tag:blogger.com,1999:blog-50470275894690554452024-03-12T21:34:12.883-07:00Majorbacon's IT BlogMajorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.comBlogger54125tag:blogger.com,1999:blog-5047027589469055445.post-47086269409207878292018-05-23T17:31:00.000-07:002018-05-23T17:31:32.870-07:00Majorbacon's Study Guide for the CCNP ROUTE Exam<span style="font-family: "verdana" , sans-serif;"><br />
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="font-family: "verdana" , sans-serif;">Planning on taking the ROUTE exam 300-101? Here's a rundown on some of the things you may or may not have already committed to memory that I would certainly want to know before sitting down in front of a computer with a timer and camera! This study guide is NOT to teach you, but to remind you of what you should know! Please comment with any questions you have and I'd be glad to help fill in the answer for you.<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">ACLs: </b><span style="mso-bidi-font-weight: normal;">Know how to read an extended ACL: </span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><span style="mso-bidi-font-weight: normal;"><br /></span></span>
<span style="font-family: "verdana" , sans-serif;"><i>stance </i>(permit/deny) <i>protocol </i>(ip, ipv6, tcp) <i>source </i>(any, host IP, IP & wildcard mask) [optional <i>operator and protocol </i>of source (gt 1024, eq http)] <i>destination </i>(any, host IP, IP & wildcard mask) [optional <i>operator and protocol</i> of destination (gt 1024, eq http)] [optional log]</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;">ex: </span></span><br />
<span style="font-family: "verdana" , sans-serif;">permit ipv6 host 2001:DB8:0:1::102A any eq http</span><br />
<span style="font-family: "verdana" , sans-serif;">permit tcp host 192.168.3.128 0.0.0.63 gt 1024 host 10.0.1.4 ssh</span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;">don't forget stand ACLs too though</span></span><br />
<span style="font-family: "verdana" , sans-serif;">permit 192.168.3.0 0.0.0.255</span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><span style="mso-bidi-font-weight: normal;">Remember that Access Control Lists have the following properties.</span></span></span><br />
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<br />
<ol>
<li><span style="font-family: "verdana" , sans-serif;">Top-down processing</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Immediate Execution on a matching item</span></li>
<li><span style="font-family: "verdana" , sans-serif;">An implicit deny all at the end of the list</span></li>
</ol>
<div>
<span style="font-family: "verdana" , sans-serif;">And remember an ACL doesn't DO anything - it is just a filter tool. Only by applying can you get results (ie: interface, line vty, NAT source, redistribution list, route map, debug ip packet command)</span></div>
<div>
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "verdana" , sans-serif;">Int gi 0/5</span></div>
<div>
<span style="font-family: "verdana" , sans-serif;">ipv6 access-group 123 out</span></div>
<div>
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "verdana" , sans-serif;">Line VTY 0 4</span></div>
<div>
<span style="font-family: "verdana" , sans-serif;">ipv6 access-class 123 in</span></div>
<div>
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "verdana" , sans-serif;">distribute list 234 out Fa 0/0</span></div>
<div>
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "verdana" , sans-serif;">debug ip packet 123 detail</span></div>
<div>
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "verdana" , sans-serif;">ACLs can have the "log" entry added at the end which triggers informational syslog messages after trigger (and repeating every 5 minutes) - these packets that match with the logging keyword are process switched instead of fast switched, and can use a great deal of CPU utilization if there is a broad scope.</span></div>
<div>
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "verdana" , sans-serif;"><br /></span></b></div>
<div>
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">TTL</b>: Default is
255, when it reaches 0 packet is dropped, decremented by 1 per router to
prevent routing loops, slightly different in MPLS where the TTL triggers drops
at a value of 1 rather than 0</span></div>
</div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="font-family: "verdana" , sans-serif;"><b>HTTPS: </b>If the Router supports web traffic it should be accessed securely using HTTPS. For further security it can be a secure webserver on a non-default (443) port by using the <i>ip http secure-port <new port# above 1024> </i>command.</span><br />
<span style="font-family: "verdana" , sans-serif;"><b><span style="font-family: "verdana" , sans-serif;"><br /></span></b>
<span style="font-family: "verdana" , sans-serif;"><b>Distribution List: </b></span><span style="font-family: "verdana" , sans-serif;">Routers can have a filter that controls which routes they will share and/or learn. An ACL can be created that enumerates trusted network IDs and then they can be applied using the distribute list command</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><i><br /></i></span>
<span style="font-family: "verdana" , sans-serif;"><i>access-list 2 permit 10.1.1.0 0.0.0.255</i></span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><i>router rip</i></span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><i>distribute list 2 out</i></span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;">or</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><i>distribute list 2 out Fa 0/0</i></span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><i><br /></i></span>
<span style="font-family: "verdana" , sans-serif;"><b>Prefix Lists</b>: A tool used for filtering which routes will be learned or shared. </span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;">Prefix lists can be very specific:</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><i>ip prefix-list ONE_NET_PFXLIST Permit 10.7.1.0/24 </i></span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;">or allow for flexibility</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><i>ip prefix-list ONE_NET_PFXLIST Permit 10.7.0.0/16 ge 23 le 25</i></span><br />
<span style="font-family: "verdana" , sans-serif;">This example means that any route with an ID from 10.7.0.0 to 10.7.255.255 that is announced with a subnet mask from /23 (255.255.254.0) to /25 (255.255.255.192) will be allowed. </span><br />
<div>
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><i><br /></i></span>
<span style="font-family: "verdana" , sans-serif;"><b>CRASH Collection: </b>after a router has crashed without warning a crash collection of log data (usually for Cisco support) can be collected using "core dumps" - a full copy of the memory image, generated using TFTP, FTP, RCP, or Flash Disk</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><b><span style="font-family: "verdana" , sans-serif;"><br /></span></b>
<span style="font-family: "verdana" , sans-serif;"><b>SNMPv2 Security:</b><span style="font-family: "verdana" , sans-serif;">
You should setup read-only level access and a complex community string. </span><i>snmp-server host <IP> traps version 2c <c-string></i></span></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">SNMPv3:</b> SNMP access modes determine if the connection is
authenticated (AUTH) and if desired Encrypted (PRIV). Modes include: </span><span style="font-family: "verdana" , sans-serif;">Auth/NoPriv,
authPriv, NoAuth,NoPriv. </span></span><br />
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<br />
<ul>
<li><span style="font-family: "verdana" , sans-serif;">NoAuth,NoPriv still checks the username, </span></li>
<li><span style="font-family: "verdana" , sans-serif;">Auth/NoPriv checks username and password, </span></li>
<li><span style="font-family: "verdana" , sans-serif;">AuthPriv checks username and password and generates an encryption key. </span></li>
</ul>
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><o:p></o:p></span><span style="font-family: "verdana" , sans-serif;">AES encryption and SHA-1 Authentication are used by SNMPv3. <i>snmp-server host <IP> traps v3 auth <username></i></span></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">OSPF Neighbors:</b> Must
have matching timers (hello/dead), Area Numbers, subnet. You do NOT have to
match Process ID, wait interval, or MTU size<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "verdana" , sans-serif;">OSPF Neighbor Types:</span></b><br />
<br />
<ul>
<li><span style="font-family: "verdana" , sans-serif;">Point to Point - PPP, HDLC, Ethernet (if configured) - No DR/BDR, 10 sec hello</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Broadcast - Ethernet, Uses DR/BDR, 10 sec hello</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Loopback - no neighbors</span></li>
</ul>
<br />
<span style="mso-bidi-font-weight: normal;"><span style="font-family: "verdana" , sans-serif;">Frame relay is the reason for all of the other types:</span></span><br />
<br />
<ul>
<li><span style="font-family: "verdana" , sans-serif;">Non-Broadcast - Frame Relay, Uses DR/BDR 30 sec hello - manual neighbor config</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Point to MultiPoint - Frame Relay, no DR/BDR, 30 sec hello </span></li>
<li><span style="font-family: "verdana" , sans-serif;">Point to MultiPoint Non-Broadcast - Frame relay, No DR/BDR, 30 sec hello, manual neighbor config</span></li>
</ul>
<br />
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;"><br /></b></span>
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">OSPF addresses: </b>Multicast
224.0.0.5, 224.0.0.6 (DR/BDR upload), updates on change (plus the "paranoid" update every 30 minutes because the LSAs age out after 60 minutes)</span><br />
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<b><span style="font-family: "verdana" , sans-serif;">Basic OSPF LSA Types:</span></b><br />
<br />
<ol>
<li><span style="font-family: "verdana" , sans-serif;">Router LSA - local area LSA every router generates - All Router Info!</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Network LSA - local area LSA for multiaccess DR/BDR network info </span></li>
<li><span style="font-family: "verdana" , sans-serif;">Summary LSA - interarea LSA sent by ABR regarding other areas including the backbone area 0</span></li>
<li><span style="font-family: "verdana" , sans-serif;">ASBR Summary LSA - interarea LSA sent by ABR to identify the ASBR of a remote area</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Autonomous System LSA - local and interarea LSA generated by ASBR</span></li>
</ol>
<br />
<span style="font-family: "verdana" , sans-serif;"><b>OSPF network command:</b> <i>network <IP base> <wildcard delimiter></i></span><br />
<span style="font-family: "verdana" , sans-serif;">for best practices and security you should make sure your wildcard matches an IP address of the specific interface or the subnet ID of the IP address on a specific interface. In either case the network command by default enables hello messages and injects that interface into the OSPF database. </span><br />
<span style="font-family: "verdana" , sans-serif;">IP address 10.1.7.1 255.255.255.192 </span><br />
<span style="font-family: "verdana" , sans-serif;">"most specific" wildcard mask: <i>network 10.1.7.1 0.0.0.0 area 0</i></span><br />
<span style="font-family: "verdana" , sans-serif;">"matching subnet" wildcard mask: <i>network 10.1.7.0 0.0.0.63 </i><i>area 0</i></span><br />
<span style="font-family: "verdana" , sans-serif;">These commands will have EXACTLY the same effect, to enable one and only one interface to start participating in OSPF. That is why it is a best practice.</span><br />
<span style="font-family: "verdana" , sans-serif;">Although you could enter <i>network 10.0.0.0 0.255.255.255</i> <i>area 0, </i>it would enable OSPF for any current and future interfaces with any IP address assigned out of the class A 10.0.0.0 network. This is not a good practice since there can be unintended consequences in both routing performance and security.</span><br />
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>OSPF at the interface level: </b>The OSPF network command is entered under the routing process. The entire issue of wildcard masks can be ignored by using the <i>ip ospf <process ID> area <area #> </i>command at the interface </span></div>
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>OSPF Areas:</b> </span><br />
<br />
<ul>
<li><span style="font-family: "verdana" , sans-serif;">Backbone Area: Area 0 to connect all other areas (All LSA types)</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Normal Area: Contains intra-area and inter-area routes (All LSA Types)</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Stub Area: Contains it's own intra-area (Type 1 & 2) and inter-area summary LSAs (3), but not external LSAs (Type 4 & 5) and adds a type 3 summary default route with a cost of 1 (<i>area default-cost</i> command to change). router context: <i>area <#> stub </i>on the Stub Area routers and ABR</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Totally Stubby Area: Cisco only: Same as stub area but let's remove the type 3 LSAs too and just use the default route. Router context: <i>area <#> stub </i>on all Stub Area routers but </span><i style="font-family: Verdana, sans-serif;">area <#> stub no-summary</i><span style="font-family: "verdana" , sans-serif;"> on the ABR ONLY!!!</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Not-So-Stubby Area (NSSA) - What if your stub area <i>contains </i>an ASBR? Not so stubby after all, are you? That info can't break out of a stub area! So the NSSA was created Contains area and external routing info <i>area <#> nssa. </i>Like a stub area but ASBR external routes are sent as a type 7 (a type 5 in disguise). Industry standard, so it still allows type 3 LSAs like a stub. Default route is NOT injected (good chance that's why we have an external info source, right?) unless you say area <#> nssa default-information-originate</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Totally Not So Stubby Area (Totally NSSA) - Cisco only: same as NSSA but let's remove the type 3 LSAs too! <i>area <#> nssa no-summary</i>. Also includes the default route automatically<br /><b style="mso-bidi-font-weight: normal;"><span style="font-family: "verdana" , sans-serif;"><br /></span></b></span></li>
</ul>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"></span></span><br />
<div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><b>OSPF Virtual Links: </b>OSPF requires that ALL areas be directly connected to the backbone area. if this is not true then the TRANSIT area must be declared as a virtual link on the ABR and the area router connected to the disconnected area.</span></span></span></span></div>
<span style="font-family: "verdana" , sans-serif;">
<div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;">Command on ABR: <i>area <transit area #>, virtual-link <router ID of remote router off transit area></i></span></span></div>
<div>
<span style="font-family: "verdana" , sans-serif;"></span><br />
<div>
<span style="font-family: "verdana" , sans-serif;"><span style="mso-bidi-font-weight: normal;"><span style="font-family: "verdana" , sans-serif;">Command on ABR: <i>area <transit area #>, virtual-link <router ID of ABR of transit area></i></span></span></span></div>
<span style="font-family: "verdana" , sans-serif;">
<div>
<span style="mso-bidi-font-weight: normal;"><span style="font-family: "verdana" , sans-serif;"><i><br /></i></span></span></div>
</span></div>
<div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><b>EIGRP Redistribution: </b>inject other sources into EIGRP topology for sharing with other EIGRP routers. In router EIGRP context, <i>redistribute <protocol, such as RIP, OSPF process#, static> 1000 100 250 100 1500. </i>Also, <i>Default-metric</i> <i>1000 100 250 100 1500</i> sets the default Bandwidth, Delay, Reliability, Load, and MTU for EIGRP processing of redistributed info. </span></span></div>
<div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span></span></div>
<div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><b>OSPF Redistribution:</b> </span></span><b> </b>inject other sources into OSPF topology for sharing with other OSPF routers. In router OSPF context, <i>redistribute <protocol, such as RIP, EIGRP AS#, static> metric <if not used there is a seed value of 20> subnets (otherwise only classful networks will be redistributed)</i></div>
</span><span style="font-family: "verdana" , sans-serif;"><div style="font-weight: bold;">
<b style="font-family: Verdana, sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span></b></div>
<div style="font-weight: bold;">
<b style="font-family: Verdana, sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span></b></div>
<b>IP SLA in 3 steps: </b></span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<br />
<ol>
<li><span style="font-family: "verdana" , sans-serif;">First
define a probe type (<i style="mso-bidi-font-style: normal;">ip sla monitor 11,
icmp-echo 10.1.1.1 source-interface fa 0/0</i>), </span></li>
<li><span style="font-family: "verdana" , sans-serif;">Then define tracking objects (<i style="mso-bidi-font-style: normal;">track 1 ip sla 11 reachability</i>), </span></li>
<li><span style="font-family: "verdana" , sans-serif;">Then
define an action per object (<i style="mso-bidi-font-style: normal;">ip route …
track 1</i>)</span></li>
</ol>
</div>
<span style="font-family: "verdana" , sans-serif;"><b>IP SLA and UDP:</b><span style="font-family: "verdana" , sans-serif;"> IP SLA can measure UDP performance. UDP stats can include latency (delay in a particular direction) and Round Trip Time (overall delay)</span></span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><span style="mso-bidi-font-weight: normal;"><br /></span></span>
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Identify an OSPF ABR:</b> If you see interfaces OSPF enabled in area 0
and another area # then that router is an Area Border Router. If you show ip
ospf database and you see Summary Net Link States (Type 3) LSAs then you are an
ABR – summary links between areas<o:p></o:p></span></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Identify an OSPF ASBR:</b> If you see redistribution or
default-origninate commands then you are looking at an Autonomous System
Boundary Router. <span style="mso-spacerun: yes;"> </span>If you show ip ospf
database and you see Summary ASB Link States (Type 4) LSAs then you are an ASBR
– injecting external info into OSPF<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Path MTU (P-MTU) Discovery: </b>Path MTU determines the true MTU over a
set of links by sending a large packet with the “don’t fragment” (DF) flag set.
When a router with a smaller MTU cannot fragment the packet it will drop it and
send an ICMP message. The sender tries again with smaller and smaller initial
packets until it is able to send the data to the destination. This may be
enabled on VPN links, for example.<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">ISP Connection:</b> You can obtain your IP through DHCP from your ISPF,
but prevent a default route from being installed by using <i style="mso-bidi-font-style: normal;">no ip dhcp client request router<o:p></o:p></i></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Verifying Tracking: </b><i style="mso-bidi-font-style: normal;">show track</i> – verify configured tracking
objects<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Passive Interfaces:</b>
Prevent forming neighborships on an interface (passive-interface default,
passive-interface gig 1/0)<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">EIGRP Packet Types: </b><i style="mso-bidi-font-style: normal;">Queries</i>
are sent to all neighbors on interfaces other than the one used to reach a
previous successor when a route is lost. Queries require Replies. Updates are
sent out when there is a change in the EIGRP topology. Hello messages are sent
to find and verify neighbors<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><b>EIGRP Stub Routers:</b> identify that they should not be queried if an EIGRP route is removed from an adj. router's topology table. </span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span></span>
<br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">DHCP Options:</b> (3) Router, 6 (DNS), 15 (Domain Name), 4 (Time
Server) 1 (Subnet Mask)<o:p></o:p></span><br />
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><b>DHCP Snooping:</b> A task performed on switches to DROP suspicious traffic in the following situations</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<br />
<ol>
<li><span style="font-family: "verdana" , sans-serif;">A DHCP server packet (Reply, ACK, etc) is received from an untrusted interface or server</span></li>
<li><span style="font-family: "verdana" , sans-serif;">Any packet is received on an untrusted interface where the source MAC doesn't match the DHCP client MAC assigned in the DHCP process and stored in the DHCP snooping table., </span></li>
<li><span style="font-family: "verdana" , sans-serif;">A DHCPRELEASE or DHCPDECLINE message is received on an interface which does not match the DHCP snooping table. </span></li>
<li><span style="font-family: "verdana" , sans-serif;">A DHCP packet is received that includes a relay agent IP address that is <i>not </i>0.0.0.0</span></li>
</ol>
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"></span></span><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>Broadcast:</b><span style="font-family: "verdana" , sans-serif;"> all available destinations. (one to all). In IPv4 the largest IP address in a subnet is known as the directed broadcast address.</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Multicast:</b> multiple destinations that share a common group address. (one to many). In IP special addresses are used to recognize multicasts. In IPv4 the class D addresses from 224.0.0.0 to 239.255.255.25 are reserved for multicasting. <o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Anycast:</b> A single destination based on a common shared unicast address.
Based on distance metrics the nearest interface is used. (one to nearest one)<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Convergence:</b> Means that all routing information has been propagated
through the network. <o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Split Horizon: </b>A loop prevention mechanism that prevents sending a specific
network route ID downstream to a router that previously sent that same route ID
upstream. Split Horizon rules can be an issue in a Frame Relay Non-broadcast multiple
access topology. <o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Route Poisoning:</b> A loop prevention mechanism that will, upon link
failure advertise a metric that is higher than the maximum value (and therefore
is poison to adjacent routers, immediately removing the route from the routing
tables) <o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Poison Reverse:</b> A loop prevention mechanism that ensures that when
a poison route is learned a router will <i style="mso-bidi-font-style: normal;">override</i>
the split horizon rule and immediately “confirm” the poison route by sending
the poisoned route back to the sender.<o:p></o:p></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>Route Summarization: </b>Using a subnet mask for a route that encompasses multiple subnets. A dynamic routing protocol may advertise the summary to simplify the routing process and decrease the amount of traffic going to a particular router or router area.</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>Protocol Catagorization:</b></span></span><br />
<span style="font-family: "verdana" , sans-serif;">Distance Vector Protocols: RIP, RIPv2, IGRP, EIGRP</span><br />
<span style="font-family: "verdana" , sans-serif;">Enhanced Distance Vector Protocol: EIGRP</span><br />
<span style="font-family: "verdana" , sans-serif;">Path Vector Protocol: BGP </span><br />
<span style="font-family: "verdana" , sans-serif;">Link State Protocol: OSPF, IS-IS</span><br />
<span style="font-family: "verdana" , sans-serif;">Interior Gateway Protocols: RIP, RIPv2, IGRP, EIGRP, OSPF, IS-IS</span><br />
<span style="font-family: "verdana" , sans-serif;">Exterior Gateway Protocol: BGP</span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>TCP MSS:</b> Maximum Segment Size - the total application data size in a TCP segment, minus the TCP header itself.</span></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">TCP Selective ACKnowledgments:</b><span style="mso-bidi-font-weight: normal;"> improves performance when multiple packets are lost in a window of data transmission (remember TCP tries to be efficient and not ACK every segment). Selective ACKs can request individual segments, rather than resending all segments beginning with the first lost segment. <i>IP TCP selective-ack</i> enables. Selective ACKs can be used with TCP Keepalive Timer, the TCP ECN, and TCP Timestamps.</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<br />
<ul>
<li><span style="font-family: "verdana" , sans-serif;">The TCP keepalive timer identifies dead connections. </span></li>
<li><span style="font-family: "verdana" , sans-serif;">The TCP Explicit Congestion Notification (ECN) feature enables routers to notify hosts regarding congestion. <i>IP TCP ECN </i>enables ECN. </span></li>
<li><span style="font-family: "verdana" , sans-serif;">The TCP Timestamp option supports better TCP round trip time information. <i>IP TCP Timestamp</i> to enable TCP Timestamps.</span></li>
</ul>
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>TCP starvation/UDP dominance: </b>occurs if TCP-based data is assigned to</span><br />
<span style="font-family: "verdana" , sans-serif;">the same service-provider class as UDP-based data and the class experiences</span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><span style="mso-bidi-font-weight: normal;"></span></span><br /></span>
<span style="font-family: "verdana" , sans-serif;">sustained congestion. Mission critical TCP transmissions might be starved out by a streaming video, for example.</span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Hold-down Timer:</b> A loop prevention mechanism that ensures that
routers will not send or accept advertisements for a route for a period of
time. This is typically done after a route fails.<o:p></o:p></span></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">BGP Neighbors: </b>BGP neighborships are manually defined using the neighbor
command. The neighbors must agree on the nature or their relationship –
matching AS = IBGP, different (but correct) AS = EBGP. Neighbors do NOT have to
be physically adjacent, but if not must be able to route to each other using
another dynamic routing protocol or through static routing. The <i style="mso-bidi-font-style: normal;">show ip bgp summary</i> shows local and
neighbor settings. <i style="mso-bidi-font-style: normal;">Show IP BGP Neighbor</i>
gives detailed neighbor info. If the neighbor bgp state is “established” then
BGP peers can exchange routing information because peering is complete. <span style="mso-spacerun: yes;"> </span>If the state is “active” then there is no open
message response from the neighbor which means no routing information can pass
yet. If the state is “idle” then the routing table is being searched for reachability.
If the state is “connect” then the TCP handshake has completed.<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">BGP routing:</b> When determining a preferred route BGP usually picks
the path with the fewest Autonomous Systems (AS) to cross. This is the 4<sup><span style="font-size: xx-small;">th</span></sup>
step in determination, but the most often selected. <o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">PPP Authentication:</b> PPP can support multiple authentication types
such as CHAP with failover to PAP. If the interface is set with <i style="mso-bidi-font-style: normal;">encapsulation ppp</i> then you can issue the
command <i style="mso-bidi-font-style: normal;">ppp authentication chap pap</i><o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b><span style="mso-bidi-font-style: normal;">Data Plane</span> traffic:</b> describes
the traffic being forwarded by a device. (client to server traffic while it is being handled by a router, switch, firewall, etc) </span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><span style="mso-bidi-font-style: normal;"><b><br /></b></span></span>
<span style="font-family: "verdana" , sans-serif;"><b><span style="mso-bidi-font-style: normal;">Management
Plane</span> traffic:</b> connects to the device to manage it using protocols such as SNMP, SSH,
Telnet, HTTP, or HTTPS</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>Control Plane traffic:</b> is sent <i>by </i>the device to other devices for supporting or building the network infrastructure. (CDP, LLDP, OSPF, EIGRP, etc)<o:p></o:p></span></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Protecting the Management Plane:</b> You can implement AAA
authentication to control who can connect with a VTY Line. You can also implement
RBAC views to define who has access to what.<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Bandwidth Delay Product (BDP):</b> A value that is calculated by multiplying
the Round Trip Time (RTT) (visible with a PING) by the available bandwidth
(slowest link in a path) between two nodes. This value is the maximum amount of
data that can traverse the network at any particular time.<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Stub Networks: </b>A network with a single link to the rest of the
networks – may use a static default route to get out and possibly a static
route to get in. <o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">StateLess Address AutoConfiguration (SLAAC):</b> A device learns of a
network via RA (router announcements) which include the IPv6 network ID in the
router’s own IP address. </span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>EUI-64:</b> One method where clients of a router can then assign a unique IPv6 </span></span><br />
<span style="font-family: "verdana" , sans-serif;">host suffix using a method
by expanding their 48-bit mac address into a 64-bit value, inserting FFFE in the middle. Fill Factor of Fluff Everytime<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">IPv6 Routing: </b>IPv6 routing is disabled until you enable it with <i>IPv6
unicast routing </i>and configure IPv6 addresses on an interface. The <i>show ipv6 traffic </i>message "Not a Router" will show up if this hasn't been configured.<o:p></o:p></span><br />
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>IPv6 Host Assignment:</b> IPv6 Hosts send a multicast "router solicitation" messages to FF02::2 (all routers on a segment) which then receives a Router Advertisement (RA message) that provides the network prefix (Network ID) and a path to get off the subnet (default gateway). The advertisement could also tell the Host whether to autoconfigure their unique suffix (stateless) or to find a DHCPv6 server (stateful)</span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">IPv6 ACLs: </b>To limit traffic requires that you define and apply IPv6
ACLS. The command to apply the IPv6 ACL is very different than IPv4, however. It
is <i style="mso-bidi-font-style: normal;">ipv6 traffic-filter <ACL name>
<IN|OUT><o:p></o:p></i></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<span style="font-family: "verdana" , sans-serif;"><b>Bandwidth-delay product:</b> The bandwidth multiplied by the latency:</span><br />
<span style="font-family: "verdana" , sans-serif;">4 Mbps with 100 ms delay</span><br />
<span style="font-family: "verdana" , sans-serif;">4,000,000 bits/sec * 0.1 sec = 400,000 bits</span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Stateless DHCPv6:</b> SLAAC configured clients can receive configuration
parameters without a lease, such as the location of the IPv6 DNS server.<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">Stateful DHCPv6:</b> assignment of IPv6 addresses using a DHCP method
similar to IPv4<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">DHCPv6-PD:</b> An extension to DHCPv6 in which the client receives a
set of subnets which can then be segmented and dynamically applied to client
interfaces (the client usually being a CPE device relative to a service
provider<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">OPSFv3 “VPN routing and forwarding customer edge” (VRF CE): </b>aka,
VRF-lite. Let’s OSPFv3 run on non-default VPN routing and forwarding interfaces.
