Cisco CLI parser
How can I access this tool. When I try to download, it asks me to login and it won't let me use my CCO login. Can I ask a tool-specific login, or what procedure should I follow? Available to users not just final partners?
Thank you
Michael K. Smith
Hi Michael,
Can you please try to clear your browser's cache/cookies and download via https://cway.cisco.com/go/sa/ ? Please note after the installation you will not be able to use the tools of TAC unless you have a valid contract associated with your account to CCB.
Thank you
John
Tags: Cisco Tools
Similar Questions
-
ORC with CLI Analyzer 2.1 login problems
Is anyone else having issues to be able to connect to your OCC account via the CLI parser?
I can access my ORC account via a web browser very well, but when I try to submit my output of the command to the CLI, the CCO login Analyzer analysis fails. My proxy logs and tests all indicate that connections to the...
- cloudsso. Cisco.com
- SSO. Cisco.com
- API. Cisco.com
- cway. Cisco.com
.. .are allowed. The logs show that the CLI parser contacted cway.cisco.com then nothing afterwards. The CLI parser shows error "there was a connection error. Check your user name and password and try again. »
Thoughts?
Mark, Michael,
In addition to the changes to your proxy you have also updated the proxy settings in the settings tab in the CLI parser?
After making the changes you need to restart the application as well.
Thank you
John
-
MRM - 'monitor source address is not configured "?
Greetings,
I try to use MRM, but the "manager" doesn't seem to know its source, despite the research address as it does.
I tried several source interfaces.
Mrm - ip TEST Manager
Serial0/0.1 225.0.0.1 Workgroup Manager
senders 1
2 receptors
-----------------------------------------
R3 #sh ip mrm manager TEST
Manager:test/1.0.0.1 is not running
Beacon interval/holdtime / ttl:60/86400/32
Group: 225.0.0.1, UDP port test-package/status-report: 16384 / 65535
Test mailers:
5.5.5.5
Receivers of tests:
1.1.1.1
-----------------------------------------
R3 #mrm TEST start
Source monitor address is not configured
-----------------------------------------
???!!!! Another interface (loopback)
-----------------------------------------
R3 #sh ip mrm manager TEST
Manager:test/3.3.3.3 is not running
Beacon interval/holdtime / ttl:5/86400/32
Group: 239.0.0.1, UDP port test-package/status-report: 50000 / 50001
Test mailers:
5.5.5.5
Receivers of tests:
1.1.1.1
R3 #mrm TEST start
Source monitor address is not configured
-----------------------------------------
I tried this on various 3640 s running enterprise 12.3 and a 12.2 (32) running of 2500. All have the same result.
You missed this command, I think.
"R1(config-mrm-manager) # 2 sender-list of recipients 1.
While the Cisco IOS CLI parser accepts the command entered without the pair of keywords-argument access-list-list of senders, this pair of keyword-argument is not optional. For a test MRM work, you must specify the sources that the Test receiver should monitor using the sender-list of keyword argument and access list.
This should solve the problem.
HTH-Cheers,
Swaroop
========================================
]
R1 #sh ip mrm in
R1 #sh ip interface of mrm
State of the address of the interface Mode
FastEthernet0/0 10.1.1.1 - receiver to Test upward
R1 #mrm TEST1?
start the start IP MRM test
stop the test to stop IP MRM
R1 #mrm TEST1 beginning
R1 #mrm TEST1 beginning
R1 #.
R1 #.
R1 #sh
00:06:23: test of IP MRM 'TEST1' begins...
% Of type 'show?' for a list of subcommands
R1 #.
R1 #.
R1 #.
R1 #sh ip Manager mrm
Manager:Test1/10.1.2.1 is running, expiration: 1d00h
Beacon interval/holdtime / ttl:60/86400/32
Group: 239.1.1.1, UDP port test-package/status-report: 16384 / 65535
Test mailers:
10.1.1.2 n - Ack
Receivers of tests:
10.1.2.2 n - Ack
R1 #sh ip Manager mrm
Manager:Test1/10.1.2.1 is running, expiration: 1d00h
Beacon interval/holdtime / ttl:60/86400/32
Group: 239.1.1.1, UDP port test-package/status-report: 16384 / 65535
Test mailers:
10.1.1.2 n - Ack
Receivers of tests:
10.1.2.2 n - Ack
R1 #.
