RVS4000 disabling IPS kills DNS

Background: I recently bought a couple of routers RVS4000 put in place a VPN between my home and office. Initial setup went great and I got the VPN works with dynamic DNS at both ends quite easily. The only problem was that the performance sucked bad. my ISP gives me 45 MB/s and one see frequently in both directions of test of speed and SFTP on other servers sites, and they plan to upgrade our building at 100 Mb/s next month. With the RVS4000 in place I usually go down 12 MB/s in download and 7 Mbps. no problem, I thought. I read that most performance problems from the intrusion prevention have to look at each package. So I turned off the SPI...

Problem: The problem I have is that if I turn off the IPS and DNS breaks on each computer on the network :-( Look-up go so slowly that my web browsers frequently time out. If I have somewhere access by IP address, then all is well and the flow of the router is acceptable (I see 28 MB/s, I actually managed to resolve the address of a speed test server). Unfortuantely this didn't do me much good if I do not have DNS. I restored the factory setting for a router and then carried out tests after each step of the configuration. Everything was fine until I turn off the IPS. I then restored to factory State, confirmed everything was fine and nothing else except the IPS; When I disabled it IPS DNS died once again!

Question: Is there a work around for this? I pay for 100 M/s wiring between my home and office and with the active IPS I'm lose 90% of the performance. If I disable the IPS, the unit is essentially useless. Help! Any suggestion is welcome. If I can't solve this problem, soon the routers will have to return it for a refund.

V 1.3.0.5 firmware is now available for download here: http://www.cisco.com/en/US/products/ps9928/index.html.

Share your ideas.

Thank you!

Tags: Cisco Support

Similar Questions

  • RVS4000 selective loss of DNS queries

    Is there a configuration option or a known bug that would cause a selective RVS4000 or garble queries DNS

    coming on the LAN side by side WAN, yet allow HTTP, SSH and Ping through without problem?  I think I have

    very strong evidence that this problem is due to my new satellite ISP, but they insist on sound ' beause router DNS

    requests go by with the deleted router.  The same router, configuration and complete the installation has worked with my

    old cable ISP.

    After a lot of frustration (because of the EFAH05W be incorrectly labeled a 'hub',

    When he is in fact a switch and thus will not support the packet sniffing), I am set me up

    with Wireshark, an old, borrowed hub and a portable separate sniffing

    packs from the side WAN.  Good DNS responses were indeed

    Since name servers, but the RVS4000 was rejecting, return a

    ICMP MOUSSOKI 'no such port' for the name server.  I thought that the router has calendar

    its NAT rule when connected via satellite (which has round-trip latency

    of about 1.3 sec.)  After not finding no way to reconfigure the RVS4000 to hold the

    NAT rules any longer, I tried the Netgear RP614v4, just because that was what they had

    for the local store.  Which corrects the problem.

    (I tried this other router earlier and DNS worked but HTTP has failed.  Must

    were the experimental errors, everything works now.)

  • Temporarily disable IPS

    We have a 5510 ASA with a module AIP - SSM IPS. From time to time I need to face a scanner of network active in the DMZ from the inside network. Of course the IPS will block most of the scanners. Is there an easy way to temporarily disable IPS while the scans are running? Each command line or through the ASDM?

    In addition to the filter ideas mentioned elsewhere, the fire to get the IPS of the road is to set its derivation mode on 'on' (vice auto defaults to). This will cause the IPS software to turn around packages without inspection.

  • EA6500 - devices get weird IPs and DNS servers

    Hi all

    I have just installed, updated firmware, but even if many problems have arisen, let me please you the list of people:

    (1) cable devices get weird IPs, the printer for instange to 10.168.122.100 always, it happens THAT the devices wired; the QNAP server had once 192.168.100.100, when it happens that of course devices do not appear on the network.
    My understanding is that all devices, related or not, must get the IPs between 192.168.1.100 and 155, it is the default value for the same router;

    (2) my laptop when telegraphed Gets an appropriate IP (192.168.1.xxxx), but STILL Gets a number of strange DNS, 10.168.122.1 server, and the Internet becomes unstable. It only happens in wireframe, when in the wireless, it gets the number of server DNS the same number of IP from the router (192.168.1.1), and the wifi works perfectly. Why get this strange DNS server number in wireframe only?

    (3) my phone VOIP Comwave gets no IP address at all, I tried everything (disconnect, repluigging each device in waiting 5 minutes etc.), nothing worked. She always returns 0.0.0.0

    (4) I tried both Open DNS numbers, and also numbers of DNS of Norton, as well to go through them but IP of the router always appear as a third option.

    Please, does anyone know what is happening?

    Thank you very much

    Mongao

    Hello world

    Thank you for helping; in fact, I think that I understand the question... I'm the one to blame!

    I had connected the LAN terminal VOIP to the router, not the correct terminal WAN; so I think that VOIP box polluted network transmission inside the weird IP numbers; shame on me

    I quickly tested last night and it seems that it works properly now;

    I do not have the issue of the third DNS number (the same as IP routers) appearing in all my devices, even after turning the pair of numbers to OpenDNS in the EA6500;

    Thank you very much

    Mongao

  • Disables the killer wireless 1535 under heavy load

    I just received a brand new 15 R2 in the mail a few days ago and have had any other problems with the wireless. It works very well under normal load IE internet browsing or streaming videos. When I try to download a game on steam or push the signal degrades slowly until the wireless card turns off. Then, you cannot activate the card via the hardware switch or click with the right button to enable. Any ideas? See the reference video.

    cs_setInnerHtml ('video_5eed075f-5174-43dd-b4cf-997c702184ea', ");

    I uninstalled all the software/drivers killer, deleted the drivers and reinstalled the drivers Slayers of the killer and dell Web site.

    Alienware has finally got resolution. They came and replaced the 1535 with an Intel AC 8260 killer. I'm going on two days with zero problems and more than 100 GB downloaded on my 5 GHz network to nearly 15 MB/s, which is what my internet caps to. Kudos to Alienware to send to the Intel card the next day. There he sent Tuesday of this week and the technician was home Wednesday afternoon. So far so good. I hope that Killer will solve questions 1535 a Windows 10 and 5 GHz, but unfortunately with imminent deployment, I have not time to wait for her.

  • Microsoft Virtual WiFi Miniport adapt, how to disable DHCP & DNS?

    Hi all

    I use Microsoft Virtual WiFi Miniport Adapter for ICS on my laptop and the phone. But I can't find a way to disable default DHCP & DNS available with ICS.
    I will runn double server DHCP & DNS () on mine. Who will make me better manage DHCP leases and all DNS forwarings with the complete log.
    For this I need to stop the default. It is possible, Connectify did the same thing. I just find a way to do it myself.
    Any help?

    Hi, question of your Windows 7 is more complex than what is generally answered in the Microsoft Answers forums. It is better suited for the public on the TechNet site. Please post your question in the following link for assistance:

    Link to the forum:

    http://social.technet.Microsoft.com/forums/en-us/categories

  • RVS4000 & RV042G Questions

    Seeking advice of Cisco Small Business gurus. I used a RVS4000 v1 for a few years now as part of my home network. In particular, I have a large audio Sonos distributed system, and I use the static IP mapping feature of the RVS4000 to assign a fixed IP address to each box of Sonos. Everything works perfectly.

    However, earlier this year my ISP (Virgin Media) upped my service to wide band 20Mbps to 60Mbps, without additional cost. Kind of them, great! Their new SuperHub was initially installed in its default factory State, mainly because technicians several who are involved with its installation did not know how to put it in Stand Alone mode Cable Modem. I didn't use his router, switch, or wireless access point, preferring to stick to my perfectly good alternative to Cisco {RVS4000 + 3xWAP4410Ns}.

    After that they gave up, I changed the firmware revision and the parameters of the box set mode SACM successfully. But first, I checked its speed. As provided, he settled at any 63Mbps download and download 2.8Mbps. The same test of speedtest.net once defined as SACM and connected to my RVS4000 am just around 21 Mbps download, download the 2.8Mbps. Disable System Protection from intruders RVS4000 (IPS) and debit is the SuperHub on its own, 67Mbps down, 2.8Mbps.

    My conclusions...

    (1) the download speed is almost a constant regardless of my hardware configuration, and will be ignored for the rest of this post.

    (2) in view of the need to open all the packages for inspection, my RVS4000 processor just can't handle that amount of data and effectively limits the my flow down to the same price that I got before my ISP upgraded service. So now, I have a service of 60Mbps, but at least I got disabling IPS, can't actually get the benefit of it. Not good enough!

