<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:georss='http://www.georss.org/georss' xmlns:thr='http://purl.org/syndication/thread/1.0' version='2.0'><channel><atom:id>tag:blogger.com,1999:blog-2990214442674016926</atom:id><lastBuildDate>Mon, 28 Feb 2011 18:35:32 +0000</lastBuildDate><title>SwackNet</title><description>Spreading Information, Making Things Grow</description><link>http://swackyourself.blogspot.com/</link><managingEditor>noreply@blogger.com (Swack)</managingEditor><generator>Blogger</generator><openSearch:totalResults>22</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-7202814744873517388</guid><pubDate>Mon, 28 Feb 2011 18:35:00 +0000</pubDate><atom:updated>2011-02-28T10:35:32.108-08:00</atom:updated><title>Scripting On-Demand Network Changes with Solarwinds Orion NCM</title><description>Getting called at 2am is never fun, even if you are the Network On-Call person. &amp;nbsp;Any chance I can &amp;nbsp;prevent a call like that, I'll take it! In this case, there's a "failover pair" of servers, one in each data center (DC). Each server has a locally unique admin/replication IP addresses on one interface that is always active and a second interface that shares the same IP address as the server in the other DC. Whichever server is active enables the &amp;nbsp;highly-available (HA) interface while the other server's HA interface is disabled. We can then make network changes to routers and switches to "switch" the server from one DC to the other. And instead of my having to manually make those changes at 2am, we can script the changes with a configuration management tool. Our tool of choice is &lt;a href="http://www.solarwinds.com/products/orion/configuration_manager/"&gt;Solarwinds Orion Network Configuration Manager (NCM)&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;In this particular use of NCM, there are 5 individual NCM jobs, one for each device that must be touched. The changes include enabling/disabling switch ports and adding/removing route advertisements in EIGRP and BGP. &amp;nbsp;Assume the names of the 5 jobs are AutoJob1a, AutoJob2a, ..., AutoJob5a. In addition, there are 5 jobs for the reverse direction named AutoJob1b, AutoJob2b, ..., AutoJob5b. &amp;nbsp;Each of these jobs has an NCM Job ID associated with it seen under the "Job ID" column when viewing Scheduled Jobs from the NCM GUI. &lt;br /&gt;&lt;br /&gt;At this point, we've saved ourselves from having to individually login to each of the devices to make the required changes. But we can take it a step further by combining all the jobs and launching them from a Windows Batch (.bat) file. &amp;nbsp;On the NCM server we created the file d:\RemoteJobs\AutoJob-A.bat which contains these 5 lines, one per NCM job:&lt;br /&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;"D:\Program Files\SolarWinds\Configuration Management\configmgmtjob.exe" "D:\Program Files\SolarWinds\Configuration Management\Jobs\Job-318696.ConfigMgmtJob"&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;"D:\Program Files\SolarWinds\Configuration Management\configmgmtjob.exe" "D:\Program Files\SolarWinds\Configuration Management\Jobs\Job-631858.ConfigMgmtJob"&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;"D:\Program Files\SolarWinds\Configuration Management\configmgmtjob.exe" "D:\Program Files\SolarWinds\Configuration Management\Jobs\Job-713828.ConfigMgmtJob"&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;"D:\Program Files\SolarWinds\Configuration Management\configmgmtjob.exe" "D:\Program Files\SolarWinds\Configuration Management\Jobs\Job-272305.ConfigMgmtJob"&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;"D:\Program Files\SolarWinds\Configuration Management\configmgmtjob.exe" "D:\Program Files\SolarWinds\Configuration Management\Jobs\Job-777458.ConfigMgmtJob"&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Note that the Job ID for each job shows up in the name of the .ConfigMgmtJob file that is called in each line of the .bat file.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;At this point, any monkey with a login to the NCM server could just double-click on the .bat file to kick off those five NCM jobs. &amp;nbsp;But there's a better way, at least in our environment: &lt;a href="http://www.tidalsoftware.com/products/enterpriseJobScheduling.aspx"&gt;Tidal Scheduler&lt;/a&gt;. &amp;nbsp;With a Tidal agent on the NCM server, Tidal can be configured to launch d:\RemoteJobs\AutoJob-A.bat or the reverse d:\RemoteJobs\AutoJob-B.bat on-demand by the Operator-On-Duty. &amp;nbsp;This allows the event to be properly audited and standardizes the action required by the Operator. &amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In addition, we can configure each NCM job such that it generates an e-mail notification when it completes, so when all 5 have completed we get 5 e-mails that show exactly what commands were entered and the corresponding output from the router/switch that was modified. The e-mail can be sent to the Network team as well as the Operations team so they have a better understanding of success than simply a "completed job" message from Tidal.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In the end, instead of getting a wake-up call at 2am, the server admin team can now simply call the Operator-On-Duty and ask them to run NCM Job "AutoJob-A" or "AutoJob-B". They then use a simple traceroute to determine if the network "thinks" the server is in DC A or DC B.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Ahh, now I can go back to sleep.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz.&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-7202814744873517388?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2011/02/scripting-on-demand-network-changes.html</link><author>noreply@blogger.com (Swack)</author><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-7867701049298828089</guid><pubDate>Thu, 24 Feb 2011 02:06:00 +0000</pubDate><atom:updated>2011-02-23T18:06:33.589-08:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>Data Center</category><category domain='http://www.blogger.com/atom/ns#'>Juniper</category><category domain='http://www.blogger.com/atom/ns#'>QFabric</category><title>Juniper Launches QFabric To Compete In The Data Center</title><description>In case you missed it, Juniper held an official launch event at 12N Central time (US) today for their new QFabric platform. What intrigued me the most was the maximum end-to-end delay of 5 microseconds. Here are a couple links that show the &lt;a href="http://www.junipertalk.com/qfabric-comes-life-275/"&gt;marketing pump-up-the-adrenaline type of advertisement they led the event with&lt;/a&gt;, as well as &lt;a href="http://www.junipertalk.com/qfabric-architecture-demo-276/"&gt;a 2:24 video with a brief explanation of the QFabric architecture&lt;/a&gt;. &amp;nbsp;Also, here's an &lt;a href="http://www.flickr.com/photos/junipernetworks/5470442318/"&gt;Infographic: The 7 Defining Characteristics of QFabric&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Based on what I know of the Brocade VCS/VCX platform, this sounds similar in many ways. But I'm certainly not a Brocade expert!&lt;br /&gt;&lt;br /&gt;Did you watch the launch event? What was your take on it?&lt;br /&gt;&lt;br /&gt;Here are some screenshots I took of the more technical slides (which I think most engineers agree are more interesting than the marketing hype).&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://4.bp.blogspot.com/-HMnNs9VrkXM/TWW6lVxvBVI/AAAAAAAAB6E/jtnmb_QFpNw/s1600/Image.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://4.bp.blogspot.com/-HMnNs9VrkXM/TWW6lVxvBVI/AAAAAAAAB6E/jtnmb_QFpNw/s1600/Image.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-7867701049298828089?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2011/02/juniper-launches-qfabric-to-compete-in.html</link><author>noreply@blogger.com (Swack)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/-HMnNs9VrkXM/TWW6lVxvBVI/AAAAAAAAB6E/jtnmb_QFpNw/s72-c/Image.png' height='72' width='72'/><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-3245053895152472126</guid><pubDate>Thu, 17 Feb 2011 16:22:00 +0000</pubDate><atom:updated>2011-02-17T08:22:34.253-08:00</atom:updated><title>Life Without Caffeine</title><description>Title catch your attention? I thought so. Try to imagine it for a minute. I've been living it. Well, not quite, but I've been living on a limited caffeine intake since January 1 2011 as part of my 100-day challenge. Before Jan 1, I would drink 6-8 Diet Cokes per day. Since then, just 1. What's worth giving up so much caffeine for, you ask? This:&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/-PpVKl7m_rDg/TV1KiODkAYI/AAAAAAAAB6A/Ovvnjb2_eJ4/s1600/apple-ipad_1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="http://2.bp.blogspot.com/-PpVKl7m_rDg/TV1KiODkAYI/AAAAAAAAB6A/Ovvnjb2_eJ4/s320/apple-ipad_1.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;The Apple iPad. Better yet, by the time my 100-day challenge is done on April 10 (but who's counting), there should be an iPad 2 available.&lt;br /&gt;&lt;br /&gt;In this world of self-indulgence it's very rewarding, albeit quite challenging, to replace instant self-gratification with self-denial. It makes the prize that much sweeter in the end.&lt;br /&gt;&lt;br /&gt;What will you give up for 100 days, and what will your reward be? Join me in the challenge!&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-3245053895152472126?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2011/02/life-without-caffeine.html</link><author>noreply@blogger.com (Swack)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/-PpVKl7m_rDg/TV1KiODkAYI/AAAAAAAAB6A/Ovvnjb2_eJ4/s72-c/apple-ipad_1.jpg' height='72' width='72'/><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-3188765704421659299</guid><pubDate>Fri, 04 Feb 2011 17:59:00 +0000</pubDate><atom:updated>2011-02-04T09:59:32.448-08:00</atom:updated><title>Splunk Field Extraction and Report for Cisco AnyConnect VPN Failures</title><description>&lt;span style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; border-collapse: separate; color: black; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;At the peak of Snowmageddon and Icemageddon this week our remote-access VPN resources were getting some major exercise. &amp;nbsp;Our office was even closed for a day, something that doesn't happen often. &amp;nbsp;Our 100 simultaneous AnyConnect SSL VPN licenses on our Cisco ASA were being used up by 9am 3 days in a row, preventing many people from getting connected. &amp;nbsp;I've mentioned in a&amp;nbsp;&lt;a href="http://swackyourself.blogspot.com/2011/01/snowmageddon-vs-corporate-network.html"&gt;previous post&lt;/a&gt;&amp;nbsp;about our secondary process, where we have users download and install the IPSEC VPN client. But for those that know the products, that's not as convenient as AnyConnect.