RE: VPN clinet 3.6.X can't connect VPN3000? [7:70589]

2003-06-12 Thread Richard Campbell
Hey.. my answers are...

>Have you got the correct IP as the peer ?
Yes--> It prompts me remote peer not responding.  Immediately I uninstall 
3.6.X and install 3.5.4, it works.  I tried it many time, impossible for 
wrong IP

>Have you setup the correct access method for that group ? PPTP/IPSEC/L2TP
how to set the access method? PPTP/IPSEC/L2TP?  in the VPN client software 
itself???

>Have you typed in the group password correctly ?
Yes.. the password is correct, try many time


>From: John Brandis 
>To: 'Richard Campbell' 
>Subject: RE: VPN clinet 3.6.X can't connect VPN3000? [7:70589]
>Date: Fri, 13 Jun 2003 09:34:46 +1000
>
>I have not had this problem, however I did have problems with 3.6.3
>
>This may sound stupid, but:
>
>Have you got the correct IP as the peer ?
>Have you setup the correct access method for that group ? PPTP/IPSEC/L2TP
>Have you typed in the group password correctly ?
>
>Hope at least one of these solve your probelm, sorry if they make you feel 
>a
>bit stupid
>
>-Original Message-
>From: Richard Campbell [mailto:[EMAIL PROTECTED]
>Sent: Friday, 13 June 2003 1:40 AM
>To: [EMAIL PROTECTED]
>Subject: VPN clinet 3.6.X can't connect VPN3000? [7:70589]
>
>
>Can I ask a question, my VPN client 3.6.4 (Rel) and 3.6.x can't connect to
>VPN3000 concentrator and only to my PIX515.  I  have to use VPN client
>version 3.5.4 in order to connect to VPN3000 and PIX 515.  Why??
>
>FYI..  my VPN3000 info is
>Cisco Systems, Inc./VPN 3000 Concentrator Version 4.0.1.Rel May 06 2003
>13:13:03
>
>_
>Tired of spam? Get advanced junk mail protection with MSN 8.
>http://join.msn.com/?page=features/junkmail
>**
>
>This email message (and attachments) may contain information that is 
>confidential to Solution 6. If you are not the intended recipient you 
>cannot use, distribute or copy the message or attachments.  In such a case, 
>please notify the sender by return email immediately and erase all copies 
>of the message and attachments.  Opinions, conclusions and other 
>information in this message and attachments that do not relate to the 
>official business of Solution 6 are neither given nor endorsed by it.
>
>*
>

_
Protect your PC - get McAfee.com VirusScan Online 
http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=70617&t=70589
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


VPN clinet 3.6.X can't connect VPN3000? [7:70589]

2003-06-12 Thread Richard Campbell
Can I ask a question, my VPN client 3.6.4 (Rel) and 3.6.x can't connect to 
VPN3000 concentrator and only to my PIX515.  I  have to use VPN client 
version 3.5.4 in order to connect to VPN3000 and PIX 515.  Why??

FYI..  my VPN3000 info is
Cisco Systems, Inc./VPN 3000 Concentrator Version 4.0.1.Rel May 06 2003 
13:13:03

_
Tired of spam? Get advanced junk mail protection with MSN 8. 
http://join.msn.com/?page=features/junkmail




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=70589&t=70589
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


VPN3000 [7:16559]

2001-08-20 Thread Spencer Plantier

I have a network that has 2 subnets on the inside.
Unfortunately one subnet is a 10 network that is
hardcoded and cannot be changed. The other is
172.x.x.x network which I can see find when I VPN in.
I cannot see the 10.x.x.x network from the VPN. I have
a 2912 connected to the inside of the VPN and it sees
the 10.x.x.x network fine. I have try to the 10.x.x.x
network to the VPN box and the switch from a 2610
router where the 10.x.x.x is located but didnt seem to
help. 

Any thoughts would be appreciated.

Thanks.


=
Spencer Plantier
Internet Solutions Engineer
Voice 919-949-9993
Cell 919-696-8848

__
Do You Yahoo!?
Make international calls for as low as $.04/minute with Yahoo! Messenger
http://phonecard.yahoo.com/




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=16559&t=16559
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: PIX/w/WIN2k VPN3000 client problem [7:12181]

2001-07-12 Thread Peter Slow

get a reboot approved.


-Original Message-
From: Ayers, Michael [mailto:[EMAIL PROTECTED]]
Sent: Thursday, July 12, 2001 2:40 PM
To: [EMAIL PROTECTED]
Subject: PIX/w/WIN2k VPN3000 client problem [7:12181]


I'm having a problem. I'm running a PIX520 (5.3) with multiple VPNGROUPs.  I
have a client installed on a WIN2k machine.  The machine was using a group
that didn't split tunnel.  I changed the group to a group that does, and now
I get a failed to negotiate error AFTER THE LOGON and the "Your link is now
secure" error.  I have cleared IPSEC SA and ISAKMP SA.  I even went as far
as deleting the MAPS.  The Client has been removed and re-installed.  I'm
thinking the problem is either something embedded somewhere in the WIN2k, or
an association to the peer IP in the PIX, but I have successfully changed
the group on other win 9x machines without a problem after the SA timed out,
and the Dynamic Maps cleared.  This is a production PIX, but do I get a
reboot approved to try to clear old info out of memory, or do I go after the
client and see if the problem lies there?

Any input appreciated.


Thank you,

Michael 

Privileged/Confidential Information may be contained in this message or
attachments hereto.  Please advise immediately if you or your employer do
not consent to Internet email for messages of this kind.  Opinions,
conclusions and other information in this message that do not relate to the
official business of this company shall be understood as neither given nor
endorsed by it.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=12190&t=12181
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



PIX/w/WIN2k VPN3000 client problem [7:12181]

2001-07-12 Thread Ayers, Michael

I'm having a problem. I'm running a PIX520 (5.3) with multiple VPNGROUPs.  I
have a client installed on a WIN2k machine.  The machine was using a group
that didn't split tunnel.  I changed the group to a group that does, and now
I get a failed to negotiate error AFTER THE LOGON and the "Your link is now
secure" error.  I have cleared IPSEC SA and ISAKMP SA.  I even went as far
as deleting the MAPS.  The Client has been removed and re-installed.  I'm
thinking the problem is either something embedded somewhere in the WIN2k, or
an association to the peer IP in the PIX, but I have successfully changed
the group on other win 9x machines without a problem after the SA timed out,
and the Dynamic Maps cleared.  This is a production PIX, but do I get a
reboot approved to try to clear old info out of memory, or do I go after the
client and see if the problem lies there?

Any input appreciated.


Thank you,

Michael 

Privileged/Confidential Information may be contained in this message or
attachments hereto.  Please advise immediately if you or your employer do
not consent to Internet email for messages of this kind.  Opinions,
conclusions and other information in this message that do not relate to the
official business of this company shall be understood as neither given nor
endorsed by it.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=12181&t=12181
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Fw: Cisco Security Advisory: Cisco VPN3000 Concentrator IP [7:12003]

2001-07-11 Thread Allen May

FYI for those I've seen posting lately about the 3000 series Concentrators.


- Original Message -
From: "Cisco Systems Product Security Incident Response Team"

To: 
Sent: Thursday, April 12, 2001 11:45 AM
Subject: Cisco Security Advisory: Cisco VPN3000 Concentrator IP Options
Vulnerability


>
> -BEGIN PGP SIGNED MESSAGE-
>
> Cisco Security Advisory: VPN 3000 Concentrator IP Options Vulnerability
>

=
> Revision 1.0
>
> For Public Release 2001 April 12 at 1500 UTC
>
>   
>
> Summary
> ===
> If a crafted IP packet, with an invalid IP Option setting is transmitted
to
> a VPN 3000 series concentrator on the same network segment (no routers in
> between), it can cause the VPN 3000 series concentrator to hang with a
100%
> CPU Utilization. The concentrator would then have to be reset. After
> rebooting, the equipment would function normally until the crafted IP
> packet is received again. The defect can be exploited to produce a denial
> of service (DoS) attack.
>
> The vulnerability is described in Cisco bug id CSCds92460.
>
> This notice will be posted at
> http://www.cisco.com/warp/public/707/vpn3k-ipoptions-vuln-pub.shtml
>
> Affected Products
> =
> Cisco VPN 3000 series concentrators running software releases up to but
not
> including revision 2.5.2 (F) are affected by this vulnerability. This
> series includes models 3005, 3015, 3030, 3060, and 3080.
>
> Any VPN 3000 series concentrators running revision 2.5.2 (F) or later are
> unaffected by this vulnerability.
>
> This vulnerability does not affect the VPN 5000 series concentrators. No
> other Cisco product is known to be affected by this vulnerability.
>
> To determine if a Cisco VPN 3000 series concentrator is running affected
> software, check the revision via the web interface or the console menu.
>
> Details
> ===
> If a crafted IP packet, with an invalid IP Option setting, is transmitted
> to a VPN 3000 series concentrator on the same network segment (no routers
> in between), on either the Inside or the Outside interface, it can cause
> the VPN 3000 series concentrator to hang with a 100 % CPU Utilization. The
> concentrator would then have to be reset via the console port as no SNMP
or
> HTTP remote management control would be possible. After rebooting, the
> equipment would function normally until the crafted IP packet is received
> again.
>
> In order to exploit this vulnerability the attacker must be on the same
> network segment as the concentrator without any routers in between. A
> crafted IP packet traversing a router would typically get its invalid IP
> Options dropped and would not be able to affect the VPN 3000 series
> concentrator.
>
> The vulnerability is documented as Cisco bug id CSCds92460.
>
> Impact
> ==
> When this crafted IP packet is received by the VPN 3000 series
> concentrator, the concentrator will stop passing traffic and will not
> respond to any management inquiries via SNMP, Telnet or HTTP. However
> management via the console port is possible.
>
> For VPN 3000 series concentrator models 3015, 3030, 3060, and 3080 the CPU
> Utilization bar graph indicator on the front panel will go to 100%.
>
> Software Versions and Fixes
> ===
> The vulnerability has been fixed in revision 2.5.2 (E) code. The fix will
> be carried forward into all future releases.
>
> However due to the advisory at
> http://www.cisco.com/warp/public/707/vpn3k-telnet-vuln-pub.shtml the
> recommended revision to upgrade to is 2.5.2 (F)
>
> Upgrade can be done via the remote software upgrade feature using the VPN
> 3000 series concentrator's web based management interface.
>
> Obtaining Fixed Software
> 
> Cisco is offering free software upgrades to remedy this vulnerability for
> all affected customers. Customers with service contracts may upgrade to
any
> software release. Customers may install only the feature sets they have
> purchased.
>
> Fixed software is currently available.
>
> Customers with contracts should obtain upgraded software through their
> regular update channels. For most customers, this means that upgrades
> should be obtained via Cisco's Software Center at http://www.cisco.com/.
>
> Customers without contracts or warranty should get their upgrades by
> contacting the Cisco Technical Assistance Center (TAC) as shown below:
>
>* (800) 553-2447 (toll-free in North America)
>* +1 408 526 7209 (toll call from anywhere in the world)
>* e-mail: [EMAIL PROTECTED]
&

Fw: Cisco Security Advisory: Cisco VPN3000 Concentrator IP [7:364]

2001-04-12 Thread EA Louie

FYI if you're using the former Altiga VPN concentrator...

- Original Message -
From: "Cisco Systems Product Security Incident Response Team"

To: 
Sent: Thursday, April 12, 2001 9:45 AM
Subject: Cisco Security Advisory: Cisco VPN3000 Concentrator IP Options
Vulnerability


>
> -BEGIN PGP SIGNED MESSAGE-
>
> Cisco Security Advisory: VPN 3000 Concentrator IP Options Vulnerability
>

=
> Revision 1.0
>
> For Public Release 2001 April 12 at 1500 UTC
>
>   
>
> Summary
> ===
> If a crafted IP packet, with an invalid IP Option setting is transmitted
to
> a VPN 3000 series concentrator on the same network segment (no routers in
> between), it can cause the VPN 3000 series concentrator to hang with a
100%
> CPU Utilization. The concentrator would then have to be reset. After
> rebooting, the equipment would function normally until the crafted IP
> packet is received again. The defect can be exploited to produce a denial
> of service (DoS) attack.
>
> The vulnerability is described in Cisco bug id CSCds92460.
>
> This notice will be posted at
> http://www.cisco.com/warp/public/707/vpn3k-ipoptions-vuln-pub.shtml
>
> Affected Products
> =
> Cisco VPN 3000 series concentrators running software releases up to but
not
> including revision 2.5.2 (F) are affected by this vulnerability. This
> series includes models 3005, 3015, 3030, 3060, and 3080.
>
> Any VPN 3000 series concentrators running revision 2.5.2 (F) or later are
> unaffected by this vulnerability.
>
> This vulnerability does not affect the VPN 5000 series concentrators. No
> other Cisco product is known to be affected by this vulnerability.
>
> To determine if a Cisco VPN 3000 series concentrator is running affected
> software, check the revision via the web interface or the console menu.
>
> Details
> ===
> If a crafted IP packet, with an invalid IP Option setting, is transmitted
> to a VPN 3000 series concentrator on the same network segment (no routers
> in between), on either the Inside or the Outside interface, it can cause
> the VPN 3000 series concentrator to hang with a 100 % CPU Utilization. The
> concentrator would then have to be reset via the console port as no SNMP
or
> HTTP remote management control would be possible. After rebooting, the
> equipment would function normally until the crafted IP packet is received
> again.
>
> In order to exploit this vulnerability the attacker must be on the same
> network segment as the concentrator without any routers in between. A
> crafted IP packet traversing a router would typically get its invalid IP
> Options dropped and would not be able to affect the VPN 3000 series
> concentrator.
>
> The vulnerability is documented as Cisco bug id CSCds92460.
>
> Impact
> ==
> When this crafted IP packet is received by the VPN 3000 series
> concentrator, the concentrator will stop passing traffic and will not
> respond to any management inquiries via SNMP, Telnet or HTTP. However
> management via the console port is possible.
>
> For VPN 3000 series concentrator models 3015, 3030, 3060, and 3080 the CPU
> Utilization bar graph indicator on the front panel will go to 100%.
>
> Software Versions and Fixes
> ===
> The vulnerability has been fixed in revision 2.5.2 (E) code. The fix will
> be carried forward into all future releases.
>
> However due to the advisory at
> http://www.cisco.com/warp/public/707/vpn3k-telnet-vuln-pub.shtml the
> recommended revision to upgrade to is 2.5.2 (F)
>
> Upgrade can be done via the remote software upgrade feature using the VPN
> 3000 series concentrator's web based management interface.
>
> Obtaining Fixed Software
> 
> Cisco is offering free software upgrades to remedy this vulnerability for
> all affected customers. Customers with service contracts may upgrade to
any
> software release. Customers may install only the feature sets they have
> purchased.
>
> Fixed software is currently available.
>
> Customers with contracts should obtain upgraded software through their
> regular update channels. For most customers, this means that upgrades
> should be obtained via Cisco's Software Center at http://www.cisco.com/.
>
> Customers without contracts or warranty should get their upgrades by
> contacting the Cisco Technical Assistance Center (TAC) as shown below:
>
>* (800) 553-2447 (toll-free in North America)
>* +1 408 526 7209 (toll call from anywhere in the world)
>* e-mail: [EMAIL PROTECTED]
>
> See http:

RE: W2K Client for VPN3000?

2001-03-28 Thread Pickard, Richard

Thanks

-Original Message-
From: Chris Lemagie [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, March 28, 2001 3:56 PM
To: Henry Rollins
Cc: Jeff Groman; Weil, Timothy R; Group Study (List) (E-mail)
Subject: RE: W2K Client for VPN3000?


Pix OS 6.0 is in Beta now with a projected release date (FCS) of April
25th.

Chris Lemagie

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Henry Rollins
Sent: Tuesday, March 27, 2001 6:14 PM
To: Chris Lemagie
Cc: Jeff Groman; Weil, Timothy R; Group Study (List) (E-mail)
Subject: RE: W2K Client for VPN3000?


This is amusing (from the userguide) --

* Support for Cisco Secure PIX Firewall platforms that run Release 6.0
and above.

Any idea when 6.0 might debut?

Thanks


Quoting Chris Lemagie <[EMAIL PROTECTED]>:

> The client on the page listed below is actually the 3.01 client...
>
> Chris Lemagie
> Systems Engineer
> Cisco Systems
> Seattle Commercial Region
> (425) 468-0959
> [EMAIL PROTECTED]
> http://www.cisco.com/
>
> -Original Message-
> From: Jeff Groman [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, March 27, 2001 4:03 PM
> To: Chris Lemagie
> Cc: Weil, Timothy R; Group Study (List) (E-mail)
> Subject: RE: W2K Client for VPN3000?
>
>
> They also have a 3.01 Release available that came as a result of the
Beta
> program.  However, it hasn't shown up yet on the page listed below.
If
> you were part of the beta, they sent you a link and login to get it.
> Hopefully they'll update the software page soon.
>
> Jeff
>
>
>
> Jeff Groman
> IS Department,Childrens Hospital, Denver
> [EMAIL PROTECTED]
> 303 864 5671
>
> On Tue, 27 Mar 2001, Chris Lemagie wrote:
>
> > Go to CCO (http://www.cisco.com) and login with your username.
> >
> > Select the Software Center Link.
> > Select the VPN Software Link.
> > Select the Cisco VPN Client Link.
> > Select the Download Cisco 3DES Cryptographic Software under export
> licensing
> > controls Link.
> > There you are...
> >
> > You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you
> attempt
> > to run the v3.0 client which supports Windows 2000.  Version 3.0 of
the
> > concentrator software will support older clients, but older
concentrator
> > software images will not work with the new client.
> >
> > Chris Lemagie
> >
> > -Original Message-
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf
Of
> > Weil, Timothy R
> > Sent: Tuesday, March 27, 2001 1:52 PM
> > To: Group Study (List) (E-mail)
> > Subject: W2K Client for VPN3000?
> >
> >
> > looking for sources for finding the client software.
> > it does not come with standard VPN3000 CD.
> > thanks.
> >
> > Tim Weil - CCNP
> > Sr. Consultant
> > > kpmg Consulting
> > >  Network Solutions (KCNS)
> > Cell   301.452.3641
> > Office 703.747.8950
> > Fax240.337.1305
> > >
> > >
> >
>

*
***
> > *
> > The information in this email is confidential and may be legally
> privileged.
> > It is intended solely for the addressee. Access to this email by
anyone
> else
> > is unauthorized.
> >
> > If you are not the intended recipient, any disclosure, copying,
> distribution
> > or any action taken or omitted to be taken in reliance on it, is
> prohibited
> > and may be unlawful. When addressed to our clients any opinions or
advice
> > contained in this email are subject to the terms and conditions
expressed
> in
> > the governing KPMG client engagement letter.
> >
>

*
***
> > *
> >
> > _
> > FAQ, list archives, and subscription info:
> > http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to
[EMAIL PROTECTED]
> >
> > _
> > FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to
[EMAIL PROTECTED]
> >
>
>
> _
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>


--
FREE ANONYMOUS EMAIL!  Sign up now.
http://www.subdimension.com/freemail

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: W2K Client for VPN3000?

2001-03-28 Thread Chris Lemagie

Pix OS 6.0 is in Beta now with a projected release date (FCS) of April 25th.

Chris Lemagie

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Henry Rollins
Sent: Tuesday, March 27, 2001 6:14 PM
To: Chris Lemagie
Cc: Jeff Groman; Weil, Timothy R; Group Study (List) (E-mail)
Subject: RE: W2K Client for VPN3000?


This is amusing (from the userguide) --

• Support for Cisco Secure PIX Firewall platforms that run Release 6.0
and above.

Any idea when 6.0 might debut?

Thanks


Quoting Chris Lemagie <[EMAIL PROTECTED]>:

