<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-36193988</atom:id><lastBuildDate>Fri, 15 Aug 2025 22:14:13 +0000</lastBuildDate><category>delete</category><category>mail profiles</category><category>registry</category><title>Cool stuff to know</title><description>Just a collection of interesting stuff I encountered during my job.</description><link>http://krva.blogspot.com/</link><managingEditor>noreply@blogger.com (My precious)</managingEditor><generator>Blogger</generator><openSearch:totalResults>85</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-7952857821827386793</guid><pubDate>Fri, 23 Apr 2010 09:23:00 +0000</pubDate><atom:updated>2010-04-23T11:26:21.332+02:00</atom:updated><title>vBlock: a VMware, EMC &amp; Cisco allience</title><description>The 3 IT giants are forming a shared-equity company named Acadia which will handle the new vBlock concept.&lt;br /&gt;&lt;br /&gt;What is vBlock?&lt;br /&gt;vBlock is the name they gave to a cloud producing computing system which integrates their respective hardware and software.&lt;br /&gt;so the &quot;vBlocks&quot; are preintegrated, preconfigured computing systems consisting of networkware from Cisco, storage/security/system management from EMC, and virtualization software from VMware.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfXDVQ55Iz9iUvG7W1L9hJHZKzqOn-GENRCricEOLiB4bfR8HE772ZnPIrb_HC-PrbtgoIi8kskNLtqxqECEaj8kDMgnVso99Qe-iqGaclMeBki9a_qR_rv-MW-TsB_gmmEYlW/s1600/1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 351px; height: 385px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfXDVQ55Iz9iUvG7W1L9hJHZKzqOn-GENRCricEOLiB4bfR8HE772ZnPIrb_HC-PrbtgoIi8kskNLtqxqECEaj8kDMgnVso99Qe-iqGaclMeBki9a_qR_rv-MW-TsB_gmmEYlW/s400/1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5463261410210213538&quot; /&gt;&lt;/a&gt;&lt;br /&gt;These cloud computing systems will produce environments ranging from hundreds of VM&#39;s to more than 6000 VM&#39;s.&lt;br /&gt;Of course, as always, it&#39;s the budget you are willing to spend that will size up your new vBlock environment, but you can imaging prices for the &#39;cheapest&#39; vBlocks will start at 100k.&lt;br /&gt;&lt;br /&gt;Call me crazy, but I think things could be very big.  Especially since they bring (in my opinion) the best of their respective fields together: virtualisation, storage and network.  This in combination with a seperate management structure but with combined resources such as technical pre-sales, consultancy, ...&lt;br /&gt;&lt;br /&gt;So thinking of staring a cloud computing system?  And not affraid of buying into &quot;1&quot; supplier?  It&#39;s worth a look.</description><link>http://krva.blogspot.com/2010/04/vblock-vmware-emc-cisco-allience.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfXDVQ55Iz9iUvG7W1L9hJHZKzqOn-GENRCricEOLiB4bfR8HE772ZnPIrb_HC-PrbtgoIi8kskNLtqxqECEaj8kDMgnVso99Qe-iqGaclMeBki9a_qR_rv-MW-TsB_gmmEYlW/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-6785586671124351269</guid><pubDate>Thu, 22 Apr 2010 09:32:00 +0000</pubDate><atom:updated>2010-04-22T11:36:03.101+02:00</atom:updated><title>FCoE vs FC (vs iSCSI)</title><description>A client from the company I work for is starting with a FCoE (Fibre Channel over Ethernet) project for their entire datacenter.  As part of this project, the seperate fibre channel and ethernet switches will be replaced by Cisco Nexus 5000 series and the servers will be equiped with network adapter that simulate Eth and FC in one.&lt;br /&gt;&lt;br /&gt;A quick high-level overview:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpqf2jxJ6uPk1ZrF3ETo-JU8w96-iwrsi3-Gqbg53GucjRgi3EPVWNnfeBbIAKSlhmTM6gpcvYUXr-kHnPkJtIaAVdSB7yvwoxZKA9IZ4mrhy0td7M4t53WAYRs79X7G1MTXdf/s1600/FCoE1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 229px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpqf2jxJ6uPk1ZrF3ETo-JU8w96-iwrsi3-Gqbg53GucjRgi3EPVWNnfeBbIAKSlhmTM6gpcvYUXr-kHnPkJtIaAVdSB7yvwoxZKA9IZ4mrhy0td7M4t53WAYRs79X7G1MTXdf/s400/FCoE1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5462892867417678626&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-k4y47-G125zFgaTUh3f-j0Hi475vRjxuTtXLtGEMNRYiOP99D1YKfF-33BR_XIfxo7edDraXm8wRmvBEXzzq27HvDyOUUi_QUDrl7iJtLaphO5y69i93RAnbkTnT5z4jBJXC/s1600/FCoE2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 288px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-k4y47-G125zFgaTUh3f-j0Hi475vRjxuTtXLtGEMNRYiOP99D1YKfF-33BR_XIfxo7edDraXm8wRmvBEXzzq27HvDyOUUi_QUDrl7iJtLaphO5y69i93RAnbkTnT5z4jBJXC/s400/FCoE2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5462892943224505986&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;What is FCoE exactly?&lt;/strong&gt;&lt;br /&gt;FCoE transports Fibre Channel over Ethernet.  It does this by replacing the FC0 and FC1 layers of the Fibre Channel stack with Ethernet headers.  And since FCoE doesn&#39;t change anything to the FC transmissions, it can integration perfectly into the existing Fibre Channel networks.&lt;br /&gt;So basically, SAN&#39;s can be cabled with ethernet instead of Fibre Channel, reducing complexity.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;FCoE ≈ iCSCI?&lt;/strong&gt;&lt;br /&gt;NO!  iSCSI runs on TCP and IP.  FCoE runs directly above Ehternet in the Network layer of OSI.  What does this mean?  Basically it means that &lt;em&gt;FCoE is not routable&lt;/em&gt; and therefore will not work across router IP networks.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Why FCoE?&lt;/strong&gt;&lt;br /&gt;FCoE will only be used in data centers (I guess) as an alternative cabling for the SAN environment.  And it has some very clear benefits over FC:&lt;br /&gt;  1. reduces cabling significantly&lt;br /&gt;  2. it can handle very high physical I/O connections&lt;br /&gt;  3. a single network switch suffices&lt;br /&gt;  4. fewer NIC&#39;s in the servers&lt;br /&gt;  5. fewer hardware means power and cooling costs are reduced&lt;br /&gt;&lt;br /&gt;Here, a big TCO calculation has preceded the project that is starting now, in which it was clear that since hardware was needing to get replaced, FCoE was the way to go.&lt;br /&gt;&lt;br /&gt;Perhaps something to look into yourself when you are thinking of replacing old hardware?</description><link>http://krva.blogspot.com/2010/04/fcoe-vs-fc-vs-iscsi.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpqf2jxJ6uPk1ZrF3ETo-JU8w96-iwrsi3-Gqbg53GucjRgi3EPVWNnfeBbIAKSlhmTM6gpcvYUXr-kHnPkJtIaAVdSB7yvwoxZKA9IZ4mrhy0td7M4t53WAYRs79X7G1MTXdf/s72-c/FCoE1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-6017589439503416285</guid><pubDate>Thu, 22 Apr 2010 07:34:00 +0000</pubDate><atom:updated>2010-04-22T11:11:18.768+02:00</atom:updated><title>Let&#39;s PingPing!</title><description>Ever heard of PingPing yet?&lt;br /&gt;&lt;br /&gt;Here in Belgium the mobile service providers are developing a framework for paying small amounts with your cell phone.  Unfortunately, the major cell phone manufacturers (BlackBerry, HTC, Apple, Nokia, ...) aren&#39;t agreeing on a standard yet, so for now things will have to be done via a NFS tag (stricker) than you can paste on the back of your cell.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;How does it work?&lt;/strong&gt;&lt;br /&gt;The NFS tag has a chip in it with your information: name, address, bank account, mobile service contract, ...&lt;br /&gt;When you want to pay for something, you can have the NFS tag scanned and that&#39;s it.  Nothing more.  While you use what you just bought, the amount will disappear from your bank account or amount that you put on your NFS tag for this purpose.  Soon, the amount can also be added to your phone bill so you pay the mobile service provider.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;So what all can you?&lt;/strong&gt;&lt;br /&gt;Walk up to a vending machine and just push the button for a cola, drive in and out of a parking lot without hassling with tickets, pay for the movie theatre, pay for you lunch, ...&lt;br /&gt;Leant a few bucks from a colleague yesterday?  No problem, you can even transfer the amount from your PingPing account to his/hers, directly from your cell phone.  Pretty cool no?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Problems?&lt;/strong&gt;&lt;br /&gt;Of course you don&#39;t see any information about problems posted somewhere, but my first thought was security.  You steal/find someones phone, can&#39;t just call on their expense, you can actually start paying for stuff, since the process never requires you to enter the pin code or anything like that.&lt;br /&gt;But perhaps even a bigger problem, personal control?  Because let&#39;s face it, we keep our cell phones on us like our wallets nowadays.&lt;br /&gt;We&#39;ll be paying for pretty much everything by just waving our cell phone, without &quot;noticing&quot; the rest.  You can already imagine the stories you&#39;ll be reading pretty soon: &quot;PingPing bill of +5000$, John Doe didn&#39;t realise his spendings, ...&quot;&lt;br /&gt;&lt;br /&gt;Still I believe people should be responsible for their own actions.&lt;br /&gt;I think this is great technology and can&#39;t wait to REALLY start using it.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;External link:&lt;/strong&gt; &lt;br /&gt;&lt;a href=&quot;http://www.pingping.be/wp/&quot;&gt;PingPing&lt;/a&gt;</description><link>http://krva.blogspot.com/2010/04/lets-pingping.html</link><author>noreply@blogger.com (My precious)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-1771264586274508511</guid><pubDate>Tue, 02 Mar 2010 07:37:00 +0000</pubDate><atom:updated>2010-03-02T11:38:23.353+01:00</atom:updated><title>Non-functional requirements checklist</title><description>I have recently started as an architect at a large international company with as clear objective to improve quality of the current designs being made.&lt;br /&gt;&lt;br /&gt;As a first, simple but important, step I have composed a non-functional requirements checklist.  Many of us architects many a very good grasp of the technical side and therefore can create very good designs from a technical point of view.  But business requirements are often forgotten.&lt;br /&gt;&lt;br /&gt;With the checklist I have attached in this post, I&#39;ve wanted to create a personal checklist for the architect to verify he has covered all aspects of the project he is working on and make sure his design fits in the companies strategy and long-term vision.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.adrive.com/public/a1ba3047e4af5fe72b24ddc7811cb2cef25cb939ab546d49d6af3557b0822c30.html&quot;&gt;Non-functional requirements checklist&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;As a next step, this checklist can be converted to a business analist&#39;s question list.  More on that in my next post.&lt;br /&gt;&lt;br /&gt;Enjoy!</description><link>http://krva.blogspot.com/2010/03/non-functional-requirements-checklist.html</link><author>noreply@blogger.com (My precious)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-4307428238661973767</guid><pubDate>Wed, 06 Jan 2010 10:52:00 +0000</pubDate><atom:updated>2010-01-06T13:08:47.669+01:00</atom:updated><title>Windows 7: God Mode</title><description>Ever get frustrated with the control panel of Windows 7?  I always stuck with the &quot;classic view&quot; since it was a whole lot easier to find stuff.  Now with Windows 7 you are not with that possibility anymore.&lt;br /&gt;&lt;br /&gt;However, there is another hidden feature called the &quot;God Mode&quot; which gives you basically a classic control panel, but with even more possibilities.  And all of that combined in a single list!&lt;br /&gt;&lt;br /&gt;How to enable this God Mode?&lt;br /&gt;Easy, create a new folder anywhere you want to be able to access this feature, for example the desktop:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWAaLu7vuS-cS38MUdpqfW7sqddrVGa1QvxKP6VXZi_AX1uJGeJ80Mv77NEROIQ2PVt0HhP6KY0eWEyZZ7n1DlAgbvX0lkBgXYJqYNQcOkCHUv6tNtosCdodWO8cLhG9yDbVku/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWAaLu7vuS-cS38MUdpqfW7sqddrVGa1QvxKP6VXZi_AX1uJGeJ80Mv77NEROIQ2PVt0HhP6KY0eWEyZZ7n1DlAgbvX0lkBgXYJqYNQcOkCHUv6tNtosCdodWO8cLhG9yDbVku/s400/1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5423596200480329298&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Rename the folder to &lt;strong&gt;GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}&lt;/strong&gt;:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-yl_x-2ZtVumLbQ3R9cSU0Q6Pn8vss9Gtkn_CaMmWi92VB27ofQe9Eu1Zejn4Ml4Asb5qLZfi95R5Bpt9gyGMe2ZcMFKMrwXfYrLi2rGGIIYBlWFedtgwEuVIJlZRFZ211cp1/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 107px; height: 233px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-yl_x-2ZtVumLbQ3R9cSU0Q6Pn8vss9Gtkn_CaMmWi92VB27ofQe9Eu1Zejn4Ml4Asb5qLZfi95R5Bpt9gyGMe2ZcMFKMrwXfYrLi2rGGIIYBlWFedtgwEuVIJlZRFZ211cp1/s400/2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5423596797283844610&quot; /&gt;&lt;/a&gt;&lt;br /&gt;You will notice that the icon has changed to the &quot;Control Panel&quot; icon:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYZUBQxwlUIaGwx6gM0NsYn6BQel_kUJkoa9CtuaCPSs00381tqhXUhoCk9iipQdG1bbVdzKxiEvZr5HtamR1W2rt_l0FdeCkub3DjIBf4wMCCaxYyym7ZsLQXrk3-hq-NoacE/s1600-h/3.jpeg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 78px; height: 162px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYZUBQxwlUIaGwx6gM0NsYn6BQel_kUJkoa9CtuaCPSs00381tqhXUhoCk9iipQdG1bbVdzKxiEvZr5HtamR1W2rt_l0FdeCkub3DjIBf4wMCCaxYyym7ZsLQXrk3-hq-NoacE/s400/3.jpeg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5423597144110823874&quot; /&gt;&lt;/a&gt;&lt;br /&gt;From here, you will get the whole list of the things you can change to change the appearence of your Windows 7 machine.