Cisco vWLC - questions while implementing - practice design recommendations

Hi Forum,

I am right now with the implementation of a virtual wireless LAN controller in one of our customers environment.

Customer is facing several problems and I'm not sure how to solve them - then maybe the supportforum could give me answers or advice.

(1.) the client complains about not being able to see several ports on the vWLC when you implement a second vNIC in VMWare (via the show summary of the vWLCs CLI port command). According to my understanding of the vWLC always show only a 'physical' port and interfaces n (depending on how many interfaces is created on the vWLC) - mapping is accomplished through the vWLC - so basically as that administrator we are not able to see the exact mapping and always only a single port "physical"?

(2.) the customer was told that the vWLC essentially works except the bypass between the tunnel CAPWAP for VMWare to the router - I'm not sure what he means by that, but I guess it has something to do with the marking of the dynamic interfaces / VLAN to the ESX and later of the ESX via vNIC to the vWLC - advice? (Please take account also details of design of question 3)

3.) is it ok to TAG all the VLAN via a vNIC without using the service port? I mean create a vNIC transporting and marking of the management and the VLAN database? Or is it mandatory to separate the management of data using a dedicated with the service port subnet VLANS? Suggestions for best practice to get the job of controller - especially on the part of VMWare?

If you need further details please do not hesitate to ask

Kind regards

Christian

You are right, you can mark the VLAN for management and data is not required to use the service port. You're management interface will also be Manager AP interface on what APs registry. You can not have 2 management. You can have 1 management officially and 1 for the AP Manager.

Internal DHCP on vwlc is not supported. You need to do a dhcp relay. If you need more information let me know.

Thank you

PS: Please do not forget to rate and score as good response if this solves your problem

Tags: Cisco Wireless

Similar Questions

  • you have a question < while > use of bpel, thank you.

    Hi, guys.

    I have a question while loop on bpel.
    detail:
    My input message format, like this:
    < my: DataRequestIns xmlns: my = "http://xml.netbeans.org/schema/MessageDefined" >
    < my: DataIns >
    < my: address > Ang Mo Kio 1 < / my: address >
    < my: birthday > 14/12/1970 < / my: birthday >
    < my: firstName > song 1 < / my: firstName >
    < / my: DataIns >
    < my: DataIns >
    < my: address > Ang Mo Kio 2 < / my: address >
    < my: birthday > 14/12/1990 < / my: birthday >
    < my: firstName > song 1 < / my: firstName >
    < / my: DataIns >
    < / my: DataRequestIns >

    My wait the result is:
    < DataRespondOuts xmlns = "http://xml.netbeans.org/schema/MessageDefined" >
    < DataOuts >
    < address > Ang Mo Kio 1 < / address >
    <>39 < / age >
    < name > 1 song full < / fullName >
    < / DataOuts >
    < DataOuts >
    Ang Mo Kio 2 < address > < / address >
    < 19ans > < / age >
    the song < fullName > 2 < / fullName >
    < / DataOuts >
    < / DataRespondOuts >


    How to assign the value with one by one, like berries.

    I mean inside while, how to define or variable how to use to implement what I said.

    Thank you very much.

    My Bpel:
    < assign the name = "Assign_4" >
    < copy >
    < from expression = "1" / >
    < variable = "fileCount" / >
    < / copy >
    < / assign >
    < while name = "While_1".
    condition = "bpws:getVariableData('fileCount') & lt; = count (bpws:getVariableData('FileIns','body','/ns3:DataRequestIns/ns3:DataIns'))" >
    <>sequence
    <>sequence
    < assign the name = "Assign_10" >
    < copy >
    < variable from = part of the "FileIns" = "body".
    Query = "/ ns3:address" / >
    < variable = part of the 'FileOuts"="body ".
    Query = "/ ns3:address" / >

    < / copy >
    < / assign >
    < assign the name = "Assign_11" >
    < copy >
    < variable from = part of the "FileIns" = "body".
    Query = "/ ns3:age" / >
    < variable = part of the 'FileOuts"="body ".
    Query = "/ ns3:age" / >

    < / copy >
    < / assign >
    < assign the name = "Assign_12" >
    < copy >
    < variable from = part of the "FileIns" = "body".
    Query = "/ ns3:fullname" / >
    < variable = part of the 'FileOuts"="body ".
    Query = "/ ns3:fullname" / >

    < / copy >
    < / assign >
    < assign the name = "Assign_5" >
    < copy >
    < from expression = "bpws:getVariableData('fileCount') + 1" / >
    < variable = "fileCount" / >
    < / copy >
    < / assign >
    < / sequence >
    < / while >



    Concerning
    matikak

    Published by: aris yu on December 22, 2009 02:05

    What I usually do is:
    1. create a new variable - based on the schema for your output XML doc.
    2. make a "copy" - mapping your first field of the doc XML source (using the syntax that selects the member based on the active index-meter) - to the created above the output of the new variable field. I use the method described in section 3.15.3.1 of the 10.1.3.1 BPEL Dev Guide - using a rear x-path query (see below). But if your syntax for the part 'from' works - that's fine - just use it.
    3 operations of 'copy' additional as needed for your other domains (like number 2 above).
    4. make an "append" - mapping the repetitive element (of the new variable) on the left in the parent of the repetitive element (the output variable) on the right.

