A lieneter for the two houses of oracle?

Hello

If I have two houses of Oracle on the same servers (say 10.2.0.4 and 10.2.0.5), do I have to set up two listeners (one for the databases of each home page) a listener (of the superior Oracle home version probably) Gold will be good enough? If a listener is enough, is there a special setup for these cases?

Best regards


Hello

Yes, it is possible to create a listener to manage both houses of Oracle, see links.

http://dbataj.blogspot.com/2008/02/managing-multiple-OracleHome-on-same.html

http://www.dbasupport.com/forums/showthread.php?21095-one-listener-with-multiple-Oracle-homesrw

Kind regards

Tags: Database

Similar Questions

  • Restore the database on the two houses of Oracle

    Hi all

    Oracle 9iR2

    OEL 5

    I have our database of PROD rman backup, the SID is also named PROD.

    I want to restore it to a different server, but I want two database restored the same SID on the same server.

    For example, I create OracleHome1/u01/app/oracle and OracleHome2 another/u02/app/Oracle.

    Then I'll bring backup rman for each House, create two identical databases. Is this possible?

    Thank you very much

    JC

    No, 32-bit guest OS cannot use hardware virtualization assisted using a type 2 hypervisor. VirtualBox is an application and type 2 hypervisor. What you need is the Oracle VM x 86 Server, which is a type 1 hypervisor where you can run a 32-bit guest with the support of paravirtualized system.

    The following will give you a good overview: paravirtualization (PV) - Xen

  • Problem with the VPN site to site for the two cisco asa 5505

    Starting with cisco asa. I wanted to do a vpn site-to site of cisco. I need help. I can't ping from site A to site B and vice versa.

    Cisco Config asa1

    interface Ethernet0/0
    switchport access vlan 1
    !
    interface Ethernet0/1
    switchport access vlan 2
    !
    interface Vlan1
    nameif outside
    security-level 0
    IP address 172.xxx.xx.4 255.255.240.0
    !
    interface Vlan2
    nameif inside
    security-level 100
    IP 192.168.60.2 255.255.255.0
    !
    passive FTP mode
    network of the Lan_Outside object
    192.168.60.0 subnet 255.255.255.0
    network of the NETWORK_OBJ_192.168.1.0_24 object
    subnet 192.168.1.0 255.255.255.0
    network of the NETWORK_OBJ_192.168.60.0_24 object
    192.168.60.0 subnet 255.255.255.0
    object-group Protocol DM_INLINE_PROTOCOL_1
    ip protocol object
    icmp protocol object
    object-group Protocol DM_INLINE_PROTOCOL_2
    ip protocol object
    icmp protocol object
    object-group Protocol DM_INLINE_PROTOCOL_3
    ip protocol object
    icmp protocol object
    Access extensive list ip 192.168.60.0 Outside_cryptomap allow 255.255.255.0 192.168.1.0 255.255.255.0
    Outside_cryptomap list extended access allow DM_INLINE_PROTOCOL_3 of object-group a
    Outside_access_in list extended access allow DM_INLINE_PROTOCOL_1 of object-group a
    Inside_access_in list extended access allow DM_INLINE_PROTOCOL_2 of object-group a
    network of the Lan_Outside object
    NAT (inside, outside) interface dynamic dns
    Access-group Outside_access_in in interface outside
    Inside_access_in access to the interface inside group
    Route outside 0.0.0.0 0.0.0.0 172.110.xx.1 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    identity of the user by default-domain LOCAL
    AAA authentication http LOCAL console
    Enable http server
    http 192.168.60.0 255.255.255.0 inside
    http 96.xx.xx.222 255.255.255.255 outside
    No snmp server location
    No snmp Server contact
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-TRANS-aes - esp esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-MD5-TRANS esp - esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transit
    Crypto ipsec ikev2 ipsec-proposal OF
    encryption protocol esp
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 proposal ipsec 3DES
    Esp 3des encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES
    Esp aes encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES192
    Protocol esp encryption aes-192
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 AES256 ipsec-proposal
    Protocol esp encryption aes-256
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec pmtu aging infinite - the security association
    card crypto Outside_map 1 corresponds to the address Outside_cryptomap
    card crypto Outside_map 1 set peer 96.88.75.222
    card crypto Outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    card crypto Outside_map 1 set ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
    Outside_map interface card crypto outside
    trustpool crypto ca policy
    IKEv2 crypto policy 1
    aes-256 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 10
    aes-192 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 20
    aes encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 30
    3des encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 40
    the Encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    Crypto ikev2 allow outside
    Crypto ikev1 allow outside
    IKEv1 crypto policy 10
    authentication crack
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 20
    authentication rsa - sig
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 30
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 40
    authentication crack
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 50
    authentication rsa - sig
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 60
    preshared authentication
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 70
    authentication crack
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 80
    authentication rsa - sig
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 90
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 100
    authentication crack
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 110
    authentication rsa - sig
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 120
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 130
    authentication crack
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 140
    authentication rsa - sig
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 150
    preshared authentication
    the Encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH stricthostkeycheck
    SSH timeout 5
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    inside access management

