<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Networking &#8211; David&#039;s Church Information Technology</title>
	<atom:link href="/category/networking/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>David Szpunar: Owner, Servant 42 and Servant Voice</description>
	<lastBuildDate>Tue, 21 Feb 2012 14:38:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.2</generator>
	<item>
		<title>Unauthorized DHCP Servers: DENIED!</title>
		<link>/2009/09/08/unauthorized-dhcp-servers-denied/</link>
					<comments>/2009/09/08/unauthorized-dhcp-servers-denied/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 08 Sep 2009 14:13:00 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[DHCP]]></category>
		<category><![CDATA[Ethernet]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[switches]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=395</guid>

					<description><![CDATA[Has anyone ever plugged a Cable/DSL router into your network without authorization? Those things have DHCP servers on by default, you probably know that. And you want DHCP at home, and for that matter at work, too. But only one per network, or things get nasty really fast! (There are some legitimate redundant DHCP configuration [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Has anyone ever plugged a Cable/DSL router into your network without authorization? Those things have DHCP servers on by default, you probably know that. And you want DHCP at home, and for that matter at work, too. But only one per network, or things get nasty really fast! (There are some legitimate redundant DHCP configuration options but never involving a consumer appliance!)</p>
<p>But how do you stop these &#8220;rogue&#8221; DHCP servers from accidentally or intentionally wreaking havoc on your network if plugged in? There are a couple of options, all of which involve managed switches and I&#8217;m going to talk in particular about <a title="HP ProCurve" href="http://www.procurve.com/">HP ProCurve</a> switches since that&#8217;s what I have (and love). I know at least some Cisco and Dell switches have similar functionality, and likely others.</p>
<p>You could do something as extreme as locking down every port with <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> address security so the entire port will shut down if anyone plugs an unauthorized computer in. This isn&#8217;t a bad method, if you have your network fully documented, don&#8217;t make changes often, and want the extra management overhead. I have a Church IT friend here in Indianapolis who I know does just that&#8230;awesome! I lock down some ports like this&#8211;nursery checkin stations or public internet terminals primarily. But for the rest of the network, I finally got around to implementing something I knew existed but never had time to research until now: DHCP Snooping. The cool name is just a side benefit!</p>
<p>If your switch(es) support DHCP Snooping, it&#8217;s pretty easy to turn on, but you need to know a little about your network first. Specifically, you need to know:</p>
<ul>
<li>Which switch port(s) your valid DHCP server is connected to.</li>
<li>Which switch port(s) are uplinks to other managed switches.</li>
<li>What VLANs do you want DHCP Snooping protection enabled on?</li>
<li>Optionally, what the IP address is of your DHCP server (or at least which IP is assigned to the server in each VLAN where you want DHCP Snooping enabled).</li>
</ul>
<p>If you choose to configure the authorized DHCP server IP address(es) list, the switches will require the DHCP reply to come from one of the authorized IPs; if you don&#8217;t configure the list then only the switch port source matters.</p>
<p>Let&#8217;s review briefly how DHCP works at a high level. Computer or device is connected to the network and turned on. It sends a DHCP broadcast request to the local segment and a DHCP server that receives the request allocates an available IP address and replies with that IP to the requesting client device, which they has a &#8220;lease&#8221; on the IP until the expiration time defined by the server. At varying intervals before the lease expires, the client sends a renewal request to the originating DHCP server asking if it can keep the IP longer, and the server replies that (usually) yes it can and extends the expiration. The client has no idea what DHCP servers are available initially, hence the broadcast request. If there are multiple DHCP servers on the network that see the request, they will all respond, and the client just picks the one that responds fastest and discards the rest.</p>
<p>Because the client accepts the first DHCP reply it receives, a cable/DSL router will often &#8220;beat&#8221; the correct DHCP server to the reply in some percentage of cases, creating a difficult to troubleshoot problem (which can be subtle if the IP, subnet, DNS and gateway addresses issued by the rogue DHCP server are similar in many ways to the legitimate settings, and more pronounced if they differ entirely). Tracking down the source of an unknown rogue DHCP server usually involves digging into the switch address tables and mapping IPs to <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> addresses to switch ports&#8211;a fun exercise if you want to learn about how switches work and have plenty of free time, but otherwise quite annoying! Even if the rogue server is sending the correct IP/subnet/DNS settings, its list of &#8220;available IPs&#8221; to hand out is maintained separately from the valid DHCP server, and thus you will end up with two devices being issued the same IP at some point, causing an IP conflict which may lead you to discover the existance of the rogue DHCP device after you&#8217;ve finished pulling your hair out :-)</p>
<p>So what is DHCP Snooping? It&#8217;s just the switch forcing valid DHCP replies (not requests from clients&#8211;a DHCP reply is the server issuing an IP assignment to a client who requested one) to only come from valid DHCP servers that you specify and tell the switch about. Your DHCP server is plugged into a particular port on your switch. You configure DHCP Snooping to know that that port is &#8220;trusted&#8221; for DHCP replies. If a device is plugged into an untrusted port (all ports by default), if it tries to send a DHCP reply, the switch drops it, and it never goes anywhere! If all you have is one switch and one server, this is really simple. With multiple switches, it&#8217;s still simple but you do need to make the change on any switch where you enable DHCP Snooping. You&#8217;ll need to trust the port on a secondary switch that is the uplink to the switch where the DHCP replies will be coming from.</p>
<p>How about a brief example. Let&#8217;s say Switch 1 is your &#8220;core&#8221; network switch, and has your DHCP server plugged into port 1. Switch 2 is a secondary switch, and port 24 of Switch 1 is uplinked to port 24 of Switch 2. All the other ports on both switches have clients or other servers plugged into them, and let&#8217;s say you&#8217;re only using one flat VLAN (call it VLAN 1).</p>
<p>On switch 1, you need to tell it that port 1 is trusted so the DHCP server can send its replies on that port. You can optionally tell it port 24 is trusted since your other switch is connected to that port (and it&#8217;s a rogue DHCP server we hope!), but since it will only be sending DHCP replies out too the other switch and not have them coming back &#8220;in&#8221; the port, it&#8217;s not required. Switch 2 requires that you make port 24 trusted, since it will be receiving DHCP replies for its clients incoming on that port from the server that&#8217;s connected to Switch 1. In more complex networks, there may be reasons to have DHCP traverse both directions of an uplink port, and since switches are generally trusted to not randomly sprout internal DHCP servers, it&#8217;s probably easier to just make all uplink ports, regardless of direction, trusted for DHCP Snooping purposes. However, this only applies to uplinks to switches that support DHCP Snooping and have it turned on&#8211;don&#8217;t trust a port that has an unmanaged switch connected or one without DHCP snooping enabled, or any client on that switch can then send DHCP replies to any other client on the managed switch, defeating your entire protection! So only mark ports trusted if they are connected to a DHCP server or if they are connected to another switch which also has DHCP Snooping enabled.</p>
<p>Optionally, tell your switches the valid IP address(es) of the DHCP server so they can drop replies from invalid IP addresses, even on trusted ports. I did this only on my &#8220;core&#8221; switch rather than every one of my managed switches that supports snooping, just for ease of management.</p>
<p>Sounds great! How do you do it? Well I could post the mechanics but it&#8217;s been describe elsewhere very simply. You have to use the command line on ProCurve switches, not the command line menu or the web interface. Get to the command line, type &#8220;config&#8221; to enter configuration mode, and then follow the directions here (the article is good if you ignore the misspelled word &#8220;rogue&#8221; in the title):</p>
<p><a title="Synetx Tek Tips: Preventing Rogue DHCP Servers with HP Procurve Switches" href="http://www.synetx.com/tips/?p=20">Preventing Rogue DHCP Servers with HP Procurve Switches</a></p>
<p>Don&#8217;t forget to turn off option 82 per that article&#8230;I didn&#8217;t try leaving it on but it works for me with it turned off. You may need to check this out in more detail if you&#8217;re doing any sort of multi-VLAN setup with routing where you use DHCP Relay to get other subnets to the DHCP server, I haven&#8217;t tested that. And I&#8217;d run the first command last (just plain &#8220;dhcp-snooping&#8221;), it turns the filtering on but if you set the options first (and you did it correctly) you won&#8217;t prevent any good traffic by configuring first, then enabling!</p>
<p>Another excellent resource is from HP themselves, a four-page <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A document format created by Adobe that preserves visual layout and is cross-platform compatible.','caption', 'Portable Document Format' );"><acronym class="uttInitialism">PDF</acronym></span> titled, &#8220;<a title="HP ProCurve: How to configure DHCP Snooping on ProCurve switches" href="http://h40060.www4.hp.com/procurve/uk/en/pdfs/application-notes/AN-S12_ProCurve-DHCP-snooping-final.pdf">How to configure DHCP Snooping on ProCurve switches</a>.&#8221; Definitely read and understand both the above blog post and this <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A document format created by Adobe that preserves visual layout and is cross-platform compatible.','caption', 'Portable Document Format' );"><acronym class="uttInitialism">PDF</acronym></span> document before setting this up! And make sure to test during scheduled maintenance/downtime&#8230;if you get it wrong, your network will probably stop working :-) Also, there are additional options on some ProCurve switches called arp-protect that use the dhcp-snooping database to verify arp packets and prevent arp spoofing attacks. However, this is even easier to screw up and block even good stuff&#8211;I don&#8217;t recommend you play with it unless you really know what you&#8217;re doing :-)</p>
<p>Some of my ProCurve switches, namely the 2810-24G units and all of the 1800 series, don&#8217;t support DHCP Snooping. You can check the manual, or at the command line (except on the 1800 series which has no command line) type dhcp-snooping followed by a space and question mark (&#8220;dhcp-snooping ?&#8221;) to see if it provides you with help about the command. If the command doesn&#8217;t exist, your switch model doesn&#8217;t support it. It&#8217;s working for me on the 5304xl and the 2650s, but not the 2524 or the 2810-24G (the last one surprises me, the 2524 doesn&#8217;t). Switches that don&#8217;t support it are still going to be vulerable to rogue DHCP servers, but the damage will be limited to that segment at least and not your whole network!</p>
<p>Any comments? Are you using DHCP Snooping? Have you run into a situation where you wish you&#8217;d had it turned on but didn&#8217;t? (I have, fortunately few and far between. But at least once it was one of <em>my</em> servers that I had accidentally configured impoperly! &#8220;Rogue DHCP server&#8221; doesn&#8217;t mean malicious or even end-user created, it can just as easily be &#8220;the server admin messed up&#8221; :-)</p>
<p>Oh yeah, one more tip! On ProCurve switches at least, once you have DHCP Snooping set up, you can get a few details and stats about the assignments. Try these three commands to get a configuration report, view statistics, and view the current bindings databaes:</p>
<blockquote>
<pre>show dhcp-snooping</pre>
<pre>snow dhcp-snooping stats</pre>
<pre>show dhcp-snooping binding</pre>
</blockquote>
<p>Tada! <em>The End</em> (you thought I&#8217;d never get here, didn&#8217;t you? :-)</p>
<p><strong>UPDATE:</strong> Forgot to provide a link to <a title="Dynamic ARP Protection in an HP Procurve Network" href="http://blog.buttewifi.com/?p=56">this article for further reading</a> about ARP Spoofing protection that I briefly mentioned. Good description and flowchart, but there are side-effects you may not realize at first so like I said, be careful with arp-protect :-) Exploiting arp is usually intentional, not accidental like rogue DHCP often is, so hopefully it will be less of a problem especially in churches!</p>
<p><strong>UPDATE 2:</strong> <a title="Twitter: @DerekSchwab" href="http://twitter.com/DerekSchwab">Derek Schwab</a> <a title="Twitter Status Update" href="http://twitter.com/DerekSchwab/status/3845750670">reminded me</a> that the ProCurve switches that support DHCP Snooping are layer 3 switches, while the ones that don&#8217;t are layer 2 (and thus don&#8217;t function at the IP level where DHCP does). Thanks Derek, you&#8217;re right and I didn&#8217;t make the connection myself&#8211;that&#8217;s what friends are for!</p>]]></content:encoded>
					