Multi-VRF enables multiple routing tables on a single router (Customer Edge or
CE). This enables OSPF to run between the Provider Edge (PE) and the customer
edge (CE) when you run <i style="mso-bidi-font-style: normal;">capability
vrf-lite</i> in the OSPF routing process<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">"AnyConnect" SSL VPN:</b><span style="mso-bidi-font-weight: normal;"> A user accesses a web browser and connects to a security appliance using <i>https://IP address </i>and logs in - a client is then securely downloaded according to the user's OS and the client establishes a secure SSL VPN session that then allows encapsulated access for other protocols, such as file share access. The downloaded VPN client may be transient or permanent.</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;"><br /></b></span>
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">DMVPN: </b><span style="mso-bidi-font-weight: normal;">Dynamic Multipoint VPN uses mGRE, NHRP, IPSEC to allow a hub router to automatically build new VPN tunnels with new Spoke routers that connect up to it using proper authentication. Dynamic Mesh (spoke to spoke) tunnels can be built on demand if needed.</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;"><br /></b></span>
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">PPPoE client config:</b> The PPPoE configuration with an ADSL interface
will require referencing the correct dialer interface. This is done with the <i style="mso-bidi-font-style: normal;">pppoe enable</i> command and the <i style="mso-bidi-font-style: normal;">pppoe-client dial-pool-number </i>command
which binds the Ethernet interface to a dialer interface. </span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>PPPoE <i>dialer persistent</i><i>:</i></b>allows for the connection to be brought up without being triggered by "interesting" traffic. PPPoE can be secured by the PPP options of CHAP (encrypted or hashed authentication) and PAP - cleartext authentication. <o:p></o:p></span></span></div>
<b><span style="font-family: "verdana" , sans-serif;">PPPoE Phases:</span></b><br />
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<br />
<ol>
<li><span style="font-family: "verdana" , sans-serif;">Active Discovery Phase— the PPPoE client locates a PPPoE server (access concentrator) and receives a Session ID </span></li>
<li><span style="font-family: "verdana" , sans-serif;">PPP Session Phase— the PPPoE client and server negotiate options and perform authentication. </span></li>
<li><span style="font-family: "verdana" , sans-serif;">PPPoE now functions as Layer 2 encapsulation to allow data to be sent over the PPP link encapsulated within the PPPoE headers.</span></li>
</ol>
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b><br /></b>
<b>DMVPN: Dynamic Multipoint Virtual Private Network:</b><span style="font-family: "verdana" , sans-serif;"> Autoconfigs new
spoke routers by using Next Hop Resolution Protocol (NHRP) to map the tunnel IP
address to the IP address of the physical interface of the hub router and
automatically create a GRE with IPSEC tunnel. The spoke points to the static
address of the hub router that enables the multipoint Generic Routing
Encapsulation (mGRE) interface to build a dynamic tunnel back to the branch
router without having to configure the hub by hand.</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">EIGRP Metric: </b>The Diffusing Update Algorithm (DUAL) uses enabled “1”
K values for <i style="mso-bidi-font-style: normal;">Lowest</i> <i style="mso-bidi-font-style: normal;">Bandwidth</i> and <i style="mso-bidi-font-style: normal;">Cumulative</i> <i style="mso-bidi-font-style: normal;">Delay</i> by
default, with disabled “0” K values for Reliability and Load. Note that MTU is
included in the EIGRP routing update but is not used by default in the DUAL
calculation. <o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "calibri";"><b style="mso-bidi-font-weight: normal;">IPv6 Global Addresses: </b>2000::/3 refers to Global Addresses which
are Internet routable, ie: Google’s IPv6 DNS server is on </span><span lang="EN" style="line-height: 107%;">2001<b style="mso-bidi-font-weight: normal;">:</b><strong><span style="font-weight: normal;">4860</span></strong><b style="mso-bidi-font-weight: normal;">:</b><strong><span style="font-weight: normal;">4860</span></strong><b style="mso-bidi-font-weight: normal;">::</b><strong><span style="font-weight: normal;">8888</span></strong></span><o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">IPv6 Link Local Addresses:</b> FE80::/10 refers to Link-Local Addresses
which are used for local communication and are autoconfigured on all IPv6
interfaces, such as a router with FE80::C001:1DFF:FEE0:0<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">IPv6 Multicast Addresses:</b> <span style="mso-spacerun: yes;"> </span>FF00::/9
refers to Multicast address which are shared by all multicast group members,
such as OSPFv3 hellos on FF00::5<o:p></o:p></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b style="mso-bidi-font-weight: normal;">IPv6 Unique Local Addresses:</b> FC00::/7 refer to Unique Local
Addresses which are globally unique and are not expected to be internet
routable, but only routed internally.<o:p></o:p></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><b><br /></b></span>
<span style="font-family: "verdana" , sans-serif;"><b>NAT64:</b> Use this IPv6 transition technology if you want to allow IPv6 devices to be able to communicate with IPv4 servers. Nat64 can be setup in a stateless or stateful configuration. Separates DNS64 and NAT64 functionality</span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>NPTv6:</b> <span style="background-color: white; color: #48525a;"> </span><span style="background-color: white;">Network PREFIX Translation, performs a stateless static, one-to-one IPv6 to IPv6 translation in both directions. Because it doesn't have to translate transport layer headers (TCP/UDP ports) it is checksum-neutral and doesn't interfere with the <i>payload </i>of IP, even when encrypted.</span><span style="background-color: white;"> </span></span></span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><span style="background-color: white; font-family: "verdana" , sans-serif;"><br /></span></span></span>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><span style="background-color: white; font-family: "verdana" , sans-serif;"><b>NAT-PT:</b> NAT Protocol Translation is an older technology for IPv4 devices to communicate with IPv6 devices via transparent router translation. It does not support Cisco Express Forwarding and only supports DNS, FTP, ICMP Application Layer Gateways.</span></span></span></div>
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal" style="margin: 0in 0in 8pt; tab-stops: 64.4pt;">
<span style="font-family: "verdana" , sans-serif;"><b>GRE Configuration: </b>When setting up a GRE tunnel you will need to
create a tunnel interface and specify the tunnel source interface and the
tunnel destination IP address, as well as the tunnel’s ip address (which should
be a local point-to-point address to the other tunnel endpoint). Also specify
the tunnel mode as being gre ip</span><br />
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><br /></span>
</span><br />
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><b>Service password-encryption:</b> encrypts all user passwords in the
router’s account database<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><b>Multipoint two-way redistribution:</b> can lead to suboptimal routing
and/or routing loops.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><b>Unicast reverse path forwarding RSF:</b> enables a router to verify the
reachability of the <i>source </i>address in packets being forwarded. Enable on an
interface with <i>ip verify unicast source
reachable-via rx</i> (strict) or <i>all</i>
(loose). Verify with <i>show cef interface
<int>. </i>This feature helps mitiage against forged IP packets. It can be run in strict (RX on same interface), Loose (ANY interface can route to it), and VRF mode.</span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><i><br /></i></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><b>Validating the Update Source:</b><i>
</i>By default all RIP updates are discarded if the source address is not
valid.<i> No validate-update-source </i>prevents
this process from occurring.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><b>Easy Virtual Network:</b> end-to-end virtualization of multiple
networks where a single IP infrastructure provides multiple (up to 32) virtual networks
who’s paths are isolated from each other. 802.1Q encapsulation is used to support EVN interfaces. It is exclusive of VRF-Lite, OSPF v2 & OSPF v3. All of the associated subinterfaces can share a unique IP address, routing table and forwarding table. NAT, ACLs and Netflow are not supported with EVN.</span><br />
<span style="font-family: "verdana" , sans-serif;"><a href="https://www.cisco.com/c/dam/en/us/products/collateral/ios-nx-os-software/easy-virtual-network-evn/aag_c45-675118.pdf">https://www.cisco.com/c/dam/en/us/products/collateral/ios-nx-os-software/easy-virtual-network-evn/aag_c45-675118.pdf</a></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><b>HSRP:</b> Because HSRP is a First Hop Redundancy Protocol (FHRP) routers will failover if their shared network link goes down. However they can be told to perform switchover based on tracking an IP SLA state of a remote router via ICMP or through the enabling or disabling of any interface, including a loopback (for manual switchover).</span><br />
<span style="font-family: "verdana" , sans-serif;"><br /></span>
<span style="font-family: "verdana" , sans-serif;"><b>NetFlow:</b> Identify traffic causing bandwidth performance issues - source and destination IP/Protocol/Port (aka socket) can be verified. NetFlow requires Cisco Express Forwarding to be configured globally in order to see both in and <i>out </i>traffic. If random sampling mode is selected it will choose 1 packet out of a hundred to test. The flow monitor is applied to an interface to perform monitoring. The exporter sends the data to a collector. </span><br />
<b><span style="font-family: "verdana" , sans-serif;"><br /></span></b>
<b><span style="font-family: "verdana" , sans-serif;">NetFlow Commands:</span></b><br />
<span style="font-family: "verdana" , sans-serif;"><i>show flow exporter <NAME></i> will show the current status of the flow exporter. <i>show flow monitor <NAME> </i>will show the status and statistics of a flow monitor.</span><br />
<span style="font-family: "verdana" , sans-serif;"><i>show flow sampler <NAME> </i>will show if random sampling mode where 1/n number of packets are used for statistical analysis</span><br />
<span style="font-family: "verdana" , sans-serif;"><i>ip flow-export destination <IP> <PORT> </i>will export cache flow information to a destination IP address on a specified UDP port.</span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><b>NTP:</b> Has a client/server relationship for maintaining correct time. The interface level <i> NTP client broadcast </i>command enables receiving NTP broadcasts on that particular interface.</span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><b>Logging: </b>Increase logging accuracy by enabling service time stamps (</span><span style="background-color: whitesmoke; color: #333333; white-space: pre-wrap;"><span style="font-family: "verdana" , sans-serif;"><i>service timestamps debug datetime msec</i></span></span><span style="font-family: "verdana" , sans-serif;">), increasing the logging history size (<i>logging history size <1-500>), or </i>increasing the logging history level (<i>logging history <level# 1-7>) </i>Note that higher numbers = higher detail</span></span></div>
<table border="1" bordercolor="#808080" cellpadding="3" cellspacing="0" id="wp1054858table1054852" style="background-color: white; border-collapse: collapse; border-spacing: 0px; border: none; color: #58585b; font-stretch: inherit; height: auto; line-height: inherit; margin: 10px 0px; max-width: 97%; overflow: auto; padding: 0px; table-layout: fixed; vertical-align: baseline; width: 80%; word-wrap: break-word;"><caption style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: bold; line-height: 1.44em; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"><div class="pTC_TableCap" style="border: 0px; color: black; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 0px; text-align: left; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Table 3 Message Logging Level Keywords </span></div>
</caption><tbody style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;">
<tr align="left" style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;" valign="bottom"><th scope="col" style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054866" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 400; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pCH1_CellHead1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 2px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Level Keyword</span></div>
</th><th scope="col" style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054868" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 400; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pCH1_CellHead1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 2px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Level</span></div>
</th><th scope="col" style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054870" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 400; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pCH1_CellHead1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 2px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Description</span></div>
</th><th scope="col" style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054872" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 400; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pCH1_CellHead1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 2px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Syslog Definition</span></div>
</th></tr>
<tr align="left" style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;" valign="top"><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054874" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span class="cBold" style="border: 0px; font-family: "verdana" , sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;">emergencies</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054876" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">0</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054878" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">System unstable</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054880" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">LOG_EMERG</span></div>
</td></tr>
<tr align="left" style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;" valign="top"><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054882" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span class="cBold" style="border: 0px; font-family: "verdana" , sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;">alerts</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054884" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">1</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054886" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Immediate action needed</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054888" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">LOG_ALERT</span></div>
</td></tr>
<tr align="left" style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;" valign="top"><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054890" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span class="cBold" style="border: 0px; font-family: "verdana" , sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;">critical</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054892" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">2</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054894" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Critical conditions</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054896" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">LOG_CRIT</span></div>
</td></tr>
<tr align="left" style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;" valign="top"><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054898" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span class="cBold" style="border: 0px; font-family: "verdana" , sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;">errors</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054900" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">3</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054902" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Error conditions</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054904" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">LOG_ERR</span></div>
</td></tr>
<tr align="left" style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;" valign="top"><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054906" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span class="cBold" style="border: 0px; font-family: "verdana" , sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;">warnings</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054908" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">4</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054910" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Warning conditions</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054912" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">LOG_WARNING</span></div>
</td></tr>
<tr align="left" style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;" valign="top"><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054914" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span class="cBold" style="border: 0px; font-family: "verdana" , sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;">notifications</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054916" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">5</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054918" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Normal but significant condition</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054920" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">LOG_NOTICE</span></div>
</td></tr>
<tr align="left" style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;" valign="top"><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054922" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span class="cBold" style="border: 0px; font-family: "verdana" , sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;">informational</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054924" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">6</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054926" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Informational messages only</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054928" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">LOG_INFO</span></div>
</td></tr>
<tr align="left" style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;" valign="top"><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054930" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span class="cBold" style="border: 0px; font-family: "verdana" , sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 700; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;">debugging</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054932" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">7</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054934" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">Debugging messages</span></div>
</td><td style="border-collapse: collapse; border-radius: 2px; border: 2px solid rgb(204, 204, 204); font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 5px 5px 5px 7px; vertical-align: baseline;"><span style="font-family: "verdana" , sans-serif;"><span style="font-family: "verdana" , sans-serif;"><a href="https://www.blogger.com/null" name="wp1054936" style="border: 0px; color: #007fab; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; overflow: visible; padding: 0px; vertical-align: baseline;"></a><br /></span>
</span><br />
<div class="pB1_Body1" style="border: 0px; color: #525252; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.44em; margin-bottom: 6px; overflow: visible; padding: 5px 0px; vertical-align: baseline;">
<span style="font-family: "verdana" , sans-serif;">LOG_DEBUG</span></div>
</td></tr>
</tbody></table>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif; font-size: xx-small;"><a href="https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SysMsgLogging.html#wp1054858">https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SysMsgLogging.html#wp1054858</a> </span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "verdana" , sans-serif;"><br /></span>
</div>
</div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com8tag:blogger.com,1999:blog-5047027589469055445.post-79901954389056975462017-08-10T16:55:00.002-07:002017-08-11T10:00:09.971-07:00Do I need a Cloud Access Security Broker (CASB)? What does it do?When it comes to security in IT, you just aren't allowed to blink. A few years ago no one had heard of a CASB. Look at the latest Security+ exam objectives and it's only a line item in the glossary. But today businesses are waking up to the reality that a CASB is critical to their security design, and if the vendors are to be believed, it's a matter of when, not if, a CASB is rolled into the security infrastructure.<br />
<br />
Let's break up the acronym to see why.<br />
<br />
CASB<br />
<br />
<ul>
<li><u style="font-weight: bold;">C</u>loud - OK, so cloud technologies are ubiquitous these days. Maybe you deal in the heavy stuff - custom content written to Amazon Web Services (AWS), Microsoft Azure, or Google Cloud platform. Maybe you consume prebuilt high profile cloud apps like Google Drive, Office 365, Rackspace, NetSuite, Meraki... the list goes on and on, right? And what was an exception may not yet be the rule, but it is business as usual.</li>
<li><u style="font-weight: bold;">A</u>ccess <u style="font-weight: bold;">S</u>ecurity - What's the concern with the cloud? Time and time again it is the consumer's question - where is my data? Is it safe? When you relinquish absolute control over the data management you then have to start trusting your provider. Which would be great if it weren't for the fact that we know there are so many black hats out there constantly looking for vulnerabilities and opportunities. It's hard enough to keep your own environment locked down correctly. Are you going to have to pay attention to every cloud proprietor you do business with as well?</li>
<li><u style="font-weight: bold;">B</u>roker - So this is where we introduce a middle-man (not to be confused with a man-in-the-middle attack!) - the CASB. The CASB will be a drop point to lock down the cloud services that YOU need to track. It will give you the access security means to detect and enforce policies regarding acceptable Cloud technology use. </li>
</ul>
<br />
<br />
The job of the CASB then is to allow the IT department to say "Yes" to various cloud technologies without having to worry about sensitive data leakage into untrusted environments. This can mean protection in the form of real time monitoring of traffic to provide Data Loss Prevention (DLP) and/or encryption of sensitive files. It also means that a single sign on through the CASB to access cloud services that don't support SSO themselves. THAT in turn can grant you tools for access control based on your own internal user accounts, which can be disabled and easily audited. In other words - Booya! You're in control again.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiVygz5n9OcIs6Lo0ydhIz4YYdK72crAWiLPhWXz4UUrN7TytSZ-OzMdfa6dfNlbl5lGKX3qQHUuRdJ_1FNqgr3eXN1FGTeoNqjq35HM_w1QA1ICN_9OvvKkQ9nVOqovBGneHSnLrYs8Gr/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="267" data-original-width="262" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiVygz5n9OcIs6Lo0ydhIz4YYdK72crAWiLPhWXz4UUrN7TytSZ-OzMdfa6dfNlbl5lGKX3qQHUuRdJ_1FNqgr3eXN1FGTeoNqjq35HM_w1QA1ICN_9OvvKkQ9nVOqovBGneHSnLrYs8Gr/s1600/MBLogo4.png" /></a></div>
<br />Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-46319171163143206762017-08-10T16:09:00.003-07:002017-08-10T16:09:30.913-07:00Majorbacon's quick hitlist of the Comptia Security+ PKI TermsPublic Key Infrastructure has a lot of terms and acronyms that get thrown around. Here is a rundown on some of the most common terms to know and love.<br />
<br />
<b>Components</b><br />
<br />
<ul>
<li>PKI: A PKI can be described as a set of technologies, procedures and policies for propagating trust from where it initially exists to where it is needed for authentication in online environments. </li>
<li>CA: A Certificate authority hands out certificates to consumers to provide a central point of trusted authenticity</li>
<li>Intermediate CA: A CA that receives its authority from a Root CA and then provides certs of authority to an issuing CA</li>
<li>CRL: Certificate Revocation List – the list of certificates that should no longer be accepted because they have been revoked before expiration, usually because a system is no longer in service or the certificate has been compromised. These lists can be published over HTTP or other protocols</li>
<li>OCSP – Online Certificate Status Protocol – an alternative to downloading the entire CRL, a protocol to validate a particular certificate from the client using HTTP (usually)</li>
<li>CSR – A Certificate Signing Request is sent to apply for a cert around a particular key</li>
<li>Certificate – A file used to provide validation of public keys. They indicate when not to use these keys because of expiration, location, and use type. They are digitally signed by the issuing CA, with signature links up to the Root CA. Clients will use the public key once they have validated the CA signature is trusted and the key is in a trusted context.</li>
<li>Public key – Freely disseminated key sent with certificates and used to Encrypt data and Validate signatures of a matching private key</li>
<li>Private key – Closely held key used to Sign and Decrypt content encrypted with a matching public key</li>
<li>Object identifiers (OID) – a value attached to a certificate at creation that can be used in conjunction with policies to determine client behavior. An organization obtains a root OID and then creates sub OIDs</li>
</ul>
<br />
<b>Concepts</b><br />
<br />
<ul>
<li>Online vs. offline CA – Issuing CAs need to respond to requests and should be online. Root CAs in a hierarchy are rarely needed (just to create or renew subordinate CAs) and are more defensible if taken offline.</li>
<li>Stapling – OCSP Stapling – instead of having the client perform the OCSP request the Cert Presenter delivers the time stamped OCSP response signed by the CA</li>
<li>Pinning – Pre-associating a host in development or on first contact. Cert or Public Key</li>
<li>Trust model – Types of trust methodologies: PGP, Single and Multiple Hierarchic PKIs, Discressionary Direct Trust, DNSSEC</li>
<li>Key escrow – The idea of a recovery agent – that a third party could decrypt data if needed. </li>
<li>Certificate chaining – Root-Intermediate-Issuing CA-Issued Cert. Trust the Root, trust all the certs chained from it.</li>
</ul>
<br />
<br />
<b>Types of certificates</b><br />
<br />
<ul>
<li>Wildcard – uses the * - can refer to many domain names –useful for vanity URL type sites like SharePoint Apps</li>
<li>SAN – Subject Alternative Name – explicit list of trusted names, IP addresses, Exchange 2007 started using it</li>
<li>Code signing – Certificate’s Private key encrypts a hash of the code data </li>
<li>Self-signed – cert without a PKI – used for many types of software’s initial installation – not trustworthy.</li>
<li>Machine/computer – Validate the computer, allows computer services to encrypt</li>
<li>Email – used for digitally signing email – hash of email is encrypted with private key</li>
<li>User – used to validate user credentials and/or encrypt users’s data</li>
<li>Root – used to provide authenticity at the top of cert chain</li>
<li>Domain validation – DNSSEC cert used to validate IP info</li>
<li>Extended validation – Validates that the site is operated by the LEGAL Entity</li>
</ul>
<br />
<br />
<b>Certificate formats</b><br />
<br />
<ul>
<li>DER: Single binary unencrypted binary copy of a PEM file the x.509 cert</li>
<li>PEM –ASCII Form of an issued certificate(s) –begin-- encrypted binary copy of the x.509 cert</li>
<li>PFX – certificate with private key (possible protected) – PKCS#12 archive, possibly with chain</li>
<li>CER / CRT – Single unencrypted binary copy of the x.509 cert</li>
<li>P12 – Binary format for holding certificate AND private stores (aka PKCS#12)</li>
<li>P7B – ASCII Text format for holding only public certificate information</li>
</ul>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiVygz5n9OcIs6Lo0ydhIz4YYdK72crAWiLPhWXz4UUrN7TytSZ-OzMdfa6dfNlbl5lGKX3qQHUuRdJ_1FNqgr3eXN1FGTeoNqjq35HM_w1QA1ICN_9OvvKkQ9nVOqovBGneHSnLrYs8Gr/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="267" data-original-width="262" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiVygz5n9OcIs6Lo0ydhIz4YYdK72crAWiLPhWXz4UUrN7TytSZ-OzMdfa6dfNlbl5lGKX3qQHUuRdJ_1FNqgr3eXN1FGTeoNqjq35HM_w1QA1ICN_9OvvKkQ9nVOqovBGneHSnLrYs8Gr/s1600/MBLogo4.png" /></a></div>
<div>
<br /></div>
<br />
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com1tag:blogger.com,1999:blog-5047027589469055445.post-17260725404929001862016-05-31T16:53:00.001-07:002017-08-09T07:07:44.980-07:00Uninstall .NET Framework 4.6.1 if you are installing older Microsoft Products - Exchange - SharePoint - Office Web Apps<h2>
<span style="font-family: "arial" , "helvetica" , sans-serif; font-size: small;"><br /></span></h2>
<h2>
<span style="background-color: #eeeeee; font-family: "arial" , "helvetica" , sans-serif; font-size: small;">I got into a bit of a freak out the other day.</span></h2>
<span style="font-family: "arial" , "helvetica" , sans-serif;">I wanted to install SharePoint 2013 on a new server, but I couldn't because of .NET incompatibility. After some research I found that the problem was the same one that I had earlier had to unravel for my Exchange Server. It seems that unfortunately, the .NET Framework 4.6.1 is not compatible with many relatively recent Microsoft server products. If you are building images you'll want to make sure that you include images that do <b>not</b> include this component as it is not supported and may block new installations of products like these:</span><br />