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZa_awKESCTIb3cmSco9eN_AOcJUY9aHcVtxH5GKCrnx5jC3tWuIO1yJlqJ4YBT9O7_IESq_iCilG55DwBbQs1Z0lc1lH9GmBKJlMGutZnQ1_RSLhSx2WQF-e_JSlB7qemu6WP/s1600-h/4.jpeg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 338px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZa_awKESCTIb3cmSco9eN_AOcJUY9aHcVtxH5GKCrnx5jC3tWuIO1yJlqJ4YBT9O7_IESq_iCilG55DwBbQs1Z0lc1lH9GmBKJlMGutZnQ1_RSLhSx2WQF-e_JSlB7qemu6WP/s400/4.jpeg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5423597585885351474&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Enjoy!</description><link>http://krva.blogspot.com/2010/01/windows-7-god-mode.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWAaLu7vuS-cS38MUdpqfW7sqddrVGa1QvxKP6VXZi_AX1uJGeJ80Mv77NEROIQ2PVt0HhP6KY0eWEyZZ7n1DlAgbvX0lkBgXYJqYNQcOkCHUv6tNtosCdodWO8cLhG9yDbVku/s72-c/1.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-5857376312106229005</guid><pubDate>Thu, 10 Dec 2009 10:36:00 +0000</pubDate><atom:updated>2009-12-10T11:59:55.156+01:00</atom:updated><title>Certificate procedure – Step 5: Export the private key and store in a safe location</title><description>This post is a continuation of my previous post in which I have assigned a certificate to the website.&lt;br /&gt;&lt;br /&gt;In this last post, we&#39;ll be exporting the private key to a secure location for legal requirements:&lt;br /&gt;1. Open the IIS manager and browse to the website that has the certificate assigned&lt;br /&gt;2. Right click the website and choose &lt;strong&gt;Properties&lt;/strong&gt;, then go to the tab &lt;strong&gt;Directory Security&lt;/strong&gt;.  Here choose &lt;strong&gt;View Certificate&lt;/strong&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuLbSjrBNjOv3T78Mbdsd3eqUZNUwYl4yhojeFf8PWiQkVEWadNZYNMqvrJIRNYHEKsG2AlwH1dJSCirHo1SxIeBfO3j1qbTaXmeXjstpbOUocwCRv8fIEeqstlm-TjQAdii3Y/s1600-h/1.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 397px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuLbSjrBNjOv3T78Mbdsd3eqUZNUwYl4yhojeFf8PWiQkVEWadNZYNMqvrJIRNYHEKsG2AlwH1dJSCirHo1SxIeBfO3j1qbTaXmeXjstpbOUocwCRv8fIEeqstlm-TjQAdii3Y/s400/1.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5413555396608586354&quot; /&gt;&lt;/a&gt;&lt;br /&gt;3. Go to the tab &lt;strong&gt;Details&lt;/strong&gt; and click &lt;strong&gt;Copy to File&lt;/strong&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSikgpToUvTF_O-AusXTG6KiJKbVRYGLCA158rRcffRZC2qSp-ayK4QWSGk_KEqkoyxd5taWtZJhvf1c6QeNIA8ko6HSc99GSYYnuF4_BovcWjdjzynb1pAmD3WsRlNRsn0aCJ/s1600-h/2.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 344px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSikgpToUvTF_O-AusXTG6KiJKbVRYGLCA158rRcffRZC2qSp-ayK4QWSGk_KEqkoyxd5taWtZJhvf1c6QeNIA8ko6HSc99GSYYnuF4_BovcWjdjzynb1pAmD3WsRlNRsn0aCJ/s400/2.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5413555906399140402&quot; /&gt;&lt;/a&gt;&lt;br /&gt;4.  After the Welcome Screen, you will see that now we have the option to &lt;strong&gt;Yes, Export the Private Key&lt;/strong&gt; and click &lt;strong&gt;Next&lt;/strong&gt;.&lt;br /&gt;5.  Choose the options you desire, I always use these:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzHPReNWeGmDcpW5KvHxlB_HQzX46WBcRVhui761NZOZnZcRzyxS1SAhqBbilLzh-c4CLeRIUyRgrOWsLFymXZ_V68QB67yDSpGd0GQFBt2an_YRGNTiBrZ0x4wh6gWI3xbn_P/s1600-h/4.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 307px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzHPReNWeGmDcpW5KvHxlB_HQzX46WBcRVhui761NZOZnZcRzyxS1SAhqBbilLzh-c4CLeRIUyRgrOWsLFymXZ_V68QB67yDSpGd0GQFBt2an_YRGNTiBrZ0x4wh6gWI3xbn_P/s400/4.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5413556860986883346&quot; /&gt;&lt;/a&gt;&lt;br /&gt;6.  Next you will be required to supply a &lt;em&gt;password&lt;/em&gt; and a &lt;em&gt;location&lt;/em&gt;. When you click &lt;strong&gt;Finish&lt;/strong&gt;, you should receive a &lt;strong&gt;Success&lt;/strong&gt; message.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_S2dKuB5b7pArYrXrB9Zs0QAzsaaUBUTka1Jm32sFb1HCtBpnKLZCNeFfVnPZ_bMuuCwdLAmpOvlF1a7yjp6zss5cXwei1FS-BzTbaffJ6MSRMpa2KGuNpkTrclyZHRsyObDW/s1600-h/5.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 187px; height: 104px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_S2dKuB5b7pArYrXrB9Zs0QAzsaaUBUTka1Jm32sFb1HCtBpnKLZCNeFfVnPZ_bMuuCwdLAmpOvlF1a7yjp6zss5cXwei1FS-BzTbaffJ6MSRMpa2KGuNpkTrclyZHRsyObDW/s400/5.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5413557445779621042&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;OK, you are done: a certificate created which is used to secure a website and the private key is exported to a secure location for recovery purposes.&lt;br /&gt;&lt;br /&gt;I hope the series can help you.&lt;br /&gt;&lt;br /&gt;Have fun!&lt;br /&gt;&lt;br /&gt;Post series:&lt;br /&gt;1. &lt;a href=&quot;http://krva.blogspot.com/2009/11/exchange-2003-sp2-and-isa-2006.html&quot;&gt;Certificate procedure for Push Mail with Exchange 2003 SP2 and ISA 2006&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step1-creating.html&quot;&gt;Certificate procedure - Step 1: Creating a certificate request&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step-2-creating.html&quot;&gt;Certificate procedure – Step 2: Request a certificate&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-3-issuing.html&quot;&gt;Certificate procedure – Step 3: Issuing the certificate&lt;/a&gt;&lt;br /&gt;5. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-4-assign.html&quot;&gt;Certificate procedure – Step 4: Assign the certificate to your website in IIS&lt;/a&gt;&lt;br /&gt;6. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-5-export.html&quot;&gt;Certificate procedure – Step 5: Export the private key and store in a safe location&lt;/a&gt;</description><link>http://krva.blogspot.com/2009/12/certificate-procedure-step-5-export.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuLbSjrBNjOv3T78Mbdsd3eqUZNUwYl4yhojeFf8PWiQkVEWadNZYNMqvrJIRNYHEKsG2AlwH1dJSCirHo1SxIeBfO3j1qbTaXmeXjstpbOUocwCRv8fIEeqstlm-TjQAdii3Y/s72-c/1.JPG" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-1601908612309173410</guid><pubDate>Thu, 10 Dec 2009 10:16:00 +0000</pubDate><atom:updated>2009-12-10T11:59:42.734+01:00</atom:updated><title>Certificate procedure – Step 4: Assign the certificate to your website in IIS</title><description>OK, following my previous posts, the certificate can now be used to assign it to a website (or whatever you want to use it for).&lt;br /&gt;&lt;br /&gt;The assignment of the certificate is also pretty straightforward:&lt;br /&gt;1. Open the IIS manager and browse to your website.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZI-21o-cfhIgj2LD0JDnupM97EZqHFYYpxMjT0YqCldE3N_NoFc2p3TMvUtQClFhIJXpQHCeV6I2cmqslH2UpfmBdKSEfwEQs3td1eMBh1frVP1Law3jsKQXShByHGcpg0GZ-/s1600-h/1.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 283px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZI-21o-cfhIgj2LD0JDnupM97EZqHFYYpxMjT0YqCldE3N_NoFc2p3TMvUtQClFhIJXpQHCeV6I2cmqslH2UpfmBdKSEfwEQs3td1eMBh1frVP1Law3jsKQXShByHGcpg0GZ-/s400/1.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5413551418513153090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;2. Go the &lt;em&gt;Directory Security&lt;/em&gt; tab and click on &lt;strong&gt;Server Certificate&lt;/strong&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqrSlILZasn7WoaxokyaGrmlvKzigRU6o5lOPQvwp3O1HPIYrP07z76G3Wxf8X-A0RlDE5k2d2jmKFyn5IiPMW9-h7rJIIp4gYSrL97kuGNr9-AcabrbNtG2LJbTm71xzgI4bZ/s1600-h/2.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 397px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqrSlILZasn7WoaxokyaGrmlvKzigRU6o5lOPQvwp3O1HPIYrP07z76G3Wxf8X-A0RlDE5k2d2jmKFyn5IiPMW9-h7rJIIp4gYSrL97kuGNr9-AcabrbNtG2LJbTm71xzgI4bZ/s400/2.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5413552056337689986&quot; /&gt;&lt;/a&gt;&lt;br /&gt;3. A wizard will open, click &lt;strong&gt;Next&lt;/strong&gt; on the &lt;em&gt;Welcome Screen&lt;/em&gt; and choose &lt;strong&gt;Process the pending request and install the certificate&lt;/strong&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUj-JDrvfP-5r8b2C3PDMkCWMiFAv6_lpXE6GW2NgwdTkpiZGo-tUp0iHLrvldDBFO15AuUl9oKuLWVfMFu5L0uvT_99Jv81aYjxOBPeF8i0ld9ir7tP3eL7tvZS69uMQkThsw/s1600-h/3.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 302px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUj-JDrvfP-5r8b2C3PDMkCWMiFAv6_lpXE6GW2NgwdTkpiZGo-tUp0iHLrvldDBFO15AuUl9oKuLWVfMFu5L0uvT_99Jv81aYjxOBPeF8i0ld9ir7tP3eL7tvZS69uMQkThsw/s400/3.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5413552796525354370&quot; /&gt;&lt;/a&gt;&lt;br /&gt;4. Browse to your newly created certificate and click &lt;strong&gt;Next&lt;/strong&gt;.  Then choose the default SSL port &lt;strong&gt;443&lt;/strong&gt; and click &lt;strong&gt;Next&lt;/strong&gt;.&lt;br /&gt;5. You can overview the summary and click &lt;strong&gt;Next &lt;/strong&gt;if the displayed information is correct.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDGIqUELTh_gniA4r50JfBQ24bJV6pBl2UgMsV9mY4ZZ_0vGbnWLEpnt8khZmexrDWqDncRGrgPI9fwTu7TDFFe8KwuyHQt8U2nOratxpKi4dz9mgbEbmXa4-V3OMhox2Bmy28/s1600-h/4.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 302px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDGIqUELTh_gniA4r50JfBQ24bJV6pBl2UgMsV9mY4ZZ_0vGbnWLEpnt8khZmexrDWqDncRGrgPI9fwTu7TDFFe8KwuyHQt8U2nOratxpKi4dz9mgbEbmXa4-V3OMhox2Bmy28/s400/4.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5413553639066582562&quot; /&gt;&lt;/a&gt;&lt;br /&gt;6. As a last step, &lt;strong&gt;Finish&lt;/strong&gt; the wizard to assign your certificate.&lt;br /&gt;&lt;br /&gt;That&#39;s it.  Your website is now secured.  As a last step I&#39;ll be exporting the private key to a safe location for recovery purposes.&lt;br /&gt;&lt;br /&gt;Post series:&lt;br /&gt;1. &lt;a href=&quot;http://krva.blogspot.com/2009/11/exchange-2003-sp2-and-isa-2006.html&quot;&gt;Certificate procedure for Push Mail with Exchange 2003 SP2 and ISA 2006&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step1-creating.html&quot;&gt;Certificate procedure - Step 1: Creating a certificate request&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step-2-creating.html&quot;&gt;Certificate procedure – Step 2: Request a certificate&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-3-issuing.html&quot;&gt;Certificate procedure – Step 3: Issuing the certificate&lt;/a&gt;&lt;br /&gt;5. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-4-assign.html&quot;&gt;Certificate procedure – Step 4: Assign the certificate to your website in IIS&lt;/a&gt;&lt;br /&gt;6. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-5-export.html&quot;&gt;Certificate procedure – Step 5: Export the private key and store in a safe location&lt;/a&gt;</description><link>http://krva.blogspot.com/2009/12/certificate-procedure-step-4-assign.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZI-21o-cfhIgj2LD0JDnupM97EZqHFYYpxMjT0YqCldE3N_NoFc2p3TMvUtQClFhIJXpQHCeV6I2cmqslH2UpfmBdKSEfwEQs3td1eMBh1frVP1Law3jsKQXShByHGcpg0GZ-/s72-c/1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-2936302778007824010</guid><pubDate>Thu, 10 Dec 2009 10:09:00 +0000</pubDate><atom:updated>2009-12-10T11:58:45.201+01:00</atom:updated><title>Certificate procedure – Step 3: Issuing the certificate</title><description>Now that we have created our certificate request, we’ll be issuing it ourselves with our Certification Authority (CA) for testing purposes.&lt;br /&gt;&lt;br /&gt;A very quick and simple process:&lt;br /&gt;1. Open the Certification Authority console and browse to &lt;strong&gt;Pending Certificates&lt;/strong&gt;.  Once there, right click on the certificate and under “all tasks” choose &lt;strong&gt;Issue&lt;/strong&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiU9n62GygYMtI1deATcsDcyr5_xojfs1SQn70m1-UmfgbzuHnU32M_sU0G2RpAsUBA1tOOACXsFqJJU3BdBwZiMxCXrhsWLNktffHDLh2VeC24lBeLs1fjkSxUDdFQMVi8cdC/s1600-h/1.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 135px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiU9n62GygYMtI1deATcsDcyr5_xojfs1SQn70m1-UmfgbzuHnU32M_sU0G2RpAsUBA1tOOACXsFqJJU3BdBwZiMxCXrhsWLNktffHDLh2VeC24lBeLs1fjkSxUDdFQMVi8cdC/s400/1.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5413547880853331634&quot; /&gt;&lt;/a&gt;&lt;br /&gt;2. Then, go to &lt;strong&gt;Issued Certificates&lt;/strong&gt;, right click on the issued certificate and click on “&lt;strong&gt;Copy to file&lt;/strong&gt;” to save the certificate to a safe location.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyGsAABMbqtluxgox3dRd-Hbq7hgD1ZES1xz_vnFyMTkg11AYsHxr5YQCQhXoVpnHarY00s3dqM1dcSDhWrIq8ToXytKMRXrvC9Uh3NGzyrySQXa8jfeuCqh_01MpQ6qaJSmvf/s1600-h/2.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 317px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyGsAABMbqtluxgox3dRd-Hbq7hgD1ZES1xz_vnFyMTkg11AYsHxr5YQCQhXoVpnHarY00s3dqM1dcSDhWrIq8ToXytKMRXrvC9Uh3NGzyrySQXa8jfeuCqh_01MpQ6qaJSmvf/s400/2.