Networking

95K

Solutions

68K

Contributors

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.

Share tech news, updates, or what's on your mind.

Sign up to Post

A small conferencing center needs help boosting their AT&T cell phone signal.
They are in a wooded area, and it's an old building, with metal mesh in the exterior walls, and several fireplaces with stone walls. There's a big kitchen at one end.
The building is long, maybe 200 feet from end to end.

Can a building have more than one booster?
Which one should I get?

I saw a pretty persuasive web page from Wilson Amplifiers, that placed high on a DuckDuckGo search.

Thanks.
0
Hello Experts,

I am looking for a solution to meter Internet usage and bandwidth by user on a LAN.

In other words I would like to have the ability for a user on the LAN to (based on that user's account information):

1. Restrict bandwidth based on user settings.
2. Restrict total usage (time) using the internet based on user settings.
3. Be able to reset usage etc. based on user settings.
4. Logs/reports showing All User statistics while on the Internet.

Does anyone know how to do this?

Thanks!
0
We noticed that we can't open a remote console for a deployed VM from VRA web interface, we get the below error:

"Cannot connect to remote console. Verify that the machine is powered on and connected to the network."

The VMs are powered On, on Vcenter side the VMs look healthy.

This is what i have tried so far:

Ping from Host to vcenter where the VRA VM resides:
	[root@host:~] ping vcenter
	PING vcenter (10.93.104.30): 56 data bytes
	64 bytes from 10.93.104.30: icmp_seq=0 ttl=64 time=0.186 ms
	64 bytes from 10.93.104.30: icmp_seq=1 ttl=64 time=0.282 ms
64 bytes from 10.93.104.30: icmp_seq=2 ttl=64 time=0.343 ms

	--- vcenter ping statistics ---
	3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max = 0.186/0.270/0.343 ms

Open in new window



-Curl to port 902 from vRA to host works fine:
            
[replica] vra1:~ # curl -vvv telnet://host.domain.local:902
		* Rebuilt URL to: telnet://host.domain.local:902/
		*   Trying 10.93.104.27...
		* TCP_NODELAY set
		* [b]Connected to[/b] hosts.domain.local (10.93.104.27) port 902 (#0)
		220 VMware Authentication Daemon Version 1.10: SSL Required, ServerDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , VMXARGS supported, NFCSSL supported/t

Open in new window



-Connection to port 902 from vRA to host:
	[root@host:~] esxcli network ip connection list | grep 902
	tcp         0       0  10.93.104.27:902                10.245.253.3:40456  [b]ESTABLISHED[/b]     67166  newreno  busybox
	tcp         0       0  :::902                          :::0                LISTEN          67166  newreno  busybox
	tcp         0       0  0.0.0.0:902                     0.0.0.0:0           LISTEN          67166  newreno  busybox

Open in new window


In Security properties on VRA this is already set:
 vra1:/etc/vcac # grep -i timeout security.properties
consoleproxy.timeout.connectionInitMs=20000

Open in new window


Infrastructure -> DEM status -> all are online
Infrastructure -> log:
Error:
The underlying connection was closed: An unexpected error occurred on a receive.
Inner Exception: Certificate is not trusted (RemoteCertificateChainErrors). Subject: C=US, CN=vm-vcenter.domain.local Thumbprint: DBDF5C8DDAF5C4AE34A55AB995DFF56C14B13181

Open in new window


Stack trace:

Open in new window

0
I am using PFsense2.4.4 with 3CX 16 and Everything (inbound and outbound calls) are  working fine but I am not able to register the phones over the VPN ( other end firewall is fortigate) I have done everything as https://www.3cx.com/docs/fortigate-firewall-configuration/  . The interesting part is I am able to work with softphone but not with IP phones( tested with yealink,polycom).
0
Hi,

I have a client who needs a fast router/firewall as they will be hosting an App from their office.

This is a start up so money is tight, ensuring I put in a business grade router/firewall what is my best option for speed and security.

Thanks
Gareth
0
Access-List a L2 Switch

I would like to know if we can apply ACL on L2 Cisco switch  based host IP address as well as on Host IP address + Port number.
An Example will be more helpful

Thank you
0
I'm converting around 50 Windows 10 Pro workstations from a peer-to-peer network to a domain.  (Not all at once!)  
The process seems to require that a new user profile be created for each user.
There are 30 users so at least 30 workstations need to be "managed" for sure.
I'm finding that the big picture stuff with file access and networking is going pretty well.
The biggest challenge has to do with preserving what I will loosely refer to as the "user profile" and all that entails.
In this case, the Windows standard "Documents", "Downloads", etc. aren't being used but that's not much of a worry either.

Here's a list of things that I've come up with so far that need to be transferred:
Unique files including .pst files and saved RDP files.
Mapped drives - (because they may be needed in specific app's).
Check the Private firewall rules for special cases - as they will probably be needed in Domain rules and the Windows Firewall rules ARE going to switch from Private to Domain.
Desktop folder contents.  Maybe multiple..
%userpriifile%\AppData\Roaming\Microsoft\Signatures
Windows Credentials backup.  Maybe multiple..
How to deal with Certificates?  I've not figured this one out yet.
etc.
Then I put all the things in need of saving into Users\Public\Documents so it will be easily accessible by the new User.