    dhcpd address 192.168.60.50 - 192.168.60.100 inside
    dhcpd allow inside
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    WebVPN
    AnyConnect essentials
    internal GroupPolicy_96.xx.xx.222 group strategy
    attributes of Group Policy GroupPolicy_96.xx.xx.222
    VPN-tunnel-Protocol ikev1, ikev2
    username admin privilege 15 encrypted password f3UhLvUj1QsXsuK7
    tunnel-group 96.xx.xx.222 type ipsec-l2l
    tunnel-group 96.xx.xx.222 General-attributes
    Group - default policy - GroupPolicy_96.xx.xx.222
    96.XX.XX.222 group of tunnel ipsec-attributes
    IKEv1 pre-shared-key *.
    remote control-IKEv2 pre-shared-key authentication *.
    pre-shared-key authentication local IKEv2 *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    inspect the icmp
    inspect the icmp error

    ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

    Cisco ASA 2 config

    interface Ethernet0/0
    switchport access vlan 1
    !
    interface Ethernet0/1
    switchport access vlan 2
    !
    interface Vlan1
    nameif outside
    security-level 0
    IP address 96.xx.xx.222 255.255.255.248
    !
    interface Vlan2
    nameif inside
    security-level 100
    IP 192.168.1.254 255.255.255.0
    !
    passive FTP mode
    permit same-security-traffic inter-interface
    permit same-security-traffic intra-interface
    network of the Lan_Outside object
    subnet 192.168.1.0 255.255.255.0
    network of the NETWORK_OBJ_192.168.60.0_24 object
    192.168.60.0 subnet 255.255.255.0
    network of the NETWORK_OBJ_192.168.1.0_24 object
    subnet 192.168.1.0 255.255.255.0
    object-group Protocol DM_INLINE_PROTOCOL_1
    ip protocol object
    icmp protocol object
    object-group Protocol DM_INLINE_PROTOCOL_2
    ip protocol object
    icmp protocol object
    object-group Protocol DM_INLINE_PROTOCOL_3
    ip protocol object
    icmp protocol object
    object-group Protocol DM_INLINE_PROTOCOL_4
    ip protocol object
    icmp protocol object
    Outside_cryptomap list extended access allow DM_INLINE_PROTOCOL_2 of object-group 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
    Outside_cryptomap list extended access allow DM_INLINE_PROTOCOL_3 of object-group a
    Outside_access_in list extended access allow DM_INLINE_PROTOCOL_1 of object-group a
    Inside_access_in list extended access allow DM_INLINE_PROTOCOL_4 of object-group a
    pager lines 24
    Enable logging
    asdm of logging of information
    Outside 1500 MTU
    Within 1500 MTU
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    no permit-nonconnected arp
    NAT (inside, outside) static source NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.60.0_24 NETWORK_OBJ_192.168.60.0_24 non-proxy-arp-search of route static destination
    !
    network of the Lan_Outside object
    dynamic NAT (all, outside) interface
    Access-group Outside_access_in in interface outside
    Inside_access_in access to the interface inside group
    Route outside 0.0.0.0 0.0.0.0 96.xx.xx.217 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    identity of the user by default-domain LOCAL
    AAA authentication http LOCAL console
    Enable http server
    http 192.168.1.0 255.255.255.0 inside
    http 172.xxx.xx.4 255.255.255.255 outside
    No snmp server location
    No snmp Server contact
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-TRANS-aes - esp esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-MD5-TRANS esp - esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transit
    Crypto ipsec ikev2 ipsec-proposal OF
    encryption protocol esp
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 proposal ipsec 3DES
    Esp 3des encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES
    Esp aes encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES192
    Protocol esp encryption aes-192
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 AES256 ipsec-proposal
    Protocol esp encryption aes-256
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec pmtu aging infinite - the security association
    card crypto Outside_map 1 corresponds to the address Outside_cryptomap
    card crypto Outside_map 1 set peer 172.110.74.4
    card crypto Outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    card crypto Outside_map 1 set ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
    Outside_map interface card crypto outside
    trustpool crypto ca policy
    IKEv2 crypto policy 1
    aes-256 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 10
    aes-192 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 20
    aes encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 30
    3des encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 40
    the Encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    Crypto ikev2 allow outside
    Crypto ikev1 allow outside
    IKEv1 crypto policy 10
    authentication crack
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 20
    authentication rsa - sig
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 30
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 40
    authentication crack
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 50
    authentication rsa - sig
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 60
    preshared authentication
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 70
    authentication crack
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 80
    authentication rsa - sig
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 90
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 100
    authentication crack
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 110
    authentication rsa - sig
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 120
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 130
    authentication crack
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 140
    authentication rsa - sig
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 150
    preshared authentication
    the Encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH stricthostkeycheck
    SSH timeout 5
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0

