RG---1 config

Hi,
1) RG1 finished goods register
2) RG23D register maintained for Depot process
How it is configured in sap R/3,please give the costomization step  RG1&RG23D.
Thanks,
Rajesh.
Edited by: rajesh on Jan 14, 2009 12:12 PM

Dear Rajesh
Go through this Building Block
[Excise Periodic Processing|http://help.sap.com/bp_bblibrary/600/html/J94_EN_IN.htm]
There click on "Business Process Procedure" and go through the same.  You will have a fair idea.
thanks
G. Lakshmipathi

Similar Messages

  • Config of free goods?

    I'm an ABAPer so forgive if my question is not clear to you SD guys. We are having an issue with creation of orders and the functional consultant might be new to this problem.
    I read several threads here regarding the config.
    1) I checked transaction VOV4 for OR-NORM-FREE-TAN-TANN. it's there
    2) Checked material master MM03 / Sales Org. 2 for category group. Group of material is NORM.
    3) Checked free goods determination in VBN3 for Customer-Material combination, there's a value there and is valid from 12/22/2008 to 12/31/9999 (valid indefinitely)
    But when we try to create an order in VA01, using the same customer and material (from number 3) and set the item category of the material to TANN, the system automatically changes it to TAN.
    (On the technical side) I checked the exits MV45AFZZ and MV45AFZB and there is no routine there that does the change from TANN to TAN so we're convinced that this is caused by some config.
    Can anyone help? How can the item stay as TANN (without having to retype. When it is retyped, it's like the item category is being forced into the system, right?)?
    Thanks in advance.

    Hi,
    What I undersatnd is , you want INCLUSIVE free good sdetermination.
    For example, for every 10 units 2 units are free. That means 20% free goods.
    If Customer has ordered for 10 units then  he has to pay for 8 units and 2 units will be free of charge.
    In standard, the free goods condition type is NA00 (with item generation).
    So, you need to create the Condition record for NA00 in transaction VBN1 and specify the free quntity properly.
    In standard, the Pricing Procedure for free goods determination is NA0000.
    You need to assign this procedure to the Sales Area in which you want to create the Sales Order (V/N6).
    Now, when you will create an order for the above material say M1 for 10 units, system will split it as two line items.
    First line item, M1 -
    8 units -
    TAN (system will calculate price for this item).
    Second line item, M1----
    2 units -
    TANN (no pricing, it is 100% free).
    You need not have to specify the Item category mannually.
    For the first item (Main item), system will automatically take the Item category as TAN and for the 2nd item (sub-item) item category will be TANN.
    Regards
    Pradyumna

  • Fairly new to cisco ASA 5505 - Can someone look through my config?

    Hi.
    Can some one tell me if I did the NAT part right? Both dynamic and static.
    To be able to reach one vlan from another I created a Nat between them, is this the right way to do it?
    I can still limit the access between the vlans based on the access list.
    I also getting slow throughput over the VPN tunnel. Is there something wrong with my config. I used the wizard to set it up. There is also a cisco asa5505 on the other end.
    If there is some thing else that seems wrong, please let me know.
    Any help would be greatfully appreciated!
    Config:
    : Saved
    ASA Version 7.2(2)
    hostname ciscoasa
    domain-name default.domain.invalid
    enable password x encrypted
    names
    name 192.168.1.250 DomeneServer
    name 192.168.1.10 NotesServer
    name 192.168.1.90 OvServer
    name 192.168.1.97 TerminalServer
    name 192.168.1.98 w8-eyeshare
    name 192.168.50.10 w8-print
    name 192.168.1.94 w8-app
    name 192.168.1.89 FonnaFlyMedia
    interface Vlan1
    nameif Vlan1
    security-level 100
    ip address 192.168.200.100 255.255.255.0
    ospf cost 10
    interface Vlan2
    nameif outside
    security-level 0
    ip address 79.x.x.226 255.255.255.224
    ospf cost 10
    interface Vlan400
    nameif vlan400
    security-level 100
    ip address 192.168.1.1 255.255.255.0
    ospf cost 10
    interface Vlan450
    nameif Vlan450
    security-level 100
    ip address 192.168.210.1 255.255.255.0
    ospf cost 10
    interface Vlan460
    nameif Vlan460-SuldalHotell
    security-level 100
    ip address 192.168.2.1 255.255.255.0
    ospf cost 10
    interface Vlan461
    nameif Vlan461-SuldalHotellGjest
    security-level 100
    ip address 192.168.3.1 255.255.255.0
    ospf cost 10
    interface Vlan462
    nameif Vlan462-Suldalsposten
    security-level 100
    ip address 192.168.4.1 255.255.255.0
    ospf cost 10
    interface Vlan470
    nameif vlan470-Kyrkjekontoret
    security-level 100
    ip address 192.168.202.1 255.255.255.0
    ospf cost 10
    interface Vlan480
    nameif vlan480-Telefoni
    security-level 100
    ip address 192.168.20.1 255.255.255.0
    ospf cost 10
    interface Vlan490
    nameif Vlan490-QNapBackup
    security-level 100
    ip address 192.168.10.1 255.255.255.0
    ospf cost 10
    interface Vlan500
    nameif Vlan500-HellandBadlands
    security-level 100
    ip address 192.168.30.1 255.255.255.0
    ospf cost 10
    interface Vlan510
    nameif Vlan510-IsTak
    security-level 100
    ip address 192.168.40.1 255.255.255.0
    ospf cost 10
    interface Vlan600
    nameif Vlan600-SafeQ
    security-level 100
    ip address 192.168.50.1 255.255.255.0
    ospf cost 10
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    interface Ethernet0/2
    switchport access vlan 500
    switchport trunk allowed vlan 400,450,460-462,470,480,500,510,600,610
    switchport mode trunk
    interface Ethernet0/3
    switchport access vlan 490
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    passwd x encrypted
    ftp mode passive
    clock timezone WAT 1
    dns server-group DefaultDNS
    domain-name default.domain.invalid
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object-group service Lotus_Notes_Utgaaande tcp
    description Frim Notes og ut til alle
    port-object eq domain
    port-object eq ftp
    port-object eq www
    port-object eq https
    port-object eq lotusnotes
    port-object eq pop3
    port-object eq pptp
    port-object eq smtp
    object-group service Lotus_Notes_inn tcp
    description From alle og inn til Notes
    port-object eq www
    port-object eq lotusnotes
    port-object eq pop3
    port-object eq smtp
    object-group service Reisebyraa tcp-udp
    port-object range 3702 3702
    port-object range 5500 5500
    port-object range 9876 9876
    object-group service Remote_Desktop tcp-udp
    description Tilgang til Remote Desktop
    port-object range 3389 3389
    object-group service Sand_Servicenter_50000 tcp-udp
    description Program tilgang til Sand Servicenter AS
    port-object range 50000 50000
    object-group service VNC_Remote_Admin tcp
    description Frå oss til alle
    port-object range 5900 5900
    object-group service Printer_Accept tcp-udp
    port-object range 9100 9100
    port-object eq echo
    object-group icmp-type Echo_Ping
    icmp-object echo
    icmp-object echo-reply
    object-group service Print tcp
    port-object range 9100 9100
    object-group service FTP_NADA tcp
    description Suldalsposten NADA tilgang
    port-object eq ftp
    port-object eq ftp-data
    object-group service Telefonsentral tcp
    description Hoftun
    port-object eq ftp
    port-object eq ftp-data
    port-object eq www
    port-object eq https
    port-object eq telnet
    object-group service Printer_inn_800 tcp
    description Fra 800  nettet og inn til 400 port 7777
    port-object range 7777 7777
    object-group service Suldalsposten tcp
    description Sending av mail vha Mac Mail programmet - åpner smtp
    port-object eq pop3
    port-object eq smtp
    object-group service http2 tcp
    port-object range 81 81
    object-group service DMZ_FTP_PASSIVE tcp-udp
    port-object range 55536 56559
    object-group service DMZ_FTP tcp-udp
    port-object range 20 21
    object-group service DMZ_HTTPS tcp-udp
    port-object range 443 443
    object-group service DMZ_HTTP tcp-udp
    port-object range 8080 8080
    object-group service DNS_Query tcp
    port-object range domain domain
    object-group service DUETT_SQL_PORT tcp-udp
    description For kobling mellom andre nett og duett server
    port-object range 54659 54659
    access-list outside_access_in extended permit ip any any
    access-list outside_access_out extended permit ip any any
    access-list vlan400_access_in extended deny ip any host 149.20.56.34
    access-list vlan400_access_in extended deny ip any host 149.20.56.32
    access-list vlan400_access_in extended permit ip any any
    access-list Vlan450_access_in extended deny ip any host 149.20.56.34
    access-list Vlan450_access_in extended deny ip any host 149.20.56.32
    access-list Vlan450_access_in extended permit ip any any
    access-list Vlan460_access_in extended deny ip any host 149.20.56.34
    access-list Vlan460_access_in extended deny ip any host 149.20.56.32
    access-list Vlan460_access_in extended permit ip any any
    access-list vlan400_access_out extended permit icmp any any object-group Echo_Ping
    access-list vlan400_access_out extended permit tcp any host NotesServer object-group Lotus_Notes_Utgaaande
    access-list vlan400_access_out extended permit tcp any host DomeneServer object-group Remote_Desktop
    access-list vlan400_access_out extended permit tcp any host TerminalServer object-group Remote_Desktop
    access-list vlan400_access_out extended permit tcp any host OvServer object-group http2
    access-list vlan400_access_out extended permit tcp any host NotesServer object-group Lotus_Notes_inn
    access-list vlan400_access_out extended permit tcp any host NotesServer object-group Remote_Desktop
    access-list vlan400_access_out extended permit tcp any host w8-eyeshare object-group Remote_Desktop
    access-list vlan400_access_out extended permit tcp any host w8-app object-group Remote_Desktop
    access-list vlan400_access_out extended permit tcp any host FonnaFlyMedia range 8400 8600
    access-list vlan400_access_out extended permit udp any host FonnaFlyMedia range 9000 9001
    access-list vlan400_access_out extended permit tcp 192.168.4.0 255.255.255.0 host DomeneServer
    access-list vlan400_access_out extended permit tcp 192.168.4.0 255.255.255.0 host w8-app object-group DUETT_SQL_PORT
    access-list Vlan500_access_in extended deny ip any host 149.20.56.34
    access-list Vlan500_access_in extended deny ip any host 149.20.56.32
    access-list Vlan500_access_in extended permit ip any any
    access-list vlan470_access_in extended deny ip any host 149.20.56.34
    access-list vlan470_access_in extended deny ip any host 149.20.56.32
    access-list vlan470_access_in extended permit ip any any
    access-list Vlan490_access_in extended deny ip any host 149.20.56.34
    access-list Vlan490_access_in extended deny ip any host 149.20.56.32
    access-list Vlan490_access_in extended permit ip any any
    access-list Vlan450_access_out extended permit icmp any any object-group Echo_Ping
    access-list Vlan1_access_out extended permit ip any any
    access-list Vlan1_access_out extended permit tcp any host w8-print object-group Remote_Desktop
    access-list Vlan1_access_out extended deny ip any any
    access-list Vlan1_access_out extended permit icmp any any echo-reply
    access-list Vlan460_access_out extended permit icmp any any object-group Echo_Ping
    access-list Vlan490_access_out extended permit icmp any any object-group Echo_Ping
    access-list Vlan490_access_out extended permit tcp any host 192.168.10.10 object-group DMZ_FTP
    access-list Vlan490_access_out extended permit tcp any host 192.168.10.10 object-group DMZ_FTP_PASSIVE
    access-list Vlan490_access_out extended permit tcp any host 192.168.10.10 object-group DMZ_HTTPS
    access-list Vlan490_access_out extended permit tcp any host 192.168.10.10 object-group DMZ_HTTP
    access-list Vlan500_access_out extended permit icmp any any object-group Echo_Ping
    access-list vlan470_access_out extended permit icmp any any object-group Echo_Ping
    access-list vlan470_access_out extended permit tcp any host 192.168.202.10 object-group Remote_Desktop
    access-list Vlan510_access_out extended permit icmp any any object-group Echo_Ping
    access-list vlan480_access_out extended permit ip any any
    access-list Vlan510_access_in extended permit ip any any
    access-list Vlan600_access_in extended permit ip any any
    access-list Vlan600_access_out extended permit icmp any any
    access-list Vlan600_access_out extended permit tcp any host w8-print object-group Remote_Desktop
    access-list Vlan600_access_out extended permit tcp 192.168.1.0 255.255.255.0 host w8-print eq www
    access-list Vlan600_access_out extended permit tcp 192.168.202.0 255.255.255.0 host w8-print eq www
    access-list Vlan600_access_out extended permit tcp 192.168.210.0 255.255.255.0 host w8-print eq www
    access-list Vlan600_access_in_1 extended permit ip any any
    access-list Vlan461_access_in extended permit ip any any
    access-list Vlan461_access_out extended permit icmp any any object-group Echo_Ping
    access-list vlan400_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.77.0 255.255.255.0
    access-list outside_20_cryptomap_1 extended permit ip 192.168.1.0 255.255.255.0 192.168.77.0 255.255.255.0
    access-list outside_20_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.77.0 255.255.255.0
    access-list Vlan462-Suldalsposten_access_in extended permit ip any any
    access-list Vlan462-Suldalsposten_access_out extended permit icmp any any echo-reply
    access-list Vlan462-Suldalsposten_access_out_1 extended permit icmp any any echo-reply
    access-list Vlan462-Suldalsposten_access_in_1 extended permit ip any any
    pager lines 24
    logging enable
    logging asdm informational
    mtu Vlan1 1500
    mtu outside 1500
    mtu vlan400 1500
    mtu Vlan450 1500
    mtu Vlan460-SuldalHotell 1500
    mtu Vlan461-SuldalHotellGjest 1500
    mtu vlan470-Kyrkjekontoret 1500
    mtu vlan480-Telefoni 1500
    mtu Vlan490-QNapBackup 1500
    mtu Vlan500-HellandBadlands 1500
    mtu Vlan510-IsTak 1500
    mtu Vlan600-SafeQ 1500
    mtu Vlan462-Suldalsposten 1500
    no failover
    monitor-interface Vlan1
    monitor-interface outside
    monitor-interface vlan400
    monitor-interface Vlan450
    monitor-interface Vlan460-SuldalHotell
    monitor-interface Vlan461-SuldalHotellGjest
    monitor-interface vlan470-Kyrkjekontoret
    monitor-interface vlan480-Telefoni
    monitor-interface Vlan490-QNapBackup
    monitor-interface Vlan500-HellandBadlands
    monitor-interface Vlan510-IsTak
    monitor-interface Vlan600-SafeQ
    monitor-interface Vlan462-Suldalsposten
    icmp unreachable rate-limit 1 burst-size 1
    asdm image disk0:/asdm-522.bin
    no asdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (vlan400) 0 access-list vlan400_nat0_outbound
    nat (vlan400) 1 0.0.0.0 0.0.0.0 dns
    nat (Vlan450) 1 0.0.0.0 0.0.0.0 dns
    nat (Vlan460-SuldalHotell) 1 0.0.0.0 0.0.0.0
    nat (Vlan461-SuldalHotellGjest) 1 0.0.0.0 0.0.0.0
    nat (vlan470-Kyrkjekontoret) 1 0.0.0.0 0.0.0.0
    nat (Vlan490-QNapBackup) 1 0.0.0.0 0.0.0.0 dns
    nat (Vlan500-HellandBadlands) 1 0.0.0.0 0.0.0.0
    nat (Vlan510-IsTak) 1 0.0.0.0 0.0.0.0
    nat (Vlan600-SafeQ) 1 0.0.0.0 0.0.0.0
    nat (Vlan462-Suldalsposten) 1 0.0.0.0 0.0.0.0
    static (vlan400,outside) 79.x.x.x DomeneServer netmask 255.255.255.255
    static (vlan470-Kyrkjekontoret,outside) 79.x.x.x 192.168.202.10 netmask 255.255.255.255
    static (vlan400,outside) 79.x.x.x NotesServer netmask 255.255.255.255 dns
    static (vlan400,outside) 79.x.x.231 TerminalServer netmask 255.255.255.255
    static (vlan400,outside) 79.x.x.234 OvServer netmask 255.255.255.255
    static (vlan400,outside) 79.x.x.232 w8-eyeshare netmask 255.255.255.255
    static (Vlan490-QNapBackup,outside) 79.x.x.233 192.168.10.10 netmask 255.255.255.255 dns
    static (Vlan600-SafeQ,outside) 79.x.x.235 w8-print netmask 255.255.255.255
    static (vlan400,outside) 79.x.x.236 w8-app netmask 255.255.255.255
    static (Vlan450,vlan400) 192.168.210.0 192.168.210.0 netmask 255.255.255.0
    static (Vlan500-HellandBadlands,vlan400) 192.168.30.0 192.168.30.0 netmask 255.255.255.0
    static (vlan400,Vlan500-HellandBadlands) 192.168.1.0 192.168.1.0 netmask 255.255.255.0
    static (vlan400,Vlan450) 192.168.1.0 192.168.1.0 netmask 255.255.255.0
    static (vlan400,outside) 79.x.x.252 FonnaFlyMedia netmask 255.255.255.255
    static (Vlan462-Suldalsposten,vlan400) 192.168.4.0 192.168.4.0 netmask 255.255.255.0
    static (vlan400,Vlan462-Suldalsposten) 192.168.1.0 192.168.1.0 netmask 255.255.255.0
    static (vlan400,Vlan600-SafeQ) 192.168.1.0 192.168.1.0 netmask 255.255.255.0
    static (Vlan600-SafeQ,vlan400) 192.168.50.0 192.168.50.0 netmask 255.255.255.0
    static (Vlan600-SafeQ,Vlan450) 192.168.50.0 192.168.50.0 netmask 255.255.255.0
    static (Vlan600-SafeQ,vlan470-Kyrkjekontoret) 192.168.50.0 192.168.50.0 netmask 255.255.255.0
    static (Vlan450,Vlan600-SafeQ) 192.168.210.0 192.168.210.0 netmask 255.255.255.0
    static (vlan470-Kyrkjekontoret,Vlan600-SafeQ) 192.168.202.0 192.168.202.0 netmask 255.255.255.0
    access-group Vlan1_access_out out interface Vlan1
    access-group outside_access_in in interface outside
    access-group outside_access_out out interface outside
    access-group vlan400_access_in in interface vlan400
    access-group vlan400_access_out out interface vlan400
    access-group Vlan450_access_in in interface Vlan450
    access-group Vlan450_access_out out interface Vlan450
    access-group Vlan460_access_in in interface Vlan460-SuldalHotell
    access-group Vlan460_access_out out interface Vlan460-SuldalHotell
    access-group Vlan461_access_in in interface Vlan461-SuldalHotellGjest
    access-group Vlan461_access_out out interface Vlan461-SuldalHotellGjest
    access-group vlan470_access_in in interface vlan470-Kyrkjekontoret
    access-group vlan470_access_out out interface vlan470-Kyrkjekontoret
    access-group vlan480_access_out out interface vlan480-Telefoni
    access-group Vlan490_access_in in interface Vlan490-QNapBackup
    access-group Vlan490_access_out out interface Vlan490-QNapBackup
    access-group Vlan500_access_in in interface Vlan500-HellandBadlands
    access-group Vlan500_access_out out interface Vlan500-HellandBadlands
    access-group Vlan510_access_in in interface Vlan510-IsTak
    access-group Vlan510_access_out out interface Vlan510-IsTak
    access-group Vlan600_access_in_1 in interface Vlan600-SafeQ
    access-group Vlan600_access_out out interface Vlan600-SafeQ
    access-group Vlan462-Suldalsposten_access_in_1 in interface Vlan462-Suldalsposten
    access-group Vlan462-Suldalsposten_access_out_1 out interface Vlan462-Suldalsposten
    route outside 0.0.0.0 0.0.0.0 79.x.x.225 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout uauth 0:05:00 absolute
    username x password x encrypted privilege 15
    aaa authentication ssh console LOCAL
    http server enable
    http 192.168.210.0 255.255.255.0 Vlan450
    http 192.168.200.0 255.255.255.0 Vlan1
    http 192.168.1.0 255.255.255.0 vlan400
    no snmp-server location
    no snmp-server contact
    snmp-server community public
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto map outside_map 20 match address outside_20_cryptomap_1
    crypto map outside_map 20 set pfs
    crypto map outside_map 20 set peer 62.92.159.137
    crypto map outside_map 20 set transform-set ESP-3DES-SHA
    crypto map outside_map interface outside
    crypto isakmp enable outside
    crypto isakmp enable vlan400
    crypto isakmp policy 10
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    tunnel-group 62.92.159.137 type ipsec-l2l
    tunnel-group 62.92.159.137 ipsec-attributes
    pre-shared-key *
    telnet 192.168.200.0 255.255.255.0 Vlan1
    telnet 192.168.1.0 255.255.255.0 vlan400
    telnet timeout 5
    ssh 171.68.225.216 255.255.255.255 outside
    ssh timeout 5
    console timeout 0
    dhcpd update dns both
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface Vlan1
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface outside
    dhcpd address 192.168.1.100-192.168.1.225 vlan400
    dhcpd option 6 ip DomeneServer 81.167.36.11 interface vlan400
    dhcpd option 3 ip 192.168.1.1 interface vlan400
    dhcpd enable vlan400
    dhcpd address 192.168.210.100-192.168.210.200 Vlan450
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface Vlan450
    dhcpd option 3 ip 192.168.210.1 interface Vlan450
    dhcpd enable Vlan450
    dhcpd address 192.168.2.100-192.168.2.150 Vlan460-SuldalHotell
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface Vlan460-SuldalHotell
    dhcpd option 3 ip 192.168.2.1 interface Vlan460-SuldalHotell
    dhcpd enable Vlan460-SuldalHotell
    dhcpd address 192.168.3.100-192.168.3.200 Vlan461-SuldalHotellGjest
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface Vlan461-SuldalHotellGjest
    dhcpd option 3 ip 192.168.3.1 interface Vlan461-SuldalHotellGjest
    dhcpd enable Vlan461-SuldalHotellGjest
    dhcpd address 192.168.202.100-192.168.202.199 vlan470-Kyrkjekontoret
    dhcpd option 3 ip 192.168.202.1 interface vlan470-Kyrkjekontoret
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface vlan470-Kyrkjekontoret
    dhcpd enable vlan470-Kyrkjekontoret
    dhcpd option 3 ip 192.168.20.1 interface vlan480-Telefoni
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface vlan480-Telefoni
    dhcpd address 192.168.10.80-192.168.10.90 Vlan490-QNapBackup
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface Vlan490-QNapBackup
    dhcpd option 3 ip 192.168.10.1 interface Vlan490-QNapBackup
    dhcpd address 192.168.30.100-192.168.30.199 Vlan500-HellandBadlands
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface Vlan500-HellandBadlands
    dhcpd option 3 ip 192.168.30.1 interface Vlan500-HellandBadlands
    dhcpd enable Vlan500-HellandBadlands
    dhcpd address 192.168.40.100-192.168.40.150 Vlan510-IsTak
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface Vlan510-IsTak
    dhcpd option 3 ip 192.168.40.1 interface Vlan510-IsTak
    dhcpd enable Vlan510-IsTak
    dhcpd address 192.168.50.150-192.168.50.199 Vlan600-SafeQ
    dhcpd option 6 ip 81.167.36.3 81.167.36.11 interface Vlan600-SafeQ
    dhcpd enable Vlan600-SafeQ
    dhcpd address 192.168.4.100-192.168.4.150 Vlan462-Suldalsposten
    dhcpd option 6 ip DomeneServer 81.167.36.11 interface Vlan462-Suldalsposten
    dhcpd option 3 ip 192.168.4.1 interface Vlan462-Suldalsposten
    dhcpd enable Vlan462-Suldalsposten
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum 512
    prompt hostname context
    Cryptochecksum:x
    : end

