LoadRunner Query

Posted on 2005-05-12
Last Modified: 2012-06-22
I am facing problem while recording website which uses SSL.
I have down loaded that certificate and installed it in IE.
but when i try to record that site using Load runner, Load runner opens instance of IE and in that the site is unable to open and gives message "Error Connection to serrver is Lost" in IE.
I am using dual protocol and in that selecting only Web(HTTP) protocol.
while recording i am facing "Handshake failed" message in Load runner.

Question by:aspmaestro
    LVL 6

    Expert Comment

    My first step would be to use ethereal and look at the ip conversations between the two ends. That will give all the gory details about what is going on.

    You say you are using SSL, shouldn't you be using https?
    LVL 5

    Author Comment

    Yes we are using SSL.I will tell u what we have done till now.
    Firstly we access site using HTTPS and download certificate and save it in IE 6.0
    Then if we access site using HTTPS the same page to download certificate appears.
    so we have to access site using HTTP not HTTPS....
    So we did like that i think u have now understood.
    LVL 6

    Expert Comment

    Ethereal is an open source sniffer freely available at: www When you use it, every packet that enters or leaves your machine is recorded. If you can record a trace of what is going on, It might be pretty clear what the problem is. It only takes a few minutes to download and install. If you are doing network development, it will be well worth your time to use this. Many a development hour has been saved with this useful tool. Writing IP code without it is a lot like driving a car blindfolded.

    LVL 5

    Author Comment

    The address u have proviede is not working please verify it...
    LVL 6

    Accepted Solution

    I'm sorry, it was a typo.



    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Suggested Solutions

    Title # Comments Views Activity
     shows up in Outlook, not OWA or on phone 3 45
    noX challenge 17 51
    array11 challenge 16 40
    mapShare challenge 13 40
    Purpose To explain how to place a textual stamp on a PDF document.  This is commonly referred to as an annotation, or possibly a watermark, but a watermark is generally different in that it is somewhat translucent.  Watermark’s may be text or graph…
    Go is an acronym of golang, is a programming language developed Google in 2007. Go is a new language that is mostly in the C family, with significant input from Pascal/Modula/Oberon family. Hence Go arisen as low-level language with fast compilation…
    Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …
    In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now