    dhcpd address 192.168.1.50 - 192.168.1.100 inside
    dhcpd allow inside
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    WebVPN
    AnyConnect essentials
    internal GroupPolicy_172.xxx.xx.4 group strategy
    attributes of Group Policy GroupPolicy_172.xxx.xx.4
    L2TP ipsec VPN-tunnel-Protocol ikev1, ikev2
    username admin privilege 15 encrypted password f3UhLvUj1QsXsuK7
    tunnel-group 172.xxx.xx.4 type ipsec-l2l
    tunnel-group 172.xxx.xx.4 General-attributes
    Group - default policy - GroupPolicy_172.xxx.xx.4
    172.xxx.XX.4 group of tunnel ipsec-attributes
    IKEv1 pre-shared-key *.
    remote control-IKEv2 pre-shared-key authentication *.
    pre-shared-key authentication local IKEv2 *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    inspect the icmp
    inspect the icmp error
    inspect the http

    For IKEv2 configuration: (example config, you can change to encryption, group,...)

    -You must add the declaration of exemption nat (see previous answer).

    -set your encryption domain ACLs:

    access-list-TRAFFIC IPSEC allowed extended LOCAL REMOTE - LAN LAN ip

    -Set the Phase 1:

    Crypto ikev2 allow outside
    IKEv2 crypto policy 10
    3des encryption
    the sha md5 integrity
    Group 5
    FRP sha
    second life 86400

    -Set the Phase 2:

    Crypto ipsec ikev2 ipsec IKEV2-PROPOSAL
    Esp aes encryption protocol
    Esp integrity sha-1 protocol

    -set the Group of tunnel

    tunnel-group REMOTE-PUBLIC-IP type ipsec-l2l
    REMOTE-PUBLIC-IP tunnel-group ipsec-attributes
    IKEv2 authentication remote pre-shared-key cisco123


    IKEv2 authentication local pre-shared-key cisco123

    -Define the encryption card

    address for correspondence CRYPTOMAP 10 - TRAFFIC IPSEC crypto map
    card crypto CRYPTOMAP 10 peer set REMOTE-PUBLIC-IP
    card crypto CRYPTOMAP 10 set ipsec ikev2-IKEV2-PROPOSAL
    CRYPTOMAP interface card crypto outside
    crypto isakmp identity address

    On your config, you have all these commands but on your VPN config, you mix ikev1 and ikev2. You have also defined political different ikev2. Just do a bit of cleaning and reached agreement on a 1 strategy for the two site (encryption, hash,...)

    Thank you

  • Can we apply a createInsert single button for the two master form, details of Table?

    Mr President.

    Can we apply a createInsert single button for the two master form, details of Table?

    I want to just click a button and fields are available in form-Master and details-table.

    As below

    vfdt.png

    Concerning

    Mr President.

    My worm jdev is 12 c

    And I can do your job for you.

    His code

    For any organization that wants to do this job

     public void createVoucherAndVDetailsRow(){
                VoucherViewImpl voucherVO=this.getVoucherView1();
                VoucherViewRowImpl row=(VoucherViewRowImpl)voucherVO.createRow();
                voucherVO.insertRow(row);
                RowIterator iterator= row.getVoucherdetView();
                String voucherNumber=row.getVoucherId();
                NameValuePairs nvps=new NameValuePairs();
                nvps.setAttribute("VoucherId", voucherNumber);
                VoucherdetViewRowImpl voucherdetRow=(VoucherdetViewRowImpl)iterator.createAndInitRow(nvps);
                iterator.insertRow(voucherdetRow);
                }
    

    Concerning

  • The course that I did for the OCP certification in Oracle Database 11 g does not appear on the list of courses on the pearson Web site view.

