WRVS4400N w/VPN - Logging websites visited with IP addresses or usernames?
I just recently added this new router to my network, it does much better than our old one (a motorola modem/router)
I want to see the websites and web activity performed by my employees with this network. I was told that it was available and before i did the firmware upgrade, i thought i was able to (under VPN log) anyways I am a n00b with this, can anyone help me understand how to view activity logs. (I can view ACL, but not VPN or system)
Thank you for responding to my cry for help, David.
I'm confused, though. I thought that's what the access-list 190 does. Are you saying I need a second ip route statement? Or, am I missing an access list item that allows that traffic back out from the LAN to the vpn users?
In a nutshell, I'm not sure how to implement your suggestion. If possible, could you give me an example?
Thanks again!
Dave
Similar Messages
-
Log into Disco with email address
Hi, I have database users that use their email address to log into the application.
They cant do this to log into Discoverer - Ho do you get around this?
ThanksIf you're trying to connect into Discoverer, then you have either an 'Apps' EUL or a 'standard' EUL. Apps interfaces to Oracle Apps (Enterprise Suite). If an 'Apps' EUL the usernames would have to be allowed as Oracle Apps usernames. If allowed, then would probably be okay in Disco as it just considers the username as an Oracle Apps username.
If a 'standard' EUL, then the users are database names (ie: schemas) and again, would have to be a legal database username to work.
The '@' would be something I'd wonder about right away.
Russ -
I delete my browser history but websites visited still show up in Search mode. Why?
How can the browser history really be deleted so nothing shows up when a search is being done? When I follow the traditional steps to delete the browser history, it shows the history as being cleared, but any letter typed in Search mode will show any websites visited with that letter in the name... So how do I really delete the browser history, so nothing shows up under search? And yes, I know you can take the browser info off the search mode, but that doesn't clear the info. If you put the browser back on search, it's all still there.
Don't wipe your phone!!! its a pain in the back side re-installing everything back
-
WRVS4400N [VPN log]: shutting down
Ive setup a few WRVS4400N over the past 6 months, and have been receiving the below message from some of them every couple of hours.
What does the message indicate? Any action to take?
Thanks
+++++++++++++++++++++++++++++++
Sep 18 07:03:35 - [VPN Log]: shutting down
Sep 18 07:03:35 - IPSEC EVENT: KLIPS device ipsec0 shut down.
Sep 18 07:03:37 - [VPN Log]: Starting Pluto (Openswan Version cvs2006Jan12_11:29:56 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OE@ECqImzhFD)
Sep 18 07:03:37 - [VPN Log]: @(#) built on May 10 2011:17:24:48:
Sep 18 07:03:37 - [VPN Log]: Setting NAT-Traversal port-4500 floating to on
Sep 18 07:03:37 - [VPN Log]: port floating activation criteria nat_t1/port_fload1
Sep 18 07:03:37 - [VPN Log]: including NAT-Traversal patch (Version 0.6c)
Sep 18 07:03:37 - [VPN Log]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret0)
Sep 18 07:03:37 - [VPN Log]: starting up 1 cryptographic helpers
Sep 18 07:03:37 - [VPN Log]: started helper pid 739 (fd:5)
Sep 18 07:03:37 - [VPN Log]: Using KLIPS IPsec interface code on 2.4.27-star
Sep 18 07:03:37 - [VPN Log]: Changing to directory '/etc/ipsec.d/cacerts'
Sep 18 07:03:37 - [VPN Log]: Changing to directory '/etc/ipsec.d/aacerts'
Sep 18 07:03:37 - [VPN Log]: Changing to directory '/etc/ipsec.d/ocspcerts'
Sep 18 07:03:37 - [VPN Log]: Changing to directory '/etc/ipsec.d/crls'
Sep 18 07:03:37 - [VPN Log]: Warning: empty directory
+++++++++++++++++++++++++++++++And im also getting this for an RVS4000
Sep 25 18:27:42 - Receive NTP Reply from ntp-1.mcs.anl.gov
Sep 25 18:27:46 - [VPN Log]: shutting down
Sep 25 18:27:47 - IPSEC EVENT: KLIPS device ipsec0 shut down.
Sep 25 18:27:48 - [VPN Log]: Starting Pluto (Openswan Version cvs2006Jan12_11:29:56 X.509-1.5.4 PLUTO_SENDS_VENDORID PLUTO_USES_KEYRR; Vendor ID OE@ECqImzhFD)
Sep 25 18:27:48 - [VPN Log]: @(#) built on May 12 2011:16:06:15:
Sep 25 18:27:48 - [VPN Log]: Setting NAT-Traversal port-4500 floating to on
Sep 25 18:27:48 - [VPN Log]: port floating activation criteria nat_t1/port_fload1
Sep 25 18:27:48 - [VPN Log]: including NAT-Traversal patch (Version 0.6c)
Sep 25 18:27:48 - [VPN Log]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret0)
Sep 25 18:27:48 - [VPN Log]: starting up 1 cryptographic helpers
Sep 25 18:27:48 - [VPN Log]: started helper pidW48 (fd:5)
Sep 25 18:27:48 - [VPN Log]: Using KLIPS IPsec interface code on 2.4.27-star
Sep 25 18:27:48 - [VPN Log]: Changing to directory '/etc/ipsec.d/cacerts'
Sep 25 18:27:48 - [VPN Log]: Changing to directory '/etc/ipsec.d/aacerts'
Sep 25 18:27:48 - [VPN Log]: Changing to directory '/etc/ipsec.d/ocspcerts'
Sep 25 18:27:48 - [VPN Log]: Changing to directory '/etc/ipsec.d/crls'
Sep 25 18:27:48 - [VPN Log]: Warning: empty directory -
WRVS4400N quickvpn Vpn client accounts
Hello everyone, i'm new to cisco forum and i salute you all.
Now lets get to business...hahaha
Well i configured client account on the wrvs4400n v2 to use with quickvpn.
3 of the 5 users created works fine when connecting to router but the other ones doesnt connect good.
They all got the same client .pem install in Quickvpn.
Let's say i try connecting with user num.2 with quickvpn it doesnt want to connect, it says connecting, for long time but noting happens.
But when i look in VPN Summary on router it shows as connected?
Any clue on whats going on?
Thanx Pastload.Hello mpyhala, thanks for the quick reply.
Yes i did try it on different PC. I can connect with no issue with my account on both PC with the same config. But not with user 2 and user 3. There is one error message about certificat, but if you click 'no' it will connect anyway, it works for the 3 users but not with the other 2's.
And yes i did uninstalled quickvpn twice (clean uninstalled). And no change, still can not connect with user 2 and 3. I have deleted user 2 and 3 and created different user with different password and still the same.
But if i look in vpn summary it shows user 2 as connected. But the quickvpn still showing ' connecting ' and it give me nothing.
Does someone knows how is this possible? Do you need Logs.
I notice that when establishing connection with my user the wget.exe make the connection and disconnect after connection is made.
But the 2 other users the connection establishes with wget.exe but it doesnt close connection. It stays connected until i close it my self.
