SNMP from CW through firewall w/out nat

I have to configure a fwsm context with a new vlan to manage external customer routers. I dont want to nat the nms ip but can't seem to get a reply after adding the nat statement. Any info on snmp through pix's would be very helpful.
configure route to nms,,, done
configure nat statement in context using no nat,,, done
Is it the return? do I need to add an xlate or global statement?

You have the route to your NMS in the customer routers too? What do your logs say? Can you post the relative info on the PIX and router?

Similar Messages

  • STATIC IP issues from outside of firewall

    Hi
    I’m having one issue, we have static IP and we NAT the same to some local IP for our internal needs. Whenever we tried to reach the static IP from outside of firewall(some other network), it is working properly. But when we try to ping or use that static IP in internal LAN that is not working.
    192.168.0.149 is internal LAN I have NAT to 202.xxx.xxx.xxx static IP with port 80.
    Please help me on this.
    here is the device running configuration
    Result of the command: "show running-config"
    : Saved
    ASA Version 9.1(3) 
    hostname ciscoasa
    enable password 8Ry2YjIyt7RRXU24 encrypted
    names
    ip local pool clientpool 192.168.0.20-192.168.0.50 mask 255.255.255.0
    interface GigabitEthernet0/0
     nameif inside
     security-level 100
     ip address 192.168.0.5 255.255.255.0 
    interface GigabitEthernet0/1
     nameif outside
     security-level 0
     ip address 202.53.82.98 255.255.255.240 
    interface GigabitEthernet0/2
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/3
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/4
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/5
     shutdown
     no nameif
     no security-level
     no ip address
    interface Management0/0
     management-only
     nameif management
     security-level 100
     ip address 192.168.5.1 255.255.255.0 
    ftp mode passive
    dns domain-lookup outside
    dns server-group PW
     name-server 202.53.64.202
     name-server 202.53.72.13
     name-server 192.168.0.16
     name-server 192.168.0.8
    same-security-traffic permit intra-interface
    object network PW-LAN
     subnet 192.168.0.0 255.255.255.0
    object network USA
     subnet 192.168.2.0 255.255.255.0
    object network 202.53.82.110
     host 202.53.82.110
    object network PWHYD
     subnet 192.168.1.0 255.255.255.0
    object network 192.168.0.151
     host 192.168.0.151
    object network 192.168.0.154
     host 192.168.0.154
    object network 192.168.0.156
     host 192.168.0.156
    object network 192.168.0.158
     host 192.168.0.158
    object network 192.168.0.159
     host 192.168.0.159
    object network 192.168.0.149
     host 192.168.0.149
    object network Rackspace
     subnet 10.176.0.0 255.240.0.0
    object network NETWORK_OBJ_10.176.0.0_12
     subnet 10.176.0.0 255.240.0.0
    object network 192.168.0.147_http
     host 192.168.0.147
    object service http
     service tcp source eq www destination eq www 
    object network 192.168.0.14
     host 192.168.0.14
    object network 192.168.0.14_iCA
     host 192.168.0.14
    object network 192.168.0.159_http
     host 192.168.0.159
    object network 192.168.0.159_50100
     host 192.168.0.159
    object network 202.53.82.101
     host 202.53.82.101
    object network 192.168.0.159_8001
     host 192.168.0.159
    object network 192.168.0.192
     host 192.168.0.192
    object network 192.168.0.159_any
     host 192.168.0.159
    object network clientpool
     range 192.168.0.20 192.168.0.50
    object network NETWORK_OBJ_192.168.1.0_24
     subnet 192.168.1.0 255.255.255.0
    object network 192.168.0.192_DEV
     host 192.168.0.192
    object-group network PW-All-Sites
     network-object 192.168.0.0 255.255.255.0
     network-object object PWHYD
     network-object object USA
     network-object object clientpool
    access-list 100 extended permit ip any any 
    access-list 100 extended permit icmp any any 
    access-list l2l-list extended permit ip object-group PW-All-Sites 192.168.2.0 255.255.255.0 
    access-list outside_access_in extended permit ip any any 
    access-list outside_cryptomap extended permit ip object-group PW-All-Sites 192.168.1.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.0.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.1.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.2.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 10.176.0.0 255.240.0.0 
    access-list outside_cryptomap_3 extended permit ip object-group PW-All-Sites object Rackspace 
    access-list inside_access_in extended permit ip any any 
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    mtu management 1500
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    no arp permit-nonconnected
    nat (inside,outside) source static PW-LAN PW-LAN destination static Rackspace Rackspace
    nat (inside,outside) source static PW-LAN PW-LAN destination static PWHYD PWHYD
    nat (inside,outside) source static PW-LAN PW-LAN destination static USA USA
    nat (inside,outside) source dynamic PW-LAN interface
    nat (any,inside) source dynamic clientpool interface
    object network 192.168.0.151
     nat (any,any) static 202.53.82.102 service tcp 3200 3200 
    object network 192.168.0.154
     nat (any,any) static 202.53.82.104 service tcp 3201 3201 
    object network 192.168.0.156
     nat (any,any) static 202.53.82.107 service tcp 3201 3201 
    object network 192.168.0.158
     nat (any,any) static 202.53.82.109 service tcp 3222 3222 
    object network 192.168.0.159
     nat (any,any) static 202.53.82.101 service tcp 3201 3201 
    object network 192.168.0.149
     nat (inside,outside) static 202.53.82.100 service tcp www www 
    object network 192.168.0.147_http
     nat (any,any) static 202.53.82.110 service tcp www www 
    object network 192.168.0.14
     nat (any,any) static 202.53.82.99 service tcp https https 
    object network 192.168.0.14_iCA
     nat (any,any) static 202.53.82.99 service tcp citrix-ica citrix-ica 
    object network 192.168.0.159_50100
     nat (any,any) static 202.53.82.101 service tcp 50100 50100 
    object network 192.168.0.159_8001
     nat (any,any) static 202.53.82.101 service tcp 8001 8001 
    object network 192.168.0.192_DEV
     nat (any,any) static 202.53.82.106 service tcp 3201 3201 
    access-group inside_access_in in interface inside
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 202.53.82.97 1
    timeout xlate 3:00:00
    timeout pat-xlate 0:00:30
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server PW protocol radius
    aaa-server PW (inside) host 192.168.0.16
     key *****
    user-identity default-domain LOCAL
    http server enable
    http 192.168.5.0 255.255.255.0 management
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
    crypto ipsec ikev1 transform-set pwset esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set pwsethyd esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set RackspaceSet esp-3des esp-sha-hmac 
    crypto ipsec ikev2 ipsec-proposal RackSpaceSecure
     protocol esp encryption 3des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal pwhydsetsecure
     protocol esp encryption 3des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal secure
     protocol esp encryption aes 3des des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal AES256
     protocol esp encryption aes-256
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES192
     protocol esp encryption aes-192
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES
     protocol esp encryption aes
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal 3DES
     protocol esp encryption 3des
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal DES
     protocol esp encryption des
     protocol esp integrity sha-1 md5
    crypto ipsec security-association replay disable
    crypto ipsec security-association pmtu-aging infinite
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs 
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outsidemap 1 match address l2l-list
    crypto map outsidemap 1 set peer 63.82.1.98 
    crypto map outsidemap 1 set ikev1 transform-set pwset
    crypto map outsidemap 1 set ikev2 ipsec-proposal secure
    crypto map outsidemap 2 match address outside_cryptomap
    crypto map outsidemap 2 set pfs 
    crypto map outsidemap 2 set peer 115.119.186.194 
    crypto map outsidemap 2 set ikev1 transform-set pwsethyd
    crypto map outsidemap 3 match address outside_cryptomap_3
    crypto map outsidemap 3 set peer 67.192.250.53 
    crypto map outsidemap 3 set ikev1 transform-set RackspaceSet
    crypto map outsidemap 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outsidemap interface outside
    crypto ca trustpoint ASDM_TrustPoint0
     crl configure
    crypto ca trustpoint ASDM_TrustPoint1
     crl configure
    crypto ca trustpoint ASDM_TrustPoint2
     enrollment terminal
     fqdn vpn.processweaver.com
     subject-name CN=vpn.processweaver.com,OU=PWIT,O="ProcessWeaver,Inc",C=US,St=California,L=Fremont
     keypair ciscovpn.key
     no validation-usage
     crl configure
    crypto ca trustpoint ASDM_TrustPoint3
     enrollment terminal
     crl configure
    crypto ca trustpoint ASDM_TrustPoint4
     enrollment terminal
     crl configure
    crypto ca trustpool policy
    crypto ca certificate chain ASDM_TrustPoint2
     certificate ca 47869fe5
        3082046a 30820352 a0030201 02020447 869fe530 0d06092a 864886f7 0d010105 
        05003048 310b3009 06035504 06130255 53312030 1e060355 040a1317 53656375 
        72655472 75737420 436f7270 6f726174 696f6e31 17301506 03550403 130e5365 
        63757265 54727573 74204341 301e170d 30383132 32323233 34373339 5a170d32 
        38313232 32323334 3733395a 3081ae31 0b300906 03550406 13025553 3111300f 
        06035504 08130849 6c6c696e 6f697331 10300e06 03550407 13074368 69636167 
        6f312130 1f060355 040a1318 54727573 74776176 6520486f 6c64696e 67732c20 
        496e632e 31363034 06035504 03132d54 72757374 77617665 204f7267 616e697a 
        6174696f 6e205661 6c696461 74696f6e 2043412c 204c6576 656c2032 311f301d 
        06092a86 4886f70d 01090116 10636140 74727573 74776176 652e636f 6d308201 
        22300d06 092a8648 86f70d01 01010500 0382010f 00308201 0a028201 0100e814 
        eea0da97 bd89bd0c cc8ddf08 fb060983 a823515b 013f34da 1f1f6ec1 e35865cb 
        0af9f387 c8c8faa1 ccf574e2 b8ae2d06 8480286f 5ac1225c 929442cd 1902125c 
        10627ea2 44fb165e 9c72b1ac ea04e615 aa99e85a f858b987 24e875cd 2588e258 
        925e8683 7f8a2353 ae8ae8a3 217e83af 40091849 afe1d05a b04f6fe2 31adf4f1 
        371fc92a e18bd68c 1231d427 1adfea6b 9e7853ed 9a19b0ce 45445b1b ef645921 
