Multiple network on 1 mac
Can I connect 2 different networks with 2 different IP on 1 G5 mac at same time by installing another network adapter?
Hi Taiqi & Welcome to the Discussions!
Yes you can, you can connect to a different network for every interface you have. I've seen up to 4 Ethernet cards, FW, Airport and USB adapter, all connected to different networks.
Similar Messages
-
Cant login multiple network accounts on the same client?
Setup:
I have created a simple Lion Server on a new i7 Mac Mini. I have configured Open Directory in Master mode and have setup 4 user accounts. I have enabled the File Sharing service and checked the "Make available for home directories" option on the "Users" file share. I have configured each of the 4 user accounts to use this location as the home folder. I have connected my client machines (all OSX Lion) to the Network Account Server.
Problem:
I can log one user into the client machine, but when using "Fast User Switching" and logging on as the second user I get the following error:
"You are unable to log in to the user account "guestaccount" at this time. Loggin to the account failed because an error occured"
In the console if I search for that user account the related error message is:
11-07-31 12:30:54.993 PM authorizationhost: ERROR | -[HomeDirMounter mountNetworkHomeWithURL:attributes:dirPath:username:] | PremountHomeDirectoryWithAuthentication( url=afp://inntaserver01.local/Users, homedir=/Network/Servers/inntaserver01.local/Users/guestaccount, name=guestaccount ) returned 16
Any thoughts as to why the Home Folder "mounter" failed in this scenario?Historically you have never been allowed to use Fast User Switching to log in multiple network logins on the same client machine. This certainly applied with Tiger, Leopard, and Snow Leopard. I have not yet personally tried this with Lion.
I believe that the underlying reason for this not being allowed is down to how AFP volumes are mounted. The AFP mount becomes 'owned' by the user that triggers the login. With a network login the first user becomes the owner and this means subsequent attempted network logins are denied access to that share and hence cannot access their home directories.
With Tiger, Leopard, and Snow Leopard servers, one could configure network home directories to be shared via NFS instead of AFP. NFS gets treated a lot different in terms of mounting, and is done more at a system level than a user level. While again I have not personally tried Fast User Switching with NFS shared home directories, this approach is specifically recommended by the authors of AquaConnect (a Macintosh Terminal Server solution) in order to allow multiple logins on the same Terminal Server. This seems to be for the same underlying reason. Using NFS does certainly work for use with AquaConnect and also works for the competing iRAPP Terminal Server product as well.
Unfortunately, Lion Server while it can be made to run an NFS server, will not let you configure using NFS for sharing home directories. I have actually reported this as a 'bug' in Lion server.
Neither the authors of AquaConnect or iRAPP have actually tested this scenario with Lion server yet, but AquaConnect do plan to investigate it. It could make it considerably more difficult to use their products.
So in summary, using NFS to share network home directories in theory would avoid the problem and can be done with a Tiger/Leopard/Snow Leopard server, but cannot be done with a Lion server. It is possible however to mix Lion with older server versions. This might for some people be a possible workaround.
PS. A bonus side-effect of using NFS shared home directories was that this allowed badly written software like Adobe's applications which are otherwise notorious for having major issues with network logins and home directories to work without errors. As an example Adobe Acrobat Pro introduced a bug in version 7.0 which prevented it being able to print-to-PDF (one of the major reasons to buy Acrobat Pro). It tooks two years for them to eventually fix this in Acrobat Pro 8.1 (I know because I spent that two years nagging them to fix it and was a beta tester). Unfortunately they then reintroduced the bug in Acrobat Pro 9.0. Fortunately I discovered this side-effect got round the issue although a clunkier workaround was also possible for Snow Leopard clients by redirecting certain folder paths. -
Multiple Vulnerabilities in Apple Mac OS X
Every few months, somebody (with a PC) emails me one of notices.
I assume Apple does their security updates othen enough to take care of this. Or am I wrong?
Who makes these notices?
What should I do when I get one of these notices?
Here's THe whole EMAIL:
Multiple Vulnerabilities in Apple Mac OS X
Multiple Vulnerabilities in Apple Mac OS X. The full text of the document is
provided below.
