Connect IBM BladeCenter to the existing network
Hello world
I have a BladeCenter chassis with 2 blades installed with nortel esx 3.5 and 2 ethernet switches layer 2/3 and I'm testing how best to link this to my network environment.
I'm not a networking person, I just want to know how of uplink my blade going to my regular switches. My question is: what's the point of having 4nics by blade for balance so then I uplink my blade switches with a single 1 GB eth cable? What is the right way to do this?
Another thing, I noticed the configuration of VLAN is the following: consider that I used two external switches to test, I used a sw to test the lan and I attached a cable to each blade switch this switch and everything seems fine. then I used the other external switch to simulate my DMZ, I joined a new cable from each of the blade goes to this switch and a port goes into the FORWARDING State while the other is in a State of DEADLOCK. now, I would like to understand why this is happening.
Thank you for your help, these questions may seem very basic to you people, but as I said that I'm not a networking person, so be patient
A common way to do this would be to spend 2 x 2GbE trunks by blade, one of each truck at a different base switch. Maximizes availability and increases the throughput. There are many other things to consider so I suggest that read you on the VMware doco.
Dave
Tags: VMware
Similar Questions
-
Cannot set the Airport Extreme to extend the existing network
Network WiFi of my holiday home is provided by the router from my ISP (Time Warner). I have an Airport Extreme, which used to be configured to provide the WiFi network to another well, and I would use it to extend the existing on the TWC router network.
I had a lot of trouble to do a factory reset on the Airport Extreme, but I'm sure I managed (by turning on with the pressed reset button) after several attempts. At least the extreme doesn't show signs of the old network, he has provided.
When I try to set it up in the Airport utility, he wants only to create a new network. If I click on 'Other Options' and select 'Add to an existing network', the next screen is titled "This Airport Extreme will create a network" and prompts to enter a new network name and password. (Specifying the name of the network current generates an error because the network already exists, as I expect for the creation of a new network.)
Any ideas on how to tweak this Airport Extreme by extending a network?
TIA,
Doug
P.S. I have reviewed plugging extreme in one of the TWC router EtherNet ports and create its own WiFi network (with the advantage of adding support for 5 GHz), but the last time I tried I lost all connectivity; I'm afraid that the ISP network might protect against too broad network, although the glitch may have been a coincidence. If anyone has experience/ideas on this alternative configuration, I might be willing to try again.
AirPort Extreme would not be able to connect using a wireless connection and to extend the wireless network of the ISP, but if you can connect the AirPort Extreme to the ISP using a permanent router, wired Ethernet cable, then AirPort Extreme could be used to provide broader coverage of wireless in this way signal.
-
Addition of wireless routers in series with the existing network
I have a client who wants to add at least 3 Wireless throughout their existing network routers. The problem is that these routers must be in the same subnet as the existing network. Oh, we use routers Linksys WRT610N. By default, routers set up a new subnet with a DHCP assigned IP of the primary subnet. I was able to change the static WAN IP, but I do not know how to configure the rest. The point of this is that if a user connected via the ethernet cable or wireless signal, they should be able to access the same network resources. I chatted with support, but they are not allowed to help what it isn't is not a "standard" configuration Anyone can shed some light on this subject? I've done this before with another customer, but its been a few years and it's a different router.
Thank you!
You don't want a router. You want a wireless access point. You have wireless routers that you do not use as routers, but only as access points. A router by definition routes traffic between several subnets connected to the various interfaces (LAN and WAN). This kind of configuration is not what the WRT is built for and that's why support said you that it is not a standard configuration for a WRT.
You can use a WRT as simple access point.
Reconfigure the router via its web interface. Connect a computer to the router first.
1. set the LAN IP address on a free IP address in the existing network.
2. make sure NOT to set a static IP address on the type of internet connection.
3. on the main configuration page turn off the DHCP server.
4. now save the settings. You will lose the connection.
5. unplug the computer and one of the numbered LAN ports of wire to your existing network.Now you can access the web interface of the WRT to the new LAN IP address. All wired to the other 3 LAN ports and everything wirelessly connected has access to the network directly.
-
VPN IS CONNECTED BUT CANNOT ACCESS THE INTERNAL NETWORK
I tried to set up a simple customer vpn using this document
VPN IS CONNECTED BUT CANNOT ACCESS THE INTERNAL NETWORK BEHIND "RA"...
