Differentiating between RO and RW snmp communities in Prime
- Will Prime, ever support, different read/write SNMP community-values for devices in the future ?
(Uptill now only one community can be entered for a device, making it difficult if you manage devices using different SNMP RW community names)
Of course, it would then be expected that Prime will use the RW community for config updating, amongst other tasks (too).
M.
Apology for my misunderstanding, but the problem isn't clear to me enough. Do you mean :
1. Using multiple community strings for a same device?
2. Using different strings in Prime for Read Only and another for Read Write?
For (1) there is certainly no plans as of now. As most of the customer prefer to have one RO and RW strings with all security measures (with ACL's and accounting for particular String etc) use it. But with your business requirement justification, you may raise a Product Enhancement Request (PER).
For (2) it is still an option. We still have a choice of entering a individual RO and RW string for a specific device.
Please check and let us know for more details.
-Thanks
Vinod
**Encourage Contributors. RATE Them.**
Similar Messages
-
Differentiating Between Dependent and Independent Data
HI,
How can I make a differentiation between dependent and independent data?HI,
If you double click a Transfer requirement in SE10 or SE09 and then press F4 in the field category, you will find some helpful information.
Client dependent or independent transfer requirements include client specific or cross client objects in the change requests. Workbench objects like SAPscripts are client specific, some entries in customizing are client independent.
If you display the object list for one change request, and then for each object the object attributes, you will find the flag client specific.
If one object in the task list has this flag on, then that transport will be client dependent.
You can also find a list of the high class objects in SAP, here you will see the flag on/off. Use TCODE SOBJ.
Start STMS and double click on the request itself, you will see which type of request it is (Workbench -> client independent or Customizing -> client dependent).
I recommend you to import every request on each client without looking inside the request.
Reward Points if found helpfull..
Cheers,
Chandra Sekhar. -
Differentiating between open and closed invoices
Hi all
I am using a database view of tables VBRK and VRKPA for fetching invoice list based on the customer number. Can I use 'VBRK-RFBSK = C' to differentiate between closed and open invoices? If not is there any other field i can use from this particular view for the same.
ThanksHi Asim,
Yes, you are absolutely right. This field give you the exact result like which billing dcoument is open and which is closed.
Regards,
MT -
Differentiation between B2B and A2A
Hi,
Can anybody give me a real time example between B2B and A2A in general and XI Perspective?
Points Assured
Regards,
B.AnandhAnandha Krishnan
Here is some more info to top up
Think, Company A is dealing only with Legacy Systems or Java Based applications, but Company B cannot directly understand COmpany A's format. So the Integration Broker like XI will come into picture. While integrating Company A should know how feasible it can communicate with Company B.. More in technical, is thru WebServices Industry Standard Adapters(Seeburger EDI)/(SOAP)/Java Applications(JavaProxy)/.net Applications etc..
<i>Thanks 2 Krishnamoorthy P</i>
Also Check the following help doc
http://help.sap.com/saphelp_nw04s/helpdata/en/15/5f934249c30c31e10000000a1550b0/frameset.htm
regards
krishna -
Difference between procedure and function
hi
please give solution to below discussion:
Interviewer: What is the difference between Procedure and Function ?
Myself: Procedure may or may not return a value and can return multiple values and Function must return a value.
Interviewer : Can function return multiple values ?
myself: Yes, It can return multiple values.
Interviewer: Then, there is no need to use procedures any more, according to your previous answer (function can return multiple values) "we can do all the things by using procedures by using functions". Then why there is differentiation between procedure and function ?
myself : no reply (simply frustated at this question)
The above is conversation between me and interviewer.
Please suggest me what would be my reply to above topic.
In one book i find that using functions we can return multiple values but it is poor programming practice.
why this is a programming practice ?
please suggest me solution
thanks in advance
prasanth as.Another difference is function must return something. There is no such restriction on procedure.In fact, a procedure CANNOT contain an expression in its RETURN statement.
SQL> create or replace procedure test_return is
2 begin
3 return(10) ;
4 end ;
5 /
Warning: Procedure created with compilation errors.