    After a lot of reading on the different sites of Cisco, I recently bought a router Cisco RV042G. His spec 800Mbps suggests speed won't be a problem. One confirmed in fact by running speedtest.net, where the results of the 62Mbps / 2.8Mbps are surprisingly slightly less than people with disabilities RVS4000/IPS, but OK. Now, I also discovered that the RV042G is not IPS.

    My colleague said-savvy network 'to be honest IPS is a luxury that you don't really have in my humble OPINION. You're in a tiny minority with regard to users with a feature. It's such a drain on resources because it examines the contents of each package and see if it recognizes a signature of attack. Standard residential gateway routers do not. They have a classic NAT function, which automatically blocks all inbound connections not solicited and a firewall to prevent any broadcast traffic. »

    Given his comment and my experience with both routers, I'm about to return the RV042G for a refund, as seems to be adding anything new that I need. But first of all, I would like to hear reasoned opinions of community users: -.

    (1) short, should I just stick with my RVS4000 and run it with IPS, as I install it now?

    (2) how important is IPS in a home?

    (3) is there another product of similar businesses that I should look at? I don't particularly want a router with wifi built-in, but I might consider replacing both the RVS4000 and the adjacent WAP4410N with a suitable all-in-one.

    Comments to please as soon as POSSIBLE, because I am running out of time to return the RV042G to my provider.

    Hi Norrie, the PPE is not particularly of any concern for most cases, it is a luxury. This is to reflect

    https://supportforums.Cisco.com/thread/2169363

    But to answer your question, if the RVS4000 was works fine and no problem, stick with it. If you want to replace it with an all-in-one device, examine the RV180, models RV180W (but it isn't IPS).

    -Tom
    Please mark replied messages useful

  • How about a readme for the new signing of RVS - 4000 IPS: 1.42 in firmware 1.3.2

    Hello

    How about a readme for the new Signature IPS 1.42 inside the new firmware to version 1.3.2 RVS-4000?

    Or am I just too fast and it comes out in a bit?

    Thank you

    Bruce

    Bruce,

    You are right.  He left this time by mistake.  We will solve it.  In the meantime, here's what it will be:

    RVS4000/WRVS4400N IPS Signature Release Note

    Version: 1.42 rules Total: 1097

    In this signature, we talked about the exploits/vulnerabilities and applications
    as below:

    Supported P2P application called BitTorrent up to version 5.0.8.
    Supported P2P application named uTorrent up to version 1.7.2.

    Version: 1.41 rules Total: 1098

    In this signature, we talked about the exploits/vulnerabilities and applications
    as below:

    -EXPLOIT the MS video control ActiveX Stack Buffer Overflow
    A buffer overflow vulnerability exists in Microsoft DirectShow.
    The defect is due to the way Microsoft Video ActiveX Control parses image files.
    An attacker can convince the user target to open a malicious web page to exploit
    This vulnerability.

    -EXPLOIT the Injection SQL Oracle database Workspace Manager
    Multiple SQL injection vulnerabilities exist in Oracle database server product.
    The vulnerabilities are due to inadequate sanitation of input parameters
    in the Oracle Workspace Manager component. A remote attacker with user valid
    credentials can exploit these vulnerabilities to inject and execute SQL code
    with lift is SYS or privilegesof WMSYS.

    Supported P2P application named uTorrent up to version 1.7.2.

    Content signature for 1.41
    ========================================================================
    Added new signature:
    1053635 video MS stack buffer overflow EXPLOIT control ActiveX-1
    1053636 video MS stack buffer overflow EXPLOIT control ActiveX-2
    1053632 EXPLOIT Oracle database Workspace Manager SQL Injection-1
    1053633 EXPLOIT Oracle database Workspace Manager-2 SQL Injection
    1053634 EXPLOIT Oracle database Workspace Manager SQL Injection-3

    Updated the signature:
    1051783 P2P Gnutella Connect
    1051212-P2P Gnutella Get file
    1051785 P2P Gnutella UDP PING 2
    1051997 P2P Gnutella Bearshare with UDP file transfer
    1052039 P2P Gnutella OK
    Get Foxy P2P file 1052637