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<br />
<ul>
<li><span style="font-family: "arial" , "helvetica" , sans-serif;">Exchange 2013, 2015</span></li>
<li><span style="font-family: "arial" , "helvetica" , sans-serif;">SharePoint 2013</span></li>
<li><span style="font-family: "arial" , "helvetica" , sans-serif;">Office Web Apps Server 2013</span></li>
<li><span style="font-family: "arial" , "helvetica" , sans-serif;">Skype for Business Server 2015</span></li>
</ul>
<h2>
<span style="background-color: #eeeeee; font-family: "arial" , "helvetica" , sans-serif; font-size: small;">Block it before it gets there!</span></h2>
<span style="font-family: "arial" , "helvetica" , sans-serif;">You want to stick with .NET 4.5.2, so here's how to prevent the installation of 4.6.1</span><br />
<br />
<span style="font-family: arial, helvetica, sans-serif;">Method 1:</span><br />
<ol class="sbody-num_list" style="background-color: white; box-sizing: border-box; margin: 0px;">
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Back up the registry. (duh)</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Type <span class="sbody-userinput" style="box-sizing: border-box; outline: none;">regedit</span> in the <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">Start Search</span> box, and then press Enter to open the registry editor</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Locate and click the following subkey:<br style="box-sizing: border-box;" /><span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">HKEY_LOCAL_MACHINE\Software\Microsoft\NET Framework Setup\NDP</span></span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">After you select this subkey, point to <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">New</span> on the <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">Edit</span> menu, and then click <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">Key</span>.</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Type <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">WU</span>, and then press Enter.</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Right-click <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">WU</span>, point to <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">New</span>, and then click <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">DWORD Value</span>.</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Type <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">BlockNetFramework461</span>, and then press Enter.</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Right-click <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">BlockNetFramework461</span>, and then click <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">Modify</span>.</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">In the <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">Value data</span> box, type <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">1</span>, and then click <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">OK</span>.</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">On the <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">File</span> menu, click <span class="text-base" style="box-sizing: border-box; font-weight: 600; line-height: 1.33333; margin-bottom: 0px; margin-top: 0px; outline: 0px;">Exit</span> to exit Registry Editor</span></li>
</ol>
<span style="font-family: arial, helvetica, sans-serif;">Method 2:</span><ol class="sbody-num_list" style="background-color: white; box-sizing: border-box; margin: 0px;">
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Back up the registry</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Instead of doing steps 2-10, create a text file with the following contents<br /><b><span style="color: red;">Windows Registry Editor Version 5.00</span></b><b><span style="color: red;"><br />[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\WU]</span></b><b><span style="color: red;">"BlockNetFramework461"=dword:00000001</span></b></span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Save the file as "BlockNETF461.reg" (remember adding quotes stops the .txt extension)</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Execute this file on any machine to block the installation until such time as you are ready for it.</span></li>
</ol>
<span style="font-family: arial, helvetica, sans-serif;">Method 3:</span><ol class="sbody-num_list" style="background-color: white; box-sizing: border-box; margin: 0px;">
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="background-color: transparent;">Configure group policy preferences in an Active Directory managed environment. If you're not familiar with this tool, check out this article where I show you how to manage mouse sizes with GPO preferences: </span><a href="http://majorbacon.blogspot.com/2016/04/customizing-your-mouse-cursor-using.html" style="background-color: transparent;" target="_blank">http://majorbacon.blogspot.com/2016/04/customizing-your-mouse-cursor-using.html </a></span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">In the GPO Management Console create a new GPO and link it to your OU of servers that you wish to prevent the installation of the .NET Framework 4.6.1</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Right click and Edit the GPO</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Expand the Computer -> Preferences -> Windows Settings -> Registry</span></li>
<li style="box-sizing: border-box; line-height: 20px; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Right click and choose New Registry Item</span></li>
<ol style="line-height: 20px;">
<li style="box-sizing: border-box; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Change the Action to Create</span></li>
<li style="box-sizing: border-box; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Enter the Key Path of SOFTWARE\Microsoft\NET Framework Setup\NDP\WU</span></li>
<li style="box-sizing: border-box; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Enter a Value Name of BlockNetFramework461</span></li>
<li style="box-sizing: border-box; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Select a Value Type of Reg_DWORD</span></li>
<li style="box-sizing: border-box; margin-bottom: 12px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Enter the Value Data of 1</span></li>
</ol>
<li><span style="line-height: 20px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Click OK and close the Group Policy Editor and Management Consoles. After the next group policy update on the affected servers the .NET framework will be blocked</span></span></li>
</ol>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipznz7HG8KQVZNNMBz5RFd3kfcIuVCW_QYTZBYnBPxaFWeLJALT7VGzfALzOzLtZ_jUR7buO9yRYpWm4DHytIygN2_3mYw2Fl0UkKZUUMW7acIZMTOzTsnNQSmWHVhyll_nBXxe2yo-cto/s1600/GPO+Preference.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipznz7HG8KQVZNNMBz5RFd3kfcIuVCW_QYTZBYnBPxaFWeLJALT7VGzfALzOzLtZ_jUR7buO9yRYpWm4DHytIygN2_3mYw2Fl0UkKZUUMW7acIZMTOzTsnNQSmWHVhyll_nBXxe2yo-cto/s640/GPO+Preference.PNG" width="640" /></span></a></div>
<div>
<span style="line-height: 20px;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></span></div>
<h2>
<span style="background-color: #cccccc; font-family: "arial" , "helvetica" , sans-serif; font-size: small;">But wait! .NET 4.6.1 is already installed!</span></h2>
<div>
<span style="font-family: "arial" , "helvetica" , sans-serif;">If the .NET 4.6.1 update is already installed and you have not yet installed a server product (perhaps it is already in a baseline image) then you simply need to uninstall the update and run the repair tool</span></div>
<div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<ol style="background-color: white; box-sizing: border-box; margin-bottom: 10px; margin-top: 0px;">
<li style="box-sizing: border-box;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #333333; line-height: 22.8571px;"><span style="color: #34495e; font-family: "arial" , "helvetica" , sans-serif; line-height: 21.56px;"><span style="color: #333333; line-height: 22.8571px;"><span style="color: #34495e; line-height: 21.56px;">First download the .NET framework verification utility from <a href="https://www.blogger.com/goog_422790397">here: </a></span></span><span style="color: #34495e; font-size: small; line-height: normal;"><span style="line-height: 21.56px;"><a href="http://blogs.msdn.com/b/astebner/archive/2008/10/13/8999004.aspx">http://blogs.msdn.com/b/astebner/archive/2008/10/13/8999004.aspx</a></span></span></span></span></span></li>
<li style="box-sizing: border-box;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #333333; line-height: 22.8571px;"><span style="color: #34495e; line-height: 21.56px;">Run the tool and use the drop down box to confirm that </span><b style="color: #34495e; line-height: 21.56px;">.NET Framework 4.6.1</b><span style="color: #34495e; line-height: 21.56px;"> is listed. </span></span><span style="color: #34495e; line-height: 21.56px;">(The tool shows all the versions of .NET that are installed.)<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUVp7s3lZ33P1bFhdKpvnYg2rwDoOGB5t9cIPQTJQb9OdLxD6CaNhpGFymR9gIBh20w_FLGqtShWE40GtMSt9p5B95PEL20OGR7LZA3yNFnCNM-LSaf6R0kLuagQMhnhRKaG-rufMoWAO8/s1600/Verify+4.5.2.png" imageanchor="1" style="line-height: normal; margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="171" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUVp7s3lZ33P1bFhdKpvnYg2rwDoOGB5t9cIPQTJQb9OdLxD6CaNhpGFymR9gIBh20w_FLGqtShWE40GtMSt9p5B95PEL20OGR7LZA3yNFnCNM-LSaf6R0kLuagQMhnhRKaG-rufMoWAO8/s400/Verify+4.5.2.png" width="400" /></a></span></span></li>
<li style="box-sizing: border-box;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #34495e; font-family: "arial" , "helvetica" , sans-serif; line-height: 21.56px;">Close the verification utility.</span></span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Go to the <b>add/remove programs </b>control panel</span></span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Select<b> view installed updates </b>(lefthand pane)</span></span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">find the entry for the dreaded <b>KB3102467</b>.</span></span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Select and Uninstall the update.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhikWmwjlrOm2GGGTSxWgwPXlSPqU_-8CiJT8IliFldJhA7GoP2D1NHWayf-7ykw8dK0jP925BL3e8BUthpQ9E1Mtr8Whf5Xen6RUE5-Bns8BoibKwh9_4aRz5ZLSoeuM1c9pb4v8XqiIhq/s1600/UninstallKB.png" imageanchor="1" style="clear: left; line-height: normal; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="370" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhikWmwjlrOm2GGGTSxWgwPXlSPqU_-8CiJT8IliFldJhA7GoP2D1NHWayf-7ykw8dK0jP925BL3e8BUthpQ9E1Mtr8Whf5Xen6RUE5-Bns8BoibKwh9_4aRz5ZLSoeuM1c9pb4v8XqiIhq/s640/UninstallKB.png" width="640" /></a></span></span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Reboot when prompted.</span></span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="line-height: 22.8571px;"><span style="color: #34495e; line-height: 21.56px;">Run the tool and use the drop down box to confirm that </span><b style="color: #34495e; line-height: 21.56px;">.NET Framework 4.6.1</b><span style="color: #34495e; line-height: 21.56px;"> is no longer listed. V</span></span><span style="line-height: 22.8571px;">erify that it <b>is </b>showing 4.5.2. </span></span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="line-height: 22.8571px;">Repair the .NET 4.5.2 installation by downloading the</span><span style="line-height: 22.8571px;"> </span><a href="https://www.microsoft.com/en-us/download/details.aspx?id=42642" style="background-color: transparent; box-sizing: border-box; color: #337ab7; line-height: 22.8571px; text-decoration: none;">offline installer</a><span style="line-height: 22.8571px;">, running setup and choose repair<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS9da82gGi1F56g1S-VRU6LdOfj2IyD3p5VMBjVVab_1whnhZgX5XZ5G5CwMIwrdwZCjTPNVL6z2X7FpLz35DnSMYmOaXtkVJ3mUjNgFRduquY9_drpHYKTwXqqeoaG3mJ8MDgYhNfuch1/s1600/Repair+.NET+Framework+4.5.2.png" imageanchor="1" style="line-height: normal; margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" height="375" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS9da82gGi1F56g1S-VRU6LdOfj2IyD3p5VMBjVVab_1whnhZgX5XZ5G5CwMIwrdwZCjTPNVL6z2X7FpLz35DnSMYmOaXtkVJ3mUjNgFRduquY9_drpHYKTwXqqeoaG3mJ8MDgYhNfuch1/s400/Repair+.NET+Framework+4.5.2.png" width="400" /></a></span></span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Reboot when setup is complete.</span></span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Apply the following Security updates for .NET 4.5.2 from Windows update</span></li>
<ol style="color: #333333; line-height: 22.8571px;">
<li style="box-sizing: border-box;"><span style="font-family: "arial" , "helvetica" , sans-serif;">KB3122654 </span></li>
<li style="box-sizing: border-box;"><span style="font-family: "arial" , "helvetica" , sans-serif;">KB3127226</span></li>
<li style="box-sizing: border-box;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Remember, Do NOT select KB3102467!!!!</span></li>
</ol>
<li style="color: #333333; line-height: 22.8571px;"><span style="line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Reboot after installation.</span></span></li>
</ol>
<div>
<h2>
<span style="background-color: #cccccc; font-family: "arial" , "helvetica" , sans-serif; font-size: small;">But wait! .NET 4.6.1 is already installed AND I've already installed Exchange or SharePoint or Skype Server!</span></h2>
</div>
</div>
<div>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Don't Panic! The above steps still apply with just a few caveats</span></div>
<div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<ol style="background-color: white; box-sizing: border-box; margin-bottom: 10px; margin-top: 0px;">
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Ensure you have rebooted since the installation of .NET 4.6.1 so that further management can occur.</span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Stop all running services related to your product. <br />For example, in Exchange using the Exchange Management Shell <br /><b>(Test-ServiceHealth).ServicesRunning | %{Stop-Service $_ -Force}</b></span></li>
<li style="box-sizing: border-box; color: #333333; line-height: 22.8571px;"><span style="font-family: "arial" , "helvetica" , sans-serif;">Perform the steps listed above to remove the offending update KB3102467</span></li>
<li style="box-sizing: border-box;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #34495e;"><span style="line-height: 21.56px;">Unfortunately, Many services must recompile all of their NET assemblies, a long and CPU taxing process. To alleviate this burden, the folks at the <a href="https://blogs.msdn.microsoft.com/dotnet/2013/08/06/wondering-why-mscorsvw-exe-has-high-cpu-usage-you-can-speed-it-up/" target="_blank">.NET Blog</a> </span></span><span style="color: #34495e; line-height: 21.56px;">have provided a <a href="http://aka.ms/DrainNGenQueue" target="_blank">speedup script </a>to allow mscorswv.exe to use multiple threads and up to 6 cores. </span></span></li>
<li style="box-sizing: border-box;"><span style="font-family: "arial" , "helvetica" , sans-serif;"><span style="color: #34495e; line-height: 21.56px;">Save the </span><b style="color: #34495e; line-height: 21.56px;">7318.DrainNGenQueue.wsf</b><span style="color: #34495e; line-height: 21.56px;"> script to the computer's desktop and execute it locally from the administrative command prompt using <br />cscript <path>\7318.drainngenqueue.wsf</span></span></li>
</ol>
<div>
<h2>
<span style="color: #34495e; font-family: "arial" , "helvetica" , sans-serif;"><span style="background-color: #cccccc; font-family: "arial" , "helvetica" , sans-serif; font-size: small; line-height: 21.56px;">Is this forever?</span></span></h2>
</div>
<div>
<span style="color: #34495e; font-family: "arial" , "helvetica" , sans-serif;"><span style="font-family: "arial" , "helvetica" , sans-serif; line-height: 21.56px;">Of course not. Eventually you will be using products that are compliant with .NET 4.6.1 because you are working with the next generation product or because Microsoft has updated the previous generation product to be supported by .NET 4.6.1. Then you can remove the GPO preference or reg hack and allow your systems to update normally.</span></span><br />
<span style="color: #34495e; font-family: "arial" , "helvetica" , sans-serif;"><span style="font-family: "arial" , "helvetica" , sans-serif; line-height: 21.56px;"><br /></span></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiVygz5n9OcIs6Lo0ydhIz4YYdK72crAWiLPhWXz4UUrN7TytSZ-OzMdfa6dfNlbl5lGKX3qQHUuRdJ_1FNqgr3eXN1FGTeoNqjq35HM_w1QA1ICN_9OvvKkQ9nVOqovBGneHSnLrYs8Gr/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="267" data-original-width="262" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiVygz5n9OcIs6Lo0ydhIz4YYdK72crAWiLPhWXz4UUrN7TytSZ-OzMdfa6dfNlbl5lGKX3qQHUuRdJ_1FNqgr3eXN1FGTeoNqjq35HM_w1QA1ICN_9OvvKkQ9nVOqovBGneHSnLrYs8Gr/s1600/MBLogo4.png" /></a></div>
<div style="text-align: center;">
<span style="color: #34495e; font-family: "arial" , "helvetica" , sans-serif;"><span style="font-family: "arial" , "helvetica" , sans-serif; line-height: 21.56px;"><br /></span></span></div>
</div>
<div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "segoe ui" , "segoe ui web" , "segoe ui symbol" , "helvetica neue" , "bbalpha sans" , "s60 sans" , "arial" , sans-serif;"><span style="font-size: 15px; line-height: 20px;"><br /></span></span></div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com120tag:blogger.com,1999:blog-5047027589469055445.post-8569531005734610552016-04-29T14:25:00.002-07:002016-04-29T14:32:43.304-07:00Why doesn't my RF signal get through?<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijhqsUvV0xCYMyss3GcuApfMAm5vaegwfyKpLPNLQiGZxdAMkvAr949wCQEcsTFouP_ABjj2P7vd144C5PEZ1HyPc7M4o2iW2Q44O1EBUaDUtoYCn_PKCIZfgnUjhlljUV_36aPIkFo1k_/s1600/waterDroplet.PNG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="140" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijhqsUvV0xCYMyss3GcuApfMAm5vaegwfyKpLPNLQiGZxdAMkvAr949wCQEcsTFouP_ABjj2P7vd144C5PEZ1HyPc7M4o2iW2Q44O1EBUaDUtoYCn_PKCIZfgnUjhlljUV_36aPIkFo1k_/s200/waterDroplet.PNG" width="200" /></a>All of us who have to manage wireless signal, especially when trying to support a 802.11 network, have to overcome the initial challenge of understanding why the signal being emitted doesn't get to its destination like we thought it would. Radio Frequency (RF) signal travels (or "propagates") in waves. Therefore all of the things that cause disrupt waves in other formats, like a water wave or an earthquake shock-wave, will cause disruption in our wireless RF waves.<br />
<br />
Here are some of those issues:<br />
<ul>
<li><a href="http:/#FPL">Free Path Loss</a></li>
<li><a href="http:/#Absorption">Attenuation through Absorption and Loss</a></li>
<li><a href="http:/#Reflection">Reflection</a></li>
<li><a href="http:/#Scattering">Scattering</a></li>
<li><a href="http:/#Refraction">Refraction</a></li>
<li><a href="http:/#Multipath">Multipath</a></li>
</ul>
<h3 style="text-align: center;">
<a href="https://www.blogger.com/null" name="FPL">Free Path Loss:</a></h3>
<div class="MsoNormal" style="background: white; line-height: 19.2pt; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEievAyO9ZPu_O2D6js-c0ePpuJMmQ2N2b6CQt5U4y9SPkKQlGfMFaY79nVY1iv8EyB6eYwHdsW8YGw88LM8WMNi2woZSwCiYOlCHeXvAc22bQBeq8o3mOlD2IUoEd6h2hJ6U09Si3_pBply/s1600/pink-balloon.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEievAyO9ZPu_O2D6js-c0ePpuJMmQ2N2b6CQt5U4y9SPkKQlGfMFaY79nVY1iv8EyB6eYwHdsW8YGw88LM8WMNi2woZSwCiYOlCHeXvAc22bQBeq8o3mOlD2IUoEd6h2hJ6U09Si3_pBply/s200/pink-balloon.jpg" width="142" /></a><span style="font-family: "georgia" , serif; font-size: 12pt;">In a perfect vacuum, you might think that with nothing to block an RF signal that it could keep moving away from the transmitter forever. Unfortunately, due to the laws of physics, the signal will attenuate (lose strength) as it travels. In a uniformly circular wave around a transmitter, the wave has a certain amount of energy that is traveling outward in a circle. After a second the circle will be a certain distance away, then after two seconds it will have traveled twice as far, and so on. </span></div>
<div class="MsoNormal" style="background: white; line-height: 19.2pt; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "georgia" , serif; font-size: 12pt;"><br /></span></div>
<div class="MsoNormal" style="background: white; line-height: 19.2pt; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "georgia" , serif; font-size: 12pt;">The problem is that the waves are broadening over space as they radiate from the transmission point, and RF waves are 3-dimensional! So it really moving out over a sphere. Imagine the difference between the strength of a an deflated balloon vs one you have stretched to maximum size - it is bigger but weaker now isn't it? RF signals will lose their strength as they are forced to cover a larger surface area.</span><br />
<div class="separator" style="clear: both; text-align: center;">
</div>
</div>
<div class="MsoNormal" style="background: white; line-height: 19.2pt; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP5f35760TScJaZWqwqcotDllGxejc5Rdczm_U7eCqT2pTziOajqlpPlTyJNHNj7f5tSCDsfkZ6xUUvDf0vctAZ6Il6pZ5Qt_5jqK5ztdc2hDhOEUVru6Nz7zsG9ziYAJuLzkNwDG-A2SZ/s1600/waveIntensityFreePathLoss.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="286" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP5f35760TScJaZWqwqcotDllGxejc5Rdczm_U7eCqT2pTziOajqlpPlTyJNHNj7f5tSCDsfkZ6xUUvDf0vctAZ6Il6pZ5Qt_5jqK5ztdc2hDhOEUVru6Nz7zsG9ziYAJuLzkNwDG-A2SZ/s640/waveIntensityFreePathLoss.png" width="640" /></a></div>
<span style="font-family: "georgia" , serif; font-size: 12pt;"><br /></span></div>
<div class="MsoNormal" style="background: white; line-height: 19.2pt; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "georgia" , serif; font-size: 12pt; line-height: 19.2pt;">One quick way estimate free path
loss is called the 6dB rule: doubling the distance will decrease amplitude by 6 dB!</span></div>
<br />
<br />
<h3 style="text-align: center;">
<a href="https://www.blogger.com/null" name="Absorption">
Attenuation through Absorption and Loss:</a></h3>
<div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm7ZwpyqqtDoB_Hpfa7-vU0PsOg4TGjRyNk-K2ngiy4xgj2ryA4DweLaRbLKEkI_rcGLsO28XwjkT_zBNCUO6J5qvZ7WUGJCGuF-90aNmh9a3gdJBsARfovAnPafdUScglt-QQ7OMJE4V_/s1600/seawall.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm7ZwpyqqtDoB_Hpfa7-vU0PsOg4TGjRyNk-K2ngiy4xgj2ryA4DweLaRbLKEkI_rcGLsO28XwjkT_zBNCUO6J5qvZ7WUGJCGuF-90aNmh9a3gdJBsARfovAnPafdUScglt-QQ7OMJE4V_/s1600/seawall.jpg" /></a></div>
<div class="MsoNormal" style="background: white; line-height: 19.2pt; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "georgia" , serif; font-size: 12pt;">When we think about why signal doesn't just get from point A to point B, we usually think of absorption - something must have gotten in the way of the invisible signal and the energy was absorbed by that something, reducing the amplitude of the signal until eventually it reaches zero, and there is no effective communication. This is just like a wave crashing against a seawall, keeping people on the other side dry.</span></div>
<div class="MsoNormal" style="background: white;">
</div>
<ul>
<li><span style="font-family: "georgia" , serif; line-height: 25.6px;">Cubicle Walls : -2 dB</span></li>
<li><span style="font-family: "georgia" , serif; line-height: 25.6px;">Wooden Doors, Glass, Sheetrock, or Drywall : -3 dB</span></li>
<li><span style="font-family: "georgia" , serif; line-height: 25.6px;">Open Metal Rack : -6 dB</span></li>
<li><span style="font-family: "georgia" , serif; line-height: 25.6px;">Elevator and other metal obstacles : -10 dB</span></li>
<li><span style="font-family: "georgia" , serif; line-height: 25.6px;">Brick, Concrete, Concrete Blocks, Foundation Walls : -15 dB</span></li>
</ul>
<div>
<br /></div>
<div class="MsoNormal" style="background: white;">
</div>
<h3 style="text-align: center;">
<a href="https://www.blogger.com/null" name="Reflection"></a>Reflection:</h3>
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ8pOxfj3Tuy9_KZabXNiwnLNTowMjB2HqpyQALcn5tPQ31OzPBaY4zghMeipeua4DCZ9wx9QatX6_tNFOluhIYizOHTSsIPl95ON49-95pzJjUcKzBM25Q9smNEnqmgWpN4jAYy9wLvgt/s1600/swanreflection.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ8pOxfj3Tuy9_KZabXNiwnLNTowMjB2HqpyQALcn5tPQ31OzPBaY4zghMeipeua4DCZ9wx9QatX6_tNFOluhIYizOHTSsIPl95ON49-95pzJjUcKzBM25Q9smNEnqmgWpN4jAYy9wLvgt/s320/swanreflection.jpg" width="320" /></a></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;">When we look into a smooth polished mirror, or plane of glass, or even water we can see a reflection of ourselves. Why is this? When the wave (light waves in this case) hits a larger smooth surface it may bounce in a new direction. </span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><br /></span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;">With dealing with RF waves some of the initial energy that strikes the surface ("the incident ray") is going to bounce off at an equal angle in the opposite direction ("the reflected ray"). The amount of reflection depends on the smoothness and the material itself. Some of the RF energy will still pass through ("the transmitted ray"). We can expect to see this kind of reflection of our Microwave RF signals when hitting things like a metal door or file cabinet, or outdoors when hitting other buildings or a body of water.</span></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX5BcjZ4uyOZ93YcUYURNPeBT6ODtuttcHRiVRtCYT-fLZzvSJiYFQNc_CULz3AZaVfqOKy8CIRpIaQMhVJYZUB8JovL0pAuPVOiAjZqIsznLOKOVODBfCUjAvR4hmRVs8E8WwX9fGJ_Ah/s1600/ReflectionDiagram.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="390" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX5BcjZ4uyOZ93YcUYURNPeBT6ODtuttcHRiVRtCYT-fLZzvSJiYFQNc_CULz3AZaVfqOKy8CIRpIaQMhVJYZUB8JovL0pAuPVOiAjZqIsznLOKOVODBfCUjAvR4hmRVs8E8WwX9fGJ_Ah/s640/ReflectionDiagram.PNG" width="640" /></a></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"></span></span><br />
<h3 style="text-align: center;">
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><span style="line-height: 25.6px;"><a href="https://www.blogger.com/null" name="Scattering"></a>Scattering:</span></span></span></h3>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR1_2VtPRgY7usgCGcONXyNUGYxJlKJ3LlqGDEPSGEMZz4H0tc75sYhkIRV_SlzdD6jq3Wg4mZNBl-xzvIMXOkQ6-F3v5c9NddqKCD1QAZrx9a8BJKxIZzSXgepOS1YP7RP4RQcnclTEEr/s1600/oneRock.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR1_2VtPRgY7usgCGcONXyNUGYxJlKJ3LlqGDEPSGEMZz4H0tc75sYhkIRV_SlzdD6jq3Wg4mZNBl-xzvIMXOkQ6-F3v5c9NddqKCD1QAZrx9a8BJKxIZzSXgepOS1YP7RP4RQcnclTEEr/s320/oneRock.jpg" width="320" /></a><span style="line-height: 25.6px;">The idea of scattering is similar to that of reflection, but occurring multiple times at a smaller level. When the wavelength is larger than the reflecting surface, rather than smaller we get scattering rather than reflection. Think of a nice smooth wave in the ocean that hits a smaller rock - The wave will have to split around the rock, a tiny bit of the energy is absorbed and the rest of the wave is reflected in different directions around it. Of course, the wave as a whole isn't disrupted, right? </span><span style="line-height: 25.6px;">But now imagine a ton of rocks lining the shore, and how when the wave hits those rocks the energy is being scattered off of all of those rocks, interfering with each other, and basically mucking up the wave, dissipating some energy and making it ugly. </span></span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><span style="line-height: 25.6px;"><br /></span></span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><span style="line-height: 25.6px;">Another way to think of Scattering is thinking of a laser pointer. </span></span></span><br />
<div class="separator" style="clear: both; line-height: 25.6px; text-align: center;">
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOHLVbF0EGk1Tn5pSuby4sv4qhrcFAVEFjm9vq7Z_b5L2vGbefrGfz-G3YRSrwl5O5fvXxKrR_uY6UgzrpdhB1Xg5qmb65bowBLaraPUyLxDxYHaTJiiLFpo352CA3_5FU-upWrkQOu1wX/s1600/laser.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOHLVbF0EGk1Tn5pSuby4sv4qhrcFAVEFjm9vq7Z_b5L2vGbefrGfz-G3YRSrwl5O5fvXxKrR_uY6UgzrpdhB1Xg5qmb65bowBLaraPUyLxDxYHaTJiiLFpo352CA3_5FU-upWrkQOu1wX/s320/laser.jpg" width="320" /></a></span></span></div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;">
<span style="line-height: 25.6px;">Light, even laser light, travels in waves - but a laser is a very tight wave that should just travel from point to point in the direction it is intended - you should see the dot on a wall or screen when using a laser pointer. But what if you are in a smoky room? Then the laser light gets scattered among the smoke particles and bounces in all sorts of directions. You can see the laser pointers light from the side as a "beam", but the signal will be weaker when it eventually hits the wall. (Pink Floyd laser light show fans, rejoice!)</span></span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><span style="line-height: 25.6px;"><br /></span></span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><span style="line-height: 25.6px;">In the world of wireless RF, the same thing can happen at a very minute level when encountering smog or a dust storm over longer point-to-point links. In a WLAN environment we could see this effect from the leaves of trees, rocky ground, or even chain link fences. The signal gets ugly, scattered, nonsensical, and can degrade it to a point of complete loss.</span></span></span></div>
<div>
<h3 style="text-align: center;">
<a name="Refraction"></a>Refraction</span></span></h3>
