Trex configuration and troubleshooting.

Hi,
I have installed Trex 7.1 and did the post installation. and did the necessary configuration on ABAP Engine. but still i am unable to search txt in TX: cv04n...
when i execute trexadmin.exe, I that the trex is running.
I have created all the RFC connections to My ABAP engine.
but still unable to search txt in TX: cv04n.
m i missing something,
Please help me to troubleshoot.
Thanks in advance.

Hi Shaik
1. Kindly refer the SAP Note
  2070658 - DMS: CV04N Full Text Search to use Embedded Search indexes for Search Functionality
2.  You can refer the SCN link for installation and configuration of SAP Trex
TREX 7.1 INSTALLATION  ON LINUX and connection to SAP ERP 6
BR
SS

Similar Messages

  • Ask the Expert:Concepts, Configuration and Troubleshooting Layer 2 MPLS VPN – Any Transport over MPLS (AToM)

    With Vignesh R. P.
    Welcome to the Cisco Support Community Ask the Expert conversation.This is an opportunity to learn and ask questions about  concept, configuration and troubleshooting Layer 2 MPLS VPN - Any Transport over MPLS (AToM) with Vignesh R. P.
    Cisco Any Transport over MPLS (AToM) is a solution for transporting Layer 2 packets over an MPLS backbone. It enables Service Providers to supply connectivity between customer sites with existing data link layer (Layer 2) networks via a single, integrated, packet-based network infrastructure: a Cisco MPLS network. Instead of using separate networks with network management environments, service providers can deliver Layer 2 connections over an MPLS backbone. AToM provides a common framework to encapsulate and transport supported Layer 2 traffic types over an MPLS network core.
    Vignesh R. P. is a customer support engineer in the Cisco High Touch Technical Support center in Bangalore, India, supporting Cisco's major service provider customers in routing and MPLS technologies. His areas of expertise include routing, switching, and MPLS. Previously at Cisco he worked as a network consulting engineer for enterprise customers. He has been in the networking industry for 8 years and holds CCIE certification in the Routing & Switching and Service Provider tracks.
    Remember to use the rating system to let Vignesh know if you have received an adequate response. 
    Vignesh might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the  Service Provider sub-community discussion forum shortly after the event. This event lasts through through September 21, 2012. Visit this forum often to view responses to your questions and the questions of other community members.

    Hi Tenaro,
    AToM stands for Any Transport over MPLS and it is Cisco's terminology used for Layer 2 MPLS VPN or Virtual Private Wire Service. It is basically a Layer 2 Point-to-Point Service. AToM basically supports various Layer 2 protocols like Ethernet, HDLC, PPP, ATM and Frame Relay.
    The customer routers interconnect with the service provider routers at Layer 2. AToM eliminates the need for the legacy network from the service provider carrying these kinds of traffic and integrates this service into the MPLS network that already transports the MPLS VPN traffic.
    AToM is an open standards-based architecture that uses the label switching architecture of MPLS and can be integrated into any network that is running MPLS. The advantage to the customer is that they do not need to change anything. Their routers that are connecting to the service provider routers can still use the same Layer 2 encapsulation type as before and do not need to run an IP routing protocol to the provider edge routers as in the MPLS VPN solution.
    The service provider does not need to change anything on the provider (P) routers in the core of the MPLS network. The intelligence to support AToM sits entirely on the PE routers. The core label switching routers (LSRs) only switch labeled packets, whereas the edge LSRs impose and dispose of labels on the Layer 2 frames.
    Whereas pseudowire is a connection between the PE routers and emulates a wire that is carrying Layer 2 frames. Pseudowires use tunneling. The Layer 2 frames are encapsulated into a labeled (MPLS) packet. The result is that the specific Layer 2 service—its operation and characteristics—is emulated across a Packet Switched Network.
    Another technology that more or less achieves the result of AToM is L2TPV3. In the case of L2TPV3 Layer 2 frames are encapsulated into an IP packet instead of a labelled MPLS packet.
    Hope the above explanation helps you. Kindly revert incase of further clarification required.
    Thanks & Regards,
    Vignesh R P

  • Ask the Expert: Configuration and Troubleshooting the Cisco Application Control Engine (ACE) load balancer

    With Ajay Kumar and Telmo Pereira 
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about configuration and troubleshooting the Cisco Application Control Engine (ACE) load balancer with Cisco expert Ajay Kumar and Telmo Pereira. The Cisco ACE Application Control Engine Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers is a next-generation load-balancing and application-delivery solution. A member of the Cisco family of Data Center 3.0 solutions, the module: Helps ensure business continuity by increasing application availability Improves business productivity by accelerating application and server performance Reduces data center power, space, and cooling needs through a virtualized architecture Helps lower operational costs associated with application provisioning and scaling
    Ajay Kumar  is a customer support engineer in the Cisco Technical Assistance Center in Brussels, covering content delivery network technologies including Cisco Application Control Engine, Cisco Wide Area Application Services, Cisco Content Switching Module, Cisco Content Services Switches, and others. He has been with Cisco for more than four years, working with major customers to help resolve their issues related to content products. He holds DCASI and VCP certifications. 
    Telmo Pereira is a customer support engineer in the Cisco Technical Assistance Center in Brussels, where he covers all Cisco content delivery network technologies including Cisco Application Control Engine (ACE), Cisco Wide Area Application Services (WAAS), and Digital Media Suite. He has worked with multiple customers around the globe, helping them solve interesting and often highly complex issues. Pereira has worked in the networking field for more than 7 years. He holds a computer science degree as well as multiple certifications including CCNP, DCASI, DCUCI, and VCP
    Remember to use the rating system to let Ajay know if you have received an adequate response.
    Ajay and Telmo might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Data Center sub-community discussion forum Application Networking shortly after the event.
    This event lasts through July 26, 2013. Visit this forum often to view responses to your questions and the questions of other community members.

