What are the limitation of the 4 Port Gigabit ethernet Security Service Module (4GE SSM)?

I was wondering if anyone can help me out. I am trying to create a redundancy topology which require several connections to an ASA 5510. I am looking at extending the connections to my ASA 5510 appliance with the four port gig ethernet security module (4GE SSM). I am trying to find out what the limitations are on this particular module.
I have heard that there might be limitations to the 4GE SSM. Such as the interfaces on this module might process data separately from the ASA 5510 appliance. My question is does the ASA four port gig ethernet security module (4GE SSM) interfaces act as a extension of the ASA 5510 appliance or does it process and filter data separate from the ASA 5510 appliance ?
My concerns are that the 4GE SSM does not utilize all the security features of the ASA 5510 appliance, and that it just separates traffic into security zones. I interpret that to mean that each interface can be placed in a separate security level in which case has a separate security algorithm and uses the security level to force security policies. Nothing more.
My second question if relevant would be what are the limitations?
Thank you for your help on this topic.
mike

The 4GE SSM just gives you the four additional ports. It doesn't increase the processing capacity of the 5510 (a relatively low end box whose replacement - the 5515X -  has been out since this past spring). It works off the same configuration script and CPU as all the built-in ports.
The only limitation I can think of off the top of my head is that members of an Etherchannel cannot span the SSM and the built-in ports.

Similar Messages

  • What are the different ports required to Deploy(Run) an application in NWDS

    Hi all,
    We have a issue here in deploying our application in NWDS. As we are accessing our servers(from another country) thru firewalls in between, most of the ports are blocked for security reasons,henceforth, we are unable to deploy our application in NWDS.
    Initially port 3601 was blocked, now its open.when i try to deploy my application , it prompts for a SDM password, after i enter it , it gives me error saying it can't process thru 50018 port.
    So my query is , to build,deploy and run or debug  a application in NWDS what are the different ports that needs to be accessable ?( so that i can tell my basis guys that all this specific ports need to be opened )
    (Note:  will the SDM port, debug port,Http port be enough to deploy and run an application)
    Need your help on this
    Regards,
    Vijay

    Hi Arun,
    Thanks for your reply, as you told port 3601, its already opened. I didnt understand about the 3200,3300,3299. Can u be more clear about why each of this port is used for? ( bcoz i need to give a reason to my Basis guys,what each port is for)
    Hope this Log details of the error that I get here helps you:-
    <i>Settings
    SDM host : "ServerName"
    SDM port : 50018
    URL to deploy : file:/C:/DOCUME1/abap1/LOCALS1/Temp/temp22390Welcome.ear
    Deployment exception : Server "srvName" did not accept login request as admin on port 50018. Details: ERROR: Could not establish connection to server "srvName" at port 50018: "srvName"
    Inner exception was :
    Server "srvName" did not accept login request as admin on port 50018. Details: ERROR: Could not establish connection to server "srvName" at port 50018: "srvName"</i>
    appreciate your valuable inputs.

  • What are the system ports that XI uses to invoke web services?

    Hi guys,
    Anyone knows what are the system ports that XI uses to invoke and to be invoked from web services?
    I think it uses the port of AFW but I don’t have sure…
    Thanks in advance,
    Ricardo.

    hi,
    if you want to invoke a WS on the XI use
    the j2ee port (5XX00)
    Regards,
    michal
    <a href="/people/michal.krawczyk2/blog/2005/06/28/xipi-faq-frequently-asked-questions"><b>XI / PI FAQ - Frequently Asked Questions</b></a>

  • TS1490 What are the Proxy, Port and Server settings supposed to be?

    What are the Proxy, Port and Server settings supposed to be for itunes (windows 8)?
    I havent been able to access itunes store for WEEKS, and i have gone through nearly everything to try and resolve it.

    http://support.apple.com/kb/TS1490

  • What are the default settings for ethernet, shows connected but no internet

    What are the default settings for ethernet ? shows connected but no internet via ethernet.
    It used to work fine but I think i have changed something getting my airport to work.
    Now i only get internet via wifi.
    Thanks in advance

    From the menu bar, select
     ▹ System Preferences... ▹ Network
    Click the Assist me button and select Assistant. Follow the prompts.

