Multiple network on 1 mac

Can I connect 2 different networks with 2 different IP on 1 G5 mac at same time by installing another network adapter?

Hi Taiqi & Welcome to the Discussions!
Yes you can, you can connect to a different network for every interface you have. I've seen up to 4 Ethernet cards, FW, Airport and USB adapter, all connected to different networks.

Similar Messages

  • Cant login multiple network accounts on the same client?

    Setup:
    I have created a simple Lion Server on a new i7 Mac Mini. I have configured Open Directory in Master mode and have setup 4 user accounts. I have enabled the File Sharing service and checked the "Make available for home directories" option on the "Users" file share. I have configured each of the 4 user accounts to use this location as the home folder. I have connected my client machines (all OSX Lion) to the Network Account Server.
    Problem:
    I can log one user into the client machine, but when using "Fast User Switching" and logging on as the second user I get the following error:
    "You are unable to log in to the user account "guestaccount" at this time. Loggin to the account failed because an error occured"
    In the console if I search for that user account the related error message is:
    11-07-31 12:30:54.993 PM authorizationhost: ERROR | -[HomeDirMounter mountNetworkHomeWithURL:attributes:dirPath:username:] | PremountHomeDirectoryWithAuthentication( url=afp://inntaserver01.local/Users, homedir=/Network/Servers/inntaserver01.local/Users/guestaccount, name=guestaccount ) returned 16
    Any thoughts as to why the Home Folder "mounter" failed in this scenario?

    Historically you have never been allowed to use Fast User Switching to log in multiple network logins on the same client machine. This certainly applied with Tiger, Leopard, and Snow Leopard. I have not yet personally tried this with Lion.
    I believe that the underlying reason for this not being allowed is down to how AFP volumes are mounted. The AFP mount becomes 'owned' by the user that triggers the login. With a network login the first user becomes the owner and this means subsequent attempted network logins are denied access to that share and hence cannot access their home directories.
    With Tiger, Leopard, and Snow Leopard servers, one could configure network home directories to be shared via NFS instead of AFP. NFS gets treated a lot different in terms of mounting, and is done more at a system level than a user level. While again I have not personally tried Fast User Switching with NFS shared home directories, this approach is specifically recommended by the authors of AquaConnect (a Macintosh Terminal Server solution) in order to allow multiple logins on the same Terminal Server. This seems to be for the same underlying reason. Using NFS does certainly work for use with AquaConnect and also works for the competing iRAPP Terminal Server product as well.
    Unfortunately, Lion Server while it can be made to run an NFS server, will not let you configure using NFS for sharing home directories. I have actually reported this as a 'bug' in Lion server.
    Neither the authors of AquaConnect or iRAPP have actually tested this scenario with Lion server yet, but AquaConnect do plan to investigate it. It could make it considerably more difficult to use their products.
    So in summary, using NFS to share network home directories in theory would avoid the problem and can be done with a Tiger/Leopard/Snow Leopard server, but cannot be done with a Lion server. It is possible however to mix Lion with older server versions. This might for some people be a possible workaround.
    PS. A bonus side-effect of using NFS shared home directories was that this allowed badly written software like Adobe's applications which are otherwise notorious for having major issues with network logins and home directories to work without errors. As an example Adobe Acrobat Pro introduced a bug in version 7.0 which prevented it being able to print-to-PDF (one of the major reasons to buy Acrobat Pro). It tooks two years for them to eventually fix this in Acrobat Pro 8.1 (I know because I spent that two years nagging them to fix it and was a beta tester). Unfortunately they then reintroduced the bug in Acrobat Pro 9.0. Fortunately I discovered this side-effect got round the issue although a clunkier workaround was also possible for Snow Leopard clients by redirecting certain folder paths.