    Signature removed:
    1050521 Worm.Klez.E1 - 1
    1050522 Worm.Klez.E1 - 2
    1050523 Worm.Klez.E1 - 3
    1050524 Worm.Klez.E2 - 1
    1050525 Worm.Klez.E2 - 2
    1050526 ¡v Worm.Klez.E2 3
    1050536 Worm.Blaster.B - 1
    1050537 Worm.Blaster.B - 2
    1050538 Worm.Blaster.B - 3
    1050539 Worm.Blaster.C - 1
    1050540 Worm.Blaster.C - 2
    1050541 Worm.Blaster.C - 3

    Number of rules in each category:
    ========================================================================
    Back/DDoS 51
    Buffer overflow: 241
    Access control: 92
    Scan: 41
    Trojan horse: 62
    Misc: 3
    P2P: 40
    Instant Messaging: 121
    VRU/worm: 410
    Web attacks: 37

    Version: 1.40 rules Total: 1091

    In this signature, we talked about the exploits/vulnerabilities and applications
    as below:

    1053406 FEAT MS IE HTML Embed Tag Stack Buffer Overflow (CVE-2008-4261)
    An error of border during the processing of a too long file name extension specified
    inside a "EMBED" tag can be exploited to cause a stack-based buffer overflow.

    1053421 USE MS IE XML Handling Remote Code Execution (CVE-2008-4844)
    The vulnerability is due to a use-after-free error when composed
    HTML elements are related to the same data source. This can be exploited to
    dereference of a pointer released by a specially designed HTML document memory

    Version 1.38

    In this signature, we addressed the following exploits/vulnerabilities and
    applications:

    1. support for P2P, BitTorrent and eMule applications.

    Version 1.33

    In this signature, we addressed the following exploits/vulnerabilities and
    applications:

    1. support application IM named AIM (http://dashboard.aim.com/aim) until
    version 6.5.

    2. support application IM called MSN (http://get.live.com/messenger) until
    version 8.1.

    3 PcShare is a Trojan tool that can remotely administer an attacked computer.

    4-CVE-2007-3039: the vulnerability is due to an error of limit in the
    Microsoft Message Queuing (MSMQ) service during the treatment of MSMQ messages.
    This can be exploited to cause a buffer overflow by sending specially
    packages designed for the MSMQ service.

    Version 1.32

    In this signature, we addressed the following peer-to-peer applications:

    1. named IM application PURPOSE up to version 6.5 support.
    2. press the request of IM named MSN until version 8.1.

    Version 1.31

    In this signature, we addressed the following peer-to-peer applications:

    1 P2P application called BitTorrent up to version 5.0.8 support.

    2. support the P2P application named uTorrent up to version 1.7.2.

    Version 1.30

    In this version, we have addressed the following vulnerabilities in Microsoft
    applications:

    1 SUBMISSION-24462: dereference of a pointer Null vulnerability exists in some versions
    Microsoft Office.  Remote attackers can trick users into visiting a
    specially designed web page.  The symptom includes a denial of
    condition of service for the process in question.

    2 Microsoft Security Bulletin MS07-027: Microsoft Windows support
    Services NMSA Session Description object ActiveX control does not reach
    restrict access to dangerous methods. This vulnerability could allow
    a remote attacker to execute arbitrary code on an affected system.

    Version 1.29

    In this version, we have addressed the following exploits/vulnerabilities and
    peer-to-peer applications:

    1 Microsoft Security Advisory (935423): there is one based on the stack
    in Microsoft Windows buffer overflow. The vulnerability is due
    for insufficient format validation when handling incorrect ANI
    file cursor or icon. A remote attacker can exploit this
    vulnerability of prompting grace target user to visit a malicious
    Web site by using Internet Explorer. A successful operation would be
    allow the execution of arbitrary code with the privileges of the
    currently logged in.

    2. support a named QQ instant messaging application blocking until the
    2007 Beta1 and Beta2 version.

    Version 1.28

    In this signature, we address the following exploits/vulnerabilities:

    Microsoft Security Bulletin MS07-014: there is a buffer overflow
    vulnerability in Microsoft Word. The vulnerability is created due to
    a flaw in the Table entry of the Section within the structure of Table data flow.
    An attacker could exploit this vulnerability by tricking a user to open
    a designed Word file. Exploitation of the vulnerability may result
    injection and execution of arbitrary code in the security context
    the user target.

