Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations TouchToneTommy on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Recent content by Decryptk33p3r

  1. Decryptk33p3r

    Unable to get LDAP through VPN

    Check to see if you have a fixup protocol ils in the top portion of your config. If so remove it by doing, no fixup proto ils. Mike
  2. Decryptk33p3r

    PIX 501 question

    You have no DHCPD addresses! It should look like this: dhcpd address 192.168.1.2-192.168.1.254 inside dhcpd dns 12.127.16.67 12.127.17.72 dhcpd wins x.x.x.x x.x.x.x dhcpd lease 3600 dhcpd ping_timeout 750 dhcpd domain xxxx.com dhcpd enable inside This should help you. Mike
  3. Decryptk33p3r

    Accessing server behind PIX 501

    Best way to do this is a client VPN connection through the PIX into the trusted network then w/remote desktop you can access it. Or do a static one for one translation & open yourself up to the world. VPN is the way to go. Mike
  4. Decryptk33p3r

    SNMP traps\polling thru PIX 515

    What do you have configured for SNMP? Did you allow community strings on both 2600s & the PIX? Do you have port 161 open? Mike
  5. Decryptk33p3r

    Unable to get LDAP through VPN

    What version of code are you on? Mike
  6. Decryptk33p3r

    MTU problem?

    MTU is at 1500, unless your running some type of old SNA I would think the MTU should be fine. Mike
  7. Decryptk33p3r

    PIX IPSEC VPN NAT PROBLEM

    First off keep it simple! Kill the names until it's working. 2nd you have an outside ip 99.99.99.99 255.255.255.240 w/a route outside of 62.206.41.65, can you even ping the default route. Ping outside 62.206.41.65 do you get a reply? Kill these 2 transform sets, crypto ipsec transform-set...
  8. Decryptk33p3r

    lan to dmz

    Well you have to create ACLs for this. For example if you have internal net. 192.168.1.0/24 & the DMZ is 172.168.4.0/24 the ACLs go source then destination. Example: access-list in2dmz permit ip 192.168.1.0 255.255.255.0 172.168.4.0 255.255.255.0 Then: access-group in2dmz in interface dmz This...
  9. Decryptk33p3r

    PIX 506e unable to establish a VPN connection HELP!

    Yes, UDP/500 is part of the crypto process, but if you are passing through a PIX from something like a client, If this is the case then you need UDP/500 protocol 50 & 51 AH & ESP opened to pass client through. If you are trying to just L2L crypto tunnel up that's different. What version are you...
  10. Decryptk33p3r

    Using Sonicwall back to back for traffic filter then firewall

    Trying to setup sonics back to back, sonic 1 being a scrub house for all traffic, monitoring etc. then forward all traffic vpn etc. to the firewall for normal delivery. Need some advice on how to do this.
  11. Decryptk33p3r

    SONIC Wall, How do I build an Internet Safe zone?

    What I'm trying to do is build a safe zone for all traffic to pass through for content filter monitor & traffic monitor, also have a mail scrubber in the safe zone. Then forward all traffic vpn & otherwise through to the firewall ( a second sonic ) for normal translation into the trusted zone...
  12. Decryptk33p3r

    Need assit. on setting up a CallManager Unit license for single 7940 I

    Cisco CallManager unit,I have Cisco knowledge but have never setup a CallManager before. Any input would help, Thanks in advance
  13. Decryptk33p3r

    Denial of Service- what could cause this?

    Sorry I was a little late. Glad you resolved the problem.
  14. Decryptk33p3r

    DES Encryption

    Yes, Cain & Able. What level of crypto do you need? At the tool bar, top side on the right is a crypto gen.
  15. Decryptk33p3r

    Denial of Service- what could cause this?

    It sounds to me like you have the same user doing wireless & connecting to the LAN wired, if this is the case then what you have now is a bridged loop in the network & that can storm your network to a crawl, just like a DOS attack.

Part and Inventory Search

Back
Top