Pinging computers on local network

Hi,
I am having problems pinging clients on my location network (192.168.0.x) by there host name.  Is there a tutorial or thinks I should check to get that working?
Thanks for the help!

tjwallace wrote:I thought it would do hostname lookup automatically, without having to populate /etc/hosts.  Also all the other hosts are using DHCP so their IP could change.
I only use D-Link routers, so I can't speak for other routers.  With my D-Link I can set up the DHCP server on the LAN side to use a range of IP addresses for DHCP, say 192.168.0.2 to 192.168.0.100.  All DHCP leases will be set up in that range.  Then 192.168.0.101 to 192.168.0.254 can be used for static addresses.  The D-Link will serve both types of addresses simultaneously, DHCP and static.  You could set up the Windows boxes on the DHCP part and your Linux boxes in the static address area.
Or, you could do like I do.  I have static addresses on all my computers.  Six Arch Linux boxes, and two Windows XP boxes.  If you are going to network multiple computers, and some of them are Linux boxes, static addresses really save a lot of head aches.
Here is a tutorial I wrote for setting up ssh and sshfs on Arch Linux.  It may be of use to you.  I use the sshfs setup for Linux to Linux networking, and SAMBA for Linux to Windows networking.
Pudge

Similar Messages

  • Site-to-Site up but no ping for the local networks from both sides

    I have set the tunnel up between ASA 5505 and ASA 5510, but I can't ping the local networks of both ASAs.
    ASA 5505
    ASA Version 8.2(5)
    hostname ciscoasa
    enable password 8Ry2YjIyt7RRXU24 encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    names
    name 10.2.3.0 baghdad
    name 195.112.215.16 CyberiaNetwork
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    interface Ethernet0/2
    switchport access vlan 3
    interface Ethernet0/3
    switchport access vlan 3
    interface Ethernet0/4
    switchport access vlan 3
    interface Ethernet0/5
    switchport access vlan 3
    interface Ethernet0/6
    switchport access vlan 3
    interface Ethernet0/7
    switchport access vlan 3
    interface Vlan1
    nameif inside
    security-level 100
    ip address 192.168.3.1 255.255.255.0
    interface Vlan2
    nameif outside
    security-level 0
    ip address 81.90.22.188 255.255.255.248
    interface Vlan3
    no forward interface Vlan1
    nameif voice
    security-level 100
    ip address 192.168.1.1 255.255.255.0
    ftp mode passive
    dns domain-lookup inside
    dns domain-lookup outside
    dns server-group DefaultDNS
    name-server 83.138.175.26
    name-server 50.56.16.2
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object-group service DM_INLINE_SERVICE_1
    service-object ip
    service-object tcp
    service-object icmp echo-reply
    service-object tcp eq h323
    access-list outside_1_cryptomap extended permit ip 192.168.1.0 255.255.255.0 10.1.3.0 255.255.255.0
    access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 10.1.3.0 255.255.255.0 192.168.1.0 255.255.255.0
    access-list outside_access_in extended permit icmp any any echo-reply
    access-list voice_access_in extended permit ip any any
    access-list voice_access_in extended permit ip 10.1.3.0 255.255.255.0 192.168.1.0 255.255.255.0
    access-list voice_nat0_outbound extended permit ip any any
    access-list voice_access_in_1 extended permit ip 10.1.3.0 255.255.255.0 any
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    mtu voice 1500
    icmp unreachable rate-limit 1 burst-size 1
    icmp permit any outside
    icmp permit any voice
    no asdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 1 0.0.0.0 0.0.0.0 dns
    nat (voice) 0 access-list voice_nat0_outbound
    access-group outside_access_in in interface outside
    access-group voice_access_in_1 in interface voice control-plane
    access-group voice_access_in in interface voice
    route outside 0.0.0.0 0.0.0.0 81.90.22.185 1
    route outside 10.1.3.0 255.255.255.0 81.90.22.185 1
    route outside CyberiaNetwork 255.255.255.240 81.90.22.185 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    http server enable
    http 192.168.1.0 255.255.255.0 inside
    http 192.168.3.0 255.255.255.0 inside
    http CyberiaNetwork 255.255.255.240 outside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec security-association lifetime seconds 3600
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto map outside_map 20 match address outside_1_cryptomap
    crypto map outside_map 20 set pfs
    crypto map outside_map 20 set peer 195.112.215.19
    crypto map outside_map 20 set transform-set ESP-DES-SHA