					<wfw:commentRss>/2009/09/08/unauthorized-dhcp-servers-denied/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
			</item>
		<item>
		<title>Bye Meraki, Hello Open-Mesh: Revisiting the Campground WiFi!</title>
		<link>/2009/07/23/open-mesh-wifi-order/</link>
					<comments>/2009/07/23/open-mesh-wifi-order/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Thu, 23 Jul 2009 19:20:54 +0000</pubDate>
				<category><![CDATA[Companies]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[campground]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Meraki]]></category>
		<category><![CDATA[mesh]]></category>
		<category><![CDATA[Open-Mesh wireless]]></category>
		<category><![CDATA[WiFi]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=391</guid>

					<description><![CDATA[Two years ago, almost to the day (which I just noticed!), I went up to the Indiana District Assemblies of God campground in Hartford City,  IN. Purpose? Set up and test four Meraki Mini mesh routers with their satellite internet connection. You can read about my initial escapade here and here (corny play on words [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Two years ago, almost <em>to the day</em> (which I just noticed!), I went up to the Indiana District Assemblies of God campground in Hartford City,  IN. Purpose? Set up and test four Meraki Mini mesh routers with their satellite internet connection. You can read about my initial escapade <a title="My Post: Off to do some Mesh Networking with Meraki" href="http://infotech.davidszpunar.com/2007/07/24/off-to-do-some-mesh-networking-with-meraki/">here</a> and <a title="My Post: I Can Play The Merakis!" href="http://infotech.davidszpunar.com/2007/07/24/i-can-play-the-merakis/">here</a> (corny play on words and all :-)</p>
<p>Here&#8217;s what&#8217;s changed in two years: Meraki has since redefined their entire business and offers much more expensive solutions, and no Meraki Minis. Also, the campground can now get DSL and not just satellite internet, which is awesome. And although Meraki is for my purposes defunct, <a title="Open-Mesh homepage" href="http://www.open-mesh.com/">Open-Mesh</a> has taken over where Meraki left off and has a similar device at the same price, with better accessories and more power!</p>
<p>This time, we&#8217;re covering more ground as well. So I just ordered nine <a title="Open-Mesh Professional Mini Router OM1P" href="https://www.open-mesh.com/store/products.php?product=Professional-Mini-Router">Open-Mesh OM1P Professional Mini Routers</a>. And six <a title="Open-Mesh: 7dbi Antenna" href="https://www.open-mesh.com/store/products.php?product=7dbi-Antenna">7 dbi antennas</a>, plus three <a title="Open-Mesh: Indoor Wallplug Enclosure for OM1P" href="https://www.open-mesh.com/store/products.php?product=Indoor-Wallplug-Enclosure-for-OM1P">Indoor Wallplug Enclosures</a>. This time I&#8217;m going to be covering more area, and I&#8217;m hoping that using some larger antennas as well as the reports I&#8217;ve heard that the Open-Mesh devices have better range than the Meraki units out of the box mean that we&#8217;ll have a very successful network this time! We&#8217;ll also have two or three DSL lines to serve as injection gateways, which should be a major improvement over the horrendous satellite connection we had before (if you could call it a connection half of the time when it wasn&#8217;t, you know, connected :-)</p>
<p>I plan on taking some pictures and documenting the setup more than last time, and if I find the time I might even blog some of it!</p>
<p>Did I mention my whole order including shipping was under $550? That&#8217;s cool.</p>]]></content:encoded>
					
					<wfw:commentRss>/2009/07/23/open-mesh-wifi-order/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>Dave Ramsey Town Hall For Hope Test</title>
		<link>/2009/04/22/dave-ramsey-townhall-for-hope-test/</link>
					<comments>/2009/04/22/dave-ramsey-townhall-for-hope-test/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Wed, 22 Apr 2009 21:49:59 +0000</pubDate>
				<category><![CDATA[Disaster Recovery]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[bandwidth]]></category>
		<category><![CDATA[Comcast]]></category>
		<category><![CDATA[Dave Ramsey]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[THFH]]></category>
		<category><![CDATA[Town Hall For Hope]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=368</guid>

					<description><![CDATA[We, along with over 6,000 other venues, are hosting the Dave Ramsey Town Hall For Hope event tomorrow night (Thursday the 23rd of April). There have been several tests planned because the event is being distributed via the internet (primarily) to most event host locations. As you can imagine, that&#8217;s quite a bit of bandwidth [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We, along with over 6,000 other venues, are hosting the <a title="Town Hall For Hope" href="http://www.townhallforhope.com/">Dave Ramsey Town Hall For Hope</a> event tomorrow night (Thursday the 23rd of April). There have been several tests planned because the event is being distributed via the internet (primarily) to most event host locations. As you can imagine, that&#8217;s quite a bit of bandwidth and with a large event, a lot of redundancy and backups that LifeChurch.tv (the live event host) gets to have in place to make things run smoothly!</p>
<p>Today there are two final tests (each venue can pick one) where the stream is run for a couple of hours to the venues to make sure things are going smoothly. Last week there were some various hiccups that they found and fixed and this past Monday the test went very smoothly. We ran the afternoon test (the other is tonight) today in our Youth Center where we&#8217;re hosting the event and just after the official test, I decided to test our bandwidth with Comcast. I kept adding streams until I was streaming the 2.5Mbps (highest available) stream seven different times! Bandwidth peaked at over 18.5 Mbps downstream with all those streams running at the same time! And I think we had some bandwidth to spare (this is on our Comcast Business internet connection). Our connection is rated for 16 Mbps down and 2 Mbps up, while I&#8217;ve seen speed tests recently as high as 30 Mbps down and 4.5 Mbps up. Certainly the almost-19Mbps speed seen here is excellent and above our rating!</p>
<p>I&#8217;ve posted a bandwidth graph showing our internet connection&#8217;s utilization (also <a href="http://twitpic.com/3s79z">on TwitPic</a>):</p>
<div id="attachment_369" style="width: 613px" class="wp-caption alignnone"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-369" class="size-full wp-image-369" title="Cacti Graph - Town Hall For Hope Test 7x 2.5 Mbps Stream" src="http://infotech.davidszpunar.com/wp-content/uploads/2009/04/cacti_thfh_test_7x.png" alt="Cacti Graph - Town Hall For Hope Test 7x 2.5 Mbps Stream" width="603" height="247" srcset="/wp-content/uploads/2009/04/cacti_thfh_test_7x.png 603w, /wp-content/uploads/2009/04/cacti_thfh_test_7x-300x122.png 300w" sizes="(max-width: 603px) 100vw, 603px" /><p id="caption-attachment-369" class="wp-caption-text">Cacti Graph - Town Hall For Hope Test 7x 2.5 Mbps Stream</p></div>
<h2>Comcast Fun</h2>
<p>Of course we almost missed the test this morning because someone cut our main Comcast tap this morning just before it went under the parking lot to our building. You can see the actual cut cable (and a part of my shoe) in the <a title="Comcast cable line severed in ground" href="http://twitpic.com/3roxj">picture I uploaded to TwitPic earlier</a>. This caused a four-hour internet outage (8am to noon) that I managed to get back up once I realized (thanks to some prompting from our awesome Facilities Director Mike Moore) that the other end of our building has a completely separate cable tap from Comcast for the TVs on that end of the building! That tap was unharmed so I moved the modem to that IDF and plugged into the tap. I adjusted some VLAN configuration settings to put the firewall&#8217;s WAN port on a private VLAN with the modem&#8217;s LAN interface (it was plugged in directly before) and tada, at 11:58 am (two minutes before we were scheduled to test the Town Hall For Hope stream) the internet came back!</p>
<p>Comcast did come out later (during the Town Hall For Hope test in fact) and repair the cable that was cut. I&#8217;ll be moving the modem back after hours; the TVs are working so I&#8217;m going to assume the modem will be fine back on its original line as well. I&#8217;m really glad we had that second tap though, because we would have had to push the Town Hall For Hope test off until tonight when the youth group uses the room we&#8217;re using, and we wouldn&#8217;t have gotten as good of a test. And kudos to Comcast for their fast response to our issues, even though they weren&#8217;t the cause.</p>
<p>So, today didn&#8217;t quite go as planned, but given the issues I think we had plenty of successes. And I&#8217;m not going to worry about blocking free wifi or other bandwidth use during the Town Hall event tomorrow night; since we&#8217;re only doing one stream I think we can handle it! In fact, I just realized that if we overflow that Youth Center venue for some reason (which I doubt we will not because it&#8217;s not going to be a big event, but because there are so many other churches also hosting it), there&#8217;s no reason we can&#8217;t handle adding a feed to our main sanctuary as well if necessary. I like being prepared. Just keep the backhoe&#8217;s away from the property!</p>]]></content:encoded>
					
					<wfw:commentRss>/2009/04/22/dave-ramsey-townhall-for-hope-test/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Comcast Home Internet without the cr*pware</title>
		<link>/2009/02/17/comcast-cable-internet-without-software/</link>
					<comments>/2009/02/17/comcast-cable-internet-without-software/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 17 Feb 2009 17:48:45 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Comcast]]></category>
		<category><![CDATA[home]]></category>
		<category><![CDATA[internet]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=359</guid>

					<description><![CDATA[This morning we switched at home from 1.5Mbit AT&#38;T DSL to 6Mbit Comcast Cable internet (yay!). I remembered from last time we had Comcast that they (like AT&#38;T) like to send a CD that you are required to use to activate your modem, but also happens to install things that no sane IT person would [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>This morning we switched at home from 1.5Mbit AT&amp;T DSL to 6Mbit Comcast Cable internet (yay!). I remembered from last time we had Comcast that they (like AT&amp;T) like to send a CD that you are required to use to activate your modem, but also happens to install things that no sane IT person would want on their computer. Things like a PC Doctor. And (years ago, maybe not this time), custom IE throbbers. Also, McAfee antivirus software (ewww!). Yeah, not gonna happen here.</p>
<p>What was my solution this time? VMware Player and Windows XP! I grabbed a Windows XP virtual machine and ran it on my laptop in VMware Player, which worked just fine on Windows 7 (another reason not to run the Comcast stuff&#8230;who knows if it&#8217;s Windows 7 compatible). The biggest &#8220;issue&#8221; I had was that I had to disable all protocols bound to the LAN adapter on my laptop except for the VMware Bridge Adapter (to allow the virtual machine network access). That way the virtual machine got the DHCP and proxy settings from the cable modem when I turned it on, rather than my laptop (leaving the VM unable to connect). Once the VM had the &#8220;only&#8221; network connection, the wizard proceed normally and I got everything connected just fine (the wizard is much more streamlined than it used to be at least).</p>
<p>After it&#8217;s working, I just turned off the cable modem and plugged the WAN port of my wireless router into the modem, and turned it back on. Everything was smooth sailing from there. It does apparently lock to your <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> address but that is reset when the modem reboots.</p>
<p>Interestingly, the modem is an RCA brand modem, which is funny since I asked specifically when I talked to Comcast yesterday what brand the modem would be and they specifically said a Surfboard, which is by Motorola. Oh well, as long as it works I don&#8217;t care too much. Better than my old DLink from last time!</p>
<p>Now, if only Comcast would expand their trial of 16-20Mbit speeds (instead of 6Mbit) from South Bend to Indy, life would be awesome!</p>
<p>I&#8217;ve gotten a few draft posts written but nothing finished yet (I know it&#8217;s been a while!). However, the big news today is that Veeam Backup 3.0 was released this morning, which I already have a license for and I&#8217;m working to clean off the server that I&#8217;ll be running it on! It will definitely get a review when it&#8217;s up and running. I&#8217;m excited!</p>]]></content:encoded>
					
					<wfw:commentRss>/2009/02/17/comcast-cable-internet-without-software/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Using Free Wireless and VPNs</title>
		<link>/2008/05/31/free-wireless-wifi-vpn-security/</link>
					<comments>/2008/05/31/free-wireless-wifi-vpn-security/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 01 Jun 2008 03:23:22 +0000</pubDate>
				<category><![CDATA[Companies]]></category>
		<category><![CDATA[Cool Services]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[People]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[public wireless]]></category>
		<category><![CDATA[Tony Dye]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/?p=251</guid>

