graynor,
can you post a config (w/o passwords) of the two switches that link your trunk connection? Also, a show interface will reveal any CRC errors that you may be having due to possible media mismatches.
Dirtyhat
Bentley45,
If you check (enable) reverse lookups, the appliance is going to attempt to perform a reverse DNS lookup on the domain or host that the connection originated from.
This is typically used in SMTP environments when you want to reduce SPAM. This ensures that no messages are fully...
You could also use Hummingbird X-Server on your windows system. This will allow you to ssh into your Redhat server and with X11 Forwarding enabled, send all gui based applications back to the windows server. I have used this for many years and find it to be an excellent means of remote X...
This may be unrelated, but eMule typically uses port 4711.
In case you are not farmiliar with this, it is a file sharing client similar to edonkey2000. As with many of these types of offerings, they can also be configured to host as well.
Just a thought.
Dirtyhat
Opening up any holes on your firewall can potentially expose you to nasties. Unless you are using a proxy/application based firewall it is very difficult to validate the integrity of the traffic that is flowing over the opened port.
Just make sure that your server us up to date on the patch...
Keep in mind that using the DMZ is an option. This is typically used for placing your externally accessed services.
This creates a separate segment on your network and reduces the amount of exposure.
You can however, place an ingress hole through the firewall that will allow external...
Based on the information in your post, I am assuming that a remote VPN tunnel is not in place.
A quick solution is to hang the mail server off the DMZ and allow only your remote IP addresses to pass through the firewall via port 143. This can be a management nightmare with the likelihood of...
Do you have a switch that supports port monitoring/spanning? If so, you could hang it off the switch the firewall and DMZ components are connected to. The Linux based IDS system would listen in promiscuous mode thus not adding another layer 3+ system on the outside of the network.
An...
Torotech,
What type of monitoring are we talking about? Does the owner want just web monitoring from that system or is he looking for a complete file/service auditing utility?
SONICkANT,
I have a CCO account, but I am not showing release 7 as being available just yet.
The latest version being advertised under my CCO is 6.3.4.ED 22-JUL-2004
bhogaj31,
If you have the Back Office/Resource Kit, you can use the "MAPISEND" command from the windows 2000 command prompt. This requires that an email client (Outlook etc..) be installed on the system the command is being run from.
Take a look at the command syntax options.
syntax...
boodox,
That is quite a strange issue. I have not used the copper GBIC's in a 3550-12G, but I am currently using them in multiple 3550-24-TX and 3550-24-FX switches with no problems. I only use the copper GBIC's for Access connections when the extra bandwidth is required.
At this point I...
fenstrat,
Keep these chracteristics in mind when configuring the Destination port.
* The port does not transmit any traffic except that required for the SPAN session.
Destination Port
Each local SPAN session or RSPAN destination session must have a destination port (also called a...
CajunEcureuil,
Have you also verified that you do not have any switches conntected to ports with bpuduguard enabled?
If you still have problems, post a config of the two switches.
Have you considered etherchanneling the Gig links between the switches? You could also add additional trunk links from the Access layer to the 4506 devices.
Dbyte,
I wish I would have looked at your thread earlier.
Change your /etc/resolv.conf to reflect this.
nameserver 216.204.111.33
nameserver 216.204.102.10
This removed the added "0" in the fourth octet. Suse Linux does not recognize this as a valid IP address.
thebdj,
You may want to try out the PERL forum.
It would be trivial for a savy PERL programmer to use Net::telnet or Net::ssh modules to pull these statistics and validate them against your criteria.
I just read the bottom of your post and saw that it does come up with SC--SC connection.
Make sure you have a X-over cable when connecting the two switches together with Cat5.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.