Marco Nielsen at myITforum.com

Enterprise management and support of mobile devices the way you need it!

News


RSS Feed:
RSS
My LinkedIn Profile: LinkedIn Locations of visitors to this page Add to Technorati Favorites Kiva - loans that change lives

Icons by DryIcons.com

Old Windows Mobile Links

iOS Links

Mobility Strategy Links

Android Links

Windows Phone Links

Tablet Links

Other

May 2009 - Posts

AT&T Samsung Epix (SGH-i907) ID1 Multipatch

configure imageFor those of you who might have an AT&T branded Epix which is the Samsung SGH-i907 you probably will want to install this patch as soon as possible. It is now available from Samsung. It includes several patches, including a fix for the critical “Slog Dump” that has been dreaded by many users:

  • ”Slog Dump” Fix: On certain circumstances, the handset may report a “Slog Dump” error message. This software provides an update to the network layer which prevents the problem from occurring.
  • Missed Email Audio Notifications: A previously released cab file for notifications is included in ID1. This enables the EPIX to provide audible notifications alerts for your emails when the device enters an unattended power saving mode.
  • Outlook Notes SSP Support: The update contains the ability to synchronize the popular Notes feature available within Microsoft Outlook.
  • Ascending Ringtone: Ringtone behavior design was set to ascending/escalating volume during inbound call regardless of setting specified. With this update, the handset will act in accordance to the volume settings selected
  • You can obtain it from here:
    http://www.samsung.com/us/i907/multipatch

    I think with the “Slog Dump” problem now fixed this will continue to be a great Windows Mobile 6.1 device for everyone!

    |\\arco..

    How to setup Proxy and Work Exceptions on Windows Mobile 6.1 with SCMDM 2008

    configure There appears to be a lack of public information regarding the inner secrets of successfully navigating and configuring the proxy and work exceptions on the Windows Mobile platform. My fellow Enterprise Mobile colleague, Patrick Salmon, has broken through and made some very interesting observations and facts about how to get it all configured correctly. This article contains all of the material and information Patrick has researched.

    Most of this boils down to how the Windows Mobile Connection Manager is handling the connections and the decisions it makes to route the traffic. The Connection Manager is well aware of the native L2TP and PPTP connection methods in Windows Mobile, but appears to lack direct support for the Windows Mobile 6.1 Mobile VPN that is used by SCMDM 2008. See more information here: http://msdn.microsoft.com/en-us/library/ms879581.aspx.

    This article assumes you are already well familiar with the SCMDM network routing requirements and how to configure Group Policies.

    Proxy Issues Today

    1. If you set the proxy via the SCMDM 2008 Group Policy you may observe that the necessary connectivity to the SCMDM Device Management server and WSUS services break.

    2. Trying to use the Work/Internet capabilities as currently documented breaks the SCMDM VPN.
    Although http://technet.microsoft.com/en-us/library/dd261930.aspx does explain some of the necessary steps. Also on http://technet.microsoft.com/en-us/library/dd261921.aspx it also states to make sure that the SCMDM Gateway server is listed.

    3. No visibility on the client of what is configured.
    The Windows Mobile Connection Manager internally uses something called a URL Mapping Table to decide if a specific URL is destined for the Internet or the corporate network connection. It can use a URL pattern which we will go into in more detail below. Please see http://msdn.microsoft.com/en-us/library/aa455992.aspx.

    Where to set the Proxy server setting in the SCMDM 2008 Group Policies:clip_image002

    The solution is to correctly configure the Internet proxy setting and also specify the routing of which URLs go to the “Internet” and through the configured proxy, and which are internal or go through “Work” back through the VPN connection.

    Overall best practices

    Keeping things as simply as possible will go a long way. The basics are:

    1. “Internet” bound traffic = Route via proxy if defined, otherwise use Default Gateway on SCMDM Gateway Server.

    2. “Work” bound traffic = Route traffic directly to internal network using local routing tables on SCMDM Gateway Server.

    3. If the FQDN of the Proxy is part of an internal domain do not put the FQDN in the Proxy configuration!
    This will not work, as it will be detected as an Internet domain, due to the dotted name and you won’t see it working as you think. The solution is to use the direct IP address. Example: instead of “proxy_host.company.com:8080” use “172.16.1.1:8080”.

