In Active/Passive Mode Radius server configuration

We set up (active/active) the two ASA load balancing.  We also configure two Radius servers with load balancing.  At present, the Radius servers are configured with active/active.  Is it possible to configure a Radius Server with (active/passive)?

RADIUS protocol Radius AAA server
AAA-server Radius (inside) host XXX.XXX.XXX.XXX
Timeout 300
key *.
RADIUS-common-pw *.

AAA-server Radius (inside) host XXX.XXX.XXX.XXX
Timeout 300
key *.
RADIUS-common-pw *.

AAA accounting enable console RADIUS

Thank you.

Diane

Diane,

Well I'm still not 100% sure that you understand exactly what is happening. Normally, on a single ASA, authentication is always performed on the same radius server until it fails (i.e. active/passive as you call it).

Now, you mention that you have 2 ASAs in load balancing, so I don't know if you mean that:

(1) 2 users that connect to the same ASA get authenticated by radius 2 servers different (should never happen)

or

(2) when 2 users connect to the cluster, user1 gets redirected to ASA1 and authenticated on Radius1, while User2 will be redirected to ASA2 using Radius2 to auth. This could be normal if both ASAs are set up differently (defined in a different order radius servers) or an ASA had a problem connecting to Radius1, at some point and so it considered out of service.

In any case, 'sh aaa-server protocol radius' and 'debug RADIUS' can help determine why an asa individual does not use (initially configured) primary radius server.

HTH

Herbert

Tags: Cisco Security

Similar Questions

  • Cisco 1812 no contact to the Radius Server

    Hi guys,.

    IM pretty new to cisco and plays with an 1812 products... I am trying set up an easy VPN server, with the support of ray and I can see that I did everything right, but there is a problem, because the router do not contact the RADIUS server and the RADIUS server has been tested ok.

    Anyone who can see what I'm missing? Worked with this problem for 3 days now.

    Here is my CONF.

    Current configuration: 9170 bytes

    !

    ! Last modification of the configuration to 13:44:49 UTC Tuesday, October 12, 2010

    !

    version 15.1

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    no password encryption service

    !

    router host name

    !

    boot-start-marker

    boot-end-marker

    !

    !

    no set record in buffered memory

    !

    AAA new-model

    !

    !

    AAA server radius sdm-vpn-server-group 1 group

    auth-port 1645 90.0.0.245 Server acct-port 1646

    !

    AAA authentication login default local

    AAA authentication login sdm_vpn_xauth_ml_1-passwd-expiry group sdm-vpn-server-group 1

    AAA authorization exec default local

    AAA authorization sdm_vpn_group_ml_1 LAN

    !

    !

    !

    !

    !

    AAA - the id of the joint session

    !

    Crypto pki token removal timeout default 0

    !

    Crypto pki trustpoint TP-self-signed-250973313

    enrollment selfsigned

    name of the object cn = IOS - Self - signed - certificate - 250973313

    revocation checking no

    !

    !

