Dual NIC on ACS CSACS-1121-K9 Server for ACS V5.2

Is it possible to have Dual NIC on ACS v5.2 such as teaming or any else??
I am thinking of connecting the two NIC on the CSACS-1121-K9 appliance to two swtiches on the same network, but wondering if it will be possilble or not.
Can anyone help me regading this?? Please help me!!

No you can only use one nic on the ACS appliance.
http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.2/release/notes/acs_52_rn.html#wp190802
The extra ethernet port comes blocked.
Thanks,
Tarik

Similar Messages

  • Mac Mini dual core or Mac Mini quad core server for normal use ?

    Hello
    I am looking to replace my desktop work computer from my 2011 i7 quad core 2.0 MBP for a Mac Mini because it was actually made for desktop use and my minidisplayport - dvi adaptor just broke ( I think because to many unplugs and plugs from the laptop to the monitor ) .
    I work in Photoshop, Dreamweaver, Aptana, Netbeans, open 20 + tabs in chrome, firefox so I need a bit of performance
    I have no use for Mac OSX Server, I just want to be at least as fast as my MBP. I can see that the 999$ Mac mini has the same processor as my MBP ( 2.0GHz quad-core Intel Core i7 ) but no dedicated video card. Also, the 800$ Mac mini has a video card BUT just a dual core - 2.5GHz dual-core Intel Core i5 .
    What do you think I should get ? I don't play games, I have windows for that anyway. Would the dedicated video card make much of a difference ? ( does photoshop or mac use it much - openCL etc. )
    Thanks!

    You might also consider the Apple only available Mini
    which has a 2.7 GHz i7 dual core which has dedicated
    graphics. Also, all the 2011 i7 processors (Sandy Bridge)
    are hyperthreading.
    As for dedicated graphics, they are really only needed
    for high end gaming or 3D rendering apps.  It will
    make no difference with the software that you mention,
    as they are more CPU intensive.

  • GLBP and dual NIC server

    Hi, I'm testing GLBP across a VLAN on a pair of layer 3 6500 server farm collapsed access/distribution switches. ie the VLAN is routed locally and via dual L3 uplinks to the core. The server is a dual NIC compaq server in active/active mode. Seems to work fine, can anyone see any potential issues? rgds

    GLBP is a stable feature and you should not have any problems inplementing it. As long as the configuration is correct and the design has been properly understood the GLBP implementation will work fine.

  • Redundancy with dual nic servers

    Hi I have 2 11500's configured with box-to-box redundancy. I have a number of app servers each with dual nic's (which are Teamed) and which are connected directly to the CSS's. Nic 1 in each goes to the master CSS1 and is therefore live. Nic2 goes to standby CSS2.The CSS's are connected two 4500 switches to the public.I am monitoring the links to the 4500's,if i switch off the master CCS1,we fail over and the servers all connect via nic2 to the new master CCS2. But when the link to the 4500 from the CSS1 Master goes down the CSS'S failover but the nic2's do not connect to the CCS2 because Nic 1 in each server has not failed ie they still see CSS1 as up. Is there a workaround to this problem ?
    Thanks
    J

    I know of no way to link CSS interfaces so that if the uplink goes down, the the other ports are shutdown. There may be another way to configure the adapter teaming or failover on the server side. I know some OS's send out test frames from one adapter to the other to verify network integrity.
    What I'd recommend is that you setup a VLAN on your 4500's for the server's physical connections, and uplink that to a "backend" interface on the CSS. This can be done with the CSS in either a router or bridge configuration, but I'd recommend router mode.

  • Setting Up Dual NIC Cards? Benefit?