Joint Task Force - Global Network Operations
U N C L A S S I F I E D
Joint Task Force - Global Network Operations (JTF-GNO) Information Assurance
Vulnerability Technical Advisory
Title: Multiple Vulnerabilities in Apple Mac OS X
References:
Security Focus
http://www.securityfocus.com/bid/22948
STIG Finding Severity: Category I
CVE:
CVE-2005-2959
CVE-2006-0225
CVE-2006-0300
CVE-2006-1516
CVE-2006-1517
CVE-2006-2753
CVE-2006-3081
CVE-2006-3469
CVE-2006-4031
CVE-2006-4226
CVE-2006-4829
CVE-2006-4924
CVE-2006-5051
CVE-2006-5052
CVE-2006-5330
CVE-2006-5679
CVE-2006-5836
CVE-2006-6061
CVE-2006-6062
CVE-2006-6097
CVE-2006-6129
CVE-2006-6130
CVE-2006-6173
CVE-2007-0229
CVE-2007-0236
CVE-2007-0267
CVE-2007-0299
CVE-2007-0318
CVE-2007-0463
CVE-2007-0467
CVE-2007-0588
CVE-2007-0719
CVE-2007-0720
CVE-2007-0721
CVE-2007-0722
CVE-2007-0723
CVE-2007-0724
CVE-2007-0728
CVE-2007-0726
CVE-2007-0730
CVE-2007-0731
CVE-2007-0733
CVE-2007-1071
Executive Summary:
There are multiple vulnerabilities affecting Apple Mac Operating System
(OS) X and various Apple applications running on Mac OS X. Mac OS X is a
proprietary operating system developed and sold by Apple Computer, Inc.,
that is included with all currently shipped Apple Macintosh computers.
Mac OS X Server is architecturally identical to its desktop counterpart and
usually runs on Apple's line of Macintosh server hardware. It includes
workgroup management and administration software tools that provide
simplified access to key network services, including a mail server, a
directory server, and a domain name server. Apple Mac OS X is Apple's latest
OS software architecture. These vulnerabilities exist due to unchecked
buffers, error conditions, and incorrect security settings in the software.
Successful exploitation of these vulnerabilities may allow a remote attacker
to execute arbitrary code, access or modify arbitrary data, escalation of
privileges or cause denial of service conditions.
Technical Overview:
There are thirty vulnerabilities affecting Apple Mac Operating System OS X
and various Apple applications running on Mac OS X addressed in this latest
release. An attacker could exploit these vulnerabilities by enticing a user
to use a maliciously crafted website, image, program, or code; or by making
use of known implementation flaws. Results of an attacker exploiting any of
these vulnerabilities include the execution of arbitrary code, triggering a
Denial of Service (DoS), or elevation of user privileges.
The following specific vulnerabilities affecting Apple Mac OS X:
ColorSync Profile Vulnerability - CVE-2007-0719 A stack buffer overflow
exists in the handling of embedded ColorSync profiles. By enticing a user to
open a maliciously-crafted image, an attacker can trigger the overflow,
which may lead to an unexpected application termination or arbitrary code
execution. This update performs additional validation of ColorSync profiles.
Crash Reporter Vulnerability - CVE-2007-0467 Crash Reporter uses an
admin-writable system directory to store logs of processes that have been
unexpectedly terminated. A malicious process running as an admin can cause
these logs to be written to arbitrary files as root, which could result in
the execution of commands with elevated privileges. This update performs
additional validation prior to writing to log files.
CUPS Vulnerability - CVE-2007-0720
A partially-negotiated SSL connection with the CUPS service may prevent
other requests from being served until the connection is closed. Remote
attackers may cause a denial of service during SSL negotiation This update
implements timeouts during SSL negotiation.
Disk Images-Helper Vulnerability - CVE-2007-0721 A memory corruption
vulnerability exists in diskimages-helper. By enticing a user to open a
maliciously-crafted compressed disk image, an attacker could trigger this
issue which may lead to an unexpected application termination or arbitrary
code execution. Mounting a maliciously-crafted disk image may lead to an
unexpected application termination or arbitrary code execution. This update
performs additional validation of disk images.