    TP-self-signed-250973313 crypto pki certificate chain

    certificate self-signed 01

    308201A 5 A0030201 02020101 3082023C 300 D 0609 2A 864886 F70D0101 04050030

    2 040355 04031325 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 30312E30

    69666963 32353039 37333331 33301E17 313031 30313230 39343333 0D 6174652D

    395A170D 2E302C06 1325494F 03540403 32303031 30313030 30303030 5A 303031

    532D 5365 6C662D53 69676E65 4365 72746966 69636174 652 3235 30393733 642D

    06092A 86 4886F70D 01010105 33313330 819F300D 00308189 02818100 0003818D

    BCF94FB0 77240E92 B703CE70 556D5D22 A57823E5 DD4CD4C4 12D639DE 5E97DB2D

    81FBB304 9FA677A6 CAD84F96 9734081B F8F8FAAE 000B02FB AEF7C7B1 73AFA44B

    7D27E112 8991F03B 3D4FD484 34E2EA9F BD426F73 48778F2A AD35AAD6 EC00805D

    249B 8702 D545AEEA 40670DFD 3E6BEC29 EE48A0C6 CB7694FD 722D1A62 3A499CC5

    02030100 01A 36630 03551 D 13 64300F06 0101FF04 05300301 01FF3011 0603551D

    11040A 30 08820652 6F757465 72301F06 23 04183016 801462CB F6BD12F6 03551D

    080C8A89 F9FBBDCE 9751528A FFFD301D 0603551D 0E041604 1462CBF6 BD12F608

    0C8A89F9 FBBDCE97 51528AFF FD300D06 092 HAS 8648 01040500 03818100 86F70D01

    ACA87977 CF 55225 6 9147E57E 8B5A8CA8 46348CAF 801D11C6 9DA57C69 14FA5076

    6844F0CC 4CBEB541 136A483A 69F7B7F0 E44474E8 14DC2E80 CC04F840 B 3531, 884

    F08A492D 8C3902C0 725EE93D AC83A29F 799AAE0F 5795484B B3D02F84 911DB135

    5 189766 C30DA111 6B9B4E46 E999DA5B 202 21B0B9D4 HAS 6900 07A93D8D 41C7FD21

    quit smoking

    dot11 syslog

    IP source-route

    !

    !

    !

    !

    !

    IP cef

    No ipv6 cef

    !

    Authenticated MultiLink bundle-name Panel

    !

    !

    !

    license udi pid CISCO1812/K9 sn FCZ10232108

    username admin privilege 15 secret 5 P677 $1$ $ Rggfdgt8MeD8letZDL08d.

    !

    !

    !

    type of class-card inspect correspondence sdm-nat-smtp-1

    game group-access 101

    smtp Protocol game

    type of class-card inspect entire game SDM_AH

    match the name of group-access SDM_AH

    type of class-card inspect all sdm-cls-insp-traffic game

    match Protocol cuseeme

    dns protocol game

    ftp protocol game

    h323 Protocol game

    https protocol game

    match icmp Protocol

    match the imap Protocol

    pop3 Protocol game

    netshow Protocol game

    Protocol shell game

    match Protocol realmedia

    match rtsp Protocol

    smtp Protocol game

    sql-net Protocol game

    streamworks Protocol game

    tftp Protocol game

    vdolive Protocol game

    tcp protocol match

    udp Protocol game

    inspect the class-map match sdm-insp-traffic type

    corresponds to the class-map sdm-cls-insp-traffic

    type of class-card inspect all SDM-voice-enabled game

    h323 Protocol game

    Skinny Protocol game

    sip protocol game

    type of class-card inspect entire game SDM_IP

    match the name of group-access SDM_IP

    type of class-card inspect entire game SDM_ESP

    match the name of group-access SDM_ESP

    type of class-card inspect entire game SDM_EASY_VPN_SERVER_TRAFFIC

    match Protocol isakmp

    match Protocol ipsec-msft

    corresponds to the SDM_AH class-map

    corresponds to the SDM_ESP class-map

    type of class-card inspect the correspondence SDM_EASY_VPN_SERVER_PT

    corresponds to the SDM_EASY_VPN_SERVER_TRAFFIC class-map

    type of class-card inspect all match sdm-cls-icmp-access

    match icmp Protocol

    tcp protocol match

    udp Protocol game

    type of class-card inspect correspondence sdm-invalid-src

    game group-access 100

    type of class-card inspect correspondence sdm-icmp-access

    corresponds to the class-map sdm-cls-icmp-access

    type of class-card inspect correspondence sdm-Protocol-http

    http protocol game

    !

    !

    type of policy-card inspect sdm-permits-icmpreply

    class type inspect sdm-icmp-access

    inspect

    class class by default

    Pass

    type of policy-card inspect sdm-pol-NATOutsideToInside-1

    class type inspect sdm-nat-smtp-1

    inspect

    class class by default

    drop

    type of policy-map inspect sdm - inspect

    class type inspect sdm-invalid-src

    Drop newspaper

    class type inspect sdm-insp-traffic

    inspect

    class type inspect sdm-Protocol-http

    inspect

    class type inspect SDM-voice-enabled

    inspect

    class class by default

    Pass

    type of policy-card inspect sdm-enabled

    class type inspect SDM_EASY_VPN_SERVER_PT

    Pass

    class class by default

    drop

    type of policy-card inspect sdm-license-ip

    class type inspect SDM_IP

    Pass

    class class by default

    Drop newspaper

    !