    Microsoft Security Bulletin MS07-016: there is an alteration of the memory
    vulnerability in Microsoft Internet Explorer. The flaw is due to a bad
    posting lines of response in the responses from the FTP server. By persuading a user
    to visit a malicious website, an attacker could run arbitrary on code
    the target system with the privileges of the currently logged in user.

    Version 1.26

    In this signature, we addressed the following exploits/vulnerabilities:

    CVE-2006-5559: there is a memory corruption vulnerability in
    the ADODB. Connection ActiveX control in Microsoft Internet Explorer.
    The flaw is due to improper validation of the data provided to the
    Execute method. By persuading target the user to visit a malicious
    Web site, an attacker can cause the application process
    to terminate or possibly divert its flow of execution to arbitrary
    code.

    Version 1.25

    In this signature, we addressed the following exploits/vulnerabilities:

    Microsoft MS06-070 security bulletin: MS Windows 2000 Workstation
    Service (WKSSVC. (DLL) has a remote code execution vulnerability. One
    unauthenticated attacker could exploit this vulnerability to run
    arbitrary code with the privileges of the level system on Windows 2000 and
    Windows XP computers.

    Version 1.24

    In this signature, we addressed the following exploits/vulnerabilities:

    1 Microsoft Data Access Components (MDAC) has a remote code execution
    vulnerability in the RDS object. DataSpace ActiveX control.  A remote attacker
    could create a specially designed and host the malicious file on a
    Web site or send it to the victim through e-mail.  When the file is opened,
    the attacker can run arbitrary code on the victim's system.

    2. control WMI Object Broker ActiveX (WmiScriptUtils.dll) in Microsoft
    Visual Studio 2005 has a vulnerability that could allow a remote
    attacker to execute arbitrary code.

    3 Microsoft Internet Explorer has a type of heap buffer overflow vulnerability.
    A remote attacker could create a malicious web page containing COM objects
    Daxctle.OCX HTML when instantiated as an ActiveX control and the thing the
    victim to open the web page. By this attack, the attacker to execute
    arbitrary code on the victim's browser.

    Version 1.23

    In this version, we have addressed the following exploits/vulnerabilities:

    The vulnerability lies in some of the engines in Microsoft XML core
    Windows. It is the result of the failure of the engine to properly manage the
    bad arguments passed to one of the methods associated with the XML
    purpose of the request.

    Version 1.22

    In this version, we discussed the exploits/vulnerabilities as follows:

    Vagaa is a P2P that supports the network BitTorrent and eDonkey software.
    It can be downloaded from the two network. The software is mainly used in people's Republic of CHINA.
    There are some problems with this software because it didn't follow the official eMule Protocol.
    The question can be referenced on the wiki (http://en.wikipedia.org/wiki/Vagaa).
    Classify us Vagaa as eDonkey2000 program and allow admin users to disable in the user Web interface.

    Version: 1.21

    In this version, we have addressed vulnerabilities exploits as below:

    Microsoft Internet Explorer WebViewFolderIcon has a buffer overflow
    Vulnerability. A remote attacker could create a malicious Web page and
    trick the victim to open. By this attack, the attacker could cause buffer
    Overflow and crash the browser of the victim.

    Version: 1.20

    In this version, we discussed the exploits/vulnerabilities and applications
    as below:

    1 foxy is a P2P application that can search and download music and movies.
    Foxy follows most public Gnutella P2P protocol but still has its own
    signature under certain conditions. After the inclusion of the file Get Foxy P2P
    rule, we can perfectly detect and block the Foxy and it will be detected as Gnutella.
    Foxy can be blocked by deactivating Gnutella.

    2 Microsoft Internet Explorer 6.0 and 6.0SP1 have impaired memory
    vulnerability in the ActiveX component.  A remote attacker can create a
    malicious Web page and trick the victim to open the web page. By this attack.
    the attacker could cause the crash of the browser of the victim or to execute arbitrary code.

    3 Microsoft Internet Explorer has heap buffer overflow vulnerabilities
    Vector Markup Language (VML).  A remote attacker can create a malicious Web site
    page and the thing the victim to open the web page. By this attack, the attacker
    could cause the buffer overflow and execute arbitrary code on the victim's browser.