  • Multiple Vulnerabilities in Apple Mac OS X

    Every few months, somebody (with a PC) emails me one of notices.
    I assume Apple does their security updates othen enough to take care of this. Or am I wrong?
    Who makes these notices?
    What should I do when I get one of these notices?
    Here's THe whole EMAIL:
    Multiple Vulnerabilities in Apple Mac OS X
    Multiple Vulnerabilities in Apple Mac OS X. The full text of the document is
    provided below.
    Joint Task Force - Global Network Operations
    U N C L A S S I F I E D
    Joint Task Force - Global Network Operations (JTF-GNO) Information Assurance
    Vulnerability Technical Advisory
    Title: Multiple Vulnerabilities in Apple Mac OS X
    References:
    Security Focus
    http://www.securityfocus.com/bid/22948
    STIG Finding Severity: Category I
    CVE:
    CVE-2005-2959
    CVE-2006-0225
    CVE-2006-0300
    CVE-2006-1516
    CVE-2006-1517
    CVE-2006-2753
    CVE-2006-3081
    CVE-2006-3469
    CVE-2006-4031
    CVE-2006-4226
    CVE-2006-4829
    CVE-2006-4924
    CVE-2006-5051
    CVE-2006-5052
    CVE-2006-5330
    CVE-2006-5679
    CVE-2006-5836
    CVE-2006-6061
    CVE-2006-6062
    CVE-2006-6097
    CVE-2006-6129
    CVE-2006-6130
    CVE-2006-6173
    CVE-2007-0229
    CVE-2007-0236
    CVE-2007-0267
    CVE-2007-0299
    CVE-2007-0318
    CVE-2007-0463
    CVE-2007-0467
    CVE-2007-0588
    CVE-2007-0719
    CVE-2007-0720
    CVE-2007-0721
    CVE-2007-0722
    CVE-2007-0723
    CVE-2007-0724
    CVE-2007-0728
    CVE-2007-0726
    CVE-2007-0730
    CVE-2007-0731
    CVE-2007-0733
    CVE-2007-1071
    Executive Summary:
    There are multiple vulnerabilities affecting Apple Mac Operating System
    (OS) X and various Apple applications running on Mac OS X. Mac OS X is a
    proprietary operating system developed and sold by Apple Computer, Inc.,
    that is included with all currently shipped Apple Macintosh computers.
    Mac OS X Server is architecturally identical to its desktop counterpart and
    usually runs on Apple's line of Macintosh server hardware. It includes
    workgroup management and administration software tools that provide
    simplified access to key network services, including a mail server, a
    directory server, and a domain name server. Apple Mac OS X is Apple's latest
    OS software architecture. These vulnerabilities exist due to unchecked
    buffers, error conditions, and incorrect security settings in the software.
    Successful exploitation of these vulnerabilities may allow a remote attacker
    to execute arbitrary code, access or modify arbitrary data, escalation of
    privileges or cause denial of service conditions.
    Technical Overview:
    There are thirty vulnerabilities affecting Apple Mac Operating System OS X
    and various Apple applications running on Mac OS X addressed in this latest
    release. An attacker could exploit these vulnerabilities by enticing a user
    to use a maliciously crafted website, image, program, or code; or by making
    use of known implementation flaws. Results of an attacker exploiting any of
    these vulnerabilities include the execution of arbitrary code, triggering a
    Denial of Service (DoS), or elevation of user privileges.
    The following specific vulnerabilities affecting Apple Mac OS X:
    ColorSync Profile Vulnerability - CVE-2007-0719 A stack buffer overflow
    exists in the handling of embedded ColorSync profiles. By enticing a user to
    open a maliciously-crafted image, an attacker can trigger the overflow,
    which may lead to an unexpected application termination or arbitrary code
    execution. This update performs additional validation of ColorSync profiles.
    Crash Reporter Vulnerability - CVE-2007-0467 Crash Reporter uses an
    admin-writable system directory to store logs of processes that have been
    unexpectedly terminated. A malicious process running as an admin can cause
    these logs to be written to arbitrary files as root, which could result in
    the execution of commands with elevated privileges. This update performs
    additional validation prior to writing to log files.
    CUPS Vulnerability - CVE-2007-0720
    A partially-negotiated SSL connection with the CUPS service may prevent
    other requests from being served until the connection is closed. Remote
    attackers may cause a denial of service during SSL negotiation This update
    implements timeouts during SSL negotiation.
    Disk Images-Helper Vulnerability - CVE-2007-0721 A memory corruption
    vulnerability exists in diskimages-helper. By enticing a user to open a
    maliciously-crafted compressed disk image, an attacker could trigger this
    issue which may lead to an unexpected application termination or arbitrary
    code execution. Mounting a maliciously-crafted disk image may lead to an
    unexpected application termination or arbitrary code execution. This update
    performs additional validation of disk images.
    AppleSingleEnding Disk Images Vulnerability - CVE-2007-0722 An integer
    overflow vulnerability exists in the handler for AppleSingleEncoding disk
    images. By enticing a local user to open a maliciously-crafted disk image,
    an attacker could trigger the overflow which may lead to an unexpected
    application termination or arbitrary code execution. Mounting a
    maliciously-crafted AppleSingleEncoding disk image may lead to an unexpected
    application termination or arbitrary code execution. This update performs
    additional validation of AppleSingleEncoding disk images.
    Multiple Malicious Disk Image Vulnerabilities - CVE-2006-6061,
    CVE-2006-6062, CVE-2006-5679, CVE-2007-0229, CVE-2007-0267,
    CVE-2007-0299
    Several vulnerabilities exist in the processing of maliciously-crafted disk
