Search This Blog

Tuesday, December 21, 2010

How do I turn off Junk Mail filtering in Outlook 2007?

http://kb.mit.edu/confluence/pages/viewpage.action?pageId=4271629

  1. Start Outlook 2007
  2. Under the Tools menu, select Options
  3. On the Preferences tab, under E-mail, click Junk E-mail
  4. Select "No Automatic Filtering"
  5. Click on "Blocked Senders" and remove any blocked senders from the list
  6. Click Apply
  7. Click OK

Sunday, December 19, 2010

what's the difference betweet sql 2008 and sql 2008 r2

http://www.microsoft.com/sqlserver/2008/en/us/editions.aspx

http://social.msdn.microsoft.com/Forums/en-US/sqlsetupandupgrade/thread/0be511b2-0c21-4206-90ee-8ce214285a3a/
http://msdn.microsoft.com/en-us/library/bb500435%28SQL.105%29.aspx

 http://blogs.techrepublic.com.com/datacenter/?p=2715
PowerPivot for SharePoint
PowerPivot for SharePoint adds shared services and infrastructure for loading, querying, and managing PowerPivot workbooks that you publish to a SharePoint 2010 server or farm. To create PowerPivot workbooks, you use PowerPivot for Excel.
PowerPivot for Excel
PowerPivot for Excel is an add-in to Excel 2010 that can be downloaded from the web and installed on client workstations. You use PowerPivot for Excel to assemble and create relationships in large amounts of data from different sources, and then use that data as the basis for PivotTables and other data visualization objects that support data analysis in Excel.
Multi-Server Administration and Data-Tier Application
The SQL Server Utility forms a central repository for performance data and management policies that tailor the operation of instances of the Database Engine that have been enrolled in the utility. It also includes a Utility Explorer for centralized management, and dashboards that report the state of the managed instances. A data-tier application (DAC) forms a single unit for developing, deploying, and managing the database objects used by an application.
Master Data Services
Master Data Services is comprised of a database, configuration tool, Web application, and Web service that you use to manage your organization's master data and maintain an auditable record of that data as it changes over time. You use models and hierarchies to group and organize data to prepare it for further use in business intelligence and reporting tools, data warehouses, and other operational systems. Master Data Services integrates with source systems and incorporates business rules to become the single source of master data across your organization.
Features Supported by the Editions of SQL Server 2008 R2
The largest database supported by SQL Server Express has been increased from 4 GB to 10 GB.

Saturday, December 18, 2010

supermico SuperServer 5016I-MTF and Xen 5.6.1

SuperServer 5016I-MTF, the native raid intel / adaptec is seen as separate drives, ie, Xen can't the see the on-board raid.

then an LSI pciexpress raid card pulled out from another server ....

boom... Xen can see the raid right away...

Thursday, December 16, 2010

create an another smtp connector in exchange 2003

http://www.servolutions.com/support/config_exchange_2003.htm

having problem sending to a certain domain
get the isp smtp server to relay
create a new smtp connector
put cost higher than the default *

Wednesday, December 15, 2010

impoort nk2 file into outlook 2010

versions 2003 / 2007 outlook cache is nk2 file, in outlook 2010 it sorta merged
outlook /importnk2 to merge previous versions of cache

Monday, December 13, 2010

Tomato

Tomato 

have I mentioned tomato firmware for linksys 54GL. 

http://www.polarcloud.com/tomato_128

I bought WRT54GL on purpose, in an adsl / broadband expensive coountry I need control traffic both ways so I can save some money, or not blow my budget.

hence tomato comes to rescue.





Sunday, December 12, 2010

phone system follow me feature

phone system follow me feature

that is the normal handset ring and then the paired mobile ring as well.

this is configured in the the pabx, like 501's mobile extersion is  1 021 xzxxxx.

press 1 to go out.

off course , pabx should have this capibility first, in this case, the vendor's pbx need extra license 9 (mony) to enable this feature.

Saturday, December 11, 2010

HP mini PCIexpress family network card

HP mini PCIexpress family network card - readltek ... oh dear ... its 10 / 100M

not gigbit

Sunday, December 5, 2010

isdn and pabx

yeah, I finally touched isdn in a commericial way. basic rate or 2 basic rate come in via traditional twisted pair, split off the wall as a bt socket. i talked to the electrician , he change to wall socket to cat5. from there a cable connect it to a NT1 box (of palm size), from the NT1 box , there are two cat 5 outgoing sockets in turn connected to the ISDN adatpor inside the pabx box.

phew .... there is no dial-tone in the isdn wall socket. --- yeah it is the case.

there is dial-tone with the adsl line

Thursday, December 2, 2010

aduc queries

in w2003 aduc you can show users disabled
and user inactive for 30 / 60 / 90 etc days

Wednesday, December 1, 2010

a HP warranty case gone ugly

Hi
I am not sure why the HP guy wanted to talk to you directly, I adamantly told them it is onsite warranty, they should come in to sort out whatever problem with the notebook.

Yes, we can sort out warranty claim. In this case I would take the notebook back to office, our office people to deal with HP.

I would say HP is doing things dirty by doping customer accepting their cost cutting efforts.

We will lodge a complaint to HP.

All business is subject to the Company's standard terms and conditions. A copy is available from our website.
-----Original Message-----

From: Ste
Sent: Wednesday, 1 December 2010 06:52 p.m.

To: MikeS

Subject: FW: Case No. 4623047405 : Customer Replaceable Part - shipment confirmed
Mike,
As per their email below, unfortunately HP support don't agree with you that this is a delivery and install part. They see it as a customer replaceable part.
I'm not sure why I was calling them. I would have thought that since  supplied the computer that you would also be authorized by them to sort out a warranty claim?
Anyway, we will need the new disk loaded up with whatever software  had, and if possible we may need to recover the data on the old one, but check with   first, there may be nothing of any value on it.
Cheers

CA

Financial Controller

-----Original Message-----

From: HPSupport_Global [mailto:wfm@g5u0677c.atlanta.hp.com]

Sent: Wednesday, 1 December 2010 5:45 p.m.

To: ste
Subject: Case No. 4623047405 : Customer Replaceable Part - shipment confirmed


Dear Mr/Ms

This email is to confirm that your customer replaceable part/s has been shipped to the below address:



Support request number: 4623047405

Your Reference:

Product description: HP Compaq 8510p Note

Serial number: CNU8012XXX


HP Part number: 455954-001

HP Part description: SPS-DRV HD 160G 7200 RPM

-----------



If you have any questions regarding this delivery or you have not received your part/s within 48hrs in metropolitan areas or 72 hours in regional areas please contact HP:



Australia: 13 10 47 option 8

New Zealand: 0800 449 553 option 8



Information and support on Customer Self Repair can be found at http://www.hp.com/go/selfrepair.



If you require additional technical assistance at any stage please contact HP Technical Support via phone numbers supplied above.



Please take all ESD (Electro-Static Discharge) safety precautions when performing any internal intervention on your HP product.



IMPORTANT NOTICE

When applicable, the spare part shipment contains detailed instructions on how to return the defective part. Please follow these instructions. By accepting this replacement part, you also accept to return the defective (at our expense) within 5 days. HP reserve the right to invoice you for the value of non returned items



Yours sincerely,

HP Services

__________________________________________________________________



This notification has been sent automatically. Replying to this e- mail therefore is not possible.



If you want to stop receiving notifications such as this, please notify us at:

mailto:HPsupport_reply@hp.com?subject=Ref.%20%3CCASE: 9700399282%3E



This is an e-mail message from Hewlett-Packard. The information contained in this communication is intended solely for use by the individual or entity to whom it is addressed. Use of this communication by others is prohibited. If the e-mail message was sent to you by mistake, please destroy it without reading, using, copying or disclosing its contents to any other person. We accept no liability for damage related to data and/or documents which are communicated by electronic mail.



