Computer Networks/DV2 Lab

Size: px
Start display at page:

Download "Computer Networks/DV2 Lab"

Transcription

1 Computer Networks/DV2 Lab Room: BB 219 Additional Information: Equipment for each group: - 1 Server computer (OS: Windows Server 2008 Standard) - 1 Client computer (OS: Windows XP Professional) - 1 Computer as Router / Gateway (OS: Linux) - 1 Switch - Network cables 1. Practical Training: Network planning and installation of a file server 2. Practical Training: Web server installation and dynamic Web pages 3. Practical Training: Installation and configuration of a Firewall 4. Practical Training: Installation of a VPN for the connection of two networks 5. Practical Training: Programming attempt; Client/Server connection over Sockets 6. Practical Training: Network Monitoring Name: Matriculation No.: Supervisor Signature: Contact: Joachim Zumbrägel BB 320 Tel: 0203/ joachim.zumbraegel@uni-due.de 1. Introduction Computers in small companies without much space or those in households are commonly connected to form a network in order to share resources (e.g. printer, Internet, files). The setup of a (simple) network with current operating systems is relatively trivial. For networks with up to ten computers a Peer to Peer network is suitable. Peer to Peer implies that computers in such a network are considered equal and thus a central Server for administrating data traffic is not required. In the Windows OS environment a Peer to Peer network structure is called Workgroup and is based on the same principle. For larger networks, however, at least one Server should be used to centrally administrate network resources. This type of structure is called Domain in the Windows OS environment. 2. Network basics In this practical training both models are to be successively carried out. Before configuring your computers for the network, the physical connections have to be created. All computers in the laboratory are equipped with a network card and a network cable. In addition, each group is provided with a SWITCH. The STAR configuration will be physically implemented (see Fig. 1.2). In order to exchange data in a network, computers must speak the same language, which is the role of Network Protocols. They specify the common language in each case. Usually, in local networks the TCP/IP protocol is used, upon which the Internet is also based. In Windows Server 2008, TCP/IP is installed with the operating system and remains active after the installation. We just have to configure it. 1 2

2 Before we do that, we need to enter some general information (e.g. Computer Name and Workgroup or Domain Name). Question 1: What is the Computer Name for? Computer Name WorkgroupN, where N represents your network number (you will be informed of your network number in the beginning of the practical training). Workgroup Server Client Question 2: What is the difference between Workgroup and Domain? 2.1 The Workgroup Model Each computer in your network needs to have a Name and has to belong to a Workgroup (workgroups are protocol independent). The Name of each computer must be unique, thus it cannot occur more than once in a network. To change the settings mentioned above you need to proceed as follows: Go to Start Control Panel On Windows XP Pro navigate through Performance and Maintenance and open System. Choose the second TAB named Computer Name On Windows Server 2008 open System and choose Change settings under the Computer name, domain, and workgroup settings field Click on Change after which the dialogue box in Fig should appear Fill the Computer Name and Workgroup fields and confirm your entries with OK Exercise 1: Set up the Computer Name and Workgroup, and complete the table below. Designate the computers in your network as ServerN and ClientN respectively and the Workgroup as Fig : Computer name and Workgroup or Domain 2.2 TCP/IP, IP addressing, IP address classes Communication between the individual computers in our LAN (as well as in the Internet) can be established by using the TCP/IP protocol and its IP addresses. IP addresses consist of 4 octets (bytes), which are normally represented in decimal form and separated by dots (dotted decimal notation). Example:

3 This form of representation is used only for the input and/or display of IP addresses on the computer. Internally, however, the computer always works with the binary representation of IP addresses. Example: (the computer does not set the dots between the individual octets. They were used here only to facilitate and/or to distinguish between the individual values of the binary representation of the "dotted decimal notation"). IP addresses consist of two parts: Network address Host address These two parts are identified through the subnet mask. By definition the network part of an IP address is represented by 1s and the host part by 0s. The network part identifies the network address, where the computer (associated with its IP address) is located. The host part identifies the computer address within that network. This structure allows TCP/IP to be defined as a routing protocol. Example: IP Address: Subnet mask: The first 3 bytes represent the Network address (1s) and the last byte represents the Host address (0s) Network classes IP addresses are divided into classes and there are 5 different classes of available IP ranges: Class A, Class B, Class C, Class D and Class E, where classes A, B and C are most commonly used. The table below lists the ranges of IP addresses for the 3 main classes: Address class (Name) Values of the first bits (Definition) Remaining values of the first byte (decimal) Network (N)/ Host (H) Part Number of available addresses (per network) Class A 0xxx xxxx N.H.H.H Class B 10xx xxxx N.N.H.H Class C 110x xxxx N.N.N.H 256 Table Both the network address ranges of Class D and Class E lie on top of Class C. Class D and E have little practical meaning, since they are used only for research purposes and special tasks. The normal internet user does not have to deal with these two classes. Every network has two addresses reserved: network address and broadcast address. A broadcast address is characterised by 1s in the host part and a network address is characterised by 0s in the host part. The result of a logical AND operation (multiplication) between any valid IP address from a certain network and the subnet mask of that network is the network address. Due to an exponential increase of users and computers connected to the Internet, the number of unused IP addresses decreases considerably. A new version IPv6 (IP version 6) was designated in 1998 as the successor of version 4. Due to the IPv4 shortage, private addresses were reserved. These are never assigned in the Internet and are never routed. They are intended for private network use only. The private addresses range is listed below: 10.x.x.x from x.x to x.x x.x Table = a Class A address = 16 Class B addresses = 256 Class C addresses 5 6