AppleSingleEnding Disk Images Vulnerability - CVE-2007-0722 An integer
overflow vulnerability exists in the handler for AppleSingleEncoding disk
images. By enticing a local user to open a maliciously-crafted disk image,
an attacker could trigger the overflow which may lead to an unexpected
application termination or arbitrary code execution. Mounting a
maliciously-crafted AppleSingleEncoding disk image may lead to an unexpected
application termination or arbitrary code execution. This update performs
additional validation of AppleSingleEncoding disk images.
Multiple Malicious Disk Image Vulnerabilities - CVE-2006-6061,
CVE-2006-6062, CVE-2006-5679, CVE-2007-0229, CVE-2007-0267,
CVE-2007-0299
Several vulnerabilities exist in the processing of maliciously-crafted disk
images that may lead to an unexpected termination of system operations or
arbitrary code execution. Since a disk image may be automatically mounted
when visiting web sites, this allows a malicious web site to cause a denial
of service. This update performs additional validation of downloaded disk
images prior to mounting them.
Directory Service (DS) Plug-In Vulnerability - CVE-2007-0723 An
implementation flaw in DirectoryService allows an unprivileged LDAP user to
change the local root password. The authentication mechanism in
DirectoryService has been fixed in this release.
Flash Player Vulnerability - CVE-2006-5330 Adobe Flash Player is updated to
version 9.0.28.0 to fix a potential vulnerability that could allow HTTP
request splitting attacks. This is accomplished by playing a
maliciously-crafted Flash content on a vulnerable system. This issue is
described as APSB06-18 on the Adobe web site at
http://www.adobe.com/support/security/
Multiple GNU Tar Vulnerabilities - CVE-2006-0300, CVE-2006-6097 One GNU TAR
vulnerability involves a buffer overflow, which allows user-assisted
attackers to cause a denial of service (application crash) and possibly
execute arbitrary code via unspecified vectors involving PAX extended
headers. The second GNU TAR vulnerability allows user-assisted attackers to
overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES
record with a symbolic link. This record is not properly handled by the
extract_archive function in extract.c and
extract_mangle function in mangle.c.
HFS+ Filesystem Vulnerability - CVE-2007-0318
An HFS+ filesystem in a mounted disk image can be constructed to trigger a
kernel panic (denial of service) when attempting to remove a file from a
mounted filesystem. This update performs additional validation of the
HFS+ filesystem.
IOKit HID Vulnerability - CVE-2007-0724 Insufficient controls in the IOKit
HID interface allow any logged in user to capture console keystrokes,
including passwords and other sensitive information of other users on a
local system. This update limits HID device events to processes belonging to
the current console user.
ImageIO GIF Vulnerability - CVE-2007-1071 An integer overflow vulnerability
exists in the process of handling GIF files. By enticing a user to open a
maliciously-crafted image, an attacker can trigger the overflow which may
lead to an unexpected application termination or arbitrary code execution.
This issue does not affect systems prior to Mac OS X v10.4.
ImageIO Raw Images Vulnerability - CVE-2007-0733 A memory corruption issue
exists in the process of handling RAW images.
By enticing a user to open a maliciously-crafted RAW image, an attacker can
trigger the issue which may lead to an unexpected application termination or
arbitrary code execution. This update performs additional validation of RAW
images. This issue does not affect systems prior to Mac OS X v10.4.
Kernel Vulnerability via fpathconf() System Call - CVE-2006-5836 Malicious
local users may be able to cause a denial of service by using the
fpathconf() system call on certain file types. The result of this action
would be a kernel panic (denial of service). This update improves the
handling for all kernel defined file types.
Kernel Vulnerability via Universal Mach-O Binaries - CVE-2006-6129 An
integer overflow vulnerability exists in the loading of maliciously-crafted
Universal Mach-O binaries. This could allow a malicious local user to cause
a kernel panic, an arbitrary code execution, or the elevation of system
privileges. This update performs additional validation of Universal
binaries.
