DDNS question

I have a Linksys E1000 wireless router and a Linksys home webcam which I often discover remote sites.   Because the ISP has changed the IP address once, I decided to sign up with dyndns.org and enable the DDNS service on the router in case it changes again.

My question is when and how many times the router updates the IP with dyndns.org?  Looking at my dyndns.org service log, the data is never updated, but of course the IP address has not changed.  So I am right to assume that information of dyndns.org is only updated when IP address changes?

I looked the site Web of Linksys and also the router help files information but have not found the answer.

Thanks in advance.

Well, I posted my original message on Usenet group alt.wireless.internet and received the following response which seems to answer the question:

http://dyn.com/support/abuse/>
   
Any update that affects the host name to a new IP address is considered
'good '. all other updates are considered useless and so 'excessive '.

This means that the router will only send updates when the
IP address change. I don't know how it works with the E1000, but in
DD - WRT, the current IP address is saved in NVRAM so that there
available between power cycles. The firmware checks every 2 hours
for a change. If the lease DHCP or PPPoE on the WAN port changes, it
also check a new IP address
address.  Only when there is a change, the fact
the router sending and update
DYNDNS.  That's why you won't see any
latest updates on the State of the DYNDNS
page.  I just checked my and
some of my customers IP addresses have not been
Update for many
months.

Jeff Liebermann [email protected]
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz, CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558

Tags: Linksys Routers

Similar Questions

  • DDNS - Port forwarding - DHCP

    I would like to open a few ports to allow access to some of the services that I have running and you want to keep it as simple as possible.  The variables I have in the game are:

    Laptop with several wireless (built in, an external wireless AC) as well as ethernet adapters.  The result is THREE MAC addresses as possible targets for each port that I need to pass.    I would like to be able to redirect the ports based on the computer name instead of the ip address/mac address.  From what I see, each MAC address will be a separate DHCP reservation and I wil be able to transfer to a SINGLE ip address.

    What I would do is to transfer the ports for the name of the machine, so the solution does not care how the machine is connected, just that it is connected and have the solution to associate the port of the host name instead of IP or Mac-based.

    My goal is to be able to reach my computer via VPN from outside or DDNS and use several services regardless of the way in which the computer is connected (ethernet, Wireless N or AC)

    Tips on the easiest way to set up or update as possible in the future, who can do this job? I already have DDNS and I know that VPN can happen later, but left the question of how to map the ports.

    Thank you!

    On this, I agree with DigitalDreamer. You can open ports via IP addresses with Linksys router. Using the ports which are not standard is a great way to secure your network. You can also set a static IP address on your laptop so that the ethernet and wireless adapter will use a single IP address. You should pay attention to what an interface is connected to your home network at all times, but that should work fine.

    Hope that helps

  • WRT610N and ddns

    Hello. Small question. I started to use the settings in the router rather than the pc. The ddns on the router automatically refreshes when your ISP changes your ip address?

    Yes. The router should automatically update whenever it changes. However, it seems in some versions of firmware there are bugs. And some versions of firmware do not update an entry DDNS after 30 days without change. Therefore, you must carefully test it...

  • VPN site2site & VPN client dailin on the question of a single interface

    Hello dear colleagues,

    First of all, the question of information subsequently:

    Setup

    C2801 race

    (C2801-ADVENTERPRISEK9-M), Version 12.4 (25f)

    ----------                                                    ----------

    | Central | Di1 IP:80.153.xxx.xxx | DISTANCE | IP: 91.218.xxx.xxx

    | Router | <----------------------------------------->     | Router |

    -IPsec via GRE Tu1 - works | Debian |

    ^                                                   |          |

    |                                                     ----------

    |    does not work

    |---------------------------------------->-------------------

    | Cisco VPN | Intellectual property: all

    | Customer |

    -------------------

    !

    AAA authentication login default local activate

    AAA authentication login local VPN_Users

    RADIUS group AAA authorization network default authenticated if

    AAA authorization VPN_Users LAN

    !

    AAA - the id of the joint session

    iomem 20 memory size

    clock timezone THIS 1

    clock summer-time EST recurring last Sun Mar 02:00 last Sun Oct 03:00

    IP cef

    !

    username myVPN secret 5

    !

