01/2017 SWISSCOM Aproved A, V-DSL Router/Modem

One of the most sold Routers in Germany and Switzerland the Fritzbox model 7390 is not Aproved anymore on swiss DSL lines.

Extract from file: bbcs_supporting-documentproved-equipmentv14-15.pdf

 

 

Recently tested BBCS (ADSL, ADSL2+, VDSL2, VDSL2 G.vector, G.fast) equipment

 

 

1.1 xDSL-modems and routers

 

The xDSL Equipment mentioned in the list, are tested and approved by Swisscom (Switzerland) Ltd.

Swisscom recommends the End User to use the xDSL modems and routers tested and approved by Swisscom (Switzerland) Ltd.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

1.2     Not-Approved VDSL-modems and routers

 

The xDSL equipment mentioned in the list, are tested and but did not met some necessary VDSL requirements of Swisscom (Switzerland) Ltd for approval. Swisscom(Switzerland) Ltd.

will accept further usage only with under terms and conditions of a valid and countersigned declaration " Erklärung der FDA in Bezug auf den Weiterbetrieb der Fritzbox 7390".

 

 

 

 

 

 

2    BBCS approved ADSL equipment

 

 

2.1    ADSL-modems and routers for POTS

 

The ADSL equipments mentioned in the list, are tested and approved by Swisscom (Switzerland) Ltd.

Swisscom recommends the End User to use the ADSL modems and routers tested and approved by Swisscom (Switzerland) Ltd.

 

 

Type of

Equipment

Type / Description

DHCP / PPP

ADSL

@IP DSLAM

Manufacturer

Link Documentation

ADSL over

POTS

SpeedTouch Home

Ethernet interface

PPP only

Thomson (Alcatel)

www.speedtouch.com

ADSL over

POTS

SpeedTouch Pro (also with Firewall) Router; Ethernet interface

PPP only

Thomson (Alcatel)

www.speedtouch.com

ADSL over

POTS

SpeedTouch 530

Ethernet and USB interface

PPP only

Thomson

www.speedtouch.com

ADSL over

POTS

SpeedTouch 536

Ethernet and USB interface

PPP only

Thomson

www.speedtouch.com

ADSL over

POTS

SpeedTouch 580

WLAN 802.11g, USB and Ethernet 4 Port interfaces

PPP only

()

Thomson

www.speedtouch.com

ADSL over

POTS

Cisco 827

Router; Ethernet interface

PPP only

()

Cisco

www.cisco.com/univercd/cc/td/doc/pcat/827.ht m

 

Type of

Equipment

Type / Description

DHCP / PPP

ADSL

@IP DSLAM

Manufacturer

Link Documentation

ADSL over

POTS

Cisco 837

Router; Ethernet interface

PPP only

()

Cisco

www.cisco.com/univercd/cc/td/doc/product/acce ss/acs_fix/837/qsg/837qsg.htm

ADSL over

POTS

Cisco 877

Router; Ethernet interface

PPP only

Cisco

http://www.cisco.com/en/US/products/ps6202/i ndex.html

ADSL over

POTS

Cisco 1700 with WIC-1ADSL Router; Ethernet interface

PPP only

Cisco

www.cisco.com/univercd/cc/td/doc/pcat/1721.ht m

ADSL over

POTS

Cisco 2600 with WIC-1ADSL Router; Ethernet interface

PPP only

Cisco

http://www.cisco.com/univercd/cc/td/doc/pcat/

2600.htm

ADSL over

POTS

Cayman 3341EU-SC ADSL Modem

USB and Ethernet interfaces

PPP and DHCP*

Netopia

www.netopia.de

* Only with Firmware Version 7.6.0r4 and further releases.

ADSL over

POTS

Cayman 3347WEU-SC Wireless, 4 Port

Router

802.11g and Ethernet interfaces

PPP and DHCP*

Netopia

www.netopia.de

* Only with Firmware Version 7.6.0r4 and further releases.

ADSL over

POTS

Cayman 3346EU-SC 4 Port Switch

Ethernet interfaces

PPP and DHCP*

Netopia

www.netopia.de

* Only with Firmware Version 7.6.0r4 and further releases.