    security of the area outside the area

    safety zone-to-zone

    ezvpn-safe area of zone

    safety zone-pair sdm-zp-self-out source destination outside zone auto

    type of service-strategy inspect sdm-permits-icmpreply

    source of sdm-zp-out-auto security area outside zone destination auto pair

    type of service-strategy inspect sdm-enabled

    safety zone-pair sdm-zp-in-out source in the area of destination outside the area

    type of service-strategy inspect sdm - inspect

    sdm-zp-NATOutsideToInside-1 zone-pair security source outside the area of destination in the area

    type of service-strategy inspect sdm-pol-NATOutsideToInside-1

    in the destination box source sdm-zp-in-ezvpn1 ezvpn-pairs area security

    type of service-strategy inspect sdm-license-ip

    source of sdm-zp-out-ezpn1 of security area outside zone ezvpn-zone time pair of destination

    type of service-strategy inspect sdm-license-ip

    safety zone-pair sdm-zp-ezvpn-out1-source ezvpn-zone of destination outside the area

    type of service-strategy inspect sdm-license-ip

    safety zone-pair source sdm-zp-ezvpn-in1 ezvpn-area destination in the area

    type of service-strategy inspect sdm-license-ip

    !

    !

    crypto ISAKMP policy 1

    BA 3des

    preshared authentication

    Group 2

    !

    Configuration group Sindby crypto isakmp client

    key TheSommerOf03

    90.0.0.240 DNS 8.8.8.8

    win 90.0.0.240

    SBYNET field

    pool SDM_POOL_2

    Max-users 15

    netmask 255.255.255.0

    ISAKMP crypto sdm-ike-profile-1 profile

    identity Sindby group match

    client authentication list sdm_vpn_xauth_ml_1

    ISAKMP authorization list sdm_vpn_group_ml_1

    client configuration address respond

    virtual-model 1

    !

    !

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    Crypto ipsec transform-set ESP-3DES-SHA1 esp-3des esp-sha-hmac

    Crypto ipsec transform-set esp-SHA2-ESP-3DES-3des esp-sha-hmac

    Crypto ipsec transform-set esp-3des SHA3-ESP-3DES esp-sha-hmac

    Crypto ipsec transform-set esp-3des SHA4-ESP-3DES esp-sha-hmac

    Crypto ipsec transform-set esp-3des SHA5-ESP-3DES esp-sha-hmac

    Crypto ipsec transform-set esp-3des SHA6-ESP-3DES esp-sha-hmac

    Crypto ipsec transform-set esp-3des SHA7-ESP-3DES esp-sha-hmac

    Crypto ipsec transform-set esp-3des SHA8-ESP-3DES esp-sha-hmac

    Crypto ipsec transform-set esp-3des SHA9-ESP-3DES esp-sha-hmac

    Crypto ipsec transform-set esp-3des SHA10-ESP-3DES esp-sha-hmac

    !

    Profile of crypto ipsec SDM_Profile1

    game of transformation-ESP-3DES-SHA10

    isakmp-profile sdm-ike-profile-1 game

    !

    !

    !

    !

    !

    !

    interface BRI0

    no ip address

    encapsulation hdlc

    Shutdown

    !

    interface FastEthernet0

    Description $FW_OUTSIDE$

    IP address 93.166.xxx.xxx 255.255.255.248

    NAT outside IP

    IP virtual-reassembly in

    outside the area of security of Member's area

    automatic duplex

    automatic speed

    !

    interface FastEthernet1

    no ip address

    Shutdown

    automatic duplex

    automatic speed

    !

    interface FastEthernet2

    !

    interface FastEthernet3

    !

    interface FastEthernet4

    !

    interface FastEthernet5

    !

    FastEthernet6 interface

    !

    interface FastEthernet7

    !

    interface FastEthernet8

    !

    interface FastEthernet9

    !

    type of interface virtual-Template1 tunnel

    IP unnumbered FastEthernet0

    ezvpn-safe area of Member's area

    ipv4 ipsec tunnel mode

    Tunnel SDM_Profile1 ipsec protection profile

    !

    interface Vlan1

    Description $FW_INSIDE$

    IP 90.0.0.190 255.255.255.0

    IP nat inside

    IP virtual-reassembly in

    Security members in the box area

    !

    local IP SDM_POOL_1 90.0.0.25 pool 90.0.0.29

    local IP SDM_POOL_2 90.0.0.75 pool 90.0.0.90

    IP forward-Protocol ND

    IP http server

    local IP http authentication

    IP http secure server

    IP http timeout policy inactive 600 life 86400 request 10000

    !

    !

    IP nat inside source static tcp 192.168.1.200 25 interface FastEthernet0 25

    the IP nat inside source 1 interface FastEthernet0 overload list

    IP route 0.0.0.0 0.0.0.0 93.166.xxx.xxx

    !

