RE: VPN clinet 3.6.X can't connect VPN3000? [7:70589]
Hey.. my answers are... >Have you got the correct IP as the peer ? Yes--> It prompts me remote peer not responding. Immediately I uninstall 3.6.X and install 3.5.4, it works. I tried it many time, impossible for wrong IP >Have you setup the correct access method for that group ? PPTP/IPSEC/L2TP how to set the access method? PPTP/IPSEC/L2TP? in the VPN client software itself??? >Have you typed in the group password correctly ? Yes.. the password is correct, try many time >From: John Brandis >To: 'Richard Campbell' >Subject: RE: VPN clinet 3.6.X can't connect VPN3000? [7:70589] >Date: Fri, 13 Jun 2003 09:34:46 +1000 > >I have not had this problem, however I did have problems with 3.6.3 > >This may sound stupid, but: > >Have you got the correct IP as the peer ? >Have you setup the correct access method for that group ? PPTP/IPSEC/L2TP >Have you typed in the group password correctly ? > >Hope at least one of these solve your probelm, sorry if they make you feel >a >bit stupid > >-Original Message- >From: Richard Campbell [mailto:[EMAIL PROTECTED] >Sent: Friday, 13 June 2003 1:40 AM >To: [EMAIL PROTECTED] >Subject: VPN clinet 3.6.X can't connect VPN3000? [7:70589] > > >Can I ask a question, my VPN client 3.6.4 (Rel) and 3.6.x can't connect to >VPN3000 concentrator and only to my PIX515. I have to use VPN client >version 3.5.4 in order to connect to VPN3000 and PIX 515. Why?? > >FYI.. my VPN3000 info is >Cisco Systems, Inc./VPN 3000 Concentrator Version 4.0.1.Rel May 06 2003 >13:13:03 > >_ >Tired of spam? Get advanced junk mail protection with MSN 8. >http://join.msn.com/?page=features/junkmail >** > >This email message (and attachments) may contain information that is >confidential to Solution 6. If you are not the intended recipient you >cannot use, distribute or copy the message or attachments. In such a case, >please notify the sender by return email immediately and erase all copies >of the message and attachments. Opinions, conclusions and other >information in this message and attachments that do not relate to the >official business of Solution 6 are neither given nor endorsed by it. > >* > _ Protect your PC - get McAfee.com VirusScan Online http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=70617&t=70589 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
VPN clinet 3.6.X can't connect VPN3000? [7:70589]
Can I ask a question, my VPN client 3.6.4 (Rel) and 3.6.x can't connect to VPN3000 concentrator and only to my PIX515. I have to use VPN client version 3.5.4 in order to connect to VPN3000 and PIX 515. Why?? FYI.. my VPN3000 info is Cisco Systems, Inc./VPN 3000 Concentrator Version 4.0.1.Rel May 06 2003 13:13:03 _ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=70589&t=70589 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
VPN3000 [7:16559]
I have a network that has 2 subnets on the inside. Unfortunately one subnet is a 10 network that is hardcoded and cannot be changed. The other is 172.x.x.x network which I can see find when I VPN in. I cannot see the 10.x.x.x network from the VPN. I have a 2912 connected to the inside of the VPN and it sees the 10.x.x.x network fine. I have try to the 10.x.x.x network to the VPN box and the switch from a 2610 router where the 10.x.x.x is located but didnt seem to help. Any thoughts would be appreciated. Thanks. = Spencer Plantier Internet Solutions Engineer Voice 919-949-9993 Cell 919-696-8848 __ Do You Yahoo!? Make international calls for as low as $.04/minute with Yahoo! Messenger http://phonecard.yahoo.com/ Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=16559&t=16559 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: PIX/w/WIN2k VPN3000 client problem [7:12181]