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5413547954898105186&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Post series:&lt;br /&gt;1. &lt;a href=&quot;http://krva.blogspot.com/2009/11/exchange-2003-sp2-and-isa-2006.html&quot;&gt;Certificate procedure for Push Mail with Exchange 2003 SP2 and ISA 2006&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step1-creating.html&quot;&gt;Certificate procedure - Step 1: Creating a certificate request&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step-2-creating.html&quot;&gt;Certificate procedure – Step 2: Request a certificate&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-3-issuing.html&quot;&gt;Certificate procedure – Step 3: Issuing the certificate&lt;/a&gt;&lt;br /&gt;5. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-4-assign.html&quot;&gt;Certificate procedure – Step 4: Assign the certificate to your website in IIS&lt;/a&gt;&lt;br /&gt;6. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-5-export.html&quot;&gt;Certificate procedure – Step 5: Export the private key and store in a safe location&lt;/a&gt;</description><link>http://krva.blogspot.com/2009/12/certificate-procedure-step-3-issuing.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiU9n62GygYMtI1deATcsDcyr5_xojfs1SQn70m1-UmfgbzuHnU32M_sU0G2RpAsUBA1tOOACXsFqJJU3BdBwZiMxCXrhsWLNktffHDLh2VeC24lBeLs1fjkSxUDdFQMVi8cdC/s72-c/1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-802067012700626981</guid><pubDate>Fri, 20 Nov 2009 15:02:00 +0000</pubDate><atom:updated>2009-12-10T11:59:08.744+01:00</atom:updated><title>Certificate procedure – Step 2: Creating a certificate</title><description>Now that our request is created and since we’ll be creating the certificate ourselves, let’s just get it over with … :)&lt;br /&gt;&lt;br /&gt;1. Copy the text file to your CA, go to the CA website: http://localhost/certsrv and select Request a Certificate&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipuMXCbfwckzb8_v7odDrJPQosdLlXKzPoleUVn3RGyG-oQrpxfYEFt_3og6RzBdihZIzdkaoNHV1BAAJKQPWx87nNas0kYRHOW7SUppXOr_2ooD5maeDwjbXdYuJPlcYS3eIS/s1600/1.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 251px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipuMXCbfwckzb8_v7odDrJPQosdLlXKzPoleUVn3RGyG-oQrpxfYEFt_3og6RzBdihZIzdkaoNHV1BAAJKQPWx87nNas0kYRHOW7SUppXOr_2ooD5maeDwjbXdYuJPlcYS3eIS/s400/1.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406201659845463538&quot; /&gt;&lt;/a&gt;&lt;br /&gt;2. Select Advanced Certificate Request&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWMlK1IKj_3sTEUz9X0WzGO6RF8NGatsJ_JQl4PNom5kv8qiIzulW2ghF70pe81tdpA79S8pmBbtPdqshdX1_JBaa7wwX74UBw_tEe0CPt6ndYiAr1hTTydJo7Yup6q36orbSY/s1600/2.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 214px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWMlK1IKj_3sTEUz9X0WzGO6RF8NGatsJ_JQl4PNom5kv8qiIzulW2ghF70pe81tdpA79S8pmBbtPdqshdX1_JBaa7wwX74UBw_tEe0CPt6ndYiAr1hTTydJo7Yup6q36orbSY/s400/2.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406201724594164386&quot; /&gt;&lt;/a&gt;&lt;br /&gt;3. Here, choose the second option (I’m not gonna write that whole thing out :))&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_OLY76Fl2ZRZbVuM9kh4D99yOGVgA3IwyFHmjIASCDVnlWH5JHQLM7Il7vMOR25YndtQOn9jgFWTkCV1ES4DVL4kg9Z_iUXV2h437IoVuGds-Efx8zKqXXSntpC4BMtzcsHzI/s1600/3.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 94px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_OLY76Fl2ZRZbVuM9kh4D99yOGVgA3IwyFHmjIASCDVnlWH5JHQLM7Il7vMOR25YndtQOn9jgFWTkCV1ES4DVL4kg9Z_iUXV2h437IoVuGds-Efx8zKqXXSntpC4BMtzcsHzI/s400/3.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406201789286414034&quot; /&gt;&lt;/a&gt;&lt;br /&gt;4. Now we can copy the text from our request file and paste it here.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1VjVKao-QeaaYhDweqj3DejdfluU_DklCrOxEltNG3w2e8xlpGOkikd2tIjB3x1kwCkrakel9Fby_-SawieDVOcg88yHaHwYs5kFlDj6KQmE7E3r-6FnWP-QQiUNIlqw1KBfw/s1600/4.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 271px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1VjVKao-QeaaYhDweqj3DejdfluU_DklCrOxEltNG3w2e8xlpGOkikd2tIjB3x1kwCkrakel9Fby_-SawieDVOcg88yHaHwYs5kFlDj6KQmE7E3r-6FnWP-QQiUNIlqw1KBfw/s400/4.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406204817978120930&quot; /&gt;&lt;/a&gt;&lt;br /&gt;5. You will see that your certificate is pending after having clicked Submit&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnqWEH0wQnz2kKD8GzlThV_UVe3qEBXr94M65zXgY3T6gsuYi61lGFl_jSrWYaXhCK9ki5EUTd0tAgGecNxtc1ZCovK3_9y9u5uzkkDOpASqGleprOaw_xY-Ds7zplBpThN4oL/s1600/5.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 133px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnqWEH0wQnz2kKD8GzlThV_UVe3qEBXr94M65zXgY3T6gsuYi61lGFl_jSrWYaXhCK9ki5EUTd0tAgGecNxtc1ZCovK3_9y9u5uzkkDOpASqGleprOaw_xY-Ds7zplBpThN4oL/s400/5.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406202169358379426&quot; /&gt;&lt;/a&gt;&lt;br /&gt;And that’s it, nothing more to this simple step.  Next we’ll be issuing our pending request.&lt;br /&gt;&lt;br /&gt;Post series:&lt;br /&gt;1. &lt;a href=&quot;http://krva.blogspot.com/2009/11/exchange-2003-sp2-and-isa-2006.html&quot;&gt;Certificate procedure for Push Mail with Exchange 2003 SP2 and ISA 2006&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step1-creating.html&quot;&gt;Certificate procedure - Step 1: Creating a certificate request&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step-2-creating.html&quot;&gt;Certificate procedure – Step 2: Request a certificate&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-3-issuing.html&quot;&gt;Certificate procedure – Step 3: Issuing the certificate&lt;/a&gt;&lt;br /&gt;5. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-4-assign.html&quot;&gt;Certificate procedure – Step 4: Assign the certificate to your website in IIS&lt;/a&gt;&lt;br /&gt;6. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-5-export.html&quot;&gt;Certificate procedure – Step 5: Export the private key and store in a safe location&lt;/a&gt;</description><link>http://krva.blogspot.com/2009/11/certificate-procedure-step-2-creating.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipuMXCbfwckzb8_v7odDrJPQosdLlXKzPoleUVn3RGyG-oQrpxfYEFt_3og6RzBdihZIzdkaoNHV1BAAJKQPWx87nNas0kYRHOW7SUppXOr_2ooD5maeDwjbXdYuJPlcYS3eIS/s72-c/1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-1591243539107607809</guid><pubDate>Fri, 20 Nov 2009 14:28:00 +0000</pubDate><atom:updated>2009-12-10T11:58:15.664+01:00</atom:updated><title>Certificate procedure - Step 1: Creating a certificate request</title><description>In my previous post (see link below), I talked about the various steps you need to perform to create a certificate to secure your data transmission, both self-signed and officially signed.&lt;br /&gt;&lt;br /&gt;As promised, the following posts provide a step-by-step overview of the complete procedure.  Thanks to Bram Poelaert for his input!&lt;br /&gt;&lt;br /&gt;The first step is creating the certificate request:&lt;br /&gt;1. Open the IIS Manager, right click the &lt;em&gt;Default Web Site&lt;/em&gt; and select &lt;strong&gt;Properties&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4k08zgf65T-Gd_XhsgV9xUXrFtIwGx3xPHHoPgzvnhhyphenhyphenOA6yTk_3qQ3noChBqTs9M7hKKMH-OYY9u-m5boVnxNXxOBnkBgil4ZytBp8YShM_1JpbOcrfs6nB5WvD-HtQ5LvER/s1600/1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 247px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4k08zgf65T-Gd_XhsgV9xUXrFtIwGx3xPHHoPgzvnhhyphenhyphenOA6yTk_3qQ3noChBqTs9M7hKKMH-OYY9u-m5boVnxNXxOBnkBgil4ZytBp8YShM_1JpbOcrfs6nB5WvD-HtQ5LvER/s400/1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406193171930525394&quot; /&gt;&lt;/a&gt;&lt;br /&gt;2. On the tab &lt;strong&gt;Directory Security&lt;/strong&gt;, select &lt;strong&gt;Server Certificate&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8q85FQ8Or3_E0GzmGDdp0ETIaBWBLqWUUwM04uljSY42FZ2ZrkGV-fJylyVbVcP9fWNPHhmm-Wra5oqIZUDp1BzoIZOr3Zf2BlemZ-srOxgR608Q_67bPdiQF-ag-vVOzpmXJ/s1600/2.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 397px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8q85FQ8Or3_E0GzmGDdp0ETIaBWBLqWUUwM04uljSY42FZ2ZrkGV-fJylyVbVcP9fWNPHhmm-Wra5oqIZUDp1BzoIZOr3Zf2BlemZ-srOxgR608Q_67bPdiQF-ag-vVOzpmXJ/s400/2.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406193243394916978&quot; /&gt;&lt;/a&gt;&lt;br /&gt;3. In the wizard, click &lt;strong&gt;Next &lt;/strong&gt;on the Welcome screen&lt;br /&gt;4. Since we are creating a new certificate, select &lt;strong&gt;Create a new certificate&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwKEvCY1krjr10D6251Eo9oqY4PcQqEWA9vz67G_iLFV9movJm5apYVjBNiWpBZtHxf30LeAg-_kElIlFjofJ91Q8qp7nPgIXDE5fsjny0lXhGV9PJnvXTyTBmUmuHELlhTDNN/s1600/3.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 302px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwKEvCY1krjr10D6251Eo9oqY4PcQqEWA9vz67G_iLFV9movJm5apYVjBNiWpBZtHxf30LeAg-_kElIlFjofJ91Q8qp7nPgIXDE5fsjny0lXhGV9PJnvXTyTBmUmuHELlhTDNN/s400/3.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406193334150894114&quot; /&gt;&lt;/a&gt;&lt;br /&gt;5. We are creating the request now and processing it later, so choose &lt;strong&gt;Prepate the request now, but send it later&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifmgYG0RKRh1RvYYKoRWtdWJVchkW0jPGJbyNj6Bo75WLKWirkrRHRist-FCufBQ2YnJjDBOFEj2-4TIwxaUHHeFqNT8R-ksNoQ6PGUEIglodKLg0ke3MeZlfxAWVJrAPRhJmf/s1600/4.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 302px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifmgYG0RKRh1RvYYKoRWtdWJVchkW0jPGJbyNj6Bo75WLKWirkrRHRist-FCufBQ2YnJjDBOFEj2-4TIwxaUHHeFqNT8R-ksNoQ6PGUEIglodKLg0ke3MeZlfxAWVJrAPRhJmf/s400/4.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406193410844094098&quot; /&gt;&lt;/a&gt;&lt;br /&gt;6. Give the request a name, this can be anything, just make it clear what it is&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgasIxm8sszV0mjf4Zu2MeWYxQVDaj9t50b7WqvFX2oTilOo7K8OvJmMGu6Z9AEEc2N8gtinCncYSLpj_rEMq4VDSDE5U0KF-7RUToKlk3VjenvaaTFFLRF6jk03U_V7sV8B2Mg/s1600/5.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 302px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgasIxm8sszV0mjf4Zu2MeWYxQVDaj9t50b7WqvFX2oTilOo7K8OvJmMGu6Z9AEEc2N8gtinCncYSLpj_rEMq4VDSDE5U0KF-7RUToKlk3VjenvaaTFFLRF6jk03U_V7sV8B2Mg/s400/5.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406193493822751234&quot; /&gt;&lt;/a&gt;&lt;br /&gt;7. Provide the name and OU&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB0sbGfS-ho7h5dtDM4kaDCRrvr_BcS5n2Qx3z1nBEcyf7Os7VZL95BmmC9WAobI0rVasI7ZFgulL8ObPJAot86Y8z1Q3lF8dMYE-SYnFoBAQoAYWGEYh8rAaYKnhQ2P9vUIjH/s1600/6.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 302px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjB0sbGfS-ho7h5dtDM4kaDCRrvr_BcS5n2Qx3z1nBEcyf7Os7VZL95BmmC9WAobI0rVasI7ZFgulL8ObPJAot86Y8z1Q3lF8dMYE-SYnFoBAQoAYWGEYh8rAaYKnhQ2P9vUIjH/s400/6.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406193575057202338&quot; /&gt;&lt;/a&gt;&lt;br /&gt;8. This is the most important part of your certificate: the &lt;strong&gt;common name&lt;/strong&gt;.  This needs to be the &lt;strong&gt;fully qualified domain name&lt;/strong&gt; to which the users will be connecting.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkIF2fLgB_L3_ghSgbvGnZ8yngqIo685kovElZ3LVvnNPpvj-wh8T_15yaR4kTi8PbO7PGJq0m397SAsbjywmMI1QLdUZ3iketMBVktwn4uwWzilbJZ-orX8yZW8D-hzxV3YGw/s1600/7.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 302px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkIF2fLgB_L3_ghSgbvGnZ8yngqIo685kovElZ3LVvnNPpvj-wh8T_15yaR4kTi8PbO7PGJq0m397SAsbjywmMI1QLdUZ3iketMBVktwn4uwWzilbJZ-orX8yZW8D-hzxV3YGw/s400/7.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406193655563938706&quot; /&gt;&lt;/a&gt;&lt;br /&gt;9. Next, choose your Country, State and City&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUR4ak7tx5j2HlNWeG1t0ZAoUtHhJLvut3ULO7JEmbIhEAlxw59ooEzlFzBnzgcL_VHWs_LbfP2O3M_aIcXI9wT6Me8MZ6P3IRzKSGzxJS5FWoGtUmJgDdqfZYxr9cRVgoftBY/s1600/8.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 302px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUR4ak7tx5j2HlNWeG1t0ZAoUtHhJLvut3ULO7JEmbIhEAlxw59ooEzlFzBnzgcL_VHWs_LbfP2O3M_aIcXI9wT6Me8MZ6P3IRzKSGzxJS5FWoGtUmJgDdqfZYxr9cRVgoftBY/s400/8.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406193733815354866&quot; /&gt;&lt;/a&gt;&lt;br /&gt;10. Save the request file to a location&lt;br /&gt;11. Verify the settings you have chosen in the overview before completing the wizard.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMavh7cbBU-UWEeHv-eHjjw-TknbzfnmXh31uwnkV8T59mIDN3n4-0HtBZ7JwiJP-6cmzuv7PLluz3vUQEOqjplWi0I9DdToRfs3wVoO9vRa_aj_9jS-V__jfYy_U9z9x3S6PJ/s1600/9.JPG&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 302px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMavh7cbBU-UWEeHv-eHjjw-TknbzfnmXh31uwnkV8T59mIDN3n4-0HtBZ7JwiJP-6cmzuv7PLluz3vUQEOqjplWi0I9DdToRfs3wVoO9vRa_aj_9jS-V__jfYy_U9z9x3S6PJ/s400/9.JPG&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5406193820362111266&quot; /&gt;&lt;/a&gt;&lt;br /&gt;The result will be a TXT file.  In the text file you will see -----BEGIN NEW CERTIFICATE REQUEST----- &amp; -----END NEW CERTIFICATE REQUEST-----&lt;br /&gt;&lt;br /&gt;This is the result that can be forward to an official Certification Authority, but for testing purposes we’ll be issuing the certificate ourselves.&lt;br /&gt;&lt;br /&gt;Post series:&lt;br /&gt;1. &lt;a href=&quot;http://krva.blogspot.com/2009/11/exchange-2003-sp2-and-isa-2006.html&quot;&gt;Certificate procedure for Push Mail with Exchange 2003 SP2 and ISA 2006&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step1-creating.html&quot;&gt;Certificate procedure - Step 1: Creating a certificate request&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step-2-creating.html&quot;&gt;Certificate procedure – Step 2: Request a certificate&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-3-issuing.html&quot;&gt;Certificate procedure – Step 3: Issuing the certificate&lt;/a&gt;&lt;br /&gt;5. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-4-assign.html&quot;&gt;Certificate procedure – Step 4: Assign the certificate to your website in IIS&lt;/a&gt;&lt;br /&gt;6. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-5-export.html&quot;&gt;Certificate procedure – Step 5: Export the private key and store in a safe location&lt;/a&gt;</description><link>http://krva.blogspot.com/2009/11/certificate-procedure-step1-creating.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4k08zgf65T-Gd_XhsgV9xUXrFtIwGx3xPHHoPgzvnhhyphenhyphenOA6yTk_3qQ3noChBqTs9M7hKKMH-OYY9u-m5boVnxNXxOBnkBgil4ZytBp8YShM_1JpbOcrfs6nB5WvD-HtQ5LvER/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-1846546631610582557</guid><pubDate>Thu, 19 Nov 2009 13:52:00 +0000</pubDate><atom:updated>2009-12-10T11:57:21.338+01:00</atom:updated><title>Certificate procedure for Push Mail with Exchange 2003 SP2 and ISA 2006</title><description>Last week, a colleague and I have configured an Exchange 2003 SP2 for push mail.  Since it was a joint effort, I want to thank Bram Poelaert for his help and expertise.  All information in these posts are therefore the result of our teamwork.&lt;br /&gt;&lt;br /&gt;First a small overview.  We were installing and configuring an ISA 2006 server &lt;strong&gt;with 1 network adapter&lt;/strong&gt; to publish the OMA and OWA functionalities to the external world for push mail functionalities.  In the backend, an Exchange 2003 SP2 is serving as the mail server.  We’ll be offloading the SSL on the ISA 2006 server.  To complete the picture, a CheckPoint firewall is placing the ISA in the DMZ by using the three zones: untrusted, DMZ &amp; trusted.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW9g2psGfCmecACgfQfg3opjv57aReiSVTPzQOaA7zWq8So8lpZDGtZRAXdkyQz9s7tuhnVmPI56wh-VAtLYZlaztsFbHw_ai-uz2zwfqvZanZZW4uKe6ye0EHL-MceYQeCy1U/s1600/1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 387px; height: 310px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjW9g2psGfCmecACgfQfg3opjv57aReiSVTPzQOaA7zWq8So8lpZDGtZRAXdkyQz9s7tuhnVmPI56wh-VAtLYZlaztsFbHw_ai-uz2zwfqvZanZZW4uKe6ye0EHL-MceYQeCy1U/s400/1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5405813714412946786&quot; /&gt;&lt;/a&gt;&lt;br /&gt;As always, the most difficult (and critical) part of the installation isn’t the configuration of Exchange or even ISA 2006, but the installation of the necessary certificate.  This is what this post will be about.&lt;br /&gt;&lt;br /&gt;Having an official authority create a certificate for you costs quite a bit money, so you don’t want to have to do it twice.  For that reason, it’s always best to test your procedures by creating a certificate yourself and make sure your certificate request is correct.&lt;br /&gt;&lt;br /&gt;To create and install a certificate yourself, these steps have to be completed:&lt;br /&gt; 1.  Create a certificate request via IIS web wizard&lt;br /&gt; 2.  Process the request via your Certification Authority (CA)&lt;br /&gt; 3.  Issue the pending certificate in CA&lt;br /&gt; 4.  Assign the certificate to your website in IIS&lt;br /&gt; 5.  Export the private key and store in a safe location&lt;br /&gt;&lt;br /&gt;Make sure that when you connect to your secure website that no error messages are displayed.  Most frequent mistakes are the &lt;strong&gt;common names&lt;/strong&gt; that are not the same as the URL or the &lt;strong&gt;certificate chain&lt;/strong&gt; that is broken somewhere.&lt;br /&gt;&lt;br /&gt;Also, be careful with the &lt;strong&gt;private key&lt;/strong&gt;.  This key is residing on the computer that created the certificate request.  Do NOT import the certificate again (via MMC for example) before having the private key exported.  If you do, the private key will be gone and you can not use the certificate!&lt;br /&gt;&lt;br /&gt;OK, you’ve tested your certificate and it works as you expected.  Cool!  Now delete everything and start over by creating a new certificate request that you can send to the third party for the creation of your certificate.&lt;br /&gt; 1.  Create a certificate request via IIS web wizard&lt;br /&gt; 2.  Send the certificate request (TXT file) to the CA&lt;br /&gt; 3.  Import the certificate received in IIS web wizard&lt;br /&gt; 4.  Export the private key and store in a safe location&lt;br /&gt; 5.  Install the certificate and the private key on the ISA 2006 server&lt;br /&gt; 6.  Use the certificate to secure the data&lt;br /&gt;&lt;br /&gt;In my next post I’ll go over the process step-by-step for an easy manual.&lt;br /&gt;I hope this can already put you well underway.&lt;br /&gt;&lt;br /&gt;Post series:&lt;br /&gt;1. &lt;a href=&quot;http://krva.blogspot.com/2009/11/exchange-2003-sp2-and-isa-2006.html&quot;&gt;Certificate procedure for Push Mail with Exchange 2003 SP2 and ISA 2006&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step1-creating.html&quot;&gt;Certificate procedure - Step 1: Creating a certificate request&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://krva.blogspot.com/2009/11/certificate-procedure-step-2-creating.html&quot;&gt;Certificate procedure – Step 2: Request a certificate&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-3-issuing.html&quot;&gt;Certificate procedure – Step 3: Issuing the certificate&lt;/a&gt;&lt;br /&gt;5. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-4-assign.html&quot;&gt;Certificate procedure – Step 4: Assign the certificate to your website in IIS&lt;/a&gt;&lt;br /&gt;6. &lt;a href=&quot;http://krva.blogspot.com/2009/12/certificate-procedure-step-5-export.html&quot;&gt;Certificate procedure – Step 5: Export the private key and store in a safe location&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Enjoy!</description><link>http://krva.blogspot.com/2009/11/exchange-2003-sp2-and-isa-2006.html</link><author>noreply@blogger.com (My precious)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-7323301077533169884</guid><pubDate>Fri, 06 Nov 2009 15:19:00 +0000</pubDate><atom:updated>2009-11-06T16:28:14.074+01:00</atom:updated><title>Manually upgrading the vpxa agent of an ESX server</title><description>During my ESX 2.5 Upgrade project I ran into some VM migration problems.&lt;br /&gt;As soon as the vmdk was too big to be able to complete the migration in 25 minutes, the operation would fail.&lt;br /&gt;&lt;br /&gt;A cause could have been that the version of the vpxa agent on the ESX 2.5 agent was of a different build than the vpxa agent on the ESX 3.5 destination host.  So I needed to manually upgrade the vpxa agent of the ESX 2.5 host.&lt;br /&gt;&lt;br /&gt;As you can figure, documentation on how to do this isn’t very widely spread, so I decided to write a short blog post on it:&lt;br /&gt;1.Log into the VC server locally and browse to the “&lt;strong&gt;Upgrade&lt;/strong&gt;” folder.  Default: &lt;em&gt;C:\Program Files\VMware\Infrastructure\VirtualCenter Server\Upgrade&lt;/em&gt;&lt;br /&gt;2.Browse to the correct vpx upgrade file for your ESX server version you need to upgrade the vpxa agent on. &lt;br /&gt;My ESX 2.5 was version 2.5.2 so I needed &lt;em&gt;vpx-upgrade-esx-4-linux-*&lt;/em&gt;.  I found this info in the bundleversion.xml file&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkisGAPBh9r8rfLkvOBm-Dfs01wwCrlAuF7D3Jr5F19cmmHXidpgvC0ez9CXe2iDMhs3ISW2EeC1l7wHm36hPTJhOeK_dknaQi1lJk8ijfAi85elhUGGqe8o3DF4TFYcbYSp-W/s1600-h/11.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 131px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkisGAPBh9r8rfLkvOBm-Dfs01wwCrlAuF7D3Jr5F19cmmHXidpgvC0ez9CXe2iDMhs3ISW2EeC1l7wHm36hPTJhOeK_dknaQi1lJk8ijfAi85elhUGGqe8o3DF4TFYcbYSp-W/s400/11.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5401012779242665282&quot; /&gt;&lt;/a&gt;&lt;br /&gt;3.Copy this file to the ESX host you need to upgrade the vpxa agent on via a winSCP or PenguiNet or something like it.&lt;br /&gt;4.Log into the ESX as root and browse to the folder where you have copied to upgrade file&lt;br /&gt;5.Run the command: &lt;strong&gt;service vmware-vpxa restart&lt;/strong&gt;&lt;br /&gt;This will stop and start the agent and automatically upgrade it’s version.  This shouldn’t take more than 5 – 10 seconds.&lt;br /&gt;6.Now log back into the VirtualCenter server locally and restart the services:&lt;br /&gt;   a. VMware License Server&lt;br /&gt;   b. VMware VirtualCenter Server&lt;br /&gt;&lt;br /&gt;OK, that’s it.  Your vpxa agent is now upgrade to the version and build you have selected.  It could be that in VC itself you will have to disconnect the ESX host and then connect it again.</description><link>http://krva.blogspot.com/2009/11/manually-upgrading-vpxa-agent-of-esx.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkisGAPBh9r8rfLkvOBm-Dfs01wwCrlAuF7D3Jr5F19cmmHXidpgvC0ez9CXe2iDMhs3ISW2EeC1l7wHm36hPTJhOeK_dknaQi1lJk8ijfAi85elhUGGqe8o3DF4TFYcbYSp-W/s72-c/11.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-1039820286300157808</guid><pubDate>Thu, 05 Nov 2009 13:28:00 +0000</pubDate><atom:updated>2009-11-20T14:54:16.031+01:00</atom:updated><title>ESX command line commands</title><description>I am currently busy with designing a migration strategy for a large ESX 2.5.2 migration to ESX 3.5 for one of our customers.  (yeah I know, a little late ... but at least they will migrate immediately on the vShpere4 :))&lt;br /&gt;&lt;br /&gt;While doing my tests and type the commands mostly only once and from then on use the arrow keys to go up to previous commands.  You know how it goes: as lazy as you can get it ... :)&lt;br /&gt;&lt;br /&gt;Anyways, I decided I would post most of these commands here.  Not just for you guys, but admittingly also for myself as I regularly find myself looking through my memory for correct syntaxes ... :)&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;List files: &lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd –l&lt;/em&gt;&lt;br /&gt;List path and names of .registered VM vmx files on the present host&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Get state vm&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd /vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx getstate&lt;/em&gt;&lt;br /&gt;Retrieve power state of the VM: off, on, suspended, stuck&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reboot vm&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx reset trysoft/hard&lt;/em&gt;&lt;br /&gt;Reboot the VM. First try a nice shutdown (trysoft), then if necessary force a shutdown before reboot (hard).&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Power on vm&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx start&lt;/em&gt;&lt;br /&gt;Power on the VM &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Shutdown vm&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx stop trysoft/hard&lt;/em&gt;&lt;br /&gt;Shutdown/halt the VM. First try a nice shutdown (trysoft), then if necessary force a shutdown (hard).&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Suspend vm&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx suspend&lt;/em&gt;&lt;br /&gt;Suspend the VM&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Verify snapshot&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx hassnapshot&lt;/em&gt;&lt;br /&gt;Query if VM has a snapshot &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Create snapshot&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd createsnapshot name description quiesce memory&lt;/em&gt;&lt;br /&gt;Quiesce will quiesce file system writes, while Memory will grab the memory state &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Revert to snapshot&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx revertsnapshot&lt;/em&gt;&lt;br /&gt;Revert to previous created snapshot (you loose the current VM state!) &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Remove snapshot&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx removesnapshots&lt;/em&gt;&lt;br /&gt;Remove previous created snapshots (you keep the current VM state!)&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Register vm&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd -s register vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx&lt;/em&gt;&lt;br /&gt;Register VM (add to inventory)&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Unregister vm&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd -s unregister vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx&lt;/em&gt;&lt;br /&gt;Unregister VM (remove to inventory)&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Answer vm&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmware-cmd vmfs/volume/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmx answer&lt;/em&gt;&lt;br /&gt;answer pending request for userinput&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Extend virtual Disk&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmkfstools  -X  12G ./testing.vmdk&lt;/em&gt;&lt;br /&gt;To extend an existing Virtual Disk to 12GB.&lt;br /&gt;Be aware if the shrinked size is smaller as the partition size in the guest there might be a data losse or a corrupted system resulting!