Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Problem DescriptionAC cannot get address via DHCP and so the connection fails.It works fine from local pool.Validating address: 0.0.0.0
CSTP state = WAIT_FOR_ADDRESS
webvpn_cstp_accept_address: 0.0.0.0/0.0.0.0
webvpn_cstp_accept_address: no address?!...
Introduction:Problem:Solution:Source Discussion: Introduction:This document describes an issue faced by an user and a training ".ppt" for multiple contextProblem:User is trying to understand all options for routing to two different ASA's in active/ac...
Ok the problem in the outside access list:
access-list outside_access_in extended permit tcp any host 10.0.1.114 eq 32400
it should be like this:
access-list outside_access_in extended permit tcp any interface outside eq 32400
In ASA 8.2 -> y...
HelloAs they are not not synchronized, having a zero down time will not be valid here. Unless you apply the whole configuration manually to the standby.you need to upgrade the active first and then the standby (shutdown the failover links until you h...
Hello David,Have you opened the outside ACL for the needed service port ?can you please send me the show running in a file and i can give you the complete needed configuration for this.regards,Tariq
Unfortunately at this moment there is no a supported method to disable this option on ACS.this issue addressed by:CSCup58251 Cisco Secure ACS evaluation of CVE-2008-5161https://tools.cisco.com/bugsearch/bug/CSCup58251/?reffering_site=dumpcrAll ACS...
You have to enable the nat-tranperancy feature so the traffic would be encapsulated by UDP 4500 (NAT-T) and overcome the PAT issue with ESP.It must be enabled by default on both routers, so you need to check, do the following:crypto ipsec nat-transpa...