					<description><![CDATA[I read Tony Dye&#8217;s post on Wireless Safety: The VPN Question and wanted to share a comment. It turned into a post of its own, so I&#8217;ve moved it into one :-) Read his post first so this makes sense. If a laptop user establishes a VPN connection to your corporate VPN server, and doesn&#8217;t [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I read <a title="Tony Dye's blog" href="http://tonydye.typepad.com/">Tony Dye&#8217;s</a> post on <a title="Wireless Safety: the VPN Question" href="http://tonydye.typepad.com/main/2008/05/wireless-safe-1.html">Wireless Safety: The <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> Question</a> and wanted to share a comment. It turned into a post of its own, so I&#8217;ve moved it into one :-) Read his post first so this makes sense.</p>
<p>If a laptop user establishes a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connection to your corporate <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> server, and doesn&#8217;t use split tunneling (in other words, from the time they&#8217;re connected, all traffic goes through the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> as its default gateway no matter what), assuming that you&#8217;re using a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> client that verifies the identity of the server (rather than blindly trusting DNS, which is easily spoofable on a wireless network), the user moves from the realm of insecurity into a much more secure environment, similar to being plugged into your wired network at the office. Of course, then your office WAN connection has to support <em>everything</em> they do, including web browsing!</p>
<p>However, using a free or paid &#8220;<span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>&#8221; service from a company that just turns your wireless connection into a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>-enabled &#8220;wired&#8221; connection is only going to help thwart unencrypted wifi sniffing and other such attacks. Unless you also use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> and other encryption technologies, those services are just giving you a wired internet connection just like your home connection rather than the easier-to-sniff unencrypted wireless. It&#8217;s better than nothing, but it&#8217;s not like an encrypted pipe into your own network.</p>
<p>Don&#8217;t discount unencrypted wireless attacks. It&#8217;s never happened to me, but if you hop over and read some of <a title="Chief Security Monkey: Case Files Index" href="http://blogs.ittoolbox.com/security/investigator/archives/official-securitymonkey-case-file-index-14787">Security Monkey&#8217;s case files</a> at you&#8217;ll discover that there&#8217;s a lot of bad stuff going on in the world on computers :-) Those case files are slightly modified true stories from this guy&#8217;s career! His old 2005-2007 podcast episodes are worth listening to for some cool security tips and tools as well, to digress for a moment!</p>
<p>I don&#8217;t have a good answer; <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connections to the office make internet run very slowly unless you have the WAN bandwidth to support fast throughput to and from all your remote users including web browsing! But that&#8217;s a much more secure way to operate. The number of ways wireless can be hijacked, sniffed, spoofed, and hacked, especially if it&#8217;s unencrypted to begin with, is downright scary! At the very least use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> with verified certificates for anything you do of any importance (or if passwords are transmitted) on an encrypted wireless connection. As an IT guy, I can tell you (or myself) whether a particular session (POP3, IMAP, <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HyperText Transfer Protocol' );"><acronym class="uttInitialism">HTTP</acronym></span>, <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span>, etc.) is happening over an encrypted connection or not and can be careful. However, the average user is, obviously, not going to know or even care necessarily if Outlook is using POP3 unencrypted or via <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span>, or using <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span> securely. And if they log into Gmail, they&#8217;re not likely to know that although their password is always encrypted on login, their email is transmitted in the clear unless they initiate the session using <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> from the start (using https://mail.google.com/ rather than http://mail.google.com)./ Even if their email contains passwords and confirmations for other accounts!</p>
<p>Stuart mentioned <a title="WiTopia homepage" href="http://www.witopia.net/">WiTopia</a> on <a title="Stuart's comment on Tony Dye's post" href="http://tonydye.typepad.com/main/2008/05/wireless-safety.html#comment-115001000">his comment</a> to <a title="Tony Dye: Wireless Safety Basics" href="http://tonydye.typepad.com/main/2008/05/wireless-safety.html">Tony&#8217;s original post</a>. I&#8217;d never heard of them before, but I&#8217;ve seen similar services to their personalVPN product. That service appears to be, like I mentioned above, just a way to get a &#8220;wired quality&#8221; connection to the internet over unsecured wireless. An admirable service and a worthy goal even with its limitations, but what caught my eye even more was their <a title="WiTopia's SecureMyWiFi Service" href="http://www.witopia.net/securemore.html">SecureMyWifi</a> service. It&#8217;s still a wireless service but it has to do with your own on-campus wireless access. It lets you move away from using <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span> with a Pre-Shared Key (<span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'WPA-PSK, also known as WPA Personal, this wireless network security setting uses a single key shared among clients and base station for authentication and encryption of network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/WPA-PSK&quot;&gt;link&lt;/a&gt;)','caption', 'Pre-Shared Key' );"><acronym class="uttAbbreviation">PSK</acronym></span>), also known as <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A standard used to encrypt and authenticate wireless network traffic. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;link&lt;/a&gt;)','caption', 'Wi-Fi Protected Access' );"><acronym class="uttAbbreviation">WPA</acronym></span>-Personal, and use their <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> services to authenticate users individually to your encrypted wireless access points. It seems a bit pricey (to me&#8211;it&#8217;s currently a $99 setup fee, $99/year for one access point, and $14.95/year for each additional access point), but we have the same thing set up using Microsoft&#8217;s free (built-in on Windows Server 2003) <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Microsoft\'s RADIUS server, which comes included as a part of Windows Server. (&lt;a href=&quot;http://www.microsoft.com/technet/network/ias/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', ' 	Internet Authentication Service' );"><acronym class="uttInitialism">IAS</acronym></span> <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> server in-house. If you aren&#8217;t familiar with how to set it all up, the WiTopia service could be quite beneficial! They charge per access point, but at Lakeview we have a centrally-managed access points system with one controller that takes care of authentication. I assume that the WiTopia service is based on unique <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'A server used for authenticating users against a central server. Can be used for dial-in users, VPN, wireless (802.1x) and other uses. (&lt;a href=&quot;http://en.wikipedia.org/wiki/RADIUS&quot;&gt;link&lt;/a&gt;)','caption', ' 	Remote Access Dial-In User Server' );"><acronym class="uttInitialism">RADIUS</acronym></span> keys for each access point client; since the central controller (currently running 12 access points) acts as a single client, it should look like &#8220;one&#8221; access point to the service. Whether or not this is allowed with their terms of service I have no idea; we are not likely going to use the service since I already do this in-house for free, but I would recommend reading the terms and/or contacting them if you plan on doing something similar to remain in the spirit of their offering.</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/05/31/free-wireless-wifi-vpn-security/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>Is SonicWALL the Answer?</title>
		<link>/2008/04/12/is-sonicwall-the-answer/</link>
					<comments>/2008/04/12/is-sonicwall-the-answer/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sat, 12 Apr 2008 13:03:20 +0000</pubDate>
				<category><![CDATA[Companies]]></category>
		<category><![CDATA[Content Filtering]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[CDP]]></category>
		<category><![CDATA[Mark Moreno]]></category>
		<category><![CDATA[SonicWALL]]></category>
		<category><![CDATA[UTM]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2008/04/12/is-sonicwall-the-answer/</guid>

					<description><![CDATA[MinistryTECH and the Church IT Roundtable gave me a lot of great opportunities to gain interest in and discuss SonicWALL solutions with Mark Moreno, consultant and reseller, and SonicWALL poster children Jason Lee and Jeremie Kilgore. I must admit to being more than a little impressed with the combination of flexibility, power, and price that [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a title="MinistryTECH Church IT Conference" href="http://www.ministrytech.org/">MinistryTECH</a> and the <a title="CITRT: Church IT Roundtable homepage" href="http://www.citrt.org/">Church IT Roundtable</a> gave me a lot of great opportunities to gain interest in and discuss <a title="SonicWALL homepage" href="http://www.sonicwall.com/">SonicWALL</a> solutions with <a title="Mark Moreno's blog, &quot;Christ's IT Guy&quot;" href="http://christsitguy.spaces.live.com/">Mark Moreno</a>, consultant and reseller, and SonicWALL poster children Jason Lee and Jeremie Kilgore. I must admit to being more than a little impressed with the combination of flexibility, power, and price that the SonicWALL products provide. Those are three pretty important areas. In specific my first interest is in the SonicWALL firewall (<a title="SonicWALL: NSA Series UTM Appliances" href="http://www.sonicwall.com/us/products/NSA_Series.html">NSA Series</a>) products that also do <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'UTM is the combination of many network defense technologies into a single product or appliance. (&lt;a href=&quot;http://en.wikipedia.org/wiki/Unified_Threat_Management&quot;&gt;link&lt;/a&gt;)','caption', 'Unified Threat Management' );"><acronym class="uttInitialism">UTM</acronym></span> including antivirus, antispyware, intrusion prevention and content filtering, my second interest is in their <a title="SonicWALL: Continuous Data Protection (CDP) Appliances" href="http://www.sonicwall.com/us/products/backup_and_recovery.html">Continuous Data Protection</a> (CDP) products as both on-site and off-site backup solutions, and thirdly I&#8217;m interested in the ability of the SonicWALL firewall appliance to also serve as a centralized control point for relatively inexpensive <a title="SonicWALL: SonicPoint and SonicPoint G Administrator's Guide" href="http://www.sonicwall.com/us/support/230_3709.html">SonicPoints</a> (wireless access points).</p>
<p>Before making a decision there are certainly things to evaluate, and I definitely want to get my hands on an NSA box for a while to test first. I like the <a title="Microsoft ISA Firewall" href="http://www.microsoft.com/isaserver/default.mspx"><span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004</a> firewall interface that we&#8217;re currently running and I want to make sure I&#8217;m comfortable managing SonicWALL if we go that route.</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/04/12/is-sonicwall-the-answer/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Spotlight: Monitor Windows Servers and Computers Graphically (FREE!)</title>
		<link>/2008/03/01/monitor-windows-servers-and-computers-graphically-for-free/</link>
					<comments>/2008/03/01/monitor-windows-servers-and-computers-graphically-for-free/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sat, 01 Mar 2008 17:51:52 +0000</pubDate>
				<category><![CDATA[Cool Tools]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[Server Administration]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2008/03/01/monitor-windows-servers-and-computers-graphically-for-free/</guid>

