UCCX on VMWare needs ethernet promiscuous mode?

Hello all,
Just noticed something in the vmware host logs:
2013-06-08T16:29:52.001Z cpu20:14694)etherswitch: L2Sec_EnforcePortCompliance:153: client ccx.eth0 requested promiscuous mode on port 0x4000024, disallowed by vswitch policy                
And that's expected, because the default configuration of the vswitch denies ethernet promiscuous mode.
Now the question is - does the virtual UCCX need promiscuous mode at all? I would expect to see it as a specific note in the documentation if it would. The docwici for UC on UCS is quite detailed and it get's bigger and bigger every day.
I suppose the promiscuous mode is related somehow to call monitoring and recording, but is it really a requirement? I am using Desktop Based monitoring and recording. UCCX version 9.0.2.10000-71

Hi,
Please check your recording options.
If it set not to spanless recording,you'll have allow promiscuous mode and rspan vlans.

Similar Messages

  • Does the apple thunderbolt to ethernet dongle support promiscuous mode ?

    Does the apple thunderbolt to ethernet dongle support promiscuous mode ?
    I need to use the new Retina MBP as a professional laptop for work, and I need to use Etherreal. Etherreal needs the Ethernet card/dongle/chip to run in Promiscuous mode. I have heard that unblivably the thunderbolt Ethernet dongle does not support this, if so then the laptop will not pick all the packets on the wire... is this true ?
    Regs Mark.

    Hi Clinton,
    Thanks for your reply, However the promiscuous mode function that I am after is a function of the Ethernet NIC hardware and driver not just the OS.
    Wireshark allows the user to put network interface controllers that support promiscuous mode into that mode, in order to see all traffic visible on that interface, not just traffic addressed to one of the interface's configured addresses and broadcast/multicast traffic.
    Anyone out there actually used/tested the thunderbolt Ethernet adapter to sniff traffic with wireshark (Ethereal), can you please  if it can run in promiscuous mode ?
    Thanks.

  • Ethernet Card in promiscuous mode

    Hello,
    I have a Powerbook G4 15p (1.25GHz) and I want to capture network trafic on a cisco trunk port.
    It works fine but I have no informations concerning vlan tags : is it possible to configure the Ethernet driver in promiscuous mode ?
    Best Regards,
    Guillaume
    Edit : same problem as describe here : http://support.intel.com/support/network/sb/cs-005897.htm

    I was thinking of a network driver option : How can I know what sort of network chipset is on my powerbook ?
    If I look to /System/Library/Extensions/IONetworkingFamily.kext/Contents/PlugIns, I can see this :
    Apple3Com3C90x.kext AppleDP83816Ethernet.kext AppleRTL8139Ethernet.kext
    AppleBCM440XEthernet.kext AppleGMACEthernet.kext AppleRTL8169Ethernet.kext
    AppleBCM5701Ethernet.kext AppleIntel8254XEthernet.kext Apple_DEC21x4Ethernet.kext
    AppleBMacEthernet.kext AppleIntel8255x.kext
    and there is the possibility to update an xml config file on some driver modules
    Here is the result of my kextstat :
    34 3 0x2dd90000 0x1f000 0x1e000 com.apple.iokit.IONetworkingFamily (1.5.0) <6 5 4 3 2>
      Mac OS X (10.4.3)  

  • Does the Intel 82579LM NIC on the Portege R830 support Promiscuous mode?

    Hi,
    I've got a work laptop (Portege R830), which doesn't want to sniff packets. I've got it connected to a Netgear Hub (DS104), along with an older notebook, and then uplink to ADSL.
    Running a continuous ping to the default gateway and Wireshark on both devices and the other computer can see the pings from the Toshiba, but not vice-versa.
    The Toshiba is running as an Administrator account, has the Windows Firewall disabled, and my Symantec End Point Encryption disabled. I don't have any other AV to my knowledge.
    Does anyone have any ideas of services I should disable/enable, or knowledge of the features of this NIC?
    According to the Intel site "Yes, all currently marketed Intel PRO/100, Intel PRO/1000, Intel Gigabit, Intel PRO/10 Gigabit, and Intel 10 Gigabit adapters support Promiscuous mode. " But the Intel 82579 Gigabit Ethernet Controller is not in the list that follows on; http://www.intel.com/support/network/sb/CS-004185.htm?wapkw=%28promiscuous%29
    Thanks for your time.

