Question about Cisco VPN 3000 (LL-VPN3000) for PC

2 Answers

Doubt in Accessing network computer.....

Dear all,
i have a doubt in accessing a computer through networks...
shall we enter into other system in a network under certain work group that the user does not have a user account, password and the folders are not in shared condition?
if the folders are in shared condition also i cannot access the computer without the user account and password?
do we have any way to enter into administration account with user rights...????
( bcoz some of the users are entering like that do i have any way to block that access ??? )
all the ip settings and other configurations are normal.. and the workgroup is also perfect.... some one just clear my doubt.......
what ever the ans is welcome....!!!


Posted by on

2 Answers

  • Level 2:

    An expert who has achieved level 2 by getting 100 points


    An expert that got 5 achievements.


    An expert whose answer got voted for 20 times.


    An expert who has answered 20 questions.

  • Expert
  • 118 Answers
Re: Doubt in Accessing network computer.....


Better you install ADS if you want to have tighter control over your users if you have windows 2000 Advanced server or above version follow these steps

open Start-->Run and type DCPROMO

Follow the wizard and when ased agree for DNS and DHCP installation .

Once Installed you can control your users

Start-->Programs-->Administrative Tools-->Domain Users & Computers


Posted on Nov 21, 2007

  • Level 2:

    An expert who has achieved level 2 by getting 100 points


    An expert that got 5 achievements.


    An expert who has written 50 answers of more than 400 characters.


    An expert who has answered 200 questions.

  • Expert
  • 244 Answers
Re: Doubt in Accessing network computer.....

It simple, you need to configure the security option in sharing folders. These are the following procedure below:

First, right click the folder you want to share and select sharing and security.

Second, click permissions command button. At permissions tab you need to remove group or user names appeared as everyone.

Third, after removing you need to add new account which will specify the only user permitted to access the shared folder.

Fourth, click Advance command button and click Find Now where all the available administrator accounts and users are displayed below.

Fifth, select user account which you are desire to use it in accessing the file by highlighten it. Then press OK and another OK button to finalized the settings.

Lastly, you can find an option allow and deny permission you can choice at any what you what to do it. Then click Apply and Ok button.

That's all, Hope you will rate my solution as SOLVED. That's simple instruction hope you like it.

Good luck.

Posted on Nov 21, 2007

Add Your Answer

0 characters

Uploading: 0%


Complete. Click "Add" to insert your video. Add


3 Points

Related Questions:

1 Answer

I have i tunes installed on my computer.ican access every thing buti tunes store it keeps sayine error -3212

Please check your firewall settings in the "Firewall" tab of the "Security & Privacy" pane of the "System Preferences" control panel. (You may need to enter your admin password to make any changes.) Click on the "Options Button" to reveal the advanced settings, which should look like this: section-wxsjj1v4xsdewb4oh4wuysh5-5-0.png

Note that both boxes are checked.

If this does not resolve the problem, then you may need to use the "+" button to explicitly add "iTunes" to the list of programs that can accept incoming connections.

Dec 23, 2014 | Network Software & Management Tools

2 Answers

Handycafe error says license warning? what to do?

Please check up with their support in case you are using a pirated software.check this link:

Dec 10, 2011 | Ates Software HandyCafe

1 Answer

Myspace and twitter is being blocked by k9 web protection and i want to get on it but do i bypass the k9 web protection

