WRT54G no internet default gateway

My WRT54G was working fine until my TiVo couldn't find my router anymore.  I got the message "Unable to locate gateway".  I logged onto 192.168.1.1 and my internet default gateway was 0.0.0.0.  I have reset the router many times, but the gateway address still doesn't come up.

The Internet Ip address depends on the Service Provider you are getting ....
So if you are using Cable Connection try this ...
 Access the setup page of the router by launching an
Browser and type on the address bar, 192.168.1.1 and press enter. When
it prompts for the username and password, leave the username field
empty and provide password as "admin" (Without quotes)
click on ok.
On the main setup page the ""Internet Connection Type"" should be
on ""Obtain IP Automatically - DHCP “. Click on the Save Settings
button.
Now click on the sub tab ""MAC address clone"".
- Click on enable
Click Clone & click save settings
Check WAN Ip on Status page of router ....
If getting Valid Ip .... try going online
If not ... power cycle for 4-5 minutes & then again check the WAN Ip address .....

Similar Messages

  • Wrt54g router v 8.2 -no default gateway

    i have tried everything and this routher will not work!  I travel with it when i come home for the holidays and normaly i have to get some help from someone to figure out how to get the cpu to work along with the wireless.  at this point nothing is working.  the modem is a westell mo. 6100. all the lights are working and when i plug my laptop into the ethernet cord it works fine.    when the modem is pluged into the router and the ethernet cord is pluged from port one to the back of the cpu   the cpu says there is an issue with its ip address being the same as something elses.  the wireless ssid pops up and i can connect to it with my macbook but the internet does not work at all. I can connect to the router through 192.168.1.1 and have security setup etc.  imy mac address shows up in the dhcp clients list....  in the status tab everything looks normal except the default gateway is  all zeros.
    anybody have any idea what is happening?
    i would like to be able to get the net on the cpu as well as wireless at the same time but if i could just get the wireless to atleast work that would be great
    Solved!
    Go to Solution.

    If you are not able to see any Default gateway under the Status Tab, Because your Modem and Router Shares the Same IP address on the Network.... To make your Computers go Online from the Linksys Router... Login to the Linksys Router setup page and below the setup tab change the "Local IP address" to 192.168.2.1 and click on Save Settings... and then you need to Power Cycle your Network.....
    Unplug the Power from the Router and and Modem, wait for 30sec and then first plug the power to your Modem and once all the lights are lid on your Modem, then you can plug the power to the Linksys Router.. 
    Now check if you are able to go online from your computer Hardwired to the router. 

  • Wrt54g default gateway setting

    I am looking to use my wrt54g router with my FIOS and Actiontec router/modem. Both use the same default gateway. How do I change the default gateway on my wrt54g from 192.168.1.1 to 192.168.1.0?
    When I open up this address with IE and the Linksys setup pages come up there is no place to change the default gateway. Any suggestions?
    thank you in advance
    John

    Are you trying to change the IP of your router?  If so, that should be on the first page that comes up when you login to the router.  I'm confused by you saying that you want to change the "default gateway."

  • Computers connecting to internet via time capsule are reporting no internet connectivity.  PC is reporting default gateway has changed.  How to I correct this?

    Am having trouble with maintaining a stable wireless network via the Time Capsule.  Am running 1 Mac and 3 PC on a Time Capsule wireless in bridge mode connected to a Verizon wireless router.  Verizon wireless is turned off and the Time Capsule seems to be staying connected to the Verizon router.  When any of the connected computerss goes to stanby, they often report the internet is no longer available.  The PCs say the default gateway has changed ans the Mac simply reports the network parameters have changed.  What do I need to do to the Time Capsule to stabilize the wireless network?

    It is unlikely that the gateway changes.. but anything is possible.. sorry I am not in the US.. is your service adsl or cable?? What sort of lease time does the public IP have? Some cable companies now rotate then on the hour I noticed.. others on about 3months.. but most it is one day.
    Track it yourself.. see what gateway address the TC gets and if it is rotating with the IP.
    If your client computers are running Mountain Lion.. the plain fact is, they are not particularly stable.
    Wireless is worst.. ethernet tends to be ok.. but for instance Laptops updated to Mountain Lion can be pretty flakey.. with the TC.. and it is the combo that is more the issue. People report improvement with clean install of ML. BUT there is still a bug there that causes the ML to be less than fantastic.
    I experience it occasionally even with a dlink wireless router.. after a wake from sleep.. the network will drop out and need to be manually connected back.. I have to admit I expect no better from Mountain Lion. I could load Snow Leopard on it and it would drop once every blue moon.. but I got the laptop with ML so I live with it.. !!

