Security within a network

I'm sharing DSL with a neighbor. He has a desk top PC and I have a wireless ibook. It's set up with his modem going into the Extreme and then into his PC through the LAN port and I'm set up wireless. Do I need to worry about security? Are our computers linked in anyway that I should care about? If so, what should I do to protect myself?
Also, if I set up the Extreme with a password to protect myself in the "wireless world", does he need to use that to access his PC if its just through the LAN port?

Hi Cactus,
Do I need to worry about security?
You don't need to "worry" but you do need to be mindful.
Are our computers linked in anyway that I should care about? If so, what should I do to protect myself?
Both your computers will most likely be running on the same subnet. Essentially you need to consider the boundary line between you and any nasties is at the connection point of your iBook. ie. treat his machine as potentially hostile. Primarily that will mean making sure the firewall on your iBook is always running and is configured to deny all incoming connections, even if they're within the same subnet.
Also, if I set up the Extreme with a password to protect myself in the "wireless world", does he need to use that to access his PC if its just through the LAN port?
No - the passwords are only relevant to encrypting the wireless connections.
HTH
Graham

Similar Messages

  • Accessing files within the Network

    Hi
    I have problem with file sharing. Within the network I have a PC with windows Vista. It has file sharing on. But it is not showing any files in my MAC. Can anyone tell me how to change the settings in my MAC to access files from my PC within the network.

    Hi Avi,
    Thanks for your reply.
    Just to give to some background info. The java class is called from a package that is owned by the same schema. The schema owner is part of the dba_role and connect_role.
    The network drive on the windows 2000 serveris mapped by the domain administrator account.
    We have given permissions to the schema owner to access the mapped drive thru java.
    What the java script does is fill a string array with the name of each file in the directory. The script and error messages are below.
    I have a feeling that the schema account does not have windows 2000 permissions to access network resources, but it is just a hunch.
    Regards,
    Ned
    public static String[] getDirList(String dir, String FilterExt)
    System.out.println(dir + ' ' + FilterExt);
    FilenameFilter filter= new FilterExt(FilterExt);
    File DirList = new File(dir);
    String f[] = DirList.list(filter);
    System.out.println(f.length);
    for (int i = 0; i < f.length; i++)
    System.out.println(f.toString());
    return f;
    java.lang.NullPointerException
    at ImpExpUtil.getDirList(IMPEXPUTIL.java:2254)
    at AutoImpExp.getNewImportFile(AUTOIMPEXP.java:87)
    at AutoImpExp.Import(AUTOIMPEXP.java:253)
    at Tester.autoImportExport(TESTER.java:2135)

  • Anyconnect Secure Mobility Client, Network Access Module, wired PEAP

    Hello there,
    I am testing AnyConnect Secure Mobility Client, Network Access Module as supplicant with PEAP authentication for wired network users. With default configuration it is working well.  With default configuration it is Trusting any Root CA certificates installed on the OS.  Do you know how to configure NAM that it will validate ACS certificate with specific Root CA Certificate ?
    In Network Access Module profile editor it has two options about Certificates:
    One is Certificate Trusted Authority which has two options by its self  first is too trust any Root CA certificate that is installed on OS, and second is to import Root CA certificate in Profile. Potentially Second option can help in my case, I can manually import Root CA certificates in each profile. But I think it will be hard to update Root CA certificates in future  in that way.
    Second is Certificate Trusted Server Rules,  this option have matching capability by certificate Common Name.  For what can be used this option ?

    Normally the way it works is that you set up your Enterprise Root CA, and then have it issue a certifcate for the AAA server (ie ACS, ISE, etc). You then install this certificate on the AAA server and (in an Active Directory environment) add the Root CA certificate to the client systems local certificate store. What that means is that any certificates (such as the one installed on the AAA server) that are presented to the client that are signed by the root are automatically trusted.
    Server validation is an extra step in terms of proving the identity of the AAA server to the authenticating client. As such, when you build the policy in the NAM editor, it would look similar to the image below:
    I like to use the CN (Common Name) as the match criteria and build my CA issuance policy to always include the FQDN in the certificate for identity purposes.
    Hope this helps!

