<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

Blog Categories

Now Partnering with Gigamon

To kick start the New Year, Rutter Networking Technologies, Inc. is proud to announce Gigamon as our new partner into the future. Gigamon provides intelligent Traffic Visibility Networking solutions for enterprises, data centers and service providers around the globe. With the use of data access network architecture, their proficient technology allows for improved visibility and access, enhanced security, more efficient tools, acquired compliance standards, and the ability to implement using an out-of-band infrastructure that will not disrupt a company’s production network. Gigamon was founded in 2004 and has seen rapid growth throughout the years.

Read More

Virtual Datacenter Migrations using SRM

One of our customers had recently opened up a new site at a colocation and wanted to run all non-production out of this new site, keeping production in the existing datacenter for the time being.  This would allow them to leverage the investment in their Disaster Recovery site by running a good chunk of their workloads there and in the event of a disaster, all of the non-prod VMs would be powered off to make room for Production.

Read More

Packet Captures on Firewalls

If you have used Check Point for any period of time, you’ve probably run into the ‘fw monitor’ command which is a very useful troubleshooting tool in a variety of scenarios.

Read More

Kerberos Token Size Considerations

For many traditional domain migrations, the use of sIDHistory is a common vehicle to avoid disruptions. As users and groups are migrated to other domains, they inherit new SIDs. This is because SIDs are domain specific. So historically problems arose when users and groups attempted to access resources in the source domain. Because the DACLs (Discretionary Access Control List) of the source resources are still attuned to the original SID's, users who migrated to a new domain or forest would be denied access. So to circumvent this starting with Windows 2000 Microsoft introduced the sIDHistory attribute. The premise of this attribute is to store the users or groups SID from the previous source domain and append it to the access token along with their new SID. Now users and groups in the midst of a migration could have access to source resources like file servers that have yet to be migrated.

Read More

New England VMUG - Winter Warmer

Rutter Networking Technologies, Inc. will be joining VMware associates at Gillette Stadium on Thursday,  January 19, 2012 for the New England VMUG Winter Warmer. VMware has revolutionized the way businesses and people solve IT challenges through the innovation of cloud infrastructures and management platforms.   Learn about the latest virtual technology. Hear from the leading industry experts. Get a deeper understanding with our hands on labs and take advantage of the opportunity to network with over 1100 people. Join us at the New England VMUG.

Read More

Endpoint Security (E80.30)

Check Point has recently announced the release of Endpoint Security, E80.30. This release has resolved several issues that were present in E80.20 and also introduced some new features that should prove to be useful in the future. Two features of the E80.20 are Virtual Groups and Media Encryption & Port Protection Support.

Read More

Microsoft Transporter Suite - Coexistence of IMAP Messaging

This document will provide an overview of Microsoft Transporter Suite which allows for the coexistence of IMAP Messaging environments and Microsoft Exchange 2007. I will focus on coexistence in this article and will separately discuss about migration in a different article. Some companies have requirements for a coexistence solution which will need to last for a couple of months to a year, or even longer. Although it is not recommended to have such a long coexistence period, this requirement typically exists because of the long durations it can take to develop, deploy and migrate existing Notes applications to a separate environment (typically Microsoft Sharepoint).

Read More

Lync CPU Considerations

When planning a Lync deployment, we are finding some customers are running into issues in planning the CPU overhead of their systems. For many people, they are using the “Lync Server 2010 Capacity Calculator” to generate their anticipated system load.

Read More

Active Directory Migration - Who? What? Where?

As an administrator faced with the demanding task of an Active Directory migration, you need to know which machines are used by every client, which machines are used by multiple people and which employees log into them. This information can be very useful for support staff in general – but it really becomes a lifesaver when doing an AD migration or consolidation. You do not need a sophisticated third party auditing tool with an expensive support agreement. Just a one line capture script:

Read More

Microsoft's View on Virtualization of Exchange 2010

At Teched 2011 this year, Microsoft announced the broadened virtualization support of Exchange 2010.

Read More