Distribution static reports issue
Hi,
We are having problems trying to distribute a data entry using the EPM Distribute option. The process finishes correctly and We don't know why but it generates two folders: one named as the user and another with the name of the template, when we open the generated reports without being connected to EPM10 we can see errors in formulas, as it can't recognize the EPM formulas, indicating that the process has not set to offline mode the template, another problem is that we don't see any data in the generated reports, so it seems that the whole process doesn't work.
We are working with version BPC10 NW Patch02 SP7. NET 4
Thanks in advance
Hi Vadim,
The report is not protected, in rows we have two dimensions (Clients and Products) and in columns we have the dimension time and category.
When we create the distribution template we put as Variable members two elements of the dimension Manager and the others are as Fixed members.
Thanks
Similar Messages
-
Oracle r12.1 - Material Account Distribution Detail report not opening in Excel
Hello,
We have a requirement to open Material Account Distribution Detail Report to transfer the output to MS Excel when user clicks the "View Output" window. Below is the setup. And I have verified over and over that setup is correct. Still, for some reason, concurrent program output is dumped in XML format on the browser window! What is causing this and why? What am I missing?
My Data Definition
===========
Name INVDSTRL_XML
Code INVDSTRL_XML
Application Oracle Inventory
Start Date 27-Apr-2013
End Date
My template definition
=============
Name INVDSTRL_XML
Code INVDSTRL_XML
Application Oracle Inventory
Type RTF
Start Date 27-Apr-2013
Default File Item_error_report.rtf
End Date
Default File Language English
Subtemplate No
Default File Territory
Default Output Type EXCEL
Conc Program Def:
============
Program: INVDSTRL_XML
Short Name: INVDSTRL_XML
Application: Oracle Inventory
Executable Name: INVDSTRL_XML
Method: Java Concurrent Program
Output Format: XML
Rest are defaults
I also checked the version of BI Publisher by passing following query.
SELECT DECODE (bug_number, '4440000', '5.6.3') PATCH, bug_number FROM ad_bugs WHERE bug_number IN('4440000');
Not sure what is the issue. Why the output is not being diverted to EXCEL. Please advise. Why it dumps into XML and Not Excel? This is on r12.1.3
Thanks.
DarshHi Abdul,
Before running the report select the particular "inventory organization" and then run the report.
It seems you were directly running the report without selecting the Inv org.
Please try again.
Thanks
-Arif. -
Hi,
Having issues with getting the reports "Posted".
The reports goes to success but "Not Posted".
Environment: PT 8.49
Patch: 84905b
DB: MSS
Sample process ran: AEMINITEST
Process Scheduler - NT
Appserver - NT
I found the following in Message Log file
10 2:48:36AM HTTP Status Code is: 904 (63,7 2)
2:48:37AM PSNT failed to post files to the report repository. Server scheduled to try again on 2008-03-28-02.51.34.000093. See log
10 2:51:47AM HTTP Status Code is: 904 (63,7 2)
2:51:47AM PSNT failed to post files to the report repository. Server scheduled to try again on 2008-03-28-02.54.46.999439. See log
10 2:54:58AM HTTP Status Code is: 904 (63,7 2)
2:54:59AM HTTP transfer error.
I found the following in DSTAGNT.log file under the logs of prcs:
Number of new entries to process: 1
PSDSTSRV.1920 (4) [03/28/08 04:05:54 PostReport](3) 1. Process Instance: 338/Report Id: 144/Descr: Simple AE test program
PSDSTSRV.1920 (4) [03/28/08 04:05:54 PostReport](3) from directory: D:\prcs_logs\Y890P70\log_output\AE_AEMINITEST_338
PSDSTSRV.1920 (4) [03/28/08 04:05:54 PostReport](1) (JavaHttp): Java VM function %s failed.
PSDSTSRV.1920 (4) [03/28/08 04:05:54 PostReport](3) HTTP transfer error.
PSDSTSRV.1920 (4) [03/28/08 04:05:54 PostReport](3) Post Report Elapsed Time: 0.4220
Configured the following:
Give write permission in the report repository.
Process Scheduler PSNT defined on the distribution node
Report node pinging to success.
Gateway setup done. Pinging to success.
The user specified in the prcs configuration file does have permissions.
All the other processes for other databases (Oracle, DB2 OS390, DB2 UDB - Process Schedulers) running to success and Posted. The issue pertains only to MSS database that also resides in the same NT box.Nothing inside the stdout and stderr files in %PS_HOME%\appserv\prcs\domainID ?
Nicolas. -
Hi,
I have run a stage analysis report but it says no data inspite of open opportunities being present in the system. Could anyone kindly let me know what could be the issue?
Regards
SharatHi Sharat,
Welcome you to the forum. Please close your first thread.
Regarding your Stage Analysis Report Issue, what selection has been made? This report show closed opportunity only.
Thanks,
Gordon -
1. 30 documents of 2009 were matching and post with clear is perfomred. After performing post with clear also the line items are not moving from open line items. When we download the open line items as of today, these line items are appearing.
2. When we download the ZBLRFIOI report for GRIR a/c 349100 to have the opne line items. we have some set of documents showing as " FI Open items without J2" - This is reporting issues.
Thanks
MallikarjunaHi
Pls try with F.13 for that GR/IR account 349100 by selecting check box select gl accounts
And give Company code, year and pending document numbers in selection screen
And before that pls make sure that OB74 clearing settings maintained or not
It will clear all the open items exists
Reg
Vishnu -
Hi,
I am facing one reporting Issue relating to Display Attributes.
Characteristic: Business Partner
Display Attributes: Address0, Address1, Address3...etc.
Requirement is to display mentioned Display attributes along with Business Partner.
For this I have selected Business Partner as characteristic and mentioned above three as display attributes to Business Partner.
But Query out put is not showing Display attributes. For this I have done all settings at reporting level, all gone vain.
I am using Bex 7.0.
Kindly look in to the Issue and let me know the solution.
Regards,
Venkat.Mahipathi.
09886652422.
[email protected]Hi,
Check in Reporting properties or check attributes in analyzer proprties then it will display
************asign points if usefull***********
swapna -
User report issues in 1.1.0.21.97
A couple of issues i'm experiencing with user reports on Mac OS X in the latest pre-releas build
first off, if I am asked for a password (first time I use the connection) there is no feedback if the connection fails (worng password for instance)
The second problem I'm facing is every time I try to rerun a certain master-detail report I'm getting an NPE
this is the stacktrace:
22-nov-2006 15:37:31 oracle.report.addin.ReportEditor updateContent
INFO: ReportEditor.updateContent()
22-nov-2006 15:37:33 oracle.dbtools.raptor.controls.display.DisplayResultTable getUI
INFO: DisplayResultTable.getUI()
Exception in thread "AWT-EventQueue-0" java.lang.NullPointerException
at oracle.dbtools.raptor.controls.display.DisplayPanel.refresh(Unknown Source)
at oracle.dbtools.raptor.controls.display.DisplayPanel.refresh(Unknown Source)
at oracle.report.addin.ReportEditor$1.actionPerformed(Unknown Source)
at javax.swing.AbstractButton.fireActionPerformed(AbstractButton.java:1882)
at javax.swing.AbstractButton$Handler.actionPerformed(AbstractButton.java:2202)
at javax.swing.DefaultButtonModel.fireActionPerformed(DefaultButtonModel.java:420)
at javax.swing.DefaultButtonModel.setPressed(DefaultButtonModel.java:258)
at javax.swing.plaf.basic.BasicButtonListener.mouseReleased(BasicButtonListener.java:234)
at java.awt.AWTEventMulticaster.mouseReleased(AWTEventMulticaster.java:231)
at java.awt.Component.processMouseEvent(Component.java:5554)
at javax.swing.JComponent.processMouseEvent(JComponent.java:3126)
at java.awt.Component.processEvent(Component.java:5319)
at java.awt.Container.processEvent(Container.java:2010)
at java.awt.Component.dispatchEventImpl(Component.java:4021)
at java.awt.Container.dispatchEventImpl(Container.java:2068)
at java.awt.Component.dispatchEvent(Component.java:3869)
at java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:4256)
at java.awt.LightweightDispatcher.processMouseEvent(Container.java:3936)
at java.awt.LightweightDispatcher.dispatchEvent(Container.java:3866)
at java.awt.Container.dispatchEventImpl(Container.java:2054)
at java.awt.Window.dispatchEventImpl(Window.java:1774)
at java.awt.Component.dispatchEvent(Component.java:3869)
at java.awt.EventQueue.dispatchEvent(EventQueue.java:463)
at java.awt.EventDispatchThread.pumpOneEventForHierarchy(EventDispatchThread.java:269)
at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:190)
at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:184)
at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:176)
at java.awt.EventDispatchThread.run(EventDispatchThread.java:110)
reloadBuffers(): 53 nodes checked in 0.006489 second(s)
reloadBuffers(): 53 nodes checked in 0.005422 second(s)
reloadBuffers(): 53 nodes checked in 0.004306 second(s)
22-nov-2006 15:43:17 oracle.report.addin.ReportEditor updateContent
INFO: ReportEditor.updateContent()
only happens with master-detail report
Message was edited by: Barsema
barsemaWe have verified the connection error on the latest evaluation build is working as expected. i.e. if you supply wrong password you get alerted to that. This has been verified on the windows and Mac OS X. Please try the latest evaluation release 1.1.0.22.71.
