You can just tell the users to go to www.google.co.uk, I can do it from the
US just the same. Or alternatively if you want to use www.google.com all
the time type in www.google.com/ncr. Here are a few more tips you can
follow if you still want it to be more transparent. But it would require
making changes on each users computer.
http://www.google.com/support/websearch/bin/answer.py?hl=en&answer=873
Regards,
Tyson Scott - CCIE #13513 R&S, Security, and SP
Managing Partner / Sr. Instructor - IPexpert, Inc.
Mailto: tscott_at_ipexpert.com
-----Original Message-----
From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf Of Nish
Vamadevan
Sent: Wednesday, September 29, 2010 11:12 AM
To: mmunem_at_gmail.com
Cc: ccielab_at_groupstudy.com
Subject: Re: OT:Present a UK public IP to google through a French proxy
As far as I know, Short answer is a No.
You SRC IP is from .fr hence it is diverting it.
Regards,
Nish
are:you::ipv6:ready?
On Wed, Sep 29, 2010 at 3:48 PM, <mmunem_at_gmail.com> wrote:
> Experts,
>
> All our UK sites web traffic leaves through a Bluecoat in France. Google
> thinks we're French and redirects us to google.fr . Is it possible using
> some clever nat and access lists to present a uk public ip (with collusion
> from the french isp of course) to google when web requests are sourced
from
> the UK internal ip ranges? Am I making any sense :)??
>
> Thanks in advance,
> Mohammed
> Sent using BlackBerry. from Orange
>
> -----Original Message-----
> From: --Hammer-- <bhmccie_at_gmail.com>
> Sender: nobody_at_groupstudy.com
> Date: Wed, 29 Sep 2010 09:18:08
> To: Nick Matthews<matthn_at_gmail.com>
> Reply-To: --Hammer-- <bhmccie_at_gmail.com>
> Cc: ccielab_at_groupstudy.com<ccielab_at_groupstudy.com>
> Subject: Re: OT: Hidden commands support
>
> Agreed. I talked to some Cisco folks who basically said the same. They
> wouldn't run them in prod mostly because you never know when (what
> version) it may or may not be there or how stable it would be. But they
> are helpful and sometimes fun for labbing or for troubleshooting.
>
> --Hammer--
>
>
> On 9/28/2010 10:30 PM, Nick Matthews wrote:
> > Hidden commands are usually hidden for a reason. Some of them become
> > wide spread, and find new uses, and become unhidden.
> >
> > Most of the time they are the experiment of a developer to 'patch'
> > something. Either the solution is not worth the effort to fully
> > document and go through traditional methods because it's a one-off,
> > it's something more powerful than cisco really wants the customer to
> > have full access to, or that by documenting it requires references to
> > other undocumented references that should not/can not be documented.
> > Some times they are very specific developer commands to do all types
> > of crazy things. For example, I've seen hidden debugs and IOS
> > commands change the EEPROM on cards and they suddenly become a
> > different type of card.
> >
> > For support - it varies. There are hidden commands that are more
> > well-known than others. Chances are, if you have the hidden command
> > on your equipment it's because it was on a public document somewhere,
> > and it has spread all over the place. Sometimes it gets on there
> > because someone read an article on the internet, and in combination of
> > any other set of unrelated events, the problem is fixed and the
> > command stays there permanently. Either way, the more common it is
> > the less problems you will have with supportability, but keep in mind
> > that they are at the top of the common suspects list.
> >
> > Determining the original context and relevance of the hidden command
> > can be a futile exercise; sometimes it is simple. Short answer: YMMV.
> >
> > -nick
> >
> >
> >
> > On Tue, Sep 28, 2010 at 11:32 AM, --Hammer-- <bhmccie_at_gmail.com
> > <mailto:bhmccie_at_gmail.com>> wrote:
> >
> > So, I just read up on a hidden command I hadn't seen before that
> > Taqdir submitted. I've seen hidden commands before but this was a
> > new one and actually is somewhat intriguing to me. So, the bigger
> > question is, does anyone have experience with implementing hidden
> > commands in production environments and what Ciscos position is
> > regarding them? We have direct lines to some Cisco resources and
> > I'm going to ask the same but I thought I would throw it out to
> > the group.
> >
> > --
> >
> >
> > --Hammer--
> >
> >
> > Blogs and organic groups at http://www.ccie.net
> >
> >
> _______________________________________________________________________
> > Subscription information may be found at:
> > http://www.groupstudy.com/list/CCIELab.html
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Wed Sep 29 2010 - 11:40:00 ART
This archive was generated by hypermail 2.2.0 : Fri Oct 01 2010 - 05:58:06 ART