  • The Default Gateway Is Not Available / Problem

    Hello, I recently purchased this HP Pavileon laptop, and I've been encountering this problem very often (every 2-10 minutes).  This problem is getting extremely frustrating as absolutely nobody has been able to provide a fix for this issue.
    When the laptop is on battery mode (this does not happen when plugged in); I commonly get disconnected from my wi-fi connection and to fix it, I must run the troubleshooter. This temporarily fixes the issue by resetting the wi-fi adapter.
    What I have tried and has not worked:
    * Turn off to save power option in the driver settings (in Device Manager) untickets
    * Updated drivers
    * New power plan
    * Tried different drivers
    * Complete system restore
    The wireless adapter is Realtek RTL 8188EE.  Upon running the troubleshooter, this is all the information from the detailed information section:
    Windows Network Diagnostics
    Publisher details
    Issues foundThe default gateway is not available
    The default gateway is not availableThe default gateway is a device that connects a local network or computer to the Internet. A broadband modem or router is usually the default gateway.
    Fixed
    Reset the "WiFi" adapter
    Completed
    Investigate router or broadband modem issues
    Not run
    Issues found
    Detection details
    6The default gateway is not availableFixed
    The default gateway is a device that connects a local network or computer to the Internet. A broadband modem or router is usually the default gateway.
    Reset the "WiFi" adapterCompleted
    This can sometimes resolve an intermittent problem.
    Network Diagnostics LogFile Name: 2D0FE1F0-C2C2-43B5-A857-2D2B3C4B8A51.Repair.1.etl Investigate router or broadband modem issuesNot run
    If you're connected to a hotspot or domain network, contact the network administrator. Otherwise: 1. Unplug or turn off the device. 2. Once all the lights on the device are off, wait at least 10 seconds. 3. Turn the device on or plug it back in to the power outlet. To restart a router or modem that has a built-in battery, press and quickly release the Reset button.
    Detection details
    Diagnostics Information (Network Adapter)
    Details about network adapter diagnosis:
    Network adapter WiFi driver information:
    Description . . . . . . . . . . : Realtek RTL8188EE 802.11b/g/n Wi-Fi Adapter
    Manufacturer . . . . . . . . . : Realtek Semiconductor Corp.
    Provider . . . . . . . . . . . : Realtek Semiconductor Corp.
    Version . . . . . . . . . . . : 2012.2.827.2013
    Inf File Name . . . . . . . . . : C:\WINDOWS\INF\oem8.inf
    Inf File Date . . . . . . . . . : 12 September 2013 10:17:00
    Section Name . . . . . . . . . : HP8188ee.ndi
    Hardware ID . . . . . . . . . . : pci\ven_10ec&dev_8179&subsys_197d103c
    Instance Status Flags . . . . . : 0x180200a
    Device Manager Status Code . . : 0
    IfType . . . . . . . . . . . . : 71
    Physical Media Type . . . . . . : 9
    Diagnostics Information (Wireless Connectivity)
    Details about wireless connectivity diagnosis:
    Information for connection being diagnosed
    Interface GUID: 7c04789b-0b43-472c-abd6-a84cb31e9053
    Interface name: Realtek RTL8188EE 802.11b/g/n Wi-Fi Adapter
    Interface type: Native WiFi
    Connection incident diagnosed
    Auto Configuration ID: 1
    Connection ID: 1
    Connection status summary
    Connection started at: 2014-07-24 04:19:49-759
    Profile match: Success
    Pre-Association: Success
    Association: Success
    Security and Authentication: Success
    List of visible access point(s): 0 item(s) total, 0 item(s) displayed
    Connection History
    Information for Auto Configuration ID 1
    List of visible networks: 1 item(s) total, 1 item(s) displayed
    BSS Type PHY Security Signal(RSSI) Compatible SSID
    Infra <unknown> Yes 100 Yes Matt
    List of preferred networks: 1 item(s)
    Profile: Matt
    SSID: Matt
    SSID length: 4
    Connection mode: Infra
    Security: Yes
    Set by group policy: No
    Connect even if network is not broadcasting: No
    Connectable: Yes
    Information for Connection ID 1
    Connection started at: 2014-07-24 04:19:49-759
    Auto Configuration ID: 1
    Profile: Matt
    SSID: Matt
    SSID length: 4
    Connection mode: Infra
    Security: Yes
    Pre-Association and Association
    Connectivity settings provided by hardware manufacturer (IHV): No
    Security settings provided by hardware manufacturer (IHV): No
    Profile matches network requirements: Success
    Pre-association status: Success
    Association status: Success
    Last AP: 98-fc-11-88-61-b8
    Security and Authentication
    Configured security type: WPA2-PSK
    Configured encryption type: CCMP(AES)
    802.1X protocol: No
    Key exchange initiated: Yes
    Unicast key received: Yes
    Multicast key received: Yes
    Number of security packets received: 0
    Number of security packets sent: 0
    Security attempt status: Success
    Connectivity
    Packet statistics
    Ndis Rx: 34302
    Ndis Tx: 32619
    Unicast decrypt success: 0
    Multicast decrypt success: 0
    Unicast decrypt failure: 0
    Multicast decrypt failure: 0
    Rx success: 0
    Rx failure: 0
    Tx success: 0
    Tx failure: 0
    Tx retry: 0
    Tx multiple retry: 0
    Tx max lifetime exceeded: 0
    Tx ACK failure: 0
    Roaming history: 0 item(s)
    Diagnostics Information (Wireless Connectivity)
    Details about wireless connectivity diagnosis:
    For complete information about this session see the wireless connectivity information event.
    Helper Class: Auto Configuration
    Initialise status: Success
    Information for connection being diagnosed
    Interface GUID: 7c04789b-0b43-472c-abd6-a84cb31e9053
    Interface name: Realtek RTL8188EE 802.11b/g/n Wi-Fi Adapter
    Interface type: Native WiFi
    Result of diagnosis: There may be problem
    Diagnostics Information (Wireless Network Adapter)
    Details about wireless network adapter diagnosis:
    For complete information about this session see the wireless connectivity information event.
    Helper Class: Native WiFi MSM
    Initialise status: Success
    Information for connection being diagnosed
    Interface GUID: 7c04789b-0b43-472c-abd6-a84cb31e9053
    Interface name: Realtek RTL8188EE 802.11b/g/n Wi-Fi Adapter
    Interface type: Native WiFi
    Profile: Matt
    SSID: Matt
    SSID length: 4
    Connection mode: Infra
    Security: Yes
    Connect even if network is not broadcasting: No
    Result of diagnosis: There may be problem
    Network Diagnostics LogFile Name: 2D0FE1F0-C2C2-43B5-A857-2D2B3C4B8A51.Diagnose.0.et​l
    Other Networking Configuration and LogsFile Name: NetworkConfiguration.cab Collection information Computer Name: LAPTOP Windows Version:6.3Architecture:x64Time:24 July 2014 04:34:47
    Windows Network Diagnostics Detects problems with network connectivity. Package Version:1.0Publisher:Microsoft Windows

