Solved

Loopback network with Virtual PC 2007.

Posted on 2007-04-05
5
241 Views
Last Modified: 2008-02-01
Hi.
I need to put to work this tutorial about virtual pc network.

http://www.governmentsecurity.org/archive/t10129.html
0
Comment
Question by:FLUXWIRE
  • 2
5 Comments
 
LVL 15

Expert Comment

by:MarkMichael
ID: 18856653
Which part are you having difficulty with? :)
0
 

Author Comment

by:FLUXWIRE
ID: 18856676
ok.
i try it and got this:
1. put the loopback adapter into the system. let it get the ip  auto. this is 169.254.25.129 like the tutorial said. With the server down, i change the network adapter for this loopback. no gateway, no dns
2. put the server up. Assign to the network card (intel 21140-based...) to the address 169.254.136.191 as tutorial. no gateway. dns 127.0.0.1
3. all pings works but the services dont. http inside the localhost (server) gives me a 500 error.
4. try to use the fpipe on the host with
fpipe -l 53 -s 53 -r 80 169.254.136.191
5. try to access the system using http://169.254.136.191:53/mysystem

didnt work. the exchange that runs in the virtual windows 2003 stop working. i need to enter in safe mode and reset the windows server ip address to the original.

thx in advance
0
 

Author Comment

by:FLUXWIRE
ID: 19637283
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 20432660
PAQed with points refunded (500)

Computer101
EE Admin
0

Featured Post

New! My Passport Wireless Pro Wi-Fi Mobile Storage

Portable wireless storage to offload, edit, and stream anywhere.

High-capacity, wireless mobile storage designed to accompany professional photographers and videographers in the field to easily offload, edit and stream captured photos and high-definition videos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now