HTTPConnection for the two wifi, as well as via gprs/3 G

I want to make the user do the httpconnection if he or she works on the connection wifi or gprs networks / 3G.

Can anyone share the code for the same thing

Thanks in advance

I've already posted to the code snippet

http://supportforums.BlackBerry.com/T5/Java-development/differentiating-between-direct-TCP-amp-WAP-2...

try to play with the code and use accordingly in your application.

Best regards

Sudhakar choup

Tags: BlackBerry Developers

Similar Questions

  • Win7 always tries to connect by using the default profile for the Native WIFI

    Win7 always tries to connect by using the default profile for the Native WIFI
    I defined a new WIFI profile for my home WIFI network. I use a USB of NETGEAR WNA1100 adapter. The profile is configured to connect automatically. I also moved over the default profile for the Native WIFI. Win7 always tries to connect to the default Native WIFI profile and not the profile that I created. Also, when I restart Win7, the default profile for the native WIFI moves to the top of the Profiles list. Also, when I try to change the default Native WIFI profile to use security WPA2 - PSK (AES) instead of WEP, it allows me to make changes, but he comes back to WEP after it treats changes and attempts to connect to the network. How can I fix so that Win7 will use my profile to connect to my home WIFI network and not the Native WIFI as the default profile. Win7 still connect using the default profile of NativeWIFI despite installing a different profile in Control Panel 'Wireless Networks '. I know that I can edit this profile by default, but anyone know how tell Win7 to use a different profile than the default? I tried to change the positions of the profile so that I want to use is facing up, but no, still uses the default. If I try to remove it, it comes back.
    After removing the two profiles and adding the profile for my home network, Win7 automatically added the default profile for the return NativeWIFI. My profile is configured to automatically connect to the network using WPA2 - PSK (AES) security and the default profile for the NativeWIFI (use WEP security) is the Win7 Setup to manually connect. Also, Win7 puts the default profile for the NativeWIFI above my profile. Also, when I delete the profile by default the NativeWIFI, Win7 it always puts back and he goes over my profile. This is starting to resemble the Win7 manage wireless mechanism for allowing users to add and prioritize the profiles of school boards does not work. Here's another thing that happens: when I try to change the security for the profile default of NativeWIFI to WPA2 - PSK (AES) of WEP, Win7 allows me to make changes, but it is up to the WEP after it processes the changes and tries to connect to the network. This seems too much for me, it's a problem with Win7. If I could do this job, so I need not to set up a second profile.
    The adapter I use a NETGEAR WNA1100 works correctly and I use it without any problem. I have is with Win7 and the interface to 'manage wireless networks '. It will not honor the fact that the WIFI profile that I created for my home network must be connected to automatically I installed. He always wants to connect to the default profile NativeWIFI even if I set up my home network profile to connect automatically. I can do a manual connection for my home network without problem. It seems to me that it is a question of Win7.
    Kind regards
    QRP

    Thank you very much - Netgear seems to have finally accepted as the default network!  If all goes well it will stay like this

    MAS

  • I plan to upgrade my OS to El Capitan.  What are the processor speed and memory required for the operating system works well?

    I plan to upgrade my OS to El Capitan.  What are the processor speed and memory required for the operating system works well?

    I use a processor 2.3 GHz Intel Core i5 with DDR3 4 GB 1333 MHz memory.

    My last similar attempt on another machine resulted in a very slow computer.

    Thanks, Ron

    Apple says the following:

    General requirements

    • OS X 10.6.8 or later version
    • 2 GB memory
    • 8.8 GB of available storage

    For best performance, I would say not less 4 GB and preferably 8 GB or more.

    Your i5 is well able to support properly.

    http://www.Apple.com/OSX/how-to-upgrade/#Hardware Configuration

  • Problem with the VPN site to site for the two cisco asa 5505

    Starting with cisco asa. I wanted to do a vpn site-to site of cisco. I need help. I can't ping from site A to site B and vice versa.

