TCS registration name

Is it possible to automacitally entry date on behalf of recording using the recording alias?

Hi, Patrick!

On a TCS S5.3 it works very well for me.

There are 'name' in the 'default registration information". If I let it is empty, it will use

the recording Alias name + Date.

And this is how it is, 'TEST Alias' is the record and all Alias name which would be:

Tags: Cisco Support

Similar Questions

  • Script for the registration name of the user connected to PC Windows7?

    Is there a script to add the name of the user logged in Windows7 PC in a textField?

    Hello

    This will require a script folder level, some JS which must be copied on the machine for everyone who uses your form.  There are more details here Re: retrieve current user info

    Concerning

    Bruce

  • WINDOWS 7, THE REGISTRATION OF THE NAME, ADDRESS AND ADDRESS MAC COMPUTERS.

    WINDOWS 7, THE REGISTRATION OF THE NAME, ADDRESS AND ADDRESS MAC COMPUTERS.

    I would ask that if registration name and address Professional operating system of windows 7 is possible, so that when my computer sends ' ADVANCED MEMBERSHIP CARDS REPORT INFORMATION ' to Microsoft about any strange goings on or conclusions, technicians can be activated to offer Microsoft enterprise with service offerings more personalized friendly customer (as the service intel offer)

    Registration is optional and doesn't give any written

    Activation is a requirement.

    MS receives no personally identifiable information in any Activation

  • record = parameter names of causing URL 93652 FRM in FORMS 11 g

    Hi all

    I have an application of Forms 11 g. When I run the application via a web browser, it works fine but when I add the parameter 'registration = names' on the url of the form, 1 point, it fails with the following error is displayed in a dialog box

    "FRM-93652: the runtime process is completed abnormally."

    The reason why I'm adding the parameter is, I do a load test from the Forms application using Application Testing Suite (ATS) and this OpenScript, during recording, will add this default setting and therefore the save fails as the same point.

    Suggestions or problems with the parameter 'registration = names' in FORMS11g?

    Thank you and best regards,
    Navaneethan Singh

    If you have access to Metalink take a look at

    Bug 9438799: FORMS FAIL WITH FRM-93652 WHEN SAVE = NAMES IS DEFINED AND LOV IS ACCESSIBLE

    see you soon

  • Networking Vista disabled; IP config utility has a problem

    Embarrassing problem, wasted days trying to solve with the help of RoadRunner and SuperMicro technicians without success. Local connect only to the unidentified network (LAN SSA previous Setup) disappeared.  RoadRunner tests indicate the NETWORK card is defective (cable modem not seeing NIC); but internally, adapter is ping successfully so SuperMicro says that the adapter is fine! :(  No data of IPv6 in the network connection details; Is a local LAN connectivity status IPv4, IPv6 is limited, records the speed at 100 Mbit / s. activity packages sent but no follow-up. Microsoft Security Essentials, not 3rd party anti-virus running. Ran ipconfig to release/restore IPv6, got the error message there is no file. Ipconfig also generates the error message with most of the commands: "configuration utility IP has stopped working. A problem caused the blocking of the program works correctly. "ipconfig/displaydns command generates a file name? The line up is "1.0 ~.ip6.arpa [total: 31 zeros with periods between each of them]. The next line "registration name" has the same string of number zero. Nothing is able to dissolve this barrier. How can I fix?

    Ping the network adapter internal network address cannot tell you if the network card works. See if UN-installing and reinstalling, it helps. If it isn't, I suspect that the network adapter is down.

    Boulder computer Maven
    Most Microsoft Valuable Professional

  • HP PhotoSmart Premium C310A e -: remove C310 PhotoSmart Premium HP eprint email address

    Sell the printer listed, which is like new.  It was connected to my home network and I set up an email address of the printer in order to to use HP ePrint.  The printer was also recorded in my name when it was purchased.  How can I delete my registration name and delete the email address of the printer so that the new owner can take advantage of these features - less any association of my personal information.  Thank you

    Hello

    If you connect your HP connected account and on the devices tab, view the settings and then click on delete printer, which will leave it ready for the new owner configuration to add to his CV connected account.

    They'll be forced to create a new e-mail address for the printer.

  • Automatically add the MCU recorded lectures

    Hi all

    When you create a conference call between and endpoint and a registration server, the MCU should be automatically added to these conferences. At present, the MCU will only add itself when the particular codec models are currently in use.

    for example

    Click new conference, add ONE of the following, codec models

    1700MXP
    770mxp
    880MXP
    Edge 95MXP
    3000MXP

    Add TCS registration server and it WORKS, the MCU is automatically added. This allows us to customize the page layout (we generally to mute the video of the CSTC). See green arrow in the attached jpeg.

    Repeat the process on any of these models.

    C40
    SX80
    SX20
    C20
    EX60
    Polycom HDX 8000 HD
    6000MXP

    Now, it fails. The MCU not will automatically itself add to the Conference. See the red arrow in the attached jpg.

    Any ideas? The only thing that I know so far is that its broad base of model of endpoint. I have searched on the parameters of MCU, MSDS etc but can't find anything related to this at all.

    Thank you very much

    Rhys

    Don't know why the MCU is automatically added for some endpoints and not others without knowing more about the configuration keys and the option on the endpoints.

    If you want the MCU to always add to scheduled conferences, you must set the following options under administrative tools > Configuration > conference settings:

    1. External MCU use in routing: always
    2. MCU route Type preferred: Cisco TelePresence MCU

    The configuration of this setting is the only way to ensure an MCU is always included, please note that this is a system wide setting and will affect all scheduled conferences regardless of the number of participants and who they are.  If you wish, you can also set the first option above 'Always, except for point to point', which will allow you to choose when the SCM must be used if you have rather a choice between point-to-point and multipoint calls using the MCU.