© Hewlett-Packard Development Company, L.P.. All rights reserved. All product and company names referenced herein are trademarks of their respective owners. THIS COMMUNICATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. INFORMATION PROVIDED IN THIS COMMUNICATION IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED COMMUNICATION IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED

Monday, November 29, 2010

Early morning wake up call, no emails, mdaemon filled up c: drive

The c: drive was cleared a while ago. Maybe it's time to add Prtg as monitoring program get rid of IBM director,

Sunday, November 28, 2010

shadow protect and VSS

Examples of non-VSS applications include:


•Exchange 2000

•SQL 2000

•Domino Server

•Oracle

Please note: Microsoft Windows 2000 does not have a VSS framework whatsoever.

Friday, November 26, 2010

finally a easy one for the end of the week, dave' pdf can't be opened on terminal server

finally a easy one for the end of the week, pdf can't be opened on terminal server



well, login as Dave , found out pdf is assocaited with work, change back

Thursday, November 25, 2010

dreadful error excel 2007 "document not saved"

dreadful error excel 2007 "document not saved"

windows xp full patched with office 2007

NT4 fileserver ....

try to to save network ,,, got that dreaded error document not saved"


 
tried many things, no luck
 
on the positive side, a w98 PC fixed by pulling out network card and put it back again. this restored network connection.  interestinly prior to this w98 asked for nic driver , the owner is told if happens again, not worth to fix it.
 

Wednesday, November 24, 2010

iphone/ipad windows 2003 terminal server client

iphone/ipad windows 2003  terminal server client

RDP lite can only do the console session

IRdesktop can login a normal user




Publish Post

Tuesday, November 23, 2010

xen virtual server failed to restart , early morning emergency

xen virtual server failed to restart , early morning emergency

what;s the hell, those free xen hosts need a license installed every year.

now I got a 10 month valid xen license, on the machine with xen centre 5.5 installed, double click on the license, it will update the host license.

Monday, November 22, 2010

setup remote desktop to use local usb drive

setup remote desktop to use local usb drive

click local resources

click more

click drives I plug in later

Sunday, November 21, 2010

teamviewer for iphone

teamviwer hd is for ipad


this iphone version (free) is only a client

Friday, November 19, 2010

license windows 2008 terminal server

license windows 2008 terminal server

you can put w2008 r2 terminal server license onto w2008 version of terminal server

Thursday, November 11, 2010

upgrade memory for a dell poweredge R410

read the f-manual

un-do two screw on the size, slide out the rack-mount server, need squeeze the side bezels at some stage.

then un-do the lock on the top, and push open the chassis, add another 2*4 GB to make it 20GB.

Tuesday, November 9, 2010

outlook 2007 deleted items folder missing with exchange 2003

outlook 2007 deleted items folder missing with exchange 2003

tried to resetnavpanel , resetfolders ... no luck

find a tip to show the deleted items folder , in outlook today, manually type outlook:deleted items

then deleted items folder will show up, in tools I can click on recover deleted items

Monday, November 8, 2010

license terminal server 2008 in a SBS 2008 domain

license terminal server 2008 in a SBS 2008 domain

in this SBS 2008 domain PDC, I installed TS gateway service,

but to license the terminal server , I chose to install the license server on the terminal server itself.

with open license, choose the license mode I bought for this client in user mode, activate the license server, and put licenses in.

Saturday, November 6, 2010

分清NAS和SAN

http://www.net130.com/CMS/Pub/special/special_storage/2010_11_04_72065.htm

白NAS与SAN之间的传统区别:NAS设备工作在文件级,而SAN工作在块级。

Friday, November 5, 2010

taskmgr userinit.exe 0x00012d, insufficient resource to logon, default user profile

taskmgr 0x00012d
userinit.exe 0x00012d

sometimes symantec v9 (or 10?) reports an error about windows update exe file

the problem is the login error insufficient resource to logon, default user profile will load

scan for virus / spyware , no luck

scan disk, no luck.

its a HP desktop with 2*256 MB ram

eventually swap the memory moduels to another bank,

then the logon profile failure to load problem vanished.

when this problem happens, the safe mode is ok to load.

its a hardware mainboard / memory problem,  I will find out next week to see if that client comes back to me with the same dreaded problem

Thursday, November 4, 2010

MAXSMS maximizer sms

http://www.rapid.com.au/Brochures/MaxTEXT.htm

for some reason, the sms button disappeared from users' maximizer menu,

goto view .. tools ... add application ... broswe to program files ... maximize sms .. sms exe file

then an icon will appear on the menu

Wednesday, November 3, 2010

its actually Lenovo L512

its actually Lenovo L512 can't see more than 2.5GB in 32bit w-xp

Monday, November 1, 2010

Lenovo L510 is an disappointment

the notebook was down-graded to xp. with 4gb physical memory installed, it can only see 2.4~2.5GB.

Sunday, October 31, 2010

There is a problem with the date/time stamp in a linux application ….you can see from the screen shot below

There is a problem with the date/time stamp in a linux application ….you can see from the screen  shot below

here is the linux tech's solution

ntpd -q -g

Friday, October 29, 2010

jailbreak iphone 4

I am too tempted to do the jail-break ... sighv....

intunes just dont have enough apps .... free ones

Wednesday, October 27, 2010

iphone camera and flash light

hdr can't be on with the flash light?

HDR on the flash light will be off

Tuesday, October 26, 2010

wireless USb stick

wireless USb stick

now wireless internet providers all have the same model

vodafone
telstraclear
local telecom

all have ZTE model ????

oh dear any competitiors?

Monday, October 25, 2010

Monday, October 18, 2010

Create an iTunes App Store account without a credit card

http://support.apple.com/kb/ht2534

what a drama to do that way

n-able essential license and professional licenses

n-able essential license and professional licenses  ...

if no more essential nodes available , professional nodes will be used if available.

essential nodes are free gifts,

Friday, October 15, 2010

vcard in iphone4 ... nitemares from nokia

export contacts as vcard, import to outlook, then sync to iphone 4, but some cards wont work because phone numbers are as pics, iphone can;t read it... shark

sip crazy,

well the asterisk based pabx sucked all the dsl bandwidth  twice today.

the pbx guy blamed the home dlink dsl-504t, he said need a business one.

I did see that once with another customer.

Thursday, October 14, 2010

iphone 4 cannot get mail the connection to the server failed EXCHANGE 2010

http://alanhardisty.wordpress.com/2010/03/05/activesync-not-working-on-exchange-2010-when-inherit-permissions-not-set/

namely tick ‘Include Inheritable Permissions From This Object’s Parent’ is ticked in dsa.msc

but I still get "can't connect error" after the tick...

there are errors logged in the exchange server ... something about activesync permission (?)...

there is another thing I changed,  the username to the upn name in AD. it's like mike changed to mike@mybigstomach.com



then saddenly emails are showing up in my iphone 4 ios 4.1

Wednesday, October 13, 2010

zte usb dongle / stick /modem telstra Clear and Telecom

well this must be a hot sell, both mobile isp choose this model as their mobile device.

but they have different programs (mobile connect manager), its one or the other

http://www.nzconnections.net.nz/Telecom_Mobile_Broadband_settings

Dialer for Windows Mobile CDMA 1x or CDMA EV-DO




The zip download contains two files used to allow connecting a PC to the Internet through Telecom New Zealand's 3G enabled Windows Mobile Pocket PC CDMA 1x or CDMA EV-DO. The information was supplied by Telecom New Zealand. You can use either a USB cable or the cradle.



Installation:



Unzip the contents of the download from this page into a folder on your computer

Turn on Harrier Pocket PC (or your Pocket PC Phone Edition CDMA)

Start Harrier and run 'WModem', select USB, press 'start'

Plug in cable to Harrier and USB end to laptop (or sit the Harrier in its cradle and plug the USB end to laptop)

When Windows asks for a driver, point it at the directory where CDMA1X_USBMDM.INF is located



Running:

Turn on Harrier Pocket PC (or your Pocket PC Phone Edition CDMA)

Run 'WModem', select USB, press 'start'

Plug in cable to Harrier and USB end to laptop (or sit the Harrier in its cradle and plug the USB end to laptop)

On laptop run 'CDMA_USBModem_Dialer'

Enter the username/password

dial #777



For Telecom New Zealand username is mobile@jamamobile, password telecom.



For Verizon Wireless username is phonenumber@vzw3g.com, password vzw.



ActiveSync will work normally when WModem is not started.



Click the button below to download the file:

Tuesday, October 12, 2010

Monday, October 11, 2010

external terminal server connections dropping off

this happens most likely for a certain customer. namely their branch connecting from different ISPs. those offices of the same ISp work better

but their manager seems reckon its the terminal server problem

Sunday, October 10, 2010

route email via ISp's smtp server

sorbs-duhl list the good customer's exchange server 2003 IP as dynamic

so they can't send emails,

I called their ISP to change the PTR / reverse dns record to something meaningful.

at the same time, route their emails to the ISP smart host.

the smart host is configured on the administrative group's smtp connector,

it is not the smtp of the server

Saturday, October 9, 2010

security tab missing from a NTFS folder

Mary moved the folder away from one volume to another.

But she got an error not finishing the moving.

as a result, security tab missing from that NTFS folder.

I searched the internet, unlocker 1.8.6 claims that it can fix it by breaking some black hands holding onto the folder in question.

when I just about download it, the download site warned me this is a virus/trojan/malware.

oh, dear, I nearly got tricked.

start from beginning, use system internals process explorer, and handle
handle identified user admin is holding onto that folder. the process is explorer.
now the solution is to close explorer by logging off windows

Friday, October 8, 2010

failure to image w2003 server to a x226 server

shadow protect imaging a p4-1.6G ibm workstation, then restore the image to an IBM x226 server.

alas, not much luck ...

upon restart I see bluescreen, error 0x0000007b

Thursday, October 7, 2010

gparted to resize an ide windows 2003 74.5 gb hard drive

i downloaded gparted iso, burned to iso.

boot from cd, and re-sized to 65 GB. guess what, it took about 1 minute or even less.

prior to that I did scandisk , jkdefrag and moved lots of stuff out of the disk, only 26.7GB of data.

Wednesday, October 6, 2010

Resize image to fit onto a smaller disk

http://www.storagecraft.com/kb/questions.php?questionid=88
\
\
For example the original disk volume was 100GBytes with 60Gbytes of used space. You wish to restore the image to a disk volume that is only 80Gbytes, and the ShadowProtect image (*.spf) file is only 40Gbytes. Because the original disk volume is 100Gbytes you cannot restore it to 80Gbytes disk volume, even though there was only 60Gbytes of data on it.


At the time of this article, Shadow Protect cannot dynamically resize the image to enable restoration to the smaller volume. This feature is planned to be included in a future release.

I am so disappointed again,

here is what I got 74.5 GB IDE hdd, with 51GB data

I tried to restore to an IBM x226 server with 67.5GB adaptec raid 1, no luck.

it just wont let me create partition to restore to.





Solution:



Steps to shrink to the partition so it can be restored to a smaller drive.



1. Boot the latest Recovery CD into the Vista Based Recovery Environment (You do not need to restore using Vista, you simply need to use it to shrink the partition)



2. Mount the image you wish to restore as writable. (This is also called Exploring the Backup) You will find the Explore Backup option in the left hand menu under Tasks. To mount an image as writable uncheck the read only box.



3.Go to the Dismount Backup Image also under Tasks and dismount the volume, as you do so, you will see an option to shrink the volume. Select this box and the software will shrink the partition as much as possible.



A new incremental backup file will be created, this file with have the smaller partition information and can be restored to the smaller drive.



If restoring Windows XP or 2003 you will want to reboot your computer and boot into the Legacy Environment for restore. To restore simply select the newly created incremental file as the image you wish to restore.

Tuesday, October 5, 2010

Monday, October 4, 2010

run myob / commac h & s on windows 2003 terminal server

run myob / commac h & s on windows 2003 terminal server ...

I get this going a couple years ago.

now it stopped working because of new myob updates?

anyway I can run myob on the TS as administrator.

oddly, normal TS can't run it via a shortcut to the fileserver which a installation of MYOB seated.

gotta remember this: run the network.ex installation, well, for each TS user?

also the security warning, use file://servername/commacc.exe install of file://ip-address/commacc.exe

Sunday, October 3, 2010

local popular auction site got infected with virus or malware as they called it

local popular auction site got infected with virus or malware as they called it

so I started scan my hard drive again, this time I downloaded a german one, luke filewalker Avira AntiVir personal.

It detected some trojan others dont. like the chris-tv bundled something fishy

Saturday, October 2, 2010

load myob on local c: drive

load myob on local c: drive for the new GST

you dont have to load to a network drive

load it locally, then point to the data on the file server, then upgrade the data base

Friday, October 1, 2010

no emails for a business

I checked the internet records, then find out their ISP is doing something, their email can't be accessed. their website is down as well

Thursday, September 30, 2010

use your ISP's dns server

certtain ladies cannot access google maps this week, alas ... they are still using their original ISp's dns server as forwarder, change to their current ISP dns server, all fine.

lesson: isp may not have all good routes to maps.google.com

Wednesday, September 29, 2010

struggling with n-able endpoint security

struggling with n-able endpoint security

installed the probe on the PDc

the enable the end-point security, .... upon first start, apply personal settings ...

second restart ... pptp can connect, but cannot go anywhere

had to do the third start

Tuesday, September 28, 2010

Access web datasheet is attempting to retrieve data from a different domain...

http://partialclass.blogspot.com/2008/04/sharepoint-error-access-web-datasheet.html


importing excel contacts into contacts

Access web datasheet is attempting to retrieve data from a different domain...

answer: Alternate Access Mappings. You'll find this in SharePoint Central Administration, under Operations, and Global Configuration.


add the mapping

outlook cannot connect to email server, mdeamon, outlook connector, terminal server

outlook cannot connect to email server, mdeamon, outlook connector, terminal server

ah .. well, the sender appeared to try to send to a non-existing person in the local domain.

Monday, September 27, 2010

install dlink powerline kit

I pre-configure the two adaptors with passwords, no hassle.

I also used a power-spliter (with surge-protect) to connect those adaptors, it is fine, the speed is not good at one premise (18Mb), but it is otherwise steady, so far.

those kits definitely doesn't like power-stripe.

Sunday, September 26, 2010

how do I put annoucement in the wss 3.o web page

well, I put two annoucement web part in the same page, they are showing the same data input.

the answer is to create an another annoucement list.

http://social.technet.microsoft.com/forums/en-US/sharepointgeneral/thread/5a2859b0-abf0-40b3-a905-ff4043dcab49/

I quote here

a webpart us a mechanism to display data, while a list is like a small database - a mechanism to store data.

Friday, September 24, 2010

Wednesday, September 22, 2010

my adsl drama continues

an early morning phone call about the dsl dropping problem indicated there is a problem at ohter side

tried another router dlink dsl-504t

unplugged everything except the router, still get drops and out of sync in the logs

the ISP guy said they would talk to the whole saler.

Tuesday, September 21, 2010

replace a hard drive in an IBM x225 server

hot plug and play,

server raid manager showed the new drive is syncing

Monday, September 20, 2010

Dlink DSL out of sync

Dlink DSL out of sync
in sync

going in a circle

local isp guy said its the dsl filter, dsl router ...

he has confident about the dsl port at local exchange.

Sunday, September 19, 2010

http://www.easyduplicatefinder.com/

try to find duplicate files on your fileserver ?
yeah

or on your own PC for Free?

try

http://www.easyduplicatefinder.com/

Saturday, September 18, 2010

Friday, September 17, 2010

dlink dcs-5300

dlink dcs-5300

its still better than linksys

Thursday, September 16, 2010

911 trojan spyware , virus

911 trojan spyware , virus

while he got this funny virus trojan spyware during the 11/9/2010 visit to US.

hijackthis showed fcccdc.dll

sstsqn.dll
winawnc.dll
foobar2000
foobar200.org

awwusg.dll

a couple of hidden one

I have to boot from a shadow protect disc, start filemanager, manauly remove those suspicious dlls.

malwarebytes' anti-malware just wont start once got infected

Wednesday, September 15, 2010

Ricoh Aficio 1515 admin password

Ricoh Aficio 1515 admin password

the default admin password is password

autotask.net

the server is based in devenver, that i m told.