    I was just wondering if this is the way to do the "connection" between vlans.. or should it be routed?
    The traffic between the vlan is working as intended. There are not much traffice only some RDP connection and some printing jobs.
    But i'm getting some of these errors: (not alle like this, but portmap translation creation failed)
    305006    192.168.10.200 portmap translation creation failed for udp src Vlan460-SuldalHotell:192.168.2.112/59133 dst Vlan490-QNapBackup:192.168.10.200/161
    I did the sh interface commends:
    Result of the command: "sh interface"
    Interface Vlan1 "Vlan1", is down, line protocol is down
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.200.100, subnet mask 255.255.255.0
      Traffic Statistics for "Vlan1":
        0 packets input, 0 bytes
        0 packets output, 0 bytes
        0 packets dropped
          1 minute input rate 0 pkts/sec,  0 bytes/sec
          1 minute output rate 0 pkts/sec,  0 bytes/sec
          1 minute drop rate, 0 pkts/sec
          5 minute input rate 0 pkts/sec,  0 bytes/sec
          5 minute output rate 0 pkts/sec,  0 bytes/sec
          5 minute drop rate, 0 pkts/sec
    Interface Vlan2 "outside", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 79.x.x.226, subnet mask 255.255.255.224
      Traffic Statistics for "outside":
        1780706730 packets input, 1221625431570 bytes
        1878320718 packets output, 1743030863134 bytes
        5742216 packets dropped
          1 minute input rate 558 pkts/sec,  217568 bytes/sec
          1 minute output rate 803 pkts/sec,  879715 bytes/sec
          1 minute drop rate, 0 pkts/sec
          5 minute input rate 621 pkts/sec,  482284 bytes/sec
          5 minute output rate 599 pkts/sec,  428957 bytes/sec
          5 minute drop rate, 1 pkts/sec
    Interface Vlan400 "vlan400", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.1.1, subnet mask 255.255.255.0
      Traffic Statistics for "vlan400":
        1093422654 packets input, 1191121436317 bytes
        784209789 packets output, 374041914789 bytes
        11465163 packets dropped
          1 minute input rate 751 pkts/sec,  870445 bytes/sec
          1 minute output rate 462 pkts/sec,  116541 bytes/sec
          1 minute drop rate, 11 pkts/sec
          5 minute input rate 474 pkts/sec,  415304 bytes/sec
          5 minute output rate 379 pkts/sec,  197861 bytes/sec
          5 minute drop rate, 7 pkts/sec
    Interface Vlan450 "Vlan450", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.210.1, subnet mask 255.255.255.0
      Traffic Statistics for "Vlan450":
        139711812 packets input, 27519985266 bytes
        202793062 packets output, 233679075458 bytes
        12523100 packets dropped
          1 minute input rate 68 pkts/sec,  9050 bytes/sec
          1 minute output rate 83 pkts/sec,  88025 bytes/sec
          1 minute drop rate, 6 pkts/sec
          5 minute input rate 145 pkts/sec,  15068 bytes/sec
          5 minute output rate 241 pkts/sec,  287093 bytes/sec
          5 minute drop rate, 6 pkts/sec
    Interface Vlan460 "Vlan460-SuldalHotell", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.2.1, subnet mask 255.255.255.0
      Traffic Statistics for "Vlan460-SuldalHotell":
        177971988 packets input, 161663208458 bytes
        193137004 packets output, 137418896469 bytes
        4003957 packets dropped
          1 minute input rate 13 pkts/sec,  2295 bytes/sec
          1 minute output rate 14 pkts/sec,  15317 bytes/sec
          1 minute drop rate, 2 pkts/sec
          5 minute input rate 4 pkts/sec,  794 bytes/sec
          5 minute output rate 1 pkts/sec,  477 bytes/sec
          5 minute drop rate, 2 pkts/sec
    Interface Vlan461 "Vlan461-SuldalHotellGjest", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.3.1, subnet mask 255.255.255.0
      Traffic Statistics for "Vlan461-SuldalHotellGjest":
        332909692 packets input, 351853184942 bytes
        312038518 packets output, 156669956740 bytes
        583171 packets dropped
          1 minute input rate 0 pkts/sec,  6 bytes/sec
          1 minute output rate 0 pkts/sec,  0 bytes/sec
          1 minute drop rate, 0 pkts/sec
          5 minute input rate 0 pkts/sec,  6 bytes/sec
          5 minute output rate 0 pkts/sec,  0 bytes/sec
          5 minute drop rate, 0 pkts/sec
    Interface Vlan462 "Vlan462-Suldalsposten", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.4.1, subnet mask 255.255.255.0
      Traffic Statistics for "Vlan462-Suldalsposten":
        33905 packets input, 14303320 bytes
        28285 packets output, 27536357 bytes
        10199 packets dropped
          1 minute input rate 0 pkts/sec,  6 bytes/sec
          1 minute output rate 0 pkts/sec,  0 bytes/sec
          1 minute drop rate, 0 pkts/sec
          5 minute input rate 0 pkts/sec,  6 bytes/sec
          5 minute output rate 0 pkts/sec,  0 bytes/sec
          5 minute drop rate, 0 pkts/sec
    Interface Vlan470 "vlan470-Kyrkjekontoret", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.202.1, subnet mask 255.255.255.0
      Traffic Statistics for "vlan470-Kyrkjekontoret":
        12176257 packets input, 4305665570 bytes
        10618750 packets output, 5982598969 bytes
        974796 packets dropped
          1 minute input rate 2 pkts/sec,  770 bytes/sec
          1 minute output rate 1 pkts/sec,  861 bytes/sec
          1 minute drop rate, 0 pkts/sec
          5 minute input rate 2 pkts/sec,  708 bytes/sec
          5 minute output rate 1 pkts/sec,  980 bytes/sec
          5 minute drop rate, 0 pkts/sec
    Interface Vlan480 "vlan480-Telefoni", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.20.1, subnet mask 255.255.255.0
      Traffic Statistics for "vlan480-Telefoni":
        246638 packets input, 43543149 bytes
        10 packets output, 536 bytes
        226674 packets dropped
          1 minute input rate 0 pkts/sec,  126 bytes/sec
          1 minute output rate 0 pkts/sec,  0 bytes/sec
          1 minute drop rate, 0 pkts/sec
          5 minute input rate 0 pkts/sec,  56 bytes/sec
          5 minute output rate 0 pkts/sec,  0 bytes/sec
          5 minute drop rate, 0 pkts/sec
    Interface Vlan490 "Vlan490-QNapBackup", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.10.1, subnet mask 255.255.255.0
      Traffic Statistics for "Vlan490-QNapBackup":
        137317833 packets input, 6066713912 bytes
        223933623 packets output, 263191563744 bytes
        531738 packets dropped
          1 minute input rate 0 pkts/sec,  135 bytes/sec
          1 minute output rate 0 pkts/sec,  0 bytes/sec
          1 minute drop rate, 0 pkts/sec
          5 minute input rate 0 pkts/sec,  68 bytes/sec
          5 minute output rate 0 pkts/sec,  0 bytes/sec
          5 minute drop rate, 0 pkts/sec
    Interface Vlan500 "Vlan500-HellandBadlands", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.30.1, subnet mask 255.255.255.0
      Traffic Statistics for "Vlan500-HellandBadlands":
        30816778 packets input, 4887486069 bytes
        42403099 packets output, 47831750415 bytes
        948717 packets dropped
          1 minute input rate 3 pkts/sec,  707 bytes/sec
          1 minute output rate 3 pkts/sec,  3459 bytes/sec
          1 minute drop rate, 0 pkts/sec
          5 minute input rate 0 pkts/sec,  23 bytes/sec
          5 minute output rate 0 pkts/sec,  31 bytes/sec
          5 minute drop rate, 0 pkts/sec
    Interface Vlan510 "Vlan510-IsTak", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.40.1, subnet mask 255.255.255.0
      Traffic Statistics for "Vlan510-IsTak":
        1253148 packets input, 245364736 bytes
        1225385 packets output, 525528101 bytes
        161567 packets dropped
          1 minute input rate 0 pkts/sec,  6 bytes/sec
          1 minute output rate 0 pkts/sec,  0 bytes/sec
          1 minute drop rate, 0 pkts/sec
          5 minute input rate 0 pkts/sec,  6 bytes/sec
          5 minute output rate 0 pkts/sec,  0 bytes/sec
          5 minute drop rate, 0 pkts/sec
    Interface Vlan600 "Vlan600-SafeQ", is up, line protocol is up
      Hardware is EtherSVI
        MAC address 001d.453a.ea0e, MTU 1500
        IP address 192.168.50.1, subnet mask 255.255.255.0
      Traffic Statistics for "Vlan600-SafeQ":
        1875377 packets input, 1267279709 bytes
        1056139 packets output, 290728055 bytes
        521943 packets dropped
          1 minute input rate 0 pkts/sec,  165 bytes/sec
          1 minute output rate 0 pkts/sec,  0 bytes/sec
          1 minute drop rate, 0 pkts/sec
          5 minute input rate 0 pkts/sec,  178 bytes/sec
          5 minute output rate 0 pkts/sec,  9 bytes/sec
          5 minute drop rate, 0 pkts/sec
    Interface Ethernet0/0 "", is up, line protocol is up
      Hardware is 88E6095, BW 100 Mbps
        Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)
        Available but not configured via nameif
        MAC address 001d.453a.ea06, MTU not set
        IP address unassigned
        1782670655 packets input, 1256666911856 bytes, 0 no buffer
        Received 95709 broadcasts, 0 runts, 0 giants
        1978 input errors, 1978 CRC, 0 frame, 0 overrun, 1978 ignored, 0 abort
        0 L2 decode drops
        17179928790 switch ingress policy drops
        1878320261 packets output, 1778955488577 bytes, 0 underruns
        0 output errors, 0 collisions, 0 interface resets
        0 babbles, 0 late collisions, 0 deferred
        0 lost carrier, 0 no carrier
        0 rate limit drops
        0 switch egress policy drops
    Interface Ethernet0/2 "", is up, line protocol is up
      Hardware is 88E6095, BW 100 Mbps
        Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)
        Available but not configured via nameif
        MAC address 001d.453a.ea08, MTU not set
        IP address unassigned
        1790819459 packets input, 1783854920873 bytes, 0 no buffer
        Received 27571913 broadcasts, 0 runts, 0 giants
        614 input errors, 614 CRC, 0 frame, 0 overrun, 614 ignored, 0 abort
        0 L2 decode drops
        19768 switch ingress policy drops
        1547507675 packets output, 991527977853 bytes, 0 underruns
        0 output errors, 0 collisions, 0 interface resets
        0 babbles, 0 late collisions, 0 deferred
        0 lost carrier, 0 no carrier
        0 rate limit drops
        0 switch egress policy drops
    Interface Ethernet0/3 "", is up, line protocol is up
      Hardware is 88E6095, BW 100 Mbps
        Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)
        Available but not configured via nameif
        MAC address 001d.453a.ea09, MTU not set
        IP address unassigned
        137318166 packets input, 9176625008 bytes, 0 no buffer
        Received 290030 broadcasts, 0 runts, 0 giants
        0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
        0 L2 decode drops
        335 switch ingress policy drops
        223933623 packets output, 267222625073 bytes, 0 underruns
        0 output errors, 0 collisions, 0 interface resets
        0 babbles, 0 late collisions, 0 deferred
        0 lost carrier, 0 no carrier
        0 rate limit drops
        0 switch egress policy drops

