Setting VTY lines for SSH % Telnet only

Hello,
First off I apologize if this is the wrong section to post in or if there has already been a thread made for this particular problem however I've yet to find a solution that works.
I am configuring a 1841 router running IOS Version 12.4(15)T1
I am trying to set the vty lines to accept only telnet and ssh connections.
I am using these commands:
R1(config)# line vty 0 15
R1(config-line)# password ciscovtypass
R1(config-line)# login local
R1(config-line)#transport input telnet ssh
When I enter the "transport input telnet ssh" , I receive the error "Invalid input detected at '^' marker" and points to the word ssh.  I can successfully use "transport input telnet" and "transport input ssh" by themselves, however when I try to set them both on the same line is when i get the error.  And setting them both one after another overwrites the previous.  Any help would be much appreciated, thanks. 

The suggestion from Leo would certainly allow both telnet and SSH. But it also allows some other protocols (they are not common in today's networking environment - but the original question was quite specific that they want to allow only 2 protocols and not all protocols). So let us look for answers that may help Michael.
My first thought was to wonder if SSH has been fully enabled and whether this might be a factor in the problem. Michael indicates that transport input ssh works ok and that seems to indicate that enabling SSH is not the issue. But I would still feel better if Michael would post the output of show ip ssh
I wonder if there is an order dependency in which one of the protocols must be entered first. I suggest trying this
line vty 0 15
transport input telnet ?
and
transport input ssh ?
and see if one of them indicates that the other protocol is an option.
HTH
Rick

Similar Messages

  • Set default value for people picker only when user checks a checkbox (Sharepoint 2010)

    The javescript in below link works for me.
    http://social.technet.microsoft.com/Forums/sharepoint/en-US/2b130f64-3db2-484a-9a53-ccbe18d2c5de/set-default-value-for-people-picker-in-list-template-current-user?forum=sharepointgenerallegacy
    However, I'd like to set default user for people picker only when user checks a checkbox. 
    I am new to  development. Could you please help me on this requirement ?
    Thank you very much. 

    Hello,
    Use this link to to validate checkbox value, if true then set the person or group value (i.e. as posted in your link).
    http://geekswithblogs.net/haniamr/archive/2011/03/10/validate-that-a-checkbox-is-checked-using-javascript.aspx
    Hope it could help
    Hemendra:Yesterday is just a memory,Tomorrow we may never see
    Please remember to mark the replies as answers if they help and unmark them if they provide no help

  • How do I cut and paste sets of lines for use in various Math questions?

    How do I cut and paste sets of lines for use in various Math questions?

    Thank you for your reply. My problem is much simpler than you are thinking. As a teacher I prepare sheets with random number generators.
    EG. 256 + 389= ______    or         467
                                                 -  384
           469 + 753= ______     
    or  5)750
    On a PC I was able to start a page of A4 with one set and then drag and drop down and across the page.
    On my Macbook I can get the numbers in but the lines do not copy. I asked at one of my One to One sessions and it had my 'trainer' stumped. He said he would make enquiries but so far no news. I am using Numbers.
    I hope I have explained my 'problem' satisfactorily.

  • Setting Sales Tax for in State ONLY??

    What we have here is a failure to communicate...  Either it is a language problem with support or they can't explain the feature.
    All the answers I 'm getting are NOT answers to the question I'm asking. And the document is not clear either.
    I have clients who sell products who ONLY need to charge sales tax to customers in the same state (PA)  but BC is charging 6% to all customers regardless of location.  We realize now that we should not have set the tax on individual products to PA 6%  (although that is VERY counterintuitive), and we set up our tax code for the USA with all states being zero and pa being 6%.   Tech cannot tell me how I should be setting taxes globally for products. IT is almost as if this feature does not exist:
    ME:   No,    This is not acceptable nor does it make any sense.
    In the USA, for most companies,  we only charge sales tax to In state customers, not out of state customers.  Therefore we need to be able to set up a global tax NOT on the product and NOT on the Country, but upon the state ONLY.
    If this option is not available, it is a worthless system.
    Parikshit Nath (Adobe Business Catalyst Support) 
    Dec 20 09:10
    There are two proper ways to add tax.
    1. Add tax to shipping options: In this case, you create tax codes and shipping options too. Now, you add tax code to the shipping option as per the customer's destination country. Add a shipping option, and select the tax code in the shipping option. This is the more widely used method of applying tax. From what I had seen, you didn't create any shipping options yet, hence the confusion.
    2. Add tax directly to the product: This is what you had done. This will, as you have already mentioned, apply the tax to the product, irrespective of the customer's address details.
    Hope this clarifies the situation.
    Cheers.
    You can set it as not applicable. If you apply tax to the product level, it will apply the tax to all orders for that product. To apply tax to all orders regardless of the visitor's location, you can apply tax at a product level. Check this document:http://helpx.adobe.com/business-catalyst/partner/tax-codes.html

