How to setup external access in VM?

We need to setup a Microsoft VM and allow external access without using my company VPN as we need to test the web services integration with other vendors. could you please help how to setup external access? Thanks

Hi Wilson,
As a prerequisite , that VM need to access the gateway .
It means that you need to
create an external virtual switch then connect that VM to external virtual switch then allocate a LAN IP for VM .
http://technet.microsoft.com/en-us/library/jj647786.aspx
After this you may think of this VM as a physical machine in your LAN then do what you need .
Best Regards
Elton Ji
We
are trying to better understand customer views on social support experience, so your participation in this
interview project would be greatly appreciated if you have time.
Thanks for helping make community forums a great place.

Similar Messages

  • How to setup the access privilege of flash file in Web Intelligence?

    How to setup the access privilege of flash file in Web Intelligence?   WEBI can set access privilege for single WEBI report file, but it seem cano not set access privilege for one flash file.

    Thank you Maksim,
    I did set the "selectionMode" to "Auto". I don't understand where In supply function I have to set lead selection of nested node to first element. Please elaborate on this. Are you talking about the context attribute bound to the second table? OR do I have to change the Importing parameters "Node" and "Parent_Element" of my supply function?
    Thanks for your time.

  • How to setup Mobile Access Server

    Hi,
    I am trying to setup Mobile Access Server on my Mac Mini Server. The setup I have is a small network behind a Airport Extreme. I would like to give all users access to services using Mobile Access Server and was hoping initial setup was going to take care of that....no such luck.
    What do I fill in for the local servers? How do I access this service from the outside the lan? How do I need to configure my Airport (with the other services, it happened almost automatically from the security pane).
    Thanks,
    Ian

    Hi,
    In the field for local server you just type in the local dns name for your calendar server, mail server etc... Also select which port you want publish externally and the the correct port your service is actually using on your lan (Selected under advanced tab). Make sure your mobile access server can resolv your hostnames correctly. It should point to an local ip. If an nslookup shows your public ip, you have to correct your local dns server (This is often called split dns configuration.)
    To access this from outside your LAN you have setup NAT and permit the port you have configure your mobile access server to be the incomming port. How exactly you do that on the airport I am not sure, but I am sure it is explained in the user manual for the airport.
    I found this video about the mobile access server on youtube: http://www.youtube.com/watch?v=_VRgl2bncZU
    Hope this helps.
    Bernt

  • How to setup remote access with E4200?

    Hi,
    I am new to this and I need help from you all on how to setup the E4200 so that I can access the media server when I am in office?  Is there a guide or step by step procedure on this?  I was browsing on the Cisco website and unable to find it. 

    The purpose of using DDNS is it substitutes the public/WAN ip address provided by your ISP.We all know that the ip address provided by our ISP(if we are not subscribe to a premium static ip address) is basically public and will always change from time to time.So it will be difficult for us to know what's the ip address our ISP has provided us and this will lead us problems accessing our router or ftp server remotely. Thus by using DDNS' it will now allow us to access the router remotely without knowing what's the WAN ip address.

  • How to setup the access duration for user

    Dear experts,
    As requrement of users, we need to setup the access duration for all users of our company . It's mean users only access into SAP on defined duration
    Ex : Working time is 8h00 am to 17h00 pm, after 17h00 pm, users cannot access into system
    Please help.
    Thanks,
    Neo

    Hi all,
    Thanks for your solution
    We want to set the access duration for end-user but sometimes, we need to flexible to allow user access to system in some special case.
    Let me detail users's requirements
    - Users can access to SAP fom 8h00 to 16h00
    - At 16h00, system will send the warning message to user to inform that system will aunomatic turn offf after 15 minutes, it's mean system will automatic kick out users after 15 minutes
    - From 16h00 to 8h00, users can not access to SAP
    - However, in some special case, we can grant the acess to system to specific user.
    Can we setup these steps on SAP ?
    Thanks,
    Neo