get a reboot approved. -Original Message- From: Ayers, Michael [mailto:[EMAIL PROTECTED]] Sent: Thursday, July 12, 2001 2:40 PM To: [EMAIL PROTECTED] Subject: PIX/w/WIN2k VPN3000 client problem [7:12181] I'm having a problem. I'm running a PIX520 (5.3) with multiple VPNGROUPs. I have a client installed on a WIN2k machine. The machine was using a group that didn't split tunnel. I changed the group to a group that does, and now I get a failed to negotiate error AFTER THE LOGON and the "Your link is now secure" error. I have cleared IPSEC SA and ISAKMP SA. I even went as far as deleting the MAPS. The Client has been removed and re-installed. I'm thinking the problem is either something embedded somewhere in the WIN2k, or an association to the peer IP in the PIX, but I have successfully changed the group on other win 9x machines without a problem after the SA timed out, and the Dynamic Maps cleared. This is a production PIX, but do I get a reboot approved to try to clear old info out of memory, or do I go after the client and see if the problem lies there? Any input appreciated. Thank you, Michael Privileged/Confidential Information may be contained in this message or attachments hereto. Please advise immediately if you or your employer do not consent to Internet email for messages of this kind. Opinions, conclusions and other information in this message that do not relate to the official business of this company shall be understood as neither given nor endorsed by it. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=12190&t=12181 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
PIX/w/WIN2k VPN3000 client problem [7:12181]
I'm having a problem. I'm running a PIX520 (5.3) with multiple VPNGROUPs. I have a client installed on a WIN2k machine. The machine was using a group that didn't split tunnel. I changed the group to a group that does, and now I get a failed to negotiate error AFTER THE LOGON and the "Your link is now secure" error. I have cleared IPSEC SA and ISAKMP SA. I even went as far as deleting the MAPS. The Client has been removed and re-installed. I'm thinking the problem is either something embedded somewhere in the WIN2k, or an association to the peer IP in the PIX, but I have successfully changed the group on other win 9x machines without a problem after the SA timed out, and the Dynamic Maps cleared. This is a production PIX, but do I get a reboot approved to try to clear old info out of memory, or do I go after the client and see if the problem lies there? Any input appreciated. Thank you, Michael Privileged/Confidential Information may be contained in this message or attachments hereto. Please advise immediately if you or your employer do not consent to Internet email for messages of this kind. Opinions, conclusions and other information in this message that do not relate to the official business of this company shall be understood as neither given nor endorsed by it. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=12181&t=12181 -- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
Fw: Cisco Security Advisory: Cisco VPN3000 Concentrator IP [7:12003]
FYI for those I've seen posting lately about the 3000 series Concentrators. - Original Message - From: "Cisco Systems Product Security Incident Response Team" To: Sent: Thursday, April 12, 2001 11:45 AM Subject: Cisco Security Advisory: Cisco VPN3000 Concentrator IP Options Vulnerability > > -BEGIN PGP SIGNED MESSAGE- > > Cisco Security Advisory: VPN 3000 Concentrator IP Options Vulnerability > = > Revision 1.0 > > For Public Release 2001 April 12 at 1500 UTC > > > > Summary > === > If a crafted IP packet, with an invalid IP Option setting is transmitted to > a VPN 3000 series concentrator on the same network segment (no routers in > between), it can cause the VPN 3000 series concentrator to hang with a 100% > CPU Utilization. The concentrator would then have to be reset. After > rebooting, the equipment would function normally until the crafted IP > packet is received again. The defect can be exploited to produce a denial > of service (DoS) attack. > > The vulnerability is described in Cisco bug id CSCds92460. > > This notice will be posted at > http://www.cisco.com/warp/public/707/vpn3k-ipoptions-vuln-pub.shtml > > Affected Products > = > Cisco VPN 3000 series concentrators running software releases up to but not > including revision 2.5.2 (F) are affected by this vulnerability. This > series includes models 3005, 3015, 3030, 3060, and 3080. > > Any VPN 3000 series concentrators running revision 2.5.2 (F) or later are > unaffected by this vulnerability. > > This vulnerability does not affect the VPN 5000 series concentrators. No > other Cisco product is known to be affected by this vulnerability. > > To determine if a Cisco VPN 3000 series concentrator is running affected > software, check the revision via the web interface or the console menu. > > Details > === > If a crafted IP packet, with an invalid IP Option setting, is transmitted > to a VPN 3000 series concentrator on the same network segment (no routers > in between), on either the Inside or the Outside interface, it can cause > the VPN 3000 series concentrator to hang with a 100 % CPU Utilization. The > concentrator would then have to be reset via the console port as no SNMP or > HTTP remote management control would be possible. After rebooting, the > equipment would function normally until the crafted IP packet is received > again. > > In order to exploit this vulnerability the attacker must be on the same > network segment as the concentrator without any routers in between. A > crafted IP packet traversing a router would typically get its invalid IP > Options dropped and would not be able to affect the VPN 3000 series > concentrator. > > The vulnerability is documented as Cisco bug id CSCds92460. > > Impact > == > When this crafted IP packet is received by the VPN 3000 series > concentrator, the concentrator will stop passing traffic and will not > respond to any management inquiries via SNMP, Telnet or HTTP. However > management via the console port is possible. > > For VPN 3000 series concentrator models 3015, 3030, 3060, and 3080 the CPU > Utilization bar graph indicator on the front panel will go to 100%. > > Software Versions and Fixes > === > The vulnerability has been fixed in revision 2.5.2 (E) code. The fix will > be carried forward into all future releases. > > However due to the advisory at > http://www.cisco.com/warp/public/707/vpn3k-telnet-vuln-pub.shtml the > recommended revision to upgrade to is 2.5.2 (F) > > Upgrade can be done via the remote software upgrade feature using the VPN > 3000 series concentrator's web based management interface. > > Obtaining Fixed Software > > Cisco is offering free software upgrades to remedy this vulnerability for > all affected customers. Customers with service contracts may upgrade to any > software release. Customers may install only the feature sets they have > purchased. > > Fixed software is currently available. > > Customers with contracts should obtain upgraded software through their > regular update channels. For most customers, this means that upgrades > should be obtained via Cisco's Software Center at http://www.cisco.com/. > > Customers without contracts or warranty should get their upgrades by > contacting the Cisco Technical Assistance Center (TAC) as shown below: > >* (800) 553-2447 (toll-free in North America) >* +1 408 526 7209 (toll call from anywhere in the world) >* e-mail: [EMAIL PROTECTED] &
Fw: Cisco Security Advisory: Cisco VPN3000 Concentrator IP [7:364]
FYI if you're using the former Altiga VPN concentrator... - Original Message - From: "Cisco Systems Product Security Incident Response Team" To: Sent: Thursday, April 12, 2001 9:45 AM Subject: Cisco Security Advisory: Cisco VPN3000 Concentrator IP Options Vulnerability > > -BEGIN PGP SIGNED MESSAGE- > > Cisco Security Advisory: VPN 3000 Concentrator IP Options Vulnerability > = > Revision 1.0 > > For Public Release 2001 April 12 at 1500 UTC > > > > Summary > === > If a crafted IP packet, with an invalid IP Option setting is transmitted to > a VPN 3000 series concentrator on the same network segment (no routers in > between), it can cause the VPN 3000 series concentrator to hang with a 100% > CPU Utilization. The concentrator would then have to be reset. After > rebooting, the equipment would function normally until the crafted IP > packet is received again. The defect can be exploited to produce a denial > of service (DoS) attack. > > The vulnerability is described in Cisco bug id CSCds92460. > > This notice will be posted at > http://www.cisco.com/warp/public/707/vpn3k-ipoptions-vuln-pub.shtml > > Affected Products > = > Cisco VPN 3000 series concentrators running software releases up to but not > including revision 2.5.2 (F) are affected by this vulnerability. This > series includes models 3005, 3015, 3030, 3060, and 3080. > > Any VPN 3000 series concentrators running revision 2.5.2 (F) or later are > unaffected by this vulnerability. > > This vulnerability does not affect the VPN 5000 series concentrators. No > other Cisco product is known to be affected by this vulnerability. > > To determine if a Cisco VPN 3000 series concentrator is running affected > software, check the revision via the web interface or the console menu. > > Details > === > If a crafted IP packet, with an invalid IP Option setting, is transmitted > to a VPN 3000 series concentrator on the same network segment (no routers > in between), on either the Inside or the Outside interface, it can cause > the VPN 3000 series concentrator to hang with a 100 % CPU Utilization. The > concentrator would then have to be reset via the console port as no SNMP or > HTTP remote management control would be possible. After rebooting, the > equipment would function normally until the crafted IP packet is received > again. > > In order to exploit this vulnerability the attacker must be on the same > network segment as the concentrator without any routers in between. A > crafted IP packet traversing a router would typically get its invalid IP > Options dropped and would not be able to affect the VPN 3000 series > concentrator. > > The vulnerability is documented as Cisco bug id CSCds92460. > > Impact > == > When this crafted IP packet is received by the VPN 3000 series > concentrator, the concentrator will stop passing traffic and will not > respond to any management inquiries via SNMP, Telnet or HTTP. However > management via the console port is possible. > > For VPN 3000 series concentrator models 3015, 3030, 3060, and 3080 the CPU > Utilization bar graph indicator on the front panel will go to 100%. > > Software Versions and Fixes > === > The vulnerability has been fixed in revision 2.5.2 (E) code. The fix will > be carried forward into all future releases. > > However due to the advisory at > http://www.cisco.com/warp/public/707/vpn3k-telnet-vuln-pub.shtml the > recommended revision to upgrade to is 2.5.2 (F) > > Upgrade can be done via the remote software upgrade feature using the VPN > 3000 series concentrator's web based management interface. > > Obtaining Fixed Software > > Cisco is offering free software upgrades to remedy this vulnerability for > all affected customers. Customers with service contracts may upgrade to any > software release. Customers may install only the feature sets they have > purchased. > > Fixed software is currently available. > > Customers with contracts should obtain upgraded software through their > regular update channels. For most customers, this means that upgrades > should be obtained via Cisco's Software Center at http://www.cisco.com/. > > Customers without contracts or warranty should get their upgrades by > contacting the Cisco Technical Assistance Center (TAC) as shown below: > >* (800) 553-2447 (toll-free in North America) >* +1 408 526 7209 (toll call from anywhere in the world) >* e-mail: [EMAIL PROTECTED] > > See http:
RE: W2K Client for VPN3000?
Thanks -Original Message- From: Chris Lemagie [mailto:[EMAIL PROTECTED]] Sent: Wednesday, March 28, 2001 3:56 PM To: Henry Rollins Cc: Jeff Groman; Weil, Timothy R; Group Study (List) (E-mail) Subject: RE: W2K Client for VPN3000? Pix OS 6.0 is in Beta now with a projected release date (FCS) of April 25th. Chris Lemagie -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Henry Rollins Sent: Tuesday, March 27, 2001 6:14 PM To: Chris Lemagie Cc: Jeff Groman; Weil, Timothy R; Group Study (List) (E-mail) Subject: RE: W2K Client for VPN3000? This is amusing (from the userguide) -- * Support for Cisco Secure PIX Firewall platforms that run Release 6.0 and above. Any idea when 6.0 might debut? Thanks Quoting Chris Lemagie <[EMAIL PROTECTED]>: > The client on the page listed below is actually the 3.01 client... > > Chris Lemagie > Systems Engineer > Cisco Systems > Seattle Commercial Region > (425) 468-0959 > [EMAIL PROTECTED] > http://www.cisco.com/ > > -Original Message- > From: Jeff Groman [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, March 27, 2001 4:03 PM > To: Chris Lemagie > Cc: Weil, Timothy R; Group Study (List) (E-mail) > Subject: RE: W2K Client for VPN3000? > > > They also have a 3.01 Release available that came as a result of the Beta > program. However, it hasn't shown up yet on the page listed below. If > you were part of the beta, they sent you a link and login to get it. > Hopefully they'll update the software page soon. > > Jeff > > > > Jeff Groman > IS Department,Childrens Hospital, Denver > [EMAIL PROTECTED] > 303 864 5671 > > On Tue, 27 Mar 2001, Chris Lemagie wrote: > > > Go to CCO (http://www.cisco.com) and login with your username. > > > > Select the Software Center Link. > > Select the VPN Software Link. > > Select the Cisco VPN Client Link. > > Select the Download Cisco 3DES Cryptographic Software under export > licensing > > controls Link. > > There you are... > > > > You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you > attempt > > to run the v3.0 client which supports Windows 2000. Version 3.0 of the > > concentrator software will support older clients, but older concentrator > > software images will not work with the new client. > > > > Chris Lemagie > > > > -Original Message- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of > > Weil, Timothy R > > Sent: Tuesday, March 27, 2001 1:52 PM > > To: Group Study (List) (E-mail) > > Subject: W2K Client for VPN3000? > > > > > > looking for sources for finding the client software. > > it does not come with standard VPN3000 CD. > > thanks. > > > > Tim Weil - CCNP > > Sr. Consultant > > > kpmg Consulting > > > Network Solutions (KCNS) > > Cell 301.452.3641 > > Office 703.747.8950 > > Fax240.337.1305 > > > > > > > > > * *** > > * > > The information in this email is confidential and may be legally > privileged. > > It is intended solely for the addressee. Access to this email by anyone > else > > is unauthorized. > > > > If you are not the intended recipient, any disclosure, copying, > distribution > > or any action taken or omitted to be taken in reliance on it, is > prohibited > > and may be unlawful. When addressed to our clients any opinions or advice > > contained in this email are subject to the terms and conditions expressed > in > > the governing KPMG client engagement letter. > > > * *** > > * > > > > _ > > FAQ, list archives, and subscription info: > > http://www.groupstudy.com/list/cisco.html > > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > > > > _ > > FAQ, list archives, and subscription info: > http://www.groupstudy.com/list/cisco.html > > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > > > > > _ > FAQ, list archives, and subscription info: > http://www.groupstudy.com/list/cisco.html > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > -- FREE ANONYMOUS EMAIL! Sign up now. http://www.subdimension.com/freemail _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: W2K Client for VPN3000?
Pix OS 6.0 is in Beta now with a projected release date (FCS) of April 25th. Chris Lemagie -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Henry Rollins Sent: Tuesday, March 27, 2001 6:14 PM To: Chris Lemagie Cc: Jeff Groman; Weil, Timothy R; Group Study (List) (E-mail) Subject: RE: W2K Client for VPN3000? This is amusing (from the userguide) -- Support for Cisco Secure PIX Firewall platforms that run Release 6.0 and above. Any idea when 6.0 might debut? Thanks Quoting Chris Lemagie <[EMAIL PROTECTED]>: > The client on the page listed below is actually the 3.01 client... > > Chris Lemagie > Systems Engineer > Cisco Systems > Seattle Commercial Region > (425) 468-0959 > [EMAIL PROTECTED] > http://www.cisco.com/ > > -Original Message- > From: Jeff Groman [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, March 27, 2001 4:03 PM > To: Chris Lemagie > Cc: Weil, Timothy R; Group Study (List) (E-mail) > Subject: RE: W2K Client for VPN3000? > > > They also have a 3.01 Release available that came as a result of the Beta > program. However, it hasn't shown up yet on the page listed below. If > you were part of the beta, they sent you a link and login to get it. > Hopefully they'll update the software page soon. > > Jeff > > > > Jeff Groman > IS Department,Childrens Hospital, Denver > [EMAIL PROTECTED] > 303 864 5671 > > On