Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
GnarlyCharlie4u
Sep 23, 2007

I have an unhealthy obsession with motorcycles.

Proof
Hooray Friday!

Network Eng is on vacation today after making some changes to the DHCP range on the VPN tunnel late last night.
I come in this morning and none of the phones work.
But they all have IP's.
Looks like there's no route from the network the phones are on, to the network the phone server is on.
tracert...
oh hey look at that they're not using the VPN
oh hey look at that the tunnel is using a subnet mask that doesn't include the new dhcp range
Well played network dude. Enjoy your vacation. :sun:

Adbot
ADBOT LOVES YOU

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

GnarlyCharlie4u posted:

Hooray Friday!

Network Eng is on vacation today after making some changes to the DHCP range on the VPN tunnel late last night.
I come in this morning and none of the phones work.
But they all have IP's.
Looks like there's no route from the network the phones are on, to the network the phone server is on.
tracert...
oh hey look at that they're not using the VPN
oh hey look at that the tunnel is using a subnet mask that doesn't include the new dhcp range
Well played network dude. Enjoy your vacation. :sun:

"I made huge changes overnight, barely documented, validated nothing and I'm turning my phone off for vacation as soon as I send this, have fun!"

Those are the best

GnarlyCharlie4u
Sep 23, 2007

I have an unhealthy obsession with motorcycles.

Proof

MF_James posted:

"I made huge changes overnight, barely documented, validated nothing and I'm turning my phone off for vacation as soon as I send this, have fun!"

Those are the best

"Gotta keep you on your toes"

Judge Schnoopy
Nov 2, 2005

dont even TRY it, pal

MF_James posted:

"I made huge changes overnight, barely documented, validated nothing and I'm turning my phone off for vacation as soon as I send this, have fun!"

Those are the best

We have a specific operating rule named after two engineers, the 'James Frank Rule', that urges people to not make changes before going on vacation. I think you can guess what those two engineers did to earn the title.

Everybody is constantly reminded of the rule if they plan on any time-off.

GnarlyCharlie4u
Sep 23, 2007

I have an unhealthy obsession with motorcycles.

Proof

Judge Schnoopy posted:

We have a specific operating rule named after two engineers, the 'James Frank Rule', that urges people to not make changes before going on vacation. I think you can guess what those two engineers did to earn the title.

Everybody is constantly reminded of the rule if they plan on any time-off.

To be fair to the Engineer in question... He was out sick, and came in to do whatever my boss BEGGED him to do before going on vacation.

wolrah
May 8, 2006
what?

GnarlyCharlie4u posted:

To be fair to the Engineer in question... He was out sick, and came in to do whatever my boss BEGGED him to do before going on vacation.

Still a dick move by the engineer as far as its impacts on you, but definitely a lot more justifiable as moderate malicious compliance against the boss in that case if he was brought in from at least mentally having already clocked out for vacation.

GreenBuckanneer
Sep 15, 2007

A ticket came in: Put McCain Tribute Video on the Intranet

:911:

Thanks Ants
May 21, 2004

#essereFerrari


Save it as a wmv

Weedle
May 31, 2006




.rm

GreenBuckanneer
Sep 15, 2007

I saw that and cringed but it's unsurprising coming from it being a military subcontractor.

spog
Aug 7, 2004

It's your own bloody fault.

GreenBuckanneer posted:

A ticket came in: Put McCain Tribute Video on the Intranet

:911:

did you say 'tribute.avi'?

kensei
Dec 27, 2007

He has come home, where he belongs. The Ancient Mariner returns to lead his first team to glory, forever and ever. Amen!


We're having a terrible time filling a Network Engineer 1 slot, the guy interviewed today was nice but no where near an entry network person. Ugh.

Portland Job market is on fire.

Oyster
Nov 11, 2005

I GOT FLAT FEET JUST LIKE MY HERO MEGAMAN
Total Clam

kensei posted:

We're having a terrible time filling a Network Engineer 1 slot, the guy interviewed today was nice but no where near an entry network person. Ugh.

Portland Job market is on fire.

Point me to the posting I have a CCENT aiming for the CCNA by the end of the month with very little practical experience.

22 Eargesplitten
Oct 10, 2010



I was going to post this in the Home Networking thread, but it's about an enterprise piece of gear so I think someone in here might be more likely to know.

I'm trying to set up an Aruba IAP-225 at home. I plug it into the POE switch on Ethernet 0, the power comes on green, the ethernet port light turns green. Then after a bit the 5ghz and 2.4ghz lights come on orange, and the power light turns orange too. Looking on my phone, I can't see the Instant SSID that should be coming up. I need to find my laptop in my moving boxes, but I should at least be able to see the SSID on my phone, right? Does the orange power mean that I need to be using both Ethernet 0 and Ethernet 1? I remember it powering on just fine when I reset the configuration, and I thought I only used one cable then. The POE switch is 80211.at compatible, so it should provide more than enough power from just one port.

