SNMP MIB to configure the routers and switches

I have snmp write community string configured on all routers and switches. I am looking for a SNMP MIB to configure a command to Cisco routers and switches using SNMPSET option. Can some one point me in right direction for SNMP MIB values to write commands on routers and switches ?

Hi,
there are many, many mibs. Depends on what you are interested about, use search function on CCO. This is voip forum, there is another for network management.

Similar Messages

  • Time and date are set incorrectly on the routers and switches

    I've just noticed that the date and time on all my Cat4006's, Cat3548's and Cat6000 were grossly incorrect. I was wondering if this would contribute to problems I am having on the network. Does the switches/routers check the timestamp on the packets it's passing and/or append or add thereto?

    Date and time set on routers and swithces will not affect your user data traffic.
    Keeping Date and time synchronized across network devies will help if you are troubleshooting your network.
    If you need to keep date and time synchronized across all the network devices, use NTP (Network Time Protocol)

  • Ask the Expert: Packet Capture Capabilities of Cisco Routers and Switches

    With Rahul Rammanohar 
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about packet capture capabilities of Cisco routers and switches.
    In May 2013, we created a video that included packet capture capabilities across multiple Cisco routers and switches. For each product, we began with a discussion about the theory of the capabilities, followed by an explanation of the commands, and we concluded with a demo on real devices. In this Ask the Expert event, you’re encouraged to ask questions about the packet capture capabilities of these Cisco devices:
    •       7600/6500: mini protocol analyzer (MPA), ELAM, and Netdr
    •       ASR9k: network processor capture
    •       7200/ISRs: embedded packet capture
    •       Cisco Nexus 7K, 5K, and 3K: Ethanalyzer
    •       Cisco Nexus 7K: ELAM
    •       CRS: show captured packets
    •       ASR1K: embedded packet capture
    More Information
    Blog URL: Packet Capture Capabilities of Cisco Routers and Switches
    Watch the Video:  https://supportforums.cisco.com/videos/6226
    Hitesh Kumar is a customer support engineer in the High-Touch Technical Services team at Cisco specializing in routing protocols. He has been supporting major service providers and enterprise customers in routing, Multiprotocol Label Switching (MPLS), multicast, and Layer 2 VPN (L2VPN) issues on routing platforms for more than three years. He has more than six years of experience in the IT industry and holds a CCIE certification (number 38757) in service. 
    Rahul Rammanohar is a technical leader with the High-Touch Technical Support Team in India. He handles escalations in the area of routing protocols and large-scale architectures for devices running Cisco IOS, IOS-XR, and IOS-XE Software. He has been supporting major service providers and large enterprise customers for routing, MPLS, multicast, and L2VPN issues on all routing platforms. He has more than 13 years of experience and holds a CCIE certification (number 13015) in routing/switching and service provider.
    Remember to use the rating system to let Hitesh and Rahul know if you have received an adequate response.  
    Because of the volume expected during this event, Hitesh and Rahul might not be able to answer each question. Remember that you can continue the conversation in the Service Provider, sub-community forum shortly after the event. This event lasts through November 1, 2013. Visit this forum often to view responses to your questions and the questions of other Cisco Support Community members.

    Hello Erick
        Thanks for the topology. The trigger will be different for labelled  packet as you would need to mention the values of labels too in the  trigger.
         Below are two examples of one or two labels being  used, it depends on where you are capturing the packet in mplsvpn  scenario which will decide teh number of labels being imposed on the  packet.
    Trigger for one label. (if the router on which you are capturing the packet PHP is being performed)
    VPN label - 5678
    Source Address - 111.111.111.111
    Destination Address - 123.123.123.123
    show platform capture elam trigger dbus others if data = 0 0 0 0x88470162 0xE0000000 0 0 0x00006F6F 0x6F6F 7B7B 0x7B7B0000 [ 0 0 0 0xffffffff 0xf0000000 0 0 0x0000ffff 0xffffffff 0xffff0000 ]
    Trigger for two labels. (for other core routers)
    IGP label - 1234
    VPN label - 5678
    Source Address - 111.111.111.111
    Destination Address - 123.123.123.123
    show platform capture elam trigger dbus others if data = 0 0 0 0x8847004D 0x20000162 0xE0000000 0 0 0x00006F6F 0x6F6F7B7B 0x7B7B0000 [ 0 0 0 0xffffffff 0xf000ffff 0xf0000000 0 0 0x0000ffff 0xffffffff 0xffff0000 ]
        You can check the labels being used (by using show ip cef <> details) and covert their values to hex and change the trigger accordingly.
         I have changed the colors for better understanding. If you notice carefully in the trigger the values for ip address, labels have just been converted to their respective hex values which could be replaced.
         Please let me know if this helps.
    Thanks & Regards
    Hitesh & Rahul

