Problem: We are using an old D-Link hotspot to allow guest access in our building. This D-Link feed a VLan that is distributed to 7 D-Link access points. These APs support multiple SSIDs on different VLAN making them very convenient for distributing multiple wireless networks around the facility. The new Sonicwall has Guest Services, but how can we make it all work together? It seems like Sonicwall wants us to use their own proprietary (and expensive) access points. In our server room we have a port dedicated to feeding the VLAN through the building. I connected that port to X5 on our Sonicwall TZ210. Now the configuration on the SW. First, let’s add a new Zone and call it Guest. For initial testing I am leaving the security settings turned off. Now let’s configure port X5 to be in our Guest zone with a static IP address of 192.168.1.1 on a standard Class C subnet. Do this from Interfaces. I have enabled management and ping plus user logins on this interface. After testing I will disable the management except for Ping. Make sure you enable login so your users can actually log in! Verify a firewall rule exists for traffic from the GUEST to WAN zones. With my firmware, this was automatically created. I enabled some bandwidth limiting on it as well. Now turn on the DHCP server for this interface with the appropriate settings. Note that it is configured for interface X5. Make sure the DHCP server is actually enabled in the top check box. I forgot this part the first time around. Anyone that connects to the VLAN or physical network on X5 should now receive a DHCP address in your range and be greeted in a web browser with the Sonicwall Login page. Adding users is very easy! Just head down to Users|Guest Accounts and you can have them automatically generated for you or create your own. You can also specify how long they are active for. You can also click on Guest Status to see your logged in guests!
We’ve been trying to convert a few Windows 2000 SP4 server to a VMWare machine for a while and running into the same issue. I would always get a MODEEXCEPTIONNOT_HANDLED BSOD right after the login screen would appear. I tried the normal fixes listed on the VMWare website including the right SP4 rollup 1 v2 and checking the versions of scsiport.sys. Fortunately, I stumbled across this wonderful article: http://www.networkworld.com/news/2005/041105-windows-crash.html?page=1 I set the virtual machine to a kernel mode dump and let it BSOD as recommended by the article. I then copied to memory.dmp file to my Windows 7 workstation where I had installed the debugging tools referenced in the article. I quickly identified usbsp.sys as the offending driver. I renamed it on the virtual and rebooted. Result? Perfect! I will definitely make sure I use this in the future to get a handle on blue screens when they pop up. Here is the relevant data from the process with the info highlighted in red. How cool is that?
|EXCEPTION_PARAMETER1: 00000000EXCEPTION_PARAMETER2: 00000000 ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0 BUGCHECK_STR: 0x1E_0 DEFAULT_BUCKET_ID: DRIVER_FAULT PROCESS_NAME: System LAST_CONTROL_TRANSFER: from f2695af5 to 8042be0b STACK_TEXT: f245fc78 f2695af5 0000001e 00000001 804b1cd8 nt!KeBugCheck+0xf WARNING: Stack unwind information not available. Following frames may be wrong. f245fc90 804b1d5e 828696f0 82614000 f219fd08 usbsp+0xaf5 f245fd58 804b1f9f 0000008c 82614000 f219fd08 nt!IopLoadDriver+0x672 f245fd78 80417b47 f219fd08 00000000 00000000 nt!IopLoadUnloadDriver+0x3f f245fda8 80457838 f219fd08 00000000 00000000 nt!ExpWorkerThread+0xaf f245fddc 8046c8e6 80417a98 00000001 00000000 nt!PspSystemThreadStartup+0x54 00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16 STACK_COMMAND: kb FOLLOWUP_IP: usbsp+af5 f2695af5 8d45f4 lea eax,[ebp-0Ch] SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: usbsp+af5 FOLLOWUP_NAME: MachineOwner MODULE_NAME: usbspIMAGE_NAME: usbsp.sys DEBUG_FLR_IMAGE_TIMESTAMP: 3cc859dd FAILURE_BUCKET_ID: 0x1E_0_usbsp+af5 BUCKET_ID: 0x1E_0_usbsp+af5 Followup: MachineOwner|