ADSL over

POTS

Cayman 3347W-SC Wireless, 4 Port Router

802.11b and Ethernet interfaces

PPP and DHCP*

Netopia

www.netopia.de

* Only with Firmware Version 7.6.0r4 and further releases.

ADSL over

POTS

3347NWG-VGX Wireless, 4 Port Ethernet

Switch

802.11g and Ethernet interface

PPP and DHCP*

Netopia

www.netopia.de

* Only with Firmware Version 7.6.0r4 and further releases.

 

 

ADSL over

POTS

3346N-VGX 4 Port Ethernet Switch

Ethernet interfaces

PPP and DHCP*

Netopia

www.netopia.de

* Only with Firmware Version 7.6.0r4 and further releases.

ADSL over

POTS

Arcadyan SMCA1T-A

1 Port Ethernet interface

PPP only

SMC

www.smc.com

ADSL over

POTS

Zyxel P-642ME-11 / P-642R-11

PPP only

ZyXEL

www.studerus.ch

ADSL over

POTS

Zyxel P-630-11

PPP only

-

ZyXEL

www.studerus.ch

ADSL over

POTS

Zyxel P-650ME-11 / P-650R-11 / P-650H-11

/ P-650HW-11 / P-652R-11

PPP only

ZyXEL

www.studerus.ch

ADSL over

POTS

Zyxel P-650ME-31 / P-650R-31 / P-650H-31

/ P-650HW-31 / P-652H-31 / P-652HW-31

PPP only

ZyXEL

www.studerus.ch

ADSL over

POTS

Zyxel P-630-C1

PPP only

ZyXEL

www.studerus.ch

ADSL over

POTS

Zyxel P-650R-E1 / P-653HWI-11 / P-653HI-

31

PPP only

ZyXEL

www.studerus.ch

ADSL over

POTS

Zyxel P-623ME-T1

PPP only

ZyXEL

www.studerus.ch

ADSL over

POTS

Zyxel P-660R-61 / P-660H-61 / P-660HW-

61 / P-662HW-61

PPP only

ZyXEL

www.studerus.ch

 

ADSL over POTS

Zyxel P-2602R-61 / P-2602HW-61  

PPP only  

ZyXEL  

www.studerus.ch  

ADSL over POTS  

Zyxel P-660ME-T1  

PPP only  

ZyXEL  

www.studerus.ch  

ADSL over POTS  

Zyxel P-660H-D1 / P-660HW-D1 / P-661HW-D1 / P-661H-D1 / P-662H-D1 / P-662HW-D1 / P-2602RL-D1 (Orange BabyBox)

PPP only  

ZyXEL  

www.studerus.ch

FW 3.40(APE.0)D1

Baugleich mit 660HW-D1  

ADSL over POTS  

Zyxel P-660ME-D1 / P-660R-D1

PPP only  

ZyXEL  

www.studerus.ch  

ADSL over POTS  

Zyxel P-660HN-F1Z  

PPP only  

ZyXEL  

www.studerus.ch  

ADSL over POTS  

Zyxel P-660HU-T1 / P660HNU-T1  

PPP/DHCP  

ZyXEL  

www.studerus.ch

Firmware: 1.02(VLM.2)D0

Datapump: 3.16.20.7A  

ADSL over POTS  

Router DrayTrek Vigor 2600 Ethernet interface  

PPP only  

-  

Boll Engineering AG  

www.boll.ch  

ADSL over POTS  

Modem D-Link DSL-500 Ethernet interface  

PPP only  

D-Link  

www.xicom.ch  

ADSL over POTS  

Netgear DVG1000-1WGSWS

Chipset Broadcom 63283KFBG  

DHCP  

Netgear  

www.netgear.com

FW V1.1.01.11_1.01.11, DP A2pD030h.d23c  

 

 

Additional CPE ADSL@IP-DSLAM (POTS) OK:

AVM Fritzbox 7170

CISCO 2610; 1417

D-Link DSL-2740B

Linksys WAG160N-EW

Netopia 2240-NVGx; 3342-EU-SC; 3346-x; 3347-x

SAGEM Livebox 5916 (Orange CH)

Netgear DG834

Additional CPE ADSL@IP-DSLAM (POTS) NOT OK:

Linksys/Cisco WAG54G2-EW

SAGEM F@st 900PE

 

 

 

3.1 ADSL-splitter and filter for POTS

 

The ADSL equipments mentioned in the list, are tested and approved by Swisscom (Switzerland) Ltd. Swisscom recommends the End User to use the ADSL- microfilters and splitters tested and approved by Swisscom (Switzerland) Ltd.

Note:Since the middle of May 2003 Swisscom does not recommend any ADSL over POTS microfilter or splitter which does not comply with the ETSI Standard TS 101 952-1-1.

 

ADSL over POTS microfilters and splitters which comply with the ETSI Standard TS 101 952-1-1 V1.1.1 or V1.2.1 (incl. VDSL over POTS) have the remark "ETSI OK" .

 

Type of Equipment

Type / Description  

Manufacturer  

Link Documentation  

POTS Microfilter  

Telephone Equipment DSL0236SW ADSL POTS Microfilter

"ETSI OK"

Telephone Equipment  

www.telequip.com.au  

POTS Microfilter  

ATF 053B1

"ETSI OK"

LinCom GmbH  

www.linecom.ch  

POTS Microfilter/ Splitter  

SW10-GJ-ADSL-E

SW13-GJ-ADSL-E

SW14-GJ-ADSL-E

SW15-GJ-ADSL-E

SW16-GJ-ADSL-E

"ETSI OK"

POTS Splitter

ADSL POTS Splitter TM-586345.1

"ETSI OK"

Teletech Media GmbH  

www.teletech.ch  

POTS Splitter  

YCL DL000451 A0746R10002

"ETSI OK"

YCL Electronics Co.,Ltd.  

www.ycl.com.tw  

POTS Microfilter  

Please go to the VDSL2 section: All CeCoNet VDSL2 filters and splitters are ready to use on ADSL.  

CeCoNet AG  

w 

SOPHOS: Unable to SSH after Update to 9.4 latest Release 9.404-5

You did all right as mentioned under but are unable to logon:

http://www.butsch.ch/post/Sophos-UTM-9314-13-Data-Disk-is-filling-up.aspx

Error: Network error:Software caused connection abort

Solution: download latest Version from Putty and it will work again

http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html

 

 

Exchange Netvault/Netapp: Failed backup leftover Snapshots

  • Dell Netvault Backup Agent 9.2.0.17
  • SME for Exchange 6.1
  • Netapp Snapdrive 7.0.2.6322

You have LEFTOVER SYMBOL Link on all drives or OLD NVBUShadowcopy Directory on LUNS you handle with Netvault Backup.

Solution 1a)

Stuck left over drives from failed backup in Netapp Plugin:

Solution 1b)

In cmd.exe

Diskshadow

List shadows all

Search for corresponding leftover folder like "E:\NvbuShadowCopy_2052"

Get the SHADOW COPY ID of the stuck one

* Shadow copy ID = {e08f4105-1d42-4d53-afdd-838247c03529}

<No Alias>

- Shadow copy set: {e9f98574-49b1-4df1-bcb9-67d5c485764a}

<No Alias>

- Original count of shadow copies = 4

- Original volume name: \\?\Volume{b304d909-0cc1-11e4-b5ec-00505

68121c3}\ [E:\]

- Creation time: 30.11.2015 12:34:36

- Shadow copy device name: \\?\GLOBALROOT\Device\HarddiskVolumeS

hadowCopy1

- Originating machine: server12.customer.ch

- Service machine: server12.customer.ch

- Exposed locally as: E:\NvbuShadowCopy_2052\

- Provider ID: {b5946137-7b9f-4925-af80-51abd60b20d5}

- Attributes: No_Auto_Release Persistent Differential

 

Delete it:

Delete shadows id {e08f4105-1d42-4d53-afdd-838247c03529}

 

https://support.software.dell.com/netvault-backup/kb/92760

Windows 7, Restore Point, The trust relationship between this workstation and the primary domain failed

Windows 7, After Restore Point, The trust relationship between this workstation and the primary domain failed

Every client has a computer account which is in sync with the Domain Controller. If the computer account is too old (Like on VMWARE Snapshots) and does not match the one on the DC you fail to logon with the computer account. One of my developer machines is a Member of a Server 2003 R2 Domain.