  • What are the steps to Migrate a Web Service from Tomcat to JBoss

    Hi,
    I am totally new to JBoss and need some help. I mostly worked on BEA and Oracle. I have a web service deployed on Tomcat that needs to be now migrated to JBoss. What are the steps in moving a web service from Tomcat to JBoss.
    Is there some step by step tutorial on developing and deploying a web service on JBoss along with sample build script.
    Any help is really appreciated.
    Thanks

    R u using axis. If you want to stick with axis and don't want to use JBossWS there is nothing else you need to do. Move all the axis to Jboss. If you plan to reimplement all ur services in JBossWS here it is:
    http://jbws.dyndns.org/mediawiki/index.php?title=Quick_Start
    http://jbws.dyndns.org/mediawiki/index.php?title=User_Guide
    Let me know if you need anything else.

  • What are  the tables and fields  in fico & sd module

    what are  the tables and fields  in fico & sd module

    Hi,
    <b> Sales and Distribution:</b>
    Customers KNA1 General Data
    KNB1 Customer Master – Co. Code Data (payment method, reconciliation acct)
    KNB4 Customer Payment History
    KNB5 Customer Master – Dunning info
    KNBK Customer Master Bank Data
    KNKA Customer Master Credit Mgmt.
    KNKK Customer Master Credit Control Area Data (credit limits)
    KNVV Sales Area Data (terms, order probability)
    KNVI Customer Master Tax Indicator
    KNVP Partner Function key
    KNVD Output type
    KNVS Customer Master Ship Data
    KLPA Customer/Vendor Link
    Sales Documents VBAKUK VBAK + VBUK
    VBUK Header Status and Administrative Data
    VBAK Sales Document – Header Data
    VBKD Sales Document – Business Data
    VBUP Item Status VBAP Sales Document – Item Data
    VBPA Partners
    VBFA Document Flow
    VBEP Sales Document Schedule Line
    VBBE Sales Requirements: Individual Records
    SD Delivery DocumeLIPS Delivery Document item data, includes referencing PO
    LIKP Delivery Document Header data
    Billing Document VBRK Billing Document Header
    VBRP Billing Document Item
    SD Shipping Unit VEKP Shipping Unit Item (Content)
    VEPO Shipping Unit Header
    <b>Financial Accounting</b>
    FBAS             Financial Accounting “Basis”
    BKPF             Accounting Document Header              BUKRS / BELNR / GJAHR
    BSEG             Accounting Document Segment             BUKRS / BELNR / GJAHR / BUZEI
    BSIP             Index for Vendor Validation of Double   BUKRS / LIFNR / WAERS / BLDAT /
                     Documents                               XBLNR / WRBTR / BELNR / GJAHR / BUZEI
    BVOR             Inter Company Posting Procedure         BVORG / BUKRS / GJAHR / BELNR
    EBKPF            Accounting Document Header (docs from   GLSBK / BELNR / GJHAR / GLEBK
                     External Systems)
    FRUN             Run Date of a Program                   PRGID
    KLPA             Customer / Vendor Linking               NKULI / NBUKR / NKOAR / PNTYP
                                                             / VKULI / VBUKR / VKOAR
    KNB4             Customer Payment History                KUNNR / BUKRS
    KNB5             Customer Master Dunning Data            KUNNR / BUKRS / MABER
    KNBK             Customer Master Bank Details            KUNNR / BANKS / BANKL / BANKN
    KNC1             Customer Master Transaction Figures     KUNNR / BUKRS / GJHAR
    KNC3             Customer Master Special GL Transactions KUNNR / BUKRS / GJAHR / SHBKZ
                     Figures
    LFB5             Vendor Master Dunning Data              LIFNR / BUKRS / MABER
    LFBK             Vendor Master Bank Details              LIFNR / BANKS / BANKL / BANKN
    LFC1             Vendor Master Transaction Figures       LIFNR / BUKRS / GJHAR
    LFC3             Vendor Master Special GL Transactions   LIFNR / BUKRS / GJHAR / SHBKZ
                     Figures
    VBKPF            Document Header for Document Parking    AUSBK / BUKRS / BELNR / GJHAR
    FBASCORE         Financial Accounting General Services “Basis”
    KNB1             Customer Master (Company Code)          KUNNR / BUKRS
    LFA1             Vendor Master (General Section)         LIFNR
    LFB1             Vendor Master (company Code Section)    LIFNR / BUKRS
    SKA1             G/L Account Master (Chart of Accounts)  KTOPL / SAKNR
    SKAT             G/L Account Master (Chart of Accounts – SPRAS / KTOPL / SAKNR
                     Description)
    MAHNS            Accounts Blocked by Dunning Selection   KOART / BUKRS / KONKO / MABER
    MHNK             Dunning Data (Account Entries)          LAUFD / LAUFI / KOART / BUKRS /
                                                             KUNNR / LIFNR / CPDKY / SKNRZE /
                                                             SMABER / SMAHSK / BUSAB
    FI-GL-GL (FBS)   General Ledger Accounting: Basic Functions- G/L Accounts
    SKAS             G/L Account Master (Chart of Accounts – SPRAS / KTOPL / SAKNR / SCHLW
                     Key Word list)
    SKB1             G/L Account Master (Company Code)       BUKRS / SAKNR
    FI-GL-GL (FBSC)  General Ledger Accounting: Basic
                     Functions - R/3 Customizing for G/L Accounts
    FIGLREP          Settings for G/L Posting Reports        MANDT
    TSAKR            Create G/L account with reference       BUKRS / SAKNR
    FI-GL-GL (FFE)   General Ledger Accounting: Basic
                     Functions - Fast Data Entry
    KOMU             Account Assignment Templates for G/L    KMNAM / KMZEI
                     Account items
    FI-AR-AR (FBD)   Accounts Receivable: Basic Functions - Customers
    KNKA             Customer Master Credit Management :     KUNNR
                     Central Data
    KNKK             Customer Master Credit Management :     KUNNR / KKBER
                     Control Area Data
    KNKKF1           Credit Management : FI Status data      LOGSYS / KUNNR / KKBER / REGUL
    RFRR             Accounting Data – A/R and A/P           RELID / SRTFD / SRTF2
                     Information System
    FI-BL-PT         Bank Accounting: Payment (BFIBL_CHECK_D)  Transactions – General Sections
    PAYR             Payment Medium File                     ZBUKR / HBKID / HKTID / RZAWE /
                                                             CHECT
    PCEC             Pre-numbered Check                      ZBUKR / HBKID / HKTID / STAPL
    FI-BL-PT-AP(FMZA)Bank Accounting: Payment Transactions – Automatic Payments
    F111G            Global Settings for Payment Program for MANDT
                     Payment Requests
    FDZA             Cash Management Line Items in Payment   KEYNO
                     Requests
    PAYRQ            Payment Requests                        KEYNO
    Hope this solves your concern...
    Regards,
    Habeeb
    Assign points if helpful