SQL> show errors
Errors for PROCEDURE TEST_RETURN:
LINE/COL ERROR
3/3 PLS-00372: In a procedure, RETURN statement cannot contain an
expression
3/3 PL/SQL: Statement ignored
SQL>And, a procedure cannot be called as part of a expression (it must be a function).
SQL> create or replace procedure test_return is
2 begin
3 return ;
4 end ;
5 /
Procedure created.
SQL> variable x number ;
SQL> exec :x := test_return ;
BEGIN :x := test_return ; END;
ERROR at line 1:
ORA-06550: line 1, column 13:
PLS-00222: no function with name 'TEST_RETURN' exists in this scope
ORA-06550: line 1, column 7:
PL/SQL: Statement ignored
SQL> -
Detail differentiation between add query,combined query and sub query
HI
I would like to know the detail differentiation between add query,combined query and sub query with universe
correct me if I a wrong
Add query : adding of different query from different universe and also with in same universe.
Combined query : combining query using operators(Union,intersection,minus)with in same universe.
Sub query :getting results from the sub query and the result serves as the data for main query within same universe.Hi,
I would advise you to check the product documentation under http://help.sap.com/
regards
Steph -
Need help with ASA 5512 and SQL port between DMZ and inside
Hello everyone,
Inside is on gigabitEthernet0/1 ip 192.9.200.254
I have a dmz on gigabitEthernet2 ip 192.168.100.254
I need to pass port 443 from outside to dmz ip 192.168.100.80 and open port 1433 from 192.168.100.80 to the inside network.
I believe this will work for port 443:
object network dmz
subnet 192.168.100.0 255.255.255.0
object network webserver
host 192.168.100.80
object network webserver
nat (dmz,outside) static interface service tcp 443 443
access-list Outside_access_in extended permit tcp any object webserver eq 443
access-group Outside_access_in in interface Outside
However...How would I open only port 1433 from dmz to inside?
At the bottom of this message is my config if it helps.
Thanks,
John Clausen
Config:
: Saved
ASA Version 9.1(2)
hostname ciscoasa-gcs
domain-name router.local
enable password f4yhsdf.4sadf977 encrypted
passwd f4yhsdf.4sadf977 encrypted
names
ip local pool vpnpool 192.168.201.10-192.168.201.50
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 123.222.222.212 255.255.255.224
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 192.9.200.254 255.255.255.0
interface GigabitEthernet0/2
nameif dmz
security-level 100
ip address 192.168.100.254 255.255.255.0
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
interface Management0/0
management-only
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
ftp mode passive
dns server-group DefaultDNS
domain-name router.local
object network inside-subnet
subnet 192.9.200.0 255.255.255.0
object network netmotion
host 192.9.200.6
object network inside-network
subnet 192.9.200.0 255.255.255.0
object network vpnpool
subnet 192.168.201.0 255.255.255.192
object network NETWORK_OBJ_192.168.201.0_26
subnet 192.168.201.0 255.255.255.192
object network NETWORK_OBJ_192.9.200.0_24
subnet 192.9.200.0 255.255.255.0
access-list outside_access_in extended permit icmp any4 any4 log disable
access-list Outside_access_in extended permit udp any object netmotion eq 5020
access-list split standard permit 192.9.200.0 255.255.255.0
access-list VPNT_splitTunnelAcl standard permit 192.9.200.0 255.255.255.0
pager lines 24
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu management 1500
mtu dmz 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static inside-network inside-network destination static vpnpool vpnpool
nat (inside,outside) source static NETWORK_OBJ_192.9.200.0_24 NETWORK_OBJ_192.9.200.0_24 destination static NETWORK_OBJ_192.168.201.0_26 NETWORK_OBJ_192.168.201.0_26 no-proxy-arp route-lookup
object network netmotion
nat (inside,outside) static interface service udp 5020 5020
nat (inside,outside) after-auto source dynamic any interface
access-group Outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 123.222.222.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http 192.168.1.0 255.255.255.0 management
http 192.9.200.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto ca trustpool policy
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication crack
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 20
authentication rsa-sig
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 40
authentication crack
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 50
authentication rsa-sig
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 60
authentication pre-share
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 70
authentication crack
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 80
authentication rsa-sig
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 90
