What are the limitation of the 4 Port Gigabit ethernet Security Service Module (4GE SSM)?
I was wondering if anyone can help me out. I am trying to create a redundancy topology which require several connections to an ASA 5510. I am looking at extending the connections to my ASA 5510 appliance with the four port gig ethernet security module (4GE SSM). I am trying to find out what the limitations are on this particular module.
I have heard that there might be limitations to the 4GE SSM. Such as the interfaces on this module might process data separately from the ASA 5510 appliance. My question is does the ASA four port gig ethernet security module (4GE SSM) interfaces act as a extension of the ASA 5510 appliance or does it process and filter data separate from the ASA 5510 appliance ?
My concerns are that the 4GE SSM does not utilize all the security features of the ASA 5510 appliance, and that it just separates traffic into security zones. I interpret that to mean that each interface can be placed in a separate security level in which case has a separate security algorithm and uses the security level to force security policies. Nothing more.
My second question if relevant would be what are the limitations?
Thank you for your help on this topic.
mike
The 4GE SSM just gives you the four additional ports. It doesn't increase the processing capacity of the 5510 (a relatively low end box whose replacement - the 5515X - has been out since this past spring). It works off the same configuration script and CPU as all the built-in ports.
The only limitation I can think of off the top of my head is that members of an Etherchannel cannot span the SSM and the built-in ports.
Similar Messages
-
What are the different ports required to Deploy(Run) an application in NWDS
Hi all,
We have a issue here in deploying our application in NWDS. As we are accessing our servers(from another country) thru firewalls in between, most of the ports are blocked for security reasons,henceforth, we are unable to deploy our application in NWDS.
Initially port 3601 was blocked, now its open.when i try to deploy my application , it prompts for a SDM password, after i enter it , it gives me error saying it can't process thru 50018 port.
So my query is , to build,deploy and run or debug a application in NWDS what are the different ports that needs to be accessable ?( so that i can tell my basis guys that all this specific ports need to be opened )
(Note: will the SDM port, debug port,Http port be enough to deploy and run an application)
Need your help on this
Regards,
VijayHi Arun,
Thanks for your reply, as you told port 3601, its already opened. I didnt understand about the 3200,3300,3299. Can u be more clear about why each of this port is used for? ( bcoz i need to give a reason to my Basis guys,what each port is for)
Hope this Log details of the error that I get here helps you:-
<i>Settings
SDM host : "ServerName"
SDM port : 50018
URL to deploy : file:/C:/DOCUME1/abap1/LOCALS1/Temp/temp22390Welcome.ear
Deployment exception : Server "srvName" did not accept login request as admin on port 50018. Details: ERROR: Could not establish connection to server "srvName" at port 50018: "srvName"
Inner exception was :
Server "srvName" did not accept login request as admin on port 50018. Details: ERROR: Could not establish connection to server "srvName" at port 50018: "srvName"</i>
appreciate your valuable inputs. -
What are the system ports that XI uses to invoke web services?
Hi guys,
Anyone knows what are the system ports that XI uses to invoke and to be invoked from web services?
I think it uses the port of AFW but I dont have sure
Thanks in advance,
Ricardo.hi,
if you want to invoke a WS on the XI use
the j2ee port (5XX00)
Regards,
michal
<a href="/people/michal.krawczyk2/blog/2005/06/28/xipi-faq-frequently-asked-questions"><b>XI / PI FAQ - Frequently Asked Questions</b></a> -
TS1490 What are the Proxy, Port and Server settings supposed to be?
What are the Proxy, Port and Server settings supposed to be for itunes (windows 8)?
I havent been able to access itunes store for WEEKS, and i have gone through nearly everything to try and resolve it.http://support.apple.com/kb/TS1490
-
What are the default settings for ethernet, shows connected but no internet
What are the default settings for ethernet ? shows connected but no internet via ethernet.
It used to work fine but I think i have changed something getting my airport to work.
Now i only get internet via wifi.
Thanks in advanceFrom the menu bar, select
▹ System Preferences... ▹ Network
Click the Assist me button and select Assistant. Follow the prompts. -
What are the steps to Migrate a Web Service from Tomcat to JBoss
Hi,
I am totally new to JBoss and need some help. I mostly worked on BEA and Oracle. I have a web service deployed on Tomcat that needs to be now migrated to JBoss. What are the steps in moving a web service from Tomcat to JBoss.
Is there some step by step tutorial on developing and deploying a web service on JBoss along with sample build script.
Any help is really appreciated.