    images that may lead to an unexpected termination of system operations or
    arbitrary code execution. Since a disk image may be automatically mounted
    when visiting web sites, this allows a malicious web site to cause a denial
    of service. This update performs additional validation of downloaded disk
    images prior to mounting them.
    Directory Service (DS) Plug-In Vulnerability - CVE-2007-0723 An
    implementation flaw in DirectoryService allows an unprivileged LDAP user to
    change the local root password. The authentication mechanism in
    DirectoryService has been fixed in this release.
    Flash Player Vulnerability - CVE-2006-5330 Adobe Flash Player is updated to
    version 9.0.28.0 to fix a potential vulnerability that could allow HTTP
    request splitting attacks. This is accomplished by playing a
    maliciously-crafted Flash content on a vulnerable system. This issue is
    described as APSB06-18 on the Adobe web site at
    http://www.adobe.com/support/security/
    Multiple GNU Tar Vulnerabilities - CVE-2006-0300, CVE-2006-6097 One GNU TAR
    vulnerability involves a buffer overflow, which allows user-assisted
    attackers to cause a denial of service (application crash) and possibly
    execute arbitrary code via unspecified vectors involving PAX extended
    headers. The second GNU TAR vulnerability allows user-assisted attackers to
    overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES
    record with a symbolic link. This record is not properly handled by the
    extract_archive function in extract.c and
    extract_mangle function in mangle.c.
    HFS+ Filesystem Vulnerability - CVE-2007-0318
    An HFS+ filesystem in a mounted disk image can be constructed to trigger a
    kernel panic (denial of service) when attempting to remove a file from a
    mounted filesystem. This update performs additional validation of the
    HFS+ filesystem.
    IOKit HID Vulnerability - CVE-2007-0724 Insufficient controls in the IOKit
    HID interface allow any logged in user to capture console keystrokes,
    including passwords and other sensitive information of other users on a
    local system. This update limits HID device events to processes belonging to
    the current console user.
    ImageIO GIF Vulnerability - CVE-2007-1071 An integer overflow vulnerability
    exists in the process of handling GIF files. By enticing a user to open a
    maliciously-crafted image, an attacker can trigger the overflow which may
    lead to an unexpected application termination or arbitrary code execution.
    This issue does not affect systems prior to Mac OS X v10.4.
    ImageIO Raw Images Vulnerability - CVE-2007-0733 A memory corruption issue
    exists in the process of handling RAW images.
    By enticing a user to open a maliciously-crafted RAW image, an attacker can
    trigger the issue which may lead to an unexpected application termination or
    arbitrary code execution. This update performs additional validation of RAW
    images. This issue does not affect systems prior to Mac OS X v10.4.
    Kernel Vulnerability via fpathconf() System Call - CVE-2006-5836 Malicious
    local users may be able to cause a denial of service by using the
    fpathconf() system call on certain file types. The result of this action
    would be a kernel panic (denial of service). This update improves the
    handling for all kernel defined file types.
    Kernel Vulnerability via Universal Mach-O Binaries - CVE-2006-6129 An
    integer overflow vulnerability exists in the loading of maliciously-crafted
    Universal Mach-O binaries. This could allow a malicious local user to cause
    a kernel panic, an arbitrary code execution, or the elevation of system
    privileges. This update performs additional validation of Universal
    binaries.
    Kernel Vulnerability via sharedregion_make_privatenp() System Call -
    CVE-2006-6173
    The sharedregion_make_privatenp() system call allows a maliciously-crafted
    program to request a large allocation of kernel memory. This could allow a
    malicious local user to cause a system hang.
    This issue does not allow an integer overflow to occur, and it cannot lead
    to arbitrary code execution. This update incorporates additional validation
    of the arguments passed to sharedregion_make_privatenp().
    Multiple MySQL Server Vulnerabilities - CVE-2006-1516, CVE-2006-1517,
    CVE-2006-2753, CVE-2006-3081, CVE-2006-4031, CVE-2006-4226,
    CVE-2006-3469
    Multiple vulnerabilities exist in MySQL which could be exploited by
    attackers making use of known system flaws via specially crafted codes.
    In addition to being able to execute arbitrary code, the attacker could also
    exploit these vulnerabilities causing a denial of service or buffer
    over-read; obtaining sensitive information; and creating/accessing a
    database.
    Networking Vulnerability via AppleTalk Protocol Handler - CVE-2006-6130 A
    memory corruption issue exists in the AppleTalk protocol handler. This could
    allow a malicious local user to cause a kernel panic, or gain system
    privileges to execute arbitrary code. This update performs additional
    validation of the input data structures.
    Networking Vulnerability via AppleTalk Requests - CVE-2007-0236 A heap
    buffer overflow vulnerability exists in the AppleTalk protocol handler. By
    sending a maliciously-crafted request, a local user can trigger the overflow
    which may lead to a denial of service or arbitrary code execution. This
    update performs additional validation of the input data.
    OpenSSH Keys Vulnerability - CVE-2007-0726 A remote attacker can destroy
    established trust between SSH hosts by causing SSH Keys to be regenerated.
