Access to the server via hostname linux virtual

Hello

I use Fusion Professional 6.0.2 and I have two questions:

1. I installed a virtual server CentOS 6.5 and another Openfiler.

I can't ssh access to machines through name of host or ping by host name. It is only possible via IP.

I won't change my hosts file or the virtual server hosts file.

The network of the virtual server is set to bridged mode. I use a router with DHCP active.

I have read that I need to enable "DHCP_HOSTNAME" in the virtual server DHCP client: Configuration Linux Clients DHCP static by sending host name

I tried and now I see the host name in the DHCP of the router table, but it still does not work.

If I do not select "send hostname", I don't even see the host name in the DHCP table.

* This question was also held in VMware ESXI free 5.5 VM, in which I installed linux VM.

2 resolution of the VMs is very low, and VMware Fusion is not automatically choose a higher resolution, even after the installation of the integration tools.

I restarted the virtual machines after the integration Tools installation.


Please help.

Thank you!

1. it seems that the solution is the following:

DNSMasq is required: DNSMasq as DHCP server - DD - WRT Wiki

I discovered that the machines virtual Linux must be configured to send the hostname to the DHCP server: Configuration Linux Clients DHCP static by sending host name

* The long answer: network - how to make a machine accessible from the LAN using its host name - Unix & Linux stack Exchange

2. it looks like 640 x 480, I guess.

Currently, I have a workaround: SSH to the virtual machine.

Edit: found the solution: #1 Linux: change the resolution to Console Mode on the GRUB - YouTube

Tags: VMware

Similar Questions

  • Firefox opens, but this morning, I can't access all the links via Firefox. I can through Explorer. I prefer Firefox. Help!

    Firefox opens, but this morning, I can't access all the links via Firefox. I can through Explorer.

    One possible cause is security software (firewall) that blocks or limits Firefox or plugin-container process without informing you, possibly after the detection of changes (update) for the Firefox program.

    Delete all rules for Firefox in the list of permissions in the firewall and leave your firewall again ask permission to get full unlimited access to the internet for Firefox and the plugin-container and the update process.

    See:

  • Access to the server vCenter Server security policy

    Scenario:

    Users must have different levels of access to virtual machines.  Some need only to be able to turn it on, restart and shut down the virtual machines.  Some need taking pictures, power on, power off, then restart.

    Others must be able to do anything.

    There is an existing Active Directory server.

    We do not want to overwhelm vCenter server with too many concurrent connections.  More than 3000 users must turn on and off the virtual machines and take snapshots.

    Less than 50 administrators full privileges in vCenter Server.

    We must use AD when it is possible to set up groups of users who have different privileges.

    What are the strategies to achieve this?  We should create a 'leap VMs' set in an area of special security for those who need access to vCenter Server to power on virtual machines and take pictures?

    What security products facilitate such scenarios?

    Subsequently vcloud or Automation Center vCenter vCenter Operations Manager will be used.  The solution must be able to integrate all the products of VMware management as opposed to replacing them.

    Thanks for your comments.

    Hello

    Actually, you are not generically allow access to a virtual machine, a console instead, if you allow access to a virtual machine that you want to monitor access very closely because it (other than RDP) console through the virtualization management services (ala vCenter). I would use tools such as HyTrust, Xceedium, Thycotic, etc. for monitor/audit access. Personally, I'm just saying my system administrators use RDP as it does not pass through the layers of virtualization management. If they need access CD for example, I provide other ways to access the ISOs of a common share (VCD, loop media) instead of asking someone to use vCenter.

    A poor man to get the same functionality is to create a proxy service that connects to all requests for access to the consoles and serves as additional security gateway in the virtualization management devices (ala vCenter). This way a request to go directly to the virtual console is properly logged and you can use this same proxy to make queries to Mount/unmount images, etc. By using a proxy, hytrust, Xceedium or Thycotic you can let him manage the 3000 user requests, limit the number of connections allowed at any time (which is a must), set timeouts, but especially you can delegate all through a service inside of vCenter account so that you can get the best control of your environment. Logging, these tools provide is enough to meet verification requirements.

    However, the best suggestion is to enable all simply do not. I have been broadcast to a virtual environment for years and I would order access to the console of a virtual computer was simply not necessary. You want a complete separation between the management of virtualization and the rest of the world.

    Best regards
    Edward L. Haletky
    VMware communities user moderator, VMware vExpert 2009, 2010, 2011,2012,2013,2014

    Author of the books ' VMWare ESX and ESXi in the business: Planning Server Virtualization Deployment, Copyright 2011 Pearson Education. ' Of VMware VSphere and Virtual Infrastructure Security: securing the virtual environment ', Copyright 2009 Pearson Education.