4 The address : The address plays a special role - by definition it always addresses the local computer. It generally holds the name "local host". According to standard, the use of the network 127.x.x.x is inadmissible ("An address with 127.x.x.x should never be part of a network!"). The can only be used to examine the configuration of the particular computer (ISO Layers 3 to 7)! Network division and subnets creation Creating subnets (or subnetting) is used to divide networks into smaller portions (subnets). With the help of subnet masks, networks can be masked out bit by bit, by setting some of the subnet mask section bits to a different value. This makes the definition of subnets possible. For example for the subnet mask (with binary representation: ) only the last seven bits are available for host addressing. This way a Class C network is divided into two subnets with 126 hosts each. With the creation of such subnets, network administration can be simplified tremendously. Example of a network division: Class C Network Network mask st half 2-nd half Network address Broadcast address IP Range (126) (254) Table Network division must always be achieved in a symmetric manner, i.e. a Class C network for example can be divided into 2 subnets, both of which can be further divided in another 2 subnets. broadcast address, is passed on automatically to each host in the corresponding network. As a result of the sent ARP Signal (ARP = Address Resolution Protocol), the target host, which is addressed by its IP address, announces its MAC address. By use of MAC addresses the computers in a network are capable of exchanging data packages on the physical layer level. The mapping of IP addresses to MAC addresses is done by the Address Resolution Protocol (ARP). A MAC address has a length of 6 bytes three bytes to identify the manufacturer and three bytes representing a sequential number. Each MAC address is unique and usually burned into the network card. Nevertheless, it is possible to assign MAC addresses manually. Question 3: What helps distinguish one IP address class from another? Question 4: State 2 IP addresses, which belong to the following classes: Class A: Class B: Class C: Question 5: What is the use of the subnet mask? Broadcasting and Address Resolution Protocol As already described above, the second reserved address in a network is the broadcast address. A message (broadcast), which is sent to the 7 8

5 Question 6: What is a Gateway? Question 7: What does the abbreviation DNS stand for? What is its use? Question 8: What is the difference between private and public IP addresses? Exercise 2: Network parameters setup. For the network setup in our laboratory a Class C private network is to be established with IP address N.xxx where N represents your network number. The following guidelines hold for all groups: The Gateway (router/firewall) gets the highest usable IP address from the range and the Switch receives the lowest by default. The Server should be given the lowest unassigned IP address and the Client should also be given an IP address from the range. Question 9: Give an example for a private IP address and its subnet mask according to the following classes: Class A : Class B: Class C: Question 10: What does the abbreviation NAT stand for? What is its use? 9 10

6 Internet The following scheme describes the structure of a group s network: Switch Firewall N/ Router N Switch N Workgroup X Server N Client N Workgroup N Workgroup Y Fig : Network in the laboratory To setup your network with Windows Server 2008/Windows XP Pro, proceed as follows: 11 12

7 On Windows XP Pro navigate to Start Control Panel Network and Internet Connections Network Connections On Windows Server 2008 navigate to Start Control Panel Network and Sharing Center Manage network connections Open the Local Area Connection corresponding to your NIC (Network Interface Card). The dialogue box in Fig should appear. Select the Properties button after which the dialogue box in Fig should appear. In the list of items the connection uses: o For Windows Server 2008 choose Properties for Internet Protocol Version 4 (TCP/IPv4) o For Windows XP Pro choose Properties for Internet Protocol (TCP/IP) The dialogue box in Fig should appear. Change the network settings on the machines in your group and fill in the table below: Server Client IP address: Subnet mask: Gateway: 1. DNS: DNS: Not necessary Not necessary Table Fig : Local Area Connection Fig : LAN Properties Exercise 3: Test your TCP/IP set up. To test your network connection setup, proceed as follows: Navigate to Start Run and type cmd in the field to open the DOS command prompt window Press ENTER to confirm and the command prompt consol should appear As shown in Fig with the instruction line ipconfig /all you can look at the configuration of all network adapters in your system 13 14

8 Compare the output of the console with the configuration you entered earlier in Table To check if the computers (ServerN, ClientN, and Gateway) are communicating with each other use the command line ping <followed by the IP address> - e.g.: ping <press enter> As a result of the ping command line you should get four answers from the computer you pinged. Repeat the same command for all computers you configured. Ping the localhost, your local IP address and the IP addresses in your network. Fig : IPv4 Properties 3. User Administration A user account contains unique information about a user and allows him to register and get access to the domain, in order to take advantages of the different network resources. Through an account a user can also gain access to a specific computer s resources. Everybody who regularly uses the network should have a user account. Windows Server 2008 has 3 types of user accounts: 1. Domain user accounts 2. Predefined user accounts 3. Local user accounts We will cover Domain user accounts later in the practical training. The predefined user account administrator, has already been used in the first part of this practical training, when we set up the network configurations. The predefined user account guest (with very restricted rights), is intended for temporal network access. Fig : ipconfig /all on the Command Prompt Console The local user accounts allow access to the local computer and its resources

9 If the users of all computers in a local network (not a domain) require access to different resources, then a user account must be created on each computer for every user. When the network holds many computers (more than 10) the setup and maintenance of such a system gets very complex and time consuming. That is why the domain model is recommended for larger networks. A domain user account identifies a person who uses a computer within the domain. This account can then be given access to resources in the network. The user account and the shared resources reside on a server computer configures as domain controller, centralizing administration and security. A user account created on the domain controller applies to all computers within that domain. Before user accounts are created, guidelines should be specified for them, e.g. name conventions, password guidelines, account options. In this practical training these guidelines are not taken into account. Fig. 3.1: Local Users and Groups in Computer Management Usernames in Windows Server 2008 must be unique for the network, are not case-sensitive and cannot be more than 20 characters long. To create a user account in Windows Server 2008/Windows XP Pro, proceed as follows: Navigate to Start Control Panel Open Administrative Tools Computer Management (In Windows XP Pro the Administrative Tools are under the Performance and Maintenance category) Extend Local Users and Groups located on the left part of the window. Right click on Users and select New User as illustrated in Fig. 3.1 The New User dialogue box should pop out. Enter the properties for the desired user and click on Create as shown in Fig When you are done, click on Close. Fig. 3.2: New User dialogue box 17 18

10 Description of the properties for a new user account: User name the unique registration name of the user based on the naming convention, you defined. Full name the user s complete name. Description additional user information (i.e. his department, duties). This field is optional. Now you are able to log on to the computer with the newly created user account. Access to resources from that user account depends on the granted rights. User rights are usually set for a group of users. Predefined groups, like predefined user accounts, also exist. The four most important user groups are: 1. Administrators 2. Users 3. Power Users 4. Backup Operators Administrator group members are allowed to implement all of the operating system support functions. The group Users is the safest environment for program execution. The Power Users group possesses most administrative powers with some restrictions. The users with Backup Operators rights can save and change files no matter if they are authorized or not. An exact explanation of the rights of these groups is out of the scope of this practical training. Further information is available on the Windows 2008 Help and Support. It is also possible to create new user groups and assign rights to them or prevent new groups from receiving undesired rights. Exercise 4: User Accounts and User Groups. Create a user account for each member of your team. Create a group for your team and add the previously created users to that group. To Log On with another user, you first need to Log Off by going to Start Log Off as illustrated in Fig. 3.3 below. Fig. 3.3: Log Off on Windows Server 2008 Log On to the system with the newly created users and try to access and modify the properties of the internet protocol TCP/IP. Is it possible? If not, what changes should be made so that the newly created user account can do those changes? Access to various computers in the network could be granted by creating user accounts for that user on the corresponding machines. This type of user accounts administration can be extremely simplified by introducing the domain model to the network. 4. Domains and Active Directory The corner stone of a domain is the domain controller. A domain controller is a server, which stores a copy of the Active Directory (AD) data base and thus user rights, which will govern their access to resources within the domain. Installing AD on a server turns it into a domain controller. AD requires a DNS server to function correctly and that is why Windows Server 2008 installs a DNS server when building the domain controller

11 Exercise 5: Active Directory (AD) and DNS. Install the Active Directory Domain Service on the Server computer. Log On as Administrator and proceed as follows: Navigate to Start Server Manager Open Roles and select Add Roles Follow the Add Roles Wizard instructions and install the Active Directory Domain Services role After the installation is complete we need to configure our domain controller. Navigate to Start Run and type in dcpromo.exe Confirm with ENTER Follow the wizard and create a new domain. Name the new domain DomainN, where N is the number of your network. Set all functional levels to Windows Server 2008, because we will be working exclusively with that OS Install a DNS server along with the domain controller Set and remember the domain Administrator account password for the restore mode in case you need to go back and restore directory services Check the Reboot on completion box and wait for the installation to finish Remark: It is important to add all Client computers to the Domain in order to administrate them through the domain controller. Each computer must have a user account to access the Domain with. Exercise 6: Joining the Domain. To add computers to a domain, proceed as follows: On the Client computer: Log On as administrator and navigate to Computer Name Changes as described in chapter 2.1, Fig In the section Member of select Domain and enter the name of your domain Click OK and follow the OS instructions Your network now corresponds to a domain model. All components of the network (user, computer, etc.) will be administrated from the active directory, e.g. a user account created on the domain controller (in the AD) is valid throughout the domain. Exercise 7: Users in the Domain. As in exercise 4, create a user account for all your team members and a local security group. Add all users to that group and try to log on to both the domain controller and the client computers. On a domain controller the users and groups will no longer be managed by the Computer Management, but rather by the Active Directory. To add a user to the AD, proceed as follows: Open Start Administrative Tools Active Directory Users and Computer Extend to DomainN, where N is your network number Right click on Users and select New, then you can choose either User or Group depending on what you want to create 5. File Server A file server provides location for shared space and files, making them available to clients connected to the network. We can share files and folders in several different ways in a Microsoft network. One way would be to share data by copying it to the Public Folder, meaning that you do not make any access restrictions. Everyone with a user account on the server has access to the Public Folder. Another method for sharing files and folders is to share them directly from their current location. We will use this type of sharing because it gives us more control on user rights and files. User rights determine the type of access to a specific folder. There are two types of access rights: 21 22

12 Share Permissions o Full Control o Change o Read NTFS Permissions o Full Control o Modify o Read and Execute o Read o Write The ultimate user rights are obtained through a combination of the two types. NTFS rights define user access to folders and files regardless of them being on the local machine or a remote one. The share permissions will be effective only when the user is accessing the folders or files over the network. In this case a combination of the two kinds of access rights applies. The most restrictive one of the two is used. Follow these steps to share a folder on the network: Right click on the folder you would like to share and select Share The folder properties dialogue box with selected Sharing tab should appear as shown in Fig. 5.1 Click on Advanced Sharing. The advanced sharing dialogue box should come up. Check the Share this folder check box as shown in Fig. 5.2 Type in the name of your shared folder and click on the Permissions button to define user rights To add a user account or a group to the permissions list, click on the Add button (Fig. 5.4) and as illustrated in Fig. 5.3 type the user account name you would like to define the rights for. Check by pressing Check Names and confirm with OK To change permission for an account/group, select it from the list as shown in Fig. 5.4 and tick the desired access rights below Fig. 5.1: Folder sharing properties Fig. 5.3: Add users, computer, groups Fig. 5.2: Advanced Sharing dialogue box Fig. 5.4: Sharing permissions 23 24

13 Once you have defined the Share permissions, you need to allow NTFS permissions for the same user accounts. To change the NTFS permissions: Right click on the folder and select Properties Select the Security tab and click on Edit To add a user account to the list, proceed as explained in the share permissions steps above. Share permissions are usually not used to govern access because the files and folders already have NTFS permissions. It is preferable to set shares so that domain users have full control and then use NTFS permissions to restrict actual levels of access to the data. After sharing a folder and setting up the access permissions, all user accounts with rights should be able to access the shared data. To access network resources proceed as follows: Navigate to Start All Programs Accessories and open Windows Explorer (or press keyboard shortcut WinKey + E) In the Address Bar type two back slashes (\\) and the name of the Server or the server s IP address as shown in Fig. 5.5 e.g. \\Server1, \\ Navigate through the browser to the shared folder Exercise 9: Sharing resources Create a folder on the domain controller (Server computer). Give two of the previously created user accounts the NTFS permission Modify and the other two the NTFS permission Read. Create a text file in the newly created folder. Share the folder with Share permission Full control for the group created in Exercise 7. Try now to access the text file from the Client computer with all user accounts. Try to change the file and save the changes. Does it work for all four users? Which work and which do not? Change the Share permission of the group to Read and try once again to access the text file from the Client computer using the four users. Try to make some changes to the text file and save changes them. Could you save the changes? Why? Fig DHCP Server As we learned in the beginning of this practical training it is possible to manually setup the IP address of each computer in the network. However, in the case of larger networks an automatic distribution of IP addresses is highly recommended. This is where the DHCP Server comes into place (though it can achieve more). DHCP stands for Dynamic Host Configuration Protocol. It is a TCP/IP standard and its goal is to alleviate the complexity of IP addressing management (including other configuration details that come with it) by centralizing it through a Server on the network

14 Exercise 10: DHCP Server Install a DHCP Server for your network configuration. Notes: To install a DHCP Server Role on Windows Server 2008 proceed as follows: Navigate to Start Server Manager Open Roles and select Add Roles Follow the Add Roles Wizard instructions and install the DHCP Server role When asked, select the network connection, which you want the DHCP Server to manage For the next step, type in the parent domain (your current domain) and the IP address of the DNS Server in your network Do not install a WINS Server and continue right on Add the scope of the IP addresses in your network by pressing the Add button in the next wizard step We do not need a DHCPv6 because we will not use the IPv6 in our network Authorize the DCHP Server with the current credentials After the installation it is possible to configure different parameters in the DHCP console like Gateway, DNS, WINS, etc. To reconfigure your DHCP Server, navigate to: Start Administrative Tools DHCP Expand the Server and the IPv4 to reconfigure if needed. Log On as administrator on the Client computer and change the TCP/IP configuration to Obtain an IP address automatically and Obtain DNS server address automatically Verify with ipconfig/ all that the Client computer got a correct TCP/IP configuration from the DHCP Server. Using the command ping make sure that the Client computer can communicate with the other computers

Easy Setup Guide for the Sony Network Camera

Easy Setup Guide for the Sony Network Camera -878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Lab 10.4.1 IP Addressing Overview

Lab 10.4.1 IP Addressing Overview Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

ETHERNET WEATHER STATION CONNECTIONS Application Note 33

ETHERNET WEATHER STATION CONNECTIONS Application Note 33 ETHERNET WEATHER STATION CONNECTIONS Application Note 33 With WeatherLink and a Device Server INTRODUCTION It is possible to substitute an Ethernet connection for the direct USB or serial connection that

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

If you never used nor intend to use the wired-connection, then please disregard the following info.

If you never used nor intend to use the wired-connection, then please disregard the following info. Version date: 21/04/2015 Dear library users, In the library you can connect to the internet in two ways, using wireless or a wired-connection. The wired-connection is faster, allows you to connect to the

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

1 PC to WX64 direction connection with crossover cable or hub/switch

1 PC to WX64 direction connection with crossover cable or hub/switch 1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network

More information

D-Link DAP-1360 Repeater Mode Configuration

D-Link DAP-1360 Repeater Mode Configuration D-Link DAP-1360 Repeater Mode Configuration Outline 1. Package Contents 2. System Requirements 3. Hardware Overview Connections LED s WPS LED/Button 4. Default Settings 5. Configuring your LAN Adapter

More information

Quick Installation Guide Network Management Card

Quick Installation Guide Network Management Card Rev.1.1 www.cyberpowersystems.com Quick Installation Guide Network Management Card Intelligent Network Management Card allows UPS to be managed, monitored, and configured via SNMP Card Configuration Tool

More information

Application Note Startup Tool - Getting Started Guide

Application Note Startup Tool - Getting Started Guide Application Note Startup Tool - Getting Started Guide 1 April 2012 Startup Tool Table of Contents 1 INGATE STARTUP TOOL... 1 2 STARTUP TOOL INSTALLATION... 2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...

More information

Preparing the Computers for TCP/IP Networking

Preparing the Computers for TCP/IP Networking Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or

More information

Slave Computer 1 Slave Computer 2

Slave Computer 1 Slave Computer 2 MotoTally Networking Guide Windows XP Introduction This networking guide will show you how to configure your computers on a network so you can run multiple instances of MotoTally on multiple computers,

More information

Internet for Everyone In-Room Instructions January 2011 Version 1.3

Internet for Everyone In-Room Instructions January 2011 Version 1.3 Internet for Everyone In-Room Instructions January 2011 Version 1.3 Everywhere Internet 2006 Page 1 of 17 Connecting your computer to the Everywhere Internet network in your room 1. You need a network

More information

The PostBase Connectivity Wizard

The PostBase Connectivity Wizard The PostBase Connectivity Wizard The PostBase Connectivity Wizard allows you to easily set up your PostBase postage machine to suit your organization s arrangements. This document will guide you through

More information

Workstation ARP. Objective. Background / Preparation

Workstation ARP. Objective. Background / Preparation Workstation ARP Objective Introduce Address Resolution Protocol (ARP) and the arp a workstation command. Explore the arp command help feature using the -? option. Background / Preparation ARP is used as

More information

Remote PC Guide for Standalone PC Implementation

Remote PC Guide for Standalone PC Implementation Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.

More information

In this lab you will explore the Windows XP Firewall and configure some advanced settings.

In this lab you will explore the Windows XP Firewall and configure some advanced settings. 16.3.2 Lab: Configure Windows XP Firewall Print and complete this lab. In this lab you will explore the Windows XP Firewall and configure some advanced settings. Recommended Equipment Two computers directly

More information

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004 Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel

More information

Administration guide. Océ LF Systems. Connectivity information for Scan-to-File

Administration guide. Océ LF Systems. Connectivity information for Scan-to-File Administration guide Océ LF Systems Connectivity information for Scan-to-File Copyright 2014, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form

More information

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

Step-by-Step Guide for Setting Up IPv6 in a Test Lab Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Setting up VPN connection: DI-824VUP+ with Windows PPTP client

Setting up VPN connection: DI-824VUP+ with Windows PPTP client Setting up VPN connection: DI-824VUP+ with Windows PPTP client DI-824VUP+ (firmware 1.03 or higher) LAN IP: 192.168.0.1 Subnet Mask: 255.255.255.0 WAN IP: 203.111.91.1 Subnet Mask: 255.255.255.252 Default