    SSH keys are created on a server when the first SSH connection is
    established. An attacker connecting to the server before SSH has finished
    creating the keys could force the keys then to be recreated. This could
    result in a denial of service against processes that rely on a trust
    relationship with the server.
    Systems that already have SSH enabled and have rebooted at least once are
    not vulnerable to this issue. This issue is addressed by improving the SSH
    key generation process. This issue is specific to the Apple implementation
    of OpenSSH.
    Multiple OpenSSH Vulnerabilities - CVE-2006-0225, CVE-2006-4924,
    CVE-2006-5051, CVE-2006-5052 Multiple vulnerabilities exist in OpenSSH, to
    include compilation and faulty authentication errors. An attacker could use
    these vulnerabilities in specially crafted codes/commands to cause the
    execution of arbitrary code, or a denial of service.
    USB Printing Vulnerability - CVE-2007-0728 Insecure file operations may
    occur during the initialization of a USB printer. An unprivileged attacker
    with system privileges may leverage this issue to create or overwrite
    arbitrary files on the system. This update improves the printer
    initialization process.
    QuickDraw PICT Image Processing Vulnerability - CVE-2007-0588 A heap buffer
    overflow vulnerability exists in QuickDraw's PICT image processing. By
    enticing a user to open a maliciously-crafted PICT image, an attacker can
    trigger the overflow which may lead to an unexpected application termination
    or arbitrary code execution. This update performs additional validation of
    PICT files.
    servermgrd Authentication Credentials Vulnerability - CVE-2007-0730 An issue
    in Server Manager's validation of authentication credentials could allow a
    remote attacker without valid credentials to alter the system configuration.
    This update addresses the issue by additional validation of authentication
    credentials.
    SMB File Server Vulnerability - CVE-2007-0731 A stack-based buffer overflow
    in the Apple-specific Samba module (SMB File Server) allows a user with
    write access to an SMB share to execute arbitrary code via a long ACLA file
    with an overly-long ACL. This could lead to a denial of service or arbitrary
    code execution. This update performs additional validation of ACLs. This
    issue does not affect systems prior to Mac OS X v10.4.
    Software Update Application Vulnerability - CVE-2007-0463 A format string
    vulnerability exists in the Software Update application.
    By enticing a user to download and open a maliciously-crafted Software
    Update Catalog file, an attacker can trigger the vulnerability which may
    lead to an unexpected application termination or arbitrary code execution.
    This update removes document bindings for Software Update Catalogs. This
    issue does not affect systems prior to Mac OS X v10.4.
    sudo Configuration Vulnerability - CVE-2005-2959 A user-modified sudo
    configuration could allow environment variables to be passed through to the
    program running as a privileged user. If sudo is configured to allow an
    otherwise unprivileged user to execute a given bash script with elevated
    privileges, the user may be able to execute arbitrary code with elevated
    privileges. Systems with the default sudo configuration are not vulnerable
    to this issue. This issue has been addressed by updating sudo to 1.6.8p12.
    Further information is available via the sudo web site at
    http://www.sudo.ws/sudo/current.html
    Blojsom WebLog Vulnerability - CVE-2006-4829 A cross-site scripting
    vulnerability exists in Blojsom. This allows remote attackers to inject
    JavaScript into blog content that will execute in the domain of the Blojsom
    server. This update performs additional validation of the user input. This
    issue does not affect systems prior to Mac OS X v10.4.
    Vulnerable Applications/Systems and Countermeasures:
    Vulnerable applications/systems with fixes available:
    Compliance is RECOMMENDED. Although this notice is a Technical Advisory,
    Systems Administrators should strongly consider implementing these updates.
    Apple Mac OS X 10.3.9
    Apple Mac OS X 10.4.0
    Apple Mac OS X 10.4.1
    Apple Mac OS X 10.4.2
    Apple Mac OS X 10.4.3
    Apple Mac OS X 10.4.4
    Apple Mac OS X 10.4.5
    Apple Mac OS X 10.4.6
    Apple Mac OS X 10.4.7
    Apple Mac OS X 10.4.8
    Apple Mac OS X Server 10.3.9
    Apple Mac OS X Server 10.4.0
    Apple Mac OS X Server 10.4.1
    Apple Mac OS X Server 10.4.2
    Apple Mac OS X Server 10.4.3
    Apple Mac OS X Server 10.4.4
    Apple Mac OS X Server 10.4.5
    Apple Mac OS X Server 10.4.6
    Apple Mac OS X Server 10.4.7
    Apple Mac OS X Server 10.4.8
    Temporary Mitigation Strategies
    None
    Vulnerable applications/systems with no patches available, vendor temporary
    recommended mitigations available:
    Permanent fixes are not available. Temporary mitigations have been provided
    to protect vulnerable systems until permanent patches are available.
    Administrators should consider using the temporary mitigations provided or
    develop local strategies to protect vulnerable systems from attack.
    None
    Vulnerable applications/systems with no patch or temporary recommended
    mitigations:
    There are no patches or temporary mitigations available. Administrators
    should consider developing strategies to protect vulnerable systems based on
    local mission requirements and operational impact. As patches or workarounds
    become available the status will be upgraded to "Fix available" or
    "Mitigation Available".
    None
    Unsupported Software:
    Mac OS X versions prior to 10.3.9