    Hello Everyone,
    I know that the Mac Pro line comes with Dual NICs and I was wondering how do I set these up to be useful with my Cable Modem and Router? Can they be used to get more speed or are they used together in some other capacity.
    I really appreciate anyones help and expertise.
    Many Thanks,
    Chris

    The normal use of dual nic interfaces would be to run double instances of a given server on disparate IP numbers. Dual NIC's are generally employed in order to attach multiple IP addresses to a single machine.
    Another potential use for dual NIC's is internet connection sharing, where your Mac Pro acts as a kind of router; again also this could be used for attaching one NIC to print services and the other NIC for LAN/WAN access.
    OK, actually there are a whole bunch of good reasons for dual NIC cards, but 'doubling your bandwidth' is really not one of them. Believe me, unless you are on a direct fiber OC-10 20 foot from your ISP's NOC, then your existing single NIC has 1000 times the bandwidth of your incoming WAN connection.
    It is likely possible to interleave dual NIC cards between two machines for bandwith purposes; but if that were going to be the canse, just identify one as "in" and the other as "out" (both machines would have to have dual NIC's to make this mean anything) but again, I honestly do not see a real world use for this...
    Message was edited by: psalmsmith

  • Csacs-1121-up-k9

                       Hello,
    Is it possible to upgrade the CSACS-1121-UP-K9 to be a non upgrade part?
    We were going to upgrade from a Windows 4.x to the above Appliance (version 5.x) but there is now a reason to keep the old Windows version running therefore we cannot give the new Appliance the old ACS's licenses?!
    So we should have (with hindsight) bought a fresh version of the ACS 5.x rather than an upgrade.
    Any advice would be appreciated.
    Regards,
    Garry.

    Garry,
    Is there a price difference the upgrade sku and the sku used for a new deployment? There is no difference in the image versions at all, they both have a migration application that will help you migrate the ACS 4.x network devices, internal users and a few various objects that can take a lot of time, it is up to you to use this or not.
    Thanks,
    Tarik Admani
    *Please rate helpful posts*

  • CSACS 1121 V5.4.0.46.4

    Good morning everyone, I'm Eric Jones and I'm a CISCO equipment user.
    I have some questions on the 1121 AAA server.
    We have 2, one is configured to work with our Active Directory.
    It access the AD data and will pull the username from the AD group; however, when you attempt to enter the AD group users password it fails to login into the IOS device chosen.
    What it wants is the enable password created for the local admin account on the IOS device.
    The Shell profiles and Command Sets have been created.
    The binding has been completed.
    The IOS device has its configuration completed.
    Part II of this issue.
    When I first began configuring the device there were now Default Device Admin or Default Network Admin Access Policies configured.
    I had to create these myself.
    After that surprise everything went smoothly as mentioned above with the Shell Profiles and Command Sets.
    Has anyone seen this issue before.
    Part III of this issue.
    When entering the Monitoring and Reports section and enabling Support Bundle I get an error when trying to start it.
    I get a red warning banner at the top stating the server isn't running. Well Clearly it's running but it doesn't think so.
    Also when trying to view the reports to see any accounting, authorization, authentication information in the logs there's nothing there.
    I have configured the logs to write to a Server but nothing ever gets written.
    And since nothing is being done locally on the ACS I can't tell why it's not writting to the server.
    Any thoughts?
    ej

