Lab 1: Introduction to the network lab

Size: px
Start display at page:

Download "Lab 1: Introduction to the network lab"

Transcription

1 CSCI DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs, you may find it useful to use the man pages to get more information. Manual pages (man pages) exist on every lab machine. For each of the following commands, type the name of the command as a search term. The search will return the appropriate man page (e.g. type in man mv). Read the man pages of the following commands to refresh your memory on some linux commands: mv rmdir pwd cp chmod ls rm kill more mkdir ping tcpdump We will be using wireshark to monitor network activity. The man page for wireshark, a network analyzer tool, can be found on every lab machine. You can also read about the wireshark network analyzer at the website The machines used in the network lab are not connected to the Internat and cannot be used for web browsing. In Lab 1, you will acquaint yourself with the equipment of the Internet Lab, the Linux operating system, and some traffic measurement tools. Saving Data Most lab exercises ask you to save data that is displayed on your monitor to a file. Save your files to a flash drive before the end of the lab. You will need the files when you prepare your lab report. *** Note that after you save your data to the flash drive and before you remove the flash drive, you must unmount the drive or you will likely lose your data! When you insert the flash drive into the computer, an icon for the drive should show up on the desktop. To unmount the drive, rightclick on the icon and select eject volume (or some similar command). Once this is done, you can safely remove the drive. If you bring insert the drive into one of the linux machines in the main lab, you must do the same or you may corrupt your drive. If you cannot find the drive on the desktop, you can try opening the file icon to look for the flashdrive. *** NOTE: Whenever you create a file, place the file in the directory /Labdata. Since other students will most likely purge the files in this directory, please remember to save your files to a flash drive at the end of your lab session. Here are three methods to save data to a file on a Linux system.

2 1. Save data to a file with the redirection operators: Linux provides an easy way for redirecting the output of a command to a file via the redirection operators > and >>. (> writes a file and >> appends the file). 2. View and save data at the same time: You can view data on the monitor and save data to a file at the same time. For example, to display the output of command is in a terminal window, and also to file with name fname, you can use the command ROOT@PC1% ls tee fname or ROOT@PC1% ls > fname & tail f fname. 3. Save data with a text editor (with copy and paste) Open your favorite Unix editor such as gedit, kwrite, kate, etc. Use Ctrl-C and CTRL-V to copy and paste things into the editor window. From a terminal window, you will need to use the top menus edit, copy to grab data from the window and paste into an editor window. SETUP FOR PC 1 Please take a few minutes to compare the following description with the actual equipment: Four Linux PCs, which are labeled as PC1, PC2, PC3, and PC4. The PCs have the Linux operating system installed. Each Linux PC has two Ethernet network interface cards (NICs) installed, which are labeled em1 and p1p1. An Ethernet hub with at least four ports. A monitor, a keyboard, a mouse, and a KVM (keyboard-video-mouse) switch. The KVM switch connects the keyboard, monitor, and mouse to the four Linux PCs. The KVM switch gives you control over all four Linux PCs from one keyboard, one monitor, and one mouse, but you can access only one computer at a time. Ethernet cables. Note that there are two kinds: straight-through Ethernet cables (blue in color) and crossover Ethernet cables. In Lab 1, only straight-through Ethernet cables are used. Before you get started, one at a time, reboot each of the PCs to be sure that the network settings are refreshed. 1. Set the KVM switch to PC1 (the first light or the number 1 should light up). Log in as netlab (password netlab). 2. Open a terminal window. Type reboot at the prompt. Don't switch the KVM switch while a Linux PC is rebooting, otherwise the keyboard and mouse may not work properly. 3. Do the same for each of the machines. On PC1, open an editor (e.g. gedit) so that you can save data for later use. You can do this from the menu or the command line by typing gedit& (The & will cause the process to run in the background so that you can use the window for other things. If you start a process and then decide you want to to be running in the background, you can shift it to run in the background by first entering CTRL-Z to suspend the process and then entering bg to indicate that you want it to resume it as a background process.) Exercise 1 EXERCISE 1(A). 1. Set the KVM switch to PC1 (the first light or the number 1 should light up). Log in as netlab (password netlab). 2. Use the KVM switch to switch to PC3 (the third light or the number 3 should light up) and log in as netlab (password netlab). 3. Explore the desktop environment of PC3. 4. If a terminal window is not open, open a terminal window. Recall that all Linux commands are typed from a terminal window.