    SDM_AH extended IP access list

    Remark SDM_ACL = 1 category

    allow a whole ahp

    SDM_ESP extended IP access list

    Remark SDM_ACL = 1 category

    allow an esp

    SDM_IP extended IP access list

    Remark SDM_ACL = 1 category

    allow an ip

    !

    exploitation forest esm config

    access-list 1 permit 90.0.0.0 0.0.0.255

    Access-list 100 = 128 SDM_ACL category note

    access-list 100 permit ip 255.255.255.255 host everything

    access-list 100 permit ip 127.0.0.0 0.255.255.255 everything

    access-list 100 permit ip 93.166.xxx.xxx 0.0.0.7 everything

    Remark SDM_ACL category of access list 101 = 0

    IP access-list 101 permit any host 192.168.1.200

    !

    !

    !

    !

    !

    !

    RADIUS-server host 90.0.0.245 auth-port 1645 acct-port 1646

    !

    control plan

    !

    !

    Line con 0

    line to 0

    line vty 0 4

    transport input telnet ssh

    !

    end

    Hello

    Looks like you're missing the key from the radius server configuration "RADIUS-server host 90.0.0.245 auth-port 1645 1646 key your_keyacct-port»

    Thank you

    Wen

  • Active/passive HA comments with shared vmdk

    I have 2 ESXi host with a vmfs on iSCSI SAN.

    I want to install 2 identical VM on each host suite HR cluster in active/passive mode.

    I intend to set up the two VM with a disc 'private' for the base OS/APP installation and a 'common' one disk for data

    managed by the services that are configured in active/passive mode (for example, MySQL, OpenLDAP).

    The goal is that when the master virtual machine fails (because of true judgment of breach or ESXi host simpleVM), the slave VM built the commune

    VMDK and starts the cluster services.

    I've read a few articles on the possibility of sharing a vmdk disk so the solution seems possible.

    Is there someone who has used such a configuration?

    TIA,

    Guido

    An alternative is to create a network of VM for iSCSI (depending on your SAN topology, you must also 2 storage networks).

    Then, you can add this network to the virtual computer, install the initiator software and set it up as a physical machine.

    André

    * If you found this device or any other answer useful please consider awarding points for correct or helpful answers

  • Cisco Catalyst 2960-S switch configured for 802. 1 x sends a query to access the Radius Server Radius

    Setup

    Cisco Catalyst 2960-S running 15.0.2 - SE8

    Under Centos freeRadius 6.4 RADIUS server

    Client (supplicant) running Windows 7

    When Windows client is connected to the port (port 12 in my setup) with authentication of 802. 1 x active switch, show of Wireshark that catalyst sends ask EAP and the client responds with EAP response. But it made not the request to the Radius server. The RADIUS test utility 'aaa RADIUS testuser password new-code test group' works.
    Here is my config running. Any advice would be greatly appreciated.
    #show running mySwitch-
    mySwitch #show running-config
    Building configuration...

    Current configuration: 2094 bytes
    !
    version 12.2
    no service button
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    hostname myswitch
    !
    boot-start-marker
    boot-end-marker
    !
    activate the password secret 5 $1$ Z1z6$ kqvVYRQdVRZ0h8aDTV5DR0 enable password!
    !
    !
    AAA new-model
    !
    !
    AAA dot1x group group radius aaa accounting dot1x default start-stop radius authentication group!
    !
    !
    AAA - the id of the joint session
    1 supply ws-c2960s-24ts-l switch
    !
    !
    !
    !
    !
    control-dot1x system-auth
    pvst spanning-tree mode
    spanning tree extend id-system
    !
    !
    !
    !
    internal allocation policy of VLAN no ascendant interface FastEthernet0 no stop ip address!
    GigabitEthernet1/0/1 interface
    !
    interface GigabitEthernet1/0/2
    !
    interface GigabitEthernet1/0/3
    !
    interface GigabitEthernet1/0/4
    !
    interface GigabitEthernet1/0/5
    !
    interface GigabitEthernet1/0/6
    !
    interface GigabitEthernet1/0/7
    !
    interface GigabitEthernet1/0/8
    !
    interface GigabitEthernet1/0/9
    !
    interface GigabitEthernet1/0/10
    !
    interface GigabitEthernet1/0/11
    !
    interface GigabitEthernet1/0/12
    switchport mode access
    Auto control of the port of authentication
    dot1x EAP authenticator
    !
    interface GigabitEthernet1/0/13
    !
    interface GigabitEthernet1/0/14
    !
    interface GigabitEthernet1/0/15
    !
    interface GigabitEthernet1/0/16
    !
    interface GigabitEthernet1/0/17
    !
    interface GigabitEthernet1/0/18
    !
    interface GigabitEthernet1/0/19
    !
    interface GigabitEthernet1/0/20
    !
    interface GigabitEthernet1/0/21
    !
    interface GigabitEthernet1/0/22
    !
    interface GigabitEthernet1/0/23
    !
    interface GigabitEthernet1/0/24
    !
    interface GigabitEthernet1/0/25
    !
    interface GigabitEthernet1/0/26
    !
    interface GigabitEthernet1/0/27
    !
    interface GigabitEthernet1/0/28
    !
    interface Vlan1
    IP 10.1.2.12 255.255.255.0
    !
    IP http server
    IP http secure server
    activate the IP sla response alerts
    recording of debug trap
    10.1.2.1 host connection tcp port 514 RADIUS-server host 10.1.2.1 transport auth-port 1812 acct-port 1646 timeout 3 retransmit testing123 key 3.
    Line con 0
    line vty 0 4
    password password
    line vty 5 15
    password password
    !
    end

