Feeds:
Posts
Comments

How to install Access 97 and Access 2000 on the same computer
View products that this article applies to.
This article was previously published under Q241141
Moderate: Requires basic macro, coding, and interoperability skills.

On This PageSUMMARY
MORE INFORMATION
Neither Access 97 nor Access 2000 Is Installed
Access 97 Is Already Installed
Access 2000 Is Already Installed
Problems After Installing Access 97 and Access 2000 on the Same Computer
REFERENCES
Expand all | Collapse all
SUMMARYAlthough Microsoft does not recommend it, you can install and use more than one…Although Microsoft does not recommend it, you can install and use more than one version of Access on a single computer. This article discusses how to install and use Access 97 and Access 2000 on the same computer. This article also discusses some of the problems you may experience when you do this.

NOTE: For information about running Access 97 and earlier versions on the same computer, please see the following article in the Microsoft Knowledge Base:
159333 (http://support.microsoft.com/kb/159333/EN-US/ ) ACC: Running Current and Earlier Access Versions Simultaneously
Back to the top
MORE INFORMATIONHow you install Access 97 and Access 2000 on the same computer depends on whethe…How you install Access 97 and Access 2000 on the same computer depends on whether one of the versions is already installed or whether neither is installed. If you have already installed Access 97 and Access 2000 on the same computer and are having problems, see the Problems After Installing Access 97 and Access 2000 on the Same Computer section of this article.
Back to the top
Neither Access 97 nor Access 2000 Is Installed
If neither Access 97 nor Access 2000 is installed, install Access 97 first, and then install Access 2000. Because by default both versions of Access are installed in the same folder, you must perform a custom installation when you install Access 2000 so that Access 2000 does not overwrite Access 97.
Install Access 97 or Office 97. You can select either a Typical or a Custom installation.
Install Access 2000 or Office 2000, but you must select a Custom installation.
When prompted, change the installation location for Access 2000 or Office 2000 to a folder other than C:\Program Files\Microsoft Office\ or the folder that you installed Access 97 or Office 97 into. For example, you can install Access 2000 or Office 2000 to a folder named C:\Program Files\Microsoft Office2K\
When prompted, select the option to keep the earlier versions of the Office programs on the computer. This is an all-or-nothing selection; you either keep all earlier versions of the Office programs, or you lose them all.
Complete the rest of the installation.

NOTE: The Office 97 shortcuts on the Start menu will be overwritten by the Office 2000 shortcuts. If you want Office 97 shortcuts on the Start menu, you must add them manually.
Back to the top
Access 97 Is Already Installed
If you already have Access 97 on the computer, and you want to add Access 2000, follow these steps:

Install Access 2000 or Office 2000. Be sure to select the Custom installation option.
When prompted, change the installation location for Access 2000 or Office 2000 to a folder other than C:\Program Files\Microsoft Office\ or the folder that you installed Access 97 or Office 97 into. For example, you can install Access 2000 or Office 2000 to a folder named C:\Program Files\Microsoft Office2K\
When prompted, select the option to keep the earlier versions of the Office programs on the computer. This is an all-or-nothing choice; you either keep all earlier versions of the Office programs, or you lose them all.
Complete the rest of the installation.

NOTE: The Office 97 shortcuts on the Start menu will be overwritten by the Office 2000 shortcuts. If you want Office 97 shortcuts on the Start menu, you must add them manually.

Back to the top
Access 2000 Is Already Installed
If you already have Access 2000 on the computer, and you want to add Access 97, there are some additional steps you must follow.

When you try to install Access 97, you have to avoid the “Microsoft Access can’t start because there is no license for it on this machine” error message caused by the presence of the Hatten font, which is installed by Access 2000 and Office 2000. Also, if the Access 97 installation finds a newer version of the Msaccess.exe file on the computer, it will not install the 97 version of the Msaccess.exe file.

Click Start, point to Find, and then click Files or Folders.
Find the Hatten.ttf file, and then rename it to Hatten.sav. You must do this to avoid the “Microsoft Access can’t start because there is no license for it on this machine” error message when you start Access 97.

NOTE: You can find the Hatten.ttf file in the Fonts folder under the name, Haettenschweiler.
Find the existing version of the Msaccess.exe file, and then rename it to Msaccess.2k. Before you rename it, confirm that the version of the Msaccess.exe file is 9.0x by right-clicking the file, and then clicking Properties. Then click the Version tab
Install Access 97 or Office 97.
When prompted, click Change Directory to install Access 97 in a folder other than the folder in which Access 2000 is installed. For example, install the program in a folder named C:\Program Files\Microsoft Office97\.
After the installation is finished, find the Msaccess.2k file and rename it back to Msaccess.exe. Also, find the Hatten.sav file and rename it back to Hatten.ttf.
Back to the top
Problems After Installing Access 97 and Access 2000 on the Same Computer
If the procedures described in this article were not followed when the second version of Access was installed on the computer, you may have problems when you try to start Access. Following are descriptions of the error messages or problems that you may encounter, as well as the resolutions.

One error message you may receive is:
Microsoft Access can’t start because there is no license for it on this machine.
To resolve this behavior, follow these steps:
Click Start, point to Find, and then click Files or Folders.
In the Named box, type Hatten.ttf.
In the Look In box, type C:\Windows\Fonts or the path to the Fonts folder on your computer. If you are not sure of the font folder’s location, open Windows explorer and verify the directory where Windows is installed. Note: If you are on Windows NT 4.0, the path may be C:\WINNT\Fonts
Click Find Now to start the search.
Under Name, right-click the Hatten.ttf file, and on the menu that appears, click Rename.
Change the name of the file to Hatten.sav.

NOTE: You can find the Hatten.ttf file in the Fonts folder under the name, Haettenschweiler
Insert your Access 97 or Office 97 CD into the CD-ROM or DVD-ROM drive.
Click Start, and then click Run.
Type the command to run the Microsoft Access Setup program and use the /y switch to reregister Access 97. For example, type:

D:\Setup.exe /y
In the Installation Maintenance Program dialog box, click Reinstall. The Setup program updates the system registry for Access. When Setup is finished, start Access.
NOTE: Following the steps in this procedure has the side effect of changing all the Start menu shortcuts to point back to the Office 97 programs. If you want to have the shortcuts point to the Office 2000 programs, run Office 2000 Setup in maintenance mode, and then click Repair. You can then select to repair the Start menu shortcuts.

Another error message you may receive is:
Can’t find the database you specified, or you didn’t specify a database at all.

Specify a valid database in the command line and include a path if necessary.
There are two main causes for this error:

You installed Access 97 on a computer that has the Small Business Customer Manager 2000 installed. For additional information about resolving this problem, click the article number below to view the article in the Microsoft Knowledge Base:
235279 (http://support.microsoft.com/kb/235279/EN-US/ ) ACC2000: “Can’t Find the Database You Specified” Error When Starting Access 97 on Computer with Office 2000 Small Business Tools
You installed Access 2000 on a computer that already has both Access 97 (full version) and an Access 97 run-time application installed. For additional information about resolving this problem, click the article number below to view the article in the Microsoft Knowledge Base:
235280 (http://support.microsoft.com/kb/235280/EN-US/ ) ACC2000: “Can’t Find the Database You Specified” Error When Starting Access 97 After Upgrade to Office 2000
You may also notice that one or both versions of Access are using the wrong workgroup information file. For additional information about resolving this problem, click the article number below to view the article in the Microsoft Knowledge Base:
241230 (http://support.microsoft.com/kb/241230/EN-US/ ) ACC2000: Workgroup Information File Is Reset to Default System.mdw After Self-Registration
Back to the top
REFERENCESIf you get a “There is no license” error message when you start Microsoft Access…If you get a “There is no license” error message when you start Microsoft Access, please see the following article in the Microsoft Knowledge Base:
141373 (http://support.microsoft.com/kb/141373/ ) ACC: There Is No License Error Message Starting Microsoft Access
Back to the top