        fac7b7d1 d30c1ecb 88dafd23 3ff4ac2b a04d61d3 becade19 616124f1 f69cb496 
        bd9deb17 9f243978 e92350d3 015077d8 52642f3e 194f75b9 17b1da8d e0d0eddb 
        3713dc2f e05f8068 d7f487ba c11f1278 d0082717 7a98a69f d221ba4e 87bf0203 
        010001a3 81f43081 f1300f06 03551d13 0101ff04 05300301 01ff301d 0603551d 
        0e041604 145dd996 9a40c727 cb2c9ba2 eccf19ab c8afcc86 48301f06 03551d23 
        04183016 80144232 b616fa04 fdfe5d4b 7ac3fdf7 4c401d5a 43af300b 0603551d 
        0f040403 02010630 34060355 1d1f042d 302b3029 a027a025 86236874 74703a2f 
        2f63726c 2e736563 75726574 72757374 2e636f6d 2f535443 412e6372 6c305b06 
        03551d20 04543052 300c060a 2b060104 0181ed18 03003042 060f2b06 01040181 
        ed180303 03030404 03302f30 2d06082b 06010505 07020116 21687474 703a2f2f 
        7777772e 73656375 72657472 7573742e 636f6d2f 6c656761 6c2f300d 06092a86 
        4886f70d 01010505 00038201 010053f1 c8a017ec 6c8882b1 c024afd1 0858b32c 
        6f7bc15c 89926f88 fc4bc002 50932f5a 419859b6 e37f8c14 63777d45 3c88505e 
        a6815200 c8c5fe48 ee1f5dad de440b42 589ce167 5c43b6a0 8598ff16 d41a28be 
        76e12fe1 84f47eb9 27aa77cb 36b3fec3 fad217f6 e1624ed3 ccccb319 65d34ba8 
        e8b3d54c eaf64eae cbae3448 1f60cc58 e7e774c9 0135fd6a e0588ad2 16ebece9 
        3ebbf01d cfb6ff1e 0cb7bb39 e9b7981b c05221eb 3a3d7838 8ca9195f 27a4d07f 
        3661ab24 7e9ff82d 3f922963 becb10db 0d403602 a0d417a2 8d7f7e7c 99af455a 
        40cda26b 5cbe0ef3 d387fca1 10caaa33 b7ba4bc0 3da4218c 179ccfd8 bfe657fe 
        cdebfa30 1ad5fee8 2597a9be 3bea
      quit
     certificate 0649f9a965553e7df2709c06c4da1b09e17cd9
        30820510 308203f8 a0030201 02021306 49f9a965 553e7df2 709c06c4 da1b09e1 
        7cd9300d 06092a86 4886f70d 01010505 003081ae 310b3009 06035504 06130255 
        53311130 0f060355 04081308 496c6c69 6e6f6973 3110300e 06035504 07130743 
        68696361 676f3121 301f0603 55040a13 18547275 73747761 76652048 6f6c6469 
        6e67732c 20496e63 2e313630 34060355 0403132d 54727573 74776176 65204f72 
        67616e69 7a617469 6f6e2056 616c6964 6174696f 6e204341 2c204c65 76656c20 
        32311f30 1d06092a 864886f7 0d010901 16106361 40747275 73747761 76652e63 
        6f6d301e 170d3134 30363131 30353330 33355a17 0d313530 32323331 31333033 
        355a3070 311e301c 06035504 030c1576 706e2e70 726f6365 73737765 61766572 
        2e636f6d 31163014 06035504 0a0c0d50 726f6365 73735765 61766572 31143012 
        06035504 070c0b53 616e7461 20436c61 72613113 30110603 5504080c 0a43616c 
        69666f72 6e696131 0b300906 03550406 13025553 30820122 300d0609 2a864886 
        f70d0101 01050003 82010f00 3082010a 02820101 00cc194c fbdd63f5 0b49141a 
        9d21063f a13136df e524cef9 c55e9331 e6c5bc67 43361421 cafb7dc1 d244942e 
        6fd02ee7 198e7f7e 48ca62c2 1c8e1a8e 20431d42 b24103f1 5fad9287 9f9dc2da 
        5002e0b4 cf14b414 31e0e691 26cfbc0c 1ee09d6d 8176a63d 6ad81c30 b2b69dbe 
        59ce7092 44c09e62 27f20c58 8bd8e38a a3d75a94 94bbca6f 7ad87b93 3892ddb0 
        3f00a693 e05b5fe8 7a71d36c 223e1ded 8afb8ee4 1eea579c 53d964df 467694e9 
        b7ffe4f9 22c6dd5e 33d0ffee 9fd57fed 621c62f1 4dc6f14e 6518de53 c2fd7d5d 
        b37913b8 69211fe5 e194a6bf f60bc88a 343a93dc 34526931 b41566e3 f38f219f 
        9a6cefd5 d6d60002 2442b3e5 b4096717 2ffea23d b1020301 0001a382 01623082 
        015e300b 0603551d 0f040403 0205a030 1d060355 1d250416 30140608 2b060105 
        05070302 06082b06 01050507 0301301d 0603551d 0e041604 14cd47cf 646a8932 
        7cecb024 9fd2a31a b54d73dc c0301f06 03551d23 04183016 80145dd9 969a40c7 
        27cb2c9b a2eccf19 abc8afcc 86483048 0603551d 20044130 3f303d06 0f2b0601 
        040181ed 18030303 03040403 302a3028 06082b06 01050507 0201161c 68747470 
        733a2f2f 73736c2e 74727573 74776176 652e636f 6d2f4341 30370603 551d1104 
        30302e82 1576706e 2e70726f 63657373 77656176 65722e63 6f6d8215 7774732e 
        70726f63 65737377 65617665 722e636f 6d303506 03551d1f 042e302c 302aa028 
        a0268624 68747470 3a2f2f63 726c2e74 72757374 77617665 2e636f6d 2f4f5643 
        415f4c32 2e63726c 30360608 2b060105 05070101 042a3028 30260608 2b060105 
        05073001 861a6874 74703a2f 2f6f6373 702e7472 75737477 6176652e 636f6d2f 
        300d0609 2a864886 f70d0101 05050003 82010100 0785070e 045d6201 3ffc49b5 
        88808587 b6418d0e 87dc7ae8 3204563b 6e51ff93 25e8ad7a 9a11d439 2439a533 
        768477ca 902fdfbe f0c58a04 e15bf6a5 63829d4b a36c7ccc 0af9532b f39ec31d 
        21cd6b74 d3adffc2 5f8ee1c4 92c07ac6 ab547346 c740f477 857a82fd 897029d5 
        1cfa9b55 b1064ab7 1274556c 6a14f7a8 b8705cd4 51d6b7f4 0a024f6d 1818918c 
        0cb15bc5 cd301684 38c2dcb8 2585b44c 18808e1b 823a6043 28da0194 280fa6c9 
        80831cbc 1179be24 fc391e54 965761e5 e51031e1 0c76c65f 187922d0 96be80c9 
        3de9a56e 41d0fd3f 76afaf49 4bc4ff4c 213aa474 60a742ba 2a8fb3bd c9349da3 
        1ac96b24 7b99cba5 a28c6647 7803cf2c ee70540c
      quit
    crypto ikev2 policy 10
     encryption 3des
     integrity sha
     group 2
     prf sha
     lifetime seconds 28800
    crypto ikev2 enable outside
    crypto ikev2 remote-access trustpoint ASDM_TrustPoint2
    crypto ikev1 enable outside
    crypto ikev1 policy 10
     authentication pre-share
     encryption 3des
     hash sha
     group 2
     lifetime 28800
    telnet timeout 5
    ssh timeout 5
    ssh key-exchange group dh-group1-sha1
    console timeout 0
    dhcpd address 192.168.5.2-192.168.5.254 management
    dhcpd enable management
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    ssl trust-point ASDM_TrustPoint2 outside
    webvpn
     enable outside
     anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
     anyconnect enable
     tunnel-group-list enable
    group-policy GroupPolicy_PWSSL internal
    group-policy GroupPolicy_PWSSL attributes
     wins-server none
     dns-server value 192.168.0.16
     vpn-tunnel-protocol ssl-client 
     split-tunnel-policy tunnelspecified
     split-tunnel-network-list value PW-VPN-Tunnel-ACL
     default-domain value processw.local
     webvpn
      anyconnect keep-installer none
    group-policy GroupPolicy_115.119.186.194 internal
    group-policy GroupPolicy_115.119.186.194 attributes
     vpn-tunnel-protocol ikev1 l2tp-ipsec 
    group-policy GroupPolicy_67.192.250.53 internal
    group-policy GroupPolicy_67.192.250.53 attributes
     vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless
    group-policy pw internal
    group-policy pw attributes
     dns-server value 192.168.0.16
     vpn-tunnel-protocol ikev1 ikev2 
     split-tunnel-policy tunnelspecified
     split-tunnel-network-list value PW-VPN-Tunnel-ACL
     default-domain none
    username rajuvaradha password 6biM7HbMtaadT82k encrypted
    username e172 password E1abOIw/eu.DKO/y encrypted
    username e150 password dJMsBQfrQRISuR8n encrypted
    username e134 password bLBixKKCoH5Udlk9 encrypted
    username e182 password mirFopEi/OG0LT4d encrypted
    username e192 password u2P6WXLa1k8.kA1w encrypted
    username e184 password Rpt/S1N6et6Xwi7W encrypted
    username u033 password pS5QN8QLvYFHJfoK encrypted
    username u011 password HGFsDnR5XiFAzrcE encrypted
    username u010 password 5R8mktMpyUYPCpTO encrypted
    username u032 password rst8O1b/yrXsKVmu encrypted
    username u002 password .u2izEtqOIC5D2fT encrypted
    username admin password eY/fQXw7Ure8Qrz7 encrypted
    username u012 password JClYI3r7x0T/ed26 encrypted
    username u015 password 6tNvtB4hPcUNDyhE encrypted
    username u014 password Wy6x8dPcSnMcAT1v encrypted
    username u017 password xahCXrBaZWzW8aEp encrypted
    username u006 password BCEOAmlRL6CbQfTV encrypted
    username e006 password DG96SZQ2gBqIXEYv encrypted
    username e034 password 1sG72DUjsY7nt81V encrypted
    username u007 password vtcK6xerueHvqZJZ encrypted
    username u016 password pZgySMnraNBlTTnL encrypted
    username u025 password ulAXIX1u2.UD/KvT encrypted
    username u008 password G4vmDF.mv3rXWa7h encrypted
    username u019 password NxlycJwroZrzCSJ3 encrypted
    username e019 password E9NaUPs18c0.PBnd encrypted
    username u018 password 33CghGQSMjbWDfdb encrypted
    username u009 password uaaSLEu55XXbD5Sr encrypted
    username u028 password UMFMzXMs6He7.zR8 encrypted
    username e097 password .UawdlGNiYnRHnzF encrypted
    username e314 password ye2/LpVufAXvAUJ6 encrypted
    username e327 password 6mKef3HGlnyb6hnu encrypted
    username e343 password 0g33Wbvzi.NL1PjH encrypted
    username e222 password e0.SFEwm1RqC6lLj encrypted
    username e289 password /YrO2mEvMUr9zxq3 encrypted
    username e201 password Eox2TB.HgdkKLuec encrypted
    username e265 password fTk7Vxw0Z06AAbHi encrypted
    username e251 password 6y7YjKQO1rP3nAQG encrypted
    username e219 password p049Lf7jFLisN6UJ encrypted
    username e269 password v7oFefIpmPGd307D encrypted
    tunnel-group 63.82.1.98 type ipsec-l2l
    tunnel-group 63.82.1.98 ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group pw type remote-access
    tunnel-group pw general-attributes
     address-pool clientpool
     default-group-policy pw
    tunnel-group pw ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group 115.119.186.194 type ipsec-l2l
    tunnel-group 115.119.186.194 general-attributes
     default-group-policy GroupPolicy_115.119.186.194
    tunnel-group 115.119.186.194 ipsec-attributes
     ikev1 pre-shared-key *****
     ikev2 remote-authentication pre-shared-key *****
     ikev2 local-authentication pre-shared-key *****
    tunnel-group 67.192.250.53 type ipsec-l2l
    tunnel-group 67.192.250.53 general-attributes
     default-group-policy GroupPolicy_67.192.250.53
    tunnel-group 67.192.250.53 ipsec-attributes
     ikev1 pre-shared-key *****
     ikev2 remote-authentication pre-shared-key *****
     ikev2 local-authentication pre-shared-key *****
    tunnel-group PWSSL type remote-access
    tunnel-group PWSSL general-attributes
     address-pool clientpool
     authentication-server-group PW LOCAL
     default-group-policy GroupPolicy_PWSSL
    tunnel-group PWSSL webvpn-attributes
     group-alias PWSSL enable
    class-map inspection_default
     match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
     parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
     class inspection_default
      inspect dns preset_dns_map 
      inspect ftp 
      inspect h323 h225 
      inspect h323 ras 
      inspect rsh 
      inspect rtsp 
      inspect esmtp 
      inspect sqlnet 
      inspect skinny  
      inspect sunrpc 
      inspect xdmcp 
      inspect sip  
      inspect netbios 
      inspect tftp 
      inspect ip-options 
      inspect icmp 
    service-policy global_policy global
    prompt hostname context 
    call-home reporting anonymous prompt 1
    Cryptochecksum:80663f0c45d0a6736344cf989a7af706
    : end