    interface GigabitEthernet1/0/16
    !
    interface GigabitEthernet1/0/17
    !
    interface GigabitEthernet1/0/18
    !
    interface GigabitEthernet1/0/19
    !
    interface GigabitEthernet1/0/20

    Have you run wireshark on the server because the request to switch? If so you make sure that there is a response from the server? For Windows network POLICY Server (I've never tried Centos), you must ensure that the request is related to a policy which then authenticates, or denies access. Usually, it is a matter of such attributes and the seller.

    Regarding the configuration, it seems a bit out of the AAA. Try to remove the:

    line "aaa dot1x group service radius authentication" and this by using instead:

    "aaa dot1x default radius authentication group". After the dot1x word you are supposed to provide a list of the authentication or the default Word if you do not want to use a list.

  • WAAS for RADIUS and Windows Server 2012 NPS server configuration

    I have trouble getting our WAAS to authenticate devices and connection via RADIUS.  Running NPS on Windows Server 2012.  Confirmed that my device WAAS can ping the IP address of the RADIUS server.  Using the attribute Type of administrative service under network policies.  Look in the event viewer, I get an error with event ID 15, "a malformed RADIUS message has been received of the xxxx-WAAS-01 customer. The data is the RADIUS message. »

    Right now, I can connect with only the local default user and password name.  Here are a few config for WAAS, running version 6.2.1:

    RADIUS server key *.
    Server RADIUS auth-host 10.194.10.13 port 1645
    !
    connection of local authentication enable secondary
    enable login authentication RADIUS primary
    local authentication configuration enable secondary
    Service radius Authentication configuration Select primary
    failover of authentication server unavailable

    I confirmed that my shared key is entered correctly on the WAAS and the NPS.  I have the switches/routers Cisco works well on the same RADIUS server.

    Someone had a bit of luck plug their WAAS to RADIUS devices using Windows Server 2012 and NPS?  If so, please share additional measures you have taken to get things to work.

    Hi Paul,.

    Based on the RADIUS error you probably experience failure CSCva14731. This was discovered with Cisco ACS, but can affect other RADIUS servers.

    To confirm, you can check the corresponding error in syslog WAAS:

    authenticate: % WAAS-UNKNOWN-3-899999: pam_radius_auth: talk_radius: RADIUS server did not respond (timeout 5 (sec))

    Also, this defect would not affect peripheral on software 5.x WAAS.

    The problem will be solved in 6.2.3 to come free.

  • Autonomous AP521 can be configured for authentication WPA/TKIP with no radius server?

    The AP521 can be configured for authentication WPA/TKIP with no radius server?

    the datasheet, wpa with tkip and wpa2 with aes are supported.

    you want to use (no RADIUS) wpa - psk with tkip. WPA2-psk aes and tkip not use.

  • How 2 Configure ACS 4.2 to delegate authentication to the radius server

    Hello

    We need run the following scenario:

    Cisco VPN client (or any connect, Cisco SSL VPN client)---> Cisco ASA 5520---> Cisco ACS 4.2---> CAT Authentication Server

    The CAT authentication server is a Radius server. It can receive Radius authentication requests and respond. It is used for strong authentication TFA WBS similar to RSA OTP tokens.

