question of redundency/design interface

Sorry if this is a stupid question. I went through the forum and a bunch of google searches with no joy.

I have:

PIX-active - switch-a

| ||

PIX - fo - b switch

unlikely, I know, but is it possible to configure the network/pix to take account of the active pix & switchb down?

I was thinking something like backup cmd on IOS, to connect to a network adapter of each pix for both switches.

Thanks for the research.

Not a stupid question, but do not forget this: the commercially feasible thing to do when network solutions tolerant for lack of construction is to eliminate the SPFS (single points of failure). In this design, you have no single point of failure. Trying to limit to two points of failure will be very complex to predict behavior impossible. My advice is to move to other areas of your network where you have surely SPFS.  ;)

HTH

Tags: Cisco Security

Similar Questions

  • I recently dropped my laptop and it is weird, one day he int open up to 4 start times and sometimes it shows me a folder and a question mark in the interface and sometimes asked to reset my password, what are the steps to take?

    I recently dropped my laptop and it is weird, one day he int open up to 4 start times and sometimes it shows me a folder and a question mark in the interface and sometimes asked to reset my password, what are the steps to take?

    Anything can be corrupted on your MacBook Pro, but from what you say, it seems that the cable drive/SSD/flash memory/SATA hard was seriously damaged. Him "question mark" means that your Mac is unable to find any bootable device, meaning that it does not yet detect your OS X drive.

    You should make a backup of your files (if you can still do it) and take the Mac at the Apple Store or dealer to get a diagnosis. There may be several damaged parts.

  • QUESTION OF REDUNDANCY NORMAL ASM

    Hi all

    Document Oracle ASM NORMAL QUESTION of REDUNDANCY [1480954.1 ID] says the statement, I find it difficult to understand the line which is marked in italics below.

    To determine the appropriate size of a diskgroup which is protected with redundancy of ASM, sufficient free space must exist in the diskgroup
    so that when a drive goes down, it can automatically rebuild the contents of the drive failed on another drive in the diskgroup. The database should stay online if sufficient space is available
    . The amount of space required to ensure ASM can restore redundancy if there is no disc is in the REQUIRED_MIRROR_FREE_MB column in the view V$ ASM_DISKGROUP. The amount of free space that can be used safely in a disk group, taking into account, mirroring and still be able to restore redundancy after a drive failure is in the USABLE_FILE_MB column in the view V$ ASM_DISKGROUP. USABLE_FILE_MB must always be greater than zero. If USABLE_FILE_MB falls below zero, most records should be added to the disk group.

    DOUBT: why what he have reconstitute the content of the disc failed on another drive in the diskgroup when scopes in mirror and I do not understand when the disc itself is failed how they can access it and rebuild its contents to another drive.


    Concerning

    DOUBT: why need restore the contents of the drive failed on another drive in the diskgroup when there mirrored scopes

    because the data on the failed drive is not more in the opposite direction (no additional copies) and to ensure a level of normal redundancy, we'll build a new mirror copy of data

    I do not understand when the disc itself broke down how they can access it and rebuild its contents to another drive.

    data always available, mirrored

    to explain it simply:

    everything is stored with 2 copies (original + mirror)
    When 1 is lost, a new copy will be rebuilt among others the 1, so there will be 2 copies again

  • Simplistic questions about game design student

    Hello

    A high school student sent me a few questions about the design of the game.  After above, they seem to be more applicable to commercial game developers.  If you are such a person would be willing to post your answers, I would be grateful.

    Here are the questions:

    1.) how long does it take to design a video game?

    (2.) what is your source of inspiration to design a video game?

    3.) how to make a video game to become popular? (sold in a package)

    4.) what are the resources needed to design a video game?

    5.) how much money does take to design a video game?

    Best regards

    Chris McLaughlin

    I have programmed buggoop 300, http://www.buggoop.com/BugGoop300/

    and I'm currently adapting mobile android.

    I also programmed this, http://rummoli.ca/bin-debug/rummoli_single.swf

  • question about the design of the INTERFACE through WebWorks

    Hi all

    How to display the bar at the top of my app like Facebook app?

    Where can I find the width of the top bar? Thank you.

    Kind regards

    QC

    I understand now, thanks for the clarification.