    Hello Krzysztof,
    Another set of good/interesting questions posted. Thanks! 
    I will try to clarify your doubts.
    In the output below both resources (proxy-connections and ssl-connections rate) are configured with a min percentage of resources (column Min), while 'Max' is set to equal to the min.
    ACE/Context# show resource usage
                                                         Allocation
            Resource         Current       Peak        Min        Max       Denied
    -- outputs omitted for brevity --
      proxy-connections             0      16358      16358      16358      17872
      ssl-connections rate          0        626        626        626      23204
    Most columns are self explanatory, 'Current' is current usage, 'Peak' is the maximum value reached, and the most important counter to monitor 'Denied' represents the amount of packets denied/dropped due to exceeding the configured limits.
    On the resources themselves, Proxy-connections is simply the amount of proxied connections, in other words all connections handled at layer 7 (SSL connections are proxied, as are any connections with layer 7 load balance policies, or inspection).
    So in this particular case for the proxy-connections we see that Peak is equal to the Max allocated, and as we have denies we can conclude that you have surpassed the limits for this resource. We see there were 17872 connections dropped due to that.
    ssl-connections rate should be read in the same manner, however all values for this resource are in bytes/s, except for Denied counter, that is simply the amount of packets that were dropped due to exceeding this resource. 
    For your particular tests you have allocated a min percentage and set max equal to min, this way you make sure that this context will not use any other additional resources.
    If you had set the max to unlimited during resource allocation, ACE would be allowed to use additional resources on top of those guaranteed, if those resources were available.
    This might sound a great idea, but resource planning on ACE should be done carefully to avoid any sort of oversubscription, specially if you have business critical contexts.
    We have a good reference for ACE resource planning that contains also description of all resources (this will help to understand the output better):
    http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/v3.00_A2/configuration/virtualization/guide/config.html#wp1008224
    1) When a resource is utilized to its maximum limit, the ACE denies additional requests made by any context for that resource. In other words, the action is to Drop. ACE  should in theory silently drop (No RST is sent back to the client). So unless we changed something on the code, this is what you should see.
    To give more context, seeing resets with SSL connections is not necessarily synonym of drops. As it is usual to see them during normal transactions.
    For instance Microsoft servers are usually ungracefully terminating SSL connections with RESET. Also when there is renegotiation during an SSL transaction you may see RESETS, but this will pass unnoticed for end users. 
    2)  ACE will simply drop/ignore new connections when we reach the maximum amount of proxied connections for that context. Exisiting connections will continue there.
    As ACE doesn't respond back, client would simply retransmit, and if he is lucky maybe in the next attempt he will be able to establish the connection.
    To overcome the denies, you will definitely have to increase the resource allocation. This of course, assuming you are not reaching any physical limit of the box.
    As mentioned setting max as unlimited might work for you, assuming there are a lot of unused resources on the box.
    3)  If a new connection comes in with a sticky value, that matches the sticky entry of a real server, which is already in MAXCONNS state, then both the ACE module/appliance should reject the connection and that sticky entry would be removed.
    The client would at that point reestablish a new connection and ACE would associate a new sticky entry with the flow for a new RSERVER after the loadbalancing decision.
    I hope this makes things clearer! Uff...
    Regards,
    Telmo

  • Ask the Expert: Global Site Selector Configuration and Troubleshooting

    Welcome to this Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about configuring and troubleshooting the Global Site Selector (GSS) with expert Swati Chopra.
    GSS devices represent the next generation of application switches and global server load balancing (GSLB) appliances. Working together with the Cisco ACE Module and Cisco ACE 4710 appliance, these devices form an application-fluent networking solution that improves availability, acceleration, and security for data center applications.
    The primary role of Cisco GSS is to implement the business continuance and disaster recovery policies of a business by optimizing and securing the Domain Name System (DNS) infrastructure of the data center. It does this by integrating with the DNS infrastructure and responding to the client DNS requests, thereby directing the client to the site that is best able to serve its needs.
    Swati Chopra is a CCNA, CCNP, and VCP certified customer support engineer for content switching, covering technologies such as Cisco Application Control Engine, Cisco Wide Area Application Services, Global Site Selector, Cisco Content Services Switches, and Digital Media Suite. She has been with Cisco for more than three years and has worked with most of the high-end customers on content-related complex cases. She completed her master’s degree in finance, was heading an online education project in collaboration with e-Sylvan, and later moved to technical services because of her love for technology. She is actively involved with diverse Cisco initiatives such as Connected Women, WISE, and Cisco Career Connections and recently hosted a “Birds of Feather” table at Cisco’s Women of Impact conference.
    Remember to use the rating system to let Swati know if you have received an adequate response. 
    Because of the volume expected during this event, Swati might not be able to answer every question. Remember that you can continue the conversation in the Data Center community under subcommunity Application Networking shortly after the event. This event lasts through April 25, 2014. Visit this forum often to view responses to your questions and the questions of other Cisco Support Community members.

