Thursday 16 October 2014

RADIUS Server Configure in Server 2012


How to setup Radius for authentication with for example a Cisco VPN Connection.
When opening the Dashboard after logon with the administrator user you have to choose Add roles and features
Choose Role-Based or feature-based installation and click on next
Select the server which get the new feature and click on next
Select network Policy and Access Services add the features
Click on Next
Do NOT change any settings and click on Next
Click on Next
Select Network Policy Server and click on Next
Select Restart if needed ( only when it’s possible to restart ) and click on Install
You can close this window but you can watch it finishing.
Select Tools > Network Policy Server
A new window wil open
Click right on NPS (Local) and select Register server in Active Directory
Click on OK to continue
Click on OK
Click on Radius Clients and Servers > Radius Clients (right click) > New
Add a device with a shared key to connect. And Click on OK
Create a new group in the Active Directory (call it for example VPN)
Create a new Network Policy
Click on Policies > Network Policies (right click) > New
Name the Policy simple and click on Next
Add a new Condition > Select Windows Groups > click on Add
Select the Windows group or groups and click on OK
Click on Next
Select Access Granted and click on Next
Select all options except the last one and click on Next
You get a message if you want to read it click on yes if not click on no.
Keep the settings to default and click on Next
Keep the settings to default and click on Next
Click on finish