Dont know if it could help.
Update:
User 1
2013/07/10 20:05:13 [STATUS]OS Version: Windows 7
2013/07/10 20:05:13 [STATUS]Windows Firewall Domain Profile Settings: ON
2013/07/10 20:05:13 [STATUS]Windows Firewall Private Profile Settings: ON
2013/07/10 20:05:13 [STATUS]Windows Firewall Private Profile Settings: ON
2013/07/10 20:05:13 [STATUS]One network interface detected with IP address 192.168.1.101
2013/07/10 20:05:13 [STATUS]Connecting...
2013/07/10 20:05:13 [DEBUG]Input VPN Server Address = xx.37.1.xx
2013/07/10 20:05:13 [STATUS]Connecting to remote gateway with IP address: xx.37.1.xx
2013/07/10 20:05:14 [WARNING]Server's certificate doesn't exist on your local computer.
2013/07/10 20:05:18 [STATUS]Remote gateway was reached by https ...
2013/07/10 20:05:18 [STATUS]Provisioning...
2013/07/10 20:05:28 [STATUS]Success to connect.
2013/07/10 20:05:28 [STATUS]Tunnel is configured. Ping test is about to start.
2013/07/10 20:05:28 [STATUS]Verifying Network...
2013/07/10 20:05:34 [WARNING]Failed to ping remote VPN Router!
*This user is connecting to router (Working)*
2013/07/10 20:07:03 [STATUS]Disconnecting...
2013/07/10 20:07:09 [STATUS]Success to disconnect.
User 2
2013/07/10 20:07:25 [STATUS]OS Version: Windows 7
2013/07/10 20:07:25 [STATUS]Windows Firewall Domain Profile Settings: ON
2013/07/10 20:07:25 [STATUS]Windows Firewall Private Profile Settings: ON
2013/07/10 20:07:25 [STATUS]Windows Firewall Private Profile Settings: ON
2013/07/10 20:07:25 [STATUS]One network interface detected with IP address 192.168.1.101
2013/07/10 20:07:25 [STATUS]Connecting...
2013/07/10 20:07:25 [DEBUG]Input VPN Server Address = xx.37.1.xx
2013/07/10 20:07:25 [STATUS]Connecting to remote gateway with IP address: xx.37.1.xx
2013/07/10 20:07:26 [WARNING]Server's certificate doesn't exist on your local computer.
2013/07/10 20:15:34 [WARNING]Failed to connect.
*This user doesnt connect why?*
* It hangs on Connecting in QuickVpn*
Same machine, same setting
--20:15:34--
https:// User 2: *password*@xx.37.1.xx :60443/StartConnection.htm?version=1?IP=192.168.1.101?PASSWD=*password*?USER=User 2
=> `C://Program Files//Cisco Small Business//QuickVPN Client//vpnserver.conf'
Connecting to xx.37.1.xx:60443... connected.
HTTP request sent, awaiting response...
Read error (Unknown error) in headers.
Giving up. -
SSL VPN on Cisco 1941 with Firewall woes
Hi Folks,
Been trying to setup SSL VPN on a 1941 with limited sucess.
I can get the VPN configured and working but as soon as enable the firewall it blocks the VPN
The VPN connects and I can ping the internal gateway address from a remote client but I can't
connect to any of the internal Lan address.
Been round and round in circles, any help appreciated.
Cheers
Building configuration...
Current configuration : 9532 bytes
! Last configuration change at 13:08:29 UTC Sun Feb 23 2014 by admin
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname router
boot-start-marker
boot-end-marker
no logging buffered
enable secret 4 xxxxx
aaa new-model
aaa authentication login default local
aaa authorization exec default local
aaa session-id common
ip cef
ip name-server 8.8.8.8
ip name-server 4.4.4.4
no ipv6 cef
multilink bundle-name authenticated
crypto pki trustpoint my-gw-ca
enrollment selfsigned
subject-name Cn=gw
revocation-check crl
rsakeypair gw-rsa
crypto pki trustpoint test_trustpoint_config_created_for_sdm
subject-name [email protected]
revocation-check crl
crypto pki certificate chain my-gw-ca
certificate self-signed 01
30820320 30820208 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
DAC0F948 A5B56EDD CD6DABBD 47463AB2 7E3F0DC3 DF4ECCE6 EAC5E916 B83DA4D0 C3119E9B
quit
crypto pki certificate chain test_trustpoint_config_created_for_sdm
license udi pid CISCO1941/K9 sn
username aaa privilege 15 secret 4
username bbb privilege 0 secret 4
username ccc privilege 15 view root secret 4
redundancy
class-map type inspect match-all CCP_SSLVPN
match access-group name CCP_IP
class-map type inspect match-any ccp-skinny-inspect
match protocol skinny
class-map type inspect match-any SDM_WEBVPN
match access-group name SDM_WEBVPN
class-map type inspect match-any ccp-h323nxg-inspect
match protocol h323-nxg
class-map type inspect match-any ccp-cls-icmp-access
match protocol icmp
match protocol tcp
match protocol udp
class-map type inspect match-any ccp-h225ras-inspect
match protocol h225ras
class-map type inspect match-any ccp-h323annexe-inspect
match protocol h323-annexe
class-map type inspect match-any ccp-cls-insp-traffic
match protocol dns
match protocol ftp
match protocol https
match protocol icmp
match protocol imap
match protocol pop3
match protocol netshow
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
class-map type inspect match-any ccp-h323-inspect
match protocol h323
class-map type inspect match-all ccp-invalid-src
match access-group 100
class-map type inspect match-any ccp-sip-inspect
match protocol sip
class-map type inspect match-all ccp-protocol-http
match protocol http
class-map type inspect match-all SDM_WEBVPN_TRAFFIC
match class-map SDM_WEBVPN
match access-group 102
class-map type inspect match-all ccp-insp-traffic
match class-map ccp-cls-insp-traffic
class-map type inspect match-all ccp-icmp-access
match class-map ccp-cls-icmp-access
policy-map type inspect ccp-inspect
class type inspect ccp-invalid-src
pass
class type inspect ccp-protocol-http
inspect
class type inspect ccp-insp-traffic
inspect
class type inspect ccp-sip-inspect
inspect
class type inspect ccp-h323-inspect
inspect
class type inspect ccp-h323annexe-inspect
inspect
class type inspect ccp-h225ras-inspect
inspect
class type inspect ccp-h323nxg-inspect
inspect
class type inspect ccp-skinny-inspect
inspect
class class-default
pass
policy-map type inspect ccp-sslvpn-pol
class type inspect CCP_SSLVPN
pass
class class-default
drop
