You can’t have a VPN with the IP’s on the same subnet? If both sides of the VPN are on the same subnet they will never go to the router/pix.
View Answer | April 7, 2005 11:28 AM
Administration, Architecture/Design, Cisco, Features/Functionality, Firewalls, Forensics, Incident response, Installation, Intrusion management, Management, Network security, Security, Service and support, Vendors, VPN, Wireless
Sounds like it may be a firewall issue or DNS issue. On the exchange server you can open a cmd window, type in nslookup c:>nslookup >set type=mx >yahoo.com You should get a response like: mx1.mail.yahoo.com internet address = xxxxxxxxxx >exit Then I would (in the same cmd window) type in: c:> telnet mx1.mail.yahoo.com 25 This [...]
View Answer | April 7, 2005 8:54 AM
Active Directory, Administration, Application management, Cabling, Client management, Database issues, DHCP, Dial-up networking, DNS, E-mail applications, Exchange, Exchange 2000, Exchange Server ActiveSync, Features/Functionality, Help Desk, HTTP, Hubs, Installation, Mail protocols, Maintenance, Microsoft Windows, Modems/Cable Modems, Network applications management, Network Interface Cards, Network Management Systems, Network monitoring, Network testing, Networking, Networking Equipment, Networking services, Norton, Outlook, Outlook Mobile Access, Performance management, POP3, Remote management, Routers, Security, Service and support, SMTP, Storage, Storage management, Switches, Symantec, TCP, Tech support, Third-party services, Vendor support, Vendors, WINS, Yahoo
Why do I have to have more than one password, complex passwords, change passwords? (And NO I won’t give you a drop of blood every morning.) Why can’t I connect from home? Why can’t I install this ‘latest/greatest’ web thingy? Why can’t my child use somebody’s computer when visiting? It said I won, what do [...]
View Answer | April 7, 2005 8:41 AM
Administration, Application security, Architecture/Design, backdoors, Biometrics, Compliance, configuration, CRM, Current threats, Database, DataCenter, Digital certificates, Disaster Recovery, Documentation, Encryption, Exchange, Features/Functionality, Firewalls, Forensics, Hacking, human factors, Identity & Access Management, IDS/IPS management, Incident response, Installation, Instant Messaging, Intrusion management, Managed security services, Management, Network security, patching, PEN testing, Platform Security, Policies, provisioning, Risk management, Secure Coding, Security, Security Program Management, Security tokens, Service and support, Service contracts, Service evaluation, Signature updating/Management, Single sign-on, Spyware, Trojans, Viruses, VPN, Vulnerability Assessment & Audit, vulnerability management, Wireless, worms
I recently went through almost the same back in December. Come to find out the workstations were still trying to access network drives from the old server that were no longer there. I changed the logon.bat file to the new network and disconnected the old network drives from the workstations and all was fine.
View Answer | April 6, 2005 3:30 PM
Implementation, Microsoft Windows, Tech support
The ACL hack worked. We were able to do VPNs with shared secrets but haven’t figured out the certificate part. Since this must be deployed tomorrow I am reluctantly going with shared secrets. Unless I find an answer before my job ends here I expect the college will just stay with the shared secret solution. [...]
View Answer | April 6, 2005 12:23 PM
This is just a guess. Check under C:documents and settings on the local machine. Look for the files in their directory. I’m thinking that when they logoff, the local profile is probably over writing the network profile. Hope this helps. TJ
View Answer | April 6, 2005 11:09 AM
Microsoft Windows, Networking
I’m not sure if its different for E2K3, but with E2K if you have a Public folder connection agreement on your ADC, In System manager or 5.5 Admin you can manually replicate the root folders and propogate that setting down the pf tree. John.
View Answer | April 5, 2005 8:14 PM
DataManagement, Exchange, Exchange 5.5, Installation, Migration, Tech support
View Answer | April 5, 2005 4:04 PM
Active Directory, Microsoft Windows
John- First verify that all mailboxes, public folders and hidden mailboxes have been removed. Then check the following the same applies for Exchange Server 2003 as well: Step 1: Remove all Exchange 2000 Server computer site connectors from the Exchange Server 5.5 computer 1. Log on to the Exchange Server 5.5 computer. 2. Click Start, [...]