  • Office 2013 - OSD - Specify different config xml

    Hi Guys
    I want to deploy Office 2013 in different languages to different users. It seems there are a few ways to do this. But I am thinking I want to package all languages I need into one Office install package and then in the task sequence have groups for countries.
    Each country has a variable to specify which config.xml to use. Is this possible or is there a better way?
    (I just need to know how to point to the correct xml in the package, kind of like the unattend file) I know the rest if this is the way.
    ie.
    -France
    ---ConfigFR.xml
    -Germany
    ---ConfigGe.xml
    Sweden
    ---ConfigSE.xml
    Thanks
    NN

    Hi
    I know the original question has been answered, but I have a follow up question.
    I am deploying Windows 8.1 Update using custom variables to install Windows language packs and Office Language packs dynamically based on rules. Running just one language works fine. But if I have a multiple language package deployed to Windows the
    Office DTs do not pick this up (each DT is currently working of one language per DT and using operating system language to install the correct xml).
    See here:
    These are the DTs
    After doing a bit more reading. I now know I need to setup the rules differently. Can I set the rules to be English and Swedish install DT1, and English and Romanian install DT 2, English alone install DT 3 etc?
    I basically need an "AND" rule.
    thanks again
    NN
    *you may have to zoom to see the larger image.

  • Possible to have two login configs in same web app?

    Sorry for not having tried this first, my server and webapp are in a state
    of flux at this moment, but I wanted to see what the consensus is out there,
    not just whether I can or cannot make something work quickly.
    If I have two types of things that might be called in my Web App (WAR) in
    different ways (eg, browser accessing via HTTP by users that want to login
    via pretty forms, and SOAP clients that may access functionality through the
    same servlets (but with alternate Servlet Path Info after the servlet name
    in the URL)), is there ANY way I can have multiple login configs, each tied
    to a different security constraint within that web app?
    In other words, with a servlet of /frazzleblitz and security constraints
    like:
    <security-constraint>
    <web-resource-collection>
    <web-resource-name>Foo</web-resource-name>
    <url-pattern>/frazzleblitz/doFooBar</url-pattern>
    </web-resource-collection>
    <auth-constraint>
    <role-name>FoobarBrowserUsers</role-name>
    </auth-constraint>
    </security-constraint>
    and the SOAP constraint (for all users of incoming SOAP requests):
    <security-constraint>
    <web-resource-collection>
    <web-resource-name>Foo</web-resource-name>
    <url-pattern>/frazzleblitz/doFooBar</url-pattern>
    </web-resource-collection>
    <auth-constraint>
    <role-name>FoobarBrowserUsers</role-name>
    </auth-constraint>
    </security-constraint>
    where my frazzleblitz controller knows whether the incoming request is
    browser vs SOAP based by the path info after the servlet name
    Can I associate the first security constraint with a FORM based login
    config, and the second security constraint with a BASIC AUTH login config
    since I could in theory require SOAP clients to send in credentials in a
    HTTP BasicAuth header, but I can't expect a SOAP client to be HTTP
    Redirected to a login form and then to enter the right credentials into a
    user type form and then be redirected back to an app...
    Seems to me the J2EE Security spec is really lacking in the area of
    programmatic authentication (allowing my SOAP code to get credentials out of
    the request envelope and call an API to login myself). Yeah, WebLogic has
    the ServletAuthentication weak() API, but these apps need to be J2EE
    compliant and work across J2EE servers... Anybody know of any improvements
    coming in the J2EE security space to address such functionality needs?
    Thanks in advance
    Mike

    Sorry, hit send accidentally before finishing the second security
    constraint - I've fixed it up below to reflect what I meant...
    "Mike" <[email protected]> wrote in message
    news:[email protected]...
    Sorry for not having tried this first, my server and webapp are in a state
    of flux at this moment, but I wanted to see what the consensus is outthere,
    not just whether I can or cannot make something work quickly.
    If I have two types of things that might be called in my Web App (WAR) in
    different ways (eg, browser accessing via HTTP by users that want to login
    via pretty forms, and SOAP clients that may access functionality throughthe
    same servlets (but with alternate Servlet Path Info after the servlet name
    in the URL)), is there ANY way I can have multiple login configs, eachtied
    to a different security constraint within that web app?
    In other words, with a servlet of /frazzleblitz and security constraints
    like:
    <security-constraint>
    <web-resource-collection>
    <web-resource-name>Foo</web-resource-name>
    <url-pattern>/frazzleblitz/doFooBar</url-pattern>
    </web-resource-collection>
    <auth-constraint>
    <role-name>FoobarBrowserUsers</role-name>
    </auth-constraint>
    </security-constraint>
    and the SOAP constraint (for all users of incoming SOAP requests):
    <security-constraint>
    <web-resource-collection>
    <web-resource-name>Bar</web-resource-name>
    <url-pattern>/frazzleblitz/doSOAPRequest</url-pattern>
    </web-resource-collection>
    <auth-constraint>
    <role-name>SOAPUsers</role-name>
    </auth-constraint>
    </security-constraint>
    where my frazzleblitz controller knows whether the incoming request is
    browser vs SOAP based by the path info after the servlet name
    Can I associate the first security constraint with a FORM based login
    config, and the second security constraint with a BASIC AUTH login config
    since I could in theory require SOAP clients to send in credentials in a
    HTTP BasicAuth header, but I can't expect a SOAP client to be HTTP
    Redirected to a login form and then to enter the right credentials into a
    user type form and then be redirected back to an app...
    Seems to me the J2EE Security spec is really lacking in the area of
    programmatic authentication (allowing my SOAP code to get credentials outof
    the request envelope and call an API to login myself). Yeah, WebLogic has
    the ServletAuthentication weak() API, but these apps need to be J2EE
    compliant and work across J2EE servers... Anybody know of anyimprovements
    coming in the J2EE security space to address such functionality needs?
    Thanks in advance
    Mike

  • Remote system reboots due to error when exporting config.

    I have a PXI-8196 controller operating on a network in a PXI-1052 chassis.  I am trying to export the config and the remote system reboots due to system error.

    Your Computer looks to be a Late 2010 iMac, if so is the RAM spec as shown below?
    Maximum Memory
    16 GB
    Memory Slots
    4 - 204-pin PC3-10600 (1333 MHz) DDR3 SO-DIMM

  • Using a variable in Struts config, to redirect

    In the struts-config file,
    to redirect to a different site, I can use
    redirect="true"
    and mention full path, in my <forward path=
    variable.
    1. Is there a better way to do it?
    2. Since I have to do it in multiple places, is it possible to use a variable? I mean, something like this
    <forward
    name="success"
    path="URL/abc.html" />
    Where URL is a variable name that the site path? This way, I can reuse the variable to redirect to other pages too (xyz.html, for example)

    Hi there,
    I don't know...is there only one URL you are using ore are there more than one? Because if it's the same path everytime you can try using this:
    <forward
    name="success"
    path="./abc.html" />
        ./               // This is the shortcut for the directory you are currently using.
        ../              // This is the shortcut for the directory above the one you are currently using.This code should do it. If not, try to create a var named for example "vpath" and put it like this:
    <forward
    name="success"
    path=vpath+"abc.html" />Try and tell if it worked ;)
    X--spYro--X

  • Error while running config.sh to configure OIM 11.1.1.5.0

    Hi
    I have installed all the required SW to run OIM 11.1.1.5.0
    - DB 11.2.0.1
    - WLS 10.3.5.0
    - RCU 11.1.1.5.0
    - SOA 11.1.1.5.0
    - OIM 11.1.1.5.0
    I was able to create the WLS domain and to start the AdminServer.
    But when I try to run *~oracle/Middleware/Oracle_IDM1/bin/config.sh* to configure OIM, I get an error in the UI.
    If I look at the the log file, I see this error:
    [OIM_CONFIG] MBeanServerConnection to Domain Runtime Server established ....
    [2013-02-13T11:11:02.659-08:00] [as] [NOTIFICATION] [] [oracle.as.provisioning] [tid: 12] [ecid: 0000JnKxtFqFW7WFLzqIOA1H6yIm000003,0] [[
    [OIM_CONFIG] Permission for OIM Authenticator not set in system-jazn-data.xml.Hence setting it.
    [2013-02-13T11:11:02.668-08:00] [as] [ERROR] [] [oracle.as.install.engine.modules.configuration.standard.StandardConfigActionManager] [tid: 12] [ecid: 0000JnKxtFqFW7WFLzqIOA1H6yIm000003,0] One or More configurations failed. Exiting
    [2013-02-13T11:11:02.669-08:00] [as] [NOTIFICATION] [] [oracle.as.install.engine.modules.statistics] [tid: 12] [ecid: 0000JnKxtFqFW7WFLzqIOA1H6yIm000003,0] Install Adapter: Mark End for:CONFIG
    And this is the content of the output file
    [oracle@vm logs]$ cat install2013-02-13_11-06-46AM.out
    Setting UnixGroups to "{dba,}"
    Setting ORACLE_HOME to /mnt/ORACLE/Middleware/Oracle_IDM1
    Setting Doracle.config.mode to true
    Adding /tmp/OraInstall2013-02-13_11-06-46AM for deletion.
    Adding to classpath:file:/tmp/OraInstall2013-02-13_11-06-46AM/ext/jlib/oim/oim.jar
    Adding to classpath:file:/tmp/OraInstall2013-02-13_11-06-46AM/ext/jlib/oim/template.jar
    Adding to classpath:file:/tmp/OraInstall2013-02-13_11-06-46AM/ext/jlib/handlers/oimQueriesHandler.jar
    [email protected]ScreenRes
    configFileName:/oracle/as/install/oim/ui/xml/footprint.xml
    Setting current page standalone validations to true
    Setting current page standalone validations to true
    resultset.getStatus() : true
    Setting current page standalone validations to true
    In processFieldStringPassword
    In processFieldStringConnect String
    In processFieldStringMDS Password
    In processFieldStringMDS User
    In processFieldStringUser Name
    ORACLE_HOME:/mnt/ORACLE/Middleware/Oracle_IDM1
    LOCALE_PROPERTIES FILE LOCATION:/mnt/ORACLE/Middleware/Oracle_IDM1/inventory/Scripts/ext/jlib/oim/OIMLocales.properties
    LOCALE_LANG:en
    LOCALE_COUNTRY:US
    resultset.getStatus() : true
    Setting current page standalone validations to true
    In processFieldStringWebLogic Admin Server URL
    In processFieldStringWebLogic Administrator UserName
    In processFieldStringWebLogic Administrator Password
    connection obtained successfully...javax.management.remote.rmi.RMIConnector$RemoteMBeanServerConnection@759f31de
    resultset.getStatus() : true
    connection obtained successfully...javax.management.remote.rmi.RMIConnector$RemoteMBeanServerConnection@679e3bdd
    OIM Managed Server URL: http://vm.com:14000
    Setting current page standalone validations to true
    In processFieldStringConfirm User Password
    In processFieldStringOIM Administrator Password
    ResultSet : [System, Administrator, XELSYSADM]
    In processFieldStringKeyStore Password
    In processFieldStringConfirm KeyStore Password
    In processFieldStringProxy URL for OIM
    In processErrorMsgStringKeyStore Password
    resultset.getStatus() : true
    Setting current page standalone validations to true
    resultset.getStatus() : true
    ********Print out of data model is as follows******
    ------Page Variables of DomainSelectionOptionsWLSPage----
    In doFinish method checking for inventory lock...ConfigurationPage
    Setting current page standalone validations to true
    Oracle Home in OIMInstallActionProvider= /mnt/ORACLE/Middleware/Oracle_IDM1
    JAVA.LIBRARY.PATH:/tmp/OraInstall2013-02-13_11-06-46AM/jre/lib/amd64/server:/tmp/OraInstall2013-02-13_11-06-46AM/jre/lib/amd64:/tmp/OraInstall2013-02-13_11-06-46AM/jre/../lib/amd64:/mnt/ORACLE/Middleware/Oracle_IDM1/lib:/usr/java/packages/lib/amd64:/usr/lib64:/lib64:/lib:/usr/lib:/mnt/ORACLE/Middleware/Oracle_IDM1/lib/:/mnt/ORACLE/Middleware/Oracle_IDM1/jdk/jre/lib/i386/
    ORACLE_HOME = /mnt/ORACLE/Middleware/Oracle_IDM1
    domainHome :/u01/app/oracle/Middleware/user_projects/domains/oim_domain
    soaURL: t3://vm.com:8001
    providers.size[]...1
    providers Type...Server
    java.lang.NoClassDefFoundError: oracle/security/jps/mas/mgmt/jmx/policy/PortableCodeSource
    at oracle.as.install.oim.config.mbeans.ConfigureOIMAuthenticator.grantCSFReadWritePerms(ConfigureOIMAuthenticator.java:295)
    at oracle.as.install.oim.config.mbeans.ConfigureOIMAuthenticator.configureAuthenticatorMbean(ConfigureOIMAuthenticator.java:109)
    at oracle.as.install.oim.config.OIMConfigManager.configureOIM(OIMConfigManager.java:614)
    at oracle.as.install.oim.config.OIMConfigManager.doExecute(OIMConfigManager.java:538)
    at oracle.as.install.engine.modules.configuration.client.ConfigAction.execute(ConfigAction.java:335)
    at oracle.as.install.engine.modules.configuration.action.TaskPerformer.run(TaskPerformer.java:87)
    at oracle.as.install.engine.modules.configuration.action.TaskPerformer.startConfigAction(TaskPerformer.java:104)
    at oracle.as.install.engine.modules.configuration.action.ActionRequest.perform(ActionRequest.java:15)
    at oracle.as.install.engine.modules.configuration.action.RequestQueue.perform(RequestQueue.java:63)
    at oracle.as.install.engine.modules.configuration.standard.StandardConfigActionManager.start(StandardConfigActionManager.java:158)
    at oracle.as.install.engine.modules.configuration.boot.ConfigurationExtension.kickstart(ConfigurationExtension.java:81)
    at oracle.as.install.engine.modules.configuration.ConfigurationModule.run(ConfigurationModule.java:83)
    at java.lang.Thread.run(Thread.java:662)
    Caused by: java.lang.ClassNotFoundException: oracle.security.jps.mas.mgmt.jmx.policy.PortableCodeSource
    at oracle.as.install.engine.modules.configuration.standard.StandardConfigActionClassLoader.loadClass(StandardConfigActionClassLoader.java:75)
    at java.lang.ClassLoader.loadClass(ClassLoader.java:247)
    ... 13 more
    java.lang.IllegalStateException: Action:OIM Configuration failed with error:interrupted
    at oracle.as.install.engine.modules.configuration.client.ConfigAction.fail(ConfigAction.java:227)
    at oracle.as.install.oim.config.OIMConfigManager.doExecute(OIMConfigManager.java:554)
    at oracle.as.install.engine.modules.configuration.client.ConfigAction.execute(ConfigAction.java:335)
    at oracle.as.install.engine.modules.configuration.action.TaskPerformer.run(TaskPerformer.java:87)
    at oracle.as.install.engine.modules.configuration.action.TaskPerformer.startConfigAction(TaskPerformer.java:104)
    at oracle.as.install.engine.modules.configuration.action.ActionRequest.perform(ActionRequest.java:15)
    at oracle.as.install.engine.modules.configuration.action.RequestQueue.perform(RequestQueue.java:63)
    at oracle.as.install.engine.modules.configuration.standard.StandardConfigActionManager.start(StandardConfigActionManager.java:158)
    at oracle.as.install.engine.modules.configuration.boot.ConfigurationExtension.kickstart(ConfigurationExtension.java:81)
    at oracle.as.install.engine.modules.configuration.ConfigurationModule.run(ConfigurationModule.java:83)
    at java.lang.Thread.run(Thread.java:662)
    In Config Module Finish Event...
    In doCancel method ...
    Yes option....
    inventoryLocation: /u01/app/oraInventory
    outputFile:/u01/app/oraInventory/logs/installProfile2013-02-13_11-06-46AM.log
    in writeProfile method..
    [ENGINE] Adding /tmp/OraInstall2013-02-13_11-06-46AM for deletion.
    Any suggestion ?
    Thanks a lot

    Never mind
    I have figured it out.
    I had to create few symbolic links under $HOME/Middleware
    In particular Oracle_IDM1
    The config.sh script is setting ORACLE_HOME based on pwd.
    And pwd is returning the path of the linked directory and not $HOME/Middleware/Oracle_IDM1
    Once I fixed the script to simple use the correct ORACLE_HOME, it finishes correctly

  • HP LaserJet p1102w with Mac OS X10.6.8 HTML config issue

    Hello, 
    I have been using this printer for a few years now and have moved house a few times and successfully updated the wireless settings on the printer through HTML config. Lately, in printer utilities the HTML config button does not show up where it is meant to.
    I have installed / uninstalled the latest firmware, software drivers, printers and made sure they were platform specific.
    This is really annoying. 
    Is there old software available for download? it was working fine until the recent update - which I did so I could use the eprint features.
    Best regards
    Costas
    Printer: 
    HP LaserJet p1102w, Firmware datacode = 20130213
    Computer:
    Macbook white, late 2008 model: 2.4Ghz Core2Duo, 4G RAM with OS X 10.6.8

    From the name of the printer, it looks like you have it installed through a USB connection. 
    Here is what I would. First go into “System Preferences” and then select either  “Print & Scan” or "Print & Fax".
    Right click (or control + click) on the rectangle listing your printers and then select “Reset Printing System”.  
    NOTE: This will delete all printers. 
    After you have reset the printing system, let's make sure you have the most recent HP driver package installed. 
    You can download it here: http://support.apple.com/downloads/DL907/en_US/HPPrinterDrivers2.14.dmg
    Once you have downloaded the driver package and completed the installation, go into your print settings under System Preferences > Print & Scan. To add the printer, click the plus (+) sign. You should see your printer listed here. If not, click "Add Printer or Scanner." Click the name of your printer and then click "Use:” box.  Make sure that says the name of your printer and not AirPrint. Next make sure that the printer "Kind:" is set to Bonjour or Bonjour Multifunction. Click "Add" down in the bottom right hand corner.
    This will add your printer back using the most recent HP print driver available through Apple. Let me know if this helps resolve your issue or not. If it doesn't, let me know I will see what else I can do.
    Best of luck,
    Kyle
    -------------How do I give Kudos? | How do I mark a post as Solved? --------------------------------------------------------

  • Lenovo Yoga 2 13, Kali Linux 1.0.7, Ubuntu 14.04, Windows 8.1 install, config, and wifi fix.

    Lenovo Yoga 2 13, Kali Linux 1.0.7, Ubuntu 14.04, Windows 8.1 install, config, and wifi fix.
    I wanted to share an experience with everyone I hope will help others avoid what I have gone through the past 3 days. I bought a Yoga 11s that I loved but had some issues with the wireless, Lenovo being awesome replaced it with a Yoga 2 13. I love this laptop but ran into some issues with Linux install/wireless, which I wanted to show how to resolve in one place. Hopefully this will help someone else get through this quicker
    I am going to try and write this for someone with little Linux experience, if I miss the mark please let me know and I will clarify the best I can.
    For work I need Windows 8.1 and Kali Linux, while for home I prefer Ubuntu.
    My Yoga 2 13:
    I5 1.6 ghz
    8 GB ram
    256 GB SSD
    ORANGE!
    My requirements: 
    I need Windows
    I need Kali Linux (livecd, even with persistent mode was not an option as it would not save the wireless fix or system updates) – I would also like this on a USB drive and not the internal SSD
    I would like Ubuntu
    Needed to do this:
    1. 2 USB thumb drives (at least 8gb in size each) I used 2 Leef Supra 32GB drives. They are my favorite right now and are only about $27 at amazon.
    2. Phone that can USB Tether or a USB Ethernet card (External USB wireless will show as "Hardware Locked"). Again you can pick one up for sub $10 if you need the USB Ethernet route. I used my Galaxy S5, you will need to download 200-300 mb of items through this so make sure you have the data if you go that route.
    3. You may be able to get a USB wifi card to work if you do the following after boot. This only worked once for me.
                    a.Type ‘sudo rmmod iwlmvm’
    b.Type ‘sudo rmmod iwlwifi’
    4. ISOs of Ubuntu and Kali Linux (I used Ubuntu 14.04 and Kali Linux 1.0.7)
    5. Software to unzip the ISOs. I recommend 7-ZIP and will be referencing this in this guide.
    6. I will include the EFI boot files and the WiFi fix files if I can attach. Otherwise I will provide a link to them.
       Link: https://www.dropbox.com/s/puxnnoft3gn2b6l/WiFiFix.zip
    Recommended (these are just in case you corrupt something making your system not see any OS
    1.  I would call Lenovo beforehand and get a set of recover disks (this will take 2-3 days)
    2. In the meantime a USB Windows 8.1 or 8 ISO (the repair feature may save you)
    *Note: At many points in this guide I detail steps and commands. Please double check that you understand the step before proceeding. There are multiple points where a mistyped command or clicking the wrong option will cause your entire system to fail and you will need to reformat the entire drive and start over. This also will make One Touch recovery not work. Proceed with caution.*
    I did not need to disable ‘secure boot’ to do this, but keep in mind that you may need to.
    Steps:
    First let’s go through the installs, and then we will go through grub config and wireless fix
    1. In Windows scroll to computer and right click, select manage.
    2. Go to “Disk Management”
    3. Select the main HDD (notice Lenovo puts a stupid number of partitions on here)
    a. I deleted the D: drive on here, if you do this make sure to copy the drives over to your main C: drive. You will want to run each of the installers and repair the drivers after.
    4. I used the space from the D: drive and pulled a little more creating a 50 GB partition for Ubuntu and my swap file
    a. You can also add more space by right clicking your C drive and selecting shrink
    b. Do not format the partitioned data as this will make identifying it later much easier.
    5. Open a command line
                    a. Swipe from the right of the screen and select search
                    b. Type ‘cmd’
                    c. right click and select ‘run as admin’
    6. For Ubuntu: Type ‘diskpart’ into the command line
                    a. type ‘list disk’
    i. You should see 2-3 disks depending on if you have one or both usb drives in the laptop at the time. I would suggest only doing 1 at a time so you don’t lose track.
                    b. type ‘select disk $’ (Replace the $ with the number of the drive)
    c. ***** Before proceeding make sure you have the correct drive selected or you can ruin your Windows install and Lenovo one touch recovery will not fix it since we have changed the partitions *****
    d. type ‘clean’
    e. type ‘create partition primary’
    f. type ‘active’
    g. type ‘format  fs=fat32 quick’
    h. type ‘assign’
    i. type ‘exit’
    6. For Kali Linux: Type ‘diskpart’ into the command line
                    a. type ‘list disk’
    i. You should see 2-3 disks depending on if you have one or both usb drives in the laptop at the time. I would suggest only doing 1 at a time so you don’t lose track.
                    b. type ‘select disk $’ (Replace the $ with the number of the drive)
    c. ***** Before proceeding make sure you have the correct drive selected or you can ruin your Windows install and Lenovo one touch recovery will not fix it since we have changed the partitions *****
    d. type ‘clean’
    e. type ‘create partition primary size= 3272
    f. type ‘active’
    g. type ‘format  fs=fat32 quick’
    h. type ‘assign’
    i. type ‘exit’
    j. By doing this we can maintain a portion of this drive as the install CD and still have linux install/ liveCD if we need to run it on another machine.
    7. At this point the drive is ready to have the contents of the ISO copied over.
    8. Right click the ISO and select 7-zip then ‘zip to /’ This should unzip the ISO to the location of the ISO into a folder named exactly the same as the ISO.
    9. Once this is done for Ubuntu ISO it is done
    10. Kali requires a little bit more to be ready
                    a. Kali will need some files added for EFI boot. --$--
                                   i. Thanks to: https://forums.kali.org/showthread.php?271-How-to-EFI-install-Kali-Linux
                                   ii. EFI files are located within the wifi fix folder https://www.dropbox.com/s/puxnnoft3gn2b6l/WiFiFix.zip
    11. Now let’s start with Ubuntu
    Ubuntu install
    1.     Place USB drive into the laptop and press the “Lenovo boot” button next to the power button
    2.     Select ‘Boot Menu’
    3.     Select ‘EFI USB Device (Name of drive)’ Mine stated Leef Supra
    4.     Select ‘install Ubuntu’
    5.     Go through the Ubuntu install until you get to select the install drive
    6.     Once you get to the install portion it will ask you to select from one of 4 options. Select ‘Manually select partition’
    7.     Select the “Free Space” where we opened up some of the drive
    8.     You will need to create 2 partitions, I usually create the swap partition at the end of the drive
    a.     First I create the swap
                                              i.    Set at the end of the drive
                                             ii.    Set size to 1024 mb
                                            iii.    Set type to ‘swap’
    b.     Second create the ext 4 partition
                                              i.    Set to beginning of drive
                                             ii.    Set to remainder of the space
                                            iii.    Set type to ext4
                                            iv.    Set mount point to /
    9.     Finish the install and boot into Ubuntu
    10.   You will notice that your wireless is ‘disabled by hardware’ This is fine for the time being and we will worry about this after the kali install. If we fix it now for some reason after installing kali we get the error again and would just need to fix it again.
    Kali Linux install
    1.     Place USB drive into the laptop and press the “Lenovo boot” button next to the power button
    2.     Select ‘Boot Menu’
    3.     Select ‘EFI USB Device (Name of drive)’ Mine stated Leef Supra
    4.     From the grub menu select ‘install kali linux’ both graphical and text work. I much prefer text install
    5.     You will get a few errors through the install but that is fine
    6.     The first we see is about network hardware and ‘load missing firmware from removable media?’ – Select ‘no’
    7.     Then select no ethernet card
    8.     It will have you name your machine then it will ask you for the root password
    a.     If you want to just use root *not recommended* place the password here
    b.     If you wish to use a non-root account then leave these blank and it will ask you for a name, username, and password of the new machine *Very Recommended* - this will also add this user to the sudoers file
    9.     It will then ask you to ‘partition disks’
    10.   Select manual
    11.   Now here is where it can get a little confusing so read twice click once
    12.   Select the USB drive from this list
    13.   Mine shows up under (sdb) – Leef Supra
    a.     It could be sdc, sdd, sde, etc… depending on how many drives you have plugged in.
    14.   You should see one primary drive that is 3gb or so that is formatted as FAT32. – DO NOT TOUCH THIS PARTITION!
    15.   You should see the remainder of this drive as ‘FREE SPACE’ select that
    16.   Create a partition at the end at size 1024mb and swap
    17.   Then create another one for the remainder of the drive and set it to ext4 with mountpoint of /
    18.   Continue through the install after you should see an error warning you that ‘you may not be able to boot’ that is fine, select continue
    19.   Then select from the menu of all the options ‘continue without bootloader’
    20.   It should finish up then reboot on its own.