Thursday 25 September 2014

Windows Run Commands

These run commands are available for almost all settings available in Windows control panel.
Note : most part of these commands are compatible with Windows 7, Vista e Windows XP.
As someone has kindly reported, some commands are not compatible between different versions. Please check the commands and use the correct ones for your version of the operating system. Technical feedbacks are always appreciated, please send me any info that it helpful to improve this article.
FunzioniComandi
Open Documents Folderdocuments
Open Videos foldervideos
Open Downloads Folderdownloads
Open Favorites Folderfavorites
Open Recent Folderrecent
Open Recent Folderlogoff
Open Pictures Folderpictures
Windows Sideshowcontrol.exe /name Microsoft.WindowsSideshow
Windows CardSpacecontrol.exe /name Microsoft.cardspace
Windows Anytime UpgradeWindowsAnytimeUpgradeui
Taskbar and Start Menucontrol.exe /name Microsoft.TaskbarandStartMenu
Troubleshootingcontrol.exe /name Microsoft.Troubleshooting
User Accountscontrol.exe /name Microsoft.UserAccounts
Adding a new Devicedevicepairingwizard
Add Hardware Wizardhdwwiz
Advanced User Accountsnetplwiz
Advanced User Accountsazman.msc
Backup and Restoresdclt
Bluetooth File Transferfsquirt
Calculatorcalc
Certificatescertmgr.msc
Change Computer Performance Settingssystempropertiesperformance
Change Data Execution Prevention Settingssystempropertiesdataexecutionprevention
Change Data Execution Prevention Settingsprintui
Character Mapcharmap
ClearType Tunercttune
Color Managementcolorcpl
Command Promptcmd
Component Servicescomexp.msc
Component Servicesdcomcnfg
Computer Managementcompmgmt.msc
Computer Managementcompmgmtlauncher
Connessione proiettore di retenetproj
Connect to a Projectordisplayswitch
Control Panelcontrol
Create A Shared Folder Wizardshrpubw
Create a System Repair Discrecdisc
Credential Backup and Restore Wizardcredwiz
Data Execution Preventionsystempropertiesdataexecutionprevention
Date and Timetimedate.cpl
Default Locationlocationnotifications
Device Managerdevmgmt.msc
Device Managerhdwwiz.cpl
Device Pairing Wizarddevicepairingwizard
Diagnostics Troubleshooting Wizardmsdt
Digitizer Calibration Tooltabcal
DirectX Diagnostic Tooldxdiag
Disk Cleanupcleanmgr
Disk Defragmenterdfrgui
Disk Managementdiskmgmt.msc
Displaydpiscaling
Display Color Calibrationdccw
Display Switchdisplayswitch
DPAPI Key Migration Wizarddpapimig
Driver Verifier Managerverifier
Ease of Access Centerutilman
EFS Wizardrekeywiz
Event Viewereventvwr.msc
Fax Cover Page Editorfxscover
File Signature Verificationsigverif
Font Viewerfontview
Game Controllersjoy.cpl
Getting Startedgettingstarted
IExpress Wizardiexpress
Getting Startedirprops.cpl
Install or Uninstall Display Languageslusrmgr
Internet Exploreriexplore
Internet Optionsinetcpl.cpl
iSCSI Initiator Configuration Tooliscsicpl
Language Pack Installerlpksetup
Local Group Policy Editorgpedit.msc
Local Security Policysecpol.msc
Local Users and Groupslusrmgr.msc
Location Activitylocationnotifications
Magnifiermagnify
Malicious Software Removal Toolmrt
Manage Your File Encryption Certificatesrekeywiz
Math Input Panelmip
Microsoft Management Consolemmc
Microsoft Support Diagnostic Toolmsdt
Mousemain.cpl
NAP Client Configurationnapclcfg.msc
Narratornarrator
Network Connectionsncpa.cpl
New Scan Wizardwiaacmgr
Notepadnotepad
ODBC Data Source Administratorodbcad32
ODBC Driver Configurationodbcconf
On-Screen Keyboardosk
Paintmspaint
Pen and Touchtabletpc.cpl
People Near Mecollab.cpl
Performance Monitorperfmon.msc
Performance Optionssystempropertiesperformance
Phone and Modemtelephon.cpl
Phone Dialerdialer
Power Optionspowercfg.cpl
Presentation Settingspresentationsettings
Print Managementprintmanagement.msc
Printer Migrationprintbrmui
Printer User Interfaceprintui
Private Character Editoreudcedit
Problem Steps Recorderpsr
Programs and Featuresappwiz.cpl
Protected Content Migrationdpapimig
Region and Languageintl.cpl
Registry Editorregedit
Registry Editor 32regedt32
Remote Access Phonebookrasphone
Remote Desktop Connectionmstsc
Resource Monitorresmon
Resultant Set of Policyrsop.msc
SAM Lock Toolsyskey
Screen Resolutiondesk.cpl
Securing the Windows Account Databasesyskey
Servicesservices.msc
Set Program Access and Computer Defaultscomputerdefaults
Share Creation Wizardshrpubw
Shared Foldersfsmgmt.msc
Snipping Toolsnippingtool
Soundmmsys.cpl
Sound recordersoundrecorder
SQL Server Client Network Utilitycliconfg
Sticky Notesstikynot
Stored User Names and Passwordscredwiz
Sync Centermobsync
System Configurationmsconfig
System Configuration Editorsysedit
System Informationmsinfo32
System Propertiessysdm.cpl
System Properties (Advanced Tab)systempropertiesadvanced
System Properties (Computer Name Tab)systempropertiescomputername
System Properties (Hardware Tab)systempropertieshardware
System Properties (Remote Tab)systempropertiesremote
System Properties (System Protection Tab)systempropertiesprotection
System Restorerstrui
Task Managertaskmgr
Task Schedulertaskschd.msc
Trusted Platform Module (TPM) Managementtpm.msc
User Account Control Settingsuseraccountcontrolsettings
Utility Managerutilman
Version Reporter Appletwinver
Volume Mixersndvol
Windows Action Centerwscui.cpl
Windows Activation Clientslui
Windows Anytime Upgrade Resultswindowsanytimeupgraderesults
Windows CardSpaceinfocardcpl.cpl
Windows Disc Image Burning Toolisoburn
Windows DVD Makerdvdmaker
Windows Easy Transfermigwiz
Windows Explorerexplorer
Windows Fax and Scanwfs
Windows Featuresoptionalfeatures
Windows Firewallfirewall.cpl
Windows Firewall with Advanced Securitywf.msc
Windows Journaljournal
Windows Media Playerwmplayer
Windows Memory Diagnostic Schedulermdsched
Windows Mobility Centermblctr
Windows Picture Acquisition Wizardwiaacmgr
Windows PowerShellpowershell
Windows PowerShell ISEpowershell_ise
Windows Remote Assistancemsra
Windows Repair Discrecdisc
Windows Script Hostwscript
Windows Updatewuapp
Windows Update Standalone Installerwusa
Versione Windowswinver
WMI Managementwmimgmt.msc
WordPadwrite
XPS Viewerxpsrchvw

