How to Install and Configure Windows, VMware, Virtualization and Cisco on
Author: Bob Lin
Bob Lin, Chicagotech-MVP, MCSE & CNE
Data recovery, Windows OS Recovery, Networking, and Computer Troubleshooting on
http://www.ChicagoTech.net
How to Install and Configure Windows, VMware, Virtualization and Cisco on
http://www.HowToNetworking.com
Log in to your device using a local administrator account.
Establish the VPN.
Join Windows to the Active Directory domain.
Reboot your computer and log in with a local administrator account.
Connect to VPN and switch/logon domain user account.
Sign in under your domain user account.
Note: Some VPN like GloablProtect will be disconnected when switching a user. You may have two options. 1) Lock instead of switch. 2) Cache the domain account, for example opening an application like PanGPA.exe > shift+right clicked > Run as different user.
To check the configuration history on a Palo Alto firewall, follow these steps:
Log in to the firewall’s web interface using an administrator account.
Click on the “Device” tab in the top menu bar, and then click on “Config Audit” in the left-hand menu.
Choosing 2 configurations (Local Running config and 35 Committed on 2023/03/14 in our example) to compare and click on Go.
Double pane window appears.
5. Configuration differences are clearly highlighted by different colors for review, letting the administrator view changes in the present and past configurations. It lists what admin made the change, along with what time it was performed.
Note: in our example, we configure to allow accessing dropboc.com by going to OBJECTS>Custom Objects>URL Category. Add dropbox.com to Allow Websites.
CLI
3. From the CLI, To see the changes between the running configuration and candidate configuration, you can run the following command to see what is different from the running config to the candite config.
Situation: The client has FatPipe connecting to 3 IPSs. They would like to know how to configure FatPipe to use WAN 3 as primary gateway.
To force the use of a FatPipe WAN 3, you can follow these steps:
Configure your network devices to use the FatPipe WAN 3 as the primary gateway.
Ensure that your network devices are configured to use the FatPipe WAN 3 as the default route for all traffic.
Configure your network devices to prioritize traffic over the FatPipe WAN 3. This can typically be done using Quality of Service (QoS) settings.
Monitor your network traffic to ensure that all traffic is being routed over the FatPipe WAN 3. You can use network monitoring tools to do this.
To configure a FatPipe WAN 3 as the primary gateway, you can follow these steps:
Connect the FatPipe WAN 3 to your network. This typically involves connecting one of the WAN ports on the FatPipe WAN 3 to your router or modem.
Log in to the FatPipe WAN 3 management interface. This can typically be done by opening a web browser and entering the IP address of the FatPipe WAN 3 into the address bar.
Navigate to the “Gateway” or “Routing” section of the management interface. This will allow you to configure the FatPipe WAN 3 as the primary gateway for your network.
Configure the WAN ports on the FatPipe WAN 3. You will need to configure the WAN ports on the FatPipe WAN 3 to match the settings of your ISP. This typically involves setting the IP address, subnet mask, default gateway, and DNS server settings.
Configure the LAN ports on the FatPipe WAN 3. You will also need to configure the LAN ports on the FatPipe WAN 3 to match the settings of your local network. This typically involves setting the IP address, subnet mask, and DHCP server settings.
Test the configuration. Once you have configured the FatPipe WAN 3 as the primary gateway, you should test the configuration to ensure that it is working correctly. This typically involves checking that you can access the internet and that traffic is being routed through the FatPipe WAN 3.
To add a user to Azure administrators, you need to have the appropriate permissions to manage Azure resources. Here are the steps to add a user to Azure administrators:
Log in to the Azure portal using your credentials.
Click on “Azure Active Directory” from the left-hand menu.
Select “Users” from the options listed.
Choose the user that you want to add as an administrator.
Click on “Assigned Role” from the user’s details page.
Click on “Add role” button on the Directory role page.
Select the role you want to assign to the user. For example, you can select “Global Administrator” to give the user full administrative access to the Azure subscription.
Click on “Save” to add the user to the selected role.
After completing these steps, the user will be added to the Azure administrators with the assigned role, and they will have access to the Azure resources based on their role permissions.
To use the Office 365 self-service reset password feature, you need to follow these steps:
Go to the Office 365 login page and click on the “Can’t access your account?” link.
2. Select the “Work or school account” option.
3. Enter your username (email address) in the appropriate field. Enter the characters you see on the screen in the verification field and click Next.
4. Choose the verification method you want to use to confirm your identity (such as email or text message) and follow the prompts to complete the verification process.
5. Once your identity is verified, you will be asked to create a new password.
6. Follow the password guidelines to create a strong password and confirm it.
Click “Finish” to complete the password reset process.
Once you have reset your password, you can use it to log in to your Office 365 account.
Enabling self-service in Office 365 can be done through the following steps:
Sign in to the Azure AD portal using your administrator credentials.
Go to the Azure Active Directory
3. Click on Users.
4. Click on Password reset.
5. On the Properties page, you may choose Selected and select a specific security group or choose All option to enable SSPR for all users. Click Save to save the SSPR setup.
6. In the end, you’ll see the following confirmation, confirming the password reset policy is saved.
7. Configure Authentication Methods
Click Authentication methods.
