Anywhere Access interface best practice

Hello,
We are setting up Anywhere Access on Windows 2012 AD/DNS with the following configuration;
Ethernet 1:
IP: private
Subnet: 255.255.255.0
Gateway: Firewall/Router with private IP address 
DNS: Ethernet 1 IP address
Ethernet 2:
IP: public (remote.domain.com - Anywhere 
Subnet 255.255.255.248
Gateway: DSL modem with public IP address
DNS: Ethernet 1 IP address
Questions:
1. Considering only one gateway can be defined for multiple interfaces, from the best practices point of view please advise which one should be the gateway out of two underlined gateways:
Firewall/Router with private IP address or
DSL modem with public IP address
2. Considering Ethernet 2 is configured with public IP addresses, please also advise if DNS for Ethernet 2 is correct or it should be public DNS. 
Thanks.

Generally the private interface. This one may help.
Configuring and Customizing Remote Web Access on Windows
Server 2012 R2 Essentials
or try them over here.
https://social.technet.microsoft.com/Forums/windowsserver/en-US/home?forum=winserveressentials&filter=alltypes%2Cnoreplies&sort=lastpostdesc
Regards, Dave Patrick ....
Microsoft Certified Professional
Microsoft MVP [Windows]
Disclaimer: This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

Similar Messages

  • ACE access-list best practice

    Hi,
    I was wondering what was the best practice for the access-list's on the Cisco ACE.
    Should we permit Any in the access-list, and classify the traffic in the class-maps as seen in a brief example:
    access-list ANY line 10 extended permit ip any any
    access-list EXCH-DMZ-INTERNET-OUT line 10 extended permit tcp 10.134.10.0 255.255.254.0 any eq www
    access-list EXCH-DMZ-INTERNET-OUT line 15 extended permit tcp 10.134.10.0 255.255.254.0 any eq https
    class-map match-all EXCH-DMZ-INTERNET-OUT
      2 match access-list EXCH-DMZ-INTERNET-OUT
    policy-map multi-match EXCH-DMZ-OUT
    class EXCH-DMZ-INTERNET-OUT
        nat dynamic 1 vlan 1001
    interface vlan 756
      description VLAN 744 EXCH DMZ BE
      ip address 10.134.11.253 255.255.255.0
      alias 10.134.11.254 255.255.255.0
      peer ip address 10.134.11.252 255.255.255.0
    access-group input ANY
      service-policy input EXCH-DMZ-OUT
    Or should we also also the access-list for the access-group in the interface as seen bellow:
    access-list EXCH-DMZ-INTERNET-OUT line 10 extended permit tcp 10.134.10.0 255.255.254.0 any eq www
    access-list EXCH-DMZ-INTERNET-OUT line 15 extended permit tcp 10.134.10.0 255.255.254.0 any eq https
    class-map match-all EXCH-DMZ-INTERNET-OUT
      2 match access-list EXCH-DMZ-INTERNET-OUT
    policy-map multi-match EXCH-DMZ-OUT
    class EXCH-DMZ-INTERNET-OUT
        nat dynamic 1 vlan 1001
    interface vlan 756
      description VLAN 744 EXCH DMZ BE
      ip address 10.134.11.253 255.255.255.0
      alias 10.134.11.254 255.255.255.0
      peer ip address 10.134.11.252 255.255.255.0
      access-group input EXCH-DMZ-INTERNET-OUT
      service-policy input EXCH-DMZ-OUT
    Regards,

    Hello,
    I don't think you'll find a "best practice" for this scenario.  It really just comes down to meeting your needs.  The first example you have a far and away the more commonly seen configuration, as you'll only NAT the traffic matching the EXCH-DMZ-INTERNET-OUT, but all other traffic will be forwarded by the ACE whether it is load balanced or not.  The second way will only allow NAT'd traffic, and deny all others.
    Hope this helps,
    Sean

  • Access Connections best practice

    I like the idea of having Lenovo Access Connection change the appropriate settings depending on you network location. Like turning off wifi when you are cabled.
    Althoguh I often find it to be creating more problems than gains.
    Any generel best practice using this tool?
    Regards, Lars.

    Hi!
    Use non overlapping channel 1-6-11 on 3
    consecutive AP's.
    eg.
    AP1-Channel 1
    AP2-Channel 6
    AP3-Channel 11
    AP4-Channel 1
    AP5-Channel 6
    plzz take a look:
    http://www.cisco.com/en/US/products/hw/wirele
    ss/ps441/products_tech_note09186a00800a86d7.shtml#nonover
    HTH
    -Jai

  • Ftp access docroot best practice

    I have installed WS 7.0, created a dir /docroot with owner:group websrvd:webservd. What is a "good" way to send files to /docroot via
    ftp? I only ftp over my local lan; access is not allowed outside of the local
    lan. Should I set up a new user in group webservd with ftp access?
    OR how do I set up a user for example dummy:staff to be able to
    write files to /docroot? Thank you, I am trying to figure out what are
    the best practices.
    Thanks in advance for any assistance.
    Mark.

    Irek,
    This is off subject but I wanted to talk to you about a previous issue that you where having in [This Thread|http://forum.java.sun.com/thread.jspa?messageID=9751068#9751068] .
    ireneusz.tarnowski wrote in another thread:
    Hi,
    I've noticed many failures in my error log. I use SJSWS 6.1u7. Some example are below:
    [04/Jul/2007:11:29:11] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
    [04/Jul/2007:11:32:40] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
    [04/Jul/2007:11:32:40] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
    [04/Jul/2007:11:32:41] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
    [04/Jul/2007:11:34:53] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
    [04/Jul/2007:11:34:53] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
    [04/Jul/2007:11:35:45] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
    [04/Jul/2007:11:37:21] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)The IP address which is noticed in error line is a router of some NAT in my corporation. I want to tune my webserver and receive all request from this address.
    Any idea?
    IrekDid you ever figure out how to fix this issue with the Sun Webserver 6.1 that you had back in July last year with the "Error receiving request from <ip address> (Connection refused)" messages? We are getting the same errors on our Sun ONE / Sun Java System webserver version 6.1 SP6. Please let me know.

  • Access Point Best Practice

    I have 5 access points, what is the best practice about the configuration of the channel of the access points, all access in the same channel, all access in different channel ? (802.11b/g).
    Thanks

    Hi!
    Use non overlapping channel 1-6-11 on 3
    consecutive AP's.
    eg.
    AP1-Channel 1
    AP2-Channel 6
    AP3-Channel 11
    AP4-Channel 1
    AP5-Channel 6
    plzz take a look:
    http://www.cisco.com/en/US/products/hw/wirele
    ss/ps441/products_tech_note09186a00800a86d7.shtml#nonover
    HTH
    -Jai

  • BPM Workspace Customization & User Interface: Best Practice Question

    Hi All,
    This is our first BPM Project in house and we are on Oracle BPM 11g.
    The business process involves request for approval for a permit from a public user and internal users need to approve/reject the same. Pretty simple and straightforward so far.
    But we are now having lots of questions wrt to user interface.
    1. Work Space Changes.
    If we develop this application completely in Oracle BPM, the outside user (general public) will also see the 'workspace' with its current interface. It would be impossible to handle user training on this interface for a simple Joe Bloe, who may not be computer savvy) So the requirement documents demand that the look and feel of the outside users should be totally different than what the workspace provides. They want this to be customized in such a way that iit would strip all of the default lay out (left navigation bar, and get rid of the upper section completely. with its list of tabs) and also to modify the task list that appears below).
    We have figured out how to achieve this (by modifying the workspace .jar files and recompiling the same), but is this a good approach? What happens if we are developing a brand new application on the BPM in our shop? This change will affect that application as well, as the workspace is shared and common to all the apps? I want some of you experts to let us know, your thoughts on this. If this is not a recommended practice, what would be best way to achieve what we want using Oracle BPM? (Where we want a simple intuitive user interface, without the default add ons that comes with the work space)...
    2. What would be the best method to create a user registration page (where a user creates his own login and password and maintains his account) for an application using the BPM ? Right now we are thinking this should be in either a ADF page/ JSP page or (worst case a PL SQL cartridge) that can be launched on the browser, which will be open and does not require any kind of authentication to access. Is this a good practice or recommended one? Or are we missing out on something within BPM application itself, that we are not aware of and that would let us do this?
    3. Also, if we go with an external ADF application for the 'public' user interface developement, then how can we (or can we) leverage the BPM's internal storage for the submitted data from the payload? I understand that it stores this information currently on the server 'soa infra' tables some where? Thru an external ADF app, can we write into these tables (Is this recommended or just sounds plain ridiculous)???
    Knowing answers to these questions will help us decide, if this is the right tool for the job at hand.
    Appreciate your time and xpertise.
    Thanks
    SR