    WebWorks applications, like all other applications on the BlackBerry OS, cover the full screen by default.  If you want to include in your application, your own taskbar to display information at the level of the system (battery, carrier, time, etc.), you need to include this logic in the application itself (for example to create a)

    and use WebWorks APIs or custom JavaScript extensions to retrieve data from these properties).

  • Question of redundancy VPN l2l using 2811 as endpoint devices

    I have a new implementation of VPN L2L passes using two 2811 s than VPN terminal devices. I'll try to use the HSRP address between the public interfaces of both routers as VPN peer address. The problem that I found during the test is that the tunnel will become active and debugs watch the HSRP address as an invalid address to form the tunnel. Have a work-around, or a better plan for redundancy on peering address using similar devices? Thanks in advance.

    Take a look at this doc about IOS IPSec HA.

    http://www.Cisco.com/en/us/docs/iOS/security/configuration/guide/sec_vpn_ha_enhance_ps6922_TSD_Products_Configuration_Guide_Chapter.html#wp1039849

  • question about redundancy and failover from one site to tunnel

    First, I create the underside of crypto card,

    crypto IPSec_map 10 card matches the address encrypt-acl
    card crypto IPSec_map 10 set peer 209.165.201.1

    card crypto IPSec_map 10 the transform-set RIGHT value

    card crypto IPSec_map 10 the value reverse-road

    Then I set up a 2nd card statement, corresponding to the same ACL.

    crypto IPSec_map 20 card matches the address encrypt-acl
    card crypto IPSec_map 20 set peer 23.10.10.10

    card crypto IPSec_map 20 set transform-set RIGHT

    card crypto IPSec_map 20 set reverse-road

    My first question is - since Cryptography cards are processed in order, does that mean the first tunnel VPN (map 10) will always be used if its place?

    If so, what happens when the 209.165.201.1 remote peer becomes unreachable? is the tunnel of the 23.10.10.10 peer back automatically?

    What is the best way to reach a VPN site-to-site main and secondary where 209.165.201.1 primary school and 23.10.10.10 is backup and appears only when the primary is down?

    Thank you

    Hello

    As you mentioned that the Cryptography cards are processed in the order.

    If two cryptographic cards have the same "interesting" traffic then the second card encryption is never used (first crypto card is used).

    The best way to get a redundancy is to do the following:

    crypto IPSec_map 10 card matches the address encrypt-acl
    card crypto IPSec_map 10 set peer 209.165.201.1 23.10.10.10

    card crypto IPSec_map 10 the transform-set RIGHT value

    card crypto IPSec_map 10 the value reverse-road

    Note in the example above that you have defined an instance unique card crypto with two counterparts. The first pair will try first and if not answered, the second peer will be used as a backup.

    It will be useful.

    Federico.

  • Question of redundancy WLC

    Hello community,

    I have a question about the function of redundancy for both WLC 2106. We have installed on a client 2106 and 6 AP site 2 WLC primary and backup WLC works very well. No customer asks the question if there is an option to copy the guest user of wlan access from the PDC to the backup controller? The entry hall activates a new user on the main controller and if the primary controller fails, so the user did not have access to the WLAN comments.

    Any ideas?

    Thanks for help.

    René

    You can read this question a little differently...

    What, in my view, is mentioned, is that a user GUEST account is enabled on the PDC. When the primary contoller fails to the needs of the user to reauthenicate. If that is the question.

    You must either add comments on both controllers OR purchase WCS and WCS will push the guest on both controllers for you account...

  • VPN site2site & VPN client dailin on the question of a single interface

    Hello dear colleagues,

    First of all, the question of information subsequently:

    Setup

    C2801 race

    (C2801-ADVENTERPRISEK9-M), Version 12.4 (25f)

    ----------                                                    ----------

    | Central | Di1 IP:80.153.xxx.xxx | DISTANCE | IP: 91.218.xxx.xxx

    | Router | <----------------------------------------->     | Router |

    -IPsec via GRE Tu1 - works | Debian |

    ^                                                   |          |

    |                                                     ----------

    |    does not work

    |---------------------------------------->-------------------

    | Cisco VPN | Intellectual property: all

    | Customer |

    -------------------

    !