!
Manager of mrm IP TEST1
Manager group 239.1.1.1 FastEthernet1/0
senders 1
receivers 2-list 1
!
access-list 1 permit 10.1.1.2
access-list 2 allow 10.1.2.2
!
!
R1 #sh cdp nei
Ability code: R - router, T - bridge Trans, B - road Source bridge
S - switch, H - host, I - IGMP, r - Repeater
Device ID Local Intrfce Holdtme Port platform capability ID
R2 Fas 0/0 135 R 3620 Fas 0/0
R3 Fas 1/0 172 R 3620 Fas 0/0
R1 #.
R1 #.
R1 #sh ip int brie
Interface IP-Address OK? Method status Prot
Commissioner of official languages
10.1.1.1 FastEthernet0/0 YES manual up up
10.1.2.1 FastEthernet1/0 YES manual up up
Loopback0 1.1.1.1 YES manual up up
R1 #.
----------------------------
-
change the IP address of the RADIUS server
Hi all
I'm looking to reloacte a Ganymede server + inside the demilitarized zone and, consequently, the server will be on a new IP range.
I will seek the role these command using chat tools that I have a large number of switches
the configuration of switches is less than
existing Ganymede:
host key 10.11.11.40 radius-server 9090897979800090908
Now I move the server to a new IP 10.99.1.40
If I put the command
host key 10.99.1.40 radius-server 9090897979800090908
the configuration looks like this:
host key 10.11.11.40 radius-server 9090897979800090908
host key 10.99.1.40 radius-server 9090897979800090908
I need to confirm that when I switch the server again this IP switches will turn to the new ip address of 10.99.1.40 and I do after all, that is, remove the old line: no host key 10.11.11.40 radius-server 9090897979800090908
Or it will work now and I have to set up a group that is located at the bottom of the page from the link below
http://www.Cisco.com/c/en/us/TD/docs/iOS/12_2/security/configuration/guide/fsecur_c/scftplus.html
Thank you very much
The method explained in the linked document is the most recent. On IOS 15.x the previous method (which still works) generates a message in the cli parser that it was withdrawn and Cisco recommends to the new method.
That said, each method should work. The new method should be good all switches or routers with IOS 12.0 +.
When there are two servers configured, IOS them will try in order and, if a response is not received in three trials (each in the case of multiple servers), it may fall to another configured method aaa (or fails aaa if no second method has been defined)
-
Need help to reset/compensation port security on a PowerConnect 35XX
I implement port security on our network, and I've never worked with these before switches. I'm used to the Cisco CLI, who was the command exec "int sticky clear dry port", but it doesn't seem to be anything of the sort on the CLI of Dell.
Here is the config, I have in place on the switchport in question.
dot1x multiple-host
safe standing of port security mode
port security throw
For the moment, that the port has done what is supposed to to, but remove the configuration of the interface completely that I am unable to find how the CLI reference or online at how 'quickly' to reset the port.
Any help would be appreciated.
Do not take into account. I found buried in the CLI reference command.
There are actually two commands necessary to reactivate the interface
"dot1x to re-authenticate ethernet [port]".
'set interface active ethernet [port] ".
Thank you
-
Configuration of the ALS Scan for the 7206vxr
Please can someone help with the listed configurations.
Hello
The syntax of the command that you have shown above is the old style of IP SLA CLI which is used on versions of previous IOS 12.4 (6) T release. On the latest Cisco CLI has basically abandoned the keyword monitor and tried to make the syntax more simple and intuitive. So for older versions, yes what you have shown above is very good.
For ASR, you must format later in the CLI and thus:
!
ip sla 1
icmp-echo DEST-ADDR source-ip SOURCE-ADDR
frequency SECONDS
!
ip sla 1 life forever start-time now
!