    !

    crypto ISAKMP policy 1

    BA 3des

    preshared authentication

    Group 2

    life 3600

    address key crypto isakmp xauth No. 91.218.xxx.xxx

    ISAKMP crypto nat keepalive 20

    !

    Configuration group customer isakmp crypto VPN_dialin

    key

    DNS 192.168.198.4

    domain example.com

    pool VPN

    ACL VPN

    Crypto isakmp VPNclient profile

    match of group identity VPN_dialin

    client authentication list VPN_Users

    ISAKMP authorization list VPN_Users

    client configuration address respond

    !

    Crypto ipsec security association idle time 3600

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac hostb-transform

    transport mode

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-SHA-LZS, hmac-sha-esp esp - aes comp-lzs

    !

    !

    crypto dynamic-map vpn-dynamic-map 10

    game of transformation-ESP ESP-AES-128-SHA-AES-128-SHA-LZS

    Define VPNclient isakmp-profile

    !

    !

    !

    HostB-cryptomap 1 ipsec-isakmp crypto map

    the value of 91.218.xxx.xxx peer

    the transform-set hostb-transform value

    PFS group2 Set

    corresponds to hostb-address list

    !

    dynamic map crypto hostb-crytomap 65535-isakmp ipsec vpn-dynamic-map

    !

    !

    !

    !

    !

    !

    Tunnel1 interface

    bandwidth 100000

    IP vrf forwarding vl199

    IP 10.0.201.2 255.255.255.0

    IP 1400 MTU

    IP nat inside

    IP virtual-reassembly

    IP ospf network point

    source of Dialer1 tunnel

    destination 91.218.xxx.xxx tunnel

    bandwidth tunnel pass 10000

    bandwidth tunnel receive 50000

    !

    interface Dialer1

    Description # PPPoE T-Online.

    MTU 1492

    bandwidth 50000

    IP ddns update hostname it-s - dd.dyndns.org

    IP ddns update it-s-dd_dyndns_org

    the negotiated IP address

    NAT outside IP

    IP virtual-reassembly max-pumping 512

    encapsulation ppp

    IP tcp adjust-mss 1452

    no ip mroute-cache

    Dialer pool 1

    Dialer idle-timeout 0

    persistent Dialer

    KeepAlive 20

    No cdp enable

    Authentication callin PPP chap Protocol

    PPP chap hostname

    PPP chap password 7

    PPP pap sent-username password 7

    PPP ipcp dns request

    card crypto hostb-cryptomap

    Crypto ipsec fragmentation after encryption

    !

    !

    local pool IP VPN 192.168.196.30 192.168.196.60

    IP forward-Protocol ND

    IP route 0.0.0.0 0.0.0.0 Dialer1 track 1

    IP route 0.0.0.0 0.0.0.0 Tunnel1 20 Track3

    IP route 0.0.0.0 0.0.0.0 Dialer1 254

    IP route vrf vl199 0.0.0.0 0.0.0.0 192.168.1.251

    IP route vrf vl99 0.0.0.0 0.0.0.0 192.168.3.1

    !

    The dns server IP

    !

    no ip address of the http server

    no ip http secure server

    TCP-time translation nat IP 3600

    translation of nat IP udp-timeout 600

    IP nat Pat_for_192.168.198.4 192.168.198.4 pool 192.168.198.4 netmask 255.255.255.0 type

    IP nat Pat_for_192.168.200.50 192.168.200.50 pool 192.168.200.50 netmask 255.255.255.0 type

