Ubuntu Linux Add Static IPv6 Address Network Configuration. ByVivek GiteonJune 19, 2009 How do I configure static IPv6 networking under Ubuntu Linux server operating systems? You need to simply edit /etc/network/interfaces file and add the IPv6 networking configuration. Here is our sample setup: Ipv6 Address IP: 2607:f0d0:2001:000a:0000:0000:0000:0010/64Ipv6 Gateway IP: 2607:f0d0:2001:000a:0000:0000:0000:0001Interface name: eth0IPv6 Type: Static WARNING! These examples are not about an IPv6 tunnel broker. This faq requires static IPv6 address which can be obtained from your network admin or ISP. Adding IPv6 To Ubuntu Systems Open /etc/network/interfaces file, enter (first login as root): $ sudo -s Make a backup and edit the file: # cp /etc/network/interfaces /etc/network/interfaces.backup # vi /etc/network/interfaces Append configuration as follows: Save and close the file.
Test IPv6 Configuration You can also run a traceroute: # traceroute6 cyberciti.biz Sample Output: Further Readings: Change Ubuntu Server from DHCP to a Static IP Address. If the Ubuntu Server installer has set your server to use DHCP, you will want to change it to a static IP address so that people can actually use it. Changing this setting without a GUI will require some text editing, but that’s classic linux, right? Let’s open up the /etc/network/interfaces file. I’m going to use vi, but you can choose a different editor sudo vi /etc/network/interfaces For the primary interface, which is usually eth0, you will see these lines: auto eth0iface eth0 inet dhcp As you can see, it’s using DHCP right now. Auto eth0iface eth0 inet static address 192.168.1.100 netmask 255.255.255.0 network 192.168.1.0 broadcast 192.168.1.255 gateway 192.168.1.1 Now we’ll need to add in the DNS settings by editing the resolv.conf file: sudo vi /etc/resolv.conf On the line ‘name server xxx.xxx.xxx.xxx’ replace the x with the IP of your name server.
You need to also remove the dhcp client for this to stick (thanks to Peter for noticing). Sudo apt-get remove dhcp-client. Configuring NTP on Windows Server 2012 | Sysadmin Lab. This article explains how to configure NTP on Windows Server 2012. If you're looking for Windows Server 2008 R2, see my article here. Remember, that in a domain environment, time synchronization is taken care of but you should configure the PDC Emulator of a domain to sync externally since that is the server which decides what time it is!
This is all you need if you want to keep it simple. Run using PowerShell as admin: w32tm /config /manualpeerlist:pool.ntp.org /syncfromflags:MANUAL Stop-Service w32time Start-Service w32time If the machine is a VM inside Hyper-V, you have to disable time sync. Open VM settings -> Management -> Integration Services and uncheck Time Synchronization. That should be it! W32tm is the command to use. Which NTP-server to use? The pool.ntp.org is a round-robin of random selected NTP servers. w32tm /config /manualpeerlist:"0.pool.ntp.org 1.pool.ntp.org" /syncfromflags:MANUAL Just keep adding them with a space in between them. Don't forget your firewall. Selected ASDM VPN Configuration Procedures for the Cisco ASA 5500 Series, Version 5.2 - Configuring L2TP over IPSec [Cisco Adaptive Security Device Manager]
Table Of Contents Configuring L2TP over IPSec L2TP Overview IPSec Transport and Tunnel Modes Configuring L2TP over IPSec Configuring L2TP over IPSec This chapter describes how to use ASDM to configure L2TP over IPSec on the security appliance, and includes the following topics: •L2TP Overview •Configuring L2TP over IPSec L2TP Overview The primary benefit of configuring L2TP with IPSec in a remote access scenario is that remote users can access a VPN over a public IP network without a gateway or a dedicated line, enabling remote access from virtually anyplace with POTS. An additional benefit is that the only client requirement for VPN access is the use of Windows 2000 with Microsoft Dial-Up Networking (DUN). No additional client software, such as Cisco VPN client software, is required. The configuration of L2TP with IPSec supports certificates using the pre-shared keys or RSA signature methods, and the use of dynamic (as opposed to static) crypto maps.
