CimmerianX 197 Junior Poster

Do you use a VPN? If the VPN client creates a new VPN interface, you also have to set it there...... This is a really stupid mechanism IMHO.

rproffitt commented: I'll watch for that. Love that M5 computer. +10
CimmerianX 197 Junior Poster

So on the metered connection in win 10, the 'metered' setting has to be set on each network interface IIRC. If you only set it for ethernet, your wifi would still have full, unfettered access.

http://www.thewindowsclub.com/set-metered-connection-in-windows-10

rproffitt commented: Reminds me of the M5 computer. No off switch. +10
CimmerianX 197 Junior Poster

Check your current DNS settings. From a command prompt with 'ipconfig /all' . What are your dns servers?

Once you have dns IPs, use nslookup to check.

nslookup
www.google.com
<you should get an answer here with IPs, if you don't, your DNS servers are wrong>
server 8.8.8.8
www.google.com
<you should get IPs here, if you don't, your outbound access is having issues going to 8.8.8.8>

CimmerianX 197 Junior Poster

You need GPT and NTFS.... if it's just going to be used for Redhat, then go ext4.

To mount automatically on each boot, use /etc/fstab to mount the drive via UID.

CimmerianX 197 Junior Poster

Also, there could be a heat issue in your machine if airflow is blocked or fans aren't spinning at correct speeds.

You can buy a can of compressed air for a few dollars. Use it to blow though the small vents on the unit and remove any dust buildup. IIRC there are utilities on the mac that will report on fan health also. Make sure they all work and spin properly.

rproffitt commented: I've changed my canned air advice to every 1st of the month to the vents. +9
CimmerianX 197 Junior Poster

From server at 192.168.0.3. It is the DNS for the network. Thus it should also have Forwarders setup in it's DNS config so that anything it can't resolve gets sent out to another 3rd party dns server (i.e. 8.8.8.8 or 4.2.2.1).

From the client, if you can ping something internally, but dns fails when going to an external site, then the Forwarders are probably incorrect.

On a client or even on the server, check dns by opening a command prompt:

NSLOOKUP
server 8.8.8.8
www.google.com
<here you should see a response showing google's ip>
server 192.168.0.3
www.google.com
<here, if you get a timeout, the server is not forwarding dns requests outbound or is blocked going out a tcp/udp 53>

rproffitt commented: Good NSLOOKUP example. Yes, use NSLOOKUP to test your DNS choices. +9
CimmerianX 197 Junior Poster

+1 for ninite. I use that all the time, especially for Classic Shell to 'fix' the windows menu in ver 8 and 10.

rproffitt commented: And +1 for spreading the good word. +0
CimmerianX 197 Junior Poster

Rubberman is correct.

On the 2011, 13" macs, you can remove the bottom by unscrewing the tiny screws along the base plate. There are 2 sizes of screws, so keep careful note of what size screw came out of what hole. Pull the cover off with gentle force...use a flat head screwdriver to wedge the cover off. There will be sticky stuff holding it down. Clean the fans of dust then put it all back together.

CimmerianX 197 Junior Poster

Seems like a lot of space for windows system.
Try the following tools. I use them myself frequently. It will give you information and the ability to clear space.

WinDirStat - This will scan the disk and visually show you a representation of file sizes and locations.

CCleaner - This will scan your disk and identify files that can usually be removed (e.g. temp folder files, large downloads). Double check what you will clean up before using it, IE history and cached PWs can be on the list for example.

rproffitt commented: Both are up at Ninite.com. Why Ninite? Read http://www.howtogeek.com/201354/ninite-is-the-only-safe-place-to-get-windows-freeware/ +8
AleMonteiro commented: Great tips! Didn't know about nitenite ^^ +10
CimmerianX 197 Junior Poster

I agree with rprofitt. portableapps is great. You can carry apps on a usb and use them where you want. It has value especially when , like me, you carry an arsenal of tools on a Read only USB for malware cleanup, etc...

rproffitt commented: Thank you CimmerianX. +8
CimmerianX 197 Junior Poster

You could just run it on the Mac side. Why the need for virtual windows?