  • How to Setup another Access Policy 5.3

    hi everyone,
    Thank you for your help in advance. I am new to v5.3, and I am not good at VPN. So hope you can help.
    I just have my consultant to configure this correctly just today. Currently, there is only one rule for the access policy (Single Result Selection). That rule is to use Active Directory as the source for the authentication. And by default will deny any other access which is not found in the rule.
    Now... I just got an order that I need to setup a new user who will need to access to our network by using Cisco IPSec VPN (the software one). But that user is not setup in our Active Directory, and we do not want him to access our domain anyway. He only needs to access non-domain resourse...such as airconditioning controller by IP. So I am thinking to setup his account by using "internal identtity". If I do this way, what do I need to do to setup another access policy? May you give me some steps with little more details?
    OR... if it is not the way I should do...what else can I do to achieve this goal? Also, he said he could provide his static IP trying to access from.
    I have a ASA 5520.
    Thank you very much for your help.
    Takami Chiro

    Hello,
    Instead of creating a separate rule for the credentials validation you can edit the existing one that points to AD1 (only) and change it to a result on the ACS that checks both AD1 and Internal Users. In that case we need to use Identity Store Sequence. Refer to the steps below:
    On the ACS GUI > Users and Identity Stores > Identity Store Sequences > Create > Select "Password Based" and on the first box move AD1 and Internal Users to the right. Please do the same on the box at the bottom.
    The option "Internal User/Host Advanced Option: If internal user/host not found or disabled then exit sequence and treat as "User Not Found" should stay unchecked. Click submit.
    After creating the ID Store Sequence you need to change the Identity Result where you had AD1. Now the name of the ID Store will display as an available option. Please select that one and save the changes.
    With the above configuration, the expected behavior would be:
    1) ACS receives a request from the Internal User.
    2) ACS tries to validate the credentials against AD.
    3) AD returns an "User Unkown" response.
    4) ACS moves to the Internal Users.
    5 ACS successfully authenticates the user validating the provided credentials against Internal Users.
    Hope this helps.
    Regards.

  • How to setup external 500GB Hard disk drive in enclosure

    How easy is it too setup an external 500GB Hard disk drive (HDD) in enclosure? HDD is a brand new Western Digital 500GB HDD in an enclosure which has FireWire ports. The drive is not formatted.

    Plug it in and use the Disk Utility in the /Applications/Utilities/ folder to format it as a Mac OS Extended (Journaled) disk.
    (46625)