Thursday 18 September 2014

Six Sigma Training - Green Belt Intro

Six Sigma Training - Green Belt 

What is Six Sigma?

Six Sigma is a business management strategy, originally developed by Motorola, that today enjoys widespread application in many sectors of industry. Six Sigma seeks to identify and remove the causes of defects and errors in manufacturing and business processes.It uses a set of quality management methods, including statistical methods, and creates a special infrastructure of people within the organization ("Green Belts, Black Belts" etc.) who are experts in these methods. Each Six Sigma project carried out within an organization follows a defined sequence of steps and has quantified financial targets (cost reduction or profit increase).

Six Sigma Green Belt

The Green belt course provides a detailed understanding of six sigma's DMAIC Methodology. DMAIC is the acronym for the five phased approach used ie. Define, Measure, Analyse, Improve, Control. This program combines concepts, assignments, tips, case studies, and exams.

Table of Content

  1. Six Sigma Quality Overview:
  • Origin of Six Sigma
  • What is Six Sigma
  • Impact of Six Sigma
  • Six Sigma Problem Solving Approach
  • Standard Deviation
  1. Measure Phase:
  • YX Diagram
  • FMEA
  • MSA Capability Analysis
  • Data Collection Plan
  • Process Sigma Calculation
  • Gauge R & R Analysis
  • Indices of Process Capability
  1. Improve Phase:
  • Regression
  • Correlation
  • Correlation Coefficient And Slope
  • DOE Planning
 
  1. Define Phase:
  • Project Charter
  • RACI Model
  • VOC
  • CTQ Elements
  • Process Mapping
  • Project Metrics
  • Project Plan
  1. Analyze Phase:
  • Histograms
  • Hypothesis Testing
  • Quartiles
  • Scatter Plots
  • ANOVA
  • Two Sample T-Test
  1. Control Phase:
  • Control Plan
  • Statistical Process Control
  • Control Charts
  • X bar R Charts
  • P charts