  • Windows phone security on wireless networks

    I am a post-doc at large medical center, and requested access to our secure wireless network due to the nature of my work. I was told by our IT support desk analysts that Windows
    Phone is not supported at our medical center (at all), because Windows phones are "too insecure to put on our network." Because of this, I either have to get rid of my brand new Windows Phone to get an android or I will never be allowed to have access
    to the secure Wi-Fi as necessary for my job. Any thoughts or suggestions? This seems to be a serious limitation of Windows Phone.

    Your support desk is outright lying to you. There is no issue with Windows Phone security on wireless networks, they just don't want to support your phone. It might be possible that Windows Phone doesn't support the particular kind of wireless encryption
    that your org uses, but I'm pretty sure that was all solved with Windows Phone 8.
    In fact, Windows Phone is more secure in some ways because unlike iOS and Android, you cannot override security certificate problems.

  • Unable to connect Photosmart C4795 to secure wireless home network

    I recently purchased a Photosmart C4795 for use on a secure home wireless network that only has two laptops on it.  I am using a Belkin G Wireless Router and Windows XP as an operating system.  The network uses WEP privacy, and I have I know I have to do something with the passphrase and the printer...but I just can't figure out where or how.  This is how my problem goes:
    I followed the setup wizard, and press the WPS button on the router when prompted.  The printer's blue light turns on, and I proceed to  choose the "Wireless network connection (802.11)" option to connect the device.  I then select "No (or not sure), my printer is connected to my network.  Help me to setup the wireless network connection for my printer"
    From there, I connect my laptop to the printer via USB as prompted, and the wizard begins installing several components (x/9) but always gets stuck on step 6 for a few minutes, and then says "Printer Setup has failed to complete."  After retrying this a couple times, my only choice is to check "Continue the installation without connecting to the printer now, I will connect later" and click Next.  The wizard ends, saying I'll have to add the device later, so when I go that option I once again choose "Wireless network connection"  From there, it gives me a blank printer list.  No printers, let alone the one I want, show up after Refreshing.  So when I click "my printer is not listed" I'm then back at square one where I am prompted to USB connect the printer and it just loops over the same errors. 
    Does anyone please have some advice or opinions?  I've tried calling customer support and I've browsed the forums, but I haven't found the solution and I'm just pretty confused.  Any help at all would be greatly appreciated.

    Let's add the printer manually. 
    Verify that you can browse to the printer's internal web page by its IP address into a browser.  (The IP address is on the Network Config Page that you can print from the printer's front panel).
    1. Click "Start" button --> Printers and Faxes.
    2. Under Printer Tasks, click "Add Printer".
    3. Click "Next" button on the Add Printer Wizard window.
    4. Select "Local printer attached to this computer". Deselect "Automatically detect and install My Plug and play printer". Click "Next".
    5. Under Select a Printer Port option, select "Create a new port" and select "Standard TCP/IP Port" and click "Next" button.
    6. In the "Welcome to the Add Standard TCP/IP printer port wizard" make sure that the printer is turned on and connected to same network that your computer is connected to. Click "Next" button.
    7. Under "Add Standard TCP/IP Printer Port" enter the printer's IP address. Click "Next" then click "Finish".
    8. Now, select HP from the list of manufacturers, select your printer from the list of Printer models and click 'Next' button.
    9. If you can't find your printer, you'll need to find the install CD and use the "Have Disk" option to select one of the hp*.ini files. Alternatively, you can select another HP printer model that is a similar type (series).
    10. Add the print spooler name and click "Next".
    11. Click "Next"
    12. Click "Next" and then "Finish"
    Say thanks by clicking "Kudos" "thumbs up" in the post that helped you.
    I am employed by HP

  • How do I see my website within our network with it's proper name

    We can see the website foo.com outside of our network. But to see it within our network we have to go to http://192.168.0.4.
    How do we get it to send requests for foo.com to 192 etc within the network?