    Virtualization and Cloud Security Analyst: The Practice of virtualization, LLC - vSphere Upgrade Saga - virtualization security Table round Podcast

  • AppPortal error: remote access to the server is not enabled

    I'm lost on this one.

    Using the full client of AppPortal on a Win7 64 bit machine (version 8.0 of the customer)

    Double-click the icon, download authenticated - published applications show, then double click a published application, the end user receives:

    Remote access to the server is not enabled.

    This happens only on a single computer

    From this profile of users on the given computer I can MSTSC on the same server without problem

    The error also follows the profiles on the given computer.

    I have closed the Antivirus and Windows Firewall and still can not get this to work.

    Even uninstalled and reinstalled the client.

    From my computer, I can easily log in as this user.

    Customers get automatically configured through an XML file.

    After installation, I tested this laptop and he always gave the same error.

    I ended up him to give me the phone for a few hours.

    Uninstalled the version that was there (build 8.0.0.forget) and scoured the Windows Explorer for all left overs (a little here and there in user profiles and delete).

    Then scoured the registry for expressions; vWorkspace, Quest Software and Provision Networks and remove all instances

    Reinstalled all THE SUCCESS with the new connector to our servers (8.0.306.1427)

    Thanks for the help Dave

  • When we publish a Web site create in MUSE, the server must be linux? Please let me know because I have the problem with the form works... now the server that I use is the window...

    I am trying to publish in my domain on windows server, but I have a problem with the form...

    The server must be linux to work the form?

    Thanks in advance for your help...

    Thank you Brad... but how can I understand if a Linux server support? I try to do something in particular?

  • Access to the server of BC e-mail via a script?

    We would like to have a course of training automatically email the instructor when a student successfully completes the course/quiz. I can integrate the javascript code in the course to do, but it needs to interact with a script on the Server Web that would actually send the email. I can code this script, but the need for information on the Colombia-British mail server and what script language you use.  Can one tell me if the mail BC server can be accessed for this?  Thank you!

    I think that I have answered your question in your other post on the forum: http://forums.adobe.com/message/5368954#5368954

  • Access to the administration via VPN to 887 after config setup pro

    Hi all

    Ive just made a three 887w for a client in a few branches, and as this is the first time I have deployed these devices, I decided to go with the GUI (downloaded config pro 2.3) to get the configuration made that I had some constraints of time to get them in place (sometimes I go with the graphical interface first and then look back at the CLI to see what as its been) (, then hand it in Notepad to get a better understanding of the new features of the CLI may be gone and allowed).

    One thing I again, that I was going to do face was my first experience of the firewall IOS area type of config...

    At this point, I'm still unclear on the config (where why Im posting here I guess!) - but the main problem I have at the moment is with managing access to devices.

    Particularly with regard to access to the administration of headquarters inside the IP address of the branch routers.

    I should mention that the branch routers are connected to Headquarters by connections IPSec site-to-site VPN and these connections are all very good, all connectivity (PC server, PC, printer, etc.) is very well... I can also send packets (using the inside of the interface as a source) ping from branch routers to servers on the headquarters LAN.

    Set up access to administration using config pro to allow access to the router on the subnet headquarters (on its inside interface), as well as the local subnet and also SSH access to a specific host from the internet - the local subnet and the only host on the internet can access the router very well.

    I'm not sure if the problem is with the ZBF config or if its something really obvious Im missing! -Ive done routers branch several times previously, so with this being the first config ZBF I did, so I came to the conclusion that there must be something in the absence of my understanding.

    Any help greatly appreciated... sanitized config below!

    Thanks in advance

    Paul

    version 15.1
    no service button
    tcp KeepAlive-component snap-in service
    a tcp-KeepAlive-quick service
    horodateurs service debug datetime localtime show-timezone msec
    Log service timestamps datetime localtime show-timezone msec
    encryption password service
    sequence numbers service
    !
    hostname name-model
    !
    boot-start-marker
    boot-end-marker
    !
    logging buffered 51200
    recording console critical
    enable secret 5 xxxxxxxxxxxxxxxxxxxxxxxx
    !
    No aaa new-model
    !
    iomem 10 memory size
    clock timezone PCTime 0
    PCTime of summer time clock day March 30, 2003 01:00 October 26, 2003 02:00
    Service-module wlan-ap 0 autonomous bootimage
    !
    Crypto pki trustpoint TP-self-signed-2874941309
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 2874941309
    revocation checking no
    rsakeypair TP-self-signed-2874941309
    !
    !
    TP-self-signed-2874941309 crypto pki certificate chain
    certificate self-signed 01

