Need help getting ASA SSC 5 to market quickly

Hi all

I have tonight to understand and get this card to work and would appreciate some expert advice.

I have an ASA 5505 and you just installed a SSC-5 card in it.  Unlike the SSM modules in the major firewalls, this not a no network card then how communicate LAN reins?

To allow, can I do it here https://tools.cisco.com/SWIFT/Licensing/PrivateRegistrationServlet?DemoKeys=Y ?  I don't have a number of PAK and the video license says that you do not use a key PAK when licesning IPS?

I think that if I can get these poorly sorted foundations be OK.

Please help

This command is for only ssc-5.

Feisal

Tags: Cisco Security

Similar Questions

  • Need help get Photoshop CC 2015.0.0 update to 2015.1.1

    Need help get Photoshop CC 2015.0.0 update to 2015.1.1. I bought Adobe CC and installed on my Windows 7, 64-bit PC 19 February 2016. I've uninstalled and reinstalled Photoshop CC and failed to get the update. I checked updates of the app, refreshed and disconnected and signed in CC. Creative cloud still sees the 2015.0.0 as being the updated version. Help, please! Thank you!

    Penny

    Penny

    Please delete these two folders - C:\Users\\AppData\Local\Adobe\ MAA UPDATER and OOBE times

    In case if you have any type of firewall blocking Adobe then it won't work, to check and confirm the Solution 3 follow the following link: Adobe Creative Cloud apps reverts after 2015 updated CC test

  • Need help getting started

    Hello

    I heard that Muse is very easy to make Web site. I downloaded the free version and I need help to get started.

    I want to do something like this: http://image.noelshack.com/fichiers/2013/50/1386717589-medal-of-honor-website-preview.png

    How to make tables?

    Blury will be made with paint.net as I did, or I have an option to do it automatically?

    How can I create animations? -> Language, connection and I want to add one thing to copyright at the bottom that you can open and is blury where it is.

    How to make a website, adapting to the different screen resolution and what I choose for the Web site resolution?

    Thanks for helping me.

    I tried alone, but I don't know how to add the link, I tried to make a table, but it wasn't like I wanted to...

    Hello

    Regarding the tables, check this suggestion

    http://forums.Adobe.com/message/5906843#5906843

    And regarding the resolution.

    http://forums.Adobe.com/message/5902453#5902453

    As I understand it, you try to create a sensitive site. It is already added to the feature request, and Muse development team is already working on it.

    I hope this helps.

  • WebServices - need help getting started...

    Hi all

    I am fairly new to Web services and Coldfusion I could use some help getting started. Creating the Web service has already been made, so I need to create a new one, so that the part is already done.  The existing webservice is written in .NET and I need to consume using Coldfusion. I think I have all the information I need from the creator (s) in the various XML files. There are a few examples of applications in the .xml file format in the information that was given, as well as a wsdl.xml file. Of my reading on Coldfusion and Web services is that they are consumed by the...

    < cfinvoke webservice = "yada.wsdl" method = "use" returnvariable = "returnedVal" > "

    and send arguments through

    < cfinvokeargument

    to the Web service that returns the data.

    But t that's where I'm wrong... It seems I should use the wsdl.xml file to connect to the Web service... is that correct? I have to place the wsdl.xml outside the Web root in IIS?

    Any suggestions are appreciated.

    If you try to refer to this wsdl file:

    Directory containing wsdl.xml

    .../wwwroot/mydir/WSDL.Xml

    Then, you must use a parameter like this:

    method http://localhost/mydir/WSDL.xml"="mywsdlmethod"returnvar ="data">

    « ? WSDL"is a ColdFusion function that uses the ability of ColdFusion to generate a wsdl file dynamically on the fly from a SWC file that is configured to be a web service.

  • Need help get data with the most recent date of entry into

    Hey guys;

    I need help with fine tuning a query to get the one with the most recent implementation.