    Cisco Config asa1

    interface Ethernet0/0
    switchport access vlan 1
    !
    interface Ethernet0/1
    switchport access vlan 2
    !
    interface Vlan1
    nameif outside
    security-level 0
    IP address 172.xxx.xx.4 255.255.240.0
    !
    interface Vlan2
    nameif inside
    security-level 100
    IP 192.168.60.2 255.255.255.0
    !
    passive FTP mode
    network of the Lan_Outside object
    192.168.60.0 subnet 255.255.255.0
    network of the NETWORK_OBJ_192.168.1.0_24 object
    subnet 192.168.1.0 255.255.255.0
    network of the NETWORK_OBJ_192.168.60.0_24 object
    192.168.60.0 subnet 255.255.255.0
    object-group Protocol DM_INLINE_PROTOCOL_1
    ip protocol object
    icmp protocol object
    object-group Protocol DM_INLINE_PROTOCOL_2
    ip protocol object
    icmp protocol object
    object-group Protocol DM_INLINE_PROTOCOL_3
    ip protocol object
    icmp protocol object
    Access extensive list ip 192.168.60.0 Outside_cryptomap allow 255.255.255.0 192.168.1.0 255.255.255.0
    Outside_cryptomap list extended access allow DM_INLINE_PROTOCOL_3 of object-group a
    Outside_access_in list extended access allow DM_INLINE_PROTOCOL_1 of object-group a
    Inside_access_in list extended access allow DM_INLINE_PROTOCOL_2 of object-group a
    network of the Lan_Outside object
    NAT (inside, outside) interface dynamic dns
    Access-group Outside_access_in in interface outside
    Inside_access_in access to the interface inside group
    Route outside 0.0.0.0 0.0.0.0 172.110.xx.1 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    identity of the user by default-domain LOCAL
    AAA authentication http LOCAL console
    Enable http server
    http 192.168.60.0 255.255.255.0 inside
    http 96.xx.xx.222 255.255.255.255 outside
    No snmp server location
    No snmp Server contact
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-TRANS-aes - esp esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-MD5-TRANS esp - esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transit
    Crypto ipsec ikev2 ipsec-proposal OF
    encryption protocol esp
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 proposal ipsec 3DES
    Esp 3des encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES
    Esp aes encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES192
    Protocol esp encryption aes-192
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 AES256 ipsec-proposal
    Protocol esp encryption aes-256
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec pmtu aging infinite - the security association
    card crypto Outside_map 1 corresponds to the address Outside_cryptomap
    card crypto Outside_map 1 set peer 96.88.75.222
    card crypto Outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    card crypto Outside_map 1 set ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
    Outside_map interface card crypto outside
    trustpool crypto ca policy
    IKEv2 crypto policy 1
    aes-256 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 10
    aes-192 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 20
    aes encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 30
    3des encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 40
    the Encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    Crypto ikev2 allow outside
    Crypto ikev1 allow outside
    IKEv1 crypto policy 10
    authentication crack
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 20
    authentication rsa - sig
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 30
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 40
    authentication crack
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 50
    authentication rsa - sig
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 60
    preshared authentication
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 70
    authentication crack
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 80
    authentication rsa - sig
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 90
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 100
    authentication crack
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 110
    authentication rsa - sig
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 120
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 130
    authentication crack
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 140
    authentication rsa - sig
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 150
    preshared authentication
    the Encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH stricthostkeycheck
    SSH timeout 5
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    inside access management

    dhcpd address 192.168.60.50 - 192.168.60.100 inside
    dhcpd allow inside
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    WebVPN
    AnyConnect essentials
    internal GroupPolicy_96.xx.xx.222 group strategy
    attributes of Group Policy GroupPolicy_96.xx.xx.222
    VPN-tunnel-Protocol ikev1, ikev2
    username admin privilege 15 encrypted password f3UhLvUj1QsXsuK7
    tunnel-group 96.xx.xx.222 type ipsec-l2l
    tunnel-group 96.xx.xx.222 General-attributes
    Group - default policy - GroupPolicy_96.xx.xx.222
    96.XX.XX.222 group of tunnel ipsec-attributes
    IKEv1 pre-shared-key *.
    remote control-IKEv2 pre-shared-key authentication *.
    pre-shared-key authentication local IKEv2 *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    inspect the icmp
    inspect the icmp error

    ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

    Cisco ASA 2 config

    interface Ethernet0/0
    switchport access vlan 1
    !
    interface Ethernet0/1
    switchport access vlan 2
    !
    interface Vlan1
    nameif outside
    security-level 0
    IP address 96.xx.xx.222 255.255.255.248
    !
    interface Vlan2
    nameif inside
    security-level 100
    IP 192.168.1.254 255.255.255.0
    !
    passive FTP mode
    permit same-security-traffic inter-interface
    permit same-security-traffic intra-interface
    network of the Lan_Outside object
    subnet 192.168.1.0 255.255.255.0
    network of the NETWORK_OBJ_192.168.60.0_24 object
    192.168.60.0 subnet 255.255.255.0
    network of the NETWORK_OBJ_192.168.1.0_24 object
    subnet 192.168.1.0 255.255.255.0
    object-group Protocol DM_INLINE_PROTOCOL_1
    ip protocol object
    icmp protocol object
    object-group Protocol DM_INLINE_PROTOCOL_2
    ip protocol object
    icmp protocol object
    object-group Protocol DM_INLINE_PROTOCOL_3
    ip protocol object
    icmp protocol object
    object-group Protocol DM_INLINE_PROTOCOL_4
    ip protocol object
    icmp protocol object
    Outside_cryptomap list extended access allow DM_INLINE_PROTOCOL_2 of object-group 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
    Outside_cryptomap list extended access allow DM_INLINE_PROTOCOL_3 of object-group a
    Outside_access_in list extended access allow DM_INLINE_PROTOCOL_1 of object-group a
    Inside_access_in list extended access allow DM_INLINE_PROTOCOL_4 of object-group a
    pager lines 24
    Enable logging
    asdm of logging of information
    Outside 1500 MTU
    Within 1500 MTU
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    no permit-nonconnected arp
    NAT (inside, outside) static source NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.60.0_24 NETWORK_OBJ_192.168.60.0_24 non-proxy-arp-search of route static destination
    !
    network of the Lan_Outside object
    dynamic NAT (all, outside) interface
    Access-group Outside_access_in in interface outside
    Inside_access_in access to the interface inside group
    Route outside 0.0.0.0 0.0.0.0 96.xx.xx.217 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    identity of the user by default-domain LOCAL
    AAA authentication http LOCAL console
    Enable http server
    http 192.168.1.0 255.255.255.0 inside
    http 172.xxx.xx.4 255.255.255.255 outside
    No snmp server location
    No snmp Server contact
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-TRANS-aes - esp esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-MD5-TRANS esp - esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transit
    Crypto ipsec ikev2 ipsec-proposal OF
    encryption protocol esp
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 proposal ipsec 3DES
    Esp 3des encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES
    Esp aes encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES192
    Protocol esp encryption aes-192
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 AES256 ipsec-proposal
    Protocol esp encryption aes-256
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec pmtu aging infinite - the security association
    card crypto Outside_map 1 corresponds to the address Outside_cryptomap
    card crypto Outside_map 1 set peer 172.110.74.4
    card crypto Outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    card crypto Outside_map 1 set ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
    Outside_map interface card crypto outside
    trustpool crypto ca policy
    IKEv2 crypto policy 1
    aes-256 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 10
    aes-192 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 20
    aes encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 30
    3des encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 40
    the Encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    Crypto ikev2 allow outside
    Crypto ikev1 allow outside
    IKEv1 crypto policy 10
    authentication crack
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 20
    authentication rsa - sig
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 30
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 40
    authentication crack
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 50
    authentication rsa - sig
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 60
    preshared authentication
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 70
    authentication crack
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 80
    authentication rsa - sig
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 90
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 100
    authentication crack
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 110
    authentication rsa - sig
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 120
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 130
    authentication crack
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 140
    authentication rsa - sig
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 150
    preshared authentication
    the Encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH stricthostkeycheck
    SSH timeout 5
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0

