To map a drive based on user name by using group policy objects and preferences, you need to do the following:

  • Create a share to hold user’s home drives and set permissions (most network administrators are using share name such as Users$);
  • Create a security group to apply security filtering in GPO, so all users that are members of this group will be able to create home folder via GPO;
  • Create a new GPO and use GPP to create user’s folder (this is in addition to your existing GPO used to map home drives);
  • Add drive mappings for the user home drives in the existing GPO;
  • Assign link order for the two GPOs, with lower link order for home folder creation GPO and higher link order for home mapping GPO

In my example, I will use my existing GPO (named Login Script GPO) for mapping network drives as described in my blog where I was using GPPs to map network drives base on user’s group membership.

In addition to this GPO, I will create a new one and name it UserHomeDrive. By the end of theconfiguration process, the drive maps settings will be similar as shown in the picture below.

Note: user home drive is mapped to the letter Q:

Mapping a drive based on user name

To map a drive based on a user name your drive mapping location setting should look something like this: \\SERVER\SHARE\%LOGONUSER% and in my example the user’s home drive is mapped to \\TEST-DC-01\Users$\%Logonuser% as shown in the picture above.

When you use Active Directory Users and Computers (ADUC) to map a user drive, this tool will create the user’s directory and set permissions. Unlike ADUC, GPP will only map a drive to the share; it will not create the directory or set permissions. So, you will need to pre-create the user’s directories with appropriate ACLs. For this purpose you can use scrip such as PowerShell script or VBScript which could be shown in one of my next blogs.

Here we will use GPP to create user’s directory and set permissions. First we will need to create a new Group Policy Object and link it to the domain.

Create a new GPO and security group

  1. Create GPO, assign it to the FilstLocation OU and named it UserHomeDrive.
  2. Create a new Active Directory security group, something like ‘FirstLocationUsers’. Under Group Policy security filtering, remove Authenticated Users and add your new security group as shown in the picture below.

Create a share folder and set permissions

3.  Create a directory that will hold the home folders. In my example I named it ‘Users$’. Ensure that the Everyone is removed and that the Authenticated Users groups have Full Control share permission.

4.  To setup exclusive access, go to the directory location of your share. In the advanced NTFS security permissions, remove the inheritable permissions and clear the current ACL. You can then add the following ACL:

SYSTEM = Full Control
CREATOR OWNER = Full Control
LOCAL\Administrators = Full Control
For the Authenticated Users group the following has to be set up ONLY:
Traverse folder; Create folder; Write attributes; Write extended attributes; Read   permissions; Change permissions

These NTFS permissions will allow your users to create the folder via the GPO, but they will not be able to browse the share or view any folder other than their own.

5.  Then you can add a drive mapping preference item to your GPO, mapping the path \\TEST-DC-01\Users$\%Logonuser%.

6.   In the new GPO configure a new Folder under ‘User Configuration‘ –  ‘Preferences‘ –  ‘Windows Settings’ – ‘Folders’.

7.   On the General tab you should select under Action ‘Create’, and the Path should read \\TEST-DC-01\Users$\%Logonuser%. Do not enable any additional items under Attributes.

8.   In the Common tab, enable the ‘Run in logged-on user’s security context‘ option.

This will automatically create a folder for the user who are a member of your ‘FirstLocationUsers’ group with exclusive user access to this folder.

Map a drive to user’s folder

Now I will go back to my existing GPO (in my example this is Login Script GPO) for mapping network drives based on user’s group membership. I will repeat the steps as described in my previous blog, but this time I will map the drive letter Q to the following location \\TEST-DC-01\Users$\%Logonuser% .

For the Action you can select ‘Create’ or ‘Replace’, check the ‘Reconnect’ checkbox and click on the Common tab.

On the ‘Common’ tab check two check boxes: ‘Run in logged-on user’s security context (user policy option)’, then ‘Item-level targeting’. This will open Targeting Editor where you will make sure that the user is a member of the security group ‘FirstLocationUsers’.