</div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkkV2PP6knxtAPjEbm6AmZieMlqc6PpxiqDNmdJEClOtciqOEAfkuyziDjtobh7OKpudjmbKyb1xT9URR-Ln2sLTt5sKMknSMMpgCdzJmvOSOeobE6BaJ45jXf5m9ZNmHdItoeAW_3-tiK/s1600/refractedGlass.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkkV2PP6knxtAPjEbm6AmZieMlqc6PpxiqDNmdJEClOtciqOEAfkuyziDjtobh7OKpudjmbKyb1xT9URR-Ln2sLTt5sKMknSMMpgCdzJmvOSOeobE6BaJ45jXf5m9ZNmHdItoeAW_3-tiK/s200/refractedGlass.png" style="cursor: move;" width="107" /></a><span style="line-height: 25.6px;">We know that some signal strength is reflected or scattered and some is absorbed when a wireless RF signal encounters a material. But what the energy that manages not to bounce off or be absorbed by the material - is the transmitted ray still the same? Sort of. It can also be just a little bent (no offense, RF) by the process of Refraction. </span></span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><span style="line-height: 25.6px;"><br /></span></span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><span style="line-height: 25.6px;">Refraction (changing the angle of the transmitted ray) occurs because of changes in the density of the material through which it is passing. You see this when you observe a straw in a glass filled with liquid. The straw appears to be split because you are seeing the light of the straw without the liquid with one angle, and with the liquid at a refracted angle. </span></span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><span style="line-height: 25.6px;"><br /></span></span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><span style="line-height: 25.6px;">In a wireless environment Refraction is usually due to changes in pressure, temperature, or water vapor in the air. </span><span style="line-height: 25.6px;">With that said, in an outdoor setting the small change in angle can have a large effect over a distance, and some types of glass </span></span></span></div>
<div>
<span style="font-family: "georgia" , serif;"><span style="line-height: 25.6px;"><span style="line-height: 25.6px;"><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrlZJaEkKY5kPcGqnPi_qHYBeyhd3yHBQbiXdUf9tBPBHKKg91ih9evpQBGYr0YlXD2RttfXEuZ04s6KPLAt_eQedglMQeOzsHYWDnd7PL5HjAxKMPS4Do4PoM899KZ3SJkufm_Y_5vV14/s1600/ReflectionDiagram.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="390" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrlZJaEkKY5kPcGqnPi_qHYBeyhd3yHBQbiXdUf9tBPBHKKg91ih9evpQBGYr0YlXD2RttfXEuZ04s6KPLAt_eQedglMQeOzsHYWDnd7PL5HjAxKMPS4Do4PoM899KZ3SJkufm_Y_5vV14/s640/ReflectionDiagram.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">The difference between the angle of the transmitted ray and the and the original angle the ray would have taken is called the angle of refraction</td></tr>
</tbody></table>
</span></span></span></div>
</div>
<h3 style="text-align: center;">
<a name="Multipath"></a>Multipath</h3>
<div>
We have described a lot of ways that signal can be altered from its original transmission beyond the simple free path loss or absorption. It might reflect, scatter, or refract, right? Or even all of the above. Plus some portion of the original energy may transmit unchanged from the source to the destination. </div>
<div>
<br /></div>
<div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPjMBGSD0lYscLNnx1sckrK7V3nMNukTox3jnzmHzxAlHm2U1-bZTFHDcLLxmXYZZw2QMI09S3zSd_iY1sBV6oJTOTOJA1BXDlll75y8VXBNq_3QAB5Iv7k5Q4XsISALppyxE46_wAYKA8/s1600/duet.PNG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="171" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPjMBGSD0lYscLNnx1sckrK7V3nMNukTox3jnzmHzxAlHm2U1-bZTFHDcLLxmXYZZw2QMI09S3zSd_iY1sBV6oJTOTOJA1BXDlll75y8VXBNq_3QAB5Iv7k5Q4XsISALppyxE46_wAYKA8/s200/duet.PNG" width="200" /></a>What happens when some of the original signal AND the refracted signal AND the reflected signal AND the scattered signal all (eventually) get to the receiver? It depends, but most of the time there will be <i>downfade</i>. Downfade is when the signal is degraded because the same message is being heard but out of phase. If you've ever tried to sing with someone who knew the song but was always half a beat late to jump in then you've experienced this problem. It makes for poor karaoke and poor wireless too because the signal is distorted. If two signals arrive far enough out of phase then the uptick of the wave can occur at the same time as the downtick of a reflected wave, causing the signal to be nullified, just like noise cancelling headphones! It is also possible for there to be <i>upfade</i> where the signals arrive at the same time and build each other back up again, like a sweet duet!</div>
<div>
<br /></div>
<div>
Multipath on its own is considered a bad thing, but modern WiFi protocols like 802.11ac use multipath along with multiple antennas to improve WiFi transmissions and signalling!</div>
<div>
<br /></div>
<div>
I know that if I was taking a Cisco CCNA wireless exam, I would want to know all of the above. :)</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYz4nXeiCULFwuiQ5YfiXoeM5vx4rWOQxWzuarVeOciyWYqDFlUiSxvRbDgrdxpXab3eCsxvkmpuZVG3q4bmeWwHiUCbkqTjGlHFhN0bqt3ko_CE4aE9z9f1b7ibgffBwXZo4ab2zZwBZ9/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYz4nXeiCULFwuiQ5YfiXoeM5vx4rWOQxWzuarVeOciyWYqDFlUiSxvRbDgrdxpXab3eCsxvkmpuZVG3q4bmeWwHiUCbkqTjGlHFhN0bqt3ko_CE4aE9z9f1b7ibgffBwXZo4ab2zZwBZ9/s1600/MBLogo4.png" /></a></div>
<div>
<br /></div>
<div>
<br /></div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-37829622380937076212016-04-21T10:15:00.001-07:002016-04-21T10:34:08.931-07:00Customizing your Mouse Cursor Using Group Policy PreferencesWhen helping the young, the old, or the visually impaired, it may be important to make sure that your users start off with a larger cursor. In an Windows Active Directory environment this can be done using Group Policy, but in the past required configuration of the registry using some sort of logon script. Many scripts can now be replaced by the use of Group Policy Preferences, which makes the whole process much easier! <br />
<br />
You can watch me set this up step by step on video here: <a href="https://youtu.be/WjdKPtog5QY">https://youtu.be/WjdKPtog5QY</a><br />
<br />
<h3>
Or here's how to do it step by step:</h3>
<br />
1) Configure your mouse cursor settings using the control panel on a test machine<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIDKrTz8WL1tosbFntt5F_ofXINHpoozsjXFHWGC-F8UNCbBPC2-c3ImZZZQCF2WMR1OL-fAFXBUuClVy0_Enadrl0eGNyqKVXic09gW-8F9d8jy0hGNqWA7oVQmD_nrE9y3A5CGp8vKCQ/s1600/Mouse1.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIDKrTz8WL1tosbFntt5F_ofXINHpoozsjXFHWGC-F8UNCbBPC2-c3ImZZZQCF2WMR1OL-fAFXBUuClVy0_Enadrl0eGNyqKVXic09gW-8F9d8jy0hGNqWA7oVQmD_nrE9y3A5CGp8vKCQ/s640/Mouse1.PNG" width="574" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">We're going to suck these settings out of the test machine and into Group Policy Preferences!</span></td></tr>
</tbody></table>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
2) Open the Group Policy Management Console on a domain controller or a workstation where the RSAT tools for AD have been installed and create or edit a Group Policy is linked to the right OU to affect the desired users (or link it to the domain to affect all users)</div>
<div style="text-align: left;">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc9c2GPriIvPV0xU9zlo3Rtz95HYR6E-Omgv8jOktruWaQ6QpD_5BWS9tHMJiQqrCTs3veWiSmbKzLeU5wkdYmSHXvp5TF-hJqv7CMnIHip7r4he1MmeqZZpGqztJYdoN3u6-xKh1yfcLd/s1600/Mouse2.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"><img border="0" height="580" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc9c2GPriIvPV0xU9zlo3Rtz95HYR6E-Omgv8jOktruWaQ6QpD_5BWS9tHMJiQqrCTs3veWiSmbKzLeU5wkdYmSHXvp5TF-hJqv7CMnIHip7r4he1MmeqZZpGqztJYdoN3u6-xKh1yfcLd/s640/Mouse2.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Remember to link your GPO to the right node in AD</td></tr>
</tbody></table>
</div>
<br />
3) Navigate to the User -> Preferences Section -> Windows Settings -> Registry<br />
<div style="text-align: left;">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhecFPWhNYny9inj-idYf3W71m3vQlSLI9SJQ0w1yqy0qBw75uKx3RUVf6Q1Ajg7kty7OMl1SqDU5eGWX5Mg45bwIE_VH2uxbWF-Gvpbl7qlfzFP1H3hEo-yj6-zw837ruf5a-39qZ_m7Ya/s1600/Mouse3.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhecFPWhNYny9inj-idYf3W71m3vQlSLI9SJQ0w1yqy0qBw75uKx3RUVf6Q1Ajg7kty7OMl1SqDU5eGWX5Mg45bwIE_VH2uxbWF-Gvpbl7qlfzFP1H3hEo-yj6-zw837ruf5a-39qZ_m7Ya/s640/Mouse3.PNG" width="632" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">Cursors are user settings, and there are no administrative templates in policy to configure this for us - so we go to GPO preferences!</span></td></tr>
</tbody></table>
</div>
<br />
4) Right Click and choose Registry Wizard<br />
<div style="text-align: left;">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4mfwvDu5RKVx5ahD05u6y9IvfXMCaXpbE6b3D1exknuR3gG3OZ6IJ9blea7KaRVnFByeJs3-FHlfsnGbfoNkp4ZIWhypOlHGp4JD5HRT2OyraCQ2PKakrB1VzJOC5DVaEEgcKRaXjmBXO/s1600/Mouse4.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4mfwvDu5RKVx5ahD05u6y9IvfXMCaXpbE6b3D1exknuR3gG3OZ6IJ9blea7KaRVnFByeJs3-FHlfsnGbfoNkp4ZIWhypOlHGp4JD5HRT2OyraCQ2PKakrB1VzJOC5DVaEEgcKRaXjmBXO/s640/Mouse4.PNG" width="632" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">Registry Item = one setting by hand, Registry Wizard is a vacuum cleaner for preconfigured settings!</span></td></tr>
</tbody></table>
</div>
<br />
5) Select Local if you modified the Mouse Cursor settings on the local machine or choose the remote machine that you want to connect to (firewall settings must allow this)<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8z6KfSjZPENMtkdz64VlUL1oX3ZpgXLeRP1ckE8BN14ToiVNZYDwHI2v5uBMUSHw7L96FcB_HrOCMIQso33XTKsSC63GgQzU_MVZ4SyfQbHUPINbIpCEqM0MNj6PCQml8I_r6KQAFh1jq/s1600/Mouse5.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"><img border="0" height="498" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8z6KfSjZPENMtkdz64VlUL1oX3ZpgXLeRP1ckE8BN14ToiVNZYDwHI2v5uBMUSHw7L96FcB_HrOCMIQso33XTKsSC63GgQzU_MVZ4SyfQbHUPINbIpCEqM0MNj6PCQml8I_r6KQAFh1jq/s640/Mouse5.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">Select the machine that has already been configured as your template</span></td></tr>
</tbody></table>
<br />
6) Expand HKey_Current_User Tree ->_ Expand the Control Panel Key -> Expand the Cursors Key<br />
<div style="text-align: left;">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGs1Bne0oIQNNoCUzzruUrIFA6Li-QauvtxVhlmOuyCzNGalmUcFshNwo2uw0oawPEtSL159Zb7H36r7ACHKlkJ3bZ_g7K47zHPFSRHQkwVbr8etwzomg5qzjAagHxMNgqj0qhwGLZ2Jdg/s1600/Mouse6.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"><img border="0" height="498" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGs1Bne0oIQNNoCUzzruUrIFA6Li-QauvtxVhlmOuyCzNGalmUcFshNwo2uw0oawPEtSL159Zb7H36r7ACHKlkJ3bZ_g7K47zHPFSRHQkwVbr8etwzomg5qzjAagHxMNgqj0qhwGLZ2Jdg/s640/Mouse6.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">This is the tricky part - you have to know where to go in the registry!</span></td></tr>
</tbody></table>
</div>
<br />
7) Select all of the Values in the lower half and click Finish<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJHUpFOOQ541bdiqxbqV_wNIjhyagNIaGFxaFE406b86sko5H9kTpFPSiJBSYjNezT3hwhw9RQJVIyaRTo3p30ghrVLSRiYLaurDNg_ZGqNkJD1yT5I8qzu07CHigZD15wllesuChoRDcK/s1600/Mouse7.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"><img border="0" height="498" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJHUpFOOQ541bdiqxbqV_wNIjhyagNIaGFxaFE406b86sko5H9kTpFPSiJBSYjNezT3hwhw9RQJVIyaRTo3p30ghrVLSRiYLaurDNg_ZGqNkJD1yT5I8qzu07CHigZD15wllesuChoRDcK/s640/Mouse7.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">Select all of the named values at the bottom to capture all cursor settings</span></td></tr>
</tbody></table>
<br />
<br />
8) You can expand out the registry key directory and see the key settings.<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizaOyqjmdGcf9uvOP2Plc7EhLpYNVRnvqkT-zyvnc0LU1V7Ii8z35sm53Afnly4RE0qI8pceI-nY9QrRB813j7qvcJ236qadhx8Z6i0BzNJvVkuGrw1XjdEOvYnjEYGztleFjSUAxgjPjS/s1600/mouseCursorGPOPref.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="352" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizaOyqjmdGcf9uvOP2Plc7EhLpYNVRnvqkT-zyvnc0LU1V7Ii8z35sm53Afnly4RE0qI8pceI-nY9QrRB813j7qvcJ236qadhx8Z6i0BzNJvVkuGrw1XjdEOvYnjEYGztleFjSUAxgjPjS/s640/mouseCursorGPOPref.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">Each registry item is its own setting - and you didn't have to manually configure any of them!</span></td></tr>
</tbody></table>
<br />
<br />
9) These Group Policy Preference settings do not prevent users from changing their cursor, but it does reapply the registry settings at each logon - unless you tell it not to. To do that, open the properties of <i>each setting</i> and switch to the "common" tab and add the check mark to "Apply once and do not reapply"<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_r4CFaKIw-OOyYMd6ZD6fVDHxJr2Qg0pYYtcSpI4s_4ujZUDied-70bmjyPDsbrYbUk6do3qMEVTvqOrtooh1383AcjdmPKx8mw5dtUXer3AF12s5Nctjc48iyMJxFxlzvajV18skQrSY/s1600/MouseApplyOnce.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_r4CFaKIw-OOyYMd6ZD6fVDHxJr2Qg0pYYtcSpI4s_4ujZUDied-70bmjyPDsbrYbUk6do3qMEVTvqOrtooh1383AcjdmPKx8mw5dtUXer3AF12s5Nctjc48iyMJxFxlzvajV18skQrSY/s640/MouseApplyOnce.PNG" width="572" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">GPO Preference Setting Dialog Box to change "stickiness"</span></td></tr>
</tbody></table>
<br />
10) Log off and log back on as an affected user to experience the new setting!<br />
<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioWHeNercFr_faBZswaj3LvIMeLc-7tiMY0EyqbFDqhw-EzR453HtWOjVjSliANeG_CPryndEWJ1HwylWw-hFclHfng2cUXvPFnama14LRz83jwr5fXIEBn8LIKhdlpdN5w26T-TAewdqc/s1600/smallMousePointer.PNG" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="343" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioWHeNercFr_faBZswaj3LvIMeLc-7tiMY0EyqbFDqhw-EzR453HtWOjVjSliANeG_CPryndEWJ1HwylWw-hFclHfng2cUXvPFnama14LRz83jwr5fXIEBn8LIKhdlpdN5w26T-TAewdqc/s640/smallMousePointer.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">Original Size</span></td></tr>
</tbody></table>
<br />
<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzc0vxpDeERXEHV442ecQrc8GqLa4CMXfCCrhSdsN6j8pACDuzimf3grp2zKORS5rDkdQ8kVHAmQC22quNCtaXBOe6-MiFnDoIGP5k8ed-R91Wmg9c9KK-QMuHCk2K63F71cnFBPdjRpFJ/s1600/mouseLogOff.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"><img border="0" height="356" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzc0vxpDeERXEHV442ecQrc8GqLa4CMXfCCrhSdsN6j8pACDuzimf3grp2zKORS5rDkdQ8kVHAmQC22quNCtaXBOe6-MiFnDoIGP5k8ed-R91Wmg9c9KK-QMuHCk2K63F71cnFBPdjRpFJ/s640/mouseLogOff.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">Log Off</span></td></tr>
</tbody></table>
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsfq5bq0JOUu0Ij_7JdYBw4LjH7LGV4ZiS-2dExAG0Ve32HI9ki35s8buEW4hxnF7lYQL_stywoCbUvu5idCTNai9t9n6CpHW9jGL2P0v173Zsjwa-URx5iPz4bRCGvuHDzCN0FaR7w9cG/s1600/MouseLogOn.PNG" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="294" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsfq5bq0JOUu0Ij_7JdYBw4LjH7LGV4ZiS-2dExAG0Ve32HI9ki35s8buEW4hxnF7lYQL_stywoCbUvu5idCTNai9t9n6CpHW9jGL2P0v173Zsjwa-URx5iPz4bRCGvuHDzCN0FaR7w9cG/s640/MouseLogOn.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">Log On - and notice the GPO Preference being applied!</span></td></tr>
</tbody></table>
<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgRqC3kZ__vkYiRszA2dj2FEAA8xUmcz6-StgtaQggzPcJMelykFePKKVTAxHM-oOuzQd4K9KaxRGglcD29QAuPQmywN1wg8_0BpAWs4kkKzHr5UvgNA2YQC2Wbd__ZL3hkA8kJ8frIbrX/s1600/LargeMouse.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto; text-align: center;"><img border="0" height="402" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgRqC3kZ__vkYiRszA2dj2FEAA8xUmcz6-StgtaQggzPcJMelykFePKKVTAxHM-oOuzQd4K9KaxRGglcD29QAuPQmywN1wg8_0BpAWs4kkKzHr5UvgNA2YQC2Wbd__ZL3hkA8kJ8frIbrX/s640/LargeMouse.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="color: blue;">Big fat juicy cursor, just they way I like it!</span></td></tr>
</tbody></table>
So... that's how you get your funky mouse cursor settings into Group Policy Preferences... but be creative! What other registry settings are tied to users or computers that you currently have to bake into an image (which get corrupted) or have to manually configure? Take advantage of this easy to use tool!<br />
<div>
<br /></div>
<div>
Remember, it's your job to "point" the way!</div>
<div>
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYz4nXeiCULFwuiQ5YfiXoeM5vx4rWOQxWzuarVeOciyWYqDFlUiSxvRbDgrdxpXab3eCsxvkmpuZVG3q4bmeWwHiUCbkqTjGlHFhN0bqt3ko_CE4aE9z9f1b7ibgffBwXZo4ab2zZwBZ9/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYz4nXeiCULFwuiQ5YfiXoeM5vx4rWOQxWzuarVeOciyWYqDFlUiSxvRbDgrdxpXab3eCsxvkmpuZVG3q4bmeWwHiUCbkqTjGlHFhN0bqt3ko_CE4aE9z9f1b7ibgffBwXZo4ab2zZwBZ9/s1600/MBLogo4.png" /></a></div>
<div>
<br /></div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com1tag:blogger.com,1999:blog-5047027589469055445.post-67653774440328181712016-04-20T16:10:00.002-07:002016-04-20T16:15:30.357-07:00How to do Line Breaks in your PowerShell ScriptTrying to get your code to look good when reading it later can be tricky<br />
<br />
For line breaks in function scripts, there are two out-of-the-box options:<br />
<br />
First, you can break a line<i> after the pipe key</i>, which is an elegant and easy-to-read approach.<br />
<br />
Second, you can arbitrarily break a line with a <i>back tick</i> mark, which you will find left of the number 1 on a standard US keyboard.<br />
<br />
<b>It looks like this: ` </b><br />
<br />
But did you know that the back tick is a hack?<br />
<br />
The back tick ` means, “literally interpret the next character,” or also said, escape the following character.”<br />
<br />
For example, you might want to literally reference a quotation mark “ in a path name, but because it’s inside “” for strings, you need to literally interpret it: “`”PATH`”” – it’s hard to see, but squint.<br />
<br />
But here’s another takeaway: if you use the back tick to create a line break, make sure there’s no space after it; otherwise, the space – not the carriage return – will be the escaped, literal character!<br />
<br />
So here's are some examples of what works and what doesn't:<br />
<br />
First, no line breaks - works like a charm, but if we add a few more pipes and parameters this could get ugly.<br />
<br />
<div class="separator" style="clear: both; text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-VDfx5DS60XiLiS4FcWDKde2deh2OtZtAY5lgzBNU4iW3oaapjuIY3r5uCPTxmH6W76QRgHgiwSkBH9g3bZiX5ZlBuHprZpZ9YqZOzFQ5AulMoJ5o1vMZTxceGYy5oIA-aOrFdPHIecgG/s1600/psbreaks1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-VDfx5DS60XiLiS4FcWDKde2deh2OtZtAY5lgzBNU4iW3oaapjuIY3r5uCPTxmH6W76QRgHgiwSkBH9g3bZiX5ZlBuHprZpZ9YqZOzFQ5AulMoJ5o1vMZTxceGYy5oIA-aOrFdPHIecgG/s1600/psbreaks1.jpg" /></a></div>
<br />
Next we have an example with a line break after the pipe, also functioning normally<br />
<div class="separator" style="clear: both; text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMMLm4XlQczDqwH3kjhovl7MGsAVxpzhg9xMliwXpQLb3DqnLwATClPZ7PU6-ymtJtjZEqMay_fsmQVI2FgPdyczVcoEQMA2kBSpKrLV2z7UP6IfvL4tYhT16g5z08e2Ty-VCbQJt0kwll/s1600/psbreaks2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMMLm4XlQczDqwH3kjhovl7MGsAVxpzhg9xMliwXpQLb3DqnLwATClPZ7PU6-ymtJtjZEqMay_fsmQVI2FgPdyczVcoEQMA2kBSpKrLV2z7UP6IfvL4tYhT16g5z08e2Ty-VCbQJt0kwll/s1600/psbreaks2.jpg" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: left;">
Here we see the line break before the pipe, and the script fails</div>
<div class="separator" style="clear: both; text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFO8V0kCjThi1MQ1drXpjpMoseCopMmP0RNTp2GHREYXAi6RrLvJ1WwYHTYxH_IN2VkXCoOo4I8YLC_cxefhjgaYKRpYw8NWk8zC6B6YfB0Kee8su_BHP8_9R7RLcvqVgDaPQRig-nTkor/s1600/psbreaks3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="252" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFO8V0kCjThi1MQ1drXpjpMoseCopMmP0RNTp2GHREYXAi6RrLvJ1WwYHTYxH_IN2VkXCoOo4I8YLC_cxefhjgaYKRpYw8NWk8zC6B6YfB0Kee8su_BHP8_9R7RLcvqVgDaPQRig-nTkor/s640/psbreaks3.jpg" width="640" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: left;">
In this sample we use the tick immediately followed by a return. If we wanted to we could insert these ticks numerous times, before each parameter, for example</div>
<div class="separator" style="clear: both; text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgypv3T2Mt6YYJo8M-TE_j6tXuF4P_uvTBG3Z_a4ggyFmnDSQj0HCCts7xPS1LwBVHzquLhUcN68XYTQ-Fk7dlPMkA8lKzJSI8JkfDEntUK6EcPEgfUp0YtVKTey0DoMoKruX46Q6TMjr6z/s1600/psbreaks4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgypv3T2Mt6YYJo8M-TE_j6tXuF4P_uvTBG3Z_a4ggyFmnDSQj0HCCts7xPS1LwBVHzquLhUcN68XYTQ-Fk7dlPMkA8lKzJSI8JkfDEntUK6EcPEgfUp0YtVKTey0DoMoKruX46Q6TMjr6z/s1600/psbreaks4.jpg" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: left;">
Finally we see the effect of using the back tick AND A SPACE before the carriage return - this one is tricky to find when troubleshooting, so don't let it happen to you!</div>
<div class="separator" style="clear: both; text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu1nIQUoQIhiDeoYo-c2sZ2TyCAbJIY1TB7bgfX061YYyDrafIR_ncs38DB6S4a4ICNwM5juZ9aPCpCzWj6ELSBWDexbgsm1HaYenBIPEdKztghSv58Vt_kLBg0o2jHyTYzkO1ffb5r2S9/s1600/psbreaks5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="236" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu1nIQUoQIhiDeoYo-c2sZ2TyCAbJIY1TB7bgfX061YYyDrafIR_ncs38DB6S4a4ICNwM5juZ9aPCpCzWj6ELSBWDexbgsm1HaYenBIPEdKztghSv58Vt_kLBg0o2jHyTYzkO1ffb5r2S9/s640/psbreaks5.jpg" width="640" /></a></div>
<br />
A special thanks to Sarah Wischmeyer for the introductory comments on this one!<br />
<br />
Keep your scripts snappy!<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYz4nXeiCULFwuiQ5YfiXoeM5vx4rWOQxWzuarVeOciyWYqDFlUiSxvRbDgrdxpXab3eCsxvkmpuZVG3q4bmeWwHiUCbkqTjGlHFhN0bqt3ko_CE4aE9z9f1b7ibgffBwXZo4ab2zZwBZ9/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYz4nXeiCULFwuiQ5YfiXoeM5vx4rWOQxWzuarVeOciyWYqDFlUiSxvRbDgrdxpXab3eCsxvkmpuZVG3q4bmeWwHiUCbkqTjGlHFhN0bqt3ko_CE4aE9z9f1b7ibgffBwXZo4ab2zZwBZ9/s1600/MBLogo4.png" /></a></div>
<br />Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-54550860134355683972016-04-18T07:54:00.003-07:002016-04-18T07:54:42.584-07:00Majorbacon's Breakdown on Spanning Tree Protocol and Variants Part 1: The Problem<h2>
First, the Problem</h2>
Spanning Tree Protocol is one answer to a specific problem that occurs at a layer 1 & 2 levels - redundant connections between switches cause problems!<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1aIDAcnjBJnPOjwygdV66mjV5WxyEFXwhTmwsAslmINhOUeYP9MDIU9wFplZdfw1VGwVZ2rjCV7Z0-QpGfnOunpnT9J1wGEOsQsifiq6eJ61iJmhAiKRyopf0ys31dWiRBJmoi-9kCbsJ/s1600/Switches_NoLoops.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="281" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1aIDAcnjBJnPOjwygdV66mjV5WxyEFXwhTmwsAslmINhOUeYP9MDIU9wFplZdfw1VGwVZ2rjCV7Z0-QpGfnOunpnT9J1wGEOsQsifiq6eJ61iJmhAiKRyopf0ys31dWiRBJmoi-9kCbsJ/s400/Switches_NoLoops.PNG" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">No Redundancy, No Problems</td></tr>
</tbody></table>
<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiTIqUUSTxyxNQz9Br5EOvAwSh7ZLG901jkAFZDSsfadhvUcFe3fc_68AartcwbdArWyQnEXC3o6ovhfCEgyFXWvDxxnaChmRE2vPdFKwd1k7elw7WXJk7R4AUmwQQ2aewIs46H4CFtRrI/s1600/Switches_WithLoop.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="270" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiTIqUUSTxyxNQz9Br5EOvAwSh7ZLG901jkAFZDSsfadhvUcFe3fc_68AartcwbdArWyQnEXC3o6ovhfCEgyFXWvDxxnaChmRE2vPdFKwd1k7elw7WXJk7R4AUmwQQ2aewIs46H4CFtRrI/s400/Switches_WithLoop.PNG" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Now we've added a redundant connection enabling multiple paths for switch to switch communication</td></tr>
</tbody></table>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuQjhAit2EuLKr9X9totjn7SpQAgfGAQPPiJSum9FE54E-n03nt8Frpczym00NuUTJBMI8Mb32iNXiyx11z4fbD89wfy9kY3s5jiOcZ5-lK01OX8ZV1j32xxB-xYo5R1xu2KR7a-y3d1u5/s1600/Switches_Broadcast1.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="276" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuQjhAit2EuLKr9X9totjn7SpQAgfGAQPPiJSum9FE54E-n03nt8Frpczym00NuUTJBMI8Mb32iNXiyx11z4fbD89wfy9kY3s5jiOcZ5-lK01OX8ZV1j32xxB-xYo5R1xu2KR7a-y3d1u5/s400/Switches_Broadcast1.PNG" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">If a broadcast is sent out it will flood normally, but it will eventually also enter through the "back door" of the original switch that forwarded the broadcast, acting like a "new" message that needs further flooding, causing infinite flooding (remember this is layer 2, there is no time to live on a frame)</td></tr>
</tbody></table>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrpdACnUlT7v6ECnA_Yd71gwLTxtOm0Lp0ojf0SOaj3t7333hFhPKXWRHBbioswmY_Z5UqGonQEWs3B6JcGWoPE3LzucgBK9kyQNCI8fdqen7xoZj1hrEugL0HQTHyne3fUjNVNbfb_edF/s1600/Switches_Broadcast2.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="278" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrpdACnUlT7v6ECnA_Yd71gwLTxtOm0Lp0ojf0SOaj3t7333hFhPKXWRHBbioswmY_Z5UqGonQEWs3B6JcGWoPE3LzucgBK9kyQNCI8fdqen7xoZj1hrEugL0HQTHyne3fUjNVNbfb_edF/s400/Switches_Broadcast2.PNG" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Worse yet, the broadcast actually went out both directions at the beginning of the flood, which means we actually have two broadcasts circulating the network infinitely! </td></tr>
</tbody></table>
The results of the unmanaged switching loop includes:<br />
<ul>
<li><b>Broadcast storms</b> - no room for valid traffic - packets will keep getting forwarded until the switches run out of memory and start dropping frames.<br /></li>
<li><b>MAC Table Instability</b> - remember that the source MAC address of a packet is used to update the switch's MAC address table - this means that eventually the first switch, the one connected to the broadcasting Server, will eventually believe that the server is attached to one of the other switches, since it will receive a broadcast from them with the Server's MAC address listed at the source. The switch will lose track of its own devices!<br /></li>
<li><b>Redundant Frames</b> - both broadcasts and unicasts may be received multiple times by destination endpoints, bogging down intermediate services like TCP and higher level application services</li>
</ul>
<h2>
So now we know the problem... see the Spanning Tree Protocol and Variants Part 2 to start seeing the solution!</h2>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYz4nXeiCULFwuiQ5YfiXoeM5vx4rWOQxWzuarVeOciyWYqDFlUiSxvRbDgrdxpXab3eCsxvkmpuZVG3q4bmeWwHiUCbkqTjGlHFhN0bqt3ko_CE4aE9z9f1b7ibgffBwXZo4ab2zZwBZ9/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYz4nXeiCULFwuiQ5YfiXoeM5vx4rWOQxWzuarVeOciyWYqDFlUiSxvRbDgrdxpXab3eCsxvkmpuZVG3q4bmeWwHiUCbkqTjGlHFhN0bqt3ko_CE4aE9z9f1b7ibgffBwXZo4ab2zZwBZ9/s1600/MBLogo4.png" /></a></div>
<div>
<br /></div>
<ol><ol><ol>
</ol>
</ol>
</ol>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-81685730513438083472015-12-18T09:42:00.003-08:002015-12-18T09:49:35.545-08:00The ultimate guide to virtualization swap files!<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Most operating systems natively support RAM over-extension. This is accomplished by using a temporary file on the hard drive to store RAM blocks that are not currently being actively processed so that more RAM is available for blocks that do need current processing. This file is called a swapfile or a pagefile depending on the OS. This is never a good thing, because disk is always slower than Ram speed (don't believe me? <a href="http://majorbacon.blogspot.com/search/label/HDD" target="_blank">click here</a>) But it is sometimes a necessary thing.</span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Managing Swapfiles and Pagefiles can be confusing in VMware or Hyper-V because there are multiple files to configure at different levels.</span><br />
<span style="color: red; font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><i><br /></i></span>
<br />
<h2>
</h2>
<h3>
<ol>
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><span style="color: red;"><i>Guest VM's native OS swapfile</i></span></span></li>
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><span style="color: red;"><i>Host related swapfile</i></span></span></li>
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><span style="color: red;"><i>Hypervisor's per-guest VM swapfile</i></span></span></li>
</ol>
</h3>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<br />
<h2>
<span style="color: red; font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">1) Guest VM's native OS swapfile</span></h2>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Even though you may assign 4 GB of RAM to a virtual machine, the OS running in that system may choose to create it's own pagefile on whatever virtual disks you provide according to its native behavior based on the full amount of "physical" RAM that it sees. The Hypervisor has no role in if or how a guest OS chooses to build or use a swapfile. This must be completely managed from within the Guest OS. However, remember that as a virtualization administrator you could certainly create a dedicated virtual hard drive file that is placed on a fast storage tier and then within the Guest OS ensure that this disk is used for paging. </span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<br />
<h2>
<span style="color: red; font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">2) Host related swapfile</span></h2>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Just like the guest OS, your virtualization host has a swapfile or pagefile to support not having enough memory to perform its duties associated with being a virtualization infrastructure: (provisioning new VMs, vMotioning, etc) </span><br />
<h2>
<b style="font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;">2a) VMWare System Swapfile using the Web Client: This is done via </b><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Hosts and Clusters -> Host -> Manage Tab -> Settings SubTab -> System Swap</span></h2>
<h3>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi77eCcnJ61QYgsOaRIT7JtDoIoQ5Hr3V5GVqrY0Tu2a23yBWN1Hlnf5A2dXst_-MKP8n5Glsm9AR0jdEN7s0GqSzRxjOMnvpPqfH-IeyaJOANYEVdb1TUQ0_kNEoQyVS87FdWgwM0BLJ14/s1600/VMwareSystemSwapFileWebClient.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><img border="0" height="472" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi77eCcnJ61QYgsOaRIT7JtDoIoQ5Hr3V5GVqrY0Tu2a23yBWN1Hlnf5A2dXst_-MKP8n5Glsm9AR0jdEN7s0GqSzRxjOMnvpPqfH-IeyaJOANYEVdb1TUQ0_kNEoQyVS87FdWgwM0BLJ14/s640/VMwareSystemSwapFileWebClient.PNG" width="640" /></span></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">vCenter Server Web Client configuring Host System Swap File</span></td></tr>
</tbody></table>
<div style="font-size: medium; font-weight: normal;">
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Edit System Swap Settings:</span></div>
<div style="font-size: medium; font-weight: normal;">
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span></div>
<ul style="font-size: medium; font-weight: normal;">
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Enabled - if unchecked = ALL RAM ALL THE TIME - NO SWAPFILE!</span></li>
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">The Datastore - Use a specific datastore</span></li>
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Host Cache - use part of the host cache.</span></li>
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Preferred swap file location - Use the host's preferred swap file location </span></li>
</ul>
</h3>
<h3>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><b>2b) Windows Server with Hyper-V:</b> this is managed via the system control panel -> Advanced Tab -> Performance -> Settings... -> Advanced Tab -> Virtual Memory -> Change... 3) VM related swap files.</span></h3>