Next, choose the Number of methods required to reset a password. This means when a user attempts to reset a password; the user must pass 1 or 2 authentication methods. The default is 1, and we’ll leave it as it is.
Select the authentication Methods available to users. The default methods are Email and Mobile phone (SMS only). Note. Mobile app notification is only available as a second authentication method. In this example, let’s choose Mobile app code, Email, and Mobile phone (SMS only). Lastly, click Save.
8. Configure SSPR Registration
Click Registration and choose whether to require users to register their SSPR information. The default selection is Yes, which means that after you enable SSPR, the users will be required to register their authentication methods when they log in.
The Number of days before users are asked to re-confirm their authentication information value specifies the cadence when they must re-confirm their SSPR authentication methods. The default is 180 days. You may choose to adjust this value or leave it.
9. Enable SSPR Notifications
On the Notifications page, choose whether users get email notifications when their password is reset. The default option is Yes.
Choose whether to notify admins about other admins resetting their own passwords. The default option is No.
10. Customize Helpdesk Contact
On the Customization page, you can customize the Helpdesk contact information that users will see in the SSPR.
Click Yes and enter the helpdesk email or webpage URL and click Save.
11. Configure account permissions for Azure AD Connect
In your on-premises AD DS environment, open Active Directory Users and Computers with an account that has the appropriate domain administrator permissions.
From the View menu, make sure that Advanced features are turned on.
In the left panel, right-select the object that represents the root of the domain and select Properties > Security > Advanced.
From the Permissions tab, select Edit
and make sure you have Reset password.
If not, please click Add to add reset password.
Under Properties, select the boxes for the following options. Scroll through the list to find these options, which may already be set by default:
Write lockoutTime
Write pwdLastSet
Password policies in the on-premises AD DS environment may prevent password resets from being correctly processed. For password writeback to work most efficiently, the group policy for Minimum password age must be set to 0. This setting can be found under Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies within gpmc.msc.
If you update the group policy, wait for the updated policy to replicate, or use the gpupdate /force command.
Enable Password Writeback Azure AD Connect
Note. This section requires that Azure AD Connect is already installed and configured in your on-premises AD and Azure AD. If you haven’t done so, visit How to Install Azure AD Connect and Configure It.
Sign in to your Azure AD Connect server and start the Azure AD Connect configuration wizard.
On the Welcome page, select Configure.
On the Additional tasks page, select Customize synchronization options, and then select Next.
On the Connect to Azure AD page, enter a global administrator credential for your Azure tenant, and then select Next.
On the Connect directories and Domain/OU filtering pages, select Next.
On the Optional features page, select the box next to Password writeback and
select Next.
On the Directory extensions page, select Next.
On the Ready to configure page, select Configure and wait for the process to finish.
When you see the configuration finish, select Exit.
Conclusion
You can significantly improve the user experience when you enable self service password reset in your organization. Users can reset their own passwords as long as your organization has the license that allows this feature.
Moreover, users may not need to connect to the corporate network (direct, VPN, etc.) to reset their passwords in the Active Directory. Instead, they can perform the password reset in their Office 365 accounts, and the password will sync back to Active Directory.
“Fetch” a Duo Push request: If you expected to receive an authentication request and one hasn’t shown up in Duo Mobile, try leaving and returning to the app, as this can “fetch” the notification. Closing or force quitting the app and reopening it will also fetch the notification. You may also try swiping down from the top of the screen to check the notification center to see if the push was delivered silently due to skipping notification permissions when you set up the app.
Check your connection: Further, you should verify that you are connected to a reliable WiFi or cellular connection, as a weak connection can delay a push or can cause you to not receive a push. Note that personal hotspots use a cellular connection. On iOS devices, notifications are sent from the Apple Push Notification service (APNs) to the registered device over mobile data or WiFi networks and are not associated with the phone number of the device.
Also, if you are accessing an application you haven’t used in a while, try opening the Duo Mobile app and then send another push request.
If you see a push after leaving and returning to the app:
If you are able to fetch an authentication successfully but still don’t receive push notifications, or if you see a message in Duo Mobile that says “Please open Duo Mobile and check for Duo Push requests manually”, here are the likely potential reasons for the issue:
1. Notifications not enabled If you can approve a request by manually leaving and returning to the app and tapping the Approve button in the Duo Mobile app, but no push notifications are received, it is most likely because you selected not to receive notifications when installing the application. The following process will also resolve a bug in iOS 10 that may require push notifications to be toggled off and back on for applications.
The first time a push-enabled app registers for push notifications, iOS asks if you want to receive notifications for that app. Once you select an option, the option is not presented again unless the device is restored or the app has been uninstalled for at least a day.
To check if push notifications are enabled for Duo Mobile and re-enable them if needed, follow these steps:
On the iPhone, open Settings.
Scroll down and select Duo Mobile.
Select Notifications.
If the “Allow Notifications” option is already selected, deselect it and select it again. If it was not yet selected, select it. Verify that all other notification options are configured how you want them.
Fully close Duo Mobile by either swiping up on the screen or double-tapping the home button and then swiping up on the screen depending on your device model.