First off, I set up a checklist that addresses all these things.  So that's fine such as it is.  But it's just an ad-hoc list based on my particular and …
0
I am trying to resolve an issue we are having with a remote site.   They are convinced it is a network issue but I am not seeing anything.  I have monitored the logs on the firewalls,  I am running a ping monitor to the remote location and only seeing the occasional lost packet (single).  I have setup MRTG to monitor throughput on the switches and routers.  MRTG is configured to run every 5 minutes.  When I am watching the firewalls directly I see spikes in traffic which only last for a short time and are not reflected in MRTG.

I want to be able to get more detailed information on the throughput of specific ports.  I looked through the mib file and found ifInOctets (1.3.6.1.2.1.2.2.1.10.Port#)  and ifOutOctecs (1.3.6.1.2.1.2.2.1.16.Port#).  

It is my understanding that these show the cumulative octect count on the port so to get the throughput  would do two gets, subtract them and divide by the amount of time between them.   When I do this it is not matching what MRTG is showing for the same period.

Mrtg is showing average incoming at 24.46 and average outgoing 1.95 Mbps with the current in at ~28Mbps and current out at ~8Mbps

ifInOctets                             ifOutOctets
Value      3039619268            Value      2954776350
Value      3049468308            Value      2954776350
Value      3058557347            Value      2957324205
Value      3058557347            Value      2957324205
Value      3067486056            Value      2964854252
Value      3067486056            Value      2964854252
Value      3067486056            Value      2967502819
Value      3076914478            Value      2967502819
Value      …
0
Is there a way to emulate threat traffic in a controlled environment?  We would then use this information for common use cases.  I was thinking anything along the lines that could include log files that could give an indication of different attack signatures.  This method is obviously safer than injecting a virus on a test box and then introducing it to a customers network.  Any suggestions are GREATLY APPRECIATED!
0
Hello Experts,

Good day to you all!

I am not well versed with Cisco equipment but know a little bit with networking, that's why I decided to learn Packet Tracer. So, I was following a video online that simulates an internet connection configuration. I followed the video and recreate the Packet Tracer file and after I was done, everything was working. A workstation was able to access the simulated internet setup.

Now, I modified the setup from the example in the video to be a little bit close to what I have in the office. I added an ASA 5505 in between the Modem and Router 1841.

That's where my challenge started. I cannot for some reason, find out how make ASA work together with the rest of the set up.

I was hoping somebody here would be able to help what am I doing wrong.

I am also not sure what to attach or post here, to help you guys troubleshoot. I'm starting with a diagram and the configuration files of the ASA and Routers, and please let me know if there's anything else you need to help me out troubleshoot challenge i have.

Thank you in advance!

Regards,
BASTi

P.S. - I forgot to mention, I tried changing the type of cable connection from "straight-through" to "cross-over", between the modem and the ASA, and there's no difference.

ASA 5505 Packet Tracer Simulated Internet Connection
-------
ISP Router 1841 - Running Config
-------

version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
0
URGENT:  I am an attorney, and working out of a client's house on my Windows 10 laptop.   The client has a secured WI-FI network, but for confidentiality purposes I need to make sure that others who are on the network can't access my computer or emails through being connected to the same network.  Is this something I need to worry about?

Thanks,

Phil
0
Is it risky to use a 3rd-party VPN service such as NordVPN for a business?  The goal is to make it harder for attackers to break in to the office through the Internet.  The goal is not to allow people to connect to the office remotely.  The line of thought is that forcing all office Internet traffic through a VPN would make it harder for an attacker to target the office because the VPN would make the office Internet connection anonymous.

Would using a VPN in this way negate the protections provided by a NAT router?  What about if the router itself is configured to make the VPN connection for the whole office instead of having each individual client computer connect?  Which is the best way to do it?
0
I have a windows server with a 2 port team for the network card. from time to time the main team randomly picks one of the to Mac addresses when the server reboots. This creates havoc with 1 of my licensing server apps that runs on this machine. can I use the team settings on the server to force one of the Mac addresses out of the two that I want it to use without any adverse effects?

Also this will be done from remote desktop.
0
can't connect to a specific WiFi .

Hi experts, so I just got a dell xps laptop for a new user. for whaterver reason it can't connect to the corporate wifi network but it can connect to any other wifi network. doesn't make any sense, it simply says it can't connect to the network.

setup is new out of the box..

Any ideas?
0
How do I alter the the network on a Solaris 10 Global zone that has 5 non-global zones.
The subnet needs to be changed for all zones.

The non-global zones all have a shared-IP type.

What information should I provide?
0
I have cisco ASA 5510. I want to know if I can configure two or multiple ip address on the same interface at a time or not.