  • Help Needed: How to setup external procedure in listener on 11gR2

    I have successfully installed 11gR2 RAC on two nodes RHEL5.3, I noticed that the default configuration has something different from previous versions (such as 10gR2 or 11gR1):
    (1) listener.ora is under $GRID_HOME/network/admin (a.k.a under Grid tree) not under $ORACLE_HOME/network/admin, and have a new file called "endpoints_listener.ora"
    listener.ora under $GRID_HOME/network/admin:
    LISTENER=(DESCRIPTION=(ADDRESS_LIST=(ADDRESS=(PROTOCOL=IPC)(KEY=LISTENER)))) # line added by Agent
    LISTENER_SCAN1=(DESCRIPTION=(ADDRESS_LIST=(ADDRESS=(PROTOCOL=IPC)(KEY=LISTENER_SCAN1)))) # line added by Agent
    ENABLE_GLOBAL_DYNAMIC_ENDPOINT_LISTENER_SCAN1=ON # line added by Agent
    ENABLE_GLOBAL_DYNAMIC_ENDPOINT_LISTENER=ON # line added by Agent
    endpoints_listener.ora under $GRID_HOME/network/admin:
    LISTENER_NODE41=(DESCRIPTION=(ADDRESS_LIST=(ADDRESS=(PROTOCOL=TCP)(HOST=node41-vip)(PORT=1521))(ADDRESS=(PROTOCOL=TCP)(HOST=192.168.10.41)(PORT=1521)(IP=FIRST)))) # line added by Agent
    (2) If I put listener.ora under $ORACLE_HOME/network/admin like 10gR2 including EXTPROC, then restart RHEL servers, the listener.ora under $ORACLE_HOME/network/admin doesn't take effect rather the listener.ora under $GRID_HOME does; however if I run "lsnrctl stop" and "lsnrctl start" the listener.ora under $ORACLE_HOME/network/admin will take effect.
    listener.ora I added later under $ORACLE_HOME/network/admin:
    LISTENER =
    (DESCRIPTION_LIST =
    (DESCRIPTION =
    (ADDRESS = (PROTOCOL = IPC)(KEY = EXTPROC1))
    (ADDRESS = (PROTOCOL = TCP)(HOST = node41-vip)(PORT = 1521)
    (IP = FIRST))
    (ADDRESS = (PROTOCOL = TCP)(HOST = 192.168.10.41)(PORT = 1521)(IP = FIRST)
    SID_LIST_LISTENER =
    (SID_LIST =
    (SID_DESC =
    (SID_NAME = PLSExtProc)
    (ORACLE_HOME = /u01/app/oracle/product/11.2.0/db_1)
    (PROGRAM = extproc)
    Questions:
    <1> How to correctly setup extproc correctly under 11gR2?
    <2> Will my way in (2) will affect the SCAN single IP access functionality? (I assume SCAN is enabled at least partially by listener.ora under $GRID_HOME such that client can use simpler connection string)
    Thanks in advance.
    Edited by: user5852271 on Nov 18, 2009 9:04 PM

    user5852271 wrote:
    I think the document you mentioned is for 11gR1 not for 11gR2. If that is the case, you could go to the 11gR2 library and check the Networking docs yourself at http://www.oracle.com/pls/db112/portal.portal_db?selected=4&frame=#network_management
    >
    I felt that the 11gR1 should be named 10gR3, and 11gR2 should be 11gR1 because 11gR2 introduced a lot more new features.Good one. You should join Oracle Marketing.

  • How to setup external monitor?

    I know it's been asked numerous times before, but I can't find the solution I'm looking for.
    I'm running a dual 2.0 powermac g5, with dual 20" monitors for editing, and I'd like to hook up an external televison that ONLY shows the canvas in FCP 5.
    Here's the catch: I don't want to have to go through a camera to do this.
    There has to be an easy solution here... when I was in college, they had it setup that way, but they were on PC's and Premiere. Is going through a camera or a dv to analog converter box the ONLY way to do this?? How could it be so easy on a PC, and difficult on a mac. That just doesn't make sense.
    I'm sick of doing color correction, then having to burn to dvd, then going to watch it on the big screen just to see that the colors are totally different, and starting the whole process over again till I get it right.
    thanks -brown

    I pretty sure that the PC's at school DID NOT go through a converter box, and I'm positive they didn't go through a camera. If I remember correctly, it was just an audio/video cable that came directly out of the computer, and directly into the external monitor. Then it was as simple as setting it up in Adobe Premiere to just show the "canvas".
    I just don't see why mac would make it difficult. Seems to me that it should be a top priority for them to make it as simple as connecting a cable. Doesn't every editor want an external ntsc/pal monitor to view thier stuff?? and doesn't apple get a lot of thier sales from post production people??
    I don't get it. Oh well... I guess I'll put some money aside for the converter box.
    Any other ideas still welcome. I read a post in hear about the "screen spanning doctor" and I think someone said they got it to work that way... but it wasn't perfect.
    -brown

  • Re: How to setup database access in Forte Standalone?