    Avoid the /etc/hosts file -- it's just a quick fix that you can use in a pinch. It's only used for client settings. You could add the 192.168.0.4 foo.com line to one of your workstations and they'd be able to see it. It's a workaround for not having DNS service.
    You can use the DNS server on the server machine or, if you have another DNS server on your LAN, you can add the record to that. If you want to use the DNS server included with OS X Server, then yes, you'll have to start the DNS server. If you're totally unfamiliar with DNS, you'll want to read up on it first. (Page 37 of this document starts Apple's documentation of the DNS service. Also, this forum should provide a good archive of DNS questions/answers.)

  • Open File - Security Warning with Network-based Silent Install of CS4

    I am attempting to run an enterprise deployment of CS4 Design Standard Edition onto a pool of WinXP Pro workstations. I placed all of the install files on a networked server running Windows 2003, and generated from there all of the requisite .xml files (install, uninstall, and override files). From this network share, I can successfully run a silent install.
    HOWEVER. Multiple times (two or three) during the course of the silent install, I receive the same pop-up security warning from Windows XP (definitely an OS message, not anti-virus or other) that reads as follows:
    Open File - Security Warning
    Do you want to run this file?
    Name: AIRApplicationRunner.exe
    Publisher: Adobe Systems Incorporated
    Type: Application
    From: (server IP address)
    I have tried excluding Adobe Air from the installation package, but I still receive the same security prompt. This is sufficiently a hassle to have to click through these prompts in a silent install. But more importantly I am unable to run the silent install as part of a logoff script because for all intents & purposes it is no longer a silent install (i.e. it requires user intervention). To top it off, I found when testing the logoff script the prompts are suppressed and the installation fails prior to the bulk of the installation (Photoshop, Illustrator, & InDesign).
    I'm sure that I could run the install by copying all of the files to each local workstation, but again that would defeat the purpose of an easy, network-based install. In the past I was able to install CS3 in this fashion with no troubles, which of course did not include Adobe Air.
    Can anybody offer a suggestion as to how to disable these security messages, or alternately, how to entirely exclude Adobe Air from the install package? I have found a VB script that is supposed to address the security warnings issue, but to run the script also requires the user to accept it at a security prompt.
    Thanks in advance for any assistance!
    -Dan

    I'm now able to deploy design suite premium cs4 successfully.
    The issue for me was that the AirapplicationRunner installs some useless software. I worked around the issue with the Airapplicationrunner prompt by removing any apps that are installed using that method. By "removing" I mean marking that app as "donotinstall" in the deployment file. The apps I removed are these adobe codes for adobe media player, adobe.com, adobeair itself. The below is from my deploy.xml file used for the silent workflow:
    donotinstall
    donotinstall
    donotinstall
    If you mark those three adobe codes as "donotinstall" the prompt never appears and the real apps get installed just fine.

  • How to Open Ports for HP Printers for all computers within the network (router)

    Hi,
    I have the EA6700 router and a few HP printers and Multi purpose printers/scanner/fax ...
    When installing the print drivers, they are ok.  Sending to printers are not a problem.  However, the problem comes with scanning.
    The HP Software ask to open a port for it...     How do I do that?   I checked, it seems other computers are affected by it too after changing to this new router.
    I read that it can be done on the "App and gaming" section at the Security page.  Do I go to the port forwarding section?   But it only forward to one computer.  that doesn't work...    
     I'd like to open a port and a lot of other IPs can print and scan from it.
    Thanks

    Ports are not needed to be opened on the LAN side of the router for Printers and Scanners. I recommed that tiy contact hp for help and information regarding setup and configuration of those devices. Also the addition of a external Gb network switch for these devices is recommended as well. Would help eliminate any un-necessary router configuration or processing. 

  • Computers on my secured time capsule network?  How did they get on?

    When I look at my Time Capsule network, I see two computers connected to it as well as myself: workgroup and macbook c66e5 (or something like that).  I have Uverse and the TC has made its own network in bridge mode.  I have also set up a WPA2 Personal password.  The password is 19 characters long so I know it is very secure, yet somehow these two computers are on the network.  What's weird, is that I cannot see these computers or my own computer on the network from my brother's mac, yet I can see him.  Also, on my uverse network, I never see these other computers in the finder.  Do I have a security problem or is this normal?  Thanks in advance for your help!
    Kyle

    I suppose access to the log is yet another thing apple removed from their toyland version 6 airport utility.. if so you will need to install 5.6.. which is a bit tricky but can be done.
    Download the real utility.. not available for ML so the lion version.
    http://support.apple.com/kb/DL1482
    Open the DMG file to see the pkg file but do not proceed further.
    Download install and run unpkg.
    http://www.timdoug.com/unpkg/
    Drag the pkg file of airport 5.6 utility over unpkg.. it will unpack it to the desktop in a directory.. AirPortUtility56, drill down, applications, utilities and you will find the actual utility.. drag it to your utilies directory. Now you have a REAL TOOL not a TOY.. Log is under advanced.
    Then you will know what is happening instead of living in the darkness.

