Solved

Replisapi.dll?diag Downloads?

Posted on 2014-01-04
9
518 Views
Last Modified: 2014-01-11
I am trying to set up replication.  I followed the sets in this article http://msdn.microsoft.com/en-us/library/ff714039.aspx.  When I enter the address/replisapi.dll?diag, replisapi.dll tries to download.  What am I doing wrong?
0
Comment
Question by:LesleyS243
  • 5
  • 4
9 Comments
 
LVL 34

Expert Comment

by:Dave_Dietz
Comment Utility
Did you follow the directions in step 6?

6.Configure IIS to enable replisapi.dll to execute.
a.
In Internet Information Services (IIS) Manager, click Default Web Site.

b.
In the center pane, click Handler Mappings.

c.
In the Actions pane, click Add Module Mapping.

d.
For Request Path, enter replisapi.dll.

e.
From the Module drop-down list, select IsapiModule.

f.
For Executable, enter <drive>:\Inetpub\SQLReplication\replisapi.dll.

g.
For Name, enter Replisapi.

h.
Click the Request Restrictions button, click the Access tab, and then click Execute.

i.
Click OK to close the Request Restrictions dialog box, and then click OK again to close the Add Module Mapping dialog box. When you are prompted to allow the ISAPI extension, click Yes to add the extension.

j.
Verify that Replisapi.dll is listed under the Enabled handler mappings. If it is in the Disabled list, right-click the Replisapi entry and then click Edit Feature Permissions. Check the Execute box, and then click OK.
0
 

Author Comment

by:LesleyS243
Comment Utility
Yes I have done this. Any idea what would cause it to try to download?
0
 
LVL 34

Expert Comment

by:Dave_Dietz
Comment Utility
The only reason it would try to download would be if the ISAPI wasn't configured to be executable.  If the server isn't told to execute that file it will try to send it to the client.

Can you check the Request Restrictions for the Replisapi handler and verify that it is set to 'Execute' on the Access tab?
0
 

Author Comment

by:LesleyS243
Comment Utility
Sorry it took me so long to get back to you.  I just checked.  The request restrictions shows that it is set to execute.  Any other thoughts?
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 34

Expert Comment

by:Dave_Dietz
Comment Utility
Not off the top of my head.  Can you post a copy of the web.config for the site?
0
 

Author Comment

by:LesleyS243
Comment Utility
<?xml version="1.0" encoding="UTF-8"?>
<configuration>
    <system.webServer>
        <directoryBrowse enabled="false" />
      <handlers accessPolicy="Read, Execute, Script">
            <remove name="ISAPI-dll" />
            <remove name="Replisapi" />
            <add name="Replisapi" path="ReplIsapi.dll" verb="*" modules="IsapiModule" scriptProcessor="C:\inetpub\SQLReplication2\replisapi.dll" resourceType="Unspecified" requireAccess="Execute" preCondition="bitness64" />
           
        </handlers>
    </system.webServer>
</configuration>
0
 
LVL 34

Accepted Solution

by:
Dave_Dietz earned 500 total points
Comment Utility
Is your application pool running in 64 or 32 bit?
0
 

Author Comment

by:LesleyS243
Comment Utility
I changed to Bitness32. Now error code is 0x800700c1.
0
 

Author Closing Comment

by:LesleyS243
Comment Utility
Thank you for your help!
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Join & Write a Comment

Have you ever sent email via ColdFusion and thought of tracking this mail to capture the exact date and time when the message was opened ?  If yes, then this article is for you ! First we need a table user_email with columns user_id , email , sub…
Periodically we have to update or add SSL certificates for customers. Depending upon your hosting plan you may be responsible for the installation and/or key generation. In the wake of Heartbleed many sites were forced to re-key. We will concen…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now