6.3 (5) PIX version
interface ethernet0 car
Auto interface ethernet1
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
activate the encrypted password of VmHKIhnF4Gs5AWk3
VmHKIhnF4Gs5AWk3 encrypted passwd
hostname VOIPLABPIX
domain voicelab.com
fixup protocol dns-length maximum 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol they 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol 2000 skinny
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names of
access-list 101 permit ip 172.10.2.0 255.255.255.0 172.10.3.0 255.255.255.0
access-list 101 permit ip 172.10.1.0 255.255.255.0 172.10.3.0 255.255.255.0
access-list 102 permit ip 172.10.2.0 255.255.255.0 172.10.3.0 255.255.255.0
access-list 102 permit ip 172.10.1.0 255.255.255.0 172.10.3.0 255.255.255.0
pager lines 24
Outside 1500 MTU
Within 1500 MTU
IP address outside 208.x.x.11 255.255.255.0
IP address inside 172.10.2.2 255.255.255.0
alarm action IP verification of information
alarm action attack IP audit
IP local pool voicelabpool 172.10.3.100 - 172.10.3.254
history of PDM activate
ARP timeout 14400
NAT (inside) - 0 102 access list
Route outside 0.0.0.0 0.0.0.0 208.x.x.11 1
Route inside 172.10.1.0 255.255.255.0 172.10.2.1 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
Sip timeout - disconnect 0:02:00 prompt Protocol sip-0: 03:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
AAA-server GANYMEDE + 3 max-failed-attempts
AAA-server GANYMEDE + deadtime 10
RADIUS Protocol RADIUS AAA server
AAA-server RADIUS 3 max-failed-attempts
AAA-RADIUS deadtime 10 Server
AAA-server local LOCAL Protocol
Enable http server
http 172.0.0.0 255.0.0.0 inside
http 0.0.0.0 0.0.0.0 inside
No snmp server location
No snmp Server contact
SNMP-Server Community public
No trap to activate snmp Server
enable floodguard
Permitted connection ipsec sysopt
Crypto ipsec transform-set esp-aes-256 trmset1, esp-sha-hmac
Crypto-map dynamic map2 10 set transform-set trmset1
map map1 10 ipsec-isakmp crypto dynamic map2
client authentication card crypto LOCAL map1
map1 outside crypto map interface
ISAKMP allows outside
ISAKMP identity address
part of pre authentication ISAKMP policy 10
ISAKMP policy 10 encryption aes-256
ISAKMP policy 10 sha hash
10 2 ISAKMP policy group
ISAKMP life duration strategy 10 86400
vpngroup address voicelabpool pool cuclab
vpngroup dns 204.x.x.10 Server cuclab
vpngroup cuclab by default-field voicelab.com
vpngroup split tunnel 101 cuclab
vpngroup idle 1800 cuclab-time
vpngroup password cuclab *.
Telnet timeout 5
SSH 208.x.x.11 255.255.255.255 outside
SSH 0.0.0.0 0.0.0.0 outdoors
SSH 172.10.1.2 255.255.255.255 inside
SSH timeout 60
Console timeout 0
username labadmin jNEF0yoDIDCsaoVQ encrypted password privilege 2
Terminal width 80
Cryptochecksum:b03a349e1ac9e6022432523bbb54504b
: end
Try to turn on NAT - T
PIX (config) #isakmp nat-traversal 20
http://www.Cisco.com/en/us/products/ps6120/products_tech_note09186a00807e0aca.shtml#Solution1
HTH
-
Client remote access VPN gets connected without access to the local network
: Saved
:
ASA 1.0000 Version 2
!
hostname COL-ASA-01
domain dr.test.net
turn on i/RAo1iZPOnp/BK7 encrypted password
i/RAo1iZPOnp/BK7 encrypted passwd
names of
!
interface GigabitEthernet0/0
nameif outside
security-level 0
IP 172.32.0.11 255.255.255.0
!
interface GigabitEthernet0/1
nameif inside
security-level 100
IP 192.9.200.126 255.255.255.0
!
interface GigabitEthernet0/2
Shutdown
No nameif
no level of security
no ip address
!
interface GigabitEthernet0/3
Shutdown
No nameif
no level of security
no ip address
!