    no ip source route
    !
    !
    DHCP excluded-address IP 10.0.0.1 10.0.0.63
    DHCP excluded-address IP 10.0.0.193 10.0.0.254
    !
    DHCP IP CCP-pool
    import all
    Network 10.0.0.0 255.255.255.0
    default router 10.0.0.1
    xxxxxxxxx.com domain name
    Server DNS 192.168.xx.20 194.74.xx.68
    Rental 2 0
    !
    !
    IP cef
    no ip bootp Server
    IP domain name xxxxxxx.com
    name of the server IP 192.168.XX.20
    name of the server IP 194.74.XX.68
    No ipv6 cef
    !
    !
    Authenticated MultiLink bundle-name Panel

    parameter-card type urlfpolicy websense cpwebpara0
    Server 192.168.xx.25
    source-interface Vlan1
    allow mode on
    parameter-card type urlf-glob cpaddbnwlocparapermit0
    model citrix.xxxxxxxxxxxx.com

    license udi pid xxxxxxxxxxx sn CISCO887MW-GN-E-K9
    !
    !
    username xxxxxxx privilege 15 secret 5 xxxxxxxxxxxxxxxxxxxxx
    username privilege 15 secret 5 xxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxx
    !
    !
    !
    !
    synwait-time of tcp IP 10
    !
    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-1
    game group-access 106
    type of class-card inspect entire game SDM_SHELL
    match the name of group-access SDM_SHELL
    type of class-card inspect entire game SDM_SSH
    match the name of group-access SDM_SSH
    type of class-card inspect entire game SDM_HTTPS
    match the name of group-access SDM_HTTPS
    type of class-card inspect all match sdm-mgmt-cls-0
    corresponds to the SDM_SHELL class-map
    corresponds to the SDM_SSH class-map
    corresponds to the SDM_HTTPS class-map
    type of class-card inspect entire game SDM_AH
    match the name of group-access SDM_AH
    type of class-card inspect entire game SDM_ESP
    match the name of group-access SDM_ESP
    type of class-card inspect entire game SDM_VPN_TRAFFIC
    match Protocol isakmp
    match Protocol ipsec-msft
    corresponds to the SDM_AH class-map
    corresponds to the SDM_ESP class-map
    type of class-card inspect the correspondence SDM_VPN_PT
    game group-access 105
    corresponds to the SDM_VPN_TRAFFIC class-map
    type of class-card inspect entire game PAC-cls-insp-traffic
    match Protocol cuseeme
    dns protocol game
    ftp protocol game
    h323 Protocol game
    https protocol game
    match icmp Protocol
    match the imap Protocol
    pop3 Protocol game
    netshow Protocol game
    Protocol shell game
    match Protocol realmedia
    match rtsp Protocol
    smtp Protocol game
    sql-net Protocol game
    streamworks Protocol game
    tftp Protocol game
    vdolive Protocol game
    tcp protocol match
    udp Protocol game
    inspect the class-map match PAC-insp-traffic type
    corresponds to the class-map PAC-cls-insp-traffic
    type of class-map urlfilter match - all cpaddbnwlocclasspermit0
    Server-domain urlf-glob cpaddbnwlocparapermit0 match
    type of class-card inspect entire game PAC-cls-icmp-access
    match icmp Protocol
    tcp protocol match
    udp Protocol game
    class-map type urlfilter websense match - all cpwebclass0
    match any response from the server
    type of class-card inspect correspondence ccp-invalid-src
    game group-access 100
    type of class-card inspect correspondence ccp-icmp-access
    corresponds to the class-ccp-cls-icmp-access card
    type of class-card inspect sdm-mgmt-cls-ccp-permit-0 correspondence
    corresponds to the class-map sdm-mgmt-cls-0
    game group-access 103
    type of class-card inspect correspondence ccp-Protocol-http
    http protocol game
    !
    !
    type of policy-card inspect PCB-permits-icmpreply
    class type inspect PCB-icmp-access
    inspect
    class class by default
    Pass
    type of policy-card inspect sdm-pol-VPNOutsideToInside-1
    class type inspect sdm-cls-VPNOutsideToInside-1
    inspect
    class class by default
    drop
    type of policy-card inspect urlfilter cppolicymap-1
    urlfpolicy websense cpwebpara0 type parameter
    class type urlfilter cpaddbnwlocclasspermit0
    allow
    Journal
    class type urlfilter websense cpwebclass0
    Server-specified-action
    Journal
    type of policy-map inspect PCB - inspect
    class type inspect PCB-invalid-src
    Drop newspaper
    class type inspect PCB-Protocol-http
    inspect
    service-policy urlfilter cppolicymap-1
    class type inspect PCB-insp-traffic
    inspect
    class class by default