    Your output variable now shouldn't be crushed every time - since you would use a statement append adds to it.

    So using your example below - you would have something like this:



    ...




    ... (additional copies for items more...)








    Hope that helps.

    Published by: Rod Tunnels on December 23, 2009 14:27

    Published by: Rod Tunnels on December 23, 2009 17:27

  • New to ColdFusion - Question about best practices

    Hello.

    I've been programming in Java / c# / PHP for the past two years or so, and as of late have really taken taste to ColdFusion.

    The question I have is around the effective separation of the code, and if there are any best practices that are preached by using this language. While I was learning Java, I was taught that it is better to have several layers in your code; example: Front end (JSP or ASP)-> Business Objects-> support-> database. All the code I've written using these three languages followed this simple structure, most of the time.

    As I dive deeper into ColdFusion, most of the examples I've seen of vetrans of this language really does incorporate a lot of separation. And I don't mean the simple ' here's what this function only "type of online examples where most of the code is written in a single file. I was able to see the projects that were created with this language.

    I work with a few developers who have written in ColdFusion for a few years and put the question to them as well. Their response was something to the effect, ' I don't know if there is any recommended for this, but it really doesn't seem like there is really a problem, make calls like that. "

    I searched online for any type of best practices or discussions around that and have not seen much.

    I still consider myself a bit of a noobling when it comes to programming, but best practice is important to me for any language that I learn more about.

    Thanks for the help.

    You might want to take a look at a number of major frameworks available for

    ColdFusion.

    FW/1 II, model glue, CFWheels, ColdBox and Mach.  They do a great job of

    giving you a path for the separation of code, best practices, etc.

    http://www.carehart.org/cf411/#cffw

  • L2l using routers Cisco VPN question

    I can successfully configure an L2L IPSec VPN between two ASAs but using a similar configuration on Cisco routers, I can't establish a tunnel ping to the local LAN interface on the other, but two, NY and Burlington, routers can ping each and other WAN interface. Here is the configuration of routers and a version of the show; I have attached the config files complete and the screenshot of the topology.
    I appreciate all help.
    The f

    F0/0 - ISP - F0/0 Burlington NY

    See the version

    Cisco IOS Software, software 3600 (C3640-IK9S-M), Version 12.4 (25), RELEASE SOFTWARE (fc1)
    Technical support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2010 by Cisco Systems, Inc.
    Updated Thursday, August 18, 10 06:59 by prod_rel_team

    ROM: ROMMON emulation Microcode
    ROM: 3600 Software (C3640-IK9S-M), Version 12.4 (25), RELEASE SOFTWARE (fc1)

    The availability of NY is 0 minutes
    System returned to ROM by unknown charge cause - suspect boot_data [BOOT_COUNT] 0 x 0, BOOT_COUNT 0, BOOTDATA 19
    System image file is "tftp://255.255.255.255/unknown".

    Cisco 3640 (R4700) Prozesseur (revision 0xFF) 124928K / 6144K bytes of memory.
    Card processor ID FF1045C5
    R4700 CPU at 100 MHz, 33, Rev 1.2 implementation
    2 FastEthernet interfaces
    Configuration of DRAM is wide with parity 64-bit capable.
    125K bytes of NVRAM memory.
    8192 K bytes of processor onboard flash system (read/write)

    Configuration register is 0 x 2102

    NY router

    crypto ISAKMP policy 1
    BA aes 256
    preshared authentication
    Group 2
    address of ThisIsAWeekKey key crypto isakmp 172.16.2.2
    !
    !
    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac L2L
    !
    Burlington 1-isakmp ipsec crypto map
    defined peer 172.16.2.2
    game of transformation-L2L
    match address Burlington-NW
    !
    !
    interface FastEthernet0/0
    address 172.16.1.2 IP 255.255.255.252
    automatic duplex
    automatic speed
    card crypto Burlington
    !
    interface FastEthernet1/0
    IP 10.0.1.1 255.255.255.0
    automatic duplex
    automatic speed
    !
    no ip address of the http server
    no ip http secure server
    !
    IP forward-Protocol ND
    IP route 0.0.0.0 0.0.0.0 172.16.1.1
    !
    !
    Burlington-NW extended IP access list
    ip licensing 10.0.1.0 0.0.0.255 10.0.2.0 0.0.0.255

    Burlington router

    crypto ISAKMP policy 1
    BA aes 256
    preshared authentication
    Group 2
    address of ThisIsAWeekKey key crypto isakmp 172.16.1.2
    !
    !
    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac L2L
    !
    NY 1 ipsec-isakmp crypto map
    defined peer 172.16.1.2
    game of transformation-L2L
    match address NY - NW
    !
    !
    interface FastEthernet0/0
    IP 172.16.2.2 255.255.255.252
    automatic duplex
    automatic speed
    card crypto NY
    !
    interface FastEthernet1/0
    IP 10.0.2.1 255.255.255.0
    automatic duplex
    automatic speed
    !
    no ip address of the http server
    no ip http secure server
    !
    IP forward-Protocol ND
    IP route 0.0.0.0 0.0.0.0 172.16.2.1
    !
    !
    NY - NW extended IP access list
    IP 10.0.2.0 allow 0.0.0.255 10.0.1.0 0.0.0.255

    No problem, we learn every day

    Please kindly marks the message as answered while others can also learn from your post. Thank you.