    Here's my current query:

    /**********************************************
    Select sge.seal_group_id,
    SGE.equipment_id,
    SGE.effective_date
    of seal_group_equipment EMS.
    seal_group sg
    where equipment_id = 48801
    AND EMS. SEAL_GROUP_ID = SG. SEAL_GROUP_ID
    and sge.end_date is null
    Group of sge.equipment_id, sge.seal_group_id, sge.effective_date
    After having sge.effective_date = max (sge.effective_date)

    ******************************************************/

    Which produces the following results:
    SEAL_GROUP_ID - EQUIPMENT_ID - EFFECTIVE_DATE
    25-48801 - 01/01/1993-00: 00:00
    11730-48801 - 22/08/2003 08:42:11


    What I really need, is to show only the line with the most recent date of entry into
    I hope someone can help
    Thank you

    MAX will not work because the SEAL_GROUP_ID could depart. I would say analytical:

    select seal_group_id,
    equipment_id,
    effective_date
    from (
    select sge.seal_group_id,
    sge.equipment_id,
    sge.effective_date,
    RANK() over (partition by equipment_id order by effective_date desc) r
    from seal_group_equipment sge,
    seal_group sg
    where equipment_id = 48801
    AND SGE.SEAL_GROUP_ID = SG.SEAL_GROUP_ID
    and sge.end_date is null)
    where r = 1;
    

    Keep in mind if two records have the same effective_date, they would both appear.

    Note: query above has not been tested, since there is no script provided.

  • Need help, get message display driver has stopped working, but has recovered

    Had no problems until recently, my freezer of mouse and screen, then get message display driver has stopped working, but recovered it gets really bad, please help

    Hello

    1. what operating system do you use?
    2. What is the brand and model of your system?
    3. Once you get this error message?
    4. you did it before the issue of any material changes or software?

    Try the steps outlined in the methods mentioned below and let us know if it helps.
    Note: The following Microsoft Articles are applicable for Windows 7 and Vista.

    Method 1: Boot your system in clean boot mode and temporarily disable your antivirus software. Check if get the same error message or not.

    Step 1: Try now to the KB article to perform the clean boot:
    How to troubleshoot a problem by performing a clean boot in Windows Vista and Windows 7:
    http://support.Microsoft.com/kb/929135
    Important: After you used the clean boot in order to solve your problem follow step 7 to reset the computer to start as usual.

    Clean boot in XP:

    Try now to the KB article to perform the clean boot:
    http://support.Microsoft.com/kb/310353
    Important: After you use the clean boot in order to solve your problem follow the steps in the "steps to configure Windows to use a Normal startup state" section to start your system in normal mode.

    Step 2: Turn off the antivirus software:
    http://Windows.Microsoft.com/en-us/Windows7/disable-antivirus-software
    Important: Antivirus software can help protect your computer against viruses and other security threats. In most cases, you should not disable your antivirus software. If you need to disable temporarily to install other software, you must reactivate as soon as you are finished. If you are connected to the Internet or a network, while your antivirus software is disabled, your computer is vulnerable to attacks

    Method 3: update the driver for

    Updated a hardware driver that is not working properly:
    http://Windows.Microsoft.com/en-us/Windows7/update-a-driver-for-hardware-that-isn ' t-work correctly

    Method 4: Please visit the manufacturer's website and download the latest driver for your graphics card.

    Method 5: Windows 7 power save settings reduces the voltage to the video card too well when it is inactive for some video cards.

    To resolve this problem, disable the display (Plugged In) turn it off and turn off the display (on battery) power settings by using one of the following methods:

    Use the Group Policy settings:
    To resolve this issue by using Group Policy settings, follow these steps:

    (a) click Start, type gpedit.msc in the search box and press ENTER.

    (b) in the local Group Policy Editor, expand models of administration under Computer Configuration, expand System, expand power management, and then click display and video settings.

    (c) in the dialog box that opens, double click on turn off the display (Plugged In), click active, type 0 in the box to turn the display Off (seconds), and then click OK.

    (d) in the dialog box that opens, double click on turn off the display (on drums), click active, type 0 in the box to turn the display Off (seconds), and then click OK.

    Use the powercfg command:
    To resolve this issue by using the powercfg command, follow these steps:

    (a) click Start, type command prompt in the search box, and then click command prompt in the list of results.

    (b) at the command prompt, type the following commands:
    powercfg - X-monitor-timeout-ac 0
    powercfg - X-monitor-timeout-dc 0

    Get back to us if the problem persists.

  • Need help getting reports significant chargeback

    I'm trying to understand if there is a way to obtain Chargeback reports more meaningful than what comes out of the box with vFoglight 6.7.1.  If I use flat on many levels, I have to create too many different levels and modules (and spend too much time by assigning them).  If I use MRU I get closer to what I'm looking for, but I don't know how much storage value add I/O.  I need to take into account the costs of storage, but I need to be able to charge per GB, are not the OPS / s.  Someone has found a way to dynamically load things like the number of processors, RAM and storage (per GB)?  It doesn't seem practical to create add ons for many configurations you end up with when you have hundreds or thousands of virtual machines.

    In short, I would like to be able to set a cost by vCPU and GB RAM GB of storage and power who object my VMs.  If you use MRU I would like be able to replace the storage I/O with used storage space, or add at least as an option.  If there is a way to add dynamic Add-ons which would work too.

    Thank you

    Here's how opposition to the payment:

    GHz consumed * rate per GHz

    vRAM Allocated * availability % * rate per GB vRAM

    Storage in GB * rate per GB allocated

    The reasoning is as follows:

    CPU allocated dynamically, and the number of cores is generally not relevant for most.  (Yes, I know vCPU to the ratio of base, but in real life environments, not usually the bottleneck CPU)

    vRam is not allocated dynamically, so using allocated RAM encourages its customers to pay attention to what they want and helps focus them on the joint efforts of resizing.

    The storage is the same, you pay for what you are asking and if you want to pay less, reduce your allocation.

    ====================================================================================================

    It is actually a pretty simple thing to write a report for and requires no internal billing module integrated at all (we do not use it).

    create a simple WCF called calcFunction to take 4 values double function as contexts and return args [0] * args [1] * args [2] * args [4]

    Create another simple WCF function called calcStorageAllocated, using virtual machine type VMWVirtualMachine as context, with the following code:

    storageTotal = 0.0 d

    VM? storage? datastoreUsage?. every {use-> += storageTotal ((utilisation?.committed + utilisation?. non validée) / 1024/1024/1024)}

    return storageTotal

    create a query to list the virtual machines in a context on a table-oriented entry line.

    Add additional context for cpuRate, vRamRate and storageRate

    Add the following columns:

    context, CPU, hostCPUs, usedHz

    calcFunction

    parameters: context/CPU/hostCPUs/usedHz/period/average, 0.0000000001, cpuRate, 1

    context/memory/allocated/period/average

    context, uptimePercent, period, average

    calcFunction

    parameters: context/memory/allocated/period/average,context/uptimePercent/period/average,vRamRate,0.0009765625

    calcStorageAllocated

    parameters: context

    calcFunction

    parameters: calcStorageAllocated , storageRate, 1.1

    It's a start, anyway.  might need a little tweaking and a lot of room for improvement, but this will give you a basic chargeback report.

  • New cascade, I need help getting started to learn

    Hi all

    I'm new to Cascade, so confusing to start.  I have a question that needs your help to clarify:

    1. I create a control in QML Editor, because of the ease to make and listen to samples, give the id to it. So how do the handle in C++ code?

    2. are there any resource tutorial for some basic needs, such as: collect the text box data, display data, etc...

    There are a lot of samples, but I need an explanation of principle so that I can get contact with the sample easier.

    Enjoy your share!

    1. https://developer.blackberry.com/cascades/documentation/dev/integrating_cpp_qml/index.html

    2. https://developer.blackberry.com/cascades/documentation/dev/javascript/index.html

  • Need help! ASA 5505 not PPTP passthrough to the Server internal

    Hello:

    Recently, I add a new Cisco ASA 5505 like Firewall of the company network. I found that the PPTP authentication has not obtained through internal Microsoft Server. Any help and answer are appriciated.

    Please see my setup as below. Thank you!

    ASA Version 8.4 (3)
    !
    names of
    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    switchport access vlan 2
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 172.29.8.254 255.255.255.0
    !
    interface Vlan2
    nameif outside
    security-level 0
    IP 177.164.222.140 255.255.255.248
    !
    passive FTP mode
    clock timezone GMT 0
    DNS server-group DefaultDNS
    domain ABCtech.com
    permit same-security-traffic inter-interface
    network obj_any object
    172.29.8.0 subnet 255.255.255.0
    service object RDP
    source eq 3389 tcp service
    Orange network object
    Home 172.29.8.151
    network of the WAN_173_164_222_138 object
    Home 177.164.222.138
    SMTP service object
    tcp source eq smtp service
    service object PPTP
    tcp source eq pptp service
    service of the JT_WWW object
    tcp source eq www service
    service of the JT_HTTPS object
    tcp source eq https service
    network obj_lex object
    172.29.88.0 subnet 255.255.255.0
    network of offices of Lexington Description
    network obj_HQ object
    172.29.8.0 subnet 255.255.255.0
    guava network object
    Home 172.29.8.3
    service object L2TP
    Service udp source 1701 eq
    Standard access list VPN_Tunnel_User allow 172.29.8.0 255.255.255.0
    Standard access list VPN_Tunnel_User allow 172.29.88.0 255.255.255.0
    inside_access_in list extended access permit icmp any one
    inside_access_in tcp extended access list deny any any eq 135
    inside_access_in tcp extended access list refuse any eq 135 everything
    inside_access_in list extended access deny udp any what eq 135 everything
    inside_access_in list extended access deny udp any any eq 135
    inside_access_in tcp extended access list deny any any eq 1591
    inside_access_in tcp extended access list refuse any eq 1591 everything
    inside_access_in list extended access deny udp any eq which 1591 everything
    inside_access_in list extended access deny udp any any eq 1591
    inside_access_in tcp extended access list deny any any eq 1214
    inside_access_in tcp extended access list refuse any eq 1214 all
    inside_access_in list extended access deny udp any any eq 1214
    inside_access_in list extended access deny udp any what eq 1214 all
    inside_access_in of access allowed any ip an extended list
    inside_access_in list extended access permit tcp any any eq www
    inside_access_in list extended access permit tcp any eq www everything
    outside_access_in list extended access permit icmp any one
    outside_access_in list extended access permit tcp any host 177.164.222.138 eq 3389
    outside_access_in list extended access permit tcp any host 177.164.222.138 eq smtp
    outside_access_in list extended access permit tcp any host 177.164.222.138 eq pptp
    outside_access_in list extended access permit tcp any host 177.164.222.138 eq www
    outside_access_in list extended access permit tcp any host 177.164.222.138 eq https
    outside_access_in list extended access allowed grateful if any host 177.164.222.138
    outside_access_in list extended access permit udp any host 177.164.222.138 eq 1701
    outside_access_in of access allowed any ip an extended list
    inside_access_out list extended access permit icmp any one
    inside_access_out of access allowed any ip an extended list
    access extensive list ip 172.29.8.0 outside_cryptomap allow 255.255.255.0 172.29.88.0 255.255.255.0
    inside_in list extended access permit icmp any one
    inside_in of access allowed any ip an extended list
    inside_in list extended access udp allowed any any eq isakmp
    inside_in list extended access udp allowed any isakmp eq everything
    inside_in list extended access udp allowed a whole
    inside_in list extended access permitted tcp a whole
    pager lines 24
    Enable logging
    asdm of logging of information
    Within 1500 MTU
    Outside 1500 MTU
    local pool ABC_HQVPN_DHCP 172.29.8.210 - 172.29.8.230 255.255.255.0 IP mask
    ICMP unreachable rate-limit 1 burst-size 1
    enable ASDM history
    ARP timeout 14400
    NAT static orange interface (inside, outside) source RDP RDP service
    NAT (inside, outside) source obj_HQ destination obj_HQ static static obj_lex obj_
    Lex-route search
    NAT guava Shared source (internal, external) WAN_173_164_222_138 service JT_WWW JT_WWW
    NAT guava Shared source (internal, external) WAN_173_164_222_138 service JT_HTTPS JT_HTTPS
    NAT guava Shared source (internal, external) WAN_173_164_222_138 service RDP RDP
    NAT guava Shared source (internal, external) WAN_173_164_222_138 SMTP SMTP service
    NAT guava Shared source (internal, external) WAN_173_164_222_138 PPTP PPTP service
    NAT guava Shared source (internal, external) WAN_173_164_222_138 service L2TP L2TP
    !
    network obj_any object
    NAT dynamic interface (indoor, outdoor)
    inside_in access to the interface inside group
    Access-group outside_access_in in interface outside
    Route outside 0.0.0.0 0.0.0.0 177.164.222.142 1
    Route inside 172.29.168.0 255.255.255.0 172.29.8.253 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    AAA-server protocol nt guava
    AAA-server host 172.29.8.3 guava (inside)
    Timeout 15
    guava auth - NT domain controller
    identity of the user by default-domain LOCAL
    Enable http server
    http 172.29.8.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
    Crypto ipsec transform-set esp-3des esp-md5-hmac Remote_VPN_Set ikev1
    Crypto ipsec transform-set esp-3des esp-md5-hmac Remote_vpn_set ikev1
    Crypto ipsec ikev2 AES256 ipsec-proposal
    Protocol esp encryption aes-256
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES192
    Protocol esp encryption aes-192
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES
    Esp aes encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 proposal ipsec 3DES
    Esp 3des encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal OF
    encryption protocol esp
    Esp integrity sha - 1, md5 Protocol
    Crypto-map Dynamics 20 ikev1 transform-set Remote_VPN_Set set outside_dyn_map
    Crypto-map dynamic outside_dyn_map 20 the value reverse-road
    card crypto outside_map 1 match address outside_cryptomap
    peer set card crypto outside_map 1 173.190.123.138
    card crypto outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5
    ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA'RE
    P-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    outside_map card crypto 1 set ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
    map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map
    outside_map interface card crypto outside
    IKEv2 crypto policy 1
    aes-256 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 10
    aes-192 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 20
    aes encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 30
    3des encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 40
    the Encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    Crypto ikev2 allow outside
    Crypto ikev1 allow outside
    IKEv1 crypto policy 1
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 43200
    IKEv1 crypto policy 10
    authentication crack
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 20
    authentication rsa - sig
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 30
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 40
    authentication crack
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 50
    authentication rsa - sig
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 60
    preshared authentication
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 70
    authentication crack
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 80
    authentication rsa - sig
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 90
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 100
    authentication crack
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 110
    authentication rsa - sig
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 120
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 130
    authentication crack
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 140
    authentication rsa - sig
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 150
    preshared authentication
    the Encryption
    sha hash
    Group 2
    life 86400
    Telnet 192.168.1.0 255.255.255.0 inside
    Telnet 172.29.8.0 255.255.255.0 inside
    Telnet timeout 5
    SSH timeout 5
    Console timeout 0

