<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3862670861101019814</id><updated>2025-07-25T08:56:53.243+08:00</updated><category term="How to Guide"/><category term="Network Engineering"/><category term="IT Security"/><category term="Cisco"/><category term="Consumer IT"/><category term="Kali"/><category term="PMP"/><category term="Project Management"/><category term="VLAN"/><category term="Wireless"/><category term="hacking"/><category term="switch"/><category term="Debian"/><category term="IT"/><category term="Linux"/><category term="PMI"/><category term="Security"/><category term="VPN"/><category term="WLAN"/><category term="Wifi"/><category term="4DX"/><category term="ASA"/><category term="B2B"/><category term="BIOS"/><category term="Blizzards"/><category term="Build or Buy"/><category term="CIO"/><category term="Decision Making"/><category term="Diablo 3"/><category term="Discipline"/><category term="Execution"/><category term="Hack and Slash"/><category term="L2L"/><category term="Lenovo T440s"/><category term="Management"/><category term="PC Games"/><category term="Paypal"/><category term="Project"/><category term="Project Initiation"/><category term="Project Monitoring and Control"/><category term="RPG"/><category term="Router"/><category term="SSH"/><category term="SSH tunneling"/><category term="SaaS"/><category term="Site to site"/><category term="Skype"/><category term="Software as a Service"/><category term="Spoof"/><category term="TFTP"/><category term="Thinkpad"/><category term="UEFI"/><category term="Windows 7"/><category term="bypass"/><category term="dashboard"/><category term="encryption"/><category term="firewall"/><category term="fraud"/><category term="hairpinning"/><category term="ipsec"/><category term="port-redirection"/><category term="proxy"/><category term="tunneling"/><title type='text'>Techienoobie</title><subtitle type='html'>Information Technology, Project Management, Networking Engineering, Hobbies</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>15</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-9185114020416843479</id><published>2015-02-13T10:15:00.001+08:00</published><updated>2015-02-13T10:39:14.000+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="How to Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="IT Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="Wireless"/><title type='text'>How to Hack a WPA Wireless Network (Wifi) using Aircrack-ng and John the Ripper</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Here is a video tutorial I created showing how easy it is to hack a wireless network using WPA keys for their security. It&#39;s a short 12 minute video and I hope you find it not only instructional, but also liberating. After all, informed people make the best decisions.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/sFhYiUFopXA/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;http://www.youtube.com/embed/sFhYiUFopXA?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
John the Ripper (JtR) cracks passwords offline. That is, &quot;incorrect number of passwords entered limit&quot; does not affect&amp;nbsp; JtR. As you can see in the video, using aireplay-ng, fake deauthentication packets were injected to the wireless access point&amp;nbsp; to force all users to reauthenticate (without them knowing it). During reauthentication, the WPA keys are exchanged between the client and the wireless access point. This exchange was recorded into a file &quot;wificrack.cap&quot; and the hashed PSK (Pre-Shared Key) was then cracked using JtR.&amp;nbsp; In the video, you can also see that the output file of airodump-ng can be opened using Wireshark. Opening the cap file with Wireshark reveals a lot of information about the clients connected to the wireless access point. For instance, we know the wireless AP is a Cisco-Li (Cisco-Linksys), and the WPA handshake captured was from an Apple device. The MAC address is even shown!&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The objective of this tutorial is to show everyone how to easily hack a wifi, when everyone knows how, they can start thinking of ways to mitigate, or avoid being hacked. A few of the things you can do are:&lt;br /&gt;
&lt;br /&gt;
1. &lt;b&gt;Never use a password that is common&lt;/b&gt;. Common passwords are birthdays, the words passwords, famous movie characters (regardless of what era they are, such as Obiwankenobi, Master Yoda, AttilatheHun, etc.) adding numbers to them doesn&#39;t make the password difficult to crack. Maybe you added an additional 15 minutes to the time it takes to crack the weak password without appending any special characters to them.&lt;br /&gt;
&lt;br /&gt;
2. &lt;b&gt;Never trust websites (including your own bank sites) that do not use two-factor authentication&lt;/b&gt;. two factor authentication are those that require a secondary authentication to gain access (such as a SMS code, or a RSA token key). If your back or credit card websites don&#39;t use two-factor authentication, simply do not use it.&lt;br /&gt;
&lt;br /&gt;
3. In your wifi, use passwords that are greater than 8 characters in length, with a capital letter, special characters, and some numbers.&lt;br /&gt;
&lt;br /&gt;
4. This is not in the video, &lt;b&gt;but do not use WPS and WEP keys in your Wifi&lt;/b&gt;. Just use WPA or WPA2 on AES. Reaver can be used to hack through WPS (Wifi-Protected Set-up) in your Wifi. WPS is less secure than WPA, while WEP is the least secure Wifi authentication method. &amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/9185114020416843479/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2015/02/how-to-hack-wpa-wireless-network-wifi.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/9185114020416843479'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/9185114020416843479'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2015/02/how-to-hack-wpa-wireless-network-wifi.html' title='How to Hack a WPA Wireless Network (Wifi) using Aircrack-ng and John the Ripper'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/sFhYiUFopXA/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-5036094063692973490</id><published>2015-02-04T12:08:00.000+08:00</published><updated>2015-02-04T15:01:02.961+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Debian"/><category scheme="http://www.blogger.com/atom/ns#" term="How to Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="IT Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>Freeing Disk Space in  Kali Linux (Basic steps), Especially the apt-get Cache</title><content type='html'>&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Kali is a Debian-based Linux developed with penetration-testers in mind. Think of it as a toolbox. It is basically a Debian Linux, but with all the penetration testing tools installed, for free. This includes Metasploit, OpenVAS vulnerability scanners, exploitDB, Hydra, aircrack-ng, John the Ripper, etc. These come on top Linux&#39;s common formidable tools such as OpenSSH (for creating tunnels), netcat, and nmap to name a few.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Since Kali is Debian, then the method used here do apply to any Debian-based Linux systems (+ Ubuntu). Although, since we are talking about Kali, which is usually ran as &#39;root&#39;, then most of the screenshots will show that the user is running the commands as root. If you are not logged in as root, just add the word &#39;sudo&#39; in the beginning of every command. For example: instead of issueing command &#39;&lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;apt-get clean&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&#39;,&lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt; type&lt;/span&gt; &#39;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;sudo apt-get clean&lt;/span&gt;&#39;.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Let us assume, you get an error in your Kali Linux saying that you are running out of space. In the screenshot below, My Kali is running on Oracle VirtualBox with a dynamically allocated 15Gb of space. Technically I don&#39;t have to worry about disk space because the Virtual Disk will expand when needed. But I still want to free some space. &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDRftfEU9Ex_MsDWLE6jSrugVK2KNXVX3i-EI2HbjAC4mp7Ml-pH4X2y7FNTORnHilH_PNJeTney7rDxl9G_-rP9kaRCIEQ3_JzLH2UOH-5pCHSfwaqvNrpFAdohaOF0otRVM6zqx6heu_/s1600/low+disk+space.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDRftfEU9Ex_MsDWLE6jSrugVK2KNXVX3i-EI2HbjAC4mp7Ml-pH4X2y7FNTORnHilH_PNJeTney7rDxl9G_-rP9kaRCIEQ3_JzLH2UOH-5pCHSfwaqvNrpFAdohaOF0otRVM6zqx6heu_/s1600/low+disk+space.JPG&quot; height=&quot;267&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;You get an error that you are running on disk space. Kali&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Step 1: Check Disk space and where you are consuming space the mos&lt;/b&gt;t. Use&lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt; df -h. &lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;the &#39;-h&#39; option in df is to format the result in &#39;human-readable&#39; format.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyXvfthu42PLAMh9rZAfnflG9ylY9G7J0DGGKo2BH2s3rlzKurXGIGnxrOn5Kkwm29pQPZxF796Oy0pcQ4SO-QkocUTJ_Q4hjdZy7NVm7-Qfp7RnM8Gy0t6dcIl_I5mc_xYV6jqITQqvv8/s1600/df+h+output.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyXvfthu42PLAMh9rZAfnflG9ylY9G7J0DGGKo2BH2s3rlzKurXGIGnxrOn5Kkwm29pQPZxF796Oy0pcQ4SO-QkocUTJ_Q4hjdZy7NVm7-Qfp7RnM8Gy0t6dcIl_I5mc_xYV6jqITQqvv8/s1600/df+h+output.JPG&quot; height=&quot;139&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;df -h results show the entire disk is &quot;full&quot;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In this example, it seems the entire disk (virtual disk) is full. But we still need to know what folders are the largest, etc. So we use the Linux Disk Utility &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;du&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Step 2: Use &#39;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;du&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&#39; to show the top 10-30 consumers of space&lt;/b&gt;. You can use this iteratively &amp;nbsp;going from one folder then digging deeper into its subfolders until you are satisfied that you have pinpointed what folders you need to remove/purge in order to free space.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiL9ItQQQNVz-hqcqs5TgimxH31zN2T1Xhrog0rm6_L7WHyMcTH7VZ-pUepZ-g93L0266WIei3v6bCJN7czrRhAq3TIcwMaO1GcjSP5vxTzdv-1U4y1JqMHNAPNGanchyphenhyphenCmv5kGC0HL_fW8/s1600/du+head+results.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiL9ItQQQNVz-hqcqs5TgimxH31zN2T1Xhrog0rm6_L7WHyMcTH7VZ-pUepZ-g93L0266WIei3v6bCJN7czrRhAq3TIcwMaO1GcjSP5vxTzdv-1U4y1JqMHNAPNGanchyphenhyphenCmv5kGC0HL_fW8/s1600/du+head+results.JPG&quot; height=&quot;206&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;first du attempt is from the &#39;/&#39; top folder.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The syntax is:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;du &amp;lt;directory&amp;gt; -ka | sort -n -r | head -n&amp;lt;number to show&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The options explained:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;-ka&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;: -k forces du to count in kilobyte blocks. while -a forces du to count all files, not just folders/subdirectories. We need -k becase the &quot;sort&quot; pipe cannot distinguish between bytes, KB, MB, GB, etc. It only sorts based on the numbers from largest to lowest (or vice versa).&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;sort&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;: sorts a text output. &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;-n&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt; instructs sort to sort numerically (by string numbers), while &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;-r&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt; &amp;nbsp;instructs sort to show the output in reverse (instead of from lowest to highest, it will be sorted from highest to lowest.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Lastly &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;head &lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;instructs the IO to output only the top 10 (by default), and not to show the rest. the&lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt; -n&amp;lt;#&amp;gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt; changes the output from the default 10, to the number specified.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In our example above, it is clear that /user and /var/cache are the two largest folders. We can iterate through du to check the subfolders inside /usr and /var/cache that contributes most to disk space.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi_Prf2YcO7FDtfU6LgZt7CMvnsYupOrTthDbbWrlbPGij0ZIBLRjJ-WiXMujjwt_A2hFIxQPKCP5RfjrNTz1Bn-jAYbS1f6L9B3obHKUXpRx12E7QCvNQRGJxdhg7aBQmqxb6nl29hMIE/s1600/du+head+var-cache+results.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgi_Prf2YcO7FDtfU6LgZt7CMvnsYupOrTthDbbWrlbPGij0ZIBLRjJ-WiXMujjwt_A2hFIxQPKCP5RfjrNTz1Bn-jAYbS1f6L9B3obHKUXpRx12E7QCvNQRGJxdhg7aBQmqxb6nl29hMIE/s1600/du+head+var-cache+results.JPG&quot; height=&quot;171&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;the du (sorted) results for var/cache&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;du &lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;results for var/cache (shown in the right) reveals that it is the apt-get archives that are consuming too much space. Specifically the metapsloit framework archives.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #990000;&quot;&gt;note:&lt;/span&gt;&lt;/b&gt; before I wrote this article, I already know that I need to purge the apt-get cache. the apt-get cache really does tend to get big especially if you are upgrading without the &#39;&lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;autoremove&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&#39; option. But the article shows a series of repeatable steps to be performed, in case its not the apt-cache that is the culprit.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Step 3: Proceed to delete the files. &lt;/b&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;You can use &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;rm&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;-rf &amp;lt;file_name&amp;gt; &lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;to remove the files. you can even use wildcards such as * and ?.For example, you can delete &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;rm -rf /home/archives/*&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt; to delete everything in /home/archives. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;However, since we are dealing with the apt-get archives/cache, there is a safer way of dealing with it instead of doing a &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;rm -rf&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;. Use &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;apt-get clean&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;, or &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;apt-get autoclean&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;. Here&#39;s the difference:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;apt-get clean&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;removes all packages downloaded (even those not yet installed) except those locked packages &amp;nbsp;in /var/apt/cache/archives and /var/apt/cache/archives/partial.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;apt-get autoclean&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;is a little smarter. It removes old packages and archives which are unlikely to be used. For example, outdated packages where a new package is already downloaded. Although, &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;autoclean &lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;removes less archives in the apt-get cache, then &lt;/span&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;clean&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ_BL4fYM6ygZplf04TC-5q1WdUvm1_UwVcWvJeN5mpsOtWEAFuOc2BigG-z3dELuX2B3KeE3VYgOh27Y2fIdXiv89fuMzAtDhmmJB1EfsbKKnDqlzE3yB2Dj6dUaJ3SE4BNUE9I1gKSTT/s1600/apt-get+clean.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ_BL4fYM6ygZplf04TC-5q1WdUvm1_UwVcWvJeN5mpsOtWEAFuOc2BigG-z3dELuX2B3KeE3VYgOh27Y2fIdXiv89fuMzAtDhmmJB1EfsbKKnDqlzE3yB2Dj6dUaJ3SE4BNUE9I1gKSTT/s1600/apt-get+clean.JPG&quot; height=&quot;152&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;apt-get clean does not show an output, but a quick df -h reveals significant space have been removed.&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Step 4: Verify the process and if necessary repeat steps 1-3. &lt;/b&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;As shown in the picture above, verify by doing df -h again (step 1), and doing another iterative set of du (step 2). Do steps 1-3 repeatedly until you are satisfied you have purged all the unwanted files.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMML00aFBhzLzjxUZKzK99qWMzcgnYXhaOj0zUsVQNXy84XDx7BtgmB4mTAPzH84XPuxWudzxFKcJmPw13T1NO8xNnNV-N5iWvG0f2lk-Ybj3HYBsxO2Ke_uIlgh4fNiFbqqyfMAXb4A3o/s1600/du+var-cache+2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMML00aFBhzLzjxUZKzK99qWMzcgnYXhaOj0zUsVQNXy84XDx7BtgmB4mTAPzH84XPuxWudzxFKcJmPw13T1NO8xNnNV-N5iWvG0f2lk-Ybj3HYBsxO2Ke_uIlgh4fNiFbqqyfMAXb4A3o/s1600/du+var-cache+2.JPG&quot; height=&quot;396&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Another du head in /var/cache reveals we successfully purged the metasploit archives, and other var/cache apt files. We can continue to delete other /var/cache files as necessary if we have not yet freed enough disk space.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/5036094063692973490/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2015/02/free-disk-space-in-Kali-Linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/5036094063692973490'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/5036094063692973490'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2015/02/free-disk-space-in-Kali-Linux.html' title='Freeing Disk Space in  Kali Linux (Basic steps), Especially the apt-get Cache'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDRftfEU9Ex_MsDWLE6jSrugVK2KNXVX3i-EI2HbjAC4mp7Ml-pH4X2y7FNTORnHilH_PNJeTney7rDxl9G_-rP9kaRCIEQ3_JzLH2UOH-5pCHSfwaqvNrpFAdohaOF0otRVM6zqx6heu_/s72-c/low+disk+space.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-2800639962038521694</id><published>2015-01-27T21:18:00.003+08:00</published><updated>2015-01-28T09:47:28.852+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PMI"/><category scheme="http://www.blogger.com/atom/ns#" term="PMP"/><category scheme="http://www.blogger.com/atom/ns#" term="Project Management"/><title type='text'>Practical Advice in Pursuing the Project Management Professional (PMP) Credential</title><content type='html'>&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Recently, I became a Project Management Professional (PMP) credential holder. I personally find the exam tough and the entire process stringent. Thus, I consider this achievement a milestone in my career.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;In this blog, I will give advice, based on my own experience, how one can maximize the effort, and financial resources required to achieve the credential.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkMU7IDT2kkrmqYN2NpNkOtxqpcmjefITB7C1ulc9zZlZrO-QRBYYWgWVTJHxLgmPKyJKfTByakxOxhNmV6ynWjpTHuH76u7Z5KU0SzI7XBQC9AyIfApRuNAJWQcAbiAbYCAysACyCgl9-/s1600/Capture.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkMU7IDT2kkrmqYN2NpNkOtxqpcmjefITB7C1ulc9zZlZrO-QRBYYWgWVTJHxLgmPKyJKfTByakxOxhNmV6ynWjpTHuH76u7Z5KU0SzI7XBQC9AyIfApRuNAJWQcAbiAbYCAysACyCgl9-/s1600/Capture.JPG&quot; height=&quot;227&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Just recently somebody asked me what my foremost advice would be if someone is seriously working into achieving the PMP certification. My foremost advice is also the most obvious.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #444444; font-family: Verdana, sans-serif; font-weight: bold;&quot;&gt;1. Become a member of Project Management Institute (PMI).&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Georgia, Times New Roman, serif; font-weight: bold;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The benefits of membership are numerous. First, you get an immediate savings of approximately $10.00 in your application fee. The application fee for CBT (Computer Based Test) is $405 for members, and $555 for non members. To become a member, you are charged some $140 membership fee. Thus, in all, a new PMI member PMP applicant is charged $545, versus $555 for non-members. BUT (the big BUT), as a member you get free access to the Project Management Book of Knowledge (PMBok), latest edition, which is the basis of 90% of the PMP exam questions. Also, as a PMI member, you get access to the MyPMI dashboard (a portion of which is shown above). The dashboard makes it easy for you to apply for the credential online. Applying online is a big relief. PMI requires you to fulfill 4,500 project hours for degree holders, or 7,500 project hours for secondary school (high school) diploma holders. These project hours should have spanned all five process groups (initiating, planning, executing, monitoring and controlling, closing); and they have to be non-overlapping. These hours also need to be logged for &lt;i&gt;each&lt;/i&gt;&amp;nbsp;project, and confirmed by your direct supervisor.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0GeGfhuO2aZjBkSW39y1k8ONhEcWCKLUNtHBkbQKY8JlhQ0UcqqxDb64Pp0xxXAHsW5FS9DouWHRswjDBvsdb29-goA-UDitIsoDVNgY7_6PSWulQey1I_ly7PK4TlbQZ84RQ-s1JzsFj/s1600/PMP-Application.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0GeGfhuO2aZjBkSW39y1k8ONhEcWCKLUNtHBkbQKY8JlhQ0UcqqxDb64Pp0xxXAHsW5FS9DouWHRswjDBvsdb29-goA-UDitIsoDVNgY7_6PSWulQey1I_ly7PK4TlbQZ84RQ-s1JzsFj/s1600/PMP-Application.JPG&quot; height=&quot;206&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I had a colleague who did the project hours logging using PMI paper forms. They are tedious, and tend to be messy. . The online application form is cleaner (shown in the right), and makes it easier for you to track if you already reached the required number of hours to apply for the credential.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Which brings me to my next advice.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #444444; font-family: Verdana, sans-serif; font-weight: bold;&quot;&gt;2. Make sure to log your project hours accurately, and discuss the project description with your manager&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-weight: bold;&quot;&gt;. &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;The application process allows for certain liberties, after all the project hours are estimations. But if your application is selected for audit, your manager will be required to confirm (by a signature, with comments on a sealed envelop) your application - particularly the project hours, duration, and description. This also means...&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Times, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #444444; font-family: Verdana, sans-serif; font-weight: bold;&quot;&gt;3. Do note lie in your application.&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-weight: bold;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;According to PMI, only a small percentage of applications are audited. But if you are selected for an audit, you have 90 days to complete the audit requirements such as: sealed signed confirmation from each of your project&#39;s direct supervising manager/lead, a copy of your diploma, etc. They are easy to cheat -- yes, but on occasion PMI do call your referees. Thus, it is advisable to discuss the project description in your application to your project&#39;s direct supervisor before you hit the &quot;submit button&quot;. You can actually print your incomplete online application form in PDF format. Use this feature to print your application, and discuss with all stakeholders if the hours and project description logged is accurate as per their recollection. Being transparent with your bosses and getting their approval of your application is &amp;nbsp;audit-fail-proof. &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #444444; font-family: Verdana, sans-serif; font-weight: bold;&quot;&gt;4. Read the PmBOK 5th edition from cover to cover, &lt;i style=&quot;text-decoration: underline;&quot;&gt;including&lt;/i&gt;&amp;nbsp;the X.1 appendices. Also read the PMI code of conduct/ethics.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;When I took the exam, 90% of the questions are in the PMBok 5th edition. If you already read the PMBok, make sure you read, and UNDERSTOOD everything, including the appendices. Some form of memorization may be required, but a good command of the entire concept is needed to pass the exam. I passed the exam on the first take, but I did took the time to understand the concept, not just memorize them.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
