Can I configure some ports on FI-6200UP GEM as server ports?

Hi,
I need your help!
I know FI-6100 doesn't support to be configured its some port on GEM as server ports.
Is it possible to configure some ports on FI-6200UP GEM as server ports?
And also, I wonder that some ports(1/9-16) on a port group(Second) can be configured as a server port(1/9-10), uplink ethernet port(1/11-12), FCoE port(1/13-14), and FC port(1/15-16).
Thanks in advance.
Paul

Hello Paul,
Yes, you can configure server ports on Expansion modules on FI 6200 series.
http://www.cisco.com/en/US/docs/unified_computing/ucs/sw/gui/config/guide/2.1/b_UCSM_GUI_Configuration_Guide_2_1_chapter_0110.html#concept_A552AD7757A549FB82D16A07D0EDA1E4
--------- snip ------------
All of the port types listed are configurable on both the fixed and expansion module, including server ports, which are not configurable on the 6100 series fabric interconnect expansion module, but are configurable on the 6200 series fabric interconnect expansion module.
HTH
Padma

Similar Messages

  • How can I configure Mac Mail to use the correct SMTP server?

    I have successfully set up Mac Mail to use a new e-mail account. Inbound and outbound mail is working just fine. However, I am seeing something odd when I create a new message or reply to an existing message. The outbound account that shows is not that which has been configured for the account. I can manually select the correct outbound account.
    What are my troubleshooting steps?

    One of the first things to check in Mail Preferences, Composing:

  • Can't access some clien'ts features after migration Windows Server 2003 - 2008R2

    Hi,
    I have done migration of the domain controller from Windows Server 2003 to 2008R2. The old domain controller is set as a relay. After that, I have problems with the clients.
    Now with the 2008R2, it is impossible to:
    -Explore targeted computer's disks.
    -All RPC features.
    -The deployment by GPO is also impossible (Group Policy object did not apply because it failed with error code '0x80070015 The device is not ready).
    All of these features works well on the relay. I also can't shutdown a computer from a pc logged as Administrator.
    I've got the problem on the 3 sites I've migrate.
    Thanks.

    > The old domain controller is set as a relay.
    Please explain "relay" further. I never heard this label in terms of
    Domain Controllers...
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • HT3382 With a MacbookAir (mid-2012) using a mini DisplayPort to VGA adapter plugged into the Thunderbolt port, can you configure the external monitor to FULLY display in portrait mode yet keep the built-in display in landscape mode?

    With an 11"-inch Macbook Air (mid-2012) using a mini DisplayPort-to-VGA adapter plugged into the Thunderbolt port:
    Can you configure an extended desktop with an external monitor (20") displaying full portrait mode (1200 x 1600 resolution) and keep the built-in display in landscape?
    I'd like to see something like
    External monitor / Built-in display

    Yes, I can't see why not.
    Just give it a try and report back if you have a problem.

  • I have a problem when want to port forward some ports by tiping in my default ip adress but when i do the site justs stays blank. is there a way or something to shut this of so i can open ports?

    hello,
    i have a question, i need to open some port with firefox but when i type my default ip adress nothing happens, the page just keeps blank. so is there a way to turn this of or something?
    please help.
    best regards,
    Arne Demandt

    Firefox includes options of how to handle different content types, in your case the mailto links are probably set to "Use Firefox". For details of how to fix this see [[Firefox keeps opening many tabs or windows]], in particular the section "Change the action for a content type".