    drop
    type of policy-card inspect PCB-enabled
    class type inspect SDM_VPN_PT
    Pass
    class type inspect sdm-mgmt-cls-ccp-permit-0
    inspect
    class class by default
    drop
    !
    security of the area outside the area
    safety zone-to-zone
    zone-pair security PAC-zp-self-out source destination outside zone auto
    type of service-strategy inspect PCB-permits-icmpreply
    zone-pair security PAC-zp-in-out source in the area of destination outside the area
    type of service-strategy inspect PCB - inspect
    source of PAC-zp-out-auto security area outside zone destination auto pair
    type of service-strategy inspect PCB-enabled
    sdm-zp-VPNOutsideToInside-1 zone-pair security source outside the area of destination in the area
    type of service-strategy inspect sdm-pol-VPNOutsideToInside-1
    !
    !
    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    ISAKMP crypto key address 194.105.xxx.xxx xxxxxxxxxxxx
    !
    !
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    !
    map SDM_CMAP_1 1 ipsec-isakmp crypto
    Description Tunnel to194.105.xxx.xxx
    the value of 194.105.xxx.xxx peer
    game of transformation-ESP-3DES-SHA
    match address VPN - ACL
    !
    !
    !
    !
    !
    interface BRI0
    no ip address
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    penetration of the IP stream
    encapsulation hdlc
    Shutdown
    Multidrop ISDN endpoint
    !
    ATM0 interface
    no ip address
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    penetration of the IP stream
    No atm ilmi-keepalive
    !
    point-to-point interface ATM0.1
    Description $ES_WAN$
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    penetration of the IP stream
    PVC 0/38
    aal5mux encapsulation ppp Dialer
    Dialer pool-member 1
    !
    !
    interface FastEthernet0
    !
    interface FastEthernet1
    !
    interface FastEthernet2
    !
    interface FastEthernet3
    !
    wlan-ap0 interface
    description of the Service interface module to manage the embedded AP
    IP unnumbered Vlan1
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    penetration of the IP stream
    ARP timeout 0
    !
    interface GigabitEthernet0 Wlan
    Description interface connecting to the AP the switch embedded internal
    !
    interface Vlan1
    Description $ETH - SW - LAUNCH, INTF-INFO-HWIC $$ $4ESW $FW_INSIDE$
    the IP 10.0.0.1 255.255.255.0
    IP access-group 104 to
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    penetration of the IP stream
    IP nat inside
    IP virtual-reassembly
    Security members in the box area
    IP tcp adjust-mss 1452
    !
    interface Dialer0
    Description $FW_OUTSIDE$
    IP address 81.142.xxx.xxx 255.255.xxx.xxx
    IP access-group 101 in
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    penetration of the IP stream
    NAT outside IP
    IP virtual-reassembly
    outside the area of security of Member's area
    encapsulation ppp
    Dialer pool 1
    Dialer-Group 1
    Authentication callin PPP chap Protocol
    PPP chap hostname xxxxxxxxxxxxxxxx
    PPP chap password 7 xxxxxxxxxxxxxxxxx
    No cdp enable
    map SDM_CMAP_1 crypto
    !
    IP forward-Protocol ND
    IP http server
    23 class IP http access
    local IP http authentication
    IP http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    !
    !
    IP nat inside source overload map route SDM_RMAP_1 interface Dialer0
    IP route 0.0.0.0 0.0.0.0 Dialer0
    !
    SDM_AH extended IP access list
    Note the category CCP_ACL = 1
    allow a whole ahp
    SDM_ESP extended IP access list
    Note the category CCP_ACL = 1
    allow an esp
    SDM_HTTP extended IP access list
    Note the category CCP_ACL = 0
    permit tcp any any eq www
    SDM_HTTPS extended IP access list
    Note the category CCP_ACL = 0
    permit any any eq 443 tcp
    SDM_SHELL extended IP access list
    Note the category CCP_ACL = 0
    permit tcp any any eq cmd
    SDM_SNMP extended IP access list
    Note the category CCP_ACL = 0
    allow udp any any eq snmp
    SDM_SSH extended IP access list
    Note the category CCP_ACL = 0
    permit tcp any any eq 22
    SDM_TELNET extended IP access list
    Note the category CCP_ACL = 0
    permit tcp any any eq telnet
    scope of access to IP-VPN-ACL list
    Note ACLs to identify a valuable traffic to bring up the VPN tunnel
