Router and related question

Try to do the web hosting. The Web Server will host about 10 web applications for the public access (from several hundreds to a couple of thousands people to concurrently access). This server will be located in a Server-Hosting-Company which will use T1/T3 line to connect with the Internet. My web server will be placed in the hosting company's server room (This means that the hosting company will take care of the internet connection, while my server in turn will connect to the company's LAN system). . Now my questions are:
1) I would like to have a router to act as a firewall, switch, VPN, and to support the DMZ. There is only the data pass though (no sound and vedio is required)
Of course, the faster, the better. But I would also take the budget into the consideration, so the router should resasonably get the job down, but not be over spended on. Which Cisco routers fits better: 1801 or 2801, or else?
2) This router will not connect to a DSL or T1 or T3, instead, it will directly plug into the server room's LAN system, can I hook it up using the router's Ethernet port?
3) To place a web cache machine in the DMZ, can I connect the Web Cache machine to the router's Ethernet port? Or, is there a port SPECIALLY for the DMZ to make the connection?
Many thanks.
Scott

1800s are fixed configs with only wic slots, and you dont need wic slots in your app.
Get a 2811 for a min, it will have two fastE interfaces or you can get a 2821 or 2851 which have 2 GigE ports onboard. You can use IOS firewal feature on the router and also can do VPN. You need to get the Advanced security or higher feature set and an AIM card if you plan to terminate a lot of VPN connections.
To support a DMZ switch on the router itself you can buy a module such as NM-16ESW - 16 port switch and put your servers there. You can use ACLS and CBAC to permit specific traffic going to these web servers.
IOS firewall wont be truly the same as using a dedicated firewall such as PIX or ASA. So I would recommend using a PIX firewall for this purpose.

Similar Messages

  • My family owns an Apple Airport router, and my question is that is there a were to remotely access the router and turn it off and on? Thanks

    My family owns an Apple Airport router, and my question is that is there a were to remotely access the router and turn it off and on? Thanks

    Richard's suggestion will turn off and turn on the wireless function on your Mac computer......but.....it will not do anything as far as turning your Apple AirPort router on and off.......which seems to be the question that you are asking above.
    If this is the question that you are asking, it is not possible to power the Apple router on and off from either a local or remote location.

  • EAM: Maintenance Routing; Activities related questions

    NOTE: I could not find an EAM specific forum and hence I am posting here. If this is not the right forum, kindly direct me to the right one and I will post my question there.
    eBS version: 11.5.10.2
    BACKGROUND INFO:
    My customer has asset groups and assets defined. Asset groups: approx 240 in number. Each asset group has 25 assets on an average. Example: Asset Group: PAJERO; 25 registration numbers for 25 vehicles as assets under the PAJERO group.
    Customer has so far never used Maintenance Routing to forecast and create work orders. Customer has always created manual work order.
    Now, the customer is looking to use Preventive Maintenance, Activity Scheduling and Maintenance Routing to forecast scheduled work and create work orders from the Maintenance Workbench.
    IMPORTANT BIT:
    The assets move from one owning department to another quite often. Hence, on the maintenance routing -> operation: department/op code needs to change whenever the asset moves from one owning department to another.
    PROBLEM:
    From looking at the Activities Setup, it seems like, the way to achieve this is:
    1. Define activities for each asset; create association between activity and asset; define schedule definition for activity - asset combination; create maintenance routing for the activity.
    2. Whenever the owning department for the asset changes, end date the operations on the routing; create a new operation, with the new effective department/op code.
    Please correct me if this is not the right approach.
    However, since:
    1. The number of assets is massive AND
    2. The activities for a given asset group are always the same
    the customer is wondering if there is a way to create activities per asset group (as opposed to per asset) and create maintenance routing without department defined on the operations. Then, when the forecast is generated from the maintenance workbench and work order is created, somehow dynamically pick up the department information (and thereby the resource and BOM information as appropriate for the operation).
    Has anyone faced and resolved a similar issue?
    I would be grateful for any pointers, insights, suggestions on how to solve the problem.
    Thanks
    Kiran

    Andy,
    Thank you very much for your responses here. They are very educational.
    I have following questions,
    The Production Org is Standard Costed. What is the recommended costing method for eAM. If I use Average costing for EAM then do I have to create another org?
    If create another org then how ASCP will take into account projected shutdowns because of future PMs?
    If the Production Org is also WMS enabled then the Expense Account is greyed out in the costing tab of org parameters. If expense account is not created then Asset Groups can not be created from EAM. They however can be created from Item Master window?
    If Prod Org and EAM org are same then how we will capturs the material cost separately for both org?
    Thanks & Regards,
    Vivek

  • WRT54G Router and passphrase question

    I purchased a laptop computer last week and a WRT54G router.  Got home, set it up with no major problems and had a question about the passphrase/password
    My setup:  1 desktop computer and 1 laptop computer
    The first time I got on my network from the laptop, it asked me for the passphrase and then let me on.  The next time I fired up the laptop, it just automatically connected me to my network
    When I look at my network on my laptop, it says "Security-enabled". 
    Shouldn't I have to use the passphrase everytime I connect to my network?  Or, does my network recognize the laptop and automatically signs it in.

    Lilla's Tips for Securing your Home Router...
    Change the router password (default=admin) to a 32 character password using a Strong Password Generator (e.g., keygen, wlankeygen).
    IP Address of the router. ... Many default to the standard 192.168.1 or 2 subnet internally and give the router itself the IP address of 192.168.1.1 or 192.168.2.1 ... consider changing the IP addressing to a difficult-to-guess internal subnet like 192.168.12.1 or 192.168.83.1 (you can use any number from 1 to 254 in the third position in most cases). Source: http://www.jiwire.com/wi-fi-security-home-networks-1.htm
    Change your Wireless SSID from linksys (default) to something unique, that doesn't identify your hardware or you. Be aware that crackers use online lists like this one to lookup information that helps them gain access to systems with inadequate security.
    Use WPA/WPA2 not WEP encription
    WEP = poor security (easily cracked/hacked)
    WPA = good security when used with Strong Passwords - see Perfect Passwords below
    WPA2 = best security
    Perfect Passwords - GRC's Ultra High Security - Password Generator
    Since the passwords used to generate pre-shared keys are configured into the network only once, and do not need to be entered by their users every time, the best practice is to use the longest possible password and never worry about your password security again.
    If you are connecting only 802.11g devices, select “G-Only” from the “Wireless Network Mode” menu. Likewise, choose “B-Only” for 802.11b devices. By selecting G-Only/B-Only, you lock out anyone trying to connect using anything else. Source: http://paininthetech.com/5_minute_wireless_network_security_for_your_home
    Wireless SSID Broadcasting. By default it is enabled; assure that it has not been changed. Microsoft recommends that you do not configure access points as non-broadcast (hidden) networks; sources: KB929661, KB907405, KB811427. You will come across articles/posts that recommend disabling this, but this is old school thinking.
    Disabling SSID broadcasting will not stop a wireless signal being found, and some wireless clients will not logon to the correct wireless signal without SSID being enabled. Source: http://www.linksysinfo.org/forums/showthread.php?t=47120
    MAC address filtering. MAC address filtering without WPA or WPA2 is pretty much no security at all. And with WPA or WPA2 and a strong pre-shared key you don’t need it because WPA is considered secure and anyone who hypothetically has the power and knowledge to crack WPA would not be hindered by MAC address filtering to gain access to your WLAN. Source: http://forums.linksys.com/linksys/board/message?board.id=Wireless_Routers&message.id=42934#M42934
    Articles on Security
    Top 10 Security Tips for Home Wi-Fi Networks
    Tips for Securing Your Home Router
    Wireless Security - How secure is your Wireless Network?
    WPA PSK Crackers: Loose Lips Sink Ships
    Message Edited by Lilla on 05-21-200706:47 PM
    Westell 6100 modem/router; Linksys WRT54GL v1.1 router firmware 4.30.9; Linksys WPC54G v2 Notebook Card; CenturyTel DSL using PPPoE

  • Ironport Whitelist and related questions

    Hi all,
    I have recently started at a new position for a company that is utilising ironport as the email spam filtering/virus checking appliance.
    Almost immediately after starting in my position issues were being discussed, where the senderbase reputation scoring was marking a sister companies mail as spam - obviously due to a bad reputation.
    It was important that these mails were delivered and the obvious answer seemed to be to whitelist the domains, which was implemented by another support person. After the whitelist setting was applied though the mails were still be rejected due to being suspected spam - there is no quarantine setup.
    Today I logged into the boxes to see if I could syslog the mail logs to a seperate linux server and suddenly got wrapped up in this problem. I had a look and could see the domains in the whitelist section within the HAT, after doing some reading I can confirm the whitelist section was ordered as being number 1 in the list and by looking further it looks like the whitelist domains were via the 'add to sender group' button within the monitoring overview screens (this is assumed as both .sistercompany.com and sistercompany.com were appended to the whitelist).
    After a few hours of reading up I couldn't understand why the whitelist wasn't working, I even did a lookup of the domain in the monitoring overview search section for mail recieved by sistercompany.com and could see that it belonged in the whitelist group. I got further confused when reading the help and support guide - it had screenshots that looked very similar to our setup [within the HAT overview and Mail Policies], however it had an sbrs for the whitelist set between 6 and 10, where as that was blank on our system, nowhere in the document would it describe why this sbrs value was set. Bearing in mind I have only had a few hours of experience with this product, so these maybe silly questions but:
    Why would you add an sbrs value to the whitelist - I would have thought whitelists would ignore any score presented.
    If number 1 has nothing to do with why these domains were still being flagged as spam, has anyone got any suggestions as to what the issue maybe?
    For a small bit of information we have the C660 appliances installed.
    Any help would be much appreciated

    I'm taking a wild guess here since there are a lot of missing details. Forgive me if I'm covering ground you've already trod.
    Remember that the HAT controls how incoming SMTP connections are handled, so entries in the HAT must correspond to the remote SMTP servers that are connecting to you. You don't put the "domain" part of "user@domain" in the HAT ("sistercompany.com" in your case), you put in the the domain names of the actual remote SMTP servers or a wildcard that matches them all. In your case, this might be ".sistercompay.com" (note the leading "." indicating that this will match any domain name ending with ".sistercompany.com"), but only if their SMTP servers have host names in that domain.
    Whitlisting by domain name requires that the IP addresses of those remote SMTP servers have correct rDNS. If they don't, you'll have to list them in the HAT by IP address. FYI, we never put anything in the HAT by IP address unless it is unavoidable. Using domain names and requiring correct rDNS forces good DNS hygiene, and also provides a layer of abstraction. The server's address can change, but so long as the DNS is kept up to date we don't have to change our HAT entries.
    You can see from the mail logs what sender group is being applied on each SMTP connection. Find one of the rejected messages in the log and see what sender group its connection landed in. If it didn't land in the whitelist (which will almost certainly be the case, given that the message was not in fact whitelisted), then you know the HAT entry is wrong. You can also use the log to determine the actual domain name of the remote server, assuming the rDNS for its IP address is correct.
    The example screenshot in the manual showing SBRS between 6 and 10 being whitelisted is demonstrating that you can whitelist by SBRS as well as by explicit listing in the sender group. Your whitelist simply isn't doing this, which is fine. In this age of rampant spamming from stolen accounts on reputable servers, whitelisting by SBRS can let spam in. We raised the lower limit from 6 to 8 several years ago after getting hit in this exact way.
    ++Don

  • M4P versus AIF and related questions

    When I take a both downloaded and purchased (CD store music), and I want ot burn them to a blank CD-R, I usually first create a new playlist in Itunes with the selections I will want to download to a new Disc.
    Sometimes in downloads them as AIF and sometimes as M4P (I presume another name for MPEG). Some systems won't run these formats, AIF seems the most dominant.
    How and why does iTunes select different formats and is it selectable prior to downloading>
    Also I am running iTunes 4.6 and wished to upgrade to 6.0 but said it could not on my system. I was confused by that as well.
    The latter question may be better suited for a different discussion group? I am running 10.3.9 with 1 gig of memory on an iMac.
    Help on the above questions would be great as I am trying to copy material for my niece's birthday and want it in the most commonly used format.
    Thanks! ! !