> The client on the page listed below is actually the 3.01 client...
>
> Chris Lemagie
> Systems Engineer
> Cisco Systems
> Seattle Commercial Region
> (425) 468-0959
> [EMAIL PROTECTED]
> http://www.cisco.com/
>
> -Original Message-
> From: Jeff Groman [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, March 27, 2001 4:03 PM
> To: Chris Lemagie
> Cc: Weil, Timothy R; Group Study (List) (E-mail)
> Subject: RE: W2K Client for VPN3000?
>
>
> They also have a 3.01 Release available that came as a result of the
Beta
> program.  However, it hasn't shown up yet on the page listed below.  If
> you were part of the beta, they sent you a link and login to get it.
> Hopefully they'll update the software page soon.
>
> Jeff
>
>
>
> Jeff Groman
> IS Department,Childrens Hospital, Denver
> [EMAIL PROTECTED]
> 303 864 5671
>
> On Tue, 27 Mar 2001, Chris Lemagie wrote:
>
> > Go to CCO (http://www.cisco.com) and login with your username.
> >
> > Select the Software Center Link.
> > Select the VPN Software Link.
> > Select the Cisco VPN Client Link.
> > Select the Download Cisco 3DES Cryptographic Software under export
> licensing
> > controls Link.
> > There you are...
> >
> > You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you
> attempt
> > to run the v3.0 client which supports Windows 2000.  Version 3.0 of
the
> > concentrator software will support older clients, but older
concentrator
> > software images will not work with the new client.
> >
> > Chris Lemagie
> >
> > -Original Message-
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf
Of
> > Weil, Timothy R
> > Sent: Tuesday, March 27, 2001 1:52 PM
> > To: Group Study (List) (E-mail)
> > Subject: W2K Client for VPN3000?
> >
> >
> > looking for sources for finding the client software.
> > it does not come with standard VPN3000 CD.
> > thanks.
> >
> > Tim Weil - CCNP
> > Sr. Consultant
> > > kpmg Consulting
> > >  Network Solutions (KCNS)
> > Cell   301.452.3641
> > Office 703.747.8950
> > Fax240.337.1305
> > >
> > >
> >
>
*
***
> > *
> > The information in this email is confidential and may be legally
> privileged.
> > It is intended solely for the addressee. Access to this email by
anyone
> else
> > is unauthorized.
> >
> > If you are not the intended recipient, any disclosure, copying,
> distribution
> > or any action taken or omitted to be taken in reliance on it, is
> prohibited
> > and may be unlawful. When addressed to our clients any opinions or
advice
> > contained in this email are subject to the terms and conditions
expressed
> in
> > the governing KPMG client engagement letter.
> >
>
*
***
> > *
> >
> > _
> > FAQ, list archives, and subscription info:
> > http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to
[EMAIL PROTECTED]
> >
> > _
> > FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to
[EMAIL PROTECTED]
> >
>
>
> _
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>


--
FREE ANONYMOUS EMAIL!  Sign up now.
http://www.subdimension.com/freemail

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: W2K Client for VPN3000?

2001-03-27 Thread Henry Rollins

This is amusing (from the userguide) --

• Support for Cisco Secure PIX Firewall platforms that run Release 6.0 
and above.

Any idea when 6.0 might debut?

Thanks


Quoting Chris Lemagie <[EMAIL PROTECTED]>:

> The client on the page listed below is actually the 3.01 client...
>
> Chris Lemagie
> Systems Engineer
> Cisco Systems
> Seattle Commercial Region
> (425) 468-0959
> [EMAIL PROTECTED]
> http://www.cisco.com/
>
> -Original Message-
> From: Jeff Groman [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, March 27, 2001 4:03 PM
> To: Chris Lemagie
> Cc: Weil, Timothy R; Group Study (List) (E-mail)
> Subject: RE: W2K Client for VPN3000?
>
>
> They also have a 3.01 Release available that came as a result of the 
Beta
> program.  However, it hasn't shown up yet on the page listed below.  If
> you were part of the beta, they sent you a link and login to get it.
> Hopefully they'll update the software page soon.
>
> Jeff
>
>
>
> Jeff Groman
> IS Department,Childrens Hospital, Denver
> [EMAIL PROTECTED]
> 303 864 5671
>
> On Tue, 27 Mar 2001, Chris Lemagie wrote:
>
> > Go to CCO (http://www.cisco.com) and login with your username.
> >
> > Select the Software Center Link.
> > Select the VPN Software Link.
> > Select the Cisco VPN Client Link.
> > Select the Download Cisco 3DES Cryptographic Software under export
> licensing
> > controls Link.
> > There you are...
> >
> > You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you
> attempt
> > to run the v3.0 client which supports Windows 2000.  Version 3.0 of 
the
> > concentrator software will support older clients, but older 
concentrator
> > software images will not work with the new client.
> >
> > Chris Lemagie
> >
> > -----Original Message-
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf 
Of
> > Weil, Timothy R
> > Sent: Tuesday, March 27, 2001 1:52 PM
> > To: Group Study (List) (E-mail)
> > Subject: W2K Client for VPN3000?
> >
> >
> > looking for sources for finding the client software.
> > it does not come with standard VPN3000 CD.
> > thanks.
> >
> > Tim Weil - CCNP
> > Sr. Consultant
> > > kpmg Consulting
> > >  Network Solutions (KCNS)
> > Cell   301.452.3641
> > Office 703.747.8950
> > Fax240.337.1305
> > >
> > >
> >
> 
*
***
> > *
> > The information in this email is confidential and may be legally
> privileged.
> > It is intended solely for the addressee. Access to this email by 
anyone
> else
> > is unauthorized.
> >
> > If you are not the intended recipient, any disclosure, copying,
> distribution
> > or any action taken or omitted to be taken in reliance on it, is
> prohibited
> > and may be unlawful. When addressed to our clients any opinions or 
advice
> > contained in this email are subject to the terms and conditions 
expressed
> in
> > the governing KPMG client engagement letter.
> >
> 
*
***
> > *
> >
> > _
> > FAQ, list archives, and subscription info:
> > http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to 
[EMAIL PROTECTED]
> >
> > _
> > FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to 
[EMAIL PROTECTED]
> >
>
>
> _
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> 


--
FREE ANONYMOUS EMAIL!  Sign up now.
http://www.subdimension.com/freemail

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: W2K Client for VPN3000?