    dhcpd address 192.168.1.50 - 192.168.1.100 inside
    dhcpd allow inside
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    WebVPN
    AnyConnect essentials
    internal GroupPolicy_172.xxx.xx.4 group strategy
    attributes of Group Policy GroupPolicy_172.xxx.xx.4
    L2TP ipsec VPN-tunnel-Protocol ikev1, ikev2
    username admin privilege 15 encrypted password f3UhLvUj1QsXsuK7
    tunnel-group 172.xxx.xx.4 type ipsec-l2l
    tunnel-group 172.xxx.xx.4 General-attributes
    Group - default policy - GroupPolicy_172.xxx.xx.4
    172.xxx.XX.4 group of tunnel ipsec-attributes
    IKEv1 pre-shared-key *.
    remote control-IKEv2 pre-shared-key authentication *.
    pre-shared-key authentication local IKEv2 *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    inspect the icmp
    inspect the icmp error
    inspect the http

    For IKEv2 configuration: (example config, you can change to encryption, group,...)

    -You must add the declaration of exemption nat (see previous answer).

    -set your encryption domain ACLs:

    access-list-TRAFFIC IPSEC allowed extended LOCAL REMOTE - LAN LAN ip

    -Set the Phase 1:

    Crypto ikev2 allow outside
    IKEv2 crypto policy 10
    3des encryption
    the sha md5 integrity
    Group 5
    FRP sha
    second life 86400

    -Set the Phase 2:

    Crypto ipsec ikev2 ipsec IKEV2-PROPOSAL
    Esp aes encryption protocol
    Esp integrity sha-1 protocol

    -set the Group of tunnel

    tunnel-group REMOTE-PUBLIC-IP type ipsec-l2l
    REMOTE-PUBLIC-IP tunnel-group ipsec-attributes
    IKEv2 authentication remote pre-shared-key cisco123


    IKEv2 authentication local pre-shared-key cisco123

    -Define the encryption card

    address for correspondence CRYPTOMAP 10 - TRAFFIC IPSEC crypto map
    card crypto CRYPTOMAP 10 peer set REMOTE-PUBLIC-IP
    card crypto CRYPTOMAP 10 set ipsec ikev2-IKEV2-PROPOSAL
    CRYPTOMAP interface card crypto outside
    crypto isakmp identity address

    On your config, you have all these commands but on your VPN config, you mix ikev1 and ikev2. You have also defined political different ikev2. Just do a bit of cleaning and reached agreement on a 1 strategy for the two site (encryption, hash,...)

    Thank you

  • Can we apply a createInsert single button for the two master form, details of Table?

    Mr President.

    Can we apply a createInsert single button for the two master form, details of Table?

    I want to just click a button and fields are available in form-Master and details-table.

    As below

    vfdt.png

    Concerning

    Mr President.

    My worm jdev is 12 c

    And I can do your job for you.

    His code

    For any organization that wants to do this job

     public void createVoucherAndVDetailsRow(){
                VoucherViewImpl voucherVO=this.getVoucherView1();
                VoucherViewRowImpl row=(VoucherViewRowImpl)voucherVO.createRow();
                voucherVO.insertRow(row);
                RowIterator iterator= row.getVoucherdetView();
                String voucherNumber=row.getVoucherId();
                NameValuePairs nvps=new NameValuePairs();
                nvps.setAttribute("VoucherId", voucherNumber);
                VoucherdetViewRowImpl voucherdetRow=(VoucherdetViewRowImpl)iterator.createAndInitRow(nvps);
                iterator.insertRow(voucherdetRow);
                }
    

    Concerning

  • to install Indesign on my new computer, but can't. First bought CS2 in 2009 and upgraded to 7.5 in 2011. I have the serial numbers for the two and was able to use it on my last computer. Where should I start?

    to install Indesign on my new computer, but can't. First bought CS2 in 2009 and upgraded to 7.5 in 2011. I have the serial numbers for the two and was able to use it on my last computer. I use Indesign that often but there are some projects that it is good for. Where should I start?