interface GigabitEthernet0/4
Shutdown
No nameif
no level of security
no ip address
!
interface GigabitEthernet0/5
nameif failover
security-level 0
192.168.168.1 IP address 255.255.255.0 watch 192.168.168.2
!
interface Management0/0
nameif management
security-level 0
192.168.2.11 IP address 255.255.255.0
!
passive FTP mode
DNS server-group DefaultDNS
domain dr.test.net
network of the RAVPN object
192.168.0.0 subnet 255.255.255.0
network of the NETWORK_OBJ_192.168.200.0_24 object
192.168.200.0 subnet 255.255.255.0
network of the NETWORK_OBJ_192.9.200.0_24 object
192.9.200.0 subnet 255.255.255.0
the inside_network object-group network
object-network 192.9.200.0 255.255.255.0
external network object-group
host of the object-Network 172.32.0.25
Standard access list RAVPN_splitTunnelAcl allow 192.9.200.0 255.255.255.0
access-list extended test123 permit ip host 192.168.200.1 192.9.200.190
access-list extended test123 permit ip host 192.9.200.190 192.168.200.1
access-list extended test123 allowed ip object NETWORK_OBJ_192.168.200.0_24 192.9.200.0 255.255.255.0
192.9.200.0 IP Access-list extended test123 255.255.255.0 allow object NETWORK_OBJ_192.9.200.0_24
pager lines 24
management of MTU 1500
Outside 1500 MTU
Within 1500 MTU
failover of MTU 1500
local pool RAVPN 192.168.200.1 - 192.168.200.254 255.255.255.0 IP mask
no failover
ICMP unreachable rate-limit 1 burst-size 1
ASDM image disk0: / asdm - 66114.bin
don't allow no asdm history
ARP timeout 14400
NAT (inside, outside) source Dynamics one interface
NAT (it is, inside) static static source NETWORK_OBJ_192.9.200.0_24 destination NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.9.200.0_24
Route outside 0.0.0.0 0.0.0.0 172.32.0.2 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
identity of the user by default-domain LOCAL
the ssh LOCAL console AAA authentication
Enable http server
http 0.0.0.0 0.0.0.0 outdoors
http 0.0.0.0 0.0.0.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
outside_map interface card crypto outside
Crypto ca trustpoint ASDM_TrustPoint0
Terminal registration
name of the object CN = KWI-COL-ASA - 01.dr.test .net, C = US, O = KWI
Configure CRL
Crypto ikev1 allow outside
IKEv1 crypto policy 10
authentication crack
aes-256 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 20
authentication rsa - sig
aes-256 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 30
preshared authentication
aes-256 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 40
authentication crack
aes-192 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 50
authentication rsa - sig
aes-192 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 60
preshared authentication
aes-192 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 70
authentication crack
aes encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 80
authentication rsa - sig
aes encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 90
preshared authentication
aes encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 100
authentication crack
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 110
authentication rsa - sig
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 120
preshared authentication
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 130
authentication crack
the Encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 140
authentication rsa - sig
the Encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 150
preshared authentication
the Encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet 192.9.200.0 255.255.255.0 inside
Telnet timeout 30
SSH 0.0.0.0 0.0.0.0 management
SSH 0.0.0.0 0.0.0.0 outdoors
SSH 66.35.45.128 255.255.255.192 outside
SSH 0.0.0.0 0.0.0.0 inside
SSH timeout 30
SSH version 2
Console timeout 0
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
allow outside
AnyConnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
AnyConnect enable
tunnel-group-list activate
attributes of Group Policy DfltGrpPolicy
internal RAVPN group policy
RAVPN group policy attributes
value of server WINS 192.9.200.164
value of 66.35.46.84 DNS server 66.35.47.12
VPN-filter value test123
Ikev1 VPN-tunnel-Protocol
Split-tunnel-policy tunnelspecified
Split-tunnel-network-list value test123
Dr.kligerweiss.NET value by default-field
username test encrypted password xxxxxxx
username admin password encrypted aaaaaaaaaaaa privilege 15
vpntest Delahaye of encrypted password username
type tunnel-group RAVPN remote access
attributes global-tunnel-group RAVPN
address RAVPN pool
Group Policy - by default-RAVPN
IPSec-attributes tunnel-group RAVPN
IKEv1 pre-shared-key *.