Kernel Vulnerability via sharedregion_make_privatenp() System Call -
CVE-2006-6173
The sharedregion_make_privatenp() system call allows a maliciously-crafted
program to request a large allocation of kernel memory. This could allow a
malicious local user to cause a system hang.
This issue does not allow an integer overflow to occur, and it cannot lead
to arbitrary code execution. This update incorporates additional validation
of the arguments passed to sharedregion_make_privatenp().
Multiple MySQL Server Vulnerabilities - CVE-2006-1516, CVE-2006-1517,
CVE-2006-2753, CVE-2006-3081, CVE-2006-4031, CVE-2006-4226,
CVE-2006-3469
Multiple vulnerabilities exist in MySQL which could be exploited by
attackers making use of known system flaws via specially crafted codes.
In addition to being able to execute arbitrary code, the attacker could also
exploit these vulnerabilities causing a denial of service or buffer
over-read; obtaining sensitive information; and creating/accessing a
database.
Networking Vulnerability via AppleTalk Protocol Handler - CVE-2006-6130 A
memory corruption issue exists in the AppleTalk protocol handler. This could
allow a malicious local user to cause a kernel panic, or gain system
privileges to execute arbitrary code. This update performs additional
validation of the input data structures.
Networking Vulnerability via AppleTalk Requests - CVE-2007-0236 A heap
buffer overflow vulnerability exists in the AppleTalk protocol handler. By
sending a maliciously-crafted request, a local user can trigger the overflow
which may lead to a denial of service or arbitrary code execution. This
update performs additional validation of the input data.
OpenSSH Keys Vulnerability - CVE-2007-0726 A remote attacker can destroy
established trust between SSH hosts by causing SSH Keys to be regenerated.
SSH keys are created on a server when the first SSH connection is
established. An attacker connecting to the server before SSH has finished
creating the keys could force the keys then to be recreated. This could
result in a denial of service against processes that rely on a trust
relationship with the server.
Systems that already have SSH enabled and have rebooted at least once are
not vulnerable to this issue. This issue is addressed by improving the SSH
key generation process. This issue is specific to the Apple implementation
of OpenSSH.
Multiple OpenSSH Vulnerabilities - CVE-2006-0225, CVE-2006-4924,
CVE-2006-5051, CVE-2006-5052 Multiple vulnerabilities exist in OpenSSH, to
include compilation and faulty authentication errors. An attacker could use
these vulnerabilities in specially crafted codes/commands to cause the
execution of arbitrary code, or a denial of service.
USB Printing Vulnerability - CVE-2007-0728 Insecure file operations may
occur during the initialization of a USB printer. An unprivileged attacker
with system privileges may leverage this issue to create or overwrite
arbitrary files on the system. This update improves the printer
initialization process.
QuickDraw PICT Image Processing Vulnerability - CVE-2007-0588 A heap buffer
overflow vulnerability exists in QuickDraw's PICT image processing. By
enticing a user to open a maliciously-crafted PICT image, an attacker can
trigger the overflow which may lead to an unexpected application termination
or arbitrary code execution. This update performs additional validation of
PICT files.
servermgrd Authentication Credentials Vulnerability - CVE-2007-0730 An issue
in Server Manager's validation of authentication credentials could allow a
remote attacker without valid credentials to alter the system configuration.
This update addresses the issue by additional validation of authentication
credentials.
SMB File Server Vulnerability - CVE-2007-0731 A stack-based buffer overflow
in the Apple-specific Samba module (SMB File Server) allows a user with
write access to an SMB share to execute arbitrary code via a long ACLA file
with an overly-long ACL. This could lead to a denial of service or arbitrary
code execution. This update performs additional validation of ACLs. This
issue does not affect systems prior to Mac OS X v10.4.
Software Update Application Vulnerability - CVE-2007-0463 A format string
vulnerability exists in the Software Update application.
By enticing a user to download and open a maliciously-crafted Software
Update Catalog file, an attacker can trigger the vulnerability which may
lead to an unexpected application termination or arbitrary code execution.