    AAA authentication login default local activate

    AAA authentication login local VPN_Users

    RADIUS group AAA authorization network default authenticated if

    AAA authorization VPN_Users LAN

    !

    AAA - the id of the joint session

    iomem 20 memory size

    clock timezone THIS 1

    clock summer-time EST recurring last Sun Mar 02:00 last Sun Oct 03:00

    IP cef

    !

    username myVPN secret 5

    !

    !

    crypto ISAKMP policy 1

    BA 3des

    preshared authentication

    Group 2

    life 3600

    address key crypto isakmp xauth No. 91.218.xxx.xxx

    ISAKMP crypto nat keepalive 20

    !

    Configuration group customer isakmp crypto VPN_dialin

    key

    DNS 192.168.198.4

    domain example.com

    pool VPN

    ACL VPN

    Crypto isakmp VPNclient profile

    match of group identity VPN_dialin

    client authentication list VPN_Users

    ISAKMP authorization list VPN_Users

    client configuration address respond

    !

    Crypto ipsec security association idle time 3600

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac hostb-transform

    transport mode

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-SHA-LZS, hmac-sha-esp esp - aes comp-lzs

    !

    !

    crypto dynamic-map vpn-dynamic-map 10

    game of transformation-ESP ESP-AES-128-SHA-AES-128-SHA-LZS

    Define VPNclient isakmp-profile

    !

    !

    !

    HostB-cryptomap 1 ipsec-isakmp crypto map

    the value of 91.218.xxx.xxx peer

    the transform-set hostb-transform value

    PFS group2 Set

    corresponds to hostb-address list

    !

    dynamic map crypto hostb-crytomap 65535-isakmp ipsec vpn-dynamic-map

    !

    !

    !

    !

    !

    !

    Tunnel1 interface

    bandwidth 100000

    IP vrf forwarding vl199

    IP 10.0.201.2 255.255.255.0

    IP 1400 MTU

    IP nat inside

    IP virtual-reassembly

    IP ospf network point

    source of Dialer1 tunnel

    destination 91.218.xxx.xxx tunnel

    bandwidth tunnel pass 10000

    bandwidth tunnel receive 50000

    !

    interface Dialer1

    Description # PPPoE T-Online.

    MTU 1492

    bandwidth 50000

    IP ddns update hostname it-s - dd.dyndns.org

    IP ddns update it-s-dd_dyndns_org

    the negotiated IP address

    NAT outside IP

    IP virtual-reassembly max-pumping 512

    encapsulation ppp

    IP tcp adjust-mss 1452

    no ip mroute-cache

    Dialer pool 1

    Dialer idle-timeout 0

    persistent Dialer

    KeepAlive 20

    No cdp enable

    Authentication callin PPP chap Protocol

    PPP chap hostname

    PPP chap password 7

    PPP pap sent-username password 7

    PPP ipcp dns request

    card crypto hostb-cryptomap

    Crypto ipsec fragmentation after encryption

    !

    !

    local pool IP VPN 192.168.196.30 192.168.196.60

    IP forward-Protocol ND

    IP route 0.0.0.0 0.0.0.0 Dialer1 track 1

    IP route 0.0.0.0 0.0.0.0 Tunnel1 20 Track3

    IP route 0.0.0.0 0.0.0.0 Dialer1 254

    IP route vrf vl199 0.0.0.0 0.0.0.0 192.168.1.251

    IP route vrf vl99 0.0.0.0 0.0.0.0 192.168.3.1

    !

    The dns server IP

    !

    no ip address of the http server

    no ip http secure server

    TCP-time translation nat IP 3600

    translation of nat IP udp-timeout 600

    IP nat Pat_for_192.168.198.4 192.168.198.4 pool 192.168.198.4 netmask 255.255.255.0 type

    IP nat Pat_for_192.168.200.50 192.168.200.50 pool 192.168.200.50 netmask 255.255.255.0 type

