L2l VPN tunnel is reset during the generate a new IPSec key

I have a tunnel VPN L2L that resets completely, start with Phase 1, at the expiration of the timer of the IPSec Security Association.  Although there are several SAs, it always resets all of the tunnel.

I see the following in the log errors when this happens:

03/06/2013 12:54:41 Local7.Notice ipRemoved June 3, 2013 12:54:41 LKM-NVP-L2L-01: % 713050-5-ASA: Group = ipRemoved, IP = ipRemoved, completed for the ipRemoved peer connection.  Reason: Peer terminate Proxy remote n/a, Proxy Local n/a

03/06/2013 12:54:41 Local7.Notice ipRemoved June 3, 2013 12:54:41 LKM-NVP-L2L-01: % 713259-5-ASA: Group = ipRemoved, IP = ipRemoved, Session is be demolished. Reason: The user has requested

03/06/2013 12:54:41 Local7.Warning ipRemoved June 3, 2013 12:54:41 LKM-NVP-L2L-01: % ASA-4-113019: Group = ipRemoved username = ipRemoved, IP = ipRemoved, disconnected Session. Session type: IKE, duration: 4 h: 00 m: 06 s, xmt bytes: 260129, RRs bytes: 223018, reason: the user has requested

03/06/2013 12:55:33 Local7.Notice ipRemoved June 3, 2013 12:55:33 LKM-NVP-L2L-01: % 713041-5-ASA: IP = ipRemoved, IKE initiator: New Phase 1, Intf inside, IKE Peer ipRemoved local Proxy 204.139.127.24 address, address remote Proxy 156.30.21.200, Card Crypto (L2LVPN)

03/06/2013 12:55:33 Local7.Notice ipRemoved June 3, 2013 12:55:33 LKM-NVP-L2L-01: % 713119-5-ASA: Group = ipRemoved, IP = ipRemoved, PHASE 1 COMPLETED

Local7.Notice ipRemoved June 3, 2013 03/06/2013-12:55:33 12:55:33 LKM-NVP-L2L-01: % 713049-5-ASA: Group = ipRemoved, IP = ipRemoved, the security negotiation is complete for LAN - to - LAN Group (ipRemoved) initiator, Inbound SPI = 0x9213bdc9, outbound SPI = 0x1799a099

03/06/2013 12:55:33 Local7.Notice ipRemoved June 3, 2013 12:55:33 LKM-NVP-L2L-01: % 713120-5-ASA: Group = ipRemoved, IP = ipRemoved, PHASE 2 COMPLETED (msgid = b8a47603)

03/06/2013 13:02:11 Local7.Notice ipRemoved June 3, 2013 13:02:11 LKM-NVP-L2L-01: % 713041-5-ASA: Group = ipRemoved, IP = ipRemoved, IKE initiator: New Phase 2, Intf inside, IKE Peer ipRemoved local Proxy 204.139.127.71 address, address remote Proxy 156.30.21.200, Card Crypto (L2LVPN)

Local7.Notice ipRemoved June 3, 2013 03/06/2013-13:02:11 13:02:11 LKM-NVP-L2L-01: % 713049-5-ASA: Group = ipRemoved, IP = ipRemoved, the security negotiation is complete for LAN - to - LAN Group (ipRemoved) initiator, Inbound SPI = 0x93f9be6c, outbound SPI = 0x1799a16d

03/06/2013 13:02:11 Local7.Notice ipRemoved June 3, 2013 13:02:11 LKM-NVP-L2L-01: % 713120-5-ASA: Group = ipRemoved, IP = ipRemoved, PHASE 2 COMPLETED (msgid = 1f6c9acd)

Any thoughts on why she would do that?

Thank you.

Jason

Hello

Both the log messages seems to suggest that the remote end is closed/compensation connection.

Is this a new connection that suffer from this problem or has it started on an existing connection?

The Cisco documentation associated with the Syslog messages does really not all useful information about these log messages.