    Usually the firewall or Internet Security software blocks pings so perhaps try uninstalling Symantec completely. Just disabling it may not disable everything.
    Another thing to try is use a Static IP Address instead of DHCP. Disabling IPv6 or installing a newer LAN driver from the Intel website may also help.

  • Configuring IDSM in promiscuous mode?

    Hello,
    I have two switch catalyst 6500 in VSS each with a IDSM module, I want monitor four VLANs three of them are vlans of users and one of servers, I am planning use VACLs to capture the traffic.
    My first quetion is how to configure the data ports of IDSM in promiscuous mode, if in the configuration guide say that by default the data ports are in promiscuous mode, so that means that I don't have to make any configuration in the data ports of IDSM?
    Second, if I have two switches 6500 in vss each with a IDSM module, I have to consider other configurations for this situation?
    The configuration of VACL that I will put is:
    ip access-list extended ACL_IPS
      permit ip any any
    vlan access-map VACL_IPS 10
      match ip address ACL_IPS
      action forward
    vlan filter VACL_IPS vlan-list 30 , 40 , 50 , 100
    intrusion-detection switch 1 module 4 data-port 1 capture allowed-vlan 30,40,50,100
    intrusion-detection switch 1 module 4 data-port 1 capture
    intrusion-detection switch 1 module 4 data-port 1 autostate include
    intrusion-detection switch 2 module 4 data-port 1 capture allowed-vlan 30,40,50,100
    intrusion-detection switch 2 module 4 data-port 1 capture
    intrusion-detection switch 2 module 4 data-port 1 autostate include
    Thanks for the help.

    The IDSM doesn;t need any special commands to inspect traffic in Promiscious mode.
    You'll want to put your IDSM management interfaces on a VLAN to talk with them:
    intrusion-detection module 4 management-port access-vlan 99
    Use the "forward capture" switch:
    vlan access-map VACL_IPS 10
      match ip address ACL_IPS
      action forward capture
    Get rid of the spaces between your VLAN numbers
    vlan filter VACL_IPS vlan-list 30,40,50,100
    If you put two IDSMs in teh same chassis you'll need to decide how to split traffic between them. You can assign different VLANs to each IDSM.
    - Bob

  • Using promiscuous mode to collect UDP data

    Is it possible to set a NIC in promiscuous mode and to pull all UDP data?
    I have created a VI to listen to data coming across a specific UDP port, this work perfect for one device when I specify the NIC IP address.
    My challenge is I have multiple devices with different IP addresses/networks, that I have to switch between. Every time I switch I need to reconfigure my NIC IP address to capture the data. I would like all data to pass through regardless of IP address. Does LabView support this?
    Thanks

    No, LabVIEW does not natively support a way to put a network interface into promiscuous mode and capture all traffic. You'll either need to use a packet sniffer like Wireshark to capture to a file, and then process it later, or use other libraries. A starting point might be http://zone.ni.com/devzone/cda/epd/p/id/2660

  • IDSM-2 - Promiscuous Mode

    I would like my IDSM-2 to run in a Promiscuous Mode ( and not INLINE mode)
    How can i configure it so that it works on the - " Block Nothing,Monitor Everything" principle.
    I need the blade to "Never" block the upstream devices like routers and Firewalls.
    By the way,how will the IDSM running in Promiscuous Mode even "know" of upstream routers and other network devices.
    Thanks !!!