  • ASA to AWS VPN question

    I have problems with our VPN to AWS. The configuration of the firewall is below:

    Firewall 1

    !
    hostname FW
    activate the password
    names of

    !
    interface GigabitEthernet0/0
    Description Inside_To_SW-DISTRIBUTION-01_Gi1/0/2
    nameif LAN
    security-level 100
    IP address 172.16.x.1 255.255.252.0
    !
    interface GigabitEthernet0/1
    Description Outside_To_SW-DISTRIBUTION-01_Gi1/0/1
    nameif WAN
    security-level 0
    IP address 212.x.x.201 255.255.255.248 watch 212.x.x.202
    !
    !
    interface Management0/0
    management only
    nameif management
    security-level 100
    IP address 10.x.x.x 255.255.255.0
    !
    boot system Disk0: / asa913-smp - k8.bin
    passive FTP mode
    clock timezone GMT/UTC 0
    summer time clock GMT/BDT recurring last Sun Mar 01:00 last Sun Oct 02:00
    DNS domain-lookup LAN
    DNS server-group DefaultDNS
    Name-Server 8.8.8.8
    4.4.4.4 server name
    permit same-security-traffic intra-interface
    network of the object OBJ-LAN-SUB-NETWORK
    subnet 172.x.128.0 255.255.252.0
    object OBJ-POOL-A network
    range 212.x.x.195 212.x.x.196
    object obj-SrcNet network
    subnet 0.0.0.0 0.0.0.0
    network of object obj-amzn
    10.32.0.0 subnet 255.255.0.0

    gamma of network object
    subnet 88.215.48.0 255.255.240.0
    tinet network object
    subnet 89.149.128.0 255.255.192.0

    object-group service DM_INLINE_SERVICE_1
    ICMP service object
    the purpose of the echo icmp message service
    response to echo icmp service object
    object-group service DM_INLINE_SERVICE_2
    ICMP service object
    the purpose of the echo icmp message service
    response to echo icmp service object
    object-group service DM_INLINE_SERVICE_3
    ICMP service object
    the purpose of the echo icmp message service
    response to echo icmp service object
    object-group service DM_INLINE_SERVICE_4
    ICMP service object
    the purpose of the echo icmp message service
    response to echo icmp service object
    DM_INLINE_TCP_1 tcp service object-group
    port-object eq www
    EQ object of the https port
    object-group Protocol TCPUDP
    object-protocol udp
    object-tcp protocol
    object-group service DM_INLINE_SERVICE_5
    SIP service-purpose tcp - udp destination eq
    the purpose of the service tcp destination eq www
    the purpose of the tcp destination eq https service
    the purpose of the tcp destination eq ldap service
    area of service-object udp destination eq
    the purpose of the udp destination eq ntp service
    object-group service tcp imp
    EQ object Port 5222
    rtp udp service object-group
    60000 10000 port-object range
    object-group service tcp sip1
    port-object eq 8011
    object-group service sip2 tcp
    port-object eq 5080
    DM_INLINE_TCP_2 tcp service object-group
    port-object eq ftp
    port-object eq ftp - data
    EQ port ssh object
    object-group service DHCP udp
    port-object eq bootps
    DHCPrange udp service object-group
    ports of DHCP Description
    Beach of port-object bootps bootpc

    object-group grp-voip network
    gamma of network-object object
    network-object object tinet

    LAN_access_in list extended access allowed object-group DM_INLINE_SERVICE_3 object OBJ-LAN-SUB-NETWORK any4
    LAN_access_in list extended access allowed object-group TCPUDP object OBJ-LAN-SUB-NETWORK any eq field
    LAN_access_in list extended access allowed object OBJ-LAN-SUB-NETWORK ip everything
    LAN_access_in list extended access permitted ip 10.x.x.x 255.255.255.0 everything
    LAN_access_in list extended access udp allowed any any DHCP object-group
    list of access TUNNEL of SPLIT standard allowed 172.16.x.0 255.255.252.0

    extended access list acl-amzn allow any4 ip 10.32.0.0 255.255.0.0
    extended access list acl-amzn allow icmp any4 10.32.0.0 255.255.0.0

    global_access deny ip extended access list a whole

    10.32.0.0 IP Access-list extended filter amzn 255.255.0.0 allow 172.16.128.0 255.255.252.0
    refuse the access-list extended ip a whole amzn-filter

    WAN_access_out list extended access allowed object-group DM_INLINE_SERVICE_4 object OBJ-LAN-SUB-NETWORK any4
    WAN_access_out list extended access allowed object-group DM_INLINE_SERVICE_5 object OBJ-SUB-LAN-NETWORK-object-group grp-voip
    WAN_access_out list extended access permitted udp object OBJ-SUB-LAN-NETWORK-object-group grp-voip-group of objects rtp
    permit WAN_access_out to access extensive ip list object OBJ-LAN-SUB-NETWORK object obj-amzn
    WAN_access_out list extended access allowed object-group TCPUDP object OBJ-LAN-SUB-NETWORK any eq field
    WAN_access_out list extended access permitted tcp object OBJ-LAN-SUB-NETWORK any4 object-group DM_INLINE_TCP_1
    WAN_access_out list extended access permit tcp any any DM_INLINE_TCP_2 object-group
    WAN_access_out of access allowed any ip an extended list
    permit access list extended ip host 52.17.201.49 WAN_access_in 212.84.183.201
    permit access list extended ip host 52.18.197.187 WAN_access_in 212.84.183.201

    pager lines 24
    Enable logging
    emergency logging console
    emergency logging monitor
    exploitation forest asdm warnings
    MTU 1500 LAN
    MTU 1500 WAN
    management of MTU 1500

    ICMP unreachable rate-limit 1 burst-size 1
    ICMP allow any WAN

    ARP timeout 14400
    no permit-nonconnected arp
    NAT (LAN, WAN) source static obj-SrcNet obj-SrcNet destination static obj-amzn obj-amzn
    NAT (LAN, WAN) static source any any destination static OBJ ANYCONNECT-SUB-NETWORK-OBJ-ANYCONNECT-UNDER-NETWORK non-proxy-arp-search directions
    !
    network of the object OBJ-LAN-SUB-NETWORK
    OBJ-POOL-A dynamic pool pat flat interface include the NAT (LAN, WAN) reserves
    !
    OBJ-ANYCONNECT-SUB-NETWORK dynamic interface source NAT (all, WAN) after the automatic termination
    LAN_access_in access to the LAN by-user-override interface group
    WAN_access_in access to the WAN interface group
    Access-group WAN_access_out WAN interface
    Access-Group global global_access
    Route WAN 0.0.0.0 0.0.0.0 212.x.x.x 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
    Sysopt connection tcpmss 1387
    SLA 1 monitor
    type echo protocol ipIcmpEcho 10.x.x.x WAN interface
    frequency 5
    SLA monitor Appendix 1 point of life to always start-time now