More information

7 TRANSMISSION CONTROL PROTOCOL/ INTERNET PROTOCOL (TCP/IP)

7 TRANSMISSION CONTROL PROTOCOL/ INTERNET PROTOCOL (TCP/IP) 7 TRANSMISSION CONTROL PROTOCOL/ INTERNET PROTOCOL (TCP/IP) PROJECTS Project 7.1 Project 7.2 Project 7.3 Project 7.4 Project 7.5 Understanding Key Concepts Configuring TCP/IP Properties Comparing Name

More information

Expert Reference Series of White Papers. Basics of IP Address Subnetting

Expert Reference Series of White Papers. Basics of IP Address Subnetting Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction

More information

Windows Peer-to-Peer Network Configuration Guide

Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication

More information

Configuring Routers and Their Settings

Configuring Routers and Their Settings Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because

More information

Setting up VPN Access for Remote Diagnostics Support

Setting up VPN Access for Remote Diagnostics Support Setting up VPN Access for Remote Diagnostics Support D. R. Joseph, Inc. supports both dial-up and Internet access for remote support of 3GIBC1 and LF-Sizer control systems. This document describes how

More information

10.3.1.10 Lab - Configure a Windows XP Firewall

10.3.1.10 Lab - Configure a Windows XP Firewall 5.0 10.3.1.10 Lab - Configure a Windows XP Firewall Print and complete this lab. In this lab, you will explore the Windows XP Firewall and configure some advanced settings. Recommended Equipment Step 1

More information

Installation and Setup

Installation and Setup Installation and Setup Xoom INDEX Xoom Features/Pictures. Page 2 Accessories.. Page 2 Accessing Users Guides... Page 3 itap RDP mouse modes... Page 3 Setup for Xoom use in the office (Office wireless network)

More information

Quick Installation Guide DAP-1360. Wireless N 300 Access Point & Router

Quick Installation Guide DAP-1360. Wireless N 300 Access Point & Router DAP-1360 Wireless N 300 Access Point & Router BEFORE YOU BEGIN Delivery Package Access point DAP-1360 Power adapter DC 12V Ethernet cable (CAT 5E) (brochure). If any of the items are missing, please contact

More information

1. Hardware Installation

1. Hardware Installation 4 Port 10/100M Internet Broadband Router with USB Printer server Quick Installation Guide #4824904AXZZ0 1. Hardware Installation A. System Requirement Before you getting started, make sure that you meet

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

1-Port Wireless USB 2.0 Print Server Model # APSUSB201W. Quick Installation Guide. Ver. 2A

1-Port Wireless USB 2.0 Print Server Model # APSUSB201W. Quick Installation Guide. Ver. 2A 1-Port Wireless USB 2.0 Print Server Model # APSUSB201W Quick Installation Guide Ver. 2A Section 1 Step 1Connect one end of the Ethernet cable to the RJ-45 port of the Print Server and attach the other

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier

More information

Ethernet Connection Setup for CCU

Ethernet Connection Setup for CCU CCU/Laptop Connection Setup for Windows XP o Begin by selecting Control Panel from the Start menu. o Open Network Connections. o Open the Local Area Connection that you normally use with an Ethernet cable

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Prestige 324. Prestige 324. Intelligent Broadband Sharing Gateway. Version 3.60 January 2003 Quick Start Guide

Prestige 324. Prestige 324. Intelligent Broadband Sharing Gateway. Version 3.60 January 2003 Quick Start Guide Prestige 324 Intelligent Broadband Sharing Gateway Version 3.60 January 2003 Quick Start Guide 1 Introducing the Prestige The Prestige is a broadband sharing gateway with a built-in four-port 10/100 Mbps

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

STATIC IP SET UP GUIDE VERIZON 7500 WIRELESS ROUTER/MODEM

STATIC IP SET UP GUIDE VERIZON 7500 WIRELESS ROUTER/MODEM STATIC IP SET UP GUIDE VERIZON 7500 WIRELESS ROUTER/MODEM Verizon High Speed Internet for Business Verizon High Speed Internet for Business SETTING UP YOUR NEW STATIC IP CONNECTION AND IP ADDRESS(ES) This

More information

Configuring the OfficeConnect Secure Gateway for a remote L2TP over IPSec connection

Configuring the OfficeConnect Secure Gateway for a remote L2TP over IPSec connection Creating L2TP over IPSec VPNs between the OfficeConnect Cable/DSL Secure Gateway and the Microsoft VPN Client 1.0 Introduction The OfficeConnect Cable/DSL Secure Gateway supports IPSec, PPTP and L2TP over

More information

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client. Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work

More information

AutoDownload: SQL Server and Network Trouble Shooting

AutoDownload: SQL Server and Network Trouble Shooting AutoDownload: SQL Server and Network Trouble Shooting AutoDownload uses Microsoft s SQL Server database software. Since 2005 when AutoDownload was first released Microsoft have also released new versions

More information

Debugging Network Communications. 1 Check the Network Cabling

Debugging Network Communications. 1 Check the Network Cabling Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client A P P L I C A T I O N N O T E Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client This application note describes how to set up a VPN connection between a Mac client and a Sidewinder

More information

VPN Access to the NTEN Network

VPN Access to the NTEN Network VPN Access to the NTEN Network 2004 Networking and Telecommunications Engineering By: Leif Thordarson Virtual Private Network Documentation Page ii TABLE OF CONTENTS List of Illustrations and Tables...