  • Please Help - Only Some Port Forwards Working

    Hi all,
    I have the most annoying issue with a Cisco 887VA-K9 port forwarding. Some port work while other don’t and I just can’t see why, however I suspect it is a zone based firewall (ZBF) issue.
    Port forwards on the follow ports all work fine:
    External port 8021 to 192.168.4.253 on port 80 works
    External port 8022 to 192.168.4.253 on port 8022 works
    All the rest don’t. I also have SIP phones sitting outside the LAN which are unable to register through the internet with the PBX unit which is in the DMZ network 192.168.4..0
    Any help would be great appreciated as this sending me mad. Fully running config below.
    Louise ;-)
    Building configuration...
    Current configuration : 36870 bytes
    ! Last configuration change at 12:49:03 Magadan Fri Nov 8 2013 by cpadmin
    version 15.1
    no service pad
    service tcp-keepalives-in
    service tcp-keepalives-out
    service timestamps debug datetime msec localtime show-timezone
    service timestamps log datetime msec localtime show-timezone
    service password-encryption
    service sequence-numbers
    hostname QQQ_ADSL_Gateway
    boot-start-marker
    boot-end-marker
    security authentication failure rate 3 log
    security passwords min-length 6
    logging buffered 64000
    enable secret 4 gim.lMOdQK/21R4Wu.QJfOMAv3CIkRyN.hbSTG5xAxE
    aaa new-model
    aaa authentication login local_authen local
    aaa authentication login ciscocp_vpn_xauth_ml_1 local
    aaa authorization exec local_author local
    aaa authorization network ciscocp_vpn_group_ml_1 local
    aaa session-id common
    memory-size iomem 10
    clock timezone Magadan 11 0
    crypto pki token default removal timeout 0
    crypto pki trustpoint TP-self-signed-3471381936
    enrollment selfsigned
    subject-name cn=IOS-Self-Signed-Certificate-3471381936
    revocation-check none
    rsakeypair TP-self-signed-3471381936
    crypto pki trustpoint test_trustpoint_config_created_for_sdm
    subject-name [email protected]
    revocation-check crl
    crypto pki certificate chain TP-self-signed-3471381936
    certificate self-signed 01
      3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
      31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
      69666963 6174652D 33343731 33383139 3336301E 170D3132 30373132 31313332
      34375A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
      4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 34373133
      38313933 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
      8100AB76 5F7EE03F 306F52A0 91E82E04 7A69528D 1839409C 55BCC55A 47F180A9
      7B522E9B FBB96A32 715178FE B96B737E 788947A4 CF4791AA 15609E37 A3F66F07
      AD1B8A34 A2877711 E33A613D 8E50AE40 A106DE9C B2B03B95 73392ADB 4BB51FAD
      6F2D6F8D A90BA0B5 BD1A209C F54126A9 2E2FF5B7 85041B7E C72032C0 CECE7F79
      51550203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
      551D2304 18301680 141713AB B7F927E5 50C242DF 9912C3B6 61D93313 80301D06
      03551D0E 04160414 1713ABB7 F927E550 C242DF99 12C3B661 D9331380 300D0609
      2A864886 F70D0101 05050003 81810099 8EBE5630 2E6734A8 4D2FD0A5 F09A98F8
      9E49125F AECEF4BB E0DEBB3A 1A449E38 99B02114 7EC84845 B53C2F88 046B7290
      AE44967A 8BE20F5E 9D4A1CFC E1F64FE8 59F51892 23B88B4E 3416808A 68E65660
      644C7DA0 E3A7A525 14FE8E54 67C35F8E CF69EB40 34DFB13D EA302F66 102C822A
      3D7107BA AA4E7273 1D43690E C4A5D4
                    quit
    crypto pki certificate chain test_trustpoint_config_created_for_sdm
    no ip source-route
    ip dhcp excluded-address 192.168.0.230 192.168.0.255
    ip dhcp excluded-address 192.168.0.1 192.168.0.200
    ip dhcp pool QQQ_LAN
    import all
    network 192.168.0.0 255.255.255.0
    default-router 192.168.0.254
    dns-server 192.168.0.6 202.1.161.36
    netbios-name-server 192.168.0.6
    domain-name QQQ.Local
    lease 3
    ip cef
    no ip bootp server
    ip domain name QQQ.Local
    ip name-server 192.168.0.6
    ip name-server 202.1.161.37
    ip name-server 202.1.161.36
    ip inspect log drop-pkt
    no ipv6 cef
    parameter-map type inspect global
    log dropped-packets enable
    parameter-map type protocol-info yahoo-servers
    server name scs.msg.yahoo.com
    server name scsa.msg.yahoo.com
    server name scsb.msg.yahoo.com
    server name scsc.msg.yahoo.com
    server name scsd.msg.yahoo.com
    server name cs16.msg.dcn.yahoo.com
    server name cs19.msg.dcn.yahoo.com
    server name cs42.msg.dcn.yahoo.com
    server name cs53.msg.dcn.yahoo.com
    server name cs54.msg.dcn.yahoo.com
    server name ads1.vip.scd.yahoo.com
    server name radio1.launch.vip.dal.yahoo.com
    server name in1.msg.vip.re2.yahoo.com
    server name data1.my.vip.sc5.yahoo.com
    server name address1.pim.vip.mud.yahoo.com
    server name edit.messenger.yahoo.com
    server name messenger.yahoo.com
    server name http.pager.yahoo.com
    server name privacy.yahoo.com
    server name csa.yahoo.com
    server name csb.yahoo.com
    server name csc.yahoo.com
    parameter-map type protocol-info aol-servers
    server name login.oscar.aol.com
    server name toc.oscar.aol.com
    server name oam-d09a.blue.aol.com
    parameter-map type protocol-info msn-servers
    server name messenger.hotmail.com
    server name gateway.messenger.hotmail.com
    server name webmessenger.msn.com
    password encryption aes
    license udi pid CISCO887VA-K9 sn FGL162321CT
    object-group service MAIL-PORTS
    description QQQ User Mail Restrictions
    tcp eq smtp
    tcp eq pop3
    tcp eq 995
    tcp eq 993
    udp lt rip
    udp lt domain
    tcp eq telnet
    udp lt ntp
    udp lt tftp
    tcp eq ftp
    tcp eq domain
    tcp eq 5900
    tcp eq ftp-data
    tcp eq 3389
    tcp eq 20410
    object-group network Network1
    description QQQ Management Network
    192.168.1.0 255.255.255.0
    192.168.4.0 255.255.255.0
    192.168.5.0 255.255.255.0
    192.168.7.0 255.255.255.0
    192.168.8.0 255.255.255.0
    range 192.168.0.200 192.168.0.254
    range 192.168.0.1 192.168.0.25
    object-group network Network2
    description QQQ User Network
    192.168.2.0 255.255.255.0
    192.168.3.0 255.255.255.0
    192.168.6.0 255.255.255.0
    range 192.168.0.26 192.168.0.199
    object-group network QQQ.Local
    description QQQ_Domain
    192.168.0.0 255.255.255.0
    192.168.1.0 255.255.255.0
    192.168.2.0 255.255.255.0
    192.168.3.0 255.255.255.0
    192.168.4.0 255.255.255.0
    192.168.5.0 255.255.255.0
    192.168.6.0 255.255.255.0
    192.168.8.0 255.255.255.0
    192.168.7.0 255.255.255.0
    192.168.10.0 255.255.255.0
    10.1.0.0 255.255.0.0
    object-group network QQQ_Management_Group
    description QQQ I.T. Devices With UnRestricted Access
    range 192.168.0.200 192.168.0.254
    range 192.168.0.1 192.168.0.25
    192.168.1.0 255.255.255.0
    192.168.8.0 255.255.255.0
    192.168.7.0 255.255.255.0
    192.168.5.0 255.255.255.0
    192.168.4.0 255.255.255.0
    10.1.0.0 255.255.0.0
    192.168.10.0 255.255.255.0
    10.8.0.0 255.255.255.0
    192.168.9.0 255.255.255.0
    192.168.100.0 255.255.255.0
    192.168.20.0 255.255.255.0
    192.168.21.0 255.255.255.0
    192.168.22.0 255.255.255.0
    192.168.23.0 255.255.255.0
    object-group network QQQ_User_Group
    description QQQ I.T. Devices WIth Restricted Access
    range 192.168.0.26 192.168.0.199
    192.168.2.0 255.255.255.0
    192.168.3.0 255.255.255.0
    192.168.6.0 255.255.255.0
    object-group service WEB
    description QQQ User Web Restrictions
    tcp eq www
    tcp eq 443
    tcp eq 8080
    tcp eq 1863
    tcp eq 5190
    username cpadmin privilege 15 password 7 1406031A2C172527
    username QQQVPN privilege 15 secret 4 Hk2tP2GgJ1xXtJUqIZr4gmNSgw6q1E.rvzWiYnDAZHU
    controller VDSL 0
    ip tcp synwait-time 10
    no ip ftp passive
    class-map type inspect match-all sdm-cls-VPNOutsideToInside-1
    match access-group 118
    class-map type inspect match-all sdm-cls-VPNOutsideToInside-3
    match access-group 121
    class-map type inspect match-all sdm-cls-VPNOutsideToInside-2
    match access-group 120
    class-map type inspect imap match-any ccp-app-imap
    match  invalid-command
    class-map type inspect match-any ccp-cls-protocol-p2p
    match protocol edonkey signature
    match protocol gnutella signature
    match protocol kazaa2 signature
    match protocol fasttrack signature
    match protocol bittorrent signature
    class-map type inspect match-all sdm-cls-VPNOutsideToInside-4
    match access-group 122
    class-map type inspect match-all SDM_GRE
    match access-group name SDM_GRE
    class-map type inspect match-any CCP_PPTP
    match class-map SDM_GRE
    class-map type inspect match-any SDM_AH
    match access-group name SDM_AH
    class-map type inspect match-any ccp-skinny-inspect
    match protocol skinny
    class-map type inspect match-any SDM_ESP
    match access-group name SDM_ESP
    class-map type inspect match-any SDM_VPN_TRAFFIC
    match protocol isakmp
    match protocol ipsec-msft
    match class-map SDM_AH
    match class-map SDM_ESP
    class-map type inspect match-all SDM_VPN_PT
    match access-group 117
    match class-map SDM_VPN_TRAFFIC
    class-map type inspect match-any ccp-cls-insp-traffic
    match protocol pptp
    match protocol dns
    match protocol ftp
    match protocol https
    match protocol icmp
    match protocol imap
    match protocol pop3
    match protocol netshow
    match protocol shell
    match protocol realmedia
    match protocol rtsp
    match protocol smtp
    match protocol sql-net
    match protocol streamworks
    match protocol tftp
    match protocol vdolive
    match protocol tcp
    match protocol udp
    class-map type inspect match-all ccp-insp-traffic
    match class-map ccp-cls-insp-traffic
    class-map type inspect match-any SDM_IP
    match access-group name SDM_IP
    class-map type inspect gnutella match-any ccp-app-gnutella
    match  file-transfer
    class-map type inspect match-any SDM_HTTP
    match access-group name SDM_HTTP
    class-map type inspect match-any SDM_EASY_VPN_SERVER_TRAFFIC
    match protocol isakmp
    match protocol ipsec-msft
    match class-map SDM_AH
    match class-map SDM_ESP
    class-map type inspect match-all SDM_EASY_VPN_SERVER_PT
    match class-map SDM_EASY_VPN_SERVER_TRAFFIC
    class-map type inspect match-all sdm-cls-http
    match access-group name dmz-traffic
    match protocol http
    class-map type inspect match-any Telnet
    match protocol telnet
    class-map type inspect msnmsgr match-any ccp-app-msn-otherservices
    match  service any
    class-map type inspect ymsgr match-any ccp-app-yahoo-otherservices
    match  service any
    class-map type inspect match-any ccp-h323nxg-inspect
    match protocol h323-nxg
    class-map type inspect match-any ccp-cls-icmp-access
    match protocol icmp
    match protocol tcp
    match protocol udp
    class-map type inspect match-any ccp-cls-protocol-im
    match protocol ymsgr yahoo-servers
    match protocol msnmsgr msn-servers
    match protocol aol aol-servers
    class-map type inspect aol match-any ccp-app-aol-otherservices
    match  service any
    class-map type inspect match-all ccp-protocol-pop3
    match protocol pop3
    class-map type inspect match-any ccp-h225ras-inspect
    match protocol h225ras
    class-map type inspect match-any FIREWALL_EXCEPTIONS_CLASS
    match access-group name FIREWALL_EXCEPTIONS_ACL
    class-map type inspect match-any ccp-h323annexe-inspect
    match protocol h323-annexe
    class-map type inspect match-any SDM_EASY_VPN_CTCP_SERVER_PT
    match access-group 102
    match access-group 103
    match access-group 104
    match access-group 105
    match access-group 106
    match access-group 107
    match access-group 108
    match access-group 109
    match access-group 110
    match access-group 111
    match access-group 112
    match access-group 113
    match access-group 114
    match access-group 115
    class-map type inspect match-any SIP
    match protocol sip
    class-map type inspect pop3 match-any ccp-app-pop3
    class-map type inspect match-any SDM_HTTPS
    match access-group name SDM_HTTPS
    class-map type inspect sip match-any ccp-cls-sip-pv-2
    match  protocol-violation
    class-map type inspect kazaa2 match-any ccp-app-kazaa2
    match  file-transfer
    class-map type inspect match-all ccp-protocol-p2p
    match class-map ccp-cls-protocol-p2p
    class-map type inspect match-all ccp-cls-ccp-permit-1
    match access-group name ETS1
    class-map type inspect match-any ccp-h323-inspect
    match protocol h323
    class-map type inspect msnmsgr match-any ccp-app-msn
    match  service text-chat
    class-map type inspect ymsgr match-any ccp-app-yahoo
    match  service text-chat
    class-map type inspect match-all ccp-cls-ccp-pol-outToIn-1
    match access-group name ETS
    class-map type inspect match-all ccp-protocol-im
    match class-map ccp-cls-protocol-im
    class-map type inspect match-all ccp-cls-ccp-pol-outToIn-2
    match class-map Telnet
    match access-group name Telnet
    class-map type inspect match-all ccp-icmp-access
    match class-map ccp-cls-icmp-access
    class-map type inspect match-all ccp-invalid-src
    match access-group 100
    class-map type inspect http match-any ccp-app-httpmethods
    match  request method bcopy
    match  request method bdelete
    match  request method bmove
    match  request method bpropfind
    match  request method bproppatch
    match  request method connect
    match  request method copy
    match  request method delete
    match  request method edit
    match  request method getattribute
    match  request method getattributenames
    match  request method getproperties
    match  request method index
    match  request method lock
    match  request method mkcol
    match  request method mkdir
    match  request method move
    match  request method notify
    match  request method options
    match  request method poll
    match  request method propfind
    match  request method proppatch
    match  request method put
    match  request method revadd
    match  request method revlabel
    match  request method revlog
    match  request method revnum
    match  request method save
    match  request method search
    match  request method setattribute
    match  request method startrev
    match  request method stoprev
    match  request method subscribe
    match  request method trace
    match  request method unedit
    match  request method unlock
    match  request method unsubscribe
    class-map type inspect match-any ccp-dmz-protocols
    match user-group qqq
    match protocol icmp
    match protocol http
    class-map type inspect edonkey match-any ccp-app-edonkey
    match  file-transfer
    match  text-chat
    match  search-file-name
    class-map type inspect match-any ccp-sip-inspect
    match protocol sip
    class-map type inspect match-all sdm-cls-sip
    match access-group name dmz-traffic
    match protocol sip
    class-map type inspect match-all ccp-dmz-traffic
    match access-group name dmz-traffic
    match class-map ccp-dmz-protocols
    class-map type inspect http match-any ccp-http-blockparam
    match  request port-misuse im
    match  request port-misuse p2p
    class-map type inspect edonkey match-any ccp-app-edonkeydownload
    match  file-transfer
    class-map type inspect match-all ccp-protocol-imap
    match protocol imap
    class-map type inspect aol match-any ccp-app-aol
    match  service text-chat
    class-map type inspect edonkey match-any ccp-app-edonkeychat
    match  search-file-name
    match  text-chat
    class-map type inspect match-all ccp-cls-ccp-permit-dmzservice-1
    match class-map SIP
    match access-group name SIP
    class-map type inspect fasttrack match-any ccp-app-fasttrack
    match  file-transfer
    class-map type inspect http match-any ccp-http-allowparam
    match  request port-misuse tunneling
    class-map type inspect match-all ccp-protocol-http
    match protocol http
    policy-map type inspect ccp-permit-icmpreply
    class type inspect ccp-icmp-access
      inspect
    class class-default
      pass
    policy-map type inspect p2p ccp-action-app-p2p
    class type inspect edonkey ccp-app-edonkeychat
      log
      allow
    class type inspect edonkey ccp-app-edonkeydownload
      log
      allow
    class type inspect fasttrack ccp-app-fasttrack
      log
      allow
    class type inspect gnutella ccp-app-gnutella
      log
      allow
    class type inspect kazaa2 ccp-app-kazaa2
      log
      allow
    policy-map type inspect PF_OUT_TO_IN
    class type inspect FIREWALL_EXCEPTIONS_CLASS
      pass
    policy-map type inspect PF_IN_TO_OUT
    class type inspect FIREWALL_EXCEPTIONS_CLASS
      pass
    policy-map type inspect im ccp-action-app-im
    class type inspect aol ccp-app-aol
      log
      allow
    class type inspect msnmsgr ccp-app-msn
      log
      allow
    class type inspect ymsgr ccp-app-yahoo
      log
      allow
    class type inspect aol ccp-app-aol-otherservices
      log
      reset
    class type inspect msnmsgr ccp-app-msn-otherservices
      log
      reset
    class type inspect ymsgr ccp-app-yahoo-otherservices
      log
      reset
    policy-map type inspect http ccp-action-app-http
    class type inspect http ccp-http-blockparam
      log
      reset
    class type inspect http ccp-app-httpmethods
      log
      reset
    class type inspect http ccp-http-allowparam
      log
      allow
    policy-map type inspect imap ccp-action-imap
    class type inspect imap ccp-app-imap
      log
    policy-map type inspect pop3 ccp-action-pop3
    class type inspect pop3 ccp-app-pop3
      log
    policy-map type inspect ccp-inspect
    class type inspect ccp-protocol-http
      inspect
      service-policy http ccp-action-app-http
    class type inspect ccp-protocol-imap
      inspect
      service-policy imap ccp-action-imap
    class type inspect ccp-protocol-pop3
      inspect
      service-policy pop3 ccp-action-pop3
    class type inspect ccp-protocol-p2p
      inspect
      service-policy p2p ccp-action-app-p2p
    class type inspect ccp-protocol-im
      inspect
      service-policy im ccp-action-app-im
    class type inspect ccp-insp-traffic
      inspect
    class type inspect ccp-sip-inspect
      inspect
    class type inspect ccp-h323-inspect
      inspect
    class type inspect ccp-h323annexe-inspect
      inspect
    class type inspect ccp-h225ras-inspect
      inspect
    class type inspect ccp-h323nxg-inspect
      inspect
    class type inspect ccp-skinny-inspect
      inspect
    class type inspect ccp-invalid-src
      drop log
    class class-default
      drop
    policy-map type inspect ccp-permit
    class type inspect SDM_VPN_PT
      pass
    class type inspect ccp-cls-ccp-permit-1
      pass
    class type inspect SDM_EASY_VPN_SERVER_PT
      pass
    class type inspect SDM_EASY_VPN_CTCP_SERVER_PT
      inspect
    class class-default
      drop
    policy-map type inspect sip ccp-app-sip-2
    class type inspect sip ccp-cls-sip-pv-2
      allow
    policy-map type inspect ccp-permit-dmzservice
    class type inspect ccp-cls-ccp-permit-dmzservice-1
      pass
    class type inspect ccp-dmz-traffic
      inspect
    class type inspect sdm-cls-http
      inspect
      service-policy http ccp-action-app-http
    class type inspect sdm-cls-VPNOutsideToInside-1
      inspect
    class type inspect sdm-cls-VPNOutsideToInside-2
      inspect
    class type inspect sdm-cls-VPNOutsideToInside-3
      pass
    class class-default
      pass
    policy-map type inspect ccp-pol-outToIn
    class type inspect ccp-cls-ccp-pol-outToIn-1
      pass
    class type inspect ccp-cls-ccp-pol-outToIn-2
      pass
    class type inspect CCP_PPTP
      pass
    class type inspect sdm-cls-VPNOutsideToInside-1
      inspect