  • What are the various ports used by OLT?

    Having recently had 'fun' getting a load agent working in our secure LAN, I was wondering if someone could clarify what the various ports are used by/for?
    I am aware of the following:
    9001 - Actually mentioned when setting up a load agent
    1099 - Mentioned when setting up a data collector
    1098 - ? necessary for load agent (I'd hazard a guess at this also being Data Collector related)
    4444 - ? necessary for load agent
    7071 - ? necessary for load agent
    I have also had the following ports mentioned to me while looking at similar issues (but they did not need opening in my recent excercise):
    7073
    8083
    8088
    I have also suggested this information be added to the knowledgebase article (Doc ID: 787226.1) as they may need opening on any firewalls.

    I tried to add a perfmon monitor on my local system.
    Monitored system
    HostName: localhost
    username: windows user
    password: windows password
    Domain: windows domain name
    Data Collector
    Name: OLT server
    Hostname: localhost
    Port: 8088
    Username: oats
    Password: *****
    I got this error.
    An unhandled exception has occurred in the Application Service. Please retry the action you were performing. If you still experience the same problem, please try the following:
    Error while calling discovery: Server returned error in response to request 1065: Discovery for request null failed: code=dis20: (message id=console.discoveryError): (message id=responseServerError)
    Caused by: Discovery for request null failed: code=dis20: (message id=console.discoveryError)
    Caused by: Server threw an exception in response to request 1066: (message id=responseServerException)
    Caused by: Configuration error in workstation oats-am://LTRBHOJ.keste.com:8088/oats: (message id=Configuration error in workstation oats-am://LTRBHOJ.keste.com:8088/oats)
    Caused by: Error starting data collector on oats-am://LTRBHOJ.keste.com:8088:{1}: (message id=ds.dcStartError)
    Caused by: Remote host closed connection during handshake
    Caused by: SSL peer shut down incorrectly
    Did anyone face this issue ?

  • What are the usb ports for

    Why does atv have usb ports does it suport an external hard drive?If not what are they on the unit for. Thanks

    The USB port is for servicing and maintenance only.

  • What are the Essentials for a Sap Security Consultant.

    Hi Gurus,
    I have completed a Implementation in which I alone handled the entire Security . It is a defense client .
    Now I am technically expert at security. But I have no functional knowledge.
    Implementing Security in SAP one needs to have knowledge of funtional process as well. The course that are purely technical stuff and I have good idea of techincal stuff.
    The Question is what is a Sap Security Consultant expected to know . And how to go about acquiring that knowledge?