More information

Windows Server 2008 R2 Initial Configuration Tasks

Windows Server 2008 R2 Initial Configuration Tasks Windows Server 2008 R2 Initial Configuration Tasks I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support for the

More information

Lab 10.3.5a Basic Subnetting

Lab 10.3.5a Basic Subnetting Lab 10.3.5a Basic Subnetting Objective How to identify reasons to use a subnet mask How to distinguish between a default subnet mask and a custom subnet mask What given requirements determine the subnet

More information

Course: WIN310. Student Lab Setup Guide. Summer 2010. Microsoft Windows Server 2003 Network Infrastructure (70-291)

Course: WIN310. Student Lab Setup Guide. Summer 2010. Microsoft Windows Server 2003 Network Infrastructure (70-291) Course: WIN310 Student Lab Setup Guide Summer 2010 Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 Published by Wiley & Sons 1 STUDENT COMPUTER SETUP Hardware Requirements

More information

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices

More information

In the Active Directory Domain Services Window, click Active Directory Domain Services.

In the Active Directory Domain Services Window, click Active Directory Domain Services. Installing the Active Directory Domain Services Role Press the Ctrl-Alt-Del on the xxrwdc computer. Log in as the default administrator of the local computer with the username Administrator and cisisthebest!

More information

Software Installation Guide

Software Installation Guide Software Installation Guide This manual explains how to install the software over a USB or network connection. Network connection is not available for models SP 200/200S/203S/203SF/204SF. Flowchart The

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. Note: DIR-130 FW: 1.21 How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. This setup example uses the following network settings: D-Link Technical Support PPTP VPN Between Windows PPTP

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

How To Install And Configure Windows Server 2003 On A Student Computer

How To Install And Configure Windows Server 2003 On A Student Computer Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft

More information

TOSHIBA GA-1310. Printing from Windows

TOSHIBA GA-1310. Printing from Windows TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that

More information

EnGenius ERB9250 300M Range Extender. Quick Start Guide

EnGenius ERB9250 300M Range Extender. Quick Start Guide EnGenius ERB9250 300M Range Extender Quick Start Guide Package Contents One ERB9250 300M Range Extender One 12V/1A power adapter Two 2dBi 2.4GHz SMA antennas One Ethernet cable One CD-ROM with user s manual

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Using. Microsoft Virtual PC. Page 1

Using. Microsoft Virtual PC. Page 1 Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC

More information

Pre-lab and In-class Laboratory Exercise 10 (L10)

Pre-lab and In-class Laboratory Exercise 10 (L10) ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students

More information

Steltronic Focus. Main Desk Internet connection

Steltronic Focus. Main Desk Internet connection Steltronic Focus Main Desk Steltronic S.p.A. Via Artigianale 34, 25082 Botticino Sera Brescia - Italy Tel: +39 030 2190811 fax: +39 030 2190798 Service: + 39 030 2190830 http: www.steltronic.com Service:

More information

Prestige 314 Read Me First

Prestige 314 Read Me First Prestige 314 Read Me First Console WAN 10M PORT Prestige Rear Panel Connections CONNECTION Use an RS-232 console cable. Use the cable that came with your broadband modem. LAN 10/100M Port Number COMPUTER

More information

RADAR NETWORK SETUP WITH WINDOWS XP/VISTA

RADAR NETWORK SETUP WITH WINDOWS XP/VISTA RADAR NETWORK SETUP WITH WINDOWS XP/VISTA These instructions are for setting up a Network between RADAR and a PC. To use RADAR s FTP client a 3 rd party FTP Server is needed such as FileZilla Server. This

More information

Prestige 324 Quick Start Guide. Prestige 324. Intelligent Broadband Sharing Gateway. Version V3.61(JF.0) May 2004 Quick Start Guide

Prestige 324 Quick Start Guide. Prestige 324. Intelligent Broadband Sharing Gateway. Version V3.61(JF.0) May 2004 Quick Start Guide Prestige 324 Intelligent Broadband Sharing Gateway Version V3.61(JF.0) May 2004 Quick Start Guide 1 1 Introducing the Prestige The Prestige is a broadband sharing gateway with a built-in four-port 10/100

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Symphony Network Troubleshooting

Symphony Network Troubleshooting Symphony Network Troubleshooting Step 1) Review the Networking 101 presentation on the CD included with the Symphony. A basic understanding of networks is essential to this procedure. Step 2) Identify

More information

Device Installer User Guide

Device Installer User Guide Device Installer User Guide Part Number 900-325 Revision B 12/08 Table Of Contents 1. Overview... 1 2. Devices... 2 Choose the Network Adapter for Communication... 2 Search for All Devices on the Network...