    First setup/boot/fix grub
    1.     You should  be able to boot up into GRUB2 menu now.
    2.     You may not see kali linux in this menu (make sure you have your towel and don’t panic!)
    3.     Boot into Ubuntu
    4.     Once you log in you should see that you still cannot use wireless due to being locked by hardware
    5.     This is expected
    6.     Let’s fix grub then we will come back to fixing wireless
    7.     Plug in your device to connect to the internet (USB Tethering or USB Ethernet)
    8.     Once you verify that you now have an internet connection run the following from terminal
    a.     ‘sudo add-apt-repository ppa:danielrichter2007/grub-customizer’
    b.     ‘sudo apt-get update’
    c.     ‘sudo apt-get install grub-customizer’
    9.     You can also edit the grub.cfg manually if you know what you are doing… I did not
    10.   Open grub  customizer
    11.   It should auto populate and you should see ‘debian (kali linux)’ somewhere in the list
    12.   It should be mounted to /dev/sdb2 or /dev/sdc2 depending on how many devices you have
    13.   At this point go ahead and save
    14.   Reboot and test that you can get into each OS
    15.   This is where my inexperience got me. I spent 2 of my days so I am including this error: If when you boot into Kali you get an error somewhere that says ‘/bin/sh: can’t access tty: job control turned off’ look above it for an error that looks similar to ‘ALERT! /dev/sdc2 does not exist. Dropping to a shell!!’
    a.     That error is due to the mount point being incorrect in grub, reboot and from within grub highlight the kali boot. Press ‘e’ then towards the bottom you should see ‘root=/dev/sdc2’ change this to ‘root=/dev/sdb2’ again the number doesn’t matter just make sure it stays the same.
    b.     Press F10
    c.     If this boots fine then you will need to go back and fix the grub.cfg or load into Ubuntu and open grub customizer again, it should fix this
    16.   Now you have 3 working OS on the machine with one being on a USB! Congrats!
    17.   You can remove the USB with no worry of screwing up your install, but you will not be able to boot into Kali Linux until you replace it. I would suggest only removing it and replacing it while the machine is powered off, but that’s just me.
    Fix Wireless
    Now is the time to do what probably ¾ of you came here for. FIX THE DANG WIRELESS. This is a huge problem from Lenovo’s side that I hope they realize how important Linux is and will fix. I won’t hold my breath though.
    Log into Ubuntu : This is well documented in the following forum post on page 3 by user Haohe:
    http://ubuntuforums.org/showthread.php?t=2215044&page=3
    His has you download quite a large file, mine should be much smaller.
    https://www.dropbox.com/s/puxnnoft3gn2b6l/WiFiFix.zip
    1.     Download the attached package with the fix.
    2.     Connect your USB internet device (tether or ethernet)
    3.     Place the packages somewhere easy to access, in this example I will place them under ~/Desktop/WiFiFix
    4.     Type ‘cd ~/Desktop/WiFiFix/’
    5.     Now we need to prep the tools we need.
    6.     Type ‘sudo apt-get update’ – we did this before, but you know, just in case
    7.     Type ‘sudo apt-get install linux-headers-`uname –r`’   Note around uname-r they are the ` symbol not the ‘ this is located just above the tab on the same key as ~.
    8.     Type ‘make’
    9.     Type ‘sudo cp /lib/modules/3.13.0-24-generic/kernel/drivers/platform/x86/ideapad-laptop.ko ~/ideapad-laptop.ko.backup’
    10.   Type ‘sudo cp ~/Desktop/WiFiFix/ideapad-laptop.ko /lib/modules/3.13.0-24-generic/kernel/drivers/platform/x86/’
    11.   Type ‘sudo modprobe -r ideapad-laptop’
    12.   Type ‘sudo modprobe ideapad-laptop’
    13.   Type ‘sudo rfkill unblock all’
    14.   Type ‘sudo modprobe -r ideapad-laptop’
    15.   Type ‘sudo mv ~/ideapad-laptop.ko.backup /lib/modules/3.13.0-24-generic/kernel/drivers/platform/x86/ideapad-laptop.ko’
    16.   Next we need to blacklist the ideapad module
    17.   Type ‘sudo echo 'blacklist ideapad-laptop' > /etc/modprobe.d/blacklist-ideapad.conf’
    a.     The first time I tried this it wouldn’t work. So I did the following
    b.     ‘sudo touch /etc/modprobe.d/blacklist-ideapad.conf’
    c.     ‘sudo vim /etc/modprobe.d/blacklist-ideapad.conf’
    d.     Enter     blacklist ideapad-laptop
    e.     Exit and save
    18.   Reboot your Yoga 2 13
    19.   Boot into kali and see if you have wireless, if you do then you are done. If not we will need to repeat this process with one small little change.
    Kali Wifi Fix
    1.     Copy the sources.list from the package provided
    2.     Replace /etc/apt/sources.list with the included
    3.     Some of the file path changes but the process remains the same from here.
    Congratulations you now have 3 OSes one portable to other machines and working wifi!
    Thank you
    SirGed

  • ISE 1.2 and maximum PSNs supported in my Persona config

    Hello folks,  I am putting together a medium to large distributed ISE deployment and wondered if anybody could tell me what the maximum number of PSNs are allowed under this configuration.   I was reading thru an older training document with version 1.1 and it suggested only 5, which is why I am wondering if the specs changed on 1.2 but I cannot find them anywhere handy.
    I have a large VM running the PRIMARY admin persona which also is secondary for my reporting & monitoring in my main data center.
    In another state (connected with 10G) is another large VM acting as my secondary admin persona with primary monitoring & reporting.
    Across multiple states I want to have multiple PSNs across the geographical layouts of each state but I am not sure if I can scale enough PSNs with my current version of 1.2 and my persona config listed above.    I have a need for about 12 to 15 PSNs.
    Wondering if I need two more VMs to break out my monitoring as one node in DC1 and secondary monitoring in DC2 in order to get more PSN scalability.
    Any help would be greatly appreciated.
    -Thanks

    As Marvin suggested, I would look into using 1.3 at this point unless you have some specific concerns with that version and really want to stay with 1.2. With that being said, here are my recommendations/comments:
    - Both v1.2 and v1.3 can actually scale up to 40 PSN nodes
    - If any of your PSN nodes are going to be placed in the same location and are layer 2 adjacent I would recommend putting them in a node group and behind a load balancer. If you don't have a load balancer, I would still put them in a node group. At the moment a node group can have up to 10 PSNs
    - If you are going to have 10-15 PSN nodes then you should dedicate 2 nodes for specifically for the monitoring persona
    - The maximum roundtrip delay between any nodes cannot exceed 200ms
    For more info you can always reference the "Network Deployment" section in the hardware installation guide for ISE:
    v1.3
    http://www.cisco.com/c/en/us/td/docs/security/ise/1-3/installation_guide/b_ise_InstallationGuide13/b_ise_InstallationGuide12_chapter_00.html
    v1.2
    http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/installation_guide/ise_ig/ise_deploy.html
    Thank you for rating helpful posts!

  • How do I disable "Exceptions" button for "Block pop-up windows" in Content tab?. I am able to Disable other Exception buttons in this tab using about:config preference.

    Need a way to disable "Exception" button for "Block Pop-up windows" in Tools-> Options -> Content tab. I want to be able to do this for Locking Down Firefox preferences.
    == User Agent ==
    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64; Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)

    That button doesn't have a pref associated with it, so you can't disable that button with a pref on the about:config page or a lockPref call.
    That only leaves the choice to remove that button with code in userChrome.css
    <pre><nowiki>#popupPolicyButton {display:none!important;}</nowiki></pre>
    See http://kb.mozillazine.org/Editing_configuration#How_to_edit_configuration_files

  • Can I config timesten not to hold all data in memory?

    In our production environment we use a server with 32GB memory to run Timesten, but developer machine only have 2GB memory. Now we are going to fix some issue that require duplicate the production data to Developer machine, can we have config timesten not to hold all data in memory so that it is possible to duplicate the production data to Developer machine? Is timesten support something like cache table as hsql?
    http://hsqldb.sourceforge.net/web/hsqlFAQ.html#BIGRESULTS

    TimesTen is an in-memory database. All the data that is managed directly by TimesTen must be 'in memory' and the machine hosting the datastore must have enough physical memory or system performance will be severely degraded.
    The only way to have a combined in-memory and on-disk solution is to introduce a backend Oracle database (10g or 11g) and use TimesTen cache connect. Of course, this then becomes a very different configuration and depending on what 'issue' it is that you need to investigate and fix the change to a Cache Connect configuration may hinder that investigation.
    Chris

  • WRT54G firmware failure leaving no access to router config

    I have a WRT54G router.  Running Vista SP2 64-bit on a laptop wired to router.  When I first tried to upgrade the firmware I was connected wirelessly.  (I know, please just think it but don't type it)  During the upgrade the internet connection disconnected and the upgrade failed.  I am connecting right now wirelessly using someones unsecure network.  I attempted to upgrade the firmware to 8.00.7.  Since then I am unable to access the router config using IP 192.168.1.1.  I have read as many posts as I can handle.  I have checked and that is the IP showing in Vista, (Network & Sharing, view status, properties) however I cannot ping that IP.  It times out every time.  I have done all the resets (10 seconds and up to 1 minute) on the router and power cycle etc.  Nothing.  I downloaded the firmware utility and I get an error message everytime that it is unable to get responses from the server.  I have tried my password, which I think is gone due to all the resets, and am using admin as the password.  I have disabled my firewall.  I do have Network Magic and when I checked control internet access it says I am able to do so.  Is there a way to disable Network Magic?  Can that be the issue?  When all this started I had my own internet connetion.  I'm in the process of moving so I have disconnected my internet service.  Since I'm only trying to connect to the router locally, do I really need to have a live internet connection?  Please, HELP!  I don't want to buy a new router.  This one has been very reliable.  If I do have to buy something new, can you recommend something just as reliable. 
    There have been 2 or 3 times where it looked as though I was going to be able to connect to config interface and the firsrt basic screen loads with minimal data and no clickable links to allow me to change screens.  The "&" from one of the links that is supposed to appear but does not,  is the only thing that appears in that area and if I click it, I either get a error from IE that it cannot connect, or, it takes me to the Ports screen with minimal data and I cannot progress from there.  In the top right corner of the screen, it does show the firmware version is 8.00.7.  ?????
    P.S.  Obviously, I'm not very computer savvy so excuse me if I'm missing the obvious.
    Message Edited by Steviegt on 09-29-2009 08:38 AM
    Message Edited by Steviegt on 09-29-2009 08:43 AM
    Windows Vista Home Premium SP2 64-bit
    Internet Explorer v8
    Office 2007 SP2 Home and Student
    Outlook 2007 Standalone
    ESET Smart Security
    WRT54G v8.00.6
    Solved!
    Go to Solution.

    Its Great that your issue has been resolved now...

  • Config air-lap1041n-e-k9 with cisco 5500 (5508) series wireless controller. how to?