Monday, September 13, 2010

not enough resource, can't open any program in a windows xp pc

not enough resource, can't open any program in a windows xp pc

can't really do anything in nromal mode.

luckily, it can boot to safe mode, malware scan didn't show anything. disable all startup items, it can boot into normal mode now.

Sunday, September 12, 2010

move a pc to another domain, what will happen to the profiles

move a pc to another domain, what will happen to the profiles

the user profiles are all there

dont have to make a backup,

to be on the safe side

Saturday, September 11, 2010

publish services from sonicwall

create services first

put related services in a service group

then use the public server wizard to publish the services to the internet

note: the external wan ip is the wan ip of the sonicwall interface, this could be different from the real public ip

Friday, September 10, 2010

iphone 4 and exchange server

iphone 4 and exchange server

rubberneck, iphone 4 is using a type of new sim card smaller that the traditional one.

you have to call the phone company to patch the mobile phone number over to the new sim.

the new iphone 4 need itunes 9.2 to activate


itunes 10 is fine

Thursday, September 9, 2010

WINS in windows 2008 R2

winsmgmt.msc is a feature in windows 2008 and 2008 R2

after replacing windows 2003 PDC with 2008 R2, I heard they are complaining about their app running slow.

so I enable wins, and started computer browser serice in 2008 R2.

also point SQL server's wins settings to windows 2008 R2

things are lots faster now.

Wednesday, September 8, 2010

What’s the Microsoft Computer Browser Service?

think the year is 2010 not 1996?

http://www.petri.co.il/whats_the_microsoft_computer_browser_service.htm

well I got a problem where the w7 pc on a windows 2008 r2 PDC based domain can't see the network folder properly.

w-xp can see the PC lists, though. but the w2008r2 netowork folder listed those pcs on the network, then those entries just vanished. this happened to w7 as well.

how frustrating

.. double check on wins, then enanle computer browser service on the pdc ... seemed fine now

Computer Browser service is disabled on Windows Server 2008

Computer Browser service is disabled on Windows Server 2008

http://www.chicagotech.net/netforums/viewtopic.php?t=4940

Tuesday, September 7, 2010

n-able endpoint security and MYOB PAYROLL emailing slip

n-able endpoint security and MYOB PAYROLL emailing slip

emailing continue to fail. its not a smtp server problem.

remove the n-able anti-virus from the client pc, it all ok.

sleepless night

Monday, September 6, 2010

windows server 2008 backup

as we all know its images based

if you stick a usb drive and configure it for windows backup, it supposed to hide the drive letter.

Sunday, September 5, 2010

some AD FSMO stuff PDC, Schema master, RID master, infrastructure master, domain naming master

http://www.windowsnetworking.com/articles_tutorials/Managing-Active-Directory-FSMO-Roles.html

I just quote his good point here
Forest root domain - Schema Master and Domain Naming Master on the same machine, which should also host the Global Catalog.


Every domain - PDC Emulator and RID Master on the same machine, which should have beefy hardware to handle the load.

Every domain - Never place the Infrastructure Master on a machine that hosts the Global Catalog, unless your forest has only one domain or unless every domain controller in your forest hosts the Global Catalog.
 
now in my own word:
schema master and DNM are unique to the forest
PDC,RID and IM are on the domain level.
 
Global Catelague ... GC ... I always struggling with this one... this one seems more important than others. it is set in AD site services, so it is site based or location/subnet/physical based
 
 
 

DC=3DTapi3directory

http://www.wiredbox.net/forum2/Thread13149_DCPROMO_to_demote_problem_with_TAPI3Directory---.aspx

This DC holds the last replica of the following application directory =


partitions: DC=3DTapi3directory (then contains domain name and DC=3D =

local)"



Is it safe to continue/remove? Is Tapi3Directory important?

Saturday, September 4, 2010

remove AD from a windows 2003 server

make sure transfer 5 FSMO roles over, and make the new DC an GC

then run dcpromo

it will ask whether it's the last dc, and local password

then it will do the last replication

in my case i got a warning about ms tapi3 app partitition not on the other server, can't be transferred.

there is an error about netlog  problem about gc. tick off this server as gc to continue

the msg is gc is autheticate logins, or dear i thought dc can do that ...?

Friday, September 3, 2010

Thursday, September 2, 2010

NET USE J: \\servername\share /USER:domainname\username password

NET USE J: \\servername\share /USER:domainname\username password

add password to the net use network drive letter

Wednesday, September 1, 2010

adprep32 join a windows 2008 dc to a windows 2003 domain

add ad ds role to the windows 2008 r2

run dcpromo

need do adprep /forestprep first
and adprep /domainprep /gpprep

in windows 2008 R2 dvd support\tools

for 32 bit windows 2003 domain controller

adprep32 /forestprep
adprep32 /domainprep /gpprep

start dcpromo again
for some reason can't directly set to dns server
choice to dc is fine
 
then raise the forest fucntion level to 2003 from 2000
 
transfer FSMOs over
 
 
 
 

Tuesday, August 31, 2010

1 ring is 3 seconds

a telephone guys told me 1 ring is about 3 secs

so if a customer wants after 10 rings goes to voicemail, the it is about 30 seconds

Monday, August 30, 2010

new version of sbs 2008

the exchange server in this version will be in the cloud.

yeah I can see microsoft is cutting other guys jobs worldwide.

Sunday, August 29, 2010

toollbar in pbx

toollbar in pbx

quite interesting feature, even in open source

Saturday, August 28, 2010

sonicwall voip

yer

voice over adsl ... very interesting with 3 simultaneous lines via a ip pabx, yeah open source asteristic

basically follow sonciwall admin guide to setup voip on tz100. once sip link is up, you can see the sip status under sonicwall's voip section.

Thursday, August 26, 2010

VOIP SIP PORTS

OPEN SOURCE ASTERISC TRIBOX

SIP PORTS UDP AND TCP 5060

UDP 10000-20000    -  THIS IS WILD

Tuesday, August 24, 2010

windows fax and picture viewer - memory error printing

she said it started late yesterday.

delete the printer, reload it, the same problem,

the eventvwr showed there are errors like device cdrom,  device hard drive error.

Monday, August 23, 2010

voip the open source way, asterisc

sip trunk

polycom

thompson

grandstream

basic isdn 1 wire / 2 lines digital

primary isdn 1 wire / 30 lines digital

ata

Sunday, August 22, 2010

usb disc fat32 and ntfs

while copying some files, I am prompted that some some attribute wont be copied.

dear

convert G: /FS:NTFS

The type of the file system is FAT32.


Volume MKHOMEBK created 22/08/2010 10:55 a.m.

Volume Serial Number is 6800-159F

Windows is verifying files and folders...

File and folder verification is complete.

Windows has checked the file system and found no problems.



4,097,818,624 bytes total disk space.

315,392 bytes in 6 hidden files.

159,744 bytes in 37 folders.

138,629,120 bytes in 373 files.

3,958,702,080 bytes available on disk.



4,096 bytes in each allocation unit.

1,000,444 total allocation units on disk.

966,480 allocation units available on disk.



Determining disk space required for file system conversion...

Total disk space: 4009968 KB

Free space on volume: 3865920 KB

Space required for conversion: 26956 KB

Converting file system

Data error (cyclic redundancy check).
 
now copy the picture file again
 

Thursday, August 19, 2010

dump file reader in windows 7

http://windows7themes.net/how-to-open-dmp-files-in-windows-7.html

there seemed no simple dumpchk

download winsdk_web

then run it, and select tools in common

and install Debugging Tools for Windows (x86) if w7 is 32 bit

Open WinDBG

Wednesday, August 18, 2010

drama with a near new W7 pro HP pro 3000 MT PC

this is a new PC, ever since installed, it has problems. a couple of weeks ago, one memory module got replaced after memory errors logged in the eventvwr

but, in recent weeks, it started playing up again, freezing , slow network access, random reboot on bugcheck.

yeah, I should read those dump files. nothing in the action centre to suggest anything

first I thought it maybe some power settings problem, done some windows updates, some failed, then upgraded bios. upon restart, it wont boot into windows, it just kept restarting. tried to restore to yesterday, it failed citing a customer file corrupted. interesting as system restore suppose not to touch user data.

w7 builtin repair failed, error is badpatch, it can't recover.

w7 memory test indicated 1 of the 2 memory modules is faulty.

I called HP, telling him the serial # bumpmyhead. I asked the mainboard to be replaced. HP guy said 99% is memory, so he will send one memory module to the customer. what a disappointment as compared to be call useless cabling

I asked for two memory modules, no luck. yeah HP big boss is making big money, that's why.

so the PC still wont boot into windows 7 despite faulty memory pulled out.

shadow protect IT edition is used to take image of the stuffed w7.

there are 3 partitions, 1 - system 2- os 3- recovery, the 2nd one is the normal C: in windows

then the 2nd partition in the SP image was restored the PC, overwriting the C: drive.

the trick is dont tick active, MBR, do tick HIR install. hollyshit, the thing now boots into windows 7, yeah I can see the desktop now.

what a drama

Tuesday, August 17, 2010

command line to restart pop3 service in sbs 2003

net stop "Microsoft Exchange POP3"

net start "Microsoft Exchange POP3"

the name would be the name in the services.msc

Monday, August 16, 2010

MoneyWorks prints blank pages on HL-2040 Personal Laser Printer

after upgrading to XP Sp3, update HL2040 brother driver. well still print sometimes blank pages ... in MoneyWorks.exe

other prints are fine.... then MoneyWorks guys said their app, there is a compatibility problem with thast brother printer model...

HL-2040 Personal Laser Printer

Sunday, August 15, 2010

Saturday, August 14, 2010

branchcache

branchcache
a. On the desktop, double-click Server Manager.
b. The Server Manager window opens. Maximize the window.
c. In the console pane, right-click Features, and then click Add Features.
d. The Add Features Wizard dialog box appears. Select BranchCache, and then click Next.
e. Click Install.

The Administrator: Command Prompt window opens. Type netsh BranchCache set service mode=hostedserver and then press ENTER.

netsh http add sslcert ipport=0.0.0.0:443 certhash= appid={d673f5ee-a714-454d-8de2-492e4c1bd8f8}, and then press ENTER.

BranchCache GPO, and then click Edit.
ll. The Group Policy Management Editor window opens. Maximize the window.
mm. In the console pane, under Computer Configuration, expand Policies | Administrative Templates | Network, and then click BranchCache.
nn. In the details pane, double-click Turn on BranchCache.
oo. The Turn on BranchCache window opens. Maximize the window.
pp. Click Enabled, and then click OK. Note: We’ll look at configuring and using Distributed Cache mode next, but here we’ll enable Hosted Cache mode, and then enter the fully qualified domain name of the server where the content will be cached.
qq. In the details pane, double-click Set BranchCache Hosted Cache mode.
rr. The Set BranchCache Hosted Cache mode window opens. Click Enabled.
ss. In the Enter the location of the hosted cache field, type sea-dc-01.corp.contoso.com, and then click OK. Note: Next, we’ll open some firewall ports on domain computers so that BranchCache content can be moved between clients and servers. Windows Firewall in Windows Server 2008 R2 and Windows 7 includes predefined BranchCache rule groups that you can use to open the ports needed by BranchCache. We will configure two settings right now. The first will be an inbound rule that allows HTTP traffic on port 80.
tt. In the console pane, expand Windows Settings | Security Settings | Windows Firewall with Advanced Security | Windows Firewall with Advanced Security, and then click Inbound Rules.
uu. Right-click Inbound Rules, and then click New Rule.
vv. The New Inbound Rule Wizard dialog box appears. Click Predefined.
ww. In the Predefined list, click BranchCache – Content Retrieval (Uses HTTP), and then click Next twice.
xx. Click Finish. Note: The second will allow HTTPS traffic on port 443, which is used to send the encrypted cached content between client and server.
yy. Right-click Inbound Rules, and then click New Rule.
zz. The New Inbound Rule Wizard dialog box appears. Click Predefined.
aaa. In the Predefined list, click BranchCache – Hosted Cache Server (Uses HTTPS), and then click Next twice.
bbb. Click Finish. Note: Next we’ll configure the same rules for outbound traffic. And that’s all we need to do on the server end.
ccc. In the console pane, click Outbound Rules.
ddd. Right-click Outbound Rules, and then click New Rule.
eee. The New Outbound Rule Wizard dialog box appears. Click Predefined.
fff. In the Predefined list, click BranchCache – Content Retrieval (Uses HTTP), and

then click Next twice.
ggg. Click Allow the connection, and then click Finish.
hhh. Right-click Outbound Rules, and then click New Rule.
iii. The New Outbound Rule Wizard dialog box appears. Click Predefined.
jjj. In the Predefined list, click BranchCache – Hosted Cache Server (Uses HTTPS), and then click Next twice.
kkk. Click Allow the connection, and then click Finish.
lll. Close the Group Policy Management Editor window.
mmm. Minimize the Group Policy Management window. Note: We’ll now update the Group Policy settings on this server. The settings will be applied automatically at the next refresh interval, but we want to make sure that they take effect immediately.
nnn. Restore the Command Prompt window.
ooo. Type gpupdate /force, and then press ENTER. Note: The netsh BranchCache show status all command enables us to verify that everything is configured correctly on the server. The things we want to look for are: the Hosted Cache location, sea-dc-01.corp.contoso.com; the active current cache size (currently 0 bytes); and whether the necessary firewall rules are in effect. Everything looks good, so let’s move to the client computers and try it out.
ppp. When the process completes, type netsh BranchCache show status all, and then press ENTER.
qqq. Scroll through the results as you discuss them.
rrr. Minimize the Command Prompt window.

Friday, August 13, 2010

a user cannot open internet explorer

how does your customer know you take one day off ...

while he called twice about being not able to open ie.

in the event log, there is an entry about avg dll

so remove avg, and install ms security essentials, all good

Thursday, August 12, 2010

Wednesday, August 11, 2010

how do I view email headers in outlook 2010

http://benosullivan.co.uk/windows/how-to-view-email-headers-in-outlook-2010/

open the email ... file ... info ... properties

Tuesday, August 10, 2010

http://www.virtualizationpractice.com/blog/?p=6422

MED-V is part of Microsoft’s Desktop Optimization Pack (MDOP). Bear in mind, MDOP is only available as a subscription for Software Assurance customers.

The MDOP suite has six components:

•Microsoft Enterprise Desktop Virtualization (MED-V) building on the engine that enables Windows Virtual PC, MED-V provides for deployment and management of virtual PC images which even Microsoft state is to primarily resolving application compatibility with a new version of Windows. If you’re considering migrating from Windows to another OS – MED-V is not an option.
•Microsoft Application Virtualization (App-V) turns most applications into centrally managed services that are never installed, never conflict, and are streamed on demand to end users: but not all applications, App-V is not a solution to deploy IE6 and IE7 for example.
•Microsoft Advanced Group Policy Management (AGPM) enhances governance and control over Group Policy through robust change management, versioning, and role-based administration: arguably functions that should not be an “add-on” but should be core to the service.
•Microsoft Asset Inventory Service (AIS) is a hosted service that collects software inventory data and translates it into actionable business intelligence; or ‘we’ll tell you what it is that you’ve got’ – although in all fairness – this is often a revelation.
•Microsoft Diagnostics and Recovery Toolset (DaRT) which is marketed as “reducing downtime by accelerating troubleshooting, repair, and data recovery of unbootable Windows-based desktops” but in all fairness – are you going to use this tool often? Will you regularly spend time troubleshooting a standardised build to a standardised desktop?
•Microsoft System Center Desktop Error Monitoring (DEM) provides insights into application and operating system failures, allowing helpdesk to be more proactive in managing PC problems, without installing an agent to the endpoint. It monitors failures and can help identify their causes and their resolutions. If you deploy DEM early, you can compare metrics before and after a rollout. This comparison can give you invaluable insight in to the impact of deployment: has the update made your environment, more or less, stable?

ato certificate for login

http://www.ato.gov.au/

this is a client cert as well, contains user password

Monday, August 9, 2010

in mdaemon copy certain emails to another user

in content filter , in the rules ...

from header like bp

copy to mike @ mydoomer.com

Sunday, August 8, 2010

Microsoft Application Virtualization (APP-V)

Application Virtualization enables IT Professionals to deploy software applications that are never installed locally to minimize regression-testing time. This also allows applications to follow users to any PC, on demand. It turns Windows applications into centrally managed services that are delivered instantly to any desktop or laptop client.