Assign link order for the two GPOs

Finally, you have to make sure that GPOs precedence order is set up with lower link order for home folder creation GPO and higher link order for home mapping GPO. The link order regulates how policy object are being processed for the linked OU. Lower ranking policy object will be process before the higher ranking object. Here the ‘UserHomeDrive’ with the link order # 3 will be processed first, then the ‘Login Scrip GPO’ with the link order # 2 and so on. This order is necessary because we have to make sure that user’s home drive has to be created before the user’s home drive is mapped. ‘Default Domain Policy’ is processed last , so any policy settings in this policy object are final and will override those configured in policy objects with lower link order (unless inheritance blocking or enforcing is used).

Wednesday, 04 February 2015 21:29

Backup Strategy Form

ITEM

Desciption

 

 

 

 

Backup frequency 

 Daily, Weekly, or Monthly

 

 

 

 

Recovery Point 

How critical is your data? Can you manage with losing a week’s data, or will even an hour’s loss be unacceptable?

 

 

 

 

 

Backup type 

 

Will you just make incremental backups or full? Or perhaps go for a full back up every month?

 

 

 

 

 

Backup devices 

 

Removable Storage, Tape, NAS devices, or Backup appliances

 

 

 

 

 

Offsite backups 

 

Offsite backups are essential for a fool proof backup policy. How often do you want to take these? Where will you store these?

 

 

 

 

 

Versioning

 

Do you want to use versioning, which allows for seamless, up-to-date backups, like visual studio source control?

 

 

 

 

 

Online backups 

 

Will a cloud-based online backup service be useful?

 

 

 

 

 

Security 

 

Do you require encryption or are you comfortable keeping your data out in the open?

 

 

 

 

 

Downtime 

 

If something goes wrong, how soon do you need to be up-and-running?

 

 

 

 

 

What is to be backed up 

 

OS Image,documents, Servers, E-mail, databases?

 

 

 

 

 

 

 

Legal requirements 

 

Are you bound by compliance laws? Your backup plan must take this into account

 

 

 

 

Monday, 13 August 2012 12:24

Case Study:ADSL frequent disconnection

ADSL Link

Downstream

Upstream

Connection Speed

112 kbps

182 kbps

Line Attenuation

52.0 db

32.5 db

Noise Margin

16.10 db

16.5 db

SNR [Signal Noise Ratio], here you should expect more than 20 to be able to connect, 25 to get a smooth and good latency, higher better, 30+ should be able to get a stable and smooth 2Mbps line, 4Mbps needs around 40+.
Line Attenuation, now this is the opposite of SNR, the lower the better, meaning there's less noise/distortion at your phone line, below 10 usually, more than 20 is still acceptable, but not smooth enough to play online games. 25+? expect frequent disconnection.If your Line Attenuation is more than 40, you should already face it in noises/static/distortion,  it's phone line issue.


 

How to use Nslookup to verify MX record configuration

  1. At a command prompt, type nslookup, and then press ENTER.

  2. Type server <IP address>, where IP address is the IP address of your external DNS server, and then press ENTER.

  3. Type set q=MX, and then press ENTER.

  4. Type <domain name>, where domain name is the name of your domain, and then press ENTER. The MX record for the domain you entered should be displayed. If the MX record is not displayed, DNS is not configured properly.

Example

The example below shows how MX records appear for the fictitious domain, example.com.

C:\> nslookup

Default Server: pdc.corp.example.com

Address: 192.168.6.13

> server 172.31.01.01

Default Server: dns1.example.com

Address: 172.31.01.01

> set q=mx

> example.com.