——————————————————————————–

APPLIES TO
Microsoft Access 2000 Standard Edition
Microsoft Access 97 Standard Edition
Back to the top

/////////// OTHERS ARTICLE

You need to install SR2 and Jet 3.5 Sp3.
Microsoft Access Fixes, Patches and Updates
http://www.granite.ab.ca/access/msfixes.htm

Download FILES
http://support.microsoft.com/kb/q172733/

The user interface of JetComp.exe is in English only and is not supported by Microsoft Product Support Services. However, JetComp.exe can be used to compact databases in any language supported by the Microsoft Jet database engine. Jetcomp.exe is a freely distributable utility, but requires that you have one of the following products installed:
Microsoft Office 97
Microsoft Access 97
Microsoft Visual Basic 5.0
A Microsoft Office Developer Edition 97 run-time application that includes the run-time version of Microsoft Access 97
A Microsoft Visual Basic 5.0 run-time application that includes Microsoft Jet database engine 3.5
The following file is available for download from the Microsoft Download Center:

Jet35sp3.exe (http://download.microsoft.com/download/office97pro/sp/1/win98/en-us/jet35sp3.exe)

/////////// OTHERS ARTICLE

Description
To add a date and time to the quote of messages you are replying to:

1.Go to Preferences (on a Mac, at least, and this will be under the main Thunderbird menu)
2.Click on the Advanced icon
3.Stay on the General tab and click the Config Editor… button.
4.Search for reply_header_type
5.Double-click the value field of mailnews.reply_header_type, and
6.Change this from 1 (in my case) to 2.
You’re done!

This should give you the format “On 2/18/09 10:11 PM, Michael Stoll wrote:” leading off the quoting of e-mails to which you reply.

This was found by trial and error, so there may be a drastically simpler way (or better documentation than this already written), but fortunately it only took one try, and I felt so smart I had to share.

Disable and Remove Windows Genuine Advantage Notifications Nag Screen
This page has been updated, visit the new article on how to bypass and disable the WGA or way to make your Windows genuine permanently.

Microsoft has released WGA Notifications application which effectively turned Microsoft Windows operating system into a ‘nagware’, with a “This copy of Windows is not genuine” warning. What the Windows Genuine Advantage Notifications application does what it will check your Microsoft Windows XP validity. If it found that the copy of Windows XP is not validated, not genuine, counterfeit, unlicensed, pirated, illegal, unauthorised or simply failed the Windows Genuine Advantage validation process, then the notification messages will appear at various places and time.

Disclaimer: This article is for informational and educational purpose only, as most information is found on various part of Internet. Readers should contacts Microsoft if their licensed or OEM software cannot be validated or purchase genuine software.

When you log on to a non-genuine copy of Windows XP, the following notification error message “This copy of Windows is not genuine” will pop-up on the logon process:

Gambar 1

And the nicely said “You may be a victim of software counterfeiting” message on the bottom right corner of log-in screen:

Gambar 2

Microsoft allows Windows faithfuls to have 2 options: Get Genuine or Resolve Later. Click on Resolve Later will temporarily bypass the notification and let you login into and use Windows nagged with notification icon and messages, which will randomly appear as balloon notification message with an icon in the notification area (system tray).

Gambar 3

Clicking on the balloon notification or the notification area icon will lead you to the Windows Genuine Advantage Validation Failure Web page that contains the specifics of the validation failure and the steps that you can take to make the operating system genuine.

To get rid of the WGA notifications that intends to remind you that your Windows is not validated, you can buy a validly licensed copy of genuine Microsoft Windows.

Update: Bypass WGA Validation with Crack or Hack and Disable WGA Notifications Warning Message Workarounds

Latest Version: 1.5.554.0 on October 2006 (distribute to some computers with no known roll-out pattern), 1.5.708.0 on September 2006 (distribute to whoever wants to download from Microsoft Download Center), 1.5.540.0 on 28th June 2006, 1.5.532.2 on 6th June 2006, 1.5.532.0 on 30th May 2006, 1.5.530.0 on 23rd May 2006, 1.5.526.0 on 26th April 2006.

More information on WGA Validation Tool (KB892130) and WGA Notifications (KB905474) which install LegitCheckControl.dll, WgaLogon.dll and WgaTray.exe.

With new release of WGA, some methods no longer works, and some has been updated. Several methods that has certain success on certain people, you may try until you success.

Official Method by Microsoft – more information here.

First Method

Lauch Windows Task Manager.
End wgatray.exe process in Task Manager.
Restart Windows XP in Safe Mode.
Delete WgaTray.exe from c:\Windows\System32.
Delete WgaTray.exe from c:\Windows\System32\dllcache.
Lauch RegEdit.
Browse to the following location:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows NT\CurrentVersion\Winlogon\Notify
Delete the folder ‘WgaLogon’ and all its contents
Reboot Windows XP.
Note: With this method, you may be prompted to install WGA Notifications again which can still be unselected.

Second Method

Another alternative suggested by dman is by using System Restore to restore the PC to a previous restore point that WGA Notifications hasn’t kicked in, and then carefully stop KB905474 from been applied to the system. To use System Restore, go to Start -> All Programs -> Accessories -> System Tools -> System Restore.

Note: Again, you may be prompted again to install WGA Notification, so it must be bypassed.

Third Method updated

This method involves using a cracked version of LegitCheckControl.dll to replace the original copy of LegitCheckControl.dll, and thus bypass the WGA validation and make Microsoft believes that your copy of Windows is genuine. To get rid of WGA Notifications warning messages, the patched version of WgaLogon.dll and WgaTray.exe to replace the existing files.

To apply the patch by replacing the files manually, try to end the respective processes in the Task Manager before deleting the existing files. Most likely is you will have to restart your PC in Safe Mode in order to replacing the original copy of LegitCheckControl.dll and related files. However, there has been automatic updater and even cracked WGA installer that automatically apply the patched version of WGA files.

Latest Update for WGA version 1.5.708.0 latest

Download cracked and patched version of LegitCheckControl.dll with thanks to Danny.

Latest Update for WGA version 1.5.554.0 latest

Download cracked and patched version of LegitCheckControl.dll, WgaLogon.dll and WgaTray.exe for v1.5.554.0 of Windows Genuine Advantage Validation Tool and WGA Notifications.

John suggested that it may be rolled out to reduce the frequency of ‘phone home’ feature. BetaNews has confirmed this and says Microsoft has completed the pilot phase for WGA Notifications, officially rolling out the anti-piracy reminders to Windows XP users worldwide. Anyway if Notifications Tools is patched, it won’t callbacks at all. Swissboy found that now there are 15 languages supported for KB905474 and offers solution.

General release version of Windows Genuine Advantage Notifications also has updated EULA which says installing of this update is optional. However, once installed, the update will become a permanent part of your Windows XP software, means you can’t uninstall it. The EULA also confirms that information about your system will be sent to Microsoft. You can just skip installing the KB905474 by clicking “I Decline” when shown the EULA. If you don’t want the Automatic Updates or Windows Updates to try install WGA Notifications again, click Don’t ask me to install these updates again at Decline EULA window.

Latest Update for WGA version 1.5.532.2

Version 1.5.532.2 of WGA Validation Tool and WGA Notifications is NOT YET mass released to all Windows system, so your system may not have this version.