MED-V and Virtual PC

Application compatibility is one of the main reasons that enterprises cite for the inability to upgrade to the latest version of Windows. They may have an important Line of Business application that must run in Windows XP, for example, or a critical intranet site that was built to run in Internet Explorer 6. MED-V takes application compatibility off the table as a blocker because it allows enterprise customers to run legacy applications seamlessly directly from a Windows 7 desktop. This allows end users to retain the productivity benefits of a modern operating system yet still enables them to use their legacy applications.
Customers often ask about the difference between MED-V and Virtual PC. Although Virtual PC provides many of the same features to end-users, MED-V gives IT Professionals the ability to centrally manage the virtual machines. This manageability is what makes MED-V a better choice for enterprise customers.

CCNP902

Chapter 1 Routing Services 1

Complex Enterprise Network Frameworks, Architectures, and Models 1

  Traffic Conditions in a Converged Network 1

Cisco IIN and SONA Framework 3

Cisco IIN 3

Cisco SONA Framework 4

Cisco Network Models 6

Cisco Enterprise Architecture 6

Cisco Hierarchical Network Model 8

Cisco Enterprise Composite Network Model 9

Creating, Documenting, and Executing an Implementation Plan 13

Approaches to Creating an Implementation Plan 14

Creating an Implementation Plan 15

Implementation Plan Documentation 17

Implementation Plan Example 18

Example Network Scenario 18

Example Network Requirements 18

Example Network Implementation Plan 19

Reviewing IP Routing Principles 21

IP Routing Overview 22

Principles of Static Routing 22

Principles of Dynamic Routing 26

Principles of On-Demand Routing 28

Characteristics of Routing Protocols 30

Distance Vector, Link-State, and Advanced Distance Vector

Routing Protocols 30

Classful Routing Protocol Concepts 31

Classless Routing Protocol Concepts 35

RIPv2 and EIGRP Automatic Network-Boundary Summarization 35

RIP 38

Characteristics of RIPv1 38

Characteristics of RIPv2 38

RIP Configuration Commands 39

Populating the Routing Table 41

Administrative Distance 41

Routing Protocol Metrics 43

Criteria for Inserting Routes into the IP Routing Table 45

Floating Static Routes 45

IP Routing Protocol Comparisons 46

Routing and Routing Protocols Within the Enterprise Composite

Network Model 48

Summary 49

Review Questions 51

Chapter 2 Configuring the Enhanced Interior Gateway Routing Protocol 57

Understanding EIGRP Terminology and Operation 58

EIGRP Capabilities and Attributes 58

EIGRP Terminology 61

EIGRP Operation 63

Populating EIGRP Tables 63

EIGRP Packets 65

EIGRP Neighbors 67

Initial Route Discovery 69

DUAL 71

Advertised Distance and Feasible Distance 71

Successor and Feasible Successor 72

DUAL Example 75

EIGRP Metric Calculation 80

Planning EIGRP Routing Implementations 83

Configuring and Verifying EIGRP 84

Planning and Configuring Basic EIGRP 85

Planning for Basic EIGRP 85

Basic EIGRP Configuration 86

Basic Configuration Example 88

Another Basic EIGRP Configuration Example 89

Verifying EIGRP Operation 90

Verifying EIGRP Neighbors 93

Verifying EIGRP Routes 94

Verifying EIGRP Operations 96

Using the passive-interface Command with EIGRP 104

Propagating an EIGRP Default Route 107

EIGRP Route Summarization 109

Configuring Manual Route Summarization 110

Verifying Manual Route Summarization 112

Configuring and Verifying EIGRP in an Enterprise WAN 113

EIGRP over Frame Relay and on a Physical Interface 113

Frame Relay Overview 113

EIGRP on a Physical Frame Relay Interface with

Dynamic Mapping 114

EIGRP on a Frame Relay Physical Interface with Static Mapping 116

EIGRP over Frame Relay Multipoint Subinterfaces 118

Frame Relay Multipoint Subinterfaces 118

EIGRP over Multipoint Subinterfaces 119

EIGRP Unicast Neighbors 121

EIGRP over Frame Relay Point-to-Point Subinterfaces 123

Frame Relay Point-to-Point Subinterfaces 123

EIGRP on Frame Relay Point-to-Point Subinterfaces 123

EIGRP over MPLS 125

MPLS 125

MPLS Operation 126

Service Provider Offerings 127

Layer 2 and Layer 3 MPLS VPN Solutions 128

Layer 3 MPLS VPNs 128

Layer 2 MPLS VPNs 132

EIGRP Load Balancing 134

EIGRP Equal-Cost Load Balancing 134

EIGRP Unequal-Cost Load Balancing 136

EIGRP Bandwidth Use Across WAN Links 139

EIGRP Link Utilization 139

Examples of EIGRP on WANs 140

Configuring and Verifying EIGRP Authentication 144

Router Authentication 144

Simple Authentication Versus MD5 Authentication 144

MD5 Authentication for EIGRP 146

Planning for EIGRP Authentication 147

Configuring EIGRP MD5 Authentication 147

MD5 Authentication Configuration Example 148

Verifying MD5 Authentication for EIGRP 152

EIGRP MD5 Authentication Verification 153

Troubleshooting MD5 Authentication 154

Optimizing EIGRP Implementations 156

EIGRP Scalability in Large Networks 156

EIGRP Queries and Stuck-in-Active 158

Stuck-in-Active Connections in EIGRP 158

Preventing SIA Connections 160

EIGRP Query Range 161

Limiting the EIGRP Query Range 164

Graceful Shutdown 173

Summary 174

References 179

Review Questions 179

Chapter 3 Configuring the Open Shortest Path First Protocol 185

Understanding OSPF Terminology and Operation 186

Link-State Routing Protocols 186

OSPF Area Structure 188

OSPF Areas 191

Area Terminology 192

OSPF Adjacencies 193

OSPF Metric Calculation 195

Link-State Data Structures 196

OSPF Packets 197

Establishing OSPF Neighbor Adjacencies: Hello 199

Exchange Process and OSPF Neighbor Adjacency States 201

OSPF Neighbor States 204

Maintaining Routing Information 205

OSPF Link-State Sequence Numbers 207

Verifying Packet Flow 208

Configuring and Verifying Basic OSPF Routing 209

Planning and Configuring OSPF 209

Planning OSPF Routing Implementations 209

Configuring Basic OSPF 211

Single-Area OSPF Configuration Example 212

Multiarea OSPF Configuration Example 213

OSPF Router ID 214

Loopback Interfaces 215

OSPF router-id Command 215

Verifying the OSPF Router ID 216

Verifying OSPF Operations 217

The show ip ospf interface Command 218

The show ip ospf neighbor Command 219

The show ip route ospf Command 221

The show ip protocols Command 221

The debug ip ospf events Command 222

Understanding OSPF Network Types 222

Types of OSPF Networks 222

Electing a DR and BDR and Setting Priority 223

Adjacency Behavior for a Point-to-Point Link 224

Adjacency Behavior for a Broadcast Network 224

Adjacency Behavior over a Layer 2 MPLS VPN 225