  • VLAN Support at routers and switches

    is there a table with howmany VLANs each of cisco routers and switches can support.
    its not always written at the product data sheet.

    hi
    Do find the details for 1800 ISR series router..
    802.1Q VLAN
    A total of eight VLANs can be configured to segment a network and offer additional security and separation of network traffic.
    VLAN Support
    802.1Q VLAN supported on all 10/100BASE-T ports
    VLAN Configured
    8 VLANs
    Wireless VLANs
    16
    7400 series has reached EOL/EOS status hence i couldnt find any datasheet for that model..
    regds

  • Configuring the Catalyst 6500 Switch for IPS Inline Operation of the IDSM

    I understand how to configure the Catalyst 6500 switch so that the monitoring ports are access ports in two separate VLAN's for inline operation.
    However, I don't see any documentation that describes how the desired VLAN traffic gets forced through the IPS.
    In promiscuous mode, you can use VACL's to copy/capture and forward the desired traffic to the IDSM for analysis. I'm not seeing how to get the desired traffic through the IPS.
    Note that the host 6500 is running native IOS 12.2(18)SXE.
    Thanks for any assistance.

    A tranparent firewall is a fairly good comparison.
    Let's say you have vlan 10 with 100 PCs and 1 Router for the network.
    If you want to apply a transparent firewall on that vlan you can not simply put one interface of the firewall on vlan 10. Nothing would go through the firewall.
    Instead you have to create a new vlan, let's say 1010. Now you place one interface of the firewall on vlan 10 and the other on vlan 1010. Still nothing is going through the firewall. So now you move that Router from vlan 10 to vlan 1010. All you do is change the vlan, the IP Address and netmask of the router stay the same.
    The transparent firewall bridges vlan 10 and vlan 1010. The PCs on vlan 10 ae still able to communicate to and through the router, but must go through the transparent firewall to do so.
    The firewall is transparent because it does not IP Route between 2 vlans, instead the same IP subnet exists on both vlans and the firewall transparently beidges traffic between the 2 vlans.
    The transparent firewall can do firewalling between the PCs on vlan 10 and the Router on vlan 1010. But is PC A on vlan 10 talks to PC B on vlan 10, then the transparent firewall does not see and can not block that traffic.
    An InLine sensor is very similar to the transparent firewall and will bridge between the 2 vlans. And similarly an InLine sensor is able to InLine monitor traffic between PCs on vlan 10 and the Router on vlan 1010, but will not be able to monitor traffic between 2 PCs on vlan 10.
    Now the router on one vlan and the PCs on the other vlan is a typical deployment for inline sensors, but your vlans do not Have to be divided that way. You could choose to place some servers in one vlan, and desktop PCs in the other vlan. You subdivide the vlans in what ever method makes sense for your deployment.
    Now for monitoring multiple vlans the same principle still applies. You can't monitor traffic between machines on the same vlan. So for each of the vlans you want to monitor you will need to create a new vlan and split the machines between the 2 vlans.
    In your case with Native IOS you are limited to only 1 pair of vlans for InLine monitoring, but your desired deployment would require 20 vlan pairs.
    The 5.1 IPS software has now the capability to handle the 20 pairs, but the Native IOS software does not have the capability to send the 40 vlans (20 pairs) to the IDSM-2.
    The Native IOS changes are in testing right now, but I have not heard a release date for those changes.
    Now Cat OS has already made these changes. So here is a basic breakdown of what you could do in Cat OS and you can use in preparation for a Native IOS deployment when it gets released.
    For vlans 10-20, and 300-310 that you want monitored you will need to break each of those vlans in to 2 vlans.
    Let's say we make it simple and add 500 to each vlan in order to create the new vlan for each pair.
    So you have the following pairs:
    10/510, 11/511, 12/512, etc...
    300/800, 301/801, 302/802, etc....
    You set up the sensor port to trunk all 40 vlans:
    set trunk 5/7 10-20,300-310,510-520,800-810
    (Then clear all other vlans off that trunk to keep things clean)
    In the IDSM-2 configuration create the 20 inline vlan pairs on interface GigabitEthernet0/7
    Nw on each of the 20 original vlans move the default router for each vlan from the original vlan to the 500+ vlan.
    At this point you should ordinarily be good to go. The IDSM-2 won't be monitoring traffic that stays within each of the original 20 vlans, but Would monitor traffic getting routed in and out of each of the 20 vlans.
    Because of a switch bug you may have to have an additional PC moved to the same vlan as the router if the switch/MSFC is being used as the router and you are deploying with an IDSM-2.

