Backup

Restoring from an alternate library in CommVault

Posted on

CommVault is a great product that allows you to perform backups at a primary location, and then send a deduplicated copy to a DR location for recovery. But what if you need to perform a test recovery at the DR location, how do you tell the restore which library to restore from? Step 1: Identify […]

Uncategorized

Decrypting NT passwords

Posted on

If you have been in the tech realm for long, you realize there is a need to recover forgotten passwords. Normally this is difficult (as it should be), but I just found a shortcut.The website http://www.md5decrypter.co.uk/ntlm-decrypt.aspx, has an online database of NTLM hashes and their accompanying passwords. Once you have the hash (via pwdump or other […]

Uncategorized

Working with an Iomega StorCenter ix2-200

Posted on

I just got a 4 TB Iomega StorCenter ix2-200 for use with VMware. The idea is that we can send it to customer locations, copy backups/VMDKs on it, and then ship it back. Previously we had done this with USB drives, but connecting a USB drive to a server is often problematic. Basic setup for […]

VMware

Quick VMotion in VMware

Posted on

I ran into an issue today where I was unable to VMotion a VM due to host issues. While troubleshooting, I remembered how Microsoft first dealt with its inability to support VMotion – Quick VMotion.The idea is that instead of migrating the VM while online, pause the VM, then migrate it, then restart the VM […]

certification

VCP5 – Configure network security policies

Posted on

There are 3 basic network security policies: Promiscuous mode, MAC address changes, and Forged transmits. These policies allow for customization of the networking layer to allow network sniffing, clustering, and load-balancing Changing policies on a Distributed Switch Open vSphere client and select Networking Right-click the Port Group and select Edit Settings Under Policies | Security, […]

certification

VCP5 – Enable Lockdown Mode

Posted on

Lockdown mode blocks direct access to the ESXi host and forces all configuration to be done via the Virtual Center. This can be used to secure your VMware environment and ensure security protocols are followed. Enabling Lockdown Mode via DCUI Log onto the ESXi host console as root Select Configure Lockdown Mode Use the spacebar […]

certification

Enable/Configure/Disable services in the ESXi firewall

Posted on

Unlike prior versions of ESX, v5 uses an XML file to describe the firewall configurations. These files are stored in the /etc/vmware/firewall directory and are automatically loaded. Firewall rules should be installed as part of a VIB package.More information on creating rules: http://pubs.vmware.com/vsphere-50/index.jsp?topic=/com.vmware.vsphere.vcenterhost.doc_50/GUID-E1D90120-73EB-4B00-9F89-8650EBE911F7.html Once installed, the firewall rules and service is managed via the vSphere client. Open vSphere […]

certification

VCP5 – Describe how permissions are applied and inherited in vCenter Server

Posted on

Permissions in vSphere are applied on managed entities (datacenters, folders, VMs, etc…) Permissions are propagated from the managed entity to child identities. Permissions applied at the same level are summed to include both sets of permission.  Unlike other permission inheritance schemes (which sum permissions at different levels), permissions applied at lower levels over-ride inherited permissions.  Permissions applied […]