    Hi!
    I try to configure a Cisco 5508 Wireless controller and 25 Air-lap1041 to use as VoIP and data. I read documents, manuals, etc, but the AP doesn't charge the configuration, or not conect with the Wireless Controller, why? No Radius server present, only WPA security.howto, please...
    I try to put a static ip in the LAP, with lwapp or capwap command, (LWAPP/CAPWAP ap ip address direccion mascara) and the AP returns "You should configure Domain and Name Server from controller CLI/GUI." and i can't change the name of the AP (Command is disabled).
    Log from AP:
    using ÿÿÿÿ ddr static values from serial eeprom
    ddr init done
    Running Normal Memtest...
    Passed.
    IOS Bootloader - Starting system.
    FLASH CHIP:  Numonyx P33
    Checking for Over Erased blocks
    Xmodem file system is available.
    DDR values used from system serial eeprom.
    WRDTR,CLKTR: 0x83000800, 0xc0000000
    RQDC, RFDC : 0x80000037, 0x00000184
    PCIE0: link is up.
    PCIE0: VC0 is active
    PCIE1: link is NOT up.
    PCIE1 port 1 not initialize
    PCIEx: initialization done
    flashfs[0]: 6 files, 2 directories
    flashfs[0]: 0 orphaned files, 0 orphaned directories
    flashfs[0]: Total bytes: 32385024
    flashfs[0]: Bytes used: 2369024
    flashfs[0]: Bytes available: 30016000
    flashfs[0]: flashfs fsck took 21 seconds.
    Reading cookie from system serial eeprom...Done
    Base Ethernet MAC address: 44:2b:03:dc:09:25
    Ethernet speed is 1000 Mb - FULL duplex
    Loading "flash:/c1140-rcvk9w8-mx/c1140-rcvk9w8-mx"...###########################
    File "flash:/c1140-rcvk9w8-mx/c1140-rcvk9w8-mx" uncompressed and installed, entr
    y point: 0x4000
    executing...
    enet halted
                  Restricted Rights Legend
    Use, duplication, or disclosure by the Government is
    subject to restrictions as set forth in subparagraph
    (c) of the Commercial Computer Software - Restricted
    Rights clause at FAR sec. 52.227-19 and subparagraph
    (c) (1) (ii) of the Rights in Technical Data and Computer
    Software clause at DFARS sec. 252.227-7013.
               cisco Systems, Inc.
               170 West Tasman Drive
               San Jose, California 95134-1706
    Cisco IOS Software, C1040 Software (C1140-RCVK9W8-M), Version 12.4(23c)JA, RELEA
    SE SOFTWARE (fc3)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2010 by Cisco Systems, Inc.
    Compiled Tue 01-Jun-10 12:53 by prod_rel_team
    Proceeding with system init
    Proceeding to unmask interrupts
    Initializing flashfs...
    FLASH CHIP:  Numonyx P33
    Checking for Over Erased blocks
    flashfs[1]: 6 files, 2 directories
    flashfs[1]: 0 orphaned files, 0 orphaned directories
    flashfs[1]: Total bytes: 32126976
    flashfs[1]: Bytes used: 2369024
    flashfs[1]: Bytes available: 29757952
    flashfs[1]: flashfs fsck took 7 seconds.
    flashfs[1]: Initialization complete.
    flashfs[2]: 0 files, 1 directories
    flashfs[2]: 0 orphaned files, 0 orphaned directories
    flashfs[2]: Total bytes: 11999232
    flashfs[2]: Bytes used: 1024
    flashfs[2]: Bytes available: 11998208
    flashfs[2]: flashfs fsck took 1 seconds.
    flashfs[2]: Initialization complete....done Initializing flashfs.
    Ethernet speed is 1000 Mb - FULL duplex
    This product contains cryptographic features and is subject to United
    States and local country laws governing import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third-party authority to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. and local country laws. By using this product you
    agree to comply with applicable laws and regulations. If you are unable
    to comply with U.S. and local laws, return this product immediately.
    A summary of U.S. laws governing Cisco cryptographic products may be found at:
    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
    If you require further assistance please contact us by sending email to
    [email protected].
    cisco AIR-LAP1041N-E-K9    (PowerPC405ex) processor (revision B0) with 98294K/32
    768K bytes of memory.
    Processor board ID FCZ1611W414
    PowerPC405ex CPU at 333Mhz, revision number 0x147E
    Last reset from reload
    LWAPP image version 7.0.94.21
    1 Gigabit Ethernet interface
    32K bytes of flash-simulated non-volatile configuration memory.
    Base ethernet MAC Address: 44:2B:03:DC:09:25
    Part Number                          : 73-14034-04
    PCA Assembly Number                  : 800-34273-05
    PCA Revision Number                  : A0
    PCB Serial Number                    : FOC16075VZ3
    Top Assembly Part Number             : 800-34284-03
    Top Assembly Serial Number           : FCZ1611W414
    Top Revision Number                  : A0
    Product/Model Number                 : AIR-LAP1041N-E-K9
    % Please define a domain-name first.
    Press RETURN to get started!
    Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
    *Mar  1 00:00:09.574: *** CRASH_LOG = YES
    Base Ethernet MAC address: 44:2B:03:DC:09:25
    *Mar  1 00:00:09.838: %LWAPP-3-CLIENTEVENTLOG: Read and initialized AP event log
    (contains, 1024 messages)
    *Mar  1 00:00:11.848: %LINK-3-UPDOWN: Interface GigabitEthernet0, changed state
    to up
    *Mar  1 00:00:11.892: %SYS-5-RESTART: System restarted --
    Cisco IOS Software, C1040 Software (C1140-RCVK9W8-M), Version 12.4(23c)JA, RELEA
    SE SOFTWARE (fc3)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2010 by Cisco Systems, Inc.
    Compiled Tue 01-Jun-10 12:53 by prod_rel_team
    *Mar  1 00:08:16.954: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEth
    ernet0, changed state to up
    logging facility kern
            ^
    % Invalid input detected at '^' marker.
    *Mar  1 00:08:28.047: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROL
    LER
    *Mar  1 00:08:28.049: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Mar  1 00:09:08.282: %CDP_PD-2-POWER_LOW: All radios disabled - LOW_POWER_CLASS
    IC_NO_INJECTOR_CONFIGURED AIR-CT5508-K9 (c464.138f.9345)
    *Mar  1 00:09:08.282:  -Verify the required power-injector is installed on this
    port: AIR-CT5508-K9(Gig 0/0/2).
    *Mar  1 00:09:08.282:  -If a power-injector is installed, issue the command:"pow
    er inline negotiation injector installed"
    *Mar  1 00:12:19.976: %CAPWAP-5-STATIC_TO_DHCP_IP: Could not discover WLC using
    static IP. Forcing AP to use DHCP.
    *Mar  1 00:12:29.993: %CAPWAP-3-ERRORLOG: Not sending discovery request AP does
    not have an Ip !!
    *Mar  1 00:12:39.994: %CAPWAP-3-ERRORLOG: Not sending discovery request AP does
    not have an Ip !!
    *Mar  1 00:12:49.993: %CAPWAP-3-ERRORLOG: Not sending discovery request AP does
    not have an Ip !!
    *Mar  1 00:12:59.994: %CAPWAP-3-ERRORLOG: Not sending discovery request AP does
    not have an Ip !!
    *Mar  1 00:13:09.993: %CAPWAP-3-ERRORLOG: Not sending discovery request AP does
    not have an Ip !!
    Not in Bound state.
    *Mar  1 00:13:19.993: %CAPWAP-3-ERRORLOG: Not sending discovery request AP does
    not have an Ip !!
    *Mar  1 00:13:19.993: %CAPWAP-5-DHCP_RENEW: Could not discover WLC using DHCP IP
    . Renewing DHCP IP.
    logs from wireless controller:
    (Cisco Controller) >show interface summary
    Interface Name                   Port Vlan Id  IP Address      Type    Ap Mgr Gu
    est
    ap-manager                       2    untagged 209.165.200.231 Dynamic Yes    No
    management                       1    untagged 209.165.200.230 Static  Yes    No
    service-port                     N/A  N/A      192.168.1.157   Static  No     No
    virtual                          N/A  N/A      1.1.1.1         Static  No     No
    (Cisco Controller) >
    i conect with service-port ok  and the management port works, i think.
    AP442b.03dc.0925>ping 209.165.200.230
    Type escape sequence to abort.
    Sending 5, 100-byte ICMP Echos to 209.165.200.230, timeout is 2 seconds:
    Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
    AP442b.03dc.0925>
    Help, please!
    i write in spanish:
    Hola:
    Tengo que configurar un cisco 5508 wireless controller con 25 air-lap1041n, para usarlo como acceso de datos y voz. ¿Cómo lo hago? He leído manuales, y seguido las instrucciones, pero el punto de acceso parace que no es capaz de cargar el perfil. No hay servidor radius, solo la configuración de una clave wpa. Alguién me puede indicar pasos, Gracias