    Hi All,
    This is our first BPM Project in house and we are on Oracle BPM 11g.
    The business process involves request for approval for a permit from a public user and internal users need to approve/reject the same. Pretty simple and straightforward so far.
    But we are now having lots of questions wrt to user interface.
    1. Work Space Changes.
    If we develop this application completely in Oracle BPM, the outside user (general public) will also see the 'workspace' with its current interface. It would be impossible to handle user training on this interface for a simple Joe Bloe, who may not be computer savvy) So the requirement documents demand that the look and feel of the outside users should be totally different than what the workspace provides. They want this to be customized in such a way that iit would strip all of the default lay out (left navigation bar, and get rid of the upper section completely. with its list of tabs) and also to modify the task list that appears below).
    We have figured out how to achieve this (by modifying the workspace .jar files and recompiling the same), but is this a good approach? What happens if we are developing a brand new application on the BPM in our shop? This change will affect that application as well, as the workspace is shared and common to all the apps? I want some of you experts to let us know, your thoughts on this. If this is not a recommended practice, what would be best way to achieve what we want using Oracle BPM? (Where we want a simple intuitive user interface, without the default add ons that comes with the work space)...
    2. What would be the best method to create a user registration page (where a user creates his own login and password and maintains his account) for an application using the BPM ? Right now we are thinking this should be in either a ADF page/ JSP page or (worst case a PL SQL cartridge) that can be launched on the browser, which will be open and does not require any kind of authentication to access. Is this a good practice or recommended one? Or are we missing out on something within BPM application itself, that we are not aware of and that would let us do this?
    3. Also, if we go with an external ADF application for the 'public' user interface developement, then how can we (or can we) leverage the BPM's internal storage for the submitted data from the payload? I understand that it stores this information currently on the server 'soa infra' tables some where? Thru an external ADF app, can we write into these tables (Is this recommended or just sounds plain ridiculous)???
    Knowing answers to these questions will help us decide, if this is the right tool for the job at hand.
    Appreciate your time and xpertise.
    Thanks
    SR

  • WAN router LAN interface Best practice for speed

    Hello
    I have an ASR router with a WAN link of 100M.
    The LAN connection for this router is Gig capable.
    Should I configure the LAN interface on the router for Gig or would this cause problems with potentially 10 times the data
    exiting the LAN out to the WAN with only a 100M pipe?

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    If you set your LAN interface to run at 100Mbps, likely you would just be moving your possible bottleneck one hop deeper into your LAN (often on devices with weak QoS support).
    Leave your LAN interface at gig.  If congestion, on WAN egress, becomes an issue, you can then try QoS to mitigate it.  For example, for starters, you might want to place your WAN egress traffic into fair-queue.

  • Seaching for Best Practice links that work

    Hi,
    past few years I have been able to access SAP Best Practices documents like SAP Best Practices SAP Best Practices for CP and Wholesale Industries
    (this one still works and guides me to the building block and process overview documents!).
    Recently any link I can find to SAP Industry or Baseline Best Practices ends up with a dead link. See for example trying to get from here SAP Best Practices Baseline packages – SAP Help Portal Page
    to Localized for Netherlands V1.607 SAP Best Practices package further below on that page, results in screen shot attached. I have seen that in many more examples (different countries, or in Industry Best Practice Packages instead of Country Baseline packages....)
    Does any know whether and how SAP redesigned their access to Best Practices documents (Configuration Guides, eCatts, Scenario Process Overviews etc.?
    Thanks for your reply.
    Thijs

    Hi, Thijs,
    There is currently a problem with Best Practices on the Help Portal.  On the home page of the portal (http://help.sap.com/) there is a message that reads "Stay Tuned - There are temporary problems when accessing some content types, for example PDF documents or Best Practices. We are working on a solution."
    Our Wholesale Distribution industry group does not manage the Help Portal pages, so, unfortunately, I don't know the status of the problem or when it might be resolved.
    Lynn

  • _h and _v Content, Best Practice

    Hello
    while i am working on the same content of an article as _h and _v, i noticed in _h i added 7 pages while in the _v there are 6 pages,
    and i relised this is not good to get the perfect result.
    so i add one more page in the _v, and started to change the size of the images so the contents goes to page 7.
    i was able to do that, and then i noticed that the 14th subtitle in the _h is in the 5th page and the same subtitle in the _v is in the 6the page.
    is this normal? or do i have to math the content so the reader when rotatiting will get the same result so he can folow reading.
    regards