For example, remember the difference between the &#39;Perform Quality Assurance&#39; process, and the &#39;Control Quality&#39; processes. Quality audits are in the former, while inspection is a technique in the latter. If you ask me how I remembered it until the exam, its simple.... I took note of the key concepts on each process, including the ITTO (Input, Tools and Techniques, Output). In my example, the key concept to remember is that the &#39;Perform Quality Assurance&#39; is concerned about auditing if the project team is applying the process correctly as planned, and according to your company&#39;s guideline; while &#39;Control Quality&#39; is concerned if the project&#39;s products are as per the requirements.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
So let me test you, after briefly discussing the difference between the two processes, can you differentiate between Validate Scope, Control Scope, and Control Quality? Which comes first, validate scope, or control scope?&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
There are other questions which you may think are not in the PMBoK Guide, but its there. If you already read the PMBok guide, would you know the difference between a standard and a regulation? Also, is the Project Management Body of Knowledge (aka PMBoK) a standard, or a regulation? Is it a methodology? The answer is in the PMBoK guide --&amp;nbsp;&amp;nbsp;it is in the appendices! And YES, you will encounter these kind of questions in the exam. So read the entire guide, along with the appendices. Questions such as, &quot;what are process inputs, and process outputs and how did PMI define process inputs and outputs&quot; are in the exam, and they are in the PMBoK appendices.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;While you&#39;re at it, also download the PMI lexicon, which is also a benefit of PMI members. you don&#39;t need to memorize every definition, but it comes in handy when reviewing definition of terms.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #444444; font-family: Verdana, sans-serif; font-weight: bold;&quot;&gt;5. Practice tests are invaluable. Get your hands to as many practice questions as you can. Make sure you understand the answers especially those you got incorrect.&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-weight: bold;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;There are a lot of free exam simulators out there. My personal favorite is http://www.pm-exam-simulator.com. What&#39;s good with pm-exam-simulator is that it does simulate the actual online exam, the look, the feel, the timer, etc. It was cool. The exam questions are also tough. I didn&#39;t pass any of them. But I did pass the actual exam.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
There is also the PMWars segment at ProjectManagement.com. It&#39;s a good way to practice yourself in PMBoK concepts. Note that ProjectManagement.com is also managed by PMI so the PMWars questions are the kind you would expect in the exam.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
There are also cheap simulators for iPad/iPhone/android - they are often cheaper than their online / PC counterparts. For my iDevices, I bought PMP Trainer for $10.00. It had 800+ questions, there is a study/trainer mode, and a 200-item exam simulator mode. For $10, it was a steal. When buying tablet/mobile phone PMP reviewers and simulators, check the time the application was last updated. Make sure it was updated recently to ensure that the exam questions are in line with the recent PMBok edition.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
I did say that 90% of the exam are in the PMBoK Guide 5th edition. However, 10% of the questions aren&#39;t. They are usually found in some other management books, etc. Getting your hands into as many PMP quizzes and exams online. When you encounter a question from a simulator which is not in the PMBoK Guide, stop for a moment to take note of the question, then make sure you do additional readings regarding the subject. Usually, these concepts are mentioned briefly in the PMBoK guide but are not discussed thoroughly. Thus, it is very important to get your hands on every PMP quiz/test/simulator you can possibly get.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
Lastly, make sure you are exposed to three or more exam preparation quiz/simulator. Most applications or simulators are biased on a particular subject and may phrase questions similarly. to avoid this bias, go through at least three different simulators. They need not be expensive. In my case, I bought one, and the two others are free. &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;color: #444444; font-weight: bold;&quot;&gt;6. Schedule the exam no more than one month after you reached a high degree of confidence that you will pass the exam.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: #444444; font-weight: bold;&quot;&gt; &lt;/span&gt;Either many people don&#39;t know this, or we are just accustomed to completing a task ASAP. After you get the confirmation email that your application has been verified and you can now schedule the exam, you actually don&#39;t have to rush to schedule the exam. You can wait... for the right time.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
The exam is tough. It is composed of 200 questions, mostly situational kinds where at least 2 of the 4 choices seem correct. It will also test your knowledge of the PMI Project Management standard as outlined in the PMBoK. Questions like&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;i&gt;&quot;Jeff just finished the project charter, what should he do next: a. identify the team, b. develop the project scope statement, c. identify stakeholders, d. start collecting the requirements.&quot; &amp;nbsp;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
You should get used to seeing these questions (and answering them correctly). Once you start getting at least 80% in tough test-simulator exams, then its time to schedule the exam. Schedule the exam at most one month from the time your confidence level is already high. Once the exam is scheduled, continue to increase your review cycle, until 3-5 days before the exam, by which time, you should start easing down.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
Goodluck and Happy Hunting!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Times, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Times, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/2800639962038521694/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2015/01/PMPadvice.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/2800639962038521694'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/2800639962038521694'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2015/01/PMPadvice.html' title='Practical Advice in Pursuing the Project Management Professional (PMP) Credential'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkMU7IDT2kkrmqYN2NpNkOtxqpcmjefITB7C1ulc9zZlZrO-QRBYYWgWVTJHxLgmPKyJKfTByakxOxhNmV6ynWjpTHuH76u7Z5KU0SzI7XBQC9AyIfApRuNAJWQcAbiAbYCAysACyCgl9-/s72-c/Capture.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-961740034634479407</id><published>2014-06-13T15:14:00.001+08:00</published><updated>2014-06-24T15:52:45.953+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Debian"/><category scheme="http://www.blogger.com/atom/ns#" term="How to Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="Kali"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="TFTP"/><title type='text'>How to configure TFTP Server in your Linux Machine (Debian), and how to solve Permission Denied Error (Error Code 2)</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
I personally use a Virtualized Kali Linux in my Windows 7 machine to do a lot of things. Primarily to do IT security analysis and research for the companies I work with. But mostly, I find maintaining a Linux machine in an image comes in handy for a lot of things: I can use the Kali/Linux machine as an tftp/scp server to backup devices;&lt;br /&gt;
&lt;br /&gt;
So suppose you want to copy startup-config files from your Cisco to your laptop running a virtual machine of &amp;nbsp;Kali Linux, (Debian). Let us suppose further that your Cisco router/switch cannot do SSH otherwise, we&#39;ll just use &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;scp&amp;nbsp;&lt;/span&gt;which is safer, and does not need any further special configuration for Linux devices.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
&lt;span style=&quot;color: blue;&quot;&gt;Here&#39;s how to do it: &amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Make sure you have the Virtual Machine in Bridged Adapter to your WIndows 7 machine&#39;s ethernet adapter. I&#39;m using virtual box so in my case, I have to create a bridged adapter first. In Virtuabox (not in the Guest OS or Virtual Machine&#39;s Window) click &lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;File&lt;/span&gt; &lt;/span&gt;&amp;gt;&amp;gt; &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;preferences &lt;/span&gt;&amp;gt;&amp;gt; &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;Network&lt;/span&gt;. Then under tha tabe Bridged Adapters, create at least one adapter.&amp;nbsp;&lt;/li&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;  &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0ZdwSnbPHcp4mSFNigQlQU6sc2JvrYE8UqFIyFeJbvdGL-ignjnxA7FkyYHyzJluwL88RLkh3kaFy0wu56QuL-kr_OfEsCrGFFlBan5G5EDi1itFUyI5XtJXWdBoaNz-uGnykHo9yQx8V/s1600/VirtualBox-network.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0ZdwSnbPHcp4mSFNigQlQU6sc2JvrYE8UqFIyFeJbvdGL-ignjnxA7FkyYHyzJluwL88RLkh3kaFy0wu56QuL-kr_OfEsCrGFFlBan5G5EDi1itFUyI5XtJXWdBoaNz-uGnykHo9yQx8V/s1600/VirtualBox-network.JPG&quot; height=&quot;355&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;  &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Then , in your Guest / Virtual Machine, click &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;Machine &lt;/span&gt;&amp;gt;&amp;gt; &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;Settings&amp;nbsp;&lt;/span&gt;&amp;gt;&amp;gt; N&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;etwork &lt;/span&gt;&amp;gt;&amp;gt; choose bridged (not NAT). After which, you need to do an ifdown eth0 and ifup eth0 inside your Kali / Linux OS console.  &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhISGZ3xOOZ9oH-Sytracjd0mfu17ZCrDV0-AjNQFAz7PvH_nRHrUpE5zoD0znwbWyAEKz8mild7V-t_ejBHSfgNDHIq54o9_OdLCEpg_w9B2iXzVjUhYW8iCwAAJgi9QXSKdUfkY9IxMWc/s1600/VirtualBox+machines.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhISGZ3xOOZ9oH-Sytracjd0mfu17ZCrDV0-AjNQFAz7PvH_nRHrUpE5zoD0znwbWyAEKz8mild7V-t_ejBHSfgNDHIq54o9_OdLCEpg_w9B2iXzVjUhYW8iCwAAJgi9QXSKdUfkY9IxMWc/s1600/VirtualBox+machines.JPG&quot; height=&quot;293&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;i&gt;** Bridging will not work when you hav eport-security configured in the switchport where the computer is plugged. This is the case in most enterprise networks. If you are doing this inside your office and you are not getting a DHCP IP address, you better ask your network engineer/corporate IT if port-security is enabled.&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;div&gt;
&lt;i&gt; &lt;/i&gt;&lt;/div&gt;
&lt;/span&gt;
&lt;li&gt;Install (if not yet installed) tftpd: &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;apt-get install tftpd. &lt;/span&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;If you are not using Kali Linux, you are most likely not root, so add &quot;&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;sudo&lt;/span&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&quot; before the apt-get command.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;Once installed, configure inetd. Open &lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;/etc/inetd.con&lt;/span&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;f with your favorite text editor (i.e. &lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;vi /etc/inetd.conf&lt;/span&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;, or &lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;leafpad /etc/inetd.conf&lt;/span&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;Inside inetd.conf, there is a line there pertaining to tftp, uncomment (remove the # sign before it). Mine looks like the picture below. Note the encircled portion of the picture, that is the path to where tftp will put/get the files to/from.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;       
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5PGIb3oo48q2budk6W4i16nmb0mhakW-2E0VdbUUjXa8vusFcGLImq1bQnFOh_FeI37IxoCUMQvyC8383pC3FrBOmvqNi8DtkV9XapRIzMHTMxeXTUmPzZEY_5WejGlSx_U_SbwMx4bPd/s1600/inetd_tftp.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5PGIb3oo48q2budk6W4i16nmb0mhakW-2E0VdbUUjXa8vusFcGLImq1bQnFOh_FeI37IxoCUMQvyC8383pC3FrBOmvqNi8DtkV9XapRIzMHTMxeXTUmPzZEY_5WejGlSx_U_SbwMx4bPd/s1600/inetd_tftp.JPG&quot; height=&quot;60&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;In this example., /srv/tftp is the default folder. You can change this.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;TFTP is an authentication-less file transfer using UDP packets. Thus, permissions must be configured properly for this folder. Using the above picture as an example, do &lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;chmod -R 777 /srv/tftp&lt;/span&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;. Again, if you are not the root user, you may have to add the command &quot;&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;sudo&lt;/span&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&quot; in front.&amp;nbsp;&lt;/span&gt; &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;Restart inetd: &lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&amp;lt;sudo&amp;gt; killall -1 inetd&lt;/span&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;, then to start it again, just type, &lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;inetd.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;Check that the tftpd service is installed. do&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt; lsof -i&lt;/span&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt; and you should see something like this (notice the tftp services listening on particular ports):&lt;/span&gt;&lt;/li&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt; &lt;/span&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-qKveZvoZl-j9x5sfCdZolFsaaOKjQZL-8EZaWPp0G8iNCDIf2vBiAYdviLnndBOWniO86w4mprbu9hpllTWc_QvRswhOqOIxUiI22o443ALJkNwjE3yu67-2nLDaP18HttO8aspg_neg/s1600/lsof-i.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-qKveZvoZl-j9x5sfCdZolFsaaOKjQZL-8EZaWPp0G8iNCDIf2vBiAYdviLnndBOWniO86w4mprbu9hpllTWc_QvRswhOqOIxUiI22o443ALJkNwjE3yu67-2nLDaP18HttO8aspg_neg/s1600/lsof-i.JPG&quot; height=&quot;144&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Results of lsof -i&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;li&gt;You are now ready to use tftp. login to your cisco device &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;telnet &amp;lt;IP address&amp;gt;&lt;/span&gt;. Then from your Cisco device, type &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;copy startup-config tftp: &lt;/span&gt;specify the correct answer to all the following questions, then you will be faced with this error! &amp;nbsp;&lt;/li&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;Cisco4#copy startup-config tftp:&lt;/span&gt;&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&amp;nbsp;Address or name of remote host []? 10.48.2.61&lt;/span&gt;&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&amp;nbsp;Destination filename [Cisco4-confg]?&lt;/span&gt;&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&amp;nbsp;TFTP: error code 2 received - 16739&lt;/span&gt;&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;%Error opening tftp://10.48.2.61/maphl2sw04-confg (Permission &amp;nbsp; &amp;nbsp; denied)&lt;/span&gt;&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;li&gt;&amp;nbsp;That&#39;s because Linux TFTP servers will not allow anyone to write a file to its default location unless the filename exists and has proper permissions. Thus, to resolve this, you need to create the file, and give it permission 666, as per hte below picture. &amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwrlBRVA5gX2kka0bxCwHceWa8xi2FjGNELAXo0RInDYbQj9F7H0QiPAd50LSOvvUF2_zXJRvnvXnOnTqQaRKfuhnIkNGhPS6FQVaT7yMg3VZrCknoW9UpfjLqKMJh7Nod-tpeenTeysFE/s1600/touch.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwrlBRVA5gX2kka0bxCwHceWa8xi2FjGNELAXo0RInDYbQj9F7H0QiPAd50LSOvvUF2_zXJRvnvXnOnTqQaRKfuhnIkNGhPS6FQVaT7yMg3VZrCknoW9UpfjLqKMJh7Nod-tpeenTeysFE/s1600/touch.JPG&quot; height=&quot;132&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;touch is the command to create the file&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;After that tftp is successful.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/div&gt;
&lt;/ol&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;Cisco4#copy startup-config tftp:&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;Address or name of remote host []? 10.48.2.61&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;Destination filename [Cisco4-config]?&lt;/span&gt;&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;!!&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;20645 bytes copied in 0.109 secs (189404 bytes/sec)&lt;/span&gt;&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;Cisco4#&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;font-family: Times, &#39;Times New Roman&#39;, serif;&quot;&gt;
&lt;span style=&quot;color: blue; font-size: x-small;&quot;&gt;**Note: tftp is an unsecure way to download upload files. Always use scp or sftp is you are given a choice.&lt;/span&gt;&amp;nbsp;&lt;/div&gt;
&lt;ol&gt;&lt;div&gt;
&lt;/div&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Times, Times New Roman, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/961740034634479407/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2014/06/ho-to-configure-tftp-server-in-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/961740034634479407'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/961740034634479407'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2014/06/ho-to-configure-tftp-server-in-your.html' title='How to configure TFTP Server in your Linux Machine (Debian), and how to solve Permission Denied Error (Error Code 2)'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0ZdwSnbPHcp4mSFNigQlQU6sc2JvrYE8UqFIyFeJbvdGL-ignjnxA7FkyYHyzJluwL88RLkh3kaFy0wu56QuL-kr_OfEsCrGFFlBan5G5EDi1itFUyI5XtJXWdBoaNz-uGnykHo9yQx8V/s72-c/VirtualBox-network.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-689027259935276743</id><published>2014-06-08T02:04:00.001+08:00</published><updated>2014-06-08T02:06:06.570+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="BIOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Consumer IT"/><category scheme="http://www.blogger.com/atom/ns#" term="How to Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="Lenovo T440s"/><category scheme="http://www.blogger.com/atom/ns#" term="Thinkpad"/><category scheme="http://www.blogger.com/atom/ns#" term="UEFI"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 7"/><title type='text'>How to Install Windows 7 on a UEFI enabled Computer</title><content type='html'>We recently bought a Lenovo T-440s amd immediately loved it, except it came with a Windows 8 Professional, 64-bit. It had &quot;downgrade rights&quot; for Windows 7 Pro 64-bit. Unfortuantely, our corporate IT environment does not (yet) encourage Windows 8 especially in laptops nor desktops, so I really was obligated to downgrade it to Windows 7 Pro/Enterprise.&lt;br /&gt;
&lt;br /&gt;
The T-440s is Windows 8 optimized and is UEFI and secure-boot enabled. As an IT professional, I am also interested in how UEFI works (later I&#39;ll write a blog after I successfully installed Kali Linux on dual-boot in a UEFI system) and if it indeed delivers to is promise. UEFI is explained in detail&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. Microsoft also explains UEFI and how it is &lt;a href=&quot;http://windows.microsoft.com/en-PH/windows-8/what-uefi&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Do note that UEFI systems behave differently depending on the model and brand of the computer. This how-to post is specifc to the T-440s. While the concept and the general procedures may be the same as with other laptops (i.e. Acer, Asus, HP, Dell, etc.) the behavior may differ slightly.&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;h4&gt;
&lt;b&gt;&lt;span style=&quot;color: #134f5c;&quot;&gt;The Objective:&amp;nbsp;&lt;/span&gt;&lt;/b&gt; Install Windows 7 Professional 64-bit on a UEFI enabled Lenovo T-440s.&lt;/h4&gt;
Before we begin, let us first discuss what are the differences between installing Windows OS in UEFI and in non-UEFI mode (aka Legacy Boot Mode)&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;UEFI installation of Windows 7 only works in 64-bit installations.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;UEFI does not work in Win XP.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;By default T-440s ships with Windows 8 and with UEFI and Secure Boot enabled. However Windows 7 normally is not for UEFI systems. &amp;nbsp;If your Lenovo Thinkpad T-440s ships with Windows 7, the settings may have been changed.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;The Lenovo Thinkpad T-440 does not have a CD/DVD Drive, you have to either attach a removable drive, or create a EFI-bootable Windows 7 USB Stick.&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;
&lt;b&gt;&lt;span style=&quot;color: #134f5c;&quot;&gt;&lt;u&gt;Here&#39;s how:&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;Go to the BIOS Setup by rebooting your Lenovo Thinkpad T-440s then, repeatedly press &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;F1&amp;nbsp;&lt;/b&gt;&lt;/span&gt;until you get to the BIOS Set-up Screen.&amp;nbsp;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Go to the &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&amp;lt;&lt;b&gt;Security&lt;/b&gt;&amp;gt;&lt;/span&gt;&amp;nbsp;Tab then disable Secure Boot&lt;/li&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGIN5UHIpSINZWEAvRu0omo7VNjKQsQMpw6CvmhxoXYwjdIHuZouWUc6aQ1Hg1oMb7IBmcUW8VCvH5PAaONeKsPimf7sunLCktm3SMebzd1aZ4qbwVRFsDR3gqdccpvlDZZvoGxauuobSU/s1600/IMG_1026.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGIN5UHIpSINZWEAvRu0omo7VNjKQsQMpw6CvmhxoXYwjdIHuZouWUc6aQ1Hg1oMb7IBmcUW8VCvH5PAaONeKsPimf7sunLCktm3SMebzd1aZ4qbwVRFsDR3gqdccpvlDZZvoGxauuobSU/s1600/IMG_1026.JPG&quot; height=&quot;240&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Step 2: Disable Secure Boot&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;li&gt;Go to &amp;lt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;Startup&lt;/b&gt;&lt;/span&gt;&amp;gt; Tab then set &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;UEFI/Legacy &lt;/b&gt;&lt;/span&gt;to &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;UEFI Only&lt;/b&gt;&lt;/span&gt;. Change the &lt;b&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;CSM Support&lt;/span&gt;&lt;/b&gt; Setting to Yes.&lt;/li&gt;
&lt;/div&gt;
&lt;div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcEphcAvVd8JpTDwo6pUUxIX3muAg9RRR2UCl5TkgTyA-AV_HX_7agCkV8TdfQXMpVH2DpoaBpNosih7QTffR9rvVuFy1hZ7QkEbp4GzwZzIUOEMx4S2MTO7Ld6GkaObZJEnjtFnYxtJhL/s1600/IMG_1027.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcEphcAvVd8JpTDwo6pUUxIX3muAg9RRR2UCl5TkgTyA-AV_HX_7agCkV8TdfQXMpVH2DpoaBpNosih7QTffR9rvVuFy1hZ7QkEbp4GzwZzIUOEMx4S2MTO7Ld6GkaObZJEnjtFnYxtJhL/s1600/IMG_1027.JPG&quot; height=&quot;240&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Step 3. Set Startup to UEFI Only but say yes to CSM Support&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;i&gt;&lt;u&gt;Note:&lt;/u&gt; If you did not set &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;CSM Support &lt;/b&gt;&lt;/span&gt;to &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;yes&lt;/b&gt;&lt;/span&gt;, Windows 7 installer will hang at the windows 7 &amp;nbsp; screen.  &lt;/i&gt;&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;li&gt;Save and Exit. Reboot the Thinkpad T-440s and this time, repeatedly press &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;F12 &lt;/b&gt;&lt;/span&gt;to get you to the Boot sequence screen. Choose CD?DVD Media or USB if you are using a bootable USB stick installer. &amp;nbsp; &lt;/li&gt;
&lt;li&gt;Proceed to the installation until you get to the partition part. Do not partition. Instead, press &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;Shift-Fn-F10.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;A command prompt will appear, type &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;diskpart&lt;/b&gt;&lt;/span&gt;.&lt;/li&gt;
&lt;li&gt;Type &lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;list disk&lt;/b&gt;&lt;/span&gt; to show the list of available disks. Take note of the disk you will partition.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Give the following commands inside diskpart:&amp;nbsp;&lt;/li&gt;
&lt;/div&gt;
&lt;/ol&gt;
&lt;ol&gt;&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp;select disk (disk numnber)&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;clean&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;convert gpt&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;exit&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Continue with the Windows 7 Installation. Ignore the &quot;cannot continue installation&quot; error message.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;