Well have you installed K9 or your parents? :D. If they did I m sorry to say that its better for your own good ha ha. If not you can configure it to allow myspace and twitter. But still I will not tell you how to bypass since I don't know whether you are a kid.
If you have not already logged in, enter your administrator password at the prompt and click OK. From the Setup menu, click Web Categories to Block. By unticking the tick for social networking (if it is ticked) you will be allowed to access any social network. Save the configurations.
Click URL key words Check whether those URLs have been blocked (full url and / or by words. You can clear the saved settings by allowing them.
There is another way of unblocking the site.
To override a blocked Web site: 1. On the Category Blocked page, choose an option under Allow This Site. The following figure shows an example. 2. From the Allow access to list, click one of the following options: • for 5 minutes to allow temporary access to this site for the next five minutes. • for 15 minutes to allow temporary access to this site for the next 15 minutes. • for 30 minutes to allow temporary access to this site for the next 30 minutes. • for 60 minutes to allow temporary access to this site for the next 60 minutes. • permanently to always allow access to this site. If you choose this option, one of the following happens: • If the Web site was blocked because of its category, the Web site is placed in the always allow list • If the Web site was blocked because it was in the always block list, the Web site is removed from the always block list. 3. Click Allow This Site. 4. You are required to enter your K9 Web Protection administrator password to confirm the action. This is how the "Block access by time of the day" works.
K9 Web Protection enables you to restrict the time of day users can access Web sites. If there are specific times when you do or do not want your family accessing the Web, this feature assists you in enforcing that policy. To restrict Web browsing access times: 1. Start K9 Web Protection 2. From the top menu bar, click Setup. 3. If you have not already logged in, enter your administrator password at the prompt and click OK. 4. From the Setup menu, click Time Restrictions. You have the following options: Unrestricted NightGuard Custom.
Just select the Unrestricted or modify Custom to re adjust the settings.
Adding a web site exception (Advanced). This is how its done.
You can create exceptions for any of the following reasons: ? Web sites that do not belong to any category ? Web sites you know your children access frequently, so you can make sure you enforce the appropriate action (allow or block) ? To allow access to specific Web sites that belong to a category that you otherwise want to block To set up Web site exceptions: 1. Start K9 Web Protection 2. From the top menu bar, click Setup. 3. If you have not already logged in, enter your administrator password at the prompt and click OK. 4. From the Setup menu, click Web Site Exceptions. Then exceptions can be added.
To remove the exception just remove the setting or add it to Always Allow.
To override a block and access blocked Web pages, you must enter the administrator password you configured when you installed K9 Web Protection.
Special cases.
If a Web page was blocked because it was on the always block list or because it is classified in a category you chose to block, you can ask Blue Coat to review the Web site’s rating as follows: ? You can request Blue Coat associate the Web site with more categories ? You can request Blue Coat reclassify the Web site, if you believe the categorization is incorrect.
Please rate the answer and a testimonial (comment) if the solution helped you to solve the problem... Thanks for contacting Fixya

May 24, 2010 | Network Software & Management Tools

1 Answer

I have a ip address for my security computer at my shop how do go on the internet an use the ip address to access it?

You should just need to enter the IP address in your browser.

I find this a good free app though

Apr 02, 2010 | Compaq Network Software & Management Tools

1 Answer

Hi.. how to remove block site while entering gmail


Are you trying to access this from a corporate network, or a home computer? If it is a corp network, it may have been blocked. If it is a home network, you can try adding it to trusted sites in IE. Click Tools, Internet Options, Security tab, click Trusted Sites, click sites and add the website address. Please let me know if you need further help.


Jan 07, 2010 | Network Software & Management Tools

2 Answers

Un block blocked web sites my space facebook and any blocked web sites on a government computer

Total Internet Privacy and the TIP Tunnel offer complete Private Internet Browsing,Private Internet Service, Anonymous Surfing, Anonymous Internet, web surfing through the webs best most secure and private web tunnel, with free private internet browsing tools. TIP is a complete encrypted VPN solution for private internet communications.
Tiptunnel is designed for individuals accessing the Internet from insecure Internet connections, such as wireless, or from countries with restrictive Internet filtering systems.
Anonymous Internet surfing by default simply doesn't happen but it is possible. The most basic way of protecting your identity is to use an anonymous VPN to hide your IP address when you are surfing. Your communications can still be intercepted as the majority of that web traffic is in the clear but it's less likely unless someone is deliberately targeting you, the main benefit is that your IP address is not left in the logs of the web servers and your web browsing will remain more private.
provides a secure, obscured VPN tunnel between your computer and our secure servers located in Asia or the US and the Europe.
TIP Tunnel Enterprise package includes:

* Anonymous surfing
* IP Address Obscurity, your real IP address is hidden
* Bypass Internet filtering by your ISP
* All traffic is 100% encrypted with AES 256 bit encryption
* Immune to packet sniffing, attacks and popups
* Real-time virus protection
* Real-time spam filtering
* Guaranteed 100% privacy with no logs
* Supported platforms include Windows, Linux and Mac
* Multiple server access worldwide
* Professional 24/7 Technical Support

Jan 06, 2010 | Computer Associates Full Version ...

1 Answer

Have purchased a lexmark X2670 and installed it via disk supplied. No instructions arrived with it and i wish to know what all the symbols stand for apart from switching on and selecting number of sheets.

You can download the user guide from this LINK

If the Lexmark X2600 series software is already installed in Windows:
    1. Go to Start, (All) Programs, and point to Lexmark 2600 Series.
    2. Select User's Guide.

Accessing the User's Guide on the installation CD:
If the software has not been installed yet:
    1. Insert the CD into the CD-ROM drive. The Lexmark installation screen should appear. If not, open My Computer and double-click on the 2600 Series icon.
    2. Click on the Documentation link.
    3. Click on User's Guide to open the guide
Please don't forget to say thanks if you find this useful

Oct 06, 2009 | Lexmark Network Software & Management...

1 Answer

I can't get my computers to talk to one another through sonicwall and Im wondering what could be the issue

THere are many things you must be fully educated on like DNS, IP numbering and subnet masking for different networks (for the different sites), TCP Port and Protocol (UDP, TCP) knowledge for different TCP services (you have to know what you want each network to have access to) and Public Key Private Key methodology, IPSec, PPTP and Routing.