Tue, 27 Mar 2001, Chris Lemagie wrote: > > > Go to CCO (http://www.cisco.com) and login with your username. > > > > Select the Software Center Link. > > Select the VPN Software Link. > > Select the Cisco VPN Client Link. > > Select the Download Cisco 3DES Cryptographic Software under export > licensing > > controls Link. > > There you are... > > > > You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you > attempt > > to run the v3.0 client which supports Windows 2000. Version 3.0 of the > > concentrator software will support older clients, but older concentrator > > software images will not work with the new client. > > > > Chris Lemagie > > > > -Original Message- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of > > Weil, Timothy R > > Sent: Tuesday, March 27, 2001 1:52 PM > > To: Group Study (List) (E-mail) > > Subject: W2K Client for VPN3000? > > > > > > looking for sources for finding the client software. > > it does not come with standard VPN3000 CD. > > thanks. > > > > Tim Weil - CCNP > > Sr. Consultant > > > kpmg Consulting > > > Network Solutions (KCNS) > > Cell 301.452.3641 > > Office 703.747.8950 > > Fax240.337.1305 > > > > > > > > > * *** > > * > > The information in this email is confidential and may be legally > privileged. > > It is intended solely for the addressee. Access to this email by anyone > else > > is unauthorized. > > > > If you are not the intended recipient, any disclosure, copying, > distribution > > or any action taken or omitted to be taken in reliance on it, is > prohibited > > and may be unlawful. When addressed to our clients any opinions or advice > > contained in this email are subject to the terms and conditions expressed > in > > the governing KPMG client engagement letter. > > > * *** > > * > > > > _ > > FAQ, list archives, and subscription info: > > http://www.groupstudy.com/list/cisco.html > > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > > > > _ > > FAQ, list archives, and subscription info: > http://www.groupstudy.com/list/cisco.html > > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > > > > > _ > FAQ, list archives, and subscription info: > http://www.groupstudy.com/list/cisco.html > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > -- FREE ANONYMOUS EMAIL! Sign up now. http://www.subdimension.com/freemail _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: W2K Client for VPN3000?
This is amusing (from the userguide) -- Support for Cisco Secure PIX Firewall platforms that run Release 6.0 and above. Any idea when 6.0 might debut? Thanks Quoting Chris Lemagie <[EMAIL PROTECTED]>: > The client on the page listed below is actually the 3.01 client... > > Chris Lemagie > Systems Engineer > Cisco Systems > Seattle Commercial Region > (425) 468-0959 > [EMAIL PROTECTED] > http://www.cisco.com/ > > -Original Message- > From: Jeff Groman [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, March 27, 2001 4:03 PM > To: Chris Lemagie > Cc: Weil, Timothy R; Group Study (List) (E-mail) > Subject: RE: W2K Client for VPN3000? > > > They also have a 3.01 Release available that came as a result of the Beta > program. However, it hasn't shown up yet on the page listed below. If > you were part of the beta, they sent you a link and login to get it. > Hopefully they'll update the software page soon. > > Jeff > > > > Jeff Groman > IS Department,Childrens Hospital, Denver > [EMAIL PROTECTED] > 303 864 5671 > > On Tue, 27 Mar 2001, Chris Lemagie wrote: > > > Go to CCO (http://www.cisco.com) and login with your username. > > > > Select the Software Center Link. > > Select the VPN Software Link. > > Select the Cisco VPN Client Link. > > Select the Download Cisco 3DES Cryptographic Software under export > licensing > > controls Link. > > There you are... > > > > You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you > attempt > > to run the v3.0 client which supports Windows 2000. Version 3.0 of the > > concentrator software will support older clients, but older concentrator > > software images will not work with the new client. > > > > Chris Lemagie > > > > -----Original Message- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of > > Weil, Timothy R > > Sent: Tuesday, March 27, 2001 1:52 PM > > To: Group Study (List) (E-mail) > > Subject: W2K Client for VPN3000? > > > > > > looking for sources for finding the client software. > > it does not come with standard VPN3000 CD. > > thanks. > > > > Tim Weil - CCNP > > Sr. Consultant > > > kpmg Consulting > > > Network Solutions (KCNS) > > Cell 301.452.3641 > > Office 703.747.8950 > > Fax240.337.1305 > > > > > > > > > * *** > > * > > The information in this email is confidential and may be legally > privileged. > > It is intended solely for the addressee. Access to this email by anyone > else > > is unauthorized. > > > > If you are not the intended recipient, any disclosure, copying, > distribution > > or any action taken or omitted to be taken in reliance on it, is > prohibited > > and may be unlawful. When addressed to our clients any opinions or advice > > contained in this email are subject to the terms and conditions expressed > in > > the governing KPMG client engagement letter. > > > * *** > > * > > > > _ > > FAQ, list archives, and subscription info: > > http://www.groupstudy.com/list/cisco.html > > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > > > > _ > > FAQ, list archives, and subscription info: > http://www.groupstudy.com/list/cisco.html > > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > > > > > _ > FAQ, list archives, and subscription info: > http://www.groupstudy.com/list/cisco.html > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > -- FREE ANONYMOUS EMAIL! Sign up now. http://www.subdimension.com/freemail _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: W2K Client for VPN3000?
The client on the page listed below is actually the 3.01 client... Chris Lemagie Systems Engineer Cisco Systems Seattle Commercial Region (425) 468-0959 [EMAIL PROTECTED] http://www.cisco.com/ -Original Message- From: Jeff Groman [mailto:[EMAIL PROTECTED]] Sent: Tuesday, March 27, 2001 4:03 PM To: Chris Lemagie Cc: Weil, Timothy R; Group Study (List) (E-mail) Subject: RE: W2K Client for VPN3000? They also have a 3.01 Release available that came as a result of the Beta program. However, it hasn't shown up yet on the page listed below. If you were part of the beta, they sent you a link and login to get it. Hopefully they'll update the software page soon. Jeff Jeff Groman IS Department, Childrens Hospital, Denver [EMAIL PROTECTED] 303 864 5671 On Tue, 27 Mar 2001, Chris Lemagie wrote: > Go to CCO (http://www.cisco.com) and login with your username. > > Select the Software Center Link. > Select the VPN Software Link. > Select the Cisco VPN Client Link. > Select the Download Cisco 3DES Cryptographic Software under export licensing > controls Link. > There you are... > > You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you attempt > to run the v3.0 client which supports Windows 2000. Version 3.0 of the > concentrator software will support older clients, but older concentrator > software images will not work with the new client. > > Chris Lemagie > > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of > Weil, Timothy R > Sent: Tuesday, March 27, 2001 1:52 PM > To: Group Study (List) (E-mail) > Subject: W2K Client for VPN3000? > > > looking for sources for finding the client software. > it does not come with standard VPN3000 CD. > thanks. > > Tim Weil - CCNP > Sr. Consultant > > kpmg Consulting > > Network Solutions (KCNS) > Cell 301.452.3641 > Office 703.747.8950 > Fax240.337.1305 > > > > > > * > The information in this email is confidential and may be legally privileged. > It is intended solely for the addressee. Access to this email by anyone else > is unauthorized. > > If you are not the intended recipient, any disclosure, copying, distribution > or any action taken or omitted to be taken in reliance on it, is prohibited > and may be unlawful. When addressed to our clients any opinions or advice > contained in this email are subject to the terms and conditions expressed in > the governing KPMG client engagement letter. > > * > > _ > FAQ, list archives, and subscription info: > http://www.groupstudy.com/list/cisco.html > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > > _ > FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: W2K Client for VPN3000?