    Hi Greg:
    To access the Best Practices using Business Content  do the following:
    1.-Open this URL: http://help.sap.com/bp_bw370/html/index.htm
    2.-Click on the "Preconfigured Scenarios" link.
    3.-Click on the Links to navigate on the different available scenarios and to see the documents you can download (Scenario Documentation, Scenario Installation Guide and Building Blocks).
    *Financials
    -- Financial Accounting Analysis
    -- Controlling Analysis
    -- CO-PA Analysis
    -- Cost Center Planning
    -- Reporting Financials EhP3
    *Customer Relationship Management
    -- Sales Analysis
    -- Cross-Functional Analysis: Financial and Sales Data
    -- Booking Billing Backlog Analysis
    -- Sales Planning
    -- Scheduling Agreements Analysis
    -- CRM Analytics
    *Supply Chain Management
    -- Purchasing Analysis
    -- Manufacturing Analysis
    -- Inventory Analysis
    -- Demand Planning Analysis
    -- Resource and Operation Data Analysis
    *Product Lifecycle Management
    -- Project System - Controlling and Dates
    *Human Capital Management
    -- Cross-Application Time Sheet
    -- Time Management - Time and Labor
    -- Personnel Development - Qualifications
    -- Travel Management - Travel Expenses
    *General
    -- Data Mining - ABC Classification
    Regards,
    Francisco Milán.

  • Business Content Best Practice

    How do we go about evaluating Business Content for a project? Any tips/tricks/best practice used when dealing with Business Content?
    What are the dos and don't of Business Content?

    Hi Greg:
    To access the Best Practices using Business Content  do the following:
    1.-Open this URL: http://help.sap.com/bp_bw370/html/index.htm
    2.-Click on the "Preconfigured Scenarios" link.
    3.-Click on the Links to navigate on the different available scenarios and to see the documents you can download (Scenario Documentation, Scenario Installation Guide and Building Blocks).
    *Financials
    -- Financial Accounting Analysis
    -- Controlling Analysis
    -- CO-PA Analysis
    -- Cost Center Planning
    -- Reporting Financials EhP3
    *Customer Relationship Management
    -- Sales Analysis
    -- Cross-Functional Analysis: Financial and Sales Data
    -- Booking Billing Backlog Analysis
    -- Sales Planning
    -- Scheduling Agreements Analysis
    -- CRM Analytics
    *Supply Chain Management
    -- Purchasing Analysis
    -- Manufacturing Analysis
    -- Inventory Analysis
    -- Demand Planning Analysis
    -- Resource and Operation Data Analysis
    *Product Lifecycle Management
    -- Project System - Controlling and Dates
    *Human Capital Management
    -- Cross-Application Time Sheet
    -- Time Management - Time and Labor
    -- Personnel Development - Qualifications
    -- Travel Management - Travel Expenses
    *General
    -- Data Mining - ABC Classification
    Regards,
    Francisco Milán.

  • Query: Best practice SAN switch (network) access control rules?

    Dear SAN experts,
    Are there generic SAN (MDS) switch access control rules that should always be applied within the SAN environment?
    I have a specific interest in network-based access control rules/CLI-commands with respect to traffic flowing through the switch rather than switch management traffic (controls for traffic flowing to the switch).
    Presumably one would want to provide SAN switch demarcation between initiators and targets using VSAN, Zoning (and LUN Zoning for fine grained access control and defense in depth with storage device LUN masking), IP ACL, Read-Only Zone (or LUN).
    In a LAN environment controlled by a (gateway) firewall, there are (best practice) generic firewall access control rules that should be instantiated regardless of enterprise network IP range, TCP services, topology etc.
    For example, the blocking of malformed TCP flags or the blocking of inbound and outbound IP ranges outlined in RFC 3330 (and RFC 1918).
    These firewall access control rules can be deployed regardless of the IP range or TCP service traffic used within the enterprise. Of course there are firewall access control rules that should also be implemented as best practice that require specific IP addresses and ports that suit the network in which they are deployed. For example, rate limiting as a DoS preventative, may require knowledge of server IP and port number of the hosted service that is being DoS protected.
    So my question is, are there generic best practice SAN switch (network) access control rules that should also be instantiated?
    regards,
    Will.