WindowsXP-KB905474-ENU-x86-1.5.532.2-noWGA.exe (as suggested by swissboy) is the original setup of KB905474, but with the 3 files as mentioned above replaced with patched version and re-packed. You can view the contents with WinRAR or 7-Zip. Download here or here. (Removed due to compliant from Microsoft)

LegitCheckControl.dll-v1.5.532.2-Jun-02-2006.zip (as suggested by swissboy) contains hacked version of LegitCheckControl.dll which you have to replace manually over the existing dll in \Windows\System32 folder. Download here or here. (Deleted due to complaint from Microsoft)

new More automated WGA removal tool: RemoveWGA

Latest Update for WGA version 1.5.532.0

LegitCheckControl1.5.532.0.muiz.fixed.rar (suggested by Picard) is the patched LegitCheckControl.dll and can be download here or here (removed due to complaint from Microsoft).

If LegitCheckControl.dll alone doesn’t work, try to patch the other two WGA files too, namely WgaLogon.dll and WgaTray.exe. Download the the patches for 3 files here or here (Removed due to complaint from Microsoft). Overwrite the original files with these hacked version in \Windows\System32 folder. The patch should remove notifications nag screen and allows Windows Update.

There are also several automated tools that save the dirty works of have to manually overwrites and replaces the WGA applications.

WGAPatch905474 (suggested by SilverBullet) contains 905474.exe that will patch Windows to allow access to full (custom) Windows Update and get rid of nag screen. Download 905474.exe here or here (removed due to complaint from Microsoft).

There are also several patched WGANotify KB905474 installation setup which will install KB905474 WGAnotify with the 3 patched WGA files namely LegitCheckControl.dll, WgaLogon.dll and WgaTray.exe. One of them is HotFix windowsxp-kb905474-enu-x86.exe suggested by DeaDMan Walking, which will after install, disable notifications nag screen and allows update. Download here, here or here (removed coz of Microsoft complaint).

WindowsXP-KB905474-ENU-x86-v1.5.532.0-noWGA.exe (suggested by Swissboy) is also the patched KB905474 setup file which is actually the original setup of KB905474, but with the 3 files replaced. Download it here or here (removed due to Microsoft compliant).

Old Updates

Version 1.5.530.0 of cracked LegitCheckControl.dll (suggested by chucko), can also be downloaded here or here (obsolete links, visit here for updates).

Use the latest cracked LegitCheckControl.dll by searching for “Windows.Genuine.Advantage.Validation.v1.5.526.0.CRACKED-ETH0″. Can also be downloaded here (obsolete link, update here). Cracked LegitCheckControl.dll also available here or here (obsolete links, updates available here). Once download the cracked dll, replace the LegitCheckControl.dll in \Windows\System32 folder with the cracked version. You may need to restart your PC in safe mode to replace the files.

Forth Method

Jules found that by disabling and renaming the files ‘WgaLogon.dll’ and ‘WgaTray.exe’ in C:\WINDOWS\system32 folder by using the program Unlocker seems to get rid of all the nags/popups.

Fifth Method

Clear the contents or create a new empty data.dat for WGA, and make data.dat Read-Only and Hidden as detailed here.

The following step basically is the same with the above data.dat method, only different is that you no need to create any file in the WGA data folder:

Launch Windows Explorer and go to C:\Documents and Settings\All Users\Application Data\Windows Genuine Advantage\data
Go to Tools -> Folder Option -> View.
Select (click) Show Hidden Files and Folders option.
Unselect (uncheck) Hide Protected Operating System Files option.
Click OK.
Delete everything in the data folder.
Right click on data folder, and select Properties.
Select (Check) Read-Only as the folder’s atributes.
Click OK or Apply.
Update: After 30 May 2006 with the release of WGA 1.5.532.0, this method no longer works. If the data.dat is set to “Read-Only”, WGA may complains that the serial key from the file could not be read, making the WGA validation failed even with the cracked dll files. So just delete the file (and make sure the folder is not set to “Read-Only”), WGA will then automatically regenerate the file and create the key, so you will pass the validation if you have the correct patched dll installed.

Sixth Method

Another alternative suggest that three files are installed Windows XP System Folder for WGA:

\WINDOWS\system32\WgaLogon.dll
\WINDOWS\system32\WgaTray.exe
\WINDOWS\system32\LegitCheckControl.dll

The wgatray.exe process makes the check for genuine windows software. If WgaLogon.dll is denied execution right, that WinLogon is unable to call it to check on Windows validity and display notification package at boot, and since WgaLogon is also responsible for running and maintaining WgaTray.exe, no more tray popups either.

To change and disable the execute bit of WgaLogon.dll:

Turn off Simple File Sharing in Tools -> Folder Options -> View tab.
Right click WgaLogon.dll in Windows Explorer and open the Security Tab.
Click Advanced button.
Uncheck the Inherit box at the bottom.
Click the Copy button.
Click OK.
Go through each listed user/group and remove the “Read & Execute” permission for WgaLogon.dll, leaving the “Read” permission as-is.
Click OK to apply the permission changes.
Close the file properties dialog.
Restart the computer.
Turn “Use simple file sharing” on (optional).
Optionally, steps suggested by PSNet which has the same effect – disabling WgaLogon.dll.

Note: Visit the a more tidy article on how to bypass and disable the WGA with various tricks and hacks or a host redirect method to make Windows genuine permanently.

Bypass Windows Genuine XP

Pernahkan anda menemukan kendala sa’at mesetup File wmp11-windowsxp-x86-enu.exe diminta,

Validate Windows Genuine XP anda, nah mari kita coba lakukan step step berikut u/ membypass problem tsb :

1. Copy paste file ini didalam notepad dan simpan menjadi Reg.reg

2. Ruuning file Reg.reg

3. Jalankan aplikasi wmp11-windowsxp-x86-enu.exe “Atau” files windows original lain yan anda punyai.

4. Dijamin Cespleng… Mak nyosss kata Om Bondan 🙂

—————————————————-

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]
“OOBETimer”=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd
“LastWPAEventLogged”=hex:d5,07,05,00,06,00,07,00,0f,00,38,00,24,00,fd,02

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
“CurrentBuild”=”1.511.1 () (Obsolete data – do not use)”
“InstallDate”=dword:427cdd95
“ProductId”=”69831-640-1780577-45389”
“DigitalProductId”=hex:a4,00,00,00,03,00,00,00,36,39,38,33,31,2d,36,34,30,2d,\
31,37,38,30,35,37,37,2d,34,35,33,38,39,00,5a,00,00,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,00,0d,04,89,b2,15,1b,c4,ee,62,4f,e6,64,6f,01,00,\
00,00,00,00,27,ed,85,43,a2,20,01,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,31,34,35,30,34,00,00,00,00,00,00,00,ce,0e,\
00,00,12,42,15,a0,00,08,00,00,87,01,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,94,a2,b3,ac
“LicenseInfo”=hex:9e,bf,09,d0,3a,76,a5,27,bb,f2,da,88,58,ce,58,e9,05,6b,0b,82,\
c3,74,ab,42,0d,fb,ee,c3,ea,57,d0,9d,67,a5,3d,6e,42,0d,60,c0,1a,70,24,46,16,\
0a,0a,ce,0d,b8,27,4a,46,53,f3,17
———————————-

DNS – Fedora 6

KONFIGURASI DNS SERVER PADA FEDORA CORE 6

Dibawah ini adalah contoh konfigurasi DNS Server pada Fedora Core 6 (zod)
Dengan : domain wsagung.net
address 192.168.77.5