    Crypto ipsec transform-set transform-amzn ikev1 aes - esp esp-sha-hmac
    replay window-size 128 ipsec encryption security association
    Crypto ipsec pmtu aging infinite - the security association
    Crypto ipsec WAN clear-df df - bit

    card crypto amzn_vpn_map 1 match address acl-amzn
    card crypto amzn_vpn_map 1 set pfs
    amzn_vpn_map card crypto peer 52.17.201.x 52.18.197.x 1jeu
    amzn_vpn_map 1 set transform-set transform-amzn ikev1 crypto card
    amzn_vpn_map card crypto 1 lifetime of security set association, 3600 seconds
    card crypto amzn_vpn_map WAN interface
    Crypto ca trustpoint ASDM_TrustPoint0
    Terminal registration
    name of the object CN = FW-INTERNET-LON
    Configure CRL
    trustpool crypto ca policy
    crypto isakmp identity address
    Crypto ikev2 enable port 443 of the WAN-customer service
    Crypto ikev1 enable WAN
    IKEv1 crypto policy 201
    preshared authentication
    aes encryption
    sha hash
    Group 2
    lifetime 28800
    Telnet timeout 5
    SSH 0.0.0.0 0.0.0.0 WAN
    SSH timeout 5
    SSH version 2
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    source of x.x.x.x server NTP WAN
    WebVPN
    Select the WAN
    AnyConnect enable
    tunnel-group-list activate
    GroupPolicy_ANYCONNECT-group-policy PROFILE internal
    attributes of Group Policy GroupPolicy_ANYCONNECT-PROFILE
    value of server DNS 8.8.8.8 4.4.4.4
    client ssl-VPN-tunnel-Protocol
    Split-tunnel-policy tunnelspecified
    IPv6-split-tunnel-policy excludespecified
    crowdmix.me value by default-field
    activate dns split-tunnel-all
    internal filter group policy
    attributes to filter group policy
    VPN-value amzn-filter

    tunnel-group ANYCONNECT-PROFILE type remote access
    tunnel-group ANYCONNECT-PROFILE general-attributes
    ANYCONNECT-POOL address pool
    GroupPolicy_ANYCONNECT-PROFILE of default-group-strategy
    tunnel-group ANYCONNECT-PROFILE webvpn-attributes
    enable ANYCONNECT-PROFILE Group-alias
    tunnel-group 52.17.201.x type ipsec-l2l
    tunnel-group 52.17.201.x General-attributes
    filter by default-group-policy
    52.17.201.x group of tunnel ipsec-attributes
    IKEv1 pre-shared-key *.
    ISAKMP keepalive retry threshold 10 3
    tunnel-group 52.18.197.x type ipsec-l2l
    tunnel-group 52.18.197.x General-attributes
    filter by default-group-policy
    52.18.197.x group of tunnel ipsec-attributes
    IKEv1 pre-shared-key *.
    ISAKMP keepalive retry threshold 10 3
    tunnel-group 52.30.177.x type ipsec-l2l
    tunnel-group 52.31.131.x type ipsec-l2l
    !
    ICMP-class class-map
    match default-inspection-traffic
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map icmp_policy
    icmp category
    inspect the icmp
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    !
    global service-policy global_policy
    icmp_policy service-policy interface WAN
    context of prompt hostname
    !
    Booking Jumbo-image
    !
    no remote anonymous reporting call
    Cryptochecksum:ff493f0ff375e83710e6bc9d19476e0e
    : end

    When I add a second VPN connection by using the commands below:

    object obj-amzn2 network

    10.34.0.0 subnet 255.255.0.0

    NAT (LAN, WAN) source static obj-SrcNet obj-SrcNet destination static obj-amzn2 obj-amzn2

    I see the tunnels going up, however, we immediately begin to see the Voip system lose the SIP traffic with its servers, and even if you can still use internet if you have an open socket you can not create a new session. It looks like a problem of routing for me, but I can't seem to find the place where

    Any help greatly appreciated

    So, you want to have two virtual private networks from Amazon to blocks of different destinations, 10.32.0.0/16, and 10.34.0.0/16, correct?

  • After Anyconnect I can't access to asa and LAN

    Dear all,

    My office use ASA 5505 and I use anyconnect from outside (sometimes overseas), I can connect to my network and business by ASA, internet access, but I can't access ASA and LAN (network of my client). WHY?

    Office 192.168.10.0/24

    192.168.11.0/24 VPN

    How can I solve this problem?

