Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hey guys.I ve got a problem with the ACS 4.2 just in authenticationI have a 3750 Catalyst and installed an ACS 4.2 both in 1 zone. They can ping each other and there is no problem in their connectivity. I ve created a user called “test” in ACS local...
Hi allIm trying to install a site to site IPsec between 2 different routers (Cisco 3750 & Fortigate 100A) (R1 & Fortigate100A)with out installing IPsec, the whole scenario is working properly.But unfortunately the IPsec tunnel (between R1 & Fortigate...
Dear Sir/Madam, Good day to you. Beforehand, I really appreciate you because of spending your time to read this post.I am MSc Networking Professional student in UK. I am doing my dissertation which is related to the NAT-PT and IPv6.It is about 4 day...
Dear Sir/Madam, Good day to you. Beforehand, I really appreciate you because of spending your time to read this post.I am MSc Networking Professional student in UK. I am doing my dissertation which is related to the NAT-PT and IPv6.It is about 4 day...
Tnx for your reply Ed.As it was already mentioned the user was created on local ACS database and the switch was added too.I have attached a screenshot of configured ACS and its report section.the debug commands that was used to capture above informat...
Dear Hardik,the configuration of the Fortigate Firewall is inserted as 2 jpg files and the running configuratiin of the Cisco Router has been pasted as follow:R1#sh runBuilding configuration...Current configuration : 1286 bytesversion 12.4service tim...
Thank you all for your repliesWe got another problem now.The tunnel would be up and active IF the first packet is sent from the Fortigate firewall not Cisco router, otherwise, the tunnel won’t be up. in othre words, the first packet must be sent to t...
Dear HardikThere is not any configured NAT in the Cisco router or Fortigate Firewall and the only access list is defined on the cisco R1 is 101 access list, which is:Access-list:101 permit ip 10.0.0.0 0.0.0.255 10.10.10.0 0.0.0.255the result of the c...
Tnx for your prompt reply Jeff.I changed the phase 2 remote address to the 10.0.0.0/24, as u mentioned, and changed the phase 1 IKE from agressive to the main mode as well, but still is not functioning.the result of "show crypto session" command in...