					<description><![CDATA[Why have I never heard of this before?! It&#8217;s called Spotlight on Windows from Quest Software, it&#8217;s free, and it&#8217;s worth more like a million bucks or so. If you manage a Windows server, or servers, please install and try this software now. I&#8217;ve never before seen a free&#8211;and easy-to-install&#8211;tool that gives such immediate visual, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="http://infotech.davidszpunar.com/wp-content/uploads/2008/03/spotlight-on-windows.png" title="Spotlight on Windows screenshot from quest.com"><img decoding="async" src="http://infotech.davidszpunar.com/wp-content/uploads/2008/03/spotlight-on-windows.thumbnail.png" alt="Spotlight on Windows screenshot from quest.com" align="left" border="0" hspace="5" vspace="0" /></a>Why have I never heard of this before?! It&#8217;s called <a href="http://www.quest.com/spotlight-on-windows/" title="Quest Software: Spotlight on Windows freeware">Spotlight on Windows</a> from Quest Software, it&#8217;s <strong>free</strong>, and it&#8217;s worth more like a million bucks or so. If you manage a Windows server, or servers, please install and try this software now. I&#8217;ve never before seen a free&#8211;and easy-to-install&#8211;tool that gives such immediate visual, animated and color-coded feedback on all areas of remote (or local) physical system health combined with such extensive and easy-to-use drill-down details. The graphics aren&#8217;t just pretty, they&#8217;re easy to understand. You can practically take one glance at a server&#8217;s overview page and tell whether you need to order more RAM, go Gigabit, or get faster disks (or if a disk is filling up). You may actually want to wait a little longer to place that order so you can watch the trends (or just review the history after it&#8217;s been running for a while), but while you&#8217;re doing that you can set up your Event Log monitoring and alerts with specific filters. And if you want to know if that network slowdown was due to hardware congestion, yep, I&#8217;m going to point you toward the Spotlight on Windows. Thanks to <a href="http://maximillianx.blogspot.com/2007/10/windows-diagnostic-tool-spotlight-on.html" title="Confessions of a freeware junkie: Windows diagnostic tool: Spotlight on Windows 3.7.0.304">Confessions of a freeware junkie</a> for the pointer to this cool tool.</p>
<p><a href="http://infotech.davidszpunar.com/wp-content/uploads/2008/03/pt360dashboard.png" title="Packet Trap pt360 Dashboard screenshot from packettrap.com"><img decoding="async" src="http://infotech.davidszpunar.com/wp-content/uploads/2008/03/pt360dashboard.thumbnail.png" alt="Packet Trap pt360 Dashboard screenshot from packettrap.com" align="right" border="0" hspace="0" vspace="5" /></a>I just found this yesterday, if you can believe I&#8217;ve found reason enough to rave already! Earlier this week I also set up the free version of the <a href="http://www.packettrap.com/product/index.aspx?pid=free" title="PacketTrap pt360 Tool Suite FREE">PacketTrap pt360 Tool Suite</a>, and I&#8217;m significantly impressed. While several of the tools are part of a 30-day trial of the <a href="http://www.packettrap.com/product/index.aspx?pid=pro" title="PacketTrap pt360 Tool Suite PRO">$1500 Pro version</a>, the ability to easily map <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> addresses to DNS names and IP addresses is very useful, and the Dashboard, including a widget for viewing the traffic activity levels on switch ports, is nice. It didn&#8217;t blow me away like Spotlight on Windows did (and they don&#8217;t overlap too much except in some monitoring areas; pt360 is much more network oriented), but I&#8217;m keeping it handy in my arsenal for troubleshooting. It&#8217;s certainly not worth the $1500 to me for a Pro license, but someone with a much larger network might be able to justify the price tag. Although I believe I&#8217;ve run across this before, thanks to <a href="http://anchorite.org/blog/" title="Anchorite.org: Andrew Mitry's blog">Andrew Mitry</a> for linking to this tool in his recent blog post about <a href="http://anchorite.org/blog/2008/02/05/fifteen-free-tools-that-make-an-it-managers-life-easier/" title="Anchorite: Fifteen Free Tools that Make an IT Managerâ€&#x2122;s Life Easier">free tools for IT Managers</a>, where all the links were such high quality (the ones I did and didn&#8217;t know about) that I decided this was worth of a test run after all.</p>
<p>(Screenshots are from each products&#8217; respective websites; click for larger versions.)</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/03/01/monitor-windows-servers-and-computers-graphically-for-free/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>iTunes Store breaks, ISA 2004 SP3 to blame</title>
		<link>/2008/01/10/itunes-store-breaks-isa-2004-sp3-to-blame/</link>
					<comments>/2008/01/10/itunes-store-breaks-isa-2004-sp3-to-blame/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Thu, 10 Jan 2008 17:39:31 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[ISA 2004]]></category>
		<category><![CDATA[ISA 2004 Service Pack]]></category>
		<category><![CDATA[iTunes]]></category>
		<category><![CDATA[Microsoft ISA]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2008/01/10/itunes-store-breaks-isa-2004-sp3-to-blame/</guid>

					<description><![CDATA[This past Tuesday, I installed ISA 2004 Service Pack 3. I&#8217;ve got a recent configuration backup from the last time I had some SSL certificate issues (that was fun enough I think I&#8217;ve blocked it out too much to blog about it!), so I figured trying it out couldn&#8217;t hurt, and it had a lot [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>This past Tuesday, I installed <a href="http://www.microsoft.com/technet/downloads/isa/2004/servicepacks/default.mspx" title="Microsoft: ISA 2004 Service Packs"><span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 Service Pack 3</a>. I&#8217;ve got a recent configuration backup from the last time I had some <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Encryption method used to secure network traffic, often HTTP but many other protocols as well','caption', 'Secure Sockets Layer' );"><acronym class="uttInitialism">SSL</acronym></span> certificate issues (that was fun enough I think I&#8217;ve blocked it out too much to blog about it!), so I figured trying it out couldn&#8217;t hurt, and it had a lot of fixes. So I start the install through Automatic Updates before I go home for the evening, since if something happens fewer will notice after hours. As I pull into my driveway, my phone alerts me that Exchange ActiveSync failed, and I get an SMS notification from our <a href="http://www.websitepulse.com/" title="WebSitePulse Monitoring">monitoring service</a> saying that <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> could not be pinged. I hope the system is just restarting the Firewall service and it will come back up. Two hours later, it hasn&#8217;t. I drive back in, hit Restart After Automatic Updates (you know what I mean), and let it reboot. I am very, very happy to report that it worked! After the reboot, internet access worked my Treo was able to sync again!</p>
<p>Something interesting to note is that while inbound traffic from the internet appeared to be blocked before the restart,  I was able to use Remote Desktop from another server on the internal network to remotely instruct <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> to reboot. So it had not locked down all network access, just external. Good to know if you administer the box primarily via remote control! In fact, due to a lack of <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'A KVM switch allows you to use one set of display and input devices to control more than one computer.','caption', 'Keyboard, Video and Mouse' );"><acronym class="uttAbbreviation">KVM</acronym></span> switch ports, I have to manually plug the keyboard/monitor/mouse back in to <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> physically if I want to work on the console.</p>
<p>Although everything appeared to be functioning normally, today I got a report from a user who was getting a network error when attempting to connect to the iTunes Store from within iTunes. I tried it on my desktop, and got the same error. Fortunately, I remembered that back when I installed a prior <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> service pack (I don&#8217;t recall if it was 1 or 2), I had a similar problem and was able to track down the issue to the Compression Filter in <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span>. If you go in the <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> Management Console to Configuration-&gt;Add-ins and check the Web Filters tab, by default there is a &#8220;Compression Filter&#8221; enabled (the description: &#8220;Enables <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HyperText Transfer Protocol' );"><acronym class="uttInitialism">HTTP</acronym></span>/HTTPS compression&#8221;). Disabling this filter allowed iTunes Store to work just fine!</p>
<p>However, the reverse is true in <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 Service Pack 3. <strong>If you have disabled the Compression Filter, you must re-enable it for the iTunes Store to work in Service Pack 3!</strong> This is very useful information, so I thought I&#8217;d share! If you don&#8217;t know why iTunes Store doesn&#8217;t work, it can take a bit of Googling to determine the problem, at least it did for me originally. Perhaps the issue is more widely known by now.</p>]]></content:encoded>
					
					<wfw:commentRss>/2008/01/10/itunes-store-breaks-isa-2004-sp3-to-blame/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>HP ProCurve gets A in Tech Support</title>
		<link>/2007/12/17/hp-procurve-gets-a-in-tech-support/</link>
					<comments>/2007/12/17/hp-procurve-gets-a-in-tech-support/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Mon, 17 Dec 2007 20:49:10 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[HP ProCurve]]></category>
		<category><![CDATA[ProCurve]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/12/17/hp-procurve-gets-a-in-tech-support/</guid>

					<description><![CDATA[Now that the semester is over, I can spend a few moments on this blog after my brief (13 day) absence! I recently upgraded the firmware on all of the HP ProCurve switches we installed as part of our building project last year. It is so nice to have managed switches! We have ProCurve Manager [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Now that the semester is over, I can spend a few moments on this blog after my brief (13 day) absence!</p>
<p>I recently upgraded the firmware on all of the <a href="http://www.procurve.com/" title="ProCurve homepage">HP ProCurve</a> switches we installed as part of our building project last year. It is so nice to have managed switches! We have <a href="http://www.hp.com/rnd/products/management/ProCurve_Manager_Plus/overview.htm" title="ProCurve Manager Plus Overview">ProCurve Manager Plus</a> (we have version 2.1), HPs switch management application, and it makes upgrading the software on all of the beefy HP switches a breeze. What it doesn&#8217;t do is update the &#8220;smaller&#8221; switches, a.k.a. &#8220;less expensive,&#8221; such as the <a href="http://www.hp.com/rnd/products/switches/ProCurve_Switch_1700_Series/overview.htm?jumpid=reg_R1002_USEN" title="ProCurve 1700 Series Switches">1700-24</a> or the <a href="http://www.hp.com/rnd/products/switches/ProCurve_Switch_1800_Series/overview.htm?jumpid=reg_R1002_USEN" title="ProCurve 1800 Series Switches">1800 Series</a>, which are web-managed only. Those switches must be upgraded using the web-based interface. We only have about four switches from those series, in various &#8220;edge&#8221; locations outside of our three primary network closets. The 1700-24 switch we have is currently running firmware version 1.05, while version 1.09 is the current release. This is supposed to be easy, just log into the web interface, click go to the Software Upgrade area, pick the firmware file and click Apply.</p>
<p>Unfortunately, I got an error message when I did this; the same error in Firefox 2 and Internet Explorer 6.  The top frame where I had put the update file location would reload to a &#8220;page not found&#8221; page, while the lower frame where a status bar appeared remained frozen at 0%. I re-downloaded the update, tried several more times from both browsers, no dice. This is what the error looked like:</p>
<p><a href="http://infotech.davidszpunar.com/wp-content/uploads/2007/12/1700-24-upgrade-failure-in-firefox.png" title="ProCurve Switch 1700-24 Upgrade Failure"><img decoding="async" src="http://infotech.davidszpunar.com/wp-content/uploads/2007/12/1700-24-upgrade-failure-in-firefox.thumbnail.png" alt="ProCurve Switch 1700-24 Upgrade Failure" /></a></p>
<p>I decide to take advantage of ProCurve&#8217;s free technical support, and give them a call. I did wait on hold for about 20 minutes, but I was first directed to a live operator who asked me which product I was calling about so I could be placed in the correct support queue! I ended up speaking with Brandy, who tried an upgrade on her switch along with me and then collected a screenshot (see above) of my problem and the configuration file from my switch, via email. She had me try upgrading to version 1.07, the one in between my current version and the newest, with the same results. All of this seemed perfectly reasonable, and I didn&#8217;t feel like I was getting a script at any time.</p>
<p>Since it still didn&#8217;t work, Brandy made sure she had my number and was going to verify the information I sent her with an internal support person and get back to me. She called back less than two hours later, and although I missed her call, she left a voicemail and sent a follow-up email, and said they had decided to replace the switch if I would reply with my preferred shipping address and the switch model and serial number information! How easy is that?</p>
<p>Overall, although I have not received the replacement switch yet, I am very satisfied with  the level of support I received on this issue, especially since this is possibly the least-expensive managed switch we have purchased from HP. The included technical support (and of course the lifetime warranty) were two huge reasons for choosing ProCurve, and the investment is bearing some fruit in those areas! The only other time I have needed to call them was when our <a href="http://www.hp.com/rnd/products/wireless/ProCurve_Wireless_Edge_Services_xl_Module/overview.htm?jumpid=reg_R1002_USEN" title="ProCurve Wireless XL Module Overview">Wireless xl switch controller module</a> died within a month or two of installing it. They replaced it (we paid over $2000 for it) next business day (died on a Friday so we were down for the weekend), with perhaps a shorter phone call than this one! The fact that they offer a lifetime warranty on this module is amazing to me, because it is essentially a computer&#8211;you can clearly see the RAM modules, the processor, and other components on the module when it is not inside a host switch. Even HP desktops, with similar components (OK, the quality of the components may not be exactly similar), don&#8217;t get a lifetime warranty!</p>
<p>Go ProCurve! I am a fan&#8230;I hope I remain one!</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/12/17/hp-procurve-gets-a-in-tech-support/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Wire, wire, everywhere; now it&#8217;s in the ceiling</title>
		<link>/2007/11/17/wire-wire-everywhere-now-its-in-the-ceiling/</link>
					<comments>/2007/11/17/wire-wire-everywhere-now-its-in-the-ceiling/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sat, 17 Nov 2007 06:21:10 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[cable]]></category>
		<category><![CDATA[facilities]]></category>
		<category><![CDATA[wiring]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/11/17/wire-wire-everywhere-now-its-in-the-ceiling/</guid>