  • Captivate 6.01 32 bit crashes when adding an interaction on secured DoD/AF network

    Hello,
    I have been trying to work with the Adobe engineers to troubleshoot what could possibly be causing the problem, without much luck. I'm wondering if any other DoD developers who are working behind a firewalled .mil domain are having similar issues. Whether using left menu icon or top menu dropdown, when I choose to add an interaction, The proper dialog pops up allowing me to choose which interaction I want, but when I click "insert" the system immediately crashes instead of giving me the pop up dialog to customize the look of the interaction. The 64 bit version of Captivate 6 works fine on our network, it is only the 32 bit version that's effected. I does this every time without exception. However, when we attempted to run Captivate 6 through windbg (Windows Debug) and the application was started through the windbg application, THEN Captivate 6 32 bit, WOULD add an interaction just fine, I could not duplicate the malfunction when running within windbg, so it's getting very frustrating.  Was just wondering if ANY other DoD Cap6 users are having similar problems, regardless of which branch of service, as long as they're working on-base from behind a .mil domain network.
    KurtMel

    Hi there,
    Is this issue happens only with 32- bit Captivate?Can you please try installing 64- bit Captivate and verify its working fine on your environment or not?.
    Thanks,
    Nimmy Sukumaran.

  • : Role Security within Company Code at Profit Center Level

    Can someone explain how to restrict GL transaction processing within a company code, below the company code level, at a Divsion / Branch level at the profit center level for ECC6 via user authorizations in FI GL roel security?

    Hi,
    Create Authorization Objects for the branch/ division containing the User ids and mention in the role.
    Thanks
    VK

  • NAC Appliance. Does it add any security to the network?

    Hi!
    I currently don't have the Clean Access in hands, but, so far as I understood, the user can disable required antivirus or enable bittorent (or other prohibited application) at any time and this action will not be noticed by the Clean Access Agent and Clean Access Server. This is because this Cisco "security solution" doesn't support periodic reassessment of clients (neither Agent-initiated nor CAS-initiated).
    Is this correct?
    (BTW the NAC Framework architecture supports this).
    The only option I've found is to periodically clear Certified Device List using timers. But this will end the user session too! Both, good guys (who still meet all our requirements), and bad guys (who now violate our security policy) will have to reauthenticate, because this "feature" doesn't differentiate between them!
    Also, this will likely break OOB. It will either bounce the switch port, if port bouncing is enabled, or put the port back into the authentication VLAN with IP address in the access VLAN, which is incorrect for the authentication VLAN (has it been fixed by Cisco?)!
    In general, is my understanding correct?

    Apple does not use the term "SIM free" in any of their marketing materials.  If you bought the phone at Carphone Warehouse in the UK, it will lock to the first UK carrier used to activate it. It can not be activated on a foreign network unless unlocked by the UK carrier used to activate it. Other than that, so far as I'm aware, phones are "locked" or "unlocked". I don't know of anywhere else where things are done like they are at carphone warehouse in the UK.

  • Can't see any shared devices within my network, only devices that aren't in my network.

    One of my students updated to Mavericks. Since then she hasn't been able to see shared devices on our network, most importantly, our Mac server that we use for file storage. We're in a protected wireless network that only people from our department can sign in to. She can however see a couple of dozen computers from outside of our network, but nothing from within ours.
    I deleted the entry for our wireless network in the Keychain, thinking that maybe a setting within it got corrupted. Didn't resolve the issue.
    Any ideas?