    Run the HP Support Asssitant's Tune up application. There should be a new BIOS available. sp66866
    Have you installed the latest Windows 8.1 updates?
    Do not install optional video graphics updates.
    I was runnning into a similar problem with my HP product loan Envy Spectre 13 TouchSmart Ultrabook until I did the updates. I had upgraded my wireless router to a model with 802.11AC specification.
    Invoke the Device Manager and ensure that the box next to Allow this computer to turn off this device to save power is unchecked.
    ****Please click on Accept As Solution if a suggestion solves your problem. It helps others facing the same problem to find a solution easily****
    2015 Microsoft MVP - Windows Experience Consumer

  • Default Gateway when connected to VPN

    Thanks for reading!
    This is probably a dump question so bear with me...
    I have set up a VPN connection with a Cisco ASA 5505 fronting internet, with the customers environment behind it (on the same subnet), When connected ot the VPN I can reach the inside Router fronting me and one switch behind the Router (every switch is connected to the router), but nothing else.
    My beet is that the Router is messing with my connection, but,, nevermind that!, the setup ain't complete anyway... my question is more related to the Gateway I'm missing when I'm, from the outside, is connected to the VPN on the ASA, could this mess it up? Shouldn't I have a Standard-Gateway in the ipconfig settings in windows?
    This is who it looks like now:
            Anslutningsspecifika DNS-suffix . : VPNOFFICE
            IP-adress . . . . . . . . . . . . : 10.10.10.1
            Nätmask . . . . . . . . . . . . . : 255.255.255.0
            Standard-gateway  . . . . . . . . :
    The internal network is :
    172.16.12.0 255.255.255.0
    Below is my config for the ASA, thanks a lot!!!!!!!
    !FlASH PÅ ROUTERN FRÅN BÖRJAN
    !asa841-k8.bin
    hostname DRAKENSBERG
    domain-name default.domain.invalid
    enable password XXXXXXX
    names
    interface Vlan1
    nameif inside
    security-level 100
    ip address 172.16.12.4 255.255.255.0
    interface Vlan10
    nameif outside
    security-level 0
    ip address 97.XX.XX.20 255.255.255.248
    interface Ethernet0/0
    switchport access vlan 10
    interface Ethernet0/1
    interface Ethernet0/2
    interface Ethernet0/3
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    ftp mode passive
    clock timezone CEST 1
    clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
    dns server-group DefaultDNS
    domain-name default.domain.invalid
    object-group protocol TCPUDP
    protocol-object udp
    protocol-object tcp
    access-list nonat extended permit ip 172.16.12.0 255.255.255.0 10.10.10.0 255.255.255.0
    access-list MSS_EXCEEDED_ACL extended permit tcp any any
    access-list VPN-SPLIT-TUNNEL remark VPN SPLIT TUNNEL
    access-list VPN-SPLIT-TUNNEL standard permit 172.16.12.0 255.255.255.0
    tcp-map MSS-MAP
      exceed-mss allow
    pager lines 24
    logging enable
    logging timestamp
    logging buffer-size 8192
    logging console notifications
    logging buffered notifications
    logging asdm notifications
    mtu inside 1500
    mtu outside 1500
    ip local pool VPN 10.10.10.1-10.10.10.40 mask 255.255.255.0
    icmp unreachable rate-limit 1 burst-size 1
    icmp permit any inside
    icmp permit any outside
    asdm image disk0:/asdm-625-53.bin
    no asdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 0 access-list nonat
    nat (inside) 1 172.16.12.0 255.255.255.0
    route outside 0.0.0.0 0.0.0.0 97.XX.XX.17 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout uauth 0:05:00 absolute
    dynamic-access-policy-record DfltAccessPolicy
    aaa authentication ssh console LOCAL
    http server enable
    http 172.16.12.0 255.255.255.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outside_map interface outside
    crypto isakmp enable outside
    crypto isakmp policy 10
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    crypto isakmp policy 65535
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    telnet timeout 5
    ssh 172.16.12.0 255.255.255.0 inside
    ssh timeout 5
    console timeout 0
    threat-detection basic-threat
    threat-detection statistics access-list
    group-policy VPNOFFICE internal
    group-policy VPNOFFICE attributes
    dns-server value 215.122.145.18
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value VPN-SPLIT-TUNNEL
    default-domain value VPNOFFICE
    split-dns value 215.122.145.18
    msie-proxy method no-proxy
    username admin password XXXXXX privilege 15
    username Daniel password XXXXX privilege 0
    username Daniel attributes
    vpn-group-policy VPNOFFICE
    tunnel-group VPNOFFICE type remote-access
    tunnel-group VPNOFFICE general-attributes
    address-pool VPN
    default-group-policy VPNOFFICE
    tunnel-group VPNOFFICE ipsec-attributes
    pre-shared-key XXXXXXXXXX
    class-map MSS_EXCEEDED_MAP
    match access-list MSS_EXCEEDED_ACL
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect netbios
      inspect rsh
      inspect rtsp
      inspect skinny 
      inspect esmtp
      inspect sqlnet
      inspect sunrpc
      inspect tftp
      inspect sip 
      inspect xdmcp
      inspect icmp error
      inspect pptp
      inspect ipsec-pass-thru
      inspect icmp
    class MSS_EXCEEDED_MAP
      set connection advanced-options MSS-MAP
    service-policy global_policy global
    privilege cmd level 3 mode exec command perfmon
    privilege cmd level 3 mode exec command ping
    privilege cmd level 3 mode exec command who
    privilege cmd level 3 mode exec command logging
    privilege cmd level 3 mode exec command failover
    privilege cmd level 3 mode exec command packet-tracer
    privilege show level 5 mode exec command import
    privilege show level 5 mode exec command running-config
    privilege show level 3 mode exec command reload
    privilege show level 3 mode exec command mode
    privilege show level 3 mode exec command firewall
    privilege show level 3 mode exec command asp
    privilege show level 3 mode exec command cpu
    privilege show level 3 mode exec command interface
    privilege show level 3 mode exec command clock
    privilege show level 3 mode exec command dns-hosts
    privilege show level 3 mode exec command access-list
    privilege show level 3 mode exec command logging
    privilege show level 3 mode exec command vlan
    privilege show level 3 mode exec command ip
    privilege show level 3 mode exec command ipv6
    privilege show level 3 mode exec command failover
    privilege show level 3 mode exec command asdm
    privilege show level 3 mode exec command arp
    privilege show level 3 mode exec command route
    privilege show level 3 mode exec command ospf
    privilege show level 3 mode exec command aaa-server
    privilege show level 3 mode exec command aaa
    privilege show level 3 mode exec command eigrp
    privilege show level 3 mode exec command crypto
    privilege show level 3 mode exec command vpn-sessiondb
    privilege show level 3 mode exec command ssh
    privilege show level 3 mode exec command dhcpd
    privilege show level 3 mode exec command vpnclient
    privilege show level 3 mode exec command vpn
    privilege show level 3 mode exec command blocks
    privilege show level 3 mode exec command wccp
    privilege show level 3 mode exec command webvpn
    privilege show level 3 mode exec command module
    privilege show level 3 mode exec command uauth
    privilege show level 3 mode exec command compression
    privilege show level 3 mode configure command interface
    privilege show level 3 mode configure command clock
    privilege show level 3 mode configure command access-list
    privilege show level 3 mode configure command logging
    privilege show level 3 mode configure command ip
    privilege show level 3 mode configure command failover
    privilege show level 5 mode configure command asdm
    privilege show level 3 mode configure command arp
    privilege show level 3 mode configure command route
    privilege show level 3 mode configure command aaa-server
    privilege show level 3 mode configure command aaa
    privilege show level 3 mode configure command crypto
    privilege show level 3 mode configure command ssh
    privilege show level 3 mode configure command dhcpd
    privilege show level 5 mode configure command privilege
    privilege clear level 3 mode exec command dns-hosts
    privilege clear level 3 mode exec command logging
    privilege clear level 3 mode exec command arp
    privilege clear level 3 mode exec command aaa-server
    privilege clear level 3 mode exec command crypto
    privilege cmd level 3 mode configure command failover
    privilege clear level 3 mode configure command logging
    privilege clear level 3 mode configure command arp
    privilege clear level 3 mode configure command crypto
    privilege clear level 3 mode configure command aaa-server
    prompt hostname context
    Cryptochecksum:aaa1f198bf3fbf223719e7920273dc2e
    : end