    class type inspect sdm-cls-VPNOutsideToInside-2
      inspect
    class type inspect sdm-cls-VPNOutsideToInside-3
      pass
    class type inspect sdm-cls-VPNOutsideToInside-4
      inspect
    class class-default
      drop log
    policy-map type inspect sdm-permit-ip
    class type inspect SDM_IP
      pass
    class type inspect sdm-cls-VPNOutsideToInside-2
      inspect
    class type inspect sdm-cls-VPNOutsideToInside-3
      pass
    class type inspect sdm-cls-VPNOutsideToInside-4
      inspect
    class class-default
      drop log
    zone security dmz-zone
    zone security in-zone
    zone security out-zone
    zone security ezvpn-zone
    zone-pair security ccp-zp-out-dmz source out-zone destination dmz-zone
    service-policy type inspect ccp-permit-dmzservice
    zone-pair security ccp-zp-out-self source out-zone destination self
    service-policy type inspect ccp-permit
    zone-pair security ccp-zp-in-out source in-zone destination out-zone
    service-policy type inspect ccp-inspect
    zone-pair security ccp-zp-out-zone-To-in-zone source out-zone destination in-zone
    service-policy type inspect ccp-pol-outToIn
    zone-pair security ccp-zp-in-dmz source in-zone destination dmz-zone
    service-policy type inspect ccp-permit-dmzservice
    zone-pair security ccp-zp-self-out source self destination out-zone
    service-policy type inspect ccp-permit-icmpreply
    zone-pair security dmz-to-in source dmz-zone destination in-zone
    service-policy type inspect ccp-permit-icmpreply
    zone-pair security sdm-zp-ezvpn-out1 source ezvpn-zone destination out-zone
    service-policy type inspect sdm-permit-ip
    zone-pair security sdm-zp-in-ezvpn2 source in-zone destination ezvpn-zone
    service-policy type inspect sdm-permit-ip
    zone-pair security sdm-zp-in-ezvpn1 source dmz-zone destination ezvpn-zone
    service-policy type inspect sdm-permit-ip
    zone-pair security sdm-zp-ezvpn-in2 source ezvpn-zone destination in-zone
    service-policy type inspect sdm-permit-ip
    zone-pair security sdm-zp-ezvpn-in1 source ezvpn-zone destination dmz-zone
    service-policy type inspect sdm-permit-ip
    zone-pair security sdm-zp-out-ezpn1 source out-zone destination ezvpn-zone
    service-policy type inspect sdm-permit-ip
    zone-pair security sdm-zp-ezvpn-in3 source ezvpn-zone destination ezvpn-zone
    service-policy type inspect sdm-permit-ip
    crypto ctcp port 10000 1723 6299
    crypto isakmp policy 1
    encr 3des
    authentication pre-share
    group 2
    crypto isakmp policy 2
    encr aes 256
    authentication pre-share
    group 2
    crypto isakmp key 6 PbKM_WfaCM[hYNXAFOUgCNgCB_ZdJEAAB address 220.245.109.219
    crypto isakmp key 6 NddQRR[O^KY`GRDC[VZUEPE`CSJ^CDAAB address 0.0.0.0 0.0.0.0
    crypto isakmp client configuration group QQQ
    key 6 UWVBhb`Lgc_AZbDYWDFZiGZTTadNYTAAB
    dns 192.168.0.6 202.1.161.36
    wins 192.168.0.6
    domain QQQ.Local
    pool SDM_POOL_1
    include-local-lan
    max-users 20
    max-logins 1
    netmask 255.255.255.0
    banner ^CCWelcome to QQQ VPN!!!!1                 ^C
    crypto isakmp profile ciscocp-ike-profile-1
       match identity group QQQ
       client authentication list ciscocp_vpn_xauth_ml_1
       isakmp authorization list ciscocp_vpn_group_ml_1
       client configuration address initiate
       client configuration address respond
       keepalive 10 retry 2
       virtual-template 1
    crypto ipsec transform-set ESP_AES_SHA esp-aes 256 esp-sha-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec profile CiscoCP_Profile1
    set security-association idle-time 43200
    set transform-set ESP_AES_SHA
    set isakmp-profile ciscocp-ike-profile-1
    crypto map SDM_CMAP_1 1 ipsec-isakmp
    description Tunnel to220.245.109.219
    set peer 220.245.109.219
    set transform-set ESP-3DES-SHA
    match address 119
    interface Loopback0
    description QQQ_VPN
    ip address 192.168.9.254 255.255.255.0
    interface Null0
    no ip unreachables
    interface Ethernet0
    no ip address
    no ip redirects
    no ip unreachables
    no ip proxy-arp
    ip flow ingress
    shutdown
    no fair-queue
    interface ATM0
    no ip address
    no ip redirects
    no ip unreachables
    no ip proxy-arp
    ip flow ingress
    no atm ilmi-keepalive
    interface ATM0.1 point-to-point
    description Telekom_ADSL
    no ip redirects
    no ip unreachables
    no ip proxy-arp
    ip flow ingress
    zone-member security out-zone
    pvc 8/35
      pppoe-client dial-pool-number 1
    interface FastEthernet0
    description QQQ_LAN-VLAN_1
    switchport access vlan 1
    no ip address
    interface FastEthernet1
    description QQQ_LAN-VLAN_1
    no ip address
    interface FastEthernet2
    description QQQ_WAN-VLAN_2
    switchport access vlan 2
    no ip address
    interface FastEthernet3
    description QQQ_DMZ-IP_PBX-VLAN_3
    switchport access vlan 3
    no ip address
    interface Virtual-Template1 type tunnel
    description QQQ_Easy_VPN
    ip unnumbered Loopback0
    ip nat inside
    ip virtual-reassembly in
    zone-member security ezvpn-zone
    tunnel mode ipsec ipv4
    tunnel protection ipsec profile CiscoCP_Profile1
    interface Vlan1
    description QQQ_LAN-VLAN1$FW_INSIDE$
    ip address 192.168.0.254 255.255.255.0
    ip access-group QQQ_ACL in
    ip mask-reply
    ip nat inside
    ip virtual-reassembly in
    zone-member security in-zone
    ip tcp adjust-mss 1412
    interface Vlan2
    description QQQ_WAN-VLAN2$FW_INSIDE$
    ip address 192.168.5.254 255.255.255.0
    ip access-group QQQ_ACL in
    ip mask-reply
    ip nat inside
    ip virtual-reassembly in
    zone-member security in-zone
    ip tcp adjust-mss 1412
    interface Vlan3
    description QQQ_IP-PBX_WAN-VLAN3
    ip address 192.168.4.254 255.255.255.0
    ip mask-reply
    ip nat inside
    ip virtual-reassembly in
    zone-member security dmz-zone
    interface Vlan4
    description VLAN4 - 192.168.20.xxx (Spare)
    ip address 192.168.20.253 255.255.255.0
    ip nat inside
    ip virtual-reassembly in
    zone-member security in-zone
    interface Dialer0
    description ATM Dialer
    no ip address
    no ip redirects
    no ip unreachables
    no ip proxy-arp
    ip flow ingress
    ip nat outside
    ip virtual-reassembly in
    zone-member security out-zone
    no cdp enable
    interface Dialer2
    description $FW_OUTSIDE$
    ip address negotiated
    no ip redirects
    no ip unreachables
    no ip proxy-arp
    ip mtu 1452
    ip nbar protocol-discovery
    ip flow ingress
    ip flow egress
    ip nat outside
    ip virtual-reassembly in
    zone-member security out-zone
    encapsulation ppp
    dialer pool 1
    dialer-group 1
    ppp authentication chap pap callin
    ppp chap hostname xxxxxxxxxxxxxxxxxxx
    ppp chap password 7 xxxxxxxxxxxxxxxxxxxxxxxxx
    ppp pap sent-username xxxxxxxxxx0 password 7 xxxxxxxxxxxxxxxxxxxxx
    no cdp enable
    crypto map SDM_CMAP_1
    router rip
    version 2
    redistribute static
    passive-interface ATM0
    passive-interface ATM0.1
    passive-interface Dialer0
    passive-interface Dialer2
    passive-interface Ethernet0
    passive-interface Loopback0
    network 10.0.0.0
    network 192.168.0.0
    network 192.168.1.0
    network 192.168.2.0
    network 192.168.3.0
    network 192.168.4.0
    network 192.168.5.0
    network 192.168.6.0
    network 192.168.7.0
    network 192.168.8.0
    network 192.168.10.0
    network 192.168.100.0
    ip local pool SDM_POOL_1 192.168.5.100 192.168.5.200
    ip forward-protocol nd
    ip http server
    ip http access-class 5
    ip http authentication local
    ip http secure-server
    ip nat pool NAT_IP 192.168.0.210 192.168.0.235 netmask 255.255.255.0
    ip nat inside source static tcp 192.168.4.253 5060 interface Dialer2 5060
    ip nat inside source static tcp 192.168.0.240 20408 interface Dialer2 6208
    ip nat inside source static tcp 192.168.0.240 20409 interface Dialer2 6209
    ip nat inside source static tcp 192.168.0.240 20410 interface Dialer2 6200
    ip nat inside source static tcp 192.168.1.240 20408 interface Dialer2 6218
    ip nat inside source static tcp 192.168.1.240 20409 interface Dialer2 6219
    ip nat inside source static tcp 192.168.1.240 20410 interface Dialer2 6210
    ip nat inside source static tcp 192.168.7.240 20408 interface Dialer2 6278
    ip nat inside source static tcp 192.168.7.240 20409 interface Dialer2 6279
    ip nat inside source static tcp 192.168.7.240 20410 interface Dialer2 6270
    ip nat inside source static tcp 192.168.8.240 20408 interface Dialer2 6288
    ip nat inside source static tcp 192.168.8.240 20409 interface Dialer2 6289
    ip nat inside source static tcp 192.168.8.240 20410 interface Dialer2 6280
    ip nat inside source static tcp 192.168.0.6 1723 interface Dialer2 1723
    ip nat inside source static tcp 192.168.0.6 3389 interface Dialer2 6389
    ip nat inside source static tcp 192.168.0.24 3389 interface Dialer2 6390
    ip nat inside source static tcp 192.168.4.253 8022 interface Dialer2 8022
    ip nat inside source static tcp 192.168.4.253 80 interface Dialer2 8021
    ip nat inside source static tcp 192.168.0.254 23 interface Dialer2 8023
    ip nat inside source static tcp 192.168.0.6 443 interface Dialer2 443
    ip nat inside source route-map SDM_RMAP_1 interface Dialer2 overload
    ip default-network 192.168.0.0
    ip default-network 192.168.4.0
    ip route 0.0.0.0 0.0.0.0 Dialer2 permanent
    ip route 10.1.0.0 255.255.0.0 Vlan2 permanent
    ip route 10.8.0.0 255.255.255.0 Vlan2 permanent
    ip route 192.168.0.0 255.255.255.0 Vlan1 permanent
    ip route 192.168.4.0 255.255.255.0 Vlan3 permanent
    ip route 192.168.5.0 255.255.255.0 Vlan2 permanent
    ip route 192.168.100.0 255.255.255.0 Dialer2 permanent
    ip access-list extended ACCESS_FROM_INSIDE
    permit ip object-group QQQ_Management_Group any
    permit tcp object-group QQQ_User_Group any eq smtp pop3
    permit tcp object-group QQQ_User_Group any eq 993 995
    permit tcp 192.168.0.0 0.0.0.255 any eq smtp pop3
    permit tcp 192.168.0.0 0.0.0.255 any eq 993 995
    permit ip 192.168.1.0 0.0.0.255 any
    permit ip 192.168.4.0 0.0.0.255 any
    permit ip 192.168.5.0 0.0.0.255 any
    permit ip 192.168.7.0 0.0.0.255 any
    permit ip 192.168.8.0 0.0.0.255 any
    permit tcp 192.168.2.0 0.0.0.255 any eq www 443 8080 domain
    permit tcp 192.168.2.0 0.0.0.255 any eq www 443 8080 domain time-range QQQ_Control
    permit tcp 192.168.3.0 0.0.0.255 any eq www 443 8080 domain time-range QQQ_Control
    permit tcp 192.168.4.0 0.0.0.255 any eq www 443 8080 domain time-range QQQ_Control
    permit udp 192.168.2.0 0.0.0.255 any eq domain time-range QQQ_Control
    permit udp 192.168.3.0 0.0.0.255 any eq domain time-range QQQ_Control
    permit udp 192.168.4.0 0.0.0.255 any eq domain time-range QQQ_Control
    ip access-list extended ETS
    remark CCP_ACL Category=128
    permit ip host 203.219.237.252 any
    ip access-list extended ETS1
    remark CCP_ACL Category=128
    permit ip host 203.219.237.252 any
    ip access-list extended FIREWALL_EXCEPTIONS_ACL
    permit tcp any host 192.168.0.100 eq 25565
    permit tcp any eq 25565 host 192.168.0.100
    ip access-list extended QQQ_ACL
    permit ip any host 192.168.4.253
    permit udp any any eq bootps bootpc
    permit ip any 192.168.4.0 0.0.0.255
    permit ip host 203.219.237.252 any
    remark QQQ Internet Control List
    remark CCP_ACL Category=17
    remark Auto generated by CCP for NTP (123) 203.12.160.2
    permit udp host 203.12.160.2 eq ntp any eq ntp
    remark AD Services
    permit udp host 192.168.0.6 eq domain any
    remark Unrestricted Access
    permit ip object-group QQQ_Management_Group any
    remark Restricted Users
    permit object-group MAIL-PORTS object-group QQQ_User_Group any
    permit ip 192.168.0.0 0.0.0.255 any time-range QQQ_Control
    permit ip 192.168.2.0 0.0.0.255 any time-range QQQ_Control
    permit ip 192.168.3.0 0.0.0.255 any time-range QQQ_Control
    permit ip 192.168.6.0 0.0.0.255 any time-range QQQ_Control
    remark ICMP Full Access
    permit icmp object-group QQQ_User_Group any
    permit tcp 192.168.2.0 0.0.0.255 eq www 443 8080 5190 1863 any time-range QQQ_Control
    permit tcp 192.168.3.0 0.0.0.255 eq www 443 8080 5190 1863 any time-range QQQ_Control
    permit tcp 192.168.6.0 0.0.0.255 eq www 443 8080 5190 1863 any time-range QQQ_Control
    permit udp 192.168.6.0 0.0.0.255 eq 80 443 8080 5190 1863 any time-range QQQ_Control
    permit tcp 192.168.0.0 0.0.0.255 eq www 443 8080 5190 1863 any time-range QQQ_Control
    permit udp 192.168.0.0 0.0.0.255 eq 80 443 8080 5190 1863 any time-range QQQ_Control
    permit udp 192.168.2.0 0.0.0.255 eq 80 443 8080 5190 1863 any time-range QQQ_Control
    permit udp 192.168.3.0 0.0.0.255 eq 80 443 8080 5190 1863 any time-range QQQ_Control
    ip access-list extended QQQ_NAT
    remark CCP_ACL Category=18
    remark IPSec Rule
    deny   ip 192.168.0.0 0.0.255.255 192.168.100.0 0.0.0.255
    permit ip any any
    ip access-list extended SDM_AH
    remark CCP_ACL Category=1
    permit ahp any any
    ip access-list extended SDM_ESP
    remark CCP_ACL Category=1
    permit esp any any
    ip access-list extended SDM_GRE
    remark CCP_ACL Category=1
    permit gre any any
    ip access-list extended SDM_HTTP
    remark CCP_ACL Category=0
    permit tcp any any eq telnet
    ip access-list extended SDM_HTTPS
    remark CCP_ACL Category=0
    permit tcp any any eq 443
    ip access-list extended SDM_IP
    remark CCP_ACL Category=1
    permit ip any any
    ip access-list extended SIP
    remark CCP_ACL Category=128
    permit ip any 192.168.4.0 0.0.0.255
    ip access-list extended Telnet
    remark CCP_ACL Category=128
    permit ip any any
    ip access-list extended dmz-traffic
    remark CCP_ACL Category=1
    permit ip any 192.168.4.0 0.0.0.255
    access-list 1 remark CCP_ACL Category=2
    access-list 1 remark QQQ_DMZ
    access-list 1 permit 192.168.4.0 0.0.0.255
    access-list 2 remark CCP_ACL Category=2
    access-list 2 remark QQQ_LAN
    access-list 2 permit 192.168.0.0 0.0.0.255
    access-list 3 remark QQQ Insid NAT
    access-list 3 remark CCP_ACL Category=2
    access-list 3 permit 192.168.0.0 0.0.0.255
    access-list 3 permit 192.168.1.0 0.0.0.255
    access-list 3 permit 192.168.2.0 0.0.0.255
    access-list 3 permit 192.168.3.0 0.0.0.255
    access-list 3 permit 192.168.4.0 0.0.0.255
    access-list 3 permit 192.168.5.0 0.0.0.255
    access-list 3 permit 192.168.6.0 0.0.0.255
    access-list 3 permit 192.168.7.0 0.0.0.255
    access-list 3 permit 192.168.8.0 0.0.0.255
    access-list 3 permit 192.168.9.0 0.0.0.255
    access-list 3 permit 192.168.10.0 0.0.0.255
    access-list 4 remark QQQ_NAT
    access-list 4 remark CCP_ACL Category=2
    access-list 4 permit 10.1.0.0 0.0.255.255
    access-list 4 permit 10.8.0.0 0.0.0.255
    access-list 4 permit 192.168.0.0 0.0.0.255
    access-list 4 permit 192.168.1.0 0.0.0.255
    access-list 4 permit 192.168.2.0 0.0.0.255
    access-list 4 permit 192.168.3.0 0.0.0.255
    access-list 4 permit 192.168.4.0 0.0.0.255
    access-list 4 permit 192.168.5.0 0.0.0.255
    access-list 4 permit 192.168.6.0 0.0.0.255
    access-list 4 permit 192.168.7.0 0.0.0.255
    access-list 4 permit 192.168.8.0 0.0.0.255
    access-list 4 permit 192.168.9.0 0.0.0.255
    access-list 4 permit 192.168.10.0 0.0.0.255
    access-list 5 remark HTTP Access-class list
    access-list 5 remark CCP_ACL Category=1
    access-list 5 permit 192.168.4.0 0.0.0.255
    access-list 5 permit 192.168.0.0 0.0.0.255
    access-list 5 deny   any
    access-list 100 remark CCP_ACL Category=128
    access-list 100 permit ip 192.168.4.0 0.0.0.255 any
    access-list 100 permit ip 127.0.0.0 0.255.255.255 any
    access-list 100 permit ip host 255.255.255.255 any
    access-list 101 remark QQQ_Extended_ACL
    access-list 101 remark CCP_ACL Category=1
    access-list 101 permit tcp any host 192.168.0.254 eq 10000
    access-list 101 permit udp any host 192.168.0.254 eq non500-isakmp
    access-list 101 permit udp any host 192.168.0.254 eq isakmp
    access-list 101 permit esp any host 192.168.0.254
    access-list 101 permit ahp any host 192.168.0.254
    access-list 101 remark Auto generated by CCP for NTP (123) 203.12.160.2
    access-list 101 permit udp host 203.12.160.2 eq ntp host 192.168.4.254 eq ntp
    access-list 101 permit udp host 192.168.0.6 eq domain any
    access-list 101 remark NTP (123) 203.12.160.2
    access-list 101 permit udp host 203.12.160.2 eq ntp any eq ntp
    access-list 101 remark QQQ_ANY_Any
    access-list 101 permit ip object-group QQQ.Local any
    access-list 101 remark QQQ_DMZ
    access-list 101 permit ip any 192.168.4.0 0.0.0.255
    access-list 101 remark QQQ_GRE
    access-list 101 permit gre any any
    access-list 101 remark QQQ_Ping
    access-list 101 permit icmp any any
    access-list 102 remark CCP_ACL Category=1
    access-list 102 permit tcp any any eq 10000
    access-list 103 permit tcp any 192.168.0.0 0.0.0.255 eq 443
    access-list 103 remark CCP_ACL Category=1
    access-list 103 permit tcp any any eq 10000
    access-list 103 permit tcp any 192.168.4.0 0.0.0.255 eq 8022
    access-list 103 permit tcp any 192.168.4.0 0.0.0.255 eq telnet
    access-list 103 permit tcp any 192.168.4.0 0.0.0.255 eq www
    access-list 103 permit tcp any 192.168.4.0 0.0.0.255 eq 5060
    access-list 103 permit tcp any eq telnet host 192.168.0.254
    access-list 103 permit tcp any 192.168.0.0 0.0.0.255 eq telnet
    access-list 103 permit udp any 192.168.4.0 0.0.0.255 eq 5060
    access-list 103 permit udp any 192.168.4.0 0.0.0.255 range 10001 12000
    access-list 104 remark CCP_ACL Category=1
    access-list 104 permit tcp any any eq 10000
    access-list 105 remark CCP_ACL Category=1
    access-list 105 permit tcp any any eq 10000
    access-list 106 remark CCP_ACL Category=1
    access-list 106 permit tcp any any eq 10000
    access-list 107 remark CCP_ACL Category=1
    access-list 107 permit tcp any any eq 10000
    access-list 108 remark CCP_ACL Category=1
    access-list 108 permit tcp any any eq 10000
    access-list 109 remark CCP_ACL Category=1
    access-list 109 permit tcp any any eq 10000
    access-list 110 remark CCP_ACL Category=1
    access-list 110 permit tcp any any eq 10000
    access-list 111 remark CCP_ACL Category=1
    access-list 111 permit tcp any any eq 10000
    access-list 112 remark CCP_ACL Category=1
    access-list 112 permit tcp any any eq 10000
    access-list 113 remark CCP_ACL Category=1
    access-list 113 permit tcp any any eq 10000
    access-list 114 remark CCP_ACL Category=1
    access-list 114 permit tcp any any eq 10000
    access-list 115 remark CCP_ACL Category=1
    access-list 115 permit tcp any any eq 10000
    access-list 116 remark CCP_ACL Category=4
    access-list 116 remark IPSec Rule
    access-list 116 permit ip 192.168.0.0 0.0.255.255 192.168.100.0 0.0.0.255
    access-list 117 remark CCP_ACL Category=128
    access-list 117 permit ip any any
    access-list 117 permit ip host 220.245.109.219 any
    access-list 118 remark CCP_ACL Category=0
    access-list 118 permit ip 192.168.100.0 0.0.0.255 192.168.0.0 0.0.0.255
    access-list 119 remark CCP_ACL Category=4
    access-list 119 remark IPSec Rule
    access-list 119 permit ip 192.168.0.0 0.0.255.255 192.168.100.0 0.0.0.255
    access-list 120 remark CCP_ACL Category=0
    access-list 120 permit ip 192.168.100.0 0.0.0.255 192.168.0.0 0.0.0.255
    access-list 121 remark CCP_ACL Category=0
    access-list 121 permit ip 192.168.100.0 0.0.0.255 192.168.0.0 0.0.255.255
    access-list 122 remark CCP_ACL Category=0
    access-list 122 permit ip 192.168.100.0 0.0.0.255 192.168.0.0 0.0.255.255
    dialer-list 1 protocol ip permit
    route-map SDM_RMAP_1 permit 1
    match ip address QQQ_NAT
    banner login ^CCWelcome to QQQ ADSL Gateway