Does anyone know what I could be doing wrong?

guppy
Sep 21, 2004

sting like a byob
I'm not familiar with Aruba products specifically but some Googling indicates that the orange power light means it's in PoE power-saving mode, which probably means it's not getting enough power from the switch. It doesn't look like that should prevent it from working or prevent you from seeing the SSID regardless of band, but if your switch should be supplying enough power and the AP isn't receiving it, perhaps there's something causing both problems? Offhand, some things you might want to check:

1. Are you plugging directly into the switch, or into a cable elsewhere in the house? If the latter, try plugging it directly into the switch port to rule out a cabling issue with the horizontal run, with a known-good patch cord.

2. Can you pull information from the switch's CLI on PoE budget, per-port and overall, to see if those numbers are what they should be? The problem could be the switch, or its PoE module, or a specific switch port.

3. Is this thing brand new? Have you tried resetting it to default? There's probably a hole for a paper clip or something to reset it, you would probably have to hold it in. You can probably console in to monitor the output, our APs (different vendor) let you know when you've held it long enough to reset it. (EDIT: I see now you've already done this.)

4. Not sure what kind of switch you're using, but one guy said on an Avaya switch an LLDP configuration was limiting the power available to each port: https://community.arubanetworks.com/t5/Wireless-Access/AP-225-in-Powersave-mode-performance/td-p/221221/page/3

quote:

I had similar issue using Avaya 4850 switches.

issue ended up being the LLDP command limiting power to individual ports.

this is the command from Avaya CLI that limited ports to 802.3af

no lldp tx-tlv port 1/ALL,2/ALL dot3 mdi-power-support

I've seen similar stuff on switches from other vendors.

5. Same thread mentions a PoE bug in an older version of the AP's firmware, no idea what version you're running.

guppy fucked around with this message at 18:50 on Sep 1, 2018

22 Eargesplitten
Oct 10, 2010



Okay. I haven't tried using a different cable yet, I need to figure out where the rest of them are. I've got poo poo all over the place since I moved. It could be it's not getting enough power.

I'm on an unmanaged POE switch, a TP-Link (I think) 5 port one. It's getting a light flashing saying it's getting POE (It's got one of those things where the link / activity for the port and the POE status are their own lights above each other), but it's orange. I should check and see if that's supposed to be green as well. I got this thing like a month or more ago and haven't finished setting it up after doing a factory reset on the Aruba. I got it for free from a coworker who got it for free when his old company decommissioned these. It's old-ish, but it's still getting security updates until 2021 or something like that so I'm not complaining.

I'll try different ports, and I'll check to see if the switch is on the surge protector or going straight into the wall socket. Hopefully being in the surge protector isn't a problem. The switch itself isn't particularly expensive, but considering how expensive the IAP it is powering is I would rather have some security there.

I'm plugging straight in. I need to pull the panel, but I'm pretty sure the jackasses that wired this place in 2012 didn't even remember to actually hook up the jacks in the living room. I think that the cables are probably run to the box but not even plugged in. This place is a mess, there's 12-13 cables and maybe 3 are labeled in smeared illegible sharpie.

Speaking of, anywhere to get a cheap network toner so I can figure out where everything goes?

Proteus Jones
Feb 28, 2013



22 Eargesplitten posted:

Okay. I haven't tried using a different cable yet, I need to figure out where the rest of them are. I've got poo poo all over the place since I moved. It could be it's not getting enough power.

I'm on an unmanaged POE switch, a TP-Link (I think) 5 port one. It's getting a light flashing saying it's getting POE (It's got one of those things where the link / activity for the port and the POE status are their own lights above each other), but it's orange. I should check and see if that's supposed to be green as well. I got this thing like a month or more ago and haven't finished setting it up after doing a factory reset on the Aruba. I got it for free from a coworker who got it for free when his old company decommissioned these. It's old-ish, but it's still getting security updates until 2021 or something like that so I'm not complaining.

I'll try different ports, and I'll check to see if the switch is on the surge protector or going straight into the wall socket. Hopefully being in the surge protector isn't a problem. The switch itself isn't particularly expensive, but considering how expensive the IAP it is powering is I would rather have some security there.

I'm plugging straight in. I need to pull the panel, but I'm pretty sure the jackasses that wired this place in 2012 didn't even remember to actually hook up the jacks in the living room. I think that the cables are probably run to the box but not even plugged in. This place is a mess, there's 12-13 cables and maybe 3 are labeled in smeared illegible sharpie.