After you have finished installing, you can verify if indeed you are booting your Windows 7 in UEFI mode. On your first boot without the windows 7 installation media, go to C&lt;b&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;:\windows\Panther\setuppact.lo&lt;/span&gt;g&lt;/b&gt;. You would want to see if &lt;b&gt;&lt;span style=&quot;color: #444444; font-family: Courier New, Courier, monospace;&quot;&gt;CallBack_BootEnvironmentDetect&lt;/span&gt;&lt;/b&gt;. It should say: Detected Boot Environment: EFI. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoI8Nge5pFWGORuVRPyTFZTXJ19ZXwiW-4NXJ_OlL1Rqv-k3iWCTJNJ1QzLZdqWGxNPW13keZwAfJ8iq772d19OIzgr1BMSOxwIgG-U2nXcsqzXKLQrEvjlVZJQkQlCE0F3FZkm8VMHRkJ/s1600/Panther-EFI-check.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoI8Nge5pFWGORuVRPyTFZTXJ19ZXwiW-4NXJ_OlL1Rqv-k3iWCTJNJ1QzLZdqWGxNPW13keZwAfJ8iq772d19OIzgr1BMSOxwIgG-U2nXcsqzXKLQrEvjlVZJQkQlCE0F3FZkm8VMHRkJ/s1600/Panther-EFI-check.PNG&quot; height=&quot;235&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
And that&#39;s how easy it is done. Thanks for reading.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;ol&gt;&lt;div&gt;
&lt;/div&gt;
&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/689027259935276743/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2014/06/how-to-install-windows-7-on-uefi.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/689027259935276743'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/689027259935276743'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2014/06/how-to-install-windows-7-on-uefi.html' title='How to Install Windows 7 on a UEFI enabled Computer'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGIN5UHIpSINZWEAvRu0omo7VNjKQsQMpw6CvmhxoXYwjdIHuZouWUc6aQ1Hg1oMb7IBmcUW8VCvH5PAaONeKsPimf7sunLCktm3SMebzd1aZ4qbwVRFsDR3gqdccpvlDZZvoGxauuobSU/s72-c/IMG_1026.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-9047185666977284627</id><published>2014-03-04T18:30:00.000+08:00</published><updated>2015-01-20T11:10:30.221+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="How to Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="switch"/><category scheme="http://www.blogger.com/atom/ns#" term="VLAN"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="Wireless"/><category scheme="http://www.blogger.com/atom/ns#" term="WLAN"/><title type='text'>Configuring Cisco WLAN with multiple SSIDs in different VLANs - Part 1</title><content type='html'>&lt;br /&gt;
note: Screenshots and configuration examples are using a Cisco 2500 series WLAN controller (aka WLC). The Cisco 2500 series controller is connected to a cisco 3750 or 3650 L3 switch. This article assumes that inter-VLAN routing is already working and only the WLAN controller needs to be configured.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Usually, enterprise networks are on multiple VLAN environment. The Wifi access points provide access to each of these different VLANs by broadcasting different SSIDs attached to different WLAN profiles. Let&#39;s say we want to configure our WLAN controller to broadcast two SSIDs namely:&lt;br /&gt;
&lt;br /&gt;
1. GUEST on VLAN 5 (10.8.5.0/24);&lt;br /&gt;
2. IT-Department on VLAN 13 (10.8.6.0/24);&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=3862670861101019814&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;/a&gt;Also, let&#39;s assume VLAN 219 is pre-configured with the following information:&lt;br /&gt;
&lt;br /&gt;
1. VLAN 219 is NETWORK-VLAN&amp;nbsp;@10.8.219.0/24)&lt;br /&gt;
2. interface vlan 219 IP address is 10.8.219.1&lt;br /&gt;
3. a DHCP server located in VLAN 219 with IP address 10.8.219.50/24.&lt;br /&gt;
4. WLAN controller will be configured with IP address 10.8.219.251 in VLAN 219&lt;br /&gt;
5. the Access Points (APs) 10.8.219.248-250, also in VLAN 219. &lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;u&gt;There are two parts to this task.&lt;/u&gt;&lt;/i&gt; First is the VLAN configuration required in our 3750/3650 layer 3 switch which will be discussed in this article. Part 2 is configuring our WLAN controller with the WLAN profiles, SSID, and interfaces. For brevity, I will skip discussion on inter-VLAN configuration and assume that that the network converges, and inter-VLAN routing is configured properly.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
Part 1: Configure the 3750/3650 layer 3 &lt;/h2&gt;
&lt;b&gt;1. Configure the port interface in our L3 switch as a trunk: &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&amp;nbsp; interface GigabitEthernet1/0/23&lt;br /&gt;&amp;nbsp;&amp;nbsp; description *** LINK TO WIRELESS-CONTROLER ***&lt;br /&gt;&amp;nbsp;&amp;nbsp; switchport trunk encapsulation dot1q&lt;br /&gt;&amp;nbsp;&amp;nbsp; switchport trunk allowed vlan 5, 13&lt;br /&gt;&amp;nbsp;&amp;nbsp; switchport mode trunk&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;!The next commands are optional&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&amp;nbsp;&amp;nbsp; switchport trunk native vlan 219&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;udld port aggressive&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&quot;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;switchport trunk allowed VLAN &amp;lt;ID&amp;gt;&lt;/span&gt;&lt;/span&gt;&quot;&amp;nbsp; command explicitly defines what VLANs are only allowed in the interface. In this case, only VLANs 5 (Guest) and 13 (IT-Department) are allowed.&amp;nbsp; This can be optional but I would recommend you do this to minimize broadcasts traversing through the trunk.&amp;nbsp; &lt;/li&gt;
&lt;li&gt;&quot;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;switchport trunk native vlan &amp;lt;ID&amp;gt;&lt;/span&gt;&lt;/span&gt;&quot; command changes the native VLAN. By default, the Native VLAN is 1. But this is already expected so we change it. The native VLAN is where all vlan traffic converges and traverses. This command is optional.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&quot;udld port aggressive&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&quot; is an optional configuration. It detects if the link is&amp;nbsp; uni-directional and adjusts accordingly to avoid spanning-tree loops. All ports should support UDLD aggressive mode in order to work. &amp;nbsp; &lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;b&gt;&amp;nbsp;2. Configure the&amp;nbsp; the VLANs.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;In this example (for simplicity), we will only create 2 VLANs with /24 subnet. First we create the VLANs. I usually create VLANs with names so I can easily identify them.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp; Cisco 3750(config)#vlan 5&lt;br /&gt;&amp;nbsp; Cisco 3750(config-vlan)#name GUEST&lt;br /&gt;&amp;nbsp; Cisco 3750(config-vlan)#vlan 13&lt;br /&gt;&amp;nbsp; Cisco 3750(config-vlan)#name IT&lt;br /&gt;&amp;nbsp; Cisco 3750(config-vlan)#exit&lt;br /&gt;&amp;nbsp; Cisco 3750(config)#&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Then verify if the the VLANs where created:&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;Cisco 3750(config)#end&lt;br /&gt;Cisco 3750#show vlan&lt;br /&gt;&lt;br /&gt;VLAN Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp; Ports&lt;br /&gt;---- -------------------------------- --------- -------------------------------&lt;br /&gt;5&amp;nbsp;&amp;nbsp;&amp;nbsp; GUEST&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; active&lt;br /&gt;13&amp;nbsp;&amp;nbsp; IT&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; active&lt;br /&gt;219&amp;nbsp; NETWORK-VLAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; active&amp;nbsp;&amp;nbsp;&amp;nbsp; Gi1/0/24&lt;br /&gt;&lt;br /&gt;VLAN Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp; Ports&lt;br /&gt;---- -------------------------------- --------- -------------------------------&lt;br /&gt;1002 fddi-default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; act/unsup&lt;br /&gt;1003 token-ring-default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; act/unsup&lt;br /&gt;1004 fddinet-default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; act/unsup&lt;br /&gt;1005 trnet-default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; act/unsup&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; == output truncated for brevity == &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Then, we create the VLAN interfaces and assign the IP addresses. The &quot;ip helper-address&quot; command is necessary if the DHCP server is not in the same VLAN as the interface we are configuring. &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp; interface Vlan5&lt;br /&gt;&amp;nbsp;&amp;nbsp; description GUEST&lt;br /&gt;&amp;nbsp;&amp;nbsp; ip address 10.8.5.254 255.255.255.0&lt;br /&gt;&amp;nbsp;&amp;nbsp; ip access-group DENY_VLAN_5 out&lt;br /&gt;&amp;nbsp;&amp;nbsp; ip helper-address 10.8.6.10 &lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp; interface Vlan13&lt;br /&gt;&amp;nbsp;&amp;nbsp; description IT-DEPARTMENT&lt;br /&gt;&amp;nbsp;&amp;nbsp; ip address 10.8.6.1 255.255.255.0&lt;br /&gt;&amp;nbsp;&amp;nbsp; no ip unreachables&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp;&amp;nbsp; ip helper-address 10.8.219.50 &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;3. Configure the&amp;nbsp; Access-list to allow GUEST VLAN to communicate directly to internet, and not through the internal LAN&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp; ip access-list extended DENY_VLAN_5&lt;br /&gt;&amp;nbsp;&amp;nbsp; permit ip 10.8.50.0 0.0.0.255 host 10.8.219.50 eq 67, 68&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 10.8.5.0 0.0.0.255 10.0.0.0 0.255.255.255&lt;br /&gt;&amp;nbsp;&amp;nbsp; permit ip any any&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;In this access-list, notice that the only allowed traffic to the 10.8.0.0/16 network is to 10.8.219.50 on ports 67 and 68 (DHCP required ports). The configuration does not allow traffic through DNS! That is because the DHCP should be configured to assign a public DNS (i.e. 8.8.8.8). This is to minimize the traffic to the internal 10.8.0.0/16 network.&lt;br /&gt;
&lt;br /&gt;
Next, we assign the ACL to interface VLAN 5 (GUEST):&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp; interface Vlan5&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; description GUEST&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 10.8.5.254 255.255.255.0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;ip access-group DENY_VLAN_5 out&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip helper-address 10.8.6.10&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;4. &amp;lt;Alternative Configuration&amp;gt; - Configure a DHCP for the GUEST VLAN, then configure an Access-List that will ensure GUEST VLAN only communicates to the internet &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Usually, if a Guest VLAN is concerned, I do not use a DHCP server. This is because, as mentioned in item number 3 above, I do not want ANY communication to my internal network 10.8.0.0/16 from the Guest VLAN. So I assign the DHCP configuration &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp; ip dhcp pool GUEST&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; network 10.8.5.0 255.255.255.0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; default-router 10.8.5.1&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dns-server 8.8.8.8 4.2.2.2&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
If I configure the switch based DHCP for GUEST, then my GUEST VLAN Access-list is simplified to:&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp; ip access-list standard Deny_VLAN_5&lt;br /&gt;&amp;nbsp;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp;&amp;nbsp; permit ip any any&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&amp;nbsp; interface Vlan5&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; description GUEST&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 10.8.5.254 255.255.255.0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;ip access-group DENY_VLAN_5 out&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip helper-address 10.8.6.10 &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Isn&#39;t this much simpler? Now, all required configuration in the L3 switch is complete. We will now configure our WLAN Controller.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
&lt;a href=&quot;http://techienoobie.blogspot.com/2014/03/configuring-cisco-wlan-with-multiple.html&quot; target=&quot;_blank&quot;&gt;Part 2: Configure the WLAN Controller&lt;/a&gt;&lt;/h2&gt;
&lt;i&gt;&amp;lt;Please click the link to proceed to Part 2&amp;gt;&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/9047185666977284627/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2014/03/WLANcontrollerconfigpart1.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/9047185666977284627'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/9047185666977284627'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2014/03/WLANcontrollerconfigpart1.html' title='Configuring Cisco WLAN with multiple SSIDs in different VLANs - Part 1'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-4738136549716550437</id><published>2014-03-04T18:28:00.002+08:00</published><updated>2015-01-20T14:26:05.762+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="How to Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="switch"/><category scheme="http://www.blogger.com/atom/ns#" term="VLAN"/><category scheme="http://www.blogger.com/atom/ns#" term="Wifi"/><category scheme="http://www.blogger.com/atom/ns#" term="Wireless"/><category scheme="http://www.blogger.com/atom/ns#" term="WLAN"/><title type='text'>Configuring Cisco WLAN with multiple SSIDs in different VLANs - Part 2</title><content type='html'>&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;This is part 2/2 of the series.&amp;nbsp; Part 1 discussed the assumptions and the required layer 3 switch configurations. Please read part 1 prior to reading part 2 You can view part 1&lt;/span&gt; &lt;span style=&quot;color: orange;&quot;&gt;&lt;a href=&quot;http://www.techieian.com/2014/03/WLANcontrollerconfigpart1.html&quot; target=&quot;_blank&quot;&gt;here.&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
======================================================================&lt;br /&gt;
&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=3862670861101019814&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;/a&gt;&amp;nbsp;note:  Screenshots and configuration examples are using a Cisco 2500  series  WLAN controller (aka WLC). The Cisco 2500 series controller is   connected to a cisco 3750 or 3650 L3 switch. This article assumes that   inter-VLAN routing is already working and only the WLAN controller needs   to be configured.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
======================================================================&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;u&gt;&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;IMPORTANT REMINDER:&lt;/b&gt;&lt;/span&gt;&lt;/u&gt; before you do all the configuration, note that the LWAPP image version cannot be higher than that of the WLAN controller. a quick &quot;show version&quot; command on both the WLC and the LWAPP will save you all the time and effort.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;From LWAPP: the default username is &quot;Cisco&quot; and password is &quot;Cisco&quot;:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;output of show version:&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;cisco &lt;b&gt;AIR-CAP702I-F-K9&lt;/b&gt; (MIPS74k) processor (revision 01) with 73728K/57344K bytes of memory.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;Processor board ID KWC184402C5&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;MIPS74k CPU at 40Mhz, revision number 0x0000&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;Last reset from power-on&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;LWAPP image version 7.5.1.33&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;1 Gigabit Ethernet interface&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;AIR-CAP means this is a Lightweight Access Point (aka a Controller-based Access Point). If it says AIR-WAP, then this is not a controller-based access point and will therefore not associate to the Controller.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;From the Controller:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;(Cisco Controller) &amp;gt;show sysinfo&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;Manufacturer&#39;s Name.............................. Cisco Systems Inc.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;Product Name..................................... Cisco Controller&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;Product Version.................................. 7.4.121.0&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;Bootloader Version............................... 1.0.20&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;Field Recovery Image Version..................... 1.0.0&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white; font-family: Courier New, Courier, monospace;&quot;&gt;Firmware Version................................. PIC 16.0&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;In this case, configuring the WLAN controller and the LWAPP will not work. the LWAPP will not associate. We will need to either downgrade the image of the LWAPP, or upgrade the image of the WLAN Controller.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
=======================================================================&lt;br /&gt;
&lt;h2&gt;
Part 2: Configure the WLAN Controller&lt;/h2&gt;
In  the first part, we discussed the Layer 3 switch configuration  requirements. In case you missed it, please read the first part of this  article here: &lt;a href=&quot;http://techienoobie.blogspot.com/2014/03/WLANcontrollerconfigpart1.html&quot; target=&quot;_blank&quot;&gt;Configuring Cisco WLAN with multiple SSIDs in different VLANs - Part 1&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
As  usual, the first thing to do is plug the WLAN Controller&#39;s port 1 to  the  trunk-configured port in the L3 switch (discussed in part 1). Port 1 is the green colored portin the figure below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9Qq-mqM4S27J3sIL_2yCXp_B2M8SOOvbUy9xsDttraEWNbE4eSbrNULTUaw9RRHv-q1el_utzkWRSnT8BB47HAPZ0l3jmi78baAbEVrOPbweWfU9zCrepYhTKC_u04EPSn3ApWxkQrqF9/s1600/2500+controller.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9Qq-mqM4S27J3sIL_2yCXp_B2M8SOOvbUy9xsDttraEWNbE4eSbrNULTUaw9RRHv-q1el_utzkWRSnT8BB47HAPZ0l3jmi78baAbEVrOPbweWfU9zCrepYhTKC_u04EPSn3ApWxkQrqF9/s1600/2500+controller.JPG&quot; height=&quot;129&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
The  other 3 ports will be connected to your APs (Access Points).&amp;nbsp; For  brevity, we will not discuss configuring licenses and upgrading firmware  in this article.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. Configure the Controller&#39;s via the Start-up Wizard. &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The  first thing we need to configure is the WLAN controller&#39;s IP address,  hostname, domain, etc. The others can be configured once we set-up the controller via its web interface. The simplest way to do this is to  use the startup wizard. You will need to attach the controller&#39;s console port to a computer and open terminal services in your computer using the  following:&lt;br /&gt;
&lt;ul&gt;&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=3862670861101019814&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;/a&gt;
&lt;li&gt;9600 baud&lt;/li&gt;
&lt;li&gt;8 data bits&lt;/li&gt;
&lt;li&gt;No flow control&lt;/li&gt;
&lt;li&gt;1 stop bit&lt;/li&gt;
&lt;li&gt;No parity &lt;/li&gt;
&lt;/ul&gt;
Power-on the device. The controller will show a boot-up  sequence followed by a start-up wizard asking you a series of  questions. If you did not see a start-up wizard then&amp;nbsp; the controller was already pre-configured. to reset the controller, you can use a pencil and hold down the reset button  at the back of the controller for 3 seconds until the controller  reboots and the start-up wizard shows up again. &lt;br /&gt;
&lt;br /&gt;
The startup wizard is straightforward and self-explanatory. You will  need to enter the following information:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;System Name&lt;/i&gt; - the same as the hostname of the controller;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Administrative User Nam&lt;/i&gt;e - the admin user name to login to device;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Administrative Password&lt;/i&gt; - admin password to login to device;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Management Interface IP&lt;/i&gt; - the IP address of this Controller.  As discussed in part 1, the WLAN controller IP is 10.8.219.251 (you can  change this according to your network topology).&amp;nbsp; The subnet mask is /24  or 255.255.255.0; &lt;/li&gt;
&lt;li&gt;&lt;i&gt;Management Interface Default Route&lt;/i&gt;r - is the Gateway IP address. Put the IP address of the gateway which, as per part 1, is interface VLAN 219 which is 10.8.219.1;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Management Interface VLAN Identifier -&amp;nbsp;&lt;/i&gt; &quot;0&quot; or untagged. This is because we will be plugging the management interface (assigned to port 1) on a trunk switchport.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Management Interface Port Number - &lt;/i&gt;this is the port number  where you intend to plug your. We intend to make port 1 as the management interface port. Thus put &quot;1&quot;. &lt;/li&gt;
&lt;li&gt;&lt;i&gt;Management Interface DHCP Server&lt;/i&gt; - &amp;nbsp;the IP address of your DHCP Server; &lt;/li&gt;
&lt;li&gt;&lt;i&gt;Virtual Gateway IP address -&lt;/i&gt;Just use whatever default value is in there (1.1.1.1);&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Network Name (SSID):&lt;/i&gt; This is the defaul SSID the APs will associate to when they go online. You can assign GUEST as the default SSID. Alternatively, this can be configured later;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Configure DHCP Bridging Mode&lt;/i&gt; - No; &lt;/li&gt;
&lt;li&gt;&lt;i&gt;Allow Static IP Address from Clients &lt;/i&gt;- Yes/No; &lt;/li&gt;
&lt;li&gt;Configure a Radius Server? - No. For simplicity, we will not use a  Radius server for dot1x authentication. You can change this later. &lt;/li&gt;
&lt;/ul&gt;
For the rest of the questions, just use the default value or yes. For NTP servers, you can assign an NTP server&#39;s IP address or Fully Qualified Domain Name. If you have&amp;nbsp; none, you can skip this. All the configuration settings asked can be configured or re-configured/changed later.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Once  the Start-up Wizard is complete, and the WLAN controller is already  plugged to the L3 switch, we can access the controller via http or https  (for security reasons, we will disallow http access to it later). &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;b&gt;2. Configure the Access Points. &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Plug  all your Access Points (APs) either to the WLAN Controller, or the L3  switch. The WLAN Controller will immediately know if the APs are powered  up and add them to its database.&lt;br /&gt;
&lt;br /&gt;
In case they are not &quot;found&quot; within the first 3 minutes, you will need to configure the APs via console. The Com1 port parameters are the same as part 1 of this article. Once you are logged into console, issue the following commands:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;a. Assign an IP address in the ap via this command:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt; &amp;nbsp;capwap ap ip address &amp;lt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;b. Define the WLC controller where the ap should attach&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;capwap ap controller ip address &amp;lt;ip address of controller&amp;gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;c. Define the WLC gateway (in our example, the IP address of interface VLAN 219).&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;capwap ap ip default-gateway &amp;lt;ip address of gateway&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
After these series of commands are entered, we will configure the rest via the Web GUI. Just follow the instructions below:&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Configuring APs using WEB GUI:&amp;nbsp;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Login  to the WLAN Controller via http://10.8.219.251 or https://10.8.219.251  (the Management Interface IP Address). Inside, go to the &quot;Wireless&quot; tab  and configure each of the AP radios in its inventory:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Click on AP1PH, AP2PH, AP3PH and configure them appropriately:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgLqMSKARuUAnXK4cfA1ezGtIV2sOxhyphenhyphenmsee9w3TvWwhFA8KtIQ1NdbIL9OqAQSUkietGR-OEgmwse1AnOkXE3Fc8zRtyqYuRysgvUZgrc0xdSA6iDLzz9EK8ec9DP8t6bSonO7e35WRJ0/s1600/Wireless+AP.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Access Point Configuration&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgLqMSKARuUAnXK4cfA1ezGtIV2sOxhyphenhyphenmsee9w3TvWwhFA8KtIQ1NdbIL9OqAQSUkietGR-OEgmwse1AnOkXE3Fc8zRtyqYuRysgvUZgrc0xdSA6iDLzz9EK8ec9DP8t6bSonO7e35WRJ0/s1600/Wireless+AP.png&quot; height=&quot;240&quot; title=&quot;Cisco 2500 Series WLC Wireless Tab&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