KB0000571 - Cisco ASA5500 - L2TP over IPSEC VPN. KB ID 0000571 Dtd 16/02/12 Problem When Cisco released version 7 of the operating system for PIX/ASA they dropped support for the firewall acting as a PPTP VPN device. Note: If you want to use PPTP you can still terminate PPTP VPNs on a Windows server, if you enable PPTP and GRE Passthrough on the ASA. But if you want to use the native Windows VPN client you can still use L2TP over IPSEC. I had a look around the net to work out how to do this and most decent articles are written using the older versions of the ASDM, and the CLI information I found on Cisco's site didn't help either. Bottom line: - Use the ASDM to configure L2TP VPN's, and there's so many bits you need to alter, you might as well have done it from command line anyway. What I'm using 1. 2. 3. 4. 5. 6. Solution Configure the ASA 5500 for L2TP IPSEC VPNs 1. User Access Verification Password: Type help or '? ' 2. PetesASA(config)# ip local pool L2TP-Pool 192.168.100.1-192.168.100.10 3. 4. 5. 6. 7. 8. 9. 10. 11. 1. 2. 3. 4. 5. 6. 7.
Set up web content filtering in 4 steps with Ubuntu. Journal Entry 8/9/2015. Journal Entry 8/8/2015. Journal 8/7/2015. 8/1/2015. Journal Entry 7/27/2015. Journal Entry 7/25/2015. Journal Entry 7/21/2015. Journal Entry 7/20/2015. Journal Entry 7/17/2015. Journal Entry 7/13/2015. Journal Entry 7/6/2015. Testing IPv6 Connectivity by Using the Ping Command (Windows CE 5.0) Send Feedback You can test IPv6 connectivity, and reachability for a specific destination, by using the ping command.
To test IPv6 connectivity by using the ping command To obtain the IPv6 address of a Windows CE-based device, run ipconfig /all at a command prompt. To ping another IPv6 node, use one of the commands shown in the following table. See Also Diagnosing Connections | IPConfig | Ping Send Feedback on this topic to the authors Feedback FAQs © 2006 Microsoft Corporation. Opsview-core:agents - Opsview Documentation. Opsview supports the use of monitoring agents to gather data from remote devices.
The most common types of monitoring agents used with Opsview are SNMP (Simple Network Management Protocol) and NRPE (Nagios Remote Plugin Executor). Generic Agents SNMP agents are provided with all managed network devices such as switches, routers and firewalls. SNMP polling is the standard method for gathering data, monitoring plugins exist for all commonly used devices. SNMP may also be used for server monitoring. Net-SNMP is a very capable agent for Unix / Linux system.
Successful monitoring of Microsoft Windows servers usually requires purchase of a third party SNMP agent as the standard Microsoft agent is very limited. Opsview is capable of processing SNMP traps sent by agents to the monitoring server. NRPE provides two components: NRPE plugin This is installed on the monitoring server and queries remote NRPE agents.
NRPE daemon SSL is used by default to encrypt data. NSClient++ Opsview Agents Microsoft Agent. Port security on trunk interface? 3560#show int trunk Port Mode Encapsulation Status Native vlan Fa0/1 on 802.1q trunking 20 Port Vlans allowed on trunk Fa0/1 1-4094 Port Vlans allowed and active in management domain Fa0/1 1,10,20,30 You can specify every mac address that will enter the trunk Which is okay, if you have a static configuration, obviously it is not scalable or: 3560#show int trunkPort Mode Encapsulation Status Native vlanFa0/1 on 802.1q trunking 20Port Vlans allowed on trunkFa0/1 1-4094Port Vlans allowed and active in management domainFa0/1 1,10,20,30! Silly. It does seem like a security hole to have ports with no security, but this is worse: 02:45:51: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to down02:45:51: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down02:45:51: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan20, changed state to down.
Opsview4.4:faq - Opsview Documentation. Installation and Initial Configuration I'm having trouble with the Opsview installation - can I get any help? If you have issues installing, sign up to the forums and post a question in the relevant topic. Try to put in as much information as you can, especially: Which platform? How are you installing?
The forums are frequently viewed by our engineers, and others in the community may help. We want everyone to be able to install Opsview, so we'll do our best to fix any issues and get your system up and running. Why do I keep getting asked to authenticate? Please check that the time is correct on the Opsview server, as an incorrect system time can cause session cookies to expire. It is strongly recommended to use NTP as time synchronisation is critical to accurate monitoring. See also the next question. Why is the time in the UI different to that on the system The date/time on the server is correct, but parts of the UI show an incorrect time. Unset TZ opsview-web restart Are you an LDAP user? 1. Opsview | IT Monitoring for Networks, Applications, Virtual Servers and the Cloud.