Concerning
-
Here is my configuration:
local-pix 501 connected to the DSL line.
506th pix remote control connected to the dsl line
unique IP address routable on each PIX (so using PAT, no NAT).
try to create a site to site vpn. Tried of PDM, CLI via documentation cisco CLI via the book of Richard Deal. I can apparently make the connections, but no traffic flows. I have no idea what I'm doing wrong. Here are the relevant configs:
PIX of premises:
6.3 (3) version PIX
interface ethernet0 car
interface ethernet1 100full
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
activate the password
passwd
hostname encima
domain name gold - eagle.org
fixup protocol dns-length maximum 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol they 389
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol 2000 skinny
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names of
access-list outside_access_in allow accord 64.144.92.0 255.255.255.128 no matter what newspaper
outside_access_in list of access permitted tcp 64.144.92.0 255.255.255.128 eq pptp pptp log any eq
outside_access_in list access permit icmp any any echo response
access-list outside_access_in allow icmp all once exceed
outside_access_in list access permit icmp any any source-quench
outside_access_in list all permitted access all unreachable icmp
outside_access_in list of permitted access esp 66.159.222.109 host 67.100.95.114
outside_access_in list of permitted access esp 67.100.95.114 host 66.159.222.109
access-list 90 allow ip 172.17.0.0 255.255.255.0 172.24.1.0 255.255.255.0
pager lines 24
opening of session
registration of information monitor
logging buffered information
ICMP permitted host 67.100.95.114 outside
ICMP allow any inside
Outside 1500 MTU
Within 1500 MTU
IP address outside x.x.x.109 255.255.255.0
IP address inside 172.17.0.1 255.255.255.0
alarm action IP verification of information
alarm action attack IP audit
location of PDM 172.24.1.0 255.255.255.0 outside
location of PDM 172.17.0.0 255.255.255.0 outside
location of PDM 64.144.92.0 255.255.255.128 outside
location of PDM 172.17.0.0 255.255.0.0 inside
PDM logging 100 information
history of PDM activate
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) - 0-90 access list
NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
Access-group outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 66.159.222.1 1
Timeout xlate 0:05:00
Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
RADIUS Protocol RADIUS AAA server
AAA-server local LOCAL Protocol
the ssh LOCAL console AAA authentication
LOCAL AAA authorization command
Enable http server
x.x.x.x 255.255.255.255 out http
x.x.x.x 255.255.255.128 out http
http 172.17.0.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
SNMP-Server Community public
No trap to activate snmp Server
enable floodguard
Permitted connection ipsec sysopt
Crypto ipsec transform-set strong esp-3des esp-sha-hmac
toEssex 20 ipsec-isakmp crypto map
correspondence address card crypto 20 90 toEssex
peer set card crypto toEssex 20 67.100.95.114
toEssex 20 set transformation-strong crypto card
toEssex interface card crypto outside
ISAKMP allows outside
ISAKMP key * address 67.100.95.114 netmask 255.255.255.255
part of pre authentication ISAKMP policy 9
ISAKMP policy 9 3des encryption
ISAKMP policy 9 sha hash
9 1 ISAKMP policy group
ISAKMP policy 9 life 86400
Telnet 172.17.0.0 255.255.255.0 inside
Telnet timeout 60
SSH x.x.x.x 255.255.255.128 outside
SSH timeout 60
Console timeout 0
dhcpd address 172.17.0.2 - 172.17.0.32 inside
dhcpd dns x.x.x.100 66.218.44.5
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd outside auto_config
dhcpd allow inside
username ckaiser password * encrypted privilege 15
Terminal width 80
Cryptochecksum:xxxxxx
: end
PIX remotely:
6.3 (1) version PIX
interface ethernet0 car
Auto interface ethernet1
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
activate the password
passwd
EVL-PIX-DSL host name
domain essexcredit.com
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol they 389
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol 2000 skinny
fixup protocol smtp 25
fixup protocol sqlnet 1521
names of
access-list outside_access_in allow accord any any newspaper