    dhcpd auto_config off vpnclient-wins-override
    !
    dhcprelay Server 172.29.8.3 on the inside
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    WebVPN
    allow outside
    internal ABCtech_VPN group strategy
    attributes of Group Policy ABCtech_VPN
    value of server DNS 172.29.8.3
    Ikev1 VPN-tunnel-Protocol
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list VPN_Tunnel_User
    value by default-field ABCtech.local
    internal GroupPolicy_10.8.8.1 group strategy
    attributes of Group Policy GroupPolicy_10.8.8.1
    VPN-tunnel-Protocol ikev1, ikev2
    name of user who encrypted password eicyrfJBrqOaxQvS
    tunnel-group 10.8.8.1 type ipsec-l2l
    tunnel-group 10.8.8.1 General-attributes
    Group - default policy - GroupPolicy_10.8.8.1
    IPSec-attributes tunnel-group 10.8.8.1
    IKEv1 pre-shared-key *.
    remote control-IKEv2 pre-shared-key authentication *.
    remotely IKEv2 authentication certificate
    pre-shared-key authentication local IKEv2 *.
    tunnel-group ABCtech type remote access
    attributes global-tunnel-group ABCtech
    address ABC_HQVPN_DHCP pool
    authentication-server-group guava
    Group Policy - by default-ABCtech_VPN
    IPSec-attributes tunnel-group ABCtech
    IKEv1 pre-shared-key *.
    tunnel-group 173.190.123.138 type ipsec-l2l
    tunnel-group 173.190.123.138 General-attributes
    Group - default policy - GroupPolicy_10.8.8.1
    IPSec-attributes tunnel-group 173.190.123.138
    IKEv1 pre-shared-key *.
    remote control-IKEv2 pre-shared-key authentication *.
    remotely IKEv2 authentication certificate
    pre-shared-key authentication local IKEv2 *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    Policy-map global_policy
    class inspection_default
    inspect the pptp
    inspect the ftp
    inspect the netbios
    !
    172.29.8.3 SMTP server
    context of prompt hostname
    no remote anonymous reporting call
    Cryptochecksum:6a26676668b742900360f924b4bc80de
    : end

    Hello Wayne,

    The first thing I noticed

    In the ACL you are pointing to the broad public while it should be to the private sector (YOU HAVE A PERMIT IP ANY ANY to the end, so it's not bad. FYI, if you decide to take this one any allowed ip address then you should point to private servers ip addresses)

    Now, the policy where the PPTP inspection, etc., will be used is not applied to any service-policy so add:

    global service-policy global_policy

    Don't forget not just for a PPTP connection to get established we should see 2 things:

    -Trading is done on the TCP 1723 port and then traded on Appreciate data packets.

