QoS and1000v packet and control traffic
It is important to reserve bandwidth for 1000v packet and control. However, I know of now way to mark those packets so that they can be given end to end QoS treatment.
The 1000v allows me to match traffic on output queuing using the following.
match protocol n1k_control
match protocol n1k_packet
With that, in conjunction with a policy-map type queuing, I can reserve bandwidth for1000v packet and control traffic leaving the VEM towards the upstream switch. However, once it gets to the upstream switch, the lack of an appropiate CoS value prevents me from properly queuing the traffic as it heads towards the VSM.
I have the following configuration.
A pair of N7Ks.
1000v VSM running on a pair of 1010 Appliance connected to the N7Ks
A pair of UCS 6248UP connected to the N7Ks
B200 M2 Blade Server with M81KR converged Network Adapter in a 5108 Chassis running ESXi with the VEM installed.
2208XP I/O Modules connecting the 5108 to the 6248UP
vCenter running on a separate ESXi host outside the UCS connected to the N7Ks
Once the 1000v packet and control traffic leaves the VEM, it is unmarked. As a result it hits the 2208 and lands in the best effort queue all the way through the 6248 and into the N7K.
Everything I've read suggests 1000v packet and control traffic should be marked with a CoS value of 6 but how do I do that for packets leaving the 1000v?
Thanks in advance for your help.
Jim Marinelli
Hi Jim,
As you pointed out, the VEM would mark the control/packet traffic with CoS 6. You can set the UCS vNIC policy to accept this tag by setting the 'Host Control' parameter to 'Full':
http://www.cisco.com/en/US/docs/unified_computing/ucs/sw/gui/config/guide/2.1/b_UCSM_GUI_Configuration_Guide_2_1_chapter_010100.html
So this tag would persist till it leaves the UCS Fabric Interconnects.
Thanks,
Shankar
Similar Messages
-
How does QoS work with WAAS WCCP? What's the interaction between Router QoS Traffic Classification and WAE Traffic Application Policy?
By default, WAAS preserves the DSCP marking on intercepted packets. There is a configuration option to set/override the DSCP value at the global (device), application, and classifier levels. Currently WAAS provides marking only. There is no action taken by WAAS based on the DSCP value.
Regards,
Zach -
Best Practices for vMotion QoS in N1kv and UCS?
Hi,
I'm looking at a few technical documentation on what's the recommended way to provide QoS to vMotion.
From VMWare's website on vSphere deployment with N1kv,
They are using
policy-map type qos vmotion
class class-default
police cir percent 30 bc 200 ms conform transmit violate drop
This rate-limits vMotion traffic to 3Gbps and excess traffic will be dropped.
Would this be better if I were to use:
policy-map type qos vmotion
class class-default
police cir percent 30 bc 200 ms conform set-cos-transmit 4 exceed drop
policy-map type vethernet vMotion
switchport access vlan 900
service-policy type qos in vmotion
pinning id 0
I'm marking vmotion traffic with a CoS of 4 and pin it to Fabric-A. I will have my management VLAN pinned to Fabric-B.
Also, do I need to configure QoS settings in UCS as well?
For the upstream switch, if I'm using a Catalyst 3750, would it be sufficient just to do a mls qos trust cos?
Appreciate your advice.
Thanks..Steven,
Yes. You can use the modified QoS policy which changes the COS Values.
We need to do some more configuration in Fabric Interconnect for the COS Values that are modified by Nexus 1000v to keep it as it is.
The M81KR adapter works in a “no trust” QoS model which means that it will overwrite the CoS value set by an upstream entity (Nexus 1000v for example). For Nexus1000v deployments, it is highly recommended to do the CoS marking at the Nexus 1000v level. This means changing the QoS model to “trust” on the M81KR.
To create a QoS policy to achieve this, look into the attached file. We need to have option "Full" enabled in it.
Here are further details about this configuration from UCS Manager help:
Host Control field
Whether Cisco UCS controls the class of service (CoS). This can be:
None—Cisco UCS uses the CoS value associated with the priority selected in the Priority drop-down list regardless of the CoS value assigned by the host.