Wednesday 18 June 2014

Deployment Requirements

Parallels Cloud Server

Parallels Cloud Server runs on a wide variety of hardware and software configurations.
Basic system requirements include:
Server Hardware
  • Platform: x86-64 platform with Intel VT-x or AMD-V hardware virtualization support
  • CPU: 1.5 GHz or higher processor (a 64-bit processor is required for launching 64-bit guest operating systems)
  • Memory: 2 GB of RAM minimum (4 GB or more recommended)
  • Hard disk: Allocate 10-12 GB of disk space to the root (/) partition.
  • Hard disk: Format the (/vz) partition as ext4 and allocate all the remaining free space to it (no less than 30GB)
  • Network: 1 or more Ethernet cards (1 Gbit or faster)
The exact server configuration depends on how many containers or VMs you deploy on the server and the load they generate.
Software Requirements
Parallels Cloud Server is installed directly on the server hardware and does not require any additional operating system software.
Supported Virtual OS Distributions for Parallels Containers
Parallels Containers allows you to create containers running these Linux distributions:
  • Red Hat Enterprise Linux 6.x (x86, x64)
  • Red Hat Enterprise Linux 5.x (x86, x64)
  • Fedora 17 (x86, x64)
  • Fedora 16 (x86, x64)
  • Fedora 18, 19, 20 (x86_64, i386)
  • CentOS 6.x (x86, x64)
  • CentOS 5.x (x86, x64)
  • SUSE Linux Enterprise Server 11 with Service Pack 2 (x86, x64)
  • openSUSE 12.1 (x86, x64)
  • Debian GNU/Linux 6.0 (x86, x64)
  • Ubuntu 12.10 (x86, x64)
  • Ubuntu 12.04 (x86, x64)
  • Ubuntu 11.10 (x86, x64)
  • Ubuntu 10.04 (x86, x64)
  • Ubuntu 13.10 (x86_64, i386)
  • Debian 7.0 (x86_64, i386)
Parallels Hypervisor allows you to create virtual machines (VMs) running the following:
Windows:
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2008 R2 with Service Pack 1 (x64)
  • Windows Server 2003 R2 with Service Pack 2 (x86, x64)
Linux:
  • Red Hat Enterprise Linux 6.x (x86, x64)
  • Red Hat Enterprise Linux 5.x (x86, x64)
  • Fedora 17 (x86, x64)
  • Fedora 16 (x86, x64)
  • CentOS 6.x (x86, x64)
  • CentOS 5.x (x86, x64)
  • SUSE Linux Enterprise Server 10 (x86, x64)
  • openSUSE 12.2 (x86, x64)
  • Debian GNU/Linux 6.0 (x86, x64)
  • Ubuntu 12.10 (x86, x64)
  • Ubuntu 11.10 (x86, x64)
  • Ubuntu Server 12.04 (x86, x64)
  • Ubuntu Server 10.04 (x86, x64)
  • Ubuntu 13.10 x86_64, i386
  • Fedora 18, 19, 20 x86_64, i386
  • Debian 7.0 x86_64, i386
FreeBSD:
  • FreeBSD 9 (x86, x64)
  • FreeBSD 10 x86_64, i386

Parallels Cloud Storage

Meta Data Server
  • Software: Parallels Cloud Server 6.0
  • RAM: 2 GB minimum
  • Disk space: 10 GB minimum
  • Network: 1 or more Ethernet adapters (1 Gbit or faster)
  • Network: a static IP address for each Ethernet adapter
Chunk Server
  • Software: Parallels Cloud Server 6.0
  • RAM: 1 GB minimum
  • Disk space: any amount of available local disk space can be exported
  • Network: 1 or more Ethernet adapters (1 Gbit or faster)
  • Network: Static IP address for each Ethernet adapter

Red Hat Network Requirements

Red Hat Network Requirements

Supported Platforms and System Requirements

HardwareArchitectureOperating System
IBM System zs390 and s390xRed Hat Enterprise Linux 4, 5
Intel / AMDi386 and x86_64Red Hat Enterprise Linux 4, 5
Red Hat Enterprise Linux 5 supported hardwareRed Hat Enterprise Linux 5 HypervisorRed Hat Enterprise Linux 4 as virtual guest, 5
Satellite Requirement: (embedded database)
Pentium IV processor, 2.4 Ghz, 512K cache
Pentium IV processor, 2.4 Ghz dual processor, 512K cache recommended
System z IFL processor
Disk space and storage: 
3 GB storage for base installation of Red Hat Enterprise Linux AS
6 GB storage per channel in /var/satellite directory
12 GB storage for database repository in /rhnsat partition
Separate partition for storing backups 
Memory: 2 GB (minimum), 4 GB (recommended)
Recommended configuration:
2+ IFLs on z9 or earlier, 1+ IFL on z10 or later
2 GB storage (memory)
512 MB swap on VDISK + 1 GB swap on ECKD DASD
1xMod9 ECKD DASD or >= 2 GB *multipathed* FCP SCSI LUN for OS install
z/VM 5.4 or later [1]
VSWITCH or Hipersocket LAN for high speed connections to guests

[1] z/VM required for kickstart/provisioning of guests

Supported Managed Nodes

Operating System Version Architecture
Red Hat Enterprise Linux 2.1, 3, 4, 5, and 6 i386, x86_64, IBM Power, IBM System z (Mainframe)
Sun Solaris 8, 9, and 10 64-bit Sparc (sun4u & sun4m)
Sun Solaris 9, and 10 32-bit i386
* Note: Solaris sun4v client hardware support is planned for the next Satellite release.