    Note the category CCP_ACL = 4
    Licensing ip 10.0.0.0 0.0.0.255 192.168.xx.0 0.0.0.255
    Licensing ip 10.0.0.0 0.0.0.255 10.128.xx.0 0.0.255.255
    Licensing ip 10.0.0.0 0.0.0.255 160.69.xx.0 0.0.255.255
    !
    recording of debug trap
    Note category of access list 1 = 2 CCP_ACL
    access-list 1 permit 10.0.0.0 0.0.0.255
    access-list 23 allow 193.195.xxx.xxx
    Note access-list 23 category CCP_ACL = 17
    access-list 23 permit 192.168.xx.0 0.0.0.255
    access-list 23 allow 10.0.0.0 0.0.0.255
    Access-list 100 category CCP_ACL = 128 note
    access-list 100 permit ip 255.255.255.255 host everything
    access-list 100 permit ip 127.0.0.0 0.255.255.255 everything
    access-list 100 permit ip 81.142.xxx.xxx 0.0.0.7 everything
    Access-list 101 remark self-generated by SDM management access feature
    Note access-list 101 category CCP_ACL = 1
    access-list 101 permit tcp host 193.195.xxx.xxx host 81.142.xxx.xxx eq 22
    access-list 101 permit tcp host 193.195.xxx.xxx host 81.142.xxx.xxx eq 443
    access-list 101 permit tcp host 193.195.xxx.xxx host 81.142.xxx.xxx eq cmd
    access-list 101 tcp refuse any host 81.142.xxx.xxx eq telnet
    access-list 101 tcp refuse any host 81.142.xxx.xxx eq 22
    access-list 101 tcp refuse any host 81.142.xxx.xxx eq www
    access-list 101 tcp refuse any host 81.142.xxx.xxx eq 443
    access-list 101 tcp refuse any host 81.142.xxx.xxx eq cmd
    access-list 101 deny udp any host 81.142.xxx.xxx eq snmp
    access-list 101 permit ip 160.69.0.0 0.0.255.255 10.0.0.0 0.0.0.255
    access-list 101 permit ip 10.128.0.0 0.0.255.255 10.0.0.0 0.0.0.255
    access-list 101 permit ip 192.168.xx.0 0.0.0.255 10.0.0.0 0.0.0.255
    access-list 101 permit udp host 194.105.xxx.xxx host 81.142.xxx.xxx eq non500-isakmp
    access-list 101 permit udp host 194.105.xxx.xxx host 81.142.xxx.xxx eq isakmp
    access-list 101 permit host 194.105.xxx.xxx host 81.142.xxx.xxx esp
    access-list 101 permit ahp host 194.105.xxx.xxx host 81.142.xxx.xxx
    access list 101 ip allow a whole
    Note access-list 102 CCP_ACL category = 1
    access-list 102 permit ip 192.168.xx.0 0.0.0.255 everything
    access-list 102 permit ip host 193.195.xxx.xxx all
    access-list 102 permit ip 10.0.0.0 0.0.0.255 any
    Note access-list 103 self-generated by SDM management access feature
    Note access-list 103 CCP_ACL category = 1
    access-list 103 allow ip host 193.195.xxx.xxx host 81.142.xxx.xxx
    Note access-list 104 self-generated by SDM management access feature
    Note access-list 104 CCP_ACL category = 1
    access-list 104 permit tcp 192.168.xx.0 0.0.0.255 host 10.0.0.1 eq telnet
    access-list 104 permit tcp 10.0.0.0 0.0.0.255 host 10.0.0.1 eq telnet
    access-list 104 permit tcp 192.168.xx.0 0.0.0.255 eq on host 10.0.0.1 22
    access-list 104 permit tcp 10.0.0.0 0.0.0.255 host 10.0.0.1 eq 22
    access-list 104 permit tcp 192.168.xx.0 0.0.0.255 host 10.0.0.1 eq www
    access-list 104 permit tcp 10.0.0.0 0.0.0.255 eq to host 10.0.0.1 www
    access-list 104 permit tcp 192.168.xx.0 0.0.0.255 host 10.0.0.1 eq 443
    access-list 104 permit tcp 10.0.0.0 0.0.0.255 host 10.0.0.1 eq 443
    access-list 104 permit tcp 192.168.xx.0 0.0.0.255 host 10.0.0.1 eq cmd
    access-list 104 permit tcp 10.0.0.0 0.0.0.255 host 10.0.0.1 eq cmd
    access-list 104 tcp refuse any host 10.0.0.1 eq telnet
    access-list 104 tcp refuse any host 10.0.0.1 eq 22
    access-list 104 tcp refuse any host 10.0.0.1 eq www
    access-list 104 tcp refuse any host 10.0.0.1 eq 443
    access-list 104 tcp refuse any host 10.0.0.1 eq cmd
    access-list 104 deny udp any host 10.0.0.1 eq snmp
    104 ip access list allow a whole
    Note access-list 105 CCP_ACL category = 128
    access-list 105 permit ip host 194.105.xxx.xxx all
    Note access-list 106 CCP_ACL category = 0
    access-list 106 allow ip 192.168.xx.0 0.0.0.255 10.0.0.0 0.0.0.255
    access-list 106 allow ip 10.128.0.0 0.0.255.255 10.0.0.0 0.0.0.255
    access-list 106 allow ip 160.69.0.0 0.0.255.255 10.0.0.0 0.0.0.255
    Note category from the list of access-107 = 2 CCP_ACL
    access-list 107 deny ip 10.0.0.0 0.0.0.255 160.69.0.0 0.0.255.255
    access-list 107 deny ip 10.0.0.0 0.0.0.255 10.128.0.0 0.0.255.255
    access-list 107 deny ip 10.0.0.0 0.0.0.255 192.168.xx.0 0.0.0.255
    access-list 107 allow ip 10.0.0.0 0.0.0.255 any
    Dialer-list 1 ip protocol allow
    not run cdp