    ASA Version 9.2 (3)
    !
    ciscoasa hostname
    activate the encrypted password of XXXXXXXXXX
    volatile xlate deny tcp any4 any4
    volatile xlate deny tcp any4 any6
    volatile xlate deny tcp any6 any4
    volatile xlate deny tcp any6 any6
    volatile xlate deny udp any4 any4 eq field
    volatile xlate deny udp any4 any6 eq field
    volatile xlate deny udp any6 any4 eq field
    volatile xlate deny udp any6 any6 eq field
    passwd encrypted XXXXXXXXXX
    names of
    192.168.11.1 mask - 192.168.11.10 local pool Pool VPN IP 255.255.255.0
    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP address 192.168.10.254 255.255.255.0
    !
    interface Vlan2
    nameif outside
    security-level 0
    address IP AAA. BBB. CCC DDD EEE. FFF. GGG. HHH
    !
    boot system Disk0: / asa923 - k8.bin
    passive FTP mode
    clock timezone 8 HKST
    DNS domain-lookup outside
    DNS server-group DefaultDNS
    Name-Server 8.8.8.8
    Server name 8.8.4.4
    permit same-security-traffic intra-interface
    network of the VPN_Pool object
    subnet 192.168.11.0 255.255.255.240
    network of the NETWORK_OBJ_192.168.10.0_24 object
    192.168.10.0 subnet 255.255.255.0
    inside_access_in of access allowed any ip an extended list
    outside_access_in list extended access permit icmp any one
    DefaultRAGroup_splitTunnelAcl_1 list standard access allowed 192.168.10.0 255.255.255.0
    pager lines 24
    Enable logging
    asdm of logging of information
    Within 1500 MTU
    Outside 1500 MTU
    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image disk0: / asdm-731 - 101.bin
    don't allow no asdm history
    ARP timeout 14400
    no permit-nonconnected arp
    interface NAT (outside, outside) dynamic source VPN_Pool
    NAT (inside, outside) static source any any static destination VPN_Pool VPN_Pool non-proxy-arp-search to itinerary
    !
    !
    NAT source auto after (indoor, outdoor) dynamic one interface
    inside_access_in access to the interface inside group
    Access-group outside_access_in in interface outside
    Route outside 0.0.0.0 0.0.0.0 AAA. BBB. CCC DDD. 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    identity of the user by default-domain LOCAL
    Activate Server http XXXXX
    http 192.168.10.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
    Crypto ipsec ikev2 ipsec-proposal OF
    encryption protocol esp
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 proposal ipsec 3DES
    Esp 3des encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES
    Esp aes encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES192
    Protocol esp encryption aes-192
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 AES256 ipsec-proposal
    Protocol esp encryption aes-256
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec pmtu aging infinite - the security association
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
    Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-192-SHA ESP-AES-256-SHA SHA-ESP-3DES ESP-DES-SHA ESP-AES-128-SHA-TRANS ESP-AES-192-SHA-TRANS ESP-AES-256-SHA-ESP ESP-3DES-SHA-TRANS TRANS-DES-SHA-TRANS
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
    outside_map interface card crypto outside
    Crypto ca trustpoint ASDM_TrustPoint0
    Terminal registration
    name of the object CN = ciscoasa
    Configure CRL
    Crypto ca trustpoint Anyconnect_Self_Signed_Cert
    registration auto
    name of the object CN = ciscoasa
    Configure CRL
    Crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0
    registration auto
    name of the object CN = 115.160.145.114, CN = ciscoasa
    Configure CRL
    trustpool crypto ca policy
    string encryption ca Anyconnect_Self_Signed_Cert certificates
    certificate 5c7d4156
    308202d 4 308201bc a0030201 0202045c 415630 0d06092a 864886f7 0d 010105 7 d
    0500302c 3111300f 06035504 03130863 6973636f 61736131 17301506 092a 8648
    09021608 63697363 6f617361 31353131 31303131 31363231 301e170d 86f70d01
    5a170d32 35313130 37313131 3632315a 302 c 3111 55040313 08636973 300f0603
    636f6173 61311730 1506092a 864886f7 0d 010902 16086369 73636f61 73613082
    0122300d 06092 has 86 01010105 00038201 0f003082 010a 0282 010100cc 4886f70d
    af43a895 8c2c3f49 ad16c4b9 a855b47b 773f4245 1954c 728 7 c 568245 6ddc02ab
    78 c 45473 eb4073f6 401d1dca 050dc53f cfb93f58 68087f6d 03334fc 1 53f41daa
    454ff4bb 691235ab 34e21d98 4cfecef4 204e9c95 76b1b417 b5cf746c 830788b 4
    60063e89 0ffe5381 42694cf8 d1be20d4 4c95d9c6 93041af2 94783de0 fe93cf67
    4ad8954f 5392790b 4ded225c c3128cba 8d3ee07b f9fd2208 34b1956c be0a774a
    d054a290 14316cc0 1670bdea f04c828b 7f9483fb 409fa707 fbe5a257 33597fed
    ca790881 b1d4d3dc b0e1095e bf04014e 19c5cfeb f74aac57 ee39cd6e 7389cdd1
    8b9421fa ee2b99ae df07fba1 0b506cd8 ea9f64c5 dd9169ad 157fcdb7 f6cfff02
    03010001 300 d 0609 2a 864886 05050003 82010100 c8719770 1305bd9c f70d0101
    2608f039 0dc6b058 0dfe3d88 76793 has 18 8f601dda b 8553, 893 d95e3b25 30ef7354
    772f7d0b 772869d 7 372f8f5c f32992af fa2c8b6e 0f0ae4ce 4e068b8d b7916af2
    affa1953 5bfd01a6 1a3c147d 75d95d8c 1122fa85 3905f27b 2474aff4 11fff24f
    c305b648 b4c9d8d4 9dcf444b 9326cda3 0c4635d0 90ff8dd8 9444726c 82e002ec
    be120937 0414c20a 39df72fb 76cd9c38 cde9afda 019e9230 66e5dba8 ed208eae
    5faabb85 ff04f8f2 c36b724b 62ec52cc f967ee1d 1a6458fc 507a 2377 45 c 20635
    2c14c431 baac678a dcc20329 4db7aa51 02c 36904 75b5f307 f1cc056d 726bc436
    597a 3814 4ccd421d cb77d8f5 46a8ae69 2d617ac8 2160d7af
    quit smoking
    string encryption ca ASDM_Launcher_Access_TrustPoint_0 certificates
    certificate 5d7d4156
    308201f0 30820308 a0030201 0202045d 415630 0d06092a 864886f7 0d 010105 7 d
    05003046 06035504 03130863 61736131 18301606 03550403 6973636f 3111300f
    130f3131 352e3136 302e3134 352e3131 1506092a 34311730 864886f7 0d 010902
    73636f61 16086369 7361301e 170d 0d 323531 3135 31313130 31323136 35395a 17
    3111300f 06035504 03130863 6973636f 61736131 a 31303731 32313635 395, 3046
    18301606 03550403 130f3131 352e3136 302e3134 352e3131 1506092's 34311730
    864886f7 0d 010902 16086369 73636f61 73613082 0122300d 06092 has 86 4886f70d
    01010105 00038201 0f003082 010 has 0282 010100cc af43a895 8c2c3f49 ad16c4b9
    a855b47b 773f4245 1954c 728 7 c 78 45473 eb4073f6 401d1dca 568245 6ddc02ab
    050dc53f cfb93f58 68087f6d 03334fc 1 53f41daa 454ff4bb 691235ab 34e21d98
    b 830788 4 4cfecef4 204e9c95 76b1b417 b5cf746c 60063e89 0ffe5381 42694cf8
    d1be20d4 4c95d9c6 93041af2 94783de0 fe93cf67 4ad8954f 5392790b 4ded225c
    c3128cba 8d3ee07b f9fd2208 34b1956c be0a774a d054a290 14316cc0 1670bdea
    f04c828b 7f9483fb 409fa707 fbe5a257 33597fed ca790881 b1d4d3dc b0e1095e
    bf04014e 19c5cfeb f74aac57 ee39cd6e 7389cdd1 8b9421fa ee2b99ae df07fba1
    0b506cd8 ea9f64c5 dd9169ad 157fcdb7 f6cfff02 03010001 300 d 0609 2a 864886
    05050003 82010100 00089cd 3 d0f65c5e 91f7ee15 bbd98446 35639ef9 f70d0101
    45b 64956 f146234c 472b52e6 f2647ced a109cb6b 52bf5f5d 92471cb7 a3a30b63
    052ac212 c6027535 16e42908 ea37c39a 4d203be9 8c4ed8cd 40935057 3fe8a537
    a837c75c feff4dcc 1b2fd276 257f0b46 8fcd2a5c cbdcacec cd14ee46 be136ae7
    7cd4ae0d aace54fe 5187ea57 40d2af87 cded3085 27d6f5d8 1c15ef98 f95cc90e
    a 485049 4 805efa8f 63406609 a663db53 06b94e53 07c1c808 61eadcdb 2c952bee
    74a0b3dd ae262d84 40b85ec5 a89179b2 7e41648e 93f0e419 3c482b29 e482d344
    d756d450 8f0d9302 d023ac43 a31469a4 105c8a0c b1418907 693c558c 08f499ef
    364bc8ba 4543297a a17735a0
    quit smoking
    IKEv2 crypto policy 1
    aes-256 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 10
    aes-192 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 20
    aes encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 30
    3des encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 40
    the Encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    Crypto ikev2 activate out of service the customer port 443
    Crypto ikev2 access remote trustpoint Anyconnect_Self_Signed_Cert
    Crypto ikev1 allow outside
    IKEv1 crypto policy 10
    authentication crack
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 20
    authentication rsa - sig
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 30
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 40
    authentication crack
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 50
    authentication rsa - sig
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 60
    preshared authentication
    aes-192 encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 70
    authentication crack
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 80
    authentication rsa - sig
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 90
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 100
    authentication crack
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 110
    authentication rsa - sig
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 120
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 130
    authentication crack
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 140
    authentication rsa - sig
    the Encryption
    sha hash
    Group 2
    life 86400
    IKEv1 crypto policy 150
    preshared authentication
    the Encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH stricthostkeycheck
    SSH timeout 5
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    No ipv6-vpn-addr-assign aaa
    no local ipv6-vpn-addr-assign