    IP nat inside source static 5060 udp interface 192.168.200.50 Dialer1 5060

    IP nat inside source static tcp 192.168.200.51 3389 3389 Dialer1 interface

    IP nat inside source static tcp 192.168.198.4 3389 interface Dialer1 3390

    IP nat inside source static tcp 192.168.198.9 interface 5000 Dialer1 5000

    IP nat inside source overload map route dialer1 interface Dialer1

    IP nat inside interface 13001 static udp 192.168.199.3 source Dialer1 13001

    IP nat inside interface 32768 static udp 192.168.179.2 source Dialer1 32768

    IP nat inside source static udp 192.168.179.2 Dialer1 49152 49152 interface

    IP nat inside interface 64206 static udp 192.168.179.2 source Dialer1 64206

    IP nat inside source static udp 192.168.179.2 interface 7597 Dialer1 7597

    IP nat inside source static tcp 192.168.179.2 9998 interface Dialer1 9998

    IP nat inside source static tcp 192.168.179.2 7597 interface Dialer1 7597

    IP nat inside source static tcp 192.168.179.2 64206 interface Dialer1 64206

    IP nat inside source static tcp 192.168.179.2 Dialer1 49152 49152 interface

    IP nat inside source static tcp 192.168.179.2 Dialer1 32768 32768 interface

    IP nat inside source static tcp 192.168.198.4 interface 443 443 Dialer1

    IP nat inside destination list Pat_for_192.168.198.4 pool Pat_for_192.168.198.4

    IP nat inside destination list Pat_for_192.168.200.50 pool Pat_for_192.168.200.50

    !

    Pat_for_192.168.198.4 extended IP access list

    Note = Pat_for_192.168.198.4 =-

    permit tcp any any eq www

    permit tcp any any eq 987

    permit tcp any any eq 143

    permit tcp any any eq 993

    permit tcp any any eq pop3

    permit tcp any any eq 995

    permit tcp any any eq 587

    permit tcp any any eq ftp

    permit tcp any any eq ftp - data

    permit tcp any any eq smtp

    Pat_for_192.168.200.50 extended IP access list

    Note = Pat_for_192.168.200.50 =-

    allow udp everything any 10000 20000 Beach

    permit tcp everything any 5222 5223 Beach

    allow udp any any eq 4569

    permit any any eq 5060 udp

    list of IP - VPN access scope

    IP 192.168.198.0 allow 0.0.0.255 192.168.196.0 0.0.0.255

    permit ip host 80.153.xxx.xxx 192.168.196.0 0.0.0.255

    list hostb extended IP access list

    permit ip host 91.218.xxx.xxx host 80.153.xxx.xxx

    permit ip host 80.153.xxx.xxx host 91.218.xxx.xxx

    permit ip host 10.0.201.2 10.0.201.1

    !

    !

    access-list 10 permit 192.168.200.6

    access-list 100 permit ip 192.168.0.0 0.0.255.255 everything

    access-list 100 permit ip 10.1.0.0 0.0.255.255 everything

    access-list 100 permit ip 10.0.0.0 0.0.255.255 everything

    access-list 101 permit ip 192.168.199.3 host everything

    access-list 101 permit ip 192.168.199.4 host everything

    access-list 101 permit ip 192.168.199.13 host everything

    access-list 101 permit ip 192.168.199.14 host everything

    access list 101 ip allow any host 204.13.162.123

    access-list 103 allow ip 10.0.1.0 0.0.0.255 any

    !

    dialer1 allowed 10 route map

    corresponds to the IP 100

    match interface Dialer1

    !

    !

    ####################################################################################################

    SH crypto isakmp his:

    status of DST CBC State conn-id slot

    91.218.xxx.xxx 80.153.xxx.xxx QM_IDLE 7 0 ACTIVE

    80.153.248.167 QM_IDLE 12 0 ASSETS

    ######################################################################################

    SH encryption session

    Current state of the session crypto

    Interface: Virtual-Access5

    The session state: down

    Peer: port of 91.218.xxx.xxx 500

    FLOW IPSEC: allowed ip host 10.0.201.2 10.0.201.1

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed ip host 80.153.xxx.xxx host 91.218.xxx.xxx

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed ip host 91.218.xxx.xxx host 80.153.xxx.xxx

    Active sAs: 0, origin: card crypto

    Interface: Dialer1

    The session state: UP-NO-IKE

    Peer: port of 91.218.xxx.xxx 500

    IKE SA: local 80.153.xxx.xxx/500 remote 91.218.xxx.xxx/500 inactive

    FLOW IPSEC: allowed ip host 10.0.201.2 10.0.201.1

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed ip host 80.153.xxx.xxx host 91.218.xxx.xxx