Your reports issue has also been addressed.
Sue -
Historical Report CSQ Call Distribution Summary Report
You can filter the Contact Service Queue Call Distribution Summary Report by either of these parameters:
- Contact Service Queue Names
- Time Interval (sec) T
can we filter this report with both paramters mentioned above together(CSQ & Time)
or at least can we change the default value of "Time Interval(sec) T" from 15 sec to another value?
it is urgent,
regards,Excuse me but it seem you didn’t get my point,
My question is to have one report filtered by two parameters simultaneously, CSQ name + Time Interval.
and I was guessing, if there is no way to choose both parameters simultaneously in filtering the same report, if there is a way to set the default time parameter to for example 10 sec, so in a way if i choose the parameter CSQ name the interval taken is 10 sec and not 15 second (the default value for time). -
Update 3/22 - the below issue has been resolved.
It has come to our attention that certain Windows Phone download reporting aggregations are not matching. After investigation, we found an issue related to 11/1/14 – 11/9/14 transactions. For example, if you chose an “All
app” aggregation (6 month view) and compared it to “Monthly by app” aggregations (6 month view), the totals weren’t matching. The root cause of the issue was due to the 11/1/14 – 11/9/14 data not being considered for all of the available aggregations.
We are scheduled to fix the issue today.
If you have transactions between 11/1/14 – 11/9/14, you will see an increase in the following aggregation totals once the fix is completed:
Monthly aggregations (6 and 12 month views) by app and in-app aggregations
Cumulative downloads – app and in-app aggregations
Please note, this is strictly a download reporting issue. There is no impact to any payout reporting or payout amounts.
When the fix has been completed, I will update this post.
Thanks,
PatrickUpdate 3/22 - the below issue has been resolved.
It has come to our attention that certain Windows Phone download reporting aggregations are not matching. After investigation, we found an issue related to 11/1/14 – 11/9/14 transactions. For example, if you chose an “All
app” aggregation (6 month view) and compared it to “Monthly by app” aggregations (6 month view), the totals weren’t matching. The root cause of the issue was due to the 11/1/14 – 11/9/14 data not being considered for all of the available aggregations.
We are scheduled to fix the issue today.
If you have transactions between 11/1/14 – 11/9/14, you will see an increase in the following aggregation totals once the fix is completed:
Monthly aggregations (6 and 12 month views) by app and in-app aggregations
Cumulative downloads – app and in-app aggregations
Please note, this is strictly a download reporting issue. There is no impact to any payout reporting or payout amounts.
When the fix has been completed, I will update this post.
Thanks,
Patrick -
Odd Reporting Issue (ENTERPRISE)
I have a client with some users experiencing a rather odd reporting issue. The report runs fine, but only shows values for the totals and not the line items that make up the total.
For example, when I run the report (logged in as admin as well as under their ID), I see:
Net Sales 1,234
Cost Of Sales (1,111)
Gross Margin 123
When they log in on their machine, they see:
Net Sales
Cost Of Sales
Gross Margin 123
Very odd. I figured maybe it was an application setting, but the INI didn't look off anywhere particular.
They are running Enterprise 6.3.1 (yeah, insert comment here on the upgrade needed).
Any thoughts???Check their Effective rights, and reset them, that has worked out for me. Otherwise, try copying the user and paste it as a new user and retest; I had to delete users and recreate them to correct problems of this nature.
-
I have 5 sheets full of EPM retrieve formual, since I need to bring values in the specified cells.
Now at time each sheets is giving #RFR message inspite of refresh.
What is the cause of this? We are in SP 13.
Appreciate inputs.The only thing I can recommend - just stop using EPMRetieveData functions, switch to static EPM report Static report in BPC NW 10
Vadim
#RFR can happen during ofline/online... -
ASA 5510 Multiple Public IP - Static NAT Issue - Dynamic PAT - SMTP
Running into a little bit of a roadblock and hoping someone can help me figure out what the issue is. My guess right now is that it has something to do with dynamic PAT.
Essentially, I have a block of 5 static public IP's. I have 1 assigned to the interface and am using another for email/webmail. I have no problems accessing the internet, receving emails, etc... The issue is that the static NAT public IP for email is using the outside IP instead of the one assigned through the static NAT. I would really appreciate if anyone could help shed some light as to why this is happening for me. I always thought a static nat should take precidence in the order of things.
Recap:
IP 1 -- 10.10.10.78 is assigned to outside interface. Dynamic PAT for all network objects to use this address when going out.
IP 2 -- 10.10.10.74 is assgned through static nat to email server. Email server should respond to and send out using this IP address.
Email server gets traffic from 10.10.10.74 like it is supposed to, but when sending out shows as 10.10.10.78 instead of 10.10.10.74.
Thanks in advance for anyone that reads this and can lend a hand.
- Justin
Here is my running config (some items like IP's, domain names, etc... modified to hide actual values; ignore VPN stuff -- still work in progress):
ASA Version 8.4(3)
hostname MYHOSTNAME
domain-name MYDOMAIN.COM
enable password msTsgJ6BvY68//T7 encrypted
passwd msTsgJ6BvY68//T7 encrypted
names
interface Ethernet0/0
speed 100
duplex full
nameif outside
security-level 0
ip address 10.10.10.78 255.255.255.248
interface Ethernet0/1
nameif inside
security-level 100
ip address 192.168.2.2 255.255.255.0
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
boot system disk0:/asa843-k8.bin
ftp mode passive
clock timezone CST -6
clock summer-time CDT recurring
dns server-group DefaultDNS
domain-name MYDOMAIN.COM
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network inside-network
subnet 192.168.2.0 255.255.255.0
object network Email
host 192.168.2.7
object network Webmail
host 192.168.2.16
object network WebmailSecure
host 192.168.2.16
access-list inside_access_out extended permit ip any any
access-list inside_access_out extended permit icmp any any
access-list VPN_Split_Tunnel_List remark The corporate network behind the ASA (inside)
access-list VPN_Split_Tunnel_List standard permit 192.168.2.0 255.255.255.0
access-list outside_access_in extended deny icmp any any
access-list outside_access_in extended permit tcp any object Email eq smtp
access-list outside_access_in extended permit tcp any object Webmail eq www
access-list outside_access_in extended permit tcp any object WebmailSecure eq https
pager lines 24
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu management 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-647.bin
asdm history enable
arp timeout 14400
nat (inside,outside) source static inside-network inside-network destination static inside-network inside-network no-proxy-arp route-lookup
object network obj_any
nat (inside,outside) dynamic interface
object network Email