    Hi William,
    That's a pretty wide net you're casting there, but i'll do my best to give you some insight in the matter.
    Speaking pure fibre channel, your only real way of controlling which nodes can access which other nodes is Zones.
    for zones there are a few best practices:
    * Default Zone: Don't use it. unless you're running Ficon.
    * Single Initiator zones: One host, many storage targets. Don't put 2 initiators in one zone or they'll try logging into each other which at best will give you a performance hit, at worst will bring down your systems.
    * Don't mix zoning types:  You can zone on wwn, on port, and Cisco NX-OS will give you a plethora of other options, like on device alias or LUN Zoning. Don't use different types of these in one zone.
    * Device alias zoning is definately recommended with Enhanced Zoning and Enhanced DA enabled, since it will make replacing hba's a heck of a lot less painful in your fabric.
    * LUN zoning is being deprecated, so avoid. You can achieve the same effect on any modern array by doing lun masking.
    * Read-Only exists, but again any modern array should be able to make a lun read-only.
    * QoS on Zoning: Isn't really an ACL method, more of a congestion control.
    VSANs are a way to separate your physical fabric into several logical fabrics.  There's one huge distinction here with VLANs, that is that as a rule of thumb, you should put things that you want to talk to each other in the same VSANs. There's no such concept as a broadcast domain the way it exists in Ethernet in FC, so VSANs don't serve as isolation for that. Routing on Fibre Channel (IVR or Inter-VSAN Routing) is possible, but quickly becomes a pain if you use it a lot/structurally. Keep IVR for exceptions, use VSANs for logical units of hosts and storage that belong to each other.  A good example would be to put each of 2 remote datacenters in their own VSAN, create a third VSAN for the ports on the array that provide replication between DC and use IVR to make management hosts have inband access to all arrays.
    When using IVR, maintain a manual and minimal topology. IVR tends to become very complex very fast and auto topology isn't helping this.
    Traditional IP acls (permit this proto to that dest on such a port and deny other combinations) are very rare on management interfaces, since they're usually connected to already separated segments. Same goes for Fibre Channel over IP links (that connect to ethernet interfaces in your storage switch).
    They are quite logical to use  and work just the same on an MDS as on a traditional Ethernetswitch when you want to use IP over FC (not to be confused with FC over IP). But then you'll logically use your switch as an L2/L3 device.
    I'm personally not an IP guy, but here's a quite good guide to setting up IP services in a FC fabric:
    http://www.cisco.com/en/US/partner/docs/switches/datacenter/mds9000/sw/4_1/configuration/guides/cli_4_1/ipsvc.html
    To protect your san from devices that are 'slow-draining' and can cause congestion, I highly recommend enabling slow-drain policy monitors, as described in this document:
    http://www.cisco.com/en/US/partner/docs/switches/datacenter/mds9000/sw/5_0/configuration/guides/int/nxos/intf.html#wp1743661
    That's a very brief summary of the most important access-control-related Best Practices that come to mind.  If any of this isn't clear to you or you require more detail, let me know. HTH!

  • Best practice for interface

    I would assume with all the different interfaces available in SAP for various modules SAP would ahve published a white paper on how to determine the best interface format for a system and what would be the best practice around it. Can someone share a process or methodology on how to determine the best interfaces practice?

    Hueter, I'm not sure I'm following you. Maybe you could post an example. I don't see how to get access to the front panel controls of an FPGA subvi from the host vi--even wihen configured through the connector pane--without creating complimentary controls/indicators on the main FPGA VI block diagram (which seems to defeat the purpose of the exercise). It seemed like an intriguing idea, but it doesn't seem possible to configure a reference to a fpga subvi while the main fpga vi is running (only one reference to an FPGA is allowed, at least on crios).
    Jarrod, I am not talking about accessing various bitfiles (only one can run at a time, right?). I am talking about creating standard FPGA interface code that can be used on multiple projects without having to reconstruct the VIs based on changes to the FPGA Reference. For example, I have interface code that is used to talk to various sensors through the c-series serial module. Those interface VIs depend on a specific FPGA reference to work. When I create a new project for a crio that has other modules besides the 9870, I will inevitably have a new FPGA VI. There is a subset of the new FPGA VI that is identical to the purely serial one (1 loop/state machine), but other code will be added to handle the other modules. Now the FPGA reference is different, and all my interface VIs are broken when I try to use the new FPGA reference. I have to change the FPGA reference in my interface VIs and then go through an reselect all the IO manually. It's not conducive to reuseable code.
    I guess one possibility is to create one Main FPGA VI that has all the IO I could ever need, and then just use whatever subvi's I want in it. I believe this is essentially what's happening in the scan engine. A microcontroller is created on the FPGA with standard IO, and everything is accessed through the abstracted IO.
    Chris