    Your question is really inappropriate to the Apple Discussions. The AD is a user-to-user forum for helping with technical problems and questions for Apple products. Sales taxes is certainly not one of those topics.
    However, to answer your question. If your friend purchases a Mac in the Apple store or if you purchase it via the online store taxes will be charged. Sales taxes in the US are typically between 6-8 percent of the purchase cost depending upon the state in which it is purchased. There are a few states that do not levy sales taxes such as Nevada and Montana.
    In addition when your friend takes the computer into your country you will likely be charged with import duties and taxes as well. If it's your expectation that this ploy will save you some money I wouldn't count on it.

  • Set Output Type for specific Vendors Only

    Hi,
    I have created an output type to send external mail for PO. I want to restrict it to send the email to only a specific number of users. So I created consition records based on Companycode/vendor num/doc type.
    I entered the records for say x and y vendor only .
    But , Still when i test it with some other vendor whose record is not maintained it still sends the email?
    Is it the rt path I am on ? Is it the rt way to do this ? Based on the info available online and sdn i tried these steps ...I m not sure if thats correct.
    Pls let me know how to achieve this restriction ?
    Thanks,
    Shilpi

    Hi
    You check the access sequence for purchase order output type. Access sequence will determine which condition record to be checked first. If any other condition table with records has priority (defined in access sequence) then your condition record will not be taken into account for output type.
    Bala
    Note: Award points if helpful

  • CiscoWorks:Archieve configurations of routers/switches with only ssh/telnet

    Hi,
    I want to do the archieve configurations of couple of routers/switches with only ssh/telnet and rest thousands of devices will be via snmp.
    Currently I am backing up the configurations of thoudands of  routers/switches via snmp, as snmp is configured on them, but couple of routers/switches are external and snmp is not configured on them so I want to get their configuration via ssh/telnet only.
    Please advise me that is it possible to do the archieve configurations of routers/switches with only ssh/telnet?
    I am using the
    LMS: 1.2.0
    RME: 4.3.0
    CS:    3.3.0
    CM:   5.2.1
    DFM: 3.2.0
    Thanks

    The config archive protocol order applies to all devices universally.  Since you are using TFTP for most of your devices, I recommend you leave TFTP at the top of the protocol order list.  Add TELNET and SSH below TFTP.  The external devices will be attempted with SNMP/TFTP, but those operations will fail.  RME will then fall back to TELNET then to SSH.  It will eventually fetch the configuration successfully.

  • How to set (class)paths for a Managed server?