  • Question/security of network design

    I would like to get opinions on the design of a network of our ESX host.  We have a couple of the main areas of ESX, each with 10 physical network interface cards.  We have the following in our environment:

    -iSCSI and NAS storage (so two cards NETWORK is for IP storage)

    -2 separate networks for virtual machines - 1 for admin interfaces (not for users) and the other for servers in production (for users)

    Current configuration is:

    2 NICs (SC and admin VMs)

    2 NICs (IP storage)

    2 NICs (vMotion)

    3 NETWORK interface cards (Production Server virtual machines)

    I would like opinions on how course of a facility that is.  Is it a question of having the SC share a vSwitch with the VMs admin?  They are on the same VLAN physical.   We do not control the switches, is not really an option to configure the VLANS on switches.  Thank you.

    Hello

    Thank you.  I think that I can not have explained myself quite clearly.  I was not suggesting put Admin VMs and the connections on the same vSwitch as the Production Server VMs.  On the contrary, I was concerned by the SC being on the same vSwitch as the VMs Admin, I do not think that it is a good practice to.  In our environment, we have a single subnet for all virtual machines, separated into 2 subnets on the physical switches.  We do not use (or want to use) VLAN tagging on the vSwitches.  There is the firewall between each of our VLAN.  So, the admin VMs are separated from the VLAN Production by a firewall.  My real question is the size of a security problem for the SC and the admin virtual machines to share a vSwitch if they already share a physical network?  We do not have the ability to create a separate network or VLAN just for traffic SC.  Our environment now looks like this:

    Because they already share the same physical network sharing the same vSwitch is not a huge or any concerns. Consider the vSwitch another part of your administrative network. The best practice is to put all the management servers and virtualization workstations within the same firewall network. You have done this.

    -natachasery 2-SC & admin VM network (local network VIRTUAL 0 192.168.15.0/24)

    Works for me. I often use the Administrative VMS and place them on the vSwitch with the SC. After all they are using the same network and the vSwitch is just another part of the Web of network switch.

    -3 natachasery - Prod VM network (VLAN 1 192.168.15.0/24)

    Not sure I would use 3 but I leave that to you.

    -2 natachasery - VMKernel & SC (10.10.1.0/8)

    It passes through security zones. I would use rather your firewall administration to fill ports of CHAP protocol between IP storage network and the administrative network. What you have is a common, but not the safest practice you have now 2 attack points in the service console of administration network and from the network of IP storage. This could include the possibility of virtual computers that use iSCSI initiators. Because everything you need is to have the SC participate for CHAP (whether you use it or not), you can easily use your existing administrative firewall to do this. You may need to fix things up a bit to within your network to make this happen, but it would be how I would address this possible security problem.

    -2 natachasery-vMotion (172.16.32.0/16)

    Sounds good.

    It would be useful to create a fifth vSwitch just to house the VMs admin, so that they do not share a vSwitch and natachasery with SC?

    Not really. Same Security Zone.

    Best regards

    Edward L. Haletky

    VMware communities user moderator

    ====

    Author of the book "VMWare ESX Server in the enterprise: planning and securing virtualization servers, Copyright 2008 Pearson Education.»

    Blue gears and SearchVMware Pro Articles: http://www.astroarch.com/wiki/index.php/Blog_Roll

    Security Virtualization top of page links: http://www.astroarch.com/wiki/index.php/Top_Virtualization_Security_Links

  • Cisco ISE and WLC Access-List Design/scalability

    Hello

    I have a scenario that wireless clients are authenticated by the ISE and different ACL is applied depending on the rules in the ISE. The problem I have seen is due to the limitation on the Cisco WLC that limit only 64 input access list. As the installer has only a few IVR/interfaces and several different access lists are applied to the same base on user groups interface; I was wondering if there may be an evolutionary design / approach according to which the access list entries can evolve next to create a vlan for each group of users and apply the access list on the interface of layer 3 instead? I illustrated the configuration below for reference:

    Group of users 1 - apply ACL 1 - on Vlan 1

    User 2 group - apply ACL 2 - on the Vlan 1

    3 user group - apply ACL 3 - on the Vlan 1

    The problem appears only for wireless users, he does not see on wired users as the ACLs can be applied successfully without restriction as to the switches.

    Any suggestion is appreciated.

    Thank you.

    In fact, you have limitations on the side of the switch as well. Long ACL can deplete resources AAGR of the switch. Take a look at this link:

    http://www.Cisco.com/c/en/us/support/docs/switches/Catalyst-3750-series-switches/68461-high-CPU-utilization-cat3750.html

    The new WLCs based on IOS XE and not the old OS Wireless/Aironet will provide the best experience in these matters.

    Overall, I see three ways to overcome your current number:

    1. reduce the ACL by making them less specific

    2 use L3 interfaces on a switch L3 or FW and the ACL is applied to them

    3. use the SGT/SGA

    I hope this helps!

    Thank you for evaluating useful messages!

  • GANYMEDE on Cisco WLC question

    I just installed a Cisco 5508 WLC on our network.  I have the IP address of management in the VLAN management and the controller I set up "no label".  WLC has two ports connected to a Cisco 4507 switch in the config of the channel port.

    I ping the controller of the network very well, I ping the server RADIUS of the controller.  I have the setup of the priority as "GANYMEDE + LOCAL."  However when I try to connect in the WLC and look at the debug, it shows I'm authentication and that's all, for some reason any traffic authorization is failed.  Using wireshark I confirmed that the request comes from the IP Management Interface.

    I followed the instructions in this link:

    http://www.Cisco.com/en/us/customer/docs/wireless/controller/5.0/Configuration/Guide/c5sol.html

    Any ideas?

    Hello

    It seems that you have not configured the ACS correctly.

    The AEC must return the required attributes.

    Please follow the http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a0080851f7c.shtml#topic3document.

    HTH,

    Tiago

    --

    If this helps you or answers to your question if it you please mark it as 'responded' or write it down, if other users can easily find it.

  • Questions of implementation of VPN IPSec 887-&gt; srp527

    Hey people,

    I have a few problems to an ipsec tunnel between a cisco 887VA router and a cisco srp527w router.

    I have a few books and some example materials. I worked through many combinations of what I had and I'm still a bit hard.

    I look at the results of debugging and it seems that policies do not correspond between devices:

    05:44:37.759 Jul 23: ISAKMP (0): received packet of 500 Global 500 (R) sport dport XXX.XXX.XXX.XXX MM_NO_STATE

    broute1 #.

    05:44:57.079 Jul 23: ISAKMP: (0): purge SA., his 85247558, delme = 85247558 =

    broute1 #.

    05:45:17.031 Jul 23: ISAKMP (0): received packet of XXX.XXX.XXX.XXX dport 500 sport 500 global (N) SA NEWS

    05:45:17.031 Jul 23: ISAKMP: created a struct peer XXX.XXX.XXX.XXX, peer port 500

    05:45:17.035 Jul 23: ISAKMP: new position created post = 0x8838C3F8 peer_handle = 0x800021CF

    05:45:17.035 Jul 23: ISAKMP: lock struct 0x8838C3F8, refcount 1 to peer crypto_isakmp_process_block

    05:45:17.035 Jul 23: ISAKMP: 500 local port, remote port 500

    05:45:17.035 Jul 23: ISAKMP: (0): insert his with his 87 84664 = success

    05:45:17.035 Jul 23: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH

    05:45:17.035 Jul 23: ISAKMP: (0): former State = new State IKE_READY = IKE_R_MM1

    Jul 23 05:45:17.035: ISAKMP: (0): treatment ITS payload. Message ID = 0

    Jul 23 05:45:17.035: ISAKMP: (0): load useful vendor id of treatment

    Jul 23 05:45:17.035: ISAKMP: (0): provider ID seems the unit/DPD but important shift 0

    Jul 23 05:45:17.035: ISAKMP: (0): load useful vendor id of treatment

    Jul 23 05:45:17.035: ISAKMP: (0): provider ID is DPD

    05:45:17.035 Jul 23: ISAKMP: (0): no pre-shared with XXX.XXX.XXX.XXX!

    05:45:17.035 Jul 23: ISAKMP: analysis of the profiles for xauth...

    05:45:17.035 Jul 23: ISAKMP: (0): audit ISAKMP transform against the policy of priority 1 0

    05:45:17.035 Jul 23: ISAKMP: type of life in seconds

    05:45:17.035 Jul 23: ISAKMP: life (IPV) 0 x 0 0 x 1 0 x 51 0 x 53

    05:45:17.035 Jul 23: ISAKMP: DES-CBC encryption

    05:45:17.035 Jul 23: ISAKMP: SHA hash

    05:45:17.035 Jul 23: ISAKMP: pre-shared key auth

    05:45:17.035 Jul 23: ISAKMP: default group 1

    05:45:17.035 Jul 23: ISAKMP: (0): free encryption algorithm does not match policy.

    05:45:17.035 Jul 23: ISAKMP: (0): atts are not acceptable. Next payload is 0

    05:45:17.035 Jul 23: ISAKMP: (0): no offer is accepted!

    Jul 23 05:45:17.035: ISAKMP: (0): phase 1 SA policy is not acceptable! (local YYY. YYY. YYY. Remote YYY

    XXX.XXX.XXX.XXX)

    05:45:17.035 Jul 23: ISAKMP (0): increment the count of errors on his, try 1 of 5: construct_fail_ag_init

    Jul 23 05:45:17.035: ISAKMP: (0): could not build the message information AG.

    Jul 23 05:45:17.035: ISAKMP: (0): send package to XXX.XXX.XXX.XXX my_port 500 peer_port 500 (R) MM_NO_STATE

    05:45:17.035 Jul 23: ISAKMP: (0): sending a packet IPv4 IKE.

    05:45:17.035 Jul 23: ISAKMP: (0): the peer is not paranoid KeepAlive.

    05:45:17.035 Jul 23: ISAKMP: (0): removal of reason HIS State "Policy of ITS phase 1 not accepted" (R) MM_NO_STATE (peer

    XXX.XXX.XXX.XXX)

    Jul 23 05:45:17.035: ISAKMP: (0): load useful vendor id of treatment

    Jul 23 05:45:17.035: ISAKMP: (0): provider ID seems the unit/DPD but important shift 0

    Jul 23 05:45:17.035: ISAKMP: (0): load useful vendor id of treatment

    Jul 23 05:45:17.035: ISAKMP: (0): provider ID is DPD

    05:45:17.035 Jul 23: ISAKMP (0): action of WSF returned the error: 2

    05:45:17.035 Jul 23: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE

    05:45:17.035 Jul 23: ISAKMP: (0): former State = new State IKE_R_MM1 = IKE_R_MM1

    05:45:17.039 Jul 23: ISAKMP: (0): removal of reason HIS State "Policy of ITS phase 1 not accepted" (R) MM_NO_STATE (peer

    XXX.XXX.XXX.XXX)

    05:45:17.039 Jul 23: ISAKMP: Unlocking counterpart struct 0x8838C3F8 for isadb_mark_sa_deleted(), count 0

    05:45:17.039 Jul 23: ISAKMP: delete peer node by peer_reap for XXX.XXX.XXX.XXX: 8838C3F8

    05:45:17.039 Jul 23: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL

    05:45:17.039 Jul 23: ISAKMP: (0): former State = new State IKE_R_MM1 = IKE_DEST_SA

    Here is a slightly adjusted version of my run-fig (came out I was sure that no one would need things) and attached are screenshots of IPSec and IKE Policy of the srp527w strategy

    version 15.1

    hostname broute1

    !

    logging buffered 65535

    information recording console

    !

    No aaa new-model

    !

    iomem 10 memory size

    clock timezone estimated 10 0

    Crypto pki token removal timeout default 0

    !

    !

    IP source-route

    !

    !

    !

    !

    VDSL controller 0

    operation mode adsl2 Annex A

    !

    property intellectual ssh version 2

    !

    !

    crypto ISAKMP policy 1

    BA 3des

    preshared authentication

    lifetime 28800

    ISAKMP crypto key PRE_SHARED_KEY_FOR_IKE (I_THINK) REMOTE_HOST hostname

    !

    !

    Crypto ipsec transform-set JWRE_BW-1 esp-3des esp-sha-hmac

    !

    !

    !

    IPSec-isakmp crypto 10 JWRE_BW-1 card

    defined peer XXX.XXX.XXX.XXX

    game of transformation-JWRE_BW-1

    match address 101

    !

    interface Loopback0

    no ip address

    !

    ATM0 interface

    Description - between node ADSL-

    no ip address

    no ip route cache

    load-interval 30

    No atm ilmi-keepalive

    !

    point-to-point interface ATM0.1

    no ip route cache

    PVC 8/35

    TX-ring-limit 3

    aal5snap encapsulation

    PPPoE-client dial-pool-number 1

    !

    !

    interface Vlan1

    Management Interface Description

    address IP AAA. AAA. AAA. AAA 255.255.255.0

    IP mtu 1452

    IP nat inside

    IP virtual-reassembly in

    no ip-cache cef route

    IP tcp adjust-mss 1420

    !

    interface Dialer1

    Description BETWEEN NŒUD ADSL-

    MTU 1492

    the negotiated IP address

    no ip redirection

    no ip unreachable

    no ip proxy-arp

    NAT outside IP

    IP virtual-reassembly in

    encapsulation ppp

    Dialer pool 1

    Dialer-Group 1

    PPP chap hostname ADSL_USERNAME

    PPP chap password 7 ADSL_PASSWORD

    PPP ipcp dns request accept

    No cdp enable

    card crypto JWRE_BW-1

    !

    recording of debug trap

    access-list 101 permit ip 192.168.7.0 0.0.0.255 10.0.1.0 0.0.0.255

    Dialer-list 1 ip protocol allow

    Some specific questions:

    (1) on the PSR in the example I used (and I have a few PRS-> RPS VPN work) I see you enter the pre-shared key, I do not see in the examples I've used something on the IKE pre-shared key on the box of IOS. Does anyone have examples where you use the pre-shared for IKE? I wonder if it is my main problem as clearly says the newspaper there is no pre-shared key :|

    (2) I used a mash of names between different sections mish as on ESP the naming convention is not the same thing; IE: what parts of the IPSEC negotiation come from IKE policy and including the IPSEC policy section section. The names really matter across different ends of the VPN?

    (3) I noticed when I run this command in the(config-crypto-map): #

    defined peer FQDN

    It is converted to:

    defined peer XXX.XXX.XXX.XXX

    Should it? I want the camera to watch the FQDN that this particular host using DDNS and do not use a static IP address.

    I could ask 1 million questions, but I'll leave it for there, if anyone can see anything out (or can answer Q1 in particular) please let me know.

    Thanks in advance for your time and help people.

    B

    The IKE policy doesn't seem to match, you must configure the corresponding IKE policy on the router as follows:

    crypto ISAKMP policy 10

    the BA

    sha hash

    preshared authentication

    Group 1

    lifetime 28800

    For the preshared key, use the address instead of the host name:

    crypto isakmp key address

  • Question while doing an OSB from REST to pass through.

    Hi all

    I'm doing a REST pass-thorugh-> OSB-> Service REST.

    While I am able to do a GET successfully, the JOB gives me questions.

    The POST is Source of REST gives no specific error, but the entity is created. Instead of 201 CREATED in response I get 200 OK in response.

    The strange thing is that while I try the OSB through curl command execution I don't face problems and everything goes smoothly. But Source rest the problem occurs.

    The difference that I see black and white hit the curve and source of REST I see is the type of payload.

    using curl the (json) payload into OSB entered service is like:

    {"casmwdcipwwlus111": {"jcr:primaryType": "nt: unstructured","job-signature": "environment Luma: local;}} Source:; ","adekai": {"jcr:primaryType":" nt: unstructured ',' al1de912tbk': {'platform':} "' Veswwtel: MBEEXD # 2s ',}

    {'support-status': 'white', 'nDECsl notes': '',' model': 'rfreDAL1912STBK', '-version of the software ":"0.7.7S","jcr:primaryType":" nt: unstructured "},"Fedwsdfl2410tbk

    However, since the source REMAINS the payload becomes like:

    JCR % 3AprimaryType = nt % 3Aunstructured & % 3Aoperation = import & % 3AcontentType = json & % 3Areplace = true & _charset_ = UTF-8 & % 3Acontent = % 7B % 22casmwdcipwwlus111%22% 3A % 7B % 22jcr % 3AprimaryType % 22% 3A % 22nt % 3Aunstructured % 22% 22% 3A % 22% 22job-signature %2C

    Luma + environment % 3 a and 3 b local % Source % 3 a + http % 3 a % 2F % 2F % 2Fapi 3 b + % 22 %%2C % 22adekai% 22% 3A % 7B % 22jcr % 3AprimaryType % 22% 3A % 22nt % 3Aunstructured 22 %%2C % 22al1912tbk % 22% 3A % 7B % 22platform % 22% 3A % 22Vdedtdel

    I think the issue I'm failng is due to this type of content payload.

    Guidance on this subject.

    Kind regards

    R V

    The question has solved when I changed the content type of "application/json" to "application/x-www-formulaires-urlencoded.

    Thank you

  • vCenter/Single Sign - on design recommendation

    Hello

    We would like to do a new install of our 2 virtual centres.

    The vCenters looks like this

    ----------------------------------------------------------------------------

    1 vCenter main Site (source vCenter for SRM)

    1 vCenter Site Backup (target vCenter for SRM)

    The current running configuration has a problem with SINGLE sign-on. If the primary vCenter is down you can't connect on the second, which should be the backup vcenter.

    My question is, how to configure the vCenters with SSO as the two vCenter are not affected by another (related modes and MRS. should also work).

    Somebody has experiences with this or has a few recommendations for me?

    Thanks so far

    Simon

    5.5 you will want to install the first VirtualCenter and create a new SSO domain.  Then when you install the second vcenter, you must also install SSO, but tell him to join an existing domain. This will cause the two bodies SSO replicate, but each vcenter has its own copy of the SSO database. In this way when the primary vcenter disconnects, the vcenter backup can still login with SSO and all the data you need.

    I'm not familiar enough with SSO s 5.1 - we skipped this upgrade (and boy, I'm happy). My advice would be to spend 5.5 with a clean if possible install and configure these organizations on both sides with replication.

  • Implementation and design of the external images

    Hi all

    Well, I tried pretty much everything regarding the code and searches on Google, but can't figure out how to get this script GOT to work. I hope you all can help.

    For general information: I create e-learning modules using the model of existing AS/Flash/XML to the client. There is another separate file that is loading XML content and direct the 'flow' or the progression of the module. Basically, it is divided into three parts:

    1. Chapter = a selection made from a main menu (< chapter > in the XML file) and is an important part. It consists of one to several "pages".

    2 page = sections in the chapters that users can progress up to the via the navigation buttons; each page represents a Flash/SWF file separated with several clips (with audio clips played by another management of XML FILE). Each page also has a certain ACE (ONE) file associated with a create interactivity, an activity or positioning text.

    3 clip = parts based on the audio of each page; represented in each 'page' FLA/SWF by keyframes.