    The course I did for the OCP certification in Oracle Database 11 g does not appear on the view list of courses on the pearson Web site, I sent an email to [email protected] < deleted by the moderator e-mail address > , no response within 7 days since 01/28/2015, enamel is lower, the title of my course is in Portuguese.  What should I do in this case?

    ------------------------------------------------------------

    Dear Oracle.

    I send you this mail because recently I passed the exam 1Z0-053-Oracle Database 11 g: Administration II, which is the last review necessary to acquire the OCP Certification. However, in the path to certification, I need to prove that I participated in an official Oracle training.

    Research for the course on the site to view pearson, I did find the name of course on the list. So I'm sending you this email with the courses required for certification information. I attended the course at FIAP College (http://www.fiap.com.br/en/conheca-a-fiap/parcerias-estrategicas/), in the city of São Paulo (Brazil) of March, 2010 until March 2011. The above link is possible to check that the University is a partner of Oracle. The title I had was "Graduate in Oracle Database Management".

    In this e-mail, I have attached a copy of the certified course FIAP (front.jpg, certificate Back). I also send my profile data in the site view pearson (Pearson VIEW - my profile.pdf) and my scores on tests for certification of OCP (1Z0 - 051.pdf, 1Z0 - 052.pdf, 1Z0 - 053.pdf).

    If you need additional information just let me know and I'll give you.

    Please acknowledge this information and give me the OCP certification (Oracle Database 11g Administrator Certified Professional).

    Kind regards.

    Italo Moises dos Santos.

    Oracle ID: < deleted by the moderator test >

    ------------------------------------------------------------

    I did this way, because the https://education.oracle.com/pls/eval-eddap-dcd/OU_SUPPORT_OCP.home?p_source=OCP link has not worked, I sent my class even without knowing if it will be accepted, so I exchanged a few emails and my journey has been accepting.

  • to install Indesign on my new computer, but can't. First bought CS2 in 2009 and upgraded to 7.5 in 2011. I have the serial numbers for the two and was able to use it on my last computer. Where should I start?

    to install Indesign on my new computer, but can't. First bought CS2 in 2009 and upgraded to 7.5 in 2011. I have the serial numbers for the two and was able to use it on my last computer. I use Indesign that often but there are some projects that it is good for. Where should I start?

    Lchrichton123 what version of InDesign are specifically keen to install?  You can find links to the installation files for the majority of Adobe Creative software titles of other downloads

  • Several instances of container, with PDB, located in the same House of Oracle?

    Hello

    I'm just doing labs OBE on a VM for now, until I get new hardware which runs to 12.1.0.2 database. The issue I'm having with a laboratory OBE, which demonstrates her unplug and plug from one container to another PDB has confused me. The laboratory reports the following set up:

    Prerequisites

    Before you begin this tutorial, you should:

      • Install the Oracle 12 c database.
      • Create two CDBs with two PDBs in the CBD first.
    1. The environment used in the development of this tutorial is:
      • ORACLE_HOME: /u01/app/oracle/product/12.1.0
      • TNS listener: 1521
      • Databases:
        • SID: cdb1
        • SID: cdb2
      • Pluggable databases (in cdb1):
        • PDB1
        • pdb2

    The problem I have is when I use DBCA or scripts to create CDB2, it does not create a new database from the container. I get an instance and a database called CDB2, but it is not a CBD. I getORA-65090: operation only allowed in a container database.

    In the DBCA Wizard, make sure that "install connectable database to" is checked, and I in the SPFILE ENABLE_PLUGGABLE_DATABASE = TRUE... The new instance is the name I gave him, without plug-in database installed and for CDB2:

    SQL > select name from v$ database;

    NAME

    ---------

    CDB2

    SQL > show con_id

    CON_ID

    ------------------------------

    0 (is expected to see a 1)

    SQL > show con_name

    CON_NAME

    ------------------------------

    cdb2 (is expected to see CBD$ ROOT)

    The link to the lab can be found here:

    Connect a disconnected Pluggable database

    Is it possible to have two databases containing the same ORACLE_HOME? What Miss me to install a second data base of the container?

    I chose not "tocreate a database of the container", but that I listed above, when he tries create the pdb file, it returns ORA-65090: operation allowed only in a database container.

    The OS is OEL 6.6 X86_64.

    You haven't said why you change the SPFILE - it will be created properly when you create a CBD.

