-SHA
    crypto map outside_map0 2 set security-association lifetime seconds 28800
    crypto map outside_map0 2 set security-association lifetime kilobytes 4608000
    crypto map outside_map0 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outside_map0 interface outside
    crypto isakmp enable outside
    crypto isakmp policy 5
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    crypto isakmp policy 65535
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    telnet 0.0.0.0 0.0.255.255 inside
    telnet 172.25.0.0 255.255.0.0 inside
    telnet 192.168.5.0 255.255.255.0 inside
    telnet 192.168.5.0 255.255.255.0 outside
    telnet timeout 5
    ssh 192.168.5.0 255.255.255.0 inside
    ssh 192.168.5.0 255.255.255.0 outside
    ssh timeout 5
    console timeout 0
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    group-policy GroupPolicy1 internal
    group-policy GroupPolicy1 attributes
    vpn-tunnel-protocol IPSec
    group-policy remotevpn internal
    group-policy remotevpn attributes
    vpn-tunnel-protocol IPSec
    vpn-group-policy remotevpn
    tunnel-group Y.Y.Y.Y type ipsec-l2l
    tunnel-group Y.Y.Y.Y general-attributes
    default-group-policy GroupPolicy1
    tunnel-group Y.Y.Y.Y ipsec-attributes
    pre-shared-key *****
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect ip-options
      inspect netbios
      inspect rsh
      inspect rtsp
      inspect skinny
      inspect esmtp
      inspect sqlnet
      inspect sunrpc
      inspect tftp
      inspect sip
      inspect xdmcp
    policy-map global-policy
    class inspection_default
      inspect pptp
    service-policy global_policy global
    prompt hostname context

    May 18 08:13:03 [IKEv1 DEBUG]: IP = X.X.X.X, IKE MM Responder FSM error hi                                                                                        story (struct &0xd578cda0)  , :  MM_DONE, EV_ERROR-->MM_WAIT_MSG3,                                                                                         EV_RESEND_MSG-->MM_WAIT_MSG3, NullEvent-->MM_SND_MSG2, EV_SND_MSG-->MM_SND_MSG2                                                                                        , EV_START_TMR-->MM_SND_MSG2, EV_RESEND_MSG-->MM_WAIT_MSG3, EV_RESEND_MSG-->MM_W                                                                                        AIT_MSG3, NullEvent
    May 18 08:13:03 [IKEv1 DEBUG]: IP = X.X.X.X, IKE SA MM:8e338e16 terminatin                                                                                        g:  flags 0x01000002, refcnt 0, tuncnt 0
    May 18 08:13:03 [IKEv1 DEBUG]: IP = X.X.X.X, sending delete/delete with re                                                                                        ason message
    May 18 08:13:03 [IKEv1]: IP = X.X.X.X, Removing peer from peer table faile                                                                                        d, no match!
    May 18 08:13:03 [IKEv1]: IP = X.X.X.X, Error: Unable to remove PeerTblEntr  
    Is the result and then it repeats =)

  • SAP Business One 8.8 running on a server with Peer to Peer

    Can SAP Business One 8.8  be install and run in a server with a Peer to Peer Operative system?

    You have more than one Oracle Release on the Server. hence more than one ORACLE_HOME.
    Check which is your default ORACLE_HOME on the server and check which of the homes PERL5LIB environment variable is pointing from both command prompt and in Windows.
    That could explain the funny bahaviour. If you change ORACLE_HOME, that could help.

  • How do i set a peer to peer network between my iMac and windows machines?

    I want to set up a peer to peer network between my iMac and Windows based computers in my house.  I also want it to a wireless set up.  Mostly being done to share videos, pictures, and music. Any insight would be appreciated.

    I'm trying to connect my MacBook Pro to Wifi using internet sharing
    Why?
    Just connect the MacBook to the same internet as your iMac.
    MacBook > Wi-Fi router > Internet.
    You are connected to the internet with your iMac.
    iMac > Wi-Fi router > Internet
    Why do you want to go MacBook (via Wi-Fi)  > iMac > Wi-Fi router > Internet?

  • How to make a peer to peer connection in a network using sockets

    My Project is about a multi agent meeting scheduling system.. I've kept the DB in the server and I only use the server to retrieve data from the database. I have used sockets to communicate with the server.
    Each peer in the network is an agent for a perticular user and these agents will be communicating with each other for negotiation purposes..
    The problem I have is that, I couldnt communicate wit other peers using sockets.. I couldnt find any sample java code of sockets to overcum this problem.f sumone has a sample code plz send me.
    And if there is a more efficient and easy way I can connect these peers except sockets, plz tell me and if u have a sample java code plz be kind enough to send.
    This is my final year project in the University
    Thank you
    Sajini De Silva ([email protected])

    Hi Sajinidesilva,
    I think you'll find more support in the [JXTA Community|https://jxta.dev.java.net/] for your project. Also, there's an interesting article to start with : [Introduction to the Peer-to-Peer Sockets Project|http://www.onjava.com/pub/a/onjava/2003/12/03/p2psockets.html].

  • I want to set up my router for Peer To Peer connection.

    I recently started playing a new game that requires Peer to Peer connection, and I lag a lot when I log in, so I was wonder what options I would have to check, How to enable/disable options to optimize my gaming connection.
    What kind of router I have is MI424-WR Rev. E Actiontec. Or something along that line.. I was researching what to do and it had a lot to do with DMZ, Ports, and firewall. But any help would be appreciated.
    Im off for tonight so I wont be able to check the post until like 9 hours from now. Goodnight
    Oh if you need to know what game it is for some odd reason its Dungeon Fighters Online, or http://dungeonfighter.nexon.net/
    I like arcade style games.
    Oh and my brother connects to this router to and i want him to keep internet so none of the options can interfear with his internet connection.

    I took a quick look at the www site for the game, but did not see anything definite from the vendor on what port(s) the game uses. 
    You would need to set up you gaming machine with a Static TCP/IP Address and configure the Verizon Router with Port Forwarding of the ports used by the game.  I would ONLY set it up in the DMZ if all else fails.
    Note that the Verizon Router has a small NAT Table which may effect your ability to play a P2P game for extended periods of time.
    If you are the original poster (OP) and your issue is solved, please remember to click the "Solution?" button so that others can more easily find it.
    If anyone has been helpful to you, please show your appreciation by clicking the "Kudos" button.

Maybe you are looking for

  • Problem with DNS

    Hello, I am relatively new to configuring DNS settings in Server Manager. Recently, my Kerberos relm stopped working and I am now getting this error message on the console: configured name and reverse DNS name do not match (fileserver.occu-med.com !=

  • Restricted access to nodes in SOLAR01

    Hi I have setup restricted access to the nodes in SOLAR01 (details shared below in the for "information area") - now I need to enter the team members who are allowed to update documentation in each business process & step. It seems that access to a h

  • Ibooks list of books

    I downloaded ibooks and searched the book list that was offered. I put some books on my own list in Word to review later when I was ready to download. And now for the life of me I cannot find the book list in the ibook program.

  • Interbase to Oracle 8i

    I am trying to export a Interbase database into Oracle 8i Perso. I USE Borland Datapump which asks for the path to my Oracle base desination Which path is it?

  • Why did all my pictures get lost i did not delete them?

    i cant seem to find where my pictures have gone i did not earse them i have no clue what happened help please!!!something anything will help i have not the slightest clue what happened?