    It turns out the problem had nothing to do with wires or splitters.  The Verizon tech was at my house yesterday and the ONT was failing.  He replaced part of the ONT and it fixed the problem (finally!).  At least I was able to watch the Celtics game last night.
    I have a Tellabs ONT.  Not sure the model but it's older like the ones in this thread.
    http://www.dslreports.com/forum/r19982000-Mounting-board-for-612-ONT

  • Can't change printer port on Windows 8.1 and Server 2012 R2

    1. Install "Lexmark X646e Class Driver" using a in-box print driver (i.e. one comes with the Windows installation base) .
    2. Go to "Printer properties" -> "Port"
    3. Select a custom monitor port, and the following error occurs in Event Viewer.
    An error occurred while configuring print queue 'Lexmark X646e Class Driver'. Printer driver 'Lexmark X646e Class Driver' may not be used in conjunction with a non-inbox port monitor.
    Same steps applied on Windows 8 and Server 2012, and not issues found. The restriction/limitation is newly added in Window 8.1 and Server 2012 R2. 
    Changing to a custom monitor port after printer driver installation is very important for us.
    How can we solve or workaround the above issue, so it can behave like Windows 8 and Server 2012? 

    What Port Monitor just so I can bubble this information to some others?
    Alan Morris Windows Printing Team
    Hi Alan:
    We developed a custom printing system, which involved the following configurations:
    1. Create a custom port monitor on server 2012 r2.
    2. Change an existing print queue to use this custom port monitor, and share this print queue.
    3. All workstations will print to this shared print queue on the server.
    The goal is to manage/monitor the print information in StartDocPort for all printing for instance.  This is what we've been doing for a long time.
    Now we upgraded our system from server 2012 to server 2012 R2, but we can't change the port monitor to our ones anymore.
    I've tried the Type3 printer driver, such as Brother Color Type3 Class Driver, unfortunately it didn't work if the installation is using "Add a printer", and select the driver from the list.   
    The only way to make it work is to install the printer driver using the one downloaded from the vendor's website, this will bypass Windows "Add a printer". 
    Is there any chance we can make this to behave like server 2012 or earlier? Modify registry keys?
    Cheers
    Steven

  • Can we configure SAP server installed in RHEL in windows sapmmc?

    Can we configure SAP server installed in RHEL in windows sapmmc(Which is also sap server with same version and same DB)?
    I have tried to configure using help from previous post in SCN ( SAP MMC in one server to control the entrie landscape ) but it is not working...  As picture shown below after entering the details am clicking on add but nothing is happening...
    Scenario is I have installed 4 VM's with SAP installed in all (out of it 3 linux and 1 windows) & all communicating well and they are in same Network/Landscape & I can configure/manage/logon all servers in host GUI... But If I shutdown my VM or a Laptop...  Every time I have to start all the servers... by starting lsnrctl, DB, sap for all the servers,
    Is there any chance to configure sap in windows sapmmc...???
    Kindly suggest the process step by step...
    Thanks in advance...