Full—If the packet has a valid CoS value assigned by the host, Cisco UCS uses that value. Otherwise, Cisco UCS uses the CoS value associated with the priority selected in the Priority drop-down list.
Regards
Nethaji V -
i have an mpls service from provider that provides a guaranteed bandwidth of 200 mbps (total) to traffic marked af11 or af12 and best effort for unmarked traffic.
i want to create a marking / policing policy that allows customer to prioritize af11 over af12 in ce facing provider.
ce device should transmit af11 traffic up to 200 mbps and if it exceeds 200 mbps mark down before sending to provider.
if no af11 traffic is present ce device should transmit af12 traffic up to 200 mbps and if it exceeds 200 mbps mark down
before sending to provider.
If both af11 and af12 traffic are present however, af11 should be prioritised over af12 traffic.
i.e. if af11 traffic is at 150 mbps and af12 at 50 mbps and af11 traffic increases to 160 mbps this should now cause af12
traffic in excess of 40 mbps to be marked down before sending to provider.
Not sure if this is possible but would really appreciate your input.Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
I think you'll find the matching rate-limit will "win", i.e. it's not recursive.
I believe I understand what you want to accomplish, but still don't see a way to accomplish it, even across multiple devices.
Also, I cannot see how it can be done with "stock" QoS features, because to do this, a process really needs to analyze a packet stream before it's transmitted. Basically given a set of packets with the AF11 and AF12 markings, you need to "look" ahead at the packets that will "fit" in the Tc for the physical egress rate. Once that's determined, you can allow up to Bc of AF11 packets. If Bc isn't fully consumed by AF11 packets, you allow what's left over to AF12 packets.
Policers/rate-limiters don't look ahead. -
Good afternoon fellow Ciscorians.
I have configured a Copp to rate limit ICMP traffic and fragmented traffic from saturating the RP via the control-plane and also ignore the same traffic class from our trusted IP addresses. But i am wondering about management traffic such as telnet and SSH, we have an access list on the VTY lines dropping traffic from un-trusted sources on 22+23, i am wondering what the benefits are to employing a Copp policy as well as the access-list on the VTY lines?
Could an attack still saturate the RP with an access-list dropping the un-trusted traffic on the VTY lines? (6509-Sup720)
Matthew.Hi Matthew,
access-list applied on interface is applicable for all traffic, data traffic (transit traffic) and control-plane traffic (destined to router or punted to RP), while CoPP is only applicable to traffic punted to RP.
Access list will either permit or drop but CoPP is service-policy and you can rate-limit the traffic. So if we take example of ICMP traffic, and requirement is we want to allow ICMP traffic to router (ICMP is useful tool to check reachability and latency) but not more than 500kbps (to avoid any DDOS attack), in this case blocking ICMP with ACL on interface will not solve the purpose but CoPP will do the job.
If you are blocking some traffic via ACL, it should not saturate the RP.
--Pls dont forget to rate helpful posts--
Regards,
Akash -
What is control traffic in LWAPP
Hi all,
As per Ciso book LWAPP handles the control traffic between Controller and Access point.
IF someome can explain me what is control traffic please?
thanks
maheshHi Mahesh,
Hers is the detailed information on LWAPP and CAPWAP..
http://tools.ietf.org/html/draft-ohara-capwap-lwapp-04#section-4.1
Lemme know if this answered your question..
Regards
Surendra -
Application Visibility And Control Bittorrent
Hello,
I can use the Application Visibility And Control does not block the traffic from Bittorrent? Or have I misunderstood?
However, I have on my WLC 2504 that configures goes Bittorrent still.
RegardsHere is the protocol list supported in NBAR2
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6558/ps6616/product_bulletin_c25-627831.html
I can see "bittorrent", "encrypted-bittorrent", "bittorrent-networking" as recognised protocol in the list, but nothing for utorrent.