    crypto map outside_map interface outside
    crypto ca trustpoint _SmartCallHome_ServerCA
    crl configure
    crypto ca certificate chain _SmartCallHome_ServerCA
    certificate ca 6ecc7aa5a7032009b8cebcf4e952d491
        308205ec 308204d4 a0030201 0202106e cc7aa5a7 032009b8 cebcf4e9 52d49130
        0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117
        30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b
        13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504
        0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72
        20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56
        65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043
        65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31
        30303230 38303030 3030305a 170d3230 30323037 32333539 35395a30 81b5310b
        30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20
        496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65
        74776f72 6b313b30 39060355 040b1332 5465726d 73206f66 20757365 20617420
        68747470 733a2f2f 7777772e 76657269 7369676e 2e636f6d 2f727061 20286329
        3130312f 302d0603 55040313 26566572 69536967 6e20436c 61737320 33205365
        63757265 20536572 76657220 4341202d 20473330 82012230 0d06092a 864886f7
        0d010101 05000382 010f0030 82010a02 82010100 b187841f c20c45f5 bcab2597
        a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10
        9c688b2e 957b899b 13cae234 34c1f35b f3497b62 83488174 d188786c 0253f9bc
        7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b
        15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845
        63cd1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8
        18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced
        4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f
        81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 02030100 01a38201 df308201
        db303406 082b0601 05050701 01042830 26302406 082b0601 05050730 01861868
        7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1d130101
        ff040830 060101ff 02010030 70060355 1d200469 30673065 060b6086 480186f8
        45010717 03305630 2806082b 06010505 07020116 1c687474 70733a2f 2f777777
        2e766572 69736967 6e2e636f 6d2f6370 73302a06 082b0601 05050702 02301e1a
        1c687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406
        03551d1f 042d302b 3029a027 a0258623 68747470 3a2f2f63 726c2e76 65726973
        69676e2e 636f6d2f 70636133 2d67352e 63726c30 0e060355 1d0f0101 ff040403
        02010630 6d06082b 06010505 07010c04 61305fa1 5da05b30 59305730 55160969
        6d616765 2f676966 3021301f 30070605 2b0e0302 1a04148f e5d31a86 ac8d8e6b
        c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973
        69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30
        1b311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301d0603
        551d0e04 1604140d 445c1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355
        1d230418 30168014 7fd365a7 c2ddecbb f03009f3 4339fa02 af333133 300d0609
        2a864886 f70d0101 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80
        4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e
        b2227055 d9203340 3307c265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a
        6decd018 7d494aca 99c71928 a2bed877 24f78526 866d8705 404167d1 273aeddc
        481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16
        b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0
        5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8
        6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28
        6c2527b9 deb78458 c61f381e a4c4cb66
      quit
    crypto isakmp identity address
    crypto isakmp enable outside
    crypto isakmp policy 5
    authentication pre-share
    encryption des
    hash sha
    group 2
    lifetime 86400
    telnet timeout 5
    ssh timeout 5
    console timeout 0
    management-access voice
    dhcpd auto_config outside
    dhcpd address 192.168.3.5-192.168.3.36 inside
    dhcpd auto_config outside vpnclient-wins-override interface inside
    dhcpd enable inside
    dhcprelay timeout 60
    vpnclient server 109.224.18.242
    vpnclient mode network-extension-mode
    vpnclient nem-st-autoconnect
    vpnclient vpngroup MGvilla password *****
    vpnclient username rami password *****
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    group-policy GroupPolicy2 internal
    group-policy GroupPolicy2 attributes
    vpn-tunnel-protocol IPSec
    tunnel-group 195.112.215.19 type ipsec-l2l
    tunnel-group 195.112.215.19 ipsec-attributes