    Version: 1.19

    In this version, we have added a rule to meet cross-domain redirect
    Microsoft Internet Explorer vulnerability (MS06-042). The vulnerability
    is caused by the inappropriate use of URL redirection by the object.documentElement.outer
    HTML property. A remote attacker could create a malicious web page and
    trick the victim to open the web page. With this attack, the attacker could
    run arbitrary code on the victim's browser and get sensitive information.

    Version: 1.18

    In this version, we have added the 6 rules to facilitate the blocking of QQ, the most
    popular instant Messenger in China. There are several versions of QQ on the
    official download site. Currently, we can detect and block QQ until the
    Version 2006 Sp3 beta 2.

    Version: 1.17

    In this version, we discussed the exploits/vulnerabilities below:

    1. the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, server
    2003 and SP1 have a buffer overflow vulnerability. A remote attacker
    could exploit a server response designed to cause the buffer overflow and run
    arbitrary code on the victim's system.

    2 hyperlink Object Library in Microsoft Windows 2000 SP4, XP SP1 and SP2,
    Server 2003 and SP1 have a code execution vulnerability. A remote control
    attacker could send a malicious Office document containing a
    specially designed hyperlink to a victim in an email or host the file on
    a web site. When the operator successfully this vulnerability, a remote control
    attacker to execute arbitrary code with the privileges of the victim.

    3 Microsoft Word XP and Word 2003 have a remote code execution vulnerability.
    A remote attacker could host a DOC file on a Web site. If successfully
    exploiting this vulnerability, remote attacker could execute arbitrary code
    with the privilege of the victim.

    Version: 1.16

    In this version, we discussed the exploits/vulnerabilities below:

    1 Microsoft Excel 2000, XP and 2003 Excel have a remote code execution
    vulnerability, due to an error in Excel when incorrect URL handling
    channels. A remote attacker could send a malicious .xls file of a victim
    in an email or host the file on a web site. When the operator successfully this
    vulnerability, a remote attacker to execute arbitrary code with the victim
    privileges.

    2 hyperlink Object Library in Microsoft Windows 2000 SP4, XP SP1 and SP2,
    Server 2003 and SP1 have a code execution vulnerability. A remote control
    attacker could send a malicious Office document containing a
    specially designed hyperlink to a victim in an email or host the file on
    a web site. When the operator successfully this vulnerability, a remote control
    attacker to execute arbitrary code with the privileges of the victim.

    3 Microsoft Windows XP/NT/2000/2003 have a denial of service vulnerability.
    A remote attacker can send a malicious SMB packet causes the victim computers
    Crash.

  • DKIM add txt DNS Record

    Hi people,

    I have a key DKIM to add and I use the application service provider to put me in the hostname as "/ hostname: api._domainkey.
    However I can't put the line of underscore '_' in the entrance of the DNS server. So, is there a good way to do this? I can successfully well of SPF as a txt record.

    Any help is appreciated.

    Best regards
    Alainlain

    You need to reach to hand modify the DNS server. You found the.app program does not allow this.

    First temporarily disable the server DNS from Mac in.app

    Then launch Terminal.app and edit the appropriate in - file

    / Library/server/name /.

    for example db.yourdomain.com

    Then add a line to this file looking like this, but with your values.

    _domainkey.yourdomain.com.               10800 IN TXT "t = y; o = ~ ; [email protected]".

    Note: You may need to do this as well on your Mac DNS server and also on an external DNS server that is managed by your Internet provider, it depends on how your domain is configured.

    Finally, use.app to start your Mac DNS server again, and then re - read the DNS files, including the addition above.

  • Disable touchpad HP Envy 17

    I have exactly the same problem you have posted... Do you have a solution?  There is no 'mouse' or "Point Touch Control Pad" with a disable to kill the touchpad.  I am thinking to resort to disassemble the laptop and unplug the cable that plugs into the touchpad itself.  I also deleted the synaptic touch pad (Windows 7) device driver and did not help.

    I'm pretty sure that remove the cable from the touch pad will fix the problem, but it is a fairly long process... 20 with respect to and then if I still wanted to sell the laptop, I would probably have to plug the cable back in again for someone else.