From WLC code 7.5 onwards you can update these protocol packs on your controller (see below for more detail)
http://www.cisco.com/en/US/docs/wireless/controller/technotes/7.5/AVC_dg7point5.html
Protocol pack 4.1.1 is the latest for 7.5 code. Here is the more information about it.
http://www.cisco.com/en/US/docs/wireless/controller/nbar2_prot_pack/4.1.1/b_nbar2_prot_pack_411.html
Latest protocol pack (pp-AIR-7.6-13-6.3.0.pack) is available for 7.6 code version if you would like to test it out. -
BCM4311 dropping packets and occasionally connection
I got a new Dell Latitude D820 (refurbished really) onto which I installed Arch. I installed the b43-firmware for the AUR and not I can connect to my network, but I drop about 8% of my packets and occasionally I just flat out loose my connection.
I had an old Dell Latitude D620 before and I believe I mirrored the set up over but something still isn't working. I can get ethernet, but not wireless fully working.
lspci:
09:00.0 Ethernet controller: Broadcom Corporation NetXtreme BCM5752 Gigabit Ethernet PCI Express (rev 02)
0c:00.0 Network controller: Broadcom Corporation BCM4311 802.11b/g WLAN (rev 01)
ip link: (At this point the wireless had cut out on me)
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp9s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
link/ether 00:26:b9:22:57:f5 brd ff:ff:ff:ff:ff:ff
3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DORMANT group default qlen 1000
link/ether 00:19:7d:a7:a6:53 brd ff:ff:ff:ff:ff:ff
dmesg | grep wlan0:
[ 6119.953556] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6119.966765] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6119.968507] wlan0: authenticated
[ 6119.968734] b43 ssb0:0 wlan0: disabling HT/VHT due to WEP/TKIP use
[ 6119.968742] b43 ssb0:0 wlan0: disabling HT as WMM/QoS is not supported by the AP
[ 6119.968759] b43 ssb0:0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
[ 6119.969517] wlan0: associate with 00:0f:66:2a:e4:c4 (try 1/3)
[ 6119.991765] wlan0: RX AssocResp from 00:0f:66:2a:e4:c4 (capab=0x411 status=0 aid=7)
[ 6119.992219] wlan0: associated
[ 6235.492798] ieee80211 phy0: wlan0: No probe response from AP 00:0f:66:2a:e4:c4 after 500ms, disconnecting.
[ 6236.788531] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6236.800563] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6237.002809] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 2/3)
[ 6237.206171] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 3/3)
[ 6237.409479] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
[ 6239.110336] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6239.123422] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6239.326144] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
[ 6239.529459] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
[ 6239.732828] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
[ 6241.930312] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6241.949734] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6242.152878] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
[ 6242.356763] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
[ 6242.559472] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
[ 6254.933596] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6254.952971] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6255.156156] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
[ 6255.359467] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
[ 6255.562800] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
[ 6291.486796] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6291.500114] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6291.501985] wlan0: authenticated
[ 6291.502211] b43 ssb0:0 wlan0: disabling HT/VHT due to WEP/TKIP use
[ 6291.502229] b43 ssb0:0 wlan0: disabling HT as WMM/QoS is not supported by the AP
[ 6291.502235] b43 ssb0:0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
[ 6291.502844] wlan0: associate with 00:0f:66:2a:e4:c4 (try 1/3)
[ 6291.706153] wlan0: associate with 00:0f:66:2a:e4:c4 (try 2/3)
[ 6291.909466] wlan0: associate with 00:0f:66:2a:e4:c4 (try 3/3)
[ 6292.112807] wlan0: association with 00:0f:66:2a:e4:c4 timed out
[ 6334.220299] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6334.233449] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6334.436126] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 2/3)
[ 6334.438547] wlan0: authenticated
[ 6334.438771] b43 ssb0:0 wlan0: disabling HT/VHT due to WEP/TKIP use
[ 6334.438789] b43 ssb0:0 wlan0: disabling HT as WMM/QoS is not supported by the AP
[ 6334.438795] b43 ssb0:0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
[ 6334.439466] wlan0: associate with 00:0f:66:2a:e4:c4 (try 1/3)
[ 6334.441680] wlan0: RX AssocResp from 00:0f:66:2a:e4:c4 (capab=0x411 status=0 aid=7)
[ 6334.442197] wlan0: associated
[ 6362.492825] ieee80211 phy0: wlan0: No probe response from AP 00:0f:66:2a:e4:c4 after 500ms, disconnecting.
