Category: computers

  • ISA Site-to-Site IPSec VPN

    I wasn’t necessarily going to post this, but since ISA seems to be the most linked to thing on this site because of only 2 articles, I figure it can’t hurt to talk about it. Especially since it was a very strange problem I had with it and I’m sure I won’t be the only one with it.

    Anyways, at work I am utilizing ISA 2006 Std edition in a front and back wall scenario. Site-to-Site VPN terminate on the external firewall, and all of our local VLANs (55 of them) are routed off of the internal firewall. So far, nothing that complex. It’s just a simple DMZ between the external and internal network setup.

    Anyways, I had a site-to-site VPN (IP pre-shared key) between a customer and us. Basically, we just need to hit a single machine, so the remote network contained two IP addresses, one for the client’s gateway (this is added by default in ISA 2006, DO NOT delete it, also be sure that the remote site has added your gateway in as a remote network too!) and another for the machine we needed to hit on their local network. Anyways, it was working fine. Well, actually, nobody was using it quite yet, but testing had been completed, and I was able to access everything that the developers would need. Anyways, the customer decides that they need to add another IP address that we’ll need to access. Again, no big deal. I’ll just add the IP to the network list for this client. Just to make sure everything’s working, I test it. Nothing works to the new IP. However, the old IP still works fine. What the hell?!

    For those of you unfamiliar with ISA, it’s not like I created a new VPN for this new IP addition, or anything like that. I simply added the new IP to the existing network. All the routing and firewall rules remained the same. Adding the new IP to the list of remote networks should have allowed it to work.

    Working with the IT person at the customer, I learn that when I try to hit the new IP address, the Quick Mode authentication was failing because the ISA server was sending the wrong local network that the request was coming from. The local network that was defined in the rule (by putting a subnet destination in the network rule) was 10.254.95.192/27. However, on the client’s side, he was seeing the request coming from 10.254.64.0/19. In order to create the IPsec tunnel, both the local and remote networks on each end of the tunnel must be identical, but switched (i.e. my local is his remote, and his local is my remote). Needless to say, this 10.254.64.0/27 was screwing everything up. However, when I connected to the original IP that worked, it was sending the correct network of 10.254.95.192/27.

    Of course, no where in ISA 2006’s logging can you see it making the IKE requests. All I could see is that requests were being routed correctly from the internal ISA to the external ISA, and then from the external out to the correct network for the customer VPN. In essence, traffic was going in to a black hole. I could also see that the VPN connection (Main Mode) was up and running. I was completely reliant on the customer to let me know what was coming down the pipe to him. That right there is not really something I’m comfortable with, but he seemed to be OK with it. I’m sure it’s because he knew it wasn’t on his end, but on mine.

    After deleting the VPN multiple times and recreating it to no avail, restarting the machine, etc, I knew that I would have to get some help from someplace else. Thankfully we have an awesome community of people at work that I could bounce ideas off of. Unfortunately, I never received a response. Also, ISAServer.org is a great place to get information. They have forums there that people keep an eye on. Unfortunately, ISA 2006 is still quite new and not as many people deal with it. I also did not receive a response from there. Needless to say, I was on my own for this one. Not a place I really wanted to be, since I thought I was at the end of my ability.

    Actually, the IP isn’t really done in ISA server at all. Much like everything else that ISA server does, it’s just an application that sits on top of the OS and utilizes things that are already built into the OS (in my case Windows 2003 R2). This means that all IP policies, rules, etc are done by Windows and this can be monitored using the IP Security Monitor MMC Snap-in.

    Since the VPN tunnel was being created successfully, I knew that Main Mode IKE Policies were correct, it was the Quick Mode policies that were causing me grief. Since we have multiple VPN connections terminating on this firewall, there are a lot of Quick Mode IP policies in place. Especially since all of them use pre-shared keys, which require that two IP policies are created, one for inbound and outbound (otherwise you can have one policy that does both inbound and outbound).

    Scanning through the policies I was able to find the inbound and outbound policies for the original customer IP address to the 10.254.95.192/27 network, but I wasn’t able to find it for the new customer IP address. Alas, the problem! The next best policy for the new IP address was for the 10.254.64.0/19, since this policy encompasses the 10.254.95.192/27 subnet. Finally, I felt like I was making progress. Unfortunately, ISA should have been creating these policies when I edit the customer VPN networks. Actually, I still have no idea why ISA isn’t creating these policies. This is why I think there’s a bug which I’m going to submit to Microsoft (via this post actually).