<h3>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVq9eFOWzaqZTW2Iquzs4UzESUSSlzUrhK5vQf00ewO-2ejPYd8nJEJOpsKcaeyk_1RaaUm3CmOebEq5b_F5SaYPppRXoixU_GAhQSUJPcFnnTzwMs2POy4vtYWRQUkTQ7juTPtT-XvTH3/s1600/WindowsVirtualMemory.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVq9eFOWzaqZTW2Iquzs4UzESUSSlzUrhK5vQf00ewO-2ejPYd8nJEJOpsKcaeyk_1RaaUm3CmOebEq5b_F5SaYPppRXoixU_GAhQSUJPcFnnTzwMs2POy4vtYWRQUkTQ7juTPtT-XvTH3/s640/WindowsVirtualMemory.PNG" width="376" /></span></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Server 2012 R2 Hyper-V server configuring Host PageFile</span></td></tr>
</tbody></table>
<ul style="font-size: medium; font-weight: normal;">
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">If all page files are removed = ALL RAM ALL THE TIME - NO SWAPFILE!</span></li>
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Don't forget to click "SET" after configuring a pagefile on a disk, otherwise nothing happened.</span></li>
</ul>
<div style="font-size: medium; font-weight: normal;">
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span></div>
</h3>
<h3>
<b><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Hyper-V Server or Windows Server Server Core Host Swapfile</span></b></h3>
<h3>
<div style="font-size: medium; font-weight: normal;">
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Modification is done by script or command line entries:</span></div>
<div style="font-size: medium; font-weight: normal;">
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div style="font-size: medium; font-weight: normal;">
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Add a 2 Gb Pagefile:</span></div>
<div style="font-size: medium; font-weight: normal;">
<span style="background-color: #f8f8f8; color: #222222; font-family: "courier new" , "courier" , monospace; font-size: x-small; line-height: 14.3px; white-space: nowrap;">wmic pagefileset create name="E:\pagefile.sys"</span></div>
<div style="font-size: medium; font-weight: normal;">
<span style="background-color: #f8f8f8; color: #222222; font-family: "courier new" , "courier" , monospace; font-size: x-small; line-height: 14.3px; white-space: nowrap;">wmic pagefileset where name="E:\\pagefile.sys" set InitialSize=2048,MaximumSize=2048</span></div>
<div style="font-size: medium; font-weight: normal;">
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div style="font-size: medium; font-weight: normal;">
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Delete a pagefile:</span></div>
<div style="font-size: medium; font-weight: normal;">
<span style="background-color: #f8f8f8; color: #222222; font-family: "courier new" , "courier" , monospace; font-size: x-small; line-height: 14.3px; white-space: nowrap;">wmic pagefileset where name="C:\\pagefile.sys" delete</span></div>
</h3>
<h3>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span></h3>
<h2>
<span style="color: red; font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">3) Hypervisor's per-guest VM Swapfile </span></h2>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Modern hypervisors create a temporary swap file for hypervisor related memory management needs. This is NOT a swapfile that the Guest OS could ever see or use for its own swapfile needs! However, you may want this to be placed on an efficient disk to ensure that VMs boot as efficiently as possible. There are some key differences in how ESXi and Hyper-V use these files.</span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">VMWare:</span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">The host creates VMX swap files automatically, provided there is sufficient free disk space at the time a virtual machine is powered on</span><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">. If it cannot be created, it prevents power on! </span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">This file is used because while physical memory is reserved for the system at powered on, memory for needs like the virtual machine monitor (VMM) and virtual devices can be swapped after initialization. The VMX swap feature means that a the </span><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">50MB+</span><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"> for </span><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">live VMX memory needs can shrink to only 10MB, freeing up memory resources for other needs. This is critical in overcommitted memory situations. </span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">By default, the swap file is created in the same location as the virtual machine's configuration file, but you may change the swapfile datastore datastore to another shared storage location. Moving the swapfile to a local datastore may improve local performance, but it may also slow vMotions later because pages swapped to a local swap file on the source host must be transferred across the network to the destination host</span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Hyper-V:</span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Smart Paging in Hyper-V is used only when the following is true:</span><br />
<br />
<ul>
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">The VM is being restarted (directly or via a host restart)</span></li>
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">The hypervisor discovers that there is no available RAM</span></li>
<li><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">No memory can currently be reclaimed any other VMs running on the host</span></li>
</ul>
<br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"></span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">At that time the Smart Paging file is used by the VM as memory to complete startup. Within 10 minutes, that memory mapped to the Smart Paging will need to be provisioned into RAM and the the Smart Paging file will be deleted. The Smart Paging feature is ONLY to provide reliable restarts (not cold boot or running out of RAM later) of VMs</span><br />
<h3>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">3a) How to configure the vSphere web client to configure VM support swapfile: Hosts & Clusters -> Host -> Manage Tab -> Settings SubTab -> Virtual Machines -> Swap File Location</span></h3>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2HrBbgbXT1H-N4qtUz-SlY5hiudRYm_6M9kZ5cuDznBH9_v_92_XqXd-lkgdWM2fpfBKXc4Ejjcz3HIh6QCszoGDK1iZL7piXwzjaGDCMB9EI5fyP7kavFfp9VNNafC-KbAOCST_KL5sa/s1600/VMwareVMSwapFileWebClient.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><img border="0" height="492" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2HrBbgbXT1H-N4qtUz-SlY5hiudRYm_6M9kZ5cuDznBH9_v_92_XqXd-lkgdWM2fpfBKXc4Ejjcz3HIh6QCszoGDK1iZL7piXwzjaGDCMB9EI5fyP7kavFfp9VNNafC-KbAOCST_KL5sa/s640/VMwareVMSwapFileWebClient.PNG" width="640" /></span></a></td></tr>
<tr><td class="tr-caption" style="font-size: 12.8px;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">vSphere Web client configuring Default Swap File Location</span></td></tr>
</tbody></table>
<h3>
</h3>
<h3>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">
vSphere Desktop Client to configure VM support swapfile: Select Host -> Configuration Tab -> Software Group - Virtual Machine Swapfile Location</span></h3>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHOC-3tAOpzHy0TzJ21rFsupxP2k5Il6ecKkQlXypiiDsD9yMHTDLkbmiIlsx4QMexT_tDqrS-p1XaSBZxvy4bQEUhIj2oakemgnW3hDvhzmq759pf_3B2EiHQtxd734O0XwHz2iQ8Iu-E/s1600/VMwareSwapFileDesktopClient.PNG" imageanchor="1"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><img border="0" height="391" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHOC-3tAOpzHy0TzJ21rFsupxP2k5Il6ecKkQlXypiiDsD9yMHTDLkbmiIlsx4QMexT_tDqrS-p1XaSBZxvy4bQEUhIj2oakemgnW3hDvhzmq759pf_3B2EiHQtxd734O0XwHz2iQ8Iu-E/s640/VMwareSwapFileDesktopClient.PNG" width="640" /></span></a><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">This setting can also be overridden on a per-VM basis if needed in the VM Swapfile Location property</span><br />
<br />
<h3>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">3b) Hyper-V SmartPage: Select a VM -> Right Click (Or Actions) - Settings -> Smart Paging File Location</span></h3>
<br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">The file location is determined during installation, then reconfigured on a VM by VM basis in their management related properties:</span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvJC4pBLg1se9rIkRFdUDdlBtapwbokiQ8NkmtkPIbLvMbXWeEHtUitYpTicXNf8Zsz_5qlosLq84rMmEU9cTdTBadlObBT9FbWzqqIdmV2Xmc4OfEWPWAOnVXsF3Mb1kwOGNfeUb5Bk67/s1600/smartPageHyperV.PNG" imageanchor="1"><img border="0" height="424" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvJC4pBLg1se9rIkRFdUDdlBtapwbokiQ8NkmtkPIbLvMbXWeEHtUitYpTicXNf8Zsz_5qlosLq84rMmEU9cTdTBadlObBT9FbWzqqIdmV2Xmc4OfEWPWAOnVXsF3Mb1kwOGNfeUb5Bk67/s640/smartPageHyperV.PNG" width="640" /></a></span><br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<br />
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
I hope that you feel a little more solid on the 3 types of swapfiles that you will run into when managing virtualization!<br />
<div>
<br /></div>
<div>
Keep it virtual!</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-Od4KXaK-1LXm8p_qF1y-uaUGNMhkTmFQ829tQbzOGMh7wqJwqfrVqTKjw7KgUGDCXM6KYgHu7bRVe6Mh6L43oWpHH8a1Pwuwd6Veaq4G-1ISINzRaCt-bMAMcBgUxxN3Io0h60DOof2l/s1600/MBBlankLogo.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-Od4KXaK-1LXm8p_qF1y-uaUGNMhkTmFQ829tQbzOGMh7wqJwqfrVqTKjw7KgUGDCXM6KYgHu7bRVe6Mh6L43oWpHH8a1Pwuwd6Veaq4G-1ISINzRaCt-bMAMcBgUxxN3Io0h60DOof2l/s1600/MBBlankLogo.png" /></a></div>
<div>
<br /></div>
<ul>
</ul>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"><br /></span>
<br />
<h3>
</h3>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-64650751527335695892015-12-17T16:39:00.001-08:002015-12-17T16:46:20.909-08:00An easy to understand description of VLANs for Cisco, HP, VMWare, or MicrosoftVLANs can be confusing for virtualization administrators, because it takes a really solid understanding of networking to then be abstracted into a virtual environment, which can then be configured multiple ways. <br />
Let's make sure we're on the same page with VLANs first<br />
<br />
Let's think about a physical environment that is segmented without any VLANS<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEVbzUWmLCDmbOfJVXesyB7NewwkdBf0xnS7sZwYQaeR99bKJpmS6pZTjNHfxkQeexDTni5wQrwjyLVpraFfuYZlMRRLnjz0QuQgJ1RokfE_H6MPGRKgquY8bV8nTbC7Qod97rcpU4CNoj/s1600/noVLANs.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="460" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEVbzUWmLCDmbOfJVXesyB7NewwkdBf0xnS7sZwYQaeR99bKJpmS6pZTjNHfxkQeexDTni5wQrwjyLVpraFfuYZlMRRLnjz0QuQgJ1RokfE_H6MPGRKgquY8bV8nTbC7Qod97rcpU4CNoj/s640/noVLANs.PNG" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;">If we think about networks from a chronological perspective, we start with just the green local area network at the top. All your local clients were in a local broadcast domain with a single network ID. And the living was easy. </span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;">Then LANs continued to grow and grow, which caused too many broadcasts, traffic congestion, and security vulnerabilities... all because all the devices were playing in the same "sandbox."</span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span> </div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;">So to divide the LAN we ran a dedicated cable from a newly dedicated interface on the router, installed a separate switch, and routed between the LANs, as seen in the diagram above. </span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span> </div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;">Question: Why would anyone ever want anything better than that solution? </span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;"><strong>#1 - Money:</strong> High speed Ethernet interfaces on routers are a costly proposition, only superseded by purchasing entirely new routers to handle the traffic from each network. Additionally, every subnet needs a dedicated switch. What if a 48 port switch is serving a network of only 10 hosts? 37 wasted ports.</span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;"><strong>#2 - Management:</strong> To reassign a host to a different subnet means moving their patch cable to a physically different switch. This is a manual, physical process that requires going into the racks and mucking about - always an additional risk, easy to make mistakes</span></div>
<div style="text-align: left;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br /></div>
<div style="text-align: left;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;">The good news is that soon one of the first network virtualization technologies came into being. Instead of having to buy additional switches and router interfaces, we can use virtual LANs (VLANs) </span></div>
<div style="text-align: left;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br /></div>
<div style="text-align: left;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;">- VLANs allow us to virtualize networks using two key components:</span></div>
<div style="text-align: left;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;"><strong>1) Switch ports</strong> are virtualized so that instead of one switch you can have the effect of having two or three or more switches from a single physical switch, and then you can spread these multiple virtual switches across multiple physical switches!</span></div>
<div style="text-align: left;">
<span style="color: black; font-family: "arial"; font-size: 14.66px;"><strong>2) Router interfaces</strong> are also virtualized, using sub-interfaces on physical routers or virtual VLAN interfaces on multilayer switches. Each virtualized router interface will be configured to "plug in" to the virtual switch. This means that one uplink could support a connection to 20 different subnets!</span></div>
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">So how do you go about virtualization? It's all about playing a game of tag. Each switch's access port (a port going to an end station such as a server, desktop, phone, or router) will be tagged with a particular VLAN number, determined arbitrarily by the administrator. (Side note, many administrators make their lives easier by creating a loose association between VLANs and subnet IDs. For example, the 192.168.5.0 subnet could be assigned VLAN 5 for simplicity.)</span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">So each </span><span style="color: black; font-family: "arial"; font-size: 14.66px;">VLAN is identified by a number and the default VLAN is VLAN 1. All ports are assigned to VLAN 1 by default, meaning that the switch functions like an unmanaged switch, all ports will forward, filter, and flood with all other ports. Since this is the case, by default, VLAN tagging (inserting the tag ID into the frame) is skipped by default for VLAN 1. This skipping can only be done for one VLAN ID number, and is known as the "native VLAN". </span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><span style="color: black; font-family: "arial"; font-size: 14.66px;"><span style="color: black; font-family: "arial"; font-size: 14.66px;"></span></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"><span style="color: black; font-family: "arial"; font-size: 14.66px;"></span>But now we choose to subdivide the switch by adding VLAN 2. Generally on a switch you will have the opportunity to provide a VLAN name, which makes it a more sensical device (ie: HR_192.168.5.0 for the Human Resources subnet using 192.168.5.0) </span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">Now that we two different VLANs an administrator needs to assign access ports to that VLAN.</span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">This effectively turns a switch from this:</span><br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2Eqmbp1K2pR8l35l_v3R5-pkTgIGr7RAM8Q7cIC9J66ZHrN9RHu_6-8sHoqCAZccpj3zSS0j6ALi6A-janpPtfNM-6DJkykNwQhaP89ek0o-tZkSaku44AhxtTb_jaB4fCXaLuvwdXM_3/s1600/switch1.png" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="76" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2Eqmbp1K2pR8l35l_v3R5-pkTgIGr7RAM8Q7cIC9J66ZHrN9RHu_6-8sHoqCAZccpj3zSS0j6ALi6A-janpPtfNM-6DJkykNwQhaP89ek0o-tZkSaku44AhxtTb_jaB4fCXaLuvwdXM_3/s640/switch1.png" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">(Switch with all ports still on VLAN 1)</td></tr>
</tbody></table>
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">into this:</span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-3xdW_yeNKCwYs4ClIhzmnzUOMHQ-aNGKAvigimvOuzX9-R2mauQQ21x1V_Vb-vS8SPfEoZdVNRt9Jh2bk0buM8_7mFf0f_22Ie75zm3KZ3dowAqoYbuUuB3Kn721Jp4UF5nSCpvyAsYe/s1600/switch2.png" imageanchor="1"><img border="0" height="76" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-3xdW_yeNKCwYs4ClIhzmnzUOMHQ-aNGKAvigimvOuzX9-R2mauQQ21x1V_Vb-vS8SPfEoZdVNRt9Jh2bk0buM8_7mFf0f_22Ie75zm3KZ3dowAqoYbuUuB3Kn721Jp4UF5nSCpvyAsYe/s640/switch2.png" width="640" /></a></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">Remember, the devices connected to the switch know nothing about VLANs. But now the switch has virtualized two networks instead of one, which means that traffic must be ROUTED from one VLAN into the other, not just switch. </span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">In order to allow multiple switches and routers to participate in these VLANs we must modify the standard Ethernet frame and insert a VLAN tag number so that all devices can respect the defined VLAN boundaries. Tagging is done between devices over what are known as <a href="http://majorbacon.blogspot.com/2015/12/trunk-it.html" target="_blank">trunk </a>ports. Trunk ports are used when connecting switches to each other or when connecting switches with multiple vlans to a router. Trunk ports are not assigned a VLAN number because their job is to carry ALL VLAN traffic upstream to a router and to take the returning packets and forward them to the correct access ports. VLAN ID numbers are stripped from the frames before they enter an access port.</span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">That allows for this:</span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjab_CZfXxC6gfod_pIkKQoWoDPntc-2vFOokg_8W0KWcou91PPr5qYi4lNP1sp5mkFd-P24BGbPrfJaLk1Qyj6XSHzo6tAitakD41JvknMFD2MXGVexLAPovued__wISyyFCmzBOc1_Iae/s1600/switchandRouter1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="260" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjab_CZfXxC6gfod_pIkKQoWoDPntc-2vFOokg_8W0KWcou91PPr5qYi4lNP1sp5mkFd-P24BGbPrfJaLk1Qyj6XSHzo6tAitakD41JvknMFD2MXGVexLAPovued__wISyyFCmzBOc1_Iae/s640/switchandRouter1.png" width="640" /></a></div>
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">With this configuration you can see that we have the equivalent of 4 switches instead of two, with two switches in each broadcast domain. The great thing about the configuration above is that a device in VLAN 1 can switch to another device in VLAN 1 (or a VLAN 2 device to another VLAN 2 device) at high speeds. However, if a device wants to connect to another device across VLANs (VLAN 1 PC to a VLAN 2 Server, for example) then they had better know the know the IP address of the sub-interface (virtual interface) of their L3 routing service! In other words, they must route as if they were physically connected to different physical interfaces of the router. </span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilDKWZXhs2I80jtNK4tzNBFSdzHa4H8MImPa6P-fS2HmSrQBh3HOgu_U3JnyH2FRHeIa65QUw0ebeOUxJqyySGh6qNZUXeMoJpn6S_ugRWJ1MKE8xO2J-Ln99cG-ZmeTYthJ-CwTWAuQRI/s1600/switchandRouter2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="260" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilDKWZXhs2I80jtNK4tzNBFSdzHa4H8MImPa6P-fS2HmSrQBh3HOgu_U3JnyH2FRHeIa65QUw0ebeOUxJqyySGh6qNZUXeMoJpn6S_ugRWJ1MKE8xO2J-Ln99cG-ZmeTYthJ-CwTWAuQRI/s640/switchandRouter2.png" width="640" /></a></div>
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">But the real beauty of all this is that any device could be moved to a different subnet by reconfiguring the VLAN ID of an access port to a different number. As long as all the switches have the same VLAN ID numbers (and the router has VLAN associated sub-interfaces.</span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">A little more about the native VLAN. The default VLAN is VLAN 1 (what all ports start off as). The default VLAN is also the native VLAN (untagged "assumed" VLAN number) by default. This was useful when connecting unmanaged and managed switches and in carrying management traffic back in the day. However, for security reasons, it is usually a best practice to change the native vlan to a different, unused VLAN ID number (such as 999). This ensures that are no assumptions, and therefore no annoying security holes. Now VLAN1 frames will be tagged as VLAN 1 just like all the other VLANs</span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">When VLAN 2 is added, the VLAN tag is added to frames that are a part of VLAN 2. We now have two VLANs, and at least one of them must be tagged to be identified. </span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;"></span><br />
<span style="color: black; font-family: "arial"; font-size: 14.66px;">Now, let’s add VLAN 3. In this setup, two VLANs would need to be tagged, one would not because it was the original lan (VLAN) The VLAN that is not tagged is known as the native VLAN.</span><br />
<br />
<br />
<div dir="ltr">
<span style="color: black; font-family: "arial"; font-size: 14.66px;">There are a lot of questions of when and why to use the native VLAN or if you should use the native VLAN at all. As always in IT, the answer is, it depends on what you are doing. VLAN 1 does not have to be your management VLAN. It does not have to be the native or untagged VLAN. You can do whatever you need for your environment. Typically, I do not use the native VLAN for security reasons, and I choose to tag everything. </span></div>
<br />
Remember that all of this is true whether you are dealing with a physical switch or a hypervisor driven virtual switch on Microsoft Hyper-V or VMWare ESXi. Trunk ports between switches, defined VLANs omnipresent, Access ports with VLAN ID numbers on individual access ports.<br />
<br />
Keep it clean, keep it safe.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com1tag:blogger.com,1999:blog-5047027589469055445.post-8884288268249863822015-12-14T14:56:00.001-08:002015-12-18T07:29:28.404-08:00Get Trunk!!!<div class="separator" style="clear: both; text-align: center;">
Remember - you can't carry traffic for multiple VLANs unless you...<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZUm2EdcAXQCOfnoevsC6MV4ygDyuMJlP25tfT-Bx4fL7Aad7eE6YRiUTj2pRCKT_7J89_Jafs4dME-mAzPlRxTwskML2yXswxUF4O4km6XD4hQDM8FvROiQsqmtNlzhuRNOcW7z5aKpAc/s1600/TRUNK%2521%2521%2521.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="372" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZUm2EdcAXQCOfnoevsC6MV4ygDyuMJlP25tfT-Bx4fL7Aad7eE6YRiUTj2pRCKT_7J89_Jafs4dME-mAzPlRxTwskML2yXswxUF4O4km6XD4hQDM8FvROiQsqmtNlzhuRNOcW7z5aKpAc/s640/TRUNK%2521%2521%2521.png" width="640" /></a></div>
<br />
<br />
<br />
Smiles,<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
<br />Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-89762425396349142802015-11-30T07:40:00.000-08:002015-11-30T07:46:10.109-08:00How to control wireless vs wired priority in Windows<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;">A Student asked recently how to control wireless vs. LAN priorities in Windows 7. Wireless was being used, even when on the LAN. One absolute way to do this is by disabling the Wireless when connected to the LAN – but this requires vendor support – like in some Dell BIOS’ there’s an option to do this. But a simpler method may be to override the default interface metric used by IP on the wired or wireless interface. Here's the what and why and how: </span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><br /></span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;">If I go to the route print command on a system with wired and wireless I see the following :</span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuEPRCiMHIkDaeMOiYDaVKwZKEsjz8XAwyfcrlwOFTq3xdFBkLkmm_JmKiQ74W7mDb4o-HhlhYTUFIkSP2OZTLghZy8pII5dFOUuxh1ldqZX-UeRB2Ovc4xUKyHa3_1VQv-wASQCngGJdA/s1600/ShutUpWireless1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: "times" , "times new roman" , serif;"></span></a></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP_RF2WF61xWqTJW2trAH_9LRO1A-rpNEgXr8N7yvR95Y1oD3yg7ndmtn92Ky4N0z9JNOfQml-hdjeYabKXerA2SG9b2qCZ22MfeTJm0ZXPNnbCSlmGXohcCG8HXToN7ykvSaphKWkBJEc/s1600/DGPriority1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="310" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP_RF2WF61xWqTJW2trAH_9LRO1A-rpNEgXr8N7yvR95Y1oD3yg7ndmtn92Ky4N0z9JNOfQml-hdjeYabKXerA2SG9b2qCZ22MfeTJm0ZXPNnbCSlmGXohcCG8HXToN7ykvSaphKWkBJEc/s640/DGPriority1.png" width="640" /></a></div>
<br />
<span style="font-family: "times" , "times new roman" , serif;">I’ve highlighted the two interface IPs which show their bizarre local on-link metrics for local communications. (FWI, these are all derived from what we will be configuring directly) What really matters here is the metric to the default gateway routes circled at the top – which one will be used?</span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><br /></span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;">In my case 192.168.2.9 will be used with the metric of 20. How did it get that metric of 20? It’s certainly not 20 hops to the default gateway! Well a metric does not mean hop count. A metric is the just the relative measure to determine preference among routing methodologies.</span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;">Well, as we would learn from <a href="http://support.microsoft.com/kb/299540" rel="nofollow" style="color: #620606;" target="_blank">http://support.microsoft.com/kb/299540</a> the metric for each interface to the default gateway is based upon a link speed range:</span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><br /></span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<strong><span style="font-family: "times" , "times new roman" , serif;">Link Speed Metrics for Operating Systems after XP sp2</span></strong></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><b>10 </b>= > 200 Mb </span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><b>20 </b>= Between 80 Mb and 200 Mb </span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><b>25 </b>= Between 20 Mb, and 80 Mb </span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><b>30 </b>= Between 4 Mb, and 20 Mb </span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><b>40 </b>= Between 500 Kb and 4 Mb </span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><b>50 </b>= < 500 Kb </span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
</div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;">So in my scenario it’s because it has the Link speed of 100mb/s which gives it an automatic metric of 20, which is better than the 192.168.2.7 which has a link speed of 72mb/s (wireless) which earns it an automatic metric of 25. So in my scenario, the LAN is preferred over the Wireless, and all is well.</span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><br /></span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;">The real problem shows up with a 802.11n interface that gets about 150mb/s and a LAN interface with 100mb/s. Then they both get a metric of 20, and it’s a toss up which one gets used, and you may find that it's the wireless!</span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><br /></span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;">This is the situation when you will override the automatic metric by going to the advanced interface property dialog box of the TCP/IP settings to lower the metric of the preferred NIC (or raise the metric of the the less preferred NIC)</span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4efoOHhK1uVPRAHRI3W12duR5TZDIPn6ZezPcJYWrLl6UXP2KiCISdJC7WjYo4xbonwsHUZBRhLZfp_8dCf4EN5bHdM8Hg2cLk0JBcjK9Iv7VWzROib0YpV8sYv8jPvKE-dKt7a9ilkWg/s1600/ShutUpWireless2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: "times" , "times new roman" , serif;"></span></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYjQHbfEXZecJnSLP89T4ele20THoEoHdfh5H7DYajbfuNOG11kDZq_6JDH0rXH2idbMcYvXd5V1crx84cogVQTmBqYyI7Ho24YmwJC5HY_fGPBRkfmDLpPjkj8Zj01yS22yaVPehaEMSG/s1600/DGPriority2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="560" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYjQHbfEXZecJnSLP89T4ele20THoEoHdfh5H7DYajbfuNOG11kDZq_6JDH0rXH2idbMcYvXd5V1crx84cogVQTmBqYyI7Ho24YmwJC5HY_fGPBRkfmDLpPjkj8Zj01yS22yaVPehaEMSG/s640/DGPriority2.png" width="640" /></a></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><br /></span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;">In my scenario, I'm lowering the metric of my Wireless to force it to be the preferred Interface. After making this change, we can see that the default gateway is now preferred to go through this interface that his this metric.</span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"></span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRwXQdUaPkyG0VisdL1DfQoWYy3KoonIT8VY-PhdzNXpEZ5QLPtMAET4mLWEW0uz4Zl3QmQQy_JnCLO0Y9Ziw8JByj8rWYtiahY3frJWZylOvHnzJpoHoFu9LEtVX3NsI_z9-4smZFdTcn/s1600/DGPriority3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="304" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRwXQdUaPkyG0VisdL1DfQoWYy3KoonIT8VY-PhdzNXpEZ5QLPtMAET4mLWEW0uz4Zl3QmQQy_JnCLO0Y9Ziw8JByj8rWYtiahY3frJWZylOvHnzJpoHoFu9LEtVX3NsI_z9-4smZFdTcn/s640/DGPriority3.png" width="640" /></a></div>
<span style="font-family: "times" , "times new roman" , serif;">I’m going to undo this now so that my LAN is the preferred interface again!</span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;"><br /></span></div>
<div style="background-color: white; color: #656d79; font-family: Arial, Georgia, 'Times New Roman', serif; font-size: 12px; line-height: 16px; padding: 0px;">
<span style="font-family: "times" , "times new roman" , serif;">Hopefully this deepens your understanding of how Microsoft is managing your multihomed system when it comes to routing. And these are really routing rules that apply to all routing devices and protocols as well, so this knowledge can serve you when administering any routing device and managing two routes to the same network based on the same protocol with differing metrics.</span><br />
<span style="font-family: "times" , "times new roman" , serif;"><br /></span>
<span style="font-family: "times" , "times new roman" , serif;">Good luck getting Windows to behave itself!</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