    Hi Marius,
    Thanks for your suggestion
    i have followed the same, but i'm still not able to access the static IP internal LAN. here is the running config out put.
    Result of the command: "show running-config"
    : Saved
    ASA Version 9.1(3) 
    hostname ciscoasa
    enable password 8Ry2YjIyt7RRXU24 encrypted
    names
    ip local pool clientpool 192.168.0.20-192.168.0.50 mask 255.255.255.0
    interface GigabitEthernet0/0
     nameif inside
     security-level 100
     ip address 192.168.0.5 255.255.255.0 
    interface GigabitEthernet0/1
     nameif outside
     security-level 0
     ip address 202.53.82.98 255.255.255.240 
    interface GigabitEthernet0/2
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/3
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/4
     shutdown
     no nameif
     no security-level
     no ip address
    interface GigabitEthernet0/5
     shutdown
     no nameif
     no security-level
     no ip address
    interface Management0/0
     management-only
     nameif management
     security-level 100
     ip address 192.168.5.1 255.255.255.0 
    ftp mode passive
    dns domain-lookup outside
    dns server-group PW
     name-server 202.53.64.202
     name-server 202.53.72.13
     name-server 192.168.0.16
     name-server 192.168.0.8
    same-security-traffic permit intra-interface
    object network PW-LAN
     subnet 192.168.0.0 255.255.255.0
    object network USA
     subnet 192.168.2.0 255.255.255.0
    object network 202.53.82.110
     host 202.53.82.110
    object network PWHYD
     subnet 192.168.1.0 255.255.255.0
    object network 192.168.0.151
     host 192.168.0.151
    object network 192.168.0.154
     host 192.168.0.154
    object network 192.168.0.156
     host 192.168.0.156
    object network 192.168.0.158
     host 192.168.0.158
    object network 192.168.0.159
     host 192.168.0.159
    object network 192.168.0.149
     host 192.168.0.149
    object network Rackspace
     subnet 10.176.0.0 255.240.0.0
    object network NETWORK_OBJ_10.176.0.0_12
     subnet 10.176.0.0 255.240.0.0
    object network 192.168.0.147_http
     host 192.168.0.147
    object service http
     service tcp source eq www destination eq www 
    object network 192.168.0.14
     host 192.168.0.14
    object network 192.168.0.14_iCA
     host 192.168.0.14
    object network 192.168.0.159_http
     host 192.168.0.159
    object network 192.168.0.159_50100
     host 192.168.0.159
    object network 202.53.82.101
     host 202.53.82.101
    object network 192.168.0.159_8001
     host 192.168.0.159
    object network 192.168.0.192
     host 192.168.0.192
    object network 192.168.0.159_any
     host 192.168.0.159
    object network clientpool
     range 192.168.0.20 192.168.0.50
    object network NETWORK_OBJ_192.168.1.0_24
     subnet 192.168.1.0 255.255.255.0
    object network 192.168.0.192_DEV
     host 192.168.0.192
    object network 202.53.82.100
     host 202.53.82.100
    object network 149
     host 192.168.0.149
    object-group network PW-All-Sites
     network-object 192.168.0.0 255.255.255.0
     network-object object PWHYD
     network-object object USA
     network-object object clientpool
    access-list 100 extended permit ip any any 
    access-list 100 extended permit icmp any any 
    access-list l2l-list extended permit ip object-group PW-All-Sites 192.168.2.0 255.255.255.0 
    access-list outside_access_in extended permit ip any any 
    access-list outside_cryptomap extended permit ip object-group PW-All-Sites 192.168.1.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.0.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.1.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 192.168.2.0 255.255.255.0 
    access-list PW-VPN-Tunnel-ACL standard permit 10.176.0.0 255.240.0.0 
    access-list outside_cryptomap_3 extended permit ip object-group PW-All-Sites object Rackspace 
    access-list inside_access_in extended permit ip any any 
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    mtu management 1500
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    no arp permit-nonconnected
    nat (inside,outside) source static PW-LAN PW-LAN destination static Rackspace Rackspace
    nat (inside,outside) source static PW-LAN PW-LAN destination static PWHYD PWHYD
    nat (inside,outside) source static PW-LAN PW-LAN destination static USA USA
    nat (inside,outside) source dynamic PW-LAN interface
    nat (any,inside) source dynamic clientpool interface
    nat (inside,inside) source static PW-LAN PW-LAN destination static 192.168.0.149 202.53.82.100
    object network 192.168.0.151
     nat (any,any) static 202.53.82.102 service tcp 3200 3200 
    object network 192.168.0.154
     nat (any,any) static 202.53.82.104 service tcp 3201 3201 
    object network 192.168.0.156
     nat (any,any) static 202.53.82.107 service tcp 3201 3201 
    object network 192.168.0.158
     nat (any,any) static 202.53.82.109 service tcp 3222 3222 
    object network 192.168.0.159
     nat (any,any) static 202.53.82.101 service tcp 3201 3201 
    object network 192.168.0.147_http
     nat (any,any) static 202.53.82.110 service tcp www www 
    object network 192.168.0.14
     nat (any,any) static 202.53.82.99 service tcp https https 
    object network 192.168.0.14_iCA
     nat (any,any) static 202.53.82.99 service tcp citrix-ica citrix-ica 
    object network 192.168.0.159_50100
     nat (any,any) static 202.53.82.101 service tcp 50100 50100 
    object network 192.168.0.159_8001
     nat (any,any) static 202.53.82.101 service tcp 8001 8001 
    object network 192.168.0.192_DEV
     nat (any,any) static 202.53.82.106 service tcp 3201 3201 
    object network 149
     nat (any,any) static 202.53.82.100 service tcp www www 
    access-group inside_access_in in interface inside
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 202.53.82.97 1
    timeout xlate 3:00:00
    timeout pat-xlate 0:00:30
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server PW protocol radius
    aaa-server PW (inside) host 192.168.0.16
     key *****
    user-identity default-domain LOCAL
    http server enable
    http 192.168.5.0 255.255.255.0 management
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
    crypto ipsec ikev1 transform-set pwset esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac 
    crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
    crypto ipsec ikev1 transform-set pwsethyd esp-3des esp-sha-hmac 
    crypto ipsec ikev1 transform-set RackspaceSet esp-3des esp-sha-hmac 
    crypto ipsec ikev2 ipsec-proposal RackSpaceSecure
     protocol esp encryption 3des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal pwhydsetsecure
     protocol esp encryption 3des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal secure
     protocol esp encryption aes 3des des
     protocol esp integrity sha-1
    crypto ipsec ikev2 ipsec-proposal AES256
     protocol esp encryption aes-256
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES192
     protocol esp encryption aes-192
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES
     protocol esp encryption aes
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal 3DES
     protocol esp encryption 3des
     protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal DES
     protocol esp encryption des
     protocol esp integrity sha-1 md5
    crypto ipsec security-association replay disable
    crypto ipsec security-association pmtu-aging infinite
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs 
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map outsidemap 1 match address l2l-list
    crypto map outsidemap 1 set peer 63.82.1.98 
    crypto map outsidemap 1 set ikev1 transform-set pwset
    crypto map outsidemap 1 set ikev2 ipsec-proposal secure
    crypto map outsidemap 2 match address outside_cryptomap
    crypto map outsidemap 2 set pfs 
    crypto map outsidemap 2 set peer 115.119.186.194 
    crypto map outsidemap 2 set ikev1 transform-set pwsethyd
    crypto map outsidemap 3 match address outside_cryptomap_3
    crypto map outsidemap 3 set peer 67.192.250.53 
    crypto map outsidemap 3 set ikev1 transform-set RackspaceSet
    crypto map outsidemap 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map outsidemap interface outside
    crypto ca trustpoint ASDM_TrustPoint0
     crl configure
    crypto ca trustpoint ASDM_TrustPoint1
     crl configure
    crypto ca trustpoint ASDM_TrustPoint2
     enrollment terminal
     fqdn vpn.processweaver.com
     subject-name CN=vpn.processweaver.com,OU=PWIT,O="ProcessWeaver,Inc",C=US,St=California,L=Fremont
     keypair ciscovpn.key
     no validation-usage
     crl configure
    crypto ca trustpoint ASDM_TrustPoint3
     enrollment terminal
     crl configure
    crypto ca trustpoint ASDM_TrustPoint4
     enrollment terminal
     crl configure
    crypto ca trustpool policy
    crypto ca certificate chain ASDM_TrustPoint2
     certificate ca 47869fe5
        3082046a 30820352 a0030201 02020447 869fe530 0d06092a 864886f7 0d010105 
        05003048 310b3009 06035504 06130255 53312030 1e060355 040a1317 53656375 
        72655472 75737420 436f7270 6f726174 696f6e31 17301506 03550403 130e5365 
        63757265 54727573 74204341 301e170d 30383132 32323233 34373339 5a170d32 
        38313232 32323334 3733395a 3081ae31 0b300906 03550406 13025553 3111300f 
        06035504 08130849 6c6c696e 6f697331 10300e06 03550407 13074368 69636167 
        6f312130 1f060355 040a1318 54727573 74776176 6520486f 6c64696e 67732c20 
        496e632e 31363034 06035504 03132d54 72757374 77617665 204f7267 616e697a 
        6174696f 6e205661 6c696461 74696f6e 2043412c 204c6576 656c2032 311f301d 
        06092a86 4886f70d 01090116 10636140 74727573 74776176 652e636f 6d308201 
        22300d06 092a8648 86f70d01 01010500 0382010f 00308201 0a028201 0100e814 
        eea0da97 bd89bd0c cc8ddf08 fb060983 a823515b 013f34da 1f1f6ec1 e35865cb 
        0af9f387 c8c8faa1 ccf574e2 b8ae2d06 8480286f 5ac1225c 929442cd 1902125c 
        10627ea2 44fb165e 9c72b1ac ea04e615 aa99e85a f858b987 24e875cd 2588e258 
        925e8683 7f8a2353 ae8ae8a3 217e83af 40091849 afe1d05a b04f6fe2 31adf4f1 
        371fc92a e18bd68c 1231d427 1adfea6b 9e7853ed 9a19b0ce 45445b1b ef645921 
        fac7b7d1 d30c1ecb 88dafd23 3ff4ac2b a04d61d3 becade19 616124f1 f69cb496 
        bd9deb17 9f243978 e92350d3 015077d8 52642f3e 194f75b9 17b1da8d e0d0eddb 
        3713dc2f e05f8068 d7f487ba c11f1278 d0082717 7a98a69f d221ba4e 87bf0203 