Speaking of, anywhere to get a cheap network toner so I can figure out where everything goes?

Are you sure the switch is supplying enough power? For instance, the port will only feed 15W of power, but the AP needs 25 to 30W.

Nvm, just read your original post. No idea. I know with enterprise class 2.4GHz/5Ghz APs I’ve worked with, devices would boot fine but as soon as the antennas tried to draw power it would basically poo poo down. It was usually because the power was over subscribed on the switch so the solution was to add another switch and distribute the APs evenly.

Since you said it’s unmanaged, I suppose that means you can’t look and see what’s happening PoE wise on the switchport. I’m not sure what more you can do other than seeing if you can console into the AP in question and up the logging level to see why it’s not firing up the antennas.

Also, you can get toners/cable testers from Amazon for cheap.

Proteus Jones fucked around with this message at 19:50 on Sep 1, 2018

22 Eargesplitten
Oct 10, 2010



It was at least supplying enough for the SSID to show up when I was starting to set it up, but that was a different part of the house. I’ll try a different cable and then a different port on the switch, and then maybe try it straight into the wall socket (assuming it’s not already in there).

Partycat
Oct 25, 2004

I haven't worked with these specifically but from what I know from talking to my Aruba guys you want to get a console cable on it or you'll not learn much . The APs used to ship with a paper that explained the lights. It may want 20A but if it's class 4 it should get it regardless of LLDP.

Thanks Ants
May 21, 2004

#essereFerrari


Also it's not uncommon to see switches that will happily tell devices they do 802.3at PoE but have a total power budget that means no device can actually draw the full 30W.

22 Eargesplitten
Oct 10, 2010



I hope that's not the issue. It's a low budget, but I only have one POE device. Once I get the cables figured out my goal is to have the wifi devices on the POE switch and the wired stuff on the non-POE switch.

Maybe the Aruba just takes forever to boot properly. I had it plugged in and it was showing the orange lights even with a new cable. Then after unplugging some of the other cables the 2.4 light came on and the SSID showed up. I plugged them back in, and it's still there and the 2.4ghz light is green. I'm going to log in and configure that way, I'm hoping there's just no 5ghz network set up by default and you just need to configure everything. That seems likely.

I was really worried that it was trying to provide POE to every cable on there despite not having any devices asking for it, since that's something that no POE switch should ever do.

E: It's alive! It's even working up on the top floor from the basement, although not too well. I need to see about getting it set up somewhere not in the basement. It looks like someone must just have screwed up punching down the ports in the living room, because they're set up. It's just not getting any signal to any device I've plugged in there.

I'm guessing there's not going to be any way to do a smooth handoff between an Aruba device and an old TP-Link router that's set to AP mode is there :v:

22 Eargesplitten fucked around with this message at 21:09 on Sep 1, 2018

CitizenKain
May 27, 2001

That was Gary Cooper, asshole.

Nap Ghost

22 Eargesplitten posted:

I hope that's not the issue. It's a low budget, but I only have one POE device. Once I get the cables figured out my goal is to have the wifi devices on the POE switch and the wired stuff on the non-POE switch.

Maybe the Aruba just takes forever to boot properly. I had it plugged in and it was showing the orange lights even with a new cable. Then after unplugging some of the other cables the 2.4 light came on and the SSID showed up. I plugged them back in, and it's still there and the 2.4ghz light is green. I'm going to log in and configure that way, I'm hoping there's just no 5ghz network set up by default and you just need to configure everything. That seems likely.

I was really worried that it was trying to provide POE to every cable on there despite not having any devices asking for it, since that's something that no POE switch should ever do.

E: It's alive! It's even working up on the top floor from the basement, although not too well. I need to see about getting it set up somewhere not in the basement. It looks like someone must just have screwed up punching down the ports in the living room, because they're set up. It's just not getting any signal to any device I've plugged in there.

I'm guessing there's not going to be any way to do a smooth handoff between an Aruba device and an old TP-Link router that's set to AP mode is there :v:

In theory, setting both to use the same SSID should let devices migrate as they lose connection to one, but its not clean. I helped a friend put wireless in a old church, and initially we used some TP-Link wireless routers set to AP mode. While it worked, it wasn't great, and one of the routers needed to be rebooted every month for some reason.
We swapped them out for some Ubiquiti gear that has so far been running extremely well.

angry armadillo
Jul 26, 2010

spog posted:

I am sure they all came to you later and apologised for their bad attitude and shared their gratitde for your help and I can't keep a straight face anymore.