    Hi Chang Chiang Seng,
    I've installed Forte Standalone on Windows 3.1 and would like to set
    it up to access an ODBC database.
    Is there anyway to do it, since I am not connected to any central node ?The following is a reply posted to this list earlier from Bobby Carp
    at Forte, which addresses your question:
    2. If you have Win 3.1 or Win 95, then you cannot run an environment
    manager or server partitions, but you can still connect to an ODBC
    database.
    Setting up an ODBC resource manager is very straight-forward. You do
    some
    of the work in the ODBC control panel (ie. mapping a name to a
    particular
    data source such as Access file, flat file, etc.). You then run Forte
    Standalone which will automatically use ODBC for any DBSessions or
    DBResourceMgr
    service objects that need to get created by a run. You don't need to
    change your service object to point to an ODBC Resource Mgr, the system
    does it automagically.
    Hope it helps,
    Kerry
    | | / \ Kerry Bellerose [email protected]
    | || C | Senior Consultant http://www.lindhard.com/
    | | \___/ Lindhard International
    | |_____ Datavej 52 direct: 45 45 94 01 03
    | | 3460 Birkeroed desk: 45 45 82 21 21
    |_________| Denmark fax: 45 45 82 21 22

    Hi Wilson,
    As a prerequisite , that VM need to access the gateway .
    It means that you need to
    create an external virtual switch then connect that VM to external virtual switch then allocate a LAN IP for VM .
    http://technet.microsoft.com/en-us/library/jj647786.aspx
    After this you may think of this VM as a physical machine in your LAN then do what you need .
    Best Regards
    Elton Ji
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • How to setup database access in Forte Standalone ?

    Hi,
    I've installed Forte Standalone on Windows 3.1 and would like to set it up to access an
    ODBC database.
    Is there anyway to do it, since I am not connected to any central node ?
    I tried to follow the instruction on the book but was not able to set up a DB Resource because
    the EConsole cannot be executed.
    Thanx.
    Chiang Seng, Chang
    <[email protected]>

    Hi Wilson,
    As a prerequisite , that VM need to access the gateway .
    It means that you need to
    create an external virtual switch then connect that VM to external virtual switch then allocate a LAN IP for VM .
    http://technet.microsoft.com/en-us/library/jj647786.aspx
    After this you may think of this VM as a physical machine in your LAN then do what you need .
    Best Regards
    Elton Ji
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • How to setup wireless access not to cross internal vlan?

    hi folks,
    I am about to set up a wireless network for our library users that come in from the public and bring their own laptops. We would like to have two options:
    1) they can open their laptop and just jump on without any authentication. but this traffic should not cross my internal vlans. I was thinking i'd put the AP off the DMZ.
    2) if they need to come inside they must create a vpn connection.
    would this be considered 'secure'?
    how best can i do this?

    Putting the AP in your DMZ is one of the classic wireless security techniques. It's quite secure in terms of protecting your private network- although there's obviously no control or security regarding unknown users accessing the public internet. Basically, you're giving free internet access to anyone who wants to use it... if this doesn't bother you and your only concern is your own private resources, go for it.
    Obviously, you'd need to make sure that your VPN solution is working properly for those users who are authorized for the private net.

  • How to setup real SFTP in Yosemite?

    There's lots and lots of information online about how to setup remote access to my mac using SSH and SFTP in Yosemite...but apparently none of it is actually useful for genuinely  remote access...access from outside my network, access from miles away.  Because here is what I have learned:
    The ip address listed in the Sharing pane when you access remote login is internal.  it's some version of 192.168.x.x, which is essentially everybody's computer and utterly useless from outside the network.
    So my actual public ip as assigned by my service provider is really my IP if you are trying to get to my computer from outside.
    But that IP doesn't "just work" via SSH or, much more importantly for me, SFTP.  Evidently that involves something called "port forwarding" which one used to be able to do via Airport Utility, but is no longer possible because such options do not exist in the current version of the utility.
    (What I want to achieve is for a friend of mine, a friend on a mac about 4 miles away,  to be able to directly access very large files on my computer. I don't want to use clouds or public sites or anything like that, I just want to be my own private little FTP server just for her. That used to be no big deal.)
    So... is there a solution for this?