RehmanUK commented: I like this stuff +0
CimmerianX 197 Junior Poster

Wow - who came in here and voted down every comment? Some MS fanboy I suppose

LaxLoafer commented: Someone with a heavy hand. +5
rproffitt commented: Add some upvotes for balance. +8
RehmanUK commented: nice +0
CimmerianX 197 Junior Poster

It's all about automating how switches talk to each other. I'm not personally a 'fan' of letting networks do this type of thing. I mean, letting it auto detect duplexing and speed is one thing, but letting the switches determine what ports will trunk seems kindof useless and can be a bit dangerous.

For the novice, i suppose it can help with setting up trunking.... but seriously, If you can't design and manage your inter-switch trunks, you probably shouldn't be doing this job in the 1st place.

I might be a little old-school, but I like to set my networks up manually, and turn off this extra auto discovery stuff that cisco has inplemented. I like to know exactly where my switches trunk, over what ports, what VLANS are allowed over tunks, etc...

CimmerianX 197 Junior Poster

You should also consider that the router is compromised.
What router do you use? Have you tried setting static DNS in router... or even better, try setting static DNS on the PC to see what results you get.

I also found this.... hope it helps.
http://greatis.com/blog/search-redirecting-11/remove-wonderlandads-com.htm

CimmerianX 197 Junior Poster

What reservation length did you setup on your scope? IF you set it to never expire, then you you can be out of addresses.
For wifi, I use 8 hour to 1 day, for Ethernet based scopes, I use 7 days. But those numbers are totally up to you.

Look at your server's dhcp panel....
Is the scope active?
How many leases are currently in use?
Is DHCP services running?

CimmerianX 197 Junior Poster

There is usually 1 gateway per subnet.

When a machine wants to communicate with an IP address that does not reside in a directly connected subnet (an ip outside it's subnet), then the traffic is sent to the default gateway. The GW must be in the same subnet as the machine since the traffic is sent via layer 2 to the GW mac address.

So, each of your subnets would have 1 gateway:
**192.168.1.0/27 GW: 192.168.1.1
192.168.1.32/27 GW: 192.168.1.33 **

Gateways are assigned to machines in the subnet via DHCP or statically within the network config.

Now on the router, the concept is pretty much the same.
Run 'SHOW IP ROUTE" to see the current routing table.

There would be a 'C' for each directly connected subnet. The gateway of the router is the 'Gateway of last resort" with can also be identified as a route for destination 0.0.0.0/0. The gateway for these is, essentially, your router's default gateway..... that is the device for the traffic that does not fall within any other location in the routing table. This GW is usually your ISP's router IP. You would need to setup 1 interface for the ISP router network.

CimmerianX 197 Junior Poster

You can take 1 port off your wifi router and cascade any switch to that port.
You don't need a smart switch for this, any unmanaged switch will do fine. SMC EZ switches are cheap and work well.

Don't worry about bottlenecks. To stream a 1080p movie is about 6-10 Mb/s. if you get a Gigabit switch, you could stream 1080p movies to over 50 devices before your single gig port becomes the bottleneck (a little exagerative, but you get the point).

The bottleneck will occur at the disk on the plex server as the read speed of the data is probably far below this number.

So, go get yourself an unmanaged gig switch and cascade it off your router and you are good to go.

CimmerianX 197 Junior Poster

Its a feature in routing to avoid routing loops after a failure..

https://en.wikipedia.org/wiki/Split_horizon_route_advertisement

CimmerianX 197 Junior Poster

I give the same advice to everybody.

Unless the theft recovery is built into the BIOS somehow.... it is useless. Most of these programs won't work unless you log into the machine. For MAC or windows that means automated signin that allows the theif to connect the mac to his own wifi AP. These softwares are useless unless someone plugs them into a network or can sign in to the GUI to activate Wifi.

What's more valuable to you, the value of the laptop, or the data contained therein. For me, it's the data, no question. My password files, ssh keys, emails, data, etc....

I would rather encrypt the drive so that no one can access. This means all that tracking software is useless because the laptop won't boot. But, 99.99999% of the theives out there will never touch my data.

Plus, cops will not waste time going after a $100-$500 phone or laptop. If you go confront the theif, then you are just asking to get shot or arrested for harassement.

Just encrypt your data instead

CimmerianX 197 Junior Poster

Where did you get this address? From the ISP?

in Ipv6, the link local addresses are non-global, unicast and will have the prefix of fe80:. Depending on your host, you run ipconfig /all or ifconfig (or whatever command for the platform) and list out the ipv6's for each interface.

