IT Questions and Answers :)

Monday, December 30, 2019

In Windows 10, what are Active Hours

In Windows 10, what are Active Hours

  • The number of hours Windows has been active.
  • Windows will not auto-update during this time.
  • Windows will not auto-reboot during this time.
  • PC will not hibernate during this time. 

In Windows 10, what are Active Hours


EXPLANATION

Active Hours is a new update-related feature of the upcoming Anniversary Update for Windows 10 that is already available in the latest Insider Build. The main idea behind the feature is to make operating system updates less annoying by preventing automatic restarts of the system during active hours
Share:

What Protocol Does the Open-Source VNC Remote Desktop Application Use?

What Protocol Does the Open-Source VNC Remote Desktop Application Use?

  • Remote Desktop Protocol (RDP)
  • Open Source Screen Share (OSSS)
  • Virtual Network Connect (VNC)
  • Remote Frame Buffer (RFB) 

EXPLANATION

RFB (“remote framebuffer”) is an open simple protocol for remote access to graphical user interfaces. Because it works at the framebuffer level it is applicable to all windowing systems and applications, including Microsoft Windows, macOS and the X Window System. RFB is the protocol used in Virtual Network Computing (VNC) and its derivatives.

SoftwareProtocolsFree for commercial use
TightVNCRFB (VNC)Yes
TimbuktuProprietaryYes
TurboVNCRFB (VNC)Yes
UltraVNCRFB (VNC)Yes



Share:

What command do you use if you have 2 stacked 48 port Enterasys/Extreme B5 switches and you wish to set port 41 on the second switch to vlan 4?

What command do you use if you have 2 stacked 48 port Enterasys/Extreme B5 switches and you wish to set port 41 on the second switch to vlan 4?

  • set port vlan ge.2.41 4
  • set port vlan ge.1.41 4
  • set vlan ge.2.41 4
  • set port vlan 4 ge.2.41 


EXPLANATION

When utilizing this command the structure is set up as {set port vlan} then the port(s) on the switch you wish to set, in this case switch 2 port 41 so ge.2.41 followed by the vlan you want to set the port to, in this case 4 (further commands can follow this if needed, but in this example it was not) For a more detailed look at the procedure you can go to https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-Configure-VLAN-on-EOS-Switches

How to Configure VLAN on EOS Switches

Information

TitleHow to Configure VLAN on EOS Switches
Objective
The following shows how to configure  VLANs and verify the configuration.   
Environment
  • SecureStack
  • K-Series
  • 7100-Series
  • S-Series
  • I - Series
Procedure
1.  Create the VLAN
Command:
set vlan create <vlan-id>
Example:
set vlan create 100

2.  Optionally name the VLAN 
Command:
set vlan name <vlan-id> <name>
Example:
set vlan name 100 vlan-blue

3.  Add ports to the VLAN Untagged
Set the Port VLAN ID (PVID) to egress the VLAN untagged to connect to devices that are not tagging (workstations, etc) 

Command:
set port vlan <port-string> <vlan-id> modify-egress

Example:
set port vlan ge.1.1 100 modify-egress
4.  Configure the port to egress tagged traffic  for devices that require tags/ Remove a tagged VLAN from a port.

Command:
set vlan egress vlan <vlan-id> <port-string> tagged

Example:
set vlan egress 100 ge.1.2 tagged

Command:
clear vlan egress vlan <vlan-id> <port-string> 

Example:
clear vlan egress 100 ge.1.2 

Tagged is the default, so the VLAN will be tagged on the port unless untagged is specified with "modify-egress."

Warning EOS allows multiple VLANs to be sent out the same port untagged which is not recommended because of the  potential to have traffic switched to the wrong VLAN on uplinks with multiple VLANs.
5.  Verifying VLAN Config
show VLAN information on a port

Show  vlan portinfo port ge.1.1
 Port           VLAN      Ingress   Egress
                          Filter     Vlan
-----------------------------------------------------------------
ge.1.1         1          N          untagged: 1 tagged: 2


6.  Type show vlan, to see information about VLANs with at least one active link; VLANs with no link will not display. 

C5(su)->show vlan static 
 VLAN: 1             NAME: DEFAULT VLAN
 VLAN Type: Default
 Egress Ports
ge.1.1, ge.1.46
 Forbidden Egress Ports
None.
 Untagged ports
ge.1.1, ge.1.46

7.  To see information about  all configured ports regardless if they have a link, add static to the end of the command.

C5(su)->show vlan static

 VLAN: 1             NAME: DEFAULT VLAN
 VLAN Type: Default
 Egress Ports
ge.1.1-48, tg.1.49-50, lag.0.1-6
 Forbidden Egress Ports
None.
 Untagged ports
ge.1.1-48, tg.1.49-50, lag.0.1-6

Share:

What kind of information about your e-mail environment is not stored in DNS?

What kind of information about your e-mail environment is not stored in DNS?

  • SPF record
  • Certificate expiration date
  • MX
  • DKIM selector 
What kind of information about your e-mail environment is not stored in DNS?

EXPLANATION

DNS servers create a DNS record to provide important information about a domain or hostname, particularly its current IP address. The most common DNS record types are:
  • Address Mapping record (A Record)—also known as a DNS host record, stores a hostname and its corresponding IPv4 address.
  • IP Version 6 Address record (AAAA Record)—stores a hostname and its corresponding IPv6 address.
  • Canonical Name record (CNAME Record)—can be used to alias a hostname to another hostname. When a DNS client requests a record that contains a CNAME, which points to another hostname, the DNS resolution process is repeated with the new hostname.
  • Mail exchanger record (MX Record)—specifies an SMTP email server for the domain, used to route outgoing emails to an email server.
  • Name Server records (NS Record)—specifies that a DNS Zone, such as “example.com” is delegated to a specific Authoritative Name Server, and provides the address of the name server.
  • Reverse-lookup Pointer records (PTR Record)—allows a DNS resolver to provide an IP address and receive a hostname (reverse DNS lookup).
  • Certificate record (CERT Record)—stores encryption certificates—PKIX, SPKI, PGP, and so on.
  • Service Location (SRV Record)—a service location record, like MX but for other communication protocols.
  • Text Record (TXT Record)—typically carries machine-readable data such as opportunistic encryption, sender policy framework, DKIM, DMARC, etc.
  • Start of Authority (SOA Record)—this record appears at the beginning of a DNS zone file, and indicates the Authoritative Name Server for the current DNS zone, contact details for the domain administrator, domain serial number, and information on how frequently DNS information for this zone should be refreshed.

 


Share:

What is the largest key length for the Blowfish symmetric-key block cipher?

What is the largest key length for the Blowfish symmetric-key block cipher?

  • 512 bits
  • 448 bits
  • 224 bits
  • 256 bits 
What is the largest key length for the Blowfish symmetric-key block cipher?

EXPLANATION

The maximum size of the key in blowfish algorithm is 56 bytes or 448 bits. Explanation: The size of the blocks of the plaintext is 64 bits each.
Share:

Popular Posts