nat (inside,outside) static 10.10.10.74 service tcp smtp smtp
object network Webmail
nat (inside,outside) static 10.10.10.74 service tcp www www
object network WebmailSecure
nat (inside,outside) static 10.10.10.74 service tcp https https
access-group outside_access_in in interface outside
access-group inside_access_out out interface inside
route outside 0.0.0.0 0.0.0.0 10.10.10.73 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server MYDOMAIN protocol kerberos
aaa-server MYDOMAIN (inside) host 192.168.2.8
kerberos-realm MYDOMAIN.COM
aaa-server MYDOMAIN (inside) host 192.168.2.9
kerberos-realm MYDOMAIN.COM
aaa-server MY-LDAP protocol ldap
aaa-server MY-LDAP (inside) host 192.168.2.8
ldap-base-dn DC=MYDOMAIN,DC=com
ldap-group-base-dn DC=MYDOMAIN,DC=com
ldap-scope subtree
ldap-naming-attribute sAMAccountName
ldap-login-password *****
ldap-login-dn CN=SOMEUSER,CN=Users,DC=MYDOMAIN,DC=com
server-type microsoft
aaa-server MY-LDAP (inside) host 192.168.2.9
ldap-base-dn DC=MYDOMAIN,DC=com
ldap-group-base-dn DC=MYDOMAIN,DC=com
ldap-scope subtree
ldap-naming-attribute sAMAccountName
ldap-login-password *****
ldap-login-dn CN=SOMEUSER,CN=Users,DC=MYDOMAIN,DC=com
server-type microsoft
user-identity default-domain LOCAL
http server enable
http 192.168.1.0 255.255.255.0 management
http 192.168.2.0 255.255.255.0 inside
http redirect outside 80
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map inside_map interface inside
crypto ca trustpoint ASDM_TrustPoint0
enrollment self
email [email protected]
subject-name CN=MYHOSTNAME
ip-address 10.10.10.78
proxy-ldc-issuer
crl configure
crypto ca certificate chain ASDM_TrustPoint0
certificate e633854f
30820298 30820201 a0030201 020204e6 33854f30 0d06092a 864886f7 0d010105
0500305e 31143012 06035504 03130b47 46472d53 55532d41 53413146 301a0609
2a864886 f70d0109 08130d39 382e3130 302e3232 322e3738 30280609 2a864886
f70d0109 02161b47 46472d53 55532d41 53412e47 46472d50 4541424f 44592e43
4f4d301e 170d3132 30343131 30373431 33355a17 0d323230 34303930 37343133
355a305e 31143012 06035504 03130b47 46472d53 55532d41 53413146 301a0609
2a864886 f70d0109 08130d39 382e3130 302e3232 322e3738 30280609 2a864886
f70d0109 02161b47 46472d53 55532d41 53412e47 46472d50 4541424f 44592e43
4f4d3081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100b4
aa6e27de fbf8492b 74ba91aa e0fd8361 e0e85a31 f95c380d 6e5f43ac a695a810
f50e893b 82b91870 a32f7e38 8f392607 7a69c814 36a71a9c 2dccca07 24fe7f88
0f3451ed c64e85fc 8359c87e 62ebf166 0a570ac5 f9f1c64b 262eca66 ea05ab65
78da1ac2 9867a115 b14a6ba1 cd82d04e 00fc6557 856f7c04 ab1b08a0 b9de8b02
03010001 a3633061 300f0603 551d1301 01ff0405 30030101 ff300e06 03551d0f
0101ff04 04030201 86301f06 03551d23 04183016 801430cf 97ef92bb 678e3ba3
0002069c 8130550a 2664301d 0603551d 0e041604 1430cf97 ef92bb67 8e3ba300
02069c81 30550a26 64300d06 092a8648 86f70d01 01050500 03818100 64c403bd
d75717ab 24383e77 63e10ba7 4fdef625 73c5a952 19ceecbd 75bd23ca 86dc0298
e6693a8a 2c7fb85f 096497a7 8d784ada a433ee0d d88e9219 f0615f3c 7814bf1c
5b4fe847 7d8894eb 18fe2da7 05f15ae9 bc2c17ec 3a7831ee f95d6ced 4799fba2
781c8228 48224843 dc07ebb5 d20abf2a b68cfa62 ac71a41b 1196a018
quit
crypto ikev2 policy 1
encryption aes-256
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 10
encryption aes-192
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 20
encryption aes
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 30
encryption 3des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 40
encryption des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 enable outside client-services port 443
crypto ikev2 enable inside client-services port 443
crypto ikev2 remote-access trustpoint ASDM_TrustPoint0
crypto ikev1 policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet 192.168.2.0 255.255.255.0 inside
telnet 192.168.1.0 255.255.255.0 management
telnet timeout 20
ssh timeout 5
console timeout 0
management-access inside
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
threat-detection basic-threat
threat-detection statistics
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
ntp server 192.168.2.8 source inside prefer
ssl trust-point ASDM_TrustPoint0 inside
ssl trust-point ASDM_TrustPoint0 outside
webvpn
enable outside
enable inside
anyconnect-essentials
anyconnect image disk0:/anyconnect-win-3.0.5080-k9.pkg 1
anyconnect profiles VPN_client_profile disk0:/VPN_client_profile.xml
anyconnect enable
tunnel-group-list enable
group-policy DfltGrpPolicy attributes
vpn-tunnel-protocol ikev1 l2tp-ipsec
group-policy GroupPolicy_VPN internal
group-policy GroupPolicy_VPN attributes
wins-server value 192.168.2.8 192.168.2.9
dns-server value 192.168.2.8 192.168.2.9
vpn-filter value VPN_Split_Tunnel_List
vpn-tunnel-protocol ikev2 ssl-client
group-lock value VPN
split-tunnel-policy tunnelspecified
split-tunnel-network-list value VPN_Split_Tunnel_List
default-domain value MYDOMAIN.COM
webvpn
anyconnect profiles value VPN_client_profile type user
group-policy GroupPolicy-VPN-LAPTOP internal
group-policy GroupPolicy-VPN-LAPTOP attributes
wins-server value 192.168.2.8 192.168.2.9
dns-server value 192.168.2.8 192.168.2.9
vpn-filter value VPN_Split_Tunnel_List
vpn-tunnel-protocol ikev2
group-lock value VPN-LAPTOP
split-tunnel-policy tunnelspecified
split-tunnel-network-list value VPN_Split_Tunnel_List
default-domain value MYDOMAIN.COM
webvpn
anyconnect profiles value VPN_client_profile type user
tunnel-group VPN type remote-access
tunnel-group VPN general-attributes
authentication-server-group MYDOMAIN
default-group-policy GroupPolicy_VPN
dhcp-server 192.168.2.8
dhcp-server 192.168.2.9
dhcp-server 192.168.2.10
tunnel-group VPN webvpn-attributes
group-alias VPN enable
tunnel-group VPN-LAPTOP type remote-access
tunnel-group VPN-LAPTOP general-attributes
authentication-server-group MY-LDAP
default-group-policy GroupPolicy-VPN-LAPTOP
dhcp-server 192.168.2.8
dhcp-server 192.168.2.9
dhcp-server 192.168.2.10
tunnel-group VPN-LAPTOP webvpn-attributes
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
class class-default
user-statistics accounting
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
hpm topN enable
Cryptochecksum:951faceacf912d432fc228ecfcdffd3fHi ,
As per you config :
object network obj_any
nat (inside,outside) dynamic interface
object network Email
nat (inside,outside) static 10.10.10.74 service tcp smtp smtp
object network Webmail
nat (inside,outside) static 10.10.10.74 service tcp www www
object network WebmailSecure
nat (inside,outside) static 10.10.10.74 service tcp https https
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network inside-network
subnet 192.168.2.0 255.255.255.0
object network Email
host 192.168.2.7
object network Webmail
host 192.168.2.16
object network WebmailSecure
host 192.168.2.16
The flows from email server ( 192.168.2.7 ) , will be NATed to 10.10.10.74, only if the source port is TCP/25. Any other souce port will use the interface IP for NAT.
Are you saying that this is not happening ?
Dan -
STATIC IP issues from outside of firewall
Hi
I’m having one issue, we have static IP and we NAT the same to some local IP for our internal needs. Whenever we tried to reach the static IP from outside of firewall(some other network), it is working properly. But when we try to ping or use that static IP in internal LAN that is not working.
192.168.0.149 is internal LAN I have NAT to 202.xxx.xxx.xxx static IP with port 80.
Please help me on this.