    The question is: how we set up the 4.2 ACS to delegate authentication request to another Radius server.

    Thnx

    Add the RSA server as an external database, configure the drop user profile or a group to authenticate on the new external database rather than ACS DB Local (or Windows DB).

    Easy as pie!

    Please rate if this is useful.

  • Is it possible to map a promoter group in Cisco ISE to a group of users in Active Directory, using a RADIUS server?

    Hello!!

    We are working on a mapping between a promoter Cisco ISE group and a user group in Active Directory, but the customer wants the mapping through a RADIUS SERVER, to avoid the ISE by querying directly activate Directory.

    I know it is possible to use a RADIUS SERVER as source of external identity for ISE... but, is possible to use this RADIUS SERVER for this sponsor group manages?

    Thank you and best regards!

    Hi Rodrigo,

    The answer is no. There is no way to integrate the portal Sponsor config with a RADIUS server. Your DB for authentication Portal Sponsor options;

    AD
    LDAP
    User internal ISE DB

    Sent by Cisco Support technique iPhone App

  • privilege level of the AAA RADIUS server control

    I had the radius authentication on my switch, but I'm trying to allow two types of connection of users using Windows Active Directory. NetworkUsers that can display the configuration and NetworkAdmins who can do what either. I would like to NetworkAdmins when they log on, go directly to the privilege level 15 but could not get that part to work. Here is my configuration:

    Domain controller for Windows 2008 R2 with NPS installed.

    RADIUS client: I have the IP address of the switch as well as the key. I selected under the name of the Vendor tab in advance of cisco

    Network policies:

    NetworkAdmins which has the Group networkadmin in conditions and under settings I have nothing the standard and for the individual seller I have:

    Cisco Cisco-AV-pair shell: priv-lvl = 15

    My config switch:

    AAA new-model
    !
    !
    RADIUS AAA server group MTFAAA
    Server name dc-01
    Server name dc-02
    !
    Group AAA authentication login NetworkAdmins local MTFAAA
    Group AAA authorization exec NetworkAdmins local MTFAAA

    dc-01 RADIUS server
    address ipv4 10.0.1.10 auth-1645 acct-port of 1646
    7 button *.
    !
    dc-02 RADIUS server
    ipv4 10.0.1.11 address auth-1645 acct-port of 1646
    7 button *.
    !

    No matter what I do, it is not the default privilege level 15 when I login. All thoughts

    You have specified the permission under line vty group? I think it is the authorization exec command. Something like that.

  • What is active/active and active/passive

    Hi all

    What is the difference between active/active and active/passive in the configuration of the DR?

    What are the advantages and disadvantages?

    Please suggest entries to learn more. Provide also available documents.

    Thanks in advance.

    Kind regards

    Krish

    Probably, you want to know the benefits of active dataguard and dataguard 'normal '.

    With active dataguard relief database can be opened read-only, and updates are applied to the primary real-time.

    With normal dataguard the standby database is installed and update are applied but if you open the database in read-only mode, no updates will be applied.  You must put the database in managed for updates to apply recovery mode.

    Clearly, the advantage is that you can use the database Eve with active dataguard for various purposes such as reporting in real time.

    However, active dataguard is an option under license and do not pay for it.

    http://www.Oracle.com/technetwork/database/Enterprise-Edition/Overview/Active-Data-Guard-11g-datasheet-1-134534.PDF

  • Active-passive HA topology

    Hi all

    I found this doc 10g for topology active-passive configuration.
    Environments, active and Passive, also known as the cold Failover Cluster (CFC) environments. http://docs.Oracle.com/CD/B16240_01/doc/install.102/e10953/actpass_env.htm
    http://docs.Oracle.com/CD/B31019_01/install.1013/install/ha.htm#BABEAAAD
    is still available in 11 g? or phased out?

    He mentions by name 2 types of configuration:

    1 figure 6-3 active-passive topology with Oracle HTTP Server and OC4J under the same roof of Oracle
    2 figure 6-4 active-passive topology with Oracle HTTP Server and OC4J Separate Oracle home

    Who, if the two types is easier to install and more reliable?

    Note also the computer use "vendor clusterware", I can use "Oracle clusterware" instead?