This update removes document bindings for Software Update Catalogs. This
issue does not affect systems prior to Mac OS X v10.4.
sudo Configuration Vulnerability - CVE-2005-2959 A user-modified sudo
configuration could allow environment variables to be passed through to the
program running as a privileged user. If sudo is configured to allow an
otherwise unprivileged user to execute a given bash script with elevated
privileges, the user may be able to execute arbitrary code with elevated
privileges. Systems with the default sudo configuration are not vulnerable
to this issue. This issue has been addressed by updating sudo to 1.6.8p12.
Further information is available via the sudo web site at
http://www.sudo.ws/sudo/current.html
Blojsom WebLog Vulnerability - CVE-2006-4829 A cross-site scripting
vulnerability exists in Blojsom. This allows remote attackers to inject
JavaScript into blog content that will execute in the domain of the Blojsom
server. This update performs additional validation of the user input. This
issue does not affect systems prior to Mac OS X v10.4.
Vulnerable Applications/Systems and Countermeasures:
Vulnerable applications/systems with fixes available:
Compliance is RECOMMENDED. Although this notice is a Technical Advisory,
Systems Administrators should strongly consider implementing these updates.
Apple Mac OS X 10.3.9
Apple Mac OS X 10.4.0
Apple Mac OS X 10.4.1
Apple Mac OS X 10.4.2
Apple Mac OS X 10.4.3
Apple Mac OS X 10.4.4
Apple Mac OS X 10.4.5
Apple Mac OS X 10.4.6
Apple Mac OS X 10.4.7
Apple Mac OS X 10.4.8
Apple Mac OS X Server 10.3.9
Apple Mac OS X Server 10.4.0
Apple Mac OS X Server 10.4.1
Apple Mac OS X Server 10.4.2
Apple Mac OS X Server 10.4.3
Apple Mac OS X Server 10.4.4
Apple Mac OS X Server 10.4.5
Apple Mac OS X Server 10.4.6
Apple Mac OS X Server 10.4.7
Apple Mac OS X Server 10.4.8
Temporary Mitigation Strategies
None
Vulnerable applications/systems with no patches available, vendor temporary
recommended mitigations available:
Permanent fixes are not available. Temporary mitigations have been provided
to protect vulnerable systems until permanent patches are available.
Administrators should consider using the temporary mitigations provided or
develop local strategies to protect vulnerable systems from attack.
None
Vulnerable applications/systems with no patch or temporary recommended
mitigations:
There are no patches or temporary mitigations available. Administrators
should consider developing strategies to protect vulnerable systems based on
local mission requirements and operational impact. As patches or workarounds
become available the status will be upgraded to "Fix available" or
"Mitigation Available".
None
Unsupported Software:
Mac OS X versions prior to 10.3.9Who's sending you these emails and why? It sounds like a Windows apologist with an inferiority complex trying to make OS X look bad. The facts are that there are no viruses or malware in the wild at this time actively compromising OS X users. Discovered flaws and vulnerabilities do not immediately translate into active malware on OS X like they do on Windows. Apple releases security updates on a regular basis. The recent OS X 10.4.9 update, for example, provided fixes for some 45 known security issues. OS X is by no means a perfect piece of code but you are infinitely safer on the internet using OS X than you are using any version of Windows, including the new Vista.
As to who makes these notices there are security researchers and companies whose job it is to find and report security flaws in any operating system or application they choose to inspect. They provide a valuable service to companies like Apple and Microsoft in helping them close holes in their software.
CVE stands for "Common Vulnerabilities and Exposures" and is a standardized way of cataloging security issues. CVE is supported by CERT (Computer Emergency Response Team) which in turn is supported by the Federal Government and the Department of Homeland Security.
Here is the web site link...
http://cve.mitre.org/about/
The best response when you get one of these emails is to do nothing. Instead, keep your system current and up-to-date with all security updates and OS X updates released by Apple. And above all, don't worry.
Dual 2.5GHz G5 Power Macintosh Mac OS X (10.4.9) -
Questions about setting up my network with my Mac Pro?