					<description><![CDATA[On Tuesday and Wednesday this week, I assisted one of our maintenance staff with running twelve wires around the building. We made two runs, each with six cables (four network and two coax). Running six cables at a time through dropped ceilings in an old building (mostly, some parts were in the new building) takes [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>On Tuesday and Wednesday this week, I assisted one of our maintenance staff with running twelve wires around the building. We made two runs, each with six cables (four network and two coax). Running six cables at a time through dropped ceilings in an old building (mostly, some parts were in the new building)  takes a lot more work that you&#8217;d think at first glance. One of the runs was about 250 feet, and the other was probably a bit less but I haven&#8217;t checked for sure.</p>
<p><a href="http://infotech.davidszpunar.com/2007/11/17/wire-wire-everywhere-now-its-in-the-ceiling/network-and-coax-cable-ready-to-unspool-into-the-ceiling/" rel="attachment wp-att-155" title="Network and coax cable ready to unspool into the ceiling"><img decoding="async" src="http://infotech.davidszpunar.com/wp-content/uploads/2007/11/photo_111407_001.thumbnail.jpg" alt="Network and coax cable ready to unspool into the ceiling" align="right" border="0" height="124" width="166" /></a>It does go a lot faster with two people; one person would likely take several days to make one of these runs! We set up a makeshift spindle to allow the cable to somewhat easily unwind as we pulled it through the ceiling; I&#8217;ve provided a picture I snapped to show our (somewhat ingenious, if I do say so myself) cable pulling setup! The second run, with the setup shown in the picture, actually splits halfway through and three of the lines go one way (to our children&#8217;s auditorium) and the other three continue on to the office of our Facilities Manager (technically, Facilities Director, but then I can&#8217;t say FMer :-)  (If you don&#8217;t get that, you had to be at the <a href="http://appianway.blogspot.com/2007/10/roundtable-posts.html" title="The Appian Way: Fall 2007 Church IT Rountable posts roundup">Roundtable</a> at <a href="http://www.cor.org/" title="United Methodist Church of the Resurrection in Leawood, KS">CoR</a> in October!) Being this active for two days took a bit of a toll on my legs, but my eyes relished the break from the oft-near computer screens!</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/11/17/wire-wire-everywhere-now-its-in-the-ceiling/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ActiveSync Error with Treo and Exchange Direct Push</title>
		<link>/2007/11/15/activesync-error-with-treo-and-exchange-direct-push/</link>
					<comments>/2007/11/15/activesync-error-with-treo-and-exchange-direct-push/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Thu, 15 Nov 2007 19:56:19 +0000</pubDate>
				<category><![CDATA[E-Mail]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[ISA 2004]]></category>
		<category><![CDATA[Microsoft ISA]]></category>
		<category><![CDATA[Palm]]></category>
		<category><![CDATA[Treo]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/11/15/activesync-error-with-treo-and-exchange-direct-push/</guid>

					<description><![CDATA[I finally took the plunge and upgraded VersaMail on my Treo 650 to version 3.5 (the default is 3.1), for $9.99. This upgrade adds several features, the biggest being the ability to sync Contacts over-the-air in addition to Email and Calendar when using an Exchange ActiveSync account, and Direct Push so you receive immediate notifications [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I finally took the plunge and upgraded <a href="http://www.palm.com/us/support/accessories/versamail/versamail_35/" title="VersaMail 3.5 Information Page">VersaMail</a> on my Treo 650 to version 3.5 (the default is 3.1), for <a href="http://software.palm.com/us/html/display_palm_product.jsp?id=prod2430707" title="VersaMail 3.5 Product Page">$9.99</a>. This upgrade adds several features, the biggest being the ability to sync Contacts over-the-air in addition to Email and Calendar when using an Exchange ActiveSync account, and Direct Push so you receive immediate notifications of new items (like incoming email) from the Exchange server. You can also now search the Exchange Global Address List when sending an email from the Treo! I had decided not to upgrade when the new VersaMail version came out because some people were reporting stability issues, but these seem to be better after applying the <a href="http://www.palm.com/us/software/eas_update/" title="Palm Treo EAS Update">EAS Update</a> available from Palm (for $2.99, still a ripoff for a patch, but it&#8217;s inexpensive enough that I&#8217;m willing to be ripped off) that must be installed after the VersaMail upgrade. The update fixes some Direct Push issues.</p>
<p>While I was at it, I threw in the <a href="http://www.palm.com/us/support/downloads/versamail/vmeasremupdate.html" title="VersaMail 3.5 EAS Meeting Invitation Update">VersaMail 3.5 EAS Meeting Invitation Update</a> for good measure, just in case I needed it (and it was free!). I got all the updates available, basically; I must be used to Windows Updates where you should install it all, just in case it closes a huge gaping security hole or fixes something you don&#8217;t care enough about to research every time :-)</p>
<p>Everything went much more smoothly than expected! I installed VersaMail 3.5, installed and applied the updates, and did a sync. After the first sync, I was able to modify my account preferences to specify that I wanted to be notified &#8220;As items arrive,&#8221; which enables Direct Push.</p>
<p>So far, so good. Except that several minutes later, I hear my &#8220;New Mail Alert&#8221; sound and the message I get says, &#8220;EAS Account: Please press the Sync button.&#8221; Well, that&#8217;s fun. I go from email every 30 minutes to an annoying notice to manually &#8220;automatically&#8221; sync every five minutes! What is this? A Microsoft-like &#8220;improvement&#8221; from Palm?! Oh no! Things like &#8220;I wonder what would happen if I threw this phone through the window&#8221; started to go through my mind, but instead of following through with that I reverted to my backup plan:</p>
<p>Must&#8230;use&#8230;<a href="http://www.google.com/search?q=activesync%20update%20treo%20650%20direct%20push" title="Google search: activesync update treo 650 direct push">Google</a>. Which I did, and I found <a href="http://forums.palm.com/palm/board/message?board.id=wireless_email&amp;message.id=2908" title="Palm Forums: EAS account: Please press the Sync button">this thread on the Palm forums</a> that sounded like a broken record of my problem (not helpful) until I got to the last reply in the thread (which was helpful!). It had links to a blog entry from <a href="http://msexchangeteam.com/" title="You Had Me At EHLO homepage">You Had Me At EHLO</a> about <a href="http://msexchangeteam.com/archive/2006/04/03/424028.aspx" title="You Had Me At EHLO: Direct Push is just a heartbeat away">Direct Push and Heartbeats</a>, where, right there under list item 3 under the heading &#8220;Deployment Considerations for Direct Push&#8221; (I know, so easy to find in such a &#8220;short&#8221; entry :-) it talks about firewall connection timeouts with a link to an MSKB article (the same one the forum post linked to): <a href="http://support.microsoft.com/?kbid=905013" title="Enterprise firewall configuration for Exchange ActiveSync Direct Push Technology">905013, Enterprise firewall configuration for Exchange ActiveSync Direct Push Technology</a>. It&#8217;s reasonably short and sweet, and they&#8217;re kind enough to include step-by-step instructions for making the needed configuration change to our <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 firewall. Seriously, the instructions are so good and easy, I won&#8217;t even repeat them here. Click, click, click, type numbers, click, click, Apply, done. Or something like that.</p>
<p>I initiated a manual sync again to establish the connection with the new timeout values, and waited. Fifteen minutes later, no sign of the EAS Account error message! And now I get new emails popping up on my Treo usually before they show up in Outlook, whether connected via Cached Exchange Mode or not! Time will tell how good of a thing this actually is, but the concept is excellent!</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/11/15/activesync-error-with-treo-and-exchange-direct-push/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Church IT Podcast Episode 15: Complete</title>
		<link>/2007/09/06/church-it-podcast-episode-15-complete/</link>
					<comments>/2007/09/06/church-it-podcast-episode-15-complete/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Thu, 06 Sep 2007 20:06:08 +0000</pubDate>
				<category><![CDATA[Content Filtering]]></category>
		<category><![CDATA[Cool Tools]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Reading and Listening]]></category>
		<category><![CDATA[Church IT Podcast]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/09/06/church-it-podcast-episode-15-complete/</guid>

					<description><![CDATA[Well, Church IT Podcast Episode 15 is in the bag, with some good discussion on VLANs, DHCP Relay, and web content filtering. I got the show notes wiki page updated with some notes and links I remember now, having just finished the podcast, but others will hopefully fill in the blanks I forgot about! To [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Well, <a href="http://www.churchitpodcast.com/" title="Church IT Podcast">Church IT Podcast</a> <a href="http://citpodcast.wiki.zoho.com/Episode15.html" title="Church IT Podcast Episode 15 show notes">Episode 15</a> is in the bag, with some good discussion on VLANs, DHCP Relay, and web content filtering. I got the <a href="http://citpodcast.wiki.zoho.com/Episode15.html" title="Church IT Podcast Episode 15 show notes">show notes wiki page</a> updated with some notes and links I remember now, having just finished the podcast, but others will hopefully fill in the blanks I forgot about! To my knowledge the podcast is the only place you can hear yours truly online via audio. I&#8217;ve been a listener and contributor to the live podcast for all of its life I believe, although I had to miss a few episodes in the middle. I usually find some topic to try and speak somewhat intelligently on (whether I succeed is another matter!) in each podcast I&#8217;m a part of, but I always get more useful tips from the others than I could possibly contribute, which is as it should be for a collaborative &#8220;conference call&#8221; style environment.</p>
<p>One tool mentioned in the podcast this time is called <a href="http://www.protect-me.com/rtm/" title="Remote Task Manager software">Remote Task Manager</a>, which is a remote control (at a granular level, not just a remote desktop viewer tool) for networked PCs. It sounds very useful and worth checking out the demo when I have the time!</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/09/06/church-it-podcast-episode-15-complete/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Firefox Updates and Windows SteadyState</title>
		<link>/2007/08/15/firefox-updates-and-windows-steadystate/</link>
					<comments>/2007/08/15/firefox-updates-and-windows-steadystate/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Wed, 15 Aug 2007 17:08:12 +0000</pubDate>
				<category><![CDATA[Content Filtering]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[internet cafe]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[SteadyState]]></category>
		<category><![CDATA[youth]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/08/15/firefox-updates-and-windows-steadystate/</guid>

