Ok, talked to Cisco. Got the one port directly connected to a laptop with the same class address. So far it's routing. Still need to test some other issues. I had it plugged into a switch with other machines in the same vlan. Those machine were taking 5 minutes to bring up a web page. I think it...
Yep, all the vlans are there.
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa2/1, Fa2/4, Fa2/5, Fa2/6
Fa2/7...
Here's what I'm doing:
!
interface FastEthernet2/2
switchport access vlan 4
no ip address
!
!
interface Vlan4
ip address 198.185.XXX.X 255.255.255.0
!
I set an address under vlan 4 but could not route.
I have a 3745 with a NM-16ESW network module installed. I'm trying to use the 16 ports as router ports from my network. Since they are layer 2, I can't set an ip address on these. What's the best way to set these ports so I can route through them?
Thanks
I have a test exchange 2003 server also running a Sharepoint 2003 Server. I can send and receive from Outlook but None of the web access exchange items work.
ex. http://server/exchange http://server/exadmin
All are 404 error? The virtual directory show this as a path...
Yes, they were a domain admin. I don't know why, another admin had given them the rights. :( I can make them power users. If i do this, how do change the local policy back to the domain admin having full rights to the machine?
A user has set a policy on their machine so the domain admin has no access to any of the policy settings or any other settings. I need to create a group policy that will not allow anyone to change the local admin password nor lock the domain admin out of anything. Any suggestions?
Thanks.
Actually I am setting it up that way. Int-router-pix-switch. The router is acting as the firewall now. In fact I ordered the router with the extra ethernet just for this.
Thanks,
Ron
The only reason it's set up this way is to test the vpn currently.
Just got off the phone with Cisco. Here's what I did and it seems to work.
Remove:
nat (inside) 0 0.0.0.0 0.0.0.0
Remove:
nat (inside) 0 access-list inside_outbound_nat0_acl (wasn't there)
Add:
static (inside, outside)...
One FYI, I had someone using the vpn client logged into the pix. I did a show crypto ipsec sa. I can see decrypted packets but nothing encrypted. So it looks like once someone is logged in they cannot get outside the pix. From using telnet and logging into the pix I can ping around to different...
Yes the line is access-list split permit ip 198.185.17x.x 255.255.255.0 192.168.0.0 255.255.255.0
I have tried without the split tunnel and get the same results.
The router is a perimeter router. Here's the scenario we are trying to do currently. The pix will only be used for a vpn right now. I have a few off-site staff that need to access our local servers (Win2K etc). We have a Cisco 2651 Router with 3 T's coming into it. Inside the network we use 2...
Not resolved yet. Cisco thinks it may be a routing problem but I can't find anything wrong on the router. I've added the needed static route but no luck. I may move this to a higher priority with Cisco.
515 Pix currently only need it for a vpn to our local network from offsite. Here's the config.
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security10
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd BRZuZRbo127.Mrzz encrypted
hostname xxxxx...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.