In the &lt;u&gt;General&lt;/u&gt;  Tab - specify the Static IP, Netmask, AP Name, Location, AP Mode, etc.  as shown in the figure below. As per part 1 of this Article, the AP  IP addresses will be from 10.8.219.248 to 250. &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYyZ3TW-WVjwmTNR0RqiflME31ZXGtbULCE9pdzzL3B99XxySBaVEFloeqWEIywBsGzZcIpDzEgRc8-vWQhVksfxX2jJrLDxTAsPZdTkmTNRmCTpnkfzNAieFmrh3S7-HjGD2UsPfAjKR2/s1600/General+Tab.JPG&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYyZ3TW-WVjwmTNR0RqiflME31ZXGtbULCE9pdzzL3B99XxySBaVEFloeqWEIywBsGzZcIpDzEgRc8-vWQhVksfxX2jJrLDxTAsPZdTkmTNRmCTpnkfzNAieFmrh3S7-HjGD2UsPfAjKR2/s1600/General+Tab.JPG&quot; height=&quot;326&quot; title=&quot;Cisco 2500 Series Wireless Tab - General Tab&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the &lt;u&gt;Credentials&lt;/u&gt; Tab - leave everything unchecked (default).&lt;br /&gt;
&lt;br /&gt;
In the &lt;u&gt;High-Availability&lt;/u&gt; Tab - specify the primary controller as &quot;this controller&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lastly  in the &lt;u&gt;Advanced&lt;/u&gt; Tab - configure it as shown in the picture below except, put your own country code; and check telnet and/or ssh if you wish to be  able to connect directly tot he AP via telnet or SSH. In the diagram  below, the AP has a power injector and thus is using the power  injector&#39;s MAC Address. In most cases, this is automatically populated.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl3_rznIfZwLwJxt9YhyphenhyphenjaGZm4xSm8P_RhD2SeZPOMd4MVMjLJe_1fJEGNOunASFgv_hF2v7CWGIHeExqriHS7VG3YXcQ3OVJAkgmzbeiiQBv3nSPOIxFjmSlr-wCaPglAhG1bNYjyqroB/s1600/Advanced+Tab.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl3_rznIfZwLwJxt9YhyphenhyphenjaGZm4xSm8P_RhD2SeZPOMd4MVMjLJe_1fJEGNOunASFgv_hF2v7CWGIHeExqriHS7VG3YXcQ3OVJAkgmzbeiiQBv3nSPOIxFjmSlr-wCaPglAhG1bNYjyqroB/s1600/Advanced+Tab.JPG&quot; height=&quot;244&quot; title=&quot;Cisco 2500 series WLC Wireless Tab - Advanced Tab&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Once each of the APs are configured, click &quot;&lt;i&gt;Apply&lt;/i&gt;&quot; in the upper right hand corner of the screen. We will proceed in configuring &lt;i&gt;&quot;interfaces&quot;&lt;/i&gt;.&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Configure Interfaces. &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
An interface is configured to &quot;attach&quot; specific WLAN Profiles to it. The interfaces defined&amp;nbsp; identifies the VLAN association of a wireless profile. We will need to configure interfaces for VLAN 13 (IT) and VLAN 5 (GUEST).&lt;br /&gt;
&lt;br /&gt;
Go to the &quot;&lt;i&gt;Controller&lt;/i&gt;&quot; Tab. In there, navigate to &quot;&lt;i&gt;Interfaces&lt;/i&gt;&quot;.&amp;nbsp; There will already be at least two interfaces configured: &quot;management&quot;, and &quot;virtual&quot; interfaces. In the picture below, I have many other interfaces configured (one for each VLAN I have) in our controller. For simplicity I erased them and showed only two configured - guest, and IT interfaces. &lt;br /&gt;
&lt;br /&gt;
Each interface will have an IP address this is similar to assigning VLAN interface IP addressesin that they must be unique (not used), and is within the VLAN&#39;s subnet. Remember, the interface IP address is not the VLAN&#39;s default router / gateway, nor is it the IP address of any of the APs. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieUktwxHH6BdPOJsXTyz5M2z4KWzhGB6SejEqo7OiA3JbdAXbcDej8wnKEtcsai0NKB8mugSsWaBqaOwmcgDsvzllImDPUy56RsFy4Wyjr_i8g4uPdl62WwXTGxNBrRYMw9yQB2V-GFYyY/s1600/Create+interfaces-WLAN.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieUktwxHH6BdPOJsXTyz5M2z4KWzhGB6SejEqo7OiA3JbdAXbcDej8wnKEtcsai0NKB8mugSsWaBqaOwmcgDsvzllImDPUy56RsFy4Wyjr_i8g4uPdl62WwXTGxNBrRYMw9yQB2V-GFYyY/s1600/Create+interfaces-WLAN.JPG&quot; height=&quot;252&quot; title=&quot;cisco 2500 series WLC Controller Tab - Interfaces&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
To create a new interface click &quot;&lt;i&gt;New&lt;/i&gt;&quot; in the upper right corner (not shown in the photo above, but it&#39;s there). In the interface name, type &quot;guest&quot;, and VLAN ID is &quot;&lt;i&gt;5&quot; &lt;/i&gt;(since our Guest VLAN is 5), then click &quot;&lt;i&gt;Apply&lt;/i&gt;&quot; in the upper right hand corner of the screen. You should be directed to a page like the one shown below. Put the IP address, Subnet mask, and DHCP server (we specified this in part 1):&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once completed, click &quot;&lt;i&gt;Apply&lt;/i&gt;&quot;. Then, repeat the configuration but this time for VLAN 13, IT. By the end of this exercise, we should have at least 4 interfaces: management, virtual, guest, and IT.&lt;br /&gt;
&lt;br /&gt;
Now, we can configure our WLAN profiles:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. Configure WLAN Profiles:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Go to &quot;&lt;i&gt;WLAN&lt;/i&gt;&quot; Tab. Inside, click &quot;&lt;i&gt;Go&lt;/i&gt;&quot; with &quot;&lt;i&gt;create new&lt;/i&gt;&quot; shown in the dropdown list:&lt;br /&gt;
&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEDBB7jvEHEMNjlG6ECudXhyphenhyphenf_ctcimQ-IZgZUYBacUXkc4p6LNBz3nsRSB_O_ULjBrB8Lsa9uRJmiY0uUzirZRajfGZsUowq9xrZQSf0gg6H1txaBM2H7tYHmjKWtxVQrVb-yCU5niqVI/s1600/WLAN+Tab.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEDBB7jvEHEMNjlG6ECudXhyphenhyphenf_ctcimQ-IZgZUYBacUXkc4p6LNBz3nsRSB_O_ULjBrB8Lsa9uRJmiY0uUzirZRajfGZsUowq9xrZQSf0gg6H1txaBM2H7tYHmjKWtxVQrVb-yCU5niqVI/s1600/WLAN+Tab.JPG&quot; height=&quot;230&quot; title=&quot;Cisco 2500 Series WLC WLAN Tab&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
We will create two WLAN Profiles: GUEST, and IT. Both their SSIDs will be broadcasted (seen by wireless clients such as laptops, and mobile phones). First, let&#39;s create the GUEST WLAN Profile. As expected, the interface configured for GUEST is &quot;guest&quot; configured in step 3.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsHbjcWeqLconxlZbYL-4aXUL0nwQZWAW365-f0S6IMtasGi7wBHSTW8Tln28mYyve8_ulUagrKQBJA5DCTpCB-x5P38kplqaAiagNktSwQmRIC59wVLWIYVBwVE8qM9s7lEwWqni-jjKy/s1600/WLAN-configure+General.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsHbjcWeqLconxlZbYL-4aXUL0nwQZWAW365-f0S6IMtasGi7wBHSTW8Tln28mYyve8_ulUagrKQBJA5DCTpCB-x5P38kplqaAiagNktSwQmRIC59wVLWIYVBwVE8qM9s7lEwWqni-jjKy/s1600/WLAN-configure+General.JPG&quot; height=&quot;354&quot; title=&quot;cisco 2500 series WLC configuring WLAN profiles&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;Profile Name - &lt;/i&gt;Can be anything. Let&#39;s be consistent and name it GUEST&lt;i&gt;; &lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;SSID&lt;/i&gt; - can be anything. It is the broadcasted name of the WLAN. In the example, we named it _GUEST;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Status&lt;/i&gt; - if enabled checkbox is checked, then the WLAN is useable. If unchecked, it is configured, but unuseable;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Security Policies&lt;/i&gt; - this will be configured in the security tab.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Radio Policy&lt;/i&gt; - determines if the AP will use 802.11a, ab, b/g/n, b/g. Let&#39;s stick to &quot;all&quot;. &lt;/li&gt;
&lt;li&gt;&lt;i&gt;Multicast VLAN Feature&lt;/i&gt; - by default this is not checked (disabled). Multicast is required for wifi users using bon jour services (Apple TV, iTunes on the air), as well as other peer-to-peer services. Configuring Multicast VLAN features will be discussed in a separate topic. &lt;/li&gt;
&lt;li&gt;&lt;i&gt;Broadcast SSID&lt;/i&gt; - when enabled, broadcasts the SSID. Thus, wireless clients can see the SSID of this WLAN Profile. If disabled (unchecked), the SSID will not be broadcasted. Association can still be done by manually configuring the Wireless Profile in the client device. Note that SSIDs are case-sensitive. &lt;/li&gt;
&lt;/ul&gt;
The next step is to go to the &quot;&lt;i&gt;Security&quot; &lt;/i&gt;Tab. We will configure GUEST with WPA/WPA2 authentication using a pre-shared key which you will specify. Keep the Pre-shared key secret and change it every once in a while.&lt;br /&gt;
&lt;br /&gt;
The other authentication method is dot1x but we will discuss that in another post. For the meantime, we will stick with WPA/WPA2.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAgUAAAHsCAIAAADNXUmNAAAgAElEQVR4nO3d3W8bV37/8flLcpvLgIBu/LtusV1vrwIEBRY7+6Q0jXtRoCjQ7EUBxxdsLhLZya7j1AvE9cZNNmUcO1EixA+x5di7qROL6weJki3JViRZsqkH+9SRtHKzMX8XZ2Z4zpkz5JAaDmfI9wuDhB4O54EP38+cc0iNI4SoAQD6nkMeAABq5AEAQCIPAAC1GnkAAJDIAwBArUYeAAAk8gAAUKuRBwAAiTwAANRq5AEAQCIPAAC1GnkAAJCa5sHkiQMvv/zyywdOTBpzXn75yAVzqSMXLMvbXDjyssdc0F+7Nj/eStsWHFFIxBa93T9ywbpvkycOtLqn6grNmQHt3kaPkDPjHpW6Gduzbl3DgQOWzQPItebtg1DhqdePYJ5SE2OV7sgSpBahcNzkIQ/kXTvNg8g9CpZIKA/MzFHvJA+A/tI8D8xarFQQc96RC/FKt1czjxyxLKoWIVvexHfhSNwHtLx6azFW72o1D+Qe6JmibSAUk7HzoNGu+GvVAyR8WFGNxE4FNIBuiDF+oBcDr94dUOfVe4tiVaGgZNqW1U5K/XtCC2qntREnqZZ2TKwjbLiMXF1E+8A4oW6lWl440qTUy9mhVloieWDkevgRllWpOwygJ8QZTw5XvwMnJuXMcAQ0r0JK0bEs7M86oA4j2CJJE1GYrOESuVjTBaxbTSYP7M9P06V2mAfqU9motne4vw5AJsTJg3DFO3LBLyX1W3pbIbp0NKlZwZwLSu+FLXEan0zbNhlZpZv11hsdKfqAeiLjB+GdSSwPIo/K8txEPZHkAdAPYn3fNKjAlo4hfWbz0mHUsdDiltPtYBOW9kELPRbRe9akcoYfmPh4cqPdtLc6GuSBnsxN8iB6C7GeOgC9I97vD/zic+SIUk/8rqMTWgVsUjosfT16DdIe7y0dGnkOrSX+15lsCdJknyMbMR3Jg2bfNWo1D1rYFcs4trYL5AHQ02L+Hs36BVG1UNnrecP1GOztiyZdPdZvp9rubljN4rVpUmofRHeB2aq9tpC+K82LeOOga7gggN4TMw+Uwmr/8nq8r4ZaK531S48NQqdZj1N473b6/aLWxw929s0b2y/+gsMxkzL8w5CYPXeWdYTXqe0QeQD0tLh/ryIorlpNsMyN7LUOvpMUVW0a/NxX34ptE5ZS1fLvD2z0UWvbnQ0aNO2HQpzfkkUsY01S+1FFLMP4AdCfYv/9Ivupo9/Bb6veoSpzIrSw8Zio37OZp8bmVnb6Nfg4lVNrbjT8exXx2yVNxPjqT6NFYh1VaB18vwjoW/w9OwBArUYeAAAk8gAAUKuRBwAAiTwAANRq5AEAQCIPAAC1GnkAAJDIAwBArUYeAAAk8gAAUKuRBwAAiTwAANRq5AEAQCIPAAC1GnkAAJDIAwBArUYeAAAk8gAAUKuRBwAAiTwAANRq5AEAQCIPAAC1GnkAAJDIAwBArUYeAACk1vLg3oPt9y8u73tv5vk3xn/5+o0emJ5/Y3zfezPvX1y+92DbesgrKytjY2PDw8NHjx493Ive+u2Rt48dv3Dp8srKSsZf9KYvVqb2NmvPDNBUC3lwurz64sGJI+dWT93YKs8/+dNCrQem8vyTUze2jpxbffHgxOnyqnHIk5OTw8PDo6OjU1NT1WpV9KJqtTo1NTU6Ovr+BycnJyez/KI3frGytreZemaAOGLlwXd/ebL/5NxrHy2dGX98+U6tJ6cz449f+2hp/8m57/7yRB715OTkxx9/XKlUul2xU1KpVI5/eHJ8opL9Fz38YmV5b7v7zADxxcqD331+99WPli9M13p+evWj5WPnl2q12srKyvDwcP+EgVSpVN797xOy4yj7L3rwYuVib7v1zADxNc+D+ZU/P//G+GfjT05N1Hp++mz8yfNvjC+u/nlsbGx0dLTb9bkLRkdHRy9dzsWLHrxYudjbrjwz6RQR9IzmeXDs/NL+T9c+/FOtT6b9n64dO780PDw8NTXV7eLcBVNTU28fO56XF12+WHnZ2/SfmXSKCHpG8zz41dGbh84//s8va30yvXlu+9/euXX06NFeHUBurFqtvvXbI3l50eWLlZe9Tf+ZSaeIoGc0z4MXfjN+8PyTN0dr+ZxG/p/jOM7As8fiPuQ3575/8eDE4cOHu12ZGyoXC47jOI5bSn7dhw8fzsuLLl+sjuztsaGnWnzndHBqfWfkM5NOEUHPaJ4Hv3z9xsHztRankV2OYXBPyytJZJJ7MvDsOy086pev32gjD0qucciFYjn5Yu3R8kBuObHNHT58OIkXPe4rvme38by1/GLtbG8j9vMdvwS3sjOdmtramV++fiOdIoKe0YE8eGUw9Kke2dW1z1U6eeBlgXK2XnI7mgeWrXc1D7wXPaitMZ92ryjveqX9t0qbeeDtsLF1ZSIP0H8Sz4PwJ9yYpp992jE/isHbfY/3KX1qz3Sj5YOt7Bl6ynGcp4f2mienwScnlTwIx4HGP5k3F9LmO27JnyEru1rl/Q0UiwVvXnCv3iwpuK6yivo2WgmL1vPAe420F10W3KeH9upvDC02zBRpZ2ovD2SjZNfuQcdxnN0j5m7rbyS5cPCe3LtnwH9UxLsu9vvZ37T1TW7fGfIAnZN0HnifhKhPuFqdldveoxxn94i+hojljc9hveiE9yGVPAgV9lBWRJf4kr+GGHng0fJAmO0D7V/eGlsaZmg5D6xnr9rM8Gs3uOe88robdbDjeRDsg7Izxj6rt7Vss4Wf8a5r8n5WToPqoRL1oQjdJg/QMUnnQeMzPv2csX7aFVU7opa3t0Ks/dcpjR/oiRBU7ehabe3jado+0PqjIrah/rMctCdSyAPjRa8/894JteV19O9SGeneiTxQ3ldeQ+GVWn1n5A5o70mZAUpptrd7jDxo8n5u/KGI3hnyAJ3S0faB+lFR6oKuQR5ELh/OA8saUs0Day4UimVLTqjzjfP2ZPKgngJtxUHy7QOlg8XMA3/SOkz0u5LPA0sg7R4xbhsHJe8KyrS3h1HvusbvZ7V7ypqIah7YdoY8QId0fvwgst0dVVCanU/ZtqKfgXYxD0LVOmqst4Ptg+gBi3gSHz9o0D5oUKk7lgfhL79575ZGJdhrFgzuetoxQsLyrttB+8DMCfIAKerc94tCY8VKv79ax3e90rSvObR8OHXUD5XWZ5XWeLJW2WWBloXYLOVypMA+fqDNbDUPIkaqW/+FQgLfLzLrV8T4wSuDeh3Ue/M7lAdml6YSZpYxgOAQlBZMsM9R77qY72dt/CDqQ2HdGfIAHZH+7w/071don8Pw5ydiedv4Qf1r7LsH024fhH56oMeD2Wnkl2jLMHSofylOHiiPMgYR2voSamd+f9Dg+0WKFgcPWs8D/+2kdNp47xy1KVNXf+cEdzV/18V/P9u+X+QY4xm2nSEP0AkdyoN8TzvvL+q6dr5X5Gs3D7R611Kfzw5frD58i8Z8ZtIpIugZ5IH9g5TzPGjyg4jGdpYHNXtToJMvVh++RWM+M+kUEfQM8sD+Qcp5HuzIjvMg7RcrR3ub8jOTThFBzyAP7B8k8qDrr0L8FytHe5vyM5NOEUHPIA/sHyTyoOuvQvwXK0d7m/Izk04RQc8gD+wfJPKg669C/BcrR3ub8jOTThFBzyAP7B8k8qDrr0L8FytHe5vyM5NOEUHPiJUHfTiRB0w9MB0GWtE8Dw73cWUEgP5BHgAAhCAPAAASeQAAEII8AABI5AEAQAjyAAAgkQcAACHIAwCARB4AAIRINg9WVlbGxsaGh4ePHj3apZ9bJ++t3x55+9jxC5cur6ysWI/63oPt9y8u73tv5vk3xrv+9wl2Pj3/xvi+92bev7h878F21AvdY4echacUyILE8mBycnJ4eHh0dHRqaqparXZ4t9NTrVanpqZGR0ff/+Dk5OSkce/p8uqLByeOnFs9dWOrPP/kTwu1vE/l+SenbmwdObf64sGJ0+XV8BPSe4fc9acUyIhk8mBycvLjjz+uVCqd3+GuqVQqxz88OT7hHeN3f3my/+Tcax8tnRl/fPlOrfemM+OPX/toaf/Jue/+8qRPDjn9pxTIlATyYGVlZXh4uLfDQKpUKu/+9wnZcfS7z++++tHyhelab0+vfrR87PySPPw+OeQ0n1IgUxLIg7GxsdHR0VT2tvtGR0dHL12eX/nz82+Mfzb+5NRErbenz8afPP/G+OLqn/vnkFN7Srv9XgZMCeTB8PDw1NRUKnvbfVNTU28fO37s/NL+T9c+/FOtH6b9n64dO7/UV4eczlPa7fcyYEogD44ePdpLA8iNVavVt3575FdHbx46//g/v6z1w/Tmue1/e+dWXx1yOk9pt9/LgCmBPIj5BaSecfjw4Rd+M37w/JM3R2v9MP3m3PcvHpzoq0NO5ynt9hsZMKWfB+ViwXEcp1As72C321dyHY1banUNh1u+vPD0s087juM8tWe6G9fRHdmlH7Hz9NDe1q/E2+IhG5se3JPMXfVpz27jqAaefSf957b96Zev3+jE2xvYiX7MgyACvGxoMRJymAf1WumV0d0jrRavdvLglcGgWu96JYm76kdk3KsdYy4m8gAZlJ08ME7c5f3mwvq/vX/pJ/p+kS8WC01jRy7bYjQllwfGmbusaObCe/cMKCf13r16ufTr456hp5qe/stq22ITob08kNmza/dgOIHau0s7hMjWQ6yn6NndtifZ21zsJ1mJruj0Ig+QG9nJg/AibkkYJTvqjvBtPVba3xWLjrQP3hl6KqhxWsn2HrvrlaAkydgI3/Y1rPV7djfbk8TyQO7V4J76jR3eZTxX1ioc+yna+ZOsvmStT+QBMihTeWA0EeQZv1Lry8opv35qr/wrdieQ37potecq0TwwmgiyuChl6J3Q2ahf7pXKHu4/iarOTRdLLg+UvfVO+V/Z2V3K5J3OGwW6tadIvig7eJL9xkF73YDkATIoM3mgzZY13SvpQQqocaB1FflayYMge1oeUE4sD7wTTPX00zvZlPXuqT3TwQ17EWwhD4wq1tpZbRt5oDZE9N6YNu9q8MQGT0VLT9HOn2R9TLu1AQzyABmUlTzQ52p50GiYwHJuHycP2g8DkVwe6AMDeveI1iXiz4zs+m8lD7QQ6lwehL7UVD+Q9u6Klz0tPUVes2BwV9BQaPdJbmOUnjxABmUlD2xDAEGxVgKhXsAtCynjCg0qvR8G7X7DKbH2gVp6zNN25cy3XmXMkrR3z4DS5R2RB+8MPaVUNz2EOpYHEYez65V27zJWru2/GqUtPUXKk1xfYRtPcjvfHyMPkEFdywONWsgdx3FdrX1Qv8/eqLCuJiIPzJ8fmCkTQ9t5oNk9clDtcNg9aA6fesXROJE3VxUrD2ybbmlqMQ/8nVQ25B2pdzLe6l16eunf6gkt0MJTFPQOReZE9BqMnqU2huhb+dQAacjH75PV7xV1Xet50M4Uo/c8vand36MxNXpKu/1GBky5yIP2fjfWKankQStDAqkUL/Ig8ae0229kwJSLPMiWdNoHmZrIg048pd1+IwMm8qBl5AFTIk9pt9/IgIk8aBl5wJTIU9rtNzJgIg9aRh4wJfKUdvuNDJjIg5aRB0yJPKXdfiMDJvKgZTIPmJh2OB0GMoY8AAAIQfsAACCRBwAAIcgDAIBEHgAAhCAPAAASeQAAEII8AABI5AEAQAjyAAAgkQcAACHIAwCARB4AAIQgDwAAEnkAABCCPAAASOQBAEAI8gAAIJEHAAAhyAMAgEQeAACEIA8AABJ5AAAQgjwAAEjkAQBACPIAACCRB/1rcurW2XMXP/jwE6ZcTGfPXZycutXtdw16GXnQvxYWV6prTV59ZEd1TczMLXf7XYNeRh70jnLxe8epOU7NcbfiLL+wuJJOIUNSyAN0FHnQI0puzXG+K7XyEPIgd8gDdBR50BPK2wXZMnBqjvN9sRzrQeRB7pAH6CjyoBeUi997MVDeLji1QvHbOI8iD3KHPEBHkQdZU3Idt6VuH5FUHowMOoMj3u3poQFnYGjauGd6aMCpCxb2FjFnRUp6Q3KW4ziOsqqeRB6go7KfB+3Ux51szFew97qUiwWlUnVw18rFQsQu2Jb93nFqbkkJhhjMPJgeGgjq7MigUlynhwbkzeCGt4hRyNU6rwjNTnhDI4PB3dqiPYg8QEeRB/q2ghJccm2JYMzt5L61kgdCfFsseOMH8Xco1F9Ur8IjgwNDI0MDsujWZ2tlWq3z3k17IITndmhDNS0behF5gI7KYx5op+jyvnKxoC5VL9vKsn51LRcLhWLRbXZ6r2SDuuWoGm3ZUHimeizBbWN/5HzlkW4p8uh2Jjx+4Jfh6aGBwRG/6Cq1WS3Tykm+Wt4t5+eW4t2ZDWkNjzxybNQFyAN0VB7zQFGvlEqR1GYGjw1qeblYaN7PY5RgdW9s3UnWDal1u+S6peg8UPfHn69lj/Xo6pz6l4u8qfHRSZbxZFmZp70TdnmyrZRzrVtfLdi22/oYgDEUkOSGlJ3Pf+OgQRjUyAN0WD7zQOnmD0qppQxriwWLxuiIiXEG7q/bLUVtyLLj0e2DcB+UPtsaMjtk+36R1z2v9OIP6YO/4YobqvuWOh0+aU94Q/qwdL5FhUGNPECH5TAPSq5jqarBbWWOvWnRJA/KxUL8iuttwbqhRPPAcnQ7ZssDWXPVbpsBpTLbyrR5Vh7us7HmQZIbGhmM+82mvLCGQY08QIflMw/Uoqp3teg9Odrd5WKhaftAX1/TfQn+bduQFixBf5E/p/6I6DwIbSzUT7Uj1t8fTA8NKMV1ZNA8C49x8m/Osg/+JrahULOht6JBQx6go3KRB5aeGP9frlahw33r9rHneN8ltUSDsYTeoRN+XGiQuT6jvucReRAcppoziX6did+j5Q55gI7Kfh60oLWvaOZN4kdHHuQOeYCO6qE8aKnjP3c6cHTkQe6QB+ioHsoDtIjrH+QL1z9Ap5EH/Wt19cFi9SFTjqbV1Qfdftegl5EHAAAhyAMAgEQeAACEIA8AABJ5AAAQgjwAAEjkAQBACPIAACCRBwAAIcgDAIBEHvSv/QcOxJkiH1/6znG+9//E3pbrX6ozyT/JDSBF5EH/2n/gwEYz9jwobxe86v9dSQghvi0Wak5hu1y/ASB/yIP+JfPgxCenjenkp2c+PX3u7PkvIvNACK9B4G4JIRsKtULxW9GdPFCvUtde4yTJq5AC+UUe9K8gD65crQTTtfGblZuzM7fnvrj0x0Z5UN4ueBkgysXv/Y6jIA9Krn55OfPf3sXfml2Azn5ZavsV6qIvPQ0gFvKgfxl5UL4+eaMyfXPmzu25+YXFu1/+z+VGeVD6LhgqqOdBPSRKrlMoBFW5XCwUCgUjH9yS5XLUeoG3FfYG5/LkAbAj5EH/CvKgfH3q2sStiamZmdtz8wuLS8vL9+/fHyuXG+RByQ0GD+p5oDQUtHpfLhaM4u/9w5wXp4qH88DoL1KaGMEFqs3mRLlYKBSLwfWptTW4bqjtYb04NtBzyIP+JfNg+LPPKzdnp2fnvplfvH///tra2vr6+vr6+kRl0p4H9cHkml/9w18ukhXW/2+hWFbreP38XcmAuCf1Wn+RWxKW8QNtVWp+BHeUiwUnHE9y5a6fcoX6zGB1jDSgl5EH/Uvmwamzo7fn5u8uLa2srDx8+PCRb/b2nYbjyY15dVN2FBWKZbWSquW6fruFPGjcPtBXpQ83+BFibMw6Iu0vY2vYAD2JPOhfMg8+H724eHepWq2ur68/evRoY2Njc3NzY2NjfmHBmgdOvXEQOdkqbHDDHDJ2wm2FRlrPA0sBJw8AC/Kgf8k8uPiHL2UYCCE2Nja2fMvLyztvH1jmmGW/3i9TLhaM8WSvqynmmtU8qC+jdAF5IxmitTxQ16atGeg15EH/knnw9ZWxiYnKzMzsN/Pzy/furayurq6tra6uVasrncgDywm2UYSbf9+0WR4EvUSWBkkwK3YeqCswviUF9BbyoH+1//vkvhWzTwvIJ/Kgf+307xf1C7V9QeMAvYw8AAAIQR4AACTyAAAgBHkAAJDIAwCAEOQBAEAiDwAAQpAHAACJPAAACEEeAAAk8gAAIAR5AACQyAMAgBDkAQBAIg8AAEKQBwAAKY08uHH84DMv7Hvu+KwQQogrL72w75kXDh66Vb/rmUNX/PnKdOiKso7g3vdGYhxVx7Y4e2iv+hDrzjRebbdoTwIAhKXSPrh16rkX9j2z99QNIcSl92SVlMV65NC+Z17Y99Il4Rcsr8LK+X5Brz/KXzi8fr3SdWqLs4f2+hkgF5Cb0DRcbdeQBwCaSKe/qF4ibxw/+MwLB5/bK8+a5em2LJ1aGdVP8L2qGnm6Hc6DTm8x9PCo+cpqjbZFsMNy/sFDx4OAiVrSW/Mh2cR5Yd9zx2dv+LeVndQaKJZNe0uGF7PujKhvIiqPAfSElMYPRg7JujZ7aO++Zw5dGTkka82Vl+qn2GoZ9eqXX3qCuyJOci150OEtipjtA2O16g6by3iTsUJtSa+CP3d81p8v67i6k+oBqls3DiRqsdDOyMPMRJcXgM5KKQ/kOeZLl668VD+r9U5C9V5+y3mo0uOvd7/4NVGftHGChLcY8DdtO1mOXG1oh9U8sPV3mUuqSRNOnYOHbmndXPq5v54HkYuFdkZbku4moJel9f2iW6eee2Hfc4fee07WR/nPvQdtp+QGo/Mk6iTa2mjo0BaV83SLiNV6hbVhNW+yZOw8iGy16HlgWax5OGVgLARAR6T2fVPj6zrhb+9ElFGtw0SE+j2CZcKnrp3ZYqOWQcPVqh0vlv6iUB5YloyRB/5hBrs3ckjtCDKGIpoupjGGWAD0mPR+f+CN0PrnpMY/o8pouLtG7czx2POgE1sMfZfUEgxRzQ5ljHrvwUZ5ELlknDwQ4faN3MPQyLN1MXNnjMFkBhKAHsbv0QAAQpAHAACJPAAACEEeAAAk8gAAIAR5AACQyAMAgBDkAQBASiMPBg+8x8TExMSU8Yn2AQBACPqLAAASeQAAEII8AABI5AEAQAjyAAAgkQdI2/4DB+JM3d5NoO+QB0jb/gMHNpohD4D0kQdxlFzHLWk30D6ZByc+OW1MJz898+npc2fPf0EeAF2R+TxQK3C5WHAKxbJxT7lYcOq0cl1yQ7MUDR7YYCewU0EeXLlaCaZr4zcrN2dnbs99cemP5AHQFZnPg3KxENTikus4QSCUiwV5M7jhLWIkRnQtj36giTxIkpEH5euTNyrTN2fu3J6bX1i8++X/XCYPgK7IfB4oVbvkFoqlYkFW5vpsrayrpdu7GVnMIx4oGxVam8HWX6S0LgrFshpbokm69LsgD8rXp65N3JqYmpm5PTe/sLi0vHz//v2xcpk8ALoi+3kQlO1yseCW/Iqs1HK1rCtlWc0Re3G2PVDrkgoeGM4DdZ0l14sdZY9oT0STeTD82eeVm7PTs3PfzC/ev39/bW1tfX19fX19ojJJHgBdkYM88Ipw2WsZlNxCsRxxol7vTTKLvS0QbA/UGxP+v0J5YGtzBFuhcdCYzINTZ0dvz83fXVpaWVl5+PDhI9/s7TvkAdAVecgDfxxAGS4o6qPM4fKrjxWrQaEtE5q7gzzw5zLY0ITMg89HLy7eXapWq+vr648ePdrY2Njc3NzY2JhfWCAPgK7IRR7I4q72DxWUSh5R1rV51h4c2wPV/qL67VAeGN1K2oA3jYMmZB5c/MOXMgyEEBsbG1u+5eVl8gDoilzkgQyEoJ6XXK3mWsq65RTdMqt5N1L88WTlsTQOmpB58PWVsYmJyszM7Dfz88v37q2srq6ura2urlWrK+QB0BX5yIO8iEgYaPh9MpBN5EFy9J/LIQp/vwjIJvIAACAEeQAAkMgDAIAQ5AEAQCIPAABCkAcAAIk8AAAIQR4AACTyAAAgBHkAAJDIAwCAEOQBAEAiD5A2/p4dkE3kAdIW9feut7e3Hz9+vLW1xd+7BrqCPGib7SI5iEHmwYlPTqvTV2PX3v79hZf+/YPZububm5vkAZC+zOdBSb9SsnKBAfXalXVaZZbXr7TMirqkcsO1NdgztCDIgytXK3Iauza5/uB//+4f3/6rH//69Oi1ra0t8gBIX+bzQL0CZck1LqNcLAvjomTahZNLruOW9LJdcpXLHtsSIXptJvKgTUYelK9PfrOwfPLU1b/+8a///qV37927T38R0BWZzwOlQJfcQrFULMgiXJ+tX6RSqdLezci6rWSDbXPa2pRmRfyLKhtXU26YLn0kyIPKrdtzC0uVm7OPvt346T//7gc/Ofj5pcmZ2VnyAOiK7OdBUKHLxYJb8ouvUrbVCq5UYDVHIhoCtpywrU3rpwrWFs4DdUMl18siZTdpTwgh/Dz441flr67ePnbi8vqDB2e+qPzwp4ee/9d3t7e3K5VJ8gDoihzkgVdvy17LQJ7V28/JlTEBo66bgRB5rm5bm9nl5Hg7YuSBrSESbJrGQUDmwZ1v5v9pb+kHPzl4dWLhH371+x/9/K3PRitbW1uzt++QB0BX5CEP/HEAZbigqI8yhyutPiysDx43vO69bW07yAN/LoMNdTIPylev35mv/o375g9/duhHP3/rF//yX9uP/29jY2N+YYE8ALoiF3kgi7vaP1RQinZEBdfm1TtrSm7jbw3Z1qYGSP12KA+MbiVtFJzGQZ3Mgy8vf72yJl49fHb3z97621/8x0enr8sfHywvL5MHQFfkIg9kIARVvOSap/uW3iCz5gedTnqzIbqDx7IHrY4nK4+lcVAn8+DrK2PT0zNzC9XXDp95/e1zj77dWltfX11dq1ZXyAOgK/KRB7kWkTD9S/198ubm5uPHj7e3tzc3N9XfKpMHQPrIgw5rOFjRn/j7RUA2kQcAACHIAwCARB4AAIQgDwAAEnkAABCCPAAASOQBAEAI8gAAIJEHAAAhyAMAgEQeAACEIA+Qvp75+0U9cyCARB4gberfN1Vtb2/LSyDk5e+bRtJQYtAAAA1ISURBVB0If6gVOUUeIG2yjJ745LQ6fTV27e3fX3jp3z+Ynbu7ubmZizJqPZATn5w++emZT0+fO3v+C/IA+UIeZE3vX1kzKKNXrlbkNHZtcv3B//7dP779Vz/+9enRa1tbW7koo+EDuXK1cm38ZuXm7MztuS8u/ZE8QL5kPg9K+pWSlWsJqJepjLjgmbxUpWWWeUll6/32C6h1QJ9dMccoo+Xrk98sLJ88dfWvf/zrv3/p3Xv37ueljIYP5EZl+ubMndtz8wuLd7/8n8t5ORBAynweqBebLLnGZZSLZWFUU+3CySXXcUv6+XbJVa5wbEuEbpye92seVG7dnltYqtycffTtxk//+Xc/+MnBzy9NzszOhspoONcjYtu4HmqHX8ngQMrXp65N3JqYmpm5PTe/sLi0vHz//v2xctk/EHNv/bMR/YWXO++WlOXlATQ44wGSlPk8UD4zJbdQLBULwWfEm61/qJR67t2MrPBKNqgzLUuXXMd1XeWDHOya1tYoFwuFYlEu5xb1qyb76RNelXFpZv0AbBdttuxJrsgy+sevyl9dvX3sxOX1Bw/OfFH54U8PPf+v725vb1cqk2YeWHPd/jKpT0nHo10eyPBnn1duzk7Pzn0zv3j//v21tbX19fX19fWJ8IGYu6S8dc3r6Bnt4ogzHiBR2c+D4NNQLhbckv850T9JwQdEaU2oOWL7BEVc5d564llytTNQeVNdbcn1dko9fVMW0B6lFvd6jti6wcJtGeue5Iwso3e+mf+nvaUf/OTg1YmFf/jV73/087c+G61sbW3N3r5jlFFbrttqferNLHkgp86O3p6bv7u0tLKy8vDhw0e+8IFE5oHloqqRedAHA0zomhzkgfcBKHstA3lWr3wotNa0mgzW2/V12mtHZPvA/HBaFjS3E/xb2ZpZ1ULdBv4C9vPh6DKRH7KMlq9evzNf/Rv3zR/+7NCPfv7WL/7lv7Yf/9/Gxsb8woJWRu25bu8vKqXbcpIH8vnoxcW7S9VqdX19/dGjRxsbG5ubm5YD8XYwlAcl6xW2o17o3J4FIA/ykAd+f4EyXFBsVhaNjmStQjS8xH2SeeAvpC5qO8vtyzz48vLXK2vi1cNnd//srb/9xX98dPq6/PHB8vKyWkYjcr3JSbIfDGn0F138w5cyDIQQGxsbWz7jQGy77Y0YuJaTE/N7FLY3MpCwXOSB/Dyo/UMFpRLayqJ5+m/vr7GJnQdGf06orgeP1D/DRjYEqwoFhrr++u3eyYOvr4xNT8/MLVRfO3zm9bfPPfp2a219fXV1rVpdUcpoVK7H6jTpdM9KcCATE5WZmdlv5ueX791bWV1dXVsLHYh1jxr0afbCC43cyUUeGB3zJdc83bdUYbMQBJ1Otn4GfTnr+IHtw2kdTzY+t2b7Xlu/dkhOaDzZGGk2jyyvZUL9We/m5ubjx4+3t7dlH4v5s97IXLeVenNeSuPJrfw+OXo82Wy19sILjdzJRx7kV+ijzGhgC3/2JzLX7bFtpH3Ha2jrf7+oQR4I5bQn/H1T8gBpIA86qcn3RgAgQ8gDAIAQ5AEAQCIPAABCkAcAAIk8AAAIQR4AACTyAAAgBHkAAJDIAwCAEOQBAEAiD5C2yalbZ89d/ODDT5h2Mp09d3Fy6la3X0z0FPIAaVtYXKmuNXnXoanqmpiZW+72i4meQh4gbQuLK+lUzJ5HHiBZ5AHSRh4khTxAsno4D/jL0hlFHiSFPECy8pIH8gohzeq79ULE8Zb2r2XbdoKUXP3h5r9b1bsXQSEPkkIeIFk5yYOS67il5if8beeB5cI1beyicllneZFn8sAmlAfTQwPKZc0GR6yz/fnTQwMDQ9P6Q4OH9BnyAMnKRx7UL5JYL7DGhen1iyP7S7v+hQdtpdWvuOEwMC+MbF4FOXT1c2FEVrlY0PJLu5KjnGnuXknbVculk3uGLQ/qJX5k0BkYmq7/vz5bVn1l4emhAW2ZvkMeIFl5yIP6mbJah8N5EG4f+EuYF7VX1ltqfEnLYI3Kpu1rk4/y/1soluvrse62sXuhXe2v9oFS1mXl1+dZFu77MKiRB0haDvJALYzK7Th5EC7rxoodx3Fd42TfvFS7eVFzW+OgvjnZUVQolus7YG/W2PY/8lh6SsM8mB4a8BoCI4Pe869X/emhgYGhkb4IA8dGXYA8QLKynwdaV4vS9ZNIHljaHdHjDmoLIOpe2w3yQNd4/CBc5v1gCPqLHMcZHBzsg0AIRYJxL3mAZGU+D8yz8aA/Rbkj6HrRenJayAN9DEHpyfFGAuprjBiKELYYUSq7NpAQOw96b+hACNG0vyiCP4BQX3ikzyIhfBd5gGRlPQ8sZ+NqwfQ6dNxgKa+zxxx9bpoHQuvFtwz/BotE1ejoPFDXV//SUbM80I6lp8TKg2D82Py32bnUJ5FgnU8eIFlZz4NMSaALJ2Lwoa/Eax8Y3zZVM0BdeHpogO+bAskgD2Jr/zcKanOj5872W8fv0ZJCHiBZ5AHSRh4khTxAssgDpI08SAp5gGSRB0gb1z9IBNc/QOLIA6RtdfXBYvUh086n1dUH3X4x0VPIAwCAEOQBAEAiDwAAQpAHAACJPAAACEEeAAAk8gBpm5y6dfbcxQ8+/CRH09lzFyenbnX7mQM6izxA2vL4ezR+/IV+QB4gbTn9exXkAXoeeYC0kQdANpEHSBt5AGRT9vNAv36yesUzJzxfv2KNXMZyfbXw1Zg7tu99f/WbMPIAyKZc5IF2rftCsRy6zFhwjUll4cjL11guwdkp5IFNRB6MDDqOeakz4yJp6p3GXd59ciVR/9wR8gA9L2d54BXzyDrr39HoWma2PFDaDP595WKhUCwGlzAuuY7r+ksViuWScttf3miuKHO4KprCngcjg87giH7V5JFB7erIyp0jg45+4WTlKprGlZfNCzG3jTxAz8tXHtSvZx8qx8rCpcYXttT6i9ySER5By6NcLKh1vOSqnVLa7VCxD2bSPrCx5oFXttXqbb2ssres/Q51TRH/bB95gJ6Xizxo1NvvV/egv8hxHNdtdNX6UPtAn+H/y6jl6kIRt0NBQx5YWfKgXvq1Wh9090S1BWzazAPHRl2APEDPy0UeNK+p4SJeioyEzuSB0n6IXAeEELY8UCu8tdr7wTA4ErVEZAC00D5oEAY18gB9IJ95YJZ023hy5BhCKA/UBeu3W88DdV59BIGhA1MoD8yh4ajeIL+0d7C/KCoMauQB+kA+88D8tqmaAerCxhiAZBtPtgz9ttxfVO8ucl1zJqGgMPPALO/TQwOhsQS9sk8PDZihMTKY1HiyNQxq5AH6QPbzAL3GyANLwfZmGe0GPQD4vimQNPIAaeP3aEA2kQdIG3kAZBN5gLSRB0A2kQdIG9c/ALKJPEDaVlcfLFYf5m5aXX3Q7WcO6CzyAAAgBHkAAJDIAwCAEOQB0jc5devsuYsffPgJExNTpibyAGnL4/eLgH5AHiBtOf39AdDzyAOkjTwAsok8QNrIAyCbyAOkjTwAsok8QNrIAyCbyAOkjTwAsok8QNrIAyCbyAOkzcyD4Epn6kXMOjETQEPkAdKm54F23Uv/kpidmAmgCfIAadPzILjEsXo634mZAJogD5A22gdANpEHSBvjB0A2kQdIG98vArKJPEDayAMgm8gDpI08ALKJPEDayAMgm8gDpI08ALKJPEDauD4akE3kAdK2uvpgsfqQiYkpaxN5AAAQQgjyAAAgBHkAAJDIAwCAEOQBAEAiDwAAQpAHAACJPAAACEEeAAAk8gAAIAR5AACQyAMAgBDkAQBAIg8AAEKQBwAAiTwAAAhBHgAAJPIAACAEeQAAkMgDAIAQ5AEAQCIPAABCkAcAAIk8AAAIQR4AACTyAAAgBHkAAJDIAwCAEOQBAEAiDwAAQpAHAACJPAAACEEeAAAk8gAAIAR5AACQyAMAgBDkAQBAIg8AAEKQBwAAiTwAAAhBHgAAJPIAACAEeQAAkMgDAIAQ5AEAQCIPAABCkAcAAIk8AAAIQR4AACTyAAAgBHkAAJDIAwCAEOQBAEAiDwAAQpAHAACJPAAACEEeAAAk8gAAIAR5AACQyAMAgBDkAQBAIg8AAEKQBwAAiTwAAAhBHgAAJPIAACAEeQAAkMgDAIAQ5AEAQCIPAABCkAcAAIk8AAAIQR4AACTyAAAgBHkAAJDIAwCAEOQBAEAiDwAAQpAHAACJPAAACEEeAAAk8gAAIAR5AACQyAMAgBDkAQBAIg8AAEKQBwAAiTwAAAhBHgAAJPIAACAEeQAAkMgDAIAQ5AEAQCIPAABCkAcAAIk8AAAIQR4AACTyAAAgBHkAAJDIAwCAEOQBAEAiDwAAQpAHAACJPAAACEEeAAAk8gAAIAR5AACQyAMAgBDkAQBAIg8AAEKQBwAAiTwAAAhBHgAAJPIAACAEeQAAkMgDAIAQ5AEAQCIPAABCkAcAAIk8AAAIQR4AACTyAAAgBHkAAJDIAwCAEOQBAEAiDwAAQiSVBwCAvEsgDwAAPYA8AAAIQR4AACTyAAAgBHkAAJDIAwCAEEL8f/MkNg261DJwAAAAAElFTkSuQmCC&quot; title=&quot;cisco 2500 series WLC WLAN Profile Security Tab&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
When finished, click &quot;&lt;i&gt;Apply&lt;/i&gt;&quot;. Repeat the steps this time, create aWLAN Profile named IT-Department with SSID as IT-Dept. Use interface &quot;IT&quot; configured in step 2 for the IT-Department Wireless Profile.This will tell the WLAN Controller that the WLAN profile IT-Department should be in VLAN 13. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. Secure the WLAN Controller access&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The last step is to change the configuration parameters of the WLAN controller. Go to Management Tab. There are a lot of options here but the basic yet important ones are as follows:&amp;nbsp;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Under&amp;nbsp;&lt;u&gt; HTTP-HTTPS&lt;/u&gt; (left navigation pane) -&amp;nbsp; disable HTTP Access and enable HTTPS Access&lt;b&gt;. &lt;/b&gt;Set a Web Session Timeout (idle time when the user will be forced logout by the system&lt;/li&gt;
&lt;li&gt;Under &lt;u&gt;Mgmt Via Wireless&lt;/u&gt; - disable management via wireless. Access to the WLAN Controller therefore can only be done via LAN.&amp;nbsp; &lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie04pP4KWZOspSsv0KN_p-XM0HSKBn22IjtKPb4CsYJENdgcQT_vO7f2apN0XBKJHj70z9MU-ATxuCIdPGFHFaBEDKfqlMouFnp6z9g7z54IJGPshWQFcD94pfgxnj7Cy1s5etKPJEsatR/s1600/Management+tab.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie04pP4KWZOspSsv0KN_p-XM0HSKBn22IjtKPb4CsYJENdgcQT_vO7f2apN0XBKJHj70z9MU-ATxuCIdPGFHFaBEDKfqlMouFnp6z9g7z54IJGPshWQFcD94pfgxnj7Cy1s5etKPJEsatR/s1600/Management+tab.JPG&quot; height=&quot;364&quot; title=&quot;cisco 2500 series WLC Management Tab&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt; Congratulations! You just configured your wifi for two SSIDs on different VLANs. &lt;b&gt;&lt;br /&gt;