&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Copy virtual disk&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmkfstools -i /vmfs/volumes/&#39;vmfslabel&#39;/&#39;VMName&#39;/&#39;VMName&#39;.vmdk /vmfs/volumes/&lt;datastore&gt;/&#39;VMName&#39;.vmdk&lt;/em&gt;&lt;br /&gt;Copy vmdk from one vmfs to another datastore&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Export virtual disk&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmkfstools -i  /vmfs/&#39;VMName&#39;/&#39;VMName&#39;.vmdk -d 2gbsparse /&lt;datastore&gt;/&#39;VMName&#39;.vmdk&lt;/em&gt;&lt;br /&gt;Export vmdk to ext3 partition&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Rename files&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmkfstools  -E&lt;/em&gt;&lt;br /&gt;Rename files associated with a specified virtual disk&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Delete Virtualdisk&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;vmkfstools  -U&lt;/em&gt;&lt;br /&gt;Delete files associated with the specified virtual disk&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Delete folders&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;rm –R –f /vmfs/volumes/&lt;datastore&gt;/VM folder&gt;&lt;/em&gt;&lt;br /&gt;Delete non-empty folders &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Find functionality&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;&lt;command&gt; | grep –i “&lt;what to find&gt;”&lt;/em&gt;&lt;br /&gt;Example: vi *440*.vmx | grep –I “version”&lt;br /&gt;Find a word with a file.  In this example “version”&lt;br /&gt;&lt;br /&gt;There are of course a whole lot more vmkfstools and vmware-cmd commands, but I think this gives a good start ...&lt;br /&gt;&lt;br /&gt;Enjoy!</description><link>http://krva.blogspot.com/2009/11/esx-commands.html</link><author>noreply@blogger.com (My precious)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-4647513909612016615</guid><pubDate>Tue, 19 May 2009 10:58:00 +0000</pubDate><atom:updated>2009-05-19T13:06:09.151+02:00</atom:updated><title>SMS Site System Status Summarizer still cannot access storage object.  The operating system reported error 2147942405: Access is denied.</title><description>Now that I&#39;ve got my OCS 2007 R2 successfully integrated with Cisco Call Manager 7, I thought I&#39;ll expand our test environment and start implementing SCCM 2007 R2 for monitoring the servers installed and facilitate the deployment of future clients.&lt;br /&gt;I chose to set up &lt;strong&gt;my SCCM environment on 4 servers&lt;/strong&gt;:&lt;br /&gt;&lt;strong&gt;SCCM1&lt;/strong&gt; = MP, FSP, SLP, Site server&lt;br /&gt;&lt;strong&gt;SCCM2&lt;/strong&gt; = DP, PXE, SUP&lt;br /&gt;&lt;strong&gt;IIS1&lt;/strong&gt; = Reporting Point, SQL Reporting&lt;br /&gt;&lt;strong&gt;SQL1&lt;/strong&gt; = DB server&lt;br /&gt;&lt;br /&gt;I installed the first SCCM1 server and from within the management console I deployed the other SCCM services (SCCM2 and IIS1).  For this I followed the Technet deployment and configuration guides for SCCM 2007 R2.  No problems there.&lt;br /&gt;Also with the installation and configuration of Reporting on IIS1 all went ok.  Running the reports works fine.  So all ok you would think?!&lt;br /&gt;&lt;br /&gt;Still, I kept receiving these annoying messages under &lt;strong&gt;Site Status - Site System Status - IIS1\C$\SMS&lt;/strong&gt;&lt;br /&gt;(&lt;em&gt;in the print screen below, the status is now OK, because of course by now I resolved the problem ...&lt;/em&gt;)&lt;br /&gt;(&lt;em&gt;The Site System Status is CRITICAL because I have installed the PXE service, but haven&#39;t configured it yet, I&#39;ll do that next ...&lt;/em&gt;)&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd-H7Gsmxs6jBCf7BzSB9NtuRk0XvnfF9_IqkLSFbu1cuw-3pbGNsCgaae-mRuEIjLLykwJHRI2XEV7iJ3vX8953hSLFcV2VLrOVAbVXemMIgZ3uZrp-Ft3EGIqo7J4JIwpWkC/s1600-h/1a.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 225px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd-H7Gsmxs6jBCf7BzSB9NtuRk0XvnfF9_IqkLSFbu1cuw-3pbGNsCgaae-mRuEIjLLykwJHRI2XEV7iJ3vX8953hSLFcV2VLrOVAbVXemMIgZ3uZrp-Ft3EGIqo7J4JIwpWkC/s400/1a.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5337488079658122610&quot; /&gt;&lt;/a&gt;&lt;br /&gt;So anyway, here I would get these messages:&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;strong&gt;SMS Site System Status Summarizer still cannot access storage object &quot;\\BTLABIIS1\C$\SMS&quot; on site system &quot;\\BTLABIIS1&quot;. The operating system reported error 2147942405: Access is denied.&lt;/strong&gt;&lt;/em&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3ROc_W4sMoUWXgGCZNmZIAZAr182RIu-F8fZGw8iWmmTGFcOKZHJ6UKfjKYA11wxSZjUdbd12QruYa5VkM3vDfQlCt4F0a5RGkqcPPkkZZ9C503BIe9F7ydTjCK_AV7NTZa-s/s1600-h/1b.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 210px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3ROc_W4sMoUWXgGCZNmZIAZAr182RIu-F8fZGw8iWmmTGFcOKZHJ6UKfjKYA11wxSZjUdbd12QruYa5VkM3vDfQlCt4F0a5RGkqcPPkkZZ9C503BIe9F7ydTjCK_AV7NTZa-s/s400/1b.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5337488250154687442&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Everywhere you look online it will tell you to &lt;strong&gt;make sure the SCCM site server computer account (SCCM1 in my case) is member of the local Administrators group on the remote SCCM server&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;Unfortunately for me, that didn&#39;t do the trick.  Reading the documentation on Technet, I knew I had this before anything else, but still with the result displayed above.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;To resolve this, there is a second account that needs to be member of the Administrators group on the remote server:&lt;/strong&gt; the service account used to deploy the SCCM service with.  You can look it up &lt;strong&gt;Site management - Site Settings - Site Systems - &lt;server&gt; - Role properties&lt;/strong&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlcqgPD64tbJsSYh8XqvBrUjrKSRLU-swVgerFlS382sawpbdnfNVPtWnLxCFnsxMQIMuB0Vvp4UpMFak1WN2timU2ktihxaiwbxiWUQU3NVEi5PVIK5k3spexFSQ0sXsgt0W-/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 262px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlcqgPD64tbJsSYh8XqvBrUjrKSRLU-swVgerFlS382sawpbdnfNVPtWnLxCFnsxMQIMuB0Vvp4UpMFak1WN2timU2ktihxaiwbxiWUQU3NVEi5PVIK5k3spexFSQ0sXsgt0W-/s400/2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5337488647770813938&quot; /&gt;&lt;/a&gt;&lt;br /&gt;When you add this account to the Administrators group, this error message will dispear.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIH5naMR-f7ajETmdIgAwmMnzp01YAGy-eIt1xA3JkWybqZrmSHpTk9W1CB5gXEMVYRft_kqccA-ymXgKETDv8HZrsEfr3xrlk_zScwSi1RFdinrgp0kvg5v92ndvXJNyMsYr1/s1600-h/3.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 98px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIH5naMR-f7ajETmdIgAwmMnzp01YAGy-eIt1xA3JkWybqZrmSHpTk9W1CB5gXEMVYRft_kqccA-ymXgKETDv8HZrsEfr3xrlk_zScwSi1RFdinrgp0kvg5v92ndvXJNyMsYr1/s400/3.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5337488764579726466&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Hope it helps.</description><link>http://krva.blogspot.com/2009/05/now-that-ive-got-my-ocs-2007-r2.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd-H7Gsmxs6jBCf7BzSB9NtuRk0XvnfF9_IqkLSFbu1cuw-3pbGNsCgaae-mRuEIjLLykwJHRI2XEV7iJ3vX8953hSLFcV2VLrOVAbVXemMIgZ3uZrp-Ft3EGIqo7J4JIwpWkC/s72-c/1a.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-775612351561877095</guid><pubDate>Mon, 27 Apr 2009 09:11:00 +0000</pubDate><atom:updated>2009-04-27T11:25:19.071+02:00</atom:updated><title>OCS 2007 R2 Documentation</title><description>You also noticed that when you search for OCS 2007 R2 documentation, you get a lot of OCS 2007 documents?  Drove me crazy, whenever I followed a link on a OCS 2007 R2 site, I got to OCS 2007 knowledge base.&lt;br /&gt;&lt;br /&gt;So I decided to make a collection of true OCS 2007 R2 document libraries, to facilitate my OCS 2007 R2 - Cisco Call Manager integration project:&lt;br /&gt;1. &lt;a href=&quot;http://www.microsoft.com/downloads/en/results.aspx?freetext=Microsoft%20Office%20Communications%20Server%202007%20R2&amp;productID=&amp;categoryId=&amp;period=&amp;sortCriteria=popularity&amp;nr=50&amp;DisplayLang=en&quot;&gt;Microsoft Office Communications Server 2007 R2&lt;/a&gt;&lt;br /&gt;The mother load, from the Microsoft download center.  I just don&#39;t understand why this doesn&#39;t show up when you Google it.&lt;br /&gt;2. &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?familyid=E9F86F96-AA09-4DCA-9088-F64B4F01C703&amp;displaylang=en&quot;&gt;Microsoft Office Communications Server 2007 R2 Documentation&lt;/a&gt;&lt;br /&gt;A CHM file with technical documentation to help you understand, plan, deploy, and operate Microsoft Office Communications Server 2007 R2 servers.&lt;br /&gt;Remember that you might have to &quot;&lt;strong&gt;Unblock&lt;/strong&gt;&quot; the content.&lt;br /&gt;If you need help on that, here is the Microsoft support page: &lt;a href=&quot;http://support.microsoft.com/kb/902225/en-us&quot;&gt;You cannot open HTML Help (.chm) files from Internet Explorer &lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://technet.microsoft.com/en-us/library/dd441331(office.13).aspx&quot;&gt;Microsoft Office Communications Server 2007 R2 online documentation&lt;/a&gt;&lt;br /&gt;If you don&#39;t want to mess about with the .chm file, you can find the same documentation online, on the Technet pages.&lt;br /&gt;&lt;br /&gt;Hope this can help you on your OCS search.</description><link>http://krva.blogspot.com/2009/04/ocs-2007-r2-documentation.html</link><author>noreply@blogger.com (My precious)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-3574964994965531522</guid><pubDate>Thu, 16 Apr 2009 07:36:00 +0000</pubDate><atom:updated>2009-04-16T10:15:11.866+02:00</atom:updated><title>Exchange 2010 beta available: a list of the new features</title><description>So yesterday (14/04/09) we were able to download the first beta of the new email system that is used by 65 % of the companies.  In Q3 of 2009 the distribution of the RTM version should be a fact.&lt;br /&gt;&lt;br /&gt;First thing I noticed is that the admin interface has not been majorly changed, compared to the new interface we got from E2K7.  That&#39;s good, cause I like this new interface much better than the old one.&lt;br /&gt;&lt;br /&gt;Based on Microsoft documentation, I&#39;ve set off testing and playing around in my test lab.  The improvements they have made (27 to be exact) are divided by Microsoft in 3 big pilars:&lt;br /&gt;1. Flexibility and reliability&lt;br /&gt;2. Anywhere access&lt;br /&gt;3. Protection and compliance&lt;br /&gt;&lt;br /&gt;Of course, one of the most eye catching improvement is the support for OWA on Internet Explorer 7 &amp; 8, Safari 3 and Firefox 3.  But another cool feature that I think will be much used is the &quot;&lt;strong&gt;MailTips&lt;/strong&gt;&quot;.  It will protect end users from sending personal mails to large mailing groups.  The last thing that caught my eye yesterday already is the &quot;&lt;strong&gt;Consolidated view&lt;/strong&gt;&quot; and &quot;&lt;strong&gt;Conversation Mute&lt;/strong&gt;&quot;.  Finally we are able to view all e-mails concerning a single topic in a single node (in Outlook ànd OWA).&lt;br /&gt;&lt;br /&gt;Below is a list of the other 27 improvements.  The ones I think are really interesting and that I&#39;ll be looking into I&#39;ve indicated in &lt;strong&gt;bold&lt;/strong&gt;:&lt;br /&gt;1. &lt;strong&gt;Added internet browser support for OWA&lt;/strong&gt;&lt;br /&gt;2. &lt;strong&gt;Answer/forward status&lt;/strong&gt; is being kept by the server and can be shown on all clients&lt;br /&gt;3. &lt;strong&gt;MailTips&lt;/strong&gt; to prevent personal mails from being distributed to large communities&lt;br /&gt;4. &lt;strong&gt;Conversation view&lt;/strong&gt; for the threating of messages&lt;br /&gt;5. Calendar sharing available in OWA and for federated users&lt;br /&gt;6. Sharing of contacts outside the company and outside the desktop&lt;br /&gt;7. &lt;strong&gt;Voice Mail Preview&lt;/strong&gt;: automatic written preview of a received voice mail&lt;br /&gt;8. &lt;strong&gt;Call Answering Rules&lt;/strong&gt; to administer phone calls just like e-mails&lt;br /&gt;9. &lt;strong&gt;Rights Management&lt;/strong&gt; in OWA as well as Outlook&lt;br /&gt;10. &lt;strong&gt;Federation Services&lt;/strong&gt; to connect your Exchange servers to those of other organizations&lt;br /&gt;11. Page patching: automatic fixing of corrupted DB pages&lt;br /&gt;12. I/O Optimalization: less I/O bursts, support for SATA disks&lt;br /&gt;13. JBOD (Just a Bunch Of Disks) support instead of only RAID&lt;br /&gt;14. &lt;strong&gt;Database Availability groups&lt;/strong&gt;: redundant DB&#39;s for mailboxes which provide automatic recovery&lt;br /&gt;15. &lt;strong&gt;Failover on DB level&lt;/strong&gt;, clustering not longer necessary to provide high-availability, so more uptime&lt;br /&gt;16. &lt;strong&gt;Online Move-Mailbox&lt;/strong&gt;: moving MBX&#39;en while the user is logged in&lt;br /&gt;17. &lt;strong&gt;Rules for transport protection&lt;/strong&gt;: an administrator can change the IRM protection AFTER they have been sent&lt;br /&gt;18. &lt;strong&gt;Moderation&lt;/strong&gt;: a transport rule that allows you to send a message to a reviewer before the message is actually sent&lt;br /&gt;19. &lt;strong&gt;Rules for protection Outlook&lt;/strong&gt; which allows you to automatically assign RMS templates to e-mails&lt;br /&gt;20. Role-based access control for Outlook&lt;br /&gt;21. &lt;strong&gt;Exchange Control Panel&lt;/strong&gt; to assign end users specific levels of control&lt;br /&gt;22. &lt;strong&gt;Message tracking&lt;/strong&gt; for end users (without having to contact the helpdesk)&lt;br /&gt;23. Distribution Groups can be created, modified and deleted by end users&lt;br /&gt;24. Block/Allow list for mobile devices&lt;br /&gt;25. Protected voicemail: you are able to block the sending of voicemails outside the organization&lt;br /&gt;26. Personal archive: moving of PST files to a secundary mailbox for better performance and compliance&lt;br /&gt;27. &lt;strong&gt;Multi mailbox search&lt;/strong&gt;: finally you are able to search multiple mailboxes with a single click&lt;br /&gt;&lt;br /&gt;As you can see, there are quite a few cool improvements.