    Hi Sarah,
    The load balancing mechanism for GSS requests is done via different methods. We can use these methods to define how the load is shared for different balance clauses within the same rule. The 6 methods we use are:
    –round-robin—The GSS cycles through the list of answers that are available as requests are received. Each resource within an answer group is tried in turn. The GSS cycles through the list of answers, selecting the next answer in line for each request. This is the default.
    eg: if we have 2 answers in answer group then GSS will provide them alternatively.
    –least-loaded—The GSS selects an answer based on the load reported by each VIP in the answer group. The answer reporting the lightest load is chosen to respond to the request.The least-loaded option is available only for VIP-type answer groups that use a KAL-AP or Scripted keepalive, as they provide the GSS with detailed information on the SLB load and availability.
    eg: if one answer has higher load than the other, than first answer will not be provided until its load goes down the other answers
    –ordered—The GSS selects an answer from the list based on precedence; answers with a lower order number are tried first, while answers further down the list are tried only if preceding answers are unavailable to respond to the request.
    for eg: answer with ordered number 1 will be provided first till it becomes unavailable. Once it is unavailable then answer with ordered list number 2 will be provided
    –weighted-round-robin—The GSS cycles through the list of answers that are available as the requests are received, but sends requests to favored answers in a ratio determined by the weight value assigned to that resource.
    eg: if one answer has more weight(80%) than the other answer(20%), then it will be used 8 times out of 10.
    –hashed— When the GSS uses the hashed balance method, elements of the client's DNS proxy IP address and the requesting client's domain are extracted to create a unique value, referred to as a hash value. The unique hash value is attached to and used to identify a VIP that is chosen to serve the DNS query.
    The use of hash values makes it possible to "stick" traffic from a particular requesting client to a specific VIP, ensuring that future requests from that client are routed to the same VIP. This type of continuity can be used to facilitate features, such as online shopping baskets, in which client-specific data is expected to persist even when client connectivity to a site is terminated or interrupted.
    The GSS supports the following two hashed balance methods. You can apply one or both hashed balance methods to the specified answer group.
    • By Source Address—The GSS selects the answer based on a hash value created from the source address of the request.
    • By Domain Name—The GSS selects the answer based on a hash value created from the requested domain name.
    for eg: a user using same source ip will get the same answer from GSS if we do source address hashing.
    -DNS Race (Boomerang) Method-The GSS supports the DNS race (boomerang) method of proximity routing, which is a type of DNS resolution initiated by the GSS to load balance 2 to 20 sites.
    The boomerang method is based on the concept that instantaneous proximity can be determined if a CRA within each data center sends an A-record (IP address) at the exact same time to the client's D-proxy. The DNS race method of DNS resolution gives all CRAs (Cisco content engines or content services switches) a chance at resolving a client request and allows for proximity to be determined without probing the client's D-proxy. The first A-record received by the D-proxy is, by default, considered to be the most proximate.
    Use case is mainly with CRA's.
    Hope this helps. Please feel free to revert if you have follow-up questions.
    Thanks,
    Swati

  • Configuring and Troubleshooting Virtual Switching System (VSS)

    With Anand Ganesan
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about how to monitor, configure, and troubleshoot the Virtual Switching System (VSS) in Cisco Catalyst 6500 Series Switches with expert Anand Ganesan.
    VSS is network system virtualization technology that pools multiple Cisco Catalyst 6500 Series Switches into one virtual switch, increasing operational efficiency, boosting nonstop communications, and scaling system bandwidth capacity to 1.4 Tbps. At the initial phase, a VSS will allow two physical Cisco Catalyst 6500 Series Switches to operate as a single logical virtual switch called a virtual switching system 1440 (VSS1440). 
    For more information, visit:  www.cisco.com/en/US/prod/collateral/switches/ps5718/ps9336/prod_qas0900aecd806ed74b.html
    The VSS simplifies network configuration and operation by reducing the number of Layer 3 routing neighbors and by providing a loop-free Layer 2 topology.
    Anand Ganesan is a customer support engineer in the High-Touch Technical Service team at Cisco specializing in switching protocols. He has been supporting major service providers and enterprise customers in switching and all other switching technologies for more than two years with Cisco. He has a total of eight years of experience in the IT industry. He holds a bachelor of engineering degree from Bharathiyar University, Coimbatore.
    Remember to use the rating system to let Anand know if you have received an adequate response. 
    Because of the volume expected during this event, Anand might not be able to answer every question. Remember that you can continue the conversation in the Network Infrastructure subcommunity, LAN Switching & Routing shortly after the event. This event lasts through September 6, 2013. Visit this forum often to view responses to your questions and the questions of other Cisco Support Community members.

    Okay..they are two different /30 networks.
    my BFD interfaces are GigabitEthernet1/3/48 and GigabitEthernet2/3/48 and they work fine.
    interface GigabitEthernet1/3/48
    description Switch 1 BFD Interface
    no switchport
    ip address 10.48.0.17 255.255.255.252
    bfd interval 100 min_rx 100 multiplier 3
    end
    interface GigabitEthernet2/3/48
    description Switch 2 BFD Interface
    no switchport
    ip address 10.48.0.21 255.255.255.252
    bfd interval 100 min_rx 100 multiplier 3
    end
    switch virtual domain 1
    switch mode virtual
    switch 1 priority 110
    dual-active pair interface GigabitEthernet1/3/48 interface GigabitEthernet2/3/48 bfd
    show switch virtual dual-active bfd
    Bfd dual-active detection enabled: Yes
    Bfd dual-active interface pairs configured:
    interface-1 Gi1/3/48 interface-2 Gi2/3/48
    router eigrp 1
    network 10.0.0.0
    network 10.1.201.0 0.0.0.255
    network 10.48.0.12 0.0.0.3
    network 10.48.177.0 0.0.0.255
    network 97.0.0.0
    network 99.0.0.0
    network 100.0.0.0
    network 100.7.7.0 0.0.0.255
    network 192.34.145.0
    network 192.168.15.0
    show ip ei in
    EIGRP-IPv4 Interfaces for AS(1)
                           Xmit Queue   Mean   Pacing Time   Multicast   Pending
    Interface       Peers Un/Reliable SRTT   Un/Reliable   Flow Timer   Routes
    Gi1/2/40           1       0/0         1       0/1           50           0
    Gi1/2/41           0       0/0         0       0/1           0           0
    Vl1               1       0/0         1       0/1           50           0
    Vl7               0       0/0         0       0/1           0           0
    Vl13               0       0/0         0       0/1           0           0
    Vl15               0       0/0         0       0/1           0           0
    Vl21               0       0/0         0       0/1           0           0
    Vl25               0       0/0         0       0/1            0           0
    Vl26               0       0/0         0       0/1           0           0
    Vl134             0       0/0         0       0/1           0           0
    Vl135             0       0/0         0       0/1           0           0
    Vl140             0       0/0         0       0/1           0           0
    Vl300             0       0/0         0       0/1           0           0
    Vl400             0       0/0         0       0/1           0           0
    Vl199             0       0/0         0       0/1           0           0
    Vl6               0       0/0         0       0/1           0           0
    Vl20               0       0/0         0       0/1           0           0
    Vl24               0        0/0         0       0/1           0           0
    Vl30               0       0/0         0       0/1           0           0
    Vl31               0       0/0         0       0/1           0           0
    Vl37               0       0/0         0       0/1           0           0
    Vl2               0       0/0         0       0/1           0           0
    Gi1/3/48           0       0/0         0       0/1           0           0
    Gi2/3/48           0       0/0         0       0/1           0           0
    Vl17               0       0/0         0       0/1           0           0
    Gi2/6/40           0       0/0         0       0/1           0           0
    Gi2/6/41           0       0/0         0       0/1           0           0
    Gi2/1/45           1        0/0         1       0/1           50           0
    Gi1/1/33           1       0/0         1       0/1           50           0
    My questions revolve around the same point.
    Are there any significance in running eigrp or any other routing protocol over this BFD link?
    Is the Dual active scenario detected by BFD or BFD notifies a routing protocol like eigrp and in turn dual active is detected?
    Should I suppress the eigrp HELLOs on these interfaces to get rid of the log message?
    Regards
    Vinayak