More information

ipad Installation and Setup

ipad Installation and Setup ipad Installation and Setup INDEX ipad Features Page 2 Charging.. Page 2 User Guide... Page 3 Setup for ipad use in the office (Office wireless network) Setup Office computers Verify Remote Desktop is

More information

SATO Network Interface Card Configuration Instructions

SATO Network Interface Card Configuration Instructions SATO Network Interface Card Configuration Instructions Table of Contents 1. Reset of wired/wireless interface card... 3 2. Installing the All-In-One Utility (recommended)... 4 3. Configuring wired/wireless

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

More information

While every effort was made to verify the following information, no warranty of accuracy or usability is expressed or implied.

While every effort was made to verify the following information, no warranty of accuracy or usability is expressed or implied. AG082411 Objective: How to set up a 3G connection using Static and Dynamic IP addressing Equipment: SITRANS RD500 Multitech rcell MTCBAH4EN2 modem PC with Ethernet card Internet explorer 6.0 or higher

More information

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo A typical set up for a router PCs can be connected to the router via USB or Ethernet. If you wish to use a telephone with the

More information

Assign a static IP address (192.168.1.100) for your computer. Please refer to T3 in Troubleshooting guide on page 10 if you need assistance.

Assign a static IP address (192.168.1.100) for your computer. Please refer to T3 in Troubleshooting guide on page 10 if you need assistance. Assign a static IP address (192.168.1.100) for your computer. Please refer to T3 in Troubleshooting guide on page 10 if you need assistance. You may need to write down the original settings as a backup.

More information

10.3.1.8 Lab - Configure a Windows 7 Firewall

10.3.1.8 Lab - Configure a Windows 7 Firewall 5.0 10.3.1.8 Lab - Configure a Windows 7 Firewall Print and complete this lab. In this lab, you will explore the Windows 7 Firewall and configure some advanced settings. Recommended Equipment Step 1 Two

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client Make sure your DI-804HV or DI-808HV is running firmware ver.1.40 August 12 or later. You can check firmware version

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting

Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting Expert Reference Series of White Papers Binary and IP Address Basics of Subnetting 1-800-COURSES www.globalknowledge.com Binary and IP Address Basics of Subnetting Alan Thomas, CCNA, CCSI, Global Knowledge

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Joining. Domain. Windows XP Pro

Joining. Domain. Windows XP Pro Joining a Domain in Windows XP Pro Table of Content HOW DO I CHANGE A COMPUTER'S DESCRIPTION, NAME, OR JOIN A DOMAIN IN WINDOWS XP PRO?... 1 TO ADD A COMPUTER DESCRIPTION... 1 TO CHANGE A COMPUTER NAME...

More information

How to convert a wireless router to be a wireless. access point

How to convert a wireless router to be a wireless. access point How to convert a wireless router to be a wireless access point Thanks for purchasing Edimax Wireless Router. This instruction can be applied if you want to keep your wired router and you need Edimax Wireless

More information

Step-by-Step Setup Guide Wireless File Transmitter

Step-by-Step Setup Guide Wireless File Transmitter EOS Step-by-Step Setup Guide Wireless File Transmitter Server Mode Infrastructure & Ad Hoc Networks Macintosh OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part

More information

Windows Domain Network Configuration Guide

Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may

More information

Chapter 2 Preparing Your Network

Chapter 2 Preparing Your Network Chapter 2 Preparing Your Network This document describes how to prepare your network to connect to the Internet through a router and how to verify the readiness of your broadband Internet service from

More information

StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking

StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking StarMOBILE Network Configuration Guide A guide to configuring your StarMOBILE system for networking INTRODUCTION... 3 BEFORE YOU BEGIN... 3 1) CONFIRM YOU HAVE THE LATEST SOFTWARE... 3 2) INSTALL THE STARMOBILE

More information

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications PC/POLL SYSTEMS supports native TCP/IP polling for the SPS2000 cash register. It is recommended users have the register updated

More information

Prestige 623R-T. Quick Start Guide. ADSL Dual-link Router. Version 3.40

Prestige 623R-T. Quick Start Guide. ADSL Dual-link Router. Version 3.40 Prestige 623R-T ADSL Dual-link Router Quick Start Guide Version 3.40 February 2004 Introducing the Prestige The Prestige 623R-T ADSL Dual-link Router is the ideal all-in-one device for small networks connecting

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information