# nano /etc/resolv.conf
search wsagung.net
nameserver 192.168.77.5

# nano /etc/named.conf
options {
directory “/var/named/”;
allow-query {
127.0.0.1;
192.168.77.0/24;
};
allow-transfer {
192.168.77.5;
};
};

controls {
inet 127.0.0.1 allow { localhost; } keys { rndckey; };
};

zone “.” IN {
type hint;
file “named.ca”;
};

zone “localhost” IN {
type master;
file “localhost.zone”;
allow-update { none; };
};

zone “0.0.127.in-addr.arpa” IN {
type master;
file “named.local”;
allow-update { none; };
};

include “/etc/rndc.key”;

zone “wsagung.net” IN {
type master;
file “/var/named/wsagung.net.zone”;
allow-update { 192.168.77.5; };
};

zone “100.168.192.in-addr.arpa” IN {
type master;
file “/var/named/wsagung.net.local”;
allow-update { 192.168.77.5; };
};

# nano /etc/named.rfc1912.zones

zone “.” IN {
type hint;
file “named.ca”;
};

zone “localhost” IN {
type master;
file “localhost.zone”;
allow-update { none; };
};

zone “0.0.127.in-addr.arpa” IN {
type master;
file “named.local”;
allow-update { none; };
};

# nano /etc/named.caching-nameserver.conf

options {
listen-on port 53 { 127.0.0.1; };
listen-on-v6 port 53 { ::1; };
directory “/var/named”;
dump-file “/var/named/data/cache_dump.db”;
statistics-file “/var/named/data/named_stats.txt”;
memstatistics-file “/var/named/data/named_mem_stats.txt”;
query-source port 53;
query-source-v6 port 53;
allow-query { localhost; };
};
logging {
channel default_debug {
file “data/named.run”;
severity dynamic;
};
};
view localhost_resolver {
match-clients { localhost; };
match-destinations { localhost; };
recursion yes; };
include “/etc/named.rfc1912.zones”;
include “/etc/named.wsagung.net.zones”;
};

# nano /etc/named.wsagung.net.zones

zone “wsagung.net” IN {
type master;
file “/var/named/wsagung.net.zone”;
allow-update { 192.168.77.5; };
};

zone “100.168.192.in-addr.arpa” IN {
type master;
file “/var/named/wsagung.net.local”;
allow-update { 192.168.77.5; };
};

# cp /etc/named.conf /var/named/chroot/etc/

# cp /etc/named.wsagung.net.zones /var/named/chroot/etc/

# cp /var/named/named.local /var/named/wsagung.net.local

# cp /var/named/localhost.zone /var/named/wsagung.net.zone

# nano /var/named/wsagung.net.zone
$TTL 86400
@ IN SOA wsagung.net. root.wsagung.net. (
42 ; serial (d. adams)
3H ; refresh
15M ; retry
1W ; expiry
1D ) ; minimum

IN NS wsagung.net.
IN A 192.168.77.5
www IN CNAME wsagung.net.

# nano /var/named/wsagung.net.local
$TTL 86400
@ IN SOA wsagung.net. root.wsagung.net. (
1997022700 ; Serial
28800 ; Refresh
14400 ; Retry
3600000 ; Expire
86400 ) ; Minimum
IN NS wsagung.net.
1 IN PTR wsagung.net.

# cp /var/named/wsagung.net.zone /var/named/chroot/var/named/

# cp /var/named/wsagung.net.local /var/named/chroot/var/named/

# cp /etc/named.conf /var/named/chroot/etc/

# cp /etc/named.wsagung.net.zones /var/named/chroot/etc/

# chown named:named /var/named

# chown named:named /var/named/chroot/

# chmod 775 /var/named/

# chmod 775 /var/named/wsagung.net.zone

# chmod 775 /var/named/wsagung.net.local

# service named start

# dig wsagung.net

# nslookup wsagung.net

# nslookup www.wsagung.net

Load Balancing

Loadbalancing
October 3, 2007 ferry
Saya membuat sebuah server loadbalancing dan server tersebut juga digunakan sebagai PROXY, DNS Caching Name Server, Bandwith Management dan FIREWALL

Loadbalancing menggunakan iproute2?
Squid menggunakan Squidcache
DNS Caching Name Server menggunakan Bind
Bandwith Management menggunakan CBQ
Firewall menggunakan IPTABLES

Untuk loadbalancing saya menggunakan 2 koneksi ke ISP yang berbeda, yang sebelumnya menggunakan 4 koneksi :D, tetapi 2 koneksi telah di putus karena

Untuk bandwith yang di gunakan adalah :

1. ISP 1 int = 265 1/1? iix = unknown
2. ISP 2 int = 256 1/2? iix = 1024 1/1?

Sekarang kita tentukan policy routing yang akan di gunakan.

1. Untuk pengaksesan Web akan dilarkan ke 2 isp yang entah itu tujuan international dan local.
2. Untuk Game Online akan dilarikan ke isp yang ke 2.
3. Untuk Chatting menggunakan YM, MSN dan IRC akan di larikan ke isp 1 dan 2 berarti kita akan memilih sendiri.

Nah itu policy routing yang akan di berlakukan.

Yuke mari
Ok sekarang mulai dengan configurasi iproute terlebih dahulu.

IP Address:
eth0 192.168.2.1 netmask 255.255.255.0
eth1 ipisp1 netmask 255.255.255.128 gateway 202.73.110.xxx
eth2 116.0.4.xxx netmask 255.255.255.xxx gateway 116.0.4.xxx

Sekarang kita harus membuat nama rule untuk setiap isp kedalam table iproute.

echo 212 isp1 >> /etc/iproute2/rt_tables
echo 213 isp2 >> /etc/iproute2/rt_tables
echo 214 chatting >> /etc/iproute2/rt_tables

Ok sekarang kita masukkan table routing untuk setiap rule.

rule untuk isp1

ip route add ip_isp1/25 dev eth1 src ip_isp1 table isp1
ip route add default via gateway table gw_isp1

rule untuk isp2

ip route add ip_isp2/24 dev eth1 src ip_isp2 table isp2
ip route add default via gateway table gw_isp2

rule untuk table chatting

Untuk table ym ini agak sedikit berbeda dengan yang ada diatas karena kita akan menggunakan firewall untuk mengmarking seluruh koneksi ym ke isp1 / isp2

configurasi firewall untuk mark ym

iptables -A PREROUTING -i eth0 -j mangle -p tcp dport 5050,1863 -j MARK set-mark 2

Policy routing untuk chatting lewat isp1

ip rule add fwmark 2 table chatting
ip route add default via gw_isp1 dev eth1 table chatting

Policy routing untuk chatting lewat isp2

ip rule add fwmark 2 table chatting
ip route add default via gw_isp2 dev eth2 table chatting

Sekarang kita sudah membuat semua table dan rule untuk koneksi Web dan chatting, terus bagaimana dengan policy untuk game local ?, yuke mari kita lihat sama-sama.

Policy untuk game online kita membutuhkan list ip semua game online dengan mendownloadnya di :

wget ftp-user=oixp ftp-password=oixpsableng ftp://58.65.244.5/IIX.txt -O /root/bin/IIX.txt &> /dev/null

sekarang kita sudah mendapatkan list ip yang dibutuhkan, rulenya seperti ini :

ip route add $IIX via gw_isp2

kalo dilihat kenapa untuk rule iix itu depannya ada tanda $ yah karena eh karena semua ini berada di dalam script shell :D.

Ok sekarang masuk ke loadbalancingna

ip rule add from ip_isp1 table isp1
ip rule add from ip_isp2 table isp2
ip route add default scope global nexthop via gw_isp1 dev eth1 weight 1 nexthop via gw_isp2 dev eth2 weight 1

Terakhir kita harus mengflush semua table

ip route flush cache

ok selesai sudah loadbalancing kita, simple kan :D. Sekarang cek table routing anda dengan command :

ip route list

lihat pada baris terakhir semua gateway di set 1 kan, berarti ?