  • Ask the Expert: Installing, Configuring, and Troubleshooting Cisco Unified MeetingPlace

    With Dejan Petrovic
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about different MeetingPlace deployment types, what they include and require, and what they are capable of with Cisco expert Dejan Petrovic.  Cisco Unified MeetingPlace is a conferencing solution providing audio and video conferencing, and data sharing experience. It can be fully on premise solution or a hybrid solution integrated with WebEx for data sharing capability. Dejan  will be answering any questions about installation, upgrade, migration and troubleshooting processes.
    Dejan Petrovic is a Cisco customer support engineer and team lead in the Conferencing Technical Assistance Center team based in Boxborough. He has been providing support to customers and partners for Cisco Unified MeetingPlace solutions since 2009. He has more than eight years of experience working in the IT industry as system administrator, business manager, and networking consultant. Petrovic holds a bachelor’s degree in computer network and information systems as well as several Cisco certifications, including CCNA, Cisco IPCC Express Specialist,  and MeetingPlace Support Specialist.
    Remember to use the rating system to let Dejan know if you have received an adequate response. 
    Dejan might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Collaboration, Voice and Video sub-community discussion forum shortly after the event.  This event lasts through February 8, 2013. Visit this forum often to view responses to your questions and the questions of other community members.

    Hello Nick,
    I appreciate your questions, and will try to answer them below.
    When you are installing a fresh new MeetingPlace 8.5 that you plan to integrate with WebEx, the only available option is WebEx Managed user profiles. With this option, you can either create profiles manually on WebEx side, and then sync them to MeetingPlace, or you can use Federated SSO for import of profiles from LDAP server in your network to WebEx, and then sync the profiles from WebEx to MeetingPlace (you choose one of these two options when provisioning WebEx site).
    These are the only two available options for a NEW install of MP8.5 for WebEx integration, and as you can see both options are WebEx Managed profiles, the only difference is if you are going to use Federated SSO, or create profiles on WebEx manually.
    During the install, you can select to install MeetingPlace managed users option, but you would choose this option only if you plan to do a migration from an earlier MP release (7.x/8.0) with WebEx integration and Directory Integration.
    For example, MeetingPlace managed profiles option is available if you had MeetingPlace 8.0 integrated with WebEx Type II (WebEx scheduling) with Directory Integration, where you had your MP8.0 integrated with CUCM via AXL for user profile management (CUCM integrated with LDAP), and your WebEx Site provisioned for Directory Integration, and then migrate from that system to MeetingPlace 8.5 that you installed selecting MeetingPlace managed user profiles.
    The same goes for MeetingPlace Scheduling (Type I) integration with WebEx. Possible only with migration, and not with a fresh new installation.
    Now, to focus on your questions.
    1. As you can see, you don't have many options. If you have MS Active Directory that you would like to use for SSO in MP8.5 WebEx Scheduling, you will have to go with Federated SSO. So far, I haven't heard of any issues with that as it seems to be pretty straight forward to configure, and also WebEx Support team provides direct support for that setup as it is a direct integration between WebEx Site and the LDAP server (nothing to do with MeetingPlace side of the equation).
    2. In general, if you have Federated SSO enabled, you would go to WebEx site home page, click on Host Log In button which will then ask you to enter your network/windows credentials and place you to WebEx scheduling interface.
    If you have Directory Integration (like on MP8.0 WebEx Type II with CUCM/AXL integration), when you go to WebEx site home page and click Host Log In button, you are being redirected to the MeetingPlace log-in page where you would enter your Windows credentials (assuming your CUCM is integrated with LDAP), and then if log in is successful, you get redirected back to WebEx scheduling interface. With this type of deployment, you can log in to WebEx scheduling interface ONLY if you are connecting from your company network or have a VPN connection to your company network. This is a major limitation that most customers complained about, but the reason for this was that we didn't want to make MP Application server hostname/IP publicly available and hence cause a security issue.
    I am sure I answered your questions, but opened some new questions. So, please, let me know if I need to clarify anything.
    Thank you.
    -Dejan

  • Cable Modem Termination Systems (CMTS): Architecture, Configuration, and Troubleshooting