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;After the fact I was discussing options for increasing our remote access VPN capacity, all of which require money. &amp;nbsp;To justify the cost to the money holders, it's always useful to have data to back you up. &amp;nbsp;So we started asking questions:&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;How many people had problems connecting to the VPN?&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;How many times were individual users failing to connect due to our license limit?&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt; After&amp;nbsp;&lt;a href="http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logsevp.html"&gt;some digging&lt;/a&gt;&amp;nbsp;I was able to find the perfect ASA log entry: &lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;%ASA-4-716023: Group name User user Session could not be established: session limit of maximum_sessions reached.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;In our case it looks more like this:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; %ASA-4-716023: Group &amp;lt;SSLVPNUsers&amp;gt;&amp;nbsp;&lt;sslvpnusers&gt;User&amp;nbsp;&lt;/sslvpnusers&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&amp;lt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;swackhap&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&amp;gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&amp;nbsp;&lt;swackhap&gt; IP&amp;nbsp;&lt;/swackhap&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&amp;lt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;24.107.10.23&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&amp;gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&amp;nbsp;Session could not be established: session limit of 100 reached.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;With our Splunk log analysis tool we were able to dig even deeper to analyze the data and get some good statistics to justify our request for added VPN capacity. Within Splunk, I first ran a search for the above log entry:&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/_DAM3_Mvsia8/TUwv1eUJ0JI/AAAAAAAAB4k/3cczbgh31M8/s1600/Image+%255B2%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="302" src="http://3.bp.blogspot.com/_DAM3_Mvsia8/TUwv1eUJ0JI/AAAAAAAAB4k/3cczbgh31M8/s400/Image+%255B2%255D.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;So in this case you can see we had 1071 occurrences of that log entry. &amp;nbsp;But how many people were affected?&amp;nbsp;Splunk normally does a great job extracting fields of data it considers to be useful. But in our case we want to extract the actual userIDs, such as ea900503 and nbf shown above, and Splunk hasn't done it for us.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;To extract a new field in Splunk, simply click on the small gray box with the downward facing triangle to the left of the event, then select "Extract Fields" as shown below.&lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/_DAM3_Mvsia8/TUwv3CQgjSI/AAAAAAAAB4o/bUDl3a-rjPs/s1600/Image+%255B3%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="303" src="http://2.bp.blogspot.com/_DAM3_Mvsia8/TUwv3CQgjSI/AAAAAAAAB4o/bUDl3a-rjPs/s400/Image+%255B3%255D.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;In the "Example values" box I typed the two sample userIDs and clicked Generate, but in this particular case Splunk failed to generate a regex. So, I was forced to come up with one on my own. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/_DAM3_Mvsia8/TUwv3fWZMII/AAAAAAAAB4s/bQ-cMoRcAow/s1600/Image+%255B4%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="303" src="http://2.bp.blogspot.com/_DAM3_Mvsia8/TUwv3fWZMII/AAAAAAAAB4s/bQ-cMoRcAow/s400/Image+%255B4%255D.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;After messing around with a free tool called&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;a href="http://gskinner.com/RegExr/desktop/"&gt;RegExr&lt;/a&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;, and after much wailing and gnashing of teeth, I was able to come up with a regular expression to extract the proper field:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; border-collapse: separate; color: black; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; border-collapse: separate; color: black; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial;"&gt;(?:Group &amp;lt;SSLVPNUsers&amp;gt; User &amp;lt;)(?P&amp;lt;AnyConnectUser&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial;"&gt;&amp;gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial;"&gt;[^&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial;"&gt;&amp;gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Arial;"&gt;]*)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; border-collapse: separate; color: black; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; border-collapse: separate; color: black; font-size: small; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;In Splunk, I clicked the gray Edit button and entered my own regex, then saved the new field extraction. &amp;nbsp;Now we're able to see "AnyConnectUser" as an interesting field on the left side of the search screen. (You may have noticed it in earlier screenshots, since I had already created the field extraction before writing this blog post.)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://4.bp.blogspot.com/_DAM3_Mvsia8/TUwv3q5dQEI/AAAAAAAAB4w/o3V-6HTmOFY/s1600/Image+%255B5%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="303" src="http://4.bp.blogspot.com/_DAM3_Mvsia8/TUwv3q5dQEI/AAAAAAAAB4w/o3V-6HTmOFY/s400/Image+%255B5%255D.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;Clicking on the "AnyConnectUser" field shows a list of the top 10 hits, including the number of occurrences for each. &amp;nbsp;(Note that I've obfuscated many of the usernames for security). But at this point we still don't know how many users had problems connecting (we just know it's more than 100). &amp;nbsp;So we use some more Splunk magic--generate a report based on the search.&lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/_DAM3_Mvsia8/TUwwovM4z7I/AAAAAAAAB5M/V5ZHIJnSSR8/s1600/Image+%255B5%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="303" src="http://1.bp.blogspot.com/_DAM3_Mvsia8/TUwwovM4z7I/AAAAAAAAB5M/V5ZHIJnSSR8/s400/Image+%255B5%255D.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;Clicking on "top values overall" brings up the report generation wizard.&lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/_DAM3_Mvsia8/TUwv4Dq3CrI/AAAAAAAAB44/VMy2uqK7YXg/s1600/Image+%255B7%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="295" src="http://3.bp.blogspot.com/_DAM3_Mvsia8/TUwv4Dq3CrI/AAAAAAAAB44/VMy2uqK7YXg/s400/Image+%255B7%255D.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;After creating and saving the report, we can now get to it anytime from the main Search screen under the "Searches &amp;amp; Reports" drop-down menu:&lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/_DAM3_Mvsia8/TUwv4RBHcTI/AAAAAAAAB48/JbhmoMiRH4U/s1600/Image+%255B8%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="303" src="http://2.bp.blogspot.com/_DAM3_Mvsia8/TUwv4RBHcTI/AAAAAAAAB48/JbhmoMiRH4U/s400/Image+%255B8%255D.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;Here's the finished product:&lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://4.bp.blogspot.com/_DAM3_Mvsia8/TUwv4kPcZSI/AAAAAAAAB5A/yNko5tee-vI/s1600/Image+%255B9%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="303" src="http://4.bp.blogspot.com/_DAM3_Mvsia8/TUwv4kPcZSI/AAAAAAAAB5A/yNko5tee-vI/s400/Image+%255B9%255D.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;After scrolling down we can see a table of the raw data:&lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/_DAM3_Mvsia8/TUwv4_gSFMI/AAAAAAAAB5E/2c-4kcCPLHo/s1600/Image+%255B10%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="303" src="http://2.bp.blogspot.com/_DAM3_Mvsia8/TUwv4_gSFMI/AAAAAAAAB5E/2c-4kcCPLHo/s400/Image+%255B10%255D.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;We can then go to the last page of the table, scroll to the bottom, and see the total number of users that had at least one failure connecting to the VPN:&lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/_DAM3_Mvsia8/TUwv5A6f6dI/AAAAAAAAB5I/4KKaJOKlvBw/s1600/Image+%255B11%255D.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="303" src="http://1.bp.blogspot.com/_DAM3_Mvsia8/TUwv5A6f6dI/AAAAAAAAB5I/4KKaJOKlvBw/s400/Image+%255B11%255D.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;We had 194 users experience VPN connection problems due to our existing license limit.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"&gt;Hit me up on Twitter (&lt;a href="http://twitter.com/swackhap"&gt;@swackhap&lt;/a&gt;) if you have questions or ideas on how to do this better. &amp;nbsp;Or leave a comment below. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-3188765704421659299?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2011/02/splunk-field-extraction-and-report-for.html</link><author>noreply@blogger.com (Swack)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/_DAM3_Mvsia8/TUwv1eUJ0JI/AAAAAAAAB4k/3cczbgh31M8/s72-c/Image+%255B2%255D.png' height='72' width='72'/><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-7943892155315747740</guid><pubDate>Thu, 20 Jan 2011 20:55:00 +0000</pubDate><atom:updated>2011-01-25T07:53:06.384-08:00</atom:updated><title>Snowmageddon vs. The Corporate Network</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/_DAM3_Mvsia8/TTibQ3IrrmI/AAAAAAAAB3c/1fZZHWm-Oms/s1600/Snowmaggedon+2011.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="http://2.bp.blogspot.com/_DAM3_Mvsia8/TTibQ3IrrmI/AAAAAAAAB3c/1fZZHWm-Oms/s320/Snowmaggedon+2011.jpg" width="238" /&gt;&lt;/a&gt;&lt;/div&gt;A major winter storm can make for some very interesting statistics. Let's look at the primary firewall for Company XYZ, also used for remote access VPN. &amp;nbsp;We've got a failover pair of Cisco ASA5510s licensed for 100 simultaneous AnyConnect WebVPN connections as well as 750 IPSEC VPN connections. Our "road warriors" are set up with the IPSEC VPN on their laptops, but folks who work from home using their own personal computers usually come in using the AnyConnect WebVPN (SSL-based).