THere are many things that can go wrong. FOr instance in your particular case I would assume that your router is not configured to utilize groups of users and then assign those same groups to different traffic templates. YOu need to make sure that your four locations are assigned a particular traffic pattern. Most allow what the other gentleman spoke of "remote access" but you need more of a open network amongst authenticated users.

Routers of this class generally work by allowing you to assign traffic to a very specific Port and direction assignment. For instance simply - http traffic is always on port 80. If you wanted your users to have internet HTTP connectivity you must assign port 80 incoming and outgoing to those users and assign that traffic to internal and external IP addresses by using Network Address Translation on the IP address of the external network. YOu also want to make certain that your Gateway for the remote users are using their own internet service provider account because sometimes uneducated people setup the internet access to be routed to the external ip adddress on the home router. In this situation you would have a remote user dialing the home office and then requesting an internet page from that External network, only to have that traffic then come back to the home router and then out again over the vpn to the remote location. All internet traffic should be routed to the local gateway of that locations provider. THose remote routers will allow this and then only file sharing and printing and other critical network services should be routed over the VPN itself.

As I said it is very complicated and I would definitely pay someone to do this for you and then walk you through basic configuration issues while they are there. You would probably pay in the neighborhood of about 100-150 an hour but for this level you would be getting a certified and knowledgable person. You could also call SonicWall and have them walk you through it for a fee. Watchguards fee is 500.00 to 1000.00 depending on sophistication.

I am sure this only confused you more but IP Routing and VPN traffic routing is difficult and even people who have been in this industry for a very long time find it difficult. You have to be in it and doing it all the time for it to come second nature. I believe your IP addresses are on completely different subnets or ranges. That is another place to start. You really need to setup your internal networks at all locations on the SAME NETWORK in order for them to speak to one another. is one network that is publicly unroutable or or These are common netoworks.

I'll try to give you a short lesson this. subnet masks (the number under the ip address in the networks section allows you to segment your traffic to only communicate to a certain NUMBER of computers.

An IP Address of with a subnet mask of gives you zero computers. If you move the subnet mask to you get 4 ip address but only 2 computers that can talk to one another. THe ip address in this configuration would be,, and The first ip address of any given network is ALWAYS the network address and should not be used ( the next two ip address can be assigned to computers and the last ip address is always a "Broadcast" address for the network to speak on.

YOu could have started with another number to begin with for instance subnet mask 255.255.252 and the same methodology would apply. is the network, and 56 are the computer addresses and is the broadcast address.

If you want to have multiple computers at different locations you must all be on the same network with the same IP addressing scheme.

AN example subnet mask of would give you available address of 254 computers but 256 addresses (including zero).

The subnet masks are as follows for this network above (maybe you can use this)

Zero Computers only a network address and a broadcast address. Remember you only have 256 addresses in a range and the first is network and the last is broadcast so in this configuration you have and (only two addresses)

Two Computers and with network of (first IP number) and broadcast of (last IP Number) only two usable addresses but FOUR ip addresses.

Six computers with IPS of to Network of dot zero and broadcast of dot seven (

fourteen address to
network .0, broadcast .15

subnet of 255.255.224
thirty computers to
network of .0 and broadcast of .31

subnet of 255.255.192
sixty two computers 111.1 to 111.62
network of .0 and broadcast of .63

subnet of 255.255.128
One hundred twenty six computers 111.1 to 111.126
network of .0 and broadcast of .127

subnet of 255.255.0
Two hundred fifty four computers 111.1 to 111.254
network of .0 and broadcast of .255.

THis is one reason the actual computers wont talk to one another probably. ALL computers on the VPN must talk on the same Route or be ROUTED with the routers routing of networks options. to make the traffic move from one network to another.

May 03, 2009 | Network Software & Management Tools

1 Answer

Exceed not working on office network

Well, first, what is your internet connection bandwidth?
Most of the vpns drop the connections when the speed is not good enough, and that means your application won't work fine.
Also, when you use WiFi you can transmit upto 54megabits per second only (the wired network speed is 100MBPS), unless you have wifi N.
Anyway, first I would check the internet speed/bandwidth, test with a faster one, and if everything goes fine, then you know what the problem was :D.

Mar 05, 2009 | Hummingbird Exceed 10.0

Not finding what you are looking for?
Cisco VPN 3000 (LL-VPN3000) for PC Logo

276 people viewed this question

Ask a Question

Usually answered in minutes!

Top Cisco Network Software & Management Tools Experts

Jax Planet
Jax Planet

Level 2 Expert

921 Answers


Level 1 Expert

4 Answers

Shahzad  Waseem...
Shahzad Waseem...

Level 3 Expert

746 Answers

Are you a Cisco Network Software and Management Tool Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides