Dual routers configuration and PIX501 questions?

This is the current configuration:

(1) Internet

(2) the Router 1

(3) 2 router

(4) internal network

and we count on the involvement of the PIX between 1 & 2 or 3 & 4.

The reason why we have two routers, it is that the new router (Router 1), we bought with the new service uses the NAT address of 66.x.x.x instead of our old router 192.168.x.x, then we run the new line through the old router so that we can always access 3rd party company their router to manage if we're not around. In addition, the company is already configured around the 192 address.

We do purchase a PIX501, but whether it will be able to replace the old router and represent the 192 network so that we won't have to have 2 routers in most firewall. It will act as a router? or only as a switch?

You can take security to the next level by deploying the firewall between the perimeter router and your network, from another angle, you can connect the PIX to the internet then to deploy the router between your network and the pix.

Tags: Cisco Security

Similar Questions

  • How to configure IKE with RSA without this Protocol between 1760 and PIX501?

    Hello

    I have a question about authentication with RSA - SIG IKE between 1760 router and PIX501 without AC.

    .

    I found a URL between routers, but not for PIX. do I need third-party CA (public or internal) in the PIX?

    http://www.Cisco.com/warp/public/707/18.html

    .

    Please correct me if I am wrong or the return URL.

    .

    Thank you

    RSA - enc is available for IOS routers, PIX will support certificate or key pré-partagées, you might want to look at this example with a MS CA:

    http://www.Cisco.com/warp/public/707/lan_to_lan_ipsec_pix_rtr_cert.html

  • VI Analyzer Questions: Change the default test configuration and screw "Pavilion".

    I have two things I continue to come through in VI Analyzer:

    1. are there in any case to set the default VI Analyzer so that it applies to all projects, I'm working on that?

    I tried to create a task in project A, registration of the configuration and any attempt to open this file in project B, but it says that the file could not be loaded. The reason for my question is that there are a few default options that just add errors that we don't care (e.g. Controls dialog on the façade - 99% of the LabVIEW code that we are working on is called from TestStand as code modules, so the front panel doesn't really count)

    2. can I score / report some screws as 'safe' for parser tests?

    Basically, some screws may fail some perfectly safe way VI Analyzer tests (e.g. non-stanard errors on a 'closing' VI, who doesn't have a case error structure so that the device always gets closed). I wish I had a way to mark the VI kind VI Analyzer would ignore this particular test. This would allow me to have a rule that says something like "before any construction, run the file configuration VI analyzer and make sure there is not error", as opposed to "run VI Analyzer and examine errors, decide whether or not they are important for the VI in question..." ». An extension to this question would be how do I perform a task VI Analyzer before building when the VI Analyzer screw do not accept files cfg for project based tasks.

    Any help would be greately appreciated!

    Thank you

    Shaun

    1. a project oriented .cfg file cannot be transferred between projects.  Could you possibly create a .cfg unrelated to the project file (under the option 'Start a new task' on the first page of the VI Analyzer) and use it?  He would have no file in the list, but it would have all of the configured tests as you want.  And you could start with this on your different projects .cfg file... you would just add screws based on file (on page 2 of the VI Analyzer), rather than have all come to you in a .cfg project-based.

    2. on page 4 VI Analyzer, you can exclude certain tests to run on some screws and save these settings in a .cfg.  This option is also exposed in the VI Analyzer API with VIAn exclude the VI.vi Tests.

  • Questions on "configure and start the server process" step during the r12 upgrade

    There is a not listed in the 11i 12.1.1 to upgrade guide, 'the Server Configure and start processes. It looks like to includes two parts, run autoconfig tire to the database and run the quick installation of second time.

    so I have two questions here:

    1. looks like the quick second installation is just autoconfig, so can I just run autoconfig instead of the second quick installation?

    2. that we'll first? automatic configuration in the database or quick installation service?

    Thank you

    1. looks like the quick second installation is just autoconfig, so can I just run autoconfig instead of the second quick installation?

    AutoConfig will not start the services so I'd run fast install and it should run the automatic configuration for you.

    2. that we'll first? automatic configuration in the database or quick installation service?

    Quick installation.

    Thank you

    Hussein

  • FlexVPN and OSPF question

    I have a problem with rountig OSPF on the routers configured in the hub-and-spoke topology.

    One question is on a course that OSPF don't advertise hub to rays.

    Created on a hub, router subnets are not seen on the rays, but new added subnet on talk appears in the table of routing hub.

    The addition of broadcast command network ip ospf on a virtual-template interface hub causes OSPF adjacency downstairs.

    Also, EIGRP works very well.

    A that someone has experienced this problem with OSPF.

    Please, look at a few config below;

    -----------------------HUB-------------------------------

    IKEv2 crypto by default authorization policy

    Road enabled interface

    !

    Crypto ikev2 proposal ikev2_prop

    encryption aes-cbc-256

    integrity sha512

    Group 16

    !

    IKEv2 crypto policy ikev2_policy

    proposal ikev2_prop

    !

    Crypto ikev2 keyring Flex_key

    Rays peer

    address 192.168.50.197

    pre-shared key local 12345

    pre-shared key remote 12345

    !

    peer RTB

    address 192.168.50.199

    pre-shared key local 12345

    pre-shared key remote 12345

    !

    Profile of ikev2 crypto Flex_IKEv2

    match one address remote identity 192.168.50.197 255.255.255.255

    match one address remote identity 192.168.50.199 255.255.255.255

    sharing front of remote authentication

    sharing of local meadow of authentication

    local Flex_key keychain

    virtual-model 1

    !

    no default isakmp crypto policy

    !

    Crypto ipsec transform-set esp - aes 256 esp-sha512-hmac ipsec_trans

    tunnel mode

    !

    by default the crypto ipsec profile

    Set transform-set ipsec_trans

    Flex_IKEv2 Set ikev2-profile

    !

    interface Loopback1

    address 172.16.10.1 IP 255.255.255.0

    IP ospf 10 area 0

    !

    interface Loopback10

    10.1.1.1 IP address 255.255.255.0

    IP ospf 10 area 0

    !

    interface Loopback50

    IP 50.1.1.1 255.255.255.0

    IP 10 50 ospf area

    !

    the Embedded-Service-Engine0/0 interface

    no ip address

    !

    interface GigabitEthernet0/1

    bandwidth 100000

    IP 192.168.50.198 255.255.255.0

    automatic duplex

    automatic speed

    !

    type of interface virtual-Template1 tunnel

    IP unnumbered Loopback1

    IP 1400 MTU

    IP tcp adjust-mss 1360

    source of tunnel GigabitEthernet0/1

    ipv4 ipsec tunnel mode

    tunnel path-mtu-discovery

    tunnel protection ipsec default profile

    !

    router ospf 10

    redistribute connected subnets

    Network 10.1.1.0 0.0.0.255 area 0

    SH cryp ike his

    IPv4 Crypto IKEv2 SA

    Tunnel-id Local Remote fvrf/ivrf status

    1 192.168.50.198/500 192.168.50.197/500 no/no LOAN

    BA: AES - CBC, keysize: 256, Hash: SHA512, DH Grp:16, Auth sign: PSK, Auth check: PSK

    Duration of life/active: 86400/77565 sec

    Tunnel-id Local Remote fvrf/ivrf status

    2 192.168.50.198/500 192.168.50.199/500 no/no LOAN

    BA: AES - CBC, keysize: 256, Hash: SHA512, DH Grp:16, Auth sign: PSK, Auth check: PSK

    Duration of life/active: 86400/77542 sec

    IPv6 Crypto IKEv2 SA

    SH ip rou

    S * 0.0.0.0/0 [1/0] via 192.168.50.1

    10.0.0.0/8 is variably divided into subnets, 2 subnets, 2 masks

    C 10.1.1.0/24 is directly connected, Loopback10

    L 10.1.1.1/32 is directly connected, Loopback10

    50.0.0.0/8 is variably divided into subnets, 2 subnets, 2 masks

    C 50.1.1.0/24 is directly connected, Loopback50

    L 50.1.1.1/32 is directly connected, Loopback50

    100.0.0.0/32 is divided into subnets, subnets 1

    AI 100.1.1.1 [110/2] via 172.16.10.254, 21:32:58, Virtual Network1

    172.16.0.0/16 is variably divided into subnets, 2 subnets, 2 masks

    172.16.10.0/24 C is directly connected, Loopback1

    L 172.16.10.1/32 is directly connected, Loopback1

    192.168.50.0/24 is variably divided into subnets, 2 subnets, 2 masks

    C 192.168.50.0/24 is directly connected, GigabitEthernet0/1

    The 192.168.50.198/32 is directly connected, GigabitEthernet0/1

    200.1.1.0/32 is divided into subnets, subnets 1

    AI 200.1.1.1 [110/2] via 172.16.10.253, 21:32:38, Access2-virtual

    201.1.1.0/32 is divided into subnets, subnets 1

    AI 201.1.1.1 [110/2] via 172.16.10.253, 21:32:38, Access2-virtual

    220.1.1.0/32 is divided into subnets, subnets 1

    AI 220.1.1.1 [110/2] via 172.16.10.253, 00:06:11, Access2-virtual

    ---------------------------SPOKE---------------------------------------------

    Crypto ikev2 proposal ikev2_prop

    encryption aes-cbc-256

    integrity sha512

    Group 16

    !

    IKEv2 crypto policy ikev2_policy

    proposal ikev2_prop

    !

    Crypto ikev2 keyring Flex_key

    Rays peer

    address 192.168.50.198

    pre-shared key local 12345

    pre-shared key remote 12345

    !

    Profile of ikev2 crypto Flex_IKEv2

    match one address remote identity 192.168.50.198 255.255.255.0

    sharing front of remote authentication

    sharing of local meadow of authentication

    local Flex_key keychain

    virtual-model 1

    !

    no default isakmp crypto policy

    !

    !

    Crypto ipsec transform-set esp - aes 256 esp-sha512-hmac ipsec_trans

    tunnel mode

    !

    by default the crypto ipsec profile

    Set transform-set ipsec_trans

    Flex_IKEv2 Set ikev2-profile

    !

    interface Loopback200

    200.1.1.1 IP address 255.255.255.0

    IP ospf 10 200 area

    !

    interface Loopback201

    IP 201.1.1.1 255.255.255.0

    IP ospf 10 201 area

    !

    interface Loopback220

    IP 220.1.1.1 255.255.255.0

    IP ospf 10 220 area

    !

    Tunnel1 interface

    IP 172.16.10.253 255.255.255.0

    IP 1400 MTU

    IP tcp adjust-mss 1360

    source of tunnel GigabitEthernet0/1

    ipv4 ipsec tunnel mode

    tunnel destination 192.168.50.198

    tunnel path-mtu-discovery

    tunnel protection ipsec shared default profile

    !

    interface GigabitEthernet0/1

    IP 192.168.50.199 255.255.255.0

    automatic duplex

    automatic speed

    !

    router ospf 10

    network 172.16.10.0 0.0.0.255 area 0

    SH cryp ike his

    IPv4 Crypto IKEv2 SA

    Tunnel-id Local Remote fvrf/ivrf status

    1 192.168.50.199/500 192.168.50.198/500 no/no LOAN

    BA: AES - CBC, keysize: 256, Hash: SHA512, DH Grp:16, Auth sign: PSK, Auth check: PSK

    Duration of life/active: 77852/86400 sec

    IPv6 Crypto IKEv2 SA

    SH ip route

    S * 0.0.0.0/0 [1/0] via 192.168.50.1

    172.16.0.0/16 is variably divided into subnets, 2 subnets, 2 masks

    172.16.10.0/24 C is directly connected, Tunnel1

    L 172.16.10.253/32 is directly connected, Tunnel1

    192.168.50.0/24 is variably divided into subnets, 2 subnets, 2 masks

    C 192.168.50.0/24 is directly connected, GigabitEthernet0/1

    The 192.168.50.199/32 is directly connected, GigabitEthernet0/1

    200.1.1.0/24 is variably divided into subnets, 2 subnets, 2 masks

    C 200.1.1.0/24 is directly connected, Loopback200

    L 200.1.1.1/32 is directly connected, Loopback200

    201.1.1.0/24 is variably divided into subnets, 2 subnets, 2 masks

    C 201.1.1.0/24 is directly connected, Loopback201

    L 201.1.1.1/32 is directly connected, Loopback201

    220.1.1.0/24 is variably divided into subnets, 2 subnets, 2 masks

    C 220.1.1.0/24 is directly connected, Loopback220

    L 220.1.1.1/32 is directly connected, Loopback220

    SH ip ospf database ro 172.16.10.1

    Router OSPF with ID (200.1.1.1) (the process ID of 10)

    Router link States (zone 0)

    ADV router is accessible via is not in the Base with MTID topology 0

    LS age: 336

    Options: (no TOS-capability, DC)

    LS type: Router links

    Link state ID: 172.16.10.1

    Advertising router: 172.16.10.1

    LS number of Seq: 80000065

    Checksum: 0x4B6E

    Length: 60

    Area border router

    ROUTER limits

    Number of links: 3

    Link to: a Stub network

    (Link ID) Network/subnet number: 10.1.1.1

    (Data link) Network mask: 255.255.255.255

    Number of parameters MTID: 0

    TOS 0 metric: 1

    Link to: another router (point to point)

    (Link ID) Neighbors router ID: 100.1.1.1

    (Data link) Address of the router Interface: 0.0.0.18

    Number of parameters MTID: 0

    TOS 0 metric: 1

    Link to: another router (point to point)

    (Link ID) The router ID neighbors: 200.1.1.1

    (Data link) Address of the router Interface: 0.0.0.17

    Number of parameters MTID: 0

    TOS 0 metric: 1

    Kamil,

    A tunnel in this deployment (and VT / going also) is an interface point to point, there is really no good reason to keep anything other than 32 (I might not be aware of some subtleties in more complex deployment).

    'Set interface route' is your greatest friend ;-)

    M.

  • Dual Boot Vista and XP in separate hard drives?

    I currently installed on a hard drive in Vista and I have an extra which is 160 GB I want to install XP on so that I can dualboot both, is it possible?

    Remember that there is no partition in question here.

    The key which makes the task easier is to preformat the drive, assign a disk label (example: WinXP) and then launch the installation.

    How to dual boot Vista and XP (with Vista installed first) - the guide step by step with screenshots
    http://apcmag.com/how_to_dual_boot_vista_and_xp_with_vista_installed_first__the_stepbystep_guide.htm

    Install Windows XP on your pre-installed Windows Vista computer
    http://www.howtogeek.com/HOWTO/Windows-Vista/install-Windows-XP-on-your-pre-installed-Windows-Vista-computer/

    As always, with the project like this create an image backup of your entire hard drive (to an external USB drive) first.

    Acronis True Image 2011 - has a 30 day trial version available.
    (Install Acronis and then create a restoration/Rescue CD Media before starting the creation of an image backup)
    http://www.Acronis.com/homecomputing/products/TrueImage/
    The version comparison: http://www.acronis.com/homecomputing/products/trueimage/comparison.html
    True Image User Guides and documentation:
    http://www.Acronis.com/homecomputing/download/docs/

    J W Stuart: http://www.pagestart.com

  • How do I set up a dual boot Vista and XP with 2 hard drives?

    Dual boot Vista and XP with 2 hard drives

    I tried to get my computer has a separate hard drive put in place that lets me run Windows XP or Windows Vista. I tried the path of the CMD, but I could do things wrong with that because the news NTLDR appeared much too different info from Vista. Currently, I have deleted this change to the startup configuration. I want to know what I have to do to get these two to be able to boot. I noticed problems similar to mine, but the answer always seems to be a software that would cost me money.

    Thank you

    Tevans95

    Hello Tevans95,

    You cannot install two different operating systems on two different disks. For a dual-boot environment, you must install both XP and Vista on the same drive with different partitions.

    In addition, you must install Windows XP first and then Windows Vista.

    You can check the items below which will give you information on Dual boot.

    Install multiple operating systems (multiboot)

    Set up a dual-boot system

    Change the default operating system for startup (multiboot)

    There is no software that can help you to install XP and Vista on different drives.

    Thank you
    Irfan H, Engineer Support Microsoft Answers. Visit ourMicrosoft answers feedback Forum and let us know what you think.

  • ASA 8.4 cleaning using Network Configuration and Service objects

    Hello

    As most of you know, firewall configurations can growth in order to be large and complex, making them difficult to understand and difficult to change.

    I have a cleaning using network firewall configuration and Service objects and groups of objects running from 8.4 who I want to. This ASA (8.4) has over 30 Web Server VM deployed behind each with the same basic configuration: one to the outside inside the IP address and port mapping (x.x.x.x:ftp to y.y.y.y:ftp, etc.) by using the following well known ports: FTP, 80, 443, 3389.

    Examples of my existing configuration:

    network of the Y.Y.Y.Y_FTP object

    Home y.y.y.66

    NAT (inside, outside) Static X.X.X.66 tcp ftp ftp service

    network of the Y.Y.Y.Y_WWW object

    Home y.y.y.66

    NAT (inside, outside) Static X.X.X.66 tcp http http service

    network of the Y.Y.Y.Y_HTTPS object

    Home y.y.y.66

    NAT (inside, outside) Static X.X.X.66 tcp 443 443 service

    network of the Y.Y.Y.Y_RDP object

    Home y.y.y.66

    NAT (inside, outside) static service tcp 3389 3389 X.X.X.66

    outside_in list extended access permit tcp any host y.y.y.66 eq ftp

    outside_in list extended access permit tcp any host y.y.y.66 eq www

    outside_in list extended access permit tcp any host y.y.y.66 eq 3389

    outside_in list extended access permit tcp any host y.y.y.66 eq 443

    The entries above for each port have to do whenever a new virtual machine is deployed behind the firewall.

    Here's my ACE project and entered the object-group service to clean up configuration.

    object-group service WWW_FTP

    Description access FTP HTTP

    the tcp destination eq ftp service object

    the purpose of the tcp destination eq ftp service - data

    the purpose of the service tcp destination eq www

    object-group service WWW_FTP_RDP

    Description access FTP RPD WWW

    the tcp destination eq ftp service object

    the purpose of the tcp destination eq ftp service - data

    the purpose of the service tcp destination eq www

    the destination eq 3389 tcp service object

    object-group service WWW_FTP_RDP_SSH

    Description access WWW RDP SSH FTP

    the tcp destination eq ftp service object

    the purpose of the tcp destination eq ftp service - data

    the purpose of the service tcp destination eq www

    the destination eq 443 tcp service object

    the destination eq 3389 tcp service object

    object-group service RDP_SSH

    Access SSH RDP description

    the destination eq 443 tcp service object

    the destination eq 3389 tcp service object

    object-group service RDP_SSH_FTP

    Access SSH FTP RDP description

    the destination eq 443 tcp service object

    the destination eq 3389 tcp service object

    the tcp destination eq ftp service object

    the purpose of the tcp destination eq ftp service - data

    object-group service RDP_FTP

    Access FTP RDP description

    the destination eq 3389 tcp service object

    the tcp destination eq ftp service object

    the purpose of the tcp destination eq ftp service - data

    outside_in list extended access allowed object-group WWW_FTP_RPD any host Y.Y.Y.Y

    outside_in list extended access allowed object-group WWW_FTP_RDP_SSH any host Y.Y.Y.Y

    outside_in list extended access allowed object-group WWW_FTP any host Y.Y.Y.Y

    outside_in list extended access allowed object-group RDP_FTP any host Y.Y.Y.Y

    outside_in list extended access allowed object-group RDP_SSH_FTP any host Y.Y.Y.Y

    outside_in list extended access allowed object-group RDP_SSH any host Y.Y.Y.Y

    The challenge lies in the consolidation of the network object entries that follow into something more condensed as the entries in the object-group service.

    network of the Y.Y.Y.Y_FTP object

    Home y.y.y.66

    NAT (inside, outside) Static X.X.X.66 tcp ftp ftp service

    network of the Y.Y.Y.Y_WWW object

    Home y.y.y.66

    NAT (inside, outside) Static X.X.X.66 tcp http http service

    network of the Y.Y.Y.Y_HTTPS object

    Home y.y.y.66

    NAT (inside, outside) Static X.X.X.66 tcp 443 443 service

    network of the Y.Y.Y.Y_RDP object

    Home y.y.y.66

    NAT (inside, outside) static service tcp 3389 3389 X.X.X.66

    Any help is greatly appreciated!

    Hello

    I'm afraid that the only part of the configuration you can really change and make more condenced is configurations ACL using configurations different ' object-group ' .

    Of course, you can also create a "object-group" for all servers that need the same ports open to further reduce the lines of actual configurations in the configuration of the CLI.

    However,.

    Regarding NAT configurations there is unfortunately no way to reduce the amount of required configurations if you use Static PAT (Port Forward) for servers. There is no way yet to ports in group for "nat" configurations.

    My question is, you have public IP addresses less at your disposal compared with the amount of different servers in your network behind the ASA?

    If you have a public IP address dedicated to each server in the network, then I suggest to use static NAT instead of static PAT. It's about the only way that the NAT configuration could be minimized.

    -Jouni

  • Change the system configuration and yet no difference in config

    This question is about a router CISCO1941/K9, Version 15.0 (1r) M15.

    When I type

    reload in 4

    He asks me

    The system configuration has changed. Save? [Yes/No]:
    % Please answer 'yes' or «»

    even if

    See the config differences: running system of archives-config nvram:startup

    gives

    ! Contextual Diffs Config:
    ! No changes have been found

    and

    Show running

    gives

    Current configuration: 5031 bytes
    !
    ! No change since the last restart configuration

    My question is: How can I determine WHAT system configuration has been altered?

    As far as I know, the only thing changed is the Terminal length that I occasionally switches for use with the recording of session with PuTTY, which is

    Terminal length 0.

    This router has been in production for months and I don't want to break anything (obviously).  I need to make a change to the configuration of the access-list and wanted to protect me by saying to reload in 4, and then I was probably cancel about 1 minute.  But now I'm worried about it save yes/no question.

    Thank you.

    Hello

    Just save config running and configuration of boot in text files and compare them. Have you enabled all logging on the router?  It may be because of this.

    Just make sure that your configuration register is 0 x 2102. You can see by the show version command

  • Cisco ASA Site to Site VPN IPSEC and NAT question

    Hi people,

    I have a question about the two Site to Site VPN IPSEC and NAT. basically what I want to achieve is to do the following:

    ASA2 is at HQ and ASA1 is a remote site. I have no problem setting a static static is a Site to IPSEC VPN between sites. Guests residing in 10.1.0.0/16 are able to communicate with hosts in 192.168.1.0/24, but what I want is to configure the NAT with IPSEC VPN for this host to 10.1.0.0/16 will communicate with hosts in 192.168.1.0/24 with translated addresses

    Just an example:

    N2 host (10.1.0.1/16) contacted N1 192.168.1.5 with destination host say 10.23.1.5 No 192.168.1.5 (notice the last byte is the same in the present case,.5)

    The translation still for the rest of the communication (host pings ip destination host 10.23.1.6 N3 N2 not 192.168.1.6 new last byte is the same)

    It sounds a bit confusing to me, but I've seen this type of configuration before when I worked for the supplier of managed services where we have given our customers (Ipsec Site to Site VPN with NAT, don't know how it was setup)

    Basically we contact the customer via site-to-site VPN hosts but their real address were hidden and we used as translated address more high 10.23.1.0/24 instead of (real) 192.168.1.0/24, last byte must be the same.

    Grateful if someone can shed some light on this subject.

    Hello

    OK so went with the old format of NAT configuration

    It seems to me that you could do the following:

    • Configure the ASA1 with static NAT strategy

      • access-list L2LVPN-POLICYNAT allowed ip 192.168.1.0 255.255.255.0 10.1.0.0 255.255.0.0
      • public static 10.23.1.0 (inside, outside) access-list L2LVPN-POLICYNAT
    • Because the above is a static NAT of the policy, this means that the translation will be made only when the destination network is 10.1.0.0/16
    • If you have for example a PAT basic configuration to inside-> external traffic, the above NAT configuration and the custom of the actual configuration of PAT interfere with eachother
    • ASA2 side, you can normally configure NAT0 / NAT Exemption for the 10.1.0.0/16 network
      • Note of the INTERIOR-SHEEP access-list SHEEP L2LVPN
      • the permitted INSIDE SHEEP 10.1.0.0 ip access list 255.255.0.0 10.23.1.0 255.255.255.0
      • NAT (inside) 0-list of access to the INTERIOR-SHEEP
    • You will need to consider that your access-list defining the VPN encrypted L2L traffic must reflect the new NAT network
      • ASA1: allowed to access-list L2LVPN-ENCRYPTIONDOMAIN ip 10.23.1.0 255.255.255.0 10.1.0.0 255.255.0.0
      • ASA2: list L2LVPN-ENCRYPTIONDOMAIN allowed ip 10.1.0.0 access 255.255.0.0 10.23.1.0 255.255.255.0

    I could test this configuration to work tomorrow but I would like to know if it works.

    Please rate if this was helpful

    -Jouni

  • Configuration and management use cases

    Hello

    In my opinion, this tool provides the ability to examine those corresponding to results that must be validated and then, I think, it helps the end user, take action. My question is: what are the actions that the user could take?, more precisely the user can manage the fields of candidates corresponding to generate a gold record?

    In addition, I'm looking for resources/documentation to configure and use the management interface of the Disqualification case. I would like to know how to set up a process of Disqualification to trigger alerts on case management interface and assigning it to a user.

    Thanks in advance for any help,

    Kind regards

    Daniel

    Hi Daniel,.

    Direct manipulation of data is not currently possible in the implementation of case management. The only actions are:

    -Change the State

    -Add a comment

    -Add the attachment

    -Change the value of the extended attribute

    Kind regards

    Nick

  • Documentation for the configuration and the deployment of SSO in WCI 10 g R3

    I searched the Forum and the oracle documentation, but found no specific documentation on configuring and deploying single-sign - on (SSO) in WCI 10 g R3. I found the documentation for ALUI 6.1 but not for 10g R3. Grateful if someone can provide the same.

    Thank you

    In addition to Ms. WIA, we support the integration of Netegrity Siteminder and Oblix (now Oracle Identity management solutions) against WCI. 10GR 3 administration guide includes a section on "Single Sign-On deployment" and "Common Questions SSO" that might be a good starting point:
    http://download.Oracle.com/docs/CD/E13158_01/AluI/WCI/docs103/map_WCI_adminguide_10-3/

    However, it seems there is no information in the deployment (a mistake I think), to verify the portal 6.1 admin guide here:
    http://download.Oracle.com/docs/CD/E13174_01/AluI/Ali/docs61/Admin/SSO.html

    Down from the link above, you will see information on the use of BasicSSO and CustomSSO to connect to other third-party SSO providers not supported. And I think that this KB below may still be relavent although old.

    Develop a custom SSO objects to integrate third-party SSO servers with the portal
    ArticleID 778417.1

  • I recently dropped my laptop and it is weird, one day he int open up to 4 start times and sometimes it shows me a folder and a question mark in the interface and sometimes asked to reset my password, what are the steps to take?

    I recently dropped my laptop and it is weird, one day he int open up to 4 start times and sometimes it shows me a folder and a question mark in the interface and sometimes asked to reset my password, what are the steps to take?

    Anything can be corrupted on your MacBook Pro, but from what you say, it seems that the cable drive/SSD/flash memory/SATA hard was seriously damaged. Him "question mark" means that your Mac is unable to find any bootable device, meaning that it does not yet detect your OS X drive.

    You should make a backup of your files (if you can still do it) and take the Mac at the Apple Store or dealer to get a diagnosis. There may be several damaged parts.

  • Is it possible with the serial number of an Xserve to read the configuration and the year of production?

    Is it possible with the serial number of an Xserve to read the configuration and the year of production?

    This will show you the model and year: https://checkcoverage.apple.com/

    If a specific configuration (like the 1 TB disk instead of 500 GB for ex) will not be determined. You can only learn by starting the Xserve (or open and look into it.)

  • How to recover the forgotten password if you have forgotten your password for the alternative account and the question secret

    Hi, I am unable to access my account of * address email is removed from the privacy *. I really need to return as soon as possible because I have a lot of important issues and contacts inside...

    Thank you!

    View all Windows Live and Hotmail questions in the appropriate forum found here:
    http://windowslivehelp.com/

Maybe you are looking for

  • Mac OS installers Sierra

    I participated in the incremental updates of Sierra. I have trouble downloading one of my computers. I am told that if I saved an installer which I must first remove before making the final download. Where can I find this Setup program if I have regi

  • Malwarebytes will not uninstall.

    Messages in these forums just repeat what the Malwarebytes company says on its site.  It simply doesn't get it. Here's what they say: To uninstall Anti-Malware for Mac, launch the program and choose Uninstall Malwarebytes in the menu help (menu help

  • TOSHIBA StorE 1524E-1HK0 - does not work after moving

    I just moved to another apartment and installed all my computer stuff. Unfortenaly my external hard drive won't give any connection to the PC. Also not to another PC. The light is red and blue turning. All cables are connected correct. To turn off th

  • How can I remove ringtones after I deleted the application?

    Hello everyone, I have an iPhone more 16 GB, iOS 9.1 6s. I learned how to make ringtones from using the Garageband application and so I did. It has worked flawlessly and I learned to remove them. From the share button tap your ringtones and drag to t

  • This allows hardware virtualization in the BIOS on HP Pavilion p6795

    Model number: HP Pavilion p6795 Operating system: A Windows 7 Home Premium 64-bit, now Windows 8 Pro 64-bit I'm looking to set up an environment virtualized to continue to use legacy operating systems and programs. I was wondering how I can be able e