    I didn't realise I had that crypto settings on, thanks my bad!!!
    But... the 172.16.12.0 network is directly connected, the Router (that to be honest is a firewall) / switches is all on the same subnet (172.16.12.X/24), so sorry I didn't explain thoroughly, was more wondering about the GW and didn't want to overcomplicate things..
    The Firewall/Router dosen't do any routing, so it should work right (I you count out the firewalling in the firewall and so forth, there shouldn't be any problems accomplishing this with the ASA)? The Firewall is more a DHCP for the clients/Firwall for the clients.. this will change in the future.. it will be removed,
    the vpn network is staticly routed back to my ASA in that firewall...
    I don't like this solution.. but this is who it looks.. for now..
    (VPN network is 10.10.10.X/24)
    But... shouldn't I see a default gateway under ipconfig when I'm connected to the VPN from internet, on the vpn client that's vpned in, is this correct?
    THANKS for all the help!

  • Changing default gateway on sbs08

    Hello,
    I need to change the default gateway on my small business server 2008 from 192.168.1.207 to 192.168.1.208. The server is used for exchange 2007 and pretty much runs our network.
    My manager said this is a big job and I need to read up on DNS, MX records and changing SMTP server IP addresses but I cant see what else I would
    need to do. 
    Any help is greatly appreciated!
    Thanks!

    Hi Nuh,
    If you are just looking to change just the gateway IP address, then FOVIA is correct. Just run the Connect to Internet Wizard. For all intensive purposes, your gateway is your firewall or router. Ex. below.
    IP Address:   192.168.1.2  <-This is IP address for the server
    Subnet:       255.255.255.0
    Default Gateway:  192.168.1.207  <- This is the IP address for your gateway, the one that you need to change.
    Now, if you manager is asking you to change physically change the gateway(firewall/router) and reconfigfure it and the network, then this "big job" does make sense when dealing DNS, MX records and such. If not, then just run the wizard and you should be
    gold.

  • Setting up IP,Subnet, default gateway and secondary gateway in solaris 10 x

    Hi,
    I am new to solaris.
    I have instralled solaris10 x86 on my system.
    I am not able to access internet as i am not able to setup address.
    I use broadband and have static ip address.
    How do i configure them...
    ip, subnet, default gateway, and secondary gateway.
    Thanks in advance.

    run sys-unconfig and after reboot set the parameters (IP, etc)
    What do you mean second gateway?

