Cannot display Access Control Rules page --- BUG REPORT

iWS 4.1sp9 on Linux Admin GUI cannot display Access Control Rules page for Netscape browsers 4.7 and 6.2 or for IE 4.
It does work for IE 5.5 (running this in Vmware).
I'm reporting this bug here as I can't see anywhere else to put it.

It could be a firmware bug, or it could be something else bugging out. If the router hasn't been factory reset and it's been through a few firmware upgrades, try resetting it to factory defaults. Take note of any custom settings you have, so you can go in and manually re-configure the router. I would avoid importing a backed up config file in case the config turns out to be the problem, but it doesn't hurt to download a copy of your config now.
Give that a try. Others might have some more ideas.
========
The first to bring me 1Gbps Fiber for $30/m wins!

Similar Messages

  • Access Control Rules Queries

    Howdy,
    I have a couple of queries about Access Control Rules that I am hoping someone can answer for me.
    We are running GW 8.0.2 with a single GWIA for our external (SMTP) mail. The access control is set up as follows:
    Default Class of Service (allow SMTP in and out, IMAP and POP3) assigned to Everyone.
    Allow Internet Email (allow SMTP in and out, allow IMAP, deny POP3) assigned to a distribution list.
    Deny Internet Email (deny SMTP in (with some source exceptions for internal systems) deny SMTP out, Deny IMAP and POP3) assigned to a distributon list. We add every user to this dist list by default.
    The net effect of these rules is that unless a user is added to the distribution lsit that the Allow Internet Email rule is assigned to they cannot send or receive SMTP mail. This is what we are after. These rules were set up some time ago by another adminstrator who is no longer around.
    My first query is relates to the order of the rules. Are they evaluated in any particular order? If so what determines the precedence?
    My second query is can we dispense with the specific Deny Internet Email rule we have in place by changing the Default Class of Service to DENY SMTP in and out or does this Class of Service need to be Allow for some reason. I note that I cannot delete the Default Clss of Service or change its membership. I can, however, edit it.
    Finally, I would like to set things up so that we can allow only a small group of people to send mail to a particular domain. These people are already members of the distribution list that allows SMTP out. What I am planning to do is:
    Create a distribution list and add the people who need this access to it.
    Modify the Allow Internet Email Class of service so that the SMTP out has an exception added for the domain we want to control.
    Create a new Class of Service that allows SMTP out with out any exceptions and assign the membership of this to the distribution list created above.
    Will this stop everyone who is allowed to send SMTP mail from sending to the nominated domain excpet for those people in the new distribution list?
    Thanks for any help or suggestions.
    Cheers
    Stuart

    Hi.
    On 11.07.2011 01:36, Big Stu wrote:
    > My first query is relates to the order of the rules. Are they
    > evaluated in any particular order? If so what determines the
    > precedence?
    >
    > My second query is can we dispense with the specific Deny Internet
    > Email rule we have in place by changing the Default Class of Service to
    > DENY SMTP in and out or does this Class of Service need to be Allow for
    > some reason. I note that I cannot delete the Default Clss of Service or
    > change its membership. I can, however, edit it.
    To answer both questions, no, you can't deny the default class of
    service, cause you can only *remove* access with other classes, but
    never *expand* from the default.
    > Finally, I would like to set things up so that we can allow only a
    > small group of people to send mail to a particular domain. These people
    > are already members of the distribution list that allows SMTP out. What
    > I am planning to do is:
    >
    > Create a distribution list and add the people who need this access to
    > it.
    > Modify the Allow Internet Email Class of service so that the SMTP out
    > has an exception added for the domain we want to control.
    > Create a new Class of Service that allows SMTP out with out any
    > exceptions and assign the membership of this to the distribution list
    > created above.
    >
    > Will this stop everyone who is allowed to send SMTP mail from sending
    > to the nominated domain excpet for those people in the new distribution
    > list?
    Yes, that should work.
    CU,
    Massimo Rosen
    Novell Knowledge Partner
    No emails please!
    http://www.cfc-it.de

  • Query: Best practice SAN switch (network) access control rules?