    Hi,
    You can find how to configure IDSM-2 to run promiscuous mode here.
    http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df92.html#wp1030752
    From there, you can find IOS vs. CatOS configuration as well as SPAN vs. VACL.
    Once that is done, you can find configuration guide here regarding IPS software. I will list both CLI and IDM in case you prefer one over the other...
    CLI -
    http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df7d.html#wp1033699
    IDM -
    http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a00804cf4c2.html#wp1031960
    In promiscuous mode, unless you configure blocking with blocking device, it will never block anything by default. Even with blocking, you can configure never-block addresses.
    CLI -
    http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a008055df77.html#wp1031471
    IDM -
    http://www.cisco.com/en/US/products/hw/vpndevc/ps4077/products_configuration_guide_chapter09186a00804d1374.html#wp1037905
    IDSM will not know about which is what (upstream routers and other network devices) unless you specify them in 'never block' or 'blocking devices'
    Thank you.
    Edward

  • Macbook pro (june 2010) airport promiscuous mode

    Hi all,
    For my network security course, I have to sniff a wireless network.
    Is it possible to put the airport extreme in promiscuous mode? When I use wireshark and select the "capture packets in promiscuous mode" I can only see my own traffic...Although when I check my "en1" status in ifconfig, I see that the "promisc" flag is set..strange
    I've put the wpa/psk password in wireshark so that's not the problem.
    So my final question is, does the promiscuous mode on airport extreme work on a 2010 macbook pro?

    flawlessnyc wrote:
    Of course it's my network and devices. And I'm interested in email accounts. As a parent . . . . well ya gotta be diligent.
    Look at the devices - how are they accessing the email?
    If it is via webmail in the browser (or a 'browser based' app) look for account setting to only use https. Some providers will only allow login via https which is secure, http is not secure, these can usually be 'forced' with account settings.
    When logged in does the website remain on https, if it goes to http instead the email content could be visible on that network. Bookmark the https url for the child, and remove any http urls for the same site so they are less likely to use http by accident. Explain to the kids why the 'green lock' in the address bar (indicates https) is important for reading email or any other 'private' data.
    Do the same with search engines (so their searches may be 'invisible' to the local network).
    If they are using an email client like Apple Mail check the settings again for each mail server, there are options to only use the specific server, and only use secure protocols (SSL,TLS…). That should prevent the mail being sent in plain text across the network, however email is inherently insecure as a service (it bounces from mail server to mail server with to & from addresses visible) so the kids may be better off using iMessage or another chat service that has some level of encryption / privacy.
    You can try viewing the network traffic to find passwords for these services, but it is very involved…
    Monitor in promiscous mode on the same wifi channel as the network.
    Decrypt the wifi traffic (you need the network key for this since wifi itself is encrypted (WEP, WPA, WPA2 etc)
    Look for the email traffic & recombine the packets to follow the conversation, but you still cannot read https traffic.
    All you will be able to find is passwords or form values for websites that do not use https.
    There are other things they should be careful with - like avoiding unknown/ open/ free wifi networks. Even cellular towers can be malicious nowadays, so disabling cellular data could help them be a little more secure. They should also avoid accepting certificates or 'profiles' to connect to any network.
    I'm not sure that watching packets in the air will get you better results any quicker that learning how to secure the settings on each device, pass on the info to the kids & eventually they will start to get it
    P.S
    You may be able to lock settings via parental controls. iOS has 'restrictions' within the Settings app. Just use them carefully otherwise they will nag you about being unable to take a photo or use maps etc!

  • Enable monitor/promiscuous mode on Cisco Atheros AR5001X+

    I have a Cisco Aironet Atheros AR5001X+ wireless card installed on an HP laptop running Ubuntu 8.10. The card is working and I would like to know how to enable monitor/promiscuous mode on it so that I can use wireshark to capture network traffic at work. I would also like to know if I can enable the card in monitor/promiscuous mode in Windows XP and how? Any help would be appreciated, thanks.

    in a console window:
    sudo ifconfig ath0 PROMISC
    password:
    it should be ath0 for an atheros chip, but may be wlan0 or something else
    you will need to install Winpcap for windows
    http://www.winpcap.org/')">http://www.winpcap.org/