Windows 10 Preview - SSL VPN Client | Additional Communities | Cisco Support Community | 4571 | 12315391. I know the official answer will be it's not supported... but here's the issue. Installed Cisco AnyConnect client v3.1.05182 on Windows 10 Preview. It installs just fine and the service is started. However, when attempting to connect we receive the error "Failed to initialize connection subsystem. " And in the system logs we get.. Function: ConnectMgr::doConnectIfcConnect File: . Line: 1937 Invoked Function: ConnectMgr::getConnectIfc Return Code: -29622267 (0xFE3C0005) Description: CONNECTMGR_ERROR_NULL_POINTER Any help with ideas/known resolutions would be great. Found an additional error.... Function: CTransportWinHttp::clearSSLCache File: .
Line: 1784 Invoked Function: SslEmptyCache Return Code: 13 (0x0000000D) Description: WINDOWS_ERROR_CODE The error code above comes out to be MSG_E_CANNOT_GET_KEY_PROVIDER Function: CTransportWinHttp::InitTransport Line: 284. Activate ASDM as GUI Interface for Cisco ASA/PIX Firewall | Be A Cisco Expert Without Course or Certification. Clientless SSL VPN (WebVPN) on ASA Configuration Example. Introduction Clientless SSL VPN (WebVPN) allows for limited but valuable secure access to the corporate network from any location. Users can achieve secure browser-based access to corporate resources at anytime. This document provides a straightforward configuration for the Cisco Adaptive Security Appliance (ASA) 5500 series to allow Clientless SSL VPN access to internal network resources.
The SSL VPN technology can be utilized in three ways: Clientless SSL VPN, Thin-Client SSL VPN (Port Forwarding), and SSL VPN Client (SVC Tunnel Mode). 1. A remote client needs only an SSL-enabled web browser to access http- or https-enabled web servers on the corporate LAN. 2. A remote client must download a small, Java-based applet for secure access of TCP applications that use static port numbers. Refer to Thin-Client SSL VPN (WebVPN) on ASA using ASDM Configuration Example in order to learn more about the Thin-Client SSL VPN. 3. Prerequisites Requirements Components Used Conventions Configure Procedure 1.
Journal Entry 6/29/2015. Journal Entry 6/20/2015. Microsoft Azure: Cloud Computing Platform & Services. AWS Products and Services - Global Compute, Storage, Database, Analytics, Mobile, Application, and Deployment Services. Amazon Web Services offers a broad set of global compute, storage, database, analytics, application, and deployment services that help organizations move faster, lower IT costs, and scale applications. These services are trusted by the largest enterprises and the hottest start-ups to power a wide variety of workloads including: web and mobile applications, data processing and warehousing, storage, archive, and many others. Amazon Web Services provides a variety of cloud-based computing services including a wide selection of compute instances which can scale up and down automatically to meet the needs of your application, a managed load balancing service as well as fully managed desktops in the cloud.
Sign up with Amazon Web Services and receive 12 months of access to the AWS Free Usage Tier and enjoy AWS Basic Support features including, 24x7x365 customer service, support forums, and more. Amazon EC2 provides resizable compute capacity in the cloud. Learn more » See pricing details » Blade Servers, Blade Server Systems and Technology Solutions. Dell converged platforms — FX, VRTX and blade server products. PowerEdge FX Architecture: Redefining the Converged Data Center Dell's new FX architecture lets you configure complete, workload-specific blocks of servers, storage and networking so you can rapidly respond to your organizations needs. PowerEdge M630 Blade Server A 2-socket blade used in M1000e or VRTX converged infrastructures, equally well suited for office environments or large data centers, and ideal for private cloud.
PowerEdge FX Architecture: Redefining the Converged Data Center Dell's new FX architecture lets you configure complete, workload-specific blocks of servers, storage and networking so you can rapidly respond to your organizations needs. PowerEdge M630 Blade Server A 2-socket blade used in M1000e or VRTX converged infrastructures, equally well suited for office environments or large data centers, and ideal for private cloud. DansGuardian - True Web Content Filtering for All. Five content filters suitable for both home and business.
Jack Wallen identifies five content access management and filtering apps. I am not one to advocate a Big Brother-esque environment for business as that does little for morale or instilling a two-way sense of trust. But there are companies out there that must lock down machines, for whatever reason, and need the tools to do so. Home use, of course, is a different story - where young children are susceptible to falling into the clutches of the wealth of mature content the web has to offer. When you need to block content, it's a relief to know there are plenty of tools out there that do the job. I have identified five such tools that I believe can do the trick for anyone willing (or needing) to take the time to get these products set up and running properly. Some are a bit easier than others; but, in the end, they all do a great job of protecting you, your company, your employees, or your children.
This blog post is also available as a TechRepublic Photo Gallery. Tools 1 Net Nanny 3. 4. 5. 7 killer open source monitoring tools.