&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;You can see from the &lt;i&gt;IPSEC VPN Connections&lt;/i&gt;&amp;nbsp;chart below&amp;nbsp;that we apparently have about 80-100 "road warriors" that just keep their home computers connected all the time (based on the lowest number of connections each day). &amp;nbsp;Over the last week we've peaked around 160-180 except for today, which has taken us up close to 200. One of the reasons for this is because of the next chart.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;a href="http://2.bp.blogspot.com/_DAM3_Mvsia8/TT7xF4MbpUI/AAAAAAAAB3w/SEqa4P-JefQ/s1600/IPSEC+VPN+Connections+BLOG.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="247" src="http://2.bp.blogspot.com/_DAM3_Mvsia8/TT7xF4MbpUI/AAAAAAAAB3w/SEqa4P-JefQ/s400/IPSEC+VPN+Connections+BLOG.png" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;The&lt;i&gt; WebVPN Connections&lt;/i&gt; chart below shows on most days we have up to 30 connections at our peak times. Since the sky opened up and dumped snow on us overnight, you can see that we've more than maxed out our connection limit for WebVPN. &amp;nbsp;For days like this, our WebVPN page has a message that says something like "If there is inclement weather today and you are having problems connecting, there may be too many other people trying to connect at the same time. &amp;nbsp;You may connect using a different method, by downloading an alternate VPN client using the appropriate link below." Then there are links for 3 .zip files: Windows XP/2000, Windows Vista/Win7, and Macintosh. &amp;nbsp;Each zip file contains the Cisco IPSEC VPN client EXE as well as two PCF files that provide limited-access profiles for the IPSEC VPN. &amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Unfortunately, there doesn't seem to be any nice error message that says "no more connections available" to indicate a user is running into a connection limit. Is there some way to do that I don't know about?&lt;br /&gt;&lt;br /&gt;&lt;a href="http://2.bp.blogspot.com/_DAM3_Mvsia8/TT7xfS2crVI/AAAAAAAAB30/2v4UYIeJq8g/s1600/WebVPN+Connections+BLOG.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="247" src="http://2.bp.blogspot.com/_DAM3_Mvsia8/TT7xfS2crVI/AAAAAAAAB30/2v4UYIeJq8g/s400/WebVPN+Connections+BLOG.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The chart that got all this analysis started this morning also generated an e-mail telling my team the ASA VPN appliance was running high on CPU. &amp;nbsp;(Well, the chart didn't generate the e-mail--the network monitoring system did.) &amp;nbsp;Take a look at the following &lt;i&gt;Average CPU Load &lt;/i&gt;and you'll see we're running about 80% today vs. a typical day at or below 60%. &lt;br /&gt;&lt;br /&gt;&lt;a href="http://3.bp.blogspot.com/_DAM3_Mvsia8/TT7xqiwOhaI/AAAAAAAAB34/3a9yQLSFQZg/s1600/Average+CPU+Load+BLOG.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="247" src="http://3.bp.blogspot.com/_DAM3_Mvsia8/TT7xqiwOhaI/AAAAAAAAB34/3a9yQLSFQZg/s400/Average+CPU+Load+BLOG.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The next chart shows the bandwidth impact all this VPN traffic has on our DS3 circuit. The green line shows uplink to the Internet and is peaking close to the 45Mbps mark today. I wonder how many of those users are RDP'd to their desktops and the screensaver has kicked in, causing high bandwidth utilization. *sigh*&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="http://3.bp.blogspot.com/_DAM3_Mvsia8/TTiZmYe3xYI/AAAAAAAAB3Y/d8WSTSmAMnw/s1600/DS3+Router+1.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="247" src="http://3.bp.blogspot.com/_DAM3_Mvsia8/TTiZmYe3xYI/AAAAAAAAB3Y/d8WSTSmAMnw/s400/DS3+Router+1.bmp" style="cursor: move;" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In case you're wondering, all these graphs were pulled from Solarwinds Orion Network Performance Monitor (NPM). In particular, the first two charts showing connection numbers utilize Orion's Universal Device Poller (UnDP) funtionality. There wasn't any built-in way I could find to measure what I wanted, so I found ideas on Thwack.com (Solarwinds' user community site) to use SNMP polling via UnDP to get those numbers.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;So who's winning the battle...Snowmaggedon or The Corporate Network? &amp;nbsp;You decide! &amp;nbsp;Let me know on Twitter (&lt;a href="http://twitter.com/swackhap"&gt;@swackhap&lt;/a&gt;) or in the comments below.&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-7943892155315747740?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2011/01/snowmageddon-vs-corporate-network.html</link><author>noreply@blogger.com (Swack)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/_DAM3_Mvsia8/TTibQ3IrrmI/AAAAAAAAB3c/1fZZHWm-Oms/s72-c/Snowmaggedon+2011.jpg' height='72' width='72'/><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-7552542485222356888</guid><pubDate>Tue, 18 Jan 2011 15:08:00 +0000</pubDate><atom:updated>2011-01-18T07:19:55.918-08:00</atom:updated><title>RSA SecurID Soft Token for iPhone - A Better Deployment Method</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/_DAM3_Mvsia8/TTWvIiizpOI/AAAAAAAAB3U/SQc1_9efMgk/s1600/iPhone+RSA+App.PNG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="http://3.bp.blogspot.com/_DAM3_Mvsia8/TTWvIiizpOI/AAAAAAAAB3U/SQc1_9efMgk/s200/iPhone+RSA+App.PNG" width="133" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;Working in a retail environment makes you think really hard about security, especially in light of &lt;a href="http://news.cnet.com/T.J.-Maxx-hack-exposes-consumer-data/2100-1029_3-6151017.html"&gt;what happened with TJ Maxx&lt;/a&gt;&amp;nbsp;a few years ago. &amp;nbsp;Using credit cards in retail is a privilege that we only get to keep if we follow the Payment Card Industry Data Security Standard (PCI DSS). One of the requirements of PCI is related to two-factor authentication for remote-access to your corporate network, and one solution for this is RSA's SecurID authentication product.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;RSA SecurID supports many form factors, both hardware fobs/cards and software-based on PCs and mobile devices. This post focuses on mobile device soft tokens, particularly iPhones. &lt;br /&gt;&lt;br /&gt;For quite some time, the process to get a soft token on an iPhone looked something like this:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;User downloads RSA app from App Store&lt;/li&gt;&lt;li&gt;Administrator log in to RSA SecurID appliance and assign soft token to user&lt;/li&gt;&lt;li&gt;Generate CT-KIP credentials for web download, e-mail special link to user&lt;/li&gt;&lt;li&gt;Connect user's iPhone to internal corporate network&lt;/li&gt;&lt;li&gt;Have user open e-mail on the native iPhone app and tap the link&lt;/li&gt;&lt;li&gt;iPhone communicates directly with RSA appliance&lt;/li&gt;&lt;li&gt;Token is now present on iPhone&lt;/li&gt;&lt;/ol&gt;&lt;div&gt;Step 4 is required because of the way RSA has locked down its current appliance. The only way for an iPhone to connect to the RSA appliance from outside the corporate firewall would be to somehow expose the appliance itself to the Internet, either directly or through a Microsoft ISA proxy server. &amp;nbsp;This is one of my big gripes about the appliance, but it's a great solution for the most part.&lt;br /&gt;&lt;br /&gt;The most recent update to RSA's iPhone app has greatly improved the token deployment process. Now the process looks like this:&lt;/div&gt;&lt;div&gt;&lt;ol&gt;&lt;li&gt;User downloads RSA app from App Store (no change)&lt;/li&gt;&lt;li&gt;Administrator log in to RSA SecurID appliance and assign soft token to user (no change)&lt;/li&gt;&lt;li&gt;Issue token file (.sdtid) and save to desktop&lt;/li&gt;&lt;li&gt;Use RSA-provided TokenConverter.exe on command line to convert .sdtid file to a long string of characters, then e-mail that to user&lt;/li&gt;&lt;li&gt;Have user open e-mail on the native iPhone app and tap the link (no change)&lt;/li&gt;&lt;li&gt;Token is now present on iPhone&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div&gt;The new method precludes the requirement for the iPhone to communicate directly with the appliance, which is a huge improvement. The TokenConverter.exe is &lt;a href="http://www.rsa.com/node.aspx?id=2521"&gt;available for download from RSA's website&lt;/a&gt;&amp;nbsp;for both Windows and Linux, and also works with Android and Windows Mobile, though I'm not sure if it works yet for Windows Phone 7. Of course, the same token deployment process I've described above works for any iOS device (iPod Touch, iPad).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Kudos to RSA for improving the token deployment process! Comment below or look for me on &lt;a href="http://twitter.com/swackhap"&gt;Twitter &lt;/a&gt;(@swackhap).&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-7552542485222356888?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2011/01/rsa-securid-soft-token-for-iphone.html</link><author>noreply@blogger.com (Swack)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/_DAM3_Mvsia8/TTWvIiizpOI/AAAAAAAAB3U/SQc1_9efMgk/s72-c/iPhone+RSA+App.PNG' height='72' width='72'/><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-3288849731343267522</guid><pubDate>Tue, 14 Dec 2010 21:29:00 +0000</pubDate><atom:updated>2010-12-14T13:29:55.144-08:00</atom:updated><title>Switch Flooding 101 - Troubleshooting Case Study</title><description>Remember the first time you learned the basics of bridging? Dig deep in your memory and think back to the basics. With helpful verification from my co-workers and Aaron Conaway (on Twitter as @aconaway), I verified that some "crazy" behavior I saw today on our network was, in fact, "normal," albeit undesired.&lt;br /&gt;&lt;br /&gt;I've been troubleshooting some very strange behaviors on our network lately. I suspect some (all?) of them have to do with our fairly old Cisco Catalyst 6500s with Sup2's and Sup1a's in our data center, as well as the dinosaur Catalyst 2948 access switches in our closets. There are times when our monitoring system throws alerts saying it can't ping certain devices. But minutes later, things return to normal. (Don't you just love intermittent problems?) &amp;nbsp;One tool that any good network engineer will consider when dealing with such a problem is a packet capture product such as the ever-popular Wireshark.