policy-map type inspect ccp-permit
class type inspect SDM_WEBVPN_TRAFFIC
inspect
class class-default
pass
policy-map type inspect ccp-permit-icmpreply
class type inspect ccp-icmp-access
inspect
class class-default
pass
zone security out-zone
zone security in-zone
zone security sslvpn-zone
zone-pair security ccp-zp-self-out source self destination out-zone
service-policy type inspect ccp-permit-icmpreply
zone-pair security ccp-zp-in-out source in-zone destination out-zone
service-policy type inspect ccp-inspect
zone-pair security ccp-zp-out-self source out-zone destination self
service-policy type inspect ccp-permit
zone-pair security zp-out-zone-sslvpn-zone source out-zone destination sslvpn-zone
service-policy type inspect ccp-sslvpn-pol
zone-pair security zp-sslvpn-zone-out-zone source sslvpn-zone destination out-zone
service-policy type inspect ccp-sslvpn-pol
zone-pair security zp-in-zone-sslvpn-zone source in-zone destination sslvpn-zone
service-policy type inspect ccp-sslvpn-pol
zone-pair security zp-sslvpn-zone-in-zone source sslvpn-zone destination in-zone
service-policy type inspect ccp-sslvpn-pol
crypto vpn anyconnect flash0:/webvpn/anyconnect-win-3.1.05152-k9.pkg sequence 1
interface Embedded-Service-Engine0/0
no ip address
shutdown
interface GigabitEthernet0/0
description $ETH-LAN$$FW_INSIDE$
ip address 192.168.192.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
zone-member security in-zone
duplex auto
speed auto
interface GigabitEthernet0/1
description $ETH-WAN$$FW_OUTSIDE$
ip address 194.74.99.99 255.255.255.224
ip nat outside
ip virtual-reassembly in
zone-member security out-zone
duplex auto
speed auto
interface Virtual-Template1
description $FW_INSIDE$
ip unnumbered GigabitEthernet0/1
zone-member security in-zone
interface Virtual-Template2
description $FW_INSIDE$
ip unnumbered GigabitEthernet0/1
zone-member security in-zone
interface Virtual-Template3
ip unnumbered GigabitEthernet0/1
zone-member security sslvpn-zone
ip local pool vpn-ssl-pool 192.168.192.200 192.168.192.210
ip forward-protocol nd
ip http server
ip http authentication local
no ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip dns server
ip nat inside source list 1 interface GigabitEthernet0/1 overload
ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/1
ip access-list extended CCP_IP
remark CCP_ACL Category=128
permit ip any any
ip access-list extended SDM_WEBVPN
remark CCP_ACL Category=1
permit tcp any any eq 4444
access-list 1 remark CCP_ACL Category=2
access-list 1 permit 192.168.192.0 0.0.0.255
access-list 100 remark CCP_ACL Category=128
access-list 100 permit ip host 255.255.255.255 any
access-list 100 permit ip 127.0.0.0 0.255.255.255 any
access-list 101 remark CCP_ACL Category=0
access-list 101 permit ip any host 192.168.192.2
access-list 102 remark CCP_ACL Category=128
access-list 102 permit ip any host 194.74.2.81
control-plane
webvpn gateway ssl_gw
ip address 194.74.99.99 port 4444
ssl trustpoint my-gw-ca
inservice
webvpn context ssl-ctx
acl "ssl-acl"
permit ip 192.168.192.0 255.255.255.0 192.168.192.0 255.255.255.0
gateway ssl_gw
max-users 10
ssl authenticate verify all
inservice
policy group ssl_policy
functions svc-enabled
filter tunnel ssl-acl
svc address-pool "vpn-ssl-pool" netmask 255.255.255.0
svc keep-client-installed
svc split include 192.168.192.0 255.255.255.0
svc dns-server primary 192.168.192.2
default-group-policy ssl_policy
endHello Fahad,
Please see my inline responses.
1)I have some questions, does this 5500 Series of ASA firewall also have IDS(Intrusion Detection System)?
You can have an IPS module if your ASA model supports it.
2) My other question is that the configuration and troubleshooting of SSL VPN technique is same on all ASA models?
Yes, pretty much the same
Regards,
Jazib -
basically someone has an old iphone and there was inappropiate websites visited on the phone and i was blamed for it.
I want to know how to find out the exact time and date these were visited and how they were accessed. and to clear my name as they were instead of looking at how this could have happened, they said i hacked into the phone and used it, when i didnt even know they had thier phone in my house at the time.
thanks for any answers or help.I have managed to find the solution to this problem in another thread. I have copied the response from that thread below.
The solution that worked was to navigate to the preferences file and delete the plist file as described below.
Peter Bannon
RE: My iphoto Library is Empty ?????
Sep 12, 2005 1:13 PM (in response to Nic Hard)
Nic Here are some of the standard fixes I think may help in your case: 4. Your iPhoto preferences file may be corrupted.
(MAKE SURE you QUIT iPhoto first)
You will find it in your Home directory:
(Home/your account) >Library>Preferences>com.apple.iPhoto.plist Remove or trash the preference (.plist file) and restart iPhoto. If it still doesn't work go on to these remedies, in order. 5. Bad Album data?
Old Toad says:
1 - move the Albums folder and the AlbumData.xml file to the desktop.
2 - launch iPhoto. It if launches successfully you probably have a corrupt album. To locate the bad "apple", pun intended, do the following: 1 - move one of the individual album folders and it's associated data file into the new Albums folder that was created in the iPhoto Library folder.
2 - launch iPhoto. If it's successful do the same with the next album folder and data file. If iPhoto doesn't launch successfully, that's a bad one and remove it and the data file.
3 - repeat for each individual album folder in the old Albums folder. 6. Rebuild Library
QUIT IPHOTO FIRST
Relaunch while holding down the key combination below for your version
Option+Shift IPHOTO 2
CommandOptionShift IPHOTO 4
Command+Option IPHOTO 5 -
RV042G VPN - How to connect with Windows 7 IPsec client?