    Active sAs: 4, origin: card crypto

    FLOW IPSEC: allowed ip host 91.218.xxx.xxx host 80.153.xxx.xxx

    Active sAs: 0, origin: card crypto

    Interface: Dialer1

    The session state: IDLE-UP

    Peer: port of 55033

    ITS IKE: local 80.153.xxx.xxx/4500 distance 55033 Active

    ################################################################################################################################

    Error message:

    020932: 2 Oct 21:55:14.459 CEST: IPSEC (validate_transform_proposal): No IPSEC cryptomap is to address local 80.153.xxx.xxx

    020933: 2 Oct 21:55:14.459 CEST: IPSEC (validate_proposal_request): part #1 of the proposal

    (Eng. msg key.) Local INCOMING = 80.153.xxx.xxx, distance =,.

    local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    remote_proxy = 192.168.196.32/255.255.255.255/0/0 (type = 1),

    Protocol = ESP, transform = esp - esp-md5-hmac (Tunnel-UDP).

    lifedur = 0 and 0kb in

    SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 400

    020934: 2 Oct 21:55:14.459 CEST: IPSEC (validate_transform_proposal): No IPSEC cryptomap is to address local 80.153.xxx.xxx

    020935: 2 Oct 21:55:14.459 CEST: IPSEC (validate_proposal_request): part #1 of the proposal

    (Eng. msg key.) Local INCOMING = 80.153.xxx.xxx, distance = ,.

    local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    remote_proxy = 192.168.196.32/255.255.255.255/0/0 (type = 1),

    Protocol = ESP, transform = null esp esp-md5-hmac (Tunnel-UDP).

    lifedur = 0 and 0kb in

    SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 400

    #################################################################################################

    I tried to understand where is my mistake, can someone help me find it?

    Thank you very much

    concerning

    crypto map hostb-crytomap 65535 ipsec-isakmp dynamic vpn-dynamic-map

    is the fault of typing in the name as in your original config?

    --
    Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
    http://www.Kiva.org/invitedBy/karsteni

  • Install HRCS9.0 Linux question: the application designer and Tuxedo domain Boot have SQL error

    People,


    Hello. I was installing HCM and Campus Solution 9.0 with PeopleTools8.53. Server machine is Oracle Linux 5.10 and Windows XP-based client computer.  The architecture of my internet is WebLogic11g/Tuxedo11g/OracleDatabase 11 GR 1 material. PeopleTools 8,53 works correctly in the browser.

    In the database server Oracle Linux 5.10 machine, I run scripts 'createdb10.sql, utlspace.sql, hrcddl.sql, dbowner.sql, psroles.sql, psadmin.sql and connect.sql' one by one. Can I use Data Mover to load Windows XP data into the Oracle Linux 5.10 DB HRCS90 instance. The Data Mover script hrcs90ora.dms is done correctly in Windows XP. Configuration Manager is configured correctly.  But when I login in the application designer, I can't connect and get the message as below:


    «Security Table Manager (Get): the database is release 8.52.»  The PeopleTools running require databases at 8.53 release. »


    I followed the http://docs.oracle.com/cd/E37306_02/psft/acrobat/PeopleTools-8.53-Upgrade_02-2013.pdf document to upgrade HCM and HR 9.0 revision 5 Database Instance HRCS90 in Oracle Database Server with Linux. My upgrade is complete. The above problem is solved.

    When I login in the application designer in Windows XP, the error message as below:

    File: E:\pt853-903-R1-retail\peopletools\src\pssys\stmget.cpp SQL error.

    Stmt #: 2539 error Position: 26 back: 904-ORA-00904: "OPERPSWDSALT": invalid identifier:

    Fail SQL Stmt:

    Select the VERSION, OPERPSWD, OPERPSWDSALT, ENCRYPTED, SYMBOLICID, ACCTLOCK from myAccessId.PSOPRDEFN where OPRID =: 1

    When I boot the Tuxedo Application Server Domain HRCS90 under Linux, I get the same error message as below:

    File:/VOB/PeopleTools/src/pssys/stmget.cpp an SQL error:

    Stmt #: 2539 error Position: 26 back: 904-ORA-00904: "OPERPSWDSALT": invalid identifier:

    Fail SQL Stmt:

    Select the VERSION, OPERPSWD, OPERPSWDSALT, ENCRYPTED, SYMBOLICID, ACCTLOCK from myAccessId.PSOPRDEFN where OPRID =: 1

    ... ...