I guess that your problem is that TCP by L2L VPN connections suffer from the complete renegotiations of the L2L VPN.

I wonder if the following configuration can help even if this situation persists

Sysopt preserve-vpn-flow of connection

Here is a link to the order of the ASA reference (8, 4-8, 6 software) with a better explanation of this configuration.

http://www.Cisco.com/en/us/docs/security/ASA/asa84/command/reference/S8.html#wp1538395

It is not enabled by default on the SAA.

Hope this helps

-Jouni

Tags: Cisco Security

Similar Questions

  • How to make windows require a password during the installation of new programs?

    How to make windows require a password during the installation of new programs?

    Hello

    You will not be able to circumvent the password that appears before the execution of actions (installing a new program) in a non administrator account.  If you are logged on as administrator, and again, you get the command prompt, you can disable UAC (User Account Control) to stop the password dialog window.

    However, as a work around you can right-click on the installation of the program files and select run as administrator. Check if this is useful.

    Let me know if I can help you with this question or any problem related to Windows.

  • How can I generate a new recovery key

    How to generate a new recovery key having lost it

    For Apple ID, you mean?

    Go to the Apple ID page, click on manage your Apple ID, login, if you have not already. Now, you can click the password and the Security item in the left navigation bar and click on replace lost keys. Follow the steps here, and your old made no valid recovery key, and a new creation.

  • Windows could not start the IKE and Authip IPsec keying service modules on the local computer. Error 1075 the dependency service does not exist or has been marked for deletion.

    Hi, I'm trying start the IKE and AUTHOP service from the SERVICES screen but I get this error:

    Windows could not start the IKE and Authip IPsec keying service modules on the local computer.  Error 1075 the dependency service does not exist or has been marked for deletion.

    original title: ike and authip error 1075 the dependency service does not exist or has been marked for deletion

    Hello

    Remember to make changes to the computer before the show?

    You can follow the below methods:

    Method 1: Restart Windows and try to start the Security Center service.

    If you still receive the same error, make sure that the WMI service is launched and running:

    (a) click Start, run , and then type Services.msc

    (b) double-click Windows Management Instrumentation

    (c) set its startup type to Automatic

    (d) click Start to start the service, and then click OK

    (e) restart Windows.

    Method 2: Restart the service

    Windows logs an error if the service IKE and AuthIP IPsec Keying Modules or the driver does not start, or suddenly, they end.

    To restart the IKE and AuthIP IPsec Keying Modules service:

    To perform this procedure, you must have membership in the local Administrators group, or must you have been delegated the appropriate authority.

    (a) restart the service. You can do this from a command prompt or in the snap-snap-in Services Microsoft Management Console (MMC). Do one of the following:

    ·         Start an administrative command prompt. Click Start, click principally made programs, Accessories, right-click guest, and then click run as administrator. At the command prompt, run the command net start ikeext.

    ·         Click Start, type services.msc in the Search box and press ENTER. In the column name of the Services snap-in, right-click on IKE and AuthIP IPsec Keying Modulesand then click Start.

    (b) if the attempt to restart the service fails, restart the computer. This forces all related and dependent services to restart.

    (c) if the error persists after restarting the computer, then the executable files for the driver or service may be damaged, and the operating system must be reinstalled.

    Note:

    You can check that the IKE and AuthIP IPsec Keying Modules (IKEEXT) service runs by using the Component Services Microsoft Management Console (MMC) or the net start command line tool.

    You can check the link: http://technet.microsoft.com/en-us/library/cc733299 (WS.10) .aspx

    Method 3: Run a scan of the System File Checker.

    http://support.Microsoft.com/kb/929833

    It will be useful.