    Dear SAN experts,
    Are there generic SAN (MDS) switch access control rules that should always be applied within the SAN environment?
    I have a specific interest in network-based access control rules/CLI-commands with respect to traffic flowing through the switch rather than switch management traffic (controls for traffic flowing to the switch).
    Presumably one would want to provide SAN switch demarcation between initiators and targets using VSAN, Zoning (and LUN Zoning for fine grained access control and defense in depth with storage device LUN masking), IP ACL, Read-Only Zone (or LUN).
    In a LAN environment controlled by a (gateway) firewall, there are (best practice) generic firewall access control rules that should be instantiated regardless of enterprise network IP range, TCP services, topology etc.
    For example, the blocking of malformed TCP flags or the blocking of inbound and outbound IP ranges outlined in RFC 3330 (and RFC 1918).
    These firewall access control rules can be deployed regardless of the IP range or TCP service traffic used within the enterprise. Of course there are firewall access control rules that should also be implemented as best practice that require specific IP addresses and ports that suit the network in which they are deployed. For example, rate limiting as a DoS preventative, may require knowledge of server IP and port number of the hosted service that is being DoS protected.
    So my question is, are there generic best practice SAN switch (network) access control rules that should also be instantiated?
    regards,
    Will.

    Hi William,
    That's a pretty wide net you're casting there, but i'll do my best to give you some insight in the matter.
    Speaking pure fibre channel, your only real way of controlling which nodes can access which other nodes is Zones.
    for zones there are a few best practices:
    * Default Zone: Don't use it. unless you're running Ficon.
    * Single Initiator zones: One host, many storage targets. Don't put 2 initiators in one zone or they'll try logging into each other which at best will give you a performance hit, at worst will bring down your systems.
    * Don't mix zoning types:  You can zone on wwn, on port, and Cisco NX-OS will give you a plethora of other options, like on device alias or LUN Zoning. Don't use different types of these in one zone.
    * Device alias zoning is definately recommended with Enhanced Zoning and Enhanced DA enabled, since it will make replacing hba's a heck of a lot less painful in your fabric.
    * LUN zoning is being deprecated, so avoid. You can achieve the same effect on any modern array by doing lun masking.
    * Read-Only exists, but again any modern array should be able to make a lun read-only.
    * QoS on Zoning: Isn't really an ACL method, more of a congestion control.
    VSANs are a way to separate your physical fabric into several logical fabrics.  There's one huge distinction here with VLANs, that is that as a rule of thumb, you should put things that you want to talk to each other in the same VSANs. There's no such concept as a broadcast domain the way it exists in Ethernet in FC, so VSANs don't serve as isolation for that. Routing on Fibre Channel (IVR or Inter-VSAN Routing) is possible, but quickly becomes a pain if you use it a lot/structurally. Keep IVR for exceptions, use VSANs for logical units of hosts and storage that belong to each other.  A good example would be to put each of 2 remote datacenters in their own VSAN, create a third VSAN for the ports on the array that provide replication between DC and use IVR to make management hosts have inband access to all arrays.
    When using IVR, maintain a manual and minimal topology. IVR tends to become very complex very fast and auto topology isn't helping this.
    Traditional IP acls (permit this proto to that dest on such a port and deny other combinations) are very rare on management interfaces, since they're usually connected to already separated segments. Same goes for Fibre Channel over IP links (that connect to ethernet interfaces in your storage switch).
    They are quite logical to use  and work just the same on an MDS as on a traditional Ethernetswitch when you want to use IP over FC (not to be confused with FC over IP). But then you'll logically use your switch as an L2/L3 device.
    I'm personally not an IP guy, but here's a quite good guide to setting up IP services in a FC fabric:
    http://www.cisco.com/en/US/partner/docs/switches/datacenter/mds9000/sw/4_1/configuration/guides/cli_4_1/ipsvc.html
    To protect your san from devices that are 'slow-draining' and can cause congestion, I highly recommend enabling slow-drain policy monitors, as described in this document:
    http://www.cisco.com/en/US/partner/docs/switches/datacenter/mds9000/sw/5_0/configuration/guides/int/nxos/intf.html#wp1743661
    That's a very brief summary of the most important access-control-related Best Practices that come to mind.  If any of this isn't clear to you or you require more detail, let me know. HTH!