Hello,
I'm trying to use the Windows 7 VPN client, to connect to my RV042G. Here are some Screenshots of my router's and Windows' configuration:
I tried different other configurations, too, but each time, I get a lot of errors on the router. The upper configuration results in the following:
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [MS NT5 ISAKMPOAKLEY 00000008]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: received Vendor ID payload [RFC 3947]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: received Vendor ID payload [RFC 3947]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [FRAGMENTATION]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [FRAGMENTATION]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [fb1de3cdf341b7ea16b7e5be0855f120]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [Vid-Initial-Contact]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: ignoring Vendor ID payload [e3a5966a76379fe707228231e5ce8652]
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Feb 13 14:58:05 2014 VPN Log packet from 192.168.1.24:500: [Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: responding to Main Mode from unknown peer 192.168.1.24
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: OAKLEY_AES_CBC is not enabled for this connection. Attribute OAKLEY_ENCRYPTION_ALGORITHM
Feb 13 14:58:05 2014 Kernel last message repeated 5 times
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: OAKLEY_GROUP_MODP2048 is not enabled for this connection. Attribute OAKLEY_GROUP_DESCRIPTION
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: OAKLEY_GROUP_MODP2048 is not enabled for this connection. Attribute OAKLEY_GROUP_DESCRIPTION
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Peer ID is ID_IPV4_ADDR: '192.168.1.24'
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: sent MR3, ISAKMP SA established
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: [Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: cannot respond to IPsec SA request because no connection is known for 78.52.27.132:17/1701...192.168.1.24[[email protected]]:17/1701
Feb 13 14:58:05 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_ID_INFORMATION to 192.168.1.24:500
Feb 13 14:58:07 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
Feb 13 14:58:07 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
Feb 13 14:58:07 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_MESSAGE_ID to 192.168.1.24:500
Feb 13 14:58:10 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
Feb 13 14:58:10 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
Feb 13 14:58:10 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_MESSAGE_ID to 192.168.1.24:500
Feb 13 14:58:14 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
Feb 13 14:58:14 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
Feb 13 14:58:14 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_MESSAGE_ID to 192.168.1.24:500
Feb 13 14:58:22 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
Feb 13 14:58:22 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
Feb 13 14:58:22 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_MESSAGE_ID to 192.168.1.24:500
Feb 13 14:58:38 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
Feb 13 14:58:38 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: Quick Mode I1 message is unacceptable because it uses a previously used Message ID 0x00000001 (perhaps this is a duplicated packet)
Feb 13 14:58:38 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: sending encrypted notification INVALID_MESSAGE_ID to 192.168.1.24:500
Feb 13 14:58:52 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: received Delete SA payload: deleting ISAKMP State #89
Feb 13 14:58:52 2014 VPN Log (c2gips0)[2] 192.168.1.24 #89: received Delete SA payload: deleting ISAKMP State #89
Feb 13 14:58:52 2014 VPN Log (c2gips0)[2] 192.168.1.24: deleting connection (c2gips0) instance with peer 192.168.1.24 {isakmp=#0/ipsec=#0}
Does anyone know, how to configure the router and Windows 7, to get a working VPN tunnel?
Thanks.Ok, I could find the time, to try this out. I followed this instruction: https://www.shrew.net/support/Howto_Linksys and it works.
There is at last one Problem: I can't access computers behind the remote router from the connected client. The client can see the remote router and computers behind the remote router can see the connected client using the IP-adress, I used for shrewsoft.
I tried to ping some remote PCs from the client, but I get timeout messages. Ping is enabled on all devices. There are no log errors on the router. I tried to add the remote router on the client as a standard gateway, and I decativated the router's firewall, but without success.
Does anyone know, why the communication just works in one direction? -
WRVS4400N - eth0: received packet with own address as source address
I am using a WRVS4400N as my primary router for a small office. I get the following message repeated over and over in my logs. This seems to happen for 2 or 3 days and then it will go away for about a week and then come back. Does anyone know what is causing this? The best I can tell I don't have any IP conflicts on the network and most of the time the network has very little traffic other than 2 or 3 computers surfing the web.
Jan 3 16:48:09 - eth0: received packet with own address as source address
Jan 3 16:48:09 - eth0: received packet with own address as source address
Jan 3 16:48:15 - eth0: received packet with own address as source address
Jan 3 16:48:27 - eth0: received packet with own address as source address
Jan 3 16:48:51 - eth0: received packet with own address as source addressany news on this issue?
I am getting more and more messages (20+/day) - hundreds this month.
Now Coming every 10 minutes - HELP
eth0: received packet with own address as source address
Done everything, now waiting for input from Cisco.
Please, anyone as Cisco got any answers?
1:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
12:36 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
2:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
3:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
4:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
5:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
6:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
7:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD]
8:38 AM [email protected] WRVS4400N Security Log [6B:C6:FD] -
Hello
The RV320 logs are very poor to troubleshoot VPN issues, even with external syslog facility, at the maximum log level the device does not log any VPN event.
Is there a way to increase the log level?
Is there a separate syslog facility local# for VPN?
Where to get extensive documentation about syslog facilities numbers used by RV320?
Thank youCisco support team is trying to fix this up, but it's not working
They managed to build a working tunnel but that's not the point, we need VPN logs, period.
It looks like the device only starts VPN log after a succesfull VPN connection, making the device impossible to setup, diagnose or monitor failed VPN connections. This is a no go.
using external syslog does not help, the only VPN related output I get in log is :
Oct 22 12:32:18 10.0.0.254 VPN Log: [g2gips0]: [Tunnel Disconnected]
what I should get (and is a must have) would be :
2014-10-20, 05:15:31
VPN Log
[g2gips2] #11: [Tunnel Established] ISAKMP SA established
2014-10-20, 05:15:54
VPN Log
[g2gips2] #14: [Tunnel Established] sent MR3, ISAKMP SA established
2014-10-20, 05:15:55
VPN Log
[g2gips2]: cmd=up-client peer=62.176.126.28 peer_client=192.168.1.0/24 peer_client_net=192.168.1.0 peer_client_mask=255.255.255.0
2014-10-20, 05:15:55
VPN Log
ip route add 192.168.1.0/24 via 88.161.221.254 dev eth1 metric 35
2014-10-20, 05:15:55
VPN Log
iptables -t nat -I vpn -s 10.0.0.0/24 -d 192.168.1.0/24 -j ACCEPT
2014-10-20, 05:15:55
VPN Log
iptables -t nat -I vpn -s 192.168.1.0/24 -d 10.0.0.0/24 -j ACCEPT
2014-10-20, 05:15:55
VPN Log
iptables -t nat -I vpn_postrouting -s 10.0.0.0/24 -d 192.168.1.0/24 -j ACCEPT
2014-10-20, 05:15:55
VPN Log
iptables -t nat -I vpn_postrouting -o eth0 -s 192.168.1.0/24 -d 10.0.0.0/24 -j ACCEPT
2014-10-20, 05:15:55
VPN Log
[g2gips2] #15: [Tunnel Established] IPsec SA established {ESP=>0xc570a9c8 < 0xc43d09ba}
2014-10-20, 05:16:53
VPN Log