    Who's sending you these emails and why? It sounds like a Windows apologist with an inferiority complex trying to make OS X look bad. The facts are that there are no viruses or malware in the wild at this time actively compromising OS X users. Discovered flaws and vulnerabilities do not immediately translate into active malware on OS X like they do on Windows. Apple releases security updates on a regular basis. The recent OS X 10.4.9 update, for example, provided fixes for some 45 known security issues. OS X is by no means a perfect piece of code but you are infinitely safer on the internet using OS X than you are using any version of Windows, including the new Vista.
    As to who makes these notices there are security researchers and companies whose job it is to find and report security flaws in any operating system or application they choose to inspect. They provide a valuable service to companies like Apple and Microsoft in helping them close holes in their software.
    CVE stands for "Common Vulnerabilities and Exposures" and is a standardized way of cataloging security issues. CVE is supported by CERT (Computer Emergency Response Team) which in turn is supported by the Federal Government and the Department of Homeland Security.
    Here is the web site link...
    http://cve.mitre.org/about/
    The best response when you get one of these emails is to do nothing. Instead, keep your system current and up-to-date with all security updates and OS X updates released by Apple. And above all, don't worry.
    Dual 2.5GHz G5 Power Macintosh   Mac OS X (10.4.9)  

  • Questions about setting up my network with my Mac Pro?