        010001a3 81f43081 f1300f06 03551d13 0101ff04 05300301 01ff301d 0603551d 
        0e041604 145dd996 9a40c727 cb2c9ba2 eccf19ab c8afcc86 48301f06 03551d23 
        04183016 80144232 b616fa04 fdfe5d4b 7ac3fdf7 4c401d5a 43af300b 0603551d 
        0f040403 02010630 34060355 1d1f042d 302b3029 a027a025 86236874 74703a2f 
        2f63726c 2e736563 75726574 72757374 2e636f6d 2f535443 412e6372 6c305b06 
        03551d20 04543052 300c060a 2b060104 0181ed18 03003042 060f2b06 01040181 
        ed180303 03030404 03302f30 2d06082b 06010505 07020116 21687474 703a2f2f 
        7777772e 73656375 72657472 7573742e 636f6d2f 6c656761 6c2f300d 06092a86 
        4886f70d 01010505 00038201 010053f1 c8a017ec 6c8882b1 c024afd1 0858b32c 
        6f7bc15c 89926f88 fc4bc002 50932f5a 419859b6 e37f8c14 63777d45 3c88505e 
        a6815200 c8c5fe48 ee1f5dad de440b42 589ce167 5c43b6a0 8598ff16 d41a28be 
        76e12fe1 84f47eb9 27aa77cb 36b3fec3 fad217f6 e1624ed3 ccccb319 65d34ba8 
        e8b3d54c eaf64eae cbae3448 1f60cc58 e7e774c9 0135fd6a e0588ad2 16ebece9 
        3ebbf01d cfb6ff1e 0cb7bb39 e9b7981b c05221eb 3a3d7838 8ca9195f 27a4d07f 
        3661ab24 7e9ff82d 3f922963 becb10db 0d403602 a0d417a2 8d7f7e7c 99af455a 
        40cda26b 5cbe0ef3 d387fca1 10caaa33 b7ba4bc0 3da4218c 179ccfd8 bfe657fe 
        cdebfa30 1ad5fee8 2597a9be 3bea
      quit
     certificate 0649f9a965553e7df2709c06c4da1b09e17cd9
        30820510 308203f8 a0030201 02021306 49f9a965 553e7df2 709c06c4 da1b09e1 
        7cd9300d 06092a86 4886f70d 01010505 003081ae 310b3009 06035504 06130255 
        53311130 0f060355 04081308 496c6c69 6e6f6973 3110300e 06035504 07130743 
        68696361 676f3121 301f0603 55040a13 18547275 73747761 76652048 6f6c6469 
        6e67732c 20496e63 2e313630 34060355 0403132d 54727573 74776176 65204f72 
        67616e69 7a617469 6f6e2056 616c6964 6174696f 6e204341 2c204c65 76656c20 
        32311f30 1d06092a 864886f7 0d010901 16106361 40747275 73747761 76652e63 
        6f6d301e 170d3134 30363131 30353330 33355a17 0d313530 32323331 31333033 
        355a3070 311e301c 06035504 030c1576 706e2e70 726f6365 73737765 61766572 
        2e636f6d 31163014 06035504 0a0c0d50 726f6365 73735765 61766572 31143012 
        06035504 070c0b53 616e7461 20436c61 72613113 30110603 5504080c 0a43616c 
        69666f72 6e696131 0b300906 03550406 13025553 30820122 300d0609 2a864886 
        f70d0101 01050003 82010f00 3082010a 02820101 00cc194c fbdd63f5 0b49141a 
        9d21063f a13136df e524cef9 c55e9331 e6c5bc67 43361421 cafb7dc1 d244942e 
        6fd02ee7 198e7f7e 48ca62c2 1c8e1a8e 20431d42 b24103f1 5fad9287 9f9dc2da 
        5002e0b4 cf14b414 31e0e691 26cfbc0c 1ee09d6d 8176a63d 6ad81c30 b2b69dbe 
        59ce7092 44c09e62 27f20c58 8bd8e38a a3d75a94 94bbca6f 7ad87b93 3892ddb0 
        3f00a693 e05b5fe8 7a71d36c 223e1ded 8afb8ee4 1eea579c 53d964df 467694e9 
        b7ffe4f9 22c6dd5e 33d0ffee 9fd57fed 621c62f1 4dc6f14e 6518de53 c2fd7d5d 
        b37913b8 69211fe5 e194a6bf f60bc88a 343a93dc 34526931 b41566e3 f38f219f 
        9a6cefd5 d6d60002 2442b3e5 b4096717 2ffea23d b1020301 0001a382 01623082 
        015e300b 0603551d 0f040403 0205a030 1d060355 1d250416 30140608 2b060105 
        05070302 06082b06 01050507 0301301d 0603551d 0e041604 14cd47cf 646a8932 
        7cecb024 9fd2a31a b54d73dc c0301f06 03551d23 04183016 80145dd9 969a40c7 
        27cb2c9b a2eccf19 abc8afcc 86483048 0603551d 20044130 3f303d06 0f2b0601 
        040181ed 18030303 03040403 302a3028 06082b06 01050507 0201161c 68747470 
        733a2f2f 73736c2e 74727573 74776176 652e636f 6d2f4341 30370603 551d1104 
        30302e82 1576706e 2e70726f 63657373 77656176 65722e63 6f6d8215 7774732e 
        70726f63 65737377 65617665 722e636f 6d303506 03551d1f 042e302c 302aa028 
        a0268624 68747470 3a2f2f63 726c2e74 72757374 77617665 2e636f6d 2f4f5643 
        415f4c32 2e63726c 30360608 2b060105 05070101 042a3028 30260608 2b060105 
        05073001 861a6874 74703a2f 2f6f6373 702e7472 75737477 6176652e 636f6d2f 
        300d0609 2a864886 f70d0101 05050003 82010100 0785070e 045d6201 3ffc49b5 
        88808587 b6418d0e 87dc7ae8 3204563b 6e51ff93 25e8ad7a 9a11d439 2439a533 
        768477ca 902fdfbe f0c58a04 e15bf6a5 63829d4b a36c7ccc 0af9532b f39ec31d 
        21cd6b74 d3adffc2 5f8ee1c4 92c07ac6 ab547346 c740f477 857a82fd 897029d5 
        1cfa9b55 b1064ab7 1274556c 6a14f7a8 b8705cd4 51d6b7f4 0a024f6d 1818918c 
        0cb15bc5 cd301684 38c2dcb8 2585b44c 18808e1b 823a6043 28da0194 280fa6c9 
        80831cbc 1179be24 fc391e54 965761e5 e51031e1 0c76c65f 187922d0 96be80c9 
        3de9a56e 41d0fd3f 76afaf49 4bc4ff4c 213aa474 60a742ba 2a8fb3bd c9349da3 
        1ac96b24 7b99cba5 a28c6647 7803cf2c ee70540c
      quit
    crypto ikev2 policy 10
     encryption 3des
     integrity sha
     group 2
     prf sha
     lifetime seconds 28800
    crypto ikev2 enable outside
    crypto ikev2 remote-access trustpoint ASDM_TrustPoint2
    crypto ikev1 enable outside
    crypto ikev1 policy 10
     authentication pre-share
     encryption 3des
     hash sha
     group 2
     lifetime 28800
    telnet timeout 5
    ssh timeout 5
    ssh key-exchange group dh-group1-sha1
    console timeout 0
    dhcpd address 192.168.5.2-192.168.5.254 management
    dhcpd enable management
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    ssl trust-point ASDM_TrustPoint2 outside
    webvpn
     enable outside
     anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
     anyconnect enable
     tunnel-group-list enable
    group-policy GroupPolicy_PWSSL internal
    group-policy GroupPolicy_PWSSL attributes
     wins-server none
     dns-server value 192.168.0.16
     vpn-tunnel-protocol ssl-client 
     split-tunnel-policy tunnelspecified
     split-tunnel-network-list value PW-VPN-Tunnel-ACL
     default-domain value processw.local
     webvpn
      anyconnect keep-installer none
    group-policy GroupPolicy_115.119.186.194 internal
    group-policy GroupPolicy_115.119.186.194 attributes
     vpn-tunnel-protocol ikev1 l2tp-ipsec 
    group-policy GroupPolicy_67.192.250.53 internal
    group-policy GroupPolicy_67.192.250.53 attributes
     vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless
    group-policy pw internal
    group-policy pw attributes
     dns-server value 192.168.0.16
     vpn-tunnel-protocol ikev1 ikev2 
     split-tunnel-policy tunnelspecified
     split-tunnel-network-list value PW-VPN-Tunnel-ACL
     default-domain none
    username rajuvaradha password 6biM7HbMtaadT82k encrypted
    username e172 password E1abOIw/eu.DKO/y encrypted
    username e150 password dJMsBQfrQRISuR8n encrypted
    username e134 password bLBixKKCoH5Udlk9 encrypted
    username e182 password mirFopEi/OG0LT4d encrypted
    username e192 password u2P6WXLa1k8.kA1w encrypted
    username e184 password Rpt/S1N6et6Xwi7W encrypted
    username u033 password pS5QN8QLvYFHJfoK encrypted
    username u011 password HGFsDnR5XiFAzrcE encrypted
    username u010 password 5R8mktMpyUYPCpTO encrypted
    username u032 password rst8O1b/yrXsKVmu encrypted
    username u002 password .u2izEtqOIC5D2fT encrypted
    username admin password eY/fQXw7Ure8Qrz7 encrypted
    username u012 password JClYI3r7x0T/ed26 encrypted
    username u015 password 6tNvtB4hPcUNDyhE encrypted
    username u014 password Wy6x8dPcSnMcAT1v encrypted
    username u017 password xahCXrBaZWzW8aEp encrypted
    username u006 password BCEOAmlRL6CbQfTV encrypted
    username e006 password DG96SZQ2gBqIXEYv encrypted
    username e034 password 1sG72DUjsY7nt81V encrypted
    username u007 password vtcK6xerueHvqZJZ encrypted
    username u016 password pZgySMnraNBlTTnL encrypted
    username u025 password ulAXIX1u2.UD/KvT encrypted
    username u008 password G4vmDF.mv3rXWa7h encrypted
    username u019 password NxlycJwroZrzCSJ3 encrypted
    username e019 password E9NaUPs18c0.PBnd encrypted
    username u018 password 33CghGQSMjbWDfdb encrypted
    username u009 password uaaSLEu55XXbD5Sr encrypted
    username u028 password UMFMzXMs6He7.zR8 encrypted
    username e097 password .UawdlGNiYnRHnzF encrypted
    username e314 password ye2/LpVufAXvAUJ6 encrypted
    username e327 password 6mKef3HGlnyb6hnu encrypted
    username e343 password 0g33Wbvzi.NL1PjH encrypted
    username e222 password e0.SFEwm1RqC6lLj encrypted
    username e289 password /YrO2mEvMUr9zxq3 encrypted
    username e201 password Eox2TB.HgdkKLuec encrypted
    username e265 password fTk7Vxw0Z06AAbHi encrypted
    username e251 password 6y7YjKQO1rP3nAQG encrypted
    username e219 password p049Lf7jFLisN6UJ encrypted
    username e269 password v7oFefIpmPGd307D encrypted
    tunnel-group 63.82.1.98 type ipsec-l2l
    tunnel-group 63.82.1.98 ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group pw type remote-access
    tunnel-group pw general-attributes
     address-pool clientpool
     default-group-policy pw
    tunnel-group pw ipsec-attributes
     ikev1 pre-shared-key *****
    tunnel-group 115.119.186.194 type ipsec-l2l
    tunnel-group 115.119.186.194 general-attributes
     default-group-policy GroupPolicy_115.119.186.194
    tunnel-group 115.119.186.194 ipsec-attributes
     ikev1 pre-shared-key *****
     ikev2 remote-authentication pre-shared-key *****
     ikev2 local-authentication pre-shared-key *****
    tunnel-group 67.192.250.53 type ipsec-l2l
    tunnel-group 67.192.250.53 general-attributes
     default-group-policy GroupPolicy_67.192.250.53
    tunnel-group 67.192.250.53 ipsec-attributes
     ikev1 pre-shared-key *****
     ikev2 remote-authentication pre-shared-key *****
     ikev2 local-authentication pre-shared-key *****
    tunnel-group PWSSL type remote-access
    tunnel-group PWSSL general-attributes
     address-pool clientpool
     authentication-server-group PW LOCAL
     default-group-policy GroupPolicy_PWSSL
    tunnel-group PWSSL webvpn-attributes
     group-alias PWSSL enable
    class-map inspection_default
     match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
     parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
     class inspection_default
      inspect dns preset_dns_map 
      inspect ftp 
      inspect h323 h225 
      inspect h323 ras 
      inspect rsh 
      inspect rtsp 
      inspect esmtp 
      inspect sqlnet 
      inspect skinny  
      inspect sunrpc 
      inspect xdmcp 
      inspect sip  
      inspect netbios 
      inspect tftp 
      inspect ip-options 
      inspect icmp 
    service-policy global_policy global
    prompt hostname context 
    call-home reporting anonymous prompt 1
    Cryptochecksum:3b6339b71a4cf924c7b30056a3e6fc31
    : end