    With Eric Bautista
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to get an overview of the Cisco Cable Modem Termination System (CMTS) platforms and the uBR product family.
    Eric Bautista is a customer support engineer at the Cisco Technical Assistance Center (TAC.) He is responsible for supporting the Cisco uBR CMTS platforms. He has 3.5 years of experience in cable technology. Previous to his current role, Bautista supported Cisco WAN and optical technologies, including QoS and SONET/SDH.
    Remember to use the rating system to let Eric know if you have received an adequate response.
    Eric might not be able to answer each question due to the volume expected during this event.
    Remember that you can continue the conversation on the Service Provider sub-community discussion forum shortly after the event. This event lasts through September 21, 2012. Visit this forum often to view responses to your questions and the questions of other community members.
    Webcast Related links:
    Slides
    Webcast Recording video
    FAQ from live webcast

    Only the uBR10k CMTS platform supports the SIP and SPA modules. 
    The SIP needs to be installed in Slots 1, 2, 3, or 4 of the Cisco uBR10k router (referred to as WAN slots).
    The SPA's would then be installed into the SIP.
    The various SPA's available are:
    Cisco Wideband SPA - For Wideband / M-CMTS solutions.
    1-Port 10-Gigabit Ethernet Shared Port Adapter - For network connectivity
    5-Port Gigabit Ethernet Shared Port Adapter - For network connectivity
    Here is an excerpt from the Cisco uBR10012 Universal Broadband Router SIP and SPA Software Configuration Guide:
    http://www.cisco.com/en/US/docs/interfaces_modules/shared_port_adapters/configuration/ubr10012/12.3_23_bc/sipsp_d3.html
    SPA Interface Processors (SIP)
    A SIP is a carrier card that inserts into a router slot like a line card. It provides no network connectivity on its own.
    A SIP contains one or more bays (subslots), which are used to house one or more SPAs. The SPA provides interface ports for network connectivity.
    During normal operation the SIP should reside in the router fully populated either with functional SPAs in all bays, or with a blank filler plate (SPA-BLANK=) inserted in all empty bays.
    SIPs support online insertion and removal (OIR) with SPAs inserted in their bays. SPAs also support OIR and can be inserted or removed independently from the SIP.
    Shared Port Adapters (SPA)
    A SPA is a modular type of port adapter that inserts into a bay of a compatible SIP carrier card to provide network connectivity and increased interface port density. A SIP can hold one or more SPAs, depending on the SIP type.
    SPAs are available in various types. The Cisco Wideband SPA is a single-wide, half-height SPA. Figure 2-1 shows how bays are numbered on the Cisco Wideband SIP.

  • Ask the Expert: Configuration, Design, and Troubleshooting of Cisco Nexus 1000

    With Louis Watta
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about design, configuration, and troubleshooting of Cisco Nexus 1000V Series Switches operating inside VMware ESXi and Hyper-V with Cisco expert Louis Watta. Cisco Nexus 1000V Series Switches deliver highly secure, multitenant services by adding virtualization intelligence to the data center network. With Cisco Nexus 1000V Series Switches, you can have a consistent networking feature set and provisioning process all the way from the virtual machine access layer to the core of the data center network infrastructure.
    This is a continuation of the live Webcast.
    Louis Watta is a technical leader in the services organization for Cisco. Watta's primary background is in data center technologies: servers (UNIX, Windows, Linux), switches (MDS, Brocade), storage arrays (EMC, NetApp, HP), network switches (Cisco Catalyst and Cisco Nexus), and enterprise service hypervisors (VMware ESX, Hyper-V, KVM, XEN). As a Technical Leader in Technical Services, Louis currently supports beta and early field trials (EFTs) on new Cisco software and hardware. He has more than 15 years of experience in a wide variety of data center applications and is interested in data center technologies oriented toward data center virtualization and orchestration. Prior to Cisco, Louis was a system administrator for GTE Government Systems. He has a bachelor of science degree in computer science from North Carolina State University. .
    Remember to use the rating system to let Louis know if you have received an adequate response.
    Louis might not be able to answer each question because of the volume expected during this event. Remember that you can continue the conversation on the Data Center community Unified Computing shortly after the event.
    This event lasts through Friday, JUne 14, 2013. Visit this forum often to view responses to your questions and the questions of other Cisco Support Community members.
    Webcast related links:
    Slides
    FAQ
    Webcast Video Recording

    Right now there is only a few features that are not supported on N1Kv on Hyper-V
    They are VXLAN and QOS Fair Weighted Queuing. We are currently demoing VXLAN functionality at Microsoft TechEd Conference this week in New Orleans. So VXLAN support should be coming soon. I can't give you a specific timeline.
    For Fair Weighted Queuing I'm not sure. In the VMware world we take advantage of NETIOC infrastructure. In the MS world they do not have a NETIOC infrastructure that we can use to create a similar feature.
    Code base parity (as in VMware and Hyper-V VSMs running NXOS 5.x) will happen with the next major N1KV release for ESX.
    Let me know if that doesn't answer your question.
    thanks
    louis

  • Ask the Expert: Installation, Operation, and Troubleshooting of RF Gateway 1 (RFGW1)

    With Ron Hanson
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions from Cisco expert Ron Hanson about the RF Gateway 1 (RFGW1) including installation, operation, configuration, and troubleshooting.
    Ron Hanson is a customer support engineer in the Technical Assistance Center, where he supports major RF Gateway 1 customers as part of the Service Providers Video team. He started working with the RF Gateway before its general release in 2008, and worked in the field on large Gateway deployments before joining product support. Hanson has been in the cable TV industry for 38 years. He previously spent 22 years at Scientific-Atlanta, which was acquired by Cisco in 2007. He holds two joint patents and is certified as a Cisco Optical Specialist. 
    Remember to use the rating system to let Ron know if you have received an adequate response. 
    Ron might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Service Provider sub-community discussion forum shortly after the event. This event lasts through Sept 7, 2012. Visit this forum often to view responses to your questions and the questions of other community members.