[g2gips2] #15: [Tunnel Negotiation Fail] DPD: Could not find newest phase 1 state
2014-10-20, 05:26:44
User Log
User cisco Session Expired
2014-10-20, 06:14:42
VPN Log
[g2gips2] #16: [Tunnel Established] sent MR3, ISAKMP SA established
2014-10-20, 06:14:42
VPN Log
[g2gips2] #17: [Tunnel Established] IPsec SA established {ESP=>0xc0931255 < 0xc928b34e}
2014-10-20, 06:14:42
VPN Log
[g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc570a9c8) not found (maybe expired)
2014-10-20, 07:13:34
VPN Log
[g2gips2] #18: [Tunnel Established] IPsec SA established {ESP=>0xcea6223a < 0xcfbc92ba}
2014-10-20, 07:13:34
VPN Log
[g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc0931255) not found (maybe expired)
2014-10-20, 08:12:20
VPN Log
[g2gips2] #19: [Tunnel Established] IPsec SA established {ESP=>0xcdb2138d < 0xcfa80369}
2014-10-20, 08:12:20
VPN Log
[g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcea6223a) not found (maybe expired)
2014-10-20, 09:11:09
VPN Log
[g2gips2] #20: [Tunnel Established] IPsec SA established {ESP=>0xc5aeba36 < 0xcd182a7c}
2014-10-20, 09:11:09
VPN Log
[g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcdb2138d) not found (maybe expired)
2014-10-20, 10:09:57
VPN Log
[g2gips2] #21: [Tunnel Established] IPsec SA established {ESP=>0xc862dbe2 < 0xc68a5a29}
2014-10-20, 10:09:57
VPN Log
[g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc5aeba36) not found (maybe expired)
2014-10-20, 11:08:45
VPN Log
[g2gips2] #22: [Tunnel Established] IPsec SA established {ESP=>0xc8c5d191 < 0xc7009873}
2014-10-20, 11:08:45
VPN Log
[g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc862dbe2) not found (maybe expired)
2014-10-20, 12:07:29
VPN Log
[g2gips2] #23: [Tunnel Established] IPsec SA established {ESP=>0xcbb5aca6 < 0xc087d294}
2014-10-20, 12:07:29
VPN Log
[g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc8c5d191) not found (maybe expired)
2014-10-20, 13:06:16
VPN Log
[g2gips2] #24: [Tunnel Established] IPsec SA established {ESP=>0xce08b895 < 0xca8ee98b}
2014-10-20, 13:06:16
VPN Log
[g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcbb5aca6) not found (maybe expired)
2014-10-20, 14:05:03
VPN Log
[g2gips2] #25: [Tunnel Established] IPsec SA established {ESP=>0xc84ace20 < 0xc66ee4e5}
2014-10-20, 14:05:03
VPN Log
[g2gips2] #16: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xce08b895) not found (maybe expired)
2014-10-20, 14:13:46
VPN Log
[g2gips2] #26: [Tunnel Established] sent MR3, ISAKMP SA established
2014-10-20, 15:03:54
VPN Log
[g2gips2] #27: [Tunnel Established] IPsec SA established {ESP=>0xc8808731 < 0xc6aaaf12}
2014-10-20, 15:03:54
VPN Log
[g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc84ace20) not found (maybe expired)
2014-10-20, 16:02:47
VPN Log
[g2gips2] #28: [Tunnel Established] IPsec SA established {ESP=>0xc20db40f < 0xcbcbb7c5}
2014-10-20, 16:02:47
VPN Log
[g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc8808731) not found (maybe expired)
2014-10-20, 17:01:39
VPN Log
[g2gips2] #29: [Tunnel Established] IPsec SA established {ESP=>0xc8f8b88c < 0xc87177ac}
2014-10-20, 17:01:39
VPN Log
[g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc20db40f) not found (maybe expired)
2014-10-20, 18:00:24
VPN Log
[g2gips2] #30: [Tunnel Established] IPsec SA established {ESP=>0xc24edeb7 < 0xc31180a7}
2014-10-20, 18:00:24
VPN Log
[g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc8f8b88c) not found (maybe expired)
2014-10-20, 18:59:12
VPN Log
[g2gips2] #31: [Tunnel Established] IPsec SA established {ESP=>0xcf388896 < 0xcca051f9}
2014-10-20, 18:59:12
VPN Log
[g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc24edeb7) not found (maybe expired)
2014-10-20, 19:57:59
VPN Log
[g2gips2] #32: [Tunnel Established] IPsec SA established {ESP=>0xcb12a9c8 < 0xc6d3e8a4}
2014-10-20, 19:57:59
VPN Log
[g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcf388896) not found (maybe expired)
2014-10-20, 20:56:46
VPN Log
[g2gips2] #33: [Tunnel Established] IPsec SA established {ESP=>0xcdc041c8 < 0xc69fa232}
2014-10-20, 20:56:46
VPN Log
[g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcb12a9c8) not found (maybe expired)
2014-10-20, 21:55:36
VPN Log
[g2gips2] #34: [Tunnel Established] IPsec SA established {ESP=>0xc4f97df6 < 0xc4a67abd}
2014-10-20, 21:55:36
VPN Log
[g2gips2] #26: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcdc041c8) not found (maybe expired)
2014-10-20, 22:12:56
VPN Log
[g2gips2] #35: [Tunnel Established] sent MR3, ISAKMP SA established
2014-10-20, 22:54:27
VPN Log
[g2gips2] #36: [Tunnel Established] IPsec SA established {ESP=>0xc3716585 < 0xc41ab42b}
2014-10-20, 22:54:27
VPN Log
[g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc4f97df6) not found (maybe expired)
2014-10-20, 23:53:13
VPN Log
[g2gips2] #37: [Tunnel Established] IPsec SA established {ESP=>0xcfc747c8 < 0xc5994856}
2014-10-20, 23:53:13
VPN Log
[g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc3716585) not found (maybe expired)
2014-10-21, 00:51:58
VPN Log
[g2gips2] #38: [Tunnel Established] IPsec SA established {ESP=>0xcf4ea957 < 0xc566c6d3}
2014-10-21, 00:51:58
VPN Log
[g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcfc747c8) not found (maybe expired)
2014-10-21, 01:50:48
VPN Log
[g2gips2] #39: [Tunnel Established] IPsec SA established {ESP=>0xc4f4ddc5 < 0xc852f0a8}
2014-10-21, 01:50:48
VPN Log
[g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcf4ea957) not found (maybe expired)
2014-10-21, 02:49:33
VPN Log
[g2gips2] #40: [Tunnel Established] IPsec SA established {ESP=>0xc4d14f63 < 0xc841322e}
2014-10-21, 02:49:33
VPN Log
[g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc4f4ddc5) not found (maybe expired)
2014-10-21, 03:48:17
VPN Log
[g2gips2] #41: [Tunnel Established] IPsec SA established {ESP=>0xcab61c1d < 0xc8e06d65}
2014-10-21, 03:48:17
VPN Log
[g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc4d14f63) not found (maybe expired)
2014-10-21, 04:47:10
VPN Log
[g2gips2] #42: [Tunnel Established] IPsec SA established {ESP=>0xcc4d0867 < 0xc5370a2f}
2014-10-21, 04:47:10
VPN Log
[g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcab61c1d) not found (maybe expired)
2014-10-21, 05:45:57
VPN Log
[g2gips2] #43: [Tunnel Established] IPsec SA established {ESP=>0xcb8459a9 < 0xcab43b24}
2014-10-21, 05:45:57
VPN Log
[g2gips2] #35: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcc4d0867) not found (maybe expired)
2014-10-21, 06:12:00
VPN Log
[g2gips2] #44: [Tunnel Established] sent MR3, ISAKMP SA established
2014-10-21, 06:44:47
VPN Log
[g2gips2] #45: [Tunnel Established] IPsec SA established {ESP=>0xc1d633d9 < 0xc5b9214f}
2014-10-21, 06:44:47
VPN Log
[g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xcb8459a9) not found (maybe expired)
2014-10-21, 07:43:37
VPN Log
[g2gips2] #46: [Tunnel Established] IPsec SA established {ESP=>0xc8a6235e < 0xc549a18d}
2014-10-21, 07:43:37
VPN Log
[g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc1d633d9) not found (maybe expired)
2014-10-21, 08:42:28
VPN Log
[g2gips2] #47: [Tunnel Established] IPsec SA established {ESP=>0xc563592a < 0xc033e13d}
2014-10-21, 08:42:28
VPN Log
[g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc8a6235e) not found (maybe expired)
2014-10-21, 09:41:12
VPN Log
[g2gips2] #48: [Tunnel Established] IPsec SA established {ESP=>0xc6c5e0b6 < 0xc9acd1e2}
2014-10-21, 09:41:12
VPN Log
[g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc563592a) not found (maybe expired)
2014-10-21, 10:40:03
VPN Log
[g2gips2] #49: [Tunnel Established] IPsec SA established {ESP=>0xc49d311a < 0xca8961e8}
2014-10-21, 10:40:03
VPN Log
[g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc6c5e0b6) not found (maybe expired)
2014-10-21, 11:38:53
VPN Log
[g2gips2] #50: [Tunnel Established] IPsec SA established {ESP=>0xc682b92b < 0xc01e3e5f}
2014-10-21, 11:38:53
VPN Log
[g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc49d311a) not found (maybe expired)
2014-10-21, 12:37:41
VPN Log
[g2gips2] #51: [Tunnel Established] IPsec SA established {ESP=>0xc0e9d4eb < 0xc0c1b26a}
2014-10-21, 12:37:41
VPN Log
[g2gips2] #44: [Tunnel Authorize Fail] ignoring Delete SA payload: PROTO_IPSEC_ESP SA(0xc682b92b) not found (maybe expired)
2014-10-21, 13:36:29
VPN Log
[g2gips2] #52: [Tunnel Established] IPsec SA established {ESP=>0xc424276a < 0xc0467e19} -
Why when using private browsing does Safari still remember websites visited?