  • Slow network speed after connecting to routers and switch

    Hello
    The following is my test setup I have running at my house for some practice and leaning
    Some reason the PC1 which is a laptop is getting very horrid internet / download speeds, and I am trying to narrow down why.
    Example, on my main desktop that is connected right to the Arris Cable modem / router I get around 34Mbps down.  But the laptop that is connected in the topology above, is getting 0.06 Mbps down
    I am not sure if there are settings that need to be checked on the routers or what could cause this, I am figuring the traffic is bogging at some place.
    Thanks

    Update on some things I have tried
    As I am not sure the cause, I have been reading and trying different things, last thing was to set the interfaces to Duplex Full
    I did this on both the Ethernet ports on the routers, and both of the Fast Ethernet ports being used on the switch, but has not changed the speed that PC1 is getting.
    Also turned on CEF on both routers

  • How to configure the runtime and consolidation for a track in CMS.

    How to configure the runtime and consolidation for a track in CMS.
    I can see the track exists in CMS but the same doesnt pull up in the NWDS in the development configuration perspective.
    I compared the given track with the one which gets pulled up in NWDS. Theres something called runtime system and consolidation which isnt defined for the track which is invisible.
    Please advise , what are these required for. And how can we configure the same.

    The runtime systems are defined for a track to setup the Transport path for any code changes....the Consolidation system is usually defined as a Virtual system for the track and used for comparison and fixing any broken or Dirty DC's ....that means it's not used as a Runtime System for Deployment as compared to DEV,QAT and PROD used for Deployment...
    Hope it helps..
    Regards,
    Shikhil

  • I would appreciate your help on how to configure a gmail in a way  it  ask  for the password  everytime I connect?. In the only way I can configure it  I have to include the pw when configuring the account  and  after that  it do not ask for pw

    I would appreciate your help on how to configure a gmail in a way  it  ask  for the password  everytime I connect?. In the only way I can configure it  I have to include the pw when configuring the account  and  after that  it do not ask for pw  so  everyone that shares my iPad can  oppen my mail  with  no pw  required.
    Thank

    The iPad is designed to be a single user device, and there is currently no way to password protect the Mail app - even removing the account password from Settings > Mail, Contacts, Calendars will just prevent new mail being downloaded, it won't hide those that have already been downloaded. There is this work-around for the app : https://discussions.apple.com/message/13127632#13127632 . Also there might be third-party email apps that feature password protecting.