    When I take a both downloaded and purchased (CD store music), and I want ot burn them to a blank CD-R, I usually first create a new playlist in Itunes with the selections I will want to download to a new Disc.
    By downloading to a new disc, I assume you want to burn the tunes to an audio CD-R.
    Sometimes in downloads them as AIF and sometimes as M4P (I presume another name for MPEG). Some systems won't run these formats, AIF seems the most dominant.
    AIFF is the full CD quality file format usually found on music CDs. All CD and DVD players I own will play AIFF CD music files. M4P is the MPEG 4 DRM protected file format used with the iTunes music store. This codec is referred to by Apple and others as AAC.
    Again, I am not sure what you mean by download in this context. Are you trying to import music from a physical CD? If so, iTunes preferences has a setting for importing files. You can set it to import files in the form of AIFF, AAC, Apple Lossless, or mp3 (possibly others). But once you set the preference, it should stay the same until you change it.
    You can certainly burn a CD-R from mixed AIFF/m4p content, it should result in an audio CD full of AIFF files (unless you have changed the Burning preferences to an mp3 CD or Data CD).
    Also I am running iTunes 4.6 and wished to upgrade to 6.0 but said it could not on my system. I was confused by that as well. The latter question may be better suited for a different discussion group? I am running 10.3.9 with 1 gig of memory on an iMac.
    I can't help you here. You might want to post in the iMac discussions forum. It has a link to discussions for older iMacs.

  • X61s: Power Management issues and related questions

    1)  My problems started when I upgraded to PM 3.5:  system instability, overheating, and battery run-down.  I finally eliminated PM 3.5 and it is running better, but still seems to be running more hot than before.
    2) Question: can I take the battery out when running on AC current?
    3) Also, do the batteries for the X61 also fit for the X61s?
    Richard

    1) download TPfancontrol and check your system temp and fan speed.
    2) Yes, but not recommended as the battery acts as a UPS, which prevents your laptop from shutdown if there is an accidental plug pull from the ac socket, or brown out/black out. 
    3) yes.
    Regards,
    Jin Li
    May this year, be the year of 'DO'!
    I am a volunteer, and not a paid staff of Lenovo or Microsoft

  • Playlist problem and related question

    Hi,
    Is it possible to create a playlist that contain all the songs that are located in a specific folder?
    What I did:
    Then iTune said that it was adding the songs but when it finished, the playlist was empty.
    Is something wrong with the installation or you cannot do that with iTune?
    Also, is it possible to browse songs by which folder they are in? I know that you can brose per genre, artist and album but I'd really like to be able to browse by folder.
    Thanks!

    I'm not sure how your music folders are set up, but I've chosen for iTunes to manage my music and sort it automatically, in which case iTunes creates a folder for every artist. One way you may be able to find the music in one group would be sure to add the folder again, and then sort your music by the date added category, if you used the Add Folder feature, in which case all the songs from your folder will have been added at the same time, and will be displayed in a batch. The Date Added category is under View>View Options or the shortkey Ctrl-J.

  • Vault size vs APerture library size and related questions

    My aperture library is 50GB for some 65,000 referenced pictures...how does this compare with others? To me, it seems a bit big.
    Also odd. The vault backup of my libarary is 9.1GB ONLY! How come?
    I think that all of my pictures are referenced.....is there an easy way to check?
    If I make a new fresh library and restore from the vault, what will I loose, if anything? Will I need to reconnect pictures or anything?

    that seems about right to me. what's taking up space are previews and thumbnails. afaik, the vault doesn't hold any of those, only the database, albums, projects and configuration files.
    if you restore from a vault, all the previews and thumbnails have to be rebuilt. you can save a little space that way, because the thumbnail files don't shrink when you erase photos or move them to another project, but personally i don't think it's worth the time and effort.
    j

  • Two related questions:  ColdFusion 10/Java applications and J2EE supported servers