&lt;br /&gt;&lt;br /&gt;When I fired up Wireshark on my desktop computer, I had to filter through the muck to see what was going on. By "muck" I'm referring to the traffic I don't care about, such as the traffic my box is generating, as well as broadcast and multicast. I slowly added more and more exceptions to my capture filter (see below) to narrow the scope of my capt&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;ure.&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; border-collapse: separate; color: black; font-size: small; font-style: normal; font-variant: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: inherit;"&gt;&lt;u&gt;&lt;b&gt;My Wireshark Capture Filter:&lt;/b&gt;&lt;/u&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;not host [my IP address] and not host [directed broadcast for my subnet] and not broadcast and not host 239.255.255.250 and not host 224.0.0.2 and not host 224.0.0.251 and not host 230.0.0.4 and not host 224.1.0.38 and not ether proto 0x0806 [for CDP] and not ether host 01:00:0c:cc:cc:cc [for HSRP] and not host 224.0.0.252 and not host 228.7.6.9 and not host 224.0.1.60 and not host 224.0.0.1 and not host 224.0.0.252 and not stp and not host 224.0.0.13 and not host 224.0.0.22&lt;br /&gt;&lt;br /&gt;Once I filtered out enough to see more clearly, I noticed a TON of syslog (UDP 514) traffic destined for another host on my subnet. After scratching my head and consulting with co-workers, I started looking at the mac-address tables (or CAM tables). My upstream switch didn't have a CAM table entry for the mac address of the syslog server. Neither did it's upstream switch. In fact, the Cat 6500 directly connect to the syslog server didn't have a CAM table entry for it.&lt;br /&gt;&lt;br /&gt;Checking the timeouts for the CAM table on one of the CatOS switches gave us this:&lt;br /&gt;CatOS-Switch&amp;gt; (enable) sh cam agingtime&lt;br /&gt;&lt;br /&gt;VLAN &amp;nbsp; &amp;nbsp;1 aging time = 300 sec&lt;br /&gt;VLAN &amp;nbsp; &amp;nbsp;2 aging time = 300 sec&lt;br /&gt;VLAN &amp;nbsp; &amp;nbsp;9 aging time = 300 sec&lt;br /&gt;VLAN &amp;nbsp; 17 aging time = 300 sec&lt;br /&gt;VLAN &amp;nbsp; 18 aging time = 300 sec&lt;br /&gt;VLAN &amp;nbsp; 20 aging time = 300 sec&lt;br /&gt;VLAN &amp;nbsp; 21 aging time = 300 sec&lt;br /&gt;VLAN &amp;nbsp; 25 aging time = 300 sec&lt;br /&gt;&lt;div&gt;[snip]&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Similarly, the Cat6500 running Native IOS showed this:&lt;/div&gt;&lt;div&gt;NativeIOS-Switch#sh mac-address-table aging-time&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Vlan &amp;nbsp; &amp;nbsp;Aging Time&lt;/div&gt;&lt;div&gt;---- &amp;nbsp; &amp;nbsp;----------&lt;/div&gt;&lt;div&gt;Global &amp;nbsp;300&lt;/div&gt;&lt;div&gt;no vlan age other than global age configured&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Apparently, this syslog server is so quiet, so stealthy, that it doesn't transmit ANY traffic for more than 5 minutes (300 sec) at a time. After 5 minutes, the CAM table entries timeout, and all traffic destined for that server gets flooded to every port in the VLAN throughout our trunked network.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;One way to prevent the flooding would be to put static CAM table entries in all the affected switches. Perhaps an easier solution is to configure the syslog server to generate some traffic at least every 5 minutes or less.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;I'm not sure if the flooding is causing the other strange behaviors we're seeing on our network, but this has been a good learning experience and reminder for me about the basics of Layer-2 networking.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Any other troubleshooting ideas you would use for a situation like this? Comment here and/or hit me up on Twitter (@swackhap).&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-3288849731343267522?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/12/switch-flooding-101-troubleshooting.html</link><author>noreply@blogger.com (Swack)</author><thr:total>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-6401442352982817321</guid><pubDate>Fri, 03 Dec 2010 17:07:00 +0000</pubDate><atom:updated>2010-12-03T09:07:33.513-08:00</atom:updated><title>Splunk "host" Field Enhancement For Syslog-ng</title><description>&lt;div class="MsoNormal"&gt;We are very fortunate where I work to have &lt;a href="http://www.splunk.com/"&gt;Splunk&lt;/a&gt;. It's an incredibly powerful indexing tool that can "eat all your IT data" and report on it in many different ways. We mostly use it to do simple searches for troubleshooting, but we're always building more expertise as time permits.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;Splunk is set up to index syslog messages very nicely by default. It takes each syslog message and intelligently recognizes the date/time stamp, then "extracts" all the fields and names them things like "host", "eventtype", "event_desc", "error_code", "log_level", and so on. &amp;nbsp;This post focuses on the "host" field, which is the IP address of the end device (router, switch, firewall, etc).&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;In our environment, we send all our syslogs to a Linux server running a free open-source tool called&lt;b&gt;&lt;a href="http://en.wikipedia.org/wiki/Syslog-ng"&gt; syslog-ng&lt;/a&gt;&lt;/b&gt;. With it, we do two things: (1) save a copy of each syslog message on the local server in a flat text file named for the source IP address where it came from, and (2) forward a copy to our Splunk indexing server using TCP port 9998.&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;For a while I’ve noticed that our Splunk lists all syslog messages with a “host” field that is the IP of the syslog-ng server.&amp;nbsp;I was able to do some research this morning and “fixed” this so now all the syslog-ng forwarded messages have their host field set to the source IP address of their original sending device (router/switch/firewall).&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;u&gt;Here’s how I did it:&lt;/u&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;1. Created props.conf file in /san/splunk/etc/system/local with the following contents&lt;br /&gt;[source::tcp:9998]&lt;/div&gt;&lt;div class="MsoNormal"&gt;TRANSFORMS = syslog-header-stripper-ts-host syslog-host&lt;/div&gt;&lt;div class="MsoNormal" style="margin-left: 0.5in;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;2. Then restarted splunk with this command:&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;i&gt;service splunk restart&lt;/i&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;u&gt;Information sources I used:&lt;/u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://answers.splunk.com/questions/5694/central-syslog-ng-server-extra-headers-and-field-extraction"&gt;http://answers.splunk.com/questions/5694/central-syslog-ng-server-extra-headers-and-field-extraction&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;a href="http://www.splunk.com/base/Documentation/4.1.6/Admin/Propsconf#props.conf.spec"&gt;http://www.splunk.com/base/Documentation/4.1.6/Admin/Propsconf#props.conf.spec&lt;/a&gt;&lt;u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/u&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="MsoNormal"&gt;Happy Splunking!&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-6401442352982817321?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/12/splunk-host-field-enhancement-for.html</link><author>noreply@blogger.com (Swack)</author><thr:total>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-5395245982309271149</guid><pubDate>Thu, 11 Nov 2010 21:55:00 +0000</pubDate><atom:updated>2010-11-11T13:55:39.354-08:00</atom:updated><title>Solarwinds Orion Network Performance Monitor Bug</title><description>I am *scary* good at finding bugs in software. Just ask the Cisco TAC. Or in today's case, ask Solarwinds support. This is a &lt;a href="http://thwack.com/forums/48/orion-family/9/network-performance-monitor/28193/npm-1000-sp1-bug-alert-acti/#118327"&gt;duplicate posting&lt;/a&gt; that I've also added to Solarwinds' Thwack.com user community site. If you use Orion NPM and send SNMP traps to another network management tool, READ AND HEED.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Thwack Post Title: NPM 10.0.0 SP1 Bug: Alert Action To Send SNMP Traps Actually BROADCASTS On Local Network&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;&lt;/i&gt;Many thanks to Mariusz from the Support team for helping me pin this  down. I wanted to share with all since this might be happening under  your nose!&lt;br /&gt;&lt;br /&gt;We have Orion NPM 10.0.0 SP1 and have the "Alert me when a node goes down" alert configured with&lt;b&gt; two trigger actions&lt;/b&gt;:&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Log Alert to NetPerfMon Event Log&lt;/li&gt;&lt;li&gt;Send SNMP Trap to two hosts (Microsoft Operations Manager and Orion NCM).&lt;/li&gt;&lt;/ol&gt;A DBA told me earlier today that he noticed a server was receiving  traps from our Orion poller. He noticed this in that server's Event  Viewer Application Log.&lt;br /&gt;&lt;br /&gt;With help from Mariusz and Wireshark, we found that the Orion NPM &lt;b&gt;poller was actually broadcasting SNMP traps to 255.255.255.255&lt;/b&gt;! It seems that the workaround is to create a different trigger action for each SNMP Trap destination.&amp;nbsp; In other words, &lt;b&gt;we changed our trigger actions to this&lt;/b&gt;:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Log Alert to NetPerfMon Event Log&lt;/li&gt;&lt;li&gt;Send SNMP Trap to Microsoft Operations Manage&lt;/li&gt;&lt;li&gt;Send SNMP Trap to Orion NCM&lt;/li&gt;&lt;/ol&gt;As a matter of fact, for each additional valid IP destination we  added to the trigger action, it appears that the Orion poller actually &lt;b&gt;generated duplicate broadcasts&lt;/b&gt; for each SNMP trap.&lt;br /&gt;&lt;br /&gt;If you use this feature of Orion, I recommend you &lt;b&gt;check your settings&lt;/b&gt; and maybe run Wireshark on your poller to be sure you're not spewing broadcasts out to your entire server subnet.&lt;br /&gt;&lt;br /&gt;Mariusz is filing this as a bug, and I'm not sure what all versions  of Orion are impacted. Feel free to add your comments to this thread.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://thwack.com/forums/48/orion-family/9/network-performance-monitor/28193/npm-1000-sp1-bug-alert-acti/#118327"&gt;http://thwack.com/forums/48/orion-family/9/network-performance-monitor/28193/npm-1000-sp1-bug-alert-acti/#118327&lt;/a&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-5395245982309271149?