  • How to configure the XI  and PLM in discovery box

    How to configure the XI (SLD, Integration repository, Integration Builder ) in  SAP discovery system.
    And also i want to configure the PLM and xRPM within R/3 of discovery box.
    Regards,
    Nilesh Damle

    Hi Frank,
    well, first of all, your application provides log configuration information using an XML file at deployment time. This file is called log-configuration.xml (you can see the DTD description here: http://help.sap.com/saphelp_nw04/helpdata/en/48/ef8748caed894bb4b3ae953a60c592/frameset.htm). There you can set configure log controllers, which could be two types: location and category. So, you can specify your location and severity there. This is described here: http://help.sap.com/saphelp_nw04/helpdata/en/35/671c0136b4714c9e1b16b68211287b/frameset.htm.
    Then, after the application is deployed, the log configurations you provided for it are registered with the Log Configuration tool I mentioned about. Using this tool you can later on modify your configurations at runtime (for example, change the severity level) without having to redeploy the application.
    I hope it's clearer now? I guess it was me not getting your first question correctly that caused your confusion.
    Greetings,
    Ivo

  • Configure the ADMIN and CLUSTER service connections to be SSL

    Can you configure the ADMIN and CLUSTER service connections to be SSL
    rather than tcp?
    I was wondering about the present or future ability to secure other
    connection services with SSL. Can you now or are there future plans
    to configure the ADMIN and CLUSTER service connections to be SSL
    rather than tcp? I suppose I should add the PORTMAPPER to that list.
    My primary interest is for an SSLCLUSTER service in the case where
    two brokers are connected over a non-trusted network. It may
    not be too difficult to secure all the services the same way, but
    perhaps that is on the TODO list.
    A related question is if there are plans to add SSL with client
    authentication as a stronger authentication mechanism than 'simple'
    username and password. I believe you could get the username from
    the client certificate's DN and continue to use the same LDAP user
    repository for access control. I think this is similar to the way
    that BEA's Weblogic server does it.
    Finally should it be possible to deploy the HTTP tunnel servlet to
    a webserver (such as iPlanet Web Server) configured to do SSL with
    client authentication as a work-around to get stronger authentication
    with the current release of the product? Or am I perhaps missing some
    obvious and important detail? :) I guess I would like to know it's been
    done already or is at least possible before I try and do it myself.

    3 scenarios involving SSL are:
    1: JMS client <------- SSL -------> iMQ broker
    2: iMQ admin <------- SSL -------> iMQ broker
    3: iMQ broker <------- SSL -------> iMQ broker (i.e clusters)
    (1) is currently supported in iMQ 2.0
    (2) and (3) is not supported in iMQ 2.0. No concrete plans yet to support
    it in the near future but we'll definitely consider doing it if we
    hear a lot of demand for it.
    ]A related question is if there are plans to add SSL with client
    ]authentication as a stronger authentication mechanism than 'simple'
    ]username and password. I believe you could get the username from
    ]the client certificate's DN and continue to use the same LDAP user
    ]repository for access control. I think this is similar to the way
    ]that BEA's Weblogic server does it.
    This is on our todo list, but due to other more pressing issues we
    have not been able to address it. We will continue to keep it
    on our potential list of new features.
    Sorry if I sound pretty wishy-washy in my responses above, but the fact
    is that the things you mentioned above had to take a backseat
    to other more critical features. That and the usual time/resource
    constraints caused them not to be implemented.
    ]Finally should it be possible to deploy the HTTP tunnel servlet to
    ]a webserver (such as iPlanet Web Server) configured to do SSL with
    ]client authentication as a work-around to get stronger authentication
    ]with the current release of the product? Or am I perhaps missing some
    ]obvious and important detail? :) I guess I would like to know it's been
    ]done already or is at least possible before I try and do it myself.
    Yes, this should be possible (although I don't believe we've tried it here).
    The client authentication here is really only between the JMS client and the
    web server (not between the tunnel servlet and the iMQ broker) and should
    be similar in setup to any other java application talking to iPlanet Web
    Server.

  • Once i am out of wifi network my airtwl 3G netwok does not come back automatically i have to switch off the phone and switch on. any solution

    hi when ever i am out of my wifi network i dont get back my 3 G connection . I have to switch off the mobile and switch on to get back my 3G network of my service provider

    In settings>general> cellular do you have it  turned ON?