    Thank you very much

    zxy

    If your situation is unique, realistically, this means that you will have to do a lot of work on the ground. You have to read the documentation. You're going to have to understand all the options available, not just look at the "quick start" guide You have to develop the scripts you need for your specific environment.

    Honestly, I'm miles to figure out exactly what you're trying to build. I see that you seem to try to combine a Frankenstein monster using a variety of different technologies, but the high-level architecture escapes me. Now, there may be good reasons for this. You tell us to accept this fact, so I did. But once you decide we have to accept that you do something quite unique with an architecture that nobody has ever tried it before, you must agree that you should give up the desire to rely on quick start guides and people you will find in the forums to help out you. You build something quite unique. You need scripts, totally unique. You need to read a ton of documentation to know how to get all the disparate elements together. You will need to experiment.

    Think of it as buying a car. If you want to buy a standard vehicle type, others can help you choose some standard templates to use. If you want to carry things, people can help you choose a suitable truck. If you have a bunch of kids, people can help you to choose a proper van. If you choose a standard architecture, we can probably help you to implement.

    If, however, you decide that you want to build a vehicle fully custom from the ground because you decide that your needs are sufficiently unique to justify this, then you will have to solve problems much more. If you want to try to combine the engine of a Ford pickup with the exhaust of a Toyota sedan and add a block custom and make cooking oil engine, you will encounter a number of problems that no one else has met him. This means that you will have to do a lot of steps to work through these problems. Similarly, if you need a unique hybrid technology, we cannot reasonably is toward literature and wish you good luck because you will have to do a lot of reading and experimenting to get something like this to work.

    It seems that you hope you can build something unique without doing more work than if you were going to build something completely standard. You agree that this is not possible. If you want to implement something quite unique, you have to make yourself an expert in the inner workings of a bunch of different technologies.

    Justin

  • I'm having a holiday in Nha Trang, Viet Nam and my stolen obtained iphone6 10:00-22:30 last night, I activated lost mode which is still pending and said the local police. What should I do?

    I'm having a holiday in Nha Trang, Viet Nam and my iphone6 who was in my bag got stolen 10:00-22:30 last night while returning to the hotel, I activated lost mode which is still pending and said the local police. find my iPhone is in offline mode. What should I do? I read online that if I erase all my data can find that my iphone will be more capable. I also read online that the stolen iphone can be replaced? What should I do? I can't fnd an e-mail to contact apple Australia I did purchase in Sydney Australia.

    Please help me.

    There is nothing for you to do.

    What to do if your iDevice is lost or stolen

    iPhone, iPod Touch and iPad

    If enable you find my phone before it was lost or stolen, you can follow only if it is connected to the Internet by Wi - Fi or cellular. What you can't do, is follow your device using a serial number or other identification number. You can't wait for Apple or anyone else to find your device for you. You can't recover your loss unless you make your device for the loss. It is not covered by your warranty.

    If your iPhone, iPod, iPod Touch, or iPad is lost or stolen, what do you do? There are things you should have done in advance - until you have lost it or it has been stolen - and things to do after the fact. Here are a few suggestions:

    This link, Re: help! I misplaced / lost my iPhone 5 today morning at delta Chelsea hotel downtown one I am not able to follow. Please help!, has some good advice about your options when your iDevice is lost or stolen.

    1. declaration of a lost or stolen Apple product

    2 find my lost iPod Touch

    3. AT & t. Sprint and Verizon can block phones stolen/tablets

    4. What-To-Do-When-Iphone-Is-Stolen

    5. use ICloud Mode lost

    6. what to do if your iOS device is lost or stolen

    7 6 ways to track and recover your lost/stolen iPhone

    8. find my iPhone

    9 report Stolen iPad | Stolen lost found online

    It pays to be proactive in following the advice on the use of find my phone before you lose your device:

    1. find my iPhone

    2 set up your iDevice oniCloud

    3. OS X Lion/Mountain Lion - in regard to my Mac

    4 the free configuration find your iPhone (even on unsupporteddevices)

  • Dell Powerconnect 35xx series features Radius Server behaviorfin

    Hello Dell Community,

    I'm not able to find out how 35xx series switches handle 'server radius deadtime' parameter as described below:

    In the config of switch, I use two hosts(for redundancy) radius. The first has priority of '1' configured RADIUS, the second server is priority '2 '. So normally, if the first sever(priority 1) RADIUS online, auth requests switch are sent to this server all the time. And they really are.