    Hi John,
    Thanks for your reply.  The process of moving a license to another gateway can be done by the customer on the web site named HESULE  https://online.sciatl.com/license-it/.  You will need the HOST ID which can be found on the SYSTEM/License management tab. The HOST ID is essentially the 7 digit serial number with all leading zeros removed.
    Be sure to use Firefox when logging in.  Entering your email is important because the new license will be sent back to this address.
    In the License management tab, on the gateway you wish to remove the license from, record the 32 digit validation key number to the right of the license you wish to transfer.
    Go to HESULE and start the transfer process.  Hesule is very secure - therfore you must "prove" to Hesule the license has been removed from the first chassis.  Hesule will issue you a new license with the license you wish to transfer removed.  When you load this new license and new validation key will come up on the screen.  Go back to Hesule and enter this key to prove the license has been removed.  Hesule will then email you another new license containing the license you are transfering. Load this license on the new RFGW1 and the process is complete.
    Yes I understand I said a lot.  However, the process is described step by step on the Hesule site.
    If you have any problems do not hesitate to contact me.
    Thank you   RON HANSON

  • Ask The Expert: Understanding, Implementing, and Troubleshooting Cisco Prime Network

    Ask questions and learn about Cisco Prime Network with Cisco experts Vignesh Rajendran Praveen and Jaminder Singh Bali.
    Cisco Prime Network is and  Cisco Prime Network provides cost-effective device operation, administration and network fault management for today’s complex and evolved programmable networks (EPNs). It is a single solution to support both the traditional physical network components, as well as compute infrastructure, and the virtual elements found in data centers. Automated configuration and change management combined with advanced troubleshooting and diagnostics greatly help service providers enable proactive service assurance. Additionally, the flexible and extensible architecture is designed to support the multivendor environment, helping to lower operational costs.
    This event runs January 5 through January 16, 2015.
    Vignesh Rajendran Praveen is a High Touch Engineer with the Focused Technical Services team supporting Cisco's major Service Provider customers in Routing, Switching, Multiprotocol Label Switching (MPLS) technologies and Cisco Prime Network related issues. Previously at Cisco he has worked as a Network Consulting Engineer for Enterprise Customers and as a Customer Support Engineer for Service Provider customers. He has been in the networking industry for ten years and holds CCIE certification (#34503) in the Routing and Switching as well as Service Provider tracks.
    Jaminder Singh Bali is a Customer Support Engineer working in SP-NMS TAC team, supporting Cisco's major service provider customers in Cisco Prime Network, Performance and Prime Central related issues. His areas of expertise include Oracle, Linux and NMS applications. He has been in the industry for past six years.
    Remember to use the rating system to let the experts know if you have received an adequate response. 
    The Experts might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation in Network Infrastructure community, sub-community, LAN, Switching and Routing discussion forum shortly after the event. This event lasts through January 16, 2015. Visit this forum often to view responses to your questions and the questions of other community members.

    Hello Jerome,
    A variety of Cisco devices are supported by the the Cisco Prime Network. I would encourage you to go through the below links on the user guide depending the version of Cisco Prime Network being used.
    "Cisco Prime Network Supported Cisco Virtual Network Elements (VNEs)"
    "Cisco Prime Network Supported Cisco VNEs - Addendum"
    Below is the link for the user guide.
    http://www.cisco.com/c/en/us/support/cloud-systems-management/prime-network/products-user-guide-list.html
    Hope this would help in providing you more clarity.
    ***********Plz do rate this post if you found it helpful*************************
    Thanks & Regards,
    Vignesh R P

  • 2nd Gen iPad Mini stopped working yesterday.  Won't startup under and configuration and is not recognized by my iMac.

    2nd Gen iPad Mini stopped working yesterday.  Won't startup under and configuration and is not recognized by my iMac.  I believe it upgraded itself to iOS 8 (????)

    Hey Kenneth,
    So it sounds as if your iPad is not responding at all when you try to turn it on, is that correct? If so, I would suggest that you troubleshoot using the steps in this article -
    If your iPhone, iPad, or iPod touch doesn't respond or doesn't turn on - Apple Support
    If you get it to start up and it is still not recognized by iTunes on your Mac, use the steps in this article to troubleshoot that issue -
    If you don't see your connected device in iTunes for Mac - Apple Support
    Thanks for using Apple Support Communities.
    Happy computing,
    Brett L 

  • Ask the Expert: ISE 1.2: Configuration and Deployment with Cisco expert Craig Hyps

    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about how to deploy and configure Cisco Identity Services Engine (ISE) Version 1.2 and to understand the features and enhanced troubleshooting options available in this version, with Cisco expert Craig Hyps.
    October 27, 2014 through November 7, 2014.
    The Cisco Identity Services Engine (ISE) helps IT professionals meet enterprise mobility challenges and secure the evolving network across the entire attack continuum. Cisco ISE is a security policy management platform that identifies users and devices using RADIUS, 802.1X, MAB, and Web Authentication methods and automates secure access controls such as ACLs, VLAN assignment, and Security Group Tags (SGTs) to enforce role-based access to networks and network resources. Cisco ISE delivers superior user and device visibility through profiling, posture and mobile device management (MDM) compliance validation, and it shares vital contextual data with integrated ecosystem partner solutions using Cisco Platform Exchange Grid (pxGrid) technology to accelerate the identification, mitigation, and remediation of threats.
    Craig Hyps is a senior Technical Marketing Engineer for Cisco's Security Business Group with over 25 years networking and security experience. Craig is defining Cisco's next generation Identity Services Engine, ISE, and concurrently serves as the Product Owner for ISE Performance and Scale focused on the requirements of the largest ISE deployments.
    Previously Craig has held senior positions as a customer Consulting Engineer, Systems Engineer and product trainer.   He joined Cisco in 1997 and has extensive experience with Cisco's security portfolio.  Craig holds a Bachelor's degree from Dartmouth College and certifications that include CISSP, CCSP, and CCSI.
    Remember to use the rating system to let Craig know if you have received an adequate response.
    Because of the volume expected during this event, Ali might not be able to answer each question. Remember that you can continue the conversation on the Security community, sub-community shortly after the event. This event lasts through November 7, 2014. Visit this forum often to view responses to your questions and the questions of other community members.
    (Comments are now closed)