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
Review the ip options
inspect the netbios
inspect the rsh
inspect the rtsp
inspect the skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect the tftp
inspect the sip
inspect xdmcp
!
global service-policy global_policy
context of prompt hostname
no remote anonymous reporting call
call-home
Profile of CiscoTAC-1
no active account
http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
email address of destination [email protected] / * /
destination-mode http transport
Subscribe to alert-group diagnosis
Subscribe to alert-group environment
Subscribe to alert-group monthly periodic inventory 2
Subscribe to alert-group configuration periodic monthly 2
daily periodic subscribe to alert-group telemetry
aes encryption password
Cryptochecksum:b001e526a239af2c73fa56f3ca7667ea
: end
COL-ASA-01 #.
Here is a shot made inside interface which can help as well, I've tried pointing the front door inside the interface on the target device, but I think it was a switch without ip route available on this subject I think which is always send package back to Cisco within the interface
Test of Cape COLLAR-ASA-01 # sho | in 192.168.200
25: 23:45:55.570618 192.168.200.1 > 192.9.200.190: icmp: echo request
29: 23:45:56.582794 192.168.200.1.137 > 192.9.200.164.137: udp 68
38: 23:45:58.081050 192.168.200.1.137 > 192.9.200.164.137: udp 68
56: 23:45:59.583176 192.168.200.1.137 > 192.9.200.164.137: udp 68
69: 23:46:00.573517 192.168.200.1 > 192.9.200.190: icmp: echo request
98: 23:46:05.578110 192.168.200.1 > 192.9.200.190: icmp: echo request
99: 23:46:05.590057 192.168.200.1.137 > 192.9.200.164.137: udp 68
108: 23:46:07.092310 192.168.200.1.137 > 192.9.200.164.137: udp 68
115: 23:46:08.592468 192.168.200.1.137 > 192.9.200.164.137: udp 68
116: 23:46:10.580795 192.168.200.1 > 192.9.200.190: icmp: echo request
COL-ASA-01 #.
Any help or pointers greatly appreciated, I have do this config after a long interval on Cisco of the last time I was working it was all PIX so just need to expert eyes to let me know if I'm missing something.
And yes I don't have a domestic network host to test against, all I have is a switch that cannot route and bridge default ip helps too...
Hello
The first thing you should do to avoid problems is to change the pool VPN to something else than the current LAN they are not really directly connected in the same network segment.
You can try the following changes
attributes global-tunnel-group RAVPN
No address RAVPN pool
no mask RAVPN 192.168.200.1 - 192.168.200.254 255.255.255.0 ip local pool
local pool RAVPN 192.168.201.1 - 192.168.201.254 255.255.255.0 IP mask
attributes global-tunnel-group RAVPN
address RAVPN pool
no nat (it is, inside) static source NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.168.200.0_24 static destination NETWORK_OBJ_192.9.200.0_24 NETWORK_OBJ_192.9.200.0_24
In the above you first delete the VPN "tunnel-group" Pool and then delete and re-create the VPN pool with another network and then insert the same "tunnel-group". NEX will remove the current configuration of the NAT.
the object of the LAN network
192.168.200.0 subnet 255.255.255.0
network of the VPN-POOL object
192.168.201.0 subnet 255.255.255.0
NAT (inside, outside) 1 static source LAN LAN to static destination VPN-VPN-POOL
NAT configurations above adds the correct NAT0 configuration for the VPN Pool has changed. It also inserts the NAT rule to the Summit before the dynamic PAT rule you currently have. He is also one of the problems with the configurations that it replaces your current NAT configurations.
You have your dynamic PAT rule at the top of your NAT rules currently that is not a good idea. If you want to change to something else will not replace other NAT configurations in the future, you can make the following change.
No source (indoor, outdoor) nat Dynamics one interface
NAT source auto after (indoor, outdoor) dynamic one interface
NOTICE! PAT dynamic configuration change above temporarily interrupt all connections for users on the local network as you reconfigure the dynamic State PAT. So if you make this change, make sure you that its ok to still cause little reduced in the current internal users connections
Hope this helps
Let me know if it works for you
-Jouni
-
UCS connection to the existing network fabric
Hello
I'm trying to get some new equipment:
2 - chassis with 4 blades of each
2 6248UP
1 - C240G - x 2 agile
2 - 3750 x 10gig expansion.