    Where to configure the specific Internet/Work routing is done through a “hidden” existing Group Policy setting:

    clip_image004

    The dialog window has two areas. One for the Internet domains (which will be routed to a proxy if configured so) and at the bottom for Work domains (not routed to the proxy if configured). This is what the default values are:

    clip_image006

    Next we will go into how to configure these entries in more detail.

    Connection Manager URL Mapping Pattern

    The Windows Mobile Connection Manager uses a general *://*.*/* URL type format. This can be further broken down into these examples:

    • "*" & "?" can be used anywhere.:
      • “*” = Zero or more of any type of characters.
      • “?” = Can take the place for any single character.
    • *:// = Any protocol (usually http or https).
    • /*.*/ = Any FQDN namespace
    • /*/ = Any NetBIOS/WINS name
    • *://servername/* = specific NetBIOS server name
    • *://*.company.com/* = Any host in a FQDN domain called company.com.
    • *://host1.company.com/* = Only host1, any protocol, any website on target.
    • *://host?.company.com/* = All traffic to host[a-z, 0-9], any website.
    • https://host1.company.com/home = Only https requests to host1's "home' directory.

    Some things to think about when defining you own URL Mapping table:

    - Obey classic firewall rules – most granular is processed first
    - Define your targets and know your internal name space
    - Put in sequence (most specific first, least specific last)
    - Decide whether traffic goes via the “internet” or “work” network routing from your SCMDM Gateway Server

    Example and Outcome

    Here is what a working example of URL Mapping Filter entries could look like:image

    Please note the above setting details:
    - *://www.company.com/* - Externally hosted Internet site
    - *://mdmvpn.company.com/* - Route SCMDM Gateway Server access through Internet
    - *://*.company.com/* - Internal work namespace
    - *://*.*/* - Catch all for all other Internet requests
    - *://*/* - Catch all for all other internal NetBIOS/WINS requests – However, not found to work in testing, and removed so Internet requests are not caught by it!

    Outcome with the above setting details:
    - SCMDM VPN will connect correctly through the Carrier/MO/ISP on the device
    - SCMDM Device Management and WSUS traffic will require no further invention.
    - Internal Line-Of-Business application traffic will go direct.
    - Internet bound traffic will go to the corporate proxy (if defined in separate Group Policy).

    Internal namespace sans WINS

    Since most companies are well on their way to totally get rid of WINS and have put in place DNS suffix search order standards. Another solution is to push a default DNS suffix to your Windows Mobile. Brian Puhl from Microsoft IT blogged about this last year here:

    http://imav8n.wordpress.com/2008/08/21/getting-single-label-name-resolution-on-mdm-enrolled-phones/.

    So this could ensure proper name resolution to a FQDN for internal names used on the Windows Mobile device. In the example above this could be routed to the “work” side of things by the *://*.company.com/* URL Mapping.

    For more information on creating custom ADM templates for use in SCMDM 2008 please see: http://blog.enterprisemobile.com/2008/10/writing-custom-gpos-for-scmdm-2008/.

    SCMDM 2008 SP1 Source-based Routing

    Another feature that can be used to better assist with the complex nature of network routing, proxies and Internet access is the source-based routing feature present in SCMDM 2008 SP1. Some details can be found here: http://technet.microsoft.com/en-us/library/dd252779.aspx

    The source-based routing option on the Gateway Wizard:clip_image010

    One example of how this could work is instead of having the default gateway on the External NIC of the Gateway Server, you place one on the Internal NIC. You can then configure the source-based routing option to an IP address of an external firewall that is accessible from the Internal NIC. Now Internet IPSec traffic will come in and terminate on the external NIC, but return back to the device through the Internal NIC and the IP address of the source-based routing, back to the Internet. Now any traffic from the Windows Mobile devices not configured to the proxy will default out to the Internal NIC gateway. This could be useful for applications that are not proxy aware, or if you won’t want to use any proxy but direct all traffic to the internal side and to be taken care of there for either internal or external Internet routing..