    Follow my blog for more information on this topic:

    http://laguiadelnetworking.com/2012/12/22/what-is-new-on-the-PPTP-inspection-on-the-ASA/

    Try and let me know

    Julio

  • Need help getting my old PS1 back up and functional. Any help out there for this old compurte

    Looking for help and information to set up my old PS1 computer.

    When I turn on indicates missing parameters?

    I'm not swift on computers, but by train to learn.

    There's also no IE software: Win 4.0 / or basice installation software.

    Try to find some records.

    It is highly unlikely that any software will always be available for this system, IBM would only be able to help.  Regarding the other error, probably a CMOS battery discharged on the motherboard, which attaches quite easily, but the problem with software is probably the killer.  Anything more recent Windows 95, 98 or NT 4.0 will probably not run on it.  And even if you can get it running, these operating systems won't get a lot of good in today's online environment.  I would say that recycle and do with it.

  • Dell Inspiron 1545 with Windows Vista hard drive failed and I need help, get the recovery disks.

    Hi I have dell inspiron 1545 vith windows vista, when I bought it, I did not receive installation or recovery cd because it is recovery partition, but now the disk hard colapsed and I cannot start windows or access the recovery partition, so if I buy the new hard disk where can I get windows vista? I've got my activation code, thanks Andrej

    original title: where to get vista

    Hello

    Check with Support from Dell, which must sell cheap installation media since you already own windows.

    Dell support
    http://support.Dell.com/

    Dell support drivers - product manual & warranty Info (left side) - and much more
    http://support.Dell.com/support/index.aspx?c=us&l=en&s=DHS

    Dell forums
    http://en.community.Dell.com/forums/
    --------------------------------------------------------------------------------------------

    Request backup discs - you can also request disks of Vista in the comments
    https://support.Dell.com/support/topics/global.aspx/support/DellCare/en/backupcd_form

    Why my Dell system did not come with disks? - Applies to Vista and Windows 7
    http://support.Dell.com/support/topics/global.aspx/support/DSN/document?c=us&CS=19&docid=370461&l=en&s=DHS

    Restore your Computer´s software to factory settings<-- this="" is="" for="">
    http://support.Dell.com/support/topics/global.aspx/support/DSN/en/document?c=us&CS=19&DL=false&l=en&s=DHS&docid=3E48AE3870775D64E040A68F5B2877D4&doclang=en

    Restore your Computer´s software to factory settings<-- this="" is="" for="">
    http://support.dell.com/support/topics/global.aspx/support/dsn/document?c=us&cs=19&l=en&s=dhs&docid=3E48AE3870775D64E040A68F5B2877D4&journalid=8E538A50B8131233E040AC0A66E94135&Query=&SystemID=&ServiceTag=&contenttype=&os=&component=&lang=&doclang=&toggle=&dl=

    I hope this helps and happy holidays!

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle=""><- mark="" twain="" said="" it="">

  • Need help - Cisco ASA with the power of fire

    Hello

    Currently, we use asa 5510 without function of firepower. Our goal is to publish web servers and microsoft lync with reverse proxy method. control internet traffic, apply extensions individual file not to download, management of bandwidth etc.

    Is it possible if we add firepower on asa 5510... Please guide me... Thank you

    Power of fire must be installed on the new series X of the SAA.  5512 x, x 5515, 5525 x, etc.

    If you have a 5510, you probably want a 5512 x with an SSD.  Cisco has beams of firepower include the ASAx with SSD and the license of firepower.

    Adds that you must also Firesight management software, and there is a license bundle of 2 camera for under $ 500 that you can install on VMWare.

    Firepower is not reverse proxy, it's transparent online packages, analysis and filtering by URL / Application / and threat mitigation.

    If you want a reverse proxy, you should look into Microsoft ISA server or a Proxy Server reverse dedicated Web.  Cisco gave its product Web Director, who has done this function.

    You can host Web sites behind a firewall of ASA without proxy reverse.  And the ASA has an inspection of the request for HTTP traffic, responsible for watching HTTP requests.  The firepower to the ASA system also has specific signatures that monitor traffic to the web servers and prevent specific vulnerabilities that are known on those servers, so if that is what you want the Reverse Proxy for, then the power of fire module would probably cover your needs.