Even when private browsing is selected on my MacBook and iPad2, websites visited are remembered and displayed in history. Why is this?
Hi Graham,
Welcome to the Support Communities! Is it possible that you have some Safari windows open as private browsing, and others not? See the overview of private browsing below (see the note I've highlighted in bold):
Safari 8 (Yosemite): Use Private Browsing windows
http://support.apple.com/kb/PH19216
Use Private Browsing windows in Safari
When you use Private Browsing windows, Safari doesn’t save your browsing history, and it asks websites you visit not to track you.
Use Private Browsing:
Choose File > New Private Window, or switch to a Safari window that’s already using Private Browsing. A window that’s using Private Browsing has a dark address and search field with white text.
When you use a Private Browsing window:
Each tab in the window is isolated from the others, so websites you view in one tab can’t track your browsing in other tabs.
Safari doesn’t remember the webpages you visit or your AutoFill information.
Safari doesn’t store your open webpages in iCloud, so they aren’t shown when you view all your open tabs from other devices.
Your recent searches aren’t included in the results list when you use the address and search field.
Items you download aren’t included in the downloads list. (The items do remain on your computer.
Safari doesn’t remember changes to your cookies or other website data. Safari also asks websites and others who provide those sites with content (including advertisers) not to keep track of your browsing, although it is up to the websites to honor this request.
Plug-ins that support Private Browsing stop storing cookies and other tracking information.
Websites can’t modify information stored on your device, so services normally available at such sites may work differently until you turn off Private Browsing.
Note: None of the above applies in other Safari windows you may have open that don’t use Private Browsing.
Stop using Private Browsing:
Close the Private Browsing window, switch to a different Safari window that isn’t using Private Browsing, or choose File > New Window to open a window that doesn’t use Private Browsing. To further enhance privacy:
Delete any items you downloaded while using Private Browsing windows.
Close any other Private Browsing windows that are still open, to prevent others from using the Back and Forward buttons to see pages you visited in them.
Besides using Private Browsing windows, you can manage cookies and data stored by all websites and have Safari ask all websites not to track you.
If you forget to use a Private Browsing window, you can clear your browsing history.
Last Modified: Jan 6, 2015
Cheers,
- Judy -
Is SSL and multiple websites possible with Lion Server?
this is the obligatory apology from a nub here....
I have not been a sys admin since the days of NT 4.0.
I like to think that "hey, i might need a touch up here and there, but I think I can find my way around..." Wrong.
I have been searching, and reading and searching and reading, and trying everything I can think of.. and I CAN NOT figure out how to get mutliple websites working with Lion Server, using self signed certs 1 for each of my subdomains.
Has anyone, anywhere (thank you google for returning searches to me from 2004?!?! More puzzled confusion....) posted a step by step guide yet???
I have a mac mini, and I have two domain names that are resolving to my exterinal interface on my router just fine, and I have tried what I thought was
every different possible combination of voodoo, magic, 00000...MoreTestingNeeded.conf, and all the other tricks.
Is it possible to get ssl and multiple websites working with one IP address?
Thanks...Thank you very much for your time and input. My birthday was fantastic! Thanks for asking.
I found out about SNI while researching an error I was getting in the log. I really never found any definitive "this is what you need to do", so I was going to get back to it later.
You probably know this, but Lion Server breaks out all of the virtual hosts into seperate documents in the "sites" directory. All I do is I launch the server.app, and in the web component, I enter the name of the website that I want to resolve to my server, and I give it the path to the docs. Thats it. There is no DNS configuration to speak of, on my part, and I don't believe that its necessary (?) to touch the httpd.conf file at this point yet either, even though I think I hear others saying you do. (I have no issues with getting into the file and making any changes, I just thought it was interesting.)
I am still trying to figure out how a user is supposed to add any other types of services LIKE ftp, etc. I know and use the server admin tools, but I have found that the app really does do its job in terms of creating all the dns records for resolving the sites you create. I sure hope its not just using the host file, is it? I never see any additional files in the DNS manager, for any of the subdomains. Where are they?
Here is the contents of what appears to be the first file read, that is for SSL enabled sites:
``````````````````````````````````````````````````````````````````
This is "0000_any_443.conf:"
`````````````````````````````````````````````````````````````````
## Default Virtual Host Configuration
NameVIrtualHost *:443
<VirtualHost *:443>
ServerAdmin [email protected]
DocumentRoot "/path/to/the/docs"
DirectoryIndex index.html index.php /wiki/ default.html
CustomLog "//log" cmbndvhst
ErrorLog "/"
<IfModule mod_ssl.c>
SSLEngine On
SSLCipherSuite "SOMEGARBAGEIDONTKNOWIFISHOULDSHAREORWHAT"
SSLProtocol -ALL +SSLv3 +TLSv1
SSLProxyEngine On
SSLCertificateFile "/sslcerts/certs/*.DOMAIN.COM.XXXXXXXXXXXXXXXXXXXXXXXXXXXX.cert.pem"
SSLCertificateKeyFile "/sslcerts/certs/*.DOMAIN.COM.XXXXXXXXXXXXXXXXXXXXXXXXXXX.key.pem"
SSLCertificateChainFile "/path/*.DOMAIN.COM.XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX.chain.pem"
SSLProxyProtocol -ALL +SSLv3 +TLSv1
</IfModule>
<Directory "/Path/To/The/Docs/XXXX/SDFSDD">
Options All +MultiViews -ExecCGI -Indexes
AllowOverride None
<IfModule mod_dav.c>
DAV Off
</IfModule>
</Directory>
Include /httpd_passwordreset_required.conf
</VirtualHost>
```````````````````````````````````````````````````````````````````````````````` `````````````
So.. my questions are:
Where in the .confs do I add what I need from your above items? Would it go each of the site docs that I need? I am really not sure what apple is doing here.