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 100
authentication crack
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 110
authentication rsa-sig
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 120
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 130
authentication crack
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 140
authentication rsa-sig
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 150
authentication pre-share
encryption des
hash sha
group 2
lifetime 86400
telnet 192.9.200.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl encryption aes128-sha1 3des-sha1
webvpn
enable outside
anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 2 regex "Windows NT"
anyconnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 3 regex "Intel Mac OS X"
anyconnect enable
tunnel-group-list enable
group-policy SSLVPN internal
group-policy SSLVPN attributes
dns-server value 192.9.200.13
vpn-tunnel-protocol ssl-client
split-tunnel-policy tunnelspecified
split-tunnel-network-list value split
default-domain value router.local
group-policy VPNT internal
group-policy VPNT attributes
dns-server value 192.9.200.13
vpn-tunnel-protocol ikev1 l2tp-ipsec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value VPNT_splitTunnelAcl
default-domain value router.local
username grimesvpn password 7.wersfhyt encrypted
username grimesvpn attributes
service-type remote-access
tunnel-group SSLVPN type remote-access
tunnel-group SSLVPN general-attributes
address-pool vpnpool
default-group-policy SSLVPN
tunnel-group SSLVPN webvpn-attributes
group-alias SSLVPN enable
tunnel-group VPNT type remote-access
tunnel-group VPNT general-attributes
address-pool vpnpool
default-group-policy VPNT
tunnel-group VPNT ipsec-attributes
ikev1 pre-shared-key *****
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:36271b5a1b9382621e14c3aa635e2fbb
: endHi Vibor. Apologies if my comment was misunderstood. What I meant to say was that the security level of the dmz interface should probably be less than 100.
And therefore traffic could be controlled between DMZ and inside networks.
As per thr security level on the DMZ interface. ....... that command is correct. :-) -
Difference between diadem and LabVIEW Report Generation Toolkit
I want to expand LabVIEW's reporting capabilities. Can someone tell me what the difference is between DIAdem and the LabVIEW Report Generation Toolkit for Microsoft Office.
Hello Mr Bean,
There are several major differences between the two solutions. I'll try and outline them as good as I can ...
The biggest different is that LabVIEW and its toolkits are programming tools and DIAdem is a ready to run application.
The LabVIEW Report Generation Toolkit basically provides an extensive library of VIs that allow you to connect LabVIEW to the MS Office library and create and edit reports in Word and Excel.
DIAdem is a stand alone application that was designed to post-process data from various sources. The tools included in DIAdem are:
1. NAVIGATOR: Allows you to import data from files (ASCII, binary, Excel, etc.) as well as DataBases (SQL/ODBC, Citadel, ASAM, etc.). The unique DataPlugin technology available within DIAdem allows you to import vitually and data file by creating a DataPlugin that describes the data format and gets linked to DIAdem. More information at: http://www.ni.com/diadem/dataplugins.htm
2. VIEW: Graphical and Numerical data inspection tool. Use cursors to zoom and scroll through your data, edit your data graphically and numerically and compare different tests.
3. ANALYSIS: DIAdem has a wide range of analysis functions, ranging from simple functions like integration and differentiation to FFTs, Order analysis and 3D data analysis.
4. REPORT: The DIAdem REPORT tool allows you to create reusable report layouts that can contain multiple axis systems (2D, 3D and polar plots) as well as tables (2D and 3D) and variables. The REPORT tool generates templates that can be usedwith multiple data sets due to the inclusion of automatic (or manula if required) scaling as well as extensive use of variables for annotations. Finished reports can be exported to printers, graphics files, the Windows Clipboard, HTML pages and PDF files (PDF writing is build into DIAdem, no extra software required). Using Scripts, it is also possible to create Word, Excel or Powerpoint reports from DIAdem automatically.
5. SCRIPT: The DIAdem scripting tools allows users to record macros or write scripts that automate complete sequences, for the import of data, via extensive analysis, to creating a publication ready report. Scripts can make reports "intelligent" by modifying the appearance of a report based on the data or calculation results that are going to be displayed in the report.