  • Manage USB drives / removal with VMWare Workstation in Unity mode

    We have a peice of legacy software that only runs on windows XP. Our deployment has it running on VMware Workstation in Unity mode. A constant issue is USB drives. The users need to connect USB drives to the legacy app. 
    The way i'ts currently managed: the drives are set to auto-mount into VMWare with the VID and PID of the drives. Then a DriveRemove.exe utility bat file is setup to eject the drives, and a shortcut is placed on the users desktop. Is there a better way to do this? 
    This topic first appeared in the Spiceworks Community

    Really disappointed in Apple after this!
    I've had my iPhone 4S still on iOS5, and wanted to update to iOS6 today. I tried over the air, but it kept failing and suggesting that I try it with iTunes. My iPhone hasn't been connected to iTunes for months, so I first had to update, which makes updating already quite annoying as it doesn't work as intended.
    After updating my iTunes, it found my iPhone and I hit Update. After some time it just stopped and failed on me, my iPhone went into recovery mode. After reconnecting to iTunes I get the message; "Your iPhone is in recovery mode, please recover" with a "OK" button. I hit that button and the Update/Restore screen disappears.
    Luckily I found the log files in my User data folder and were able to figure out the error number, but for a normal user this would be a point they would give up! My next smartphone might not be an iPhone, the hardware and the experience is great on an iPhone. But updating/settings/app-management and iTunes just suck!

  • In need of a MOD please

    Hi im in need of a Mod please,i need to know when my new monthy Download  cycle date starts please.
    I have Downloaded a fair bit this month and dont want to break 100GB and then be capped to 1Meg
    I will of course provide AN etc when a Mod replies to the thread hopefully.

    Sorry about the confusion, what Sean meant was that your usage level goes towards a monthly allowance, i.e. your usage is counted from the 1st of each month to the last day of the month.
    Now, the following is from the Fair Usage Policy page:
    Customers who are classified as very heavy users will experience significantly reduced speed at peak times (typically 5pm-midnight every day but these times may change depending on the demand on the network) for a period of 30 days, or for as long as very heavy use continues. This applies to customers on all Options.
    So, let's say for example you fall into the category of a heavy user and go over the usage on the “X” day of a given month, the line will experience reduced speeds for 30 days after the “X” day that the usage is exceeded.
    If anything above is unclear let me know.
    Stephanie
    Stephanie
    BTCare Community Manager
    If you like a post, or want to say thanks for a helpful answer, please click on the Ratings star on the left-hand side of the post. If someone answers your question correctly please let other members know by clicking on ’Mark as Accepted Solution’.

  • Firefox plug-in says it need 32 bit mode on a download

    a firefox plug-n says it needs 32 bit mode to do a download
    Asks for restart in 32 bit mode

    # Close Firefox
    # Start the Finder and open the Applications folder
    # Right click or control-click the Firefox.app icon
    # Select "Get Info"
    # Select or Deselect "Open in 32-bit mode"
    # Close the "Firefox Info" window
    # Restart Firefox

  • How to Set HyperV NIC in Promiscuous Mode

    Is there any way to set up a NIC on a virtual HyperV guest in promiscuous mode?
    I want to try and run a web filtering product on a VM. Wireshark does not indicate that it is capturing all traffic.
    I have my switch port mirrored already and it works with a regular box but not with the VM.
    Any help would be appreciated.
    Thanks,
    Andy