Adjacency Behavior over a Layer 3 MPLS VPN 226

Adjacency Behavior for an NBMA Network 227

DR Election in an NBMA Topology 228

OSPF over Frame Relay Topology Options 228

OSPF over NBMA Topology Modes of Operation 229

Selecting the OSPF Network Type for NBMA Networks 229

OSPF Configuration in Cisco Broadcast Mode 231

OSPF Nonbroadcast Mode Configuration 231

OSPF Configuration in Point-to-Multipoint Mode 233

OSPF Configuration in Cisco Point-to-Multipoint

Nonbroadcast Mode 236

Using Subinterfaces in OSPF over Frame Relay Configuration 236

OSPF Configuration in Cisco Point-to-Point Mode 239

OSPF over NBMA Modes of Operation Summary 240

Displaying OSPF Adjacency Activity 241

Understanding OSPF LSAs 244

LSA Type 1: Router LSA 246

LSA Type 2: Network LSA 247

LSA Type 3: Summary LSA 247

LSA Type 4: Summary LSA 248

LSA Type 5: External LSA 249

Example OSPF LSAs in a Network 250

Interpreting the OSPF LSDB and Routing Table 250

OSPF LSDB 250

OSPF Routing Table and Types of Routes 254

Calculating the Costs of E1 and E2 Routes 255

Configuring OSPF LSDB Overload Protection 256

Configuring and Verifying Advanced OSPF Features 258

Using the passive-interface Command with OSPF 258

Propagating an OSPF Default Route 260

Configuring OSPF Route Summarization 263

Configuring Inter-area OSPF Route Summarization on an ABR 265

Interarea Route Summarization Configuration Example

on an ABR 266

Configuring External OSPF Route Summarization on an ASBR 267

External Route Summarization Configuration Example

on an ASBR 268

OSPF Virtual Links 269

Configuring OSPF Virtual Links 270

Verifying OSPF Virtual Link Operation 272

OSPF LSDB for Virtual Links 275

Changing the Cost Metric 278

Configuring OSPF Special Area Types 279

Configuring Stub Areas 281

Configuring Totally Stubby Areas 284

Interpreting Routing Tables in Different Types of OSPF Areas 286

Configuring NSSAs 289

Configuring Totally Stubby NSSAs 294

Example OSPF Area Types in a Network 295

Verifying All Area Types 296

Configuring and Verifying OSPF Authentication 297

Planning for OSPF Authentication 297

Configuring, Verifying, and Troubleshooting OSPF Simple Password

Authentication 297

Configuring OSPF Simple Password Authentication 297

Simple Password Authentication Example 299

Verifying Simple Password Authentication 300

Troubleshooting Simple Password Authentication 301

Configuring OSPF Simple Password Authentication for Virtual Links 304

Configuring, Verifying, and Troubleshooting MD5 Authentication 305

Configuring OSPF MD5 Authentication 305

MD5 Authentication Example 307

Verifying MD5 Authentication 308

Troubleshooting MD5 Authentication 309

Summary 311

References 314

Review Questions 315

Chapter 4 Manipulating Routing Updates 325

Assessing Network Routing Performance Issues 326

Routing Protocol Performance Issues 326

Routing Protocol Performance Solutions 327

Using Multiple IP Routing Protocols on a Network 329

Understanding a Network with Complex Routing 329

Understanding Route Redistribution 330

Redistribution Overview 330

Redistributed Routes 332

Redistribution Implementation Considerations 334

Selecting the Best Route in a Redistribution Environment 335

Redistribution Techniques 338

One-Point Redistribution 339

Multipoint Redistribution 340

Preventing Routing Loops in a Redistribution Environment 342

Implementing Route Redistribution 344

Configuring Route Redistribution 344

Redistributing into RIP 346

Redistributing into OSPF 347

Redistributing into EIGRP 350

The default-metric Command 352

The passive-interface Command 353

Route Redistribution Example 355

Using Administrative Distance to Influence

the Route-Selection Process 358

Selecting Routes with Administrative Distance 358

Modifying Administrative Distance 361

Redistribution Using Administrative Distance Example 363

Verifying Redistribution Operation 369

Controlling Routing Update Traffic 370

Static and Default Routes 371

Using Route Maps 373

Route Map Applications 373

Understanding Route Maps 374

Configuring Route Maps to Control Routing Updates 376

Configuring Route Maps for Policy Based Routing 377

Configuring Route Redistribution Using Route Maps 379

Using Route Maps with Redistribution 380

Using Route Maps to Avoid Route Feedback 381

Using Route Maps with Tags 382

Using Route Maps with Redistribution and Tags 382

Using Distribute Lists 384

Configuring Distribute Lists to Control Routing Updates 386

Controlling Redistribution with Distribute Lists 389

Using Prefix Lists 390

Prefix List Characteristics 390

Filtering with Prefix Lists 391

Configuring Prefix Lists 391

Verifying Prefix Lists 397

Using Multiple Methods to Control Routing Updates 398

Comprehensive Example of Controlling Routing Updates 398

Summary 412

References 415

Review Questions 416

Chapter 5 Implementing Path Control 419

Understanding Path Control 419

Assessing Path Control Network Performance 419

Path Control Tools 421

Implementing Path Control Using Offset Lists 424

Using Offset Lists to Control Path Selection 424

Configuring Path Control Using Offset Lists 424

Verifying Path Control Using Offset Lists 426

Implementing Path Control Using Cisco IOS IP SLAs 426

Using Cisco IOS IP SLAs to Control Path Selection 427

Cisco IOS IP SLAs Operation 429

Cisco IOS IP SLAs Sources and Responders 429

Cisco IOS IP SLAs Operations 430

Cisco IOS IP SLAs Operation with Responders 430

Cisco IOS IP SLAs with Responder Time Stamps 432

Configuring Path Control Using IOS IP SLAs 432

Configuring Cisco IOS IP SLAs Operations 433

Configuring Cisco IOS IP SLAs Tracking Objects 436

Configuring the Action Associated with the Tracking Object 436

Verifying Path Control Using IOS IP SLAs 437

Examples of Path Control Using Cisco IOS IP SLAs 438

Tracking Reachability to Two ISPs 438

Tracking DNS Server Reachability in the Two ISPs 440

Implementing Path Control Using Policy-Based Routing 446

Using PBR to Control Path Selection 447

Configuring PBR 448

PBR match Commands 448

PBR set Commands 449

Configuring PBR on an Interface 452

Verifying PBR 454

PBR Examples 454

Using PBR When Connecting Two ISPs 454

Using PBR Based on Source Address 457

Alternative Solution IP SLAs Configuration Example Using PBR 459

Advanced Path Control Tools 460

Cisco IOS Optimized Edge Routing 460

Virtualization 461

Cisco Wide Area Application Services 462

Summary 463

References 467

Review Questions 467

Chapter 6 Implementing a Border Gateway Protocol Solution for ISP Connectivity 471