View Answer | April 4, 2005 12:37 PM
Administration, Migration, Outlook, Tech support
You mention that you checked routing and dns. Good, that’s a start. You also mention that your users are not receiving mail nor is mail going out to customers. Basically, your exchange server is not communicating with the outside world at all. Did it ever? I would start with all of the basics: What is [...]
View Answer | April 4, 2005 7:57 AM
DataCenter, DHCP, DNS, Hardware, LDAP, Microsoft Operations Manager, Microsoft Systems Management Server, Microsoft Windows, Networking, Networking services
For SOX compliance, we assigned data owners based on Financial Business Processes: Order to Despatch, Despatch to Cash, Procure to Receipt, Receipt to Pay, Fixed Assest, Financal Statement, etc IT Proposed suitable candidates for the business process as Business Process Owners (BPO) for Excom to approve. BPO also owned the data in their business process. [...]
View Answer | April 3, 2005 9:06 PM
Auditing, Biometrics, Digital certificates, Features/Functionality, Identity & Access Management, Information risk management, Installation, provisioning, Security, Security management, Security tokens, Single sign-on
I will be interested in responses to this inquiry as well. We have just recently acquired several 300GB HD’s for our DL380/5, DL580/5. Please be so kind as to forward any findings. Thanks, Eric
View Answer | March 31, 2005 12:38 PM
have added a directory entry (ADDDIRE)for your users who can’t connect? you can check by using the display directory entries command (DSPDIRE)?
View Answer | March 29, 2005 1:15 PM
AS/400, Help Desk, i5, Integration/Connectivity, iSeries, OS/400, PC/Windows Connectivity, Tech support
1. Stop in Services the Windows Time service 2. In Control Panel > Date and Time go to Time Zone and uncheck the “Automatically adjust clock…..”. Also, check in Internet time if “Automatically syncronize…” box is checked. 3 Search in the PC’s bios if you have any reference to daylight savings.
View Answer | March 28, 2005 5:34 PM
Hardware, Implementation, IT architecture, Networking, Performance/Tuning, Policies, Registry, Servers, Windows, Windows 2000 desktop, Windows 2000 Server, Windows client administration and maintenance, Windows Server 2003, Windows XP
1. You can create client address sets and apply rules accordingly. 2. Enterprise version of ISA supports load balancing ISA servers. A good resource is http://www.isaserver.org/
View Answer | March 28, 2005 11:04 AM
CIO, DataCenter, Firewalls, Forensics, Incident response, Intrusion management, Microsoft Internet Information Server, Network security, Networking, Networking Products, Servers, Tech support, Vendors, VPN, Windows, Windows 2000 Server, Wireless
Any entries in the event logs related to that?
View Answer | March 28, 2005 4:01 AM
Desktops, Windows client administration and maintenance, Windows XP
After considerable research I found the problem. My network tech had entered the address in the cache_peer line in the form xx.xx.xx.xx/32. When I removed the /32 the problem went away.
View Answer | March 25, 2005 5:20 PM
DHCP, DNS, Microsoft Windows, Networking services
Hi All this is bakash again The secon server is linkedserver. I missed ” in my previous question. Sorry pls help thanks
View Answer | March 23, 2005 10:50 PM
Administration, Availability, Backup & recovery, Biometrics, Digital certificates, Identity & Access Management, Migration, MySQL, Performance/Tuning, provisioning, Security, Security tokens, Servers, Single sign-on, SQL Server, SQL Server 2000, Standard Edition 2000, Tech support
You have many things to consider. First why are you considering a custom CRM solution? Is your current CRM not doing everything you want? Does the new version not do what you want? Is there another product available that does what you want? A custom solution will take time to develop and most likely cost [...]
View Answer | March 23, 2005 9:24 AM
Data analysis, Development, Microsoft Windows, Sales force automation applications, SAP
You mentioned logging into a profile…. I presume, then, that we’re talking about an NT or AD network that’s being logged into? If so, make sure that the user has been given security access to the local printer! It sounds strange, but you *can* be denied access to your own, attached printer if the security’s [...]
View Answer | March 23, 2005 7:41 AM