    I was able to make wireshark capture all the packets.
    I followed this post:
       http://fixmyitsystem.com/2013/08/Remote-Wireshark.html
    The only diference is that use and Internal Virtual Network  to connect from the
    guest to the host.
    My hyper-v host IP, for this network is 169.254.107.1 (check yours by doing ipconfig)
    and the Guest is 169.254.107.20
    Steps:
      - Just get rpcapd (http://nmap.org/dist/nmap-6.40-win32.zip).
      - Unzip it and install it on the hyper-v host
        Open PowerShell
        Enter-pssession Coremachine    
        Silently install: winpcap-nmap-4.02.exe /S
      - Next up you will have to create a firewall exception for
        this to be reachable from the management machine.
        netsh advfirewall firewall add rule name="Remote WinPcap" dir=in action=allow protocol=TCP localport=any remoteip=169.254.107.20
        (to turn on  the rule) netsh advfirewall firewall set rule name="Remote WinPcap" new enable=yes
        (to turn off the rule) netsh advfirewall firewall set rule name="Remote WinPcap" new enable=no
      - Navigate to C:\Program Files\WinPcap
        To start to packet capture service use
            .\rpcapd.exe -p 2002 -n
      - Get the GUID of the network card you want to use in WireShark  
          wmic nic where PhysicalAdapter="TRUE" get Description,GUID,MACAddress,Name,NetConnectionID
      - on wireshark
        Select Capture Options
        Click Manage Interfaces
        Select Local Interfaces tab and check the Hide box next to all of them
        Select remote Interfaces tab
        Click add button
        For the host specify the hostname or IP Address  
            (I use an internal network to conect to the host)
             My host IP is 169.254.107.1 and the Guest is 169.254.107.20
        The port default is 2002 (set with the -p switch earlier)
        Null authentication as set with the -n switch earlier
        OK
        You should now see a number of interfaces added
        Click Close
      - There will be a buffer size warning but it can be ignored, and hey presto,
        you are capturing packets from a remote  non GUI machine.  
        The process from here on in is the same as you would use WireShark with
        local traffic capture.

  • Trying to decide on ipad or macair, need ethernet

    I have a macbookpro, but want something lighter to travel - either ipad or macair. I need ethernet connection where I live, I like to use a keyboard instead of touchpad. thanks.

    You've already answered yourself, get the MacBook Air.

  • Tecra M2 PTM20A-002T2 - Need ethernet and display drivers

    Please help me with an answer!
    I have spent hours chasing files and installing different stuff.
    Got my sound working but still need ethernet and display drivers I think.
    I am online for about 15 minutes and back on tonight.
    Thanks, Nay,
    Melbourne, Australia

    Hi Nay,
    Alternative have a look on the Toshiba European page. There I founded a similar model, Tecra M2 PTM20E, and I think the downloads should also work for your model:
    http://eu.computers.toshiba-europe.com > Support & Downloads > Download Drivers
    Furthermore you can see an installation instructions document for Windows XP. Its a list for the recommend driver installation order, tested by Toshiba. :)
    Last but not least you can identify the hardware using hardware and vendor ID. Therefore check this article:
    [How to identify an unknown device (e.g. Wireless LAN module)?|http://aps2.toshiba-tro.de/kb0/HTD0302U00000R01.htm]

Maybe you are looking for

  • Large Aperture 2 Library Migration to Aperture 3, on a new Mac Pro

    Hello, I am upgrading from a PowerMac G5 to a Mac Pro and so I am going to also upgrade Aperture to version 3 at the same time. I am currently using a managed library on a 1.5TB RAID-1 array in my PowerMac. I am hoping to convert that to a referenced

  • Qosmio G30: Conflict between Sigmatel audio driver and Vista SP1

    Hello, I have a Qosmio G30 PQG32E notebook and can't upgrade to Vista SP1 because the Sigmatel driver (6.10.5462.0) is conflicting with the service pack. As some of you might know, Sigmatel no longer exists and IDT who bought them is as good as non-e

  • Edit Version History

    I have a Multiple lines of text field with Append Changes to Existing Text checked and I need to edit the history.  There has to be a way!! Thanks! David L. Crooks

  • Please answer the simple question about publishing Web Services!

    I have implemented my first web service GetDate, using JDeveloper. Could anybody tell me please how can I place now this web service on the web, on my web page?

  • How to get field name dynamically of a table

    Hi, I have a table which has 5 fields, now i want to know the name of the fields dynamically at run time not the values each fields hold. I have tried field symbols, get reference but all i got the value of the field not the field name. is there any