here is the device running configuration
Result of the command: "show running-config"
: Saved
ASA Version 9.1(3)
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
names
ip local pool clientpool 192.168.0.20-192.168.0.50 mask 255.255.255.0
interface GigabitEthernet0/0
nameif inside
security-level 100
ip address 192.168.0.5 255.255.255.0
interface GigabitEthernet0/1
nameif outside
security-level 0
ip address 202.53.82.98 255.255.255.240
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
interface Management0/0
management-only
nameif management
security-level 100
ip address 192.168.5.1 255.255.255.0
ftp mode passive
dns domain-lookup outside
dns server-group PW
name-server 202.53.64.202
name-server 202.53.72.13
name-server 192.168.0.16
name-server 192.168.0.8
same-security-traffic permit intra-interface
object network PW-LAN
subnet 192.168.0.0 255.255.255.0
object network USA
subnet 192.168.2.0 255.255.255.0
object network 202.53.82.110
host 202.53.82.110
object network PWHYD
subnet 192.168.1.0 255.255.255.0
object network 192.168.0.151
host 192.168.0.151
object network 192.168.0.154
host 192.168.0.154
object network 192.168.0.156
host 192.168.0.156
object network 192.168.0.158
host 192.168.0.158
object network 192.168.0.159
host 192.168.0.159
object network 192.168.0.149
host 192.168.0.149
object network Rackspace
subnet 10.176.0.0 255.240.0.0
object network NETWORK_OBJ_10.176.0.0_12
subnet 10.176.0.0 255.240.0.0
object network 192.168.0.147_http
host 192.168.0.147
object service http
service tcp source eq www destination eq www
object network 192.168.0.14
host 192.168.0.14
object network 192.168.0.14_iCA
host 192.168.0.14
object network 192.168.0.159_http
host 192.168.0.159
object network 192.168.0.159_50100
host 192.168.0.159
object network 202.53.82.101
host 202.53.82.101
object network 192.168.0.159_8001
host 192.168.0.159
object network 192.168.0.192
host 192.168.0.192
object network 192.168.0.159_any
host 192.168.0.159
object network clientpool
range 192.168.0.20 192.168.0.50
object network NETWORK_OBJ_192.168.1.0_24
subnet 192.168.1.0 255.255.255.0
object network 192.168.0.192_DEV
host 192.168.0.192
object-group network PW-All-Sites
network-object 192.168.0.0 255.255.255.0
network-object object PWHYD
network-object object USA
network-object object clientpool
access-list 100 extended permit ip any any
access-list 100 extended permit icmp any any
access-list l2l-list extended permit ip object-group PW-All-Sites 192.168.2.0 255.255.255.0
access-list outside_access_in extended permit ip any any
access-list outside_cryptomap extended permit ip object-group PW-All-Sites 192.168.1.0 255.255.255.0
access-list PW-VPN-Tunnel-ACL standard permit 192.168.0.0 255.255.255.0
access-list PW-VPN-Tunnel-ACL standard permit 192.168.1.0 255.255.255.0
access-list PW-VPN-Tunnel-ACL standard permit 192.168.2.0 255.255.255.0
access-list PW-VPN-Tunnel-ACL standard permit 10.176.0.0 255.240.0.0
access-list outside_cryptomap_3 extended permit ip object-group PW-All-Sites object Rackspace
access-list inside_access_in extended permit ip any any
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu management 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static PW-LAN PW-LAN destination static Rackspace Rackspace
nat (inside,outside) source static PW-LAN PW-LAN destination static PWHYD PWHYD
nat (inside,outside) source static PW-LAN PW-LAN destination static USA USA
nat (inside,outside) source dynamic PW-LAN interface
nat (any,inside) source dynamic clientpool interface
object network 192.168.0.151
nat (any,any) static 202.53.82.102 service tcp 3200 3200
object network 192.168.0.154
nat (any,any) static 202.53.82.104 service tcp 3201 3201
object network 192.168.0.156
nat (any,any) static 202.53.82.107 service tcp 3201 3201
object network 192.168.0.158
nat (any,any) static 202.53.82.109 service tcp 3222 3222
object network 192.168.0.159
nat (any,any) static 202.53.82.101 service tcp 3201 3201
object network 192.168.0.149
nat (inside,outside) static 202.53.82.100 service tcp www www
object network 192.168.0.147_http
nat (any,any) static 202.53.82.110 service tcp www www
object network 192.168.0.14
nat (any,any) static 202.53.82.99 service tcp https https
object network 192.168.0.14_iCA
nat (any,any) static 202.53.82.99 service tcp citrix-ica citrix-ica
object network 192.168.0.159_50100
nat (any,any) static 202.53.82.101 service tcp 50100 50100
object network 192.168.0.159_8001
nat (any,any) static 202.53.82.101 service tcp 8001 8001
object network 192.168.0.192_DEV
nat (any,any) static 202.53.82.106 service tcp 3201 3201
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 202.53.82.97 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server PW protocol radius
aaa-server PW (inside) host 192.168.0.16
key *****
user-identity default-domain LOCAL
http server enable
http 192.168.5.0 255.255.255.0 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set pwset esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set pwsethyd esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set RackspaceSet esp-3des esp-sha-hmac
crypto ipsec ikev2 ipsec-proposal RackSpaceSecure
protocol esp encryption 3des
protocol esp integrity sha-1
crypto ipsec ikev2 ipsec-proposal pwhydsetsecure
protocol esp encryption 3des
protocol esp integrity sha-1
crypto ipsec ikev2 ipsec-proposal secure
protocol esp encryption aes 3des des
protocol esp integrity sha-1
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto ipsec security-association replay disable
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map outsidemap 1 match address l2l-list
crypto map outsidemap 1 set peer 63.82.1.98
crypto map outsidemap 1 set ikev1 transform-set pwset
crypto map outsidemap 1 set ikev2 ipsec-proposal secure
crypto map outsidemap 2 match address outside_cryptomap
crypto map outsidemap 2 set pfs
crypto map outsidemap 2 set peer 115.119.186.194
crypto map outsidemap 2 set ikev1 transform-set pwsethyd
crypto map outsidemap 3 match address outside_cryptomap_3
crypto map outsidemap 3 set peer 67.192.250.53
crypto map outsidemap 3 set ikev1 transform-set RackspaceSet
crypto map outsidemap 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outsidemap interface outside
crypto ca trustpoint ASDM_TrustPoint0
crl configure
crypto ca trustpoint ASDM_TrustPoint1
crl configure
crypto ca trustpoint ASDM_TrustPoint2
enrollment terminal
fqdn vpn.processweaver.com
subject-name CN=vpn.processweaver.com,OU=PWIT,O="ProcessWeaver,Inc",C=US,St=California,L=Fremont
keypair ciscovpn.key
no validation-usage
crl configure
crypto ca trustpoint ASDM_TrustPoint3
enrollment terminal
crl configure
crypto ca trustpoint ASDM_TrustPoint4
enrollment terminal
crl configure
crypto ca trustpool policy
crypto ca certificate chain ASDM_TrustPoint2
certificate ca 47869fe5
3082046a 30820352 a0030201 02020447 869fe530 0d06092a 864886f7 0d010105
05003048 310b3009 06035504 06130255 53312030 1e060355 040a1317 53656375
72655472 75737420 436f7270 6f726174 696f6e31 17301506 03550403 130e5365
63757265 54727573 74204341 301e170d 30383132 32323233 34373339 5a170d32
38313232 32323334 3733395a 3081ae31 0b300906 03550406 13025553 3111300f
06035504 08130849 6c6c696e 6f697331 10300e06 03550407 13074368 69636167
6f312130 1f060355 040a1318 54727573 74776176 6520486f 6c64696e 67732c20
496e632e 31363034 06035504 03132d54 72757374 77617665 204f7267 616e697a
6174696f 6e205661 6c696461 74696f6e 2043412c 204c6576 656c2032 311f301d
06092a86 4886f70d 01090116 10636140 74727573 74776176 652e636f 6d308201
22300d06 092a8648 86f70d01 01010500 0382010f 00308201 0a028201 0100e814
eea0da97 bd89bd0c cc8ddf08 fb060983 a823515b 013f34da 1f1f6ec1 e35865cb
0af9f387 c8c8faa1 ccf574e2 b8ae2d06 8480286f 5ac1225c 929442cd 1902125c
10627ea2 44fb165e 9c72b1ac ea04e615 aa99e85a f858b987 24e875cd 2588e258
925e8683 7f8a2353 ae8ae8a3 217e83af 40091849 afe1d05a b04f6fe2 31adf4f1
371fc92a e18bd68c 1231d427 1adfea6b 9e7853ed 9a19b0ce 45445b1b ef645921
fac7b7d1 d30c1ecb 88dafd23 3ff4ac2b a04d61d3 becade19 616124f1 f69cb496
bd9deb17 9f243978 e92350d3 015077d8 52642f3e 194f75b9 17b1da8d e0d0eddb
3713dc2f e05f8068 d7f487ba c11f1278 d0082717 7a98a69f d221ba4e 87bf0203
010001a3 81f43081 f1300f06 03551d13 0101ff04 05300301 01ff301d 0603551d
0e041604 145dd996 9a40c727 cb2c9ba2 eccf19ab c8afcc86 48301f06 03551d23
04183016 80144232 b616fa04 fdfe5d4b 7ac3fdf7 4c401d5a 43af300b 0603551d
0f040403 02010630 34060355 1d1f042d 302b3029 a027a025 86236874 74703a2f
2f63726c 2e736563 75726574 72757374 2e636f6d 2f535443 412e6372 6c305b06
