We have a new ASA5505 with the Security Plus Unlimited License. We are trying to setup two web servers in our DMZ with PUBLIC IP addresses (as required by our application). These machines CANNOT be NAT'ed in the DMZ.
Network Space (IP's have been sanitized from their production values)...
We have a new ASA5505 with the Security Plus Unlimited License. We are trying to setup two web servers in our DMZ with PUBLIC IP addresses (as required by our application). These machines CANNOT be NAT'ed in the DMZ.
Network Space (IP's have been sanitized from their production values)...
I've been a network admin for about 6 years now and am beginning to cross-train into the realms of Database Administration. As part of this, I am trying to find the best learning materials to bring me up to speed quickly on the subject.
In your experience, what resources (online and print)...
You stated that one user can't email another user at all. What happens when (s)he attempts to email them? Do they get a NDR or any other notifications back?
Here's a good article on Cisco PKI:
http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/pkdpy_wp.htm
Our environment has multiple sites using PIX's with a centralized Microsoft CA server. If you choose to go this route I'll be more than happy to help you with setup\config.
On your revocation...
You could write a quick VB script that parsed AD (through ADSI) for all users in the User's OU, and updated the Home Directory value for each accordingly.
The AD value to update would be:
oUser.homeDirectory = "\\snap\x_data\%username%"
Is your machine a member of a domain? If so, their would be a EFS Recovery agent specified in group policy. You could use that agent to recover those files...
Try running the following command (I know this works for 2003, but you didn't mention what version you were running)
"<path to office install>/outlook.exe" /cleanrules
This will start Outlook and delete client and server-based rules.
In versions 2.5.1 and later, connect a PC to the concentrator's console port using a straight-through RS-232 serial cable with the PC set for the following:
9600 bits per second
8 data bits
no parity
1 stop bit
hardware flow control on
VT100 emulation
The certificates or shared secrets are only used for Phase 1 SA negotiation. You'll still need to use a username or password for secondary authentication (via local, radius, etc).
Your post isn't very clear on what you are trying to achieve - Can you post more specifics?
When we setup Certificate services on our 3 pix's here, we used "ca authenticate <name>" without the fingerprint specified, as with that command I could never get that to work.
After you do that comamnd you should see the CA fingerprint displayed, and it should match what you see when you...
I'm with Lander215 on that one - I have adminpak and exchange tools installed on my desktop machines as well as TS on the server. Usually for day-to-day tasks I will use the local version and will use the server-side TS when doing larger time-consuming tasks like moving large mailboxes, etc...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.