<span style="font-family: "times" , "times new roman" , serif;"><br /></span></div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-85910960888871168472015-11-23T16:39:00.002-08:002015-11-24T12:14:27.804-08:00Building a SharePoint, SQL and Exchange Lab: Logfiles TipI work with a lot of lab or development scenarios. These situations are usually a fast buildup and a quick teardown with little connective tissue or infrastructure.However some of these environments may last a while, and when they do, they can start to trigger "DISK SPRAWL" (que dramatic music)<br />
<br />
Here's the deal, both Microsoft Exchange and Microsoft SQL Server have log files that are used to ensure the integrity of their databases in case of disk failure or power outage. As a safety check, these logs are not cleared until they have been backed up. So backup of these log files enables them to be overwritten. Conversely, however, NOT performing log file backups on these servers (say in a lab or development environment) means that they grow... and grow... and grow... sometimes to terabytes in size!<br />
<br />
Two solutions:<br />
1) Perform backups as if you were in a production environment<br />
<br />
2) Disable the safety check so that your lab/dev/test environment doesn't preserve the log files past the point in which data from memory is written to disk. <br />
<br />
Here's how to do the latter for both Exchange and SQL<br />
<br />
<h2>
Exchange: Enable Circular Log Files on the Exchange Mailbox Database</h2>
<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
1) Open Internet Explorer and Browse to the Exchange 2013 ECP URL (usually http://servername/ecp/<br />
2) Log in with an administrative account.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvMgo8e49Vu-xYhDjy4krNpRZFgz4ij4ZJpHIXLHccNLXSH0AvL26Nea1eB2DAPjcvLA0EJB_sp83PFwCTZ5MVcIs6iHpJ5X_B8vge_jhJKf1RD99ytgRjz61mIH4C3YU8WXWWCuXX0k_x/s1600/exCircLog1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvMgo8e49Vu-xYhDjy4krNpRZFgz4ij4ZJpHIXLHccNLXSH0AvL26Nea1eB2DAPjcvLA0EJB_sp83PFwCTZ5MVcIs6iHpJ5X_B8vge_jhJKf1RD99ytgRjz61mIH4C3YU8WXWWCuXX0k_x/s640/exCircLog1.png" width="640" /></a></div>
<br />
3) Select "Servers" from the Lefthand Navigation bar<br />
4) Select "Databases" from the Contextual Horizontal Navigation Bar<br />
5) Select the database you want to enable Circular logging for and click the “Edit” pencil<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiMAcJWeQSrR1qarV5oZdnRJH6fL9kT9XwyRxbvG9bItZR138rW3rdAvedMcslL_oYDykiAY91_-LtLSpmpcTatV4nFYNRAl0fABp30UYianaOXk-25RMPYcCLr4b9VNNIKOSWrTy9gE2P/s1600/exCircLog2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiMAcJWeQSrR1qarV5oZdnRJH6fL9kT9XwyRxbvG9bItZR138rW3rdAvedMcslL_oYDykiAY91_-LtLSpmpcTatV4nFYNRAl0fABp30UYianaOXk-25RMPYcCLr4b9VNNIKOSWrTy9gE2P/s640/exCircLog2.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
6) Click on "Maintenance "<br />
7) Click on "Enable circular logging"<br />
<div class="separator" style="clear: both; text-align: left;">
8) Click on "save "</div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEC_Ea040IiBbyvU3nGyatIey9Kp0s3IIUSVHnBYMFUJSFnh-wXp7I6MM9YONdRawztC_4vAJf0RB0QezMlK-Igr43nxsJxKoXQK-5yIm2zD-z4vWr8cYRx8C4niCDkXp21lAC36H-Qorc/s1600/exCircLog3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEC_Ea040IiBbyvU3nGyatIey9Kp0s3IIUSVHnBYMFUJSFnh-wXp7I6MM9YONdRawztC_4vAJf0RB0QezMlK-Igr43nxsJxKoXQK-5yIm2zD-z4vWr8cYRx8C4niCDkXp21lAC36H-Qorc/s640/exCircLog3.png" width="640" /></a></div>
<br />
9) Click OK to the warning message that appears<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA-7OmGNSrh6VH4sa41zTDZEpoqrjtinFl3zNdnv9rugbUTkwkAiMe7XEuIk04YiVTNGtbiBzq1yuayaU36DIDRefj_ORYgGlQTOoNpyVGks-rCr2siFtrnFjK4zU5B20QwXs4CeHRLeZA/s1600/exCircLog4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA-7OmGNSrh6VH4sa41zTDZEpoqrjtinFl3zNdnv9rugbUTkwkAiMe7XEuIk04YiVTNGtbiBzq1yuayaU36DIDRefj_ORYgGlQTOoNpyVGks-rCr2siFtrnFjK4zU5B20QwXs4CeHRLeZA/s640/exCircLog4.png" width="640" /></a></div>
<br />
10) Select the database and click the elipses (...) in the menu bar and choose "Dismount"<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjU7s704aztWGyJvcq4dN7_Fq_fGDaqpZXhxN31pOpRdwiXgfxRdxvAZrBsMhlt-3bZw01skTUApsGJf-9XUyTlIa2reor6IG18AaUjmxzc7ybVIo7IAInYPMHMIvW3Vrlr_Scnnk7taW11/s1600/exCircLog5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjU7s704aztWGyJvcq4dN7_Fq_fGDaqpZXhxN31pOpRdwiXgfxRdxvAZrBsMhlt-3bZw01skTUApsGJf-9XUyTlIa2reor6IG18AaUjmxzc7ybVIo7IAInYPMHMIvW3Vrlr_Scnnk7taW11/s640/exCircLog5.png" width="640" /></a></div>
<br />
11) Click on "Yes"<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjkiHSABjEvYpSe91V3Ounp7qHVgguwIMhpweKCAKXEfURBEPfB77IMqMlhp6pwK-8i7NXeUeNhNJjJSbV6j3o08pEyxaXR3ZppEQy6KMe3BtKKTe-X6nBNyWf8XHMtVPPS1DGpMG2gElc/s1600/exCircLog6.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjkiHSABjEvYpSe91V3Ounp7qHVgguwIMhpweKCAKXEfURBEPfB77IMqMlhp6pwK-8i7NXeUeNhNJjJSbV6j3o08pEyxaXR3ZppEQy6KMe3BtKKTe-X6nBNyWf8XHMtVPPS1DGpMG2gElc/s640/exCircLog6.png" width="640" /></a></div>
12) Select the database and click the elipses (...) in the menu bar and choose Mount"<br />
13) Click on "Yes"<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqc2V1gx3VhLzpLaTb6Pe1uxoA-5Yc5K8OKxTuyP1yyjrZDMuNCGdoD8Kiuo94dewk373ZYeStNUOU3DHFyuT2SI15xMNyG_fxI6swqLlGOB6RBoHEvPsbLEXJF21pHgET9o8aB6u4KoEd/s1600/exCircLog7.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqc2V1gx3VhLzpLaTb6Pe1uxoA-5Yc5K8OKxTuyP1yyjrZDMuNCGdoD8Kiuo94dewk373ZYeStNUOU3DHFyuT2SI15xMNyG_fxI6swqLlGOB6RBoHEvPsbLEXJF21pHgET9o8aB6u4KoEd/s640/exCircLog7.png" width="640" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnwvzVOU8XRM274ZMV0seFKMKQfwnicIj_C_yVQVwDwcHnh4Lx9vwHj94MFh4W1E7r2U5m8ZD9H2hv1Uqe8afZBesdWxnkmGAaOnufcVyjOgtcAKBwMqJCYmwrNE_rmwIYg_5AWouIwnOp/s1600/exCircLog8.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnwvzVOU8XRM274ZMV0seFKMKQfwnicIj_C_yVQVwDwcHnh4Lx9vwHj94MFh4W1E7r2U5m8ZD9H2hv1Uqe8afZBesdWxnkmGAaOnufcVyjOgtcAKBwMqJCYmwrNE_rmwIYg_5AWouIwnOp/s1600/exCircLog8.png" imageanchor="1" style="clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnwvzVOU8XRM274ZMV0seFKMKQfwnicIj_C_yVQVwDwcHnh4Lx9vwHj94MFh4W1E7r2U5m8ZD9H2hv1Uqe8afZBesdWxnkmGAaOnufcVyjOgtcAKBwMqJCYmwrNE_rmwIYg_5AWouIwnOp/s640/exCircLog8.png" width="640" /></a>And now you've enabled circular logging in Exchange. That was the easy one.<br />
<br />
<h2>
SQL: Enabling Simple Recovery Mode in your databases</h2>
<div>
For more information on SQL's Transaction Log and the Simple Recovery mode check out these other articles:<br />
<a href="http://majorbacon.blogspot.com/2014/03/preventing-transaction-log-fires.html" target="_blank">Preventing Transaction Log Fires </a><br />
<a href="http://majorbacon.blogspot.com/2014/06/my-sql-transaction-log-is-huge-should-i.html" target="_blank">My SQL Transaction Log is huge - should I switch to simple recovery mode?</a><br />
<br />
1) Open the SQL Server Management Studio<br />
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtMZJ4Ip4VdPh4rLejiDo3zcQJENnRkXved_pPJ4b27VidDZIsJ36lxIyZ5acFbiW-nGwGIEVWE5p76RmX73_YxDX-ukcFRBsuOdT57x9HDuQSh4vL7QxEdPiny1NvbgcTkMlr1cvaTj-H/s1600/SQL_Simple_Lab1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtMZJ4Ip4VdPh4rLejiDo3zcQJENnRkXved_pPJ4b27VidDZIsJ36lxIyZ5acFbiW-nGwGIEVWE5p76RmX73_YxDX-ukcFRBsuOdT57x9HDuQSh4vL7QxEdPiny1NvbgcTkMlr1cvaTj-H/s640/SQL_Simple_Lab1.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: left;">
2) Log into your SQL instance with sysadmin credentials</div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQdnwaC1oKQOaD5FNvmFsfCTc-20deRel-v-LLlUv6MmnoFfWL3y6Q6zyWi0jRcF08O29Ub7dZfGb1ARk4y9hFl4G3IX4wl01GU3tAOM6SVtpeUl7Ur1_linStady-KCN5Hz1RvRC5CnjT/s1600/SQL_Simple_Lab2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQdnwaC1oKQOaD5FNvmFsfCTc-20deRel-v-LLlUv6MmnoFfWL3y6Q6zyWi0jRcF08O29Ub7dZfGb1ARk4y9hFl4G3IX4wl01GU3tAOM6SVtpeUl7Ur1_linStady-KCN5Hz1RvRC5CnjT/s640/SQL_Simple_Lab2.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: left;">
3) In the toolbar click "New Query"</div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPX0aQJ8w2vuImoR65xRwmrZSUK0MHIl0-JgywVEqt-ah7kR9Hk051uuvboUYZ8ZhnUH2vSZQu0_2J5oSA0DC7JcEeBFoEsiAy4Kaj7GhSXOIYFs10UByHoi1IJZam9QWTJkci7Y1BvJSF/s1600/SQL_Simple_Lab3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPX0aQJ8w2vuImoR65xRwmrZSUK0MHIl0-JgywVEqt-ah7kR9Hk051uuvboUYZ8ZhnUH2vSZQu0_2J5oSA0DC7JcEeBFoEsiAy4Kaj7GhSXOIYFs10UByHoi1IJZam9QWTJkci7Y1BvJSF/s640/SQL_Simple_Lab3.png" width="640" /></a></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div>
4) You could now either open up the properties of the master database and each user database, go to the options section, and choose "simple" from the drop down menu for Recovery Mode or... <br />
<br />
Copy and Paste the following script into the SQL Server Management Window
<br />
<pre><code>
<span style="background-color: black;"><span style="color: white;">Use Master
alter database [model] set recovery simpleselect 'alter database ['+name+'] set recovery simple' from master.sys.databases where database_id > 4 and state_desc = 'online'
select 'use ['+name+'] checkpoint' from master.sys.databases where database_id > 4 and state_desc = 'online'
select 'DBCC Shrinkdatabase (['+name+'], 0) ' from master.sys.databases where database_id > 4 and state_desc = 'online'
select 'DBCC Shrinkdatabase (['+name+'], 0, TRUNCATEONLY) ' from master.sys.databases where database_id > 4 and state_desc = 'online'</span></span>
</code></pre>
<pre><code>
</code></pre>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCJw5_MMeS-HzNALHJ2a9UNCdhbErG9WbaP6z3d08NOvqjeLzk67nD5CAw0tlBaF3sy70XHJHT0TzGLLIQ7ciGlB2DWh7Mw6dCvK6nmlACwp5wweSp5R-RmNFpvvp-SrvdJtjrf2otL7IF/s1600/SQL_Simple_Lab4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCJw5_MMeS-HzNALHJ2a9UNCdhbErG9WbaP6z3d08NOvqjeLzk67nD5CAw0tlBaF3sy70XHJHT0TzGLLIQ7ciGlB2DWh7Mw6dCvK6nmlACwp5wweSp5R-RmNFpvvp-SrvdJtjrf2otL7IF/s640/SQL_Simple_Lab4.png" width="640" /></a></div>
<pre><code>
</code></pre>
</div>
<div>
5) Click Execute -<br />
<br />
NOTE: If you perform these actions BEFORE installing SharePoint then you are done!<br />
Already installed SharePoint? Keep going! -<br />
<br />
6) Right Click in the first results area below the script code and select "Select All"<br />
7) Right Click in the first results area below the script code and select "Copy"<br />
<div>
<br /></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwC4yGRgPLwuFbHXH5giGgqcHI4K23xy02QwO6SAY1BcZ-PJKqEqaOCC6uVsixj0OQW4a0N23oVV8lSmzpcAcLZd9hUzfbfBB4yLn0dbKfa7Fe3XReiMNOgCmgPfxnNgSm8YDweMOtkFpZ/s1600/SQL_Simple_Lab5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwC4yGRgPLwuFbHXH5giGgqcHI4K23xy02QwO6SAY1BcZ-PJKqEqaOCC6uVsixj0OQW4a0N23oVV8lSmzpcAcLZd9hUzfbfBB4yLn0dbKfa7Fe3XReiMNOgCmgPfxnNgSm8YDweMOtkFpZ/s640/SQL_Simple_Lab5.png" width="640" /></a></div>
<br />
8) Click New Query<br />
9) Paste the selected text into the query script window<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiOW6hT8DVzYC8vdsCeYmKLlbfySWPs5EjH9iWUnscN1iyEBV7G3cYGMFM0CbUcvaxveZd4JWvq8dxVhyphenhyphen2rBJjYkhJy1O82rgKYgzp7up1bPIll9MwQ54L6v8DBajnBHbDtbl7N-mopUQt/s1600/SQL_Simple_Lab6.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiOW6hT8DVzYC8vdsCeYmKLlbfySWPs5EjH9iWUnscN1iyEBV7G3cYGMFM0CbUcvaxveZd4JWvq8dxVhyphenhyphen2rBJjYkhJy1O82rgKYgzp7up1bPIll9MwQ54L6v8DBajnBHbDtbl7N-mopUQt/s640/SQL_Simple_Lab6.png" width="640" /></a></div>
<br />
10) Click Execute<br />
11) Verify the commands completed successfully<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuxnPi5fkuVAyujNvfR82ZR8SIjjB_apJF2fFHWM_0wjdlRO43uxdR57oHERHStB40LlQKJqsMVsoaC6e6oUXJMcsKalJ_zb_RGESyYRw-Zf6IfB9GMl2SzuP5Ki4RCRcCrTYvosmWaKYj/s1600/SQL_Simple_Lab7.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuxnPi5fkuVAyujNvfR82ZR8SIjjB_apJF2fFHWM_0wjdlRO43uxdR57oHERHStB40LlQKJqsMVsoaC6e6oUXJMcsKalJ_zb_RGESyYRw-Zf6IfB9GMl2SzuP5Ki4RCRcCrTYvosmWaKYj/s640/SQL_Simple_Lab7.png" width="640" /></a></div>
<br />
<br />
12) Click the script file select drop down<br />
13) Choose the first script file<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjob27SOSHOKdJEyO81fDCX149C2Umu8db5y5ytDHomcJ1ek4dl9f-qCg37j9gZYGTJmc5tYzE3uiTvzHAeF91JiibCtRyFD6E2uL_NBAIZXPs_Ut1o687R86SEad6sN8a-2YZYRkF65wXh/s1600/SQL_Simple_Lab8.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjob27SOSHOKdJEyO81fDCX149C2Umu8db5y5ytDHomcJ1ek4dl9f-qCg37j9gZYGTJmc5tYzE3uiTvzHAeF91JiibCtRyFD6E2uL_NBAIZXPs_Ut1o687R86SEad6sN8a-2YZYRkF65wXh/s640/SQL_Simple_Lab8.png" width="640" /></a>14) Scroll down to the Second result block<br />
15) Repeat steps 6-13 for the Second result block<br />
<br />
<div align="left" class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUGmKtNJ-4TWJsdOr6c1RWHodfunh-CK3949MtsgdwE3wCPhkClmTY8otbrASon2Nk8aN0Tju66jovttgSaAaxOMbJfbA9E7Ho1_e6HYAPN2hRiLEb60HwEtL4t2OYKObVEtU1-X3qSs_F/s1600/SQL_Simple_Lab9.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUGmKtNJ-4TWJsdOr6c1RWHodfunh-CK3949MtsgdwE3wCPhkClmTY8otbrASon2Nk8aN0Tju66jovttgSaAaxOMbJfbA9E7Ho1_e6HYAPN2hRiLEb60HwEtL4t2OYKObVEtU1-X3qSs_F/s640/SQL_Simple_Lab9.png" width="640" /></a></div>
<br />
16) Scroll down to the Third result block<br />
17) Repeat steps 6-13 for the Third result block<br />
<br />
18) Scroll down to the Fourth result block<br />
19) Repeat steps 6-11 for the Fourth result block<br />
<br />
You're done - your log files are now under control for your lab/test/dev environment!<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
<br />
<br />
<br />
<br />
<br />
<br /></div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-83738925136682489652015-11-05T11:18:00.001-08:002015-11-05T11:18:29.237-08:00vCenter and VCSA database choices and Host and VM support in vCenter 6.0It can get confusing trying to track down how many hosts and VMs can be hosted with a vCenter Server or vCenter Server Appliance based upon the choice of database model that I want to work with.<br />
<br />
<h2>
vCenter Server</h2>
<br />
embedded 5.5 vCenter - vPostgres (prior versions used SQL Express) - 5 Hosts and 50 VMs<br />
embedded 6.0 vCenter - vPostgres - 20 Hosts and 200 VMs<br />
external vCenter- Microsoft SQL - 1,000 Hosts and 10,000 VMs<br />
<br />
<h2>
vCenter Server Appliance</h2>
<br />
embedded 5.5 vCSA - vPostgres - 100 Hosts and 3,000 VMs<br />
embedded 6.0 vCSA - vPostgres - 1,000 Hosts and 10,000 VMs<br />
external vCenter - ORACLE - 1,000 Hosts and 10,000 VMs (primarily for bringing in an existing database with content)<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBF8Yru5b1LJu0O4rWQNusYqMytDZTgQcF7xrMyQgQJxJFsv8rjf-AmsuTzm1AxO4PlVPd4d_0BkEQN1QeVQJO2mstltSZm2V_XVGUckImlLEiSHmlEUz6_nO4ZO7Hfo0bpzXyB8JyGx6d/s1600/vcsa+Sizes.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="216" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBF8Yru5b1LJu0O4rWQNusYqMytDZTgQcF7xrMyQgQJxJFsv8rjf-AmsuTzm1AxO4PlVPd4d_0BkEQN1QeVQJO2mstltSZm2V_XVGUckImlLEiSHmlEUz6_nO4ZO7Hfo0bpzXyB8JyGx6d/s640/vcsa+Sizes.png" width="640" /></a></div>
<br />
So... the vCSA now allows full size support and now supports Linked Mode, plus you avoid paying Windows License or MS SQL Licenses and the whole Windows Security attack vector.<br />
<br />
If you are using the VCS and you would like to move to the VCSA you have two options:<br />
Rebuild intelligently - really your best option<br />
Use this fling: <a href="https://labs.vmware.com/flings/vcs-to-vcva-converter">https://labs.vmware.com/flings/vcs-to-vcva-converter</a><br />
<br />
So get to the VCSA - it's awesome!<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-71856139540910462342015-11-02T21:07:00.001-08:002015-11-02T21:07:49.547-08:00Can I install windows 10 with a local account? YES!I get asked this more often than Microsoft would like. Yes, it's great to have a system set up with a built-in cloud presence. But some systems just don't have Internet access or relate to a live body with an email address. And some people just don't want that much Microsoft, even when they are buying their OS.<br />
<br />
So here's the trick to installing a local account on Windows 10 box during installation. Pretend to go along with the plan then chicken out at the last second. <br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhW7VB1w7_uuywqJPccBrANsbhpMzODoRy8nq7Ny5toLFu3X9wbULHR0C1aoiVMWTU9dYrZyUGIKCvJ9G8FB6SScMYMog-Ncd2VfoM2azXSkBX4xKvZDK3mJoHtr2DrEMDDEJcKWeyJ74F/s1600/WindowsLocalAccount1.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhW7VB1w7_uuywqJPccBrANsbhpMzODoRy8nq7Ny5toLFu3X9wbULHR0C1aoiVMWTU9dYrZyUGIKCvJ9G8FB6SScMYMog-Ncd2VfoM2azXSkBX4xKvZDK3mJoHtr2DrEMDDEJcKWeyJ74F/s640/WindowsLocalAccount1.png" width="638" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Step 1</td></tr>
</tbody></table>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggfxmt2UuqzyeJBcKU3RJXLMoR94OiHoLv4IaEM72JNq3-_qT44Gr3EXXuhiZxUoSZB9k0tyUXzIIE29JTupg4F3WZjAaGA-oxxb1wWDDoLwnpoYWbNoIFhgLJpnkopNW_x0RT4Glk3FIS/s1600/WindowsLocalAccount2.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="568" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggfxmt2UuqzyeJBcKU3RJXLMoR94OiHoLv4IaEM72JNq3-_qT44Gr3EXXuhiZxUoSZB9k0tyUXzIIE29JTupg4F3WZjAaGA-oxxb1wWDDoLwnpoYWbNoIFhgLJpnkopNW_x0RT4Glk3FIS/s640/WindowsLocalAccount2.png" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Step 2</td></tr>
</tbody></table>
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyvLR-SbRM6T4eSYc_DNZmRY4Jg-fhQ6SOILaEIIQY_rIOO9u18JbY94wllO2LOz8NGhhgC84NjfsVnkwSO0X6ReBLMW9JpP6ElXcOLMlkeMVq1oTv6LT1pRyG48EayZKljOicFns6l5n4/s1600/WindowsLocalAccount3.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="410" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyvLR-SbRM6T4eSYc_DNZmRY4Jg-fhQ6SOILaEIIQY_rIOO9u18JbY94wllO2LOz8NGhhgC84NjfsVnkwSO0X6ReBLMW9JpP6ElXcOLMlkeMVq1oTv6LT1pRyG48EayZKljOicFns6l5n4/s640/WindowsLocalAccount3.png" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Step 3</td></tr>
</tbody></table>
And you've installed with a local account! The process is similar when you go to create an account after installation - keep going and look for an option duck out and get your circa 1995 local user account groove on.<br />
<br />
Hope it helps!<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
<br />Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com1tag:blogger.com,1999:blog-5047027589469055445.post-87644599722594304912015-10-29T14:41:00.000-07:002016-04-18T07:45:58.942-07:00Majorbacon's 6 steps guide to easy IPv4 SubnettingSubnetting is a process that you just have to practice. Here's what I do so that I can quickly work through subnetting test questions (or real life situations... there's a reason these are on tests you know)<br />
<br />
<h2>
THE PROCESS:<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_4oTGb21dDQBIKOCUYZ8uOqTvEGqemjZadLlCpDtxiMjSQBbhZjsHfxsWy0dsqIfDD8mWrV0Niaxvmos0RSLuTdB2ttzQq14lq0GdHAqyRYxW0-90adbKGrNU4Fwurs3HbBSgYHprhqeo/s1600/bitSlide.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_4oTGb21dDQBIKOCUYZ8uOqTvEGqemjZadLlCpDtxiMjSQBbhZjsHfxsWy0dsqIfDD8mWrV0Niaxvmos0RSLuTdB2ttzQq14lq0GdHAqyRYxW0-90adbKGrNU4Fwurs3HbBSgYHprhqeo/s1600/bitSlide.png" /></a></div>
</h2>
<ol>
<li><b>Read the question</b>. Know what network ID you are starting with and what your GOAL is: Do you need to obtain a certain number of subnets out of your original network or do you need to ensure a certain number of hosts are available in each subnet? </li>
<li>Write your <b>binary table</b> on your paper. If you can multiply by two, you can do this<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjERSVYTnJtfiXy-ctslyCHfFsQXt3Mp7V1-4hPt_TCDycS6ZhupVRcyQ0dfD6ibzi42Bdb0j-z9UpINUNdQoDSzhA6xY6bipAkkfWXyvLFWgCDsOJy5a2sTUi2Ug-6pES4cHjRY1a5R2mB/s1600/sub1.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjERSVYTnJtfiXy-ctslyCHfFsQXt3Mp7V1-4hPt_TCDycS6ZhupVRcyQ0dfD6ibzi42Bdb0j-z9UpINUNdQoDSzhA6xY6bipAkkfWXyvLFWgCDsOJy5a2sTUi2Ug-6pES4cHjRY1a5R2mB/s1600/sub1.png" /></a></li>
<li> Use one of two magic formulas to <b>determine the number of bits </b>that will be used in the new subnet mask</li>
<ul style="margin-left: 40px;">
<li><span style="font-size: large;">2<sup>n</sup></span> >= your desired number of subnets, where n is the number of new ones in the new subnet mask. The rest of the subnet mask will be composed of binary zeros.</li>
<li><span style="font-size: large;">2<sup>h</sup>-2</span> >= your desired number of hosts, where h is the number of zeros left in the new subnet mask. The rest of the subnet mask will be composed of binary ones. </li>
</ul>
<ul><br />
</ul>
<li>Based on this, <b>write out your new subnet mask</b> (in binary, counting ones or zeros as necessary).</li>
<ul style="margin-left: 40px;">
</ul>
<li>In order to figure out the <b>number of hosts</b> you have in each subnet, use 2<sup>h</sup>-2, where h is the number of zeros in your subnet mask. </li>
<li>In order to figure out the <b>total number of subnets</b> you have, use 2<sup>n</sup>, where n is the number of new ones (not total ones) in your subnet mask.</li>
<li>In order to <b>determine your subnet ID</b>s we need to find the block value. Start with your original network ID for the first subnet, but remember it has a new subnet mask. Your next subnet will be one <i>block value </i>away. How much is your block value? It’s determined by the “least significant bit”, the last one in the subnet mask. Look up the column value for this bit in the table because this bit will be the increment from one network to the next, in that same octet! </li>
<ul>
<li>Or Skip the table and use this trick: 256 minus the <b>last positive octet </b>will also yield the block value of the networks</li>
</ul>
</ol>
<br />
<h2>
WORK THE EXAMPLE:<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPv7f4WuqVnmXv48bW9QHMDPuR-8AmjALcR5EhwoQrShlS5_3bnHXIri0GnYqCOZvXX4_L8wxp3d3O-Q1ME8F8UnPvxYPdvuO_3c0CiKPzovt_4UODMVmi_G1U7pgdFDbhtEpFD6L3aVQq/s1600/reading_carefully.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPv7f4WuqVnmXv48bW9QHMDPuR-8AmjALcR5EhwoQrShlS5_3bnHXIri0GnYqCOZvXX4_L8wxp3d3O-Q1ME8F8UnPvxYPdvuO_3c0CiKPzovt_4UODMVmi_G1U7pgdFDbhtEpFD6L3aVQq/s1600/reading_carefully.jpg" /></a></div>
</h2>
<br />
1. You have a Class C network, 202.5.4.0 that you want to subnet into 6 subnets.<br />
2. We write down the all-important table:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMMpwLbwYod1m3Ou15KbAtVNQMe_efqjs5yx3ys8fxdlyVnP9CDbuzO5Z2cw9SJibZXAUKxlMul-6UbCL0YIRWrgQf7f_N2M1TqFC_wZV9uuk4lSpdh42S_VP1AsqOl_JcWaiSdTs-v38g/s1600/sub1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="72" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMMpwLbwYod1m3Ou15KbAtVNQMe_efqjs5yx3ys8fxdlyVnP9CDbuzO5Z2cw9SJibZXAUKxlMul-6UbCL0YIRWrgQf7f_N2M1TqFC_wZV9uuk4lSpdh42S_VP1AsqOl_JcWaiSdTs-v38g/s640/sub1.png" width="640" /></a></div>
<br />
3. 2<sup>n</sup> >= your Goal, therefore 2<sup>3</sup> = 8 >= 6 desired subnets.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoSUjFkc9bwtj4GgHoC1fQJnHYZHYNyG03u9K4jfBPDOO3ucRK4pjHTMk6pNrCUGsViGHf7_znlKDOz76dqXTCy9T7SEIvYsd0Ii82bal9wvOxnFl_XHN3H6CJIq2INjl4gIgoQ21SRTnM/s1600/sub3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="42" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoSUjFkc9bwtj4GgHoC1fQJnHYZHYNyG03u9K4jfBPDOO3ucRK4pjHTMk6pNrCUGsViGHf7_znlKDOz76dqXTCy9T7SEIvYsd0Ii82bal9wvOxnFl_XHN3H6CJIq2INjl4gIgoQ21SRTnM/s640/sub3.png" width="640" /></a></div>
<br />
4. A Class C subnet mask is 255.255.255.0, so if we add 3 ones, it will be 255.255.255.11100000 or 255.255.255.224 - that's 27 binary ones in the subnet mask, so our CIDR notation will be /27. (If you remember that a class C address starts as a CIDR /24 then you could just do /24+3 bits = /27)<br />
<br />
5. We have five zeros in the subnet mask, so 2<sup>5</sup>-2=30 hosts per
subnet, and we have added 3 ones to the subnet mask, so 2<sup>3</sup>=8 new subnets<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUPxaFoJAcra15FKXzeHjCN-wcIlm2UXXq26kXMABAHJVOYgjFAY8K2wBbo34GfYATkjAnXlGEFf47ABAQJtXWkb4oIV0IdPYfhCvIZJVM_JIp4oCzM6Mx8YAZ2s7MqKT0rfiq9a-2N2Kr/s1600/sub4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="44" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUPxaFoJAcra15FKXzeHjCN-wcIlm2UXXq26kXMABAHJVOYgjFAY8K2wBbo34GfYATkjAnXlGEFf47ABAQJtXWkb4oIV0IdPYfhCvIZJVM_JIp4oCzM6Mx8YAZ2s7MqKT0rfiq9a-2N2Kr/s640/sub4.png" width="640" /></a></div>
<br />
6. Our increment is based on the least significant bit in the subnet mask, which in binary was 255.255.255.11100000. If we examine the last octet compared to our table we see that the last one is in the thirty-two column. (Also, 256-224=32)<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiObcFXiKkSZuwqDQb1lvId-woJ0undP8giL_9nM1iT7NspZc-LTW4Z-ITnAB4CJUB363vzU1wPyGUkbbST2zu0CqFVihCpT_qvF2sEFbhZ-tY5ymse08xW70TfxdJdNx4Ojk88ZUlzpKMj/s1600/sub5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="58" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiObcFXiKkSZuwqDQb1lvId-woJ0undP8giL_9nM1iT7NspZc-LTW4Z-ITnAB4CJUB363vzU1wPyGUkbbST2zu0CqFVihCpT_qvF2sEFbhZ-tY5ymse08xW70TfxdJdNx4Ojk88ZUlzpKMj/s640/sub5.png" width="640" /></a></div>
<br />
<br />
That was 6 steps - so we should be done! Let's review:<br />
<ul>
<li>So, our network started as 202.5.4.0/24 (the /24 being CIDR notation for a 24-bit 255.255.255.0 subnet mask). </li>
<li>Now we have a new subnet mask 255.255.255.224, CIDR notation /27</li>
<li>Our first subnet ID is the same as the original network ID but with a new subnet mask: 205.5.4.0/27</li>
<li>We determined our block value is by 32 in the fourth octet</li>
<ul>
<li>Therefore our second subnet would be: 202.5.4.32/27, </li>
<li>Third: 202.5.4.64/27</li>
<li>Fourth: 202.5.4.92/27</li>
<li>Fifth: 202.5.4.128/27</li>
<li>Sixth: 202.5.4.160/27</li>
<li>Seventh: 202.5.4.192/27</li>
<li>and finally Eighth: 202.5.4.224/27</li>
</ul>
<li>So there are the 8 subnets that each have 30 hosts per subnet, as expected! </li>
</ul>
<ul>
</ul>
<br />
Please note that if you count all of those subnets up, you have 8 of them. The amount we predicted back in step 3. Great job!<br />
<br />
More subnetting examples and practice to come:<br />
Keep practicing - here are some random subnetting question generators:<br />
<a href="http://david.clauss.us/Subneting/" target="_blank">http://david.clauss.us/Subneting/</a><br />
<a href="http://www.subnettingquestions.com/" target="_blank">http://www.subnettingquestions.com/</a> <br />
<br />
Have fun!<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
<br />Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com3tag:blogger.com,1999:blog-5047027589469055445.post-8823900138474101062015-10-22T16:47:00.003-07:002015-10-29T14:47:32.400-07:00Resetting your Cisco Router Password via ROMMONHow to perform password recovery on your Cisco IOS router<br />
<br />
Here's the tools you will need<br />
1) Router/Switch<br />
2) Rollover cable<br />
3) Terminal Emulator Program such as Tera Term or Putty<br />
4) Knowledge of Register values<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<ol>
<li>Connect the rollover cable's RJ-45 interface to your device and the serial or USB interface into to your computer</li>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaMVcMsop18FUuIXYf4dOebBcuvCkR4KeBcqxhsygbQ73LQmcdt0JtD2mUSTQOl9WAaPeBkLwrLI2G5Jvy5VYLQn4l7EZ1I6wjeHejgyHSTBubiCUrXdeat5Nk5qWGBJNo7xkPk4NvNz9p/s1600/Cable_rollover_-_Conexi%25C3%25B3n.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaMVcMsop18FUuIXYf4dOebBcuvCkR4KeBcqxhsygbQ73LQmcdt0JtD2mUSTQOl9WAaPeBkLwrLI2G5Jvy5VYLQn4l7EZ1I6wjeHejgyHSTBubiCUrXdeat5Nk5qWGBJNo7xkPk4NvNz9p/s640/Cable_rollover_-_Conexi%25C3%25B3n.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Picture thanks to: <a href="https://es.wikibooks.org/wiki/Planificaci%C3%B3n_y_Administraci%C3%B3n_de_Redes/Tema_6/Texto_completo">https://es.wikibooks.org/wiki/Planificaci%C3%B3n_y_Administraci%C3%B3n_de_Redes/Tema_6/Texto_complete</a></td></tr>
</tbody></table>
<li>Fire up your terminal emulator</li>
<li>Connect to the appropriate COM port (remember the appropriate serial settings)</li>
<ul>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPDFhUIIwWCUmyBk0Y9jOgZklQg1xpEBvB6ktPBJO13NhqjBdWMKW3p5Xdf4pzJKLIm3-h4GLS2na2EkhjXNML14QO1lTOvdGfqBdd4_IIoK7pb25Fxe9KlWy3ug4kBOjCLEaGOTcvC5q_/s1600/SelectSerial.PNG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="116" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPDFhUIIwWCUmyBk0Y9jOgZklQg1xpEBvB6ktPBJO13NhqjBdWMKW3p5Xdf4pzJKLIm3-h4GLS2na2EkhjXNML14QO1lTOvdGfqBdd4_IIoK7pb25Fxe9KlWy3ug4kBOjCLEaGOTcvC5q_/s200/SelectSerial.PNG" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJrrmq1zubkEI18q1pbMK8BWELEMj7BqtRoOhZG3PlVW3-K-4XycJUgcgIjaN3BvtQP3jPV4Eia9u66eIvifVgNYrqHgosVAjkrH8_j1OyUsYZCTOCmd_4ddTu5MmBEoXCwwRlgbHxLv_-/s1600/SerialConfiginTeraTerm.PNG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;">
<img border="0" height="163" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJrrmq1zubkEI18q1pbMK8BWELEMj7BqtRoOhZG3PlVW3-K-4XycJUgcgIjaN3BvtQP3jPV4Eia9u66eIvifVgNYrqHgosVAjkrH8_j1OyUsYZCTOCmd_4ddTu5MmBEoXCwwRlgbHxLv_-/s200/SerialConfiginTeraTerm.PNG" width="200" /></a>
<li><strong>9600 baud rate </strong></li>
<li><strong>No parity </strong></li>
<li><strong>8 data bits </strong></li>
<li><strong>1 stop bit </strong></li>
<li><strong>No flow control</strong> </li>
</ul>
<li>Reboot the Router</li>
<li>Send the break signal to the Router - the keystroke to signal break varies by terminal emulator</li>
<ul>
<li><strong>PUTTY: Ctrl + Break</strong></li>
<li><strong>Tera Term: Alt + B</strong></li>
<li><strong>The List: </strong><a href="http://www.cisco.com/c/en/us/support/docs/routers/10000-series-routers/12818-61.html">http://www.cisco.com/c/en/us/support/docs/routers/10000-series-routers/12818-61.html</a></li>
</ul>
<li>The break signal drops you into ROMMON mode instead of booting the IOS in this low level mode (kind of like booting to BIOS/CMOS on a desktop) you get different options such as configuring the boot register (like changing the boot order or hardware in BIOS)</li>
<li>To tell the system to boot normally, except without loading the startup configuration type: </li>
<ul>
<li><span style="background-color: #ead1dc; color: blue; font-family: "Courier New", Courier, monospace;">ROMMON>confreg 0x2142</span></li>
</ul>
<li>To reboot type: </li>
<ul>
<li><span style="background-color: #ead1dc; color: blue; font-family: "Courier New", Courier, monospace;">ROMMON>reset</span></li>
</ul>
<li>When the system boots you may be prompted to configure setup using the prompts - if so type:</li>
<ul>
<li><strong><span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">no</span></strong></li>
</ul>
<li>You have an un-configured system - log on by typing: </li>
<ul>
<li><span style="background-color: white; color: blue;"><span style="font-family: "Courier New", Courier, monospace;">Router#enable</span></span></li>
</ul>
<li>Now load your startup configuration by typing: </li>
<ul>
<li><span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Router#copy start run</span> </li>
<li><strong>(DO NOT DO THE OPPOSITE (copy run start) OR YOU WILL LOSE THE STARTUP CONFIG!!!)</strong></li>