  • The L2L VPN Tunnels on several external Interfaces ISP

    Due to special circumstances, we have 2 links on an ASA5510 ISP. I'm trying to put an end to some VPN L2L tunnels on a link and others on the second link of Internet service provider, for example below:

    LOCAL FIREWALL

    card crypto outside-map_isp1 20 corresponds to the address VPN_ACL_A
    set outside-map_isp1 20 crypto map peer 1.1.1.1
    outside-map_isp1 20 game card crypto transform-set TS-generic

    card crypto outside-map_isp2 30 corresponds to the address VPN_ACL_B
    peer set card crypto outside-map_isp2 30 3.3.3.3
    card crypto outside-map_isp2 30 value transform-set TS-generic

    crypto map interface outside-map-isps1 ISP_1
    outside-map-isp2 interface card crypto ISP_2

    ISAKMP crypto enable ISP_1
    ISAKMP crypto enable ISP_2

    Route 0.0.0.0 ISP_1 0.0.0.0 1.1.1.254
    Route ISP_2 3.3.3.3 255.255.255.255 2.2.2.254

    Establishing the VPN tunnels in both directions when using ISP_1 works very well establshing in both directions of remote access users and several tunnels L2L (only showing a for example).

    On ISP_2

    1. peer device 3.3.3.3 establishes a VPN tunnel, but the return traffic does NOT get back to devices 3.3.3.3 tunnel.

    2. the local firewall does NOT establish a VPN tunnel to 3.3.3.3

    It suggests that the problems lies with this firewall multihomed do not direct traffic properly on back down and VPN tunnel of workbenches (point1) or to trigger a tunnel if there is (point 2).

    Reconfiguration of the VPN tunnel to 3.3.3.3 counterpart to be on the local firewall, all the springs in the life ISP_1! All ideas, there are enough license etc...

    Another way you need is the subnet of destination on VPN_ACL_B to be routed to ISP_2 as well.

    So you must send the address of peers (in your case 3.3.3.3) and the remote subnet (in your destination subnet case VPN_ACL_B) at 2.2.2.254

  • Site-to-Site VPN breaks after reset of the router

    Hi all

    I have a very difficult problem.  I have a CallManager server on one site (Site A) configuration and IP phones which connect you via tunneling IPSec VPN site-to site to Site B.  WAN link to Site B (cable ISP with IP static) can be a tad bit reliable at times.  Everything worked perfectly, except when the router resets or loses connection at site B, smashing everything.  I have the option tftp 150 defined on the server CUCM on Site (192.168.10.250).  The tunnel is NOT upward automatically after a router loses connection, and once this is the case, it seems that I can't help that can restore full connectivity.  I know I must be missing something, but have no idea what.  The nbar-Discovery Protocol on the external interface of the router on the Site B shows TFTP and Skinny packets go out, but nothing back in.  I can't ping all internal resources on the Site A of Site B.  I'm doing a "isakmp crypto to show his" on each router and it shows the tunnel as being upward.  In order to back up the tunnel, I need to access the router on the Site A with the SDM tool and do a 'test' of the VPN tunnel.  It shows it as inactive, and when I have SDM generate traffic, using the source IP address as 192.168.10.1 (inside the interface of the router on the Site A) and destination IP of 192.168.11.1 (inside the interface of the router on the Site B), the tunnel back to the top.  Yet, even if the tunnel is restored, nothing works as much as to be able to ping site starting tftp from Site A to Site B and Site B.  Any help on this is GREATLY appreciated.  Any suggestions on how to configure a VPN site-to-site-reliable so that if cnnection is lost on one end, the tunnel back upward and devices on Site B can access resources such as on Site A CallManager server.  Thanks in advance!

    Hello

    One way you can have the tunnel come back automatically even if it breaks down is configure SLA monitoring on one of the routers of the site so that it sends periodic pings inside the IP address of the router on the other site. For example, on the Siite to configure it for SLA monitoring of IP than his inside source 192.168.10.1 and making ping inside the interface of Site B interface regularly, 192.168.11.1. Configuration guide, please see the below page:

    http://www.Cisco.com/en/us/docs/iOS/12_4/ip_sla/configuration/guide/hsicmp.html#wp1027188

    About traffic has not managed, pouvez you please paste the result of ' show cry isa his ', ' cry ipsec to show his ' and the configuration of the two routers if possible?