    Now that I knew the source of the problem, I had to fix it. Some days diagnosing the problems take longer than fixing them, and some days it’s the other way around. Since it had already taken me about a day to find the problem, I hoped that it wouldn’t take that long to actually fix it.

    Needless to say, you can’t add IP policies from the IP Security Monitor MMC Snap-in, because, well, it’s a Monitor not an editor. The IP Policy Manager MMC Snap-in was no use either, as it defines computer level policies. Doh. Well, I can finally say that one of my certifications actually came in handy. That “+ Security” portion of my MCSE gave me the knowledge that there is a way to edit IP policies from the command line. Going on this, a quick Google search gave me exactly what I was searching for. Now which command to actually use?

    At first I tried to just create a filter. However, I didn’t know of any filterlist, and none of the current filters were a member of a filterlist. Thankfully you can just make up a name and it creates on. Unfortunately this didn’t solve anything. Nothing showed up in the Quick Mode filters. Lets try again, yeah?

    Turns out it’s not a static setting, but a dynamic setting, which makes more sense. Anyways, you can add Quick Mode rules pretty much the same. In that I mean, the command is just as long and gross. Just be aware, that since I wanted to add a Quick Mode rule and not a Main Mode rule, I had to put in the Quick Mode Policy variable.

    Another thing that made this so confusing was that in IP Monitor, they are called Quick Mode Filters and at the command line they’re called Rules. Ugh. At least it’s taken care of. And now I think I know more than I ever wanted to about ISA and IP.

  • NetApp Certified

    Well, I have another acronym to stick at the end of my name, NACA.

  • ISA 2006 Part 2

    I still haven’t found any decent solution to the compression, but I did find a solution to publishing NTLM websites.  Basically, ISA 2004 didn’t have any pre-authentication, where ISA 2006 does.  Why I wasn’t experiencing any of this on my websites was because the ISA machine is on the same domain.  In order to fix this, I had to use LDAP pre-authentication.  I used part of an article posted on isaserver.org.  It got me working to a certain extent, but then I had to play with it a little bit more.  No big deal, it’s all working now. 

    Now just to fix the compression part…

  • Vista and Photoshop

    I finally got around to ordering the hardware necissary to do what I want on my computer without having to wait and wait and wait. I finally bought 2 GB of RAM and a new video card. This will increase my system RAM 5 fold after I add it, and get me off the onboard video card with 8 MB of RAM.

    The reason I did this was for two reasons: Running Vista RC2 is painfully slow with only 512 MB of RAM and an onboard video card, and post processing images for aaron spruit (.com) is painful with the limited amount of RAM. Currently my Vista score is 1. This will hopefully bring me up to something that’s bearable. And all for ~$250, you can’t go wrong.

  • Leostream

    Leostream, who I’ve talked about before, has a few new demo’s up on their website.  Having used some of the demoed software before, these are pretty well done.  I would definitely take a look at them.  Oh, and it doesn’t seem to work in IE7 beta, and there are other people saying it doesn’t work in IE at all, so break out firefox or something else to check em out.

  • Office 2007 Beta 2

    Office 2007 Beta 2 has been out for awhile, and I must say, I’m impressed.  I really like the new layout in instead of the old file, edit, view, etc menu.  It took awhile to get used to, but I think I’ve found where everything is now.  I’m also digging the new, and probably temporary, default font, Calibri.  Granted, any one using Office 2003 and earlier can’t see the font.  The built in RSS feeds in Outlook and the To-Do bar is a nice addition too.  Oh, and don’t forget the preview on the fly for things like color, font, and style changes.  Very slick.

    However, there are a few things I don’t like.  I really don’t like how Outlook doesn’t use the same layout as word, excel, etc.  If they’re going to change it one place, they really need to change it everywhere.  It’s not like Outlook’s toolbars are that much radically different than Word’s either.  Also, while the RSS feeds in outlook are nice, there are some serious downsides.  The biggest of which is the inability to edit anything about the feeds, particularly the refresh time after you’ve added it.  Plus, by default, when you add a feed, the update limit is taken from the publisher’s recommendation.  Most sites, however, don’t publish this data so the feed will never update.  So, when you add a feed, be sure to click the advanced button and uncheck the ‘Update Limit’ checkbox unless the provider has actually set the limit.

    Speaking of which, I should probably look into how to do that with my RSS feed.

  • VMWare Infrastructure 3

    Today was the official announcement of VI3, VMWare’s next release of ESX and Virtual Center.  After watching the webcast this morning, I’m more than a little bit stoked.