  • 10G: design view cannot display a UIX update page

    I get the following error message when I try to display a page in both Design View and Preview View:
    Required page property "key" missing. Cannot display page.
    This is the same error message I get if I run the system and try to access the page directly and bypass the view page where the user selects a row of data for update.
    Does this mean that any update page such as this one cannot use the visual editor?
    Steve

    Thanks.
    It looks like the design editor runs the code. I noticed that it even fills in the fields with data from the database.
    Since it does that, it would need a key on the update pages to know what record to display.
    Steve

  • Access Control Rule Set deletion in GRC 10

    Greetings,
    Has anyone tried deleting rulesets or have experienced any issues while deleting rule sets in GRC 10. I have tried to delete them from SPRO as well as from Setup Tab in Access Control , however its not working for me . Even in SPRO , after chooseing the physical system and logical system infromation , it stays on that screen for ever and nothing happens.
    Any help or guidance here will be much appreciated.
    Thanks everyone for your valueable time.
    Vikas

    Hey ,
    There are no tricks or tips.  It was something stupid on my part.
    I Just had a look at the system again and found a function left in the system which was mapped to this Ruleset , so that was the only i was not able to delete the ruleset . As soon as i deleted that function , it worked .
    So i was able to delete the entire rule set after deleting all the risks and functions mapped to this rule set.
    Have a great day ahead ...
    Vikas

  • Displaying Footer on last page of report

    Hi:
    Is there a way to display the footer only on the last page of a report? For example, if I have a three-page report, I need the footer to be displayed on the third page only. Any help would be greatly appreciated. Thank you kindly.
    Sincerely,
    Dinesh.

    Hi,
    Use the Syntax <?start@last-page:body?><?end body?> before the footer , if your template is facing any exception include a Section break in continuous (one of the Section break types) before the above mentioned syntax.
    Best Regards,
    Mahesh

  • Browser cannot display E3200 router web page from ethernet connection but can from wireless

    I have installed my E3200 downstream from the Verizon FiOS Actiontec (going the other way disables FiOS functions).
    1.  My browser can get to the E3200 (192.168.1.2) when connected via wireless, but not when connected via ethernet cable.
         How do I fix that?
    2. When going to connect wirelessly, the 2GHz connection is visible but the 5 GHz connection is not
         (I have them named differently).
         How do I see both wireless connections?

    My browser cannot get to my E3200 setup web page from a wired Ethernet connection (wireless works fine).
    The Linksys E3200 (1Gb ethernet, “n” wireless) is installed downstream from a Verizon FiOS Actiontec router (10/100 ethernet, “g” wireless).
    I cannot put the E3200 upstream from the Verizon router because I would lose FiOS TV capabilities.
    The E3200’s fixed IP address is 192.168.1.2 (the Verizon router is 192.168.1.1)
    I cannot change the subnet (e.g. to 192.168.2.x)
    Clearing the browser cache and rebooting both routers doesn’t help.
    Both computers tested have dual band “n” network adapters.
    So... wireless connection works fine, but I cannot get to the setup page via wired ethernet.
    Help?