outside_access_in list access permit tcp any any eq pptp newspaper
outside_access_in list access permit icmp any any echo response
access-list outside_access_in allow icmp all once exceed
outside_access_in list access permit icmp any any source-quench
outside_access_in list all permitted access all unreachable icmp
outside_access_in esp x.x.x.114 host 66.159.222.109 host allowed access list
outside_access_in list of permitted access esp 66.159.222.109 host 67.100.95.114
access-list 80 allow ip 172.24.1.0 255.255.255.0 172.17.0.0 255.255.255.0
pager lines 24
opening of session
timestamp of the record
monitor debug logging
logging buffered information
recording of debug trap
history of logging warnings
logging feature 22
ICMP permitted host x.x.222.109 outdoor
ICMP allow any inside
Outside 1500 MTU
Within 1500 MTU
IP address outside x.x.x.114 255.255.255.248
IP address inside 172.24.1.240 255.255.255.0
alarm action IP verification of information
alarm action attack IP audit
PDM location x.x.x.x 255.255.255.255 outside
location of PDM 172.24.1.0 255.255.255.0 inside
PDM logging 100 information
history of PDM activate
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) - 0 80 access list
NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
Access-group outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 67.100.95.113 1
Route outside x.x.x.0 255.255.0.0 66.159.222.109 1
Timeout xlate 0:05:00
Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
RADIUS Protocol RADIUS AAA server
AAA-server local LOCAL Protocol
the ssh LOCAL console AAA authentication
LOCAL AAA authorization command
Enable http server
x.x.x.x 255.255.255.255 out http
http 172.24.1.0 255.255.255.0 inside
SNMP-server host within the 172.24.1.11
Server SNMP Emeryville, CA location
Server SNMP contact Charlie Kaiser
snmp4esx SNMP-Server community!
SNMP-Server enable traps
enable floodguard
Permitted connection ipsec sysopt
Crypto ipsec transform-set strong esp-3des esp-sha-hmac
toEncima 10 ipsec-isakmp crypto map
correspondence address card crypto 10 80 toEncima
peer set card crypto toEncima 10 66.159.222.109
toEncima card 10 game of transformation-strong crypto
toEncima interface card crypto outside
ISAKMP allows outside
ISAKMP key * address 66.159.222.109 netmask 255.255.255.255
part of pre authentication ISAKMP policy 8
ISAKMP strategy 8 3des encryption
ISAKMP strategy 8 sha hash
8 1 ISAKMP policy group
ISAKMP life duration strategy 8 the 86400
Telnet 172.24.1.0 255.255.255.0 inside
Telnet timeout 60
SSH x.x.x.x 255.255.255.255 outside
SSH timeout 60
Console timeout 0
username ckaiser password * encrypted privilege 15
Terminal width 80
Cryptochecksumxxxxxx
: end
When I try to ping an address on the net since the first pix of 172.24, I get no response. When I try to ping an address on the net since the second pix 172,17, I get no response. Connectivity Internet is fine. I can ping the addresses outside each pix OK.
My debug output for isakmp shows the State of return is IKMP_NO_ERROR and the SAs look OK; everything matches. Several configs / debugs available upon request.
No idea why I can't get from one network to the other?
Thank you!
Charlie Kaiser
"When I try to ping an address on the net since the first pix of 172.24, I get no response. When I try to ping an address on the net since the second pix 172,17, I get no response. »
It could be as simple as because you try to ping from the PIX (because you can't) and your tunnel could in fact be working properly
Try to ping from a device on 172,17 to one in 172.24.
(Make sure that your access point to the opposing LAN for these host devices are set to be the PIX)
HTH
-
How do I access the command line interface so I can set up my series of cisco router 2600. I don't seem to know where that on my netbook. What port also can connect the cable to the internet router.
Hello
You must Access the port console of the router using a cable from the console. Your netbook probably doesn't have a serial port to do this, so you will need a USB-serial adapter.
Once you have, you need terminal software. PuTTy is a good lightweight program that you can download for free.
If you want to give the internet router, you must choose a WAN port. Assuming that you don't have a HWIC-ESW in the router, any port will do.