    pre-shared-key *****
    isakmp keepalive disable
    prompt hostname context
    call-home reporting anonymous
    Cryptochecksum:fde05056fe6d738c0b99552721973ac6
    : end
    ASA 5510
    Result of the command: "sh run"
    : Saved
    ASA Version 8.2(1)
    hostname ciscoasa
    domain-name Luna
    enable password 8Ry2YjIyt7RRXU24 encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    names
    name 195.112.215.17 Cyberiaip
    name 82.146.160.65 RouterCyberia
    name 10.1.15.6 test
    name 10.1.5.20 server
    name 10.2.3.0 VILLA
    dns-guard
    interface Ethernet0/0
    nameif Cyberia
    security-level 0
    ip address 195.112.215.19 255.255.255.240
    interface Ethernet0/1
    nameif ServerVpn
    security-level 100
    ip address 10.1.5.234 255.255.255.0
    interface Ethernet0/2
    nameif VPN
    security-level 100
    ip address 10.1.3.198 255.255.255.0
    interface Ethernet0/3
    nameif Inside2
    security-level 100
    ip address 192.168.0.1 255.255.255.0
    interface Management0/0
    nameif management
    security-level 100
    ip address 192.168.2.1 255.255.255.0
    management-only
    ftp mode passive
    clock timezone EEST 2
    clock summer-time EEDT recurring last Sun Mar 0:00 last Sun Oct 0:00
    dns domain-lookup Cyberia
    dns domain-lookup ServerVpn
    dns domain-lookup Inside2
    dns server-group Backup
    name-server 8.8.8.8
    dns server-group DefaultDNS
    name-server 4.2.2.2
    domain-name Luna
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object-group service DM_INLINE_SERVICE_1
    service-object ip
    service-object icmp echo-reply
    object-group service DM_INLINE_SERVICE_2
    service-object tcp
    service-object icmp
    service-object tcp eq h323
    service-object ip
    service-object icmp echo-reply
    object-group service DM_INLINE_SERVICE_3
    service-object ip
    service-object tcp
    service-object icmp echo-reply
    service-object tcp eq h323
    object-group service DM_INLINE_SERVICE_4
    service-object ip
    service-object tcp
    service-object icmp echo-reply
    service-object tcp eq h323
    object-group service DM_INLINE_SERVICE_5
    service-object ip
    service-object icmp
    service-object tcp
    service-object icmp echo-reply
    service-object tcp eq h323
    access-list MGVoice_splitTunnelAcl standard permit 10.1.3.0 255.255.255.0
    access-list Cyberia_access_in extended permit object-group DM_INLINE_SERVICE_3 VILLA 255.255.255.0 10.1.3.0 255.255.255.0
    access-list Cyberia_access_in extended permit object-group DM_INLINE_SERVICE_4 192.168.1.0 255.255.255.0 10.1.3.0 255.255.255.0
    access-list server_splitTunnelAcl standard permit 10.1.5.0 255.255.255.0
    access-list Guardia_access_in extended permit object-group DM_INLINE_SERVICE_1 any any
    access-list Accounting_access_in extended permit icmp any any echo-reply
    access-list Voice_nat0_outbound extended permit ip 10.1.3.0 255.255.255.0 10.1.3.192 255.255.255.192
    access-list Voice_nat0_outbound extended permit ip 10.1.3.0 255.255.255.0 any
    access-list Cyberia_1_cryptomap extended permit ip 10.1.3.0 255.255.255.0 VILLA 255.255.255.0
    access-list VPN_nat0_outbound extended permit object-group DM_INLINE_SERVICE_5 any any
    access-list VPN_nat0_outbound extended permit ip 10.1.3.0 255.255.255.0 192.168.1.0 255.255.255.0
    access-list VPN_nat0_outbound extended permit ip 10.1.3.0 255.255.255.0 VILLA 255.255.255.0
    access-list VPN_nat0_outbound extended permit ip 10.1.3.0 255.255.255.0 10.1.3.192 255.255.255.192
    access-list VPN_nat0_outbound extended permit ip 10.1.3.0 255.255.255.0 10.1.3.224 255.255.255.224
    access-list Voice_splitTunnelAcl_5 standard permit 10.1.3.0 255.255.255.0
    access-list MGserver_splitTunnelAcl standard permit 10.1.5.0 255.255.255.0
    access-list ServerVpn_nat0_outbound extended permit ip 10.1.5.0 255.255.255.0 10.1.5.192 255.255.255.192
    access-list ServerVpn_nat0_outbound extended permit ip any any
    access-list ServerVpn_nat0_outbound extended permit ip 10.1.5.0 255.255.255.0 10.1.5.240 255.255.255.240
    access-list test_splitTunnelAcl standard permit 10.1.5.0 255.255.255.0
    access-list mgvoice_splitTunnelAcl standard permit 10.1.3.0 255.255.255.0
    access-list VPN_access_in extended permit object-group DM_INLINE_SERVICE_2 any any
    access-list VPN_nat0_outbound_1 extended permit ip 10.1.3.0 255.255.255.0 192.168.1.0 255.255.255.0
    access-list VPN_nat0_outbound_1 extended permit ip 10.1.3.0 255.255.255.0 VILLA 255.255.255.0
    access-list Cyberia_cryptomap_20 extended permit ip 10.1.3.0 255.255.255.0 192.168.1.0 255.255.255.0