I had to practically order a tech that works for me to go and check the part he told me had changed to make him fix an issue because he believed it was some other random failure... I had to point out I haven’t even looked at this problem and was just going off the info he told me.

He came back and said thanks for making him do what he didn’t want to do after - I laughed, I cried

Che Delilas
Nov 23, 2009
FREE TIBET WEED

GreenBuckanneer posted:

A ticket came in: Put McCain Tribute Video on the Intranet

:911:

Tell me you "misunderstood" and put the clip with the Dolphin Love Story up.

Heran Bago
Aug 18, 2006



Ticket:
When making internal calls, person A and B don't hear each other.

Easy, just repatch them. It's been a common occurrence since we deployed Checkpoint.

Patching looks correct. Test that Phone works in our office. New cables for every step, new spot on the switch, nothing.

I come back to check the patching with a tone generator and what do you know, the ports in the room are not labeled correctly. Not even close; none of them give the tone. Every step along the way the user makes small jokes that are less than helpful.

I factory reset a different phone and assign the number. I patch through a good half dozen spots on the switch to God knows where and leave them. I try ports in the room until something boots. Tested, works, user knows. I get back to the office to a new ticket.

New ticket:
The same user does not like their new phone. While it is the same model and is cleaner, the handset cord is too long. The user also 'accidentally' took the LAN cable out of the phone and so wants us to come to their office and fix both problems.

Solution:
Clearly there is a language barrier. Back in the queue it goes with all the helpful notes.

Steakandchips
Apr 30, 2009

Cisco 7962 are the best phones.

duz
Jul 11, 2005

Come on Ilhan, lets go bag us a shitpost


Interoffice mail a 6 inch handset cord, close ticket.

spog
Aug 7, 2004

It's your own bloody fault.

duz posted:

Interoffice mail a 6 2 inch handset cord, close ticket.

GnarlyCharlie4u
Sep 23, 2007

I have an unhealthy obsession with motorcycles.

Proof
An email came in...



Good on the user who didn't just blindly click the link :3

Thanks Ants
May 21, 2004

#essereFerrari


Hah they even faked a "this email is from a trusted sender" box.

I'm convinced the only way to have any hope of securing your data is to tag every external message with a huge warning, do whatever setting changes you need to make to prevent people from being able to connect third-party apps (that also grant API access) to their Office 365 accounts, enable two-factor authentication, and relentlessly hammer home the idea that you will never get asked to confirm your password by a website. Having a responsive support team when people have questions can't hurt either.

There's no effective way that I can see to filter this stuff out, especially when it's not even spoofing an email address but people don't look where a message has come from.

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

Are you saying Juicycafe.com is NOT a legit microsoft sanctioned password checking system?

Judge Schnoopy
Nov 2, 2005

dont even TRY it, pal

Thanks Ants posted:

Hah they even faked a "this email is from a trusted sender" box.

I'm convinced the only way to have any hope of securing your data is to tag every external message with a huge warning, do whatever setting changes you need to make to prevent people from being able to connect third-party apps (that also grant API access) to their Office 365 accounts, enable two-factor authentication, and relentlessly hammer home the idea that you will never get asked to confirm your password by a website. Having a responsive support team when people have questions can't hurt either.

There's no effective way that I can see to filter this stuff out, especially when it's not even spoofing an email address but people don't look where a message has come from.

The only effective way to secure your data is to disable external email and unplug the WAN router. Beyond that, turning off all of the computers is a great option.

The next best methods include what you detailed. You could also strip links from email and break everybody's super-pretty and meticulously designed signatures.

Two-factor from outside of the org (VPN and Webmail) is great because most employees will never have to deal with it, and those that do will have the extra security protection from password leaks.

Thanks Ants
May 21, 2004

#essereFerrari


Conditional access is great and I've been getting to grips with it in Azure AD - like you say, people who set their devices up in the office and never use a home device or whatever to log in never get prompted. I would like a way to have a small percentage of logins go through the multi-factor workflow though regardless of where they are, just to ensure people have all their tokens etc. up to date.

Partycat
Oct 25, 2004

Steakandchips posted:

Cisco 7962 are the best phones.

Until they all fail due to bad flash

Malek
Jun 22, 2003

Shut up Girl!
And as always: Kill Hitler.
So the company I quit wants to hire me back as a contractor to work on the tool that helped their front line agents cut calls down by 10 to 45 minutes ... Funny as they wanted me to take calls all day and work on it. The tool is spaghetti code of CSS and JavaScript. I don't know JavaScript but I learned it. :v:

Preparing an invoice as we speak.