There is here a guide that can be useful for:
http://www.internetworkingcareer.com/command-line/how-to-access-the-Cisco-CLI-from-the-console/
I hope this helps.
Kind regards
Tim
-
This version of Cisco Adaptive Security Appliance Software Version 9.6 (1) 5 is affected by Cisco Adaptive Security Appliance SNMP Remote Code execution vulnerability and Cisco Adaptive Security Appliance CLI Remote Code execution vulnerability of
Hi vrian_colaba,
You can take a look at cisco's Advisory here:
https://Tools.Cisco.com/Security/Center/content/CiscoSecurityAdvisory/CI...
Fixed versions
Cisco ASA Major Release First version fixed 7.2 Affected; migrate to 9.1.7(9) or later 8.0 Affected; migrate to 9.1.7(9) or later 8.1 Affected; migrate to 9.1.7(9) or later 8.2 Affected; migrate to 9.1.7(9) or later 8.3 Affected; migrate to 9.1.7(9) or later 8.4 Affected; migrate to 9.1.7(9) or later 8.5 Affected; migrate to 9.1.7(9) or later 8.6 Affected; migrate to 9.1.7(9) or later 8.7 Affected; migrate to 9.1.7(9) or later 9.0 9.0.4 (40) 9.1 9.1.7(9) 9.2 9.2.4 (14) 9.3 9.3.3 (10) 9.4 9.4.3(8) ETA 26/08/2016 9.5 9.5 (3) ETA 30/08/2016 9.6 (DFT) 9.6.1 (11) / 6.0.1(2) FTD 9.6 (ASA) 9.6.2 5 9.6 (1) is not part of the fixed versions, this means that is assigned for the SNMP Remote Code execution vulnerability.
Cisco Adaptive Security Appliance CLI Remote Code vulnerability to run you can also take a look at cisco's Advisory here:
https://Tools.Cisco.com/Security/Center/content/CiscoSecurityAdvisory/CI...
Fixed versions
The following table shows the first software versions that include fixes for this vulnerability (9.6 is not affected)
Cisco ASA Major Release First version fixed 7.2 Affected, migrate to 8.4 (3) or later 8.0 Affected, migrate to 8.4 (3) or later 8.1 Affected, migrate to 8.4 (3) or later 8.2 Affected, migrate to 8.4 (3) or later 8.3 Affected, migrate to 8.4 (3) or later 8.4 8.4 (3) 8.5 Affected, migrate to 9.0 (1) or later version 8.6 Affected, migrate to 9.0 (1) or later version 8.7 Affected, migrate to 9.0 (1) or later version 9.0 9.0 (1) 9.1 Not affected 9.2 Not affected 9.3 Not affected 9.4 Not affected 9.5 Not affected 9.6 Not affected Hope this info helps!
Note If you help!
-JP-
-
First Cisco VIEW - change the password for the admin GUI of CLI
Hello
We had someone install an instance of VIEW with the Vmware EGG file, but it seems that they never take the GUI password (admin) during the installation phase.
Does anyone know the process to re-run the configuration script or to change the password for the admin of the SSH session, so we are able to connect to the GUI?
Thank you
Andreas
Hi Andreas,
Sorry, that I was not able to respond until the EGG has been redeployed, however, it is possible to change the CLI from the server admin password.
1 SSH on the server VIEW
2 cd to/usr/local/cisco/dcm/fm/bin
3 «./addUser.sh--help' to view the syntax of the command.
The syntax for the addUser.sh script is «./addUser.sh
. The adduser script to add new accounts to users or change the password for the existing user accounts. 4. to change the admin password, the command should look like this,
«./adduser.sh admin
. If you have forgotten the password for the database, you can find it in the file, usr/local/cisco/dcm/jboss-as.7.2.0-Final/standalone/conf/postgres.cfg.xml. Use the 'cat /usr/local/cisco/dcm/jboss-as.7.2.0-Final/standalone/conf/postgres.cfg.xml' command to print the contents of the file to the screen.