    dhcpd 192.168.10.254 dns 8.8.8.8
    dhcpd rental 43200
    !
    dhcpd address 192.168.10.1 - 192.168.10.100 inside
    dhcpd allow inside
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    NTP AAA server. BBB. CCC. Source DDD outside prefer
    SSL-point of approval ASDM_Launcher_Access_TrustPoint_0 outside vpnlb-ip
    SSL-trust outside ASDM_Launcher_Access_TrustPoint_0 point
    WebVPN
    allow outside
    AnyConnect image disk0:/anyconnect-win-4.2.00096-k9.pkg 1
    AnyConnect profiles Anyconnect_client_profile disk0: / Anyconnect_client_profile.xml
    AnyConnect enable
    tunnel-group-list activate
    internal DefaultRAGroup_2 group strategy
    attributes of Group Policy DefaultRAGroup_2
    DNS-server AAA value. BBB. CCC AAA DDD. BBB. CCC DDD.
    Ikev2 VPN-tunnel-Protocol
    Split-tunnel-policy tunnelspecified
    internal GroupPolicy_Anyconnect group strategy
    attributes of Group Policy GroupPolicy_Anyconnect
    WINS server no
    value of server DNS 8.8.8.8 8.8.4.4
    Ikev1 VPN-tunnel-Protocol, l2tp ipsec ikev2 ssl-client
    Split-tunnel-policy tunnelall
    IPv6-split-tunnel-policy excludespecified
    value of Split-tunnel-network-list DefaultRAGroup_splitTunnelAcl_1
    by default no
    activate dns split-tunnel-all
    IPv6 address pools no
    WebVPN
    AnyConnect value Anyconnect_client_profile type user profiles
    username password XXXXXXX XXXXXXXXXXXXXXX encrypted privilege 15
    username password XXXXXXX XXXXXXXXXXXXXXX encrypted privilege 15
    attributes of username XXXXXXX
    Ikev1 VPN-tunnel-Protocol, l2tp ipsec ikev2 ssl-client
    attributes global-tunnel-group DefaultRAGroup
    address pool VPN-pool
    Group Policy - by default-DefaultRAGroup_2
    IPSec-attributes tunnel-group DefaultRAGroup
    IKEv1 pre-shared key XXXXXXXXX
    tunnel-group DefaultRAGroup ppp-attributes
    ms-chap-v2 authentication
    tunnel-group Anyconnect type remote access
    tunnel-group Anyconnect General attributes
    address pool VPN-pool
    Group Policy - by default-GroupPolicy_Anyconnect
    NAT - to-public-ip assigned inside
    tunnel-group Anyconnect webvpn-attributes
    enable Anyconnect group-alias
    tunnel-group Anyconnect ppp-attributes
    ms-chap-v2 authentication
    !
    Global class-card class
    match default-inspection-traffic
    !
    !
    World-Policy policy-map
    Global category
    inspect the dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the netbios
    inspect the tftp
    Review the ip options
    !
    service-policy-international policy global
    context of prompt hostname
    no remote anonymous reporting call
    call-home
    Profile of CiscoTAC-1
    no active account
    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
    email address of destination [email protected] / * /
    destination-mode http transport
    Subscribe to alert-group diagnosis
    Subscribe to alert-group environment
    Subscribe to alert-group monthly periodic inventory
    monthly periodicals to subscribe to alert-group configuration
    daily periodic subscribe to alert-group telemetry
    Cryptochecksum:24991680b66624113beb31d230c593bb
    : end

    Hi cwhlaw2009,

    You must configure a policy Split-tunnel, if you want to be able to access the internal and local network at the same time.

    http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-next-generation-firewalls/100936-asa8x-split-tunnel-AnyConnect-config.html

    It may be useful

    -Randy-

  • Unable to connect to the internal network of SSL VPN

    Setting the time first ASA 5512 and I did a lot of research to solve my problem but no luck. I really appreciate if I can get help.

    After having successfully connected to ASA via SSL VPN. I am only able to ping to the outside interface (10.2.11.4).

