MTU Size for Comcast with Vocalocity VoIP Service

While working with Comcast tech support on Internet issues at a client’s site we were told to change the MTU size on the WAN interface of the client’s firewall to 1492. Comcast engineer claimed this setting will provide for fewer VoIP voice-quality issues with Comcast Internet services.

I thought I’d pass the information along to those who may be experiencing voice-quality issues with Internet-hosted VoIP services and have Comcast as their Internet Service Provider.

Facts:
ISP: Comcast Business
Hosted VoIP Provider: Vocalocity / Vonage Business Solutions
Firewall: SonicWALL TZ200

———————

Cheers

Windows Server 2012 Domain Controller & RemoteApps, No More

I recently migrated a client from Windows Server 2003 to 2012. Knowing what I know about Windows Server 2008 RDS and RemoteApps I thought I’d take the same approach. Microsoft has made many improvements to Remote Desktop Services in Windows 2012 but with that, I soon discovered, they dropped the ability to host RemoteApps in environments with single server running Active Directory Domain Services Role.

Basically, small business organizations with single server wanting to take advantage of Active Directory authentication and RemoteApps are out of luck.

Though, all is not lost. If you forgo RemoteApps you may install Remote Desktop Licensing and Remote Desktop Session Host roles on a Domain Controller, which will allow you to provide Remote Desktop Services in the environment, minus RemoteApps.

So if you find yourself in my situation check-out the following Microsoft KB article on how to deploy Windows Server 2012 RDS on servers running Active Directory Domain Services http://support.microsoft.com/kb/2833839

Cheers!

Managed IT Services

I am writing this article with the business executive in mind.

Say you are a stake holder in a business operation that employees 40-50 computers and a handful of servers. At this point you have a full-time IT person on staff. That person is most likely expected to perform managerial duties as well as hands-on day-to-day activities such as user support, PC repair/replacement, server and network management, backup monitoring, etc.

WOW! Superman does exist! Truth be told, I do not envy that IT employee of yours, because there are not enough hours in the day to be able to handle that kind of workload. Let alone keep up with technology developments and trends. From an IT perspective, your IT manager is doomed. They will slowly fall behind the technology curve and fade away, or quit – whichever comes first. Under the circumstances there are two scenarios I could think of:

1. There are issues with your IT infrastructure (e.g. email unavailability, file access issues, printing, PC performance problems, etc.). You have received complaints from your staff about that. You have experienced some of them yourself. You have talked to your IT manager, but solution is still not available and they always give you long-winded answers, but that’s not helping you much. You feel frustrated.

2. Your IT manager is talking about all these issues and how he/she needs to invest into this and that to resolve the on-going problems. Perhaps he/she is hinting at the need to hire an additional individual to handle the extra work load, but you are not ready to make that commitment yet.

Under any of the above scenarios, you are sitting on a time-bomb. You are one problem away from a major disaster that claims your data, intellectual property, your clients’ personally identifiable information, or dare I say your business. The fact it hasn’t happened yet makes you a very lucky individual. You should play the lotto more often.

I’d like to offer you some food for thought.

While known under many different names, we call it Managed IT Solutions.

Managed IT Solutions are a combination of services,  technology, and expertise blended specifically with the Small Business in mind. In this example (40-50 computer users) your organization is large enough to have a dedicated IT person on staff, but in reality that’s nowhere near enough to maintain, let alone improve your IT infrastructure so that your computer users are efficient and productive at all times. The other problem is that your IT manager is not able to function in a strategic capacity, because they are stuck in a fire-fighting mode. Without anyone assisting you in resolving business problems through technology you are in a technological time-warp. Whether you’ll agree with me or not, you are wasting money.

Let’s face it, hiring another individual is an expensive commitment. Not to mention that if you are not bullish about your businesses’ future, it may not make a lot of sense to go through the expensive hiring process, just to let someone go after a few months.

However, letting your business fall behind the technological curve means your IT environment is affecting your employees’ productivity. Your disaster recovery preparedness and your efficiencies have gone down the tubes. All of that is already costing you real money and could compromise your business’ very existence.

The solution is with Managed IT Services. When properly designed and implemented, Managed IT Services will provide you with day-to-day IT support for the fraction of what you’d pay to hire a second IT employee. Your IT manager will be freed-up to assist you in resolving business problems, rather than fight low-level IT fires. Outsourcing some of your IT needs will allow your IT manager to remain in control of your strategic IT planning, however, they will have a team of highly trained professionals on their side, handling your critical IT infrastructure and assisting in the decision making process. Did I mention for a fraction of the cost of hiring another individual?

Managed IT Solutions work great even in smaller organizations without full-time IT staff.

Whether you are a business executive or an IT executive, I encourage you to give us a call. You have nothing to lose. Visit us at www.konkotech.com for additional details and contact information.