&lt;/b&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/4738136549716550437/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2014/03/configuring-cisco-wlan-with-multiple.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/4738136549716550437'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/4738136549716550437'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2014/03/configuring-cisco-wlan-with-multiple.html' title='Configuring Cisco WLAN with multiple SSIDs in different VLANs - Part 2'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9Qq-mqM4S27J3sIL_2yCXp_B2M8SOOvbUy9xsDttraEWNbE4eSbrNULTUaw9RRHv-q1el_utzkWRSnT8BB47HAPZ0l3jmi78baAbEVrOPbweWfU9zCrepYhTKC_u04EPSn3ApWxkQrqF9/s72-c/2500+controller.JPG" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-8516250600748311838</id><published>2013-08-18T19:58:00.001+08:00</published><updated>2015-01-29T17:00:07.145+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="4DX"/><category scheme="http://www.blogger.com/atom/ns#" term="dashboard"/><category scheme="http://www.blogger.com/atom/ns#" term="Discipline"/><category scheme="http://www.blogger.com/atom/ns#" term="Execution"/><category scheme="http://www.blogger.com/atom/ns#" term="IT"/><category scheme="http://www.blogger.com/atom/ns#" term="PMI"/><category scheme="http://www.blogger.com/atom/ns#" term="PMP"/><category scheme="http://www.blogger.com/atom/ns#" term="Project"/><category scheme="http://www.blogger.com/atom/ns#" term="Project Management"/><category scheme="http://www.blogger.com/atom/ns#" term="Project Monitoring and Control"/><title type='text'>Compelling Scoreboards Do Keep Projects on Track</title><content type='html'>Technology management involves liberal amounts of &amp;nbsp;project management. Like construction engineers and architects, we Technology Managers often find ourselves being asked to design technology solutions, and implementing these. But for most of us, driving projects to be completed on time, and within cost has proven challenging - especially in this era where most technology projects are implemented by vendors and outsourced partners. &lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Throughout the years, I found out that keeping a &lt;i&gt;compelling&lt;/i&gt; scoreboard of the project not only helps me, as the Project Manager, keep track of its progress, but also elicits commitment from the implementing team, vendors included. It also helps in communicating the project&#39;s progress to other stakeholders (i.e. executives, other departments) easier. Keeping a compelling scoreboard is extolled as discipline three in FranklinCovey Institute&#39;s Four Discpline of Execution (4DX). While 4DX&#39;s approach is utilitarian and practicable, scoreboards (or dashboards) is not unique to 4DX. It is also espoused in various management cases and thesis (i.e. Project Management Institute, Balanced Scorecard, etc.). Although, it is in 4DX where the case of &quot;scoreboards should be compelling&quot;, is consistently made.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Take the snapshot of the simple &amp;nbsp;project management scoreboard below as an example. The template for this can also be downloaded (link provided below) to help you start your own scoreboard for your projects.&lt;br /&gt;
&lt;br /&gt;
All effective scoreboards should follow the following characteristics:&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;&lt;u&gt;&lt;i&gt;&lt;span style=&quot;color: #0c343d;&quot;&gt;It is easy to understand and identify where you are (your progress) at a given time&lt;/span&gt;.&lt;/i&gt;&lt;/u&gt;Within 5 seconds, the scoreboard should be able to tell you if the project is delayed or not, if we are at risk of cost overrun, and what are the other risks to watch-out for.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;u&gt;&lt;span style=&quot;color: #0c343d;&quot;&gt;Only the necessary information is displayed. Very informative but not cluttered&lt;/span&gt;&lt;/u&gt;&lt;/i&gt;&amp;nbsp; Put in the scoreboard only those scores agreed with all stakeholders as necessary to track. Show only the essentials. Notice that in the below screenshots, we do not track Cost Performance Index (CPI). This is as agreed with all stakeholders and primarily because the project is being implemented by an outsourced contractor paid on progressive billing based on milestone completions.&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #0c343d;&quot;&gt;&lt;u&gt;&lt;i&gt;The Scores can be updated weekly&lt;/i&gt;&lt;/u&gt; &lt;/span&gt;- this is particularly important because what good is a scoreboard it doesn&#39;t give you the &quot;score&quot; on a regular and nearest-real-time possible. My personal belief in this matter is that scoreboards should give you at least a weekly status of the project. if you have automated tools, then daily updates are desirable.&lt;/li&gt;
&lt;li&gt;&lt;u&gt;&lt;i&gt;&lt;span style=&quot;color: #0c343d;&quot;&gt;The scores are directly influencable by the performance of the project team.&lt;/span&gt;&lt;/i&gt;&lt;/u&gt;&amp;nbsp;The below picture may not show this obviously. But after a day of explanation and two meetings after, the stakeholders know immediately what they should do to get the score back to its &quot;proper&quot; level. The scoreboard can only be compelling if the participants feel that they influence those scores directly. That is, the score is tied to what they do, and plan to do in the ensuing days. &amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #0c343d;&quot;&gt;&lt;u&gt;&lt;i&gt;Which brings us to the most important point, the scoreboard should inspire /compel you to act&lt;/i&gt;&lt;/u&gt;.&lt;/span&gt;&amp;nbsp;You will have to do some trial and error regarding this. Remember that a dashboard/scoreboard may be excellent for one team but not for another. Item number 4 above is the main driving force in making a scoreboard inspiring and compelling - the fact that one&#39;s action directly influences the score puts that person committed and immersed into the game. Although, in terms of making a scoreboard compelling, a little creativity also contributes significantly. It helps when you keep looking at the scoreboard not only because you want to see the score, but also because it is visually appealing and telling. &amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuIqQapGOIyODrVxa4IBhzZX3bsSbX2Ifp33EOy4xm2IgrNNykTYerpmelw3h_sxyktcwLxWIZEFgcamYP5ocfxYCgFMLXfwQPkiOZYYr1qmunaTvXDTuKGvOs-fa8mq3WT7jXkVqoBpeO/s1600/Project+Dashboard+1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Overall Project Progress in percent (%)&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuIqQapGOIyODrVxa4IBhzZX3bsSbX2Ifp33EOy4xm2IgrNNykTYerpmelw3h_sxyktcwLxWIZEFgcamYP5ocfxYCgFMLXfwQPkiOZYYr1qmunaTvXDTuKGvOs-fa8mq3WT7jXkVqoBpeO/s640/Project+Dashboard+1.JPG&quot; height=&quot;122&quot; title=&quot;Project Managemend Scoreboard, Dashboard&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPhtEjirfPMqvs3ozp_8VOhkj0v4OvjL4jsaegrm1CyywMykD473gZOogwy0BCo7-YDn6HDXFHAC7_GaPD6ZR9h-WS5AEMhB_6xZ0GafUCq3UHtCfOnAYvtfXXxBMLO0l9hb3VZPBLQYjV/s1600/Project+Dashboard+2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Schedule Performance Index and Earned Value Systems&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPhtEjirfPMqvs3ozp_8VOhkj0v4OvjL4jsaegrm1CyywMykD473gZOogwy0BCo7-YDn6HDXFHAC7_GaPD6ZR9h-WS5AEMhB_6xZ0GafUCq3UHtCfOnAYvtfXXxBMLO0l9hb3VZPBLQYjV/s640/Project+Dashboard+2.JPG&quot; height=&quot;314&quot; title=&quot;Project Managemend Scoreboard, Dashboard&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6vXUN7qqjaPM8uiL5SGUPOKuo5tZvtsiFHNPbULlbA4KbC9fuYF1iCJFJBzK9oxf9rO1395m8sedArijhZS18eWegINyTpLwc31u9dI8JCKgmYEUXewyFm9M6t2IhAuHGsRxpWwdzXmFj/s1600/Project+Dashboard+3.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img alt=&quot;Milestones and Cost&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6vXUN7qqjaPM8uiL5SGUPOKuo5tZvtsiFHNPbULlbA4KbC9fuYF1iCJFJBzK9oxf9rO1395m8sedArijhZS18eWegINyTpLwc31u9dI8JCKgmYEUXewyFm9M6t2IhAuHGsRxpWwdzXmFj/s640/Project+Dashboard+3.JPG&quot; height=&quot;164&quot; title=&quot;Project Managemend Scoreboard, Dashboard&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;
Some may observe that this is not the most compelling scoreboard/dashboard they&#39;ve seen and I will agree. There are far more compelling dashboards out there. My main objective was only to give a preview and perhaps to drive a point. Our company has dashboards with race cars on it indicating the &quot;sales&quot;,and a clear finish-line banner representing the year-end target. There are &quot;pit stops&quot; for the quarterly sales performance. I&#39;ve also seen dashboards with motor gauges, and one that has flags with names of the teams represented by icons climbing a hill. Someone even placed a &quot;barbie&quot; as his icon.&lt;br /&gt;
&lt;br /&gt;
I am not an expert to discuss the social psychology behind this, but in my experience, and in the experience of other people I helped create their own scoreboards - it works. Having compelling scoreboards help people become more attentive to the project&#39;s schedules and outcomes.&lt;br /&gt;
&lt;br /&gt;
I would liken the experience to the competitive attitude observed among athletes. In sports, it is easy to determine what the score is. There is a huge scoreboard displayed prominently. Everybody knows the score and what it means to them individually. The coaching staff immediately knows if its time to call for a time-out, to substitute players, and leads him how to assess the gameplay at halftime. The players immediately know how they stand, the amount of effort they need, and if they should go defense or offense. Looking at the shot clock counter, they know if they need to shoot the ball; or, looking at the yard-line, the quarterback calls the best appropriate play. The audience too, knows when they should cheer louder, cheer defense, or offense, and whose name to cheer when needed. Keeping score also elicits the amount of dedication among the fans. All we need to holler at the end of the bar table is the score, and every fan knows what that means. Keeping tab of the score consistently even makes some of us instant game experts and analysts.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
When I introduced the above scoreboard to vendors, attitudes changed. Knowing how the scoreboards would look like by our weekly reporting day (which is always a Thursday) compels them to act. Everyone is looking at the same data, and this reduces the length of meetings since we do not need to explain each others point-of-view regarding the status and progress of the project. Also,in a way, the meetings became more objective.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEju-j7XMZRo6lPrYvzSM9mdoSuPswjxGJNMdQ43FhZfuJltDo7JLRePgMaRl3iraDxEh196-6sNg7Lor7atLRHIZoxk3geIIoiguY7E0kLNwM-MoI3TFPnFxDlJPiut7FTXkf2pPM4XRnac/s1600/Actual+Completion+Rate.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Actual percent Completion (AC) versus Budgeted Cost of Work Performed&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEju-j7XMZRo6lPrYvzSM9mdoSuPswjxGJNMdQ43FhZfuJltDo7JLRePgMaRl3iraDxEh196-6sNg7Lor7atLRHIZoxk3geIIoiguY7E0kLNwM-MoI3TFPnFxDlJPiut7FTXkf2pPM4XRnac/s640/Actual+Completion+Rate.JPG&quot; height=&quot;258&quot; title=&quot;Project Management Scoreboard, Dashboard&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Every week, we spend 30-45 minutes discussing the completion of all tasks, and, &quot;projecting&quot; what items can be finished in the next week to get the scores (Schedule Performance Index, SPI) and EV at their proper levels.&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Start practicing your creativity and create your own scoreboards for your Projects today. To help you star, you can download the above sample Project Monitoring Scoreboard &lt;a href=&quot;https://www.dropbox.com/s/jjc71jkgcms57yq/Project%20Dashboard%20v2%20template.xlsx&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. &amp;nbsp;This Excel workbook may not be the best tool you are looking for to &quot;automate&quot; your project plans. But if you are looking for a way to shorten your meetings and how a scoreboard can be done in Excel, then feel free to download the Excel file, study, and revise it as you wish. I hope this helps. &amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
  var _gaq = _gaq || [];
  _gaq.push([&#39;_setAccount&#39;, &#39;UA-30696259-1&#39;]);
  _gaq.push([&#39;_trackPageview&#39;]);

  (function() {
    var ga = document.createElement(&#39;script&#39;); ga.type = &#39;text/javascript&#39;; ga.async = true;
    ga.src = (&#39;https:&#39; == document.location.protocol ? &#39;https://ssl&#39; : &#39;http://www&#39;) + &#39;.google-analytics.com/ga.js&#39;;
    var s = document.getElementsByTagName(&#39;script&#39;)[0]; s.parentNode.insertBefore(ga, s);
  })();
&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/8516250600748311838/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2013/08/compelling-project-scoreboards.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/8516250600748311838'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/8516250600748311838'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2013/08/compelling-project-scoreboards.html' title='Compelling Scoreboards Do Keep Projects on Track'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuIqQapGOIyODrVxa4IBhzZX3bsSbX2Ifp33EOy4xm2IgrNNykTYerpmelw3h_sxyktcwLxWIZEFgcamYP5ocfxYCgFMLXfwQPkiOZYYr1qmunaTvXDTuKGvOs-fa8mq3WT7jXkVqoBpeO/s72-c/Project+Dashboard+1.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-3755748408293927416</id><published>2012-05-28T13:12:00.000+08:00</published><updated>2015-01-30T00:54:27.709+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Build or Buy"/><category scheme="http://www.blogger.com/atom/ns#" term="CIO"/><category scheme="http://www.blogger.com/atom/ns#" term="Decision Making"/><category scheme="http://www.blogger.com/atom/ns#" term="PMP"/><category scheme="http://www.blogger.com/atom/ns#" term="Project Initiation"/><category scheme="http://www.blogger.com/atom/ns#" term="Project Management"/><category scheme="http://www.blogger.com/atom/ns#" term="SaaS"/><category scheme="http://www.blogger.com/atom/ns#" term="Software as a Service"/><title type='text'>Build or Buy Analysis: Determining the True Cost of Software Development vs. Ready Made Solutions</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 15px;&quot;&gt;When faced with options to whether to build an IT system; or, to lease or subscribe to ready-made cloud-based solutions; most of us do what we were taught in management school. We open our poignant excel workbook, and compute the cost of the application by estimating materials and person-hours required to complete the project.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL7EL925yU_nwFKTC1-iUTysK74ZyeBeL7hb3Ft9oMAVlsnGWxMW_6C3xsgQuhvCFbvF1vHZZQ6p-SyVp6lvZo9PqIGq8XmgWSYWPHtsoGWvvDHrltd96xxBtP0LwGJtXsVDHZFmqEKJMR/s1600/Buy-Build.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL7EL925yU_nwFKTC1-iUTysK74ZyeBeL7hb3Ft9oMAVlsnGWxMW_6C3xsgQuhvCFbvF1vHZZQ6p-SyVp6lvZo9PqIGq8XmgWSYWPHtsoGWvvDHrltd96xxBtP0LwGJtXsVDHZFmqEKJMR/s1600/Buy-Build.jpg&quot; height=&quot;244&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;We do this by first forecasting the number of person-hours it would take to build the system.&amp;nbsp; Then we put a certain monetary value to these person-hours, which is usually the average salary of the software engineers that will be hired to build the system plus a little overhead. We then put all the other necessary materials to finish the system such as cost of servers, peripherals, etc. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;We then estimate the yearly cost of maintaining the system, which we usually approximate at 20% of the initial build cost. After which we pick a discounting rate ranging from 8% to 12% (10% is usually the sweet spot), and do a Net Present Value (NPV) calculation of the Total Cost of Ownership (TCO) of the system from year 0 (today) to year 4. We top it off by adding another 10%-20% contingency reserve margin to cover for ‘other unseen costs’.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;After doing all that, we go window-shopping. &amp;nbsp;We go through a list of cloud-based solutions and ask them for their subscription costs. We compare the yearly subscription cost for cloud-based solution A, B, C…. and the cost of building the system. &amp;nbsp;Finally, we are ready to make a decision:&amp;nbsp; do we develop our own custom application, or do we lease or subscribe to Software as a Service (SAAS) solutions? &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;i style=&quot;background-color: #ffe599;&quot;&gt;If this is how you do decision analyses, I encourage you to look at the past 5-10 build-or-buy decisions you made. You will find yourself that often you decided to build the application either in-house; or, using outsourced development partners. Rarely (perhaps 10% or even less probability), have you decide in favor of cloud-based solutions. &lt;/i&gt;&lt;span style=&quot;background-color: yellow;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;I think this is because many of us forget to include in our decision analyses the “full cost”, including the cost of risks, in custom application/system development. Failing to account for project risks, and mitigating them, leads to costly IT Project failures. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Even worse, the true cost of custom application development only appears later, when project s are mid-way done, risks are starting to materialize, and your project stakeholders’ patience are taxed.&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Here is a list of the usual items we fail to consider as part of the costs, and risks when developing applications and systems of our own. Make sure we account for all of them before making a decision. If we are relying heavily on financial analyses tools to such as NPV, payback,&amp;nbsp; IRR, and TCO to make a decision, then it is imperative that we put dollar values into these risks such as approximating person-hours, including executive hours;&amp;nbsp; hiring additional consultants and project implementers; and, cost of sub-projects required to complete the IT system such as infrastructure upgrades.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 11pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 19px; font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #073763;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;1.&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 19px; font-weight: bold;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #073763;&quot;&gt;Scope-creep and/or incomplete Requirements Specifications&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Undoubtedly, scope-creep is the number one risk associated with IT build-out projects. Often, we are lulled into a false sense of belief that the required application or system is simple and thus will only take X person-hours, when in fact, it actually takes (X+Y)^Z person-hours.&lt;br /&gt;
&lt;br /&gt;
Scope-creeping is when the project’s requirements kept changing even during project implementation. There are two main reasons for this: (a) the project is so delayed that the initial requirements are no longer relevant; and/or, (b) the project manager failed to fully understand the business requirements.&lt;br /&gt;
&lt;br /&gt;
We should be obsessively detailed in gathering the project requirements. Immerse with the department sponsoring the project and discuss with as many stakeholders as possible. Define conflicting requirements from different stakeholders and resolve them properly. Make sure the business problem that the project wishes to address is fully understood. Define the current state versus the ‘future-state’ of the process once the IT project is in place. &lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 19px; font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #073763;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 19px; font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #073763;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;2.&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 19px; font-weight: bold;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #073763;&quot;&gt;Failure to Consider Cost of Required Infrastructure Upgrade&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Now that we are confident about the requirements, consider the load of the new system in the IT infrastructure. What are the system availability requirements for the new system? Will a Disaster Recovery Plan (DRP) be required? Do we need to increase WAN segment bandwidth due to heavy influx of users? The new system will require, power, rack space and IP addresses (private or public). At the least, an on-site web-server will need changes in the firewalls and edge routers. If we are unlucky, we may need more changes in the network routes, and Quality of Service (QoS) configurations.&lt;br /&gt;
&lt;br /&gt;
We should identify and include the cost of these upgrades, including the person-hours and executive time required to implement the infrastructure changes. Remember that changes to the network often requires a lot of executive time. Change requests need to be discussed and approved, and a lot of documentations need to be accomplished before we can even add one configuration line in any of the network equipments. We should note this in our decision analyses.&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 19px; font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #073763;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 19px; font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #073763;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;3.&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 19px; font-weight: bold;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Cambria, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #073763;&quot;&gt;Underestimating the Strategic Relevance of the IT Project Resulting in Redoing the System/Application Over and Over again&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The head of the Supply Chain Department came to the IT Head’s office and said: “we don’t really want a complicated system, just something we can use fast.” The IT department checked the requirements, and considered the minor infrastructure changes required; and they delivered the IT system fast, but a little messy – as requested. &amp;nbsp;They authorized the cutting of corners and ransacked the best practice rule-book. No one’s the smarter. The department requiring the system loved it, despite its many bugs and the IT Head became their hero.&lt;br /&gt;
&lt;br /&gt;
A couple of weeks after the system went live, the COO drops by the same IT Head’s office and told him the system worked so good, that the COO now wants it integrated into the entire Materials Planning and Manufacturing Divisions. The IT department now has two problems: (1) to be able to integrate the two systems, they have to recode at least 40% of the new system, then add additional modules required for the integration; and, (2) since this will be used by the entire operations team, they now need to fix those bugs which were previously ‘acceptable’ by the Supply Chain Department’s standards. &lt;br /&gt;
&lt;br /&gt;
Six months later into the project, the CFO drops by the same office, and before the IT Head realizes it, they are now building an entire ERP system. The build-rebuild-integrate-rebuild cycle is costing their company huge amounts of time, and resources. Their IT department is also now exposed to the vicious cycle of firefighting – The IT operations teams kept resolving bugs, while the software engineering team keeps developing new modules.&lt;br /&gt;
&lt;br /&gt;
We cannot emphasize more than enough the role of executive involvement (all of them, not just IT) in IT projects. The IT roadmap must be clear, and our role as IT executives is to communicate this roadmap. When one department asks for a quick solution, look back at the roadmap and communicate back when the solution will be made available. Building an enterprise system is like building a skyscraper. We can’t start building the penthouse without first building the lower floors. We should never fall prey to the ‘quick-and-dirty’ mantra – they don’t exist! An IT project can be finished quickly if it must, but never should it be dirty. We do not compromise quality.&lt;br /&gt;
&lt;br /&gt;