    access-list Cyberia_access_in_1 extended permit ip 192.168.1.0 255.255.255.0 any
    access-list Cyberia_access_in_1 extended permit ip VILLA 255.255.255.0 any
    pager lines 24
    logging enable
    logging asdm informational
    logging from-address [email protected]
    logging rate-limit 50 15 level 4
    mtu Cyberia 1500
    mtu ServerVpn 1500
    mtu VPN 1500
    mtu Inside2 1500
    mtu management 1500
    ip local pool Vocie 10.1.3.235-10.1.3.245 mask 255.255.255.0
    ip local pool test 10.1.5.241-10.1.5.254 mask 255.255.255.0
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    icmp permit any Cyberia
    icmp permit any VPN
    asdm history enable
    arp timeout 14400
    global (Cyberia) 1 interface
    nat (VPN) 0 access-list VPN_nat0_outbound_1
    access-group Cyberia_access_in_1 in interface Cyberia control-plane
    access-group Cyberia_access_in in interface Cyberia
    access-group VPN_access_in in interface VPN
    router rip
    route Cyberia 0.0.0.0 0.0.0.0 Cyberiaip 1
    route VPN 0.0.0.0 0.0.0.0 10.1.3.2 2
    route Cyberia 81.90.22.184 255.255.255.248 Cyberiaip 1
    route Cyberia 192.168.1.0 255.255.255.0 Cyberiaip 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-record DfltAccessPolicy
    http server enable
    http 192.168.2.0 255.255.255.0 management
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec transform-set ESP-AES128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ASA-IPSEC esp-des esp-sha-hmac
    crypto ipsec transform-set VILLA esp-des esp-sha-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec transform-set OFFICE esp-aes esp-sha-hmac
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map Cyberia_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map Cyberia_map1 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map Lunasat_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map MAP-OUTSIDE 1 match address Cyberia_1_cryptomap
    crypto map MAP-OUTSIDE 1 set pfs
    crypto map MAP-OUTSIDE 1 set peer 109.224.18.242
    crypto map MAP-OUTSIDE 1 set transform-set VILLA
    crypto map MAP-OUTSIDE 1 set security-association lifetime seconds 3600
    crypto map MAP-OUTSIDE 20 match address Cyberia_cryptomap_20
    crypto map MAP-OUTSIDE 20 set pfs
    crypto map MAP-OUTSIDE 20 set peer 81.90.22.188
    crypto map MAP-OUTSIDE 20 set transform-set VILLA
    crypto map MAP-OUTSIDE 20 set security-association lifetime seconds 3600
    crypto map MAP-OUTSIDE 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map MAP-OUTSIDE interface Cyberia
    crypto ca server
    shutdown
    smtp from-address [email protected]
    crypto isakmp identity address
    crypto isakmp enable Cyberia
    crypto isakmp policy 5
    authentication pre-share
    encryption des
    hash sha
    group 2
    lifetime 86400
    crypto isakmp policy 10
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 28800
    telnet timeout 5
    ssh timeout 5
    console timeout 0
    management-access VPN
    vpn load-balancing
    interface lbpublic Cyberia
    interface lbprivate ServerVpn
    threat-detection basic-threat
    threat-detection statistics port
    threat-detection statistics protocol
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    enable Cyberia
    enable VPN
    enable Inside2
    group-policy DfltGrpPolicy attributes
    vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn
    group-policy server internal
    group-policy server attributes
    dns-server value 4.2.2.2 8.8.8.8
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value server_splitTunnelAcl
    group-policy Voice internal
    group-policy Voice attributes
    dns-server value 4.2.2.2 8.8.8.8
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value Voice_splitTunnelAcl_5
    nem enable
    client-firewall none
    group-policy MGserver internal
    group-policy MGserver attributes
    dns-server value 4.2.2.2 8.2.2.2
    vpn-tunnel-protocol IPSec l2tp-ipsec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value MGserver_splitTunnelAcl
    group-policy MGVoice internal
    group-policy MGVoice attributes
    dns-server value 4.2.2.2 8.8.8.8
    vpn-tunnel-protocol IPSec l2tp-ipsec svc
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value MGVoice_splitTunnelAcl
    group-policy mgvoice internal
    group-policy mgvoice attributes
    dns-server value 4.2.2.2 8.8.8.8
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value mgvoice_splitTunnelAcl
    username test password k83iXWPan0Gg1s04 encrypted privilege 0
    username test attributes
    vpn-group-policy Voice
    username guardiairaq password espwxXvOvtn.9lWp encrypted privilege 0
    username guardiairaq attributes
    vpn-group-policy server