  • VPN Clients getting different default gateways

    Hello,
         We have a new Cisco ASA 5520 and are trying to setup the VPN with split tunneling.  We mostly have clients running XP and the problem is that some of the clients connect (using Cisco Anyconnect 2.5) and the split tunneling works as expected --these clients keep their default gateway-- and then some clients connect and get a default gateway of 192.168.119.1 (our VPN addresses subnet) and of course these users cannot connect to the internet while connected to the VPN.
    Here is our config:
    ASA Version 9.1(1)
    hostname xxxxxx
    names
    name 178.239.80.0 Deny178.239.80.0 description 178.239.80.0
    name 74.82.64.0 Deny74.82.64.0 description 74.82.64.0
    name 173.247.32.0 Deny173.247.32.0 description 173.247.32.0
    name 193.109.81.0 Deny193.109.81.0 description 193.109.81.0
    name 204.187.87.0 Deny204.187.87.0 description 204.187.87.0
    name 206.51.26.0 Deny206.51.26.0 description 206.51.26.0
    name 206.53.144.0 Deny206.53.144.0 description 206.53.144.0
    name 67.223.64.0 Deny67.223.64.0 description 67.223.64.0
    name 93.186.16.0 Deny93.186.16.0 description 93.186.16.0
    name 216.9.240.0 Deny216.9.240.0 description 216.9.240.0
    name 68.171.224.0 Deny68.171.224.0 description 68.171.224.0
    ip local pool PAIUSERS 192.168.119.10-192.168.119.100 mask 255.255.255.0
    interface GigabitEthernet0/0
    nameif outside
    security-level 0
    ip address 63.86.112.194 255.255.255.192
    interface GigabitEthernet0/1
    nameif inside
    security-level 100
    ip address 192.168.129.5 255.255.255.192
    interface GigabitEthernet0/2
    nameif dmz
    security-level 10
    ip address 192.168.20.10 255.255.255.0
    interface GigabitEthernet0/3
    nameif vpn_dmz
    security-level 25
    ip address 192.168.30.10 255.255.255.0
    interface Management0/0
    management-only
    shutdown
    nameif management
    security-level 100
    ip address 192.168.102.4 255.255.255.0
    object network obj-192.168.119.0
    subnet 192.168.119.0 255.255.255.0
    access-list outside_access_in extended permit ip host 192.168.119.11 host 192.168.35.23
    access-list outside_access_in extended permit object-group TCPUDP any4 object-group DM_INLINE_NETWORK_3 object-group UDP_TCP_Domain inactive
    access-list outside_access_in extended permit udp any4 object obj-192.168.30.11 eq isakmp
    access-list outside_access_in extended permit ip any4 object obj-192.168.30.11
    access-list outside_access_in extended permit udp any4 object obj-192.168.30.11 object-group UDP10000
    access-list outside_access_in extended permit udp any4 object-group DM_INLINE_NETWORK_7 eq domain inactive
    access-list outside_access_in extended permit tcp any4 object-group DM_INLINE_NETWORK_8 eq domain inactive
    access-list outside_access_in extended permit tcp host 216.81.43.190 host 192.168.35.30 eq ssh inactive
    access-list outside_access_in extended permit tcp host 216.81.43.190 object obj-192.168.35.30 object-group DM_INLINE_TCP_6 inactive
    access-list outside_access_in extended permit tcp any4 object-group DM_INLINE_NETWORK_9 eq www inactive
    access-list outside_access_in extended permit tcp any4 object obj-192.168.30.11 eq www
    access-list outside_access_in extended permit esp any4 object obj-192.168.30.11
    access-list outside_access_in extended permit tcp any4 object obj-192.168.35.41 eq www
    access-list outside_access_in extended permit tcp any4 object obj-192.168.35.41 eq https
    access-list outside_access_in extended permit tcp any4 host 192.168.35.34 eq https
    access-list outside_access_in extended permit object-group TCPUDP any4 object obj-192.168.35.30 object-group Ports_UDpTCP
    access-list outside_access_in extended permit tcp any4 object obj-192.168.35.30 object-group DM_INLINE_TCP_7
    access-list outside_access_in extended permit tcp any4 object obj-192.168.35.30 eq ftp
    access-list outside_access_in extended permit object-group TCPUDP any4 host 63.86.112.248
    access-list outside_access_in extended permit udp any4 host 162.95.80.115 eq isakmp
    access-list outside_access_in extended permit tcp any4 host 162.95.80.115 object-group Ports_115
    access-list outside_access_in extended permit udp any4 host 162.95.80.115 object-group Ports_2746_259
    access-list outside_access_in extended permit object-group TCPUDP any4 host 63.86.112.245 object-group Service_Group_245 inactive
    access-list outside_access_in extended permit object-group TCPUDP any4 object obj-192.168.35.40 object-group UDP_TCP_Domain
    access-list outside_access_in extended permit tcp any4 object obj-192.168.35.40 object-group DM_INLINE_TCP_2
    access-list outside_access_in extended permit tcp any4 object obj-192.168.129.11 object-group DM_INLINE_TCP_1
    access-list outside_access_in extended permit object-group TCPUDP any4 object obj-192.168.129.11 object-group UDP_TCP_Domain
    access-list outside_access_in extended permit tcp any4 object obj-192.168.129.11 object-group Network_Service_2703_6277
    access-list outside_access_in extended permit udp any4 object obj-192.168.129.11 object-group UDP_443
    access-list outside_access_in extended permit ip any4 host 192.168.101.75 inactive
    access-list outside_access_in extended permit tcp any4 host 64.78.239.50 eq www
    access-list outside_access_in extended permit tcp any4 host 64.78.239.54 object-group TCP_4445
    access-list outside_access_in extended permit icmp any4 any4
    access-list outside_access_in extended permit udp any4 object obj-192.168.35.40 object-group UDP_443
    access-list outside_access_in extended permit tcp any4 host 63.86.112.204 object-group DM_INLINE_TCP_5
    access-list outside_access_in extended permit tcp any4 host 63.86.112.204
    access-list outside_access_in extended permit udp any4 host 63.86.112.204
    access-list outside_access_in extended permit object-group TCPUDP any4 host 192.168.102.12 object-group Network_Server_1194
    access-list outside_access_in extended permit tcp any4 host 192.168.102.12 eq www
    access-list outside_access_in extended permit tcp any4 host 192.168.102.12 eq https
    access-list outside_access_in extended permit object-group TCPUDP any4 object obj-192.168.35.41 object-group Network_Server_1194
    access-list outside_access_in extended permit tcp any4 object obj-192.168.35.12 eq www
    access-list outside_access_in extended permit tcp any4 object obj-192.168.35.12 object-group DM_INLINE_TCP_3
    access-list outside_access_in extended permit tcp any4 host 63.86.112.193 object-group Network_Service_TCP_1194
    access-list outside_access_in extended deny tcp object Deny206.51.26.0 object obj-192.168.35.40 eq https
    access-list outside_access_in extended deny tcp object Deny193.109.81.0 object obj-192.168.35.40 eq https
    access-list outside_access_in extended deny tcp object Deny204.187.87.0 object obj-192.168.35.40 eq https
    access-list outside_access_in extended deny tcp object Deny206.53.144.0 object obj-192.168.35.40 eq https
    access-list outside_access_in extended deny tcp object Deny216.9.240.0 object obj-192.168.35.40 eq https
    access-list outside_access_in extended deny tcp object Deny67.223.64.0 object obj-192.168.35.40 eq https
    access-list outside_access_in extended deny tcp object Deny93.186.16.0 object obj-192.168.35.40 eq https
    access-list outside_access_in extended deny tcp object Deny68.171.224.0 object obj-192.168.35.40 eq https
    access-list outside_access_in extended deny tcp object Deny74.82.64.0 object obj-192.168.35.40 eq https
    access-list outside_access_in extended deny tcp object Deny178.239.80.0 object obj-192.168.35.40 eq https
    access-list outside_access_in extended deny tcp object Deny173.247.32.0 object obj-192.168.35.40 eq https
    access-list vpn_dmz_access_in extended permit ip host 192.168.35.23 192.168.119.0 255.255.255.0
    access-list vpn_dmz_access_in extended permit gre host 192.168.30.11 any4
    access-list vpn_dmz_access_in extended permit tcp any4 host 23.0.214.60 eq https
    access-list vpn_dmz_access_in extended permit udp object-group DM_INLINE_NETWORK_28 any4
    access-list vpn_dmz_access_in extended permit tcp any4 object obj-192.168.35.105 object-group DM_INLINE_TCP_4
    access-list vpn_dmz_access_in extended permit esp any4 object obj-192.168.35.105
    access-list vpn_dmz_access_in extended permit tcp any4 object obj-192.168.35.105
    access-list vpn_dmz_access_in extended permit icmp any4 object obj-192.168.35.105
    access-list vpn_dmz_access_in extended permit tcp any4 host 192.168.129.11
    access-list vpn_dmz_access_in remark RDP
    access-list vpn_dmz_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 eq 3389
    access-list vpn_dmz_access_in extended permit icmp any4 object obj-192.168.35.23
    access-list inside_nat0_outbound extended permit ip any4 192.168.119.0 255.255.255.0
    access-list ftp-timeout extended permit tcp host 216.81.43.190 host 63.86.112.248
    access-list ftp-timeout extended permit tcp host 63.86.112.248 host 216.81.43.190
    access-list ftp-timeout extended permit tcp host 192.168.35.30 host 216.81.43.190
    access-list ftp-timeout extended permit tcp host 216.81.43.190 host 192.168.35.30
    access-list Split_Tunnel_List remark northwoods
    access-list Split_Tunnel_List standard permit host 192.168.35.23
    access-list Split_Tunnel_List remark paits2
    access-list Split_Tunnel_List standard permit host 192.168.35.198
    access-list Split_Tunnel_List standard deny 192.168.102.0 255.255.255.0
    access-list AnyConnect_Client_Local_Print extended deny ip any4 any4
    access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd
    access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol
    access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631
    access-list AnyConnect_Client_Local_Print remark Windows' printing port
    access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100
    access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol
    access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353
    access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol
    access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355
    access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol
    access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137
    access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns
    access-list IS_Split_Tunnel standard permit 192.168.102.0 255.255.255.0
    access-list IS_Split_Tunnel standard permit 192.168.82.0 255.255.255.0
    access-list IS_Split_Tunnel standard permit 192.168.35.0 255.255.255.0
    nat (inside,outside) source static object-192.168.35.0 object-192.168.35.0 destination static obj-192.168.119.0 obj-192.168.119.0 no-proxy-arp route-lookup
    nat (inside,outside) source static obj-192.168.82.0 obj-192.168.82.0 destination static obj-192.168.119.0 obj-192.168.119.0 no-proxy-arp route-lookup
    nat (inside,outside) source static obj-192.168.102.0 obj-192.168.102.0 destination static obj-192.168.119.0 obj-192.168.119.0 no-proxy-arp route-lookup
    webvpn
    enable outside
    enable inside
    enable dmz
    anyconnect-essentials
    anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
    anyconnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 2
    anyconnect profiles pairemoteuser disk0:/pairemoteuser.xml
    anyconnect enable
    tunnel-group-list enable
    group-policy PAIGroup internal
    group-policy PAIGroup attributes
    vpn-tunnel-protocol ssl-clientless
    webvpn
      url-list value PAI
    group-policy PAIUSERS internal
    group-policy PAIUSERS attributes
    wins-server value 192.168.35.57
    dns-server value 192.168.35.57
    vpn-tunnel-protocol ikev2 ssl-client ssl-clientless
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value Split_Tunnel_List
    default-domain none
    webvpn
      anyconnect firewall-rule client-interface private value vpn_dmz_access_in
      anyconnect profiles value pairemoteuser type user
    group-policy PAIIS internal
    group-policy PAIIS attributes
    wins-server value 192.168.35.57
    dns-server value 192.168.35.57
    vpn-tunnel-protocol ikev2 ssl-client ssl-clientless
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value IS_Split_Tunnel
    default-domain none
    webvpn
      anyconnect firewall-rule client-interface private value vpn_dmz_access_in
      anyconnect profiles value pairemoteuser type user
    group-policy DfltGrpPolicy attributes
    banner value Welcome to PAI
    wins-server value 192.168.35.57
    dns-server value 192.168.35.57
    address-pools value PAIUSERS
    webvpn
      anyconnect firewall-rule client-interface public none
      anyconnect firewall-rule client-interface private value vpn_dmz_access_in
      anyconnect ask enable default anyconnect timeout 5
    group-policy Anyconnect internal
    : end