    Please check my config and I would like to know what the problem is. Thank you

    : Saved
    :
    ASA 9.1 Version 2
    !
    hostname asa-01
    domain corporate.local
    activate t8tpEme73dn9e0.9 encrypted password
    volatile xlate deny tcp any4 any4
    volatile xlate deny tcp any4 any6
    volatile xlate deny tcp any6 any4
    volatile xlate deny tcp any6 any6
    volatile xlate deny udp any4 any4 eq field
    volatile xlate deny udp any4 any6 eq field
    volatile xlate deny udp any6 any4 eq field
    volatile xlate deny udp any6 any6 eq field
    t8tpEme73dn9e0.9 encrypted passwd
    names of
    sslvpn-ip-pool 10.255.255.1 mask - 255.255.255.0 IP local pool 10.255.255.100
    !
    interface GigabitEthernet0/0
    nameif outside
    security-level 50
    IP 10.2.11.4 255.255.255.0
    !
    interface GigabitEthernet0/1
    nameif inside
    security-level 100
    IP 10.2.255.18 255.255.255.248
    !
    interface GigabitEthernet0/2
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface GigabitEthernet0/3
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface GigabitEthernet0/4
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface GigabitEthernet0/5
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Management0/0
    management only
    nameif management
    security-level 0
    IP 192.168.1.1 255.255.255.0
    !
    boot system Disk0: / asa912-smp - k8.bin
    passive FTP mode
    clock timezone STD - 7
    clock to summer time recurring MDT
    DNS domain-lookup outside
    DNS lookup field inside
    DNS server-group DefaultDNS
    Server name 10.2.9.23
    10.2.1.1 server name
    Server name 10.2.9.24
    domain corporate.local
    network of Trusted subject
    10.2.0.0 subnet 255.255.0.0
    the object to the outside network
    10.2.11.0 subnet 255.255.255.0
    network ss object
    10.2.11.0 subnet 255.255.255.0
    network of the VPNlocalIP object
    10.255.255.0 subnet 255.255.255.0
    the object of the LAN network
    10.2.9.0 subnet 255.255.255.0
    network of the VPN-INSIDE object
    subnet 10.2.255.16 255.255.255.248
    tcp4433 tcp service object-group
    port-object eq 4433
    standard access list permits 10.2.255.16 SPLIT-TUNNEL 255.255.255.248
    standard access list permits 10.2.11.0 SPLIT-TUNNEL 255.255.255.0
    host of access TUNNEL of SPLIT standard allowed 10.2.9.0 list
    global_access list extended access allowed object VPNlocalIP object LAN ip
    global_access list extended access permitted ip LAN VPNlocalIP object
    pager lines 24
    Enable logging
    asdm of logging of information
    host of logging inside the 10.2.8.8
    Debugging trace record
    Outside 1500 MTU
    Within 1500 MTU
    management of MTU 1500
    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image disk0: / asdm - 713.bin
    don't allow no asdm history
    ARP timeout 14400
    no permit-nonconnected arp
    Static NAT to destination for LAN LAN static VPNlocalIP VPNlocalIP source (indoor, outdoor)
    Access-Group global global_access
    Route outside 0.0.0.0 0.0.0.0 10.2.11.1 1
    Route inside 10.2.0.0 255.255.0.0 10.2.255.17 1
    Route inside 10.255.255.0 255.255.255.0 10.2.255.17 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    CA-Kerberos kerberos protocol AAA-server
    CA-Kerberos (inside) host 10.2.9.24 AAA-server
    Corp.PRI Kerberos realm
    identity of the user by default-domain LOCAL
    the ssh LOCAL console AAA authentication
    http server enable 4431
    http 192.168.1.0 255.255.255.0 management
    http 10.2.0.0 255.255.0.0 outside
    redirect http inside 80
    redirect http outside 80
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
    Crypto ipsec ikev2 ipsec-proposal OF
    encryption protocol esp
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 proposal ipsec 3DES
    Esp 3des encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES
    Esp aes encryption protocol
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 ipsec-proposal AES192
    Protocol esp encryption aes-192
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec ikev2 AES256 ipsec-proposal
    Protocol esp encryption aes-256
    Esp integrity sha - 1, md5 Protocol
    Crypto ipsec pmtu aging infinite - the security association
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
    outside_map interface card crypto outside
    Crypto ca trustpoint _SmartCallHome_ServerCA
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint0
    registration auto
    name of the object CN = ciscoasa
    Keypairs 4151
    Proxy-loc-transmitter
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint1
    Terminal registration
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint2
    Terminal registration
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint3
    Terminal registration
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint4
    Terminal registration
    name of the object CN = vpn.corp.com
    ASA_PKC_One key pair
    Configure CRL
    trustpool crypto ca policy

    IKEv2 crypto policy 1
    aes-256 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 10
    aes-192 encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 20
    aes encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 30
    3des encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    IKEv2 crypto policy 40
    the Encryption
    integrity sha
    Group 2 of 5
    FRP sha
    second life 86400
    Crypto ikev2 activate out of service the customer port 443
    Telnet timeout 15
    SSH 10.2.0.0 255.255.0.0 inside
    SSH timeout 15
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    outside access management
    management of 192.168.1.2 - dhcpd addresses 192.168.1.10
    enable dhcpd management
    !
    a basic threat threat detection
    host of statistical threat detection
    statistical threat detection port
    Statistical threat detection Protocol
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    NTP server 10.2.9.23 source outdoors
    SSL cipher aes128-sha1-3des-sha1
    management of SSL trust-point ASDM_TrustPoint4
    SSL-trust outside ASDM_TrustPoint4 point
    SSL-trust ASDM_TrustPoint4 inside point
    WebVPN
    allow outside
    No anyconnect essentials
    AnyConnect image disk0:/anyconnect-win-3.1.04063-k9.pkg 1
    AnyConnect enable
    tunnel-group-list activate
    list of chip-tunnel TerminalServer mstsc.exe Terminal windows platform
    attributes of Group Policy DfltGrpPolicy
    value of server DNS 10.2.9.23
    L2TP ipsec VPN-tunnel-Protocol ikev1
    field default value corp.com
    WebVPN
    value of customization DfltCustomization
    internal group CA-SSLVPN-TEST strategy
    attributes of CA-SSLVPN-TEST-group policy
    WINS server no
    value of server DNS 10.2.9.23
    client ssl-VPN-tunnel-Protocol
    field default value corp.com
    internal group CA-CLIENTLESS-TEST strategy
    attributes of group CA-CLIENTLESS-TEST policy
    clientless ssl VPN tunnel-Protocol
    WebVPN
    value of URL-list of the contractors list
    chip-tunnel enable TerminalServer
    ssluser nS2GfPhvrmh.I/qL encrypted password username
    username ssluser attributes
    Group-VPN-CA-SSLVPN-TEST strategy
    client ssl-VPN-tunnel-Protocol
    group-lock AnySSLVPN-TEST value
    type of remote access service
    username admin privilege 15 encrypted password f4JufzEgsqDt05cH
    cluser 3mAXWbcK2ZdaFXHb encrypted password username
    cluser attributes username
    Group-VPN-CA-CLIENTLESS-TEST strategy
    clientless ssl VPN tunnel-Protocol
    value of locking group OLY-Clientless
    type of remote access service
    attributes global-tunnel-group DefaultRAGroup
    Group-CA LOCAL Kerberos authentication server
    tunnel-group DefaultRAGroup webvpn-attributes
    CA-ClientLess-portal customization
    attributes global-tunnel-group DefaultWEBVPNGroup
    sslvpn-pool ip address pool
    Group-CA LOCAL Kerberos authentication server
    tunnel-group DefaultWEBVPNGroup webvpn-attributes
    CA-ClientLess-portal customization
    remote access to tunnel-group AnySSLVPN-TEST type
    tunnel-group AnySSLVPN-TEST general attributes
    sslvpn-pool ip address pool
    CA-group-Kerberos authentication server
    CA-SSLVPN-TEST of the policy by default-group
    tunnel-group AnySSLVPN-TEST webvpn-attributes
    OLY-portal customization
    Disable Group-alias AnySSLVPN-TEST
    Disable AnySSLVPN-TEST-group-alias aliases
    OLY-SSLVPN disable group-alias
    enable SSLVPN group-alias
    type tunnel-group OLY-Clientless Remote access
    OLY-Clientless General attributes tunnel-group
    CA-group-Kerberos authentication server
    Group Policy - by default-CA-CLIENTLESS-TEST
    OLY-Clientless webvpn-attributes tunnel-group
    CA-ClientLess-portal customization
    try to master timeout NBNS-server 10.2.9.23 2 2
    Group-alias Clientless enable
    Group-aka cl disable

