Does anyone know how to reset this switch back to a default configuration? Somehow the switch got a password on it and I can't figure out what it is. I tried to search Nortel's web site and could not find it.
Thoughts?
Has anyone created any Sniffer filters for all of the vendors of WAPs?
Here's my thought on this. I'm interested in creating filters on the first three octets (since these are unqiue to each vendor) and randomly scan the network for rogue access points. Has anyone tried this?
Sound practical?
Can anyone give some suggestions on how to block unwanted emails and all traffic associated with a domain name? I have a domain that is spamming me constantly and I don't want there to be any way this individual can use it for his gain. I have my Exchange Server currently blocking email from...
Has anyone ran into this problem?
I have a client of mine that has quickbooks loaded on the server and has the appropriate file permission to accomondate file access. When the second user logins in it notifies the user that they have a read-only copy.
The client called CA and they said this...
Is there any way to extract out the data from a public folder file without rebuilding the whole server? I have some important information in these files and don't want to rebuild the server, if possible.
Thanks in advance,
Todd
Does anyone know the details of the type of authenciation Earthlink DSL uses? I'm trying to setup a Cisco 2621 router to my dsl modem. Any help would be greatly appreciated.
Thanks!
After reviewing our logs this morning I noticed the following errored posted twice around 0223 and 0357. It also says that pid ungracefully disconnected from pmd with 0 pending events. Error on socket #46 src:ipmap pid 4554 and 5407. Lost connection with pmd/ovevent process (application...
Does anyone have any guidance on do's and don't for registration files for Unix HPOV? I have been tasked to customize these files for security of the NOC users. Any suggestions?
DTMan
Can anyone point me to a url for a document showing the difference between the two versions? I need to start working on a new set of registration file to start limiting the menu availabilities. I only have a version 6.10 box runnning until we get another box installed with version 6.20...
What is the diffence between the two types of conf files? I read in one book that the preferred file to use for a firewall is the IPtables. After looking in this group, I find that there is more questions about the IPchains. Am I wrong in understanding the preferred file for configuration is...
I have recently rebuilt our firm's image for our DSS Sniffers with the new version (4.1048). After capturing packets for several days/weeks, I noticed on one DSS I get the error "Failed to start capture! Please lower the capture buffer size and retry." I have lowered the buffer size...
I'm currently working on an initative to track down more of the Nimda virus and the Peer Sharing programs. Knowing this, capturing the data is only one piece of the puzzle. Management usually wants to see those nice, pretty graphs to better present what are the Top Talkers are and Top Talker...
After reviewing the posts over the last few months, I have acknowledged the need for asking, "What items do most network analysts carry in their toolkits?" I'm interested in finding out what the tools of the trade are (as far as reference material). I know I have reading multiple...
Hello All!
About a month or so ago, I noticed NAI had a Nimda virus protocol filter on their web site. I downloaded this filter and was surprised by all the traffic our network was incurring from this virus. Since then, we have deployed this filter nationally and have been very pleased with...
When trying to add multiple agents in the console area, I receive the error "the interface card already exists - please choose another one". According to NAI, there is a workaround of deleting the file key.ini on the agent machine (i.e. DSS). I have been able to complete this task...
Can someone provide some guidelines on some questions that would be needed to be gathered before committing to a network analysis engagement? I am trying to establish some procedures that a customer would need to follow prior to a technician could be deployed for analysis. I'm also interested...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.