    I have two related questions:
    1.  CF10 and integration with Java Web applications
    We have a couple of Java applications running on JRun and interfacing with CF9 applications.  The JRun clusters were created through the JRun Admin and, apart from lack of Axis 2.0 support, have served us well for years now.  And, as would be the case, the ColdFusion9/Java/Flash application is a critical public-facing application that the business uses for bidding on projects.
    It appears that with ColdFusion 10 on Tomcat, we will not be able to run those Java applications on a Tomcat-CF10 JVM cluster.  Is this correct?  IF so, what are our options? 
    2.  J2EE Application Servers supported by Adobe for CF10
    Which of these is correct?
    A.  This URL (http://www.adobe.com/products/coldfusion-enterprise/faq.html) states "ColdFusion 10 supports IBM® WebSphere, Oracle® WebLogic, Adobe JRun, Apache Tomcat, and JBoss."
    B.  This URL (http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/products/coldfusion/pdfs/cf1 0/coldfusion10-support-matrix.pdf) states:
    "J2EE application servers: WebLogic Server 10.3, 11.1, WebSphere Application Server 7, ND 7 JBoss 5.1, 6.0, 7.1.0"
    I *think* "A" above is wrong re. support for Adobe JRun.  It does not specify a version of Apache Tomcat unless it is simply referring to the custom version the comes with CF10.
    Option "B" above shows no support of Adobe JRun or 'standard' Apache Tomcat.
    Thanks,
    Scott

    Question 1 above was answered:  "No support for Java web applications under CF10's custom version of Tomcat"
    Question 2:  No answer yet:  Is Apache Tomcat (NOT Adobe's customized version) supported for CF10 J2EE deployment?  I do not see any installation instructions on how to install CF10 on Apache Tomcat 6 or 7.
    Is anybody using Apache Tomcat as their J2EE app servers and, again, NOT Adobe's customized/limited version? 
    Thanks,
    Scott

  • Router and range booster question. PLEASE HELP! :(

    Okay so I used to use the WRT54G router and since I upgraded to a new WiFi router / modem I don't need to Linksys one anymore. Well my neighbors aren't getting a very good signal and I managed to find an old WRE54G Range Booster in a box. Well my question is that if I set up the WRT54G router and Range Booster at their house would they be able to have a stronger signal if trying to connect to my new WiFi router? Oh its a HUAWEI, this seems like a pretty easy question and I'm guessing it wont work but I am just wonder like what are my options here to get them a better signal with these 3 components. Thanks!
    Solved!
    Go to Solution.

    You can certainally try the WRE in their house but 1 bar may not be enough to repeat the signal throughout their house.
    Another thing you can try is to try and position the WRE somewhere in your house that is as close as possible to their house and aim the antenna towards their house.
    As I recall I think the V3 version of the WRE has an ethernet port underneath a cap on top (I don't think V1 and V2 had one) but I believe that it was only intended for setting up the range extender. If you can get a sufficient wireless signal into their house I think you would have to have their laptop connect wirelessly to the WRE.

  • Questions re: "router not supported"....and other questions

    I bought the WRT54G v. 2.0 several years ago and never had issues with it until I started messing with it.  I have 3 laptops (1 hardwired, 2 wireless) and a wireless tivo working with this router.  My biggest issue is the laptop and tivo in the living room are only getting a very weak signal.  I was trying to fix that when i noticed my router was not "secure".  I don't have any linksys software on the host computer.  It was on another computer that died 2 years ago, but everything worked fine when I plugged everything in.  The router is currently doing its job except I want it to be secure and have a stronger signal.  I downloaded the Linksys EasyLink Advisor and tried to secure it from there but keeps saying "Router not supported".  It says its too old or not a linksys product (which it obviously is).  I then upgraded my firmware to the newest version and then tried to secure it with the web setup.  I did that but linksys support instructions tell me to click on a linksys icon and set it up using the software that came with the router.  I don't have that software on my computer.  I do have the disc, but when I try to set it up, the disc tells me I'm already running a router and that I should exit the setup. 
    My question is this:  How do I secure my network and get a stronger signal to my tivo and laptop in the living room?
    Paul

    You would need a hardwired PC for this job so that every change you make and do will not kick you off the wireless network. On your hardwired PC log in to the router set-up page. To do this, open up internet explorer and type on the address bar the numbers 192.168.1.1 (username just leave it blank, password as a default is admin)...
    Then go to the wireless tab and edit the following settings:
    SSID - this is going to be the name of your wireless network, just give it whatever you name you would want to give it.
    Channel - suggested value is "11"
    Then to secure your wireless network go to the Wireless Security Subtab and set your security mode to WEP... and input your phone number on key 1. (include the area code)... then save the settings.
    After this process, your router should now be secured with your own phone number as the Security WEP key.