Open Duo Mobile again.
2. Issues with Apple Push Notification Service (APNs) Another reason push notifications may not be working is due to an issue connecting to Apple Push Notification Service (APNs). In their support articles Use notifications on your iPhone, iPad, and iPod touch and If your Apple devices aren’t getting Apple push notifications, Apple suggests disabling cellular data and testing pushes. This would help narrow down whether the carrier is having an issue with the APNs and finding the phone.
A weak connection can result in a delayed push, or not receiving a push at all.
You can force WiFi to test whether the issue is related to cellular data: Navigate to Settings > Cellular > Cellular Data Off, then connect to WiFi and attempt another authentication. Note: Personal HotSpots use cellular data.
You can force cellular to test whether the issue is related to your WiFi connection. Navigate to Settings > Wi-Fi and disable your WiFi connection. Navigate to Settings > Cellular to enable cellular data, then attempt another authentication.
Your wireless network must also allow the following ports for proper communication with Apple’s servers:
TCP port 5223 (used by devices to communicate to the APNs servers)
TCP port 2195 (used to send notifications to the APNs)
TCP port 2196 (used by the APNs feedback service)
TCP port 2197 (used to send notifications to the APNs)
TCP port 443 (used as a fallback on Wi-fi only, when devices are unable to communicate to APNs on port 5223)
3. Issues caused by Wi-Fi Assist and VPN usage The Wi-Fi Assist feature, which is enabled by default and will automatically switch to cellular data when you have a poor Wi-Fi connection, can cause Duo Push issues if you are using a VPN on your iOS device. If you use a VPN on your device and get connection errors from Duo Mobile, you can disable Wi-Fi assist by doing the following:
Navigate to Settings > Cellular or Settings > Mobile Data. Then scroll down and tap the slider for Wi-Fi Assist.
If you don’t see a push after leaving and returning to the app:
This occurs because something has happened on the device that has caused the Duo account to be unlinked from our servers.
Make sure the system time is set automatically and that the timezone is correct on the phone via Settings > General > Date & Time.
If the previous suggestion didn’t appear to help, next we recommend reactivating the affected Duo Mobile account. Here’s how to do that:
Other installed applications on iOS: We’ve received reports from customers that when PIA-VPN is installed on an iOS device, the device is unable to receive push notifications over WiFi. If you have PIA-VPN installed and need to use Push for authentications over WiFi, F-Secure Freedome is an alternative that has been confirmed to work with Push notifications regardless of cellular network settings.
Additional Troubleshooting If none of the above steps resolve your issue, and you receive an error message, please include all of the following information in an email to support@duosecurity.com:
The error message text.
A description of what happened right before the message appeared.
Debug information available via this process:
Open Duo Mobile.
Selectthe Menu button in the top left.
Select Settings.
Select Share Debug Info.
Select Copy.
Paste the copied text in the email.
Duo Push & Third-Party Accounts: Please note that Duo Push is not supported for third-party accounts (e.g. Amazon, Instagram, Facebook, Slack, Dropbox, etc.). Third-party accounts require the use of Duo Mobile passcodes as a second factor when logging in. Learn more about third-party accounts in our end-user guide and in this Knowledge Base article.
If your Duo account is locked, you can try the following steps to unlock it:
Go to the Duo login page and enter your username and password as usual.
If your account is locked, you should see a message that says “Your account is locked. Please contact your administrator.”
Contact your Duo administrator and ask them to unlock your account. They can do this by logging into their Duo dashboard, navigating to the “Users” section, and selecting your account. From there, they can click on the “Actions” dropdown menu and choose “Unlock user.”
Once your account is unlocked, you should be able to log in to Duo again as usual.
If you are the Duo administrator and your own account is locked, you can follow the same steps above, but instead of contacting another administrator, you can use another account with administrative privileges to unlock your account. If you do not have another administrative account, you can contact Duo customer support for assistance.
Adjusting garage door safety sensors involves a few simple steps:
Identify the sensors: Look for the two sensors that are located on either side of the garage door, usually near the bottom of the track. One sensor will have a green light, and the other will have a red light.
Check alignment: Ensure that the sensors are aligned properly by checking that the lights are solid and not blinking. If the lights are blinking, it means that the sensors are not aligned correctly.
Adjust the sensors: Loosen the screws that hold the sensor in place, then gently move the sensor until it’s aligned with the other sensor. Tighten the screws back up once the sensor is in the correct position.
Test the sensors: Close the garage door and check that it stops and reverses when an object is placed in the path of the door. If the door doesn’t reverse, repeat the alignment process until the sensors are properly aligned.
Clean the sensors: Dirt and debris can interfere with the operation of the sensors. Use a clean cloth to wipe the sensors clean and remove any dirt or debris that may be blocking the sensors.
Check the wiring: Make sure the wiring between the sensors and the garage door opener is secure and in good condition. Damaged wiring can cause the sensors to malfunction.
By following these steps, you can adjust the garage door safety sensors and ensure that they’re properly aligned for safe and reliable operation. If you’re not comfortable making these adjustments yourself, it’s always best to contact a professional garage door technician for assistance.