    Dropbox may be a better option if you can both have accounts with enough storage, it is a simple setup process that can be forgotten about.
    Bittorrent sync is another option that mirrors data between several endpoints. You should get better performance if the files are not being transferred over the network (Dropbox & Bittorrent sync create copies at each end).
    ssh & port forwarding allows you to use sftp, if you do some more setup you can also use sshfuse to mount the remote content as a network disk, it's a plugin for http://osxfuse.github.io
    Just be aware that many scripts & botnets are constantly attempting to login on visible ssh ports on routers across the internet. Enabling ssh to outside access means that any user on you Mac can be a potential login - have good passwords set on ALL user accounts, and do not enable the root account password. There are also options to disable passwords in ssh (& use ssh keys only) if you want better security.
    ssh is good, but it is not trivial to setup and it won't open ports for you. Apps like bittorrent sync can use UPnP to request port forwarding rules, to make setup easier.
    Back to My Mac is OK, provided you are willing to hand over the keys to your Apple ID.
    P.S. You keep mentioning ftp, please avoid ftp. ftp can use plain text passwords that can be sniffed over the network, avoid opening the network to inbound ftp traffic too.

  • Lync 2010 Client unable to verify certificate - External access

    we have recently setup Lync 2013 and it is working fine internally.  I am now trying to setup external access. We only require the remote users to be able to use their client externally without VPN.  
    I have setup the edge server with 1 NAT'd public ip address and FQDN option. So the 3 services are using the same IP but different port(as shown below).  
    access access.domain.com port 5061
    webconf access.domain.com port 444
    A/V access.domain.com port 443
    I used our internal CA to issue internal and external certificates and then added the Internal CA as a trusted root CA on the machine with the client trying to connect externally.
    I have published the following records to external dns:
    _sip_tls.domain.com which points to access.domain.com
    access.domain.com points to the public ip on the firewall
    I expected at this point that I would be able to login. Auto configuration times out externally.  If I manually set the external server name to "access.domain.com" and try to sign in it says "there was a problem verifying the certificate
    from the server".  
    the logs on the client says: 
    SECURE_SOCKET: negotiation failed: 80090322, principal name: [access.domain.com]
    Also I can see the traffic going from my external client to the firewall to the edge server.
    I understand that the external certificate on the edge should be through a public CA but we won't be using any of federation options so my internal CA cert should work for logging in through the client?  What am i missing? 
    Let me know if i can provide more info.
    Thanks!

    Happy to help BUT..
    Just keeping with TechNet etiquette.
    we have moved on to a new issue so we really need to see a new question as that way the posts are helpful to the whole community and easy to find based on the question asked
    Some advice given above has assisted in directing you to the root cause, please mark these as helpful, remember that assistance is given voluntarily and every contributor needs recognition
    Please mark posts as answer/helpful if it answers your question.
    Blog -  LyncSorted

  • How I can set up the DynDns inside the Time capsule, or only with the Time capsule I have external access from a PC for ex.?

    How I can set up the DynDns inside the Time capsule, or only with the Time capsule I have external access from a PC for ex.?

    MobileMe service is finished.. to get remote access to the Mac or TC you use iCloud account.. but that is for files.. not to access web cams.
    Without dyndns client in the TC, you can perhaps run dyndns on the computer or video recorder..many of these will have clients built into them.
    Even better get a static Public IP from your ISP.. that is the correct professional way to do it.
    Or you can use whatever broadband modem you have and remove the TC as the main router.. simply bridge it. Use your adsl router for connection. Almost all adsl have built in dyndns.
    Sorry your language is very hard to follow.. and I am sure you are finding my answers similarly difficult.
    Basically the TC is about the hardest device to setup because it is lacking important networking functions.
    Get a vpn router and use vpn connection is far superior to any other method. But you cannot do it with TC.

Maybe you are looking for