    Kind regards

    Assia

  • WCCP and ASA L2L VPN Tunnel

    How L2L WCCP vpn tunnel? If there is a Web page on the otherside of the tunnel that I need access on ports 80 and 443, it goes through the process of WCCP. How will I know the traffic through the tunnel for 80 and 443 to ignore the WCCP?

    Hello

    I have not had to deal with WCCP on the SAA configurations as it, but to my knowledge, this could be done in the ACL that is used in configuring WCCP on the SAA.

    I mean a single montage we have has an ACL that simply bypasses the WCCP for some destination addresses.

    The ACL was originally for example

    WCCP ip access list allow a whole

    Then we had to stop it for some destination network and we would add a Deny statement at the top of the ACL

    access-list 1 deny ip WCCP line any 10.10.10.0 255.255.255.0

    -Jouni

  • ASA5505 with 2 VPN tunnels failing to implement the 2nd tunnel

    Hello

    I have an ASA5505 that currently connects a desktop remotely for voip and data.  I added a 2nd site VPN tunnel to a vendor site.  It's this 2nd VPN tunnel that I have problems with.  It seems that the PHASE 1 negotiates well.  However, I'm not a VPN expert!  So, any help would be greatly appreciated.  I have attached the running_config on my box, debug (ipsec & isakmp) information and information about the provider they gave me today.  They use an ASA5510.

    My existing VPN tunnel (which works) is marked 'outside_1_cryptomap '.  It has the following as interesting traffic:

    192.168.1.0/24-> 192.168.3.0/24

    192.168.2.0/24-> 192.168.3.0/24

    10.1.1.0/24-> 192.168.3.0/24

    -> 192.168.3.0/24 10.1.2.0/24

    10.1.10.0/24-> 192.168.3.0/24

    10.2.10.0/24-> 192.168.3.0/24

    The new VPN tunnel (does not work) is labeled "eInfomatics_1_cryptomap".  It has the following as interesting traffic:

    192.168.1.25/32-> 10.10.10.83/32

    192.168.1.25/32-> 10.10.10.47/32

    192.168.1.26/32-> 10.10.10.83/32

    192.168.1.26/32-> 10.10.10.47/32

    Here's the info to other VPN (copy & pasted from the config)

    permit access list extended ip 192.168.1.26 eInfomatics_1_cryptomap host 10.10.10.83

    permit access ip host 192.168.1.25 extended list eInfomatics_1_cryptomap 10.10.10.83

    permit access ip host 192.168.1.25 extended list eInfomatics_1_cryptomap 10.10.10.47

    permit access list extended ip 192.168.1.26 eInfomatics_1_cryptomap host 10.10.10.47

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    card crypto outside_map 1 match address outside_1_cryptomap

    peer set card crypto outside_map 1 24.180.14.50

    card crypto outside_map 1 set of transformation-ESP-3DES-SHA

    card crypto outside_map 2 match address eInfomatics_1_cryptomap

    peer set card crypto outside_map 2 66.193.183.170

    card crypto outside_map 2 game of transformation-ESP-3DES-SHA

    outside_map interface card crypto outside

    crypto isakmp identity address

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    tunnel-group 24.180.14.50 type ipsec-l2l

    IPSec-attributes tunnel-group 24.180.14.50

    pre-shared key *.

    tunnel-group 66.193.183.170 type ipsec-l2l

    IPSec-attributes tunnel-group 66.193.183.170

    pre-shared key *.

    Thanks in advance

    -Matt

    Hello

    The seller put a parameter group2 PFS (Perfect Forward Secrecy) of Phase 2, so that you don't have it.

    So you can probalby try adding the following

    card crypto outside_map 2 pfs group2 set

    I think he'll simply enter as

    card crypto outside_map 2 set pfs

    Given that the 'group 2' is the default

    -Jouni

  • Connection reset during the firmware update

    I have a Linksys router WRT54GS (v5). I noticed that my firmware was outdated and he tried to update tonight. During the upgrade path, the browser will reset the connection and now can't access my router configuration pages.