I'm trying to set up my network with my Mac Pro. I have two other roommates that need internet and a printer that we all need to access. The modem is with my Mac Pro in room 1, the printer is with another PC in room 2, and another PC with wifi is in room 3. What is the best way to connect all these.
My idea was to install an Airport card in my Mac Pro, then add an Airport Express station w/airtunes to room 2, to connect the PC and printer. That way, room 3 can access with wifi, and room 2 can physically plug into the Airport Express station. Problem with that is that the Airport Express Card must be professionally installed in my Mac Pro and that $80+ charge on top of the Airport Express and Aiport Card itself, turns this into a $200+ endeavor.
I also have a wireless Linksys router and Linksys WiFi USB receiver. Anybody have any other ideas?
Mac Pro Mac OS X (10.4.9)Your plan wouldn't work anyway. The Mac Pro can not create a WDS compatible wireless network. Therefore the AirPort Express (AX) can not use WDS to wirelessly join the network. Therefore the AX's Ethernet port will not be activated.
The best solution is to buy an inexpensive wireless router [or the AirPort Extreme base station (AEBS)]. Connect the Mac Pro via Ethernet to the router. Add a wireless adapter to the PC in room 2. Therefore the PCs will connect wirelessly while the Mac Pro connects via Ethernet. -
i am trying to have multiple users on my mac can you help?
iTunes: How to share music between different accounts on a single computer
<http://support.apple.com/kb/HT1203> -
How do you share Aperture file across multiple users on same Mac?
How do you share Aperture file across multiple users on same Mac? Seems this should be a preferences choice.
When you share your library between users, you may run into permission and ownership problems, if both users are editing the Aperture library and not only reading it. To avoid that, it helps to put the Aperture library onto a separate disk or a separate partion of your hard drive. For s separate partition or disk you can enable the "ignore ownership on this volume" flag. Then all users can access the library as owners of this library.
You might try to put the aperture library into a shared folder on your mac, but that has caused problems recently, i.e. when the library also contains video files.
Regards
Léonie -
Can i have multiple monitor with my mac mini ?
Can i have multiple monitor with my mac mini like i do with my PC ? 2 differents screens.. not mirror.
There's lots of Mac Mini models since 2006 or so. What do you have?
Most support two monitors but how you do it is different depending on model.
Put this phrase into Google
dual monitors, mac mini
and you'll come up with the solution needed based on which MM you have. -
Can I use my Time Capsule to set up multiple networks, or just one?
Can I use my Time Capsule to set up multiple networks, or just one? We'd like to offer the internet to clients who are at our studio, but don't want them able to access all our computers, so a second network for them would be useful.
Two big IFs here.
Not all versions of the Time Capsule have Guest Networking capability, so it might be a good idea to verify that first. Can you provide the model number of your Time Capsule. it's on the bottom of the device.....starts with an "A" followed by four numbers.
Next, assuming that the Time Capsule has Guest Network capability, the next requirement would be to verify that your modem is compatible with the Time Capsule for that feature.
Basically, you need a simple modem.....not a modem/router or gateway device that is often furnished by Internet Service Providers. If you are not sure what you have, post back with the make and model number of your "modem" and we'll see if we can find some details ont he device. -
Is it possible to create a configuration profile that will install multiple network printers and their associated drivers?
I was not able to find profile manager on my employer's installation of 10.6 Server. Is this only a feature of 10.7/10.8 server?10.6 server does not have profile manager, profile manager is only available in 10/7 and 10.8 server
for 10.6 server you'll need to use wgm and server admin
printer management with 10.6, I recommend you read the relevant server manuals regarding
print server and user management, printer management -
Microsoft Remote Desktop and small network, pc and macs
I have a machine running 8.1 pro with a connected printer, networked via an unmanaged switch to two macs in the network. One mac is a headless mac mini, the other is a mac pro i am using to access the pc via MRD. This network is not connected to the internet.
I can ping the pc from the macpro, and can see files shared on the pc, but cannot get MRD to connect.
One network cable from the macpro is connected to the isp's router, the other to the switch connecting the three machines. That second connection has a self-assigned ip, and the internet connection on the macpro is not shared.
