Amazon Ad2

Apr 25, 2012

Allow SonicWall NetExtender Clients Internet Access While Connected


This article shows how to allow SonicWall NetExtender Client to access the Internet

while remotely connected.




1. Log into your Sonicwall, and expand “Network”


2. Click on “Interfaces” and then click on the Configure link for your WAN connection.


3. Make sure the box that says “User Login: Https” has a check mark, and then click “OK”


4. Expand “SSL VPN” on the left, and then click “Server Settings”


5. Click the red dot next to “WAN” and wait for it to turn green.


6. Click “Client Settings” on the left, and then configure an IP address range for your SSL VPN Guests, also configure the User Domain, and DNS servers.


7. Click “Client Routes” on the left pane, Enable “Tunnel All Mode”, this is done to ensure all traffic sent by the client appears to originates from the main office, and not the client’s home router.


8. Now let’s create a user and grant them access to the appropriate networks during an VPN connection.






10. Expand “Users” on the left, and then click on “Local Users”.


11. click “Add User…”


12. On the “Settings” tab, give the user a username and password.


13. On the “Groups” tab, Add the user to “Trusted Users”, “Everyone”, and “SSLVPN Services”. Click OK.


14. Click “Local Groups” on the left.


15. Click on the “Configure” button for the group “Trusted Users”


16. Click on the “VPN Access” tab, add “LAN Subnets” and “WAN RemoteAccess Networks” to the list. Click OK.
 
 
That's it, now your remotely connected clients can access the internal network and have the ability to browse the web.

Apr 19, 2012

SOLVED! Your system administrator does not allow the use of saved credentials to log on to the remote computer RDP terminal server because its identity is not fully verified. Please enter new credentials.


In order to use saved RDP or Terminal Server credentials you need to do the following:



1. On the local machine, Open Group Policy Editor via Run -> gpedit.msc
2. Navigate to Local Computer Policy>Computer Configuration>Administrative Templates>System>Credentials Delegation


3.Open Setting Allow Delegating Saved Credentials with NTLM-only Server Authentication, set it to Enabled click on button Show... and in Show Contents window add Value TERMSRV/*. Close the windows by pressing OK.

*Repeat step 3 on the following settings:
Allow Delegating Default Credentials

Allow Delegating Saved Credentials
Allow Delegating Default Credentials with NTLM-only Server Authentication

4. Open comman prompt and enter gpupdate /force command to update your policy.


IF YOU ARE RUNNING A DOMAIN SERVER AND WISH TO PUSH THESE SETTINGS USING GROUP POLICY FOR THE STATIONS LOGGING ONTO THE DOMAIN DO THE FOLLOWING:
 
1. Run gpmc.msc
2. Right-Click on Default Domain Policy and click Edit
3. Navigate to Local Computer Policy>Computer Configuration>Administrative Templates>System>Credentials Delegation


4.Open Setting Allow Delegating Saved Credentials with NTLM-only Server Authentication, set it to Enabled click on button Show... and in Show Contents window add Value TERMSRV/*. Close the windows by pressing OK.


*Repeat step 4 on the following settings:


Allow Delegating Default Credentials
Allow Delegating Saved Credentials
Allow Delegating Default Credentials with NTLM-only Server Authentication
5. Open comman prompt and enter gpupdate /force command to update your policy.





Apr 12, 2012

Solved: Map Network Drive Windows 7 to Server

Open up GPEdit for the GPO in question; click the ‘User Configuration’ folder, then click the ‘Preferences’ folder. You can see all of the user-relevant options you can set in Preferences. Find Drive Maps under ‘Windows Settings.’

1. Click Start, then type GPEdit.msc
2. Locate "User Configuration"
3. Locate "Preferences"
4. Create Drive Mappings.

Here is the link where I found this method:
http://blogs.technet.com/b/grouppolicy/archive/2009/02/11/gp-preferences-will-reduce-logon-scripts-mapping-drives.aspx