    !
    !
    !
    !
    allowed SDM_RMAP_1 1 route map
    corresponds to the IP 107
    !
    !
    control plan
    !
    !
    Line con 0
    local connection
    no activation of the modem
    line to 0
    line 2
    no activation-character
    No exec
    preferred no transport
    transport of entry all
    line vty 0 4
    access-class 102 in
    privilege level 15
    local connection
    transport input telnet ssh
    !
    Scheduler allocate 4000 1000
    Scheduler interval 500
    NTP-Calendar Update
    130.159.196.118 source Dialer0 preferred NTP server
    end

    Hi Paul,.

    Here is the relevant configuration:

    type of policy-card inspect PCB-enabled

    class type inspect sdm-mgmt-cls-ccp-permit-0
    inspect


    type of class-card inspect sdm-mgmt-cls-ccp-permit-0 correspondence
    corresponds to the class-map sdm-mgmt-cls-0
    game group-access 103


    type of class-card inspect all match sdm-mgmt-cls-0
    corresponds to the SDM_SHELL class-map
    corresponds to the SDM_SSH class-map
    corresponds to the SDM_HTTPS class-map


    type of class-card inspect entire game SDM_SHELL
    match the name of group-access SDM_SHELL
    type of class-card inspect entire game SDM_SSH
    match the name of group-access SDM_SSH

    type of class-card inspect entire game SDM_HTTPS
    match the name of group-access SDM_HTTPS


    SDM_SHELL extended IP access list
    Note the category CCP_ACL = 0

    permit tcp any any eq cmd
    SDM_SSH extended IP access list
    Note the category CCP_ACL = 0
    permit tcp any any eq 22
    SDM_HTTPS extended IP access list
    Note the category CCP_ACL = 0
    permit any any eq 443 tcp


    Note access-list 103 self-generated by SDM management access feature
    Note access-list 103 CCP_ACL category = 1
    access-list 103 allow ip host 193.195.xxx.xxx host 81.142.xxx.xxx

    The above configuration will allow you to access the router on the 81.142.xxx.xxx the IP address of the host 193.195.xxx.xxx using HTTPS/SSH/SHELL. To allow network 192.168.16.0/24 access to the router's IP 10.0.0.1, add another entry to the access list 103 as below:

    access-list 103 allow ip 192.168.16.0 0.0.0.255 host 10.0.0.1

    This should take enable access to this IP address for hosts using ssh and https. Try this out and let me know how it goes.

    Thank you and best regards,

    Assia

  • Access to the internet via 'comments' or another user account

    When I try to access the internet via the "guest" account, I get the message... "Internet explorer has stopped working"... and I can't accest internet from any other account on this computer, except the administrative account or 'guest'.  What gives?