    1. Without more specifics it is hard to determine actual issue. It may be possible that if configured in same subnet that asymmetric traffic caused connections to fail. A key enhancement in ISE 1.3 is to make sure traffic received on a given interface is sent out same interface.
    2. Common use cases for using different interfaces include separation of management traffic from user traffic such as web portal access or to support dedicated profiling interfaces. For example, you may want employees to use a different interface for sponsor portal access. For profiling, you may want to use a specific interface for HTTP SPAN traffic or possibly configure IP Anycast to simplify reception and redundancy of DHCP IP Helper traffic. Another use case is simple NIC redundancy.
    a. Management traffic is restricted to eth0, but standalone node will also have PSN persona so above use cases can apply for interfaces eth1-eth3.
    b. For dedicated PAN / MnT nodes it usually does not make sense to configure multiple interfaces although ISE 1.3 does add support for SNMP on multiple interfaces if needed to separate out. It may also be possible to support NIC redundancy but I need to do some more testing to verify. 
    For PSNs, NIC redundancy for RADIUS as well as the other use cases for separate profiling and portal services apply.
    Regarding Supplicant Provisioning issue, the flows are the same whether wireless or wired. The same identity stores are supported as well. The key difference is that wireless users are directed to a specific auth method based on WLAN configuration and Cisco wired switches allow multiple auth methods to be supported on same port. 
    If RADIUS Proxy is required to forward requests to a foreign RADIUS server, then decision must be made based on basic RADIUS attributes or things like NDG. ISE does not terminate the authentication requests and that is handled by foreign server. ISE does support advanced relay functions such as attribute manipulation, but recommend review with requirements with local Cisco or partner security SE if trying to implement provisioning for users authenticated via proxy. Proxy is handled at Authentication Policy level. CWA and Guest Flow is handled in Authorization Policy.  If need to authenticate a CWA user via external RADIUS, then need to use RADIUS Token Server, not RADIUS Proxy.
    A typical flow for a wired user without 802.1X configured would be to hit default policy for CWA.  Based on successful CWA auth, CoA is triggered and user can then match a policy rule based on guest flow and CWA user identity (AD or non-AD) and returned an authorization for NSP.
    Regarding AD multi-domain support...
    Under ISE 1.2, if need to authenticate users across different forests or domains, then mutual trusts must exist, or you can use multiple LDAP server definitions if the EAP protocol supports LDAP. RADIUS Proxy is another option  to have some users authenticated to different AD domains via foreign RADIUS server.
    Under ISE 1.3, we have completely re-architected our AD connector and support multiple AD Forests and Domains with or without mutual trusts.
    When you mention the use of RADIUS proxy, it is not clear whether you are referring to ISE as the proxy or another RADIUS server proxying to ISE.  If you had multiple ISE deployments, then a separate RADIUS Server like ACS could proxy requests to different ISE 1.2 deployments, each with their own separate AD domain connection.  If ISE is the proxy, then you could have some requests being authenticated against locally joined AD domain while others are sent to a foreign RADIUS server which may have one or more AD domain connections.
    In summary, if the key requirement is ability to join multiple AD domains without mutual trust, then very likely ISE 1.3 is the solution.  Your configuration seems to be a bit involved and I do not want to provide design guidance on a paper napkin, so recommend consult with local ATP Security SE to review overall requirements, topology, AD structure, and RADIUS servers that require integration.
    Regards,
    Craig

  • HT204291 Help! I cannot see the Airplay symbol on any of my devices anymore!  I have tried following all guides and troubleshooting, but to no avail. Just cannot use the AppleTV with any of my devices.

    Help! I cannot see the Airplay symbol on any of my devices anymore!  I have tried following all guides and troubleshooting, but to no avail. Just cannot use the AppleTV with any of my devices.

    Thanks for the link. It didn't work at first on any of the devices but then I decided to enter a manual DNS instead of an automatic configuration. Then followed the steps again from your link and it worked.
    It is not stable though as I need to reset the device for it to see the airplay. But when it is connected it stays connected for 30 minutes approx.
    Any other suggestions to keep it stable would be fantastic but at least in the meantime I have a workaround.
    Thanks

  • Using and Troubleshooting the Dell Webcam and Dell Webcam Central Software

    Please read the information at...
    Using and Troubleshooting the Dell Webcam and Dell Webcam Central Software
    Locate the execute file (WebcamDell2.exe) buried in... 
    C:\Program Files (x86)\Dell Webcam\Dell Webcam Central
    Right clicked on it, then left click properties, then clicked on the compatibility tab, then changed compatibility from windows XP to Windows Vista SP 2 (the latest one they had).
    If your operating system was upgraded to Windows 7, did you install the drivers in the correct order? How to Download and Install Drivers in the Correct Order
    Shutdown the computer. Unplug the computer from the wall. Now remove the battery. Press and hold the power button for 30 seconds. Put the
    battery back in and start the computer. Did the webcam come back?
    If no, start, control panel, devices and printers. Click on add device. Is the webcam listed there?
    If you recently reinstalled the operating system, did you use the preferred method? Restoring Your Computer´s Software to the Factory Settings or Restoring Your Dell Computer to Original Factory Installation with Dell DataSafe Local Backup 2.0
    Please use Internet Explorer(32-bit) when navigating to  My Dell Downloads :: Login. Use the same email address and password you use here. Click on add system.
    ***Systems purchased befor April 1, 2010 might NOT register with Dell My Downloads***
    If system does NOT register after 5 minutes, then contact Dell Tech Support.
    If you have XP or a system that will not register, then try using this version of Dell Webcam Central. Once it's installed, then open it, click on the ? , check for  software update
    Open Dell Webcam Central. In the bottom right corner, make sure the webcam is on Capture mode.
    Rick