Regards,
Konstantin

How to Forcibly Remove DHCP Failover Partner in Windows Server 2012

Hello folks,

Ivailo here to talk about the new DHCP failover feature in Windows Server 2012. A real failover is finally possible. Split scopes are things of the past. Now it’s possible to configure DHCP partners in “Hot Standby” and “Load Balance” mode. Configuring DHCP failover is outside of the scope of this blog.

I would like to show you haw to forcibly remove a failed failover partner. I recently had to do this for a customer. The primary DHCP server was for some reason configured with invalid IP address (169.254.84.126) as a partner. That was not my install so I don’t have an explanation as to how this happened. In order to remove a partner in the DHCP manager the two servers have to be able to talk to each other. If one of the servers is unavailable the removal will fail. The following command can be used to force the removal of the partner:

Remove-DhcpServerv4Failover -ComputerName <server name> -Name <name of the failover partnership> -force

 

Ivailo Mitkov

How to configure an authoritative time server in Windows Server 2012

Hello folks,

Ivailo here to talk about setting up an NTP on a PDCe. Remember this http://support.microsoft.com/kb/816042?wa=wsignin1.0? The MS tool on the page used to work like a charm. Unfortunately even though according to the “Applies to” it should work on Windows Server 2012 – it doesn’t. Of course one can follow the instructions how to configure NTP manually but I am doing this way too often for my customers so I decided to save few minutes the next time I need to configure NTP on a PDCe. This is why I created the following registry hack that can be applied simply by double clicking on it. Of course you can also apply the settings using the following command…

w32tm /config /syncfromflags:manual /manualpeerlist:”<Server1>,0x1 <Server2>,0x1 <Server3>,0x1″ /update /reliable:yes

…but it will only change the AnnounceFlags, Type, and the source and leave all intervals intact which is not a best practice.

Copy the text bellow including “Windows Registry Editor Version 5.00” and paste in your favorite text editor (notepad will work)! Change the time sources depending on the server physical location (in my case US). Append 0x1 to each server and separate multiple servers with space! Save the file (for example NTPConfiguration.reg)!

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Config]
“MaxNegPhaseCorrection”=dword:00000e10
“MaxPosPhaseCorrection”=dword:00000e10
“AnnounceFlags”=dword:00000005

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\Parameters]
“NtpServer”=”0.us.pool.ntp.org,0x1 1.us.pool.ntp.org,0x1 2.us.pool.ntp.org,0x1 3.us.pool.ntp.org,0x1”
“Type”=”NTP”

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpClient]
“SpecialPollInterval”=dword:00000384

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer]
“Enabled”=dword:00000001

 

Restart the time service:

net stop w32time && net start w32time

 

Ivailo Mitkov

How does that help my Business?

“How does that help my business?” is probably the question I hear most frequently. Small business owners and executives would listen to me talk about technology and the various services we provide and often make a comment like: “That all sounds great, but what does that actually do for me? How does it help my business?” Others would say: “That sounds spectacular, but it seems like an overkill for my small business operation.” All valid points.

I thought I owe it to our current and future Clients to put it all in perspective.

With the invention of the Internet and constantly evolving information technology, the ball game has changed dramatically. We used to write all data and confidential business information on paper, locked it all in a file cabinet, which was locked in an office, which was located in a building that was also locked. We installed a burglar and fire alarm systems and we were done. There were technically four layers of security including a “catch-all” burglar alarm system that was protecting our confidential data, intellectual property, and assets.

Fast-forward to today. All information and data is in digital format. We use software applications instead of pen and pencil to manipulate the data. Those applications run on desktop and server computers. The files and folders are now stored in a “file cabinet” called Server, which is locked in an office (or dedicated computer room), which is located in a building that is also locked. And we probably also have a burglar and fire alarm systems in place, just like in the olden days.

The most significant difference? Your file cabinet, the Server (or servers, depending on the size of the operation), is on a computer network which is connected to the Global network called the Internet. Your file cabinet is now accessible from anywhere in the World and, if not properly protected, is just a matter of time before someone figures out a way to access the data and information that was so hard to access before the invention of the Internet. All of a sudden the vital business information that was so secure before the digital age is now available to those with some time and malicious intent on their hands, regardless of where they reside on planet Earth. In many cases the four layers of security I spoke about have been reduced to one – your server’s administrative password!

Our core mission as an Information Technology Services Provider is to protect your confidential business information from those who should not have access to it and to ensure that your business related data and software applications are available to you and your employees when you need them, wherever you need them. All the technologies and services we talk about are the tools we need to accomplish our mission. It’s as simple as that.

Best regards,
Konstantin

Productivity – Part 2

In Part 1 of the productivity series we discussed how computer outages and down time affect employees’ productivity. Today, I’d like to touch upon a slightly more controversial subject – work habits. Work habits may be hard to change, but we can certainly guide our employees and help them improve their work habits for productivity’s sake.