    Hi!
    I buy a gigabit switch. I connect the service-port to gigabit switch, and laptop to gigabit switch. I used 192.168.1.x ip address (192.168.1.157 to service-port and 192.168.1.233 to wired port on laptop, well, the laptop has two ip adress, 192.168.1.233 and 209.165.200.2, and the laptop works ok. Ping to 209.165.200.230 -ip address of management interface- and ping to 209.165.200.203 -ip address for AP, is assigned by  DHCP of WLC. And i connect the ap to gigabit switch, and the wlc assigns well an ip direction.
    I post the run-config and sysinfo log. The gigabit switch is tp-link model tl-sg1005d, no configuration.
    Before the logs, I see this message from AP:
    *Apr 19 23:10:20.211: %CAPWAP-3-ERRORLOG: This AP is not supported in controller
    version 6.0.199.4  ---->What's mean that? Is it compatible the ap with the WLC? ¿Es compatible el AP con el WLC? 
    Hola:
    He comprado un switch gigabit. Conecto el service-port al switch gigabit y el portátil también (por cable). Uso como direcciones ip el rango 192.168.1.x (192.168.1.157 asignado al service-port y 192, 168.1.233 al portátil, bueno, el portátil tiene dos direcciones, la dicha anteriormente y la 209.165.200.2) El portátil funciona bien, hace ping al 209.165.200.230 - la ip de la management interface, y a 209.165.200.203 - ip asignada al AP por el DHCP del WLC. He conectado el AP al swtich gigabit, y el dhcp del wlc asigna correctamente una dirección ip.
    Añado a continuación los resultados de los comandos "show run-config" y "show sysinfo". El switch es un TP-LINK modelo TL-S1005D, sin necesidad de configuración.
    Antes de mostrar los resultados de los comandos, he visto el siguiente mensaje en el log del AP:
    *Apr 19 23:10:20.211: %CAPWAP-3-ERRORLOG: This AP is not supported in controller
    version 6.0.199.4  ---->What's mean that? Is it compatible the ap with the WLC? ¿Es compatible el AP con el WLC? 
    Un saludo
    Antonio R.
    (Cisco Controller) >show run-config
    Press Enter to continue...
    System Inventory
    NAME: "Chassis"    , DESCR: "Cisco Wireless Controller"
    PID: AIR-CT5508-K9,  VID: V02,  SN: FCW1608L05X
    Burned-in MAC Address............................ C4:64:13:8F:93:40
    Power Supply 1................................... Present, OK
    Power Supply 2................................... Absent
    Maximum number of APs supported.................. 25
    Press Enter to continue or to abort
    System Information
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 6.0.199.4
    Bootloader Version............................... 1.0.1
    Field Recovery Image Version..................... 6.0.182.0
    Firmware Version................................. FPGA 1.3, Env 1.6, USB console
    1.27
    Build Type....................................... DATA + WPS
    System Name...................................... CISCO-CAPWAP-CONTROLLER
    System Location..................................
    System Contact...................................
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1069
    IP Address....................................... 209.165.200.230
    Last Reset....................................... Power on reset
    System Up Time................................... 0 days 0 hrs 17 mins 45 secs
    System Timezone Location......................... (GMT +1:00) Amsterdam, Berlin,
    Rome, Vienna
    Current Boot License Level....................... base
    Current Boot License Type........................ Permanent
    Next Boot License Level.......................... base
    Next Boot License Type........................... Permanent
    Configured Country............................... ES  - Spain
    Operating Environment............................ Commercial (0 to 40 C)
    Internal Temp Alarm Limits....................... 0 to 65 C
    Internal Temperature............................. +36 C
    External Temperature............................. +23 C
    Fan Status....................................... OK
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Disabled
    Number of WLANs.................................. 1
    3rd Party Access Point Support................... Disabled
    Number of Active Clients......................... 0
    Burned-in MAC Address............................ C4:64:13:8F:93:40
    Power Supply 1................................... Present, OK
    Power Supply 2................................... Absent
    Maximum number of APs supported.................. 25
    Press Enter to continue or to abort
    Switch Configuration
    802.3x Flow Control Mode......................... Disable
    FIPS prerequisite features....................... Disabled
    secret obfuscation............................... Enabled
    Network Information
    RF-Network Name............................. hosp
    Web Mode.................................... Disable
    Secure Web Mode............................. Enable
    Secure Web Mode Cipher-Option High.......... Disable
    Secure Web Mode Cipher-Option SSLv2......... Enable
    Secure Shell (ssh).......................... Enable
    Telnet...................................... Disable
    Ethernet Multicast Forwarding............... Disable
    Ethernet Broadcast Forwarding............... Disable
    AP Multicast/Broadcast Mode................. Unicast
    IGMP snooping............................... Disabled
    IGMP timeout................................ 60 seconds
    User Idle Timeout........................... 300 seconds
    ARP Idle Timeout............................ 300 seconds
    Cisco AP Default Master..................... Enabled
    AP Join Priority............................ Disable
    Mgmt Via Wireless Interface................. Disable
    Mgmt Via Dynamic Interface.................. Disable
    Bridge MAC filter Config.................... Enable
    Bridge Security Mode........................ EAP
    Mesh Full Sector DFS........................ Enable
    --More or (q)uit current module or to abort
    --More or (q)uit current module or to abort
    AP Fallback ................................ Enable
    Web Auth Redirect Ports .................... 80
    Fast SSID Change ........................... Disabled
    IP/MAC Addr Binding Check .................. Enabled
    Press Enter to continue or to abort
    Port Summary
               STP   Admin   Physical   Physical   Link   Link
    Pr  Type   Stat   Mode     Mode      Status   Status  Trap     POE    SFPType
    1  Normal  Forw Enable  Auto       1000 Full  Up     Enable  N/A     1000BaseTX
    2  Normal  Disa Enable  Auto       Auto       Down   Enable  N/A     Not Present
    3  Normal  Disa Enable  Auto       Auto       Down   Enable  N/A     Not Present
    4  Normal  Disa Enable  Auto       Auto       Down   Enable  N/A     Not Present
    5  Normal  Disa Enable  Auto       Auto       Down   Enable  N/A     Not Present
    6  Normal  Disa Enable  Auto       Auto       Down   Enable  N/A     Not Present
    7  Normal  Disa Enable  Auto       Auto       Down   Enable  N/A     Not Present
    8  Normal  Disa Enable  Auto       Auto       Down   Enable  N/A     Not Present
    Press Enter to continue or to abort
    AP Summary
    Number of APs.................................... 0
    Global AP User Name.............................. Not Configured
    Global AP Dot1x User Name........................ Not Configured
    AP Name             Slots  AP Model             Ethernet MAC       Location
         Port  Country  Priority
    Press Enter to continue or to abort
    Press Enter to continue or to abort
    AP Location
    Site Name........................................ default-group
    Site Description.................................
    WLAN ID          Interface          Network Admission Control
    1               management           Disabled
    AP Name             Slots  AP Model             Ethernet MAC       Location
         Port  Country  Priority  GroupName
    Press Enter to continue or to abort
    AP Config
    Press Enter to continue or to abort
    Press Enter to continue or to abort
    AP Airewave Director Configuration
    Press Enter to continue or to abort
    802.11a Configuration
    802.11a Network.................................. Disabled
    11nSupport....................................... Enabled
          802.11a Low Band........................... Enabled
          802.11a Mid Band........................... Enabled
          802.11a High Band.......................... Enabled
    802.11a Operational Rates
        802.11a 6M Rate.............................. Mandatory
        802.11a 9M Rate.............................. Supported
        802.11a 12M Rate............................. Mandatory
        802.11a 18M Rate............................. Supported
        802.11a 24M Rate............................. Mandatory
        802.11a 36M Rate............................. Supported
        802.11a 48M Rate............................. Supported
        802.11a 54M Rate............................. Supported
    802.11n MCS Settings:
        MCS 0........................................ Supported
        MCS 1........................................ Supported
        MCS 2........................................ Supported
        MCS 3........................................ Supported
        MCS 4........................................ Supported
        MCS 5........................................ Supported
        MCS 6........................................ Supported
    --More or (q)uit current module or to abort
    --More or (q)uit current module or to abort
        MCS 7........................................ Supported
        MCS 8........................................ Supported
        MCS 9........................................ Supported
        MCS 10....................................... Supported
        MCS 11....................................... Supported
        MCS 12....................................... Supported
        MCS 13....................................... Supported
        MCS 14....................................... Supported
        MCS 15....................................... Supported
    802.11n Status:
        A-MPDU Tx:
            Priority 0............................... Enabled
            Priority 1............................... Disabled
            Priority 2............................... Disabled
            Priority 3............................... Disabled
            Priority 4............................... Disabled
            Priority 5............................... Disabled
            Priority 6............................... Disabled
            Priority 7............................... Disabled
    Beacon Interval.................................. 100
    CF Pollable mandatory............................ Disabled
    CF Poll Request mandatory........................ Disabled
    CFP Period....................................... 4
    --More or (q)uit current module or to abort
    --More or (q)uit current module or to abort
    CFP Maximum Duration............................. 60
    Default Channel.................................. 36
    Default Tx Power Level........................... 0
    DTPC  Status..................................... Enabled
    Fragmentation Threshold.......................... 2346
    TI Threshold..................................... -50
    Legacy Tx Beamforming setting.................... Disabled
    Traffic Stream Metrics Status.................... Disabled
    Expedited BW Request Status...................... Disabled
    World Mode....................................... Enabled
    EDCA profile type................................ default-wmm
    Voice MAC optimization status.................... Disabled
    Call Admision Control (CAC) configuration
    Voice AC:
       Voice AC - Admission control (ACM)............ Disabled
       Voice max RF bandwidth........................ 75
       Voice reserved roaming bandwidth.............. 6
       Voice load-based CAC mode..................... Disabled
       Voice tspec inactivity timeout................ Disabled
       Voice Stream-Size............................. 84000
       Voice Max-Streams............................. 2
    Video AC:
       Video AC - Admission control (ACM)............ Disabled
    --More or (q)uit current module or to abort
    --More or (q)uit current module or to abort
       Video max RF bandwidth........................ Infinite
       Video reserved roaming bandwidth.............. 0
    Press Enter to continue or to abort
    802.11a Advanced Configuration
    Press Enter to continue or to abort
    802.11a Airewave Director Configuration
    RF Event and Performance Logging
      Channel Update Logging......................... Off
      Coverage Profile Logging....................... Off
      Foreign Profile Logging........................ Off
      Load Profile Logging........................... Off
      Noise Profile Logging.......................... Off
      Performance Profile Logging.................... Off
      TxPower Update Logging......................... Off
    Default 802.11a AP performance profiles
      802.11a Global Interference threshold.......... 10 %
      802.11a Global noise threshold................. -70 dBm
      802.11a Global RF utilization threshold........ 80 %
      802.11a Global throughput threshold............ 1000000 bps
      802.11a Global clients threshold............... 12 clients
    Default 802.11a AP monitoring
      802.11a Monitor Mode........................... enable
      802.11a Monitor Mode for Mesh AP Backhaul...... disable
      802.11a Monitor Channels....................... Country channels
      802.11a AP Coverage Interval................... 180 seconds
      802.11a AP Load Interval....................... 60 seconds
      802.11a AP Noise Interval...................... 180 seconds
    --More or (q)uit current module or to abort
    --More or (q)uit current module or to abort
      802.11a AP Signal Strength Interval............ 60 seconds
    Automatic Transmit Power Assignment
      Transmit Power Assignment Mode................. AUTO
      Transmit Power Update Interval................. 600 seconds
      Transmit Power Threshold....................... -70 dBm
      Transmit Power Neighbor Count.................. 3 APs
      Min Transmit Power............................. -10 dBm
      Max Transmit Power............................. 30 dBm
      Transmit Power Update Contribution............. SNI.
      Transmit Power Assignment Leader............... c4:64:13:8f:93:40
      Last Run....................................... 75 seconds ago
    Coverage Hole Detection
      802.11a Coverage Hole Detection Mode........... Enabled
      802.11a Coverage Voice Packet Count............ 100 packets
      802.11a Coverage Voice Packet Percentage....... 50%
      802.11a Coverage Voice RSSI Threshold.......... -80 dBm
      802.11a Coverage Data Packet Count............. 50 packets
      802.11a Coverage Data Packet Percentage........ 50%
      802.11a Coverage Data RSSI Threshold........... -80 dBm
      802.11a Global coverage exception level........ 25 %
      802.11a Global client minimum exception lev.... 3 clients
    Automatic Channel Assignment
      Channel Assignment Mode........................ AUTO
    --More or (q)uit current module or to abort
      Channel Update Interval........................ 600 seconds [startup]
      Anchor time (Hour of the day).................. 0
      Channel Update Contribution.................... SNI.
      Channel Assignment Leader...................... c4:64:13:8f:93:40
      Last Run....................................... 75 seconds ago
      DCA Sensitivity Level.......................... STARTUP (5 dB)
      DCA 802.11n Channel Width...................... 20 MHz
      DCA Minimum Energy Limit....................... -95 dBm
      Channel Energy Levels
        Minimum...................................... unknown
        Average...................................... unknown
        Maximum...................................... unknown
      Channel Dwell Times
        Minimum...................................... unknown
        Average...................................... unknown
        Maximum...................................... unknown
      802.11a 5 GHz Auto-RF Channel List
        Allowed Channel List......................... 36,40,44,48,52,56,60,64
        Unused Channel List.......................... 100,104,108,112,116,120,124,
                                                      128,132,136,140
      DCA Outdoor AP option.......................... Disabled
    Radio RF Grouping
      802.11a Group Mode............................. AUTO
    --More or (q)uit current module or to abort
      802.11a Group Update Interval.................. 600 seconds
      802.11a Group Leader........................... c4:64:13:8f:93:40
        802.11a Group Member......................... c4:64:13:8f:93:40
      802.11a Last Run............................... 75 seconds ago
    802.11b Configuration
    802.11b Network.................................. Enabled
    11gSupport....................................... Enabled
    11nSupport....................................... Enabled
    802.11b/g Operational Rates
        802.11b/g 1M Rate............................ Mandatory
        802.11b/g 2M Rate............................ Mandatory
        802.11b/g 5.5M Rate.......................... Mandatory
        802.11b/g 11M Rate........................... Mandatory
        802.11g 6M Rate.............................. Supported
        802.11g 9M Rate.............................. Supported
        802.11g 12M Rate............................. Supported
        802.11g 18M Rate............................. Supported
        802.11g 24M Rate............................. Supported
        802.11g 36M Rate............................. Supported
        802.11g 48M Rate............................. Supported
        802.11g 54M Rate............................. Supported
    802.11n MCS Settings:
        MCS 0........................................ Supported
        MCS 1........................................ Supported
        MCS 2........................................ Supported
        MCS 3........................................ Supported
        MCS 4........................................ Supported
    --More or (q)uit current module or to abort
        MCS 5........................................ Supported
        MCS 6........................................ Supported
        MCS 7........................................ Supported
        MCS 8........................................ Supported
        MCS 9........................................ Supported
        MCS 10....................................... Supported
        MCS 11....................................... Supported
        MCS 12....................................... Supported
        MCS 13....................................... Supported
        MCS 14....................................... Supported
        MCS 15....................................... Supported
    802.11n Status:
        A-MPDU Tx:
            Priority 0............................... Enabled
            Priority 1............................... Disabled
            Priority 2............................... Disabled
            Priority 3............................... Disabled
            Priority 4............................... Disabled
            Priority 5............................... Disabled
            Priority 6............................... Disabled
            Priority 7............................... Disabled
    Beacon Interval.................................. 100
    CF Pollable mode................................. Disabled
    --More or (q)uit current module or to abort
    CF Poll Request mandatory........................ Disabled
    CFP Period....................................... 4
    CFP Maximum Duration............................. 60
    Default Channel.................................. 1
    Default Tx Power Level........................... 0
    DTPC  Status..................................... Enabled
    Call Admission Limit  ........................... 105
    G711 CU Quantum ................................. 15
    ED Threshold..................................... -50
    Fragmentation Threshold.......................... 2346
    PBCC mandatory................................... Disabled
    RTS Threshold.................................... 2347
    Short Preamble mandatory......................... Enabled
    Short Retry Limit................................ 7
    Legacy Tx Beamforming setting.................... Enabled
    Traffic Stream Metrics Status.................... Disabled
    Expedited BW Request Status...................... Disabled
    World Mode....................................... Enabled
    Faster Carrier Tracking Loop..................... Disabled
    EDCA profile type................................ default-wmm
    Voice MAC optimization status.................... Disabled
    Call Admision Control (CAC) configuration
       Voice AC - Admission control (ACM)............ Disabled
    --More or (q)uit current module or to abort
       Voice Stream-Size............................. 84000
       Voice Max-Streams............................. 2
       Voice max RF bandwidth........................ 75
       Voice reserved roaming bandwidth.............. 6
       Voice load-based CAC mode..................... Disabled
       Voice tspec inactivity timeout................ Disabled
       Video AC - Admission control (ACM)............ Disabled
       Video max RF bandwidth........................ 50
       Video reserved roaming bandwidth.............. 0
    802.11b Advanced Configuration
    Press Enter to continue or to abort
    802.11b Airewave Director Configuration
    RF Event and Performance Logging
      Channel Update Logging......................... Off
      Coverage Profile Logging....................... Off
      Foreign Profile Logging........................ Off
      Load Profile Logging........................... Off
      Noise Profile Logging.......................... Off
      Performance Profile Logging.................... Off
      Transmit Power Update Logging.................. Off
    Default 802.11b AP performance profiles
      802.11b Global Interference threshold.......... 10 %
      802.11b Global noise threshold................. -70 dBm
      802.11b Global RF utilization threshold........ 80 %
      802.11b Global throughput threshold............ 1000000 bps
      802.11b Global clients threshold............... 12 clients
    Default 802.11b AP monitoring
      802.11b Monitor Mode........................... enable
      802.11b Monitor Channels....................... Country channels
      802.11b AP Coverage Interval................... 180 seconds
      802.11b AP Load Interval....................... 60 seconds
      802.11b AP Noise Interval...................... 180 seconds
      802.11b AP Signal Strength Interval............ 60 seconds
    Automatic Transmit Power Assignment
      Transmit Power Assignment Mode................. AUTO
      Transmit Power Update Interval................. 600 seconds
      Transmit Power Threshold....................... -70 dBm
      Transmit Power Neighbor Count.................. 3 APs
      Min Transmit Power............................. -10 dBm
      Max Transmit Power............................. 30 dBm
      Transmit Power Update Contribution............. SNI.
      Transmit Power Assignment Leader............... c4:64:13:8f:93:40
      Last Run....................................... 213 seconds ago
    Coverage Hole Detection
      802.11b Coverage Hole Detection Mode........... Enabled
      802.11b Coverage Voice Packet Count............ 100 packets
      802.11b Coverage Voice Packet Percentage....... 50%
      802.11b Coverage Voice RSSI Threshold.......... -80 dBm
      802.11b Coverage Data Packet Count............. 50 packets
      802.11b Coverage Data Packet Percentage........ 50%
      802.11b Coverage Data RSSI Threshold........... -80 dBm
      802.11b Global coverage exception level........ 25 %
      802.11b Global client minimum exception lev.... 3 clients
    Automatic Channel Assignment
      Channel Assignment Mode........................ AUTO
      Channel Update Interval........................ 600 seconds [startup]
      Anchor time (Hour of the day).................. 0
      Channel Update Contribution.................... SNI.
      Channel Assignment Leader...................... c4:64:13:8f:93:40
      Last Run....................................... 213 seconds ago
      DCA Sensitivity Level: ...................... STARTUP (5 dB)
      DCA Minimum Energy Limit....................... -95 dBm
      Channel Energy Levels
        Minimum...................................... unknown
        Average...................................... unknown
        Maximum...................................... unknown
      Channel Dwell Times
        Minimum...................................... unknown
        Average...................................... unknown
        Maximum...................................... unknown
      802.11b Auto-RF Allowed Channel List........... 1,6,11
      Auto-RF Unused Channel List.................... 2,3,4,5,7,8,9,10,12,13
    Radio RF Grouping
      802.11b Group Mode............................. AUTO
      802.11b Group Update Interval.................. 600 seconds
      802.11b Group Leader........................... c4:64:13:8f:93:40
        802.11b Group Member......................... c4:64:13:8f:93:40
      802.11b Last Run............................... 213 seconds ago
    Mobility Configuration
    Symmetric Mobility Tunneling (current) .......... Enabled
    Symmetric Mobility Tunneling (after reboot) ..... Enabled
    Mobility Protocol Port........................... 16666
    Default Mobility Domain.......................... hosp
    Multicast Mode .................................. Disabled
    Mobility Domain ID for 802.11r................... 0x97e2
    Mobility Keepalive Interval...................... 10
    Mobility Keepalive Count......................... 3
    Mobility Group Members Configured................ 1
    Mobility Control Message DSCP Value.............. 0
    Controllers configured in the Mobility Group
    MAC Address        IP Address       Group Name                        Multicast
    IP     Status
    c4:64:13:8f:93:40  209.165.200.230  hosp                              0.0.0.0
            Up
    Advanced Configuration
    Probe request filtering..........................  Enabled
    Probes fwd to controller per client per radio....  0
    Probe request rate-limiting interval.............  500 msec
    EAP-Identity-Request Timeout (seconds)........... 30
    EAP-Identity-Request Max Retries................. 2
    EAP Key-Index for Dynamic WEP.................... 0
    EAP Max-Login Ignore Identity Response........... enable
    EAP-Request Timeout (seconds).................... 30
    EAP-Request Max Retries.......................... 2
    EAPOL-Key Timeout (milliseconds)................. 1000
    EAPOL-Key Max Retries............................ 2
    dot11-padding.................................... Disabled
    Authentication Response Timeout (seconds)........ 10
    Rogue Entry Timeout (seconds).................... 1200
    AP Heart Beat Timeout (seconds).................. 30
    AP Discovery Timeout (seconds)................... 10
    AP Local mode Fast Heartbeat (seconds)........... disable
    AP Hreap mode Fast Heartbeat (seconds)........... disable
    AP Primary Discovery Timeout (seconds)........... 120
    AP Primed Join Timeout (seconds)................. 0
    Packet Forwarding watchdog timer (seconds)....... 240 (enable)
    Location Configuration
    RFID Tag data Collection......................... Enabled
    RFID  timeout.................................... 1200 seconds
    RFID mobility.................................... Oui:00:14:7e : Vendor:pango  S
    tate:Disabled
    Interface Configuration
    Interface Name................................... management
    MAC Address...................................... c4:64:13:8f:93:40
    IP Address....................................... 209.165.200.230
    IP Netmask....................................... 255.255.255.0
    IP Gateway....................................... 209.165.200.1
    External NAT IP State............................ Disabled
    External NAT IP Address.......................... 192.168.1.1
    VLAN............................................. untagged
    Quarantine-vlan.................................. 0
    Active Physical Port............................. 1
    Primary Physical Port............................ 1
    Backup Physical Port............................. Unconfigured
    Primary DHCP Server.............................. 209.165.200.230
    Secondary DHCP Server............................ Unconfigured
    DHCP Option 82................................... Disabled
    ACL.............................................. Unconfigured
    AP Manager....................................... Yes
    Guest Interface.................................. No
    Interface Name................................... service-port
    MAC Address...................................... c4:64:13:8f:93:41
    IP Address....................................... 192.168.1.157
    IP Netmask....................................... 255.255.255.0
    DHCP Option 82................................... Disabled
    DHCP Protocol.................................... Disabled
    AP Manager....................................... No
    Guest Interface.................................. No
    Interface Name................................... virtual
    MAC Address...................................... c4:64:13:8f:93:40
    IP Address....................................... 1.1.1.1
    DHCP Option 82................................... Disabled
    Virtual DNS Host Name............................ Disabled
    AP Manager....................................... No
    Guest Interface.................................. No
    WLAN Configuration
    WLAN Identifier.................................. 1
    Profile Name..................................... HOSP3C
    Network Name (SSID).............................. HOSP3C
    Status........................................... Enabled
    MAC Filtering.................................... Disabled
    Broadcast SSID................................... Enabled
    AAA Policy Override.............................. Disabled
    Network Admission Control
      NAC-State...................................... Disabled
      Quarantine VLAN................................ 0
    Number of Active Clients......................... 0
    Exclusionlist Timeout............................ 60 seconds
    Session Timeout.................................. 1800 seconds
    CHD per WLAN..................................... Enabled
    Webauth DHCP exclusion........................... Disabled
    Interface........................................ management
    WLAN ACL......................................... unconfigured
    DHCP Server...................................... 209.165.200.230
    DHCP Address Assignment Required................. Enabled
    Quality of Service............................... Platinum (voice)
    Scan Defer Priority.............................. 5,6
    Scan Defer Time.................................. 100 milliseconds
    WMM.............................................. Disabled
    Media Stream Multicast-direct.................... Disabled
    CCX - AironetIe Support.......................... Enabled
    CCX - Gratuitous ProbeResponse (GPR)............. Disabled
    CCX - Diagnostics Channel Capability............. Disabled
    Dot11-Phone Mode (7920).......................... Disabled
    Wired Protocol................................... None
    IPv6 Support..................................... Disabled
    Peer-to-Peer Blocking Action..................... Disabled
    Radio Policy..................................... 802.11b and 802.11g only
    DTIM period for 802.11a radio.................... 1
    DTIM period for 802.11b radio.................... 1
    Radius Servers
       Authentication................................ Disabled
       Accounting.................................... Disabled
       Dynamic Interface............................. Disabled
    Local EAP Authentication......................... Disabled
    Security
       802.11 Authentication:........................ Open System
       Static WEP Keys............................... Disabled
       802.1X........................................ Disabled
       Wi-Fi Protected Access (WPA/WPA2)............. Enabled
          WPA (SSN IE)............................... Disabled
          WPA2 (RSN IE).............................. Enabled
             TKIP Cipher............................. Enabled
             AES Cipher.............................. Enabled
          Auth Key Management
             802.1x.................................. Disabled
             PSK..................................... Enabled
             CCKM.................................... Disabled
             FT(802.11r)............................. Disabled
             FT-PSK(802.11r)......................... Disabled
    FT Reassociation Timeout......................... 20
    FT Over-The-Air mode............................. Enabled
    FT Over-The-Ds mode.............................. Enabled
       CKIP ......................................... Disabled
       Web Based Authentication...................... Disabled
       Web-Passthrough............................... Disabled
       Conditional Web Redirect...................... Disabled
       Splash-Page Web Redirect...................... Disabled
       Auto Anchor................................... Disabled
       H-REAP Local Switching........................ Disabled
       H-REAP Learn IP Address....................... Enabled
       Infrastructure MFP protection................. Enabled
       Client MFP.................................... Optional
       Tkip MIC Countermeasure Hold-down Timer....... 60
    Call Snooping.................................... Disabled
    Band Select...................................... Enabled
    Load Balancing................................... Enabled
    Mobility Anchor List
    WLAN ID     IP Address            Status
    Press Enter to continue or to abort
    Press Enter to continue or to abort
    ACL Configuration
    Press Enter to continue or to abort
    CPU ACL Configuration
    CPU Acl Name................................ NOT CONFIGURED
    Wireless Traffic............................ Disabled
    Wired Traffic............................... Disabled
    RADIUS Configuration
    Vendor Id Backward Compatibility................. Disabled
    Call Station Id Case............................. lower
    Call Station Id Type............................. IP Address
    Aggressive Failover.............................. Enabled
    Keywrap.......................................... Disabled
    Fallback Test:
        Test Mode.................................... Off
        Probe User Name.............................. cisco-probe
        Interval (in seconds)........................ 300
    MAC Delimiter for Authentication Messages........ hyphen
    MAC Delimiter for Accounting Messages............ hyphen
    Authentication Servers
    Idx  Type  Server Address    Port    State     Tout  RFC3576  IPSec - AuthMode/P
    hase1/Group/Lifetime/Auth/Encr
    Accounting Servers
    Idx  Type  Server Address    Port    State     Tout  RFC3576  IPSec - AuthMode/P
    hase1/Group/Lifetime/Auth/Encr
    --More or (q)uit current module or to abort
    TACACS Configuration
    Authentication Servers
    Idx  Server Address    Port    State     Tout
    Authorization Servers
    Idx  Server Address    Port    State     Tout
    Accounting Servers
    Idx  Server Address    Port    State     Tout
    LDAP Configuration
    Press Enter to continue or to abort
    Local EAP Configuration
    User credentials database search order:
        Primary ..................................... Local DB
    Timer:
        Active timeout .............................. 300
    Configured EAP profiles:
    EAP Method configuration:
        EAP-FAST:
          Server key ................................
          TTL for the PAC ........................... 10
          Anonymous provision allowed ............... Yes
          Authority ID .............................. 436973636f00000000000000000000
    00
          Authority Information ..................... Cisco A-ID
    Press Enter to continue or to abort
    HREAP Group Summary
    HREAP Group Summary: Count: 0
    Group Name                # Aps
    Press Enter to continue or to abort
    HREAP Group Detail
    Press Enter to continue or to abort
    Route  Info
    Number of Routes................................. 0
    Destination Network          Netmask               Gateway
    Press Enter to continue or to abort
    Qos Queue Length Info
    Platinum queue length............................ 100
    Gold queue length................................  75
    Silver queue length..............................  50
    Bronze queue length..............................  25
    Press Enter to continue or to abort
    Mac Filter Info
    Press Enter to continue or to abort
    Authorization List
    Authorize MIC APs against AAA ................... disabled
    Authorize LSC APs against Auth-List ............. disabled
    Allow APs with MIC - Manufactured Installed C.... disabled
    Allow APs with SSC - Self-Signed Certificate..... disabled
    Allow APs with LSC - Locally Significant Cert.... disabled
    Load Balancing Info
    Aggressive Load Balancing........................ Disabled
    Aggressive Load Balancing Window................. 5 clients
    Aggressive Load Balancing Denial Count........... 3
    Statistics
    Total Denied Count............................... 0 clients
    Total Denial Sent................................ 0 messages
    Exceeded Denial Max Limit Count.................. 0 times
    None 5G Candidate Count.......................... 0 times
    None 2.4G Candidate Count........................ 0 times
    Press Enter to continue or to abort
    Dhcp Scope Info
    Scope: PUNTOSAP
    Enabled.......................................... Yes
    Lease Time....................................... 86400 (1 day )
    Pool Start....................................... 209.165.200.201
    Pool End......................................... 209.165.200.229
    Network.......................................... 209.165.200.0
    Netmask.......................................... 255.255.255.0
    Default Routers.................................. 0.0.0.0  0.0.0.0  0.0.0.0
    DNS Domain.......................................
    DNS.............................................. 0.0.0.0  0.0.0.0  0.0.0.0
    Netbios Name Servers............................. 0.0.0.0  0.0.0.0  0.0.0.0
    Press Enter to continue or to abort
    Exclusion List ConfigurationUnable to retrieve exclusion-list entry
    Press Enter to continue or to abort
    CDP Configuration
    Press Enter to continue or to abort
    Country Channels Configuration
    Configured Country............................. ES  - Spain
          KEY: * = Channel is legal in this country and may be configured manually.
               A = Channel is the Auto-RF default in this country.
               . = Channel is not legal in this country.
               C = Channel has been configured for use by Auto-RF.
               x = Channel is available to be configured for use by Auto-RF.
             (-,-) = (indoor, outdoor) regulatory doamin allowed by this country.
    -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-
        802.11bg     :
        Channels     :                   1 1 1 1 1
                     : 1 2 3 4 5 6 7 8 9 0 1 2 3 4
    -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-
    ES (-E   ,-E   ): A * * * * A * * * * A * * .
    -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
        802.11a      :                         1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
        Channels     : 3 3 3 4 4 4 4 4 5 5 6 6 0 0 0 1 1 2 2 2 3 3 4 4 5 5 6 6
                     : 4 6 8 0 2 4 6 8 2 6 0 4 0 4 8 2 6 0 4 8 2 6 0 9 3 7 1 5
    -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
    ES (-E   ,-E   ): . A . A . A . A A A A A * * * * * * * * * * * . . . . .
    Press Enter to continue or to abort
    WPS Configuration Summary
    Auto-Immune
      Auto-Immune.................................... Disabled
    Client Exclusion Policy
      Excessive 802.11-association failures.......... Enabled
      Excessive 802.11-authentication failures....... Enabled
      Excessive 802.1x-authentication................ Enabled
      IP-theft....................................... Enabled
      Excessive Web authentication failure........... Enabled
    Signature Policy
      Signature Processing........................... Enabled
    Press Enter to continue or to abort
    Custom Web Configuration
    Radius Authentication Method..................... PAP
    Cisco Logo....................................... Enabled
    CustomLogo....................................... None
    Custom Title..................................... None
    Custom Message................................... None
    Custom Redirect URL.............................. None
    Web Authentication Type.......................... Internal Default
    External Web Authentication URL.................. None
    Configuration Per Profile:
    Rogue AP Configuration
    Rogue Location Discovery Protocol................ Disabled
    Rogue on wire Auto-Contain....................... Disabled
    Rogue using our SSID Auto-Contain................ Disabled
    Valid client on rogue AP Auto-Contain............ Disabled
    Rogue AP timeout................................. 1200
    MAC Address        Classification     # APs # Clients Last Heard
    Adhoc Rogue Configuration
    Detect and report Ad-Hoc Networks................ Enabled
    Auto-Contain Ad-Hoc Networks..................... Disabled
    Client MAC Address  Adhoc BSSID         State              # APs   Last Heard
    Rogue Client Configuration
    Validate rogue clients against AAA............... Disabled
    Rogue Client Configuration
    Validate rogue clients against AAA............... Disabled
    --More-- or (q)uit
    MAC Address        State              # APs Last Heard
    Ignore List Configuration
    MAC Address
    Rogue Rule Configuration
    Priority Rule Name               State    Type          Match Hit Count
    (Cisco Controller) >show sysinfo
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 6.0.199.4
    Bootloader Version............................... 1.0.1
    Field Recovery Image Version..................... 6.0.182.0
    Firmware Version................................. FPGA 1.3, Env 1.6, USB console
    1.27
    Build Type....................................... DATA + WPS
    System Name...................................... CISCO-CAPWAP-CONTROLLER
    System Location..................................
    System Contact...................................
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1069
    IP Address....................................... 209.165.200.230
    Last Reset....................................... Power on reset
    System Up Time................................... 0 days 0 hrs 41 mins 2 secs
    System Timezone Location......................... (GMT +1:00) Amsterdam, Berlin,
    Rome, Vienna
    Current Boot License Level....................... base
    Current Boot License Type........................ Permanent
    Next Boot License Level.......................... base
    Next Boot License Type........................... Permanent
    Configured Country............................... ES  - Spain
    Operating Environment............................ Commercial (0 to 40 C)
    Internal Temp Alarm Limits....................... 0 to 65 C
    Internal Temperature............................. +39 C
    External Temperature............................. +23 C
    Fan Status....................................... OK
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Disabled
    Number of WLANs.................................. 1
    3rd Party Access Point Support................... Disabled
    Number of Active Clients......................... 0
    Burned-in MAC Address............................ C4:64:13:8F:93:40
    Power Supply 1................................... Present, OK
    Power Supply 2................................... Absent
    Maximum number of APs supported.................. 25
    (Cisco Controller) >
    The AP log
    AP442b.03dc.0925>
    *Apr 19 23:10:18.428: %CAPWAP-3-ERRORLOG: Selected MWAR 'CISCO-CAPWAP-CONTROLLER
    '(index 0).
    *Apr 19 23:10:18.428: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    logging facility kern
            ^
    % Invalid input detected at '^' marker.
    logging facility kern
            ^
    % Invalid input detected at '^' marker.
    *Apr 19 23:10:19.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 209.165.200.230 peer_port: 5246
    *Apr 19 23:10:19.001: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Apr 19 23:10:20.200: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully
    peer_ip: 209.165.200.230 peer_port: 5246
    *Apr 19 23:10:20.201: %CAPWAP-5-SENDJOIN: sending Join Request to 209.165.200.23
    0
    *Apr 19 23:10:20.201: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Apr 19 23:10:20.211: %CAPWAP-3-ERRORLOG: This AP is not supported in controller
    version 6.0.199.4  ---->What's mean that? Is it compatible the ap with the WLC? ¿Es compatible el AP con el WLC?
    *Apr 19 23:10:20.354: %CAPWAP-5-CHANGED: CAPWAP changed state to CFG
    *Apr 19 23:10:20.355: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 209
    .165.200.230:5246
    *Apr 19 23:10:20.356: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 19 23:10:20.356: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 19 23:10:20.412: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is
    not established