    Remember: we cannot see your monitor or WHAT you do.

    You must post EACH NOT you do and EACH ENTRY you make or that we cannot try to reproduce the problem.

    Take a look at this article in the Oracle database in DBCA use to create a CBD and PDB at the same time. Notice how he SAYS what entries are made.

    ORACLE-BASE - shared: create and configure a database container (CDB) in Oracle Database Release 1 (12.1) 12 c

    Note also that the FIRST screen of the DBCA section will NOT lets you choose a House of the Oracle, but only the location for the database files.

  • photosmart c6380 need driver for xp pro 32-bit who also works for the two laptops with win 7

    Recently, I was given an all-in-one Photosmart C6380.  It came without driver/installation disk.  I will link to my workhorse desktop with XP Pro 32-bit operating system.  We have two laptops with Windows 7 operating system.  I want to be able to print from wireless laptops.  Should which driver I proceed?  I found the XP driver but it is version 12.1.  I read that was a version 13 or higher needed for the printer to work a Windows 7 operating system.  There are tasks to accomplish what I want to do?  If Yes, where can I find the patches?

    Hello

    Do not hesitate to ask whenever you are not sure, that's why we're here

    And about your question, you are absolutely right - the 2nd software is for Windows 7.

    For all still help you may need, please do not hesitate and let us know.

    Kind regards

    Shlomi

  • Merge data to account for the two windows 8 accounts

    I have two devices Win8 and two different accounts, that I use to sign in them. The first is my smartphone. When I put in place, I created a new live account despite my doubts (I hate the areas of Microsoft mail). A few months down the line, I bought a laptop computer with Win8 (now updated to 8.1), but when I created it I did it knowing I could use any domain e-mail account so I chose to use my gmail account. Fast forward to today, my phone does not work as it should, and it was recommended that I do a factory reset to try to clear up the problems. When I put my phone again, I intend to use my gmail account this time so that the synchronization with the habit of my laptop be so boring with some applications. The problem is the information I have on my real account in the cloud, such as the phone numbers in the people application. My gmail people and my people live have the same information except for that. Is there a way I can easily add back all the clouds of my live account to my gmail account, when I put my phone up I get headaches very little experience and the downtime?

    Hi Oleson,

    If you've used Gmail account as Microsoft account when you used your phone for the first time, you will be able to access all your contacts by logging into people.live.com

    Therefore, even if you use the Gmail account as Microsoft account on your phone, you'll get all the contacts added to your device.

    If the Gmail account was not used to connect to your phone, follow the steps below to save all contacts to CSV. Later, you can use this file to export into the Gmail account that you use as a Microsoft account.

    1. Connect to http://people.live.com using your Microsoft account. (the e-mail address used to connect to the phone)
    2. Click Manage , and then select export for outlook.com and other services.
    3. Then save the CSV on your device.
    4. People disconnect and connect again using your Gmail account.
    5. Click on start import.
    6. Select other click Browse and Select the file in the location of his record.
    7. Click on download.

    Hope this information helps. Please let us know if you need additional assistance.

  • How can I create a list of choices for the search bit in Oracle 11g ADF fields?

    Hi Experts,

    Please inform how to add some selection list or drop downs on the pane search Oracle 11g ADF.

    I have a requirement to create a list of choices for the search store field. # Please notify.

    SS_SearchCriteriaPage1.png

    Thank you

    David Selvaraj

    You can create a view based on a static list object and attach it to your attribute as lov-driven model.

    Dario

  • Multiple instances of the APEX version share the same House of Oracle?

    Hello

    I'm working on the database oracle 11.2.0.2

    I have 2 instances DEV and PROD sharing the same oracle home.

    For the moment, the apex version is identical to 2 instances (4.2.1.00.08) and installed together with the embedded PL/SQL gateway.

    is there a potential problem for upgrade only version apex for the dev to 4.2.6 instance?

    concerning

    JM

    jmniard wrote:

    I'm working on the database oracle 11.2.0.2

    I have 2 instances DEV and PROD sharing the same oracle home.

    For the moment, the apex version is identical to 2 instances (4.2.1.00.08) and installed together with the embedded PL/SQL gateway.

    is there a potential problem for upgrade only version apex for the dev to 4.2.6 instance?

    An instance of the APEX using EPG exists entirely within the database once it is installed. External dependencies only would be on the scripts of utility provided with the installation media. Extract the installation files to the version files in a subfolder of the APEX of the ORACLE_HOME (apex/4.2.1, apex/4.2.6 etc.), to ensure you have access to the 4.2.1 and 4.2.6 install files so that should need you to execute a utility script (apxchpwd.sql for example) that you are running the correct for the involved database version.