    How does one configure the PATH and CLASSPATH and pass definitions (like "-Djava.library.path=c:\p\bea\wlserver6.1\bin")
    to a remotely-started managed server?
    The section in the WLS 6.1 AdminGuide.pdf that talks about configuring a managed
    server's Remote Start tab says on pages 3-9 to 3-10 that, "If you don't specify
    values for these fields and attempt to start the target server from the Administration
    Console, the Node Manager will attempt to start the target server with the values
    for these attributes that were used when starting the Node Manager. The Node Manager
    will be able to start the Managed Server in that case if you specified the required
    values on the command line when starting the Node Manager."
    So it sounds as if I can get the java.library.path definition and CLASSPATH sent
    to the server via the Node Manager startup command.
    Does that work when using the Node Manager as an NT Service? Here is my Win2K
    command file for setting up the Node Manager as an NT Service. Note that I'm trying
    to tell it where to find the Windows native libraries (wlserver6.1\bin for wlntio.dll)
    and the JDBC drivers (C:\SHADOW\jdbc\... and C:\Orant\jdbc\... ) :
    ========== BEGIN installNMNtService.cmd ================ @echo off
    SETLOCAL
    cd C:\p\bea\wlserver6.1\
    rem *** Set Classpath to load Weblogic Classes
    set CLASSPATH=.;C:\p\bea\wlserver6.1\lib\weblogic_sp.jar;C:\p\bea\wlserver6.1\lib\weblogic.jar;C:\SHADOW\JDBC\scjd12.jar;C:\orant\jdbc\lib\classes111.zip
    rem *** Set Command Line for service to execute
    rem *** %JAVA_HOME%\java will automatically be prepended.
    set CMDLINE=" -ms16m -mx16m -classpath \"%CLASSPATH%\" \"-Dbea.home=C:\p\bea\"
    \"-Djava.security.policy==C:\p\bea\wlserver6.1/lib/weblogic.policy\" \"-Dweblogic.nodemanager.weblogicHome=C:\p\bea\wlserver6.1\"
    \"-Dweblogic.nodemanager.reverseDNSenabled=true\" \"-Djava.library.path=c:\p\bea\wlserver6.1\bin\"
    \"-Dweblogic.nodemanager.listenAddress=111.111.111.123\" \"-Dweblogic.nodemanager.trustedHosts=./config/nodemanager.hosts\"
    weblogic.nodemanager.NodeManager"
    rem *** Install the service
    "C:\p\bea\wlserver6.1\bin\beasvc" -install -svcname:EDANodeManager -javahome:"C:\p\bea\jdk131"
    -execdir:"C:\p\bea\wlserver6.1" -extrapath:"C:\p\bea\wlserver6.1\bin" -cmdline:%CMDLINE%
    ENDLOCAL
    ================= END installNMNtService.cmd ==================
    But when I start a server remotely, it can't find the native libraries and it
    can't find the JDBC libraries in the CLASSPATH. Otherwise, it can serve up HTML
    pages at the correct port number so I know it's running.
    When starting a managed server remotely via the WLS 6.1 console, how do I tell
    the managed server where the native libraries and JDBC libraries are?
    Thanks!

    Hi,
    The memory setting on the WC_Spaces managed servers can be seen as mentioned below.
    ps -eaf | grep Spaces
    Above command shows something like this at the top of the output:
    /a01/app/oraweb/middle/jrrt-3.1.2-1.6.0/bin/java -jrockit -Xms512m -Xmx1024m -Dweblogic.Name=WC_Spaces1 ...
    Regards
    Sreedhar

  • The VTY sessions are set for SSH, is telnet still open?

    I'm in the process of enabling SSH on all of my routers, switches and firewalls.  After upgrading the IOS to one that supports SSH, generating the crypto key and then setting all of the VTY sessions to SSH only, my security team informs me that telnet is still vulnerable to IP spoofing.  They can demonstrate that when they launch a telnet session to one of my routers, the telnet session will pause for maybe 2 seconds before receivign the message that the session was terminated by the router.  They claim this indicates that the router is responding to the telnet session and before the actual disconnect is forced they could IP spoof the box and cause a DOS.
    I say boulderdash but without any proof I am forced to create a bunch of ACL's to specifically deny telnet.  Here is an example of my VTY's:
    line vty 0 4
    access-class 23 in
    exec-timeout 30 0
    password 7 xxxxxxxxxxxxx
    logging synchronous
    transport preferred ssh
    transport input ssh
    transport output ssh
    *The access list here is limiting access from a certain internal set of IP's.
    Any thoughts?

    Marcos,
    Thank you for your time on this.  I believe I have found and corrected my issue.  In my first post I showed what the vty 0 4 sessions were set as.  What I failed to show was that the "vty 5 15" sessions were only set to "no exec".  So what was happening is that when I would telnet to the router, the session attempt would either walk down the list of VTY sessions looking for an open port or the router just bypassed the ones that were set for SSH and tried the first VTY port that was set for no exec.  This would allow for the telnet session to attempt to open but because the router was not allowing access to the command line interpreter, the router would reject the session attempt.
    To correct this I simply set up all of my VTY sessions the same way, transport SSH in & transport SSH out.  The next attempt closed the telnet session immediately.  I still maintain there is no need for additional access-lists as I'm trying to keep my processor's free from any additional load to allow them to process the payload traffic as efficiently as possible.
    If anyone has any best practices they would care to leave here, I would be interested.
    Sam

  • Best Practices for securing VTY lines?