    Here is the config minus some sensitive password information and ACL lists.
    ! Last configuration change at 23:25:58 UTC Wed Oct 2 2013 by a1236ej
    ! NVRAM config last updated at 23:19:01 UTC Wed Oct 2 2013 by a1236ej
    version 12.2
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    service password-encryption
    hostname 209-G2
    boot-start-marker
    boot-end-marker
    aaa new-model
    aaa group server radius 10.2.9.2
    aaa group server radius yacs001
    aaa authentication login default group tacacs+ enable line
    aaa authentication login VTY group tacacs+
    aaa authentication login CONSOLE group tacacs+ local
    aaa authentication enable default group tacacs+ enable
    aaa authentication dot1x default group radius
    aaa authorization console
    aaa authorization config-commands
    aaa authorization exec CONSOLE group tacacs+ local
    aaa authorization exec VTY group tacacs+
    aaa authorization commands 1 VTY group tacacs+
    aaa authorization commands 15 VTY group tacacs+
    aaa authorization network default group radius
    aaa authorization network auth-list group radius
    aaa authorization auth-proxy default group radius
    aaa accounting update periodic 1
    aaa accounting auth-proxy default start-stop group radius
    aaa accounting dot1x default start-stop group radius
    aaa accounting exec default start-stop group tacacs+
    aaa accounting exec VTY start-stop group tacacs+
    aaa accounting exec CONSOLE start-stop group tacacs+
    aaa accounting commands 1 VTY start-stop group tacacs+
    aaa accounting commands 1 CONSOLE start-stop group tacacs+
    aaa accounting commands 15 default start-stop group tacacs+
    aaa accounting commands 15 VTY start-stop group tacacs+
    aaa accounting commands 15 CONSOLE start-stop group tacacs+
    aaa accounting network default start-stop group tacacs+
    aaa accounting connection default start-stop group tacacs+
    aaa accounting system default start-stop group tacacs+
    aaa session-id common
    switch 1 provision ws-c3750g-24ts
    system mtu routing 1500
    vtp mode transparent
    ip domain-name srf.local
    crypto pki trustpoint TP-self-signed-3353342592
    enrollment selfsigned
    subject-name cn=IOS-Self-Signed-Certificate-3353342592
    revocation-check none
    rsakeypair TP-self-signed-3353342592
    crypto pki certificate chain TP-self-signed-3353342592
    certificate self-signed 01
    30820248 308201B1 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
    31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
    69666963 6174652D 33333533 33343235 3932301E 170D3133 31303032 30333337
    34395A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
    4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 33353333
    34323539 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
    8100AAAF F6C627BB 1F356449 51BDCAE6 B62B2A65 5EE8AB72 D8ECAF86 A94A483A
    5FF35D71 C9F7B38F 19937159 1D88B081 A071F7B2 9532C6D6 9FC1A9BB A29BE067
    E6B1A6A6 0053A83F E656DA6E DDD9E095 15A6B410 59CD33B4 4D8F1652 82665AD1
    42B43017 4B729643 77FE0268 442CD37E 7864DBC0 9967D52A DE507B86 194D6070
    1DC30203 010001A3 70306E30 0F060355 1D130101 FF040530 030101FF 301B0603
    551D1104 14301282 10323039 2D47322E 7372662E 6C6F6361 6C301F06 03551D23
    04183016 8014F83D D09FABC5 1025DA4A E491E361 137A674A 80B2301D 0603551D
    0E041604 14F83DD0 9FABC510 25DA4AE4 91E36113 7A674A80 B2300D06 092A8648
    86F70D01 01040500 03818100 85888110 C3DA3837 9C44725B 6C99EB91 25A7F56A
    4B638ECD 09EDEE09 220B1671 004660C6 93164922 DA59B6AC EC3FFC9F 01887284
    62734F47 5BE676EE 536199EB 21DD089F C723A428 5A15F09C 46A9657E 1E5D089B
    437A29D4 A6514E57 2DA17922 1A0B2C44 3A255718 8A7815EC DF969EB9 4148C210
    9B1E8287 9EE9C049 CBB00F36
    quit
    spanning-tree mode rapid-pvst
    spanning-tree extend system-id
    spanning-tree backbonefast
    vlan internal allocation policy ascending
    vlan 10,209
    vlan 999
    shutdown
    ip ssh version 2
    interface Loopback5
    no ip address
    interface GigabitEthernet1/0/1
    switchport access vlan 209
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    spanning-tree portfast
    interface GigabitEthernet1/0/2
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/3
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/4
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/5
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/6
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/7
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/8
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/9
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/10
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/11
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/12
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/13
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/14
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/15
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/16
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/17
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/18
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/19
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/20
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/21
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/22
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/23
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/24
    switchport access vlan 999
    switchport mode access
    switchport port-security
    switchport port-security mac-address sticky
    shutdown
    spanning-tree portfast
    interface GigabitEthernet1/0/25
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 10,209
    switchport mode trunk
    interface GigabitEthernet1/0/26
    switchport access vlan 999
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 10,209
