Using your Sonicwall to make a public WiFi network

I have been a big fan of SonicWall products for the last 18 years. Even after being taken over by Dell, I still use Sonicwall in my office and at home. You may say its overkill to have one in my home, but I tend to model my home lab environment to my office environment. I like to think of my home network as a sandbox for testing things in the office.

This year we are making a big push for better security around the office and one topic that came up was the office WiFi. Currently the office Wifi shares the same LAN connection as the rest of the network. Even worse there is only one SSID for both the staff and guests. Even worse than that the SSID password has not been changed for 10+ years!

A project was commissioned to segment the WiFi network from the LAN, however it is important to allow the staff that works in the office access to the LAN via WiFi when needed.

Equipment RequireD

Sonicwall – I have a NSA2600, but any modern NSA device will do. If you’re not sure which Sonicwall to purchase, this is a great starter.

Sonicwall TZ300 Total Secure $679.99 at Amazon

 

Continue reading “Using your Sonicwall to make a public WiFi network”

Exchange 2016 – ECP ERROR 500 – OWA Working Fine!

As an IT professional for over 20 years I have run into a lot of strange errors in my time. I also have an extensive home “production” lab so I can stay up to date on changes in tech and its fun! Recently I installed Exchange 2016 in a Hyper-V virtual machine. It was a simple migration from 2013. I was in the process of decommissioning an older Hyper-V host. Some of my guest vm’s were migrated while others were built from scratch.

I had  completed my migration and Exchange, OWA, & ECP were working just fine. About a month later I tried to access the ECP and was greeted with a 500 Error!

Tracking Down The Error

Continue reading “Exchange 2016 – ECP ERROR 500 – OWA Working Fine!”

Cooling your Motioneye Pi Zero Security Camera

Welcome to part two of my post. Previously I spoke about building a security system using a Raspberry Pi Zero and MotioneyeOS. (Read Here) I built and installed the system in February and it was working great.  I even caught some Ass-Hat driving over my lawn and trash (Read Here). I ran into one issue with this system. Once Summer was here and the outside temperatures hit 90° (32°c) The processor temperature of the Pi Zero was topping 161° (72°C) and lack of cooling was causing my Pi Zeros to crash

According to the Raspberry Pi foundation the boards are specked to approach 80°C but mine were failing in the mid 70’s. So now to work on a solution.

How to cool your outdoor Motioneye camera

My first attempt was an obvious one – Paint the camera white.
The waterproof boxes I was using to house the camera had a clear cover. To reduce the amount of sunlight, I simply painted the box white

Painting the box was helpful and kept the system cooler , but it still wasn’t enough.  The next step was to vent the box simply by drilling a few small holes at the bottom. I know this compromises my “waterproof” concept, but I am hedging my bets if any rain water was to enter the box, it would remain at the bottom and not touch the electronics.

Still not good enough! I want to add a fan, but I only want the fan to run when the CPU hits a specific temperature. There is no need to run the fan on cool nights or during the winter. So I decided to use the GPIO pins on the PI Zero to control the fan.

Controlling the cooling fan via GPIO pins

Parts List

  • 5 Volt cooling fan
  • 1 NPN Transistor
  • 1 1KΩ Resistor (or equivalent)
  • Small breadboard
  • Soldering iron / solder
How to assemble

Its probably not a good idea to connect a fan directly to one of the GPIO pins, so I used a simple transistor and resistor to help limit the current being drawn via the pin

Continue reading “Cooling your Motioneye Pi Zero Security Camera”

Motioneye Raspberry Pi Zero Security System

Camera systems are so inexpensive these days that it may make sense to purchase a Zmodo or Arlo system from Amazon and call it a day. What fun would that be? I love making little electronic projects and then improving on them as I go. Rather than install a pre-packaged surveillance system, motioneye here we come.

My system consists of four Raspberry Pi units running MotioneyeOS. Three of the four units are Pi Zeros that are my actual cameras, and the fourth is a Pi 3 that aggregates the feeds to one central monitoring station. The benefit of this is there is only one IP/domain that needs to be accessed in order to monitor all the cameras on my system. Continue reading “Motioneye Raspberry Pi Zero Security System”

Easy Nginx Reverse Proxy

I’m a network engineer by trade and like many of us enjoy having an extensive home lab where I can run servers, learn and experiment in my free time. Not only do I find it very satisfying to build a “production” infrastructure at home, but it also helps me with my day-to-day work at my real job. A few years back I started converting my home lab to Hyper-V. I found a visualized environment easier to manage, plus I was able to work on various technologies without running multiple pieces of hardware (think electric bill)

Residential Internet Service = ONE IP ADDRESS

The only issue was talking to all my various projects from outside the network. I have residential internet service and am only allowed ONE IP address. This causes issues running services on separate internal servers on the same port and trying to reach them from the internet.