We all know Black Friday, the day after Thanksgiving. But what about Cyber Monday, the first workday after the Thanksgiving holiday? Why is it called Cyber Monday? Because of all the internet shopping that takes place that day. According to CNN Money, Cyber Monday sales were up 30% in 2012 compared to 2011. Which brings me to my point. If our employees are taking advantage of Cyber Monday, who’s doing their job? That’s just part of the issue. There are other, much more troublesome activities that some individuals engage in while at their work computers. Such activities at the very minimum expose computers to computer viruses and malware and at worse, bring lawsuits. I have seen employees listen to their favorite radio station on their PC at work. What’s the problem with that, you ask? Well, if the internet connection is not that fast to begin with, and we have couple of employees streaming audio or video to their work computer,  chances are the Internet connection with slow down to a crawl and we will not be able to conduct business-related activities such as receiving or sending business-related email, accessing web sites in timely manner, etc.

So how do we help our employees be more productive and use the company-provided equipment for its intended purposes? Technology to the rescue. We may implement Content Filtering. Content filtering is a function performed by a device that resides between the Internet router and the internal network. It can be configured to allow or prevent certain types of Internet activities (e.g. access to shopping sites, access to adult content sites, access to malicious sites, access to video streaming sites, etc.). With content filtering in place we can significantly reduce the risk of infecting the company’s computers with viruses as well as improve the performance of both computer and human resources.

Couple of the IT vendors providing content filtering solutions are WatchGuard and Barracuda Networks.

VMware ESXi 5 VM reset stuck at 95%

Hi folks,
Ivailo here to talk about a problem I had few days ago. While I was working on a customer’s server running a VM on ESXi 5.0, the VM froze so I had to forcibly reset it. When I did so, the reset task got stuck at 95%. I did some digging and found few threads talking about the same issue but they were all for ESXi 4. I had to do some additional research and modify the commands in order to make them work on ESXi 5. Bellow are the steps that resolved my problem:

  1. With vSphere Client, connect to the host or the VC server that controls the host.
  2. Click on the host and go to the Configuration tab.
  3. Click on Security Profile.
  4. Click on Properties in the Services table.
  5. Start ESXi Shell and SSH services.
  6. Open a SSH session to the host.
  7. Execute /sbin/services.sh restart. This will restart all agents. The vSphere Client or the vCenter server will lose connection to the host. Reconnect! The VM may show as (invalid).
  8. Find the PID of the process by typing ps|grep “<VMName>”. The second number before the name of the VM is the PID.
  9. Kill the process by typing kill -9 <PID>.
  10. Go to /vmfs/volumes/<DataStoreName>/<VMName>.
  11. Delete the swap file by typing rm –r <SwappFileName.vswp>
  12. In vSphere Client right click the VM and select Remove From Inventory.
  13. Browse the data store, open the VM folder, right click on the .vmx file and select Add to Inventory.
  14. Power On the VM.

Hope this helps.

Ivailo Mitkov

Productivity – Part 1

Whether we are running a small or a large business, for most of us one of the biggest operating expense is employee salaries and compensation. I am sure no one will argue the fact that the higher the employee productivity, the better for the business. This is even more true in today’s economic climate, where operating expenses are going up, but revenue seems to trend in the opposite direction. Depending on the type of operation, couple of ways to keep our company profitable is to improve employee productivity and introduce automation.

While there are many factors affecting employee productivity, in this article we will focus on how personal computers affect our operation. And for this specific example, personal computers include both Desktop and Mobile PCs as well as Servers hosting our data and software applications.

The question is what happens when our business is heavily dependent on computers and computer networks (is there one that isn’t) in the event of an outage? The productivity of our employees who are directly affected drops to nearly 0%. The impact may be compounded by the fact that while our computer systems are down, not only are our employees unproductive, but we may be losing revenue because we are not taking new orders, not ringing transactions at the cash register, not creating new insurance policies, not selling real estate, fill in the blank that applies to your operation. Now factor in the cost for repairing the problem and we have one expensive outage on our hands. There is actually a formula that I will share with you in one of the next articles on how to calculate the cost of computer down time. It is an eye opener and it helps put things in perspective when discussing IT-related operating expenses.

So if we are in agreement that computer-related outages directly affect our employees’ productivity and revenue the question is how do we avoid prolonged outages? The answer is preventative measures.

Don’t wait until it is too late to put preventative measures in place. I know, we are all too busy managing other areas of our business. I know, we don’t have the in-house IT resources to address the issue. I know, we have been thinking about it and will get to it soon. But don’t wait too long. Some damages are irreversible without preventative measures in place. Our computer and network environment may seem placid on the surface, but it is a living, breathing thing that requires attention and just like the human body, without preventative measures in place illness is much more expensive to treat in advanced stages.

Read part 2.

Hello World!

 
Greetings Folks!
This blog has been a long time coming. There are so many topics I have been dying to share with the World, but for one reason or another never found time to develop a medium to convey them to you. Well, the wait is over.
I hope you find our blog informative and entertaining. Stop by often to find out what is going on in the computer world or other subjects (as the mood strikes).

Regards,
Konstantin Kostadinov
Owner / Chief Systems Architect
Konko Technologies