ThanksR u using axis. If you want to stick with axis and don't want to use JBossWS there is nothing else you need to do. Move all the axis to Jboss. If you plan to reimplement all ur services in JBossWS here it is:
http://jbws.dyndns.org/mediawiki/index.php?title=Quick_Start
http://jbws.dyndns.org/mediawiki/index.php?title=User_Guide
Let me know if you need anything else. -
What are the tables and fields in fico & sd module
what are the tables and fields in fico & sd module
Hi,
<b> Sales and Distribution:</b>
Customers KNA1 General Data
KNB1 Customer Master Co. Code Data (payment method, reconciliation acct)
KNB4 Customer Payment History
KNB5 Customer Master Dunning info
KNBK Customer Master Bank Data
KNKA Customer Master Credit Mgmt.
KNKK Customer Master Credit Control Area Data (credit limits)
KNVV Sales Area Data (terms, order probability)
KNVI Customer Master Tax Indicator
KNVP Partner Function key
KNVD Output type
KNVS Customer Master Ship Data
KLPA Customer/Vendor Link
Sales Documents VBAKUK VBAK + VBUK
VBUK Header Status and Administrative Data
VBAK Sales Document Header Data
VBKD Sales Document Business Data
VBUP Item Status VBAP Sales Document Item Data
VBPA Partners
VBFA Document Flow
VBEP Sales Document Schedule Line
VBBE Sales Requirements: Individual Records
SD Delivery DocumeLIPS Delivery Document item data, includes referencing PO
LIKP Delivery Document Header data
Billing Document VBRK Billing Document Header
VBRP Billing Document Item
SD Shipping Unit VEKP Shipping Unit Item (Content)
VEPO Shipping Unit Header
<b>Financial Accounting</b>
FBAS Financial Accounting Basis
BKPF Accounting Document Header BUKRS / BELNR / GJAHR
BSEG Accounting Document Segment BUKRS / BELNR / GJAHR / BUZEI
BSIP Index for Vendor Validation of Double BUKRS / LIFNR / WAERS / BLDAT /
Documents XBLNR / WRBTR / BELNR / GJAHR / BUZEI
BVOR Inter Company Posting Procedure BVORG / BUKRS / GJAHR / BELNR
EBKPF Accounting Document Header (docs from GLSBK / BELNR / GJHAR / GLEBK
External Systems)
FRUN Run Date of a Program PRGID
KLPA Customer / Vendor Linking NKULI / NBUKR / NKOAR / PNTYP
/ VKULI / VBUKR / VKOAR
KNB4 Customer Payment History KUNNR / BUKRS
KNB5 Customer Master Dunning Data KUNNR / BUKRS / MABER
KNBK Customer Master Bank Details KUNNR / BANKS / BANKL / BANKN
KNC1 Customer Master Transaction Figures KUNNR / BUKRS / GJHAR
KNC3 Customer Master Special GL Transactions KUNNR / BUKRS / GJAHR / SHBKZ
Figures
LFB5 Vendor Master Dunning Data LIFNR / BUKRS / MABER
LFBK Vendor Master Bank Details LIFNR / BANKS / BANKL / BANKN
LFC1 Vendor Master Transaction Figures LIFNR / BUKRS / GJHAR
LFC3 Vendor Master Special GL Transactions LIFNR / BUKRS / GJHAR / SHBKZ
Figures
VBKPF Document Header for Document Parking AUSBK / BUKRS / BELNR / GJHAR
FBASCORE Financial Accounting General Services Basis
KNB1 Customer Master (Company Code) KUNNR / BUKRS
LFA1 Vendor Master (General Section) LIFNR
LFB1 Vendor Master (company Code Section) LIFNR / BUKRS
SKA1 G/L Account Master (Chart of Accounts) KTOPL / SAKNR
SKAT G/L Account Master (Chart of Accounts SPRAS / KTOPL / SAKNR
Description)
MAHNS Accounts Blocked by Dunning Selection KOART / BUKRS / KONKO / MABER
MHNK Dunning Data (Account Entries) LAUFD / LAUFI / KOART / BUKRS /
KUNNR / LIFNR / CPDKY / SKNRZE /
SMABER / SMAHSK / BUSAB
FI-GL-GL (FBS) General Ledger Accounting: Basic Functions- G/L Accounts
SKAS G/L Account Master (Chart of Accounts SPRAS / KTOPL / SAKNR / SCHLW
Key Word list)
SKB1 G/L Account Master (Company Code) BUKRS / SAKNR
FI-GL-GL (FBSC) General Ledger Accounting: Basic
Functions - R/3 Customizing for G/L Accounts
FIGLREP Settings for G/L Posting Reports MANDT
TSAKR Create G/L account with reference BUKRS / SAKNR
FI-GL-GL (FFE) General Ledger Accounting: Basic
Functions - Fast Data Entry
KOMU Account Assignment Templates for G/L KMNAM / KMZEI
Account items
FI-AR-AR (FBD) Accounts Receivable: Basic Functions - Customers
KNKA Customer Master Credit Management : KUNNR
Central Data
KNKK Customer Master Credit Management : KUNNR / KKBER
Control Area Data
KNKKF1 Credit Management : FI Status data LOGSYS / KUNNR / KKBER / REGUL
RFRR Accounting Data A/R and A/P RELID / SRTFD / SRTF2
Information System
FI-BL-PT Bank Accounting: Payment (BFIBL_CHECK_D) Transactions General Sections
PAYR Payment Medium File ZBUKR / HBKID / HKTID / RZAWE /
CHECT
PCEC Pre-numbered Check ZBUKR / HBKID / HKTID / STAPL
FI-BL-PT-AP(FMZA)Bank Accounting: Payment Transactions Automatic Payments
F111G Global Settings for Payment Program for MANDT
Payment Requests
FDZA Cash Management Line Items in Payment KEYNO
Requests
PAYRQ Payment Requests KEYNO
Hope this solves your concern...