    username George password Z/rrvuow9WD495rt encrypted privilege 0
    username George attributes
    vpn-group-policy Voice
    username Mohammad password WeG4Vh8yUivCpxGJ encrypted privilege 0
    username Mohammad attributes
    vpn-group-policy Voice
    username MohammadD password WeG4Vh8yUivCpxGJ encrypted privilege 0
    username MohammadD attributes
    vpn-group-policy server
    username Rami password Ap6uwufXoaDJPqK5 encrypted privilege 0
    username Rami attributes
    vpn-group-policy Voice
    username Ziad password JhgChsUSmHfac4nL encrypted privilege 0
    username Ziad attributes
    vpn-group-policy Voice
    username Rabih password spWUrnXW1ECf5.vf encrypted privilege 0
    username Rabih attributes
    vpn-group-policy Voice
    username Bassam password Us/9IhMANcKhz/ab encrypted privilege 0
    username Bassam attributes
    vpn-group-policy Voice
    username Peter password DqbletTihLO7nNEm encrypted privilege 0
    username Peter attributes
    vpn-group-policy Voice
    username server password vfxKzw279fclgSJI encrypted privilege 0
    username server attributes
    vpn-group-policy server
    username Walid password APoN6.aEe2870Ndh encrypted privilege 0
    username Walid attributes
    vpn-group-policy Voice
    username Walidserver password APoN6.aEe2870Ndh encrypted privilege 0
    username Walidserver attributes
    vpn-group-policy server
    username bernard password V/Fqxj2ERUtY84vU encrypted privilege 0
    username bernard attributes
    vpn-group-policy Voice
    username Vanity password 8v6Sr1IM6EXcsg20 encrypted privilege 0
    username Vanity attributes
    vpn-group-policy server
    username Hani password 0FhVusN7CyzoUnZ9 encrypted privilege 0
    username Hani attributes
    vpn-group-policy Voice
    username Ahmad password 1Vqu92EEjwYw4N.6 encrypted privilege 0
    username Ahmad attributes
    vpn-group-policy Voice
    username Elias password FEvweu59nheZBOqM encrypted privilege 0
    username Elias attributes
    vpn-group-policy Voice
    username Elie password Dm9wg5M.rlquePYM encrypted privilege 0
    username Elie attributes
    vpn-group-policy Voice
    username Charles password 0mvBLjD9oOlpXvWM encrypted privilege 0
    username Charles attributes
    vpn-group-policy Voice
    username Tony password k1lDmGM/jEHSwgiu encrypted privilege 0
    username Tony attributes
    vpn-group-policy Voice
    username Chadi password x4YJISOa3GY9pG0r encrypted privilege 0
    username Chadi attributes
    vpn-group-policy Voice
    username tonyb password sUb7eW6f55MDItCG encrypted privilege 0
    username tonyb attributes
    vpn-group-policy Voice
    username Tino password onkxSs5qbJYmlepW encrypted privilege 0
    username Tino attributes
    vpn-group-policy server
    username Rony password 37Hk2MJVRsiTwC11 encrypted privilege 0
    username Rony attributes
    vpn-group-policy Voice
    username AliA password 4T3JfuTi1E0msmx4 encrypted privilege 0
    username AliA attributes
    vpn-group-policy Voice
    username RonyG password 37Hk2MJVRsiTwC11 encrypted privilege 0
    username RonyG attributes
    vpn-group-policy server
    username Aldo password Cq/XUHIHnvc9Ke1x encrypted privilege 0
    username Aldo attributes
    vpn-group-policy Voice
    username Antoine password rJ4Y1txcY1fuURtk encrypted privilege 0
    username Antoine attributes
    vpn-group-policy Voice
    tunnel-group DefaultL2LGroup ipsec-attributes
    isakmp keepalive disable
    tunnel-group MGVoice type remote-access
    tunnel-group MGVoice general-attributes
    address-pool Vocie
    default-group-policy MGVoice
    tunnel-group MGVoice ipsec-attributes
    pre-shared-key *
    tunnel-group server type remote-access
    tunnel-group server general-attributes
    address-pool test
    default-group-policy server
    tunnel-group server ipsec-attributes
    pre-shared-key *
    tunnel-group mgvoice type remote-access
    tunnel-group mgvoice general-attributes
    address-pool Vocie
    default-group-policy mgvoice
    tunnel-group mgvoice ipsec-attributes
    pre-shared-key *
    tunnel-group 109.224.18.242 type ipsec-l2l
    tunnel-group 109.224.18.242 ipsec-attributes
    pre-shared-key *
    isakmp keepalive disable
    tunnel-group 81.90.22.188 type ipsec-l2l
    tunnel-group 81.90.22.188 ipsec-attributes
    pre-shared-key *
    isakmp keepalive disable
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum 512
    policy-map type inspect im MSNBlock
    parameters
    match service chat conference file-transfer games voice-chat webcam
      drop-connection log
    prompt hostname context
    Cryptochecksum:772d567a5ee1458daec08caad6009da9
    : end