    It's worth double checking the device is on the correct network.
    See if the IP address is correct for the network range and you see the correct router etc. Bonjour is a broadcast service, so it doesn't usually cross networks and subnets unless that has been configured to do so.
    It could be that another remembered network is being used instead of the protected one.
    If you can open Terminal you can try flushing the local cache…
    dscacheutil -flushcache
    You can also see if she has 'mdns' records for your server (assuming afp is running) via …
    dns-sd -B _afpovertcp
    You will need to hit ctrl+c to exit this tool.
    Bonjour Browser is easier to use to see records, but it would need installing.
    http://www.tildesoft.com/

  • Influencing BGP attributes within MPLS network

    pls take a look at my question and diagram is attached in the file. pls help me to fix this problem.
    I have following requirement about traffic paths within the 
    MPLS network.MPLS network is running MP-BGP4.
    1.Traffic from Europe branch to Asia branch go through London
      router.
    2.Traffic from America branch to Asia branch go through Los Angeles
      router.
    3.The two paths through London and Los Angeles should have redundancy.
      That is if path through London is not accessible all the traffic must
      go through Los Angeles. IF Los Angeles path go down all the traffic must
      go through London.
    4.Traffic from Asia to Europe and America is controlled by redistributing
      BGP4 learned routes with different metrics at the London and Los Angeles
      routers.So that trafic from Asia branch to Europe go through London and
      traffic from Asia to America go through Los Angeles.
    I have been using below configs on the PE routers. But it is not working.
    In the MPLS network only one path is selected for both traffic from Europe
    and America.Pls can anyone help me to fix this problem.
    #PE3
    ip vrf CUSTOMER
    rd 1:10
    route-target export 1:20
    route-target import 1:40
    export map EXPORT-ROUTE
    import map IMPORT-ROUTE
    interface FastEthernet0/0
    description LONDON-GW
    ip vrf forwarding CUSTOMER
    ip address 1.1.1.2 255.255.255.252
    router bgp 65400
    address-family ipv4 vrf CUSTOMER
    redistribute connected
    neighbor 1.1.1.1 remote-as 65401
    neighbor 1.1.1.1 activate
    neighbor 1.1.1.1 next-hop-self
    neighbor 1.1.1.1 soft-reconfiguration inbound
    no auto-summary
    no synchronization
    exit-address-family
    ip extcommunity-list 1 permit rt 1:10
    ip extcommunity-list 2 permit rt 1:40
    route-map EXPORT-ROUTE permit 10
    description LONDON-GW
    match extcommunity 1
    set extcomm-list 1 delete
    set extcommunity rt 1:20 additive
    route-map IMPORT-ROUTE permit 10
    description EU & US-BRANCH
    match extcommunity 2
    #PE4
    ip vrf CUSTOMER
    rd 1:10
    route-target export 1:30
    route-target import 1:40
    export map EXPORT-ROUTE
    import map IMPORT-ROUTE
    interface FastEthernet0/0
    description LA-GW
    ip vrf forwarding CUSTOMER
    ip address 2.2.2.2 255.255.255.252
    router bgp 65400
    address-family ipv4 vrf CUSTOMER
    redistribute connected
    neighbor 2.2.2.1 remote-as 65402
    neighbor 2.2.2.1 activate
    neighbor 2.2.2.1 next-hop-self
    neighbor 2.2.2.1 soft-reconfiguration inbound
    no auto-summary
    no synchronization
    exit-address-family
    ip extcommunity-list 1 permit rt 1:10
    ip extcommunity-list 2 permit rt 1:40
    route-map EXPORT-ROUTE permit 10
    description LA-GW
    match extcommunity 1
    set extcomm-list 1 delete
    set extcommunity rt 1:30 additive
    route-map IMPORT-ROUTE permit 10
    description EU & US-BRANCH
    match extcommunity 2
    #PE1
    ip vrf CUSTOMER
    rd 1:10
    route-target export 1:40
    route-target import 1:20
    route-target import 1:30
    export map EXPORT-ROUTE
    import map IMPORT-ROUTE
    interface FastEthernet0/0
    description EU-BRANCH
    ip vrf forwarding CUSTOMER
    ip address 3.3.3.2 255.255.255.252
    router bgp 65400
    address-family ipv4 vrf CUSTOMER
    redistribute connected
    redistribute static
    no auto-summary
    no synchronization
    exit-address-family
    ip route vrf CUSTOMER 172.16.1.0 255.255.255.0 FastEthernet0/0 3.3.3.1 name EU-BRANCH
    ip extcommunity-list 1 permit rt 1:10
    ip extcommunity-list 2 permit rt 1:20
    ip extcommunity-list 3 permit rt 1:30
    route-map EXPORT-ROUTE permit 10
    description EU-BRANCH
    match extcommunity 1
    set extcomm-list 1 delete
    set extcommunity rt 1:40 additive
    route-map IMPORT-ROUTE permit 10
    description LONDON-GW(MAIN)
    match extcommunity 2
    set metric 100
    route-map IMPORT-ROUTE permit 20
    description LA-GW(BACKUP)
    match extcommunity 3
    set metric 200
    route-map IMPORT-ROUTE permit 30
    description OTHER
    #PE2
    ip vrf CUSTOMER
    rd 1:10
    route-target export 1:40
    route-target import 1:20
    route-target import 1:30
    export map EXPORT-ROUTE
    import map IMPORT-ROUTE
    interface FastEthernet0/0
    description US-BRANCH
    ip vrf forwarding CUSTOMER
    ip address 4.4.4.2 255.255.255.252
    router bgp 65400
    address-family ipv4 vrf CUSTOMER
    redistribute connected
    redistribute static
    no auto-summary
    no synchronization
    exit-address-family
    ip route vrf CUSTOMER 192.168.1.0 255.255.255.0 FastEthernet0/0 4.4.4.1 name US-BRANCH
    ip extcommunity-list 1 permit rt 1:10
    ip extcommunity-list 2 permit rt 1:20
    ip extcommunity-list 3 permit rt 1:30
    route-map EXPORT-ROUTE permit 10
    description US-BRANCH
    match extcommunity 1
    set extcomm-list 1 delete
    set extcommunity rt 1:40 additive
    route-map IMPORT-ROUTE permit 10
    description LONDON-GW(BACKUP)
    match extcommunity 2
    set metric 200
    route-map IMPORT-ROUTE permit 20
    description LA-GW(MAIN)
    match extcommunity 3
    set metric 100
    route-map IMPORT-ROUTE permit 30
    description OTHER