    Check is the users fall into DfltGrpPolicy because it has no split tunneling active.
    Michael
    Please rate all helpful posts

  • Some clients get Default Gateway assigned from WRT300N while others don't

    Two existing desktops, one wired other wireless and existing laptop wireless connects to internet fine.
    Trying to add work laptops, they aquire wireless signal, gets DHCP IP address assigned but doesn't connect. Looked at the ipconfig output and shows no default gateway - router IP is set to 192.168.1.1 - with everything default, I did a reset on it.
    The existing machines all have default gateway assigned. Only difference I see is work machines are XP pro. Never had problems with work laptops connecting anywhere else.
    Any ideas on how to setup so work laptops can connect?
    Solved!
    Go to Solution.

    namralk wrote:
    Ethernet adapter VMware Network Adapter VMnet8:
            Connection-specific DNS Suffix  . :
            Description . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet8
            Physical Address. . . . . . . . . : 00-50-56-C0-00-08
            Dhcp Enabled. . . . . . . . . . . : No
             IP Address. . . . . . . . . . . . : 192.168.1.1
            Subnet Mask . . . . . . . . . . . : 255.255.255.0
             Default Gateway . . . . . . . . . : 
    You have configured vmware on your computer to use 192.168.1.1 on the VMnet8 adapter. This means the computer uses 192.168.1.1 itself on that adapter and obviously won't set 192.168.1.1 as default gateway on your wireless adapter because 192.168.1.1 is the computer itself.
    Fix your network configuration in vmware. After that a "ipconfig /renew *" or a reboot should obtain a new working lease including the default gateway. Make sure vmware does not use the 192.168.1.0/255.255.255.0 subnet for it's network adapters.

  • Default Gateway address for multiple VPN users/clients

    Hello,
    We need some help with a VPN setup for a school project.
    What we want to do:
    We would like to have aprox. 10 different VPN uses that can connect to our Windows Server 2012 R2 which is setup as a VPN server, by the Role called Remote access. And the VPN server is working and we are able to connect to it from another location/computer.
    Our current setup:
    We have a Cisco router, that are configured with 10 Vlans, from Vlan 10 to Vlan 20, and a managament Vlan called Vlan 100.
    The Cisco router is also acting as DHCP server, so inside each Vlan the DHCP gives IP addresses to that specific Vlan, Ex: Vlan 10 has a 192.168.10.0/24 network. Vlan 11 has a 192.168.11.0/24 network, and so on. Vlan 100 has 192.168.100.0/24 This Vlan 100
    has connection to all the Vlans.
    We have internet connection on the Router on port 0 and each Vlan are connected to the internet.
    We have setup the VPN server with a static IP configuration so it is inside Vlan 100 with a Default gateway, like 192.168.100.1 So the VPN server is connected to the internet.
    In AD we have created a User and assigned a static IP address in the user properties, under the Dial-In tab. Here we give this user this IP 192.168.10.225
    Now when we connect to the VPN server useing this user, we have no connection to any of the Vlans (ping) and no internet. When we in cmd write ipconfig we can see that our VPN connection has this IP 192.168.10.225 but a Subnet called 255.255.255.255 and
    a Default gateway called 0.0.0.0
    We would like the user to recieve the correct IP settings like: If we connect with our user, it should recieve the IP as it does, but also a subnet called 255.255.255.0 and a default gateway called 192.168.10.1
    How is this achieved?
    The reason we want this is: We want to create a VPN user for each Vlan. So a user with permission to access Vlan 10 but are not able to see the other Vlans, and then a new user to access Vlan 11 but not able to see the other vlans, and so on.
    Hope someone is able to help us to understand how this is done.
    Thank you in advance.

    Hi,
    In brief, we can't achieve this. Normally, we would not do this.
    Usually, we use firewall or ACL to restrict the remote users.
    For example, 192.168.10.100 is assigned to user1 and 192.168.10.101 is assigned to user2. We can use firewall to restrict 192.168.10.100 to access 192.168.10.0/24 and 192.168.10.101 to access 192.168.11.0/24.
    Best Regards.
    Steven Lee Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • Setting Default Gateway on O