    IP nat inside source static 5060 udp interface 192.168.200.50 Dialer1 5060

    IP nat inside source static tcp 192.168.200.51 3389 3389 Dialer1 interface

    IP nat inside source static tcp 192.168.198.4 3389 interface Dialer1 3390

    IP nat inside source static tcp 192.168.198.9 interface 5000 Dialer1 5000

    IP nat inside source overload map route dialer1 interface Dialer1

    IP nat inside interface 13001 static udp 192.168.199.3 source Dialer1 13001

    IP nat inside interface 32768 static udp 192.168.179.2 source Dialer1 32768

    IP nat inside source static udp 192.168.179.2 Dialer1 49152 49152 interface

    IP nat inside interface 64206 static udp 192.168.179.2 source Dialer1 64206

    IP nat inside source static udp 192.168.179.2 interface 7597 Dialer1 7597

    IP nat inside source static tcp 192.168.179.2 9998 interface Dialer1 9998

    IP nat inside source static tcp 192.168.179.2 7597 interface Dialer1 7597

    IP nat inside source static tcp 192.168.179.2 64206 interface Dialer1 64206

    IP nat inside source static tcp 192.168.179.2 Dialer1 49152 49152 interface

    IP nat inside source static tcp 192.168.179.2 Dialer1 32768 32768 interface

    IP nat inside source static tcp 192.168.198.4 interface 443 443 Dialer1

    IP nat inside destination list Pat_for_192.168.198.4 pool Pat_for_192.168.198.4

    IP nat inside destination list Pat_for_192.168.200.50 pool Pat_for_192.168.200.50

    !

    Pat_for_192.168.198.4 extended IP access list

    Note = Pat_for_192.168.198.4 =-

    permit tcp any any eq www

    permit tcp any any eq 987

    permit tcp any any eq 143

    permit tcp any any eq 993

    permit tcp any any eq pop3

    permit tcp any any eq 995

    permit tcp any any eq 587

    permit tcp any any eq ftp

    permit tcp any any eq ftp - data

    permit tcp any any eq smtp

    Pat_for_192.168.200.50 extended IP access list

    Note = Pat_for_192.168.200.50 =-

    allow udp everything any 10000 20000 Beach

    permit tcp everything any 5222 5223 Beach

    allow udp any any eq 4569

    permit any any eq 5060 udp

    list of IP - VPN access scope

    IP 192.168.198.0 allow 0.0.0.255 192.168.196.0 0.0.0.255

    permit ip host 80.153.xxx.xxx 192.168.196.0 0.0.0.255

    list hostb extended IP access list

    permit ip host 91.218.xxx.xxx host 80.153.xxx.xxx

    permit ip host 80.153.xxx.xxx host 91.218.xxx.xxx

    permit ip host 10.0.201.2 10.0.201.1

    !

    !

    access-list 10 permit 192.168.200.6

    access-list 100 permit ip 192.168.0.0 0.0.255.255 everything

    access-list 100 permit ip 10.1.0.0 0.0.255.255 everything

    access-list 100 permit ip 10.0.0.0 0.0.255.255 everything

    access-list 101 permit ip 192.168.199.3 host everything

    access-list 101 permit ip 192.168.199.4 host everything

    access-list 101 permit ip 192.168.199.13 host everything

    access-list 101 permit ip 192.168.199.14 host everything

    access list 101 ip allow any host 204.13.162.123

    access-list 103 allow ip 10.0.1.0 0.0.0.255 any

    !

    dialer1 allowed 10 route map

    corresponds to the IP 100

    match interface Dialer1

    !

    !

    ####################################################################################################

    SH crypto isakmp his:

    status of DST CBC State conn-id slot

    91.218.xxx.xxx 80.153.xxx.xxx QM_IDLE 7 0 ACTIVE

    80.153.248.167 QM_IDLE 12 0 ASSETS

    ######################################################################################

    SH encryption session

    Current state of the session crypto

    Interface: Virtual-Access5

    The session state: down

    Peer: port of 91.218.xxx.xxx 500

    FLOW IPSEC: allowed ip host 10.0.201.2 10.0.201.1

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed ip host 80.153.xxx.xxx host 91.218.xxx.xxx

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed ip host 91.218.xxx.xxx host 80.153.xxx.xxx