    I'm trying to set up my network with my Mac Pro. I have two other roommates that need internet and a printer that we all need to access. The modem is with my Mac Pro in room 1, the printer is with another PC in room 2, and another PC with wifi is in room 3. What is the best way to connect all these.
    My idea was to install an Airport card in my Mac Pro, then add an Airport Express station w/airtunes to room 2, to connect the PC and printer. That way, room 3 can access with wifi, and room 2 can physically plug into the Airport Express station. Problem with that is that the Airport Express Card must be professionally installed in my Mac Pro and that $80+ charge on top of the Airport Express and Aiport Card itself, turns this into a $200+ endeavor.
    I also have a wireless Linksys router and Linksys WiFi USB receiver. Anybody have any other ideas?
    Mac Pro   Mac OS X (10.4.9)  

    Your plan wouldn't work anyway. The Mac Pro can not create a WDS compatible wireless network. Therefore the AirPort Express (AX) can not use WDS to wirelessly join the network. Therefore the AX's Ethernet port will not be activated.
    The best solution is to buy an inexpensive wireless router [or the AirPort Extreme base station (AEBS)]. Connect the Mac Pro via Ethernet to the router. Add a wireless adapter to the PC in room 2. Therefore the PCs will connect wirelessly while the Mac Pro connects via Ethernet.

  • HT2542 i do not have "accounts" under the "View" menu?  i want to have multiple iTunes on one mac help please

    i am trying to have multiple users on my mac can you help?

    iTunes: How to share music between different accounts on a single computer
    <http://support.apple.com/kb/HT1203>

  • How do you share Aperture file across multiple users on same Mac?

    How do you share Aperture file across multiple users on same Mac? Seems this should be a preferences choice.

    When you share your library between users, you may run into permission and ownership problems, if both users are editing the Aperture library and not only reading it. To avoid that, it helps to put the Aperture library onto a separate disk or a separate partion of your hard drive. For s separate partition or disk you can enable the "ignore ownership on this volume" flag. Then all users can access the library as owners of this library.
    You might try to put the aperture library into a shared folder on your mac, but that has caused problems recently, i.e. when the library also contains video files.
    Regards
    Léonie

  • Can i have multiple monitor with my mac mini ?

    Can i have multiple monitor with my mac mini like i do with my PC ?  2 differents screens.. not mirror.

    There's lots of Mac Mini models since 2006 or so. What do you have?
    Most support two monitors but how you do it is different depending on model.
    Put this phrase into Google
            dual monitors, mac mini
    and you'll come up with the solution needed based on which MM you have.

  • Can I use my Time Capsule to set up multiple networks, or just one?

    Can I use my Time Capsule to set up multiple networks, or just one?  We'd like to offer the internet to clients who are at our studio, but don't want them able to access all our computers, so a second network for them would be useful.

    Two big IFs here.
    Not all versions of the Time Capsule have Guest Networking capability, so it might be a good idea to verify that first. Can you provide the model number of your Time Capsule.  it's on the bottom of the device.....starts with an "A" followed by four numbers.
    Next, assuming that the Time Capsule has Guest Network capability, the next requirement would be to verify that your modem is compatible with the Time Capsule for that feature. 
    Basically, you need a simple modem.....not a modem/router or gateway device that is often furnished by Internet Service Providers.  If you are not sure what you have, post back with the make and model number of your "modem" and we'll see if we can find some details ont he device.

  • Is it possible to create a configuration profile that will install multiple network printers and their associated drivers

    Is it possible to create a configuration profile that will install multiple network printers and their associated drivers?
    I was not able to find profile manager on my employer's installation of 10.6 Server. Is this only a feature of 10.7/10.8 server?

    10.6 server does not have profile manager, profile manager is only available in 10/7 and 10.8 server
    for 10.6 server you'll need to use wgm and server admin
    printer management with 10.6, I recommend you read the relevant server manuals regarding
    print server and user management, printer management

