Skip to main content

Posts

Showing posts from February, 2013

USB to Serial Mac OS X for console connections

Download the 32bit driver here or the 64bit driver here  to be used with the PL2303 adapter that can be purchased cheap online. To initiate an console connection find your device: bash-3.2$ ls -la /dev/tty.* crw-rw-rw- 1 root wheel 18, 2 26 Oct 08:32 /dev/tty.Bluetooth-Modem crw-rw-rw- 1 root wheel 18, 0 26 Oct 08:32 /dev/tty.Bluetooth-PDA-Sync crw-rw-rw- 1 root wheel 18, 6 26 Oct 14:40 /dev/tty.PL2303-000013FA Execute: screen /dev/tty.PL2303-000013FA 9600 If it doesn't work for you uninstall it this way; kextunload /System/Library/Extensions/osx-pl2303.kext/ sudo rm -r /System/Library/Extensions/osx-pl2303.kext/ sudo rm -r /Library/Receipts/osx-pl2303.pkg

Mac OS X key-based ssh login

To set up key-based SSH, you must generate the keys the two computers will use to establish and validate the identity of each other. To do this run, the following commands in Terminal: Check to see whether a .ssh folder exists in your home directory by running the command ls -ld ~/.ssh. If .ssh is listed in the output, move to step 2. If .ssh is not listed in the output, run mkdir ~/.ssh and continue to step 2. Run: cd ~/.ssh Run: ssh-keygen -b 1024 -t dsa -f id_dsa -P '' This command generates the public and private keys. The -b flag sets the length of the keys to 1,024-bits, -t indicates to use the DSA hashing algorithm, -f sets the file name as id_dsa, and -P '' sets the private key password to be null. The null private key password allows for automated SSH connections. Run: touch authorized_keys2 Run: cat id_dsa.pub >> authorized_keys2 Run: chmod 400 id_dsa The permissions on the private key must be set so that the file is not world readable. Run

Microsoft SQL Reporting Services FIX

Scenario MS SQL 2005 Reporting Services on Windows Server 2003. App based on MS SQL Reporting services web service failing. Error " System.Configuration.ConfigurationErrorsException: The RSA key container could not be opened" Trouble shooting steps I followed. Check IIS, how are you authenticating? Check permissions on the sql database, ensure the web server HOSTNAME$ is db owner. If IIS is anonymous then NETWORK SERVICE must have db permissions too. Check permissions on your web services via the admin interface usually something like this http://HOSTNAME/Reports$DBINSTANCENAME/Pages/Folder.aspx Check you can access the web services from a workstation to ensure the service is "exposed" Check you can access the web services from the web server, you should be able to enter the web service required variables and return data. If the site is running in the "Network Service" context then it is possible that the access to key store was removed. To reas

CatOS to IOS

Just some more examples to jog my memory ;) CatOS Native IOS set vlan [vlan-id] [mod]/[port] interface [gigabit/fastethernet][mod]/[port]  switchport  switchport mode access  switchport access vlan [vlan-id] set port enable [mod]/[port] interface [gigabit/fastethernet][mod]/[port]  no shutdown set port disable [mod]/[port] interface [gigabit/fastethernet][mod]/[port]  shutdown set spantree portfast interface [gigabit/fastethernet][mod]/[port]  spanning-tree portfast set port speed [mod]/[port] [auto/10/100/1000] interface [gigabit/fastethernet][mod]/[port]  speed [auto/10/100/1000] set port duplex [mod]/[port] [half/full] (Note: Auto duplex automatically set with speed auto ) interface [gigabit/fastethernet][mod]/[port]  duplex [auto/full/half] reset system reload show cam dynamic show mac-address-table dynamic show channel show etherchannel summary show port [mod]/[port] show interface [gigabit/fastethernet][mod]/[port] show spantree show spanning-tree show trunk show i

CatOS/IOS example vlan trunk

CatOS sw> enable sw> set trunk {port to trunk on} on dot1q {vlans to allow} EXAMPLE set trunk 4/48 on dot1q 2-3,10,20,30,69,96-99 (This example sets port 4/48 to the 802.1q standard, and only allows VLANs 2-3,10,20,30,69,96 to 99) IOS sw> enable sw> config t sw> interface GigabitEthernet0/1 sw-if> switchport trunk encapsulation dot1q sw-if> switchport mode trunk sw-if> end sw> write mem

FAT32 file size limit

Don't forget about the cli utility, convert convert E: /FS:NTFS You can perform this on a device that has files on it such as a USB disk but probably best to take a backup beforehand ;). Just make sure that you have sufficient free space on the partition, so that there’s room for temporary files that are created during the process; note that Windows will warn you if there is not enough space on the partition.

Mac OS X DNS Resolver.

Had an interesting problem today with a Mac OS X 10.7.5 end user working with the Apple built-in Cisco IPSEC VPN client. The end user was using a VPN profile that has split tunneling enabled. Internal servers could not be reached via their DNS address (ip address did work). The vpn interface was getting the correct DNS settings, the Ethernet interface and WiFi interface were only getting the end users home internet connection DNS settings. Unfortunately the VPN DNS isn't overriding the ISP's. Doesn't matter whether I change the order of services either. Manually added the DNS to the interfaces and it works as expected but doing it that way means the end user won't be able to resolve anything when not connected to the VPN. This is a workaround... real quick one, haven't researched it yet. Will update with more details when I have time. https://gist.github.com/4536687