Yah untuk saat ini sekian dulu besok kita sambung lagi yah. JANJI

Posted in Uncategorized. No Comments

I Forgot My Administrator Password!

Image
 Can’t Log On to Windows XP?

If that’s your only problem, then you probably have nothing to worry about. As long as you have your Windows XP CD, you can get back into your system using a simple but effective method made possible by a little known access hole in Windows XP.

This method is easy enough for newbies to follow – it doesn’t require using the Recovery Console or any complicated commands. And it’s free – I mention that because you can pay two hundred dollars for an emergency download of Winternals ERD with Locksmith which is a utility for unlocking lost Windows passwords. See here http://www.winternals.com/products/repairandrecovery/locksmith.asp

ERD is an excellent multi purpose product, but you should know it is not a necessary one if you have a healthy system and your sole problem is the inability to logon to Windows due to a forgotten password. Not necessary because you can easily change or wipe out your Administrator password for free during a Windows XP Repair. Here’s how with a step-by-step description of the initial Repair process included for newbie’s.

1. Place your Windows XP CD in your cd-rom and start your computer (it’s assumed here that your XP CD is bootable – as it should be – and that you have your bios set to boot from CD)

2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”

3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.

4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now

5. The Licensing Agreement comes next – Press F8 to accept it.

6. The next screen is the Setup screen which gives you the option to do a Repair.

It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”

Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.

7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.

8. Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”

9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.

10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.

11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.

12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you’ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).

13. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact.

I tested the above on Windows XP Pro with and without SP1 and also used this method in a real situation where someone could not remember their password and it worked like a charm to fix the problem. This security hole allows access to more than just user accounts. You can also access the Registry and Policy Editor, for example. And its gui access with mouse control. Of course, a Product Key will be needed to continue with the Repair after making the changes, but for anyone intent on gaining access to your system, this would be no problem.

And in case you are wondering, NO, you cannot cancel install after making the changes and expect to logon with your new password.

Cancelling will just result in Setup resuming at bootup and your changes will be lost.

Ok, now that your logon problem is fixed, you should make a point to prevent it from ever happening again by creating a Password Reset Disk. This is a floppy disk you can use in the event you ever forget your log on password. It allows you to set a new password.

Here’s how to create one if your computer is NOT on a domain:

  • Go to the Control Panel and open up User Accounts.
  • Choose your account (under Pick An Account to Change) and under Related Tasks, click “Prevent a forgotten password”.
  • This will initiate a wizard.
  • Click Next and then insert a blank formatted floppy disk into your A: drive.
  • Click Next and enter your logon password in the password box.
  • Click Next to begin the creation of your Password disk.
  • Once completed, label and save the disk to a safe place

How to Log on to your PC Using Your Password Reset Disk

Start your computer and at the logon screen, click your user name and leave the password box blank or just type in anything. This will bring up a Logon Failure box and you will then see the option to use your Password Reset disk to create a new password. Click it which will initiate the Password Reset wizard. Insert your password reset disk into your floppy drive and follow the wizard which will let you choose a new password to use for your account.

Note: If your computer is part of a domain, the procedure for creating a password disk is different.

See here for step by step instructions: http://support.microsoft.com/default.aspx?scid=KB;en-us;306214&

SQUID-SRG

[root@proxy agung]# more /etc/squid/squid.conf
# by CA 25 Jun 2007
# Squid 2.5

http_port 3128 80 8081 1000
icp_port 3130
udp_incoming_address 0.0.0.0
udp_outgoing_address 255.255.255.255
icp_query_timeout 0
maximum_icp_query_timeout 9000
mcast_icp_query_timeout 9000
hierarchy_stoplist cgi-bin ?
acl QUERY urlpath_regex cgi-bin \?
no_cache deny QUERY
cache_mem 32 MB
cache_swap_low 80%
cache_swap_high 100%
maximum_object_size 1024 KB
#minimum_object_size 4 KB
#maximum_object_size_in_memory 8 KB

#ipcache_size 4096
#ipcache_low 90
#ipcache_high 95
#fqdncache_size 4096
cache_replacement_policy lru
memory_replacement_policy lru
cache_dir diskd /cache 6000 14 256 Q1=64 Q2=72
cache_access_log /var/log/squid/access.log
cache_log /var/log/squid/cache.log
cache_store_log none
negative_ttl 2 minutes
emulate_httpd_log on
log_ip_on_direct on
pid_filename /var/run/squid.pid
debug_options ALL,1
log_fqdn off
client_netmask 255.255.255.255
# ftp_user  user@planta.com
ftp_passive on

# dns_retransmit_interval 5 seconds
dns_retransmit_interval 5 seconds
dns_timeout 5 minutes
diskd_program /usr/lib/squid/diskd
unlinkd_program /usr/lib/squid/unlinkd
redirect_rewrites_host_header on
request_header_max_size 10 MB
request_body_max_size 10 MB
auth_param basic children 5
auth_param basic realm squid proxy-caching web server
auth_param basic credentialsttl 2 hours

refresh_pattern         \.(gif|jpg|jpeg)$               600 80% 86400
refresh_pattern         \.(xbm|xpm|ico|tiff)$           600 80% 86400
refresh_pattern         \.(au|snd|wav|ra|mid)$          600 80% 86400
refresh_pattern         \.(qt|mov|avi|mpeg)$            600 80% 86400
refresh_pattern         \.(iv|wrl|vrml)$                600 80% 86400
refresh_pattern         \.(z|qz)$                       600 80% 86400
refresh_pattern         \.(hqx|bin)$                    600 80% 86400
refresh_pattern         \.(tar|zip)$                    600 80% 86400
refresh_pattern         ^http://                        30 50% 86400
refresh_pattern         ^ftp://                         30 50% 86400
refresh_pattern         .                               30 30% 43200

quick_abort_min 128 KB
quick_abort_max 4096 KB
quick_abort_pct 75
negative_ttl 1 minutes
range_offset_limit 0 KB
half_closed_clients off
shutdown_lifetime 30 seconds

#———————#
#BLOCKING WEBSITES
#———————#
acl bad url_regex “/etc/squid/block.acl”
http_access deny bad
#——————–#

# Tambahan
acl domainapprove url_regex -i “/etc/squid/domain-approve.txt”
acl browsesaja url_regex -i “/etc/squid/browseonly.txt”

acl all src 0.0.0.0/0.0.0.0
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/16

acl fullakses src 192.168.168.100/255.255.255.255
acl fullakses src 192.168.168.168/255.255.255.255
acl gpiadmin src 192.168.77.80/255.255.255.255

# Full Akses User
acl fullakses5 src 192.169.1.4/255.255.255.255           # Agus Win – GM
acl fullakses6 src 192.169.1.6/255.255.255.255          # Ari -IT