Continue reading “Easy Nginx Reverse Proxy”

Microsoft Edge Crashes On Launch – Faulting Module EMODEL.DLL

I had a user this week call me complaining that Microsoft Edge would freeze on launch and then crash and close. After investigating her event logs it was determined the faulting module was emodel.dll

Faulting application name: MicrosoftEdge.exe, version: 11.0.16299.371, time stamp: 0x5abdaed4
Faulting module name: EMODEL.dll, version: 11.0.16299.371, time stamp: 0x5abdaf79
Exception code: 0xc0000409
Fault offset: 0x000000000018bcae
Faulting process id: 0x2900
Faulting application start time: 0x01d3e794d12ebc95
Faulting application path: C:\WINDOWS\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
Faulting module path: C:\WINDOWS\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EMODEL.dll
Report Id: 560abf0f-e6c8-4b45-8b96-d448f9aa934d
Faulting package full name: Microsoft.MicrosoftEdge_41.16299.371.0_neutral__8wekyb3d8bbwe
Faulting package-relative application ID: MicrosoftEdge

I have not seen this error before and there were no other users in the environment experiencing this issue. My first troubleshooting step was to see if there were any unique applications that  were specific to this user.

This particular user is the CFO of the company and logs into a number of banking websites. To enhance security many banks force customers to download additional software to supplement logins in order to prevent intrusion and hack attempts. This user was using a product from IBM

IBM Trusteer Rapport & Microsoft Edge EMODEL.DLL

Continue reading “Microsoft Edge Crashes On Launch – Faulting Module EMODEL.DLL”

Post # 100 My Favorite Blogs

It’s been a while since I have written a blog posting. I guess you can say life sometimes gets in the way and things we enjoy doing get pushed aside. I have a few spare moments today to sit down and write so here goes nothing.

First and foremost Webcommand blog has just turned ONE! I started writing exactly one year ago today. When I built this server I was setting a goal to write 5 blog posts a week about 260 in a year. Well I realized its harder to come up with content then I thought. I also realized it is even harder to monetize the site as well (your donations are welcome)  However I did manage to write 100 blog posts in the first year and I deem that a success!

Today on the anniversary of Webcommands birth and 100th post I would like to pay tribute to my favorite blogs and give each of them a brief shout out.

My favorite Blogs

Continue reading “Post # 100 My Favorite Blogs”

Don’t Throwaway That Old iMac Keyboard – Use It On Your Tablet

Cleaning out the basement yet again I stumbled on an old 20″ iMac. By today’s standards this thing is a huge piece of junk. 250GB hard drive, 1GB RAM, Core 2 processor. At 11 years old its better suited as a boat anchor then a functional computer.  However the standard equipment iMac Keyboard does function as a blue tooth keyboard and can be used with other devices.

I happen to like the iMac keyboard, it feels a little small at first, however once you get accustomed to the feel it makes a great companion to any device.

The keyboard is relatively easy to pair to your device if you follow these simple steps.

How to pair an iMac Keyboard

Continue reading “Don’t Throwaway That Old iMac Keyboard – Use It On Your Tablet”

Key To My Heart 16GB USB Drive!

I found this USB key to my heart while surfing the Internet the other day and thought it was a very unique item. A fun loving gesture to tell that special geek in your life how much you care about them.

16GB Key To My Heart – $12

Just think of the possibilities:

  • 16GB of photos to share with the one you love.
  • 16GB of videos of your favorite times together.
  • Store your love notes, letters, emails ETC.
  • Turn it into a unique way to ask someone to PROM?

Continue reading “Key To My Heart 16GB USB Drive!”

PDF files – Latest Target of Phishing Scam

Malware and viruses are always just a wrong click away, and to keep yourself protected you need to be on top of the latest trends that are targeting home and business users. This past month I have been noticing an increase in PDF attachment attacks around the office. As with previous email based attacks this is simply the latest attempt to infiltrate your network security by using the weakest link. YOU! Yes, in my opinion humans are the most vulnerable vector to attack and successfully enter a network.

How the latest PDF Phishing scam works.

A friend, coworker or client has already been infected with malware. At this point the attacker has taken control over their system and would like to spread his virus via email. The malware quickly enumerates the victims address book and fires off emails to unsuspecting targets with the viral payload attached as a PDF document. As the recipient you open the PDF, jump through a few hoops and the attacker now has control of your computer as well as your email credentials and more.

How to spot a bogus attachment, and prevent infection.

Continue reading “PDF files – Latest Target of Phishing Scam”