    Don't forget that until the next quarter firepower system has no decryption on the box, and you might want to wait that the feature is released and put in place, so that you know what size firewall you need protect your network with the SSL decryption.  I believe that the ASA5512x is testing at 75 Mbps stream decrypted via the fire power module, which is about half of what was before CX, then you could use the sizing numbers CX and extrapolate until Cisco releases official decryption numbers.

  • need help: get SMS data in application

    I started an SMS application, here is the code for displaying the TEXT in my application, as soon as the phone receives an SMS. I looked at this thread: http://supportforums.blackberry.com/t5/Java-Development/SMS-Application/m-p/63948 , but I still couldn't get it to work. Any ideas? Thank you very much!

    import net.rim.device.api.ui.UiApplication;
    
    public class ShowSMS extends UiApplication {
    
        public static void main(String[] args) {
            ShowSMS app = new ShowSMS();
            app.enterEventDispatcher();
        }
    
        public ShowSMS() {
            ShowSMSScreen mainScreen = new ShowSMSScreen();
            pushScreen(mainScreen);
        }
    }
    
    import net.rim.device.api.ui.component.LabelField;
    import net.rim.device.api.ui.container.MainScreen;
    
    public class ShowSMSScreen extends MainScreen{
    
        public ShowSMSScreen(){
            add(new LabelField("waiting text msg"));
    
            ListeningThread thread = new ListeningThread(this);
            thread.start();
        }
    
        public void addLabelFiled(String text) {
            add(new LabelField(text + "\n"));
            }
    }
    
    import java.io.IOException;
    import javax.microedition.io.Connector;
    import javax.microedition.io.Datagram;
    import javax.microedition.io.DatagramConnection;
    
    public class ListeningThread extends Thread { 
    
        ShowSMSScreen mainScreen;
        public ListeningThread(ShowSMSScreen mainScreen) {
        this.mainScreen = mainScreen;
        }
        public void run() {
            try { 
    
           DatagramConnection _dc = (DatagramConnection)Connector.open("sms://");
                        for(;;)
                    {
             Datagram d = _dc.newDatagram(_dc.getMaximumLength());
                           _dc.receive(d);
                           byte[] bytes = d.getData();
                           String address = d.getAddress();
                           String msg = new String(bytes);
                           mainScreen.addLabelFiled(address);
                           mainScreen.addLabelFiled(msg);
               }
          } catch (IOException e) {
                   System.err.println(e.toString());
          }
     }
    }
    

    To develop on the post of Mark, what you do above runs the datagram receiver in the thread of the event, which is strictly verboten. Any blocking operation performed on the event thread can / will cause the event queue to overflow, resulting in an exception "the program is not responding.

    Conversely, you CANNOT access the user interface of a backgropund thread - only from the event thread.

    Thus, you need to separate these two. You can start a thread to handle the datagram, then use invokeLater() in this thread to place your data on the user interface.

  • need help to find column ID to market sql tables in a diagram

    I want to build a query that will walk all tables in a schema in a loop and compare every possibility to associate it with an ID column

    I need to know what are the tables have a result where the number of lines with names of columns ID is > 0, then show that only those who were the tables & how many match. I don't know the name of the columns ID, so that does not need to be a variable

    Something along the idea of (not even close to real SQL but I hope that the idea comes through)

    for i = 1 to the last-1 table
    for j = 2 to the last table

    Select
    i table_name
    j table_name
    County (id_column)
    Of
    Table i
    Table j
    where
    i.id_column = j.id_column

    Next I
    Next j

    then to take all lines that result and get rid of those who have zero counties

    Thank you

    -----
    Edit
    ----
    I seem to have bad to convey my idea, I'll try again
    I can write this:
    --
    Select count (id_column)
    Table i table j
    where i.ID = j.ID
    --
    and I can put in each pair of tables for the entire schema, but I don't want to really put 250 + names in this pair and go through all the possibilities of each pair of tables, I'm expecting something that looks like this when finished,

    County of table table
    ----------------------------------------
    customer address 500
    phone customer 1000
    customers accounts 300
    Chargers cusomers 0
    senders address 50
    ......