After installation an Acronis 10 WS i had a horrible error with the SNAPMAN Plugin again. And not this time i could not recover even with the long KB from Acronis. So i went back to a restore point... I hate that and normaly i never have done it.

Well gues what if the "Restore point" is a certain amount of days old the Computer can't sync/Log on to the DC: That's somehow correct and usefull in terms of security but MS should warn user. Hopefully you have the local Admin password to acces the client. Otherwise you will have to use Hiren or some other boot CD to reset the Windows 7 SP1 admin password.

Disjoin/Rejoin the Domain and you are back in the game.

Please read both:

http://www.butsch.ch/post/Windows-7-Restore-Point-The-trust-relationship-between-this-workstation-and-the-primary-domain-failed.aspx
http://www.butsch.ch/post/Prevent-VM-MachineXP-computer-account-expire-in-Active-Directory.aspx

 

SSL Certificate Renew Exchange 2003 with 1024 to 2048 BIT change

Problem

How to increase your CSR key size on Microsoft IIS 5 or IIS 6 without removing the production certificate?

Resolution

In line with industry good practice, QuoVadis requires that all 2 year and 3 year business SSL and both 1 year and 2 year EV SSL certificates are created with a CSR that has a key size of 2048-bits or greater.  This requires care in Microsoft IIS when renewing a certificate that has a key size of 1024-bits.

When renewing an already existing certificate, Microsoft IIS will retain all of the details of the currently installed certificate. This includes the key size which may be set to 1024-bits. In order to get the option to change the key size in IIS, you must remove the certificate which has the effect of taking down your website on port 443 (https://).

This article describes an alternate method to increase the key size of your certificate without any downtime to your website by creating a temporary website.


Part I - Creating a Temporary Website

In Part I, we will create a temporary website that will, at this end of the process, have a status of Stopped.  Creating this website and having it stopped in IIS poses no security risks and will not affect your other websites.
  1. Open up IIS. This can be found in the Administrative Tools in Control Panel.

  2. In the Internet Information Services (IIS) Manager window, right-click on the Web Sites folder and select New and Web Sites from the drop down menu.

  3. The Web Site Creation Wizard willl appear.  In that new window, click on Next.

  4. On the next screen, type in "Temporary" into the Description field.  Once you have done that, click on Next.

  5. At the IP Address and Port Settings screen, leave the defaults and click on the Next button.

  6. In the Web Site Home Directory screen, click on the Browse folder and navigate to the Inetpub folder (or a folder of your choosing).  Once selected, click on the Next button.

  7. The next screen shows the Web Site Access Permissions.  Uncheck all of the boxes and click on Next.

  8. At the final screen click on the Finish button.

  9. Back in the Internet Information Services (IIS) Manager window, right click on the Temporary  website and select Stop from the drop down menu.

Part II - Creating a CSR for Temporary

Part II follows the process for creating a CSR as you would for a normal certificate on the new Temporary website that you created in Part I.  If you are familiar with this process, you can skip to Part III.
  1. Open up IIS. This can be found in the Administrative Tools in Control Panel.

  2. Right-click on the temporary website and click on Properties from the drop down menu.

  3. A new window will appear.  In that new window, click on the Directory Security tab at the top.
    In the same window, you will see three sections.  The bottom section named Secure communications has three buttons.

  4. Click on the Server Certificate... button.
    The IIS Certificate Wizard appears.

  5. Select the circle, Create a new certificate. and click on Next.

  6. On the next step on the Wizard, select the circle, Prepare the request now, but send it later and click on Next.

  7. At the next step in the Wizard, enter in a Name for your certificate.  In the field where you see Bit length: select 2048 from the drop down. Leaving the other two check boxes unchecked, select Next.