  • The same POPup can be used for the two buttons

    Hi all

    I'm looking for an application where I need to use the same popup for two different buttons. This popup has a form of the ADF. I want to use for the Insert on a table of the ADF operation. The requirement is something like below

    A JSF page should have an ADF read only table with 3 buttons Insert, read, delete respectively. Buttons Insert and should be using popup which the user can enter data and display the data respectively. I am

    way to a form of the ADF for the insert PopUp. Now the problem is when the user selects a row in the table and click on the View button it should open a popup with read only form displaying the data from the selected row. For this I use the

    same popup which I use for insertion of information by changing properties readonly or I have to create a separate popup for the purpose of seeing it please help me out in that.

    Thanks in advance.

    Published by: 959766 on November 6, 2012 10:11

    You can use the same popup...

    Timo

  • Cannot write trace files destined for the bottom dump in oracle 10 g

    Hi all

    Version of the OS: RHEL 5.7
    DB version: 10.2.0.4
    cluster: database node 2 RAC

    Today I faced a strange behavior for one of our production database. Its a database of 2 rac nodes. There is no automatic generation of trace files in the destination of bottom dump on the first node. I am able to see the second trace files in its context dump dest. But the strange behavior occurs on the first node. I see that alert logfile in the bottom dump dest. Despite an error that displays the generated trace file but no file is located in the bdump. Here is the error, but physically he no trace file is generated:
    Errors in file/oracle/db/admin / < sid > /bdump/ < sid >j0011558.trc:
    ORA-12012: error on auto run 94377 work
    ORA-12008: error path refresh materialized view
    can someone have any idea for this strange behavior. There is no script maintenance for the removal of trace files.

    Kind regards
    Imran Khan

    its his work after you re-create your synonym then Yes you should not recreate MV again.

  • CF9 - sort order of change for the recordset of db (Oracle)

    Hello, everyone.

    I'm responsible for a part of the project which consists in using a form to change the sort order of the data retrieved from a database of Oracle (10g production, development of 11g).  I've never had to do something like this before, so I'm a bit of a loss as to how to go about it.

    I thought by using the jQuery UI draggable feature, but do not know how to save the data in the database.

    With or without jQuery-UI, what do you think is the best way to go about this?

    Respectfully,.

    ^_^

    A co-worker suggested using the jQuery-UI for the sorting and AJaX to present the new sort order on each change.

  • How to check for the two first digits?

    Can someone please... There is demand to have a hidden field on the form that will be filled with data. It's going to be 6 digits long and could start with 02 or 04. I need to check on the DocReady event, for the first two digits. If the first two digits are 02, the presentation of the form will remain as it is. If the first two numbers are 04, I'll have to show two hidden subforms. Can someone please provide an explanation on how to check for the first two digits of field 6 digits and do some actions.

    Thank you very much

    No, only in the event: Exchange.

Maybe you are looking for

  • All the drop down menus are broken in Firefox 5.01 on system dual monitor.

    My system specs... Intel Core 2 Quad 9550 clocked at 3.2 GHz 8 GB of OCZ DDR2 6400 PNY GTX 460SSC 4 WD Caviar Black SATA HD is a total of 4 TB Blu - ray LG burner Plextor DVD burner 1000W Corsair modular power supply Corsair Obsidian 700 d case When

  • while force loop to run every 1 sec

    Is anyway I could force the while loop to run every seconds. Let's say I have a while loop with a few structures of the case. I want to force execution of every 1 or 2 seconds. How could we do in labview

  • Aligning a zero position on a graph with several scales &amp; Auto scale

    Hello! I hope it's a quick - but google searches and browse the forums nothing have mounted. I have a graph with two scales - a position and a speed (which can obviously differ from each other). I want to be able to do is to have the scale auto chart

  • Another included charger - EP800

    Hello I recently bought a D5833 because I got my previous D5833 stolen a month ago, but when I opened the box, I noticed that another charger was included. The charger I had was EP880, so-called "fast charger" out there, but what I found in the new p

  • Updates for the SSD of 32 GB LITEON m2 on a special edition of Dell XPS-8900.

    Has anyone successfully upgraded Cache SSD m2 on their system XPS-8900? I have a Dell XPS-8900 that I bought a few months ago, and you want to update the cache of hard drive SSD m2.  The system has 2 to 7200 RPM hard drive + Cache SSD of 32 GB m2, 16