I recommend you check out the following link for more information: http://www.ni.com/diadem/
DIAdem is an extremly powerful tool for report generation. I am leaving to go on a business trip to Asia, but I would be more than happy to give you an Web presentation on DIAdem after I have returned. We could use your data and create a DIAdem report Script together online. My Email address is [email protected] and I will be back the week of Thanksgiving.
Otmar
Otmar D. Foehner
Business Development Manager
DIAdem and Test Data Management
National Instruments
Austin, TX - USA
"For an optimist the glass is half full, for a pessimist it's half empty, and for an engineer is twice bigger than necessary." -
bluetooth connection between iphone and ipad no longer workers after upgrade to ver 8 - any help?
I'm trying to use the iphone as a remote with keynote, which again worked before the upgradeHi russellpaton,
Thanks for visiting Apple Support Communities.
If your iOS devices are not communicating with each other after updating to iOS 8, the troubleshooting steps in this article can help resolve this sitation as well:
If you can’t use a Bluetooth accessory or car kit
Cheers,
Jeremy -
What should I use between JSE and JEE?
Is it true that JSE can do only certain level, but JEE can do the same with JSE and specially beyound of JSE.? If i want to develop a web application, what should i install to my computer between JSE and JEE or i have to install its both?
hi
you dont get all the features of j2se when you have j2ee with you. they are 2 different things.
j2ee mostly deals with things which are required for a enterprise application building which include EJBs, Servlets, JSPs etc. while the J2SE is more useful for application developement (using Swing e.g). this is only a crude differentiation.
the choice betweeen the two depends on your requirement. e.g. if you are developing a web application, you will go for J2EE and proceed using the components available there.
if you specify your requirements, then we can discuss the details may be.
Parag -
when I connect my electric acoustic through an audio jack to usb there is a delay between playing and recording. Can this be overcome?
Hi johnbwebster,
Welcome to the Support Communities!
The Logic Express 9 Manual shows how to Adjust the "Recording Delay" in the Audio Preferences:
Click on the link below for more information and screen shots:
Logic Express 9 User Manual: Audio Preferences in Logic Express
https://documentation.apple.com/en/logicexpress/usermanual/index.html#chapter=43 %26section=4%26tasks=true
Cheers,
- Judy -
Differentiate between DND and "Off Hook" status
We have several directors and assistants on staff where it would be helpful to the assistant if their phone displayed and differentiated between off hook or dnd. Currently, both off hook status and dnd report the same indicator for the assistant.
UC560 environment, ip phone 514G and 7965G
Thanks for the help.
Blessings,
John JHello John,
You may try to use BLF.
This is not supported with CCA.
HTH,
Alex
*Please rate helpful posts -
Difference between zero and blank values
Is there a way for the system to determine the difference between zero and blank values. One can have a zero allowed for the 0 value to actualy be there in the KF but is there a way that a macro can be written by which we can use the differentiation between the zero ( a value) and blank (no value) in the KF
I have tried to look for an explanation on the service.sap.com and sdn but was not able to find anything.
Thanks in advanceThanks for your reply. You mentioned something about the "fixing" setting that could make the "0" displayed in the planning book. Could you elaborate?
Also, in the post from user "APO APO" on 5/8, the author seemed to indicate they could see the "0" in the planning book, as quoted below:
"I have already made the zero allowed arrangement for that in the planning area and can see the 0 values in the planning book but I am not being able to make the macro get the results."
I just want to find out if there is any way the user can visually distinguish b/w the "0" and blank values. If not, it'll be very confusing to the users. I understand the macros can distinguish b/w them.
Thanks in advance. -
Comparison between 3750 and 3750-metro
hi folks,
is there any links which will provide me on the comparison between 3750 and 3750-metro? for exapmple, isis is not support on 3750 but it support on 3750-metro. The product information from cisco site is insufficient in term of the main differences :p
rgd
josh.wHi Josh,
The Cisco Catalyst 3750 Metro Series is built for Metro Ethernet access in a customer location, enabling the delivery of more differentiated Metro Ethernet services. These switches feature bidirectional hierarchical QoS and Traffic Shaping, intelligent 802.1Q tunneling with class-of-service (CoS) mutation, VLAN translation, MPLS, EoMPLS, and Hierarchical Virtual Private LAN Service (H-VPLS) support, and redundant AC or DC power. They are ideal for service providers seeking to deliver profitable business services, such as Layer 2, Layer 3, and MPLS VPNs, in a variety of bandwidths and with different SLAs.