    Active sAs: 0, origin: card crypto

    Interface: Dialer1

    The session state: UP-NO-IKE

    Peer: port of 91.218.xxx.xxx 500

    IKE SA: local 80.153.xxx.xxx/500 remote 91.218.xxx.xxx/500 inactive

    FLOW IPSEC: allowed ip host 10.0.201.2 10.0.201.1

    Active sAs: 0, origin: card crypto

    FLOW IPSEC: allowed ip host 80.153.xxx.xxx host 91.218.xxx.xxx

    Active sAs: 4, origin: card crypto

    FLOW IPSEC: allowed ip host 91.218.xxx.xxx host 80.153.xxx.xxx

    Active sAs: 0, origin: card crypto

    Interface: Dialer1

    The session state: IDLE-UP

    Peer: port of 55033

    ITS IKE: local 80.153.xxx.xxx/4500 distance 55033 Active

    ################################################################################################################################

    Error message:

    020932: 2 Oct 21:55:14.459 CEST: IPSEC (validate_transform_proposal): No IPSEC cryptomap is to address local 80.153.xxx.xxx

    020933: 2 Oct 21:55:14.459 CEST: IPSEC (validate_proposal_request): part #1 of the proposal

    (Eng. msg key.) Local INCOMING = 80.153.xxx.xxx, distance =,.

    local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    remote_proxy = 192.168.196.32/255.255.255.255/0/0 (type = 1),

    Protocol = ESP, transform = esp - esp-md5-hmac (Tunnel-UDP).

    lifedur = 0 and 0kb in

    SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 400

    020934: 2 Oct 21:55:14.459 CEST: IPSEC (validate_transform_proposal): No IPSEC cryptomap is to address local 80.153.xxx.xxx

    020935: 2 Oct 21:55:14.459 CEST: IPSEC (validate_proposal_request): part #1 of the proposal

    (Eng. msg key.) Local INCOMING = 80.153.xxx.xxx, distance = ,.

    local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),

    remote_proxy = 192.168.196.32/255.255.255.255/0/0 (type = 1),

    Protocol = ESP, transform = null esp esp-md5-hmac (Tunnel-UDP).

    lifedur = 0 and 0kb in

    SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 400

    #################################################################################################

    I tried to understand where is my mistake, can someone help me find it?

    Thank you very much

    concerning

    crypto map hostb-crytomap 65535 ipsec-isakmp dynamic vpn-dynamic-map

    is the fault of typing in the name as in your original config?

    --
    Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
    http://www.Kiva.org/invitedBy/karsteni

  • Questions of implementation of VPN IPSec 887-&gt; srp527

    Hey people,

    I have a few problems to an ipsec tunnel between a cisco 887VA router and a cisco srp527w router.

    I have a few books and some example materials. I worked through many combinations of what I had and I'm still a bit hard.

    I look at the results of debugging and it seems that policies do not correspond between devices:

    05:44:37.759 Jul 23: ISAKMP (0): received packet of 500 Global 500 (R) sport dport XXX.XXX.XXX.XXX MM_NO_STATE

    broute1 #.

    05:44:57.079 Jul 23: ISAKMP: (0): purge SA., his 85247558, delme = 85247558 =

    broute1 #.

    05:45:17.031 Jul 23: ISAKMP (0): received packet of XXX.XXX.XXX.XXX dport 500 sport 500 global (N) SA NEWS

    05:45:17.031 Jul 23: ISAKMP: created a struct peer XXX.XXX.XXX.XXX, peer port 500

    05:45:17.035 Jul 23: ISAKMP: new position created post = 0x8838C3F8 peer_handle = 0x800021CF

    05:45:17.035 Jul 23: ISAKMP: lock struct 0x8838C3F8, refcount 1 to peer crypto_isakmp_process_block

    05:45:17.035 Jul 23: ISAKMP: 500 local port, remote port 500

    05:45:17.035 Jul 23: ISAKMP: (0): insert his with his 87 84664 = success

    05:45:17.035 Jul 23: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH

    05:45:17.035 Jul 23: ISAKMP: (0): former State = new State IKE_READY = IKE_R_MM1

    Jul 23 05:45:17.035: ISAKMP: (0): treatment ITS payload. Message ID = 0

    Jul 23 05:45:17.035: ISAKMP: (0): load useful vendor id of treatment

    Jul 23 05:45:17.035: ISAKMP: (0): provider ID seems the unit/DPD but important shift 0

    Jul 23 05:45:17.035: ISAKMP: (0): load useful vendor id of treatment

    Jul 23 05:45:17.035: ISAKMP: (0): provider ID is DPD

    05:45:17.035 Jul 23: ISAKMP: (0): no pre-shared with XXX.XXX.XXX.XXX!