03551d20 04543052 300c060a 2b060104 0181ed18 03003042 060f2b06 01040181
ed180303 03030404 03302f30 2d06082b 06010505 07020116 21687474 703a2f2f
7777772e 73656375 72657472 7573742e 636f6d2f 6c656761 6c2f300d 06092a86
4886f70d 01010505 00038201 010053f1 c8a017ec 6c8882b1 c024afd1 0858b32c
6f7bc15c 89926f88 fc4bc002 50932f5a 419859b6 e37f8c14 63777d45 3c88505e
a6815200 c8c5fe48 ee1f5dad de440b42 589ce167 5c43b6a0 8598ff16 d41a28be
76e12fe1 84f47eb9 27aa77cb 36b3fec3 fad217f6 e1624ed3 ccccb319 65d34ba8
e8b3d54c eaf64eae cbae3448 1f60cc58 e7e774c9 0135fd6a e0588ad2 16ebece9
3ebbf01d cfb6ff1e 0cb7bb39 e9b7981b c05221eb 3a3d7838 8ca9195f 27a4d07f
3661ab24 7e9ff82d 3f922963 becb10db 0d403602 a0d417a2 8d7f7e7c 99af455a
40cda26b 5cbe0ef3 d387fca1 10caaa33 b7ba4bc0 3da4218c 179ccfd8 bfe657fe
cdebfa30 1ad5fee8 2597a9be 3bea
quit
certificate 0649f9a965553e7df2709c06c4da1b09e17cd9
30820510 308203f8 a0030201 02021306 49f9a965 553e7df2 709c06c4 da1b09e1
7cd9300d 06092a86 4886f70d 01010505 003081ae 310b3009 06035504 06130255
53311130 0f060355 04081308 496c6c69 6e6f6973 3110300e 06035504 07130743
68696361 676f3121 301f0603 55040a13 18547275 73747761 76652048 6f6c6469
6e67732c 20496e63 2e313630 34060355 0403132d 54727573 74776176 65204f72
67616e69 7a617469 6f6e2056 616c6964 6174696f 6e204341 2c204c65 76656c20
32311f30 1d06092a 864886f7 0d010901 16106361 40747275 73747761 76652e63
6f6d301e 170d3134 30363131 30353330 33355a17 0d313530 32323331 31333033
355a3070 311e301c 06035504 030c1576 706e2e70 726f6365 73737765 61766572
2e636f6d 31163014 06035504 0a0c0d50 726f6365 73735765 61766572 31143012
06035504 070c0b53 616e7461 20436c61 72613113 30110603 5504080c 0a43616c
69666f72 6e696131 0b300906 03550406 13025553 30820122 300d0609 2a864886
f70d0101 01050003 82010f00 3082010a 02820101 00cc194c fbdd63f5 0b49141a
9d21063f a13136df e524cef9 c55e9331 e6c5bc67 43361421 cafb7dc1 d244942e
6fd02ee7 198e7f7e 48ca62c2 1c8e1a8e 20431d42 b24103f1 5fad9287 9f9dc2da
5002e0b4 cf14b414 31e0e691 26cfbc0c 1ee09d6d 8176a63d 6ad81c30 b2b69dbe
59ce7092 44c09e62 27f20c58 8bd8e38a a3d75a94 94bbca6f 7ad87b93 3892ddb0
3f00a693 e05b5fe8 7a71d36c 223e1ded 8afb8ee4 1eea579c 53d964df 467694e9
b7ffe4f9 22c6dd5e 33d0ffee 9fd57fed 621c62f1 4dc6f14e 6518de53 c2fd7d5d
b37913b8 69211fe5 e194a6bf f60bc88a 343a93dc 34526931 b41566e3 f38f219f
9a6cefd5 d6d60002 2442b3e5 b4096717 2ffea23d b1020301 0001a382 01623082
015e300b 0603551d 0f040403 0205a030 1d060355 1d250416 30140608 2b060105
05070302 06082b06 01050507 0301301d 0603551d 0e041604 14cd47cf 646a8932
7cecb024 9fd2a31a b54d73dc c0301f06 03551d23 04183016 80145dd9 969a40c7
27cb2c9b a2eccf19 abc8afcc 86483048 0603551d 20044130 3f303d06 0f2b0601
040181ed 18030303 03040403 302a3028 06082b06 01050507 0201161c 68747470
733a2f2f 73736c2e 74727573 74776176 652e636f 6d2f4341 30370603 551d1104
30302e82 1576706e 2e70726f 63657373 77656176 65722e63 6f6d8215 7774732e
70726f63 65737377 65617665 722e636f 6d303506 03551d1f 042e302c 302aa028
a0268624 68747470 3a2f2f63 726c2e74 72757374 77617665 2e636f6d 2f4f5643
415f4c32 2e63726c 30360608 2b060105 05070101 042a3028 30260608 2b060105
05073001 861a6874 74703a2f 2f6f6373 702e7472 75737477 6176652e 636f6d2f
300d0609 2a864886 f70d0101 05050003 82010100 0785070e 045d6201 3ffc49b5
88808587 b6418d0e 87dc7ae8 3204563b 6e51ff93 25e8ad7a 9a11d439 2439a533
768477ca 902fdfbe f0c58a04 e15bf6a5 63829d4b a36c7ccc 0af9532b f39ec31d
21cd6b74 d3adffc2 5f8ee1c4 92c07ac6 ab547346 c740f477 857a82fd 897029d5
1cfa9b55 b1064ab7 1274556c 6a14f7a8 b8705cd4 51d6b7f4 0a024f6d 1818918c
0cb15bc5 cd301684 38c2dcb8 2585b44c 18808e1b 823a6043 28da0194 280fa6c9
80831cbc 1179be24 fc391e54 965761e5 e51031e1 0c76c65f 187922d0 96be80c9
3de9a56e 41d0fd3f 76afaf49 4bc4ff4c 213aa474 60a742ba 2a8fb3bd c9349da3
1ac96b24 7b99cba5 a28c6647 7803cf2c ee70540c
quit
crypto ikev2 policy 10
encryption 3des
integrity sha
group 2
prf sha
lifetime seconds 28800
crypto ikev2 enable outside
crypto ikev2 remote-access trustpoint ASDM_TrustPoint2
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 28800
telnet timeout 5
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
dhcpd address 192.168.5.2-192.168.5.254 management
dhcpd enable management
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl trust-point ASDM_TrustPoint2 outside
webvpn
enable outside
anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
anyconnect enable
tunnel-group-list enable
group-policy GroupPolicy_PWSSL internal
group-policy GroupPolicy_PWSSL attributes
wins-server none
dns-server value 192.168.0.16
vpn-tunnel-protocol ssl-client
split-tunnel-policy tunnelspecified
split-tunnel-network-list value PW-VPN-Tunnel-ACL
default-domain value processw.local
webvpn
anyconnect keep-installer none
group-policy GroupPolicy_115.119.186.194 internal
group-policy GroupPolicy_115.119.186.194 attributes
vpn-tunnel-protocol ikev1 l2tp-ipsec
group-policy GroupPolicy_67.192.250.53 internal
group-policy GroupPolicy_67.192.250.53 attributes
vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless
group-policy pw internal
group-policy pw attributes
dns-server value 192.168.0.16
vpn-tunnel-protocol ikev1 ikev2
split-tunnel-policy tunnelspecified
split-tunnel-network-list value PW-VPN-Tunnel-ACL
default-domain none
username rajuvaradha password 6biM7HbMtaadT82k encrypted
username e172 password E1abOIw/eu.DKO/y encrypted
username e150 password dJMsBQfrQRISuR8n encrypted
username e134 password bLBixKKCoH5Udlk9 encrypted
username e182 password mirFopEi/OG0LT4d encrypted
username e192 password u2P6WXLa1k8.kA1w encrypted
username e184 password Rpt/S1N6et6Xwi7W encrypted
username u033 password pS5QN8QLvYFHJfoK encrypted
username u011 password HGFsDnR5XiFAzrcE encrypted
username u010 password 5R8mktMpyUYPCpTO encrypted
username u032 password rst8O1b/yrXsKVmu encrypted
username u002 password .u2izEtqOIC5D2fT encrypted
username admin password eY/fQXw7Ure8Qrz7 encrypted
username u012 password JClYI3r7x0T/ed26 encrypted
username u015 password 6tNvtB4hPcUNDyhE encrypted
username u014 password Wy6x8dPcSnMcAT1v encrypted
username u017 password xahCXrBaZWzW8aEp encrypted
username u006 password BCEOAmlRL6CbQfTV encrypted
username e006 password DG96SZQ2gBqIXEYv encrypted
username e034 password 1sG72DUjsY7nt81V encrypted
username u007 password vtcK6xerueHvqZJZ encrypted
username u016 password pZgySMnraNBlTTnL encrypted
username u025 password ulAXIX1u2.UD/KvT encrypted
username u008 password G4vmDF.mv3rXWa7h encrypted
username u019 password NxlycJwroZrzCSJ3 encrypted
username e019 password E9NaUPs18c0.PBnd encrypted
username u018 password 33CghGQSMjbWDfdb encrypted
username u009 password uaaSLEu55XXbD5Sr encrypted
username u028 password UMFMzXMs6He7.zR8 encrypted
username e097 password .UawdlGNiYnRHnzF encrypted
username e314 password ye2/LpVufAXvAUJ6 encrypted
username e327 password 6mKef3HGlnyb6hnu encrypted
username e343 password 0g33Wbvzi.NL1PjH encrypted
username e222 password e0.SFEwm1RqC6lLj encrypted
username e289 password /YrO2mEvMUr9zxq3 encrypted
username e201 password Eox2TB.HgdkKLuec encrypted
username e265 password fTk7Vxw0Z06AAbHi encrypted
username e251 password 6y7YjKQO1rP3nAQG encrypted
username e219 password p049Lf7jFLisN6UJ encrypted
username e269 password v7oFefIpmPGd307D encrypted
tunnel-group 63.82.1.98 type ipsec-l2l
tunnel-group 63.82.1.98 ipsec-attributes
ikev1 pre-shared-key *****
tunnel-group pw type remote-access
tunnel-group pw general-attributes
address-pool clientpool
default-group-policy pw
tunnel-group pw ipsec-attributes
ikev1 pre-shared-key *****
tunnel-group 115.119.186.194 type ipsec-l2l
tunnel-group 115.119.186.194 general-attributes
default-group-policy GroupPolicy_115.119.186.194
tunnel-group 115.119.186.194 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
tunnel-group 67.192.250.53 type ipsec-l2l
tunnel-group 67.192.250.53 general-attributes
default-group-policy GroupPolicy_67.192.250.53
tunnel-group 67.192.250.53 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
tunnel-group PWSSL type remote-access
tunnel-group PWSSL general-attributes
address-pool clientpool
authentication-server-group PW LOCAL
default-group-policy GroupPolicy_PWSSL
tunnel-group PWSSL webvpn-attributes
group-alias PWSSL enable
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
service-policy global_policy global
prompt hostname context
call-home reporting anonymous prompt 1
Cryptochecksum:80663f0c45d0a6736344cf989a7af706
: endHi Marius,
Thanks for your suggestion
i have followed the same, but i'm still not able to access the static IP internal LAN. here is the running config out put.
