Update: I’ve added several additional parts to this tool since it was originally released, including some debug logging, an Azure credential check to ensure that your identity is part of Global Admins, additional cloud endpoint checks, and a more thorough system inventory.… [ Continue reading ]
This week, I had an interesting issue to resolve–one of my customers previously hosting their architecture on-premises was utilizing geo-filtering services provided by their ISP. These geofiltering services were provided at the network layer, so filtered requests never reached the environment.… [ Continue reading ]
I have updated the Office 365 Proxy PAC tool to allow selection of the US Department of Defense XML feed for proxy bypass configurations.
You can see previous updates for the tool:
And of course, the updated tool is available on the TechNet Gallery, with a couple of other bugfixes that some people reported (invalid characters/smart quotes appeared in some versions of the file, which have been corrected): https://gallery.technet.microsoft.com/Office-365-Proxy-Pac-60fb28f7… [ Continue reading ]
The people have spoken.
I’ve updated the tool with a couple of features:
- Include the Skype for Business IP ranges in the proxy bypass list, since there are occasions that it is necessary.
- Added an option for *all* IP ranges in the XML feed for selected products to be added to the proxy bypass list
- Added an option for *only* IP ranges in the XML feed for selected products to be added to the proxy bypass list
- Added an option to export the IP ranges for selected products to a separate text file.
I wrote the original Proxy PAC tool for a customer almost a year ago, and since have added a lot of new functionality. Rather than updating my previous blog posts about it, I thought I would start a fresh thread. … [ Continue reading ]
When we talk about Office 365 services with our customers, a lot of the discussion revolves around the networking components. While we generally have a “good idea” of networking, we’re not experts in your technology and will frequently tell you to go talk to your vendors. … [ Continue reading ]
Ran into an interesting customer issue regarding connecting to a wireless network. For whatever reason, this laptop can’t see the wireless network (though others in the office can). This laptop can connect to other WiFi networks without issue.… [ Continue reading ]
Tonight, I found myself having to copy the AnyConnect binaries from one ASA 5505 to another without a device on-LAN to TFTP to. I did, however, have a public FTP server that could use to move the data around.… [ Continue reading ]
After getting my PIX to boot in my previous post, I decided to run through the password recovery procedures.
- PIX recovery images (available from either the Cisco site individually or here in one ZIP file)
- PIX firewall software version
- TFTP server software (I used the TFTP server included in the PacketTrap pt360 Suite in this exercise)
- Terminal Emulator (I typically use PuTTY)
- Connect Ethernet 0 on the PIX to your local LAN.
When meeting with a potential customer the other day, she mentioned that she had a running PIX with an unknown password.
I thought I’d refresh my PIX skills and decided to bust out an old PIX 506E we had sitting in the office.… [ Continue reading ]
Recently, we renumbered a client’s network to reduce broadcast traffic and introduced two new redundant internet connections. Everything seemed fine in the initial testing, and we all went home.
The next day, when we were sifting through the fallout tickets, there was a recurring theme–Windows Mobile devices were no longer synchronizing.… [ Continue reading ]
- Trying to access the “Virtual Media” section of a DRAC console
- Client is Windows 2008
- When accessing “Virtual Media,” get prompted to accept ActiveX control; accept, and get redirected to login page
- Open Internet Explorer, Tools > Internet Options; select Intranet, and select “Automatically detect Intranet network”
- Open %systemroot%\system32\drivers\etc\hosts.
For anyone who manages an Active Directory environment, you’ve undoubtedly come to understand the need for keeping time in sync. In short, you won’t be able to log in if the local computer time has more than 5 minutes difference than the logon server.… [ Continue reading ]