# Limited Akses User
acl limitedakses src 192.169.1.97/255.255.255.255       # Agung – ZIS
acl limitedaksessore src 192.169.1.5/255.255.255.255    # Andi – ZIS
acl browseonly6 src 192.169.1.17/255.255.255.255         # BO Andreas – ZIS
acl browseonly src 192.169.1.44/255.255.255.255         # BO Ares – ZIS
acl browseonly src 192.169.1.56/255.255.255.255         # BO Yanuar – Doc Cosco
acl browseonly src 192.169.1.155/255.255.255.255        # Heri – 21Jan08
acl limitedakses src 192.169.1.117/255.255.255.255      # Hasto – ZIS
acl browseonly src 192.169.1.89/255.255.255.255         # BO Inung – OGS
acl limitedaksessore src 192.169.1.209/255.255.255.255  # Yanti – OGS
# acl limitedakses src 192.169.1.23/255.255.255.255     # Rudy – SRG
acl limitedaksessore src 192.169.1.7/255.255.255.255    # Dodit – ZIS
acl limitedaksessore src 192.169.1.37/255.255.255.255   # Christine – ZIS
acl limitedakses src 192.169.1.14/255.255.255.255       # Kristianto – SRG
acl limitedaksessore src 192.169.1.15/255.255.255.255   # Ardyan-Sales
acl limitedaksessore src 192.169.1.8/255.255.255.255    # Rike – Sales
acl limitedaksessore src 192.169.1.18/255.255.255.255   # Tommy – Sales Cosco
acl limitedakses src 192.169.1.11/255.255.255.255       # Retno – Acc 14Jan08
acl browseonly src 192.169.1.120/255.255.255.255        # Ira – Sales 25jan08

#acl limitedakses src 192.169.1.2/255.255.255.255       # Audit – jkt

acl ssl_ports port 443 563
acl safe_ports port 80
acl safe_ports port 1000
acl safe_ports port 8081
acl safe_ports port 21
acl safe_ports port 443 563
acl safe_ports port 70
acl safe_ports port 210
acl safe_ports port 3128
acl safe_ports port 1025-65535
acl safe_ports port 280
acl safe_ports port 488
acl safe_ports port 591
acl safe_ports port 777

acl 5harikerja time MTWHF 08:00-18:00
acl 5harisore time MTWHF 15:00-18:00
acl 6harikerja time MTWHFA 08:00-18:00
acl CONNECT method CONNECT
http_access allow manager localhost to_localhost
http_access deny manager
http_access deny !safe_ports

http_access allow fullakses5 5harikerja
http_access allow fullakses6 6harikerja
http_access allow limitedakses domainapprove 5harikerja
http_access allow limitedaksessore domainapprove 5harisore
http_access allow browseonly browsesaja 5harikerja
http_access allow browseonly6 browsesaja 6harikerja
http_access allow gpiadmin

#———————#
#BLOCKING WEBSITES
#———————#
acl bad url_regex “/etc/squid/block.acl”
http_access deny bad
http_access allow gpiadmin
#——————–#
# tambahan
#http_access deny domainterlarang !boleh

http_access deny all
icp_access allow fullakses
icp_access deny all
reply_body_max_size 0 allow all
cache_mgr agung@gpi-g.com
cache_effective_user squid
cache_effective_group squid
visible_hostname cache.palanta.com
httpd_accel_host virtual
httpd_accel_port 80
httpd_accel_port 1000
httpd_accel_single_host off
httpd_accel_with_proxy on
httpd_accel_uses_host_header on
query_icmp off
test_reachability off
buffered_logs on
reload_into_ims on
ie_refresh off

[root@proxy agung]#

SQUID

[agung@it ~]$ more /etc/squid/squid.conf
# Powerd by GPI IT Team – CA
# Squid 2.5

http_port 443 445 563 3128 80 8081 9280
icp_port 3130
udp_incoming_address 0.0.0.0
udp_outgoing_address 255.255.255.255
icp_query_timeout 0
maximum_icp_query_timeout 9000
mcast_icp_query_timeout 9000
hierarchy_stoplist cgi-bin ?
acl QUERY urlpath_regex cgi-bin \?
no_cache deny QUERY
cache_mem 32 MB
cache_swap_low 80%
cache_swap_high 100%
maximum_object_size 1024 KB
#minimum_object_size 4 KB
#maximum_object_size_in_memory 8 KB

#ipcache_size 4096
#ipcache_low 90
#ipcache_high 95
#fqdncache_size 4096
cache_replacement_policy lru
memory_replacement_policy lru
#cache_dir diskd /cache 6000 14 256 Q1=64 Q2=72
cache_access_log /var/log/squid/access.log
cache_log /var/log/squid/cache.log
cache_store_log none
negative_ttl 2 minutes
emulate_httpd_log on
log_ip_on_direct on
pid_filename /var/run/squid.pid
debug_options ALL,1
log_fqdn off
client_netmask 255.255.255.255
# ftp_user  user@planta.com
ftp_passive on

# dns_retransmit_interval 5 seconds
dns_retransmit_interval 5 seconds
dns_timeout 5 minutes
diskd_program /usr/lib/squid/diskd
unlinkd_program /usr/lib/squid/unlinkd
redirect_rewrites_host_header on
request_header_max_size 10 MB
request_body_max_size 10 MB
auth_param basic children 5
auth_param basic realm squid proxy-caching web server
auth_param basic credentialsttl 2 hours
refresh_pattern         \.(gif|jpg|jpeg)$               600 80% 86400
refresh_pattern         \.(xbm|xpm|ico|tiff)$           600 80% 86400
refresh_pattern         \.(au|snd|wav|ra|mid)$          600 80% 86400
refresh_pattern         \.(qt|mov|avi|mpeg)$            600 80% 86400
refresh_pattern         \.(iv|wrl|vrml)$                600 80% 86400
refresh_pattern         \.(z|qz)$                       600 80% 86400
refresh_pattern         \.(hqx|bin)$                    600 80% 86400
refresh_pattern         \.(tar|zip)$                    600 80% 86400
refresh_pattern         ^http://                        30 50% 86400
refresh_pattern         ^ftp://                         30 50% 86400
refresh_pattern         .                               30 30% 43200
quick_abort_min 128 KB
quick_abort_max 4096 KB
quick_abort_pct 75
negative_ttl 1 minutes
range_offset_limit 0 KB
half_closed_clients off
shutdown_lifetime 30 seconds

#———————#
#BLOCKING WEBSITES
#———————#

#-> acl full100 src 192.168.77.82/255.255.255.255
#-> http_access allow full100

#-> acl bad url_regex “/etc/squid/block.acl”
#-> http_access deny bad
#——————–#

# Tambahan
acl domainapprove url_regex -i “/etc/squid/domain-approve.txt”
acl chating url_regex -i “/etc/squid/chating.txt”
acl browseistirahat url_regex -i “/etc/squid/browseistirahat.txt”
acl browsega url_regex -i “/etc/squid/browsega.txt”
acl godotid url_regex -i “/etc/squid/goid.txt”
acl hrdbrowse url_regex -i “/etc/squid/hrdbrowse.txt”
acl itbrowse url_regex -i “/etc/squid/itbrowse.txt”
acl all src 0.0.0.0/0.0.0.0
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/16

acl fullakses src 192.168.0.3/255.255.255.255
acl gpiadmin src 192.168.77.80/255.255.255.255

# Khsusu Chating
# ————————————————————————
# acl meebo src 192.168.77.82/255.255.255.255           # Avan
# acl meebo src 192.168.1.11/255.255.255.255            # Sukhamta
acl meebo src 192.168.1.50/255.255.255.255              # Fikian
# Visitor – GPI
# ————————————————————————
acl fullakses src 192.168.29.29/255.255.255.255         # Vis-Hendra Santoso
# Top Managemen – GPI Group
# ————————————————————————
acl fullakses src 192.168.126.8/255.255.255.255         # Corp-Lek
acl fullakses src 192.168.128.128/255.255.255.255       # Corp-Mikradj
acl full100 src 192.168.1.2/255.255.255.255             # Corp-Sani
acl fullakses src 192.168.1.3/255.255.255.255           # Corp-Esther
acl fullakses src 192.168.4.126/255.255.255.255         # Corp-Pinawaty
acl fullakses src 192.168.1.32/255.255.255.255          # Corp-Jhoni
acl limitedakses src 192.168.29.21/255.255.255.255      # Corp-Didik
acl fullakses src 192.168.29.3/255.255.255.255          # Corp-Eddyw
acl fullakses src 192.168.126.1/255.255.255.255         # Corp-Hendra K