    GenMessageBox (0,0,M): Signon database: could not access the HRCS90 database with user Psalm code

    I checked the PSOPRDEFN table in the database Linux HRCS90, not the OPERPSWDSALT field.

    I also checked the connection process PS the user traverses the 3 tables: PSOPRDEFN and PSACCESSPRFL, PSSTATUS.

    My oprid, the symbolicid and the accessid ownerid in the 3 tables are correct.

    My question is:

    Why is there a strange OPERPSWDSALT field in the SQL statement that causes Signon failed?  How to solve the problem of access code?

    Thank you.

    > Then it connects with SQL > and then run script rel853.sql, but its outcome is not just because the database is started with sysdba.

    The database is always started '' as sysdba. '' "Useless" to connect as sysdba to run the PSoft script while accessid.

    You need to come back in the book of the Oracle.

    Fair enough, this is my last word to this thread.

    Nicolas.

  • A few questions about the design of Data Guard

    Hi, I have a few basic questions around design Data Guard

    Q1. Looking at the instructions of Oracle for the creation of a logical standby, he recommends first creating a physical standby and then convert waiting logic. However, I thought that a logical standby might have a totally different physical structure of the primary. How can this be the case if a logical standby first starts his life pending physical (where the structure must be the same)?

    Q2. It is a normal practice to back up your database before as well - if yes why?

    Q3. Can RMAN back up a database of the day before while he is in the State mounted (rather than opening it)?

    Q4. What is the point of cascade redo apply rather than just get the primary ship to each standby?

    I guess you could try to reduce the latency of node to node if some the day before were quite remote from the primary

    Q5. Is it possible to convert a physical logical Standby?

    Q6. What number best of Standby, you can have - Oracle suggests 30 but I thought I remember reading somewhere regarding the 11 GR 2, that this limit has now been increased?

    Thank you

    Jim

    Hello again;

    "begins each logical waiting first her life on hold physical?"

    Its the only way I ever did. I think it is the simple way to do it.  By the presence of a physical standby first you have already confirmed the network and most of the settings for Data Guard so that you can focus on only the logic of the standby database configuration.

    Chapter 3 of this book, it's easy:

    http://www.Visi.com/~mseberg/data_guard/new_dg_book.html

    Best regards

    mseberg

  • Question about new design java GUI tools

    I don't know where to put the Question

    I want to tool or packages to build java GUI that are quite similar to wpf

    I want a tool that provide not only the code of desinging

    is tool containing all these things

    nice design, easy

    http://www.Eclipse.org/WindowBuilder/

  • Question about the design of conditional text

    Posted in the wrong forum, post again here.

    I have a relatively important book (230 pages) with dozens of tables and 100 graphics. I need 4 versions of this book. One for each grade level (3) and the other if happy for all 3 grades is sold as a "master class".  Other than the implementation of conditional text, the book is ready to go. I tried two different ways to approach the tables under certain conditions (some of which are within blocks of text, some just anchored to a page) but I do not quite understand.  Application of conditional text tags (with different colors and markers for each) seems to crash (i.e. almost duplicatable unlike the grave 'normal' down 3-4 I feel daily last month that are just randomly). Sidenote: I was very happy to see that they will solve the crash of book printing...

    Reference markers are involved in these conditional sections, and I have my suspicions that they are guilty of the root of my other problems of crash, but then FM crashed when applying conditional text to a section that * don't * have a x - ref, so I don't know what to think.

    I need to get out Monday. So my question is, if I need 4 tables in one page (one for each version) I better just do 4 copies of the book and the compilation of this way? I sold the customer on FM mainly due to the ability to compile several book of basic documents... so, I really hate to have 4 copies when I give the source. I know that you can select rows in a table for a version (so I could do a very large table for 3 versions and simply choose different lines), but this is one thing that seems almost certain to make it crash as well.  And the paintings of masters have an extra column, but also a line so I still need 2 tables by doc so I could get the conditional statements to stop crashing. Is there a better way to 'design', which could suggest an experienced FMer? Some custom utility which works even if it isn't free?