    Hi Yüksel
    Thank you for the reply It helped me to configure but i struck in some place.. Dispatcher is getting stopped... I tried to add 3 different sap servers in sapmmc and tried to start.. Three are getting same errors(Guess same error)
    After your suggestion i was able to configure and start SIDadm of host but immediately or after 30sec Dispatcher gets stopped tried to find out some solutions but didnt worked... But i was able to start from there servers manually in linux way startsap, but not in SAPMMC way...
    Could you or please help me in solving trace given below...
    trc file: "dev_disp.new", trc level: 1, release: "700"
    sysno      00
    sid        W41
    systemid   387 (Intel x86 with Linux)
    relno      7000
    patchlevel 0
    patchno    353
    intno      20050900
    make:      single threaded, Unicode, optimized
    pid        22162
    kernel runs with dp version 247000(ext=110000) (@(#) DPLIB-INT-VERSION-247000-UC)
    length of sys_adm_ext is 576 bytes
    *** SWITCH TRC-HIDE on ***
    ***LOG Q00=> DpSapEnvInit, DPStart (00 22162) [dpxxdisp.c   1345]
      shared lib "dw_xml.so" version 353 successfully loaded
      shared lib "dw_xtc.so" version 353 successfully loaded
      shared lib "dw_stl.so" version 353 successfully loaded
      shared lib "dw_gui.so" version 353 successfully loaded
      shared lib "dw_mdm.so" version 353 successfully loaded
    rdisp/softcancel_sequence :  -> 0,5,-1
    use internal message server connection to port 3900
    Tue Mar 31 00:02:41 2015
    *** WARNING => DpNetCheck: NiHostToAddr(www.doesnotexist0042.qqq.nxst) took 21 seconds
    Tue Mar 31 00:02:52 2015
    *** WARNING => DpNetCheck: NiAddrToHost(1.0.0.0) took 11 seconds
    ***LOG GZZ=> 2 possible network problems detected - check tracefile and adjust the DNS settings [dpxxtool2.c  5540]
    MtxInit: 30000 0 0
    DpSysAdmExtInit: ABAP is active
    DpSysAdmExtInit: VMC (JAVA VM in WP) is not active
    DpIPCInit2: start server >willsys41_W41_00                        <
    DpShMCreate: sizeof(wp_adm) 17120 (1712)
    DpShMCreate: sizeof(tm_adm) 4480000 (22288)
    DpShMCreate: sizeof(wp_ca_adm) 28800 (96)
    DpShMCreate: sizeof(appc_ca_adm) 9600 (96)
    DpCommTableSize: max/headSize/ftSize/tableSize=500/8/524056/524064
    DpShMCreate: sizeof(comm_adm) 524064 (1036)
    DpSlockTableSize: max/headSize/ftSize/fiSize/tableSize=0/0/0/0/0
    DpShMCreate: sizeof(slock_adm) 0 (92)
    DpFileTableSize: max/headSize/ftSize/tableSize=0/0/0/0
    DpShMCreate: sizeof(file_adm) 0 (68)
    DpShMCreate: sizeof(vmc_adm) 0 (1684)
    DpShMCreate: sizeof(wall_adm) (38456/34360/80/184)
    DpShMCreate: sizeof(gw_adm) 48
    DpShMCreate: SHM_DP_ADM_KEY (addr: 0x4ed2000, size: 5141584)
    DpShMCreate: allocated sys_adm at 0x4ed2000
    DpShMCreate: allocated wp_adm at 0x4ed4260
    DpShMCreate: allocated tm_adm_list at 0x4ed8540
    DpShMCreate: allocated tm_adm at 0x4ed8570
    DpShMCreate: allocated wp_ca_adm at 0x531e170
    DpShMCreate: allocated appc_ca_adm at 0x53251f0
    DpShMCreate: allocated comm_adm at 0x5327770
    DpShMCreate: system runs without slock table
    DpShMCreate: system runs without file table
    DpShMCreate: allocated vmc_adm_list at 0x53a7690
    DpShMCreate: allocated gw_adm at 0x53a76d0
    DpShMCreate: system runs without vmc_adm
    DpShMCreate: allocated ca_info at 0x53a7700
    DpShMCreate: allocated wall_adm at 0x53a7790
    MBUF state OFF
    DpCommInitTable: init table for 500 entries
    DpRqQInit: Parameter rdisp/queue_lock_level = 2
    rdisp/queue_size_check_value :  -> on,50,30,40,500,50,500,80
    ThTaskStatus: rdisp/reset_online_during_debug 0
    EmInit: MmSetImplementation( 2 ).
    MM global diagnostic options set: 0
    <ES> client 0 initializing ....
    <ES> EsILock: use spinlock for locking
    <ES> InitFreeList
    <ES> block size is 1024 kByte.
    Using implementation map
    <EsMap> EsMapUnamFileMapInit: Initialize the memory 240 MB
    Linux: Kernel supports shared memory disclaiming
    Linux: using madvise(<pointer>, <size>, 9).
    Linux: disclaiming for shared memory enabled
    <ES> 239 blocks reserved for free list.
    ES initialized.
    mm.dump: set maximum dump mem to 96 MB
    Tue Mar 31 00:02:53 2015
    rdisp/http_min_wait_dia_wp : 1 -> 1
    ***LOG CPS=> DpLoopInit, ICU ( 3.0 3.0 4.0.1) [dpxxdisp.c   1752]
    ***LOG Q0K=> DpMsAttach, mscon ( willsys41) [dpxxdisp.c   12953]
    DpStartStopMsg: send start message (myname is >willsys41_W41_00                        <)
    DpStartStopMsg: start msg sent
    Warning: Swap space is configured quite small with 5035 MB.
    It should be two times larger than the amount of RAM (3066 MB).
    See note 171356 for more information.
    Warning: tmpfs at /dev/shm is configured quite small with 1532 MB!
    Minimum value is 2048 MB.
    Recommended size is 75 % of RAM + swap.
    *** INFO  Shm 13 in Pool 10    59082 KB estimated     58800 KB real (    -282 KB    -72 %)
    CCMS: start to initalize 3.X shared alert area (first segment).
    *** ERROR => DpWPCheck: W0 (pid 22217) died (severity=0, status=65280) [dpxxdisp.c   16083]
    child (pid=22217) exited with exit code 255
    my types changed after wp death/restart 0xbf --> 0xbe
    *** ERROR => DpWPCheck: W1 (pid 22218) died (severity=0, status=65280) [dpxxdisp.c   16083]
    child (pid=22218) exited with exit code 255
    *** ERROR => DpWPCheck: W2 (pid 22219) died (severity=0, status=65280) [dpxxdisp.c   16083]
    child (pid=22219) exited with exit code 255
    *** ERROR => DpWPCheck: W3 (pid 22220) died (severity=0, status=65280) [dpxxdisp.c   16083]
    child (pid=22220) exited with exit code 255
    my types changed after wp death/restart 0xbe --> 0xbc
    my types changed after wp death/restart 0xbc --> 0xb8
    my types changed after wp death/restart 0xb8 --> 0xb0
    my types changed after wp death/restart 0xb0 --> 0xa0
    my types changed after wp death/restart 0xa0 --> 0x80
    *** DP_FATAL_ERROR => DpWPCheck: no more work processes
    *** DISPATCHER EMERGENCY SHUTDOWN ***
    increase tracelevel of WPs
    NiWait: sleep (10000ms) ...
    NiISelect: timeout 10000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:04 2015
    NiISelect: TIMEOUT occured (10000ms)
    dump system status
    Workprocess Table (long) Tue Mar 31 07:03:04 2015
    ========================
    No Ty. Pid      Status  Cause Start Err Sem CPU    Time  Program          Cl  User         Action                    Table
    0 DIA    22217 Ended         no      1   0        0                                                                         
    1 DIA    22218 Ended         no      1   0        0                                                                         
    2 DIA    22219 Ended         no      1   0        0                                                                         
    3 DIA    22220 Ended         no      1   0        0                                                                         
    4 UPD    22221 Ended         no      1   0        0                                                                         
    5 ENQ    22222 Ended         no      1   0        0                                                                         
    6 BTC    22223 Ended         no      1   0        0                                                                         
    7 BTC    22224 Ended         no      1   0        0                                                                         
    8 SPO    22225 Ended         no      1   0        0                                                                         
    9 UP2    22226 Ended         no      1   0        0                                                                         
    Dispatcher Queue Statistics Tue Mar 31 07:03:04 2015
    ===========================
    +------+--------+--------+--------+--------+--------+
    |  Typ |    now |   high |    max | writes |  reads |
    +------+--------+--------+--------+--------+--------+
    | NOWP |      4 |      4 |   2000 |      4 |      0 |
    +------+--------+--------+--------+--------+--------+
    |  DIA |      1 |      1 |   2000 |      1 |      0 |
    +------+--------+--------+--------+--------+--------+
    |  UPD |      0 |      0 |   2000 |      0 |      0 |
    +------+--------+--------+--------+--------+--------+
    |  ENQ |      0 |      0 |   2000 |      0 |      0 |
    +------+--------+--------+--------+--------+--------+
    |  BTC |      0 |      0 |   2000 |      0 |      0 |
    +------+--------+--------+--------+--------+--------+
    |  SPO |      0 |      0 |   2000 |      0 |      0 |
    +------+--------+--------+--------+--------+--------+
    |  UP2 |      0 |      0 |   2000 |      0 |      0 |
    +------+--------+--------+--------+--------+--------+
    max_rq_id 6
    wake_evt_udp_now 1
    wake events       total     5,  udp     1 ( 20%),  shm     4 ( 80%)
    since last update total     5,  udp     1 ( 20%),  shm     4 ( 80%)
    Dump of tm_adm structure: Tue Mar 31 07:03:04 2015
    =========================
    Term    uid  man user    term   lastop  mod wp  ta   a/i (modes)
    Workprocess Comm. Area Blocks Tue Mar 31 07:03:04 2015
    =============================
    Slots: 300, Used: 0, Max: 0
    +------+--------------+----------+-------------+
    |   id | owner        |   pid    | eyecatcher  |
    +------+--------------+----------+-------------+
    NiWait: sleep (5000ms) ...
    NiISelect: timeout 5000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:10 2015
    NiISelect: TIMEOUT occured (5000ms)
    DpHalt: shutdown server >willsys41_W41_00                        < (normal)
    DpJ2eeDisableRestart
    DpModState: buffer in state MBUF_OFF
    NiBufSend starting
    NiIWrite: hdl 2 sent data (wrt=110,pac=1,MESG_IO)
    MsINiWrite: sent 110 bytes
    MsIModState: change state to SHUTDOWN
    DpModState: change server state from STARTING to SHUTDOWN
    Switch off Shared memory profiling
    ShmProtect( 57, 3 )
    ShmProtect( key 57 valid )
    ShmProtect( slot Index 56 )
    ShmProtect( Mode: 0 )
    ShmProtect( before shmdt )
    ShmProtect( after shmdt )
    ShmProtect( before shmat 0x151f000)
    ShmProtect( after shmat )
    ShmProtect: shmat key 57 prot 3/0 done
    ShmProtect(SHM_PROFILE, SHM_PROT_RW
    ShmProtect( 57, 1 )
    ShmProtect( key 57 valid )
    ShmProtect( slot Index 56 )
    ShmProtect( Mode: 0 )
    ShmProtect( before shmdt )
    ShmProtect( after shmdt )
    ShmProtect( before shmat 0x151f000)
    ShmProtect( after shmat )
    ShmProtect: shmat key 57 prot 1/4096 done
    ShmProtect(SHM_PROFILE, SHM_PROT_RD
    DpWakeUpWps: wake up all wp's
    Stop work processes
    Stop gateway
    killing proc (22215) (SOFT_KILL)
    Stop icman
    killing proc (22216) (SOFT_KILL)
    Terminate gui connections
    wait for end of work processes
    wait for end of gateway
    kill(22215,0) -> ESRCH: process died
    wait for end of icman
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:11 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:12 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:13 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:14 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:15 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:16 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:17 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:18 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:19 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:20 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:21 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) successful -> process alive
    waiting for termination of icman ...
    NiWait: sleep (1000ms) ...
    NiISelect: timeout 1000ms
    NiISelect: maximum fd=12
    NiISelect: read-mask is NULL
    NiISelect: write-mask is NULL
    Tue Mar 31 00:03:23 2015
    NiISelect: TIMEOUT occured (1000ms)
    kill(22216,0) -> ESRCH: process died
    DpStartStopMsg: send stop message (myname is >willsys41_W41_00                        <)
    AdGetSelfIdentRecord: >                                                                           <
    AdCvtRecToExt: opcode 60 (AD_SELFIDENT), ser 0, ex 0, errno 0
    AdCvtRecToExt: opcode 4 (AD_STARTSTOP), ser 0, ex 0, errno 0
    DpConvertRequest: net size = 189 bytes
    NiBufSend starting
    NiIWrite: hdl 2 sent data (wrt=562,pac=1,MESG_IO)
    MsINiWrite: sent 562 bytes
    send msg (len 110+452) to name                    -, type 4, key -
    DpStartStopMsg: stop msg sent
    NiBufIAlloc: malloc NIBUF-IN, to 32110 bytes
    MsIBufAlloc: allocated buffer
    NiIRead: hdl 2 received data (rcd=458,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=458
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 458 bytes
    MSG received, len 110+348, flag 4, from willsys41_W41_00    , typ 0, key FFFFFFFF00000000
    DpHalt: received 348 bytes from message server
    NiIRead: hdl 2 received data (rcd=114,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=114
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 114 bytes
    MSG received, len 110+4, flag 3, from MSG_SERVER          , typ 0, key -
    DpHalt: received 4 bytes from message server
    NiIRead: hdl 2 received data (rcd=114,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=114
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 114 bytes
    MSG received, len 110+4, flag 3, from MSG_SERVER          , typ 0, key -
    DpHalt: received 4 bytes from message server
    NiIRead: hdl 2 received data (rcd=114,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=114
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 114 bytes
    MSG received, len 110+4, flag 3, from MSG_SERVER          , typ 0, key -
    DpHalt: received 4 bytes from message server
    NiIRead: hdl 2 received data (rcd=114,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=114
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 114 bytes
    MSG received, len 110+4, flag 3, from MSG_SERVER          , typ 0, key -
    DpHalt: received 4 bytes from message server
    NiIRead: hdl 2 received data (rcd=114,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=114
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 114 bytes
    MSG received, len 110+4, flag 3, from MSG_SERVER          , typ 0, key -
    DpHalt: received 4 bytes from message server
    NiIRead: hdl 2 received data (rcd=114,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=114
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 114 bytes
    MSG received, len 110+4, flag 3, from MSG_SERVER          , typ 0, key -
    DpHalt: received 4 bytes from message server
    NiIRead: hdl 2 received data (rcd=214,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=214
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 214 bytes
    MSG received, len 110+104, flag 3, from MSG_SERVER          , typ 0, key -
    DpHalt: received 104 bytes from message server
    NiIRead: hdl 2 received data (rcd=274,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=274
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 274 bytes
    MSG received, len 110+164, flag 1, from MSG_SERVER          , typ 0, key -
    DpHalt: received 164 bytes from message server
    NiIRead: hdl 2 received data (rcd=274,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=274
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 274 bytes
    MSG received, len 110+164, flag 1, from MSG_SERVER          , typ 0, key -
    DpHalt: received 164 bytes from message server
    NiIRead: hdl 2 received data (rcd=274,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=274
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 274 bytes
    MSG received, len 110+164, flag 1, from MSG_SERVER          , typ 0, key -
    DpHalt: received 164 bytes from message server
    NiIRead: hdl 2 received data (rcd=274,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=274
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 274 bytes