BGP Terminology, Concepts, and Operation 471

Autonomous Systems 471

BGP Use Between Autonomous Systems 474

Comparison with Other Scalable Routing Protocols 475

Connecting Enterprise Networks to an ISP 477

Public IP Address Space 478

Connection Link Type and Routing 478

Connection Redundancy 482

Using BGP in an Enterprise Network 485

BGP Multihoming Options 486

Multihoming with Default Routes from All Providers 487

Multihoming with Default Routes and Partial Table from All Providers 488

Multihoming with Full Routes from All Providers 491

BGP Path Vector Characteristics 492

When to Use BGP 494

When Not to Use BGP 495

BGP Characteristics 495

BGP Neighbor Relationships 497

External BGP Neighbors 497

Internal BGP Neighbors 498

IBGP on All Routers in a Transit Path 500

IBGP in a Transit Autonomous System 500

IBGP in a Nontransit Autonomous System 501

BGP Partial-Mesh and Full-Mesh Examples 501

TCP and Full Mesh 502

Routing Issues If BGP Not on in All Routers in a Transit Path 503

BGP Synchronization 504

BGP Tables 506

BGP Message Types 508

Open and Keepalive Messages 508

Update Messages 509

Notification Messages 509

BGP Attributes 510

Well-Known Attributes 511

Optional Attributes 511

Defined BGP Attributes 512

The AS-Path Attribute 513

The Next-Hop Attribute 514

The Origin Attribute 517

The Local Preference Attribute 518

The Community Attribute 519

The MED Attribute 519

The Weight Attribute (Cisco Only) 520

The Route-Selection Decision Process 521

BGP Route-Selection Process 522

The Path-Selection Decision Process with a Multihomed

Connection 525

Configuring BGP 526

Planning BGP Implementations 527

Peer Groups 527

Entering BGP Configuration Mode 529

Defining BGP Neighbors and Activating BGP Sessions 529

Shutting Down a BGP Neighbor 531

Defining the Source IP Address 531

EBGP Multihop 534

Changing the Next-Hop Attribute 536

Defining the Networks That BGP Advertises 538

BGP Neighbor Authentication 540

Configuring BGP Synchronization 542

Resetting BGP Sessions 542

Hard Reset of BGP Sessions 543

Soft Reset of BGP Sessions Outbound 544

Soft Reset of BGP Sessions Inbound 544

BGP Configuration Examples 546

Basic BGP Examples 546

Peer Group Example 547

IBGP and EBGP Examples 549

Verifying and Troubleshooting BGP 552

show ip bgp Command Output Example 552

show ip bgp rib-failure Command Output Example 554

show ip bgp summary Command Output Example 554

debug ip bgp updates Command Output Example 556

Understanding and Troubleshooting BGP Neighbor States 557

Idle State Troubleshooting 558

Active State Troubleshooting 558

Established State 559

Basic BGP Path Manipulation Using Route Maps 559

BGP Path Manipulation 560

Changing the Weight 562

Changing the Weight for All Updates from a Neighbor 562

Changing the Weight Using Route Maps 562

Setting Local Preference 564

Changing Local Preference for All Routes 564

Local Preference Example 565

Changing Local Preference Using Route Maps 567

Setting the AS-Path 568

Setting the MED 570

Changing the MED for All Routes 571

Changing the MED Using Route Maps 572

Implementing BGP in an Enterprise Network 575

Filtering BGP Routing Updates 576

BGP Filtering Using Prefix Lists 578

Planning BGP Filtering Using Prefix Lists 578

BGP Filtering Using Prefix Lists Example 578

BGP Filtering Using Route Maps 580

Planning BGP Filtering Using Route Maps 580

BGP Filtering with Route Maps Example 580

Summary 582

References 587

Review Questions 587

Chapter 7 Implementing Routing Facilities for Branch Offices and Mobile Workers 591

Planning the Branch Office Implementation 591

Branch Office Design 591

Upgrade Scenario 595

Implementation Plan 596

Deploying Broadband Connectivity 597

Satellite Broadband Information 598

Cable Background Information 601

DSL Background Information 603

PPPoA 606

Configuring Static Routing 609

Routing to the Internet 611

Floating Static Route 615

Verifying Branch Services 618

Configuring NAT 619

Verifying NAT 623

Verifying Other Services 629

Verifying and Tuning IPsec VPNs 631

IPsec Technologies 632

Encapsulation Process 633

IPsec Site-to-Site VPN Configuration 635

ISAKMP Policy 636

IPsec Details 637

VPN Tunnel Information 637

VPN ACL 638

Apply the Crypto Map 638

Verifying an IPsec VPN 639

Impact on Routing 647

Configuring GRE Tunnels 647

Generic Routing Encapsulation 649

Configuring GRE 650

Example of GRE Configuration 652

Planning for Mobile Worker Implementations 661

Connecting a Mobile Worker 661

Components for Mobile Workers 662

Business-Ready Mobile Worker and VPN Options 663

Routing Traffic to the Mobile Worker 664

VPN Headend Configuration 665

Allowing IPsec Traffic 666

Defining Address Pools 670

Providing Routing Services for VPN Subnets 672

Tuning NAT for VPN Traffic Flows 675

Verifying IPsec VPN Configuration 677

Reviewing Alternatives for Mobile Worker Connectivity 683

Summary 685

References 688

Review Questions 688

Chapter 8 Implementing IPv6 in an Enterprise Network 691

Introducing IPv6 691

IPv4 Issues 692

Features of IPv6 693

IPv6 Packet Header 695

Extension Headers 696

MTU Discovery 698

IPv6 Addressing 698

IPv6 Addressing in an Enterprise Network 698

IPv6 Address Representation 700

Interface Identifiers in IPv6 Addresses 701

IPv6 Address Types 704

IPv6 Global Unicast Addresses 705

IPv6 Link-Local Unicast Addresses 707

IPv6 Site-Local Unicast Addresses: Deprecated 708

IPv6 Multicast Addresses 708

Solicited-Node Multicast Addresses 710

IPv6 Anycast Addresses 711

Comparing IPv6 Addresses with IPv4 Addresses 712

Configuring and Verifying IPv6 Unicast Addresses 716

IPv6 Unicast Address Configuration and Verification Commands 717

Static IPv6 Address Assignment 719

Static Global Aggregatable Address Assignment 719

Assigning Multiple Global Aggregatable Addresses 721

IPv6 Unnumbered Interfaces 723

Static Link-Local Address Assignment 723

Stateless Autoconfiguration of IPv6 Addresses 724

Unicast Connectivity on Different Connection Types 733

Unicast Connectivity on Broadcast Multiaccess Links 733

Unicast Connectivity on Point-to-Point Links 738

Unicast Connectivity on Point-to-Multipoint Links 742

Routing IPv6 Traffic 746

IPv6 Routing Protocols 747

Static Routing 747

Static Route Configuration and Verification Commands 747

Static Route Configuration and Verification Example 750

RIPng 751

RIPng Configuration and Verification Commands 752

RIPng Configuration and Verification Example 752

OSPFv3 759

Similarities Between OSPFv2 and OSPFv3 760

Differences Between OSPFv2 and OSPFv3 761

OSPFv3 Configuration and Verification Commands 763

OSPFv3 Configuration and Verification Examples 767

EIGRP for IPv6 773

EIGRP for IPv6 Configuration and Verification Commands 773

EIGRP for IPv6 Configuration and Verification Example 774

MBGP 782

MBGP Configuration and Verification Commands 783

MBGP Configuration and Verification Example 784

IPv6 Policy-Based Routing 785

IPv6 PBR Configuration and Verification Commands 785

IPv6 PBR Configuration and Verification Example 788

IPv6 Redistribution 791

RIPng Redistribution 791

RIPng and OSPFv3 Redistribution 799

RIPng, OSPFv3, and MBGP Redistribution 814

Transitioning IPv4 to IPv6 824

Dual Stack 826

Tunneling 828

Translation 829

Tunneling IPv6 Traffic 830

Manual IPv6 Tunnels 830

Manual IPv6 Tunnel Configuration and Verification Commands 831

Manual IPv6 Tunnel Configuration and Verification Example 832

GRE IPv6 Tunnels 838

GRE IPv6 Tunnel Configuration and Verification Commands 839

GRE IPv6 Tunnel Configuration and Verification Examples 839

6to4 Tunnels 846

6to4 Tunnel Configuration and Verification Commands 848

6to4 Tunnel Configuration and Verification Example 848

IPv4-Compatible IPv6 Tunnels 854

IPv4-Compatible IPv6 Tunnel Configuration and Verification Commands 854

IPv4-Compatible IPv6 Tunnel Configuration and Verification Example 854

ISATAP Tunnels 857

ISATAP Tunnel Configuration and Verification Commands 859

ISATAP Tunnel Configuration and Verification Example 859

Translation Using NAT-PT 864

Static NAT-PT for IPv6 865

Static NAT-PT Operation 865

Static NAT-PT Configuration and Verification Commands 866

Static NAT-PT Configuration and Verification Example 867

Dynamic NAT-PT for IPv6 871

Dynamic NAT-PT Configuration and Verification Commands 872

Dynamic NAT-PT Configuration and Verification Examples 873

Summary 885

References 897

Review Questions 897

Appendix A Answers to Review Questions 901

Online Supplemental Material:

Appendix B IPv4 Supplement

Appendix C BGP Supplement

Acronyms and Abbreviations

TOC, 9781587058820, 5/25/10