3 EXERCISE 1(B). In Lab 1 the four Linux PCs must be connected to an Ethernet hub. All Linux PCs are attached to the same Ethernet hub. 1. Attach each Linux PC to the same Ethernet hub with (straight-through) Ethernet cables. Connect the Ethernet interface with label em1 of each Linux PC to a hub using an Ethernet cable. Do not connect into the slot marked uplink on the hub. 2. Check to see if your physical connections are made by assuring that the small LEDs are lit on both the hub and on the back of the PC s. This is often a good way to check for a physical problem that may prevent wasted effort when the problem is really a bad cable. EXERCISE 1(C). To do many of these commands, you need to be root. Be careful, as root you have great power ("with great power come great responsibility"). You can do a lot of damage as root. To do this enter the command netlab@lab1% su - Note: It is important to have the dash after the su command in order to take on the root environment. When prompted, enter the password for root ( also netlab) To configure the IP addresses, we will be using the ip command in the sbin directory. Before continuing, look at the man pages for the ip command. To start, enter: Netlab@PC1% /sbin/ip addr show Entering /sbin/ip addr show will give you status information for each of the network interfaces. Take the information that you receive from the system by running this command and save it in a file so that you can include it in your lab report. Provide the results of the ip addr show command and explain the meaning of the different pieces of information provided. Next enter: /sbin/ip addr show em1 Providing the name of an interface will provide status information on that interface only. To set the IP address of an interface em1 to with a net mask of , enter the following command: Netlab@PC1%/sbin/ip addr add /24 dev em1

4 Finally, bring the interface up with the command link set em1 up (may not be necessary) Set the IP address for each of the 4 devices, according to the table. IP addresses for the Linux PCs as shown in Table 1.1. Linux PC IP Addresses of Ethernet Interface em1: Host IP Address PC /24 PC /24 PC /24 PC /24 The notation /24 means that the IP address is and the network prefix is 24 bits long. A network prefix of 24 bits corresponds to a netmask set to With this netmask, all hosts are on the /24 network. EXERCISE 1(D) Testing connectivity between computers. One of the most basic, but also most effective, tools to debug IP networks is the ping command. The ping command tests whether another host or router on the Internet is reachable. The ping command sends an ICMP Echo Request datagram to an interface and expects an ICMP Echo Reply datagram in return. NOTE: On Linux systems, ping continues to send packets until you interrupt the command with the Ctrl-C keys. When using ping on the Linux PCs, always send at least two ICMP Echo Request packets. The first ICMP Echo Request may often be dropped at the receiver. This occurs when the ICMP Echo Request packet does not reach its destination within a certain amount of time or number of hops, e.g., when waiting for an ARP Reply or ICMP Redirect. After connecting the four Linux PCs to the Ethernet hub, all four computers should be able to communicate with one another. Verify connectivity by using the ping command. From PC1, ping each of the other three machines by entering: Netlab@PC1% ping c 3 <addr> where <addr> is replaced by each of the other three addresses in turn. If you have problems, check your connections and settings and fix. Save the results of your ping and include them in your report. Include the results of your ping along with a brief explanation. Switch to PC2 and repeat the process to assure that each machine can be reached via PC2.

5 Linux Configuration Linux has numerous configuration files that set the environment variables of the operating system. For example, if you want to set up your Linux PC as an IP router, you merely need to change a single line in one of the configuration files. Studying configuration files also provides a way of learning what network configuration options are available to you. Configuration files are fundamentally different across different versions of Unix-like operating systems (e.g., AIX, Solaris, Linux, FreeBSD). Sometimes the structure of configuration files changes between releases of the same Unix version. For example, the configuration files of different Linux distributions, such as Red Hat and Slackware, are quite different. Furthermore, the configuration files between different versions of the some Linux distribution can have significant differences. A list of the most important network configuration files follows: /etc/sysconfig/network This file defines global parameters of the network configuration, such as the host name, domain name, and IP address of the default gateway. It also includes a line to determine whether the Linux PC acts as a router or not. /etc/sysconfig/network scripts /ifcfg lo /etc/sysconfig/network scripts /ifcfg em1 /etc /sysconfig/network-scripts /ifcfg-p1p1 These files define the configuration of the network interfaces. There is one configuration file for each network interface. The files ifcfg-em1 and ifcfg-p1p1 are for the two installed Ethernet interface cards. The file ifcfg lo is for the loopback interface. /etc/sysctl.conf This file specifies many kernel options related to the network configuration. /etc/sysconfig/static-routes This file contains the settings of the static routing table, which is set when booting the Linux PC. It may not exist or may be empty if no static routes have been previously assigned. EXERCISE 1(E) On PC1, issue a ping to the IP address of PC1. Also, issue a ping command to the loopback interface Limit the number of pings to five Save the output. Include the output you saved in this exercise. Explain the difference between pinging the local Ethernet interface and the loopback interface. Specifically, on PC 1, what is the difference between typing ping and ping (This is a conceptual question on the role of the loopback interface. The response to the ping command does not provide you with the answer to this question.)

6 TCPDUMP tcpdump allows you to capture traffic on a network and display the packet headers of the captured traffic. tcpdump can be used to identify network problems or to monitor network activities. See the man pages for tcpdump. Exercise 2 EXERCISE 2A Simple tcpdump exercise. Use tcpdump to observe the network traffic that is generated by issuing ping commands. 1. Switch to PC1. Start tcpdump so that it monitors all packets that contain the IP address of PC2, by typing root@pc1% tcpdump -n host Open a new window and execute Netlab@PC1% ping -c Observe the output of tcpdump. Save the output to a file. NOTE: If you use the tee or tail commands to simultaneously view and save the output from tcpdump, you need to use the -l option of tcpdump. For example, tcpdump -n -l > filename & tail f filename tcpdump -n -l tee filename It-may be necessary to hit CTRLl-C to terminate the tcpdump session. It may sometimes be best to simply redirect the output of tcpdump straight to a file (e.g. tcpdump > filename) and view it afterward with a text editor. Include a snippet of the saved output in your lab report. Explain the meaning of each field in the captured data. EXERCISE 2(B). 1. On PC1, start capturing packets using the tcpdump -n command. 2. Issue a ping to the nonexistent IP address : Netlab@PC1% ping -c Issue a ping to the broadcast address using the command Netlab@PC1% ping -c 2 -b Save the outputs of ping and tcpdump to a file.

7 Include relevant output in your lab report and interpret the results. How many of the Linux PCs responded to the broadcast ping? Wireshark Wireshark is a network protocol analyzer with a graphical user interface. Using wireshark, you can interactively capture and examine network traffic, view summaries, and get detailed information for each packet. Before starting this part of the exercise, reboot PC1 and then reconfigure em1 with the IP address as before. This is important to do before starting! Do not test the interface after issuing the /sbin/ip commands. Exercise 3 EXERCISE 3. Running Wireshark This exercise walks you through the steps of capturing and saving network traffic with wireshark. The exercise is conducted on PCI. 1. Starting wireshark: On PC1, start wireshark by typing ROOT@PC1% wireshark & or select it from the icons on the bottom of the screen. 2. Starting the traffic capture: Start the packet capture by selecting Capture, Itnerfaces from the top menu. In the second window, click on the Start button after em1. 3. Generating traffic: In a separate window on PC1, execute a ping command to PC3. Netlab@PC1% ping -c Observe the output in the wireshark main window. Click and highlight a captured packet in the wireshark window and view the headers of the captured traffic. 4. Stopping the traffic capture: Click Stop in the window Ethernet Capture. 5. Saving captured traffic: Save the results of the captured traffic as a plain text file. This is done by selecting export in the File menu. When a Export window pops up, select the options and set a filename. If you select Save in the file menu, the captured data is saved in the format of a libpcap file. This format con be interpreted by both tcpdump and wireshark. Measurements saved in libpcap format can be analyzed at a later time. However, libpcap files are not plain text files and are not useful for preparing your report. Unless you have the tcpdump and/or wireshark tools available on a system outside of the lab, which allows you to view and save captured traffic as text at a later time, always save captured traffic in plain text Format.

8 Repeat this process a second time. Restart the traffic capture on em1 and again issue the ping command for PC3. Save the results in a second file. Netlab@PC1% ping -c Include the file with the captured data in your lab report. Save the details of the captured traffic, using the Export window. Explain why you have different number of packets in the second capture than you do in the first. Describe the differences between the files saved by tcpdump and by wireshark (in this part). TearDown When you are done with the exercises, you must return the lab to the state at th which you should have found it. Remove all data files that you created and disconnect all network wires. Writing the Your file lab report should have a heading that includes your name, the date you conducted the lab exercise, the lab number, and the names of all individuals who worked on the lab with you. It should be written with an introduction, an explanation of what occurred for each step (including problems encountered) and results along with analysis if appropriate. Include any data needed to support what you ahve done but please save trees by limiting the amount of data that you print to a minimum. A conclusion should sum up lessons learned and what things you would do differently if you were to do it again. Finally, make any suggestions that you would recommend for this lab in the future. Submitting Submit only one lab report per group. The name of the report should be Lab1_Report_fist_last.pdf where first and last represent the name of one member (selected at random) of the group(e.g. Lab1_Report_John_Doe.pdf). The list of names of the group members should be included in the first page of the report. To submit, copy the file to /usr/people/handin/cs312 folder by the due date listed in the class website.

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Debugging Network Communications. 1 Check the Network Cabling

Debugging Network Communications. 1 Check the Network Cabling Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

1 crossover cable. the PCs. network

1 crossover cable. the PCs. network King Abdul-Aziz University Faculty of Computing and Information Technology Department of Information Technology Computer Networks CPIT370 Lab#2: Wired Peer to Peer network and star topology using a switch

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:

More information

[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1

[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 [HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 How to Recover an infiniti/evolution Modem Software Reference idx 3.0.0.0 (12.0.0.0) Updated: November 17 th 2011 Overview Recovery Procedures

More information

INTRODUCTION. Version 6c, May 16 th, 2003. -updated numbering of Figures 28, 31 0-1. Deleted: March

INTRODUCTION. Version 6c, May 16 th, 2003. -updated numbering of Figures 28, 31 0-1. Deleted: March INTRODUCTION The Internet Lab is a miniature version of the Internet. Instead of millions of hosts and routers, the Internet Lab has only four routers, four personal computers (PCs), and a few Ethernet

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

10.3.1.8 Lab - Configure a Windows 7 Firewall

10.3.1.8 Lab - Configure a Windows 7 Firewall 5.0 10.3.1.8 Lab - Configure a Windows 7 Firewall Print and complete this lab. In this lab, you will explore the Windows 7 Firewall and configure some advanced settings. Recommended Equipment Step 1 Two

More information

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of

More information

3.1 Connecting to a Router and Basic Configuration

3.1 Connecting to a Router and Basic Configuration 3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console

More information

In this lab you will explore the Windows XP Firewall and configure some advanced settings.

In this lab you will explore the Windows XP Firewall and configure some advanced settings. 16.3.2 Lab: Configure Windows XP Firewall Print and complete this lab. In this lab you will explore the Windows XP Firewall and configure some advanced settings. Recommended Equipment Two computers directly

More information

10.3.1.9 Lab - Configure a Windows Vista Firewall

10.3.1.9 Lab - Configure a Windows Vista Firewall 5.0 10.3.1.9 Lab - Configure a Windows Vista Firewall Print and complete this lab. In this lab, you will explore the Windows Vista Firewall and configure some advanced settings. Recommended Equipment Step

More information

Procedure to Create and Duplicate Master LiveUSB Stick

Procedure to Create and Duplicate Master LiveUSB Stick Procedure to Create and Duplicate Master LiveUSB Stick A. Creating a Master LiveUSB stick using 64 GB USB Flash Drive 1. Formatting USB stick having Linux partition (skip this step if you are using a new

More information

Hands-on MESH Network Exercise Workbook

Hands-on MESH Network Exercise Workbook Hands-on MESH Network Exercise Workbook Santa Clara County RACES Date: 18 March 2015 Version: 1.0 scco_wifi_intro_exonly_v150318.docx 1 Table of Contents HANDS ON! Exercise #1: Looking at your Network

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

10.3.1.10 Lab - Configure a Windows XP Firewall

10.3.1.10 Lab - Configure a Windows XP Firewall 5.0 10.3.1.10 Lab - Configure a Windows XP Firewall Print and complete this lab. In this lab, you will explore the Windows XP Firewall and configure some advanced settings. Recommended Equipment Step 1

More information

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check

More information

USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks

USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks CTC Union Technologies Co., Ltd. Far Eastern Vienna Technology Center (Neihu Technology Park) 8F, No. 60 Zhouzi St. Neihu,

More information

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above. Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A

More information

CONNECTING THE RASPBERRY PI TO A NETWORK

CONNECTING THE RASPBERRY PI TO A NETWORK CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete

More information

Red Hat Linux Networking

Red Hat Linux Networking The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,

More information

Tutorial Guide to the IS Unix Service

Tutorial Guide to the IS Unix Service Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular

More information

Chapter 2 Preparing Your Network

Chapter 2 Preparing Your Network Chapter 2 Preparing Your Network This document describes how to prepare your network to connect to the Internet through a router and how to verify the readiness of your broadband Internet service from

More information

SATO Network Interface Card Configuration Instructions

SATO Network Interface Card Configuration Instructions SATO Network Interface Card Configuration Instructions Table of Contents 1. Reset of wired/wireless interface card... 3 2. Installing the All-In-One Utility (recommended)... 4 3. Configuring wired/wireless

More information

Pre-lab and In-class Laboratory Exercise 10 (L10)

Pre-lab and In-class Laboratory Exercise 10 (L10) ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

Load Balancing. Outlook Web Access. Web Mail Using Equalizer

Load Balancing. Outlook Web Access. Web Mail Using Equalizer Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems

More information

Lab assignment #1 Firewall operation and Access Control Lists

Lab assignment #1 Firewall operation and Access Control Lists University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab GSA: Carlos Caicedo Document version: 1.0 / 2008 I. Lab resources for this assignment Lab assignment #1 Firewall

More information

IT Essentials II: Network Operating Systems V 3.0

IT Essentials II: Network Operating Systems V 3.0 IT Essentials II: Network Operating Systems V 3.0 Linux Labs - Knoppix Version Student Manual v3 1-77 IT Essentials II v3 Linux Labs - Knoppix version November 2005 Configuring Knoppix as an NIS Client

More information

This techno knowledge paper can help you if: You need to setup a WAN connection between a Patton Router and a NetGuardian.

This techno knowledge paper can help you if: You need to setup a WAN connection between a Patton Router and a NetGuardian. Problem: Patton / 240T WAN Setup Platform: NetGuardian 240T This TKP is a guide to setting up a PPP to T1 WAN connection between a Patton Model 2603 Router and a NetGuardian 240T. The example in this guide

More information

Operating System Installation Guidelines

Operating System Installation Guidelines Operating System Installation Guidelines The following document guides you step-by-step through the process of installing the operating systems so they are properly configured for boot camp. The document

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

EDGE FX Network configuration

EDGE FX Network configuration Page 1 of 16 TITLE: Category: EDGE FX Network configuration GERBER EDGE Document Number: 4280 Supplied by: Gerber Service Last Modified: April 14, 2011 Summary: In order to connect an EDGE FX to your PC

More information

System Area Manager. Remote Management

System Area Manager. Remote Management System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for

More information

BioStar Config Guide V1.0

BioStar Config Guide V1.0 BioStar Config Guide V1.0 Suprema Inc. 16F Parkview Tower 6 Jeongja, Bundang Seongnam 463-863 Korea www.supremainc.com Last edited: 27 December 2011 This document is copyright 27 December 2011 by Suprema

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

How to Create, Setup, and Configure an Ubuntu Router with a Transparent Proxy.

How to Create, Setup, and Configure an Ubuntu Router with a Transparent Proxy. In this tutorial I am going to explain how to setup a home router with transparent proxy using Linux Ubuntu and Virtualbox. Before we begin to delve into the heart of installing software and typing in

More information

Recommended Network Setup

Recommended Network Setup Recommended Network Setup Greater Giving Event Software uses Windows File Sharing to allow multiple computers to connect to the same database within your network. This document uses Windows XP as the default

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network

Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network CMPE 150 Fall 2005 Introduction Today you are going to be thrown into using Cisco s Internetwork Operating System (IOS) to configure

More information

Compuprint 4247 Serial Matrix Printers

Compuprint 4247 Serial Matrix Printers Compuprint 4247 Serial Matrix Printers Remote Printer Management Utility for Serial Matrix Printers MAN10300-00.00 First edition (October 2011) This edition applies to the Compuprint 4247 printers and

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

1 PC to WX64 direction connection with crossover cable or hub/switch

1 PC to WX64 direction connection with crossover cable or hub/switch 1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network

More information

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6

More information

NetLINE Wireless Broadband Gateway

NetLINE Wireless Broadband Gateway NetLINE Setup Guide Farallon s NetLINE connects to your cable/dsl modem, allowing computers on your local wired and wireless networks to share a single broadband connection to the Internet. This Setup

More information

HL2170W Windows Network Connection Repair Instructions

HL2170W Windows Network Connection Repair Instructions Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine

More information

How Do I Recover infiniti Remotes and Line Cards?

How Do I Recover infiniti Remotes and Line Cards? How Do I Recover infiniti Remotes and Line Cards? Date: June 26, 2008 Overview This FAQ contains the following information and procedures pertaining to ids Release 6.0.1 and later: Before Attempting to

More information

Software installation and configuration IEC-line series

Software installation and configuration IEC-line series Software installation and configuration IEC-line series update: 04-10-2014 IEC-line by OVERDIGIT overdigit.com Table of contents 1. Installing the software... 3 1.1. Installing CoDeSys... 4 1.2. Installing

More information

SA-9600 Surface Area Software Manual

SA-9600 Surface Area Software Manual SA-9600 Surface Area Software Manual Version 4.0 Introduction The operation and data Presentation of the SA-9600 Surface Area analyzer is performed using a Microsoft Windows based software package. The

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

Ultra Thin Client TC-401 TC-402. Users s Guide

Ultra Thin Client TC-401 TC-402. Users s Guide Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE

More information

Setting Up Your FTP Server

Setting Up Your FTP Server Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This

More information

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup 1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already

More information

Smoking and any food or drinks are not permitted in the Applications Lab!

Smoking and any food or drinks are not permitted in the Applications Lab! 220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks

More information

integration tools setup guide SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop

integration tools setup guide SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop setup guide integration tools SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop 2010 Meyer Sound. All rights reserved. SIM 3 Remote Setup Guide,

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Moxa Device Manager 2.3 User s Manual

Moxa Device Manager 2.3 User s Manual User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Connecting the DG-102S VoIP Gateway to your network

Connecting the DG-102S VoIP Gateway to your network Contents of Package: DG-102S VoIP Station Gateway Power adapter CD-ROM, including User s Manual Quick Install Guide Requirements: RS-232 Console Cable Two RJ-45 CAT-5 Straight-Through Cables For more information

More information

FILE TRANSFER PROTOCOL (FTP) SITE

FILE TRANSFER PROTOCOL (FTP) SITE FILE TRANSFER PROTOCOL (FTP) SITE Section 1 - SPIN System Overview As part of the digital plan submission process that Registries is currently implementing a File Transfer Protocol (FTP) site has been

More information

Digicom Remote Control for the SRT

Digicom Remote Control for the SRT Digicom Remote Control for the SRT To operate the SRT remotely, use Remote Desktop; this is available free for Linux, Mac OS-X (from Microsoft), and is included with Windows XP and later. As RD uses a

More information

RADAR NETWORK SETUP WITH WINDOWS XP/VISTA

RADAR NETWORK SETUP WITH WINDOWS XP/VISTA RADAR NETWORK SETUP WITH WINDOWS XP/VISTA These instructions are for setting up a Network between RADAR and a PC. To use RADAR s FTP client a 3 rd party FTP Server is needed such as FileZilla Server. This

More information

Savvius Insight Initial Configuration

Savvius Insight Initial Configuration The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure

More information

Lab 8.3.2 Conducting a Network Capture with Wireshark

Lab 8.3.2 Conducting a Network Capture with Wireshark Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

ACP ThinManager Tech Notes Troubleshooting Guide

ACP ThinManager Tech Notes Troubleshooting Guide ACP ThinManager Tech Notes Troubleshooting Guide Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit www.thinmanager.com/technotes/ to download the manual, manual

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Host Configuration (Linux)

Host Configuration (Linux) : Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support

More information

Exercise 4 MPLS router configuration

Exercise 4 MPLS router configuration Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.