    MSG received, len 110+164, flag 1, from MSG_SERVER          , typ 0, key -
    DpHalt: received 164 bytes from message server
    NiIRead: hdl 2 received data (rcd=274,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=274
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 274 bytes
    MSG received, len 110+164, flag 1, from MSG_SERVER          , typ 0, key -
    DpHalt: received 164 bytes from message server
    NiIRead: hdl 2 received data (rcd=274,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=274
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 274 bytes
    MSG received, len 110+164, flag 1, from MSG_SERVER          , typ 0, key -
    DpHalt: received 164 bytes from message server
    NiIRead: hdl 2 received data (rcd=274,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=274
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 274 bytes
    MSG received, len 110+164, flag 1, from MSG_SERVER          , typ 0, key -
    DpHalt: received 164 bytes from message server
    NiIRead: hdl 2 recv would block (errno=EAGAIN)
    NiIRead: read for hdl 2 timed out (0ms)
    DpHalt: no more messages from the message server
    DpHalt: send keepalive to synchronize with the message server
    NiBufSend starting
    NiIWrite: hdl 2 sent data (wrt=114,pac=1,MESG_IO)
    MsINiWrite: sent 114 bytes
    send msg (len 110+4) to name           MSG_SERVER, type 0, key -
    MsSndName: MS_NOOP ok
    Send 4 bytes to MSG_SERVER
    NiIRead: hdl 2 recv would block (errno=EAGAIN)
    NiIPeek: peek successful for hdl 2 (r)
    NiIRead: hdl 2 received data (rcd=114,pac=1,MESG_IO)
    NiBufIIn: NIBUF len=114
    NiBufIIn: packet complete for hdl 2
    NiBufReceive starting
    MsINiRead: received 114 bytes
    MSG received, len 110+4, flag 3, from MSG_SERVER          , typ 0, key -
    Received 4 bytes from MSG_SERVER                             
    Received opcode MS_NOOP from msg_server, reply MSOP_OK
    MsOpReceive: ok
    MsSendKeepalive : keepalive sent to message server
    NiIRead: hdl 2 recv would block (errno=EAGAIN)
    Tue Mar 31 00:03:24 2015
    NiIPeek: peek for hdl 2 timed out (r; 1000ms)
    NiIRead: read for hdl 2 timed out (1000ms)
    DpHalt: no more messages from the message server
    DpHalt: sync with message server o.k.
    detach from message server
    ***LOG Q0M=> DpMsDetach, ms_detach () [dpxxdisp.c   13304]
    NiBufSend starting
    NiIWrite: hdl 2 sent data (wrt=110,pac=1,MESG_IO)
    MsINiWrite: sent 110 bytes
    MsIDetach: send logout to msg_server
    MsIDetach: call exit function
    DpMsShutdownHook called
    NiBufISelUpdate: new MODE -- (r-) for hdl 2 in set0
    SiSelPSet: set events of sock 11 to: ---
    NiBufISelRemove: remove hdl 2 from set0
    SiSelPRemove: removed last sock 11 (pos=3)
    NiSelIRemove: removed hdl 2
    NiICloseHandle: shutdown and close hdl 2 / sock 11
    NiBufIClose: clear extension for hdl 2
    MsIDetach: detach MS-system
    cleanup EM
    EsCleanup ....
    EsCleanup destroy slot 0
    <EsMap: unlink /SAP_ES_00_000
    EmCleanup() -> 0
    Es2Cleanup: Cleanup ES2
    ShmCreate( 76, 0, 2, 0x0xcef3328 )
    ShmKeyPermission( 76 ) = 0740 (octal)
    ShmDelete( 13 )
    cleanup event management
    cleanup shared memory/semaphores
    ShmCleanup SHM_SYS_ADM_KEY
    ShmCleanup( 1 )
    ShmCreate( 1, 0, 2, 0x0xbf99a5e8 )
    ShmProtect( 1, 3 )
    ShmProtect( key 1 valid )
    ShmProtect( slot Index 0 )
    ShmProtect( Mode: 0 )
    ShmProtect( before shmdt )
    ShmProtect( after shmdt )
    ShmProtect( before shmat 0x5e1000)
    ShmProtect( after shmat )
    ShmProtect: shmat key 1 prot 3/0 done
    ShmCreate( 1, 0, 2, -> 0x0x5e1000 )
    ShmCleanup SHM_DP_ADM_KEY
    ShmCleanup( 2 )
    ShmCreate( 2, 0, 2, 0x0xbf99a5e8 )
    ShmProtect( 2, 3 )
    ShmProtect( key 2 valid )
    ShmProtect( slot Index 1 )
    ShmProtect( Mode: 0 )
    ShmProtect( before shmdt )
    ShmProtect( after shmdt )
    ShmProtect( before shmat 0x4ed2000)
    ShmProtect( after shmat )
    ShmProtect: shmat key 2 prot 3/0 done
    ShmCreate( 2, 0, 2, -> 0x0x4ed2000 )
    ShmCleanup SHM_DP_CA_KEY
    ShmCleanup( 3 )
    ShmCreate( 3, 0, 2, 0x0xbf99a5e8 )
    ShmProtect( 3, 3 )
    ShmProtect( key 3 valid )
    ShmProtect( slot Index 2 )
    ShmProtect( Mode: 0 )
    ShmProtect( before shmdt )
    ShmProtect( after shmdt )
    ShmProtect( before shmat 0x1655000)
    ShmProtect( after shmat )
    ShmProtect: shmat key 3 prot 3/0 done
    ShmCreate( 3, 0, 2, -> 0x0x1655000 )
    ShmCleanup SHM_PF_KEY
    ShmCleanup( 4 )
    ShmCreate( 4, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 4 ) = 0740 (octal)
    ShmCleanup SHM_PRES_BUF
    ShmCleanup( 14 )
    ShmCreate( 14, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 14 ) = 0740 (octal)
    ShmCleanup SHM_CALI_BUFFER
    ShmCleanup( 11 )
    ShmCreate( 11, 0, 2, 0x0xbf99a5e8 )
    ShmGet( 10, 11, 0, 2, 0x0xbf99a52c )
    ShmCleanup SHM_DB_TBUFF
    ShmCleanup( 19 )
    ShmCreate( 19, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 19 ) = 0740 (octal)
    ShmCleanup SHM_DB_TBUFF_P
    ShmCleanup( 33 )
    ShmCreate( 33, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 33 ) = 0740 (octal)
    ShmCleanup SHM_DB_STBUFF
    ShmCleanup( 41 )
    ShmCreate( 41, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 41 ) = 0740 (octal)
    ShmCleanup SHM_DB_TTBUFF
    ShmCleanup( 42 )
    ShmCreate( 42, 0, 2, 0x0xbf99a5e8 )
    ShmGet( 40, 42, 0, 2, 0x0xbf99a52c )
    ShmCreate( 40, 0, 2, 0x0xbf99a1ec )
    ShmKeyPermission( 40 ) = 0740 (octal)
    ShmCleanup SHM_DB_FTBUFF
    ShmCleanup( 43 )
    ShmCreate( 43, 0, 2, 0x0xbf99a5e8 )
    ShmGet( 40, 43, 0, 2, 0x0xbf99a52c )
    ShmCreate( 40, 0, 2, 0x0xbf99a1ec )
    ShmKeyPermission( 40 ) = 0740 (octal)
    ShmCleanup SHM_DB_SNTBUFF
    ShmCleanup( 45 )
    ShmCreate( 45, 0, 2, 0x0xbf99a5e8 )
    ShmGet( 40, 45, 0, 2, 0x0xbf99a52c )
    ShmCreate( 40, 0, 2, 0x0xbf99a1ec )
    ShmKeyPermission( 40 ) = 0740 (octal)
    ShmCleanup SHM_DB_IRBUFF
    ShmCleanup( 44 )
    ShmCreate( 44, 0, 2, 0x0xbf99a5e8 )
    ShmGet( 40, 44, 0, 2, 0x0xbf99a52c )
    ShmCreate( 40, 0, 2, 0x0xbf99a1ec )
    ShmKeyPermission( 40 ) = 0740 (octal)
    ShmCleanup SHM_DB_OBJ_BUFFER
    ShmCleanup( 54 )
    ShmCreate( 54, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 54 ) = 0740 (octal)
    ShmCleanup SHM_DB_SYNC
    ShmCleanup( 46 )
    ShmCreate( 46, 0, 2, 0x0xbf99a5e8 )
    ShmGet( 40, 46, 0, 2, 0x0xbf99a52c )
    ShmCreate( 40, 0, 2, 0x0xbf99a1ec )
    ShmKeyPermission( 40 ) = 0740 (octal)
    ShmCleanup SHM_DB_CUA_BUFFER
    ShmCleanup( 47 )
    ShmCreate( 47, 0, 2, 0x0xbf99a5e8 )
    ShmGet( 40, 47, 0, 2, 0x0xbf99a52c )
    ShmCreate( 40, 0, 2, 0x0xbf99a1ec )
    ShmKeyPermission( 40 ) = 0740 (octal)
    ShmCleanup SHM_DB_OTR_BUFFER
    ShmCleanup( 64 )
    ShmCreate( 64, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 64 ) = 0740 (octal)
    ShmCleanup SHM_DB_ESM_BUFFER
    ShmCleanup( 65 )
    ShmCreate( 65, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 65 ) = 0740 (octal)
    ShmCleanup SHM_ROLL_AREA_KEY
    ShmCleanup( 9 )
    ShmCreate( 9, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 9 ) = 0740 (octal)
    ShmCleanup SHM_PAGING_AREA_KEY
    ShmCleanup( 8 )
    ShmCreate( 8, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 8 ) = 0740 (octal)
    ShmCleanup SHM_ROLL_ADM_KEY
    ShmCleanup( 17 )
    ShmCreate( 17, 0, 2, 0x0xbf99a5e8 )
    ShmGet( 10, 17, 0, 2, 0x0xbf99a52c )
    ShmCleanup SHM_PAGING_ADM_KEY
    ShmCleanup( 18 )
    ShmCreate( 18, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 18 ) = 0740 (octal)
    ShmCleanup SHM_PXA_KEY
    ShmCleanup( 6 )
    ShmCreate( 6, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 6 ) = 0740 (octal)
    ShmCleanup SHM_ENQ_TABLE_KEY
    ShmCleanup( 34 )
    ShmCreate( 34, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 34 ) = 0740 (octal)
    ShmCleanup SHM_ENQID_KEY
    ShmCleanup( 58 )
    ShmCreate( 58, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 58 ) = 0740 (octal)
    ShmCleanup SHM_VB_ADM_KEY
    ShmCleanup( 7 )
    ShmCreate( 7, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 7 ) = 0740 (octal)
    ShmCleanup SHM_ES2_ADM
    ShmCleanup( 76 )
    ShmCreate( 76, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 76 ) = 0740 (octal)
    ShmCleanup SHM_EM_ADM
    ShmCleanup( 51 )
    ShmCreate( 51, 0, 2, 0x0xbf99a5e8 )
    ShmProtect( 51, 3 )
    ShmProtect( key 51 valid )
    ShmProtect( slot Index 50 )
    ShmProtect( Mode: 0 )
    ShmProtect( before shmdt )
    ShmProtect( after shmdt )
    ShmProtect( before shmat 0x6e14000)
    ShmProtect( after shmat )
    ShmProtect: shmat key 51 prot 3/0 done
    ShmCreate( 51, 0, 2, -> 0x0x6e14000 )
    ShmCleanup SHM_EM2_ADM
    ShmCleanup( 77 )
    ShmCreate( 77, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 77 ) = 0740 (octal)
    ShmCleanup SHM_EG2_ADM
    ShmCleanup( 78 )
    ShmCreate( 78, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 78 ) = 0740 (octal)
    ShmCleanup SHM_MSBUF
    ShmCleanup( 52 )
    ShmCreate( 52, 0, 2, 0x0xbf99a5e8 )
    ShmProtect( 52, 3 )
    ShmProtect( key 52 valid )
    ShmProtect( slot Index 51 )
    ShmProtect( Mode: 0 )
    ShmProtect( before shmdt )
    ShmProtect( after shmdt )
    ShmProtect( before shmat 0x60b000)
    ShmProtect( after shmat )
    ShmProtect: shmat key 52 prot 3/0 done
    ShmCreate( 52, 0, 2, -> 0x0x60b000 )
    ShmCleanup SHM_THRUN_ADM_KEY(th run adm)
    ShmCleanup( 30 )
    ShmCreate( 30, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 30 ) = 0740 (octal)
    ShmCleanup SHM_JAVA
    ShmCleanup( 70 )
    ShmCreate( 70, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 70 ) = 0740 (octal)
    ShmCleanup SHM_PF_AS_KEY(Appl.Statistics)
    ShmCleanup( 56 )
    ShmCreate( 56, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 56 ) = 0740 (octal)
    ShmCleanup SHM_PROFILE
    ShmCleanup( 57 )
    ShmCreate( 57, 0, 2, 0x0xbf99a5e8 )
    ShmProtect( 57, 3 )
    ShmProtect( key 57 valid )
    ShmProtect( slot Index 56 )
    ShmProtect( Mode: 0 )
    ShmProtect( before shmdt )
    ShmProtect( after shmdt )
    ShmProtect( before shmat 0x151f000)
    ShmProtect( after shmat )
    ShmProtect: shmat key 57 prot 3/0 done
    ShmCreate( 57, 0, 2, -> 0x0x151f000 )
    ShmCleanup SHM_NO_BUFFER
    ShmCleanup( 48 )
    ShmCreate( 48, 0, 2, 0x0xbf99a5e8 )
    ShmGet( 40, 48, 0, 2, 0x0xbf99a52c )
    ShmCreate( 40, 0, 2, 0x0xbf99a1ec )
    ShmKeyPermission( 40 ) = 0740 (octal)
    removing request queue
    ShmCleanup( 31 )
    ShmCreate( 31, 0, 2, 0x0xbf99a5d8 )
    ShmProtect( 31, 3 )
    ShmProtect( key 31 valid )
    ShmProtect( slot Index 30 )
    ShmProtect( Mode: 0 )
    ShmProtect( before shmdt )
    ShmProtect( after shmdt )
    ShmProtect( before shmat 0x573d000)
    ShmProtect( after shmat )
    ShmProtect: shmat key 31 prot 3/0 done
    ShmCreate( 31, 0, 2, -> 0x0x573d000 )
    ShmCleanup SHM_POOL_0
    ShmCleanup( 10 )
    ShmCreate( 10, 0, 2, 0x0xbf99a5e8 )
    ShmProtect( 10, 3 )
    ShmProtect( key 10 valid )
    ShmProtect( slot Index 9 )
    ShmProtect( Mode: 76000000 )
    ShmCreate( 10, 0, 2, -> 0x0xb3723000 )
    ShmCleanup SHM_DB_POOL
    ShmCleanup( 40 )
    ShmCreate( 40, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 40 ) = 0740 (octal)
    ShmCleanup SHM_POOL_50
    ShmCleanup( 50 )
    ShmCreate( 50, 0, 2, 0x0xbf99a5e8 )
    ShmKeyPermission( 50 ) = 0740 (octal)
    MiCleanup:
    ShmCleanup( 62 )
    ShmCreate( 62, 0, 2, 0x0xbf99a5c8 )
    ShmProtect( 62, 3 )
    ShmProtect( key 62 valid )
    ShmProtect( slot Index 61 )
    ShmProtect( Mode: 0 )
    ShmProtect( before shmdt )
    ShmProtect( after shmdt )
    ShmProtect( before shmat 0x8b30e000)
    ShmProtect( after shmat )
    ShmProtect: shmat key 62 prot 3/0 done
    ShmCreate( 62, 0, 2, -> 0x0x8b30e000 )
    MpiCleanup() -> 0
    SemKeyPermission( 1 ) = 0740 (octal)
    SemKeyPermission( 1 ) = 0740 (octal)
    SemKeyPermission( 6 ) = 0740 (octal)
    SemKeyPermission( 6 ) = 0740 (octal)
    SemKeyPermission( 7 ) = 0740 (octal)
    SemKeyPermission( 7 ) = 0740 (octal)
    SemKeyPermission( 8 ) = 0740 (octal)
    SemKeyPermission( 10 ) = 0740 (octal)
    SemKeyPermission( 10 ) = 0740 (octal)
    SemKeyPermission( 11 ) = 0740 (octal)
    SemKeyPermission( 11 ) = 0740 (octal)
    SemKeyPermission( 12 ) = 0740 (octal)
    SemKeyPermission( 12 ) = 0740 (octal)
    SemKeyPermission( 13 ) = 0740 (octal)
    SemKeyPermission( 13 ) = 0740 (octal)
    SemKeyPermission( 14 ) = 0740 (octal)
    SemKeyPermission( 14 ) = 0740 (octal)
    SemKeyPermission( 15 ) = 0740 (octal)
    SemKeyPermission( 16 ) = 0740 (octal)
    SemKeyPermission( 16 ) = 0740 (octal)
    SemKeyPermission( 17 ) = 0740 (octal)
    SemKeyPermission( 17 ) = 0740 (octal)
    SemKeyPermission( 18 ) = 0740 (octal)
    SemKeyPermission( 18 ) = 0740 (octal)
    SemKeyPermission( 19 ) = 0740 (octal)
    SemKeyPermission( 19 ) = 0740 (octal)
    SemKeyPermission( 20 ) = 0740 (octal)
    SemKeyPermission( 20 ) = 0740 (octal)
    SemKeyPermission( 21 ) = 0740 (octal)
    SemKeyPermission( 21 ) = 0740 (octal)
    SemKeyPermission( 22 ) = 0740 (octal)
    SemKeyPermission( 22 ) = 0740 (octal)
    SemKeyPermission( 24 ) = 0740 (octal)
    SemKeyPermission( 24 ) = 0740 (octal)
    SemKeyPermission( 25 ) = 0740 (octal)
    SemKeyPermission( 25 ) = 0740 (octal)
    SemKeyPermission( 26 ) = 0740 (octal)
    SemKeyPermission( 26 ) = 0740 (octal)
    SemKeyPermission( 27 ) = 0740 (octal)
    SemKeyPermission( 27 ) = 0740 (octal)
    SemKeyPermission( 28 ) = 0740 (octal)
    SemKeyPermission( 28 ) = 0740 (octal)
    SemKeyPermission( 29 ) = 0740 (octal)
    SemKeyPermission( 29 ) = 0740 (octal)
    SemKeyPermission( 30 ) = 0740 (octal)
    SemKeyPermission( 30 ) = 0740 (octal)
    SemKeyPermission( 31 ) = 0740 (octal)
    SemKeyPermission( 31 ) = 0740 (octal)
    SemKeyPermission( 35 ) = 0740 (octal)
    SemKeyPermission( 35 ) = 0740 (octal)
    SemKeyPermission( 36 ) = 0740 (octal)
    SemKeyPermission( 37 ) = 0740 (octal)
    SemKeyPermission( 42 ) = 0740 (octal)
    SemKeyPermission( 42 ) = 0740 (octal)
    SemKeyPermission( 43 ) = 0740 (octal)
    SemKeyPermission( 43 ) = 0740 (octal)
    SemKeyPermission( 44 ) = 0740 (octal)
    SemKeyPermission( 44 ) = 0740 (octal)
    SemKeyPermission( 45 ) = 0740 (octal)
    SemKeyPermission( 47 ) = 0740 (octal)
    SemKeyPermission( 47 ) = 0740 (octal)
    SemKeyPermission( 48 ) = 0740 (octal)
    SemKeyPermission( 48 ) = 0740 (octal)
    SemKeyPermission( 49 ) = 0740 (octal)
    SemKeyPermission( 49 ) = 0740 (octal)
    SemKeyPermission( 50 ) = 0740 (octal)
    SemKeyPermission( 51 ) = 0740 (octal)
    SemKeyPermission( 51 ) = 0740 (octal)
    SemKeyPermission( 53 ) = 0740 (octal)
    SemKeyPermission( 53 ) = 0740 (octal)
    SemKeyPermission( 54 ) = 0740 (octal)
    SemKeyPermission( 54 ) = 0740 (octal)
    SemKeyPermission( 55 ) = 0740 (octal)
    SemKeyPermission( 55 ) = 0740 (octal)
    SemKeyPermission( 56 ) = 0740 (octal)
    SemKeyPermission( 56 ) = 0740 (octal)
    SemKeyPermission( 57 ) = 0740 (octal)
    SemKeyPermission( 57 ) = 0740 (octal)
    SemKeyPermission( 58 ) = 0740 (octal)
    SemKeyPermission( 58 ) = 0740 (octal)
    SemKeyPermission( 59 ) = 0740 (octal)
    SemKeyPermission( 62 ) = 0740 (octal)
    SemKeyPermission( 63 ) = 0740 (octal)
    SemKeyPermission( 64 ) = 0740 (octal)
    SemKeyPermission( 65 ) = 0740 (octal)
    SemKeyPermission( 66 ) = 0740 (octal)
    SemKeyPermission( 67 ) = 0740 (octal)
    SemKeyPermission( 69 ) = 0740 (octal)
    SemKeyPermission( 69 ) = 0740 (octal)
    SemKeyPermission( 70 ) = 0740 (octal)
    SemKeyPermission( 72 ) = 0740 (octal)
    removing Semaphore-Management
    closing connect handles (dgm + tcp)
    DpDelSocketInfo: del info for socket 0 (type=2)
    NiICloseHandle: shutdown and close hdl 0 / sock 8
    DpDelSocketInfo: del info for socket 1 (type=1)
    NiICloseHandle: shutdown and close hdl 1 / sock 9 - sock 10
    ***LOG Q05=> DpHalt, DPStop ( 22162) [dpxxdisp.c   11739]
    *** shutdown completed - server stopped ***
    Thanks in advance....
    Regards,
    Sundar