    I have added the permit any any on the outside and vpn interfaces of both ASAs. I also change the source and destination of the nat exempt rule to any any.

  • ARD not finding any computers on local network scan

    I've installed ARD 3.2.2 on a g5 xserv and when I use the scanner to scan the local network I find no computers. If I change to Bonjour, network address, or network range I can find computers. My xserv has the nics teamed through hp procurve managed switches. ARD 3.2.1 worked fine on this box when it was 10.4.11 but I'm not sure if the nics were teamed. Has anyone else found similar behavior with teamed nics or is this an ARD 3.2.2 problem?

    I forgot to mention that I'm also running a different copy of ARD 3.2.2 on my macbook pro and the scanning the local network returns all the computers on our network. The xserv in question is setup to be a task server but still shows the problem without being a task server.

  • Unable to connect to Windows computers on local network

    We have several Windows XP computers on our local network. Some have shared folders, that we can upload/download files to/from. 
    Connecting to these Windows computers was no problem under Snow Leopard, but under Lion I cannot connect to any of them.
    The shared computers show up in the Finder. I can see them in the sidebar, under the "SHARED" items. But I cannot connect to them.
    If I select a computer to connect to, the Finder pops up the following error:
    There was a problem connecting to the server "name".
    The server may not exist or it is unavailable at this time. Check the server name or IP address, check your network connection, and then try again.
    Also, I get the following error message in the system.log
    Finder: SharePointBrowser::handleOpenCallBack returned 57

    Unfortunately it does not work for me.
    I can see the server in the Finder under the "Shared" list.
    If I click on the server, the Finder gives me the error message I mentioned above. If I click "Connect to server" button nothing happens, but I get the same error message in the system.log. If I select the "Connect to Server" option from the "Go" menu I get the same errors. So I still cannot connect.

  • Applescript to shutdown computers over local network

    Hey guys!
    I'm looking for a way to automate shutdown of 2 macs over a local network from a remote mac. I'm currently doing this by screen sharing in and shutting down both macs manually.
    I have this untested theory that I could use my very basic knowledge of apple script to create a shutdown script on each mac and use an alias on the remote mac to run the script. However I am sure there is a much better way of doing this, I'm just lacking the know how! The script I want would ideally do as follows.
    Run script from remote to Mac 1 and Mac 2 over network
    Quit all running applications on Mac 1 and Mac 2
    Shut down Mac 1 and Mac 2 in 5 minutes
    If any one could help me imporve my laziness my giving me some pointers on this or even letting me know if its possible it would greatly appreciated!
    Thanks!
    C

    Introduction:
    I have tried a few things over my local network. My attempt to run a remote AppleScript nearly shutdown the Mac I was activating it from. There are probably ways around this but I decided to try something else.
    The following is a very stable solution once you have got it working. Each Mac to be shut down watches a folder called shut-down and if its contents change the Mac shuts down in one minute.
    I am sure this can be improved upon.
    Let me know how you get on.
    Permissions:
    It is simple to do all this as root user as described below but without 'with administrator privileges' at the end of the AppleScript.
    If doing it as admin use the AppleScript as below. The plist may need permissions set to root wheel.
    The shut-down folder will need appropriate sharing permissions.
    Create plist etc:
    open TextEdit
    create a new document
    set TextEdit format to plain text
    copy plist contents below
    paste into the TextEdit document
    save as shut-down.plist
    put document in folder /Library/LaunchAgents on each Mac to be shut down
    create folders entitled shut-down at the root of Macs to be shut down
    run launch AppleScript below on each Mac to be shut down
    Future changes to the shut-down folder's contents will shut down the Mac.
    Contents of shut-down.plist:
    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN"
    "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
              <key>Label</key>
              <string>shut-down</string>
              <key>ProgramArguments</key>
              <array>
                        <string>shutdown</string>
                        <string>-h</string>
                        <string>+1</string>
              </array>
              <key>WatchPaths</key>
              <array>
                        <string>/shut-down</string>
              </array>
    </dict>
    </plist>
    Launch AppleScript:
    Put the following on one line;
    do shell script "launchctl unload -w /Library/LaunchAgents/shut-down.plist;  launchctl load -w /Library/LaunchAgents/shut-down.plist" with administrator privileges

  • Show IP Addresses of Computers on Local Network

    Is there a handy terminal command that can show this data for me? Iptraf can show hardward addresses, but I am looking for IPs

    $ nmap 192.168.1.0/24
    Starting Nmap 5.21 ( http://nmap.org ) at 2010-10-14 22:09 ART
    Nmap scan report for 192.168.1.1
    Host is up (0.0075s latency).
    Not shown: 995 filtered ports
    PORT STATE SERVICE
    20/tcp closed ftp-data
    21/tcp closed ftp
    23/tcp closed telnet
    80/tcp open http
    113/tcp closed auth
    Nmap scan report for 192.168.1.2
    Host is up (0.00056s latency).
    Not shown: 995 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    80/tcp open http
    111/tcp open rpcbind
    2049/tcp open nfs
    3306/tcp open mysql
    Nmap done: 256 IP addresses (2 hosts up) scanned in 11.51 seconds
    This is quite handy

  • [Newbie] FMS not visible in local network

    Hi,
    I have a problem with FMS 3.5 installed on Windows 7. The problem is that FMS works only on my local machine, I am not able to use it from computers in local network. I turned off all windows firewalls and my machine is visible for other computers - I am able to connect to FMS Welcome site on apache on default port 8134, but streaming fails, and I cannot do the same on port 80. Any help appreciated...