I have 4 domain names resolving to my server right now, and subdomains to each of the domains. So there are a total of about 10 "site" docs, not a big deal to change each, I just wonder if Lion overwrites these docs with each refresh or what? Also, If I try to add a third .com right now it breaks the whole site.
(Out of conversation, but I just remembered this. I just had to "quit" out of the server.app.) When installing the directory server, it hangs on "getting certificates". The spinning wheel (not the rainbow collered one, but the black one by the words "Getting Certificates") just sits there and spins. I finally just hit the red X and relaunch server.
Lastly, you meniton importing the key. I am using the key manager within the server app. I am not sure where and how I would make the cert and key you are referring to for the importing? I have tried to use the key manager in the OS, but I am not sure of the relationship between that key manager app, and the key manager within the server.app. I have tried to create certs in the keymanager in the OS side, but I do not know how to get them to show up for use in the keymanager in the server.app.
BTW: Thanks. Thanks for the help. I really appreciate it. -
Odd Site-to-Site VPN Log Activity
I have two rv016s connected site-to-site to Netgear FVS114 and FVS124G. But while the SA lifetimes are set for 3600, I'm seeing tunnel activity in the logs almost every minute like this:
Mar 1 12:05:09 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:05:09 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:05:09 2014
VPN Log
[Tunnel Negotiation Info] >>> Initiator Send Quick Mode 3rd packet
Mar 1 12:05:09 2014
VPN Log
[Tunnel Negotiation Info] Outbound SPI value = da651654
Mar 1 12:05:09 2014
VPN Log
[Tunnel Negotiation Info] Inbound SPI value = fe2d6610
Mar 1 12:05:09 2014
VPN Log
[Tunnel Negotiation Info] <<< Initiator Received Quick Mode 2nd packet
Mar 1 12:05:09 2014
VPN Log
[Tunnel Negotiation Info] >>> Initiator send Quick Mode 1st packet
Mar 1 12:05:09 2014
VPN Log
initiating Quick Mode PSK+ENCRYPT+TUNNEL+NAT-T to replace #865
Mar 1 12:05:01 2014
VPN Log
Informational Exchange message is invalid because it has a previously used Message ID (0x8cf47d5c)
Mar 1 12:05:01 2014
VPN Log
Informational Exchange message is invalid because it has a previously used Message ID (0x8cf47d5c)
Mar 1 12:05:00 2014
VPN Log
Discarding duplicate packet; already STATE_MAIN_I4
Mar 1 12:04:53 2014
VPN Log
Informational Exchange message is invalid because it has a previously used Message ID (0x8cf47d5c)
Mar 1 12:04:49 2014
VPN Log
ignoring Delete SA payload: ISAKMP SA not found (maybe expired)
Mar 1 12:04:00 2014
VPN Log
[Tunnel Negotiation Info] Responder Cookies = 0ac d08f fcfe 73f
Mar 1 12:04:00 2014
VPN Log
[Tunnel Negotiation Info] Initiator Cookies = 4e7c fa42 a059 c577
Mar 1 12:04:00 2014
VPN Log
[Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Mar 1 12:04:00 2014
VPN Log
Main mode peer ID is ID_IPV4_ADDR: '10.168.2.2'(This is the Netgear IP address behind another router)
Mar 1 12:04:00 2014
VPN Log
[Tunnel Negotiation Info] >>> Initiator Receive Main Mode 6th packet
Mar 1 12:04:00 2014
VPN Log
[Tunnel Negotiation Info] >>> Initiator Send Main Mode 5th packet
Mar 1 12:04:00 2014
VPN Log
[Tunnel Negotiation Info] <<< Initiator Received Main Mode 4th packet
Mar 1 12:03:59 2014
VPN Log
[Tunnel Negotiation Info] >>> Initiator send Main Mode 3rd packet
Mar 1 12:03:59 2014
VPN Log
[Tunnel Negotiation Info] <<< Initiator Received Main Mode 2nd packet
Mar 1 12:03:59 2014
VPN Log
Ignoring Vendor ID payload [648982785bedbdd6...]
Mar 1 12:03:59 2014
VPN Log
Received Vendor ID payload Type = [Dead Peer Detection]
Mar 1 12:03:59 2014
VPN Log
Received Vendor ID payload Type = [draft-ietf-ipsec-nat-t-ike-00]
Mar 1 12:03:59 2014
VPN Log
[Tunnel Negotiation Info] >>> Initiator Send Main Mode 1st packet
Mar 1 12:03:59 2014
VPN Log
Initiating Main Mode to replace #863
Mar 1 12:03:32 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:03:28 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:03:28 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Mar 1 12:03:27 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Mar 1 12:03:27 2014
VPN Log
[Tunnel Negotiation Info] Outbound SPI value = c582ca66
Mar 1 12:03:27 2014
VPN Log
[Tunnel Negotiation Info] Inbound SPI value = fe2d660f
Mar 1 12:03:27 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Mar 1 12:01:10 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:00:31 2014
VPN Log
Informational Exchange message is invalid because it has a previously used Message ID (0xf14a5b81)
Mar 1 12:00:28 2014
VPN Log
ignoring Delete SA payload: ISAKMP SA not found (maybe expired)
Mar 1 12:00:09 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Here's another one that just seems like it's going bezerk with establishing tunnels:
Mar 1 12:30:49 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Mar 1 12:30:49 2014
VPN Log
[Tunnel Negotiation Info] Outbound SPI value = ee1d9944
Mar 1 12:30:49 2014
VPN Log
[Tunnel Negotiation Info] Inbound SPI value = ea54adfc
Mar 1 12:30:49 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Mar 1 12:30:49 2014
VPN Log
[Tunnel Negotiation Info] Responder Cookies = e7bb 8999 0bb 55f1
Mar 1 12:30:49 2014
VPN Log
[Tunnel Negotiation Info] Initiator Cookies = 1a2 43e6 50e7 c24b
Mar 1 12:30:49 2014
VPN Log
[Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Mar 1 12:30:49 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Mar 1 12:30:49 2014
VPN Log
Main mode peer ID is ID_IPV4_ADDR: '69.73.703.187'
Mar 1 12:30:49 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Mar 1 12:30:49 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Mar 1 12:30:48 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Mar 1 12:30:48 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Mar 1 12:30:48 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Mar 1 12:30:48 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Mar 1 12:30:48 2014
VPN Log
received Delete SA payload: deleting ISAKMP State #11132
Mar 1 12:30:45 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:45 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:45 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:45 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:40 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:40 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:40 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:40 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:40 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:40 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:40 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:36 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:36 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:36 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:36 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:36 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:36 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Mar 1 12:30:36 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Mar 1 12:30:36 2014
VPN Log
[Tunnel Negotiation Info] Outbound SPI value = 9afb9a70
Mar 1 12:30:36 2014
VPN Log
[Tunnel Negotiation Info] Inbound SPI value = ea54adfb
Mar 1 12:30:36 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Mar 1 12:30:35 2014
VPN Log
[Tunnel Negotiation Info] Responder Cookies = f39f a167 9a76 a182
Mar 1 12:30:35 2014
VPN Log
[Tunnel Negotiation Info] Initiator Cookies = 3e15 253 fde4 3a35
Mar 1 12:30:35 2014
VPN Log
[Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Mar 1 12:30:35 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Mar 1 12:30:35 2014
VPN Log
Main mode peer ID is ID_IPV4_ADDR: '69.73.703.187'
Mar 1 12:30:35 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Mar 1 12:30:35 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Mar 1 12:30:35 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Mar 1 12:30:34 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Mar 1 12:30:34 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Mar 1 12:30:34 2014