&lt;br /&gt;Can&#39;t wait to get started ... :)</description><link>http://krva.blogspot.com/2009/04/exchange-2010-beta-available-list-of.html</link><author>noreply@blogger.com (My precious)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-2518338131603112146</guid><pubDate>Mon, 06 Apr 2009 08:27:00 +0000</pubDate><atom:updated>2009-04-06T10:30:16.001+02:00</atom:updated><title>OCS 2007 - Failed to send SIP request: outgoing TLS negotiation failed; HRESULT=-2146893022</title><description>So now that I have my OCS server installed, a few troubleshooting tasks have to be done (in my case anyway).&lt;br /&gt;&lt;br /&gt;First error I saw when running the &lt;strong&gt;Validate Front End Server Configuration&lt;/strong&gt; wizard, is this:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiodtQ5ldC8YUrzC1NxKGJyDQQZBmKLZKgoXVxZxBqb0JGFlxchrb8b8iqYbr2vbdo0Ncd95LG9mQrAzuRIUhU8Zhwsk-yeJUISUS7WWnNXNRJbTNYxGvPVxr8ke_HlSBFJTRQn/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 170px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiodtQ5ldC8YUrzC1NxKGJyDQQZBmKLZKgoXVxZxBqb0JGFlxchrb8b8iqYbr2vbdo0Ncd95LG9mQrAzuRIUhU8Zhwsk-yeJUISUS7WWnNXNRJbTNYxGvPVxr8ke_HlSBFJTRQn/s400/1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5321492525306658130&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Looking around online I see everywhere that the certificate is probably wrong.  I configured the certificate with the FQDN of the OCS server, which looks to be correct, especially when I see the entries above the &lt;strong&gt;check user logon section&lt;/strong&gt;, where it shows it succeeds in connecting to the OCS pool.&lt;br /&gt;&lt;br /&gt;So anyway, I tried recreating a new certificate, this time with the FQDN of the OCS pool instead of the OCS server.  After signing the new certificate with my CA and assigning it to the OCS server, it still &lt;strong&gt;Completes with failures&lt;/strong&gt;.  Only this is very interesting: now my login is successful but I can&#39;t connect to the OCS pool anymore.  Complete opposite of what I had before!&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWci7S015HfyjdetdRs4tJGfGXW_O8-GC0q3CfLDPWeNJFcH0X_109hZgNvPRnGSyZZRA9PJcpS1HyQiOihZUKXaC_Iyr7nRtFlLIKU9EQePonUhnRuK4TCC6mcNlo2Nh16S01/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 145px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWci7S015HfyjdetdRs4tJGfGXW_O8-GC0q3CfLDPWeNJFcH0X_109hZgNvPRnGSyZZRA9PJcpS1HyQiOihZUKXaC_Iyr7nRtFlLIKU9EQePonUhnRuK4TCC6mcNlo2Nh16S01/s400/2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5321492612432405618&quot; /&gt;&lt;/a&gt;&lt;br /&gt;What the f***??!!  Before you start trying: assigning the certificate with the server FDQN to the OCS server and the OCS FQDN to the IIS (or visa versa) does not work either.&lt;br /&gt;&lt;br /&gt;Instead, create a new certificate with these settings:&lt;br /&gt;1. &lt;strong&gt;Subject name:&lt;/strong&gt; FQDN of the OCS pool&lt;br /&gt;2. &lt;strong&gt;Alternate name:&lt;/strong&gt; not that important&lt;br /&gt;3. Remember to check the &lt;strong&gt;Automatically add local machine name to Subject Alt Name&lt;/strong&gt;, that way you create a multi-homed certificate&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyX_g5nCXq8PL57Ia-bUu_jTr2VV2jyCOu5A1sdDJzcR5Ve04bDs8nPbbK2qq6AdszQVcVJ-TXHrWJ7RfkmDAgx6XCdEFToYIrhMICnGfgYaFi24ve1H4hjAqNfocTgwp0DFwH/s1600-h/3.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 355px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyX_g5nCXq8PL57Ia-bUu_jTr2VV2jyCOu5A1sdDJzcR5Ve04bDs8nPbbK2qq6AdszQVcVJ-TXHrWJ7RfkmDAgx6XCdEFToYIrhMICnGfgYaFi24ve1H4hjAqNfocTgwp0DFwH/s400/3.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5321492683879507138&quot; /&gt;&lt;/a&gt;&lt;br /&gt;After assigning this certificate to your OCS server and in the IIS manager, you should be good:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0Upbi6lQRNE7fOnFcr53p66PWtsiqlOTj6bUqACUzRr1j8ocvdXQpMiccKx1qYeeaFEpwLqDMpBng-7QP7AfwUEVVqzKSrfq7gwh0EEYHXCbY8jnRX_e0kSGYQRNtVxkb7Ug7/s1600-h/4.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 167px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0Upbi6lQRNE7fOnFcr53p66PWtsiqlOTj6bUqACUzRr1j8ocvdXQpMiccKx1qYeeaFEpwLqDMpBng-7QP7AfwUEVVqzKSrfq7gwh0EEYHXCbY8jnRX_e0kSGYQRNtVxkb7Ug7/s400/4.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5321492814892635474&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Hope it can help...</description><link>http://krva.blogspot.com/2009/04/ocs-2007-failed-to-send-sip-request.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiodtQ5ldC8YUrzC1NxKGJyDQQZBmKLZKgoXVxZxBqb0JGFlxchrb8b8iqYbr2vbdo0Ncd95LG9mQrAzuRIUhU8Zhwsk-yeJUISUS7WWnNXNRJbTNYxGvPVxr8ke_HlSBFJTRQn/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-3282460729571762944</guid><pubDate>Mon, 06 Apr 2009 07:45:00 +0000</pubDate><atom:updated>2009-04-06T09:50:00.340+02:00</atom:updated><title>OCS 2007 &amp; SQL2005 SP3 – Pool backend discovery failed</title><description>A few weeks ago I was installing an OCS server in a lab environment for the purposes of giving demo’s and testing some stuff out myself.&lt;br /&gt;&lt;br /&gt;However, before I could actually even start I ran into a nice little problem.&lt;br /&gt;First I prepared the AD, as documented by Microsoft, no problem there at all.  Then I launched the &lt;strong&gt;Create Enterprise Pool&lt;/strong&gt; from the &lt;strong&gt;setup.exe&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikGUrB13LsvfsVN-JgCWBDtt0UPoGeYSriG8ZM3hMpb9ZqQbxyVUgc7f7Hgxrw5OiORseEhVA2QVqoa0l1uNbevQe0vXapB-sondLxKGFB7khZqrDJsxS86ieRYSXBBVrS6c6f/s1600-h/3.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 194px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikGUrB13LsvfsVN-JgCWBDtt0UPoGeYSriG8ZM3hMpb9ZqQbxyVUgc7f7Hgxrw5OiORseEhVA2QVqoa0l1uNbevQe0vXapB-sondLxKGFB7khZqrDJsxS86ieRYSXBBVrS6c6f/s400/3.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5321481675145731554&quot; /&gt;&lt;/a&gt;&lt;br /&gt;In the next screen of the simple wizard you need to provide a pool name, after which the FQDN is filled in automatically and the SQL backend.  (if your SQL farm is separated by a firewall, make sure port 1433 is open from the OCS to the SQL)&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKH4o6bM36PkdFvpV_OL7yeFnZ1YQpQMs8iambczg7iTuDyh8O5YHEGVai7UrSAV4xTu39JpEMRDm53t2vtaTItFhQiVSWf6w2F_eUCqr7mUKV7EfnwzUeZUiyuZnjHcszyZZ3/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 309px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKH4o6bM36PkdFvpV_OL7yeFnZ1YQpQMs8iambczg7iTuDyh8O5YHEGVai7UrSAV4xTu39JpEMRDm53t2vtaTItFhQiVSWf6w2F_eUCqr7mUKV7EfnwzUeZUiyuZnjHcszyZZ3/s400/2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5321481768722990962&quot; /&gt;&lt;/a&gt;&lt;br /&gt;That should be that.  Unfortunately for me, I received this error:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGkGc2GrV1YJBoWCgIFR0zmvxJId3b7CHS7WL6_jAH9-_nsMg0gZsNubiG58Q3Pj69KuiqeIq37YbiOB6Nt-CxJ60_KMAPLZiQqlp0_1xeBJ-fqJZD7GBSqCde97xZcuP8L_J3/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 115px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGkGc2GrV1YJBoWCgIFR0zmvxJId3b7CHS7WL6_jAH9-_nsMg0gZsNubiG58Q3Pj69KuiqeIq37YbiOB6Nt-CxJ60_KMAPLZiQqlp0_1xeBJ-fqJZD7GBSqCde97xZcuP8L_J3/s400/1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5321481866153743186&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Since I have a SQL 2005 server, I checked the Service Pack level and made sure it was the latest version (SP3).  The Backward Compatibility pack installed on the OCS is from the same SP level.  No problem there you would say.  But no matter how I tried configuring the OCS pool, it didn’t work.&lt;br /&gt;&lt;br /&gt;I guess not many people have this issue, since I didn’t find much online about it.  But then I stumbled across this article from Microsoft: &lt;a href=&quot;http://support.microsoft.com/default.aspx?scid=kb;en-us;968979&amp;sd=rss&amp;spid=12605&quot;&gt;You cannot create the enterprise pool for Office Communications Server 2007 on a back-end server that has SQL 2005 Service Pack 3 (SP3) installed&lt;/a&gt;&lt;br /&gt;Basically it says the backward compatibility pack from SP3 does NOT work correctly and what you need to do is this:&lt;br /&gt;1. Uninstall the SQL 2005 SP3 Backward compatibility pack&lt;br /&gt;2. Download the correct backward compatibility pack (SQLserver2005_BC.msi) from this link: &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=50b97994-8453-4998-8226-fa42ec403d17&amp;displaylang=en#filelist&quot;&gt;SQLServer2005_BC.msi&lt;/a&gt;&lt;br /&gt;3. Install this new BC pack&lt;br /&gt;&lt;br /&gt;Immediately after that I tried the OCS enterprise pool wizard again (no reboot) and what do you know: it flew straight through!</description><link>http://krva.blogspot.com/2009/04/ocs-2007-sql2005-sp3-pool-backend.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikGUrB13LsvfsVN-JgCWBDtt0UPoGeYSriG8ZM3hMpb9ZqQbxyVUgc7f7Hgxrw5OiORseEhVA2QVqoa0l1uNbevQe0vXapB-sondLxKGFB7khZqrDJsxS86ieRYSXBBVrS6c6f/s72-c/3.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-7699186705122840443</guid><pubDate>Tue, 27 Jan 2009 14:04:00 +0000</pubDate><atom:updated>2009-01-27T15:07:44.506+01:00</atom:updated><title>Replicate Exchange to a DRS (Disaster Recovery Site): Best Practices</title><description>In my last post I’ve gone over some of the considerations you need to keep in mind when choosing a replication setup for Exchange 2007.&lt;br /&gt;&lt;br /&gt;Now there are of course some best practices you can keep in mind when you’ve chosen your setup concerning the replication of Exchange 2007.  Since we are on the subject, and in order to keep a nice overview, I’ve created this post which is a summary of the &lt;a href=&quot;http://technet.microsoft.com/en-us/library/bb124066.aspx&quot;&gt;Microsoft guidelines&lt;/a&gt;.  &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;1. Mandatory Data to replicate&lt;/strong&gt;&lt;br /&gt;a) &lt;strong&gt;edb files&lt;/strong&gt;: messages and MAPI-content&lt;br /&gt;b) &lt;strong&gt;stm files&lt;/strong&gt;: non-MAPI content&lt;br /&gt;c) &lt;strong&gt;log files&lt;/strong&gt;: changes to commit to the database&lt;br /&gt;d) &lt;strong&gt;chk files&lt;/strong&gt;: info on the entries in the log files&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;2. Best Practices for asynchronous replication (replication mechanisms)&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;a) Configure replication at the logical/mount point volume level&lt;/strong&gt;:  if the mailbox data path is G:\MDB1\MDB1.EDB, then drive G should be the base unit to perform replication. As a result, all the data on drive G will be replicated. Setting replication to occur at the file or subdirectory level is prone to human error and is &lt;em&gt;not supported&lt;/em&gt; by Microsoft.&lt;br /&gt;&lt;strong&gt;b) Create many replication points&lt;/strong&gt;: reduce the queuing of multiple I/O’s which are destined for the same replication point&lt;br /&gt;&lt;strong&gt;c) Keep transaction logs on different logical volumes&lt;/strong&gt;: since each write I/O request is queued at the replication point, it is best to split the edb and log files to different logical volumes, to reduce long write response times.&lt;br /&gt;&lt;strong&gt;d) Use multiple replication links&lt;/strong&gt;: expensive, but necessary (although not technically) for availability and load-balancing.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;3. Best Practices for Configuring Exchange For Synchronous Replication&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;a) Create the maximum number of storage groups per Exchange server&lt;/strong&gt;: there will be more parallel log writing processes, which can reduce the overall transaction log-write latency&lt;br /&gt;&lt;strong&gt;b) Increase transaction log buffer size&lt;/strong&gt;: Increasing the log buffer size reduces the frequency of capacity flushes, increases the log write size, and subsequently reduces the overall log write latency.&lt;br /&gt;&lt;br /&gt;That&#39;s about it for this post.  Of course, this is only a short summary and can (should be) supplemented with other articles on this subject.