[ 6363.793623] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6363.806747] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6364.009457] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 2/3)
[ 6364.212796] wlan0: send auth to 00:0f:66:2a:e4:c4 (try 3/3)
[ 6364.416144] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
[ 6366.117386] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6366.130453] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6366.332781] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
[ 6366.536110] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
[ 6366.739513] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
[ 6368.946982] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6368.960041] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6369.162846] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
[ 6369.366121] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
[ 6369.569458] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
[ 6381.956831] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6381.970081] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6382.172794] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
[ 6382.376128] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
[ 6382.579456] wlan0: authentication with 00:0f:66:2a:e4:c4 timed out
[ 6406.143601] wlan0: authenticate with 00:0f:66:2a:e4:c4
[ 6406.156739] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 1/3)
[ 6406.359456] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 2/3)
[ 6406.562790] wlan0: direct probe to 00:0f:66:2a:e4:c4 (try 3/3)
[ 6406.766124] wlan0: authentication with 00:0f:66:2a:e4:c4 timed outDornith wrote:
mkraemer wrote:I can't help with the problem, but take a look at https://bbs.archlinux.org/viewtopic.php?pid=1452652
I tried all the solutions presented in that forum. None of them worked. The link the OP said fixed his problem is now broken.
hippieben wrote:Try the broadcom drivers in AUR. I find them to work much better than b43.
Whenever I install the proprietary drives, When I run and get:
$ sudo modprobe wl
modprobe: FATAL: Module wl not found.
Did you restart after installing? -
Back flush with both Packet and Bucket
Dear all,
We produce consumer goods in our company and we maintain Finish Goods in Packet and Bucket. Can we key in Back flush in both unit Packet and Bucket?
E.g we have Finish Goods A, Qty = 10 Bucket and 23 Packet
(1 Bucket = 40 Packet)
Can we input into Backflush : 10 Bucket + 23 Packet ?
Or we can input by (10*40+23) Packet only?
Pls advise us.
Thank you very much!
CHCH,
Why do you want to backflush the finished goods.
I think you want to do auto GR for this FG on order.
If that is the case then you can do following things.
You have the base unit of measure as packet.
In the material master of that FG, in the work scheduling view enter order unit as bucket.
As soon as you enter system will give you pop up.
Manintain the relation of both the units there & save.
Henceforth whenever the production order will be created it will pick up the unit as bucket with relation given in packet in the order header.
Put auto GR control key in one of the operation in the order.
So it will suggest the GR with confirmation.
In MMBE you can see the stock with any of the unit.
Hope this helps you.
SmanS -
I have 3rd party software wirelessly injected and used on my iphone with a cryptographic authentication system without my consent (seems to be new technology developed by stanford and apple security is not updated for this technology) obtaining ownership of my iPhone 4s software and controlling it with remote device to jail breaking my phone, adding and removing software, changing settings all from a remotely controled device from different location (I have a Mac address I'd of this device to know for sure). Almost undetectable. When I look at the legal section of my phone it shows a list of all the unauthorized 3rd party software "as is" copyright encrypted on the phone. This is the most basic way to legally steal software of any kind. Because of this legalality 3rd party ownership have total control of certain software correlated with hardware use including visualization technology, etc. most people luckily will never have this happen to them so it's unlikely many readers have not a clue of what I'm saying currently. Either way, without needing to obtain specific warranty of any kind "as is" copyright control makes system restores not a solution because the source code is not directly encrypted on the actual hardware device only a copy right notice must appear on the specific device 3rd party software validation making it extremely difficult for me to take control of the situation. Apple claims their iOS technology prevents this type copyright obstruction from being possible, however, according to my phone a new form of technology was used developed by Tom wu of Stanford university called the STANFORD SRP AUTHENTICATION TECHNOLOGY which uses Some form of cryptographic authentication system and uses quote "secure remote password" which seems to suceed in hacking iOS apple technology apple claims is not possible to jailbreak an unstolen phone or without the owners consent As well as loading the device with 3rd party copyright Notices to make all of this legalized. My phone shows atleast 30 pages worth of legalized 3rd party copyright