VPN Log
received Delete SA payload: deleting ISAKMP State #11130
Mar 1 12:30:31 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:31 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:31 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:31 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:31 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:26 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:26 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:26 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:26 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:26 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Outbound SPI value = 9a21d322
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Inbound SPI value = ea54adfa
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Responder Cookies = 33d1 9cc0 a279 7d4d
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Initiator Cookies = fff2 8d26 78e4 4845
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Mar 1 12:30:22 2014
VPN Log
Main mode peer ID is ID_IPV4_ADDR: '69.73.703.187'
Mar 1 12:30:22 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Mar 1 12:30:21 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Mar 1 12:30:21 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Mar 1 12:30:21 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Mar 1 12:30:21 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Mar 1 12:30:21 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Mar 1 12:30:21 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Mar 1 12:30:21 2014
VPN Log
received Delete SA payload: deleting ISAKMP State #11128
Mar 1 12:30:18 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:18 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:18 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:13 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:13 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:13 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:13 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:13 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Quick Mode Phase 2 SA Established, IPSec Tunnel Connected
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Quick Mode 3rd packet
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder send Quick Mode 2nd packet
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Outbound SPI value = f4dc2980
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Inbound SPI value = ea54adf9
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Quick Mode 1st packet
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Responder Cookies = be4b c078 afac 9ef6
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Initiator Cookies = 7c8e dd4d a0db 71d2
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] Main Mode Phase 1 SA Established
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder Send Main Mode 6th packet
Mar 1 12:30:08 2014
VPN Log
Main mode peer ID is ID_IPV4_ADDR: '69.73.703.187'
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 5th packet
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder send Main Mode 4th packet
Mar 1 12:30:08 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 3rd packet
Mar 1 12:30:07 2014
VPN Log
[Tunnel Negotiation Info] >>> Responder Send Main Mode 2nd packet
Mar 1 12:30:07 2014
VPN Log
[Tunnel Negotiation Info] <<< Responder Received Main Mode 1st packet
Mar 1 12:30:07 2014
VPN Log
received Delete SA payload: deleting ISAKMP State #11126
Mar 1 12:30:04 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:04 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:04 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:04 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:04 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:00 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:00 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
Mar 1 12:30:00 2014
VPN Log
Discarding duplicate packet; already STATE_QUICK_R2
I've highlighted in yellow all the things that I think are odd on the first one. Almost everything on the second one is odd to me. Any ideas why there's so much re-negotiation?
Huntsville's Premiere Car and Bike e-magazine: www.huntsvillecarscene.comSamir,
The logs are interesting. I would like to see the tunnel settings on the RV016 and Netgear. Can you post some screenshots? (Mask sensitive information)
- Marty -
Populating our log message along with standard sap log in ck11n.
Hi all,
I have developed a user exit which is used in costing of material using ck11n.
Here i have to show our custom log message along with the standard log shown by standard sap system after costing run is complete.
I got one FM-- CM_F_MESSAGE which is used by SAP. But i want the message along with SAP messages and not separately.
Can u help me out for this. its very urgent.
Thanks in advance.Hi
I'm not sure because I don't know that trx, but I seem the function group of that function manages a log, so you can try.
This is an extract of abap code of SAPLCKDI where that fm is used:
CALL FUNCTION 'CM_F_MESSAGE'
EXPORTING
ARBGB = Y_CMF-CK
MSGNR = '327'
MSGTY = Y_CMF-W
MSGV1 = SICHT
MSGV2 = KLVAR.
So I suppose you should call it by this way:
CALL FUNCTION 'CM_F_MESSAGE'
EXPORTING
ARBGB = <your message class>
MSGNR = <message number>
MSGTY = <message type>
MSGV1 = <text 1>
MSGV2 = <text 2>
MSGV3 = <text 3>
I think MSGV* is optional parameter.
Max -
I think I finished installing Mountain Lion, and am at the "log in" page with the Mountain Lion icon, but I cannot do any of the functions on screen. That is, I cannot log in, sleep, restart, or shut down. I am running it on an Early 2009 Macbook Pro, which is said to have the capabilities of running Mountain Lion.
BrettGoudy wrote:
...Is there any way I can install a partition that runs snow leopard on my early 2011 MB pro with what I have (new SSD, New RAM, Current version Lion running, no external drive, lack of original snow leopard disks [I lost them ] and the general 10.6.3 snow leopard boot disks)...
As the last post suggests, call Apple and order a replacement original disc for about $17. They will ask you the model and serial numbers.
Your retail version of Snow Leopard OS 10.6.3 will not work on that Mac as it requires a minimum of OS X 10.6.7 to boot and operate.
Another alternative is to again borrow another Mac to install your retail Snow Leopard into an external HD or partition, upgrade it to 10.6.8 and then clone it back to a partition on your MBP.
Maybe you are looking for
-
How to use OWN logical database
Hi all, hope somebody can help me. I copied a standard logical database (FPMF). The program which I use and have modified is also copied from standard. How can I assure that the program use MY logical database instead of the SAP-One? In my case I hav
-
Can i play different songs to different airplay speakers at the same time ?
Can i play different songs to different airplay speakers at the same time ? I know you can select the different speakers to play the music to, but wondered if you can also push different music to different speakers at the same time ? If not is there
-
When I open iTunes it keeps trying to download a previously downloaded purchase.
When I open iTunes with my iPhone attached to the computer, my computer keeps trying to download "Downton Abbey" Episode 3 Season 1, which locks up the computer for hourws. I have already downloaded this season, including this episode, syched it to t
-
I bought illustrator and the cloud won't download? Please help!!!
I have an iMac OS X and just bought the months usage for illustrator. When I go to download the software however, it makes me download Creative Cloud first but it won't do anything past the creative cloud installer load-up. It will load up to the end
-
Forcing Landscape orientation for TabBarController and NavigationController
Hello, I'm writing an application that need to force LandscapeRight with a UITabBarController that contains a UINavigationController that contains UIViewController. I can force UIViewController to landscape, but when I add the UINavigationController,