SCCM 2012 DP Job Manager

I have been working with SCCM 2012 a lot lately and I run across a tool that has become invaluable for me.

Distribution Point Job queue manager

This is a part of the Config manager toolkit. What this allows you to do is view the status of the distribution manger …

more ...

SMTP Via telnet

If mailx is just not hardcore enough for you you have to do your SMTP via telnet.

In all seriousness though sometimes you do really want to walk though a SMTP session or validate a mail server. SMTP is a pretty simple Protocol and you can reasonable send simple emails …

more ...

OSPF – Router ID

When a router is running OSPF the OSPF process will select and use a Router ID. This ID must be unique inside of an OSPF area.

This ID will not change unless the process is restarted or otherwise cleared. This is due in part as a topology convergence will be …

more ...

Powershell Converting from Filetime

If you have ever worked with Powershell you send up running into DateTime stamps that are stored in FileTime instead of DateTime.

You can easily convert these to a date time object with the DateTime type accelerator.

PS C:\> [datetime]::FromFileTime(129948127853609000)
Monday, October 15, 2012 3:13:05 PM …
more ...

Spanning Tree : Root Bridge Election Process

STPs root bridge election is something that I have to look up every time I need to look up every time that I need to work with it. So here are some quick tips for working with root Bridge election. This will show examples from Cisco switches but the concepts …

more ...

Final parts – IPsec part 4

  • In part 1 I laid out the general configuration that I will be disusing through this series of posts.
  • In Part 2 I discussed ISAKMP polices.
  • Part 3 I discussed Transform-sets
  • Part 3 I will wrap it up and go over the last parts.

Pre-shared key

As we are using …

more ...

Transform-set – IPsec part 3

  • In part 1 I laid out the general configuration that I will be disusing through this series of posts. Part 1
  • In Part 2 I discussed ISAKMP polices.
  • Part 3 will be a shorter one about Transform-sets

Transform-set

Transform-sets are the ciphers that will be used in the actual Data …

more ...

ISAKMP Policy – IPSEC Part 2

  • In part 1 I laid out the general configuration that I will be disusing through this series of posts.
  • In Part 2 I will be discussing ISAKMP polices.

ISAKMP Policy

crypto isakmp policy 10
     hash md5
     authentication pre-share

Internet Security Association and key management Protocol (that’s a mouth full …

more ...

TarSnap – Online backups for the truly paranoid

I recently set up a backup solution for my Linux servers and I ended up going with Tarsnap for the cloud storage. I did this for a couple of reasons. The backup tool was built in the Unix fashion and does only the bare minimum of backup tasks, but it …

more ...

IPsec part 1

I have started learning about IPsec and related technologies.

But this is a very large subject that I will go going quite in-depth with so I will be doing this as a multi-part post over a couple of weeks.

Setup

To get started I followed a pretty good Cisco guide …

more ...


i