    05:45:17.035 Jul 23: ISAKMP: analysis of the profiles for xauth...

    05:45:17.035 Jul 23: ISAKMP: (0): audit ISAKMP transform against the policy of priority 1 0

    05:45:17.035 Jul 23: ISAKMP: type of life in seconds

    05:45:17.035 Jul 23: ISAKMP: life (IPV) 0 x 0 0 x 1 0 x 51 0 x 53

    05:45:17.035 Jul 23: ISAKMP: DES-CBC encryption

    05:45:17.035 Jul 23: ISAKMP: SHA hash

    05:45:17.035 Jul 23: ISAKMP: pre-shared key auth

    05:45:17.035 Jul 23: ISAKMP: default group 1

    05:45:17.035 Jul 23: ISAKMP: (0): free encryption algorithm does not match policy.

    05:45:17.035 Jul 23: ISAKMP: (0): atts are not acceptable. Next payload is 0

    05:45:17.035 Jul 23: ISAKMP: (0): no offer is accepted!

    Jul 23 05:45:17.035: ISAKMP: (0): phase 1 SA policy is not acceptable! (local YYY. YYY. YYY. Remote YYY

    XXX.XXX.XXX.XXX)

    05:45:17.035 Jul 23: ISAKMP (0): increment the count of errors on his, try 1 of 5: construct_fail_ag_init

    Jul 23 05:45:17.035: ISAKMP: (0): could not build the message information AG.

    Jul 23 05:45:17.035: ISAKMP: (0): send package to XXX.XXX.XXX.XXX my_port 500 peer_port 500 (R) MM_NO_STATE

    05:45:17.035 Jul 23: ISAKMP: (0): sending a packet IPv4 IKE.

    05:45:17.035 Jul 23: ISAKMP: (0): the peer is not paranoid KeepAlive.

    05:45:17.035 Jul 23: ISAKMP: (0): removal of reason HIS State "Policy of ITS phase 1 not accepted" (R) MM_NO_STATE (peer

    XXX.XXX.XXX.XXX)

    Jul 23 05:45:17.035: ISAKMP: (0): load useful vendor id of treatment

    Jul 23 05:45:17.035: ISAKMP: (0): provider ID seems the unit/DPD but important shift 0

    Jul 23 05:45:17.035: ISAKMP: (0): load useful vendor id of treatment

    Jul 23 05:45:17.035: ISAKMP: (0): provider ID is DPD

    05:45:17.035 Jul 23: ISAKMP (0): action of WSF returned the error: 2

    05:45:17.035 Jul 23: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE

    05:45:17.035 Jul 23: ISAKMP: (0): former State = new State IKE_R_MM1 = IKE_R_MM1

    05:45:17.039 Jul 23: ISAKMP: (0): removal of reason HIS State "Policy of ITS phase 1 not accepted" (R) MM_NO_STATE (peer

    XXX.XXX.XXX.XXX)

    05:45:17.039 Jul 23: ISAKMP: Unlocking counterpart struct 0x8838C3F8 for isadb_mark_sa_deleted(), count 0

    05:45:17.039 Jul 23: ISAKMP: delete peer node by peer_reap for XXX.XXX.XXX.XXX: 8838C3F8

    05:45:17.039 Jul 23: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PHASE1_DEL

    05:45:17.039 Jul 23: ISAKMP: (0): former State = new State IKE_R_MM1 = IKE_DEST_SA

    Here is a slightly adjusted version of my run-fig (came out I was sure that no one would need things) and attached are screenshots of IPSec and IKE Policy of the srp527w strategy

    version 15.1

    hostname broute1

    !

    logging buffered 65535

    information recording console

    !

    No aaa new-model

    !

    iomem 10 memory size

    clock timezone estimated 10 0

    Crypto pki token removal timeout default 0

    !

    !

    IP source-route

    !

    !

    !

    !

    VDSL controller 0

    operation mode adsl2 Annex A

    !

    property intellectual ssh version 2

    !

