Thursday, February 4, 2010

1. How To Configure ISA Proxy/Auth Setting For Yum: (by: rizwan)
I was running CentOS in my LAN for my personal use and there are MS ISA servers for proxying and each user has to use his/her user name & password for Internet. So when I used my credentials in my web browser I had no problem but when I was going to do yum no success. After some googling I found this solution. (read more...)

2. Using a RV016, RV042, or RV082 VPN router, can I set up a VPN tunnel where one of the locations has a dynamic IP address type connection?

Yes, this scenario is possible. At least one (1) of the routers of the tunnel must have a connection where a static IP address is used. Also, make sure that the router that has been assigned a dynamic IP address also has an account and a registered domain name with a dynamic DNS (DDNS) service with a provider like www.dyndns.org or www.tzo.com.

( By: http://www.computerguyslive.com/content/wireless/routers/linklys/routers/vpn_tunnel/vpn_tunnel.htm )

3. Linux Network Configuration /Networking, set-up and administration

This Linux tutorial covers TCP/IP networking, network administration and system configuration basics. Linux can support multiple network devices. The device names are numbered and begin at zero and count upwards. For example, a computer running two ethernet cards will have two devices labeled /dev/eth0 and /dev/eth1. Linux network configuration, management, monitoring and system tools are covered in this tutorial.

( By: http://www.yolinux.com/TUTORIALS/LinuxTutorialNetworking.html )

4. Samba Active Directory Integration

5. HOW TO: Active Directory Authentication:
Searched high and low for a good cookie cutter recipe and couldn't find one, so I pieced together parts from various sources to come up with one that I have used for 4 Ubuntu linux servers, and which continues to work for me.

These instructions assume your domain information is DOMAIN (old style domain name) and the DNS resolvable one is DOMAIN.INTERNAL. Our Active Directory environment is running on Windows 2000, but I have tested these instructions in a VMWare Team with Windows 2003 native mode and they worked there as well.
( By: http://ubuntuforums.org/archive/index.php/t-91510.html) read more...

6. Setting-Up a VPN Tunnel on Two Router
A Virtual Private Network (VPN) is a connection between two endpoints - a VPN router, for instance – in different networks that allows private data to be sent securely over a shared or public network, such as the Internet. This establishes a private network that can send data securely between these two locations or networks through a "tunnel." A VPN tunnel connects the two PCs or networks and allows data to be transmitted over the Internet as if it were still within those networks. It is a connection secured by encrypting the data sent between the two networks.
(
By: http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=4222 )read more

7.
If you have multiple trixbox systems that you want to branch, whether they are on your network or not, this can be easily done with IAX.

8. trixbox extensions hacking

These hackers are low-lives who waist their life stealing and cheating others and gain absolutely nothing from it, and are running away from the government their entire life.

What's the best way to secure the extension passwords besides having them randomly generated, and in a situation where VPN and IP filter can't really be used? Many of us face these types of issues.

I also read about two years ago in a PC World magazine that people have been able to hack into VoIP conversations and listen in- and since there is no way out of this unless you have a VPN between your box and your voip proxy's box, everyone is vulnerable

By the way, for those reading this post, one way to secure extensions while port 5060 is opened due to VoIP provider requirements is to go to each extension that is on the same network as the trixbox, and change nat=yes to nat=never
This will forbid anyone outside the trixbox network to register this extension.

9. Vonage transfer calls to another phone number-instantly!

Call Transfer

If you're always on-the-go, Call Transfer makes it easy to redirect calls to another phone number anywhere in the US, Puerto Rico, and Canada while you're on a call. Next time you're running out the door, just transfer the call to your cell phone and keep talking! Or if someone calls for a roommate or family member who isn't home, simply transfer the call to them and they are instantly connected!

How to Use Call Transfer

To transfer while on a call, press the flash button or switch hook, dial #90, dial the number you want your call transferred to, and press #. If the person you transferred the call to doesn't feel like answering, they don't have to! The call will go straight to their voicemail and they can respond at their convenience.

10.

Peer Details
Trunk Name: Gizmo5
disallow=all
allow=ulaw&alaw&ilbc
canreinvite=no
context=from-trunk
dtmfmode=rfc2833
fromdomain=proxy01.sipphone.com
fromuser=1747xxxxxxx <-- Your Gizmo5 number host=proxy01.sipphone.com insecure=very secret=
type=peer
username=1747xxxxxxx <-- Your Gizmo5 number

User Details
(not used)

Register String:
1747xxxxxxx:@proxy01.sipphone.com

11. www.TollFree4Free.com offers registration-less, completely FREE SIP termination to USA Toll Free numbers. Simply send your Toll Free SIP Calls to free.tollfree4free.com (75.127.108.74) and all your 800,866,877,888 toll free calls will be terminated completely free of charge. No account to maintain or sales person to speak to, minutes to monitor, account balance to watch. We have some helpfull screen shots of trixbox configuration if needed. Please contact info@tollfree4free.com if you have any questions or need any examples in how to setup a certain context in asterisk, trixbox, freeswitch, etc. www.tollfree4free.com Use in full production and great for testing. read more...