  • A simple question about Drag and Relate navigation

    Dear experts
    I have found SAP help or related manuals only good at talking difficult things such as how to customise the drag and relate targets, etc.  However, after I followed exactly and then how to test.
    Then I just see pieces of information, very unstructured.  Spending me a whole day, even I can't get a good simple example on how to really perform a drag and relate at least for the proof of concept at EP 6.0.   It spent a lot of time in describing what the navgiation panels about, what drag and relate targets.  Then how to do it in once transversal.  That is, with all customisation, how to drag and relate an object.
    My step is with iview A, shows a purchase order details showing a drag and relate enabled object like vendor no.
    Then I try to drag this vendor no. to a display vendor iview, iview B.
    I have known I have to put iview A and iview B to a Drag-and-relate targets.  I am sure I have done this.  Does it mean opening the portal, I will see both iview A and iview B appearing at the same time in the drag-and-relate target area?  However, in my case, it is not, iview A only appears in that area when I load it once, same to view B.  When I load iview B, iview A links from D&R target will be wiped off.  Then how I can drag an item from iview A to B while each one of them can only appear at any time.
    Can anyone give me a simple guide (don't give me an internet link from help.com) I have been tired of this.
    First, I would to make sure if my so called self-learnt drag-and-relate simple action is correct in the steps or really I have made something wrong in the customisation or even a bug there.
    Can anyone on the planet have this experience, pls. act as my teacher in this area?
    Rgds
    Stephen

    Thanks
    I have tried the 1st way already.  But I can see both iviews existing in the D & R targets.  Now I try to drag an item with business object BUS2002 from iview A to relate to LFA1 of iview B of the same back end system.
    But iview B shown up with that data of LFA1 shown up (in my case the vendor no.)
    I have used autocomplete relationship and I have checked it has been well-defined already.  Also check from metadata at backend they are both active.
    Do you have any clues to the pitfall in my case?
    Rgds

  • Question about Linksys G Wireless Router and i cant connect my iPod Touch and PSP to it.?

    I just got a new Wireless router and it works fine.The model number is WRT54G2. The internet is working and I can go on my xbox live and things like that. The only problem is that my iPod touch and things and my PSP can detect the connection but are unable to join it. Why is this. It was working fine on my previous router. Is there some security thing I have to take off? How do i do this? Thanks in advance

    lovemeludo wrote:
    Gollum wrote:
    From your wired computer, Open setup page of router by typing http://192.168.1.1 in browser’s address bar, and typing password as "admin" and no user name. Goto wireless tab, and wireless security sub tab. Check security key here, and you can disable it as well.
    I tried this and it went to a redish gray page that said "401 Unauthorized Authorization required" Help please?
    It means you entered the wrong password or username, try some other passwords you might have used if the default admin doesn't work.
    "The war between heaven and hell depends on the choices we make, and those choices require sacrifice. That's the test"

  • Route related question...Anyone can understand my leader's word?

    Hi,
    I am new to SD module.
    My leader assigned me an task as below:
    "Please pull out the transaction data from PSAP(SAP system ID) for 1 year and check the routes used".
    Can anybody tell me what the meaning of it?? As i am really newbie to SD, for my understanding...Does he want me to check every item's route of the SO document which was created from today to 1 year before?
    Is that what he wants?  I will go to VBAP to search the route name from the SO items which was created in 1 year period from today to the past.
    I dont know whether i am wrong or not??
    Can you help me???
    Thank you very much!!!!

    Hi, I think that i am really doing someway wrong to get those routes...Coz i sent those routes i found thru the VBAP way to our Leader, since then he didnt send me any email again...crying...
    More detail request as below shows....Could any SD Expert tell me what does our leader really wants? Or in what steps for me to check those routes he wanted?
    Thanks in AAAdvance!!!!
    More detail request as below shows....
    "Request to provide the present Table used to determine the Route and process.
    Based on those routes we need to configure the standard Route determination in the  PSAP system.
    Could please pull out the transaction data from PSAP (production system) for 1 year and check the routes used."
    Any ideas?? Thanks again and again...

Maybe you are looking for