  • Thin JDBC through firewall - what ports need to be open?

    We are running Oracle 7.3, and Oracle Web Server on the same
    computer. The firewall is set up to allow connections to that
    computer from anywhere, on ports 80 and 1521.
    Our thin JDBC applet works perfectly from inside the firewall,
    but from outside, I get a time-out error trying to open the JDBC
    connection.
    What else needs to be done get JDBC through? Do other ports need
    to be open on the firewall?
    The JDBC FAQ mentions a "Net8 compliant" or "SQLNet certified"
    firewall - is that relevant to this problem, and if so, what does
    it really mean?
    We are supposed to be operational right now, so many many thanks
    for any help on this!
    - Joe Wielgosz
    null

    Try in the Lion Server Forum?
    Regards,
    Colin R.

  • XMLAnalysis Error while trying to execute a MDX query on MS SSAS - Accessing the cube from Java through Olap4j driver

     Am trying to access MS SSAS data cube from Java through olap4j driver(through msmdpump.dll). I am able to connect , but when I try to execute a query, i am getting the below error: Please help
    me out . (I tested the http://XXXX/OLAP/msmdpump.dll in MS Excel , and it is working fine)
    org.olap4j.OlapException: XMLA provider gave exception: <soap:Fault xmlns="http://schemas.xmlsoap.org/soap/envelope/">
    <faultcode>
    XMLAnalysisError.0xc10a0004
    </faultcode>
    <faultstring>
    The CRASHDWHSRG cube either does not exist or has not been processed.
    </faultstring>
    <detail>
    <Error Description="The CRASHDWHSRG cube either does not exist or has not been processed." ErrorCode="3238658052" HelpFile="" Source="Microsoft SQL Server 2012 Analysis Services">
    </Error>
    </detail>
    </soap:Fault>

    See my other answer where you asked this same question on another thread
    http://social.msdn.microsoft.com/Forums/sqlserver/en-US/22dfc400-668d-4bd4-b76d-7c6b9ddda47a/msmdpumpdll-not-getting-registered?forum=sqlanalysisservices
    http://darren.gosbell.com - please mark correct answers