  • How to configure the sort and port of a SOAP address dynamically

    Hi All,
    In the “wsdl” we have the SOAP Address defined but in practice we would like to configure the host and the port. As the server on which the service resides may/will change.
    For example:
    http://usciq74.wdf.sap.corp:50077/sap/bc/srt/rfc/sap/CPM_PLANNING_HISTORY?sap-client=003
    We would like to configure the proxy to point to say:
    http://<host>:<port>//sap/bc/srt/rfc/sap/CPM_PLANNING_HISTORY?sap-client=003
    What we see in the Proxy Code is:
    port.setSOAPAddress(new com.sap.flex.ws.runtime.SOAPAddress("http://usciq74.wdf.sap.corp:50077/sap/bc/srt/rfc/sap/CPM_PLANNING_HISTORY?sap-client=003"));
    How could this be achieved.
    Please help.

    Hi Sumit,
    Thanks for the quick response. However, I do not want to change the host and the port in the wsdl. I want it to be so, that it will pick the host and port dynamically(as you have mentioned). However, in out case, the web service has the SOAP address hardcoded as <b>http://usciq74.wdf.sap.corp:50077</b>.
    We would want to write something as http://host:port and then let it pick the host and port dynamically. How is that possible.
    Best Regards,
    Debashree.

  • I can't completely control my cursor on my macbook pro, and it keeps jumping to the right of the screen and switching my screen to the dashboard or utilities. Any ideas on what might be causing this, and what I can do about it?

    i can't completely control my cursor on my macbook pro, and it keeps jumping to the right of the screen and switching my screen to the dashboard or utilities. Any ideas on what might be causing this, and what I can do about it?

    If you have another pointing device installed, remember that the Mac uses "all sources live". You can literally use two or more mice or two or more keyboards at once.
    Your trackpad, if that is what you are using, must be very clean. Any debris may be seen as another "finger".