Server: dns1.example.com

Address: 10.107.1.7

example.com MX preference = 10, mail exchanger = mail1.example.com

example.com MX preference = 10, mail exchanger = mail2.example.com

example.com MX preference = 10, mail exchanger = mail3.example.com

example.com MX preference = 10, mail exchanger = mail4.example.com

example.com MX preference = 10, mail exchanger = mail5.example.com

mail1.example.com internet address = 172.31.31.01

mail2.example.com internet address = 172.31.31.02

mail3.example.com internet address = 172.31.31.03

mail4.example.com internet address = 172.31.31.04

mail5.example.com internet address = 172.31.31.05

In this example, the preconfigured DNS server is behind a proxy server. Therefore, an external or Internet DNS server with a known IP address of 172.31.01.01 was used to perform the query. Next, the query type was set to MX to locate the mail exchangers for example.com. In this example, five SMTP servers are equally balanced, each with its own IP address. However, your domain might only have a single entry, as seen in the following example:

contoso.com MX preference = 10, mail exchanger = mailbox.contoso.com

mailbox.contoso.com internet address = 10.57.22.3

Advanced SOHO dual network architecture

The example of configure a Cisco 871W router in an advanced SOHO configuration that offers:

  • Stateful packet inspection firewall
  • Two virtual Wireless LANs (max 10)
  • Two virtual LANs bridged to the two wireless LANs
  • Both Wireless LANs configured for WPA security
  • One virtual LAN serving as a guest network with restricted access
  • DSL PPPoE client
  • DHCP server
  • Four-port VLAN-capable switch configured to support 2 separate networks

Figure A shows a logical diagram of the configuration. The orange represents the guest network and the green represents the internal network. The two wireless LANs are bridged to their respective VLANs using BVI (Bridge Virtual Interface) 10 and 20. The router will have port F0 configured for wired guest access and F1 through F3 configured for internal network access. Port F4 is the WAN interface configured to dial PPPoE to an ADSL modem. The orange guest wired or wireless networks will have full access to the Internet but no access to the green internal network. The internal network will have full access to the orange guest network and the Internet. The guest wireless LAN will have an SSID of GuestWLAN, and the internal wireless LAN will have an SSID of InternalWLAN. For now, the Cisco 871W is capable of broadcasting only one SSID, so GuestWLAN will be the only one broadcasting. Future firmware will fix this shortcoming. For anyone wondering, SSID hiding is a worthless security feature.

Figure A

Download Cisco 871W SOHO template, embedded with Justin's new rapid replace functionality.

 

As the Cisco IOS is riddled with thousands of commands, configuring it can be challenging. This download will help you master the 10 commands to know, inside and out, when using the Cisco IOS.