    I did a hard reset. Then I did the 30-30-30 reset.

    The reset worked, but no matter what I do, I can't navigate to any readable page in the router. I get the log in box and was able to connect on the router. However, the configuration pages are all jumbled and devoid of useful information. It looks almost like a web page that needs flash to be enabled. Many colors and boxes, but no text or links to other pages of configuration

    I know it's an old router but it has served me well. I would like to reinstall the old firmware (or new!) and copy my saved on the router configuration file.

    Is this a hopeless situation?

    Is there a way to access the configuration via a command line interface?

    Please, any help would be greatly appreciated.

    In fact, thank you for your answer but I posted too soon. I just find a solution to my problem.

    Rather than attempting to rewrite the original record of people, I will copy and paste below.

    I found this fix on the following site:

    http://en.kioskea.NET/forum/affich-87540-can-t-view-Linksys-router-Web-page-WRT54G

    Scroll to the comments section and find the one of "elmo21". The discovery of the answer of "Lynn". I hope this helps someone.

    It worked like a charm for me:

    Lynn - December 12, 2009 2:59 pm GMT

  • VPN tunnel for initiation of the static method to the dynamic side

    Hello

    In the case of site to site VPN between static IP (ASA) and dynamic IP (Linksys AG241), would it be possible to open the VPN tunnel by the static side? How can I configure it? Could you please advice?

    Thank you very much

    Nitass

    Nitass, I'm sure that you can not start session with ASA, which is on the side of the VPN server.

  • ASA Cisco IPSEC VPN tunnel has not managed the traffic

    Hi guys

    I am trying to set up a new connection IPSEC VPN between a Cisco ASA 5520 (verion 8.4 (4)) and Checkpoint Firewall. I managed to establish the phases IKE and IPSEC and I can see the tunnel is UP. But I can't see any traffic through the tunnel. I checked the cryptomap both ends and try to test with a contionuous ping from within the network of the SAA.

    I made a screenshot of ICMP packets but cannot see in ASA. I welcomed the icmp inside ASA interface.

    I did a package tracer and it ends with a fall of vpn - filter the packets. But can not see any configured filters...

    Your help is very appreciated...

    Thank you

    You probably need to add nat negate statements:-something like.

    object-group network OBJ-LOCAL
    Network 10.155.176.0 255.255.255.0
    object-group network OBJ / remote
    object-network 192.168.101.0 255.255.255.0
    NAT static OBJ-LOCALOBJ-LOCAL source destination (indoor, outdoor) static OBJ-REMOTE OBJ-REMOTE-no-proxy-arp

    You are running 8.4 nat 0 has been amortized

  • L2l VPN with public ip of the router and firewall with private IP

    Dear all,

    I have a requiremnt for site to site VPN configuration but the firewall on the remote end is not obtained public ip, public ip address is termintaed on the router. Please find the attached diagram

    LAN--> Firewall - privateip--> router-publicip - ISP

    How can I set up the site to site VPN tunnel, enjoy emergency assistance

    Thanks in advance...

    Mikael

    You can configure static NAT for 1:1 for the SAA outside interface with a spare public ip address of the router address.

    If you don't have spare public ip address, then you must configure static UDP/500 and UDP/4500 PAT on the router and enable NAT - T on the SAA.

  • First HP: Auto Reset during the conversion unit

    Hi, I do not know why, but every time I tryied to convert deg to rad using convert (accessible by SHIFT + C) comand calculator auto reset. The discount auto reset happens when I press ENTER.

    Someone knows how to fix this?

    Hi!, @Jucimar_C:

    In the User Guide, of... http://support.HP.com/us-en/product/HP-Prime-graphing-calculator/5367459/model/5367460/manuals

    Since then, see page 482...

    And in the image...

    SHIFT + G Angle.