    I have a LAG with two VLANs in it.
    Setup
    VLAN 1 (Untaged default) is connected to the '192.168.11.x', which connects to the "10.1.10.x", which connects to the internet.
    VLAN 3 (Tagged) is connected directly to "10.1.10.x" which connects to the internet.
    Situation;
    When both VLAN3 and VLAN1 are up, default gateway is 192.168.11.1
    When VLAN1 is down, default gateway is 10.1.10.1
    *Desired configuration;*
    How do I make the VLAN3 interface the default, or the directly attached network of 10.1.10.x the default, when it is enabled?
    I have tried this, but must be missing something;
    +kevin-cossaboons-mac-pro:~ kevincossaboon$ sudo route -nv add -net 0.0.0.0 10.1.10.1+
    Password:
    +u: inet 0.0.0.0; u: inet 10.1.10.1; RTM_ADD: Add Route: len 128, pid: 0, seq 1, errno 0, flags:<UP,GATEWAY,STATIC>+
    +locks: inits:+
    +sockaddrs: <DST,GATEWAY,NETMASK>+
    +default 10.1.10.1 default+
    +route: writing to routing socket: File exists+
    +add net 0.0.0.0: gateway 10.1.10.1: File exists+
    +kevin-cossaboons-mac-pro:~ kevincossaboon$ netstat -r+
    +Routing tables+
    Internet:
    +Destination Gateway Flags Refs Use Netif Expire+
    +default 192.168.11.1 UGSc 30 171 bond0+
    +10.1.10/24 link#13 UCS 3 0 vlan0+
    +10.1.10.1 0.13.f7.af.e7.e6 UHLW 0 93 vlan0 995+
    +10.1.10.13 0.18.39.3b.42.95 UHLW 0 26 vlan0 178+

    In your network preferences click the cog wheel and choose set service order. Then drag vlan3 to the top of the list.

  • RV016 - DHCP - Assign another Default Gateway IP

    Maybe this is a simple issue for you but i couldnt solve it.
    I am using a RV016 (192.168.1.2) as a router and DHCP. It automatically assigns its own IP which is 192.168.1.2 as a default gateway. And I can not set my RV016 to assign a static another Default Gateway IP of the server. The workstations will connect to internet via this server (192.168.1.1)
    Any suggestions ?
    Thanks, ....

    Umut,
    The RV016 does not give you the ability to assign a different gateway. If your users can get out via the 192.168.1.1 which means this servers must be doing routing as well. Which device in your network should be the default gateway ?
    Thanks,
    Jasbryan
    Cisco Support Engineer

  • IP Default Gateway

    Hi all
    I have configured ip default-gateway on a cisco 2811 router. However, after configuring this, I could not ping to the internet from all my hosts. However when I use the ip route 0.0.0.0 0.0.0.0 ip address, I am able to do that.
    May i know why this happen. What the difference between a ip route command and a ip default-gateway command ? :)
    Hope someone can help. :) Thanks in advance.

    think of ip default-gateway in a PC analogy. The default-gateway for the PC is just for itself to get to the gateway so that is can talk to other devices in the other network. The same with router, the router uses "ip route 0.0.0.0 0.0.0.0 x.x.x.x" as a way of routing the packet that is does not have a regular route for, a gateway of last resort. Further explanation, when a router sess a packet destined to, say 10.1.1.1.1 host, it looks at its routing table, it have routes for 11.1.1.0, 12.1.1.0 networks but none for 10.x.x.x network, if it has "ip route" or gateway of last resort, it will forward destination to that gateway of last resort hop. IP default-gateway does not make an entry in the routing table it is for router's own use to reach other subnet, not for routing the packets.
    Please rate all posts.

  • E4200 default gateway help

    Hey all.... I'm really hoping someone can help me.
    I have a network setup between two houses, but only one internet connection. Each house has a router acting as a DHCP server handing out a limited range of addresses. It was done this way so that if the connection between the two houses fails, each individual network will still be running. (all addresses are 192.168.2.XYZ).
    At the house that does not have internet, I set the router to hand out a default gateway of the router at the house that does have internet. After replacing my old router with the new E4200, I realised that the new router does not allow me to specify which default gateway to hand out to DHCP clients (I dont see why it would hurt allowing users to do this, but anyways).
    I'm not entirely sure how to set this up now, from what I can tell after some reading up, I would have to have each house on a different network (192.168.2.xyz and 192.168.3.xyz) and set up static routes at each house to route traffic between the two networks.
    The house that does not have internet has the E4200, could I plug the connection from the house that does have internet into the wan port and still allow that house to see my network shares and such?
    I know this is quite complex, so any help would really be appreciated.
    Thanks
    Craig
    EDIT: Just to add to this, the two houses are connected via two Ubiquiti Nanostation loco M5's

    Are both routers connected to each other?
    Follow this link to connect Linksys router to another router.
    Try LAN to LAN connection type and see if that works.

Maybe you are looking for

  • Is this supposed to be the most reliable database server? A msg to oracle.

    Hi, it's been 3 weeks now that I'm fiddling with oracle 11g and I am surprised with the amount of installation/startup/shutdown/management issues that I am facing. I need to evaluate oracle as a possible replacement for sql server, I am supposed to t

  • File naming

    I'm new to the Mac, new to Aperture 3 (running Trial at the moment). Came from PC and PS CS2 and Adobe Bridge. I have most of my pics in folders organized by date (2008-01-13) and inside the folders, the pics have their original file names - img7832.

  • Best way to change GUI on the fly

    Scenario : A program has a simple GUI, subclassing JFrame with a JPanel content pane. Initially the GUI is a simple few text fields and a JButton. Now for the part that eludes me, when the JButton is clicked the GUI should be replaced by a graph draw

  • Droid X Unrecognized by V Cast Media Manager

    Hi, I got my Droid X 4 days ago, and decided today to put some of my music and videos on it so I downloaded V Cast Media Manager to my computer.  Unfortunately, although my computer and my phone acknowledge that there is a USB connection, V Cast does

  • Downloading iTunes newest version with dial up

    I just got my iPod and am having trouble already! Any successful hints on how to download iTunes via dial up internet on Windows XP? Please help!! Dell   Windows XP