    These modules are produced for both languages - so the use of ACEs / XML to pull in the text of two different files. We also need to shoot images help from XML files. These images are essentially screenshots; Some are big, some are small. According to the placement of the text, we might want to resize the images so that they fit into a certain space. Can suggest you the best way to resize/scale the images dynamically. Basically, if the width of the image is more than 570 pixels or height is greater than 550 pixels, I want to resize it to fit within this space of 570 x 550. You can see the code that I have tried (in "/ /") that did not work. Feel free to comment on other aspects of the code.

    Currently, in the code of the current version, the progress of clips and images are placed correctly (centered in this area of 570 x 550), but obviously not size.

    If you need more to go far, I'm not 100% sure I can provide because of this be an exclusive model, but I'll do my best. Thanks in advance!

    ... (Assume that all variables are set above the following code)

    While (pageData ['clip' + clipNum]) {}

    var t is MovieClip (parent.parent.parent) .textBox ();.

    imageURL = pageData['clip'+clipNum].@image;

    loading text

    t.t.htmlText = pageData ['clip' + clipNum];

    t.t.Width = 375;

    t.t.autoSize = 'left ';

    t.Alpha = 0;

    t.x = 75;

    t.y = 290 - t.height / 2;

    t.Nom ' t = "+ clipNum;

    loading images

    I have = new Loader;

    i.Load (new URLRequest (imageURL));

    i.contentLoaderInfo.addEventListener (Event.COMPLETE, iTransform);

    i.Name = 'i' + clipNum;

    addChild (i);

    this.addChild (t);

    clipNum ++;

    }

    function iTransform(event:Event):void

    {

    var imageLoader:Loader = Loader (event.target.loader);

    var imageWidth:int = imageLoader.width;

    var imageHeight:int = imageLoader.height;

    imageLoader.alpha = 0;

    implementation

    imageLoader.x=700-(imageLoader.width/2);

    imageLoader.y=290-(imageLoader.height/2);

    scaling

    If (imageWidth > 570)

    //{

    var imageNewWidth = 1-((imageWidth-570)/570);

    imageLoader.scaleX = imageNewWidth;

    imageLoader.scaleY = imageNewWidth;

    //}

    }

    function showItems() {}

    If (clipNum > = 1) {}

    var tfadeIN:Tween = new Tween (this.getChildByName('t'+clipNum), "alpha", Regular.easeOut, 0, 1, 1, true);

    tweenContainer.push (tfadeIN);

    var ifadeIN:Tween = new Tween (getChildByName ('i' + clipNum), "alpha", Regular.easeOut, 0, 1, 1, true);

    tweenContainer.push (ifadeIN);

    If (clipNum > 1) {}

    var tfadeOUT:Tween = new Tween (this.getChildByName (' you +(clipNum-1)), "alpha", Regular.easeOut, 1, 0, 1, true);

    tweenContainer.push (tfadeOUT);

    var ifadeOUT:Tween = new Tween (getChildByName ('i' +(clipNum-1)), "alpha", Regular.easeOut, 1, 0, 1, true);

    tweenContainer.push (ifadeOUT);

    }

    clipNum ++;

    }

    }

    clipNum = 1;

    showItems();

    function iTransform(event:Event):void

    {

    var imageLoader:Loader = Loader (event.target.loader);

    var imageWidth:int = imageLoader.width;

    var imageHeight:int = imageLoader.height;

    var imageWidth/imageHeight = aspectRatio;

    imageLoader.alpha = 0;

    If (imageWidth > 570 | imageHeight > 550) {}

    {if(AspectRatio>570/550)}

    imageLoader.width = 570;

    imageLoader.height = 570/aspectRatio

    } else {}

    imageLoader.height = 550;

    imageLoader.width = 550 * aspectRatio;

    }

    }

    implementation

    imageLoader.x=700-(imageLoader.width/2);

    imageLoader.y=290-(imageLoader.height/2);

    }

  • Question of implementation in the form of simple output file

    First off I did preface this by saying that I'm not a very good user of LabVIEW.  What I learned that I have myself taught just glancing vi control instrument.  Well, I'm taking a number of readings of my Agilient 34972 A switch.  I can send the command convert the returned string and play in a table.  The question I have is when I try to write this table to a file.  If I take the table directly as it comes to the loop that converts a string into an array, I end up with a file that looks like this:

    TimeData

    025.8

    124.3

    226.1

    323.9

    025,7

    124.4

    225.9

    324,1

    And so on.  Not at all what I want.  I understand what is happening but don't really know how to solve this problem, except that as I did in my program below, but this is very tedious, especially if I want to expand to 15 or 20 channels.  In this method I break the table flat recombine it and then write it to file and I find myself with a file of type:

    TimeData0Data1Data2Data3

    0.2525.824.326.123.9

    0.525.724.425.924.1

    And so on.  My question is that I'm sure that there is a simpler way to do exactly that, but I can't seem to understand.  Any suggestions would be great thank you.

    Out of curiosity, what is the problem with the recording just response of the instrument directly in the text file?  Seeing that it is delimited by commas, I could save the data in a *.csv (values separated command file).  Then same Excel read nicely.

    Something like that is what I consider.

