Hi floks.
In some advice please. we running ACI multipod between to Data Centers. we classified these DCs as Primary and Secondary due to legacy setup prior to going into ACI deployment. The ACI deployment is in Network Centric.
we have APIC 2xAPIC i...
Hi.
to fix this go to Deployment -->General Setting -- untick the PxGrid prob and save. than after 5 min go back and tick this PxGrid prob. it will fix the issue you noted earlier java.lang.NullPointerException
I was hitting this bug ISE versi...
Hi folks.
we hit a APIC bug CSCvu62127. the symptoms were; Upon fabric discovery, we are receiving a fault code F3031
TAC ask to provide,
show controller
acidiag fnvread
acidiag avread
acidiag rvread
moquery -c faultInst -f 'fault.Inst.code=...
I was testing FMC 6.5 with FTD 6.5. I need to set up an tcp advanced option by pass. below command does not work as we use them in ASA.
class-map tcp_bypass
match access-list $TCP_Bypass
policy-map tcp_bypass_policy
class tcp_bypass
set connection ra...
I have tested on my ASA version 9.12.14 it took the asa about 30+ minutes to initiate the rest-api services on asa (then page started to load up with api) with similar to your configuration. First the page was not loading and I was keep getting the m...
Looking into your packet capture its seem there is activity going on. Can you send ping to 8.8.8.8 from your device once connected to AP?
you need to define DNS in your dhcpd
dhcpd address 192.168.1.65-192.168.1.250 Wi-Fi
dhcpd dns 208.67.222.222 20...
All Cisco ASA series models configurations are same. Cisco ASA devices allow for configuration to be made via a Java application. In order to set the ASA up to use the Java application, you will need to complete some basic configuration from the CLI ...
can you try this configuration
ip access-list extended Remote-VPN-Public-IP-Address
permit ip host 154.74.133.2
!
ip access-list extended VPN_ACL
10 permit ip host 192.168.70.10 host X.X.X.X
!
route-map nonat permit 20
match ip address Remote-VPN-P...
Good responce by @tvotna but do think this nat rule is not required and this is a wrong rule.
nat (outside,outside) source static 10.10.40.86 10.10.40.86 destination static 109.A.B.C 109.A.B.C no-proxy-arp route-lookup
you can capture the packet on i...