  • Facing error when trying to read message from MQ through B2B

    Hi,
    I'm trying to read the messages from MQ through B2B.
    I have created a listening channel in B2B console.
    Also place the required jar files in the Domain_Dir/lib folder.For your reference the jar files are given below,
    a. com.ibm.mqjms.jar
    b. dhbcore.jar
    c. com.ibm.mq.jar
    d. com.ibm.mq.jmqi.jar
    e. mqcontext.jar
    g. com.ibm.mq.commonservices.jar
    h. com.ibm.mq.headers.jar
    i. com.ibm.mq.pcf.jar
    But i'm encounter the below error while reading the MQ. Pls let me know if i'm missing something.
    ####<Oct 9, 2014 4:00:03 PM IST> <Error> <oracle.soa.b2b.engine> <ULCAKESBTD1P> <b2b-server> <Workmanager: , Version: 0, Scheduled=false, Started=false, Wait time: 0 ms
    > <<anonymous>> <> <0000KZoSn1y5YbWzLwyGOA1KDaCI000002> <1412850603388> <BEA-000000> <oracle.tip.b2b.transport.TransportException: [JMS_CONN_INVALID] JMS connection error.
      at oracle.tip.b2b.transport.TransportException.create(TransportException.java:93)
      at oracle.tip.b2b.transport.basic.jms.JMSMonitor.init(JMSMonitor.java:199)
      at oracle.tip.b2b.transport.basic.jms.JMSMonitor.<init>(JMSMonitor.java:181)
      at oracle.tip.b2b.transport.basic.JMSReceiver.init(JMSReceiver.java:266)
      at oracle.tip.b2b.transport.b2b.B2BTransport.init(B2BTransport.java:577)
      at oracle.tip.b2b.engine.ThreadWorkExecutor.run(ThreadWorkExecutor.java:240)
      at oracle.integration.platform.blocks.executor.WorkManagerExecutor$1.run(WorkManagerExecutor.java:120)
      at weblogic.work.j2ee.J2EEWorkManager$WorkWithListener.run(J2EEWorkManager.java:184)
      at weblogic.work.DaemonWorkThread.run(DaemonWorkThread.java:30)
    Caused by: oracle.tip.b2b.transport.TransportException: [JMS_CONN_FAC_NOT_FOUND] JMS_CONN_FAC_NOT_FOUND
      at oracle.tip.b2b.transport.TransportException.create(TransportException.java:78)
      at oracle.tip.b2b.transport.basic.jms.JMSConnectionFactoryFactory.getConnectionFactory(JMSConnectionFactoryFactory.java:208)
      at oracle.tip.b2b.transport.basic.jms.JMSConnectionFactoryFactory.getQueueConnectionFactory(JMSConnectionFactoryFactory.java:85)
      at oracle.tip.b2b.transport.basic.jms.JMSConnection.<init>(JMSConnection.java:136)
      at oracle.tip.b2b.transport.basic.jms.JMSMonitor.init(JMSMonitor.java:195)
      ... 7 more
    Caused by: java.lang.ClassNotFoundException: QMUL.PDT
      at java.net.URLClassLoader$1.run(URLClassLoader.java:366)
      at java.net.URLClassLoader$1.run(URLClassLoader.java:355)
      at java.security.AccessController.doPrivileged(Native Method)
      at java.net.URLClassLoader.findClass(URLClassLoader.java:354)
      at java.lang.ClassLoader.loadClass(ClassLoader.java:424)
      at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:308)
      at java.lang.ClassLoader.loadClass(ClassLoader.java:357)
      at java.lang.Class.forName0(Native Method)
      at java.lang.Class.forName(Class.java:190)
      at oracle.tip.b2b.transport.basic.jms.JMSConnectionFactoryFactory.getConnectionFactory(JMSConnectionFactoryFactory.java:162)
      ... 10 more
    oracle.tip.b2b.transport.TransportException: [JMS_CONN_INVALID] JMS connection error.
      at oracle.tip.b2b.transport.TransportException.create(TransportException.java:93)
      at oracle.tip.b2b.transport.basic.jms.JMSMonitor.init(JMSMonitor.java:199)
      at oracle.tip.b2b.transport.basic.jms.JMSMonitor.<init>(JMSMonitor.java:181)
      at oracle.tip.b2b.transport.basic.JMSReceiver.init(JMSReceiver.java:266)
      at oracle.tip.b2b.transport.b2b.B2BTransport.init(B2BTransport.java:577)
      at oracle.tip.b2b.engine.ThreadWorkExecutor.run(ThreadWorkExecutor.java:240)
      at oracle.integration.platform.blocks.executor.WorkManagerExecutor$1.run(WorkManagerExecutor.java:120)
      at weblogic.work.j2ee.J2EEWorkManager$WorkWithListener.run(J2EEWorkManager.java:184)
      at weblogic.work.DaemonWorkThread.run(DaemonWorkThread.java:30)
    Caused By: oracle.tip.b2b.transport.TransportException: [JMS_CONN_FAC_NOT_FOUND] JMS_CONN_FAC_NOT_FOUND
      at oracle.tip.b2b.transport.TransportException.create(TransportException.java:78)
      at oracle.tip.b2b.transport.basic.jms.JMSConnectionFactoryFactory.getConnectionFactory(JMSConnectionFactoryFactory.java:208)
      at oracle.tip.b2b.transport.basic.jms.JMSConnectionFactoryFactory.getQueueConnectionFactory(JMSConnectionFactoryFactory.java:85)
      at oracle.tip.b2b.transport.basic.jms.JMSConnection.<init>(JMSConnection.java:136)
      at oracle.tip.b2b.transport.basic.jms.JMSMonitor.init(JMSMonitor.java:195)
      at oracle.tip.b2b.transport.basic.jms.JMSMonitor.<init>(JMSMonitor.java:181)
      at oracle.tip.b2b.transport.basic.JMSReceiver.init(JMSReceiver.java:266)
      at oracle.tip.b2b.transport.b2b.B2BTransport.init(B2BTransport.java:577)
      at oracle.tip.b2b.engine.ThreadWorkExecutor.run(ThreadWorkExecutor.java:240)
      at oracle.integration.platform.blocks.executor.WorkManagerExecutor$1.run(WorkManagerExecutor.java:120)
      at weblogic.work.j2ee.J2EEWorkManager$WorkWithListener.run(J2EEWorkManager.java:184)
      at weblogic.work.DaemonWorkThread.run(DaemonWorkThread.java:30)
    Caused By: java.lang.ClassNotFoundException: QMUL.PDT
      at java.net.URLClassLoader$1.run(URLClassLoader.java:366)
      at java.net.URLClassLoader$1.run(URLClassLoader.java:355)
      at java.security.AccessController.doPrivileged(Native Method)
      at java.net.URLClassLoader.findClass(URLClassLoader.java:354)
      at java.lang.ClassLoader.loadClass(ClassLoader.java:424)
      at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:308)
      at java.lang.ClassLoader.loadClass(ClassLoader.java:357)
      at java.lang.Class.forName0(Native Method)
      at java.lang.Class.forName(Class.java:190)
      at oracle.tip.b2b.transport.basic.jms.JMSConnectionFactoryFactory.getConnectionFactory(JMSConnectionFactoryFactory.java:162)
      at oracle.tip.b2b.transport.basic.jms.JMSConnectionFactoryFactory.getQueueConnectionFactory(JMSConnectionFactoryFactory.java:85)
      at oracle.tip.b2b.transport.basic.jms.JMSConnection.<init>(JMSConnection.java:136)
      at oracle.tip.b2b.transport.basic.jms.JMSMonitor.init(JMSMonitor.java:195)
      at oracle.tip.b2b.transport.basic.jms.JMSMonitor.<init>(JMSMonitor.java:181)
      at oracle.tip.b2b.transport.basic.JMSReceiver.init(JMSReceiver.java:266)
      at oracle.tip.b2b.transport.b2b.B2BTransport.init(B2BTransport.java:577)
      at oracle.tip.b2b.engine.ThreadWorkExecutor.run(ThreadWorkExecutor.java:240)
      at oracle.integration.platform.blocks.executor.WorkManagerExecutor$1.run(WorkManagerExecutor.java:120)
      at weblogic.work.j2ee.J2EEWorkManager$WorkWithListener.run(J2EEWorkManager.java:184)
      at weblogic.work.DaemonWorkThread.run(DaemonWorkThread.java:30)
    >
    ####<Oct 9, 2014 4:00:20 PM IST> <Warning> <oracle.adfinternal.view.faces.partition.FeatureUtils> <ULCAKESBTD1P> <b2b-server> <[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'> <<anonymous>> <> <0000KZoSn1y5YbWzLwyGOA1KDaCI000002> <1412850620868> <ADF_FACES-30130> <Ignoring feature-dependency on feature "AdfDvtCommon".  No such feature exists.>
    ####<Oct 9, 2014 4:00:21 PM IST> <Warning> <org.apache.myfaces.trinidadinternal.config.GlobalConfiguratorImpl> <ULCAKESBTD1P> <b2b-server> <[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'> <<anonymous>> <> <0000KZoSn1y5YbWzLwyGOA1KDaCI000002> <1412850621197> <BEA-000000> <Configurator services already initialized.>
    ####<Oct 9, 2014 4:00:30 PM IST> <Notice> <Log Management> <ULCAKESBTD1P> <b2b-server> <[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1412850630361> <BEA-170027> <The Server has established connection with the Domain level Diagnostic Service successfully.>
    ####<Oct 9, 2014 4:00:30 PM IST> <Notice> <WebLogicServer> <ULCAKESBTD1P> <b2b-server> <main> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac6> <1412850630614> <BEA-000365> <Server state changed to ADMIN>
    ####<Oct 9, 2014 4:00:30 PM IST> <Notice> <WebLogicServer> <ULCAKESBTD1P> <b2b-server> <main> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac6> <1412850630698> <BEA-000365> <Server state changed to RESUMING>
    ####<Oct 9, 2014 4:00:31 PM IST> <Notice> <Server> <ULCAKESBTD1P> <b2b-server> <[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac8> <1412850631051> <BEA-002613> <Channel "Default[2]" is now listening on fe80:0:0:0:214:4fff:feeb:478d:7003 for protocols iiop, t3, ldap, snmp, http.>
    ####<Oct 9, 2014 4:00:31 PM IST> <Notice> <Server> <ULCAKESBTD1P> <b2b-server> <[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac8> <1412850631051> <BEA-002613> <Channel "Default[1]" is now listening on 10.236.77.12:7003 for protocols iiop, t3, ldap, snmp, http.>
    ####<Oct 9, 2014 4:00:31 PM IST> <Notice> <Server> <ULCAKESBTD1P> <b2b-server> <[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac8> <1412850631052> <BEA-002613> <Channel "Default[3]" is now listening on fe80:0:0:0:214:4fff:feeb:478c:7003 for protocols iiop, t3, ldap, snmp, http.>
    ####<Oct 9, 2014 4:00:31 PM IST> <Notice> <Server> <ULCAKESBTD1P> <b2b-server> <[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac8> <1412850631053> <BEA-002613> <Channel "Default[4]" is now listening on 127.0.0.1:7003 for protocols iiop, t3, ldap, snmp, http.>
    ####<Oct 9, 2014 4:00:31 PM IST> <Notice> <Server> <ULCAKESBTD1P> <b2b-server> <[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac8> <1412850631053> <BEA-002613> <Channel "Default" is now listening on 192.168.107.97:7003 for protocols iiop, t3, ldap, snmp, http.>
    ####<Oct 9, 2014 4:00:31 PM IST> <Notice> <Server> <ULCAKESBTD1P> <b2b-server> <[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac8> <1412850631054> <BEA-002613> <Channel "Default[5]" is now listening on 0:0:0:0:0:0:0:1:7003 for protocols iiop, t3, ldap, snmp, http.>
    ####<Oct 9, 2014 4:00:31 PM IST> <Notice> <WebLogicServer> <ULCAKESBTD1P> <b2b-server> <[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac8> <1412850631055> <BEA-000332> <Started WebLogic Managed Server "b2b-server" for domain "b2b-domain" running in Development Mode>
    ####<Oct 9, 2014 4:00:32 PM IST> <Notice> <WebLogicServer> <ULCAKESBTD1P> <b2b-server> <main> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac6> <1412850632557> <BEA-000365> <Server state changed to RUNNING>
    ####<Oct 9, 2014 4:00:32 PM IST> <Notice> <WebLogicServer> <ULCAKESBTD1P> <b2b-server> <main> <<WLS Kernel>> <> <308025e28c55d051:50252314:148f4730231:-8000-0000000000007ac6> <1412850632559> <BEA-000360> <Server started in RUNNING mode>
    ####<Oct 9, 2014 4:00:38 PM IST> <Warning> <oracle.soa.services.notification> <ULCAKESBTD1P> <b2b-server> <TimerFactory> <<anonymous>> <> <0000KZoSn1y5YbWzLwyGOA1KDaCI000002> <1412850638612> <BEA-000000> <<.> Notification via email, voice, SMS or IM will not be sent. If you would like to enable them, please configure corresponding sdpmessaging driver. Then modify the accounts and set NotificationMode attribute to either NONE, EMAIL or ALL in workflow-notification-config.xml>
    ####<Oct 9, 2014 4:02:41 PM IST> <Warning> <Socket> <ULCAKESBTD1P> <AdminServer> <[ACTIVE] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <a2e657fa9e6b5d11:789eb8cc:148f4403946:-8000-00000000000029c4> <1412850761335> <BEA-000449> <Closing socket as no data read from it on 192.168.96.66:29,963 during the configured idle timeout of 5 secs>
    ####<Oct 9, 2014 4:02:51 PM IST> <Warning> <Socket> <ULCAKESBTD1P> <AdminServer> <[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <a2e657fa9e6b5d11:789eb8cc:148f4403946:-8000-00000000000029d2> <1412850771337> <BEA-000449> <Closing socket as no data read from it on 192.168.96.66:29,970 during the configured idle timeout of 5 secs>
    ####<Oct 9, 2014 4:03:16 PM IST> <Warning> <Socket> <ULCAKESBTD1P> <AdminServer> <[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <a2e657fa9e6b5d11:789eb8cc:148f4403946:-8000-00000000000029f4> <1412850796335> <BEA-000449> <Closing socket as no data read from it on 192.168.96.66:29,984 during the configured idle timeout of 5 secs>
    Thanks,
    Ravindra.