  • Configuring the iPhone and your environment for wireless corporate email

    I'm posting this as a top level thread, because I'm certain that there are others out there, who like me, are trying to figure this out.
    Configuring the iPhone for Enterprise Use
    With Apple’s release of the iPhone, IT organizations are presented with an interesting challenge. Senior execs, gadget heads, and technoratti are all flocking to this device, heralded as the be all and end all of smartphone telecommunications technology. As these devices begin to flood into our organizations, we are met with the challenge to ‘make it work’.
    After much explaining that the iPhone is not intended for Enterprise integration, and many discussions surrounding the technical feasibility of bringing said devices into the fold, and being the resident Mac and Linux head with an iPhone in hand, I decided to embark on the mission of making one ‘work’. I succeeded in part, however it’s not the kind of ‘work’ that is going to be viable for most end users.
    First of all, it’s important to understand that the email client for the iPhone is a modified version of Mac’s Mail program. Not the best client in the world, but it does support Exchange integration. It also does external email sources, such as Yahoo and gMail, very well. For my interest though, I’m focusing on the Exchange integration functionality, as that is just about everyone’s corporate standard.
    Bringing this task to fruition requires some understanding about the limitations of the iPhone, as well as some of its current quirks. Wireless802.11x, EDGE, VPN and Mail are all components necessary to provide a serviceable solution for mobile email access, and each of these things has some peculiarities that don’t appear to be fully worked out by Apple at this time.
    For instance, within my organization, we have a secured wireless connectivity option available within our building; however, the SSID of this network is not broadcast, for the obvious reasons. SO, connecting the iPhone to it is a manual process of defining the network, and automatic reconnection seems to be very hit or miss, so it becomes far less of an option for any form of direct network access to your Exchange environment. (As an example, I had to redefine that network, on the iPhone, at least half a dozen times during this process.)
    The other components have equally quirky issues, and I will discuss the how’s to get around them below.
    In coordinating this into a cohesive plan however, I will break this into three sections;
    1. Wireless and EDGE connectivity
    2. VPN access to your network
    3. Connecting to Exchange
    So, without further ado;
    Wireless and EDGE Connectivity
    The wireless capabilities of the iPhone are, on the surface at least, excellent. It connects seamlessly to unsecured networks, offers the option of prompted or unprompted automatic connectivity, and is capable of 802.11G performance. Not bad for such a small package. However, it is very limited in the forms of secure network access it supports. These are, to quote Apple’s website; (and my iPhone)
    WEP Password
    WEP hex or ASCII
    WPA (personal)
    WPA2 (personal)
    Now, due to the obvious security problems in implementing WEP security, it’s likely that any network you run into is going to be WPA or WPA2. The iPhone ONLY supports the personal versions of these protocols, so be aware of this going into the situation. If you’re not connecting to your work or school wireless, and you’re entering the information correctly, then it’s probably because they have the Enterprise version of one of the protocols enabled. If that is the case, then you’re either hunting for unsecured hotspots, or else depending on EDGE.
    In my case, I did have access to a WPA2 (Personal) enabled wireless signal to connect to my internal network. I thought my problem was half solved! I defined the connection, the wireless capability of the phone worked perfectly, and I was connected. I was wrong. Apparently, and judging from the Mac forums I’m not alone in this, the iPhone does not do a very good job of RE-connecting to a secured wireless network. It does an even worse job, when this is coupled with the fact that it doesn’t do a very good job reconnecting to a wireless network with an unpublished SSID.
    After much fiddling and research into this, I determined that this simply was not the way to go, and I abandoned the idea. I wasn’t about to compromise my network security in order to get this silly phone working! So, that left me with either unsecured WiFi, or EDGE.
    Either one of these connects pretty seamlessly, and gives me a relatively decent Internet connection. There are some issues being reported of the iPhone swapping between EDGE and WiFi for not apparent reason, but that said, it can still be made to work.
    Now that I had this connection outside of my network, I obviously had to consider options for getting a secured connection into my network, which of course leads us to;
    VPN Access Into Your Network
    Being that this device was touted as the ‘real internet’ I was very excited to see if I could achieve this connection through my SSL VPN appliance. To make a long story short, I could not. Because Apple’s idea of the ‘Real Internet’ apparently does not include those wacky concepts like Java support, this proved to be impossible. My Apple cohorts will scream that it does support JavaScript, but we all know that that and 2 bucks will get you a small coffee at Starbucks… and not much more.
    (The iPhone also does not support Flash, but that’s a topic for another conversation. I know, how could they leave that out? I’m amazed too, but then Steve Jobs always has been a bit too arrogant for his own good… I mean what does he expect, we’re all going to rewrite everything into QuickTime??? Please.)
    Since that option didn’t work, I was left with the wide selection of two possibilities provided within the iPhone software. Either, a PPTP or L2TP VPN tunnel.
    We went ahead and configured a PPTP connection on one of our Cisco routers in order to test this. It didn’t work. I couldn’t connect to it. Tried and tried. Nada. SOOOO, we said OK, and configured a L2TP connection on one of our Cisco routers, with similar results.
    Figuring that this was something in the config, we called Cisco, and did the technical support dance with them for several days, trying one thing after another to get this connection to actually work. Nothing helped, and it never worked using either protocol. Then, I noticed an obscure article somewhere on some website that said something to the effect that getting one of these tunnels to work from the iPhone to Cisco was nigh on impossible.
    About the same time, my senior network guy said screw it, let’s put this on a Microsoft server. And so we did. Now, this is interesting in it’s own right, because configuring out of the box L2TP or PPTP on a Microsoft server results in a default authentication method of Windows Authentication. This does not work for the iPhone, because it has no idea what to do with the Windows security token it receives. So, you authenticate, and then are immediately dropped due to an inability to communicate with the PPP server.
