I have a virus which has wormed itself into my network. The virus has created folders called 'Recycler' and 'Info' and inside is a .jpg.exe file which when users run it will install on all networked users pc's and all network drives. It also has an autorun.ini which picks it up when you open the drive through the my computer console.
It has installed itself on a couple of the NAS shares and has provided read only access to all users apart from one who has read-write access (I assume he ran the file last). Noone has delete access to this file. I dont know how I can remove these files from the NAS. If I logon as the administrator and try and change permissions I get "Access denied" and if I try just a delete i also get "Access Denied"
Topology & Design:
Two ACI fabrics
Stretching VLANs using OTV
Both fabrics are advertising BD subnets into same routing domain
Some BDs(or say VLANs) are stretched, but some are not.
Endpoints can move betwee...
VMware Trunk Port Group is supported from ACI version 2.1
VMM integration must be configured properly
ASA device package must be uploaded to APIC
ASAv version must be compatible with ACI and device package version
Topology &Design:Traffic flow within same fabric:Endpoint moves to Fabric-2Bounce Entry Times OutTraffic Black-holedSummarySolutionAppendix:
In the Previous articles of ACI Automation, we are using Postman/Newman a...