    switchport mode trunk
    switchport port-security mac-address sticky
    shutdown
    interface GigabitEthernet1/0/27
    switchport access vlan 999
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 10,209
    switchport mode trunk
    switchport port-security mac-address sticky
    shutdown
    interface GigabitEthernet1/0/28
    switchport access vlan 999
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 10,209
    switchport mode trunk
    switchport port-security mac-address sticky
    shutdown
    interface Vlan1
    no ip address
    interface Vlan10
    ip classless
    ip http server
    ip http secure-server
    ip tacacs source-interface GigabitEthernet1/0/25
    ip radius source-interface Vlan10 vrf default
    ip sla enable reaction-alerts
    logging 10.7.4.33
    logging 10.30.0.34
    access-list 10 permit 10.30.0.34 log
    access-list 10 permit 10.30.0.151 log
    access-list 10 permit 10.230.0.50 log
    access-list 10 deny   any log
    snmp-server group rwsrf v3 auth read rwview write rwview
    snmp-server view rwview internet included
    snmp-server community rosrf RO 10
    snmp-server system-shutdown
    snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
    snmp-server enable traps transceiver all
    snmp-server enable traps tty
    snmp-server enable traps eigrp
    snmp-server enable traps cluster
    snmp-server enable traps fru-ctrl
    snmp-server enable traps entity
    snmp-server enable traps cpu threshold
    snmp-server enable traps power-ethernet police
    snmp-server enable traps vtp
    snmp-server enable traps vlancreate
    snmp-server enable traps vlandelete
    snmp-server enable traps flash insertion removal
    snmp-server enable traps port-security
    snmp-server enable traps envmon fan shutdown supply temperature status
    snmp-server enable traps stackwise
    snmp-server enable traps license
    snmp-server enable traps config-copy
    snmp-server enable traps config
    snmp-server enable traps config-ctid
    snmp-server enable traps hsrp
    snmp-server enable traps bridge newroot topologychange
    snmp-server enable traps syslog
    snmp-server enable traps mac-notification change move threshold
    snmp-server enable traps vlan-membership
    snmp-server enable traps errdisable
    tacacs-server host 10.7.4.23
    tacacs-server host 10.7.4.22
    tacacs-server directed-request
    tacacs-server key 7 09754F021046461C020731
    radius-server host 10.7.4.23 auth-port 1645 acct-port 1646
    radius-server key 7 0317530A140A255F4B0A0B0003
    banner login
    !xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    !You are accessing a U.S. Government (USG) Information System
    !(IS) that is provided for USG-authorized use only.
    !By using this IS (which includes any device attached
    !to this IS), you consent to the following conditions:
    !-The USG routinely intercepts and monitors communications on
    !this IS for purposes including, but not limited to, penetration
    !testing, COMSEC monitoring, network operations and defense,
    !personnel misconduct (PM), law enforcement (LE), and
    !counterintelligence (CI) investigations. At any time, the USG
    !may inspect and seize data stored on this IS.
    !-Communications using, or data stored on,
    !this IS are not private, are subject to routine monitoring,
    !interception, and search, and may be disclosed or used for
    !any USG-authorized purpose.
    !-This IS includes security measures
    !(e.g., authentication and access controls) to protect USG
    !interests--not for your personal benefit or privacy.
    !-Notwithstanding the above, using this IS does not
    !constitute consent to PM, LE or CI investigative searching or
    !monitoring of the content of privileged communications, or work
    !product, related to personal representation or services
    !by attorneys, psychotherapists, or clergy, and their assistants.
    !Such communications and work product are private and confidential.
    !See User Agreement for details.
    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx!
    banner motd
    Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    !This is a Department of Defense computer system.
    !This computer system,including all relxted equipment, networks
    !and network devices (specifically including internet access),
    !are xrovided only for authorized U.S. Government use.
    !DOD computer system may be monitored for all lawful purposes,
    !including to ensure that their use is authorized, for management
    !of the system, to facilitate protection against unauthorized
    !access,and to verify security proctdues, survivability and
    !operational security. Monitoring includes active attacks by
    !authorized DOD entities to test or verify the security of
    !this system. During monitoring, information may be examined,
    !recorded, copied and used for authorized purposes. All information,
    !including personal information placed on or send over this
    !system may be monitored.Use of this DOD computer system,
    !authorized or unauthorized, constitutes consent to monitoring
    !of this system. Unauthorized use may subject you to criminal
    !prosecution. Evidence of unauthohized use collected during
    !monitoring may be Used for administrative, criminal or other
    !adverve action. Use of this system constitutes consent to
    !monitoring for these purposes.
    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    line con 0
    exec-timeout 9 0
    logging synchronous
    line vty 0 4
    password 7 03165E06090132
    logging synchronous
    transport input ssh
    line vty 5 15
    transport input ssh
    ntp authentication-key 10 md5 025132403B535C365D1F47512B0E152A 7
    ntp authenticate
    ntp trusted-key 10
    ntp clock-period 36029083
    ntp server 10.7.60.20
    ntp server 10.30.0.13
    end