    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    Review the ip options
    inspect the netbios
    inspect the rsh
    inspect the rtsp
    inspect the skinny
    inspect esmtp
    inspect sqlnet
    inspect sunrpc
    inspect the tftp
    inspect the sip
    inspect xdmcp
    class class by default
    Statistical accounting of user
    !
    global service-policy global_policy
    context of prompt hostname
    anonymous reporting remote call
    call-home
    Profile of CiscoTAC-1
    no active account
    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
    email address of destination [email protected] / * /
    destination-mode http transport
    Subscribe to alert-group diagnosis
    Subscribe to alert-group environment
    Subscribe to alert-group 3 monthly periodic inventory
    Subscribe to alert-group configuration periodic monthly 3
    daily periodic subscribe to alert-group telemetry
    Cryptochecksum:ceea6b06a18781a23e6b5dde6b591704
    : end
    ASDM image disk0: / asdm - 713.bin
    don't allow no asdm history

    Hello

    I'm glad to hear it works

    Please do not forget to mark a reply as the right answer or useful answers to rate

    -Jouni

  • New palm

    I want to give my current Palm to my niece. I bought a new.  How to remove information (contacts, calendar and registration name) so she has a clean Palm?

    A hard reset should clear all data and the user name.

    Click on the following link for the Web page of kb.palm.com for the article about reset procedures.

    http://www.Palm.com/cgi-bin/cso_kbURL.cgi?id=887

    Message relates to: Palm i705

  • Simple loop does not

    I'm trying this simple FOR loop statement, but it keeps giving me the following error. Any help is greatly appreciated! Thank you very much.

    Error report:

    ORA-06550: line 5, column 18:

    PLS-00382: expression is of the wrong type

    06550 00000 - "line %s, column % s:\n%s".

    * Cause: Usually a PL/SQL compilation error.

    * Action:

    / * QUERY * /.

    -Creating a temporary table

    CREATE TABLE zzTab)

    NUMBER of num

    );

    -Insertion of values from 1 to 10 in the table

    BEGIN

    I'm IN

    (

    SELECT to_number (ROWNUM) I

    OF the double

    CONNECT BY ROWNUM < = 10

    )

    LOOP

    INSERT INTO zztab)

    NUM

    )

    7. SELECT * I num

    Double;

    END LOOP;

    END;

    Hello

    It will be easier to understand if you use different names for the record that contains the line (I kept it as I have below) and column (I changed it since I was at r_num below).
    Use it instead:

    BEGIN

    I'm IN

    (

    SELECT to_number (ROWNUM) AS r_num

    OF the double

    CONNECT BY ROWNUM<>

    )

    LOOP

    INSERT INTO zztab)

    NUM

    )

    7. SELECT * i.r_num AS num

    Double;

    END LOOP;

    END;

    When you reference a column in the record, you give you both the registration name and the column name, for example i.r_num

    Furthermore, you need not PL/SQL for this.  SQL is simpler and more effective:

    INSERT INTO zztab (num)

    7. SELECT * ROWNUM

    OF the double

    CONNECT BY ROWNUM<=>

    ;

  • Need help for JSON_LIST analysis

    Hello, I have the following procedure:

    declare
    my_json json_list: = json_list ('[{"event name": "Meeting the aisle"}, {"event code": "JPNWC74ZKW9"}, {"event start date": "2014-02\/01\"}, {"name of declarant": "hhh, Rams"}]');
    listElement json_value;
    jsonObj json;
    listOfValues json_list;
    columnName, VARCHAR2 (500);
    columnValue VARCHAR2 (500);
    Start

    I'm looping 1.my_json.count

    jsonObj: = new json (my_json.get (i));
    listOfValues: = jsonObj.get_values ();
    listElement: = listOfValues.get (i);
    columnName: = listElement.mapname;
    columnValue: = listElement.str;
    dbms_output.put_line (' field: ' | columnName |) ' Value: ' | columnValue);

    end loop;

    end;
    /

    Which produces the following to DBMS_OUTPUT. PUTLINE:
    Field: name event value: meet near the alley
    Field: value:
    Field: value:
    Field: value:

    As you can see, the problem is that it is only a loop through my first element JSON (event name) and is not attract the other JSON (event code, event start date, name)

    Thank you!

    What about

    declare
    my_json json_list := json_list('[{"event name":"Meet near the alley"},{"event code":"JPNWC74ZKW9"},{"event start date":"01\/02\/2014"},{"registrant name":"hhh, RamS"}]');
    listElement json_value;
    jsonObj json;
    begin
    
    for i in 1..my_json.count loop
      listElement := my_json.get(i);
      jsonObj := json(listElement);
      dbms_output.put_line(jsonObj.json_data(1).mapname);
      dbms_output.put_line(jsonObj.json_data(1).str);
    end loop;
    
    end; 
    
    event name
    Meet near the alley
    event code
    JPNWC74ZKW9
    event start date
    01/02/2014
    registrant name
    hhh, RamS
    
  • How to change the title of the Panel

    I have a master/detail view, based on the ColdFusion application wizard-generated code. When a user selects a record in the top pane, the details are displayed in the bottom panel.

    What I want to do is have the title of the ventral Panel dynamically display one of the fields in the registration (name of patient), that is, each time a different record is selected the title of the Group of experts should change.

    I tried to give the Panel an ID (pendingDetailPanel). then referring to it in the file that contains the content of the Panel like this:


    < mx:Script >
    <! [CDATA]
    pendingDetailPanel.title = "{this.detailObject.CURR_NAME}"; "
    []] >
    < / mx:Script >

    But it gives me the following error:

    1120: access of undefined property pendingDetailPanel.