2001-03-27 Thread Chris Lemagie

The client on the page listed below is actually the 3.01 client...

Chris Lemagie
Systems Engineer
Cisco Systems
Seattle Commercial Region
(425) 468-0959
[EMAIL PROTECTED]
http://www.cisco.com/

-Original Message-
From: Jeff Groman [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, March 27, 2001 4:03 PM
To: Chris Lemagie
Cc: Weil, Timothy R; Group Study (List) (E-mail)
Subject: RE: W2K Client for VPN3000?


They also have a 3.01 Release available that came as a result of the Beta
program.  However, it hasn't shown up yet on the page listed below.  If
you were part of the beta, they sent you a link and login to get it.
Hopefully they'll update the software page soon.

Jeff



Jeff Groman
IS Department,  Childrens Hospital, Denver
[EMAIL PROTECTED]
303 864 5671

On Tue, 27 Mar 2001, Chris Lemagie wrote:

> Go to CCO (http://www.cisco.com) and login with your username.
>
> Select the Software Center Link.
> Select the VPN Software Link.
> Select the Cisco VPN Client Link.
> Select the Download Cisco 3DES Cryptographic Software under export
licensing
> controls Link.
> There you are...
>
> You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you
attempt
> to run the v3.0 client which supports Windows 2000.  Version 3.0 of the
> concentrator software will support older clients, but older concentrator
> software images will not work with the new client.
>
> Chris Lemagie
>
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> Weil, Timothy R
> Sent: Tuesday, March 27, 2001 1:52 PM
> To: Group Study (List) (E-mail)
> Subject: W2K Client for VPN3000?
>
>
> looking for sources for finding the client software.
> it does not come with standard VPN3000 CD.
> thanks.
>
> Tim Weil - CCNP
> Sr. Consultant
> > kpmg Consulting
> >  Network Solutions (KCNS)
> Cell   301.452.3641
> Office 703.747.8950
> Fax240.337.1305
> >
> >
>

> *
> The information in this email is confidential and may be legally
privileged.
> It is intended solely for the addressee. Access to this email by anyone
else
> is unauthorized.
>
> If you are not the intended recipient, any disclosure, copying,
distribution
> or any action taken or omitted to be taken in reliance on it, is
prohibited
> and may be unlawful. When addressed to our clients any opinions or advice
> contained in this email are subject to the terms and conditions expressed
in
> the governing KPMG client engagement letter.
>

> *
>
> _
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>
> _
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: W2K Client for VPN3000?

2001-03-27 Thread Jeff Groman

They also have a 3.01 Release available that came as a result of the Beta
program.  However, it hasn't shown up yet on the page listed below.  If
you were part of the beta, they sent you a link and login to get it.
Hopefully they'll update the software page soon.

Jeff



Jeff Groman
IS Department,  Childrens Hospital, Denver
[EMAIL PROTECTED]
303 864 5671

On Tue, 27 Mar 2001, Chris Lemagie wrote:

> Go to CCO (http://www.cisco.com) and login with your username.
>
> Select the Software Center Link.
> Select the VPN Software Link.
> Select the Cisco VPN Client Link.
> Select the Download Cisco 3DES Cryptographic Software under export licensing
> controls Link.
> There you are...
>
> You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you attempt
> to run the v3.0 client which supports Windows 2000.  Version 3.0 of the
> concentrator software will support older clients, but older concentrator
> software images will not work with the new client.
>
> Chris Lemagie
>
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> Weil, Timothy R
> Sent: Tuesday, March 27, 2001 1:52 PM
> To: Group Study (List) (E-mail)
> Subject: W2K Client for VPN3000?
>
>
> looking for sources for finding the client software.
> it does not come with standard VPN3000 CD.
> thanks.
>
> Tim Weil - CCNP
> Sr. Consultant
> > kpmg Consulting
> >  Network Solutions (KCNS)
> Cell   301.452.3641
> Office 703.747.8950
> Fax240.337.1305
> >
> >
> 
> *
> The information in this email is confidential and may be legally privileged.
> It is intended solely for the addressee. Access to this email by anyone else
> is unauthorized.
>
> If you are not the intended recipient, any disclosure, copying, distribution
> or any action taken or omitted to be taken in reliance on it, is prohibited
> and may be unlawful. When addressed to our clients any opinions or advice
> contained in this email are subject to the terms and conditions expressed in
> the governing KPMG client engagement letter.
> 
> *
>
> _
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>
> _
> FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: W2K Client for VPN3000?