					<description><![CDATA[Firefox Upgrades Interfere with Kiosks I ran into a small issue with the SteadyState/Firefox setup that was a relatively easy fix: Firefox tried to update itself and the theme when new versions came out. Why it does this as a limited user when it can&#8217;t run the upgrade (for the program itself; the theme should [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>Firefox Upgrades Interfere with Kiosks</h2>
<p><!--TOC-->I ran into a small issue with the <a href="http://infotech.davidszpunar.com/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/" title="My post: Windows SteadyState Lockdown and the Youth Internet CafÃ©">SteadyState/Firefox setup</a> that was a relatively easy fix: Firefox tried to update itself and the theme when new versions came out. Why it does this as a limited user when it can&#8217;t run the upgrade (for the program itself; the theme should work if it weren&#8217;t locked down) is beyond me, maybe I&#8217;ll file a bug report or something. Anyway, to get rid of the upgrade reminder, I logged in as Administrator and installed the Firefox program upgrade. Then I unlocked the profile and disabled Disk Protection, logged in as the locked down user, not not locked down, and upgraded the theme. Then I changed the Options (Tools-&gt;Options-&gt;Advanced-&gt;Update) and unchecked all of the automatic update options. Now updates won&#8217;t automatically (try to) apply, and I don&#8217;t even have to worry about security holes much because of the Disk Protection feature. I also took the opportunity to install the <a href="https://addons.mozilla.org/en-US/firefox/addon/616" title="Auto Reset Browser Firefox extension">Auto Reset Browser extension</a> and disable the old auto-restart mechanism (see below for the reasons).</p>
<h2>Accessing Firefox Settings</h2>
<p>To get to the Firefox settings, because of the <a href="https://addons.mozilla.org/en-US/firefox/addon/1659" title="R-Kiosk Firefox extension">R-Kiosk extension</a> disabling menu access, I had to use the Firefox (safe mode) option from the Start menu, tell the statup box to disable add-ons and restart, and then it came up with no theme and no extensions active. I made my settings changes, installed the Auto Reset Browser extension, re-enabled the theme and the R-Kiosk extension, and restarted. Back to normal, with all changes made!</p>
<h2>Firefox Auto-Restart Method</h2>
<p>Paul Marc left a comment on my original post asking about <a href="http://infotech.davidszpunar.com/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/#comment-339" title="Paul Marc's comment on my original post">how I made Firefox auto-restart</a> if closed and on idle. I was using a batch file called <strong>start.bat</strong> that I found online, but I can&#8217;t seem to locate it again with Google (I recall it took some searching to find originally as well). I&#8217;ll have to grab the bookmark off of one of the computers I set it up on when I am able.</p>
<p>It seemed like it was a great solution when I set it up. However, I had several issues crop up in actual use. Sometimes it would get &#8220;stuck&#8221; in a loop of starting unending new Firefox windows as fast as the computer would open them. The only solution was to log off or restart (or kill the script, but the Task Manager won&#8217;t open under lockdown!). This only happens sometimes, and I&#8217;m not exactly sure why, but it makes the system unusable when it does happen.</p>
<p>I have made the above changes on three of the four computers (the last one isn&#8217;t switched yet because I ran out of time), setting them to <em>not</em> use the start.bat file, and instead installing the <a href="https://addons.mozilla.org/en-US/firefox/addon/616" title="Auto Reset Browser Firefox extension">Auto Reset Browser extension</a> in Firefox. It restarts the browser after every five minutes idle. The downside is, if a user closes the browser manually, it doesn&#8217;t reopen automatically. There is one icon on the desktop though, to open Firefox, so I don&#8217;t think this will be an issue, although it&#8217;s not as nice as the original solution when it worked correctly. And either way, closing manually or on idle, Firefox still runs the Clear Private Data option I had set up (per my original post) to get rid of the prior user&#8217;s cookies or other saved information.</p>
<h2>Network Connection Details</h2>
<p>In my original post, I neglected to include details of the network connections for the locked down systems. It&#8217;s pretty simple: stick the computers on the same VLAN (wired) as the free Wi-Fi internet access. I added each system&#8217;s <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> address into the Nomadix gateway so it doesn&#8217;t ask for a username or password, and I can control bandwidth on a per-computer basis (they don&#8217;t have much). The free Wi-Fi is firewalled so only <a href="http://www.opendns.com/" title="OpenDNS homepage">OpenDNS</a> can be contacted over the DNS ports, so they are subject to the <a href="http://blog.opendns.com/2007/06/10/adult-site-blocking/" title="OpenDNS Blog: Adult site blocking now available on OpenDNS">OpenDNS adult site blocking</a> we have in place, just like everyone else.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/08/15/firefox-updates-and-windows-steadystate/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows SteadyState Lockdown and the Youth Internet CafÃ©</title>
		<link>/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/</link>
					<comments>/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 31 Jul 2007 11:30:50 +0000</pubDate>
				<category><![CDATA[Content Filtering]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[internet cafe]]></category>
		<category><![CDATA[lockdown]]></category>
		<category><![CDATA[SteadyState]]></category>
		<category><![CDATA[youth]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/</guid>

					<description><![CDATA[Our new youth facility now has a four-computer internet cafÃ©. I've already written twice about my plans and research leading up to implementation, specifically about computer lockdown software. A couple of weeks ago, I mentioned briefly that we had changed course and decided to use Microsoft Windows SteadyState as our lockdown software of choice, mainly due to...]]></description>
										<content:encoded><![CDATA[<p>This is a long one (about 1800 words), so I&#8217;m giving you a table of contents, and breaking it up so it&#8217;s not all on the front page (the first post where I&#8217;ve done so, and I&#8217;ve had some other long ones!).</p>
<h2>Overview</h2>
<p><!--TOC-->Our new youth facility now has a four-computer internet cafÃ©. I&#8217;ve already written twice about my plans and research leading up to implementation, specifically about computer <a href="http://infotech.davidszpunar.com/2007/03/23/public-computer-lockdown-options/" title="My post: Public Computer Lockdown Options">lockdown</a> <a href="http://infotech.davidszpunar.com/2007/04/13/public-computer-lockdown-and-fortres-grand/" title="My post: Public Computer Lockdown and Fortres Grand">software</a>. A couple of weeks ago, I <a href="http://infotech.davidszpunar.com/2007/07/16/double-dutch-aka-it-has-a-foreign-volunteer/" title="My post: Double Dutch, aka IT Has A Foreign Volunteer!">mentioned briefly</a> that we had changed course and decided to use <a href="http://www.microsoft.com/windows/products/winfamily/sharedaccess/default.mspx" title="Microsoft Windows SteadyState homepage">Microsoft Windows SteadyState</a> as our lockdown software of choice, mainly due to the price (free!).</p>
<p>We (Dutch volunteer Jeroen and I) were physically installing the computers/monitors/etc. in the youth lobby area when I thought, &#8220;hey, Microsoft just released some updated lockdown software, let&#8217;s try it out.&#8221; We hadn&#8217;t yet purchased the Fortres Grand software, although I had it approved. So I downloaded SteadyState, installed it, and messed around for a few minutes. It was so easy, even my mom could do it! Well, okay, I&#8217;ve been teaching her computers for a while and I might still have to walk her through this one over the phone, but I have no doubt she&#8217;d make it work :-)  The installation went smoothly, the lockdown options (we wanted pretty much the tightest lockdown possible) were easy to select, and the hard disk protection (which discards changes on reboot) was easy to enable and control from within the main SteadyState console. I haven&#8217;t had experience with Microsoft&#8217;s old Shared Computer Toolkit, but from what I understand it was more difficult to combine all the options together into one functional system, and they appear to have fixed all of this in SteadyState.</p>
<h2>Lockdown Features</h2>
<p>In the SteadyState console, there are three items under Global Computer Settings: Set Computer Restrictions, Schedule Software Updates, and Protect the Hard Disk. The Set Computer Restrictions option lets you change things such as whether to display the last username in the logon screen, prevent users from writing to <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Universal Serial Bus' );"><acronym class="uttInitialism">USB</acronym></span> drives, turn the Welcome Screen on and off, and other miscellaneous things that affect the whole computer, not just particular user(s).  I turned most of these on. I&#8217;m not writing this with access to the computers I set up, so I&#8217;m going from memory on this (and everything else) but if you have any questions about specifics please leave a comment!</p>
<p>You can create or import users/profiles that SteadyState can then manage with a selection of lockdown options going from low to high security, but at each level it just selects a more restricted subset of the detailed options and lets you customize away. This is similar to the functionality of the <a href="http://www.fortresgrand.com/products/f101/f101.htm" title="Fortres Grand: Fortres 101 homepage">Fortres 101</a> software. All we tested was the highest security possible, locking down almost everything and only allowing the Mozilla Firefox executable to run. However, we did have to allow command prompt access to get the Firefox auto-restart trick below to work, although with the GUI and keyboard shortcuts this locked down, no one should be able to access the command line except through the batch file the Firefox shortcut links to for this trick to work.</p>
<p>Testing the lockdown settings to find the right mix can be a bit tricky because you must save the settings, log out, log in as the limited user, test, log out, and log back on to the administrative account again. It&#8217;s tedious, but once you have what you want, you can duplicate the settings more easily on other systems. The Export/Import Profile function works, but it imports a default user profile with the lockdown settings. Be careful with this, because it means you must wait until after you import a user into SteadyState from an exported profile before logging in and doing any customization to their desktop (display options, Start Menu positioning, etc.) as any customization you&#8217;ve done will be deleted if you import a user over top of your existing user! Found this out the hard way &#8212; once :-)</p>
<p><span id="more-91"></span></p>
<h2>Firefox Does Its Own Privacy Work</h2>
<p>Firefox has some great options for &#8220;Clearing Private Data&#8221; such as cache, cookies, history, saved passwords, authenticated sessions, etc., which for most Firefox users is either a manual option or something it prompts you to do when you close Firefox. Because of the multi-user environment, we instead set the options, available through the Firefox Tools-&gt;Options panel,  to automatically clear private data when the browser was closed, with no prompting. That way someone logged into Gmail, Hotmail, Facebook, or lets face it, MySpace (one site I still refuse to sign up for :-) will be logged out when Firefox closes, safe for the next person to use. Let&#8217;s face it, these are teenagers we&#8217;re talking about here &#8212; do you think they&#8217;re going to remember to log off? Not likely in the vast majority of cases.</p>
<p>I found a batch file with some Google searching (I&#8217;ll have to re-locate it and post an update if anyone is interested) that, when run via a command line or a shortcut and passed the path to a .exe file, runs the file but monitors it and if the process ends, it restarts it automatically. So Firefox is in the Startup folder in the Start Menu, but run with this batch script. When someone closes Firefox, it clears their data, is automatically restarted, and goes back to the youth homepage automatically, ready for the next user!</p>
<p>But what if people don&#8217;t close the browser? We set up a Scheduled Task to kill the firefox.exe process after 5 minutes of the computer being idle. Same effect as the user closing the browser, and it automatically reopens still. This is a touch buggy, as occasionally Firefox will instead of reopening once, reopen window after window after window after window&#8230;and of course the computer is so locked down you can&#8217;t kill the process manually. It requires a logout or restart to fix. This is still on my &#8220;to track down&#8221; list, but it&#8217;s the last little piece of the puzzle, and generally it works fine. I&#8217;m sure it&#8217;s an issue with either the batch file, the scheduled task, or both interacting somehow.</p>
<h2>Thematic Full Screen</h2>
<p><!--TOC-->The theme we chose for Firefox is called <a href="https://addons.mozilla.org/en-US/firefox/addon/4908" title="NASA Night Launch theme">NASA Night Launch</a>. It&#8217;s a beautiful theme, which shows an awesome shuttle launch shot as the blank background before a tab finishes rendering, and has equally nice toolbar backgrounds and a custom throbber (the top-right icon that moves while a page is loading, if you didn&#8217;t know). The grays and blacks in this theme look wonderful with our current homepage, <a href="http://www.infusionstudents.com/" title="Infusion Student Ministries homepage">www.infusionstudents.com</a>, as well as the black LCD monitors mounted to the wall (pictures to follow later). A new version of this theme was released on July 22nd, after we set up the computers, so I will consider upgrading the theme at some point soon.</p>
<p>To make the slickest looking interface possible, we applied the <a href="https://addons.mozilla.org/en-US/firefox/addon/1659" title="R-Kiosk extension">R-Kiosk extension</a> to Firefox to force it into fullscreen mode when it starts, getting rid of the title bar and any non-themed borders. We did apply the change to user.js that provides the navigation menu so the address bar and back/forward function. It looks really good with this extension combined with the theme!</p>
<p>While looking to see what the theme and extension we used are called, I just ran into an extension called <a href="https://addons.mozilla.org/en-US/firefox/addon/616" title="Auto Reset Browser extension">Auto Reset Browser</a> that for some reason I&#8217;ve never seen before. It looks like it might be a more elegant solution to my earlier problem, but I don&#8217;t know if it will help keep Firefox open if someone manually closes it. I will have to investigate further as time allows.</p>
<h2>Disk Protection</h2>
<p>SteadyState&#8217;s disk protection option, which you must enable separately from the policy lockdown settings, basically makes the hard drive immutable for most purposes. Do anything, reboot, and you&#8217;re back where you started last time. Fortres Grand&#8217;s <a href="http://www.fortresgrand.com/products/cls/cls.htm" title="Fortres Grand: Clean Slate">Clean Slate</a> product has similar functionality. Microsoft has made what I hear are improvements (compared to the Shared Computer Toolkit) in this functionality in that you enable and disable this option from the SteadyState control console just like all the policy options. Give it some time to make a cache file for the temporary disk changes, reboot, and the disk is protected.</p>
<p>The nicest thing is, if you&#8217;re an Adminstrator running SteadyState, and you log in, install a new program, and reboot &#8212; oops, if the disk protection was on you&#8217;d lose all your changes! You can unlock the disk for a time in the console, however. But the best option Microsoft added was a modification to the Log Off screen, prompting you that disk protection is on and giving you the option to discard all changes &#8212; or, <em>keep the changes, restarting to merge the cache onto the hard drive automatically.</em> That&#8217;s a no-brainer option that will continue to save my behind as I update these systems in the future I&#8217;m sure, long past initial setup! I&#8217;ve already used it for a few tweaks here and there.</p>
<h2>No Manual Needed</h2>
<p>SteadyState scores high marks for ease of use; I&#8217;ve still not read <a href="http://www.microsoft.com/downloads/details.aspx?familyid=d64af114-336c-4418-beb7-e074e813b498&amp;displaylang=en&amp;tm" title="Microsoft Windows SteadyState Manual">the manual</a> and only referenced the help file (which opens automatically with the console) a few times. (Well, I did use the manual to refresh my memory while writing this post, but only because I don&#8217;t have access to the real systems at the moment. And this is the first time I&#8217;ve even opened it.)</p>
<h2>Physical Installation</h2>
<p>I don&#8217;t currently have any pictures of the computers handy, so I will leave photos and a description of the mounting process (which comprised more than 50% of the entire operation) to a future post.</p>
<h2>Yet Another Alternate Option</h2>
<p><!--TOC-->In very related news, I did received a reply, although a bit late for me and not really a fit anyway at this point (due to the cost), from when I emailed and <a href="http://castingfromtheserverroom.com/podcast/2007/episode-59-google-themes" title="Casting From The Server Room: Episode 59 - Google Themes (my emailed question is addressed during the podcast)">asked the guys at the Casting From The Server Room podcast</a> for a reminder of what software they had run across as a Deep Freeze competitor. They mentioned it (<a href="http://www.centuriontech.com/products/compuguardcornerstone/" title="CompuGuard CornerStone homepage">CompuGuard CornerStone</a>) in an old episode which I couldn&#8217;t remember, and their &#8220;show notes wiki&#8221; had been lost without a backup. Thanks for the response, guys! Always good to check out alternative options and at least keep abreast of what&#8217;s available in the future. They replied to my question back in March on the air, but I missed three episodes in an otherwise unbroken string of probably 30-40 of their episodes I&#8217;ve listened to without skipping (wouldn&#8217;t you know it was in one of those!), and when I grabbed the back-episode to check out I heard my name again (they&#8217;ve mentioned my comments twice in more recent shows since &#8212; and inspired the new last name pronunciation guide in my <a href="http://infotech.davidszpunar.com/about/" title="About David">About David</a> page)!</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/07/31/windows-steadystate-lockdown-and-the-youth-internet-cafe/feed/</wfw:commentRss>
			<slash:comments>12</slash:comments>
		