  1. The "?" – It may seem entirely too obvious that you should know how to type ? to ask for help when using the Cisco IOS. However, the Cisco IOS is completely different from other operating systems when it comes to using the question mark (help key). As the IOS is a command line operating system with thousands of possible commands and parameters, using the ? can save your day.
    You can use the command in many ways. First, use it when you don’t know what command to type. For example, type ? at the command line and for a list of all possible commands. You can also use ? when don't know what a commands next parameter should be. For example, you should type show ip ? If the router requires no other parameters for the command, the router will offer “<CR>” as the only option. Finally, use ? to see all commands start with a particular letter. For example, show c? will return a list of command the start with the letter "c".
  2. Show running-configuration – The show running-config command shows the router, switch, or firewall's current configuration. The running-configuration is the config that is in the router's memory. You change this config with you makes changes to the router. Keep in mind that that config is not saved until you do a copy running-configuration startup-configuration. This command can be abbreviated sh run.
  3. Copy running-configuration startup-configuration – This command will save the configuration that is currently being modified (in RAM), also known as the running-configuration, to the non-volatile RAM (NVRAM). If the power is lost, the NVRAM will preserve this configuration. In other words, if you edit the router’s configuration, don’t use this command, and reboot the router--those changes will be lost. This command can be abbreviated copy run start. The copy command can also be used to copy the running or startup configuration off of the router to a TFTP server in case something happens to the router.
  4. Show interface – The show interface command displays the status of the router’s interfaces. This output provides the following:
    • interface status (up/down),
    • protocol status on the interface
    • utilization
    • errors
    • MTU
    • and much more.
    This command is a “must have” for troubleshooting a router or switch. This can also be used by specifying a certain interface like sh int fa0/0.
  5. Show ip interface – Even more popular than show interface are the show ip interface and show ip interface brief. The show ip interface provides tons of useful information about the configuration and status of the IP protocol and its services, on all interfaces. The show ip interface brief command provides a quick status of the interfaces on the router, including their IP address, Layer 2 status, and Layer 3 status.
  6. Config terminal, enable, interface, and router– Cisco routers have different modes where only certain things can be shown or certain things can be changed. Mastering moving between these modes is critical to successfully configuring the router.
    For example, when logging in, you start off at the user mode (where the prompt looks like >). From there, you type enable to move to privileged mode (where the prompt looks like #). In privileged mode, you can show anything but not make changes. Next, type config terminal (or config t) to go to global configuration mode (where the prompt looks like router(config)# ). From here, you can change global parameters. To change a parameter on an interface (like the IP address), go to interface configuration mode with the interface command (where the prompt looks like router(config-if)#). Also from the global configuration mode you can go into router configuration using the router {protocol} command. To exit from a certain mode, type exit.
  7. No shutdown – The no shutdown command enables an interface (brings it up). This command must be used in interface configuration mode. It is useful for new interfaces and for troubleshooting. When having trouble with an interface, you may want to try a shut and no shut. Of course, to bring the interface down, reverse the command and just say shutdown. This command can be abbreviated no shut.
  8. Show ip route – The show ip route command is used to show the router's routing table. This is the list of all networks that the router can reach, their metric (the router’s preference for them), and how to get there. This command can be abbreviated sh ip ro and it can have parameters after it, like sh ip ro ospf for all OSPF routers. To clear the routing table of all routes, you do clear ip route * or to clear it of just one route do clear ip route 1.1.1.1 for clearing out that particular network.
  9. Show version – The show version command gives you the router’s configuration register (essentially, the router’s firmware settings for booting up the router), the last time the router was booted, the version of the IOS, name of the IOS file, model of the router, and the router's amount of RAM and Flash. This command can be abbreviated sh ver.
  10. Debug – The debug command has many different options after it and does not work by itself. It provides detailed debugging output on a certain application, protocol, or service. For example, debug ip route will tell you every time a router is added or removed on the router.

 

The MacBook/MacBook Pro don't have a "printscreen" key, Try this:

Shift + Fn + F11 (If your functions key controls the hardware)
Shift + F11 (If your function keys bahaves as normal functions keys)

If you want take a screenshot of the active window jus add the Alt key.

Alt + Shift + Fn + F11 (If your functions key controls the hardware)
Alt + Shift + F11 (If your function keys bahaves as normal functions keys)

Methods

You can choose between:

*Resetting the Thomson Gateway via the Thomson Gateway GUI

*Reset the Thomson Gateway via the Reset button

 

Resetting the Thomson Gateway via the Thomson Gateway GUI

Proceed as follows:

1 Browse to the Thomson Gateway GUI.

2 On the Thomson Gateway menu, click Configuration.

3 In the Pick a task list, click Reset my Thomson Gateway.

4 The Thomson Gateway restores the initial configuration and restarts.

5 The Thomson Gateway returns to the Thomson Gateway home page (unless the IP address of your computer is not in the same subnet as the default IP address of the Thomson Gateway, being 192.168.1.254).

 

Reset the Thomson Gateway via the Reset button

Proceed as follows:

1 Make sure the Thomson Gateway is turned on.

2 Push the Reset button until the Power LED lights red - this will take about 7 seconds.

3 Release the Reset button.

4 The Thomson Gateway restarts.

 

*Your system administrator may have disabled the physical reset button of the Thomson Gateway. In this case, a hardware reset to defaults is not possible.

Page 10 of 10
   
© NGworks © copyright 2010,ABN:34495741945