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/11/solarwinds-orion-network-performance.html</link><author>noreply@blogger.com (Swack)</author><thr:total>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-2328253736512979752</guid><pubDate>Fri, 15 Oct 2010 15:02:00 +0000</pubDate><atom:updated>2010-10-15T08:02:05.840-07:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>VPN</category><category domain='http://www.blogger.com/atom/ns#'>Splunk</category><category domain='http://www.blogger.com/atom/ns#'>IPSEC</category><category domain='http://www.blogger.com/atom/ns#'>Firewall</category><category domain='http://www.blogger.com/atom/ns#'>ASA</category><title>The Case of the Mysterious Disappearing VPN</title><description>Many of us in the networking world use IPSEC VPNs over the Internet. The ISP connection is, or at least can be, cheaper than alternatives like MPLS, and of course we all need to connect our networks to the Internet (unless you're the DoD, CIA, or some other secretive organization with a classified network). This mystery begins with a VPN outage.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Refer to the reference network shown below. &amp;nbsp;For these two sites, the primary connectivity is the IPSEC VPN over the Internet. The MPLS VPN is a secondary connection.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/_DAM3_Mvsia8/TLhqrX26F7I/AAAAAAAABGo/ONH_s4J7zy0/s1600/BlogPostMysteryVPNReferenceDiagram.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="300" src="http://3.bp.blogspot.com/_DAM3_Mvsia8/TLhqrX26F7I/AAAAAAAABGo/ONH_s4J7zy0/s400/BlogPostMysteryVPNReferenceDiagram.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;u&gt;&lt;b&gt;Problem: IPSEC VPN Down&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;At 2:44am CT the primary 10Mbps IPSEC VPN went down, but the 3Mbps MPLS worked flawlessly after route reconvergence. &amp;nbsp;As the day progressed, the level of traffic between the two sites increased and began causing performance problems for users at Site B.&lt;br /&gt;&lt;br /&gt;As we continued to troubleshoot what had happened, we found this syslog entry in Splunk that came from FW A:&lt;br /&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;Oct&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;14&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;02&lt;/em&gt;:&lt;em class="t"&gt;44&lt;/em&gt;&lt;/em&gt;:&lt;em class="t"&gt;33&lt;/em&gt;&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; fw.fw.fw&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t a"&gt;&lt;em class="t"&gt;.&lt;em class="t"&gt;21&lt;/em&gt;&lt;/em&gt;&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;Oct&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;14&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;2010&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;02&lt;/em&gt;:&lt;em class="t"&gt;44&lt;/em&gt;&lt;/em&gt;:&lt;em class="t"&gt;33&lt;/em&gt;&lt;/em&gt;:&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;%&lt;em class="t"&gt;ASA&lt;/em&gt;&lt;/em&gt;-&lt;em class="t"&gt;4&lt;/em&gt;&lt;/em&gt;-&lt;em class="t"&gt;106023&lt;/em&gt;&lt;/em&gt;:&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;Deny&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;protocol&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;47&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;src&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;inside&lt;/em&gt;:a.a.a&lt;/em&gt;&lt;/em&gt;&lt;/em&gt;.&lt;em class="t"&gt;1&lt;/em&gt;&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;dst&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;outside&lt;/em&gt;:b.b.b.254&lt;/em&gt;&lt;/em&gt;&lt;/em&gt;&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;by&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; &lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;access&lt;/em&gt;-&lt;em class="t"&gt;group&lt;/em&gt;&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt; "&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;&lt;em class="t"&gt;inside&lt;/em&gt;_&lt;em class="t"&gt;access&lt;/em&gt;&lt;/em&gt;_&lt;em class="t"&gt;in&lt;/em&gt;&lt;/em&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: monospace; white-space: pre;"&gt;"&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;(Note: IP addresses have been changed here for security reasons.)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Nobody had made any changes at 2:44am. So what changed? After digging some more into our change management system, we found this change to FW A that was made back on 9/23:&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="direction: ltr;"&gt;&lt;table border="1" cellpadding="0" cellspacing="0" style="border-collapse: collapse; border-color: #A3A3A3; border-style: solid; border-width: 1pt; direction: ltr;" valign="top"&gt;&lt;tbody&gt;&lt;tr&gt;   &lt;td style="border-color: #A3A3A3; border-style: solid; border-width: 1pt; padding: 4pt 4pt 4pt 4pt; vertical-align: top; width: 3.9368in;"&gt;&lt;div style="color: black; font-family: Arial; font-size: 8.0pt; margin: 0in;"&gt;&lt;span style="font-weight: bold;"&gt;BEFORE&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style="border-color: #A3A3A3; border-style: solid; border-width: 1pt; padding: 4pt 4pt 4pt 4pt; vertical-align: top; width: 4.0701in;"&gt;&lt;div style="color: black; font-family: Arial; font-size: 8.0pt; margin: 0in;"&gt;&lt;span style="font-weight: bold;"&gt;AFTER&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;&lt;tr&gt;   &lt;td style="border-color: #A3A3A3; border-style: solid; border-width: 1pt; padding: 4pt 4pt 4pt 4pt; vertical-align: top; width: 3.9368in;"&gt;&lt;div style="color: black; font-family: Arial; font-size: 8.0pt; margin: 0in;"&gt;Last   Month - 9/23/2010 12:00:18 AM&lt;/div&gt;&lt;/td&gt;   &lt;td style="border-color: #A3A3A3; border-style: solid; border-width: 1pt; padding: 4pt 4pt 4pt 4pt; vertical-align: top; width: 4.0701in;"&gt;&lt;div style="color: black; font-family: Arial; font-size: 8.0pt; margin: 0in;"&gt;ADDS 0,   DELETES 0, CHANGES 1&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;&lt;tr&gt;   &lt;td style="border-color: #A3A3A3; border-style: solid; border-width: 1pt; padding: 4pt 4pt 4pt 4pt; vertical-align: top; width: 3.9368in;"&gt;&lt;div style="color: black; font-family: Arial; font-size: 8.0pt; margin: 0in;"&gt;access-list   inside_access_in extended permit gre host a.a.a.1 host b.b.b.254&lt;/div&gt;&lt;/td&gt;   &lt;td style="border-color: #A3A3A3; border-style: solid; border-width: 1pt; padding: 4pt 4pt 4pt 4pt; vertical-align: top; width: 4.0701in;"&gt;&lt;div style="color: black; font-family: Arial; font-size: 8.0pt; margin: 0in;"&gt;access-list   inside_access_in extended permit gre host a.a.a.254 host b.b.b.254&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This change was logged during a nightly config backup/compare, thus the Midnight time listing. It turns out that day we added another VPN that connects from another site (we'll call it Site C) back to Site A. &amp;nbsp;For that VPN, we chose to use a.a.a.254 as the GRE endpoint on RTR A. We prefer to use .1 addresses to manage routers, and with .1 as a GRE endpoint we can't ping it. &amp;nbsp;Unfortunately, we didn't realize the other VPN to Site B was active. &amp;nbsp;Apparently, the IPSEC security association (SA) remained active, as did the stateful firewall connection in FW A, until 2:44am CT. &amp;nbsp;So we ask ourselves again: What changed at that time?&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;u&gt;&lt;b&gt;Splunk to the Rescue&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;&lt;div&gt;Diving more into the logs that we index with Splunk, we found visually when the problem started--it's where the histogram suddenly goes from 17 events per hour to over 1500.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://4.bp.blogspot.com/_DAM3_Mvsia8/TLhfyrmmfNI/AAAAAAAABGc/43mRxr7DQLA/s1600/Splunk1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="105" src="http://4.bp.blogspot.com/_DAM3_Mvsia8/TLhfyrmmfNI/AAAAAAAABGc/43mRxr7DQLA/s640/Splunk1.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;Clicking on the 2AM timeframe brings up many iterations of the "Deny protocol 47" message that was shown above. Immediately prior to that stream of messages we see these three events:&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;Oct 14 02:44:26 fw.fw.fw.21 Oct 14 2010 02:44:26: %ASA-3-713123: Group = [FW B InternetIP], IP =&amp;nbsp;&lt;span class="Apple-style-span" style="font-family: 'Times New Roman'; font-style: normal;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;[FW B InternetIP]&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;, IKE lost contact with remote peer, deleting connection (keepalive type: DPD)&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;Oct 14 02:44:26&amp;nbsp;&lt;span class="Apple-style-span" style="font-family: 'Times New Roman'; font-style: normal;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;fw.fw.fw&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;.21 Oct 14 2010 02:44:26: %ASA-5-713259: Group =&amp;nbsp;&lt;span class="Apple-style-span" style="font-family: 'Times New Roman'; font-style: normal;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;[FW B InternetIP]&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;, IP =&amp;nbsp;&lt;span class="Apple-style-span" style="font-family: 'Times New Roman'; font-style: normal;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;[FW B InternetIP]&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;, Session is being torn down. Reason: Lost Service&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;Oct 14 02:44:26&amp;nbsp;&lt;span class="Apple-style-span" style="font-family: 'Times New Roman'; font-style: normal;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;fw.fw.fw&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;.21 Oct 14 2010 02:44:26: %ASA-4-113019: Group =&amp;nbsp;&lt;span class="Apple-style-span" style="font-family: 'Times New Roman'; font-style: normal;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;[FW B InternetIP]&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;, Username =&amp;nbsp;&lt;span class="Apple-style-span" style="font-family: 'Times New Roman'; font-style: normal;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;[FW B InternetIP]&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;, IP =&amp;nbsp;&lt;span class="Apple-style-span" style="font-family: 'Times New Roman'; font-style: normal;"&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;[FW B InternetIP]&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;, Session disconnected. Session Type: IPsec, Duration: 21d 15h:00m:15s, Bytes xmt: 181785169, Bytes rcv: 3049561298, Reason: Lost Service&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;Correct me if I'm wrong, but it appears there may have been some connectivity problem on the Internet that happened just long enough for dead-peer-detection (DPD) to take effect and tear down the existing session. When that happened, a new IPSEC SA was created, still using the GRE endpoint of a.a.a.1. Since the firewall was previously changed to allow a.a.a.254 instead of a.a.a.1, this traffic got denied on the inside interface of FW A and prevented the GRE tunnel from coming up.