    How should I go about this?

    Thank you


    First of all, you can not make assignments like this outside of a script. Make a habit of doing all the work within a handler initialize or creationComplete. Only declare instance of (global) variables outside a function

    Then you can not use straps As liaison

    What you want to do, is to have the selection operation, set the value of an instance variable is bindable:

    [Bindable] var _sPatientName:String = "";

    private void onChangePatient(oEvent:Event):void {}
    _sPatientName = oEvent.target.selectedItem.patientName;
    ....

    And in the Panel:

    Tracy

  • Error in the access query

    Hi guys, need help with this form.

    It is used to update and add employees to an access database. I took the script directly from maserting cf 4.5.
    I don't like the # s autour < cfform method = Post Action = "DB_Update_EE.cfm? Action = #FormAction #">."
    To enter an employee id field id, it returns "cannot display the Page.
    Any ideas?
    Here's the code: thanks in advance.

    < cfparam Name = "URL. Action"Default ="New">
    < CfSwitch Expression = "#Url.Action #" >
    < Cfcase Value = 'Load' >
    < name Cfquery = "TheRecord" Datasource = "NBProdReports" >
    Select * from tblUser where User_Id = #form. ID #.
    < / Cfquery >
    < / Cfcase >
    < cfcase Value = "Insert" >
    <! - insert the new record - >
    < cfquery Name = "InsertRecord" Datasource = "NBProdReports" >
    Insert in the tblUser (User_Last_Name User_First_Name, User_Id, Manager_Name,
    User_Type, User_Password) values ('#form.) LastName # ',' #form. FirstName #',' #Form.ID #',' #Form. ManagerName # ',' #form. UserType #',' #form. Password #'
    < / cfquery >
    <! - retrieve matching records - >
    < name cfquery = "TheRecord" Datasource = "NBProdReports" >
    Select * from tblUser where User_Last_Name = ' #form. LastName #' and User_First_Name
    = "#form.firstname #" and User_Id = ' #form. ID #' and Manager_Name = ' #form. ManagerName #'
    And User_Type = ' #form. UserType #' and User_Password = ' #form. Password #' order
    by User_Id
    < / cfquery >
    <! - check if it is the only record - >
    < cfif above 1 TheRecord.RecordCount >
    < cfloop Query = EndRowOptional = #TheRecord.RecordCount # StartRowOptional = #TheRecord.recordCount # "TheRecord" >
    < name cfquery = "TheRecord" Datasource = "NBProdReports" >
    Select * from tblUser where User_Id = # useridentifier #.
    < / cfquery >
    < / cfloop >
    < / cfif >
    < / cfcase >
    < cfcase Value = "Update" >
    <! - update registration - >
    < cfquery name = "UpdateRecord" Datasource = "NBProdReports" >
    Update tblUser Set User_Last_Name = ' #Form.lastName # ', User_First_Name and
    = ' #Form.FirstName # ', User_Id = ' #Form.Id # ', Manager_Name = ' #form. ManagerName #'
    User_Type = ' #form. UserType #' User_Password = ' #form. Password #' where useridentifier
    = #Form.Id #.
    < / cfquery >
    <! - remember registration - >
    < name Cfquery = "TheRecord" Datasource = "NBProdReports" >
    Select * from tblUser where User_Id = #Form.Id #.
    < / Cfquery >
    < / cfcase >
    < / CfSwitch >
    < isDefined ("TheRecord") cfif >
    < Cfset User_Last_Name = TheRecord.User_Last_Name >
    < Cfset User_First_Name = TheRecord.User_First_Name >
    < Cfset User_Id = TheRecord.User_Id >
    < Cfset Manager_Name = TheRecord.Manager_Name >
    < Cfset User_Type = TheRecord.User_Type >
    < Cfset User_Password = TheRecord.User_Password >
    < Cfset IdField = ' < Strong > used #TheRecord.User_Id # < / Strong > < Input Type = Hidden.
    ' Name = Id Value = #TheRecord.User_Id # > ">
    < Cfset Submit = "Update" >
    < Cfset culture = "Update" >
    < / cfif >
    < name Cfparam = default 'User_Last_Name"=" ">
    < name Cfparam = default 'User_First_Name"=" ">
    < name Cfparam = "User_Id" Default = "" >
    < name Cfparam = default "Manager_Name" = "" >
    < name Cfparam = 'User_Type' Default = "" >
    < name Cfparam = "User_Password" Default = "" >
    < Cfparam name = 'Submit' default = "Insert" >
    < cfform method = Post Action = "DB_Update_EE.cfm? Action = load ">"
    ID update:
    < input Type = Text Name = 'Id' Size = '3' >
    < input Type = Submit Value = "Submit" >
    < / cfform >
    < HR >
    < cfoutput >
    < cfform method = Post Action = "DB_Update_EE.cfm? Action = #FormAction #">"
    #IDField #.
    < table Border = 0 Cellspacing = 5 >
    < b >
    Last name < td > < table >
    < td >
    < input Type = Text Name = "LastName" Size = 20 = value ' #User_Last_Name # ">"
    < table >
    < /tr >
    < b >
    First name < td > < table >
    < td >
    < input Type = Text Name = "FirstName" Size = 20 = value ' #User_First_Name # ">"
    < table >
    < /tr >
    < b >
    < Td > user ID < table >
    < td >
    < input Type = Text Name = 'Id' Size = 20 = value ' # useridentifier #' >
    < table >
    < /tr >
    < b >
    Name of the < td > < table >
    < td >
    < input Type = Text Name = "ManagerName" Size = 20 = value ' #Manager_Name # ">"
    < table >
    < /tr >
    < b >
    Type of user < td > < table >
    < td >
    < input Type = Text Name = "UserType" size = 20 value =' #User_Type # ">"
    < table >
    < /tr >
    < b >
    the password for user < td > < table >
    < td >
    < input Type = Text Name = "Password" size = 20 value =' #User_Password #' >
    < table >
    < /tr >
    < b >
    < td > < table >
    < td >
    < input Type = Submit Value =' #Submit # ">"
    < table >
    < /tr >
    < /table >
    < / cfform >
    < / cfoutput >
    < HR >
    < a href = "DB_Update_EE.cfm? Action = New "> create a new record < /a >"

    It seems that the variables of culture is only set with the if statement where isDefined ("TheRecord")

    Consider giving culture a default with cfparam or change your code so that the form appears only when a variable culture was created.

Maybe you are looking for