    Published by: user7733176 on January 4, 2011 04:52

    user7733176 wrote:
    ---
    Select count (id_column)
    Table i table j
    where i.ID = j.ID
    ----

    select  a.table_name,
            b.table_name,
            extractvalue(
                         xmltype(
                                 dbms_xmlgen.getxml(
                                                    'select  count(*) cnt ' ||
                                                    '  from  ' || a.table_name || ' a,' ||
                                                    '        ' || b.table_name || ' b' ||
                                                    '  where b.id = a.id'
                                                   )
                                 ),
                         '/ROWSET/ROW/CNT'
                        ) cnt
      from  user_tab_columns a,
            user_tab_columns b
      where a.table_name > b.table_name
        and a.column_name = 'ID'
        and b.column_name = 'ID'
      group by a.table_name,
               b.table_name
      having extractvalue(
                          xmltype(
                                  dbms_xmlgen.getxml(
                                                     'select  count(*) cnt ' ||
                                                     '  from  ' || a.table_name || ' a,' ||
                                                     '        ' || b.table_name || ' b' ||
                                                     '  where b.id = a.id'
                                                    )
                                  ),
                          '/ROWSET/ROW/CNT'
                         ) > '0'
      order by a.table_name,
               b.table_name
    /
    

    SY.

  • Need help getting A value in My App using xml/php http request

    I know that maybe this isn't the place to ask questions about php, but I thought that people may have encountered a similar problem and I'm getting desperate basically my application's data is stored in a mysql database table, and what I have to do is to get the value of auto increment of this table in my application via an http request. I'm doing a php file that gets this value and displays this value in the xml format, but I'm terrible at creating php to do such things and just get the constant errors. Can someone take a look at this and help me to tweak it so it does what I want it please? The table in question is called links and the line/field/column in the table I'm after is called linkid. This is the next value of auto-increment this line printed in xml format, that's what I want. Here is the php so far:-

    <?php 
    header("Content-type: text/xml"); 
    $host = ""; 
    $user = ""; 
    $pass = ""; 
    $database = ""; 
    $linkID = mysql_connect($host, $user, $pass) or die("Could not connect to host."); 
    mysql_select_db($database, $linkID) or die("Could not find database."); 
    $tablename   = "links";
    $next_increment  = 0;
    $qShowStatus   = "SHOW TABLE STATUS LIKE '$tablename'";
    $qShowStatusResult  = mysql_query($qShowStatus) or die ( "Query failed: " . mysql_error() . "<br/>" . $qShowStatus );
    $row = mysql_fetch_assoc($qShowStatusResult);
    $next_increment = $row['Auto_increment'];
    echo "next increment number: [$next_increment]"; 
    ?>
    

    Hello

    step 1. the customer wants to add a new record. and sends a request for a new record

    step 2. the server adds a new record in the database (now its Blanck) and returns its ID number

    step 3.  the customer has now has an appropriate identification number and use it to add a new object to the table

    step 4. the customer with a registration ID and the new data for this "empty folder" is an update not an insert.

    step 5. You now have the table and database synchronization.

    David.

Maybe you are looking for

  • Is it possible that my Mac to be cloned

    I got a message saying that a link to photo I clicked on was a threat. After closing down my Mac, I got a message that says that another device with the same ip address using my internet connection. Have a virus? My machine has been cloned? How do I

  • How to trigger the dictation from the smart keyboard on the iPad pro.

    I use dictated on my iPhone and my iPad quite often. However on my new iPad Pro with the smart keyboard attached, I do not how to trigger the dictation from the keyboard. I don't see how to get the soft keyboard back to press the button of the microp

  • TouchSmart 310 continues to close

    My computer Touchsmart 310 guard to shut down every time I watch a film/video or play a game. I noticed that on the back of the monitor (where the cpu is) becomes very hot when I watch videos or play games, and then will follow the closing. Help, ple

  • Problems running the example NavigationPane

    Hi, just trying to get an idea how to use the NavigationPane in my application. I'm trying to follow this example: https://developer.blackberry.com/cascades/reference/bb__cascades__navigationpane.htmlThis is how my class looks like where I want to ad

  • Getting the error "System 5 error has occurred" during the startup of service SQL in Windows 7.

    I'm restarting SQL server, what I used to do via the following command line: net stop mssqlservernet start mssqlserver However, I am on a new Windows 7 machine and I get the following error when I try: net start mssqlserverSystem 5 error has occurred