Result of the command: "show running-config"
: Saved
ASA Version 9.1(3)
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
names
ip local pool clientpool 192.168.0.20-192.168.0.50 mask 255.255.255.0
interface GigabitEthernet0/0
nameif inside
security-level 100
ip address 192.168.0.5 255.255.255.0
interface GigabitEthernet0/1
nameif outside
security-level 0
ip address 202.53.82.98 255.255.255.240
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
interface Management0/0
management-only
nameif management
security-level 100
ip address 192.168.5.1 255.255.255.0
ftp mode passive
dns domain-lookup outside
dns server-group PW
name-server 202.53.64.202
name-server 202.53.72.13
name-server 192.168.0.16
name-server 192.168.0.8
same-security-traffic permit intra-interface
object network PW-LAN
subnet 192.168.0.0 255.255.255.0
object network USA
subnet 192.168.2.0 255.255.255.0
object network 202.53.82.110
host 202.53.82.110
object network PWHYD
subnet 192.168.1.0 255.255.255.0
object network 192.168.0.151
host 192.168.0.151
object network 192.168.0.154
host 192.168.0.154
object network 192.168.0.156
host 192.168.0.156
object network 192.168.0.158
host 192.168.0.158
object network 192.168.0.159
host 192.168.0.159
object network 192.168.0.149
host 192.168.0.149
object network Rackspace
subnet 10.176.0.0 255.240.0.0
object network NETWORK_OBJ_10.176.0.0_12
subnet 10.176.0.0 255.240.0.0
object network 192.168.0.147_http
host 192.168.0.147
object service http
service tcp source eq www destination eq www
object network 192.168.0.14
host 192.168.0.14
object network 192.168.0.14_iCA
host 192.168.0.14
object network 192.168.0.159_http
host 192.168.0.159
object network 192.168.0.159_50100
host 192.168.0.159
object network 202.53.82.101
host 202.53.82.101
object network 192.168.0.159_8001
host 192.168.0.159
object network 192.168.0.192
host 192.168.0.192
object network 192.168.0.159_any
host 192.168.0.159
object network clientpool
range 192.168.0.20 192.168.0.50
object network NETWORK_OBJ_192.168.1.0_24
subnet 192.168.1.0 255.255.255.0
object network 192.168.0.192_DEV
host 192.168.0.192
object network 202.53.82.100
host 202.53.82.100
object network 149
host 192.168.0.149
object-group network PW-All-Sites
network-object 192.168.0.0 255.255.255.0
network-object object PWHYD
network-object object USA
network-object object clientpool
access-list 100 extended permit ip any any
access-list 100 extended permit icmp any any
access-list l2l-list extended permit ip object-group PW-All-Sites 192.168.2.0 255.255.255.0
access-list outside_access_in extended permit ip any any
access-list outside_cryptomap extended permit ip object-group PW-All-Sites 192.168.1.0 255.255.255.0
access-list PW-VPN-Tunnel-ACL standard permit 192.168.0.0 255.255.255.0
access-list PW-VPN-Tunnel-ACL standard permit 192.168.1.0 255.255.255.0
access-list PW-VPN-Tunnel-ACL standard permit 192.168.2.0 255.255.255.0
access-list PW-VPN-Tunnel-ACL standard permit 10.176.0.0 255.240.0.0
access-list outside_cryptomap_3 extended permit ip object-group PW-All-Sites object Rackspace
access-list inside_access_in extended permit ip any any
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu management 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static PW-LAN PW-LAN destination static Rackspace Rackspace
nat (inside,outside) source static PW-LAN PW-LAN destination static PWHYD PWHYD
nat (inside,outside) source static PW-LAN PW-LAN destination static USA USA
nat (inside,outside) source dynamic PW-LAN interface
nat (any,inside) source dynamic clientpool interface
nat (inside,inside) source static PW-LAN PW-LAN destination static 192.168.0.149 202.53.82.100
object network 192.168.0.151
nat (any,any) static 202.53.82.102 service tcp 3200 3200
object network 192.168.0.154
nat (any,any) static 202.53.82.104 service tcp 3201 3201
object network 192.168.0.156
nat (any,any) static 202.53.82.107 service tcp 3201 3201
object network 192.168.0.158
nat (any,any) static 202.53.82.109 service tcp 3222 3222
object network 192.168.0.159
nat (any,any) static 202.53.82.101 service tcp 3201 3201
object network 192.168.0.147_http
nat (any,any) static 202.53.82.110 service tcp www www
object network 192.168.0.14
nat (any,any) static 202.53.82.99 service tcp https https
object network 192.168.0.14_iCA
nat (any,any) static 202.53.82.99 service tcp citrix-ica citrix-ica
object network 192.168.0.159_50100
nat (any,any) static 202.53.82.101 service tcp 50100 50100
object network 192.168.0.159_8001
nat (any,any) static 202.53.82.101 service tcp 8001 8001
object network 192.168.0.192_DEV
nat (any,any) static 202.53.82.106 service tcp 3201 3201
object network 149
nat (any,any) static 202.53.82.100 service tcp www www
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 202.53.82.97 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server PW protocol radius
aaa-server PW (inside) host 192.168.0.16
key *****
user-identity default-domain LOCAL
http server enable
http 192.168.5.0 255.255.255.0 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set pwset esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set pwsethyd esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set RackspaceSet esp-3des esp-sha-hmac
crypto ipsec ikev2 ipsec-proposal RackSpaceSecure
protocol esp encryption 3des
protocol esp integrity sha-1
crypto ipsec ikev2 ipsec-proposal pwhydsetsecure
protocol esp encryption 3des
protocol esp integrity sha-1
crypto ipsec ikev2 ipsec-proposal secure
protocol esp encryption aes 3des des
protocol esp integrity sha-1
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto ipsec security-association replay disable
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map outsidemap 1 match address l2l-list
crypto map outsidemap 1 set peer 63.82.1.98
crypto map outsidemap 1 set ikev1 transform-set pwset
crypto map outsidemap 1 set ikev2 ipsec-proposal secure
crypto map outsidemap 2 match address outside_cryptomap
crypto map outsidemap 2 set pfs
crypto map outsidemap 2 set peer 115.119.186.194
crypto map outsidemap 2 set ikev1 transform-set pwsethyd
crypto map outsidemap 3 match address outside_cryptomap_3
crypto map outsidemap 3 set peer 67.192.250.53
crypto map outsidemap 3 set ikev1 transform-set RackspaceSet
crypto map outsidemap 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outsidemap interface outside
crypto ca trustpoint ASDM_TrustPoint0
crl configure
crypto ca trustpoint ASDM_TrustPoint1
crl configure
crypto ca trustpoint ASDM_TrustPoint2
enrollment terminal
fqdn vpn.processweaver.com
subject-name CN=vpn.processweaver.com,OU=PWIT,O="ProcessWeaver,Inc",C=US,St=California,L=Fremont
keypair ciscovpn.key
no validation-usage
crl configure
crypto ca trustpoint ASDM_TrustPoint3
enrollment terminal
crl configure
crypto ca trustpoint ASDM_TrustPoint4
enrollment terminal
crl configure
crypto ca trustpool policy
crypto ca certificate chain ASDM_TrustPoint2
certificate ca 47869fe5
3082046a 30820352 a0030201 02020447 869fe530 0d06092a 864886f7 0d010105
05003048 310b3009 06035504 06130255 53312030 1e060355 040a1317 53656375
72655472 75737420 436f7270 6f726174 696f6e31 17301506 03550403 130e5365
63757265 54727573 74204341 301e170d 30383132 32323233 34373339 5a170d32
38313232 32323334 3733395a 3081ae31 0b300906 03550406 13025553 3111300f