  8. On the next screen, enter in the full legal name of the company which the certificate belongs into the Organization field.  In the Organizational unit field, enter in the department of the organization, such as 'IT' or "Marketing".  Click on Next.

  9. At the next screen, you will need to enter in your FQDN (fully qualified domain name) of your website in the field named Common name. It looks like "secure.example.com" or "example.com". Click on Next.

  10. On the next screen, you will need to select the country of your organization from the Country/Region drop down. You will then need to type in the State/province of that country along with city within that state within the City/locality field.  Once you have done that, click on Next.

  11. At the next step of the Wizard, you will need to specify where to save the CSR text file that will be created.  To change the location, you should click on the Browse... button.  After you have selected a location, click on the Next button.

  12. At the final screen, you will see a summary of all the certificate details that you have created.  Click on Next to generate the CSR file.
    Note: When you have generated a CSR file, you will have a pending request held for this website.  If this pending request is deleted before a certificate response can be installed, the set of private keys that were created will be deleted as well.  This will render the CSR file and the certificate response useless, including during installation.

  13. Open the newly created CSR file using notepad.  Select all the contents, copy and then paste into the submission form on QuoVadis' Website.

Part III - Installing the certificate onto Temporary

Part III follows the normal process for installing the certificate onto the CSR that was created in Part II.  If you are familiar with the process of installing an SSL certificate, you can do so and skip to Part IV.
  1. Open up IIS. This can be found in the Administrative Tools in Control Panel.

  2. Right-click on the Temporary website and click on Properties from the drop down menu.

  3. A new window will appear.  In that new window, click on the Directory Security tab at the top.  In the same window, you will see three sections.  The bottom section named Secure communications has three buttons.

  4. Click on the Server Certificate... button.

  5. A wizard appears.  Click on Next.

  6. On the next screen, select the option, Process the pending request and install the certificate.  Click on Next.
    Note: If you do not see this option, this could mean that the CSR may have been deleted.  If this is the case, then the certificate file cannot be used and the process may have to be restarted.

  7. At the next step of the wizard, you must click on browse and navigate to the .crt that was supplied to you by QuoVadis.
    Note: By default, the IIS Certificate Wizard looks for files with the extension of .cer.  In order for it to accept the .crt file, you will need to drop the File of type: field down to look for All files and the .crt file should appear.  Once you can see it, select it.

  8. Click on Next.

  9. On the next screen, leave the default to port 443.  Click on Next.

  10. You should now see a summary screen.  When you have finished looking at the summary, you should click on Next.

  11. At the final screen, click on Finish.

Part IV - Assigning the Stronger Certificate

In Part IV, we will assign the certificate that was installed to the production website and then delete the Temporary website.
  1. In IIS, right-click on the production website that has the 1024-bit certificate installed and then click on Properties from the drop down menu.

  2. A new window will appear.  In that new window, click on the Directory Security tab at the top.  In the same window, you will see three sections.  The bottom section named Secure communications has three buttons.

  3. Click on the Server Certificate... button.

  4. A wizard appears.  Click on Next.

  5. On the next screen, select the option, Replace the current certificate.  Click on Next.

  6. Important Note: If you do not receive this option, it may be possible that you have an already pending request for this website. In order to have the Replace the current certificate option available, you will need to delete the pending request on this website.

  7. You should see a list of certificates which contains the certificate you have installed on the Temporary website.  Select the newly installed certificate that contains a key size of 2048-bits from this list.  Once selected, click on Next.

  8. IIS will display the new replacement certificate's details.  Verify these details and then click on Next.

  9. Click on the Finish button on the next screen.

  10. Back in the Properties window, click on the OK button.  The certificate on your website has been updated with the stronger 2048-bit certificate with no downtime.

  11. The final step of this article is to delete the Temporary website that you created in Part I.  To do this, right-click the Temporary website from IIS and select Delete from the drop down menu.  Click on Yes at the, "Are you sure you want to delete this item?"