permissions! Yesterday my apple care provider labeled me a jailbreaker and refused to look at my legal documented proof which completely blew my mind because it voides my apple care contract I spent 100 on. This employee did not take all factors into consideration and made quick assumptions as well as verbally speaking to me as I'm an automatic criminal. I left the store yesterday with no payed insurance help on a problem I had no control over and couldn't prevent, leaving with voided contracts. This is an apple users worst nightmare and I have spent days researching all of this like i am some kind of lawyer only to be able to use my phone the way it should and spent alot of money on. I can legally backup any claim I have just wrote above currently and have a large source of data collected to prove apple is wrong in voiding insurance support on this issue. The problem lies in apple avoiding and not wanting to believe their software can legally be obtained ot "hacked". Yet still labeled a jailbreaker basically.. What should I do????? Been to local apple store 3 times and rebooted my phone as well sprint service restore 4 times and spoke with reps twiice on the phone. Spoke with my phone provider who said apple has full control over these matters so they can't help me. My case is according to apple "still open"...Anyone else heard of this or of Stanford's office of technology licensing? Maybe I need to buy a blackberry again or just use a landline so I can stop being my own lawyer and focus on other productive areas in life instead of this horrible mess. I shouldn't have to prove to apple I not a jailbreaker they should have to prove I'm one before voiding support I desperately need!!
Mullaly75 wrote:
I assume u guys don't understand what open source software is
Yes, I think most of us do understand what open source software is. It sounds as if you don't. Here's some information:
Open-source software (OSS) is computer software that is available in source code form: the source code and certain other rights normally reserved forcopyright holders are provided under an open-source license that permits users to study, change, improve and at times also to distribute the software.
Open source software is very often developed in a public, collaborative manner. Open-source software is the most prominent example of open-sourcedevelopment and often compared to (technically defined) user-generated content or (legally defined) open content movements.
from http://en.wikipedia.org/wiki/Open_source_software
Yes, Tom Wu of Stanford wrote a paper on something called Secure Remote Access Protocol. It's a form of Asymetric Key Exchange and has nothing to do with hacking anything. It's actually intended to protect data. -
Control parallel port (data and control lines)
I need to control the output on the parallel port (LPT1) - Both data and control lines. Once the data is written (Pins2-9), I then need to toggle the Sprocket signal (PIN1) - on the parallel port. The sprocket signal is also referred to as the Data Strobe Output.
The required method is as follows:
1. Lower the sprocket signal on PIN1
2. Send the data (Pins2-9) and wait
3. Raise the sprocket signal and wait.
4. Repeat.
I am looking for a method to control the data on LPT1 pins 2-9 and then be able to toggle PIN1 - Strobe signal - without the data falling from the other pins. What I have found is that whenever the state is changed on the strobe - the data that was written to Pin2-9 falls to zero. This will not work for my application - the strobe tells the hardware device that the data is ready. If it falls to zero when I toggle the strobe - that will not work.
Regards,
GuyHello Adam,
I am familiar with both references. If you look more closely at the library reference - it allows me to communicate using VISA across the parallel port pins 2-9. It does not permit direct communication to pin1 (the strobe signal) - property nodes don't allow the strobe to be refereced either (similar to control lines/signals for COM ports).
Worse, I have also located examples using OUT PORT that does enable pin1 to be toggled. The problem is, when those VIs are used, the data falls from the data pins when the strobe signal is written, even if its value is not changed. For example, if the strobe is already high, if another high value is passed, the data falls from the data lines. The other issue, when using VISA, as soon as the data is writen, the strobe signal automatically goes high even though I need a wait before setting the strobe high. This is in complete contradiction to the second article you referenced which clearly discusses writing data to pins2-9 then taking the strobe high to indicate to the printer that new data is available. It must be possible since this is the typical handshake.
I am still looking for a more complete answer/solution.
Regards,
Guy -
Aging report and Control account value not matching
Hi All
The value what i am getting from Vendor liabilities aging and Control account is not matching for the same dates, all my parameters or selection criteria are same
Same report if i am taking for the current date it giving correctly,
If i am trying for a previous day the problem is happening
How can i solve this issueHi,
Please check if the transactions are done for different Control Accounts and both the account balances are included in the Aging Report.