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

welcome to $$Boat$$

Lord Dudeguy
Sep 17, 2006
[Insert good English here]

Thanks Ants posted:

I'm convinced the only way to have any hope of securing your data is to tag every external message with a huge warning, do whatever setting changes you need to make to prevent people from being able to connect third-party apps (that also grant API access) to their Office 365 accounts, enable two-factor authentication, and relentlessly hammer home the idea that you will never get asked to confirm your password by a website. Having a responsive support team when people have questions can't hurt either.

There's no effective way that I can see to filter this stuff out, especially when it's not even spoofing an email address but people don't look where a message has come from.

- Limit number of users with e-mail access to the outside world. (Internal is OK).
- Require VPN access for anyone who wants to get to company assets off site. Brownie points if all mobile devices are prohibited from accessing ANY unauthorized IP/domain/service, ever.
- Multi-factor authentication everywhere.
- E-mail security gateway with Anti-Phishing Sandbox, URL rewriting/removal, attachment stripping/sandboxing, context-sensitive DLP.
- Perimeter (and internal) firewalls with sandboxing, application control, content filtering, IPS/IDS, Geo-IP filtering, and context-sensitive DLP.
- Add subject and body flags to all e-mails from the outside.
- Constant training and re-training of simulated Phishing attacks (KnowBe4, PhishMe) with HR buy-in for training enforcement.
- Have a support team (and an executive/senior management group) that understands that people are going to be pissed as all poo poo that you're not letting them access a secure message from their great-grandmother that they're sure is legit.

I've got almost all of these things implemented. People still click. They just don't care. It's not their gear.

There comes a point in the sisyphean goal of "perfect security" when you realize that it's all gone adversarial and people are going to click just to spite your draconian rear end.

Then some other org in your vertical gets breached, the execs freak out, and you start pushing the boulder uphill again. :negative:

dragonshardz
May 2, 2017

An email came in asking if a ticket had been created to deal with this user's request. Knowing that the ticketing system sends an email to the user when a ticket is created, I dutifully check to make sure the ball was not dropped.

I discover a ticket was, in fact, made, and email the user stating so as well as advising the ticketing system sends them an email with the ticket number and topic when the ticket is created. For tickets created via email, the topic is always the subject line of the email the user sent in.

The user responds that it takes too much time to look in their inbox for the incoming ticket notification and read it.

Never before have I more desired the invention of Smack Over IP than this moment. I advise the user idiot it's probably less time consuming to look for the ticket creation email in his inbox than to email the service desk asking if a ticket was made and wait for us to search the ticketing system, then reply.

PremiumSupport
Aug 17, 2015

Lord Dudeguy posted:

- Limit number of users with e-mail access to the outside world. (Internal is OK).
- Require VPN access for anyone who wants to get to company assets off site. Brownie points if all mobile devices are prohibited from accessing ANY unauthorized IP/domain/service, ever.
- Multi-factor authentication everywhere.
- E-mail security gateway with Anti-Phishing Sandbox, URL rewriting/removal, attachment stripping/sandboxing, context-sensitive DLP.
- Perimeter (and internal) firewalls with sandboxing, application control, content filtering, IPS/IDS, Geo-IP filtering, and context-sensitive DLP.
- Add subject and body flags to all e-mails from the outside.
- Constant training and re-training of simulated Phishing attacks (KnowBe4, PhishMe) with HR buy-in for training enforcement.
- Have a support team (and an executive/senior management group) that understands that people are going to be pissed as all poo poo that you're not letting them access a secure message from their great-grandmother that they're sure is legit.

I've got almost all of these things implemented. People still click. They just don't care. It's not their gear.

There comes a point in the sisyphean goal of "perfect security" when you realize that it's all gone adversarial and people are going to click just to spite your draconian rear end.

Then some other org in your vertical gets breached, the execs freak out, and you start pushing the boulder uphill again. :negative:

Pretty much.

My org is still small enough that I can make many of these decisions myself, and I choose to do damage control rather than prevention. People are going to click, nothing I do or pay for will change that. My goal is that when it happens (not if) the damage is contained to a single machine that I can wipe and reinstall.

It's a lot less stressful.

Adbot
ADBOT LOVES YOU

Extremely Penetrated
Aug 8, 2004
Hail Spwwttag.
PING WAN - Down ended (now: Paused, "It went down, down down / And the flames went higher")

A fire completely gutted one of our remote sites. I hope they got some tapes out, but they probably didn't even think of it. This won't be my problem but I'm sad for the folks over there. (We have 200+ remote sites and lol if you think we can herd random office admins into rotating backups offsite regularly, we're lucky if they even change the tape more than once a week.)

  • 1
  • 2
  • 3
  • 4
  • 5