  • Find Control in Event Structure doesn't show the object when it is not in the frontmost Tab page [Bug Report, LabVIEW 2012]

    When you are looking for the control/indicator handled by a case in the Event structure, you can use the contextual menu item "Find Control" (doesn't distinguish between control and indicator, BTW).
    The result is that the control/indicator is highlighted on the FP. The problem is, if that control is in a Tab and specifically in a page of that Tab that happens to not be the frontmost, the only thing you'll see is marching ants, but no control:
    <=========== the wrong TAB page was shown. LV did not bother to switch to the relevant one....
    In other words, "Find Control" in the Event Structure doesn't switch the tab to the owning page. This is contrary to what happens if you right-click, say, the terminal of this control: the FP will switch to the owning Tab page.
    I'd call this a bug and this is definitely an annoyance (which most likely has been around since the creation of the Event Structure).

    I did not. Is there any better chance for it to be caught there by a NI eye than it is in the LV forum? I though these threads were deemed to gather bugs/features that had been already acknowledged by NI with a CAR number.
    I (and others!) wished there was something like this: http://bugs.sun.com/ or http://bugs.python.org/ for LabVIEW...
    I am just coming back from a short conference of scientists who quite uninamously ended up with the conclusion that LabVIEW was to be disregarded as a lab development environment because of maintenance problems (which could have been argued for any language in my opinion, although I think they meant spaghetti diagrams are the natural tendency of students who could not care less as they are not going graduate because of their LV skills or lack thereof), but I guess I could have added my grain of salt and added the complete opacity on bug and feature handling by NI.

  • Credentials: I cannot disallow access to course pages

    I'm having some trouble getting credentials working to disallow access to particular course pages. I've been able to use the Administrator credential with no trouble. However, I've created some course pages that I would like to be able to restrict to certain users, but even though the permissions look correct, I can still view and download content from unprivileged accounts, even anonymous ones.
    On the particular course site in question, the access settings look like this:
    System Credentials
    Administrator@... : Edit
    Authenticated@... : No Access
    Unauthenticated@... : No Access*
    All@... : No Access
    Credentials
    Instructor@...:${IDENTIFIER} : No Access
    Student@...:${IDENTIFIER} : No Access
    Students@... : No Access*
    So, it appears that no one should have access but the administrator. But when I log in as an account with no supplied credentials (ie, it gets the All@... and Authenticated@... system credentials; I have verified this via the debug page), I can still access and download content from this site.
    Is there something I'm missing, or some more information I can provide? I appreciate any assistance.
    David Adams
    Systems Integrator
    Educational Technologies
    Virginia Tech