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;To fix, we added a rule to FW A allowing GRE from a.a.a.1 to b.b.b.254.&lt;br /&gt;&lt;br /&gt;Mystery solved!&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-2328253736512979752?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/10/case-of-mysterious-disappearing-vpn.html</link><author>noreply@blogger.com (Swack)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/_DAM3_Mvsia8/TLhqrX26F7I/AAAAAAAABGo/ONH_s4J7zy0/s72-c/BlogPostMysteryVPNReferenceDiagram.jpg' height='72' width='72'/><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-5488949179341003863</guid><pubDate>Thu, 14 Oct 2010 15:52:00 +0000</pubDate><atom:updated>2010-10-14T08:52:31.334-07:00</atom:updated><title>Contacts Consolidation</title><description>I don't know about you, but I have contacts everywhere. I've got Exchange with Outlook at work, Google Contacts (to go along with Gmail and Google Voice), Facebook, Twitter, and Linked In. &amp;nbsp;There may be others but I spent about 30 minutes and pulled together all my current contacts from all these sources last night. Here's how I did it:&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Outlook&lt;/u&gt;&lt;/b&gt;: Exported all contacts as a CSV file. Cleaned it up and imported into Google Contacts.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Facebook&lt;/u&gt;&lt;/b&gt;: I found a post that explained how to use a Yahoo account to import Facebook contacts. I then exported as a CSV and, again, imported into Google Contacts.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Linked In&lt;/u&gt;&lt;/b&gt;: Under the Contacts listing, there's an easy-to-use "Export Connections" link. Exported to CSV and, you guessed it, imported into Google Contacts.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Twitter&lt;/u&gt;&lt;/b&gt;: Found a nice service called MyTweeple.com that has a handy tool to export all contacts to a CSV file. Imported into Google Contacts.&lt;/li&gt;&lt;/ol&gt;&lt;div&gt;By now you see a pattern developing. &amp;nbsp;Since I use Gmail and Google Voice so heavily, Google Contacts is a natural repository for all my contacts. &amp;nbsp;It also allowed me to import custom column fields, like "TwitterName", so I have all my tweeps listed in my Google Contacts with their "twittername" as a Note attached to their details.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Another great thing about Google Contacts is that it is great at finding and merging duplicate contacts. As you might guess, there are many people that I follow on multiple social networks, so merging duplicates is a must for me.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;How do you keep your contacts organized?&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Find me on Twitter at @swackhap.&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-5488949179341003863?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/10/contacts-consolidation.html</link><author>noreply@blogger.com (Swack)</author><thr:total>2</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-474567698778458956</guid><pubDate>Tue, 12 Oct 2010 14:37:00 +0000</pubDate><atom:updated>2010-10-12T07:40:54.689-07:00</atom:updated><title>Who Said Catholics Don't Have A Sense Of Humor?</title><description>&lt;span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: 13px; "&gt;&lt;div&gt;&lt;p class="MsoNormal" align="center" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; text-align: center; "&gt;&lt;strong&gt;&lt;span&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;CATHOLIC GOLF&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div style="margin-top: 5pt; margin-bottom: 5pt; "&gt;&lt;p class="MsoNormal" align="center" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; text-align: center; "&gt;&lt;em&gt;&lt;b&gt;&lt;u&gt;&lt;span&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;Catholic or not you have to laugh at this one.&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/em&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt; &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt; &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;span&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;img width="200" height="225" src="https://mail.google.com/mail/u/0/?ui=2&amp;amp;ik=b50676a7d1&amp;amp;view=att&amp;amp;th=12ba0ba7d641c9e4&amp;amp;attid=0.1&amp;amp;disp=emb&amp;amp;zw" /&gt;                              &lt;wbr&gt;                              &lt;wbr&gt;                  &lt;img width="200" height="224" src="https://mail.google.com/mail/u/0/?ui=2&amp;amp;ik=b50676a7d1&amp;amp;view=att&amp;amp;th=12ba0ba7d641c9e4&amp;amp;attid=0.2&amp;amp;disp=emb&amp;amp;zw" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;span&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;table border="0" cellspacing="0" cellpadding="0"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td valign="top" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0in; padding-right: 0in; padding-bottom: 0in; padding-left: 0in; "&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;table border="0" cellspacing="0" cellpadding="0" width="100%" style="width: 735px; "&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td width="100%" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; width: 731px; padding-top: 1.5pt; padding-right: 1.5pt; padding-bottom: 1.5pt; padding-left: 1.5pt; "&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;table border="0" cellpadding="0"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td width="100%" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; width: 727px; padding-top: 0in; padding-right: 0in; padding-bottom: 0in; padding-left: 0in; "&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div style="margin-bottom: 12pt; "&gt;&lt;div style="margin-top: 5pt; margin-bottom: 5pt; "&gt;&lt;div&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;A Catholic priest and a nun were taking a &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;rare afternoon off and enjoying a round &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;of golf.&lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;The priest stepped up to the first tee and &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;took a mighty swing.  He missed the ball &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;entirely and said "Shit, I missed." &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;The good Sister told him to watch his&lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt; language. &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;On his next swing, he missed again. &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;"Shit, I missed." &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;"Father, I'm not going to play with you &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;if you keep swearing,"  the nun said tartly.. &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;The priest promised to do better and &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;the round continued. &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;On the 4th tee, he misses again. The&lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt; usual comment followed. &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sister is really mad now and says, "Father &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;John, God is going to strike you dead if you &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;keep swearing like that." &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;On the next tee, Father John swings and &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;misses again.   "Shit, I missed." &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;A terrible rumble is heard and a gigantic &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;bolt of lightning comes out of the sky and &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;strikes Sister Marie dead in her tracks.. &lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;b&gt;&lt;span&gt;&lt;strong&gt; read on&lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;&lt;div&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt; &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p class="MsoNormal" align="center" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; text-align: center; "&gt; &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div align="center"&gt;&lt;table border="0" cellspacing="0" cellpadding="0"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td valign="top" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0in; padding-right: 0in; padding-bottom: 0in; padding-left: 0in; "&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;table border="0" cellspacing="0" cellpadding="0" width="100%" style="width: 8px; "&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td width="100%" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; width: 4px; padding-top: 1.5pt; padding-right: 1.5pt; padding-bottom: 1.5pt; padding-left: 1.5pt; "&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt; &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt; &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;p class="MsoNormal" align="center" style="text-align: left;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;strong&gt;&lt;span&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;And from the sky comes a booming voice ......