    !

    crypto ISAKMP policy 1

    BA 3des

    preshared authentication

    lifetime 28800

    ISAKMP crypto key PRE_SHARED_KEY_FOR_IKE (I_THINK) REMOTE_HOST hostname

    !

    !

    Crypto ipsec transform-set JWRE_BW-1 esp-3des esp-sha-hmac

    !

    !

    !

    IPSec-isakmp crypto 10 JWRE_BW-1 card

    defined peer XXX.XXX.XXX.XXX

    game of transformation-JWRE_BW-1

    match address 101

    !

    interface Loopback0

    no ip address

    !

    ATM0 interface

    Description - between node ADSL-

    no ip address

    no ip route cache

    load-interval 30

    No atm ilmi-keepalive

    !

    point-to-point interface ATM0.1

    no ip route cache

    PVC 8/35

    TX-ring-limit 3

    aal5snap encapsulation

    PPPoE-client dial-pool-number 1

    !

    !

    interface Vlan1

    Management Interface Description

    address IP AAA. AAA. AAA. AAA 255.255.255.0

    IP mtu 1452

    IP nat inside

    IP virtual-reassembly in

    no ip-cache cef route

    IP tcp adjust-mss 1420

    !

    interface Dialer1

    Description BETWEEN NŒUD ADSL-

    MTU 1492

    the negotiated IP address

    no ip redirection

    no ip unreachable

    no ip proxy-arp

    NAT outside IP

    IP virtual-reassembly in

    encapsulation ppp

    Dialer pool 1

    Dialer-Group 1

    PPP chap hostname ADSL_USERNAME

    PPP chap password 7 ADSL_PASSWORD

    PPP ipcp dns request accept

    No cdp enable

    card crypto JWRE_BW-1

    !

    recording of debug trap

    access-list 101 permit ip 192.168.7.0 0.0.0.255 10.0.1.0 0.0.0.255

    Dialer-list 1 ip protocol allow

    Some specific questions:

    (1) on the PSR in the example I used (and I have a few PRS-> RPS VPN work) I see you enter the pre-shared key, I do not see in the examples I've used something on the IKE pre-shared key on the box of IOS. Does anyone have examples where you use the pre-shared for IKE? I wonder if it is my main problem as clearly says the newspaper there is no pre-shared key :|

    (2) I used a mash of names between different sections mish as on ESP the naming convention is not the same thing; IE: what parts of the IPSEC negotiation come from IKE policy and including the IPSEC policy section section. The names really matter across different ends of the VPN?

    (3) I noticed when I run this command in the(config-crypto-map): #

    defined peer FQDN

    It is converted to:

    defined peer XXX.XXX.XXX.XXX

    Should it? I want the camera to watch the FQDN that this particular host using DDNS and do not use a static IP address.

    I could ask 1 million questions, but I'll leave it for there, if anyone can see anything out (or can answer Q1 in particular) please let me know.

    Thanks in advance for your time and help people.

    B

    The IKE policy doesn't seem to match, you must configure the corresponding IKE policy on the router as follows:

    crypto ISAKMP policy 10

    the BA

    sha hash

    preshared authentication

    Group 1

    lifetime 28800

    For the preshared key, use the address instead of the host name:

    crypto isakmp key address

  • Initial (and probably more common) question of Dr on SRM and private networks

    Hello

    Can anyone share best practices on the ground with regard to my question archiecture of network:

    According to the guide of the SRM administrator: Mrs. in protected sites and recovery must have access to the same private network (logic).

    We will have protected sites and located on the same ground but both recovery are far from each other on separate parts of the campus and there is network connectivity between sites.

    What are the different ways we can get two separate sites to share a private network?  What is the best practice?

    (1) fiber optic cables directly between sites using Layer 2 switches?  Any potential problem with switching over a distance?

    (2) with Layer 2 VPN MPLS? Enough to handle the traffic scenarios and failover/failback mature?

    (3) should work around SRM to allow a routed 3-layer solution?