<li>Yes, I did that once. Thank God for TFTP backups.
</li>
</ul>
<li>Now your configuration has loaded but you're already in, without having to have typed the official password! Sneaky! Now you can set the password to access privileged mode by typing: </li>
<ul>
<li><span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Router#conf t</span></li>
<li><span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Router(config)#enable secret <enter your secret here></span> </li>
</ul>
<li>Reset the device to boot normally instead of skipping the startup config by typing: </li>
<ul>
<li><span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Router(config)#config-register 0x2102 </span></li>
<span style="font-family: "Courier New", Courier, monospace;">
</span>
<li><span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Router(config)#end</span></li>
</ul>
<li>Backup your current configuration to survive rebooting by typing:</li>
<ul>
<li><span style="color: blue;"><span style="background-color: white;"><span style="font-family: "Courier New", Courier, monospace;">Router#copy run start</span> </span></span></li>
<li>(if you type the opposite you will lose all your hard work and it will revert to the unknown secret)</li>
</ul>
<li>Reboot the device to prove correct configuration and trigger all interfaces to return to an up / up status by typing </li>
<ul>
<li><span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Router#Reload</span></li>
</ul>
</ol>
And that's how I get into all those systems where no one knows the password because it was set by a contractor who emailed the password to the guy who quit six months ago!<br />
<br />
Hope it helps!<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
<br />
<ol>
</ol>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-59334403144902082742015-10-22T15:51:00.000-07:002015-10-29T14:47:32.393-07:00Cisco Spanning Tree Portfast and BPDUGuardThere are two powerful tools available for those of us (the majority I believe) that are still relying on Spanning Tree Protocol (STP) for our switch loop protection. They are Portfast! and BPDUGuard! (Don't the sound impressive with those exclamation points?)<br />
<br />
<h2>
Portfast!</h2>
Enabling PortFast on a switchport skips the listening and learning states when a device is plugged in (you know, that annoying wait time with the amber light?). From an STP perspective the port is set to a forwarding state immediately, This works out great for most accessthat are trustworthy to be connected only to a <em>single </em>device such as a server or workstation<br />
<br />
Here are a couple of key commands related to basic portfast:<br />
<br />
To <strong>globally </strong>set PortFast on all NON-Trunking ports:<br />
<span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Switch (config)#spanning-tree portfast default</span><br />
<br />
To locally set PortFast on a particular interface:<br />
<span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Switch (config-if)#spanning-tree portfast</span><br />
<br />
<h2>
BPDUGuard!</h2>
PortFast is designed for access ports that do not receive Switch to Switch BPDU packets from STP. It is possible to have non-trunking ports that connect two switches, however, which can then cause spanning tree loops. With BPDUGuard enabled on top of PortFast the receipt of a BPDU packet over a PortFast interface triggers the port to move into an err-disabled state instead of configuring the port in an STP blocking port configuration which would look like this:<br />
<span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Switch#show interfaces gigabitethernet 1/1 status</span><br />
<span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Port Name Status Vlan Duplex Speed Type</span><br />
<div>
<span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Gi1/1 err-disabled 100 full 1000 1000BaseSX</span></div>
<br />
This security measure then leads a network administrator to either:<br />
a) unplug the switch from this port and move it to a correct port<br />
b) change the port to a trunking port rather than an access port so that STP can function normally<br />
<br />
Here are a couple of key commands related to basic BPDUGuard:<br />
<br />
To <strong>globally </strong>set BPDUGuard on all NON-Trunking ports:<br />
<span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Switch (config)#spanning-tree portfast bpduguard default</span><br />
<br />
To locally set BPDUGuard on a particular interface:<br />
<span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Switch (config-if)#spanning-tree bpduguard enable</span><br />
<br />
To recover from the err-disabled state:<br />
<span style="background-color: white; color: blue; font-family: "Courier New", Courier, monospace;">Switch(config-if)#spanning-tree portfast disable</span><br />
<br />
<h2>
TestTakers!</h2>
<ol>
<li>Note the similarities and differences between the PortFast and BPDUGuard commands</li>
<li>Consider the order in which you would set them (Portfast first!)</li>
<li>Recognize Err-Disabled as a possibly a BPDUGuard issue</li>
</ol>
Err-Disabled triggers include:<br />
<ul>
<li>BPDU guard violation</li>
<li>Duplex mismatch</li>
<li>Port channel misconfiguration</li>
<li>UniDirectional Link Detection (UDLD) condition</li>
<li>Late-collision detection</li>
<li>Link-flap detection</li>
<li>Security violation</li>
<li>Port Aggregation Protocol (PAgP) flap</li>
<li>Layer 2 Tunneling Protocol (L2TP) guard</li>
<li>DHCP snooping rate-limit</li>
<li>Incorrect GBIC / Small Form-Factor Pluggable (SFP) module or cable</li>
<li>Address Resolution Protocol (ARP) inspection</li>
<li>Inline power</li>
</ul>
Hope that keeps it all straight in your head!<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com1tag:blogger.com,1999:blog-5047027589469055445.post-10243194848260060482015-10-21T16:04:00.004-07:002015-10-29T14:47:32.380-07:00Understanding Recursive Lookups in Cisco routing tables<br />
First, the term "<b>Recursive</b>"<br />
<br />
While recursion can just refer generically to repetition, the term in Information Systems and Technology contexts almost always refers to using a tool to enable the use of the same tool. Think of using a mirror to reflect a mirror (an example of infinite recursion).<br />
<b>Examples: </b><br />
<br />
1) A DNS server receives a DNS query for which it doesn't know the answer. It performs recursion by sending it's own DNS query to root DNS server to discover the answer for the client.<br />
<br />
<ul>
<li>DNS uses DNS to answer DNS.</li>
</ul>
<br />
<br />
2) In a Microsoft SQL database server there is a database called Master that is recursively used by SQL to find and reference the high level properties of all the other attached databases that are used by end-users.<br />
<br />
<ul>
<li>SQL uses SQL to manage SQL.</li>
</ul>
<br />
<br />
Now for understanding Cisco routing recursion:<br />
<br />
A <b>Recursive lookup</b> refers to routes for which the router must look up the connected route to a next-hop gateway in order to route the packet to its ultimate destination.<br />
<br />
<ul>
<li>The Router uses Routes to </li>
<ul>
<li>a) find the next router in the route path and </li>
<li>b) to Route to the next Router</li>
</ul>
</ul>
<br />
This is because in a routing table the gateway for a routed network can be defined as an interface or as an IP address.<br />
<br />
Using an interface works great when the router is referring to directly connected routes like this:<br />
<span style="background-color: white; color: blue; font-family: 'Courier New', Courier, monospace;">Router4#show ip route</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">Gateway of last resort is not set</span><br />
<span style="background-color: white; font-family: Courier New, Courier, monospace;"><br /></span>
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;"> 172.16.0.0/30 is subnetted, 1 subnets</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">C 172.16.100.0 is directly connected, <b>Serial0/0</b></span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">C 192.168.1.0/24 is directly connected, <b>FastEthernet0/0 </b></span><br />
<span style="font-family: Courier New, Courier, monospace;"><br /></span>
or to point-to-point links in which there is only one possible intended destination:<br />
<br />
<span style="background-color: white; font-family: 'Courier New', Courier, monospace;"><span style="color: blue;">Router5(config)#ip route 192.168.0.0 255.255.0.0 <b>se 0/0</b></span></span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">Router5(config)#end</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">%SYS-5-CONFIG_I: Configured from console by console</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">Router5#show ip route</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;"><br /></span>
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">Gateway of last resort is not set</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;"><br /></span>
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;"> 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">C 172.16.1.0/24 is directly connected, FastEthernet0/0</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">C 172.16.100.0/30 is directly connected, Serial0/0</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">S 192.168.0.0/16 is directly connected,<b> Serial0/0</b></span><br />
<br />
However, routes that reference an endpoint on multi-access networks like Ethernet or Frame Relay need a logical destination, since the physical interface could connect to many devices. This is where we see our standard routing entries that indicate an IP address as the gateway value:<br />
<br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">Router4(config)#ip route 172.16.1.0 255.255.255.0 <b>172.16.100.1</b></span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">Router4(config)#end</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">%SYS-5-CONFIG_I: Configured from console by console</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">Router4#show ip route</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;"><br /></span>
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">Gateway of last resort is not set</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;"><br /></span>
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;"> 172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">S 172.16.1.0/24 [1/0] <b>via 172.16.100.1</b></span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">C 172.16.100.0/30 is directly connected, Serial0/0</span><br />
<span style="background-color: white; color: blue; font-family: Courier New, Courier, monospace;">C 192.168.1.0/24 is directly connected, FastEthernet0/0</span><br />
<br />
So now you need to think like a router<br />
1) You receive an incoming packet destined for 172.16.1.5<br />
2) You find that the best route is the static route 172.16.1.0/24 (remember to always choose the longest subnet mask / slash notation that is a match)<br />
3) You discover the gateway for that route is 172.16.100.1<br />
4) As a router, you have multiple interfaces. Which one should you use to contact 172.16.100.1?<br />
5) You look up 172.16.100.1 in the routing table<br />
6) You find that the best route is the connected route 172.16.100.0/30<br />
7) You forward the packet over the Serial 0/0 interface<br />
<br />
You just used your routing table to figure out how to route the packet to the gateway you found in your routing table - Recursion!!!<br />
<br />
Test Tip: Watch out for how this could apply to a gateway of last resort - your 0.0.0.0/0 route!<br />
<br />
Hope this helps clear things up for everyone!<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
<br />Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-24117192214664182412015-10-19T18:14:00.002-07:002015-10-19T18:15:25.668-07:00Majorbacon's take on cloud computing<h2>
<span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">According to NIST, Cloud computing is:</span></span></span></span></span></span></h2>
<span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: black;"><span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">"a model for enabling <span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;">ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources <span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;">such as networks, servers, storage, applications, and services. The services can be rapidly provisioned and <span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;">released with minimal management effort or service provider interaction."</span></span></span></span></span></span></span></span></span></span></span><br />
<span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;"></span></span></span></span></span></span></span></span></span></span><br />
<span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;">NIST further defines cloud computing with 5 characteristics, 3 service models, and 4 deployment models</span></span></span></span></span></span></span></span></span></span><br />
<h2>
<span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-size: 11pt; font-style: normal; font-variant: normal;"><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
</div>
<div class="Apple-interchange-newline">
<span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">NIST says that cloud computing can be recognized by the following characteristics:</span></div>
</span></span></span></span></span></span></h2>
<ul>
<li><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">On-demand self-service</span></span></span></span></span></span></li>
<li><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">Broad network access</span></span></span></span></span></span></li>
<li><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">Resource pooling</span></span></span></span></span></span></li>
<li><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">Rapid elasticity</span></span></span></span></span></span></li>
<li><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">Measured service</span></span></span></span></span></span></li>
</ul>
<span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><em>Or, to put it another way, Cloud computing is what I want, when I want it, where I want it, and yes I want fries with it!</em></span><br />
<span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"> </span><br />
<span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">To support cloud computing, organizations lean on reliable datacenters that provide agile resource allocations through abstractions. Cloud customers don't need to know what the wires and servers behind the scenes look like. Each cloud customer is carved a piece of the datacenter pie that appears to be an isolated silo of data. Behind the scenes, however, what they are using may be several resources lumped together, and those resources may be shared between multiple customers. This is where the analogy of "tenants" comes in, where you have a landlord renting space to multiple tenants who each have their own key to their apartment, but are really using the apartment owner's space. If an apartment owner wants to knock out a wall and make one large apartment out of two smaller ones, he certainly could.</span><br />
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"> </span></div>
<h2 style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: blue; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><strong>NIST defines three models of resource allocation through the cloud methodology:</strong></span></h2>
<ul>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><strong>IaaS</strong> <strong>(Infrastructure as a Service):</strong> virtualized infrastructure means the raw servers and network that the tenant can then install operating systems and applications on top of. Very open ended</span></span></div>
</li>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><strong>PaaS</strong> <strong>(Platform as a Service):</strong> vitualized software platforms in which tenants can develop applications</span></span></div>
</li>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><strong>SaaS (Software as a Service):</strong> virtualized applications that are available to the tenant using the cloud model</span></span></div>
</li>
</ul>
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="font-family: Arial;">Each of these is really abstracting more and more. Infrastructure abstracts only the hardware. Platform abstracts the underlying operating system environment. Software abstracts even the platform so that all you work with is the software.</span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-U4EqpietgOg5axlQMXcbvecH-yKDtnG16xMJVNkFHqatOh940pVXeRGMe0fSTSYozx0g7ewIhSzcIszt2ZFXSUqdVGy7AJrsCm0A7CwkJoJ1PHnILngMYN_pj7FvGd3WU1aoZ0C8YZyx/s1600/AsAService.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="309" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-U4EqpietgOg5axlQMXcbvecH-yKDtnG16xMJVNkFHqatOh940pVXeRGMe0fSTSYozx0g7ewIhSzcIszt2ZFXSUqdVGy7AJrsCm0A7CwkJoJ1PHnILngMYN_pj7FvGd3WU1aoZ0C8YZyx/s320/AsAService.PNG" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Each form of "As-a-service" builds on the one before it</td></tr>
</tbody></table>
<span style="font-family: Arial;"></span><br />
<br />
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">Major cloud vendors have also put out another model:</span></div>
<span style="color: black;"></span><br />
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<ul><span style="color: black;">
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><strong>XaaS (Anything or Everything as a Service):</strong> Cloud based services under the big three above that are more specific in nature:</span></span></div>
</li>
<ul>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">Storage as a Service (Doesn't get to be SaaS because that's already taken: Cloud based data storage</span></div>
</li>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">DRaaS (Data Recovery as a Service): Backup/Restore solutions via the cloud</span></div>
</li>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">UCaaS (Unified Communication as a Service - voice/video/chat</span></div>
</li>
</ul>
</span></ul>
</div>
<span style="color: black;">
</span><br />
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"> </span></div>
<div class="MsoNormal" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; margin: 0in 0in 8pt; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="font-family: "Calibri Light",sans-serif; line-height: 107%; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">All of these models have the following characteristics:<o:p></o:p></span></span></span></div>
<ul>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><span style="color: black;">
</span><span style="color: black;">Low <span style="color: windowtext; text-decoration: none; text-underline: none;">barriers to entry</span> make "as a Service" offering appealing to small and medium sized businesses<o:p></o:p></span></span></div>
</li>
</ul>
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<ul><ul>
<li><div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="font-family: "Calibri Light",sans-serif; line-height: 107%; mso-ascii-theme-font: major-latin; mso-bidi-font-family: Arial; mso-hansi-theme-font: major-latin;"><span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">Simple Infrastructure - tenants need little other than an internet connection<o:p></o:p></span></span></span></div>
</li>
<li><div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><span style="color: windowtext; text-decoration: none; text-underline: none;">Device independence</span><a href="https://simple.wikipedia.org/wiki/Everything_as_a_service#cite_note-yarmis-1"><span style="color: windowtext; text-decoration: none; text-underline: none;"> -</span></a> most cloud technologies are available for access across a wide array of operating systems and devices<o:p></o:p></span></span></div>
</li>
<li><div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">Location independence - remote access is assumed in these models <o:p></o:p></span></span></div>
</li>
<li><div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">Low <span style="color: windowtext; text-decoration: none; text-underline: none;">capital expenditure</span> - as infrastructure is owned by the provider.<o:p></o:p></span></span></div>
</li>
</ul>
<li><div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">S<span style="color: windowtext; text-decoration: none; text-underline: none;">calability</span> allows growth and large corporations to utilize datacenter scale technologies<o:p></o:p></span></span></div>
</li>
<li><div class="MsoNormal" style="margin: 0in 0in 8pt;">
<span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"><span style="color: windowtext; text-decoration: none; text-underline: none;">Multitenancy</span> enables the provider to allocate resources amongst many users without them being aware of their coexistence.</span></span></div>
</li>
</ul>
</div>
<span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">
</span><br />
<h2 style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: blue;"><strong>NIST defines the following Deployment Models:</strong></span></h2>
<ul>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="font-family: Arial;"><strong>Public Cloud: </strong>Any of the "as-a-service" models deployed for public consumption (usually for a subscription fee)</span></div>
</li>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="font-family: Arial;"><strong>Private Cloud: </strong>Any of the "as a service" models deployed for intra-business use only (ie, you have access to your resources or software from anywhere, any device, etc., but only as long as you are an employee, because the infrastructure is managed by the business)</span></div>
</li>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="font-family: Arial;"><strong>Community Cloud: </strong>Think of it as a shared private cloud, or a limited public cloud. Governments or Universities, for example collaborating together with shared "as-a-service" resources and infrastructure that only they can access.</span></div>
</li>
<li><div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="font-family: Arial;"><strong>Hybrid Cloud: </strong>A company may choose to deploy their own private cloud infrastructure for some resources that need to follow a compliance model dictated by regulation, but also partake of public cloud subscriptions that are available. This conglomerate would be known as a Hybrid cloud.</span></div>
</li>
</ul>
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;"> </span></div>
<div style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black; font-family: SymbolMT; font-style: normal; font-variant: normal;"><span style="color: black;"><span style="font-family: "Helvetica Neue", Arial, Helvetica, sans-serif;">• <span style="color: black; font-family: TimesNewRomanPS-ItalicMT; font-style: normal; font-variant: normal;"><i>The NIST Definition of Cloud</i><span style="color: black; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;">: <span style="color: blue; font-family: TimesNewRomanPSMT; font-style: normal; font-variant: normal;"><a href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf">http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf</a></span></span></span></span></span></span></span></div>
</div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-56387616572101790462015-10-19T17:59:00.003-07:002015-10-19T18:00:27.076-07:00There's a recycle bin for your Site Collection! Thank you PowerShellAs a SharePoint infrastructure administrator, I'm all about being able to delegate the ability to manage site collections to the users that really care about the data in that site. HOWEVER, sometimes even the most well intentioned site collection administrator may do the unthinkable and delete their own site collection and all the sub-sites within! If that happens in SharePoint 2013, however, you have no need to panic. Because you get to have one of these:<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUVRS_gb6Ww5E4kpomwHUM9Pl3ZwsR1OWo29rst01FmH0-gfWN_JTfDIruDSotzKH6mNxRJZE-q6FNJQddjxQc6Gz_4Fp4cjoagxUJ8geqrpSm9IbJNM7EP8zvI3_45MRTafVKJ5VgONfH/s1600/recycleBin.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUVRS_gb6Ww5E4kpomwHUM9Pl3ZwsR1OWo29rst01FmH0-gfWN_JTfDIruDSotzKH6mNxRJZE-q6FNJQddjxQc6Gz_4Fp4cjoagxUJ8geqrpSm9IbJNM7EP8zvI3_45MRTafVKJ5VgONfH/s200/recycleBin.png" width="191" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">You get to go dumpster diving in a SharePoint Site Collection Recycle Bin!</td></tr>
</tbody></table>
But wait, you say, how do I get to this recycle bin when the normal way to access the recycle bin is a that Site collection Root, which I just deleted? The answer is... you guessed it, PowerShell!<br />
<br />
Since the recycle bin is really maintained at the database level your site collection is still available for recovery, it is just a matter of using the right commands to undelete your site collection!<br />
<br />
It's going to be a one-two punch. <br />
1) Get your deleted site collection ID<br />
2) Restore the deleted site collection<br />
<br />
<span id="DeltaPlaceHolderMain"><span style="font-family: courier;">1) Get-SPDeletedSite | Select Path, SiteID</span><br />
<span style="font-family: courier;"></span><br />
<span style="font-family: courier;"><span style="font-family: inherit;">This will give you a list all the deleted site collections with their site collection ID values</span></span><br />
</span><div class="separator" style="clear: both; text-align: center;">
<span id="DeltaPlaceHolderMain"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Rh7C-hmfxew-qRdt-ZmtOIPXY0LvSoHMpBQ4mFAjgNNeEK9ajrqA6LfUxqCtUKwNcAapZ_rO0hyphenhyphenZZSlyXJrg9uzX1gLZXiF5OSJN3nqC5wy52OE5iZihjazGlk2iMKvcWvzag251hZHB/s1600/siteRecycleBinList.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="121" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Rh7C-hmfxew-qRdt-ZmtOIPXY0LvSoHMpBQ4mFAjgNNeEK9ajrqA6LfUxqCtUKwNcAapZ_rO0hyphenhyphenZZSlyXJrg9uzX1gLZXiF5OSJN3nqC5wy52OE5iZihjazGlk2iMKvcWvzag251hZHB/s640/siteRecycleBinList.png" width="640" /></a></span></div>
<span id="DeltaPlaceHolderMain">
<br />
<span style="font-family: courier;">2) <span style="font-family: "Courier New", Courier, monospace;">Restore-SPDeletedSite -identity 4bfa0e0c-4e34-3b2a-9134-a23b13ababe1</span><br />
<br /><span style="font-family: Times New Roman;">
The second command will restore the site collection and all subwebs from the recycle bin - no DBAs need to be awakened from their slumber!</span><br />
<span style="font-family: Times New Roman;"></span><br />
<span style="font-family: Times New Roman;">Happy restoring!</span><br />
<span style="font-family: Times New Roman;"></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
</span><br />
<span style="font-family: courier;"></span><br />
<em><br />
</em></span><br />Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-86829205940182050712015-10-19T15:26:00.001-07:002015-10-20T13:08:34.777-07:00SharePoint correlation IDs don't have to drive you crazy!I have a serious love / hate relationship with SharePoint correlation IDs. You know - the ones that tell you that there was an error but are otherwise not very informative?<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSBq_PdtM1js1abamNItdTGLPNVWAGcc3nTEAh1sQYfduo0q0Q7marsHcJx5yg8CEuJHCJQoYnivbj3xy7dHPNLStrT5u6WRGZgc0IM3UCmwDxHy2lblJWcZxL57OMhcE9_5byFRvLbDZv/s1600/correlationID.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSBq_PdtM1js1abamNItdTGLPNVWAGcc3nTEAh1sQYfduo0q0Q7marsHcJx5yg8CEuJHCJQoYnivbj3xy7dHPNLStrT5u6WRGZgc0IM3UCmwDxHy2lblJWcZxL57OMhcE9_5byFRvLbDZv/s640/correlationID.png" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">example of SharePoint 2013 Correlation ID</td></tr>
</tbody></table>
The beauty of Correlation IDs is that it you are given a reference point to track down log entries of relevance. Remember, it's not an error code, it is what it says it is - a correlation ID - a tool to grab related events in the log to get a better picture of why something failed and had to show you an on-screen error message!<br />
<br />
You can use a Microsoft's now official (it used to be on CodePlex) <a href="http://www.microsoft.com/en-us/download/details.aspx?id=44020" target="_blank">Unified Log Service (ULS) Viewer</a> to view the logs and even search by correlation ID, but you can also just fire up a SharePoint enabled PowerShell prompt and use <strong>Merge-SPlogfile </strong>to get the information faster!<br />
<strong></strong><br />
This simple PowerShell cmdlet will allow you to search all the farm servers and find any instances of the correlation ID and show you the issues!<br />
For example, to grab all of the events with the correlation ID in the graphic above and place the results in a text file instead of dumping on screen I would use the following command:<br />
<span id="DeltaPlaceHolderMain"></span><br />
<span id="DeltaPlaceHolderMain"><span class="ms-rteFontFace-2" style="font-family: Courier New, Courier, monospace;">Merge-SPlogfile –Path c:\Mergelog.txt –Correlation 3410f29b-b756-694c-7a574ff74cab</span></span><br />
<span class="ms-rteFontFace-2" style="font-family: Courier New, Courier, monospace;"><br /></span>
<span id="DeltaPlaceHolderMain">
</span>
<br />
For example, just today I just was getting an error when viewing content based on an external data type and received a correlation ID type error with little information in the error itself.<br />
<br />
I ran the above command then opened excel and used the data tab in the ribbon to get external data from a text file and chose Tab Delimited. Then I formatted the results as a table and hid a few columns I'm not interested in.<br />
<br />
The results looked like this:<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp7HALOdmBU00neTtcxehcWo-HyYei9K0c5-XHqyNVFeF_K4z-oGlgUvuU8S89zVFyasaQhLR8sQtfucNQly8y0bt8aAbVD5g9xvcOWeNCuDv8IPxt7TM_MtniyK5dopYtd4i2E15Giph7/s1600/correlationIDfromMerge.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp7HALOdmBU00neTtcxehcWo-HyYei9K0c5-XHqyNVFeF_K4z-oGlgUvuU8S89zVFyasaQhLR8sQtfucNQly8y0bt8aAbVD5g9xvcOWeNCuDv8IPxt7TM_MtniyK5dopYtd4i2E15Giph7/s640/correlationIDfromMerge.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Click to see larger</td></tr>
</tbody></table>
<br />
As you can see, the correlation ID is the same for all results (that's the point) so as I troll through the results I see things like error in the execution of the web part (true) and an Access Denied message from the secure store - and this was my problem, my user account hadn't been mapped to be able to use the secure store target application ID!<br />
<br />
Let me know if this worked for you or if you have any questions! Happy searching!