</description><link>http://krva.blogspot.com/2009/01/replicate-exchange-to-drs-disaster_27.html</link><author>noreply@blogger.com (My precious)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-4112970785618457386</guid><pubDate>Tue, 27 Jan 2009 13:00:00 +0000</pubDate><atom:updated>2009-01-27T14:07:32.660+01:00</atom:updated><title>Replicate Exchange to a DRS (Disaster Recovery Site): Design</title><description>Last week, we had a discussion over the design and configuration of an Exchange 2007 server in a DRS.&lt;br /&gt;&lt;br /&gt;Of course, as always, there isn’t one answer that fits all.  There are a few questions you need to answer to get to a solution that fits your needs:&lt;br /&gt;-  How will the data be replicated to the server located in the DRS?&lt;br /&gt;-  How performant is the link between the main site and the DRS?&lt;br /&gt;-  How important is are the e-mails within your company?&lt;br /&gt;-  How much money do you have to spend?&lt;br /&gt;&lt;br /&gt;Let’s go over the questions one by one to come to our solution.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;1. How will the data be replicated to the server located in the DRS?&lt;/strong&gt;&lt;br /&gt;There are 4 different replication menthods:&lt;br /&gt;  &lt;strong&gt;a) Synchronous replication&lt;/strong&gt;: the Exchange host receives a “successful write” response when the operation is complete on the local AND remote locations.&lt;br /&gt;  &lt;em&gt;Advantages&lt;/em&gt;:&lt;br /&gt;    I. guaranteed no data loss (how is that for a sole advantage … )&lt;br /&gt;  &lt;em&gt;Disadvantage&lt;/em&gt;:&lt;br /&gt;    I. reduced performance (site link, link utilization, distance very important since mails have to saved to both local and remote storage)&lt;br /&gt;    II. more expensive than asynchronous replication&lt;br /&gt;    III. need for 3rd party software&lt;br /&gt;  &lt;strong&gt;b) Asynchronous replication&lt;/strong&gt;: the Exchange host writes to the local storage and the data is replicated independently afterwards&lt;br /&gt;  &lt;em&gt;Advantages&lt;/em&gt;:&lt;br /&gt;    I. not as heavy on performance indicators as synchronous replication&lt;br /&gt;    II. cheaper than synchronous replication&lt;br /&gt;    III. native Exchange 2007 technology (LCR, SCR &amp; CCR)&lt;br /&gt;    IV. robust: (in case of a CCR no single failure will lead to a loss of service)&lt;br /&gt;  &lt;em&gt;Disadvantages&lt;/em&gt;:&lt;br /&gt;    I. no guarantee against data loss can be provided&lt;br /&gt;  &lt;strong&gt;c) Host-based replication&lt;/strong&gt;: a filter driver manages the replication (and needs to cut the I/O stream to do this)&lt;br /&gt;  &lt;strong&gt;d) Storage-based replication&lt;/strong&gt;: replication at storage level (more performant than host-based replication)&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;2. How performant is the link between the main site and the DRS?&lt;/strong&gt;&lt;br /&gt;Whether you choose synchronous or asynchronous replication might not just depend on the budget you have to spend, but also on the environment that is already in place.  Be aware that choosing synchronous replication will not only reduce the number of mailboxes per server (up to 75 % reduction in mailboxes/server scalability), the site link is largely impacted as well.&lt;br /&gt;&lt;br /&gt;The tools &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyId=92EB2EDC-3433-47CA-A5F8-0483C7DDEA85&amp;displaylang=en&quot;&gt;LoadSim&lt;/a&gt; and &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyId=94B9810B-670E-433A-B5EF-B47054595E9C&amp;displaylang=en&quot;&gt;JetStress&lt;/a&gt; are developed by Microsoft to test latencies and storage throughput.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;3. How important is are the e-mails within your company?&lt;/strong&gt;&lt;br /&gt;As said above, asynchronous replication cannot guarantee that all data will be retained in case of a “disaster”, while synchronous replication does (providing the site links are operational).  However, Exchange 2007 is designed to lose as little information as possible in case of a failure.  Thanks to the LCR, CCR and SCR technologies, the losses should be minimized to read/unread messages statuses, incomplete contact, calendar entries, …  If this is acceptable for your SLA, they offer a really good solution.  Of course, if databases have to be moved to a new stand-by Exchange server, some downtime will be unavoidable.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;4. How much money do you have to spend?&lt;/strong&gt;&lt;br /&gt;I guess this point is pretty clear.  Choosing between LCR, SCR and CCR have already huge price effects on your budget.  If your SLA requires you to choose for synchronous replication, this price will mount exponentially since third party software will have to be purchased, installed, configured, received training on, …</description><link>http://krva.blogspot.com/2009/01/replicate-exchange-to-drs-disaster.html</link><author>noreply@blogger.com (My precious)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-7323769447080879971</guid><pubDate>Tue, 13 Jan 2009 09:31:00 +0000</pubDate><atom:updated>2009-01-13T10:41:51.290+01:00</atom:updated><title>PowerShell Graphical Help</title><description>PowerShell is cool, isn&#39;t it?  I absolutely love it.&lt;br /&gt;&lt;br /&gt;But there was a downside.  Using the help function within the PowerShell prompt is difficult to read not to mention it can scroll your screen quite a bit.&lt;br /&gt;&lt;br /&gt;So instead of using the help function within PowerShell, the PowerShell guys of Microsoft have created a &lt;strong&gt;Graphical Help File&lt;/strong&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji9tL9XWU4b4FhfXAz-v8X8Lel8dlwwVUXc4NzbsLTCHL8SyNv5w-meETGKntlIis7W4yIA8DlHEIQHp0rQviNNmYX9Vp2uVw-keQhAxqz97e0e1j8sJHfAwkULOLYm4YDoHT4/s1600-h/Powershell.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 209px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji9tL9XWU4b4FhfXAz-v8X8Lel8dlwwVUXc4NzbsLTCHL8SyNv5w-meETGKntlIis7W4yIA8DlHEIQHp0rQviNNmYX9Vp2uVw-keQhAxqz97e0e1j8sJHfAwkULOLYm4YDoHT4/s400/Powershell.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5290709957021883698&quot; /&gt;&lt;/a&gt;&lt;br /&gt;It contains just the same information as the help within PowerShell when using the &lt;em&gt;-detailed&lt;/em&gt; switch, but it comes with some definate advantages:&lt;br /&gt; - fully searchable&lt;br /&gt; - graphical&lt;br /&gt; - seperate window so you can a clear eye on your code&lt;br /&gt;&lt;br /&gt;A must have &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyId=3B3F7CE4-43EA-4A21-90CC-966A7FC6C6E8&amp;displaylang=en&quot;&gt;download&lt;/a&gt;.</description><link>http://krva.blogspot.com/2009/01/powershell-graphical-help.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji9tL9XWU4b4FhfXAz-v8X8Lel8dlwwVUXc4NzbsLTCHL8SyNv5w-meETGKntlIis7W4yIA8DlHEIQHp0rQviNNmYX9Vp2uVw-keQhAxqz97e0e1j8sJHfAwkULOLYm4YDoHT4/s72-c/Powershell.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-5123788038965229922</guid><pubDate>Wed, 17 Dec 2008 09:38:00 +0000</pubDate><atom:updated>2008-12-17T10:42:08.104+01:00</atom:updated><title>“The execution of scripts is disabled on this system” …  How to run your own PowerShell scripts</title><description>So you’re picking up PowerShell scripting, are you?&lt;br /&gt;As a first test, you create a little, never fail “&lt;em&gt;hello world&lt;/em&gt;” script and launch it from within a PowerShell, but instead of seeing “Hello World” you see this:&lt;br /&gt;&lt;strong&gt;File C:\scripts\test.ps1 cannot be loaded because the execution of scripts is disabled on this system. Please see &quot;get-&lt;br /&gt;help about_signing&quot; for more details.&lt;br /&gt;At line:1 char:19&lt;br /&gt;+ c:\scripts\test.ps1 &lt;&lt;&lt;&lt;&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEfgK-oMOeeHcehFk-2llWPC6AMb69zBCJbZMweNELHzN38PX3dGzMS9BtQ89X115SiBON08KFKC3VH_uuBJlNVEoUz2-GnaMow0JvIEYD8H6ZiouHzzgtvq-XGt7ehjKBS82s/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 65px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEfgK-oMOeeHcehFk-2llWPC6AMb69zBCJbZMweNELHzN38PX3dGzMS9BtQ89X115SiBON08KFKC3VH_uuBJlNVEoUz2-GnaMow0JvIEYD8H6ZiouHzzgtvq-XGt7ehjKBS82s/s400/1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5280691434544717906&quot; /&gt;&lt;/a&gt;&lt;br /&gt;What the hell??  Yep, that’s right: by default only digitally signed scripts can be run from within PowerShell.  Luckily, this can be remedied fairly easily.&lt;br /&gt;&lt;br /&gt;If you launch the command &lt;strong&gt;Get-ExecutionPolicy&lt;/strong&gt; you will see that the default policy is set to &lt;em&gt;Restricted&lt;/em&gt;, basically creating your problem.&lt;br /&gt;&lt;br /&gt;Now we can change that value to &lt;em&gt;5 different settings&lt;/em&gt;:&lt;br /&gt;  1.  &lt;strong&gt;Restricted&lt;/strong&gt;: no scripts will be executed&lt;br /&gt;  2.  &lt;strong&gt;Unrestricted&lt;/strong&gt;: all scripts will be executed&lt;br /&gt;  3.  &lt;strong&gt;RemoteSigned&lt;/strong&gt;: all scripts you created yourself will be run, all scripts downloaded from the internet will need to be signed by a trusted publisher&lt;br /&gt;  4.  &lt;strong&gt;AllSigned&lt;/strong&gt;: all scripts, including your own, will need to be signed by a trusted publisher&lt;br /&gt;  5.  &lt;strong&gt;Default&lt;/strong&gt;: = Restricted (unless you change the default value to something else)&lt;br /&gt;&lt;br /&gt;OK, so now that we know that we can change the policy by simply typing &lt;strong&gt;Set-ExecutionPolicy RemoteSigned&lt;/strong&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqo3hyphenhyphenqQNLJg4xQw8PcRoB_3vDukw5Q7c5OvJZ918UNNc7s_OlQ8oQssLKpC-yPgzOICJTsjFtvuX4zQngPcSW-I935JN_Jh2LBN6xbzcrpz8pVO4pD1RN6cYQxISFB9LsuKUC/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 236px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqo3hyphenhyphenqQNLJg4xQw8PcRoB_3vDukw5Q7c5OvJZ918UNNc7s_OlQ8oQssLKpC-yPgzOICJTsjFtvuX4zQngPcSW-I935JN_Jh2LBN6xbzcrpz8pVO4pD1RN6cYQxISFB9LsuKUC/s400/2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5280691721811825346&quot; /&gt;&lt;/a&gt;&lt;br /&gt;And that’s it!  Your scripts can be run.  I’ll be posting soon about how to set up your own “trusted publisher” so that we can secure our PowerShell environment as much as possible.&lt;br /&gt;&lt;br /&gt;Have fun!</description><link>http://krva.blogspot.com/2008/12/execution-of-scripts-is-disabled-on.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEfgK-oMOeeHcehFk-2llWPC6AMb69zBCJbZMweNELHzN38PX3dGzMS9BtQ89X115SiBON08KFKC3VH_uuBJlNVEoUz2-GnaMow0JvIEYD8H6ZiouHzzgtvq-XGt7ehjKBS82s/s72-c/1.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-2202306742368802960</guid><pubDate>Mon, 15 Dec 2008 09:07:00 +0000</pubDate><atom:updated>2008-12-15T10:16:24.236+01:00</atom:updated><title>Infrastructure Planning &amp; Design (IPD)</title><description>This weekend I&#39;ve found a collection of documents on the Microsoft download pages: &lt;a href=&quot;https://www.microsoft.com/downloads/details.aspx?FamilyId=AD3921FB-8224-4681-9064-075FDF042B0C&amp;displaylang=en&quot;&gt;IPD.zip&lt;/a&gt;&lt;br /&gt; &lt;br /&gt;It holds a whole list of documents, defided per technology, in which they go over the design processes:&lt;br /&gt;  -  Windows Server 2008 File Services&lt;br /&gt;  -  Selecting the Right NAP Architecture&lt;br /&gt;  -  Windows Server 2008 Active Directory Domain Services&lt;br /&gt;  -  ...&lt;br /&gt;&lt;br /&gt;The series is a collection of documents that leads the reader through a sequence of core decision points to design an infrastructure for Microsoft products. It also provides a means to validate design decisions with the business to ensure that the solution meets the requirements for both business and infrastructure stakeholders..&lt;br /&gt; &lt;br /&gt;Very interesting reading, for whoever is interested ...</description><link>http://krva.blogspot.com/2008/12/infrastructure-planning-design-ipd.html</link><author>noreply@blogger.com (My precious)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-305622451840332534</guid><pubDate>Fri, 12 Dec 2008 13:33:00 +0000</pubDate><atom:updated>2008-12-16T13:57:32.605+01:00</atom:updated><title>Configuring IPsec NAP (Network Address Protection) - Part 4: Testing with a NAP client</title><description>Now that our NAP has been configured, we can start playing around with a NAP client.&lt;br /&gt;In the following post I’ve logged on with an administrator account on a Vista client that is part of the domain krva.local.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Test 1:&lt;/strong&gt; Log on to the Vista client with an administrator account and open a command screen.  In the cmd box, type &lt;strong&gt;netsh nap client show grouppolicy&lt;/strong&gt;.  You should check for the following:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPbCQmP2xe5QENCH-S-hrmshBFEKbRKLX8J4LFlX1NsYxRegZ6M6UCC_bFWPMPDwy81y6z4bOXfhw4EKIZ2fMkaZm9wGlUHPsjkbTdG2nslvZaqlHhHb6cgdw9GJOvQ6Nhoi8W/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 392px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPbCQmP2xe5QENCH-S-hrmshBFEKbRKLX8J4LFlX1NsYxRegZ6M6UCC_bFWPMPDwy81y6z4bOXfhw4EKIZ2fMkaZm9wGlUHPsjkbTdG2nslvZaqlHhHb6cgdw9GJOvQ6Nhoi8W/s400/1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5278897024574414002&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;Test 2:&lt;/strong&gt; Open a command screen and in the cmd box, type &lt;strong&gt;netsh nap client show state&lt;/strong&gt;.  