    I'm from VMware

    As I said more simple solution is scalable layer 2 making available of VLANS / subnets in two sites in order to avoid the re-ip address of the recovered virtual machine. MPLS and direct DC of interconnection on fiber/xWDM were popular alternatives for the extension of the L2. As with anything there are advantages/disadvantages for things like network and mobile IP service (for example, routing, load balancing, etc.) of persistence or rigidity. The Cisco & VMware following white paper might be of interest that it focuses on a new DCI solution that introduces new options for VM environments. The paper is mainly centered around the Cisco Nexus product range and the ability to now support active/active balancing on various, redundant DC links:

    http://www.Cisco.com/en/us/solutions/collateral/ns340/ns517/ns224/ns836/white_paper_c11-557822.PDF

    You will notice the support of max distance of 200KM that is referenced in the document comes from the limits of support for the underlying storage replication (200KM for most synchronous suites), but there is also the effect of the reactivity of latency and VMotion application considerations. Site Selector Global (Cisco GSS) can be used for the traffic of a smart-balancing the load on the front-end server application as well as for unloading DNS service, DHCP and other common services - it would be more of a supplement to the core DC interconnect solutions mentioned above and not necessarily an exclusive alternative.

    Not sure what you mean by a workaround for Layer 3. SRM has the ability to re - ip of the VM during recovery, allowing you to change all THE info from the network stack inside the VM (network/gateway/dns servers ip/mask) and even generate scripts of ddns, but according to my post previous changing network info is in almost all cases, I worked with a customer "2nd choice".

  • iOS 10 people record problem/question

    Hello

    I have a couple of "faces" in the issue of people who are coming in white, but acknowledged same 'face' of many times.  Is anyway to update it for photo comes actually?  At a few faces, I don't know that facial recognition found since it is coming from white.

    Hi JohnP007,

    Congratulations on your iPhone 7 more running iOS 10! I understand that some of your faces in the album of people pull up as a draft and you want to refresh. You can try to use the steps below to fix the faces on the thumbnails in albums.

    Difficulty faces and names mixed-up

    If you notice that there is a photo of someone in a collection that is poorly identified, you can remove it.

    1. Tap the person you want to remove in the album of people > select.
    2. Type Show done face to emphasize his face in every photo.
    3. Press on each photo that is not the person.
    4. Type > not this person.

    Hide people

    You can hide the people or groups that you don't want in your album of people.

    1. Open the album people and press Select.
    2. Touch the people you don't want to see.
    3. Click Hide.

    If you want to see the people that you have hidden, press on show hidden people.

    People in the Photos on your iPhone, iPad or iPod touch

    This should be corrected without delay faces. Please use the Apple Support communities to post your question. Good day.

  • Questions - and answers forgotten

    How to get my 'secret' answers to the questions that I have noted the way back when?

    If you forgot the answers to your questions of security of Apple ID - Apple Support

  • I can't reset the security questions. We received notice as below:

    Hello world

    I can't reset the security questions. We received notice as below:

    "Cannot reset Security Questions."

    We have insufficient information to reset your security questions. "

    Please help me as soon as possible! Thank you very much.

    Hello

    You will need to contact the Apple Support.

    The information is available here:

    Contact Apple for assistance with the security of the Apple ID - Apple Support accounts

    (I'm afraid that no one here can solve the problem for you - this is a user-based community).

  • Question of cloning for SSD upgrade on 12 Macbook Pro

    Previously, I did an upgrade to SSD on my Macbook Air to 2012 according to the instructions of JetDrive transcend. Basically connection via USB 3 and using Mac OS X to clear (and format) disc utilities new SSD, then restore again SSD and then remove the original 128 GB SSD and insert the new 480 GB SSD.  For about a month and so far without problem.

    Now I'm trying to 2012 Macbook upgrade my Pro partner (on 10.11.6).  I got a Crucial SSD MX300 to replace his HARD drive.  Crucial comes with (or recommend) Acronis software.  And a lot of the messages of the forum recommend Carbon Copy Clone.

    My question is if I can use the same method for the cloning of the HD as my Macbook Air (just restore disk of Mac OS X utilities)?  This time, I'm upgrading HARD drive and I don't know if something is different.  At the same time, if I got lucky the first time, I don't not ruin Macbook Pro my spouse this time.

    Thank you.