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-74350210855056082752015-08-12T16:32:00.000-07:002015-08-12T16:32:04.661-07:00New stuff in o365: Videos, Delve, and Sway!<div style="text-align: left;">
</div>
<div class="MsoNormal" style="margin: 0in 0in 0pt; text-align: left;">
Microsoft has added several new tools in Office 365 that are powerful, easy to use, and all cloud all the time:</div>
<div class="MsoNormal" style="margin: 0in 0in 0pt; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGp-gBYiX_EmErWbq1F-U0fZnfDMcid1UtqOG5_ay1pAe9_A9Yrs6u8go2QGCAQeUQyYjphj-Jx9AHtX3xc2oc30apeGE1GYk0Vf-bTf8kqDV27HI0QvMQg9BURtP1cS7qheI8b1RFeOBP/s1600/new0365Stuff.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="276" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGp-gBYiX_EmErWbq1F-U0fZnfDMcid1UtqOG5_ay1pAe9_A9Yrs6u8go2QGCAQeUQyYjphj-Jx9AHtX3xc2oc30apeGE1GYk0Vf-bTf8kqDV27HI0QvMQg9BURtP1cS7qheI8b1RFeOBP/s640/new0365Stuff.png" width="640" /></a></div>
<div style="text-align: left;">
First, there is Office 365 <strong>Video</strong>. Basically think of this as your "tube" for your business content that you want to promote:</div>
<div style="text-align: left;">
<table align="left" cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtK6K9Ip-xQHk-tHqHkY8pM3m8fdli3B2huE0cGEg8WYfvcr2kHqN7YVOpoG98b74F5Si0VfWL5NrfYGGNnjhSzWm_WpS2sMmeNl99eKfeV7JUrSz8LMhLm9uiBzpgAeSiiFhfSHmKzZPT/s1600/o365Videos.png" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="348" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtK6K9Ip-xQHk-tHqHkY8pM3m8fdli3B2huE0cGEg8WYfvcr2kHqN7YVOpoG98b74F5Si0VfWL5NrfYGGNnjhSzWm_WpS2sMmeNl99eKfeV7JUrSz8LMhLm9uiBzpgAeSiiFhfSHmKzZPT/s640/o365Videos.png" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Microsoft Office 365 Video</td></tr>
</tbody></table>
</div>
<div style="clear: both; text-align: left;">
Then there is <strong>Delve</strong>. This is a visual search tool that brings you lots of preview for whatever you are searching for. The search content will come from the o365 sites and your OneDrive for Business account.</div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMmSXnQQrggbAE2iIjZ-lSztpOX6R85J69-8u1SrnCHt0Ib_2TFY1dzB_Nlx0lkbyn0JCAGWGdNgezTEGiTMUdr2f6Fft9XXjhOPsISFhA4nhGmXOo-em7DfmmKaFQvPZHkHkAF-mQgY_d/s1600/o365Delve.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMmSXnQQrggbAE2iIjZ-lSztpOX6R85J69-8u1SrnCHt0Ib_2TFY1dzB_Nlx0lkbyn0JCAGWGdNgezTEGiTMUdr2f6Fft9XXjhOPsISFhA4nhGmXOo-em7DfmmKaFQvPZHkHkAF-mQgY_d/s640/o365Delve.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Microsoft Office 365 Delve</td></tr>
</tbody></table>
<div style="text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: left;">
And finally we have <strong>Sway</strong>. This will actually take you to sway.com (which still has the o365 tiles in the corner) where you can build an cloud hosted HTML5 based presentation from scratch, or import a Word, PowerPoint, or PDF file that will be rendered into the new format. This format looks good for building presentations that are perfect in mobile displays of various sizes.</div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguLyNg5rQrDQtkbgPKxSx29fXsdvksu1DTbsAiOWDC1610GQdKR2CGe6GNT5R5bdD53Zs51Hb6nOB8Q-QWsqE9Ooj5kTdt39AHhOhy-ZwodBFMiBLLJDNl_7ddO64QOpd3hFuonp-3sRxp/s1600/o365Sway.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="348" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguLyNg5rQrDQtkbgPKxSx29fXsdvksu1DTbsAiOWDC1610GQdKR2CGe6GNT5R5bdD53Zs51Hb6nOB8Q-QWsqE9Ooj5kTdt39AHhOhy-ZwodBFMiBLLJDNl_7ddO64QOpd3hFuonp-3sRxp/s640/o365Sway.jpg" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Microsoft Office 365 Sway</td></tr>
</tbody></table>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<div class="MsoNormal" style="margin: 0in 0in 0pt; text-align: left;">
I found all of these tools very easy to jump into and use, with good documentation and tutorials where needed. What have you thought about these tools?</div>
<div class="MsoNormal" style="margin: 0in 0in 0pt; text-align: left;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
<div class="MsoNormal" style="margin: 0in 0in 0pt; text-align: left;">
</div>
<div style="text-align: left;">
</div>
<div style="text-align: left;">
</div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-5228088813658267572015-06-18T13:42:00.000-07:002015-06-18T13:58:16.472-07:00VMware vSphere Reservations Shares Limits and Resource PoolsVMware gives us several tools to manage Memory and CPU resources on a host or cluster. It can be confusing to understand how to manage them, so let's look at them systematically.<br />
<br />
<h2>
Reservations:</h2>
A reservation is an <i>absolute guarantee </i>of memory or CPU for a virtual machine or a resource pool. Reservation assignments are measured in specific Megabytes (MB) of memory or Gigahertz (Ghz) of CPU. When are Reservations relevant? When you must provide an absolute minimum guarantee of resources for a particular application to run (or run well).<br />
<br />
Example:64 GB of RAM available on a host<br />
VM1: 11 GB Reservation<br />
VM2: 13 GB Reservation<br />
Remaining: 40 GB for all other VMs<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnb7clke0TYwAlYK9wzfWCecCNEpjwstQVuqpTL_xw-ag6D1cnEEXzJN0RwMlJTIcX3a_PVLx_w3n70dAQVdFmvBAVrZtzD2uV3B-EM9EI36Zfil8x-tvvIORCVS1tEoVzBbp5U8mOKmUo/s1600/reservationgraph1.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="457" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnb7clke0TYwAlYK9wzfWCecCNEpjwstQVuqpTL_xw-ag6D1cnEEXzJN0RwMlJTIcX3a_PVLx_w3n70dAQVdFmvBAVrZtzD2uV3B-EM9EI36Zfil8x-tvvIORCVS1tEoVzBbp5U8mOKmUo/s640/reservationgraph1.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Carving out resources with Reservations</td></tr>
</tbody></table>
<br />
Remember that the reservation is separate from the RAM assignment of the VM. For Example, VM1 might have an assignment of 15 GB of Memory but is Reserved 11 GB. Therefore 4 GB may be allocated from VMware physical RAM or failover to swapfile capabilities. If VM2 has a 15GB assignment in addition to the 15 GB reservation then 100% of its memory is guaranteed to be allocated from physical RAM.<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOMSnZnkbwxAHK-NaaO8sfoHP6USy2kWIZ526WRAxp47JWQu2ouq-gSFoU3ECuOzZj8SnDv96edQryGBLnI1q4RS8tfuJWX8_XXZKFjekqJmOo1Rt-ONApU_dnKodzJPl36R_QTeeHI8XG/s1600/ReservationInAction.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="582" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOMSnZnkbwxAHK-NaaO8sfoHP6USy2kWIZ526WRAxp47JWQu2ouq-gSFoU3ECuOzZj8SnDv96edQryGBLnI1q4RS8tfuJWX8_XXZKFjekqJmOo1Rt-ONApU_dnKodzJPl36R_QTeeHI8XG/s640/ReservationInAction.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Memory Reservation</td></tr>
</tbody></table>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIYtKkWxUHPjrp5fZotYIuUzzop-mzQGS16rnelsT8ypPZ9mzYb4mR6KESLnfsn42JE6r7Fa9H2My256-1KwiDrAJmaZgX0Rn62BIaEXMiqVV2k3wlfjZuQJR_3Bmgwe5Wd-0dytfBHiAT/s1600/CPUReservationInAction.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIYtKkWxUHPjrp5fZotYIuUzzop-mzQGS16rnelsT8ypPZ9mzYb4mR6KESLnfsn42JE6r7Fa9H2My256-1KwiDrAJmaZgX0Rn62BIaEXMiqVV2k3wlfjZuQJR_3Bmgwe5Wd-0dytfBHiAT/s640/CPUReservationInAction.PNG" width="606" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">CPU Reservation</td></tr>
</tbody></table>
<br />
<h2>
Shares:</h2>
A Share are a <i>proportional </i>weighted assignment of memory or CPU processing power. Shares are <i>relative </i>resource assignment measured by a number of shares of Memory or CPU. Think of it like shares of stock in a company. The more shares there are, the less yours are worth in voting power.<br />
Administrators will assign top tier applications (e.g.: Database Server) more shares than lower tier applications (e.g.: FTP Server) When do shares become relevant? When you OVER-ALLOCATE resources and must balance requests for resources among several VMs.<br />
<br />
There are 4 share settings-<br />
<ul>
<li>High = 2000 shares per vCPU and/or 20 shares per MB of configured memory</li>
<li>Normal = 1000 shares per vCPU and/or 10 shares per MB of configured memory</li>
<li>Low = 500 shares per vCPU and/or 5 shares per MB of configured memory</li>
<li>Custom = configure the numeric allocation of shares for CPU or memory</li>
</ul>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitJQsPgoLWNPp_61Cc__paMtgo5H6M9eV8N676PZOE2cKL0J3yCmhnoyDwzRz2jCbZ85Ab7NJ6AhkX3ekMJ0rWH5bvZSk9z4E7YWPtBGJ_E6u9wRmxvoGxuyuE265LInfwNGbYQ45dfE86/s1600/CPUSharesInAction.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="588" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitJQsPgoLWNPp_61Cc__paMtgo5H6M9eV8N676PZOE2cKL0J3yCmhnoyDwzRz2jCbZ85Ab7NJ6AhkX3ekMJ0rWH5bvZSk9z4E7YWPtBGJ_E6u9wRmxvoGxuyuE265LInfwNGbYQ45dfE86/s640/CPUSharesInAction.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">CPU Share configuration</td></tr>
</tbody></table>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_gUXoa3Cfjf_0MmFHF-pmcn5DxCX597guTfeOwF6YthuTYtQBY5mCn-fT_SRl3sTOZnmeIUTcdEMHi7yxRLP10IZ1SC32lPs7tBLZzU2QWl7Sizdpp6wCKT3h5UjgKBsrjpmuUTRnjoy0/s1600/MemorySharesInAction.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_gUXoa3Cfjf_0MmFHF-pmcn5DxCX597guTfeOwF6YthuTYtQBY5mCn-fT_SRl3sTOZnmeIUTcdEMHi7yxRLP10IZ1SC32lPs7tBLZzU2QWl7Sizdpp6wCKT3h5UjgKBsrjpmuUTRnjoy0/s640/MemorySharesInAction.PNG" width="610" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Memory Share Configuration</td></tr>
</tbody></table>
<div>
<br /></div>
If there is no contention for available resources, Shares don't matter. For example, if there is a single shared core with 9Ghz available and each system needs 2Ghz - there's no issue. But when there is competition for resources Shares become very important. In that same single core 9Ghz host where both systems want 100% processor utilization there will have to be a division of processing labor.<br />
<br />
If both VMs have the evely distributed default share assignment of 1000, the two systems will have 50%/50% access to the vCPU. <br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtzuRc27JidSDbXJd8ZYQ2qi-jqb9-J5_PNUH3iVRKxPMxb0NPoD0ws14HiXz3tzIvdmsbKvYBlb7SM9HH2gAxs8mq_jSHXPy_2KLSCMxIcFgvLN0_XGNejwn1xl8aRdgN0TcrAn1vqqpL/s1600/balancedShares.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="376" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtzuRc27JidSDbXJd8ZYQ2qi-jqb9-J5_PNUH3iVRKxPMxb0NPoD0ws14HiXz3tzIvdmsbKvYBlb7SM9HH2gAxs8mq_jSHXPy_2KLSCMxIcFgvLN0_XGNejwn1xl8aRdgN0TcrAn1vqqpL/s400/balancedShares.PNG" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">CPU allocation under contention will be equal between VM1 and VM2</td></tr>
</tbody></table>
<br />
However, if VM1 has a is normal (1000) allocation but VM2 and another has a custom allocation of 3000 shares then when under contention VM1 will have 1000/4000 (25%) access to the resources and the other VM has 3000/4000 (75%) access to the processor.<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUCz8hRoxlSy4tub1S3anVo6Rq5neXT0UyobOcjDQqKKAh3YhPFZzEbJTGNPmdbc5zHNXrLcLS92ddmFa6YiVzmoI8PFMfAwKfIOVZ2-YYX0Kl4kzpzHMidGNBjHP_oOy95mnCgkHvI5R8/s1600/loadedShares.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="365" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUCz8hRoxlSy4tub1S3anVo6Rq5neXT0UyobOcjDQqKKAh3YhPFZzEbJTGNPmdbc5zHNXrLcLS92ddmFa6YiVzmoI8PFMfAwKfIOVZ2-YYX0Kl4kzpzHMidGNBjHP_oOy95mnCgkHvI5R8/s400/loadedShares.PNG" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">CPU allocation under contention is now tipped to give VM2 more CPU cycles</td></tr>
</tbody></table>
<br />
<h2>
Limits:</h2>
Limits are a way to prevent a VM from using available memory or CPU. It should only be used in testing and development, since it is designed to cripple a VM's performance.<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzyqDcS9OLxWv_EB1HTxa3aXE-G1THeHw9X55UTgONqviE3dWTPcfrACEBhKpF3-3WgBcn-ltqIyxH5mYHVQDTR4Ose3Frj9Ai3gWLlzis_n6IleNugWjivQIfekfGPF2UrSLk8yGa6mg_/s1600/CPULimit.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzyqDcS9OLxWv_EB1HTxa3aXE-G1THeHw9X55UTgONqviE3dWTPcfrACEBhKpF3-3WgBcn-ltqIyxH5mYHVQDTR4Ose3Frj9Ai3gWLlzis_n6IleNugWjivQIfekfGPF2UrSLk8yGa6mg_/s640/CPULimit.PNG" width="608" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">CPU Limit</td></tr>
</tbody></table>
<br />
<br />
<h2>
Resource Pools:</h2>
Resource Pools allow you to create a shared container that defines the Reservations, Shares, and Limits that apply to the group of all VMs within it. This is NOT an inheritance setting, but a (as the name implies) pool of defined resource allocation for the benefit of all who are within it.<br />
<br />
For example, if a regular reservation is like carving out an office on an unpartitioned floor of a building, a Resource Pool allocation lets you carve out an office that will be shared by more than one employee.<br />
<br />
Example:<br />
Example:64 GB of RAM available on a host<br />
VM1: 11 GB Reservation<br />
VM2: 13 GB Reservation<br />
Resource Pool (parallel to top level VMs) : 20 GB Reservation<br />
Remaining: 20 GB for all other VMs<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh45tgMtSO0pq1S3lmaM_FUcpBsJamHZncwA_sNEBNZEmUmoIZTj4aNxR2lc8y6GDpHbsWDqvkQTtFuEeZRGfd4C7-JO2P5D_RcRmP-ReeadJ0soefFMolesKDFIct1A4wDh0Dv4KdtWzCW/s1600/ResourcePoolReservationGraph.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="350" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh45tgMtSO0pq1S3lmaM_FUcpBsJamHZncwA_sNEBNZEmUmoIZTj4aNxR2lc8y6GDpHbsWDqvkQTtFuEeZRGfd4C7-JO2P5D_RcRmP-ReeadJ0soefFMolesKDFIct1A4wDh0Dv4KdtWzCW/s640/ResourcePoolReservationGraph.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Reservations with Resource Pool</td></tr>
</tbody></table>
<br />
<br />
How about if we use Resource pools in conjunction with Shares? The proportion of resources are allocated among the top tier items, whether they are VMs or Resource Pools. Then within a resource pool you provide the means of allocating the portions within.<br />
<br />
This would look something like this:<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ-wekOjU2Yfl2VFJUoVNS7zucdvlWwvxKbXv4g7wKV4IZH255ascnb2uLIYpTgIqLuTJqkkFhhG57MbVMLgbp-kWRpxfyeqRkkw-UKebHfK1ZSwyJgPI88lBdb9YEZwmzJn1U5HorLD2u/s1600/ResourcePoolSharesScales.PNG" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="556" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ-wekOjU2Yfl2VFJUoVNS7zucdvlWwvxKbXv4g7wKV4IZH255ascnb2uLIYpTgIqLuTJqkkFhhG57MbVMLgbp-kWRpxfyeqRkkw-UKebHfK1ZSwyJgPI88lBdb9YEZwmzJn1U5HorLD2u/s640/ResourcePoolSharesScales.PNG" width="640" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Shares with Resource Pools</td></tr>
</tbody></table>
<br />
Example:<br />
Two resource Pools are built, each with two VMs. Share allocations are as follows:<br />
<br />
<ul>
<li>RP1: 1000</li>
<ul>
<li>VM1: 1000</li>
<li>VM2: 3000</li>
</ul>
<li>RP2: 3000</li>
<ul>
<li>VM3: 1000</li>
<li>VM4: 3000</li>
</ul>
</ul>
<br />
So what percentage of CPU resources when the system is under stress would be allocated to the VMs?<br />
<ul>
<li>RP1: 1000 (25% of overall CPU)</li>
<ul>
<li>VM1: 1000 (25% of the 25%)</li>
<li>VM2: 3000 (75% of the 25%)</li>
</ul>
<li>RP2: 3000 (75% of overall CPU)</li>
<ul>
<li>VM3: 1000 (50% of the 75%)</li>
<li>VM4: 1000 (50% of the 75%)</li>
</ul>
</ul>
That means that if 10Ghz were available, then<br />
<ul>
<li>RP1: 2.5 Ghz (25% of CPU)</li>
<ul>
<li>VM1: .625 Ghz (25% of the 25%)</li>
<li>VM2: 1.875 Ghz (75% of the 25%)</li>
</ul>
<li>RP2: 7.5 Ghz (75% of overall CPU)</li>
<ul>
<li>VM3: 3.75 Ghz (50% of the 75%)</li>
<li>VM4: 3.75 Ghz (50% of the 75%)</li>
</ul>
</ul>
Notice that VM4 which has a share allocation of only 1000 ends up with more CPU cycles than VM2 which has a share allocation of 3000! Why? Because VM4 is in a prioritized resource pool.<br />
<br />
Just to throw another twist for you, you can nest Resource Pools - though practically you shouldn't more than a few layers deep. The principle stays the same - Your reservations will create carved out absolute allocations, your shares will load balance contended-for resources within that container relative to others, and limits will define the maximum amount of resources available.<br />
<br />
Let me know if you have any questions. Hope this helps!<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com0tag:blogger.com,1999:blog-5047027589469055445.post-19873005729358066522015-04-13T20:08:00.002-07:002015-11-30T07:35:49.666-08:00Safely Restarting Active DirectoryThe restartable AD DS service is available in Windows Server 2008 and 2012 as an alternative to rebooting into the Directory Services Restore Mode (DSRM) safe mode in order to apply updates and fully defragment or move the database files. Simply put - Active Directory Domain Services is not a server that can be started and stopped via the Services MMC or PowerShell. <br />
<br />
Warnings!<br />
<ul>
<li>This means that without rebooting you might disable AD related services such as DNS AD-Integrated Zones, FRS, or Inter-site Messaging on that server. This is why it is so important to have a <strong>Department of Redundancy Department </strong>to ensure fault tolerance in your network!</li>
<li>You cannot run DCPROMO when stopped except with /ForceRemoval</li>
</ul>
<br />
<div class="main-html-content">
Benefits:</div>
<div class="main-html-content">
<ul>
<li>Maintenance is speedier without the reboot</li>
<li>Other non-ad related services on the server can still function to support clients</li>
<li>Domain Admins can still log on to the domain controller (via another online DC) even when the local AD DS service is stopped</li>
<li>You can log on as the DSRM Safe Mode administrator, but only if you have set the registry to allow this behavior ahead of time: <strong>HKLM\System\CurrentControlSet\Control\Lsa\DSRMAdminLogonBehavior</strong> set to 1</li>
<li>Administrators can mark items for an authoritative restore</li>
</ul>
</div>
<ul>
<li>You cannot perform a system restore while the AD DS service is stopped. The system restore operation must always be executed from DSRM mode.</li>
<li>Stopping the Active Directory Domain Service will impact the ability to authenticate domain clients and Active Directory applications.</li>
</ul>
<div>
I like to stop the service (and dependencies) nicely with PowerShell:</div>
<div>
<span style="background-color: black; font-size: 15px; line-height: 21.4285488128662px;"><span style="color: white; font-family: Courier New, Courier, monospace;">$ntdsdep = get-service ntds -dependentServices</span></span></div>
<div>
<span style="background-color: black; color: white; font-family: Courier New, Courier, monospace;">stop-service $ntdsdep</span></div>
<div>
<span style="background-color: black; color: white; font-family: Courier New, Courier, monospace;">stop-service ntds</span></div>
<div>
<span style="background-color: black; color: white; font-family: Courier New, Courier, monospace;"><br /></span></div>
<div>
<span inherit="">and of course to start it...</span></div>
<div>
<div>
<span style="background-color: black; font-size: 15px; line-height: 21.4285488128662px;"><span style="color: white; font-family: Courier New, Courier, monospace;">$ntdsdep = get-service ntds -dependentServices</span></span></div>
<div>
<span style="background-color: black; color: white; font-family: Courier New, Courier, monospace;">start-service $ntdsdep</span></div>
<div>
<span style="background-color: black; color: white; font-family: Courier New, Courier, monospace;">start-service ntds</span><br />
<span style="background-color: black; color: white; font-family: Courier New, Courier, monospace;"><br /></span>
Let me know if you have any questions. Hope this helps!<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiC6Ig4wCCWCOVj3tL2b2ybWtjd5tBdMH-FETmsvIZwd8Gnn04n6imDqmKGRCy4OmVayPhxdfgtLIqjF_FfZll5fB8CXNiMjGZ7iIbBjyxxGflAe6ti8o-SacSGOFN75dSfLG-c53ilvzh-/s1600/MBLogo4.png" /></a></div>
</div>
</div>
Majorbaconhttp://www.blogger.com/profile/14252794841368827449noreply@blogger.com1