# GPI HRD/GA (HRD/GA)
# ————————————————————————
acl fullakses src 192.168.12.126/255.255.255.255        # HRD-Irene
acl gaakses src 192.168.8.8/255.255.255.255             # GA-Bagus
acl hrdakses src 192.168.12.3/255.255.255.255           # HRD-Nurce
acl hrdakses src 192.168.12.8/255.255.255.255           # HRD-Dinda
# GPI Data Centre ( GDC )
# ————————————————————————
acl fullakses src 192.168.0.11/255.255.255.255          # GDC-Yanti Blt
# Global Perkasa ( GPK )
# ————————————————————————
acl fullakses src 192.168.130.130/255.255.255.255       # GPK-Sugiarti
acl fullakses src 192.168.26.6/255.255.255.255          # GPK-Yuliana
acl fullakses src 192.168.26.8/255.255.255.255          # GPK-Paulus
# Global Quality Logistics ( GQL )
# ————————————————————————
acl fullakses src 192.168.16.126/255.255.255.255        # GQL-Bobby
acl fullakses src 192.168.16.30/255.255.255.255         # GQL-Mthenu
acl fullakses src 192.168.16.19/255.255.255.255         # GQL-Salome
# GPI Express ( GPE )
# ————————————————————————
acl fullakses src 192.168.15.126/255.255.255.255        # GPE-Sewi

# GPI AIT – Freight ( AIT )
# ————————————————————————
acl fullakses src 192.168.15.26/255.255.255.255        # AIT-Warnet

# Coslink ( CSI )
# ————————————————————————
acl full100 src 192.168.11.126/255.255.255.255  # CSi-Hendy
# GPIL Tuna
# ————————————————————————
acl limitedakses src 192.168.11.2/255.255.255.255       # TNA-Egi
acl limitedakses src 192.168.11.6/255.255.255.255       # TNA-AdyNugros
acl fullakses src 192.168.11.20/255.255.255.255         # TNA-Yusuf

# GPI IT ( GIT )
# ————————————————————————
acl itakses src 192.168.77.78/255.255.255.255           # GIT-Ferry
acl itakses src 192.168.13.146/255.255.255.255          # GIT-Ryan
acl itakses src 192.168.168.168/255.255.255.255         # GIT-Andar
acl itakses src 192.168.77.27/255.255.255.255           # GIT-Anung

# FinAcc Dept ( FAD ) = 7 users
# ————————————————————————
acl fullakses src 192.168.126.9/255.255.255.255         # Corp-Tjandra S
acl fullakses src 192.168.90.90/255.255.255.255         # FAD-Diah Trimurti
acl fullakses src 192.168.1.4/255.255.255.255           # FAD-Lim Hendra
acl fullakses src 192.168.1.21/255.255.255.255          # FAD-Vishnu
acl limitedakses src 192.168.1.20/255.255.255.255       # FAD-Doddy
acl full100 src 192.168.1.24/255.255.255.255            # FAD-Lina

# GPI Indologistics ( GPIL )
# ————————————————————————
acl fullakses src 192.168.16.3/255.255.255.255          # GPIL-Diana

# Logistics ( LOG )
# ————————————————————————
acl fullakses src 192.168.126.10/255.255.255.255        # LOG-Harry Chan
acl fullakses src 192.168.17.7/255.255.255.255          # LOG-Nizar
acl fullakses src 192.168.17.50/255.255.255.255         # LOG-Warnet

# Orient Express Container ( OEC )
# ————————————————————————
acl fullakses src 192.168.7.126/255.255.255.255         # OEC-Hasan Sung
acl fullakses src 192.168.7.198/255.255.255.255         # OEC-Fajar
acl limitedakses src 192.168.7.17/255.255.255.255       # OEC-Helen
acl fullakses src 192.168.7.254/255.255.255.255         # OEC-Wahyudin
acl limitedakses src 192.168.7.9/255.255.255.255        # OEC-Renald
acl limitedakses src 192.168.7.30/255.255.255.255       # OEC-Fitri

# Air Tiger Express ( ATE )
# ————————————————————————
acl fullakses src 192.168.6.124/255.255.255.255         # ATE-Hasan
acl fullakses src 192.168.6.16/255.255.255.255          # ATE-Linda
acl fullakses src 192.168.6.1/255.255.255.255           # ATE-Sisca
acl fullakses src 192.168.6.22/255.255.255.255          # ATE-Merry
acl fullakses src 192.168.6.167/255.255.255.255         # ATE-Warnet
acl fullakses src 192.168.6.30/255.255.255.255          # ATE-Dewi / 25sep07

# Taxes ( TAX )
# ————————————————————————
acl fullakses src 192.168.5.2/255.255.255.255           # TAX-Lily Farida
acl limitedakses src 192.168.5.14/255.255.255.255       # TAX-Lucky
acl limitedakses src 192.168.5.10/255.255.255.255       # TAX-Toni
acl limitedakses src 192.168.5.9/255.255.255.255        # TAX-Maria

# Translink ( TGM )
# ————————————————————————
acl fullakses src 192.168.10.126/255.255.255.255        # TGM-Richard Liem
acl fullakses src 192.168.10.79/255.255.255.255         # TGM-Bambang

# GPIM Fuhai ( FUH )
# ————————————————————————
acl fullakses src 192.168.14.126/255.255.255.255        # FUH-Jeffrey

# GPI Legal ( LEGAL )
# ————————————————————————
acl fullakses src 192.168.19.4/255.255.255.255          # LEGAL-Ervi
acl fullakses src 192.168.19.5/255.255.255.255          # LEGAL-Tjahyo-6Nov7

# Global Trans ( GTR )
# ————————————————————————
acl fullakses src 192.168.9.126/255.255.255.255         # GTR-Kamal
acl goid src 192.168.9.15/255.255.255.255               # GTR-Inez
# Rich Indo Shipping ( RIS )
# ————————————————————————
acl fullakses src 192.168.4.1/255.255.255.255           # RIS-Markus
acl limitedakses src 192.168.4.7/255.255.255.255        # RIS-Indah Yune
acl goid src 192.168.4.6/255.255.255.255                # RIS-Yudith

# Punokawan ( Bagong/Petruk )
# ————————————————————————
acl istirahat src 192.168.1.107/255.255.255.255         # Otoy
acl istirahat src 192.168.1.181/255.255.255.255         # Budi Gede
acl fullakses src 192.168.1.95/255.255.255.255          # Stevandy

#acl fullakses src 192.168.2.17/255.255.255.255         # Ilham nitip
#acl fullakses src 192.168.2.10/255.255.255.255         # Anis Nitip
acl fullakses src 192.168.168.200/255.255.255.255       # Jawir
acl ssl_ports port 443 445 563 9280 80
acl safe_ports port 80
acl safe_ports port 1000
acl safe_ports port 8081
acl safe_ports port 21
acl safe_ports port 443 445 563
acl safe_ports port 70
acl safe_ports port 210
acl safe_ports port 3128
acl safe_ports port 1025-65535
acl safe_ports port 280
acl safe_ports port 488
acl safe_ports port 591
acl safe_ports port 777
acl safe_ports port 9280

acl waktumakan time 12:00-13:30
acl waktupulang time 16:30-21:00

acl CONNECT method CONNECT

#acl fullnonchating src 192.168.50.100/255.255.255.255

#acl full100 src 192.168.77.82/255.255.255.255
http_access allow full100
acl itblock url_regex “/etc/squid/itblock.acl”
http_access deny itblock
http_access allow meebo chating
http_access allow goid godotid
http_access allow gaakses browsega
http_access allow hrdakses hrdbrowse
http_access allow itakses itbrowse
http_access allow istirahat waktumakan browseistirahat
http_access allow istirahat waktupulang browseistirahat
acl bad url_regex “/etc/squid/block.acl”
http_access deny bad
http_access allow manager localhost to_localhost
http_access deny manager
http_access deny !safe_ports

http_access allow fullakses

acl bad1 url_regex “/etc/squid/block1.acl”
http_access deny bad1

acl fullnonchating src 192.168.50.100/255.255.255.255
http_access allow fullnonchating

http_access allow limitedakses domainapprove
http_access allow gpiadmin
http_access allow meebo chating