&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="margin-top: 5pt; margin-bottom: 12pt; "&gt;&lt;div&gt;&lt;p class="MsoNormal" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt; &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="margin-bottom: 12pt; "&gt;&lt;p class="MsoNormal" align="center" style="text-align: left;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;span&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;&lt;img width="201" height="231" src="https://mail.google.com/mail/u/0/?ui=2&amp;amp;ik=b50676a7d1&amp;amp;view=att&amp;amp;th=12ba0ba7d641c9e4&amp;amp;attid=0.3&amp;amp;disp=emb&amp;amp;zw" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;table border="0" cellspacing="0" cellpadding="0" style="text-align: left;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td valign="top" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font-family: arial, sans-serif; padding-top: 0in; padding-right: 0in; padding-bottom: 0in; padding-left: 0in; "&gt;&lt;div&gt;&lt;table border="0" cellspacing="0" cellpadding="0" width="100%" style="text-align: left;width: 459px; "&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td width="100%" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font-family: arial, sans-serif; width: 455px; padding-top: 1.5pt; padding-right: 1.5pt; padding-bottom: 1.5pt; padding-left: 1.5pt; "&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;table border="0" cellpadding="0" style="text-align: left;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td width="100%" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font-family: arial, sans-serif; width: 451px; padding-top: 0in; padding-right: 0in; padding-bottom: 0in; padding-left: 0in; "&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div style="margin-top: 5pt; margin-bottom: 5pt; "&gt;&lt;p class="MsoNormal" align="center" style="text-align: left;margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "&gt;&lt;strong&gt;&lt;span style="font-size: 18pt; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-size: medium;"&gt;"Shit, I missed."&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-474567698778458956?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/10/who-said-catholics-dont-have-sense-of.html</link><author>noreply@blogger.com (Swack)</author><thr:total>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-1206305357906443687</guid><pubDate>Mon, 27 Sep 2010 14:47:00 +0000</pubDate><atom:updated>2010-09-27T10:51:46.554-07:00</atom:updated><title>Google Is Great For More Than Just Searching</title><description>I've recently been discovering (or in some cases re-discovering) some of the awesome free stuff that Google has to offer.  My Google Dashboard lights up like a Christmas tree now that I'm using so many of their tools.  Here are a few that I've started (re)using lately.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Gmail - After looking at the web-based interface on and off for a while, I decided to take the leap.  My primary e-mail address, which uses my own domain (swackhammer.net) automatically forwards all e-mail to my Gmail account.  Advantages I love include speed, ability to quickly search all e-mails for what I need, and integration with all my contacts.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Google Voice - I give out one number to everyone, then can customize what phone will ring and when based on who is calling me. Annoying call from recruiter or telemarketer? Just tell Google Voice to send them to voicemail. Or better yet, play a message that indicates your number is no longer in service. :-) And when you do get a voicemail, you can read a transcript of it via SMS or in your e-mail so you don't even have to listen to it. (Although some people's accents make for some very interesting transcripts.)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Google Contacts - Integration with Gmail and Google Voice--all your important contacts in one place, all easily reachable from any web browser.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Google Reader - RSS (Really Simple Syndication) feed-reader allows me to sign up for all the news and blogs I care about and read them at my leisure.  I also use the NewsRack app on my iPhone which syncs with Google Reader. Any article I read on my iPhone gets marked as "read" so I won't waste time reading it a second time if I'm using Google Reader in a web browser.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Blogger - I've heard many people say they like WordPress better, but until I need features that WordPress offers, this works great for me.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;Best of all, these services are FREE. I know, I know--you may be one of those people that hate Google and don't want them tracking your every move. I'm aware of my online footprint, and as a techie I fully understand that if someone really wants to find out more about me, they will anyway. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;How do you use Google? What non-Google services do you love in place of these and why?&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-1206305357906443687?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/09/google-is-great-for-more-than-just.html</link><author>noreply@blogger.com (Swack)</author><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-2044781470945601592</guid><pubDate>Fri, 24 Sep 2010 14:20:00 +0000</pubDate><atom:updated>2010-09-24T07:31:03.007-07:00</atom:updated><title>Don't Drink and Drive; DO Geekout and Drive</title><description>I've been listening to Pandora on my iPhone while driving to and from work for weeks now, and I love it. I am very musically oriented.  But I've saturated myself with awesome music for now. I wanted something different to occupy my time in the car. So I started searching for some interesting technical podcasts to listen to.  Here's some great ones that I found:&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Packet Pushers Podcast (&lt;a href="http://packetpushers.net/"&gt;http://packetpushers.net/&lt;/a&gt;) - Roundtable of network engineers talking about the week's happenings in the networking industry&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Tech News Today (&lt;a href="http://twit.tv/tnt"&gt;http://twit.tv/tnt&lt;/a&gt;) - Amusing daily look at technology news from different sources, quite professionally done&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;vChat (&lt;a href="http://www.vmwarevideos.com/vchat"&gt;http://www.vmwarevideos.com/vchat&lt;/a&gt;) - Fantastic discussions about VMWare&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Wireless LAN Professionals (&lt;a href="http://wirelesslanprofessionals.com/category/podcasts/wlw/"&gt;http://wirelesslanprofessionals.com/category/podcasts/wlw/&lt;/a&gt;) - Helps me keep up with wireless technology in the enterprise&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;What other podcasts do you recommend? Tell me on Twitter @swackhap!&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-2044781470945601592?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/09/dont-drink-and-drive-do-geekout-and.html</link><author>noreply@blogger.com (Swack)</author><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-5259923377698708630</guid><pubDate>Tue, 17 Aug 2010 22:57:00 +0000</pubDate><atom:updated>2010-08-17T15:57:12.364-07:00</atom:updated><title>A rancher hired an architect, an engineer, and a mathematician to design the largest animal pen possible using only a limited number of fence segments.</title><description>The architect arranged all the fence pieces in a perfect square. "Making all sides equal in length maximizes the space," he explained to the farmer, who looked on with interest.&lt;br /&gt;Next, the engineer took the fence pieces and arranged them in a large circle. "Eliminating sides and making the pen round produces a shape with even greater area than a square," he told the farmer, who was even more impressed.&lt;br /&gt;Finally, the mathematician took only three fence pieces and arranged them in a triangle with himself in the middle. "I am outside the pen," he declared.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-5259923377698708630?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/08/rancher-hired-architect-engineer-and.html</link><author>noreply@blogger.com (Swack)</author><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-768419623088650745</guid><pubDate>Wed, 07 Apr 2010 03:19:00 +0000</pubDate><atom:updated>2010-04-06T20:19:39.579-07:00</atom:updated><title>Scam Against Older Men</title><description>Gentlemen, beware!  Ladies, warn your men!  Here is a scam that has recently come to my attention.  Women often receive warnings about protecting themselves at the mall, in dark parking lots, etc. This is the first warning I have seen for men.  It’s a “heads up” for those men who may be regular Lowe's, Home Depot, Costco, or even Wal-Mart customers. This one caught me totally by surprise.  I wanted to pass it on in case you haven't heard about it.  Below is one man’s account of his terrifying experience.&lt;br /&gt;&lt;br /&gt;Over the last month I became a victim of a clever scam while out shopping.  Simply going out to get supplies has turned out to be quite traumatic.  Don't be naive enough to think it couldn't happen to you or your friends.  &lt;br /&gt;&lt;br /&gt;Here's how the scam works:  Two nice-looking, college-aged girls will come over to your car or truck as you are packing your shopping into your vehicle. They both start wiping your windshield with a rag and Windex, with their breasts almost falling out of their skimpy T-shirts. (It's impossible not to look.)  When you thank them and offer them a tip, they say no but instead ask for a ride to McDonalds. You agree and they climb into the vehicle.  On the way, they start undressing. Then one of them starts crawling all over you, while the other one steals your wallet.&lt;br /&gt;&lt;br /&gt;I had my wallet stolen Mar. 4th, 9th, 10th, twice on the 15th, 17th, 20th, 24th, &amp; 25th.  Also Feb. 1st &amp; 4th, twice on the 8th, 16th, 23rd, 26th &amp; 28th, three times last Monday and very likely again this upcoming weekend.&lt;br /&gt;&lt;br /&gt;Warn your friends to be vigilant.  What a horrible way to take advantage of us older men!&lt;br /&gt;&lt;br /&gt;Please send this on to all the older men that you know and warn them to be on the lookout for this scam.&lt;br /&gt;&lt;br /&gt;P.S.  Wal-Mart has wallets on sale for $2.99 each. I found even cheaper ones for $.99 at the Dollar Store and bought out their stock in three of their stores.  Also, you never will get to eat at McDonalds.  I've already lost 11 pounds just running back and forth from Lowe's, to Home Depot, to Costco, Etc.&lt;br /&gt;&lt;br /&gt;P.P.S.  The best times are just before lunch and around 4:30 in the afternoon.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-768419623088650745?