When ‘forced’ to expedite the building of a system due to business necessities, we must take the larger picture into consideration. Of course we build it, but never lose site of the roadmap. Think of it as delivering the same roadmap but in phases. The system requested should scale to the larger requirement when the time to build the latter arrives. And the cost of the entire ‘build-scenario’ should reflect that.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/3755748408293927416/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2012/05/build-or-buy-analysis-determining-true.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/3755748408293927416'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/3755748408293927416'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2012/05/build-or-buy-analysis-determining-true.html' title='Build or Buy Analysis: Determining the True Cost of Software Development vs. Ready Made Solutions'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL7EL925yU_nwFKTC1-iUTysK74ZyeBeL7hb3Ft9oMAVlsnGWxMW_6C3xsgQuhvCFbvF1vHZZQ6p-SyVp6lvZo9PqIGq8XmgWSYWPHtsoGWvvDHrltd96xxBtP0LwGJtXsVDHZFmqEKJMR/s72-c/Buy-Build.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-5386628153276324165</id><published>2012-05-06T17:43:00.001+08:00</published><updated>2013-08-16T11:20:01.848+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="IT"/><category scheme="http://www.blogger.com/atom/ns#" term="Management"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="Router"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="switch"/><category scheme="http://www.blogger.com/atom/ns#" term="VLAN"/><title type='text'>Do VLANs Unduly Complicate the Network?</title><content type='html'>Simplifying the IT infrastructure is among the top priorities of IT executives. Various surveys claiming CIOs are beginning to embrace Software as a Service (SAAS) models is actually proof that simplification of the infrastructure is a key objective.  The more complicated the IT infrastructure becomes, the more expensive it is to maintain it. It also will take significantly longer person-hours to fulfill change requests. &lt;br /&gt;
&lt;br /&gt;
As an IT manager, simplifiying my IT support structure is also one of my key goals. One of the most common discussion points regarding this subject is the number of VLANs required for a branch office; or, if VLANs are ever needed in the branch office network design. &lt;br /&gt;
&lt;br /&gt;
My answer is always &#39;yes&#39;. Surprisingly, I often find myself defending that position.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Simplicity is a function of necessity. To simplify means to design the IT infrastructure to fulfill only the required service level and, to make it easy to scale the infrastructure to increasing demands of the near future. To implement more than the required service level and business need is unduly complicating the IT infrastructure. It is a step farther from simplification. &lt;br /&gt;
&lt;br /&gt;
While there are no fast rules&amp;nbsp;as to how many VLAN count is the optimal level to qualify a network as ‘simple’,&amp;nbsp;&amp;nbsp;I believe quite the opposite. &lt;i&gt;VLANs actually help in simplifying the IT infrastructure and ensures scalability for future expansions. &amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
The three main reasons that necessitate the creation of VLANs are listed below. You will notice that even in the branch office, we will find ourselves utilizing VLANs for any one of these three:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;i&gt;&amp;nbsp; 1. to avoid mac-address-table and arp broadcast storms;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&amp;nbsp; &amp;nbsp; 2. to simplify network security;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&amp;nbsp; &amp;nbsp; 3. to simplify Quality of Service (QoS) implementations;  &lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
In a practical sense, a Local Area Network (LAN) is a group of computers whose IP addresses are within the same IP block. For example, if your computer has an IP address of 192.168.1.10, with subnet mask of 255.255.255.0, then all computers from 192.168.1.1-192.168.1.254 belongs to your LAN. That is, they belong to only one switching group, and communicate to each other by referencing each computer&#39;s unique network interface card (NIC) machine address, with the switchport where the NIC is directly connected to. This mapping of NIC mac-addresses to the switch&#39;s switchports are kept by the switch in a simple database called &amp;nbsp;a mac-address-table. Since they do not communicate via their IP addresses, then they should find a way to reference an IP address with a corresponding NIC mac-address which is the only information relevant to the switch. To do this, the switch, and all computers in the LAN maintain another common database called the arp (address resolution protocol) table. &lt;br /&gt;
&lt;br /&gt;
This brings me to the first reason why VLANs are configured:&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;





&lt;u&gt;
1.  to avoid mac-address-table and arp broadcast storms&lt;/u&gt;&lt;/h4&gt;
&lt;div&gt;
&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/div&gt;
This is the main reason why routers and VLANs were invented, and why it is not possible to build the internet using only switches.&lt;br /&gt;
&lt;br /&gt;
As discussed, computers in a local area network communicate to each other only via their mac-addresses using a map being maintained by the switch called a mac-address-table. To do this, there should be way for a computer to reference an IP address with a mac-address. They do this via an ARP (Address Resolution Protocol) request. Let us assume a computer &#39;A&#39; wants to ping another computer &#39;B&#39; with an IP address of 172.30.1.105/24. Seeing they are on the same subnet (Computer &#39;A&#39; has IP address of 172.30.1.102/24), Computer &#39;A&#39; immediately knows it should communicate with the switch, not through the router. To communicate with the switch, Computer &#39;A&#39; needs the mac-address of the Computer &#39;B&#39;.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s what happens:&lt;br /&gt;
&lt;br /&gt;
Computer &#39;A&#39; composes a message: &lt;i&gt;&quot;Hey switch, what is the Mac-Address&#39; of someone with IP address of 172.30.1.105/24? Can you check in your arp table?&quot;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Switch responds with:&lt;i&gt; &quot;I don&#39;t know but please wait, I&#39;ll send everyone an arp request broadcast&quot;&lt;/i&gt;. He then broadcasts an ARP request. After all computers in the LAN finished responding to this broadcast, he immediately does two things:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;(1) he sends an ARP response to Computer &#39;A&#39;: &quot;I found it! Computer A, the mac-address of &amp;nbsp; &amp;nbsp; Computer B with IP address 172.30.1.105/24 is 00-1e-e5-69-1f-55; then,&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;(2) The switch completes his mac-address-table. After completing his mac-address-table, he again proceeds to do another broadcast, this time to inform all nearby switches that he has a more updated mac-address-table. &lt;br /&gt;
&lt;br /&gt;
Computer &#39;A&#39;, completes his request and sends over packets containing the mac-address of Computer &#39;B&#39; to the switch. The switch forwards the packet to the switchport using the mac-address-table he completed in the previous step.&lt;br /&gt;
&lt;br /&gt;
The picture below summarizes how it works&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRE_Cc5eG5XztCdSJR7rHJgGmJRE0NZ-nuOMZ57tarslvwTk4HD9CHqLueZpCT5lJ2lFX2mzUJtp-hFffOVn9AESMklm61nBgxmUkoIejSzCLZxxIjElfeDl4ThyphenhyphendjAVZxvSbeRG5Jg0gp/s1600/switch+basics.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;408&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRE_Cc5eG5XztCdSJR7rHJgGmJRE0NZ-nuOMZ57tarslvwTk4HD9CHqLueZpCT5lJ2lFX2mzUJtp-hFffOVn9AESMklm61nBgxmUkoIejSzCLZxxIjElfeDl4ThyphenhyphendjAVZxvSbeRG5Jg0gp/s640/switch+basics.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Once the DHCP expires and everyone is sent a new IP address, the arp table on each computer also resets, and the entire request-broadcast-response-broadcast cycle is repeated.&lt;br /&gt;
&lt;br /&gt;
To resolve the broadcast issue, we can either: (a) configure both the switch’s arp and mac-address-table expiration (Cisco refers to them as timeouts) to control the frequency of the MAC-Address-table and arp broadcasts; or, (b) separate the network into different segments via VLANs.  For very large networks, we will need to do both. &lt;br /&gt;
&lt;br /&gt;
If it still is not obvious how VLANs play a detrimental role in controlling the broadcasts, then imagine we have 200 nodes on DHCP and with multiple access-points over LAN and wifi. Whenever one user plugs his/her laptop from one area of the office to another, &amp;nbsp;the computer and/or the switch (whichever is applicable) will do an arp request broadcast, and a MAC-Address-Table broadcast. So imagine what it will do to our network if 50 of those users move for whatever reason. We have 200 X 50 broadcasts = 1,000 arp broadcasts, and another set for as many switches for the mac-address-table broadcast. Then, of course we have another set of broadcasts when they move back to their permanently assigned workstations. Quite small, but note that we also have other broadcasts going on in the network such as IGMP, servers, clusters, etc. The broadcast problem increases exponentially as more elements are added to the network.&lt;br /&gt;
&lt;br /&gt;
VLANs communicate via the router. They are on different LANs. So if we split the network in two VLANs, then the broadcast storms are contained in only one VLAN, while the other is unaffected. Therefore, as the network grows, it becomes necessary to segment the network into VLANs and keep this broadcast storm in check.  I suggest one VLAN per group of 200, at least (depending on usage, and degree of security required).&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;





&lt;u&gt;
2. to simplify network security&lt;/u&gt;&lt;/h4&gt;
&lt;div&gt;
&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/div&gt;
Suppose that in our company, the Marketing Department is allowed social networking sites (twitter, facebook, google+, etc.), but the rest of the organization is not. How do we do it? We can either: (1) Configure a by AD user account/group account URL filtering (assuming our UTM appliance is equipped with that); or, (2) we can do it via VLANs (which every UTM and transparent proxy appliance can implement). Judging just by how many components are needed to configure both, then the latter (configure VLANs) is conclusively the simpler.&lt;br /&gt;
&lt;br /&gt;
There are also other issues. Trunk traffic is passed from one switch to another via VLAN 1. Thus when VLAN 1 is compromised, everybody is compromised. What I do is I move the native VLAN to another VLAN, and simply make VLAN 1 a &#39;parking vlan&#39; (in other words, a VLAN assigned to unused switchports).&lt;br /&gt;
&lt;br /&gt;
And here is my favorite VLAN security implementation – I simply deny all inter-VLAN access (except to the servers). That way, no one from the other VLAN can sniff through the other. This is important when some techie staff tries to sneak into executives’ skype conversations, or files (yes, you can sniff through skype chat history of another person on the network provided you have access to their computer, check out how in my other blog &lt;a href=&quot;http://www.techienoobie.com/2012/04/how-to-access-skype-chat-history-of.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;). This also servers as defense when one VLAN was compromised (malware, DoS attacks, etc.).&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;





&lt;u&gt;
3. to simplify Quality of Service (QoS) implementations&lt;/u&gt;&lt;/h4&gt;
&lt;br /&gt;
In our company, we have normal traffic, and VoIP. The traditional way of doing QoS is by configuring DSCP diffserv tagging on every switchport (every switchport, not just where the VoIP ports are); then do prioritization and bandwidth shaping at the ingress direction of the router interface. But if the only traffic we need to tag for priority are VoIP traffic, then its simpler done via VLANs. We simply: (1) put all VoiP and similar traffic in one VLAN; (2) disallow inter-VLAN communication; then, (3) prioritize traffic on a per VLAN basis. &lt;br /&gt;
&lt;br /&gt;
Therefore, even in small branch offices with less than 100 network elements, if we have any one of the reasons stated above, we will need to apply VLANs. I doubt if there is any type of enterprise level network, even in the branch-level, that would not benefit from implementing VLANs. I sincerely would love to hear your opinion on the matter so if you have one, please post a comment and let&#39;s start discussing.&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
  var _gaq = _gaq || [];
  _gaq.push([&#39;_setAccount&#39;, &#39;UA-30696259-1&#39;]);
  _gaq.push([&#39;_trackPageview&#39;]);

  (function() {
    var ga = document.createElement(&#39;script&#39;); ga.type = &#39;text/javascript&#39;; ga.async = true;
    ga.src = (&#39;https:&#39; == document.location.protocol ? &#39;https://ssl&#39; : &#39;http://www&#39;) + &#39;.google-analytics.com/ga.js&#39;;
    var s = document.getElementsByTagName(&#39;script&#39;)[0]; s.parentNode.insertBefore(ga, s);
  })();
&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/5386628153276324165/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2012/05/do-vlans-complicate-network.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/5386628153276324165'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/5386628153276324165'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2012/05/do-vlans-complicate-network.html' title='Do VLANs Unduly Complicate the Network?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRE_Cc5eG5XztCdSJR7rHJgGmJRE0NZ-nuOMZ57tarslvwTk4HD9CHqLueZpCT5lJ2lFX2mzUJtp-hFffOVn9AESMklm61nBgxmUkoIejSzCLZxxIjElfeDl4ThyphenhyphendjAVZxvSbeRG5Jg0gp/s72-c/switch+basics.jpg" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-3065208142251517001</id><published>2012-04-26T23:56:00.000+08:00</published><updated>2014-06-08T02:17:32.452+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Consumer IT"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="How to Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="IT Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="Skype"/><title type='text'>How to Access Skype Chat History of Another Person or PC.</title><content type='html'>&lt;div&gt;
Internet messengers (IM) indeed made the world smaller, and skype is undoubtedly the major contributor to this phenomena.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Skype is simple to use, and hard to block. With skype, you can do free calls and videoconferencing; share your desktop; and, share files such as documents and photos with any other skype users&amp;nbsp;anywhere.&amp;nbsp;Skype has the ability to use any available open port to communicate to the internet which made it a bane for traditional port-based firewalls to block (a headache for most network engineers).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
But is skype safe?&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
We &amp;nbsp;can download various tools over the internet to sniff through ICQ, YM, and Windows/MSN messenger chat and calls but rarely do we see tools that can do the same for skype. Skype&#39;s chat history and voice calls and logs are encrypted -- but that doesn&#39;t mean they are hack free.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Given the proper privileges and access to the network, UCSniff (&lt;a href=&quot;http://ucsniff.sourceforge.net/&quot;&gt;http://ucsniff.sourceforge.net/&lt;/a&gt;) can be used to eavesdrop for skype voice calls in your network.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
This article will show you one procedure how you can check the Skype chat history from your (or someone else&#39;s computer). Someone who can access your computer can literally check for skype conversations, even with skype turned off. &lt;i&gt;Even worse, it can be done without you knowing it!&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;i&gt;Update: 5/10/2012: &lt;/i&gt;Before I illustrate how, I would just like to add that this is not (supposedly) a viable hack since by default (off-the-shelf), operating systems do not allow other computers in the network to access non-shared folders, especially program files. However, when joining computers in a domain, the default security settings are changed. IT personnel should be made aware of the risks involved and act accordingly. I tried this on two different companies corporate network with standard security implementations on domain levels, firewalls, etc. and the procedure was successful. At least the inter-VLAN access-lists was successful in preempting this (please check my other blog about why VLANs are necessary &lt;a href=&quot;http://www.techienoobie.com/2012/05/do-vlans-complicate-network.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;). &amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #d9ead3;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;u&gt;Here&#39;s how:&lt;/u&gt;&lt;/i&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
1. Download&amp;nbsp;&lt;a href=&quot;https://rapidshare.com/files/950174422/skypeChatsyncReader.exe&quot;&gt;Skype ChatSync Reader&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
2. Go to control Panel &amp;gt;&amp;gt; Folder options &amp;gt;&amp;gt; View Tab. Tick &quot;Show Hidden Files and Folder&quot; and uncheck &quot;Hide protected operating system files&quot;.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
3. Navigate through the following (by typing it in run, or simply using windows explorer):&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;u&gt;for Windows XP&lt;/u&gt;&lt;em&gt;:&lt;/em&gt; C:\Documents and Settings\&lt;i&gt;&amp;lt;user_rofile&amp;gt;&lt;/i&gt;\Application Data\Skype\&lt;i&gt;&amp;lt;login_name&amp;gt;&lt;/i&gt;\chatsync&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;u&gt;for Windows&amp;nbsp;7:&lt;/u&gt;&amp;nbsp;C:\Users\&lt;i&gt;&amp;lt;user_profile&amp;gt;&lt;/i&gt;\AppData\Roaming\Skype\&lt;i&gt;&amp;lt;skype_login&amp;gt;\&lt;/i&gt;chatsync&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;u&gt;If&amp;nbsp;you are accessing&amp;nbsp;a different computer within your network&lt;/u&gt;,&amp;nbsp;replace &quot;C:&quot;&lt;i&gt; &lt;/i&gt;with&lt;i&gt; &quot;&lt;/i&gt;&amp;nbsp;\\&lt;i&gt;&amp;lt;IP address or Host name&amp;gt;&lt;/i&gt;\c$&quot;. Thus&amp;nbsp;the link &amp;nbsp;becomes:\\&lt;i&gt;&amp;lt;IP_address or Host_name&amp;gt;&lt;/i&gt;\c$\Users\&lt;i&gt;&amp;lt;user_profile&amp;gt;&lt;/i&gt;\AppData\Roaming\Skype\&lt;i&gt;&amp;lt;skype_login&amp;gt;\&lt;/i&gt;chatsync&amp;nbsp; &lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;i&gt;&amp;nbsp; &amp;nbsp; Note:&lt;/i&gt;&amp;nbsp;Replace the items marked with &#39;&amp;lt;&amp;gt;&#39; with the proper account names.&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUXCW2QVkRyE1oiItSAep6Pit_SQ2pwUdLsfQspTLM46z44f9-01Rh9wwuMRi_YSHggeCeNvPK9nf2JFxzFJo0bZXGnGEAaelwRD3SAHi8rB4fGKmPGfeHFEYnfDFhqaX6nFyLzT6G_6b4/s1600/Skype+Chatsync+reader.PNG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUXCW2QVkRyE1oiItSAep6Pit_SQ2pwUdLsfQspTLM46z44f9-01Rh9wwuMRi_YSHggeCeNvPK9nf2JFxzFJo0bZXGnGEAaelwRD3SAHi8rB4fGKmPGfeHFEYnfDFhqaX6nFyLzT6G_6b4/s400/Skype+Chatsync+reader.PNG&quot; height=&quot;252&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;4. You will see a number of folders inside. Each folder contains chat history for a specific day. Choose one and open it. Inside, you will see a bunch of *.dat files. You can attempt to open it in notepad or any text editor and you will only see unreadable characters.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
5. In the windows explorer address bar, copy the entire address.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
6. Open Skype ChatSync Reader (the file you downloaded in step 1): and paste the address you copied in windows explorer in the space provided. You should be able to read the skype chat history as&amp;nbsp;per the&amp;nbsp;photo provided.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
  var _gaq = _gaq || [];
  _gaq.push([&#39;_setAccount&#39;, &#39;UA-30696259-1&#39;]);
  _gaq.push([&#39;_trackPageview&#39;]);

  (function() {
    var ga = document.createElement(&#39;script&#39;); ga.type = &#39;text/javascript&#39;; ga.async = true;
    ga.src = (&#39;https:&#39; == document.location.protocol ? &#39;https://ssl&#39; : &#39;http://www&#39;) + &#39;.google-analytics.com/ga.js&#39;;
    var s = document.getElementsByTagName(&#39;script&#39;)[0]; s.parentNode.insertBefore(ga, s);
  })();
&lt;/script&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;u&gt;To protect yourself from this kind of intrusion:&amp;nbsp;&lt;/u&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
1. &lt;em&gt;Disable Skype chat history.&lt;/em&gt; Open Skype. Click Tools &amp;gt;&amp;gt; Options. In the left panel, choose Privacy. Then, on the right panel, click show advanced options.&amp;nbsp; Under &#39;Keep history for&#39; dropdown box, choose never, then click on &quot;Clear History&quot;. &lt;br /&gt;
&lt;br /&gt;
2. &lt;em&gt;Do not share your folders unwarranted.&lt;/em&gt; Do not play around with your file permission. Better yet, do not make your account an administrator (if you need to, have another administrator account but use a normal account in your daily activities). &lt;br /&gt;
&lt;br /&gt;
3. Always make sure you have a workstation &lt;em&gt;firewall enabled.&lt;/em&gt; For&amp;nbsp;Windows 7&amp;nbsp;users, &lt;em&gt;do not disable UAC (Use Account Control) settings. &amp;nbsp;&lt;/em&gt;&lt;br /&gt;
&lt;br /&gt;
4. For domain environments: make sure proper GPOs on securing folders are in place. Some of the basics are: (a) do not allow changing of folder options; (b) do not allow sharing of system files; (c) no administrator access to all computers except local login; disallow escalated privileges/permissions/rights. &lt;br /&gt;
&lt;br /&gt;
5. It is hard not to provide local IT with escalated privilege. If it is necessary, ensure that proper guidelines and audit mechanisms are in place. &lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: italic;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;*Special thanks to my friends&amp;nbsp;who shared this with me, and helped me prove this procedure is viable.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/3065208142251517001/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2012/04/how-to-access-skype-chat-history-of.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/3065208142251517001'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/3065208142251517001'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2012/04/how-to-access-skype-chat-history-of.html' title='How to Access Skype Chat History of Another Person or PC.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUXCW2QVkRyE1oiItSAep6Pit_SQ2pwUdLsfQspTLM46z44f9-01Rh9wwuMRi_YSHggeCeNvPK9nf2JFxzFJo0bZXGnGEAaelwRD3SAHi8rB4fGKmPGfeHFEYnfDFhqaX6nFyLzT6G_6b4/s72-c/Skype+Chatsync+reader.PNG" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-5392482225398912375</id><published>2012-04-14T00:16:00.003+08:00</published><updated>2014-06-08T02:17:55.035+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bypass"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="How to Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="IT Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="port-redirection"/><category scheme="http://www.blogger.com/atom/ns#" term="proxy"/><category scheme="http://www.blogger.com/atom/ns#" term="SSH"/><category scheme="http://www.blogger.com/atom/ns#" term="SSH tunneling"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>Practical SSH Tunneling: Using Putty to Bypass Web Filters and Firewalls</title><content type='html'>&lt;strong&gt;About SSH v.2 and SSH tunneling&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
SSH (Secure Shell) was an Internet Task Force (IETF) protocol for encrypting traffic to access a remote host. SSH v2 standard came out in 2006 and&amp;nbsp;is incompatible with SSH v.1.&amp;nbsp;&amp;nbsp;Version 2 uses Diffie-Hellman (DH) key exchanges to create a tunnel between a client and a server.&amp;nbsp;Thus, SSH works very similary like a VPN and was, in fact, called a poor man&#39;s VPN. SSH has lower levels of security and encryption than VPN. Apart from that, I don&#39;t really know the exact difference between an SSH tunnel and a VPN and if you happen to do, please feel free to post a comment or link to your blog/article that explains SSH versus VPN. &lt;br /&gt;
&lt;br /&gt;
SSH v.2 is both a boon and a bane for network engineers.&amp;nbsp;I&#39;ve been using SSH v.2 to do a myriad of things, some of which to purposely circumvent network policies that would normally disallow people to access other parts of the network. For this article, we will use SSH tunneling to bypass corporate firewall and webfiltering. This is possible using any Web Socket capable browser such as Mozilla Firefox and Opera (I&#39;ve heard&amp;nbsp; Google Chrome will support it soon). &lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Using SSH tunneling (only possible with SSH 2), we can &#39;piggy-back&#39; traffic bound&amp;nbsp;for different ports and redirect them to another destination which, your computer may not be allowed, but the remote server connected via SSH, can. Among the most common uses of SSH tunneling are:&lt;br /&gt;
&lt;br /&gt;
1.&amp;nbsp;As a proxy&amp;nbsp;server to bypass your local&amp;nbsp;web filtering;&lt;br /&gt;
2. As a poor man&#39;s alternative to VPN -- make other people connect to&amp;nbsp;another computer your computer normally cannot communicate to,&lt;br /&gt;
3. to create IMAP connections to an email server,&lt;br /&gt;
&lt;br /&gt;