You should see something like this:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn0l9tgsdEsN-MJG4MWRc9jsl364yArHFcsGv5h6tqUySBGwbCOX93lZvi6oBspKFRWg7hoN3wQbw8aP-kilkFg2yqvBtVGnCQSeEZm405XHkMKtrZyo4C81hj3EyE3MS5HExI/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 395px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn0l9tgsdEsN-MJG4MWRc9jsl364yArHFcsGv5h6tqUySBGwbCOX93lZvi6oBspKFRWg7hoN3wQbw8aP-kilkFg2yqvBtVGnCQSeEZm405XHkMKtrZyo4C81hj3EyE3MS5HExI/s400/2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5278897441599050194&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;Test 3:&lt;/strong&gt; Verify that you have the required certificate, via MMC  Certificates  Local computer.  You should see something like this:&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhido0fZVofV7tx-RYSQ2M-jXbGvkSjyX3TRRKVtvAe6DjeiXd4gKn3_AuCJa5rbK0zO18IwPnl2JE-d2me469ai6inCqpunlpMRyYKuO2fxLAwGgnZiK2bLzV7lW2YS6ksguUG/s1600-h/3.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 147px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhido0fZVofV7tx-RYSQ2M-jXbGvkSjyX3TRRKVtvAe6DjeiXd4gKn3_AuCJa5rbK0zO18IwPnl2JE-d2me469ai6inCqpunlpMRyYKuO2fxLAwGgnZiK2bLzV7lW2YS6ksguUG/s400/3.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5278897643146033298&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;Test 4:&lt;/strong&gt; Verify that the Network Address Protection Agent has been started as a service&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimmW6AEIYAEylu6IUiN1aReKcdqEoM3OJAYerOzISd8uptwmKyXE0zbFNOGOCDF1ecADr7xD7vBGtT3Xm56rYRPoQgdNCFAAGGddAaedGq9k99BrQlmdLcwe_QYfhb2jnuT8F2/s1600-h/4.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 234px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimmW6AEIYAEylu6IUiN1aReKcdqEoM3OJAYerOzISd8uptwmKyXE0zbFNOGOCDF1ecADr7xD7vBGtT3Xm56rYRPoQgdNCFAAGGddAaedGq9k99BrQlmdLcwe_QYfhb2jnuT8F2/s400/4.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5278897752143533586&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;Test 5:&lt;/strong&gt; Turn off your firewall.  You should quickly see a message saying that your machine is not compliant after which the client will be &lt;em&gt;auto-remedied&lt;/em&gt; and the firewall enabled.  If you missed it, you can always request the status via the command &lt;strong&gt;napstat&lt;/strong&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXqfKB3zVHtVwsi8pSzP7C1K__OcOagPftMq3Oi_ZYMfp0o3peeKwgG71SWN777CQDAhJ2DTWhys7bSZImxE3UKZJk2eZiYDT-7OZypwsKc_e8yEH-t23XZY2NdqyOsykgoKks/s1600-h/5.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 348px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXqfKB3zVHtVwsi8pSzP7C1K__OcOagPftMq3Oi_ZYMfp0o3peeKwgG71SWN777CQDAhJ2DTWhys7bSZImxE3UKZJk2eZiYDT-7OZypwsKc_e8yEH-t23XZY2NdqyOsykgoKks/s400/5.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5278897883965031026&quot; /&gt;&lt;/a&gt;&lt;br /&gt;That’s pretty much it for now.&lt;br /&gt;Of course, there are LOTS more things about NAP and possible errors you might encounter during the installation and configuration of it.  Two tools you will definitely need during the troubleshooting of NAP are the &lt;em&gt;NAP server events&lt;/em&gt; and the &lt;em&gt;NAP client events&lt;/em&gt;.&lt;br /&gt;They can be found in the event viewer under &lt;strong&gt;\Custom Views\Server Roles\Network Policy and Access Services&lt;/strong&gt; (for the server) and &lt;strong&gt;\Applications and Services Logs\Microsoft\Windows\Network Access Protection\Operational&lt;/strong&gt; (for the client).&lt;br /&gt;&lt;br /&gt;Everything is correctly configured, but still your NAP clients are not being enforced?  Check this first: are all systems involved activated?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;NAP WILL ONLY FUNCTION IF YOUR SERVERS &amp; CLIENTS ARE ACTIVATED!!&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Enjoy!&lt;br /&gt;&lt;br /&gt;Network Address Protection (NAP) posts:&lt;br /&gt;&lt;a href=&quot;http://krva.blogspot.com/2008/12/ipsec-nap-network-address-protection-in.html&quot;&gt;IPsec NAP: Network Address Protection in Server 2008&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://krva.blogspot.com/2008/12/configuring-ipsec-nap-network-address.html&quot;&gt;Configuring IPsec NAP (Network Address Protection) - Part 1: Certificates&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://krva.blogspot.com/2008/12/configuring-ipsec-nap-network-address_09.html&quot;&gt;Configuring IPsec NAP (Network Address Protection) - Part 2: Installation of the NPS (Network Policy Server)&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://krva.blogspot.com/2008/12/configuring-ipsec-nap-network-address_199.html&quot;&gt;Configuring IPsec NAP (Network Address Protection) - Part 3: Configuring the NPS as NAP HRA (Health Registration Authority)&lt;/a&gt;</description><link>http://krva.blogspot.com/2008/12/configuring-ipsec-nap-network-address_12.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPbCQmP2xe5QENCH-S-hrmshBFEKbRKLX8J4LFlX1NsYxRegZ6M6UCC_bFWPMPDwy81y6z4bOXfhw4EKIZ2fMkaZm9wGlUHPsjkbTdG2nslvZaqlHhHb6cgdw9GJOvQ6Nhoi8W/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36193988.post-4096195482223340470</guid><pubDate>Tue, 09 Dec 2008 12:42:00 +0000</pubDate><atom:updated>2008-12-16T13:51:59.929+01:00</atom:updated><title>Configuring IPsec NAP (Network Address Protection) - Part 3: Configuring the NPS as NAP HRA (Health Registration Authority)</title><description>The bulk of the work is done by now.  Now all that is left to do is configure our newly configured NPS and a NAP Health Policy Server.&lt;br /&gt;&lt;br /&gt;The components of the NPS to configure are: &lt;strong&gt;System Health Validators&lt;/strong&gt;, &lt;strong&gt;Health Policies&lt;/strong&gt;, &lt;strong&gt;Network Policies&lt;/strong&gt;, &lt;strong&gt;Connection Request Policies&lt;/strong&gt;, &lt;strong&gt;RADIUS Clients and Servers&lt;/strong&gt; and &lt;strong&gt;Remediation Server Groups&lt;/strong&gt;, as indicated in the screen shot.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMDedsK3WHpO6EO5h0xVWeDLjxxaxwKLDpFkpeNzDmNYrzWJ0mTZnaGvsGlV_PPlu9NhLk7H0rfrQwqZxT3nOu3riV6s27yJK397Ow86Y8MgmVMlQQI79ATUsHHH0MtYlEUzbd/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 395px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMDedsK3WHpO6EO5h0xVWeDLjxxaxwKLDpFkpeNzDmNYrzWJ0mTZnaGvsGlV_PPlu9NhLk7H0rfrQwqZxT3nOu3riV6s27yJK397Ow86Y8MgmVMlQQI79ATUsHHH0MtYlEUzbd/s400/1.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5277770399989163794&quot; /&gt;&lt;/a&gt;&lt;br /&gt;To configure these components I&#39;m just going to take the easy way and use the &lt;em&gt;configuration wizard&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 1: NAP wizard:&lt;/strong&gt; launch the wizard by clicking on &lt;strong&gt;Configure NAP&lt;/strong&gt; in the details pane of the NPS.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghDzBZ55cA5znbi1L6PoTxNe2TEDhAI7hnytVEMVAQU-s1lxHaIr0dVFZmjez6McqHthsVpkOe1lzt6mqHLJO2zbGWYgwTSPnT-UHy3D_nTqOuW-dGigCi0HXf7euPiqS15f9y/s1600-h/2.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 396px; height: 247px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghDzBZ55cA5znbi1L6PoTxNe2TEDhAI7hnytVEMVAQU-s1lxHaIr0dVFZmjez6McqHthsVpkOe1lzt6mqHLJO2zbGWYgwTSPnT-UHy3D_nTqOuW-dGigCi0HXf7euPiqS15f9y/s400/2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5277770701794454930&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Now in the wizard, choose the following uptions:&lt;br /&gt;a) select &lt;strong&gt;IPsec with Health Registration Authority (HRA)&lt;/strong&gt; and give it a name&lt;br /&gt;b) no &lt;strong&gt;Radius clients &lt;/strong&gt;are being added, since the HRA is installed on the NAP Health Policy Server&lt;br /&gt;c) we are going to apply to policy to all users, so we don&#39;t need to add any &lt;strong&gt;machine groups&lt;/strong&gt;&lt;br /&gt;d) make sure the &lt;strong&gt;Windows Security Health Validator &lt;/strong&gt;and Enable &lt;strong&gt;auto-remediation of client computers &lt;/strong&gt;are selected&lt;br /&gt;e) &lt;strong&gt;Finish &lt;/strong&gt;the wizard&lt;br /&gt;&lt;br /&gt;St&lt;strong&gt;ep 2: Configure the SHV (System Health Validators)&lt;/strong&gt;: By default, the WSHV is configured to require firewall, virus protection, spyware protection, and automatic updating.  You can easily change this in the &lt;strong&gt;Properties &lt;/strong&gt;of the SHV.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2uE-hFNGkugMOahyphenhyphenj8aOvM_tCgsrOfwIVwJRVIeREJnDgkPSMaL9b9Bs7x0DsM0LMRVNYYsaGDkVtDgh4vBEsdsu0Sbo8bl9KzeuKTgC3W5I8g4LROgDcPZdZfnso8B3EJgRT/s1600-h/3.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 292px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2uE-hFNGkugMOahyphenhyphenj8aOvM_tCgsrOfwIVwJRVIeREJnDgkPSMaL9b9Bs7x0DsM0LMRVNYYsaGDkVtDgh4vBEsdsu0Sbo8bl9KzeuKTgC3W5I8g4LROgDcPZdZfnso8B3EJgRT/s400/3.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5277771078953508866&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;Step 3: Configure a GPO for the NAP client settings:&lt;/strong&gt; now we can start enforcing specific client computers to apply to our NAP.  To do this, create a new GPO and define the following settings:&lt;br /&gt;a) &lt;strong&gt;Computer Configuration/Policies/Windows Settings/Security Settings/System Services/Network Access Protection Agent&lt;/strong&gt; --&gt; Define the policy: &lt;strong&gt;Automatic&lt;/strong&gt;&lt;br /&gt;b) &lt;strong&gt;Computer Configuration/Policies/Windows Settings/Security Settings/Network Access Protection/NAP Client Configuration/Enforcement Clients&lt;/strong&gt; --&gt; Enable &lt;strong&gt;IPsec Relying Party&lt;/strong&gt;&lt;br /&gt;c) &lt;strong&gt;Computer Configuration/Policies/Windows Settings/Security Settings/Network Access Protection/NAP Client Configuration/Health Registration Settings/Trusted Server Groups&lt;/strong&gt; --&gt; &lt;strong&gt;New &lt;/strong&gt;&quot;&lt;em&gt;Trusted HRA Servers&lt;/em&gt;&quot; --&gt; &lt;strong&gt;Add URL&lt;/strong&gt; &quot;&lt;em&gt;Https://NPS.Test.local/domainhra/hcsrvext.dll&lt;/em&gt;&quot;  --&gt; Finish&lt;br /&gt;d) &lt;strong&gt;Computer Configuration/Policies/Windows Settings/Security Settings/Network Access Protection/NAP Client Configuration&lt;/strong&gt; --&gt; right click and choose &lt;strong&gt;Apply&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpvqzVS_02amgpk-qindxj53f02r12zhKr9xrG6lkXn2upnHuj5Dpp12FQ5GBFSksK7mVrv7DG08YqtXGb7Hqljbi3aqFs4_TVvAsJ3peIabRySUY28iADQNR36GCn2oAS3r8Z/s1600-h/4.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 265px; height: 192px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpvqzVS_02amgpk-qindxj53f02r12zhKr9xrG6lkXn2upnHuj5Dpp12FQ5GBFSksK7mVrv7DG08YqtXGb7Hqljbi3aqFs4_TVvAsJ3peIabRySUY28iADQNR36GCn2oAS3r8Z/s400/4.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5277771493960011394&quot; /&gt;&lt;/a&gt;&lt;br /&gt;e) &lt;strong&gt;Computer Configuration\Policies\Administrative Templates\Windows Components\Security Center&lt;/strong&gt; --&gt; Enable &lt;strong&gt;Turn on Security Center (Domain PCs only)&lt;/strong&gt;&lt;br /&gt;f) close the GPO editor&lt;br /&gt;g) go to the &lt;strong&gt;Security Filtering&lt;/strong&gt; of the GPO and &lt;strong&gt;Remove &lt;/strong&gt;the &lt;strong&gt;Authenticated Users &lt;/strong&gt;and &lt;strong&gt;Add &lt;/strong&gt;the security group created earlier.  In my case, that would be &lt;em&gt;GS_NAP_ClientPCs&lt;/em&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAW8HnEJQg66_iIAAfHDOfS_OPmD9QBla2yuhiMXjUn-cLxPdy0kobeUKXGy20pjG43zTQ1B1GUmpP7RUqOS0zTtw8gh-6ITWiU_iAvIWOSTaSQ2q7fWyberDKKcFmY-4-FH4u/s1600-h/5.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 347px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAW8HnEJQg66_iIAAfHDOfS_OPmD9QBla2yuhiMXjUn-cLxPdy0kobeUKXGy20pjG43zTQ1B1GUmpP7RUqOS0zTtw8gh-6ITWiU_iAvIWOSTaSQ2q7fWyberDKKcFmY-4-FH4u/s400/5.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5277771741204853986&quot; /&gt;&lt;/a&gt;&lt;br /&gt;And there you have it, IPsec NAP is installed, configured and ready to be used.  In my last post about IPsec NAP I&#39;ll be using a Vista client to try and connect to the secure network section as an example.&lt;br /&gt;&lt;br /&gt;Network Address Protection (NAP) posts:&lt;br /&gt;&lt;a href=&quot;http://krva.blogspot.com/2008/12/ipsec-nap-network-address-protection-in.html&quot;&gt;IPsec NAP: Network Address Protection in Server 2008&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://krva.blogspot.com/2008/12/configuring-ipsec-nap-network-address.html&quot;&gt;Configuring IPsec NAP (Network Address Protection) - Part 1: Certificates&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://krva.blogspot.com/2008/12/configuring-ipsec-nap-network-address_09.html&quot;&gt;Configuring IPsec NAP (Network Address Protection) - Part 2: Installation of the NPS (Network Policy Server)&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://krva.blogspot.com/2008/12/configuring-ipsec-nap-network-address_12.html&quot;&gt;Configuring IPsec NAP (Network Address Protection) - Part 4: Testing with a NAP client&lt;/a&gt;</description><link>http://krva.blogspot.com/2008/12/configuring-ipsec-nap-network-address_199.html</link><author>noreply@blogger.com (My precious)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMDedsK3WHpO6EO5h0xVWeDLjxxaxwKLDpFkpeNzDmNYrzWJ0mTZnaGvsGlV_PPlu9NhLk7H0rfrQwqZxT3nOu3riV6s27yJK397Ow86Y8MgmVMlQQI79ATUsHHH0MtYlEUzbd/s72-c/1.jpg" height="72" width="72"/><thr:total>1</thr:total></item></channel></rss>