    Please help, Dave

    I've done what I suggested above to remove the flat cable for the touchpad disable touchpad and it worked very well.   I removed the two ends and folded cable where HP had folded it and scotch taped it to the system board next to the connector where it plugs IO on the system board so that someone will be able to put it back in if I never sold it.  On the plug, it has a little fitting valve rubber to flip upward to allow you to remove the cable at both ends.  I don't have any errors saying that it was not connected.  After the cable has been removed it simply does not work which is exactly what I wanted.    Problem solved.

    Dave

  • Server WRT1900AC DNS (?) Questions

    It is a separate, but related to the thread - question WRT1900AC DHCP do not distribute the specified static DNS entries

    I have not seen this documented function of anywhere, but it seems that the WRT1900AC has an internal DNS server? The router is set to dhcp clients local (front & reverse) on my local network with DNS suffix that is issued by my ISP (via external DHCP). Accordingly, it is causing conflicts on my network name resolution.

    Example: My router receives its external address via DHCP from my ISP (WebPass). The optional parameter "domain name" is not editable (see screenshot)

    Now, when a dhcp client internal registers on the network with a name in conflict (for example, the www host name) it will cause a DNS conflict on the LAN:

    Nslookup www.web-pass.com

    Server: 172.16.1.1

    Address: 172.16.1.1 #53

    Name:www.web-pass.com

    Address: 172.16.1.110

    where it should resolve correctly to 184.106.186.186. In addition

    Don't get me wrong, I'd like a DNS local on my router - but for it to be functional and conflict prevention, the following must be done:

    1. Allow editing of the "Domain name" field to create a distinct and not conflicting namespace.
    2. Allow the ability to add static DNS for non-dhcp clients
    3. Leave the option to disable the local DNS server, for those who use & prefer their own internal DNS server
    4. Fix the bug (DHCP/DNS) mentioned at the beginning of the wire

    If anyone has thoughts, observations, any other solution to workaround it please feel free add on this thread.

    Linksys support reached out for me and I got a call with one of its engineers (Julie Louh - which was very useful) on this subject. It also has the problem of DHCP/Static DNS (mentioned at the beginning of the original post) of design to allow the IP address of the router to resolve the site of smart wifi Linksys (Cloud / anywhere configuration). She confirmed that the router uses IP addresses is entered in the static DNS config for DNS lookups.

    On the DNS server issues described in this post, it should present the following feature requests:

    1. Allow editing of the "Domain name" field to create a distinct and not conflicting namespace.
    2. Allow the ability to add static DNS for non-dhcp clients

    Of course, these feature enhancements will move up the chain of management for approval. But I think that if these 2 are implemented it will solve the main problems described here.

    On a separate note, I was very pleased with the customer service and the reaction of Belkin/Linksys. The personal reachout to a technical support technician really shows that they are determined to make this powerful router and feature rich as they promised it would be.

  • IP address or DNS names for verification?

    I try to run the check test and get two different errors depending on if I get my ESX hosts with IP addresses or DNS names. I found conflicting recommendations in this forum about which one works better. I checked my DNS configuration, / etc/hosts files and can ping ping and STAF names and IP addresses.

    Someone at - it recommendations?

    By its IP address:

    2012-08-20 17:09:13 UTC [TRANSPORT] [0] INFO: 10.128.210.53 host is running version 3.4.1 STAF...
    2012-08-20 17:09:14 UTC [TESTHASH] [0] INFO: treat VirtualMachine Setup...
    2012-08-20 17:09:14 UTC [TESTHASH] [0] ERROR: cannot run processSetup for configuration: cannot run createHOMObj for configuration: No. GuestOS appearing in the XML file

    I found the following that thread is recommended to use names instead of IPs. DNS http://communities.VMware.com/message/2098962

    ----------------

    DNS namespace:

    2012-08-20 17:27:35 UTC [STAFSDK] [0] INFO: host service STAF on the branch vc51-testware with build number: 729061...
    2012-08-20 17:27:41 UTC [HAND] [0] ERROR: instance of test creation of evil, could not get the type of product for the esxia.corp.nexgenstorage.com host, result (RC: 6031 ErrDesc: host not found: ErrMsg: esxia.corp.nexgenstorage.com Exception: com.vmware.qa.staf.common.EObjectNotFound Trace: com.vmware.qa.staf.vc.host.STAFHost.getHost(STAFHost.java:6069) # com.vmware.qa.staf.vc.host.STAFHost.initialize(STAFHost.java:1951) # com.vmware.qa.staf.vc.host.STAFHost. < init > (STAFHost.java:123) # com.vmware.qa.staf.vc.host.HostSTAFService.getHost(HostSTAFService.java:4951) # com.vmware.qa.staf.vc.host.HostSTAFService.getHost(HostSTAFService.java:4909) # com.vmware.qa.staf.vc.host.HostSTAFService.handleGetHostValue(HostSTAFService.java:6571) # com.vmware.qa.staf.vc.host.HostSTAFService.acceptRequest(HostSTAFService.java:756) #) .............................................................................................................................
    2012-08-20 17:27:46 UTC Test FAILED

