When I am trying to put the default gateway in layer 2 switches with ip default-gateway xxxxx commnd it ok. But If I’m trying to put the default-gateway in 3560(layer 3) switches with ip default-gateway xxxxxxx command its giving me error that invalid command
Answer Question | February 16, 2011 7:40 PM
Default gateway problem, Layer 2 switches, Layer 3 switches, Routers, Routing and switching, Switches
Are compliance concerns (such as PCI DSS) or more general data security concerns preventing you from moving data to the cloud? What would be required for you to reconsider your position?
Answer Question | October 19, 2010 5:32 PM
Cloud compliance, Cloud Computing, Cloud Computing in 2010, Cloud computing security, Compliance Assessment, IT Compliance, PCI DSS
Tick tock, tick tock. What’s that sound? The countdown for the Nexus One Challenge. What? You’ve moved on? Well
Answer Question | February 2, 2010 3:36 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, DataManagement, Development, Exchange, ITKE, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP
Dear All, I’m trying to install an ACS Solution Engine in My network for access control (AAA). I succeed in setting up authentication using the internal database and that works. now My boss want users to be authenticated through an external database (windows AD). I tried achieving this but kept getting different errors.(like EAP-TLS or [...]
Answer Question | February 2, 2010 12:10 PM
Access Control Server, Cisco, cisco ACS, Cisco Secure ACS
I was wondering just how well AVG-free compares to top-of-the-line security suites such as Norton 360?
Answer Question | May 17, 2010 3:31 AM
Antivirus, Antivirus software, AVG, Norton, Security Suites
How can I perform a secure file deletion on an iSeries system, as per a secure file deletion on a PC? The PCI police are chasing me for an answer, but I’m not convinced its possible/necessary.
Answer Question | February 3, 2010 1:46 PM
iSeries security, PCI compliance
Hello, We currently use biometric authentication (Sagem Morphosmart 1300)on our clinical units in a hospital setting. These COWs are powered by a battery power supply located on the cart and there is no battery in the laptop. We have consistently and frequently experienced USB failures on the biometric devices where staff has to unplug and plug [...]
Answer Question | February 1, 2010 7:50 PM
Authentication, Biometric authentication, Biometrics, Virtualization and hardware
What are your biggest challenges when pushing upgrades, like new browsers, across your organization?
Answer Question | February 1, 2010 4:59 PM
Browser security, Midmarket security, Security
I’d like to know what kind of experiences folks out there have had with SIM products (QRadar, ArcSight, Log Logic, etc). Do people out there utilize log management? What products are you using/have you used? Experiences good and bad as well as recommendations would be very welcome.
Answer Question | February 1, 2010 9:10 PM
ArcSight, LogLogic, QRadar, Security, SIM
We’ve recently received some spanking new IT Knowledge Exchange stickers and we’d like to send them to you, our steadfast question-askers. The rules are simple: Ask a question in the community, then send me an e-mail with: Link to the question Your preferred mailing address We’ll mail you a free IT Knowledge Exchange sticker. There [...]
Answer Question | December 24, 2010 6:34 PM
AS/400, CIO, CRM, DataCenter, Development, Exchange, Giveaways, ITKE, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, Security, SQL Server, Storage, Virtualization, VoIP
I have a Windows 2003 SP2 and a Windows 2008 SP2 Domain Controllers. I need to create a GPO for WPA2 Wireless, I have modified the schema for WPA2 support for the 2003 , but if I create the GPO from the 2008 GPMC and go to the GPMC in the Windows 2003 it appears [...]
Answer Question | January 28, 2010 3:19 PM
GPO, Group Policy, Windows Server 2008, Windows Sevrer 2003, WPA2
im trying to connect to a WLAN using my mobile phone. When i try to browse the web im asked to enter a WEP for WLAN. what does this mean and what should i do?…
Answer Question | February 1, 2010 10:22 AM
WEP, WLAN, WLAN configuration
I need a tool (affordable!) for documenting complex processes. The processes are custom, customer-specific and may be both administrative and technical in nature. The idea is to have documentation that follows the incident process – showing questions to ask and actions to take (dependent upon the answers). The documentation should present the processes in a way that can be [...]
Answer Question | February 1, 2010 11:23 PM
Help Desk, Incident management, Knowledge Point Challenge, process documentation
I have Wifi system on separate vlan and VPN is enabled on the Sonicwall 2040. Access works fine when accessing from outside the establishment IE home or cafe, but when I try the VPN from the wifi system we have setup it won’t go through. What am I missing?
Answer Question | February 10, 2010 6:03 PM
SonicWALL, VPN, Wifi
I’m looking for clues why a Win2k3 server log indicates very frequent logon failures with the user name … yes, that is a backslash as the only character in the user name.
Answer Question | August 31, 2011 5:59 PM
Event ID 529, Logon failure, Windows Server 2003, Windows Server User Profiles
USING PERFORM TO EXECUTE MY PASSWORD HOW DO I USE IT?
Answer Question | January 22, 2010 3:24 PM
COBOL, Login password
Hi, we are currently using a Fortigate 60 Firewall. I need to block user internet access via the firewall. I have been told that this can be done by creating a user group. The users need to be setup with there MAC address and this is what will be used to block the access. My [...]
Answer Question | May 7, 2013 3:41 PM
Firewall configuration, FortiGate, fortigate 60
Has anyone performed a business anlaysis regarding when to activate a DR plan? If a problem appears to be a memory that can be fixed within 4-5 hours…would you declare a disaster and move to your hot site…or would you attempt to fix the system problem and if issues still exist, then declare it a disaster. What [...]
Answer Question | January 18, 2012 7:42 PM
Disaster Preparedness/Recovery, Disaster Recovery, Disaster recovery planning
Hello, i need to authenticate users 2 times, 1 is at Cisco level ( Cisco VPN concentrator ) and if password is corrent then it should go to RSA Radius server and should ask for password again. so in short i need to authenticat users at cisco level and then at RSA Radius server level. [...]
Answer Question | January 21, 2010 3:55 PM
Cisco, Radius Server, RSA dual authentication
Hi, I had joind a company with a big, complicated and un-documented network. I want to know some connections passing through which switches. Some of the switches are layer2. To make it harder, switches are of different brands. Any idea how to achieve that? Regards
Answer Question | January 18, 2010 5:58 AM
Layer 2 switches, Layer2 switches connectivity, Network hardware, Switches