What are you using to configure brand new CIAC-GW-K9's shipping with 1.3.2?
I am having extreme difficulties configuring a new batch of gateways that arrived which shipped with 1.3.2 from the factory.
My CPAM installation has been upgraded to 1.3.2 as well as all of my installed gateways.
I have been trying to configure these using a Dell e6400 running Windows 7 32-bit with Internet Explorer 8. I have used multiple laptops with similar results.
Some of the time the device accepts the static IP address configuration that I set. Other times a gateway will look like it takes the config but when I switch over to eth0 and change my address to check what I just configured, it doesn't work. I will go back to eth1 and the configuration is back to defaults.
I have also had a problem with attempting to reset one of the gateways using the hard reset procedure. The device appears to factory reset according to the SVR light flashing for around 5 minutes and then I will let it sit for good measure another few minutes.
When I connect to eth1, the device states that it is setting the network configuration, this could take up to one minute.
I have left this last gateway sitting there for over an hour and nothing has changed.
Out of the first 12 I have touched I have had problems with over half.
I am starting to believe this could be a GPO setting restricting something in IE that is causing the problem.
Currently this process is taking me over an hour to configure one gateway which is way too much. It should be like 10 minutes to configure and verify.
Also I have found that when configuring the gateways make sure that you are only connected on one port. Either power the gateway with a stand alone 12v power supply and configure using Eth1. Or use a POE switch to power the gateway on Eth0 and access the gateway through the switch. It creates issues if you have the gateway powered with a POE switch and then try to configure using Eth1.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :