Podo Attack - Listening To Cisco IP Phone Calls

Size: px
Start display at page:

Download "Podo Attack - Listening To Cisco IP Phone Calls"

Transcription

1 Podo Attack - Listening To Cisco IP Phone Calls TABLE OF CONTENTS Introduction... 2 Overview - Cisco IP Phone Operation... 2 Demo The Scenario... 4 Demo Clone The Cisco IP Phone Configuration... 6 Demo Enable The Span to PC Port Cisco Phone Parameter... 9 Demo Capture And Play Voice Calls! Demo Cover Your Tracks! Conclusions... 17

2 Introduction Most of the Cisco IP phones on the market today provide a PC port. The idea is that a user device (i.e. a PC) can connect to the phone s PC port and the phone will bridge the traffic across its uplink to the switch thereby providing the PC with network connectivity. This is great because only a single switch port is required for the phone and the PC Screenshot 1 provides an overview of a Cisco IP phone and the available connections. Screenshot 1 Cisco IP phone connections The aim of this demo is to be able to capture voice traffic. Once this traffic is captured, it can be re-played at leisure, meaning that an attacker can listen to all voice calls that have been made on the compromised phone. Totally irrelevant trivia: I have named this the Podo Attack Podo is the nickname that I have given to my 5 year old boy Lewis. When he was about 3 years old he used to name everything and everyone Podo so I started to call him the same name, and it stuck... Overview - Cisco IP Phone Operation Before you can develop techniques to compromise something, my own philosophy is that it is better to understand how the hardware and/or software operates first. Only by gaining an understanding of how things work can you think of ways to compromise/exploit something and achieve whatever objective you set. In this tutorial, we target Cisco IP phones, so let s first provide a quick overview on the boot process. The following boot process is not intended to be exhaustive, but it does demonstrate the high level process undertaken (important content that is relevant to the demo is highlighted bold): 1. The Cisco IP Phone connects to an ethernet switchport (usually uses POE Power over Ethernet - to power the phone).

3 2. When the Cisco IP Phone powers on, the Cisco switch delivers voice VLAN information to the IP phone using CDP as a delivery mechanism. The Cisco IP Phone now knows what VLAN it should use for voice traffic. 3. The Cisco IP Phone sends a DHCP request asking for an IP address on its voice VLAN. 4. The DHCP server responds with an IP address offer. When the Cisco IP Phone accepts the offer, it receives all the DHCP options that go along with the DHCP request. DHCP options include items such as default gateway, DNS server information, domain name information, and so on. In the case of Cisco IP Phones, a unique DHCP option is included, known as Option 150. This option directs the IP phone to a TFTP server. Note: Other DHCP options can also be used to specify the TFTP server such as option 66. Option 66 only allows a single TFTP server to be specified whereas option 150 allows multiple TFTP servers to be specified which is better for redundancy. 5. After the Cisco IP Phone has the IP address of the TFTP server(s), it contacts the TFTP server and downloads its configuration file. The XML configuration file of a Cisco IP phone is SEPAAAABBBBCCCC.cnf.xml where AAAABBBBCCCC is the MAC address of the phone. Therefore, a Cisco IP phone with MAC address would send a TFTP get for filename SEP cnf.xml. 6. The Cisco IP Phone attempts to contact the first call processing server (the primary server) listed in its XML configuration file to register with. If this fails, the IP phone moves to the next server in the configuration file. Once the phone is registered with a call processing server, such as a CUCM (Cisco Unified Call Manager) server, it is able to send and receive voice calls. OK, we understand the boot process now, this will be useful later. The next concept to understand is the Span to PC Port feature. Screenshot 2 is the official description on Cisco s website: Screenshot 2 Span to PC Port explanation Source:

4 SPAN is traditionally a Cisco switch feature that stands for Switch Port Analyzer. In other switch vendors this is known as port-mirroring. In simple terms, it takes traffic that is sent/received on one interface and sends a copy of that traffic out of another interface. In a legitimate scenario, this could be useful when troubleshooting and you send the SPAN d traffic to an interface when you have a packet sniffer running so that you can analyse the traffic flows to and from a particular device. This feature is useful and dangerous in equal measures. If this feature is enabled, an attacker could capture a copy of all the voice traffic and then re-play the calls whenever they like... The Span to PC Port feature can be enabled for Cisco IP Phone Models: 7941, 7942, 7961, 7962, 7965, 7970, 7975, 99xx, 89xx, and 699xx. Interestingly, this feature is enabled and CANNOT BE DISABLED on the 7940 and 7960 phones as per Screenshot 3 Screenshot 3 Cisco 7940 and 7960 Span to PC Port setting Source: Demo The Scenario The demo will target a production Cisco 7941 phone as shown in Screenshot 4, with relatively default settings. For the purpose of the demo, you should assume that the Cisco 7941 phone is in a place that an attacker could physically access (in a meeting room that could be accessed for example). I will be using my own security drop box for this demonstration the OG150 ( In reality, you could use your own drop box or even a laptop. Using a drop box is more covert than a laptop, as you can see in Screenshot 5 the OG150 is neatly hidden at the rear of the phone. By using a small drop box and a portable power supply, a person in front of the phone has no idea that something is connected to the phone s PC port (Screenshot 4 is all the phone user sees).

5 Screenshot 4 Cisco 7941 phone (front) Screenshot 5 Cisco 7941 phone with OG150 connected (rear) The OG150 has an b/g/n wireless interface. The attacker in this scenario has connected the OG150 (via ethernet cable) to the phones PC port and left the premises. He/she is outside the building and has associated to a wireless SSID hosted by the OG150 and has successfully SSH d to the OG150 command line, as shown in Screenshot 6. The attacker now has access to a device (the OG150) that is directly connected to the Cisco IP phone. Let the fun commence...

6 Screenshot 6 OG150 login banner Demo Clone The Cisco IP Phone Configuration The next thing we want to do is find out a little about the Cisco IP phone. In fact, it would be useful to actually take a copy of the phones configuration file! We know that Cisco devices use a protocol called CDP (Cisco Discovery Protocol) to advertise capabilities and general information about the device. Let us see if the Cisco IP phone is sending CDP messages out of the PC port where the OG150 is connected. I use tcpdump for this, which is a packet capture tool supported by the OG150 and most Linux based devices. In Screenshot 7 I apply a filter to display only CDP traffic this is shown within the red rectangle. As you can see in Screenshot 7, the OG150 has successfully snooped a CDP message sent by the phone relevant CDP details are shown in the green rectangles. Screenshot 7 CDP snooping with tcpdump

7 The most useful information here is the device ID and the IP address of the phone. Recall in section Overview - Cisco IP Phone Operation that a Cisco IP phone configuration file is named SEPAAAABBBBCCCC.cnf.xml where AAAABBBBCCCC is the MAC address of the phone. Now that we know the phones device ID (gleaned via the CDP snoop), we can ascertain that the phones configuration file is: SEP001BD40C0C7A.cnf.xml If we knew the TFTP server IP address that the phone uses, we could try and download the phones configuration file via a TFTP get. However, we don t know the TFTP server IP address... at least we don t know it yet Cisco IP phones support a minimal web-based management interface, which means you can web-browse to the phone as long as you know its IP address. This is useful for troubleshooting and viewing configuration data. Did I just say configuration data!? Yes, that is helpful! The OG150 and most other Linux based devices support a tool called wget. wget is a network utility that can be used to retrieve files from the web using http. I will use wget to download a page from the Cisco IP phone where I know that the TFTP server IP address is listed! We already know the IP address of the phone via the CDP snooping process shown in Screenshot 7. I will execute the wget command to the Cisco IP phone IP address with the URL /CGI/Java/Serviceability?adapter=device.statistics.configuration appended as shown in Screenshot 8 (see red rectangle for wget command). As highlighted using the colour green, we have got the TFTP servers IP address Please note: Sensitive information has been blocked out using the colour grey. Screenshot 8 Find TFTP server IP address using wget

8 This is progress, we now know the Cisco IP phones configuration filename and the TFTP server IP address where it is hosted. Let s go and get a copy! The OG150 and most other Linux based devices support a tool called atftp which is a TFTP client utility. We can use this tool to tell the OG150 to download the phones configuration file from the TFTP server and save it to memory. As you can see in Screenshot 9, we download the configuration file ( atftp command shown in the red rectangle). To confirm the file was downloaded successfully, the ls (list directory) command was executed and the configuration file is displayed (shown in the blue rectangles). Screenshot 9 Download Cisco IP phone configuration file using atftp You can view this configuration file using the cat command on the OG150, as shown in Screenshot 10. Note: Only part of the configuration is displayed for illustration purposes. Screenshot 10 View Cisco IP phone configuration file using cat

9 Let s re-cap; at this point all we have is the phones configuration. Although we cannot capture phone calls thus far, the work we have done is critical in order for the compromise to be successful. Demo Enable The Span to PC Port Cisco Phone Parameter The next step in this compromise is to enable the Span to PC Port setting on the Cisco phone. As discussed earlier, if this option is enabled the Cisco phone will send a copy of voice traffic to the device connected to the PC port in this case the OG150. We can check if this feature is enabled by reviewing the phone configuration that was previously downloaded in section Demo Clone The Cisco IP Phone Configuration. You need to find the spantopcport setting in the phones configuration file, it will be set to either a 1 or 0 as follows: If this setting is set to 1 then the Span to PC port feature is disabled (voice traffic IS NOT copied to the PC port) If this setting is set to 0 then Span to PC port feature is enabled (voice traffic IS copied to the PC port) In Screenshot 11 we open the phones configuration file using the cat command but filter the output using grep. As you can see, the spantopcport setting is set to 1 (inside the green rectangle). This means that voice traffic IS NOT currently copied to the PC port. Hmmmmm, let s change that! Screenshot 11 View spantopcport setting using cat Just for sanity, you can check this yourself on the phone as follows: Settings > Device Configuration > Ethernet Configuration > Span to PC Port The setting will be either Yes (enabled) or No (disabled) as you can see in Screenshot 12 this is set to No which confirms Span to PC Port is disabled.

10 Screenshot 12 View spantopcport setting using Cisco IP phone To get around this, we will edit the phone s configuration file that we previously downloaded to the OG150. We will enable the Span to PC Port setting and then demonstrate how to upload this configuration to the phone. First of all, edit the phones configuration on the OG150 so that the spantopcport setting is set to 0 (which means it is enabled). To do this we use the vi tool which is a text editor as shown in Screenshot 13. Screenshot 13 Edit the Cisco IP phones configuration using the vi tool Once the spantopcport setting is set to 0, use the same cat command used in Screenshot 11 to confirm that it is set properly. As you can see in Screenshot 14 the setting has been set properly. Screenshot 14 View spantopcport setting using cat OK, how do we get the edited configuration file (saved to memory on the OG150) onto the Cisco IP phone? In simple terms, we are going to tell the Cisco IP phone to download its configuration from the OG150 (instead of CUCM), where the edited configuration file is located Once it does this, the Span to PC Port setting will be enabled!

11 The OG150, like most Linux based devices, support a tool called atftpd which is a TFTP server utility. We will turn the OG150 into a TFTP server so that the phone can download its configuration from it. To do this, start the atftpd daemon with the default directory set to where the phone configuration file is saved. This process is shown in Screenshot 15. Screenshot 15 Enable TFTP server on OG150 Next, you have to physically touch the phone. Note: I am currently researching ways that avoids having to physically touch the phone for this step. On the phone, navigate to: Settings > Network Configuration > IPv4 Configuration > Alternate TFTP As you can see in Screenshot 16, Alternate TFTP is set to No and the TFTP Server 1 setting is set to (review Screenshot 8 for more information). Notice that this setting is Locked as per the padlock (highlighted by the red arrow). Screenshot 16 Phone settings Locked In order to change this setting, we need to Unlock it. Press the following key combination: **# Once this is done, the settings will become Unlocked as per the open padlock shown in Screenshot 17 (highlighted by the red arrow).

12 Screenshot 17 Phone settings Unlocked Highlight the Alternate TFTP setting and press the Yes softkey and then Save. Next, go to TFTP Server 1 and select Edit. Enter the IP address of the OG150, then press Validate and Save this process is shown in Screenshot 18. Note: The first octet of the IP address is blurred for security reasons. Screenshot 18 Reconfigure TFTP server IP address The phone will then reset and download its configuration from the OG150 (where the edited configuration file is stored). If you check the phone, it will now display the Span to PC Port setting is Yes which means it is enabled Confirmation of this is shown in Screenshot 19.

13 Screenshot 19 Span to PC Port is set to yes (enabled) Excellent, the phone is now sending a copy of all voice traffic to the PC port where the OG150 is located! Demo Capture And Play Voice Calls! We now want to capture all the voice traffic that is being copied to the PC port. To do this, I will use tcpdump and save any packets received on the OG150 ethernet interface (eth0) to directory /mnt/usb/ with filename phonecall.pcap. This is shown in Screenshot 20. Note: I chose to save the capture file to the 4GB USB memory that is connected to the OG150 because the onboard memory on the OG150 is fairly limited. In addition I am capturing ALL packets, feel free to use filters which capture only traffic you are interested in. Screenshot 20 Capture phone traffic using tcpdump At this point, I made a phone call from the Cisco IP phone to my mobile phone and talked to myself. This is not the first time I have done this, but it s a medical condition :-/ On a serious note, the important thing here is that a phone call was made and a conversation took place. I then stopped the tcpdump capture using CTRL+C.

14 A quick check of the destination directory ( /mnt/usb/ ) shows that the phonecall.pcap file was created with a filesize of we got something! This is shown in Screenshot 21. Screenshot 21 Verify packet capture file was created Next, we need to transfer this capture file to my laptop and play back the phone call. Recall that my laptop is connected wirelessly to the OG150, therefore I will use WinSCP to transfer the file to my laptop (you can use whatever tools you like to transfer the file). Open WinSCP on your laptop and login as shown in Screenshot 22. Screenshot 22 WinSCP login page Using WinSCP, browse to the folder on the OG150 where the phonecall.pcap file was saved in this demo I saved it to directory /mnt/usb/. Next, drag the phonecall.pcap file to a folder on your PC, make sure this file is copied as a Binary file as shown in Screenshot 23. Screenshot 23 Copy capture file to laptop

15 There are a few tools available that can replay voice calls using a packet capture file as input. I will use Wireshark for this purpose which is freeware. Screenshot 24 shows the version of Wireshark that I am using for this demo. Screenshot 24 Wireshark version Next, in Wireshark open the phonecall.pcap file that you previously copied to your laptop. To eliminate some of the background noise (irrelevant protocol traffic), add the filter skinny or rtp as shown by the red arrow in Screenshot 25. This will show only Skinny and RTP protocol traffic. Skinny is the short name for Skinny Call Control Protocol SCCP and is used for call control between a Cisco IP phone and a CUCM (Cisco Unified Call Manager). In this example, Skinny was used to create a call between the Cisco IP phone and my mobile phone. RTP (Real-time Transport Protocol) is used to transport the bearer traffic (the actual real-time audio stream). Screenshot 25 Open packet capture with the filter skinny or RTP Let s re-play the voice conversation! In the Wireshark menu, go to Telephony > VoIP Calls as shown in Screenshot 26.

16 Screenshot 26 View voice calls A screen similar to the one shown in Screenshot 27 will open. If there is no content displayed, then you didn t capture any voice calls. Click on Select All and then click on Player. Screenshot 27 Select voice calls to play A new window called RTP Player will open as shown in Screenshot 28. Click on Decode. Screenshot 28 Select voice calls to play A new screen will open as shown Screenshot 29. You can listen to either one-way traffic (one person talking only) or two-way traffic (both people talking). In my example, I want to hear the entire conversation (two-way traffic) therefore tick both boxes as indicated by the red arrows in Screenshot 29 and click on Play. You will now here the full conversation being replayed to you MISSION ACCOMPLISHED!

17 Screenshot 29 Play the voice calls Demo Cover Your Tracks! Once the attack is complete, the attacker would remove the OG150. It is also likely that the attacker would cover his/her tracks by changing the TFTP server back to the original IP address and setting the Alternate TFTP setting back to No on the phone (the phone would reset and the Span to PC Port setting would be disabled again). The installation is back to normal, however the attacker has potentially hours of your phone calls that they could listen to whenever they liked... Conclusions This attack may seem a little long-winded but it is pretty easy to execute. Phone calls are understandably considered to be private in nature, therefore this is a highly intrusive attack. I have drawn the following conclusions: Cisco goes to great lengths to provide a plethora of security features that prevent this type of attack. A classic feature blocks the user from being able to access or change the phone settings. If this feature was enabled in this demo, I would not be able to change the TFTP server IP address setting to that of the OG150. I believe Cisco should enable more security features as standard. The Span to PC Port setting is DISABLED by default, this is a good thing. I personally believe that user access to network settings should be BLOCKED by default too. Like most things in IT, ease of use is often preferred over security. I see no reason why a Cisco phone should be able to download its configuration via the PC port. This is asking for trouble in my opinion. In the real world you would never have a CUCM hanging off of a phones PC port that holds all the phone

18 configuration files...therefore it should not be allowed to download phone configurations via the PC port. I am very surprised that the Cisco 7940 and 7960 phones have the Span to PC Port feature enabled and it CANNOT be disabled. This is bad and the only real alternative is to replace these phones. As always, if you have any comments or questions feel free to me at: og150mark1@gmail.com

CCNA Exploration: Accessing the WAN Chapter 7 Case Study

CCNA Exploration: Accessing the WAN Chapter 7 Case Study Objectives: Mitigate attacks based on DHCP rogue servers. Intro: ChurchBells Inc. is having connectivity issues and needs your help. The Scenario: According to the reports, some user PCs within the company

More information

Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012

Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Proprietary 2012 Media5 Corporation Scope of this Document This Technical Bulletin aims to inform the reader on the troubleshooting

More information

Using Cisco UC320W with Windows Small Business Server

Using Cisco UC320W with Windows Small Business Server Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

Automated Penetration Test

Automated Penetration Test Automated Penetration Test TABLE OF CONTENTS Introduction.... 2 Test Structure.... 2 Manually Launching The Automated Penetration Test.... 3 Automatically Launching The Automated Penetration Test On Boot....

More information

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn) NETVIGATOR Wireless Modem Setup Guide (TG789Pvn) Configure the NETVIGATOR Wireless Modem Make sure that system meets the following requirement prior to NETVIGATOR Wireless Modem usage: - Subscribers who

More information

How To Configure A Cisco Unified Ip Phone On A Cnet Box On A Microsoft Powerbook 2.5 (Powerbook) On A Mini Ip Phone (Mini Ip) On An Ip Phone With A Mini Cell Phone (Microsoft Power

How To Configure A Cisco Unified Ip Phone On A Cnet Box On A Microsoft Powerbook 2.5 (Powerbook) On A Mini Ip Phone (Mini Ip) On An Ip Phone With A Mini Cell Phone (Microsoft Power CHAPTER 2 Configuring the Cisco Unified IP Phone for MIDlets Revised: January 2012, Contents This chapter describes how to configure and manage the Cisco Unified IP Phone and the Enhanced Phone User Interface

More information

Configuring Settings on the Cisco Unified Wireless IP Phone 7925G

Configuring Settings on the Cisco Unified Wireless IP Phone 7925G CHAPTER 5 Configuring Settings on the Cisco Unified Wireless IP Phone 7925G This chapter describes the available configuration settings on the Cisco Unified Wireless IP Phone 7925G. It contains the following

More information

Iperf Bandwidth Performance Testing

Iperf Bandwidth Performance Testing Iperf Bandwidth Performance Testing TABLE OF CONTENTS What Is Iperf?... 2 Why Would A Hacker Use Iperf?... 2 Iperf Demonstration.... 3 Final Conclusions.... 8 What Is Iperf? In really simple terms, Iperf

More information

Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM

Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM A Dell technical white paper Version 1.1 Victor Teeter Network Solutions Engineer This document is for informational purposes

More information

Hands-on MESH Network Exercise Workbook

Hands-on MESH Network Exercise Workbook Hands-on MESH Network Exercise Workbook Santa Clara County RACES Date: 18 March 2015 Version: 1.0 scco_wifi_intro_exonly_v150318.docx 1 Table of Contents HANDS ON! Exercise #1: Looking at your Network

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

TMS Phone Books Troubleshoot Guide

TMS Phone Books Troubleshoot Guide TMS Phone Books Troubleshoot Guide Document ID: 118705 Contributed by Adam Wamsley and Magnus Ohm, Cisco TAC Engineers. Jan 05, 2015 Contents Introduction Prerequisites Requirements Components Used Related

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

WakeMyPC technical user guide

WakeMyPC technical user guide USER GUIDE WakeMyPC technical user guide WakeMyPC is the name for the new Wake-on-LAN (WoL) service that allows you to boot your office PC or Apple Mac from home. With this new service you no longer need

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

An Overview of Cisco IP Communicator

An Overview of Cisco IP Communicator CHAPTER 1 An Overview of Cisco IP Communicator Cisco IP Communicator is a software-based application that allows users to place and receive phone calls using their personal computers. Cisco IP Communicator

More information

Setup Cisco Call Manager on VMware

Setup Cisco Call Manager on VMware created by: Rainer Bemsel Version 1.0 Dated: July/09/2011 The purpose of this document is to provide the necessary steps to setup a Cisco Call Manager to run on VMware. I ve been researching for a while

More information

Intel Active Management Technology with System Defense Feature Quick Start Guide

Intel Active Management Technology with System Defense Feature Quick Start Guide Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.

More information

Cisco Packet Tracer 6.3 Frequently Asked Questions

Cisco Packet Tracer 6.3 Frequently Asked Questions Cisco Packet Tracer 6.3 Frequently Asked Questions Last Updated 22 January 2015 FAQ Table of Contents Cisco Packet Tracer 6.3 Release...1 Q1. What is Cisco Packet Tracer?... 1 Q2. How can I obtain Packet

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

How to add a SIP server How to register a handset

How to add a SIP server How to register a handset How to add a SIP server How to register a handset Contents Contents... 1 Hardware required equipment... 2 Software required equipment... 3 Add server... 3 Register handset to base... 7 1 of 12 Hardware

More information

Setting Up the Cisco Unified IP Phone

Setting Up the Cisco Unified IP Phone CHAPTER 3 This chapter includes the following topics, which help you install the Cisco Unified IP Phone on an IP telephony network: Before You Begin, page 3-1 Understanding the Cisco Unified IP Phone 7962G

More information

BR-800. ProHD Broadcaster. Easy Set-Up Guide V 1.01

BR-800. ProHD Broadcaster. Easy Set-Up Guide V 1.01 BR-800 ProHD Broadcaster Easy Set-Up Guide V 1.01 BR-800 EASY SET-UP GUIDE BEFOREYOUBEGIN! Pleasedeterminethetypeofconfigurationbyselectingthescenariothatbest describesthewayyouwillbeusingyourbr-800prohdbroadcaster.onceyouhavedeterminedyour

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step

More information

GS510TP and GS110T Gigabit Smart Switches

GS510TP and GS110T Gigabit Smart Switches GS510TP and GS110T Gigabit Smart Switches Software Administration Manual 350 East Plumeria Drive San Jose, CA 95134 USA December 2011 202-10883-01 v1.0 2011 NETGEAR, Inc. All rights reserved No part of

More information

VoIP Intercom and Cisco Call Manager Server Setup Guide

VoIP Intercom and Cisco Call Manager Server Setup Guide The IP Endpoint Company VoIP Intercom and Cisco Call Manager Server Setup Guide CyberData Corporation 2555 Garden Road Monterey, CA 93940 T:831-373-201 F: 831-373-4193 www.cyberdata.net 2 1.0 Setup Diagram

More information

Chapter 1 Installing the Gateway

Chapter 1 Installing the Gateway Chapter 1 Installing the Gateway This chapter describes how to set up the wireless voice gateway on your Local Area Network (LAN), connect to the Internet, and perform basic configuration. For information

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Installing Cable Modem Software Drivers

Installing Cable Modem Software Drivers Configuration Installing Cable Modem Software Drivers Windows 98SE Operating System Windows Me Operating System Windows 2000 Operating System Windows XP Operating System Wireless LAN Configuration Telnet

More information

AP6511 First Time Configuration Procedure

AP6511 First Time Configuration Procedure AP6511 First Time Configuration Procedure Recommended Minimum Configuration Steps From the factory, all of the 6511 AP s should be configured with a shadow IP that starts with 169.254.xxx.xxx with the

More information

Opalum FLOW series Opalum STREAM series Wireless setup guide. Wireless setup guide

Opalum FLOW series Opalum STREAM series Wireless setup guide. Wireless setup guide The Control Hub of the Opalum FLOW and STEAM series speaker systems is sold in two versions, with and without wireless LAN (WLAN) support. This guide applies to WLAN enabled units only. Connecting the

More information

Using Advanced Phone Features

Using Advanced Phone Features Using Advanced Phone Features This chapter describes how to configure advanced features on your IP Phone. It contains the following sections: Configuring Privacy and Security, page 9 Enabling and Using

More information

User Guide for Windows 10

User Guide for Windows 10 User Guide for Windows 10 System requirements E10684 First Edition July 2015 To facilitate a smoother transition from your previous operating system, read the system requirements below before upgrading

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Asterisk SIP Trunk Settings - Vestalink

Asterisk SIP Trunk Settings - Vestalink Asterisk SIP Trunk Settings - Vestalink Vestalink is a new SIP trunk provider that has sprung up as a replacement for Google Voice trunking within Asterisk servers. They offer a very attractive pricing

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Check Your Package Contents. CD-ROM containing Manual and Warranty

Check Your Package Contents. CD-ROM containing Manual and Warranty This product can be set up using any current web browser, i.e., Internet Explorer 6 or Netscape Navigator 6.2.3. DVA-G3340S Wireless VoIP Router Before You Begin If you purchased this Router to share your

More information

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements Connecting to the Internet LAN Hardware Requirements Computer Requirements LAN Configuration Requirements Installation Performed by Time Warner Cable Technician Connecting via Ethernet Connecting via USB

More information

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo A typical set up for a router PCs can be connected to the router via USB or Ethernet. If you wish to use a telephone with the

More information

Debugging Network Communications. 1 Check the Network Cabling

Debugging Network Communications. 1 Check the Network Cabling Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps

More information

Chapter 3 Management. Remote Management

Chapter 3 Management. Remote Management Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points Snoopy Due Date: Nov 1 Points: 25 Points Objective: To gain experience intercepting/capturing HTTP/TCP traffic on a network. Equipment Needed Use the Ubuntu OS that you originally downloaded from the course

More information

Linksys E2000 Wireless-N Router Configuration Guide

Linksys E2000 Wireless-N Router Configuration Guide Linksys E2000 Wireless-N Router Configuration Guide Revision 1.1 Copyright 2012 Maretron, LLP All Rights Reserved Maretron, LLP 9014 N. 23 rd Ave #10 Phoenix, AZ 85021-7850 http://www.maretron.com Maretron

More information

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Enabling NAT and Routing in DGW v2.0 June 6, 2012 Enabling NAT and Routing in DGW v2.0 June 6, 2012 Proprietary 2012 Media5 Corporation Table of Contents Introduction... 3 Starting Services... 4 Distinguishing your WAN and LAN interfaces... 5 Configuring

More information

Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

More information

ADMINISTRATION GUIDE Cisco Small Business

ADMINISTRATION GUIDE Cisco Small Business ADMINISTRATION GUIDE Cisco Small Business 200 Series Smart Switch Administration Guide Contents Chapter 1: Getting Started 1 Starting the Web-based Switch Configuration Utility 1 Launching the Configuration

More information

Honeywell Internet Connection Module

Honeywell Internet Connection Module Honeywell Internet Connection Module Setup Guide Version 1.0 - Page 1 of 18 - ICM Setup Guide Technical Support Setup - Guide Table of Contents Introduction... 3 Network Setup and Configuration... 4 Setting

More information

VoIP Recorder V2 Setup Guide

VoIP Recorder V2 Setup Guide VoIP Recorder V2 Setup Guide V2.10b Software Requirement for VoIP Recorder V2 (VR2) Please install WinPCap first. VR2 uses WinPCap to sniff network traffic. Download link: It is free. http://www.winpcap.org/install/default.htm

More information

TotalCloud Phone System

TotalCloud Phone System TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014 WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

640-460 - Implementing Cisco IOS Unified Communications (IIUC)

640-460 - Implementing Cisco IOS Unified Communications (IIUC) 640-460 - Implementing Cisco IOS Unified Communications (IIUC) Course Introduction Course Introduction Module 1 - Cisco Unified Communications System Introduction Cisco Unified Communications System Introduction

More information

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4 1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

More information

IP Phone Configuration and Troubleshooting Guide

IP Phone Configuration and Troubleshooting Guide IP Phone Configuration and Troubleshooting Guide NetVanta 7000 Series and IP 700 Series Phones Overview The purpose of this guide: Explain the default configuration. Explain how to configure the NetVanta

More information

LOREX CLIENT 2.2 Integrated Remote Agent Software

LOREX CLIENT 2.2 Integrated Remote Agent Software LOREX CLIENT 2.2 Integrated Remote Agent Software Instruction Manual English Version 1.0 MODEL: L15LD420 / L17LD420 Series Copyright 2008 LOREX Technology Inc. www.lorexcctv.com Table of Contents Table

More information

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux

More information

STB- 2. Installation and Operation Manual

STB- 2. Installation and Operation Manual STB- 2 Installation and Operation Manual Index 1 Unpacking your STB- 2 2 Installation 3 WIFI connectivity 4 Remote Control 5 Selecting Video Mode 6 Start Page 7 Watching TV / TV Guide 8 Recording & Playing

More information

USER GUIDE. Web Interface

USER GUIDE. Web Interface USER GUIDE Web Interface 1. Overview... 4 2. Install and Set Up... 4 2.1. Charge your Wi-Fi HDD... 4 2.2. For Mac users... 5 2.3. Connect your Wi-Fi HDD to your computer (no Internet connection required)...

More information

이 기기는 업무용 급 으로 전자파적합등록을 한 기기이오니 판매자 또는 사용자는 이점을 주의하시기 바라며 가정 외의 지역에서 사용하는 것을 목적으로 합니다

이 기기는 업무용 급 으로 전자파적합등록을 한 기기이오니 판매자 또는 사용자는 이점을 주의하시기 바라며 가정 외의 지역에서 사용하는 것을 목적으로 합니다 020-101186-01 020-101186-01 이 기기는 업무용 급 으로 전자파적합등록을 한 기기이오니 판매자 또는 사용자는 이점을 주의하시기 바라며 가정 외의 지역에서 사용하는 것을 목적으로 합니다 Table of Contents About this Document... 1 Document Conventions... 1 Audience... 1 Related

More information

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME Scenario With the scheduled release of Packet Tracer v5.3 in the near future, this case study is designed to provide you with an insight into

More information

Lab 1: Introduction to the network lab

Lab 1: Introduction to the network lab CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

An Overview of the Cisco Unified Wireless IP Phone 7921G

An Overview of the Cisco Unified Wireless IP Phone 7921G CHAPTER1 An Overview of the Cisco Unified Wireless IP Phone 7921G The Cisco Unified Wireless IP Phone 7921G provides wireless voice communication over an Internet Protocol (IP) network. Like traditional

More information

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX NOTE: This is an advisory document to be used as an aid to resellers and IT staff looking to use the Edgewater 4550 in conjunction with

More information

ThinLinX TLXOS 64-bit Firmware Installation Guide for the Intel NUC Range. Materials Required

ThinLinX TLXOS 64-bit Firmware Installation Guide for the Intel NUC Range. Materials Required ThinLinX TLXOS 64-bit Firmware Installation Guide for the Intel NUC Range The Intel NUC is a small form factor computer that incorporates several models from Intel Core processors to the economical Single

More information

CT505-35 LANforge-FIRE VoIP Call Generator

CT505-35 LANforge-FIRE VoIP Call Generator 1 of 7 7/12/2013 2:01 PM Network Testing and Emulation Solutions http://www.candelatech.com sales@candelatech.com +1 360 380 1618 [PST, GMT -8] CT505-35 LANforge-FIRE VoIP Call Generator The CT505-35 supports

More information

http://computernetworkingnotes.com/ccna-study-guide/cisco-ios-naming-convention-explainedwith-examples.html

http://computernetworkingnotes.com/ccna-study-guide/cisco-ios-naming-convention-explainedwith-examples.html IOS is the most critical part of any cisco device. We should always keep a backup copy of IOS to deal with any unwanted situation. In this article I will explain the backup and restore process of IOS in

More information

10 Ways. Cisco Meraki Switches Make Life Easier

10 Ways. Cisco Meraki Switches Make Life Easier 10 Ways Cisco Meraki Switches Make Life Easier 10 Ways Cisco Meraki Switches Make Life Easier 1. Preconfigure switches for zero-touch deployment 2. Manage all switch ports from a single pane of glass

More information

Unified Messaging. User Guide

Unified Messaging. User Guide Unified Messaging User Guide Notice This user guide is released by Inter-Tel, Inc. as a guide for end-users. It provides information necessary to use Unified Messaging v2.2. The contents of this user

More information

Configuring DHCP Snooping

Configuring DHCP Snooping CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.

More information

Tue Apr 19 11:03:19 PDT 2005 by Andrew Gristina thanks to Luca Deri and the ntop team

Tue Apr 19 11:03:19 PDT 2005 by Andrew Gristina thanks to Luca Deri and the ntop team Tue Apr 19 11:03:19 PDT 2005 by Andrew Gristina thanks to Luca Deri and the ntop team This document specifically addresses a subset of interesting netflow export situations to an ntop netflow collector

More information

FreeAgent DockStar Network Adapter User Guide

FreeAgent DockStar Network Adapter User Guide FreeAgent DockStar Network Adapter User Guide FreeAgent DockStar Network Adapter User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are

More information

IP Office Anywhere Demo Installation

IP Office Anywhere Demo Installation IP Office Anywhere Demo Installation Release 8.1 FP1 Issue 01.08 Sept 2014 Contents Chapter 1: Introduction... 5 Network specifications... 6 Hardware requirements... 7 Software requirements... 9 Avaya

More information

Chapter 4 Management. Viewing the Activity Log

Chapter 4 Management. Viewing the Activity Log Chapter 4 Management This chapter describes how to use the management features of your NETGEAR WG102 ProSafe 802.11g Wireless Access Point. To get to these features, connect to the WG102 as described in

More information

MS Windows DHCP Server Configuration

MS Windows DHCP Server Configuration MS Windows DHCP Server Configuration Abstract This document describes how to configure option 43 on a Microsoft Windows 2000/2003 DHCP server. This information may be used in an Aruba Networks solution

More information

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents First Steps... 3 Identifying your MAC Address... 3 Identifying your Dynamic IP Address...

More information

Quick Start Guide. Cisco SPA232D Mobility Enhanced ATA

Quick Start Guide. Cisco SPA232D Mobility Enhanced ATA Quick Start Guide Cisco SPA232D Mobility Enhanced ATA Package Contents Analog Telephone Adapter Ethernet Cable Phone Cable Power Adapter Quick Start Guide Product CD-ROM Welcome Thank you for choosing

More information

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox

More information

Copyright and Trademarks. How to Use this Guide. Phone Adapter with Router

Copyright and Trademarks. How to Use this Guide. Phone Adapter with Router Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Cisco CallManager configuration for BLU-103

Cisco CallManager configuration for BLU-103 Cisco CallManager configuration for BLU-103 This document details the steps required to configure a Cisco CallManager VoIP system to work with a BLU-103 VoIP interface. 10653 South River Front Pkwy, Suite

More information

Kerio Operator. Getting Started Guide

Kerio Operator. Getting Started Guide Kerio Operator Getting Started Guide 2011 Kerio Technologies. All rights reserved. 1 About Kerio Operator Kerio Operator is a PBX software for small and medium business customers. Kerio Operator is based

More information

CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces 1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com sales@candelatech.com +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with

More information

3.5 LAN HDD Enclosure User s Manual

3.5 LAN HDD Enclosure User s Manual 3.5 LAN HDD Enclosure User s Manual NOTE: 1. USB and LAN can t be used at the same time. 2. HDD should be formatted as FAT32. Please check Disk utility section in this manual. 3. For internet FTP usage,

More information

Router Lab Reference Guide

Router Lab Reference Guide Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

Advanced Internetworking

Advanced Internetworking Advanced Internetworking Lab 5 - Multimedia networking rev 1.0 Markus Hidell Voravit Tanyingyong Royal Institute of Technology (KTH) Telecommunication Systems Lab (TSlab)

More information

ProSAFE 8-Port and 16-Port Gigabit Click Switch

ProSAFE 8-Port and 16-Port Gigabit Click Switch ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that

More information

Fixing Problems with IP Phone Services

Fixing Problems with IP Phone Services Fixing s with IP Phone Services Document ID: 13959 Contents Introduction Prerequisites Requirements Components Used Conventions Change the URL Services in Cisco CallManager Reset the TFTP Server Reset

More information

DSL Installation Guide

DSL Installation Guide DSL Installation Guide Thank you for choosing Integra Telecom s DSL service! Introduction This guide will walk you through the DSL installation process and will help you configure a computer to access

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information