They also have a 3.01 Release available that came as a result of the Beta program. However, it hasn't shown up yet on the page listed below. If you were part of the beta, they sent you a link and login to get it. Hopefully they'll update the software page soon. Jeff Jeff Groman IS Department, Childrens Hospital, Denver [EMAIL PROTECTED] 303 864 5671 On Tue, 27 Mar 2001, Chris Lemagie wrote: > Go to CCO (http://www.cisco.com) and login with your username. > > Select the Software Center Link. > Select the VPN Software Link. > Select the Cisco VPN Client Link. > Select the Download Cisco 3DES Cryptographic Software under export licensing > controls Link. > There you are... > > You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you attempt > to run the v3.0 client which supports Windows 2000. Version 3.0 of the > concentrator software will support older clients, but older concentrator > software images will not work with the new client. > > Chris Lemagie > > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of > Weil, Timothy R > Sent: Tuesday, March 27, 2001 1:52 PM > To: Group Study (List) (E-mail) > Subject: W2K Client for VPN3000? > > > looking for sources for finding the client software. > it does not come with standard VPN3000 CD. > thanks. > > Tim Weil - CCNP > Sr. Consultant > > kpmg Consulting > > Network Solutions (KCNS) > Cell 301.452.3641 > Office 703.747.8950 > Fax240.337.1305 > > > > > > * > The information in this email is confidential and may be legally privileged. > It is intended solely for the addressee. Access to this email by anyone else > is unauthorized. > > If you are not the intended recipient, any disclosure, copying, distribution > or any action taken or omitted to be taken in reliance on it, is prohibited > and may be unlawful. When addressed to our clients any opinions or advice > contained in this email are subject to the terms and conditions expressed in > the governing KPMG client engagement letter. > > * > > _ > FAQ, list archives, and subscription info: > http://www.groupstudy.com/list/cisco.html > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > > _ > FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] > _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: W2K Client for VPN3000?
Go to CCO (http://www.cisco.com) and login with your username. Select the Software Center Link. Select the VPN Software Link. Select the Cisco VPN Client Link. Select the Download Cisco 3DES Cryptographic Software under export licensing controls Link. There you are... You must upgrade you VPN 3000 concentrator to version 3.0 BEFORE you attempt to run the v3.0 client which supports Windows 2000. Version 3.0 of the concentrator software will support older clients, but older concentrator software images will not work with the new client. Chris Lemagie -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Weil, Timothy R Sent: Tuesday, March 27, 2001 1:52 PM To: Group Study (List) (E-mail) Subject: W2K Client for VPN3000? looking for sources for finding the client software. it does not come with standard VPN3000 CD. thanks. Tim Weil - CCNP Sr. Consultant > kpmg Consulting > Network Solutions (KCNS) Cell 301.452.3641 Office 703.747.8950 Fax240.337.1305 > > * The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter. * _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
RE: W2K Client for VPN3000?
As I understand, the Win2K client is due out any day now, but is currently unavailable. I learned the hard way on this one. Dave Schmidt -Original Message- From: Weil, Timothy R [mailto:[EMAIL PROTECTED]] Sent: Tuesday, March 27, 2001 4:52 PM To: Group Study (List) (E-mail) Subject: W2K Client for VPN3000? looking for sources for finding the client software. it does not come with standard VPN3000 CD. thanks. Tim Weil - CCNP Sr. Consultant > kpmg Consulting > Network Solutions (KCNS) Cell 301.452.3641 Office 703.747.8950 Fax240.337.1305 > > * The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter. * _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED] _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
W2K Client for VPN3000?
looking for sources for finding the client software. it does not come with standard VPN3000 CD. thanks. Tim Weil - CCNP Sr. Consultant > kpmg Consulting > Network Solutions (KCNS) Cell 301.452.3641 Office 703.747.8950 Fax240.337.1305 > > * The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter. * _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
VPN3000
Does any body know this: I am configuring the VPN 3000 to send SNMP traps to our network monitoring system. I need to know the text that the VPN 3000 generates for all events in certain event classes. I will set the VPN 3000 to forward these events as traps. The event classes of interest are: HARDWAREMON IP REBOOT VRRP _ FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]