    Hi Manoj
    "send-community both" will export both Standard and Extended Communities
    The Standard Community Values which we are setting up New on PE3 and PE4 and Matching on PE1 and PE2 can be anything in ASN:nn Format..I Just randomly chose them as 65400:1111 on PE3/PE1 and 65400:2222 on PE4/PE2.
    The extcommunity values to be used on PE3/PE4 will be the export RT values used in the VRF Customer Config as posted in your first post..
    #PE3
    ip vrf CUSTOMER
    rd 1:10
    route-target export 1:20
    route-target import 1:40
    export map EXPORT-ROUTE
    import map IMPORT-ROUTE
    #PE4
    ip vrf CUSTOMER
    rd 1:10
    route-target export 1:30
    route-target import 1:40
    export map EXPORT-ROUTE
    import map IMPORT-ROUTE
    I think I mixed up little with PE3 as PE1 and PE4 as PE2 instead ..Revised corrected config would be
    On PE3-- Under VPNv4 We enable sending out the normal community values out to the RR.Then we match the extcommunity rt for the VRF Customer and set the community value to 65400:1111 which will be matched at PE1
    router bgp 65400
    address-family vpnv4
    neighbor "RR-IP" send-community both
    neighbor "RR-IP" route-map community out
    exit-address-family
    route-map community permit 10
    match extcommunity CUSTOMER
    set community 65400:1111
    route-map community permit 20
    ip extcommunity-list standard CUSTOMER permit rt 1:20
    On PE4-- Under VPNv4 We enable sending out the normal community values out to the RR.Then we match the extcommunity rt for the VRF Customer and set the community value to 65400:2222 which will be matched at PE2
    router bgp 65400
    address-family vpnv4
    neighbor "RR-IP" send-community both
    neighbor "RR-IP" route-map community out
    exit-address-family
    route-map community permit 10
    match extcommunity CUSTOMER
    set community 65400:2222
    route-map community permit 20
    ip extcommunity-list standard CUSTOMER permit rt 1:30
    On PE1-- Under VPNv4 We match the community value 65400:1111 which was set at PE3 and set the LP to 110
    router bgp 65400
    address-family vpnv4
    neighbor "RR-IP" route-map community in
    exit-address-family
    route-map community permit 10
    match community CUSTOMER
    set local-preference 110
    route-map community permit 20
    ip community-list standard CUSTOMER permit 65400:1111
    On PE2-- Under VPNv4 We match the community value 65400:2222 which was set at PE4 and set the LP to 110
    router bgp 65400
    address-family vpnv4
    neighbor "RR-IP" route-map community in
    exit-address-family
    route-map community permit 10
    match community CUSTOMER
    set local-preference 110
    route-map community permit 20
    ip community-list standard CUSTOMER permit 65400:2222
    Make Sure that RR is enabled to propogate the normal BGP communities as well...
    Hope this helps to answer your question..Please let me know for any clarifications..
    Regards
    Varma