  • Proliant DL380 G5 - Dual nic drops gateway after windows update.

    On yesterday Microsoft windows update updated my DL 380 G5 sever. Part of the update was a nic driver. Needless to say the server didn’t like the update. After the update, the dual nic card will not keep the gateway. I've rolled back the driver but still no luck. Any ideas on how to fix this? My first thought was roll back the driver. Second thought download the drivers from the manufacture but I cannot determine which nic it is. How can I go about finding the exact nic type and name?

    Hi:
    You may also want to post your question in the HP Business Support Forum -- DL Servers section:
    http://h30499.www3.hp.com/t5/ProLiant-Servers-ML-DL-SL/bd-p/itrc-264#.Ujohb18o7Gg

  • Catalyst 3750 12.2(25)SD1 and dual nics

    When a Catalyst 3750 stack master fails or leaves the stack, a cross-stack EtherChannel in trunk mode running Link Aggregation Control Protocol (LACP) protocol might stop forwarding traffic on some VLANs.
    The workaround is to enable the stack-mac persistent feature by using the stack-mac persistent timer global configuration command. You can also use the shutdown interface configuration command and then the no shutdown command on the EtherChannel interface.
    Network Infrastructure: LAN Routing and Switching
    I have upgrade a Catalyst 37024 TS 2 switch stack to 12.2(25)SED1 from 12.1(14)EA. The switch has an Alpha Server Custer connected to it the cluster has two servers each having two nics . There is a active server which has an application IP address and each server has a Server IP address one nic active ata time.
    All worked ok upto the upgrade. Now every night when the backup runs noone can access the application ip address or the acive server address but te offline server is pingable. This is only for devices outside the serrver VLAN. Devices within the server VLAN can hapily ping any address.
    I thought this was arouing issue but all looks ok and the offline server can be pinged from any where.
    the active server nics areon 1/0/20 and 2/0/24
    Any one have any ideas?

    I forgot to add if I shut both interfaces an then do a no shout on both the issue is resolved until the next night.