    Lchrichton123 what version of InDesign are specifically keen to install?  You can find links to the installation files for the majority of Adobe Creative software titles of other downloads

  • photosmart c6380 need driver for xp pro 32-bit who also works for the two laptops with win 7

    Recently, I was given an all-in-one Photosmart C6380.  It came without driver/installation disk.  I will link to my workhorse desktop with XP Pro 32-bit operating system.  We have two laptops with Windows 7 operating system.  I want to be able to print from wireless laptops.  Should which driver I proceed?  I found the XP driver but it is version 12.1.  I read that was a version 13 or higher needed for the printer to work a Windows 7 operating system.  There are tasks to accomplish what I want to do?  If Yes, where can I find the patches?

    Hello

    Do not hesitate to ask whenever you are not sure, that's why we're here

    And about your question, you are absolutely right - the 2nd software is for Windows 7.

    For all still help you may need, please do not hesitate and let us know.

    Kind regards

    Shlomi

  • Merge data to account for the two windows 8 accounts

    I have two devices Win8 and two different accounts, that I use to sign in them. The first is my smartphone. When I put in place, I created a new live account despite my doubts (I hate the areas of Microsoft mail). A few months down the line, I bought a laptop computer with Win8 (now updated to 8.1), but when I created it I did it knowing I could use any domain e-mail account so I chose to use my gmail account. Fast forward to today, my phone does not work as it should, and it was recommended that I do a factory reset to try to clear up the problems. When I put my phone again, I intend to use my gmail account this time so that the synchronization with the habit of my laptop be so boring with some applications. The problem is the information I have on my real account in the cloud, such as the phone numbers in the people application. My gmail people and my people live have the same information except for that. Is there a way I can easily add back all the clouds of my live account to my gmail account, when I put my phone up I get headaches very little experience and the downtime?

    Hi Oleson,

    If you've used Gmail account as Microsoft account when you used your phone for the first time, you will be able to access all your contacts by logging into people.live.com

    Therefore, even if you use the Gmail account as Microsoft account on your phone, you'll get all the contacts added to your device.

    If the Gmail account was not used to connect to your phone, follow the steps below to save all contacts to CSV. Later, you can use this file to export into the Gmail account that you use as a Microsoft account.

    1. Connect to http://people.live.com using your Microsoft account. (the e-mail address used to connect to the phone)
    2. Click Manage , and then select export for outlook.com and other services.
    3. Then save the CSV on your device.
    4. People disconnect and connect again using your Gmail account.
    5. Click on start import.
    6. Select other click Browse and Select the file in the location of his record.
    7. Click on download.

    Hope this information helps. Please let us know if you need additional assistance.

  • A lieneter for the two houses of oracle?

    Hello

    If I have two houses of Oracle on the same servers (say 10.2.0.4 and 10.2.0.5), do I have to set up two listeners (one for the databases of each home page) a listener (of the superior Oracle home version probably) Gold will be good enough? If a listener is enough, is there a special setup for these cases?

    Best regards


    Hello

    Yes, it is possible to create a listener to manage both houses of Oracle, see links.

    http://dbataj.blogspot.com/2008/02/managing-multiple-OracleHome-on-same.html

    http://www.dbasupport.com/forums/showthread.php?21095-one-listener-with-multiple-Oracle-homesrw

    Kind regards

  • The same POPup can be used for the two buttons

    Hi all

    I'm looking for an application where I need to use the same popup for two different buttons. This popup has a form of the ADF. I want to use for the Insert on a table of the ADF operation. The requirement is something like below

    A JSF page should have an ADF read only table with 3 buttons Insert, read, delete respectively. Buttons Insert and should be using popup which the user can enter data and display the data respectively. I am

    way to a form of the ADF for the insert PopUp. Now the problem is when the user selects a row in the table and click on the View button it should open a popup with read only form displaying the data from the selected row. For this I use the

    same popup which I use for insertion of information by changing properties readonly or I have to create a separate popup for the purpose of seeing it please help me out in that.