    Hi all,
    The thread title makes this sound like a big post but it's not. 
    If my router has say., 193 VTY lines as a maximum, but by default running-config has only a portion of those mentioned, should I set any configs I do on all lines, or just on the lines sh run shows?  Example: 
    sh run on a router I have with default config has: :
    line vty 0 4
    access-class 23 in
    privilege level 15
    login local
    transport input telnet ssh
    line vty 5 15
    access-class 23 in
    privilege level 15
    login local
    transport input telnet ssh
    Yet, I have the option of configuring up to 193 VTY lines:
    Router(config)#line vty ?
      <0-193>  First Line number
    It seems lines 16-193 still exist in memory, so my concern is that they are potentially exposed somehow to exploits or what not.  So my practice is to do any configs I do using VTY 0 193 to ensure universal configuration.  But, my "enabling" the extra lines, am I using more memory, and, how secure is this against somebody trying to say, connect 193 times to my router simtaneously?  Does it increase the likelihood of success on DoS attack for example. 

    Hi guys, thanks for the replies and excellent information.  I'm excited to look at the IOS Hardending doc and the other stuff too. 
    Just to clarify, I don't actually use the default config, I only pasted it from a new router just to illustrate the default VTY line count. 
    I never use telnet from inside or outside, anyting snooping a line will pick up the cleartext as ou both know of course.  SSH is always version 2 etc. 
    I was considering doing a console server from the insidde as the only access method - which I do have set up but I have to remote to it It's just that with power outages at times, the console PC won't come back up (no BIOS setting to return to previous state, no WOL solution in place) so now I have both that plus the SSH access.  I have an ACL on both the VTY lines themselves as well as a ZBFW ACL governing SSH - perhaps a bit redundant in some ways but oh well if there's a zero-day ou thtere for turning off the zbfw I might still be protected  
    Regretfully I havne't learned about AAA yet - that I believe is in my CCNA Security book but first I need to get other things learned. 
    And with regard to logging in general, both enabling the right kind and monitoring it properly, that's a subject I need to work on big time.  I still get prot 25 outbound sometimes from a spam bot, but by the time I manually do my sh logging | i :25 I have missed it (due to cyclic logging with a buffer at 102400).  Probably this woud be part of that CCNA Security book as well. 
    So back to the # of VTY lines.  I will see what I can do to reduce the line count.  I suppose something like "no line vty 16 193" might work, if not it'll take some research. 
    But if an attacker wants to jam up my vty lines so I can't connect in, once they've fingerprinted the unit a bit to find out that I don't have an IPS running for example, wouldn't it be better that they have to jam up 193 lines simultaneously (with I presume 193 source IPs) instaed of 16?  Or am I just theorizing too much here.  I'ts not that this matters much, anybody who cares enough to hack this router will get a surprise when they find out there's nothing worth the effort on the other side But this is more so I can be better armed for future deployments.  Anyway, I will bookmark the info from this thread and am looking forward to reading it. 

  • Once and for all: How to set up and use SSH

    Yes, I know ssh has been discussed on and off, but never in its entirety; and yes, there are step by step instructions on the www, but at one point or another they skip a crucial instruction that would be necessary for unix-dummies (e.g. how to save and close the nano-editor in Terminal). So, please pardon my question:
    There are several points I'd like to ask for ssh-connecting two macs on a local network:
    1) In terminal-file-"connect to server" you can ask for an ssh connection to be set up. For this to work, do I need to create private and public keys first? If so, how? Please point me to a reliable and step-by-step instruction site.
    There are some free ssh-utilities out there, but their documentation is just not helpful enough for a UNIX-dummy.
    2) Apparently I managed to connect via ssh once (from the terminal, see point 1) to a local server (allowing remote connection set to ON at the server). But then, when I connected to that server from the client's finder and tried to get into my user account on that server it told me that no secure connection could be established. What's wrong here? Do I have to continue working from within the terminal to use this connection? That would be difficult for an average MacUser.
    3) What is the security advantage of an SSH connection on a local wireless network (Airport Base Station) over WPA2, if at all?
    4) And how to set up an ssh-connection over the internet cloud to safely build a remote control/desktop sharing connection, e.g., a friend's Mac when she has a problem?
    Thanks for your consideration.