12. Home » How-To: Set up a LAN gateway with DHCP, Dynamic DNS and iptables on Debian Etch

In order to provide an IP address to the other machines in the network, we need to use a DHCP server.
This DHCP server will provide the host with all the information needed to connect to any other accessible

13. Configuring Dynamic DNS & DHCP on Debian Stable

For the average home computer user there is no need to install a complex package such as the Internet Software Consortium's BIND DNS or DHCP server, since there are far simpler lower resource tools to use, for example dnsmasq. For those who you wish to learn how to use ISC's BIND and DHCP, for example as a learning exercise, this is how I got it all to work in Debian Sarge, the current stable version of Debian GNU/Linux.

This short article was prompted by my question on the Debian-Administration forum site, where I was able to get some answers to the issues I faced and I did promise to post a solution if I got one.

(By: http://www.freepbx.org/support/documentation/howtos/howto-setting-up-voip-provider-trunks/gizmo5)

14. How to install mantis in ubuntu.
If you had the experience of installing Bugzilla before this, Mantis definitely is a piece of cake for you. Both Mantis and Bugzilla has several similarities in installation procedures. However, if you are not sure how to install Mantis and you don’t have the experience with Bugzilla, you can refer to my previous post which discussed about Bugzilla installation (Installation of Bugzilla in Ubuntu Environment)

15. Switching SELinux off on CentOS 5
( By: http://www.electrictoolbox.com )
Security-Enhanced Linux, also know as SELinux, implements various security policies on Linux and additional levels of access crontrol. It was originally developed by the U.S. National Security Agency to adhere to the "Orange Book" guidelines. On CentOS 5 it is enabled by default, but there may be circumstances where you don't need SELinux's additional security and may want to disable it.

What is SElinux ? ( By: http://sysdigg.blogspot.com )

SELinux introduces Mandatory access control (MAC) in Linux. Using MAC, system administrator can create a mandatory policy that limits what access a particular process may be granted to an object.

You are running CentOS and you aren't sure if you have SElinux enabled or disabled. Here is how you can check if you have SElinux disabled in CentOS 5

16. winbindd dead but pid file exists
rm -f /var/lock/subsys/winbindd
rm -f /var/run/winbindd.pid

17.How to install VPN server on Windows 2003 server?

Note:
One need to follow below mentioned steps to install VPN server on windows 2003 server:
[Steps:]
1. Go to Start > Administrative Tools > Routing and Remote Access.
2. Right-click on server’s icon -> select "Configure and Enable Routing and Remote Access" to start the Setup Wizard
3. Click Next
4. Select "Remote Access (dial-up or VPN)"
5. Click Next.
6. Check the VPN check box and then click next.
7. in the "VPN Connection "window, select the network interface is connected to the Internet and click Next.
8. In the "IP Address Assignment window", there are two options available:

* *Automatically Choose this option if you have a DHCP server.
* *From a specified range of addresses Choose the option if the remote clients can only be given an address from a specified pool of addresses.

9. Select default value of No, use Routing and Remote Access to authenticate connection requests and click the Next.
10. Click Finish to turn on RRAS and to configure the server as a remote-access server.

Note: One must have to setup RRAS and turn on the service for VPN server.

Ports needed for Virtual Private Networking (VPN) to work. I’ve used the VPN ports for opening up our firewall and for setting up our QOS (Quality of Service).

Ports Needed for PPTP VPN
- TCP Port 1723
- UDP Port 500
Ports Needed for L2TP VPN
- TCP Port 1701
- UDP Port 500
Ports Needed for IPSec/ESP
- UDP Port 500

18. Setting up Linksys QVPN with Rv016 ( VPN Client Access RV016)
Introduction
This article is one in a series to assist in the setup, troubleshooting, and maintenance of Cisco Small Business products (formerly Linksys Business Series).
Q. How can I set up the Linksys Quick VPN with RV016?
A. QuickVPN is an easy way to set up VPN software on your remote computer or laptop with a simple username and password to securely access networks based on the WRV200 VPN Router. Linksys QuickVPN works as an interface with the Microsoft VPN client application found in Windows 2000 and XP.

In setting-up Linksys QuickVPN with the Linksys router, you will need to go through two steps

1. Adding QuickVPN User Accounts to the Linksys router
2. Setting up the Linksys QuickVPN Client Software

19. (DLink Router) Advanced Network Router Configuration Read this advanced network router configuration for knowing the additional features that provided by most of routers from different vendors.

Basically your network will still work without using these features, however it’s good to take some time to understand and make some testing.… Who knows you might need it..

20. White Paper
Solectek dish antenna is designed to span distances up to 25 miles. ...
www.solectek.com/files/pdf/techtalk/tt-clarity.pdf