    You mean any other admin account or standard account?
    This isn't a good idea to use the guest user account check this: http://technet.microsoft.com/en-us/library/bb418978.aspx
    Create a new standard user account to check.

  • Access to the server

    Hello

    Im trying to make a public Server Terminal Server from outside. I have a SonicWall firewall, but I can't connect to the DMZ server.

    I used the Connection Wizard to give public access to the terminal server, I changed the Port TS on the server and when I try to connect to public_ip:port the web displays an error like "Connection refused".

    Could you help me please? There's a tutorial about it?

    Thanks in advance.

    You need a loop return policy if you are trying to access the server by its public of the n/w internal IP address (IE behind the sonicwall).

    Below the video will help you with the political feedback loop.

    cs_setInnerHtml ('video_5745f812 - 4 c 21-4eea-8da2-bfc9afcb0fc9', ");

  • Win 7 Pro - make a name of user and password request when accessing to the server computer in the workgroup. Credentials, then considered non valid.

    Recently bought a Dell Dimension 3847 with Windows 7 Pro to replace a workstation that is connected to a network that uses Windows Server 2003. I already set up two other PC's (not same model) with Win 7 Pro, for existing users and had no problems whatsoever. The user of this workstation is an existing one (implemented as an administrator).  I've set up his account and she joined the working group. The other computers in the workgroup are listed under network location. However, when I tried to access the server computer in the Working Group, I got a pop-up window asking for a username and password. This would not have taken place. However, I entered the username and password for that particular user and received a message that the user name and password were not valid. I set up my user account (it has administrative privileges too), on this computer, joined the Working Group, Windows recognizes the other computers in the workgroup, but when I tried to access the server computer I got the same pop-up and had the same problem with my credentials not being recognized. While remaining under my user name, I tried and then access the server computer again but when I arrived at the prompt for the user name and password, I used the 'Administrator' user name with the appropriate password (the credentials used to connect to the server computer) and it worked. I registered to the account of the other user and used the same method to access the server and it worked as well. Any ideas why the user credentials, other than the administrator account, are not recognized?

    Hello

    Sorry for the late reply.

    This problem is better suited in the TechNet forum where we have experts working on the same topic.

    Please post your request in the below link:

    https://social.technet.Microsoft.com/forums/en-us/home

    I hope this information helps, get back to us if you need help with Windows.

    Thank you.

  • Not able to connect to the server via the AFN TCP

    Hi all

    After Googling carefully I finally decided to post my problem which is really sent me nightmares.

    In my application, I try to connect to a TCP server by using the operator of internet network and after the connection string

    URL = "socket: / /" + ip + ":" + port + ";" deviceside = true; connectionTimeout = 30000; APN =; tunnelauthusername =; tunnelauthpassword =; » ;

    I am able to connect to the internet using the phone's browser, but not able to connect to the TCP server via app.

    In my device APN authentication is disabled by default and the AFN, the name of user and password fields are white that's why I took these settings like white with a value in the connection string.

    When I try to connect via wifi network using the suite of string

    URL = "socket: / /" + ip + ":" + port + ";" deviceside = true; interface = wifi; connectionTimeout = 30000;

    I am able to connect to the server, but not in the case via the AFN.

    Please help me...

    I'm here just stuck and not finding a way out.

    Thank you

    Finally I found the solution to the problem...

    I used ConnectionFactory (network API) to connect to the TCP server and the used connection string is just

    'socket://127.0.0.1:8089 '.

    No need to specify the APN, user name, and password.

    Here's the code used

                     ConnectionFactory connFact = new ConnectionFactory();
                      ConnectionDescriptor connDesc;
                      connDesc = connFact.getConnection("socket://127.0.0.1:8087");
    
  • Direct connection on the desktop - clients still losing access when the server goes down or rebooted service

    I set up the connection to the server with a link Direct is TICKING, I did that once the initial connection has been made for the broker and an assigned desktop computer, connect directly to the desktop and so not care about the State of the connection to the server. After restart or just restart the VMware View Server service all customers lost access until it is facing up.

    Is it right, that we use View 3.1.

    Thank you

    It's strange that I can restart my server connection without worrying about all the users.   How brokers connection you have and do you have activated all at direct connection?

    If you have found this device or any other useful post please consider the use of buttons useful/correct to award points

  • Could not start the server via the SOA node Manager

    Hi all

    I try to install AIA 11.1.1.6.0 on top of the SOA Suite 11.1.1.6.0.