Regards,
Habeeb
Assign points if helpful -
What are the various ports used by OLT?
Having recently had 'fun' getting a load agent working in our secure LAN, I was wondering if someone could clarify what the various ports are used by/for?
I am aware of the following:
9001 - Actually mentioned when setting up a load agent
1099 - Mentioned when setting up a data collector
1098 - ? necessary for load agent (I'd hazard a guess at this also being Data Collector related)
4444 - ? necessary for load agent
7071 - ? necessary for load agent
I have also had the following ports mentioned to me while looking at similar issues (but they did not need opening in my recent excercise):
7073
8083
8088
I have also suggested this information be added to the knowledgebase article (Doc ID: 787226.1) as they may need opening on any firewalls.I tried to add a perfmon monitor on my local system.
Monitored system
HostName: localhost
username: windows user
password: windows password
Domain: windows domain name
Data Collector
Name: OLT server
Hostname: localhost
Port: 8088
Username: oats
Password: *****
I got this error.
An unhandled exception has occurred in the Application Service. Please retry the action you were performing. If you still experience the same problem, please try the following:
Error while calling discovery: Server returned error in response to request 1065: Discovery for request null failed: code=dis20: (message id=console.discoveryError): (message id=responseServerError)
Caused by: Discovery for request null failed: code=dis20: (message id=console.discoveryError)
Caused by: Server threw an exception in response to request 1066: (message id=responseServerException)
Caused by: Configuration error in workstation oats-am://LTRBHOJ.keste.com:8088/oats: (message id=Configuration error in workstation oats-am://LTRBHOJ.keste.com:8088/oats)
Caused by: Error starting data collector on oats-am://LTRBHOJ.keste.com:8088:{1}: (message id=ds.dcStartError)
Caused by: Remote host closed connection during handshake
Caused by: SSL peer shut down incorrectly
Did anyone face this issue ? -
Why does atv have usb ports does it suport an external hard drive?If not what are they on the unit for. Thanks
The USB port is for servicing and maintenance only.
-
What are the Essentials for a Sap Security Consultant.
Hi Gurus,
I have completed a Implementation in which I alone handled the entire Security . It is a defense client .
Now I am technically expert at security. But I have no functional knowledge.
Implementing Security in SAP one needs to have knowledge of funtional process as well. The course that are purely technical stuff and I have good idea of techincal stuff.
The Question is what is a Sap Security Consultant expected to know . And how to go about acquiring that knowledge?Hi Hussain,
There is a little bit of release-dependent-everything in this thread: Authorization for VAP2 in conflict with VD02 for F_KNA1_GRP
Try solve it and you will understand that you need the requirements (without that you are anyway doomed) and the knowledge and the appropriate access to create / test it.
BAPI's are remote enabled stable interfaces to SAP standard functionality. They are the best examples of combining functional, technical and standard skills in a sustainable way without creating a mess (a mess, way beyond the bounds of your concerns...).
If you learn to use the available tools and information sources, then you dont need to stress about the essentials, even if your customer makes a design error before or after your advice.
Cheers,
Julius -
What are the guests on Visual Admin- security provider- user logon sessions
I see many guests on there.
What are they corresponding to?
Thanks!I'm not sure but check who is associated with guest security role.
Also check this link: http://help.sap.com/saphelp_nw04/helpdata/en/77/b7013f9ea7d861e10000000a114084/frameset.htm
Cheers,
Mustafa -
What are the accounts generated in subcontracting in MM module?