  • Open File - Security Warning for network launch

    Another set of applications I am trying to bring over from ZfD 7. They are
    simple apps that just launch an executable from a UNC path
    (\\server\volume\folder\app.exe). The only action is a Launch Executable
    action with the network UNC path to the app. These worked fine with ZfD,
    but with ZCM I get a popup security warning box saying that the publisher
    could not be verified (Unknown Publisher) every time I launch the
    application. I can just click Run and it continues as it should. These
    applications are "Unknown" in the sense that I built them myself. Is there
    anyway to make this prompt go away and stop bothering me?
    Thanks.

    Try This...
    Create a Group Policy in Zen and apply it to the machines you want to run the exe on with the following settings
    In "Computer Configuration | Administrative Templates | Windows Components | Internet Explorer | Internet Control Panel | Security Page" make the following changes...
    Intranet Sites: Include all local (intranet) sites not listed in other zones - Enabled
    Locked-Down Intranet Zone Template - Enabled - Low
    Intranet Zone Template - Enabled - Low
    Trusted Sites Zone Template - Enabled - Low
    Intranet Sites: Include all sites that bypass the proxy server - Enabled
    Intranet Sites: Include all network paths (UNCs) - Enabled
    Site to Zone Assignments List - Enable - *****
    *****Click Show and Then Add... here you identify where you are trying to install from such as *.adomain.com OR server.adomain.com OR 10.0.0.0 OR Z: in the top line and set the value as 1. You can create as many zone assignments you want... I have 4 in mine but that is because i don't completely understand what in the world i am doing!*****
    Move to the "Trusted Sites Zone"
    Launching programs and unsafe files - Enabled - Enable
    Save it and apply it (At your own risk of course!) and hope i didn't forget something...

Maybe you are looking for

  • Error while associating a report column with a LOV

    Hi All, I have a region based on a SQL Report. One of the columns of this report is based upon a LOV. While running the page, i get the following error - report error: ORA-20001: Error fetching column value: ORA-06502: PL/SQL: numeric or value error.

  • It shows me that I need to install missing plugins when I click on it it shows that I don't have any missing plugins i reinstalled it three times please help me

    I had a problem opening tumblr so i reinstalled firefox and now whenever open a website it show a bar says additional plugins are required to display all the media on this page then i click on the button next to it that says install missing plugins a

  • Hashing with double linked list....

    Okay, everything compiles great but I'm getting a NullPointerException upon running the program. 'line' is a string from a file to let you know that much. 'firstnode', 'nownode', and 'lastnode' are pointers in my array linked list 'anArray'. I know c

  • Adobe Premiere CS6 and Mac/OSX Maverics

    After I Installed OSX Maverics on my mac: Adobe Premiere CS6 is crashing all the time. I have a legal version of Premiere CS6, but I´m not sure how I update? In Creative cloud?

  • Schema issue

    Hi, Pelase see my following question We have 6 schemas created on a single instance. Each schema represents a client/business. There is a data dependency among these 6 schemas. These schemas hold their own set of table in their corresponding schemas.