    Thanks in advance.

    Published by: 959766 on November 6, 2012 10:11

    You can use the same popup...

    Timo

  • How to check for the two first digits?

    Can someone please... There is demand to have a hidden field on the form that will be filled with data. It's going to be 6 digits long and could start with 02 or 04. I need to check on the DocReady event, for the first two digits. If the first two digits are 02, the presentation of the form will remain as it is. If the first two numbers are 04, I'll have to show two hidden subforms. Can someone please provide an explanation on how to check for the first two digits of field 6 digits and do some actions.

    Thank you very much

    No, only in the event: Exchange.

  • Illustrator 282C pantone color numbers different for example RBG, CMYK, Web color compared indesign colors and photoshops which has the same values of color for the two C. 282 I typed in a different color and the same issue. Why would it be different in a

    This is illustrator

    It's photoshop

    Libraries are the same? The two RGB colors are different and they have different look on the screen.

    None of this has to do if you are not working with color management and conversion of spot color to a CMYK process color, which seems to be the case here...

    Mylenium

  • Adobe download links show the same information for the two 3.6 Lightroom and Lightroom 4.4.1 (Windows). Must be false.

    I want to download Lightroom 4.4.1 to my computer with Windows 8.1. When I try to find the correct link in the list of download from Adobe, I get exactly the same Info for Lightroom 3.6 and 4.4.1. A new page for the 4.4.1 version should be mentioned.

    You can get all the versions here.

    Adobe - Lightroom: For Windows

  • deploy a virtual machine for the model stored in EXSI server via the command line

    Hello

    Is it possible to deploy a vm from a template stored in exsi server via the command line?

    The structure is shown in the attached picture. I want to deploy the model under "Templates" folder to a virtual machine "VM" sub-folder by command line of any machine.

    structure.jpg

    Hello

    PowerCLI can help you achieve this goal. Using PowerCLI, you can deploy remote host model.

    Here is an example for the same.

    http://www.harryjohn.org/deploy-multiple-VMs-from-template/

  • Would I be charged for international calls if I have friends in another country if we use the two wifi?

    I have a friend who is in Germany, and I was texting and facetiming him large amounts of time. Would I get charged for using wifi or is it free?

    Yes, texting, you will be charged for an international SMS, iMessage & FaceTime won't if you use only a wi - fi connection. You can only iMessage and FaceTime with other iOS device. So, since it is another iOS device, if you use iMessage (a bubble of blue text), then that is just data and would not result in not international calls. FaceTime, using a wi - fi connection, once again is just data, and incurs no international calling rates.

Maybe you are looking for

  • cannot get rid of tabs on the tab bar

    each tab, stubbornly refuses to be deleted, so when I try to close the screen tells me that I'm about to lose 15 tablets.Help, please!

  • iPhone Unlocked SE

    I am very confused and the customer to apple, the iphone has also 3 model A1662 & A1723 whats the difference. On the apple site it shows only to what model supports LTE in what country. My first question is what model supports 2G and 3G in India beca

  • emptys the phone in 16 hours battery

    Hello Last days my Defy will be dead in about 16 hours, I uninstalled all apps I had on it, restarted, but the situation is the same. The use of drums in settings section shows that battery is primarily used by standby mobile phone slowed down, wifi

  • Display returned backwards

    I'm running Windows Vista Home premium on a laptop Toshiba Satellite. Had this system for 2 years + with zero problems. When there is a couple of days, it starts normally, but then suddenly all of the returned screen upside down. I'm running the Inte

  • Limits of browser on phone

    Hi, I use Phonegap to build an Android application using html, css and js. Now, when I test the app on my desktop using PhoneGap Office, depending on the browser I use, I could see a difference in the behavior of the application according to the brow