#http_access allow istirahat waktumakan browseistirahat
#http_access allow istirahat waktupulang browseistirahat
http_access allow full100
#———————#
#BLOCKING WEBSITES
#———————#
#acl bad url_regex “/etc/squid/block.acl”
#http_access deny bad
#http_access allow gpiadmin
#——————–#
# tambahan
#http_access deny domainterlarang !boleh
http_access deny all
icp_access allow fullakses
icp_access deny all
reply_body_max_size 0 allow all
cache_mgr agung@gpi-g.com
cache_effective_user squid
cache_effective_group squid
visible_hostname www.gpi-g.com
httpd_accel_host virtual
httpd_accel_port 80
httpd_accel_port 1000
httpd_accel_port 9280
httpd_accel_single_host off
httpd_accel_with_proxy on
httpd_accel_uses_host_header on
query_icmp off
test_reachability off
buffered_logs on
reload_into_ims on
ie_refresh off

[agung@it ~]$

[root@qmail agung]#vim /etc/rc.d/rc.firewall                                                             
# Variables                                                  
IPTABLES=”/sbin/iptables”                                    
RANGE_IP=”192.168.0.0/16″                                    
DNS_IP=”202.169.51.115″                                      
MAIL_IP=”202.169.51.116″                                     
WEB_IP=”202.169.51.117″                                      
                                                             
# Menjalankan iptables                                       
echo “1” > /proc/sys/net/ipv4/ip_forward                     
                                                             
                                                             
# Penghapusan setting yang ada ( Setting ulang )             
#$IPTABLES -P INPUT ACCEPT                                   
#$IPTABLES -P FORWARD ACCEPT                                 
#$IPTABLES -P OUTPUT ACCEPT                                  
/sbin/iptables -P INPUT ACCEPT                               
/sbin/iptables -P FORWARD ACCEPT                             
/sbin/iptables -P OUTPUT ACCEPT                              
                                                             
# Penghapusan aturan yang ada ( setting ulang )              
#$IPTABLES -t nat -P POSTROUTING ACCEPT                      
#$IPTABLES -t nat -P PREROUTING ACCEPT                       
#$IPTABLES -t nat -P OUTPUT ACCEPT                           
/sbin/iptables -t nat -P POSTROUTING ACCEPT                  
/sbin/iptables -t nat -P PREROUTING ACCEPT                   
/sbin/iptables -t nat -P OUTPUT ACCEPT                       
# membatalkan semua aturan filter dan nat iptables ( flushing )
#$IPTABLES -F                                                
#$IPTABLES -t nat -F                                         
/sbin/iptables -F                                            
/sbin/iptables -t nat -F                                     

# membatalkan semua mata rantai yang tidak terdapat pada filter dan iptables
#$IPTABLES -X                                                
#$IPTABLES -t nat -X                                         
/sbin/iptables -X                                            
/sbin/iptables -t nat -X                                     
# Menjalankan Script                                         
#$IPTABLES -t nat -A POSTROUTING -s $RANGE_IP -d $DNS_IP -j MASQUERADE
#$IPTABLES -t nat -A POSTROUTING -s $RANGE_IP -d $MAIL_IP -j MASQUERADE   
#$IPTABLES -t nat -A POSTROUTING -s $RANGE_IP -d $WEB_IP -j MASQUERADEQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.0/16 -d 202.169.51.115 -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.0/16 -d 202.169.51.116 -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.0/16 -d 202.169.51.117 -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.0/0 -d mail4web.gpi-g.com -j MASQUERADE
# MDAEMON GPIEXPRESS (IBM2000)                               
/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.0/0 -d 202.169.51.118 -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.0/0 -d mail.gpifreight.com -jMASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.168.100 -d 0.0.0.0/0 -j MASQUERADE

# Pak miki
/sbin/iptables -t nat -A POSTROUTING -s 192.168.126.126 -d 0.0.0.0/0 -j MASQUERADE
#/sbin/iptables -t nat -A POSTROUTING -s 192.168.126.111 -d 0/0 -j MASQUERADE

# Proxy I – 88.1                                             
#/sbin/iptables -t nat -A POSTROUTING -s 192.168.88.1 -d 0.0.0.0/0 -j MASQUERADE

# Proxy II – 99.1                                           
#/sbin/iptables -t nat -A POSTROUTING -s 192.168.99.1 -d 0.0.0.0/0 -j MASQUERADE

# Pak Sumadi
/sbin/iptables -t nat -A POSTROUTING -s 192.168.1.3 -d 0.0.0.0/0 -j MASQUERADE

# Mr. Lek
/sbin/iptables -t nat -A POSTROUTING -s 192.168.126.8 -d 0.0.0.0/0 -j MASQUERADE
# Pak Anam
/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.8 -d 0.0.0.0/0 -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.9 -d 0.0.0.0/0 -j MASQUERADE

# Laptop Acer                                                
#/sbin/iptables -t nat -A POSTROUTING -s 192.168.77.80 -d 0.0.0.0/0 -j MASQUERADE
# Pak Tri
/sbin/iptables -t nat -A POSTROUTING -s 192.168.77.77 -d 0.0.0.0/0 -j MASQUERADE

# Server Proxy Squid
/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.2 -d 0/0 -j MASQUERADE 

/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.0/16 -d 202.169.51.115 -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.0.0/16 -d www.gpi-g.com -j MASQUERADE

/sbin/iptables -t nat -A POSTROUTING -s 192.168.168.168 -d 61.8.77.2 -j MASQUERADE

/sbin/iptables -t nat -A POSTROUTING -s 192.168.168.168 -d 202.51.215.226 -j MASQUERADE

# Hendy Coslink                                             
#/sbin/iptables -t nat -A POSTROUTING -s 192.168.11.126 -d 0/0 -j MASQUERADE

# PInawati
/sbin/iptables -t nat -A POSTROUTING -s 192.168.4.126 -d 0/0 -j MASQUERADE

# FTP Ryan
/sbin/iptables -t nat -A POSTROUTING -s 192.168.13.146 -d cms.gpi-g.com -j MASQUERADE

/sbin/iptables -t nat -A POSTROUTING -s 192.168.1.21 -d velocity.banknisp.com -j MASQUERADE

# Diana – GPIL
/sbin/iptables -t nat -A POSTROUTING -s 192.168.16.3 -d www2.ccnhub.com -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.16.3 -d www.cargoportalservices.com -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.16.3 -d www.ccnhub.com -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.16.3 -d www3.ccnhub.com -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.13.146 -d www.rentacoder.com -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 192.168.16.3 -d 0/0 -j MASQUERADE
/sbin/iptables -t nat -A POSTROUTING -s 0/0 -d mail2web.gpi-g.com -j MASQUERADE
[root@qmail agung]#

Design a site like this with WordPress.com
Get started