On the pc in ipv4 properties, the ip address is set manually. Ip address and subnet mask are there (169.254.94.25 and 255.255.0.0) and default gateway is blank. Workgroup is set up as private. Remote Desktop is enabled. Firewall seems to be right. Windows
Network Diagnostic says no issues detected.
I've tried MDR settings with the ip address of the pc in gateway and also without, leaving gateway blank and just using the name of the pc with the same result: "Unable to connect to remote PC. Please verify Remote Desktop is enabled,..."
The switch and cables are good. If I connect the switch to the router and change the ipv4 address to automatic, I can connect to the PC with MRD.
Any suggestions? Is there a setting I'm missing? I've searched the Microsoft site for help but find only the most general instructions, which I think I've followed.
I've asked this question on the Windows Web and Network discussion and was advised to post it here by the support engineer.Hello JAS42,
If my understanding is right, one network cable from MAC pro is connect to the switch and the Windows 8.1 PC is connect to the switch too, and the IP setting in the Windows 8.1 is ‘(169.254.94.25 and 255.255.0.0) and default gateway is blank’.
If a DHCP server cannot be found or does not respond after one minute, the DHCP client checks the settings on the Alternate Configuration tab of the properties of the TCP/IP protocol.
If Automatic private IP address is selected, the DHCP client auto-configures its IP address and subnet mask by using a selected address from the Microsoft-reserved Class B network, 169.254.0.0, with the subnet mask 255.255.0.0.
Does the switch have the dhcp function?
What is the network setting in the MAC pro? We could manually configure the IP settings of Windows 8.1 network connection and the connection in the MAC to the switch in the same subnet, and then check if the issue still exists.
For more information about subnet, please take a look at the following article.
http://technet.microsoft.com/en-us/library/cc958832.aspx
Best regards,
Fangzhou CHEN
Fangzhou CHEN
TechNet Community Support -
Connect to one wireless network when multiple networks with the same name
Hi all,
I'm at a location where there are two networks with the name (e.g.) "wireless". One uses WEP and one uses WPA. The WEP network is weaker than the WPA network, so my Mac tries to connect to the WPA network, even though I have manually setup the wireless network with WEP security (after trying to connect it asks for a WPA password). Is there a way that I can connect to a wireless network by MAC Address, or some way for me to tell the Macbook to ignore the WPA network? The problem is that the SSID is the same, it seems.
Thanks,
NateThe person (the landlord) isn't tech-savvy at all.
That is clearly obvious as
1. They would not be using WEP
2. They would setup a different SSID
WEP is not secure and can be cracked in minutes using tools readily available on the internet. If a hacker gain access to that network they could run other tools and hijack the dns and then you could be visiting sites on your mac that are completely bogus but look real.
Also it is common trick that hackers use is to setup an access point nearby with the sane SSID to capture details from users that join their network thinking they have joined their own network. Again the hacker can hijack the dns and monitor all your browsing and capture details.
The fact that someone has setup an SSID nearby with the same name would make me very suspicious.
I would treat your landlord's network as an untrusted network same as when your using a public wifi like coffebucks. -
Multiple network location servers possible?
As we all know the network location server is an important part of any Direct Access deployment to ensure that DA clients can know whether they are connected directly to the internal LAN or connecting from external via DA.
I have seen discussion about deploying the network location server (simple blank IIS/Apache web site) in an NLB configuration but is there any way to have multiple network location servers for high availability reasons? During the DA configuration
process you can only input a single dns record for the NLS so it does not appear possible. Has anyone found a way to do this?Hi,
Yes it's a good practice to have NLB in high-availability. So a single FQDN with NLB or HLB as high-availability solution. Major problem is when DirectAccess clients connected on LAN cannot join the Network Location server. They consider they are connected
on Internet not on LAN and try to activate DirectAccess. In such situation, If users can disable DirectAccess (so no force tunneling) they can solve the problem. Once NLS is back online, computer automatically change the firewall profile to domain.
BenoitS - Simple by Design http://danstoncloud.com/blogs/simplebydesign/default.aspx -
ASDM multiple network objects vs group for rules
I was just curious if there are any performance benefits of using multiple network objects on multiple rules vs consolidating them into fewer rules by grouping them?