Currently, I have 3750's in a battery and intend to add these new 3750's existing battery. Can I connect the 10 g on the 3750 x directly to the fabric of interconnection to bring my new equipment into my existing network? I thought that this would be considered UCS Uplink Ethernet Ports.
The reason why I ask, I didn't know that I could not connect servers other than Cisco (IBM with 10 g cards) directly on the fabric and caused my second guess.
Thank you.
Hi mjensen
Fabric interconnection ports are 10 GB interfaces, then Yes, you can connect to the Cisco 3750 Switch via 10Gig ports. The only thing you want to make sure is that when plug you these devices in transceivers for use based on both ends. If you want to know the list of radios supported on the UCS 6248 take a look at the link below.
Supported transceivers
http://www.Cisco.com/c/en/us/TD/docs/unified_computing/UCS/HW/6200-insta...
You're right about UCSM you want to configure these ports Uplink Ethernet ports!
Now, the reason why you can not just plug another server ucs to the fabric of interconnection as you IBM server, because the interconnection of fabric does not work like a regular switch. Only one UCS server can be managed via the GUI UCSM.
Please let me know if it helps.
-
connect win 7 Home Prem Pavilion to the existing network of 98/xp
Try adding a Win7 Home Premium 64 HP Pavilion to an existing Win98 and WinXP computer network. He can see the Internet through the router and switches, but not the rest of the network. Is it possible so he could see the local network?
Hello Win7Newbie.
Using the features of home Workgroup/group or domain?
Nice day. -
Article 861122 start WZC
Unable to connect a computer to the network wirelee I firstly the WZC serviceand I need advice. TXHello
- Are you referring to Wireless Zero Configuration (WZC) Service?
- What happens when you start the automatic Wireless Configuration Service?
- You receive an error message?
If you experience problems with the wireless network, reconfigure the Automatic Configuration Wireless for all wireless profiles automatically, click the fix this toolfrom the link below.Click run in the file download dialog box, and then follow the steps in this wizard.See also:In Windows network connection issues -
WRT110-cant connect 2 computers to the wireless network at the same time
I recently got this modem-
It works very well with a computer, but if you are trying to connect to the network wirelessly with a second computer the connection is lost for both computers.
A computer is a macbook pro installed osx 10.5.7 is either a computer dell laptop on vista
First of all, you should get your router updated firmware...
Download 2.77 MB firmware...
Follow these steps to upgrade the firmware of the device: -.
Open a page in Internet Explorer browser on a computer hard wired to the router...
In the address bar type - 192.168.1.1... Leave the name blank username & password use admin lowercase...
Click the 'Administration' tab - then click on the 'Upgrade Firmware' under the tab-here, click on 'Browse' and navigate the .bin firmware file and click on "Upgrade"...
Wait a few seconds until it shows that "the update is successful," after the upgrade of the firmware, click on "Reboot" and you will be returned to the same page OR it will say 'cannot display the Page.Now reset your router:
Press and hold the button of reset for 30 seconds... Release the reset button... Unplug the power cable from your router, wait 30 seconds and reconnect the power cable... Now re - configure your router...If your Internet Service is cable follow this link
If your Internet Service is DSL follow this link
Open an Internet Explorer browser on your computer (desktop) wired page. In the address bar type - 192.168.1.1 and press ENTER...
Let the empty user name & password use admin lowercase...
For wireless settings, follow these steps: -.
Click on the Wireless tab
-Here, select manual configuration... Wireless network mode must be mixed...
-Provide a unique name in the name box of the wireless network (SSID) in order to differentiate your network from your network of neighbors...-Set the Standard - 20 MHz Radio band and change the Standard channel to 11-2, 462 GHz... Wireless SSID broadcast should be enabled and then click on save settings...
Please take note of the name of the wireless network (SSID) because it's the network identifier...
For wireless security: -.
Click the sub-tab under wireless > Wireless Security...
Change the mode of WEP wireless security, encryption must be 64-bit. Let the empty password, do not type in anything...
Under type of WEP Key 1 in all 10 numbers please (numbers only and no mailbox for example: your 10-digit phone number) and click on save settings...