    First I'm not sure what your goals are.
    1) In terminal-file-"connect to server" you can ask for an ssh connection to be set up. For this to work, do I need to create private and public keys first?
    If you have ssh keys, you can do this without passwords. If you have not exchanged keys with the remote system, you will be asked for the password of the user you are attempting to login as.
    If so, how? Please point me to a reliable and step-by-step instruction site. There are some free ssh-utilities out there, but their documentation is just not helpful enough for a UNIX-dummy.
    Log into the remote system. This could be via ssh.
    On the remote system, run the following command to generate an ssh key for that remote system:
    ssh-keygen -t rsa
    Generating public/private rsa key pair.
    Enter file in which to save the key (/Users/username/.ssh/id_rsa): <<take default>>
    Created directory '/Users/username/.ssh'.
    Enter passphrase (empty for no passphrase): <<enter nothing>>
    Enter same passphrase again: <<enter nothing again>>
    Your identification has been saved in /Users/username/.ssh/id_rsa.
    Your public key has been saved in /Users/username/.ssh/id_rsa.pub.
    The key fingerprint is:
    aa:bb:cc:dd:ee:ff:gg:hh:ii:jj:kk:ll:mm:nn:oo:pp [email protected]
    This will generate an ssh key for the remote system. This could be any system that support ssh, such as a Unix system, or another Mac.
    Copy the id_rsa.pub file from the remote system to your Mac. When I say "your Mac" I mean the one that you want to make the ssh connection from. The id_rsa.pub is found in the remote system's ~username/.ssh/ directory.
    Append the copied id_rsa.pub to your Mac's ~himbear/.ssh/authorized_keys2 file
    cat id_rsa.pub >>~himbear/.ssh/authorized_keys2
    Now when you ssh to that specific remote system, it will NOT ask for a password. The first time you ssh to any system, ssh will ask if the system is really the system you thing it is. But once you say "yes", it will not ask that question again.
    Repeat for every remote system you wish to log into using an ssh key.
    2) Apparently I managed to connect via ssh once (from the terminal, see point 1) to a local server (allowing remote connection set to ON at the server). But then, when I connected to that server from the client's finder and tried to get into my user account on that server it told me that no secure connection could be established. What's wrong here? Do I have to continue working from within the terminal to use this connection? That would be difficult for an average MacUser.
    MacUser. A flash from the past, as in the MacUser magazine.
    ssh is not used by default when you make connections. If you want an ssh connection, you have to establish it intentionally.
    ssh can be used to pre-establish a tunnel (or tunnels) that other services can use. Once an ssh tunnel is establish, connections to local host's tunnel port will be connected to the specified remote port. For example:
    ssh -L 5901:localhost:5900 [email protected]
    will establish a tunnel that VNC can use. The VNC client would connect to localhost display 1 or port 5901.
    ssh allows multiple -L tunnels to be specified on the ssh command line.
    3) What is the security advantage of an SSH connection on a local wireless network (Airport Base Station) over WPA2, if at all?
    Inside you home. Not much. Unless of course you do not trust the other members of your family. That is to say, others having your WPA2 password, and are thus on the inside, and can sniff you packets.
    4) And how to set up an ssh-connection over the internet cloud to safely build a remote control/desktop sharing connection, e.g., a friend's Mac when she has a problem?
    If you are using the Mac OS X Leopard built-in *Screen Sharing* and you are connecting to another Mac's built-in Leopard System Preferences -> Sharing -> Remote Management (Tiger's Apple Remote Desktop), then in the *Screen Sharing* preferences, is an "Encrypt all network data" option.
    If you wish to set this option in advance, you can launch *Screen Sharing* by double clicking on System -> Library -> CoreServices -> Screen Sharing.app
    You can *Screen Sharing* connections over the net using iChat. This is one of the easiest ways to take control of their system. Of course they need to cooperate. I use a Free AOL Instant Messager (AIM) account for my iChat connections. And as a side benefit you can text, audio chat and/or video chat with the person at the other end.
    If you are NOT using the build-in Mac OS X *Screen Sharing* and/or you are NOT using the build-in remote Mac OS X remote management server, then this is a situation where an ssh tunnel would be a very good idea.
    However, setting up an ssh tunnel between 2 systems across the internet gets complex.
    In this case you might want to consider using something like LogMeIn.com which will deal with all those nasty home routers without needing to to do nasty router configurations, and it will be a secure connection. LogMeIn.com will not be as fast as a *Screen Sharing* connection or a VNC connection, but it will be secure and easy to establish. Again, this is only if you can not to Mac to Mac *Screen Sharing* using built-in Mac OS X remote desktop.
    Now if you want to roll your own ssh tunnels for VNC, then I'm just going to outline the things you need to do.
    If the remote system is behind a home router, you need to configure that remote home router to "Port Forward" port 22 on the Internet side to port 22 on the target Mac. Bonus points if the internet side using a high number port to discourge net bots from knocking on your door. Use the ssh -p 12345 option to connect to the high numbered port that is forwarded to port 22 of the destination Mac.
    On the remote Mac you need to run a VNC server. If this is a Mac, then Leopard System Preferences -> Sharing -> Remote Management (Tiger's Apple Remote Desktop). If it is not a Mac, then for Windows, TightVNC, UltraVNC, RealVNC are possible options. Linux has a built-in vncserver, or you can install x11vnc which has the advantage of displaying the desktop screen.
    Once you can access the remote system, you use an ssh command like the following:
    ssh -p 12345 -L 5901:localhost:5900 remote.system.address
    You can get the remote system's address by having the remote system surf over to http://whatismyip.com. Then they can tell you the IP address.
    If you are going to be doing this a lot, you can get a free no-ip.com or dyndns.org dynamic DNS name for the remote system, and the remote system can run a dynamic DNS client (available from no-ip.com or dyndns.org) which will keep the dynamic DNS name updated as the remote person's ISP change's their IP address.
    Finally, now that you have an ssh tunnel for VNC traffic, you have your VNC client connect to
    Address: localhost
    Port: 5901
    Depending on your VNC client you may need to specify Display 1 instead of Port 5901. Or if you do not get a Display or Port option you specify localhost:5901