I want the account transactions which are debitd and credited in subcontracting transaction from MM point of view?
Hi Srinivas
Here is the Complete Sub Contracting Cycle and Accounts
(1) You have a material that can be procured externally, and you have maintained BOM with components. Any waste generated and received during subcontracting process can be maintained as component with negative quantity.
(2) You create a subcontracting PO (PO with Item Category L). You can also maintain Purchase Info Record for Subcontract category for material and subcontractor.
(3) You make a transfer posting to issue components for SC PO. Material is sent to subcontractor. As material remains under your ownership, system does not make any value entry. But quantity is shown as "Material Provided to Vendor"
(4) You receive finished material against SC-PO. You also specify components consumed in manufacturing of finished goods. Additionally, if you have negative components in BOM, now you'll also receive subcontracting by-products. There are three events, so three accounting entries are generated:
DR FG Stock/ SC By-Product Stock
CR Change in Stock (FG/ SC By-Product )
(for finished goods received)
DR Subcontracting Charges
CR GR/IR Clg
(for moneys payable to Subcontractor)
DR Consumption (Components)
CR Change in Stock (FG/ SC By-Product )
(material provided to Vendor is now charged to expense)
(5) You do the IV for SC Invoice, and the process is complete.
Thanks -
What are the roles & responsibilities of GRC/SECURTIY CONSULTANT IN IMPLE
HELLO EXPERTS,
CAN U PLS TELL WHAT ARE THE ROLES & RESPONSIBILITIES OF GRC/SECURITY CONSULTANT IN IMPLEMENTATION OF GRC TOOL.
REGARDS,
SANJAYHi Sanjay,
The role of GRC & Securtiy Consultant is basicly the implementation of GRC Application in Customor envoriment. In most of cases he gives technical support for installation and configuration. What we are really do is following..
1. Preperation of System Landscape Concept --> Provide Hardware and Software spesifications to customer
2. Installation of Software Components --> This contains the installation of NW and GRC Components and also the installation of SAP Backend Components like Real Time Agents and the post-Installation configurations
3. Post-Installation and Basic Configuration --> Create Connectors and additional basic configurations
4. Hosting of Workshops for Risk Creation and Ruleset customizing
5. Implementation of Custom defined Rules in the Application
6. Test of Applications
7. Hostin of Workshops for Approval Methodology and Workflow Use Cases
8. Hostin of Workshops for Superuser Role Usage and Management of Superuser
9. Role Change and Creation Workshops in GRC ERM.
10 Documentation and Deliver of Custom Concepts for Compliant User & Role Administration
11. Handling of Error and Trobles.
this are my daily business...
Best Regards. -
What are the pre requisites for E-Recruitment module?
Hi all,
What are the pre requisites for implementing E-Recruitment module ?
Does it require Hr module or as stand alone it can work?
Regards.
RajendraThanks Aniket
Will the following configuration work as e-recruitment stand alone mode.
WAS with ABAP stack + E-Recruting 6.0 sp + Java stack + Portal + ESS MSS Business package ( for e recruiting).
Regards
Rajendra -
What are the documentations you have done.
Hi,
What are the documentation you have done in SD module, This is the Question which I had faced in the Interview, Did any one explain me meaning of documentation with Examples.
Regards,
Arjun.Hallo sir,
could you please expalain me the SD relavant documentations with some examples.
Arjun.
Maybe you are looking for
-
Hi, I am quite happy with the way FF is more advanced than Chrome while handling >1 windows with >1 tabs open in. However, I am looking for (more) stability. Please note that I have opted to not use flash with this (always latest prod rel) browser an
-
Proc C - How to convert datetime variable in Proc C into C?
Hi, Does anyone know how to convert a datetime variable in Pro C into C? For Example, Order_Table with OrderId and OrderDate fields. How do I compare the OrderDate with the system datetime in Pro C or C? Thank you.
-
Remote doest work with my ipod
I have just purchased a remote with earphone from apple. the problem is when i connect the earphone works but the remote dosent. I have 30 gb ipod with video. Can some one help .............
-
Getting error -200479 on 3 card PXI 6071E synchronized system
I am trying to synchronize 3 PXI6071 boards, each having multiple channels, so that they are on the same timebase and can be started with the same trigger. I have written a vi to do this . It works fine when I have only one channel on each of the thr
-
Batch Comamand to Change "Show When Being Observed" on clients to OFF?
I administer roughly 70 machines via ARD3 and have a question: Is it possible to turn "Show When Being Observed" off on all machines without having to crawl thru each one one-by-one? I am also using Workgroup Manager to admin all the machines via Ope