		
			</item>
		<item>
		<title>I Can Play The Merakis!</title>
		<link>/2007/07/24/i-can-play-the-merakis/</link>
					<comments>/2007/07/24/i-can-play-the-merakis/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Wed, 25 Jul 2007 03:45:17 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[On The Road]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/07/24/i-can-play-the-merakis/</guid>

					<description><![CDATA[The install and test was a success! Four Meraki Mini access points are up and running at the campgrounds, providing internet access through the satellite connection (which was the weak link during our testing, being slow or down most of the time, but it was working better before we arrived so we have higher hopes). [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The <a title="My post: Off to do some Mesh Networking with Meraki" href="http://infotech.davidszpunar.com/2007/07/24/off-to-do-some-mesh-networking-with-meraki/">install and test</a> was a success! Four <a title="Meraki Mini" href="http://meraki.com/products/mini/">Meraki Mini</a> access points are up and running at the campgrounds, providing internet access through the satellite connection (which was the weak link during our testing, being slow or down most of the time, but it was working better before we arrived so we have higher hopes). We even made it back to Lakeview before 5 pm, which was our goal!</p>
<p>There&#8217;s not even that much to tell. The setup was the easiest part: unpack, plug in to power. Place near window for best signal. Plug internet line into the one next to the satellite modem. And that part had been done for us! We primarily tested the existing network using <a title="My post: VisiWave Wireless Site Survey" href="http://infotech.davidszpunar.com/2007/03/10/visiwave-wireless-site-survey/">VisiWave</a> to document signal strength, and moved the fourth access point around to various locations to make sure when we order four more, they will cover what we want them to (they will). The VisiWave mapping was the most time-consuming part of the trip (besides waiting for the slow/disconnected internet), but I haven&#8217;t had time to pull useful reports out of that data yet.</p>
<p>The <a title="Meraki Dashboard" href="http://meraki.com/products/dashboard/">Meraki Dashboard</a> is the truly novel and useful tool. You can place your nodes on a map, view how they are interconnected, monitor bandwidth usage and speeds by node and by user, block or whitelist users, set up a splash page, security, and quite a few other nice tweaks that I wouldn&#8217;t have thought of but make perfect sense when you see them!</p>
<p>I took a couple of screenshots of the node map overview, using standard and satellite maps:</p>
<p><a title="Meraki at Campgrounds, Standard Map Overview" href="http://infotech.davidszpunar.com/2007/07/24/i-can-play-the-merakis/meraki-at-campgrounds-standard-map-overview/" rel="attachment wp-att-101"><img decoding="async" src="http://infotech.davidszpunar.com/wp-content/uploads/2007/07/merakilp_overview_map.thumbnail.jpg" alt="Meraki at Campgrounds, Standard Map Overview" /></a> <a title="Meraki at Campgrounds, Satellite Hybrid Overview" href="http://infotech.davidszpunar.com/2007/07/24/i-can-play-the-merakis/meraki-at-campgrounds-satellite-hybrid-overview/" rel="attachment wp-att-100"><img decoding="async" src="http://infotech.davidszpunar.com/wp-content/uploads/2007/07/merakilp_overview_hybrid.thumbnail.jpg" alt="Meraki at Campgrounds, Satellite Hybrid Overview" /></a></p>
<p>If you hold your mouse over a node (in the real Dashboard, not these pictures of course! But you knew that&#8230;), the route to the internet turns green (one of the gray lines between nodes in the standard map), and some external text shows some additional status information. The number on a node is the number of users in the last 24 hours. These pictures just scratch the surface of the control interface, which is well thought out and feature rich. But that&#8217;s all I have time for, so you&#8217;ll have to grab some of your own Minis and mess around!</p>
<p>Oh yeah&#8230;sorry for the joke in the title. I do love my bad puns&#8230;</p>
<p><strong>UPDATE:</strong> On Feb. 21st, 2012, after a new comment and response below, I wrote a post that&#8217;s a bit of a followup to this one, over at my current (though still infrequently-updated) blog: <a href="http://www.existdifferently.com/2012/ubiquity-unifi-vs-open-mesh-wifi/">Ubiquity UniFi vs. Open Mesh</a>.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/07/24/i-can-play-the-merakis/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Off to do some Mesh Networking with Meraki</title>
		<link>/2007/07/24/off-to-do-some-mesh-networking-with-meraki/</link>
					<comments>/2007/07/24/off-to-do-some-mesh-networking-with-meraki/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Tue, 24 Jul 2007 12:49:21 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/07/24/off-to-do-some-mesh-networking-with-meraki/</guid>

					<description><![CDATA[Today I&#8217;m going up to the Assemblies of God Indiana District campgrounds with volunteer Jeroen to install and test some mesh networking made by Meraki. They just got a satellite internet connection (their only affordable option due to location) last week and need to populate the internet access to several locations on the campgrounds, probably [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today I&#8217;m going up to the Assemblies of God Indiana District campgrounds with volunteer Jeroen to install and test some mesh networking made by <a href="http://www.meraki.net/" title="Meraki homepage">Meraki</a>. They just got a satellite internet connection (their only affordable option due to location) last week and need to populate the internet access to several locations on the campgrounds, probably using seven or eight <a href="http://meraki.com/products/mini/" title="Meraki Mini">Meraki Mini</a> devices. One of them connects to the internet connection, the others are placed within range of the first one, or just within range of any of the others (up to three hops away I believe), extending internet access to the entire coverage area!</p>
<p>If they had a second internet connection, &#8220;injecting&#8221; another point of internet access would be an option, and the network would automatically send traffic to the best internet access point. Thus, the mesh part of mesh networking. I&#8217;ve been wanting to try the Meraki products for a while, so I&#8217;m excited! More details to come when we&#8217;re done!</p>
<p>The trip to the campgrounds is about two hours each way, so we&#8217;ll only have three or four hours of actual set up and testing time.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/07/24/off-to-do-some-mesh-networking-with-meraki/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>How We&#8217;re Doing Remote Access (VPN, RDP, LogMeIn)</title>
		<link>/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/</link>
					<comments>/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 01 Jul 2007 17:53:59 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Remote Access]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/</guid>

					<description><![CDATA[Mike Mayfield over at Pleasant Valley Baptist Church IT (&#8220;pvcbit&#8221;) posted a question about VPN remote access permissions. I wrote a blog post in March with a little bit of information on this relating to the Microsoft ISA 2004 firewall, but we&#8217;re actually using a combination of services for remote access right now (I mentioned [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Mike Mayfield over at <a href="http://pvbcit.blogspot.com/" title="pvbcit homepage">Pleasant Valley Baptist Church IT</a> (&#8220;pvcbit&#8221;) posted a question about <a href="http://pvbcit.blogspot.com/2007/06/who-has-access-through-vpn.html" title="pvbcit: Who has access through VPN?"><span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> remote access permissions</a>. I wrote a blog post in March with a little bit of information on this <a href="http://infotech.davidszpunar.com/2007/03/06/traditional-vpns-not-just-all-or-nothing-access/" title="My post: VPNS: Not just all or nothing access">relating to the Microsoft <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004 firewal</a>l, but we&#8217;re actually using a combination of services for remote access right now (I mentioned LogMeIn on my prior post as well). Here is another quick look at what we&#8217;re currently doing for <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>.</p>
<p>Basically, because we have <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span>, I can limit what particular user groups are able to do over their <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connection, just like any other firewall rules. Very few people get file server access at all (actually, me and one guy who connects from his church laptop) over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>. The rest are limited to Exchange server connectivity or Remote Desktop primarily, although now that we have <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Remote Procedure Call' );"><acronym class="uttInitialism">RPC</acronym></span> over <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'HTTP protocol using SSL encryption','caption', 'HyperText Transfer Protocol Secure' );"><acronym class="uttInitialism">HTTPS</acronym></span> in place, it&#8217;s much simpler than <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> for the user and so that&#8217;s used almost exclusively for remote Outlook access now, and is as much as most people need (if they have a laptop they have an offline copy of most of their files anyway).</p>
<p>For those that still require remote access to their desktop at work (especially if they don&#8217;t have a church-owned laptop), I&#8217;ve been moving from <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> with Remote Desktop access (complicated to train someone to use since the connection is separate from the RDP client) to LogMeIn.com for remote access.  There&#8217;s a free version and a Pro version, with remote printing and file transfer being the main additional features of Pro. The main benefit? It&#8217;s easy and just requires a web browser, it&#8217;s fast, and not very expensive (with the special we got anyway, or the free version is of course free!). I have run into an issue with a new remote user that hasn&#8217;t gotten LogMeIn to work on their own but I haven&#8217;t had a chance to troubleshoot this yet (I&#8217;m sure it relates to the steps to get the ActiveX or Firefox plugin installed for LogMeIn initially).</p>
<p>We have a Terminal Services server with a handful of user licenses that we use for some volunteers that need remote access from their home computer but don&#8217;t have a dedicated desktop at work. I haven&#8217;t attempted LogMeIn through Terminal Services, but I assume it wouldn&#8217;t work properly with the multiple sessions that make Terminal Services useful, and would only allow access to the console session. For this, we still use <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>, with a CD created from the <a href="http://www.isaserver.org/img/upl/vpnkitbeta2/cmak.htm" class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The Connection Manager Administration Kit allows you to create customized Dial-up Networking connectoids or dialers for your VPN or dial-up users.','caption', 'Connection Manager Administration Kit' );"><acronym class="uttInitialism">CMAK</acronym></a> along with an auto-running tutorial created with <a href="http://www.debugmode.com/wink/" title="Wink free Tutorial and Presentation creation software homepage">Wink</a> that walks users through installing the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connectoid (which has all of the settings preset) and starting a <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connection. Using custom commands in the <a href="http://www.isaserver.org/img/upl/vpnkitbeta2/cmak.htm" class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The Connection Manager Administration Kit allows you to create customized Dial-up Networking connectoids or dialers for your VPN or dial-up users.','caption', 'Connection Manager Administration Kit' );"><acronym class="uttInitialism">CMAK</acronym></a> connectoid, I&#8217;ve included a Remote Desktop settings file that automatically runs upon connection, automatically opening and connecting to the Terminal Server inside the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> once it&#8217;s connected. When Remote Desktop is closed, the connectoid logs off the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span>. The integration of <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> and Remote Desktop isn&#8217;t perfect, but it&#8217;s a lot easier this way (most of the time) than trying to get people to understand connecting to the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> first, then connecting with Remote Desktop manually, and disconnecting in reverse. The more automated the better! These <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Allows you to connect a remote computer over the internet to another network as if it were directly plugged in.','caption', 'Virtual Private Network' );"><acronym class="uttInitialism">VPN</acronym></span> connections are of course limited through <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> to be allowed to connect only to the Terminal Server, and only through the RDP protocol.</p>
<p>One thing&#8217;s for sure: when allowing an unmanaged computer on the network, especially as unsupervised as a remote connection is, it pays from a security standpoint to keep the leash as tight as possible! And it&#8217;s the unintentional risks (spyware, viruses, etc.) more often than malicious users that cause a problem. The best part is, protecting from one helps to protect from the other (in general).</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/07/01/how-were-doing-remote-access-vpn-rdp-logmein/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Initially Evaluating SmoothWall Guardian for Content Filtering</title>
		<link>/2007/05/12/initially-evaluating-smoothwall-guardian-for-content-filtering/</link>
					<comments>/2007/05/12/initially-evaluating-smoothwall-guardian-for-content-filtering/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Sun, 13 May 2007 03:34:14 +0000</pubDate>
				<category><![CDATA[Content Filtering]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Web]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/12/initially-evaluating-smoothwall-guardian-for-content-filtering/</guid>