-Eric
-
Cisco ACS 5.8 CLI admin account lockout
Hi all
We recently deployed device Cisco ACS 3495 and running on a version 5.8.
Everything seems well while our for the CLI admin account was locked out.
Found a bug in Cisco for the same problem with version 5.5, but no solution yet...
ACS 5.5 CLI Admin account locked and no Log MessageSomeone out there who might have encountered the same issue and can help advise?Thank you and best regards,NDAHello
Unfortunately, the only solution for this is the DVD of password recovery.
Once fixed, you can increase the car locked out amounted to something greater than the default value of Cisco.
-
Hello
1. I get the following error when you run a report;
* Unable to create the report. The following errors occurred:
1: NBI reports the connection has failed. Invalid security identification informationWhat could be the problem?
2. How can I create custom reports? Creates the only way XML files?
3. How can I remove pools of resources or jobs manually OS cli?
4. is it possible to auto start ISC when the server restarts?
Hello
For 1. It is perhaps a license problem (NBI licenses), which version are you? I've heard reports are enabled by default on 6.0, but not sure.
For 2. Look at http://www.cisco.com/en/US/docs/net_mgmt/ip_solution_center/6.0/infrastructure/reference/guide/monit1.html#wp1229130 . I think that xml is the only way, even if you use directly the xmlapi.
3. I don't know if this is even possible. You can do this with the nbi and xmlapi.
For 4. Look at the symptom of http://www.cisco.com/en/US/docs/net_mgmt/ip_solution_center/6.0/installation/guide/aptrbl.html#wp1032457 6.
Hope I helped.
-
How can I show what bssid a user is associated with the CLI on 1242 Cisco ap?
How can I show what bssid a user is associated with the CLI on 1242 Cisco ap?
SH associated dot11
-
Hello
Is it possible to configure the router via CLI (command line interface)
In other Cisco devices, we could always just insert a configuration through the CLI.
However, it seems that it is only possible with the Webbrowser.
Kind regards
Tom
Tom,
N ° the RV110W can only be configured via a web browser. There is no support for this router command line interface.
Chris
-
How to access the CLI Mode in cisco sf 302 - 08 p 8-port 10/100 Managed switch
Hello
Can someone help me on how to access the CLI mode in cisco sf 302 - 08 p 8-port 10/100 Managed switch. I treid the each method they mentioned in the administration guide. I am not able to enter the command debug mode and comand menu after resetting the default password. Once connected, sound directly to guide me to switch main menu.
Hello FAL, Mark,.
Thank you for your participation in the community of support to small businesses. My name is Nico Muselle of Cisco Sofia HWC.
To access the CLI, you must make sure that the version of the firmware on your switch is at least 1.1.0.73 or preferably higher. Then activate telnet or ssh on the switch and opening of these sessions or a console session you will see that you are in CLI mode. You can return to the console to function menu using the menucommand.
I hope that answers your questions!
Best regards
Best regards
Nico glacier
Senior Network Engineer - CCNA - CCNA security
Maybe you are looking for
-
xw8200 Workstation: Integrated Soundmax AC97 drivers for xw8200 Workstation for Win 7 64 bit
Difficulty locating the driver works. Used driver booster 2 and it downloaded, but caused BSOD and then restored and has now no driver installed. Where to find a stable driver for Soundmax AC97 digital. I also tried and old Soundblaster Audigy 4 and
-
have two users, want to share files, how?
I added a new user, but all my files are on one... I want to share files between the two... How?
-
Create a table of type DBA_ROLE_ROLE_PRIVS
Is it possible to create a DBA_ROLE_ROLE_PRIVS table that lists all relationships of ROLE-ROLE throughout the entire database?My understanding is that the table ROLE_ROLE_PRIVS shows only the data for the individual scheme that he questions. I'm look
-
Effects of scrolling on the Group
Hello!I have all the objects that each of them has own scrolling effects. I want to consolidate all of this object and adds new effects of scroll on it. Can I do this?
-
I can't update flash player. It does not recognize my password no matter what I do. Help, please?