If you are going to subnet internally, you can edit the link local's unicast subnet prefix with something like fe80:0:0:1 where the multicast would look like ff02: as the prefix for link local multicasts.

CimmerianX 197 Junior Poster

If it's a clean install, you should already have your default sources set to go.

I would check the basics:
Do you have intenet connectivity? Try pinging 4.2.2.1.
Do you have working DNS? Try pinging www.google.com, does it resolve?
What does apt-get update return?

CimmerianX 197 Junior Poster

If I were your admin and I cought you doing this (circumventing network policy and protections) I would fire you on the spot. If the admins don't want you using dropbox tools, It's up to you to bring in another workstation for the purpose of coping company documents into it for easy uploading. I wouldn't care if 'cloud storage' is 'neat' and 'cool' to you. As an admin, users like this make my blood pressure rise.

happygeek commented: yep +13
CimmerianX 197 Junior Poster

Swtiches will keep a table of mac addresses that are seen on each switch port. If you have 1 pc on a port, then the switch will know that port 1 has the mac for your pc and traffic will only be sent there when destinied for your mac.

You can also cascade switches. If you have a 2nd switch B connected to port 1 on Switch A, then switch A port 1 will have multiple mac addresses on that port once detected. Managed switches also have trunked ports where vlan tagged traffic can be sent across ports with the same end effect, basically.

The switch ports themselves, do not have mac addresses. The switch 'knows' whats macs are to be found on what ports.

rubberman commented: It's all handled with the magic of firmware! :-) +13
CimmerianX 197 Junior Poster
CimmerianX 197 Junior Poster

Carbon Copy is a tool I use in my data center to clone macs.... there may be a free trail. The external disk that is used as the backup target can be used as the boot device in a pinch.

Other options are
CloneZilla - Requires some setup
Boot a linux live disk and DD the entire drive - be careful with this one to not erase your disk.

CimmerianX 197 Junior Poster

To expand... for windows, get a free program called putty.exe. This lets you create an ssh session. You need the IP address or dns name of the server you want to hit. SSH usually runs on port 22 by default.

Don't use telnet, passwords are sent in cleartext.

CimmerianX 197 Junior Poster

Sounds to me like it may be trying to dhcp an addresson eth0 and waiting to timeout...

CimmerianX 197 Junior Poster

The lag will not come from your internal network. The lag is produced when your traffic hops around the internet through other comanies' routers. Traffic to your gateway will almost always be <10ms. It's only when your traffic leaves your network, do you get longer delays.

If you are looking for better gaming... you'll have to get a house closer to where the game servers are located.

CimmerianX 197 Junior Poster

75% of the devs in our shop use MACs, split between mavericks and yosemite.
The other 25% run Ubuntu or Mint. We have no devs running windows as the primary OS at all. Windows is relegated to the Assistants, the C levels and VPs, and accounting basically.

A mac is good. A pc running a linux distro is also good and much cheaper.

CimmerianX 197 Junior Poster
CimmerianX 197 Junior Poster
CimmerianX 197 Junior Poster

Does [chrome] appear above or below the TCP 80 LISTENTING? In the output, the service appears after the listening port.

CimmerianX 197 Junior Poster

You should block your public IPs when posting (better safe than sorry).

With that, we are now certain it is not the router, network, or other host.

So now we concentrate on your web server. Like I said, there is something else listening on port 80.

This is a windows box so from command line run 'netstat -anb' . Look for LISTENING on x.x.x.x:80. Underneath the entry, you will see the service that has bound the port.

What do you get?

CimmerianX 197 Junior Poster

WTH is windows 7 server edition? Never heard of it.

CimmerianX 197 Junior Poster

FYI, you can get these off tech net if needed.

Also, FYI, 2003 support is ending on July of 2015. You should really consider moving to a newer OS if you are rebuilding any systems.

CimmerianX 197 Junior Poster

boot into safe mode (f8 on startup)
run msconfig from START - RUN
Select Diagnostic startup
Reboot

Hows the performance now? If this is acceptable, then you can start turning on services little by little..... this is a lot of trial and error tying to hunt down an errand process, but it should help.

Or... some simple things to look for....
1) are there multiple AV or malware apps running?
2) are you loading multiple remote drives?
3) do you have a restore point you can revert to before the slowdown started.