    Fortunately, we (as do most organizations) have a Radius server. We selected Radius authentication, configured both sides of the Radius authentication setup properly, and launched the PPTP tunnel…. AND…. EUREKA!!! The iPhone’s VPN software connected, authenticated, got an IP, and I was on the network! Well, no.
    After about 2 seconds, I realized that while I did indeed have a connection, I couldn’t do anything with it. Couldn’t even browse to an internal site via IP address. The connection was up, the connection was working, the connection was useless.
    So, we decided to give L2TP a shot. Configured it pretty much identically to the PPTP setup, used Radius, launched the iPhone client, and finally, after many days of screwing around, it worked. Now all I needed was to get my email working, so I started working on;
    Connecting to Exchange
    In the Mail program on the iPhone, the first time you launch it, you’re presented with the ability to configure an email source. However on subsequent or additional accounts, you must go under Settings, Mail to get to this functionality.
    Going into the Mail configuration, I selected an additional account, the account type is, of course, Exchange. The configuration components are pretty obvious, however some things of note are;
    Do NOT include your domain information in the User Name field
    For all Host Names, use the fully qualified domain name of the server, or else IP
    You WILL need to have SMTP enabled somewhere in order to send email
    Anyway, I set all this up, and nothing happened. It said that my server was not responding. Did a little research, and it turns out that the only way to connect to Exchange is through an IMAP4 connection, and just in case you didn’t know, IMAP4 is disabled by default, so you have to enable and configure it.
    Went onto the Exchange server, set the service to Auto, Started the listener, and finally, at long last, EUREKA! I finally had Corporate email on my iPhone, connecting securely, and not sending anything plain text anywhere. Hooray!
    Now for the problems with this solution;
    First of all, it depends upon VPN access into your environment, something that you may or may not be comfortable with. One good thing is that the iPhone does prompt for password to reconnect, and will tie the continuity of the VPN connection into the general phone lock security, such that an inability to provide the appropriate access code to a locked phone results in the VPN not being accessible.
    The VPN of course is dependant upon a reliable network connection. I’ve noticed that it’s somewhat graceful in switching between WiFi and EDGE, however it’s not totally graceful, and you can experience some hinky things, like being able to send and not receive, or the mail client saying ‘Connecting’ for about 5 minutes before it figures things out.
    The best cure for this is to simply stop and restart the VPN connection. Note that when you reconnect, the first attempt will prompt you for a numeric password, this is meaningless unless you have the device lock turned on. Just enter anything. (I think this is another bug) THEN it will re-prompt you for your real VPN password.
    This solution for email delivery is obviously dependant upon the VPN connection being active. I’ve noticed that at times the iPhone will disconnect the VPN (probably when service switching) and not bother to mention it. When that happens, of course the VPN must be restarted.
    For the lazy, this is an inconvenient solution because while it would appear that the iPhone will cache the VPN password, in fact it will not. That means that each re-launch requires that you re-enter your password. Not terrible for me, but I could see it being very tedious for the average corporate user.
    The OSX Mail client has several little deficiencies, which may or may not impact your use of the device in this manner. For instance, if you have subfolders defined for your inbox, and server side rules to move mail into them, then you will not see any synchronization of that mail until you actually select the subfolder. Also, since there is such poor management of attachments and downloads, moving anything around via email on this device is nigh on impossible.
    EDGE access to your corporate email, via a VPN, is a bit sloooooow. It works, it’s certainly fast enough for my purposes, but it’s not the slick quick access that we’ve all become accustomed to with Blackberry and Good devices. The lack of 3G support becomes a very noticeable shortcoming here.
    (Why Apply didn’t simply partner with Good Technologies to crank out a client for this thing, I’ll never understand, but I guess you can refer to my comment above about certain people’s arrogance.)
    The biggest problem of all of course is that it’s simply klugey. I hate klugey. But, with the capabilities at this device’s disposal, and given Apple’s ambitious, if a bit idiotic, stance that no third party will develop software for the iPhone, then this is about as good as it’s going to get for now.
    It is my understanding that overseas there is some initiative underway to provide a more seamless Visto or Synchronica integration for enterprise email. However, given Apple’s unbelievably restrictive agreement with ATT regarding this device and the OTA necessity of delivering the client, I seriously doubt if we’ll see this in the near future in the US.
    But I digress, so…
    In Conclusion
    This solution is not for the faint of heart, it doesn’t work all that well, and it has way too many moving parts that are subject to failure. However, I would say that this solution is serviceable for the corporate technology professional who needs email, and really, REALLY wants the other features of the iPhone. (ie, phone whores such as me.) It requires patience, it requires an understanding that this is not a 100% thing, and there definitely needs to be a prebuilt expectation that this device will not serve your email in anything approaching the manner to which you’ve become accustomed.
    As long as all of that is okay though, then go right ahead, set it up, and enjoy!
    The Short Version;
    (I put this at the end because I want everyone to feel my pain!)
    Wireless:
    Use unsecured wireless or EDGE. Secured wireless may be serviceable as long as the SSID is broadcast, but there are known issues with this.
    VPN:
    L2TP, shared secret, running on Microsoft server, with Radius. (May work elsewhere, but doesn’t seem to run on Cisco at all) Accounts enabled for external access.
    Exchange:
    Configure IMAP4 Virtual Server on your Exchange environment, ensure that you have some SMTP resource for outbound email, use fully qualified domain names for all servers (or IP) in the mail config and do not include any domain prefix or suffix for user accounts.
    The BIG Disclaimer at the End
    Please note that all of this is provided ‘as is’. It worked for me, and I hope it works for you. To my knowledge, it’s not endorsed by Apple, and I’m not in the business of providing support for this thing. If it breaks something, if it doesn’t work, or if you simply don’t like it or me, I don’t care. However, if you have a question, and I’m not busy, and I feel like answering, I may lend a hand. You can email me at
    Matthew dot Yotko at mac dot com
    Don’t be surprised or offended if I don’t answer. Also, understand that I don’t check this address every day… Maybe a couple times a week.
    Macbook Pro   Mac OS X (10.4.10)   iphone