  • How to set a line of table as read only during runtime?

    How to set a line (or a cell) of table as read only during runtime?

    hi wei
          when you create a table keep the readonly property of table as false
    you create the columns of table as inputfield.you bind the readonly property of
    the inputfield to two context variables
    say one for all the columnfields you to want always have as readonly and let this contextattribute of type boolean and let this be attr1
    and another for all the columnfields you donot want to be readonly and let this contextattribute of type boolean and let this be attr2
    initially set the context attributes attr1 and attr2 as true so the entire table is readonly.
    based on the condition you want to check change the attr2 to be false.
    if(your condition)
    wdcontext.currentcontextelement.setattr2(false);
    hope this helps.
    regards
    saravana

  • Our Ipad type line for text disappears after taking a photo to send and only after a restart

    Hello.  We have two Ipads and two Iphones. Our newest Ipad has an issue with I message. If we take a photo to send by text the type screen and line disappears. The only way to get it back is to shut the device and then the type line returns. We have turned the message off on on with the same result. Our Ipad 2 and both our 4s and 5 phones don't seem to have the issue. Any thoughts? We are also did the icloud update and no change happened. Is this a bug or are we missing something? Messaging works fine until we take a picture then the type bar and keyboard disappear. The taken photo goes to photos.. The only way to get messages to work is to shut off the device and then it works until we try to add another new picture. It seems to work if we use an existing photo from the library.

    This sounds like you may have the camera's "Image Review" option set to "hold".
    When you take a photo, two things normally happen.
    1)  The camera should write the image to your memory card.  You'll know when it's writing to your memeory card because there is a red LED ligth which is active when the camera is using the card.  When the light goes out, the camera is finished.
    2)  The camera can be set to do "Image Review".  By default, when you take an exposure, the camera will display the image on the rear screen for just a few seconds.  But this behavior can be customized.
    Your choices for image review are "Off", 2 seconds, 4 seconds, 8 seconds, or "Hold".  If Off is selected you wont get any image review.  If "Hold" is selected, the image you just took will appear on the rear LCD and will never go away until you manually clear it.  You can just do a half-press of the shutter button to clear it (it wont get in the way of you taking more shots... just ignore it.)
    You can find instructions on this on page 166 of your T3i Instruction Manual which describes how to change this setting.
    Tim Campbell
    5D II, 5D III, 60Da