  • "Unable to open config file" Error when starting tomcat

    hi all,
    Here is the output from two of the log files when I start tomcat4 on my linux box. I have configured the mod_jk on the tomcat side.
    From the output of the second log file, it seems that the ajp13 worker I defined was started successfully. What I don't understand is the following:
    1) In catalina.out, where des the line 'Unable to open config file' come from? Which config file?
    2) Tomcat4 is supposed to generate a mod_jk.conf automatically, but I don't see any file generated in 'conf/auto/'.
    Content of 'catalina.out'
    Unable to open config file
    Starting service Tomcat-Standalone
    Apache Tomcat/4.0.4
    Unable to open config file
    Starting service Tomcat-Apache
    Apache Tomcat/4.0.4content of 'catalina_log.2002-08-16.txt'
    2002-08-16 01:05:22 HttpConnector Opening server socket on all host IP addresses
    2002-08-16 01:05:28 Ajp13Connector[8009] Opening server socket on all host IP addresses
    2002-08-16 01:05:28 Ajp13Connector[8009] Starting background thread
    2002-08-16 01:05:29 Ajp13Processor[8009][0] Starting background thread
    2002-08-16 01:05:29 Ajp13Processor[8009][1] Starting background thread
    2002-08-16 01:05:29 Ajp13Processor[8009][2] Starting background thread
    2002-08-16 01:05:29 Ajp13Processor[8009][3] Starting background thread
    2002-08-16 01:05:29 Ajp13Processor[8009][4] Starting background thread

    I have all those files too.
    I think the 'config file' mentioned in the error log is the mod_jk.conf.
    On Jason Hunter's tomcat4 guide, it says don't use the tomcat4 RPM to installed. What is the difference bettween the RPM version and the tar.gz version? The only difference I can think of is that in the RPM version, the conf directory is in the 'etc/tomcat4/conf'. Could it be the reason that tomcat4 cannot read the config file? But it has no problem reading the server.xml though.

Maybe you are looking for