    Yes, you can use disk utility to clone your MBP wives, but unlike CCC, it will not clone the recovery and Partition.

  • Question about resolution movie downloads

    If I buy a movie at a certain resolution (780p for example), but I want more later re - download at a higher or lower resolution (SD or 1080 p), can I do so and how?

    Same question perhaps for music. Some of my songs have been bought before the latest Apple codecs.

    Any help is appreciated!

    THX!

    Once you have made a purchase on the iTunes store, you will see your purchased items in the menu under accounts bar > bought. You can simply select the item purchased and re-upload.

    With regard to the resolution of the film for films that are offered, and you select the resolution, you can download it again and select a different resolution. For movies that are available as separate download to SD, 780, or 1080 points, you would be limited to the original resolution you selected.

  • Why I can't ask questions.

    I just have a question.  I said that I can't ask questions.

    Do exactly what you did to make this post, but your question in there instead.

  • Cannot reset the Security Questions

    Hello my dear

    -J' forgot my account security questions, but I remember password

    And I'm changing my Security Questions, but show me this sentence

    "Cannot reset Security Questions."

    We have insufficient information to reset your security questions. "

    -I want to solve this problem as soon as possible if permitted

    You should contact the account of Apple security team. To join, click here and choose a method; If this page does not list one for your country or if you are unable to call, complete and submit this form.

    (145081)

  • Bootcamp Windows 10 question

    Hi all

    Stumbled upon a problem, try to install Windows 10 an end 2014 27' iMac w/retina education runs Yosemite 10.10.5. Bootcamp is V 5.1.4. 32 GB, 3.5 ghz Intel I5. Disk of 1 TB of Fusion. Before you try this, I read the guide of Bootcamp to install windows, but also a number of other tutorials and forum messages about potential problems. This research, I learned that for EDU edition you must change the name of the file from Win10_1607_Education_English_x64.iso to Win10_1607_English_x64.iso. Apparently to have the former name of the file may cause OS X to not recognize the ISO. That fact I started Bootcamp, waited while the software downloaded and created a bootable USB key and partitioned my drive giving Windows 70 GB of space. After that, I got the message that my computer is restarts. Upon restarting, I got the black screen with the blue Windows logo and a spinning loading animation. After a few minutes, a blue screen with a message "Windows has encountered and error with computer and must restart," or something similar. He was pretty quick, so maybe it's not word for Word, but it was not a helpful post in terms of saying something specific. When the computer reboots, I am sent directly to OS X, though a bit slower than normal. I tried to restart with the flash drive to see if the installer would start up, no dice. Try now the Option key at startup, the flash player is not available. Went into my settings to see if I could change my startup on Win disk install USB, no luck it no more.

    Now for the question: How can I get the Windows installation again? What I have to start the process, and if so, what should I use Bootcamp to delete the partition that was created? I have re-run Bootcamp and the only option that is checked is the partition and start and install/uninstall windows and delete the partition.

    Thanks for the help.

    Perform the following two procedures

    Reset the management system (SCM) controller on your Mac - Apple Support

    How to reset the NVRAM on your Mac - Apple Support

    If you use a USB drive, not a USB flash drive, you will have problems. It is recommended to use a 8-16 GB USB2 flash drive.

    If the installation program is located on a USB Flash drive, stop your Mac, connect the USB key, restart and hold down the alt/option key and select the Windows icon in the USB port. This installs Windows in BIOS mode. If you click the start EFI icon, it will install using the EFI mode (faster). You may need to change the partition from MBR to GPT using GPT Fdisk.

  • Yahoo account question

    Yes, I understand these are the Apple support forums, but I don't know where else to ask this question and I thought some of you would have the answer to this question.

    I deleted my Yahoo account last week, but I've heard that the 500 million Yahoo accounts were hacked in 2014. I made my account in 2015. Im sure it is hacked since I made my account a year after the supposed hack, but if my account has been hacked and I deleted which would be safe?

    If your account did not exist in 2014, then it is has not been hacked. Removal of the guarantees it will not be new since there was more pirate. Normally, at least the hackers got access to more information in the narrative, as credit card numbers, change your Yahoo password would have sufficed.

Maybe you are looking for