The metro switches have the PXF chips (which allow hierarchical QoS on the 2 "WAN" GigE ports, so several logical links can share a connection, and have soft bandwidth limits).
For more details on 3750-M switches have a look at this link
http://www.cisco.com/en/US/products/hw/switches/ps5532/products_qanda_item09186a00801eb822.shtml
HTH
Ankur
*Pls rate all helpfull post -
Differentiating between same exception thrown from 2 different methods
Suppose I have a class CodeDAO which has 2 methods who both throw SQLException
public int getLocationCode(String locationName) throws SQLException;
public int getDepartmentCode(String departmentName) throws SQLException;Now I have a business method in which I have to use both of the above DAO methods.
public int process() {
try {
CodeDAO codeDAO = new CodeDAO();
int locationCode = codeDAO.getLocationCode("NJ");
int departmentCode = codeDAO.getDepartmentCode("Sales");
catch (SQLException e) {
}If SQLException is thrown how will I know if it is thrown by the getLocationCode method or getDepartmentCode method?
What are the different choices I have in differentiating between same exception thrown from different methods? And which choice do you guys prefer?
Thankssrhcan wrote:
maheshguruswamy wrote:
srhcan wrote:
gimbal2 wrote:
baftos wrote:
Put each method invokation in its own try/catch block.Or in fact not use SQLException, but exceptions that are unique.So each DAO method has its own exception?
public int getLocationCode(String locationName) throws GetLocationCodeException;
public int getDepartmentCode(String departmentName) throws GetDepartmentCodeException;would not that means I have to create a lot of exception classes?
Edited by: srhcan on Aug 9, 2012 2:54 PMLet me ask you this, what do you plan to do in the catch block? Do some sort of recovery? rollback? If it is just for logging purposes, I am pretty sure the exception message will give you enough information to find out where the error was.* I would like to give user a specific message based on which method fails. So if getLocationCode("NJ") fails the message can be: Unable to find code for Location "NJ". And if getDepartmentCode("Sales") fails the message can be: Unable to find code for Department "Sales".
* I would like to print the exception's stacktrace in the log file.
* I may do a rollback depending on if its an INSERT/UPDATE/DELETE statement.Well, in that case why not log it in the DAO methods themselves...inside getLocationCode and getDepartmentCode. Instead of trying to do the recovery/logging in the process method, do it in the individual dao methods. The calling classes should not be responsible for logging/recovery etc. It should be done in the DAO classes themselves and the DAO method should return an appropriate message/code to the consumer tier classes indicating the status of the transaction. Just my 0.02$.
Maybe you are looking for
-
How can I move desktop items from one Mac to another?
The screen on my old Mac laptop is physically broken. I bought a new Mac laptop. I can hook the two via a firewire cable and access the old Mac's hard drive, but I can't figure out how to access the files on my old desktop so that I can move them ove
-
Hi there New to the forum, just after seeing if anyone has a soloution for me: Ive checked someonline help topics but dont seem to have found my answer and saw another discussion on here , that sounded similar, but when i clicked on it it to read the
-
Yielding is not allowed within a C or metamethod call
The way I'm developing my plug in is that I'm creating individual modules, testing those modules and then integrating the modules into my plugin. The individual modules work. However, I have a problem when I try to integrate. I'm using an anonymous f
-
Cisco ISE Guest Authentication Failed : 86020: Unknown exception
Hi, I would like to check what may be causing the error message 86020:unknown exception for ise when guest user authenticates via wireless using CWA? I have also attached a screen capture of the error and after the authenitcation logs change to authe
-
Hope this fixes the xgl problem with nvidia! Release Highlights: * Added support for GeForce 8600 GTS, GeForce 8600 GT, GeForce 8500 GT, GeForce 8400 GS, and GeForce 8300 GS. * Improved Notebook support. * Fixed assorted minor bugs. The 1