    Select 7 rad... 1_ (RAD)

    Now, put the amount of radians, what must be replaced, instead, from 1.

    Put a comma and entry 1_ (deg).

    Now, use CONVERT(1_rad,1_deg) and ENTER.

  • Can I avoid the convergence during the substitution of EIGRP auth key. ?

    Hello

    I set up several routers for EIGRP authenticated using a keychain. I have configured each key for about 6 months of validity:

    R1# show key chain Key-chain EIGRP-Key-Chain:

    Key 1 -- text "key1"   accept lifetime (00:00:00 EDT Oct 1 2013) - (23:59:59 EDT Mar 31 2014) [valid now]

       send lifetime (12:00:00 EDT Oct 1 2013) - (11:59:59 EDT Mar 31 2014) [valid now]

    key 2 -- text "key2"   accept lifetime (00:00:00 EDT Mar 31 2014) - (23:59:59 EDT Oct 1 2014)

       send lifetime (12:00:00 EDT Mar 312014) - (11:59:59 EDT Oct 1 2014)

    This configuration should provide accepts the overlap between the keys 1 and 2 throughout the 24 h of March 31, 2014. Turning key shipment should arrive at noon March 31, 2014, (giving the router 12 hours of cushion for time difference).

    Unfortunately, during the bearing (forced by manually setting the router before clock), I have the EIGRP convergence experience. This is unexpected because the router should accept time key 1 and key 2. Am I missing something? Is it possible to avoid convergence?

    Thank you

    Rob

    Hi Rob,

    You can't have some newspapers/debugging event, you? It would be a huge help, I suppose, to see what really happened.

    This configuration should provide accept overlap between key 1 and key 2 during the entire 24 hours of 31 March 2014. The send key rollover should happen at noon on 31 Mar 2014 (giving the router 12 hours of cushion for time variance).

    Well, not really. There is a case of extreme that I found in your configuration in which the EIGRP would restore his neighborship, so please, bear with me.

    1 send to life key until11:59:59 EDT Mar 31 2014

    life to send key 2 of 12:00:00 EDT Mar 31 2014

    If any router would have to send packets HELLO between 12:00 and 11:59:59, there is NOT VALID at this time KEYS. Maybe that is not your case and maybe it's a little extreme, but it could happen. I wasn't really sure of it so I labbed it.

    R1 and R2 are interconnected by Serial1/0, IPs 10.0.0.1 and 10.0.0.2 respectively. Don't mind the time, they are poorly synchronized, but it is not really important.

    Perspctive of R1

    Mar 31 11:59:59.863: EIGRP: interface Serial1/0, No live authentication keys

    Mar 31 11:59:59.867: EIGRP: Sending HELLO on Serial1/0

    Mar 31 11:59:59.867:   AS 1, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0

    Mar 31 11:59:59.891: EIGRP: received packet with MD5 authentication, key id = 2

    Mar 31 11:59:59.891: EIGRP: Received HELLO on Serial1/0 nbr 10.0.0.2

    Mar 31 11:59:59.891:   AS 1, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/0

    Mar 31 11:59:59.891:        Inteface goodbye received

    Mar 31 11:59:59.891: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 10.0.0.2 (Serial1/0) is down: Interface Goodbye received

    Perspective of R2

    Mar 31 12:10:47.619: EIGRP: received packet with MD5 authentication, key id = 1

    Mar 31 12:10:47.623: EIGRP: Received HELLO on Serial1/0 nbr 10.0.0.1

    Mar 31 12:10:47.627:   AS 1, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0 peerQ un/rely 0/0

    Mar 31 12:10:47.931: EIGRP: Sending HELLO on Serial1/0

    Mar 31 12:10:47.935:   AS 1, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0

    Mar 31 12:10:52.067: EIGRP: Dropping peer, invalid authentication

    Mar 31 12:10:52.071: EIGRP: Sending HELLO on Serial1/0

    Mar 31 12:10:52.075:   AS 1, Flags 0x0, Seq 0/0 idbQ 0/0 iidbQ un/rely 0/0

    Mar 31 12:10:52.083: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 1: Neighbor 10.0.0.1 (Serial1/0) is down: Auth failure

    So if R1 (or any other router) would hit 1 second interval, he would have sent package HELLO without authentication at all leading to the fall of the neighborship.