    Found another thread with this error which recommends the use of IP addresses instead of the name. http://communities.VMware.com/message/1904331#1904331

    The problem has been resolved in my site after seeing the new release note published in 9/25 below.

    Problem: Failure to properly configure host names generates the following error:
    Error: Cannot run processSetup for configuration: cannot run createHOMObj for configuration: No. GuestOS in the XML file.


    Workaround: ESXi host names add to vCenter Server as domain rather than IP addresses, for example, somehost.example.com. Make host names can be resolved Workbench, which is to configure DNS or/etc/hosts for name resolution and make sure the research front and rear work correctly. It is recommended that you go ahead and you enter the ESXi host names in the Workbench also.

    After I have change the ESXi host to IP address host name of the vCenter server. Correction of a problem.

  • Dr-ip-customizer - more than 2 DNS servers

    Hello

    In our environment, we have 4 DNS servers that we have to configure all servers to watch.  For our customization failback scripts ip, we can add 2 DNS servers successfully, but it won't add 4.  Looking at the created custom spec it does not look as if there is an option for 4 DNS servers.  Does anyone know of a way around this limitation?  4.1.2 running

    Thank you

    Graeme

    You can set more than 2 IPs for DNS using PowerCLI.

    Connect-VIServer vcenter.server.name
    
    Get-VMHost your.host.name | Get-VMHostNetwork | Set-VMHostNetwork -DnsAddress "192.168.0.1","192.168.0.2","192.168.0.3","192.168.0.4"
    
  • Area 51 R2 - Killer Network Manager

    During Setup initial and if I enter the killer under network settings Network Manager and the speed of the network Test, I get the following script error:

    An error has occurred in the script on this page.

    Line: 80

    Char: 31

    Error: Failed to get the property 'style' reference undefined or null

    Code: 0

    URL: javascript.window ['data'];

    Do you want to continue running scripts on this page?

    Yes | NO.

    If I answer, it stops coming, or if I do not answer, I get:

    Network speed test has expired. Please try again later.

    Anyone else does?

    socalpk

    During Setup initial and if I enter the killer under network settings Network Manager and the speed of the network Test, I get the following script error:

    An error has occurred in the script on this page.

    Line: 80

    Char: 31

    Error: Failed to get the property 'style' reference undefined or null

    Code: 0

    URL: javascript.window ['data'];

    Do you want to continue running scripts on this page?

    Yes | NO.

    If I answer, it stops coming, or if I do not answer, I get:

    Network speed test has expired. Please try again later.

    Anyone else does?

    Yes we get it, but it does not matter at all. Ignore it.

    You will notice that the test is actually completed when you close the error. Just ignore it. Disable bandwidth control too. Not only is it redundant, it is not necessary. It can be fixed, but it's really not worth. Just disable the Killer Network Manager everything and go about your day. It's a waste of resources.

  • Fall Alienware M17 Killer Wireless N1202 Connection

    Hey guys and girls, I'm here to ask about a problem that I've seen a LOT of people have with this laptop / particular wireless card. I recently bought the M17 and the only problem I had with it is the card Killer Wireless N1202 give up my connection randomly and reconnects.
    I have "business" with him for a few days now, but the drops random during the time of the browser, videos, and games really starts to break my nerves.

    So far, I checked the firmware and etc is updated in my laptop. Tried to disable the Killer Wireless Manager. A flick of some power in the performance options. Nothing seems to work.
    Anyone has a final o the problem solution?
    Thank you!

    so I think that the thing most important to do is to go into Device Manager, right click in the wireless card and choose uninstall.

    Reset.

    Windows will see it and reinstall it. It should work now. Give it a shot.

    If you use the Killer-N driver probably doesn't really matter.

Maybe you are looking for