06035504 08130849 6c6c696e 6f697331 10300e06 03550407 13074368 69636167
6f312130 1f060355 040a1318 54727573 74776176 6520486f 6c64696e 67732c20
496e632e 31363034 06035504 03132d54 72757374 77617665 204f7267 616e697a
6174696f 6e205661 6c696461 74696f6e 2043412c 204c6576 656c2032 311f301d
06092a86 4886f70d 01090116 10636140 74727573 74776176 652e636f 6d308201
22300d06 092a8648 86f70d01 01010500 0382010f 00308201 0a028201 0100e814
eea0da97 bd89bd0c cc8ddf08 fb060983 a823515b 013f34da 1f1f6ec1 e35865cb
0af9f387 c8c8faa1 ccf574e2 b8ae2d06 8480286f 5ac1225c 929442cd 1902125c
10627ea2 44fb165e 9c72b1ac ea04e615 aa99e85a f858b987 24e875cd 2588e258
925e8683 7f8a2353 ae8ae8a3 217e83af 40091849 afe1d05a b04f6fe2 31adf4f1
371fc92a e18bd68c 1231d427 1adfea6b 9e7853ed 9a19b0ce 45445b1b ef645921
fac7b7d1 d30c1ecb 88dafd23 3ff4ac2b a04d61d3 becade19 616124f1 f69cb496
bd9deb17 9f243978 e92350d3 015077d8 52642f3e 194f75b9 17b1da8d e0d0eddb
3713dc2f e05f8068 d7f487ba c11f1278 d0082717 7a98a69f d221ba4e 87bf0203
010001a3 81f43081 f1300f06 03551d13 0101ff04 05300301 01ff301d 0603551d
0e041604 145dd996 9a40c727 cb2c9ba2 eccf19ab c8afcc86 48301f06 03551d23
04183016 80144232 b616fa04 fdfe5d4b 7ac3fdf7 4c401d5a 43af300b 0603551d
0f040403 02010630 34060355 1d1f042d 302b3029 a027a025 86236874 74703a2f
2f63726c 2e736563 75726574 72757374 2e636f6d 2f535443 412e6372 6c305b06
03551d20 04543052 300c060a 2b060104 0181ed18 03003042 060f2b06 01040181
ed180303 03030404 03302f30 2d06082b 06010505 07020116 21687474 703a2f2f
7777772e 73656375 72657472 7573742e 636f6d2f 6c656761 6c2f300d 06092a86
4886f70d 01010505 00038201 010053f1 c8a017ec 6c8882b1 c024afd1 0858b32c
6f7bc15c 89926f88 fc4bc002 50932f5a 419859b6 e37f8c14 63777d45 3c88505e
a6815200 c8c5fe48 ee1f5dad de440b42 589ce167 5c43b6a0 8598ff16 d41a28be
76e12fe1 84f47eb9 27aa77cb 36b3fec3 fad217f6 e1624ed3 ccccb319 65d34ba8
e8b3d54c eaf64eae cbae3448 1f60cc58 e7e774c9 0135fd6a e0588ad2 16ebece9
3ebbf01d cfb6ff1e 0cb7bb39 e9b7981b c05221eb 3a3d7838 8ca9195f 27a4d07f
3661ab24 7e9ff82d 3f922963 becb10db 0d403602 a0d417a2 8d7f7e7c 99af455a
40cda26b 5cbe0ef3 d387fca1 10caaa33 b7ba4bc0 3da4218c 179ccfd8 bfe657fe
cdebfa30 1ad5fee8 2597a9be 3bea
quit
certificate 0649f9a965553e7df2709c06c4da1b09e17cd9
30820510 308203f8 a0030201 02021306 49f9a965 553e7df2 709c06c4 da1b09e1
7cd9300d 06092a86 4886f70d 01010505 003081ae 310b3009 06035504 06130255
53311130 0f060355 04081308 496c6c69 6e6f6973 3110300e 06035504 07130743
68696361 676f3121 301f0603 55040a13 18547275 73747761 76652048 6f6c6469
6e67732c 20496e63 2e313630 34060355 0403132d 54727573 74776176 65204f72
67616e69 7a617469 6f6e2056 616c6964 6174696f 6e204341 2c204c65 76656c20
32311f30 1d06092a 864886f7 0d010901 16106361 40747275 73747761 76652e63
6f6d301e 170d3134 30363131 30353330 33355a17 0d313530 32323331 31333033
355a3070 311e301c 06035504 030c1576 706e2e70 726f6365 73737765 61766572
2e636f6d 31163014 06035504 0a0c0d50 726f6365 73735765 61766572 31143012
06035504 070c0b53 616e7461 20436c61 72613113 30110603 5504080c 0a43616c
69666f72 6e696131 0b300906 03550406 13025553 30820122 300d0609 2a864886
f70d0101 01050003 82010f00 3082010a 02820101 00cc194c fbdd63f5 0b49141a
9d21063f a13136df e524cef9 c55e9331 e6c5bc67 43361421 cafb7dc1 d244942e
6fd02ee7 198e7f7e 48ca62c2 1c8e1a8e 20431d42 b24103f1 5fad9287 9f9dc2da
5002e0b4 cf14b414 31e0e691 26cfbc0c 1ee09d6d 8176a63d 6ad81c30 b2b69dbe
59ce7092 44c09e62 27f20c58 8bd8e38a a3d75a94 94bbca6f 7ad87b93 3892ddb0
3f00a693 e05b5fe8 7a71d36c 223e1ded 8afb8ee4 1eea579c 53d964df 467694e9
b7ffe4f9 22c6dd5e 33d0ffee 9fd57fed 621c62f1 4dc6f14e 6518de53 c2fd7d5d
b37913b8 69211fe5 e194a6bf f60bc88a 343a93dc 34526931 b41566e3 f38f219f
9a6cefd5 d6d60002 2442b3e5 b4096717 2ffea23d b1020301 0001a382 01623082
015e300b 0603551d 0f040403 0205a030 1d060355 1d250416 30140608 2b060105
05070302 06082b06 01050507 0301301d 0603551d 0e041604 14cd47cf 646a8932
7cecb024 9fd2a31a b54d73dc c0301f06 03551d23 04183016 80145dd9 969a40c7
27cb2c9b a2eccf19 abc8afcc 86483048 0603551d 20044130 3f303d06 0f2b0601
040181ed 18030303 03040403 302a3028 06082b06 01050507 0201161c 68747470
733a2f2f 73736c2e 74727573 74776176 652e636f 6d2f4341 30370603 551d1104
30302e82 1576706e 2e70726f 63657373 77656176 65722e63 6f6d8215 7774732e
70726f63 65737377 65617665 722e636f 6d303506 03551d1f 042e302c 302aa028
a0268624 68747470 3a2f2f63 726c2e74 72757374 77617665 2e636f6d 2f4f5643
415f4c32 2e63726c 30360608 2b060105 05070101 042a3028 30260608 2b060105
05073001 861a6874 74703a2f 2f6f6373 702e7472 75737477 6176652e 636f6d2f
300d0609 2a864886 f70d0101 05050003 82010100 0785070e 045d6201 3ffc49b5
88808587 b6418d0e 87dc7ae8 3204563b 6e51ff93 25e8ad7a 9a11d439 2439a533
768477ca 902fdfbe f0c58a04 e15bf6a5 63829d4b a36c7ccc 0af9532b f39ec31d
21cd6b74 d3adffc2 5f8ee1c4 92c07ac6 ab547346 c740f477 857a82fd 897029d5
1cfa9b55 b1064ab7 1274556c 6a14f7a8 b8705cd4 51d6b7f4 0a024f6d 1818918c
0cb15bc5 cd301684 38c2dcb8 2585b44c 18808e1b 823a6043 28da0194 280fa6c9
80831cbc 1179be24 fc391e54 965761e5 e51031e1 0c76c65f 187922d0 96be80c9
3de9a56e 41d0fd3f 76afaf49 4bc4ff4c 213aa474 60a742ba 2a8fb3bd c9349da3
1ac96b24 7b99cba5 a28c6647 7803cf2c ee70540c
quit
crypto ikev2 policy 10
encryption 3des
integrity sha
group 2
prf sha
lifetime seconds 28800
crypto ikev2 enable outside
crypto ikev2 remote-access trustpoint ASDM_TrustPoint2
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 28800
telnet timeout 5
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
dhcpd address 192.168.5.2-192.168.5.254 management
dhcpd enable management
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl trust-point ASDM_TrustPoint2 outside
webvpn
enable outside
anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
anyconnect enable
tunnel-group-list enable
group-policy GroupPolicy_PWSSL internal
group-policy GroupPolicy_PWSSL attributes
wins-server none
dns-server value 192.168.0.16
vpn-tunnel-protocol ssl-client
split-tunnel-policy tunnelspecified
split-tunnel-network-list value PW-VPN-Tunnel-ACL
default-domain value processw.local
webvpn
anyconnect keep-installer none
group-policy GroupPolicy_115.119.186.194 internal
group-policy GroupPolicy_115.119.186.194 attributes
vpn-tunnel-protocol ikev1 l2tp-ipsec
group-policy GroupPolicy_67.192.250.53 internal
group-policy GroupPolicy_67.192.250.53 attributes
vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless
group-policy pw internal
group-policy pw attributes
dns-server value 192.168.0.16
vpn-tunnel-protocol ikev1 ikev2
split-tunnel-policy tunnelspecified
split-tunnel-network-list value PW-VPN-Tunnel-ACL
default-domain none
username rajuvaradha password 6biM7HbMtaadT82k encrypted
username e172 password E1abOIw/eu.DKO/y encrypted
username e150 password dJMsBQfrQRISuR8n encrypted
username e134 password bLBixKKCoH5Udlk9 encrypted
username e182 password mirFopEi/OG0LT4d encrypted
username e192 password u2P6WXLa1k8.kA1w encrypted
username e184 password Rpt/S1N6et6Xwi7W encrypted
username u033 password pS5QN8QLvYFHJfoK encrypted
username u011 password HGFsDnR5XiFAzrcE encrypted
username u010 password 5R8mktMpyUYPCpTO encrypted
username u032 password rst8O1b/yrXsKVmu encrypted
username u002 password .u2izEtqOIC5D2fT encrypted
username admin password eY/fQXw7Ure8Qrz7 encrypted
username u012 password JClYI3r7x0T/ed26 encrypted