Also, check that ALL the customers/vendor groups are taken.
Make sure that you are running the backdated aging with the checkbox as mentioned in the Note 800294.
If still facing problems may be you can provide with more details as to what the control account balances and what is the Aging, difference.
PS: Check if there is any manual journal entry is created in the control account?
Kind Regards,
Jitin
SAP Business One Forum Team -
Can i connect my iMac to a mac mini (wirelessly) and control the mac mini display on my TV?
Look up "screen sharing" in help
You can control your mini (which I am assuming you are hooking to your TV) complete from your iMac.
After you set up screen sharing, you can go to the finder, under the "go" menu choose "Connect to server" and then browse. Choose your mac mini's name, and look for the "Screen Sharing" button.
Choose Apple menu > System Preferences, and then click Sharing.
Select the Screen Sharing checkbox.
To specify who can share your screen, select one of the following:
All users:
Select this if you want to allow any user with a user account on your computer to share your screen.
Only these users:
Select this if you want to restrict screen sharing to specific users.Click Add at the bottom of the Users list and select a user from Users & Groups (accounts you have set up in Users & Groups preferences), Network Users (users on your network), or your Address Book. Or click New Person and enter a name and password to create a sharing account. Then select that user from the list, and then click Select.
Click Computer Settings and set the following options:
Anyone may request permission to control screen:
Select this to allow anyone on your network to request to share your screen.
VNC viewers may control screen with password:
Select this and enter a password that VNC viewer applications can enter in order to control your screen.It’s recommended that you not set a password if you only share this computer’s screen using the built-in screen sharing viewer in Mac OS X. -
MacBook Pro 2.3 os 10.6.8 control-C and Control-v don't work
On MacBook Pro 2.3 OS 10.6.8, control-c and control-v don't work in any app Please help
If you mean copy and paste, that's Command c and Command v, not control key.
-
How to create parameter and control file like filename + date
Hello there
I am trying to create parameter and control file with following command
in SQLPLUS
create pfile='/u03/oradata/WEBDB/backup/initWEBDB.ora' from spfile;
In RMAN
copy current controlfile to '/u03/oradata/WEBDB/backup/cf_longterm.cpy';
how can I put date at the end of filename like
initWEBDB8jan06.ora and cf_longterm8jan06.cpy
Thanks in advance
LionelASM is reliable but a smart DBA is very careful. If ASM is doing mirroring this is like RAID doing mirroring. What happens if you accidentally delete one copy ... the other one disappears instantly. Not a good idea.
With respect to redo logs you need a minimum of three groups, two members, and one thread per instance. So a 2 node cluster should, at a minimum have 12 physical files.
Not mirroring the redo logs, assuming multiple members, is not as critical.
Maybe you are looking for
-
Can't see the sales area in XD01( in all sales area) even OVXG has defined.
Hi, In XD01 while creating cusotmer master in all sales area system is not showing 7800-90-01( sales area)even though it is defined in OVXG. This is the reason why may be am not able to create customer in 7800-90-01sales area. here is the screen sh
-
How to get the profile object in simple java class (Property accessor)
Hi All, Please guide me how to get the profile object in simple java class (Property accessor) which is extending the RepositoryPropertyDescriptor. I have one requirement where i need the profile object i.e i have store id which is tied to profile .s
-
Am having a problem updating my vault. I have Aperture 3.0.1 and a single 25GB library. Vault has always worked in v 2.1.4. Since upgrading, I've not had any crashes and things seem to be working pretty well. However, my vault shows it needs to be up
-
My mid 2011 MacBook Pro's Hard drive recently became corrupted, I cannot verify or repair the disk, I am also unable to clone it to an external drive. When attempting to repair the disk (in Disk Utility) all goes well, until the repair is moments awa
-
How can i combine the JTabbedPane with JSplitPane?
there is an example in Notepad++,where when 2 or more tabs are open,we can right-click the tab and choose the "go to another view" command.it's so good that we can check 2 files in two views. so i wanna know how to implement this function in java?and