  • VCSE with dual NIC / SIP H323 encrypted call / traversal and non-traversal call license questions

    Dear All,
    I have a few questions and I would appereciate if someone will answer my questions?
    1) May I know pros and cons of using Dual NIC and single NIC with VCSE in DMZ?
    2) In order to make H323 and SIP encrypted call, what configuration need to be done on Cisco endpoint, non-cisco endpoint, VCSC and VCSE (both signalling and Media need to be encrypted). 
    3)let say my VCSE is in DMZ- endpoint A (cisco) and endpoint  B (non-cisco) are registered on VCSE. I would like VCSE to use non-traversal call license when A call to B or B call to A regardless of whether H323 or SIP call.How can I force VCSE and endpoints to use non-traversal call. I only want VCSE to handle signalling and media is EP to EP direct. As traversal license is quite expensive.
    I found following information from Cisco document.
    all Cisco TelePresence endpoints are traversal enabled and so a traversal license will always be needed when at least one of the endpoints involved in the call is a Cisco TelePresence endpoint.
     Is it possible to disable traversal client feature of Cisco endpoint?
    Thanks and Best Regards,

    voice register pool  4
    add-->codec g711ulaw
    voice register global
    no create pro
    create prof
    and enable below debugs and send the logs
    deb ccsip mess
    deb voip ccapi inou
    deb h225 asn1
    deb h245 asn1

  • Office Web Apps server for Lync DNS question

    We are going to deploy an Office Web Apps server for our Lync 2013 clients, available internally and externally. We do not have a split-horizon DNS so it is not possible for wac.foo.com to have a different IP for internal vs. external clients. What is the
    best setup for our scenario? It looks like we can only add one address in the Lync topology builder, so would it make sense to send everybody to the external wac.foo.com regardless of whether they are internal vs. external? Or is there a better option?
    Thanks,
    Matt

    It might be easiest to use pin-point DNS.  Create an internal zone called wac.foo.com with a blank A record that points to the internal IP address of the OWAS/WAC server.  This way, wac.foo.com will resolve to the correct
    internal address, but you're not setting up a split zone for the rest of foo.com.
    This trick can come in handy for publishing other items without recreating the entire zone, it's a nice one to keep in your back pocket.
    Please remember, if you see a post that helped you please click "Vote As Helpful" and if it answered your question please click "Mark As Answer".
    SWC Unified Communications

  • Final Cut Server for audio assets?

    Hi all,
    Anyone have thoughts on using Final Cut Server for managing audio projects? I can see games programmers also needing it big time but can't see much info on how FC Studio handles audio assets. As for managing all material for an album...
    If anyone has any info, I'd be pleased to hear it.
    Thanks!

    We are currently using it as a Photo/Video database.
    I've only put about 3000 images/clips in there so far
    but it seems to be working well.
    We are running it on a old Quad G5 and have some
    custom conversions set up for adding images and
    videos.
    Our Web team can take our videos and in two clicks
    have a WMV and FLV video for their sites and then
    select a few images and do a quick convert to web
    sized imges..all within FCS
    It would be nice to see a open architecture with plugin support
    and more file compatibility, but for now it works great
    as a database for images and video.

  • Sun Java System Application Server for Mac OS X ?

    hi everybody.
    does anybody know if (any given date ?) sun is planning to offer a distribution of its sun java system application server for mac os x ? or even better: any ideas on how to install a currently available version on mac os x 10.4 ? the linux bin seems not to be readable.
    thank you very much in advance, folks.
    and have a nice day
    andre from berlin, germany

    As you noticed, standalone MacOS distribution of application server is currently not available, but what you can do is to download NetBeans with J2EE bundle or Creator (for free) and install bundled Application Server on this platform. Download URLs are:
    http://www.netbeans.info/downloads/download.php?type=4.1
    (NetBeans/J2EE cobundle)
    http://developers.sun.com/prodtech/devtools/free/
    (Creator)
    Also, you can install and run Glassfish (which is open-source version of upcoming Application Server 9.0) on MacOS X:
    http://java.sun.com/javaee/glassfish/getit.jsp