  • Questions while ordering my medication - an error occurred

    Original title: Raymond Grace

    I went on the website of my medication to control my medications.  He said I should ' click on ' Place in the basket and when I did a review here indicating that an error has occurred.  I called the office medical and talked to their Web site person and he told me that the problem was with the computer... a cookie issue... and I have no idea what he's talking about.  Can I get help?

    Hi Raymond,

    Welcome to the Microsoft community.

    I understand that you have a problem with an error year error has occurred. We apologize for the inconvenience caused to you.

    I would like to know the details below to help you better.

    1. How many time you are faced with the question?
    2. Are you having the same problem with different browsers?

    If you use Internet Explorer, I ask you to delete the cache, cookies, browsing history and check if you are facing the issue. To relate so the below Microsoft help articles.

    Remove and manage cookies

    http://Windows.Microsoft.com/en-us/Internet-Explorer/delete-manage-cookies#IE=ie-11

    View and delete your browsing history

    http://Windows.Microsoft.com/en-us/Internet-Explorer/manage-delete-browsing-history-Internet-Explorer#IE=ie-11

    Keep us updated on the issue to help you better.

  • Question of WLC4400 of design.

    We will deploy lwapp APs and WLC4400. My question is every lwapp is on different sunbet and WLC4400 is also a different subnet, but these are connected switch L3 can inter VLAN routing. These APs lwapp and the WLC4400 can communicate with each other, if not nesseary for configure the VLAN (like adding interface ap - manager) by subnet on WLC4400? Subnet is different, but all the same SSID. LWAPP already has a static ip address.

    Hi Yong,

    You must ensure that your LWAPP AP can get an ip address of management controller so that they can join your controller. If they are in the different subnet of your management on your AP controller interface must have an ip address of the management interface on controller via DHCP or DNS or via OTAP.

    Also you must have at least one interface ap - manager.

    HTH

    Ankur

  • Only AAS, 2 inside the kernel switches (HSRP) Best Practice Design

    Hello

    I design a N/W with following equipment.

    1: 2 * carrots (4503)

    2: single Firewall ASA 5520

    I have following design options;

    DRAWING 1:

    1. Basic switches use HSRP
    2. VLANs are active on a (primary) switch at a time
    3. CONNECT THE TWO CŒURS WITH ASA
    • ASA E0 - outside (routers) switch
    • ASA (redundant interface = E1 + E3) R1 - the two nuclei (HSRP)
    • ASA E1 - Core 1 (F3/48) + ASA E3 - Core 2 (F3/48)
    • ASA E2 - switch DMZ

    DESIGN 2:

    1. Basic switches use HSRP
    2. VLANs are active on a (primary) switch at a time
    3. CONNECT THE TWO CŒURS FOR LAYER 2 SWITCH (INNER AREA)
    4. CONNECT THE LAYER 2 SWITCH TO ASA E1

    The first options looks better avoid me point single failure (Layer 2 of insdie switch).

    Unfortunately, I'm short on time and do not currently have access to the LAB.

    Please

    1. Share your experience and suggest which option is preferable
    2. Advantages, disadvantages during the failover hsrp, other features, etc.
    3. indicate if there is an alternate option
    4. Precautions

    BR,

    ABDUL MAJID KHAN

    Your "redundant ASA interface" is not really. Only one ASA has no real redundancy. I guess you could make a "inside the 1" and "inside 2", but they would have separate IP addresses and within hosts would not automatically from one to the other. " I would say that the complexity that introduced more than offset the second idea to have a small switch L2 VLAN between your ASA unique within the interface and your L3 core switches.

    That's why I prefer the second option. A switch L2 deemed unchanged configuration being done is quite reliable - I regularly fall on them with years of availability. You can also add a quasi redundancy in option 2 by tying together your ASA E1 interfaces and E3 in an etherchannel (requires a Software ASA 8.4 or later version). that option is not possible with option 1 (at least not in the two basic switches) as an Etherchannel are two IOS switches at one end.

Maybe you are looking for

  • Windows XP programs down immediately?

    I have a Windows XP computer and I use for months and never had a problem. Recently, I tried to install an older version of Quicken (Quicken 2004, which was built for Windows XP). It opens the splash screen, and then immediately close. Now, my email

  • Why my drive sounds like something is stuck

    For these days, when I use my hard drive to DVD, it does not recognize my hard drive or he jumps and makes noises like a car when it does not start. I noticed that the film on the underside of the hard drive is a little twisted. Is it normal that thi

  • backup IPS to TFTP software

    on my module AIP-SSM-10 ASA5520 how I backup software (v5.0) IPS to my TFTP server? cause I need to reimage a testASA with this software IPS.

  • Change in LR after change in PS issues

    I apologize if this question has already been asked, but I was not sure even how to pick him up.  I would like to say that my problem is pixelated, but when I think of pixels I think small little buggers.  In any case, my problem occurs after I have

  • How can I turn on the backlight for the keyboard on desire 4 t-1000

    So, I got my computer yesterday and I've been fiddling with it since then. But, for the life of me, I can't understand how to turn / control the backlight on the keyboard. I don't see any buttons obvious or control when I search from the start menu.