&lt;em&gt;&lt;u&gt;Disclaimer:&lt;/u&gt;&lt;/em&gt; This article is to show&amp;nbsp;how SSH can&amp;nbsp;possibly compromise&amp;nbsp;network security.&amp;nbsp;I do not&amp;nbsp; encourage anyone&amp;nbsp;to use&amp;nbsp;SSH as a proxy, nor do I espouse a culture where one arbitrarily bypasses network security at will without any contructive purpose&amp;nbsp;(to hack&amp;nbsp;just because&amp;nbsp;you can). A&amp;nbsp;network or security engineer can always use UTMs,&amp;nbsp;access-lists,&amp;nbsp; firewalls, IPS, etc. to block SSH connection to and from a network.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;How to use Putty to configure SSH tunneling and&amp;nbsp;bypass the firewall and URL web-filtering.&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
For this to work, you will need&amp;nbsp;Putty (download at: &lt;a href=&quot;http://www.putty.org/&quot;&gt;http://www.putty.org/&lt;/a&gt;). You can also use any other SSH client programs such as&amp;nbsp;bitvise tunnelier, but note that&amp;nbsp;the screenshots&amp;nbsp;below show Putty.&amp;nbsp;You will also need a server which you can SSH to. This server should be outside your company&#39;s network (e.g. home computer, another website, friend&#39;s router, etc.)&lt;br /&gt;
&lt;br /&gt;
1. Open Putty.&amp;nbsp;In the main window, under host, type the IP address&amp;nbsp;or&amp;nbsp;hostname of the server you will be connecting to via SSH.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwrEoH-JQa_NO1L3BITQ8fzhFpgBZGmwNcVu9Ou7t0gcwok276Ew03Prq8FQ_qDiV2TkfKsTwQdY0m1Cey6bKCphApk-qzyt6R07lNdcR3ybDoNd-ymZjpAgn2mlmWkKTvzE2TqwYtwK_L/s1600/SSH+forwarding-session.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwrEoH-JQa_NO1L3BITQ8fzhFpgBZGmwNcVu9Ou7t0gcwok276Ew03Prq8FQ_qDiV2TkfKsTwQdY0m1Cey6bKCphApk-qzyt6R07lNdcR3ybDoNd-ymZjpAgn2mlmWkKTvzE2TqwYtwK_L/s400/SSH+forwarding-session.JPG&quot; height=&quot;276&quot; qda=&quot;true&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
2. At the left side of the screen, click connection &amp;gt;&amp;gt; SSH &amp;gt;&amp;gt; tunnel. In the &lt;em&gt;&#39;Source port&#39;&lt;/em&gt;&amp;nbsp;enter 8080 (or any port number you wish that is above 1028). Leave the &lt;em&gt;&#39;Destination&#39;&lt;/em&gt; blank but choose the radio buton &lt;em&gt;&#39;Dynamic&#39;&lt;/em&gt;. Click Add. Then, at the left side of Putty, navigate back to session (where you were before when you typed the hostname or SSH server&#39;s IP address), and save the profile. Finally, click &lt;em&gt;&#39;Open&#39;&lt;/em&gt;. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjixozS518ulbhqD6bhYW_r2wEc6aaoyRAQUzb52fhZIwrZCBsT-QO9tYR4C6LSX_K-kYHGNpG8Du5wQqPJc0DXHxRU2KXixvQ_ncqYFpHbFl_8b2TRWPfZPOF7omqWMW2UFZIgPeRkx5GT/s1600/SSH+forwarding.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjixozS518ulbhqD6bhYW_r2wEc6aaoyRAQUzb52fhZIwrZCBsT-QO9tYR4C6LSX_K-kYHGNpG8Du5wQqPJc0DXHxRU2KXixvQ_ncqYFpHbFl_8b2TRWPfZPOF7omqWMW2UFZIgPeRkx5GT/s400/SSH+forwarding.JPG&quot; height=&quot;275&quot; qda=&quot;true&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
3. After you&amp;nbsp;clicked &lt;em&gt;&#39;Open&#39;&lt;/em&gt;, a black box appears showing your SSH session is successful. you will have to enter the remote server&#39;s SSH login credentials (username and password).&amp;nbsp;Make sure you are logged in to the remote server. &lt;br /&gt;
&lt;br /&gt;
4. Once connected to the remote server via SSH, open Mozilla Firefox. Under &lt;em&gt;&#39;Advanced&#39; &lt;/em&gt;tab, choose &lt;em&gt;&#39;Network&#39;.&lt;/em&gt; Inside the &lt;em&gt;&#39;Cnnection&#39;&lt;/em&gt; box under the &lt;em&gt;Network&lt;/em&gt; tab, click settings. A new menu box will then appear. Fill the boxes up as shown in the photo below, except that under port, you should put in the port you put in the SSH &amp;gt;&amp;gt; tunnels configuration box before you made the SSH connection in Putty. in our case, it was port 8080. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHt4iORU-oJxm7yrOtOhVD-eH1bK8W1243QH8JpeoMWwdU-X-Ze9rcyDCYKJAsGlEfkf1so-KToAiGyUHXYA399dDOQUFJ8KqR1N8St1xNAfzwwXm7s5mHwXuyLWG3ITkuImno51Yvq9Tz/s1600/SSH+forwarding-firefox+sockets.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHt4iORU-oJxm7yrOtOhVD-eH1bK8W1243QH8JpeoMWwdU-X-Ze9rcyDCYKJAsGlEfkf1so-KToAiGyUHXYA399dDOQUFJ8KqR1N8St1xNAfzwwXm7s5mHwXuyLWG3ITkuImno51Yvq9Tz/s400/SSH+forwarding-firefox+sockets.JPG&quot; height=&quot;236&quot; qda=&quot;true&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
5. Close all dialogue boxes (but keep the putty SSH connection open). You can now surf&amp;nbsp;using Mozilla Firefox without being filtered by your corporate firewall. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhURBVGV0jQGqTORUnc1NKH6lP8avlAtkjbT37I3xvXji6J6-c8w6GseN_SQ0ymz3oha4n2z-iTc6V_pNrtlWHdcSNXZXH_f1qRpZQ4FghozUxv-ql4MLlXTxrZ1AF8lUqSHF2LEh3udpkR/s1600/SSH+forwarding-success.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhURBVGV0jQGqTORUnc1NKH6lP8avlAtkjbT37I3xvXji6J6-c8w6GseN_SQ0ymz3oha4n2z-iTc6V_pNrtlWHdcSNXZXH_f1qRpZQ4FghozUxv-ql4MLlXTxrZ1AF8lUqSHF2LEh3udpkR/s400/SSH+forwarding-success.JPG&quot; height=&quot;250&quot; qda=&quot;true&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
If you are going to use&amp;nbsp;SSH&amp;nbsp;tunneling for something else apart from using it as a web socket proxy, remember step number 2 above. This time instead, check all boxes, and choose the &lt;em&gt;&quot;Local&quot;&lt;/em&gt; radio button instead of &lt;em&gt;&quot;Dynamic&quot; &lt;/em&gt;radio button.&amp;nbsp;In the &lt;em&gt;&quot;Destination&quot;&lt;/em&gt; textbox,&amp;nbsp;enter your destination in the format &amp;lt;ip address&amp;gt;:&amp;lt;port number&amp;gt;. Thus, if you are connecting to the&amp;nbsp;remote server&#39;s&amp;nbsp;MySQL port (port 3306) for example, you put &amp;lt;IP Address&amp;gt;:3306.&amp;nbsp;Save the&amp;nbsp;session, then repeat&amp;nbsp;steps 3-4. You should be able to use the new port&amp;nbsp;pairing as your redirection pair. That is, if you connect to&amp;nbsp;your local computer&#39;s IP address via the &lt;em&gt;&amp;lt;source port&amp;gt;&lt;/em&gt;&amp;nbsp;you will instead be redirected to the &lt;em&gt;&amp;lt;destination server:port&amp;gt;.&lt;/em&gt;&lt;br /&gt;
&lt;br /&gt;
We can give more examples in&amp;nbsp;our next&amp;nbsp;posts. If you have questions and&amp;nbsp;need some examples, feel free to post it under comments.&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
  var _gaq = _gaq || [];
  _gaq.push([&#39;_setAccount&#39;, &#39;UA-30696259-1&#39;]);
  _gaq.push([&#39;_trackPageview&#39;]);

  (function() {
    var ga = document.createElement(&#39;script&#39;); ga.type = &#39;text/javascript&#39;; ga.async = true;
    ga.src = (&#39;https:&#39; == document.location.protocol ? &#39;https://ssl&#39; : &#39;http://www&#39;) + &#39;.google-analytics.com/ga.js&#39;;
    var s = document.getElementsByTagName(&#39;script&#39;)[0]; s.parentNode.insertBefore(ga, s);
  })();
&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/5392482225398912375/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2012/04/practical-ssh-tunneling-using-putty-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/5392482225398912375'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/5392482225398912375'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2012/04/practical-ssh-tunneling-using-putty-to.html' title='Practical SSH Tunneling: Using Putty to Bypass Web Filters and Firewalls'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwrEoH-JQa_NO1L3BITQ8fzhFpgBZGmwNcVu9Ou7t0gcwok276Ew03Prq8FQ_qDiV2TkfKsTwQdY0m1Cey6bKCphApk-qzyt6R07lNdcR3ybDoNd-ymZjpAgn2mlmWkKTvzE2TqwYtwK_L/s72-c/SSH+forwarding-session.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-6574894280428856172</id><published>2012-04-11T23:16:00.000+08:00</published><updated>2015-02-26T17:24:19.935+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Consumer IT"/><category scheme="http://www.blogger.com/atom/ns#" term="fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="IT Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Paypal"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Spoof"/><title type='text'>Paypal Spoof: How I knew the Paypal email I recieved was fraudulent</title><content type='html'>I had a recent experience with email spoofing involving Paypal, and I would like to share how I recognized the email as spoofed and thus was fraudulent.&lt;br /&gt;
&lt;br /&gt;
My wife was selling her Macbook. Like most Gen X/Y couples do, we posted her for sale Macbook on eBay, and other trading sites. Two days later, we received an email from someone with a yahoo account asking what the prices would be in US dollars, including shipment to Nigeria. He didn&#39;t give a name and he didn&#39;t leave a shipping address. We told him the price would be US $450, but that he will have to shoulder the shipping cost depending on the address, and his favored shipping method/company would be. He said he wants to transact via Paypal, and even offered to up the price to US $580 including shipping cost -- what generosity.&lt;br /&gt;
&lt;br /&gt;
So that night, I sent &amp;nbsp;him an invoice from my Paypal account. 24 hours past and I received a notification claiming to have come from services@intl.paypal.com informing me that payment had been made. Careful examination reveals it was a spoofed/phishing email. He was bamboozling me! &amp;nbsp;Here&#39;s how I immediately knew it was fake (click the picture to enlarge):&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm2R9K9XFtbWsr25Kui7r_S_Zrg10V6ynp_IFZQHq2yxE82HSZVqkiCk6MPg7wQUIVCzmRXrx1RJdnDhP3QINsrmr-IpwhJVsLFj-JuTS8qT09cMHD0v5A3qhn40r84N9Mnvf1rc5jLgAr/s1600/Paypal+spoofed1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm2R9K9XFtbWsr25Kui7r_S_Zrg10V6ynp_IFZQHq2yxE82HSZVqkiCk6MPg7wQUIVCzmRXrx1RJdnDhP3QINsrmr-IpwhJVsLFj-JuTS8qT09cMHD0v5A3qhn40r84N9Mnvf1rc5jLgAr/s400/Paypal+spoofed1.JPG&quot; height=&quot;250&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ7SrwhsAdXUAhNN5kH_hHOm-qtA5hKK6nQaAkOx7FTMxdSvItnvKFI6iCxLrDSQ1U4zbVZbcrmK-f9ggv2rVc3YdvSMOf2CG8zlOW99fMHePrE4uWbC11FfTbG1d9SOMmoNVon-sTtZWL/s1600/Paypal+spoofed2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ7SrwhsAdXUAhNN5kH_hHOm-qtA5hKK6nQaAkOx7FTMxdSvItnvKFI6iCxLrDSQ1U4zbVZbcrmK-f9ggv2rVc3YdvSMOf2CG8zlOW99fMHePrE4uWbC11FfTbG1d9SOMmoNVon-sTtZWL/s1600/Paypal+spoofed2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ7SrwhsAdXUAhNN5kH_hHOm-qtA5hKK6nQaAkOx7FTMxdSvItnvKFI6iCxLrDSQ1U4zbVZbcrmK-f9ggv2rVc3YdvSMOf2CG8zlOW99fMHePrE4uWbC11FfTbG1d9SOMmoNVon-sTtZWL/s400/Paypal+spoofed2.JPG&quot; height=&quot;250&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. The email address was spoofed. &lt;/b&gt;Email spoofing is when one attempts to hide the true email that was used. In an email header, the email address is shown as &quot;&lt;i&gt;My Display Name &amp;lt;my@email-address.com&amp;gt;&quot;&lt;/i&gt;&amp;nbsp;&amp;nbsp;Thus, in my supposed Paypal payment notification email the display name is &quot;services@intl.paypal.com&quot; which coincidentally is the email where correct Paypal notifications are sent with. The email address with which it was sent with (inside the &quot;&amp;lt;&amp;gt;&quot; characters) was customerservice@accountant.com (not a correct email for Paypal). BUT, when you reply to this email, you will have a reply to email address of &quot;customer_agency@consultant.com! So which is which? Highly suspect indeed.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #20124d;&quot;&gt;&lt;u&gt;The General Rule&lt;/u&gt;:&lt;/span&gt;&lt;/b&gt;&amp;nbsp;&lt;i&gt;Reputable websites have the same web name, email address, email address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; display name, and any other name they have in the web.&lt;/i&gt; These companies go out their way to ensure they have a single name-presence in the internet. They pay money to buy all domain names relevant to their canonical (aka commonly used) name. Besides, search portals such as Google works best with consolidated domain names. It doesn&#39;t make sense for these websites to use any other name.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. PENDING status?? &lt;/b&gt;As far as I know, there is no notification for a pending status in Paypal. I don&#39;t think there ever was. I admit though that I may be wrong, so I examined other fields as well.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Payment approved but not reflecting in Account until shipment tracking confirmation was sent?&lt;/b&gt;&amp;nbsp;I was using Paypal for quite some time and I never saw that particular status. I don&#39;t think this status ever existed.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;u&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #20124d;&quot;&gt;The General Rule&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;u&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #20124d;&quot;&gt;:&lt;/span&gt; &lt;/u&gt;&lt;i&gt;When&amp;nbsp;in doubt, open your Paypal account &amp;nbsp;and check the status directly there. &lt;/i&gt;Your paypal account should contain the correct status. Just to be sure, wait a few hours (sometimes they take time to update). In my case, I waited a day. But the status still remains &quot;unpaid&quot; and even &quot;Overdue&quot;. This rule applies to all other web-based portals and payment tools. Don&#39;t click the link nor trust the email. Go directly to the payment portal website the old-fashioned way -- by typing the URL in the URL bar. That should be safe -- at least until the site itself was hacked or their domain name was hijacked. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Questions? Contact our customer center at customer_agency@consultant.com&lt;/b&gt;. &amp;nbsp;We discussed domain names in the first item. This is suspect. why wouldn&#39;t their customer center be customer_center@paypal.com? &amp;nbsp;But what really caught my eye was the fact that the original Paypal account never encouraged recipients to reply to their emails. They instruct Paypal account owners to login directly to their paypal accounts and check the status there. They tell Paypal users to instead use their online help center inside their Paypal accounts. &lt;i&gt;In fact, they give you all other options to contact them but explicitly tell you not to reply to their emails.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;u&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #20124d;&quot;&gt;The General Rule&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #20124d;&quot;&gt;:&lt;/span&gt; This is the golden rule when transacting online. &lt;i&gt;Be familiar with how your online payment sites work! &lt;/i&gt;Be a killer for details. After all, its your money. If you&#39;re using your bank&#39;s online banking facility, ask the bank what normal notifications should look like. Be familiar with every detail on the email invoices and notifications. Ask your friends what their invoices and notificaitons would normally look like and check if yours is suspect. &lt;i&gt;Most importantly, when in doubt -- do not transact online.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
I immediately forwarded this email to spoof@paypal.com and they replied a day later confirming my suspicions. I was glad I waited. Be careful with these kind of transactions because the supposed buyer harasses you via email demanding the shipment tracking details claiming they already paid. They know that the next 48 hours is crucial. If they don&#39;t close the con within 48 hours, chances are they will be caught. Thus in my case, the supposed buyer even threatened to report me to the FBI for allegedly defrauding him of US $580.00.&lt;br /&gt;
&lt;br /&gt;
Detecting fraud is more akin to social skills rather than with one&#39;s technical skills -- and that is true when doing online transaction as it is true when transacting with people face-to-face. The fact that my supposed customer was overtly generous should have already made me suspect him. You can be generous with charities. You can be generous with family. But will you offer unsolicited generosity on a faceless online seller you didn&#39;t know? Also, him not telling us what his real name was a major red flag.&lt;br /&gt;
&lt;br /&gt;
It takes great effort to lie. That&#39;s why we call cons artists. But lying in the internet is easier due to the faceless interaction. Then again, there are ways we to catch one fraudulent transaction over the internet. Even over the web, transactions are still personal. Follow your gut, have the sense that is common to all, study the person/company/website you are transacting with, be a sucker for details; and, when in doubt, don&#39;t.&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
  var _gaq = _gaq || [];
  _gaq.push([&#39;_setAccount&#39;, &#39;UA-30696259-1&#39;]);
  _gaq.push([&#39;_trackPageview&#39;]);

  (function() {
    var ga = document.createElement(&#39;script&#39;); ga.type = &#39;text/javascript&#39;; ga.async = true;
    ga.src = (&#39;https:&#39; == document.location.protocol ? &#39;https://ssl&#39; : &#39;http://www&#39;) + &#39;.google-analytics.com/ga.js&#39;;
    var s = document.getElementsByTagName(&#39;script&#39;)[0]; s.parentNode.insertBefore(ga, s);
  })();
&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/6574894280428856172/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2012/04/paypal-spoofed.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/6574894280428856172'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/6574894280428856172'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2012/04/paypal-spoofed.html' title='Paypal Spoof: How I knew the Paypal email I recieved was fraudulent'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm2R9K9XFtbWsr25Kui7r_S_Zrg10V6ynp_IFZQHq2yxE82HSZVqkiCk6MPg7wQUIVCzmRXrx1RJdnDhP3QINsrmr-IpwhJVsLFj-JuTS8qT09cMHD0v5A3qhn40r84N9Mnvf1rc5jLgAr/s72-c/Paypal+spoofed1.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-7145535660501884366</id><published>2012-04-08T11:18:00.000+08:00</published><updated>2012-05-10T08:07:01.335+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Blizzards"/><category scheme="http://www.blogger.com/atom/ns#" term="Consumer IT"/><category scheme="http://www.blogger.com/atom/ns#" term="Diablo 3"/><category scheme="http://www.blogger.com/atom/ns#" term="Hack and Slash"/><category scheme="http://www.blogger.com/atom/ns#" term="PC Games"/><category scheme="http://www.blogger.com/atom/ns#" term="RPG"/><title type='text'>Diablo III Will Be Available in Manila Stores May 15</title><content type='html'>&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;font-family: Sylfaen, serif; font-size: 14pt;&quot;&gt;Diablo III&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt; will hit stores in Manila, Philippines&amp;nbsp;May 15, 2012 – the same day Blizzard announced the much-anticipated sequel to its successful Diablo series in North America. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt; text-align: center;&quot;&gt;
&lt;shapetype coordsize=&quot;21600,21600&quot; filled=&quot;f&quot; id=&quot;_x0000_t75&quot; o:preferrelative=&quot;t&quot; o:spt=&quot;75&quot; path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; stroked=&quot;f&quot;&gt;&lt;stroke joinstyle=&quot;miter&quot;&gt;&lt;/stroke&gt;&lt;formulas&gt;&lt;f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;sum @0 1 0&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;sum 0 0 @1&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;prod @2 1 2&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;prod @3 21600 pixelWidth&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;prod @3 21600 pixelHeight&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;sum @0 0 1&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;prod @6 1 2&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;prod @7 21600 pixelWidth&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;sum @8 21600 0&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;prod @7 21600 pixelHeight&quot;&gt;&lt;/f&gt;&lt;f eqn=&quot;sum @10 21600 0&quot;&gt;&lt;/f&gt;&lt;/formulas&gt;&lt;path gradientshapeok=&quot;t&quot; o:connecttype=&quot;rect&quot; o:extrusionok=&quot;f&quot;&gt;&lt;/path&gt;&lt;lock aspectratio=&quot;t&quot; v:ext=&quot;edit&quot;&gt;&lt;/lock&gt;&lt;/shapetype&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpV4bpQNvyWJnAIE6v9Y1cVuVFn8ORk5afkoKPILnQLG-Yk5o-enlYcQvtIzUBR8mrY8Y2EYwmKSkRH9QsoEW8gPWSV_QNRN3rNYfr6hHQQ0rCmJZaZQnyrZV7eGNTJiIiA0KRKH5BDH7H/s1600/20120407_185335.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; nda=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpV4bpQNvyWJnAIE6v9Y1cVuVFn8ORk5afkoKPILnQLG-Yk5o-enlYcQvtIzUBR8mrY8Y2EYwmKSkRH9QsoEW8gPWSV_QNRN3rNYfr6hHQQ0rCmJZaZQnyrZV7eGNTJiIiA0KRKH5BDH7H/s320/20120407_185335.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;I can’t help it. I just have to blog it. I was hoping to write something else – something more attuned with my network engineering blogs. Then it happened. I was walking at the Annex of SM North Edsa with my wife when I saw a box of Diablo III prominently in display on ‘i-Tech’ (I know, it seems hip nowadays to name everything with an ‘I’: like &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;i-Surprise&lt;/i&gt;, or &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;i-Eager&lt;/i&gt; ; but that’s for another blog). The shop was offering reservations for P500.00 (~US $12.00). Prudence got the better of me and held back on the reservations since the shop can’t give me any specific price for the retail yet. The shopkeepers was ‘guessing’ that the retail price is somewhere in the P2,500 range (~US $59.00). If that would be true, then the price is less than Starcraft 2, Wings of Liberty that I bought for about P3,000. &lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;It had been more than a decade since I last played Diablo II. I was at the University then, I was constantly juggling playing through Starcraft, Diablo and Counterstrike – that is, I would play any of the three depending on what my other ‘team mates’ would like. When you grow tired of playing the standard game, play hardcore – just make sure you immediately pull the power off the PC when your character is about to die. Better yet, play around the platoon of character editors available and give your Barbarians ‘Paladin auras’, or your favorite characters all the money and items you can ‘create’. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;I loved of all of it – the good and the bad. I loved the boring game mechanics of hacking through a throng of enemies to level up; the single story line; the simple and un-unique way of building your character classes; and, the single game play view. I can go all day about how many other role-playing hack and slash games there are at the time, but Diablo is the game we play – I don’t know why, but it’s just it. The same way people liked Mario and Luigi perhaps. Diablo was not the best in its genre in terms of game-play mechanics, story plot, or visuals. But it was engaging. For us back then in 1999-2000, Diablo II was among the best of its kind. &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMGzrMDidO6WOJBeSnCkIFLwqfvOGfkdyNg8E5otHmc6UiQEk_bNi3cPPO-ypRYb5d9WmxjKn5nWzkukxx2FFe5mGvxVLF_Bxd922rj2a75bJ6qJwyhlYnsdAacLMAqYGalBznCfmGgoru/s1600/artwork-0097-large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; nda=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMGzrMDidO6WOJBeSnCkIFLwqfvOGfkdyNg8E5otHmc6UiQEk_bNi3cPPO-ypRYb5d9WmxjKn5nWzkukxx2FFe5mGvxVLF_Bxd922rj2a75bJ6qJwyhlYnsdAacLMAqYGalBznCfmGgoru/s200/artwork-0097-large.jpg&quot; width=&quot;142&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;Diablo III will be true to its classic form. A hack and slash genre of game that features five (5) character classes. Of the five character classes, only one character class will make a comeback. The &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Barbarian&lt;/span&gt;&lt;/i&gt; class debuted in Diablo II and is now back in third installation of Diablo. All the other four characters are new. In my humble opinion though, they seem to be rehashes of the old character classes. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJf0shZ-bxoKCCMjv_MKPl3K2iNGeVnLiTV4qyB1_FstqxFtJ1ZuJY5P1CN75rdKh4lL5-_Of2J0NrxnFSONBKkRlGVe3dz1NUo1o7hkHo8RIoFOGMYl8O21VyJ8CmRvz_VVUV9Z4mAZOr/s1600/artwork-class-demonhunter01-large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; cssfloat: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;152&quot; nda=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJf0shZ-bxoKCCMjv_MKPl3K2iNGeVnLiTV4qyB1_FstqxFtJ1ZuJY5P1CN75rdKh4lL5-_Of2J0NrxnFSONBKkRlGVe3dz1NUo1o7hkHo8RIoFOGMYl8O21VyJ8CmRvz_VVUV9Z4mAZOr/s200/artwork-class-demonhunter01-large.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;I was a little disappointed that the &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Paladi&lt;/span&gt;n&lt;/i&gt;, a mainstay in past Diablo series, is absent in Diablo III. You would have loved the way it hacks and slashes through all those bugs. He is the beacon of light in the middle of a swarm of insect-like things (more like cockroaches). &amp;nbsp;He just can’t be killed. I was hoping the new class &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Demon-hunter&lt;/span&gt;&lt;/i&gt; would be like the Paladin but more mean-bad-ass type. However, the Demon-hunter is more like an archer/hunter type of class. In fact, &amp;nbsp;Blizzard seems to have removed any cavalier knight-type class in Diablo III! Nevertheless, this would definitely be the character class I will try first in Diablo III. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1aW7G6OShh1x_FvqcI9MXyh9CK5WE3y0nFhNgv7EEhyphenhyphen3rqGL8MmPzQmuRHFWzwQ6fS47SqpHFO85BunrReF7I_ZytEpWlImDFBka21yWuKxR9BQa-w4PkBC-5f4lkUEZII-Ee7s4lpHNK/s1600/artwork-witch-doctor02-large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; nda=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1aW7G6OShh1x_FvqcI9MXyh9CK5WE3y0nFhNgv7EEhyphenhyphen3rqGL8MmPzQmuRHFWzwQ6fS47SqpHFO85BunrReF7I_ZytEpWlImDFBka21yWuKxR9BQa-w4PkBC-5f4lkUEZII-Ee7s4lpHNK/s200/artwork-witch-doctor02-large.jpg&quot; width=&quot;140&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;The &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Witch doctor&lt;/span&gt;&lt;/i&gt; seems to imitate the makings of the &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Necromancer&lt;/span&gt;&lt;/i&gt; class but Blizzards is fast to clear out that the Witch Doctor is not meant to replace the latter. Blizzards, even hinted that the dead-animating spell-caster might return in subsequent expansions of Diablo III. The &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Wizard&lt;/span&gt;&lt;/i&gt; looks like a version of the &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Sorceress&lt;/span&gt;&lt;/i&gt; (or &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Sorcerer&lt;/span&gt;&lt;/i&gt; in Diablo I) with most of its spells based on the elements.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmcKAP_LG5rzheaq9k4kLnrgpEUeXIrGJLWn1u0gEPu3cHFYPGbSYlE5ZdDc28Bb6O4nonGGYTVJ5q_2XHGp9dsB7K1QaO9gTQVzWaSg0xjxwKQQeuYqrOcROdvhhj_Xjtuo2PGfySdwPV/s1600/artwork-0072-large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; nda=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmcKAP_LG5rzheaq9k4kLnrgpEUeXIrGJLWn1u0gEPu3cHFYPGbSYlE5ZdDc28Bb6O4nonGGYTVJ5q_2XHGp9dsB7K1QaO9gTQVzWaSg0xjxwKQQeuYqrOcROdvhhj_Xjtuo2PGfySdwPV/s200/artwork-0072-large.jpg&quot; width=&quot;115&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;Now the &lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&lt;span style=&quot;color: #1f497d;&quot;&gt;Monk &lt;/span&gt;&lt;/i&gt;is an all-new class altogether. Blizzards characterization of Monk as a character capable of “rapid-fire attacks unarmed or with a variety of well-balanced weapons”. After I grew tired of the demon-hunter, I’ll try this out. I am guessing this is the new class to beat in PvP. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt 0in; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;The new game mechanics is also a welcome change. All character classes can now be started in any gender (male&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxu0qggJUrSe7wcYJ4jLzIZkErCe5r9iMNIBQEvvuisiBCzK0AnIgYzU0uZ88tNc7pRvv9GZ8Qv1xM7duWgdgxcFBWgGsht7NZg4IgMnqp5_LxSDmyZpDlcLMXj-AFRlNf5AslgBmQmExb/s1600/artwork-class-monk02-large.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; cssfloat: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; nda=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxu0qggJUrSe7wcYJ4jLzIZkErCe5r9iMNIBQEvvuisiBCzK0AnIgYzU0uZ88tNc7pRvv9GZ8Qv1xM7duWgdgxcFBWgGsht7NZg4IgMnqp5_LxSDmyZpDlcLMXj-AFRlNf5AslgBmQmExb/s200/artwork-class-monk02-large.jpg&quot; width=&quot;140&quot; /&gt;&lt;/a&gt; or female). Each character now has &amp;nbsp;a group of abilities that require other ‘sources of power’ other than mana. &amp;nbsp;I’m not sure how this works but the way it’s described, it is a potential way of making each character builds unique. I’ve heard that Blizzard has customized a new graphic engine and will not be using the old Havoc engine. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;Deckard Cain&lt;/i&gt; also makes a comeback. He should already be an immortal – having been present in all Diablo series. It would be good to have a secret level where players can control Deckard Cain. Perhaps Blizzard can include a three-level dungeon where players can level-up, equip, and smash through enemies using the Deckard Cain. That is wishful thinking but still nice to have in future expansions. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;You can check more of Diablo III on its official website at &lt;/span&gt;&lt;a href=&quot;http://us.battle.net/d3/en/&quot;&gt;&lt;span style=&quot;color: purple; font-family: Calibri;&quot;&gt;http://us.battle.net/d3/en/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt;. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;If you do not have a WOW annual pass (because if you do, you can get Diablo III free), you can call i-Tech at +632 332 2871 to make a reservation for P500. The store’s not mine so I don’t get anything for posting them. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0.5in 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;Come on guys (and gals). Don’t play copyright-infringed copies of the game (aka pirated). We had fun in our days but now, I’m sure we can spare some few bucks for it. After all, if it is really good, it is worth buying. If not, why bother? &lt;/span&gt;&lt;span style=&quot;font-family: Wingdings;&quot;&gt;J&lt;/span&gt;&lt;span style=&quot;font-family: Calibri;&quot;&gt; &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;img height=&quot;96&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmcKAP_LG5rzheaq9k4kLnrgpEUeXIrGJLWn1u0gEPu3cHFYPGbSYlE5ZdDc28Bb6O4nonGGYTVJ5q_2XHGp9dsB7K1QaO9gTQVzWaSg0xjxwKQQeuYqrOcROdvhhj_Xjtuo2PGfySdwPV/s200/artwork-0072-large.jpg&quot; style=&quot;filter: alpha(opacity=30); left: 204px; mozopacity: 0.3; opacity: 0.3; position: absolute; top: 180px; visibility: hidden;&quot; width=&quot;55&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
  var _gaq = _gaq || [];
  _gaq.push([&#39;_setAccount&#39;, &#39;UA-30696259-1&#39;]);
  _gaq.push([&#39;_trackPageview&#39;]);

  (function() {
    var ga = document.createElement(&#39;script&#39;); ga.type = &#39;text/javascript&#39;; ga.async = true;
    ga.src = (&#39;https:&#39; == document.location.protocol ? &#39;https://ssl&#39; : &#39;http://www&#39;) + &#39;.google-analytics.com/ga.js&#39;;
    var s = document.getElementsByTagName(&#39;script&#39;)[0]; s.parentNode.insertBefore(ga, s);
  })();
&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/7145535660501884366/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2012/04/diablo-iii-will-be-available-in-manila.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/7145535660501884366'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/7145535660501884366'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2012/04/diablo-iii-will-be-available-in-manila.html' title='Diablo III Will Be Available in Manila Stores May 15'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08675792956396659631</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpV4bpQNvyWJnAIE6v9Y1cVuVFn8ORk5afkoKPILnQLG-Yk5o-enlYcQvtIzUBR8mrY8Y2EYwmKSkRH9QsoEW8gPWSV_QNRN3rNYfr6hHQQ0rCmJZaZQnyrZV7eGNTJiIiA0KRKH5BDH7H/s72-c/20120407_185335.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3862670861101019814.post-345570243454870649</id><published>2012-04-06T21:17:00.000+08:00</published><updated>2014-06-08T02:13:42.833+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="B2B"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="hairpinning"/><category scheme="http://www.blogger.com/atom/ns#" term="How to Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="ipsec"/><category scheme="http://www.blogger.com/atom/ns#" term="IT Security"/><category scheme="http://www.blogger.com/atom/ns#" term="L2L"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="Site to site"/><category scheme="http://www.blogger.com/atom/ns#" term="tunneling"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>Interconnecting Different Sites Using VPN Hairpinning with Cisco ASA Sample Configuration</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
This is &amp;nbsp;my first post in my newly created blog and I thought of sharing a project I did back in 2007. I was then working for a Danish company &amp;nbsp;who have offices, and clients, in &amp;nbsp;North America, South America, Europe, Asia, and Africa (North and East Africa to be more specific).&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;u&gt;The problem&lt;/u&gt; was how to interconnect all our offices and clients in these 5 continents fast, and inexpensively. We had support centers in Denmark, US and the Philippines and all our support personnel, and subject matter experts need to have access to the company&#39;s servers and systems deployed inside client&#39;s data centers scattered worldwide. We need to be able to SSH the servers; access the web and databases of the system; and, access server iLO (HP servers&#39; integrated lights out) and KVMs. The inexpensive and fast, yet secure solution, is VPN.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
VPN is fast to deploy, is secure, and -- as most finance directors would like -- inexpensive. Do note that VPN is not the best solution when involving latency-sensitive traffic such as VoIP, and videoconferencing.&amp;nbsp;For brevity, I did not include all other ASA configurations such as hostname, domain, and Firewalls. We will only show the VPN configurations and other relevant configuration lines. &amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;i&gt;&lt;u&gt;The Scenario:&amp;nbsp; &lt;/u&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
A certain&lt;b&gt; Company ‘A’&lt;/b&gt; has a Regional Office Headquarters (RoHQ) in Singapore that needs to access servers and systems deployed to a client in the US. Company ‘A’ has a &amp;nbsp;contact and support center in the Philippines who also needs to access the system deployed in our US-based client. As is the usual case, both companies agreed that their respective networks should be NAT-ed to a public IP address.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPUHyVJVOQH9DdW9y0VuPpGPDIaUaR08l_dc-cszdHTgaftMlAEkP0ENu4YxHPOV0xLgp1x1C5MvXZDQqQI4ka3ltGF20RMIZBQu4lceztQfudx2C91_-PKRaDMbjQL-cfhJo5NW8L8wyk/s1600/VPN+hairsplitting+Example.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPUHyVJVOQH9DdW9y0VuPpGPDIaUaR08l_dc-cszdHTgaftMlAEkP0ENu4YxHPOV0xLgp1x1C5MvXZDQqQI4ka3ltGF20RMIZBQu4lceztQfudx2C91_-PKRaDMbjQL-cfhJo5NW8L8wyk/s400/VPN+hairsplitting+Example.jpg&quot; height=&quot;330&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
The setup is illustrated in the diagram above. &amp;nbsp;Our objective is to make the Local Area network (LAN) 10.5.0.0/16 in Philippines, be able to communicate with Singapore’s LAN at 10.1.0.0/16. Both the Philippines and Singapore offices should be able to reach the system deployed in our US-based client whose &#39;NAT&#39; IP address is 111.22.33.49. All IPs communicating to 111.22.33.49 should be NAT-ed to 202.11.22.34. For simplicity, no NAT should be applied for Company ‘A’’s traffic from and to Singapore and the Philippines.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, our solution is to interconnect all sites using VPN hairpinning over a hub and spoke topology. Traffic from the Philippines will be routed first to Singapore whose VPN concentrator processes the packets, &amp;nbsp;and forwards them to the US-based client when applicable. The Singapore RoHQ network in this scenario is the hub while the Philippines and US-based client as the &#39;spokes&#39;.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Here is the configuration for the topology shown above. Command lines starting with ‘!’ are comments or documentations. They serve as guides and instructions for us to understand the reason why each line of the configuration was given.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: 0.75in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;i&gt;1.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;u&gt;Relevant VPN Configuration for ASAFWSG1&lt;/u&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!First, we configure the interface names. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!this is how ASA works – &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!by interface names and security levels&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Interface Ethernet0/0 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Description #TO INTERNET#&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Nameif outside&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Security-level0&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;IP address 202.11.22.33 255.255.255.240 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Interface Ethernet0/1&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Nameif inside&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Security-level 100&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;IP address 10.1.0.254 255.255.255.0 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!As discussed, hairpinning works by routing traffic...&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!through the same interface&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;!thus it is necessary to allow same-traffic intra-interface&lt;/span&gt;&lt;span style=&quot;font-size: 10pt;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Same-security-traffic permit intra-interface &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Now we define the VPN. There are two VPNs, one to ASAFWPH1&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!and another to Client US (host name not provided)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Let us start by defining the Encryption Domains… &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!(aka CryptoAccess-List)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Notice the presence of both US and SG… &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!subnets in both Crypto ACL, and their NAT IPs&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list TO_ASAFWPH1 extended permit ip 10.1.0.0 255.255.0.0 10.5.0.0 255.255.0.0 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list TO_ASAFWPH1 extended permit ip host 111.22.33.49 10.5.0.0 255.255.0.0 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list TO_US-CLIENT extended permit ip host 202.11.22.34 host 111.22.33.49&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Next we define the VPN profiles &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto ipsec transform-set AES128-SHA esp-aes-128 esp-sha-hmac&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT 1 match address TO_ASAFWPH1&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT 1 set transform-set AES128-SHA&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT 1 set peer 122.33.22.11&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT 2 match address TO_US-CLIENT&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT 2 set transform-set AES128-SHA&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT 2 set peer 111.22.33.44&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT interface outside &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto isakmp enable outside&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Notice that there is only 1 crypto isakmp policy.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!the phase 1 policy profile is only needed configured once.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!All other VPN connections can re-use the ISAKMP phase1 policy&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto isakmp policy 1&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Authentication pre-share&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Encryption aes-128&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Hash sha&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Group 2&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Lifetime 86400 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Tunnel-group 122.33.22.11 type ipsec-l2l&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Tunnel-group 122.33.22.11 ipsec-attributes&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Pre-shared-key S@mpl30nlY&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Tunnel-group 111.22.33.44 type ipsec-l2l&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Tunnel-group 111.22.33.44 ipsec-attributes&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Pre-shared-key @$@gr33dW!thCl!3nT&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Now that the VPN is already configured for both… &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!we will configure NAT &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!But first, we will have to define the access-list…&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!that defines what segment will be NAT-ed and what not &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list NAT_EXEMPTION extended permit ip any 10.5.0.0 255.255.0.0&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list NAT_TO_US-CLIENT extended permit ip any host 111.22.33.49&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;background-color: blue; color: #d9ead3; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Now we define the NAT by mapping the nat to a ‘global’ policy&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0in;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: blue; color: #d9ead3; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;background-color: blue; color: #d9ead3; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!This is the NAT for the internet corporate users. ALL USERS&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;global (outside) 10 interface &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!In ASA Nat 0 means that no NAT will be applied&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;nat (inside) 0 access-list NAT_EXEMPTION&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!This is the NAT that applies for Client-US bound traffic &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;global (outside) 2 202.11.22.34&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;nat (inside) 2 NAT_TO_US-CLIENT&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Here is a ‘NAT-deflection’ configuration&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!This is needed because you will have to NAT…&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!traffic from Philippine Branch inbound to Client-US&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;nat (outside) 2 NAT_TO_US-CLIENT&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;margin-left: 0.75in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;i&gt;2.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;u&gt;Relevant VPN configuration for ASAFWPH1&lt;/u&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;margin-left: 0.75in; mso-add-space: auto;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Interface Ethernet0/0 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Description #TO INTERNET#&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Nameif outside&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Security-level0&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;IP address 122.55.19.33 255.255.255.240 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Interface Ethernet0/1&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Nameif inside&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Security-level 100&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;IP address 10.5.1.254 255.255.255.0 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #d9ead3;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!The configuration only mirrors that in ASAFWSG1 appertaining…&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!to configurations directed to PH&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list TO_ASAFWSG1 extended permit ip 10.5.0.0 255.255.0.0 10.1.0.0 255.255.0.0&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list TO_ASAFWPH1 extended permit ip 10.5.0.0 255.255.0.0 host 111.22.33.49&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto ipsec transform-set AES128-SHA esp-aes-128 esp-sha-hmac&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT 1 match address TO_ASAFWPH1&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT 1 set transform-set AES128-SHA&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT&amp;nbsp;1 set peer 202.11.22.33&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT&amp;nbsp;interface outside &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto isakmp enable outside&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto isakmp policy 1&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Authentication pre-share&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Encryption aes-128&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Hash sha&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Group 2&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Lifetime 86400 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Tunnel-group 202.11.22.33 type ipsec-l2l&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Tunnel-group 202.11.22.33 ipsec-attributes&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Pre-shared-key S@mpl30nlY&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!NAT EXEMPTION also needs to be done.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Notice that even traffic to US-CLIENT is NAT-EXEMPTED &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Traffic to US-CLIENT will be NAT-ed in ASAFWSG1&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list NAT_EXEMPTION extended permit ip any 10.1.0.0 255.255.0.0&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list NAT_EXEMPTION extended permit ip any host 111.22.33.49&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;nat (inside) 0 access-list NAT_EXEMPTION&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;global (outside) 10 interface &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: 0.75in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;i&gt;3.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;u&gt;Relevant VPN configuration for US-CLIENT&lt;/u&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Again, the configurations are the same&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!For brevity, we will include only the VPN… &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!and NAT configurations&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!Besides, we normally do not really know the VPN…&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 10pt;&quot;&gt;!configurations on the client side&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto ipsec transform-set AES128-SHA esp-aes-128 esp-sha-hmac&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list TO_COMPANY-A extended permit ip host 111.22.33.49 host 202.11.22.34 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT&amp;nbsp;1 match address TO_COMPANY-A&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT&amp;nbsp;1 set transform-set AES128-SHA&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT&amp;nbsp;1 set peer 202.11.22.33&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto map VPN-OUT&amp;nbsp;interface outside &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto isakmp enable outside&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Crypto isakmp policy 1&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Authentication pre-share&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Encryption aes-128&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Hash sha&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Group 2&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Lifetime 86400 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Tunnel-group 202.11.22.33type ipsec-l2l&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Tunnel-group 202.11.22.33 ipsec-attributes&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;&amp;nbsp; Pre-shared-key @$@gr33dW!thCl!3nT&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;Access-list NAT_TO_COMPANY-A extended permit ip any host 202.11.22.34 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;nat (inside) 2 NAT_TO_COMPANY-A&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;global (outside) 2 111.22.33.49 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.75in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;; font-size: 10pt;&quot;&gt;global (outside) 10 interface &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
  var _gaq = _gaq || [];
  _gaq.push([&#39;_setAccount&#39;, &#39;UA-30696259-1&#39;]);
  _gaq.push([&#39;_trackPageview&#39;]);

  (function() {
    var ga = document.createElement(&#39;script&#39;); ga.type = &#39;text/javascript&#39;; ga.async = true;
    ga.src = (&#39;https:&#39; == document.location.protocol ? &#39;https://ssl&#39; : &#39;http://www&#39;) + &#39;.google-analytics.com/ga.js&#39;;
    var s = document.getElementsByTagName(&#39;script&#39;)[0]; s.parentNode.insertBefore(ga, s);
  })();
&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='http://techienoobie.blogspot.com/feeds/345570243454870649/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://techienoobie.blogspot.com/2012/04/interconnecting-different-offices-using.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/345570243454870649'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3862670861101019814/posts/default/345570243454870649'/><link rel='alternate' type='text/html' href='http://techienoobie.blogspot.com/2012/04/interconnecting-different-offices-using.html' title='Interconnecting Different Sites Using VPN Hairpinning with Cisco ASA Sample Configuration'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPUHyVJVOQH9DdW9y0VuPpGPDIaUaR08l_dc-cszdHTgaftMlAEkP0ENu4YxHPOV0xLgp1x1C5MvXZDQqQI4ka3ltGF20RMIZBQu4lceztQfudx2C91_-PKRaDMbjQL-cfhJo5NW8L8wyk/s72-c/VPN+hairsplitting+Example.jpg" height="72" width="72"/><thr:total>2</thr:total></entry></feed>