    Some of the things I’m looking forward to are

    • NAS support
    • USB support
    • Drag and drop in virtual center
    • New, more performant VMFS 3
    • 4-way SMP and 16 GB of RAM support for virtual machines
    • DRS
    • High Availibility features
    • Support for Solaris
    • Ability to run non-VMWare machines
    • Removal of the web interface

    I can’t wait to get the final bits loaded on my machine.  I’ve actually been debating installing beta 2 on my home machine for awhile, but haven’t because of time constraints.  However, I’ll have to put a few things on hold to install the final version.

    There are also a few new whitepapers on VI3 already on VMWare’s website, so you can get a head start before it’s actually released.

  • Virtual Host Beast

    Last fall I priced out a machine to host virtual machines for a coworker of mine. Well, all the pieces finally arrived, and last night we put it together.

    Holy cow, talk about a beastly machine, so much so in fact, that it is called esx-beast. The case, with the hot swap SATA hard drive bays is quite a nice touch too. Watching all those LEDs blink in unison when configured in a RAID5 was quite a treat to watch.

    The megaRAID card functioned flawlessly too, which is a good thing. ESX found it without any problems, and he now has 500 GB of redundant usable space. If I had money, and didn’t have a functioning machine myself, I would definitely look at getting a similar box.

  • ESX Networking

    This is just a quick update with something that I finally fixed two nights ago.  If you happen to run VMWare ESX, *DO NOT* share a NIC between the console and Virtual Machines (VMs).  This was how I had been running my system because I only had one NIC at the time.  However, I had purchased a new dual port Intel gigabit NIC about a month ago, but I just hadn’t had the time to actually update the system to utilize it.  Well, two nights ago, I set the original NIC to only the console session, and then put ports on the dual port NIC on a virtual switch used by all the virtual machines.  Therefore, I theoretically get 200 Mbps to the virtual machines. 

    Holy crap, talk about an improvement.  Transfers between the VMs and my NAS used to be dog slow, but now they are where they should be.  I just need to get a gigabit switch with jumbo frames to use everything to fullest extent.

  • Apple New Announcements

    Last week they announced the Video iPod.  I personally have nothing against it.  However, today, Apple made some announcements about new PowerBooks and PowerMacs.  It’s today’s announcement that really bothers me, specifically the new “quad” processor PowerMac.  Normally, I’d be all about it, it sounds like a beast.  I’m not even going to talk about anything else from here on out.  I just want to show “the people” how overpriced Apple products truly are, but first, some background.

    I had mentioned my home setup at home to a coworkers before.  It’s nothing really that great hardware wise, but it’s more how I utilize it, and the price I got it when it was new.  Anyways, I’ve got VMWare ESX server installed on it which allows me to run multiple “virtual” machines on top of the one machine.  This way I can have a machine dedicated to specific tasks, instead of everything on one.  Obviously this helps for when something goes wrong.  Now, everything doesn’t go down if I accidentally mess something up. 

    Anyways, he realized how great of an idea this was, so he wanted to get a server machine up and running that could do the same thing.  Well, he’s a developer, so he didn’t really know what to look for, so I priced out a machine for him.  Basically I priced him out a beast of a machine for $2500.  The specs of it are listed below.

    Supermicro H8DAE ($356)
    One Dual Core Opteron 265 ($728)
    4GB PC-3200 Reg ECC RAM ($516)
    MegaRAID 150-4 SATA Card ($235)
    3 Seagate 200GB SATA Drives in RAID 5 for 400GB of redundant space ($327)
    Case with 645W PSU ($266)

    Now that, plus a plain CD-ROM drive and floppy comes to just under $2500.  Now, lets look at the Apple Store to see what you get with their “quad” machine for $3300. 

    Two dual-core G5 Processors
    512MB 533 DDR2 NON-ECC RAM
    250GB Harddrive (not redundant and not on dedicated hardware controller)
    Dual Layer 16x DVD Burner
    NVIDIA GeForce 6600 256MB Video Card

    Shall we compare the differences?  Yes, we shall.

    If I were to get my machine up to all the specs listed on the mac (without reducing any of the components), I’d have to add another processor (+$728), add a dual layer DVD burner (worst case +$100), and add a video card (+$110).  Let’s see, adding that all up gets us to $3404.  Shoot, just over what the PowerMac costs.

    But wait, let’s do a similar thing for the PowerMac.

    We’d have to add 4 1GB ECC Dimms (+$1500), and increase the harddrive space, oh wait, they don’t have a redundant solution, so we’ll just go with the 500GB option they offer, even though it’s insanely inferior (+$500).  After adding on those, we’re at $5099. 

    Wow, for a whole 1.5 grand less, you can have a superior machine.  That’s really all I wanted to show.