username u015 password 6tNvtB4hPcUNDyhE encrypted
username u014 password Wy6x8dPcSnMcAT1v encrypted
username u017 password xahCXrBaZWzW8aEp encrypted
username u006 password BCEOAmlRL6CbQfTV encrypted
username e006 password DG96SZQ2gBqIXEYv encrypted
username e034 password 1sG72DUjsY7nt81V encrypted
username u007 password vtcK6xerueHvqZJZ encrypted
username u016 password pZgySMnraNBlTTnL encrypted
username u025 password ulAXIX1u2.UD/KvT encrypted
username u008 password G4vmDF.mv3rXWa7h encrypted
username u019 password NxlycJwroZrzCSJ3 encrypted
username e019 password E9NaUPs18c0.PBnd encrypted
username u018 password 33CghGQSMjbWDfdb encrypted
username u009 password uaaSLEu55XXbD5Sr encrypted
username u028 password UMFMzXMs6He7.zR8 encrypted
username e097 password .UawdlGNiYnRHnzF encrypted
username e314 password ye2/LpVufAXvAUJ6 encrypted
username e327 password 6mKef3HGlnyb6hnu encrypted
username e343 password 0g33Wbvzi.NL1PjH encrypted
username e222 password e0.SFEwm1RqC6lLj encrypted
username e289 password /YrO2mEvMUr9zxq3 encrypted
username e201 password Eox2TB.HgdkKLuec encrypted
username e265 password fTk7Vxw0Z06AAbHi encrypted
username e251 password 6y7YjKQO1rP3nAQG encrypted
username e219 password p049Lf7jFLisN6UJ encrypted
username e269 password v7oFefIpmPGd307D encrypted
tunnel-group 63.82.1.98 type ipsec-l2l
tunnel-group 63.82.1.98 ipsec-attributes
ikev1 pre-shared-key *****
tunnel-group pw type remote-access
tunnel-group pw general-attributes
address-pool clientpool
default-group-policy pw
tunnel-group pw ipsec-attributes
ikev1 pre-shared-key *****
tunnel-group 115.119.186.194 type ipsec-l2l
tunnel-group 115.119.186.194 general-attributes
default-group-policy GroupPolicy_115.119.186.194
tunnel-group 115.119.186.194 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
tunnel-group 67.192.250.53 type ipsec-l2l
tunnel-group 67.192.250.53 general-attributes
default-group-policy GroupPolicy_67.192.250.53
tunnel-group 67.192.250.53 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
tunnel-group PWSSL type remote-access
tunnel-group PWSSL general-attributes
address-pool clientpool
authentication-server-group PW LOCAL
default-group-policy GroupPolicy_PWSSL
tunnel-group PWSSL webvpn-attributes
group-alias PWSSL enable
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
service-policy global_policy global
prompt hostname context
call-home reporting anonymous prompt 1
Cryptochecksum:3b6339b71a4cf924c7b30056a3e6fc31
: end -
Urgent!!! 1099 vendor reporting issues.
Hi SAP Gurus,
I have few issues on 1099 reporting I wonder if anyone could help address these below issues.
1. I did all the configuration for 1099 reporting on vendor master and I am running RFW1099M and RFIDYYWT programs to see the cleared vendor line items but I can see only few vendors cleared line items and the other vendors items are not getting displayed. I double checked the vendor master the settings are exactly the same except WH tax codes.
2. The 1099 Minimum amounts on the RFW1099M program doesn't seem to work coz it displays all the items which are less than the 1099 Minimum amounts mentioned in the selection screen for example it was mentioned $600 on selection screen of the Minimum amounts field now it displays items which are less than $600.
3. There are 9 specific Return types (Business specific) along with WH Tax codes and the combination of both leads to 1099 minimum amounts. How to achieve this requirement? for example see below.
Return,Type WH Tax code Description 1099 Minimum
1 1 Gross Dividends on Stock 10
1 7 Cash liquidation distributions 600
3 6 Mortgage interest received 600
6 1 Earnings from S&L, cr unions 10
Kind Regards,
BobHi Bob,
I am not sure whether its a Basis question. However, I found a similar forum with same issue. Please refer to below link
Report 1099 program(RFW1099M) issue
1099 report- program RFTW0010/RFTW0020
1099 vendors, S_PL0_09000314 - 1099-Misc
Regards,
Arjun -
Default values for static report parameters are not visible when scheduling
Hello
Crystal Reports 2008 Dev
Crystal Reports Server 2008
When I publish a report to the repository and then try to schedule that report, the default value that I have set for a static parameter in the report is not visible.
In the Parameters section of the Scheduling wizard this parameter is marked as [EMPTY]
However, when I View the report (right click and select View) from within Infoview, the parameter default value is visible
I have published in the following 3 ways:
Publishing Wizard
File > Save As > Enterprise from withing Crystal Reports Dev
CMC > Folders > Add > Crystal Reports
The results are the same for each method of publishing.
To try to eliminate any DB issues etc i have created a report that is not attached to a datasource.
This test report has one Static parameter.
I have set 3 values for its list: Entry A, Entry B, Entry C
Entry X is set as the parameter Default Value
The parameter is placed in the details section of the report
When the report is Viewed it will prompt for parameter entry, with the default value present
When I try to schedule the report is will not have an entry for its parameter
It seems to me that the default values for parameters should be retained from report design through to report schedule, especially when the default values are retained from report design to report View
Is this a config problem that i have ?
Can anyone help me with this ?
Best regards
Patrick Coote
Edited by: PATRICK COOTE on Oct 2, 2008 2:08 PM
Edited by: PATRICK COOTE on Oct 3, 2008 9:23 AMHi Robert
Thanks for the reply and apologies for not responding sooner.
What i have found is that if i use Publishing Wizard to upload reports it is then possible to set values for prompts during the last step of this process.
Although this is a bit clumsy, it is sufficient for now
Best regards
Patrick
Maybe you are looking for
-
HP 1606dn appcrash on win server 2012
Good morning/day/evening/night. I have printserver win2003 server. My printers shared there. When users of RDP sesion in 2012r2 server try to print some documents they get error: Problem signature: Problem Event Name: APPCRASH Application Name:
-
5.0.2 and GTX 480 / 470
Probably one for Adobe: The 5.0.2 update adds support for the GTX470 but not the GTX480 - I was a bit surprised that the 480 was missing as it seems to have a very similar architecture to the 470 but faster and more cores etc. Can anyone shed some li
-
Firefox 16.02 hardware acceleration osx imac started causing screen corruption
Weird screen corruption with Firefox 16.02 with hardware acceleration switched on. iMac 11,1 Intel Core i7 2.8 GHz running OSX 10.6.8 with ATI Radeon HD 4850 display hardware. Some bizarre effects like a surround on two sides (top and right) of main
-
Dear All, We are using SAP BW 3.5 with SAP R/3. 0Material Hierarchry is loaded from R/3. Extraction is successful. But when I see the detail tab in moniter, it shows red with node - Transfer (Idoc and TRFC): missing message. There are no details for
-
I used to have iPhoto on my powerbook, but now it is mysteriously AWOL. I would be happy to simply reinstall it; however, I can't seem to locate its installer on any of my OS DVDs. Anyone know where I can find an installer? PS: I have never had iLife