    From fms.ini:
    # IP address and port(s) Flash Media Server should listen on
    # For example:
    #    ADAPTOR.HOSTPORT = :1935,80
    ADAPTOR.HOSTPORT = :1935,80
    # IP (address and) port that Flash Media Server should proxy
    # unknown HTTP requests to. Leave empty to disable proxying.
    # With no address, specifies a localhost port.
    # For example:
    #    HTTPPROXY.HOST = webfarm.example.com:80
    HTTPPROXY.HOST = :8134
    So I believe it is...
    What can I do if connections are not reaching FMS?

  • Can't find computers or drives on local network

    I cannot find any networked computers or harddrives on my local network. I can connect to the internet through my timecapsule, but I cannot access it or any of the other computers (all macs) in the house, either wirelessly or wired. They do not show up under "Network" in finder nor can I ping them.
    The other computers successfully find and mount each other, the timecapsule, and my computer.
    I recently put in new ram; could this be the culprit?
    How do I fix this??
    Thank you very much!

    upgraded to snow-leopard

  • I installed Mountain Lion on my iMac. Now I cannot access the Internet. All the other computers and tablets have no problem. I did PRAM and MC reset, modem reset, etc., all the usual ju-ju. I also cannot connect on my local network to any other computer.

    I installed Mountain Lion on my iMac. Now I cannot access the Internet. All the other computers and tablets on the network have no problem. I did PRAM and MC reset, modem reset, etc., all the usual ju-ju. I also cannot connect on my local network to any other computer. Yet Network control panel says I am connect to the modem, and Network Diagnosis says I am connected to the Internet. It's like the blind man who has eyes that cannot see. BTW, I am not some newbee. I have been a Machead since the early nineties and set up a half dozen networks, including the one I am using at home to which the iMac mysteriously is there but not. This has me stumped! I am considering going back to 10.7!

    Select  ▹ System Preferences ▹ Network ▹ Advanced ▹ TCP/IP. What values are shown for the following:
    Configure IPv4
    IPv4 Address
    Subnet Mask
    Router

  • How do I easily connect to other computers on my local network?

    Tiger was easy, Leopard has many confusing options that aren't clear to non-tech people.
    I have 5 other computers on my local network. 3 are Leopard, One is Tiger and one is Panther.
    All machines are password protected at startup.
    Trying to configure my Leopard machines to be able to access each machine's hard drive with just a password input. Was easy in Tiger. Only Tiger and Panther machines can talk to each other now.
    Confused by drop boxes, etc. (don't want)
    Any FAQs on this?
    Want Panther and Tiger machines to access Leopard (so needs to work both ways).
    A simple shortcut would be super!
    Message was edited by: Kurt Triffet

    on the LAN, from apple to apple, and assuming you trust the other users on your LAN, I would recommend afp for file sharing over smb or ftp. Users' accounts have the permissions set up so others can connect directly to their Public folder (for read access - drag and drop copy a file) and to their Drop Box (in their public folder) (for write access - drag and drop a file) by mounting target computer icon on desktop as if an external or second hard drive, at least as far back as Panther and I think even Jaguar. Can't say for earlier than that -- don't remember anymore.
    You need to turn on file sharing in the Sys Prefs on the computer being accessed. smb and afp had their own sharing checkboxes in Tigger's and Panther's Sys Prefs Sharing Services (called personal file sharing and windows sharing, as I recall); in Leo, they are in Sys Prefs Sharing File Sharing Options. "Full access" to non-privileged user accounts is done by username/password. Absolute full access to the entire computer requires afp login as admin user on the target computer. To get there in either case, in the Finder, it's Go Connect to Server ⌘k then afp://{target computer name or IP address} or Go Network ⇧⌘k and double click.
    Remote keyboard/screen access is relatively easy, too -- more so with Leopard than with prior OSs. Won't delve into that here coz' I didn't think you were so interested in that, but can post additional info if desired.

  • Ping to local domain works but ping to server name dont work from local network PC

    Hi
    I have done a fresh install of the Windows Server 2012 R2 and installed Essentials Experience role to it.
    My problem is that I cannot ping server name from PC in the local network. I can ping local domain name (domain.local).
    When I try to ping local domain in the server, it resolutes ok and gives server IPv4 IP but when I ping server name in the server, it gives me IPv6 IP ::1: which I understand to be IPv6 loopback IP. I dont know if this has anything to do with the pinging
    problem from the PC.
    I had earlier the same server configuration and this earlier server gives IPv4 IP when server name is pinged from the server itself.
    How to get PC to ping server name so that I could use http://servername/connect??
    Thanks in advance!