2001-03-27 Thread Chris Lemagie

Go to CCO (http://www.cisco.com) and login with your username.

Select the Software Center Link.
Select the VPN Software Link.
Select the Cisco VPN Client Link.
Select the Download Cisco 3DES Cryptographic Software under export licensing
controls Link.
There you are...

You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you attempt
to run the v3.0 client which supports Windows 2000.  Version 3.0 of the
concentrator software will support older clients, but older concentrator
software images will not work with the new client.

Chris Lemagie

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Weil, Timothy R
Sent: Tuesday, March 27, 2001 1:52 PM
To: Group Study (List) (E-mail)
Subject: W2K Client for VPN3000?


looking for sources for finding the client software.
it does not come with standard VPN3000 CD.
thanks.

Tim Weil - CCNP
Sr. Consultant
> kpmg Consulting
>  Network Solutions (KCNS)
Cell   301.452.3641
Office 703.747.8950
Fax240.337.1305
>
>

*
The information in this email is confidential and may be legally privileged.
It is intended solely for the addressee. Access to this email by anyone else
is unauthorized.

If you are not the intended recipient, any disclosure, copying, distribution
or any action taken or omitted to be taken in reliance on it, is prohibited
and may be unlawful. When addressed to our clients any opinions or advice
contained in this email are subject to the terms and conditions expressed in
the governing KPMG client engagement letter.

*

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: W2K Client for VPN3000?

2001-03-27 Thread Schmidt, David

As I understand, the Win2K client is due out any day now, but is currently
unavailable.  I learned the hard way on this one.
Dave Schmidt


-Original Message-
From: Weil, Timothy R [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, March 27, 2001 4:52 PM
To: Group Study (List) (E-mail)
Subject: W2K Client for VPN3000?


looking for sources for finding the client software.
it does not come with standard VPN3000 CD.
thanks.

Tim Weil - CCNP
Sr. Consultant
> kpmg Consulting
>  Network Solutions (KCNS)
Cell   301.452.3641
Office 703.747.8950
Fax240.337.1305
>  
> 

*
The information in this email is confidential and may be legally privileged.
It is intended solely for the addressee. Access to this email by anyone else
is unauthorized. 

If you are not the intended recipient, any disclosure, copying, distribution
or any action taken or omitted to be taken in reliance on it, is prohibited
and may be unlawful. When addressed to our clients any opinions or advice
contained in this email are subject to the terms and conditions expressed in
the governing KPMG client engagement letter. 

*

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



W2K Client for VPN3000?

2001-03-27 Thread Weil, Timothy R

looking for sources for finding the client software.
it does not come with standard VPN3000 CD.
thanks.

Tim Weil - CCNP
Sr. Consultant
> kpmg Consulting
>  Network Solutions (KCNS)
Cell   301.452.3641
Office 703.747.8950
Fax240.337.1305
>  
> 
*
The information in this email is confidential and may be legally privileged.
It is intended solely for the addressee. Access to this email by anyone else
is unauthorized. 

If you are not the intended recipient, any disclosure, copying, distribution
or any action taken or omitted to be taken in reliance on it, is prohibited
and may be unlawful. When addressed to our clients any opinions or advice
contained in this email are subject to the terms and conditions expressed in
the governing KPMG client engagement letter. 
*

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



VPN3000

2001-02-05 Thread Reza Sharifi

Does any body know this:

I am configuring the VPN 3000 to send SNMP traps to our network monitoring

system. I need to know the text that the VPN 3000 generates for all events

in certain event classes. I will set the VPN 3000 to forward these events as

traps. The event classes of interest are:

HARDWAREMON

IP

REBOOT

VRRP



_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]