Please note the 1 WEP key as it comes to the security key for the wireless network...Click the settings advanced wireless
Change the interval of tag to 75 > change the Fragmentation threshold to 2304, change the RTS threshold to 2304 > click 'save settings '...
Now let's see if you can locate your wireless network and try to connect... -
Connect 2 routers on the same network? !!
Hello
I can't get this to work...
I have a modem connected to the ground floor for internet cable.
I needed an extra blanket so I bought a linksys wrt120n to put on the floor.
It is connected directly to the modem downstairs via ethernet.
However I can't get them on the same network (or my clients at least)
I gave the same SSID and tried various things, but when it is connected to the linksys, sometimes I don't see the pc down and sometimes I can't! ???
Please, can someone give clear and easy to follow steps on how to get everything on the same network?
Thank you...
Here's how to connect several routers in your network. You need a LAN - LAN configuration so check all the computers together. If you use Internet-LAN, the network from the router won't be available outside of the unit.
-
Adding two new Windows 7 work stations to the existing network of WinServer 2008
I bought two new Windows 7 Professional - 64-bit (Dell Precision 3610) workstations. How to set up our server and domain? The server is running Windows Server 2008 R2 Standard. I must go to the permissions on the server to have new stations to be recognized? The new computers are the replacement of the existing jobs and will be connected to the ports of existing data.
Thank you.
Hello
The question you posted would be better suited in the TechNet Forums. I would recommend posting your query in the TechNet Forums.
TechNet Forum
http://social.technet.Microsoft.com/search/en-us/Windows?query=server%202008&refinement=1002&beta=0&AC=5Hope this information is helpful
-
ASA 5505 IPSEC VPN connected but cannot access the local network
ASA: 8.2.5
ASDM: 6.4.5
LAN: 10.1.0.0/22
Pool VPN: 172.16.10.0/24
Hi, we purcahsed a new ASA 5505 and try to configure IPSEC VPN via ASDM; I simply run the wizards, installation vpnpool, split tunnelling, etc.
I can connect to the ASA using the cisco VPN client and internet works fine on the local PC, but it can not access the local network (can not impossible. ping remote desktop). I tried the same thing on our Production ASA(those have both Remote VPN and Site-to-site VPN working), the new profile, I created worked very well.
Here is my setup, wrong set up anything?
ASA Version 8.2 (5)
!
hostname asatest
domain XXX.com
activate 8Fw1QFqthX2n4uD3 encrypted password
g9NiG6oUPjkYrHNt encrypted passwd
names of
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
nameif inside
security-level 100
IP 10.1.1.253 255.255.252.0
!
interface Vlan2
nameif outside
security-level 0
address IP XXX.XXX.XXX.XXX 255.255.255.240
!
passive FTP mode
clock timezone PST - 8
clock summer-time recurring PDT
DNS server-group DefaultDNS
domain vff.com
vpntest_splitTunnelAcl list standard access allowed 10.1.0.0 255.255.252.0
access extensive list ip 10.1.0.0 inside_nat0_outbound allow 255.255.252.0 172.16.10.0 255.255.255.0
pager lines 24
Enable logging
timestamp of the record
logging trap warnings
asdm of logging of information
logging - the id of the device hostname
host of logging inside the 10.1.1.230
Within 1500 MTU
Outside 1500 MTU
IP local pool 172.16.10.1 - 172.16.10.254 mask 255.255.255.0 vpnpool
no failover
ICMP unreachable rate-limit 1 burst-size 1
don't allow no asdm history
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 0-list of access inside_nat0_outbound
NAT (inside) 1 0.0.0.0 0.0.0.0
Route outside 0.0.0.0 0.0.0.0 XXX.XXX.XXX.XXX 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
AAA-server protocol nt AD
AAA-server host 10.1.1.108 AD (inside)
NT-auth-domain controller 10.1.1.108
Enable http server
http 10.1.0.0 255.255.252.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
outside_map interface card crypto outside
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH 10.1.0.0 255.255.252.0 inside
SSH timeout 20
Console timeout 0
dhcpd outside auto_config
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
internal group vpntest strategy
Group vpntest policy attributes
value of 10.1.1.108 WINS server
Server DNS 10.1.1.108 value
Protocol-tunnel-VPN IPSec l2tp ipsec
disable the password-storage
disable the IP-comp
Re-xauth disable
disable the PFS
IPSec-udp disable
IPSec-udp-port 10000
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list vpntest_splitTunnelAcl
value by default-domain XXX.com
disable the split-tunnel-all dns
Dungeon-client-config backup servers
the address value vpnpool pools
admin WeiepwREwT66BhE9 encrypted privilege 15 password username
username user5 encrypted password privilege 5 yIWniWfceAUz1sUb
the encrypted password privilege 3 umNHhJnO7McrLxNQ util_3 username
tunnel-group vpntest type remote access
tunnel-group vpntest General attributes
address vpnpool pool
authentication-server-group AD
authentication-server-group (inside) AD
Group Policy - by default-vpntest
band-Kingdom
vpntest group tunnel ipsec-attributes
pre-shared-key BEKey123456
NOCHECK Peer-id-validate
!