  • Time out function in VISA configure serial port vi

    I have some doubts regarding the time out functionality of "VISA configure serial port vi":
    1) I have set the time out value as 10s while initializing the port using this vi. Does this mean that for any Rx operation happening on the serial port, it will wait for 10s for the data to be received?
    2) Is this waiting functionality also valid on "bytes at port" vi which I am using before reading the port data?
    Because in my application, the control at serial port is actually not waiting for 10s and is coming out before the desired time out (10s). Do I need to set this time out anywhere else apart from initialization at "VISA configure serial port vi"??
    Can anyone please tell the steps to set this timeout for the serial port?
    Thanks in advance!

    1. A read will return when the first of the following is satisfied:
       a. The number of bytes at byte count has been received.
       b. The termination character (if enabled) has been received.
       c. An error is detected.
       d. The timeout time has elapsed.
    I am not sure what happens if handshaking is enabled and the other device pauses communication.
    2. No. Bytes at port returns immediately. This is a status check and it would not make sense for a timeout to apply.
    Without seeing your code and the data the remote device is sending, we can only guess. My first guess would be that you have termination characters enabled (default) and a termination character appears in your data.
    Lynn

  • Can't open local port

    Hello all
    I would be very grateful for some help with this problem,I haven;t been able so solve and i have spend a lot of time on it
    I have written my own client RTSP code,from this i can set the client ports i want to recieve and send RTCP and recieve RTP,and can read in the server ports
    So i have something like 157.190.181.36 60972 60973 client
    157.190.181.36 6972 6973 server
    To handle RTP i have used RTP socket player or RX and may other RTP reciver options,as in the java solutions etc ,so that i can recieve RTP and create a player
    When i run them i get the same eror from all error can't open local port
    Further information
    I am on a LAN,but hav tried my set up disconnected from the LAN through a hub set up
    I have tried opening the ports before callled the RTP players i.e
    on the client side
    DatagramSocket RTPsocket3= new DatagramSocket(60972);
    DatagramSocket RTPsocket4= new DatagramSocket(60973);
    Through sniffers
    I know the RTSP messages are OK
    I recive an ICMP message destination unreachable
    I am connecting to darwin streaming server and i can connect to this and play through apple quicktime player or JM studioTHANKS IN ADVANCE!

    Hey...
    I'm having a similar problem, because i'm developing an application that its serving RTP audio context streams. So the application would transmit a playlist of files over RTP, and it works fine for one file, but when i try to give it a new file, i always get the exception "Can�t open door: ...". This error occurs on the line that is marked with *****.
    I'm creating a processor for each file i want to transmit, for the same port and same IP address, so when the first file ends i close the processor and create a new one with the same properties, but with a diferent file...
    I really nead this to work, so if someone could help me on this it would be really appreciated... Thanks in advance...
    My code for creating the transmitter is like this:
    private String createProcessor(){
         if (locator == null) return My_Dictionary.TRANSMIT_LOCATOR;
              try{
              ds = javax.media.Manager.createDataSource(locator);
              }catch (Exception e){
              return My_Dictionary.TRANSMIT_DATASOURCE;
              try{
              processor = javax.media.Manager.createProcessor(ds);
              }catch (NoProcessorException npe){
              return My_Dictionary.TRANSMIT_PROCESSOR;
              }catch (IOException ioe){
                   return My_Dictionary.TRANSMIT_IO_PROCESSOR;
              boolean result = waitForState(processor,Processor.Configured);
              if (result == false) return My_Dictionary.TRANSMIT_PROCESSOR_CONFIG;
              TrackControl [ ] tracks = processor.getTrackControls();
              if (tracks == null || tracks.length < 1) return My_Dictionary.TRANSMIT_TRACKS;
              ContentDescriptor cd = new ContentDescriptor(ContentDescriptor.RAW_RTP);
              processor.setContentDescriptor(cd);
              Format supported[];
              Format chosen;
              boolean atLeastOneTrack = false;
              for (int i = 0; i < tracks.length; i++){
              if (tracks.isEnabled()){
                        supported = tracks[i].getSupportedFormats();
                        if (supported.length > 0){
                             for (int j = 0; j < supported.length; j++){
                                  if (supported[j] instanceof AudioFormat){
                                       if (supported[j].matches(Transmit.audioformat)){
                                            chosen = supported[j];
                                       tracks[i].setFormat(chosen);
                                       atLeastOneTrack = true;
                                       System.out.println("Track " + i + " is set to transmit as: " + chosen);
                        }else tracks[i].setEnabled(false);
              }else tracks[i].setEnabled(false);
              if (!atLeastOneTrack) return My_Dictionary.TRANSMIT_ANY_TRACKS;
              result = waitForState(processor,Controller.Realized);
              if (result == false) return My_Dictionary.TRANSMIT_PROCESSOR_REALIZE;
              dataOutput = processor.getDataOutput();
              return null;
    private static String createTransmitter(){
              PushBufferDataSource pbds = (PushBufferDataSource)dataOutput;
              PushBufferStream pbss[] = pbds.getStreams();
              rtpMgrs = new RTPManager[pbss.length];
              SessionAddress localAddr, destAddr;
              InetAddress ipAddr;
              SendStream sendStream;
              int port;
              for (int i = 0; i < pbss.length; i++){
              try{
                        rtpMgrs[i] = RTPManager.newInstance();     
                        port = portBase + 2*i;
                        ipAddr = InetAddress.getByName(ipAddress);
                        localAddr = new SessionAddress(InetAddress.getLocalHost(),port);
                        destAddr = new SessionAddress(ipAddr,port);
                        rtpMgrs[i].initialize(localAddr); *****
                        rtpMgrs[i].addTarget(destAddr);
                        System.out.println("Created RTP session: " + ipAddress + "/" + port);
                        sendStream = rtpMgrs[i].createSendStream(dataOutput,i);
                        sendStream.start();
              }catch (Exception e){
                        return e.getMessage();
              return null;

  • Azure can block mysql output port (3306)?

    hello,
    i have two servers one stays in Azure and one in Amazon.
    in some moments of day i get error when try connect in mysql(Amazon), for test, i tryed make a telnet.
    if i try
    "telnet amazon 22"
    i got sucess
    if i try
    "telnet amazon 3306"
    i got failure
    My question is " azure firewall or something can block some port automaticaly for some reason ? "
    how i can "fix" this block?
    Thanks

    Hello mscampos92,
    1. How have you connected your servers from Azure and Amazon?
    Please ensure that you have port 3306 from the portal.
    To configure an endpoint for the MySQL Server service:
    1. In the Azure Management Portal, click Virtual Machines, click the name of your MySQL virtual machine, and then click Endpoints.
    2. In the command bar, click Add.
    3. On the Add an endpoint to a virtual machine page, click the right arrow.
    4. If you are using the default MySQL TCP port of 3306, click MySQL in Name, and then click the check mark.
    5. If you are using a different TCP port, type a unique name in Name. Select TCP in protocol, type the port number in both Public Port and Private Port, and then click the check mark.
    To add a Windows Firewall rule that allows MySQL traffic from the Internet, run this command at an administrator-level Windows PowerShell command prompt on the MySQL server computer.
    New-NetFirewallRule -DisplayName "MySQL56" -Direction Inbound –Protocol TCP –LocalPort 3306 -Action Allow -Profile Public
    You can refer to this link for more information on this:
    http://azure.microsoft.com/en-us/documentation/articles/virtual-machines-mysql-windows-server-2008r2/
    As long as you have the ports open, Azure would not block the sql output.
    However, if this does not work, I request you to let me know how exactly you have connected your servers.
    Also refer:
    http://azure.microsoft.com/en-in/documentation/articles/virtual-machines-provision-sql-server/#FW
    Thanks,
    Syed Irfan Hussain

  • MDS configuration for port channel

    I've tried to set up the new FC port channel upload to a pair of MDS 9124s, but as I don't know enough about the MDS side I can't get the link to come up. Are there any references available anywhere that tell you blow by blow exactly how to configure the MDS side of the port channel? Or perhaps a sample working config?
    Thanks