    Now, I have also configured the 'deadtimet 10 radius server', meaning to jump on the radius server does not respond. Does that mean exactly?

    If the radius with priority 1 server is offline for a few seconds, the switch instantly consider this as dead radius server and sent no auth request it for the "period deadtime ' 10 minutes (depending on configuration)? How often switch check for the availability of the radius server host?

    config swtich:

    IP address Port port Prio time - Ret-dead-source IP. Its use
    AUTH Acct Out rans times
    --------------- ----- ----- ------ ------ ------ --------------- ----- -----
    10.10.10.10 1812 1813 global Global Global Global 1 all the
    10.10.10.20 1812 1813 global Global Global Global every 2

    Global values
    --------------

    Waiting period: 2
    Broadcast: 5
    Deadtime: 10
    Source IP: 0.0.0.0
    Source IPv6:

    Retransmission will say the switch many times in an attempt to authenticate to the RADIUS server before moving on to the second server. Timeout is indicative of the switch, the waiting time for a response. Deadtime will subsequently intervene in these two parameters have been exhausted.

    Example config:

    Server radius coverage of console (config) # 3

    Console (config) # timeout 3 radius server

    Deadtimet console (config) # 10 radius server

    Result of config:

    -The client tries to connect.

    -switch attempts to authenticate the server 1.

    -Switch means no RADIUS server 1 for 3 second.

    -Switch waits 3 seconds.

    -Switch attempts to authenticate to the RADIUS server 1 for the second time and does not return to server for 3 seconds.

    -Switch waits 3 seconds.

    -Switch attempts to authenticate to the RADIUS server 1 for the third time and does not return to server for 3 seconds.

    -switch place RADIUS server, one in a State of low/dead for 10 minutes.

    -switch attempts to authenticate to Server 2.

  • Activate connections encrypted for the database engine (SQL Server Configuration Manager)

    Hi team,

    I have a quick question, on the protocols for properties of SQL. Option:

    SQL Server Configuration Manager > SQL Server Network Configuration > Protocol for SQL_xxx (right click) > properties, we can see two tabs:

    Tab 1: flags

    Tab 2: certificate

    If I put the value of Instance of hide = Yes, 'Force Enctyption', the fact must be set to YES as well?

    Or Enctyption of the Force must be activated in order to hide the instance?

    What is recommend settings?

    I can see there are good article, but would appreciate if a response.

    https://msdn.Microsoft.com/en-us/library/ms191192.aspx

    Thank you

    + Moin

    This issue is beyond the scope of this site (for consumers) and to be sure, you get the best (and fastest) reply, we have to ask either on Technet (for IT Pro) or MSDN (for developers)
    *
  • RADIUS Server - Windows server 2008

    Hello world

    We use the windows 2008 standard server to our domain controller. We have been in for the last two years radius server in our campus. I could see that we can configure the client only 50 radius in NPS. Is it possible to add a plus in windows 2008 standard?

    Please help me

    Teckzx

    This issue is beyond the scope of this site and must be placed on Technet or MSDN

    http://social.msdn.Microsoft.com/forums/en-us/home

Maybe you are looking for

  • Don't display two pages does not correctly in the iOS 10

    I've upgraded my iPad to iOS 10 2 Air tonight, then went to continue reading a book that I bought recently through iBooks.  Display two pages, when the iPad is in landscape mode, does not appear now - unless I do the police really small.  If I increa

  • Bluetooth connection-question

    Hello everyone I was wondering what it is and the time I need to download * PC Bluetooth Stack Fix Patch 1 *. * for Bluetooth stack versions OS windows vista *. * 5.00.00 - 5.10.22 *. * 6.00.00 - 6.10.09 *. I don't know if there is a problem, but I p

  • Audio stuck on Digital Out when Windows starts

    I just finished to install 10 Windows on my Macbook Pro retina mid-2015, and whenever I start Windows, audio is stuck on the digital output. I tried to remove Realtek and reinstall it, but no go.

  • Half-life games on win7 x 64 as 16-bit games

    Set launch options - 16bpp for 16-bit in win7 64 games. But games like 32-bit still works (from the Task Manager) How can I make a request on really running as 16-bit on x 64 machine?

  • Problem connecting l2l on ASA 5510

    I have setup VPN connections 2. a concentrator 3000 seller and the second to a branch. The branch connects with a L2L type, however the connection of my suppliers is a type of 'user '. I have to rebuild the connection and the same thing happens. piec