    Hello Rick,
    Thanks for trying to help.
    Here is the info as requested:-
    Host Name:                 DELLLAPTOP
    OS Name:                   Microsoft Windows 7 Home Premium
    OS Version:                6.1.7601 Service Pack 1 Build 7601
    OS Manufacturer:           Microsoft Corporation
    OS Configuration:          Standalone Workstation
    OS Build Type:             Multiprocessor Free
    Registered Owner:          Trevor
    Registered Organization:   Microsoft
    Product ID:                ?????
    Original Install Date:     07/07/2010, 11:46:05
    System Boot Time:          24/10/2011, 12:06:27
    System Manufacturer:       Dell Inc.
    System Model:              Inspiron 1570
    System Type:               x64-based PC
    Processor(s):              1 Processor(s) Installed.
                              [01]: Intel64 Family 6 Model 23 Stepping 10 GenuineIntel ~793 Mhz
    BIOS Version:              Dell Inc. A05, 23/03/2011
    Windows Directory:         C:\Windows
    System Directory:          C:\Windows\system32
    Boot Device:               \Device\HarddiskVolume2
    System Locale:             en-gb;English (United Kingdom)
    Input Locale:              en-gb;English (United Kingdom)
    Time Zone:                 (UTC) Dublin, Edinburgh, Lisbon, London
    Total Physical Memory:     2,937 MB
    Available Physical Memory: 1,399 MB
    Virtual Memory: Max Size:  5,872 MB
    Virtual Memory: Available: 4,244 MB
    Virtual Memory: In Use:    1,628 MB
    Page File Location(s):     C:\pagefile.sys
    Domain:                    WORKGROUP
    Logon Server:              \\DELLLAPTOP
    Hotfix(s):                 71 Hotfix(s) Installed.
                              [01]: 982861
                              [02]: KB971033
                              [03]: KB2305420
                              [04]: KB2393802
                              [05]: KB2425227
                              [06]: KB2475792
                              [07]: KB2476490
                              [08]: KB2478662
                              [09]: KB2479628
                              [10]: KB2479943
                              [11]: KB2484033
                              [12]: KB2485376
                              [13]: KB2487426
                              [14]: KB2488113
                              [15]: KB2491683
                              [16]: KB2492386
                              [17]: KB2503658
                              [18]: KB2503665
                              [19]: KB2505438
                              [20]: KB2506014
                              [21]: KB2506212
                              [22]: KB2506223
                              [23]: KB2506928
                              [24]: KB2507618
                              [25]: KB2507938
                              [26]: KB2508272
                              [27]: KB2508429
                              [28]: KB2509553
                              [29]: KB2511250
                              [30]: KB2511455
                              [31]: KB2515325
                              [32]: KB2518869
                              [33]: KB2522422
                              [34]: KB2524375
                              [35]: KB2525694
                              [36]: KB2529073
                              [37]: KB2530548
                              [38]: KB2532531
                              [39]: KB2533552
                              [40]: KB2533623
                              [41]: KB2534366
                              [42]: KB2536275
                              [43]: KB2536276
                              [44]: KB2539635
                              [45]: KB2541014
                              [46]: KB2544893
                              [47]: KB2545698
                              [48]: KB2547666
                              [49]: KB2552343
                              [50]: KB2555917
                              [51]: KB2556532
                              [52]: KB2559049
                              [53]: KB2560656
                              [54]: KB2562937
                              [55]: KB2563227
                              [56]: KB2563894
                              [57]: KB2564958
                              [58]: KB2567053
                              [59]: KB2567680
                              [60]: KB2570791
                              [61]: KB2570947
                              [62]: KB2572077
                              [63]: KB2579686
                              [64]: KB2586448
                              [65]: KB2607712
                              [66]: KB2616676
                              [67]: KB958488
                              [68]: KB976002
                              [69]: KB976902
                              [70]: KB976932
                              [71]: KB982018
    Network Card(s):           4 NIC(s) Installed.
                              [01]: Realtek PCIe GBE Family Controller
                                    Connection Name: Local Area Connection
                                    Status:          Media disconnected
                              [02]: Intel(R) WiFi Link 5100 AGN
                                    Connection Name: Wireless Network Connection
                                    DHCP Enabled:    Yes
                                    DHCP Server:     192.168.1.254
                                    IP address(es)
                                    [01]: ????
                                    [02]: ????
                              [03]: Microsoft Virtual WiFi Miniport Adapter
                                    Connection Name: Wireless Network Connection 2
                                    Status:          Media disconnected
                              [04]: Cisco Systems VPN Adapter for 64-bit Windows
                                    Connection Name: Local Area Connection 2
                                    Status:          Hardware not present
    Hope that this will help.
    Thanks again
    Regards
    Trevor

  • Trex Configuration--urgent

    Hi all,
    I want to configure Trex.For this if any one providing the useful link or documents and suggestions means it would be appreciated.
    Thanks and Regards
    Vijay kumar

    Hi all,
    for the most current info + docu about TREX and TREX configuration see:
    SAP Help Portal:  Search and Classification (TREX)
    http://help.sap.com/saphelp_nw70/helpdata/en/40/83505303bd5616e10000000a114cbd/frameset.htm
    --> TREX Configuration (as already mentioned above)
    SAP Service Marketplace:
    https://service.sap.com/instguides
    --> SAP NetWeaver --> SAP NetWeaver 7.0 (2004s) -->  Installation -->  3 - Installation - Standalone Engines --> SAP NetWeaver Search and Classification TREX
    There you find the Installation & Implementation Documentation Center for TREX with links to the TREX install guides for installing and configuring single host as well as multiple hosts landscapes.
    See also the SAP internal TREX Portal
    http://trex.wdf.sap.corp:1080
    for most current info about TREX.
    Current TREX versions are TREX 7.0 and TREX 7.1. Note the prerequisites for using TREX 7.1 by NW 7.0.
    Regards,
    Ralph Schroeder/TREX documentation

Maybe you are looking for