    Simon,
    A few items:
    1) You are on 1.4.1i Balboa code
    2) FI's are in FC switch mode as MDS 9124's don't support F-port channel (NPV/NPIV)
    3) It's a lot easier the first time if you have matched speed sfp+ all around. Although, with the correct configs, unmatched speeds can be made to work.
    If the FIs are in switch mode and your MDS is running a minimum 3.3 here are some configs that may help:
    MDS side interfaces 4/11 and 4/12 are plugged into the UCS fc ports. First setup and ensure ISLs are working properly between UCS and MDS, then configure the port-channels
    interface fc4/11
      switchport rate-mode dedicated
      switchport mode E
      switchport trunk mode auto
      no shutdown
    interface fc4/12
      switchport rate-mode dedicated
      switchport mode E
      switchport trunk mode auto
      no shutdown
    The UCS GUI Equipment -> Fabric Interconnects -> FI-A -> Set FC Switching Mode. This will cause both FI's to reboot into FC switch mode. This is VERY DISRUPTIVE, both FI's will reboot.
    On the UCS CLI you should see this on the UCS fc ports connected to the MDS
    cae-sj-ca3-A(nxos)# show running-config interface fc 2/1-2
    !Command: show running-config interface fc2/1-2
    !Time: Wed Oct 20 16:49:39 2010
    version 4.2(1)N1(1.4)
    interface fc2/1
      switchport mode E
      no shutdown
    interface fc2/2
      switchport mode E
      no shutdown
    Until you have VSAN trunks enabled, make sure the ports on the UCS and MDS are in the same VSAN. VSAN 1 for example.
    Once you have working ISLs, then proceed to turn them into port-channels and enable VSAN trunking. Start with the MDS
    Create a channel group, it should look like this
    cae-sj-9506-1# show run interface port-channel 3
    !Command: show running-config interface port-channel 3
    !Time: Wed Oct 20 17:06:01 2010
    version 5.0(1a)
    interface port-channel 3
      channel mode active
      switchport mode E
      switchport rate-mode dedicated
      switchport trunk mode auto  <-- VSAN trunking
    Enable VSAN trunking on the MDS ISL interfaces, it'll look like this:
    cae-sj-9506-1# show run interface fc 4/11-12
    !Command: show running-config interface fc4/11-12
    !Time: Wed Oct 20 17:07:05 2010
    version 5.0(1a)
    interface fc4/11
      switchport rate-mode dedicated
      switchport mode E
      switchport trunk mode auto
      no shutdown
    interface fc4/12
      switchport rate-mode dedicated
      switchport mode E
      switchport trunk mode auto
      no shutdown
    Add the channel group information to the MDS ISL interfaces:
    Enter configuration commands, one per line.  End with CNTL/Z.
    cae-sj-9506-1(config)# interface fc 4/11-12
    cae-sj-9506-1(config-if)# channel-group 3 force
    fc4/11 fc4/12 added to port-channel 3 and disabled
    please do the same operation on the switch at the other end of the port-channel,
    then do "no shutdown" at both ends to bring it up
    cae-sj-9506-1(config-if)# show run interface fc 4/11-12
    !Command: show running-config interface fc4/11-12
    !Time: Wed Oct 20 17:07:39 2010
    version 5.0(1a)
    interface fc4/11
      switchport rate-mode dedicated
      switchport mode E
      switchport trunk mode auto
      channel-group 3 force
      no shutdown
    interface fc4/12
      switchport rate-mode dedicated
      switchport mode E
      switchport trunk mode auto
      channel-group 3 force
      no shutdown
    Create the SAN port channel on the UCS side
    SAN -> SAN Cloud -> Fabric A -> FC Port Channels -> Create Port Channel
    After you create the SAN port channel in UCS, make sure and enable it. I also bounce the MDS port channel at this point.
    If all is correct, in a few agonizing minutes, the port-channel will be formed and passing data.
    cae-sj-ca3-A(nxos)# show interface san-port-channel 1
    san-port-channel 1 is trunking
        Hardware is Fibre Channel
        Port WWN is 24:01:00:0d:ec:d3:5d:c0
        Admin port mode is E, trunk mode is on
        snmp link state traps are enabled
        Port mode is TE
        Port vsan is 1
        Speed is 8 Gbps
        Trunk vsans (admin allowed and active) (1,10,26,50,66,100-101,103,123,222,24
    0)
        Trunk vsans (up)                       (1,10,50,100,103)
        Trunk vsans (isolated)                 (26,66,101,123,222,240)
        Trunk vsans (initializing)             ()
        5 minute input rate 2312 bits/sec, 289 bytes/sec, 2 frames/sec
        5 minute output rate 1440 bits/sec, 180 bytes/sec, 2 frames/sec
          2669 frames input, 194760 bytes
            0 discards, 0 errors
            0 CRC,  0 unknown class
            0 too long, 0 too short
          2677 frames output, 158316 bytes
            0 discards, 0 errors
          0 input OLS, 1 LRR, 0 NOS, 0 loop inits
    Again, make sure you have the ISLs up an running first before configuring the port-channels. It makes troubleshooting much easier.
    Let me know if you need any help.

  • IChat File Transfer port issue (can't listen to port 5190 and 7777)

    Greentings ladies and gentlemen,
    I need help opening port 5190 and 7777 for ichat server file transfers. As for now, my situation can be described as below:
    (1)I have a ichat server in a mac mini(2010, newest model as for today) running a fully updated version of MACOSX SERVER 10.6 inside a lab in my university.
    (2)As for the ichat server itself, text, voice, video between 2 or more persons are all working great. As for clients the latest version of ichat and pidgin(text only) are being used. The only problem is the lack of file transfer between ichat clients.
    (3)The server is behind a router (YAMAHA RTX 1200). I am 100% sure that the router is correctly configured to allow packets in and out of the port 5190 and 7777, among the other necessary ports. All the other ports are open and working correctly. I also manually disabled the firewall of a windows7 laptop and tested packet transfers on both ports and both worked fine.
    (4)As I said before, the server is inside my university lab. I made sure that all ports between 1023~65535 are open in the univesity gateway/backbone network.
    Bellow are firewall(IPFW) settings before flushing (tried configuring using both GUI and CUI, and both returned the same results)
    sudo ipfw l
    Password:
    00001 allow udp from any 626 to any dst-port 626
    01000 allow ip from any to any via lo0
    01010 allow udp from any to any dst-port 5190
    01030 allow tcp from any to any dst-port 5190
    12300 allow tcp from any to any established
    12301 allow tcp from any to any out
    12302 allow tcp from any to any dst-port 22
    12302 allow udp from any to any dst-port 22
    12303 allow udp from any to any out keep-state
    12304 allow tcp from any to any dst-port 53 out keep-state
    12304 allow udp from any to any dst-port 53 out keep-state
    12305 allow udp from any to any in frag
    12306 allow tcp from any to any dst-port 311
    12307 allow tcp from any to any dst-port 625
    12308 allow icmp from any to any icmptypes 8
    12309 allow icmp from any to any icmptypes 0
    12310 allow igmp from any to any
    12311 allow tcp from any to any dst-port 5190
    12311 allow udp from any to any dst-port 5190
    12312 allow tcp from any to any dst-port 5222
    12313 allow tcp from any to any dst-port 5223
    12314 allow tcp from any to any dst-port 5269
    12315 allow udp from any to any dst-port 5297,5678
    12316 allow tcp from any to any dst-port 5298
    12316 allow udp from any to any dst-port 5298
    12317 allow udp from any to any dst-port 16384-16403
    12318 allow udp from any to any dst-port 5060
    12319 allow tcp from any to any dst-port 7777
    12320 allow tcp from any to any dst-port 8008
    12321 allow tcp from any to any dst-port 8443
    65535 allow ip from any to any
    And after flushing
    sudo ipfw l
    Password:
    65535 allow ip from any to any
    In either case ports that are being listened are listed below.
    netstat -na | grep LIST
    tcp46 0 0 *.5269 . LISTEN
    tcp46 0 0 *.5223 . LISTEN
    tcp46 0 0 *.5222 . LISTEN
    tcp4 0 0 127.0.0.1.5347 . LISTEN
    tcp46 0 0 *.5900 . LISTEN
    tcp4 0 0 *.88 . LISTEN
    tcp6 0 0 *.88 . LISTEN
    tcp4 0 0 *.311 . LISTEN
    tcp4 0 0 192.168.2.96.53 . LISTEN
    tcp4 0 0 *.3659 . LISTEN
    tcp4 0 0 *.106 . LISTEN
    tcp4 0 0 *.3659 . LISTEN
    tcp4 0 0 *.106 . LISTEN
    tcp4 0 0 127.0.0.1.54 . LISTEN
    tcp4 0 0 127.0.0.1.53 . LISTEN
    tcp4 0 0 *.749 . LISTEN
    tcp4 0 0 *.389 . LISTEN
    tcp6 0 0 *.389 . LISTEN
    tcp4 0 0 *.22 . LISTEN
    tcp6 0 0 *.22 . LISTEN
    tcp4 0 0 *.548 . LISTEN
    tcp6 0 0 *.548 . LISTEN
    tcp4 0 0 *.625 . LISTEN
    tcp4 0 0 127.0.0.1.631 . LISTEN
    tcp6 0 0 ::1.631 . LISTEN
    As you can see my firewall settings are not being reflected on the actual server firewall.
    Is there any way I could just force the server into listening the port?
    If necessary I can post screenshots of every ichat server/firewall configuration tab from the Server Admin GUI.
    Thanks in advance for any help/support.

    First off, realize there is no association between your firewall rules and netstat.
    Just because your firewall is letting traffic in that does not mean it will appear in your netstat.
    netstat -a will show you a list of ports that are in use - i.e. there is some process listening to (or writing to) that port. That is independent of whether the firewall permits the traffic (e.g. the firewall could well allow traffic in on 5190, but unless there's a process listening to 5190 you won't see it in the netstat).
    Secondly, IIRC iChat file transfers are client-to-client therefore it might not be your server, or your server's firewall or your server's network that's the issue - the client will need to have a firewall configured to allow incoming traffic from other iChat clients.
    Does that help shed some light on things? (it isn't clear whether your post is referring to the server or the client side of things).

  • After iPad ios 5 upgrade, itunes "interrupted while restoring" restore gets error -50. iPad starts in 'configure' mode - can I configure as 'New iPad' and then restore?

    After iPad ios 5 upgrade on Win7 64bit pc (x386 iTunes), iTunes gave me error "iTunes was interrupted while restoring, restore again now?" I try to restore but iTunes immediately gives error -50. Apple website says -50 is a timeout, but I have tried all fixes: changed usb ports, new cable, reset iPad, restart pc, remove sim... no good.
    iPad starts in 'configure' mode, but won't restore from any of the several iTunes backups I have. Ready to giveup on 'restore'! iPad is sync'ed in iTunes, connects and syncs ok, so I don't want to lose that info.
    Can someone from Apple advise - can I 'configure' as 'New iPad' and then restore or sync to recover my Apps and data etc? OR if I 'Restore' from iTunes 'Summary' tab, will I still be able to Sync to restore the iPad Apps and data?
    I'm seeing a lot of frustrated Apple users online, hoping that a fix for this problem will help a few of us!! An iOS upgrade should not cause this much pain and wasted effort.

    You might already have tried all of these, but just in case:
    1. Make sure you have the latest version of iTunes.
    2. If you're on a Windows PC, consider uninstalling iTunes and Quicktime, restarting the PC, then reinstalling. This sometimes fixes oddities.
    3. Make sure you have no firewall or anti-virus running/active.
    4. Try different USB cable; if you're using a cable via a hub, try connecting without the hub. On desktop PCs, the direct (non-internal-hub) USB sockets are usually at the back.
    5. If yoiu haven't already done so, download the iOS5 update via the direct links I posted above
    6. If using Update doesn't work, use Restore. Option-click (Mac) or Shift-Click (Windows) the Restore button in itunes.
    7. Before you to the Restore, right-lick the entry for your device in iTunes and choose Backup from the drop-down menu. You may need this backup later.
    If you're srtuck in recovery mode:
    - There are some tips here for Windows users
    http://thehowto.wikidot.com/ipad-stuck-recovery-mode
    - If your device is stuck in Recovery mode, you can try putting it into DFU mode, from which iTunes should be able to Restore, as above. Details here:
    http://www.tipb.com/2010/12/02/tip-put-iphone-ipad-dfu-mode/
    - This link points to a utility that can help (Windows and Mac)
    http://runningblind.com/post/2800674985/ipad-stuck-in-recovery-mode-for-no-reaso n
    I hope something here helps

  • ACE: Can the ft-vlan port be used for other vlans or not?

    Hi People,
    I am a bit confused reading cisco's documentation. I am now using the ft-vlan in a dedicated port (no other vlans), but I would like to use it as a normal port in order to use it in a context.
    From cisco website:
    "You cannot use this dedicated FT VLAN Ethernet port for normal network traffic; it must be dedicated for redundancy only.
    When you specify an Ethernet port or a port-channel interface as a dedicated FT VLAN, you have the option to either configure the dedicated VLAN as the only VLAN associated with the Ethernet port or port-channel interface, or to allocate it as part of a VLAN trunk link (see "(config-if) switchport trunk allowed vlan"). Note that the ACE automatically includes the FT VLAN in the VLAN trunk link. If you choose to configure VLAN trunking, it is not necessary for you to assign the FT VLAN in the trunk link along with the other VLANs."
    First it says, you cannot use this port for other traffic, and then it says this port can be a trunk port. If the port is trunk, then obviously you pass other vlans too. Right? or not? So can the port that has the ft-vlan be used in a context with other vlans?
    thanks,
    george

    Then simply do not use the 'ft-port' command.
    This command "auto" configure the interface to be switchtrunk with one vlan  allowed.
    If you reconfigure the interface with your own switchport command, all you risk is some kind of collision or a future software version which will deny this kind of configuration.
    Here is what I use to have vlan 500 part of a normal trunk interface.
    But be aware, that if your interface is overloaded, FT traffic could get dropped and therefore you will end up with 2 active units causing major traffic disuption.
    This is why we recommend to run FT on its own interface with no other traffic.
    Generating configuration....
    interface gigabitEthernet 1/1
      switchport access vlan 1000
      shutdown
    interface gigabitEthernet 1/2
      shutdown
    interface gigabitEthernet 1/3
      switchport trunk native vlan 20
      switchport trunk allowed vlan 10-500
      no shutdown
    interface gigabitEthernet 1/4
      shutdown
    ft interface vlan 500
      ip address 192.168.77.2 255.255.255.0
      peer ip address 192.168.77.1 255.255.255.0
      no shutdown
    Gilles.

Maybe you are looking for

  • How to view form in the Help Corner

    Hello, In Quality Portal, in the home page-> Help Corner -> right click We can see New option and in that we can create folder, link and as well as form. But in Production Portal in the same way we can create folder, link but I cannot view the form.

  • Using Automator to quit Finder

    Hello, I recently became a user of Pathfinder and it quite effectively replaces the functionality (and then some) of Finder. So I've been trying to build an Automator script to automatically quit Finder at login. I have successfully done this, sort o

  • Improvement suggestion for java.lang.Iterable

    The current design limits each container to one collection. Wouldn't it be better to define java.lang.Iterable as interface Iterable<T> { Iterator<T> iterator(Class<T> class) Then a conainer could hold multiple collections, as long as each collection

  • Complete mess of audio setup

    For almost a year now, I've had audio play through SPDIF to a 5.1 surround receiver.  Both surround and stereo worked like a charm through 1 cable.  I haven't bothered watching a movie on this system in nearly 2 months, but when I tried to today, I n

  • What level of disk shock protection is there in Portege R830

    Folks, I work in an area where there are lots of people who carry their Portege Laptops (mostly R830's) around while they're still on - mainly while they're moving from desks to meeting rooms etc, and often carrying them on an angle. I feel a bit sil