					<description><![CDATA[We just released our Free Wi-Fi without much hurrah this week(end) (I&#8217;m out of town, so I hope no one needs help!). The big test will be Monday and Tuesday (when I will be in town) with us hosting our Indiana District Council. Right now, content filtering on the public wireless is being provided by [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We just released our <a href="http://www.lakeviewchurch.org/wifiportal/" title="Lakeview Free Wi-Fi">Free Wi-Fi</a> without much hurrah this week(end) (I&#8217;m out of town, so I hope no one needs help!).  The big test will be Monday and Tuesday (when I will be in town) with us hosting our Indiana District Council.</p>
<p>Right now, content filtering on the public wireless is being provided by <a href="http://www.scrubit.com/" title="ScrubIT homepage">ScrubIT</a>, a free DNS-based filtering service.  Not bad but not as much control or information as I want; it&#8217;s a temporary solution (and I haven&#8217;t been given an account at ScrubIT yet, so I have no control at all).   Matthew Irvine has a <a href="http://www.matthewirvine.com/2007/04/22/protecting-your-network-from-outside-invaders/" title="techlesia: Protecting your network from outside invaders">couple</a> of <a href="http://www.matthewirvine.com/2007/04/23/protecting-young-and-not-so-young-eyes/" title="techlesia: Protecting young (and not so young) eyes">excellent</a> posts on his new blog, <a href="http://www.matthewirvine.com/" title="techlesia">techlesia</a>, talking about the open source <a href="http://www.smoothwall.org/" title="SmoothWall Express homepage">SmoothWall Express</a> firewall and <a href="http://dansguardian.org/" title="DansGuardian homepage">DansGuardian</a> content filter.  I have a bit of Linux experience, dabbling at best, but not anything extensive enough for me to set up DansGuardian on a production machine, although I might play with it virtually (SmoothWall Express, if we needed a firewall, might be an option since it is plug-and-play, but we already have <span class="ubernym uttAbbreviation" onmouseover="domTT_activate(this, event, 'content', 'Microsoft Internet Security and Acceleration Server (&lt;a href=&quot;http://www.microsoft.com/isaserver/default.mspx&quot;&gt;link&lt;/a&gt;)','caption', 'Internet Security and Acceleration' );"><acronym class="uttAbbreviation">ISA</acronym></span> 2004).  The company <a href="http://www.smoothwall.net/" title="SmoothWall commercial homepage">SmoothWall</a> has a commercial version of both products, with the content filter called <a href="http://smoothwall.net/products/corporateguardian5/" title="SmoothWall Corporate Guardian">Corporate Guardian</a>, and from the preliminary pricing I&#8217;ve found it appears to be much, much less expensive than most of the commercial filtering boxes I&#8217;ve researched so far, which translates into &#8220;actually affordable.&#8221;</p>
<p>I think the Corporate Guardian looks the most promising, since they turn DansGuardian into a commercially-supported product, with the main benefit being that it&#8217;s plug-and-play, in addition to blacklist and updates subscriptions.  Everyone wins.  However, their <a href="http://smoothwall.net/products/evaluation-terms.php" title="SmoothWall Corporate Guardian Evaluation Terms">evaluation terms</a> concern me a bit.  The terms state, in part, &#8220;You may not communicate the results of your evaluation with other companies, organizations or persons not employed by your company or organization, unless this has been agreed in writing beforehand with SmoothWall.&#8221;  They also state that after the evaluation, you will &#8220;Not make public any notes, analyses, computations, studies or other documents prepared as part of this evaluation unless this has been agreed in writing beforehand with SmoothWall.&#8221;</p>
<p>Why does this concern me?  Well, I want to share my findings with you on this blog, and these terms say I have to get their permission first.  This seems to run counter to the company&#8217;s open source products philosophy, and makes me think they are scared of how their product compares to other similar products if someone were to write a review on their blog, for instance.  Sure, I could ask for permission to write a review, but if it&#8217;s not positive, why would they let me post it?  They can do what they want, but I&#8217;m not very happy with these particular terms and I&#8217;m seriously debating whether or not it&#8217;s worth giving up my ability to comment on my findings in order to evaluate the software beyond the claims they make on their website.  Is anyone else using SmoothWall&#8217;s commercial products, and if so, are you limited in your ability to comment on your company&#8217;s use of the products similar to the terms of the evaluation terms, or does that clause go away after you&#8217;ve made the purchase?</p>
<p>Thanks Matthew for getting me started on this particular content filter!  If I can get past the terms above I&#8217;m willing to give it a shot and maybe save some serious money in the process.  Or I may find that the open source versions are functional enough and easy enough to set up for my needs; now I just have to find the time to test it.</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/05/12/initially-evaluating-smoothwall-guardian-for-content-filtering/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>802.1x Port-based Authentication</title>
		<link>/2007/05/08/8021x-port-based-authentication/</link>
					<comments>/2007/05/08/8021x-port-based-authentication/#comments</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Wed, 09 May 2007 02:04:49 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/05/08/8021x-port-based-authentication/</guid>

					<description><![CDATA[Is anyone else using 802.1x for wired authentication? I&#8217;ve got it working for wireless networking, which is pretty cool. But what about wired ports? I don&#8217;t necessarily want to go to the trouble of locking down every port on campus with 802.1x. Or do I? But public ports are what worry me. For now, the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Is anyone else using 802.1x for wired authentication? I&#8217;ve got it working for wireless networking, which is pretty cool.  But what about wired ports?  I don&#8217;t necessarily want to go to the trouble of locking down every port on campus with 802.1x.  Or do I?  But public ports are what worry me.  For now, the only wired ports in public areas are either physically unplugged at the rack (since they&#8217;re mostly brand new), hooked up to the public wi-fi VLAN so you could get free internet access just as if you had wi-fi, or locked down with port security to only the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'The unique address assigned to every network card. (&lt;a href=&quot;http://en.wikipedia.org/wiki/MAC_address&quot;&gt;link&lt;/a&gt;)','caption', 'Media Access Control' );"><acronym class="uttInitialism">MAC</acronym></span> addresses of the authorized equipment that&#8217;s already installed.</p>
<p>But, with 802.1x, there&#8217;s the possibility of making the ports automatically members of the public VLAN for free access.  But when a computer connects that can authenticate via 802.1x, it can bump them onto the employee VLAN.  Sweet.  But I need to do some manual-reading and testing on our ProCurve switches.  Is it worth the effort?  Is the Windows XP SP2 802.1x supplicant good enough, or would we need to pay for a third party supplicant?  I&#8217;ve noticed that for wireless, the Windows 802.1x supplicant seems to be much better that it was originally, and most laptops are coming with even better software built-in from the manufacturer.  A year or two ago, I wouldn&#8217;t implement an 802.1x-based network with the Windows XP client if you paid me.  Well, depends on how much, but it would hurt anyway&#8230;</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/05/08/8021x-port-based-authentication/feed/</wfw:commentRss>
			<slash:comments>11</slash:comments>
		
		
			</item>
		<item>
		<title>HP ProCurve 1700 series: small, cheap, managed!</title>
		<link>/2007/04/18/hp-procurve-1700-series-small-cheap-managed/</link>
					<comments>/2007/04/18/hp-procurve-1700-series-small-cheap-managed/#respond</comments>
		
		<dc:creator><![CDATA[David Szpunar]]></dc:creator>
		<pubDate>Wed, 18 Apr 2007 23:14:17 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">http://infotech.davidszpunar.com/2007/04/18/hp-procurve-1700-series-small-cheap-managed/</guid>

					<description><![CDATA[Just a quick note that HP ProCuve has some new (since I last checked) web-managed (but still VLAN-capable) switches, the 1700 series. The 1700-8G is a 10/100 8-port switch, and the 1700-24G is a 24-port model of the same, which also has two dual-personality ports (ports 23 and 24 are copper Ethernet ports by default, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Just a quick note that HP ProCuve has some new (since I last checked) web-managed (but still VLAN-capable) switches, the <a href="http://www.hp.com/rnd/products/switches/ProCurve_Switch_1700_Series/overview.htm" title="HP ProCurve 1700 series switches overview">1700 series</a>.  The 1700-8G is a 10/100 8-port switch, and the 1700-24G is a 24-port model of the same, which also has two dual-personality ports (ports 23 and 24 are copper Ethernet ports by default, but you can buy the &#8220;personality&#8221; expansion GBICs to turn them into fiber ports).  The price point on these is very low, to the point where you could use them in an office as a workgroup switch when you couldn&#8217;t run another home-run to your network closet (or your facilities guy complained about having to make home runs everywhere) but you need the flexibility of multiple VLANs at the very edge of your network.  These are the &#8220;little brothers&#8221; to the older <a href="http://www.hp.com/rnd/products/switches/ProCurve_Switch_1800_Series/overview.htm" title="HP ProCurve 1800 series switches overview">1800 series</a>, the 1800-8G and 1800-24G.  I&#8217;m using two of the 1800-8Gs and one of the 1800-24Gs, the main difference is that the 1800 series is all Gigabit and the 1700 series is 10/100.  But you save half the cost of the Gigabit models, where you know you won&#8217;t need Gigabit.</p>
<p>I&#8217;d love to put the Gigabit or even 10/100 regular managed switches with all the <span class="ubernym uttInitialism" onmouseover="domTT_activate(this, event, 'content', 'Simple Network Management Protocol' );"><acronym class="uttInitialism">SNMP</acronym></span> and other &#8220;big network&#8221; goodness including 802.1X security and all the bells and whistles everywhere I need an extra port, but I&#8217;m probably going to have to pick up at least one 1700-series switch in the very near future to pick up the slack until the additional home runs I want become a reality.  At least I&#8217;m still getting a lifetime warranty, and I&#8217;ve never had a single problem with any of the ProCurve switches I&#8217;ve purchased (not so with Linksys!).  Even the <a href="http://www.hp.com/rnd/products/switches/switch408/overview.htm" title="HP ProCurve 408 switch overview">408 switches</a> that I&#8217;ve purchased for the same purpose (but unmanaged) in the past have been rock-solid, and they replaced some pretty flaky Linksys workgroup switches!</p>]]></content:encoded>
					
					<wfw:commentRss>/2007/04/18/hp-procurve-1700-series-small-cheap-managed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