Reverend Jim commented: All excellent suggestions. +12
CimmerianX 197 Junior Poster

You can't change your home subnet to match your office without new code to nat one or both sides before the crypto map evaluates the traffic.

From the customer side with a 192.168.20.0 subnet, you can't add a crypto for 192.168.0.0, that would cause problems.

What you could do is change your home network to a 192.168.11.0/24 leaving the office network at 192.168.10.0/24. From the client side, change the crypto map from 192.168.10.0/24 to 192.168.10.0/23 which would encrypt and tunnel both networks.

Your office vpn would need to change your home ACL from 192.168.5.0 to 192.168.11.0/24

Your Home vpn would need to encrypt traffic for 192.168.10.0/24 and 192.168.20.0/24

This is not the only way of doing it, but it is clean, easy to troubleshoot, involves no pre encryption NAT (yuch anyway), and is the smallest config change on the client side that I can think of.

CimmerianX 197 Junior Poster

That's an odd location for a DLL to run at startup. You probably had a virus/malware issue and this is the remnants of it.

Probably best to run Malwarebytes and to check your starup items as well.

CimmerianX 197 Junior Poster

What IP comes back when you ping www.google.com? Does it match the IPs from an NSlookup of www.google.com?

Can you telnet to port 80 at www.google.com or even one of the returned addresses?
Can you http directly to one of the google addresses?

Have you tried another browser from vista? Same result?

mmcdonald commented: Perfect suggestions here +4
CimmerianX 197 Junior Poster

In VM space, a RAW iSCSI mapping has it's pro's and con's.

With RAW mappings, VM based snapshots are not usually possible. So if you plan on RAW mappings, make sure your SAN is making regular snaps/backups of the partition.

Usualy, using the VHD format i.e. VMDK is 'good enough' for 95% of the use cases our there. IMHO.

CimmerianX 197 Junior Poster

TLS will run over port 25 and is usually oppurtunistic.

To force TLS over a send connector you would use:
Set-SendConnector 'Name-of-connector' -RequireTLS $true

In that case, if TLS could not be negotiated, no connection is made.

BTW, if you want to enable tls globally, check it with a website called checktls.com

JorgeM commented: correct! you beat me to it! +12
CimmerianX 197 Junior Poster

There is no possible way to answer that question.....

CimmerianX 197 Junior Poster

If I read that right, both subnets behind the .18 and .20 consumer linksys routers are assigned 192.168.1.0/24 subnets. If that is true then you can not use a VPN at all due to the overlapping subnets. (these routers don't seem to support NAT before Crypto to overcome that issue, so its out of the question).

A solution, though not an ideal one, is to use a single port forward on the 1200 router to take a single high, non-standard port on the public ip x.x.x.20 and forward it into tcp 9100 on the printer's address. Look at E1200 user guide on page 57 for info. Take TCP port 9299 and forward it into tcp 9100 to the IP address assigned to the printer. From your workstation, you setup the printer using IP Port x.x.x.20 port 9299. This traffic on the public IP is sent into the printer on the right port.

This means anyone can scan and potentially find/print to this printer, but the random high port eliminated alot of that risk. It would be ideal to have a router that can allow traffic based on Source IP as well, but it is beyond this 1200's capabilities.

The better solution is a redo of one of the 2 router subnets so that you can just use a 2nd interface to reach the prrinter.

CimmerianX 197 Junior Poster

So when do OSes like 3.1, 95, 98, 2000, and XP become 'abandonware'?

CimmerianX 197 Junior Poster

As a sanity check:

dpkg -l | grep mysql

What is the output?

CimmerianX 197 Junior Poster

if you want to deny access, any current prosumer router can block requests to any FQDN.

CoolAtt commented: will work on iptables ? +2
CimmerianX 197 Junior Poster

We could start with some information:

Run 'ipconfig /all' from each windows host.
Run ifconfig from the MAC.
From the Win machines, are you using ICS (internet connection sharing)

CimmerianX 197 Junior Poster

The OSI model is used everywhere network communication takes place.... NEtwork communication doesn't happen without adherence to those standards.

CimmerianX 197 Junior Poster

In line 9, you have a 'hostnamehere' name. Make sure that name is also added to line 3 for 127.0.0.1.

CimmerianX 197 Junior Poster