For example, I have about 10 lines of NAT exempt rules from the same source to multiple destinations. Is there anything to be gained if I consolidated those into a single rule using an object group for the multiple destinations aside from cleaning up the clutter in ASDM?
ThanksHello Tony,
Of course, it will be better because the processing that the ASA is going to use to determine witch rule to match would be decremented, also it would take less space on the configuration file (memory). those are some of the pros regarding creating groups for particular rules.
Sometimes a huge configuration file can increment the CPU usage,etc,etc. so it is better to keep it as small and organized as possible.
Please rate helpful posts.
Regards,
Julio -
Use of multiple networks in projects
Hi,
I know the standard hierarchy in Project systems like we have definition, then main WBS, then networks, then sub WBS and then activities. Now in this standard hierarchy, even though the activities are under WBS elements, the activities are connected to one network and in network graphic we can define the relationship among the various activities.
I mean by using the single network we can achieve the various objectives, then why most of the projects use multiple networks i.e. network per each WBS elements even though these multiple networks are connected to one network only.
ThanksHai
The criteria according to which a project is structured using a work breakdown structure and/or networks can vary and depend on the type and complexity of a project. A project can therefore also consist of a work breakdown structure and several /single networks.
For example, the criteria can vary depending on the responsibility and structure of the departments or teams involved, or on how production and assembly are integrated. It is therefore impossible to give a wholesale answer to
the question of how best to structure different types of projects.
As a rule, a project is structured according to two
points of view: structure and process.Network techniques are used for planning and controlling the process flow of projects.
ENJOY SAP
Regards
PP -
ACS 5.4 multiple network interfaces support
In ACS 5.4 release note, it says:
Multiple network interface connector support
ACS 5.4 supports up to four network interfaces: Ethernet 0, Ethernet 1, Ethernet 2, and Ethernet 3. ACS management functions use only the Ethernet 0 interface, but AAA protocols use all configured network interfaces. You must connect the ACS nodes in the distributed deployment only to the Ethernet 0 interface. Therefore, the syslog messages are sent and received at the log collector's Ethernet 0 interface. Data forwarding from one interface to another interface is prohibited to prevent potential security issues. The external identity stores are supported only on the Ethernet 0 interface. In ACS 5.4, multiple network interface connectors are also supported for proxies.
But in the CSACS 1121 Series Appliance Rear View section, it still says on Ethernet 0 is usable. All other interfaces are blocked.
I am confused. Can anyone clarify for me if we can use multiple network interface in ACS 5.4? What about management interface?
Thanks!We configured 2 interfaces in past within testing enviornment and it worked. ACS 5.4 supports multiple network interfaces on the UCS platform, on a virtual machine and on the legacy ACS 5.x IBM/CAM hardware. The ACS management functions use the interface eth0 only and the AAA protocols use all available network interfaces.
Jatin Katyal
- Do rate helpful posts -
Maybe you are looking for
-
File to Proxy (Inbound)
Hi, I have file to inbound proxy with data posting to ECC using web services WSDL. The message in message monitoring shows successful but the data is not getting posted in the ECC. Please advice, Thanks
-
Preview and print a printout in production order release
Iu2019m using CO02 to release and save the production order. Currently u201Cbatch cardu201D printout is automatically printed in production order release. I want to change this to preview the printout before printout is send to the printer. Can someo
-
Converting TIFF to JPEG with sips, then import into iPhoto problems
I am cataloguing a box of slides and negatives for my family. The scanner generates huge TIFF files (on purpose), and I have an Applescript that then uses sips to copy them into low quality JPEG files using this command: do shell script ("sips -s for
-
My files are suddenly going dark after certain operations?
Last week a very strange (and new) thing began to happen. If I have multiple files open in tabbed viewing and I perform certain operations on any one of the open files, all of the open files suddenly darken considerably. It looks as though I had cr
-
Deletion button in Mointior SC
Hi, I want to disable the Delete Icon in BBP_MON_SC tranaction.. How can i achieve this?? thanks...