    Thanks, now I understand why the wifi keeps dropping. On my personal wireless network, it also seems the distance from the access point is not good compared to my laptop. At work our network & exchange teams don't seem to have the desire to struggle with this "toy" until customers start forcing its adoption. I am using OWA and it works fine over EDGE. I will share your posting with them.
    Thank you again.
    Dell   Windows XP Pro

  • TCP Syslog output for routers and switches

    I am installing a Log Correlation Server at a Customer site whom is very heavy Cisco.
    I have a 3825 at their Border, ASA boxes on both sides of the DMZ, and 40 + cisco Switches in the Infrastructure routing between Production VLAN's.
    One of the features fo the Logging Server is the ability to accept TCP connections for Syslog.
    Does this functionality also exist on the 3825 Router? How about a 3550 switch? Or a 4500 switch?
    Thanks

    It exist on all of those product.
    www.linuxhomenetworking.com/cisco-hn/syslog-cisco.htm
    This link give a quick overview but you will find how to configure syslog in the product documentation.
    Please rate all helpful post

Maybe you are looking for

  • How to increase the performance of Applet loading in IE ?

    Hi All, I have a Applet named "editlivejava.jar" which is around 2.17 mb in Size, when ever i opened the browser for render the applet it is taking time to load. Is there any way to increase the perfornamce. I heard that it should be some thing relat

  • Mac book runs slow, locks up?

    Does any one have suggestions of how I many speed up my computer?

  • Getting 404 errors

    Hello: I have EM up an running. It looks fine. I can login and manage my database. The only problem is that faily often when I click on a button or link, I get a 404 error. If I hit back and try again, the operation goes thru just fine. It does not h

  • XML Data Order

    I can load XML data fine using XML Connector, Dataset and Datagrid. But the data being displayed in the grid is in reverse order. The XML file: <record> <name></name> <phone></phone> </record> but the grid show phone first (left column) and name last

  • BBCode Is Not Enabling

    I have it turned on in my control panel, yet when I go to compose a thread it is not enabled. Neither are smiles. Can someone help with this please?