More information

Moxa Device Manager 2.0 User s Guide

Moxa Device Manager 2.0 User s Guide First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual

More information

Installation Overview

Installation Overview Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...

More information

2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21

2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21 Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................

More information

Applicazioni Telematiche

Applicazioni Telematiche Angelo Coiro Laboratorio Applicazioni Telematiche L emulatore Packet Tracer Packet Tracer Cisco Packet Tracer is an academic software that allows to emulate Cisco devices Packet Tracer can be used for

More information

In the following installation procedures, do not disconnect the Mediatrix 3000 Series while the LEDs are flashing.

In the following installation procedures, do not disconnect the Mediatrix 3000 Series while the LEDs are flashing. Discover the Power of Mediatrix 000 Series Installation Warning: In the following installation procedures, do not disconnect the Mediatrix 000 Series while the LEDs are flashing. Thank you for choosing

More information

Chapter 7 Troubleshooting

Chapter 7 Troubleshooting Chapter 7 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe VPN Firewall 200. After each problem description, instructions are provided to help you diagnose and

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Building a Penetration Testing Virtual Computer Laboratory

Building a Penetration Testing Virtual Computer Laboratory Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network

More information

SSL VPN Setup for Windows

SSL VPN Setup for Windows SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through

More information

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices

More information

OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher

OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher OPERATION MANUAL MV-410RGB Layout Editor Version 2.1- higher Table of Contents 1. Setup... 1 1-1. Overview... 1 1-2. System Requirements... 1 1-3. Operation Flow... 1 1-4. Installing MV-410RGB Layout

More information

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface. Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...

More information

Raspberry Pi Setup Tutorial

Raspberry Pi Setup Tutorial Raspberry Pi Setup Tutorial The Raspberry Pi is basically a miniature linux- based computer. It has an ARM processor on it, specifically the ARM1176JZF- S 700 MHz processor. This is the main reason why

More information

Homework 3 TCP/IP Network Monitoring and Management

Homework 3 TCP/IP Network Monitoring and Management Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report

More information

Linux Overview. Local facilities. Linux commands. The vi (gvim) editor

Linux Overview. Local facilities. Linux commands. The vi (gvim) editor Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful

More information

Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)

Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE) Network Setup Guide 1 Glossary 1.1 Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service Provider) means

More information

Chapter 3 Management. Remote Management

Chapter 3 Management. Remote Management Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described

More information

Chapter 4 Management. Viewing the Activity Log

Chapter 4 Management. Viewing the Activity Log Chapter 4 Management This chapter describes how to use the management features of your NETGEAR WG102 ProSafe 802.11g Wireless Access Point. To get to these features, connect to the WG102 as described in

More information

c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem

c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem Start Here Follow these instructions to set up your router. Verify That Basic Requirements Are Met Assure that the following requirements are met: You have your broadband Internet service settings handy.

More information

Sample Configuration Using the ip nat outside source static

Sample Configuration Using the ip nat outside source static Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Link Link sys E3000 sys RE1000

Link Link sys E3000 sys RE1000 User Guide High Performance Extender Wireless-N Router Linksys Linksys RE1000 E3000Wireless-N Table of Contents Contents Chapter 1: Product Overview 1 Front 1 Top 1 Bottom 1 Back 2 Chapter 2: Advanced

More information

CS 103 Lab Linux and Virtual Machines

CS 103 Lab Linux and Virtual Machines 1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation

More information

Honeywell Internet Connection Module

Honeywell Internet Connection Module Honeywell Internet Connection Module Setup Guide Version 1.0 - Page 1 of 18 - ICM Setup Guide Technical Support Setup - Guide Table of Contents Introduction... 3 Network Setup and Configuration... 4 Setting

More information

QOS 8 High-Speed RAID System Guide

QOS 8 High-Speed RAID System Guide QOS 8 High-Speed RAID System Guide Not for Redistribution 1 Introduction The QOS is a standalone storage array, part of a file- based workflow involving numerous users sharing the same files in real time.

More information