  • Looking for some best practice regarding Content Administrator access

    Hi. I am looking for some best practice or rule of thumb from SAP or from different companies how they address Portal Content Administrator access in Production environment. Basically, our company is implementing portal to work with SAP BW.  We are on SP 9. Basically, I am trying to determine if we should have 1-2 Portal Content Administrator in Production with 24/7 access or we should limit them from NOT having this.  Can you share with me some ideas of what is right? and what is not?
    Should we have access in Production? Or Should we have this access but limited? By the way, our users are allow to Publish BI reports/queries into Production.

    Hello Michael,
    Refer to this guide about managing initial content in portal.
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/00bfbf7c-7aa1-2910-6b9e-94f4b1d320e1
    Regards
    Deb
    [Reward Points for helpful answers]

  • Best practice for external but secure access to internal data?

    We need external customers/vendors/partners to access some of our company data (view/add/edit).  It’s not so easy as to segment out those databases/tables/records from other existing (and put separate database(s) in the DMZ where our server is).  Our
    current solution is to have a 1433 hole from web server into our database server.  The user credentials are not in any sort of web.config but rather compiled in our DLLs, and that SQL login has read/write access to a very limited number of databases.
    Our security group says this is still not secure, but how else are we to do it?  Even if a web service, there still has to be a hole in somewhere.  Any standard best practice for this?
    Thanks.

    Security is mainly about mitigation rather than 100% secure, "We have unknown unknowns". The component needs to talk to SQL Server. You could continue to use http to talk to SQL Server, perhaps even get SOAP Transactions working but personally
    I'd have more worries about using such a 'less trodden' path since that is exactly the areas where more security problems are discovered. I don't know about your specific design issues so there might be even more ways to mitigate the risk but in general you're
    using a DMZ as a decent way to mitigate risk. I would recommend asking your security team what they'd deem acceptable.
    http://pauliom.wordpress.com

  • What is best practice in FR ? Original Report access to Users or Snapshot

    Hi,
    can any one pls. let me know on what is the best practice in FR ? I need to give access to original reports to my users or the snapshot access only ? Users are not happy with snapshot access mainly during the closing time. What are the complications if i give access to original reports ? I'm using Batch scheduler, but users are unable to see the data some times. What will be the reason for this ?
    Thanks,
    PVR

    Hi,
    There are certainly many variables to have a look at. Server sizes is one concern, report size is another. Giving access to original reports is fine as long as concurrency and heavy usage don't take the servers down. That said, the reports that will be given access to their originals shouldn't run for 10 minutes for each query. Having 10 user connected to such reports will probably take reporting services down which makes the entire system useless. These types of reports should better be scheduled and shown as snapshots. However, some of these reports might have time-dependent information which needs to be refreshed at query time. In this case you could either give the access to original reports or schedule the reports to run say every 2 hours.
    Cheers,
    Alp

Maybe you are looking for

  • Using a uk power cable with a us machine

    this may be a stupid question but can I buy a power cord for my US bought macbook in the uk and plug it in without any problem? obviously it would have the little transformer box in the middle which should mean it it recognizes that I'm on UK volts n

  • Activity Monitor question please...

    A while ago I read about using the Activity Monitor to tell if I don't have enough ram or if a program is using lots of resources...i forget though, what am i looking for?...is it the reads in and writes out numbers?...I did a search and couldn't fin

  • Purchase List Based upon Vendor Category

    Dear Sir, For our Excise related requirement , we are required to prepare a Material Purchase Report . The report should display  Material purchased from "Manufacturer"  , "Trader" seprately . Sir, my query is that from material purchase record say E

  • Question re a branch's REQUEST attribute

    Can somebody explain to me the purpose of a branch's REQUEST attribute? When a button is pressed, its name is placed into the REQUEST application-level item. If it is a Submit button, processing will then take place and a branch that meets the condit

  • Can't transfer music to external hard drive.

    Whenever I try to move a file it says it can't be modified. How do I get around this?