    Split DNS

    Another idea that could perhaps assist in some architectures is the use of split-DNS. In the Gateway Wizard you can specify the DNS server the Windows Mobile clients will use to resolve hostnames. Many simply use the existing DNS server present internally and make sure connectivity on TCP port 53 is open to it. Another idea could be to use a separate DNS server that contains hostname zone entries that could be similar but resolve to different IP addresses to better resolve network routing or DMZ issues at hand. DNS forwarding could still be used to forward remaining requests to the primary internal DNS servers.

    clip_image012

    Tethering Devices

    Another Enterprise Mobile colleague, Dave Field, also points out:

    “Please note that if you have a proxy setup on the device and you partner the device to a desktop that has “automatic” setup for the Connection setting, it will auto-configure the device proxy and overwrite whatever you have. It will configure it for port 80 automatically too.”.

    At this of this writing I’m not sure if the Group Policies will automatically refresh the settings again down to the device. A work around may be to disable the tethering functionality all together if this is a big concern.

    Wrap up

    The final best advice is to have patience in troubleshooting and testing the proxy and network routing. It can be complex and quite difficult to get setup correctly in a large organization. Logic flow, re-verifying settings, and looking at logs could be your best friends.

    Thanks again to Patrick Salmon for getting the answers together. Also a thanks to Wayne Phillips and David Creedy from Airloom for their feedback and corrections!

    Please leave a comment or contact me directly if you have additional findings or feedback on how these settings work and act for you!

    Reference links - for additional information:
    Default URL Mapping values in Connection Manager:
    http://msdn.microsoft.com/en-us/library/aa456095.aspx
    How Connection Manager works:
    http://blogs.msdn.com/fzandona/archive/2005/10/10/ConnectionManager02.aspx 
    How the Mapping Index works and what are some of the high-end catch all values:
    http://msdn.microsoft.com/en-us/library/aa455850.aspx
    http://msdn.microsoft.com/en-us/library/aa456095.aspx
    Using Connection Manager URL Mapping:
    http://msdn.microsoft.com/en-us/library/aa455992.aspx
    SCMDM Forum thread discussion on these settings:
    http://social.technet.microsoft.com/Forums/en-US/SCMDM/thread/9a295dc0-55a6-4783-b43e-132748e8e7b5

    |\\arco..

    Updated on May 12, 2009 with some corrections.

    Using Exchange Server Remote Connectivity Analyzer (ExRCA) for Windows Mobile ActiveSync testing

    exchangeicon_bigger Don’t believe this is that recent news, but just learned about it and thought I would share as I think it could be quite useful for many enterprise scenarios..

    This is a public website that can be used to troubleshoot Exchange server connectivity issues. Originally written by a Microsoft Escalation Engineer and continually updated.

    You can test such things Exchange ActiveSync (EAS) issues, including Windows Mobile 5 and Windows Mobile 5 w/MSFP, Windows Mobile 6.1 clients with AutoDiscover, Outlook RPC over HTTP (Outlook Anywhere), Outlook 2007 and AutoDiscover and even inbound SMTP. The tool will give you a nice detailed report that you can drill down into and research where any failure might be.

    It is accessed from here: https://www.TestExchangeConnectivity.com.

    This could be very useful in testing your Exchange configuration and setup before you have Windows Mobile clients to access your environment. Validation of certificates and which Windows Mobile versions are supported is also included!

    Main menu:image

    Apply test credentials:

    image

    Example report:image

    Reference Links:
    Blog: http://msexchangeteam.com/archive/2009/03/25/450908.aspx
    Video: http://edge.technet.com/Media/The-Remote-Connectivity-Analyzer-for-Exchange-Server/
    Facebook Group: http://www.facebook.com/group.php?gid=58417140899
    Twitter: http://twitter.com/ExRCA 

    |\\arco..

    The history of text messaging, the 160 character limit and Tweet messages

    film I love the History and Discovery channels on TV, and history in general. So as the rapid computer and telecommunications technology involves, things in the 1980s are now already historical and have shaped our everyday lives today. SMS text messaging is a good example of that.

    The Los Angeles Times has a great little article about Friedhelm Hillebrand who in Germany in mid-1980s wrote up the SMS 160 character text message as a standard in the GSM implementation. Still in place today and now actively used on billions of phones:
    http://latimesblogs.latimes.com/technology/2009/05/invented-text-messaging.html

    Using a 7-bit character set instead of 8-bit, the 160 characters also only takes up 140 bytes of transmission data. I won’t dare to go into how much revenue this now common technology is making on the Mobile Operator side worldwide.. :-)

    Today, Twitter, is also using the same 160 text message limitation. It has a 140 character limit per tweet with the remaining 20 characters reserved for the user name..

    |\\arco..