    Hi Ravindra,
    Which mode of connectivity are you trying (credential based / .bindings based)
    MQ connectivity  support is provided via JMS offering of Oracle B2B. This blog post will provide you the steps for the same - https://blogs.oracle.com/oracleb2bgurus/entry/b2b_communication_using_ibm_mq
    Please ensure to provide the proper values for connection factory and other details in JMS configuration in B2B
    HTH

  • I recently tried to remove widows7 on my macbook air using bootcamp and halfway through it grayed out .The windows 7 is removed but i cant free up the 62gig partition the windows was occupying on my 121gig ssd harddrive please help

    i recently tried to remove widows7 on my macbook air using bootcamp and halfway through it grayed out .The windows 7 is removed but i cant free up the 62gig partition the windows was occupying on my 121gig ssd harddrive please help

    You may have to see about using the Recovery HD partition to attempt to erase and restore useful function of the capacity lost to the former Windows installation.
    And you may have to backup your contents outside the computer to do it. Disk Utility on the Mac OS X historically has not been able to touch a BootCamp created partition; so if BootCamp cannot remove it, then you have to see how to do the equivalent of a reformat of the entire drive (less Recovery partition?) then reinstall your OS X. Maybe from internet recovery, then get your applications, etc from the Mac App store, etc.
    A complete system clone of your OS X on an external HDD would be another method to restore after reformat, of the portion you want whole again, not necessarily the space where Recovery may live.
    There may be (an)other way(s).
    Perhaps someone with recent experience
    in this matter can reply & discuss options.
    With my antiques, they almost know what I want before I tell them.
    Hopefully yours will after you talk to it awhile.
    Good luck & happy computing!

  • As i turned on my iphone 4s on and connected to a wireless internet a page opened from the app firewall ip and i usually choose all connections. so it got stuck i held the standy by button but it won't turn off. so i held the standyby and home buttons.

    As i turned on my iphone 4s on and connected to a wireless internet a page opened from the app firewall ip and i usually choose all connections. so it got stuck i held the standy by button but it won't turn off. so i held the standyby and home buttons. when it opened all apps music and pics where not there. why? then i enterted photos and the loading logo appeared then the standyby appeared and i entered my password and everything in my iphone was there but thing were scattered and apps wheren't in folders everything was messed up but no photos or music AND IT SAYS UP IN THE MIDDLE OF THE SCREEN EXIT SAFE MODE. so i restarted it again and it opened and nothing was there and again i entered photos and the samething happen again. why did this happen? and can i get my data back? and in the usage it says that these thing are there but not showing.

    stevejobsfan0123 wrote:
    The Find my iPhone service option is given to you when you first set up the device. If you just reset it, you may have been given that option. So, in other words, the service may have been enabled even if you didn't realize it. You can then go to www.icloud.com and click on Find my iPhone, and have it play a sound. Or, you can use the Find my iPhone app on your mom's iPhone, but the service would still need to be turned on on your iPod.
    Unlike Compukid said, Apple will not assist in locating a lost device without the Find my iPhone service.
    I found that out 2 years ago, it's just that I thought Apple might have changed that.

  • What is the correct procedure to connect and collect events from IPS through SDEE

    What is the correct procedure to connect and collect events from IPS through SDEE?
    We are a 3rd party application, that needs to collect and analyze the IPS events for a client.
    Currently the approach we are following is
    1) get a SubscriptionId using the URL below
    https://IP_Of_IPS/cgi-bin/sdee-server?action=open&events=evIdsAlert&force=yes
    This gets us a subscriptionId which is used in step 2
    2) Collect events from the url below
    https://IP_Of_IPS/cgi-bin/sdee-server?confirm=yes&action=get&subscriptionId=sub-sample&startTime=1362699903575432000
    a few more notes here are
    - starttime is current time in nanoseconds
    the peculiar problem here is that, even though we specify todays date, SDEE returns us the events from mid Feb (today is march 7)
    we did try a few combinations, but are out of ideas.
    any help or direction would be appreciated

    This is more an application issue than an IPS issue.
    Have you compared your app against other apps [IME]?

  • Trying to publish to my BC from Muse and it times out.

    I've been tryng to publish a simple page to BC from muse and it times out, the manage BC under file is greyed out. 
    Don't know what else to do???

    Can we reopen this issue please.
    I've been getting the same message. Applied the above instructions but still get same messaging.
    Here are the screenshots  (NOTE - T & C for Trial Software)
    I've also deleted Muse from the computer and reloaded it through my Creative Cloud account.
    Thanks for your help.

  • RSRV? Drilling through Report times out sometimes

    Hi,
    I have reviewed several documents on RSRV on SDN but I have some specific questions.
    1.  While drilling down on a particular report, sometimes it would timeout. Can you direct me how to use RSRV to figure out the problem and fix?
    2.  Also, I saw a caution in one of the postings to be careful running RSRV on production. Does RSRV automatically begins the repairs or you get the chance after the diagnoses to make a decision to repair or not?  What really can go wrong during the repairs?
    3. Also, I know RSRV has these options:
       a. Master Data Consistency Checks
       b. Transaction Data Consistency Checks
       c. Size of Dimension tables
       d. Checking SID values
       e. PSA duplicate record check
       f.  Checking Aggregates
       g. Partitions of Info cubes etc...
    Which of these options really will help me identify the intermittent problem I am having with the report? I will appreciate some stepwise guidelines on how to step through to figure out the problem.
    Thanks

    Hi,
    I tried RSRT; entered Query name; Query Display: List   
    Parameter 1 or 2  (I chose 1)
    I then selected:
    Display run schedule
    Do not use cache
    Do not suppress messages/warning
    The selection screen of the report came up report and I completed it. After execute+Debug I get the data below.
    What do I do from this point to figure out the problem and fix it:
    SQL Statement                                                                               
    SELECT                                                                               
    /*+                                                                               
    STAR_TRANSFORMATION  FACT(F)                                                                    
    "DT"."SID_0CALMONTH" AS "S____022" ,"D5"."SID_0DOC_TYPE" AS "S____130" ,                        
      "DU"."SID_0CURRENCY" AS "S____023" ,"S1"."MATL_GRP_4" AS "K____404" ,                           
      SUM (  "F"."G_AVV010"  )  AS "Z____084" , SUM (  "F"."G_AVV140"  )  AS "Z____093" ,             
      SUM (  "F"."G_AVV150"  )  AS "Z____223" , COUNT( * )  AS "Z____030"                             
    FROM                                                                               
    "/BIC/FATRUMMNP" "F" JOIN "/BIC/DATRUMMNP3" "D3" ON  "F" . "KEY_ATRUMMNP3" = "D3" . "DIMID" JO
      N "/BI0/SMATL_GRP_4" "S1" ON  "D3" . "SID_0MATL_GRP_4" = "S1" . "SID" JOIN "/BIC/DATRUMMNPP" "DP
    Execution Plan                                                                               
    SELECT STATEMENT ( Estimated Costs = 42 , Estimated #Rows = 1 ) 
         5  30 HASH GROUP BY                                         
               ( Estim. Costs = 42 , Estim. #Rows = 1 )              
               Estim. CPU-Costs = 15,234,394 Estim. IO-Costs = 34                                                                               
    5  29 HASH JOIN                                         
                   ( Estim. Costs = 41 , Estim. #Rows = 1 )          
                   Estim. CPU-Costs = 13,191,632 Estim. IO-Costs = 34
                   Access Predicates Filter Predicates               
    5  12 PARTITION RANGE SINGLE                               
           ( Estim. Costs = 5 , Estim. #Rows = 0 )              
           Pstart: KEY Pstop: KEY                               
           Estim. CPU-Costs = 19,122 Estim. IO-Costs = 4        
         5  11 TABLE ACCESS BY LOCAL INDEX ROWID /BIC/FATRUMMNP
               ( Estim. Costs = 5 , Estim. #Rows = 0 )          
               Pstart: KEY Pstop: KEY                           
               Estim. CPU-Costs = 19,122 Estim. IO-Costs = 4    
             5  10 BITMAP CONVERSION TO ROWIDS                                                                               
    5  9 BITMAP AND                                                                               
    5  4 BITMAP MERGE                                                                               
    5  3 BITMAP KEY ITERATION              
    Thanks

