- Start Outlook 2007
- Under the Tools menu, select Options
- On the Preferences tab, under E-mail, click Junk E-mail
- Select "No Automatic Filtering"
- Click on "Blocked Senders" and remove any blocked senders from the list
- Click Apply
- Click OK
Tuesday, December 21, 2010
How do I turn off Junk Mail filtering in Outlook 2007?
http://kb.mit.edu/confluence/pages/viewpage.action?pageId=4271629
Monday, December 20, 2010
sql 2008 r2 service accounts
sql 2008 r2 service accounts
http://msdn.microsoft.com/en-us/library/ms143504.aspx#Use_startup_accounts
http://msdn.microsoft.com/en-us/library/ms143504.aspx#Use_startup_accounts
Sunday, December 19, 2010
what's the difference betweet sql 2008 and sql 2008 r2
http://www.microsoft.com/sqlserver/2008/en/us/editions.aspx
http://social.msdn.microsoft.com/Forums/en-US/sqlsetupandupgrade/thread/0be511b2-0c21-4206-90ee-8ce214285a3a/
http://msdn.microsoft.com/en-us/library/bb500435%28SQL.105%29.aspx
http://blogs.techrepublic.com.com/datacenter/?p=2715
http://social.msdn.microsoft.com/Forums/en-US/sqlsetupandupgrade/thread/0be511b2-0c21-4206-90ee-8ce214285a3a/
http://msdn.microsoft.com/en-us/library/bb500435%28SQL.105%29.aspx
http://blogs.techrepublic.com.com/datacenter/?p=2715
- PowerPivot for SharePoint
- PowerPivot for SharePoint adds shared services and infrastructure for loading, querying, and managing PowerPivot workbooks that you publish to a SharePoint 2010 server or farm. To create PowerPivot workbooks, you use PowerPivot for Excel.
- PowerPivot for Excel
- PowerPivot for Excel is an add-in to Excel 2010 that can be downloaded from the web and installed on client workstations. You use PowerPivot for Excel to assemble and create relationships in large amounts of data from different sources, and then use that data as the basis for PivotTables and other data visualization objects that support data analysis in Excel.
- Multi-Server Administration and Data-Tier Application
- The SQL Server Utility forms a central repository for performance data and management policies that tailor the operation of instances of the Database Engine that have been enrolled in the utility. It also includes a Utility Explorer for centralized management, and dashboards that report the state of the managed instances. A data-tier application (DAC) forms a single unit for developing, deploying, and managing the database objects used by an application.
- Master Data Services
- Master Data Services is comprised of a database, configuration tool, Web application, and Web service that you use to manage your organization's master data and maintain an auditable record of that data as it changes over time. You use models and hierarchies to group and organize data to prepare it for further use in business intelligence and reporting tools, data warehouses, and other operational systems. Master Data Services integrates with source systems and incorporates business rules to become the single source of master data across your organization.
- Features Supported by the Editions of SQL Server 2008 R2
- The largest database supported by SQL Server Express has been increased from 4 GB to 10 GB.
Saturday, December 18, 2010
supermico SuperServer 5016I-MTF and Xen 5.6.1
SuperServer 5016I-MTF, the native raid intel / adaptec is seen as separate drives, ie, Xen can't the see the on-board raid.
then an LSI pciexpress raid card pulled out from another server ....
boom... Xen can see the raid right away...
then an LSI pciexpress raid card pulled out from another server ....
boom... Xen can see the raid right away...
Thursday, December 16, 2010
create an another smtp connector in exchange 2003
http://www.servolutions.com/support/config_exchange_2003.htm
having problem sending to a certain domain
get the isp smtp server to relay
create a new smtp connector
put cost higher than the default *
having problem sending to a certain domain
get the isp smtp server to relay
create a new smtp connector
put cost higher than the default *
Wednesday, December 15, 2010
impoort nk2 file into outlook 2010
versions 2003 / 2007 outlook cache is nk2 file, in outlook 2010 it sorta merged
outlook /importnk2 to merge previous versions of cache
outlook /importnk2 to merge previous versions of cache
Monday, December 13, 2010
Tomato
Tomato
have I mentioned tomato firmware for linksys 54GL.
http://www.polarcloud.com/tomato_128I bought WRT54GL on purpose, in an adsl / broadband expensive coountry I need control traffic both ways so I can save some money, or not blow my budget.
hence tomato comes to rescue.
Sunday, December 12, 2010
phone system follow me feature
phone system follow me feature
that is the normal handset ring and then the paired mobile ring as well.
this is configured in the the pabx, like 501's mobile extersion is 1 021 xzxxxx.
press 1 to go out.
off course , pabx should have this capibility first, in this case, the vendor's pbx need extra license 9 (mony) to enable this feature.
that is the normal handset ring and then the paired mobile ring as well.
this is configured in the the pabx, like 501's mobile extersion is 1 021 xzxxxx.
press 1 to go out.
off course , pabx should have this capibility first, in this case, the vendor's pbx need extra license 9 (mony) to enable this feature.
Saturday, December 11, 2010
HP mini PCIexpress family network card
HP mini PCIexpress family network card - readltek ... oh dear ... its 10 / 100M
not gigbit
not gigbit
Sunday, December 5, 2010
isdn and pabx
yeah, I finally touched isdn in a commericial way. basic rate or 2 basic rate come in via traditional twisted pair, split off the wall as a bt socket. i talked to the electrician , he change to wall socket to cat5. from there a cable connect it to a NT1 box (of palm size), from the NT1 box , there are two cat 5 outgoing sockets in turn connected to the ISDN adatpor inside the pabx box.
phew .... there is no dial-tone in the isdn wall socket. --- yeah it is the case.
there is dial-tone with the adsl line
phew .... there is no dial-tone in the isdn wall socket. --- yeah it is the case.
there is dial-tone with the adsl line
Thursday, December 2, 2010
Wednesday, December 1, 2010
a HP warranty case gone ugly
Hi
I am not sure why the HP guy wanted to talk to you directly, I adamantly told them it is onsite warranty, they should come in to sort out whatever problem with the notebook.
Yes, we can sort out warranty claim. In this case I would take the notebook back to office, our office people to deal with HP.
I would say HP is doing things dirty by doping customer accepting their cost cutting efforts.
We will lodge a complaint to HP.
All business is subject to the Company's standard terms and conditions. A copy is available from our website.
-----Original Message-----
From: Ste
Sent: Wednesday, 1 December 2010 06:52 p.m.
To: MikeS
Subject: FW: Case No. 4623047405 : Customer Replaceable Part - shipment confirmed
Mike,
As per their email below, unfortunately HP support don't agree with you that this is a delivery and install part. They see it as a customer replaceable part.
I'm not sure why I was calling them. I would have thought that since supplied the computer that you would also be authorized by them to sort out a warranty claim?
Anyway, we will need the new disk loaded up with whatever software had, and if possible we may need to recover the data on the old one, but check with first, there may be nothing of any value on it.
Cheers
CA
Financial Controller
-----Original Message-----
From: HPSupport_Global [mailto:wfm@g5u0677c.atlanta.hp.com]
Sent: Wednesday, 1 December 2010 5:45 p.m.
To: ste
Subject: Case No. 4623047405 : Customer Replaceable Part - shipment confirmed
Dear Mr/Ms
This email is to confirm that your customer replaceable part/s has been shipped to the below address:
Support request number: 4623047405
Your Reference:
Product description: HP Compaq 8510p Note
Serial number: CNU8012XXX
HP Part number: 455954-001
HP Part description: SPS-DRV HD 160G 7200 RPM
-----------
If you have any questions regarding this delivery or you have not received your part/s within 48hrs in metropolitan areas or 72 hours in regional areas please contact HP:
Australia: 13 10 47 option 8
New Zealand: 0800 449 553 option 8
Information and support on Customer Self Repair can be found at http://www.hp.com/go/selfrepair.
If you require additional technical assistance at any stage please contact HP Technical Support via phone numbers supplied above.
Please take all ESD (Electro-Static Discharge) safety precautions when performing any internal intervention on your HP product.
IMPORTANT NOTICE
When applicable, the spare part shipment contains detailed instructions on how to return the defective part. Please follow these instructions. By accepting this replacement part, you also accept to return the defective (at our expense) within 5 days. HP reserve the right to invoice you for the value of non returned items
Yours sincerely,
HP Services
__________________________________________________________________
This notification has been sent automatically. Replying to this e- mail therefore is not possible.
If you want to stop receiving notifications such as this, please notify us at:
mailto:HPsupport_reply@hp.com?subject=Ref.%20%3CCASE: 9700399282%3E
This is an e-mail message from Hewlett-Packard. The information contained in this communication is intended solely for use by the individual or entity to whom it is addressed. Use of this communication by others is prohibited. If the e-mail message was sent to you by mistake, please destroy it without reading, using, copying or disclosing its contents to any other person. We accept no liability for damage related to data and/or documents which are communicated by electronic mail.
© Hewlett-Packard Development Company, L.P.. All rights reserved. All product and company names referenced herein are trademarks of their respective owners. THIS COMMUNICATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. INFORMATION PROVIDED IN THIS COMMUNICATION IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED COMMUNICATION IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED
I am not sure why the HP guy wanted to talk to you directly, I adamantly told them it is onsite warranty, they should come in to sort out whatever problem with the notebook.
Yes, we can sort out warranty claim. In this case I would take the notebook back to office, our office people to deal with HP.
I would say HP is doing things dirty by doping customer accepting their cost cutting efforts.
We will lodge a complaint to HP.
All business is subject to the Company's standard terms and conditions. A copy is available from our website.
-----Original Message-----
From: Ste
Sent: Wednesday, 1 December 2010 06:52 p.m.
To: MikeS
Subject: FW: Case No. 4623047405 : Customer Replaceable Part - shipment confirmed
Mike,
As per their email below, unfortunately HP support don't agree with you that this is a delivery and install part. They see it as a customer replaceable part.
I'm not sure why I was calling them. I would have thought that since supplied the computer that you would also be authorized by them to sort out a warranty claim?
Anyway, we will need the new disk loaded up with whatever software had, and if possible we may need to recover the data on the old one, but check with first, there may be nothing of any value on it.
Cheers
CA
Financial Controller
-----Original Message-----
From: HPSupport_Global [mailto:wfm@g5u0677c.atlanta.hp.com]
Sent: Wednesday, 1 December 2010 5:45 p.m.
To: ste
Subject: Case No. 4623047405 : Customer Replaceable Part - shipment confirmed
Dear Mr/Ms
This email is to confirm that your customer replaceable part/s has been shipped to the below address:
Support request number: 4623047405
Your Reference:
Product description: HP Compaq 8510p Note
Serial number: CNU8012XXX
HP Part number: 455954-001
HP Part description: SPS-DRV HD 160G 7200 RPM
-----------
If you have any questions regarding this delivery or you have not received your part/s within 48hrs in metropolitan areas or 72 hours in regional areas please contact HP:
Australia: 13 10 47 option 8
New Zealand: 0800 449 553 option 8
Information and support on Customer Self Repair can be found at http://www.hp.com/go/selfrepair.
If you require additional technical assistance at any stage please contact HP Technical Support via phone numbers supplied above.
Please take all ESD (Electro-Static Discharge) safety precautions when performing any internal intervention on your HP product.
IMPORTANT NOTICE
When applicable, the spare part shipment contains detailed instructions on how to return the defective part. Please follow these instructions. By accepting this replacement part, you also accept to return the defective (at our expense) within 5 days. HP reserve the right to invoice you for the value of non returned items
Yours sincerely,
HP Services
__________________________________________________________________
This notification has been sent automatically. Replying to this e- mail therefore is not possible.
If you want to stop receiving notifications such as this, please notify us at:
mailto:HPsupport_reply@hp.com?subject=Ref.%20%3CCASE: 9700399282%3E
This is an e-mail message from Hewlett-Packard. The information contained in this communication is intended solely for use by the individual or entity to whom it is addressed. Use of this communication by others is prohibited. If the e-mail message was sent to you by mistake, please destroy it without reading, using, copying or disclosing its contents to any other person. We accept no liability for damage related to data and/or documents which are communicated by electronic mail.
© Hewlett-Packard Development Company, L.P.. All rights reserved. All product and company names referenced herein are trademarks of their respective owners. THIS COMMUNICATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. INFORMATION PROVIDED IN THIS COMMUNICATION IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED COMMUNICATION IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED
Monday, November 29, 2010
Early morning wake up call, no emails, mdaemon filled up c: drive
The c: drive was cleared a while ago. Maybe it's time to add Prtg as monitoring program get rid of IBM director,
Sunday, November 28, 2010
shadow protect and VSS
Examples of non-VSS applications include:
•Exchange 2000
•SQL 2000
•Domino Server
•Oracle
Please note: Microsoft Windows 2000 does not have a VSS framework whatsoever.
•Exchange 2000
•SQL 2000
•Domino Server
•Oracle
Please note: Microsoft Windows 2000 does not have a VSS framework whatsoever.
Friday, November 26, 2010
finally a easy one for the end of the week, dave' pdf can't be opened on terminal server
finally a easy one for the end of the week, pdf can't be opened on terminal server
well, login as Dave , found out pdf is assocaited with work, change back
well, login as Dave , found out pdf is assocaited with work, change back
Thursday, November 25, 2010
dreadful error excel 2007 "document not saved"
dreadful error excel 2007 "document not saved"
windows xp full patched with office 2007
NT4 fileserver ....
try to to save network ,,, got that dreaded error document not saved"
tried many things, no luck
on the positive side, a w98 PC fixed by pulling out network card and put it back again. this restored network connection. interestinly prior to this w98 asked for nic driver , the owner is told if happens again, not worth to fix it.
windows xp full patched with office 2007
NT4 fileserver ....
try to to save network ,,, got that dreaded error document not saved"
tried many things, no luck
on the positive side, a w98 PC fixed by pulling out network card and put it back again. this restored network connection. interestinly prior to this w98 asked for nic driver , the owner is told if happens again, not worth to fix it.
Wednesday, November 24, 2010
iphone/ipad windows 2003 terminal server client
iphone/ipad windows 2003 terminal server client
RDP lite can only do the console session
IRdesktop can login a normal user
RDP lite can only do the console session
IRdesktop can login a normal user
Publish Post
Tuesday, November 23, 2010
xen virtual server failed to restart , early morning emergency
xen virtual server failed to restart , early morning emergency
what;s the hell, those free xen hosts need a license installed every year.
now I got a 10 month valid xen license, on the machine with xen centre 5.5 installed, double click on the license, it will update the host license.
what;s the hell, those free xen hosts need a license installed every year.
now I got a 10 month valid xen license, on the machine with xen centre 5.5 installed, double click on the license, it will update the host license.
Monday, November 22, 2010
setup remote desktop to use local usb drive
setup remote desktop to use local usb drive
click local resources
click more
click drives I plug in later
click local resources
click more
click drives I plug in later
Sunday, November 21, 2010
Friday, November 19, 2010
license windows 2008 terminal server
license windows 2008 terminal server
you can put w2008 r2 terminal server license onto w2008 version of terminal server
you can put w2008 r2 terminal server license onto w2008 version of terminal server
Thursday, November 11, 2010
upgrade memory for a dell poweredge R410
read the f-manual
un-do two screw on the size, slide out the rack-mount server, need squeeze the side bezels at some stage.
then un-do the lock on the top, and push open the chassis, add another 2*4 GB to make it 20GB.
un-do two screw on the size, slide out the rack-mount server, need squeeze the side bezels at some stage.
then un-do the lock on the top, and push open the chassis, add another 2*4 GB to make it 20GB.
Tuesday, November 9, 2010
outlook 2007 deleted items folder missing with exchange 2003
outlook 2007 deleted items folder missing with exchange 2003
tried to resetnavpanel , resetfolders ... no luck
find a tip to show the deleted items folder , in outlook today, manually type outlook:deleted items
then deleted items folder will show up, in tools I can click on recover deleted items
tried to resetnavpanel , resetfolders ... no luck
find a tip to show the deleted items folder , in outlook today, manually type outlook:deleted items
then deleted items folder will show up, in tools I can click on recover deleted items
Monday, November 8, 2010
license terminal server 2008 in a SBS 2008 domain
license terminal server 2008 in a SBS 2008 domain
in this SBS 2008 domain PDC, I installed TS gateway service,
but to license the terminal server , I chose to install the license server on the terminal server itself.
with open license, choose the license mode I bought for this client in user mode, activate the license server, and put licenses in.
in this SBS 2008 domain PDC, I installed TS gateway service,
but to license the terminal server , I chose to install the license server on the terminal server itself.
with open license, choose the license mode I bought for this client in user mode, activate the license server, and put licenses in.
Saturday, November 6, 2010
分清NAS和SAN
http://www.net130.com/CMS/Pub/special/special_storage/2010_11_04_72065.htm
白NAS与SAN之间的传统区别:NAS设备工作在文件级,而SAN工作在块级。
白NAS与SAN之间的传统区别:NAS设备工作在文件级,而SAN工作在块级。
Friday, November 5, 2010
taskmgr userinit.exe 0x00012d, insufficient resource to logon, default user profile
taskmgr 0x00012d
userinit.exe 0x00012d
sometimes symantec v9 (or 10?) reports an error about windows update exe file
the problem is the login error insufficient resource to logon, default user profile will load
scan for virus / spyware , no luck
scan disk, no luck.
its a HP desktop with 2*256 MB ram
eventually swap the memory moduels to another bank,
then the logon profile failure to load problem vanished.
when this problem happens, the safe mode is ok to load.
its a hardware mainboard / memory problem, I will find out next week to see if that client comes back to me with the same dreaded problem
userinit.exe 0x00012d
sometimes symantec v9 (or 10?) reports an error about windows update exe file
the problem is the login error insufficient resource to logon, default user profile will load
scan for virus / spyware , no luck
scan disk, no luck.
its a HP desktop with 2*256 MB ram
eventually swap the memory moduels to another bank,
then the logon profile failure to load problem vanished.
when this problem happens, the safe mode is ok to load.
its a hardware mainboard / memory problem, I will find out next week to see if that client comes back to me with the same dreaded problem
Thursday, November 4, 2010
MAXSMS maximizer sms
http://www.rapid.com.au/Brochures/MaxTEXT.htm
for some reason, the sms button disappeared from users' maximizer menu,
goto view .. tools ... add application ... broswe to program files ... maximize sms .. sms exe file
then an icon will appear on the menu
for some reason, the sms button disappeared from users' maximizer menu,
goto view .. tools ... add application ... broswe to program files ... maximize sms .. sms exe file
then an icon will appear on the menu
Wednesday, November 3, 2010
Monday, November 1, 2010
Lenovo L510 is an disappointment
the notebook was down-graded to xp. with 4gb physical memory installed, it can only see 2.4~2.5GB.
Sunday, October 31, 2010
There is a problem with the date/time stamp in a linux application ….you can see from the screen shot below
There is a problem with the date/time stamp in a linux application ….you can see from the screen shot below
here is the linux tech's solution
ntpd -q -g
here is the linux tech's solution
ntpd -q -g
Friday, October 29, 2010
jailbreak iphone 4
I am too tempted to do the jail-break ... sighv....
intunes just dont have enough apps .... free ones
intunes just dont have enough apps .... free ones
Wednesday, October 27, 2010
iphone camera and flash light
hdr can't be on with the flash light?
HDR on the flash light will be off
HDR on the flash light will be off
Tuesday, October 26, 2010
wireless USb stick
wireless USb stick
now wireless internet providers all have the same model
vodafone
telstraclear
local telecom
all have ZTE model ????
oh dear any competitiors?
now wireless internet providers all have the same model
vodafone
telstraclear
local telecom
all have ZTE model ????
oh dear any competitiors?
Monday, October 25, 2010
Can an iPhone connect to itunes via bluetooth?
http://answers.yahoo.com/question/index?qid=20080306133319AARb4VV
no you cant
no you cant
connect bluetooth between the notebook and iphone 4
connect bluetooth between the notebook and iphone 4
ask for a pin
after a few try, then i can play stuterred audio from my notebook stereo,
ask for a pin
after a few try, then i can play stuterred audio from my notebook stereo,
Monday, October 18, 2010
n-able essential license and professional licenses
n-able essential license and professional licenses ...
if no more essential nodes available , professional nodes will be used if available.
essential nodes are free gifts,
if no more essential nodes available , professional nodes will be used if available.
essential nodes are free gifts,
Saturday, October 16, 2010
Unhide Columns in Excel
http://spreadsheets.about.com/od/excelformatting/qt/070814unhidecol.htm
even if its hidden, when you copy it, the hidden ones still being copied
even if its hidden, when you copy it, the hidden ones still being copied
magci conversion date expires and modified date in sharepoint
=TEXT(A2,"dd/mmm/yyyy")
or
=TEXT(A2,"dd/mm/yyyy")
credit goes to
http://www.ozgrid.com/forum/showthread.php?t=61117&page=1
or
=TEXT(A2,"dd/mm/yyyy")
credit goes to
http://www.ozgrid.com/forum/showthread.php?t=61117&page=1
Friday, October 15, 2010
vcard in iphone4 ... nitemares from nokia
export contacts as vcard, import to outlook, then sync to iphone 4, but some cards wont work because phone numbers are as pics, iphone can;t read it... shark
sip crazy,
well the asterisk based pabx sucked all the dsl bandwidth twice today.
the pbx guy blamed the home dlink dsl-504t, he said need a business one.
I did see that once with another customer.
the pbx guy blamed the home dlink dsl-504t, he said need a business one.
I did see that once with another customer.
Thursday, October 14, 2010
iphone 4 cannot get mail the connection to the server failed EXCHANGE 2010
http://alanhardisty.wordpress.com/2010/03/05/activesync-not-working-on-exchange-2010-when-inherit-permissions-not-set/
namely tick ‘Include Inheritable Permissions From This Object’s Parent’ is ticked in dsa.msc
but I still get "can't connect error" after the tick...
there are errors logged in the exchange server ... something about activesync permission (?)...
there is another thing I changed, the username to the upn name in AD. it's like mike changed to mike@mybigstomach.com
then saddenly emails are showing up in my iphone 4 ios 4.1
namely tick ‘Include Inheritable Permissions From This Object’s Parent’ is ticked in dsa.msc
but I still get "can't connect error" after the tick...
there are errors logged in the exchange server ... something about activesync permission (?)...
there is another thing I changed, the username to the upn name in AD. it's like mike changed to mike@mybigstomach.com
then saddenly emails are showing up in my iphone 4 ios 4.1
Wednesday, October 13, 2010
zte usb dongle / stick /modem telstra Clear and Telecom
well this must be a hot sell, both mobile isp choose this model as their mobile device.
but they have different programs (mobile connect manager), its one or the other
but they have different programs (mobile connect manager), its one or the other
http://www.nzconnections.net.nz/Telecom_Mobile_Broadband_settings
Dialer for Windows Mobile CDMA 1x or CDMA EV-DO
The zip download contains two files used to allow connecting a PC to the Internet through Telecom New Zealand's 3G enabled Windows Mobile Pocket PC CDMA 1x or CDMA EV-DO. The information was supplied by Telecom New Zealand. You can use either a USB cable or the cradle.
Installation:
Unzip the contents of the download from this page into a folder on your computer
Turn on Harrier Pocket PC (or your Pocket PC Phone Edition CDMA)
Start Harrier and run 'WModem', select USB, press 'start'
Plug in cable to Harrier and USB end to laptop (or sit the Harrier in its cradle and plug the USB end to laptop)
When Windows asks for a driver, point it at the directory where CDMA1X_USBMDM.INF is located
Running:
Turn on Harrier Pocket PC (or your Pocket PC Phone Edition CDMA)
Run 'WModem', select USB, press 'start'
Plug in cable to Harrier and USB end to laptop (or sit the Harrier in its cradle and plug the USB end to laptop)
On laptop run 'CDMA_USBModem_Dialer'
Enter the username/password
dial #777
For Telecom New Zealand username is mobile@jamamobile, password telecom.
For Verizon Wireless username is phonenumber@vzw3g.com, password vzw.
ActiveSync will work normally when WModem is not started.
Click the button below to download the file:
The zip download contains two files used to allow connecting a PC to the Internet through Telecom New Zealand's 3G enabled Windows Mobile Pocket PC CDMA 1x or CDMA EV-DO. The information was supplied by Telecom New Zealand. You can use either a USB cable or the cradle.
Installation:
Unzip the contents of the download from this page into a folder on your computer
Turn on Harrier Pocket PC (or your Pocket PC Phone Edition CDMA)
Start Harrier and run 'WModem', select USB, press 'start'
Plug in cable to Harrier and USB end to laptop (or sit the Harrier in its cradle and plug the USB end to laptop)
When Windows asks for a driver, point it at the directory where CDMA1X_USBMDM.INF is located
Running:
Turn on Harrier Pocket PC (or your Pocket PC Phone Edition CDMA)
Run 'WModem', select USB, press 'start'
Plug in cable to Harrier and USB end to laptop (or sit the Harrier in its cradle and plug the USB end to laptop)
On laptop run 'CDMA_USBModem_Dialer'
Enter the username/password
dial #777
For Telecom New Zealand username is mobile@jamamobile, password telecom.
For Verizon Wireless username is phonenumber@vzw3g.com, password vzw.
ActiveSync will work normally when WModem is not started.
Click the button below to download the file:
Tuesday, October 12, 2010
Monday, October 11, 2010
external terminal server connections dropping off
this happens most likely for a certain customer. namely their branch connecting from different ISPs. those offices of the same ISp work better
but their manager seems reckon its the terminal server problem
but their manager seems reckon its the terminal server problem
Sunday, October 10, 2010
route email via ISp's smtp server
sorbs-duhl list the good customer's exchange server 2003 IP as dynamic
so they can't send emails,
I called their ISP to change the PTR / reverse dns record to something meaningful.
at the same time, route their emails to the ISP smart host.
the smart host is configured on the administrative group's smtp connector,
it is not the smtp of the server
so they can't send emails,
I called their ISP to change the PTR / reverse dns record to something meaningful.
at the same time, route their emails to the ISP smart host.
the smart host is configured on the administrative group's smtp connector,
it is not the smtp of the server
Saturday, October 9, 2010
security tab missing from a NTFS folder
Mary moved the folder away from one volume to another.
But she got an error not finishing the moving.
as a result, security tab missing from that NTFS folder.
I searched the internet, unlocker 1.8.6 claims that it can fix it by breaking some black hands holding onto the folder in question.
when I just about download it, the download site warned me this is a virus/trojan/malware.
oh, dear, I nearly got tricked.
start from beginning, use system internals process explorer, and handle
handle identified user admin is holding onto that folder. the process is explorer.
now the solution is to close explorer by logging off windows
But she got an error not finishing the moving.
as a result, security tab missing from that NTFS folder.
I searched the internet, unlocker 1.8.6 claims that it can fix it by breaking some black hands holding onto the folder in question.
when I just about download it, the download site warned me this is a virus/trojan/malware.
oh, dear, I nearly got tricked.
start from beginning, use system internals process explorer, and handle
handle identified user admin is holding onto that folder. the process is explorer.
now the solution is to close explorer by logging off windows
Friday, October 8, 2010
failure to image w2003 server to a x226 server
shadow protect imaging a p4-1.6G ibm workstation, then restore the image to an IBM x226 server.
alas, not much luck ...
upon restart I see bluescreen, error 0x0000007b
alas, not much luck ...
upon restart I see bluescreen, error 0x0000007b
Thursday, October 7, 2010
gparted to resize an ide windows 2003 74.5 gb hard drive
i downloaded gparted iso, burned to iso.
boot from cd, and re-sized to 65 GB. guess what, it took about 1 minute or even less.
prior to that I did scandisk , jkdefrag and moved lots of stuff out of the disk, only 26.7GB of data.
boot from cd, and re-sized to 65 GB. guess what, it took about 1 minute or even less.
prior to that I did scandisk , jkdefrag and moved lots of stuff out of the disk, only 26.7GB of data.
Wednesday, October 6, 2010
Resize image to fit onto a smaller disk
http://www.storagecraft.com/kb/questions.php?questionid=88
\
\
For example the original disk volume was 100GBytes with 60Gbytes of used space. You wish to restore the image to a disk volume that is only 80Gbytes, and the ShadowProtect image (*.spf) file is only 40Gbytes. Because the original disk volume is 100Gbytes you cannot restore it to 80Gbytes disk volume, even though there was only 60Gbytes of data on it.
At the time of this article, Shadow Protect cannot dynamically resize the image to enable restoration to the smaller volume. This feature is planned to be included in a future release.
I am so disappointed again,
here is what I got 74.5 GB IDE hdd, with 51GB data
I tried to restore to an IBM x226 server with 67.5GB adaptec raid 1, no luck.
it just wont let me create partition to restore to.
Solution:
Steps to shrink to the partition so it can be restored to a smaller drive.
1. Boot the latest Recovery CD into the Vista Based Recovery Environment (You do not need to restore using Vista, you simply need to use it to shrink the partition)
2. Mount the image you wish to restore as writable. (This is also called Exploring the Backup) You will find the Explore Backup option in the left hand menu under Tasks. To mount an image as writable uncheck the read only box.
3.Go to the Dismount Backup Image also under Tasks and dismount the volume, as you do so, you will see an option to shrink the volume. Select this box and the software will shrink the partition as much as possible.
A new incremental backup file will be created, this file with have the smaller partition information and can be restored to the smaller drive.
If restoring Windows XP or 2003 you will want to reboot your computer and boot into the Legacy Environment for restore. To restore simply select the newly created incremental file as the image you wish to restore.
\
\
For example the original disk volume was 100GBytes with 60Gbytes of used space. You wish to restore the image to a disk volume that is only 80Gbytes, and the ShadowProtect image (*.spf) file is only 40Gbytes. Because the original disk volume is 100Gbytes you cannot restore it to 80Gbytes disk volume, even though there was only 60Gbytes of data on it.
At the time of this article, Shadow Protect cannot dynamically resize the image to enable restoration to the smaller volume. This feature is planned to be included in a future release.
I am so disappointed again,
here is what I got 74.5 GB IDE hdd, with 51GB data
I tried to restore to an IBM x226 server with 67.5GB adaptec raid 1, no luck.
it just wont let me create partition to restore to.
Solution:
Steps to shrink to the partition so it can be restored to a smaller drive.
1. Boot the latest Recovery CD into the Vista Based Recovery Environment (You do not need to restore using Vista, you simply need to use it to shrink the partition)
2. Mount the image you wish to restore as writable. (This is also called Exploring the Backup) You will find the Explore Backup option in the left hand menu under Tasks. To mount an image as writable uncheck the read only box.
3.Go to the Dismount Backup Image also under Tasks and dismount the volume, as you do so, you will see an option to shrink the volume. Select this box and the software will shrink the partition as much as possible.
A new incremental backup file will be created, this file with have the smaller partition information and can be restored to the smaller drive.
If restoring Windows XP or 2003 you will want to reboot your computer and boot into the Legacy Environment for restore. To restore simply select the newly created incremental file as the image you wish to restore.
Tuesday, October 5, 2010
win98se on a fileserver
clean up a client's fileserver, interestingly, there is a copy of win98se original files. ...
...sigh ... that makes me missing my glorious days
...sigh ... that makes me missing my glorious days
Monday, October 4, 2010
run myob / commac h & s on windows 2003 terminal server
run myob / commac h & s on windows 2003 terminal server ...
I get this going a couple years ago.
now it stopped working because of new myob updates?
anyway I can run myob on the TS as administrator.
oddly, normal TS can't run it via a shortcut to the fileserver which a installation of MYOB seated.
gotta remember this: run the network.ex installation, well, for each TS user?
also the security warning, use file://servername/commacc.exe install of file://ip-address/commacc.exe
I get this going a couple years ago.
now it stopped working because of new myob updates?
anyway I can run myob on the TS as administrator.
oddly, normal TS can't run it via a shortcut to the fileserver which a installation of MYOB seated.
gotta remember this: run the network.ex installation, well, for each TS user?
also the security warning, use file://servername/commacc.exe install of file://ip-address/commacc.exe
Sunday, October 3, 2010
local popular auction site got infected with virus or malware as they called it
local popular auction site got infected with virus or malware as they called it
so I started scan my hard drive again, this time I downloaded a german one, luke filewalker Avira AntiVir personal.
It detected some trojan others dont. like the chris-tv bundled something fishy
so I started scan my hard drive again, this time I downloaded a german one, luke filewalker Avira AntiVir personal.
It detected some trojan others dont. like the chris-tv bundled something fishy
Saturday, October 2, 2010
load myob on local c: drive
load myob on local c: drive for the new GST
you dont have to load to a network drive
load it locally, then point to the data on the file server, then upgrade the data base
you dont have to load to a network drive
load it locally, then point to the data on the file server, then upgrade the data base
Friday, October 1, 2010
no emails for a business
I checked the internet records, then find out their ISP is doing something, their email can't be accessed. their website is down as well
Thursday, September 30, 2010
use your ISP's dns server
certtain ladies cannot access google maps this week, alas ... they are still using their original ISp's dns server as forwarder, change to their current ISP dns server, all fine.
lesson: isp may not have all good routes to maps.google.com
lesson: isp may not have all good routes to maps.google.com
Wednesday, September 29, 2010
struggling with n-able endpoint security
struggling with n-able endpoint security
installed the probe on the PDc
the enable the end-point security, .... upon first start, apply personal settings ...
second restart ... pptp can connect, but cannot go anywhere
had to do the third start
installed the probe on the PDc
the enable the end-point security, .... upon first start, apply personal settings ...
second restart ... pptp can connect, but cannot go anywhere
had to do the third start
Tuesday, September 28, 2010
Access web datasheet is attempting to retrieve data from a different domain...
http://partialclass.blogspot.com/2008/04/sharepoint-error-access-web-datasheet.html
importing excel contacts into contacts
Access web datasheet is attempting to retrieve data from a different domain...
answer: Alternate Access Mappings. You'll find this in SharePoint Central Administration, under Operations, and Global Configuration.
add the mapping
importing excel contacts into contacts
Access web datasheet is attempting to retrieve data from a different domain...
answer: Alternate Access Mappings. You'll find this in SharePoint Central Administration, under Operations, and Global Configuration.
add the mapping
outlook cannot connect to email server, mdeamon, outlook connector, terminal server
outlook cannot connect to email server, mdeamon, outlook connector, terminal server
ah .. well, the sender appeared to try to send to a non-existing person in the local domain.
ah .. well, the sender appeared to try to send to a non-existing person in the local domain.
Monday, September 27, 2010
install dlink powerline kit
I pre-configure the two adaptors with passwords, no hassle.
I also used a power-spliter (with surge-protect) to connect those adaptors, it is fine, the speed is not good at one premise (18Mb), but it is otherwise steady, so far.
those kits definitely doesn't like power-stripe.
I also used a power-spliter (with surge-protect) to connect those adaptors, it is fine, the speed is not good at one premise (18Mb), but it is otherwise steady, so far.
those kits definitely doesn't like power-stripe.
Sunday, September 26, 2010
how do I put annoucement in the wss 3.o web page
well, I put two annoucement web part in the same page, they are showing the same data input.
the answer is to create an another annoucement list.
http://social.technet.microsoft.com/forums/en-US/sharepointgeneral/thread/5a2859b0-abf0-40b3-a905-ff4043dcab49/
I quote here
a webpart us a mechanism to display data, while a list is like a small database - a mechanism to store data.
the answer is to create an another annoucement list.
http://social.technet.microsoft.com/forums/en-US/sharepointgeneral/thread/5a2859b0-abf0-40b3-a905-ff4043dcab49/
I quote here
a webpart us a mechanism to display data, while a list is like a small database - a mechanism to store data.
Saturday, September 25, 2010
test dlink powerline kit
test dlink powerline kit
suppose to press the buttons so both packs can link up, but the network link led keeps flashing.
so I have to load the bundled cd to my w7 X64. there is wincap in it. the powerline utility let me to set passwords on both devices.
after pressing the button again, I lost connection. I have to plug those to my notebook and reset password.
suppose to press the buttons so both packs can link up, but the network link led keeps flashing.
so I have to load the bundled cd to my w7 X64. there is wincap in it. the powerline utility let me to set passwords on both devices.
after pressing the button again, I lost connection. I have to plug those to my notebook and reset password.
Friday, September 24, 2010
networking over powerline DHP-307AV DLINK
networking over powerline DHP-307AV DLINK
I will give it a go
I will give it a go
Thursday, September 23, 2010
The backup/restore job failed because there is already another job scheduled. Delete the timer job from the Timer Job Definitions page, and then restart the backup/restore job.
wss 3.0
admin website perform backup ... why I always get this problem ...
anyway
http://social.technet.microsoft.com/Forums/en-US/sharepointadmin/thread/be9fddf5-b8b5-45f5-abcc-ab1678f8bebc
admin website perform backup ... why I always get this problem ...
anyway
http://social.technet.microsoft.com/Forums/en-US/sharepointadmin/thread/be9fddf5-b8b5-45f5-abcc-ab1678f8bebc
Wednesday, September 22, 2010
my adsl drama continues
an early morning phone call about the dsl dropping problem indicated there is a problem at ohter side
tried another router dlink dsl-504t
unplugged everything except the router, still get drops and out of sync in the logs
the ISP guy said they would talk to the whole saler.
tried another router dlink dsl-504t
unplugged everything except the router, still get drops and out of sync in the logs
the ISP guy said they would talk to the whole saler.
Tuesday, September 21, 2010
replace a hard drive in an IBM x225 server
hot plug and play,
server raid manager showed the new drive is syncing
server raid manager showed the new drive is syncing
Monday, September 20, 2010
Dlink DSL out of sync
Dlink DSL out of sync
in sync
going in a circle
local isp guy said its the dsl filter, dsl router ...
he has confident about the dsl port at local exchange.
in sync
going in a circle
local isp guy said its the dsl filter, dsl router ...
he has confident about the dsl port at local exchange.
Sunday, September 19, 2010
http://www.easyduplicatefinder.com/
try to find duplicate files on your fileserver ?
yeah
or on your own PC for Free?
try
http://www.easyduplicatefinder.com/
Saturday, September 18, 2010
Friday, September 17, 2010
Thursday, September 16, 2010
911 trojan spyware , virus
911 trojan spyware , virus
while he got this funny virus trojan spyware during the 11/9/2010 visit to US.
hijackthis showed fcccdc.dll
sstsqn.dll
winawnc.dll
foobar2000
foobar200.org
awwusg.dll
a couple of hidden one
I have to boot from a shadow protect disc, start filemanager, manauly remove those suspicious dlls.
malwarebytes' anti-malware just wont start once got infected
while he got this funny virus trojan spyware during the 11/9/2010 visit to US.
hijackthis showed fcccdc.dll
sstsqn.dll
winawnc.dll
foobar2000
foobar200.org
awwusg.dll
a couple of hidden one
I have to boot from a shadow protect disc, start filemanager, manauly remove those suspicious dlls.
malwarebytes' anti-malware just wont start once got infected
Wednesday, September 15, 2010
Ricoh Aficio 1515 admin password
Ricoh Aficio 1515 admin password
the default admin password is password
the default admin password is password
Monday, September 13, 2010
not enough resource, can't open any program in a windows xp pc
not enough resource, can't open any program in a windows xp pc
can't really do anything in nromal mode.
luckily, it can boot to safe mode, malware scan didn't show anything. disable all startup items, it can boot into normal mode now.
can't really do anything in nromal mode.
luckily, it can boot to safe mode, malware scan didn't show anything. disable all startup items, it can boot into normal mode now.
Sunday, September 12, 2010
move a pc to another domain, what will happen to the profiles
move a pc to another domain, what will happen to the profiles
the user profiles are all there
dont have to make a backup,
to be on the safe side
the user profiles are all there
dont have to make a backup,
to be on the safe side
Saturday, September 11, 2010
publish services from sonicwall
create services first
put related services in a service group
then use the public server wizard to publish the services to the internet
note: the external wan ip is the wan ip of the sonicwall interface, this could be different from the real public ip
put related services in a service group
then use the public server wizard to publish the services to the internet
note: the external wan ip is the wan ip of the sonicwall interface, this could be different from the real public ip
Friday, September 10, 2010
iphone 4 and exchange server
iphone 4 and exchange server
rubberneck, iphone 4 is using a type of new sim card smaller that the traditional one.
you have to call the phone company to patch the mobile phone number over to the new sim.
the new iphone 4 need itunes 9.2 to activate
itunes 10 is fine
rubberneck, iphone 4 is using a type of new sim card smaller that the traditional one.
you have to call the phone company to patch the mobile phone number over to the new sim.
the new iphone 4 need itunes 9.2 to activate
itunes 10 is fine
Thursday, September 9, 2010
WINS in windows 2008 R2
winsmgmt.msc is a feature in windows 2008 and 2008 R2
after replacing windows 2003 PDC with 2008 R2, I heard they are complaining about their app running slow.
so I enable wins, and started computer browser serice in 2008 R2.
also point SQL server's wins settings to windows 2008 R2
things are lots faster now.
after replacing windows 2003 PDC with 2008 R2, I heard they are complaining about their app running slow.
so I enable wins, and started computer browser serice in 2008 R2.
also point SQL server's wins settings to windows 2008 R2
things are lots faster now.
Wednesday, September 8, 2010
What’s the Microsoft Computer Browser Service?
think the year is 2010 not 1996?
http://www.petri.co.il/whats_the_microsoft_computer_browser_service.htm
well I got a problem where the w7 pc on a windows 2008 r2 PDC based domain can't see the network folder properly.
w-xp can see the PC lists, though. but the w2008r2 netowork folder listed those pcs on the network, then those entries just vanished. this happened to w7 as well.
how frustrating
.. double check on wins, then enanle computer browser service on the pdc ... seemed fine now
http://www.petri.co.il/whats_the_microsoft_computer_browser_service.htm
well I got a problem where the w7 pc on a windows 2008 r2 PDC based domain can't see the network folder properly.
w-xp can see the PC lists, though. but the w2008r2 netowork folder listed those pcs on the network, then those entries just vanished. this happened to w7 as well.
how frustrating
.. double check on wins, then enanle computer browser service on the pdc ... seemed fine now
Computer Browser service is disabled on Windows Server 2008
Computer Browser service is disabled on Windows Server 2008
http://www.chicagotech.net/netforums/viewtopic.php?t=4940
http://www.chicagotech.net/netforums/viewtopic.php?t=4940
Tuesday, September 7, 2010
n-able endpoint security and MYOB PAYROLL emailing slip
n-able endpoint security and MYOB PAYROLL emailing slip
emailing continue to fail. its not a smtp server problem.
remove the n-able anti-virus from the client pc, it all ok.
sleepless night
emailing continue to fail. its not a smtp server problem.
remove the n-able anti-virus from the client pc, it all ok.
sleepless night
Monday, September 6, 2010
windows server 2008 backup
as we all know its images based
if you stick a usb drive and configure it for windows backup, it supposed to hide the drive letter.
if you stick a usb drive and configure it for windows backup, it supposed to hide the drive letter.
Sunday, September 5, 2010
some AD FSMO stuff PDC, Schema master, RID master, infrastructure master, domain naming master
http://www.windowsnetworking.com/articles_tutorials/Managing-Active-Directory-FSMO-Roles.html
I just quote his good point here
Forest root domain - Schema Master and Domain Naming Master on the same machine, which should also host the Global Catalog.
Every domain - PDC Emulator and RID Master on the same machine, which should have beefy hardware to handle the load.
Every domain - Never place the Infrastructure Master on a machine that hosts the Global Catalog, unless your forest has only one domain or unless every domain controller in your forest hosts the Global Catalog.
now in my own word:
schema master and DNM are unique to the forest
PDC,RID and IM are on the domain level.
Global Catelague ... GC ... I always struggling with this one... this one seems more important than others. it is set in AD site services, so it is site based or location/subnet/physical based
I just quote his good point here
Forest root domain - Schema Master and Domain Naming Master on the same machine, which should also host the Global Catalog.
Every domain - PDC Emulator and RID Master on the same machine, which should have beefy hardware to handle the load.
Every domain - Never place the Infrastructure Master on a machine that hosts the Global Catalog, unless your forest has only one domain or unless every domain controller in your forest hosts the Global Catalog.
now in my own word:
schema master and DNM are unique to the forest
PDC,RID and IM are on the domain level.
Global Catelague ... GC ... I always struggling with this one... this one seems more important than others. it is set in AD site services, so it is site based or location/subnet/physical based
DC=3DTapi3directory
http://www.wiredbox.net/forum2/Thread13149_DCPROMO_to_demote_problem_with_TAPI3Directory---.aspx
This DC holds the last replica of the following application directory =
partitions: DC=3DTapi3directory (then contains domain name and DC=3D =
local)"
Is it safe to continue/remove? Is Tapi3Directory important?
This DC holds the last replica of the following application directory =
partitions: DC=3DTapi3directory (then contains domain name and DC=3D =
local)"
Is it safe to continue/remove? Is Tapi3Directory important?
Saturday, September 4, 2010
remove AD from a windows 2003 server
make sure transfer 5 FSMO roles over, and make the new DC an GC
then run dcpromo
it will ask whether it's the last dc, and local password
then it will do the last replication
in my case i got a warning about ms tapi3 app partitition not on the other server, can't be transferred.
there is an error about netlog problem about gc. tick off this server as gc to continue
the msg is gc is autheticate logins, or dear i thought dc can do that ...?
then run dcpromo
it will ask whether it's the last dc, and local password
then it will do the last replication
in my case i got a warning about ms tapi3 app partitition not on the other server, can't be transferred.
there is an error about netlog problem about gc. tick off this server as gc to continue
the msg is gc is autheticate logins, or dear i thought dc can do that ...?
Friday, September 3, 2010
You may receive the "Word could not load the e-mail envelope" error message when you try to send an e-mail message from Word
You may receive the "Word could not load the e-mail envelope" error message when you try to send an e-mail message from Word
http://support.microsoft.com/kb/829061
http://support.microsoft.com/kb/829061
Thursday, September 2, 2010
NET USE J: \\servername\share /USER:domainname\username password
NET USE J: \\servername\share /USER:domainname\username password
add password to the net use network drive letter
add password to the net use network drive letter
Wednesday, September 1, 2010
adprep32 join a windows 2008 dc to a windows 2003 domain
add ad ds role to the windows 2008 r2
run dcpromo
need do adprep /forestprep first
and adprep /domainprep /gpprep
in windows 2008 R2 dvd support\tools
for 32 bit windows 2003 domain controller
adprep32 /forestprep
adprep32 /domainprep /gpprep
start dcpromo again
for some reason can't directly set to dns server
choice to dc is fine
then raise the forest fucntion level to 2003 from 2000
transfer FSMOs over
run dcpromo
need do adprep /forestprep first
and adprep /domainprep /gpprep
in windows 2008 R2 dvd support\tools
for 32 bit windows 2003 domain controller
adprep32 /forestprep
adprep32 /domainprep /gpprep
start dcpromo again
for some reason can't directly set to dns server
choice to dc is fine
then raise the forest fucntion level to 2003 from 2000
transfer FSMOs over
Tuesday, August 31, 2010
1 ring is 3 seconds
a telephone guys told me 1 ring is about 3 secs
so if a customer wants after 10 rings goes to voicemail, the it is about 30 seconds
so if a customer wants after 10 rings goes to voicemail, the it is about 30 seconds
Monday, August 30, 2010
new version of sbs 2008
the exchange server in this version will be in the cloud.
yeah I can see microsoft is cutting other guys jobs worldwide.
yeah I can see microsoft is cutting other guys jobs worldwide.
Sunday, August 29, 2010
Saturday, August 28, 2010
sonicwall voip
yer
voice over adsl ... very interesting with 3 simultaneous lines via a ip pabx, yeah open source asteristic
basically follow sonciwall admin guide to setup voip on tz100. once sip link is up, you can see the sip status under sonicwall's voip section.
voice over adsl ... very interesting with 3 simultaneous lines via a ip pabx, yeah open source asteristic
basically follow sonciwall admin guide to setup voip on tz100. once sip link is up, you can see the sip status under sonicwall's voip section.
Friday, August 27, 2010
enable windows xp remote desktop remotely
http://www.howtonetworking.com/RemoteAccess/enablerdc1.htm
regedit
hklm\system\currentcontrolset\control\terminalserver
change the f key
regedit
hklm\system\currentcontrolset\control\terminalserver
change the f key
Thursday, August 26, 2010
VOIP SIP PORTS
OPEN SOURCE ASTERISC TRIBOX
SIP PORTS UDP AND TCP 5060
UDP 10000-20000 - THIS IS WILD
SIP PORTS UDP AND TCP 5060
UDP 10000-20000 - THIS IS WILD
Wednesday, August 25, 2010
Tuesday, August 24, 2010
windows fax and picture viewer - memory error printing
she said it started late yesterday.
delete the printer, reload it, the same problem,
the eventvwr showed there are errors like device cdrom, device hard drive error.
delete the printer, reload it, the same problem,
the eventvwr showed there are errors like device cdrom, device hard drive error.
Monday, August 23, 2010
voip the open source way, asterisc
sip trunk
polycom
thompson
grandstream
basic isdn 1 wire / 2 lines digital
primary isdn 1 wire / 30 lines digital
ata
polycom
thompson
grandstream
basic isdn 1 wire / 2 lines digital
primary isdn 1 wire / 30 lines digital
ata
Labels:
asterisc,
voip the open source way
Sunday, August 22, 2010
usb disc fat32 and ntfs
while copying some files, I am prompted that some some attribute wont be copied.
dear
convert G: /FS:NTFS
The type of the file system is FAT32.
Volume MKHOMEBK created 22/08/2010 10:55 a.m.
Volume Serial Number is 6800-159F
Windows is verifying files and folders...
File and folder verification is complete.
Windows has checked the file system and found no problems.
4,097,818,624 bytes total disk space.
315,392 bytes in 6 hidden files.
159,744 bytes in 37 folders.
138,629,120 bytes in 373 files.
3,958,702,080 bytes available on disk.
4,096 bytes in each allocation unit.
1,000,444 total allocation units on disk.
966,480 allocation units available on disk.
Determining disk space required for file system conversion...
Total disk space: 4009968 KB
Free space on volume: 3865920 KB
Space required for conversion: 26956 KB
Converting file system
Data error (cyclic redundancy check).
now copy the picture file again
dear
convert G: /FS:NTFS
The type of the file system is FAT32.
Volume MKHOMEBK created 22/08/2010 10:55 a.m.
Volume Serial Number is 6800-159F
Windows is verifying files and folders...
File and folder verification is complete.
Windows has checked the file system and found no problems.
4,097,818,624 bytes total disk space.
315,392 bytes in 6 hidden files.
159,744 bytes in 37 folders.
138,629,120 bytes in 373 files.
3,958,702,080 bytes available on disk.
4,096 bytes in each allocation unit.
1,000,444 total allocation units on disk.
966,480 allocation units available on disk.
Determining disk space required for file system conversion...
Total disk space: 4009968 KB
Free space on volume: 3865920 KB
Space required for conversion: 26956 KB
Converting file system
Data error (cyclic redundancy check).
now copy the picture file again
Friday, August 20, 2010
grant send as in exchange 2003
http://www.cryer.co.uk/brian/msexchange/exch_howto_grant_send_as.htm
interesting things is that it is done on the security of TAB
interesting things is that it is done on the security of TAB
Thursday, August 19, 2010
dump file reader in windows 7
http://windows7themes.net/how-to-open-dmp-files-in-windows-7.html
there seemed no simple dumpchk
download winsdk_web
then run it, and select tools in common
and install Debugging Tools for Windows (x86) if w7 is 32 bit
Open WinDBG
there seemed no simple dumpchk
download winsdk_web
then run it, and select tools in common
and install Debugging Tools for Windows (x86) if w7 is 32 bit
Open WinDBG
Wednesday, August 18, 2010
drama with a near new W7 pro HP pro 3000 MT PC
this is a new PC, ever since installed, it has problems. a couple of weeks ago, one memory module got replaced after memory errors logged in the eventvwr
but, in recent weeks, it started playing up again, freezing , slow network access, random reboot on bugcheck.
yeah, I should read those dump files. nothing in the action centre to suggest anything
first I thought it maybe some power settings problem, done some windows updates, some failed, then upgraded bios. upon restart, it wont boot into windows, it just kept restarting. tried to restore to yesterday, it failed citing a customer file corrupted. interesting as system restore suppose not to touch user data.
w7 builtin repair failed, error is badpatch, it can't recover.
w7 memory test indicated 1 of the 2 memory modules is faulty.
I called HP, telling him the serial # bumpmyhead. I asked the mainboard to be replaced. HP guy said 99% is memory, so he will send one memory module to the customer. what a disappointment as compared to be call useless cabling
I asked for two memory modules, no luck. yeah HP big boss is making big money, that's why.
so the PC still wont boot into windows 7 despite faulty memory pulled out.
shadow protect IT edition is used to take image of the stuffed w7.
there are 3 partitions, 1 - system 2- os 3- recovery, the 2nd one is the normal C: in windows
then the 2nd partition in the SP image was restored the PC, overwriting the C: drive.
the trick is dont tick active, MBR, do tick HIR install. hollyshit, the thing now boots into windows 7, yeah I can see the desktop now.
what a drama
but, in recent weeks, it started playing up again, freezing , slow network access, random reboot on bugcheck.
yeah, I should read those dump files. nothing in the action centre to suggest anything
first I thought it maybe some power settings problem, done some windows updates, some failed, then upgraded bios. upon restart, it wont boot into windows, it just kept restarting. tried to restore to yesterday, it failed citing a customer file corrupted. interesting as system restore suppose not to touch user data.
w7 builtin repair failed, error is badpatch, it can't recover.
w7 memory test indicated 1 of the 2 memory modules is faulty.
I called HP, telling him the serial # bumpmyhead. I asked the mainboard to be replaced. HP guy said 99% is memory, so he will send one memory module to the customer. what a disappointment as compared to be call useless cabling
I asked for two memory modules, no luck. yeah HP big boss is making big money, that's why.
so the PC still wont boot into windows 7 despite faulty memory pulled out.
shadow protect IT edition is used to take image of the stuffed w7.
there are 3 partitions, 1 - system 2- os 3- recovery, the 2nd one is the normal C: in windows
then the 2nd partition in the SP image was restored the PC, overwriting the C: drive.
the trick is dont tick active, MBR, do tick HIR install. hollyshit, the thing now boots into windows 7, yeah I can see the desktop now.
what a drama
Tuesday, August 17, 2010
command line to restart pop3 service in sbs 2003
net stop "Microsoft Exchange POP3"
net start "Microsoft Exchange POP3"
the name would be the name in the services.msc
net start "Microsoft Exchange POP3"
the name would be the name in the services.msc
Monday, August 16, 2010
MoneyWorks prints blank pages on HL-2040 Personal Laser Printer
after upgrading to XP Sp3, update HL2040 brother driver. well still print sometimes blank pages ... in MoneyWorks.exe
other prints are fine.... then MoneyWorks guys said their app, there is a compatibility problem with thast brother printer model...
HL-2040 Personal Laser Printer
other prints are fine.... then MoneyWorks guys said their app, there is a compatibility problem with thast brother printer model...
HL-2040 Personal Laser Printer
Sunday, August 15, 2010
Saturday, August 14, 2010
branchcache
branchcache
a. On the desktop, double-click Server Manager.
b. The Server Manager window opens. Maximize the window.
c. In the console pane, right-click Features, and then click Add Features.
d. The Add Features Wizard dialog box appears. Select BranchCache, and then click Next.
e. Click Install.
The Administrator: Command Prompt window opens. Type netsh BranchCache set service mode=hostedserver and then press ENTER.
netsh http add sslcert ipport=0.0.0.0:443 certhash= appid={d673f5ee-a714-454d-8de2-492e4c1bd8f8}, and then press ENTER.
BranchCache GPO, and then click Edit.
ll. The Group Policy Management Editor window opens. Maximize the window.
mm. In the console pane, under Computer Configuration, expand Policies | Administrative Templates | Network, and then click BranchCache.
nn. In the details pane, double-click Turn on BranchCache.
oo. The Turn on BranchCache window opens. Maximize the window.
pp. Click Enabled, and then click OK. Note: We’ll look at configuring and using Distributed Cache mode next, but here we’ll enable Hosted Cache mode, and then enter the fully qualified domain name of the server where the content will be cached.
qq. In the details pane, double-click Set BranchCache Hosted Cache mode.
rr. The Set BranchCache Hosted Cache mode window opens. Click Enabled.
ss. In the Enter the location of the hosted cache field, type sea-dc-01.corp.contoso.com, and then click OK. Note: Next, we’ll open some firewall ports on domain computers so that BranchCache content can be moved between clients and servers. Windows Firewall in Windows Server 2008 R2 and Windows 7 includes predefined BranchCache rule groups that you can use to open the ports needed by BranchCache. We will configure two settings right now. The first will be an inbound rule that allows HTTP traffic on port 80.
tt. In the console pane, expand Windows Settings | Security Settings | Windows Firewall with Advanced Security | Windows Firewall with Advanced Security, and then click Inbound Rules.
uu. Right-click Inbound Rules, and then click New Rule.
vv. The New Inbound Rule Wizard dialog box appears. Click Predefined.
ww. In the Predefined list, click BranchCache – Content Retrieval (Uses HTTP), and then click Next twice.
xx. Click Finish. Note: The second will allow HTTPS traffic on port 443, which is used to send the encrypted cached content between client and server.
yy. Right-click Inbound Rules, and then click New Rule.
zz. The New Inbound Rule Wizard dialog box appears. Click Predefined.
aaa. In the Predefined list, click BranchCache – Hosted Cache Server (Uses HTTPS), and then click Next twice.
bbb. Click Finish. Note: Next we’ll configure the same rules for outbound traffic. And that’s all we need to do on the server end.
ccc. In the console pane, click Outbound Rules.
ddd. Right-click Outbound Rules, and then click New Rule.
eee. The New Outbound Rule Wizard dialog box appears. Click Predefined.
fff. In the Predefined list, click BranchCache – Content Retrieval (Uses HTTP), and
then click Next twice.
ggg. Click Allow the connection, and then click Finish.
hhh. Right-click Outbound Rules, and then click New Rule.
iii. The New Outbound Rule Wizard dialog box appears. Click Predefined.
jjj. In the Predefined list, click BranchCache – Hosted Cache Server (Uses HTTPS), and then click Next twice.
kkk. Click Allow the connection, and then click Finish.
lll. Close the Group Policy Management Editor window.
mmm. Minimize the Group Policy Management window. Note: We’ll now update the Group Policy settings on this server. The settings will be applied automatically at the next refresh interval, but we want to make sure that they take effect immediately.
nnn. Restore the Command Prompt window.
ooo. Type gpupdate /force, and then press ENTER. Note: The netsh BranchCache show status all command enables us to verify that everything is configured correctly on the server. The things we want to look for are: the Hosted Cache location, sea-dc-01.corp.contoso.com; the active current cache size (currently 0 bytes); and whether the necessary firewall rules are in effect. Everything looks good, so let’s move to the client computers and try it out.
ppp. When the process completes, type netsh BranchCache show status all, and then press ENTER.
qqq. Scroll through the results as you discuss them.
rrr. Minimize the Command Prompt window.
a. On the desktop, double-click Server Manager.
b. The Server Manager window opens. Maximize the window.
c. In the console pane, right-click Features, and then click Add Features.
d. The Add Features Wizard dialog box appears. Select BranchCache, and then click Next.
e. Click Install.
The Administrator: Command Prompt window opens. Type netsh BranchCache set service mode=hostedserver and then press ENTER.
netsh http add sslcert ipport=0.0.0.0:443 certhash=
BranchCache GPO, and then click Edit.
ll. The Group Policy Management Editor window opens. Maximize the window.
mm. In the console pane, under Computer Configuration, expand Policies | Administrative Templates | Network, and then click BranchCache.
nn. In the details pane, double-click Turn on BranchCache.
oo. The Turn on BranchCache window opens. Maximize the window.
pp. Click Enabled, and then click OK. Note: We’ll look at configuring and using Distributed Cache mode next, but here we’ll enable Hosted Cache mode, and then enter the fully qualified domain name of the server where the content will be cached.
qq. In the details pane, double-click Set BranchCache Hosted Cache mode.
rr. The Set BranchCache Hosted Cache mode window opens. Click Enabled.
ss. In the Enter the location of the hosted cache field, type sea-dc-01.corp.contoso.com, and then click OK. Note: Next, we’ll open some firewall ports on domain computers so that BranchCache content can be moved between clients and servers. Windows Firewall in Windows Server 2008 R2 and Windows 7 includes predefined BranchCache rule groups that you can use to open the ports needed by BranchCache. We will configure two settings right now. The first will be an inbound rule that allows HTTP traffic on port 80.
tt. In the console pane, expand Windows Settings | Security Settings | Windows Firewall with Advanced Security | Windows Firewall with Advanced Security, and then click Inbound Rules.
uu. Right-click Inbound Rules, and then click New Rule.
vv. The New Inbound Rule Wizard dialog box appears. Click Predefined.
ww. In the Predefined list, click BranchCache – Content Retrieval (Uses HTTP), and then click Next twice.
xx. Click Finish. Note: The second will allow HTTPS traffic on port 443, which is used to send the encrypted cached content between client and server.
yy. Right-click Inbound Rules, and then click New Rule.
zz. The New Inbound Rule Wizard dialog box appears. Click Predefined.
aaa. In the Predefined list, click BranchCache – Hosted Cache Server (Uses HTTPS), and then click Next twice.
bbb. Click Finish. Note: Next we’ll configure the same rules for outbound traffic. And that’s all we need to do on the server end.
ccc. In the console pane, click Outbound Rules.
ddd. Right-click Outbound Rules, and then click New Rule.
eee. The New Outbound Rule Wizard dialog box appears. Click Predefined.
fff. In the Predefined list, click BranchCache – Content Retrieval (Uses HTTP), and
then click Next twice.
ggg. Click Allow the connection, and then click Finish.
hhh. Right-click Outbound Rules, and then click New Rule.
iii. The New Outbound Rule Wizard dialog box appears. Click Predefined.
jjj. In the Predefined list, click BranchCache – Hosted Cache Server (Uses HTTPS), and then click Next twice.
kkk. Click Allow the connection, and then click Finish.
lll. Close the Group Policy Management Editor window.
mmm. Minimize the Group Policy Management window. Note: We’ll now update the Group Policy settings on this server. The settings will be applied automatically at the next refresh interval, but we want to make sure that they take effect immediately.
nnn. Restore the Command Prompt window.
ooo. Type gpupdate /force, and then press ENTER. Note: The netsh BranchCache show status all command enables us to verify that everything is configured correctly on the server. The things we want to look for are: the Hosted Cache location, sea-dc-01.corp.contoso.com; the active current cache size (currently 0 bytes); and whether the necessary firewall rules are in effect. Everything looks good, so let’s move to the client computers and try it out.
ppp. When the process completes, type netsh BranchCache show status all, and then press ENTER.
qqq. Scroll through the results as you discuss them.
rrr. Minimize the Command Prompt window.
Friday, August 13, 2010
a user cannot open internet explorer
how does your customer know you take one day off ...
while he called twice about being not able to open ie.
in the event log, there is an entry about avg dll
so remove avg, and install ms security essentials, all good
while he called twice about being not able to open ie.
in the event log, there is an entry about avg dll
so remove avg, and install ms security essentials, all good
Thursday, August 12, 2010
Wednesday, August 11, 2010
how do I view email headers in outlook 2010
http://benosullivan.co.uk/windows/how-to-view-email-headers-in-outlook-2010/
open the email ... file ... info ... properties
open the email ... file ... info ... properties
Tuesday, August 10, 2010
http://www.virtualizationpractice.com/blog/?p=6422
MED-V is part of Microsoft’s Desktop Optimization Pack (MDOP). Bear in mind, MDOP is only available as a subscription for Software Assurance customers.
The MDOP suite has six components:
•Microsoft Enterprise Desktop Virtualization (MED-V) building on the engine that enables Windows Virtual PC, MED-V provides for deployment and management of virtual PC images which even Microsoft state is to primarily resolving application compatibility with a new version of Windows. If you’re considering migrating from Windows to another OS – MED-V is not an option.
•Microsoft Application Virtualization (App-V) turns most applications into centrally managed services that are never installed, never conflict, and are streamed on demand to end users: but not all applications, App-V is not a solution to deploy IE6 and IE7 for example.
•Microsoft Advanced Group Policy Management (AGPM) enhances governance and control over Group Policy through robust change management, versioning, and role-based administration: arguably functions that should not be an “add-on” but should be core to the service.
•Microsoft Asset Inventory Service (AIS) is a hosted service that collects software inventory data and translates it into actionable business intelligence; or ‘we’ll tell you what it is that you’ve got’ – although in all fairness – this is often a revelation.
•Microsoft Diagnostics and Recovery Toolset (DaRT) which is marketed as “reducing downtime by accelerating troubleshooting, repair, and data recovery of unbootable Windows-based desktops” but in all fairness – are you going to use this tool often? Will you regularly spend time troubleshooting a standardised build to a standardised desktop?
•Microsoft System Center Desktop Error Monitoring (DEM) provides insights into application and operating system failures, allowing helpdesk to be more proactive in managing PC problems, without installing an agent to the endpoint. It monitors failures and can help identify their causes and their resolutions. If you deploy DEM early, you can compare metrics before and after a rollout. This comparison can give you invaluable insight in to the impact of deployment: has the update made your environment, more or less, stable?
The MDOP suite has six components:
•Microsoft Enterprise Desktop Virtualization (MED-V) building on the engine that enables Windows Virtual PC, MED-V provides for deployment and management of virtual PC images which even Microsoft state is to primarily resolving application compatibility with a new version of Windows. If you’re considering migrating from Windows to another OS – MED-V is not an option.
•Microsoft Application Virtualization (App-V) turns most applications into centrally managed services that are never installed, never conflict, and are streamed on demand to end users: but not all applications, App-V is not a solution to deploy IE6 and IE7 for example.
•Microsoft Advanced Group Policy Management (AGPM) enhances governance and control over Group Policy through robust change management, versioning, and role-based administration: arguably functions that should not be an “add-on” but should be core to the service.
•Microsoft Asset Inventory Service (AIS) is a hosted service that collects software inventory data and translates it into actionable business intelligence; or ‘we’ll tell you what it is that you’ve got’ – although in all fairness – this is often a revelation.
•Microsoft Diagnostics and Recovery Toolset (DaRT) which is marketed as “reducing downtime by accelerating troubleshooting, repair, and data recovery of unbootable Windows-based desktops” but in all fairness – are you going to use this tool often? Will you regularly spend time troubleshooting a standardised build to a standardised desktop?
•Microsoft System Center Desktop Error Monitoring (DEM) provides insights into application and operating system failures, allowing helpdesk to be more proactive in managing PC problems, without installing an agent to the endpoint. It monitors failures and can help identify their causes and their resolutions. If you deploy DEM early, you can compare metrics before and after a rollout. This comparison can give you invaluable insight in to the impact of deployment: has the update made your environment, more or less, stable?
ato certificate for login
http://www.ato.gov.au/
this is a client cert as well, contains user password
this is a client cert as well, contains user password
Monday, August 9, 2010
in mdaemon copy certain emails to another user
in content filter , in the rules ...
from header like bp
copy to mike @ mydoomer.com
from header like bp
copy to mike @ mydoomer.com
Sunday, August 8, 2010
Microsoft Application Virtualization (APP-V)
Application Virtualization enables IT Professionals to deploy software applications that are never installed locally to minimize regression-testing time. This also allows applications to follow users to any PC, on demand. It turns Windows applications into centrally managed services that are delivered instantly to any desktop or laptop client.
MED-V and Virtual PC
Application compatibility is one of the main reasons that enterprises cite for the inability to upgrade to the latest version of Windows. They may have an important Line of Business application that must run in Windows XP, for example, or a critical intranet site that was built to run in Internet Explorer 6. MED-V takes application compatibility off the table as a blocker because it allows enterprise customers to run legacy applications seamlessly directly from a Windows 7 desktop. This allows end users to retain the productivity benefits of a modern operating system yet still enables them to use their legacy applications.
Customers often ask about the difference between MED-V and Virtual PC. Although Virtual PC provides many of the same features to end-users, MED-V gives IT Professionals the ability to centrally manage the virtual machines. This manageability is what makes MED-V a better choice for enterprise customers.
Customers often ask about the difference between MED-V and Virtual PC. Although Virtual PC provides many of the same features to end-users, MED-V gives IT Professionals the ability to centrally manage the virtual machines. This manageability is what makes MED-V a better choice for enterprise customers.
CCNP902
Chapter 1 Routing Services 1
Complex Enterprise Network Frameworks, Architectures, and Models 1
Traffic Conditions in a Converged Network 1
Cisco IIN and SONA Framework 3
Cisco IIN 3
Cisco SONA Framework 4
Cisco Network Models 6
Cisco Enterprise Architecture 6
Cisco Hierarchical Network Model 8
Cisco Enterprise Composite Network Model 9
Creating, Documenting, and Executing an Implementation Plan 13
Approaches to Creating an Implementation Plan 14
Creating an Implementation Plan 15
Implementation Plan Documentation 17
Implementation Plan Example 18
Example Network Scenario 18
Example Network Requirements 18
Example Network Implementation Plan 19
Reviewing IP Routing Principles 21
IP Routing Overview 22
Principles of Static Routing 22
Principles of Dynamic Routing 26
Principles of On-Demand Routing 28
Characteristics of Routing Protocols 30
Distance Vector, Link-State, and Advanced Distance Vector
Routing Protocols 30
Classful Routing Protocol Concepts 31
Classless Routing Protocol Concepts 35
RIPv2 and EIGRP Automatic Network-Boundary Summarization 35
RIP 38
Characteristics of RIPv1 38
Characteristics of RIPv2 38
RIP Configuration Commands 39
Populating the Routing Table 41
Administrative Distance 41
Routing Protocol Metrics 43
Criteria for Inserting Routes into the IP Routing Table 45
Floating Static Routes 45
IP Routing Protocol Comparisons 46
Routing and Routing Protocols Within the Enterprise Composite
Network Model 48
Summary 49
Review Questions 51
Chapter 2 Configuring the Enhanced Interior Gateway Routing Protocol 57
Understanding EIGRP Terminology and Operation 58
EIGRP Capabilities and Attributes 58
EIGRP Terminology 61
EIGRP Operation 63
Populating EIGRP Tables 63
EIGRP Packets 65
EIGRP Neighbors 67
Initial Route Discovery 69
DUAL 71
Advertised Distance and Feasible Distance 71
Successor and Feasible Successor 72
DUAL Example 75
EIGRP Metric Calculation 80
Planning EIGRP Routing Implementations 83
Configuring and Verifying EIGRP 84
Planning and Configuring Basic EIGRP 85
Planning for Basic EIGRP 85
Basic EIGRP Configuration 86
Basic Configuration Example 88
Another Basic EIGRP Configuration Example 89
Verifying EIGRP Operation 90
Verifying EIGRP Neighbors 93
Verifying EIGRP Routes 94
Verifying EIGRP Operations 96
Using the passive-interface Command with EIGRP 104
Propagating an EIGRP Default Route 107
EIGRP Route Summarization 109
Configuring Manual Route Summarization 110
Verifying Manual Route Summarization 112
Configuring and Verifying EIGRP in an Enterprise WAN 113
EIGRP over Frame Relay and on a Physical Interface 113
Frame Relay Overview 113
EIGRP on a Physical Frame Relay Interface with
Dynamic Mapping 114
EIGRP on a Frame Relay Physical Interface with Static Mapping 116
EIGRP over Frame Relay Multipoint Subinterfaces 118
Frame Relay Multipoint Subinterfaces 118
EIGRP over Multipoint Subinterfaces 119
EIGRP Unicast Neighbors 121
EIGRP over Frame Relay Point-to-Point Subinterfaces 123
Frame Relay Point-to-Point Subinterfaces 123
EIGRP on Frame Relay Point-to-Point Subinterfaces 123
EIGRP over MPLS 125
MPLS 125
MPLS Operation 126
Service Provider Offerings 127
Layer 2 and Layer 3 MPLS VPN Solutions 128
Layer 3 MPLS VPNs 128
Layer 2 MPLS VPNs 132
EIGRP Load Balancing 134
EIGRP Equal-Cost Load Balancing 134
EIGRP Unequal-Cost Load Balancing 136
EIGRP Bandwidth Use Across WAN Links 139
EIGRP Link Utilization 139
Examples of EIGRP on WANs 140
Configuring and Verifying EIGRP Authentication 144
Router Authentication 144
Simple Authentication Versus MD5 Authentication 144
MD5 Authentication for EIGRP 146
Planning for EIGRP Authentication 147
Configuring EIGRP MD5 Authentication 147
MD5 Authentication Configuration Example 148
Verifying MD5 Authentication for EIGRP 152
EIGRP MD5 Authentication Verification 153
Troubleshooting MD5 Authentication 154
Optimizing EIGRP Implementations 156
EIGRP Scalability in Large Networks 156
EIGRP Queries and Stuck-in-Active 158
Stuck-in-Active Connections in EIGRP 158
Preventing SIA Connections 160
EIGRP Query Range 161
Limiting the EIGRP Query Range 164
Graceful Shutdown 173
Summary 174
References 179
Review Questions 179
Chapter 3 Configuring the Open Shortest Path First Protocol 185
Understanding OSPF Terminology and Operation 186
Link-State Routing Protocols 186
OSPF Area Structure 188
OSPF Areas 191
Area Terminology 192
OSPF Adjacencies 193
OSPF Metric Calculation 195
Link-State Data Structures 196
OSPF Packets 197
Establishing OSPF Neighbor Adjacencies: Hello 199
Exchange Process and OSPF Neighbor Adjacency States 201
OSPF Neighbor States 204
Maintaining Routing Information 205
OSPF Link-State Sequence Numbers 207
Verifying Packet Flow 208
Configuring and Verifying Basic OSPF Routing 209
Planning and Configuring OSPF 209
Planning OSPF Routing Implementations 209
Configuring Basic OSPF 211
Single-Area OSPF Configuration Example 212
Multiarea OSPF Configuration Example 213
OSPF Router ID 214
Loopback Interfaces 215
OSPF router-id Command 215
Verifying the OSPF Router ID 216
Verifying OSPF Operations 217
The show ip ospf interface Command 218
The show ip ospf neighbor Command 219
The show ip route ospf Command 221
The show ip protocols Command 221
The debug ip ospf events Command 222
Understanding OSPF Network Types 222
Types of OSPF Networks 222
Electing a DR and BDR and Setting Priority 223
Adjacency Behavior for a Point-to-Point Link 224
Adjacency Behavior for a Broadcast Network 224
Adjacency Behavior over a Layer 2 MPLS VPN 225
Adjacency Behavior over a Layer 3 MPLS VPN 226
Adjacency Behavior for an NBMA Network 227
DR Election in an NBMA Topology 228
OSPF over Frame Relay Topology Options 228
OSPF over NBMA Topology Modes of Operation 229
Selecting the OSPF Network Type for NBMA Networks 229
OSPF Configuration in Cisco Broadcast Mode 231
OSPF Nonbroadcast Mode Configuration 231
OSPF Configuration in Point-to-Multipoint Mode 233
OSPF Configuration in Cisco Point-to-Multipoint
Nonbroadcast Mode 236
Using Subinterfaces in OSPF over Frame Relay Configuration 236
OSPF Configuration in Cisco Point-to-Point Mode 239
OSPF over NBMA Modes of Operation Summary 240
Displaying OSPF Adjacency Activity 241
Understanding OSPF LSAs 244
LSA Type 1: Router LSA 246
LSA Type 2: Network LSA 247
LSA Type 3: Summary LSA 247
LSA Type 4: Summary LSA 248
LSA Type 5: External LSA 249
Example OSPF LSAs in a Network 250
Interpreting the OSPF LSDB and Routing Table 250
OSPF LSDB 250
OSPF Routing Table and Types of Routes 254
Calculating the Costs of E1 and E2 Routes 255
Configuring OSPF LSDB Overload Protection 256
Configuring and Verifying Advanced OSPF Features 258
Using the passive-interface Command with OSPF 258
Propagating an OSPF Default Route 260
Configuring OSPF Route Summarization 263
Configuring Inter-area OSPF Route Summarization on an ABR 265
Interarea Route Summarization Configuration Example
on an ABR 266
Configuring External OSPF Route Summarization on an ASBR 267
External Route Summarization Configuration Example
on an ASBR 268
OSPF Virtual Links 269
Configuring OSPF Virtual Links 270
Verifying OSPF Virtual Link Operation 272
OSPF LSDB for Virtual Links 275
Changing the Cost Metric 278
Configuring OSPF Special Area Types 279
Configuring Stub Areas 281
Configuring Totally Stubby Areas 284
Interpreting Routing Tables in Different Types of OSPF Areas 286
Configuring NSSAs 289
Configuring Totally Stubby NSSAs 294
Example OSPF Area Types in a Network 295
Verifying All Area Types 296
Configuring and Verifying OSPF Authentication 297
Planning for OSPF Authentication 297
Configuring, Verifying, and Troubleshooting OSPF Simple Password
Authentication 297
Configuring OSPF Simple Password Authentication 297
Simple Password Authentication Example 299
Verifying Simple Password Authentication 300
Troubleshooting Simple Password Authentication 301
Configuring OSPF Simple Password Authentication for Virtual Links 304
Configuring, Verifying, and Troubleshooting MD5 Authentication 305
Configuring OSPF MD5 Authentication 305
MD5 Authentication Example 307
Verifying MD5 Authentication 308
Troubleshooting MD5 Authentication 309
Summary 311
References 314
Review Questions 315
Chapter 4 Manipulating Routing Updates 325
Assessing Network Routing Performance Issues 326
Routing Protocol Performance Issues 326
Routing Protocol Performance Solutions 327
Using Multiple IP Routing Protocols on a Network 329
Understanding a Network with Complex Routing 329
Understanding Route Redistribution 330
Redistribution Overview 330
Redistributed Routes 332
Redistribution Implementation Considerations 334
Selecting the Best Route in a Redistribution Environment 335
Redistribution Techniques 338
One-Point Redistribution 339
Multipoint Redistribution 340
Preventing Routing Loops in a Redistribution Environment 342
Implementing Route Redistribution 344
Configuring Route Redistribution 344
Redistributing into RIP 346
Redistributing into OSPF 347
Redistributing into EIGRP 350
The default-metric Command 352
The passive-interface Command 353
Route Redistribution Example 355
Using Administrative Distance to Influence
the Route-Selection Process 358
Selecting Routes with Administrative Distance 358
Modifying Administrative Distance 361
Redistribution Using Administrative Distance Example 363
Verifying Redistribution Operation 369
Controlling Routing Update Traffic 370
Static and Default Routes 371
Using Route Maps 373
Route Map Applications 373
Understanding Route Maps 374
Configuring Route Maps to Control Routing Updates 376
Configuring Route Maps for Policy Based Routing 377
Configuring Route Redistribution Using Route Maps 379
Using Route Maps with Redistribution 380
Using Route Maps to Avoid Route Feedback 381
Using Route Maps with Tags 382
Using Route Maps with Redistribution and Tags 382
Using Distribute Lists 384
Configuring Distribute Lists to Control Routing Updates 386
Controlling Redistribution with Distribute Lists 389
Using Prefix Lists 390
Prefix List Characteristics 390
Filtering with Prefix Lists 391
Configuring Prefix Lists 391
Verifying Prefix Lists 397
Using Multiple Methods to Control Routing Updates 398
Comprehensive Example of Controlling Routing Updates 398
Summary 412
References 415
Review Questions 416
Chapter 5 Implementing Path Control 419
Understanding Path Control 419
Assessing Path Control Network Performance 419
Path Control Tools 421
Implementing Path Control Using Offset Lists 424
Using Offset Lists to Control Path Selection 424
Configuring Path Control Using Offset Lists 424
Verifying Path Control Using Offset Lists 426
Implementing Path Control Using Cisco IOS IP SLAs 426
Using Cisco IOS IP SLAs to Control Path Selection 427
Cisco IOS IP SLAs Operation 429
Cisco IOS IP SLAs Sources and Responders 429
Cisco IOS IP SLAs Operations 430
Cisco IOS IP SLAs Operation with Responders 430
Cisco IOS IP SLAs with Responder Time Stamps 432
Configuring Path Control Using IOS IP SLAs 432
Configuring Cisco IOS IP SLAs Operations 433
Configuring Cisco IOS IP SLAs Tracking Objects 436
Configuring the Action Associated with the Tracking Object 436
Verifying Path Control Using IOS IP SLAs 437
Examples of Path Control Using Cisco IOS IP SLAs 438
Tracking Reachability to Two ISPs 438
Tracking DNS Server Reachability in the Two ISPs 440
Implementing Path Control Using Policy-Based Routing 446
Using PBR to Control Path Selection 447
Configuring PBR 448
PBR match Commands 448
PBR set Commands 449
Configuring PBR on an Interface 452
Verifying PBR 454
PBR Examples 454
Using PBR When Connecting Two ISPs 454
Using PBR Based on Source Address 457
Alternative Solution IP SLAs Configuration Example Using PBR 459
Advanced Path Control Tools 460
Cisco IOS Optimized Edge Routing 460
Virtualization 461
Cisco Wide Area Application Services 462
Summary 463
References 467
Review Questions 467
Chapter 6 Implementing a Border Gateway Protocol Solution for ISP Connectivity 471
BGP Terminology, Concepts, and Operation 471
Autonomous Systems 471
BGP Use Between Autonomous Systems 474
Comparison with Other Scalable Routing Protocols 475
Connecting Enterprise Networks to an ISP 477
Public IP Address Space 478
Connection Link Type and Routing 478
Connection Redundancy 482
Using BGP in an Enterprise Network 485
BGP Multihoming Options 486
Multihoming with Default Routes from All Providers 487
Multihoming with Default Routes and Partial Table from All Providers 488
Multihoming with Full Routes from All Providers 491
BGP Path Vector Characteristics 492
When to Use BGP 494
When Not to Use BGP 495
BGP Characteristics 495
BGP Neighbor Relationships 497
External BGP Neighbors 497
Internal BGP Neighbors 498
IBGP on All Routers in a Transit Path 500
IBGP in a Transit Autonomous System 500
IBGP in a Nontransit Autonomous System 501
BGP Partial-Mesh and Full-Mesh Examples 501
TCP and Full Mesh 502
Routing Issues If BGP Not on in All Routers in a Transit Path 503
BGP Synchronization 504
BGP Tables 506
BGP Message Types 508
Open and Keepalive Messages 508
Update Messages 509
Notification Messages 509
BGP Attributes 510
Well-Known Attributes 511
Optional Attributes 511
Defined BGP Attributes 512
The AS-Path Attribute 513
The Next-Hop Attribute 514
The Origin Attribute 517
The Local Preference Attribute 518
The Community Attribute 519
The MED Attribute 519
The Weight Attribute (Cisco Only) 520
The Route-Selection Decision Process 521
BGP Route-Selection Process 522
The Path-Selection Decision Process with a Multihomed
Connection 525
Configuring BGP 526
Planning BGP Implementations 527
Peer Groups 527
Entering BGP Configuration Mode 529
Defining BGP Neighbors and Activating BGP Sessions 529
Shutting Down a BGP Neighbor 531
Defining the Source IP Address 531
EBGP Multihop 534
Changing the Next-Hop Attribute 536
Defining the Networks That BGP Advertises 538
BGP Neighbor Authentication 540
Configuring BGP Synchronization 542
Resetting BGP Sessions 542
Hard Reset of BGP Sessions 543
Soft Reset of BGP Sessions Outbound 544
Soft Reset of BGP Sessions Inbound 544
BGP Configuration Examples 546
Basic BGP Examples 546
Peer Group Example 547
IBGP and EBGP Examples 549
Verifying and Troubleshooting BGP 552
show ip bgp Command Output Example 552
show ip bgp rib-failure Command Output Example 554
show ip bgp summary Command Output Example 554
debug ip bgp updates Command Output Example 556
Understanding and Troubleshooting BGP Neighbor States 557
Idle State Troubleshooting 558
Active State Troubleshooting 558
Established State 559
Basic BGP Path Manipulation Using Route Maps 559
BGP Path Manipulation 560
Changing the Weight 562
Changing the Weight for All Updates from a Neighbor 562
Changing the Weight Using Route Maps 562
Setting Local Preference 564
Changing Local Preference for All Routes 564
Local Preference Example 565
Changing Local Preference Using Route Maps 567
Setting the AS-Path 568
Setting the MED 570
Changing the MED for All Routes 571
Changing the MED Using Route Maps 572
Implementing BGP in an Enterprise Network 575
Filtering BGP Routing Updates 576
BGP Filtering Using Prefix Lists 578
Planning BGP Filtering Using Prefix Lists 578
BGP Filtering Using Prefix Lists Example 578
BGP Filtering Using Route Maps 580
Planning BGP Filtering Using Route Maps 580
BGP Filtering with Route Maps Example 580
Summary 582
References 587
Review Questions 587
Chapter 7 Implementing Routing Facilities for Branch Offices and Mobile Workers 591
Planning the Branch Office Implementation 591
Branch Office Design 591
Upgrade Scenario 595
Implementation Plan 596
Deploying Broadband Connectivity 597
Satellite Broadband Information 598
Cable Background Information 601
DSL Background Information 603
PPPoA 606
Configuring Static Routing 609
Routing to the Internet 611
Floating Static Route 615
Verifying Branch Services 618
Configuring NAT 619
Verifying NAT 623
Verifying Other Services 629
Verifying and Tuning IPsec VPNs 631
IPsec Technologies 632
Encapsulation Process 633
IPsec Site-to-Site VPN Configuration 635
ISAKMP Policy 636
IPsec Details 637
VPN Tunnel Information 637
VPN ACL 638
Apply the Crypto Map 638
Verifying an IPsec VPN 639
Impact on Routing 647
Configuring GRE Tunnels 647
Generic Routing Encapsulation 649
Configuring GRE 650
Example of GRE Configuration 652
Planning for Mobile Worker Implementations 661
Connecting a Mobile Worker 661
Components for Mobile Workers 662
Business-Ready Mobile Worker and VPN Options 663
Routing Traffic to the Mobile Worker 664
VPN Headend Configuration 665
Allowing IPsec Traffic 666
Defining Address Pools 670
Providing Routing Services for VPN Subnets 672
Tuning NAT for VPN Traffic Flows 675
Verifying IPsec VPN Configuration 677
Reviewing Alternatives for Mobile Worker Connectivity 683
Summary 685
References 688
Review Questions 688
Chapter 8 Implementing IPv6 in an Enterprise Network 691
Introducing IPv6 691
IPv4 Issues 692
Features of IPv6 693
IPv6 Packet Header 695
Extension Headers 696
MTU Discovery 698
IPv6 Addressing 698
IPv6 Addressing in an Enterprise Network 698
IPv6 Address Representation 700
Interface Identifiers in IPv6 Addresses 701
IPv6 Address Types 704
IPv6 Global Unicast Addresses 705
IPv6 Link-Local Unicast Addresses 707
IPv6 Site-Local Unicast Addresses: Deprecated 708
IPv6 Multicast Addresses 708
Solicited-Node Multicast Addresses 710
IPv6 Anycast Addresses 711
Comparing IPv6 Addresses with IPv4 Addresses 712
Configuring and Verifying IPv6 Unicast Addresses 716
IPv6 Unicast Address Configuration and Verification Commands 717
Static IPv6 Address Assignment 719
Static Global Aggregatable Address Assignment 719
Assigning Multiple Global Aggregatable Addresses 721
IPv6 Unnumbered Interfaces 723
Static Link-Local Address Assignment 723
Stateless Autoconfiguration of IPv6 Addresses 724
Unicast Connectivity on Different Connection Types 733
Unicast Connectivity on Broadcast Multiaccess Links 733
Unicast Connectivity on Point-to-Point Links 738
Unicast Connectivity on Point-to-Multipoint Links 742
Routing IPv6 Traffic 746
IPv6 Routing Protocols 747
Static Routing 747
Static Route Configuration and Verification Commands 747
Static Route Configuration and Verification Example 750
RIPng 751
RIPng Configuration and Verification Commands 752
RIPng Configuration and Verification Example 752
OSPFv3 759
Similarities Between OSPFv2 and OSPFv3 760
Differences Between OSPFv2 and OSPFv3 761
OSPFv3 Configuration and Verification Commands 763
OSPFv3 Configuration and Verification Examples 767
EIGRP for IPv6 773
EIGRP for IPv6 Configuration and Verification Commands 773
EIGRP for IPv6 Configuration and Verification Example 774
MBGP 782
MBGP Configuration and Verification Commands 783
MBGP Configuration and Verification Example 784
IPv6 Policy-Based Routing 785
IPv6 PBR Configuration and Verification Commands 785
IPv6 PBR Configuration and Verification Example 788
IPv6 Redistribution 791
RIPng Redistribution 791
RIPng and OSPFv3 Redistribution 799
RIPng, OSPFv3, and MBGP Redistribution 814
Transitioning IPv4 to IPv6 824
Dual Stack 826
Tunneling 828
Translation 829
Tunneling IPv6 Traffic 830
Manual IPv6 Tunnels 830
Manual IPv6 Tunnel Configuration and Verification Commands 831
Manual IPv6 Tunnel Configuration and Verification Example 832
GRE IPv6 Tunnels 838
GRE IPv6 Tunnel Configuration and Verification Commands 839
GRE IPv6 Tunnel Configuration and Verification Examples 839
6to4 Tunnels 846
6to4 Tunnel Configuration and Verification Commands 848
6to4 Tunnel Configuration and Verification Example 848
IPv4-Compatible IPv6 Tunnels 854
IPv4-Compatible IPv6 Tunnel Configuration and Verification Commands 854
IPv4-Compatible IPv6 Tunnel Configuration and Verification Example 854
ISATAP Tunnels 857
ISATAP Tunnel Configuration and Verification Commands 859
ISATAP Tunnel Configuration and Verification Example 859
Translation Using NAT-PT 864
Static NAT-PT for IPv6 865
Static NAT-PT Operation 865
Static NAT-PT Configuration and Verification Commands 866
Static NAT-PT Configuration and Verification Example 867
Dynamic NAT-PT for IPv6 871
Dynamic NAT-PT Configuration and Verification Commands 872
Dynamic NAT-PT Configuration and Verification Examples 873
Summary 885
References 897
Review Questions 897
Appendix A Answers to Review Questions 901
Online Supplemental Material:
Appendix B IPv4 Supplement
Appendix C BGP Supplement
Acronyms and Abbreviations
TOC, 9781587058820, 5/25/10
Complex Enterprise Network Frameworks, Architectures, and Models 1
Traffic Conditions in a Converged Network 1
Cisco IIN and SONA Framework 3
Cisco IIN 3
Cisco SONA Framework 4
Cisco Network Models 6
Cisco Enterprise Architecture 6
Cisco Hierarchical Network Model 8
Cisco Enterprise Composite Network Model 9
Creating, Documenting, and Executing an Implementation Plan 13
Approaches to Creating an Implementation Plan 14
Creating an Implementation Plan 15
Implementation Plan Documentation 17
Implementation Plan Example 18
Example Network Scenario 18
Example Network Requirements 18
Example Network Implementation Plan 19
Reviewing IP Routing Principles 21
IP Routing Overview 22
Principles of Static Routing 22
Principles of Dynamic Routing 26
Principles of On-Demand Routing 28
Characteristics of Routing Protocols 30
Distance Vector, Link-State, and Advanced Distance Vector
Routing Protocols 30
Classful Routing Protocol Concepts 31
Classless Routing Protocol Concepts 35
RIPv2 and EIGRP Automatic Network-Boundary Summarization 35
RIP 38
Characteristics of RIPv1 38
Characteristics of RIPv2 38
RIP Configuration Commands 39
Populating the Routing Table 41
Administrative Distance 41
Routing Protocol Metrics 43
Criteria for Inserting Routes into the IP Routing Table 45
Floating Static Routes 45
IP Routing Protocol Comparisons 46
Routing and Routing Protocols Within the Enterprise Composite
Network Model 48
Summary 49
Review Questions 51
Chapter 2 Configuring the Enhanced Interior Gateway Routing Protocol 57
Understanding EIGRP Terminology and Operation 58
EIGRP Capabilities and Attributes 58
EIGRP Terminology 61
EIGRP Operation 63
Populating EIGRP Tables 63
EIGRP Packets 65
EIGRP Neighbors 67
Initial Route Discovery 69
DUAL 71
Advertised Distance and Feasible Distance 71
Successor and Feasible Successor 72
DUAL Example 75
EIGRP Metric Calculation 80
Planning EIGRP Routing Implementations 83
Configuring and Verifying EIGRP 84
Planning and Configuring Basic EIGRP 85
Planning for Basic EIGRP 85
Basic EIGRP Configuration 86
Basic Configuration Example 88
Another Basic EIGRP Configuration Example 89
Verifying EIGRP Operation 90
Verifying EIGRP Neighbors 93
Verifying EIGRP Routes 94
Verifying EIGRP Operations 96
Using the passive-interface Command with EIGRP 104
Propagating an EIGRP Default Route 107
EIGRP Route Summarization 109
Configuring Manual Route Summarization 110
Verifying Manual Route Summarization 112
Configuring and Verifying EIGRP in an Enterprise WAN 113
EIGRP over Frame Relay and on a Physical Interface 113
Frame Relay Overview 113
EIGRP on a Physical Frame Relay Interface with
Dynamic Mapping 114
EIGRP on a Frame Relay Physical Interface with Static Mapping 116
EIGRP over Frame Relay Multipoint Subinterfaces 118
Frame Relay Multipoint Subinterfaces 118
EIGRP over Multipoint Subinterfaces 119
EIGRP Unicast Neighbors 121
EIGRP over Frame Relay Point-to-Point Subinterfaces 123
Frame Relay Point-to-Point Subinterfaces 123
EIGRP on Frame Relay Point-to-Point Subinterfaces 123
EIGRP over MPLS 125
MPLS 125
MPLS Operation 126
Service Provider Offerings 127
Layer 2 and Layer 3 MPLS VPN Solutions 128
Layer 3 MPLS VPNs 128
Layer 2 MPLS VPNs 132
EIGRP Load Balancing 134
EIGRP Equal-Cost Load Balancing 134
EIGRP Unequal-Cost Load Balancing 136
EIGRP Bandwidth Use Across WAN Links 139
EIGRP Link Utilization 139
Examples of EIGRP on WANs 140
Configuring and Verifying EIGRP Authentication 144
Router Authentication 144
Simple Authentication Versus MD5 Authentication 144
MD5 Authentication for EIGRP 146
Planning for EIGRP Authentication 147
Configuring EIGRP MD5 Authentication 147
MD5 Authentication Configuration Example 148
Verifying MD5 Authentication for EIGRP 152
EIGRP MD5 Authentication Verification 153
Troubleshooting MD5 Authentication 154
Optimizing EIGRP Implementations 156
EIGRP Scalability in Large Networks 156
EIGRP Queries and Stuck-in-Active 158
Stuck-in-Active Connections in EIGRP 158
Preventing SIA Connections 160
EIGRP Query Range 161
Limiting the EIGRP Query Range 164
Graceful Shutdown 173
Summary 174
References 179
Review Questions 179
Chapter 3 Configuring the Open Shortest Path First Protocol 185
Understanding OSPF Terminology and Operation 186
Link-State Routing Protocols 186
OSPF Area Structure 188
OSPF Areas 191
Area Terminology 192
OSPF Adjacencies 193
OSPF Metric Calculation 195
Link-State Data Structures 196
OSPF Packets 197
Establishing OSPF Neighbor Adjacencies: Hello 199
Exchange Process and OSPF Neighbor Adjacency States 201
OSPF Neighbor States 204
Maintaining Routing Information 205
OSPF Link-State Sequence Numbers 207
Verifying Packet Flow 208
Configuring and Verifying Basic OSPF Routing 209
Planning and Configuring OSPF 209
Planning OSPF Routing Implementations 209
Configuring Basic OSPF 211
Single-Area OSPF Configuration Example 212
Multiarea OSPF Configuration Example 213
OSPF Router ID 214
Loopback Interfaces 215
OSPF router-id Command 215
Verifying the OSPF Router ID 216
Verifying OSPF Operations 217
The show ip ospf interface Command 218
The show ip ospf neighbor Command 219
The show ip route ospf Command 221
The show ip protocols Command 221
The debug ip ospf events Command 222
Understanding OSPF Network Types 222
Types of OSPF Networks 222
Electing a DR and BDR and Setting Priority 223
Adjacency Behavior for a Point-to-Point Link 224
Adjacency Behavior for a Broadcast Network 224
Adjacency Behavior over a Layer 2 MPLS VPN 225
Adjacency Behavior over a Layer 3 MPLS VPN 226
Adjacency Behavior for an NBMA Network 227
DR Election in an NBMA Topology 228
OSPF over Frame Relay Topology Options 228
OSPF over NBMA Topology Modes of Operation 229
Selecting the OSPF Network Type for NBMA Networks 229
OSPF Configuration in Cisco Broadcast Mode 231
OSPF Nonbroadcast Mode Configuration 231
OSPF Configuration in Point-to-Multipoint Mode 233
OSPF Configuration in Cisco Point-to-Multipoint
Nonbroadcast Mode 236
Using Subinterfaces in OSPF over Frame Relay Configuration 236
OSPF Configuration in Cisco Point-to-Point Mode 239
OSPF over NBMA Modes of Operation Summary 240
Displaying OSPF Adjacency Activity 241
Understanding OSPF LSAs 244
LSA Type 1: Router LSA 246
LSA Type 2: Network LSA 247
LSA Type 3: Summary LSA 247
LSA Type 4: Summary LSA 248
LSA Type 5: External LSA 249
Example OSPF LSAs in a Network 250
Interpreting the OSPF LSDB and Routing Table 250
OSPF LSDB 250
OSPF Routing Table and Types of Routes 254
Calculating the Costs of E1 and E2 Routes 255
Configuring OSPF LSDB Overload Protection 256
Configuring and Verifying Advanced OSPF Features 258
Using the passive-interface Command with OSPF 258
Propagating an OSPF Default Route 260
Configuring OSPF Route Summarization 263
Configuring Inter-area OSPF Route Summarization on an ABR 265
Interarea Route Summarization Configuration Example
on an ABR 266
Configuring External OSPF Route Summarization on an ASBR 267
External Route Summarization Configuration Example
on an ASBR 268
OSPF Virtual Links 269
Configuring OSPF Virtual Links 270
Verifying OSPF Virtual Link Operation 272
OSPF LSDB for Virtual Links 275
Changing the Cost Metric 278
Configuring OSPF Special Area Types 279
Configuring Stub Areas 281
Configuring Totally Stubby Areas 284
Interpreting Routing Tables in Different Types of OSPF Areas 286
Configuring NSSAs 289
Configuring Totally Stubby NSSAs 294
Example OSPF Area Types in a Network 295
Verifying All Area Types 296
Configuring and Verifying OSPF Authentication 297
Planning for OSPF Authentication 297
Configuring, Verifying, and Troubleshooting OSPF Simple Password
Authentication 297
Configuring OSPF Simple Password Authentication 297
Simple Password Authentication Example 299
Verifying Simple Password Authentication 300
Troubleshooting Simple Password Authentication 301
Configuring OSPF Simple Password Authentication for Virtual Links 304
Configuring, Verifying, and Troubleshooting MD5 Authentication 305
Configuring OSPF MD5 Authentication 305
MD5 Authentication Example 307
Verifying MD5 Authentication 308
Troubleshooting MD5 Authentication 309
Summary 311
References 314
Review Questions 315
Chapter 4 Manipulating Routing Updates 325
Assessing Network Routing Performance Issues 326
Routing Protocol Performance Issues 326
Routing Protocol Performance Solutions 327
Using Multiple IP Routing Protocols on a Network 329
Understanding a Network with Complex Routing 329
Understanding Route Redistribution 330
Redistribution Overview 330
Redistributed Routes 332
Redistribution Implementation Considerations 334
Selecting the Best Route in a Redistribution Environment 335
Redistribution Techniques 338
One-Point Redistribution 339
Multipoint Redistribution 340
Preventing Routing Loops in a Redistribution Environment 342
Implementing Route Redistribution 344
Configuring Route Redistribution 344
Redistributing into RIP 346
Redistributing into OSPF 347
Redistributing into EIGRP 350
The default-metric Command 352
The passive-interface Command 353
Route Redistribution Example 355
Using Administrative Distance to Influence
the Route-Selection Process 358
Selecting Routes with Administrative Distance 358
Modifying Administrative Distance 361
Redistribution Using Administrative Distance Example 363
Verifying Redistribution Operation 369
Controlling Routing Update Traffic 370
Static and Default Routes 371
Using Route Maps 373
Route Map Applications 373
Understanding Route Maps 374
Configuring Route Maps to Control Routing Updates 376
Configuring Route Maps for Policy Based Routing 377
Configuring Route Redistribution Using Route Maps 379
Using Route Maps with Redistribution 380
Using Route Maps to Avoid Route Feedback 381
Using Route Maps with Tags 382
Using Route Maps with Redistribution and Tags 382
Using Distribute Lists 384
Configuring Distribute Lists to Control Routing Updates 386
Controlling Redistribution with Distribute Lists 389
Using Prefix Lists 390
Prefix List Characteristics 390
Filtering with Prefix Lists 391
Configuring Prefix Lists 391
Verifying Prefix Lists 397
Using Multiple Methods to Control Routing Updates 398
Comprehensive Example of Controlling Routing Updates 398
Summary 412
References 415
Review Questions 416
Chapter 5 Implementing Path Control 419
Understanding Path Control 419
Assessing Path Control Network Performance 419
Path Control Tools 421
Implementing Path Control Using Offset Lists 424
Using Offset Lists to Control Path Selection 424
Configuring Path Control Using Offset Lists 424
Verifying Path Control Using Offset Lists 426
Implementing Path Control Using Cisco IOS IP SLAs 426
Using Cisco IOS IP SLAs to Control Path Selection 427
Cisco IOS IP SLAs Operation 429
Cisco IOS IP SLAs Sources and Responders 429
Cisco IOS IP SLAs Operations 430
Cisco IOS IP SLAs Operation with Responders 430
Cisco IOS IP SLAs with Responder Time Stamps 432
Configuring Path Control Using IOS IP SLAs 432
Configuring Cisco IOS IP SLAs Operations 433
Configuring Cisco IOS IP SLAs Tracking Objects 436
Configuring the Action Associated with the Tracking Object 436
Verifying Path Control Using IOS IP SLAs 437
Examples of Path Control Using Cisco IOS IP SLAs 438
Tracking Reachability to Two ISPs 438
Tracking DNS Server Reachability in the Two ISPs 440
Implementing Path Control Using Policy-Based Routing 446
Using PBR to Control Path Selection 447
Configuring PBR 448
PBR match Commands 448
PBR set Commands 449
Configuring PBR on an Interface 452
Verifying PBR 454
PBR Examples 454
Using PBR When Connecting Two ISPs 454
Using PBR Based on Source Address 457
Alternative Solution IP SLAs Configuration Example Using PBR 459
Advanced Path Control Tools 460
Cisco IOS Optimized Edge Routing 460
Virtualization 461
Cisco Wide Area Application Services 462
Summary 463
References 467
Review Questions 467
Chapter 6 Implementing a Border Gateway Protocol Solution for ISP Connectivity 471
BGP Terminology, Concepts, and Operation 471
Autonomous Systems 471
BGP Use Between Autonomous Systems 474
Comparison with Other Scalable Routing Protocols 475
Connecting Enterprise Networks to an ISP 477
Public IP Address Space 478
Connection Link Type and Routing 478
Connection Redundancy 482
Using BGP in an Enterprise Network 485
BGP Multihoming Options 486
Multihoming with Default Routes from All Providers 487
Multihoming with Default Routes and Partial Table from All Providers 488
Multihoming with Full Routes from All Providers 491
BGP Path Vector Characteristics 492
When to Use BGP 494
When Not to Use BGP 495
BGP Characteristics 495
BGP Neighbor Relationships 497
External BGP Neighbors 497
Internal BGP Neighbors 498
IBGP on All Routers in a Transit Path 500
IBGP in a Transit Autonomous System 500
IBGP in a Nontransit Autonomous System 501
BGP Partial-Mesh and Full-Mesh Examples 501
TCP and Full Mesh 502
Routing Issues If BGP Not on in All Routers in a Transit Path 503
BGP Synchronization 504
BGP Tables 506
BGP Message Types 508
Open and Keepalive Messages 508
Update Messages 509
Notification Messages 509
BGP Attributes 510
Well-Known Attributes 511
Optional Attributes 511
Defined BGP Attributes 512
The AS-Path Attribute 513
The Next-Hop Attribute 514
The Origin Attribute 517
The Local Preference Attribute 518
The Community Attribute 519
The MED Attribute 519
The Weight Attribute (Cisco Only) 520
The Route-Selection Decision Process 521
BGP Route-Selection Process 522
The Path-Selection Decision Process with a Multihomed
Connection 525
Configuring BGP 526
Planning BGP Implementations 527
Peer Groups 527
Entering BGP Configuration Mode 529
Defining BGP Neighbors and Activating BGP Sessions 529
Shutting Down a BGP Neighbor 531
Defining the Source IP Address 531
EBGP Multihop 534
Changing the Next-Hop Attribute 536
Defining the Networks That BGP Advertises 538
BGP Neighbor Authentication 540
Configuring BGP Synchronization 542
Resetting BGP Sessions 542
Hard Reset of BGP Sessions 543
Soft Reset of BGP Sessions Outbound 544
Soft Reset of BGP Sessions Inbound 544
BGP Configuration Examples 546
Basic BGP Examples 546
Peer Group Example 547
IBGP and EBGP Examples 549
Verifying and Troubleshooting BGP 552
show ip bgp Command Output Example 552
show ip bgp rib-failure Command Output Example 554
show ip bgp summary Command Output Example 554
debug ip bgp updates Command Output Example 556
Understanding and Troubleshooting BGP Neighbor States 557
Idle State Troubleshooting 558
Active State Troubleshooting 558
Established State 559
Basic BGP Path Manipulation Using Route Maps 559
BGP Path Manipulation 560
Changing the Weight 562
Changing the Weight for All Updates from a Neighbor 562
Changing the Weight Using Route Maps 562
Setting Local Preference 564
Changing Local Preference for All Routes 564
Local Preference Example 565
Changing Local Preference Using Route Maps 567
Setting the AS-Path 568
Setting the MED 570
Changing the MED for All Routes 571
Changing the MED Using Route Maps 572
Implementing BGP in an Enterprise Network 575
Filtering BGP Routing Updates 576
BGP Filtering Using Prefix Lists 578
Planning BGP Filtering Using Prefix Lists 578
BGP Filtering Using Prefix Lists Example 578
BGP Filtering Using Route Maps 580
Planning BGP Filtering Using Route Maps 580
BGP Filtering with Route Maps Example 580
Summary 582
References 587
Review Questions 587
Chapter 7 Implementing Routing Facilities for Branch Offices and Mobile Workers 591
Planning the Branch Office Implementation 591
Branch Office Design 591
Upgrade Scenario 595
Implementation Plan 596
Deploying Broadband Connectivity 597
Satellite Broadband Information 598
Cable Background Information 601
DSL Background Information 603
PPPoA 606
Configuring Static Routing 609
Routing to the Internet 611
Floating Static Route 615
Verifying Branch Services 618
Configuring NAT 619
Verifying NAT 623
Verifying Other Services 629
Verifying and Tuning IPsec VPNs 631
IPsec Technologies 632
Encapsulation Process 633
IPsec Site-to-Site VPN Configuration 635
ISAKMP Policy 636
IPsec Details 637
VPN Tunnel Information 637
VPN ACL 638
Apply the Crypto Map 638
Verifying an IPsec VPN 639
Impact on Routing 647
Configuring GRE Tunnels 647
Generic Routing Encapsulation 649
Configuring GRE 650
Example of GRE Configuration 652
Planning for Mobile Worker Implementations 661
Connecting a Mobile Worker 661
Components for Mobile Workers 662
Business-Ready Mobile Worker and VPN Options 663
Routing Traffic to the Mobile Worker 664
VPN Headend Configuration 665
Allowing IPsec Traffic 666
Defining Address Pools 670
Providing Routing Services for VPN Subnets 672
Tuning NAT for VPN Traffic Flows 675
Verifying IPsec VPN Configuration 677
Reviewing Alternatives for Mobile Worker Connectivity 683
Summary 685
References 688
Review Questions 688
Chapter 8 Implementing IPv6 in an Enterprise Network 691
Introducing IPv6 691
IPv4 Issues 692
Features of IPv6 693
IPv6 Packet Header 695
Extension Headers 696
MTU Discovery 698
IPv6 Addressing 698
IPv6 Addressing in an Enterprise Network 698
IPv6 Address Representation 700
Interface Identifiers in IPv6 Addresses 701
IPv6 Address Types 704
IPv6 Global Unicast Addresses 705
IPv6 Link-Local Unicast Addresses 707
IPv6 Site-Local Unicast Addresses: Deprecated 708
IPv6 Multicast Addresses 708
Solicited-Node Multicast Addresses 710
IPv6 Anycast Addresses 711
Comparing IPv6 Addresses with IPv4 Addresses 712
Configuring and Verifying IPv6 Unicast Addresses 716
IPv6 Unicast Address Configuration and Verification Commands 717
Static IPv6 Address Assignment 719
Static Global Aggregatable Address Assignment 719
Assigning Multiple Global Aggregatable Addresses 721
IPv6 Unnumbered Interfaces 723
Static Link-Local Address Assignment 723
Stateless Autoconfiguration of IPv6 Addresses 724
Unicast Connectivity on Different Connection Types 733
Unicast Connectivity on Broadcast Multiaccess Links 733
Unicast Connectivity on Point-to-Point Links 738
Unicast Connectivity on Point-to-Multipoint Links 742
Routing IPv6 Traffic 746
IPv6 Routing Protocols 747
Static Routing 747
Static Route Configuration and Verification Commands 747
Static Route Configuration and Verification Example 750
RIPng 751
RIPng Configuration and Verification Commands 752
RIPng Configuration and Verification Example 752
OSPFv3 759
Similarities Between OSPFv2 and OSPFv3 760
Differences Between OSPFv2 and OSPFv3 761
OSPFv3 Configuration and Verification Commands 763
OSPFv3 Configuration and Verification Examples 767
EIGRP for IPv6 773
EIGRP for IPv6 Configuration and Verification Commands 773
EIGRP for IPv6 Configuration and Verification Example 774
MBGP 782
MBGP Configuration and Verification Commands 783
MBGP Configuration and Verification Example 784
IPv6 Policy-Based Routing 785
IPv6 PBR Configuration and Verification Commands 785
IPv6 PBR Configuration and Verification Example 788
IPv6 Redistribution 791
RIPng Redistribution 791
RIPng and OSPFv3 Redistribution 799
RIPng, OSPFv3, and MBGP Redistribution 814
Transitioning IPv4 to IPv6 824
Dual Stack 826
Tunneling 828
Translation 829
Tunneling IPv6 Traffic 830
Manual IPv6 Tunnels 830
Manual IPv6 Tunnel Configuration and Verification Commands 831
Manual IPv6 Tunnel Configuration and Verification Example 832
GRE IPv6 Tunnels 838
GRE IPv6 Tunnel Configuration and Verification Commands 839
GRE IPv6 Tunnel Configuration and Verification Examples 839
6to4 Tunnels 846
6to4 Tunnel Configuration and Verification Commands 848
6to4 Tunnel Configuration and Verification Example 848
IPv4-Compatible IPv6 Tunnels 854
IPv4-Compatible IPv6 Tunnel Configuration and Verification Commands 854
IPv4-Compatible IPv6 Tunnel Configuration and Verification Example 854
ISATAP Tunnels 857
ISATAP Tunnel Configuration and Verification Commands 859
ISATAP Tunnel Configuration and Verification Example 859
Translation Using NAT-PT 864
Static NAT-PT for IPv6 865
Static NAT-PT Operation 865
Static NAT-PT Configuration and Verification Commands 866
Static NAT-PT Configuration and Verification Example 867
Dynamic NAT-PT for IPv6 871
Dynamic NAT-PT Configuration and Verification Commands 872
Dynamic NAT-PT Configuration and Verification Examples 873
Summary 885
References 897
Review Questions 897
Appendix A Answers to Review Questions 901
Online Supplemental Material:
Appendix B IPv4 Supplement
Appendix C BGP Supplement
Acronyms and Abbreviations
TOC, 9781587058820, 5/25/10
Subscribe to:
Posts (Atom)