  • Microsoft Remote Desktop and small network, pc and macs

    I have a machine running 8.1 pro with a connected printer, networked via an unmanaged switch to two macs in the network. One mac is a headless mac mini, the other is a mac pro i am using to access the pc via MRD. This network is not connected to the internet.
    I can ping the pc from the macpro, and can see files shared on the pc, but cannot get MRD to connect.
    One network cable from the macpro is connected to the isp's router, the other to the switch connecting the three machines. That second connection has a self-assigned ip, and the internet connection on the macpro is not shared.
    On the pc in ipv4 properties, the ip address is set manually. Ip address and subnet mask are there (169.254.94.25 and 255.255.0.0) and default gateway is blank. Workgroup is set up as private. Remote Desktop is enabled. Firewall seems to be right. Windows
    Network Diagnostic says no issues detected.
    I've tried MDR settings with the ip address of the pc in gateway and also without, leaving gateway blank and just using the name of the pc with the same result: "Unable to connect to remote PC. Please verify Remote Desktop is enabled,..."
    The switch and cables are good. If I connect the switch to the router and change the ipv4 address to automatic, I can connect to the PC with MRD.
    Any suggestions? Is there a setting I'm missing? I've searched the Microsoft site for help but find only the most general instructions, which I think I've followed.
    I've asked this question on the Windows Web and Network discussion and was advised to post it here by the support engineer.

    Hello JAS42,
    If my understanding is right, one network cable from MAC pro is connect to the switch and the Windows 8.1 PC is connect to the switch too, and the IP setting in the Windows 8.1 is ‘(169.254.94.25 and 255.255.0.0) and default gateway is blank’.
    If a DHCP server cannot be found or does not respond after one minute, the DHCP client checks the settings on the Alternate Configuration tab of the properties of the TCP/IP protocol.
    If Automatic private IP address is selected, the DHCP client auto-configures its IP address and subnet mask by using a selected address from the Microsoft-reserved Class B network, 169.254.0.0, with the subnet mask 255.255.0.0.
    Does the switch have the dhcp function?
    What is the network setting in the MAC pro? We could manually configure the IP settings of Windows 8.1 network connection and the connection in the MAC to the switch in the same subnet, and then check if the issue still exists.
    For more information about subnet, please take a look at the following article.
    http://technet.microsoft.com/en-us/library/cc958832.aspx
    Best regards,
    Fangzhou CHEN
    Fangzhou CHEN
    TechNet Community Support

  • Connect to one wireless network when multiple networks with the same name

    Hi all,
    I'm at a location where there are two networks with the name (e.g.) "wireless". One uses WEP and one uses WPA. The WEP network is weaker than the WPA network, so my Mac tries to connect to the WPA network, even though I have manually setup the wireless network with WEP security (after trying to connect it asks for a WPA password). Is there a way that I can connect to a wireless network by MAC Address, or some way for me to tell the Macbook to ignore the WPA network? The problem is that the SSID is the same, it seems.
    Thanks,
    Nate

    The person (the landlord) isn't tech-savvy at all.
    That is clearly obvious as
    1. They would not be using WEP
    2. They would setup a different SSID
    WEP is not secure and can be cracked in minutes using tools readily available on the internet. If a hacker gain access to that network they could run other tools and hijack the dns and then you could be visiting sites on your mac that are completely bogus but look real.
    Also it is common trick that hackers use is to setup an access point nearby with the sane SSID to capture details from users that join their network thinking they have joined their own network. Again the hacker can hijack the dns and monitor all your browsing and capture details.
    The fact that someone has setup an SSID nearby with the same name would make me very suspicious.
    I would treat your landlord's network as an untrusted network same as when your using a public wifi like coffebucks.

  • Multiple network location servers possible?

    As we all know the network location server is an important part of any Direct Access deployment to ensure that DA clients can know whether they are connected directly to the internal LAN or connecting from external via DA.
    I have seen discussion about deploying the network location server (simple blank IIS/Apache web site) in an NLB  configuration but is there any way to have multiple network location servers for high availability reasons? During the DA configuration
    process you can only input a single dns record for the NLS so it does not appear possible. Has anyone found a way to do this?