    Hi,
    Have you set firewall to allow incoming ICMP Echo messages ?
    By default, Windows Firewall does not allow incoming ICMP Echo messages, and therefore the computer cannot send an ICMP Echo Reply in response.
    You may like to refer to the article below to check if it worked:
    Nobody Can Ping My Computer
    http://technet.microsoft.com/en-us/library/cc749323(WS.10).aspx
    In addition, please also provide us the output of ipconfig /all on each side of these machines for further research.
    Hope it helps.
    Best Regards,
    Andy Qi
    Andy Qi
    TechNet Community Support

  • Sharing library on local network not showing on all computers

    I am unable to see my shared music folder in iTunes for the music on the home server on a local network from my laptop. It shows fine on my wife's laptop but not on mine. I can't see the remote speakers either. All the settings in iTunes are correct for sharing and for look for shared music and I have access to the files on the network from my laptop when I browse network places. When I first installed it worked fine on my machine but then it stopped. I can't figure out why. I also tried with the firewall off but did not help either.
    Any ideas why it would stop working, but still work on other PCs on the network. I have a total of 3 pcs on the network plus the server.

    I have the same problem with a new laptop running Vista. All three of my XP computers that run ITunes can see the shared network drive on my server. ITunes on the Vista computer doesn't see any shared network folders, even though I can open them in Vista. Even tried a shortcut the network folder on the desktop. Zip. I've seen dozens of posts about this problem and no answers from Apple... and people complain about Microsoft software... sigh.

  • E3000: RE networking with other computers on the local network

    Successfully installed an E3000 (internet and printer work) but cannot see other computers on my local network which are wired into the router, including my server.. I have read a bunch of messages but cannot find an answer. Thank you in advance

    Usually when windows 7 computers are on the same LAN, they'll automatically tell you if another computer has already setup a homegroup. After making sure that upnp was kept enabled, delete any homegroups in all of the computers, then make a homegroup on one of the computers. When you go to create a homegroup on the other computers, they should tell you that one has already been created by another computer and to join that one. Here's an article for reference http://windows.microsoft.com/en-US/windows7/help/home-sweet-homegroup-networking-the-easy-way#sectio...
    I don't work for Cisco. I'm just here to help.

  • How can I get the host adresses of all computers in a local network

    I want to learn that how can I do this with java?
    I have a solution as iterating and checking with InetAdress.getHost("iteratedhost"), if no exception such host is reachable.
    But I search for better solutions

    MulticastSocket is a good option as I shortly
    evaluated.
    ThanksThis does not allow you to find all the IP address of
    all computers on a network. It will enable you to
    send information to any computer that is a member of
    a particular IP Multicast Group.He doesn't seem to really need to know all the IP addresses. He just seems to want to "find" a server. Looks like MulticastSocket is kinda for that purpose, broadcasting a message out for someone to respond to. That response could be: "I'm the server you want - my IP address is x.y.z.a". Then he would use a normal Socket to bind to that guy. Maybe it's a good solution, maybe not. Just giving him a possible route. MulticastSocket must be good for something.

  • [Solved] Ping local network timeout 2 times every 20 reply

    I just install Windows 8.1 Pro and my internet very slow then I try ping my router and get this result:
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time=1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Request timed out.
    Request timed out.
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time=28ms TTL=128
    Reply from 192.168.1.1: bytes=32 time=335ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Request timed out.
    Request timed out.
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    Reply from 192.168.1.1: bytes=32 time<1ms TTL=128
    I've tried:
    1) boot into Linux and ping router - 0% loss
    2) plug Wireless USB into computer, disable wired network then ping router - 0% loss
    3) ping router via wired network by other Windows 8.1 laptop - same problem
    4) flash dns and reset winsock not work
    Thank you
    Solved by change MTU
    netsh interface ipv4 set subinterface "Ethernet" mtu=1492 store=persistent

    Hi,
    Glad to see your problem resolved, Hope your experience was helpful with others.
    Roger Lu
    TechNet Community Support

Maybe you are looking for

  • N+1 High Availability Firewall requirements

    I am deploying a 5508 in one DC and another 5508 in another DC running the HA-SKU license Does anyone know what ports need to be opened for communication between these two controllers? Thanks Roger

  • How to get bar plot stacked in one graph?

    Hi there, I am having a problem trying to get a stacked bar plot in one graph. I attached two images to show you what it looks like now and how I would like it to look. At the moment I am making two x,y clusters, bundle these into an array and give t

  • Total newbie needs help installing and setting up Solaris 10 as a server

    i'm attempting to set up one computer to act as a file and print server on my home network, so that i can store all of my music and video files on it instead and print to my parallel-only laser printer. 80% of the time i'm using my laptop, so i need

  • MS SQL Migration to Oracle

    I'm having all sorts of trouble. Using the SQL Developer, I can make connections to both databases (my newly created Oracle one and the old MS SQL one) but when I try to create a Migration Repository it fails with the message: "Script execution faile

  • Error in Uploading Resume in Candidate Gateway - HCM 9.0

    Hi, When I try to upload resume through careers page in candidate gateway, I'm receiving the bleow error: 'Your Resume could not be parsed at this time.' I'm not using any resume extractor. I found that I'm receiving this error because of &joB64 = Cr