  • Oracle VM Server for SPARC - network multipathing architecture question

    This is a general architecture question about how to best setup network multipathing
    I am reading the "Oracle VM Server for SPARC 2.2 Administration Guide" but I can't find what I am looking for.
    From reading the document is appears it is possible to:
    (a) Configure IPMP in the Service Domain (pg. 155)
    - This protects against link level failure but won't protect against the failure of an entire Service LDOM?
    (b) Configure IPMP in the Guest Domain (pg. 154)
    - This will protect against Service LDOM failure but moves the complexity to the Guest Domain
    - This means the there are two (2) VNICs in the guest though?
    In AIX, "Shared Ethernet Adapter (SEA) Failover" it presents a single NIC to the guest but can tolerate failure of a single VIOS (~Service LDOM) as well as link level failure in each VIO Server.
    https://www.ibm.com/developerworks/mydeveloperworks/blogs/aixpert/entry/shared_ethernet_adapter_sea_failover_with_load_balancing198?lang=en
    Is there not a way to do something similar in Oracle VM Server for SPARC that provides the following:
    (1) Two (2) Service Domains
    (2) Network Redundancy within the Service Domain
    (3) Service Domain Redundancy
    (4) Simplify the Guest Domain (ie single virtual NIC) with no IPMP in the Guest
    Virtual Disk Multipathing appears to work as one would expect (at least according the the documentation, pg. 120). I don't need to setup mpxio in the guest. So I'm not sure why I would need to setup IPMP in the guest.
    Edited by: 905243 on Aug 23, 2012 1:27 PM

    Hi,
    there's link-based and probe-based IPMP. We use link-based IPMP (in the primary domain and in the guest LDOMs).
    For the guest LDOMs you have to set the phys-state linkprop on the vnets if you want to use link-based IPMP:
    ldm set-vnet linkprop=phys-state vnetX ldom-name
    If you want to use IPMP with vsw interfaces in the primary domain, you have to set the phys-state linkprop in the vswitch:
    ldm set-vswitch linkprop=phys-state net-dev=<phys_iface_e.g._igb0> <vswitch-name>
    Bye,
    Alexander.

  • Need a rack server for our company

    Hi,
           we are looking for a rack server for our oraganisation        
    Hardware specs we are looking for:
    Dual processor
    about 128GB RAM
    2-4tb of Hard Drive Space
    1GB ethernet
    Need prduct descrion and price details for it.
    Thanks,
    Sanjeev
    9872284774

    Hi,
    Depending what your server is (shape and size) and you plan for future usage not CPU, RAM or anything inside. Please check the following lists:
       http://www.4cabling.com.au/server-racks-network-cabinets.html
       http://www.ebay.com.au/bhp/server-rack-cabinet
    Note: You can buy rack(s) from any supplier, no need IBM or HP or Dell .... racks (actually they are more expensive than racks from companies which sell racks/cabinets).
    Regards.
    BH
    **Click the KUDOS thumb up on the left to say 'Thanks'**
    Make it easier for other people to find solutions by marking a Reply 'Accept as Solution' if it solves your problem.

Maybe you are looking for

  • My ipad screen is broken so how much is a new screen

    my ipad screen is broken so how much is a new screen

  • EDIAS2 Runtime installation fails

    1. I have reinstalled BizTalk on my dev machine 2. I removed the old databases 3. I started configuring different components including BAM and BAM configured correctly 4. However, I received an error when attempted to configure EDI/AS2 , and the foll

  • Getting memory usage details in ABAP program

    Hello, Is there any method to get the memory used by the program and control the program like restricting the memory usage to some limit or any other control measures which can be taken in the program itself if the memory usage by the program exceeds

  • General dougths

    hi experts,      pls explain what is PCR and why we using it.and i am confuguring a payslip in pe51 (hr form editor) but i dont know how to to link that with wage types.

  • Error message BBP_PD004 when ECC purch.requsition is sent to SRM via SOA

    Hi Experts, we are on SRM 7.0 ehp 1. Backend system ECC 6.0 ehp 5. I try to implement to process to transfer backend purchase requisitions to sap srm for sourcing (RFx). When sending the purchase requisition in the CPPR transaction to external sourci