The scenario is like this:

I have 5 public IP addresses : 45.X.X.0/29

There are 4 physical interface: e0/0, e0/1, e0/2 and e0/3.

e0/0:
     name: Outside
     ip add : 45.X.X.2/29

e0/1:
     name: Users
     ip add: 192.168.1.0/24

e0/2:
     name: Servers
     ip add: 192.168.2.0/24

I want the users on lan 192.168.1.0/24 should use 45.X.X.2 for accessing internet or I would say 1.0/24 use dynamic nat with 45.X.X.2. However, now say I want servers on lan 192.168.2.0/24 should use 45.X.X.3 for accesing internet. Currently, both 1.0/24 and 2.0/24 are configured to use 45.X.X.2 for accesing internet.

So, is it possible I can configure 45.X.X.2 and 45.X.X.3 on e0/0 interface ?

PS: Cisco ASA is running ver 7.2
0
We had a server named SERVER_A that we are decommissioning on it and it contained a share with software installation directories on it.  We have moved that files and folders to a new server called SERVER_B and and created that share with the same name and rights.  Because many of the software installations on our desktops and laptops still reference SERVER_A I thought I will just create a CNAME record in DNS and point SERVER_A to SERVER_B.  And that works for purposed of pinging the server, but when I try to access the UNC Share-Error.PNGpath of the share at \\SERVER_B\Software, I get the attached error.  Is there a way to accomplish what I'm trying to do because I have a couple shares that I need to be able to access from the old hostname?
0
Is there any way to redirect the Windows system event logs to Network shared path?
Citrix 7.15 CU2, PVS, Windows 2012  VDA.
Redirect the Event logs to network path.  in order to troubleshoot current VDA environment ongoing issues.
0
I was doing design of a network and I was wondering why the router symbol is circle (actually disc) and the switch symbol is near to be a square. . Any idea why?

Thanks
0
I want to know all the SUBNETS are available in the company network. Which tools should I use? (note: Yesterday, I was able to locate the ip address of some servers which are located at 60 Subnet by using ip-scanner as suggested from this forum).

Thanks,
tjie
0
I'm moving a physical member server from our data center to an office building. The server is a Windows 2008 R2 server and used only within the network. The office is on the same domain but a different network. The server is used to allow staff to access Peachtree software for accounting needs and has Microsoft terminal server licensing. My plan is only to make IP changes on the server and DNS changes on the domain controllers.

Is there any Active Directory or other needs I need to address before moving it from the data center? Just want to make sure I'm checking off all the boxes prior to the move.
0
I had this question after viewing Can Ping Gateway but NOT DNS Server.

A client of mine has this same issue. The fix in "Can Ping Gateway but NOT DNS Server" did not work. I have applied all of the fix items noted in that thread, including the fix solution.

Some data:

Four computers in this office are just fine. They can ping the gateway located at 192.168.16.1. They can ping the DHCP Server located at 192.168.16.3. They can ping the DHS Server located at 192.168.16.3. I have attached the results of an ipconfig /all command here as the file ipconfig.good.txt.

One computer is having problems. It can ping the gateway at 192.168.16.1, but CANNOT ping the DHCP Server and DNS Server at 192.168.16.3. I have attached the results of an ipconfig /all command here as the file ipconfig.bad.txt

The problem happened out of the blue yesterday afternoon. The Windows error logs show no suspicious events during that time period. The machine has a clean registry and clean malware status.

All ideas invited.

-- stan

- - - - - -
Stanley Krute
Chief Technologist
Siskiyou Digital Inc.
stan@siskiyoudigital.com
530-905-0099
ipconfig.good.txt
ipconfig.bad.txt
0
Hi,

All the Servers are in Data Center (Colo).
I want to go remotely to all the Controllers (including IDRAG) which are in Colo.

Question: What command would I use to get the above IP addresses?

Thanks,
tjie
0
Hi,

My adcon server  for o365 sits internal to my network. we have an ASA firewall. We are about to merge tenants. I need my adcon server to be able to communicate with another AD domain in another network in order to pull in their objects to o365. What rules do i require and what do they need to open up. Is all that is required for me to be able to make a port 389 connection to 1 of their DCs ? how would they also go about this - would they need to open 389 - do a NAT from a public IP port 389 to their internal Domain controller? Thanks
0
I have a network that uses Cisco Aironet 1832i access points. I need to create an SSID for guest access. I understand VLAN's and tagging, but I'm not sure how to use this to isolate traffic. I can assign a per-SSID VLAN, but my ISP controls the gateway router- my concern is that traffic will go to and from the Internet, and despite being set to my internet-only VLAN (VLAN 10) that when it gets to that last-hop router, traffic will simply be routed back in to the network over the ports that are allowed. Am I overthinking this? We have a couple of network hops before we get to the Internet. Can someone provide a walkthrough or a link that explains how to configure this? We are using AP's with a WLC 3504, and I have control of the whole network up to the ISP gateway. I'd appreciate any ideas or help.
Thanks!
0

Networking

95K

Solutions

68K

Contributors

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.