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/04/scam-against-older-men.html</link><author>noreply@blogger.com (Swack)</author><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-7091070561318393433</guid><pubDate>Wed, 07 Apr 2010 00:45:00 +0000</pubDate><atom:updated>2010-04-06T17:45:23.272-07:00</atom:updated><title>Lenten Prayer</title><description>Dear Lord,&lt;br /&gt;In the past year you have taken away my favorite actor (Patrick Swayze)&lt;br /&gt;my favorite actress (Farah Fawcett)&lt;br /&gt;my favorite musician (Michael Jackson) and&lt;br /&gt;my favorite salesperson (Billy Mays).&lt;br /&gt;I just wanted to let you know that my favorite legislator is Nancy Pelosi. &lt;br /&gt;Amen&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-7091070561318393433?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/04/lenten-prayer.html</link><author>noreply@blogger.com (Swack)</author><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-4305796768287406167</guid><pubDate>Fri, 05 Mar 2010 04:03:00 +0000</pubDate><atom:updated>2010-03-04T20:26:05.925-08:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>DataCenter</category><category domain='http://www.blogger.com/atom/ns#'>Catalyst</category><category domain='http://www.blogger.com/atom/ns#'>6509</category><category domain='http://www.blogger.com/atom/ns#'>RJ-21</category><category domain='http://www.blogger.com/atom/ns#'>RJ21</category><category domain='http://www.blogger.com/atom/ns#'>Data Center</category><category domain='http://www.blogger.com/atom/ns#'>6500</category><category domain='http://www.blogger.com/atom/ns#'>Cisco</category><title>The Way Of The Dinosaur</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_DAM3_Mvsia8/S5CHqu2WcbI/AAAAAAAAABI/josMIFib95s/s1600-h/photo.jpg"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 240px; height: 320px;" src="http://3.bp.blogspot.com/_DAM3_Mvsia8/S5CHqu2WcbI/AAAAAAAAABI/josMIFib95s/s320/photo.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5445001117691179442" /&gt;&lt;/a&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;&lt;br /&gt;It's been a &lt;/span&gt;&lt;b&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;long &lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;time.  I can't remember how long, and I'm too lazy/busy to look it up.  But somewhere around two (yep, count 'em, TWO!) years ago we had a major problem at work.  One of our Cisco Catalyst 6509 core Ethernet switch had major problems.  Turns out we had some bent pins on the backplane in slot 2.  In laymen's terms, the place where you plug the brains into the switch was broke.  We still had one "brain" (a.k.a. supervisor module) but the redundant one couldn't be used. The only solution to get our redundancy back? &lt;/span&gt;&lt;i&gt;&lt;b&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;Replace the whole chassis.&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;div&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;Replacing an entire switch chassis is NOT a small job.  There were literally hundreds of servers connected to this switch in the data center.  So we set out on a very. long. journey.  We got a replacement chassis from Cisco and sloooooooowly began moving one server network connection at a time from the old switch to the new switch.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;Fast forward to today.  Thanks to a big push in the last few days by some coworkers and me, we currently have only 7 more connections on this switch.  And if things go according to plan, they'll all be changed to the new switch by Saturday afternoon. (Yeah, I have to go to work on Saturday.  And it's supposed to be nice weather, too! Bummer...)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;Some might not see the significance of this accomplishment, but those of us that have worked on it over these many months are &lt;/span&gt;&lt;b&gt;&lt;i&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;psyched&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;! We've scheduled a ceremonial power-off ceremony for Monday afternoon. Two of us will switch off the dual redundant power supplies, and everyone present will have the opportunity to disconnect one of the many &lt;/span&gt;&lt;i&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;ancient &lt;/span&gt;&lt;/i&gt;&lt;span class="Apple-style-span"  style="font-family:verdana;"&gt;RJ-21 Ethernet cable connections.  It will be stupendous when this switch makes itself extinct, and we can go on with our other more exciting, less mundane, projects.&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-4305796768287406167?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/03/way-of-dinosaur.html</link><author>noreply@blogger.com (Swack)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/_DAM3_Mvsia8/S5CHqu2WcbI/AAAAAAAAABI/josMIFib95s/s72-c/photo.jpg' height='72' width='72'/><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-8826614121680915067</guid><pubDate>Fri, 26 Feb 2010 02:20:00 +0000</pubDate><atom:updated>2010-02-25T18:20:37.401-08:00</atom:updated><title>Does anyone know who I am?</title><description>It happened at the Denver Airport. This is hilarious. I wish I had the guts of this girl. An award should go to the United Airlines gate agent in Denver for being smart and funny, while making her point, when confronted with a passenger who probably deserved to fly as cargo. &lt;br /&gt;&lt;br /&gt;A crowded United Airlines flight was canceled. A single agent was re-booking a long line of inconvenienced travelers. Suddenly, an angry passenger pushed his way to the desk. He slapped his ticket on the counter and said, "I HAVE to be on this flight and it has to be FIRST CLASS." &lt;br /&gt;&lt;br /&gt;The agent replied, "I'm sorry, sir. I'll be happy to try to help you, but I've got to help these folks first; and then I'm sure we'll be able to work something out."&lt;br /&gt;&lt;br /&gt;The passenger was unimpressed.  He asked loudly, so that the passengers behind him could hear, "DO YOU HAVE ANY IDEA WHO I AM?"&lt;br /&gt;&lt;br /&gt;Without hesitating, the agent smiled and grabbed her public address microphone. "May I have your attention, please?", she began, her voice heard clearly throughout the terminal: "We have a passenger here at Gate 14 WHO DOES NOT KNOW WHO HE IS. If anyone can help him find his Identity, please come to Gate 14".&lt;br /&gt;&lt;br /&gt;With the folks behind him in line laughing hysterically, the man glared at the United agent, gritted his teeth, and said, "F*** You!"  Without flinching, she smiled and said, "I'm sorry sir, you'll have to get in line for that, too."&lt;br /&gt;&lt;br /&gt;Life isn't about how to survive the storm, but how to dance in the rain.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-8826614121680915067?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/02/does-anyone-know-who-i-am.html</link><author>noreply@blogger.com (Swack)</author><thr:total>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-715457565370176118</guid><pubDate>Sat, 13 Feb 2010 00:18:00 +0000</pubDate><atom:updated>2010-02-12T16:18:25.013-08:00</atom:updated><title>Friday Joke</title><description>Father O'Malley rose from his bed.. It was a fine spring day in his new Washington DC parish. He walked to the window of his bedroom to get a deep breath of air and to see the beautiful day outside. He then noticed there was a jackass lying dead in the middle of his front lawn. &lt;br /&gt;&lt;br /&gt;He promptly called the US  House of Representatives for assistance. &lt;br /&gt;&lt;br /&gt;The conversation went like this: "Good morning. This is speaker Pelosi. How might I help you?" &lt;br /&gt;&lt;br /&gt;"And the best of the day te yerself. This is Father O'Malley at St.Brigid's.. There's a jackass lying dead in me front lawn. Would ye be so kind as to send a couple o' yer lads to take care of the matter?" &lt;br /&gt;&lt;br /&gt;Speaker Pelosi, considering herself to be quite a wit, replied with a smirk, "Well now father, it was always my impression that you people took care of last rites!" There was dead silence on the line for a long moment. &lt;br /&gt;&lt;br /&gt;Father O'Malley then replied: "Aye, that's certainly true, but we are also obliged to first notify the next of kin."&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-715457565370176118?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/02/friday-joke.html</link><author>noreply@blogger.com (Swack)</author><thr:total>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-2359842543958011995</guid><pubDate>Fri, 29 Jan 2010 04:29:00 +0000</pubDate><atom:updated>2010-01-28T20:31:17.853-08:00</atom:updated><title>Putting Sacrifice In Perspective</title><description>An interesting letter in the Australian Shooter Magazine this week:&lt;br /&gt;&lt;br /&gt;"If you consider that there has been an average of 160,000 troops in the Iraq theater of operations during the past 22 months, and a total of 2112 deaths, that gives a firearm death rate of 60 per 100,000 soldiers.&lt;br /&gt;&lt;br /&gt;"The firearm death rate in Washington , DC is 80.6 per 100,000 for the same period.&lt;br /&gt;&lt;br /&gt;That means you are about 25 percent more likely to be shot and killed in the U.S. capital, which has some of the strictest gun control laws in the U.S., than you are in Iraq ."&lt;br /&gt;&lt;br /&gt;Conclusion: The U.S. should pull out of Washington, DC..&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-2359842543958011995?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/01/putting-sacrifice-in-perspective.html</link><author>noreply@blogger.com (Swack)</author><thr:total>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-2990214442674016926.post-4370131776566554740</guid><pubDate>Fri, 29 Jan 2010 04:10:00 +0000</pubDate><atom:updated>2010-01-28T20:14:04.642-08:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>Intro</category><title>To Blog Or Not To Blog...</title><description>&lt;span style="font-family:verdana;"&gt;That is the question!  I've been toying with the idea for a while, because I feel like there are some things that are worth saying that take more than 140 characters (Twitter) and don't fit neatly into a Facebook or LinkedIn status update.  I won't promise to write often, but at least now I have a place to express myself.  I humbly present my blog to you.  Now, go &lt;strong&gt;SWACK YOURSELF&lt;/strong&gt;!&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/2990214442674016926-4370131776566554740?l=swackyourself.blogspot.com' alt='' /&gt;&lt;/div&gt;</description><link>http://swackyourself.blogspot.com/2010/01/to-blog-or-not-to-blog.html</link><author>noreply@blogger.com (Swack)</author><thr:total>0</thr:total></item></channel></rss>