    Just in case someone asks:

    The system configuration

    FM 11

    new facility in August, not upgraded

    All the files are originally from FM11 and new

    Windows 7-64 bit

    20 GB of memory

    2 TB - local disc c /.

    Thanks for your suggestions on this.

    Well, it didn't crashed this morning when I put the x back references in the conditional table. Sent to fmerror with the steps for dupe.

    But on the mif wash. I've done it "manually" once a week now for the last two weeks. Can't say if it is to help, but it is always recommended, so I do. However, I was wondering if anyone had a recursive script that would do this automagically...

    Thank you

    Laurie

    Edit:

    Search mif washing (and variants) and nothing gets on the Adobe site. I figured out through a vague reference to an old thread where to find it and thought that I note for new users: If there is...

    Book MIF Wash is that a utility provided by Adobe that recursively traverses all the files in your book, opens, writes the .mif file then re-recorded this file to your FM - washing apparently file everything watered in your FM file. Manually, this process takes forever. And even if you see frequent references to: did you do a mifwash yet? "when someone has a problem, there is no documentation on what I found.

    It is a "sample" allowing Adobe script.

    Go whenever you have installed FrameMaker and navigate to the BookMIFWash folder or browse to the file BookComponentMIFWash.dll, which in my case was to C:\Program Files (x 86) \Adobe\AdobeFrameMaker11\Samples\ScriptsAndUtilities\BookMIFWash.

    Copy the file BookComponentMIFWash.dll in C:\Program Files (x 86) \Adobe\AdobeFrameMaker11\fminit.

    Restart the console.

    Then you will see that nothing has changed.  ;-)

    You must select the book with your mouse in the Document window, and then the menu item utilities book "dynamically" appears. Down there, you will find some MIF Wash book.

    I always pay attention to the warning to make sure that I have a copy of the entire project before running it. :-)

    Hope this helps someone else.

  • question of program design

    Hi, I'm working on my first blackberry and I'm running difficulties with my design decision, so I hope someone could clarify.

    Every time I have airs in .net, I would use the MVC pattern. My will would execute a custom event defined in the regulator and I think could capture this event. However, I don't know how I can do this for blackberry. I have a text in my view field and a class that extends buttonfield in the model. I would like to set the button to have some effect on the text field, but I don't know how to get the message without the screen to each button.

    How is this bit?

    Thanks for your help

    Well technically the best design is a Singleton model, but to be honest, I don't know how they actually work. It all depends on how you look at. This global semi variable are not available outside of an instance of your application, and you are not likely to have a large development on a BlackBerry app team, so the chances of your loss of its security program or stability due to the interference is low. I know that experienced programmers and professors who are religious opposition to global variables, but they certainly have their place, and I see no problem with taking advantage of this feature you are proposing. The key thing to remember for the development of BlackBerry, it is that mobile devices are not as powerful as a PC or console. Developers are encouraged to take advantage of multi-threading to maximize efficiency and avoid the garbage collection (in other words, create variables with limited scope that are released from memory. This memory must be systematically freed by the garbage collector). Another good practice is to stick to the condensed syntax (aka shortcut).

    For example:

    If (event) {/ * action * /}

    Instead of...

    If (event == true) {/ * action * /}

    Hope that helps,

    ~ Dom

  • VPN - question of General design for a ut of a router tunnel more

    Hello

    We have a router that has VPN connections with different partners of our company. VPN remote access were used on computers that are connecting to the different partners of our company.

    There has been problems of this kind, that is to say put on both a watchdog and a customer vpn cisco router led to blue-screens on the PC.

    The current idea is to put different tunnels from site to site on the router (default gateway of PC clients that connect to the partners). My question is... How our PC to get DHCP addresses on networks of visitors, once the tunnels are up? I guess I'm alittle confused about the address for the PC on our side how will work.

    Thanks for your help.

    Divide the pool of ip from the internal network, you're going to visit. for example the document below will be exaplain the same configuration in user mode.

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a00806ab788.shtml

Maybe you are looking for