Saturday 3 May 2014

AAA Authentication Authorization and Accounting

AAA Authentication Authorization and Accounting

In CCNA Routing and Switching level, we studied local authentication by setting passwords to move to privilege mode (enable password) or creating local user database for authenticating users. In Cisco network infrastructure device running IOS, by default authentication is by a line password (line console or line vty) and authorization by a level 15 enable password. Both line authentication and enable level 15 authorization are good if you have only a very small number of network infrastructure equipments.
Your network is growing and if you are are managing a large network environment, authentication using local device user database and authorization using enable level 15 authorization is not a scalable solution. This is the time to think about Cisco AAA solutions.
AAA stands for Authentication, Authorization and Accounting.
Authentication: Authentication is the process in which the identify of a device or a user is verified when they attempt to access a network resource and confirm that it is the real entity which it claims. Authentication typically uses userid/password combination for authenticating users. Other types of authentication are also available like biometric authentication or authentication using digital certificates. Authentication provides the answer for the questions "Who are you?" or "Are you the same person you are claiming?"
Authorization: Authorization is the process after authentication used for determining whether a user who try to access any device, data or execute a command has the permission to access that device, data or execute a command. Authorization provides the answer for the question "Are you allowed to do this task?"
Accounting: Accounting can be defined as tracking of data, access, usage, events or network resources. Accounting is logging, auditing, and monitoring of data, access, usage, events of network resources. Accounting provides the answer for the questions "What did you do?", "Who is responsible for this?"

AAA RADIUS and TACACS+, Difference between RADIUS and TACACS+


RADIUS (Remote Authentication Dial-in User Service) is all-vendor supported AAA protocol. RADIUS was first developed by Livingston Enterprises Inc in 1991, which later merged with Alcatel Lucent. RADIUS later became an Internet Engineering Task Force (IETF) standard. RADIUS uses UDP ports 1812 Authentication and 1813 for Accounting.
TACACS+ is another AAA protocol. TACACS+ was developed by Cisco from TACACS (developed in 1984 for the U.S Department of Defense). TACACS+ uses TCP and provides separate authentication, authorization and accountingservices. Port used by TACACS+ is TCP 49.
The RADIUS or TACACS+ protocol can provide a central authentication protocol to authenticate users, routers, switches or servers. If your network is growing and if you are are managing a large network environment, authentication using local device user database and authorization using privilege level 15 authorization is not a scalable solution. AAA (Authentication Authorization Accounting) protocol like RADIUS or TACACS+ can provide a better centralized authentication solution in a big enterprise network.
The main differences between RADIUS and TACACS+ can be tabulated as below.
RADIUSTACACS+
RADIUS uses UDP as Transport Layer ProtocolTACACS+ uses TCP as Transport Layer Protocol
RADIUS uses UDP ports 1812 and 1813TACACS+ uses TCP port 49
RADIUS encrypts passwords onlyTACACS+ encrypts the entire communication
RADIUS combines authentication and AuthorizationTACACS+ treats Authentication, Authorization, and Accountability differently
RADIUS is an open protocol supported by multiple vendorsTACACS+ is Cisco proprietary protocol
RADIUS is a light-weight protocol consuming less resourcesTACACS+ is a heavy-weight protocol consuming more resources

RADIUS Server Configure in Server 2012

Home About Me Apple Networking Software Storage Downloads Links Contact How to setup Radius for authentication wi...