!
privilege level 3 mode exec cmd command perfmon
privilege level 3 mode exec cmd ping command
mode privileged exec command cmd level 3
logging of the privilege level 3 mode exec cmd commands
privilege level 3 exec command failover mode cmd
privilege level 3 mode exec command packet cmd - draw
privilege show import at the level 5 exec mode command
privilege level 5 see fashion exec running-config command
order of privilege show level 3 exec mode reload
privilege level 3 exec mode control fashion show
privilege see the level 3 exec firewall command mode
privilege see the level 3 exec mode command ASP.
processor mode privileged exec command to see the level 3
privilege command shell see the level 3 exec mode
privilege show level 3 exec command clock mode
privilege exec mode level 3 dns-hosts command show
privilege see the level 3 exec command access-list mode
logging of orders privilege see the level 3 exec mode
privilege, level 3 see the exec command mode vlan
privilege show level 3 exec command ip mode
privilege, level 3 see fashion exec command ipv6
privilege, level 3 see the exec command failover mode
privilege, level 3 see fashion exec command asdm
exec mode privilege see the level 3 command arp
command routing privilege see the level 3 exec mode
privilege, level 3 see fashion exec command ospf
privilege, level 3 see the exec command in aaa-server mode
AAA mode privileged exec command to see the level 3
privilege, level 3 see fashion exec command eigrp
privilege see the level 3 exec mode command crypto
privilege, level 3 see fashion exec command vpn-sessiondb
privilege level 3 exec mode command ssh show
privilege, level 3 see fashion exec command dhcpd
privilege, level 3 see the vpnclient command exec mode
privilege, level 3 see fashion exec command vpn
privilege level see the 3 blocks from exec mode command
privilege, level 3 see fashion exec command wccp
privilege see the level 3 exec command mode dynamic filters
privilege, level 3 see the exec command in webvpn mode
privilege control module see the level 3 exec mode
privilege, level 3 see fashion exec command uauth
privilege see the level 3 exec command compression mode
level 3 for the show privilege mode configure the command interface
level 3 for the show privilege mode set clock command
level 3 for the show privilege mode configure the access-list command
level 3 for the show privilege mode set up the registration of the order
level 3 for the show privilege mode configure ip command
level 3 for the show privilege mode configure command failover
level 5 mode see the privilege set up command asdm
level 3 for the show privilege mode configure arp command
level 3 for the show privilege mode configure the command routing
level 3 for the show privilege mode configure aaa-order server
level mode 3 privilege see the command configure aaa
level 3 for the show privilege mode configure command crypto
level 3 for the show privilege mode configure ssh command
level 3 for the show privilege mode configure command dhcpd
level 5 mode see the privilege set privilege to command
privilege level clear 3 mode exec command dns host
logging of the privilege clear level 3 exec mode commands
clear level 3 arp command mode privileged exec
AAA-server of privilege clear level 3 exec mode command
privilege clear level 3 exec mode command crypto
privilege clear level 3 exec command mode dynamic filters
level 3 for the privilege cmd mode configure command failover
clear level 3 privilege mode set the logging of command
privilege mode clear level 3 Configure arp command
clear level 3 privilege mode configure command crypto
clear level 3 privilege mode configure aaa-order server
context of prompt hostname
no remote anonymous reporting call
Cryptochecksum:447bbbc60fc01e9f83b32b1e0304c6b4
: end
Captures we can see packets going from the pool to the internal LAN, but we do not reply back packages.
