Archive for January, 2009

Preventing Vacation Response Loops for Distribution Groups in Kerio

Monday, January 26th, 2009

When messages are sent to a Distribution Group, and a user in that group has a vacation Auto-reply set up, Kerio will respond to the group address, and the auto-reply will be triggered again, and a loop results.

In order to avoid this, another mail filter is required. To set this up:

1) Log into Kerio Web Mail, and click on Settings, and then Mail Filters
2) Click “New” to add a new rule.
3) In the Conditions pane, check the box for “Where the recipient address (To or CC line) contains
4) In the Actions pane, check the box for “Stop processing more rules”
5) In the Rule Description pane, click the underlined value (in this case ‘contains”’), and enter the name of the distribution group (for instance,
6) Name the rule something descriptive, and click “OK” to save the rule.
7) In the Mail Filters window, single-click on the rule you just created, and click the “Move Up” button until that rule is above any other rules that would cause messages to be sent to the group. In most cases, you should just move it to the top.

Step 7 is important – if this rule is below your Out Of Office rule, it will trigger too late.

Xsanity Article on Managing Fibre Channel from the Command Line

Friday, January 23rd, 2009

We have posted another article on Xsanity. This one is on managing Fibre Channel settings from the command line. The following is an excerpt from the article:

Once upon a time there was Fibre Channel Utility. Then there was a System Preference pane. But the command line utility, fibreconfig, is the quickest, most verbose way of obtaining information and setting various parameters for your Apple branded cards.

To get started with fibreconfig, it’s easiest to start with just asking the fibreconfig binary to simply display all the information available on the fibre channel environment. This can be done by using the –l option as follows:

View the full article here.

Xsanity Article on Labeling LUNs from the Command Line

Monday, January 19th, 2009

We have published another article on Xsanity. This one on using removable media with Xsan. More importantly this article shows how to label a LUN using the command line tool cvlabel. An excerpt is as follows:

Sometimes you just need a small SAN for testing… Times when you don’t have fibre channel and you don’t need to provide access to multiple clients, like maybe if you’re writing an article for Xsanity on an airplane. Now this volume is not going to be supported (or supportable) by anyone and nor should it be (so don’t use it for real data), but you can use USB and FireWire drives for a small test Xsan…

View the full article here.

Rumpus 6.0 Reviewed

Thursday, January 15th, 2009

Rumpus 6.0

Maxum has come up with a new Release of their famous FTP server software. Rumpus is an internet file transfer server for OS X that allows for quick easy, secure file transfers. If you were luck to purchase Rumpus 5.x after January 1, 2007 a free upgrade is ready for download.  A $99 upgrade is for older upgrades.

The latest version of Rumpus has many new features that might entice users to upgrade listed below.

File Watch

Rumpus File watch can be installed on an administrators computer to show detailed information about the current activity and recently uploaded/downloaded files. This application allows direct access to all files uploaded to the server and featured drag and drop capability to add/download files on the fly.

WFM improvements

Many improvements have been made to the Web File Management portion of Rumpus including new drag and drop capabilities and server administration.

Multiple Domain Support

Multiple domains can now be specified in Rumpus Admin while maintaining alternate styles for each domain.

User Management Upgrades

Users are now capable of user-specific welcome messages and note tracking. The ability to add sub-admin accounts to manage certain clients or folders.


Users can now mount their home directory on their desktop for easy uploads and downloads.

Miscellaneous Improvements

Below is a list of some notable improvements for Rumpus

  • Logout URL for WFM
  • Multi-language support in WFM
  • Updated WFM color schemes
  • Mail and web server settings for client delivery and notifications.

Rumpus FileWatch

FileWatch can connect to any Rumpus 6.x server with remote monitoring enabled.

The Users tab shows current connected users and an estimated time remaining left on file transfers.

The Files tab show all recent files. The report history can be set in Rumpus Control panel for (X) minutes, hours or days.

A Drag and Drop to the Files tab will bring up an upload screen for direct uploading to a specific client with delivery to an email address for easy one click downloads.

WebDAV connection

Users can now mount their home folder directly on their desktop for easy uploads and downloads.


Xsanity – Article on cvadmin

Thursday, January 15th, 2009

We wrote an article on using cvadmin to manage Xsan from the command line. It’s available on Xsanity here.

Article on Xsanity – Linux + Xsan

Tuesday, January 13th, 2009

After a long silence on Xsanity, 318 has published the first of a number of articles for the site. The article focuses on how to install and configure StorNext clients running Red Hat Enterprise Linux (RHEL) to connect to an Xsan. It is available here.

Setting Up A DMZ With Transparency Mode on a SonicWALL

Wednesday, January 7th, 2009

This article will outline how to setup a SonicWALL with One to One NAT using Transparency Mode on a DMZ on a specific Port.

What you need:
1. SonicWALL with OS Enhanced
2. All WAN IP addresses leased to company
3. An unused unassigned port on the SonicWALL (not port 1 – it’s reserved for stuff internally on ALL SonicWALLs).

1. Login to SonicWALL
2. Add portshield interface to network interfaces on SonicWALL. (Network)
3. Here’s the trick. Create a new address object, name it anything. Make sure it has the following:
a) Zone is DMZ
b) Type is Range
c) Make it within the WAN Range, but the unused IP addresses in that range.
d) Enable DHCP on this Interface
e) Click Save
4. Go to Firewall
5. In matrix click WAN > DMZ
6. If applicable (not recommended due to obvious security implication,) change setting from “deny all” to “allow all” (whichever host will be behind that DMZ should be running its own firewall).
7. Go to DHCP, ensure the scope for the subnet is correct. Then get the MAC address of the firewall to be chained to it, and add it on there with the appropriate WAN IP (for static setup).
8. Change the DNS settings for the DHCP stuff to ensure it’s not using the LAN’s IP DNSes.
9. Test with your laptop.