    I'm seeing this problem well, as well as an inverse variation in which no one can get access to a course, even if I want them to using the ${IDENTIFIER} scheme.
    That said, if I jump through enough hopes I can get this working with a set of specific credentials, but alas, not with ${IDENTIFIER}. Bear with me -- there are a lot of notes here describing the different scenarios I followed. If you want to know what worked, skip to the end.
    + Templates +
    I have two course templates setup for iTunes U, with the following rights:
    -- Course (Public)
    This course is designed to display all course materials to all users.
    System Credentials
    Edit - Administrator@urn:mace:itunesu.com:sites:lafayette.edu
    Download - Authenticated@urn:mace:itunesu.com:sites:lafayette.edu
    Download - Unauthenticated@urn:mace:itunesu.com:sites:lafayette.edu
    Download - All@urn:mace:itunesu.com:sites:lafayette.edu
    Credentials
    Download* - College@urn:mace:lafayette.edu
    Edit* - Instructor@urn:mace:itunesu.com:sites:lafayette.edu:classes:${IDENTIFIER}
    Download* - Student@urn:mace:itunesu.com:sites:lafayette.edu:classes:${IDENTIFIER}
    * = Access permission inherited from a parent
    -- Course (Private)
    This template is designed to be used with courses whose content is restricted to instructors and students.
    System Credentials
    Edit - Administrator@urn:mace:itunesu.com:sites:lafayette.edu
    No access - Authenticated@urn:mace:itunesu.com:sites:lafayette.edu
    No access - Unauthenticated@urn:mace:itunesu.com:sites:lafayette.edu
    No access - All@urn:mace:itunesu.com:sites:lafayette.edu
    Credentials
    No access - College@urn:mace:lafayette.edu
    Edit* - Instructor@urn:mace:itunesu.com:sites:lafayette.edu:classes:${IDENTIFIER}
    Download* - Student@urn:mace:itunesu.com:sites:lafayette.edu:classes:${IDENTIFIER}
    +How it works (or doesn't work)+
    My goal is to create courses that can only be edited by an instructor and downloaded by students with the correct credentials using the credentials shortcut system (in which you do not need to specify credentials for each course).
    Scenario 1: Create a course based on the Course (Private) template.
    If I can create a course based on the Course (Private) template, everyone can see it, regardless of credentials.
    If I reassign each credential in the created course to be the same as the private template (by reselecting it from the drop down), then the course still appears for everyone, regardless of credentials.
    Scenario 2: Create a course based on the Course (Public) template and change it to Private).
    If I create a course based on the Course (Public) template and change all of the settings to reflect what I want for private courses (Admin: Edit, Instructor: Edit, Student: Download) then the course is hidden from everyone.
    However, while the course is now cloaked, no one other than admin can access it, even if I pass valid credentials using the ${IDENTIFIER} scheme.
    For example, I have a course with an identifier of "course-public-private". It has the following "identifier" credential:
    -- Student@urn:mace:itunesu.com:sites:lafayette.edu:classes:${IDENTIFIER}
    I pass it the following credential as part of the iTunes U login:
    Student@urn:mace:lafayette.edu:sites:lafayette.edu:classes:course-public-private
    The debugger tells me that this is a valid credential:
    The credential string is valid and contains the following recognized credential:
    1. Student@urn:mace:lafayette.edu:sites:lafayette.edu:classes:course-public-privat e
    But the student *can not* see the course.
    Scenario 3: Using specific credentials
    If I follow the same process as Scenario 2, but give iTunes U specific credentials, such as:
    Edit - Instructor@urn:mace:lafayette.edu:course-public-private
    Download - Student@urn:mace:lafayette.edu:course-public-private
    ... then everything works as you'd expect:
    1) The course is hidden to everyone without the appropriate credentials.
    2) Admin can see and edit the course.
    3) The instructor can see and edit the course.
    4) The students can see and download material from the course.
    I can not, however, get this to work with the ${IDENTIFIER} scheme. At one point in the past I did have ${IDENTIFIER} working, but alas, that course was destroyed as part of our reorganization of iTunes U in preparation for launch.
    Does anyone have authentication with ${IDENTIFIER} working? And if you follow the steps I outline in Scenario #3, can you get a restricted access course working?
    Ken Newquist
    Lafayette College

  • FF cannot display all the web pages (it laggs a lot on FB, youtube, gmail). I tried to reset many times (new pc bought with W8, I synchonizeded FF). Help please

    Hello everybody,
    FF works properly till it crashs, then I have to reset everything and it crashs again. My webpages cannot be displayed properly (fb, youtube, gmail) while it works on chrome and IE.
    Please, help me !
    Thank you.

    You can check for problems with current Flash plugin versions and try these:
    *disable a possible RealPlayer Browser Record Plugin extension for Firefox and update the RealPlayer if installed
    *disable protected mode in the Flash plugin (Flash 11.3+ on Windows Vista and later)
    *disable hardware acceleration in the Flash plugin
    *http://kb.mozillazine.org/Flash#Troubleshooting

  • Best Practice - Removing Old Access-Control Lists from Bug Mitigations

    I was just auditing my Internet router configuration against the NSA Router Security Configuration Guide and came across the old entries below.
    access-list 100 deny   53 any any
    access-list 100 deny   55 any any
    access-list 100 deny   77 any any
    access-list 100 deny   pim any any
    I remember applying them in the dim dark past and tracked it down to this advisory "Cisco IOS Interface Blocked by IPv4 Packets".
    Clearly they've just been propagated when then router and IOS get upgraded.
    My question is should we remove all the old workarounds, and how often do people audit their configs?
    Anything after 12.3 is not vulnerable, so it could safely be removed, but then it doesn't really hurt to leave them since we aren't expecting any of those protocols to be coming from the internet.  There is always the possibility that someone will just copy it to a router with an older vulnerable IOS.
    Obviously there will be a small amount of additional processing overhead on the acl too.
    All comments are welcome.