  • Matrix - Help with setting 1st column for line numbers

    Hi,
    I have created a matrix on a custom form and would like to add line numbers to the # column line that of the quotation screen.
    The matrix itself is populated correct from the Query and LoadFromDataSource, and all the fields and columns are filled in correctly, the only column I am having trouble with is the 1st one for line numbers. My code for adding the line numbers is
    SBO_Application.MessageBox("Matrix Count: " & tMatrix.RowCount)
    For i = 1 To tMatrix.RowCount
          oEditText = tColumns.Item("#").Cells.Item(i).Specific
          oEditText.Value = i
    Next
    For the example I am using I get the message box appear:
    Matrix Count: 26
    So I know I should have the line number go from 1 to 26, however I only get 1 to 9 displayed, all the remaining lines are blank.
    Any ideas on why it stops at 9 or what I should do to correctly set the line numbers in the Number column like that of the system Quotation/Sales orders forms.
    Your help is much appreciated
    Matthew

    Hi,
    I tried changing it to the following as you suggested:
    SBO_Application.MessageBox("Matrix Count: " & tMatrix.VisualRowCount)
    For i = 1 To tMatrix.VisualRowCount
        oEditText = tColumns.Item("#").Cells.Item(i).Specific
        oEditText.Value = i
    Next
    The message box still displays 26, however my lines still only go up to number 9.
    Thanks for the quick response.

  • Shell authorization works only on vty lines and not on console

    Why does command authorization only works for the vty line and NOT for the consoles?
    I use ACS for Win 3.3.(1)
    any input are very welcome
    Configuration
    aaa new-model
    aaa authentication login VTY group tacacs+ local
    aaa authentication login CONSOLE group tacacs+ local
    aaa authentication enable default group tacacs+ enable
    aaa authorization exec default group tacacs+ none
    aaa authorization commands 15 default group tacacs+ none
    line con 0
    login authentication CONSOLE
    line vty 0 4
    login authentication VTY

    By default, console authorization is turned off, even with all the standard authorization commands in your configuration. This was done deliberately to leave the console connection as a "back door" to get into the router in case you lock yourself out (which is easy to do with authorization). The theory is that if someone has access to your console port, you have a lot more to worry about than command authorization :-)
    If you really, really want to do this, make sure it works fine first on the VTY's, and then issue the hidden command:
    aaa authorization console

  • How do I set up a ringmaster on my fax 2140 so that I can use the same line for phone

     I have  the HP 2140 Fax Machine and have always had a separate line for the fax.  Now, I have only one line which is
    to be used for both the telepone and my fax machine.  This will save me approx. $200 per year. 

    cannot get my fax machine to except the drpd distintive ring. went to change the print cartg. and screwed something up?     Can you help?

Maybe you are looking for

  • Installing Powerpivot for Sharepoint 2013 with SQL Server 2008 R2

    Hi, We are currently setting up a Sharepoint 2013 Enterprise farm with the backend database server being SQL Server 2008 R2 SP2 - my question is can you install  Powerpivot for Sharepoint 2013 in this configuration and if so what are the steps? Thank

  • Dropdown Not Working on  ISR Adobe Form ...

    I am trying to create Dropdown for The Positiones in the ISR Form through Transaction SFP. I have Taken The UI Element <b>"ISR DDL 1 st Selected"</b> ie. from ISR <b>Native Library as my Form is of Layout type 'ZCI'.</b> I have also written the Logic

  • Could it be the batte

    i dropped my zen mirco, it worked but because of being on? low battery at the time it run out. i then tried to power the player up via my usb pport and wouldn't charge. i then charged it by the normal power supply and it charged fine, but what i didn

  • Connectivity cable driver

    Hello, I have a problem when I try to install PC Suite 683 I get error: "Another version of Nokia Connectivity Cable Driver has been detected. Please remove it before continuing." I don't know what to do else. Here is the things I tried: 1. add/remov

  • Dreadfully slow when trying to mousedrag an image

    Hi. I just switched to Keynote '09 and am trying to edit a very simple, one slide diagram that I created in Keynote '08. Whereas moving a single image around in '08 is seamless, moving the same image in the '09 version of the files is PAINFULLY slow,