    Hi,
    Yes it's a good practice to have NLB in high-availability. So a single FQDN with NLB or HLB as high-availability solution. Major problem is when DirectAccess clients connected on LAN cannot join the Network Location server. They consider they are connected
    on Internet not on LAN and try to activate DirectAccess. In such situation, If users can disable DirectAccess (so no force tunneling) they can solve the problem. Once NLS is back online, computer automatically change the firewall profile to domain.
    BenoitS - Simple by Design http://danstoncloud.com/blogs/simplebydesign/default.aspx

  • ASDM multiple network objects vs group for rules

    I was just curious if there are any performance benefits of using multiple network objects on multiple rules vs consolidating them into fewer rules by grouping them? 
    For example, I have about 10 lines of NAT exempt rules from the same source to multiple destinations.  Is there anything to be gained if I consolidated those into a single rule using an object group for the multiple destinations aside from cleaning up the clutter in ASDM?
    Thanks

    Hello Tony,
    Of course, it will be better because the processing that the ASA is going to use to determine witch rule to match would be decremented, also it would take less space on the configuration file (memory). those are some of the pros regarding creating groups for particular rules.
    Sometimes a huge configuration file can increment the CPU usage,etc,etc. so it is better to keep it as small and organized as possible.
    Please rate helpful posts.
    Regards,
    Julio

  • Use of multiple networks in projects

    Hi,
    I know the standard hierarchy in Project systems like we have definition, then main WBS, then networks, then sub WBS and then activities. Now in this standard hierarchy, even though the activities are under WBS elements, the activities are connected to one network and in network graphic we can define the relationship among the various activities.
    I mean by using the single network we can achieve the various objectives, then why most of the projects use multiple networks i.e. network per each WBS elements even though these multiple networks are connected to one network only.
    Thanks

    Hai
    The criteria according to which a project is structured using a work breakdown structure and/or networks can vary and depend on the type and complexity of a project. A project can therefore also consist of a work breakdown structure and several /single networks.
    For example, the criteria can vary depending on the responsibility and structure of the departments or teams involved, or on how production and assembly are integrated. It is therefore impossible to give a wholesale answer to
    the question of how best to structure different types of projects.
    As a rule, a project is structured according to two
    points of view: structure and process.Network techniques are used for planning and controlling the process flow of projects.
    ENJOY SAP
    Regards
    PP

  • ACS 5.4 multiple network interfaces support

    In ACS 5.4 release note, it says:
    Multiple network interface connector support
    ACS  5.4 supports up to four network interfaces: Ethernet 0, Ethernet 1,  Ethernet 2, and Ethernet 3. ACS management functions use only the  Ethernet 0 interface, but AAA protocols use all configured network  interfaces. You must connect the ACS nodes in the distributed deployment  only to the Ethernet 0 interface. Therefore, the syslog messages are  sent and received at the log collector's Ethernet 0 interface. Data  forwarding from one interface to another interface is prohibited to  prevent potential security issues. The external identity stores are  supported only on the Ethernet 0 interface. In ACS 5.4, multiple network  interface connectors are also supported for proxies.
    But in the CSACS 1121 Series Appliance Rear View section, it still says on Ethernet 0 is usable. All other  interfaces are blocked.
    I am confused. Can anyone clarify for me if we can use multiple network interface in ACS 5.4? What about management interface?
    Thanks!

    We configured 2 interfaces in past within testing enviornment and it worked. ACS 5.4 supports multiple network interfaces on the UCS platform, on a virtual machine and on the legacy ACS 5.x IBM/CAM hardware. The ACS management functions use the interface eth0 only and the AAA protocols use all available network interfaces.
    Jatin Katyal
    - Do rate helpful posts -

Maybe you are looking for

  • File to Proxy (Inbound)

    Hi, I have file to inbound proxy with data posting to ECC using web services WSDL. The message in message monitoring shows successful but the data is not getting posted in the ECC. Please advice, Thanks

  • Preview and print a printout in production order release

    Iu2019m using CO02 to release and save the production order. Currently u201Cbatch cardu201D printout is automatically printed in production order release. I want to change this to preview the printout before printout is send to the printer. Can someo

  • Converting TIFF to JPEG with sips, then import into iPhoto problems

    I am cataloguing a box of slides and negatives for my family. The scanner generates huge TIFF files (on purpose), and I have an Applescript that then uses sips to copy them into low quality JPEG files using this command: do shell script ("sips -s for

  • My files are suddenly going dark after certain operations?

    Last week a very strange (and new) thing began to happen.  If I have multiple files open in tabbed viewing and I perform certain operations on any one of the open files, all of the open files suddenly darken considerably.  It looks as though I had cr

  • Deletion button in Mointior SC

    Hi, I want to disable the Delete Icon in BBP_MON_SC tranaction.. How can i achieve this?? thanks...