    I would not worry about processing. As long as you have an ACL applied, 2-3 lines more do not practically cause any extra overhead.
    You can keep the deny lines there and they will not hurt.
    As for how often people audit configs it depends on the policies. I have seen 6 months as the most common time frame.
    I hope it helps.
    PK

  • Access control - Restricted access not working

    Hi
    I have an application I have created an Access Control administration page in. I have set the application mode to 'Restricted access. Only users defined in the access control list are allowed'. I have defined two users one with administrator and one with edit privileges. I have a third workspace user who is not listed on the access control page.
    I have added the authorisation scheme to the tabs, pages and page items I require. This appears to work fine if I change the privilege of one of the listed users to 'view' the items disappear and cannot be accessed.
    The issue I have is that the workspace user who is not listed can still log into the application, and has the same access as 'view' privilege. My understanding is that the 'Restricted Access' application mode should prevent this user from accessing this application as they are not explicitly listed?
    Have I missed some set-up, misunderstood the meaning of 'restricted access' or is it some sort of bug? I am assuming I have missed some set-up somewhere.
    PS This is APEX 4.0.2 on 11g
    Edited by: tlane on 15/02/2011 19:43

    I have set the application up on apex.Oracle.com
    http://apex.oracle.com/pls/apex/f?p=48123:101:506666493527664
    four users have been defined :
    control_admin
    control_edit
    control_view
    control_na
    The first 3 are defined on the access control page available on the user_admin tab when you login as control_admin user.
    user control_na is not listed but can still access the application.
    password for all users is : demo1234
    Thanks in advance for all help with this issue.

  • QuickTime movies cannot display properly, refresh doesn't work propely for html files on hard disk, opening a new tab doesn't work

    Hi!
    I have tried Firefox V4 (but have since reused V3.6.16). The following problems were found:
    a. Cannot display the controls used for QuickTime movies.
    b. The refresh button doesn't function at all if the html files reside on the hard disk. I do this because I need to test the appearance of the web page before uploading to the server.
    This problem also exists for v3.6.14 to v3.6.16
    c. When opening a new tab, it doesn't work. Instead, it will open another instance of the browser. By right, it has to open the web page on the same instance of the browser.
    This is my feedback.
    Thanks!!!!! :)

    I had some advice to try recording QT audio and adding to the slide.  Now, when recording to Quicktime, it does embed it, but in recording the presentation, it either doubles up the audio giving a strange echo or does the same thing if you ever edit the presentation.
    The problem Keynote has is that the sound and image content are not locked together which causes out of sync errors. This is why many users choose video editing applications when using sound in the presentations, as they have both image and audio tracks to sync sound properly together.
    Start a new presentation to remove the previous sound recording, Keynote is holding onto the other sound files.
    Add the graphic items to each slide and one sound file to each slide for the voice over
    1 - In Inspector > Transitions;  use start transitions automatically and set each transitions delay to the duration of the individual sound file.
    2 - In QT export, set Fixed Timing and delete the value in the duration box, QT will then use the custom timings for each individual slide.
    This procedure does work exactly as needed, Iv used this for nearly 6 years using 4 different versions of Keynote.