    I was able to install the weblogic, UCR, soa and osb servers server correctly. Now, before installing the AIA, the document I am following it says, make sure to start the server soa through the Manager of nodes.

    Now I start to the administrator of the server, then the node Manager, to make sure I checked the node Manager is in place, I logged the weblogic console, went to the Machines, and I see that it's upward and accessible.

    Now using WLST commands, first of all, I have connected to Manager nodes by using the nmConnect() command, so I try to start the server soa through node Manager with the command start ('soa_server1').

    I get an error when you try to start the server with the command nmStart() soa, below is the error message...

    «Error at startup server soa_server1: weblogic.nodemanager.NMException: Exception when starting Server «soa_server1»»

    I ran the command dumpStack(), and I get the output as 'no trace available battery.

    If I am able to start the server soa through the node Manager, I can go ahead and install the pack of AIA, but wrong to let me go forward.

    I also tried to boot the server from soa through the weblogic console, go to the servers tab, select the soa_server1 and start, the State of the soa server will "FAILED_NOT_RESTARTABLE".

    I followed some of those blogs like...

    http://Neeraj-SOA-tips.blogspot.com/2010/06/starting-admin-and-managed-servers.html

    http://www.javamonamour.org/2011/09/nmconnect-nmstart-nmkill.html

    Experts, please give your opinion.

    Thank you very much
    N

    Hi Patricia,

    I had exactly the same problem some time ago...

    The cause:
    There are two servers trying to run in debug mode and use the same debug port
    -Xrunjdwp: transport = dt_socket, address = 8453, server = y, suspend = n

    Possible solutions:
    1. turn off debugging (this is what I did)
    2 use the various debugging ports to different servers (difficult to do because the servers share the same scripts)

    What worked for me was:
    1. in % DOMAIN_HOME%\bin, I created a script called startWebLogic_nodebug.cmd with the following content:
    %CD%\bin\startWebLogic.cmd /nodebug % *.
    2. in nodemanager.properties, I changed the following property
    StartScriptName = startWebLogic_nodebug.cmd

    Now my servers start without debugging...

    I hope this helps.

    See you soon,.
    Vlad

  • Access to the customer via VNC in VMWare Server 2 (has that changed?)

    In earlier versions of VMWare server, it was possible to connect to a virtual computer remotely via a VNC client (or customer using this Protocol). Test with VMWare Server 2 that doesn't seem to work. I know that via the Web Interface, they start their own remote console player. Does anyone know if it uses another protocol of VNC (RFB) such as used previously? Actually now is no longer an open soluton?

    I think you should also add the RemoteDisplay.port = "5900" (or whatever port you want) as well.

  • Routing and remote access to the Server 2003

    I configured the remote access and routing service in my Server 2003 duly NAT enabled. All my clients are not in the field. All use internet and intranet connection using my proxy authentication provided by the administrator of the proxy server. I would like to restrict the clients except intranet connection. How to limit the customer?

    Post in the Windows Server Forums:
    http://social.technet.Microsoft.com/forums/en-us/category/WindowsServer/

Maybe you are looking for

  • Te2100 - want to format that partition regardless of XP

    I have a laptop Toshiba Te2100, running Windows XP Professional.It has a 40 GB hard drive that is partitioned into a C drive and a D drive. Drive C is about 8 GB and XP is installed on this partition. A few weeks ago, I tried to start the computer an

  • Satellite keys fn A500 does nothing after upgrade windows 7

    Hello world I use Satellite A500, which I just did the upgrade to windows 7 (32-bit) yesterday, however, I can use is no longer the FN key on the keyboard that I would use it very often. can anyone help? much appreciated! VMR

  • Satellite A210-1BW I can't activate the WLAN using FN + F8 key combination

    Hello All my new Toshiba notebook has been delivered, but now, I have a big problem... because I can't activate WLAN via the FN + F8 key combination... If I press on it I only see that WLAN is disabled... but I can't activate ist... you have a soluti

  • OfficeJet 4620: printer keeps going offline

    OfficeJet 4620 - printer keeps going offline.  If I turn it on and turn it on, it's online for a while, but it disconnects again.  My IPad can't print on it. My Windows laptop, 10 shows as offline.  I can open his web page by entering the IP address

  • Empty basket are not not in the program events

    I can't assign a sound to my trash emptying, because it is more listed in the program events as it was once. How do I add it to this list so I can assign a sound? I tried several Restore Points, but that has failed.