The routing must be such that for 172.16.10.0/24 packages should reach the inside interface of the ASA.
On client machines or your internal LAN switch, you need to add route for 172.16.10.0/24 pointing to the inside interface of the ASA.
-
Connection to the existing network router
I have a linksys wrt54g ver3 and wrt310n router that I'm trying to connect to the internet through a router Cisco 71. Forgive me my network skills are weak... And I jump in the middle of it. The network went from a dynamic IP address provided by a server to a static IP address when the server has been deleted, it was the only way to keep most everything up and running. (Router LAN port cisco 71 to a switch selector to the WAN port or internet the wrt54g, and wrt310n)
When I enter the info in the router, I get ' gateway and the IP address is not even as a subnet mask. There are as follows:
IP:10.180.111.182
DG:67.211.68.1
dns216.234.161.25
DNS #2:216.194.64.160
subnet mask: 255.255.255.0I don't know where the last person got the static IP number from start... If it is to enter a computer works just fine.
I could change the static IP address 216.234.161.something to work? Or is there and other solution? He started address dynamic IP on the 54g does NOT work. Haven't tried the 310n I'm locked out I have to reset the 310n to set it up, someone changed the password on me. The interesting thing is, (I don't know what are the 310n parameters but it accesses the network but not the internet with changes, but 54 g just died without changing its settings...
I corrected thank you in any case.
After a little research
If having the IP address some how relates to the range of subnet mask (I don't know how)
and the default gateway has to mach some of the numbers of the ip address
Correct these number was all I had to do.
I do not understand how the range of numbers are affected and why but I do not see a pattern\
but thanks again
-
Connect TM wireless to an existing network
I want to connect my TM 2 to my net existing as a wireless client. My main router is not an Appleproduct but must stay as it is. My plan is to use TM connect my Synologi NAS with cable in room separat so I can have my TM and SIN away from my main router. I do not understand how to do this. So please help
The needs of the time Capsule to connect to a modem or a modem/router to the assistance of a permanent, wired cables Ethernet... just like the printed Installation Guide illustrates.
The only exception to this basic configuration would be if you have another router Apple producing wireless network, in which case the time Capsule could "extend" this network wireless.
If you are ready to add an AirPort Express, it could be possible to configure the AirPort Express to pick up the signal from your router wireless and the 'join' the network in this way. Then, it would be possible to have the Express send an Ethernet signal to the time Capsule . A configuration that is unusual to say the least.
Note that I used the word "peut" here twice. There is no guarantee that this type of configuration would work well for you.
-
When I want to connect to another computer with win Server 2003 computer that I invited with a confirmation of the administrator. the name of the Server 2003 computer is ofoghserver. When I enter username: ofoghserver\administrator and password this occure failuer Login error: a network unkwon or user password... but I can connect to the server with remote desktop and I can connect to another computer with windows 7. all computers in this good work, but this computer can not enter windows server.
Did you create the corresponding user account and the password on the server? If this isn't the case, you should do this. MS - MVP - Elephant Boy computers - don't panic!
Maybe you are looking for
-
How to install a certificate?
I need to install / import a certificate in order to access a website for which I have an account. How can I do this? Any help would be greatly appreciated.
-
MsiError 1627 then install application created with labview 2009
Hello I tried to install an application created with labview 2009, I have this fatal error ' MsiError 1627: 1: 2727 2: UsFile. Executable works fine while the installer does not work! UsFile is a Lvclass. I don't understand why I have this message. T
-
When I move the files TIFF image on a server (I work in a Museum of history) a machine remote, often impossible to open these reliable image files. Photoshop displays the message, "could not complete your request because it isn't the right kind of d
-
x 10 USB Receiver will not stay
I have this remote control. http://i.ebayimg.com/00/s/NDI2WDUwMA==/z/yUkAAOxymnRSHScz/ $T2eC16J,! ygE9s7HHohuBSHSczP5J! ~~60_35.JPG I am running windows 7 sp1 and when the computer is turn on/off the light on the receiver is on, but as soon as window
-
My newly created vmfs volume is the only version 3.46?
Hello, just trying to understand what is happening. I just created a new VMFS volume on my 5.0 (build 914586) and when I look at the version in vCenter it says that his version 3.46? When I look to the top of versioning it states my new volume shou