    Hi Hussain,
    There is a little bit of release-dependent-everything in this thread: Authorization for VAP2 in conflict with VD02 for F_KNA1_GRP
    Try solve it and you will understand that you need the requirements (without that you are anyway doomed) and the knowledge and the appropriate access to create / test it.
    BAPI's are remote enabled stable interfaces to SAP standard functionality. They are the best examples of combining functional, technical and standard skills in a sustainable way without creating a mess (a mess, way beyond the bounds of your concerns...).
    If you learn to use the available tools and information sources, then you dont need to stress about the essentials, even if your customer makes a design error before or after your advice.
    Cheers,
    Julius

  • What are the guests on Visual Admin- security provider- user logon sessions

    I see many guests on there.
    What are they corresponding to?
    Thanks!

    I'm not sure but check who is associated with guest security role.
    Also check this link: http://help.sap.com/saphelp_nw04/helpdata/en/77/b7013f9ea7d861e10000000a114084/frameset.htm
    Cheers,
    Mustafa

  • What are the accounts generated in subcontracting in MM module?

    I want the account transactions which are debitd and credited in subcontracting transaction from MM point of view?

    Hi Srinivas
    Here is the Complete Sub Contracting Cycle and Accounts
    (1) You have a material that can be procured externally, and you have maintained BOM with components. Any waste generated and received during subcontracting process can be maintained as component with negative quantity.
    (2) You create a subcontracting PO (PO with Item Category L). You can also maintain Purchase Info Record for Subcontract category for material and subcontractor.
    (3) You make a transfer posting to issue components for SC PO. Material is sent to subcontractor.  As material remains under your ownership, system does not make any value entry. But quantity is shown as "Material Provided to Vendor"
    (4) You receive finished material against SC-PO. You also specify components consumed in manufacturing of finished goods. Additionally, if you have negative components in BOM, now you'll also receive subcontracting by-products. There are three events, so three accounting entries are generated:
    DR FG Stock/ SC By-Product Stock
    CR Change in Stock (FG/ SC By-Product )
    (for finished goods received)
    DR Subcontracting Charges
    CR GR/IR Clg
    (for moneys payable to Subcontractor)
    DR Consumption (Components)
    CR Change in Stock (FG/ SC By-Product )
    (material provided to Vendor is now charged to expense)
    (5) You do the IV for SC Invoice, and the process is complete. 
    Thanks

  • What are  the roles & responsibilities  of GRC/SECURTIY CONSULTANT IN IMPLE

    HELLO EXPERTS,
                                  CAN U PLS TELL WHAT ARE THE ROLES & RESPONSIBILITIES OF GRC/SECURITY CONSULTANT IN IMPLEMENTATION OF GRC TOOL.
    REGARDS,
    SANJAY

    Hi Sanjay,
    The role of GRC & Securtiy Consultant is basicly the implementation of GRC Application in Customor envoriment. In most of cases he gives technical support for installation and configuration. What we are really do is following..
    1. Preperation of System Landscape Concept --> Provide Hardware and Software spesifications to customer
    2. Installation of Software Components --> This contains the installation of NW and GRC Components and also the installation of SAP Backend Components like Real Time Agents and the post-Installation configurations
    3. Post-Installation and Basic Configuration --> Create Connectors and additional basic configurations
    4. Hosting of Workshops for Risk Creation and Ruleset customizing
    5. Implementation of Custom defined Rules in the Application
    6. Test of Applications
    7. Hostin of Workshops for Approval Methodology and Workflow Use Cases
    8. Hostin of Workshops for Superuser Role Usage and Management of Superuser
    9. Role Change and Creation Workshops in GRC ERM.
    10 Documentation and Deliver of Custom Concepts for Compliant User & Role Administration
    11. Handling of Error and Trobles.
    this are my daily business...
    Best Regards.

  • What are the pre requisites for E-Recruitment module?

    Hi all,
    What are the pre requisites for implementing E-Recruitment module ?
    Does it require Hr module or as stand alone it can work?
    Regards.
    Rajendra

    Thanks Aniket
    Will the following configuration work as e-recruitment stand alone mode.
    WAS with ABAP stack + E-Recruting 6.0 sp + Java stack + Portal + ESS MSS Business package ( for e recruiting).
    Regards
    Rajendra

  • What are the documentations you have done.

    Hi,
         What are the documentation you have done in SD module, This is the Question which I had faced in the Interview, Did any one explain me meaning of documentation with Examples.
    Regards,
    Arjun.

    Hallo sir,
                  could you please expalain me the SD relavant documentations with some examples.
    Arjun.

Maybe you are looking for