  • Access control for different user groups in APEX 4.0

    Hi guys,
    in Apex 4.0, is there any way to use the access control page to configure access control for different user groups?
    The access control page currently only has an access control list by users with 3 privileges namely, Administrator, Edit & View where Administrator has the highest access level & View the lowest. Therefore 1 user cannot have more than 1 different privilege, however if the user belongs to 2 or more different groups then we can control what access he can have in a more fine grained manner. We also want to have more than the 3 privileges given.
    Can we assign different groups to different users and let them have different privileges to be configured by page, region, process or item level?
    Now Apex will create 2 tables, Apex_Access_Control & Apex_Access_Setup to store the application access control mode & access control list. It will also create 3 authorization schemes "access control - administrator", "access control - edit" & "access control - view" based on the 2 tables.
    Does this mean we have to change the table structures & edit the authorization schemes to suit our usage? We are reluctant to do this because if we upgrade to a newer version of Apex then we would have to merge our pl/sql coding with Apex's updated code.
    How can we auto-configure more than the 3 authorization schemes in the access control page? Is there any way to achieve a finer grain of access control based on the current access control administration page given by Apex without writing it ourselves?
    We are afraid that we may have missed something on Apex access control & do not want to reinvent the wheel.

    Hi Errol,
    to build your own application authorization scheme around the security model supplied by Apex for administration of the Apex environment would be a bad idea.
    This was never intended for authorization scheme management in custom built Apex applications, it was solely intended to control access in the Apex environment overall. The API for it is not published, and making changes to it, such as adding more roles, would run the risk of breaking the overall Apex security model. It would not be supported by Oracle and Oracle would not guarantee the upwards compatibility of any changes you make in future versions of Apex.
    In short, you should follow Tyson's advice and build your own structure. As he indicated, there are plenty of examples around and provided your requirements are not too complicated, it will be relatively simple.
    Regards
    Andre

  • Error: Cannot Display Page when Page1 invoke Page2

    In page1 when click Add button will invoke page2.
    Page1 Coding as below :
    pageContext.setForwardURL(Constants.DETAIL_UPDATE_PG,
    null,
    OAWebBeanConstants.KEEP_MENU_CONTEXT,
    null,
    null,
    true, // Retain AM
    OAWebBeanConstants.ADD_BREAD_CRUMB_YES,
    OAWebBeanConstants.IGNORE_MESSAGES);
    Parameter pass (in property parameter):
    txnId     ${oa.current.FaoBudgetTransactionId}
    detailId ${oa.current.BudgetDetailId}
    periodId ${oa.current.BudgetPeriodId}
    Page2 ( in processRequest ) Coding as below
    public void processRequest(OAPageContext pageContext, OAWebBean webBean)
    super.processRequest(pageContext, webBean);
    OAApplicationModule am = pageContext.getApplicationModule(webBean);
    if (!TransactionUnitHelper.isTransactionUnitInProgress(pageContext,
    Constants.UPDATE_TXN, true)) {
    // if back button is pressed
    am.invokeMethod("rollback");
    TransactionUnitHelper.endTransactionUnit(pageContext, Constants
    .UPDATE_TXN);
    OADialogPage dialogPage = new OADialogPage(NAVIGATION_ERROR);
    pageContext.redirectToDialogPage(dialogPage);
    } else {
    // teth: added if
    String createNew = pageContext.getParameter("createNew");
    if (createNew != null && createNew.equalsIgnoreCase("Y")) {
    OAViewObject masterVo = (OAViewObject) am.findViewObject(
    "FaoBudPeriodsTempVO1");
    if (masterVo == null) {
    throw new OAException("Object FaoBudPeriodsTempVO1 not found.");
    } else {
    String txnId = pageContext.getParameter("txnId");
    String detailId = pageContext.getParameter("detailId");
    String periodId = pageContext.getParameter("periodId");
    When page1 invoke it error as below.
    Error: Cannot Display Page
    You cannot complete this task because you accessed this page using the browser's navigation buttons (the browser Back button, for example).
    To proceed, please select the Home link at the top of the application page to return to the main menu. Then, access this page again using the application's navigation controls (menu, links, and so on) instead of using the browser's navigation controls like Back and Forward.
    Can somebody help me to solve this problem.
    Thank you very much.

    What is the value of Constants.DETAIL_UPDATE_PG ?
    --Shiv                                                                                                                                                                                                       

Maybe you are looking for