    It is maybe it happened, maybe not. Just an idea.

    BTW. If you want to ensure that this reversal will be correctly you must rewrite your keys up to something like this:

    Key1

    accept life 00:00:00 October 1, 2013 23:59:59 March 31, 2014

    send-lifetime 12:00 October 1, 2013 12:00:05 March 31, 2014

    2 key

    accept life 00:00:00 March 31, 2014 23:59:59 October 1, 2014

    send-lifetime 12:00 March 31, 2014 11:59:55 October 1, 2014

    The thing is, as we already know from this point, the send-lifetime of keys of the changes need to overlap a bit that there would be a period of time without a valid key.

    Best regards

    Jan

  • Cannot install download files on the generator on new glassfish

    Hello
    Running Application Express 4.1.0.00.32 on Oracle Glassfish Server 3.2.1. Our new facility is in place and do us our applications up and running for the most but with a weird thing. We cannot transfer all files on the generator of the Apex, for example an image or an export request export. After navigating to the file by clicking 'next' in the Import Wizard generates a message "the file must be selected for upload" and the path specified just disappears from the display.

    Sorry to post on the forum of listner, but it "feels" as a kind of a problem of front end with the new facility. Others post similar topics on the forum of the apex and say: there is a bug in glassfish How to transfer files to the apex

    This post refers to the other off the coast of the Forum post where you can download a patch of glassfish. But hey, I'm paying for an official Oracle glassfish, I must post an sr for this?



    Thank you
    Steve

    Hi Steve,.

    We have discussed this here even before the thread you referenced: {message identifier: = 10205967}
    Of course, this fix is intended to be used for GF OSE, not the version with support.

    But hey, I'm paying for an official Oracle glassfish, I must post an sr for this?

    That's how you get help for this. Maybe "My Oracle Support" (formerly known as Metalink) has already a bug filed for this and an official patch to download. This forum is not intended to replace or duplicate content published by the official product support.
    On the other hand, your version number seems inaccurate: the most recent Oracle GlassFish Server available today is 3.1.2.2. If you are running on 3.1.2 you must download the Patch 147904-06 (assuming that you are on Linux, get the patch for your operating system if it is different). This will update your GF in 3.1.2.2, which is what Oracle Support will usually ask you to do if you open a service request for a product running on an older patch level.

    -Udo

Maybe you are looking for

  • radio station, playing all the time

    I've got a radio playing all the time and I don't know where it comes from.  I looked everywhere trying to shut it down.  I restarted the computer and it does not always help.  Can someone tell me please how to close the program.  Looks like it's may

  • AppleScript talk events

    I'm still prey to Messages does not not with AppleScripts "speak events." I was sorry when I upgraded to Yosemite. This is where the problem started. Now I'm same example I upgraded (with the promise of a fix) to El Capitan.  Is there someone who has

  • STOP Messages

    Please HELP! I have received messages to stop and have no idea how to fix them. I downloaded repair software, but nothing helped. The last three messages are: STOP: 0 X 0000005 (0XE1B4B13E, 0X00000001, 0X00000000, 0X805F02CA) STOP: 0X0000008E (0 X 00

  • upgrade to windows7 from Vista

    Hi, after 20 hours of reading the messages I still have no answers to "how to upgrade Windows Vista Enterprise to Windows 7 Enterprise" I did everything... the Adviser, all the tutorials and the guests tell me that I am able to upgrade to Windows 7 E

  • Windows Media Player does not finish burning CDs

    Here is the error message I get: "Windows Media Player cannot burn the files. If the burner is busy, wait until the current task is complete. If necessary, check that the burner is connected properly and that you have installed the latest device driv