I want to host my source code control environment (SVN) on a server at home, accessible through VPN. I have a dynamic IP address. Does anyone have suggestions for hardware (router/servers) and software. Looking to keep a low expense, but something that will get the job done well. I have a Linksys WRT54G broadband router [...]
Answer Question | May 3, 2011 2:24 PM
IPsec, IPsec Passthrough, IPsec VPN, Linksys WRT54G, Networking, Networking Equipment, Source code control software, SVN, VPN
You could earn 500 knowledge points for sharing your story. Simply read this blog post and then share your story of survival. If we publish your story, we will first ask permission and compensate you with 500 knowledge points to go toward our current IT Knowledge Exchange contest . Good luck!
Answer Question | May 26, 2011 1:31 PM
AS/400, Business Intelligence, Channel, CIO, Contests, CRM, Database, DataCenter, Development, Exchange, ITKE, ITKE Community, Knowledge Point Bounty, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
This week’s IT book giveaway is a little bit different: 1. Answer two of the five questions listed below. Link to your answer in the discussion area of this question. 2. Ask five questions between May 2 and May 8. Link to your questions in the discussion area of this question. 3. Approve three answers [...]
Answer Question | May 3, 2011 2:24 PM
AS/400, Business Intelligence, Channel, CIO, CRM, Database, DataCenter, Development, Exchange, Giveaways, IT Books, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
Windows 7 Professional – 64 bit Application is 32 bit application. Application uses Sybase 11 , and ODBC sources The DLL Basdb.Dll is located in the SYSWOW64 folder but is not loaded when called. Example of call to DLL. Alter Procedure “DBA”.”spbossaccountchg” ( in iaction integer, in iid integer ) external name ‘Bossaccountchg@Basdb.Dll’ *****Have added [...]
Answer Question | May 2, 2011 1:54 PM
Sybase, Sybase Databases, User authentication, Windows 7 64-bit, Windows 7 Professional
Hello all, I have Windows 2003 server and ISA proxy to block some unwanted web pages. But one of the Windows 7 Pro client can not access internet. I get username and password from all browsers and though I type it correctly it continuously asks again username and password.
Answer Question | May 2, 2011 10:35 AM
ISA, Proxy servers, Windows 7, Windows Server 2003
I have about 8 vlans on my catalyst switch connecting pple to the internet.I want to configure authentication for all the users on the vlans. vlan 1 192.168.11.1 255.255.255.0 vlan 2 192.168.12.1 255.255.255.0 vlan 3 192.168.13.1 255.255.255.0 … vlan 8 192.168.18.1 255.255.255.0 What type of authentication will support such architecture.I want the authentication to be [...]
Answer Question | May 2, 2011 12:34 PM
Authentication, Cisco 3560, Subnet, Subnet Setup, VLAN
Tell your friends about IT Knowledge Exchange, and get 100 knowledge points closer to winning our latest contest. Simply send out this tweet to earn your points!
Answer Question | May 27, 2011 7:55 PM
AS/400, Business Intelligence, Channel, CIO, CRM, Database, DataCenter, Development, Exchange, ITKE, ITKE Contests, Knowledge Point Bounty, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, twitter, Virtualization, VoIP, Windows Server
How can we setup a self service portal to reset Active Directory passwords?
Answer Question | April 28, 2011 4:24 PM
Active Directory, Active Directory Permissions, Active Directory security, Active Directory Settings, Password policies, Security
Starting today (April 25th) and running through May 31st, you have 10 chances to win a $100 Amazon.com gift card. The 10 IT Knowledge Exchange members with the most Knowledge Points earned between today and May 31st will win. Learn how to earn points in the Community Blog, or start answering questions and earning points.
Answer Question | May 2, 2011 1:30 PM
Amazon.com, AS/400, Business Intelligence, Channel, CIO, CRM, Database, DataCenter, Development, Exchange, ITKE Community, ITKE Contests, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
3 VLANAs define inCisco 3560 L3 switch, switch is connected to Fortigate firewall. VLAN routing is working fine through fortigate but cannot connect to internet through PC any VLAN
Answer Question | May 2, 2011 9:55 AM
Cisco 3560, Firewalls, L3 switch, VLAN, VLAN Routing, VLAN Routing to Internet
Hello this is my pix firewall 515E configuration. Password: Type help or ‘?’ for a list of available commands. pixfirewall> en Password: pixfirewall# show runn : Saved : PIX Version 6.3(4) interface ethernet0 auto interface ethernet1 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password passwd hostname pixfirewall domain-name 192.168.0.230 fixup protocol dns [...]
Answer Question | May 2, 2011 7:17 AM
Cisco PIX Firewall, Firewall configuration, Firewalls, PIX, PIX 515E
I was given a Watchguard Firebox 500 today. The model number is F2064N. Apperantly, you need the Firebox System Manager application to manage these devices, which is only available if you have the device actiavated on your watchguard account. Unfortunately, I don’t have that. Should I destroy it with a chainsaw, or is there some [...]
Answer Question | May 2, 2011 9:16 PM
WatchGuard, Watchguard Firebox, WatchGuard VPN, Web security, Web security software
What are some best practices for managing access rights during recovery situations. The question is particularly directed towards additional personnel or vendors that may need access to certain system functions, but only during a DR situation. How is that handled best?
Answer Question | January 15, 2012 4:25 AM
Disaster Recovery, Open IT Forum, Security
I have a cisco 3560G and 2911 series router.The Router has 2 internet interface.One is already configured to an unmanaged switch.The second interface is also configure and it can go to the internet.My task is to configure vlans on the switch and the vlans should communicate with each others.Also each of the vlans should have [...]
Answer Question | May 2, 2011 2:53 PM
Cisco 3560 Switch, Cisco switches, InterVLAN, InterVLAN Routing, Routing, VLAN
We have wasted 20 hours proving to another IT company that the issues are in their firewall. They will not let us even see what they are doing…quoting SOX as the reason. We have finally told the customer that unless we can not see their configuration, they will need to purchase another internet connection and [...]
Answer Question | May 4, 2011 1:38 PM
Access Rights, Packet analyzers, Router and switch management, SOX, SOX compliance, Vendor management, Vendor partner business issues
How can we change password requirements for all domain users? This is using Windows Server 2003 at the domain level and Windows XP SP3 on the desktop.
Answer Question | May 2, 2011 7:36 PM
Domain Users, Password management, Password policies, Windows Server 2003, Windows Server 2003 Domain, Windows XP SP3
Can a WEP password really be cracked in under 5 minutes with a packet sniffer? Is this true even if the site does not have a SSID?
Answer Question | April 25, 2011 2:49 PM
Packet sniffers, Packet Sniffing, Password cracking, Security, Security management, SSID, WEP
Hello i have link sys RV042. i want to create VPN on it. My LAN traffic is going from pix firewall to Router. how can i do so??
Answer Question | May 3, 2011 7:36 AM
Cisco PIX Firewall, Firewalls, Linksys, Linksys RV042 VPN Router, VPN
Hello i have Pix Firewall 515E with only two interface,E0,E1 E0(Inside Address 192.168.0.250) E1(Outside Address given by ISP) i want to add an other ISP in firewall. how can i do so What changes should i do in firewall??? Please Help me…. Uzair.
Answer Question | April 21, 2011 7:29 AM
Cisco PIX 515E, Cisco PIX Firewall, Firewalls, Networking services
Is there a way to block a list of common passwords from our network even though they fit the complexity rules they are still weak like p@$$w0rd.
Answer Question | April 20, 2011 2:27 PM
Password management, Password policies, Password strength, Security management, Security protocols