  • Error connecting MDM system from XI through Java proxies-standard component

    Dear Friends
    We are trying to connect to the MDM system from XI through Java proxies(i.e standard components),in relation to that we have done the following:
    1)registered the interfaces
    a)http://XIserver:port/ProxyServer/register?ns=http://sap.com/xi/GDSConsole&interface=GDS_Data_Import_In&bean=localejbs/sap.com/GDS/DataImport&method=gDSDataImportIn
    b)http://XIserver:port/ProxyServer/register?ns=http://sap
    .com/xi/GDSConsole&interface=GDS_DP_In&bean=localejbs/sap.com/GDS/Dat
    aPoolIn&method=gDSDPIn
    2)Deployed the ears within Build10.zip, i.e
    a)GDS_1.0.6.1_Build10.ear and
    b)GDS_ExternalValidations_1.0.6.1_build10.ear
    3)set the sap.application.global.properties file inside the  GDS_1.0.6.1_Build10.ear
    as follows:
    SAP application properties
    #!Path to GDS folder containing the configuration files
    ConfigurationFilesLocation=/usr/sap/P70/DVEBMGS00/j2ee/cluster/server0/apps/sap.com/GDS
    #!External validation modules (EJB names) delimited by semicolon character.
    ExternalValidationModules=ExternalValidations_EJBs
    #!IP or server name of MDM server
    MDM.server=172.18.139.200
    #!MDM repository port as appears in MDM console
    MDM.port=2000
    #!MDM repository name as appears in MDM console
    MDM.repositoryName=GDS_1
    #!version of MDM server and connector
    MDM.version=5.5.42.103
    #? secure=true
    #! MDM Admin user password
    MDM.AdminPassword=
    #!Data pool name - should match a remote system defined in MDM console
    DestinationDataPoolName=
    #!Data pool 13 digits GLN
    DestinationDataPoolGln=
    #!Provider 13 digits GLN
    ProviderGln=
    #!Provider time zone e.g. EST
    ProviderTimeZone=
    #!Data pool schema URL
    SchemaLocation=
    #!Message Timeout
    MessageTimeout=10
    #!Backend import client system - should match a remote system defined in MDM console.
    ImportData.ClientSystem.Name=R3
    !# The format that dates will appear in the UI
    #Available date formats:      MM/dd/yyyy
    #                     dd/MM/yyyy
    #                     MM-dd-yyyy
    #                     dd-MM-yyyy
    #                     dd-MMM-yyyy
    #                     dd/MMM/yyyy
    #                     MMM dd, yyyy
    Where MM=1-12, MMM=Jan,Feb,Mar,etc.
    Note: Extreme caution should be taken when choosing to use month names,
    #          since different regional settings on the client and server machines
    #          will cause dates to be uninterpretable.
    #          It is strongly advised to use numeric month format, eg. MM-dd-yyyy, etc.
    DateFormat=dd/MM/yyyy
    DEBUG.SaveIncomingMessagesToFile=false
    #!defines if incoming message will be saved in arc folder
    DEBUG.ImportData.SaveArchive=false
    #!defines if outgoing message will be saved
    DEBUG.SaveOutgoingMessagesToFile=false
    But still we are getting errors as:
    a)com.sap.aii.af.ra.ms.api.MessagingException: com.sap.mdm.gds.proxy.dataimport.GDSConsole_Message_Exception: : com.sap.aii.proxy.xiruntime.core.ApplicationFaultException: com.sap.mdm.gds.proxy.dataimport.GDSConsole_Message_Exception
    inside SXMB_MONI
    when we trigger an Idoc and try to send the data inside the MDM GDS system.
    and
    b)Failed to send message,reason:Exception on method gDSDPOut
    when we try to register something,even after the data is validated by the system.
    Can anybody help??
    It is of urgent requirement.
    Edited by: Arjun Ghose on Jul 15, 2008 4:36 PM

    Hi ,
       I found a document which says that MDM4J is the legacy API and is considered deprecated .The MDM Java API is the new one .I have both of them in the java build path . I am not sure if this is that cause of the problem .
    Now I had a look at the javadoc for the new API but I am not able to locate the class to obtain a connection to the MDM server from a custom application being built in Netweaver Developer Studio . Can someone help me out with the same ?What would be the code to obtain the connection to the MDM server with the new JAVA API ?
    Regards
    DeepaK Singh

  • Call Bex Workbook from browser through ActiveX or OLE

    Hello. I have to run bex workbook from browser. I found out that I can do it through ActiveX and "SAPBEX.XLA!SAPBEXgetConnection", but I didn't succeed. Can anybody help me out?

    Vanessa,
    Please do not raise the same post across forums ..
    /thread/1257238 [original link is broken]
    the above thread is being considered as duplicate and being deleted - because this particular post has been raised in the correct forum..

  • Not able to access ports through firewall

    I'm setting up our new server, and we want to run a Quark license server through port 1028.
    In the Server Admin, under Firewall->Services->Settings, I set up a service for the license server on port 1028 using TCP and UDP protocols. It's allowed for any traffic.
    under Firewall->Advanced->, I set up a rule to:
    Allow all Quark services
    Source: any port 1028
    Destitnation: any port 1028 interface IN
    when I scan the open ports onthe server, I don't get a reponse from this port, or any ports. I've tried turning the firewall off completely, and it still doesn't show in the port scan.
    The only major change we're made to this server is that we're running bonded Ethernet on the 2 ports. Could this be stopping the ports from getting through?
    I've checked with IT, and they've (supposedly) verified that there aren't any blocked ports on our switch. The old license server runs fine on port 1028, and it's on the same switch.
      Mac OS X (10.4.7)  

    You are running a firewall on a non public server?
    Usually source and destination are not the using the same port number.
    Source is usually chosen from a range of high port numbers.
    Nevertheless if the QLA server isn't running on the server you woun't get an indication when portscanning the server (try portscanning on the server and use either localhost/127.0.0.1 or the "real" bonded interface IP).
    To my knowledge a switch can't block portnumbers but for a bonded interface the switch needs LACP capability for the trunk. There could also be different VLANs and routing.

  • Multiple outputs from LE9 ( to soundcard cuemix/ outs? )

    I know it is possible in Logic PRO 9 but I got confused by the comparison charts saying express cannot do 7.1 mixing..
    Differences between the Logic Pro 9 and Logic Express 9 applications
    The 3 Logic Pro 9 features that are not found in Logic Express 9 are:
    Surround sound mixing (up to 7.1).
    afterall Surround 7.1 is just 4 pairs of Stereo outs:)
    thanks

    This is my point - the currently active channel does not produce sound through its multiple outputs unless Logic is playing.
    So, for example, if I am auditioning different drum grooves from RMX through the multiple outputs (for the purpose of putting effects/processors on the outputs in Logic) this only works when Logic is playing.
    Or if, in BFD, I have the direct Snare coming out of one output into an aux, and then a direct Kick coming out and output into another aux, I cannot hear them unless Logic is playing - I can only hear the ambient mic's as these are mapped to Outputs 1-2 which are the initial track you set the multiple output AU up on.
    If none of this is something you tend to do, I guess it's hard to understand!
    Thanks,
    Alex.

  • Client connecting through firewall

    Hi
              We have two clustered servers.Our client is connecting through
              firewall NAT. When iam connect to first server the response is very slow and
              at the same time clustering is not working.If i stop the second server the
              response fast .
              The same configaration is working fine when my client is local.
              Can you explain the reason for this problem ?
              Presently iam using weblogic 6.1 version.
              Thank you
              

    OK I spoke too soon. The user looked like it was working but it was working because it matched another IAS policy further down the list. It seems as though the PIX refuses to use ms-chap of any sort. If I include the authentication type in the VPN policy conditions as ms-chap, it skips the VPN policy I am using to authenticate this. If I remove it, then it gives an invalid authentication type as if whatever the PIX is sending the IAS server does not understand as ms-chap.
    It seems like the PIX authentication is totally wrong for use with IAS. What else do I need to add to this configuration to gewt it to work with ms-chap of any kind? I really don't get it.

Maybe you are looking for

  • My iPhone 4 shut off and will not come back on. How do I fix it?

    My iPhone 4 has not had any problems before and all the sudden froze then the scream slowly started fading away into black. Amd now will not turn back on at all.

  • How to PERMANENTLY get rid of 3rd party Plug-ins in Logic pro 9.

    Hi, im trying to get rid of some 3rd party plug-ins on logic, but it only looks like i can disable them. (sweeping them under the rug isn't helpful) This is a problem because i have one version of a plug-in that doesn't work and im gonna get another

  • Music store error -3221

    Everytime I try to connect to the Music Store I get an error number -3221 and I can no longer check for updates for iTunes, it tells me that I have no active connection. Is there any way for me to fix this problem? A couple of weeks ago I updated my

  • Offset printing- should I be concerned

    I'm printing a magazine and exporting it as press quality. When I do so, it says I have overset text on so and so pages. Now does this mean the printer from the place I am printing it on will not print the text that lies outside of the margins? Or wh

  • Nokia E5-00 alarm too loud

    Hi all, Other than this one bug, the E5-00 is awesome! BUT: No matter what alarm sound I set, it is always VERY loud! I can hear it 2 rooms across... Even if I manually edit an mp3 file for it to be a lower volume, my E5-00 automatically makes it the